Searched full:firewall (Results 1 – 25 of 84) sorted by relevance
1234
/linux-6.12.1/include/linux/bus/ |
D | stm32_firewall_device.h | 19 * struct stm32_firewall - Information on a device's firewall. Each device can have more than one 20 * firewall. 22 * @firewall_ctrl: Pointer referencing a firewall controller of the device. It is 26 * @entry: Name of the firewall entry 28 * @firewall_id: Firewall ID associated the device for this firewall controller 40 * stm32_firewall_get_firewall - Get the firewall(s) associated to given device. 41 * The firewall controller reference is always the first argument 43 * The firewall ID is always the second argument of each of the 45 * If there's no argument linked to the phandle, then the firewall ID 49 * @firewall: Array of firewall references [all …]
|
/linux-6.12.1/drivers/bus/ |
D | stm32_firewall.c | 23 /* Corresponds to STM32_FIREWALL_MAX_EXTRA_ARGS + firewall ID */ 29 /* Firewall device API */ 31 int stm32_firewall_get_firewall(struct device_node *np, struct stm32_firewall *firewall, in stm32_firewall_get_firewall() argument 39 if (!firewall || !nb_firewall) in stm32_firewall_get_firewall() 57 pr_err("Too many firewall controllers"); in stm32_firewall_get_firewall() 65 /* Check if the parsed phandle corresponds to a registered firewall controller */ in stm32_firewall_get_firewall() 70 firewall[j].firewall_ctrl = ctrl; in stm32_firewall_get_firewall() 77 firewall[j].firewall_ctrl = NULL; in stm32_firewall_get_firewall() 78 pr_err("No firewall controller registered for %s\n", np->full_name); in stm32_firewall_get_firewall() 85 firewall[j].entry = fw_entry; in stm32_firewall_get_firewall() [all …]
|
D | stm32_firewall.h | 16 * STM32_PERIPHERAL_FIREWALL: This type of firewall protects peripherals 17 * STM32_MEMORY_FIREWALL: This type of firewall protects memories/subsets of memory 19 * STM32_NOTYPE_FIREWALL: Undefined firewall type 27 * struct stm32_firewall_controller - Information on firewall controller supplying services 29 * @name: Name of the firewall controller 30 * @dev: Device reference of the firewall controller 31 * @mmio: Base address of the firewall controller 32 * @entry: List entry of the firewall controller list 33 * @type: Type of firewall 34 * @max_entries: Number of entries covered by the firewall [all …]
|
D | Kconfig | 167 bool "STM32 Firewall framework" 171 Say y to enable STM32 firewall framework and its services. Firewall 173 hardware resources linked to a firewall controller can be requested
|
/linux-6.12.1/include/uapi/linux/netfilter_arp/ |
D | arp_tables.h | 3 * Format of an ARP firewall descriptor 93 /* This structure defines each of the firewall rules. Consists of 3 116 * New IP firewall options for [gs]etsockopt at the RAW IP level. 206 * Main firewall chains definitions and global var's definitions.
|
/linux-6.12.1/net/ |
D | Kconfig | 163 a firewall protecting a local network from the Internet. The type of 164 firewall provided by this kernel support is called a "packet 166 based on type, source, destination etc. The other kind of firewall, 183 firewall box itself. It works both ways: if the outside host 197 Yet another use of Netfilter is building a bridging firewall. Using 231 ARP resp. IP traffic. If you want a bridging firewall, you probably
|
/linux-6.12.1/include/uapi/linux/netfilter_ipv4/ |
D | ip_tables.h | 9 * Format of an IP firewall descriptor 103 /* This structure defines each of the firewall rules. Consists of 3 128 * New IP firewall options for [gs]etsockopt at the RAW IP level. 229 * Main firewall chains definitions and global var's definitions.
|
/linux-6.12.1/Documentation/networking/device_drivers/cable/ |
D | sb1000.rst | 97 8. Be sure to modify /etc/ppp/firewall to use ipchains instead of 103 You may also wish to modify the firewall script to implement a different 173 5. The firewall script isn't working (with 2.2.x and higher kernels). 177 /etc/ppp/firewall script from the deprecated ipfwadm commands to ipchains. 179 6. I'm getting *tons* of firewall deny messages in the /var/kern.log,
|
/linux-6.12.1/include/uapi/linux/netfilter_ipv6/ |
D | ip6_tables.h | 9 * Format of an IP6 firewall descriptor 107 /* This structure defines each of the firewall rules. Consists of 3 165 * New IP firewall options for [gs]etsockopt at the RAW IP level. 269 * Main firewall chains definitions and global var's definitions.
|
/linux-6.12.1/net/bridge/ |
D | Kconfig | 26 turn your bridge into a bridging IP firewall. 28 take this into account when setting up your firewall rules.
|
/linux-6.12.1/drivers/soc/tegra/cbb/ |
D | tegra234-cbb.c | 73 /* Write firewall check enable */ 144 dev_info(&pdev->dev, "SoC data missing for firewall\n"); in tegra234_cbb_write_access_allowed() 150 dev_err(&pdev->dev, "wrong firewall offset value\n"); in tegra234_cbb_write_access_allowed() 156 * If the firewall check feature for allowing or blocking the in tegra234_cbb_write_access_allowed() 157 * write accesses through the firewall of a fabric is disabled in tegra234_cbb_write_access_allowed() 164 * If the firewall check is enabled then check whether CCPLEX in tegra234_cbb_write_access_allowed() 682 .desc = "Attempt to access a region which is firewall protected" 885 * level firewall(SCR), address hole within the slave, etc 1155 * is blocked by CBB firewall. in tegra234_cbb_probe() 1158 dev_info(&pdev->dev, "error reporting not enabled due to firewall\n"); in tegra234_cbb_probe()
|
/linux-6.12.1/arch/arm/mach-omap2/ |
D | l3_2xxx.h | 3 * arch/arm/plat-omap/include/plat/l3_2xxx.h - L3 firewall definitions
|
D | l3_3xxx.h | 3 * arch/arm/plat-omap/include/plat/l3_3xxx.h - L3 firewall definitions
|
D | l4_2xxx.h | 3 * arch/arm/plat-omap/include/plat/l4_2xxx.h - L4 firewall definitions
|
D | l4_3xxx.h | 3 * arch/arm/plat-omap/include/mach/l4_3xxx.h - L4 firewall definitions
|
/linux-6.12.1/drivers/gpu/host1x/ |
D | Kconfig | 23 bool "Enable HOST1X security firewall"
|
/linux-6.12.1/drivers/gpu/drm/tegra/ |
D | Makefile | 8 firewall.o \
|
/linux-6.12.1/net/netfilter/ |
D | Kconfig | 271 firewall. 304 same port. This make them hard to firewall properly because connection 324 same port. This make them hard to firewall properly because connection 340 If you are running PPTP sessions over a stateful firewall or NAT 360 firewall. 372 tracking/NATing firewall. 1134 firewall/router, but machines behind it can never exchange large 1140 Workaround: activate this option and add a rule to your firewall
|
/linux-6.12.1/include/linux/netfilter_ipv6/ |
D | ip6_tables.h | 9 * Format of an IP6 firewall descriptor
|
/linux-6.12.1/include/linux/netfilter_arp/ |
D | arp_tables.h | 3 * Format of an ARP firewall descriptor
|
/linux-6.12.1/Documentation/devicetree/bindings/bus/ |
D | st,stm32-etzpc.yaml | 44 Contains the firewall ID associated to the peripheral.
|
D | st,stm32mp25-rifsc.yaml | 60 Contains the firewall ID associated to the peripheral.
|
/linux-6.12.1/include/linux/netfilter_ipv4/ |
D | ip_tables.h | 9 * Format of an IP firewall descriptor
|
/linux-6.12.1/drivers/gpio/ |
D | gpio-hlwd.c | 25 * firewall (AHBPROT) in the Hollywood chipset has been configured to allow 244 * systems where the AHBPROT memory firewall hasn't been configured to in hlwd_gpio_probe()
|
/linux-6.12.1/net/ipv4/ |
D | ipip.c | 13 * Alan Cox : More fixes for 1.3.21, and firewall fix. Maybe this will work soon 8). 14 * Kai Schulte : Fixed #defines for IP_FIREWALL->FIREWALL 45 Note: There is currently no firewall or ICMP handling done.
|
1234