| /linux/sound/soc/generic/ |
| A D | audio-graph-card2.c | 1092 if (hooks && hooks->custom_normal) in graph_link() 1093 func = hooks->custom_normal; in graph_link() 1098 if (hooks && hooks->custom_dpcm) in graph_link() 1099 func = hooks->custom_dpcm; in graph_link() 1104 if (hooks && hooks->custom_c2c) in graph_link() 1105 func = hooks->custom_c2c; in graph_link() 1342 struct graph2_custom_hooks *hooks) in audio_graph2_parse_of() argument 1355 if ((hooks) && (hooks)->hook_pre) { in audio_graph2_parse_of() 1356 ret = (hooks)->hook_pre(priv); in audio_graph2_parse_of() 1397 if ((hooks) && (hooks)->hook_post) { in audio_graph2_parse_of() [all …]
|
| /linux/drivers/video/fbdev/via/ |
| A D | via-core.c | 565 void viafb_pm_register(struct viafb_pm_hooks *hooks) in viafb_pm_register() argument 567 INIT_LIST_HEAD(&hooks->list); in viafb_pm_register() 570 list_add_tail(&hooks->list, &viafb_pm_hooks); in viafb_pm_register() 575 void viafb_pm_unregister(struct viafb_pm_hooks *hooks) in viafb_pm_unregister() argument 578 list_del(&hooks->list); in viafb_pm_unregister() 585 struct viafb_pm_hooks *hooks; in via_suspend() local 597 list_for_each_entry_reverse(hooks, &viafb_pm_hooks, list) in via_suspend() 598 hooks->suspend(hooks->private); in via_suspend() 606 struct viafb_pm_hooks *hooks; in via_resume() local 610 list_for_each_entry(hooks, &viafb_pm_hooks, list) in via_resume() [all …]
|
| /linux/net/netfilter/ |
| A D | nft_fib.c | 32 unsigned int hooks; in nft_fib_validate() local 37 hooks = (1 << NF_INET_PRE_ROUTING) | in nft_fib_validate() 43 hooks = (1 << NF_INET_PRE_ROUTING) | in nft_fib_validate() 47 hooks = (1 << NF_INET_LOCAL_OUT) | in nft_fib_validate() 51 hooks = (1 << NF_INET_LOCAL_IN) | in nft_fib_validate() 62 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_fib_validate()
|
| A D | xt_socket.c | 235 .hooks = (1 << NF_INET_PRE_ROUTING) | 247 .hooks = (1 << NF_INET_PRE_ROUTING) | 260 .hooks = (1 << NF_INET_PRE_ROUTING) | 273 .hooks = (1 << NF_INET_PRE_ROUTING) | 286 .hooks = (1 << NF_INET_PRE_ROUTING) | 299 .hooks = (1 << NF_INET_PRE_ROUTING) | 312 .hooks = (1 << NF_INET_PRE_ROUTING) |
|
| A D | xt_CLASSIFY.c | 42 .hooks = (1 << NF_INET_LOCAL_OUT) | (1 << NF_INET_FORWARD) | 52 .hooks = (1 << NF_ARP_OUT) | (1 << NF_ARP_FORWARD), 62 .hooks = (1 << NF_INET_LOCAL_OUT) | (1 << NF_INET_FORWARD) |
|
| A D | xt_nat.c | 160 .hooks = (1 << NF_INET_POST_ROUTING) | 173 .hooks = (1 << NF_INET_PRE_ROUTING) | 185 .hooks = (1 << NF_INET_POST_ROUTING) | 197 .hooks = (1 << NF_INET_PRE_ROUTING) | 209 .hooks = (1 << NF_INET_POST_ROUTING) | 221 .hooks = (1 << NF_INET_PRE_ROUTING) |
|
| A D | core.c | 156 new->hooks[nhooks] = old->hooks[i]; in nf_hook_entries_grow() 160 new->hooks[nhooks].hook = reg->hook; in nf_hook_entries_grow() 161 new->hooks[nhooks].priv = reg->priv; in nf_hook_entries_grow() 169 new->hooks[nhooks].hook = reg->hook; in nf_hook_entries_grow() 170 new->hooks[nhooks].priv = reg->priv; in nf_hook_entries_grow() 176 static void hooks_validate(const struct nf_hook_entries *hooks) in hooks_validate() argument 183 orig_ops = nf_hook_entries_get_hook_ops(hooks); in hooks_validate() 185 for (i = 0; i < hooks->num_hook_entries; i++) { in hooks_validate() 268 new->hooks[j] = old->hooks[i]; in __nf_hook_entries_try_shrink() 480 WRITE_ONCE(old->hooks[i].hook, accept_all); in nf_remove_net_hook() [all …]
|
| A D | nf_conntrack_sip.c | 863 const struct nf_nat_sip_hooks *hooks; in set_expected_rtp_rtcp() local 950 if (hooks && in set_expected_rtp_rtcp() 1039 const struct nf_nat_sip_hooks *hooks; in process_sdp() local 1128 if (hooks && ct->status & IPS_NAT_MASK) in process_sdp() 1231 const struct nf_nat_sip_hooks *hooks; in process_register_request() local 1304 if (hooks && ct->status & IPS_NAT_MASK) in process_register_request() 1512 const struct nf_nat_sip_hooks *hooks; in process_sip_msg() local 1522 if (hooks && !hooks->msg(skb, protoff, dataoff, in process_sip_msg() 1606 const struct nf_nat_sip_hooks *hooks; in sip_help_tcp() local 1609 if (hooks) in sip_help_tcp() [all …]
|
| A D | nft_chain_filter.c | 35 .hooks = { 77 .hooks = { 119 .hooks = { 205 .hooks = { 263 .hooks = { 315 .hooks = {
|
| A D | nft_chain_nat.c | 45 .hooks = { 66 .hooks = { 97 .hooks = {
|
| A D | nft_meta.c | 541 unsigned int hooks; in nft_meta_get_validate_sdif() local 547 hooks = (1 << NF_INET_LOCAL_IN) | in nft_meta_get_validate_sdif() 554 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_meta_get_validate_sdif() 560 unsigned int hooks; in nft_meta_get_validate_xfrm() local 564 hooks = 1 << NF_NETDEV_INGRESS; in nft_meta_get_validate_xfrm() 569 hooks = (1 << NF_INET_PRE_ROUTING) | in nft_meta_get_validate_xfrm() 577 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_meta_get_validate_xfrm() 605 unsigned int hooks; in nft_meta_set_validate() local 612 hooks = 1 << NF_BR_PRE_ROUTING; in nft_meta_set_validate() 615 hooks = 1 << NF_NETDEV_INGRESS; in nft_meta_set_validate() [all …]
|
| A D | nft_chain_route.c | 58 .hooks = { 108 .hooks = { 139 .hooks = {
|
| A D | nft_osf.c | 113 unsigned int hooks; in nft_osf_validate() local 119 hooks = (1 << NF_INET_LOCAL_IN) | in nft_osf_validate() 127 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_osf_validate()
|
| A D | nft_rt.c | 166 unsigned int hooks; in nft_rt_validate() local 180 hooks = (1 << NF_INET_FORWARD) | in nft_rt_validate() 188 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_rt_validate()
|
| A D | nft_xfrm.c | 235 unsigned int hooks; in nft_xfrm_validate() local 244 hooks = (1 << NF_INET_FORWARD) | in nft_xfrm_validate() 249 hooks = (1 << NF_INET_FORWARD) | in nft_xfrm_validate() 258 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_xfrm_validate()
|
| A D | xt_cgroup.c | 174 .hooks = (1 << NF_INET_LOCAL_OUT) | 188 .hooks = (1 << NF_INET_LOCAL_OUT) | 202 .hooks = (1 << NF_INET_LOCAL_OUT) |
|
| A D | xt_REDIRECT.c | 87 .hooks = (1 << NF_INET_PRE_ROUTING) | 100 .hooks = (1 << NF_INET_PRE_ROUTING) |
|
| A D | xt_MASQUERADE.c | 80 .hooks = 1 << NF_INET_POST_ROUTING, 91 .hooks = 1 << NF_INET_POST_ROUTING,
|
| /linux/Documentation/translations/zh_CN/maintainer/ |
| A D | configure-git.rst | 54 $ cat >.git/hooks/applypatch-msg <<'EOF' 58 test -x "$GIT_DIR/hooks/commit-msg" && 59 exec "$GIT_DIR/hooks/commit-msg" ${1+"$@"} 62 $ chmod a+x .git/hooks/applypatch-msg
|
| /linux/Documentation/security/ |
| A D | lsm.rst | 30 general framework that would provide a set of security hooks to control 98 LSM hooks are maintained in lists. A list is maintained for each 99 hook, and the hooks are called in the order specified by CONFIG_LSM. 108 The LSM framework does not provide a mechanism for removing hooks that 112 The hooks can be viewed as falling into two major 113 categories: hooks that are used to manage the security fields and hooks 115 of hooks include the security_inode_alloc() and security_inode_free() 116 These hooks are used to allocate 118 An example of the second category of hooks
|
| /linux/Documentation/maintainer/ |
| A D | configure-git.rst | 50 $ cat >.git/hooks/applypatch-msg <<'EOF' 54 test -x "$GIT_DIR/hooks/commit-msg" && 55 exec "$GIT_DIR/hooks/commit-msg" ${1+"$@"} 58 $ chmod a+x .git/hooks/applypatch-msg
|
| /linux/drivers/ufs/host/ |
| A D | Kconfig | 58 tristate "QCOM specific hooks to UFS controller platform driver" 73 tristate "Mediatek specific hooks to UFS controller platform driver" 89 tristate "Hisilicon specific hooks to UFS controller platform driver" 98 tristate "Renesas specific hooks to UFS controller platform driver" 120 tristate "Exynos specific hooks to UFS controller platform driver" 135 tristate "Unisoc specific hooks to UFS controller platform driver"
|
| /linux/Documentation/bpf/ |
| A D | fs_kfuncs.rst | 9 BPF LSM programs need to access filesystem data from LSM hooks. The following 19 2. These kfuncs should not call into other LSM hooks, i.e. security_*(). For
|
| /linux/security/ |
| A D | Kconfig | 79 This enables the socket and networking security hooks. 80 If enabled, a security module can use these hooks to 88 This enables the Infiniband security hooks. 89 If enabled, a security module can use these hooks to 97 This enables the XFRM (IPSec) networking security hooks. 98 If enabled, a security module can use these hooks to 107 bool "Security hooks for pathname based access control" 110 This enables the security hooks for pathname based access control. 111 If enabled, a security module can use these hooks to
|
| /linux/net/bridge/netfilter/ |
| A D | nft_meta_bridge.c | 174 unsigned int hooks; in nft_meta_bridge_set_validate() local 178 hooks = 1 << NF_BR_PRE_ROUTING; in nft_meta_bridge_set_validate() 184 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_meta_bridge_set_validate()
|