X-Git-Url: http://git.linux-vserver.org/cgi-bin/gitweb.cgi?a=blobdiff_plain;f=util-vserver%2Fsrc%2Fcapchroot.c;h=16ece833081eacb5421dc39a2b7378232e593464;hb=c8a5f78c6350e9adae32fbcad8e4fbae95766604;hp=e3bdfa63385d38d6243c14ff84955b13aaa97c99;hpb=d97beaa2d2cbc77035a6df13488e457c7e21b9a3;p=util-vserver.git diff --git a/util-vserver/src/capchroot.c b/util-vserver/src/capchroot.c index e3bdfa6..16ece83 100644 --- a/util-vserver/src/capchroot.c +++ b/util-vserver/src/capchroot.c @@ -73,7 +73,7 @@ int main (int argc, char *argv[]) // and also a security flaw. The shared objects in the vserver // may be tweaked to get control of the root server ... getpwnam ("root"); - if (vc_chrootsafe (argv[dir]) == -1){ + if (chroot(argv[dir]) == -1){ fprintf (stderr,"Can't chroot to directory %s (%s)\n",argv[dir] ,strerror(errno)); }else{