| /linux/sound/soc/generic/ |
| H A D | audio-graph-card2.c | 1055 struct graph2_custom_hooks *hooks, in graph_link() argument 1066 if (hooks && hooks->custom_normal) in graph_link() 1067 func = hooks->custom_normal; in graph_link() 1072 if (hooks && hooks->custom_dpcm) in graph_link() 1073 func = hooks->custom_dpcm; in graph_link() 1078 if (hooks && hooks->custom_c2c) in graph_link() 1079 func = hooks->custom_c2c; in graph_link() 1230 struct graph2_custom_hooks *hooks, in graph_count() argument 1273 struct graph2_custom_hooks *hooks, in graph_for_each_link() argument 1276 struct graph2_custom_hooks *hooks, in graph_for_each_link() [all …]
|
| /linux/net/netfilter/ |
| H A D | nft_fib.c | 32 unsigned int hooks; in nft_fib_validate() local 37 hooks = (1 << NF_INET_PRE_ROUTING) | in nft_fib_validate() 43 hooks = (1 << NF_INET_PRE_ROUTING) | in nft_fib_validate() 47 hooks = (1 << NF_INET_LOCAL_OUT) | in nft_fib_validate() 51 hooks = (1 << NF_INET_LOCAL_IN) | in nft_fib_validate() 62 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_fib_validate()
|
| H A D | xt_socket.c | 235 .hooks = (1 << NF_INET_PRE_ROUTING) | 247 .hooks = (1 << NF_INET_PRE_ROUTING) | 260 .hooks = (1 << NF_INET_PRE_ROUTING) | 273 .hooks = (1 << NF_INET_PRE_ROUTING) | 286 .hooks = (1 << NF_INET_PRE_ROUTING) | 299 .hooks = (1 << NF_INET_PRE_ROUTING) | 312 .hooks = (1 << NF_INET_PRE_ROUTING) |
|
| H A D | core.c | 41 /* max hooks per family/hooknum */ 153 new->hooks[nhooks] = old->hooks[i]; in nf_hook_entries_grow() 157 new->hooks[nhooks].hook = reg->hook; in nf_hook_entries_grow() 158 new->hooks[nhooks].priv = reg->priv; in nf_hook_entries_grow() 166 new->hooks[nhooks].hook = reg->hook; in nf_hook_entries_grow() 167 new->hooks[nhooks].priv = reg->priv; in nf_hook_entries_grow() 173 static void hooks_validate(const struct nf_hook_entries *hooks) in nf_hook_entries_grow() 180 orig_ops = nf_hook_entries_get_hook_ops(hooks); in hooks_validate() 182 for (i = 0; i < hooks in hooks_validate() 176 hooks_validate(const struct nf_hook_entries * hooks) hooks_validate() argument [all...] |
| H A D | xt_nat.c | 160 .hooks = (1 << NF_INET_POST_ROUTING) | 173 .hooks = (1 << NF_INET_PRE_ROUTING) | 185 .hooks = (1 << NF_INET_POST_ROUTING) | 197 .hooks = (1 << NF_INET_PRE_ROUTING) | 209 .hooks = (1 << NF_INET_POST_ROUTING) | 221 .hooks = (1 << NF_INET_PRE_ROUTING) |
|
| H A D | xt_CLASSIFY.c | 42 .hooks = (1 << NF_INET_LOCAL_OUT) | (1 << NF_INET_FORWARD) | 52 .hooks = (1 << NF_ARP_OUT) | (1 << NF_ARP_FORWARD), 62 .hooks = (1 << NF_INET_LOCAL_OUT) | (1 << NF_INET_FORWARD) |
|
| H A D | nft_meta.c | 541 unsigned int hooks; in nft_meta_get_validate_sdif() local 547 hooks = (1 << NF_INET_LOCAL_IN) | in nft_meta_get_validate_sdif() 554 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_meta_get_validate_sdif() 560 unsigned int hooks; in nft_meta_get_validate_xfrm() local 564 hooks = 1 << NF_NETDEV_INGRESS; in nft_meta_get_validate_xfrm() 569 hooks = (1 << NF_INET_PRE_ROUTING) | in nft_meta_get_validate_xfrm() 577 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_meta_get_validate_xfrm() 605 unsigned int hooks; in nft_meta_set_validate() local 612 hooks = 1 << NF_BR_PRE_ROUTING; in nft_meta_set_validate() 615 hooks = 1 << NF_NETDEV_INGRESS; in nft_meta_set_validate() [all …]
|
| H A D | nft_chain_filter.c | 35 .hooks = { 77 .hooks = { 119 .hooks = { 205 .hooks = { 263 .hooks = { 315 .hooks = {
|
| H A D | nft_chain_nat.c | 45 .hooks = { 66 .hooks = { 97 .hooks = {
|
| H A D | nft_chain_route.c | 58 .hooks = { 108 .hooks = { 139 .hooks = {
|
| H A D | nft_rt.c | 166 unsigned int hooks; in nft_rt_validate() local 180 hooks = (1 << NF_INET_FORWARD) | in nft_rt_validate() 188 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_rt_validate()
|
| H A D | nft_osf.c | 113 unsigned int hooks; in nft_osf_validate() local 119 hooks = (1 << NF_INET_LOCAL_IN) | in nft_osf_validate() 127 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_osf_validate()
|
| H A D | xt_cgroup.c | 200 .hooks = (1 << NF_INET_LOCAL_OUT) | 214 .hooks = (1 << NF_INET_LOCAL_OUT) | in cgroup_mt_exit() 228 .hooks = (1 << NF_INET_LOCAL_OUT) |
|
| H A D | xt_REDIRECT.c | 87 .hooks = (1 << NF_INET_PRE_ROUTING) | 100 .hooks = (1 << NF_INET_PRE_ROUTING) |
|
| H A D | xt_MASQUERADE.c | 80 .hooks = 1 << NF_INET_POST_ROUTING, 91 .hooks = 1 << NF_INET_POST_ROUTING,
|
| H A D | xt_TPROXY.c | 221 .hooks = 1 << NF_INET_PRE_ROUTING, 233 .hooks = 1 << NF_INET_PRE_ROUTING, 246 .hooks = 1 << NF_INET_PRE_ROUTING,
|
| H A D | nft_objref.c | 27 unsigned int hooks; in nft_objref_validate_obj_type() local 36 hooks = (1 << NF_INET_LOCAL_IN) | (1 << NF_INET_FORWARD); in nft_objref_validate_obj_type() 38 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_objref_validate_obj_type()
|
| H A D | nfnetlink_queue.c | 298 const struct nf_hook_entries *hooks, in nf_iterate() argument 304 while (i < hooks->num_hook_entries) { in nf_iterate() 305 hook = &hooks->hooks[i]; in nf_iterate() 381 const struct nf_hook_entries *hooks; in nf_reinject() local 391 hooks = nf_hook_entries_head(net, pf, entry->state.hook); in nf_reinject() 394 if (!hooks || i >= hooks->num_hook_entries) { in nf_reinject() 400 hook_entry = &hooks->hooks[i]; in nf_reinject() 414 verdict = nf_iterate(skb, &entry->state, hooks, &i); in nf_reinject()
|
| /linux/Documentation/translations/zh_CN/maintainer/ |
| H A D | configure-git.rst | 54 $ cat >.git/hooks/applypatch-msg <<'EOF' 58 test -x "$GIT_DIR/hooks/commit-msg" && 59 exec "$GIT_DIR/hooks/commit-msg" ${1+"$@"} 62 $ chmod a+x .git/hooks/applypatch-msg
|
| /linux/Documentation/security/ |
| H A D | lsm.rst | 30 general framework that would provide a set of security hooks to control 98 LSM hooks are maintained in lists. A list is maintained for each 99 hook, and the hooks are called in the order specified by CONFIG_LSM. 108 The LSM framework does not provide a mechanism for removing hooks that 112 The hooks can be viewed as falling into two major 113 categories: hooks that are used to manage the security fields and hooks 115 of hooks include the security_inode_alloc() and security_inode_free() 116 These hooks are used to allocate 118 An example of the second category of hooks
|
| /linux/Documentation/bpf/ |
| H A D | fs_kfuncs.rst | 9 BPF LSM programs need to access filesystem data from LSM hooks. The following 19 2. These kfuncs should not call into other LSM hooks, i.e. security_*(). For
|
| /linux/security/ |
| H A D | Kconfig | 105 This enables the socket and networking security hooks. 106 If enabled, a security module can use these hooks to 114 This enables the Infiniband security hooks. 115 If enabled, a security module can use these hooks to 123 This enables the XFRM (IPSec) networking security hooks. 124 If enabled, a security module can use these hooks to 133 bool "Security hooks for pathname based access control" 136 This enables the security hooks for pathname based access control. 137 If enabled, a security module can use these hooks to
|
| /linux/include/linux/ |
| H A D | via-core.h | 57 void viafb_pm_register(struct viafb_pm_hooks *hooks); 58 void viafb_pm_unregister(struct viafb_pm_hooks *hooks);
|
| /linux/Documentation/locking/ |
| H A D | lockstat.rst | 19 Lockdep already has hooks in the lock functions and maps lock instances to 22 hooks therein:: 45 __* - the hooks 48 With these hooks we provide the following statistics:
|
| /linux/security/bpf/ |
| H A D | Makefile | 5 obj-$(CONFIG_BPF_LSM) := hooks.o
|