| /OK3568_Linux_fs/buildroot/package/mongrel2/ |
| H A D | 0004-Support-urandom-inside-chroot.patch | 4 Subject: [PATCH] Support urandom inside chroot 7 opened before the chroot. If initializing that fails, it fallsback on 28 check(rc == 0, "Major failure in chroot/droppriv, aborting."); 30 - // set up rng after chroot 102 // put the rng initialization back here (before chroot) 112 if(blength(chroot) > 0) { 113 srv->chroot = bstrcpy(chroot); check_mem(srv->chroot);
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-daemons/tftp-hpa/files/ |
| H A D | tftp-0.49-chk_retcodes.patch | 14 - chdir("/"); /* Cygwin chroot() bug workaround */ 15 + if (chdir("/") < 0) { /* Cygwin chroot() bug workaround */ 16 + syslog(LOG_ERR, "chroot: %m");
|
| /OK3568_Linux_fs/debian/ubuntu-build-service/bullseye-base-arm64/ |
| H A D | configure | 15 --mirror-chroot "http://mirrors.ustc.edu.cn/debian" \ 16 --mirror-chroot-security "http://mirrors.ustc.edu.cn/debian-security" \ 32 --chroot-filesystem none \
|
| H A D | Makefile | 25 sudo mv chroot.files $(LISTFILE); 26 sudo mv chroot.packages.live $(PKGSFILE);
|
| /OK3568_Linux_fs/debian/ubuntu-build-service/bullseye-gnome-arm64/ |
| H A D | configure | 15 --mirror-chroot "http://mirrors.ustc.edu.cn/debian" \ 16 --mirror-chroot-security "http://mirrors.ustc.edu.cn/debian-security" \ 32 --chroot-filesystem none \
|
| H A D | Makefile | 25 sudo mv chroot.files $(LISTFILE); 26 sudo mv chroot.packages.live $(PKGSFILE);
|
| /OK3568_Linux_fs/debian/ubuntu-build-service/bullseye-lxde-arm64/ |
| H A D | configure | 15 --mirror-chroot "http://mirrors.ustc.edu.cn/debian" \ 16 --mirror-chroot-security "http://mirrors.ustc.edu.cn/debian-security" \ 32 --chroot-filesystem none \
|
| H A D | Makefile | 25 sudo mv chroot.files $(LISTFILE); 26 sudo mv chroot.packages.live $(PKGSFILE);
|
| /OK3568_Linux_fs/debian/ubuntu-build-service/bullseye-xfce-armhf/ |
| H A D | configure | 15 --mirror-chroot "http://mirrors.ustc.edu.cn/debian" \ 16 --mirror-chroot-security "http://mirrors.ustc.edu.cn/debian-security" \ 32 --chroot-filesystem none \
|
| H A D | Makefile | 25 sudo mv chroot.files $(LISTFILE); 26 sudo mv chroot.packages.live $(PKGSFILE);
|
| /OK3568_Linux_fs/debian/ubuntu-build-service/bullseye-gnome-armhf/ |
| H A D | configure | 15 --mirror-chroot "http://mirrors.ustc.edu.cn/debian" \ 16 --mirror-chroot-security "http://mirrors.ustc.edu.cn/debian-security" \ 32 --chroot-filesystem none \
|
| H A D | Makefile | 25 sudo mv chroot.files $(LISTFILE); 26 sudo mv chroot.packages.live $(PKGSFILE);
|
| /OK3568_Linux_fs/debian/ubuntu-build-service/bullseye-base-armhf/ |
| H A D | configure | 15 --mirror-chroot "http://mirrors.ustc.edu.cn/debian" \ 16 --mirror-chroot-security "http://mirrors.ustc.edu.cn/debian-security" \ 32 --chroot-filesystem none \
|
| H A D | Makefile | 25 sudo mv chroot.files $(LISTFILE); 26 sudo mv chroot.packages.live $(PKGSFILE);
|
| /OK3568_Linux_fs/debian/ubuntu-build-service/bullseye-lxde-armhf/ |
| H A D | configure | 15 --mirror-chroot "http://mirrors.ustc.edu.cn/debian" \ 16 --mirror-chroot-security "http://mirrors.ustc.edu.cn/debian-security" \ 32 --chroot-filesystem none \
|
| H A D | Makefile | 25 sudo mv chroot.files $(LISTFILE); 26 sudo mv chroot.packages.live $(PKGSFILE);
|
| /OK3568_Linux_fs/debian/ubuntu-build-service/bullseye-xfce-arm64/ |
| H A D | configure | 15 --mirror-chroot "http://mirrors.ustc.edu.cn/debian" \ 16 --mirror-chroot-security "http://mirrors.ustc.edu.cn/debian-security" \ 32 --chroot-filesystem none \
|
| H A D | Makefile | 25 sudo mv chroot.files $(LISTFILE); 26 sudo mv chroot.packages.live $(PKGSFILE);
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-devtools/dpkg/dpkg/ |
| H A D | 0003-Our-pre-postinsts-expect-D-to-be-set-when-running-in.patch | 5 sysroot and don't expect a chroot. This matches up our system expectations 45 - rc = chroot(instdir); 51 - ohshite(_("failed to chroot to '%.250s'"), instdir); 54 - * a saner environment, also needed after the chroot(). */
|
| /OK3568_Linux_fs/kernel/Documentation/userspace-api/ |
| H A D | no_new_privs.rst | 15 - chroot is disallowed to unprivileged processes, since it would allow 17 inherited chroot. 62 ``no_new_privs`` is set, and ``no_new_privs`` + ``chroot`` is considerable less 63 dangerous than chroot by itself.
|
| /OK3568_Linux_fs/buildroot/package/coreutils/ |
| H A D | coreutils.mk | 146 mv $(TARGET_DIR)/usr/bin/chroot $(TARGET_DIR)/usr/sbin 150 rm -f $(TARGET_DIR)/usr/bin/chroot 151 ln -sf ../bin/coreutils $(TARGET_DIR)/usr/sbin/chroot
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-extended/shadow/files/ |
| H A D | commonio.c-fix-unexpected-open-failure-in-chroot-env.patch | 4 Subject: [PATCH] commonio.c-fix-unexpected-open-failure-in-chroot-env 8 commonio.c: fix unexpected open failure in chroot environment
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-devtools/rsync/files/ |
| H A D | rsyncd.conf | 8 use chroot = yes
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-python/recipes-extended/python-blivet/python3-blivet/ |
| H A D | 0002-run_program-support-timeout.patch | 58 - preexec_fn=chroot, cwd=root, env=env) 87 + preexec_fn=chroot, cwd=root, env=env)
|
| /OK3568_Linux_fs/buildroot/package/darkhttpd/ |
| H A D | darkhttpd.service | 8 ExecStart=/usr/sbin/darkhttpd $DARKHTTPD_ROOT $DARKHTTPD_FLAGS --chroot --uid nobody --gid www-data
|