Skip to content

Commit be3a5b0

Browse files
rddunlapJonathan Corbet
authored andcommitted
Doc: admin-guide: use correct legends in kernel-parameters.txt
Documentation/admin-guide/kernel-parameters.rst includes a legend telling us what configurations or hardware platforms are relevant for certain boot options. For X86, it is spelled "X86" and for x86_64, it is spelled "X86-64", so make corrections for those. Signed-off-by: Randy Dunlap <[email protected]> Cc: Jonathan Corbet <[email protected]> Cc: [email protected] Cc: Thomas Gleixner <[email protected]> Cc: Ingo Molnar <[email protected]> Cc: Borislav Petkov <[email protected]> Cc: [email protected] Link: https://lore.kernel.org/r/[email protected] Signed-off-by: Jonathan Corbet <[email protected]>
1 parent f30c3ff commit be3a5b0

File tree

1 file changed

+18
-18
lines changed

1 file changed

+18
-18
lines changed

Documentation/admin-guide/kernel-parameters.txt

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -719,7 +719,7 @@
719719
memory region [offset, offset + size] for that kernel
720720
image. If '@offset' is omitted, then a suitable offset
721721
is selected automatically.
722-
[KNL, x86_64] select a region under 4G first, and
722+
[KNL, X86-64] Select a region under 4G first, and
723723
fall back to reserve region above 4G when '@offset'
724724
hasn't been specified.
725725
See Documentation/admin-guide/kdump/kdump.rst for further details.
@@ -732,14 +732,14 @@
732732
Documentation/admin-guide/kdump/kdump.rst for an example.
733733

734734
crashkernel=size[KMG],high
735-
[KNL, x86_64] range could be above 4G. Allow kernel
735+
[KNL, X86-64] range could be above 4G. Allow kernel
736736
to allocate physical memory region from top, so could
737737
be above 4G if system have more than 4G ram installed.
738738
Otherwise memory region will be allocated below 4G, if
739739
available.
740740
It will be ignored if crashkernel=X is specified.
741741
crashkernel=size[KMG],low
742-
[KNL, x86_64] range under 4G. When crashkernel=X,high
742+
[KNL, X86-64] range under 4G. When crashkernel=X,high
743743
is passed, kernel could allocate physical memory region
744744
above 4G, that cause second kernel crash on system
745745
that require some amount of low memory, e.g. swiotlb
@@ -1403,7 +1403,7 @@
14031403

14041404
gamma= [HW,DRM]
14051405

1406-
gart_fix_e820= [X86_64] disable the fix e820 for K8 GART
1406+
gart_fix_e820= [X86-64] disable the fix e820 for K8 GART
14071407
Format: off | on
14081408
default: on
14091409

@@ -1790,15 +1790,15 @@
17901790
Format: 0 | 1
17911791
Default set by CONFIG_INIT_ON_FREE_DEFAULT_ON.
17921792

1793-
init_pkru= [x86] Specify the default memory protection keys rights
1793+
init_pkru= [X86] Specify the default memory protection keys rights
17941794
register contents for all processes. 0x55555554 by
17951795
default (disallow access to all but pkey 0). Can
17961796
override in debugfs after boot.
17971797

17981798
inport.irq= [HW] Inport (ATI XL and Microsoft) busmouse driver
17991799
Format: <irq>
18001800

1801-
int_pln_enable [x86] Enable power limit notification interrupt
1801+
int_pln_enable [X86] Enable power limit notification interrupt
18021802

18031803
integrity_audit=[IMA]
18041804
Format: { "0" | "1" }
@@ -1816,7 +1816,7 @@
18161816
bypassed by not enabling DMAR with this option. In
18171817
this case, gfx device will use physical address for
18181818
DMA.
1819-
forcedac [x86_64]
1819+
forcedac [X86-64]
18201820
With this option iommu will not optimize to look
18211821
for io virtual address below 32-bit forcing dual
18221822
address cycle on pci bus for cards supporting greater
@@ -1901,7 +1901,7 @@
19011901
strict regions from userspace.
19021902
relaxed
19031903

1904-
iommu= [x86]
1904+
iommu= [X86]
19051905
off
19061906
force
19071907
noforce
@@ -1911,8 +1911,8 @@
19111911
merge
19121912
nomerge
19131913
soft
1914-
pt [x86]
1915-
nopt [x86]
1914+
pt [X86]
1915+
nopt [X86]
19161916
nobypass [PPC/POWERNV]
19171917
Disable IOMMU bypass, using IOMMU for PCI devices.
19181918

@@ -2055,21 +2055,21 @@
20552055

20562056
iucv= [HW,NET]
20572057

2058-
ivrs_ioapic [HW,X86_64]
2058+
ivrs_ioapic [HW,X86-64]
20592059
Provide an override to the IOAPIC-ID<->DEVICE-ID
20602060
mapping provided in the IVRS ACPI table. For
20612061
example, to map IOAPIC-ID decimal 10 to
20622062
PCI device 00:14.0 write the parameter as:
20632063
ivrs_ioapic[10]=00:14.0
20642064

2065-
ivrs_hpet [HW,X86_64]
2065+
ivrs_hpet [HW,X86-64]
20662066
Provide an override to the HPET-ID<->DEVICE-ID
20672067
mapping provided in the IVRS ACPI table. For
20682068
example, to map HPET-ID decimal 0 to
20692069
PCI device 00:14.0 write the parameter as:
20702070
ivrs_hpet[0]=00:14.0
20712071

2072-
ivrs_acpihid [HW,X86_64]
2072+
ivrs_acpihid [HW,X86-64]
20732073
Provide an override to the ACPI-HID:UID<->DEVICE-ID
20742074
mapping provided in the IVRS ACPI table. For
20752075
example, to map UART-HID:UID AMD0020:0 to
@@ -2346,7 +2346,7 @@
23462346
lapic [X86-32,APIC] Enable the local APIC even if BIOS
23472347
disabled it.
23482348

2349-
lapic= [x86,APIC] "notscdeadline" Do not use TSC deadline
2349+
lapic= [X86,APIC] "notscdeadline" Do not use TSC deadline
23502350
value for LAPIC timer one-shot implementation. Default
23512351
back to the programmable timer unit in the LAPIC.
23522352

@@ -3162,12 +3162,12 @@
31623162
register save and restore. The kernel will only save
31633163
legacy floating-point registers on task switch.
31643164

3165-
nohugeiomap [KNL,x86,PPC] Disable kernel huge I/O mappings.
3165+
nohugeiomap [KNL,X86,PPC] Disable kernel huge I/O mappings.
31663166

31673167
nosmt [KNL,S390] Disable symmetric multithreading (SMT).
31683168
Equivalent to smt=1.
31693169

3170-
[KNL,x86] Disable symmetric multithreading (SMT).
3170+
[KNL,X86] Disable symmetric multithreading (SMT).
31713171
nosmt=force: Force disable SMT, cannot be undone
31723172
via the sysfs control file.
31733173

@@ -3929,7 +3929,7 @@
39293929
pt. [PARIDE]
39303930
See Documentation/admin-guide/blockdev/paride.rst.
39313931

3932-
pti= [X86_64] Control Page Table Isolation of user and
3932+
pti= [X86-64] Control Page Table Isolation of user and
39333933
kernel address spaces. Disabling this feature
39343934
removes hardening, but improves performance of
39353935
system calls and interrupts.
@@ -3941,7 +3941,7 @@
39413941

39423942
Not specifying this option is equivalent to pti=auto.
39433943

3944-
nopti [X86_64]
3944+
nopti [X86-64]
39453945
Equivalent to pti=off
39463946

39473947
pty.legacy_count=

0 commit comments

Comments
 (0)