Roman Kagan writes:
> On Wed, Feb 28, 2018 at 02:43:59PM +0100, Vitaly Kuznetsov wrote:
>> Nested Hyper-V/Windows guest running on top of KVM will use TSC page
>> clocksource in two cases:
>> - L0 exposes invariant TSC (CPUID.8007H:EDX[8]).
>> - L0 provides Hyper-V Reenlightenment support (CP
On Wed, Feb 28, 2018 at 02:43:59PM +0100, Vitaly Kuznetsov wrote:
> Nested Hyper-V/Windows guest running on top of KVM will use TSC page
> clocksource in two cases:
> - L0 exposes invariant TSC (CPUID.8007H:EDX[8]).
> - L0 provides Hyper-V Reenlightenment support (CPUID.4003H:EAX[13]).
>
>
Nested Hyper-V/Windows guest running on top of KVM will use TSC page
clocksource in two cases:
- L0 exposes invariant TSC (CPUID.8007H:EDX[8]).
- L0 provides Hyper-V Reenlightenment support (CPUID.4003H:EAX[13]).
Exposing invariant TSC effectively blocks migration to hosts with different
T
3 matches
Mail list logo