tests/acceptance: Test virtio-rng on s390 via /dev/hwrng
[qemu/ar7.git] / tests / acceptance / machine_s390_ccw_virtio.py
blobe1ad0e29b0cd13ad184416f8aa3222b166ca6008
1 # Functional test that boots an s390x Linux guest with ccw and PCI devices
2 # attached and checks whether the devices are recognized by Linux
4 # Copyright (c) 2020 Red Hat, Inc.
6 # Author:
7 # Cornelia Huck <cohuck@redhat.com>
9 # This work is licensed under the terms of the GNU GPL, version 2 or
10 # later. See the COPYING file in the top-level directory.
13 from avocado_qemu import Test
14 from avocado_qemu import exec_command_and_wait_for_pattern
15 from avocado_qemu import wait_for_console_pattern
17 class S390CCWVirtioMachine(Test):
18 KERNEL_COMMON_COMMAND_LINE = 'printk.time=0 '
20 timeout = 120
22 def wait_for_console_pattern(self, success_message, vm=None):
23 wait_for_console_pattern(self, success_message,
24 failure_message='Kernel panic - not syncing',
25 vm=vm)
27 def wait_for_crw_reports(self):
28 exec_command_and_wait_for_pattern(self,
29 'while ! (dmesg -c | grep CRW) ; do sleep 1 ; done',
30 'CRW reports')
32 dmesg_clear_count = 1
33 def clear_guest_dmesg(self):
34 exec_command_and_wait_for_pattern(self, 'dmesg -c > /dev/null; '
35 'echo dm_clear\ ' + str(self.dmesg_clear_count),
36 'dm_clear ' + str(self.dmesg_clear_count))
37 self.dmesg_clear_count += 1
39 def test_s390x_devices(self):
41 """
42 :avocado: tags=arch:s390x
43 :avocado: tags=machine:s390-ccw-virtio
44 """
46 kernel_url = ('https://snapshot.debian.org/archive/debian/'
47 '20201126T092837Z/dists/buster/main/installer-s390x/'
48 '20190702+deb10u6/images/generic/kernel.debian')
49 kernel_hash = '5821fbee57d6220a067a8b967d24595621aa1eb6'
50 kernel_path = self.fetch_asset(kernel_url, asset_hash=kernel_hash)
52 initrd_url = ('https://snapshot.debian.org/archive/debian/'
53 '20201126T092837Z/dists/buster/main/installer-s390x/'
54 '20190702+deb10u6/images/generic/initrd.debian')
55 initrd_hash = '81ba09c97bef46e8f4660ac25b4ac0a5be3a94d6'
56 initrd_path = self.fetch_asset(initrd_url, asset_hash=initrd_hash)
58 self.vm.set_console()
59 kernel_command_line = (self.KERNEL_COMMON_COMMAND_LINE +
60 'console=sclp0 root=/dev/ram0 BOOT_DEBUG=3')
61 self.vm.add_args('-nographic',
62 '-kernel', kernel_path,
63 '-initrd', initrd_path,
64 '-append', kernel_command_line,
65 '-device', 'virtio-net-ccw,devno=fe.1.1111',
66 '-device',
67 'virtio-rng-ccw,devno=fe.2.0000,max_revision=0,id=rn1',
68 '-device',
69 'virtio-rng-ccw,devno=fe.3.1234,max_revision=2,id=rn2',
70 '-device', 'zpci,uid=5,target=zzz',
71 '-device', 'virtio-net-pci,id=zzz',
72 '-device', 'zpci,uid=0xa,fid=12,target=serial',
73 '-device', 'virtio-serial-pci,id=serial')
74 self.vm.launch()
76 shell_ready = "sh: can't access tty; job control turned off"
77 self.wait_for_console_pattern(shell_ready)
78 # first debug shell is too early, we need to wait for device detection
79 exec_command_and_wait_for_pattern(self, 'exit', shell_ready)
81 ccw_bus_ids="0.1.1111 0.2.0000 0.3.1234"
82 pci_bus_ids="0005:00:00.0 000a:00:00.0"
83 exec_command_and_wait_for_pattern(self, 'ls /sys/bus/ccw/devices/',
84 ccw_bus_ids)
85 exec_command_and_wait_for_pattern(self, 'ls /sys/bus/pci/devices/',
86 pci_bus_ids)
87 # check that the device at 0.2.0000 is in legacy mode, while the
88 # device at 0.3.1234 has the virtio-1 feature bit set
89 virtio_rng_features="00000000000000000000000000001100" + \
90 "10000000000000000000000000000000"
91 virtio_rng_features_legacy="00000000000000000000000000001100" + \
92 "00000000000000000000000000000000"
93 exec_command_and_wait_for_pattern(self,
94 'cat /sys/bus/ccw/devices/0.2.0000/virtio?/features',
95 virtio_rng_features_legacy)
96 exec_command_and_wait_for_pattern(self,
97 'cat /sys/bus/ccw/devices/0.3.1234/virtio?/features',
98 virtio_rng_features)
99 # check that /dev/hwrng works - and that it's gone after ejecting
100 exec_command_and_wait_for_pattern(self,
101 'dd if=/dev/hwrng of=/dev/null bs=1k count=10',
102 '10+0 records out')
103 self.clear_guest_dmesg()
104 self.vm.command('device_del', id='rn1')
105 self.wait_for_crw_reports()
106 self.clear_guest_dmesg()
107 self.vm.command('device_del', id='rn2')
108 self.wait_for_crw_reports()
109 exec_command_and_wait_for_pattern(self,
110 'dd if=/dev/hwrng of=/dev/null bs=1k count=10',
111 'dd: /dev/hwrng: No such device')
112 # verify that we indeed have virtio-net devices (without having the
113 # virtio-net driver handy)
114 exec_command_and_wait_for_pattern(self,
115 'cat /sys/bus/ccw/devices/0.1.1111/cutype',
116 '3832/01')
117 exec_command_and_wait_for_pattern(self,
118 'cat /sys/bus/pci/devices/0005\:00\:00.0/subsystem_vendor',
119 '0x1af4')
120 exec_command_and_wait_for_pattern(self,
121 'cat /sys/bus/pci/devices/0005\:00\:00.0/subsystem_device',
122 '0x0001')
123 # check fid propagation
124 exec_command_and_wait_for_pattern(self,
125 'cat /sys/bus/pci/devices/000a\:00\:00.0/function_id',
126 '0x0000000c')
127 # add another device
128 self.clear_guest_dmesg()
129 self.vm.command('device_add', driver='virtio-net-ccw',
130 devno='fe.0.4711', id='net_4711')
131 self.wait_for_crw_reports()
132 exec_command_and_wait_for_pattern(self, 'ls /sys/bus/ccw/devices/',
133 '0.0.4711')
134 # and detach it again
135 self.clear_guest_dmesg()
136 self.vm.command('device_del', id='net_4711')
137 self.vm.event_wait(name='DEVICE_DELETED',
138 match={'data': {'device': 'net_4711'}})
139 self.wait_for_crw_reports()
140 exec_command_and_wait_for_pattern(self,
141 'ls /sys/bus/ccw/devices/0.0.4711',
142 'No such file or directory')