virt-host-validate-common.c 11.1 KB
Newer Older
1 2 3
/*
 * virt-host-validate-common.c: Sanity check helper APIs
 *
4
 * Copyright (C) 2012, 2014 Red Hat, Inc.
5 6 7 8 9 10 11 12 13 14 15 16
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
17
 * License along with this library.  If not, see
O
Osier Yang 已提交
18
 * <http://www.gnu.org/licenses/>.
19 20 21 22 23 24 25 26
 *
 */

#include <config.h>

#include <stdarg.h>
#include <unistd.h>
#include <sys/utsname.h>
27
#include <sys/stat.h>
28

29
#include "viralloc.h"
30
#include "vircgroup.h"
31 32
#include "virfile.h"
#include "virt-host-validate-common.h"
33
#include "virstring.h"
34
#include "virarch.h"
35

36 37
#define VIR_FROM_THIS VIR_FROM_NONE

38 39
VIR_ENUM_IMPL(virHostValidateCPUFlag,
              VIR_HOST_VALIDATE_CPU_FLAG_LAST,
40
              "vmx",
41 42
              "svm",
              "sie");
43

44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61
static bool quiet;

void virHostMsgSetQuiet(bool quietFlag)
{
    quiet = quietFlag;
}

void virHostMsgCheck(const char *prefix,
                     const char *format,
                     ...)
{
    va_list args;
    char *msg;

    if (quiet)
        return;

    va_start(args, format);
62
    msg = g_strdup_vprintf(format, args);
63 64 65 66 67 68 69 70 71
    va_end(args);

    fprintf(stdout, _("%6s: Checking %-60s: "), prefix, msg);
    VIR_FREE(msg);
}

static bool virHostMsgWantEscape(void)
{
    static bool detectTty = true;
72
    static bool wantEscape;
73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98
    if (detectTty) {
        if (isatty(STDOUT_FILENO))
            wantEscape = true;
        detectTty = false;
    }
    return wantEscape;
}

void virHostMsgPass(void)
{
    if (quiet)
        return;

    if (virHostMsgWantEscape())
        fprintf(stdout, "\033[32m%s\033[0m\n", _("PASS"));
    else
        fprintf(stdout, "%s\n", _("PASS"));
}


static const char * failMessages[] = {
    N_("FAIL"),
    N_("WARN"),
    N_("NOTE"),
};

99
G_STATIC_ASSERT(G_N_ELEMENTS(failMessages) == VIR_HOST_VALIDATE_LAST);
100 101 102 103 104 105 106

static const char *failEscapeCodes[] = {
    "\033[31m",
    "\033[33m",
    "\033[34m",
};

107
G_STATIC_ASSERT(G_N_ELEMENTS(failEscapeCodes) == VIR_HOST_VALIDATE_LAST);
108 109

void virHostMsgFail(virHostValidateLevel level,
110 111
                    const char *format,
                    ...)
112
{
113 114 115 116 117 118 119
    va_list args;
    char *msg;

    if (quiet)
        return;

    va_start(args, format);
120
    msg = g_strdup_vprintf(format, args);
121 122
    va_end(args);

123 124
    if (virHostMsgWantEscape())
        fprintf(stdout, "%s%s\033[0m (%s)\n",
125
                failEscapeCodes[level], _(failMessages[level]), msg);
126 127
    else
        fprintf(stdout, "%s (%s)\n",
128 129
                _(failMessages[level]), msg);
    VIR_FREE(msg);
130 131 132
}


133 134 135 136
int virHostValidateDeviceExists(const char *hvname,
                                const char *dev_name,
                                virHostValidateLevel level,
                                const char *hint)
137
{
138 139 140
    virHostMsgCheck(hvname, "if device %s exists", dev_name);

    if (access(dev_name, F_OK) < 0) {
141
        virHostMsgFail(level, "%s", hint);
142 143 144 145 146 147 148 149 150 151 152 153 154 155
        return -1;
    }

    virHostMsgPass();
    return 0;
}


int virHostValidateDeviceAccessible(const char *hvname,
                                    const char *dev_name,
                                    virHostValidateLevel level,
                                    const char *hint)
{
    virHostMsgCheck(hvname, "if device %s is accessible", dev_name);
156

E
Eric Blake 已提交
157
    if (access(dev_name, R_OK|W_OK) < 0) {
158
        virHostMsgFail(level, "%s", hint);
159 160 161 162 163 164 165 166
        return -1;
    }

    virHostMsgPass();
    return 0;
}


167 168 169 170 171 172 173 174
int virHostValidateNamespace(const char *hvname,
                             const char *ns_name,
                             virHostValidateLevel level,
                             const char *hint)
{
    virHostMsgCheck(hvname, "for namespace %s", ns_name);
    char nspath[100];

175
    g_snprintf(nspath, sizeof(nspath), "/proc/self/ns/%s", ns_name);
176 177

    if (access(nspath, F_OK) < 0) {
178
        virHostMsgFail(level, "%s", hint);
179 180 181 182 183 184 185 186
        return -1;
    }

    virHostMsgPass();
    return 0;
}


187
virBitmapPtr virHostValidateGetCPUFlags(void)
188
{
189
    FILE *fp;
J
John Ferlan 已提交
190
    virBitmapPtr flags = NULL;
191

192 193 194 195
    if (!(fp = fopen("/proc/cpuinfo", "r")))
        return NULL;

    if (!(flags = virBitmapNewQuiet(VIR_HOST_VALIDATE_CPU_FLAG_LAST)))
J
John Ferlan 已提交
196
        goto cleanup;
197 198 199

    do {
        char line[1024];
200 201 202 203
        char *start;
        char **tokens;
        size_t ntokens;
        size_t i;
204 205 206 207

        if (!fgets(line, sizeof(line), fp))
            break;

208 209 210 211 212
        /* The line we're interested in is marked differently depending
         * on the architecture, so check possible prefixes */
        if (!STRPREFIX(line, "flags") &&
            !STRPREFIX(line, "Features") &&
            !STRPREFIX(line, "features"))
213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237
            continue;

        /* fgets() includes the trailing newline in the output buffer,
         * so we need to clean that up ourselves. We can safely access
         * line[strlen(line) - 1] because the checks above would cause
         * us to skip empty strings */
        line[strlen(line) - 1] = '\0';

        /* Skip to the separator */
        if (!(start = strchr(line, ':')))
            continue;

        /* Split the line using " " as a delimiter. The first token
         * will always be ":", but that's okay */
        if (!(tokens = virStringSplitCount(start, " ", 0, &ntokens)))
            continue;

        /* Go through all flags and check whether one of those we
         * might want to check for later on is present; if that's
         * the case, set the relevant bit in the bitmap */
        for (i = 0; i < ntokens; i++) {
            int value;

            if ((value = virHostValidateCPUFlagTypeFromString(tokens[i])) >= 0)
                ignore_value(virBitmapSetBit(flags, value));
238
        }
239

240
        virStringListFreeCount(tokens, ntokens);
241 242
    } while (1);

J
John Ferlan 已提交
243
 cleanup:
244 245
    VIR_FORCE_FCLOSE(fp);

246
    return flags;
247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265
}


int virHostValidateLinuxKernel(const char *hvname,
                               int version,
                               virHostValidateLevel level,
                               const char *hint)
{
    struct utsname uts;
    unsigned long thisversion;

    uname(&uts);

    virHostMsgCheck(hvname, _("for Linux >= %d.%d.%d"),
                    ((version >> 16) & 0xff),
                    ((version >> 8) & 0xff),
                    (version & 0xff));

    if (STRNEQ(uts.sysname, "Linux")) {
266
        virHostMsgFail(level, "%s", hint);
267 268 269 270
        return -1;
    }

    if (virParseVersionString(uts.release, &thisversion, true) < 0) {
271
        virHostMsgFail(level, "%s", hint);
272 273 274 275
        return -1;
    }

    if (thisversion < version) {
276
        virHostMsgFail(level, "%s", hint);
277 278 279 280 281 282
        return -1;
    } else {
        virHostMsgPass();
        return 0;
    }
}
283

284 285 286 287
#ifdef __linux__
int virHostValidateCGroupControllers(const char *hvname,
                                     int controllers,
                                     virHostValidateLevel level)
288
{
289 290 291
    virCgroupPtr group = NULL;
    int ret = 0;
    size_t i;
292

293 294
    if (virCgroupNewSelf(&group) < 0)
        return -1;
295

296 297 298
    for (i = 0; i < VIR_CGROUP_CONTROLLER_LAST; i++) {
        int flag = 1 << i;
        const char *cg_name = virCgroupControllerTypeToString(i);
299

300
        if (!(controllers & flag))
301 302
            continue;

303
        virHostMsgCheck(hvname, "for cgroup '%s' controller support", cg_name);
304

305 306 307 308 309 310 311
        if (!virCgroupHasController(group, i)) {
            ret = -1;
            virHostMsgFail(level, "Enable '%s' in kernel Kconfig file or "
                           "mount/enable cgroup controller in your system",
                           cg_name);
        } else {
            virHostMsgPass();
312
        }
313 314
    }

315
    virCgroupFree(&group);
316

317
    return ret;
318
}
319
#else /*  !__linux__ */
J
Ján Tomko 已提交
320 321
int virHostValidateCGroupControllers(const char *hvname G_GNUC_UNUSED,
                                     int controllers G_GNUC_UNUSED,
322
                                     virHostValidateLevel level)
323 324 325 326
{
    virHostMsgFail(level, "%s", "This platform does not support cgroups");
    return -1;
}
327
#endif /* !__linux__ */
328 329 330 331

int virHostValidateIOMMU(const char *hvname,
                         virHostValidateLevel level)
{
332
    virBitmapPtr flags;
333 334
    struct stat sb;
    const char *bootarg = NULL;
335 336 337 338 339 340
    bool isAMD = false, isIntel = false;
    virArch arch = virArchFromHost();
    struct dirent *dent;
    DIR *dir;
    int rc;

341 342 343
    flags = virHostValidateGetCPUFlags();

    if (flags && virBitmapIsBitSet(flags, VIR_HOST_VALIDATE_CPU_FLAG_VMX))
344
        isIntel = true;
345
    else if (flags && virBitmapIsBitSet(flags, VIR_HOST_VALIDATE_CPU_FLAG_SVM))
346 347
        isAMD = true;

348 349
    virBitmapFree(flags);

350
    if (isIntel) {
351
        virHostMsgCheck(hvname, "%s", _("for device assignment IOMMU support"));
352 353 354 355 356 357 358 359 360 361 362
        if (access("/sys/firmware/acpi/tables/DMAR", F_OK) == 0) {
            virHostMsgPass();
            bootarg = "intel_iommu=on";
        } else {
            virHostMsgFail(level,
                           "No ACPI DMAR table found, IOMMU either "
                           "disabled in BIOS or not supported by this "
                           "hardware platform");
            return -1;
        }
    } else if (isAMD) {
363
        virHostMsgCheck(hvname, "%s", _("for device assignment IOMMU support"));
364 365 366 367 368 369 370 371 372 373
        if (access("/sys/firmware/acpi/tables/IVRS", F_OK) == 0) {
            virHostMsgPass();
            bootarg = "iommu=pt iommu=1";
        } else {
            virHostMsgFail(level,
                           "No ACPI IVRS table found, IOMMU either "
                           "disabled in BIOS or not supported by this "
                           "hardware platform");
            return -1;
        }
374
    } else if (ARCH_IS_PPC64(arch)) {
375
        /* Empty Block */
376 377 378 379 380 381 382 383 384 385 386
    } else if (ARCH_IS_S390(arch)) {
        /* On s390x, we skip the IOMMU check if there are no PCI
         * devices (which is quite usual on s390x). If there are
         * no PCI devices the directory is still there but is
         * empty. */
        if (!virDirOpen(&dir, "/sys/bus/pci/devices"))
            return 0;
        rc = virDirRead(dir, &dent, NULL);
        VIR_DIR_CLOSE(dir);
        if (rc <= 0)
            return 0;
387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402
    } else {
        virHostMsgFail(level,
                       "Unknown if this platform has IOMMU support");
        return -1;
    }


    /* We can only check on newer kernels with iommu groups & vfio */
    if (stat("/sys/kernel/iommu_groups", &sb) < 0)
        return 0;

    if (!S_ISDIR(sb.st_mode))
        return 0;

    virHostMsgCheck(hvname, "%s", _("if IOMMU is enabled by kernel"));
    if (sb.st_nlink <= 2) {
403
        if (bootarg)
404 405 406 407 408
            virHostMsgFail(level,
                           "IOMMU appears to be disabled in kernel. "
                           "Add %s to kernel cmdline arguments", bootarg);
        else
            virHostMsgFail(level, "IOMMU capability not compiled into kernel.");
409 410 411 412 413
        return -1;
    }
    virHostMsgPass();
    return 0;
}