blob: bb9846266d57f287a928926fd9b0c94ce3dfda73 [file] [log] [blame]
Lorenz Brun3a99c592021-01-26 19:57:21 +01001// Copyright 2020 The Monogon Project Authors.
2//
3// SPDX-License-Identifier: Apache-2.0
4//
5// Licensed under the Apache License, Version 2.0 (the "License");
6// you may not use this file except in compliance with the License.
7// You may obtain a copy of the License at
8//
9// http://www.apache.org/licenses/LICENSE-2.0
10//
11// Unless required by applicable law or agreed to in writing, software
12// distributed under the License is distributed on an "AS IS" BASIS,
13// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14// See the License for the specific language governing permissions and
15// limitations under the License.
16
17package main
18
19import (
20 "fmt"
21 "io/ioutil"
22 "os"
23 "strings"
24
25 "golang.org/x/sys/unix"
26
27 "source.monogon.dev/metropolis/pkg/logtree"
28)
29
Serge Bazanski216fe7b2021-05-21 18:36:16 +020030// setupMounts sets up basic mounts like sysfs, procfs, devtmpfs and cgroups.
31// This should be called early during init as a lot of processes depend on this
32// being available.
Lorenz Brun3a99c592021-01-26 19:57:21 +010033func setupMounts(log logtree.LeveledLogger) error {
34 // Set up target filesystems.
35 for _, el := range []struct {
36 dir string
37 fs string
38 flags uintptr
39 }{
40 {"/sys", "sysfs", unix.MS_NOEXEC | unix.MS_NOSUID | unix.MS_NODEV},
Lorenz Brun09c275b2021-03-30 12:47:09 +020041 {"/sys/kernel/tracing", "tracefs", unix.MS_NOEXEC | unix.MS_NOSUID | unix.MS_NODEV},
Lorenz Brun6ef7f9b2021-10-21 13:02:40 +020042 {"/sys/firmware/efi/efivars", "efivarfs", unix.MS_NOEXEC | unix.MS_NOSUID | unix.MS_NODEV},
Lorenz Brun3a99c592021-01-26 19:57:21 +010043 {"/proc", "proc", unix.MS_NOEXEC | unix.MS_NOSUID | unix.MS_NODEV},
44 {"/dev", "devtmpfs", unix.MS_NOEXEC | unix.MS_NOSUID},
45 {"/dev/pts", "devpts", unix.MS_NOEXEC | unix.MS_NOSUID},
46 } {
47 if err := os.MkdirAll(el.dir, 0755); err != nil {
48 return fmt.Errorf("could not make %s: %w", el.dir, err)
49 }
50 if err := unix.Mount(el.fs, el.dir, el.fs, el.flags, ""); err != nil {
51 return fmt.Errorf("could not mount %s on %s: %w", el.fs, el.dir, err)
52 }
53 }
54
Serge Bazanski216fe7b2021-05-21 18:36:16 +020055 // Mount all available CGroups for v1 (v2 uses a single unified hierarchy
56 // and is not supported by our runtimes yet)
Lorenz Brun3a99c592021-01-26 19:57:21 +010057 if err := unix.Mount("tmpfs", "/sys/fs/cgroup", "tmpfs", unix.MS_NOEXEC|unix.MS_NOSUID|unix.MS_NODEV, ""); err != nil {
58 panic(err)
59 }
60 cgroupsRaw, err := ioutil.ReadFile("/proc/cgroups")
61 if err != nil {
62 panic(err)
63 }
64
65 cgroupLines := strings.Split(string(cgroupsRaw), "\n")
66 for _, cgroupLine := range cgroupLines {
67 if cgroupLine == "" || strings.HasPrefix(cgroupLine, "#") {
68 continue
69 }
70 cgroupParts := strings.Split(cgroupLine, "\t")
71 cgroupName := cgroupParts[0]
72 if err := os.Mkdir("/sys/fs/cgroup/"+cgroupName, 0755); err != nil {
73 panic(err)
74 }
75 if err := unix.Mount("cgroup", "/sys/fs/cgroup/"+cgroupName, "cgroup", unix.MS_NOEXEC|unix.MS_NOSUID|unix.MS_NODEV, cgroupName); err != nil {
76 panic(err)
77 }
78 }
79
80 // Enable hierarchical memory accounting
81 useMemoryHierarchy, err := os.OpenFile("/sys/fs/cgroup/memory/memory.use_hierarchy", os.O_RDWR, 0)
82 if err != nil {
83 panic(err)
84 }
85 if _, err := useMemoryHierarchy.WriteString("1"); err != nil {
86 panic(err)
87 }
88 useMemoryHierarchy.Close()
89 return nil
90}