switch_root.c 7.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208
  1. /* vi: set sw=4 ts=4: */
  2. /* Copyright 2005 Rob Landley <rob@landley.net>
  3. *
  4. * Switch from rootfs to another filesystem as the root of the mount tree.
  5. *
  6. * Licensed under GPL version 2, see file LICENSE in this tarball for details.
  7. */
  8. #include <sys/vfs.h>
  9. #include <sys/mount.h>
  10. #include "libbb.h"
  11. // Make up for header deficiencies
  12. #ifndef RAMFS_MAGIC
  13. # define RAMFS_MAGIC ((unsigned)0x858458f6)
  14. #endif
  15. #ifndef TMPFS_MAGIC
  16. # define TMPFS_MAGIC ((unsigned)0x01021994)
  17. #endif
  18. #ifndef MS_MOVE
  19. # define MS_MOVE 8192
  20. #endif
  21. // Recursively delete contents of rootfs
  22. static void delete_contents(const char *directory, dev_t rootdev)
  23. {
  24. DIR *dir;
  25. struct dirent *d;
  26. struct stat st;
  27. // Don't descend into other filesystems
  28. if (lstat(directory, &st) || st.st_dev != rootdev)
  29. return;
  30. // Recursively delete the contents of directories
  31. if (S_ISDIR(st.st_mode)) {
  32. dir = opendir(directory);
  33. if (dir) {
  34. while ((d = readdir(dir))) {
  35. char *newdir = d->d_name;
  36. // Skip . and ..
  37. if (DOT_OR_DOTDOT(newdir))
  38. continue;
  39. // Recurse to delete contents
  40. newdir = concat_path_file(directory, newdir);
  41. delete_contents(newdir, rootdev);
  42. free(newdir);
  43. }
  44. closedir(dir);
  45. // Directory should now be empty, zap it
  46. rmdir(directory);
  47. }
  48. } else {
  49. // It wasn't a directory, zap it
  50. unlink(directory);
  51. }
  52. }
  53. int switch_root_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
  54. int switch_root_main(int argc UNUSED_PARAM, char **argv)
  55. {
  56. char *newroot, *console = NULL;
  57. struct stat st;
  58. struct statfs stfs;
  59. dev_t rootdev;
  60. // Parse args (-c console)
  61. opt_complementary = "-2"; // minimum 2 params
  62. getopt32(argv, "+c:", &console); // '+': stop at first non-option
  63. argv += optind;
  64. newroot = *argv++;
  65. // Change to new root directory and verify it's a different fs
  66. xchdir(newroot);
  67. xstat("/", &st);
  68. rootdev = st.st_dev;
  69. xstat(".", &st);
  70. if (st.st_dev == rootdev || getpid() != 1) {
  71. // Show usage, it says new root must be a mountpoint
  72. // and we must be PID 1
  73. bb_show_usage();
  74. }
  75. // Additional sanity checks: we're about to rm -rf /, so be REALLY SURE
  76. // we mean it. I could make this a CONFIG option, but I would get email
  77. // from all the people who WILL destroy their filesystems.
  78. statfs("/", &stfs); // this never fails
  79. if (stat("/init", &st) != 0 || !S_ISREG(st.st_mode)
  80. || ((unsigned)stfs.f_type != RAMFS_MAGIC
  81. && (unsigned)stfs.f_type != TMPFS_MAGIC)
  82. ) {
  83. bb_error_msg_and_die("not rootfs");
  84. }
  85. // Zap everything out of rootdev
  86. delete_contents("/", rootdev);
  87. // Overmount / with newdir and chroot into it
  88. if (mount(".", "/", NULL, MS_MOVE, NULL)) {
  89. // For example, fails when newroot is not a mountpoint
  90. bb_perror_msg_and_die("error moving root");
  91. }
  92. xchroot(".");
  93. // The chdir is needed to recalculate "." and ".." links
  94. xchdir("/");
  95. // If a new console specified, redirect stdin/stdout/stderr to it
  96. if (console) {
  97. close(0);
  98. xopen(console, O_RDWR);
  99. xdup2(0, 1);
  100. xdup2(0, 2);
  101. }
  102. // Exec real init
  103. execv(argv[0], argv);
  104. bb_perror_msg_and_die("can't execute '%s'", argv[0]);
  105. }
  106. /*
  107. From: Rob Landley <rob@landley.net>
  108. Date: Tue, Jun 16, 2009 at 7:47 PM
  109. Subject: Re: switch_root...
  110. ...
  111. ...
  112. ...
  113. If you're _not_ running out of init_ramfs (if for example you're using initrd
  114. instead), you probably shouldn't use switch_root because it's the wrong tool.
  115. Basically what the sucker does is something like the following shell script:
  116. find / -xdev | xargs rm -rf
  117. cd "$1"
  118. shift
  119. mount --move . /
  120. exec chroot . "$@"
  121. There are a couple reasons that won't work as a shell script:
  122. 1) If you delete the commands out of your $PATH, your shell scripts can't run
  123. more commands, but you can't start using dynamically linked _new_ commands
  124. until after you do the chroot because the path to the dynamic linker is wrong.
  125. So there's a step that needs to be sort of atomic but can't be as a shell
  126. script. (You can work around this with static linking or very carefully laid
  127. out paths and sequencing, but it's brittle, ugly, and non-obvious.)
  128. 2) The "find | rm" bit will acually delete everything because the mount points
  129. still show up (even if their contents don't), and rm -rf will then happily zap
  130. that. So the first line is an oversimplification of what you need to do _not_
  131. to descend into other filesystems and delete their contents.
  132. The reason we do this is to free up memory, by the way. Since initramfs is a
  133. ramfs, deleting its contents frees up the memory it uses. (We leave it with
  134. one remaining dentry for the new mount point, but that's ok.)
  135. Note that you cannot ever umount rootfs, for approximately the same reason you
  136. can't kill PID 1. The kernel tracks mount points as a doubly linked list, and
  137. the pointer to the start/end of that list always points to an entry that's
  138. known to be there (rootfs), so it never has to worry about moving that pointer
  139. and it never has to worry about the list being empty. (Back around 2.6.13
  140. there _was_ a bug that let you umount rootfs, and the system locked hard the
  141. instant you did so endlessly looping to find the end of the mount list and
  142. never stopping. They fixed it.)
  143. Oh, and the reason we mount --move _and_ do the chroot is due to the way "/"
  144. works. Each process has two special symlinks, ".", and "/". Each of them
  145. points to the dentry of a directory, and give you a location paths can start
  146. from. (Historically ".." was also special, because you could enter a
  147. directory via a symlink so backing out to the directory you came from doesn't
  148. necessarily mean the one physically above where "." points to. These days I
  149. think it's just handed off to the filesystem.)
  150. Anyway, path resolution starts with "." or "/" (although the "./" at the start
  151. of the path may be implicit), meaning it's relative to one of those two
  152. directories. Your current directory, and your current root directory. The
  153. chdir() syscall changes where "." points to, and the chroot() syscall changes
  154. where "/" points to. (Again, both are per-process which is why chroot only
  155. affects your current process and its child processes.)
  156. Note that chroot() does _not_ change where "." points to, and back before they
  157. put crazy security checks into the kernel your current directory could be
  158. somewhere you could no longer access after the chroot. (The command line
  159. chroot does a cd as well, the chroot _syscall_ is what I'm talking about.)
  160. The reason mounting something new over / has no obvious effect is the same
  161. reason mounting something over your current directory has no obvious effect:
  162. the . and / links aren't recalculated after a mount, so they still point to
  163. the same dentry they did before, even if that dentry is no longer accessible
  164. by other means. Note that "cd ." is a NOP, and "chroot /" is a nop; both look
  165. up the cached dentry and set it right back. They don't re-parse any paths,
  166. because they're what all paths your process uses would be relative to.
  167. That's why the careful sequencing above: we cd into the new mount point before
  168. we do the mount --move. Moving the mount point would otherwise make it
  169. totally inaccessible to is because cd-ing to the old path wouldn't give it to
  170. us anymore, and cd "/" just gives us the cached dentry from when the process
  171. was created (in this case the old initramfs one). But the "." symlink gives
  172. us the dentry of the filesystem we just moved, so we can then "chroot ." to
  173. copy that dentry to "/" and get the new filesystem. If we _didn't_ save that
  174. dentry in "." we couldn't get it back after the mount --move.
  175. (Yes, this is all screwy and I had to email questions to Linus Torvalds to get
  176. it straight myself. I keep meaning to write up a "how mount actually works"
  177. document someday...)
  178. */