switch_root: improve behavior on error; improve help text
*: make "can't execute '%s'" message uniform
This commit is contained in:
parent
950bd72966
commit
f9d4fc3cf8
@ -52,7 +52,7 @@ void FAST_FUNC open_transformer(int fd,
|
|||||||
argv[2] = (char*)"-";
|
argv[2] = (char*)"-";
|
||||||
argv[3] = NULL;
|
argv[3] = NULL;
|
||||||
BB_EXECVP(transform_prog, argv);
|
BB_EXECVP(transform_prog, argv);
|
||||||
bb_perror_msg_and_die("can't exec %s", transform_prog);
|
bb_perror_msg_and_die("can't execute '%s'", transform_prog);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
/* notreached */
|
/* notreached */
|
||||||
|
@ -577,7 +577,7 @@ static void NOINLINE vfork_compressor(int tar_fd, int gzip)
|
|||||||
#endif
|
#endif
|
||||||
if (vfork_exec_errno) {
|
if (vfork_exec_errno) {
|
||||||
errno = vfork_exec_errno;
|
errno = vfork_exec_errno;
|
||||||
bb_perror_msg_and_die("cannot exec %s", zip_exec);
|
bb_perror_msg_and_die("can't execute '%s'", zip_exec);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
#endif /* ENABLE_FEATURE_SEAMLESS_GZ || ENABLE_FEATURE_SEAMLESS_BZ2 */
|
#endif /* ENABLE_FEATURE_SEAMLESS_GZ || ENABLE_FEATURE_SEAMLESS_BZ2 */
|
||||||
|
@ -33,5 +33,5 @@ int chroot_main(int argc, char **argv)
|
|||||||
}
|
}
|
||||||
|
|
||||||
BB_EXECVP(*argv, argv);
|
BB_EXECVP(*argv, argv);
|
||||||
bb_perror_msg_and_die("cannot execute %s", *argv);
|
bb_perror_msg_and_die("can't execute '%s'", *argv);
|
||||||
}
|
}
|
||||||
|
@ -164,7 +164,7 @@ int run_parts_main(int argc UNUSED_PARAM, char **argv)
|
|||||||
continue;
|
continue;
|
||||||
n = 1;
|
n = 1;
|
||||||
if (ret < 0)
|
if (ret < 0)
|
||||||
bb_perror_msg("can't exec %s", name);
|
bb_perror_msg("can't execute '%s'", name);
|
||||||
else /* ret > 0 */
|
else /* ret > 0 */
|
||||||
bb_error_msg("%s exited with code %d", name, ret);
|
bb_error_msg("%s exited with code %d", name, ret);
|
||||||
}
|
}
|
||||||
|
@ -4125,12 +4125,13 @@
|
|||||||
) \
|
) \
|
||||||
|
|
||||||
#define switch_root_trivial_usage \
|
#define switch_root_trivial_usage \
|
||||||
"[-c /dev/console] NEW_ROOT NEW_INIT [ARGUMENTS_TO_INIT]"
|
"[-c /dev/console] NEW_ROOT NEW_INIT [ARG...]"
|
||||||
#define switch_root_full_usage "\n\n" \
|
#define switch_root_full_usage "\n\n" \
|
||||||
"Use from PID 1 under initramfs to free initramfs, chroot to NEW_ROOT,\n" \
|
"Free initramfs and switch to another root fs:\n" \
|
||||||
"and exec NEW_INIT\n" \
|
"chroot to NEW_ROOT, delete all in /, move NEW_ROOT to /,\n" \
|
||||||
|
"execute NEW_INIT. PID must be 1. NEW_ROOT must be a mountpoint.\n" \
|
||||||
"\nOptions:" \
|
"\nOptions:" \
|
||||||
"\n -c Redirect console to device on new root" \
|
"\n -c DEV Reopen stdio to DEV after switch" \
|
||||||
|
|
||||||
#define sync_trivial_usage \
|
#define sync_trivial_usage \
|
||||||
""
|
""
|
||||||
@ -4142,7 +4143,7 @@
|
|||||||
#define sysctl_full_usage "\n\n" \
|
#define sysctl_full_usage "\n\n" \
|
||||||
"Configure kernel parameters at runtime\n" \
|
"Configure kernel parameters at runtime\n" \
|
||||||
"\nOptions:" \
|
"\nOptions:" \
|
||||||
"\n -n Disable printing of key names" \
|
"\n -n Don't print key names" \
|
||||||
"\n -e Don't warn about unknown keys" \
|
"\n -e Don't warn about unknown keys" \
|
||||||
"\n -w Change sysctl setting" \
|
"\n -w Change sysctl setting" \
|
||||||
"\n -p FILE Load sysctl settings from FILE (default /etc/sysctl.conf)" \
|
"\n -p FILE Load sysctl settings from FILE (default /etc/sysctl.conf)" \
|
||||||
|
@ -60,7 +60,7 @@ static void passwd_wrapper(const char *login)
|
|||||||
static const char prog[] ALIGN1 = "passwd";
|
static const char prog[] ALIGN1 = "passwd";
|
||||||
|
|
||||||
BB_EXECLP(prog, prog, login, NULL);
|
BB_EXECLP(prog, prog, login, NULL);
|
||||||
bb_error_msg_and_die("cannot execute %s, you must set password manually", prog);
|
bb_error_msg_and_die("can't execute %s, you must set password manually", prog);
|
||||||
}
|
}
|
||||||
|
|
||||||
#if ENABLE_FEATURE_ADDUSER_LONG_OPTIONS
|
#if ENABLE_FEATURE_ADDUSER_LONG_OPTIONS
|
||||||
|
@ -129,10 +129,10 @@ int runcon_main(int argc UNUSED_PARAM, char **argv)
|
|||||||
context_str(con));
|
context_str(con));
|
||||||
|
|
||||||
if (setexeccon(context_str(con)))
|
if (setexeccon(context_str(con)))
|
||||||
bb_error_msg_and_die("cannot set up security context '%s'",
|
bb_error_msg_and_die("can't set up security context '%s'",
|
||||||
context_str(con));
|
context_str(con));
|
||||||
|
|
||||||
execvp(argv[0], argv);
|
execvp(argv[0], argv);
|
||||||
|
|
||||||
bb_perror_msg_and_die("cannot execute '%s'", argv[0]);
|
bb_perror_msg_and_die("can't execute '%s'", argv[0]);
|
||||||
}
|
}
|
||||||
|
@ -73,5 +73,5 @@ int cttyhack_main(int argc UNUSED_PARAM, char **argv)
|
|||||||
}
|
}
|
||||||
|
|
||||||
BB_EXECVP(argv[0], argv);
|
BB_EXECVP(argv[0], argv);
|
||||||
bb_perror_msg_and_die("cannot exec '%s'", argv[0]);
|
bb_perror_msg_and_die("can't execute '%s'", argv[0]);
|
||||||
}
|
}
|
||||||
|
@ -3048,7 +3048,7 @@ static void pseudo_exec_argv(nommu_save_t *nommu_save,
|
|||||||
debug_printf_exec("execing '%s'\n", argv[0]);
|
debug_printf_exec("execing '%s'\n", argv[0]);
|
||||||
sigprocmask(SIG_SETMASK, &G.inherited_set, NULL);
|
sigprocmask(SIG_SETMASK, &G.inherited_set, NULL);
|
||||||
execvp(argv[0], argv);
|
execvp(argv[0], argv);
|
||||||
bb_perror_msg("can't exec '%s'", argv[0]);
|
bb_perror_msg("can't execute '%s'", argv[0]);
|
||||||
_exit(EXIT_FAILURE);
|
_exit(EXIT_FAILURE);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -5,11 +5,10 @@
|
|||||||
*
|
*
|
||||||
* Licensed under GPL version 2, see file LICENSE in this tarball for details.
|
* Licensed under GPL version 2, see file LICENSE in this tarball for details.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#include "libbb.h"
|
#include "libbb.h"
|
||||||
#include <sys/vfs.h>
|
#include <sys/vfs.h>
|
||||||
|
|
||||||
// Make up for header deficiencies.
|
// Make up for header deficiencies
|
||||||
#ifndef RAMFS_MAGIC
|
#ifndef RAMFS_MAGIC
|
||||||
#define RAMFS_MAGIC ((unsigned)0x858458f6)
|
#define RAMFS_MAGIC ((unsigned)0x858458f6)
|
||||||
#endif
|
#endif
|
||||||
@ -22,7 +21,7 @@
|
|||||||
#define MS_MOVE 8192
|
#define MS_MOVE 8192
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
// Recursively delete contents of rootfs.
|
// Recursively delete contents of rootfs
|
||||||
static void delete_contents(const char *directory, dev_t rootdev)
|
static void delete_contents(const char *directory, dev_t rootdev)
|
||||||
{
|
{
|
||||||
DIR *dir;
|
DIR *dir;
|
||||||
@ -33,7 +32,7 @@ static void delete_contents(const char *directory, dev_t rootdev)
|
|||||||
if (lstat(directory, &st) || st.st_dev != rootdev)
|
if (lstat(directory, &st) || st.st_dev != rootdev)
|
||||||
return;
|
return;
|
||||||
|
|
||||||
// Recursively delete the contents of directories.
|
// Recursively delete the contents of directories
|
||||||
if (S_ISDIR(st.st_mode)) {
|
if (S_ISDIR(st.st_mode)) {
|
||||||
dir = opendir(directory);
|
dir = opendir(directory);
|
||||||
if (dir) {
|
if (dir) {
|
||||||
@ -51,42 +50,47 @@ static void delete_contents(const char *directory, dev_t rootdev)
|
|||||||
}
|
}
|
||||||
closedir(dir);
|
closedir(dir);
|
||||||
|
|
||||||
// Directory should now be empty. Zap it.
|
// Directory should now be empty, zap it
|
||||||
rmdir(directory);
|
rmdir(directory);
|
||||||
}
|
}
|
||||||
|
} else {
|
||||||
// It wasn't a directory. Zap it.
|
// It wasn't a directory, zap it
|
||||||
} else unlink(directory);
|
unlink(directory);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
int switch_root_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
|
int switch_root_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
|
||||||
int switch_root_main(int argc UNUSED_PARAM, char **argv)
|
int switch_root_main(int argc UNUSED_PARAM, char **argv)
|
||||||
{
|
{
|
||||||
char *newroot, *console = NULL;
|
char *newroot, *console = NULL;
|
||||||
struct stat st1, st2;
|
struct stat st;
|
||||||
struct statfs stfs;
|
struct statfs stfs;
|
||||||
dev_t rootdev;
|
dev_t rootdev;
|
||||||
|
|
||||||
// Parse args (-c console)
|
// Parse args (-c console)
|
||||||
opt_complementary = "-2"; // minimum 2 params
|
opt_complementary = "-2"; // minimum 2 params
|
||||||
getopt32(argv, "+c:", &console); // '+': stop parsing at first non-option
|
getopt32(argv, "+c:", &console); // '+': stop at first non-option
|
||||||
argv += optind;
|
argv += optind;
|
||||||
|
|
||||||
// Change to new root directory and verify it's a different fs.
|
|
||||||
newroot = *argv++;
|
newroot = *argv++;
|
||||||
|
|
||||||
|
// Change to new root directory and verify it's a different fs
|
||||||
xchdir(newroot);
|
xchdir(newroot);
|
||||||
if (lstat(".", &st1) || lstat("/", &st2) || st1.st_dev == st2.st_dev) {
|
xstat("/", &st);
|
||||||
bb_error_msg_and_die("bad newroot %s", newroot);
|
rootdev = st.st_dev;
|
||||||
|
xstat(".", &st);
|
||||||
|
if (st.st_dev == rootdev || getpid() != 1) {
|
||||||
|
// Show usage, it says new root must be a mountpoint
|
||||||
|
// and we must be PID 1
|
||||||
|
bb_show_usage();
|
||||||
}
|
}
|
||||||
rootdev = st2.st_dev;
|
|
||||||
|
|
||||||
// Additional sanity checks: we're about to rm -rf /, so be REALLY SURE
|
// Additional sanity checks: we're about to rm -rf /, so be REALLY SURE
|
||||||
// we mean it. (I could make this a CONFIG option, but I would get email
|
// we mean it. I could make this a CONFIG option, but I would get email
|
||||||
// from all the people who WILL eat their filesystems.)
|
// from all the people who WILL destroy their filesystems.
|
||||||
if (lstat("/init", &st1) || !S_ISREG(st1.st_mode) || statfs("/", &stfs)
|
statfs("/", &stfs); // this never fails
|
||||||
|| (((unsigned)stfs.f_type != RAMFS_MAGIC) && ((unsigned)stfs.f_type != TMPFS_MAGIC))
|
if (lstat("/init", &st) != 0 || !S_ISREG(st.st_mode)
|
||||||
|| (getpid() != 1)
|
|| ((unsigned)stfs.f_type != RAMFS_MAGIC
|
||||||
|
&& (unsigned)stfs.f_type != TMPFS_MAGIC)
|
||||||
) {
|
) {
|
||||||
bb_error_msg_and_die("not rootfs");
|
bb_error_msg_and_die("not rootfs");
|
||||||
}
|
}
|
||||||
@ -94,14 +98,16 @@ int switch_root_main(int argc UNUSED_PARAM, char **argv)
|
|||||||
// Zap everything out of rootdev
|
// Zap everything out of rootdev
|
||||||
delete_contents("/", rootdev);
|
delete_contents("/", rootdev);
|
||||||
|
|
||||||
// Overmount / with newdir and chroot into it. The chdir is needed to
|
// Overmount / with newdir and chroot into it
|
||||||
// recalculate "." and ".." links.
|
if (mount(".", "/", NULL, MS_MOVE, NULL)) {
|
||||||
if (mount(".", "/", NULL, MS_MOVE, NULL))
|
// For example, fails when newroot is not a mountpoint
|
||||||
bb_perror_msg_and_die("error moving root");
|
bb_perror_msg_and_die("error moving root");
|
||||||
|
}
|
||||||
|
// The chdir is needed to recalculate "." and ".." links
|
||||||
xchroot(".");
|
xchroot(".");
|
||||||
xchdir("/");
|
xchdir("/");
|
||||||
|
|
||||||
// If a new console specified, redirect stdin/stdout/stderr to that.
|
// If a new console specified, redirect stdin/stdout/stderr to it
|
||||||
if (console) {
|
if (console) {
|
||||||
close(0);
|
close(0);
|
||||||
xopen(console, O_RDWR);
|
xopen(console, O_RDWR);
|
||||||
@ -109,7 +115,7 @@ int switch_root_main(int argc UNUSED_PARAM, char **argv)
|
|||||||
xdup2(0, 2);
|
xdup2(0, 2);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Exec real init. (This is why we must be pid 1.)
|
// Exec real init
|
||||||
execv(argv[0], argv);
|
execv(argv[0], argv);
|
||||||
bb_perror_msg_and_die("bad init %s", argv[0]);
|
bb_perror_msg_and_die("can't execute '%s'", argv[0]);
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user