Home
last modified time | relevance | path

Searched refs:chroot (Results 1 – 25 of 94) sorted by relevance

1234

/OK3568_Linux_fs/buildroot/package/mongrel2/
H A D0004-Support-urandom-inside-chroot.patch4 Subject: [PATCH] Support urandom inside chroot
7 opened before the chroot. If initializing that fails, it fallsback on
28 check(rc == 0, "Major failure in chroot/droppriv, aborting.");
30 - // set up rng after chroot
102 // put the rng initialization back here (before chroot)
112 if(blength(chroot) > 0) {
113 srv->chroot = bstrcpy(chroot); check_mem(srv->chroot);
/OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-daemons/tftp-hpa/files/
H A Dtftp-0.49-chk_retcodes.patch14 - chdir("/"); /* Cygwin chroot() bug workaround */
15 + if (chdir("/") < 0) { /* Cygwin chroot() bug workaround */
16 + syslog(LOG_ERR, "chroot: %m");
/OK3568_Linux_fs/debian/ubuntu-build-service/bullseye-base-arm64/
H A Dconfigure15 --mirror-chroot "http://mirrors.ustc.edu.cn/debian" \
16 --mirror-chroot-security "http://mirrors.ustc.edu.cn/debian-security" \
32 --chroot-filesystem none \
H A DMakefile25 sudo mv chroot.files $(LISTFILE);
26 sudo mv chroot.packages.live $(PKGSFILE);
/OK3568_Linux_fs/debian/ubuntu-build-service/bullseye-gnome-arm64/
H A Dconfigure15 --mirror-chroot "http://mirrors.ustc.edu.cn/debian" \
16 --mirror-chroot-security "http://mirrors.ustc.edu.cn/debian-security" \
32 --chroot-filesystem none \
H A DMakefile25 sudo mv chroot.files $(LISTFILE);
26 sudo mv chroot.packages.live $(PKGSFILE);
/OK3568_Linux_fs/debian/ubuntu-build-service/bullseye-lxde-arm64/
H A Dconfigure15 --mirror-chroot "http://mirrors.ustc.edu.cn/debian" \
16 --mirror-chroot-security "http://mirrors.ustc.edu.cn/debian-security" \
32 --chroot-filesystem none \
H A DMakefile25 sudo mv chroot.files $(LISTFILE);
26 sudo mv chroot.packages.live $(PKGSFILE);
/OK3568_Linux_fs/debian/ubuntu-build-service/bullseye-xfce-armhf/
H A Dconfigure15 --mirror-chroot "http://mirrors.ustc.edu.cn/debian" \
16 --mirror-chroot-security "http://mirrors.ustc.edu.cn/debian-security" \
32 --chroot-filesystem none \
H A DMakefile25 sudo mv chroot.files $(LISTFILE);
26 sudo mv chroot.packages.live $(PKGSFILE);
/OK3568_Linux_fs/debian/ubuntu-build-service/bullseye-gnome-armhf/
H A Dconfigure15 --mirror-chroot "http://mirrors.ustc.edu.cn/debian" \
16 --mirror-chroot-security "http://mirrors.ustc.edu.cn/debian-security" \
32 --chroot-filesystem none \
H A DMakefile25 sudo mv chroot.files $(LISTFILE);
26 sudo mv chroot.packages.live $(PKGSFILE);
/OK3568_Linux_fs/debian/ubuntu-build-service/bullseye-base-armhf/
H A Dconfigure15 --mirror-chroot "http://mirrors.ustc.edu.cn/debian" \
16 --mirror-chroot-security "http://mirrors.ustc.edu.cn/debian-security" \
32 --chroot-filesystem none \
H A DMakefile25 sudo mv chroot.files $(LISTFILE);
26 sudo mv chroot.packages.live $(PKGSFILE);
/OK3568_Linux_fs/debian/ubuntu-build-service/bullseye-lxde-armhf/
H A Dconfigure15 --mirror-chroot "http://mirrors.ustc.edu.cn/debian" \
16 --mirror-chroot-security "http://mirrors.ustc.edu.cn/debian-security" \
32 --chroot-filesystem none \
H A DMakefile25 sudo mv chroot.files $(LISTFILE);
26 sudo mv chroot.packages.live $(PKGSFILE);
/OK3568_Linux_fs/debian/ubuntu-build-service/bullseye-xfce-arm64/
H A Dconfigure15 --mirror-chroot "http://mirrors.ustc.edu.cn/debian" \
16 --mirror-chroot-security "http://mirrors.ustc.edu.cn/debian-security" \
32 --chroot-filesystem none \
H A DMakefile25 sudo mv chroot.files $(LISTFILE);
26 sudo mv chroot.packages.live $(PKGSFILE);
/OK3568_Linux_fs/yocto/poky/meta/recipes-devtools/dpkg/dpkg/
H A D0003-Our-pre-postinsts-expect-D-to-be-set-when-running-in.patch5 sysroot and don't expect a chroot. This matches up our system expectations
45 - rc = chroot(instdir);
51 - ohshite(_("failed to chroot to '%.250s'"), instdir);
54 - * a saner environment, also needed after the chroot(). */
/OK3568_Linux_fs/kernel/Documentation/userspace-api/
H A Dno_new_privs.rst15 - chroot is disallowed to unprivileged processes, since it would allow
17 inherited chroot.
62 ``no_new_privs`` is set, and ``no_new_privs`` + ``chroot`` is considerable less
63 dangerous than chroot by itself.
/OK3568_Linux_fs/buildroot/package/coreutils/
H A Dcoreutils.mk146 mv $(TARGET_DIR)/usr/bin/chroot $(TARGET_DIR)/usr/sbin
150 rm -f $(TARGET_DIR)/usr/bin/chroot
151 ln -sf ../bin/coreutils $(TARGET_DIR)/usr/sbin/chroot
/OK3568_Linux_fs/yocto/poky/meta/recipes-extended/shadow/files/
H A Dcommonio.c-fix-unexpected-open-failure-in-chroot-env.patch4 Subject: [PATCH] commonio.c-fix-unexpected-open-failure-in-chroot-env
8 commonio.c: fix unexpected open failure in chroot environment
/OK3568_Linux_fs/yocto/poky/meta/recipes-devtools/rsync/files/
H A Drsyncd.conf8 use chroot = yes
/OK3568_Linux_fs/yocto/meta-openembedded/meta-python/recipes-extended/python-blivet/python3-blivet/
H A D0002-run_program-support-timeout.patch58 - preexec_fn=chroot, cwd=root, env=env)
87 + preexec_fn=chroot, cwd=root, env=env)
/OK3568_Linux_fs/buildroot/package/darkhttpd/
H A Ddarkhttpd.service8 ExecStart=/usr/sbin/darkhttpd $DARKHTTPD_ROOT $DARKHTTPD_FLAGS --chroot --uid nobody --gid www-data

1234