diff --git a/man/run0.xml b/man/run0.xml index d44743620e..01e6b4b9f7 100644 --- a/man/run0.xml +++ b/man/run0.xml @@ -302,6 +302,15 @@ + + + + Execute the run0 session in the same root directory that the + run0 command is executed in. + + + + diff --git a/src/run/run.c b/src/run/run.c index 1286ae176e..d1202632ac 100644 --- a/src/run/run.c +++ b/src/run/run.c @@ -899,6 +899,7 @@ static int parse_argv_sudo_mode(int argc, char *argv[]) { ARG_AREA, ARG_VIA_SHELL, ARG_EMPOWER, + ARG_SAME_ROOT_DIR, }; /* If invoked as "run0" binary, let's expose a more sudo-like interface. We add various extensions @@ -929,6 +930,7 @@ static int parse_argv_sudo_mode(int argc, char *argv[]) { { "lightweight", required_argument, NULL, ARG_LIGHTWEIGHT }, { "area", required_argument, NULL, ARG_AREA }, { "empower", no_argument, NULL, ARG_EMPOWER }, + { "same-root-dir", no_argument, NULL, ARG_SAME_ROOT_DIR }, {}, }; @@ -1072,6 +1074,13 @@ static int parse_argv_sudo_mode(int argc, char *argv[]) { arg_empower = true; break; + case ARG_SAME_ROOT_DIR: + r = free_and_strdup_warn(&arg_root_directory, "/"); + if (r < 0) + return r; + + break; + case '?': return -EINVAL;