/Linux-v4.19/net/netfilter/ |
D | nf_queue.c | 230 const struct nf_hook_entries *hooks, in nf_iterate() argument 236 while (i < hooks->num_hook_entries) { in nf_iterate() 237 hook = &hooks->hooks[i]; in nf_iterate() 275 const struct nf_hook_entries *hooks; in nf_reinject() local 285 hooks = nf_hook_entries_head(net, pf, entry->state.hook); in nf_reinject() 290 if (WARN_ON_ONCE(!hooks || i >= hooks->num_hook_entries)) { in nf_reinject() 296 hook_entry = &hooks->hooks[i]; in nf_reinject() 310 verdict = nf_iterate(skb, &entry->state, hooks, &i); in nf_reinject() 321 err = nf_queue(skb, &entry->state, hooks, i, verdict); in nf_reinject()
|
D | nft_fib.c | 34 unsigned int hooks; in nft_fib_validate() local 39 hooks = (1 << NF_INET_PRE_ROUTING); in nft_fib_validate() 43 hooks = (1 << NF_INET_PRE_ROUTING) | in nft_fib_validate() 47 hooks = (1 << NF_INET_LOCAL_OUT) | in nft_fib_validate() 51 hooks = (1 << NF_INET_LOCAL_IN) | in nft_fib_validate() 62 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_fib_validate()
|
D | xt_socket.c | 229 .hooks = (1 << NF_INET_PRE_ROUTING) | 240 .hooks = (1 << NF_INET_PRE_ROUTING) | 252 .hooks = (1 << NF_INET_PRE_ROUTING) | 264 .hooks = (1 << NF_INET_PRE_ROUTING) | 276 .hooks = (1 << NF_INET_PRE_ROUTING) | 288 .hooks = (1 << NF_INET_PRE_ROUTING) | 300 .hooks = (1 << NF_INET_PRE_ROUTING) |
|
D | core.c | 143 new->hooks[nhooks] = old->hooks[i]; in nf_hook_entries_grow() 147 new->hooks[nhooks].hook = reg->hook; in nf_hook_entries_grow() 148 new->hooks[nhooks].priv = reg->priv; in nf_hook_entries_grow() 156 new->hooks[nhooks].hook = reg->hook; in nf_hook_entries_grow() 157 new->hooks[nhooks].priv = reg->priv; in nf_hook_entries_grow() 163 static void hooks_validate(const struct nf_hook_entries *hooks) in hooks_validate() argument 170 orig_ops = nf_hook_entries_get_hook_ops(hooks); in hooks_validate() 172 for (i = 0; i < hooks->num_hook_entries; i++) { in hooks_validate() 255 new->hooks[j] = old->hooks[i]; in __nf_hook_entries_try_shrink() 377 WRITE_ONCE(old->hooks[i].hook, accept_all); in nf_remove_net_hook() [all …]
|
D | xt_nat.c | 163 .hooks = (1 << NF_INET_POST_ROUTING) | 176 .hooks = (1 << NF_INET_PRE_ROUTING) | 188 .hooks = (1 << NF_INET_POST_ROUTING) | 200 .hooks = (1 << NF_INET_PRE_ROUTING) | 212 .hooks = (1 << NF_INET_POST_ROUTING) | 222 .hooks = (1 << NF_INET_PRE_ROUTING) |
|
D | nft_meta.c | 372 unsigned int hooks; in nft_meta_get_validate() local 379 hooks = 1 << NF_NETDEV_INGRESS; in nft_meta_get_validate() 384 hooks = (1 << NF_INET_PRE_ROUTING) | in nft_meta_get_validate() 392 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_meta_get_validate() 403 unsigned int hooks; in nft_meta_set_validate() local 410 hooks = 1 << NF_BR_PRE_ROUTING; in nft_meta_set_validate() 413 hooks = 1 << NF_NETDEV_INGRESS; in nft_meta_set_validate() 418 hooks = 1 << NF_INET_PRE_ROUTING; in nft_meta_set_validate() 424 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_meta_set_validate()
|
D | nf_conntrack_sip.c | 857 const struct nf_nat_sip_hooks *hooks; in set_expected_rtp_rtcp() local 913 hooks = rcu_dereference(nf_nat_sip_hooks); in set_expected_rtp_rtcp() 914 if (hooks && in set_expected_rtp_rtcp() 915 !hooks->sdp_port(skb, protoff, dataoff, dptr, datalen, in set_expected_rtp_rtcp() 935 hooks = rcu_dereference(nf_nat_sip_hooks); in set_expected_rtp_rtcp() 936 if (hooks && ct->status & IPS_NAT_MASK && !direct_rtp) in set_expected_rtp_rtcp() 937 ret = hooks->sdp_media(skb, protoff, dataoff, dptr, in set_expected_rtp_rtcp() 999 const struct nf_nat_sip_hooks *hooks; in process_sdp() local 1004 hooks = rcu_dereference(nf_nat_sip_hooks); in process_sdp() 1072 if (maddr_len && hooks && ct->status & IPS_NAT_MASK) { in process_sdp() [all …]
|
D | nft_chain_filter.c | 35 .hooks = { 77 .hooks = { 119 .hooks = { 173 .hooks = { 230 .hooks = { 281 .hooks = {
|
D | xt_CLASSIFY.c | 45 .hooks = (1 << NF_INET_LOCAL_OUT) | (1 << NF_INET_FORWARD) | 55 .hooks = (1 << NF_ARP_OUT) | (1 << NF_ARP_FORWARD),
|
D | nft_rt.c | 161 unsigned int hooks; in nft_rt_validate() local 169 hooks = (1 << NF_INET_FORWARD) | in nft_rt_validate() 177 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_rt_validate()
|
D | xt_REDIRECT.c | 84 .hooks = (1 << NF_INET_PRE_ROUTING) | 97 .hooks = (1 << NF_INET_PRE_ROUTING) |
|
D | xt_cgroup.c | 119 .hooks = (1 << NF_INET_LOCAL_OUT) | 133 .hooks = (1 << NF_INET_LOCAL_OUT) |
|
D | xt_TPROXY.c | 235 .hooks = 1 << NF_INET_PRE_ROUTING, 246 .hooks = 1 << NF_INET_PRE_ROUTING, 258 .hooks = 1 << NF_INET_PRE_ROUTING,
|
/Linux-v4.19/drivers/tty/serial/ |
D | ioc4_serial.c | 475 struct hooks *ip_hooks; 520 struct hooks { struct 533 static struct hooks hooks_array[IOC4_NUM_SERIAL_PORTS] = { argument 827 struct hooks *hooks = port->ip_hooks; in port_init() local 905 write_ireg(port->ip_ioc4_soft, hooks->intr_clear, in port_init() 907 port->ip_ienb &= ~hooks->intr_clear; in port_init() 908 writel(hooks->intr_clear, &port->ip_mem->sio_ir.raw); in port_init() 921 struct hooks *hooks = port->ip_hooks; in handle_dma_error_intr() local 927 writel(hooks->intr_dma_error, &port->ip_mem->other_ir.raw); in handle_dma_error_intr() 952 write_ireg(port->ip_ioc4_soft, hooks->intr_dma_error, IOC4_W_IES, in handle_dma_error_intr() [all …]
|
D | ioc3_serial.c | 380 struct port_hooks *hooks = port->ip_hooks; in port_init() local 470 port->ip_card->ic_enable &= ~hooks->intr_clear; in port_init() 471 ioc3_disable(port->ip_is, idd, hooks->intr_clear); in port_init() 472 ioc3_ack(port->ip_is, idd, hooks->intr_clear); in port_init() 681 struct port_hooks *hooks = port->ip_hooks; in do_write() local 747 enable_intrs(port, hooks->intr_tx_mt); in do_write() 775 struct port_hooks *hooks = port->ip_hooks; in set_notification() local 783 intrbits |= (hooks->intr_rx_timer | hooks->intr_rx_high); in set_notification() 785 intrbits |= hooks->intr_tx_explicit; in set_notification() 787 intrbits |= hooks->intr_delta_dcd; in set_notification() [all …]
|
/Linux-v4.19/Documentation/ |
D | lsm.txt | 30 general framework that would provide a set of security hooks to control 92 collection of substructures that group related hooks based on the kernel 101 Linus mentioned per-process security hooks in his original remarks as a 102 possible alternative to global security hooks. However, if LSM were to 103 start from the perspective of per-process hooks, then the base framework 107 composing hooks in the base framework. Additionally, LSM would still 108 need global hooks for operations that have no process context (e.g. 110 hooks, but a security module is free to implement per-process hooks 112 process' security field and then invoking these per-process hooks from 113 the global hooks. The problem of composition is thus deferred to the [all …]
|
/Linux-v4.19/drivers/video/fbdev/via/ |
D | via-core.c | 607 void viafb_pm_register(struct viafb_pm_hooks *hooks) in viafb_pm_register() argument 609 INIT_LIST_HEAD(&hooks->list); in viafb_pm_register() 612 list_add_tail(&hooks->list, &viafb_pm_hooks); in viafb_pm_register() 617 void viafb_pm_unregister(struct viafb_pm_hooks *hooks) in viafb_pm_unregister() argument 620 list_del(&hooks->list); in viafb_pm_unregister() 627 struct viafb_pm_hooks *hooks; in via_suspend() local 641 list_for_each_entry_reverse(hooks, &viafb_pm_hooks, list) in via_suspend() 642 hooks->suspend(hooks->private); in via_suspend() 653 struct viafb_pm_hooks *hooks; in via_resume() local 665 list_for_each_entry(hooks, &viafb_pm_hooks, list) in via_resume() [all …]
|
/Linux-v4.19/arch/arm64/kernel/ |
D | armv8_deprecated.c | 50 struct undef_hook *hooks; member 70 BUG_ON(!ops->hooks); in register_emulation_hooks() 72 for (hook = ops->hooks; hook->instr_mask; hook++) in register_emulation_hooks() 82 BUG_ON(!ops->hooks); in remove_emulation_hooks() 84 for (hook = ops->hooks; hook->instr_mask; hook++) in remove_emulation_hooks() 454 .hooks = swp_hooks, 541 .hooks = cp15_barrier_hooks, 614 .hooks = setend_hooks,
|
/Linux-v4.19/security/ |
D | Kconfig | 52 This enables the socket and networking security hooks. 53 If enabled, a security module can use these hooks to 72 This enables the Infiniband security hooks. 73 If enabled, a security module can use these hooks to 81 This enables the XFRM (IPSec) networking security hooks. 82 If enabled, a security module can use these hooks to 91 bool "Security hooks for pathname based access control" 94 This enables the security hooks for pathname based access control. 95 If enabled, a security module can use these hooks to
|
/Linux-v4.19/Documentation/vm/ |
D | cleancache.rst | 162 The core hooks for cleancache in VFS are in most cases a single line 165 the page cache, and disk. All hooks compile into nothingness if 172 Some filesystems are built entirely on top of VFS and the hooks 175 But for some filesystems (such as btrfs), the VFS hooks are 176 incomplete and one or more hooks in fs-specific code are required. 183 that untested filesystems are not affected, and the hooks in the 187 The total impact of the hooks to existing fs and mm files is only 220 overcommitted in a virtual workload); and because the hooks are 233 poorly layered filesystems must either add additional hooks 243 add hooks to do the equivalent cleancache "invalidate" operations [all …]
|
/Linux-v4.19/include/linux/ |
D | via-core.h | 73 void viafb_pm_register(struct viafb_pm_hooks *hooks); 74 void viafb_pm_unregister(struct viafb_pm_hooks *hooks);
|
/Linux-v4.19/Documentation/networking/ |
D | nf_flowtable.txt | 18 netfilter hooks coming after the ingress). In case of flowtable miss, the packet 32 including the Netfilter hooks and the flowtable fastpath bypass. 62 Fig.1 Netfilter hooks and flowtable interactions 91 hooks are run in the pipeline, this is convenient in case you already have a
|
/Linux-v4.19/Documentation/locking/ |
D | lockstat.txt | 14 Lockdep already has hooks in the lock functions and maps lock instances to 17 hooks therein. 40 __* - the hooks 43 With these hooks we provide the following statistics:
|
/Linux-v4.19/fs/crypto/ |
D | Makefile | 3 fscrypto-y := crypto.o fname.o hooks.o keyinfo.o policy.o
|
/Linux-v4.19/net/ipv6/netfilter/ |
D | ip6t_NPT.c | 118 .hooks = (1 << NF_INET_LOCAL_IN) | 130 .hooks = (1 << NF_INET_PRE_ROUTING) |
|