Lines Matching refs:when

62 - when guest paging is disabled, we translate guest physical addresses to
64 - when guest paging is enabled, we translate guest virtual addresses, to
66 - when the guest launches a guest of its own, we translate nested guest
138 host pages, and gpa->hpa translations when NPT or EPT is active.
192 element of this array can be calculated from the gfn field when used, in
206 translation. This is equivalent to the state of the tlb when a pte is
208 are synchronized when the guest executes invlpg or flushes its tlb by
240 reached given its gfn. This is used, for example, when swapping out a page.
250 protected, and synchronize sptes to gptes when a gpte is written.
252 A special case is when a guest page table is reachable from the current
256 We synchronize modified gptes when the guest invokes invlpg. This reduces
257 the amount of emulation we have to do when the guest modifies multiple gptes,
258 or when the a guest page is no longer used as a page table and is used for
275 - when logging dirty pages, memory is write protected
337 cr0.wp=1, this does not present a problem. However when the guest cr0.wp=0,
355 spte.nx=gpte.nx back. For this to work, KVM forces EFER.NX to 1 when
358 page, it can not be reused when CR4.SMAP is enabled. We set
366 with one value of cr0.wp cannot be used when cr0.wp has a different value -
368 exists when an spte created with cr0.wp=0 and cr4.smep=0 is used after
404 the current global generation-number into sp->mmu_valid_gen when it
437 pages are zapped when there is an overflow.
440 times, the last one happening when the generation number is retrieved and
449 is not stored in MMIO spte, and presumed zero when it is extracted out of the