virt-host-validate-common.c 11.2 KB
Newer Older
1 2 3
/*
 * virt-host-validate-common.c: Sanity check helper APIs
 *
4
 * Copyright (C) 2012, 2014 Red Hat, Inc.
5 6 7 8 9 10 11 12 13 14 15 16
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
17
 * License along with this library.  If not, see
O
Osier Yang 已提交
18
 * <http://www.gnu.org/licenses/>.
19 20 21 22 23 24 25 26
 *
 */

#include <config.h>

#include <stdarg.h>
#include <unistd.h>
#include <sys/utsname.h>
27
#include <sys/stat.h>
28

29
#include "viralloc.h"
30
#include "vircgroup.h"
31 32
#include "virfile.h"
#include "virt-host-validate-common.h"
33
#include "virstring.h"
34
#include "virarch.h"
35

36 37
#define VIR_FROM_THIS VIR_FROM_NONE

38 39
VIR_ENUM_IMPL(virHostValidateCPUFlag, VIR_HOST_VALIDATE_CPU_FLAG_LAST,
              "vmx",
40 41
              "svm",
              "sie");
42

43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73
static bool quiet;

void virHostMsgSetQuiet(bool quietFlag)
{
    quiet = quietFlag;
}

void virHostMsgCheck(const char *prefix,
                     const char *format,
                     ...)
{
    va_list args;
    char *msg;

    if (quiet)
        return;

    va_start(args, format);
    if (virVasprintf(&msg, format, args) < 0) {
        perror("malloc");
        abort();
    }
    va_end(args);

    fprintf(stdout, _("%6s: Checking %-60s: "), prefix, msg);
    VIR_FREE(msg);
}

static bool virHostMsgWantEscape(void)
{
    static bool detectTty = true;
74
    static bool wantEscape;
75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111
    if (detectTty) {
        if (isatty(STDOUT_FILENO))
            wantEscape = true;
        detectTty = false;
    }
    return wantEscape;
}

void virHostMsgPass(void)
{
    if (quiet)
        return;

    if (virHostMsgWantEscape())
        fprintf(stdout, "\033[32m%s\033[0m\n", _("PASS"));
    else
        fprintf(stdout, "%s\n", _("PASS"));
}


static const char * failMessages[] = {
    N_("FAIL"),
    N_("WARN"),
    N_("NOTE"),
};

verify(ARRAY_CARDINALITY(failMessages) == VIR_HOST_VALIDATE_LAST);

static const char *failEscapeCodes[] = {
    "\033[31m",
    "\033[33m",
    "\033[34m",
};

verify(ARRAY_CARDINALITY(failEscapeCodes) == VIR_HOST_VALIDATE_LAST);

void virHostMsgFail(virHostValidateLevel level,
112 113
                    const char *format,
                    ...)
114
{
115 116 117 118 119 120 121 122 123 124 125 126 127
    va_list args;
    char *msg;

    if (quiet)
        return;

    va_start(args, format);
    if (virVasprintf(&msg, format, args) < 0) {
        perror("malloc");
        abort();
    }
    va_end(args);

128 129
    if (virHostMsgWantEscape())
        fprintf(stdout, "%s%s\033[0m (%s)\n",
130
                failEscapeCodes[level], _(failMessages[level]), msg);
131 132
    else
        fprintf(stdout, "%s (%s)\n",
133 134
                _(failMessages[level]), msg);
    VIR_FREE(msg);
135 136 137
}


138 139 140 141
int virHostValidateDeviceExists(const char *hvname,
                                const char *dev_name,
                                virHostValidateLevel level,
                                const char *hint)
142
{
143 144 145
    virHostMsgCheck(hvname, "if device %s exists", dev_name);

    if (access(dev_name, F_OK) < 0) {
146
        virHostMsgFail(level, "%s", hint);
147 148 149 150 151 152 153 154 155 156 157 158 159 160
        return -1;
    }

    virHostMsgPass();
    return 0;
}


int virHostValidateDeviceAccessible(const char *hvname,
                                    const char *dev_name,
                                    virHostValidateLevel level,
                                    const char *hint)
{
    virHostMsgCheck(hvname, "if device %s is accessible", dev_name);
161

E
Eric Blake 已提交
162
    if (access(dev_name, R_OK|W_OK) < 0) {
163
        virHostMsgFail(level, "%s", hint);
164 165 166 167 168 169 170 171
        return -1;
    }

    virHostMsgPass();
    return 0;
}


172 173 174 175 176 177 178 179 180 181 182
int virHostValidateNamespace(const char *hvname,
                             const char *ns_name,
                             virHostValidateLevel level,
                             const char *hint)
{
    virHostMsgCheck(hvname, "for namespace %s", ns_name);
    char nspath[100];

    snprintf(nspath, sizeof(nspath), "/proc/self/ns/%s", ns_name);

    if (access(nspath, F_OK) < 0) {
183
        virHostMsgFail(level, "%s", hint);
184 185 186 187 188 189 190 191
        return -1;
    }

    virHostMsgPass();
    return 0;
}


192
virBitmapPtr virHostValidateGetCPUFlags(void)
193
{
194
    FILE *fp;
J
John Ferlan 已提交
195
    virBitmapPtr flags = NULL;
196

197 198 199 200
    if (!(fp = fopen("/proc/cpuinfo", "r")))
        return NULL;

    if (!(flags = virBitmapNewQuiet(VIR_HOST_VALIDATE_CPU_FLAG_LAST)))
J
John Ferlan 已提交
201
        goto cleanup;
202 203 204

    do {
        char line[1024];
205 206 207 208
        char *start;
        char **tokens;
        size_t ntokens;
        size_t i;
209 210 211 212

        if (!fgets(line, sizeof(line), fp))
            break;

213 214 215 216 217
        /* The line we're interested in is marked differently depending
         * on the architecture, so check possible prefixes */
        if (!STRPREFIX(line, "flags") &&
            !STRPREFIX(line, "Features") &&
            !STRPREFIX(line, "features"))
218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242
            continue;

        /* fgets() includes the trailing newline in the output buffer,
         * so we need to clean that up ourselves. We can safely access
         * line[strlen(line) - 1] because the checks above would cause
         * us to skip empty strings */
        line[strlen(line) - 1] = '\0';

        /* Skip to the separator */
        if (!(start = strchr(line, ':')))
            continue;

        /* Split the line using " " as a delimiter. The first token
         * will always be ":", but that's okay */
        if (!(tokens = virStringSplitCount(start, " ", 0, &ntokens)))
            continue;

        /* Go through all flags and check whether one of those we
         * might want to check for later on is present; if that's
         * the case, set the relevant bit in the bitmap */
        for (i = 0; i < ntokens; i++) {
            int value;

            if ((value = virHostValidateCPUFlagTypeFromString(tokens[i])) >= 0)
                ignore_value(virBitmapSetBit(flags, value));
243
        }
244

245
        virStringListFreeCount(tokens, ntokens);
246 247
    } while (1);

J
John Ferlan 已提交
248
 cleanup:
249 250
    VIR_FORCE_FCLOSE(fp);

251
    return flags;
252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270
}


int virHostValidateLinuxKernel(const char *hvname,
                               int version,
                               virHostValidateLevel level,
                               const char *hint)
{
    struct utsname uts;
    unsigned long thisversion;

    uname(&uts);

    virHostMsgCheck(hvname, _("for Linux >= %d.%d.%d"),
                    ((version >> 16) & 0xff),
                    ((version >> 8) & 0xff),
                    (version & 0xff));

    if (STRNEQ(uts.sysname, "Linux")) {
271
        virHostMsgFail(level, "%s", hint);
272 273 274 275
        return -1;
    }

    if (virParseVersionString(uts.release, &thisversion, true) < 0) {
276
        virHostMsgFail(level, "%s", hint);
277 278 279 280
        return -1;
    }

    if (thisversion < version) {
281
        virHostMsgFail(level, "%s", hint);
282 283 284 285 286 287
        return -1;
    } else {
        virHostMsgPass();
        return 0;
    }
}
288

289 290 291 292
#ifdef __linux__
int virHostValidateCGroupControllers(const char *hvname,
                                     int controllers,
                                     virHostValidateLevel level)
293
{
294 295 296
    virCgroupPtr group = NULL;
    int ret = 0;
    size_t i;
297

298 299
    if (virCgroupNewSelf(&group) < 0)
        return -1;
300

301 302 303
    for (i = 0; i < VIR_CGROUP_CONTROLLER_LAST; i++) {
        int flag = 1 << i;
        const char *cg_name = virCgroupControllerTypeToString(i);
304

305
        if (!(controllers & flag))
306 307
            continue;

308
        virHostMsgCheck(hvname, "for cgroup '%s' controller support", cg_name);
309

310 311 312 313 314 315 316
        if (!virCgroupHasController(group, i)) {
            ret = -1;
            virHostMsgFail(level, "Enable '%s' in kernel Kconfig file or "
                           "mount/enable cgroup controller in your system",
                           cg_name);
        } else {
            virHostMsgPass();
317
        }
318 319
    }

320
    virCgroupFree(&group);
321

322
    return ret;
323
}
324
#else /*  !__linux__ */
325 326
int virHostValidateCGroupControllers(const char *hvname ATTRIBUTE_UNUSED,
                                     int controllers ATTRIBUTE_UNUSED,
327
                                     virHostValidateLevel level)
328 329 330 331
{
    virHostMsgFail(level, "%s", "This platform does not support cgroups");
    return -1;
}
332
#endif /* !__linux__ */
333 334 335 336

int virHostValidateIOMMU(const char *hvname,
                         virHostValidateLevel level)
{
337
    virBitmapPtr flags;
338 339
    struct stat sb;
    const char *bootarg = NULL;
340 341 342 343 344 345
    bool isAMD = false, isIntel = false;
    virArch arch = virArchFromHost();
    struct dirent *dent;
    DIR *dir;
    int rc;

346 347 348
    flags = virHostValidateGetCPUFlags();

    if (flags && virBitmapIsBitSet(flags, VIR_HOST_VALIDATE_CPU_FLAG_VMX))
349
        isIntel = true;
350
    else if (flags && virBitmapIsBitSet(flags, VIR_HOST_VALIDATE_CPU_FLAG_SVM))
351 352
        isAMD = true;

353 354
    virBitmapFree(flags);

355
    if (isIntel) {
356
        virHostMsgCheck(hvname, "%s", _("for device assignment IOMMU support"));
357 358 359 360 361 362 363 364 365 366 367
        if (access("/sys/firmware/acpi/tables/DMAR", F_OK) == 0) {
            virHostMsgPass();
            bootarg = "intel_iommu=on";
        } else {
            virHostMsgFail(level,
                           "No ACPI DMAR table found, IOMMU either "
                           "disabled in BIOS or not supported by this "
                           "hardware platform");
            return -1;
        }
    } else if (isAMD) {
368
        virHostMsgCheck(hvname, "%s", _("for device assignment IOMMU support"));
369 370 371 372 373 374 375 376 377 378
        if (access("/sys/firmware/acpi/tables/IVRS", F_OK) == 0) {
            virHostMsgPass();
            bootarg = "iommu=pt iommu=1";
        } else {
            virHostMsgFail(level,
                           "No ACPI IVRS table found, IOMMU either "
                           "disabled in BIOS or not supported by this "
                           "hardware platform");
            return -1;
        }
379
    } else if (ARCH_IS_PPC64(arch)) {
380
        /* Empty Block */
381 382 383 384 385 386 387 388 389 390 391
    } else if (ARCH_IS_S390(arch)) {
        /* On s390x, we skip the IOMMU check if there are no PCI
         * devices (which is quite usual on s390x). If there are
         * no PCI devices the directory is still there but is
         * empty. */
        if (!virDirOpen(&dir, "/sys/bus/pci/devices"))
            return 0;
        rc = virDirRead(dir, &dent, NULL);
        VIR_DIR_CLOSE(dir);
        if (rc <= 0)
            return 0;
392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407
    } else {
        virHostMsgFail(level,
                       "Unknown if this platform has IOMMU support");
        return -1;
    }


    /* We can only check on newer kernels with iommu groups & vfio */
    if (stat("/sys/kernel/iommu_groups", &sb) < 0)
        return 0;

    if (!S_ISDIR(sb.st_mode))
        return 0;

    virHostMsgCheck(hvname, "%s", _("if IOMMU is enabled by kernel"));
    if (sb.st_nlink <= 2) {
408
        if (bootarg)
409 410 411 412 413
            virHostMsgFail(level,
                           "IOMMU appears to be disabled in kernel. "
                           "Add %s to kernel cmdline arguments", bootarg);
        else
            virHostMsgFail(level, "IOMMU capability not compiled into kernel.");
414 415 416 417 418
        return -1;
    }
    virHostMsgPass();
    return 0;
}