File: kernel-smoke-test-encryption

package info (click to toggle)
zfs-linux 2.3.4~git20250812.3b64a96-1
  • links: PTS, VCS
  • area: contrib
  • in suites: experimental
  • size: 70,688 kB
  • sloc: ansic: 393,668; sh: 68,068; asm: 47,734; python: 8,160; makefile: 5,125; perl: 859; sed: 41
file content (128 lines) | stat: -rwxr-xr-x 2,951 bytes parent folder | download | duplicates (7)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
#!/bin/sh
#
# Copyright (C) 2016 Canonical
# Copyright (C) 2019 Mo Zhou <cdluminate@gmail.com>
#   
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
#
echo -n "kernel smoke test, encrypted ZFS filesystems, load/unload keys: "
TMP=/tmp
VDEV0=${TMP}/pool0-$$.img
POOL=pool-smoke-$$
ZFSFS="test data1"
PWFILE=${TMP}/key-$$.txt

dd if=/dev/zero of=${VDEV0} bs=1M count=512 > /dev/null 2>&1

zpool create ${POOL} ${VDEV0}
ret=$?
if [ $ret -ne 0 ]; then
	echo "FAILED: zpool create failed, exit code=$ret"
	rm ${VDEV0}
	exit 1
fi

#
# And populate with encrypted ZFS file systems
#
echo "pa55w0rd" > $PWFILE
for fs in ${ZFSFS}
do
	zfs create ${POOL}/$fs -o encryption=on \
		-o keyformat=passphrase -o keylocation=file://$PWFILE
	ret=$?
	if [ $ret -ne 0 ]; then
		echo "FAILED: zfs create encrypted filesystem $fs failed, exit code=$ret"
		zpool destroy ${POOL}
		rm ${VDEV0}
		exit 1
	fi
	
	zfs set compression=on ${POOL}/$fs
	ret=$?
	if [ $ret -ne 0 ]; then
		echo "FAILED: zfs set compression on encrypted $fs failed, exit code=$ret"
		zpool destroy ${POOL}
		rm ${VDEV0}
		exit 1
	fi

	zfs umount ${POOL}/$fs
	ret=$?
	if [ $ret -ne 0 ]; then
		echo "FAILED: zfs umount encrypted $fs failed, exit code=$ret"
		zpool destroy ${POOL}
		rm ${VDEV0}
		exit 1
	fi

	zfs unload-key ${POOL}/$fs
	ret=$?
	if [ $ret -ne 0 ]; then
		echo "FAILED: zfs unload-key from $fs failed, exit code=$ret"
		zpool destroy ${POOL}
		rm ${VDEV0}
		exit 1
	fi

	zfs load-key -L file://$PWFILE ${POOL}/$fs
	ret=$?
	if [ $ret -ne 0 ]; then
		echo "FAILED: zfs load-key for $fs failed, exit code=$ret"
		zpool destroy ${POOL}
		rm ${VDEV0}
		exit 1
	fi

	zfs mount ${POOL}/$fs
	ret=$?
	if [ $ret -ne 0 ]; then
		echo "FAILED: zfs mount encrypted $fs failed, exit code=$ret"
		zpool destroy ${POOL}
		rm ${VDEV0}
		exit 1
	fi
done

#
# And destroy ZFS file systems
#
for fs in ${ZFSFS}
do
	zfs destroy ${POOL}/$fs 
	ret=$?
	if [ $ret -ne 0 ]; then
		echo "FAILED: zfs destroy encrypted filesystem $fs failed, exit code=$ret"
		zpool destroy ${POOL}
		rm ${VDEV0}
		exit 1
	fi
done

zpool destroy ${POOL}
ret=$?
if [ $ret -ne 0 ]; then
	echo "FAILED: zpool destroy failed, exit code=$ret"
	#
	# destroy failed, try to clean up, but this
	# wil probably fail
	#
	rm ${VDEV0}
	exit 1
fi

rm ${VDEV0} $PWFILE
echo "PASSED"
exit 0