Lines Matching defs:host

219 /* Default is SYSTEM mode, 1 for host-guest mode */
400 * CPU isn't affected by MDS/TAA, and the host hasn't forcefully enabled
563 * Enlightened VMCS usage should be recommended and the host needs
912 * host. In that case we only care about present,
1012 i = vmx_find_loadstore_msr_slot(&m->host, msr);
1016 --m->host.nr;
1017 m->host.val[i] = m->host.val[m->host.nr];
1018 vmcs_write32(VM_EXIT_MSR_LOAD_COUNT, m->host.nr);
1065 * provide that period, so a CPU could write host's record into
1073 j = vmx_find_loadstore_msr_slot(&m->host, msr);
1076 (j < 0 && m->host.nr == MAX_NR_LOADSTORE_MSRS)) {
1092 j = m->host.nr++;
1093 vmcs_write32(VM_EXIT_MSR_LOAD_COUNT, m->host.nr);
1095 m->host.val[j].index = msr;
1096 m->host.val[j].value = host_val;
1228 * Save host state before VM entry.
1230 rdmsrl(MSR_IA32_RTIT_CTL, vmx->pt_desc.host.ctl);
1233 pt_save_msr(&vmx->pt_desc.host, vmx->pt_desc.num_address_ranges);
1245 pt_load_msr(&vmx->pt_desc.host, vmx->pt_desc.num_address_ranges);
1252 if (vmx->pt_desc.host.ctl)
1253 wrmsrl(MSR_IA32_RTIT_CTL, vmx->pt_desc.host.ctl);
1256 void vmx_set_host_fs_gs(struct vmcs_host_state *host, u16 fs_sel, u16 gs_sel,
1259 if (unlikely(fs_sel != host->fs_sel)) {
1264 host->fs_sel = fs_sel;
1266 if (unlikely(gs_sel != host->gs_sel)) {
1271 host->gs_sel = gs_sel;
1273 if (unlikely(fs_base != host->fs_base)) {
1275 host->fs_base = fs_base;
1277 if (unlikely(gs_base != host->gs_base)) {
1279 host->gs_base = gs_base;
1320 * Set host fs and gs selectors. Unfortunately, 22.2.3 does not
1883 * kernel and old userspace. If those guests run on a tsx=off host, do
2513 * the host OS supports or has enabled SGX.
3440 * Pass through host's Machine Check Enable value to hw_cr4, which
3442 * this bit, even if host CR4.MCE == 0.
4183 * Sending a notification event is ok as the host IRQ handler
4291 * Set up the vmcs's constant host-state fields, i.e., host-state fields that
4293 * Note that host-state that does change is set elsewhere. E.g., host-state
4779 vmcs_write64(VM_EXIT_MSR_LOAD_ADDR, __pa(vmx->msr_autoload.host.val));
5169 * If the host has split lock detection disabled, then #AC is
5173 * If the host has split lock detection enabled then #AC is
5555 * need to emulate the latter, either for the host or the
6382 vmx_dump_msrs("host autoload", &vmx->msr_autoload.host);
6490 * The host physical addresses of some pages of guest memory
6492 * Page). The CPU may write to these pages via their host
6980 * MSR value is not clobbered by the host activity before the guest
7194 if (msrs[i].host == msrs[i].guest)
7198 msrs[i].host, false);
7247 * If the guest/host SPEC_CTRL values differ, restore the host value.
7251 * whether the guest/host values differ.
7537 * Keep the host value unchanged to avoid changing CPUID bits
7538 * under the host kernel's feet.
7939 * used by the guest to read *host* LBRs, and can be used to
7950 * 3. Ensure LBR MSRs cannot hold host data on VM-Entry with
8148 /* Convert to host delta tsc if tsc scaling is enabled */
8405 * Unlike SME, host kernel doesn't support setting up any
8435 WARN_ONCE(host_bndcfgs, "BNDCFGS in host will be lost");
8518 set_bit(0, vmx_vpid_bitmap); /* 0 is reserved for host */