| /linux/include/linux/bus/ | 
| H A D | stm32_firewall_device.h | 19  * struct stm32_firewall - Information on a device's firewall. Each device can have more than one20  *			   firewall.
 22  * @firewall_ctrl:		Pointer referencing a firewall controller of the device. It is
 26  * @entry:			Name of the firewall entry
 28  * @firewall_id:		Firewall ID associated the device for this firewall controller
 40  * stm32_firewall_get_firewall - Get the firewall(s) associated to given device.
 41  *				 The firewall controller reference is always the first argument
 43  *				 The firewall ID is always the second argument of each of the
 45  *				 If there's no argument linked to the phandle, then the firewall ID
 49  * @firewall:			Array of firewall references
 [all …]
 
 | 
| /linux/drivers/bus/ | 
| H A D | stm32_firewall.c | 23 /* Corresponds to STM32_FIREWALL_MAX_EXTRA_ARGS + firewall ID */29 /* Firewall device API */
 31 int stm32_firewall_get_firewall(struct device_node *np, struct stm32_firewall *firewall,  in stm32_firewall_get_firewall()  argument
 39 	if (!firewall || !nb_firewall)  in stm32_firewall_get_firewall()
 57 			pr_err("Too many firewall controllers");  in stm32_firewall_get_firewall()
 65 		/* Check if the parsed phandle corresponds to a registered firewall controller */  in stm32_firewall_get_firewall()
 70 				firewall[j].firewall_ctrl = ctrl;  in stm32_firewall_get_firewall()
 77 			firewall[j].firewall_ctrl = NULL;  in stm32_firewall_get_firewall()
 78 			pr_err("No firewall controller registered for %s\n", np->full_name);  in stm32_firewall_get_firewall()
 85 			firewall[j].entry = fw_entry;  in stm32_firewall_get_firewall()
 [all …]
 
 | 
| H A D | stm32_firewall.h | 16  * STM32_PERIPHERAL_FIREWALL:		This type of firewall protects peripherals17  * STM32_MEMORY_FIREWALL:		This type of firewall protects memories/subsets of memory
 19  * STM32_NOTYPE_FIREWALL:		Undefined firewall type
 27  * struct stm32_firewall_controller - Information on firewall controller supplying services
 29  * @name:			Name of the firewall controller
 30  * @dev:			Device reference of the firewall controller
 31  * @mmio:			Base address of the firewall controller
 32  * @entry:			List entry of the firewall controller list
 33  * @type:			Type of firewall
 34  * @max_entries:		Number of entries covered by the firewall
 [all …]
 
 | 
| H A D | Kconfig | 173 	bool "STM32 Firewall framework"177 	  Say y to enable STM32 firewall framework and its services. Firewall
 179 	  hardware resources linked to a firewall controller can be requested
 
 | 
| H A D | stm32_etzpc.c | 108 		dev_err(etzpc_controller->dev, "Couldn't register as a firewall controller: %d",  in stm32_etzpc_probe()
 | 
| /linux/include/uapi/linux/netfilter_arp/ | 
| H A D | arp_tables.h | 3  * 	Format of an ARP firewall descriptor93 /* This structure defines each of the firewall rules.  Consists of 3
 116  * New IP firewall options for [gs]etsockopt at the RAW IP level.
 206  *	Main firewall chains definitions and global var's definitions.
 
 | 
| /linux/net/ | 
| H A D | Kconfig | 172 	  a firewall protecting a local network from the Internet. The type of173 	  firewall provided by this kernel support is called a "packet
 175 	  based on type, source, destination etc. The other kind of firewall,
 192 	  firewall box itself. It works both ways: if the outside host
 206 	  Yet another use of Netfilter is building a bridging firewall. Using
 240 	  ARP resp. IP traffic. If you want a bridging firewall, you probably
 
 | 
| /linux/include/uapi/linux/netfilter_ipv4/ | 
| H A D | ip_tables.h | 9  * 	Format of an IP firewall descriptor103 /* This structure defines each of the firewall rules.  Consists of 3
 128  * New IP firewall options for [gs]etsockopt at the RAW IP level.
 229  *	Main firewall chains definitions and global var's definitions.
 
 | 
| /linux/include/uapi/linux/netfilter_ipv6/ | 
| H A D | ip6_tables.h | 9  * 	Format of an IP6 firewall descriptor107 /* This structure defines each of the firewall rules.  Consists of 3
 165  * New IP firewall options for [gs]etsockopt at the RAW IP level.
 269  *	Main firewall chains definitions and global var's definitions.
 
 | 
| /linux/net/bridge/ | 
| H A D | Kconfig | 26 	  turn your bridge into a bridging IP firewall.28 	  take this into account when setting up your firewall rules.
 
 | 
| /linux/drivers/soc/tegra/cbb/ | 
| H A D | tegra234-cbb.c | 77 /* Write firewall check enable */193 		dev_info(&pdev->dev, "SoC data missing for firewall\n");  in tegra234_cbb_write_access_allowed()
 199 		dev_err(&pdev->dev, "wrong firewall offset value\n");  in tegra234_cbb_write_access_allowed()
 205 	 * If the firewall check feature for allowing or blocking the  in tegra234_cbb_write_access_allowed()
 206 	 * write accesses through the firewall of a fabric is disabled  in tegra234_cbb_write_access_allowed()
 213 	 * If the firewall check is enabled then check whether CCPLEX  in tegra234_cbb_write_access_allowed()
 768 		.desc = "Attempt to access a region which is firewall protected"
 1000  *   level firewall(SCR), address hole within the target, etc
 1567 	 * is blocked by CBB firewall.  in tegra234_cbb_probe()
 1570 		dev_info(&pdev->dev, "error reporting not enabled due to firewall\n");  in tegra234_cbb_probe()
 
 | 
| /linux/arch/arm/mach-omap2/ | 
| H A D | l3_2xxx.h | 3  * arch/arm/plat-omap/include/plat/l3_2xxx.h - L3 firewall definitions
 | 
| H A D | l3_3xxx.h | 3  * arch/arm/plat-omap/include/plat/l3_3xxx.h - L3 firewall definitions
 | 
| H A D | l4_2xxx.h | 3  * arch/arm/plat-omap/include/plat/l4_2xxx.h - L4 firewall definitions
 | 
| H A D | l4_3xxx.h | 3  * arch/arm/plat-omap/include/mach/l4_3xxx.h - L4 firewall definitions
 | 
| /linux/drivers/gpu/host1x/ | 
| H A D | Kconfig | 23 	bool "Enable HOST1X security firewall"
 | 
| /linux/net/netfilter/ | 
| H A D | Kconfig | 261 	  firewall.294 	  same port. This make them hard to firewall properly because connection
 314 	  same port. This make them hard to firewall properly because connection
 330 	  If you are running PPTP sessions over a stateful firewall or NAT
 350 	  firewall.
 362 	  tracking/NATing firewall.
 1140 	  firewall/router, but machines behind it can never exchange large
 1146 	  Workaround: activate this option and add a rule to your firewall
 
 | 
| /linux/drivers/gpu/drm/tegra/ | 
| H A D | Makefile | 8 	firewall.o \
 | 
| /linux/include/linux/netfilter_ipv6/ | 
| H A D | ip6_tables.h | 9  * 	Format of an IP6 firewall descriptor
 | 
| /linux/include/linux/netfilter_arp/ | 
| H A D | arp_tables.h | 3  * 	Format of an ARP firewall descriptor
 | 
| /linux/Documentation/devicetree/bindings/bus/ | 
| H A D | st,stm32-etzpc.yaml | 44       Contains the firewall ID associated to the peripheral.
 | 
| H A D | st,stm32mp25-rifsc.yaml | 60       Contains the firewall ID associated to the peripheral.
 | 
| /linux/include/linux/netfilter_ipv4/ | 
| H A D | ip_tables.h | 9  * 	Format of an IP firewall descriptor
 | 
| /linux/net/ipv4/ | 
| H A D | ipip.c | 13  *		Alan Cox	:	More fixes for 1.3.21, and firewall fix. Maybe this will work soon 8).14  *		Kai Schulte	:	Fixed #defines for IP_FIREWALL->FIREWALL
 45 		Note:  There is currently no firewall or ICMP handling done.
 
 | 
| /linux/Documentation/devicetree/bindings/arm/tegra/ | 
| H A D | nvidia,tegra194-cbb.yaml | 60       A secure interrupt is received for SEC(firewall) & SLV errors and a
 |