Searched refs:capabilities (Results 1 – 25 of 25) sorted by relevance
/systemd-251/src/udev/v4l_id/ |
D | v4l_id.c | 67 int capabilities; in main() local 71 if (v2cap.capabilities & V4L2_CAP_DEVICE_CAPS) in main() 72 capabilities = v2cap.device_caps; in main() 74 capabilities = v2cap.capabilities; in main() 75 if ((capabilities & V4L2_CAP_VIDEO_CAPTURE) > 0 || in main() 76 (capabilities & V4L2_CAP_VIDEO_CAPTURE_MPLANE) > 0) in main() 78 if ((capabilities & V4L2_CAP_VIDEO_OUTPUT) > 0 || in main() 79 (capabilities & V4L2_CAP_VIDEO_OUTPUT_MPLANE) > 0) in main() 81 if ((capabilities & V4L2_CAP_VIDEO_OVERLAY) > 0) in main() 83 if ((capabilities & V4L2_CAP_AUDIO) > 0) in main() [all …]
|
/systemd-251/shell-completion/zsh/ |
D | _systemd-nspawn | 12 _values -s , 'capabilities' "$_caps[@]" 37 …'--capability=[List one or more additional capabilities to grant the container.]:capabilities:_sys… 38 …--drop-capability=[Specify one or more additional capabilities to drop for the containerm]:capabil…
|
/systemd-251/sysctl.d/ |
D | 50-coredump.conf.in | 30 # a program that has file capabilities. ("2" is called "suidsafe" in core(5)). 36 # See proc(5), setuid(2), capabilities(7).
|
/systemd-251/test/test-execute/ |
D | exec-protectkernelmodules-no-capabilities.service | 7 # sed: remove dropped (cap_xxx-[epi]) and IAB capabilities from the output
|
D | exec-protectkernelmodules-yes-capabilities.service | 7 # sed: remove dropped (cap_xxx-[epi]) and IAB capabilities from the output
|
D | exec-capabilityboundingset-invert.service | 6 # sed: remove dropped (cap_xxx-[epi]) and IAB capabilities from the output
|
D | exec-privatedevices-no-capability-mknod.service | 7 # sed: remove dropped (cap_xxx-[epi]) and IAB capabilities from the output
|
D | exec-privatedevices-no-capability-sys-rawio.service | 7 # sed: remove dropped (cap_xxx-[epi]) and IAB capabilities from the output
|
D | exec-privatedevices-yes-capability-mknod.service | 7 # sed: remove dropped (cap_xxx-[epi]) and IAB capabilities from the output
|
D | exec-privatedevices-yes-capability-sys-rawio.service | 7 # sed: remove dropped (cap_xxx-[epi]) and IAB capabilities from the output
|
D | exec-protectkernellogs-no-capabilities.service | 7 # sed: remove dropped (cap_xxx-[epi]) and IAB capabilities from the output
|
D | exec-protectkernellogs-yes-capabilities.service | 7 # sed: remove dropped (cap_xxx-[epi]) and IAB capabilities from the output
|
/systemd-251/rules.d/ |
D | 60-evdev.rules | 17 …IMPORT{builtin}="hwdb 'evdev:name:$attr{name}:phys:$attr{phys}:ev:$attr{capabilities/ev}:$attr{[dm…
|
/systemd-251/test/fuzz/fuzz-udev-rules/ |
D | 60-evdev.rules | 16 …PORT{builtin}="hwdb 'evdev:name:$attr{name}:phys:$attr{phys}:ev:$attr{capabilities/ev}:$attr{[dmi/…
|
/systemd-251/docs/ |
D | CONTAINER_INTERFACE.md | 339 capabilities to the container, in particular not to those making use of user 343 systemd's audit support is partially conditioned on these capabilities, thus 345 will make no attempt to use it. If you pass the capabilities to the payload 369 others, because those capabilities are required to implement these options. The 371 run in a different, less secure environment when the capabilities are missing 376 `CAP_SYS_ADMIN` safely for the user namespace, as capabilities are virtualized 377 and having capabilities inside a container doesn't mean one also has them
|
D | index.md | 10 systemd provides aggressive parallelization capabilities, uses socket and D-Bus activation for star…
|
D | ARCHITECTURE.md | 90 (mostly in the form of effective capabilities). These tests are self-contained,
|
/systemd-251/src/shared/ |
D | condition.c | 663 unsigned long long capabilities = (unsigned long long) -1; in condition_test_capability() local 695 if (sscanf(line+7, "%llx", &capabilities) != 1) in condition_test_capability() 702 return !!(capabilities & (1ULL << value)); in condition_test_capability()
|
/systemd-251/hwdb.d/ |
D | 70-pointingstick.hwdb | 16 # is an arbitrary length input-modalias describing the device capabilities.
|
D | 60-keyboard.hwdb | 22 # is an arbitrary length input-modalias describing the device capabilities. 42 # /sys/class/input/input?/capabilities/ev" and <vendor> is the
|
D | pci.ids | 25584 # Device surfaced in guests to provide 2d graphics capabilities
|
/systemd-251/src/network/ |
D | networkctl.c | 2524 _cleanup_free_ char *capabilities = NULL; in link_lldp_status() local 2541 capabilities = lldp_capabilities_to_string(cc); in link_lldp_status() 2549 TABLE_STRING, strna(capabilities), in link_lldp_status()
|
/systemd-251/ |
D | README | 34 ≥ 4.3 for ambient capabilities
|
D | NEWS | 1811 capabilities only within its namespace and not on the host. 2312 capabilities passed to the container payload. 2951 capabilities by the systemd build and by the kernel. 4028 system clock and the CAP_SYS_TIME and CAP_WAKE_ALARM capabilities. 4205 capabilities. This should fix issues where other programs trying to 4355 setuid nor file capabilities) to send ICMP Echo (i.e. ping) requests 5873 binaries and file system capabilities lose their special powers. 6863 systems that support ambient capabilities. This is useful to write 6864 unit files that work with ambient capabilities where possible but 7131 better management capabilities of cgroups-v2. [all …]
|
D | TODO | 185 * drop support for kernels that lack ambient capabilities support (i.e. make 1132 * Find a solution for SMACK capabilities stuff:
|