Searched refs:chroot (Results 1 – 20 of 20) sorted by relevance
/linux/Documentation/translations/zh_CN/userspace-api/ |
H A D | no_new_privs.rst | 20 - 对于非特权程序,chroot是不允许的,因为这会允许 ``/etc/passwd`` 在继承 21 chroot的程序眼中被替换。 56 项将是安全的,并且 ``no_new_privs`` 加上 ``chroot`` 是可以被认为比 chroot本身危
|
/linux/Documentation/userspace-api/ |
H A D | no_new_privs.rst | 15 - chroot is disallowed to unprivileged processes, since it would allow 17 inherited chroot. 62 ``no_new_privs`` is set, and ``no_new_privs`` + ``chroot`` is considerable less 63 dangerous than chroot by itself.
|
H A D | landlock.rst | 481 However, :manpage:`chroot(2)` calls are not denied.
|
/linux/tools/perf/trace/strace/groups/ |
H A D | string | 7 chroot
|
/linux/Documentation/admin-guide/ |
H A D | initrd.rst | 157 # chroot /mnt /sbin/init 163 such a chroot'ed initrd environment.) 244 # exec chroot . what-follows <dev/console >dev/console 2>&1 248 ``/dev`` directory, udev must be initialized before invoking chroot in order 258 - a chroot program must be available under the old and the new root 259 - chroot to the new root afterwards 291 execs - via chroot - a program that continues the installation
|
/linux/Documentation/bpf/ |
H A D | s390.rst | 24 Users of other distros may use debootstrap in order to set up a Debian chroot:: 34 sudo chroot ./s390-toolchain
|
/linux/tools/testing/selftests/filesystems/statmount/ |
H A D | statmount_test.c | 120 ret = chroot("."); in cleanup_namespace() 175 ret = chroot(root_mntpoint); in setup_namespace()
|
/linux/arch/um/ |
H A D | Kconfig | 104 use in a chroot jail. So, if you intend to run UML inside a chroot,
|
/linux/Documentation/power/ |
H A D | swsusp-dmcrypt.rst | 117 exec chroot . /sbin/init $* < dev/console > dev/console 2>&1
|
/linux/Documentation/networking/device_drivers/ethernet/ti/ |
H A D | cpsw_switchdev.rst | 240 chroot /tmp/root/ busybox sh /bin/setup.sh
|
/linux/tools/perf/arch/mips/entry/syscalls/ |
H A D | syscall_n64.tbl | 166 156 n64 chroot sys_chroot
|
/linux/scripts/ |
H A D | syscall.tbl | 69 51 common chroot sys_chroot
|
/linux/arch/x86/entry/syscalls/ |
H A D | syscall_64.tbl | 173 161 common chroot sys_chroot
|
/linux/tools/perf/arch/x86/entry/syscalls/ |
H A D | syscall_64.tbl | 173 161 common chroot sys_chroot
|
H A D | syscall_32.tbl | 76 61 i386 chroot sys_chroot
|
/linux/tools/perf/arch/powerpc/entry/syscalls/ |
H A D | syscall.tbl | 84 61 common chroot sys_chroot
|
/linux/tools/perf/arch/s390/entry/syscalls/ |
H A D | syscall.tbl | 60 61 common chroot sys_chroot sys_chroot
|
/linux/Documentation/virt/uml/ |
H A D | user_mode_linux_howto_v2.rst | 131 Set the root password - the easiest way to do that is to chroot into the 134 # chroot /mnt 741 shut down the UML instance, mount the image, chroot into it and set it - as
|
/linux/fs/ |
H A D | open.c | 594 SYSCALL_DEFINE1(chroot, const char __user *, filename) in SYSCALL_DEFINE1() argument
|
/linux/Documentation/translations/it_IT/process/ |
H A D | adding-syscalls.rst | 45 essere sempre vero (per esempio, in ambienti come namespace/sandbox/chroot).
|