/systemd/src/basic/ |
H A D | capability-util.h | 24 #include <sys/capability.h>
|
H A D | capability-util.c | 24 #include <sys/capability.h> 29 #include "capability-util.h" 110 /* Make the capability inheritable. */ 143 /* Add the capability to the ambient set. */ 205 * capability for good. */ 212 * also from our own capability sets. */ 292 * binary has the capability configured in the file system,
|
H A D | missing.h | 27 #include <linux/capability.h>
|
/systemd/src/libsystemd/sd-bus/ |
H A D | bus-creds.c | 20 #include <linux/capability.h> 29 #include "capability-util.h" 110 free(c->capability); 671 static int has_cap(sd_bus_creds *c, unsigned offset, int capability) { argument 675 assert(capability >= 0); 676 assert(c->capability); 678 if ((unsigned) capability > cap_last_cap()) 683 return !!(c->capability[offset * sz + CAP_TO_INDEX(capability)] & CAP_TO_MASK(capability)); 686 sd_bus_creds_has_effective_cap(sd_bus_creds *c, int capability) argument 696 sd_bus_creds_has_permitted_cap(sd_bus_creds *c, int capability) argument 706 sd_bus_creds_has_inheritable_cap(sd_bus_creds *c, int capability) argument 716 sd_bus_creds_has_bounding_cap(sd_bus_creds *c, int capability) argument [all...] |
H A D | bus-creds.h | 66 uint32_t *capability; member in struct:sd_bus_creds
|
H A D | bus-convenience.c | 555 _public_ int sd_bus_query_sender_privilege(sd_bus_message *call, int capability) { argument 569 if (capability >= 0) { 585 r = sd_bus_creds_has_effective_cap(creds, capability); 596 /* Now, check the UID, but only if the capability check wasn't 599 if (our_uid != 0 || !know_caps || capability < 0) {
|
H A D | bus-dump.c | 26 #include "capability-util.h" 289 int (*has)(sd_bus_creds *c, int capability)) { 284 dump_capabilities( sd_bus_creds *c, FILE *f, const char *name, bool terse, int (*has)(sd_bus_creds *c, int capability)) argument
|
H A D | bus-control.c | 35 #include "capability-util.h" 565 c->capability = memdup(item->caps.caps, item->size - offsetof(struct kdbus_item, caps.caps)); 566 if (!c->capability)
|
H A D | bus-kernel.c | 42 #include "capability-util.h" 731 m->creds.capability = d->caps.caps;
|
/systemd/src/udev/cdrom_id/ |
H A D | cdrom_id.c | 224 int capability; local 226 capability = ioctl(fd, CDROM_GET_CAPABILITY, NULL); 227 if (capability < 0) { 232 if (capability & CDC_CD_R) 234 if (capability & CDC_CD_RW) 236 if (capability & CDC_DVD) 238 if (capability & CDC_DVD_R) 240 if (capability & CDC_DVD_RAM) 242 if (capability & CDC_MRW) 244 if (capability [all...] |
/systemd/src/nspawn/ |
H A D | nspawn-settings.h | 59 uint64_t capability; member in struct:Settings
|
H A D | nspawn.c | 53 #include "capability-util.h" 232 " --capability=CAP In addition to the default, retain specified\n" 233 " capability\n" 234 " --drop-capability=CAP Drop the specified capability from the default set\n" 365 { "capability", required_argument, NULL, ARG_CAPABILITY }, 366 { "drop-capability", required_argument, NULL, ARG_DROP_CAPABILITY }, 569 return log_error_errno(r, "Failed to parse capability %s.", t); 584 log_error("Failed to parse capability %s.", t); 1558 uint64_t capability; member in struct:__anon218 [all...] |
/systemd/src/shared/ |
H A D | bus-util.h | 70 int bus_test_polkit(sd_bus_message *call, int capability, const char *action, const char **details, uid_t good_user, bool *_challenge, sd_bus_error *e); 72 int bus_verify_polkit_async(sd_bus_message *call, int capability, const char *action, const char **details, bool interactive, uid_t good_user, Hashmap **registry, sd_bus_error *error);
|
H A D | bus-util.c | 249 int capability, 267 r = sd_bus_query_sender_privilege(call, capability); 407 int capability, 474 r = sd_bus_query_sender_privilege(call, capability); 247 bus_test_polkit( sd_bus_message *call, int capability, const char *action, const char **details, uid_t good_user, bool *_challenge, sd_bus_error *e) argument 405 bus_verify_polkit_async( sd_bus_message *call, int capability, const char *action, const char **details, bool interactive, uid_t good_user, Hashmap **registry, sd_bus_error *error) argument
|
/systemd/src/test/ |
H A D | test-capability.c | 22 #include <sys/capability.h> 28 #include "capability-util.h"
|
H A D | test-unit-file.c | 25 #include <sys/capability.h> 29 #include "capability-util.h"
|
/systemd/src/network/ |
H A D | networkctl.c | 770 char *capability; local 887 capability = t; 892 return capability; 900 uint32_t capability; local 985 sscanf(b, "%x", &capability); 987 cap = lldp_system_caps(capability);
|
/systemd/src/systemd/ |
H A D | sd-bus.h | 330 int sd_bus_query_sender_privilege(sd_bus_message *call, int capability); 363 int sd_bus_creds_has_effective_cap(sd_bus_creds *c, int capability); 364 int sd_bus_creds_has_permitted_cap(sd_bus_creds *c, int capability); 365 int sd_bus_creds_has_inheritable_cap(sd_bus_creds *c, int capability); 366 int sd_bus_creds_has_bounding_cap(sd_bus_creds *c, int capability);
|
/systemd/src/core/ |
H A D | execute.h | 31 #include <sys/capability.h>
|
H A D | dbus-unit.c | 416 int capability, 433 return bus_verify_polkit_async(call, capability, "org.freedesktop.systemd1.manage-units", details, false, UID_INVALID, &u->manager->polkit_registry, error); 413 bus_verify_manage_units_async_full( Unit *u, const char *verb, int capability, const char *polkit_message, sd_bus_message *call, sd_bus_error *error) argument
|