Home
last modified time | relevance | path

Searched refs:firewall (Results 1 – 25 of 26) sorted by relevance

12

/linux/drivers/bus/
H A Dstm32_firewall.c31 int stm32_firewall_get_firewall(struct device_node *np, struct stm32_firewall *firewall, in stm32_firewall_get_firewall() argument
39 if (!firewall || !nb_firewall) in stm32_firewall_get_firewall()
70 firewall[j].firewall_ctrl = ctrl; in stm32_firewall_get_firewall()
77 firewall[j].firewall_ctrl = NULL; in stm32_firewall_get_firewall()
85 firewall[j].entry = fw_entry; in stm32_firewall_get_firewall()
93 firewall[j].extra_args_size = 0; in stm32_firewall_get_firewall()
94 firewall[j].firewall_id = U32_MAX; in stm32_firewall_get_firewall()
100 firewall[j].firewall_id = provider_args.args[0]; in stm32_firewall_get_firewall()
104 firewall[j].extra_args[i] = provider_args.args[i + 1]; in stm32_firewall_get_firewall()
107 firewall[j].extra_args_size = provider_args.args_count - 1; in stm32_firewall_get_firewall()
[all …]
H A DKconfig171 Say y to enable STM32 firewall framework and its services. Firewall
173 hardware resources linked to a firewall controller can be requested
/linux/include/linux/bus/
H A Dstm32_firewall_device.h55 int stm32_firewall_get_firewall(struct device_node *np, struct stm32_firewall *firewall,
67 int stm32_firewall_grant_access(struct stm32_firewall *firewall);
76 void stm32_firewall_release_access(struct stm32_firewall *firewall);
96 int stm32_firewall_grant_access_by_id(struct stm32_firewall *firewall, u32 subsystem_id);
113 void stm32_firewall_release_access_by_id(struct stm32_firewall *firewall, u32 subsystem_id);
117 int stm32_firewall_get_firewall(struct device_node *np, struct stm32_firewall *firewall, in stm32_firewall_get_firewall() argument
123 int stm32_firewall_grant_access(struct stm32_firewall *firewall) in stm32_firewall_grant_access() argument
128 void stm32_firewall_release_access(struct stm32_firewall *firewall) in stm32_firewall_release_access() argument
132 int stm32_firewall_grant_access_by_id(struct stm32_firewall *firewall, u32 subsystem_id) in stm32_firewall_grant_access_by_id() argument
137 void stm32_firewall_release_access_by_id(struct stm32_firewall *firewall, u32 subsystem_id) in stm32_firewall_release_access_by_id() argument
/linux/drivers/gpu/drm/tegra/
H A DMakefile8 firewall.o \
/linux/net/bridge/
H A DKconfig26 turn your bridge into a bridging IP firewall.
28 take this into account when setting up your firewall rules.
/linux/drivers/gpu/host1x/
H A DKconfig23 bool "Enable HOST1X security firewall"
/linux/Documentation/networking/device_drivers/cable/
H A Dsb1000.rst97 8. Be sure to modify /etc/ppp/firewall to use ipchains instead of
103 You may also wish to modify the firewall script to implement a different
173 5. The firewall script isn't working (with 2.2.x and higher kernels).
177 /etc/ppp/firewall script from the deprecated ipfwadm commands to ipchains.
179 6. I'm getting *tons* of firewall deny messages in the /var/kern.log,
/linux/net/
H A DKconfig166 a firewall protecting a local network from the Internet. The type of
167 firewall provided by this kernel support is called a "packet
169 based on type, source, destination etc. The other kind of firewall,
186 firewall box itself. It works both ways: if the outside host
200 Yet another use of Netfilter is building a bridging firewall. Using
234 ARP resp. IP traffic. If you want a bridging firewall, you probably
/linux/Documentation/networking/
H A Dmptcp-sysctl.rst39 when a MPTCP firewall blackhole issue happens. This time period will
H A Dipvs-sysctl.rst60 also handled by stateful firewall rules. That is, iptables rules
H A Dip-sysctl.rst875 when a TFO firewall blackhole issue happens.
/linux/arch/arm/boot/dts/intel/ixp/
H A Dintel-ixp42x-usrobotics-usr8200.dts3 * Device Tree file for the USRobotics USR8200 firewall
/linux/Documentation/networking/device_drivers/ethernet/microsoft/
H A Dnetvsc.rst77 Network state (addresses, firewall, etc) should be applied only to the
/linux/net/netfilter/
H A DKconfig271 firewall.
304 same port. This make them hard to firewall properly because connection
324 same port. This make them hard to firewall properly because connection
340 If you are running PPTP sessions over a stateful firewall or NAT
360 firewall.
372 tracking/NATing firewall.
1134 firewall/router, but machines behind it can never exchange large
1140 Workaround: activate this option and add a rule to your firewall
/linux/arch/arm/boot/dts/ti/omap/
H A Domap3-n900.dts15 * Default secure signed bootloader (Nokia X-Loader) does not enable L3 firewall
20 * There is "unofficial" version of bootloader which enables AES in L3 firewall
22 * There is also no runtime detection code if AES is disabled in L3 firewall...
/linux/drivers/net/ethernet/dec/tulip/
H A DKconfig87 deployed on potentially unfriendly networks (e.g. in a firewall),
/linux/tools/usb/usbip/
H A DREADME250 - Shutdown firewall.
/linux/drivers/clk/stm32/
H A Dclk-stm32mp25.c1566 static struct stm32_firewall firewall; variable
1614 ret = stm32_firewall_grant_access_by_id(&firewall, index & ~SEC_RIFSC_FLAG); in stm32mp25_check_security()
1981 ret = stm32_firewall_get_firewall(dev->of_node, &firewall, 1); in stm32mp25_rcc_clocks_probe()
/linux/arch/um/drivers/
H A DKconfig318 that of a host behind a firewall that masquerades all network
/linux/Documentation/process/
H A Dchanges.rst381 services be protected from the internet-at-large by a firewall where
/linux/Documentation/
H A DChanges381 services be protected from the internet-at-large by a firewall where
/linux/Documentation/filesystems/
H A Dseq_file.rst87 A seq_file implementation that is formatting firewall rules from a
/linux/net/sched/
H A DKconfig487 according to netfilter/firewall marks.
/linux/Documentation/admin-guide/LSM/
H A Dipe.rst66 is clearly defined and not supposed to be changed (e.g. network firewall
/linux/Documentation/admin-guide/
H A Ddevices.txt1056 59 char sf firewall package
1057 0 = /dev/firewall Communication with sf kernel module

12