Lines Matching defs:host
167 * Restoring the host value for MSRs that are only consumed when running in
182 u64 host;
320 if (values->host != values->curr) {
321 wrmsrl(user_return_msrs_global.msrs[slot], values->host);
322 values->curr = values->host;
361 msrs->values[i].host = value;
372 value = (value & mask) | (msrs->values[slot].host & ~mask);
1220 * capabilities of the host cpu. This capabilities test skips MSRs that are
1222 * may depend on host virtualization features rather than host cpu features.
1319 * We always support the "true" VMX control MSRs, even if the host
1435 * If RTM=0 because the kernel has disabled TSX, the host might
1447 * host so the guest can choose between disabling TSX or
1857 * from guest to host, e.g. reacquiring KVM's SRCU lock. In contrast to the
1858 * other cases which must be called after interrupts are enabled on the host.
2122 /* Guest TSC same frequency as host TSC? */
2215 * In order to enable masterclock, the host clocksource must be TSC
2502 /* returns true if host is using TSC based clocksource */
2513 /* returns true if host is using TSC based clocksource */
2532 * "timespecX" represents host monotonic time. "tscX" represents
2559 * copy of host monotonic time values. Update that master copy
2562 * Rely on synchronization of host TSCs and guest TSCs for monotonicity.
2577 * If the host uses TSC clock, then passthrough TSC as stable
2728 * If the host uses TSC clock, then passthrough TSC as stable
2790 /* If the host uses TSC clocksource, then it is stable */
3434 static int get_msr_mce(struct kvm_vcpu *vcpu, u32 msr, u64 *pdata, bool host)
3449 if (!(mcg_cap & MCG_CTL_P) && !host)
3496 * limit) MSRs. Just return 0, as we do not want to expose the host
3681 * This prevents guest kernels on AMD host with CPU
4067 /* Save host pkru register if supported */
4094 * On a host with synchronized TSC, there is no need to update
4120 * preempted if and only if the VM-Exit was due to a host interrupt.
4726 * stopped by the hypervisor. This function will be called from the host only.
4727 * EINVAL is returned when the host attempts to set the flag for a guest that
5967 * Even MSRs that are valid in the host may not be exposed
6605 * enabled in the host and the access splits a cache line.
7308 * readonly host memory, otherwise it will goto a infinite loop:
8125 * Disable master clock if host does not trust, or does not use,
9289 * Do this here before restoring debug registers on the host. And
9304 * will be disabled while returning to the host.
9305 * If we don't have active breakpoints in the host, we don't
10190 pr_warn_once("kvm: SMP vm created on host with unstable TSC; "
10511 * booting a VM while issuing an S4 host suspend....
11315 * fault is retried, hopefully the page will be ready in the host.
11467 * is allowed by the host processor