// Copyright 2023 Mikhail Klementev. All rights reserved. // Use of this source code is governed by a AGPLv3 license // (or later) that can be found in the LICENSE file. package main import ( "errors" "fmt" "io/ioutil" "math" "math/rand" "os" "os/exec" "os/user" "regexp" "runtime" "strings" "time" "github.com/naoina/toml" "github.com/rs/zerolog/log" "code.dumpstack.io/tools/out-of-tree/config" ) type KernelCmd struct { NoDownload bool `help:"do not download qemu image while kernel generation"` UseHost bool `help:"also use host kernels"` Force bool `help:"force reinstall kernel"` NoHeaders bool `help:"do not install kernel headers"` Shuffle bool `help:"randomize kernels installation order"` Retries int64 `help:"amount of tries for each kernel" default:"10"` List KernelListCmd `cmd:"" help:"list kernels"` Autogen KernelAutogenCmd `cmd:"" help:"generate kernels based on the current config"` Genall KernelGenallCmd `cmd:"" help:"generate all kernels for distro"` Install KernelInstallCmd `cmd:"" help:"install specific kernel"` ConfigRegen KernelConfigRegenCmd `cmd:"" help:"regenerate config"` } type KernelListCmd struct{} func (cmd *KernelListCmd) Run(g *Globals) (err error) { kcfg, err := config.ReadKernelConfig(g.Config.Kernels) if err != nil { log.Debug().Err(err).Msg("read kernel config") } if len(kcfg.Kernels) == 0 { return errors.New("No kernels found") } for _, k := range kcfg.Kernels { fmt.Println(k.DistroType, k.DistroRelease, k.KernelRelease) } return } type KernelAutogenCmd struct { Max int64 `help:"download kernels from set defined by regex in release_mask, but no more than X for each of release_mask" default:"100500"` } func (cmd KernelAutogenCmd) Run(kernelCmd *KernelCmd, g *Globals) (err error) { ka, err := config.ReadArtifactConfig(g.WorkDir + "/.out-of-tree.toml") if err != nil { return } for _, sk := range ka.SupportedKernels { if sk.DistroRelease == "" { err = errors.New("Please set distro_release") return } err = generateKernels(sk, g.Config.Docker.Registry, g.Config.Docker.Commands, cmd.Max, kernelCmd.Retries, !kernelCmd.NoDownload, kernelCmd.Force, !kernelCmd.NoHeaders, kernelCmd.Shuffle, ) if err != nil { return } } return updateKernelsCfg(kernelCmd.UseHost, !kernelCmd.NoDownload) } type KernelGenallCmd struct { Distro string `required:"" help:"distribution"` Ver string `required:"" help:"distro version"` } func (cmd *KernelGenallCmd) Run(kernelCmd *KernelCmd, g *Globals) (err error) { distroType, err := config.NewDistroType(cmd.Distro) if err != nil { return } km := config.KernelMask{ DistroType: distroType, DistroRelease: cmd.Ver, ReleaseMask: ".*", } err = generateKernels(km, g.Config.Docker.Registry, g.Config.Docker.Commands, math.MaxUint32, kernelCmd.Retries, !kernelCmd.NoDownload, kernelCmd.Force, !kernelCmd.NoHeaders, kernelCmd.Shuffle, ) if err != nil { return } return updateKernelsCfg(kernelCmd.UseHost, !kernelCmd.NoDownload) } type KernelInstallCmd struct { Distro string `required:"" help:"distribution"` Ver string `required:"" help:"distro version"` Kernel string `required:"" help:"kernel release mask"` } func (cmd *KernelInstallCmd) Run(kernelCmd *KernelCmd, g *Globals) (err error) { distroType, err := config.NewDistroType(cmd.Distro) if err != nil { return } km := config.KernelMask{ DistroType: distroType, DistroRelease: cmd.Ver, ReleaseMask: cmd.Kernel, } err = generateKernels(km, g.Config.Docker.Registry, g.Config.Docker.Commands, math.MaxUint32, kernelCmd.Retries, !kernelCmd.NoDownload, kernelCmd.Force, !kernelCmd.NoHeaders, kernelCmd.Shuffle, ) if err != nil { return } return updateKernelsCfg(kernelCmd.UseHost, !kernelCmd.NoDownload) } type KernelConfigRegenCmd struct{} func (cmd *KernelConfigRegenCmd) Run(kernelCmd *KernelCmd, g *Globals) (err error) { return updateKernelsCfg(kernelCmd.UseHost, !kernelCmd.NoDownload) } func matchDebImagePkg(container, mask string) (pkgs []string, err error) { cmd := "apt-cache search --names-only '^linux-image-[0-9\\.\\-]*-generic' | awk '{ print $1 }'" // FIXME timeout should be in global out-of-tree config c, err := NewContainer(container, time.Hour) if err != nil { return } output, err := c.Run("/tmp", cmd) if err != nil { return } r, err := regexp.Compile("linux-image-" + mask) if err != nil { return } kernels := r.FindAll([]byte(output), -1) for _, k := range kernels { pkg := string(k) pkgs = append(pkgs, pkg) } return } func matchCentOSDevelPkg(container, mask string, generic bool) ( pkgs []string, err error) { cmd := "yum search kernel-devel --showduplicates | " + "grep '^kernel-devel' | cut -d ' ' -f 1" // FIXME timeout should be in global out-of-tree config c, err := NewContainer(container, time.Hour) if err != nil { return } output, err := c.Run("/tmp", cmd) if err != nil { return } r, err := regexp.Compile("kernel-devel-" + mask) if err != nil { return } for _, k := range r.FindAll([]byte(output), -1) { pkgs = append(pkgs, string(k)) } return } func dockerImagePath(sk config.KernelMask) (path string, err error) { usr, err := user.Current() if err != nil { return } path = usr.HomeDir + "/.out-of-tree/containers/" path += sk.DistroType.String() + "/" + sk.DistroRelease return } func vsyscallAvailable() (available bool, err error) { if runtime.GOOS != "linux" { // Docker for non-Linux systems is not using the host // kernel but uses kernel inside a virtual machine, so // it builds by the Docker team with vsyscall support. available = true return } buf, err := ioutil.ReadFile("/proc/self/maps") if err != nil { return } available = strings.Contains(string(buf), "[vsyscall]") return } func generateBaseDockerImage(registry string, commands []config.DockerCommand, sk config.KernelMask) (err error) { imagePath, err := dockerImagePath(sk) if err != nil { return } dockerPath := imagePath + "/Dockerfile" d := "# BASE\n" cmd := exec.Command("docker", "images", "-q", sk.DockerName()) log.Debug().Msgf("run %v", cmd) rawOutput, err := cmd.CombinedOutput() if err != nil { return } if exists(dockerPath) && string(rawOutput) != "" { log.Info().Msgf("Base image for %s:%s found", sk.DistroType.String(), sk.DistroRelease) return } log.Info().Msgf("Base image for %s:%s not found, start generating", sk.DistroType.String(), sk.DistroRelease) os.MkdirAll(imagePath, os.ModePerm) d += "FROM " if registry != "" { d += registry + "/" } d += fmt.Sprintf("%s:%s\n", strings.ToLower(sk.DistroType.String()), sk.DistroRelease, ) vsyscall, err := vsyscallAvailable() if err != nil { return } for _, c := range commands { switch c.DistroType { case config.Ubuntu: d += "RUN " + c.Command + "\n" case config.CentOS: d += "RUN " + c.Command + "\n" case config.Debian: d += "RUN " + c.Command + "\n" default: err = fmt.Errorf("%s not yet supported", sk.DistroType.String()) return } } switch sk.DistroType { case config.Ubuntu: d += "ENV DEBIAN_FRONTEND=noninteractive\n" d += "RUN apt-get update\n" d += "RUN apt-get install -y build-essential libelf-dev\n" d += "RUN apt-get install -y wget git\n" if sk.DistroRelease >= "14.04" { d += "RUN apt-get install -y libseccomp-dev\n" } d += "RUN mkdir -p /lib/modules\n" case config.CentOS: if sk.DistroRelease < "7" && !vsyscall { log.Print("Old CentOS requires `vsyscall=emulate` " + "on the latest kernels") log.Print("Check out `A note about vsyscall` " + "at https://hub.docker.com/_/centos") log.Print("See also https://lwn.net/Articles/446528/") err = fmt.Errorf("vsyscall is not available") return } // enable rpms from old minor releases d += "RUN sed -i 's/enabled=0/enabled=1/' /etc/yum.repos.d/CentOS-Vault.repo\n" // do not remove old kernels d += "RUN sed -i 's;installonly_limit=;installonly_limit=100500;' /etc/yum.conf\n" d += "RUN yum -y update\n" if sk.DistroRelease == "8" { // FIXME CentOS Vault repository list for 8 is empty // at the time of this fix; check for it and use a // workaround if it's still empty d += `RUN grep enabled /etc/yum.repos.d/CentOS-Vault.repo` + ` || echo -e '[8.0.1905]\nbaseurl=http://vault.centos.org/8.0.1905/BaseOS/$basearch/os/'` + ` >> /etc/yum.repos.d/CentOS-Vault.repo` + "\n" } d += "RUN yum -y groupinstall 'Development Tools'\n" if sk.DistroRelease < "8" { d += "RUN yum -y install deltarpm\n" } else { d += "RUN yum -y install drpm grub2-tools-minimal " + "elfutils-libelf-devel\n" } default: err = fmt.Errorf("%s not yet supported", sk.DistroType.String()) return } d += "# END BASE\n\n" err = ioutil.WriteFile(dockerPath, []byte(d), 0644) if err != nil { return } c, err := NewContainer(sk.DockerName(), time.Hour) if err != nil { return } output, err := c.Build(imagePath) if err != nil { log.Error().Err(err).Msgf("Base image for %s:%s generating error", sk.DistroType.String(), sk.DistroRelease) log.Fatal().Msg(output) return } log.Info().Msgf("Base image for %s:%s generating success", sk.DistroType.String(), sk.DistroRelease) return } func copyDirContent(source, target string) (err error) { files, err := ioutil.ReadDir(source) if err != nil { return } if len(files) != 0 { _, err = sh(source, "cp -r * "+target+"/") if err != nil { return } } return } func installKernel(sk config.KernelMask, pkgname string, force, headers bool) (err error) { tmpdir, err := os.MkdirTemp("", "out-of-tree-"+pkgname+"-") if err != nil { log.Fatal().Err(err).Msg("make tmp directory") } defer os.RemoveAll(tmpdir) slog := log.With(). Str("distro_type", sk.DistroType.String()). Str("distro_release", sk.DistroRelease). Str("pkg", pkgname). Str("tmpdir", tmpdir). Logger() c, err := NewContainer(sk.DockerName(), time.Hour) // TODO conf if err != nil { return } moddirs, err := ioutil.ReadDir(c.Volumes.LibModules) if err != nil { return } for _, krel := range moddirs { if strings.Contains(pkgname, krel.Name()) { if force { slog.Info().Msg("Reinstall") } else { slog.Info().Msg("Already installed") return } } } volumes := c.Volumes c.Volumes.LibModules = fmt.Sprintf("%s/libmodules", tmpdir) os.MkdirAll(c.Volumes.LibModules, 0777) c.Volumes.UsrSrc = fmt.Sprintf("%s/usrsrc", tmpdir) os.MkdirAll(c.Volumes.UsrSrc, 0777) c.Volumes.Boot = fmt.Sprintf("%s/boot", tmpdir) os.MkdirAll(c.Volumes.Boot, 0777) slog.Debug().Msgf("Installing kernel") switch sk.DistroType { case config.Ubuntu: var headerspkg string if headers { headerspkg = strings.Replace(pkgname, "image", "headers", -1) } cmd := fmt.Sprintf("apt-get install -y %s %s", pkgname, headerspkg) _, err = c.Run("/tmp", cmd) if err != nil { return } case config.CentOS: imagepkg := strings.Replace(pkgname, "-devel", "", -1) version := strings.Replace(pkgname, "kernel-devel-", "", -1) if !headers { pkgname = "" } cmd := fmt.Sprintf("yum -y install %s %s\n", imagepkg, pkgname) _, err = c.Run("/tmp", cmd) if err != nil { return } cmd = fmt.Sprintf("dracut --add-drivers 'e1000 ext4' -f "+ "/boot/initramfs-%s.img %s\n", version, version) _, err = c.Run("/tmp", cmd) if err != nil { return } default: err = fmt.Errorf("%s not yet supported", sk.DistroType.String()) return } err = copyDirContent(c.Volumes.LibModules, volumes.LibModules) if err != nil { return } err = copyDirContent(c.Volumes.UsrSrc, volumes.UsrSrc) if err != nil { return } err = copyDirContent(c.Volumes.Boot, volumes.Boot) if err != nil { return } slog.Debug().Msgf("Success") return } func genKernelPath(files []os.FileInfo, kname string) string { for _, file := range files { if strings.HasPrefix(file.Name(), "vmlinuz") { if strings.Contains(file.Name(), kname) { return file.Name() } } } log.Fatal().Msgf("cannot find kernel %s", kname) return "" } func genInitrdPath(files []os.FileInfo, kname string) string { for _, file := range files { if strings.HasPrefix(file.Name(), "initrd") || strings.HasPrefix(file.Name(), "initramfs") { if strings.Contains(file.Name(), kname) { return file.Name() } } } log.Fatal().Msgf("cannot find initrd %s", kname) return "" } func genRootfsImage(d dockerImageInfo, download bool) (rootfs string, err error) { usr, err := user.Current() if err != nil { return } imageFile := d.ContainerName + ".img" imagesPath := usr.HomeDir + "/.out-of-tree/images/" os.MkdirAll(imagesPath, os.ModePerm) rootfs = imagesPath + imageFile if !exists(rootfs) { if download { log.Print(imageFile, "not exists, start downloading...") err = downloadImage(imagesPath, imageFile) } } return } type dockerImageInfo struct { ContainerName string DistroType config.DistroType DistroRelease string // 18.04/7.4.1708/9.1 } func listDockerImages() (diis []dockerImageInfo, err error) { cmd := exec.Command("docker", "images") log.Debug().Msgf("%v", cmd) rawOutput, err := cmd.CombinedOutput() if err != nil { return } r, err := regexp.Compile("out_of_tree_.*") if err != nil { return } containers := r.FindAll(rawOutput, -1) for _, c := range containers { container := strings.Fields(string(c))[0] s := strings.Replace(container, "__", ".", -1) values := strings.Split(s, "_") distro, ver := values[3], values[4] dii := dockerImageInfo{ ContainerName: container, DistroRelease: ver, } dii.DistroType, err = config.NewDistroType(distro) if err != nil { return } diis = append(diis, dii) } return } func updateKernelsCfg(host, download bool) (err error) { newkcfg := config.KernelConfig{} if host { // Get host kernels newkcfg, err = genHostKernels(download) if err != nil { return } } // Get docker kernels dockerImages, err := listDockerImages() if err != nil { return } for _, d := range dockerImages { err = listContainersKernels(d, &newkcfg, download) if err != nil { log.Print("gen kernels", d.ContainerName, ":", err) continue } } stripkcfg := config.KernelConfig{} for _, nk := range newkcfg.Kernels { if !hasKernel(nk, stripkcfg) { stripkcfg.Kernels = append(stripkcfg.Kernels, nk) } } buf, err := toml.Marshal(&stripkcfg) if err != nil { return } buf = append([]byte("# Autogenerated\n# DO NOT EDIT\n\n"), buf...) usr, err := user.Current() if err != nil { return } // TODO move all cfg path values to one provider kernelsCfgPath := usr.HomeDir + "/.out-of-tree/kernels.toml" err = ioutil.WriteFile(kernelsCfgPath, buf, 0644) if err != nil { return } log.Info().Msgf("%s is successfully updated", kernelsCfgPath) return } func listContainersKernels(dii dockerImageInfo, newkcfg *config.KernelConfig, download bool) (err error) { rootfs, err := genRootfsImage(dii, download) if err != nil { return } c, err := NewContainer(dii.ContainerName, time.Hour) if err != nil { return } moddirs, err := ioutil.ReadDir(c.Volumes.LibModules) if err != nil { return } bootfiles, err := ioutil.ReadDir(c.Volumes.Boot) if err != nil { return } for _, krel := range moddirs { ki := config.KernelInfo{ DistroType: dii.DistroType, DistroRelease: dii.DistroRelease, KernelRelease: krel.Name(), ContainerName: dii.ContainerName, KernelPath: c.Volumes.Boot + "/" + genKernelPath(bootfiles, krel.Name()), InitrdPath: c.Volumes.Boot + "/" + genInitrdPath(bootfiles, krel.Name()), ModulesPath: c.Volumes.LibModules + "/" + krel.Name(), RootFS: rootfs, } newkcfg.Kernels = append(newkcfg.Kernels, ki) } for _, cmd := range []string{ "find /boot -type f -exec chmod a+r {} \\;", } { _, err = c.Run("/tmp", cmd) if err != nil { return } } return } func hasKernel(ki config.KernelInfo, kcfg config.KernelConfig) bool { for _, sk := range kcfg.Kernels { if sk == ki { return true } } return false } func shuffleStrings(a []string) []string { // Fisher–Yates shuffle for i := len(a) - 1; i > 0; i-- { j := rand.Intn(i + 1) a[i], a[j] = a[j], a[i] } return a } func generateKernels(km config.KernelMask, registry string, commands []config.DockerCommand, max, retries int64, download, force, headers, shuffle bool) (err error) { log.Info().Msgf("Generating for kernel mask %v", km) _, err = genRootfsImage(dockerImageInfo{ContainerName: km.DockerName()}, download) if err != nil { return } err = generateBaseDockerImage(registry, commands, km) if err != nil { return } var pkgs []string switch km.DistroType { case config.Ubuntu: pkgs, err = matchDebImagePkg(km.DockerName(), km.ReleaseMask) case config.CentOS: pkgs, err = matchCentOSDevelPkg(km.DockerName(), km.ReleaseMask, true) default: err = fmt.Errorf("%s not yet supported", km.DistroType.String()) } if err != nil { return } if shuffle { pkgs = shuffleStrings(pkgs) } for i, pkg := range pkgs { if max <= 0 { log.Print("Max is reached") break } log.Info().Msgf("%d/%d %s", i+1, len(pkgs), pkg) var attempt int64 for { attempt++ err = installKernel(km, pkg, force, headers) if err == nil { max-- } else if attempt >= retries { log.Fatal().Err(err).Msg("install kernel") } else { log.Warn().Err(err).Msg("install kernel") } } } return }