| /linux/tools/testing/selftests/bpf/prog_tests/ |
| H A D | tc_bpf.c | 26 static int test_tc_bpf_basic(const struct bpf_tc_hook *hook, int fd) in test_tc_bpf_basic() argument 37 ret = bpf_tc_attach(hook, &opts); in test_tc_bpf_basic() 48 ret = bpf_tc_attach(hook, &opts); in test_tc_bpf_basic() 53 ret = bpf_tc_query(hook, &opts); in test_tc_bpf_basic() 64 ret = bpf_tc_detach(hook, &opts); in test_tc_bpf_basic() 69 static int test_tc_bpf_api(struct bpf_tc_hook *hook, int fd) in test_tc_bpf_api() argument 77 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_hook_create invalid hook = NULL")) in test_tc_bpf_api() 80 /* hook ifindex = 0 */ in test_tc_bpf_api() 82 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_hook_create invalid hook ifindex == 0")) in test_tc_bpf_api() 86 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_hook_destroy invalid hook ifindex == 0")) in test_tc_bpf_api() [all …]
|
| /linux/net/netfilter/ |
| H A D | nf_bpf_link.c | 38 const struct nf_defrag_hook *hook; in get_proto_defrag_hook() local 43 hook = rcu_dereference(*ptr_global_hook); in get_proto_defrag_hook() 44 if (!hook) { in get_proto_defrag_hook() 51 hook = rcu_dereference(*ptr_global_hook); in get_proto_defrag_hook() 54 if (hook && try_module_get(hook->owner)) { in get_proto_defrag_hook() 56 hook = rcu_pointer_handoff(hook); in get_proto_defrag_hook() 58 WARN_ONCE(!hook, "%s has bad registration", mod); in get_proto_defrag_hook() 59 hook = ERR_PTR(-ENOENT); in get_proto_defrag_hook() 63 if (!IS_ERR(hook)) { in get_proto_defrag_hook() 64 err = hook->enable(link->net); in get_proto_defrag_hook() [all …]
|
| H A D | utils.c | 10 __sum16 nf_ip_checksum(struct sk_buff *skb, unsigned int hook, in nf_ip_checksum() argument 18 if (hook != NF_INET_PRE_ROUTING && hook != NF_INET_LOCAL_IN) in nf_ip_checksum() 43 static __sum16 nf_ip_checksum_partial(struct sk_buff *skb, unsigned int hook, in nf_ip_checksum_partial() argument 53 return nf_ip_checksum(skb, hook, dataoff, protocol); in nf_ip_checksum_partial() 64 __sum16 nf_ip6_checksum(struct sk_buff *skb, unsigned int hook, in nf_ip6_checksum() argument 72 if (hook != NF_INET_PRE_ROUTING && hook != NF_INET_LOCAL_IN) in nf_ip6_checksum() 97 static __sum16 nf_ip6_checksum_partial(struct sk_buff *skb, unsigned int hook, in nf_ip6_checksum_partial() argument 108 return nf_ip6_checksum(skb, hook, dataoff, protocol); in nf_ip6_checksum_partial() 123 __sum16 nf_checksum(struct sk_buff *skb, unsigned int hook, in nf_checksum() argument 131 csum = nf_ip_checksum(skb, hook, dataoff, protocol); in nf_checksum() [all …]
|
| H A D | nfnetlink_hook.c | 58 u8 hook; member 211 ret = snprintf(sym, sizeof(sym), "%ps", ops->hook); in nfnl_hook_dump_one() 279 nfnl_hook_entries_head(u8 pf, unsigned int hook, struct net *net, const char *dev) in nfnl_hook_entries_head() argument 288 if (hook >= ARRAY_SIZE(net->nf.hooks_ipv4)) in nfnl_hook_entries_head() 290 hook_head = rcu_dereference(net->nf.hooks_ipv4[hook]); in nfnl_hook_entries_head() 293 if (hook >= ARRAY_SIZE(net->nf.hooks_ipv6)) in nfnl_hook_entries_head() 295 hook_head = rcu_dereference(net->nf.hooks_ipv6[hook]); in nfnl_hook_entries_head() 299 if (hook >= ARRAY_SIZE(net->nf.hooks_arp)) in nfnl_hook_entries_head() 301 hook_head = rcu_dereference(net->nf.hooks_arp[hook]); in nfnl_hook_entries_head() 306 if (hook >= ARRAY_SIZE(net->nf.hooks_bridge)) in nfnl_hook_entries_head() [all …]
|
| H A D | core.c | 92 return NF_ACCEPT; /* ACCEPT makes nf_hook_slow call next hook */ in accept_all() 96 .hook = accept_all, in accept_all() 120 /* Restrict BPF hook type to force a unique priority, not in nf_hook_entries_grow() 125 * hook at same priority as a bpf one (we don't want to in nf_hook_entries_grow() 157 new->hooks[nhooks].hook = reg->hook; in nf_hook_entries_grow() 166 new->hooks[nhooks].hook = reg->hook; in nf_hook_entries_grow() 216 * __nf_hook_entries_try_shrink - try to shrink hook array 218 * @old -- current hook blo [all...] |
| H A D | nft_reject_netdev.c | 30 int hook) in nft_reject_netdev_send_v4_tcp_reset() argument 34 nskb = nf_reject_skb_v4_tcp_reset(net, oldskb, dev, hook); in nft_reject_netdev_send_v4_tcp_reset() 44 int hook, u8 code) in nft_reject_netdev_send_v4_unreach() argument 48 nskb = nf_reject_skb_v4_unreach(net, oldskb, dev, hook, code); in nft_reject_netdev_send_v4_unreach() 58 int hook) in nft_reject_netdev_send_v6_tcp_reset() argument 62 nskb = nf_reject_skb_v6_tcp_reset(net, oldskb, dev, hook); in nft_reject_netdev_send_v6_tcp_reset() 73 int hook, u8 code) in nft_reject_netdev_send_v6_unreach() argument 77 nskb = nf_reject_skb_v6_unreach(net, oldskb, dev, hook, code); in nft_reject_netdev_send_v6_unreach()
|
| H A D | nf_conntrack_pptp.c | 92 const struct nf_nat_pptp_hook *hook; in pptp_expectfn() local 103 hook = rcu_dereference(nf_nat_pptp_hook); in pptp_expectfn() 104 if (hook && ct->master->status & IPS_NAT_MASK) in pptp_expectfn() 105 hook->expectfn(ct, exp); in pptp_expectfn() 190 const struct nf_nat_pptp_hook *hook; in exp_gre() local 220 hook = rcu_dereference(nf_nat_pptp_hook); in exp_gre() 221 if (hook && ct->status & IPS_NAT_MASK) in exp_gre() 222 hook->exp_gre(exp_orig, exp_reply); in exp_gre() 260 const struct nf_nat_pptp_hook *hook; in pptp_inbound_pkt() local 364 hook = rcu_dereference(nf_nat_pptp_hook); in pptp_inbound_pkt() [all …]
|
| /linux/include/linux/ |
| H A D | netfilter.h | 79 u8 hook; member 103 nf_hookfn *hook; member 114 nf_hookfn *hook; member 128 /* trailer: pointers to original orig_ops of each hook, 133 * needed in slow path (hook register/unregister): 137 * only needed when a hook is deleted, not during 158 return entry->hook(entry->priv, skb, state); in nf_hook_entry_hookfn() 162 unsigned int hook, in nf_hook_state_init() argument 170 p->hook = hook; in nf_hook_state_init() 198 /* Function to register/unregister hook points. */ [all …]
|
| H A D | lsm_hooks.h | 49 * @active: Enabled when the static call has an LSM hook associated. 60 * Table of the static calls for each LSM hook. 87 * Security module hook list structure. 91 * @scalls: The beginning of the array of static calls assigned to this hook. 92 * @hook: The callback for the hook. 93 * @lsm: The name of the lsm that owns this hook. 97 union security_list_options hook; member 136 #define LSM_HOOK_INIT(NAME, HOOK) \ argument 139 .hook = { .NAME = HOOK } \
|
| /linux/tools/lib/bpf/ |
| H A D | netlink.c | 532 typedef int (*qdisc_config_t)(struct libbpf_nla_req *req, const struct bpf_tc_hook *hook); 534 static int clsact_config(struct libbpf_nla_req *req, const struct bpf_tc_hook *hook) in clsact_config() 542 static int qdisc_config(struct libbpf_nla_req *req, const struct bpf_tc_hook *hook) in attach_point_to_config() argument 544 const char *qdisc = OPTS_GET(hook, qdisc, NULL); in attach_point_to_config() 546 req->tc.tcm_parent = OPTS_GET(hook, parent, TC_H_ROOT); in attach_point_to_config() 547 req->tc.tcm_handle = OPTS_GET(hook, handle, 0); in attach_point_to_config() 552 static int attach_point_to_config(struct bpf_tc_hook *hook, in attach_point_to_config() 555 switch (OPTS_GET(hook, attach_point, 0)) { in attach_point_to_config() 559 if (OPTS_GET(hook, parent, 0)) 595 static int tc_qdisc_modify(struct bpf_tc_hook *hook, in in tc_qdisc_modify() 582 tc_qdisc_modify(struct bpf_tc_hook * hook,int cmd,int flags) tc_qdisc_modify() argument 606 tc_qdisc_create_excl(struct bpf_tc_hook * hook) tc_qdisc_create_excl() argument 611 tc_qdisc_delete(struct bpf_tc_hook * hook) tc_qdisc_delete() argument 616 bpf_tc_hook_create(struct bpf_tc_hook * hook) bpf_tc_hook_create() argument 632 bpf_tc_hook_destroy(struct bpf_tc_hook * hook) bpf_tc_hook_destroy() argument 718 bpf_tc_attach(const struct bpf_tc_hook * hook,struct bpf_tc_opts * opts) bpf_tc_attach() argument 792 __bpf_tc_detach(const struct bpf_tc_hook * hook,const struct bpf_tc_opts * opts,const bool flush) __bpf_tc_detach() argument 853 bpf_tc_detach(const struct bpf_tc_hook * hook,const struct bpf_tc_opts * opts) bpf_tc_detach() argument 865 bpf_tc_query(const struct bpf_tc_hook * hook,struct bpf_tc_opts * opts) bpf_tc_query() argument [all...] |
| /linux/include/drm/ |
| H A D | drm_simple_kms_helper.h | 34 * This hook is used by the probe helpers to filter the mode list in 60 * This hook is optional. 70 * This hook is optional. 82 * This hook is optional. 98 * This hook is optional. 116 * the documentation for the &drm_plane_helper_funcs.prepare_fb hook for 119 * For GEM drivers who neither have a @prepare_fb nor @cleanup_fb hook 123 * their @prepare_fb hook. 132 * the documentation for the &drm_plane_helper_funcs.cleanup_fb hook for 142 * the documentation for the &drm_plane_helper_funcs.begin_fb_access hook for [all …]
|
| /linux/fs/xfs/ |
| H A D | xfs_hooks.c | 23 /* Make it so a function gets called whenever we hit a certain hook point. */ 27 struct xfs_hook *hook) in xfs_hooks_add() argument 29 ASSERT(hook->nb.notifier_call != NULL); in xfs_hooks_add() 32 return blocking_notifier_chain_register(&chain->head, &hook->nb); in xfs_hooks_add() 35 /* Remove a previously installed hook. */ 39 struct xfs_hook *hook) in xfs_hooks_del() argument 41 blocking_notifier_chain_unregister(&chain->head, &hook->nb); in xfs_hooks_del() 44 /* Call a hook. Returns the NOTIFY_* value returned by the last hook. */
|
| H A D | xfs_hooks.h | 37 typedef int (*xfs_hook_fn_t)(struct xfs_hook *hook, unsigned long action, 41 int xfs_hooks_add(struct xfs_hooks *chain, struct xfs_hook *hook); 42 void xfs_hooks_del(struct xfs_hooks *chain, struct xfs_hook *hook); 46 static inline void xfs_hook_setup(struct xfs_hook *hook, notifier_fn_t fn) in xfs_hook_setup() argument 48 hook->nb.notifier_call = fn; in xfs_hook_setup() 49 hook->nb.priority = 0; in xfs_hook_setup()
|
| /linux/rust/proc-macro2/ |
| H A D | detection.rs | 34 // Swap in a null panic hook to avoid printing "thread panicked" to stderr, 41 // thread 1 calls take_hook, gets the user's original hook 42 // thread 1 calls set_hook with the null hook 43 // thread 2 calls take_hook, thinks null hook is the original hook 44 // thread 2 calls set_hook with the null hook 45 // thread 1 calls set_hook with the actual original hook 46 // thread 2 calls set_hook with what it thinks is the original hook 48 // in which the user's hook has been lost. 51 // happen during the interval that the user's original panic hook is 52 // unregistered such that their hook is incorrectly not called. This is
|
| /linux/net/ipv4/netfilter/ |
| H A D | ipt_REJECT.c | 34 int hook = xt_hooknum(par); in reject_tg() local 38 nf_send_unreach(skb, ICMP_NET_UNREACH, hook); in reject_tg() 41 nf_send_unreach(skb, ICMP_HOST_UNREACH, hook); in reject_tg() 44 nf_send_unreach(skb, ICMP_PROT_UNREACH, hook); in reject_tg() 47 nf_send_unreach(skb, ICMP_PORT_UNREACH, hook); in reject_tg() 50 nf_send_unreach(skb, ICMP_NET_ANO, hook); in reject_tg() 53 nf_send_unreach(skb, ICMP_HOST_ANO, hook); in reject_tg() 56 nf_send_unreach(skb, ICMP_PKT_FILTERED, hook); in reject_tg() 59 nf_send_reset(xt_net(par), par->state->sk, skb, hook); in reject_tg()
|
| /linux/security/ipe/ |
| H A D | hooks.c | 19 * ipe_bprm_check_security() - ipe security hook function for bprm check. 23 * This LSM hook is called when a binary is loaded through the exec 39 * ipe_bprm_creds_for_exec() - ipe security hook function for bprm creds check. 43 * This LSM hook is called when userspace signals the kernel to check a file 45 * The hook triggers IPE policy evaluation on the script file and returns 66 * ipe_mmap_file() - ipe security hook function for mmap check. 73 * This hook is called when a file is loaded through the mmap 94 * ipe_file_mprotect() - ipe security hook function for mprotect check. 100 * This LSM hook is called when a mmap'd region of memory is changing 126 * ipe_kernel_read_file() - ipe security hook function for kernel read. [all …]
|
| /linux/security/integrity/ima/ |
| H A D | ima.h | 49 /* bitset of digests algorithms allowed in the setxattr hook */ 313 #define __ima_hooks(hook) \ 314 hook(NONE, none) \ 315 hook(FILE_CHECK, file) \ 316 hook(MMAP_CHECK, mmap) \ 317 hook(MMAP_CHECK_REQPROT, mmap_reqprot) \ 318 hook(BPRM_CHECK, bprm) \ 319 hook(CREDS_CHECK, creds) \ 320 hook(POST_SETATTR, post_setattr) \ 321 hook(MODULE_CHEC 307 __ima_hooks(hook) global() argument [all...] |
| /linux/security/selinux/ |
| H A D | xfrm.c | 5 * This file contains the SELinux XFRM hook function implementations. 145 * LSM hook implementation that authorizes that a flow can use a xfrm policy 167 * LSM hook implementation that authorizes that a state matches 253 * LSM hook implementation that checks and/or returns the xfrm sid for the 277 * LSM hook implementation that allocs and transfers uctx spec to xfrm_policy. 287 * LSM hook implementation that copies security data structure from old to new 309 * LSM hook implementation that frees xfrm_sec_ctx security information. 317 * LSM hook implementation that authorizes deletion of labeled policies. 325 * LSM hook implementation that allocates a xfrm_sec_state, populates it using 335 * LSM hook implementation that allocates a xfrm_sec_state and populates based [all …]
|
| /linux/include/uapi/linux/netfilter/ |
| H A D | nfnetlink_hook.h | 11 * enum nfnl_hook_attributes - netfilter hook netlink attributes 13 * @NFNLA_HOOK_HOOKNUM: netfilter hook number (NLA_U32) 14 * @NFNLA_HOOK_PRIORITY: netfilter hook priority (NLA_U32) 16 * @NFNLA_HOOK_FUNCTION_NAME: hook function name (NLA_STRING) 17 * @NFNLA_HOOK_MODULE_NAME: kernel module that registered this hook (NLA_STRING) 18 * @NFNLA_HOOK_CHAIN_INFO: basechain hook metadata (NLA_NESTED)
|
| /linux/tools/testing/selftests/net/netfilter/ |
| H A D | nft_queue.sh | 97 type filter hook prerouting priority $prio; policy accept; 101 type filter hook input priority $prio; policy accept; 105 type filter hook forward priority $prio; policy accept; 110 type filter hook output priority $prio; policy accept; 116 type filter hook postrouting priority $prio; policy accept; 129 type filter hook prerouting priority $prio; policy accept; 133 type filter hook input priority $prio; policy accept; 137 type filter hook forward priority $prio; policy accept; 141 type filter hook output priority $prio; policy accept; 145 type filter hook postroutin [all...] |
| /linux/include/acpi/ |
| H A D | battery.h | 16 int (*add_battery)(struct power_supply *battery, struct acpi_battery_hook *hook); 17 int (*remove_battery)(struct power_supply *battery, struct acpi_battery_hook *hook); 21 void battery_hook_register(struct acpi_battery_hook *hook); 22 void battery_hook_unregister(struct acpi_battery_hook *hook); 23 int devm_battery_hook_register(struct device *dev, struct acpi_battery_hook *hook);
|
| /linux/drivers/gpu/drm/ |
| H A D | drm_atomic_state_helper.c | 89 * hook. 108 * drm_atomic_helper_crtc_reset - default &drm_crtc_funcs.reset hook for CRTCs 164 * drm_atomic_helper_crtc_duplicate_state - default state duplicate hook 167 * Default CRTC state duplicate hook for drivers which don't have their own 223 * drm_atomic_helper_crtc_destroy_state - default state destroy hook 227 * Default CRTC state destroy hook for drivers which don't have their own 309 * hook. 324 * drm_atomic_helper_plane_reset - default &drm_plane_funcs.reset hook for planes 366 * drm_atomic_helper_plane_duplicate_state - default state duplicate hook 369 * Default plane state duplicate hook for drivers which don't have their own [all …]
|
| /linux/sound/core/ |
| H A D | vmaster.c | 36 void (*hook)(void *private_data, int); member 124 if (master->hook) in master_init() 125 master->hook(master->hook_private_data, master->val); in master_init() 380 if (master->hook && !first_init) in master_put() 381 master->hook(master->hook_private_data, master->val); in master_put() 466 * snd_ctl_add_vmaster_hook - Add a hook to a vmaster control 468 * @hook: the hook function 471 * Adds the given hook to the vmaster control element so that it's called 477 void (*hook)(void *private_data, int), in snd_ctl_add_vmaster_hook() 481 master->hook = hook; in snd_ctl_add_vmaster_hook() [all …]
|
| /linux/net/bridge/netfilter/ |
| H A D | nft_reject_bridge.c | 48 int hook) in nft_reject_br_send_v4_tcp_reset() argument 52 nskb = nf_reject_skb_v4_tcp_reset(net, oldskb, NULL, hook); in nft_reject_br_send_v4_tcp_reset() 64 int hook, u8 code) in nft_reject_br_send_v4_unreach() argument 68 nskb = nf_reject_skb_v4_unreach(net, oldskb, NULL, hook, code); in nft_reject_br_send_v4_unreach() 80 int hook) in nft_reject_br_send_v6_tcp_reset() argument 84 nskb = nf_reject_skb_v6_tcp_reset(net, oldskb, NULL, hook); in nft_reject_br_send_v6_tcp_reset() 97 int hook, u8 code) in nft_reject_br_send_v6_unreach() argument 101 nskb = nf_reject_skb_v6_unreach(net, oldskb, NULL, hook, code); in nft_reject_br_send_v6_unreach()
|
| /linux/security/ |
| H A D | security.c | 39 * security_locked_down() LSM hook. Placing this array here allows 86 #define SECURITY_HOOK_ACTIVE_KEY(HOOK, IDX) security_hook_active_##HOOK##_##IDX argument 90 * HOOK is an LSM hook as defined in linux/lsm_hookdefs.h 93 #define LSM_STATIC_CALL(HOOK, IDX) lsm_static_call_##HOOK##_##IDX argument 96 * Call the macro M for each LSM hook MAX_LSM_COUNT times. 113 * Define static calls and static keys for each LSM hook. 127 * Initialise a table of static calls for each LSM hook. 413 * The default value of the LSM hook is defined in linux/lsm_hook_defs.h and 419 * LSM hook. 432 * Hook list operation macros. [all …]
|