/external/clang/test/Analysis/ |
chroot.c | 1 // RUN: %clang_cc1 -analyze -analyzer-checker=experimental.unix.Chroot -analyzer-store region -verify %s 3 extern int chroot(const char* path); 10 chroot("/usr/local"); // root changed. 11 foo(); // expected-warning {{No call of chdir("/") immediately after chroot}} 15 chroot("/usr/local"); // root changed. 21 chroot("/usr/local"); // root changed. 23 foo(); // expected-warning {{No call of chdir("/") immediately after chroot}}
|
/bionic/libc/arch-x86/syscalls/ |
chroot.S | 5 .type chroot, @function 6 .globl chroot 9 chroot: label
|
/bionic/libc/arch-arm/syscalls/ |
chroot.S | 5 ENTRY(chroot) function 14 END(chroot)
|
/external/clang/lib/StaticAnalyzer/Checkers/ |
ChrootChecker.cpp | 10 // This file defines chroot checker, which checks improper use of chroot. 34 // This checker checks improper use of chroot. 36 // NO_CHROOT ---chroot(path)--> ROOT_CHANGED ---chdir(/) --> JAIL_ENTERED 43 // This bug refers to possibly break out of a chroot() jail. 58 void Chroot(CheckerContext &C, const CallExpr *CE) const; 71 II_chroot = &Ctx.Idents.get("chroot"); 76 Chroot(C, CE); 87 void ChrootChecker::Chroot(CheckerContext &C, const CallExpr *CE) const { 91 // Once encouter a chroot(), set the enum value ROOT_CHANGED directly in [all...] |
/external/chromium/build/ |
install-chroot.sh | 7 # This script installs Debian-derived distributions in a chroot environment. 15 echo "-g group,... groups that can use the chroot unauthenticated" 19 echo "-c always copy 64bit helper binaries to 32bit chroot" 76 mkdir -p "$HOME/chroot/" 96 # Create directory for chroot 97 sudo mkdir -p /var/lib/chroot 99 # Find chroot environments that can be installed with debootstrap 104 echo "The following targets are available to be installed in a chroot:" 125 printf "32bit or a 64bit chroot environment. %s" \ 136 [ -d /var/lib/chroot/"${target}" ] && [all...] |
/external/chromium/build/linux/ |
pkg-config-wrapper | 13 # directory of a Chromium OS chroot. 30 # /path/to/chroot/build/x86-generic/usr/lib/pkgconfig/pkg.pc may have all paths 31 # relative to /path/to/chroot (i.e. prefix=/build/x86-generic/usr) instead of 32 # relative to /path/to/chroot/build/x86-generic (i.e prefix=/usr).
|
/external/openssh/ |
README.privsep | 16 chroot(2) to "/var/empty" and change its privileges to the "sshd" user 33 privsep user and chroot directory: 35 --with-privsep-path=xxx Path for privilege separation chroot
|
sftp-server.0 | 48 sftp-server in a chroot configuration therefore requires that syslogd(8) 49 establish a logging socket inside the chroot directory.
|
sftp-server.8 | 103 in a chroot configuration therefore requires that 105 establish a logging socket inside the chroot directory.
|
platform.c | 167 * If we have a chroot directory, we set all creds except real 168 * uid which we will need for chroot. If we don't have a 169 * chroot directory, we don't override anything.
|
buildpkg.sh.in | 367 # Use chroot to handle PKG_INSTALL_ROOT 370 chroot="chroot \${PKG_INSTALL_ROOT}" 375 chroot=echo 407 \$chroot ${PATH_GROUPADD_PROG} \$sshdgid \$SSH_PRIVSEP_GROUP 420 \$chroot ${PATH_USERADD_PROG} -c 'SSHD PrivSep User' -s /bin/false -g $SSH_PRIVSEP_USER \$sshduid $SSH_PRIVSEP_USER 421 \$chroot ${PATH_PASSWD_PROG} -l $SSH_PRIVSEP_USER
|
/external/ipsec-tools/src/racoon/ |
localconf.h | 74 char *chroot; /* chroot path */ member in struct:localconf
|
cfparse.h | 45 CHROOT = 261, 210 #define CHROOT 261
|
privsep.c | 200 if (lcconf->chroot != NULL) { 201 if (chdir(lcconf->chroot) != 0) { 203 "Cannot chdir(%s): %s\n", lcconf->chroot, 207 if (chroot(lcconf->chroot) != 0) { 209 "Cannot chroot(%s): %s\n", lcconf->chroot,
|
/external/e2fsprogs/debugfs/ |
debug_cmds.ct | 35 change_root_directory, chroot;
|
/external/tcpdump/ |
acconfig.h | 135 /* define if should chroot when dropping privileges */
|
/system/core/init/ |
keywords.h | 46 KEYWORD(chroot, COMMAND, 1, do_chroot)
|
/external/qemu/ |
os-posix.c | 228 if (chroot(chroot_dir) < 0) { 229 fprintf(stderr, "chroot failed\n");
|
/external/openssh/contrib/aix/ |
buildbff.sh | 228 # create chroot directory if required 231 echo "PrivSep chroot directory $PRIVSEP_PATH already exists." 233 echo "Creating PrivSep chroot directory $PRIVSEP_PATH."
|
/prebuilts/ndk/android-ndk-r7/platforms/android-3/arch-arm/usr/lib/ |
libc.so | |
/prebuilts/ndk/android-ndk-r7/platforms/android-4/arch-arm/usr/lib/ |
libc.so | |
/prebuilts/ndk/android-ndk-r7/platforms/android-5/arch-arm/usr/lib/ |
libc.so | |
/bionic/libc/include/ |
unistd.h | 120 extern int chroot(const char *);
|
/development/ndk/platforms/android-3/arch-arm/symbols/ |
libc.so.functions.txt | 343 chroot
|
/development/ndk/platforms/android-3/include/ |
unistd.h | 112 extern int chroot(const char *);
|