/openbmc/linux/Documentation/translations/zh_CN/userspace-api/ |
H A D | no_new_privs.rst | 20 - 对于非特权程序,chroot是不允许的,因为这会允许 ``/etc/passwd`` 在继承 21 chroot的程序眼中被替换。 56 项将是安全的,并且 ``no_new_privs`` 加上 ``chroot`` 是可以被认为比 chroot本身危
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-daemons/tftp-hpa/files/ |
H A D | tftp-0.49-chk_retcodes.patch | 14 - chdir("/"); /* Cygwin chroot() bug workaround */ 15 + if (chdir("/") < 0) { /* Cygwin chroot() bug workaround */ 16 + syslog(LOG_ERR, "chroot: %m");
|
H A D | 0001-__progname-is-provided-by-libc.patch | 55 done before the chroot, while /etc is still accessible. */
|
/openbmc/openbmc/meta-security/recipes-security/redhat-security/ |
H A D | redhat-security_1.0.bb | 7 SRC_URI = "file://find-chroot-py.sh \ 8 file://find-chroot.sh \ 26 install -m 0755 ${S}/find-chroot-py.sh ${D}${bindir} 27 install -m 0755 ${S}/find-chroot.sh ${D}${bindir}
|
/openbmc/openbmc/poky/meta/recipes-devtools/dpkg/dpkg/ |
H A D | 0001-script.c-avoid-use-of-chroot.patch | 4 Subject: [PATCH] script.c: avoid use of chroot 7 don't expect a chroot. This matches up our system expectations with what 51 - rc = chroot(instdir); 57 - ohshite(_("failed to chroot to '%.250s'"), instdir); 60 - * a saner environment, also needed after the chroot(). */
|
/openbmc/openbmc/poky/meta/recipes-devtools/dnf/dnf/ |
H A D | 0001-lock.py-fix-Exception-handling.patch | 12 rootfs, seems like some threads don't do chroot like work, some threads 13 do chroot like work. so for the threads don't do chroot, "Permission denied" 14 Exception happend, for the threads that do chroot, log_lock.pid will be
|
/openbmc/linux/Documentation/userspace-api/ |
H A D | no_new_privs.rst | 15 - chroot is disallowed to unprivileged processes, since it would allow 17 inherited chroot. 62 ``no_new_privs`` is set, and ``no_new_privs`` + ``chroot`` is considerable less 63 dangerous than chroot by itself.
|
/openbmc/openbmc/poky/meta/recipes-devtools/bootchart2/bootchart2/ |
H A D | 0001-Makefile-Let-bootchartd.conf-use-EARLY_.patch | 19 @@ -100,7 +100,7 @@ install-chroot: 21 install-collector: all install-chroot
|
/openbmc/openbmc/poky/meta/recipes-extended/shadow/files/ |
H A D | commonio.c-fix-unexpected-open-failure-in-chroot-env.patch | 4 Subject: [PATCH] commonio.c-fix-unexpected-open-failure-in-chroot-env 8 commonio.c: fix unexpected open failure in chroot environment
|
/openbmc/openbmc/poky/meta/recipes-devtools/rsync/files/ |
H A D | rsyncd.conf | 8 use chroot = yes
|
/openbmc/openbmc/meta-openembedded/meta-python/recipes-extended/python-blivet/python3-blivet/ |
H A D | 0002-run_program-support-timeout.patch | 58 - preexec_fn=chroot, cwd=root, env=env) 87 + preexec_fn=chroot, cwd=root, env=env)
|
H A D | 0003-support-infinit-timeout.patch | 44 os.chroot(root)
|
/openbmc/openbmc/meta-hpe/meta-common/recipes-phosphor/initrdscripts/files/ |
H A D | gxp-obmc-init.sh | 408 chroot $rodir "$fsck" $fsckopts "$rwdev" 443 while ! chroot /root /bin/sh -c "test -x '$init' -a -s '$init'" 461 exec chroot /root $init
|
/openbmc/linux/tools/perf/trace/strace/groups/ |
H A D | string | 7 chroot
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-connectivity/vlan/vlan-1.9/ |
H A D | no-HOME-includes.patch | 5 in front of sanitized kernel headers in OE chroot. Drop this include
|
/openbmc/openbmc/meta-security/docs/ |
H A D | overview.txt | 12 like rcp and rlogin, and helps create "chroot jails" that help limit the 66 …- find-chroot.sh : This script scans the whole file system looking for ELF files that calls chroot… 67 …Programs that fail to do this do not have the cwd inside the chroot. This means the app can escape… 69 …- find-chroot-py.sh : This test is like the one above except it examines python scripts for the sa…
|
/openbmc/openbmc/poky/meta/recipes-devtools/dpkg/ |
H A D | dpkg_1.22.11.bb | 10 file://0001-script.c-avoid-use-of-chroot.patch \
|
/openbmc/openbmc/poky/meta/recipes-core/initrdscripts/initramfs-framework/ |
H A D | overlayroot | 118 exec chroot ${NEWROOT}/ ${bootparam_init:-/sbin/init} || exit_gracefully "Couldn't chroot into over…
|
/openbmc/openbmc/poky/scripts/pybootchartgui/ |
H A D | NEWS | 166 + requires /lib/bootchart (make install-chroot) to 172 + unconditional chroot /lib/bootchart/chroot
|
/openbmc/linux/Documentation/admin-guide/ |
H A D | initrd.rst | 157 # chroot /mnt /sbin/init 163 such a chroot'ed initrd environment.) 244 # exec chroot . what-follows <dev/console >dev/console 2>&1 248 ``/dev`` directory, udev must be initialized before invoking chroot in order 258 - a chroot program must be available under the old and the new root 259 - chroot to the new root afterwards 291 execs - via chroot - a program that continues the installation
|
/openbmc/openbmc/meta-phosphor/recipes-phosphor/initrdscripts/files/ |
H A D | obmc-init.sh | 420 chroot $rodir "$fsck" $fsckopts "$rwdev" 472 while ! chroot /root /bin/sh -c "test -x '$init' -a -s '$init'"
|
/openbmc/openbmc/meta-security/recipes-security/Firejail/ |
H A D | firejail_0.9.72.bb | 37 PACKAGECONFIG[nochroot] = ", --disable-chroot, "
|
/openbmc/linux/Documentation/bpf/ |
H A D | s390.rst | 24 Users of other distros may use debootstrap in order to set up a Debian chroot:: 34 sudo chroot ./s390-toolchain
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-daemons/vsftpd/files/ |
H A D | change-secure_chroot_dir.patch | 56 as a secure chroot() jail at times vsftpd does not require filesystem access.
|
/openbmc/openbmc/poky/meta/recipes-devtools/rpm/files/ |
H A D | 0001-When-cross-installing-execute-package-scriptlets-wit.patch | 17 target sysroot also for temporary files, but we need to chroot out to be able
|