Searched refs:chroot (Results 1 – 25 of 40) sorted by relevance
12
19 sources = [ "//third_party/ltp/testcases/kernel/syscalls/chroot/chroot01.c" ]24 sources = [ "//third_party/ltp/testcases/kernel/syscalls/chroot/chroot02.c" ]29 sources = [ "//third_party/ltp/testcases/kernel/syscalls/chroot/chroot03.c" ]34 sources = [ "//third_party/ltp/testcases/kernel/syscalls/chroot/chroot04.c" ]
15 - chroot is disallowed to unprivileged processes, since it would allow17 inherited chroot.62 ``no_new_privs`` is set, and ``no_new_privs`` + ``chroot`` is considerable less63 dangerous than chroot by itself.
73 "chroot:chroot01",74 "chroot:chroot02",75 "chroot:chroot03",76 "chroot:chroot04",
42 chroot(buf); in TestChroot()
7 chroot
70 ret = chroot("/system/etc"); in TestFunc()
52 ret = chroot(USERDATA_DIR_NAME); in ChildFunc()
157 # chroot /mnt /sbin/init163 such a chroot'ed initrd environment.)244 # exec chroot . what-follows <dev/console >dev/console 2>&1248 ``/dev`` directory, udev must be initialized before invoking chroot in order258 - a chroot program must be available under the old and the new root259 - chroot to the new root afterwards291 execs - via chroot - a program that continues the installation
75 use in a chroot jail. So, if you intend to run UML inside a chroot,
24 Users of other distros may use debootstrap in order to set up a Debian chroot::34 sudo chroot ./s390-toolchain
139 bool "Enable chroot"
117 exec chroot . /sbin/init $* < dev/console > dev/console 2>&1
240 chroot /tmp/root/ busybox sh /bin/setup.sh
166 156 n64 chroot sys_chroot
166 156 n32 chroot sys_chroot
73 61 o32 chroot sys_chroot
762 int chroot(const char *path) in chroot() function
56 44 common chroot sys_chroot
172 161 common chroot sys_chroot
191 174 common chroot sys_chroot
74 61 common chroot sys_chroot
71 61 common chroot sys_chroot
60 61 common chroot sys_chroot compat_sys_chroot