1/* vi: set sw=4 ts=4: */ 2/* 3 * Copyright 2005 Rob Landley <rob@landley.net> 4 * 5 * Switch from rootfs to another filesystem as the root of the mount tree. 6 * 7 * Licensed under GPLv2, see file LICENSE in this source tree. 8 */ 9//config:config SWITCH_ROOT 10//config: bool "switch_root (5.5 kb)" 11//config: default y 12//config: help 13//config: The switch_root utility is used from initramfs to select a new 14//config: root device. Under initramfs, you have to use this instead of 15//config: pivot_root. (Stop reading here if you don't care why.) 16//config: 17//config: Booting with initramfs extracts a gzipped cpio archive into rootfs 18//config: (which is a variant of ramfs/tmpfs). Because rootfs can't be moved 19//config: or unmounted*, pivot_root will not work from initramfs. Instead, 20//config: switch_root deletes everything out of rootfs (including itself), 21//config: does a mount --move that overmounts rootfs with the new root, and 22//config: then execs the specified init program. 23//config: 24//config: * Because the Linux kernel uses rootfs internally as the starting 25//config: and ending point for searching through the kernel's doubly linked 26//config: list of active mount points. That's why. 27//config: 28// RUN_INIT config item is in klibc-utils 29 30//applet:IF_SWITCH_ROOT(APPLET(switch_root, BB_DIR_SBIN, BB_SUID_DROP)) 31// APPLET_ODDNAME:name main location suid_type help 32//applet:IF_RUN_INIT( APPLET_ODDNAME(run-init, switch_root, BB_DIR_SBIN, BB_SUID_DROP, run_init)) 33 34//kbuild:lib-$(CONFIG_SWITCH_ROOT) += switch_root.o 35//kbuild:lib-$(CONFIG_RUN_INIT) += switch_root.o 36 37#include <sys/vfs.h> 38#include <sys/mount.h> 39#if ENABLE_RUN_INIT 40# include <sys/prctl.h> 41# ifndef PR_CAPBSET_READ 42# define PR_CAPBSET_READ 23 43# endif 44# ifndef PR_CAPBSET_DROP 45# define PR_CAPBSET_DROP 24 46# endif 47# include <linux/capability.h> 48// #include <sys/capability.h> 49// This header is in libcap, but the functions are in libc. 50// Comment in the header says this above capset/capget: 51/* system calls - look to libc for function to system call mapping */ 52extern int capset(cap_user_header_t header, cap_user_data_t data); 53extern int capget(cap_user_header_t header, const cap_user_data_t data); 54// so for bbox, let's just repeat the declarations. 55// This way, libcap needs not be installed in build environment. 56#endif 57 58#include "libbb.h" 59 60// Make up for header deficiencies 61#ifndef RAMFS_MAGIC 62# define RAMFS_MAGIC ((unsigned)0x858458f6) 63#endif 64#ifndef TMPFS_MAGIC 65# define TMPFS_MAGIC ((unsigned)0x01021994) 66#endif 67#ifndef MS_MOVE 68# define MS_MOVE 8192 69#endif 70 71static void delete_contents(const char *directory, dev_t rootdev); 72 73static int FAST_FUNC rmrf(const char *directory, struct dirent *d, void *rootdevp) 74{ 75 char *newdir = concat_subpath_file(directory, d->d_name); 76 if (newdir) { // not . or .. 77 // Recurse to delete contents 78 delete_contents(newdir, *(dev_t*)rootdevp); 79 free(newdir); 80 } 81 return 0; 82} 83 84// Recursively delete contents of rootfs 85static void delete_contents(const char *directory, dev_t rootdev) 86{ 87 struct stat st; 88 89 // Don't descend into other filesystems 90 if (lstat(directory, &st) || st.st_dev != rootdev) 91 return; 92 93 // Recursively delete the contents of directories 94 if (S_ISDIR(st.st_mode)) { 95 iterate_on_dir(directory, rmrf, &rootdev); 96 } else { 97 // It wasn't a directory, zap it 98 unlink(directory); 99 } 100} 101 102#if ENABLE_RUN_INIT 103DEFINE_STRUCT_CAPS; 104 105static void drop_capset(int cap_idx) 106{ 107 struct caps caps; 108 109 getcaps(&caps); 110 caps.data[CAP_TO_INDEX(cap_idx)].inheritable &= ~CAP_TO_MASK(cap_idx); 111 if (capset(&caps.header, caps.data) != 0) 112 bb_simple_perror_msg_and_die("capset"); 113} 114 115static void drop_bounding_set(int cap_idx) 116{ 117 int ret; 118 119 ret = prctl(PR_CAPBSET_READ, cap_idx, 0, 0, 0); 120 if (ret < 0) 121 bb_perror_msg_and_die("prctl: %s", "PR_CAPBSET_READ"); 122 123 if (ret == 1) { 124 ret = prctl(PR_CAPBSET_DROP, cap_idx, 0, 0, 0); 125 if (ret != 0) 126 bb_perror_msg_and_die("prctl: %s", "PR_CAPBSET_DROP"); 127 } 128} 129 130static void drop_usermodehelper(const char *filename, int cap_idx) 131{ 132 unsigned lo, hi; 133 char buf[sizeof(int)*3 * 2 + 8]; 134 int fd; 135 int ret; 136 137 ret = open_read_close(filename, buf, sizeof(buf) - 1); 138 if (ret < 0) 139 return; /* assuming files do not exist */ 140 141 buf[ret] = '\0'; 142 ret = sscanf(buf, "%u %u", &lo, &hi); 143 if (ret != 2) 144 bb_perror_msg_and_die("can't parse file '%s'", filename); 145 146 if (cap_idx < 32) 147 lo &= ~(1 << cap_idx); 148 else 149 hi &= ~(1 << (cap_idx - 32)); 150 151 fd = xopen(filename, O_WRONLY); 152 fdprintf(fd, "%u %u", lo, hi); 153 close(fd); 154} 155 156static void drop_capabilities(char *string) 157{ 158 char *cap; 159 160 cap = strtok_r(string, ",", &string); 161 while (cap) { 162 unsigned cap_idx; 163 164 cap_idx = cap_name_to_number(cap); 165 drop_usermodehelper("/proc/sys/kernel/usermodehelper/bset", cap_idx); 166 drop_usermodehelper("/proc/sys/kernel/usermodehelper/inheritable", cap_idx); 167 drop_bounding_set(cap_idx); 168 drop_capset(cap_idx); 169 bb_error_msg("dropped capability: %s", cap); 170 cap = strtok_r(NULL, ",", &string); 171 } 172} 173#endif 174 175int switch_root_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE; 176int switch_root_main(int argc UNUSED_PARAM, char **argv) 177{ 178 char *newroot, *console = NULL; 179 struct stat st; 180 struct statfs stfs; 181 unsigned dry_run = 0; 182 dev_t rootdev; 183 184 // Parse args. '+': stop at first non-option 185 if (ENABLE_SWITCH_ROOT && (!ENABLE_RUN_INIT || applet_name[0] == 's')) { 186//usage:#define switch_root_trivial_usage 187//usage: "[-c CONSOLE_DEV] NEW_ROOT NEW_INIT [ARGS]" 188//usage:#define switch_root_full_usage "\n\n" 189//usage: "Free initramfs and switch to another root fs:\n" 190//usage: "chroot to NEW_ROOT, delete all in /, move NEW_ROOT to /,\n" 191//usage: "execute NEW_INIT. PID must be 1. NEW_ROOT must be a mountpoint.\n" 192//usage: "\n -c DEV Reopen stdio to DEV after switch" 193 getopt32(argv, "^+" 194 "c:" 195 "\0" "-2" /* minimum 2 args */, 196 &console 197 ); 198 } else { 199#if ENABLE_RUN_INIT 200//usage:#define run_init_trivial_usage 201//usage: "[-d CAP,CAP...] [-n] [-c CONSOLE_DEV] NEW_ROOT NEW_INIT [ARGS]" 202//usage:#define run_init_full_usage "\n\n" 203//usage: "Free initramfs and switch to another root fs:\n" 204//usage: "chroot to NEW_ROOT, delete all in /, move NEW_ROOT to /,\n" 205//usage: "execute NEW_INIT. PID must be 1. NEW_ROOT must be a mountpoint.\n" 206//usage: "\n -c DEV Reopen stdio to DEV after switch" 207//usage: "\n -d CAPS Drop capabilities" 208//usage: "\n -n Dry run" 209 char *cap_list = NULL; 210 dry_run = getopt32(argv, "^+" 211 "c:d:n" 212 "\0" "-2" /* minimum 2 args */, 213 &console, 214 &cap_list 215 ); 216 dry_run >>= 2; // -n 217 if (cap_list) 218 drop_capabilities(cap_list); 219#endif 220 } 221 argv += optind; 222 newroot = *argv++; 223 224 // Change to new root directory and verify it's a different fs 225 xchdir(newroot); 226 xstat("/", &st); 227 rootdev = st.st_dev; 228 xstat(".", &st); 229 if (st.st_dev == rootdev) { 230 // Show usage, it says new root must be a mountpoint 231 bb_show_usage(); 232 } 233 if (!dry_run && getpid() != 1) { 234 // Show usage, it says we must be PID 1 235 bb_show_usage(); 236 } 237 238 // Additional sanity checks: we're about to rm -rf /, so be REALLY SURE 239 // we mean it. I could make this a CONFIG option, but I would get email 240 // from all the people who WILL destroy their filesystems. 241 if (stat("/init", &st) != 0 || !S_ISREG(st.st_mode)) { 242 bb_error_msg_and_die("'%s' is not a regular file", "/init"); 243 } 244 statfs("/", &stfs); // this never fails 245 if ((unsigned)stfs.f_type != RAMFS_MAGIC 246 && (unsigned)stfs.f_type != TMPFS_MAGIC 247 ) { 248 bb_simple_error_msg_and_die("root filesystem is not ramfs/tmpfs"); 249 } 250 251 if (!dry_run) { 252 // Zap everything out of rootdev 253 delete_contents("/", rootdev); 254 255 // Overmount / with newdir and chroot into it 256 if (mount(".", "/", NULL, MS_MOVE, NULL)) { 257 // For example, fails when newroot is not a mountpoint 258 bb_simple_perror_msg_and_die("error moving root"); 259 } 260 } 261 xchroot("."); 262 // The chdir is needed to recalculate "." and ".." links 263 /*xchdir("/"); - done in xchroot */ 264 265 // If a new console specified, redirect stdin/stdout/stderr to it 266 if (console) { 267 int fd = open_or_warn(console, O_RDWR); 268 if (fd >= 0) { 269 xmove_fd(fd, 0); 270 xdup2(0, 1); 271 xdup2(0, 2); 272 } 273 } 274 275 if (dry_run) { 276 // Does NEW_INIT look like it can be executed? 277 //xstat(argv[0], &st); 278 //if (!S_ISREG(st.st_mode)) 279 // bb_perror_msg_and_die("'%s' is not a regular file", argv[0]); 280 if (access(argv[0], X_OK) == 0) 281 return 0; 282 } else { 283 // Exec NEW_INIT 284 execv(argv[0], argv); 285 } 286 bb_perror_msg_and_die("can't execute '%s'", argv[0]); 287} 288 289/* 290From: Rob Landley <rob@landley.net> 291Date: Tue, Jun 16, 2009 at 7:47 PM 292Subject: Re: switch_root... 293 294... 295... 296... 297 298If you're _not_ running out of init_ramfs (if for example you're using initrd 299instead), you probably shouldn't use switch_root because it's the wrong tool. 300 301Basically what the sucker does is something like the following shell script: 302 303 find / -xdev | xargs rm -rf 304 cd "$1" 305 shift 306 mount --move . / 307 exec chroot . "$@" 308 309There are a couple reasons that won't work as a shell script: 310 3111) If you delete the commands out of your $PATH, your shell scripts can't run 312more commands, but you can't start using dynamically linked _new_ commands 313until after you do the chroot because the path to the dynamic linker is wrong. 314So there's a step that needs to be sort of atomic but can't be as a shell 315script. (You can work around this with static linking or very carefully laid 316out paths and sequencing, but it's brittle, ugly, and non-obvious.) 317 3182) The "find | rm" bit will actually delete everything because the mount points 319still show up (even if their contents don't), and rm -rf will then happily zap 320that. So the first line is an oversimplification of what you need to do _not_ 321to descend into other filesystems and delete their contents. 322 323The reason we do this is to free up memory, by the way. Since initramfs is a 324ramfs, deleting its contents frees up the memory it uses. (We leave it with 325one remaining dentry for the new mount point, but that's ok.) 326 327Note that you cannot ever umount rootfs, for approximately the same reason you 328can't kill PID 1. The kernel tracks mount points as a doubly linked list, and 329the pointer to the start/end of that list always points to an entry that's 330known to be there (rootfs), so it never has to worry about moving that pointer 331and it never has to worry about the list being empty. (Back around 2.6.13 332there _was_ a bug that let you umount rootfs, and the system locked hard the 333instant you did so endlessly looping to find the end of the mount list and 334never stopping. They fixed it.) 335 336Oh, and the reason we mount --move _and_ do the chroot is due to the way "/" 337works. Each process has two special symlinks, ".", and "/". Each of them 338points to the dentry of a directory, and give you a location paths can start 339from. (Historically ".." was also special, because you could enter a 340directory via a symlink so backing out to the directory you came from doesn't 341necessarily mean the one physically above where "." points to. These days I 342think it's just handed off to the filesystem.) 343 344Anyway, path resolution starts with "." or "/" (although the "./" at the start 345of the path may be implicit), meaning it's relative to one of those two 346directories. Your current directory, and your current root directory. The 347chdir() syscall changes where "." points to, and the chroot() syscall changes 348where "/" points to. (Again, both are per-process which is why chroot only 349affects your current process and its child processes.) 350 351Note that chroot() does _not_ change where "." points to, and back before they 352put crazy security checks into the kernel your current directory could be 353somewhere you could no longer access after the chroot. (The command line 354chroot does a cd as well, the chroot _syscall_ is what I'm talking about.) 355 356The reason mounting something new over / has no obvious effect is the same 357reason mounting something over your current directory has no obvious effect: 358the . and / links aren't recalculated after a mount, so they still point to 359the same dentry they did before, even if that dentry is no longer accessible 360by other means. Note that "cd ." is a NOP, and "chroot /" is a nop; both look 361up the cached dentry and set it right back. They don't re-parse any paths, 362because they're what all paths your process uses would be relative to. 363 364That's why the careful sequencing above: we cd into the new mount point before 365we do the mount --move. Moving the mount point would otherwise make it 366totally inaccessible to us because cd-ing to the old path wouldn't give it to 367us anymore, and cd "/" just gives us the cached dentry from when the process 368was created (in this case the old initramfs one). But the "." symlink gives 369us the dentry of the filesystem we just moved, so we can then "chroot ." to 370copy that dentry to "/" and get the new filesystem. If we _didn't_ save that 371dentry in "." we couldn't get it back after the mount --move. 372 373(Yes, this is all screwy and I had to email questions to Linus Torvalds to get 374it straight myself. I keep meaning to write up a "how mount actually works" 375document someday...) 376*/ 377