2021-11-13 11:39:16 +00:00
---
title: Performs a few checks on Phyllome OS
description:
published: true
2022-01-25 14:42:39 +00:00
date: 2022-01-25T14:42:37.414Z
2021-11-13 11:39:16 +00:00
tags:
editor: markdown
dateCreated: 2021-11-13T11:39:13.790Z
---
2022-01-25 14:42:39 +00:00
# Checkup
2021-11-27 11:19:27 +00:00
2022-01-25 14:42:39 +00:00
Before creating your first virtual machine, it is a good idea to check if everything is correctly set up.
2021-11-27 11:19:27 +00:00
2022-01-25 14:42:39 +00:00
## Perform a global checkup
2021-11-27 11:19:27 +00:00
2022-01-25 14:42:39 +00:00
The command-line tool `virt-host-validate` allows you to check whether virtualization features are activated or not.
2021-11-27 11:19:27 +00:00
* Use the following command to check your system:
```
virt-host-validate
```
* Make sure the result look like this:
```
[groot@phyllome ~]$ virt-host-validate
QEMU: Checking for hardware virtualization : PASS
QEMU: Checking if device /dev/kvm exists : PASS
QEMU: Checking if device /dev/kvm is accessible : PASS
QEMU: Checking if device /dev/vhost-net exists : PASS
QEMU: Checking if device /dev/net/tun exists : PASS
QEMU: Checking for cgroup 'cpu' controller support : PASS
QEMU: Checking for cgroup 'cpuacct' controller support : PASS
QEMU: Checking for cgroup 'cpuset' controller support : PASS
QEMU: Checking for cgroup 'memory' controller support : PASS
2022-01-25 14:42:39 +00:00
QEMU: Checking for cgroup 'devices' controller support : WARN[^1] (Enable 'devices' in kernel Kconfig file or mount/enable cgroup controller in your system)
2021-11-27 11:19:27 +00:00
QEMU: Checking for cgroup 'blkio' controller support : PASS
QEMU: Checking for device assignment IOMMU support : PASS
QEMU: Checking if IOMMU is enabled by kernel : PASS
```
2022-01-25 14:42:39 +00:00
[^1]: The warning message for *cgroup devices* can be disregarded, as it won't show up if the `virt-host-validate` command is executed as *root* . [Related discussion ](https://gitlab.com/libvirt/libvirt/-/issues/94 ).
> If `/dev/kvm` is not found, please ensure that your hardware [is indeed compatible](/deploy/prepare#meet-the-requirements) and that hardware-assisted virtualization [has been activated](/deploy/prepare#enable-hardware-assisted-virtualization) in the BIOS/EFI.
2021-11-27 11:19:27 +00:00
{.is-info}
2022-01-25 14:42:39 +00:00
## Specific checkup
### Hardware-assisted virtualization (1st gen)
* For Intel CPUs, you can use the following more specific command to check whether *hardware virtualization* is activated:
2021-11-27 11:19:27 +00:00
```
2021-11-27 15:27:17 +00:00
cat /proc/cpuinfo | grep vmx
2021-11-27 11:19:27 +00:00
```
2022-01-25 14:42:39 +00:00
* For AMD CPUs, the following command can be used:
2021-11-27 15:27:17 +00:00
```
cat /proc/cpuinfo | grep svm
```
2021-11-27 11:19:27 +00:00
* Look for `svm` for AMD-based processors, or `vmx` for Intel-based processors.
```
2021-11-27 15:27:17 +00:00
[groot@phyllome ~]$ cat /proc/cpuinfo | grep svm
2021-11-27 11:19:27 +00:00
flags : fpu vme de [...] svm [...] sme sev sev_es
```
2022-01-25 14:42:39 +00:00
### Hardware-assisted virtualization (2st gen, IOMMU-based)
2021-11-27 11:19:27 +00:00
2022-01-25 14:42:39 +00:00
Your computer may be compatible with advanced hardware virtualization features (*AMD Vi* or Intel *VT-d* ).
2021-11-27 11:38:02 +00:00
2022-01-25 14:42:39 +00:00
* Check the presence of IOMMU-based hardware-assisted virtualization using the following command, courtesy of the [Archlinux wiki ](https://wiki.archlinux.org/title/PCI_passthrough_via_OVMF#Enabling_IOMMU ).
2021-11-27 11:38:02 +00:00
```
dmesg | grep -i -e DMAR -e IOMMU
```
2022-01-25 14:42:39 +00:00
* Make sure the result looks like this:
2021-11-27 11:38:02 +00:00
```
[ 0.600228] iommu: Default domain type: Translated
[ 0.624416] pci 0000:00:00.2: AMD-Vi: IOMMU performance counters supported
[ 0.624444] pci 0000:00:01.0: Adding to iommu group 0
[...]
[ 0.624690] pci 0000:0b:00.4: Adding to iommu group 15
[ 0.627236] pci 0000:00:00.2: AMD-Vi: Found IOMMU cap 0x40
[ 0.627987] perf/amd_iommu: Detected AMD IOMMU #0 (2 banks, 4 counters/bank).
```
2022-01-25 14:42:39 +00:00
* You may also want to learn how well isolated your devices are. To do so, use the following script, courtesy of the [Archlinux wiki ](https://wiki.archlinux.org/title/PCI_passthrough_via_OVMF#Ensuring_that_the_groups_are_valid ):
2021-11-27 11:38:02 +00:00
```
#!/bin/bash
shopt -s nullglob
for g in `find /sys/kernel/iommu_groups/* -maxdepth 0 -type d | sort -V` ; do
echo "IOMMU Group ${g##*/}:"
for d in $g/devices/*; do
echo -e "\t$(lspci -nns ${d##*/})"
done;
done;
```
2022-01-25 14:42:39 +00:00
* In the following case, devices are rather poorly isolated. The use of the ACS override patch may be warranted (more on that later).
2021-11-27 11:38:02 +00:00
```
IOMMU Group 0:
[...]
01:00.0 Non-Volatile memory controller [0108]: Intel Corporation SSD 660P Series [8086:f1a8] (rev 03)
02:00.0 USB controller [0c03]: Advanced Micro Devices, Inc. [AMD] Device [1022:43ee]
02:00.1 SATA controller [0106]: Advanced Micro Devices, Inc. [AMD] Device [1022:43eb]
[...]
04:00.0 VGA compatible controller [0300]: NVIDIA Corporation GM107 [GeForce GTX 750] [10de:1381] (rev a2)
04:00.1 Audio device [0403]: NVIDIA Corporation GM107 High Definition Audio Controller [GeForce 940MX] [10de:0fbc] (rev a1)
07:00.0 Ethernet controller [0200]: Realtek Semiconductor Co., Ltd. RTL8125 2.5GbE Controller [10ec:8125] (rev 05)
IOMMU Group 1:
[...]
09:00.0 VGA compatible controller [0300]: NVIDIA Corporation GM204 [GeForce GTX 970] [10de:13c2] (rev a1)
09:00.1 Audio device [0403]: NVIDIA Corporation GM204 High Definition Audio Controller [10de:0fbb] (rev a1)
[...]
IOMMU Group 14:
0b:00.3 USB controller [0c03]: Advanced Micro Devices, Inc. [AMD] Matisse USB 3.0 Host Controller [1022:149c]
IOMMU Group 15:
0b:00.4 Audio device [0403]: Advanced Micro Devices, Inc. [AMD] Starship/Matisse HD Audio Controller [1022:1487]
```
2021-11-27 11:40:15 +00:00
2022-01-25 14:42:39 +00:00
---
*[**Go to parent page**](/gofurther/)*