Lines Matching defs:host

204  * Restoring the host value for MSRs that are only consumed when running in
214 u64 host;
382 if (values->host != values->curr) {
383 wrmsrl(kvm_uret_msrs_list[slot], values->host);
384 values->curr = values->host;
437 msrs->values[i].host = value;
448 value = (value & mask) | (msrs->values[slot].host & ~mask);
1439 * require host support, i.e. should be probed via RDMSR. emulated_msrs holds
1440 * MSRs that KVM emulates without strictly requiring host support.
1546 * KVM always supports the "true" VMX control MSRs, even if the host
1548 * doesn't strictly require them to exist in the host (ignoring that
1661 * If RTM=0 because the kernel has disabled TSX, the host might
1673 * host so the guest can choose between disabling TSX or
2156 * from guest to host, e.g. reacquiring KVM's SRCU lock. In contrast to the
2157 * other cases which must be called after interrupts are enabled on the host.
2433 /* Guest TSC same frequency as host TSC? */
2522 * To use the masterclock, the host clocksource must be based on TSC
2666 * Infers attempts to synchronize the guest's tsc from host writes. Sets the
2929 * reports the TSC value from which it do so. Returns true if host is
2944 * so. Returns true if host is using TSC based clocksource.
2958 * so. Returns true if host is using TSC based clocksource.
2981 * "timespecX" represents host monotonic time. "tscX" represents
3008 * copy of host monotonic time values. Update that master copy
3011 * Rely on synchronization of host TSCs and guest TSCs for monotonicity.
3027 * If the host uses TSC clock, then passthrough TSC as stable
3240 * If the host uses TSC clock, then passthrough TSC as stable
3305 /* If the host uses TSC clocksource, then it is stable */
4180 static int get_msr_mce(struct kvm_vcpu *vcpu, u32 msr, u64 *pdata, bool host)
4196 if (!(mcg_cap & MCG_CTL_P) && !host)
4208 if (!(mcg_cap & MCG_CMCI_P) && !host)
4253 * limit) MSRs. Just return 0, as we do not want to expose the host
4449 * This prevents guest kernels on AMD host with CPU
5024 /* Save host pkru register if supported */
5051 * On a host with synchronized TSC, there is no need to update
5077 * preempted if and only if the VM-Exit was due to a host interrupt.
5606 * features that are supported in *this* host but not exposed to the
5608 * compatible host without the features that are NOT exposed to the
5613 * supported by the host.
5683 * stopped by the hypervisor. This function will be called from the host only.
5684 * EINVAL is returned when the host attempts to set the flag for a guest that
7358 * Even MSRs that are valid in the host may not be exposed to guests in
8033 * enabled in the host and the access splits a cache line.
8842 * readonly host memory, otherwise it will goto a infinite loop:
9637 * Disable master clock if host does not trust, or does not use,
9731 pr_err("host PAT[0] is not WB\n");
10958 * notification IRQ arrived in the host, or was never sent (because the
11025 * Do this here before restoring debug registers on the host. And
11039 * will be disabled while returning to the host.
11040 * If we don't have active breakpoints in the host, we don't
11148 * If the vCPU is not runnable, a signal or another host event
12074 pr_warn_once("SMP vm created on host with unstable TSC; "
12477 * booting a VM while issuing an S4 host suspend....
13362 * fault is retried, hopefully the page will be ready in the host.
13539 * is allowed by the host processor