On Sat, Sep 01, 2007 at 09:42:31PM +0300, Avi Kivity wrote:
> Sander van Leeuwen wrote:
> > Avi,
> >
> > I'd like to make clear that we are talking about the situation where 
> > kvm is *not* being used by any application.
> >
> > It's my understanding that in some (many?) distributions kvm is 
> > actually active on a permanent basis. I can't say whether this was done
> > by default or explicitly by the user. There is however no need to 
> > activate vmx root mode when there is no client program that is using
> > the kvm extension.
> >
> > From your comments I understand that you enable vmx root mode when the 
> > kvm module is loaded. Regardless of whether an application
> > actually wishes to use the kvm extension.
> 
> Yes.  The assumption is that if kvm is loaded, then there is an intent 
> to use it.  This is similar to an ethernet device being claimed by the 
> driver that supports it, even if no application actually uses that 
> network interface.
> 
> We could change kvm to only claim vmx on first use, but that would 
> reduce reliability.
> 
> My position is that:
> - if you with to run something that conflicts with kvm enabling vmx, you 
> should unload kvm, or not load it in the first place.  This is not a 
> difficult operation.
> - if you have an issue with distributions enabling kvm by default, then 
> talk to these distributions.  kvm itself does not enable vmx by default.

So with my distributor / maintainer hat on...

In Fedora we enable KVM kernel modules by default because upstream LKML has
decided that KVM is the standard for exposing hardware virt capabilities from
the kernel to userspace. Asking the user to choose which kernel modules they 
load for virt is not really at all pratical because most users do not have 
the neccessary knowledge to be able to make an informed decision on this 
question. For this reason, in Fedora our general policy is to evaluate the
options provided in the /upstream/ kernel, identify the best driver for any
particular hardware capability & enable it by default. Thus KVM kernel mods
are enabled by default if you install the KVM userspace.

While one could in theory change KVM to only activate VMX when a guest is
started this wouldn't give a significant improvement to the user experiance.
Instead of being able to rely on KVM working, it now may or may not work 
depending on whether you happen to have a VirtualBox guest running or not &
vica-verca. You still would not be able to run guests from both concurrently
which should surely be the real goal. The only way I see the latter being
achieved is if VirtualBox were to leverage the existing KVM kernel APIs to
access the underlying hardware virt capabilities.

Regards,
Dan.
-- 
|=- Red Hat, Engineering, Emerging Technologies, Boston.  +1 978 392 2496 -=|
|=-           Perl modules: http://search.cpan.org/~danberr/              -=|
|=-               Projects: http://freshmeat.net/~danielpb/               -=|
|=-  GnuPG: 7D3B9505   F3C9 553F A1DA 4AC2 5648 23C1 B3DF F742 7D3B 9505  -=| 

-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems?  Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >>  http://get.splunk.com/
_______________________________________________
kvm-devel mailing list
kvm-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/kvm-devel

Reply via email to