27.12.2012 Views

The Virtualization Cookbook for SLES 10 SP2 - z/VM - IBM

The Virtualization Cookbook for SLES 10 SP2 - z/VM - IBM

The Virtualization Cookbook for SLES 10 SP2 - z/VM - IBM

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

0<br />

/sys/devices/system/cpu/cpu9<br />

0<br />

After a few more minutes, all of the CPUs should be activated.<br />

► Kill the processes with the killall command, then verify that the loops have stopped:<br />

# killall cat<br />

bash: line 1: 2450 Terminated cat /dev/zero > /dev/null<br />

bash: line 1: 2452 Terminated cat /dev/zero > /dev/null<br />

bash: line 1: 2451 Terminated cat /dev/zero > /dev/null<br />

bash: line 1: 2457 Terminated cat /dev/zero > /dev/null<br />

bash: line 1: 2456 Terminated cat /dev/zero > /dev/null<br />

[1] Exit 143 bash -c "cat /dev/zero > /dev/null"<br />

[2] Exit 143 bash -c "cat /dev/zero > /dev/null"<br />

...<br />

# pstree -G | grep cat<br />

No output shows that the processes to create a workload have been stopped.<br />

13.7.3 Setting memory sizes with cpuplugd<br />

Memory sizes can also be set by the cpuplugd service. However, unlike CPUs, there is no<br />

good generic default value. <strong>The</strong> following example is in the Device Drivers book:<br />

MEMPLUG = "swaprate > freemem+<strong>10</strong> & freemem+<strong>10</strong> < apcr"<br />

MEMUNPLUG = "swaprate > freemem + <strong>10</strong>000"<br />

However, this is just a starting point to explain the syntactical structure of a rule. Do not use<br />

this configuration in production. You should test any setting that you want to implement<br />

against a representative workload that your Linux systems will be running. Details are beyond<br />

the scope of this section.<br />

13.8 Hardware cryptographic support <strong>for</strong> OpenSSH<br />

This section shows how to copy a test file with OpenSSH, first without any crypto<br />

acceleration. <strong>The</strong>n crypto acceleration <strong>for</strong> OpenSSH is enabled and the same file is copied<br />

again. A much higher throughput rate should be observed. <strong>The</strong> prerequisite <strong>for</strong> using<br />

hardware cryptography is to have a firmware level of LIC 3863 installed on your System z<br />

CEC. (TODO: how to query this?)<br />

This section is based on the white paper First experiences with hardware cryptographic<br />

support <strong>for</strong> OpenSSH with Linux <strong>for</strong> System z, by Manfred Gnirss, Winfried Münch, Klaus<br />

Werner and Arthur Winterling. It is on the Web at:<br />

http://www-03.ibm.com/support/techdocs/atsmastr.nsf/WebIndex/WP<strong>10</strong>1690<br />

This section only shows a single example of crypto acceleration. For a much more complete<br />

and detailed analysis, see the white paper.<br />

To test copying a file with and without cryptographic acceleration, per<strong>for</strong>m the following steps:<br />

► Start an SSH session to a Linux.<br />

► Create a 200 MB test file <strong>for</strong> copying in the /tmp/ directory:<br />

# cd /tmp<br />

# dd if=/dev/zero of=testdata.txt bs=<strong>10</strong>48576 count=200<br />

200+0 records in<br />

Chapter 13. Miscellaneous recipes 213

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!