| Tim Windelschmidt | 6d33a43 | 2025-02-04 14:34:25 +0100 | [diff] [blame] | 1 | // Copyright The Monogon Project Authors. |
| 2 | // SPDX-License-Identifier: Apache-2.0 |
| 3 | |
| Tim Windelschmidt | 18e9a3f | 2024-04-08 21:51:03 +0200 | [diff] [blame] | 4 | // Package bringup implements a simple wrapper which configures all default |
| Tim Windelschmidt | 346e245 | 2025-07-16 16:02:07 +0200 | [diff] [blame] | 5 | // mounts, logging and the corresponding forwarder ttyS0. It then configures |
| 6 | // a new logtree and starts a supervisor to run the provided |
| Tim Windelschmidt | 83da422 | 2024-12-16 02:49:50 +0100 | [diff] [blame] | 7 | // supervisor.Runnable. Said Runnable is expected to return no error. If it |
| 8 | // does, the supervisor will exit, an error will be printed and the system will |
| Tim Windelschmidt | 18e9a3f | 2024-04-08 21:51:03 +0200 | [diff] [blame] | 9 | // reboot after five seconds. |
| 10 | package bringup |
| 11 | |
| 12 | import ( |
| Tim Windelschmidt | 83da422 | 2024-12-16 02:49:50 +0100 | [diff] [blame] | 13 | "bufio" |
| Tim Windelschmidt | 18e9a3f | 2024-04-08 21:51:03 +0200 | [diff] [blame] | 14 | "context" |
| Tim Windelschmidt | 83da422 | 2024-12-16 02:49:50 +0100 | [diff] [blame] | 15 | "errors" |
| Tim Windelschmidt | 18e9a3f | 2024-04-08 21:51:03 +0200 | [diff] [blame] | 16 | "fmt" |
| 17 | "os" |
| Tim Windelschmidt | 83da422 | 2024-12-16 02:49:50 +0100 | [diff] [blame] | 18 | "runtime/debug" |
| 19 | "strings" |
| 20 | "sync/atomic" |
| Tim Windelschmidt | 18e9a3f | 2024-04-08 21:51:03 +0200 | [diff] [blame] | 21 | "time" |
| 22 | |
| Tim Windelschmidt | 83da422 | 2024-12-16 02:49:50 +0100 | [diff] [blame] | 23 | "github.com/opencontainers/runc/libcontainer/cgroups" |
| Tim Windelschmidt | 18e9a3f | 2024-04-08 21:51:03 +0200 | [diff] [blame] | 24 | "go.uber.org/multierr" |
| 25 | "golang.org/x/sys/unix" |
| 26 | |
| Tim Windelschmidt | 83da422 | 2024-12-16 02:49:50 +0100 | [diff] [blame] | 27 | "source.monogon.dev/go/logging" |
| Tim Windelschmidt | 18e9a3f | 2024-04-08 21:51:03 +0200 | [diff] [blame] | 28 | "source.monogon.dev/osbase/bootparam" |
| 29 | "source.monogon.dev/osbase/efivarfs" |
| 30 | "source.monogon.dev/osbase/logtree" |
| 31 | "source.monogon.dev/osbase/supervisor" |
| 32 | ) |
| 33 | |
| Tim Windelschmidt | 83da422 | 2024-12-16 02:49:50 +0100 | [diff] [blame] | 34 | type Config struct { |
| 35 | Console ConsoleConfig |
| 36 | Supervisor SupervisorConfig |
| 37 | } |
| 38 | |
| 39 | type ConsoleConfig struct { |
| 40 | ShortenDictionary logtree.ShortenDictionary |
| 41 | |
| 42 | // Filter is used to filter out some uselessly verbose logs from the |
| 43 | // console. It should return true if an entry is allowed to be printed. |
| 44 | Filter func(*logtree.LogEntry) bool |
| 45 | } |
| 46 | |
| 47 | type SupervisorConfig struct { |
| 48 | Metrics []supervisor.Metrics |
| 49 | } |
| 50 | |
| Tim Windelschmidt | 18e9a3f | 2024-04-08 21:51:03 +0200 | [diff] [blame] | 51 | type Runnable supervisor.Runnable |
| 52 | |
| 53 | func (r Runnable) Run() { |
| Tim Windelschmidt | 83da422 | 2024-12-16 02:49:50 +0100 | [diff] [blame] | 54 | r.RunWith(Config{}) |
| 55 | } |
| Tim Windelschmidt | 18e9a3f | 2024-04-08 21:51:03 +0200 | [diff] [blame] | 56 | |
| Tim Windelschmidt | 83da422 | 2024-12-16 02:49:50 +0100 | [diff] [blame] | 57 | func (r Runnable) RunWith(cfg Config) { |
| Tim Windelschmidt | 18e9a3f | 2024-04-08 21:51:03 +0200 | [diff] [blame] | 58 | if err := setupMounts(); err != nil { |
| 59 | // We cannot do anything if we fail to mount. |
| 60 | panic(err) |
| 61 | } |
| 62 | |
| Tim Windelschmidt | 83da422 | 2024-12-16 02:49:50 +0100 | [diff] [blame] | 63 | // Root system logtree. |
| Tim Windelschmidt | 18e9a3f | 2024-04-08 21:51:03 +0200 | [diff] [blame] | 64 | lt := logtree.New() |
| Tim Windelschmidt | 83da422 | 2024-12-16 02:49:50 +0100 | [diff] [blame] | 65 | |
| 66 | // Collect serial consoles from cmdline and defaults. |
| 67 | serialConsoles := collectConsoles() |
| 68 | |
| 69 | // Setup console writers |
| 70 | if err := setupConsoles(lt, serialConsoles, cfg.Console); err != nil { |
| 71 | panic(err) |
| Tim Windelschmidt | 18e9a3f | 2024-04-08 21:51:03 +0200 | [diff] [blame] | 72 | } |
| 73 | |
| Tim Windelschmidt | 7dac92b | 2024-12-16 02:51:04 +0100 | [diff] [blame] | 74 | // Initialize persistent panic handler |
| 75 | initPanicHandler(lt, serialConsoles) |
| 76 | |
| Tim Windelschmidt | 83da422 | 2024-12-16 02:49:50 +0100 | [diff] [blame] | 77 | // Rewire os.Stdout and os.Stderr to logtree which then is printed |
| 78 | // to serial consoles. |
| 79 | if err := rewireStdIO(lt); err != nil { |
| 80 | panic(err) |
| 81 | } |
| 82 | |
| Tim Windelschmidt | 83da422 | 2024-12-16 02:49:50 +0100 | [diff] [blame] | 83 | // Initial logger. Used until we get to a supervisor. |
| 84 | logger := lt.MustLeveledFor("init") |
| 85 | |
| Tim Windelschmidt | 18e9a3f | 2024-04-08 21:51:03 +0200 | [diff] [blame] | 86 | sCtx, cancel := context.WithCancelCause(context.Background()) |
| 87 | |
| Tim Windelschmidt | 83da422 | 2024-12-16 02:49:50 +0100 | [diff] [blame] | 88 | supervisorOptions := []supervisor.SupervisorOpt{ |
| 89 | supervisor.WithExistingLogtree(lt), |
| 90 | } |
| 91 | |
| 92 | for _, m := range cfg.Supervisor.Metrics { |
| 93 | supervisorOptions = append(supervisorOptions, supervisor.WithMetrics(m)) |
| 94 | } |
| 95 | |
| Tim Windelschmidt | 18e9a3f | 2024-04-08 21:51:03 +0200 | [diff] [blame] | 96 | // Don't reschedule the root runnable... |
| Tim Windelschmidt | 83da422 | 2024-12-16 02:49:50 +0100 | [diff] [blame] | 97 | var started atomic.Bool |
| Tim Windelschmidt | 18e9a3f | 2024-04-08 21:51:03 +0200 | [diff] [blame] | 98 | supervisor.New(sCtx, func(ctx context.Context) (err error) { |
| 99 | defer func() { |
| 100 | if r := recover(); r != nil { |
| Tim Windelschmidt | 83da422 | 2024-12-16 02:49:50 +0100 | [diff] [blame] | 101 | err = fmt.Errorf("root runnable paniced: \n%s:\n%s", r, debug.Stack()) |
| Tim Windelschmidt | 18e9a3f | 2024-04-08 21:51:03 +0200 | [diff] [blame] | 102 | cancel(err) |
| 103 | } |
| 104 | }() |
| 105 | |
| Tim Windelschmidt | 83da422 | 2024-12-16 02:49:50 +0100 | [diff] [blame] | 106 | if started.Swap(true) { |
| 107 | err = fmt.Errorf("root runnable restarted") |
| 108 | cancel(err) |
| 109 | return |
| Tim Windelschmidt | 18e9a3f | 2024-04-08 21:51:03 +0200 | [diff] [blame] | 110 | } |
| 111 | |
| Tim Windelschmidt | 83da422 | 2024-12-16 02:49:50 +0100 | [diff] [blame] | 112 | if err := supervisor.Run(ctx, "pstore", dumpAndCleanPstore); err != nil { |
| 113 | return fmt.Errorf("when starting pstore: %w", err) |
| 114 | } |
| 115 | |
| 116 | err = r(ctx) |
| 117 | if err != nil { |
| 118 | cancel(err) |
| 119 | return |
| 120 | } |
| 121 | |
| 122 | return |
| 123 | }, supervisorOptions...) |
| Tim Windelschmidt | 18e9a3f | 2024-04-08 21:51:03 +0200 | [diff] [blame] | 124 | |
| 125 | <-sCtx.Done() |
| Tim Windelschmidt | 83da422 | 2024-12-16 02:49:50 +0100 | [diff] [blame] | 126 | |
| 127 | time.Sleep(time.Second) |
| 128 | |
| 129 | // Write final messages on panic to stderr. |
| 130 | logger.Errorf("Fatal error: %+v", context.Cause(sCtx)) |
| 131 | logger.Error("This node could not be started. Rebooting...") |
| 132 | time.Sleep(time.Second) |
| 133 | |
| 134 | // After a bit, kill all console log readers. |
| 135 | for _, c := range serialConsoles { |
| 136 | if c.reader == nil { |
| 137 | continue |
| 138 | } |
| 139 | c.reader.Close() |
| 140 | c.reader.Stream = nil |
| 141 | } |
| 142 | |
| 143 | // Wait for final logs to flush to console... |
| 144 | time.Sleep(5 * time.Second) |
| 145 | unix.Sync() |
| 146 | unix.Reboot(unix.LINUX_REBOOT_CMD_RESTART) |
| Tim Windelschmidt | 18e9a3f | 2024-04-08 21:51:03 +0200 | [diff] [blame] | 147 | } |
| 148 | |
| Tim Windelschmidt | 83da422 | 2024-12-16 02:49:50 +0100 | [diff] [blame] | 149 | func rewireStdIO(lt *logtree.LogTree) error { |
| 150 | if err := rewireFD(lt, "stderr", os.Stderr, logging.Leveled.Error); err != nil { |
| 151 | return fmt.Errorf("failed rewiring stderr: %w", err) |
| 152 | } |
| 153 | if err := rewireFD(lt, "stdout", os.Stdout, logging.Leveled.Info); err != nil { |
| 154 | return fmt.Errorf("failed rewiring stdout: %w", err) |
| 155 | } |
| 156 | return nil |
| 157 | } |
| 158 | |
| 159 | func rewireFD(lt *logtree.LogTree, dn logtree.DN, f *os.File, writeLog func(logging.Leveled, ...any)) error { |
| 160 | r, w, err := os.Pipe() |
| 161 | if err != nil { |
| 162 | return fmt.Errorf("creating pipe for %q: %w", dn, err) |
| 163 | } |
| 164 | defer w.Close() |
| 165 | // We don't need to close this pipe since we need it for the entire |
| 166 | // process lifetime. |
| 167 | |
| 168 | l := lt.MustLeveledFor(dn) |
| 169 | go func() { |
| 170 | r := bufio.NewReader(r) |
| 171 | for { |
| 172 | line, err := r.ReadString('\n') |
| 173 | if err != nil { |
| 174 | panic(err) |
| 175 | } |
| 176 | |
| 177 | writeLog(l, strings.TrimRight(line, "\n")) |
| 178 | } |
| 179 | }() |
| 180 | |
| 181 | wConn, err := w.SyscallConn() |
| 182 | if err != nil { |
| 183 | return fmt.Errorf("error getting SyscallConn for %q: %w", dn, err) |
| 184 | } |
| 185 | fConn, err := f.SyscallConn() |
| 186 | if err != nil { |
| 187 | return fmt.Errorf("error getting SyscallConn for %q: %w", dn, err) |
| 188 | } |
| 189 | var wErr, fErr error |
| 190 | wErr = wConn.Control(func(wFd uintptr) { |
| 191 | fErr = fConn.Control(func(fFd uintptr) { |
| Jan Schär | 51c6748 | 2025-05-05 13:11:55 +0000 | [diff] [blame] | 192 | err = unix.Dup2(int(wFd), int(fFd)) |
| Tim Windelschmidt | 83da422 | 2024-12-16 02:49:50 +0100 | [diff] [blame] | 193 | }) |
| 194 | }) |
| 195 | |
| 196 | err = errors.Join(wErr, fErr, err) |
| 197 | if err != nil { |
| 198 | return fmt.Errorf("failed to duplicate file descriptor %q: %w", dn, err) |
| 199 | } |
| 200 | |
| 201 | return nil |
| 202 | } |
| 203 | |
| 204 | func mkdirAndMount(dir, fs string, flags uintptr, data string) error { |
| Tim Windelschmidt | 18e9a3f | 2024-04-08 21:51:03 +0200 | [diff] [blame] | 205 | if err := os.MkdirAll(dir, 0o755); err != nil { |
| 206 | return fmt.Errorf("could not make %s: %w", dir, err) |
| 207 | } |
| Tim Windelschmidt | 83da422 | 2024-12-16 02:49:50 +0100 | [diff] [blame] | 208 | if err := unix.Mount(fs, dir, fs, flags, data); err != nil { |
| Tim Windelschmidt | 18e9a3f | 2024-04-08 21:51:03 +0200 | [diff] [blame] | 209 | return fmt.Errorf("could not mount %s on %s: %w", fs, dir, err) |
| 210 | } |
| 211 | return nil |
| 212 | } |
| 213 | |
| 214 | // setupMounts sets up basic mounts like sysfs, procfs, devtmpfs and cgroups. |
| 215 | // This should be called early during init as a lot of processes depend on this |
| 216 | // being available. |
| 217 | func setupMounts() (err error) { |
| 218 | // Set up target filesystems. |
| 219 | for _, el := range []struct { |
| 220 | dir string |
| 221 | fs string |
| 222 | flags uintptr |
| Tim Windelschmidt | 83da422 | 2024-12-16 02:49:50 +0100 | [diff] [blame] | 223 | data string |
| Tim Windelschmidt | 18e9a3f | 2024-04-08 21:51:03 +0200 | [diff] [blame] | 224 | }{ |
| Tim Windelschmidt | 83da422 | 2024-12-16 02:49:50 +0100 | [diff] [blame] | 225 | {"/sys", "sysfs", unix.MS_NOEXEC | unix.MS_NOSUID | unix.MS_NODEV, ""}, |
| 226 | {"/sys/kernel/tracing", "tracefs", unix.MS_NOEXEC | unix.MS_NOSUID | unix.MS_NODEV, ""}, |
| 227 | {"/sys/fs/pstore", "pstore", unix.MS_NOEXEC | unix.MS_NOSUID | unix.MS_NODEV, ""}, |
| 228 | {"/proc", "proc", unix.MS_NOEXEC | unix.MS_NOSUID | unix.MS_NODEV, ""}, |
| 229 | {"/dev", "devtmpfs", unix.MS_NOEXEC | unix.MS_NOSUID, ""}, |
| 230 | {"/dev/pts", "devpts", unix.MS_NOEXEC | unix.MS_NOSUID, ""}, |
| 231 | // Nothing currently uses /dev/shm, but it's required |
| 232 | // by containerd when the host IPC namespace is shared, which |
| 233 | // is required by "kubectl debug node/" and specific customer applications. |
| Leopold Schabel | 77bf754 | 2025-06-23 11:26:31 +0200 | [diff] [blame] | 234 | // https://github.com/monogon/monogon/issues/305. |
| Tim Windelschmidt | 83da422 | 2024-12-16 02:49:50 +0100 | [diff] [blame] | 235 | {"/dev/shm", "tmpfs", unix.MS_NOEXEC | unix.MS_NOSUID | unix.MS_NODEV, ""}, |
| 236 | {"/sys/fs/cgroup", "cgroup2", unix.MS_NOEXEC | unix.MS_NOSUID | unix.MS_NODEV, "nsdelegate,memory_recursiveprot"}, |
| Tim Windelschmidt | 18e9a3f | 2024-04-08 21:51:03 +0200 | [diff] [blame] | 237 | } { |
| Tim Windelschmidt | 83da422 | 2024-12-16 02:49:50 +0100 | [diff] [blame] | 238 | err = multierr.Append(err, mkdirAndMount(el.dir, el.fs, el.flags, el.data)) |
| Tim Windelschmidt | 18e9a3f | 2024-04-08 21:51:03 +0200 | [diff] [blame] | 239 | } |
| 240 | |
| 241 | // We try to mount efivarfs but ignore any error, |
| 242 | // as we don't want to crash on non-EFI systems. |
| Tim Windelschmidt | 83da422 | 2024-12-16 02:49:50 +0100 | [diff] [blame] | 243 | _ = mkdirAndMount(efivarfs.Path, "efivarfs", unix.MS_NOEXEC|unix.MS_NOSUID|unix.MS_NODEV, "") |
| 244 | |
| 245 | // Create main cgroup "everything" and move ourselves into it. |
| 246 | err = multierr.Append(err, os.Mkdir("/sys/fs/cgroup/everything", 0755)) |
| 247 | err = multierr.Append(err, cgroups.WriteCgroupProc("/sys/fs/cgroup/everything", os.Getpid())) |
| Tim Windelschmidt | 18e9a3f | 2024-04-08 21:51:03 +0200 | [diff] [blame] | 248 | return |
| 249 | } |
| Tim Windelschmidt | 83da422 | 2024-12-16 02:49:50 +0100 | [diff] [blame] | 250 | |
| 251 | type console struct { |
| 252 | path string |
| 253 | maxWidth int |
| 254 | reader *logtree.LogReader |
| 255 | } |
| 256 | |
| 257 | func collectConsoles() []*console { |
| 258 | const defaultMaxWidth = 120 |
| 259 | |
| Tim Windelschmidt | 346e245 | 2025-07-16 16:02:07 +0200 | [diff] [blame] | 260 | // Add the standard ttyS0 console |
| Tim Windelschmidt | 83da422 | 2024-12-16 02:49:50 +0100 | [diff] [blame] | 261 | consoles := map[string]int{ |
| Tim Windelschmidt | 83da422 | 2024-12-16 02:49:50 +0100 | [diff] [blame] | 262 | "ttyS0": defaultMaxWidth, |
| 263 | } |
| 264 | |
| 265 | // Parse consoles from the kernel command line. |
| 266 | cmdline, err := os.ReadFile("/proc/cmdline") |
| 267 | if err == nil { |
| 268 | params, _, err := bootparam.Unmarshal(string(cmdline)) |
| 269 | if err == nil { |
| 270 | for v := range params.Consoles() { |
| 271 | consoles[v] = defaultMaxWidth |
| 272 | } |
| 273 | } |
| 274 | } |
| 275 | |
| 276 | var serialConsoles []*console |
| 277 | for consolePath, maxWidth := range consoles { |
| 278 | serialConsoles = append(serialConsoles, &console{ |
| 279 | path: "/dev/" + consolePath, |
| 280 | maxWidth: maxWidth, |
| 281 | }) |
| 282 | } |
| 283 | |
| 284 | return serialConsoles |
| 285 | } |
| 286 | |
| 287 | func setupConsoles(lt *logtree.LogTree, serialConsoles []*console, ltc ConsoleConfig) error { |
| 288 | filterFn := ltc.Filter |
| 289 | if filterFn == nil { |
| 290 | filterFn = func(*logtree.LogEntry) bool { |
| 291 | return true |
| 292 | } |
| 293 | } |
| 294 | |
| 295 | // Open up consoles and set up logging from logtree and crash channel. |
| 296 | for _, c := range serialConsoles { |
| 297 | f, err := os.OpenFile(c.path, os.O_WRONLY, 0) |
| 298 | if err != nil { |
| 299 | continue |
| 300 | } |
| 301 | |
| 302 | reader, err := lt.Read("", logtree.WithChildren(), logtree.WithStream()) |
| 303 | if err != nil { |
| 304 | return fmt.Errorf("could not set up root log reader: %w", err) |
| 305 | } |
| 306 | c.reader = reader |
| 307 | |
| 308 | go func() { |
| 309 | fmt.Fprintf(f, "This is %s. Verbose node logs follow.\n\n", f.Name()) |
| 310 | for p := range reader.Stream { |
| 311 | if filterFn(p) { |
| 312 | fmt.Fprintf(f, "%s\n", p.ConciseString(ltc.ShortenDictionary, c.maxWidth)) |
| 313 | } |
| 314 | } |
| 315 | }() |
| 316 | } |
| 317 | |
| 318 | return nil |
| 319 | } |