Searched refs:chroot (Results 1 – 12 of 12) sorted by relevance
/linux-4.4.14/Documentation/prctl/ |
D | no_new_privs.txt | 11 - chroot is disallowed to unprivileged processes, since it would allow 13 inherited chroot. 56 no_new_privs is set, and no_new_privs + chroot is considerable less 57 dangerous than chroot by itself.
|
/linux-4.4.14/arch/um/ |
D | Kconfig.um | 7 use in a chroot jail. So, if you intend to run UML inside a chroot,
|
/linux-4.4.14/Documentation/ |
D | initrd.txt | 148 # chroot /mnt /sbin/init 153 such a chroot'ed initrd environment.) 228 # exec chroot . what-follows <dev/console >dev/console 2>&1 232 /dev directory, udev must be initialized before invoking chroot in order 242 - a chroot program must be available under the old and the new root 243 - chroot to the new root afterwards 275 execs - via chroot - a program that continues the installation
|
/linux-4.4.14/arch/parisc/kernel/ |
D | syscall_table.S | 132 ENTRY_SAME(chroot)
|
/linux-4.4.14/arch/powerpc/include/asm/ |
D | systbl.h | 67 SYSCALL_SPU(chroot)
|
/linux-4.4.14/Documentation/power/ |
D | swsusp-dmcrypt.txt | 115 exec chroot . /sbin/init $* < dev/console > dev/console 2>&1
|
/linux-4.4.14/arch/s390/kernel/ |
D | compat_wrapper.c | 78 COMPAT_SYSCALL_WRAP1(chroot, const char __user *, filename);
|
/linux-4.4.14/arch/x86/entry/syscalls/ |
D | syscall_64.tbl | 170 161 common chroot sys_chroot
|
D | syscall_32.tbl | 70 61 i386 chroot sys_chroot
|
/linux-4.4.14/fs/ |
D | open.c | 469 SYSCALL_DEFINE1(chroot, const char __user *, filename) in SYSCALL_DEFINE1() argument
|
/linux-4.4.14/Documentation/filesystems/ |
D | ramfs-rootfs-initramfs.txt | 122 with the new root (cd /newmount; mount --move . /; chroot .), attach
|
/linux-4.4.14/tools/lguest/ |
D | lguest.c | 3371 if (chroot(chroot_path) != 0) in main()
|