index
:
platform/upstream/systemd
accepted/tizen/generic
accepted/tizen/ivi
accepted/tizen/mobile
accepted/tizen_3.0.2014.q3_common
accepted/tizen_3.0.2015.q2_common
accepted/tizen_3.0.m14.3_ivi
accepted/tizen_3.0.m2_mobile
accepted/tizen_3.0.m2_tv
accepted/tizen_3.0.m2_wearable
accepted/tizen_3.0_common
accepted/tizen_3.0_ivi
accepted/tizen_3.0_mobile
accepted/tizen_3.0_tv
accepted/tizen_3.0_wearable
accepted/tizen_4.0_unified
accepted/tizen_5.0_unified
accepted/tizen_5.5_unified
accepted/tizen_5.5_unified_mobile_hotfix
accepted/tizen_5.5_unified_wearable_hotfix
accepted/tizen_6.0_unified
accepted/tizen_6.0_unified_hotfix
accepted/tizen_6.5_unified
accepted/tizen_7.0_unified
accepted/tizen_7.0_unified_hotfix
accepted/tizen_8.0_unified
accepted/tizen_common
accepted/tizen_generic
accepted/tizen_ivi
accepted/tizen_ivi_panda
accepted/tizen_ivi_release
accepted/tizen_mobile
accepted/tizen_tv
accepted/tizen_unified
accepted/tizen_unified_dev
accepted/tizen_unified_riscv
accepted/tizen_unified_toolchain
accepted/tizen_unified_x
accepted/tizen_unified_x_asan
accepted/tizen_wearable
devel/ivi
kdbus-integration
ref/for/tizen
ref/for/tizen_3.0
sandbox/adrians/CVE-fix
sandbox/adrians/dirty-upgrade-to-232
sandbox/adrians/dirty-upgrade-to-233
sandbox/adrians/upgrade-to-234
sandbox/adrians/upgrade-to-235
sandbox/adrians/upgrade-to-236
sandbox/adrians/upgrade-to-237
sandbox/adrians/upgrade-to-238
sandbox/adrians/upgrade-to-239
sandbox/adrians/upgrade-to-240
sandbox/adrians/upgrade-to-241
sandbox/adrians/upgrade-to-242
sandbox/adrians/upgrade-to-243
sandbox/adrians/upgrade-to-244
sandbox/adrians/upgrade-to-245
sandbox/akazmin/hwasan_build
sandbox/akazmin/tizen6_asan
sandbox/denis13/LTO
sandbox/ibaravy/isan
sandbox/jihochu/5.0
sandbox/jlaako/multiseat
sandbox/jobol/v219
sandbox/kkrosman/cynara-bus-proxyd
sandbox/klewandowski/nosmack
sandbox/klewandowski/systemd-shutdown
sandbox/klewandowski/upgrade-v231
sandbox/leemgs/test
sandbox/lstelmach/kdbus-integration-216
sandbox/lstelmach/kdbus-integration-217
sandbox/lstelmach/kdbus-tizen-next
sandbox/lstelmach/system-privileged
sandbox/lstelmach/systemd-upgrade-231
sandbox/lstelmach/systemd-upgrade-233
sandbox/lstelmach/tizen-cleanup
sandbox/lstelmach/tizen-cleanup-wo-kdbus
sandbox/lstelmach/tizen-cleanup-wo-kdbus-on-v255
sandbox/lstelmach/tizen-next
sandbox/mbloch/stdout
sandbox/mkashkarov/tizen_6.0_build
sandbox/mmajewski2/stdout
sandbox/mwereski/tizen
sandbox/mzielinska3/cynara_integration
sandbox/sdx/dev212
sandbox/silas.jeon/RO_3.0_notyet
sandbox/songinha/history
sandbox/songinha/tizen
sandbox/upgrade-to-241
sandbox/vbarinov/asan
sandbox/vbarinov/newcompilerfix
sandbox/vbarinov/nogold
systemd_212
systemd_v216
tizen
tizen-next
tizen-v204-backup
tizen_208
tizen_3.0
tizen_3.0.2014.q3_common
tizen_3.0.2014.q4_common
tizen_3.0.2015.q1_common
tizen_3.0.2015.q2_common
tizen_3.0.m14.2_ivi
tizen_3.0.m14.3_ivi
tizen_3.0.m1_mobile
tizen_3.0.m1_tv
tizen_3.0.m2
tizen_3.0_ivi
tizen_3.0_tv
tizen_4.0
tizen_5.0
tizen_5.5
tizen_5.5_mobile_hotfix
tizen_5.5_tv
tizen_5.5_wearable_hotfix
tizen_6.0
tizen_6.0_hotfix
tizen_6.5
tizen_7.0
tizen_7.0_hotfix
tizen_8.0
tizen_dev
tizen_dev_kdbus
tizen_ivi_genivi
tizen_ivi_release
upgrade-to-244
upstream
upstream_old
Domain: System / System Framework;
Hyotaek Shim <hyotaek.shim@samsung.com>
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
man
/
systemd.exec.xml
Age
Commit message (
Expand
)
Author
Files
Lines
2019-02-20
Merge pull request #11682 from topimiettinen/private-utsname
Lennart Poettering
1
-0
/
+11
2019-02-20
core: ProtectHostname= feature
Topi Miettinen
1
-0
/
+11
2019-02-15
core: export $PIDFILE env var for services, derived from PIDFile=
Lennart Poettering
1
-0
/
+12
2019-02-13
man: move entries to the right section in systemd.directives
Zbigniew Jędrzejewski-Szmek
1
-8
/
+8
2019-02-01
man: add referecne to systemd-system.conf
Yu Watanabe
1
-0
/
+1
2019-02-01
man: fix volume num of journalctl
Yu Watanabe
1
-1
/
+1
2019-01-21
Document weaknesses with MDWE and suggest hardening
Topi Miettinen
1
-7
/
+13
2019-01-16
man: Fix a typo in systemd.exec.xml
Philip Withnall
1
-1
/
+1
2019-01-03
Docs: Add Missing Space Between Words
Alex Mayer
1
-1
/
+1
2018-12-14
man: add note about systemd-vconsole-setup.service and tty as input/output
Zbigniew Jędrzejewski-Szmek
1
-1
/
+7
2018-11-14
man: document that env vars are not suitable for passing secrets
Lennart Poettering
1
-1
/
+7
2018-10-30
man: emphasize the ReadOnlyPaths= mount propagation "hole"
Lennart Poettering
1
-15
/
+22
2018-10-30
man: document that various sandboxing settings are not available in --user se...
Lennart Poettering
1
-0
/
+5
2018-10-18
core: implement per unit journal rate limiting
Anita Zhang
1
-0
/
+16
2018-10-05
man/systemd.exec: MountFlags=shared behaviour was changed (fixed?)
Alan Jenkins
1
-4
/
+1
2018-09-13
man: document RUNTIME_DIRECTORY= or friends
Yu Watanabe
1
-4
/
+18
2018-08-21
man: document that most sandboxing options are best effort only
Lennart Poettering
1
-0
/
+9
2018-08-06
namespace: implicitly adds DeviceAllow= when RootImage= is set
Yu Watanabe
1
-1
/
+10
2018-07-20
Add support for opening files for appending
Zsolt Dollenstein
1
-5
/
+11
2018-07-17
man: elaborate a bit on the effect of PrivateNetwork=
Lennart Poettering
1
-3
/
+7
2018-07-05
man: Mention that paths in unit files must be fully normalized.
Alexander Kurtz
1
-0
/
+3
2018-07-03
man: drop mode line in file headers
Zbigniew Jędrzejewski-Szmek
1
-1
/
+1
2018-06-14
seccomp: add new system call filter, suitable as default whitelist for system...
Lennart Poettering
1
-0
/
+12
2018-06-14
man: drop unused <authorgroup> tags from man sources
Zbigniew Jędrzejewski-Szmek
1
-9
/
+0
2018-06-14
tree-wide: remove Lennart's copyright lines
Lennart Poettering
1
-2
/
+0
2018-06-14
tree-wide: drop 'This file is part of systemd' blurb
Lennart Poettering
1
-2
/
+0
2018-06-13
Merge pull request #9153 from poettering/private-mounts
Zbigniew Jędrzejewski-Szmek
1
-19
/
+60
2018-06-12
doc: more spelling fixes
Michael Biebl
1
-5
/
+5
2018-06-12
man: document the new PrivateMounts= setting
Lennart Poettering
1
-19
/
+60
2018-06-12
tree-wide: drop trailing whitespace
Lennart Poettering
1
-2
/
+2
2018-06-11
Table is easier to grasp
Bruno Vernay
1
-7
/
+42
2018-06-04
man: RuntimeDirectory= or friends accept dot contained paths
Yu Watanabe
1
-1
/
+1
2018-05-31
load-fragment: make IOScheduling{Class,Priority}= accept the empty string
Yu Watanabe
1
-2
/
+5
2018-05-24
Merge pull request #8817 from yuwata/cleanup-nsflags
Lennart Poettering
1
-3
/
+14
2018-05-14
man: fix reference in StandardOutput=
Lucas Werkmeister
1
-2
/
+2
2018-05-05
man: fix merging rule for CapabilityBoundingSet=
Yu Watanabe
1
-1
/
+1
2018-05-05
man: mention that RestrictNamespaces= can be specified multiple times
Yu Watanabe
1
-2
/
+13
2018-04-27
man: don't claim we'd set XDG_SEAT and XDG_VTNR as part of service management
Lennart Poettering
1
-20
/
+15
2018-04-27
man: document BSD exit codes in systemd.exec(5) too
Lennart Poettering
1
-0
/
+92
2018-04-19
tree-wide: drop spurious newlines (#8764)
Lennart Poettering
1
-3
/
+0
2018-04-06
tree-wide: drop license boilerplate
Zbigniew Jędrzejewski-Szmek
1
-13
/
+0
2018-02-27
man: suggests TemporaryFileSystem= when people want to nest bind mounts insid...
Yu Watanabe
1
-3
/
+7
2018-02-21
Merge pull request #7908 from yuwata/rfe-7895
Alan Jenkins
1
-9
/
+44
2018-02-21
core: add new option 'tmpfs' to ProtectHome=
Yu Watanabe
1
-8
/
+18
2018-02-21
man: add documents for TemporaryFileSystem=
Yu Watanabe
1
-0
/
+23
2018-02-21
core/namespace: make '-' prefix in Bind{,ReadOnly}Paths= work
Yu Watanabe
1
-1
/
+3
2018-02-20
core: change KeyringMode= to "shared" by default for non-service units in the...
Lennart Poettering
1
-2
/
+2
2018-02-02
seccomp: allow x86-64 syscalls on x32, used by the VDSO (fix #8060)
Alan Jenkins
1
-5
/
+7
2018-01-31
man: systemd.exec: cleanup "only X will be permitted" ... "but X=X+1"
Alan Jenkins
1
-9
/
+9
2017-12-19
man: note that `systemctl show` does not overridden value
Yu Watanabe
1
-3
/
+4
[next]