| /linux/tools/testing/selftests/bpf/prog_tests/ | 
| H A D | tc_bpf.c | 26 static int test_tc_bpf_basic(const struct bpf_tc_hook *hook, int fd)  in test_tc_bpf_basic()  argument37 	ret = bpf_tc_attach(hook, &opts);  in test_tc_bpf_basic()
 48 	ret = bpf_tc_attach(hook, &opts);  in test_tc_bpf_basic()
 53 	ret = bpf_tc_query(hook, &opts);  in test_tc_bpf_basic()
 64 	ret = bpf_tc_detach(hook, &opts);  in test_tc_bpf_basic()
 69 static int test_tc_bpf_api(struct bpf_tc_hook *hook, int fd)  in test_tc_bpf_api()  argument
 77 	if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_hook_create invalid hook = NULL"))  in test_tc_bpf_api()
 80 	/* hook ifindex = 0 */  in test_tc_bpf_api()
 82 	if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_hook_create invalid hook ifindex == 0"))  in test_tc_bpf_api()
 86 	if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_hook_destroy invalid hook ifindex == 0"))  in test_tc_bpf_api()
 [all …]
 
 | 
| /linux/net/netfilter/ | 
| H A D | nf_bpf_link.c | 38 	const struct nf_defrag_hook *hook;  in get_proto_defrag_hook()  local43 	hook = rcu_dereference(*ptr_global_hook);  in get_proto_defrag_hook()
 44 	if (!hook) {  in get_proto_defrag_hook()
 51 		hook = rcu_dereference(*ptr_global_hook);  in get_proto_defrag_hook()
 54 	if (hook && try_module_get(hook->owner)) {  in get_proto_defrag_hook()
 56 		hook = rcu_pointer_handoff(hook);  in get_proto_defrag_hook()
 58 		WARN_ONCE(!hook, "%s has bad registration", mod);  in get_proto_defrag_hook()
 59 		hook = ERR_PTR(-ENOENT);  in get_proto_defrag_hook()
 63 	if (!IS_ERR(hook)) {  in get_proto_defrag_hook()
 64 		err = hook->enable(link->net);  in get_proto_defrag_hook()
 [all …]
 
 | 
| H A D | utils.c | 10 __sum16 nf_ip_checksum(struct sk_buff *skb, unsigned int hook,  in nf_ip_checksum()  argument18 		if (hook != NF_INET_PRE_ROUTING && hook != NF_INET_LOCAL_IN)  in nf_ip_checksum()
 43 static __sum16 nf_ip_checksum_partial(struct sk_buff *skb, unsigned int hook,  in nf_ip_checksum_partial()  argument
 53 			return nf_ip_checksum(skb, hook, dataoff, protocol);  in nf_ip_checksum_partial()
 64 __sum16 nf_ip6_checksum(struct sk_buff *skb, unsigned int hook,  in nf_ip6_checksum()  argument
 72 		if (hook != NF_INET_PRE_ROUTING && hook != NF_INET_LOCAL_IN)  in nf_ip6_checksum()
 97 static __sum16 nf_ip6_checksum_partial(struct sk_buff *skb, unsigned int hook,  in nf_ip6_checksum_partial()  argument
 108 			return nf_ip6_checksum(skb, hook, dataoff, protocol);  in nf_ip6_checksum_partial()
 123 __sum16 nf_checksum(struct sk_buff *skb, unsigned int hook,  in nf_checksum()  argument
 131 		csum = nf_ip_checksum(skb, hook, dataoff, protocol);  in nf_checksum()
 [all …]
 
 | 
| H A D | nfnetlink_hook.c | 58 	u8 hook;  member211 	ret = snprintf(sym, sizeof(sym), "%ps", ops->hook);  in nfnl_hook_dump_one()
 279 nfnl_hook_entries_head(u8 pf, unsigned int hook, struct net *net, const char *dev)  in nfnl_hook_entries_head()  argument
 288 		if (hook >= ARRAY_SIZE(net->nf.hooks_ipv4))  in nfnl_hook_entries_head()
 290 		hook_head = rcu_dereference(net->nf.hooks_ipv4[hook]);  in nfnl_hook_entries_head()
 293 		if (hook >= ARRAY_SIZE(net->nf.hooks_ipv6))  in nfnl_hook_entries_head()
 295 		hook_head = rcu_dereference(net->nf.hooks_ipv6[hook]);  in nfnl_hook_entries_head()
 299 		if (hook >= ARRAY_SIZE(net->nf.hooks_arp))  in nfnl_hook_entries_head()
 301 		hook_head = rcu_dereference(net->nf.hooks_arp[hook]);  in nfnl_hook_entries_head()
 306 		if (hook >= ARRAY_SIZE(net->nf.hooks_bridge))  in nfnl_hook_entries_head()
 [all …]
 
 | 
| H A D | core.c | 92 	return NF_ACCEPT; /* ACCEPT makes nf_hook_slow call next hook */ in accept_all() 96 	.hook = accept_all, in accept_all()
 120 			/* Restrict BPF hook type to force a unique priority, not in nf_hook_entries_grow()
 125 			 * hook at same priority as a bpf one (we don't want to in nf_hook_entries_grow()
 157 			new->hooks[nhooks].hook = reg->hook; in nf_hook_entries_grow()
 166 		new->hooks[nhooks].hook = reg->hook; in nf_hook_entries_grow()
 216  * __nf_hook_entries_try_shrink - try to shrink hook array
 218  * @old -- current hook blo
 [all...]
 | 
| H A D | nft_reject_netdev.c | 30 						int hook)  in nft_reject_netdev_send_v4_tcp_reset()  argument34 	nskb = nf_reject_skb_v4_tcp_reset(net, oldskb, dev, hook);  in nft_reject_netdev_send_v4_tcp_reset()
 44 					      int hook, u8 code)  in nft_reject_netdev_send_v4_unreach()  argument
 48 	nskb = nf_reject_skb_v4_unreach(net, oldskb, dev, hook, code);  in nft_reject_netdev_send_v4_unreach()
 58 						int hook)  in nft_reject_netdev_send_v6_tcp_reset()  argument
 62 	nskb = nf_reject_skb_v6_tcp_reset(net, oldskb, dev, hook);  in nft_reject_netdev_send_v6_tcp_reset()
 73 					      int hook, u8 code)  in nft_reject_netdev_send_v6_unreach()  argument
 77 	nskb = nf_reject_skb_v6_unreach(net, oldskb, dev, hook, code);  in nft_reject_netdev_send_v6_unreach()
 
 | 
| /linux/include/linux/ | 
| H A D | netfilter.h | 79 	u8 hook;  member103 	nf_hookfn		*hook;  member
 114 	nf_hookfn			*hook;  member
 128 	/* trailer: pointers to original orig_ops of each hook,
 133 	 *   needed in slow path (hook register/unregister):
 137 	 *   only needed when a hook is deleted, not during
 158 	return entry->hook(entry->priv, skb, state);  in nf_hook_entry_hookfn()
 162 				      unsigned int hook,  in nf_hook_state_init()  argument
 170 	p->hook = hook;  in nf_hook_state_init()
 198 /* Function to register/unregister hook points. */
 [all …]
 
 | 
| H A D | lsm_hooks.h | 49  * @active: Enabled when the static call has an LSM hook associated.60  * Table of the static calls for each LSM hook.
 87  * Security module hook list structure.
 91  * @scalls: The beginning of the array of static calls assigned to this hook.
 92  * @hook: The callback for the hook.
 93  * @lsm: The name of the lsm that owns this hook.
 97 	union security_list_options hook;  member
 136 #define LSM_HOOK_INIT(NAME, HOOK)			\  argument
 139 		.hook = { .NAME = HOOK }		\
 
 | 
| /linux/include/drm/ | 
| H A D | drm_simple_kms_helper.h | 34 	 * This hook is used by the probe helpers to filter the mode list in60 	 * This hook is optional.
 70 	 * This hook is optional.
 82 	 * This hook is optional.
 98 	 * This hook is optional.
 116 	 * the documentation for the &drm_plane_helper_funcs.prepare_fb hook for
 119 	 * For GEM drivers who neither have a @prepare_fb nor @cleanup_fb hook
 123 	 * their @prepare_fb hook.
 132 	 * the documentation for the &drm_plane_helper_funcs.cleanup_fb hook for
 142 	 * the documentation for the &drm_plane_helper_funcs.begin_fb_access hook for
 [all …]
 
 | 
| /linux/tools/lib/bpf/ | 
| H A D | netlink.c | 532 typedef int (*qdisc_config_t)(struct libbpf_nla_req *req, const struct bpf_tc_hook *hook);534 static int clsact_config(struct libbpf_nla_req *req, const struct bpf_tc_hook *hook) in clsact_config()
 542 static int qdisc_config(struct libbpf_nla_req *req, const struct bpf_tc_hook *hook) in attach_point_to_config()   argument
 544 	const char *qdisc = OPTS_GET(hook, qdisc, NULL); in attach_point_to_config()
 546 	req->tc.tcm_parent = OPTS_GET(hook, parent, TC_H_ROOT); in attach_point_to_config()
 547 	req->tc.tcm_handle = OPTS_GET(hook, handle, 0); in attach_point_to_config()
 552 static int attach_point_to_config(struct bpf_tc_hook *hook, in attach_point_to_config()
 555 	switch (OPTS_GET(hook, attach_point, 0)) { in attach_point_to_config()
 559 		if (OPTS_GET(hook, parent, 0))
 595 static int tc_qdisc_modify(struct bpf_tc_hook *hook, in in tc_qdisc_modify()
 582 tc_qdisc_modify(struct bpf_tc_hook * hook,int cmd,int flags) tc_qdisc_modify()  argument
 606 tc_qdisc_create_excl(struct bpf_tc_hook * hook) tc_qdisc_create_excl()  argument
 611 tc_qdisc_delete(struct bpf_tc_hook * hook) tc_qdisc_delete()  argument
 616 bpf_tc_hook_create(struct bpf_tc_hook * hook) bpf_tc_hook_create()  argument
 632 bpf_tc_hook_destroy(struct bpf_tc_hook * hook) bpf_tc_hook_destroy()  argument
 718 bpf_tc_attach(const struct bpf_tc_hook * hook,struct bpf_tc_opts * opts) bpf_tc_attach()  argument
 792 __bpf_tc_detach(const struct bpf_tc_hook * hook,const struct bpf_tc_opts * opts,const bool flush) __bpf_tc_detach()  argument
 853 bpf_tc_detach(const struct bpf_tc_hook * hook,const struct bpf_tc_opts * opts) bpf_tc_detach()  argument
 865 bpf_tc_query(const struct bpf_tc_hook * hook,struct bpf_tc_opts * opts) bpf_tc_query()  argument
 [all...]
 | 
| /linux/fs/xfs/ | 
| H A D | xfs_hooks.c | 23 /* Make it so a function gets called whenever we hit a certain hook point. */27 	struct xfs_hook		*hook)  in xfs_hooks_add()  argument
 29 	ASSERT(hook->nb.notifier_call != NULL);  in xfs_hooks_add()
 32 	return blocking_notifier_chain_register(&chain->head, &hook->nb);  in xfs_hooks_add()
 35 /* Remove a previously installed hook. */
 39 	struct xfs_hook		*hook)  in xfs_hooks_del()  argument
 41 	blocking_notifier_chain_unregister(&chain->head, &hook->nb);  in xfs_hooks_del()
 44 /* Call a hook.  Returns the NOTIFY_* value returned by the last hook. */
 
 | 
| H A D | xfs_hooks.h | 37 typedef	int (*xfs_hook_fn_t)(struct xfs_hook *hook, unsigned long action,41 int xfs_hooks_add(struct xfs_hooks *chain, struct xfs_hook *hook);
 42 void xfs_hooks_del(struct xfs_hooks *chain, struct xfs_hook *hook);
 46 static inline void xfs_hook_setup(struct xfs_hook *hook, notifier_fn_t fn)  in xfs_hook_setup()  argument
 48 	hook->nb.notifier_call = fn;  in xfs_hook_setup()
 49 	hook->nb.priority = 0;  in xfs_hook_setup()
 
 | 
| /linux/net/ipv4/netfilter/ | 
| H A D | ipt_REJECT.c | 34 	int hook = xt_hooknum(par);  in reject_tg()  local38 		nf_send_unreach(skb, ICMP_NET_UNREACH, hook);  in reject_tg()
 41 		nf_send_unreach(skb, ICMP_HOST_UNREACH, hook);  in reject_tg()
 44 		nf_send_unreach(skb, ICMP_PROT_UNREACH, hook);  in reject_tg()
 47 		nf_send_unreach(skb, ICMP_PORT_UNREACH, hook);  in reject_tg()
 50 		nf_send_unreach(skb, ICMP_NET_ANO, hook);  in reject_tg()
 53 		nf_send_unreach(skb, ICMP_HOST_ANO, hook);  in reject_tg()
 56 		nf_send_unreach(skb, ICMP_PKT_FILTERED, hook);  in reject_tg()
 59 		nf_send_reset(xt_net(par), par->state->sk, skb, hook);  in reject_tg()
 
 | 
| /linux/drivers/acpi/ | 
| H A D | battery.c | 706 static void battery_hook_unregister_unlocked(struct acpi_battery_hook *hook)  in battery_hook_unregister_unlocked()  argument711 	 * In order to remove a hook, we first need to  in battery_hook_unregister_unlocked()
 715 		if (!hook->remove_battery(battery->bat, hook))  in battery_hook_unregister_unlocked()
 718 	list_del_init(&hook->list);  in battery_hook_unregister_unlocked()
 720 	pr_info("hook unregistered: %s\n", hook->name);  in battery_hook_unregister_unlocked()
 723 void battery_hook_unregister(struct acpi_battery_hook *hook)  in battery_hook_unregister()  argument
 728 	 * if a battery hook was previously unloaded due to an error when  in battery_hook_unregister()
 731 	if (!list_empty(&hook->list))  in battery_hook_unregister()
 732 		battery_hook_unregister_unlocked(hook);  in battery_hook_unregister()
 738 void battery_hook_register(struct acpi_battery_hook *hook)  in battery_hook_register()  argument
 [all …]
 
 | 
| /linux/security/integrity/ima/ | 
| H A D | ima.h | 49 /* bitset of digests algorithms allowed in the setxattr hook */313 #define __ima_hooks(hook)				\
 314 	hook(NONE, none)				\
 315 	hook(FILE_CHECK, file)				\
 316 	hook(MMAP_CHECK, mmap)				\
 317 	hook(MMAP_CHECK_REQPROT, mmap_reqprot)		\
 318 	hook(BPRM_CHECK, bprm)				\
 319 	hook(CREDS_CHECK, creds)			\
 320 	hook(POST_SETATTR, post_setattr)		\
 321 	hook(MODULE_CHEC
 307 __ima_hooks(hook) global()  argument
 [all...]
 | 
| /linux/security/selinux/ | 
| H A D | xfrm.c | 5  *  This file contains the SELinux XFRM hook function implementations.145  * LSM hook implementation that authorizes that a flow can use a xfrm policy
 167  * LSM hook implementation that authorizes that a state matches
 253  * LSM hook implementation that checks and/or returns the xfrm sid for the
 277  * LSM hook implementation that allocs and transfers uctx spec to xfrm_policy.
 287  * LSM hook implementation that copies security data structure from old to new
 309  * LSM hook implementation that frees xfrm_sec_ctx security information.
 317  * LSM hook implementation that authorizes deletion of labeled policies.
 325  * LSM hook implementation that allocates a xfrm_sec_state, populates it using
 335  * LSM hook implementation that allocates a xfrm_sec_state and populates based
 [all …]
 
 | 
| /linux/include/uapi/linux/netfilter/ | 
| H A D | nfnetlink_hook.h | 11  * enum nfnl_hook_attributes - netfilter hook netlink attributes13  * @NFNLA_HOOK_HOOKNUM: netfilter hook number (NLA_U32)
 14  * @NFNLA_HOOK_PRIORITY: netfilter hook priority (NLA_U32)
 16  * @NFNLA_HOOK_FUNCTION_NAME: hook function name (NLA_STRING)
 17  * @NFNLA_HOOK_MODULE_NAME: kernel module that registered this hook (NLA_STRING)
 18  * @NFNLA_HOOK_CHAIN_INFO: basechain hook metadata (NLA_NESTED)
 
 | 
| /linux/security/ipe/ | 
| H A D | hooks.c | 19  * ipe_bprm_check_security() - ipe security hook function for bprm check.23  * This LSM hook is called when a binary is loaded through the exec
 39  * ipe_mmap_file() - ipe security hook function for mmap check.
 46  * This hook is called when a file is loaded through the mmap
 67  * ipe_file_mprotect() - ipe security hook function for mprotect check.
 73  * This LSM hook is called when a mmap'd region of memory is changing
 99  * ipe_kernel_read_file() - ipe security hook function for kernel read.
 104  * This LSM hook is called when a file is read from disk in the kernel.
 145  * ipe_kernel_load_data() - ipe security hook function for kernel load data.
 149  * This LSM hook is called when a data buffer provided by userspace is loading
 [all …]
 
 | 
| /linux/tools/testing/selftests/net/netfilter/ | 
| H A D | nft_queue.sh | 97 		type filter hook prerouting priority $prio; policy accept;101 		type filter hook input priority $prio; policy accept;
 105 		type filter hook forward priority $prio; policy accept;
 110 		type filter hook output priority $prio; policy accept;
 116 		type filter hook postrouting priority $prio; policy accept;
 129 		type filter hook prerouting priority $prio; policy accept;
 133 		type filter hook input priority $prio; policy accept;
 137 		type filter hook forward priority $prio; policy accept;
 141 		type filter hook output priority $prio; policy accept;
 145 		type filter hook postroutin
 [all...]
 | 
| /linux/include/acpi/ | 
| H A D | battery.h | 16 	int (*add_battery)(struct power_supply *battery, struct acpi_battery_hook *hook);17 	int (*remove_battery)(struct power_supply *battery, struct acpi_battery_hook *hook);
 21 void battery_hook_register(struct acpi_battery_hook *hook);
 22 void battery_hook_unregister(struct acpi_battery_hook *hook);
 23 int devm_battery_hook_register(struct device *dev, struct acpi_battery_hook *hook);
 
 | 
| /linux/include/net/netfilter/ipv4/ | 
| H A D | nf_reject.h | 10 void nf_send_unreach(struct sk_buff *skb_in, int code, int hook);12 		   int hook);
 16                                          int hook, u8 code);
 20 					   int hook);
 
 | 
| /linux/sound/core/ | 
| H A D | vmaster.c | 36 	void (*hook)(void *private_data, int);  member124 		if (master->hook)  in master_init()
 125 			master->hook(master->hook_private_data, master->val);  in master_init()
 380 	if (master->hook && !first_init)  in master_put()
 381 		master->hook(master->hook_private_data, master->val);  in master_put()
 466  * snd_ctl_add_vmaster_hook - Add a hook to a vmaster control
 468  * @hook: the hook function
 471  * Adds the given hook to the vmaster control element so that it's called
 477 			     void (*hook)(void *private_data, int),  in snd_ctl_add_vmaster_hook()
 481 	master->hook = hook;  in snd_ctl_add_vmaster_hook()
 [all …]
 
 | 
| /linux/net/bridge/netfilter/ | 
| H A D | nft_reject_bridge.c | 48 					    int hook)  in nft_reject_br_send_v4_tcp_reset()  argument52 	nskb = nf_reject_skb_v4_tcp_reset(net, oldskb, NULL, hook);  in nft_reject_br_send_v4_tcp_reset()
 64 					  int hook, u8 code)  in nft_reject_br_send_v4_unreach()  argument
 68 	nskb = nf_reject_skb_v4_unreach(net, oldskb, NULL, hook, code);  in nft_reject_br_send_v4_unreach()
 80 					    int hook)  in nft_reject_br_send_v6_tcp_reset()  argument
 84 	nskb = nf_reject_skb_v6_tcp_reset(net, oldskb, NULL, hook);  in nft_reject_br_send_v6_tcp_reset()
 97 					  int hook, u8 code)  in nft_reject_br_send_v6_unreach()  argument
 101 	nskb = nf_reject_skb_v6_unreach(net, oldskb, NULL, hook, code);  in nft_reject_br_send_v6_unreach()
 
 | 
| /linux/net/ipv6/netfilter/ | 
| H A D | nf_reject_ipv6.c | 26 			 unsigned int *otcplen, int hook); in nf_reject_v6_csum_ok() 28 static bool nf_reject_v6_csum_ok(struct sk_buff *skb, int hook) in nf_reject_v6_csum_ok()
 50 	return nf_ip6_checksum(skb, hook, thoff, proto) == 0; in nf_reject_ip6hdr_validate()
 75 					   int hook) in nf_reject_skb_v6_tcp_reset()
 86 	oth = nf_reject_ip6_tcphdr_get(oldskb, &_oth, &otcplen, hook); in nf_reject_skb_v6_tcp_reset()
 136 					 int hook, u8 code) in nf_reject_skb_v6_unreach()
 158 	if (!nf_reject_v6_csum_ok(oldskb, hook)) in nf_reject_ip6_tcphdr_get()
 195 			 unsigned int *otcplen, int hook)
 232 	if (nf_ip6_checksum(oldskb, hook, tcphoff, IPPROTO_TCP)) { in nf_reject_ip6_tcphdr_put()
 312 		    int hook) in nf_send_reset6()
 15 nf_reject_v6_csum_ok(struct sk_buff * skb,int hook) nf_reject_v6_csum_ok()  argument
 62 nf_reject_skb_v6_tcp_reset(struct net * net,struct sk_buff * oldskb,const struct net_device * dev,int hook) nf_reject_skb_v6_tcp_reset()  argument
 97 nf_reject_skb_v6_unreach(struct net * net,struct sk_buff * oldskb,const struct net_device * dev,int hook,u8 code) nf_reject_skb_v6_unreach()  argument
 151 nf_reject_ip6_tcphdr_get(struct sk_buff * oldskb,struct tcphdr * otcph,unsigned int * otcplen,int hook) nf_reject_ip6_tcphdr_get()  argument
 269 nf_send_reset6(struct net * net,struct sock * sk,struct sk_buff * oldskb,int hook) nf_send_reset6()  argument
 369 reject6_csum_ok(struct sk_buff * skb,int hook) reject6_csum_ok()  argument
 [all...]
 | 
| /linux/tools/testing/selftests/bpf/progs/ | 
| H A D | verifier_lsm.c | 130 __description("lsm disabled hook: getprocattr")131 __failure __msg("points to disabled hook")
 141 __description("lsm disabled hook: setprocattr")
 142 __failure __msg("points to disabled hook")
 152 __description("lsm disabled hook: ismaclabel")
 153 __failure __msg("points to disabled hook")
 
 |