X-Git-Url: http://git.linux-vserver.org/cgi-bin/gitweb.cgi?a=blobdiff_plain;f=util-vserver%2Fsrc%2Fcapchroot.c;h=45a6c8096459e3be2ec61a45ba0bf515523735bd;hb=86a23427cca76a5a9befd60c85535a0e738bc3c6;hp=740a69c2ab95db1d0a21bc3b8dbf3cf318637e79;hpb=9cde6b2e1f86d390b0730cb5339eb4920d631886;p=util-vserver.git diff --git a/util-vserver/src/capchroot.c b/util-vserver/src/capchroot.c index 740a69c..45a6c80 100644 --- a/util-vserver/src/capchroot.c +++ b/util-vserver/src/capchroot.c @@ -37,7 +37,6 @@ #include #include -#include "linuxcaps.h" #include "vserver.h" int main (int argc, char *argv[]) @@ -74,7 +73,7 @@ int main (int argc, char *argv[]) // and also a security flaw. The shared objects in the vserver // may be tweaked to get control of the root server ... getpwnam ("root"); - if (vc_chrootsafe (argv[dir]) == -1){ + if (chroot(argv[dir]) == -1){ fprintf (stderr,"Can't chroot to directory %s (%s)\n",argv[dir] ,strerror(errno)); }else{ @@ -82,7 +81,7 @@ int main (int argc, char *argv[]) int cmd = dir + 1; if (nochroot){ - vc_new_s_context (-2,1<