/openbmc/linux/Documentation/virt/kvm/x86/ |
H A D | running-nested-guests.rst | 4 Running nested guests with KVM 7 A nested guest is the ability to run a guest inside another guest (it 15 | (Nested Guest) | | (Nested Guest) | 36 - L2 – level-2 guest; a VM running on L1, this is the "nested guest" 44 resulting in at least four levels in a nested setup — L0 (bare 46 (guest hypervisor), L3 (nested guest). 56 There are several scenarios where nested KVM can be useful, to name a 61 Provider, using nested KVM lets you rent a large enough "guest 63 multiple nested guests (level-2 guests), running different OSes, on 66 - Live migration of "guest hypervisors" and their nested guests, for [all …]
|
H A D | nested-vmx.rst | 4 Nested VMX 15 The "Nested VMX" feature adds this missing capability - of running guest 16 hypervisors (which use VMX) with their own nested guests. It does so by 20 We describe in much greater detail the theory behind the nested VMX feature, 22 "The Turtles Project: Design and Implementation of Nested Virtualization", 32 In nested virtualization, we have three levels: The host (KVM), which we call 33 L0, the guest hypervisor, which we call L1, and its nested guest, which we 37 Running nested VMX 40 The nested VMX feature is enabled by default since Linux kernel v4.20. For 41 older Linux kernel, it can be enabled by giving the "nested=1" option to the [all …]
|
/openbmc/linux/include/uapi/linux/ |
H A D | devlink.h | 298 DEVLINK_ATTR_SELFTEST_RESULT, /* nested */ 419 DEVLINK_ATTR_DPIPE_TABLES, /* nested */ 420 DEVLINK_ATTR_DPIPE_TABLE, /* nested */ 423 DEVLINK_ATTR_DPIPE_TABLE_MATCHES, /* nested */ 424 DEVLINK_ATTR_DPIPE_TABLE_ACTIONS, /* nested */ 427 DEVLINK_ATTR_DPIPE_ENTRIES, /* nested */ 428 DEVLINK_ATTR_DPIPE_ENTRY, /* nested */ 430 DEVLINK_ATTR_DPIPE_ENTRY_MATCH_VALUES, /* nested */ 431 DEVLINK_ATTR_DPIPE_ENTRY_ACTION_VALUES, /* nested */ 434 DEVLINK_ATTR_DPIPE_MATCH, /* nested */ [all …]
|
H A D | if_macsec.h | 45 MACSEC_ATTR_RXSC_CONFIG, /* config, nested macsec_rxsc_attrs */ 46 MACSEC_ATTR_SA_CONFIG, /* config, nested macsec_sa_attrs */ 47 MACSEC_ATTR_SECY, /* dump, nested macsec_secy_attrs */ 48 MACSEC_ATTR_TXSA_LIST, /* dump, nested, macsec_sa_attrs for each TXSA */ 49 MACSEC_ATTR_RXSC_LIST, /* dump, nested, macsec_rxsc_attrs for each RXSC */ 50 MACSEC_ATTR_TXSC_STATS, /* dump, nested, macsec_txsc_stats_attr */ 51 MACSEC_ATTR_SECY_STATS, /* dump, nested, macsec_secy_stats_attr */ 52 MACSEC_ATTR_OFFLOAD, /* config, nested, macsec_offload_attrs */ 83 MACSEC_RXSC_ATTR_SA_LIST, /* dump, nested */ 84 MACSEC_RXSC_ATTR_STATS, /* dump, nested, macsec_rxsc_stats_attr */ [all …]
|
H A D | openvswitch.h | 168 * extracted from the packet as nested %OVS_KEY_ATTR_* attributes. This allows 172 * for %OVS_PACKET_CMD_EXECUTE. It has nested %OVS_ACTION_ATTR_* attributes. 183 * extracted from the packet as nested %OVS_TUNNEL_KEY_ATTR_* attributes. 196 OVS_PACKET_ATTR_KEY, /* Nested OVS_KEY_ATTR_* attributes. */ 197 OVS_PACKET_ATTR_ACTIONS, /* Nested OVS_ACTION_ATTR_* attributes. */ 199 OVS_PACKET_ATTR_EGRESS_TUN_KEY, /* Nested OVS_TUNNEL_KEY_ATTR_* 273 OVS_VPORT_ATTR_OPTIONS, /* nested attributes, varies by vport type */ 340 OVS_KEY_ATTR_ENCAP, /* Nested set of encapsulated attributes. */ 355 OVS_KEY_ATTR_TUNNEL, /* Nested set of ovs_tunnel attributes */ 370 OVS_KEY_ATTR_NSH, /* Nested set of ovs_nsh_key_* */ [all …]
|
H A D | net_dropmon.h | 77 NET_DM_ATTR_IN_PORT, /* nested */ 85 NET_DM_ATTR_STATS, /* nested */ 86 NET_DM_ATTR_HW_STATS, /* nested */ 90 NET_DM_ATTR_HW_ENTRIES, /* nested */ 91 NET_DM_ATTR_HW_ENTRY, /* nested */
|
H A D | ip_vs.h | 342 IPVS_CMD_ATTR_SERVICE, /* nested service attribute */ 343 IPVS_CMD_ATTR_DEST, /* nested destination attribute */ 344 IPVS_CMD_ATTR_DAEMON, /* nested sync daemon attribute */ 356 * Used inside nested attribute IPVS_CMD_ATTR_SERVICE 371 IPVS_SVC_ATTR_STATS, /* nested attribute for service stats */ 375 IPVS_SVC_ATTR_STATS64, /* nested attribute for service stats */ 385 * Used inside nested attribute IPVS_CMD_ATTR_DEST 402 IPVS_DEST_ATTR_STATS, /* nested attribute for dest stats */ 406 IPVS_DEST_ATTR_STATS64, /* nested attribute for dest stats */ 422 * Used inside nested attribute IPVS_CMD_ATTR_DAEMON [all …]
|
H A D | ncsi.h | 55 * @NCSI_ATTR_PACKAGE_LIST: nested array of NCSI_PKG_ATTR attributes 84 * @NCSI_PKG_ATTR: nested array of package attributes 87 * @NCSI_PKG_ATTR_CHANNEL_LIST: nested array of NCSI_CHANNEL_ATTR attributes 105 * @NCSI_CHANNEL_ATTR: nested array of channel attributes 115 * @NCSI_CHANNEL_ATTR_VLAN_LIST: nested array of NCSI_CHANNEL_ATTR_VLAN_IDs
|
/openbmc/linux/Documentation/netlink/specs/ |
H A D | ethtool.yaml | 53 nested-attributes: bitset-bit 66 nested-attributes: bitset-bits 89 nested-attributes: string 103 nested-attributes: strings 111 nested-attributes: stringset 118 nested-attributes: header 122 nested-attributes: stringsets 133 nested-attributes: header 137 nested-attributes: bitset 145 nested-attributes: header [all …]
|
H A D | ovs_flow.yaml | 379 nested-attributes: key-attrs 381 Nested attributes specifying the flow key. Always present in 386 nested-attributes: action-attrs 388 Nested attributes specifying the actions to take for packets that 393 nested attributes must be given. 426 nested-attributes: key-attrs 428 Nested attributes specifying the mask bits for wildcarded flow 468 nested-attributes: key-attrs 529 nested-attributes: tunnel-key-attrs 578 nested-attributes: ovs-nsh-key-attrs [all …]
|
/openbmc/linux/arch/x86/kvm/svm/ |
H A D | nested.c | 44 * TODO: track the cause of the nested page fault, and in nested_svm_inject_npf_exit() 62 u64 cr3 = svm->nested.ctl.nested_cr3; in nested_svm_get_tdp_pdptr() 81 return svm->nested.ctl.nested_cr3; in nested_svm_get_tdp_cr3() 99 svm->nested.ctl.nested_cr3); in nested_svm_init_mmu_context() 120 if (!(svm->nested.ctl.virt_ext & VIRTUAL_VMLOAD_VMSAVE_ENABLE_MASK)) in nested_vmcb_needs_vls_intercept() 139 g = &svm->nested.ctl; in recalc_intercepts() 161 * We want to see VMMCALLs from a nested guest only when Hyper-V L2 TLB in recalc_intercepts() 188 * Merge L0's (KVM) and L1's (Nested VMCB) MSR permission bitmaps. The function 194 struct hv_vmcb_enlightenments *hve = &svm->nested.ctl.hv_enlightenments; in nested_svm_vmrun_msrpm() 200 * - Nested hypervisor (L1) is attempting to launch the same L2 as in nested_svm_vmrun_msrpm() [all …]
|
H A D | hyperv.h | 17 struct hv_vmcb_enlightenments *hve = &svm->nested.ctl.hv_enlightenments; in nested_svm_hv_update_vm_vp_ids() 23 hv_vcpu->nested.pa_page_gpa = hve->partition_assist_page; in nested_svm_hv_update_vm_vp_ids() 24 hv_vcpu->nested.vm_id = hve->hv_vm_id; in nested_svm_hv_update_vm_vp_ids() 25 hv_vcpu->nested.vp_id = hve->hv_vp_id; in nested_svm_hv_update_vm_vp_ids() 31 struct hv_vmcb_enlightenments *hve = &svm->nested.ctl.hv_enlightenments; in nested_svm_l2_tlb_flush_enabled()
|
/openbmc/linux/arch/x86/kvm/vmx/ |
H A D | nested.h | 41 return to_vmx(vcpu)->nested.cached_vmcs12; in get_vmcs12() 46 return to_vmx(vcpu)->nested.cached_shadow_vmcs12; in get_shadow_vmcs12() 51 * in vmx_set_nested_state; if it is satisfied, the nested state must include 59 return vmx->nested.current_vmptr != -1ull || in vmx_has_valid_vmcs12() 60 vmx->nested.hv_evmcs_vmptr != EVMPTR_INVALID; in vmx_has_valid_vmcs12() 67 return vmx->nested.vpid02 ? vmx->nested.vpid02 : vmx->vpid; in nested_get_vpid02() 82 * Return the cr0/4 value that a nested guest would read. This is a combination 100 return vmx_misc_cr3_count(to_vmx(vcpu)->nested.msrs.misc_low); in nested_cpu_vmx_misc_cr3_count() 110 return to_vmx(vcpu)->nested.msrs.misc_low & in nested_cpu_has_vmwrite_any_field() 116 return to_vmx(vcpu)->nested.msrs.misc_low & VMX_MISC_ZERO_LEN_INS; in nested_cpu_has_zero_length_injection() [all …]
|
H A D | nested.c | 13 #include "nested.h" 183 if (to_vmx(vcpu)->nested.hv_evmcs_vmptr != EVMPTR_INVALID) in nested_vmx_failValid() 184 to_vmx(vcpu)->nested.need_vmcs12_to_shadow_sync = true; in nested_vmx_failValid() 197 if (vmx->nested.current_vmptr == INVALID_GPA && in nested_vmx_fail() 198 !evmptr_is_valid(vmx->nested.hv_evmcs_vmptr)) in nested_vmx_fail() 208 pr_debug_ratelimited("nested vmx abort, indicator %d\n", indicator); in nested_vmx_abort() 225 vmx->nested.need_vmcs12_to_shadow_sync = false; in vmx_disable_shadow_vmcs() 233 if (evmptr_is_valid(vmx->nested.hv_evmcs_vmptr)) { in nested_release_evmcs() 234 kvm_vcpu_unmap(vcpu, &vmx->nested.hv_evmcs_map, true); in nested_release_evmcs() 235 vmx->nested.hv_evmcs = NULL; in nested_release_evmcs() [all …]
|
/openbmc/linux/include/uapi/rdma/ |
H A D | rdma_netlink.h | 380 RDMA_NLDEV_ATTR_RES_SUMMARY, /* nested table */ 381 RDMA_NLDEV_ATTR_RES_SUMMARY_ENTRY, /* nested table */ 385 RDMA_NLDEV_ATTR_RES_QP, /* nested table */ 386 RDMA_NLDEV_ATTR_RES_QP_ENTRY, /* nested table */ 425 RDMA_NLDEV_ATTR_RES_CM_ID, /* nested table */ 426 RDMA_NLDEV_ATTR_RES_CM_ID_ENTRY, /* nested table */ 437 RDMA_NLDEV_ATTR_RES_CQ, /* nested table */ 438 RDMA_NLDEV_ATTR_RES_CQ_ENTRY, /* nested table */ 443 RDMA_NLDEV_ATTR_RES_MR, /* nested table */ 444 RDMA_NLDEV_ATTR_RES_MR_ENTRY, /* nested table */ [all …]
|
/openbmc/qemu/tests/unit/ |
H A D | test-nested-aio-poll.c | 3 * Test that poll handlers are not re-entrant in nested aio_poll() 9 * handler calls nested aio_poll() before the condition is reset, then infinite 12 * aio_poll() is supposed to prevent this by disabling poll handlers in nested 28 bool nested; member 50 g_assert(!td->nested); in io_poll_ready() 51 td->nested = true; in io_poll_ready() 53 /* Wake the following nested aio_poll() call */ in io_poll_ready() 56 /* This nested event loop must not call io_poll()/io_poll_ready() */ in io_poll_ready() 59 td->nested = false; in io_poll_ready() 120 g_test_add_func("/nested-aio-poll", test); in main()
|
/openbmc/linux/rust/macros/ |
H A D | zeroable.rs | 23 let mut nested = 0; in derive() localVariable 27 TokenTree::Punct(p) if nested == 0 && p.as_char() == ',' => { in derive() 36 TokenTree::Punct(p) if nested == 0 && p.as_char() == '\'' => { in derive() 40 TokenTree::Punct(p) if nested == 0 && p.as_char() == ':' => { in derive() 48 nested += 1; in derive() 52 assert!(nested > 0); in derive() 53 nested -= 1; in derive() 59 assert_eq!(nested, 0); in derive()
|
/openbmc/phosphor-power/phosphor-regulators/test/ |
H A D | error_logging_utils_tests.cpp | 82 // Log error based on the nested exception in TEST() 100 // Test where exception is not nested in TEST() 122 // Log error based on the nested exception in TEST() 128 // Test where exception is nested in TEST() 157 // Log error based on the nested exception in TEST() 185 // Log error based on the nested exception in TEST() 220 // Log error based on the nested exception in TEST() 256 // Log error based on the nested exception in TEST() 288 // Log error based on the nested exception in TEST() 319 // Log error based on the nested exception in TEST() [all …]
|
/openbmc/phosphor-power/phosphor-regulators/src/ |
H A D | exception_utils.hpp | 33 * Returns a vector containing the specified exception and any nested inner 36 * If the exception contains nested inner exceptions, the returned vector will 39 * This function makes it easier to handle nested exceptions. You can iterate 48 * Gets the error messages from the specified exception and any nested inner 51 * If the exception contains nested inner exceptions, the messages in the 67 * Builds a vector containing the specified exception and any nested inner 80 * Gets the error messages from the specified exception and any nested inner
|
/openbmc/linux/Documentation/networking/ |
H A D | ethtool-netlink.rst | 53 Each request or reply message contains a nested attribute with common header. 89 type is used. For arbitrary length bitmaps, ethtool netlink uses a nested 109 Compact form: nested (bitset) attribute contents: 134 Bit-by-bit form: nested (bitset) attribute contents: 141 | ``ETHTOOL_A_BITSET_BITS`` | nested | array of bits | 143 | | ``ETHTOOL_A_BITSET_BITS_BIT+`` | nested | one bit | 317 | ``ETHTOOL_A_STRSET_HEADER`` | nested | request header | 319 | ``ETHTOOL_A_STRSET_STRINGSETS`` | nested | string set to request | 321 | | ``ETHTOOL_A_STRINGSETS_STRINGSET+`` | nested | one string set | 329 | ``ETHTOOL_A_STRSET_HEADER`` | nested | reply header | [all …]
|
/openbmc/qemu/hw/ppc/ |
H A D | spapr_caps.c | 449 error_setg(errp, "Nested-HV only supported on POWER9 and later"); in cap_nested_kvm_hv_apply() 450 error_append_hint(errp, "Try appending -machine cap-nested-hv=off\n"); in cap_nested_kvm_hv_apply() 457 error_setg(errp, "Nested-HV only supported on POWER9 and later"); in cap_nested_kvm_hv_apply() 465 "KVM implementation does not support Nested-HV"); in cap_nested_kvm_hv_apply() 467 "Try appending -machine cap-nested-hv=off\n"); in cap_nested_kvm_hv_apply() 469 error_setg(errp, "Error enabling cap-nested-hv with KVM"); in cap_nested_kvm_hv_apply() 471 "Try appending -machine cap-nested-hv=off\n"); in cap_nested_kvm_hv_apply() 478 * Nested-HV vCPU env state to L2, so SMT-shared SPR updates, for in cap_nested_kvm_hv_apply() 483 error_setg(errp, "TCG does not support nested-HV with SMT"); in cap_nested_kvm_hv_apply() 484 error_append_hint(errp, "Try appending -machine cap-nested-hv=off " in cap_nested_kvm_hv_apply() [all …]
|
/openbmc/qemu/tests/qapi-schema/ |
H A D | alternate-nested.err | 1 alternate-nested.json: In alternate 'Alt2': 2 alternate-nested.json:4: branch 'nested' cannot use alternate type 'Alt1'
|
/openbmc/linux/include/uapi/linux/tc_act/ |
H A D | tc_tunnel_key.h | 32 TCA_TUNNEL_KEY_ENC_OPTS, /* Nested TCA_TUNNEL_KEY_ENC_OPTS_ 45 TCA_TUNNEL_KEY_ENC_OPTS_GENEVE, /* Nested 49 TCA_TUNNEL_KEY_ENC_OPTS_VXLAN, /* Nested 53 TCA_TUNNEL_KEY_ENC_OPTS_ERSPAN, /* Nested
|
/openbmc/linux/Documentation/arch/x86/ |
H A D | kernel-stacks.rst | 28 hardware interrupt (i.e. not a nested hardware interrupt) then the 54 nested IST interrupts then the handler must adjust the IST values on 59 nested. For example, a debug interrupt can safely be interrupted by an 62 IST events with the same code to be nested. However in most cases, the 95 To handle nested #DB correctly there exist two instances of DB stacks. On 97 so a nested #DB starts from a clean stack. The nested #DB switches
|
/openbmc/linux/net/netfilter/ipset/ |
H A D | ip_set_bitmap_gen.h | 93 struct nlattr *nested; in mtype_head() local 96 nested = nla_nest_start(skb, IPSET_ATTR_DATA); in mtype_head() 97 if (!nested) in mtype_head() 106 nla_nest_end(skb, nested); in mtype_head() 205 struct nlattr *adt, *nested; in mtype_list() local 227 nested = nla_nest_start(skb, IPSET_ATTR_DATA); in mtype_list() 228 if (!nested) { in mtype_list() 241 nla_nest_end(skb, nested); in mtype_list() 251 nla_nest_cancel(skb, nested); in mtype_list()
|