From nobody Wed Apr 26 20:14:51 2023 X-Original-To: freebsd-questions@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Q698x32YMz47F1l; Wed, 26 Apr 2023 20:15:29 +0000 (UTC) (envelope-from yan.jurak@gmail.com) Received: from mail-yw1-x1136.google.com (mail-yw1-x1136.google.com [IPv6:2607:f8b0:4864:20::1136]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1D4" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Q698x17pFz4HgY; Wed, 26 Apr 2023 20:15:29 +0000 (UTC) (envelope-from yan.jurak@gmail.com) Authentication-Results: mx1.freebsd.org; none Received: by mail-yw1-x1136.google.com with SMTP id 00721157ae682-552a6357d02so90896027b3.3; Wed, 26 Apr 2023 13:15:29 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20221208; t=1682540127; x=1685132127; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=algCmAINWag0dzmF8Zf6ElVhU7t5CVvodIU2FaYvXGA=; b=XZrvY2fpVVWRqtzWynRCTWSVjWSmN2LZm41GwZnwm0k03XjaYO3WbuTeGcDriF8lS1 vpuAuiB4buJ36UI3Do+vISn2F4mwEk8nXMRbg5UabIdwqKM1R4LdJNtab+RzqRWrFCF2 cSmPrR0bCgpvzY+Nc1H3uhUkyaOn1z+V32RXBqQW9cUw2CqK0fYmkkb3l9JWiidbwCiZ yTgdGg6LnNJuGi6iFdVDd7w3nexkmpxFHhxQz+G5BN09PPISHU1vUICfv6ADDcvJnM0E fE6gj8omIGyo+nDF+LsAYtp/CDdkbNwCynymx6Y7btGFCS+0lGisOuRjZTuNjSZPNxmB L5Pg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1682540127; x=1685132127; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=algCmAINWag0dzmF8Zf6ElVhU7t5CVvodIU2FaYvXGA=; b=SnlAgq8NEkz5cIxv0V7C4keFFTDIwiLqjQ8bNOet9j4CfLszHqSHfWEPiGulZnFoS4 nWmGAJlewxU4EW9V/IVo1/UKJ79D0lMdzlYnZ0EqNr8lEuwjKSVCXhg9KfdeYzQ5tsnq R83kwoC3yFJWUyQ3bAszU1+cAlPcpKhxlojssPkkO/gc//ziToBE1IbLHorP5rVJcbrk /fgs6W2qqDtuaKHkVZ4StlChD8HZ6wMLxfqAeOOb6jrA+wjjCMZN2SqtNKhcriv32+Gg EJeIqzfBoFraUKi12HidHBFrCOjksWlTjh0npXU9Ax7t/FpBlJMaHQeEBsbS0p0yozgl FkOg== X-Gm-Message-State: AC+VfDxSGI9qS2jOG9qYjnFwDwmIXtsccC2XwmL2lyxU51pxdCij5qxG gQ7ee+265555yZNV11M+jbyWPgqwNSfpjrJzLlI= X-Google-Smtp-Source: ACHHUZ5EONSFlSht1aH+Y02GTmaf4iSJe6WGwSirfC8MA/HDLSY6iAmTmeANV4I44WzPpApkKfwlB9RYfzq0V7Wwy1Q= X-Received: by 2002:a81:5c88:0:b0:556:dd10:94bf with SMTP id q130-20020a815c88000000b00556dd1094bfmr2179541ywb.20.1682540127281; Wed, 26 Apr 2023 13:15:27 -0700 (PDT) List-Id: User questions List-Archive: https://lists.freebsd.org/archives/freebsd-questions List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-questions@freebsd.org X-BeenThere: freebsd-questions@freebsd.org MIME-Version: 1.0 References: <1033603027.10889563.1682198162191.JavaMail.zimbra@shaw.ca> In-Reply-To: From: =?UTF-8?Q?Jan_Jur=C3=A1k?= Date: Wed, 26 Apr 2023 22:14:51 +0200 Message-ID: Subject: Re: embedded emulation: bhyve + vt-x on amd fx-8320 To: Tomek CEDRO Cc: Gregory Byshenk , FreeBSD Questions Mailing List , freebsd-emulation@freebsd.org Content-Type: multipart/alternative; boundary="0000000000009b674605fa42e6b1" X-Rspamd-Queue-Id: 4Q698x17pFz4HgY X-Spamd-Bar: ---- X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; TAGGED_FROM(0.00)[] X-Rspamd-Pre-Result: action=no action; module=replies; Message is reply to one we originated X-ThisMailContainsUnwantedMimeParts: N --0000000000009b674605fa42e6b1 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable hi, answer as usually late, but you can check procesor virtualisation flags with command: For Linux:egrep -wo 'vmx|ept|vpid|npt|tpr_shadow|flexpriority|vnmi|lm|aes' /proc/cpuinfo | sort | uniq; egrep -wo 'vmx|lm|aes' /proc/cpuinfo | sort | uniq | sed -e 's/aes/Hardware encryption=3DYes (&)/g' -e 's/lm/64 bit cpu=3DYes (&)/g' -e 's/vmx/Intel hardware virtualization=3DYes (&)/g'aeseptflexprioritylmtpr_shadowvmxvnmivpidHardware encryption=3DYes (aes)64 bit cpu=3DYes (lm)Intel hardware virtualization=3DYes (vmx)On Freebsd:egrep -woi 'vmx|ept|vpid|npt|tpr_shadow|flexpriority|vnmi|lm|aes' /var/run/dmesg.boot | sort | uniq; egrep -woi 'vmx|lm|aes' /var/run/dmesg.boot | sort | uniqAESEPTLMVMXVPIDAESLMVMX this is for intel, amd has it's own implementation for bot. Basically *VMX* is minimum, the extended page support - *EPT *is second most important not minimum but most modern hypervisors like bhyve also need this one. i believe for amd you are looking for *AMD-v* *SVM *but rather verify if correct acronyms. i believe Many Regards Jan Jur=C3=A1k On Wed, Apr 26, 2023 at 7:52=E2=80=AFPM Tomek CEDRO wrot= e: > On Wed, Apr 26, 2023 at 4:56=E2=80=AFPM Gregory Byshenk wrote: > > On Mon, Apr 24, 2023 at 11:53:02AM +0200, Tomek CEDRO wrote: > > > Thanks Pete, this is my main question if bhyve / vbox / kernel > > > supports it at all :-) > > > > From my experience it does. > > Some time back I upgraded the CPUs on an HP Z800 because the > > original ones did not support VT-D. Then I had to enable that > > in the BIOS. > > But afterwards I was able to run a rancher cluster under bhyve > > to play with. it was only a toy, but it worked. > > Thank you Greg. I see no Virtualization settings in my BIOS. Probably > the hardware is too old for that and need an upgrade after 10 years > :-) Thank you for the confirmation! :-) > > -- > CeDeROM, SQ7MHZ, http://www.tomek.cedro.info > > --0000000000009b674605fa42e6b1 Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
hi,

answer as usually late, but you can che= ck procesor virtualisation flags with command:
For Linux:

egrep -wo 'vmx|ept|vpid|npt|tpr_shadow|flexpriority|vnmi|lm|aes' /proc/cpuinfo  | sort | uniq; egrep -wo 'vmx|lm|aes' /proc/cpuinfo | sort | uniq | sed -e 's/aes/Hardware encryption=3DYes (&)/g' -=
e 's/lm/64 bit cpu=3DYes =
(&)/g'<=
/span> -e 's/vmx/Intel hardware virtualization=3DYes (&)<=
/span>/g'

aes
ept
flexpriority
lm
tpr_shadow
vmx
vnmi
vpid
Hardware encryption=3DYes (=
aes)<=
/span>
64 bit cpu=3DYes (lm)
Intel hardware virtualization=3DYes (vmx)


On Freebsd:

egrep -woi 'vmx|ept|vpid|npt|tpr_shadow|flexpriority|vnmi|lm|aes' /var/run/dmesg.bo=
ot | sort | =
uniq; egrep -woi 'vmx|lm|aes' /var/run/dmesg.boot | sort | un=
iq

AES
EPT
LM
VMX
VPID
AES
LM
VMX

this is for in= tel, amd has it's own implementation for bot. Basically VMX is m= inimum, the extended page support - EPT is second most important not= minimum but most modern hypervisors like bhyve also need this one.
i believe for amd you are looking for AMD-v SVM but r= ather verify if correct acronyms.

i believe
Many Regards
Jan Jur=C3=A1k


On Wed, Apr 26, 2023 at 7:52=E2=80=AFPM Tomek CEDRO <tomek@cedro.info> wrote:
<= blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-l= eft:1px solid rgb(204,204,204);padding-left:1ex">On Wed, Apr 26, 2023 at 4:= 56=E2=80=AFPM Gregory Byshenk=C2=A0 wrote:
> On Mon, Apr 24, 2023 at 11:53:02AM +0200, Tomek CEDRO wrote:
> > Thanks Pete, this is my main question if bhyve / vbox / kernel > > supports it at all :-)
>
> From my experience it does.
> Some time back I upgraded the CPUs on an HP Z800 because the
> original ones did not support VT-D. Then I had to enable that
> in the BIOS.
> But afterwards I was able to run a rancher cluster under bhyve
> to play with. it was only a toy, but it worked.

Thank you Greg. I see no Virtualization settings in my BIOS. Probably
the hardware is too old for that and need an upgrade after 10 years
:-) Thank you for the confirmation! :-)

--
CeDeROM, SQ7MHZ, http://www.tomek.cedro.info

--0000000000009b674605fa42e6b1--