HomeSort by relevance Sort by last modified time
    Searched full:chroot (Results 1 - 25 of 236) sorted by null

1 2 3 4 5 6 7 8 910

  /external/clang/test/Analysis/
chroot.c 1 // RUN: %clang_cc1 -analyze -analyzer-checker=experimental.unix.Chroot -analyzer-store region -verify %s
3 extern int chroot(const char* path);
10 chroot("/usr/local"); // root changed.
11 foo(); // expected-warning {{No call of chdir("/") immediately after chroot}}
15 chroot("/usr/local"); // root changed.
21 chroot("/usr/local"); // root changed.
23 foo(); // expected-warning {{No call of chdir("/") immediately after chroot}}
  /bionic/libc/arch-x86/syscalls/
chroot.S 5 .type chroot, @function
6 .globl chroot
9 chroot: label
  /bionic/libc/arch-arm/syscalls/
chroot.S 5 ENTRY(chroot) function
14 END(chroot)
  /external/clang/lib/StaticAnalyzer/Checkers/
ChrootChecker.cpp 10 // This file defines chroot checker, which checks improper use of chroot.
34 // This checker checks improper use of chroot.
36 // NO_CHROOT ---chroot(path)--> ROOT_CHANGED ---chdir(/) --> JAIL_ENTERED
43 // This bug refers to possibly break out of a chroot() jail.
58 void Chroot(CheckerContext &C, const CallExpr *CE) const;
71 II_chroot = &Ctx.Idents.get("chroot");
76 Chroot(C, CE);
87 void ChrootChecker::Chroot(CheckerContext &C, const CallExpr *CE) const {
91 // Once encouter a chroot(), set the enum value ROOT_CHANGED directly in
    [all...]
  /external/chromium/build/
install-chroot.sh 7 # This script installs Debian-derived distributions in a chroot environment.
15 echo "-g group,... groups that can use the chroot unauthenticated"
19 echo "-c always copy 64bit helper binaries to 32bit chroot"
76 mkdir -p "$HOME/chroot/"
96 # Create directory for chroot
97 sudo mkdir -p /var/lib/chroot
99 # Find chroot environments that can be installed with debootstrap
104 echo "The following targets are available to be installed in a chroot:"
125 printf "32bit or a 64bit chroot environment. %s" \
136 [ -d /var/lib/chroot/"${target}" ] &&
    [all...]
  /external/chromium/build/linux/
pkg-config-wrapper 13 # directory of a Chromium OS chroot.
30 # /path/to/chroot/build/x86-generic/usr/lib/pkgconfig/pkg.pc may have all paths
31 # relative to /path/to/chroot (i.e. prefix=/build/x86-generic/usr) instead of
32 # relative to /path/to/chroot/build/x86-generic (i.e prefix=/usr).
  /external/openssh/
README.privsep 16 chroot(2) to "/var/empty" and change its privileges to the "sshd" user
33 privsep user and chroot directory:
35 --with-privsep-path=xxx Path for privilege separation chroot
sftp-server.0 48 sftp-server in a chroot configuration therefore requires that syslogd(8)
49 establish a logging socket inside the chroot directory.
sftp-server.8 103 in a chroot configuration therefore requires that
105 establish a logging socket inside the chroot directory.
platform.c 167 * If we have a chroot directory, we set all creds except real
168 * uid which we will need for chroot. If we don't have a
169 * chroot directory, we don't override anything.
buildpkg.sh.in 367 # Use chroot to handle PKG_INSTALL_ROOT
370 chroot="chroot \${PKG_INSTALL_ROOT}"
375 chroot=echo
407 \$chroot ${PATH_GROUPADD_PROG} \$sshdgid \$SSH_PRIVSEP_GROUP
420 \$chroot ${PATH_USERADD_PROG} -c 'SSHD PrivSep User' -s /bin/false -g $SSH_PRIVSEP_USER \$sshduid $SSH_PRIVSEP_USER
421 \$chroot ${PATH_PASSWD_PROG} -l $SSH_PRIVSEP_USER
  /external/ipsec-tools/src/racoon/
localconf.h 74 char *chroot; /* chroot path */ member in struct:localconf
cfparse.h 45 CHROOT = 261,
210 #define CHROOT 261
privsep.c 200 if (lcconf->chroot != NULL) {
201 if (chdir(lcconf->chroot) != 0) {
203 "Cannot chdir(%s): %s\n", lcconf->chroot,
207 if (chroot(lcconf->chroot) != 0) {
209 "Cannot chroot(%s): %s\n", lcconf->chroot,
  /external/e2fsprogs/debugfs/
debug_cmds.ct 35 change_root_directory, chroot;
  /external/tcpdump/
acconfig.h 135 /* define if should chroot when dropping privileges */
  /system/core/init/
keywords.h 46 KEYWORD(chroot, COMMAND, 1, do_chroot)
  /external/qemu/
os-posix.c 228 if (chroot(chroot_dir) < 0) {
229 fprintf(stderr, "chroot failed\n");
  /external/openssh/contrib/aix/
buildbff.sh 228 # create chroot directory if required
231 echo "PrivSep chroot directory $PRIVSEP_PATH already exists."
233 echo "Creating PrivSep chroot directory $PRIVSEP_PATH."
  /prebuilts/ndk/android-ndk-r7/platforms/android-3/arch-arm/usr/lib/
libc.so 
  /prebuilts/ndk/android-ndk-r7/platforms/android-4/arch-arm/usr/lib/
libc.so 
  /prebuilts/ndk/android-ndk-r7/platforms/android-5/arch-arm/usr/lib/
libc.so 
  /bionic/libc/include/
unistd.h 120 extern int chroot(const char *);
  /development/ndk/platforms/android-3/arch-arm/symbols/
libc.so.functions.txt 343 chroot
  /development/ndk/platforms/android-3/include/
unistd.h 112 extern int chroot(const char *);

Completed in 737 milliseconds

1 2 3 4 5 6 7 8 910