Home
last modified time | relevance | path

Searched refs:chroot (Results 1 – 25 of 41) sorted by relevance

12

/linux-6.12.1/Documentation/translations/zh_CN/userspace-api/
Dno_new_privs.rst20 - 对于非特权程序,chroot是不允许的,因为这会允许 ``/etc/passwd`` 在继承
21 chroot的程序眼中被替换。
56 项将是安全的,并且 ``no_new_privs`` 加上 ``chroot`` 是可以被认为比 chroot本身危
/linux-6.12.1/Documentation/userspace-api/
Dno_new_privs.rst15 - chroot is disallowed to unprivileged processes, since it would allow
17 inherited chroot.
62 ``no_new_privs`` is set, and ``no_new_privs`` + ``chroot`` is considerable less
63 dangerous than chroot by itself.
/linux-6.12.1/tools/perf/trace/strace/groups/
Dstring7 chroot
/linux-6.12.1/Documentation/admin-guide/
Dinitrd.rst157 # chroot /mnt /sbin/init
163 such a chroot'ed initrd environment.)
244 # exec chroot . what-follows <dev/console >dev/console 2>&1
248 ``/dev`` directory, udev must be initialized before invoking chroot in order
258 - a chroot program must be available under the old and the new root
259 - chroot to the new root afterwards
291 execs - via chroot - a program that continues the installation
/linux-6.12.1/Documentation/bpf/
Ds390.rst24 Users of other distros may use debootstrap in order to set up a Debian chroot::
34 sudo chroot ./s390-toolchain
/linux-6.12.1/tools/testing/selftests/filesystems/statmount/
Dstatmount_test.c120 ret = chroot("."); in cleanup_namespace()
175 ret = chroot(root_mntpoint); in setup_namespace()
/linux-6.12.1/arch/um/
DKconfig101 use in a chroot jail. So, if you intend to run UML inside a chroot,
/linux-6.12.1/tools/testing/selftests/nolibc/
Dnolibc-test.c1039 CASE_TEST(chroot_root); EXPECT_SYSZR(euid0, chroot("/")); break; in run_syscall()
1040 CASE_TEST(chroot_blah); EXPECT_SYSER(1, chroot("/proc/self/blah"), -1, ENOENT); break; in run_syscall()
1041 CASE_TEST(chroot_exe); EXPECT_SYSER(1, chroot(argv0), -1, ENOTDIR); break; in run_syscall()
/linux-6.12.1/Documentation/power/
Dswsusp-dmcrypt.rst117 exec chroot . /sbin/init $* < dev/console > dev/console 2>&1
/linux-6.12.1/Documentation/networking/device_drivers/ethernet/ti/
Dcpsw_switchdev.rst240 chroot /tmp/root/ busybox sh /bin/setup.sh
/linux-6.12.1/tools/perf/arch/mips/entry/syscalls/
Dsyscall_n64.tbl166 156 n64 chroot sys_chroot
/linux-6.12.1/arch/mips/kernel/syscalls/
Dsyscall_n64.tbl166 156 n64 chroot sys_chroot
Dsyscall_n32.tbl166 156 n32 chroot sys_chroot
/linux-6.12.1/arch/x86/entry/syscalls/
Dsyscall_64.tbl173 161 common chroot sys_chroot
/linux-6.12.1/arch/arm64/tools/
Dsyscall_64.tbl69 51 common chroot sys_chroot
/linux-6.12.1/tools/perf/arch/x86/entry/syscalls/
Dsyscall_64.tbl173 161 common chroot sys_chroot
Dsyscall_32.tbl76 61 i386 chroot sys_chroot
/linux-6.12.1/scripts/
Dsyscall.tbl69 51 common chroot sys_chroot
/linux-6.12.1/arch/xtensa/kernel/syscalls/
Dsyscall.tbl191 174 common chroot sys_chroot
/linux-6.12.1/arch/parisc/kernel/syscalls/
Dsyscall.tbl74 61 common chroot sys_chroot
/linux-6.12.1/arch/microblaze/kernel/syscalls/
Dsyscall.tbl71 61 common chroot sys_chroot
/linux-6.12.1/arch/m68k/kernel/syscalls/
Dsyscall.tbl71 61 common chroot sys_chroot
/linux-6.12.1/arch/sh/kernel/syscalls/
Dsyscall.tbl71 61 common chroot sys_chroot
/linux-6.12.1/tools/include/nolibc/
Dsys.h193 int chroot(const char *path) in chroot() function
/linux-6.12.1/arch/sparc/kernel/syscalls/
Dsyscall.tbl85 61 common chroot sys_chroot

12