Home
last modified time | relevance | path

Searched refs:firewall (Results 1 – 25 of 26) sorted by relevance

12

/linux/drivers/bus/
H A Dstm32_firewall.c31 int stm32_firewall_get_firewall(struct device_node *np, struct stm32_firewall *firewall, in stm32_firewall_get_firewall() argument
39 if (!firewall || !nb_firewall) in stm32_firewall_get_firewall()
70 firewall[j].firewall_ctrl = ctrl; in stm32_firewall_get_firewall()
77 firewall[j].firewall_ctrl = NULL; in stm32_firewall_get_firewall()
85 firewall[j].entry = fw_entry; in stm32_firewall_get_firewall()
93 firewall[j].extra_args_size = 0; in stm32_firewall_get_firewall()
94 firewall[j].firewall_id = U32_MAX; in stm32_firewall_get_firewall()
100 firewall[j].firewall_id = provider_args.args[0]; in stm32_firewall_get_firewall()
104 firewall[j].extra_args[i] = provider_args.args[i + 1]; in stm32_firewall_get_firewall()
107 firewall[j].extra_args_size = provider_args.args_count - 1; in stm32_firewall_get_firewall()
[all …]
H A DKconfig177 Say y to enable STM32 firewall framework and its services. Firewall
179 hardware resources linked to a firewall controller can be requested
/linux/include/linux/bus/
H A Dstm32_firewall_device.h55 int stm32_firewall_get_firewall(struct device_node *np, struct stm32_firewall *firewall,
67 int stm32_firewall_grant_access(struct stm32_firewall *firewall);
76 void stm32_firewall_release_access(struct stm32_firewall *firewall);
96 int stm32_firewall_grant_access_by_id(struct stm32_firewall *firewall, u32 subsystem_id);
113 void stm32_firewall_release_access_by_id(struct stm32_firewall *firewall, u32 subsystem_id);
118 struct stm32_firewall *firewall, in stm32_firewall_get_firewall() argument
124 static inline int stm32_firewall_grant_access(struct stm32_firewall *firewall) in stm32_firewall_grant_access() argument
129 static inline void stm32_firewall_release_access(struct stm32_firewall *firewall) in stm32_firewall_release_access() argument
133 static inline int stm32_firewall_grant_access_by_id(struct stm32_firewall *firewall, in stm32_firewall_grant_access_by_id() argument
139 static inline void stm32_firewall_release_access_by_id(struct stm32_firewall *firewall, in stm32_firewall_release_access_by_id() argument
/linux/drivers/memory/
H A Dstm32_omm.c287 struct stm32_firewall firewall; in stm32_omm_check_access() local
290 ret = stm32_firewall_get_firewall(np, &firewall, 1); in stm32_omm_check_access()
294 return stm32_firewall_grant_access(&firewall); in stm32_omm_check_access()
/linux/net/bridge/
H A DKconfig26 turn your bridge into a bridging IP firewall.
28 take this into account when setting up your firewall rules.
/linux/drivers/gpu/drm/tegra/
H A DMakefile8 firewall.o \
/linux/drivers/gpu/host1x/
H A DKconfig23 bool "Enable HOST1X security firewall"
/linux/net/
H A DKconfig172 a firewall protecting a local network from the Internet. The type of
173 firewall provided by this kernel support is called a "packet
175 based on type, source, destination etc. The other kind of firewall,
192 firewall box itself. It works both ways: if the outside host
206 Yet another use of Netfilter is building a bridging firewall. Using
240 ARP resp. IP traffic. If you want a bridging firewall, you probably
/linux/arch/arm/boot/dts/intel/ixp/
H A Dintel-ixp42x-usrobotics-usr8200.dts3 * Device Tree file for the USRobotics USR8200 firewall
/linux/net/netfilter/
H A DKconfig261 firewall.
294 same port. This make them hard to firewall properly because connection
314 same port. This make them hard to firewall properly because connection
330 If you are running PPTP sessions over a stateful firewall or NAT
350 firewall.
362 tracking/NATing firewall.
1140 firewall/router, but machines behind it can never exchange large
1146 Workaround: activate this option and add a rule to your firewall
/linux/Documentation/networking/
H A Dmptcp-sysctl.rst47 when a MPTCP firewall blackhole issue happens. This time period will
H A Dipvs-sysctl.rst60 also handled by stateful firewall rules. That is, iptables rules
H A Dip-sysctl.rst1033 when a TFO firewall blackhole issue happens.
/linux/Documentation/networking/device_drivers/ethernet/microsoft/
H A Dnetvsc.rst77 Network state (addresses, firewall, etc) should be applied only to the
/linux/arch/arm/boot/dts/ti/omap/
H A Domap3-n900.dts15 * Default secure signed bootloader (Nokia X-Loader) does not enable L3 firewall
20 * There is "unofficial" version of bootloader which enables AES in L3 firewall
22 * There is also no runtime detection code if AES is disabled in L3 firewall...
/linux/drivers/net/ethernet/dec/tulip/
H A DKconfig87 deployed on potentially unfriendly networks (e.g. in a firewall),
/linux/drivers/clk/stm32/
H A Dclk-stm32mp21.c1268 struct stm32_firewall firewall; in stm32mp21_check_security() local
1272 ret = stm32_firewall_get_firewall(np, &firewall, 1); in stm32mp21_check_security()
1275 ret = stm32_firewall_grant_access_by_id(&firewall, index & ~SEC_RIFSC_FLAG); in stm32mp21_check_security()
H A Dclk-stm32mp25.c1566 static struct stm32_firewall firewall; variable
1614 ret = stm32_firewall_grant_access_by_id(&firewall, index & ~SEC_RIFSC_FLAG); in stm32mp25_check_security()
1981 ret = stm32_firewall_get_firewall(dev->of_node, &firewall, 1); in stm32mp25_rcc_clocks_probe()
/linux/tools/usb/usbip/
H A DREADME248 - Shutdown firewall.
/linux/Documentation/
H A DChanges378 services be protected from the internet-at-large by a firewall where
/linux/Documentation/translations/it_IT/process/
H A Dchanges.rst373 via internet mediante un firewall.
/linux/Documentation/filesystems/
H A Dseq_file.rst87 A seq_file implementation that is formatting firewall rules from a
/linux/net/sched/
H A DKconfig511 according to netfilter/firewall marks.
/linux/Documentation/admin-guide/LSM/
H A Dipe.rst66 is clearly defined and not supposed to be changed (e.g. network firewall
/linux/Documentation/admin-guide/
H A Ddevices.txt1056 59 char sf firewall package
1057 0 = /dev/firewall Communication with sf kernel module

12