2015-03-05 15:21:27 +01:00
|
|
|
# Test whether hibernation from partition works.
|
|
|
|
|
2021-04-23 03:01:15 +02:00
|
|
|
{ system ? builtins.currentSystem
|
|
|
|
, config ? {}
|
|
|
|
, pkgs ? import ../.. { inherit system config; }
|
2022-04-13 13:48:20 +02:00
|
|
|
, systemdStage1 ? false
|
2021-04-23 03:01:15 +02:00
|
|
|
}:
|
2015-03-05 15:21:27 +01:00
|
|
|
|
2021-04-23 03:01:15 +02:00
|
|
|
with import ../lib/testing-python.nix { inherit system pkgs; };
|
2015-03-05 15:21:27 +01:00
|
|
|
|
2021-04-23 03:01:15 +02:00
|
|
|
let
|
|
|
|
# System configuration of the installed system, which is used for the actual
|
|
|
|
# hibernate testing.
|
|
|
|
installedConfig = with pkgs.lib; {
|
|
|
|
imports = [
|
|
|
|
../modules/testing/test-instrumentation.nix
|
|
|
|
../modules/profiles/qemu-guest.nix
|
|
|
|
../modules/profiles/minimal.nix
|
|
|
|
];
|
2015-03-05 15:21:27 +01:00
|
|
|
|
2021-04-23 03:01:15 +02:00
|
|
|
hardware.enableAllFirmware = mkForce false;
|
|
|
|
documentation.nixos.enable = false;
|
|
|
|
boot.loader.grub.device = "/dev/vda";
|
2015-03-05 15:21:27 +01:00
|
|
|
|
2021-04-23 03:01:15 +02:00
|
|
|
systemd.services.backdoor.conflicts = [ "sleep.target" ];
|
2015-03-05 15:21:27 +01:00
|
|
|
|
2021-04-23 03:01:15 +02:00
|
|
|
powerManagement.resumeCommands = "systemctl --no-block restart backdoor.service";
|
|
|
|
|
2022-11-21 03:01:51 +01:00
|
|
|
fileSystems."/" = {
|
|
|
|
device = "/dev/vda2";
|
|
|
|
fsType = "ext3";
|
2015-03-05 15:21:27 +01:00
|
|
|
};
|
2021-04-23 03:01:15 +02:00
|
|
|
swapDevices = mkOverride 0 [ { device = "/dev/vda1"; } ];
|
2022-04-13 13:48:20 +02:00
|
|
|
boot.resumeDevice = mkIf systemdStage1 "/dev/vda1";
|
|
|
|
boot.initrd.systemd = mkIf systemdStage1 {
|
|
|
|
enable = true;
|
|
|
|
emergencyAccess = true;
|
|
|
|
};
|
2021-04-23 03:01:15 +02:00
|
|
|
};
|
|
|
|
installedSystem = (import ../lib/eval-config.nix {
|
|
|
|
inherit system;
|
|
|
|
modules = [ installedConfig ];
|
|
|
|
}).config.system.build.toplevel;
|
|
|
|
in makeTest {
|
|
|
|
name = "hibernate";
|
|
|
|
|
|
|
|
nodes = {
|
|
|
|
# System configuration used for installing the installedConfig from above.
|
2023-04-30 03:17:05 +02:00
|
|
|
machine = { config, lib, pkgs, ... }: {
|
2021-04-23 03:01:15 +02:00
|
|
|
imports = [
|
|
|
|
../modules/profiles/installation-device.nix
|
|
|
|
../modules/profiles/base.nix
|
|
|
|
];
|
2015-03-05 15:21:27 +01:00
|
|
|
|
2021-11-19 23:36:26 +01:00
|
|
|
nix.settings = {
|
2023-04-30 03:17:05 +02:00
|
|
|
substituters = lib.mkForce [];
|
2021-11-19 23:36:26 +01:00
|
|
|
hashed-mirrors = null;
|
|
|
|
connect-timeout = 1;
|
|
|
|
};
|
2021-04-23 03:01:15 +02:00
|
|
|
|
|
|
|
virtualisation.diskSize = 8 * 1024;
|
|
|
|
virtualisation.emptyDiskImages = [
|
|
|
|
# Small root disk for installer
|
|
|
|
512
|
|
|
|
];
|
2022-10-16 00:18:03 +02:00
|
|
|
virtualisation.rootDevice = "/dev/vdb";
|
2015-03-05 15:21:27 +01:00
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
# 9P doesn't support reconnection to virtio transport after a hibernation.
|
|
|
|
# Therefore, machine just hangs on any Nix store access.
|
2021-04-23 03:01:15 +02:00
|
|
|
# To avoid this, we install NixOS onto a temporary disk with everything we need
|
|
|
|
# included into the store.
|
2015-03-05 15:21:27 +01:00
|
|
|
|
|
|
|
testScript =
|
|
|
|
''
|
2021-04-23 03:01:15 +02:00
|
|
|
def create_named_machine(name):
|
2021-10-26 23:09:05 +02:00
|
|
|
machine = create_machine(
|
2021-04-23 03:01:15 +02:00
|
|
|
{
|
|
|
|
"qemuFlags": "-cpu max ${
|
|
|
|
if system == "x86_64-linux" then "-m 1024"
|
|
|
|
else "-m 768 -enable-kvm -machine virt,gic-version=host"}",
|
|
|
|
"hdaInterface": "virtio",
|
|
|
|
"hda": "vm-state-machine/machine.qcow2",
|
|
|
|
"name": name,
|
|
|
|
}
|
|
|
|
)
|
2021-10-26 23:09:05 +02:00
|
|
|
driver.machines.append(machine)
|
|
|
|
return machine
|
2021-04-23 03:01:15 +02:00
|
|
|
|
|
|
|
|
|
|
|
# Install NixOS
|
2019-11-09 20:05:18 +01:00
|
|
|
machine.start()
|
2021-04-23 03:01:15 +02:00
|
|
|
machine.succeed(
|
|
|
|
# Partition /dev/vda
|
|
|
|
"flock /dev/vda parted --script /dev/vda -- mklabel msdos"
|
|
|
|
+ " mkpart primary linux-swap 1M 1024M"
|
|
|
|
+ " mkpart primary ext2 1024M -1s",
|
|
|
|
"udevadm settle",
|
|
|
|
"mkfs.ext3 -L nixos /dev/vda2",
|
|
|
|
"mount LABEL=nixos /mnt",
|
|
|
|
"mkswap /dev/vda1 -L swap",
|
|
|
|
# Install onto /mnt
|
|
|
|
"nix-store --load-db < ${pkgs.closureInfo {rootPaths = [installedSystem];}}/registration",
|
2021-10-24 15:46:45 +02:00
|
|
|
"nixos-install --root /mnt --system ${installedSystem} --no-root-passwd --no-channel-copy >&2",
|
2021-04-23 03:01:15 +02:00
|
|
|
)
|
|
|
|
machine.shutdown()
|
|
|
|
|
|
|
|
# Start up
|
|
|
|
hibernate = create_named_machine("hibernate")
|
|
|
|
|
|
|
|
# Drop in file that checks if we un-hibernated properly (and not booted fresh)
|
|
|
|
hibernate.succeed(
|
|
|
|
"mkdir /run/test",
|
|
|
|
"mount -t ramfs -o size=1m ramfs /run/test",
|
|
|
|
"echo not persisted to disk > /run/test/suspended",
|
|
|
|
)
|
|
|
|
|
|
|
|
# Hibernate machine
|
2021-11-05 01:43:22 +01:00
|
|
|
hibernate.execute("systemctl hibernate >&2 &", check_return=False)
|
2021-04-23 03:01:15 +02:00
|
|
|
hibernate.wait_for_shutdown()
|
|
|
|
|
|
|
|
# Restore machine from hibernation, validate our ramfs file is there.
|
|
|
|
resume = create_named_machine("resume")
|
|
|
|
resume.start()
|
|
|
|
resume.succeed("grep 'not persisted to disk' /run/test/suspended")
|
2022-03-24 21:00:37 +01:00
|
|
|
|
|
|
|
# Ensure we don't restore from hibernation when booting again
|
|
|
|
resume.crash()
|
|
|
|
resume.wait_for_unit("default.target")
|
|
|
|
resume.fail("grep 'not persisted to disk' /run/test/suspended")
|
2015-03-05 15:21:27 +01:00
|
|
|
'';
|
|
|
|
|
2021-04-23 03:01:15 +02:00
|
|
|
}
|