Searched refs:how (Results 1 – 25 of 71) sorted by relevance
123
/systemd-251/src/basic/ |
D | signal-util.c | 99 int sigprocmask_many(int how, sigset_t *old, ...) { in sigprocmask_many() argument 114 if (sigprocmask(how, &ss, old) < 0) in sigprocmask_many()
|
D | signal-util.h | 35 int sigprocmask_many(int how, sigset_t *old, ...);
|
/systemd-251/sysusers.d/ |
D | README | 5 man:systemd-sysusers(8) for a description of when and how this configuration is
|
/systemd-251/sysctl.d/ |
D | README | 6 how this configuration is applied.
|
/systemd-251/tmpfiles.d/ |
D | README | 5 man:systemd-tmpfiles(8) for a description of when and how this configuration is
|
/systemd-251/docs/ |
D | RESOLVED-VPNS.md | 70 domain. (The *dot* domain `.` is how DNS denotes the "root" domain, i.e. the 117 Let's discuss how the three DNS routing concepts above are best used for a 129 Here's how to best configure this for `systemd-resolved.service`: 182 Now we determined how we want to configure things, but how do you actually get 240 Many VPN implementations provide a way how VPN servers can inform VPN clients
|
D | AUTOMATIC_BOOT_ASSESSMENT.md | 65 encoding how many attempts to boot this entry shall still be made. The second 66 number is the "tries done" counter, encoding how many failed attempts to boot 78 Here's an example walkthrough of how this all fits together. 205 right-away, so that it never is tried again, how do I do that?* — You may
|
D | CONVERTING_TO_HOMED.md | 15 `systemd-homed` managed one. Below is a brief guide how to do that. 109 `--disk-size=`, in order to change how your home directory shall be stored
|
D | HACKING.md | 167 guidance in [CONTRIBUTING.md](CONTRIBUTING.md) on how to report a security vulnerability. 256 To simplify debugging systemd when testing changes using mkosi, we're going to show how to attach 286 debugger how to attach to the systemd instance running in our mkosi container/VM. Create the file a… 324 Now that the debugger knows how to connect to our process in the container/VM and we've set up the …
|
D | CONTRIBUTING.md | 18 * Please include an explanation how to reproduce the issue you are pointing out. 36 …change before submitting the PR. See the [Hacking guide](HACKING.md) for details on how to do this.
|
D | PREDICTABLE_INTERFACE_NAMES.md | 60 ## I don't like this, how do I disable this? 70 …ming-scheme.html) man page. Please refer to this in case you are wondering how to decode the new i…
|
D | GVARIANT-SERIALIZATION.md | 88 32bit array size (since that is how arrays are encoded on dbus1),
|
D | DESKTOP_ENVIRONMENTS.md | 116 …* Are there strong opinions on how the session-leader process should watch the user's session unit…
|
D | UIDS-GIDS.md | 183 If you hack on a container manager, and wonder how and how many UIDs best to
|
D | CGROUP_DELEGATION.md | 88 systemd supports three different modes how cgroups are set up. Specifically: 129 If you wonder how to detect which of these three modes is currently used, use 450 is really up to you how you do it. Just do it, and be careful.
|
D | USER_NAMES.md | 88 (typically 256 on Linux; rationale: this is how POSIX suggests to detect the
|
D | USER_RECORD.md | 293 umasks, i.e. 0000…0777 (in octal as typical in UNIX), or 0…511 (in decimal, how 554 encoding how much time has to pass at least/at most between password changes of 559 `passwordChangeWarnUSec` → An unsigned 64bit integer, encoding how much time to 563 `passwordChangeInactiveUSec` → An unsigned 64bit integer, encoding how much 576 below). It's undefined how precise the URI is: during log-in it is tested
|
D | BOOT_LOADER_SPECIFICATION.md | 18 The Boot Loader Specification defines a scheme how different operating systems 418 useful so much: we'd still need to come up with a way how userspace could
|
/systemd-251/src/shared/linux/ |
D | auto_dev-ioctl.h | 63 __u32 how; member
|
/systemd-251/ |
D | TODO | 43 - how to make changes to sysctl and sysfs attributes 45 - how to pass throw-away units to systemd, or dynamically change properties of existing units 48 - how to develop against journal browsing APIs 55 - how to create your own target 175 * add a clear concept how the initrd can make up credentials on their own to 433 file system tree to boot into, similar to how we do that for the gpt auto 499 including a path to an AF_UNIX path, similar to how we do things with the 1095 * PID1: find a way how we can reload unit file configuration for 1179 * figure out a nice way how we can let the admin know what child/sibling unit causes cgroup members… 1203 - how to reset dynamically changed unit cgroup attributes sanely? [all …]
|
D | README.md | 33 Please see the [Hacking guide](docs/HACKING.md) for information on how to hack on systemd and test …
|
D | LICENSE.GPL2 | 109 these conditions, and telling the user how to view a copy of this 310 Also add information on how to contact you by electronic and paper mail.
|
/systemd-251/hwdb.d/ |
D | 70-pointingstick.hwdb | 61 # by how much to multiply deltas generated by the pointingstick to get
|
/systemd-251/test/ |
D | README.testsuite | 212 you the information how to connect to the testbed for further debugging.
|
/systemd-251/LICENSES/ |
D | LGPL-2.0-or-later.txt | 36 …change the free libraries that are incorporated in them. (We have not seen how to achieve this as … 163 Also add information on how to contact you by electronic and paper mail.
|
123