3 TEST_DESCRIPTION
="root filesystem on NBD"
5 KVERSION
=${KVERSION-$(uname -r)}
7 # Uncomment this to debug failures
8 #DEBUGFAIL="rd.shell rd.break rd.debug systemd.log_target=console loglevel=7 systemd.log_level=debug"
9 #SERIAL="tcp:127.0.0.1:9999"
12 echo "nbd is constantly broken. skipping"
18 echo "NBD TEST SETUP: Starting DHCP/NBD server"
21 -drive format
=raw
,index
=0,media
=disk
,file=$TESTDIR/server.ext2 \
22 -drive format
=raw
,index
=1,media
=disk
,file=$TESTDIR/nbd.ext2 \
23 -drive format
=raw
,index
=2,media
=disk
,file=$TESTDIR/encrypted.ext2 \
26 -net nic
,macaddr
=52:54:00:12:34:56,model
=e1000 \
27 -net socket
,listen
=127.0.0.1:12340 \
28 ${SERIAL:+-serial "$SERIAL"} \
29 ${SERIAL:--serial file:"$TESTDIR"/server.log} \
31 -append "panic=1 systemd.crash_reboot root=/dev/sda rootfstype=ext2 rw quiet console=ttyS0,115200n81 selinux=0" \
32 -initrd $TESTDIR/initramfs.server
-pidfile $TESTDIR/server.pid
-daemonize ||
return 1
33 sudo
chmod 644 $TESTDIR/server.pid ||
return 1
35 # Cleanup the terminal if we have one
38 if ! [[ $SERIAL ]]; then
39 echo "Waiting for the server to startup"
41 grep Serving
"$TESTDIR"/server.log
&& break
45 echo Sleeping
10 seconds to give the server a
head start
56 local found opts nbdinfo
58 [[ $fstype ]] || fstype
=ext3
59 [[ $fsopt ]] || fsopt
="ro"
61 echo "CLIENT TEST START: $test_name"
63 # Clear out the flags for each test
64 if ! dd if=/dev
/zero of
=$TESTDIR/flag.img bs
=1M count
=1; then
65 echo "Unable to make client sda image" 1>&2
70 -drive format
=raw
,index
=0,media
=disk
,file=$TESTDIR/flag.img \
73 -net nic
,macaddr
=$mac,model
=e1000 \
74 -net socket
,connect
=127.0.0.1:12340 \
76 -append "panic=1 systemd.crash_reboot rd.shell=0 $cmdline $DEBUGFAIL rd.auto rd.info rd.retry=10 ro console=ttyS0,115200n81 selinux=0 " \
77 -initrd $TESTDIR/initramfs.testing
79 if [[ $?
-ne 0 ]] ||
! grep -F -m 1 -q nbd-OK
$TESTDIR/flag.img
; then
80 echo "CLIENT TEST END: $test_name [FAILED - BAD EXIT]"
84 # nbdinfo=( fstype fsoptions )
85 nbdinfo
=($
(awk '{print $2, $3; exit}' $TESTDIR/flag.img
))
87 if [[ "${nbdinfo[0]}" != "$fstype" ]]; then
88 echo "CLIENT TEST END: $test_name [FAILED - WRONG FS TYPE] \"${nbdinfo[0]}\" != \"$fstype\""
94 if [[ ${opts%%,*} = $fsopt ]]; then
101 if [[ ! $found ]]; then
102 echo "CLIENT TEST END: $test_name [FAILED - BAD FS OPTS] \"${nbdinfo[1]}\" != \"$fsopt\""
106 echo "CLIENT TEST END: $test_name [OK]"
110 modinfo nbd
&>/dev
/null ||
{ echo "Kernel does not support nbd"; exit 1; }
111 if ! run_server
; then
112 echo "Failed to start server" 1>&2
120 # The default is ext3,errors=continue so use that to determine
121 # if our options were parsed and used
122 client_test
"NBD root=nbd:IP:port" 52:54:00:12:34:00 \
123 "root=nbd:192.168.50.1:raw rd.luks=0" ||
return 1
125 client_test
"NBD root=nbd:IP:port::fsopts" 52:54:00:12:34:00 \
126 "root=nbd:192.168.50.1:raw::errors=panic rd.luks=0" \
127 ext3 errors
=panic ||
return 1
129 client_test
"NBD root=nbd:IP:port:fstype" 52:54:00:12:34:00 \
130 "root=nbd:192.168.50.1:raw:ext2 rd.luks=0" ext2 ||
return 1
132 client_test
"NBD root=nbd:IP:port:fstype:fsopts" 52:54:00:12:34:00 \
133 "root=nbd:192.168.50.1:raw:ext2:errors=panic rd.luks=0" \
134 ext2 errors
=panic ||
return 1
136 client_test
"NBD Bridge root=nbd:IP:port:fstype:fsopts" 52:54:00:12:34:00 \
137 "root=nbd:192.168.50.1:raw:ext2:errors=panic bridge rd.luks=0" \
138 ext2 errors
=panic ||
return 1
140 # There doesn't seem to be a good way to validate the NBD options, so
141 # just check that we don't screw up the other options
143 client_test
"NBD root=nbd:IP:port:::NBD opts" 52:54:00:12:34:00 \
144 "root=nbd:192.168.50.1:raw:::bs=2048 rd.luks=0" ||
return 1
146 client_test
"NBD root=nbd:IP:port:fstype::NBD opts" 52:54:00:12:34:00 \
147 "root=nbd:192.168.50.1:raw:ext2::bs=2048 rd.luks=0" ext2 ||
return 1
149 client_test
"NBD root=nbd:IP:port:fstype:fsopts:NBD opts" \
151 "root=nbd:192.168.50.1:raw:ext2:errors=panic:bs=2048 rd.luks=0" \
152 ext2 errors
=panic ||
return 1
154 # DHCP root-path parsing
156 client_test
"NBD root=dhcp DHCP root-path nbd:srv:port" 52:54:00:12:34:01 \
157 "root=dhcp rd.luks=0" ||
return 1
159 client_test
"NBD Bridge root=dhcp DHCP root-path nbd:srv:port" 52:54:00:12:34:01 \
160 "root=dhcp bridge rd.luks=0" ||
return 1
162 client_test
"NBD root=dhcp DHCP root-path nbd:srv:port:fstype" \
163 52:54:00:12:34:02 "root=dhcp rd.luks=0" ext2 ||
return 1
165 client_test
"NBD root=dhcp DHCP root-path nbd:srv:port::fsopts" \
166 52:54:00:12:34:03 "root=dhcp rd.luks=0" ext3 errors
=panic ||
return 1
168 client_test
"NBD root=dhcp DHCP root-path nbd:srv:port:fstype:fsopts" \
169 52:54:00:12:34:04 "root=dhcp rd.luks=0" ext2 errors
=panic ||
return 1
173 client_test
"NBD netroot=nbd:IP:port" 52:54:00:12:34:00 \
174 "netroot=nbd:192.168.50.1:raw rd.luks=0" ||
return 1
176 client_test
"NBD netroot=dhcp DHCP root-path nbd:srv:port:fstype:fsopts" \
177 52:54:00:12:34:04 "netroot=dhcp rd.luks=0" ext2 errors
=panic ||
return 1
179 # Encrypted root handling via LVM/LUKS over NBD
183 client_test
"NBD root=LABEL=dracut netroot=nbd:IP:port" \
185 "root=LABEL=dracut rd.luks.uuid=$ID_FS_UUID rd.lv.vg=dracut netroot=nbd:192.168.50.1:encrypted" ||
return 1
187 # XXX This should be ext2,errors=panic but that doesn't currently
188 # XXX work when you have a real root= line in addition to netroot=
189 # XXX How we should work here needs clarification
190 client_test
"NBD root=LABEL=dracut netroot=dhcp (w/ fstype and opts)" \
192 "root=LABEL=dracut rd.luks.uuid=$ID_FS_UUID rd.lv.vg=dracut netroot=dhcp" ||
return 1
194 if [[ -s server.pid
]]; then
195 sudo
kill -TERM $
(cat $TESTDIR/server.pid
)
196 rm -f -- $TESTDIR/server.pid
201 make_encrypted_root
() {
202 # Create the blank file to use as a root filesystem
203 dd if=/dev
/null of
=$TESTDIR/encrypted.ext2 bs
=1M seek
=40
204 dd if=/dev
/null of
=$TESTDIR/flag.img bs
=1M seek
=1
207 # Create what will eventually be our root filesystem onto an overlay
209 export initdir
=$TESTDIR/overlay
/source
210 .
$basedir/dracut-init.sh
214 mkdir
-p dev sys proc etc var tmp run root usr
/bin usr
/lib usr
/lib64 usr
/sbin
215 for i
in bin sbin lib lib64
; do
220 inst_multiple sh df free
ls shutdown poweroff stty
cat ps
ln ip \
221 mount dmesg mkdir
cp ping
222 for _terminfodir
in /lib
/terminfo
/etc
/terminfo
/usr
/share
/terminfo
; do
223 [ -f ${_terminfodir}/l
/linux
] && break
225 inst_multiple
-o ${_terminfodir}/l
/linux
226 inst .
/client-init.sh
/sbin
/init
227 inst_simple
/etc
/os-release
228 find_binary plymouth
>/dev
/null
&& inst_multiple plymouth
229 cp -a /etc
/ld.so.conf
* $initdir/etc
230 sudo ldconfig
-r "$initdir"
233 # second, install the files needed to make the root filesystem
235 export initdir
=$TESTDIR/overlay
236 .
$basedir/dracut-init.sh
239 mkdir
-p dev sys proc etc tmp var run root usr
/bin usr
/lib usr
/lib64 usr
/sbin
240 for i
in bin sbin lib lib64
; do
245 inst_multiple mke2fs poweroff
cp umount tune2fs
246 inst_hook shutdown-emergency
000 .
/hard-off.sh
247 inst_hook emergency
000 .
/hard-off.sh
248 inst_hook initqueue
01 .
/create-root.sh
249 inst_hook initqueue
/finished
01 .
/finished-false.sh
250 inst_simple .
/99-idesymlinks.rules
/etc
/udev
/rules.d
/99-idesymlinks.rules
253 # create an initramfs that will create the target root filesystem.
254 # We do it this way so that we do not risk trashing the host mdraid
255 # devices, volume groups, encrypted partitions, etc.
256 $basedir/dracut.sh
-l -i $TESTDIR/overlay
/ \
257 -m "dash crypt lvm mdraid udev-rules base rootfs-block fs-lib kernel-modules qemu" \
258 -d "piix ide-gd_mod ata_piix ext2 ext3 sd_mod" \
259 --no-hostonly-cmdline -N \
260 -f $TESTDIR/initramfs.makeroot
$KVERSION ||
return 1
261 rm -rf -- $TESTDIR/overlay
263 # Invoke KVM and/or QEMU to actually create the target filesystem.
265 -drive format
=raw
,index
=0,media
=disk
,file=$TESTDIR/flag.img \
266 -drive format
=raw
,index
=1,media
=disk
,file=$TESTDIR/encrypted.ext2 \
268 -nographic -net none \
269 -append "root=/dev/fakeroot rw quiet console=ttyS0,115200n81 selinux=0" \
270 -initrd $TESTDIR/initramfs.makeroot ||
return 1
271 grep -F -m 1 -q dracut-root-block-created
$TESTDIR/flag.img ||
return 1
272 grep -F -a -m 1 ID_FS_UUID
$TESTDIR/flag.img
> $TESTDIR/luks.uuid
276 dd if=/dev
/null of
=$TESTDIR/nbd.ext2 bs
=1M seek
=60
277 mke2fs
-F -j $TESTDIR/nbd.ext2
279 sudo mount
-o loop
$TESTDIR/nbd.ext2
$TESTDIR/mnt
283 export initdir
=$TESTDIR/mnt
284 .
$basedir/dracut-init.sh
288 mkdir
-p dev sys proc etc var tmp run root usr
/bin usr
/lib usr
/lib64 usr
/sbin
289 for i
in bin sbin lib lib64
; do
294 inst_multiple sh
ls shutdown poweroff stty
cat ps
ln ip \
296 for _terminfodir
in /lib
/terminfo
/etc
/terminfo
/usr
/share
/terminfo
; do
297 [ -f ${_terminfodir}/l
/linux
] && break
299 inst_multiple
-o ${_terminfodir}/l
/linux
300 inst .
/client-init.sh
/sbin
/init
301 inst_simple
/etc
/os-release
302 inst
/etc
/nsswitch.conf
/etc
/nsswitch.conf
303 inst
/etc
/passwd
/etc
/passwd
304 inst
/etc
/group
/etc
/group
305 for i
in /usr
/lib
*/libnss_files
* /lib
*/libnss_files
*;do
306 [ -e "$i" ] ||
continue
309 cp -a /etc
/ld.so.conf
* $initdir/etc
310 sudo ldconfig
-r "$initdir"
313 sudo umount
$TESTDIR/mnt
314 rm -fr -- $TESTDIR/mnt
318 dd if=/dev
/null of
=$TESTDIR/server.ext2 bs
=1M seek
=60
319 mke2fs
-F $TESTDIR/server.ext2
321 sudo mount
-o loop
$TESTDIR/server.ext2
$TESTDIR/mnt
325 export initdir
=$TESTDIR/mnt
326 .
$basedir/dracut-init.sh
330 mkdir
-p run dev sys proc etc var var
/lib
/dhcpd tmp etc
/nbd-server
333 cat > "$initdir/etc/nbd-server/config" <<EOF
336 exportname = /dev/sdb
339 exportname = /dev/sdc
342 inst_multiple sh
ls shutdown poweroff stty
cat ps
ln ip \
343 dmesg mkdir
cp ping grep \
344 sleep nbd-server
chmod modprobe vi
345 for _terminfodir
in /lib
/terminfo
/etc
/terminfo
/usr
/share
/terminfo
; do
346 [ -f ${_terminfodir}/l
/linux
] && break
348 inst_multiple
-o ${_terminfodir}/l
/linux
350 type -P dhcpd
>/dev
/null
&& inst_multiple dhcpd
351 [ -x /usr
/sbin
/dhcpd3
] && inst
/usr
/sbin
/dhcpd3
/usr
/sbin
/dhcpd
352 inst .
/server-init.sh
/sbin
/init
353 inst_simple
/etc
/os-release
354 inst .
/hosts
/etc
/hosts
355 inst .
/dhcpd.conf
/etc
/dhcpd.conf
356 inst
/etc
/nsswitch.conf
/etc
/nsswitch.conf
357 inst
/etc
/passwd
/etc
/passwd
358 inst
/etc
/group
/etc
/group
359 for i
in /usr
/lib
*/libnss_files
* /lib
*/libnss_files
*;do
360 [ -e "$i" ] ||
continue
364 cp -a /etc
/ld.so.conf
* $initdir/etc
365 sudo ldconfig
-r "$initdir"
368 sudo umount
$TESTDIR/mnt
369 rm -fr -- $TESTDIR/mnt
374 modinfo nbd
&>/dev
/null ||
{ echo "Kernel does not support nbd"; exit 1; }
376 make_encrypted_root ||
return 1
377 make_client_root ||
return 1
378 make_server_root ||
return 1
380 # Make the test image
382 export initdir
=$TESTDIR/overlay
383 .
$basedir/dracut-init.sh
384 inst_multiple poweroff shutdown
385 inst_hook shutdown-emergency
000 .
/hard-off.sh
386 inst_simple .
/99-idesymlinks.rules
/etc
/udev
/rules.d
/99-idesymlinks.rules
387 inst .
/cryptroot-ask.sh
/sbin
/cryptroot-ask
389 # inst ./debug-shell.service /lib/systemd/system/debug-shell.service
390 # mkdir -p "${initdir}/lib/systemd/system/sysinit.target.wants"
391 # ln -fs ../debug-shell.service "${initdir}/lib/systemd/system/sysinit.target.wants/debug-shell.service"
394 mkdir
-p $initdir/etc
395 echo "luks-$ID_FS_UUID /dev/nbd0 /etc/key" > $initdir/etc
/crypttab
396 echo -n test > $initdir/etc
/key
399 sudo
$basedir/dracut.sh
-l -i $TESTDIR/overlay
/ \
400 -m "dash udev-rules rootfs-block fs-lib base debug kernel-modules" \
401 -d "af_packet piix ide-gd_mod ata_piix ext2 ext3 sd_mod e1000" \
402 --no-hostonly-cmdline -N \
403 -f $TESTDIR/initramfs.server
$KVERSION ||
return 1
405 sudo
$basedir/dracut.sh
-l -i $TESTDIR/overlay
/ \
407 -a "debug watchdog" \
408 -d "af_packet piix ide-gd_mod ata_piix ext2 ext3 sd_mod e1000 i6300esb ib700wdt" \
409 --no-hostonly-cmdline -N \
410 -f $TESTDIR/initramfs.testing
$KVERSION ||
return 1
414 if [[ -s $TESTDIR/server.pid
]]; then
415 sudo
kill -TERM $
(cat $TESTDIR/server.pid
)
416 rm -f -- $TESTDIR/server.pid
424 .
$testdir/test-functions