Home | History | Annotate | Download | only in other
      1 /* chroot.c - Run command in new root directory.
      2  *
      3  * Copyright 2007 Rob Landley <rob (at) landley.net>
      4  *
      5  * TODO: The test for root is "==" so root can trivially escape a chroot by
      6  * moving it below cwd, ala mkdir("sub"); chroot("sub"); chdir("../../../..")
      7  * The container guys use pivot_root() to deal with this, which does actually
      8  * edit mount tree. (New option? Kernel patch?)
      9 
     10 USE_CHROOT(NEWTOY(chroot, "^<1", TOYFLAG_USR|TOYFLAG_SBIN))
     11 
     12 config CHROOT
     13   bool "chroot"
     14   default y
     15   help
     16     usage: chroot NEWPATH [commandline...]
     17 
     18     Run command within a new root directory. If no command, run /bin/sh.
     19 */
     20 
     21 #include "toys.h"
     22 
     23 void chroot_main(void)
     24 {
     25   char *binsh[] = {"/bin/sh", "-i", 0};
     26 
     27   if (chdir(*toys.optargs) || chroot(".")) perror_exit_raw(*toys.optargs);
     28   if (toys.optargs[1]) xexec(toys.optargs+1);
     29   else xexec(binsh);
     30 }
     31