Searched refs:privileged (Results 1 - 17 of 17) sorted by relevance

/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/infiniband/hw/mthca/
H A Dmthca_pd.c41 int mthca_pd_alloc(struct mthca_dev *dev, int privileged, struct mthca_pd *pd) argument
45 pd->privileged = privileged;
52 if (privileged) {
66 if (pd->privileged)
H A Dmthca_provider.h103 int privileged; member in struct:mthca_pd
H A Dmthca_dev.h464 int mthca_pd_alloc(struct mthca_dev *dev, int privileged, struct mthca_pd *pd);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/infiniband/hw/amso1100/
H A Dc2_pd.c42 int c2_pd_alloc(struct c2_dev *c2dev, int privileged, struct c2_pd *pd) argument
H A Dc2.h510 extern int c2_pd_alloc(struct c2_dev *c2dev, int privileged, struct c2_pd *pd);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/mtools-4.0.10/
H A Dplain_io.c45 int privileged; member in struct:SimpleFile_t
408 if(This->privileged)
414 if(This->privileged)
522 This->privileged = IS_PRIVILEGED(dev);
673 if(This->privileged)
676 if(This->privileged)
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/nsswitch/
H A Dwinbindd_acct.c867 if ( !state->privileged ) {
868 DEBUG(2, ("winbindd_create_user: non-privileged access denied!\n"));
967 if ( !state->privileged ) {
968 DEBUG(2, ("winbindd_create_group: non-privileged access denied!\n"));
1031 if ( !state->privileged ) {
1032 DEBUG(2, ("winbindd_add_user_to_group: non-privileged access denied!\n"));
1079 if ( !state->privileged ) {
1080 DEBUG(2, ("winbindd_remove_user_from_group: non-privileged access denied!\n"));
1122 if ( !state->privileged ) {
1123 DEBUG(2, ("winbindd_set_user_primary_group: non-privileged acces
[all...]
H A Dwinbindd.h45 BOOL privileged; /* Is the client 'privileged' */ member in struct:winbindd_cli_state
H A Dwinbindd.c338 static void new_connection(int listen_sock, BOOL privileged) argument
368 state->privileged = privileged;
697 /* new, non-privileged connection */
711 /* new, privileged connection */
H A Dwinbindd_sid.c488 if ( !state->privileged ) {
489 DEBUG(2, ("winbindd_allocate_rid: non-privileged access "
H A Dwinbindd_pam.c439 if (!state->privileged) {
441 DEBUG(2, ("winbindd_pam_auth_crap: non-privileged access denied. !\n"));
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/pppd/
H A Dpppd.h121 #define OPT_PRIV 0x1000 /* privileged option */
226 extern int privileged; /* We were run by real-uid root */
685 int privileged));
689 int options_from_list __P((struct wordlist *, int privileged));
H A Dmain.c145 int privileged; /* we're running as real uid root */ variable
340 privileged = uid == 0;
378 if (!options_from_file(_PATH_SYSOPTIONS, !privileged, 0, 1)
H A Doptions.c234 "Take options from a privileged file", OPT_NOPRINT },
371 privileged_option = privileged;
495 ret = options_from_file(path, 0, 1, privileged);
H A Dauth.c392 "Allow group members to use privileged options", OPT_PRIV | OPT_A2LIST },
470 * privgroup - allow members of the group to have privileged access.
486 privileged = 1;
1240 if (!auth_required && !allow_any_ip && have_route_to(0) && !privileged) {
2237 return allow_any_ip || privileged || !have_route_to(addr);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/net/sunrpc/
H A Drpcb_clnt.c140 int proto, int version, int privileged)
155 if (!privileged)
139 rpcb_create(char *hostname, struct sockaddr *srvaddr, int proto, int version, int privileged) argument
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/iproute2/doc/
H A Dapi-ip6-flowlabels.tex233 One idea is to disallow not privileged user to allocate flow

Completed in 182 milliseconds