/systemd-251/src/shared/ |
D | pwquality-util.h | 15 extern int (*sym_pwquality_get_str_value)(pwquality_settings_t *pwq, int setting, const char **valu… 17 extern int (*sym_pwquality_set_int_value)(pwquality_settings_t *pwq, int setting, int value);
|
D | libcrypt-util.c | 106 static char* systemd_crypt_ra(const char *phrase, const char *setting, void **data, int *size) { in systemd_crypt_ra() argument 124 char *t = crypt_r(phrase, setting, *data); in systemd_crypt_ra()
|
D | pwquality-util.c | 21 int (*sym_pwquality_get_str_value)(pwquality_settings_t *pwq, int setting, const char **value); 23 int (*sym_pwquality_set_int_value)(pwquality_settings_t *pwq, int setting, int value);
|
D | netif-sriov.c | 131 .setting = sr_iov->vf_spoof_check_setting, in sr_iov_set_netlink_message() 142 .setting = sr_iov->query_rss, in sr_iov_set_netlink_message() 153 .setting = sr_iov->trust, in sr_iov_set_netlink_message()
|
/systemd-251/ |
D | NEWS | 18 configuring RouteTable= setting in .netdev files. 71 (as exposed via the SystemCallFilter= setting in service unit files). 120 * kernel-install supports a new initrd_generator= setting in 150 working display. (Controllable via a loader.conf setting.) 243 * A new ExtensionDirectories= setting in service unit files allows 262 The OOMPolicy= unit file setting is now also honoured by 413 * .link files gained support for setting MDI/MID-X on a link. 415 * .link files gained support for [Match] Firmware= setting to match on 419 * .link files gained support for [Link] SR-IOVVirtualFunctions= setting 433 * systemd-networkd gained a new [Bridge] Isolated=true|false setting [all …]
|
D | .vimrc | 4 " You should consider setting 'set secure' as well, which is highly
|
D | TODO | 238 specific SIGRT signal for setting debug log level, that carries the level via 359 setting it should be fully randomized at invocation time, or a hash of the 579 * add an Open= setting to service unit files that can open arbitrary file 591 * add a ConnectSocket= setting to service unit files, that may reference a 676 * Add service setting to run a service within the specified VRF. i.e. do the 932 * add CopyFile= or so as unit file setting that may be used to copy files or 1021 * Add AddUser= setting to unit files, similar to DynamicUser=1 which however 1030 * Add ExecMonitor= setting. May be used multiple times. Forks off a process in 1046 then use that for the setting used in user@.service. It should be understood 1088 * transient units: don't bother with actually setting unit properties, we [all …]
|
D | README | 257 and does not need to be specified) is the recommended setting. 331 DynamicUser= setting in unit files.)
|
/systemd-251/src/systemctl/ |
D | meson.build | 42 'systemctl-log-setting.c', 43 'systemctl-log-setting.h',
|
/systemd-251/src/basic/linux/ |
D | if_link.h | 969 __u32 setting; member 991 __u32 setting; member 1011 __u32 setting; member
|
/systemd-251/.github/workflows/ |
D | coverity.yml | 29 …e-pro-team@latest/actions/reference/workflow-commands-for-github-actions#setting-an-environment-va…
|
/systemd-251/hwdb.d/ |
D | 70-pointingstick.hwdb | 5 # of the IBM TrackPoint driver's sensitivity setting 68 # TPPS/2 IBM TrackPoint driver sensitivity sysfs setting
|
D | 60-input-id.hwdb | 39 # * MUST be set when setting ID_INPUT_TABLET_PAD
|
/systemd-251/.github/ISSUE_TEMPLATE/ |
D | Bug_report.md | 40 when generated in debug mode (try setting the SYSTEMD_LOG_LEVEL=debug
|
/systemd-251/docs/ |
D | HOME_DIRECTORY.md | 172 Depending on the `luksDiscard` setting of the user record, either the backing 174 is `FITRIM`ed after mounting, to ensure the setting is correctly enforced. 177 or extended as configured in the `luksOfflineDiscard` setting of the user
|
D | HACKING.md | 141 distribution and can be disabled by setting `-Dmode=release`. 201 vscode's clangd extension, this is done via setting the `clangd.path` option to the path of the 205 the build image available on the host. mkosi supports this by setting the `IncludeDirectory` option… 352 `set variable wait = 0` or `return` to continue. Once the debugger has attached, setting breakpoints
|
D | CONTAINER_INTERFACE.md | 99 implementation. With this in place the `ConditionVirtualization=` setting in 155 usual. Tools rely on being able to determine the timezone setting from the 177 these and pass them on to the container's init process, also setting 242 `InaccessiblePath=` setting of unit files, i.e. file nodes to mask this way 278 used service setting that provides a service with its own, private, minimal
|
D | TRANSIENT-SETTINGS.md | 361 All automount unit setting is available to transient units:
|
D | ENVIRONMENT.md | 36 consider setting `$SYSTEMD_OFFLINE=1`. 265 setting environment variables is of course possible in any even unprivileged 291 setting this environment variable to a colon-separated list of absolute
|
D | RANDOM_SEEDS.md | 71 line to change that, but note that this is a global setting affect all 174 be enabled by setting the `$SYSTEMD_RANDOM_SEED_CREDIT` environment variable 233 off the 'system token' concept by setting `random-seed-mode always` in the
|
D | CREDENTIALS.md | 150 setting to build valid paths to specific credentials. 280 `LoadCredential=` setting. Example:
|
D | RESOLVED-VPNS.md | 143 2. `privacy0` should get a routing domain `~.` configured. The setting of 149 `fritz.box`. The default `true` setting for `default-route` is good too.
|
D | ARCHITECTURE.md | 66 setting, it is necessary to support all three input methods:
|
/systemd-251/sysctl.d/ |
D | 50-coredump.conf.in | 23 # higher setting the kernel will delay reaping until we are done, but only for
|
/systemd-251/shell-completion/zsh/ |
D | _resolvectl | 44 default-route:"Configure per-interface default-route setting"
|