396408ee92
We document some of this on the wiki but lets move it into our official developer notes documentation. Signed-off-by: Alex Bennée <alex.bennee@linaro.org> Cc: Paolo Bonzini <pbonzini@redhat.com> Reviewed-by: Richard Henderson <richard.henderson@linaro.org> Message-Id: <20220419091020.3008144-3-alex.bennee@linaro.org>
1446 lines
49 KiB
ReStructuredText
1446 lines
49 KiB
ReStructuredText
Testing in QEMU
|
||
===============
|
||
|
||
This document describes the testing infrastructure in QEMU.
|
||
|
||
Testing with "make check"
|
||
-------------------------
|
||
|
||
The "make check" testing family includes most of the C based tests in QEMU. For
|
||
a quick help, run ``make check-help`` from the source tree.
|
||
|
||
The usual way to run these tests is:
|
||
|
||
.. code::
|
||
|
||
make check
|
||
|
||
which includes QAPI schema tests, unit tests, QTests and some iotests.
|
||
Different sub-types of "make check" tests will be explained below.
|
||
|
||
Before running tests, it is best to build QEMU programs first. Some tests
|
||
expect the executables to exist and will fail with obscure messages if they
|
||
cannot find them.
|
||
|
||
Unit tests
|
||
~~~~~~~~~~
|
||
|
||
Unit tests, which can be invoked with ``make check-unit``, are simple C tests
|
||
that typically link to individual QEMU object files and exercise them by
|
||
calling exported functions.
|
||
|
||
If you are writing new code in QEMU, consider adding a unit test, especially
|
||
for utility modules that are relatively stateless or have few dependencies. To
|
||
add a new unit test:
|
||
|
||
1. Create a new source file. For example, ``tests/unit/foo-test.c``.
|
||
|
||
2. Write the test. Normally you would include the header file which exports
|
||
the module API, then verify the interface behaves as expected from your
|
||
test. The test code should be organized with the glib testing framework.
|
||
Copying and modifying an existing test is usually a good idea.
|
||
|
||
3. Add the test to ``tests/unit/meson.build``. The unit tests are listed in a
|
||
dictionary called ``tests``. The values are any additional sources and
|
||
dependencies to be linked with the test. For a simple test whose source
|
||
is in ``tests/unit/foo-test.c``, it is enough to add an entry like::
|
||
|
||
{
|
||
...
|
||
'foo-test': [],
|
||
...
|
||
}
|
||
|
||
Since unit tests don't require environment variables, the simplest way to debug
|
||
a unit test failure is often directly invoking it or even running it under
|
||
``gdb``. However there can still be differences in behavior between ``make``
|
||
invocations and your manual run, due to ``$MALLOC_PERTURB_`` environment
|
||
variable (which affects memory reclamation and catches invalid pointers better)
|
||
and gtester options. If necessary, you can run
|
||
|
||
.. code::
|
||
|
||
make check-unit V=1
|
||
|
||
and copy the actual command line which executes the unit test, then run
|
||
it from the command line.
|
||
|
||
QTest
|
||
~~~~~
|
||
|
||
QTest is a device emulation testing framework. It can be very useful to test
|
||
device models; it could also control certain aspects of QEMU (such as virtual
|
||
clock stepping), with a special purpose "qtest" protocol. Refer to
|
||
:doc:`qtest` for more details.
|
||
|
||
QTest cases can be executed with
|
||
|
||
.. code::
|
||
|
||
make check-qtest
|
||
|
||
QAPI schema tests
|
||
~~~~~~~~~~~~~~~~~
|
||
|
||
The QAPI schema tests validate the QAPI parser used by QMP, by feeding
|
||
predefined input to the parser and comparing the result with the reference
|
||
output.
|
||
|
||
The input/output data is managed under the ``tests/qapi-schema`` directory.
|
||
Each test case includes four files that have a common base name:
|
||
|
||
* ``${casename}.json`` - the file contains the JSON input for feeding the
|
||
parser
|
||
* ``${casename}.out`` - the file contains the expected stdout from the parser
|
||
* ``${casename}.err`` - the file contains the expected stderr from the parser
|
||
* ``${casename}.exit`` - the expected error code
|
||
|
||
Consider adding a new QAPI schema test when you are making a change on the QAPI
|
||
parser (either fixing a bug or extending/modifying the syntax). To do this:
|
||
|
||
1. Add four files for the new case as explained above. For example:
|
||
|
||
``$EDITOR tests/qapi-schema/foo.{json,out,err,exit}``.
|
||
|
||
2. Add the new test in ``tests/Makefile.include``. For example:
|
||
|
||
``qapi-schema += foo.json``
|
||
|
||
check-block
|
||
~~~~~~~~~~~
|
||
|
||
``make check-block`` runs a subset of the block layer iotests (the tests that
|
||
are in the "auto" group).
|
||
See the "QEMU iotests" section below for more information.
|
||
|
||
QEMU iotests
|
||
------------
|
||
|
||
QEMU iotests, under the directory ``tests/qemu-iotests``, is the testing
|
||
framework widely used to test block layer related features. It is higher level
|
||
than "make check" tests and 99% of the code is written in bash or Python
|
||
scripts. The testing success criteria is golden output comparison, and the
|
||
test files are named with numbers.
|
||
|
||
To run iotests, make sure QEMU is built successfully, then switch to the
|
||
``tests/qemu-iotests`` directory under the build directory, and run ``./check``
|
||
with desired arguments from there.
|
||
|
||
By default, "raw" format and "file" protocol is used; all tests will be
|
||
executed, except the unsupported ones. You can override the format and protocol
|
||
with arguments:
|
||
|
||
.. code::
|
||
|
||
# test with qcow2 format
|
||
./check -qcow2
|
||
# or test a different protocol
|
||
./check -nbd
|
||
|
||
It's also possible to list test numbers explicitly:
|
||
|
||
.. code::
|
||
|
||
# run selected cases with qcow2 format
|
||
./check -qcow2 001 030 153
|
||
|
||
Cache mode can be selected with the "-c" option, which may help reveal bugs
|
||
that are specific to certain cache mode.
|
||
|
||
More options are supported by the ``./check`` script, run ``./check -h`` for
|
||
help.
|
||
|
||
Writing a new test case
|
||
~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
||
Consider writing a tests case when you are making any changes to the block
|
||
layer. An iotest case is usually the choice for that. There are already many
|
||
test cases, so it is possible that extending one of them may achieve the goal
|
||
and save the boilerplate to create one. (Unfortunately, there isn't a 100%
|
||
reliable way to find a related one out of hundreds of tests. One approach is
|
||
using ``git grep``.)
|
||
|
||
Usually an iotest case consists of two files. One is an executable that
|
||
produces output to stdout and stderr, the other is the expected reference
|
||
output. They are given the same number in file names. E.g. Test script ``055``
|
||
and reference output ``055.out``.
|
||
|
||
In rare cases, when outputs differ between cache mode ``none`` and others, a
|
||
``.out.nocache`` file is added. In other cases, when outputs differ between
|
||
image formats, more than one ``.out`` files are created ending with the
|
||
respective format names, e.g. ``178.out.qcow2`` and ``178.out.raw``.
|
||
|
||
There isn't a hard rule about how to write a test script, but a new test is
|
||
usually a (copy and) modification of an existing case. There are a few
|
||
commonly used ways to create a test:
|
||
|
||
* A Bash script. It will make use of several environmental variables related
|
||
to the testing procedure, and could source a group of ``common.*`` libraries
|
||
for some common helper routines.
|
||
|
||
* A Python unittest script. Import ``iotests`` and create a subclass of
|
||
``iotests.QMPTestCase``, then call ``iotests.main`` method. The downside of
|
||
this approach is that the output is too scarce, and the script is considered
|
||
harder to debug.
|
||
|
||
* A simple Python script without using unittest module. This could also import
|
||
``iotests`` for launching QEMU and utilities etc, but it doesn't inherit
|
||
from ``iotests.QMPTestCase`` therefore doesn't use the Python unittest
|
||
execution. This is a combination of 1 and 2.
|
||
|
||
Pick the language per your preference since both Bash and Python have
|
||
comparable library support for invoking and interacting with QEMU programs. If
|
||
you opt for Python, it is strongly recommended to write Python 3 compatible
|
||
code.
|
||
|
||
Both Python and Bash frameworks in iotests provide helpers to manage test
|
||
images. They can be used to create and clean up images under the test
|
||
directory. If no I/O or any protocol specific feature is needed, it is often
|
||
more convenient to use the pseudo block driver, ``null-co://``, as the test
|
||
image, which doesn't require image creation or cleaning up. Avoid system-wide
|
||
devices or files whenever possible, such as ``/dev/null`` or ``/dev/zero``.
|
||
Otherwise, image locking implications have to be considered. For example,
|
||
another application on the host may have locked the file, possibly leading to a
|
||
test failure. If using such devices are explicitly desired, consider adding
|
||
``locking=off`` option to disable image locking.
|
||
|
||
Debugging a test case
|
||
~~~~~~~~~~~~~~~~~~~~~
|
||
|
||
The following options to the ``check`` script can be useful when debugging
|
||
a failing test:
|
||
|
||
* ``-gdb`` wraps every QEMU invocation in a ``gdbserver``, which waits for a
|
||
connection from a gdb client. The options given to ``gdbserver`` (e.g. the
|
||
address on which to listen for connections) are taken from the ``$GDB_OPTIONS``
|
||
environment variable. By default (if ``$GDB_OPTIONS`` is empty), it listens on
|
||
``localhost:12345``.
|
||
It is possible to connect to it for example with
|
||
``gdb -iex "target remote $addr"``, where ``$addr`` is the address
|
||
``gdbserver`` listens on.
|
||
If the ``-gdb`` option is not used, ``$GDB_OPTIONS`` is ignored,
|
||
regardless of whether it is set or not.
|
||
|
||
* ``-valgrind`` attaches a valgrind instance to QEMU. If it detects
|
||
warnings, it will print and save the log in
|
||
``$TEST_DIR/<valgrind_pid>.valgrind``.
|
||
The final command line will be ``valgrind --log-file=$TEST_DIR/
|
||
<valgrind_pid>.valgrind --error-exitcode=99 $QEMU ...``
|
||
|
||
* ``-d`` (debug) just increases the logging verbosity, showing
|
||
for example the QMP commands and answers.
|
||
|
||
* ``-p`` (print) redirects QEMU’s stdout and stderr to the test output,
|
||
instead of saving it into a log file in
|
||
``$TEST_DIR/qemu-machine-<random_string>``.
|
||
|
||
Test case groups
|
||
~~~~~~~~~~~~~~~~
|
||
|
||
"Tests may belong to one or more test groups, which are defined in the form
|
||
of a comment in the test source file. By convention, test groups are listed
|
||
in the second line of the test file, after the "#!/..." line, like this:
|
||
|
||
.. code::
|
||
|
||
#!/usr/bin/env python3
|
||
# group: auto quick
|
||
#
|
||
...
|
||
|
||
Another way of defining groups is creating the tests/qemu-iotests/group.local
|
||
file. This should be used only for downstream (this file should never appear
|
||
in upstream). This file may be used for defining some downstream test groups
|
||
or for temporarily disabling tests, like this:
|
||
|
||
.. code::
|
||
|
||
# groups for some company downstream process
|
||
#
|
||
# ci - tests to run on build
|
||
# down - our downstream tests, not for upstream
|
||
#
|
||
# Format of each line is:
|
||
# TEST_NAME TEST_GROUP [TEST_GROUP ]...
|
||
|
||
013 ci
|
||
210 disabled
|
||
215 disabled
|
||
our-ugly-workaround-test down ci
|
||
|
||
Note that the following group names have a special meaning:
|
||
|
||
- quick: Tests in this group should finish within a few seconds.
|
||
|
||
- auto: Tests in this group are used during "make check" and should be
|
||
runnable in any case. That means they should run with every QEMU binary
|
||
(also non-x86), with every QEMU configuration (i.e. must not fail if
|
||
an optional feature is not compiled in - but reporting a "skip" is ok),
|
||
work at least with the qcow2 file format, work with all kind of host
|
||
filesystems and users (e.g. "nobody" or "root") and must not take too
|
||
much memory and disk space (since CI pipelines tend to fail otherwise).
|
||
|
||
- disabled: Tests in this group are disabled and ignored by check.
|
||
|
||
.. _container-ref:
|
||
|
||
Container based tests
|
||
---------------------
|
||
|
||
Introduction
|
||
~~~~~~~~~~~~
|
||
|
||
The container testing framework in QEMU utilizes public images to
|
||
build and test QEMU in predefined and widely accessible Linux
|
||
environments. This makes it possible to expand the test coverage
|
||
across distros, toolchain flavors and library versions. The support
|
||
was originally written for Docker although we also support Podman as
|
||
an alternative container runtime. Although the many of the target
|
||
names and scripts are prefixed with "docker" the system will
|
||
automatically run on whichever is configured.
|
||
|
||
The container images are also used to augment the generation of tests
|
||
for testing TCG. See :ref:`checktcg-ref` for more details.
|
||
|
||
Docker Prerequisites
|
||
~~~~~~~~~~~~~~~~~~~~
|
||
|
||
Install "docker" with the system package manager and start the Docker service
|
||
on your development machine, then make sure you have the privilege to run
|
||
Docker commands. Typically it means setting up passwordless ``sudo docker``
|
||
command or login as root. For example:
|
||
|
||
.. code::
|
||
|
||
$ sudo yum install docker
|
||
$ # or `apt-get install docker` for Ubuntu, etc.
|
||
$ sudo systemctl start docker
|
||
$ sudo docker ps
|
||
|
||
The last command should print an empty table, to verify the system is ready.
|
||
|
||
An alternative method to set up permissions is by adding the current user to
|
||
"docker" group and making the docker daemon socket file (by default
|
||
``/var/run/docker.sock``) accessible to the group:
|
||
|
||
.. code::
|
||
|
||
$ sudo groupadd docker
|
||
$ sudo usermod $USER -a -G docker
|
||
$ sudo chown :docker /var/run/docker.sock
|
||
|
||
Note that any one of above configurations makes it possible for the user to
|
||
exploit the whole host with Docker bind mounting or other privileged
|
||
operations. So only do it on development machines.
|
||
|
||
Podman Prerequisites
|
||
~~~~~~~~~~~~~~~~~~~~
|
||
|
||
Install "podman" with the system package manager.
|
||
|
||
.. code::
|
||
|
||
$ sudo dnf install podman
|
||
$ podman ps
|
||
|
||
The last command should print an empty table, to verify the system is ready.
|
||
|
||
Quickstart
|
||
~~~~~~~~~~
|
||
|
||
From source tree, type ``make docker-help`` to see the help. Testing
|
||
can be started without configuring or building QEMU (``configure`` and
|
||
``make`` are done in the container, with parameters defined by the
|
||
make target):
|
||
|
||
.. code::
|
||
|
||
make docker-test-build@centos8
|
||
|
||
This will create a container instance using the ``centos8`` image (the image
|
||
is downloaded and initialized automatically), in which the ``test-build`` job
|
||
is executed.
|
||
|
||
Registry
|
||
~~~~~~~~
|
||
|
||
The QEMU project has a container registry hosted by GitLab at
|
||
``registry.gitlab.com/qemu-project/qemu`` which will automatically be
|
||
used to pull in pre-built layers. This avoids unnecessary strain on
|
||
the distro archives created by multiple developers running the same
|
||
container build steps over and over again. This can be overridden
|
||
locally by using the ``NOCACHE`` build option:
|
||
|
||
.. code::
|
||
|
||
make docker-image-debian10 NOCACHE=1
|
||
|
||
Images
|
||
~~~~~~
|
||
|
||
Along with many other images, the ``centos8`` image is defined in a Dockerfile
|
||
in ``tests/docker/dockerfiles/``, called ``centos8.docker``. ``make docker-help``
|
||
command will list all the available images.
|
||
|
||
A ``.pre`` script can be added beside the ``.docker`` file, which will be
|
||
executed before building the image under the build context directory. This is
|
||
mainly used to do necessary host side setup. One such setup is ``binfmt_misc``,
|
||
for example, to make qemu-user powered cross build containers work.
|
||
|
||
Most of the existing Dockerfiles were written by hand, simply by creating a
|
||
a new ``.docker`` file under the ``tests/docker/dockerfiles/`` directory.
|
||
This has led to an inconsistent set of packages being present across the
|
||
different containers.
|
||
|
||
Thus going forward, QEMU is aiming to automatically generate the Dockerfiles
|
||
using the ``lcitool`` program provided by the ``libvirt-ci`` project:
|
||
|
||
https://gitlab.com/libvirt/libvirt-ci
|
||
|
||
In that project, there is a ``mappings.yml`` file defining the distro native
|
||
package names for a wide variety of third party projects. This is processed
|
||
in combination with a project defined list of build pre-requisites to determine
|
||
the list of native packages to install on each distribution. This can be used
|
||
to generate dockerfiles, VM package lists and Cirrus CI variables needed to
|
||
setup build environments across OS distributions with a consistent set of
|
||
packages present.
|
||
|
||
When preparing a patch series that adds a new build pre-requisite to QEMU,
|
||
updates to various lcitool data files may be required.
|
||
|
||
|
||
Adding new build pre-requisites
|
||
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||
|
||
In the simple case where the pre-requisite is already known to ``libvirt-ci``
|
||
the following steps are needed
|
||
|
||
* Edit ``tests/lcitool/projects/qemu.yml`` and add the pre-requisite
|
||
|
||
* Run ``make lcitool-refresh`` to re-generate all relevant build environment
|
||
manifests
|
||
|
||
In some cases ``libvirt-ci`` will not know about the build pre-requisite and
|
||
thus some extra preparation steps will be required first
|
||
|
||
* Fork the ``libvirt-ci`` project on gitlab
|
||
|
||
* Edit the ``mappings.yml`` change to add an entry for the new build
|
||
prerequisite, listing its native package name on as many OS distros
|
||
as practical.
|
||
|
||
* Commit the ``mappings.yml`` change and submit a merge request to
|
||
the ``libvirt-ci`` project, noting in the description that this
|
||
is a new build pre-requisite desired for use with QEMU
|
||
|
||
* CI pipeline will run to validate that the changes to ``mappings.yml``
|
||
are correct, by attempting to install the newly listed package on
|
||
all OS distributions supported by ``libvirt-ci``.
|
||
|
||
* Once the merge request is accepted, go back to QEMU and update
|
||
the ``libvirt-ci`` submodule to point to a commit that contains
|
||
the ``mappings.yml`` update.
|
||
|
||
|
||
Adding new OS distros
|
||
^^^^^^^^^^^^^^^^^^^^^
|
||
|
||
In some cases ``libvirt-ci`` will not know about the OS distro that is
|
||
desired to be tested. Before adding a new OS distro, discuss the proposed
|
||
addition:
|
||
|
||
* Send a mail to qemu-devel, copying people listed in the
|
||
MAINTAINERS file for ``Build and test automation``.
|
||
|
||
There are limited CI compute resources available to QEMU, so the
|
||
cost/benefit tradeoff of adding new OS distros needs to be considered.
|
||
|
||
* File an issue at https://gitlab.com/libvirt/libvirt-ci/-/issues
|
||
pointing to the qemu-devel mail thread in the archives.
|
||
|
||
This alerts other people who might be interested in the work
|
||
to avoid duplication, as well as to get feedback from libvirt-ci
|
||
maintainers on any tips to ease the addition
|
||
|
||
Assuming there is agreement to add a new OS distro then
|
||
|
||
* Fork the ``libvirt-ci`` project on gitlab
|
||
|
||
* Add metadata under ``guests/lcitool/lcitool/ansible/group_vars/``
|
||
for the new OS distro. There might be code changes required if
|
||
the OS distro uses a package format not currently known. The
|
||
``libvirt-ci`` maintainers can advise on this when the issue
|
||
is file.
|
||
|
||
* Edit the ``mappings.yml`` change to update all the existing package
|
||
entries, providing details of the new OS distro
|
||
|
||
* Commit the ``mappings.yml`` change and submit a merge request to
|
||
the ``libvirt-ci`` project, noting in the description that this
|
||
is a new build pre-requisite desired for use with QEMU
|
||
|
||
* CI pipeline will run to validate that the changes to ``mappings.yml``
|
||
are correct, by attempting to install the newly listed package on
|
||
all OS distributions supported by ``libvirt-ci``.
|
||
|
||
* Once the merge request is accepted, go back to QEMU and update
|
||
the ``libvirt-ci`` submodule to point to a commit that contains
|
||
the ``mappings.yml`` update.
|
||
|
||
|
||
Tests
|
||
~~~~~
|
||
|
||
Different tests are added to cover various configurations to build and test
|
||
QEMU. Docker tests are the executables under ``tests/docker`` named
|
||
``test-*``. They are typically shell scripts and are built on top of a shell
|
||
library, ``tests/docker/common.rc``, which provides helpers to find the QEMU
|
||
source and build it.
|
||
|
||
The full list of tests is printed in the ``make docker-help`` help.
|
||
|
||
Debugging a Docker test failure
|
||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
||
When CI tasks, maintainers or yourself report a Docker test failure, follow the
|
||
below steps to debug it:
|
||
|
||
1. Locally reproduce the failure with the reported command line. E.g. run
|
||
``make docker-test-mingw@fedora J=8``.
|
||
2. Add "V=1" to the command line, try again, to see the verbose output.
|
||
3. Further add "DEBUG=1" to the command line. This will pause in a shell prompt
|
||
in the container right before testing starts. You could either manually
|
||
build QEMU and run tests from there, or press Ctrl-D to let the Docker
|
||
testing continue.
|
||
4. If you press Ctrl-D, the same building and testing procedure will begin, and
|
||
will hopefully run into the error again. After that, you will be dropped to
|
||
the prompt for debug.
|
||
|
||
Options
|
||
~~~~~~~
|
||
|
||
Various options can be used to affect how Docker tests are done. The full
|
||
list is in the ``make docker`` help text. The frequently used ones are:
|
||
|
||
* ``V=1``: the same as in top level ``make``. It will be propagated to the
|
||
container and enable verbose output.
|
||
* ``J=$N``: the number of parallel tasks in make commands in the container,
|
||
similar to the ``-j $N`` option in top level ``make``. (The ``-j`` option in
|
||
top level ``make`` will not be propagated into the container.)
|
||
* ``DEBUG=1``: enables debug. See the previous "Debugging a Docker test
|
||
failure" section.
|
||
|
||
Thread Sanitizer
|
||
----------------
|
||
|
||
Thread Sanitizer (TSan) is a tool which can detect data races. QEMU supports
|
||
building and testing with this tool.
|
||
|
||
For more information on TSan:
|
||
|
||
https://github.com/google/sanitizers/wiki/ThreadSanitizerCppManual
|
||
|
||
Thread Sanitizer in Docker
|
||
~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
TSan is currently supported in the ubuntu2004 docker.
|
||
|
||
The test-tsan test will build using TSan and then run make check.
|
||
|
||
.. code::
|
||
|
||
make docker-test-tsan@ubuntu2004
|
||
|
||
TSan warnings under docker are placed in files located at build/tsan/.
|
||
|
||
We recommend using DEBUG=1 to allow launching the test from inside the docker,
|
||
and to allow review of the warnings generated by TSan.
|
||
|
||
Building and Testing with TSan
|
||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
||
It is possible to build and test with TSan, with a few additional steps.
|
||
These steps are normally done automatically in the docker.
|
||
|
||
There is a one time patch needed in clang-9 or clang-10 at this time:
|
||
|
||
.. code::
|
||
|
||
sed -i 's/^const/static const/g' \
|
||
/usr/lib/llvm-10/lib/clang/10.0.0/include/sanitizer/tsan_interface.h
|
||
|
||
To configure the build for TSan:
|
||
|
||
.. code::
|
||
|
||
../configure --enable-tsan --cc=clang-10 --cxx=clang++-10 \
|
||
--disable-werror --extra-cflags="-O0"
|
||
|
||
The runtime behavior of TSAN is controlled by the TSAN_OPTIONS environment
|
||
variable.
|
||
|
||
More information on the TSAN_OPTIONS can be found here:
|
||
|
||
https://github.com/google/sanitizers/wiki/ThreadSanitizerFlags
|
||
|
||
For example:
|
||
|
||
.. code::
|
||
|
||
export TSAN_OPTIONS=suppressions=<path to qemu>/tests/tsan/suppressions.tsan \
|
||
detect_deadlocks=false history_size=7 exitcode=0 \
|
||
log_path=<build path>/tsan/tsan_warning
|
||
|
||
The above exitcode=0 has TSan continue without error if any warnings are found.
|
||
This allows for running the test and then checking the warnings afterwards.
|
||
If you want TSan to stop and exit with error on warnings, use exitcode=66.
|
||
|
||
TSan Suppressions
|
||
~~~~~~~~~~~~~~~~~
|
||
Keep in mind that for any data race warning, although there might be a data race
|
||
detected by TSan, there might be no actual bug here. TSan provides several
|
||
different mechanisms for suppressing warnings. In general it is recommended
|
||
to fix the code if possible to eliminate the data race rather than suppress
|
||
the warning.
|
||
|
||
A few important files for suppressing warnings are:
|
||
|
||
tests/tsan/suppressions.tsan - Has TSan warnings we wish to suppress at runtime.
|
||
The comment on each suppression will typically indicate why we are
|
||
suppressing it. More information on the file format can be found here:
|
||
|
||
https://github.com/google/sanitizers/wiki/ThreadSanitizerSuppressions
|
||
|
||
tests/tsan/blacklist.tsan - Has TSan warnings we wish to disable
|
||
at compile time for test or debug.
|
||
Add flags to configure to enable:
|
||
|
||
"--extra-cflags=-fsanitize-blacklist=<src path>/tests/tsan/blacklist.tsan"
|
||
|
||
More information on the file format can be found here under "Blacklist Format":
|
||
|
||
https://github.com/google/sanitizers/wiki/ThreadSanitizerFlags
|
||
|
||
TSan Annotations
|
||
~~~~~~~~~~~~~~~~
|
||
include/qemu/tsan.h defines annotations. See this file for more descriptions
|
||
of the annotations themselves. Annotations can be used to suppress
|
||
TSan warnings or give TSan more information so that it can detect proper
|
||
relationships between accesses of data.
|
||
|
||
Annotation examples can be found here:
|
||
|
||
https://github.com/llvm/llvm-project/tree/master/compiler-rt/test/tsan/
|
||
|
||
Good files to start with are: annotate_happens_before.cpp and ignore_race.cpp
|
||
|
||
The full set of annotations can be found here:
|
||
|
||
https://github.com/llvm/llvm-project/blob/master/compiler-rt/lib/tsan/rtl/tsan_interface_ann.cpp
|
||
|
||
docker-binfmt-image-debian-% targets
|
||
------------------------------------
|
||
|
||
It is possible to combine Debian's bootstrap scripts with a configured
|
||
``binfmt_misc`` to bootstrap a number of Debian's distros including
|
||
experimental ports not yet supported by a released OS. This can
|
||
simplify setting up a rootfs by using docker to contain the foreign
|
||
rootfs rather than manually invoking chroot.
|
||
|
||
Setting up ``binfmt_misc``
|
||
~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
||
You can use the script ``qemu-binfmt-conf.sh`` to configure a QEMU
|
||
user binary to automatically run binaries for the foreign
|
||
architecture. While the scripts will try their best to work with
|
||
dynamically linked QEMU's a statically linked one will present less
|
||
potential complications when copying into the docker image. Modern
|
||
kernels support the ``F`` (fix binary) flag which will open the QEMU
|
||
executable on setup and avoids the need to find and re-open in the
|
||
chroot environment. This is triggered with the ``--persistent`` flag.
|
||
|
||
Example invocation
|
||
~~~~~~~~~~~~~~~~~~
|
||
|
||
For example to setup the HPPA ports builds of Debian::
|
||
|
||
make docker-binfmt-image-debian-sid-hppa \
|
||
DEB_TYPE=sid DEB_ARCH=hppa \
|
||
DEB_URL=http://ftp.ports.debian.org/debian-ports/ \
|
||
DEB_KEYRING=/usr/share/keyrings/debian-ports-archive-keyring.gpg \
|
||
EXECUTABLE=(pwd)/qemu-hppa V=1
|
||
|
||
The ``DEB_`` variables are substitutions used by
|
||
``debian-boostrap.pre`` which is called to do the initial debootstrap
|
||
of the rootfs before it is copied into the container. The second stage
|
||
is run as part of the build. The final image will be tagged as
|
||
``qemu/debian-sid-hppa``.
|
||
|
||
VM testing
|
||
----------
|
||
|
||
This test suite contains scripts that bootstrap various guest images that have
|
||
necessary packages to build QEMU. The basic usage is documented in ``Makefile``
|
||
help which is displayed with ``make vm-help``.
|
||
|
||
Quickstart
|
||
~~~~~~~~~~
|
||
|
||
Run ``make vm-help`` to list available make targets. Invoke a specific make
|
||
command to run build test in an image. For example, ``make vm-build-freebsd``
|
||
will build the source tree in the FreeBSD image. The command can be executed
|
||
from either the source tree or the build dir; if the former, ``./configure`` is
|
||
not needed. The command will then generate the test image in ``./tests/vm/``
|
||
under the working directory.
|
||
|
||
Note: images created by the scripts accept a well-known RSA key pair for SSH
|
||
access, so they SHOULD NOT be exposed to external interfaces if you are
|
||
concerned about attackers taking control of the guest and potentially
|
||
exploiting a QEMU security bug to compromise the host.
|
||
|
||
QEMU binaries
|
||
~~~~~~~~~~~~~
|
||
|
||
By default, ``qemu-system-x86_64`` is searched in $PATH to run the guest. If
|
||
there isn't one, or if it is older than 2.10, the test won't work. In this case,
|
||
provide the QEMU binary in env var: ``QEMU=/path/to/qemu-2.10+``.
|
||
|
||
Likewise the path to ``qemu-img`` can be set in QEMU_IMG environment variable.
|
||
|
||
Make jobs
|
||
~~~~~~~~~
|
||
|
||
The ``-j$X`` option in the make command line is not propagated into the VM,
|
||
specify ``J=$X`` to control the make jobs in the guest.
|
||
|
||
Debugging
|
||
~~~~~~~~~
|
||
|
||
Add ``DEBUG=1`` and/or ``V=1`` to the make command to allow interactive
|
||
debugging and verbose output. If this is not enough, see the next section.
|
||
``V=1`` will be propagated down into the make jobs in the guest.
|
||
|
||
Manual invocation
|
||
~~~~~~~~~~~~~~~~~
|
||
|
||
Each guest script is an executable script with the same command line options.
|
||
For example to work with the netbsd guest, use ``$QEMU_SRC/tests/vm/netbsd``:
|
||
|
||
.. code::
|
||
|
||
$ cd $QEMU_SRC/tests/vm
|
||
|
||
# To bootstrap the image
|
||
$ ./netbsd --build-image --image /var/tmp/netbsd.img
|
||
<...>
|
||
|
||
# To run an arbitrary command in guest (the output will not be echoed unless
|
||
# --debug is added)
|
||
$ ./netbsd --debug --image /var/tmp/netbsd.img uname -a
|
||
|
||
# To build QEMU in guest
|
||
$ ./netbsd --debug --image /var/tmp/netbsd.img --build-qemu $QEMU_SRC
|
||
|
||
# To get to an interactive shell
|
||
$ ./netbsd --interactive --image /var/tmp/netbsd.img sh
|
||
|
||
Adding new guests
|
||
~~~~~~~~~~~~~~~~~
|
||
|
||
Please look at existing guest scripts for how to add new guests.
|
||
|
||
Most importantly, create a subclass of BaseVM and implement ``build_image()``
|
||
method and define ``BUILD_SCRIPT``, then finally call ``basevm.main()`` from
|
||
the script's ``main()``.
|
||
|
||
* Usually in ``build_image()``, a template image is downloaded from a
|
||
predefined URL. ``BaseVM._download_with_cache()`` takes care of the cache and
|
||
the checksum, so consider using it.
|
||
|
||
* Once the image is downloaded, users, SSH server and QEMU build deps should
|
||
be set up:
|
||
|
||
- Root password set to ``BaseVM.ROOT_PASS``
|
||
- User ``BaseVM.GUEST_USER`` is created, and password set to
|
||
``BaseVM.GUEST_PASS``
|
||
- SSH service is enabled and started on boot,
|
||
``$QEMU_SRC/tests/keys/id_rsa.pub`` is added to ssh's ``authorized_keys``
|
||
file of both root and the normal user
|
||
- DHCP client service is enabled and started on boot, so that it can
|
||
automatically configure the virtio-net-pci NIC and communicate with QEMU
|
||
user net (10.0.2.2)
|
||
- Necessary packages are installed to untar the source tarball and build
|
||
QEMU
|
||
|
||
* Write a proper ``BUILD_SCRIPT`` template, which should be a shell script that
|
||
untars a raw virtio-blk block device, which is the tarball data blob of the
|
||
QEMU source tree, then configure/build it. Running "make check" is also
|
||
recommended.
|
||
|
||
Image fuzzer testing
|
||
--------------------
|
||
|
||
An image fuzzer was added to exercise format drivers. Currently only qcow2 is
|
||
supported. To start the fuzzer, run
|
||
|
||
.. code::
|
||
|
||
tests/image-fuzzer/runner.py -c '[["qemu-img", "info", "$test_img"]]' /tmp/test qcow2
|
||
|
||
Alternatively, some command different from ``qemu-img info`` can be tested, by
|
||
changing the ``-c`` option.
|
||
|
||
Integration tests using the Avocado Framework
|
||
---------------------------------------------
|
||
|
||
The ``tests/avocado`` directory hosts integration tests. They're usually
|
||
higher level tests, and may interact with external resources and with
|
||
various guest operating systems.
|
||
|
||
These tests are written using the Avocado Testing Framework (which must
|
||
be installed separately) in conjunction with a the ``avocado_qemu.Test``
|
||
class, implemented at ``tests/avocado/avocado_qemu``.
|
||
|
||
Tests based on ``avocado_qemu.Test`` can easily:
|
||
|
||
* Customize the command line arguments given to the convenience
|
||
``self.vm`` attribute (a QEMUMachine instance)
|
||
|
||
* Interact with the QEMU monitor, send QMP commands and check
|
||
their results
|
||
|
||
* Interact with the guest OS, using the convenience console device
|
||
(which may be useful to assert the effectiveness and correctness of
|
||
command line arguments or QMP commands)
|
||
|
||
* Interact with external data files that accompany the test itself
|
||
(see ``self.get_data()``)
|
||
|
||
* Download (and cache) remote data files, such as firmware and kernel
|
||
images
|
||
|
||
* Have access to a library of guest OS images (by means of the
|
||
``avocado.utils.vmimage`` library)
|
||
|
||
* Make use of various other test related utilities available at the
|
||
test class itself and at the utility library:
|
||
|
||
- http://avocado-framework.readthedocs.io/en/latest/api/test/avocado.html#avocado.Test
|
||
- http://avocado-framework.readthedocs.io/en/latest/api/utils/avocado.utils.html
|
||
|
||
Running tests
|
||
~~~~~~~~~~~~~
|
||
|
||
You can run the avocado tests simply by executing:
|
||
|
||
.. code::
|
||
|
||
make check-avocado
|
||
|
||
This involves the automatic creation of Python virtual environment
|
||
within the build tree (at ``tests/venv``) which will have all the
|
||
right dependencies, and will save tests results also within the
|
||
build tree (at ``tests/results``).
|
||
|
||
Note: the build environment must be using a Python 3 stack, and have
|
||
the ``venv`` and ``pip`` packages installed. If necessary, make sure
|
||
``configure`` is called with ``--python=`` and that those modules are
|
||
available. On Debian and Ubuntu based systems, depending on the
|
||
specific version, they may be on packages named ``python3-venv`` and
|
||
``python3-pip``.
|
||
|
||
It is also possible to run tests based on tags using the
|
||
``make check-avocado`` command and the ``AVOCADO_TAGS`` environment
|
||
variable:
|
||
|
||
.. code::
|
||
|
||
make check-avocado AVOCADO_TAGS=quick
|
||
|
||
Note that tags separated with commas have an AND behavior, while tags
|
||
separated by spaces have an OR behavior. For more information on Avocado
|
||
tags, see:
|
||
|
||
https://avocado-framework.readthedocs.io/en/latest/guides/user/chapters/tags.html
|
||
|
||
To run a single test file, a couple of them, or a test within a file
|
||
using the ``make check-avocado`` command, set the ``AVOCADO_TESTS``
|
||
environment variable with the test files or test names. To run all
|
||
tests from a single file, use:
|
||
|
||
.. code::
|
||
|
||
make check-avocado AVOCADO_TESTS=$FILEPATH
|
||
|
||
The same is valid to run tests from multiple test files:
|
||
|
||
.. code::
|
||
|
||
make check-avocado AVOCADO_TESTS='$FILEPATH1 $FILEPATH2'
|
||
|
||
To run a single test within a file, use:
|
||
|
||
.. code::
|
||
|
||
make check-avocado AVOCADO_TESTS=$FILEPATH:$TESTCLASS.$TESTNAME
|
||
|
||
The same is valid to run single tests from multiple test files:
|
||
|
||
.. code::
|
||
|
||
make check-avocado AVOCADO_TESTS='$FILEPATH1:$TESTCLASS1.$TESTNAME1 $FILEPATH2:$TESTCLASS2.$TESTNAME2'
|
||
|
||
The scripts installed inside the virtual environment may be used
|
||
without an "activation". For instance, the Avocado test runner
|
||
may be invoked by running:
|
||
|
||
.. code::
|
||
|
||
tests/venv/bin/avocado run $OPTION1 $OPTION2 tests/avocado/
|
||
|
||
Note that if ``make check-avocado`` was not executed before, it is
|
||
possible to create the Python virtual environment with the dependencies
|
||
needed running:
|
||
|
||
.. code::
|
||
|
||
make check-venv
|
||
|
||
It is also possible to run tests from a single file or a single test within
|
||
a test file. To run tests from a single file within the build tree, use:
|
||
|
||
.. code::
|
||
|
||
tests/venv/bin/avocado run tests/avocado/$TESTFILE
|
||
|
||
To run a single test within a test file, use:
|
||
|
||
.. code::
|
||
|
||
tests/venv/bin/avocado run tests/avocado/$TESTFILE:$TESTCLASS.$TESTNAME
|
||
|
||
Valid test names are visible in the output from any previous execution
|
||
of Avocado or ``make check-avocado``, and can also be queried using:
|
||
|
||
.. code::
|
||
|
||
tests/venv/bin/avocado list tests/avocado
|
||
|
||
Manual Installation
|
||
~~~~~~~~~~~~~~~~~~~
|
||
|
||
To manually install Avocado and its dependencies, run:
|
||
|
||
.. code::
|
||
|
||
pip install --user avocado-framework
|
||
|
||
Alternatively, follow the instructions on this link:
|
||
|
||
https://avocado-framework.readthedocs.io/en/latest/guides/user/chapters/installing.html
|
||
|
||
Overview
|
||
~~~~~~~~
|
||
|
||
The ``tests/avocado/avocado_qemu`` directory provides the
|
||
``avocado_qemu`` Python module, containing the ``avocado_qemu.Test``
|
||
class. Here's a simple usage example:
|
||
|
||
.. code::
|
||
|
||
from avocado_qemu import QemuSystemTest
|
||
|
||
|
||
class Version(QemuSystemTest):
|
||
"""
|
||
:avocado: tags=quick
|
||
"""
|
||
def test_qmp_human_info_version(self):
|
||
self.vm.launch()
|
||
res = self.vm.command('human-monitor-command',
|
||
command_line='info version')
|
||
self.assertRegexpMatches(res, r'^(\d+\.\d+\.\d)')
|
||
|
||
To execute your test, run:
|
||
|
||
.. code::
|
||
|
||
avocado run version.py
|
||
|
||
Tests may be classified according to a convention by using docstring
|
||
directives such as ``:avocado: tags=TAG1,TAG2``. To run all tests
|
||
in the current directory, tagged as "quick", run:
|
||
|
||
.. code::
|
||
|
||
avocado run -t quick .
|
||
|
||
The ``avocado_qemu.Test`` base test class
|
||
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||
|
||
The ``avocado_qemu.Test`` class has a number of characteristics that
|
||
are worth being mentioned right away.
|
||
|
||
First of all, it attempts to give each test a ready to use QEMUMachine
|
||
instance, available at ``self.vm``. Because many tests will tweak the
|
||
QEMU command line, launching the QEMUMachine (by using ``self.vm.launch()``)
|
||
is left to the test writer.
|
||
|
||
The base test class has also support for tests with more than one
|
||
QEMUMachine. The way to get machines is through the ``self.get_vm()``
|
||
method which will return a QEMUMachine instance. The ``self.get_vm()``
|
||
method accepts arguments that will be passed to the QEMUMachine creation
|
||
and also an optional ``name`` attribute so you can identify a specific
|
||
machine and get it more than once through the tests methods. A simple
|
||
and hypothetical example follows:
|
||
|
||
.. code::
|
||
|
||
from avocado_qemu import QemuSystemTest
|
||
|
||
|
||
class MultipleMachines(QemuSystemTest):
|
||
def test_multiple_machines(self):
|
||
first_machine = self.get_vm()
|
||
second_machine = self.get_vm()
|
||
self.get_vm(name='third_machine').launch()
|
||
|
||
first_machine.launch()
|
||
second_machine.launch()
|
||
|
||
first_res = first_machine.command(
|
||
'human-monitor-command',
|
||
command_line='info version')
|
||
|
||
second_res = second_machine.command(
|
||
'human-monitor-command',
|
||
command_line='info version')
|
||
|
||
third_res = self.get_vm(name='third_machine').command(
|
||
'human-monitor-command',
|
||
command_line='info version')
|
||
|
||
self.assertEquals(first_res, second_res, third_res)
|
||
|
||
At test "tear down", ``avocado_qemu.Test`` handles all the QEMUMachines
|
||
shutdown.
|
||
|
||
The ``avocado_qemu.LinuxTest`` base test class
|
||
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||
|
||
The ``avocado_qemu.LinuxTest`` is further specialization of the
|
||
``avocado_qemu.Test`` class, so it contains all the characteristics of
|
||
the later plus some extra features.
|
||
|
||
First of all, this base class is intended for tests that need to
|
||
interact with a fully booted and operational Linux guest. At this
|
||
time, it uses a Fedora 31 guest image. The most basic example looks
|
||
like this:
|
||
|
||
.. code::
|
||
|
||
from avocado_qemu import LinuxTest
|
||
|
||
|
||
class SomeTest(LinuxTest):
|
||
|
||
def test(self):
|
||
self.launch_and_wait()
|
||
self.ssh_command('some_command_to_be_run_in_the_guest')
|
||
|
||
Please refer to tests that use ``avocado_qemu.LinuxTest`` under
|
||
``tests/avocado`` for more examples.
|
||
|
||
QEMUMachine
|
||
~~~~~~~~~~~
|
||
|
||
The QEMUMachine API is already widely used in the Python iotests,
|
||
device-crash-test and other Python scripts. It's a wrapper around the
|
||
execution of a QEMU binary, giving its users:
|
||
|
||
* the ability to set command line arguments to be given to the QEMU
|
||
binary
|
||
|
||
* a ready to use QMP connection and interface, which can be used to
|
||
send commands and inspect its results, as well as asynchronous
|
||
events
|
||
|
||
* convenience methods to set commonly used command line arguments in
|
||
a more succinct and intuitive way
|
||
|
||
QEMU binary selection
|
||
^^^^^^^^^^^^^^^^^^^^^
|
||
|
||
The QEMU binary used for the ``self.vm`` QEMUMachine instance will
|
||
primarily depend on the value of the ``qemu_bin`` parameter. If it's
|
||
not explicitly set, its default value will be the result of a dynamic
|
||
probe in the same source tree. A suitable binary will be one that
|
||
targets the architecture matching host machine.
|
||
|
||
Based on this description, test writers will usually rely on one of
|
||
the following approaches:
|
||
|
||
1) Set ``qemu_bin``, and use the given binary
|
||
|
||
2) Do not set ``qemu_bin``, and use a QEMU binary named like
|
||
"qemu-system-${arch}", either in the current
|
||
working directory, or in the current source tree.
|
||
|
||
The resulting ``qemu_bin`` value will be preserved in the
|
||
``avocado_qemu.Test`` as an attribute with the same name.
|
||
|
||
Attribute reference
|
||
~~~~~~~~~~~~~~~~~~~
|
||
|
||
Test
|
||
^^^^
|
||
|
||
Besides the attributes and methods that are part of the base
|
||
``avocado.Test`` class, the following attributes are available on any
|
||
``avocado_qemu.Test`` instance.
|
||
|
||
vm
|
||
''
|
||
|
||
A QEMUMachine instance, initially configured according to the given
|
||
``qemu_bin`` parameter.
|
||
|
||
arch
|
||
''''
|
||
|
||
The architecture can be used on different levels of the stack, e.g. by
|
||
the framework or by the test itself. At the framework level, it will
|
||
currently influence the selection of a QEMU binary (when one is not
|
||
explicitly given).
|
||
|
||
Tests are also free to use this attribute value, for their own needs.
|
||
A test may, for instance, use the same value when selecting the
|
||
architecture of a kernel or disk image to boot a VM with.
|
||
|
||
The ``arch`` attribute will be set to the test parameter of the same
|
||
name. If one is not given explicitly, it will either be set to
|
||
``None``, or, if the test is tagged with one (and only one)
|
||
``:avocado: tags=arch:VALUE`` tag, it will be set to ``VALUE``.
|
||
|
||
cpu
|
||
'''
|
||
|
||
The cpu model that will be set to all QEMUMachine instances created
|
||
by the test.
|
||
|
||
The ``cpu`` attribute will be set to the test parameter of the same
|
||
name. If one is not given explicitly, it will either be set to
|
||
``None ``, or, if the test is tagged with one (and only one)
|
||
``:avocado: tags=cpu:VALUE`` tag, it will be set to ``VALUE``.
|
||
|
||
machine
|
||
'''''''
|
||
|
||
The machine type that will be set to all QEMUMachine instances created
|
||
by the test.
|
||
|
||
The ``machine`` attribute will be set to the test parameter of the same
|
||
name. If one is not given explicitly, it will either be set to
|
||
``None``, or, if the test is tagged with one (and only one)
|
||
``:avocado: tags=machine:VALUE`` tag, it will be set to ``VALUE``.
|
||
|
||
qemu_bin
|
||
''''''''
|
||
|
||
The preserved value of the ``qemu_bin`` parameter or the result of the
|
||
dynamic probe for a QEMU binary in the current working directory or
|
||
source tree.
|
||
|
||
LinuxTest
|
||
^^^^^^^^^
|
||
|
||
Besides the attributes present on the ``avocado_qemu.Test`` base
|
||
class, the ``avocado_qemu.LinuxTest`` adds the following attributes:
|
||
|
||
distro
|
||
''''''
|
||
|
||
The name of the Linux distribution used as the guest image for the
|
||
test. The name should match the **Provider** column on the list
|
||
of images supported by the avocado.utils.vmimage library:
|
||
|
||
https://avocado-framework.readthedocs.io/en/latest/guides/writer/libs/vmimage.html#supported-images
|
||
|
||
distro_version
|
||
''''''''''''''
|
||
|
||
The version of the Linux distribution as the guest image for the
|
||
test. The name should match the **Version** column on the list
|
||
of images supported by the avocado.utils.vmimage library:
|
||
|
||
https://avocado-framework.readthedocs.io/en/latest/guides/writer/libs/vmimage.html#supported-images
|
||
|
||
distro_checksum
|
||
'''''''''''''''
|
||
|
||
The sha256 hash of the guest image file used for the test.
|
||
|
||
If this value is not set in the code or by a test parameter (with the
|
||
same name), no validation on the integrity of the image will be
|
||
performed.
|
||
|
||
Parameter reference
|
||
~~~~~~~~~~~~~~~~~~~
|
||
|
||
To understand how Avocado parameters are accessed by tests, and how
|
||
they can be passed to tests, please refer to::
|
||
|
||
https://avocado-framework.readthedocs.io/en/latest/guides/writer/chapters/writing.html#accessing-test-parameters
|
||
|
||
Parameter values can be easily seen in the log files, and will look
|
||
like the following:
|
||
|
||
.. code::
|
||
|
||
PARAMS (key=qemu_bin, path=*, default=./qemu-system-x86_64) => './qemu-system-x86_64
|
||
|
||
Test
|
||
^^^^
|
||
|
||
arch
|
||
''''
|
||
|
||
The architecture that will influence the selection of a QEMU binary
|
||
(when one is not explicitly given).
|
||
|
||
Tests are also free to use this parameter value, for their own needs.
|
||
A test may, for instance, use the same value when selecting the
|
||
architecture of a kernel or disk image to boot a VM with.
|
||
|
||
This parameter has a direct relation with the ``arch`` attribute. If
|
||
not given, it will default to None.
|
||
|
||
cpu
|
||
'''
|
||
|
||
The cpu model that will be set to all QEMUMachine instances created
|
||
by the test.
|
||
|
||
machine
|
||
'''''''
|
||
|
||
The machine type that will be set to all QEMUMachine instances created
|
||
by the test.
|
||
|
||
qemu_bin
|
||
''''''''
|
||
|
||
The exact QEMU binary to be used on QEMUMachine.
|
||
|
||
LinuxTest
|
||
^^^^^^^^^
|
||
|
||
Besides the parameters present on the ``avocado_qemu.Test`` base
|
||
class, the ``avocado_qemu.LinuxTest`` adds the following parameters:
|
||
|
||
distro
|
||
''''''
|
||
|
||
The name of the Linux distribution used as the guest image for the
|
||
test. The name should match the **Provider** column on the list
|
||
of images supported by the avocado.utils.vmimage library:
|
||
|
||
https://avocado-framework.readthedocs.io/en/latest/guides/writer/libs/vmimage.html#supported-images
|
||
|
||
distro_version
|
||
''''''''''''''
|
||
|
||
The version of the Linux distribution as the guest image for the
|
||
test. The name should match the **Version** column on the list
|
||
of images supported by the avocado.utils.vmimage library:
|
||
|
||
https://avocado-framework.readthedocs.io/en/latest/guides/writer/libs/vmimage.html#supported-images
|
||
|
||
distro_checksum
|
||
'''''''''''''''
|
||
|
||
The sha256 hash of the guest image file used for the test.
|
||
|
||
If this value is not set in the code or by this parameter no
|
||
validation on the integrity of the image will be performed.
|
||
|
||
Skipping tests
|
||
~~~~~~~~~~~~~~
|
||
|
||
The Avocado framework provides Python decorators which allow for easily skip
|
||
tests running under certain conditions. For example, on the lack of a binary
|
||
on the test system or when the running environment is a CI system. For further
|
||
information about those decorators, please refer to::
|
||
|
||
https://avocado-framework.readthedocs.io/en/latest/guides/writer/chapters/writing.html#skipping-tests
|
||
|
||
While the conditions for skipping tests are often specifics of each one, there
|
||
are recurring scenarios identified by the QEMU developers and the use of
|
||
environment variables became a kind of standard way to enable/disable tests.
|
||
|
||
Here is a list of the most used variables:
|
||
|
||
AVOCADO_ALLOW_LARGE_STORAGE
|
||
^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||
Tests which are going to fetch or produce assets considered *large* are not
|
||
going to run unless that ``AVOCADO_ALLOW_LARGE_STORAGE=1`` is exported on
|
||
the environment.
|
||
|
||
The definition of *large* is a bit arbitrary here, but it usually means an
|
||
asset which occupies at least 1GB of size on disk when uncompressed.
|
||
|
||
AVOCADO_ALLOW_UNTRUSTED_CODE
|
||
^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||
There are tests which will boot a kernel image or firmware that can be
|
||
considered not safe to run on the developer's workstation, thus they are
|
||
skipped by default. The definition of *not safe* is also arbitrary but
|
||
usually it means a blob which either its source or build process aren't
|
||
public available.
|
||
|
||
You should export ``AVOCADO_ALLOW_UNTRUSTED_CODE=1`` on the environment in
|
||
order to allow tests which make use of those kind of assets.
|
||
|
||
AVOCADO_TIMEOUT_EXPECTED
|
||
^^^^^^^^^^^^^^^^^^^^^^^^
|
||
The Avocado framework has a timeout mechanism which interrupts tests to avoid the
|
||
test suite of getting stuck. The timeout value can be set via test parameter or
|
||
property defined in the test class, for further details::
|
||
|
||
https://avocado-framework.readthedocs.io/en/latest/guides/writer/chapters/writing.html#setting-a-test-timeout
|
||
|
||
Even though the timeout can be set by the test developer, there are some tests
|
||
that may not have a well-defined limit of time to finish under certain
|
||
conditions. For example, tests that take longer to execute when QEMU is
|
||
compiled with debug flags. Therefore, the ``AVOCADO_TIMEOUT_EXPECTED`` variable
|
||
has been used to determine whether those tests should run or not.
|
||
|
||
GITLAB_CI
|
||
^^^^^^^^^
|
||
A number of tests are flagged to not run on the GitLab CI. Usually because
|
||
they proved to the flaky or there are constraints on the CI environment which
|
||
would make them fail. If you encounter a similar situation then use that
|
||
variable as shown on the code snippet below to skip the test:
|
||
|
||
.. code::
|
||
|
||
@skipIf(os.getenv('GITLAB_CI'), 'Running on GitLab')
|
||
def test(self):
|
||
do_something()
|
||
|
||
Uninstalling Avocado
|
||
~~~~~~~~~~~~~~~~~~~~
|
||
|
||
If you've followed the manual installation instructions above, you can
|
||
easily uninstall Avocado. Start by listing the packages you have
|
||
installed::
|
||
|
||
pip list --user
|
||
|
||
And remove any package you want with::
|
||
|
||
pip uninstall <package_name>
|
||
|
||
If you've used ``make check-avocado``, the Python virtual environment where
|
||
Avocado is installed will be cleaned up as part of ``make check-clean``.
|
||
|
||
.. _checktcg-ref:
|
||
|
||
Testing with "make check-tcg"
|
||
-----------------------------
|
||
|
||
The check-tcg tests are intended for simple smoke tests of both
|
||
linux-user and softmmu TCG functionality. However to build test
|
||
programs for guest targets you need to have cross compilers available.
|
||
If your distribution supports cross compilers you can do something as
|
||
simple as::
|
||
|
||
apt install gcc-aarch64-linux-gnu
|
||
|
||
The configure script will automatically pick up their presence.
|
||
Sometimes compilers have slightly odd names so the availability of
|
||
them can be prompted by passing in the appropriate configure option
|
||
for the architecture in question, for example::
|
||
|
||
$(configure) --cross-cc-aarch64=aarch64-cc
|
||
|
||
There is also a ``--cross-cc-cflags-ARCH`` flag in case additional
|
||
compiler flags are needed to build for a given target.
|
||
|
||
If you have the ability to run containers as the user the build system
|
||
will automatically use them where no system compiler is available. For
|
||
architectures where we also support building QEMU we will generally
|
||
use the same container to build tests. However there are a number of
|
||
additional containers defined that have a minimal cross-build
|
||
environment that is only suitable for building test cases. Sometimes
|
||
we may use a bleeding edge distribution for compiler features needed
|
||
for test cases that aren't yet in the LTS distros we support for QEMU
|
||
itself.
|
||
|
||
See :ref:`container-ref` for more details.
|
||
|
||
Running subset of tests
|
||
~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
||
You can build the tests for one architecture::
|
||
|
||
make build-tcg-tests-$TARGET
|
||
|
||
And run with::
|
||
|
||
make run-tcg-tests-$TARGET
|
||
|
||
Adding ``V=1`` to the invocation will show the details of how to
|
||
invoke QEMU for the test which is useful for debugging tests.
|
||
|
||
TCG test dependencies
|
||
~~~~~~~~~~~~~~~~~~~~~
|
||
|
||
The TCG tests are deliberately very light on dependencies and are
|
||
either totally bare with minimal gcc lib support (for softmmu tests)
|
||
or just glibc (for linux-user tests). This is because getting a cross
|
||
compiler to work with additional libraries can be challenging.
|
||
|
||
Other TCG Tests
|
||
---------------
|
||
|
||
There are a number of out-of-tree test suites that are used for more
|
||
extensive testing of processor features.
|
||
|
||
KVM Unit Tests
|
||
~~~~~~~~~~~~~~
|
||
|
||
The KVM unit tests are designed to run as a Guest OS under KVM but
|
||
there is no reason why they can't exercise the TCG as well. It
|
||
provides a minimal OS kernel with hooks for enabling the MMU as well
|
||
as reporting test results via a special device::
|
||
|
||
https://git.kernel.org/pub/scm/virt/kvm/kvm-unit-tests.git
|
||
|
||
Linux Test Project
|
||
~~~~~~~~~~~~~~~~~~
|
||
|
||
The LTP is focused on exercising the syscall interface of a Linux
|
||
kernel. It checks that syscalls behave as documented and strives to
|
||
exercise as many corner cases as possible. It is a useful test suite
|
||
to run to exercise QEMU's linux-user code::
|
||
|
||
https://linux-test-project.github.io/
|
||
|
||
GCC gcov support
|
||
----------------
|
||
|
||
``gcov`` is a GCC tool to analyze the testing coverage by
|
||
instrumenting the tested code. To use it, configure QEMU with
|
||
``--enable-gcov`` option and build. Then run the tests as usual.
|
||
|
||
If you want to gather coverage information on a single test the ``make
|
||
clean-gcda`` target can be used to delete any existing coverage
|
||
information before running a single test.
|
||
|
||
You can generate a HTML coverage report by executing ``make
|
||
coverage-html`` which will create
|
||
``meson-logs/coveragereport/index.html``.
|
||
|
||
Further analysis can be conducted by running the ``gcov`` command
|
||
directly on the various .gcda output files. Please read the ``gcov``
|
||
documentation for more information.
|