Kashyap Chamarthy <kashyap...@gmail.com> wrote on 12/05/2013 04:06:40 PM:


> > Note shadow vmcs is disabled unless you have a processor
> > that supports this feature. Do you ?!
>
> Yes, I noted this in my previous email. I'm using Intel Haswell.
>
> Here's the info from MSR bits on the machine(From `Table 35-3`, MSRs
> in Procesors Based on Intel Core Microarchitecture, `Volume 3C of the
> SDM )
> --------------------------------------------
>     # Read msr value
>     $ rdmsr 0x48B
>     7cff00000000
>
>     # Check Shadow VMCS is enabled:
>     $ rdmsr 0x00000485
>     300481e5
> --------------------------------------------
>
> And, on the Kernel command line:
> --------------------------------------------
>     # nested
>     $ cat /sys/module/kvm_intel/parameters/nested
>     Y
>
>     # shadow VMCS
>     $ cat /sys/module/kvm_intel/parameters/enable_shadow_vmcs
>     Y
> --------------------------------------------

Yep, shadow-vmcs enabled :)


> Just for reference, here's the detailed procedure I noted  while
> testing it on Haswell --
> https://raw.github.com/kashyapc/nvmx-haswell/master/SETUP-nVMX.rst
>
> Also note you can disable
> > shadow-vmcs using the kvm-intel kernel module parameter
> > "enable_shadow_vmcs".
>
> Yes, to test w/o shadow VMCS, I disabled it by adding "options
> kvm-intel enable_shadow_vmcs=y" to /etc/modprobe.d/dist.conf & reboot
> the host.

I assume you meant enable_shadow_vmcs=n :)

Small question: did you try to disable apicv/posted interrupts at L0 ?
(for L1 you can't enable these features because they are not emulated)




--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to