X-Git-Url: http://git.linux-vserver.org/cgi-bin/gitweb.cgi?a=blobdiff_plain;f=util-vserver%2Fsrc%2Fcapchroot.c;h=45a6c8096459e3be2ec61a45ba0bf515523735bd;hb=71500ccdf5e649c3ce24b9e9cf7e61fdfd114a69;hp=9220f9be1da64638f53173f4b152fceade7826f8;hpb=ef10c2c2f673ed59eb66f782989e4ed586f09c60;p=util-vserver.git diff --git a/util-vserver/src/capchroot.c b/util-vserver/src/capchroot.c index 9220f9b..45a6c80 100644 --- a/util-vserver/src/capchroot.c +++ b/util-vserver/src/capchroot.c @@ -73,7 +73,7 @@ int main (int argc, char *argv[]) // and also a security flaw. The shared objects in the vserver // may be tweaked to get control of the root server ... getpwnam ("root"); - if (vc_chrootsafe (argv[dir]) == -1){ + if (chroot(argv[dir]) == -1){ fprintf (stderr,"Can't chroot to directory %s (%s)\n",argv[dir] ,strerror(errno)); }else{