blob: f2674b5ac096b1348e92f3cd41be2560f106a202 [file] [log] [blame]
"Robert P. J. Day"63fc1a92006-07-02 19:47:05 +00001/* vi: set sw=4 ts=4: */
Denys Vlasenko2ab94032017-10-05 15:33:28 +02002/*
3 * Copyright 2005 Rob Landley <rob@landley.net>
Rob Landley3ea05d32006-03-21 18:20:40 +00004 *
5 * Switch from rootfs to another filesystem as the root of the mount tree.
6 *
Denys Vlasenko0ef64bd2010-08-16 20:14:46 +02007 * Licensed under GPLv2, see file LICENSE in this source tree.
Rob Landley3ea05d32006-03-21 18:20:40 +00008 */
Denys Vlasenkodd898c92016-11-23 11:46:32 +01009//config:config SWITCH_ROOT
Denys Vlasenkob097a842018-12-28 03:20:17 +010010//config: bool "switch_root (5.5 kb)"
Denys Vlasenkodd898c92016-11-23 11:46:32 +010011//config: default y
Denys Vlasenkodd898c92016-11-23 11:46:32 +010012//config: help
Denys Vlasenko72089cf2017-07-21 09:50:55 +020013//config: The switch_root utility is used from initramfs to select a new
14//config: root device. Under initramfs, you have to use this instead of
15//config: pivot_root. (Stop reading here if you don't care why.)
Denys Vlasenkodd898c92016-11-23 11:46:32 +010016//config:
Denys Vlasenko72089cf2017-07-21 09:50:55 +020017//config: Booting with initramfs extracts a gzipped cpio archive into rootfs
18//config: (which is a variant of ramfs/tmpfs). Because rootfs can't be moved
19//config: or unmounted*, pivot_root will not work from initramfs. Instead,
20//config: switch_root deletes everything out of rootfs (including itself),
21//config: does a mount --move that overmounts rootfs with the new root, and
22//config: then execs the specified init program.
Denys Vlasenkodd898c92016-11-23 11:46:32 +010023//config:
Denys Vlasenko72089cf2017-07-21 09:50:55 +020024//config: * Because the Linux kernel uses rootfs internally as the starting
25//config: and ending point for searching through the kernel's doubly linked
26//config: list of active mount points. That's why.
Denys Vlasenkobbc26c62017-08-22 10:37:30 +020027//config:
28// RUN_INIT config item is in klibc-utils
Denys Vlasenkodd898c92016-11-23 11:46:32 +010029
30//applet:IF_SWITCH_ROOT(APPLET(switch_root, BB_DIR_SBIN, BB_SUID_DROP))
Denys Vlasenko200bcc82017-08-21 19:30:01 +020031// APPLET_ODDNAME:name main location suid_type help
32//applet:IF_RUN_INIT( APPLET_ODDNAME(run-init, switch_root, BB_DIR_SBIN, BB_SUID_DROP, run_init))
Denys Vlasenkodd898c92016-11-23 11:46:32 +010033
34//kbuild:lib-$(CONFIG_SWITCH_ROOT) += switch_root.o
Denys Vlasenko200bcc82017-08-21 19:30:01 +020035//kbuild:lib-$(CONFIG_RUN_INIT) += switch_root.o
Pere Orga5bc8c002011-04-11 03:29:49 +020036
Rob Landley0f34a822005-10-27 22:55:50 +000037#include <sys/vfs.h>
Denys Vlasenkoda49f582009-07-08 02:58:38 +020038#include <sys/mount.h>
Denys Vlasenko200bcc82017-08-21 19:30:01 +020039#if ENABLE_RUN_INIT
40# include <sys/prctl.h>
Denys Vlasenko2af5e3f2018-02-21 20:13:39 +010041# ifndef PR_CAPBSET_READ
42# define PR_CAPBSET_READ 23
43# endif
44# ifndef PR_CAPBSET_DROP
45# define PR_CAPBSET_DROP 24
46# endif
Denys Vlasenko200bcc82017-08-21 19:30:01 +020047# include <linux/capability.h>
48// #include <sys/capability.h>
49// This header is in libcap, but the functions are in libc.
50// Comment in the header says this above capset/capget:
51/* system calls - look to libc for function to system call mapping */
52extern int capset(cap_user_header_t header, cap_user_data_t data);
53extern int capget(cap_user_header_t header, const cap_user_data_t data);
54// so for bbox, let's just repeat the declarations.
55// This way, libcap needs not be installed in build environment.
56#endif
57
Denys Vlasenkoda49f582009-07-08 02:58:38 +020058#include "libbb.h"
Denys Vlasenko200bcc82017-08-21 19:30:01 +020059
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +000060// Make up for header deficiencies
Rob Landley0f34a822005-10-27 22:55:50 +000061#ifndef RAMFS_MAGIC
Denys Vlasenkoa5bdbe12009-06-17 14:03:24 +020062# define RAMFS_MAGIC ((unsigned)0x858458f6)
Rob Landley0f34a822005-10-27 22:55:50 +000063#endif
Rob Landley0f34a822005-10-27 22:55:50 +000064#ifndef TMPFS_MAGIC
Denys Vlasenkoa5bdbe12009-06-17 14:03:24 +020065# define TMPFS_MAGIC ((unsigned)0x01021994)
Rob Landley0f34a822005-10-27 22:55:50 +000066#endif
Rob Landley0f34a822005-10-27 22:55:50 +000067#ifndef MS_MOVE
Denys Vlasenkoa5bdbe12009-06-17 14:03:24 +020068# define MS_MOVE 8192
Rob Landley0f34a822005-10-27 22:55:50 +000069#endif
70
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +000071// Recursively delete contents of rootfs
Denis Vlasenko39acf452008-07-11 23:44:50 +000072static void delete_contents(const char *directory, dev_t rootdev)
Rob Landley0f34a822005-10-27 22:55:50 +000073{
74 DIR *dir;
75 struct dirent *d;
76 struct stat st;
77
78 // Don't descend into other filesystems
Denis Vlasenko39acf452008-07-11 23:44:50 +000079 if (lstat(directory, &st) || st.st_dev != rootdev)
80 return;
Rob Landley0f34a822005-10-27 22:55:50 +000081
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +000082 // Recursively delete the contents of directories
Rob Landley0f34a822005-10-27 22:55:50 +000083 if (S_ISDIR(st.st_mode)) {
Denis Vlasenko51742f42007-04-12 00:32:05 +000084 dir = opendir(directory);
85 if (dir) {
Rob Landley0f34a822005-10-27 22:55:50 +000086 while ((d = readdir(dir))) {
Denis Vlasenko51742f42007-04-12 00:32:05 +000087 char *newdir = d->d_name;
Rob Landley0f34a822005-10-27 22:55:50 +000088
89 // Skip . and ..
Denis Vlasenko39acf452008-07-11 23:44:50 +000090 if (DOT_OR_DOTDOT(newdir))
Rob Landley0f34a822005-10-27 22:55:50 +000091 continue;
Tim Rikerc1ef7bd2006-01-25 00:08:53 +000092
Rob Landley0f34a822005-10-27 22:55:50 +000093 // Recurse to delete contents
Denis Vlasenko39acf452008-07-11 23:44:50 +000094 newdir = concat_path_file(directory, newdir);
95 delete_contents(newdir, rootdev);
96 free(newdir);
Rob Landley0f34a822005-10-27 22:55:50 +000097 }
98 closedir(dir);
Tim Rikerc1ef7bd2006-01-25 00:08:53 +000099
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +0000100 // Directory should now be empty, zap it
Rob Landley5d84c232005-12-20 17:25:51 +0000101 rmdir(directory);
Rob Landley0f34a822005-10-27 22:55:50 +0000102 }
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +0000103 } else {
104 // It wasn't a directory, zap it
105 unlink(directory);
106 }
Rob Landley0f34a822005-10-27 22:55:50 +0000107}
108
Denys Vlasenko200bcc82017-08-21 19:30:01 +0200109#if ENABLE_RUN_INIT
110DEFINE_STRUCT_CAPS;
111
112static void drop_capset(int cap_idx)
113{
114 struct caps caps;
115
Denys Vlasenko200bcc82017-08-21 19:30:01 +0200116 getcaps(&caps);
Denys Vlasenko200bcc82017-08-21 19:30:01 +0200117 caps.data[CAP_TO_INDEX(cap_idx)].inheritable &= ~CAP_TO_MASK(cap_idx);
Denys Vlasenko200bcc82017-08-21 19:30:01 +0200118 if (capset(&caps.header, caps.data) != 0)
James Byrne69374872019-07-02 11:35:03 +0200119 bb_simple_perror_msg_and_die("capset");
Denys Vlasenko200bcc82017-08-21 19:30:01 +0200120}
121
122static void drop_bounding_set(int cap_idx)
123{
124 int ret;
125
126 ret = prctl(PR_CAPBSET_READ, cap_idx, 0, 0, 0);
127 if (ret < 0)
128 bb_perror_msg_and_die("prctl: %s", "PR_CAPBSET_READ");
129
130 if (ret == 1) {
131 ret = prctl(PR_CAPBSET_DROP, cap_idx, 0, 0, 0);
132 if (ret != 0)
133 bb_perror_msg_and_die("prctl: %s", "PR_CAPBSET_DROP");
134 }
135}
136
137static void drop_usermodehelper(const char *filename, int cap_idx)
138{
139 unsigned lo, hi;
140 char buf[sizeof(int)*3 * 2 + 8];
141 int fd;
142 int ret;
143
144 ret = open_read_close(filename, buf, sizeof(buf) - 1);
145 if (ret < 0)
146 return; /* assuming files do not exist */
147
148 buf[ret] = '\0';
149 ret = sscanf(buf, "%u %u", &lo, &hi);
150 if (ret != 2)
151 bb_perror_msg_and_die("can't parse file '%s'", filename);
152
153 if (cap_idx < 32)
154 lo &= ~(1 << cap_idx);
155 else
156 hi &= ~(1 << (cap_idx - 32));
157
158 fd = xopen(filename, O_WRONLY);
159 fdprintf(fd, "%u %u", lo, hi);
160 close(fd);
161}
162
163static void drop_capabilities(char *string)
164{
165 char *cap;
166
Denys Vlasenko24966162020-10-06 02:36:47 +0200167 cap = strtok_r(string, ",", &string);
Denys Vlasenko200bcc82017-08-21 19:30:01 +0200168 while (cap) {
169 unsigned cap_idx;
170
171 cap_idx = cap_name_to_number(cap);
172 drop_usermodehelper("/proc/sys/kernel/usermodehelper/bset", cap_idx);
173 drop_usermodehelper("/proc/sys/kernel/usermodehelper/inheritable", cap_idx);
174 drop_bounding_set(cap_idx);
175 drop_capset(cap_idx);
176 bb_error_msg("dropped capability: %s", cap);
Denys Vlasenko24966162020-10-06 02:36:47 +0200177 cap = strtok_r(NULL, ",", &string);
Denys Vlasenko200bcc82017-08-21 19:30:01 +0200178 }
179}
180#endif
181
Denis Vlasenko9b49a5e2007-10-11 10:05:36 +0000182int switch_root_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
Denis Vlasenkoa60f84e2008-07-05 09:18:54 +0000183int switch_root_main(int argc UNUSED_PARAM, char **argv)
Rob Landley0f34a822005-10-27 22:55:50 +0000184{
Denis Vlasenko51742f42007-04-12 00:32:05 +0000185 char *newroot, *console = NULL;
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +0000186 struct stat st;
Rob Landley0f34a822005-10-27 22:55:50 +0000187 struct statfs stfs;
Denys Vlasenkobbc26c62017-08-22 10:37:30 +0200188 unsigned dry_run = 0;
Denis Vlasenko39acf452008-07-11 23:44:50 +0000189 dev_t rootdev;
Rob Landley0f34a822005-10-27 22:55:50 +0000190
Denys Vlasenkobbc26c62017-08-22 10:37:30 +0200191 // Parse args. '+': stop at first non-option
Denys Vlasenko200bcc82017-08-21 19:30:01 +0200192 if (ENABLE_SWITCH_ROOT && (!ENABLE_RUN_INIT || applet_name[0] == 's')) {
Denys Vlasenkobbc26c62017-08-22 10:37:30 +0200193//usage:#define switch_root_trivial_usage
194//usage: "[-c CONSOLE_DEV] NEW_ROOT NEW_INIT [ARGS]"
195//usage:#define switch_root_full_usage "\n\n"
196//usage: "Free initramfs and switch to another root fs:\n"
197//usage: "chroot to NEW_ROOT, delete all in /, move NEW_ROOT to /,\n"
198//usage: "execute NEW_INIT. PID must be 1. NEW_ROOT must be a mountpoint.\n"
199//usage: "\n -c DEV Reopen stdio to DEV after switch"
Denys Vlasenko200bcc82017-08-21 19:30:01 +0200200 getopt32(argv, "^+"
201 "c:"
202 "\0" "-2" /* minimum 2 args */,
203 &console
204 );
205 } else {
206#if ENABLE_RUN_INIT
Denys Vlasenkobbc26c62017-08-22 10:37:30 +0200207//usage:#define run_init_trivial_usage
208//usage: "[-d CAP,CAP...] [-n] [-c CONSOLE_DEV] NEW_ROOT NEW_INIT [ARGS]"
209//usage:#define run_init_full_usage "\n\n"
210//usage: "Free initramfs and switch to another root fs:\n"
211//usage: "chroot to NEW_ROOT, delete all in /, move NEW_ROOT to /,\n"
212//usage: "execute NEW_INIT. PID must be 1. NEW_ROOT must be a mountpoint.\n"
213//usage: "\n -c DEV Reopen stdio to DEV after switch"
214//usage: "\n -d CAPS Drop capabilities"
215//usage: "\n -n Dry run"
Denys Vlasenko200bcc82017-08-21 19:30:01 +0200216 char *cap_list = NULL;
Denys Vlasenkobbc26c62017-08-22 10:37:30 +0200217 dry_run = getopt32(argv, "^+"
218 "c:d:n"
Denys Vlasenko200bcc82017-08-21 19:30:01 +0200219 "\0" "-2" /* minimum 2 args */,
220 &console,
221 &cap_list
222 );
Denys Vlasenkobbc26c62017-08-22 10:37:30 +0200223 dry_run >>= 2; // -n
Denys Vlasenko200bcc82017-08-21 19:30:01 +0200224 if (cap_list)
225 drop_capabilities(cap_list);
226#endif
227 }
Denis Vlasenko3ace9fa2007-04-18 21:40:30 +0000228 argv += optind;
Denis Vlasenko3ace9fa2007-04-18 21:40:30 +0000229 newroot = *argv++;
Tim Rikerc1ef7bd2006-01-25 00:08:53 +0000230
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +0000231 // Change to new root directory and verify it's a different fs
Denis Vlasenko3ace9fa2007-04-18 21:40:30 +0000232 xchdir(newroot);
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +0000233 xstat("/", &st);
234 rootdev = st.st_dev;
235 xstat(".", &st);
Denys Vlasenko7d834c92017-08-22 11:40:27 +0200236 if (st.st_dev == rootdev) {
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +0000237 // Show usage, it says new root must be a mountpoint
Denys Vlasenko7d834c92017-08-22 11:40:27 +0200238 bb_show_usage();
239 }
240 if (!dry_run && getpid() != 1) {
241 // Show usage, it says we must be PID 1
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +0000242 bb_show_usage();
Rob Landley0f34a822005-10-27 22:55:50 +0000243 }
Tim Rikerc1ef7bd2006-01-25 00:08:53 +0000244
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +0000245 // Additional sanity checks: we're about to rm -rf /, so be REALLY SURE
246 // we mean it. I could make this a CONFIG option, but I would get email
247 // from all the people who WILL destroy their filesystems.
Denys Vlasenkocb376372009-12-15 01:55:55 +0100248 if (stat("/init", &st) != 0 || !S_ISREG(st.st_mode)) {
Denys Vlasenkobbc26c62017-08-22 10:37:30 +0200249 bb_error_msg_and_die("'%s' is not a regular file", "/init");
Denys Vlasenkocb376372009-12-15 01:55:55 +0100250 }
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +0000251 statfs("/", &stfs); // this never fails
Denys Vlasenkocb376372009-12-15 01:55:55 +0100252 if ((unsigned)stfs.f_type != RAMFS_MAGIC
253 && (unsigned)stfs.f_type != TMPFS_MAGIC
Denis Vlasenko77ad97f2008-05-13 02:27:31 +0000254 ) {
James Byrne69374872019-07-02 11:35:03 +0200255 bb_simple_error_msg_and_die("root filesystem is not ramfs/tmpfs");
Rob Landley0f34a822005-10-27 22:55:50 +0000256 }
257
Denys Vlasenkobbc26c62017-08-22 10:37:30 +0200258 if (!dry_run) {
259 // Zap everything out of rootdev
260 delete_contents("/", rootdev);
Tim Rikerc1ef7bd2006-01-25 00:08:53 +0000261
Denys Vlasenkobbc26c62017-08-22 10:37:30 +0200262 // Overmount / with newdir and chroot into it
263 if (mount(".", "/", NULL, MS_MOVE, NULL)) {
264 // For example, fails when newroot is not a mountpoint
James Byrne69374872019-07-02 11:35:03 +0200265 bb_simple_perror_msg_and_die("error moving root");
Denys Vlasenkobbc26c62017-08-22 10:37:30 +0200266 }
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +0000267 }
Denis Vlasenko394eebe2008-02-25 20:30:24 +0000268 xchroot(".");
Denis Vlasenkoe6b10ef2009-04-21 20:52:58 +0000269 // The chdir is needed to recalculate "." and ".." links
Denys Vlasenko0687a5b2012-03-08 00:28:24 +0100270 /*xchdir("/"); - done in xchroot */
Tim Rikerc1ef7bd2006-01-25 00:08:53 +0000271
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +0000272 // If a new console specified, redirect stdin/stdout/stderr to it
Rob Landley5d84c232005-12-20 17:25:51 +0000273 if (console) {
Andrei Gherzane3b65ab2017-03-24 16:39:08 +0100274 int fd = open_or_warn(console, O_RDWR);
275 if (fd >= 0) {
276 xmove_fd(fd, 0);
277 xdup2(0, 1);
278 xdup2(0, 2);
279 }
Rob Landley5d84c232005-12-20 17:25:51 +0000280 }
Rob Landley0f34a822005-10-27 22:55:50 +0000281
Denys Vlasenkobbc26c62017-08-22 10:37:30 +0200282 if (dry_run) {
283 // Does NEW_INIT look like it can be executed?
284 //xstat(argv[0], &st);
285 //if (!S_ISREG(st.st_mode))
286 // bb_perror_msg_and_die("'%s' is not a regular file", argv[0]);
287 if (access(argv[0], X_OK) == 0)
288 return 0;
289 } else {
290 // Exec NEW_INIT
291 execv(argv[0], argv);
292 }
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +0000293 bb_perror_msg_and_die("can't execute '%s'", argv[0]);
Rob Landley0f34a822005-10-27 22:55:50 +0000294}
Denys Vlasenkoa5bdbe12009-06-17 14:03:24 +0200295
296/*
297From: Rob Landley <rob@landley.net>
298Date: Tue, Jun 16, 2009 at 7:47 PM
299Subject: Re: switch_root...
300
301...
302...
303...
304
305If you're _not_ running out of init_ramfs (if for example you're using initrd
306instead), you probably shouldn't use switch_root because it's the wrong tool.
307
308Basically what the sucker does is something like the following shell script:
309
310 find / -xdev | xargs rm -rf
311 cd "$1"
312 shift
313 mount --move . /
314 exec chroot . "$@"
315
316There are a couple reasons that won't work as a shell script:
317
3181) If you delete the commands out of your $PATH, your shell scripts can't run
319more commands, but you can't start using dynamically linked _new_ commands
320until after you do the chroot because the path to the dynamic linker is wrong.
321So there's a step that needs to be sort of atomic but can't be as a shell
322script. (You can work around this with static linking or very carefully laid
323out paths and sequencing, but it's brittle, ugly, and non-obvious.)
324
Denys Vlasenko10ad6222017-04-17 16:13:32 +02003252) The "find | rm" bit will actually delete everything because the mount points
Denys Vlasenkoa5bdbe12009-06-17 14:03:24 +0200326still show up (even if their contents don't), and rm -rf will then happily zap
327that. So the first line is an oversimplification of what you need to do _not_
328to descend into other filesystems and delete their contents.
329
330The reason we do this is to free up memory, by the way. Since initramfs is a
331ramfs, deleting its contents frees up the memory it uses. (We leave it with
332one remaining dentry for the new mount point, but that's ok.)
333
334Note that you cannot ever umount rootfs, for approximately the same reason you
335can't kill PID 1. The kernel tracks mount points as a doubly linked list, and
336the pointer to the start/end of that list always points to an entry that's
337known to be there (rootfs), so it never has to worry about moving that pointer
338and it never has to worry about the list being empty. (Back around 2.6.13
339there _was_ a bug that let you umount rootfs, and the system locked hard the
340instant you did so endlessly looping to find the end of the mount list and
341never stopping. They fixed it.)
342
343Oh, and the reason we mount --move _and_ do the chroot is due to the way "/"
344works. Each process has two special symlinks, ".", and "/". Each of them
345points to the dentry of a directory, and give you a location paths can start
346from. (Historically ".." was also special, because you could enter a
347directory via a symlink so backing out to the directory you came from doesn't
348necessarily mean the one physically above where "." points to. These days I
349think it's just handed off to the filesystem.)
350
351Anyway, path resolution starts with "." or "/" (although the "./" at the start
352of the path may be implicit), meaning it's relative to one of those two
353directories. Your current directory, and your current root directory. The
354chdir() syscall changes where "." points to, and the chroot() syscall changes
355where "/" points to. (Again, both are per-process which is why chroot only
356affects your current process and its child processes.)
357
358Note that chroot() does _not_ change where "." points to, and back before they
359put crazy security checks into the kernel your current directory could be
360somewhere you could no longer access after the chroot. (The command line
361chroot does a cd as well, the chroot _syscall_ is what I'm talking about.)
362
363The reason mounting something new over / has no obvious effect is the same
364reason mounting something over your current directory has no obvious effect:
365the . and / links aren't recalculated after a mount, so they still point to
366the same dentry they did before, even if that dentry is no longer accessible
367by other means. Note that "cd ." is a NOP, and "chroot /" is a nop; both look
368up the cached dentry and set it right back. They don't re-parse any paths,
369because they're what all paths your process uses would be relative to.
370
371That's why the careful sequencing above: we cd into the new mount point before
372we do the mount --move. Moving the mount point would otherwise make it
Denys Vlasenkobf74fb42015-10-13 12:34:35 +0200373totally inaccessible to us because cd-ing to the old path wouldn't give it to
Denys Vlasenkoa5bdbe12009-06-17 14:03:24 +0200374us anymore, and cd "/" just gives us the cached dentry from when the process
375was created (in this case the old initramfs one). But the "." symlink gives
376us the dentry of the filesystem we just moved, so we can then "chroot ." to
377copy that dentry to "/" and get the new filesystem. If we _didn't_ save that
378dentry in "." we couldn't get it back after the mount --move.
379
380(Yes, this is all screwy and I had to email questions to Linus Torvalds to get
381it straight myself. I keep meaning to write up a "how mount actually works"
382document someday...)
383*/