2015-03-05 14:21:27 +00:00
|
|
|
# Test whether hibernation from partition works.
|
|
|
|
|
2021-04-23 01:01:15 +00:00
|
|
|
{ system ? builtins.currentSystem
|
|
|
|
, config ? {}
|
|
|
|
, pkgs ? import ../.. { inherit system config; }
|
2022-04-13 11:48:20 +00:00
|
|
|
, systemdStage1 ? false
|
2021-04-23 01:01:15 +00:00
|
|
|
}:
|
2015-03-05 14:21:27 +00:00
|
|
|
|
2021-04-23 01:01:15 +00:00
|
|
|
with import ../lib/testing-python.nix { inherit system pkgs; };
|
2015-03-05 14:21:27 +00:00
|
|
|
|
2021-04-23 01:01:15 +00:00
|
|
|
let
|
|
|
|
# System configuration of the installed system, which is used for the actual
|
|
|
|
# hibernate testing.
|
|
|
|
installedConfig = with pkgs.lib; {
|
|
|
|
imports = [
|
|
|
|
../modules/testing/test-instrumentation.nix
|
|
|
|
../modules/profiles/qemu-guest.nix
|
|
|
|
../modules/profiles/minimal.nix
|
|
|
|
];
|
2015-03-05 14:21:27 +00:00
|
|
|
|
2021-04-23 01:01:15 +00:00
|
|
|
hardware.enableAllFirmware = mkForce false;
|
|
|
|
documentation.nixos.enable = false;
|
|
|
|
boot.loader.grub.device = "/dev/vda";
|
2015-03-05 14:21:27 +00:00
|
|
|
|
2021-04-23 01:01:15 +00:00
|
|
|
systemd.services.backdoor.conflicts = [ "sleep.target" ];
|
2015-03-05 14:21:27 +00:00
|
|
|
|
2021-04-23 01:01:15 +00:00
|
|
|
powerManagement.resumeCommands = "systemctl --no-block restart backdoor.service";
|
|
|
|
|
2022-11-21 02:01:51 +00:00
|
|
|
fileSystems."/" = {
|
|
|
|
device = "/dev/vda2";
|
|
|
|
fsType = "ext3";
|
2015-03-05 14:21:27 +00:00
|
|
|
};
|
2021-04-23 01:01:15 +00:00
|
|
|
swapDevices = mkOverride 0 [ { device = "/dev/vda1"; } ];
|
2022-04-13 11:48:20 +00:00
|
|
|
boot.resumeDevice = mkIf systemdStage1 "/dev/vda1";
|
|
|
|
boot.initrd.systemd = mkIf systemdStage1 {
|
|
|
|
enable = true;
|
|
|
|
emergencyAccess = true;
|
|
|
|
};
|
2021-04-23 01:01:15 +00:00
|
|
|
};
|
|
|
|
installedSystem = (import ../lib/eval-config.nix {
|
|
|
|
inherit system;
|
|
|
|
modules = [ installedConfig ];
|
|
|
|
}).config.system.build.toplevel;
|
|
|
|
in makeTest {
|
|
|
|
name = "hibernate";
|
|
|
|
|
|
|
|
nodes = {
|
|
|
|
# System configuration used for installing the installedConfig from above.
|
2023-04-30 01:17:05 +00:00
|
|
|
machine = { config, lib, pkgs, ... }: {
|
2021-04-23 01:01:15 +00:00
|
|
|
imports = [
|
|
|
|
../modules/profiles/installation-device.nix
|
|
|
|
../modules/profiles/base.nix
|
nixos/qemu-vm: use persistent block device names
This change removes the bespoke logic around identifying block devices.
Instead of trying to find the right device by iterating over
`qemu.drives` and guessing the right partition number (e.g.
/dev/vda{1,2}), devices are now identified by persistent names provided
by udev in /dev/disk/by-*.
Before this change, the root device was formatted on demand in the
initrd. However, this makes it impossible to use filesystem identifiers
to identify devices. Now, the formatting step is performed before the VM
is started. Because some tests, however, rely on this behaviour, a
utility function to replace this behaviour in added in
/nixos/tests/common/auto-format-root-device.nix.
Devices that contain neither a partition table nor a filesystem are
identified by their hardware serial number which is injecetd via QEMU
(and is thus persistent and predictable). PCI paths are not a reliably
way to identify devices because their availability and numbering depends
on the QEMU machine type.
This change makes the module more robust against changes in QEMU and the
kernel (non-persistent device naming) and by decoupling abstractions
(i.e. rootDevice, bootPartition, and bootLoaderDevice) enables further
improvement down the line.
2023-06-08 00:34:10 +00:00
|
|
|
./common/auto-format-root-device.nix
|
2021-04-23 01:01:15 +00:00
|
|
|
];
|
2015-03-05 14:21:27 +00:00
|
|
|
|
2021-11-19 22:36:26 +00:00
|
|
|
nix.settings = {
|
2023-04-30 01:17:05 +00:00
|
|
|
substituters = lib.mkForce [];
|
2021-11-19 22:36:26 +00:00
|
|
|
hashed-mirrors = null;
|
|
|
|
connect-timeout = 1;
|
|
|
|
};
|
2021-04-23 01:01:15 +00:00
|
|
|
|
|
|
|
virtualisation.diskSize = 8 * 1024;
|
|
|
|
virtualisation.emptyDiskImages = [
|
|
|
|
# Small root disk for installer
|
|
|
|
512
|
|
|
|
];
|
2022-10-15 22:18:03 +00:00
|
|
|
virtualisation.rootDevice = "/dev/vdb";
|
2015-03-05 14:21:27 +00:00
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
# 9P doesn't support reconnection to virtio transport after a hibernation.
|
|
|
|
# Therefore, machine just hangs on any Nix store access.
|
2021-04-23 01:01:15 +00:00
|
|
|
# To avoid this, we install NixOS onto a temporary disk with everything we need
|
|
|
|
# included into the store.
|
2015-03-05 14:21:27 +00:00
|
|
|
|
|
|
|
testScript =
|
|
|
|
''
|
2021-04-23 01:01:15 +00:00
|
|
|
def create_named_machine(name):
|
2021-10-26 21:09:05 +00:00
|
|
|
machine = create_machine(
|
2021-04-23 01:01:15 +00:00
|
|
|
{
|
|
|
|
"qemuFlags": "-cpu max ${
|
|
|
|
if system == "x86_64-linux" then "-m 1024"
|
|
|
|
else "-m 768 -enable-kvm -machine virt,gic-version=host"}",
|
|
|
|
"hdaInterface": "virtio",
|
|
|
|
"hda": "vm-state-machine/machine.qcow2",
|
|
|
|
"name": name,
|
|
|
|
}
|
|
|
|
)
|
2021-10-26 21:09:05 +00:00
|
|
|
driver.machines.append(machine)
|
|
|
|
return machine
|
2021-04-23 01:01:15 +00:00
|
|
|
|
|
|
|
|
|
|
|
# Install NixOS
|
2019-11-09 19:05:18 +00:00
|
|
|
machine.start()
|
2021-04-23 01:01:15 +00:00
|
|
|
machine.succeed(
|
|
|
|
# Partition /dev/vda
|
|
|
|
"flock /dev/vda parted --script /dev/vda -- mklabel msdos"
|
|
|
|
+ " mkpart primary linux-swap 1M 1024M"
|
|
|
|
+ " mkpart primary ext2 1024M -1s",
|
|
|
|
"udevadm settle",
|
|
|
|
"mkfs.ext3 -L nixos /dev/vda2",
|
|
|
|
"mount LABEL=nixos /mnt",
|
|
|
|
"mkswap /dev/vda1 -L swap",
|
|
|
|
# Install onto /mnt
|
|
|
|
"nix-store --load-db < ${pkgs.closureInfo {rootPaths = [installedSystem];}}/registration",
|
2021-10-24 13:46:45 +00:00
|
|
|
"nixos-install --root /mnt --system ${installedSystem} --no-root-passwd --no-channel-copy >&2",
|
2021-04-23 01:01:15 +00:00
|
|
|
)
|
|
|
|
machine.shutdown()
|
|
|
|
|
|
|
|
# Start up
|
|
|
|
hibernate = create_named_machine("hibernate")
|
|
|
|
|
|
|
|
# Drop in file that checks if we un-hibernated properly (and not booted fresh)
|
|
|
|
hibernate.succeed(
|
|
|
|
"mkdir /run/test",
|
|
|
|
"mount -t ramfs -o size=1m ramfs /run/test",
|
|
|
|
"echo not persisted to disk > /run/test/suspended",
|
|
|
|
)
|
|
|
|
|
|
|
|
# Hibernate machine
|
2021-11-05 00:43:22 +00:00
|
|
|
hibernate.execute("systemctl hibernate >&2 &", check_return=False)
|
2021-04-23 01:01:15 +00:00
|
|
|
hibernate.wait_for_shutdown()
|
|
|
|
|
|
|
|
# Restore machine from hibernation, validate our ramfs file is there.
|
|
|
|
resume = create_named_machine("resume")
|
|
|
|
resume.start()
|
|
|
|
resume.succeed("grep 'not persisted to disk' /run/test/suspended")
|
2022-03-24 20:00:37 +00:00
|
|
|
|
|
|
|
# Ensure we don't restore from hibernation when booting again
|
|
|
|
resume.crash()
|
|
|
|
resume.wait_for_unit("default.target")
|
|
|
|
resume.fail("grep 'not persisted to disk' /run/test/suspended")
|
2015-03-05 14:21:27 +00:00
|
|
|
'';
|
|
|
|
|
2021-04-23 01:01:15 +00:00
|
|
|
}
|