Lines Matching +full:directory +full:- +full:based
8 The jail(2) system call is implemented as a non-optional system call
32 A number of ways to escape the confines of a chroot(2)-created subscope
39 ``..'' based escapes and fchdir(2) based escapes.
41 hard to enforce the new root directory.
44 other things by tracking the directory of the first level of chroot(2)
46 this directory, as well as additional code to refuse chroot(2) if
47 file-descriptors were open referencing directories.
61 the \fCprocfs\fP file system and a sub-tree of the \fCsysctl\fP tree.
70 the process will not be used, instead the pre-configured IP number of
73 BSD based TCP/IP network stacks sport a special interface, the loop-back
94 General restriction of super-users powers for jailed super-users.
104 code or drivers in the FreeBSD kernel are automatically jail-aware: they
112 As a side-effect of this work the suser(9) API were cleaned up and