Home
last modified time | relevance | path

Searched refs:capability (Results 1 – 25 of 35) sorted by relevance

12

/systemd-251/src/boot/efi/
Dmeasure.c80 TCG_BOOT_SERVICE_CAPABILITY capability = { in tcg1_interface_check() local
81 .Size = sizeof(capability), in tcg1_interface_check()
93 &capability, in tcg1_interface_check()
100 if (capability.TPMDeactivatedFlag) in tcg1_interface_check()
103 if (!capability.TPMPresentFlag) in tcg1_interface_check()
110 EFI_TCG2_BOOT_SERVICE_CAPABILITY capability = { in tcg2_interface_check() local
111 .Size = sizeof(capability), in tcg2_interface_check()
120 status = tcg->GetCapability(tcg, &capability); in tcg2_interface_check()
124 if (capability.StructureVersion.Major == 1 && in tcg2_interface_check()
125 capability.StructureVersion.Minor == 0) { in tcg2_interface_check()
[all …]
/systemd-251/src/libsystemd/sd-bus/
Dbus-creds.c93 free(c->capability); in sd_bus_creds_unref()
652 static int has_cap(sd_bus_creds *c, size_t offset, int capability) { in has_cap() argument
656 assert(capability >= 0); in has_cap()
657 assert(c->capability); in has_cap()
661 if ((unsigned) capability > lc) in has_cap()
668 …return !!(c->capability[offset * sz + CAP_TO_INDEX((uint32_t) capability)] & CAP_TO_MASK_CORRECTED… in has_cap()
671 _public_ int sd_bus_creds_has_effective_cap(sd_bus_creds *c, int capability) { in sd_bus_creds_has_effective_cap() argument
673 assert_return(capability >= 0, -EINVAL); in sd_bus_creds_has_effective_cap()
678 return has_cap(c, CAP_OFFSET_EFFECTIVE, capability); in sd_bus_creds_has_effective_cap()
681 _public_ int sd_bus_creds_has_permitted_cap(sd_bus_creds *c, int capability) { in sd_bus_creds_has_permitted_cap() argument
[all …]
Dbus-convenience.c659 _public_ int sd_bus_query_sender_privilege(sd_bus_message *call, int capability) { in sd_bus_query_sender_privilege() argument
673 if (capability >= 0) { in sd_bus_query_sender_privilege()
686 r = sd_bus_creds_has_effective_cap(creds, capability); in sd_bus_query_sender_privilege()
700 if (our_uid != 0 || !know_caps || capability < 0) { in sd_bus_query_sender_privilege()
Dbus-creds.h48 uint32_t *capability; member
/systemd-251/src/udev/cdrom_id/
Dcdrom_id.c252 int capability, r; in cd_capability_compat() local
256 capability = ioctl(c->fd, CDROM_GET_CAPABILITY, NULL); in cd_capability_compat()
257 if (capability < 0) in cd_capability_compat()
260 if (capability & CDC_CD_R) { in cd_capability_compat()
265 if (capability & CDC_CD_RW) { in cd_capability_compat()
270 if (capability & CDC_DVD) { in cd_capability_compat()
275 if (capability & CDC_DVD_R) { in cd_capability_compat()
280 if (capability & CDC_DVD_RAM) { in cd_capability_compat()
285 if (capability & CDC_MRW) { in cd_capability_compat()
290 if (capability & CDC_MRW_W) { in cd_capability_compat()
/systemd-251/src/nspawn/
Dnspawn-seccomp.c32 uint64_t capability; in add_syscall_filters() member
146 … if (allow_list[i].capability != 0 && (cap_list_retain & (1ULL << allow_list[i].capability)) == 0) in add_syscall_filters()
Dnspawn-gperf.gperf28 … config_parse_capability, 0, offsetof(Settings, capability)
Dnspawn-settings.h169 uint64_t capability; member
/systemd-251/src/shared/
Dbus-polkit.h8 int bus_test_polkit(sd_bus_message *call, int capability, const char *action, const char **details,…
10 int bus_verify_polkit_async(sd_bus_message *call, int capability, const char *action, const char **…
Dbus-polkit.c63 int capability, in bus_test_polkit() argument
81 r = sd_bus_query_sender_privilege(call, capability); in bus_test_polkit()
253 int capability, in bus_verify_polkit_async() argument
318 r = sd_bus_query_sender_privilege(call, capability); in bus_verify_polkit_async()
Dtpm2-util.h24 …ontext, ESYS_TR shandle1, ESYS_TR shandle2, ESYS_TR shandle3, TPM2_CAP capability, UINT32 property…
/systemd-251/shell-completion/bash/
Dsystemd-nspawn67 …[ARG]='-D --directory -u --user --uuid --capability --drop-capability --link-journal --bind --bind…
91 --capability)
95 --drop-capability)
/systemd-251/src/analyze/
Dmeson.build8 'analyze-capability.c',
9 'analyze-capability.h',
/systemd-251/units/
Dsystemd-journald.service.in45 # /proc/<pid>/exe requires this capability. Thus if this capability is missing
/systemd-251/src/core/
Ddbus-util.c130 int capability, in bus_verify_manage_units_async_full() argument
150 capability, in bus_verify_manage_units_async_full()
/systemd-251/src/basic/
Dgenerate-cap-list.sh6 ${1:?} -dM -include linux/capability.h -include "${2:?}" -include "${3:?}" - </dev/null | \
Dmeson.build24 'capability-util.c',
25 'capability-util.h',
301 ['cap', cap_list_txt, 'capability', ''],
/systemd-251/src/systemd/
Dsd-bus.h392 int sd_bus_query_sender_privilege(sd_bus_message *m, int capability);
428 int sd_bus_creds_has_effective_cap(sd_bus_creds *c, int capability);
429 int sd_bus_creds_has_permitted_cap(sd_bus_creds *c, int capability);
430 int sd_bus_creds_has_inheritable_cap(sd_bus_creds *c, int capability);
431 int sd_bus_creds_has_bounding_cap(sd_bus_creds *c, int capability);
/systemd-251/test/test-execute/
Dexec-privatedevices-no-capability-mknod.service3 Description=Test CAP_MKNOD capability for PrivateDevices=no
Dexec-privatedevices-no-capability-sys-rawio.service3 Description=Test CAP_SYS_RAWIO capability for PrivateDevices=no
Dexec-privatedevices-yes-capability-mknod.service3 Description=Test CAP_MKNOD capability for PrivateDevices=yes
Dexec-privatedevices-yes-capability-sys-rawio.service3 Description=Test CAP_SYS_RAWIO capability for PrivateDevices=yes
/systemd-251/shell-completion/zsh/
D_systemd-analyze58 'capability:List capability definitions'
D_systemd-nspawn37 …'--capability=[List one or more additional capabilities to grant the container.]:capabilities:_sys…
38 …'--drop-capability=[Specify one or more additional capabilities to drop for the containerm]:capabi…
/systemd-251/docs/
DCONTAINER_INTERFACE.md280 capability. If you take away the capability, then all services that set this
283 device nodes the container can create instead of taking away the capability
292 services that make use of these options if you drop the capability. Also
294 and that won't work either if you take away the capability. (Also see
348 native support for container-virtualized audit, adding the capability to the

12