blob: ff0551843f00f3e2d451d3530995acdd37c87a30 [file] [log] [blame]
"Robert P. J. Day"63fc1a92006-07-02 19:47:05 +00001/* vi: set sw=4 ts=4: */
Rob Landley3ea05d32006-03-21 18:20:40 +00002/* Copyright 2005 Rob Landley <rob@landley.net>
3 *
4 * Switch from rootfs to another filesystem as the root of the mount tree.
5 *
Rob Landleye9a7a622006-09-22 02:52:41 +00006 * Licensed under GPL version 2, see file LICENSE in this tarball for details.
Rob Landley3ea05d32006-03-21 18:20:40 +00007 */
Rob Landley0f34a822005-10-27 22:55:50 +00008#include <sys/vfs.h>
Denys Vlasenkoda49f582009-07-08 02:58:38 +02009#include <sys/mount.h>
10#include "libbb.h"
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +000011// Make up for header deficiencies
Rob Landley0f34a822005-10-27 22:55:50 +000012#ifndef RAMFS_MAGIC
Denys Vlasenkoa5bdbe12009-06-17 14:03:24 +020013# define RAMFS_MAGIC ((unsigned)0x858458f6)
Rob Landley0f34a822005-10-27 22:55:50 +000014#endif
Rob Landley0f34a822005-10-27 22:55:50 +000015#ifndef TMPFS_MAGIC
Denys Vlasenkoa5bdbe12009-06-17 14:03:24 +020016# define TMPFS_MAGIC ((unsigned)0x01021994)
Rob Landley0f34a822005-10-27 22:55:50 +000017#endif
Rob Landley0f34a822005-10-27 22:55:50 +000018#ifndef MS_MOVE
Denys Vlasenkoa5bdbe12009-06-17 14:03:24 +020019# define MS_MOVE 8192
Rob Landley0f34a822005-10-27 22:55:50 +000020#endif
21
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +000022// Recursively delete contents of rootfs
Denis Vlasenko39acf452008-07-11 23:44:50 +000023static void delete_contents(const char *directory, dev_t rootdev)
Rob Landley0f34a822005-10-27 22:55:50 +000024{
25 DIR *dir;
26 struct dirent *d;
27 struct stat st;
28
29 // Don't descend into other filesystems
Denis Vlasenko39acf452008-07-11 23:44:50 +000030 if (lstat(directory, &st) || st.st_dev != rootdev)
31 return;
Rob Landley0f34a822005-10-27 22:55:50 +000032
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +000033 // Recursively delete the contents of directories
Rob Landley0f34a822005-10-27 22:55:50 +000034 if (S_ISDIR(st.st_mode)) {
Denis Vlasenko51742f42007-04-12 00:32:05 +000035 dir = opendir(directory);
36 if (dir) {
Rob Landley0f34a822005-10-27 22:55:50 +000037 while ((d = readdir(dir))) {
Denis Vlasenko51742f42007-04-12 00:32:05 +000038 char *newdir = d->d_name;
Rob Landley0f34a822005-10-27 22:55:50 +000039
40 // Skip . and ..
Denis Vlasenko39acf452008-07-11 23:44:50 +000041 if (DOT_OR_DOTDOT(newdir))
Rob Landley0f34a822005-10-27 22:55:50 +000042 continue;
Tim Rikerc1ef7bd2006-01-25 00:08:53 +000043
Rob Landley0f34a822005-10-27 22:55:50 +000044 // Recurse to delete contents
Denis Vlasenko39acf452008-07-11 23:44:50 +000045 newdir = concat_path_file(directory, newdir);
46 delete_contents(newdir, rootdev);
47 free(newdir);
Rob Landley0f34a822005-10-27 22:55:50 +000048 }
49 closedir(dir);
Tim Rikerc1ef7bd2006-01-25 00:08:53 +000050
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +000051 // Directory should now be empty, zap it
Rob Landley5d84c232005-12-20 17:25:51 +000052 rmdir(directory);
Rob Landley0f34a822005-10-27 22:55:50 +000053 }
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +000054 } else {
55 // It wasn't a directory, zap it
56 unlink(directory);
57 }
Rob Landley0f34a822005-10-27 22:55:50 +000058}
59
Denis Vlasenko9b49a5e2007-10-11 10:05:36 +000060int switch_root_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
Denis Vlasenkoa60f84e2008-07-05 09:18:54 +000061int switch_root_main(int argc UNUSED_PARAM, char **argv)
Rob Landley0f34a822005-10-27 22:55:50 +000062{
Denis Vlasenko51742f42007-04-12 00:32:05 +000063 char *newroot, *console = NULL;
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +000064 struct stat st;
Rob Landley0f34a822005-10-27 22:55:50 +000065 struct statfs stfs;
Denis Vlasenko39acf452008-07-11 23:44:50 +000066 dev_t rootdev;
Rob Landley0f34a822005-10-27 22:55:50 +000067
68 // Parse args (-c console)
Denis Vlasenko6dd03f02008-02-13 17:25:31 +000069 opt_complementary = "-2"; // minimum 2 params
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +000070 getopt32(argv, "+c:", &console); // '+': stop at first non-option
Denis Vlasenko3ace9fa2007-04-18 21:40:30 +000071 argv += optind;
Denis Vlasenko3ace9fa2007-04-18 21:40:30 +000072 newroot = *argv++;
Tim Rikerc1ef7bd2006-01-25 00:08:53 +000073
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +000074 // Change to new root directory and verify it's a different fs
Denis Vlasenko3ace9fa2007-04-18 21:40:30 +000075 xchdir(newroot);
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +000076 xstat("/", &st);
77 rootdev = st.st_dev;
78 xstat(".", &st);
79 if (st.st_dev == rootdev || getpid() != 1) {
80 // Show usage, it says new root must be a mountpoint
81 // and we must be PID 1
82 bb_show_usage();
Rob Landley0f34a822005-10-27 22:55:50 +000083 }
Tim Rikerc1ef7bd2006-01-25 00:08:53 +000084
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +000085 // Additional sanity checks: we're about to rm -rf /, so be REALLY SURE
86 // we mean it. I could make this a CONFIG option, but I would get email
87 // from all the people who WILL destroy their filesystems.
88 statfs("/", &stfs); // this never fails
Denys Vlasenkoa5bdbe12009-06-17 14:03:24 +020089 if (stat("/init", &st) != 0 || !S_ISREG(st.st_mode)
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +000090 || ((unsigned)stfs.f_type != RAMFS_MAGIC
91 && (unsigned)stfs.f_type != TMPFS_MAGIC)
Denis Vlasenko77ad97f2008-05-13 02:27:31 +000092 ) {
Rob Landley0f34a822005-10-27 22:55:50 +000093 bb_error_msg_and_die("not rootfs");
94 }
95
96 // Zap everything out of rootdev
Denis Vlasenko39acf452008-07-11 23:44:50 +000097 delete_contents("/", rootdev);
Tim Rikerc1ef7bd2006-01-25 00:08:53 +000098
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +000099 // Overmount / with newdir and chroot into it
100 if (mount(".", "/", NULL, MS_MOVE, NULL)) {
101 // For example, fails when newroot is not a mountpoint
Denis Vlasenko0ad82342009-04-21 00:29:17 +0000102 bb_perror_msg_and_die("error moving root");
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +0000103 }
Denis Vlasenko394eebe2008-02-25 20:30:24 +0000104 xchroot(".");
Denis Vlasenkoe6b10ef2009-04-21 20:52:58 +0000105 // The chdir is needed to recalculate "." and ".." links
Denis Vlasenko3ace9fa2007-04-18 21:40:30 +0000106 xchdir("/");
Tim Rikerc1ef7bd2006-01-25 00:08:53 +0000107
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +0000108 // If a new console specified, redirect stdin/stdout/stderr to it
Rob Landley5d84c232005-12-20 17:25:51 +0000109 if (console) {
110 close(0);
Denis Vlasenko51742f42007-04-12 00:32:05 +0000111 xopen(console, O_RDWR);
Denis Vlasenko39acf452008-07-11 23:44:50 +0000112 xdup2(0, 1);
113 xdup2(0, 2);
Rob Landley5d84c232005-12-20 17:25:51 +0000114 }
Rob Landley0f34a822005-10-27 22:55:50 +0000115
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +0000116 // Exec real init
Denis Vlasenko3ace9fa2007-04-18 21:40:30 +0000117 execv(argv[0], argv);
Denis Vlasenkof9d4fc32009-04-21 20:40:51 +0000118 bb_perror_msg_and_die("can't execute '%s'", argv[0]);
Rob Landley0f34a822005-10-27 22:55:50 +0000119}
Denys Vlasenkoa5bdbe12009-06-17 14:03:24 +0200120
121/*
122From: Rob Landley <rob@landley.net>
123Date: Tue, Jun 16, 2009 at 7:47 PM
124Subject: Re: switch_root...
125
126...
127...
128...
129
130If you're _not_ running out of init_ramfs (if for example you're using initrd
131instead), you probably shouldn't use switch_root because it's the wrong tool.
132
133Basically what the sucker does is something like the following shell script:
134
135 find / -xdev | xargs rm -rf
136 cd "$1"
137 shift
138 mount --move . /
139 exec chroot . "$@"
140
141There are a couple reasons that won't work as a shell script:
142
1431) If you delete the commands out of your $PATH, your shell scripts can't run
144more commands, but you can't start using dynamically linked _new_ commands
145until after you do the chroot because the path to the dynamic linker is wrong.
146So there's a step that needs to be sort of atomic but can't be as a shell
147script. (You can work around this with static linking or very carefully laid
148out paths and sequencing, but it's brittle, ugly, and non-obvious.)
149
1502) The "find | rm" bit will acually delete everything because the mount points
151still show up (even if their contents don't), and rm -rf will then happily zap
152that. So the first line is an oversimplification of what you need to do _not_
153to descend into other filesystems and delete their contents.
154
155The reason we do this is to free up memory, by the way. Since initramfs is a
156ramfs, deleting its contents frees up the memory it uses. (We leave it with
157one remaining dentry for the new mount point, but that's ok.)
158
159Note that you cannot ever umount rootfs, for approximately the same reason you
160can't kill PID 1. The kernel tracks mount points as a doubly linked list, and
161the pointer to the start/end of that list always points to an entry that's
162known to be there (rootfs), so it never has to worry about moving that pointer
163and it never has to worry about the list being empty. (Back around 2.6.13
164there _was_ a bug that let you umount rootfs, and the system locked hard the
165instant you did so endlessly looping to find the end of the mount list and
166never stopping. They fixed it.)
167
168Oh, and the reason we mount --move _and_ do the chroot is due to the way "/"
169works. Each process has two special symlinks, ".", and "/". Each of them
170points to the dentry of a directory, and give you a location paths can start
171from. (Historically ".." was also special, because you could enter a
172directory via a symlink so backing out to the directory you came from doesn't
173necessarily mean the one physically above where "." points to. These days I
174think it's just handed off to the filesystem.)
175
176Anyway, path resolution starts with "." or "/" (although the "./" at the start
177of the path may be implicit), meaning it's relative to one of those two
178directories. Your current directory, and your current root directory. The
179chdir() syscall changes where "." points to, and the chroot() syscall changes
180where "/" points to. (Again, both are per-process which is why chroot only
181affects your current process and its child processes.)
182
183Note that chroot() does _not_ change where "." points to, and back before they
184put crazy security checks into the kernel your current directory could be
185somewhere you could no longer access after the chroot. (The command line
186chroot does a cd as well, the chroot _syscall_ is what I'm talking about.)
187
188The reason mounting something new over / has no obvious effect is the same
189reason mounting something over your current directory has no obvious effect:
190the . and / links aren't recalculated after a mount, so they still point to
191the same dentry they did before, even if that dentry is no longer accessible
192by other means. Note that "cd ." is a NOP, and "chroot /" is a nop; both look
193up the cached dentry and set it right back. They don't re-parse any paths,
194because they're what all paths your process uses would be relative to.
195
196That's why the careful sequencing above: we cd into the new mount point before
197we do the mount --move. Moving the mount point would otherwise make it
198totally inaccessible to is because cd-ing to the old path wouldn't give it to
199us anymore, and cd "/" just gives us the cached dentry from when the process
200was created (in this case the old initramfs one). But the "." symlink gives
201us the dentry of the filesystem we just moved, so we can then "chroot ." to
202copy that dentry to "/" and get the new filesystem. If we _didn't_ save that
203dentry in "." we couldn't get it back after the mount --move.
204
205(Yes, this is all screwy and I had to email questions to Linus Torvalds to get
206it straight myself. I keep meaning to write up a "how mount actually works"
207document someday...)
208*/