Home
last modified time | relevance | path

Searched refs:strict (Results 1 – 25 of 39) sorted by relevance

12

/systemd-251/test/test-execute/
Dexec-protecthome-tmpfs-vs-protectsystem-strict.service3 Description=Test ProtectHome=tmpfs vs ProtectSystem=strict
8 ProtectSystem=strict
/systemd-251/src/portable/
Dmeson.build27 install_data('profile/strict/service.conf', install_dir : profiledir / 'strict')
/systemd-251/docs/
DUSER_NAMES.md72 Philosophically, the strict mode described below enforces an allow list of
85 In strict mode, only uppercase and lowercase characters are allowed, as well as
95 Note that these rules are both more strict and more relaxed than all of the
97 systemd's strict rules will not necessarily pass a test by the rules enforced
113 warning is shown if the specified user name does not qualify by the strict
149 Note that these relaxed rules are implied by the strict rules above, i.e. all
150 user/group names accepted by the strict rules are also accepted by the relaxed
/systemd-251/src/veritysetup/
Dveritysetup.c43 static int save_roothashsig_option(const char *option, bool strict) { in save_roothashsig_option() argument
58 if (!strict) in save_roothashsig_option()
/systemd-251/src/shared/
Dhwdb-util.h9 int hwdb_update(const char *root, const char *hwdb_bin_dir, bool strict, bool compat);
/systemd-251/src/libsystemd-network/
Ddhcp-identifier.c31 int dhcp_validate_duid_len(DUIDType duid_type, size_t duid_len, bool strict) { in dhcp_validate_duid_len() argument
38 if (!strict) in dhcp_validate_duid_len()
Ddhcp-identifier.h57 int dhcp_validate_duid_len(DUIDType duid_type, size_t duid_len, bool strict);
/systemd-251/test/units/
Dtestsuite-66-deviceisolation.service6 DevicePolicy=strict
/systemd-251/src/portable/profile/strict/
Dservice.conf13 ProtectSystem=strict
/systemd-251/src/portable/profile/nonetwork/
Dservice.conf16 ProtectSystem=strict
/systemd-251/src/portable/profile/default/
Dservice.conf18 ProtectSystem=strict
/systemd-251/units/
Dsystemd-timedated.service.in33 ProtectSystem=strict
Dsystemd-userdbd.service.in33 ProtectSystem=strict
Dsystemd-coredump@.service.in36 ProtectSystem=strict
Dsystemd-hostnamed.service.in34 ProtectSystem=strict
Dsystemd-localed.service.in35 ProtectSystem=strict
Dsystemd-journal-remote.service.in32 ProtectSystem=strict
Dsystemd-resolved.service.in40 ProtectSystem=strict
Dsystemd-timesyncd.service.in42 ProtectSystem=strict
Dsystemd-oomd.service.in46 ProtectSystem=strict
Dsystemd-logind.service.in47 ProtectSystem=strict
Dsystemd-nspawn@.service.in31 {# Enforce a strict device policy, similar to the one nspawn configures when it
Dsystemd-networkd.service.in37 ProtectSystem=strict
/systemd-251/test/fuzz/fuzz-unit-file/
Dsystemd-resolved.service34 ProtectSystem=strict
/systemd-251/shell-completion/bash/
Dportablectl51 comps="default nonetwork strict trusted"

12