mirror of
https://gitlab.com/libvirt/libvirt.git
synced 2024-11-01 19:01:14 +00:00
744d0f3de0
Clean up all _virDomainBlockStats. Signed-off-by: James <james.wangyufei@huawei.com> Signed-off-by: Wang Rui <moon.wangrui@huawei.com> Signed-off-by: Eric Blake <eblake@redhat.com>
357 lines
11 KiB
C
357 lines
11 KiB
C
/*
|
|
* Linux block and network stats.
|
|
*
|
|
* Copyright (C) 2007-2009, 2013 Red Hat, Inc.
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library. If not, see
|
|
* <http://www.gnu.org/licenses/>.
|
|
*
|
|
* Richard W.M. Jones <rjones@redhat.com>
|
|
*/
|
|
|
|
#include <config.h>
|
|
|
|
/* This file only applies on Linux. */
|
|
#ifdef __linux__
|
|
|
|
# include <stdio.h>
|
|
# include <stdlib.h>
|
|
# include <fcntl.h>
|
|
# include <string.h>
|
|
# include <unistd.h>
|
|
# include <regex.h>
|
|
|
|
# if HAVE_XENSTORE_H
|
|
# include <xenstore.h>
|
|
# else
|
|
# include <xs.h>
|
|
# endif
|
|
|
|
# include "virerror.h"
|
|
# include "datatypes.h"
|
|
# include "block_stats.h"
|
|
# include "viralloc.h"
|
|
# include "virfile.h"
|
|
# include "virstring.h"
|
|
|
|
# define VIR_FROM_THIS VIR_FROM_STATS_LINUX
|
|
|
|
|
|
/*-------------------- Xen: block stats --------------------*/
|
|
|
|
# include <linux/major.h>
|
|
|
|
/* This is normally defined in <linux/major.h> but previously we
|
|
* hard-coded it. So if it's not defined, hard-code again.
|
|
*/
|
|
# ifndef XENVBD_MAJOR
|
|
# define XENVBD_MAJOR 202
|
|
# endif
|
|
|
|
static int64_t
|
|
read_stat(const char *path)
|
|
{
|
|
char str[64];
|
|
int64_t r;
|
|
size_t i;
|
|
FILE *fp;
|
|
|
|
fp = fopen(path, "r");
|
|
if (!fp)
|
|
return -1;
|
|
|
|
/* read, but don't bail out before closing */
|
|
i = fread(str, 1, sizeof(str) - 1, fp);
|
|
|
|
if (VIR_FCLOSE(fp) != 0 /* disk error */
|
|
|| i < 1) /* ensure we read at least one byte */
|
|
return -1;
|
|
|
|
str[i] = '\0'; /* make sure the string is nul-terminated */
|
|
if (virStrToLong_ll(str, NULL, 10, (long long *) &r) < 0)
|
|
return -1;
|
|
|
|
return r;
|
|
}
|
|
|
|
static int64_t
|
|
read_bd_stat(int device, int domid, const char *str)
|
|
{
|
|
static const char *paths[] = {
|
|
"/sys/bus/xen-backend/devices/vbd-%d-%d/statistics/%s",
|
|
"/sys/bus/xen-backend/devices/tap-%d-%d/statistics/%s",
|
|
"/sys/devices/xen-backend/vbd-%d-%d/statistics/%s",
|
|
"/sys/devices/xen-backend/tap-%d-%d/statistics/%s"
|
|
};
|
|
|
|
size_t i;
|
|
char *path;
|
|
int64_t r;
|
|
|
|
for (i = 0; i < ARRAY_CARDINALITY(paths); ++i) {
|
|
if (virAsprintf(&path, paths[i], domid, device, str) < 0)
|
|
return -1;
|
|
|
|
r = read_stat(path);
|
|
|
|
VIR_FREE(path);
|
|
|
|
if (r >= 0) {
|
|
return r;
|
|
}
|
|
}
|
|
|
|
return -1;
|
|
}
|
|
|
|
/* In Xenstore, /local/domain/0/backend/vbd/<domid>/<device>/state,
|
|
* if available, must be XenbusStateConnected (= 4), otherwise there
|
|
* is no connected device.
|
|
*/
|
|
static int
|
|
check_bd_connected(xenUnifiedPrivatePtr priv, int device, int domid)
|
|
{
|
|
char s[256], *rs;
|
|
int r;
|
|
unsigned len = 0;
|
|
|
|
/* This code assumes we're connected if we can't get to
|
|
* xenstore, etc.
|
|
*/
|
|
if (!priv->xshandle) return 1;
|
|
snprintf(s, sizeof(s), "/local/domain/0/backend/vbd/%d/%d/state",
|
|
domid, device);
|
|
s[sizeof(s) - 1] = '\0';
|
|
|
|
rs = xs_read(priv->xshandle, 0, s, &len);
|
|
if (!rs) return 1;
|
|
if (len == 0) {
|
|
/* Hmmm ... we can get to xenstore but it returns an empty
|
|
* string instead of an error. Assume it's not connected
|
|
* in this case.
|
|
*/
|
|
VIR_FREE(rs);
|
|
return 0;
|
|
}
|
|
|
|
r = STREQ(rs, "4");
|
|
VIR_FREE(rs);
|
|
return r;
|
|
}
|
|
|
|
static int
|
|
read_bd_stats(xenUnifiedPrivatePtr priv,
|
|
int device, int domid, virDomainBlockStatsPtr stats)
|
|
{
|
|
stats->rd_req = read_bd_stat(device, domid, "rd_req");
|
|
stats->rd_bytes = read_bd_stat(device, domid, "rd_sect");
|
|
stats->wr_req = read_bd_stat(device, domid, "wr_req");
|
|
stats->wr_bytes = read_bd_stat(device, domid, "wr_sect");
|
|
stats->errs = read_bd_stat(device, domid, "oo_req");
|
|
|
|
/* None of the files were found - it's likely that this version
|
|
* of Xen is an old one which just doesn't support stats collection.
|
|
*/
|
|
if (stats->rd_req == -1 && stats->rd_bytes == -1 &&
|
|
stats->wr_req == -1 && stats->wr_bytes == -1 &&
|
|
stats->errs == -1) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("Failed to read any block statistics for domain %d"),
|
|
domid);
|
|
return -1;
|
|
}
|
|
|
|
/* If stats are all zero then either there really isn't any block
|
|
* device activity, or there is no connected front end device
|
|
* in which case there are no stats.
|
|
*/
|
|
if (stats->rd_req == 0 && stats->rd_bytes == 0 &&
|
|
stats->wr_req == 0 && stats->wr_bytes == 0 &&
|
|
stats->errs == 0 &&
|
|
!check_bd_connected(priv, device, domid)) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("Frontend block device not connected for domain %d"),
|
|
domid);
|
|
return -1;
|
|
}
|
|
|
|
/* 'Bytes' was really sectors when we read it. Scale up by
|
|
* an assumed sector size.
|
|
*/
|
|
if (stats->rd_bytes > 0) {
|
|
if (stats->rd_bytes >= ((unsigned long long)1)<<(63-9)) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("stats->rd_bytes would overflow 64 bit counter for domain %d"),
|
|
domid);
|
|
return -1;
|
|
}
|
|
stats->rd_bytes *= 512;
|
|
}
|
|
if (stats->wr_bytes > 0) {
|
|
if (stats->wr_bytes >= ((unsigned long long)1)<<(63-9)) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("stats->wr_bytes would overflow 64 bit counter for domain %d"),
|
|
domid);
|
|
return -1;
|
|
}
|
|
stats->wr_bytes *= 512;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
disk_re_match(const char *regex, const char *path, int *part)
|
|
{
|
|
regex_t myreg;
|
|
int err;
|
|
int retval;
|
|
regmatch_t pmatch[3];
|
|
|
|
retval = 0;
|
|
|
|
err = regcomp(&myreg, regex, REG_EXTENDED);
|
|
if (err != 0)
|
|
return 0;
|
|
|
|
err = regexec(&myreg, path, 3, pmatch, 0);
|
|
|
|
if (err == 0) {
|
|
/* OK, we have a match; see if we have a partition */
|
|
*part = 0;
|
|
retval = 1;
|
|
if (pmatch[1].rm_so != -1) {
|
|
if (virStrToLong_i(path + pmatch[1].rm_so, NULL, 10, part) < 0)
|
|
retval = 0;
|
|
}
|
|
}
|
|
|
|
regfree(&myreg);
|
|
|
|
return retval;
|
|
}
|
|
|
|
int
|
|
xenLinuxDomainDeviceID(int domid, const char *path)
|
|
{
|
|
int major, minor;
|
|
int part;
|
|
int retval;
|
|
char *mod_path;
|
|
|
|
int const scsi_majors[] = { SCSI_DISK0_MAJOR, SCSI_DISK1_MAJOR,
|
|
SCSI_DISK2_MAJOR, SCSI_DISK3_MAJOR,
|
|
SCSI_DISK4_MAJOR, SCSI_DISK5_MAJOR,
|
|
SCSI_DISK6_MAJOR, SCSI_DISK7_MAJOR,
|
|
SCSI_DISK8_MAJOR, SCSI_DISK9_MAJOR,
|
|
SCSI_DISK10_MAJOR, SCSI_DISK11_MAJOR,
|
|
SCSI_DISK12_MAJOR, SCSI_DISK13_MAJOR,
|
|
SCSI_DISK14_MAJOR, SCSI_DISK15_MAJOR };
|
|
int const ide_majors[] = { IDE0_MAJOR, IDE1_MAJOR, IDE2_MAJOR, IDE3_MAJOR,
|
|
IDE4_MAJOR, IDE5_MAJOR, IDE6_MAJOR, IDE7_MAJOR,
|
|
IDE8_MAJOR, IDE9_MAJOR };
|
|
|
|
/*
|
|
* Possible block device majors & partition ranges. This
|
|
* matches the ranges supported in Xend xen/util/blkif.py
|
|
*
|
|
* hdNM: N=a-t, M=1-63, major={IDE0_MAJOR -> IDE9_MAJOR}
|
|
* sdNM: N=a-z,aa-iv, M=1-15, major={SCSI_DISK0_MAJOR -> SCSI_DISK15_MAJOR}
|
|
* xvdNM: N=a-p M=1-15, major=XENVBD_MAJOR
|
|
* xvdNM: N=q-z,aa-iz M=1-15, major=(1<<28)
|
|
*
|
|
* The path for statistics will be
|
|
*
|
|
* /sys/devices/xen-backend/(vbd|tap)-{domid}-{devid}/statistics/{...}
|
|
*/
|
|
|
|
if (strlen(path) >= 5 && STRPREFIX(path, "/dev/")) {
|
|
if (VIR_STRDUP(mod_path, path) < 0)
|
|
return -1;
|
|
} else {
|
|
if (virAsprintf(&mod_path, "/dev/%s", path) < 0)
|
|
return -1;
|
|
}
|
|
|
|
retval = -1;
|
|
|
|
if (disk_re_match("/dev/sd[a-z]([1-9]|1[0-5])?$", mod_path, &part)) {
|
|
major = scsi_majors[(mod_path[7] - 'a') / 16];
|
|
minor = ((mod_path[7] - 'a') % 16) * 16 + part;
|
|
retval = major * 256 + minor;
|
|
}
|
|
else if (disk_re_match("/dev/sd[a-h][a-z]([1-9]|1[0-5])?$",
|
|
mod_path, &part) ||
|
|
disk_re_match("/dev/sdi[a-v]([1-9]|1[0-5])?$",
|
|
mod_path, &part)) {
|
|
major = scsi_majors[((mod_path[7] - 'a' + 1) * 26 + (mod_path[8] - 'a')) / 16];
|
|
minor = (((mod_path[7] - 'a' + 1) * 26 + (mod_path[8] - 'a')) % 16)
|
|
* 16 + part;
|
|
retval = major * 256 + minor;
|
|
}
|
|
else if (disk_re_match("/dev/hd[a-t]([1-9]|[1-5][0-9]|6[0-3])?$",
|
|
mod_path, &part)) {
|
|
major = ide_majors[(mod_path[7] - 'a') / 2];
|
|
minor = ((mod_path[7] - 'a') % 2) * 64 + part;
|
|
retval = major * 256 + minor;
|
|
}
|
|
else if (disk_re_match("/dev/xvd[a-p]([1-9]|1[0-5])?$", mod_path, &part))
|
|
retval = (202 << 8) + ((mod_path[8] - 'a') << 4) + part;
|
|
else if (disk_re_match("/dev/xvd[q-z]([1-9]|1[0-5])?$", mod_path, &part))
|
|
retval = (1 << 28) + ((mod_path[8] - 'a') << 8) + part;
|
|
else if (disk_re_match("/dev/xvd[a-i][a-z]([1-9]|1[0-5])?$",
|
|
mod_path, &part))
|
|
retval = (1 << 28) + (((mod_path[8] - 'a' + 1) * 26 + (mod_path[9] - 'a')) << 8) + part;
|
|
/*
|
|
* OK, we've now checked the common case (things that work); check the
|
|
* beginning of the strings for better error messages
|
|
*/
|
|
else if (strlen(mod_path) >= 7 && STRPREFIX(mod_path, "/dev/sd"))
|
|
virReportError(VIR_ERR_INVALID_ARG,
|
|
_("invalid path, device names must be in the range "
|
|
"sda[1-15] - sdiv[1-15] for domain %d"), domid);
|
|
else if (strlen(mod_path) >= 7 && STRPREFIX(mod_path, "/dev/hd"))
|
|
virReportError(VIR_ERR_INVALID_ARG,
|
|
_("invalid path, device names must be in the range "
|
|
"hda[1-63] - hdt[1-63] for domain %d"), domid);
|
|
else if (strlen(mod_path) >= 8 && STRPREFIX(mod_path, "/dev/xvd"))
|
|
virReportError(VIR_ERR_INVALID_ARG,
|
|
_("invalid path, device names must be in the range "
|
|
"xvda[1-15] - xvdiz[1-15] for domain %d"), domid);
|
|
else
|
|
virReportError(VIR_ERR_INVALID_ARG,
|
|
_("unsupported path, use xvdN, hdN, or sdN for domain %d"),
|
|
domid);
|
|
|
|
VIR_FREE(mod_path);
|
|
|
|
return retval;
|
|
}
|
|
|
|
int
|
|
xenLinuxDomainBlockStats(xenUnifiedPrivatePtr priv,
|
|
virDomainDefPtr def,
|
|
const char *path,
|
|
virDomainBlockStatsPtr stats)
|
|
{
|
|
int device = xenLinuxDomainDeviceID(def->id, path);
|
|
|
|
if (device < 0)
|
|
return -1;
|
|
|
|
return read_bd_stats(priv, device, def->id, stats);
|
|
}
|
|
|
|
#endif /* __linux__ */
|