/linux/drivers/video/fbdev/via/ |
H A D | via-core.c | 566 void viafb_pm_register(struct viafb_pm_hooks *hooks) in viafb_pm_register() argument 568 INIT_LIST_HEAD(&hooks->list); in viafb_pm_register() 571 list_add_tail(&hooks->list, &viafb_pm_hooks); in viafb_pm_register() 576 void viafb_pm_unregister(struct viafb_pm_hooks *hooks) in viafb_pm_unregister() argument 579 list_del(&hooks->list); in viafb_pm_unregister() 586 struct viafb_pm_hooks *hooks; in via_suspend() local 598 list_for_each_entry_reverse(hooks, &viafb_pm_hooks, list) in via_suspend() 599 hooks->suspend(hooks->private); in via_suspend() 607 struct viafb_pm_hooks *hooks; in via_resume() local [all...] |
/linux/sound/soc/generic/ |
H A D | audio-graph-card2.c | 1055 struct graph2_custom_hooks *hooks, in graph_link() argument 1066 if (hooks && hooks->custom_normal) in graph_link() 1067 func = hooks->custom_normal; in graph_link() 1072 if (hooks && hooks->custom_dpcm) in graph_link() 1073 func = hooks->custom_dpcm; in graph_link() 1078 if (hooks && hooks->custom_c2c) in graph_link() 1079 func = hooks in graph_link() 1230 graph_count(struct simple_util_priv * priv,struct graph2_custom_hooks * hooks,enum graph_type gtype,struct device_node * lnk,struct link_info * li) graph_count() argument 1273 graph_for_each_link(struct simple_util_priv * priv,struct graph2_custom_hooks * hooks,struct link_info * li,int (* func)(struct simple_util_priv * priv,struct graph2_custom_hooks * hooks,enum graph_type gtype,struct device_node * lnk,struct link_info * li)) graph_for_each_link() argument 1303 audio_graph2_parse_of(struct simple_util_priv * priv,struct device * dev,struct graph2_custom_hooks * hooks) audio_graph2_parse_of() argument [all...] |
/linux/net/netfilter/ |
H A D | nft_fib.c | 32 unsigned int hooks; in nft_fib_validate() local 37 hooks = (1 << NF_INET_PRE_ROUTING) | in nft_fib_validate() 43 hooks = (1 << NF_INET_PRE_ROUTING) | in nft_fib_validate() 47 hooks = (1 << NF_INET_LOCAL_OUT) | in nft_fib_validate() 51 hooks = (1 << NF_INET_LOCAL_IN) | in nft_fib_validate() 62 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_fib_validate()
|
H A D | xt_socket.c | 235 .hooks = (1 << NF_INET_PRE_ROUTING) | 247 .hooks = (1 << NF_INET_PRE_ROUTING) | 260 .hooks = (1 << NF_INET_PRE_ROUTING) | 273 .hooks = (1 << NF_INET_PRE_ROUTING) | 286 .hooks = (1 << NF_INET_PRE_ROUTING) | 299 .hooks = (1 << NF_INET_PRE_ROUTING) | 312 .hooks = (1 << NF_INET_PRE_ROUTING) |
|
H A D | xt_CLASSIFY.c | 42 .hooks = (1 << NF_INET_LOCAL_OUT) | (1 << NF_INET_FORWARD) | 52 .hooks = (1 << NF_ARP_OUT) | (1 << NF_ARP_FORWARD), 62 .hooks = (1 << NF_INET_LOCAL_OUT) | (1 << NF_INET_FORWARD) |
|
H A D | xt_nat.c | 160 .hooks = (1 << NF_INET_POST_ROUTING) | 173 .hooks = (1 << NF_INET_PRE_ROUTING) | 185 .hooks = (1 << NF_INET_POST_ROUTING) | 197 .hooks = (1 << NF_INET_PRE_ROUTING) | 209 .hooks = (1 << NF_INET_POST_ROUTING) | 221 .hooks = (1 << NF_INET_PRE_ROUTING) |
|
H A D | core.c | 41 /* max hooks per family/hooknum */ 153 new->hooks[nhooks] = old->hooks[i]; in nf_hook_entries_grow() 157 new->hooks[nhooks].hook = reg->hook; in nf_hook_entries_grow() 158 new->hooks[nhooks].priv = reg->priv; in nf_hook_entries_grow() 166 new->hooks[nhooks].hook = reg->hook; in nf_hook_entries_grow() 167 new->hooks[nhooks].priv = reg->priv; in nf_hook_entries_grow() 173 static void hooks_validate(const struct nf_hook_entries *hooks) in hooks_validate() argument 180 orig_ops = nf_hook_entries_get_hook_ops(hooks); in hooks_validate() 182 for (i = 0; i < hooks in hooks_validate() [all...] |
H A D | nf_conntrack_sip.c | 863 const struct nf_nat_sip_hooks *hooks; in set_expected_rtp_rtcp() local 949 hooks = rcu_dereference(nf_nat_sip_hooks); in set_expected_rtp_rtcp() 950 if (hooks && in set_expected_rtp_rtcp() 951 !hooks->sdp_port(skb, protoff, dataoff, dptr, datalen, in set_expected_rtp_rtcp() 971 hooks = rcu_dereference(nf_nat_sip_hooks); in set_expected_rtp_rtcp() 972 if (hooks && ct->status & IPS_NAT_MASK && !direct_rtp) in set_expected_rtp_rtcp() 973 ret = hooks->sdp_media(skb, protoff, dataoff, dptr, in set_expected_rtp_rtcp() 1039 const struct nf_nat_sip_hooks *hooks; in process_sdp() local 1044 hooks = rcu_dereference(nf_nat_sip_hooks); in process_sdp() 1112 if (maddr_len && hooks in process_sdp() 1231 const struct nf_nat_sip_hooks *hooks; process_register_request() local 1512 const struct nf_nat_sip_hooks *hooks; process_sip_msg() local 1606 const struct nf_nat_sip_hooks *hooks; sip_help_tcp() local [all...] |
H A D | nft_chain_nat.c | 45 .hooks = { 66 .hooks = { 97 .hooks = {
|
H A D | nft_chain_filter.c | 35 .hooks = { 77 .hooks = { 119 .hooks = { 205 .hooks = { 263 .hooks = { 315 .hooks = {
|
H A D | nft_meta.c | 541 unsigned int hooks; in nft_meta_get_validate_sdif() local 547 hooks = (1 << NF_INET_LOCAL_IN) | in nft_meta_get_validate_sdif() 554 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_meta_get_validate_sdif() 560 unsigned int hooks; in nft_meta_get_validate_xfrm() local 564 hooks = 1 << NF_NETDEV_INGRESS; in nft_meta_get_validate_xfrm() 569 hooks = (1 << NF_INET_PRE_ROUTING) | in nft_meta_get_validate_xfrm() 577 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_meta_get_validate_xfrm() 605 unsigned int hooks; in nft_meta_set_validate() local 612 hooks = 1 << NF_BR_PRE_ROUTING; in nft_meta_set_validate() 615 hooks in nft_meta_set_validate() [all...] |
H A D | nft_chain_route.c | 58 .hooks = { 108 .hooks = { 139 .hooks = {
|
H A D | nft_osf.c | 113 unsigned int hooks; in nft_osf_validate() local 119 hooks = (1 << NF_INET_LOCAL_IN) | in nft_osf_validate() 127 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_osf_validate()
|
H A D | nft_xfrm.c | 236 unsigned int hooks; in nft_xfrm_validate() local 245 hooks = (1 << NF_INET_FORWARD) | in nft_xfrm_validate() 250 hooks = (1 << NF_INET_FORWARD) | in nft_xfrm_validate() 259 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_xfrm_validate()
|
H A D | xt_REDIRECT.c | 87 .hooks = (1 << NF_INET_PRE_ROUTING) | 100 .hooks = (1 << NF_INET_PRE_ROUTING) |
|
H A D | xt_cgroup.c | 200 .hooks = (1 << NF_INET_LOCAL_OUT) | 214 .hooks = (1 << NF_INET_LOCAL_OUT) | 228 .hooks = (1 << NF_INET_LOCAL_OUT) |
|
H A D | xt_MASQUERADE.c | 80 .hooks = 1 << NF_INET_POST_ROUTING, 91 .hooks = 1 << NF_INET_POST_ROUTING,
|
/linux/Documentation/translations/zh_CN/maintainer/ |
H A D | configure-git.rst | 54 $ cat >.git/hooks/applypatch-msg <<'EOF' 58 test -x "$GIT_DIR/hooks/commit-msg" && 59 exec "$GIT_DIR/hooks/commit-msg" ${1+"$@"} 62 $ chmod a+x .git/hooks/applypatch-msg
|
/linux/Documentation/security/ |
H A D | lsm.rst | 30 general framework that would provide a set of security hooks to control 98 LSM hooks are maintained in lists. A list is maintained for each 99 hook, and the hooks are called in the order specified by CONFIG_LSM. 108 The LSM framework does not provide a mechanism for removing hooks that 112 The hooks can be viewed as falling into two major 113 categories: hooks that are used to manage the security fields and hooks 115 of hooks include the security_inode_alloc() and security_inode_free() 116 These hooks are used to allocate 118 An example of the second category of hooks [all...] |
/linux/Documentation/maintainer/ |
H A D | configure-git.rst | 50 $ cat >.git/hooks/applypatch-msg <<'EOF' 54 test -x "$GIT_DIR/hooks/commit-msg" && 55 exec "$GIT_DIR/hooks/commit-msg" ${1+"$@"} 58 $ chmod a+x .git/hooks/applypatch-msg
|
/linux/drivers/ufs/host/ |
H A D | Kconfig | 58 tristate "QCOM specific hooks to UFS controller platform driver" 73 tristate "Mediatek specific hooks to UFS controller platform driver" 89 tristate "Hisilicon specific hooks to UFS controller platform driver" 98 tristate "Renesas specific hooks to UFS controller platform driver" 120 tristate "Exynos specific hooks to UFS controller platform driver" 135 tristate "Unisoc specific hooks to UFS controller platform driver"
|
/linux/Documentation/bpf/ |
H A D | fs_kfuncs.rst | 9 BPF LSM programs need to access filesystem data from LSM hooks. The following 19 2. These kfuncs should not call into other LSM hooks, i.e. security_*(). For
|
/linux/security/ |
H A D | Kconfig | 105 This enables the socket and networking security hooks. 106 If enabled, a security module can use these hooks to 114 This enables the Infiniband security hooks. 115 If enabled, a security module can use these hooks to 123 This enables the XFRM (IPSec) networking security hooks. 124 If enabled, a security module can use these hooks to 133 bool "Security hooks for pathname based access control" 136 This enables the security hooks for pathname based access control. 137 If enabled, a security module can use these hooks to
|
/linux/net/bridge/netfilter/ |
H A D | nft_meta_bridge.c | 174 unsigned int hooks; in nft_meta_bridge_set_validate() local 178 hooks = 1 << NF_BR_PRE_ROUTING; in nft_meta_bridge_set_validate() 184 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_meta_bridge_set_validate()
|
/linux/include/linux/ |
H A D | via-core.h | 48 * Allow subdevs to register suspend/resume hooks. 57 void viafb_pm_register(struct viafb_pm_hooks *hooks); 58 void viafb_pm_unregister(struct viafb_pm_hooks *hooks);
|