Home
last modified time | relevance | path

Searched refs:firewall (Results 1 – 25 of 29) sorted by relevance

12

/linux-6.15/drivers/bus/
H A Dstm32_firewall.c39 if (!firewall || !nb_firewall) in stm32_firewall_get_firewall()
70 firewall[j].firewall_ctrl = ctrl; in stm32_firewall_get_firewall()
77 firewall[j].firewall_ctrl = NULL; in stm32_firewall_get_firewall()
85 firewall[j].entry = fw_entry; in stm32_firewall_get_firewall()
93 firewall[j].extra_args_size = 0; in stm32_firewall_get_firewall()
94 firewall[j].firewall_id = U32_MAX; in stm32_firewall_get_firewall()
120 if (!firewall || firewall->firewall_id == U32_MAX) in stm32_firewall_grant_access()
123 firewall_controller = firewall->firewall_ctrl; in stm32_firewall_grant_access()
136 if (!firewall || subsystem_id == U32_MAX || firewall->firewall_id == U32_MAX) in stm32_firewall_grant_access_by_id()
152 if (!firewall || firewall->firewall_id == U32_MAX) { in stm32_firewall_release_access()
[all …]
H A DKconfig171 Say y to enable STM32 firewall framework and its services. Firewall
173 hardware resources linked to a firewall controller can be requested
/linux-6.15/include/linux/bus/
H A Dstm32_firewall_device.h55 int stm32_firewall_get_firewall(struct device_node *np, struct stm32_firewall *firewall,
67 int stm32_firewall_grant_access(struct stm32_firewall *firewall);
76 void stm32_firewall_release_access(struct stm32_firewall *firewall);
96 int stm32_firewall_grant_access_by_id(struct stm32_firewall *firewall, u32 subsystem_id);
113 void stm32_firewall_release_access_by_id(struct stm32_firewall *firewall, u32 subsystem_id);
117 int stm32_firewall_get_firewall(struct device_node *np, struct stm32_firewall *firewall, in stm32_firewall_get_firewall() argument
123 int stm32_firewall_grant_access(struct stm32_firewall *firewall) in stm32_firewall_grant_access() argument
128 void stm32_firewall_release_access(struct stm32_firewall *firewall) in stm32_firewall_release_access() argument
132 int stm32_firewall_grant_access_by_id(struct stm32_firewall *firewall, u32 subsystem_id) in stm32_firewall_grant_access_by_id() argument
137 void stm32_firewall_release_access_by_id(struct stm32_firewall *firewall, u32 subsystem_id) in stm32_firewall_release_access_by_id() argument
/linux-6.15/drivers/gpu/drm/tegra/
H A DMakefile8 firewall.o \
/linux-6.15/net/bridge/
H A DKconfig26 turn your bridge into a bridging IP firewall.
28 take this into account when setting up your firewall rules.
/linux-6.15/drivers/gpu/host1x/
H A DKconfig23 bool "Enable HOST1X security firewall"
/linux-6.15/net/
H A DKconfig166 a firewall protecting a local network from the Internet. The type of
167 firewall provided by this kernel support is called a "packet
169 based on type, source, destination etc. The other kind of firewall,
186 firewall box itself. It works both ways: if the outside host
200 Yet another use of Netfilter is building a bridging firewall. Using
234 ARP resp. IP traffic. If you want a bridging firewall, you probably
/linux-6.15/Documentation/devicetree/bindings/bus/
H A Dst,stm32-etzpc.yaml44 Contains the firewall ID associated to the peripheral.
H A Dst,stm32mp25-rifsc.yaml60 Contains the firewall ID associated to the peripheral.
/linux-6.15/Documentation/devicetree/bindings/arm/tegra/
H A Dnvidia,tegra194-cbb.yaml60 A secure interrupt is received for SEC(firewall) & SLV errors and a
/linux-6.15/arch/arm/boot/dts/intel/ixp/
H A Dintel-ixp42x-usrobotics-usr8200.dts3 * Device Tree file for the USRobotics USR8200 firewall
/linux-6.15/Documentation/networking/
H A Dmptcp-sysctl.rst43 when a MPTCP firewall blackhole issue happens. This time period will
H A Dipvs-sysctl.rst60 also handled by stateful firewall rules. That is, iptables rules
/linux-6.15/Documentation/networking/device_drivers/ethernet/microsoft/
H A Dnetvsc.rst77 Network state (addresses, firewall, etc) should be applied only to the
/linux-6.15/net/netfilter/
H A DKconfig271 firewall.
304 same port. This make them hard to firewall properly because connection
324 same port. This make them hard to firewall properly because connection
340 If you are running PPTP sessions over a stateful firewall or NAT
360 firewall.
372 tracking/NATing firewall.
1134 firewall/router, but machines behind it can never exchange large
1140 Workaround: activate this option and add a rule to your firewall
/linux-6.15/arch/arm/boot/dts/ti/omap/
H A Domap3-n900.dts15 * Default secure signed bootloader (Nokia X-Loader) does not enable L3 firewall
20 * There is "unofficial" version of bootloader which enables AES in L3 firewall
22 * There is also no runtime detection code if AES is disabled in L3 firewall...
/linux-6.15/drivers/net/ethernet/dec/tulip/
H A DKconfig87 deployed on potentially unfriendly networks (e.g. in a firewall),
/linux-6.15/tools/usb/usbip/
H A DREADME250 - Shutdown firewall.
/linux-6.15/drivers/clk/stm32/
H A Dclk-stm32mp25.c1566 static struct stm32_firewall firewall; variable
1614 ret = stm32_firewall_grant_access_by_id(&firewall, index & ~SEC_RIFSC_FLAG); in stm32mp25_check_security()
1981 ret = stm32_firewall_get_firewall(dev->of_node, &firewall, 1); in stm32mp25_rcc_clocks_probe()
/linux-6.15/arch/um/drivers/
H A DKconfig318 that of a host behind a firewall that masquerades all network
/linux-6.15/Documentation/
H A DChanges380 services be protected from the internet-at-large by a firewall where
/linux-6.15/Documentation/translations/it_IT/process/
H A Dchanges.rst382 via internet mediante un firewall.
/linux-6.15/Documentation/process/
H A Dchanges.rst380 services be protected from the internet-at-large by a firewall where
/linux-6.15/Documentation/filesystems/
H A Dseq_file.rst87 A seq_file implementation that is formatting firewall rules from a
/linux-6.15/Documentation/admin-guide/LSM/
H A Dipe.rst66 is clearly defined and not supposed to be changed (e.g. network firewall

12