| /linux/sound/soc/generic/ |
| H A D | audio-graph-card2.c | 1055 struct graph2_custom_hooks *hooks, in graph_link() argument 1066 if (hooks && hooks->custom_normal) in graph_link() 1067 func = hooks->custom_normal; in graph_link() 1072 if (hooks && hooks->custom_dpcm) in graph_link() 1073 func = hooks->custom_dpcm; in graph_link() 1078 if (hooks && hooks->custom_c2c) in graph_link() 1079 func = hooks->custom_c2c; in graph_link() 1230 struct graph2_custom_hooks *hooks, in graph_count() argument 1273 struct graph2_custom_hooks *hooks, in graph_for_each_link() argument 1276 struct graph2_custom_hooks *hooks, in graph_for_each_link() [all …]
|
| /linux/drivers/video/fbdev/via/ |
| H A D | via-core.c | 566 void viafb_pm_register(struct viafb_pm_hooks *hooks) in viafb_pm_register() argument 568 INIT_LIST_HEAD(&hooks->list); in viafb_pm_register() 571 list_add_tail(&hooks->list, &viafb_pm_hooks); in viafb_pm_register() 576 void viafb_pm_unregister(struct viafb_pm_hooks *hooks) in viafb_pm_unregister() argument 579 list_del(&hooks->list); in viafb_pm_unregister() 586 struct viafb_pm_hooks *hooks; in via_suspend() local 598 list_for_each_entry_reverse(hooks, &viafb_pm_hooks, list) in via_suspend() 599 hooks->suspend(hooks->private); in via_suspend() 607 struct viafb_pm_hooks *hooks; in via_resume() local 611 list_for_each_entry(hooks, &viafb_pm_hooks, list) in via_resume() [all …]
|
| /linux/net/netfilter/ |
| H A D | nft_fib.c | 32 unsigned int hooks; in nft_fib_validate() local 37 hooks = (1 << NF_INET_PRE_ROUTING) | in nft_fib_validate() 43 hooks = (1 << NF_INET_PRE_ROUTING) | in nft_fib_validate() 47 hooks = (1 << NF_INET_LOCAL_OUT) | in nft_fib_validate() 51 hooks = (1 << NF_INET_LOCAL_IN) | in nft_fib_validate() 62 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_fib_validate()
|
| H A D | xt_socket.c | 235 .hooks = (1 << NF_INET_PRE_ROUTING) | 247 .hooks = (1 << NF_INET_PRE_ROUTING) | 260 .hooks = (1 << NF_INET_PRE_ROUTING) | 273 .hooks = (1 << NF_INET_PRE_ROUTING) | 286 .hooks = (1 << NF_INET_PRE_ROUTING) | 299 .hooks = (1 << NF_INET_PRE_ROUTING) | 312 .hooks = (1 << NF_INET_PRE_ROUTING) |
|
| H A D | core.c | 153 new->hooks[nhooks] = old->hooks[i]; in nf_hook_entries_grow() 157 new->hooks[nhooks].hook = reg->hook; in nf_hook_entries_grow() 158 new->hooks[nhooks].priv = reg->priv; in nf_hook_entries_grow() 166 new->hooks[nhooks].hook = reg->hook; in nf_hook_entries_grow() 167 new->hooks[nhooks].priv = reg->priv; in nf_hook_entries_grow() 173 static void hooks_validate(const struct nf_hook_entries *hooks) in hooks_validate() argument 180 orig_ops = nf_hook_entries_get_hook_ops(hooks); in hooks_validate() 182 for (i = 0; i < hooks->num_hook_entries; i++) { in hooks_validate() 265 new->hooks[j] = old->hooks[i]; in __nf_hook_entries_try_shrink() 477 WRITE_ONCE(old->hooks[i].hook, accept_all); in nf_remove_net_hook() [all …]
|
| H A D | xt_nat.c | 160 .hooks = (1 << NF_INET_POST_ROUTING) | 173 .hooks = (1 << NF_INET_PRE_ROUTING) | 185 .hooks = (1 << NF_INET_POST_ROUTING) | 197 .hooks = (1 << NF_INET_PRE_ROUTING) | 209 .hooks = (1 << NF_INET_POST_ROUTING) | 221 .hooks = (1 << NF_INET_PRE_ROUTING) |
|
| H A D | nf_conntrack_sip.c | 863 const struct nf_nat_sip_hooks *hooks; in set_expected_rtp_rtcp() local 949 hooks = rcu_dereference(nf_nat_sip_hooks); in set_expected_rtp_rtcp() 950 if (hooks && in set_expected_rtp_rtcp() 951 !hooks->sdp_port(skb, protoff, dataoff, dptr, datalen, in set_expected_rtp_rtcp() 971 hooks = rcu_dereference(nf_nat_sip_hooks); in set_expected_rtp_rtcp() 972 if (hooks && ct->status & IPS_NAT_MASK && !direct_rtp) in set_expected_rtp_rtcp() 973 ret = hooks->sdp_media(skb, protoff, dataoff, dptr, in set_expected_rtp_rtcp() 1039 const struct nf_nat_sip_hooks *hooks; in process_sdp() local 1045 hooks = rcu_dereference(nf_nat_sip_hooks); in process_sdp() 1118 if (maddr_len && hooks && ct->status & IPS_NAT_MASK) { in process_sdp() [all …]
|
| H A D | xt_CLASSIFY.c | 42 .hooks = (1 << NF_INET_LOCAL_OUT) | (1 << NF_INET_FORWARD) | 52 .hooks = (1 << NF_ARP_OUT) | (1 << NF_ARP_FORWARD), 62 .hooks = (1 << NF_INET_LOCAL_OUT) | (1 << NF_INET_FORWARD) |
|
| H A D | nft_meta.c | 541 unsigned int hooks; in nft_meta_get_validate_sdif() local 547 hooks = (1 << NF_INET_LOCAL_IN) | in nft_meta_get_validate_sdif() 554 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_meta_get_validate_sdif() 560 unsigned int hooks; in nft_meta_get_validate_xfrm() local 564 hooks = 1 << NF_NETDEV_INGRESS; in nft_meta_get_validate_xfrm() 569 hooks = (1 << NF_INET_PRE_ROUTING) | in nft_meta_get_validate_xfrm() 577 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_meta_get_validate_xfrm() 605 unsigned int hooks; in nft_meta_set_validate() local 612 hooks = 1 << NF_BR_PRE_ROUTING; in nft_meta_set_validate() 615 hooks = 1 << NF_NETDEV_INGRESS; in nft_meta_set_validate() [all …]
|
| H A D | nft_chain_filter.c | 35 .hooks = { 77 .hooks = { 119 .hooks = { 205 .hooks = { 263 .hooks = { 315 .hooks = {
|
| H A D | nft_chain_nat.c | 45 .hooks = { 66 .hooks = { 97 .hooks = {
|
| H A D | nft_chain_route.c | 58 .hooks = { 108 .hooks = { 139 .hooks = {
|
| H A D | nft_rt.c | 166 unsigned int hooks; in nft_rt_validate() local 180 hooks = (1 << NF_INET_FORWARD) | in nft_rt_validate() 188 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_rt_validate()
|
| H A D | nft_osf.c | 113 unsigned int hooks; in nft_osf_validate() local 119 hooks = (1 << NF_INET_LOCAL_IN) | in nft_osf_validate() 127 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_osf_validate()
|
| H A D | nft_xfrm.c | 236 unsigned int hooks; in nft_xfrm_validate() local 245 hooks = (1 << NF_INET_FORWARD) | in nft_xfrm_validate() 250 hooks = (1 << NF_INET_FORWARD) | in nft_xfrm_validate() 259 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_xfrm_validate()
|
| H A D | xt_cgroup.c | 206 .hooks = (1 << NF_INET_LOCAL_OUT) | 220 .hooks = (1 << NF_INET_LOCAL_OUT) | 234 .hooks = (1 << NF_INET_LOCAL_OUT) | in cgroup_mt_init()
|
| H A D | xt_REDIRECT.c | 87 .hooks = (1 << NF_INET_PRE_ROUTING) | 100 .hooks = (1 << NF_INET_PRE_ROUTING) |
|
| H A D | xt_MASQUERADE.c | 80 .hooks = 1 << NF_INET_POST_ROUTING, 91 .hooks = 1 << NF_INET_POST_ROUTING,
|
| H A D | xt_TPROXY.c | 221 .hooks = 1 << NF_INET_PRE_ROUTING, 233 .hooks = 1 << NF_INET_PRE_ROUTING, 246 .hooks = 1 << NF_INET_PRE_ROUTING,
|
| /linux/Documentation/translations/zh_CN/maintainer/ |
| H A D | configure-git.rst | 54 $ cat >.git/hooks/applypatch-msg <<'EOF' 58 test -x "$GIT_DIR/hooks/commit-msg" && 59 exec "$GIT_DIR/hooks/commit-msg" ${1+"$@"} 62 $ chmod a+x .git/hooks/applypatch-msg
|
| /linux/Documentation/security/ |
| H A D | lsm.rst | 30 general framework that would provide a set of security hooks to control 98 LSM hooks are maintained in lists. A list is maintained for each 99 hook, and the hooks are called in the order specified by CONFIG_LSM. 108 The LSM framework does not provide a mechanism for removing hooks that 112 The hooks can be viewed as falling into two major 113 categories: hooks that are used to manage the security fields and hooks 115 of hooks include the security_inode_alloc() and security_inode_free() 116 These hooks are used to allocate 118 An example of the second category of hooks
|
| /linux/drivers/ufs/host/ |
| H A D | Kconfig | 58 tristate "QCOM specific hooks to UFS controller platform driver" 73 tristate "Mediatek specific hooks to UFS controller platform driver" 90 tristate "Hisilicon specific hooks to UFS controller platform driver" 99 tristate "Renesas specific hooks to UFS controller platform driver" 121 tristate "Exynos specific hooks to UFS controller platform driver" 136 tristate "Unisoc specific hooks to UFS controller platform driver"
|
| /linux/Documentation/bpf/ |
| H A D | fs_kfuncs.rst | 9 BPF LSM programs need to access filesystem data from LSM hooks. The following 19 2. These kfuncs should not call into other LSM hooks, i.e. security_*(). For
|
| /linux/security/ |
| H A D | Kconfig | 105 This enables the socket and networking security hooks. 106 If enabled, a security module can use these hooks to 114 This enables the Infiniband security hooks. 115 If enabled, a security module can use these hooks to 123 This enables the XFRM (IPSec) networking security hooks. 124 If enabled, a security module can use these hooks to 133 bool "Security hooks for pathname based access control" 136 This enables the security hooks for pathname based access control. 137 If enabled, a security module can use these hooks to
|
| /linux/net/bridge/netfilter/ |
| H A D | nft_meta_bridge.c | 184 unsigned int hooks; in nft_meta_bridge_set_validate() local 189 hooks = 1 << NF_BR_PRE_ROUTING; in nft_meta_bridge_set_validate() 195 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_meta_bridge_set_validate()
|