blob: a54331d13bad3c93783e9d21c8ba3a847d7733d0 [file] [log] [blame]
Lorenz Brun3a99c592021-01-26 19:57:21 +01001// Copyright 2020 The Monogon Project Authors.
2//
3// SPDX-License-Identifier: Apache-2.0
4//
5// Licensed under the Apache License, Version 2.0 (the "License");
6// you may not use this file except in compliance with the License.
7// You may obtain a copy of the License at
8//
9// http://www.apache.org/licenses/LICENSE-2.0
10//
11// Unless required by applicable law or agreed to in writing, software
12// distributed under the License is distributed on an "AS IS" BASIS,
13// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14// See the License for the specific language governing permissions and
15// limitations under the License.
16
17package main
18
19import (
20 "fmt"
Lorenz Brun3a99c592021-01-26 19:57:21 +010021 "os"
22 "strings"
23
24 "golang.org/x/sys/unix"
25
26 "source.monogon.dev/metropolis/pkg/logtree"
27)
28
Serge Bazanski216fe7b2021-05-21 18:36:16 +020029// setupMounts sets up basic mounts like sysfs, procfs, devtmpfs and cgroups.
30// This should be called early during init as a lot of processes depend on this
31// being available.
Lorenz Brun3a99c592021-01-26 19:57:21 +010032func setupMounts(log logtree.LeveledLogger) error {
33 // Set up target filesystems.
34 for _, el := range []struct {
35 dir string
36 fs string
37 flags uintptr
38 }{
39 {"/sys", "sysfs", unix.MS_NOEXEC | unix.MS_NOSUID | unix.MS_NODEV},
Lorenz Brun09c275b2021-03-30 12:47:09 +020040 {"/sys/kernel/tracing", "tracefs", unix.MS_NOEXEC | unix.MS_NOSUID | unix.MS_NODEV},
Lorenz Brun6ef7f9b2021-10-21 13:02:40 +020041 {"/sys/firmware/efi/efivars", "efivarfs", unix.MS_NOEXEC | unix.MS_NOSUID | unix.MS_NODEV},
Lorenz Brun3a99c592021-01-26 19:57:21 +010042 {"/proc", "proc", unix.MS_NOEXEC | unix.MS_NOSUID | unix.MS_NODEV},
43 {"/dev", "devtmpfs", unix.MS_NOEXEC | unix.MS_NOSUID},
44 {"/dev/pts", "devpts", unix.MS_NOEXEC | unix.MS_NOSUID},
45 } {
46 if err := os.MkdirAll(el.dir, 0755); err != nil {
47 return fmt.Errorf("could not make %s: %w", el.dir, err)
48 }
49 if err := unix.Mount(el.fs, el.dir, el.fs, el.flags, ""); err != nil {
50 return fmt.Errorf("could not mount %s on %s: %w", el.fs, el.dir, err)
51 }
52 }
53
Serge Bazanski216fe7b2021-05-21 18:36:16 +020054 // Mount all available CGroups for v1 (v2 uses a single unified hierarchy
55 // and is not supported by our runtimes yet)
Lorenz Brun3a99c592021-01-26 19:57:21 +010056 if err := unix.Mount("tmpfs", "/sys/fs/cgroup", "tmpfs", unix.MS_NOEXEC|unix.MS_NOSUID|unix.MS_NODEV, ""); err != nil {
57 panic(err)
58 }
Lorenz Brun764a2de2021-11-22 16:26:36 +010059 cgroupsRaw, err := os.ReadFile("/proc/cgroups")
Lorenz Brun3a99c592021-01-26 19:57:21 +010060 if err != nil {
61 panic(err)
62 }
63
64 cgroupLines := strings.Split(string(cgroupsRaw), "\n")
65 for _, cgroupLine := range cgroupLines {
66 if cgroupLine == "" || strings.HasPrefix(cgroupLine, "#") {
67 continue
68 }
69 cgroupParts := strings.Split(cgroupLine, "\t")
70 cgroupName := cgroupParts[0]
71 if err := os.Mkdir("/sys/fs/cgroup/"+cgroupName, 0755); err != nil {
72 panic(err)
73 }
74 if err := unix.Mount("cgroup", "/sys/fs/cgroup/"+cgroupName, "cgroup", unix.MS_NOEXEC|unix.MS_NOSUID|unix.MS_NODEV, cgroupName); err != nil {
75 panic(err)
76 }
77 }
78
79 // Enable hierarchical memory accounting
80 useMemoryHierarchy, err := os.OpenFile("/sys/fs/cgroup/memory/memory.use_hierarchy", os.O_RDWR, 0)
81 if err != nil {
82 panic(err)
83 }
84 if _, err := useMemoryHierarchy.WriteString("1"); err != nil {
85 panic(err)
86 }
87 useMemoryHierarchy.Close()
88 return nil
89}