summaryrefslogtreecommitdiff
path: root/src/core/namespace.h
Commit message (Expand)AuthorAgeFilesLines
* tree-wide: drop 'This file is part of systemd' blurbLennart Poettering2018-06-141-2/+0
* core: add new PrivateMounts= unit settingLennart Poettering2018-06-121-0/+1
* namespace: rename parse_protect_{home,system}_or_bool() to protect_{home,syst...Yu Watanabe2018-05-311-2/+2
* tree-wide: be more careful with the type of array sizesLennart Poettering2018-04-271-6/+6
* tree-wide: drop license boilerplateZbigniew Jędrzejewski-Szmek2018-04-061-13/+0
* core: add new option 'tmpfs' to ProtectHome=Yu Watanabe2018-02-211-0/+1
* core: add new setting TemporaryFileSystem=Yu Watanabe2018-02-211-0/+12
* namespace: introduce parse_protect_system()_or_boolYu Watanabe2018-01-021-0/+1
* namespace: introduce parse_protect_home_or_bool()Yu Watanabe2018-01-021-0/+1
* Add SPDX license identifiers to source files under the LGPLZbigniew Jędrzejewski-Szmek2017-11-191-0/+1
* namespace: change NameSpace → NamespaceLennart Poettering2017-10-101-3/+3
* namespace: fall back gracefully when kernel doesn't support network namespace...Michal Sekletar2017-10-101-0/+17
* execute: make StateDirectory= and friends compatible with DynamicUser=1 and R...Lennart Poettering2017-10-021-0/+1
* core: add RootImage= setting for using a specific image file as root director...Lennart Poettering2017-02-071-1/+4
* core: add a per-unit setting MountAPIVFS= for mounting /dev, /proc, /sys in c...Lennart Poettering2017-02-071-0/+1
* core: add ability to define arbitrary bind mounts for servicesLennart Poettering2016-12-141-14/+30
* core: on DynamicUser= make sure that protecting sensitive paths is enforced (...Djalal Harouni2016-11-081-0/+1
* core:sandbox: lets make /lib/modules/ inaccessible on ProtectKernelModules=Djalal Harouni2016-10-121-3/+11
* core: introduce ProtectSystem=strictLennart Poettering2016-09-251-0/+1
* core: add two new service settings ProtectKernelTunables= and ProtectControlG...Lennart Poettering2016-09-251-0/+2
* doc,core: Read{Write,Only}Paths= and InaccessiblePaths=Alessandro Puccetti2016-07-191-3/+3
* Remove kdbus custom endpoint supportDaniel Mack2016-02-111-1/+0
* tree-wide: remove Emacs lines from all filesDaniel Mack2016-02-101-2/+0
* core: Private*/Protect* options with RootDirectoryAlban Crequy2015-05-181-1/+2
* Type of mount(2) flags is unsigned longTopi Miettinen2015-01-011-1/+1
* namespace: add missing 'const' to parametersLennart Poettering2014-10-171-3/+3
* namespace: add support for custom kdbus endpointDaniel Mack2014-09-081-0/+1
* core: rename ReadOnlySystem= to ProtectSystem= and add a third value for also...Lennart Poettering2014-06-041-11/+22
* core: add new ReadOnlySystem= and ProtectedHome= settings for service unitsLennart Poettering2014-06-031-0/+15
* exec: introduce PrivateDevices= switch to provide services with a private /devLennart Poettering2014-01-201-0/+1
* service: add the ability for units to join other unit's PrivateNetwork= and P...Lennart Poettering2013-11-271-5/+6
* systemd: use unit name in PrivateTmp directoriesZbigniew Jędrzejewski-Szmek2013-10-221-1/+4
* core: Remove unnecessary typedefHenrik Grindal Bakken2013-04-171-2/+0
* core: reuse the same /tmp, /var/tmp and inaccessible dirMichal Sekletar2013-03-151-6/+10
* use #pragma once instead of foo*foo #define guardsShawn Landden2012-07-191-4/+1
* relicense to LGPLv2.1 (with exceptions)Lennart Poettering2012-04-121-4/+4
* move libsystemd_core.la sources into core/Kay Sievers2012-04-111-0/+34