/openbmc/linux/drivers/soc/aspeed/ |
H A D | aspeed-sbc.c | 21 u8 secure_boot; member 54 sbe.secure_boot = !!(security_status & SECURE_BOOT); in aspeed_sbc_init() 58 pr_info("AST2600 secure boot %s\n", sbe.secure_boot ? "enabled" : "disabled"); in aspeed_sbc_init() 68 debugfs_create_u8("secure_boot", 0444, sbc_dir, &sbe.secure_boot); in aspeed_sbc_init()
|
/openbmc/qemu/include/hw/arm/ |
H A D | linux-boot-if.h | 36 void (*arm_linux_init)(ARMLinuxBootIf *obj, bool secure_boot);
|
H A D | boot.h | 66 bool secure_boot; member
|
/openbmc/bmcweb/redfish-core/include/generated/enums/ |
H A D | secure_boot.hpp | 4 namespace secure_boot namespace
|
/openbmc/linux/arch/x86/include/asm/ |
H A D | bootparam_utils.h | 73 BOOT_PARAM_PRESERVE(secure_boot), in sanitize_boot_params()
|
H A D | efi.h | 421 ({ extern struct boot_params boot_params; boot_params.secure_boot; })
|
/openbmc/linux/drivers/bluetooth/ |
H A D | btintel.h | 63 u8 secure_boot; member 94 __u8 secure_boot; member
|
H A D | btintel.c | 503 version->secure_boot ? "enabled" : "disabled"); in btintel_version_info_tlv() 597 version->secure_boot = tlv->val[0]; in btintel_parse_version_tlv() 910 params->secure_boot ? "enabled" : "disabled"); in btintel_read_boot_params()
|
/openbmc/qemu/hw/arm/ |
H A D | sabrelite.c | 97 sabrelite_binfo.secure_boot = true; in sabrelite_init()
|
H A D | boot.c | 54 if (arm_feature(&cpu->env, ARM_FEATURE_EL3) && info->secure_boot) { in arm_boot_address_space() 741 assert(!info->secure_boot); in do_cpu_reset() 745 (info->secure_boot || in do_cpu_reset() 785 albifc->arm_linux_init(albif, info->secure_boot); in do_arm_linux_init() 1275 if (info->is_linux && !info->secure_boot) { in arm_load_kernel()
|
H A D | raspi.c | 211 s->binfo.secure_boot = true; in setup_boot()
|
H A D | vexpress.c | 718 daughterboard->bootinfo.secure_boot = vms->secure; in vexpress_common_init()
|
/openbmc/qemu/hw/intc/ |
H A D | arm_gic_common.c | 335 bool secure_boot) in arm_gic_common_linux_init() argument 339 if (s->security_extn && !secure_boot) { in arm_gic_common_linux_init()
|
H A D | arm_gicv3_common.c | 592 bool secure_boot) in arm_gic_common_linux_init() argument 596 if (s->security_extn && !secure_boot) { in arm_gic_common_linux_init()
|
/openbmc/linux/arch/x86/xen/ |
H A D | efi.c | 146 boot_params->secure_boot = xen_efi_get_secureboot(); in xen_efi_init()
|
/openbmc/linux/arch/x86/kernel/ |
H A D | asm-offsets.c | 94 OFFSET(BP_secure_boot, boot_params, secure_boot); in common()
|
H A D | kexec-bzimage64.c | 193 params->secure_boot = boot_params.secure_boot; in setup_efi_state()
|
H A D | setup.c | 1194 switch (boot_params.secure_boot) { in setup_arch()
|
/openbmc/linux/Documentation/arch/x86/ |
H A D | zero-page.rst | 41 1EC/001 ALL secure_boot Secure boot is enabled in the firmware
|
/openbmc/linux/arch/x86/include/uapi/asm/ |
H A D | bootparam.h | 211 __u8 secure_boot; /* 0x1ec */ member
|
/openbmc/phosphor-state-manager/ |
H A D | meson.options | 83 value : '/sys/kernel/debug/aspeed/sbc/secure_boot',
|
/openbmc/linux/drivers/firmware/efi/libstub/ |
H A D | x86-stub.c | 965 if (boot_params->secure_boot == efi_secureboot_mode_unset) in efi_stub_entry() 966 boot_params->secure_boot = efi_get_secureboot(); in efi_stub_entry()
|
/openbmc/linux/arch/powerpc/kernel/ |
H A D | Makefile | 178 obj-$(CONFIG_PPC_SECURE_BOOT) += secure_boot.o ima_arch.o secvar-ops.o
|
/openbmc/linux/Documentation/admin-guide/ |
H A D | kernel-parameters.txt | 2007 Format: "tcb | appraise_tcb | secure_boot | 2018 The "secure_boot" policy appraises the integrity
|
/openbmc/linux/ |
H A D | opengrok0.0.log | [all...] |