Home
last modified time | relevance | path

Searched full:firewall (Results 1 – 25 of 84) sorted by relevance

1234

/linux-6.12.1/include/linux/bus/
Dstm32_firewall_device.h19 * struct stm32_firewall - Information on a device's firewall. Each device can have more than one
20 * firewall.
22 * @firewall_ctrl: Pointer referencing a firewall controller of the device. It is
26 * @entry: Name of the firewall entry
28 * @firewall_id: Firewall ID associated the device for this firewall controller
40 * stm32_firewall_get_firewall - Get the firewall(s) associated to given device.
41 * The firewall controller reference is always the first argument
43 * The firewall ID is always the second argument of each of the
45 * If there's no argument linked to the phandle, then the firewall ID
49 * @firewall: Array of firewall references
[all …]
/linux-6.12.1/drivers/bus/
Dstm32_firewall.c23 /* Corresponds to STM32_FIREWALL_MAX_EXTRA_ARGS + firewall ID */
29 /* Firewall device API */
31 int stm32_firewall_get_firewall(struct device_node *np, struct stm32_firewall *firewall, in stm32_firewall_get_firewall() argument
39 if (!firewall || !nb_firewall) in stm32_firewall_get_firewall()
57 pr_err("Too many firewall controllers"); in stm32_firewall_get_firewall()
65 /* Check if the parsed phandle corresponds to a registered firewall controller */ in stm32_firewall_get_firewall()
70 firewall[j].firewall_ctrl = ctrl; in stm32_firewall_get_firewall()
77 firewall[j].firewall_ctrl = NULL; in stm32_firewall_get_firewall()
78 pr_err("No firewall controller registered for %s\n", np->full_name); in stm32_firewall_get_firewall()
85 firewall[j].entry = fw_entry; in stm32_firewall_get_firewall()
[all …]
Dstm32_firewall.h16 * STM32_PERIPHERAL_FIREWALL: This type of firewall protects peripherals
17 * STM32_MEMORY_FIREWALL: This type of firewall protects memories/subsets of memory
19 * STM32_NOTYPE_FIREWALL: Undefined firewall type
27 * struct stm32_firewall_controller - Information on firewall controller supplying services
29 * @name: Name of the firewall controller
30 * @dev: Device reference of the firewall controller
31 * @mmio: Base address of the firewall controller
32 * @entry: List entry of the firewall controller list
33 * @type: Type of firewall
34 * @max_entries: Number of entries covered by the firewall
[all …]
DKconfig167 bool "STM32 Firewall framework"
171 Say y to enable STM32 firewall framework and its services. Firewall
173 hardware resources linked to a firewall controller can be requested
/linux-6.12.1/include/uapi/linux/netfilter_arp/
Darp_tables.h3 * Format of an ARP firewall descriptor
93 /* This structure defines each of the firewall rules. Consists of 3
116 * New IP firewall options for [gs]etsockopt at the RAW IP level.
206 * Main firewall chains definitions and global var's definitions.
/linux-6.12.1/net/
DKconfig163 a firewall protecting a local network from the Internet. The type of
164 firewall provided by this kernel support is called a "packet
166 based on type, source, destination etc. The other kind of firewall,
183 firewall box itself. It works both ways: if the outside host
197 Yet another use of Netfilter is building a bridging firewall. Using
231 ARP resp. IP traffic. If you want a bridging firewall, you probably
/linux-6.12.1/include/uapi/linux/netfilter_ipv4/
Dip_tables.h9 * Format of an IP firewall descriptor
103 /* This structure defines each of the firewall rules. Consists of 3
128 * New IP firewall options for [gs]etsockopt at the RAW IP level.
229 * Main firewall chains definitions and global var's definitions.
/linux-6.12.1/Documentation/networking/device_drivers/cable/
Dsb1000.rst97 8. Be sure to modify /etc/ppp/firewall to use ipchains instead of
103 You may also wish to modify the firewall script to implement a different
173 5. The firewall script isn't working (with 2.2.x and higher kernels).
177 /etc/ppp/firewall script from the deprecated ipfwadm commands to ipchains.
179 6. I'm getting *tons* of firewall deny messages in the /var/kern.log,
/linux-6.12.1/include/uapi/linux/netfilter_ipv6/
Dip6_tables.h9 * Format of an IP6 firewall descriptor
107 /* This structure defines each of the firewall rules. Consists of 3
165 * New IP firewall options for [gs]etsockopt at the RAW IP level.
269 * Main firewall chains definitions and global var's definitions.
/linux-6.12.1/net/bridge/
DKconfig26 turn your bridge into a bridging IP firewall.
28 take this into account when setting up your firewall rules.
/linux-6.12.1/drivers/soc/tegra/cbb/
Dtegra234-cbb.c73 /* Write firewall check enable */
144 dev_info(&pdev->dev, "SoC data missing for firewall\n"); in tegra234_cbb_write_access_allowed()
150 dev_err(&pdev->dev, "wrong firewall offset value\n"); in tegra234_cbb_write_access_allowed()
156 * If the firewall check feature for allowing or blocking the in tegra234_cbb_write_access_allowed()
157 * write accesses through the firewall of a fabric is disabled in tegra234_cbb_write_access_allowed()
164 * If the firewall check is enabled then check whether CCPLEX in tegra234_cbb_write_access_allowed()
682 .desc = "Attempt to access a region which is firewall protected"
885 * level firewall(SCR), address hole within the slave, etc
1155 * is blocked by CBB firewall. in tegra234_cbb_probe()
1158 dev_info(&pdev->dev, "error reporting not enabled due to firewall\n"); in tegra234_cbb_probe()
/linux-6.12.1/arch/arm/mach-omap2/
Dl3_2xxx.h3 * arch/arm/plat-omap/include/plat/l3_2xxx.h - L3 firewall definitions
Dl3_3xxx.h3 * arch/arm/plat-omap/include/plat/l3_3xxx.h - L3 firewall definitions
Dl4_2xxx.h3 * arch/arm/plat-omap/include/plat/l4_2xxx.h - L4 firewall definitions
Dl4_3xxx.h3 * arch/arm/plat-omap/include/mach/l4_3xxx.h - L4 firewall definitions
/linux-6.12.1/drivers/gpu/host1x/
DKconfig23 bool "Enable HOST1X security firewall"
/linux-6.12.1/drivers/gpu/drm/tegra/
DMakefile8 firewall.o \
/linux-6.12.1/net/netfilter/
DKconfig271 firewall.
304 same port. This make them hard to firewall properly because connection
324 same port. This make them hard to firewall properly because connection
340 If you are running PPTP sessions over a stateful firewall or NAT
360 firewall.
372 tracking/NATing firewall.
1134 firewall/router, but machines behind it can never exchange large
1140 Workaround: activate this option and add a rule to your firewall
/linux-6.12.1/include/linux/netfilter_ipv6/
Dip6_tables.h9 * Format of an IP6 firewall descriptor
/linux-6.12.1/include/linux/netfilter_arp/
Darp_tables.h3 * Format of an ARP firewall descriptor
/linux-6.12.1/Documentation/devicetree/bindings/bus/
Dst,stm32-etzpc.yaml44 Contains the firewall ID associated to the peripheral.
Dst,stm32mp25-rifsc.yaml60 Contains the firewall ID associated to the peripheral.
/linux-6.12.1/include/linux/netfilter_ipv4/
Dip_tables.h9 * Format of an IP firewall descriptor
/linux-6.12.1/drivers/gpio/
Dgpio-hlwd.c25 * firewall (AHBPROT) in the Hollywood chipset has been configured to allow
244 * systems where the AHBPROT memory firewall hasn't been configured to in hlwd_gpio_probe()
/linux-6.12.1/net/ipv4/
Dipip.c13 * Alan Cox : More fixes for 1.3.21, and firewall fix. Maybe this will work soon 8).
14 * Kai Schulte : Fixed #defines for IP_FIREWALL->FIREWALL
45 Note: There is currently no firewall or ICMP handling done.

1234