/systemd-251/src/boot/efi/ |
D | measure.c | 80 TCG_BOOT_SERVICE_CAPABILITY capability = { in tcg1_interface_check() local 81 .Size = sizeof(capability), in tcg1_interface_check() 93 &capability, in tcg1_interface_check() 100 if (capability.TPMDeactivatedFlag) in tcg1_interface_check() 103 if (!capability.TPMPresentFlag) in tcg1_interface_check() 110 EFI_TCG2_BOOT_SERVICE_CAPABILITY capability = { in tcg2_interface_check() local 111 .Size = sizeof(capability), in tcg2_interface_check() 120 status = tcg->GetCapability(tcg, &capability); in tcg2_interface_check() 124 if (capability.StructureVersion.Major == 1 && in tcg2_interface_check() 125 capability.StructureVersion.Minor == 0) { in tcg2_interface_check() [all …]
|
/systemd-251/src/libsystemd/sd-bus/ |
D | bus-creds.c | 93 free(c->capability); in sd_bus_creds_unref() 652 static int has_cap(sd_bus_creds *c, size_t offset, int capability) { in has_cap() argument 656 assert(capability >= 0); in has_cap() 657 assert(c->capability); in has_cap() 661 if ((unsigned) capability > lc) in has_cap() 668 …return !!(c->capability[offset * sz + CAP_TO_INDEX((uint32_t) capability)] & CAP_TO_MASK_CORRECTED… in has_cap() 671 _public_ int sd_bus_creds_has_effective_cap(sd_bus_creds *c, int capability) { in sd_bus_creds_has_effective_cap() argument 673 assert_return(capability >= 0, -EINVAL); in sd_bus_creds_has_effective_cap() 678 return has_cap(c, CAP_OFFSET_EFFECTIVE, capability); in sd_bus_creds_has_effective_cap() 681 _public_ int sd_bus_creds_has_permitted_cap(sd_bus_creds *c, int capability) { in sd_bus_creds_has_permitted_cap() argument [all …]
|
D | bus-convenience.c | 659 _public_ int sd_bus_query_sender_privilege(sd_bus_message *call, int capability) { in sd_bus_query_sender_privilege() argument 673 if (capability >= 0) { in sd_bus_query_sender_privilege() 686 r = sd_bus_creds_has_effective_cap(creds, capability); in sd_bus_query_sender_privilege() 700 if (our_uid != 0 || !know_caps || capability < 0) { in sd_bus_query_sender_privilege()
|
D | bus-creds.h | 48 uint32_t *capability; member
|
/systemd-251/src/udev/cdrom_id/ |
D | cdrom_id.c | 252 int capability, r; in cd_capability_compat() local 256 capability = ioctl(c->fd, CDROM_GET_CAPABILITY, NULL); in cd_capability_compat() 257 if (capability < 0) in cd_capability_compat() 260 if (capability & CDC_CD_R) { in cd_capability_compat() 265 if (capability & CDC_CD_RW) { in cd_capability_compat() 270 if (capability & CDC_DVD) { in cd_capability_compat() 275 if (capability & CDC_DVD_R) { in cd_capability_compat() 280 if (capability & CDC_DVD_RAM) { in cd_capability_compat() 285 if (capability & CDC_MRW) { in cd_capability_compat() 290 if (capability & CDC_MRW_W) { in cd_capability_compat()
|
/systemd-251/src/nspawn/ |
D | nspawn-seccomp.c | 32 uint64_t capability; in add_syscall_filters() member 146 … if (allow_list[i].capability != 0 && (cap_list_retain & (1ULL << allow_list[i].capability)) == 0) in add_syscall_filters()
|
D | nspawn-gperf.gperf | 28 … config_parse_capability, 0, offsetof(Settings, capability)
|
D | nspawn-settings.h | 169 uint64_t capability; member
|
/systemd-251/src/shared/ |
D | bus-polkit.h | 8 int bus_test_polkit(sd_bus_message *call, int capability, const char *action, const char **details,… 10 int bus_verify_polkit_async(sd_bus_message *call, int capability, const char *action, const char **…
|
D | bus-polkit.c | 63 int capability, in bus_test_polkit() argument 81 r = sd_bus_query_sender_privilege(call, capability); in bus_test_polkit() 253 int capability, in bus_verify_polkit_async() argument 318 r = sd_bus_query_sender_privilege(call, capability); in bus_verify_polkit_async()
|
D | tpm2-util.h | 24 …ontext, ESYS_TR shandle1, ESYS_TR shandle2, ESYS_TR shandle3, TPM2_CAP capability, UINT32 property…
|
/systemd-251/shell-completion/bash/ |
D | systemd-nspawn | 67 …[ARG]='-D --directory -u --user --uuid --capability --drop-capability --link-journal --bind --bind… 91 --capability) 95 --drop-capability)
|
/systemd-251/src/analyze/ |
D | meson.build | 8 'analyze-capability.c', 9 'analyze-capability.h',
|
/systemd-251/units/ |
D | systemd-journald.service.in | 45 # /proc/<pid>/exe requires this capability. Thus if this capability is missing
|
/systemd-251/src/core/ |
D | dbus-util.c | 130 int capability, in bus_verify_manage_units_async_full() argument 150 capability, in bus_verify_manage_units_async_full()
|
/systemd-251/src/basic/ |
D | generate-cap-list.sh | 6 ${1:?} -dM -include linux/capability.h -include "${2:?}" -include "${3:?}" - </dev/null | \
|
D | meson.build | 24 'capability-util.c', 25 'capability-util.h', 301 ['cap', cap_list_txt, 'capability', ''],
|
/systemd-251/src/systemd/ |
D | sd-bus.h | 392 int sd_bus_query_sender_privilege(sd_bus_message *m, int capability); 428 int sd_bus_creds_has_effective_cap(sd_bus_creds *c, int capability); 429 int sd_bus_creds_has_permitted_cap(sd_bus_creds *c, int capability); 430 int sd_bus_creds_has_inheritable_cap(sd_bus_creds *c, int capability); 431 int sd_bus_creds_has_bounding_cap(sd_bus_creds *c, int capability);
|
/systemd-251/test/test-execute/ |
D | exec-privatedevices-no-capability-mknod.service | 3 Description=Test CAP_MKNOD capability for PrivateDevices=no
|
D | exec-privatedevices-no-capability-sys-rawio.service | 3 Description=Test CAP_SYS_RAWIO capability for PrivateDevices=no
|
D | exec-privatedevices-yes-capability-mknod.service | 3 Description=Test CAP_MKNOD capability for PrivateDevices=yes
|
D | exec-privatedevices-yes-capability-sys-rawio.service | 3 Description=Test CAP_SYS_RAWIO capability for PrivateDevices=yes
|
/systemd-251/shell-completion/zsh/ |
D | _systemd-analyze | 58 'capability:List capability definitions'
|
D | _systemd-nspawn | 37 …'--capability=[List one or more additional capabilities to grant the container.]:capabilities:_sys… 38 …'--drop-capability=[Specify one or more additional capabilities to drop for the containerm]:capabi…
|
/systemd-251/docs/ |
D | CONTAINER_INTERFACE.md | 280 capability. If you take away the capability, then all services that set this 283 device nodes the container can create instead of taking away the capability 292 services that make use of these options if you drop the capability. Also 294 and that won't work either if you take away the capability. (Also see 348 native support for container-virtualized audit, adding the capability to the
|