Searched refs:chroot (Results 1 - 25 of 91) sorted by path

1234

/freebsd-11-stable/contrib/gcc/
H A Dsys-protos.h160 extern int chroot(const char *);
/freebsd-11-stable/contrib/libarchive/tar/
H A Dread.c239 if (chroot(".") != 0)
240 lafe_errc(1, errno, "Can't chroot to \".\"");
243 "chroot isn't supported on this platform");
/freebsd-11-stable/contrib/libpcap/lbl/
H A Dos-sunos4.h58 int chroot(const char *);
/freebsd-11-stable/contrib/netbsd-tests/kernel/
H A Dt_ptrace.c166 FORKEE_ASSERT(chroot(buf) == 0);
/freebsd-11-stable/contrib/netbsd-tests/lib/libc/sys/
H A Dt_chroot.c49 atf_tc_set_md_var(tc, "descr", "A basic test of chroot(2)");
71 if (chroot(buf) != 0)
76 if (chroot("/root") != -1)
96 atf_tc_fail("chroot(2) failed");
104 atf_tc_fail("chroot(2) did not change the root directory");
113 atf_tc_set_md_var(tc, "descr", "Test error conditions of chroot(2)");
124 ATF_REQUIRE_ERRNO(ENAMETOOLONG, chroot(buf) == -1);
127 ATF_REQUIRE_ERRNO(EFAULT, chroot((void *)-1) == -1);
130 ATF_REQUIRE_ERRNO(ENOENT, chroot("/a/b/c/d/e/f/g/h/i/j") == -1);
136 atf_tc_set_md_var(tc, "descr", "Test permissions with chroot(
[all...]
/freebsd-11-stable/contrib/netbsd-tests/net/ndp/
H A Dt_ra.sh55 atf_check -s exit:0 mkdir -p /rump/var/chroot/rtadvd
/freebsd-11-stable/contrib/ntp/lib/isc/unix/
H A Ddir.c180 if (chroot(dirname) < 0 || chdir("/") < 0)
/freebsd-11-stable/contrib/openbsm/bin/auditdistd/
H A Dsandbox.c152 if (chroot(pw->pw_dir) == -1) {
223 capsicum ? "capsicum+" : "", jailed ? "jail" : "chroot");
/freebsd-11-stable/contrib/opie/
H A Dopieftpd.c567 /* open wtmp before chroot */
574 /* We MUST do a chdir() after the chroot. Otherwise the old current
576 if (chroot(pw->pw_dir) < 0 || chdir("/") < 0) {
1579 anonymous ftp's that chroot and can't do it later. */
/freebsd-11-stable/contrib/pf/ftp-proxy/
H A Dftp-proxy.c280 if (chroot(CHROOT_DIR) != 0 || chdir("/") != 0 ||
/freebsd-11-stable/contrib/pf/pflogd/
H A Dprivsep.c100 if (chroot(pw->pw_dir) != 0)
101 err(1, "unable to chroot");
/freebsd-11-stable/contrib/pf/tftp-proxy/
H A Dtftp-proxy.c119 if (chroot(CHROOT_DIR) || chdir("/")) {
120 syslog(LOG_ERR, "chroot %s: %m", CHROOT_DIR);
/freebsd-11-stable/contrib/sendmail/libsm/
H A Dmpeix.c32 ** CHROOT -- dummy chroot() function
34 ** The MPE documentation for sendmail says that chroot-based
35 ** functionality is not implemented because MPE lacks chroot. But
36 ** rather than mucking around with all the sendmail calls to chroot,
38 ** case a sendmail user attempts to enable chroot-based functionality.
48 chroot(path) function
/freebsd-11-stable/contrib/tcpdump/lbl/
H A Dos-sunos4.h58 int chroot(const char *);
/freebsd-11-stable/crypto/heimdal/appl/ftp/ftpd/
H A Dftpd.c336 * necessary for anonymous ftp's that chroot and can't do it later.
502 reply(530, "Can't change user from chroot user.");
712 /* open wtmp before chroot */
719 * We MUST do a chdir() after the chroot. Otherwise
723 if (chroot(pw->pw_dir) < 0 || chdir("/") < 0) {
728 if (chroot(pw->pw_dir) < 0 || chdir("/") < 0) {
1799 * failes miserably when running chroot
/freebsd-11-stable/crypto/heimdal/kdc/
H A Dmain.c69 errx(1, "no running as root, can't switch user/chroot");
71 if (chroot_string && chroot(chroot_string) != 0)
72 errx(1, "chroot(%s)", "chroot_string failed");
/freebsd-11-stable/crypto/openssh/
H A Dbuildpkg.sh.in367 # Use chroot to handle PKG_INSTALL_ROOT
370 chroot="chroot \${PKG_INSTALL_ROOT}"
375 chroot=echo
407 \$chroot ${PATH_GROUPADD_PROG} \$sshdgid \$SSH_PRIVSEP_GROUP
420 \$chroot ${PATH_USERADD_PROG} -c 'SSHD PrivSep User' -s /bin/false -g $SSH_PRIVSEP_USER \$sshduid $SSH_PRIVSEP_USER
421 \$chroot ${PATH_PASSWD_PROG} -l $SSH_PRIVSEP_USER
H A Dsession.c1302 fatal("chroot path does not begin at root");
1304 fatal("chroot path too long");
1325 fatal("bad ownership or modes for chroot "
1329 fatal("chroot path %s\"%s\" is not a directory",
1335 fatal("Unable to chdir to chroot path \"%s\": "
1337 if (chroot(path) == -1)
1338 fatal("chroot(\"%s\"): %s", path, strerror(errno));
1340 fatal("%s: chdir(/) after chroot: %s",
1386 /* Make sure we don't attempt to chroot again */
1405 * In a chroot environmen
[all...]
H A Dsshd.c567 if (chroot(_PATH_PRIVSEP_CHROOT_DIR) == -1)
568 fatal("chroot(\"%s\"): %s", _PATH_PRIVSEP_CHROOT_DIR,
1992 * before privsep chroot().
/freebsd-11-stable/crypto/openssh/regress/
H A DMakefile46 sftp-chroot \
H A Dsftp-chroot.sh1 # $OpenBSD: sftp-chroot.sh,v 1.5 2016/09/26 21:34:38 bluhm Exp $
4 tid="sftp in chroot"
15 if ! $OBJ/check-perm -m chroot "$CHROOT" ; then
/freebsd-11-stable/lib/libc/sys/
H A DMakefile.inc152 chroot.2 \
/freebsd-11-stable/lib/libpam/modules/pam_chroot/
H A Dpam_chroot.c81 "%s has no chroot directory", user);
89 if (chroot(dir) == -1) {
90 openpam_log(PAM_LOG_ERROR, "chroot(): %m");
/freebsd-11-stable/libexec/tftpd/
H A Dtftpd.c290 * (This needs to be done before the chroot())
364 /* Must get this before chroot because /etc might go away */
369 if (chroot(chroot_dir)) {
370 tftp_log(LOG_ERR, "chroot: %s: %s",
/freebsd-11-stable/release/tools/
H A Dazure.conf17 chroot ${DESTDIR} ln -s /usr/local/sbin/waagent /usr/sbin/waagent
18 chroot ${DESTDIR} /usr/local/sbin/waagent -verbose -install
19 yes | chroot ${DESTDIR} /usr/local/sbin/waagent -deprovision

Completed in 240 milliseconds

1234