HomeSort by relevance Sort by last modified time
    Searched full:chroot (Results 1 - 25 of 349) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/clang/test/Analysis/
chroot.c 1 // RUN: %clang_cc1 -analyze -analyzer-checker=alpha.unix.Chroot -analyzer-store region -verify %s
3 extern int chroot(const char* path);
10 chroot("/usr/local"); // root changed.
11 foo(); // expected-warning {{No call of chdir("/") immediately after chroot}}
15 chroot("/usr/local"); // root changed.
21 chroot("/usr/local"); // root changed.
23 foo(); // expected-warning {{No call of chdir("/") immediately after chroot}}
  /bionic/libc/arch-mips/syscalls/
chroot.S 4 .globl chroot
6 .ent chroot
8 chroot: label
22 .end chroot
  /bionic/libc/arch-arm/syscalls/
chroot.S 6 ENTRY(chroot) function
15 END(chroot)
  /bionic/libc/arch-x86/syscalls/
chroot.S 6 ENTRY(chroot) function
21 END(chroot)
  /external/chromium_org/build/
install-chroot.sh 7 # This script installs Debian-derived distributions in a chroot environment.
24 echo "-g group,... groups that can use the chroot unauthenticated"
26 echo "-l List all installed chroot environments"
29 echo "-c always copy 64bit helper binaries to 32bit chroot"
98 for i in /var/lib/chroot/*; do
140 echo "Debian or Ubuntu distribution in a chroot environment. You will"
160 # Create directory for chroot
161 sudo mkdir -p /var/lib/chroot
163 # Find chroot environments that can be installed with debootstrap
168 echo "The following targets are available to be installed in a chroot:
    [all...]
  /external/clang/lib/StaticAnalyzer/Checkers/
ChrootChecker.cpp 10 // This file defines chroot checker, which checks improper use of chroot.
34 // This checker checks improper use of chroot.
36 // NO_CHROOT ---chroot(path)--> ROOT_CHANGED ---chdir(/) --> JAIL_ENTERED
43 // This bug refers to possibly break out of a chroot() jail.
58 void Chroot(CheckerContext &C, const CallExpr *CE) const;
71 II_chroot = &Ctx.Idents.get("chroot");
76 Chroot(C, CE);
87 void ChrootChecker::Chroot(CheckerContext &C, const CallExpr *CE) const {
91 // Once encouter a chroot(), set the enum value ROOT_CHANGED directly in
    [all...]
  /external/chromium/build/
install-chroot.sh 7 # This script installs Debian-derived distributions in a chroot environment.
15 echo "-g group,... groups that can use the chroot unauthenticated"
19 echo "-c always copy 64bit helper binaries to 32bit chroot"
76 mkdir -p "$HOME/chroot/"
96 # Create directory for chroot
97 sudo mkdir -p /var/lib/chroot
99 # Find chroot environments that can be installed with debootstrap
104 echo "The following targets are available to be installed in a chroot:"
125 printf "32bit or a 64bit chroot environment. %s" \
136 [ -d /var/lib/chroot/"${target}" ] &&
    [all...]
  /external/chromium/build/linux/
pkg-config-wrapper 13 # directory of a Chromium OS chroot.
30 # /path/to/chroot/build/x86-generic/usr/lib/pkgconfig/pkg.pc may have all paths
31 # relative to /path/to/chroot (i.e. prefix=/build/x86-generic/usr) instead of
32 # relative to /path/to/chroot/build/x86-generic (i.e prefix=/usr).
  /external/chromium_org/build/linux/
pkg-config-wrapper 13 # directory of a Chromium OS chroot.
50 # /path/to/chroot/build/x86-generic/usr/lib/pkgconfig/pkg.pc may have all paths
51 # relative to /path/to/chroot (i.e. prefix=/build/x86-generic/usr) instead of
52 # relative to /path/to/chroot/build/x86-generic (i.e prefix=/usr).
  /external/libcap-ng/libcap-ng-0.7/
README 6 if the headers match the kernel. IOW, if you have a chroot build system
  /external/chromium_org/sandbox/linux/services/
credentials.cc 102 // chroot() and chdir() to /proc/<tid>/fdinfo.
114 int chroot_ret = chroot(current_thread_fdinfo.c_str());
116 PLOG(ERROR) << "Could not chroot";
128 // chroot() to an empty dir that is "safe". To be safe, it must not contain
129 // any subdirectory (chroot-ing there would allow a chroot escape) and it must
133 // 2. We chroot to /proc/<tid>/fdinfo/
244 // EPERM can happen if already in a chroot. EUSERS if too many nested
credentials_unittest.cc 193 // We want the chroot to never have a subdirectory. A subdirectory
194 // could allow a chroot escape.
209 // are in a chroot.
credentials.h 65 // The implementation currently uses chroot(2) and requires CAP_SYS_CHROOT.
  /external/chromium_org/sandbox/linux/suid/client/
setuid_sandbox_client.h 22 // 3. The renderer requests being chroot-ed through ChrootMe() and
30 // Ask the setuid helper over the setuid sandbox IPC channel to chroot() us
setuid_sandbox_client.cc 125 PLOG(ERROR) << "Failed to write to chroot pipe";
129 // We need to reap the chroot helper process in any event.
139 PLOG(ERROR) << "Failed to read from chroot pipe";
144 LOG(ERROR) << "Error code reply from chroot helper";
  /external/openssh/
README.privsep 16 chroot(2) to "/var/empty" and change its privileges to the "sshd" user
33 privsep user and chroot directory:
35 --with-privsep-path=xxx Path for privilege separation chroot
sftp-server.0 48 sftp-server in a chroot configuration therefore requires that syslogd(8)
49 establish a logging socket inside the chroot directory.
sftp-server.8 103 in a chroot configuration therefore requires that
105 establish a logging socket inside the chroot directory.
platform.c 167 * If we have a chroot directory, we set all creds except real
168 * uid which we will need for chroot. If we don't have a
169 * chroot directory, we don't override anything.
buildpkg.sh.in 367 # Use chroot to handle PKG_INSTALL_ROOT
370 chroot="chroot \${PKG_INSTALL_ROOT}"
375 chroot=echo
407 \$chroot ${PATH_GROUPADD_PROG} \$sshdgid \$SSH_PRIVSEP_GROUP
420 \$chroot ${PATH_USERADD_PROG} -c 'SSHD PrivSep User' -s /bin/false -g $SSH_PRIVSEP_USER \$sshduid $SSH_PRIVSEP_USER
421 \$chroot ${PATH_PASSWD_PROG} -l $SSH_PRIVSEP_USER
  /external/ipsec-tools/src/racoon/
localconf.h 74 char *chroot; /* chroot path */ member in struct:localconf
  /external/chromium_org/sandbox/linux/suid/
sandbox.c 70 // We will chroot() to the helper's /proc/self directory. Anything there will
142 if (chroot(safedir))
143 FatalError("Cannot chroot into /proc/ directory");
146 FatalError("Cannot chdir to / after chroot");
  /external/chromium_org/third_party/WebKit/Source/devtools/front_end/cm/
shell.js 19 define('builtin', 'ab awk bash beep cat cc cd chown chmod chroot clear cp ' +
  /external/e2fsprogs/debugfs/
debug_cmds.ct 35 change_root_directory, chroot;
  /external/tcpdump/
acconfig.h 135 /* define if should chroot when dropping privileges */

Completed in 822 milliseconds

1 2 3 4 5 6 7 8 91011>>