| /OK3568_Linux_fs/kernel/drivers/gpu/drm/vc4/ |
| H A D | vc4_validate.c | 53 void *untrusted 135 validate_bin_pos(struct vc4_exec_info *exec, void *untrusted, uint32_t pos) in validate_bin_pos() argument 140 return (untrusted - 1 == exec->bin_u + pos); in validate_bin_pos() 216 if (!validate_bin_pos(exec, untrusted, exec->args->bin_cl_size - 1)) { in validate_flush() 245 if (!validate_bin_pos(exec, untrusted, exec->args->bin_cl_size - 2)) { in validate_increment_semaphore() 259 uint32_t length = *(uint32_t *)(untrusted + 1); in validate_indexed_prim_list() 260 uint32_t offset = *(uint32_t *)(untrusted + 5); in validate_indexed_prim_list() 261 uint32_t max_index = *(uint32_t *)(untrusted + 9); in validate_indexed_prim_list() 262 uint32_t index_size = (*(uint8_t *)(untrusted + 0) >> 4) ? 2 : 1; in validate_indexed_prim_list() 297 uint32_t length = *(uint32_t *)(untrusted + 1); in validate_gl_array_primitive() [all …]
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/host/xtest/ |
| H A D | regression_8100.c | 182 STACK_OF(X509) *untrusted, X509 *crt) in check() 207 untrusted))) in check() 232 STACK_OF(X509) *untrusted = NULL; in verify_cert() 238 untrusted = sk_X509_new_null(); in verify_cert() 239 if (!ADBG_EXPECT_NOT_NULL(c, untrusted)) in verify_cert() 244 if (!ADBG_EXPECT_TRUE(c, push_cert(c, mid, untrusted))) in verify_cert() 249 ret = ADBG_EXPECT_TRUE(c, check(c, trusted, untrusted, crt)); in verify_cert() 254 sk_X509_pop_free(untrusted, X509_free); in verify_cert()
|
| /OK3568_Linux_fs/buildroot/boot/grub2/ |
| H A D | 0146-kern-misc-Add-function-to-check-printf-format-agains.patch | 7 The grub_printf_fmt_check() function parses the arguments of an untrusted 9 arguments counts and arguments types. The arguments count in the untrusted 41 function parse user provided untrusted format string too. So, in 66 + * string or they are used to compare a format string from an untrusted source
|
| /OK3568_Linux_fs/buildroot/package/python-itsdangerous/ |
| H A D | Config.in | 7 untrusted environments and to get it back safe and sound.
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-python/recipes-devtools/python/ |
| H A D | python3-itsdangerous_2.1.2.bb | 1 SUMMARY = "Various helpers to pass trusted data to untrusted environments and back."
|
| /OK3568_Linux_fs/buildroot/package/dillo/ |
| H A D | 0003-Support-OpenSSL-1.1.0.patch | 21 /*Either self signed and untrusted*/
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/hw-vuln/ |
| H A D | l1tf.rst | 258 which run untrusted guests, reduces the attack vector space. 260 Whether the interrupts with are affine to CPUs, which run untrusted 472 3. Virtualization with untrusted guests 521 affinity to the CPUs which run the untrusted guests can depending on 590 SMT systems vulnerable when running untrusted guests with EPT enabled. 597 - If regular users run untrusted guests on their machine, then L1TF is 598 just an add on to other malware which might be embedded in an untrusted 601 There is no technical way to prevent a user from running untrusted code
|
| H A D | mds.rst | 281 execute untrusted code which is supplied externally, then the mitigation 290 3. Virtualization with untrusted guests 309 SMT systems vulnerable when running untrusted code. The same rationale as
|
| H A D | multihit.rst | 163 3. Virtualization with untrusted guests 165 If the guest comes from an untrusted source, the guest host kernel will need
|
| H A D | tsx_async_abort.rst | 254 untrusted code which is supplied externally, then the mitigation can be 261 If there are untrusted applications or guests on the system, enabling TSX
|
| H A D | spectre.rst | 319 If SMT is used, Spectre variant 2 attacks from an untrusted guest 551 in use, an untrusted guest running in the sibling thread can have 683 execute externally supplied untrusted code, then the mitigations can 694 3. Sandbox untrusted programs 700 This prevents untrusted programs from polluting the branch target
|
| H A D | processor_mmio_stale_data.rst | 10 provided to untrusted guests may need mitigation. These vulnerabilities are 145 is more critical, or the untrusted software has no MMIO access). Note that
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/host_include/openssl/ |
| H A D | x509_vfy.h | 220 STACK_OF(X509) *untrusted; /* chain of X509s - untrusted - passed in */ 444 X509_STORE *ctx, STACK_OF(X509) *untrusted);
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/include/openssl/ |
| H A D | x509_vfy.h | 220 STACK_OF(X509) *untrusted; /* chain of X509s - untrusted - passed in */ 444 X509_STORE *ctx, STACK_OF(X509) *untrusted);
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-gnome/epiphany/files/ |
| H A D | CVE-2023-26081.patch | 8 disable the password manager entirely so the untrusted web content
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/openssl/ |
| H A D | x509_vfy.h | 209 STACK_OF(X509) *untrusted; // chain of X509s - untrusted - passed in 439 X509_STORE *ctx, STACK_OF(X509) *untrusted);
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/openssl/ |
| H A D | x509_vfy.h | 209 STACK_OF(X509) *untrusted; // chain of X509s - untrusted - passed in 439 X509_STORE *ctx, STACK_OF(X509) *untrusted);
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/openssl/ |
| H A D | x509_vfy.h | 209 STACK_OF(X509) *untrusted; // chain of X509s - untrusted - passed in 439 X509_STORE *ctx, STACK_OF(X509) *untrusted);
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/openssl/ |
| H A D | x509_vfy.h | 209 STACK_OF(X509) *untrusted; // chain of X509s - untrusted - passed in 439 X509_STORE *ctx, STACK_OF(X509) *untrusted);
|
| /OK3568_Linux_fs/kernel/drivers/pci/ |
| H A D | ats.c | 45 return (dev->untrusted == 0); in pci_ats_supported()
|
| /OK3568_Linux_fs/kernel/Documentation/x86/ |
| H A D | mds.rst | 65 There is one exception, which is untrusted BPF. The functionality of 66 untrusted BPF is limited, but it needs to be thoroughly investigated
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-support/strongswan/files/ |
| H A D | CVE-2022-40617.patch | 13 This avoids querying URLs of potentially untrusted certificates, e.g. if
|
| /OK3568_Linux_fs/kernel/certs/ |
| H A D | Kconfig | 73 Keys in the keyring are considered entirely untrusted. Keys in this
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/aoe/ |
| H A D | aoe.rst | 53 untrusted networks should be ignored as a matter of security. See
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/host/openssl/include/openssl/ |
| H A D | x509_vfy.h | 244 STACK_OF(X509) *untrusted;
|