blob: b6ef17d666c7f01356b6785eccd557d367377690 [file] [log] [blame]
/* chroot.c - Run command in new root directory.
*
* Copyright 2007 Rob Landley <rob@landley.net>
*
* TODO: The test for root is "==" so root can trivially escape a chroot by
* moving it below cwd, ala mkdir("sub"); chroot("sub"); chdir("../../../..")
* The container guys use pivot_root() to deal with this, which does actually
* edit mount tree. (New option? Kernel patch?)
USE_CHROOT(NEWTOY(chroot, "^<1", TOYFLAG_USR|TOYFLAG_SBIN))
config CHROOT
bool "chroot"
default y
help
usage: chroot NEWPATH [commandline...]
Run command within a new root directory. If no command, run /bin/sh.
*/
#include "toys.h"
void chroot_main(void)
{
char *binsh[] = {"/bin/sh", "-i", 0};
if (chdir(*toys.optargs) || chroot(".")) perror_exit_raw(*toys.optargs);
if (toys.optargs[1]) xexec(toys.optargs+1);
else xexec(binsh);
}