| /linux/drivers/bus/ |
| H A D | stm32_firewall.c | 31 int stm32_firewall_get_firewall(struct device_node *np, struct stm32_firewall *firewall, in stm32_firewall_get_firewall() argument 39 if (!firewall || !nb_firewall) in stm32_firewall_get_firewall() 70 firewall[j].firewall_ctrl = ctrl; in stm32_firewall_get_firewall() 77 firewall[j].firewall_ctrl = NULL; in stm32_firewall_get_firewall() 85 firewall[j].entry = fw_entry; in stm32_firewall_get_firewall() 93 firewall[j].extra_args_size = 0; in stm32_firewall_get_firewall() 94 firewall[j].firewall_id = U32_MAX; in stm32_firewall_get_firewall() 100 firewall[j].firewall_id = provider_args.args[0]; in stm32_firewall_get_firewall() 104 firewall[j].extra_args[i] = provider_args.args[i + 1]; in stm32_firewall_get_firewall() 107 firewall[j].extra_args_size = provider_args.args_count - 1; in stm32_firewall_get_firewall() [all …]
|
| H A D | Kconfig | 177 Say y to enable STM32 firewall framework and its services. Firewall 179 hardware resources linked to a firewall controller can be requested
|
| /linux/include/linux/bus/ |
| H A D | stm32_firewall_device.h | 55 int stm32_firewall_get_firewall(struct device_node *np, struct stm32_firewall *firewall, 67 int stm32_firewall_grant_access(struct stm32_firewall *firewall); 76 void stm32_firewall_release_access(struct stm32_firewall *firewall); 96 int stm32_firewall_grant_access_by_id(struct stm32_firewall *firewall, u32 subsystem_id); 113 void stm32_firewall_release_access_by_id(struct stm32_firewall *firewall, u32 subsystem_id); 118 struct stm32_firewall *firewall, in stm32_firewall_get_firewall() argument 124 static inline int stm32_firewall_grant_access(struct stm32_firewall *firewall) in stm32_firewall_grant_access() argument 129 static inline void stm32_firewall_release_access(struct stm32_firewall *firewall) in stm32_firewall_release_access() argument 133 static inline int stm32_firewall_grant_access_by_id(struct stm32_firewall *firewall, in stm32_firewall_grant_access_by_id() argument 139 static inline void stm32_firewall_release_access_by_id(struct stm32_firewall *firewall, in stm32_firewall_release_access_by_id() argument
|
| /linux/drivers/memory/ |
| H A D | stm32_omm.c | 287 struct stm32_firewall firewall; in stm32_omm_check_access() local 290 ret = stm32_firewall_get_firewall(np, &firewall, 1); in stm32_omm_check_access() 294 return stm32_firewall_grant_access(&firewall); in stm32_omm_check_access()
|
| /linux/net/bridge/ |
| H A D | Kconfig | 26 turn your bridge into a bridging IP firewall. 28 take this into account when setting up your firewall rules.
|
| /linux/drivers/gpu/drm/tegra/ |
| H A D | Makefile | 8 firewall.o \
|
| /linux/drivers/gpu/host1x/ |
| H A D | Kconfig | 23 bool "Enable HOST1X security firewall"
|
| /linux/net/ |
| H A D | Kconfig | 172 a firewall protecting a local network from the Internet. The type of 173 firewall provided by this kernel support is called a "packet 175 based on type, source, destination etc. The other kind of firewall, 192 firewall box itself. It works both ways: if the outside host 206 Yet another use of Netfilter is building a bridging firewall. Using 240 ARP resp. IP traffic. If you want a bridging firewall, you probably
|
| /linux/arch/arm/boot/dts/intel/ixp/ |
| H A D | intel-ixp42x-usrobotics-usr8200.dts | 3 * Device Tree file for the USRobotics USR8200 firewall
|
| /linux/net/netfilter/ |
| H A D | Kconfig | 261 firewall. 294 same port. This make them hard to firewall properly because connection 314 same port. This make them hard to firewall properly because connection 330 If you are running PPTP sessions over a stateful firewall or NAT 350 firewall. 362 tracking/NATing firewall. 1140 firewall/router, but machines behind it can never exchange large 1146 Workaround: activate this option and add a rule to your firewall
|
| /linux/Documentation/networking/ |
| H A D | mptcp-sysctl.rst | 47 when a MPTCP firewall blackhole issue happens. This time period will
|
| H A D | ipvs-sysctl.rst | 60 also handled by stateful firewall rules. That is, iptables rules
|
| H A D | ip-sysctl.rst | 1033 when a TFO firewall blackhole issue happens.
|
| /linux/Documentation/networking/device_drivers/ethernet/microsoft/ |
| H A D | netvsc.rst | 77 Network state (addresses, firewall, etc) should be applied only to the
|
| /linux/arch/arm/boot/dts/ti/omap/ |
| H A D | omap3-n900.dts | 15 * Default secure signed bootloader (Nokia X-Loader) does not enable L3 firewall 20 * There is "unofficial" version of bootloader which enables AES in L3 firewall 22 * There is also no runtime detection code if AES is disabled in L3 firewall...
|
| /linux/drivers/net/ethernet/dec/tulip/ |
| H A D | Kconfig | 87 deployed on potentially unfriendly networks (e.g. in a firewall),
|
| /linux/drivers/clk/stm32/ |
| H A D | clk-stm32mp21.c | 1268 struct stm32_firewall firewall; in stm32mp21_check_security() local 1272 ret = stm32_firewall_get_firewall(np, &firewall, 1); in stm32mp21_check_security() 1275 ret = stm32_firewall_grant_access_by_id(&firewall, index & ~SEC_RIFSC_FLAG); in stm32mp21_check_security()
|
| H A D | clk-stm32mp25.c | 1566 static struct stm32_firewall firewall; variable 1614 ret = stm32_firewall_grant_access_by_id(&firewall, index & ~SEC_RIFSC_FLAG); in stm32mp25_check_security() 1981 ret = stm32_firewall_get_firewall(dev->of_node, &firewall, 1); in stm32mp25_rcc_clocks_probe()
|
| /linux/tools/usb/usbip/ |
| H A D | README | 248 - Shutdown firewall.
|
| /linux/Documentation/ |
| H A D | Changes | 378 services be protected from the internet-at-large by a firewall where
|
| /linux/Documentation/translations/it_IT/process/ |
| H A D | changes.rst | 373 via internet mediante un firewall.
|
| /linux/Documentation/filesystems/ |
| H A D | seq_file.rst | 87 A seq_file implementation that is formatting firewall rules from a
|
| /linux/net/sched/ |
| H A D | Kconfig | 511 according to netfilter/firewall marks.
|
| /linux/Documentation/admin-guide/LSM/ |
| H A D | ipe.rst | 66 is clearly defined and not supposed to be changed (e.g. network firewall
|
| /linux/Documentation/admin-guide/ |
| H A D | devices.txt | 1056 59 char sf firewall package 1057 0 = /dev/firewall Communication with sf kernel module
|