Ignore:
Timestamp:
Feb 25, 2011, 9:26:54 PM (13 years ago)
Author:
Bruno Cornec
Message:
  • Update mindi-busybox to 1.18.3 to avoid problems with the tar command which is now failing on recent versions with busybox 1.7.3
File:
1 edited

Legend:

Unmodified
Added
Removed
  • branches/2.2.9/mindi-busybox/util-linux/switch_root.c

    r1765 r2725  
    44 * Switch from rootfs to another filesystem as the root of the mount tree.
    55 *
    6  * Licensed under GPL version 2, see file LICENSE in this tarball for details.
     6 * Licensed under GPLv2, see file LICENSE in this source tree.
    77 */
    8 
     8#include <sys/vfs.h>
     9#include <sys/mount.h>
    910#include "libbb.h"
    10 #include <sys/vfs.h>
    11 
    12 
    13 // Make up for header deficiencies.
    14 
     11// Make up for header deficiencies
    1512#ifndef RAMFS_MAGIC
    16 #define RAMFS_MAGIC     0x858458f6
     13# define RAMFS_MAGIC ((unsigned)0x858458f6)
    1714#endif
    18 
    1915#ifndef TMPFS_MAGIC
    20 #define TMPFS_MAGIC     0x01021994
     16# define TMPFS_MAGIC ((unsigned)0x01021994)
    2117#endif
    22 
    2318#ifndef MS_MOVE
    24 #define MS_MOVE         8192
     19# define MS_MOVE     8192
    2520#endif
    2621
    27 static dev_t rootdev;
    28 
    29 // Recursively delete contents of rootfs.
    30 
    31 static void delete_contents(const char *directory)
     22// Recursively delete contents of rootfs
     23static void delete_contents(const char *directory, dev_t rootdev)
    3224{
    3325    DIR *dir;
     
    3628
    3729    // Don't descend into other filesystems
    38     if (lstat(directory, &st) || st.st_dev != rootdev) return;
    39 
    40     // Recursively delete the contents of directories.
     30    if (lstat(directory, &st) || st.st_dev != rootdev)
     31        return;
     32
     33    // Recursively delete the contents of directories
    4134    if (S_ISDIR(st.st_mode)) {
    4235        dir = opendir(directory);
     
    4639
    4740                // Skip . and ..
    48                 if (*newdir=='.' && (!newdir[1] || (newdir[1]=='.' && !newdir[2])))
     41                if (DOT_OR_DOTDOT(newdir))
    4942                    continue;
    5043
    5144                // Recurse to delete contents
    52                 newdir = alloca(strlen(directory) + strlen(d->d_name) + 2);
    53                 sprintf(newdir, "%s/%s", directory, d->d_name);
    54                 delete_contents(newdir);
     45                newdir = concat_path_file(directory, newdir);
     46                delete_contents(newdir, rootdev);
     47                free(newdir);
    5548            }
    5649            closedir(dir);
    5750
    58             // Directory should now be empty.  Zap it.
     51            // Directory should now be empty, zap it
    5952            rmdir(directory);
    6053        }
    61 
    62     // It wasn't a directory.  Zap it.
    63 
    64     } else unlink(directory);
     54    } else {
     55        // It wasn't a directory, zap it
     56        unlink(directory);
     57    }
    6558}
    6659
    67 int switch_root_main(int argc, char **argv);
    68 int switch_root_main(int argc, char **argv)
     60int switch_root_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
     61int switch_root_main(int argc UNUSED_PARAM, char **argv)
    6962{
    7063    char *newroot, *console = NULL;
    71     struct stat st1, st2;
     64    struct stat st;
    7265    struct statfs stfs;
     66    dev_t rootdev;
    7367
    7468    // Parse args (-c console)
    75 
    76     opt_complementary = "-2";
    77     getopt32(argv, "c:", &console);
     69    opt_complementary = "-2"; // minimum 2 params
     70    getopt32(argv, "+c:", &console); // '+': stop at first non-option
    7871    argv += optind;
    79 
    80     // Change to new root directory and verify it's a different fs.
    81 
    8272    newroot = *argv++;
    8373
     74    // Change to new root directory and verify it's a different fs
    8475    xchdir(newroot);
    85     if (lstat(".", &st1) || lstat("/", &st2) || st1.st_dev == st2.st_dev) {
    86         bb_error_msg_and_die("bad newroot %s", newroot);
    87     }
    88     rootdev = st2.st_dev;
    89 
    90     // Additional sanity checks: we're about to rm -rf /,  so be REALLY SURE
    91     // we mean it.  (I could make this a CONFIG option, but I would get email
    92     // from all the people who WILL eat their filesystems.)
    93 
    94     if (lstat("/init", &st1) || !S_ISREG(st1.st_mode) || statfs("/", &stfs) ||
    95         (stfs.f_type != RAMFS_MAGIC && stfs.f_type != TMPFS_MAGIC) ||
    96         getpid() != 1)
    97     {
    98         bb_error_msg_and_die("not rootfs");
     76    xstat("/", &st);
     77    rootdev = st.st_dev;
     78    xstat(".", &st);
     79    if (st.st_dev == rootdev || getpid() != 1) {
     80        // Show usage, it says new root must be a mountpoint
     81        // and we must be PID 1
     82        bb_show_usage();
     83    }
     84
     85    // Additional sanity checks: we're about to rm -rf /, so be REALLY SURE
     86    // we mean it. I could make this a CONFIG option, but I would get email
     87    // from all the people who WILL destroy their filesystems.
     88    if (stat("/init", &st) != 0 || !S_ISREG(st.st_mode)) {
     89        bb_error_msg_and_die("/init is not a regular file");
     90    }
     91    statfs("/", &stfs); // this never fails
     92    if ((unsigned)stfs.f_type != RAMFS_MAGIC
     93     && (unsigned)stfs.f_type != TMPFS_MAGIC
     94    ) {
     95        bb_error_msg_and_die("root filesystem is not ramfs/tmpfs");
    9996    }
    10097
    10198    // Zap everything out of rootdev
    102 
    103     delete_contents("/");
    104 
    105     // Overmount / with newdir and chroot into it.  The chdir is needed to
    106     // recalculate "." and ".." links.
    107 
    108     if (mount(".", "/", NULL, MS_MOVE, NULL) || chroot("."))
    109         bb_error_msg_and_die("error moving root");
     99    delete_contents("/", rootdev);
     100
     101    // Overmount / with newdir and chroot into it
     102    if (mount(".", "/", NULL, MS_MOVE, NULL)) {
     103        // For example, fails when newroot is not a mountpoint
     104        bb_perror_msg_and_die("error moving root");
     105    }
     106    xchroot(".");
     107    // The chdir is needed to recalculate "." and ".." links
    110108    xchdir("/");
    111109
    112     // If a new console specified, redirect stdin/stdout/stderr to that.
    113 
     110    // If a new console specified, redirect stdin/stdout/stderr to it
    114111    if (console) {
    115112        close(0);
    116113        xopen(console, O_RDWR);
    117         dup2(0, 1);
    118         dup2(0, 2);
    119     }
    120 
    121     // Exec real init.  (This is why we must be pid 1.)
     114        xdup2(0, 1);
     115        xdup2(0, 2);
     116    }
     117
     118    // Exec real init
    122119    execv(argv[0], argv);
    123     bb_perror_msg_and_die("bad init %s", argv[0]);
     120    bb_perror_msg_and_die("can't execute '%s'", argv[0]);
    124121}
     122
     123/*
     124From: Rob Landley <rob@landley.net>
     125Date: Tue, Jun 16, 2009 at 7:47 PM
     126Subject: Re: switch_root...
     127
     128...
     129...
     130...
     131
     132If you're _not_ running out of init_ramfs (if for example you're using initrd
     133instead), you probably shouldn't use switch_root because it's the wrong tool.
     134
     135Basically what the sucker does is something like the following shell script:
     136
     137 find / -xdev | xargs rm -rf
     138 cd "$1"
     139 shift
     140 mount --move . /
     141 exec chroot . "$@"
     142
     143There are a couple reasons that won't work as a shell script:
     144
     1451) If you delete the commands out of your $PATH, your shell scripts can't run
     146more commands, but you can't start using dynamically linked _new_ commands
     147until after you do the chroot because the path to the dynamic linker is wrong.
     148So there's a step that needs to be sort of atomic but can't be as a shell
     149script.  (You can work around this with static linking or very carefully laid
     150out paths and sequencing, but it's brittle, ugly, and non-obvious.)
     151
     1522) The "find | rm" bit will acually delete everything because the mount points
     153still show up (even if their contents don't), and rm -rf will then happily zap
     154that.  So the first line is an oversimplification of what you need to do _not_
     155to descend into other filesystems and delete their contents.
     156
     157The reason we do this is to free up memory, by the way.  Since initramfs is a
     158ramfs, deleting its contents frees up the memory it uses.  (We leave it with
     159one remaining dentry for the new mount point, but that's ok.)
     160
     161Note that you cannot ever umount rootfs, for approximately the same reason you
     162can't kill PID 1.  The kernel tracks mount points as a doubly linked list, and
     163the pointer to the start/end of that list always points to an entry that's
     164known to be there (rootfs), so it never has to worry about moving that pointer
     165and it never has to worry about the list being empty.  (Back around 2.6.13
     166there _was_ a bug that let you umount rootfs, and the system locked hard the
     167instant you did so endlessly looping to find the end of the mount list and
     168never stopping.  They fixed it.)
     169
     170Oh, and the reason we mount --move _and_ do the chroot is due to the way "/"
     171works.  Each process has two special symlinks, ".", and "/".  Each of them
     172points to the dentry of a directory, and give you a location paths can start
     173from.  (Historically ".." was also special, because you could enter a
     174directory via a symlink so backing out to the directory you came from doesn't
     175necessarily mean the one physically above where "." points to.  These days I
     176think it's just handed off to the filesystem.)
     177
     178Anyway, path resolution starts with "." or "/" (although the "./" at the start
     179of the path may be implicit), meaning it's relative to one of those two
     180directories.  Your current directory, and your current root directory.  The
     181chdir() syscall changes where "." points to, and the chroot() syscall changes
     182where "/" points to.  (Again, both are per-process which is why chroot only
     183affects your current process and its child processes.)
     184
     185Note that chroot() does _not_ change where "." points to, and back before they
     186put crazy security checks into the kernel your current directory could be
     187somewhere you could no longer access after the chroot.  (The command line
     188chroot does a cd as well, the chroot _syscall_ is what I'm talking about.)
     189
     190The reason mounting something new over / has no obvious effect is the same
     191reason mounting something over your current directory has no obvious effect:
     192the . and / links aren't recalculated after a mount, so they still point to
     193the same dentry they did before, even if that dentry is no longer accessible
     194by other means.  Note that "cd ." is a NOP, and "chroot /" is a nop; both look
     195up the cached dentry and set it right back.  They don't re-parse any paths,
     196because they're what all paths your process uses would be relative to.
     197
     198That's why the careful sequencing above: we cd into the new mount point before
     199we do the mount --move.  Moving the mount point would otherwise make it
     200totally inaccessible to is because cd-ing to the old path wouldn't give it to
     201us anymore, and cd "/" just gives us the cached dentry from when the process
     202was created (in this case the old initramfs one).  But the "." symlink gives
     203us the dentry of the filesystem we just moved, so we can then "chroot ." to
     204copy that dentry to "/" and get the new filesystem.  If we _didn't_ save that
     205dentry in "." we couldn't get it back after the mount --move.
     206
     207(Yes, this is all screwy and I had to email questions to Linus Torvalds to get
     208it straight myself.  I keep meaning to write up a "how mount actually works"
     209document someday...)
     210*/
Note: See TracChangeset for help on using the changeset viewer.