Home
last modified time | relevance | path

Searched refs:chroot (Results 1 – 25 of 30) sorted by relevance

12

/external/clang/test/Analysis/
Dchroot.c3 extern int chroot(const char* path);
10 chroot("/usr/local"); // root changed. in f1()
15 chroot("/usr/local"); // root changed. in f2()
21 chroot("/usr/local"); // root changed. in f3()
/external/chromium/build/
Dinstall-chroot.sh97 sudo mkdir -p /var/lib/chroot
136 [ -d /var/lib/chroot/"${target}" ] && {
141 sudo mkdir -p /var/lib/chroot/"${target}"
178 sudo debootstrap ${archflag} "${distname}" /var/lib/chroot/"${target}" \
191 directory=/var/lib/chroot/${target}
319 You can run programs inside of the chroot by invoking the "${target%bit}"
322 Your home directory is shared between the host and the chroot. But I configured
323 $HOME/chroot to be private to the chroot environment. You can use it
/external/openssh/
DREADME.privsep16 chroot(2) to "/var/empty" and change its privileges to the "sshd" user
33 privsep user and chroot directory:
35 --with-privsep-path=xxx Path for privilege separation chroot
Dbuildpkg.sh.in370 chroot="chroot \${PKG_INSTALL_ROOT}"
375 chroot=echo
407 \$chroot ${PATH_GROUPADD_PROG} \$sshdgid \$SSH_PRIVSEP_GROUP
420 …\$chroot ${PATH_USERADD_PROG} -c 'SSHD PrivSep User' -s /bin/false -g $SSH_PRIVSEP_USER \$sshduid …
421 \$chroot ${PATH_PASSWD_PROG} -l $SSH_PRIVSEP_USER
Dsftp-server.048 sftp-server in a chroot configuration therefore requires that syslogd(8)
49 establish a logging socket inside the chroot directory.
Dsshd_config.0125 Specifies the pathname of a directory to chroot(2) to after
128 group. After the chroot, sshd(8) changes the working directory
145 chroot directory (see sftp-server(8) for details).
147 The default is not to chroot(2).
Dsshd.0606 chroot(2) directory used by sshd during privilege separation in
620 ssh-keyscan(1), chroot(2), hosts_access(5), login.conf(5), moduli(5),
Dsshd.c603 if (chroot(_PATH_PRIVSEP_CHROOT_DIR) == -1) in privsep_preauth_child()
Dsession.c1464 if (chroot(path) == -1) in safely_chroot()
/external/ipsec-tools/src/racoon/
Dlocalconf.h74 char *chroot; /* chroot path */ member
Dprivsep.c200 if (lcconf->chroot != NULL) { in privsep_init()
201 if (chdir(lcconf->chroot) != 0) { in privsep_init()
203 "Cannot chdir(%s): %s\n", lcconf->chroot, in privsep_init()
207 if (chroot(lcconf->chroot) != 0) { in privsep_init()
209 "Cannot chroot(%s): %s\n", lcconf->chroot, in privsep_init()
Dlocalconf.c107 lcconf->chroot = NULL; in setdefault()
Dcfparse.y314 | CHROOT QUOTEDSTRING { lcconf->chroot = $2->v; } EOS
/external/libcap-ng/libcap-ng-0.7/
DREADME6 if the headers match the kernel. IOW, if you have a chroot build system
/external/tcpdump/lbl/
Dos-sunos4.h60 int chroot(const char *);
/external/libpcap/lbl/
Dos-sunos4.h60 int chroot(const char *);
/external/qemu/
Dos-posix.c228 if (chroot(chroot_dir) < 0) { in change_root()
Dqemu-options.hx1653 DEF("chroot", HAS_ARG, QEMU_OPTION_chroot, \
1654 "-chroot dir Chroot to dir just before starting the VM.\n")
1657 @item -chroot dir
1658 Immediately before starting guest execution, chroot to the specified
/external/e2fsprogs/debugfs/
Ddebug_cmds.ct35 change_root_directory, chroot;
/external/tcpdump/
Dconfigure.in139 AC_ARG_WITH(chroot, [ --with-chroot=DIRECTORY when dropping privileges, chroot to DIRECTORY]) optwith
140 AC_MSG_CHECKING([whether to chroot])
Dconfig.h.in135 /* define if should chroot when dropping privileges */
Dtcpdump.c386 if (chroot(chroot_dir) != 0 || chdir ("/") != 0) { in droproot()
DCHANGES112 Option to chroot() when dropping privs
/external/clang/lib/StaticAnalyzer/Checkers/
DCheckers.td291 HelpText<"Check improper use of chroot">,
/external/llvm/lib/Support/Unix/
DPath.inc343 // /proc is not always mounted under Linux (chroot for example).

12