/macosx-10.9.5/tcl-102/tcl_ext/tclx/tclx/tests/ |
H A D | chroot.test | 2 # chroot.test 4 # Tests for the chroot command. 34 test chroot-1.1 {chroot tests} {unixOnly} { 35 list [catch {chroot} msg] $msg 36 } {1 {wrong # args: chroot path}} 38 test chroot-1.2 {chroot tests} {unixOnly} { 39 list [catch {chroot a b} msg] $msg 40 } {1 {wrong # args: chroot pat [all...] |
/macosx-10.9.5/postfix-252/postfix/src/util/ |
H A D | chroot_uid.c | 68 if (chroot(root_dir)) 69 msg_fatal("chroot(%s): %m", root_dir); 85 msg_info("chroot %s user %s",
|
/macosx-10.9.5/tcl-102/tcl_ext/tclvfs/tclvfs/library/template/ |
H A D | chrootvfs.tcl | 12 A chroot virtual filesystem. 14 This virual filesystem has an effect similar to a "chroot" command; it makes the named existing directory appear 17 This vfs does not block access by the "exec" command to the real filesystem outside the chroot directory, 23 processes, and mounted volumes besides the volume on which the chroot directory resides are aliased so 24 that they act as mirrors of the chroot directory. 31 Usage: mount ?-volume? <existing "chroot" directory> <virtual directory> 39 mount -volume /var/www/htdocs chroot:// 44 namespace eval ::vfs::template::chroot { 47 package provide vfs::template::chroot 1.5.2 70 set err [catch {set rv [uplevel ::vfs::template::chroot [all...] |
/macosx-10.9.5/tcl-102/tcl_ext/tclx/tclx/unix/ |
H A D | tclXunixCmds.c | 38 * Implements the TCL chroot command: 39 * chroot path 61 if (chroot (chrootString) < 0) { 118 "chroot",
|
/macosx-10.9.5/postfix-252/postfix/src/global/ |
H A D | pipe_command.c | 183 char *chroot; /* root directory */ member in struct:pipe_args 212 args->chroot = 0; 268 args->chroot = va_arg(ap, char *); 476 * In order to chroot it is necessary to switch euid back to root. 477 * Right after chroot we call set_ugid() so all privileges will be 486 if (args.chroot) { 488 chroot_uid(args.chroot, (char *) 0);
|
/macosx-10.9.5/Heimdal-323.92.1/kdc/ |
H A D | main.c | 67 errx(1, "no running as root, can't switch user/chroot"); 69 if (chroot_string && chroot(chroot_string) != 0) 70 errx(1, "chroot(%s)", "chroot_string failed");
|
/macosx-10.9.5/shell_cmds-175/chroot/ |
H A D | chroot.c | 42 static char sccsid[] = "@(#)chroot.c 8.1 (Berkeley) 6/9/93"; 44 __RCSID("$NetBSD: chroot.c,v 1.7 1998/10/06 03:47:51 mrg Exp $"); 150 if (chdir(argv[0]) || chroot(".")) 175 (void)fprintf(stderr, "usage: chroot [-g group] [-G group,group,...] "
|
/macosx-10.9.5/OpenSSH-186/openssh/ |
H A D | buildpkg.sh.in | 367 # Use chroot to handle PKG_INSTALL_ROOT 370 chroot="chroot \${PKG_INSTALL_ROOT}" 375 chroot=echo 407 \$chroot ${PATH_GROUPADD_PROG} \$sshdgid \$SSH_PRIVSEP_GROUP 420 \$chroot ${PATH_USERADD_PROG} -c 'SSHD PrivSep User' -s /bin/false -g $SSH_PRIVSEP_USER \$sshduid $SSH_PRIVSEP_USER 421 \$chroot ${PATH_PASSWD_PROG} -l $SSH_PRIVSEP_USER
|
/macosx-10.9.5/postfix-252/postfix/src/master/ |
H A D | master_ent.c | 255 int chroot; /* passed on to child */ local 471 chroot = get_bool_ent(&bufp, "chroot", "y"); 540 if (chroot)
|
/macosx-10.9.5/bind9-45.100/bind9/contrib/nslint-2.1a3/lbl/ |
H A D | os-sunos4.h | 60 int chroot(const char *);
|
/macosx-10.9.5/bind9-45.100/bind9/lib/isc/unix/ |
H A D | dir.c | 175 if (chroot(dirname) < 0 || chdir("/") < 0)
|
/macosx-10.9.5/libpcap-42/libpcap/lbl/ |
H A D | os-sunos4.h | 60 int chroot(const char *);
|
/macosx-10.9.5/ntp-88/lib/isc/unix/ |
H A D | dir.c | 175 if (chroot(dirname) < 0 || chdir("/") < 0)
|
/macosx-10.9.5/tcpdump-56/tcpdump/lbl/ |
H A D | os-sunos4.h | 60 int chroot(const char *);
|
/macosx-10.9.5/xnu-2422.115.4/bsd/man/man2/ |
H A D | Makefile | 35 chroot.2 \
|
/macosx-10.9.5/rsync-42/rsync/testsuite/ |
H A D | rsync.fns | 233 use chroot = no
|
/macosx-10.9.5/swig-10/Lib/perl5/ |
H A D | perlkw.swg | 125 PERLBN(chroot);
|
/macosx-10.9.5/ruby-104/ruby/test/ruby/ |
H A D | test_dir.rb | 139 ) { Dir.chroot(File.join(@nodir, "")) }
|
/macosx-10.9.5/apache-786.1/httpd/os/unix/ |
H A D | unixd.c | 124 "Cannot chroot when not started as root"); 132 if (chroot(unixd_config.chroot_dir) != 0) { 134 "Can't chroot to %s", unixd_config.chroot_dir);
|
/macosx-10.9.5/libarchive-29/libarchive/tar/ |
H A D | read.c | 226 if (chroot(".") != 0) 227 lafe_errc(1, errno, "Can't chroot to \".\""); 230 "chroot isn't supported on this platform");
|
/macosx-10.9.5/network_cmds-433/kdumpd.tproj/ |
H A D | kdumpd.c | 268 /* Must get this before chroot because /etc might go away */ 273 if (chroot(chroot_dir)) { 274 syslog(LOG_ERR, "chroot: %s: %m", chroot_dir);
|
/macosx-10.9.5/llvmCore-3425.0.33/lib/Support/Unix/ |
H A D | Path.inc | 343 // /proc is not always mounted under Linux (chroot for example).
|
/macosx-10.9.5/Libc-997.90.3/include/ |
H A D | unistd.h | 599 int chroot(const char *) __POSIX_C_DEPRECATED(199506L);
|
/macosx-10.9.5/OpenLDAP-491.1/OpenLDAP/servers/slapd/ |
H A D | main.c | 346 "\t-r directory\tSandbox directory to chroot to\n" 768 if ( chroot( sandbox ) ) { 769 perror("chroot");
|
/macosx-10.9.5/WebKit2-7537.78.2/Shared/linux/SandboxProcess/ |
H A D | SandboxEnvironmentLinux.cpp | 75 // from WebProcess to perform the chroot(). If the operation was successful the function 116 if (chroot(sandboxDirectory) == -1) { 188 // Child process: we start the chroot helper which waits for the "ChrootMe"
|