Searched refs:chain (Results 1 – 13 of 13) sorted by relevance
/systemd-251/shell-completion/zsh/ |
D | _systemd-analyze | 14 (( $+functions[_systemd-analyze_critical-chain] )) || 15 _systemd-analyze_critical-chain() { 50 'critical-chain:Print a tree of the time critical chain of units' 107 …'--fuzz=[When printing the tree of the critical chain, print also services, which finished TIMESPA…
|
/systemd-251/src/libsystemd/sd-netlink/ |
D | netlink-message-nfnl.c | 72 const char *chain, in sd_nfnl_nft_message_new_basechain() argument 88 r = sd_netlink_message_append_string(m, NFTA_CHAIN_NAME, chain); in sd_nfnl_nft_message_new_basechain() 163 const char *chain) { in sd_nfnl_nft_message_new_rule() argument 176 r = sd_netlink_message_append_string(m, NFTA_RULE_CHAIN, chain); in sd_nfnl_nft_message_new_rule()
|
/systemd-251/src/shared/ |
D | firewall-util-iptables.c | 88 static const xt_chainlabel chain = "POSTROUTING"; in fw_iptables_add_masquerade() local 135 if (iptc_check_entry(chain, entry, (unsigned char*) mask, h)) in fw_iptables_add_masquerade() 140 if (!iptc_insert_entry(chain, entry, 0, h)) in fw_iptables_add_masquerade() 143 if (!iptc_delete_entry(chain, entry, (unsigned char*) mask, h)) { in fw_iptables_add_masquerade()
|
D | firewall-util-nft.c | 322 const char *chain) { in sd_nfnl_message_new_masq_rule() argument 328 r = sd_nfnl_nft_message_new_rule(nfnl, &m, family, NFT_SYSTEMD_TABLE_NAME, chain); in sd_nfnl_message_new_masq_rule() 364 const char *chain) { in sd_nfnl_message_new_dnat_rule_pre() argument 373 r = sd_nfnl_nft_message_new_rule(nfnl, &m, family, NFT_SYSTEMD_TABLE_NAME, chain); in sd_nfnl_message_new_dnat_rule_pre() 421 int family, const char *chain) { in sd_nfnl_message_new_dnat_rule_out() argument 428 r = sd_nfnl_nft_message_new_rule(nfnl, &m, family, NFT_SYSTEMD_TABLE_NAME, chain); in sd_nfnl_message_new_dnat_rule_out()
|
/systemd-251/src/analyze/ |
D | meson.build | 14 'analyze-critical-chain.c', 15 'analyze-critical-chain.h',
|
/systemd-251/docs/ |
D | JOURNAL_FILE_FORMAT.md | 224 **data_hash_chain_depth** is a counter of the deepest chain in the data hash 225 table, minus one. This is updated whenever a chain is found that is longer than 226 the previous deepest chain found. Note that the counter is updated during hash 231 Similar, **field_hash_chain_depth** is a counter of the deepest chain in the 523 chain up the objects. Empty cells have both offsets set to 0. 563 chain of entry arrays they should increase in size (double). 568 One chain of entry arrays links up all entries written to the journal. The 572 Each DATA object also references an entry array chain listing all entries 630 match is first identified, and then its data entry array chain traversed. The 650 look up the FIELD object and follow the chain of links to all DATA it includes.
|
D | BOOT_LOADER_SPECIFICATION.md | 48 configured to never touch the MBR and instead install a chain-loaded boot
|
D | CODING_STYLE.md | 660 handling. Please escalate errors up your call chain, and use normal `return`
|
/systemd-251/src/systemd/ |
D | sd-netlink.h | 222 int family, const char *table, const char *chain, 225 int family, const char *table, const char *chain);
|
/systemd-251/shell-completion/bash/ |
D | systemd-analyze | 64 [CRITICAL_CHAIN]='critical-chain'
|
/systemd-251/ |
D | README | 336 chain-loads the "dns" module if it can't talk to resolved).
|
D | TODO | 1565 …to log into record signed by unrecognized key, automatically add key to our chain after polkit auth
|
D | NEWS | 1087 useful for debugging purposes as it allows chain-loading one a 1310 * userdbctl's ssh-authorized-keys command learnt a new --chain switch, 7372 implement a complete UEFI SecureBoot trust chain, involving a signed 12434 * systemd-analyze gained a new "critical-chain" command that 12435 determines the slowest chain of units run during system
|