/Linux-v5.10/net/netfilter/ |
D | nf_queue.c | 239 const struct nf_hook_entries *hooks, in nf_iterate() argument 245 while (i < hooks->num_hook_entries) { in nf_iterate() 246 hook = &hooks->hooks[i]; in nf_iterate() 285 const struct nf_hook_entries *hooks; in nf_reinject() local 295 hooks = nf_hook_entries_head(net, pf, entry->state.hook); in nf_reinject() 298 if (WARN_ON_ONCE(!hooks || i >= hooks->num_hook_entries)) { in nf_reinject() 304 hook_entry = &hooks->hooks[i]; in nf_reinject() 318 verdict = nf_iterate(skb, &entry->state, hooks, &i); in nf_reinject()
|
D | nft_fib.c | 32 unsigned int hooks; in nft_fib_validate() local 37 hooks = (1 << NF_INET_PRE_ROUTING); in nft_fib_validate() 41 hooks = (1 << NF_INET_PRE_ROUTING) | in nft_fib_validate() 45 hooks = (1 << NF_INET_LOCAL_OUT) | in nft_fib_validate() 49 hooks = (1 << NF_INET_LOCAL_IN) | in nft_fib_validate() 60 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_fib_validate()
|
D | xt_socket.c | 225 .hooks = (1 << NF_INET_PRE_ROUTING) | 236 .hooks = (1 << NF_INET_PRE_ROUTING) | 248 .hooks = (1 << NF_INET_PRE_ROUTING) | 260 .hooks = (1 << NF_INET_PRE_ROUTING) | 272 .hooks = (1 << NF_INET_PRE_ROUTING) | 284 .hooks = (1 << NF_INET_PRE_ROUTING) | 296 .hooks = (1 << NF_INET_PRE_ROUTING) |
|
D | core.c | 144 new->hooks[nhooks] = old->hooks[i]; in nf_hook_entries_grow() 148 new->hooks[nhooks].hook = reg->hook; in nf_hook_entries_grow() 149 new->hooks[nhooks].priv = reg->priv; in nf_hook_entries_grow() 157 new->hooks[nhooks].hook = reg->hook; in nf_hook_entries_grow() 158 new->hooks[nhooks].priv = reg->priv; in nf_hook_entries_grow() 164 static void hooks_validate(const struct nf_hook_entries *hooks) in hooks_validate() argument 171 orig_ops = nf_hook_entries_get_hook_ops(hooks); in hooks_validate() 173 for (i = 0; i < hooks->num_hook_entries; i++) { in hooks_validate() 256 new->hooks[j] = old->hooks[i]; in __nf_hook_entries_try_shrink() 447 WRITE_ONCE(old->hooks[i].hook, accept_all); in nf_remove_net_hook() [all …]
|
D | xt_nat.c | 160 .hooks = (1 << NF_INET_POST_ROUTING) | 173 .hooks = (1 << NF_INET_PRE_ROUTING) | 185 .hooks = (1 << NF_INET_POST_ROUTING) | 197 .hooks = (1 << NF_INET_PRE_ROUTING) | 209 .hooks = (1 << NF_INET_POST_ROUTING) | 221 .hooks = (1 << NF_INET_PRE_ROUTING) |
|
D | nft_meta.c | 546 unsigned int hooks; in nft_meta_get_validate_sdif() local 552 hooks = (1 << NF_INET_LOCAL_IN) | in nft_meta_get_validate_sdif() 559 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_meta_get_validate_sdif() 565 unsigned int hooks; in nft_meta_get_validate_xfrm() local 569 hooks = 1 << NF_NETDEV_INGRESS; in nft_meta_get_validate_xfrm() 574 hooks = (1 << NF_INET_PRE_ROUTING) | in nft_meta_get_validate_xfrm() 582 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_meta_get_validate_xfrm() 612 unsigned int hooks; in nft_meta_set_validate() local 619 hooks = 1 << NF_BR_PRE_ROUTING; in nft_meta_set_validate() 622 hooks = 1 << NF_NETDEV_INGRESS; in nft_meta_set_validate() [all …]
|
D | nf_conntrack_sip.c | 863 const struct nf_nat_sip_hooks *hooks; in set_expected_rtp_rtcp() local 949 hooks = rcu_dereference(nf_nat_sip_hooks); in set_expected_rtp_rtcp() 950 if (hooks && in set_expected_rtp_rtcp() 951 !hooks->sdp_port(skb, protoff, dataoff, dptr, datalen, in set_expected_rtp_rtcp() 971 hooks = rcu_dereference(nf_nat_sip_hooks); in set_expected_rtp_rtcp() 972 if (hooks && ct->status & IPS_NAT_MASK && !direct_rtp) in set_expected_rtp_rtcp() 973 ret = hooks->sdp_media(skb, protoff, dataoff, dptr, in set_expected_rtp_rtcp() 1039 const struct nf_nat_sip_hooks *hooks; in process_sdp() local 1044 hooks = rcu_dereference(nf_nat_sip_hooks); in process_sdp() 1112 if (maddr_len && hooks && ct->status & IPS_NAT_MASK) { in process_sdp() [all …]
|
D | nft_chain_filter.c | 35 .hooks = { 77 .hooks = { 119 .hooks = { 205 .hooks = { 263 .hooks = { 314 .hooks = {
|
D | nft_chain_nat.c | 45 .hooks = { 66 .hooks = { 97 .hooks = {
|
D | xt_CLASSIFY.c | 42 .hooks = (1 << NF_INET_LOCAL_OUT) | (1 << NF_INET_FORWARD) | 52 .hooks = (1 << NF_ARP_OUT) | (1 << NF_ARP_FORWARD),
|
D | nft_xfrm.c | 235 unsigned int hooks; in nft_xfrm_validate() local 239 hooks = (1 << NF_INET_FORWARD) | in nft_xfrm_validate() 244 hooks = (1 << NF_INET_FORWARD) | in nft_xfrm_validate() 253 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_xfrm_validate()
|
D | nft_chain_route.c | 58 .hooks = { 108 .hooks = { 139 .hooks = {
|
D | nft_rt.c | 168 unsigned int hooks; in nft_rt_validate() local 177 hooks = (1 << NF_INET_FORWARD) | in nft_rt_validate() 185 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_rt_validate()
|
D | xt_REDIRECT.c | 81 .hooks = (1 << NF_INET_PRE_ROUTING) | 94 .hooks = (1 << NF_INET_PRE_ROUTING) |
|
D | xt_cgroup.c | 174 .hooks = (1 << NF_INET_LOCAL_OUT) | 188 .hooks = (1 << NF_INET_LOCAL_OUT) | 202 .hooks = (1 << NF_INET_LOCAL_OUT) |
|
D | xt_MASQUERADE.c | 80 .hooks = 1 << NF_INET_POST_ROUTING, 91 .hooks = 1 << NF_INET_POST_ROUTING,
|
/Linux-v5.10/drivers/video/fbdev/via/ |
D | via-core.c | 564 void viafb_pm_register(struct viafb_pm_hooks *hooks) in viafb_pm_register() argument 566 INIT_LIST_HEAD(&hooks->list); in viafb_pm_register() 569 list_add_tail(&hooks->list, &viafb_pm_hooks); in viafb_pm_register() 574 void viafb_pm_unregister(struct viafb_pm_hooks *hooks) in viafb_pm_unregister() argument 577 list_del(&hooks->list); in viafb_pm_unregister() 584 struct viafb_pm_hooks *hooks; in via_suspend() local 596 list_for_each_entry_reverse(hooks, &viafb_pm_hooks, list) in via_suspend() 597 hooks->suspend(hooks->private); in via_suspend() 605 struct viafb_pm_hooks *hooks; in via_resume() local 609 list_for_each_entry(hooks, &viafb_pm_hooks, list) in via_resume() [all …]
|
/Linux-v5.10/Documentation/security/ |
D | lsm.rst | 30 general framework that would provide a set of security hooks to control 98 LSM hooks are maintained in lists. A list is maintained for each 99 hook, and the hooks are called in the order specified by CONFIG_LSM. 108 The LSM framework does not provide a mechanism for removing hooks that 112 The hooks can be viewed as falling into two major 113 categories: hooks that are used to manage the security fields and hooks 115 of hooks include the security_inode_alloc() and security_inode_free() 116 These hooks are used to allocate 118 An example of the second category of hooks
|
/Linux-v5.10/include/linux/ |
D | lsm_hooks.h | 1589 extern void security_add_hooks(struct security_hook_list *hooks, int count, 1635 static inline void security_delete_hooks(struct security_hook_list *hooks, in security_delete_hooks() argument 1641 hlist_del_rcu(&hooks[i].list); in security_delete_hooks()
|
D | via-core.h | 57 void viafb_pm_register(struct viafb_pm_hooks *hooks); 58 void viafb_pm_unregister(struct viafb_pm_hooks *hooks);
|
/Linux-v5.10/arch/arm64/kernel/ |
D | armv8_deprecated.c | 47 struct undef_hook *hooks; member 67 BUG_ON(!ops->hooks); in register_emulation_hooks() 69 for (hook = ops->hooks; hook->instr_mask; hook++) in register_emulation_hooks() 79 BUG_ON(!ops->hooks); in remove_emulation_hooks() 81 for (hook = ops->hooks; hook->instr_mask; hook++) in remove_emulation_hooks() 456 .hooks = swp_hooks, 543 .hooks = cp15_barrier_hooks, 616 .hooks = setend_hooks,
|
/Linux-v5.10/Documentation/maintainer/ |
D | configure-git.rst | 56 $ cat >.git/hooks/applypatch-msg <<'EOF' 60 test -x "$GIT_DIR/hooks/commit-msg" && 61 exec "$GIT_DIR/hooks/commit-msg" ${1+"$@"} 64 $ chmod a+x .git/hooks/applypatch-msg
|
/Linux-v5.10/Documentation/vm/ |
D | cleancache.rst | 162 The core hooks for cleancache in VFS are in most cases a single line 165 the page cache, and disk. All hooks compile into nothingness if 172 Some filesystems are built entirely on top of VFS and the hooks 175 But for some filesystems (such as btrfs), the VFS hooks are 176 incomplete and one or more hooks in fs-specific code are required. 183 that untested filesystems are not affected, and the hooks in the 187 The total impact of the hooks to existing fs and mm files is only 220 overcommitted in a virtual workload); and because the hooks are 233 poorly layered filesystems must either add additional hooks 243 add hooks to do the equivalent cleancache "invalidate" operations [all …]
|
/Linux-v5.10/security/ |
D | Kconfig | 52 This enables the socket and networking security hooks. 53 If enabled, a security module can use these hooks to 72 This enables the Infiniband security hooks. 73 If enabled, a security module can use these hooks to 81 This enables the XFRM (IPSec) networking security hooks. 82 If enabled, a security module can use these hooks to 91 bool "Security hooks for pathname based access control" 94 This enables the security hooks for pathname based access control. 95 If enabled, a security module can use these hooks to
|
/Linux-v5.10/Documentation/networking/ |
D | nf_flowtable.rst | 21 netfilter hooks coming after the ingress). In case of flowtable miss, the packet 35 including the Netfilter hooks and the flowtable fastpath bypass. 67 Fig.1 Netfilter hooks and flowtable interactions 96 hooks are run in the pipeline, this is convenient in case you already have a
|