Bug 512843
Summary: | Configuration for kvm modules loading | ||||||||
---|---|---|---|---|---|---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Jean-Francois Saucier <jsaucier> | ||||||
Component: | kvm | Assignee: | Glauber Costa <gcosta> | ||||||
Status: | CLOSED DUPLICATE | QA Contact: | Fedora Extras Quality Assurance <extras-qa> | ||||||
Severity: | low | Docs Contact: | |||||||
Priority: | low | ||||||||
Version: | 11 | CC: | berrange, clalance, ehabkost, gcosta, markmc, virt-maint | ||||||
Target Milestone: | --- | ||||||||
Target Release: | --- | ||||||||
Hardware: | All | ||||||||
OS: | Linux | ||||||||
Whiteboard: | |||||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||||
Doc Text: | Story Points: | --- | |||||||
Clone Of: | Environment: | ||||||||
Last Closed: | 2009-08-07 15:00:48 UTC | Type: | --- | ||||||
Regression: | --- | Mount Type: | --- | ||||||
Documentation: | --- | CRM: | |||||||
Verified Versions: | Category: | --- | |||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||
Embargoed: | |||||||||
Attachments: |
|
Description
Jean-Francois Saucier
2009-07-20 22:58:00 UTC
Created attachment 354402 [details]
kvm configuration file
Created attachment 354403 [details]
kvm script to load modules
Although I'm sympathetic to your request, I don't see the need for creating another file just for that. what do you think about this: kvm.modules: KVM_ENABLE=1 if [ $KVM_ENABLE -eq 0 ]; then exit 0 fi if [ $(grep -c vmx /proc/cpuinfo) -ne 0 ]; then modprobe kvm-intel >/dev/null 2>&1 fi if [ $(grep -c svm /proc/cpuinfo) -ne 0 ]; then modprobe kvm-amd >/dev/null 2>&1 fi I do understand that a configuration file provides a more well defined location for this, but besides this, there is really not to much to configure in kvm, and your case is a special one. This might change in the future, though... IIRC, the latest upstream KVM modules have been changed to not grab the virtualization capability until a guest is actually started. So merely loading the modules should not cause problems. As such I think it is not desirable adding this configuration parameter as a one off for F11. We'd be better to update the kernels to match latest upstream behaviour, which is more useful because it will 'just work(tm)' without requiring the user to know about magic config settings. If the new kvm module behave like Daniel said, it's ok with me, I have no problem with it. I don't mind the module being loaded if it don't grab the virtualization capability. If not, I think the solution Glauber gave is good for this. Adding a configuration file like my previous solution may be a little bit overkill. Thank you for your time. (In reply to comment #5) > If the new kvm module behave like Daniel said, it's ok with me, I have no > problem with it. I don't mind the module being loaded if it don't grab the > virtualization capability. Okay, I'll close this as WORKSFORME, then An alternative workaround is just to remove the qemu-system-x86 package A simple way of supporting this is to use 'modprobe -b' in the kvm.modules script, see bug #517866 *** This bug has been marked as a duplicate of bug 517866 *** |