Home
last modified time | relevance | path

Searched refs:used (Results 1 – 25 of 103) sorted by relevance

12345

/systemd-251/docs/
DUSER_RECORD.md86 JSON is nicely extensible and widely used. In particular it's easy to
146 resource usage (for example: currently used disk space of the user), that
152 reduced version of the user record. This is used to ensure that only user
158 covered by the signature. This section is optional, and is only used when
197 purposes. Inside the home directories (and if the LUKS2 backend is used, also
205 disk. Finally the `secret` section is used during authentication operations via
239 contain control characters (such as `\n`) or colons (`:`), since those are used
261 similar) this should be `system`. The `intrinsic` disposition should be used
263 i.e. the `root` and `nobody` users. The `container` string should be used for
264 users that are used by an OS container, and hence will show up in `ps` listings
[all …]
DJOURNAL_FILE_FORMAT.md63 format is compatible with the format used in the first versions of the journal,
76 … siphash24 is used for newer journal files. For older files [Jenkins lookup3](https://en.wikipedia…
82 * Randomized, unique 128bit IDs are used in various locations. These are generally UUID v4 compatib…
103 ignored on reading. They are currently not used but might be used later on.
138 * An **ENTRY_ARRAY** object, which encapsulates a sorted array of offsets to entries, used for seek…
195 The currently used part of the file is the **header_size** plus the
227 table lookups, as the chains are traversed. This counter is used to determine
240 header's **compatible_flags** field. If a feature extension is used that makes
276 hash function the keyed siphash24 hash function is used for the two hash
322 performance. No file locking is used. The only time where disk synchronization
[all …]
DBUILDING_IMAGES.md39 which is used to seed the kernel's random pool on boot. If this file is
48 is used in the image.
56 5. Remove `/var/lib/systemd/credential.secret` which is used for protecting
69 logic used to generate
76 boot it cannot be used to name the most basic resources required for the boot
84 ID. The file `/etc/kernel/entry-token` may be used to configure this string
89 functionality is invoked (i.e. before the package manager is used to install
91 automatically used for all entries to be generated.
104 1. The `switch-root` logic in systemd, that is used to switch from the initrd
212 `/etc/fstab` may be used to request this functionality.
[all …]
DRESOLVED-VPNS.md28 2. *Privacy* VPNs, i.e. VPNs that should be used for basically all DNS traffic,
29 once they are up. If this type of VPN is used, any regular, non-VPN DNS
36 used to suffix non-qualified domain names (i.e. single-label ones), to turn
43 not just used to suffix single-label domain names, but also for routing
50 about DNS domain name lookup routing — they are not used for qualifying
71 parent domain of all domains, but itself.) When used on an interface any DNS
80 used for doing reverse IP to domain name lookups. e.g. declaring
95 all of them in parallel, and the first positive reply used. If all lookups fail
96 the last negative reply is used. This means the DNS zones on the relevant
104 servers. Only if the match has the same length, then both will be used in
[all …]
DBOOT_LOADER_SPECIFICATION.md22 programs. The same scheme can be used to prepare OS media for cases where the
82 * If the firmware setup is used to reset all data usually all EFI boot entries
104 partition with the type id of 0xEA already exists it should be used as
108 (let's say 500MB), and it should be used as `$BOOT`.
113 be used as `$BOOT`.
117 (let's say 250MB) and otherwise qualifies, it should be used as `$BOOT`.
120 XBOOTLDR partition shall be created and used as `$BOOT`.
122 yet, a new suitably sized (let's say 500MB) ESP should be created and used
191 item. The file name of the file is used for identification of the boot item but
210 syntax. Lines beginning with '#' shall be ignored and used for commenting. The
[all …]
DHOME_DIRECTORY.md15 the format used by these home directories, in the context of the storage
16 mechanism used.
27 corrupting it, or knowing the private key used for signing the record). Note
35 `systemd-homed` is used (i.e. `--storage=directory` or `--storage=subvolume` on
71 the `homectl` command line.) The local password of the user is used to log into
98 encryption used is the same as the LUKS2 volume itself uses, unlocked by the
117 used in a loopback file and on a removable USB stick. (Note that when mounting
132 images can be used as attack vectors, exploiting the kernel. Thus it is
145 Regardless of the storage mechanism used, an activated home directory
DENVIRONMENT.md41 * `$SYSTEMD_PROC_CMDLINE` — if set, the contents are used as the kernel command
66 * `$SYSTEMD_EFI_OPTIONS` — if set, used instead of the string in the
84 to 0, then the built-in default is used.
87 hash tables is turned off, and libc `malloc()` is used for all allocations.
96 `RuntimeDirectory=` is used, see systemd.exec(5).
100 method" is used, but this can be overridden with this environment variable.
207 when determining stable network interface names. This may be used to revert
249 may be used to override ESP path auto detection, and redirect any accesses to
252 done when this environment variable is used.
276 directory is remounted writable. This is primarily used by
[all …]
DPASSWORD_AGENTS.md10used to query the user for system-level passwords or passphrases. These are passphrases that are n…
12 * A Plymouth agent used for querying passwords during boot-up
13 * A console agent used in similar situations if Plymouth is not available
41 …he console, wall and Plymouth agents are started like this. If systemd is used to maintain user se…
DCONTAINER_INTERFACE.md14 when systemd is used inside of an OS container. If you work on a container
111 `/etc/machine-id` (if writable) when this option is used, hence you should
112 always pass the same UUID here. Keeping the externally used UUID for a
142 settings. The same protocol may be used to pass credentials from the
193 using the usual `sd_notify()` protocol that is also used when a service
222 container). Note that this hierarchy is used by various container managers, and
227 mount propagation with the host, and is used as intermediary location for
230 directory: it's used by code outside the container to insert mounts inside
241 Linux). These nodes are used as mount source for implementing the
251 socket in, that may be used for the container's PID 1 to report to the
[all …]
DARCHITECTURE.md25 belongs in `src/basic/`. The split is like this: anything that is used to
36 - may be used by all code in the tree
40 - may be used by all code in the tree, except for code in `src/basic/`
44 - may be used by all code in the tree, except for code in `src/basic/`,
54 BPF helpers written in C and used by PID 1 can be found under `src/core/bpf/`.
172 utilities and scripts that are used by maintainers and developers. They are not
DTRANSLATORS.md14 The build system (meson/ninja) can be used to generate a template (`*.pot`),
15 which can be used to create new translations.
21 they can be used by systemd software. (This step is also useful to confirm the
DDISCOVERABLE_PARTITIONS.md80 …y integrity hash data for the matching root partition. If this feature is used the partition UUID …
152 | _EFI System Partition_ | `c12a7328-f81f-11d2-ba4b-00a0c93ec93b` | VFAT | The ESP used for the cur…
153 …d6f7172` | Typically VFAT | The Extended Boot Loader Partition (XBOOTLDR) used for the current boo…
160 …akes place for other Linux data partitions. This partition type should be used for all partitions …
162 Other GPT type IDs might be used on Linux, for example to mark software RAID or
167 `show` command may be used to list those GPT partition type UUIDs.
187 partition flag bit 63 ("*no-auto*") may be used to turn off auto-discovery
193 bit 60 ("*read-only*") may be used to mark a partition for read-only mounts
209 ("*grow-file-system*") may be used to mark a partition for automatic growing
217 same ones used by Microsoft Basic Data Partitions.
[all …]
DJOURNAL_NATIVE_PROTOCOL.md71 * The second method should be used if the value of a field contains a `\n`
109 second serialization method described above must hence be used for this
116 Note that the same keys may be used multiple times within the same datagram,
120 used for specific Journal fields however, where this is expected. Do not use
135 contains a newline character, and thus the second method is needed to be used.
150 backslash escaping is used.)
155 protocol in clients that previously used the BSD syslog protocol. Behaviour in
DCREDENTIALS.md15 types of information. It may also be used as generic infrastructure for
71 1. `LoadCredential=` may be used to load a credential from disk, from an
74 2. `SetCredential=` may be used to set a credential to a literal string encoded
76 via D-Bus), this should only be used for credentials that aren't sensitive,
85 is thus safe to be used even for sensitive information, because even though
156 tool is provided to work with system and service credentials. It may be used to
162 may be used to write the contents of credential `xyz` to standard output. If
216 This will output a `SetCredentialEncrypted=` line that can directly be used in
271 UEFI kernel stub is used. This allows placing encrypted credentials in the
DINITRD_INTERFACE.md15 an initrd is used, it is a good idea to pass a few bits of runtime information
19 interfaces are currently used by dracut and the ArchLinux initrds.
49 used.
DTEMPORARY_DIRECTORIES.md16 1. `/tmp/` should be used for smaller, size-bounded files only; `/var/tmp/`
17 should be used for everything else.
72 of defense, but should not be used as an excuse to rely on guessable names in
73 `/tmp/` and `/var/tmp/`. When this option is used, the per-service temporary
76 this option is not used. Also note that some applications use `/tmp/` and
167 `/run/tmpfiles.d/`). The `x`/`X` line types may be used to exclude files
169 used, automatic clean-up is not done for matching files and directory, and
205 though, in particular not when `tmpfs` is used as backing file system, because
DAUTOMATIC_BOOT_ASSESSMENT.md12 support is built into various of its components. When used together these
15 However, the different components may also be used independently, and in
82 2. A new kernel is installed. `kernel-install` is used to generate a new boot
123 detects that boot counting is used. It hence pulls
142 determines which boot loader entry file was used to boot the system, and
195 used to back the persistent EFI variables are generally not of the highest
DUIDS-GIDS.md41 4. 65535, aka "16bit `(uid_t) -1`" → Before Linux kernel 2.4 `uid_t` used to be
55 users, but are used as security identities for system daemons, to implement
82 primarily used for `systemd-udevd`'s device management. The precise list of the
124 per-container UID ranges. When the `--private-users=pick` switch is used (or
142 found. Thus, the user database is used as synchronization mechanism to ensure
172 allocation logic, the maximum UID used for this range is hence
179 used except when upgrading systems which were created with different defaults.
249 is generally a questionable idea (regardless of whether `systemd-homed` is used
311 reached. This target unit is generally used as synchronization point between
/systemd-251/
DREADME41 ≥ 4.20 for PSI (used by systemd-oomd)
100 CONFIG_KCMP (for the kcmp() syscall, used to be under
162 Note that kernel auditing is broken when used with systemd's container
244 When systemd-hostnamed is used, it is strongly recommended to install
258 -Dsplit-usr=true can be used to give a semblance of support for systems
263 - busybox (used by test/TEST-13-NSPAWN-SMOKE)
264 - nc (used by test/TEST-12-ISSUE-3171)
266 - python3-evdev (used by hwdb parsing tests)
267 - strace (used by test/test-functions)
268 - capsh (optional, used by test-execute)
[all …]
DNEWS10 * C11 with GNU extensions (aka "gnu11") is now used to build our
17 systemd-stable 250.3. The feature can still be used by explicitly
65 supposed to be used, and we already had a rule that with the
72 It is apparently used by the linker now.
97 file) may be used to override the "token" for the entries, for
146 paths and other settings used.
171 is mapped almost fully, with the exception of the UID subrange used
173 Unmapped UIDs may not be used for file ownership in the home
181 This range may be used for container managers that place container OS
207 * The <version> tag used in the name of libsystemd-shared.so and
[all …]
/systemd-251/src/nss-systemd/
Dnss-systemd.sym32 …/* These two are not used by glibc, but can be used by apps to explicitly disable nss-systemd for …
/systemd-251/src/shared/
Dsleep-config.c362 &swap->device, &swap->type, &swap->size, &swap->used, &swap->priority); in find_hibernate_location()
402 … && swap->size - swap->used < hibernate_location->swap->size - hibernate_location->swap->used)) { in find_hibernate_location()
507 …r = act <= (hibernate_location->swap->size - hibernate_location->swap->used) * HIBERNATION_SWAP_TH… in enough_swap_for_hibernation()
509 …t enough", act, hibernate_location->swap->size, hibernate_location->swap->used, 100*HIBERNATION_SW… in enough_swap_for_hibernation()
/systemd-251/src/basic/
Dcompress.c192 size_t used; in decompress_blob_xz() local
206 used = space - s.avail_out; in decompress_blob_xz()
211 s.avail_out = space - used; in decompress_blob_xz()
212 s.next_out = *(uint8_t**)dst + used; in decompress_blob_xz()
822 size_t used = st.st_size - total_in; in decompress_stream_lz4() local
824 c = LZ4F_decompress(ctx, buf, &produced, src + total_in, &used, NULL); in decompress_stream_lz4()
830 total_in += used; in decompress_stream_lz4()
/systemd-251/catalog/
Dsystemd.catalog.in27 Subject: Disk space used by the journal
36 The limits controlling how much disk space is used by the journal may
338 indication that the communication channel used was tampered with.
407 - "overflowuid-not-65534" — the kernel user ID used for "unknown" users (with
409 - "overflowgid-not-65534" — the kernel group ID used for "unknown" users (with
461 name is used, with all "/" characters replaced by "-" (the leading one is
469 and cannot be used to manage the mount point. It will not appear in the service
474 if used anyway – manage them independently of systemd, i.e. establish them as
487 to any local user. It's used by the NFS client and Linux user namespacing,
514 particular the case if USB hardware or network-attached hardware is used.
/systemd-251/shell-completion/zsh/
D_systemd-nspawn19 …oot for the namespace container. If omitted the current directory will be used.]:directories:_dire…
35 …{--selinux-context=,-Z+}'[Sets the SELinux security context to be used to label processes in the c…
36 …{--selinux-apifs-context=,-L+}'[Sets the SELinux security context to be used to label files in the…

12345