Hey there, It’s time to talk about virtualization again. Almost 3 years after my initial attempts at squashing my vidya into a VM, I figured that a follow-up post is more than overdue.

Enjoy this little writeup of last-week’s hardware woes and software headaches c:


Before we start: This is not a tutorial.
If you want to build a VM yourself, here are some helpful links.


My setup changed quite a bit since my last post.
Here’s what I currently use, screenfetch-style.

OS:  Artix Linux, Kernel 5.1.4
CPU: AMD Ryzen 7 2700X (8c/16t) @ 4GHz
GPU: AMD Radeon RX Vega 64 (Guest)
GPU: NVIDIA GeForce GTX 1060 (Host)
RAM: 32GB (16GB Guest, 16GB Host)


I really just did the usual steps here.

Blacklisted my Vega using vfio-pci:

# /etc/modprobe.d/vfio.conf
options vfio-pci ids=1002:687f,1002:aaf8

Enabled AVIC and nested page tables:

# /etc/modprobe.d/kvm.conf
options kvm_amd nested=1 avic=1

And finally added some new kernel params:

amd_iommu=on iommu=pt

The VM

This time I decided to use a more “manual” approach.
I ditched libvirt and wrote a simple script that launches QEMU.

You can see the whole thing at, but I’ll also walk you through some of the more important content here.

In order of the file:

echo performance | sudo tee /sys/devices/system/cpu/cpu*/...

The VM can’t control the CPU clock, so we need to ensure
that Linux doesn’t underestimate our workload.

echo 1 | sudo tee /sys/bus/pci/...

This is a workaround for Vega. More on that later.


Allow closing the terminal without killing the VM

-machine pc-q35-4.0,accel=kvm,...

The guest uses an AMD GPU so we don’t need to lie to Windows about the VM.
Yay team red!

-name ...,debug-threads=on

debug-threads is important because we’ll need it later for manual CPU pinning.

-cpu ...

+topoext is required to use SMT/HT on AMD.

host-cache-info=on will pass the CPU’s cache topology instead of emulating something.

hv_* are the usual “HyperV Enlightenments”.

-smp 8,sockets=1,cores=4,threads=2

This sets the CPU core topology.
The Ryzen has 8 cores and 16 threads.
I decided to pass half of it to windows.

Usually people use more cores with threads=1, but here’s the thing with Ryzen:
The R7 consists of two “CCX” which both house 4 cores and have their own cache.
They are glued together with “Infinity Fabric” and can exchange data at roughly 40GB/s.
So it makes sense to pass one complete CCX and expose it’s SMT topology to increase cache locality.

Or in a simple picture (Blue Host, Green VM):

-m 16G ... -mem-path /hugepages/...

Memory allocations are an important topic to think about. This ensures that QEMU utilizes memory that was allocated in contiguous 1GB blocks at boot time, instead of falling back to the default (possibly fragmented) 4KB pages.

The kernel params for this are:

default_hugepagesz=1G hugepagesz=1G hugepages=16

Then mount them with:

hugetlbfs /hugepages hugetlbfs defaults 0 0

This permanently locks 16G away, but the remaining 16G are more than enough for the host.

-audiodev id=pa,driver=pa,server=...

This is simply the modern replacement for QEMU_AUDIO_DRV and QEMU_PA_SERVER.

-device ioh3420,id=root,...

This adds a PCI “root port” that the GPU attaches to. Otherwise it will seem to windows like the GPU was connected directly to the root bus, which will cause QEMU to change the emulated configuration to “Integrated Endpoint”.

This means it looks to Windows like the GPU was physically inside the PCIe controller, and (more importantly) in this mode QEMU will omit any link speed configuration.

So TLDR, without this your GPU will likely run much slower.
Not just “slightly slow”. We’re talking PCIe x1 vs x16.

-object input-linux,...,evdev=

Passes keyboard and mouse via PS/2 using evdev.
This allows switching between Guest/Host on the fly by pressing LCtrl-RCtrl.

-device virtio-{mouse,keyboard}-pci,...

Passes the keyboard and mouse using VirtIO.
Automatically takes priority over PS/2 in the guest.

This still uses evdev events but omits a lot of emulation overhead,
and - subjectively - works a lot better and perfectly stutter-free in games.


CPU Pinning

Ok so with the VM up and running, let’s talk about CPU pinning.
In libvirt that’s rather easy, but it’s also doable manually.

Remeber debug-threads?
That flag adds some pretty useful information to QEMU’s comm,
which makes spotting the virtualized CPUs very easy:

for p in $(pstree -pa $(pidof qemu-system-x86_64) | awk -F',' '{print $2}' | awk '{print $1}'); do
    vcpu="$(cat /proc/$p/comm)"

    if [[ "$vcpu" != CPU*/KVM ]]; then

    # pin $p here

In that loop we can use taskset and/or cgroups to assign the “cpu process” to a fixed CPU.

Make sure to pin the CPUs in the correct order.
For a Ryzen 7 this means:

0=>4, 1=>12, 2=>5, 3=>13, 4=>6, 5=>14, 6=>7, 7=>15 (guest=>host)

Not doing this will mix the two CCX’s and cause a lot of lags and generally degraded performance.

Additionally, I isolated the VM CPUs from the rest of the system using kernel params.
This ensures that linux doesn’t consider putting any tasks on these cores, to reduce context switches.

isolcpus=4-7,12-15 nohz_full=4-7,12-15 rcu_nocbs=4-7,12-15

You could theoretically also move any and all host-pids into a “host” cgroup which only has access to the other 8 cores. This would allow you to utilize all 16 threads when the vm is off, but it’s (imo) a lot more complicated, and I don’t really need more than 4c/8t on linux anyway.

Tip: To diagnose context switch problems use

perf record -e 'sched:sched_switch' -C 4-7,12-15

(Obviously, adapt the -C param to your system).

VEGA Sadness

VEGA has something called the “reset issue” where it cannot be used anymore after the VM shuts down or reboots, until the host power-cycles or goes into standby.

One workaround that works for me is to only passthrough the GPU “function”, and leave the sound device unmapped. That will print some QEMU warnings during startup but generally lasts for at least 6-10 VM resets without any noticable side-effects.

This however required the /remove and /rescan “patch” on my system.
Otherwise the host would eventually lock up.
Don’t ask me why, I don’t have an answer yet.

I’ll do a follow-up post if I ever find out how to get this working cleanly.


It works well. Pretty well.

Time Spy reports a graphics score of 7151. (
Guru3D scored 7.5k with the exact same GPU model (not overclocked),
which means the VM is running at roughly 96% bare-metal GPU performance.

The CPU score reaches 4336.
Other Ryzen 7 benchmarks usually score ~90% higher, which is expected
when you consider that only half the cores are passed.

To finish up, here’s a final pic of Linux running Windows running CoD Zombies :)