Home
last modified time | relevance | path

Searched refs:hooks (Results 1 – 25 of 127) sorted by relevance

123456

/Linux-v5.15/net/netfilter/
Dnf_queue.c230 const struct nf_hook_entries *hooks, in nf_iterate() argument
236 while (i < hooks->num_hook_entries) { in nf_iterate()
237 hook = &hooks->hooks[i]; in nf_iterate()
276 const struct nf_hook_entries *hooks; in nf_reinject() local
286 hooks = nf_hook_entries_head(net, pf, entry->state.hook); in nf_reinject()
289 if (WARN_ON_ONCE(!hooks || i >= hooks->num_hook_entries)) { in nf_reinject()
295 hook_entry = &hooks->hooks[i]; in nf_reinject()
309 verdict = nf_iterate(skb, &entry->state, hooks, &i); in nf_reinject()
Dnft_fib.c32 unsigned int hooks; in nft_fib_validate() local
37 hooks = (1 << NF_INET_PRE_ROUTING); in nft_fib_validate()
41 hooks = (1 << NF_INET_PRE_ROUTING) | in nft_fib_validate()
45 hooks = (1 << NF_INET_LOCAL_OUT) | in nft_fib_validate()
49 hooks = (1 << NF_INET_LOCAL_IN) | in nft_fib_validate()
60 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_fib_validate()
Dxt_socket.c233 .hooks = (1 << NF_INET_PRE_ROUTING) |
245 .hooks = (1 << NF_INET_PRE_ROUTING) |
258 .hooks = (1 << NF_INET_PRE_ROUTING) |
271 .hooks = (1 << NF_INET_PRE_ROUTING) |
284 .hooks = (1 << NF_INET_PRE_ROUTING) |
297 .hooks = (1 << NF_INET_PRE_ROUTING) |
310 .hooks = (1 << NF_INET_PRE_ROUTING) |
Dcore.c144 new->hooks[nhooks] = old->hooks[i]; in nf_hook_entries_grow()
148 new->hooks[nhooks].hook = reg->hook; in nf_hook_entries_grow()
149 new->hooks[nhooks].priv = reg->priv; in nf_hook_entries_grow()
157 new->hooks[nhooks].hook = reg->hook; in nf_hook_entries_grow()
158 new->hooks[nhooks].priv = reg->priv; in nf_hook_entries_grow()
164 static void hooks_validate(const struct nf_hook_entries *hooks) in hooks_validate() argument
171 orig_ops = nf_hook_entries_get_hook_ops(hooks); in hooks_validate()
173 for (i = 0; i < hooks->num_hook_entries; i++) { in hooks_validate()
256 new->hooks[j] = old->hooks[i]; in __nf_hook_entries_try_shrink()
447 WRITE_ONCE(old->hooks[i].hook, accept_all); in nf_remove_net_hook()
[all …]
Dxt_nat.c160 .hooks = (1 << NF_INET_POST_ROUTING) |
173 .hooks = (1 << NF_INET_PRE_ROUTING) |
185 .hooks = (1 << NF_INET_POST_ROUTING) |
197 .hooks = (1 << NF_INET_PRE_ROUTING) |
209 .hooks = (1 << NF_INET_POST_ROUTING) |
221 .hooks = (1 << NF_INET_PRE_ROUTING) |
Dnft_meta.c545 unsigned int hooks; in nft_meta_get_validate_sdif() local
551 hooks = (1 << NF_INET_LOCAL_IN) | in nft_meta_get_validate_sdif()
558 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_meta_get_validate_sdif()
564 unsigned int hooks; in nft_meta_get_validate_xfrm() local
568 hooks = 1 << NF_NETDEV_INGRESS; in nft_meta_get_validate_xfrm()
573 hooks = (1 << NF_INET_PRE_ROUTING) | in nft_meta_get_validate_xfrm()
581 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_meta_get_validate_xfrm()
611 unsigned int hooks; in nft_meta_set_validate() local
618 hooks = 1 << NF_BR_PRE_ROUTING; in nft_meta_set_validate()
621 hooks = 1 << NF_NETDEV_INGRESS; in nft_meta_set_validate()
[all …]
Dnf_conntrack_sip.c863 const struct nf_nat_sip_hooks *hooks; in set_expected_rtp_rtcp() local
949 hooks = rcu_dereference(nf_nat_sip_hooks); in set_expected_rtp_rtcp()
950 if (hooks && in set_expected_rtp_rtcp()
951 !hooks->sdp_port(skb, protoff, dataoff, dptr, datalen, in set_expected_rtp_rtcp()
971 hooks = rcu_dereference(nf_nat_sip_hooks); in set_expected_rtp_rtcp()
972 if (hooks && ct->status & IPS_NAT_MASK && !direct_rtp) in set_expected_rtp_rtcp()
973 ret = hooks->sdp_media(skb, protoff, dataoff, dptr, in set_expected_rtp_rtcp()
1039 const struct nf_nat_sip_hooks *hooks; in process_sdp() local
1044 hooks = rcu_dereference(nf_nat_sip_hooks); in process_sdp()
1112 if (maddr_len && hooks && ct->status & IPS_NAT_MASK) { in process_sdp()
[all …]
Dnft_chain_filter.c35 .hooks = {
77 .hooks = {
119 .hooks = {
205 .hooks = {
263 .hooks = {
314 .hooks = {
Dnft_chain_nat.c45 .hooks = {
66 .hooks = {
97 .hooks = {
Dxt_CLASSIFY.c42 .hooks = (1 << NF_INET_LOCAL_OUT) | (1 << NF_INET_FORWARD) |
52 .hooks = (1 << NF_ARP_OUT) | (1 << NF_ARP_FORWARD),
Dnft_xfrm.c234 unsigned int hooks; in nft_xfrm_validate() local
238 hooks = (1 << NF_INET_FORWARD) | in nft_xfrm_validate()
243 hooks = (1 << NF_INET_FORWARD) | in nft_xfrm_validate()
252 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_xfrm_validate()
Dnft_chain_route.c58 .hooks = {
108 .hooks = {
139 .hooks = {
Dnft_rt.c167 unsigned int hooks; in nft_rt_validate() local
176 hooks = (1 << NF_INET_FORWARD) | in nft_rt_validate()
184 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_rt_validate()
Dxt_REDIRECT.c81 .hooks = (1 << NF_INET_PRE_ROUTING) |
94 .hooks = (1 << NF_INET_PRE_ROUTING) |
Dxt_cgroup.c174 .hooks = (1 << NF_INET_LOCAL_OUT) |
188 .hooks = (1 << NF_INET_LOCAL_OUT) |
202 .hooks = (1 << NF_INET_LOCAL_OUT) |
Dxt_MASQUERADE.c80 .hooks = 1 << NF_INET_POST_ROUTING,
91 .hooks = 1 << NF_INET_POST_ROUTING,
/Linux-v5.15/drivers/video/fbdev/via/
Dvia-core.c564 void viafb_pm_register(struct viafb_pm_hooks *hooks) in viafb_pm_register() argument
566 INIT_LIST_HEAD(&hooks->list); in viafb_pm_register()
569 list_add_tail(&hooks->list, &viafb_pm_hooks); in viafb_pm_register()
574 void viafb_pm_unregister(struct viafb_pm_hooks *hooks) in viafb_pm_unregister() argument
577 list_del(&hooks->list); in viafb_pm_unregister()
584 struct viafb_pm_hooks *hooks; in via_suspend() local
596 list_for_each_entry_reverse(hooks, &viafb_pm_hooks, list) in via_suspend()
597 hooks->suspend(hooks->private); in via_suspend()
605 struct viafb_pm_hooks *hooks; in via_resume() local
609 list_for_each_entry(hooks, &viafb_pm_hooks, list) in via_resume()
[all …]
/Linux-v5.15/Documentation/translations/zh_CN/maintainer/
Dconfigure-git.rst54 $ cat >.git/hooks/applypatch-msg <<'EOF'
58 test -x "$GIT_DIR/hooks/commit-msg" &&
59 exec "$GIT_DIR/hooks/commit-msg" ${1+"$@"}
62 $ chmod a+x .git/hooks/applypatch-msg
/Linux-v5.15/Documentation/security/
Dlsm.rst30 general framework that would provide a set of security hooks to control
98 LSM hooks are maintained in lists. A list is maintained for each
99 hook, and the hooks are called in the order specified by CONFIG_LSM.
108 The LSM framework does not provide a mechanism for removing hooks that
112 The hooks can be viewed as falling into two major
113 categories: hooks that are used to manage the security fields and hooks
115 of hooks include the security_inode_alloc() and security_inode_free()
116 These hooks are used to allocate
118 An example of the second category of hooks
/Linux-v5.15/include/linux/
Dlsm_hooks.h1615 extern void security_add_hooks(struct security_hook_list *hooks, int count,
1661 static inline void security_delete_hooks(struct security_hook_list *hooks, in security_delete_hooks() argument
1667 hlist_del_rcu(&hooks[i].list); in security_delete_hooks()
Dvia-core.h57 void viafb_pm_register(struct viafb_pm_hooks *hooks);
58 void viafb_pm_unregister(struct viafb_pm_hooks *hooks);
/Linux-v5.15/arch/arm64/kernel/
Darmv8_deprecated.c47 struct undef_hook *hooks; member
67 BUG_ON(!ops->hooks); in register_emulation_hooks()
69 for (hook = ops->hooks; hook->instr_mask; hook++) in register_emulation_hooks()
79 BUG_ON(!ops->hooks); in remove_emulation_hooks()
81 for (hook = ops->hooks; hook->instr_mask; hook++) in remove_emulation_hooks()
456 .hooks = swp_hooks,
543 .hooks = cp15_barrier_hooks,
616 .hooks = setend_hooks,
/Linux-v5.15/Documentation/maintainer/
Dconfigure-git.rst56 $ cat >.git/hooks/applypatch-msg <<'EOF'
60 test -x "$GIT_DIR/hooks/commit-msg" &&
61 exec "$GIT_DIR/hooks/commit-msg" ${1+"$@"}
64 $ chmod a+x .git/hooks/applypatch-msg
/Linux-v5.15/Documentation/vm/
Dcleancache.rst162 The core hooks for cleancache in VFS are in most cases a single line
165 the page cache, and disk. All hooks compile into nothingness if
172 Some filesystems are built entirely on top of VFS and the hooks
175 But for some filesystems (such as btrfs), the VFS hooks are
176 incomplete and one or more hooks in fs-specific code are required.
183 that untested filesystems are not affected, and the hooks in the
187 The total impact of the hooks to existing fs and mm files is only
220 overcommitted in a virtual workload); and because the hooks are
233 poorly layered filesystems must either add additional hooks
243 add hooks to do the equivalent cleancache "invalidate" operations
[all …]
/Linux-v5.15/security/
DKconfig52 This enables the socket and networking security hooks.
53 If enabled, a security module can use these hooks to
72 This enables the Infiniband security hooks.
73 If enabled, a security module can use these hooks to
81 This enables the XFRM (IPSec) networking security hooks.
82 If enabled, a security module can use these hooks to
91 bool "Security hooks for pathname based access control"
94 This enables the security hooks for pathname based access control.
95 If enabled, a security module can use these hooks to

123456