Lines Matching defs:host

202 /* Default is SYSTEM mode, 1 for host-guest mode */
902 * between guest and host. In that case we only care about present
1005 i = vmx_find_loadstore_msr_slot(&m->host, msr);
1009 --m->host.nr;
1010 m->host.val[i] = m->host.val[m->host.nr];
1011 vmcs_write32(VM_EXIT_MSR_LOAD_COUNT, m->host.nr);
1058 * provide that period, so a CPU could write host's record into
1066 j = vmx_find_loadstore_msr_slot(&m->host, msr);
1069 (j < 0 && m->host.nr == MAX_NR_LOADSTORE_MSRS)) {
1085 j = m->host.nr++;
1086 vmcs_write32(VM_EXIT_MSR_LOAD_COUNT, m->host.nr);
1088 m->host.val[j].index = msr;
1089 m->host.val[j].value = host_val;
1221 * Save host state before VM entry.
1223 rdmsrl(MSR_IA32_RTIT_CTL, vmx->pt_desc.host.ctl);
1226 pt_save_msr(&vmx->pt_desc.host, vmx->pt_desc.addr_range);
1238 pt_load_msr(&vmx->pt_desc.host, vmx->pt_desc.addr_range);
1241 /* Reload host state (IA32_RTIT_CTL will be cleared on VM exit). */
1242 wrmsrl(MSR_IA32_RTIT_CTL, vmx->pt_desc.host.ctl);
1245 void vmx_set_host_fs_gs(struct vmcs_host_state *host, u16 fs_sel, u16 gs_sel,
1248 if (unlikely(fs_sel != host->fs_sel)) {
1253 host->fs_sel = fs_sel;
1255 if (unlikely(gs_sel != host->gs_sel)) {
1260 host->gs_sel = gs_sel;
1262 if (unlikely(fs_base != host->fs_base)) {
1264 host->fs_base = fs_base;
1266 if (unlikely(gs_base != host->gs_base)) {
1268 host->gs_base = gs_base;
1308 * Set host fs and gs selectors. Unfortunately, 22.2.3 does not
2444 * the host OS supports or has enabled SGX.
3232 * Pass through host's Machine Check Enable value to hw_cr4, which
3234 * this bit, even if host CR4.MCE == 0.
4133 * Set up the vmcs's constant host-state fields, i.e., host-state fields that
4135 * Note that host-state that does change is set elsewhere. E.g., host-state
4470 vmcs_write64(VM_EXIT_MSR_LOAD_ADDR, __pa(vmx->msr_autoload.host.val));
4846 * Trigger machine check on the host. We assume all the MSRs are already set up
4871 * If the host has split lock detection disabled, then #AC is
4875 * If the host has split lock detection enabled then #AC is
5238 * need to emulate the latter, either for the host or the
6110 * The host physical addresses of some pages of guest memory
6112 * Page). The CPU may write to these pages via their host
6693 if (msrs[i].host == msrs[i].guest)
6697 msrs[i].host, false);
6746 * If the guest/host SPEC_CTRL values differ, restore the host value.
6750 * whether the guest/host values differ.
6776 * VMENTER enables interrupts (host state), but the kernel state is
6780 * This ensures that e.g. latency analysis on the host observes
6817 * VMEXIT disables interrupts (host state), but tracing and lockdep
6821 * context_tracking_guest_exit() restores host context and reinstates
7036 * interception. Keep the host value unchanged to avoid
7037 * changing CPUID bits under the host kernel's feet.
7041 * those guests run on a tsx=off host, do allow guests
7043 * host so that TSX remains always disabled.
7624 /* Convert to host delta tsc if tsc scaling is enabled */
7943 WARN_ONCE(host_bndcfgs, "KVM: BNDCFGS in host will be lost");
8011 set_bit(0, vmx_vpid_bitmap); /* 0 is reserved for host */
8159 * Enlightened VMCS usage should be recommended and the host needs