public inbox for linux-fsdevel@vger.kernel.org
 help / color / mirror / Atom feed
* [PATCH 0/3] fs: add immutable rootfs and support pivot_root() in the initramfs
@ 2026-01-02 14:36 Christian Brauner
  2026-01-02 14:36 ` [PATCH 1/3] fs: ensure that internal tmpfs mount gets mount id zero Christian Brauner
                   ` (2 more replies)
  0 siblings, 3 replies; 16+ messages in thread
From: Christian Brauner @ 2026-01-02 14:36 UTC (permalink / raw)
  To: linux-fsdevel
  Cc: Alexander Viro, Jan Kara, Jeff Layton, Amir Goldstein,
	Lennart Poettering, Zbigniew Jędrzejewski-Szmek, Josef Bacik,
	Christian Brauner, stable

Currently pivot_root() doesnt't work on the real rootfs because it
cannot be unmounted. Userspace has to do a recursive removal of the
initramfs contents manually before continuing the boot.

Really all we want from the real rootfs is to serve as the parent mount
for anything that is actually useful such as the tmpfs or ramfs for
initramfs unpacking or the rootfs itself. There's no need for the real
rootfs to actually be anything meaningful or useful. Add a immutable
rootfs that can be selected via the "immutable_rootfs" kernel command
line option.

The kernel will mount a tmpfs/ramfs on top of it, unpack the initramfs
and fire up userspace which mounts the rootfs and can then just do:

  chdir(rootfs);
  pivot_root(".", ".");
  umount2(".", MNT_DETACH);

and be done with it. (Ofc, userspace can also choose to retain the
initramfs contents by using something like pivot_root(".", "/initramfs")
without unmounting it.)

Technically this also means that the rootfs mount in unprivileged
namespaces doesn't need to become MNT_LOCKED anymore as it's guaranteed
that the immutable rootfs remains permanently empty so there cannot be
anything revealed by unmounting the covering mount.

In the future this will also allow us to create completely empty mount
namespaces without risking to leak anything.

systemd already handles this all correctly as it tries to pivot_root()
first and falls back to MS_MOVE only when that fails.

This goes back to various discussion in previous years and a LPC 2024
presentation about this very topic.

Signed-off-by: Christian Brauner <brauner@kernel.org>
---
Christian Brauner (3):
      fs: ensure that internal tmpfs mount gets mount id zero
      fs: add init_pivot_root()
      fs: add immutable rootfs

 fs/Makefile                   |   2 +-
 fs/init.c                     |  17 ++++
 fs/internal.h                 |   1 +
 fs/mount.h                    |   1 +
 fs/namespace.c                | 181 +++++++++++++++++++++++++++++-------------
 fs/rootfs.c                   |  65 +++++++++++++++
 include/linux/init_syscalls.h |   1 +
 include/uapi/linux/magic.h    |   1 +
 init/do_mounts.c              |  13 ++-
 init/do_mounts.h              |   1 +
 10 files changed, 223 insertions(+), 60 deletions(-)
---
base-commit: 8f0b4cce4481fb22653697cced8d0d04027cb1e8
change-id: 20260102-work-immutable-rootfs-b5f23e0f5a27


^ permalink raw reply	[flat|nested] 16+ messages in thread

end of thread, other threads:[~2026-01-25 20:47 UTC | newest]

Thread overview: 16+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2026-01-02 14:36 [PATCH 0/3] fs: add immutable rootfs and support pivot_root() in the initramfs Christian Brauner
2026-01-02 14:36 ` [PATCH 1/3] fs: ensure that internal tmpfs mount gets mount id zero Christian Brauner
2026-01-02 14:36 ` [PATCH 2/3] fs: add init_pivot_root() Christian Brauner
2026-01-02 14:36 ` [PATCH 3/3] fs: add immutable rootfs Christian Brauner
2026-01-04  7:27   ` Al Viro
2026-01-04  7:41     ` Al Viro
2026-01-06 22:07       ` Christian Brauner
2026-01-06 22:59         ` Al Viro
2026-01-07 10:53           ` Christian Brauner
2026-01-07  2:28   ` Gao Xiang
2026-01-07  2:47     ` Al Viro
2026-01-07  2:55       ` Gao Xiang
2026-01-07 10:52       ` Christian Brauner
2026-01-07 16:33         ` Colin Walters
2026-01-08 11:02           ` Christian Brauner
2026-01-25 20:47             ` Askar Safin

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox