Skip to content
This repository was archived by the owner on Oct 22, 2024. It is now read-only.

QEMU: enhance documentation and check for /dev/kvm #374

Merged
merged 2 commits into from
Dec 5, 2019

Conversation

pohly
Copy link
Contributor

@pohly pohly commented Jul 31, 2019

Not having KVM enabled in a GCE machine is a real issue that a user
ran into. Error handling in this case is poor, GoVM doesn't print any
error and all that the user gets is an error about timing out waiting
for ssh.

The updated README.md explains the real requirements better and warns
about this pitfall. The script itself checks very early for /dev/kvm
and bails out with an error message when it is missing.

@pohly pohly requested a review from avalluri July 31, 2019 15:15
section in the Clear Linux documentation contains further information
about enabling KVM.
KVM must be enabled. Usually this is the case when `/dev/kvm` exists.
The current user does not need the privileges to use KVM and QEMU
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nitpick question, do we need to decide to use does not or doesn't and stick to it trough the md documents? or does not matter that much?
It came to my attention because in this line does not is used and the next one is doesn't
(And I think this will apply for do not and don't too and all the shorter version of ENG words)

@pohly
Copy link
Contributor Author

pohly commented Aug 6, 2019 via email

@pohly pohly changed the title QEMU: enhance documentation and check for /dev/kvm WIP: QEMU: enhance documentation and check for /dev/kvm Aug 6, 2019
@pohly
Copy link
Contributor Author

pohly commented Aug 6, 2019

Don't merge, the /dev/kvm check actually fails in the CI machines. I lost access to those, so I don't know yet why that is.

@pohly pohly force-pushed the kvm-error-handline branch from ad3062d to b1dc655 Compare November 18, 2019 11:25
@pohly pohly force-pushed the kvm-error-handline branch from b1dc655 to 6230570 Compare November 29, 2019 15:21
@pohly
Copy link
Contributor Author

pohly commented Nov 29, 2019

I'm still not sure why the /dev/kvm check failed. I just looked at a running CI worker and the device was there. Let's try again after rebasing.

I also added a commit which enables nested virtualization. It's a small additional change that touches the same documentation section; I didn't want to create another conflicting PR for that.

@pohly pohly force-pushed the kvm-error-handline branch from 6230570 to 9a63ca2 Compare November 29, 2019 15:30
@pohly pohly changed the title WIP: QEMU: enhance documentation and check for /dev/kvm QEMU: enhance documentation and check for /dev/kvm Nov 29, 2019
@pohly
Copy link
Contributor Author

pohly commented Nov 29, 2019

@avalluri please also check the second commit.

@pohly
Copy link
Contributor Author

pohly commented Dec 4, 2019

@avalluri: ping? We currently have clean test results.

Copy link
Contributor

@avalluri avalluri left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@pohly somehow ReadME section (Automated testing) links got broken with this change. Can you please fix that.

Not having KVM enabled in a GCE machine is a real issue that a user
ran into. Error handling in this case is poor, GoVM doesn't print any
error and all that the user gets is an error about timing out waiting
for ssh.

The updated README.md explains the real requirements better and warns
about this pitfall. The script itself checks very early for /dev/kvm
and bails out with an error message when it is missing.
@pohly pohly force-pushed the kvm-error-handline branch from 9a63ca2 to 2a9b234 Compare December 5, 2019 09:16
@pohly
Copy link
Contributor Author

pohly commented Dec 5, 2019

somehow ReadME section (Automated testing) links got broken with this change. Can you please fix that.

It was broken on "devel" by an an earlier PR (#473) and has already been fixed there by #481. This change here is fine, it was just based on that broken revision of "devel".

I rebased, so now "view file" shows a clean version.

README.md Outdated
this time, Kata Containers up to and including 1.9.1 is [not
compatible with
PMEM-CSI](https://github.com/intel/pmem-csi/issues/303) because
volumes are not passed in as PMEM, but it [can be
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

but it can be installed...

I am not clear what exactly 'it' refers to in this sentence? Can you please check if any rephrase required or just my in-ablity to understand :-}

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

it = kata containers. I'll replace the "it".

Nested virtualization is needed for Kata Containers. This works on
hosts which have kvm_intel loaded with nested=1. Might also need a
recent enough host CPU.
@pohly pohly force-pushed the kvm-error-handline branch from 2a9b234 to 7f0f6ab Compare December 5, 2019 13:10
Copy link
Contributor

@avalluri avalluri left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good to me.

@pohly pohly merged commit 1ead73a into intel:devel Dec 5, 2019
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants