Searched refs:chroot (Results 1 – 25 of 30) sorted by relevance
12
/external/clang/test/Analysis/ |
D | chroot.c | 3 extern int chroot(const char* path); 10 chroot("/usr/local"); // root changed. in f1() 15 chroot("/usr/local"); // root changed. in f2() 21 chroot("/usr/local"); // root changed. in f3()
|
/external/chromium/build/ |
D | install-chroot.sh | 97 sudo mkdir -p /var/lib/chroot 136 [ -d /var/lib/chroot/"${target}" ] && { 141 sudo mkdir -p /var/lib/chroot/"${target}" 178 sudo debootstrap ${archflag} "${distname}" /var/lib/chroot/"${target}" \ 191 directory=/var/lib/chroot/${target} 319 You can run programs inside of the chroot by invoking the "${target%bit}" 322 Your home directory is shared between the host and the chroot. But I configured 323 $HOME/chroot to be private to the chroot environment. You can use it
|
/external/openssh/ |
D | README.privsep | 16 chroot(2) to "/var/empty" and change its privileges to the "sshd" user 33 privsep user and chroot directory: 35 --with-privsep-path=xxx Path for privilege separation chroot
|
D | buildpkg.sh.in | 370 chroot="chroot \${PKG_INSTALL_ROOT}" 375 chroot=echo 407 \$chroot ${PATH_GROUPADD_PROG} \$sshdgid \$SSH_PRIVSEP_GROUP 420 …\$chroot ${PATH_USERADD_PROG} -c 'SSHD PrivSep User' -s /bin/false -g $SSH_PRIVSEP_USER \$sshduid … 421 \$chroot ${PATH_PASSWD_PROG} -l $SSH_PRIVSEP_USER
|
D | sftp-server.0 | 48 sftp-server in a chroot configuration therefore requires that syslogd(8) 49 establish a logging socket inside the chroot directory.
|
D | sshd_config.0 | 125 Specifies the pathname of a directory to chroot(2) to after 128 group. After the chroot, sshd(8) changes the working directory 145 chroot directory (see sftp-server(8) for details). 147 The default is not to chroot(2).
|
D | sshd.0 | 606 chroot(2) directory used by sshd during privilege separation in 620 ssh-keyscan(1), chroot(2), hosts_access(5), login.conf(5), moduli(5),
|
D | sshd.c | 603 if (chroot(_PATH_PRIVSEP_CHROOT_DIR) == -1) in privsep_preauth_child()
|
D | session.c | 1464 if (chroot(path) == -1) in safely_chroot()
|
/external/ipsec-tools/src/racoon/ |
D | localconf.h | 74 char *chroot; /* chroot path */ member
|
D | privsep.c | 200 if (lcconf->chroot != NULL) { in privsep_init() 201 if (chdir(lcconf->chroot) != 0) { in privsep_init() 203 "Cannot chdir(%s): %s\n", lcconf->chroot, in privsep_init() 207 if (chroot(lcconf->chroot) != 0) { in privsep_init() 209 "Cannot chroot(%s): %s\n", lcconf->chroot, in privsep_init()
|
D | localconf.c | 107 lcconf->chroot = NULL; in setdefault()
|
D | cfparse.y | 314 | CHROOT QUOTEDSTRING { lcconf->chroot = $2->v; } EOS
|
/external/libcap-ng/libcap-ng-0.7/ |
D | README | 6 if the headers match the kernel. IOW, if you have a chroot build system
|
/external/tcpdump/lbl/ |
D | os-sunos4.h | 60 int chroot(const char *);
|
/external/libpcap/lbl/ |
D | os-sunos4.h | 60 int chroot(const char *);
|
/external/qemu/ |
D | os-posix.c | 228 if (chroot(chroot_dir) < 0) { in change_root()
|
D | qemu-options.hx | 1653 DEF("chroot", HAS_ARG, QEMU_OPTION_chroot, \ 1654 "-chroot dir Chroot to dir just before starting the VM.\n") 1657 @item -chroot dir 1658 Immediately before starting guest execution, chroot to the specified
|
/external/e2fsprogs/debugfs/ |
D | debug_cmds.ct | 35 change_root_directory, chroot;
|
/external/tcpdump/ |
D | configure.in | 139 AC_ARG_WITH(chroot, [ --with-chroot=DIRECTORY when dropping privileges, chroot to DIRECTORY]) optwith 140 AC_MSG_CHECKING([whether to chroot])
|
D | config.h.in | 135 /* define if should chroot when dropping privileges */
|
D | tcpdump.c | 386 if (chroot(chroot_dir) != 0 || chdir ("/") != 0) { in droproot()
|
D | CHANGES | 112 Option to chroot() when dropping privs
|
/external/clang/lib/StaticAnalyzer/Checkers/ |
D | Checkers.td | 291 HelpText<"Check improper use of chroot">,
|
/external/llvm/lib/Support/Unix/ |
D | Path.inc | 343 // /proc is not always mounted under Linux (chroot for example).
|
12