Home
last modified time | relevance | path

Searched refs:hooks (Results 1 – 25 of 147) sorted by relevance

123456

/linux-6.15/sound/soc/generic/
H A Daudio-graph-card2.c1066 if (hooks && hooks->custom_normal) in graph_link()
1067 func = hooks->custom_normal; in graph_link()
1072 if (hooks && hooks->custom_dpcm) in graph_link()
1073 func = hooks->custom_dpcm; in graph_link()
1078 if (hooks && hooks->custom_c2c) in graph_link()
1079 func = hooks->custom_c2c; in graph_link()
1303 struct graph2_custom_hooks *hooks) in audio_graph2_parse_of() argument
1316 if ((hooks) && (hooks)->hook_pre) { in audio_graph2_parse_of()
1317 ret = (hooks)->hook_pre(priv); in audio_graph2_parse_of()
1358 if ((hooks) && (hooks)->hook_post) { in audio_graph2_parse_of()
[all …]
/linux-6.15/drivers/video/fbdev/via/
H A Dvia-core.c565 void viafb_pm_register(struct viafb_pm_hooks *hooks) in viafb_pm_register() argument
567 INIT_LIST_HEAD(&hooks->list); in viafb_pm_register()
570 list_add_tail(&hooks->list, &viafb_pm_hooks); in viafb_pm_register()
575 void viafb_pm_unregister(struct viafb_pm_hooks *hooks) in viafb_pm_unregister() argument
578 list_del(&hooks->list); in viafb_pm_unregister()
585 struct viafb_pm_hooks *hooks; in via_suspend() local
597 list_for_each_entry_reverse(hooks, &viafb_pm_hooks, list) in via_suspend()
598 hooks->suspend(hooks->private); in via_suspend()
606 struct viafb_pm_hooks *hooks; in via_resume() local
610 list_for_each_entry(hooks, &viafb_pm_hooks, list) in via_resume()
[all …]
/linux-6.15/net/netfilter/
H A Dnft_fib.c32 unsigned int hooks; in nft_fib_validate() local
37 hooks = (1 << NF_INET_PRE_ROUTING) | in nft_fib_validate()
43 hooks = (1 << NF_INET_PRE_ROUTING) | in nft_fib_validate()
47 hooks = (1 << NF_INET_LOCAL_OUT) | in nft_fib_validate()
51 hooks = (1 << NF_INET_LOCAL_IN) | in nft_fib_validate()
62 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_fib_validate()
H A Dxt_socket.c235 .hooks = (1 << NF_INET_PRE_ROUTING) |
247 .hooks = (1 << NF_INET_PRE_ROUTING) |
260 .hooks = (1 << NF_INET_PRE_ROUTING) |
273 .hooks = (1 << NF_INET_PRE_ROUTING) |
286 .hooks = (1 << NF_INET_PRE_ROUTING) |
299 .hooks = (1 << NF_INET_PRE_ROUTING) |
312 .hooks = (1 << NF_INET_PRE_ROUTING) |
H A Dxt_CLASSIFY.c42 .hooks = (1 << NF_INET_LOCAL_OUT) | (1 << NF_INET_FORWARD) |
52 .hooks = (1 << NF_ARP_OUT) | (1 << NF_ARP_FORWARD),
62 .hooks = (1 << NF_INET_LOCAL_OUT) | (1 << NF_INET_FORWARD) |
H A Dxt_nat.c160 .hooks = (1 << NF_INET_POST_ROUTING) |
173 .hooks = (1 << NF_INET_PRE_ROUTING) |
185 .hooks = (1 << NF_INET_POST_ROUTING) |
197 .hooks = (1 << NF_INET_PRE_ROUTING) |
209 .hooks = (1 << NF_INET_POST_ROUTING) |
221 .hooks = (1 << NF_INET_PRE_ROUTING) |
H A Dcore.c156 new->hooks[nhooks] = old->hooks[i]; in nf_hook_entries_grow()
160 new->hooks[nhooks].hook = reg->hook; in nf_hook_entries_grow()
161 new->hooks[nhooks].priv = reg->priv; in nf_hook_entries_grow()
169 new->hooks[nhooks].hook = reg->hook; in nf_hook_entries_grow()
170 new->hooks[nhooks].priv = reg->priv; in nf_hook_entries_grow()
176 static void hooks_validate(const struct nf_hook_entries *hooks) in hooks_validate() argument
183 orig_ops = nf_hook_entries_get_hook_ops(hooks); in hooks_validate()
185 for (i = 0; i < hooks->num_hook_entries; i++) { in hooks_validate()
268 new->hooks[j] = old->hooks[i]; in __nf_hook_entries_try_shrink()
480 WRITE_ONCE(old->hooks[i].hook, accept_all); in nf_remove_net_hook()
[all …]
H A Dnft_chain_filter.c35 .hooks = {
77 .hooks = {
119 .hooks = {
205 .hooks = {
263 .hooks = {
315 .hooks = {
H A Dnf_conntrack_sip.c863 const struct nf_nat_sip_hooks *hooks; in set_expected_rtp_rtcp() local
950 if (hooks && in set_expected_rtp_rtcp()
1039 const struct nf_nat_sip_hooks *hooks; in process_sdp() local
1128 if (hooks && ct->status & IPS_NAT_MASK) in process_sdp()
1231 const struct nf_nat_sip_hooks *hooks; in process_register_request() local
1304 if (hooks && ct->status & IPS_NAT_MASK) in process_register_request()
1512 const struct nf_nat_sip_hooks *hooks; in process_sip_msg() local
1522 if (hooks && !hooks->msg(skb, protoff, dataoff, in process_sip_msg()
1606 const struct nf_nat_sip_hooks *hooks; in sip_help_tcp() local
1609 if (hooks) in sip_help_tcp()
[all …]
H A Dnft_chain_nat.c45 .hooks = {
66 .hooks = {
97 .hooks = {
H A Dnft_meta.c541 unsigned int hooks; in nft_meta_get_validate_sdif() local
547 hooks = (1 << NF_INET_LOCAL_IN) | in nft_meta_get_validate_sdif()
554 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_meta_get_validate_sdif()
560 unsigned int hooks; in nft_meta_get_validate_xfrm() local
564 hooks = 1 << NF_NETDEV_INGRESS; in nft_meta_get_validate_xfrm()
569 hooks = (1 << NF_INET_PRE_ROUTING) | in nft_meta_get_validate_xfrm()
577 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_meta_get_validate_xfrm()
605 unsigned int hooks; in nft_meta_set_validate() local
612 hooks = 1 << NF_BR_PRE_ROUTING; in nft_meta_set_validate()
615 hooks = 1 << NF_NETDEV_INGRESS; in nft_meta_set_validate()
[all …]
H A Dnft_chain_route.c58 .hooks = {
108 .hooks = {
139 .hooks = {
H A Dnft_rt.c166 unsigned int hooks; in nft_rt_validate() local
180 hooks = (1 << NF_INET_FORWARD) | in nft_rt_validate()
188 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_rt_validate()
H A Dnft_osf.c113 unsigned int hooks; in nft_osf_validate() local
119 hooks = (1 << NF_INET_LOCAL_IN) | in nft_osf_validate()
127 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_osf_validate()
H A Dnft_xfrm.c236 unsigned int hooks; in nft_xfrm_validate() local
245 hooks = (1 << NF_INET_FORWARD) | in nft_xfrm_validate()
250 hooks = (1 << NF_INET_FORWARD) | in nft_xfrm_validate()
259 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_xfrm_validate()
H A Dxt_cgroup.c174 .hooks = (1 << NF_INET_LOCAL_OUT) |
188 .hooks = (1 << NF_INET_LOCAL_OUT) |
202 .hooks = (1 << NF_INET_LOCAL_OUT) |
H A Dxt_REDIRECT.c87 .hooks = (1 << NF_INET_PRE_ROUTING) |
100 .hooks = (1 << NF_INET_PRE_ROUTING) |
H A Dxt_MASQUERADE.c80 .hooks = 1 << NF_INET_POST_ROUTING,
91 .hooks = 1 << NF_INET_POST_ROUTING,
/linux-6.15/Documentation/translations/zh_CN/maintainer/
H A Dconfigure-git.rst54 $ cat >.git/hooks/applypatch-msg <<'EOF'
58 test -x "$GIT_DIR/hooks/commit-msg" &&
59 exec "$GIT_DIR/hooks/commit-msg" ${1+"$@"}
62 $ chmod a+x .git/hooks/applypatch-msg
/linux-6.15/Documentation/security/
H A Dlsm.rst30 general framework that would provide a set of security hooks to control
98 LSM hooks are maintained in lists. A list is maintained for each
99 hook, and the hooks are called in the order specified by CONFIG_LSM.
108 The LSM framework does not provide a mechanism for removing hooks that
112 The hooks can be viewed as falling into two major
113 categories: hooks that are used to manage the security fields and hooks
115 of hooks include the security_inode_alloc() and security_inode_free()
116 These hooks are used to allocate
118 An example of the second category of hooks
/linux-6.15/Documentation/maintainer/
H A Dconfigure-git.rst50 $ cat >.git/hooks/applypatch-msg <<'EOF'
54 test -x "$GIT_DIR/hooks/commit-msg" &&
55 exec "$GIT_DIR/hooks/commit-msg" ${1+"$@"}
58 $ chmod a+x .git/hooks/applypatch-msg
/linux-6.15/drivers/ufs/host/
H A DKconfig58 tristate "QCOM specific hooks to UFS controller platform driver"
73 tristate "Mediatek specific hooks to UFS controller platform driver"
89 tristate "Hisilicon specific hooks to UFS controller platform driver"
98 tristate "Renesas specific hooks to UFS controller platform driver"
120 tristate "Exynos specific hooks to UFS controller platform driver"
135 tristate "Unisoc specific hooks to UFS controller platform driver"
/linux-6.15/Documentation/bpf/
H A Dfs_kfuncs.rst9 BPF LSM programs need to access filesystem data from LSM hooks. The following
19 2. These kfuncs should not call into other LSM hooks, i.e. security_*(). For
/linux-6.15/security/
H A DKconfig105 This enables the socket and networking security hooks.
106 If enabled, a security module can use these hooks to
114 This enables the Infiniband security hooks.
115 If enabled, a security module can use these hooks to
123 This enables the XFRM (IPSec) networking security hooks.
124 If enabled, a security module can use these hooks to
133 bool "Security hooks for pathname based access control"
136 This enables the security hooks for pathname based access control.
137 If enabled, a security module can use these hooks to
/linux-6.15/net/bridge/netfilter/
H A Dnft_meta_bridge.c174 unsigned int hooks; in nft_meta_bridge_set_validate() local
178 hooks = 1 << NF_BR_PRE_ROUTING; in nft_meta_bridge_set_validate()
184 return nft_chain_validate_hooks(ctx->chain, hooks); in nft_meta_bridge_set_validate()

123456