Searched refs:secure_boot (Results 1 – 18 of 18) sorted by relevance
73 BOOT_PARAM_PRESERVE(secure_boot), in sanitize_boot_params()
80 u8 secure_boot; member113 __u8 secure_boot; member
516 str_enabled_disabled(version->secure_boot)); in btintel_version_info_tlv()616 version->secure_boot = tlv->val[0]; in btintel_parse_version_tlv()937 str_enabled_disabled(params->secure_boot)); in btintel_read_boot_params()
141 __u8 secure_boot; /* 0x1ec */ member
87 OFFSET(BP_secure_boot, boot_params, secure_boot); in common()
193 params->secure_boot = boot_params.secure_boot; in setup_efi_state()
1131 switch (boot_params.secure_boot) { in setup_arch()
146 boot_params->secure_boot = xen_efi_get_secureboot(); in xen_efi_init()
41 1EC/001 ALL secure_boot Secure boot is enabled in the firmware
496 sec->secure_boot = true; in rtw89_efuse_read_fw_secure_ax()501 sec->secure_boot, sec->can_mss_v0, sec->can_mss_v1, in rtw89_efuse_read_fw_secure_ax()
505 sec->secure_boot = true; in rtw89_efuse_read_fw_secure_be()510 sec->secure_boot, sec->mss_dev_type, sec->mss_cust_idx, in rtw89_efuse_read_fw_secure_be()
201 if (sec->secure_boot && chip->chip_id == RTL8852B) in rtw89_fw_hdr_parser_v0()324 if (!sec->secure_boot) in __parse_formatted_mssc()368 if (!sec->secure_boot) in __check_secure_blacklist()416 if (sec->secure_boot) { in __parse_security_section()
4091 if (rtwdev->chip->chip_gen != RTW89_CHIP_AX || sec->secure_boot) in rtw89_mac_dmac_tbl_init()4105 if (rtwdev->chip->chip_gen != RTW89_CHIP_AX || sec->secure_boot) in rtw89_mac_cmac_tbl_init()6808 if (!sec->secure_boot) in rtw89_fwdl_secure_idmem_share_mode_ax()
4564 bool secure_boot: 1; member
904 if (boot_params->secure_boot == efi_secureboot_mode_unset) in efi_stub_entry()905 boot_params->secure_boot = efi_get_secureboot(); in efi_stub_entry()
173 obj-$(CONFIG_PPC_SECURE_BOOT) += secure_boot.o ima_arch.o secvar-ops.o
926 return boot_params.secure_boot; in __x86_ima_efi_boot_mode()
2149 Format: "tcb | appraise_tcb | secure_boot |2160 The "secure_boot" policy appraises the integrity