Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 145 for chroot1 (0.16 sec)

  1. src/syscall/asm_solaris_amd64.s

    TEXT ·sysvicall6(SB),NOSPLIT,$0
    	JMP	runtime·syscall_sysvicall6(SB)
    
    TEXT ·rawSysvicall6(SB),NOSPLIT,$0
    	JMP	runtime·syscall_rawsysvicall6(SB)
    
    TEXT ·chdir(SB),NOSPLIT,$0
    	JMP	runtime·syscall_chdir(SB)
    
    TEXT ·chroot1(SB),NOSPLIT,$0
    	JMP	runtime·syscall_chroot(SB)
    
    TEXT ·closeFD(SB),NOSPLIT,$0
    	JMP	runtime·syscall_close(SB)
    
    TEXT ·dup2child(SB),NOSPLIT,$0
    	JMP	runtime·syscall_dup2(SB)
    	RET
    
    TEXT ·execve(SB),NOSPLIT,$0
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed Mar 15 17:21:30 UTC 2023
    - 1.8K bytes
    - Viewed (0)
  2. src/syscall/exec_libc.go

    		}
    	}
    
    	// Restore the signal mask. We do this after TIOCSPGRP to avoid
    	// having the kernel send a SIGTTOU signal to the process group.
    	runtime_AfterForkInChild()
    
    	// Chroot
    	if chroot != nil {
    		err1 = chroot1(uintptr(unsafe.Pointer(chroot)))
    		if err1 != 0 {
    			goto childerror
    		}
    	}
    
    	// User and groups
    	if cred = sys.Credential; cred != nil {
    		ngroups = uintptr(len(cred.Groups))
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri Sep 29 18:51:35 UTC 2023
    - 8.2K bytes
    - Viewed (0)
  3. src/runtime/syscall_aix.go

    }
    
    //go:linkname syscall_chdir syscall.chdir
    //go:nosplit
    func syscall_chdir(path uintptr) (err uintptr) {
    	_, err = syscall1(&libc_chdir, path)
    	return
    }
    
    //go:linkname syscall_chroot1 syscall.chroot1
    //go:nosplit
    func syscall_chroot1(path uintptr) (err uintptr) {
    	_, err = syscall1(&libc_chroot, path)
    	return
    }
    
    // like close, but must not split stack, for fork.
    //
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu Dec 14 17:22:18 UTC 2023
    - 6.3K bytes
    - Viewed (0)
  4. docs/chroot/README.md

    # Deploy MinIO on Chrooted Environment [![Slack](https://slack.min.io/slack?type=svg)](https://slack.min.io) [![Docker Pulls](https://img.shields.io/docker/pulls/minio/minio.svg?maxAge=604800)](https://hub.docker.com/r/minio/minio/)
    
    Chroot allows user based namespace isolation on many standard Linux deployments.
    
    ## 1. Prerequisites
    
    - Familiarity with [chroot](http://man7.org/linux/man-pages/man2/chroot.2.html)
    - Chroot installed on your machine.
    
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Thu Sep 29 04:28:45 UTC 2022
    - 1.7K bytes
    - Viewed (0)
  5. cmd/kubeadm/app/util/chroot_windows.go

    limitations under the License.
    */
    
    package util
    
    import (
    	"github.com/pkg/errors"
    )
    
    // Chroot chroot()s to the new path.
    // NB: All file paths after this call are effectively relative to
    // `rootfs`
    func Chroot(rootfs string) error {
    	return errors.New("chroot is not implemented on Windows")
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Aug 24 19:47:49 UTC 2021
    - 871 bytes
    - Viewed (0)
  6. cmd/kubeadm/app/util/chroot_unix.go

    import (
    	"os"
    	"path/filepath"
    	"syscall"
    
    	"github.com/pkg/errors"
    )
    
    // Chroot chroot()s to the new path.
    // NB: All file paths after this call are effectively relative to
    // `rootfs`
    func Chroot(rootfs string) error {
    	if err := syscall.Chroot(rootfs); err != nil {
    		return errors.Wrapf(err, "unable to chroot to %s", rootfs)
    	}
    	root := filepath.FromSlash("/")
    	if err := os.Chdir(root); err != nil {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Aug 24 19:47:49 UTC 2021
    - 1.1K bytes
    - Viewed (0)
  7. src/syscall/exec_linux_test.go

    	cmd.Env = append(cmd.Environ(), "GO_WANT_HELPER_PROCESS=1")
    	cmd.SysProcAttr = &syscall.SysProcAttr{Chroot: d, Unshareflags: syscall.CLONE_NEWNS}
    
    	out, err := cmd.CombinedOutput()
    	if err != nil {
    		if testenv.SyscallIsNotSupported(err) {
    			t.Skipf("skipping: could not start process with CLONE_NEWNS and Chroot %q: %v", d, err)
    		}
    		t.Fatalf("unshare failed: %v\n%s", err, out)
    	} else if len(out) != 0 {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 15 07:45:37 UTC 2024
    - 20.6K bytes
    - Viewed (0)
  8. dockerscripts/docker-entrypoint.sh

    	if [ -n "${MINIO_USERNAME}" ] && [ -n "${MINIO_GROUPNAME}" ]; then
    		if [ -n "${MINIO_UID}" ] && [ -n "${MINIO_GID}" ]; then
    			chroot --userspec=${MINIO_UID}:${MINIO_GID} / "$@"
    		else
    			echo "${MINIO_USERNAME}:x:1000:1000:${MINIO_USERNAME}:/:/sbin/nologin" >>/etc/passwd
    			echo "${MINIO_GROUPNAME}:x:1000" >>/etc/group
    			chroot --userspec=${MINIO_USERNAME}:${MINIO_GROUPNAME} / "$@"
    		fi
    	else
    		exec "$@"
    	fi
    }
    
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Fri Nov 03 21:18:18 UTC 2023
    - 675 bytes
    - Viewed (0)
  9. src/syscall/exec_bsd.go

    	}
    
    	// Restore the signal mask. We do this after TIOCSPGRP to avoid
    	// having the kernel send a SIGTTOU signal to the process group.
    	runtime_AfterForkInChild()
    
    	// Chroot
    	if chroot != nil {
    		_, _, err1 = RawSyscall(SYS_CHROOT, uintptr(unsafe.Pointer(chroot)), 0, 0)
    		if err1 != 0 {
    			goto childerror
    		}
    	}
    
    	// User and groups
    	if cred = sys.Credential; cred != nil {
    		ngroups = uintptr(len(cred.Groups))
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri Sep 29 18:51:35 UTC 2023
    - 7.9K bytes
    - Viewed (0)
  10. src/syscall/exec_freebsd.go

    	}
    
    	// Restore the signal mask. We do this after TIOCSPGRP to avoid
    	// having the kernel send a SIGTTOU signal to the process group.
    	runtime_AfterForkInChild()
    
    	// Chroot
    	if chroot != nil {
    		_, _, err1 = RawSyscall(SYS_CHROOT, uintptr(unsafe.Pointer(chroot)), 0, 0)
    		if err1 != 0 {
    			goto childerror
    		}
    	}
    
    	// User and groups
    	if cred = sys.Credential; cred != nil {
    		ngroups = uintptr(len(cred.Groups))
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri Sep 29 18:51:35 UTC 2023
    - 8.4K bytes
    - Viewed (0)
Back to top