/systemd-251/src/basic/ |
D | efivars.h | 41 #define EFIVAR_PATH(variable) "/sys/firmware/efi/efivars/" variable argument 42 #define EFIVAR_CACHE_PATH(variable) "/run/systemd/efivars/" variable argument 46 int efi_get_variable(const char *variable, uint32_t *attribute, void **ret_value, size_t *ret_size); 47 int efi_get_variable_string(const char *variable, char **ret); 48 int efi_set_variable(const char *variable, const void *value, size_t size); 49 int efi_set_variable_string(const char *variable, const char *p); 61 static inline int efi_get_variable(const char *variable, uint32_t *attribute, void **value, size_t … in efi_get_variable() argument 65 static inline int efi_get_variable_string(const char *variable, char **ret) { in efi_get_variable_string() argument 69 static inline int efi_set_variable(const char *variable, const void *value, size_t size) { in efi_set_variable() argument 73 static inline int efi_set_variable_string(const char *variable, const char *p) { in efi_set_variable_string() argument
|
D | efivars.c | 35 const char *variable, in efi_get_variable() argument 47 assert(variable); in efi_get_variable() 49 const char *p = strjoina("/sys/firmware/efi/efivars/", variable); in efi_get_variable() 127 variable, FORMAT_TIMESPAN(end - begin, 1)); in efi_get_variable() 145 int efi_get_variable_string(const char *variable, char **ret) { in efi_get_variable_string() argument 151 r = efi_get_variable(variable, NULL, &s, &ss); in efi_get_variable_string() 163 static int efi_verify_variable(const char *variable, uint32_t attr, const void *value, size_t size)… in efi_verify_variable() argument 169 assert(variable); in efi_verify_variable() 172 r = efi_get_variable(variable, &a, &buf, &n); in efi_verify_variable() 179 int efi_set_variable(const char *variable, const void *value, size_t size) { in efi_set_variable() argument [all …]
|
D | static-destruct.h | 18 #define STATIC_DESTRUCTOR_REGISTER(variable, func) \ argument 19 _STATIC_DESTRUCTOR_REGISTER(UNIQ, variable, func) 21 #define _STATIC_DESTRUCTOR_REGISTER(uq, variable, func) \ argument 24 typeof(variable) *q = p; \ 41 .data = &(variable), \
|
D | replace-var.h | 4 char *replace_var(const char *text, char *(*lookup)(const char *variable, void *userdata), void *us…
|
D | replace-var.c | 39 char *replace_var(const char *text, char *(*lookup)(const char *variable, void *userdata), void *us… in replace_var() argument
|
/systemd-251/.lgtm/cpp-queries/ |
D | UninitializedVariableWithCleanup.ql | 6 * @name Potentially uninitialized local variable using the cleanup attribute 7 * @description Running the cleanup handler on a possibly uninitialized variable 20 * since they don't do anything illegal even when the variable is uninitialized 27 * A declaration of a local variable using __attribute__((__cleanup__(x))) 28 * that leaves the variable uninitialized. 33 /* The variable has __attribute__((__cleanup__(...))) set */ 45 * below), as it assumes that the callee always modifies the variable if 62 /* If there's an return statement somewhere between the variable declaration 110 select va, "The variable $@ may not be initialized here, but has a cleanup handler.", v, v.getName()
|
/systemd-251/src/shared/ |
D | efi-api.c | 228 char variable[STRLEN(EFI_GLOBAL_VARIABLE_STR("Boot")) + 4 + 1]; in efi_get_boot_option() local 240 xsprintf(variable, EFI_GLOBAL_VARIABLE_STR("Boot%04X"), id); in efi_get_boot_option() 241 r = efi_get_variable(variable, NULL, (void **)&buf, &l); in efi_get_boot_option() 363 char variable[STRLEN(EFI_GLOBAL_VARIABLE_STR("Boot")) + 4 + 1]; in efi_add_boot_option() local 415 xsprintf(variable, EFI_GLOBAL_VARIABLE_STR("Boot%04X"), id); in efi_add_boot_option() 416 return efi_set_variable(variable, buf, size); in efi_add_boot_option() 420 char variable[STRLEN(EFI_GLOBAL_VARIABLE_STR("Boot")) + 4 + 1]; in efi_remove_boot_option() local 425 xsprintf(variable, EFI_GLOBAL_VARIABLE_STR("Boot%04X"), id); in efi_remove_boot_option() 426 return efi_set_variable(variable, NULL, 0); in efi_remove_boot_option()
|
D | efi-loader.c | 13 static int read_usec(const char *variable, usec_t *ret) { in read_usec() argument 18 assert(variable); in read_usec() 21 r = efi_get_variable_string(variable, &j); in read_usec()
|
/systemd-251/docs/ |
D | BOOT_LOADER_INTERFACE.md | 27 * The EFI variable `LoaderDevicePartUUID` contains the partition GUID of the 31 * The EFI variable `LoaderConfigTimeout` contains the boot menu timeout 36 * Similarly, the EFI variable `LoaderConfigTimeoutOneShot` contains a boot menu 44 * The EFI variable `LoaderEntries` may contain a series of boot loader entry 52 * The EFI variable `LoaderEntryDefault` contains the default boot loader entry 55 * Similarly, the EFI variable `LoaderEntryOneShot` contains the default boot 62 * The EFI variable `LoaderEntrySelected` contains the boot loader entry 66 * The EFI variable `LoaderFeatures` contains a 64bit unsigned integer with a 79 * The EFI variable `LoaderRandomSeed` contains a binary random seed if set. It 85 * The EFI variable `LoaderSystemToken` contains binary random data, [all …]
|
D | ENVIRONMENT.md | 25 `chroot()`. Setting this variable to `0` instead has a similar effect as 67 `SystemdOptions` EFI variable. Analogous to `$SYSTEMD_PROC_CMDLINE`. 94 * `$RUNTIME_DIRECTORY` — various tools use this variable to locate the 95 appropriate path under `/run/`. This variable is also set by the manager when 100 method" is used, but this can be overridden with this environment variable. 133 variable may be set to any other value. 209 naming across updates. This environment variable takes precedence over the 232 first existing unit listed in the environment variable, and 252 done when this environment variable is used. 288 * `$SYSTEMD_SYSEXT_HIERARCHIES` — this variable may be used to override which [all …]
|
D | CONTAINER_INTERFACE.md | 97 a container, please set the `$container` environment variable for PID 1 in 106 variable for the container's PID 1 to the container UUID. (This is similar 117 manager can set the `$container_ttys` environment variable for the 118 container's PID 1 to tell it on which ptys to spawn gettys. The variable 121 variable's name you may only specify ptys, and not other types of ttys. Also 125 Note that this variable should not include the pty that `/dev/console` maps 133 environment variable for the ID fields described by the [os-release 146 `$CREDENTIALS_DIRECTORY` environment variable. If the container managers 195 set the `$NOTIFY_SOCKET` environment variable to a suitable socket path to 254 variable, following the usual protocol for this, however it's suitable, and [all …]
|
D | CREDENTIALS.md | 30 path to access them is derived from the environment variable 107 environment variable `$CREDENTIALS_DIRECTORY` set. It contains an absolute path 110 `$CREDENTIALS_DIRECTORY` environment variable passed to the service processes 138 the path to it as environment variable `$FOOBARPATH` the credential is also 139 accessible as the path in that environment variable. When invoked, the service 149 supplied as environment variable, use the `%d` specifier in the `Environment=` 249 variable for systemd running as PID 1 in the container, the same way as 373 provided in the `$CREDENTIALS_DIRECTORY` environment variable.
|
D | RANDOM_SEEDS.md | 174 be enabled by setting the `$SYSTEMD_RANDOM_SEED_CREDIT` environment variable 193 in the ESP. In addition, an identically sized randomized EFI variable called 201 the random seed provided in the EFI variable and credit it fully to the 226 environments the EFI variable space and the disk space is generally not 230 and if the EFI variable storage is not kept physically separate from the OS 281 installing any 'system token' in an EFI variable, as described above, this 285 'system token' in the EFI variable space, so that any future boots will have 394 of as EFI variable?* 408 The system token is stored as persistent EFI variable, i.e. in some form of
|
D | JOURNAL_NATIVE_PROTOCOL.md | 58 assignments. Unlike environment variable assignments the value may contain NUL 168 environment variable. The systemd service logic sets this variable to a 176 Why bother with this environment variable check? A service program invoked by
|
D | UIDS-GIDS.md | 158 $ pkg-config --variable=systemuidmax systemd 160 $ pkg-config --variable=dynamicuidmin systemd 162 $ pkg-config --variable=dynamicuidmax systemd 164 $ pkg-config --variable=containeruidbasemin systemd 166 $ pkg-config --variable=containeruidbasemax systemd
|
/systemd-251/ |
D | .lgtm.yml | 8 - include: cpp/declaration-hides-variable 11 - include: cpp/nested-loops-with-same-variable 19 - include: cpp/unused-local-variable
|
/systemd-251/.github/ |
D | codeql-custom.qls | 18 - cpp/declaration-hides-variable 21 - cpp/nested-loops-with-same-variable 29 - cpp/unused-local-variable
|
/systemd-251/src/test/ |
D | test-replace-var.c | 10 static char *lookup(const char *variable, void *userdata) { in lookup() argument 11 return strjoin("<<<", variable, ">>>"); in lookup()
|
/systemd-251/.github/workflows/ |
D | coverity.yml | 29 …-team@latest/actions/reference/workflow-commands-for-github-actions#setting-an-environment-variable 30 - name: Set the $COVERITY_SCAN_NOTIFICATION_EMAIL env variable
|
/systemd-251/src/boot/ |
D | bootctl.c | 1486 static void read_efi_var(const char *variable, char **ret) { in read_efi_var() argument 1489 r = efi_get_variable_string(variable, ret); in read_efi_var() 1491 log_warning_errno(r, "Failed to read EFI variable %s: %m", variable); in read_efi_var() 2175 const char *variable; in verb_set_efivar() local 2179 variable = EFI_LOADER_VARIABLE(LoaderEntryDefault); in verb_set_efivar() 2182 variable = EFI_LOADER_VARIABLE(LoaderEntryOneShot); in verb_set_efivar() 2185 variable = EFI_LOADER_VARIABLE(LoaderConfigTimeout); in verb_set_efivar() 2188 variable = EFI_LOADER_VARIABLE(LoaderConfigTimeoutOneShot); in verb_set_efivar() 2194 r = efi_set_variable(variable, NULL, 0); in verb_set_efivar() 2196 … return log_error_errno(r, "Failed to remove EFI variable '%s': %m", variable); in verb_set_efivar() [all …]
|
/systemd-251/src/libsystemd/sd-login/ |
D | sd-login.c | 359 static int uid_get_array(uid_t uid, const char *variable, char ***array) { in uid_get_array() argument 364 assert(variable); in uid_get_array() 370 r = parse_env_file(NULL, p, variable, &s); in uid_get_array() 715 static int seat_get_can(const char *seat, const char *variable) { in seat_get_can() argument 719 assert(variable); in seat_get_can() 726 variable, &s); in seat_get_can()
|
/systemd-251/test/test-execute/ |
D | exec-passenvironment-empty.service | 3 Description=Test for PassEnvironment and erasing the variable list
|
D | exec-passenvironment-repeated.service | 3 Description=Test for PassEnvironment with a variable name repeated
|
/systemd-251/coccinelle/ |
D | take-fd.cocci | 12 * which is a global variable. However, 'idexpression' nor 'identifier'
|
/systemd-251/.github/ISSUE_TEMPLATE/ |
D | Bug_report.md | 41 environment variable). For very long copy/pasted data consider using a
|