Home
last modified time | relevance | path

Searched refs:chain (Results 1 – 13 of 13) sorted by relevance

/systemd-251/shell-completion/zsh/
D_systemd-analyze14 (( $+functions[_systemd-analyze_critical-chain] )) ||
15 _systemd-analyze_critical-chain() {
50 'critical-chain:Print a tree of the time critical chain of units'
107 …'--fuzz=[When printing the tree of the critical chain, print also services, which finished TIMESPA…
/systemd-251/src/libsystemd/sd-netlink/
Dnetlink-message-nfnl.c72 const char *chain, in sd_nfnl_nft_message_new_basechain() argument
88 r = sd_netlink_message_append_string(m, NFTA_CHAIN_NAME, chain); in sd_nfnl_nft_message_new_basechain()
163 const char *chain) { in sd_nfnl_nft_message_new_rule() argument
176 r = sd_netlink_message_append_string(m, NFTA_RULE_CHAIN, chain); in sd_nfnl_nft_message_new_rule()
/systemd-251/src/shared/
Dfirewall-util-iptables.c88 static const xt_chainlabel chain = "POSTROUTING"; in fw_iptables_add_masquerade() local
135 if (iptc_check_entry(chain, entry, (unsigned char*) mask, h)) in fw_iptables_add_masquerade()
140 if (!iptc_insert_entry(chain, entry, 0, h)) in fw_iptables_add_masquerade()
143 if (!iptc_delete_entry(chain, entry, (unsigned char*) mask, h)) { in fw_iptables_add_masquerade()
Dfirewall-util-nft.c322 const char *chain) { in sd_nfnl_message_new_masq_rule() argument
328 r = sd_nfnl_nft_message_new_rule(nfnl, &m, family, NFT_SYSTEMD_TABLE_NAME, chain); in sd_nfnl_message_new_masq_rule()
364 const char *chain) { in sd_nfnl_message_new_dnat_rule_pre() argument
373 r = sd_nfnl_nft_message_new_rule(nfnl, &m, family, NFT_SYSTEMD_TABLE_NAME, chain); in sd_nfnl_message_new_dnat_rule_pre()
421 int family, const char *chain) { in sd_nfnl_message_new_dnat_rule_out() argument
428 r = sd_nfnl_nft_message_new_rule(nfnl, &m, family, NFT_SYSTEMD_TABLE_NAME, chain); in sd_nfnl_message_new_dnat_rule_out()
/systemd-251/src/analyze/
Dmeson.build14 'analyze-critical-chain.c',
15 'analyze-critical-chain.h',
/systemd-251/docs/
DJOURNAL_FILE_FORMAT.md224 **data_hash_chain_depth** is a counter of the deepest chain in the data hash
225 table, minus one. This is updated whenever a chain is found that is longer than
226 the previous deepest chain found. Note that the counter is updated during hash
231 Similar, **field_hash_chain_depth** is a counter of the deepest chain in the
523 chain up the objects. Empty cells have both offsets set to 0.
563 chain of entry arrays they should increase in size (double).
568 One chain of entry arrays links up all entries written to the journal. The
572 Each DATA object also references an entry array chain listing all entries
630 match is first identified, and then its data entry array chain traversed. The
650 look up the FIELD object and follow the chain of links to all DATA it includes.
DBOOT_LOADER_SPECIFICATION.md48 configured to never touch the MBR and instead install a chain-loaded boot
DCODING_STYLE.md660 handling. Please escalate errors up your call chain, and use normal `return`
/systemd-251/src/systemd/
Dsd-netlink.h222 int family, const char *table, const char *chain,
225 int family, const char *table, const char *chain);
/systemd-251/shell-completion/bash/
Dsystemd-analyze64 [CRITICAL_CHAIN]='critical-chain'
/systemd-251/
DREADME336 chain-loads the "dns" module if it can't talk to resolved).
DTODO1565 …to log into record signed by unrecognized key, automatically add key to our chain after polkit auth
DNEWS1087 useful for debugging purposes as it allows chain-loading one a
1310 * userdbctl's ssh-authorized-keys command learnt a new --chain switch,
7372 implement a complete UEFI SecureBoot trust chain, involving a signed
12434 * systemd-analyze gained a new "critical-chain" command that
12435 determines the slowest chain of units run during system