| /* chroot.c - Run command in new root directory. |
| * |
| * Copyright 2007 Rob Landley <rob@landley.net> |
| * |
| * TODO: The test for root is "==" so root can trivially escape a chroot by |
| * moving it below cwd, ala mkdir("sub"); chroot("sub"); chdir("../../../..") |
| * The container guys use pivot_root() to deal with this, which does actually |
| * edit mount tree. (New option? Kernel patch?) |
| |
| USE_CHROOT(NEWTOY(chroot, "^<1", TOYFLAG_USR|TOYFLAG_SBIN)) |
| |
| config CHROOT |
| bool "chroot" |
| default y |
| help |
| usage: chroot NEWPATH [commandline...] |
| |
| Run command within a new root directory. If no command, run /bin/sh. |
| */ |
| |
| #include "toys.h" |
| |
| void chroot_main(void) |
| { |
| char *binsh[] = {"/bin/sh", "-i", 0}; |
| |
| if (chdir(*toys.optargs) || chroot(".")) perror_exit_raw(*toys.optargs); |
| if (toys.optargs[1]) xexec(toys.optargs+1); |
| else xexec(binsh); |
| } |