virt-host-validate-common.c 11.5 KB
Newer Older
1 2 3
/*
 * virt-host-validate-common.c: Sanity check helper APIs
 *
4
 * Copyright (C) 2012, 2014 Red Hat, Inc.
5 6 7 8 9 10 11 12 13 14 15 16
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
17
 * License along with this library.  If not, see
O
Osier Yang 已提交
18
 * <http://www.gnu.org/licenses/>.
19 20 21 22 23 24 25 26
 *
 */

#include <config.h>

#include <stdarg.h>
#include <unistd.h>
#include <sys/utsname.h>
27
#include <sys/stat.h>
28

29
#include "viralloc.h"
30
#include "vircgroup.h"
31 32
#include "virfile.h"
#include "virt-host-validate-common.h"
33
#include "virstring.h"
34
#include "virarch.h"
35
#include "virutil.h"
36

37 38
#define VIR_FROM_THIS VIR_FROM_NONE

39 40
VIR_ENUM_IMPL(virHostValidateCPUFlag,
              VIR_HOST_VALIDATE_CPU_FLAG_LAST,
41
              "vmx",
42 43
              "svm",
              "sie");
44

45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62
static bool quiet;

void virHostMsgSetQuiet(bool quietFlag)
{
    quiet = quietFlag;
}

void virHostMsgCheck(const char *prefix,
                     const char *format,
                     ...)
{
    va_list args;
    char *msg;

    if (quiet)
        return;

    va_start(args, format);
63
    msg = g_strdup_vprintf(format, args);
64 65 66 67 68 69 70 71 72
    va_end(args);

    fprintf(stdout, _("%6s: Checking %-60s: "), prefix, msg);
    VIR_FREE(msg);
}

static bool virHostMsgWantEscape(void)
{
    static bool detectTty = true;
73
    static bool wantEscape;
74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99
    if (detectTty) {
        if (isatty(STDOUT_FILENO))
            wantEscape = true;
        detectTty = false;
    }
    return wantEscape;
}

void virHostMsgPass(void)
{
    if (quiet)
        return;

    if (virHostMsgWantEscape())
        fprintf(stdout, "\033[32m%s\033[0m\n", _("PASS"));
    else
        fprintf(stdout, "%s\n", _("PASS"));
}


static const char * failMessages[] = {
    N_("FAIL"),
    N_("WARN"),
    N_("NOTE"),
};

100
G_STATIC_ASSERT(G_N_ELEMENTS(failMessages) == VIR_HOST_VALIDATE_LAST);
101 102 103 104 105 106 107

static const char *failEscapeCodes[] = {
    "\033[31m",
    "\033[33m",
    "\033[34m",
};

108
G_STATIC_ASSERT(G_N_ELEMENTS(failEscapeCodes) == VIR_HOST_VALIDATE_LAST);
109 110

void virHostMsgFail(virHostValidateLevel level,
111 112
                    const char *format,
                    ...)
113
{
114 115 116 117 118 119 120
    va_list args;
    char *msg;

    if (quiet)
        return;

    va_start(args, format);
121
    msg = g_strdup_vprintf(format, args);
122 123
    va_end(args);

124 125
    if (virHostMsgWantEscape())
        fprintf(stdout, "%s%s\033[0m (%s)\n",
126
                failEscapeCodes[level], _(failMessages[level]), msg);
127 128
    else
        fprintf(stdout, "%s (%s)\n",
129 130
                _(failMessages[level]), msg);
    VIR_FREE(msg);
131 132 133
}


134 135 136 137
int virHostValidateDeviceExists(const char *hvname,
                                const char *dev_name,
                                virHostValidateLevel level,
                                const char *hint)
138
{
139 140 141
    virHostMsgCheck(hvname, "if device %s exists", dev_name);

    if (access(dev_name, F_OK) < 0) {
142
        virHostMsgFail(level, "%s", hint);
143 144 145 146 147 148 149 150 151 152 153 154 155 156
        return -1;
    }

    virHostMsgPass();
    return 0;
}


int virHostValidateDeviceAccessible(const char *hvname,
                                    const char *dev_name,
                                    virHostValidateLevel level,
                                    const char *hint)
{
    virHostMsgCheck(hvname, "if device %s is accessible", dev_name);
157

E
Eric Blake 已提交
158
    if (access(dev_name, R_OK|W_OK) < 0) {
159
        virHostMsgFail(level, "%s", hint);
160 161 162 163 164 165 166 167
        return -1;
    }

    virHostMsgPass();
    return 0;
}


168 169 170 171 172 173 174 175
int virHostValidateNamespace(const char *hvname,
                             const char *ns_name,
                             virHostValidateLevel level,
                             const char *hint)
{
    virHostMsgCheck(hvname, "for namespace %s", ns_name);
    char nspath[100];

176
    g_snprintf(nspath, sizeof(nspath), "/proc/self/ns/%s", ns_name);
177 178

    if (access(nspath, F_OK) < 0) {
179
        virHostMsgFail(level, "%s", hint);
180 181 182 183 184 185 186 187
        return -1;
    }

    virHostMsgPass();
    return 0;
}


188
virBitmapPtr virHostValidateGetCPUFlags(void)
189
{
190
    FILE *fp;
J
John Ferlan 已提交
191
    virBitmapPtr flags = NULL;
192

193 194 195 196
    if (!(fp = fopen("/proc/cpuinfo", "r")))
        return NULL;

    if (!(flags = virBitmapNewQuiet(VIR_HOST_VALIDATE_CPU_FLAG_LAST)))
J
John Ferlan 已提交
197
        goto cleanup;
198 199 200

    do {
        char line[1024];
201 202 203 204
        char *start;
        char **tokens;
        size_t ntokens;
        size_t i;
205 206 207 208

        if (!fgets(line, sizeof(line), fp))
            break;

209 210 211 212 213
        /* The line we're interested in is marked differently depending
         * on the architecture, so check possible prefixes */
        if (!STRPREFIX(line, "flags") &&
            !STRPREFIX(line, "Features") &&
            !STRPREFIX(line, "features"))
214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238
            continue;

        /* fgets() includes the trailing newline in the output buffer,
         * so we need to clean that up ourselves. We can safely access
         * line[strlen(line) - 1] because the checks above would cause
         * us to skip empty strings */
        line[strlen(line) - 1] = '\0';

        /* Skip to the separator */
        if (!(start = strchr(line, ':')))
            continue;

        /* Split the line using " " as a delimiter. The first token
         * will always be ":", but that's okay */
        if (!(tokens = virStringSplitCount(start, " ", 0, &ntokens)))
            continue;

        /* Go through all flags and check whether one of those we
         * might want to check for later on is present; if that's
         * the case, set the relevant bit in the bitmap */
        for (i = 0; i < ntokens; i++) {
            int value;

            if ((value = virHostValidateCPUFlagTypeFromString(tokens[i])) >= 0)
                ignore_value(virBitmapSetBit(flags, value));
239
        }
240

241
        virStringListFreeCount(tokens, ntokens);
242 243
    } while (1);

J
John Ferlan 已提交
244
 cleanup:
245 246
    VIR_FORCE_FCLOSE(fp);

247
    return flags;
248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266
}


int virHostValidateLinuxKernel(const char *hvname,
                               int version,
                               virHostValidateLevel level,
                               const char *hint)
{
    struct utsname uts;
    unsigned long thisversion;

    uname(&uts);

    virHostMsgCheck(hvname, _("for Linux >= %d.%d.%d"),
                    ((version >> 16) & 0xff),
                    ((version >> 8) & 0xff),
                    (version & 0xff));

    if (STRNEQ(uts.sysname, "Linux")) {
267
        virHostMsgFail(level, "%s", hint);
268 269 270 271
        return -1;
    }

    if (virParseVersionString(uts.release, &thisversion, true) < 0) {
272
        virHostMsgFail(level, "%s", hint);
273 274 275 276
        return -1;
    }

    if (thisversion < version) {
277
        virHostMsgFail(level, "%s", hint);
278 279 280 281 282 283
        return -1;
    } else {
        virHostMsgPass();
        return 0;
    }
}
284

285 286 287 288
#ifdef __linux__
int virHostValidateCGroupControllers(const char *hvname,
                                     int controllers,
                                     virHostValidateLevel level)
289
{
290 291 292
    virCgroupPtr group = NULL;
    int ret = 0;
    size_t i;
293

294 295
    if (virCgroupNewSelf(&group) < 0)
        return -1;
296

297 298 299
    for (i = 0; i < VIR_CGROUP_CONTROLLER_LAST; i++) {
        int flag = 1 << i;
        const char *cg_name = virCgroupControllerTypeToString(i);
300

301
        if (!(controllers & flag))
302 303
            continue;

304
        virHostMsgCheck(hvname, "for cgroup '%s' controller support", cg_name);
305

306 307 308 309 310 311 312
        if (!virCgroupHasController(group, i)) {
            ret = -1;
            virHostMsgFail(level, "Enable '%s' in kernel Kconfig file or "
                           "mount/enable cgroup controller in your system",
                           cg_name);
        } else {
            virHostMsgPass();
313
        }
314 315
    }

316
    virCgroupFree(&group);
317

318
    return ret;
319
}
320
#else /*  !__linux__ */
J
Ján Tomko 已提交
321 322
int virHostValidateCGroupControllers(const char *hvname G_GNUC_UNUSED,
                                     int controllers G_GNUC_UNUSED,
323
                                     virHostValidateLevel level)
324 325 326 327
{
    virHostMsgFail(level, "%s", "This platform does not support cgroups");
    return -1;
}
328
#endif /* !__linux__ */
329 330 331 332

int virHostValidateIOMMU(const char *hvname,
                         virHostValidateLevel level)
{
333
    virBitmapPtr flags;
334 335
    struct stat sb;
    const char *bootarg = NULL;
336 337 338 339 340 341
    bool isAMD = false, isIntel = false;
    virArch arch = virArchFromHost();
    struct dirent *dent;
    DIR *dir;
    int rc;

342 343 344
    flags = virHostValidateGetCPUFlags();

    if (flags && virBitmapIsBitSet(flags, VIR_HOST_VALIDATE_CPU_FLAG_VMX))
345
        isIntel = true;
346
    else if (flags && virBitmapIsBitSet(flags, VIR_HOST_VALIDATE_CPU_FLAG_SVM))
347 348
        isAMD = true;

349 350
    virBitmapFree(flags);

351
    if (isIntel) {
352
        virHostMsgCheck(hvname, "%s", _("for device assignment IOMMU support"));
353 354 355 356 357 358 359 360 361 362 363
        if (access("/sys/firmware/acpi/tables/DMAR", F_OK) == 0) {
            virHostMsgPass();
            bootarg = "intel_iommu=on";
        } else {
            virHostMsgFail(level,
                           "No ACPI DMAR table found, IOMMU either "
                           "disabled in BIOS or not supported by this "
                           "hardware platform");
            return -1;
        }
    } else if (isAMD) {
364
        virHostMsgCheck(hvname, "%s", _("for device assignment IOMMU support"));
365 366 367 368 369 370 371 372 373 374
        if (access("/sys/firmware/acpi/tables/IVRS", F_OK) == 0) {
            virHostMsgPass();
            bootarg = "iommu=pt iommu=1";
        } else {
            virHostMsgFail(level,
                           "No ACPI IVRS table found, IOMMU either "
                           "disabled in BIOS or not supported by this "
                           "hardware platform");
            return -1;
        }
375
    } else if (ARCH_IS_PPC64(arch)) {
376
        /* Empty Block */
377 378 379 380 381 382 383 384 385 386 387
    } else if (ARCH_IS_S390(arch)) {
        /* On s390x, we skip the IOMMU check if there are no PCI
         * devices (which is quite usual on s390x). If there are
         * no PCI devices the directory is still there but is
         * empty. */
        if (!virDirOpen(&dir, "/sys/bus/pci/devices"))
            return 0;
        rc = virDirRead(dir, &dent, NULL);
        VIR_DIR_CLOSE(dir);
        if (rc <= 0)
            return 0;
388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403
    } else {
        virHostMsgFail(level,
                       "Unknown if this platform has IOMMU support");
        return -1;
    }


    /* We can only check on newer kernels with iommu groups & vfio */
    if (stat("/sys/kernel/iommu_groups", &sb) < 0)
        return 0;

    if (!S_ISDIR(sb.st_mode))
        return 0;

    virHostMsgCheck(hvname, "%s", _("if IOMMU is enabled by kernel"));
    if (sb.st_nlink <= 2) {
404
        if (bootarg)
405 406 407 408 409
            virHostMsgFail(level,
                           "IOMMU appears to be disabled in kernel. "
                           "Add %s to kernel cmdline arguments", bootarg);
        else
            virHostMsgFail(level, "IOMMU capability not compiled into kernel.");
410 411 412 413 414
        return -1;
    }
    virHostMsgPass();
    return 0;
}
415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441


bool virHostKernelModuleIsLoaded(const char *module)
{
    FILE *fp;
    bool ret = false;

    if (!(fp = fopen("/proc/modules", "r")))
        return false;

    do {
        char line[1024];

        if (!fgets(line, sizeof(line), fp))
            break;

        if (STRPREFIX(line, module)) {
            ret = true;
            break;
        }

    } while (1);

    VIR_FORCE_FCLOSE(fp);

    return ret;
}