On Sun, May 12, 2013 at 04:48:28PM +0300, Abel Gordon wrote:
>
>
> Kashyap Chamarthy <[email protected]> wrote on 12/05/2013 04:06:40 PM:
>
>
> > > Note shadow vmcs is disabled unless you have a processor
> > > that supports this feature. Do you ?!
> >
> > Yes, I noted this in my previous email. I'm using Intel Haswell.
> >
> > Here's the info from MSR bits on the machine(From `Table 35-3`, MSRs
> > in Procesors Based on Intel Core Microarchitecture, `Volume 3C of the
> > SDM )
> > --------------------------------------------
> > # Read msr value
> > $ rdmsr 0x48B
> > 7cff00000000
> >
> > # Check Shadow VMCS is enabled:
> > $ rdmsr 0x00000485
> > 300481e5
> > --------------------------------------------
> >
> > And, on the Kernel command line:
> > --------------------------------------------
> > # nested
> > $ cat /sys/module/kvm_intel/parameters/nested
> > Y
> >
> > # shadow VMCS
> > $ cat /sys/module/kvm_intel/parameters/enable_shadow_vmcs
> > Y
> > --------------------------------------------
>
> Yep, shadow-vmcs enabled :)
>
>
> > Just for reference, here's the detailed procedure I noted while
> > testing it on Haswell --
> > https://raw.github.com/kashyapc/nvmx-haswell/master/SETUP-nVMX.rst
> >
> > Also note you can disable
> > > shadow-vmcs using the kvm-intel kernel module parameter
> > > "enable_shadow_vmcs".
> >
> > Yes, to test w/o shadow VMCS, I disabled it by adding "options
> > kvm-intel enable_shadow_vmcs=y" to /etc/modprobe.d/dist.conf & reboot
> > the host.
>
> I assume you meant enable_shadow_vmcs=n :)
>
> Small question: did you try to disable apicv/posted interrupts at L0 ?
> (for L1 you can't enable these features because they are not emulated)
>
AFAIK Haswell does not have apicv/posted interrupts. Not the one I have
access to anyway.
--
Gleb.
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html