aboutsummaryrefslogtreecommitdiff
path: root/toys/other/chroot.c
blob: d791f34af815c003bc3c6793af3f600a88ba1a0b (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
/* chroot.c - Run command in new root directory.
 *
 * Copyright 2007 Rob Landley <rob@landley.net>
 *
 * TODO: The test for root is "==" so root can trivially escape a chroot by
 * moving it below cwd, ala mkdir("sub"); chroot("sub"); chdir("../../../..")
 * The container guys use pivot_root() to deal with this, which does actually
 * edit mount tree. (New option? Kernel patch?)

USE_CHROOT(NEWTOY(chroot, "^<1", TOYFLAG_USR|TOYFLAG_SBIN|TOYFLAG_ARGFAIL(125)))

config CHROOT
  bool "chroot"
  default y
  help
    usage: chroot NEWROOT [COMMAND [ARG...]]

    Run command within a new root directory. If no command, run /bin/sh.
*/

#include "toys.h"

void chroot_main(void)
{
  char *binsh[] = {"/bin/sh", "-i", 0};

  if (chdir(*toys.optargs) || chroot(".")) {
    toys.exitval = 125;
    perror_exit_raw(*toys.optargs);
  }
  if (toys.optargs[1]) xexec(toys.optargs+1);
  else xexec(binsh);
}