/kernel/linux/common_modules/qos_auth/auth_ctl/ |
H A D | auth_ctrl.c | 526 bool authorized = false; in check_authorized() local 536 return authorized; in check_authorized() 544 return authorized; in check_authorized() 548 return authorized; in check_authorized() 554 return authorized; in check_authorized() 565 return authorized; in check_authorized() 568 authorized = true; in check_authorized() 574 return authorized; in check_authorized()
|
/kernel/linux/linux-5.10/drivers/thunderbolt/ |
H A D | icm.c | 710 bool authorized = false; in icm_fr_device_connected() local 721 authorized = pkg->link_info & ICM_LINK_INFO_APPROVED; in icm_fr_device_connected() 751 !!sw->authorized == authorized) { in icm_fr_device_connected() 832 sw->authorized = authorized; in icm_fr_device_connected() 1172 bool authorized, boot, dual_lane, speed_gen3; in __icm_tr_device_connected() local 1189 authorized = pkg->link_info & ICM_LINK_INFO_APPROVED; in __icm_tr_device_connected() 1205 if (tb_route(sw) == route && !!sw->authorized == authorized) { in __icm_tr_device_connected() [all...] |
H A D | domain.c | 620 /* The parent switch must be authorized before this one */ in tb_domain_approve_switch() 622 if (!parent_sw || !parent_sw->authorized) in tb_domain_approve_switch() 647 /* The parent switch must be authorized before this one */ in tb_domain_approve_switch_key() 649 if (!parent_sw || !parent_sw->authorized) in tb_domain_approve_switch_key() 684 /* The parent switch must be authorized before this one */ in tb_domain_challenge_switch_key() 686 if (!parent_sw || !parent_sw->authorized) in tb_domain_challenge_switch_key()
|
H A D | switch.c | 1345 return sprintf(buf, "%u\n", sw->authorized); in authorized_show() 1355 if (sw->authorized) in tb_switch_set_authorized() 1378 sw->authorized = val; in tb_switch_set_authorized() 1409 static DEVICE_ATTR_RW(authorized); 1481 if (sw->authorized) { in key_store() 1958 /* Root switch is always authorized */ in tb_switch_alloc() 1960 sw->authorized = true; in tb_switch_alloc()
|
H A D | tb.h | 124 * @boot: Whether the switch was already authorized on boot or not 126 * @authorized: Whether the switch is authorized by user or policy 168 unsigned int authorized; member
|
/kernel/linux/linux-6.6/drivers/thunderbolt/ |
H A D | icm.c | 728 bool authorized = false; in icm_fr_device_connected() local 739 authorized = pkg->link_info & ICM_LINK_INFO_APPROVED; in icm_fr_device_connected() 768 !!sw->authorized == authorized) { in icm_fr_device_connected() 849 sw->authorized = authorized; in icm_fr_device_connected() 1203 bool authorized, boot, dual_lane, speed_gen3; in __icm_tr_device_connected() local 1220 authorized = pkg->link_info & ICM_LINK_INFO_APPROVED; in __icm_tr_device_connected() 1236 if (tb_route(sw) == route && !!sw->authorized == authorized) { in __icm_tr_device_connected() [all...] |
H A D | domain.c | 649 /* The parent switch must be authorized before this one */ in tb_domain_approve_switch() 651 if (!parent_sw || !parent_sw->authorized) in tb_domain_approve_switch() 676 /* The parent switch must be authorized before this one */ in tb_domain_approve_switch_key() 678 if (!parent_sw || !parent_sw->authorized) in tb_domain_approve_switch_key() 713 /* The parent switch must be authorized before this one */ in tb_domain_challenge_switch_key() 715 if (!parent_sw || !parent_sw->authorized) in tb_domain_challenge_switch_key()
|
H A D | switch.c | 1600 return sysfs_emit(buf, "%u\n", sw->authorized); in authorized_show() 1609 if (sw && sw->authorized) { in disapprove_switch() 1621 sw->authorized = 0; in disapprove_switch() 1637 if (!!sw->authorized == !!val) in tb_switch_set_authorized() 1668 sw->authorized = val; in tb_switch_set_authorized() 1671 * value of /sys/bus/thunderbolt/devices/.../authorized. in tb_switch_set_authorized() 1673 sprintf(envp_string, "AUTHORIZED=%u", sw->authorized); in tb_switch_set_authorized() 1703 static DEVICE_ATTR_RW(authorized); 1775 if (sw->authorized) { in key_store() 2346 /* Root switch is always authorized */ in tb_switch_alloc() [all...] |
/kernel/linux/linux-5.10/drivers/usb/core/ |
H A D | generic.c | 233 if (udev->authorized == 0) in usb_generic_driver_probe() 234 dev_err(&udev->dev, "Device is not authorized for usage\n"); in usb_generic_driver_probe()
|
H A D | sysfs.c | 722 /* show if the device is authorized (1) or not (0) */ 727 return snprintf(buf, PAGE_SIZE, "%u\n", usb_dev->authorized); in authorized_show() 751 static DEVICE_ATTR_IGNORE_LOCKDEP(authorized, S_IRUGO | S_IWUSR, 944 * for initializing the authorized attribute of interfaces 960 * for initializing the authorized attribute of interfaces 1151 * 1 is authorized, 0 is deauthorized 1158 return sprintf(buf, "%u\n", intf->authorized); in interface_authorized_show() 1191 __ATTR(authorized, S_IRUGO | S_IWUSR,
|
H A D | message.c | 1785 if (intf->authorized) { in usb_deauthorize_interface() 1787 intf->authorized = 0; in usb_deauthorize_interface() 1805 if (!intf->authorized) { in usb_authorize_interface() 1807 intf->authorized = 1; /* authorize interface */ in usb_authorize_interface() 1930 * Note that a non-authorized device (dev->authorized == 0) will only 1955 if (dev->authorized == 0 || configuration == -1) in usb_set_configuration() 2062 intf->authorized = !!HCD_INTF_AUTHORIZED(hcd); in usb_set_configuration()
|
H A D | driver.c | 334 if (udev->authorized == 0) { in usb_probe_interface() 335 dev_err(&intf->dev, "Device is not authorized for usage\n"); in usb_probe_interface() 337 } else if (intf->authorized == 0) { in usb_probe_interface() 338 dev_err(&intf->dev, "Interface %d is not authorized for usage\n", in usb_probe_interface() 552 /* reject claim if interface is not authorized */ in usb_driver_claim_interface() 553 if (!iface->authorized) in usb_driver_claim_interface()
|
H A D | usb.c | 750 dev->authorized = usb_dev_authorized(dev, usb_hcd); in usb_alloc_dev()
|
/kernel/linux/linux-6.6/drivers/usb/core/ |
H A D | generic.c | 233 if (udev->authorized == 0) in usb_generic_driver_probe() 234 dev_err(&udev->dev, "Device is not authorized for usage\n"); in usb_generic_driver_probe()
|
H A D | sysfs.c | 723 /* show if the device is authorized (1) or not (0) */ 728 return sysfs_emit(buf, "%u\n", usb_dev->authorized); in authorized_show() 752 static DEVICE_ATTR_IGNORE_LOCKDEP(authorized, S_IRUGO | S_IWUSR, 945 * for initializing the authorized attribute of interfaces 961 * for initializing the authorized attribute of interfaces 1153 * 1 is authorized, 0 is deauthorized 1160 return sysfs_emit(buf, "%u\n", intf->authorized); in interface_authorized_show() 1183 __ATTR(authorized, S_IRUGO | S_IWUSR,
|
H A D | message.c | 1791 if (intf->authorized) { in usb_deauthorize_interface() 1793 intf->authorized = 0; in usb_deauthorize_interface() 1811 if (!intf->authorized) { in usb_authorize_interface() 1813 intf->authorized = 1; /* authorize interface */ in usb_authorize_interface() 1976 * Note that a non-authorized device (dev->authorized == 0) will only 2001 if (dev->authorized == 0 || configuration == -1) in usb_set_configuration() 2108 intf->authorized = !!HCD_INTF_AUTHORIZED(hcd); in usb_set_configuration()
|
H A D | driver.c | 334 if (udev->authorized == 0) { in usb_probe_interface() 335 dev_err(&intf->dev, "Device is not authorized for usage\n"); in usb_probe_interface() 337 } else if (intf->authorized == 0) { in usb_probe_interface() 338 dev_err(&intf->dev, "Interface %d is not authorized for usage\n", in usb_probe_interface() 548 /* reject claim if interface is not authorized */ in usb_driver_claim_interface() 549 if (!iface->authorized) in usb_driver_claim_interface()
|
H A D | usb.c | 741 dev->authorized = usb_dev_authorized(dev, usb_hcd); in usb_alloc_dev()
|
/kernel/linux/linux-5.10/kernel/sched/rtg/ |
H A D | rtg_ctrl.c | 755 bool authorized = true; in do_proc_rtg_ioctl() local 781 authorized = check_authorized(func_id, RTG_AUTH_FLAG); in do_proc_rtg_ioctl() 782 if (!authorized) { in do_proc_rtg_ioctl() 783 pr_err("[SCHED_RTG] %s: uid not authorized.\n", __func__); in do_proc_rtg_ioctl()
|
/kernel/linux/linux-6.6/kernel/sched/rtg/ |
H A D | rtg_ctrl.c | 755 bool authorized = true; in do_proc_rtg_ioctl() local 781 authorized = check_authorized(func_id, RTG_AUTH_FLAG); in do_proc_rtg_ioctl() 782 if (!authorized) { in do_proc_rtg_ioctl() 783 pr_err("[SCHED_RTG] %s: uid not authorized.\n", __func__); in do_proc_rtg_ioctl()
|
/kernel/linux/linux-6.6/drivers/net/wireless/intel/iwlwifi/mvm/ |
H A D | mld-mac.c | 107 * We always want to hear MCAST frames, if we're not authorized yet, in iwl_mvm_mld_mac_ctxt_cmd_sta() 121 if (!mvmvif->authorized && in iwl_mvm_mld_mac_ctxt_cmd_sta()
|
H A D | sta.h | 364 * @authorized: indicates station is authorized 417 bool authorized; member
|
H A D | rs-fw.c | 596 .max_ch_width = mvmsta->authorized ? in iwl_mvm_rs_fw_rate_init()
|
/kernel/linux/linux-5.10/include/linux/ |
H A D | usb.h | 198 * @authorized: This allows to (de)authorize individual interfaces instead 255 unsigned authorized:1; /* used for interface authorization */ member 585 * @authorized: policy has said we can use it; 587 * used or not. By default, wired USB devices are authorized. 672 unsigned authorized:1; member
|
/kernel/linux/linux-6.6/include/linux/ |
H A D | usb.h | 203 * @authorized: This allows to (de)authorize individual interfaces instead 264 unsigned authorized:1; /* used for interface authorization */ member 607 * @authorized: policy has said we can use it; 609 * used or not. By default, wired USB devices are authorized. 692 unsigned authorized:1; member
|