/external/clang/test/Analysis/ |
chroot.c | 1 // RUN: %clang_cc1 -analyze -analyzer-checker=alpha.unix.Chroot -analyzer-store region -verify %s 3 extern int chroot(const char* path); 10 chroot("/usr/local"); // root changed. 11 foo(); // expected-warning {{No call of chdir("/") immediately after chroot}} 15 chroot("/usr/local"); // root changed. 21 chroot("/usr/local"); // root changed. 23 foo(); // expected-warning {{No call of chdir("/") immediately after chroot}}
|
/bionic/libc/arch-mips/syscalls/ |
chroot.S | 4 .globl chroot 6 .ent chroot 8 chroot: label 22 .end chroot
|
/bionic/libc/arch-arm/syscalls/ |
chroot.S | 6 ENTRY(chroot) function 15 END(chroot)
|
/bionic/libc/arch-x86/syscalls/ |
chroot.S | 6 ENTRY(chroot) function 21 END(chroot)
|
/external/chromium_org/build/ |
install-chroot.sh | 7 # This script installs Debian-derived distributions in a chroot environment. 24 echo "-g group,... groups that can use the chroot unauthenticated" 26 echo "-l List all installed chroot environments" 29 echo "-c always copy 64bit helper binaries to 32bit chroot" 98 for i in /var/lib/chroot/*; do 140 echo "Debian or Ubuntu distribution in a chroot environment. You will" 160 # Create directory for chroot 161 sudo mkdir -p /var/lib/chroot 163 # Find chroot environments that can be installed with debootstrap 168 echo "The following targets are available to be installed in a chroot: [all...] |
/external/clang/lib/StaticAnalyzer/Checkers/ |
ChrootChecker.cpp | 10 // This file defines chroot checker, which checks improper use of chroot. 34 // This checker checks improper use of chroot. 36 // NO_CHROOT ---chroot(path)--> ROOT_CHANGED ---chdir(/) --> JAIL_ENTERED 43 // This bug refers to possibly break out of a chroot() jail. 58 void Chroot(CheckerContext &C, const CallExpr *CE) const; 71 II_chroot = &Ctx.Idents.get("chroot"); 76 Chroot(C, CE); 87 void ChrootChecker::Chroot(CheckerContext &C, const CallExpr *CE) const { 91 // Once encouter a chroot(), set the enum value ROOT_CHANGED directly in [all...] |
/external/chromium/build/ |
install-chroot.sh | 7 # This script installs Debian-derived distributions in a chroot environment. 15 echo "-g group,... groups that can use the chroot unauthenticated" 19 echo "-c always copy 64bit helper binaries to 32bit chroot" 76 mkdir -p "$HOME/chroot/" 96 # Create directory for chroot 97 sudo mkdir -p /var/lib/chroot 99 # Find chroot environments that can be installed with debootstrap 104 echo "The following targets are available to be installed in a chroot:" 125 printf "32bit or a 64bit chroot environment. %s" \ 136 [ -d /var/lib/chroot/"${target}" ] && [all...] |
/external/chromium/build/linux/ |
pkg-config-wrapper | 13 # directory of a Chromium OS chroot. 30 # /path/to/chroot/build/x86-generic/usr/lib/pkgconfig/pkg.pc may have all paths 31 # relative to /path/to/chroot (i.e. prefix=/build/x86-generic/usr) instead of 32 # relative to /path/to/chroot/build/x86-generic (i.e prefix=/usr).
|
/external/chromium_org/build/linux/ |
pkg-config-wrapper | 13 # directory of a Chromium OS chroot. 50 # /path/to/chroot/build/x86-generic/usr/lib/pkgconfig/pkg.pc may have all paths 51 # relative to /path/to/chroot (i.e. prefix=/build/x86-generic/usr) instead of 52 # relative to /path/to/chroot/build/x86-generic (i.e prefix=/usr).
|
/external/libcap-ng/libcap-ng-0.7/ |
README | 6 if the headers match the kernel. IOW, if you have a chroot build system
|
/external/chromium_org/sandbox/linux/services/ |
credentials.cc | 102 // chroot() and chdir() to /proc/<tid>/fdinfo. 114 int chroot_ret = chroot(current_thread_fdinfo.c_str()); 116 PLOG(ERROR) << "Could not chroot"; 128 // chroot() to an empty dir that is "safe". To be safe, it must not contain 129 // any subdirectory (chroot-ing there would allow a chroot escape) and it must 133 // 2. We chroot to /proc/<tid>/fdinfo/ 244 // EPERM can happen if already in a chroot. EUSERS if too many nested
|
credentials_unittest.cc | 193 // We want the chroot to never have a subdirectory. A subdirectory 194 // could allow a chroot escape. 209 // are in a chroot.
|
credentials.h | 65 // The implementation currently uses chroot(2) and requires CAP_SYS_CHROOT.
|
/external/chromium_org/sandbox/linux/suid/client/ |
setuid_sandbox_client.h | 22 // 3. The renderer requests being chroot-ed through ChrootMe() and 30 // Ask the setuid helper over the setuid sandbox IPC channel to chroot() us
|
setuid_sandbox_client.cc | 125 PLOG(ERROR) << "Failed to write to chroot pipe"; 129 // We need to reap the chroot helper process in any event. 139 PLOG(ERROR) << "Failed to read from chroot pipe"; 144 LOG(ERROR) << "Error code reply from chroot helper";
|
/external/openssh/ |
README.privsep | 16 chroot(2) to "/var/empty" and change its privileges to the "sshd" user 33 privsep user and chroot directory: 35 --with-privsep-path=xxx Path for privilege separation chroot
|
sftp-server.0 | 48 sftp-server in a chroot configuration therefore requires that syslogd(8) 49 establish a logging socket inside the chroot directory.
|
sftp-server.8 | 103 in a chroot configuration therefore requires that 105 establish a logging socket inside the chroot directory.
|
platform.c | 167 * If we have a chroot directory, we set all creds except real 168 * uid which we will need for chroot. If we don't have a 169 * chroot directory, we don't override anything.
|
buildpkg.sh.in | 367 # Use chroot to handle PKG_INSTALL_ROOT 370 chroot="chroot \${PKG_INSTALL_ROOT}" 375 chroot=echo 407 \$chroot ${PATH_GROUPADD_PROG} \$sshdgid \$SSH_PRIVSEP_GROUP 420 \$chroot ${PATH_USERADD_PROG} -c 'SSHD PrivSep User' -s /bin/false -g $SSH_PRIVSEP_USER \$sshduid $SSH_PRIVSEP_USER 421 \$chroot ${PATH_PASSWD_PROG} -l $SSH_PRIVSEP_USER
|
/external/ipsec-tools/src/racoon/ |
localconf.h | 74 char *chroot; /* chroot path */ member in struct:localconf
|
/external/chromium_org/sandbox/linux/suid/ |
sandbox.c | 70 // We will chroot() to the helper's /proc/self directory. Anything there will 142 if (chroot(safedir)) 143 FatalError("Cannot chroot into /proc/ directory"); 146 FatalError("Cannot chdir to / after chroot");
|
/external/chromium_org/third_party/WebKit/Source/devtools/front_end/cm/ |
shell.js | 19 define('builtin', 'ab awk bash beep cat cc cd chown chmod chroot clear cp ' +
|
/external/e2fsprogs/debugfs/ |
debug_cmds.ct | 35 change_root_directory, chroot;
|
/external/tcpdump/ |
acconfig.h | 135 /* define if should chroot when dropping privileges */
|