1# Functional test that boots an s390x Linux guest with ccw and PCI devices 2# attached and checks whether the devices are recognized by Linux 3# 4# Copyright (c) 2020 Red Hat, Inc. 5# 6# Author: 7# Cornelia Huck <cohuck@redhat.com> 8# 9# This work is licensed under the terms of the GNU GPL, version 2 or 10# later. See the COPYING file in the top-level directory. 11 12 13from avocado_qemu import Test 14from avocado_qemu import exec_command_and_wait_for_pattern 15from avocado_qemu import wait_for_console_pattern 16 17class S390CCWVirtioMachine(Test): 18 KERNEL_COMMON_COMMAND_LINE = 'printk.time=0 ' 19 20 def wait_for_console_pattern(self, success_message, vm=None): 21 wait_for_console_pattern(self, success_message, 22 failure_message='Kernel panic - not syncing', 23 vm=vm) 24 25 timeout = 120 26 27 def test_s390x_devices(self): 28 29 """ 30 :avocado: tags=arch:s390x 31 :avocado: tags=machine:s390-ccw-virtio 32 """ 33 34 kernel_url = ('https://snapshot.debian.org/archive/debian/' 35 '20201126T092837Z/dists/buster/main/installer-s390x/' 36 '20190702+deb10u6/images/generic/kernel.debian') 37 kernel_hash = '5821fbee57d6220a067a8b967d24595621aa1eb6' 38 kernel_path = self.fetch_asset(kernel_url, asset_hash=kernel_hash) 39 40 initrd_url = ('https://snapshot.debian.org/archive/debian/' 41 '20201126T092837Z/dists/buster/main/installer-s390x/' 42 '20190702+deb10u6/images/generic/initrd.debian') 43 initrd_hash = '81ba09c97bef46e8f4660ac25b4ac0a5be3a94d6' 44 initrd_path = self.fetch_asset(initrd_url, asset_hash=initrd_hash) 45 46 self.vm.set_console() 47 kernel_command_line = (self.KERNEL_COMMON_COMMAND_LINE + 48 'console=sclp0 root=/dev/ram0 BOOT_DEBUG=3') 49 self.vm.add_args('-nographic', 50 '-kernel', kernel_path, 51 '-initrd', initrd_path, 52 '-append', kernel_command_line, 53 '-device', 'virtio-net-ccw,devno=fe.1.1111', 54 '-device', 55 'virtio-rng-ccw,devno=fe.2.0000,max_revision=0', 56 '-device', 57 'virtio-rng-ccw,devno=fe.3.1234,max_revision=2', 58 '-device', 'zpci,uid=5,target=zzz', 59 '-device', 'virtio-net-pci,id=zzz', 60 '-device', 'zpci,uid=0xa,fid=12,target=serial', 61 '-device', 'virtio-serial-pci,id=serial') 62 self.vm.launch() 63 64 shell_ready = "sh: can't access tty; job control turned off" 65 self.wait_for_console_pattern(shell_ready) 66 # first debug shell is too early, we need to wait for device detection 67 exec_command_and_wait_for_pattern(self, 'exit', shell_ready) 68 69 ccw_bus_ids="0.1.1111 0.2.0000 0.3.1234" 70 pci_bus_ids="0005:00:00.0 000a:00:00.0" 71 exec_command_and_wait_for_pattern(self, 'ls /sys/bus/ccw/devices/', 72 ccw_bus_ids) 73 exec_command_and_wait_for_pattern(self, 'ls /sys/bus/pci/devices/', 74 pci_bus_ids) 75 # check that the device at 0.2.0000 is in legacy mode, while the 76 # device at 0.3.1234 has the virtio-1 feature bit set 77 virtio_rng_features="00000000000000000000000000001100" + \ 78 "10000000000000000000000000000000" 79 virtio_rng_features_legacy="00000000000000000000000000001100" + \ 80 "00000000000000000000000000000000" 81 exec_command_and_wait_for_pattern(self, 82 'cat /sys/bus/ccw/devices/0.2.0000/virtio?/features', 83 virtio_rng_features_legacy) 84 exec_command_and_wait_for_pattern(self, 85 'cat /sys/bus/ccw/devices/0.3.1234/virtio?/features', 86 virtio_rng_features) 87 # verify that we indeed have virtio-net devices (without having the 88 # virtio-net driver handy) 89 exec_command_and_wait_for_pattern(self, 90 'cat /sys/bus/ccw/devices/0.1.1111/cutype', 91 '3832/01') 92 exec_command_and_wait_for_pattern(self, 93 'cat /sys/bus/pci/devices/0005\:00\:00.0/subsystem_vendor', 94 '0x1af4') 95 exec_command_and_wait_for_pattern(self, 96 'cat /sys/bus/pci/devices/0005\:00\:00.0/subsystem_device', 97 '0x0001') 98 # check fid propagation 99 exec_command_and_wait_for_pattern(self, 100 'cat /sys/bus/pci/devices/000a\:00\:00.0/function_id', 101 '0x0000000c') 102 # add another device 103 exec_command_and_wait_for_pattern(self, 104 'dmesg -c > /dev/null; echo dm_clear\ 1', 105 'dm_clear 1') 106 self.vm.command('device_add', driver='virtio-net-ccw', 107 devno='fe.0.4711', id='net_4711') 108 exec_command_and_wait_for_pattern(self, 109 'while ! (dmesg -c | grep CRW) ; do sleep 1 ; done', 110 'CRW reports') 111 exec_command_and_wait_for_pattern(self, 'ls /sys/bus/ccw/devices/', 112 '0.0.4711') 113 # and detach it again 114 exec_command_and_wait_for_pattern(self, 115 'dmesg -c > /dev/null; echo dm_clear\ 2', 116 'dm_clear 2') 117 self.vm.command('device_del', id='net_4711') 118 self.vm.event_wait(name='DEVICE_DELETED', 119 match={'data': {'device': 'net_4711'}}) 120 exec_command_and_wait_for_pattern(self, 121 'while ! (dmesg -c | grep CRW) ; do sleep 1 ; done', 122 'CRW reports') 123 exec_command_and_wait_for_pattern(self, 124 'ls /sys/bus/ccw/devices/0.0.4711', 125 'No such file or directory') 126