Home
last modified time | relevance | path

Searched refs:chroot (Results 1 – 20 of 20) sorted by relevance

/linux/Documentation/translations/zh_CN/userspace-api/
H A Dno_new_privs.rst20 - 对于非特权程序,chroot是不允许的,因为这会允许 ``/etc/passwd`` 在继承
21 chroot的程序眼中被替换。
56 项将是安全的,并且 ``no_new_privs`` 加上 ``chroot`` 是可以被认为比 chroot本身危
/linux/Documentation/userspace-api/
H A Dno_new_privs.rst15 - chroot is disallowed to unprivileged processes, since it would allow
17 inherited chroot.
62 ``no_new_privs`` is set, and ``no_new_privs`` + ``chroot`` is considerable less
63 dangerous than chroot by itself.
H A Dlandlock.rst481 However, :manpage:`chroot(2)` calls are not denied.
/linux/tools/perf/trace/strace/groups/
H A Dstring7 chroot
/linux/Documentation/admin-guide/
H A Dinitrd.rst157 # chroot /mnt /sbin/init
163 such a chroot'ed initrd environment.)
244 # exec chroot . what-follows <dev/console >dev/console 2>&1
248 ``/dev`` directory, udev must be initialized before invoking chroot in order
258 - a chroot program must be available under the old and the new root
259 - chroot to the new root afterwards
291 execs - via chroot - a program that continues the installation
/linux/Documentation/bpf/
H A Ds390.rst24 Users of other distros may use debootstrap in order to set up a Debian chroot::
34 sudo chroot ./s390-toolchain
/linux/tools/testing/selftests/filesystems/statmount/
H A Dstatmount_test.c120 ret = chroot("."); in cleanup_namespace()
175 ret = chroot(root_mntpoint); in setup_namespace()
/linux/arch/um/
H A DKconfig104 use in a chroot jail. So, if you intend to run UML inside a chroot,
/linux/Documentation/power/
H A Dswsusp-dmcrypt.rst117 exec chroot . /sbin/init $* < dev/console > dev/console 2>&1
/linux/Documentation/networking/device_drivers/ethernet/ti/
H A Dcpsw_switchdev.rst240 chroot /tmp/root/ busybox sh /bin/setup.sh
/linux/tools/perf/arch/mips/entry/syscalls/
H A Dsyscall_n64.tbl166 156 n64 chroot sys_chroot
/linux/scripts/
H A Dsyscall.tbl69 51 common chroot sys_chroot
/linux/arch/x86/entry/syscalls/
H A Dsyscall_64.tbl173 161 common chroot sys_chroot
/linux/tools/perf/arch/x86/entry/syscalls/
H A Dsyscall_64.tbl173 161 common chroot sys_chroot
H A Dsyscall_32.tbl76 61 i386 chroot sys_chroot
/linux/tools/perf/arch/powerpc/entry/syscalls/
H A Dsyscall.tbl84 61 common chroot sys_chroot
/linux/tools/perf/arch/s390/entry/syscalls/
H A Dsyscall.tbl60 61 common chroot sys_chroot sys_chroot
/linux/Documentation/virt/uml/
H A Duser_mode_linux_howto_v2.rst131 Set the root password - the easiest way to do that is to chroot into the
134 # chroot /mnt
741 shut down the UML instance, mount the image, chroot into it and set it - as
/linux/fs/
H A Dopen.c594 SYSCALL_DEFINE1(chroot, const char __user *, filename) in SYSCALL_DEFINE1() argument
/linux/Documentation/translations/it_IT/process/
H A Dadding-syscalls.rst45 essere sempre vero (per esempio, in ambienti come namespace/sandbox/chroot).