Avi, We have addressed all of the comments, please apply. The following patches implement nested VMX support. The patches enable a guest to use the VMX APIs in order to run its own nested guest (i.e., enable running other hypervisors which use VMX under KVM). The current patches support running Linux under a nested KVM using shadow page table (with bypass_guest_pf disabled). Reworking EPT support to mesh cleanly with the current shadow paging design per Avi's comments is a work-in-progress. The current patches support multiple nested hypervisors, which can run multiple guests. Only 64-bit nested hypervisors are supported. SMP is supported. Additional patches for running Windows under nested KVM, and Linux under nested VMware server, are currently running in the lab, and will be sent as a follow-on patchset. This patches were written by: Orit Wasserman, oritw <at> il.ibm.com Ben-Ami Yassor, benami <at> il.ibm.com Abel Gordon, abelg <at> il.ibm.com Muli Ben-Yehuda, muli <at> il.ibm.com With contributions by: Anthony Liguori, aliguori <at> us.ibm.com Mike Day, mdday <at> us.ibm.com This work was inspired by the nested SVM support by Alexander Graf and Joerg Roedel. Changes since v3: Added support for 32-bit nested guests Added support for multiple nested guests Added support for multiple nested hypervisors Implemented VMX instruction decoding Implemented CR0.TS handling for nested -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html