Home
last modified time | relevance | path

Searched refs:capabilities (Results 1 – 25 of 25) sorted by relevance

/systemd-251/src/udev/v4l_id/
Dv4l_id.c67 int capabilities; in main() local
71 if (v2cap.capabilities & V4L2_CAP_DEVICE_CAPS) in main()
72 capabilities = v2cap.device_caps; in main()
74 capabilities = v2cap.capabilities; in main()
75 if ((capabilities & V4L2_CAP_VIDEO_CAPTURE) > 0 || in main()
76 (capabilities & V4L2_CAP_VIDEO_CAPTURE_MPLANE) > 0) in main()
78 if ((capabilities & V4L2_CAP_VIDEO_OUTPUT) > 0 || in main()
79 (capabilities & V4L2_CAP_VIDEO_OUTPUT_MPLANE) > 0) in main()
81 if ((capabilities & V4L2_CAP_VIDEO_OVERLAY) > 0) in main()
83 if ((capabilities & V4L2_CAP_AUDIO) > 0) in main()
[all …]
/systemd-251/shell-completion/zsh/
D_systemd-nspawn12 _values -s , 'capabilities' "$_caps[@]"
37 …'--capability=[List one or more additional capabilities to grant the container.]:capabilities:_sys…
38 …--drop-capability=[Specify one or more additional capabilities to drop for the containerm]:capabil…
/systemd-251/sysctl.d/
D50-coredump.conf.in30 # a program that has file capabilities. ("2" is called "suidsafe" in core(5)).
36 # See proc(5), setuid(2), capabilities(7).
/systemd-251/test/test-execute/
Dexec-protectkernelmodules-no-capabilities.service7 # sed: remove dropped (cap_xxx-[epi]) and IAB capabilities from the output
Dexec-protectkernelmodules-yes-capabilities.service7 # sed: remove dropped (cap_xxx-[epi]) and IAB capabilities from the output
Dexec-capabilityboundingset-invert.service6 # sed: remove dropped (cap_xxx-[epi]) and IAB capabilities from the output
Dexec-privatedevices-no-capability-mknod.service7 # sed: remove dropped (cap_xxx-[epi]) and IAB capabilities from the output
Dexec-privatedevices-no-capability-sys-rawio.service7 # sed: remove dropped (cap_xxx-[epi]) and IAB capabilities from the output
Dexec-privatedevices-yes-capability-mknod.service7 # sed: remove dropped (cap_xxx-[epi]) and IAB capabilities from the output
Dexec-privatedevices-yes-capability-sys-rawio.service7 # sed: remove dropped (cap_xxx-[epi]) and IAB capabilities from the output
Dexec-protectkernellogs-no-capabilities.service7 # sed: remove dropped (cap_xxx-[epi]) and IAB capabilities from the output
Dexec-protectkernellogs-yes-capabilities.service7 # sed: remove dropped (cap_xxx-[epi]) and IAB capabilities from the output
/systemd-251/rules.d/
D60-evdev.rules17 …IMPORT{builtin}="hwdb 'evdev:name:$attr{name}:phys:$attr{phys}:ev:$attr{capabilities/ev}:$attr{[dm…
/systemd-251/test/fuzz/fuzz-udev-rules/
D60-evdev.rules16 …PORT{builtin}="hwdb 'evdev:name:$attr{name}:phys:$attr{phys}:ev:$attr{capabilities/ev}:$attr{[dmi/…
/systemd-251/docs/
DCONTAINER_INTERFACE.md339 capabilities to the container, in particular not to those making use of user
343 systemd's audit support is partially conditioned on these capabilities, thus
345 will make no attempt to use it. If you pass the capabilities to the payload
369 others, because those capabilities are required to implement these options. The
371 run in a different, less secure environment when the capabilities are missing
376 `CAP_SYS_ADMIN` safely for the user namespace, as capabilities are virtualized
377 and having capabilities inside a container doesn't mean one also has them
Dindex.md10 systemd provides aggressive parallelization capabilities, uses socket and D-Bus activation for star…
DARCHITECTURE.md90 (mostly in the form of effective capabilities). These tests are self-contained,
/systemd-251/src/shared/
Dcondition.c663 unsigned long long capabilities = (unsigned long long) -1; in condition_test_capability() local
695 if (sscanf(line+7, "%llx", &capabilities) != 1) in condition_test_capability()
702 return !!(capabilities & (1ULL << value)); in condition_test_capability()
/systemd-251/hwdb.d/
D70-pointingstick.hwdb16 # is an arbitrary length input-modalias describing the device capabilities.
D60-keyboard.hwdb22 # is an arbitrary length input-modalias describing the device capabilities.
42 # /sys/class/input/input?/capabilities/ev" and <vendor> is the
Dpci.ids25584 # Device surfaced in guests to provide 2d graphics capabilities
/systemd-251/src/network/
Dnetworkctl.c2524 _cleanup_free_ char *capabilities = NULL; in link_lldp_status() local
2541 capabilities = lldp_capabilities_to_string(cc); in link_lldp_status()
2549 TABLE_STRING, strna(capabilities), in link_lldp_status()
/systemd-251/
DREADME34 ≥ 4.3 for ambient capabilities
DNEWS1811 capabilities only within its namespace and not on the host.
2312 capabilities passed to the container payload.
2951 capabilities by the systemd build and by the kernel.
4028 system clock and the CAP_SYS_TIME and CAP_WAKE_ALARM capabilities.
4205 capabilities. This should fix issues where other programs trying to
4355 setuid nor file capabilities) to send ICMP Echo (i.e. ping) requests
5873 binaries and file system capabilities lose their special powers.
6863 systems that support ambient capabilities. This is useful to write
6864 unit files that work with ambient capabilities where possible but
7131 better management capabilities of cgroups-v2.
[all …]
DTODO185 * drop support for kernels that lack ambient capabilities support (i.e. make
1132 * Find a solution for SMACK capabilities stuff: