blob: 7da4d1cd2eadd442dfbeb7236a2a43b43a37af79 [file] [log] [blame] [view] [edit]
# Zircon Kernel Commandline Options
TODO([fxbug.dev/53594](https://fxbug.dev/53594)): move kernel_cmdline.md verbiage here
## Options common to all machines
### aslr.disable=\<bool>
**Default:** `false`
If this option is set, the system will not use Address Space Layout
Randomization.
### aslr.entropy_bits=\<uint8_t>
**Default:** `0x1e`
For address spaces that use ASLR this controls the number of bits of entropy in
the randomization. Higher entropy results in a sparser address space and uses
more memory for page tables. Valid values range from 0-36.
### kernel.cprng-reseed-require.hw-rng=\<bool>
**Default:** `false`
When enabled and if HW RNG fails at reseeding, CPRNG panics.
### kernel.cprng-reseed-require.jitterentropy=\<bool>
**Default:** `false`
When enabled and if jitterentropy fails at reseeding, CPRNG panics.
### kernel.cprng-seed-require.hw-rng=\<bool>
**Default:** `false`
When enabled and if HW RNG fails at initial seeding, CPRNG panics.
### kernel.cprng-seed-require.jitterentropy=\<bool>
**Default:** `false`
When enabled and if jitterentrop fails initial seeding, CPRNG panics.
### kernel.cprng-seed-require.cmdline=\<bool>
**Default:** `false`
When enabled and if you do not provide entropy input from the kernel command
line, CPRNG panics.
### kernel.entropy-mixin=\<hexadecimal>
Provides entropy to be mixed into the kernel's CPRNG. The value must be a
string of lowercase hexadecimal digits.
The original value will be scrubbed from memory as soon as possible and will be
redacted from all diagnostic output.
### kernel.jitterentropy.bs=\<uint32_t>
**Default:** `0x40`
Sets the "memory block size" parameter for jitterentropy. When jitterentropy is
performing memory operations (to increase variation in CPU timing), the memory
will be accessed in blocks of this size.
### kernel.jitterentropy.bc=\<uint32_t>
**Default:** `0x200`
Sets the "memory block count" parameter for jitterentropy. When jitterentropy
is performing memory operations (to increase variation in CPU timing), this
controls how many blocks (of size `kernel.jitterentropy.bs`) are accessed.
### kernel.jitterentropy.ml=\<uint32_t>
**Default:** `0x20`
Sets the "memory loops" parameter for jitterentropy. When jitterentropy is
performing memory operations (to increase variation in CPU timing), this
controls how many times the memory access routine is repeated. This parameter
is only used when `kernel.jitterentropy.raw` is true. If the value of this
parameter is `0` or if `kernel.jitterentropy.raw` is `false`, then
jitterentropy chooses the number of loops is a random-ish way.
### kernel.jitterentropy.ll=\<uint32_t>
**Default:** `0x1`
Sets the "LFSR loops" parameter for jitterentropy. When
jitterentropy is performing CPU-intensive LFSR operations (to increase variation
in CPU timing), this controls how many times the LFSR routine is repeated. This
parameter is only used when `kernel.jitterentropy.raw` is true. If the value of
this parameter is `0` or if `kernel.jitterentropy.raw` is `false`, then
jitterentropy chooses the number of loops is a random-ish way.
### kernel.jitterentropy.raw=\<bool>
**Default:** `true`
When true, the jitterentropy entropy collector will return raw,
unprocessed samples. When false, the raw samples will be processed by
jitterentropy, producing output data that looks closer to uniformly random. Note
that even when set to false, the CPRNG will re-process the samples, so the
processing inside of jitterentropy is somewhat redundant.
### kernel.lockup-detector.critical-section-threshold-ms=\<uint64_t>
**Default:** `0xbb8`
When a CPU remains in a designated critical section for longer than
this threshold, a KERNEL OOPS will be emitted.
See also `k lockup status` and
[lockup detector](/zircon/kernel/lib/lockup_detector/README.md).
When 0, critical section lockup detection is disabled.
When kernel.lockup-detector.heartbeat-period-ms is 0, critical section lockup
detection is disabled.
### kernel.lockup-detector.critical-section-fatal-threshold-ms=\<uint64_t>
**Default:** `0x2710`
When a CPU remains in a designated critical section for longer than this
threshold, a crashlog will be generated and the system will reboot, indicating a
reboot reason of `SOFTWARE_WATCHDOG` as it does.
See also `k lockup status` and
[lockup detector](/zircon/kernel/lib/lockup_detector/README.md).
When 0, critical section crashlog generation and reboot is disabled.
When kernel.lockup-detector.heartbeat-period-ms is 0, critical section lockup
detection is disabled.
### kernel.lockup-detector.heartbeat-period-ms=\<uint64_t>
**Default:** `0x3e8`
How frequently a secondary CPU should emit a heartbeat via kernel timer. This
value should be large enough to not impact system performance, but should be
smaller than the heartbeat age threshold. 1000 is a reasonable value.
See also [lockup detector](/zircon/kernel/lib/lockup_detector/README.md).
When 0, heartbeat detection is disabled.
### kernel.lockup-detector.heartbeat-age-threshold-ms=\<uint64_t>
**Default:** `0xbb8`
The maximum age of a secondary CPU's last heartbeat before it is considered to
be locked up. This value should be larger than the heartbeat peroid, but small
enough so as to not miss short-lived lockup events. 3000 is a reasonable value.
See also [lockup detector](/zircon/kernel/lib/lockup_detector/README.md).
When 0, heartbeat detection is disabled.
### kernel.lockup-detector.heartbeat-age-fatal-threshold-ms=\<uint64_t>
**Default:** `0x2710`
The maximum age of a CPU's last heartbeat before it is considered to be locked
up, triggering generation of a crashlog indicating a reboot reason of
`SOFTWARE_WATCHDOG` followed by a reboot.
See also [lockup detector](/zircon/kernel/lib/lockup_detector/README.md).
When 0, heartbeat crashlog generation and reboot is disabled.
### kernel.oom.behavior=[reboot | jobkill]
**Default:** `reboot`
This option can be used to configure the behavior of the kernel when
encountering an out-of-memory (OOM) situation. Valid values are `jobkill`, and
`reboot`.
If set to `jobkill`, when encountering OOM, the kernel attempts to kill jobs that
have the `ZX_PROP_JOB_KILL_ON_OOM` bit set to recover memory.
If set to `reboot`, when encountering OOM, the kernel signals an out-of-memory
event (see `zx_system_get_event()`), delays briefly, and then reboots the system.
### kernel.mexec-force-high-ramdisk=\<bool>
**Default:** `false`
This option is intended for test use only. When set to `true` it forces the
mexec syscall to place the ramdisk for the following kernel in high memory
(64-bit address space, >= 4GiB offset).
### kernel.mexec-pci-shutdown=\<bool>
**Default:** `true`
If false, this option leaves PCI devices running when calling mexec.
### kernel.oom.enable=\<bool>
**Default:** `true`
This option turns on the out-of-memory (OOM) kernel thread, which kills
processes or reboots the system (per `kernel.oom.behavior`), when the PMM has
less than `kernel.oom.outofmemory-mb` free memory.
An OOM can be manually triggered by the command `k pmm oom`, which will cause
free memory to fall below the `kernel.oom.outofmemory-mb` threshold. An
allocation rate can be provided with `k pmm oom <rate>`, where `<rate>` is in MB.
This will cause the specified amount of memory to be allocated every second,
which can be useful for observing memory pressure state transitions.
Refer to `kernel.oom.outofmemory-mb`, `kernel.oom.critical-mb`,
`kernel.oom.warning-mb`, and `zx_system_get_event()` for further details on
memory pressure state transitions.
The current memory availability state can be queried with the command
`k pmm mem_avail_state info`.
### kernel.oom.outofmemory-mb=\<uint64_t>
**Default:** `0x32`
This option specifies the free-memory threshold at which the out-of-memory (OOM)
thread will trigger an out-of-memory event and begin killing processes, or
rebooting the system.
### kernel.oom.critical-mb=\<uint64_t>
**Default:** `0x96`
This option specifies the free-memory threshold at which the out-of-memory
(OOM) thread will trigger a critical memory pressure event, signaling that
processes should free up memory.
### kernel.oom.warning-mb=\<uint64_t>
**Default:** `0x12c`
This option specifies the free-memory threshold at which the out-of-memory
(OOM) thread will trigger a warning memory pressure event, signaling that
processes should slow down memory allocations.
### kernel.oom.debounce-mb=\<uint64_t>
**Default:** `0x1`
This option specifies the memory debounce value used when computing the memory
pressure state based on the free-memory thresholds
(`kernel.oom.outofmemory-mb`, `kernel.oom.critical-mb` and
`kernel.oom.warning-mb`). Transitions between memory availability states are
debounced by not leaving a state until the amount of free memory is at least
`kernel.oom.debounce-mb` outside of that state.
For example, consider the case where `kernel.oom.critical-mb` is set to 100 MB
and `kernel.oom.debounce-mb` set to 5 MB. If we currently have 90 MB of free
memory on the system, i.e. we're in the Critical state, free memory will have to
increase to at least 105 MB (100 MB + 5 MB) for the state to change from
Critical to Warning.
### kernel.oom.evict-at-warning=\<bool>
**Default:** `false`
This option triggers eviction of file pages at the Warning pressure state,
in addition to the default behavior, which is to evict at the Critical and OOM
states.
### kernel.oom.evict-continuous=\<bool>
**Default:** `false`
This option configures kernel eviction to run continually in the background to try and
keep the system out of memory pressure, as opposed to triggering one-shot eviction only at
memory pressure level transitions.
### kernel.oom.hysteresis-seconds=\<uint64_t>
**Default:** `0xa`
This option specifies the hysteresis interval (in seconds) between memory
pressure state transitions. Note that hysteresis is only applicable for
transitions from a state with less free memory to a state with more free memory;
transitions in the opposite direction are not delayed.
### kernel.oom.imminent-oom-delta-mb=\<uint64_t>
**Default:** `0xa`
This option specifies the delta (in MB) above the out-of-memory threshold at which an
imminent-out-of-memory event will be signaled. This signal is intended to be used for
capturing diagnostic memory information close to the OOM, since capturing state exactly
at the OOM might not be possible.
For example, if `kernel.oom.outofmemory-mb` is set to 50 and `kernel.oom.imminent-oom-delta-mb`
is set to 20, an imminent-out-of-memory event will be signaled at 70MB (i.e. 50MB + 20MB)
free memory, while out-of-memory will be signaled at 50MB free memory.
### kernel.serial=[none | legacy | qemu | \<type>,\<base>,\<irq>]
**Default:** `none`
TODO(53594)
### vdso.ticks_get_force_syscall=\<bool>
**Default:** `false`
If this option is set, the `zx_ticks_get` vDSO call will be forced to be a true
syscall, even if the hardware cycle counter registers are accessible from
user-mode.
### vdso.clock_get_monotonic_force_syscall=\<bool>
**Default:** `false`
If this option is set, the `zx_clock_get_monotonic` vDSO call will be forced to
be a true syscall, instead of simply performing a transformation of the tick
counter in user-mode.
### kernel.userpager.overtime_wait_seconds=\<uint64_t>
**Default:** `0x14`
This option configures how long a user pager fault may block before being
considered overtime and printing an information message to the debuglog and
continuing to wait. A value of 0 indicates a wait is never considered to be
overtime.
### kernel.userpager.overtime_timeout_seconds=\<uint64_t>
**Default:** `0x12c`
This option configures how long a user pager fault may block before being
aborted. For a hardware page fault, the faulting thread will terminate with a
fatal page fault exception. For a software page fault triggered by a syscall,
the syscall will fail with `ZX_ERR_TIMED_OUT`. A value of 0 indicates a page
fault is never aborted due to a time out.
### kernel.bufferchain.reserve-pages=\<uint64_t>
**Default:** `0x20`
Specifies the number of pages per CPU to reserve for buffer chain allocations
(channel messages). Higher values reduce contention on the PMM when the
system is under load at the cost of using more memory when the system is
idle.
TODO(fxbug.dev/68456): Determine an upper bound for this value to prevent
consuming too much memory.
### kernel.bypass-debuglog=\<bool>
**Default:** `false`
When enabled, forces output to the console instead of buffering it. The reason
we have both a compile switch and a cmdline parameter is to facilitate prints
in the kernel before cmdline is parsed to be forced to go to the console.
The compile switch setting overrides the cmdline parameter (if both are present).
Note that both the compile switch and the cmdline parameter have the side effect
of disabling irq driven uart Tx.
### kernel.debug_uart_poll=\<bool>
**Default:** `false`
If true, will periodically poll UART and forwards its contents into the console.
### kernel.enable-debugging-syscalls=\<bool>
**Default:** `false`
When disabled, certain debugging-related syscalls will fail with
`ZX_ERR_NOT_SUPPORTED`. These are:
- `zx_debug_send_command()`
- `zx_ktrace_control()`
- `zx_ktrace_init()`
- `zx_ktrace_read()`
- `zx_mtrace_control()`
- `zx_process_write_memory()`
- `zx_system_mexec()`
- `zx_system_mexec_payload_get()
### kernel.enable-serial-syscalls=[false | true | output-only]
**Default:** `false`
When `false`, both `zx_debug_read()` and `zx_debug_write()` will fail with
`ZX_ERR_NOT_SUPPORTED`.
When `output-only`, `zx_debug_read()` will fail with `ZX_ERR_NOT_SUPPORTED`, but `zx_debug_write()`
will work normally.
When `true`, both will work normally.
### kernel.entropy-test.src=[hw_rng | jitterentropy]
**Default:** `hw_rng`
When running an entropy collector quality test, use the provided entropy source.
This option is ignored unless the kernel was built with `ENABLE_ENTROPY_COLLECTOR_TEST=1`.
### kernel.entropy-test.len=\<uint64_t>
**Default:** `0x100000`
When running an entropy collector quality test, collect the provided number of
bytes.
The maximum value can be increased by defining `ENTROPY_COLLECTOR_TEST_MAXLEN` as such value.
### kernel.force-watchdog-disabled=\<bool>
**Default:** `false`
When set, the system will attempt to disable any hardware watchdog timer armed
and passed by the bootloader as soon as it possibly can in the boot sequence,
presuming that the bootloader provides enough information to know how to disable
the WDT at all.
### gfxconsole.early=\<bool>
**Default:** `false`
This option requests that the kernel start a graphics console
during early boot (if possible), to display kernel debug print
messages while the system is starting. When userspace starts up, a usermode
graphics console driver takes over.
The early kernel console can be slow on some platforms, so if it is not
needed for debugging it may speed up boot to disable it.
### gfxconsole.font=[9x16 | 18x32]
**Default:** `9x16`
This option asks the graphics console to use a specific font.
### kernel.halt-on-panic=\<bool>
**Default:** `false`
If this option is set, the system will halt on a kernel panic instead
of rebooting. To enable halt-on-panic, pass the kernel command line
argument `kernel.halt-on-panic=true`.
Since the kernel can't reliably draw to a framebuffer when the GPU is enabled,
the system will reboot by default if the kernel crashes or panics.
If the kernel crashes and the system reboots, the log from the kernel panic will
appear at `/boot/log/last-panic.txt`, suitable for viewing, downloading, etc.
> Please attach your `last-panic.txt` and `zircon.elf` files to any kernel
> panic bugs you file.
If there's a `last-panic.txt`, that indicates that this is the first successful
boot since a kernel panic occurred.
It is not "sticky" -- if you reboot cleanly, it will be gone, and if you crash
again it will be replaced.
### ktrace.bufsize=\<uint32_t>
**Default:** `0x20`
This option specifies the number of megabytes allocated for ktrace records.
### ktrace.grpmask=\<uint32_t>
**Default:** `0xfff`
This option specifies what ktrace records are emitted.
The value is a bitmask of KTRACE\_GRP\_\* values from zircon/ktrace.h.
Hex values may be specified as 0xNNN.
### kernel.memory-limit-dbg=\<bool>
**Default:** `true`
This option enables verbose logging from the memory limit library.
### kernel.memory-limit-mb=\<uint64_t>
**Default:** `0x0`
This option sets an upper-bound in megabytes for the system memory.
If set to zero, then no upper-bound is set.
For example, choosing a low enough value would allow a user simulating a system with
less physical memory than it actually has.
### kernel.page-scanner.enable-eviction=\<bool>
**Default:** `true`
When set, allows the page scanner to evict user pager backed pages. Eviction can
reduce memory usage and prevent out of memory scenarios, but removes some
timing predictability from system behavior.
### kernel.page-scanner.discardable-evictions-percent=\<uint32_t>
**Default:** `0x0`
Percentage of page evictions, that should be satisfied from
discardable VMOs, as opposed to pager-backed VMOs. For example, if this value
is set to `X` and the kernel needs to reclaim `N` pages to relieve memory
pressure, it will evict `(N * X / 100)` pages from discardable VMOs, and the
remaining `(N * (100 - X) / 100)` pages from pager-backed VMOs.
Note that the kernel will try its best to honor this ratio between discardable
and pager-backed pages evicted, but the actual numbers might not be exact.
### kernel.page-scanner.page-table-eviction-policy=[always | never | on_request]
**Default:** `always`
Sets the policy for what to do with user page tables that are not accessed
between scanner runs.
When `on_request`, only performs eviction on request, such as in response to a
low memory scenario.
When `never`, page tables are never evicted.
When `always`, Unused page tables are always evicted every time the
scanner runs.
### kernel.page-scanner.eviction-interval-seconds=\<uint32_t>
**Default:** `0xa`
This option specifies the periodic interval (in seconds) at which kernel eviction
will run in the background to try and keep the system out of memory pressure.
This will only take effect if continuous eviction is enabled with
`kernel.oom.evict-continuous`. If this value is lower than the page queue
rotation / aging interval (10s by default), it will be ignored and the eviction
interval will instead be set equal to the page queue rotation interval.
### kernel.page-scanner.promote-no-clones=\<bool>
**Default:** `false`
This option, allows the scanner to evict first the pages owned by pager backed VMOs
with no clones. VMOs with no clones are meant to approximate inactive VMOs. Evicting
inactive pages first is expected to free up memory that remains free for longer,
and can be more effective at relieving memory pressure.
### kernel.page-scanner.start-at-boot=\<bool>
**Default:** `true`
This option causes the kernels active memory scanner to be initially
enabled on startup. You can also enable and disable it using the kernel
console. If you disable the scanner, you can have additional system
predictability since it removes time based and background memory eviction.
Every action the scanner performs can be individually configured and disabled.
If all actions are disabled then enabling the scanner has no effect.
### kernel.page-scanner.zero-page-scans-per-second=\<uint64_t>
**Default:** `0x4e20`
This option configures the maximal number of candidate pages the zero
page scanner will consider every second.
Setting to zero means no zero page scanning will occur. This can provide
additional system predictability for benchmarking or other workloads.
The page scanner must be running for this option to have any effect. It can be
enabled at boot with the `kernel.page-scanner.start-at-boot` option.
This value was chosen to consume, in the worst case, 5% CPU on a lower-end
arm device. Individual configurations may wish to tune this higher (or lower)
as needed.
### kernel.pmm-checker.action=\<string>
**Default:** `oops`
Supported actions:
- `oops`
- `panic`
This option specifies which action is taken when the PMM checker detects
corruption.
When `oops`, a non-fatal kernel OOPS will be emitted when corruption is detected.
When `panic` a fatal kernel panic will occur when corruption is detected.
### kernel.pmm-checker.enable=\<bool>
**Default:** `false`
This controls whether the PMM's use-after-free checker is enabled.
The PMM checker can be expensive and is intended for use in debug and
development builds. See also "k pmm checker".
### kernel.pmm-checker.fill-size=\<uint64_t>
**Default:** `0x1000`
This option specifies how many bytes of each free page is filled or checked when
the PMM's use-after-free checker is enabled. Valid values are multiples of 8,
between 8 and PAGE_SIZE, inclusive.
### kernel.portobserver.reserve-pages=\<uint64_t>
**Default:** `0x8`
Specifies the number of pages per CPU to reserve for port observer (async
wait) allocations. Higher values reduce contention on the PMM when the system
is under load at the cost of using more memory when the system is idle.
### kernel.portpacket.reserve-pages=\<uint64_t>
**Default:** `0x1`
Specifies the number of pages per CPU to reserve for port packet (port_queue)
allocations. Higher values reduce contention on the PMM when the system is
under load at the cost of using more memory when the system is idle.
### kernel.root-job.behavior=[halt | reboot | bootloader | recovery | shutdown]
**Default:** `reboot`
This option specifies what action the kernel should take when the root job is
either terminated, or has no jobs and no processes.
When `halt`, will halt the system.
When `reboot`, will reboot the system.
When `bootloader`, will reboot the system into the bootloader.
When `recovery`, will reboot the system into the recovery partition.
When `shutdown`, will shutdown the system.
## Options available only on arm64 machines
### kernel.arm64.disable_spec_mitigations=\<bool>
**Default:** `false`
If set, disables all speculative execution information leak mitigations.
If unset, the per-mitigation defaults will be used.
### kernel.arm64.event-stream.enable=\<bool>
**Default:** `true`
When enabled, each ARM cpu will enable an event stream generator, which per-cpu
sets the hidden event flag at a particular rate. This has the effect of kicking
cpus out of any WFE states they may be sitting in.
### kernel.arm64.event-stream.freq-hz=\<uint32_t>
**Default:** `0x2710`
If the event stream is enabled, specifies the frequency at which it will attempt
to run. The resolution is limited, so the driver will only be able to pick the
nearest power of 2 from the cpu timer counter.
### kernel.arm64.debug.dap-rom-soc=\<string>
If set, tries to initialize the dap debug aperture at a hard coded address for the particular
system on chip. Currently accepted values are amlogic-t931g, amlogic-s905d2, and amlogic-s905d3g.
## Options available only on x86 machines
### kernel.x86.disable_spec_mitigations=\<bool>
**Default:** `false`
If set, disables all speculative execution information leak mitigations.
If unset, the per-mitigation defaults will be used.
### kernel.x86.hwp=\<bool>
**Default:** `true`
This settings enables HWP (hardware P-states) on supported chips. This feature
lets Intel CPUs automatically scale their own clock speed.
### kernel.x86.hwp_policy=[bios-specified | performance | balanced | power-save | stable-performance]
**Default:** `bios-specified`
Set a power/performance tradeoff policy of the CPU. x86 CPUs with HWP
(hardware P-state) support can be configured to autonomusly scale their
frequency to favour different policies.
Currently supported policies are:
* `bios-specified`: Use the power/performance tradeoff policy
specified in firmware/BIOS settings. If no policy is available, falls back
to `balanced`.
* `performance`: Maximise performance.
* `balanced`: Balance performance / power savings.
* `power-save`: Reduce power usage, at the cost of lower performance.
* `stable-performance`: Use settings that keep system performance consistent.
This may be useful for benchmarking, for example, where keeping performance
predictable is more important than maximising performance.
### kernel.x86.md_clear_on_user_return=\<bool>
**Default:** `true`
MDS (Microarchitectural Data Sampling) is a family of speculative execution
information leak bugs that allow the contents of recent loads or stores to be
inferred by hostile code, regardless of privilege level (CVE-2019-11091,
CVE-2018-12126, CVE-2018-12130, CVE-2018-12127). For example, this could allow
user code to read recent kernel loads/stores.
To avoid this bug, it is required that all microarchitectural structures
that could leak data be flushed on trust level transitions. Also, it is
important that trust levels do not concurrently execute on a single physical
processor core.
This option controls whether microarchitectual structures are flushed on
the kernel to user exit path, if possible. It may have a negative performance
impact.
* If set to true (the default), structures are flushed if the processor is
vulnerable.
* If set to false, no flush is executed on structures.
### kernel.x86.pti.enable=\<uint32_t>
**Default:** `0x2`
Page table isolation configures user page tables to not have kernel text or
data mapped. This may impact performance negatively. This is a mitigation
for Meltdown (AKA CVE-2017-5754).
* If set to 1, this force-enables page table isolation.
* If set to 0, this force-disables page table isolation. This may be insecure.
* If set to 2 or unset (the default), this enables page table isolation on
CPUs vulnerable to Meltdown.
TODO(joshuaseaton): make this an enum instead of using magic integers.
### kernel.x86.spec_store_bypass_disable=\<bool>
**Default:** `false`
Spec-store-bypass (Spectre V4) is a speculative execution information leak
vulnerability that affects many Intel and AMD x86 CPUs. It targets memory
disambiguation hardware to infer the contents of recent stores. The attack
only affects same-privilege-level, intra-process data.
This command line option controls whether a mitigation is enabled. The
mitigation has negative performance impacts.
* If true, the mitigation is enabled on CPUs that need it.
* If false (the default), the mitigation is not enabled.
### kernel.x86.turbo=\<bool>
**Default:** `true`
Turbo Boost or Core Performance Boost are mechanisms that allow processors to
dynamically vary their performance at runtime based on available thermal and
electrical budget. This may provide improved interactive performance at the cost
of performance variability. Some workloads may benefit from disabling Turbo; if
this command line flag is set to false, turbo is disabled for all CPUs in the
system.
TODO: put something here