-
Notifications
You must be signed in to change notification settings - Fork 373
Do not require nested vt #820
Comments
We do not really require nested VT to run kata containers. Let's not depend on it being there. Fixes: kata-containers#820 Signed-off-by: Peng Tao <[email protected]>
We do not really require nested VT to run kata containers. Let's not depend on it being there. Fixes: kata-containers#820 Signed-off-by: Peng Tao <[email protected]>
We do not really require nested VT to run kata containers. Let's not depend on it being there. Fixes: kata-containers#820 Signed-off-by: Peng Tao <[email protected]>
Well, after trying a bit in #819, it turns out the CI machines might simply be missing vmx support sometimes.
And sometimes it has vmx but misses nested vt:
While other times, it has vmx but misses vhost/vhost-net kernel modules.
#819 should be able to handle the missing nested vt case. But for the missing vmx case, we have to fail. So, to solve the recent CI failures, I think we should:
@jcvenegas @grahamwhaley do we have control over the two things? |
@bergwolf - we don't have the ability, no. afaik, the bottom line on vexxhost is that the kata CI is configured to run only on machines in a certain domain (cluster?), and that should have nesting enabled for all the machines. Not all machines across the whole of vexxhost support nesting you see, so our CI should be pinned to the cluster that does.... @mnaser knows the real details, and has the ability to debug and set up the config etc. @mnaser - can you help here, or are you able to assign somebody else to help? This is really impacting our CI right now. thanks! |
@grahamwhaley I think there are three things we want to look at right now:
|
We do. That's why I think the problem is the host kernel doesn't have vhost/vhost-net modules in the following error.
|
We do not really require nested vt to run kata containers. And we do not enable
CONFIG_KVM
in the shipped guest kernel either. So there is little point to check and failkata-check
when nested vt is not present.Let's remove this dependency and see if it fixes recent CI failures. Some IaaS cloud vendors might decide not to provide nested vt capability to users and remove the corresponding code from kvm-intel kernel module, -- which might be the case we see in recent CI failures, kvm-intel kernel module is there but its
nested
parameter is missing, e.g.,The text was updated successfully, but these errors were encountered: