Home
last modified time | relevance | path

Searched refs:chroot (Results 1 – 15 of 15) sorted by relevance

/Linux-v4.19/Documentation/userspace-api/
Dno_new_privs.rst15 - chroot is disallowed to unprivileged processes, since it would allow
17 inherited chroot.
62 ``no_new_privs`` is set, and ``no_new_privs`` + ``chroot`` is considerable less
63 dangerous than chroot by itself.
/Linux-v4.19/Documentation/admin-guide/
Dinitrd.rst157 # chroot /mnt /sbin/init
163 such a chroot'ed initrd environment.)
244 # exec chroot . what-follows <dev/console >dev/console 2>&1
248 ``/dev`` directory, udev must be initialized before invoking chroot in order
258 - a chroot program must be available under the old and the new root
259 - chroot to the new root afterwards
291 execs - via chroot - a program that continues the installation
/Linux-v4.19/arch/um/
DKconfig74 use in a chroot jail. So, if you intend to run UML inside a chroot,
/Linux-v4.19/Documentation/power/
Dswsusp-dmcrypt.txt115 exec chroot . /sbin/init $* < dev/console > dev/console 2>&1
/Linux-v4.19/arch/powerpc/include/asm/
Dsystbl.h68 SYSCALL_SPU(chroot)
/Linux-v4.19/arch/parisc/kernel/
Dsyscall_table.S132 ENTRY_SAME(chroot)
/Linux-v4.19/arch/s390/kernel/
Dcompat_wrapper.c79 COMPAT_SYSCALL_WRAP1(chroot, const char __user *, filename);
/Linux-v4.19/arch/x86/entry/syscalls/
Dsyscall_64.tbl172 161 common chroot __x64_sys_chroot
Dsyscall_32.tbl75 61 i386 chroot sys_chroot __ia32_sys_chroot
/Linux-v4.19/tools/perf/arch/x86/entry/syscalls/
Dsyscall_64.tbl172 161 common chroot __x64_sys_chroot
/Linux-v4.19/arch/arm/tools/
Dsyscall.tbl75 61 common chroot sys_chroot
/Linux-v4.19/tools/perf/arch/s390/entry/syscalls/
Dsyscall.tbl60 61 common chroot sys_chroot compat_sys_chroot
/Linux-v4.19/arch/s390/kernel/syscalls/
Dsyscall.tbl60 61 common chroot sys_chroot compat_sys_chroot
/Linux-v4.19/fs/
Dopen.c519 SYSCALL_DEFINE1(chroot, const char __user *, filename) in SYSCALL_DEFINE1() argument
/Linux-v4.19/Documentation/filesystems/
Dramfs-rootfs-initramfs.txt122 with the new root (cd /newmount; mount --move . /; chroot .), attach