Searched refs:chroot (Results 1 – 25 of 35) sorted by relevance
12
15 - chroot is disallowed to unprivileged processes, since it would allow17 inherited chroot.62 ``no_new_privs`` is set, and ``no_new_privs`` + ``chroot`` is considerable less63 dangerous than chroot by itself.
7 chroot
157 # chroot /mnt /sbin/init163 such a chroot'ed initrd environment.)244 # exec chroot . what-follows <dev/console >dev/console 2>&1248 ``/dev`` directory, udev must be initialized before invoking chroot in order258 - a chroot program must be available under the old and the new root259 - chroot to the new root afterwards291 execs - via chroot - a program that continues the installation
24 Users of other distros may use debootstrap in order to set up a Debian chroot::34 sudo chroot ./s390-toolchain
93 use in a chroot jail. So, if you intend to run UML inside a chroot,
117 exec chroot . /sbin/init $* < dev/console > dev/console 2>&1
240 chroot /tmp/root/ busybox sh /bin/setup.sh
166 156 n64 chroot sys_chroot
166 156 n32 chroot sys_chroot
73 61 o32 chroot sys_chroot
56 44 common chroot sys_chroot
191 174 common chroot sys_chroot
172 161 common chroot sys_chroot
75 61 i386 chroot sys_chroot
75 61 common chroot sys_chroot
74 61 common chroot sys_chroot
71 61 common chroot sys_chroot
85 61 common chroot sys_chroot
70 61 common chroot sys_chroot
84 61 common chroot sys_chroot