Home
last modified time | relevance | path

Searched refs:hooks (Results 1 – 25 of 137) sorted by relevance

123456

/Linux-v5.4/net/netfilter/
Dnf_queue.c249 const struct nf_hook_entries *hooks, in nf_iterate() argument
255 while (i < hooks->num_hook_entries) { in nf_iterate()
256 hook = &hooks->hooks[i]; in nf_iterate()
295 const struct nf_hook_entries *hooks; in nf_reinject() local
305 hooks = nf_hook_entries_head(net, pf, entry->state.hook); in nf_reinject()
310 if (WARN_ON_ONCE(!hooks || i >= hooks->num_hook_entries)) { in nf_reinject()
316 hook_entry = &hooks->hooks[i]; in nf_reinject()
330 verdict = nf_iterate(skb, &entry->state, hooks, &i); in nf_reinject()
Dnft_fib.c32 unsigned int hooks; in nft_fib_validate() local
37 hooks = (1 << NF_INET_PRE_ROUTING); in nft_fib_validate()
41 hooks = (1 << NF_INET_PRE_ROUTING) | in nft_fib_validate()
45 hooks = (1 << NF_INET_LOCAL_OUT) | in nft_fib_validate()
49 hooks = (1 << NF_INET_LOCAL_IN) | in nft_fib_validate()
60 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_fib_validate()
Dxt_socket.c225 .hooks = (1 << NF_INET_PRE_ROUTING) |
236 .hooks = (1 << NF_INET_PRE_ROUTING) |
248 .hooks = (1 << NF_INET_PRE_ROUTING) |
260 .hooks = (1 << NF_INET_PRE_ROUTING) |
272 .hooks = (1 << NF_INET_PRE_ROUTING) |
284 .hooks = (1 << NF_INET_PRE_ROUTING) |
296 .hooks = (1 << NF_INET_PRE_ROUTING) |
Dcore.c144 new->hooks[nhooks] = old->hooks[i]; in nf_hook_entries_grow()
148 new->hooks[nhooks].hook = reg->hook; in nf_hook_entries_grow()
149 new->hooks[nhooks].priv = reg->priv; in nf_hook_entries_grow()
157 new->hooks[nhooks].hook = reg->hook; in nf_hook_entries_grow()
158 new->hooks[nhooks].priv = reg->priv; in nf_hook_entries_grow()
164 static void hooks_validate(const struct nf_hook_entries *hooks) in hooks_validate() argument
171 orig_ops = nf_hook_entries_get_hook_ops(hooks); in hooks_validate()
173 for (i = 0; i < hooks->num_hook_entries; i++) { in hooks_validate()
256 new->hooks[j] = old->hooks[i]; in __nf_hook_entries_try_shrink()
378 WRITE_ONCE(old->hooks[i].hook, accept_all); in nf_remove_net_hook()
[all …]
Dxt_nat.c160 .hooks = (1 << NF_INET_POST_ROUTING) |
173 .hooks = (1 << NF_INET_PRE_ROUTING) |
185 .hooks = (1 << NF_INET_POST_ROUTING) |
197 .hooks = (1 << NF_INET_PRE_ROUTING) |
209 .hooks = (1 << NF_INET_POST_ROUTING) |
221 .hooks = (1 << NF_INET_PRE_ROUTING) |
Dnft_chain_filter.c35 .hooks = {
77 .hooks = {
119 .hooks = {
173 .hooks = {
230 .hooks = {
281 .hooks = {
Dnf_conntrack_sip.c863 const struct nf_nat_sip_hooks *hooks; in set_expected_rtp_rtcp() local
949 hooks = rcu_dereference(nf_nat_sip_hooks); in set_expected_rtp_rtcp()
950 if (hooks && in set_expected_rtp_rtcp()
951 !hooks->sdp_port(skb, protoff, dataoff, dptr, datalen, in set_expected_rtp_rtcp()
971 hooks = rcu_dereference(nf_nat_sip_hooks); in set_expected_rtp_rtcp()
972 if (hooks && ct->status & IPS_NAT_MASK && !direct_rtp) in set_expected_rtp_rtcp()
973 ret = hooks->sdp_media(skb, protoff, dataoff, dptr, in set_expected_rtp_rtcp()
1039 const struct nf_nat_sip_hooks *hooks; in process_sdp() local
1044 hooks = rcu_dereference(nf_nat_sip_hooks); in process_sdp()
1112 if (maddr_len && hooks && ct->status & IPS_NAT_MASK) { in process_sdp()
[all …]
Dnft_chain_nat.c45 .hooks = {
66 .hooks = {
96 .hooks = {
Dnft_meta.c395 unsigned int hooks; in nft_meta_get_validate() local
402 hooks = 1 << NF_NETDEV_INGRESS; in nft_meta_get_validate()
407 hooks = (1 << NF_INET_PRE_ROUTING) | in nft_meta_get_validate()
415 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_meta_get_validate()
426 unsigned int hooks; in nft_meta_set_validate() local
433 hooks = 1 << NF_BR_PRE_ROUTING; in nft_meta_set_validate()
436 hooks = 1 << NF_NETDEV_INGRESS; in nft_meta_set_validate()
441 hooks = 1 << NF_INET_PRE_ROUTING; in nft_meta_set_validate()
447 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_meta_set_validate()
Dxt_CLASSIFY.c42 .hooks = (1 << NF_INET_LOCAL_OUT) | (1 << NF_INET_FORWARD) |
52 .hooks = (1 << NF_ARP_OUT) | (1 << NF_ARP_FORWARD),
Dnft_xfrm.c235 unsigned int hooks; in nft_xfrm_validate() local
239 hooks = (1 << NF_INET_FORWARD) | in nft_xfrm_validate()
244 hooks = (1 << NF_INET_FORWARD) | in nft_xfrm_validate()
253 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_xfrm_validate()
Dnft_chain_route.c58 .hooks = {
108 .hooks = {
139 .hooks = {
Dnft_rt.c168 unsigned int hooks; in nft_rt_validate() local
177 hooks = (1 << NF_INET_FORWARD) | in nft_rt_validate()
185 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_rt_validate()
Dxt_REDIRECT.c81 .hooks = (1 << NF_INET_PRE_ROUTING) |
94 .hooks = (1 << NF_INET_PRE_ROUTING) |
Dxt_cgroup.c174 .hooks = (1 << NF_INET_LOCAL_OUT) |
188 .hooks = (1 << NF_INET_LOCAL_OUT) |
202 .hooks = (1 << NF_INET_LOCAL_OUT) |
Dxt_MASQUERADE.c80 .hooks = 1 << NF_INET_POST_ROUTING,
91 .hooks = 1 << NF_INET_POST_ROUTING,
Dxt_TPROXY.c231 .hooks = 1 << NF_INET_PRE_ROUTING,
242 .hooks = 1 << NF_INET_PRE_ROUTING,
254 .hooks = 1 << NF_INET_PRE_ROUTING,
/Linux-v5.4/Documentation/security/
Dlsm.rst30 general framework that would provide a set of security hooks to control
92 collection of substructures that group related hooks based on the kernel
101 Linus mentioned per-process security hooks in his original remarks as a
102 possible alternative to global security hooks. However, if LSM were to
103 start from the perspective of per-process hooks, then the base framework
107 composing hooks in the base framework. Additionally, LSM would still
108 need global hooks for operations that have no process context (e.g.
110 hooks, but a security module is free to implement per-process hooks
112 process' security field and then invoking these per-process hooks from
113 the global hooks. The problem of composition is thus deferred to the
[all …]
/Linux-v5.4/drivers/video/fbdev/via/
Dvia-core.c565 void viafb_pm_register(struct viafb_pm_hooks *hooks) in viafb_pm_register() argument
567 INIT_LIST_HEAD(&hooks->list); in viafb_pm_register()
570 list_add_tail(&hooks->list, &viafb_pm_hooks); in viafb_pm_register()
575 void viafb_pm_unregister(struct viafb_pm_hooks *hooks) in viafb_pm_unregister() argument
578 list_del(&hooks->list); in viafb_pm_unregister()
585 struct viafb_pm_hooks *hooks; in via_suspend() local
599 list_for_each_entry_reverse(hooks, &viafb_pm_hooks, list) in via_suspend()
600 hooks->suspend(hooks->private); in via_suspend()
611 struct viafb_pm_hooks *hooks; in via_resume() local
623 list_for_each_entry(hooks, &viafb_pm_hooks, list) in via_resume()
[all …]
/Linux-v5.4/arch/arm64/kernel/
Darmv8_deprecated.c47 struct undef_hook *hooks; member
67 BUG_ON(!ops->hooks); in register_emulation_hooks()
69 for (hook = ops->hooks; hook->instr_mask; hook++) in register_emulation_hooks()
79 BUG_ON(!ops->hooks); in remove_emulation_hooks()
81 for (hook = ops->hooks; hook->instr_mask; hook++) in remove_emulation_hooks()
456 .hooks = swp_hooks,
543 .hooks = cp15_barrier_hooks,
616 .hooks = setend_hooks,
/Linux-v5.4/Documentation/vm/
Dcleancache.rst162 The core hooks for cleancache in VFS are in most cases a single line
165 the page cache, and disk. All hooks compile into nothingness if
172 Some filesystems are built entirely on top of VFS and the hooks
175 But for some filesystems (such as btrfs), the VFS hooks are
176 incomplete and one or more hooks in fs-specific code are required.
183 that untested filesystems are not affected, and the hooks in the
187 The total impact of the hooks to existing fs and mm files is only
220 overcommitted in a virtual workload); and because the hooks are
233 poorly layered filesystems must either add additional hooks
243 add hooks to do the equivalent cleancache "invalidate" operations
[all …]
/Linux-v5.4/security/
DKconfig52 This enables the socket and networking security hooks.
53 If enabled, a security module can use these hooks to
72 This enables the Infiniband security hooks.
73 If enabled, a security module can use these hooks to
81 This enables the XFRM (IPSec) networking security hooks.
82 If enabled, a security module can use these hooks to
91 bool "Security hooks for pathname based access control"
94 This enables the security hooks for pathname based access control.
95 If enabled, a security module can use these hooks to
/Linux-v5.4/include/linux/
Dvia-core.h58 void viafb_pm_register(struct viafb_pm_hooks *hooks);
59 void viafb_pm_unregister(struct viafb_pm_hooks *hooks);
/Linux-v5.4/Documentation/networking/
Dnf_flowtable.txt18 netfilter hooks coming after the ingress). In case of flowtable miss, the packet
32 including the Netfilter hooks and the flowtable fastpath bypass.
62 Fig.1 Netfilter hooks and flowtable interactions
91 hooks are run in the pipeline, this is convenient in case you already have a
/Linux-v5.4/Documentation/locking/
Dlockstat.rst19 Lockdep already has hooks in the lock functions and maps lock instances to
22 hooks therein::
45 __* - the hooks
48 With these hooks we provide the following statistics:

123456