blob: fe9ab68d0d5e76b8231012c94dea1e546a0104f5 [file] [log] [blame]
"Robert P. J. Day"63fc1a92006-07-02 19:47:05 +00001/* vi: set sw=4 ts=4: */
Rob Landley3ea05d32006-03-21 18:20:40 +00002/* Copyright 2005 Rob Landley <rob@landley.net>
3 *
4 * Switch from rootfs to another filesystem as the root of the mount tree.
5 *
Denys Vlasenko0ef64bd2010-08-16 20:14:46 +02006 * Licensed under GPLv2, see file LICENSE in this source tree.
Rob Landley3ea05d32006-03-21 18:20:40 +00007 */
Denys Vlasenkodd898c92016-11-23 11:46:32 +01008//config:config SWITCH_ROOT
Denys Vlasenko4eed2c62017-07-18 22:01:24 +02009//config: bool "switch_root (5.2 kb)"
Denys Vlasenkodd898c92016-11-23 11:46:32 +010010//config: default y
11//config: select PLATFORM_LINUX
12//config: help
Denys Vlasenko72089cf2017-07-21 09:50:55 +020013//config: The switch_root utility is used from initramfs to select a new
14//config: root device. Under initramfs, you have to use this instead of
15//config: pivot_root. (Stop reading here if you don't care why.)
Denys Vlasenkodd898c92016-11-23 11:46:32 +010016//config:
Denys Vlasenko72089cf2017-07-21 09:50:55 +020017//config: Booting with initramfs extracts a gzipped cpio archive into rootfs
18//config: (which is a variant of ramfs/tmpfs). Because rootfs can't be moved
19//config: or unmounted*, pivot_root will not work from initramfs. Instead,
20//config: switch_root deletes everything out of rootfs (including itself),
21//config: does a mount --move that overmounts rootfs with the new root, and
22//config: then execs the specified init program.
Denys Vlasenkodd898c92016-11-23 11:46:32 +010023//config:
Denys Vlasenko72089cf2017-07-21 09:50:55 +020024//config: * Because the Linux kernel uses rootfs internally as the starting
25//config: and ending point for searching through the kernel's doubly linked
26//config: list of active mount points. That's why.
Denys Vlasenkodd898c92016-11-23 11:46:32 +010027
28//applet:IF_SWITCH_ROOT(APPLET(switch_root, BB_DIR_SBIN, BB_SUID_DROP))
Denys Vlasenko200bcc82017-08-21 19:30:01 +020029// APPLET_ODDNAME:name main location suid_type help
30//applet:IF_RUN_INIT( APPLET_ODDNAME(run-init, switch_root, BB_DIR_SBIN, BB_SUID_DROP, run_init))
Denys Vlasenkodd898c92016-11-23 11:46:32 +010031
32//kbuild:lib-$(CONFIG_SWITCH_ROOT) += switch_root.o
Denys Vlasenko200bcc82017-08-21 19:30:01 +020033//kbuild:lib-$(CONFIG_RUN_INIT) += switch_root.o
Pere Orga5bc8c002011-04-11 03:29:49 +020034
35//usage:#define switch_root_trivial_usage
Denys Vlasenko200bcc82017-08-21 19:30:01 +020036//usage: "[-c CONSOLE_DEV] NEW_ROOT NEW_INIT [ARGS]"
Pere Orga5bc8c002011-04-11 03:29:49 +020037//usage:#define switch_root_full_usage "\n\n"
38//usage: "Free initramfs and switch to another root fs:\n"
39//usage: "chroot to NEW_ROOT, delete all in /, move NEW_ROOT to /,\n"
40//usage: "execute NEW_INIT. PID must be 1. NEW_ROOT must be a mountpoint.\n"
Pere Orga5bc8c002011-04-11 03:29:49 +020041//usage: "\n -c DEV Reopen stdio to DEV after switch"
42
Denys Vlasenko200bcc82017-08-21 19:30:01 +020043//usage:#define run_init_trivial_usage
44//usage: "[-d CAP,CAP...] [-c CONSOLE_DEV] NEW_ROOT NEW_INIT [ARGS]"
45//usage:#define run_init_full_usage "\n\n"
46//usage: "Free initramfs and switch to another root fs:\n"
47//usage: "chroot to NEW_ROOT, delete all in /, move NEW_ROOT to /,\n"
48//usage: "execute NEW_INIT. PID must be 1. NEW_ROOT must be a mountpoint.\n"
49//usage: "\n -c DEV Reopen stdio to DEV after switch"
50//usage: "\n -d CAPS Drop capabilities"
51
Rob Landley0f34a822005-10-27 22:55:50 +000052#include <sys/vfs.h>
Denys Vlasenkoda49f582009-07-08 02:58:38 +020053#include <sys/mount.h>
Denys Vlasenko200bcc82017-08-21 19:30:01 +020054#if ENABLE_RUN_INIT
55# include <sys/prctl.h>
56# include <linux/capability.h>
57// #include <sys/capability.h>
58// This header is in libcap, but the functions are in libc.
59// Comment in the header says this above capset/capget:
60/* system calls - look to libc for function to system call mapping */
61extern int capset(cap_user_header_t header, cap_user_data_t data);
62extern int capget(cap_user_header_t header, const cap_user_data_t data);
63// so for bbox, let's just repeat the declarations.
64// This way, libcap needs not be installed in build environment.
65#endif
66
Denys Vlasenkoda49f582009-07-08 02:58:38 +020067#include "libbb.h"
Denys Vlasenko200bcc82017-08-21 19:30:01 +020068
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +000069// Make up for header deficiencies
Rob Landley0f34a822005-10-27 22:55:50 +000070#ifndef RAMFS_MAGIC
Denys Vlasenkoa5bdbe12009-06-17 14:03:24 +020071# define RAMFS_MAGIC ((unsigned)0x858458f6)
Rob Landley0f34a822005-10-27 22:55:50 +000072#endif
Rob Landley0f34a822005-10-27 22:55:50 +000073#ifndef TMPFS_MAGIC
Denys Vlasenkoa5bdbe12009-06-17 14:03:24 +020074# define TMPFS_MAGIC ((unsigned)0x01021994)
Rob Landley0f34a822005-10-27 22:55:50 +000075#endif
Rob Landley0f34a822005-10-27 22:55:50 +000076#ifndef MS_MOVE
Denys Vlasenkoa5bdbe12009-06-17 14:03:24 +020077# define MS_MOVE 8192
Rob Landley0f34a822005-10-27 22:55:50 +000078#endif
79
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +000080// Recursively delete contents of rootfs
Denis Vlasenko39acf452008-07-11 23:44:50 +000081static void delete_contents(const char *directory, dev_t rootdev)
Rob Landley0f34a822005-10-27 22:55:50 +000082{
83 DIR *dir;
84 struct dirent *d;
85 struct stat st;
86
87 // Don't descend into other filesystems
Denis Vlasenko39acf452008-07-11 23:44:50 +000088 if (lstat(directory, &st) || st.st_dev != rootdev)
89 return;
Rob Landley0f34a822005-10-27 22:55:50 +000090
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +000091 // Recursively delete the contents of directories
Rob Landley0f34a822005-10-27 22:55:50 +000092 if (S_ISDIR(st.st_mode)) {
Denis Vlasenko51742f42007-04-12 00:32:05 +000093 dir = opendir(directory);
94 if (dir) {
Rob Landley0f34a822005-10-27 22:55:50 +000095 while ((d = readdir(dir))) {
Denis Vlasenko51742f42007-04-12 00:32:05 +000096 char *newdir = d->d_name;
Rob Landley0f34a822005-10-27 22:55:50 +000097
98 // Skip . and ..
Denis Vlasenko39acf452008-07-11 23:44:50 +000099 if (DOT_OR_DOTDOT(newdir))
Rob Landley0f34a822005-10-27 22:55:50 +0000100 continue;
Tim Rikerc1ef7bd2006-01-25 00:08:53 +0000101
Rob Landley0f34a822005-10-27 22:55:50 +0000102 // Recurse to delete contents
Denis Vlasenko39acf452008-07-11 23:44:50 +0000103 newdir = concat_path_file(directory, newdir);
104 delete_contents(newdir, rootdev);
105 free(newdir);
Rob Landley0f34a822005-10-27 22:55:50 +0000106 }
107 closedir(dir);
Tim Rikerc1ef7bd2006-01-25 00:08:53 +0000108
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +0000109 // Directory should now be empty, zap it
Rob Landley5d84c232005-12-20 17:25:51 +0000110 rmdir(directory);
Rob Landley0f34a822005-10-27 22:55:50 +0000111 }
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +0000112 } else {
113 // It wasn't a directory, zap it
114 unlink(directory);
115 }
Rob Landley0f34a822005-10-27 22:55:50 +0000116}
117
Denys Vlasenko200bcc82017-08-21 19:30:01 +0200118#if ENABLE_RUN_INIT
119DEFINE_STRUCT_CAPS;
120
121static void drop_capset(int cap_idx)
122{
123 struct caps caps;
124
125 /* Get the current capability mask */
126 getcaps(&caps);
127
128 /* Drop the bit */
129 caps.data[CAP_TO_INDEX(cap_idx)].inheritable &= ~CAP_TO_MASK(cap_idx);
130
131 /* And drop the capability. */
132 if (capset(&caps.header, caps.data) != 0)
133 bb_perror_msg_and_die("capset");
134}
135
136static void drop_bounding_set(int cap_idx)
137{
138 int ret;
139
140 ret = prctl(PR_CAPBSET_READ, cap_idx, 0, 0, 0);
141 if (ret < 0)
142 bb_perror_msg_and_die("prctl: %s", "PR_CAPBSET_READ");
143
144 if (ret == 1) {
145 ret = prctl(PR_CAPBSET_DROP, cap_idx, 0, 0, 0);
146 if (ret != 0)
147 bb_perror_msg_and_die("prctl: %s", "PR_CAPBSET_DROP");
148 }
149}
150
151static void drop_usermodehelper(const char *filename, int cap_idx)
152{
153 unsigned lo, hi;
154 char buf[sizeof(int)*3 * 2 + 8];
155 int fd;
156 int ret;
157
158 ret = open_read_close(filename, buf, sizeof(buf) - 1);
159 if (ret < 0)
160 return; /* assuming files do not exist */
161
162 buf[ret] = '\0';
163 ret = sscanf(buf, "%u %u", &lo, &hi);
164 if (ret != 2)
165 bb_perror_msg_and_die("can't parse file '%s'", filename);
166
167 if (cap_idx < 32)
168 lo &= ~(1 << cap_idx);
169 else
170 hi &= ~(1 << (cap_idx - 32));
171
172 fd = xopen(filename, O_WRONLY);
173 fdprintf(fd, "%u %u", lo, hi);
174 close(fd);
175}
176
177static void drop_capabilities(char *string)
178{
179 char *cap;
180
181 cap = strtok(string, ",");
182 while (cap) {
183 unsigned cap_idx;
184
185 cap_idx = cap_name_to_number(cap);
186 drop_usermodehelper("/proc/sys/kernel/usermodehelper/bset", cap_idx);
187 drop_usermodehelper("/proc/sys/kernel/usermodehelper/inheritable", cap_idx);
188 drop_bounding_set(cap_idx);
189 drop_capset(cap_idx);
190 bb_error_msg("dropped capability: %s", cap);
191 cap = strtok(NULL, ",");
192 }
193}
194#endif
195
Denis Vlasenko9b49a5e2007-10-11 10:05:36 +0000196int switch_root_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
Denis Vlasenkoa60f84e2008-07-05 09:18:54 +0000197int switch_root_main(int argc UNUSED_PARAM, char **argv)
Rob Landley0f34a822005-10-27 22:55:50 +0000198{
Denis Vlasenko51742f42007-04-12 00:32:05 +0000199 char *newroot, *console = NULL;
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +0000200 struct stat st;
Rob Landley0f34a822005-10-27 22:55:50 +0000201 struct statfs stfs;
Denis Vlasenko39acf452008-07-11 23:44:50 +0000202 dev_t rootdev;
Rob Landley0f34a822005-10-27 22:55:50 +0000203
Denys Vlasenko22542ec2017-08-08 21:55:02 +0200204 // Parse args (-c console). '+': stop at first non-option
Denys Vlasenko200bcc82017-08-21 19:30:01 +0200205 if (ENABLE_SWITCH_ROOT && (!ENABLE_RUN_INIT || applet_name[0] == 's')) {
206 getopt32(argv, "^+"
207 "c:"
208 "\0" "-2" /* minimum 2 args */,
209 &console
210 );
211 } else {
212#if ENABLE_RUN_INIT
213 char *cap_list = NULL;
214 getopt32(argv, "^+"
215 "c:d:"
216 "\0" "-2" /* minimum 2 args */,
217 &console,
218 &cap_list
219 );
220 if (cap_list)
221 drop_capabilities(cap_list);
222#endif
223 }
Denis Vlasenko3ace9fa2007-04-18 21:40:30 +0000224 argv += optind;
Denis Vlasenko3ace9fa2007-04-18 21:40:30 +0000225 newroot = *argv++;
Tim Rikerc1ef7bd2006-01-25 00:08:53 +0000226
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +0000227 // Change to new root directory and verify it's a different fs
Denis Vlasenko3ace9fa2007-04-18 21:40:30 +0000228 xchdir(newroot);
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +0000229 xstat("/", &st);
230 rootdev = st.st_dev;
231 xstat(".", &st);
232 if (st.st_dev == rootdev || getpid() != 1) {
233 // Show usage, it says new root must be a mountpoint
234 // and we must be PID 1
235 bb_show_usage();
Rob Landley0f34a822005-10-27 22:55:50 +0000236 }
Tim Rikerc1ef7bd2006-01-25 00:08:53 +0000237
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +0000238 // Additional sanity checks: we're about to rm -rf /, so be REALLY SURE
239 // we mean it. I could make this a CONFIG option, but I would get email
240 // from all the people who WILL destroy their filesystems.
Denys Vlasenkocb376372009-12-15 01:55:55 +0100241 if (stat("/init", &st) != 0 || !S_ISREG(st.st_mode)) {
242 bb_error_msg_and_die("/init is not a regular file");
243 }
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +0000244 statfs("/", &stfs); // this never fails
Denys Vlasenkocb376372009-12-15 01:55:55 +0100245 if ((unsigned)stfs.f_type != RAMFS_MAGIC
246 && (unsigned)stfs.f_type != TMPFS_MAGIC
Denis Vlasenko77ad97f2008-05-13 02:27:31 +0000247 ) {
Denys Vlasenkocb376372009-12-15 01:55:55 +0100248 bb_error_msg_and_die("root filesystem is not ramfs/tmpfs");
Rob Landley0f34a822005-10-27 22:55:50 +0000249 }
250
251 // Zap everything out of rootdev
Denis Vlasenko39acf452008-07-11 23:44:50 +0000252 delete_contents("/", rootdev);
Tim Rikerc1ef7bd2006-01-25 00:08:53 +0000253
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +0000254 // Overmount / with newdir and chroot into it
255 if (mount(".", "/", NULL, MS_MOVE, NULL)) {
256 // For example, fails when newroot is not a mountpoint
Denis Vlasenko0ad82342009-04-21 00:29:17 +0000257 bb_perror_msg_and_die("error moving root");
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +0000258 }
Denis Vlasenko394eebe2008-02-25 20:30:24 +0000259 xchroot(".");
Denis Vlasenkoe6b10ef2009-04-21 20:52:58 +0000260 // The chdir is needed to recalculate "." and ".." links
Denys Vlasenko0687a5b2012-03-08 00:28:24 +0100261 /*xchdir("/"); - done in xchroot */
Tim Rikerc1ef7bd2006-01-25 00:08:53 +0000262
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +0000263 // If a new console specified, redirect stdin/stdout/stderr to it
Rob Landley5d84c232005-12-20 17:25:51 +0000264 if (console) {
Andrei Gherzane3b65ab2017-03-24 16:39:08 +0100265 int fd = open_or_warn(console, O_RDWR);
266 if (fd >= 0) {
267 xmove_fd(fd, 0);
268 xdup2(0, 1);
269 xdup2(0, 2);
270 }
Rob Landley5d84c232005-12-20 17:25:51 +0000271 }
Rob Landley0f34a822005-10-27 22:55:50 +0000272
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +0000273 // Exec real init
Denis Vlasenko3ace9fa2007-04-18 21:40:30 +0000274 execv(argv[0], argv);
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +0000275 bb_perror_msg_and_die("can't execute '%s'", argv[0]);
Rob Landley0f34a822005-10-27 22:55:50 +0000276}
Denys Vlasenkoa5bdbe12009-06-17 14:03:24 +0200277
278/*
279From: Rob Landley <rob@landley.net>
280Date: Tue, Jun 16, 2009 at 7:47 PM
281Subject: Re: switch_root...
282
283...
284...
285...
286
287If you're _not_ running out of init_ramfs (if for example you're using initrd
288instead), you probably shouldn't use switch_root because it's the wrong tool.
289
290Basically what the sucker does is something like the following shell script:
291
292 find / -xdev | xargs rm -rf
293 cd "$1"
294 shift
295 mount --move . /
296 exec chroot . "$@"
297
298There are a couple reasons that won't work as a shell script:
299
3001) If you delete the commands out of your $PATH, your shell scripts can't run
301more commands, but you can't start using dynamically linked _new_ commands
302until after you do the chroot because the path to the dynamic linker is wrong.
303So there's a step that needs to be sort of atomic but can't be as a shell
304script. (You can work around this with static linking or very carefully laid
305out paths and sequencing, but it's brittle, ugly, and non-obvious.)
306
Denys Vlasenko10ad6222017-04-17 16:13:32 +02003072) The "find | rm" bit will actually delete everything because the mount points
Denys Vlasenkoa5bdbe12009-06-17 14:03:24 +0200308still show up (even if their contents don't), and rm -rf will then happily zap
309that. So the first line is an oversimplification of what you need to do _not_
310to descend into other filesystems and delete their contents.
311
312The reason we do this is to free up memory, by the way. Since initramfs is a
313ramfs, deleting its contents frees up the memory it uses. (We leave it with
314one remaining dentry for the new mount point, but that's ok.)
315
316Note that you cannot ever umount rootfs, for approximately the same reason you
317can't kill PID 1. The kernel tracks mount points as a doubly linked list, and
318the pointer to the start/end of that list always points to an entry that's
319known to be there (rootfs), so it never has to worry about moving that pointer
320and it never has to worry about the list being empty. (Back around 2.6.13
321there _was_ a bug that let you umount rootfs, and the system locked hard the
322instant you did so endlessly looping to find the end of the mount list and
323never stopping. They fixed it.)
324
325Oh, and the reason we mount --move _and_ do the chroot is due to the way "/"
326works. Each process has two special symlinks, ".", and "/". Each of them
327points to the dentry of a directory, and give you a location paths can start
328from. (Historically ".." was also special, because you could enter a
329directory via a symlink so backing out to the directory you came from doesn't
330necessarily mean the one physically above where "." points to. These days I
331think it's just handed off to the filesystem.)
332
333Anyway, path resolution starts with "." or "/" (although the "./" at the start
334of the path may be implicit), meaning it's relative to one of those two
335directories. Your current directory, and your current root directory. The
336chdir() syscall changes where "." points to, and the chroot() syscall changes
337where "/" points to. (Again, both are per-process which is why chroot only
338affects your current process and its child processes.)
339
340Note that chroot() does _not_ change where "." points to, and back before they
341put crazy security checks into the kernel your current directory could be
342somewhere you could no longer access after the chroot. (The command line
343chroot does a cd as well, the chroot _syscall_ is what I'm talking about.)
344
345The reason mounting something new over / has no obvious effect is the same
346reason mounting something over your current directory has no obvious effect:
347the . and / links aren't recalculated after a mount, so they still point to
348the same dentry they did before, even if that dentry is no longer accessible
349by other means. Note that "cd ." is a NOP, and "chroot /" is a nop; both look
350up the cached dentry and set it right back. They don't re-parse any paths,
351because they're what all paths your process uses would be relative to.
352
353That's why the careful sequencing above: we cd into the new mount point before
354we do the mount --move. Moving the mount point would otherwise make it
Denys Vlasenkobf74fb42015-10-13 12:34:35 +0200355totally inaccessible to us because cd-ing to the old path wouldn't give it to
Denys Vlasenkoa5bdbe12009-06-17 14:03:24 +0200356us anymore, and cd "/" just gives us the cached dentry from when the process
357was created (in this case the old initramfs one). But the "." symlink gives
358us the dentry of the filesystem we just moved, so we can then "chroot ." to
359copy that dentry to "/" and get the new filesystem. If we _didn't_ save that
360dentry in "." we couldn't get it back after the mount --move.
361
362(Yes, this is all screwy and I had to email questions to Linus Torvalds to get
363it straight myself. I keep meaning to write up a "how mount actually works"
364document someday...)
365*/