2020-10-15 12:45:57 +00:00
|
|
|
#!/bin/bash --norc
|
|
|
|
# New mkdumprd
|
|
|
|
#
|
|
|
|
# Copyright 2011 Red Hat, Inc.
|
|
|
|
#
|
|
|
|
# Written by Cong Wang <amwang@redhat.com>
|
|
|
|
#
|
|
|
|
|
bash scripts: replace '[ ]' with '[[ ]]' for bash scripts
upstream: fedora
resolves: bz2003832
conflict:
function load_kdump_kernel_key() not presented in rhel9,
so related patch hunk are removed.
commit 70978c00e5a573f0901ac404067eaea2c6536370
Author: Kairui Song <kasong@redhat.com>
Date: Wed Sep 8 17:20:51 2021 +0800
bash scripts: replace '[ ]' with '[[ ]]' for bash scripts
kdumpctl, mkdumprd, *-module-setup.sh only target bash, since they
only run in first kernel and depend on dracut, and dracut depends
on bash. So use '[[ ]]' to replace '[ ]'.
This is a batch update done with following command:
`sed -i -e 's/\(\s\)\[\s\([^]]*\)\s\]/\1\[\[\ \2 \]\]/g' kdumpctl, mkdumprd, *-module-setup.sh`
and replaced [ ... -a ... ] with [[ ... ]] && [[ ... ]] manually.
See https://tldp.org/LDP/abs/html/testconstructs.html for more details
on '[[ ]]', it's more versatile, safer, and slightly faster than '[ ]'.
This will also help shfmt to clean up the code in later commits.
Signed-off-by: Kairui Song <kasong@redhat.com>
Acked-by: Philipp Rudo <prudo@redhat.com>
Signed-off-by: Tao Liu <ltao@redhat.com>
2021-11-09 13:13:59 +00:00
|
|
|
if [[ -f /etc/sysconfig/kdump ]]; then
|
2020-11-05 05:34:29 +00:00
|
|
|
. /etc/sysconfig/kdump
|
|
|
|
fi
|
|
|
|
|
2020-10-15 12:45:57 +00:00
|
|
|
[[ $dracutbasedir ]] || dracutbasedir=/usr/lib/dracut
|
|
|
|
. $dracutbasedir/dracut-functions.sh
|
|
|
|
. /lib/kdump/kdump-lib.sh
|
2021-01-22 08:12:00 +00:00
|
|
|
. /lib/kdump/kdump-logger.sh
|
2020-10-15 12:45:57 +00:00
|
|
|
export IN_KDUMP=1
|
|
|
|
|
2020-11-05 05:34:29 +00:00
|
|
|
#initiate the kdump logger
|
2021-11-09 13:35:45 +00:00
|
|
|
if ! dlog_init; then
|
2020-11-05 05:34:29 +00:00
|
|
|
echo "failed to initiate the kdump logger."
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
|
2020-10-15 12:45:57 +00:00
|
|
|
SSH_KEY_LOCATION="/root/.ssh/kdump_id_rsa"
|
|
|
|
SAVE_PATH=$(get_save_path)
|
|
|
|
OVERRIDE_RESETTABLE=0
|
|
|
|
|
|
|
|
extra_modules=""
|
2021-11-03 11:36:03 +00:00
|
|
|
dracut_args=(--add kdumpbase --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict -o "plymouth resume ifcfg earlykdump")
|
2020-10-15 12:45:57 +00:00
|
|
|
|
2021-11-03 09:30:56 +00:00
|
|
|
MKDUMPRD_TMPDIR="$(mktemp -d -t mkdumprd.XXXXXX)"
|
2020-10-15 12:45:57 +00:00
|
|
|
[ -d "$MKDUMPRD_TMPDIR" ] || perror_exit "dracut: mktemp -p -d -t dracut.XXXXXX failed."
|
2021-11-03 09:30:56 +00:00
|
|
|
MKDUMPRD_TMPMNT="$MKDUMPRD_TMPDIR/target"
|
2020-10-15 12:45:57 +00:00
|
|
|
|
|
|
|
trap '
|
|
|
|
ret=$?;
|
|
|
|
is_mounted $MKDUMPRD_TMPMNT && umount -f $MKDUMPRD_TMPMNT;
|
|
|
|
[[ -d $MKDUMPRD_TMPDIR ]] && rm --one-file-system -rf -- "$MKDUMPRD_TMPDIR";
|
|
|
|
exit $ret;
|
|
|
|
' EXIT
|
|
|
|
|
|
|
|
# clean up after ourselves no matter how we die.
|
|
|
|
trap 'exit 1;' SIGINT
|
|
|
|
|
2021-11-09 13:42:45 +00:00
|
|
|
add_dracut_arg()
|
|
|
|
{
|
|
|
|
dracut_args+=("$@")
|
2020-10-15 12:45:57 +00:00
|
|
|
}
|
|
|
|
|
2021-11-09 13:42:45 +00:00
|
|
|
add_dracut_mount()
|
|
|
|
{
|
|
|
|
add_dracut_arg "--mount" "$1"
|
2020-10-15 12:45:57 +00:00
|
|
|
}
|
|
|
|
|
2021-11-09 13:42:45 +00:00
|
|
|
add_dracut_sshkey()
|
|
|
|
{
|
|
|
|
add_dracut_arg "--sshkey" "$1"
|
2020-10-15 12:45:57 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
# caller should ensure $1 is valid and mounted in 1st kernel
|
2021-11-09 13:42:45 +00:00
|
|
|
to_mount()
|
|
|
|
{
|
|
|
|
local _target=$1 _fstype=$2 _options=$3 _sed_cmd _new_mntpoint _pdev
|
|
|
|
|
|
|
|
_new_mntpoint=$(get_kdump_mntpoint_from_target "$_target")
|
|
|
|
_fstype="${_fstype:-$(get_fs_type_from_target "$_target")}"
|
|
|
|
_options="${_options:-$(get_mntopt_from_target "$_target")}"
|
|
|
|
_options="${_options:-defaults}"
|
|
|
|
|
|
|
|
if [[ $_fstype == "nfs"* ]]; then
|
|
|
|
_pdev=$_target
|
2021-11-09 14:47:22 +00:00
|
|
|
_sed_cmd+='s/,\(mount\)\?addr=[^,]*//g;'
|
|
|
|
_sed_cmd+='s/,\(mount\)\?proto=[^,]*//g;'
|
2021-11-09 13:42:45 +00:00
|
|
|
_sed_cmd+='s/,clientaddr=[^,]*//;'
|
|
|
|
else
|
|
|
|
# for non-nfs _target converting to use udev persistent name
|
|
|
|
_pdev="$(kdump_get_persistent_dev "$_target")"
|
|
|
|
if [[ -z $_pdev ]]; then
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
# mount fs target as rw in 2nd kernel
|
|
|
|
_sed_cmd+='s/\(^\|,\)ro\($\|,\)/\1rw\2/g;'
|
|
|
|
# with 'noauto' in fstab nfs and non-root disk mount will fail in 2nd
|
|
|
|
# kernel, filter it out here.
|
|
|
|
_sed_cmd+='s/\(^\|,\)noauto\($\|,\)/\1/g;'
|
|
|
|
# drop nofail or nobootwait
|
|
|
|
_sed_cmd+='s/\(^\|,\)nofail\($\|,\)/\1/g;'
|
|
|
|
_sed_cmd+='s/\(^\|,\)nobootwait\($\|,\)/\1/g;'
|
|
|
|
|
|
|
|
_options=$(echo "$_options" | sed "$_sed_cmd")
|
|
|
|
|
|
|
|
echo "$_pdev $_new_mntpoint $_fstype $_options"
|
2020-10-15 12:45:57 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#Function: get_ssh_size
|
|
|
|
#$1=dump target
|
|
|
|
#called from while loop and shouldn't read from stdin, so we're using "ssh -n"
|
2021-11-09 13:42:45 +00:00
|
|
|
get_ssh_size()
|
|
|
|
{
|
|
|
|
local _out
|
|
|
|
local _opt=("-i" "$SSH_KEY_LOCATION" "-o" "BatchMode=yes" "-o" "StrictHostKeyChecking=yes")
|
2021-11-03 07:36:02 +00:00
|
|
|
|
2021-11-09 13:42:45 +00:00
|
|
|
if ! _out=$(ssh -q -n "${_opt[@]}" "$1" "df" "--output=avail" "$SAVE_PATH"); then
|
|
|
|
perror_exit "checking remote ssh server available size failed."
|
|
|
|
fi
|
2020-10-15 12:45:57 +00:00
|
|
|
|
2021-11-09 13:42:45 +00:00
|
|
|
echo -n "$_out" | tail -1
|
2020-10-15 12:45:57 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#mkdir if save path does not exist on ssh dump target
|
|
|
|
#$1=ssh dump target
|
|
|
|
#caller should ensure write permission on $1:$SAVE_PATH
|
|
|
|
#called from while loop and shouldn't read from stdin, so we're using "ssh -n"
|
|
|
|
mkdir_save_path_ssh()
|
|
|
|
{
|
2021-11-09 13:42:45 +00:00
|
|
|
local _opt _dir
|
|
|
|
_opt=(-i "$SSH_KEY_LOCATION" -o BatchMode=yes -o StrictHostKeyChecking=yes)
|
|
|
|
ssh -qn "${_opt[@]}" "$1" mkdir -p "$SAVE_PATH" &> /dev/null ||
|
|
|
|
perror_exit "mkdir failed on $1:$SAVE_PATH"
|
2020-10-15 12:45:57 +00:00
|
|
|
|
2021-11-09 13:42:45 +00:00
|
|
|
# check whether user has write permission on $1:$SAVE_PATH
|
|
|
|
_dir=$(ssh -qn "${_opt[@]}" "$1" mktemp -dqp "$SAVE_PATH" 2> /dev/null) ||
|
|
|
|
perror_exit "Could not create temporary directory on $1:$SAVE_PATH. Make sure user has write permission on destination"
|
|
|
|
ssh -qn "${_opt[@]}" "$1" rmdir "$_dir"
|
2020-10-15 12:45:57 +00:00
|
|
|
|
2021-11-09 13:42:45 +00:00
|
|
|
return 0
|
2020-10-15 12:45:57 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#Function: get_fs_size
|
|
|
|
#$1=dump target
|
2021-11-09 13:42:45 +00:00
|
|
|
get_fs_size()
|
|
|
|
{
|
|
|
|
df --output=avail "$(get_mntpoint_from_target "$1")/$SAVE_PATH" | tail -1
|
2020-10-15 12:45:57 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#Function: get_raw_size
|
|
|
|
#$1=dump target
|
2021-11-09 13:42:45 +00:00
|
|
|
get_raw_size()
|
|
|
|
{
|
|
|
|
fdisk -s "$1"
|
2020-10-15 12:45:57 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#Function: check_size
|
|
|
|
#$1: dump type string ('raw', 'fs', 'ssh')
|
|
|
|
#$2: dump target
|
2021-11-09 13:42:45 +00:00
|
|
|
check_size()
|
|
|
|
{
|
|
|
|
local avail memtotal
|
|
|
|
|
|
|
|
memtotal=$(awk '/MemTotal/{print $2}' /proc/meminfo)
|
|
|
|
case "$1" in
|
|
|
|
raw)
|
|
|
|
avail=$(get_raw_size "$2")
|
|
|
|
;;
|
|
|
|
ssh)
|
|
|
|
avail=$(get_ssh_size "$2")
|
|
|
|
;;
|
|
|
|
fs)
|
|
|
|
avail=$(get_fs_size "$2")
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
return
|
|
|
|
;;
|
|
|
|
esac || perror_exit "Check dump target size failed"
|
|
|
|
|
|
|
|
if [[ $avail -lt $memtotal ]]; then
|
|
|
|
dwarn "Warning: There might not be enough space to save a vmcore."
|
|
|
|
dwarn " The size of $2 should be greater than $memtotal kilo bytes."
|
|
|
|
fi
|
2020-10-15 12:45:57 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
check_save_path_fs()
|
|
|
|
{
|
2021-11-09 13:42:45 +00:00
|
|
|
local _path=$1
|
2020-10-15 12:45:57 +00:00
|
|
|
|
2021-11-09 13:42:45 +00:00
|
|
|
if [[ ! -d $_path ]]; then
|
|
|
|
perror_exit "Dump path $_path does not exist."
|
|
|
|
fi
|
2020-10-15 12:45:57 +00:00
|
|
|
}
|
|
|
|
|
2021-11-09 12:41:42 +00:00
|
|
|
mount_failure()
|
|
|
|
{
|
2021-11-09 13:42:45 +00:00
|
|
|
local _target=$1
|
|
|
|
local _mnt=$2
|
|
|
|
local _fstype=$3
|
|
|
|
local msg="Failed to mount $_target"
|
2021-11-09 12:41:42 +00:00
|
|
|
|
2021-11-09 13:42:45 +00:00
|
|
|
if [[ -n $_mnt ]]; then
|
|
|
|
msg="$msg on $_mnt"
|
|
|
|
fi
|
2021-11-09 12:41:42 +00:00
|
|
|
|
2021-11-09 13:42:45 +00:00
|
|
|
msg="$msg for kdump preflight check."
|
2021-11-09 12:41:42 +00:00
|
|
|
|
2021-11-09 13:42:45 +00:00
|
|
|
if [[ $_fstype == "nfs" ]]; then
|
|
|
|
msg="$msg Please make sure nfs-utils has been installed."
|
|
|
|
fi
|
2021-11-09 12:41:42 +00:00
|
|
|
|
2021-11-09 13:42:45 +00:00
|
|
|
perror_exit "$msg"
|
2021-11-09 12:41:42 +00:00
|
|
|
}
|
|
|
|
|
2020-10-15 12:45:57 +00:00
|
|
|
check_user_configured_target()
|
|
|
|
{
|
2021-11-09 13:42:45 +00:00
|
|
|
local _target=$1 _cfg_fs_type=$2 _mounted
|
|
|
|
local _mnt _opt _fstype
|
|
|
|
|
|
|
|
_mnt=$(get_mntpoint_from_target "$_target")
|
|
|
|
_opt=$(get_mntopt_from_target "$_target")
|
|
|
|
_fstype=$(get_fs_type_from_target "$_target")
|
|
|
|
|
|
|
|
if [[ -n $_fstype ]]; then
|
|
|
|
# In case of nfs4, nfs should be used instead, nfs* options is deprecated in kdump.conf
|
|
|
|
[[ $_fstype == "nfs"* ]] && _fstype=nfs
|
|
|
|
|
|
|
|
if [[ -n $_cfg_fs_type ]] && [[ $_fstype != "$_cfg_fs_type" ]]; then
|
|
|
|
perror_exit "\"$_target\" have a wrong type config \"$_cfg_fs_type\", expected \"$_fstype\""
|
|
|
|
fi
|
|
|
|
else
|
|
|
|
_fstype="$_cfg_fs_type"
|
|
|
|
_fstype="$_cfg_fs_type"
|
|
|
|
fi
|
|
|
|
|
|
|
|
# For noauto mount, mount it inplace with default value.
|
|
|
|
# Else use the temporary target directory
|
|
|
|
if [[ -n $_mnt ]]; then
|
|
|
|
if ! is_mounted "$_mnt"; then
|
|
|
|
if [[ $_opt == *",noauto"* ]]; then
|
|
|
|
mount "$_mnt" || mount_failure "$_target" "$_mnt" "$_fstype"
|
|
|
|
_mounted=$_mnt
|
|
|
|
else
|
|
|
|
perror_exit "Dump target \"$_target\" is neither mounted nor configured as \"noauto\""
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
else
|
|
|
|
_mnt=$MKDUMPRD_TMPMNT
|
|
|
|
mkdir -p "$_mnt"
|
|
|
|
mount "$_target" "$_mnt" -t "$_fstype" -o defaults || mount_failure "$_target" "" "$_fstype"
|
|
|
|
_mounted=$_mnt
|
|
|
|
fi
|
|
|
|
|
|
|
|
# For user configured target, use $SAVE_PATH as the dump path within the target
|
|
|
|
if [[ ! -d "$_mnt/$SAVE_PATH" ]]; then
|
|
|
|
perror_exit "Dump path \"$_mnt/$SAVE_PATH\" does not exist in dump target \"$_target\""
|
|
|
|
fi
|
|
|
|
|
|
|
|
check_size fs "$_target"
|
|
|
|
|
|
|
|
# Unmount it early, if function is interrupted and didn't reach here, the shell trap will clear it up anyway
|
|
|
|
if [[ -n $_mounted ]]; then
|
|
|
|
umount -f -- "$_mounted"
|
|
|
|
fi
|
2020-10-15 12:45:57 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
# $1: core_collector config value
|
2021-11-09 13:42:45 +00:00
|
|
|
verify_core_collector()
|
|
|
|
{
|
|
|
|
local _cmd="${1%% *}"
|
|
|
|
local _params="${1#* }"
|
|
|
|
|
|
|
|
if [[ $_cmd != "makedumpfile" ]]; then
|
|
|
|
if is_raw_dump_target; then
|
|
|
|
dwarn "Warning: specifying a non-makedumpfile core collector, you will have to recover the vmcore manually."
|
|
|
|
fi
|
|
|
|
return
|
|
|
|
fi
|
|
|
|
|
|
|
|
if is_ssh_dump_target || is_raw_dump_target; then
|
|
|
|
if ! strstr "$_params" "-F"; then
|
|
|
|
perror_exit 'The specified dump target needs makedumpfile "-F" option.'
|
|
|
|
fi
|
|
|
|
_params="$_params vmcore"
|
|
|
|
else
|
|
|
|
_params="$_params vmcore dumpfile"
|
|
|
|
fi
|
|
|
|
|
|
|
|
# shellcheck disable=SC2086
|
|
|
|
if ! $_cmd --check-params $_params; then
|
|
|
|
perror_exit "makedumpfile parameter check failed."
|
|
|
|
fi
|
2020-10-15 12:45:57 +00:00
|
|
|
}
|
|
|
|
|
2021-11-09 13:42:45 +00:00
|
|
|
add_mount()
|
|
|
|
{
|
|
|
|
local _mnt
|
2020-10-15 12:45:57 +00:00
|
|
|
|
2021-11-09 13:42:45 +00:00
|
|
|
_mnt=$(to_mount "$@") || exit 1
|
2020-10-15 12:45:57 +00:00
|
|
|
|
2021-11-09 13:42:45 +00:00
|
|
|
add_dracut_mount "$_mnt"
|
2020-10-15 12:45:57 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#handle the case user does not specify the dump target explicitly
|
|
|
|
handle_default_dump_target()
|
|
|
|
{
|
2021-11-09 13:42:45 +00:00
|
|
|
local _target
|
|
|
|
local _mntpoint
|
2020-10-15 12:45:57 +00:00
|
|
|
|
2021-11-09 13:42:45 +00:00
|
|
|
is_user_configured_dump_target && return
|
2020-10-15 12:45:57 +00:00
|
|
|
|
2021-11-09 13:42:45 +00:00
|
|
|
check_save_path_fs "$SAVE_PATH"
|
2020-10-15 12:45:57 +00:00
|
|
|
|
2021-11-09 13:42:45 +00:00
|
|
|
_save_path=$(get_bind_mount_source "$SAVE_PATH")
|
|
|
|
_target=$(get_target_from_path "$_save_path")
|
|
|
|
_mntpoint=$(get_mntpoint_from_target "$_target")
|
2020-10-15 12:45:57 +00:00
|
|
|
|
2021-11-09 13:42:45 +00:00
|
|
|
SAVE_PATH=${_save_path##"$_mntpoint"}
|
|
|
|
add_mount "$_target"
|
|
|
|
check_size fs "$_target"
|
2020-10-15 12:45:57 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
# $1: function name
|
|
|
|
for_each_block_target()
|
|
|
|
{
|
2021-11-09 13:42:45 +00:00
|
|
|
local dev majmin
|
2020-10-15 12:45:57 +00:00
|
|
|
|
2021-11-09 13:42:45 +00:00
|
|
|
for dev in $(get_kdump_targets); do
|
|
|
|
[[ -b $dev ]] || continue
|
|
|
|
majmin=$(get_maj_min "$dev")
|
|
|
|
check_block_and_slaves "$1" "$majmin" && return 1
|
|
|
|
done
|
2020-10-15 12:45:57 +00:00
|
|
|
|
2021-11-09 13:42:45 +00:00
|
|
|
return 0
|
2020-10-15 12:45:57 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#judge if a specific device with $1 is unresettable
|
|
|
|
#return false if unresettable.
|
|
|
|
is_unresettable()
|
|
|
|
{
|
2021-11-09 13:42:45 +00:00
|
|
|
local path device resettable=1
|
|
|
|
|
|
|
|
path="/sys/$(udevadm info --query=all --path="/sys/dev/block/$1" | awk '/^P:/ {print $2}' | sed -e 's/\(cciss[0-9]\+\/\).*/\1/g' -e 's/\/block\/.*$//')/resettable"
|
|
|
|
if [[ -f $path ]]; then
|
|
|
|
resettable="$(< "$path")"
|
|
|
|
[[ $resettable -eq 0 ]] && [[ $OVERRIDE_RESETTABLE -eq 0 ]] && {
|
|
|
|
device=$(udevadm info --query=all --path="/sys/dev/block/$1" | awk -F= '/DEVNAME/{print $2}')
|
|
|
|
derror "Error: Can not save vmcore because device $device is unresettable"
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
fi
|
|
|
|
|
|
|
|
return 1
|
2020-10-15 12:45:57 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#check if machine is resettable.
|
|
|
|
#return true if resettable
|
|
|
|
check_resettable()
|
|
|
|
{
|
2021-11-09 13:42:45 +00:00
|
|
|
local _target _override_resettable
|
2020-10-15 12:45:57 +00:00
|
|
|
|
2021-11-09 13:42:45 +00:00
|
|
|
_override_resettable=$(kdump_get_conf_val override_resettable)
|
|
|
|
OVERRIDE_RESETTABLE=${_override_resettable:-$OVERRIDE_RESETTABLE}
|
|
|
|
if [ "$OVERRIDE_RESETTABLE" != "0" ] && [ "$OVERRIDE_RESETTABLE" != "1" ]; then
|
|
|
|
perror_exit "override_resettable value '$OVERRIDE_RESETTABLE' is invalid"
|
|
|
|
fi
|
2020-10-15 12:45:57 +00:00
|
|
|
|
2021-11-09 13:42:45 +00:00
|
|
|
for_each_block_target is_unresettable && return
|
2020-10-15 12:45:57 +00:00
|
|
|
|
2021-11-09 13:42:45 +00:00
|
|
|
return 1
|
2020-10-15 12:45:57 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
check_crypt()
|
|
|
|
{
|
2021-11-09 13:42:45 +00:00
|
|
|
local _dev
|
2020-10-15 12:45:57 +00:00
|
|
|
|
2021-11-09 13:42:45 +00:00
|
|
|
for _dev in $(get_kdump_targets); do
|
|
|
|
if [[ -n $(get_luks_crypt_dev "$(get_maj_min "$_dev")") ]]; then
|
|
|
|
derror "Device $_dev is encrypted." && return 1
|
|
|
|
fi
|
|
|
|
done
|
2020-10-15 12:45:57 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if ! check_resettable; then
|
2021-11-09 13:42:45 +00:00
|
|
|
exit 1
|
2020-10-15 12:45:57 +00:00
|
|
|
fi
|
|
|
|
|
|
|
|
if ! check_crypt; then
|
2021-11-09 13:42:45 +00:00
|
|
|
dwarn "Warning: Encrypted device is in dump path, which is not recommended, see kexec-kdump-howto.txt for more details."
|
2020-10-15 12:45:57 +00:00
|
|
|
fi
|
|
|
|
|
|
|
|
# firstly get right SSH_KEY_LOCATION
|
2021-11-03 07:31:19 +00:00
|
|
|
keyfile=$(kdump_get_conf_val sshkey)
|
2021-11-09 13:42:45 +00:00
|
|
|
if [[ -f $keyfile ]]; then
|
|
|
|
# canonicalize the path
|
|
|
|
SSH_KEY_LOCATION=$(/usr/bin/readlink -m "$keyfile")
|
2020-10-15 12:45:57 +00:00
|
|
|
fi
|
|
|
|
|
2021-11-09 13:42:45 +00:00
|
|
|
while read -r config_opt config_val; do
|
|
|
|
# remove inline comments after the end of a directive.
|
|
|
|
case "$config_opt" in
|
|
|
|
extra_modules)
|
|
|
|
extra_modules="$extra_modules $config_val"
|
|
|
|
;;
|
|
|
|
ext[234] | xfs | btrfs | minix | nfs)
|
|
|
|
check_user_configured_target "$config_val" "$config_opt"
|
|
|
|
add_mount "$config_val" "$config_opt"
|
|
|
|
;;
|
|
|
|
raw)
|
|
|
|
# checking raw disk writable
|
|
|
|
dd if="$config_val" count=1 of=/dev/null > /dev/null 2>&1 || {
|
|
|
|
perror_exit "Bad raw disk $config_val"
|
|
|
|
}
|
|
|
|
_praw=$(persistent_policy="by-id" kdump_get_persistent_dev "$config_val")
|
|
|
|
if [[ -z $_praw ]]; then
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
add_dracut_arg "--device" "$_praw"
|
|
|
|
check_size raw "$config_val"
|
|
|
|
;;
|
|
|
|
ssh)
|
|
|
|
if strstr "$config_val" "@"; then
|
|
|
|
mkdir_save_path_ssh "$config_val"
|
|
|
|
check_size ssh "$config_val"
|
|
|
|
add_dracut_sshkey "$SSH_KEY_LOCATION"
|
|
|
|
else
|
|
|
|
perror_exit "Bad ssh dump target $config_val"
|
|
|
|
fi
|
|
|
|
;;
|
|
|
|
core_collector)
|
|
|
|
verify_core_collector "$config_val"
|
|
|
|
;;
|
|
|
|
dracut_args)
|
|
|
|
while read -r dracut_arg; do
|
|
|
|
add_dracut_arg "$dracut_arg"
|
|
|
|
done <<< "$(echo "$config_val" | xargs -n 1 echo)"
|
|
|
|
;;
|
|
|
|
*) ;;
|
|
|
|
|
|
|
|
esac
|
2021-11-03 07:12:31 +00:00
|
|
|
done <<< "$(kdump_read_conf)"
|
2020-10-15 12:45:57 +00:00
|
|
|
|
|
|
|
handle_default_dump_target
|
|
|
|
|
2022-01-06 06:23:41 +00:00
|
|
|
if ! have_compression_in_dracut_args; then
|
|
|
|
add_dracut_arg "--compress" "zstd"
|
|
|
|
fi
|
|
|
|
|
2021-11-09 13:42:45 +00:00
|
|
|
if [[ -n $extra_modules ]]; then
|
|
|
|
add_dracut_arg "--add-drivers" "$extra_modules"
|
2020-10-15 12:45:57 +00:00
|
|
|
fi
|
|
|
|
|
2021-07-12 08:07:05 +00:00
|
|
|
# TODO: The below check is not needed anymore with the introduction of
|
|
|
|
# 'zz-fadumpinit' module, that isolates fadump's capture kernel initrd,
|
|
|
|
# but still sysroot.mount unit gets generated based on 'root=' kernel
|
|
|
|
# parameter available in fadump case. So, find a way to fix that first
|
|
|
|
# before removing this check.
|
2020-10-15 12:45:57 +00:00
|
|
|
if ! is_fadump_capable; then
|
2021-11-09 13:42:45 +00:00
|
|
|
# The 2nd rootfs mount stays behind the normal dump target mount,
|
|
|
|
# so it doesn't affect the logic of check_dump_fs_modified().
|
|
|
|
is_dump_to_rootfs && add_mount "$(to_dev_name "$(get_root_fs_device)")"
|
2020-10-15 12:45:57 +00:00
|
|
|
|
2021-11-09 13:42:45 +00:00
|
|
|
add_dracut_arg "--no-hostonly-default-device"
|
2020-10-15 12:45:57 +00:00
|
|
|
fi
|
|
|
|
|
2021-11-03 07:32:36 +00:00
|
|
|
dracut "${dracut_args[@]}" "$@"
|
2020-10-15 12:45:57 +00:00
|
|
|
|
|
|
|
_rc=$?
|
|
|
|
sync
|
|
|
|
exit $_rc
|