2 TEST_DESCRIPTION
="root filesystem on NBD"
4 KVERSION
=${KVERSION-$(uname -r)}
6 # Uncomment this to debug failures
7 #DEBUGFAIL="rdinitdebug rdnetdebug"
11 echo "NBD TEST SETUP: Starting DHCP/NBD server"
13 $testdir/run-qemu
-hda server.ext2
-hdb nbd.ext2
-hdc encrypted.ext2 \
15 -net nic
,macaddr
=52:54:00:12:34:56,model
=e1000 \
16 -net socket
,mcast
=230.0.0.1:1236 \
17 -serial udp
:127.0.0.1:9999 \
18 -kernel /boot
/vmlinuz-
$KVERSION \
19 -append "root=/dev/sda rw quiet console=ttyS0,115200n81" \
20 -initrd initramfs.server
-pidfile server.pid
-daemonize ||
return 1
21 sudo
chmod 644 server.pid ||
return 1
23 # Cleanup the terminal if we have one
26 echo Sleeping
10 seconds to give the server a
head start
36 local found opts nbdinfo
38 [[ $fstype ]] || fstype
=ext3
39 [[ $fsopt ]] || fsopt
="errors=continue"
41 echo "CLIENT TEST START: $test_name"
43 # Clear out the flags for each test
44 if ! dd if=/dev
/zero of
=flag.img bs
=1M count
=1; then
45 echo "Unable to make client sda image" 1>&2
49 $testdir/run-qemu
-hda flag.img
-m 256M
-nographic \
50 -net nic
,macaddr
=$mac,model
=e1000 \
51 -net socket
,mcast
=230.0.0.1:1236 \
52 -kernel /boot
/vmlinuz-
$KVERSION \
53 -append "$cmdline $DEBUGFAIL ro quiet console=ttyS0,115200n81" \
54 -initrd initramfs.testing
56 if [[ $?
-ne 0 ]] ||
! grep -m 1 -q nbd-OK flag.img
; then
57 echo "CLIENT TEST END: $test_name [FAILED - BAD EXIT]"
61 # nbdinfo=( fstype fsoptions )
62 nbdinfo
=($
(awk '{print $2, $3; exit}' flag.img
))
64 if [[ "${nbdinfo[0]}" != "$fstype" ]]; then
65 echo "CLIENT TEST END: $test_name [FAILED - WRONG FS TYPE]"
71 if [[ ${opts%%,*} = $fsopt ]]; then
78 if [[ ! $found ]]; then
79 echo "CLIENT TEST END: $test_name [FAILED - BAD FS OPTS]"
83 echo "CLIENT TEST END: $test_name [OK]"
88 echo "Failed to start server" 1>&2
92 # The default is ext3,errors=continue so use that to determine
93 # if our options were parsed and used
95 client_test
"NBD root=nbd:IP:port" 52:54:00:12:34:00 \
96 "root=nbd:192.168.50.1:2000" ||
return 1
98 client_test
"NBD root=nbd:IP:port:fstype" 52:54:00:12:34:00 \
99 "root=nbd:192.168.50.1:2000:ext2" ext2 ||
return 1
101 client_test
"NBD root=nbd:IP:port::fsopts" 52:54:00:12:34:00 \
102 "root=nbd:192.168.50.1:2000::errors=panic" \
103 ext3 errors
=panic ||
return 1
105 client_test
"NBD root=nbd:IP:port:fstype:fsopts" 52:54:00:12:34:00 \
106 "root=nbd:192.168.50.1:2000:ext2:errors=panic" \
107 ext2 errors
=panic ||
return 1
109 # There doesn't seem to be a good way to validate the NBD options, so
110 # just check that we don't screw up the other options
112 client_test
"NBD root=nbd:IP:port:::NBD opts" 52:54:00:12:34:00 \
113 "root=nbd:192.168.50.1:2000:::bs=2048" ||
return 1
115 client_test
"NBD root=nbd:IP:port:fstype::NBD opts" 52:54:00:12:34:00 \
116 "root=nbd:192.168.50.1:2000:ext2::bs=2048" ext2 ||
return 1
118 client_test
"NBD root=nbd:IP:port:fstype:fsopts:NBD opts" \
120 "root=nbd:192.168.50.1:2000:ext2:errors=panic:bs=2048" \
121 ext2 errors
=panic ||
return 1
123 # DHCP root-path parsing
125 client_test
"NBD root=dhcp DHCP root-path nbd:srv:port" 52:54:00:12:34:01 \
126 "root=dhcp" ||
return 1
128 client_test
"NBD root=dhcp DHCP root-path nbd:srv:port:fstype" \
129 52:54:00:12:34:02 "root=dhcp" ext2 ||
return 1
131 client_test
"NBD root=dhcp DHCP root-path nbd:srv:port::fsopts" \
132 52:54:00:12:34:03 "root=dhcp" ext3 errors
=panic ||
return 1
134 client_test
"NBD root=dhcp DHCP root-path nbd:srv:port:fstype:fsopts" \
135 52:54:00:12:34:04 "root=dhcp" ext2 errors
=panic ||
return 1
139 client_test
"NBD netroot=nbd:IP:port" 52:54:00:12:34:00 \
140 "netroot=nbd:192.168.50.1:2000" ||
return 1
142 client_test
"NBD netroot=dhcp DHCP root-path nbd:srv:port:fstype:fsopts" \
143 52:54:00:12:34:04 "netroot=dhcp" ext2 errors
=panic ||
return 1
145 # Encrypted root handling via LVM/LUKS over NBD
147 client_test
"NBD root=/dev/dracut/root netroot=nbd:IP:port" \
149 "root=/dev/dracut/root netroot=nbd:192.168.50.1:2001" ||
return 1
151 # XXX This should be ext2,errors=panic but that doesn't currently
152 # XXX work when you have a real root= line in addition to netroot=
153 # XXX How we should work here needs clarification
154 client_test
"NBD root=/dev/dracut/root netroot=dhcp (w/ fstype and opts)" \
156 "root=/dev/dracut/root netroot=dhcp" ||
return 1
158 if [[ -s server.pid
]]; then
159 sudo
kill -TERM $
(cat server.pid
)
165 make_encrypted_root
() {
166 # Create the blank file to use as a root filesystem
167 dd if=/dev
/zero of
=encrypted.ext2 bs
=1M count
=20
168 dd if=/dev
/zero of
=flag.img bs
=1M count
=1
171 # Create what will eventually be our root filesystem onto an overlay
173 initdir
=overlay
/source
174 .
$basedir/dracut-functions
175 dracut_install sh df free
ls shutdown poweroff stty
cat ps
ln ip \
176 /lib
/terminfo
/l
/linux mount dmesg mkdir
cp ping
177 inst .
/client-init
/sbin
/init
178 find_binary plymouth
>/dev
/null
&& dracut_install plymouth
179 (cd "$initdir"; mkdir
-p dev sys proc etc var
/run tmp
)
182 # second, install the files needed to make the root filesystem
185 .
$basedir/dracut-functions
186 dracut_install mke2fs poweroff
cp umount
187 inst_simple .
/create-root.sh
/pre-mount
/01create-root.sh
190 # create an initramfs that will create the target root filesystem.
191 # We do it this way so that we do not risk trashing the host mdraid
192 # devices, volume groups, encrypted partitions, etc.
193 $basedir/dracut
-l -i overlay
/ \
194 -m "dash crypt lvm mdraid udev-rules base rootfs-block kernel-modules" \
195 -d "ata_piix ext2 sd_mod" \
196 -f initramfs.makeroot
$KVERSION ||
return 1
199 # Invoke KVM and/or QEMU to actually create the target filesystem.
200 $testdir/run-qemu
-hda flag.img
-hdb encrypted.ext2
-m 256M \
201 -nographic -net none \
202 -kernel "/boot/vmlinuz-$kernel" \
203 -append "root=/dev/dracut/root rw quiet console=ttyS0,115200n81" \
204 -initrd initramfs.makeroot ||
return 1
205 grep -m 1 -q dracut-root-block-created flag.img ||
return 1
209 dd if=/dev
/zero of
=nbd.ext2 bs
=1M count
=30
210 mke2fs
-F -j nbd.ext2
212 sudo mount
-o loop nbd.ext2 mnt
217 .
$basedir/dracut-functions
218 dracut_install sh
ls shutdown poweroff stty
cat ps
ln ip \
219 /lib
/terminfo
/l
/linux dmesg mkdir
cp ping
220 inst .
/client-init
/sbin
/init
223 mkdir
-p dev sys proc etc var
/run tmp
225 inst
/etc
/nsswitch.conf
/etc
/nsswitch.conf
226 inst
/etc
/passwd
/etc
/passwd
227 inst
/etc
/group
/etc
/group
228 for i
in /lib
*/libnss_files
**;do
232 ldconfig
-n -r "$initdir" /lib
* /usr
/lib
*
240 dd if=/dev
/zero of
=server.ext2 bs
=1M count
=30
241 mke2fs
-F server.ext2
243 sudo mount
-o loop server.ext2 mnt
248 .
$basedir/dracut-functions
249 dracut_install sh
ls shutdown poweroff stty
cat ps
ln ip \
250 /lib
/terminfo
/l
/linux dmesg mkdir
cp ping grep \
251 sleep nbd-server
chmod
252 which dhcpd
>/dev
/null
2>&1 && dracut_install dhcpd
253 [ -x /usr
/sbin
/dhcpd3
] && inst
/usr
/sbin
/dhcpd3
/usr
/sbin
/dhcpd
254 inst .
/server-init
/sbin
/init
255 inst .
/hosts
/etc
/hosts
256 inst .
/dhcpd.conf
/etc
/dhcpd.conf
259 mkdir
-p dev sys proc etc var
/run var
/lib
/dhcpd tmp
261 inst
/etc
/nsswitch.conf
/etc
/nsswitch.conf
262 inst
/etc
/passwd
/etc
/passwd
263 inst
/etc
/group
/etc
/group
264 for i
in /lib
*/libnss_files
**;do
268 ldconfig
-n -r "$initdir" /lib
* /usr
/lib
*
276 make_encrypted_root ||
return 1
277 make_client_root ||
return 1
278 make_server_root ||
return 1
280 # Make the test image
283 .
$basedir/dracut-functions
284 dracut_install poweroff shutdown
285 inst_simple .
/hard-off.sh
/emergency
/01hard-off.sh
286 inst .
/cryptroot-ask
/sbin
/cryptroot-ask
289 sudo
$basedir/dracut
-l -i overlay
/ \
290 -m "dash udev-rules rootfs-block base debug kernel-modules" \
291 -d "ata_piix ext2 sd_mod e1000" \
292 -f initramfs.server
$KVERSION ||
return 1
294 sudo
$basedir/dracut
-l -i overlay
/ \
297 -d "ata_piix ext2 ext3 sd_mod e1000" \
298 -f initramfs.testing
$KVERSION ||
return 1
302 if [[ -s server.pid
]]; then
303 sudo
kill -TERM $
(cat server.pid
)
307 rm -f flag.img server.ext2 nbd.ext2 encrypted.ext2
308 rm -f initramfs.server initramfs.testing initramfs.makeroot
311 .
$testdir/test-functions