/tf-a-ffa_el3_spmc/docs/security_advisories/ |
A D | index.rst | 9 security-advisory-tfv-1.rst 10 security-advisory-tfv-2.rst 11 security-advisory-tfv-3.rst 12 security-advisory-tfv-4.rst 13 security-advisory-tfv-5.rst 14 security-advisory-tfv-6.rst 15 security-advisory-tfv-7.rst 16 security-advisory-tfv-8.rst
|
A D | security-advisory-tfv-7.rst | 25 This security advisory describes the current understanding of the Trusted 102 .. _Arm Processor Security Update: http://www.arm.com/security-update
|
A D | security-advisory-tfv-6.rst | 27 This security advisory describes the current understanding of the Trusted 140 .. _Arm Processor Security Update: http://www.arm.com/security-update
|
/tf-a-ffa_el3_spmc/docs/process/ |
A D | index.rst | 9 security 16 security-hardening
|
A D | security.rst | 7 We disclose all security vulnerabilities we find, or are advised about, that are 13 issues in the project's `issue tracker`_ with the ``security-advisory`` tag. You 21 community of developers and security researchers. 24 If you think you have found a security vulnerability, please **do not** 26 follow the `TrustedFirmware.org security incident process`_. 40 with the source code and in any published security advisory. 85 .. _TrustedFirmware.org security incident process: https://developer.trustedfirmware.org/w/collabor…
|
A D | security-hardening.rst | 4 This page contains guidance on what to check for additional security measures, 5 including build options that can be modified to improve security or catch issues 11 Part of the security of a platform is handling errors correctly, as described in 12 the previous section. There are several other security considerations covered in 124 Several build options can be used to check for security issues. Refer to the
|
/tf-a-ffa_el3_spmc/plat/layerscape/common/ |
A D | ls_tzc380.c | 19 unsigned int security, unsigned int subreg_disable_mask) in tzc380_set_region() argument 29 mmio_write_32((uintptr_t)reg, ((security & 0xF) << 28)); in tzc380_set_region() 39 attr_value = ((security & 0xF) << 28) | in tzc380_set_region()
|
/tf-a-ffa_el3_spmc/include/common/ |
A D | ep_info.h | 30 #define SET_SECURITY_STATE(x, security) \ argument 31 ((x) = ((x) & ~EP_SECURITY_MASK) | (security))
|
/tf-a-ffa_el3_spmc/plat/nvidia/tegra/soc/t186/drivers/se/ |
A D | se.c | 244 uint32_t val = 0U, hash_offset = 0U, scratch_offset = 0U, security; in tegra_se_save_sha256_hash() local 250 security = tegra_se_read_32(SE0_SECURITY); in tegra_se_save_sha256_hash() 251 tegra_se_write_32(SE0_SECURITY, security | SE0_SECURITY_SE_SOFT_SETTING); in tegra_se_save_sha256_hash() 262 tegra_se_write_32(SE0_SECURITY, security); in tegra_se_save_sha256_hash()
|
/tf-a-ffa_el3_spmc/plat/nvidia/tegra/soc/t194/drivers/se/ |
A D | se.c | 414 uint32_t security; in tegra_se_calculate_save_sha256() local 420 security = tegra_se_read_32(SE0_SECURITY); in tegra_se_calculate_save_sha256() 421 tegra_se_write_32(SE0_SECURITY, security | SE0_SECURITY_SE_SOFT_SETTING); in tegra_se_calculate_save_sha256() 438 tegra_se_write_32(SE0_SECURITY, security); in tegra_se_calculate_save_sha256()
|
/tf-a-ffa_el3_spmc/docs/design/ |
A D | interrupt-framework-design.rst | 36 Secure-EL1 depending upon the security state of the current execution 76 either security state. 183 This applies when execution is in either security state. 250 security state. 264 security state. EL3 interrupts are not considered. 334 for the security state specified in the ``flags`` parameter. 525 is used to generate non-secure interrupts in either security state. 676 structure for the target security state. 681 ``cpu_context_t`` data structure for the target security state. 706 could use the security state flag to check this. [all …]
|
A D | trusted-board-boot-build.rst | 15 known security vulnerabilities. See `mbed TLS Security Center`_ for more 115 .. _mbed TLS Security Center: https://tls.mbed.org/security
|
/tf-a-ffa_el3_spmc/docs/components/spd/ |
A D | trusty-dispatcher.rst | 9 https://source.android.com/security/trusty
|
/tf-a-ffa_el3_spmc/docs/plat/marvell/armada/misc/ |
A D | mvebu-iob.rst | 10 the enabled windows. If there is a hit and it passes the security checks, it is
|
/tf-a-ffa_el3_spmc/docs/threat_model/ |
A D | threat_model.rst | 193 | | security implications | | 325 | | when the security check is produced before the time | 400 | | conditional branches that are security sensitive, | 540 | | multiple points where memory corruption security | 542 | | security issue since it could allow an attacker | 586 | | sanitized before being used. These security checks | 644 | | security boundaries. An attacker might attempt to | 685 | | execute code if the proper security mechanisms | 773 .. _STRIDE threat analysis technique: https://docs.microsoft.com/en-us/azure/security/develop/threa… 775 .. _Cache Speculation Side-channels: https://developer.arm.com/support/arm-security-updates/specula… [all …]
|
/tf-a-ffa_el3_spmc/docs/about/ |
A D | features.rst | 64 security services. 120 - Ongoing security hardening, optimization and quality improvements. 125 .. _Trusty Secure OS: https://source.android.com/security/trusty
|
A D | contact.rst | 8 If you think you have found a security vulnerability, please report this using
|
/tf-a-ffa_el3_spmc/docs/perf/ |
A D | performance-monitoring-unit.rst | 8 implementation and to complement the PMU security guidelines given in the 122 security state unless it is enabled here.
|
/tf-a-ffa_el3_spmc/docs/ |
A D | index.rst | 42 Users are encouraged to do their own security validation, including penetration 63 and process, how security disclosures are handled, and the guidelines for
|
A D | glossary.rst | 37 describe a publicly-known security vulnerability.
|
/tf-a-ffa_el3_spmc/include/drivers/brcm/emmc/ |
A D | emmc_csl_sdcmd.h | 129 uint8_t security; /* security support 0, 2:1.01 3:2.0 */ member
|
/tf-a-ffa_el3_spmc/docs/plat/ |
A D | imx8m.rst | 6 reliability and embedded security needed to drive the growth of fast-growing
|
A D | stm32mp1.rst | 19 Each line comes with a security option (cryptography & secure boot) and a Cortex-A frequency option:
|
/tf-a-ffa_el3_spmc/ |
A D | readme.rst | 25 Users are encouraged to do their own security validation, including penetration
|
/tf-a-ffa_el3_spmc/plat/nvidia/tegra/scat/ |
A D | bl31.scat | 74 * security. GOT is a table of addresses so ensure 8-byte alignment.
|