Lines Matching refs:when
62 - when guest paging is disabled, we translate guest physical addresses to
64 - when guest paging is enabled, we translate guest virtual addresses, to
66 - when the guest launches a guest of its own, we translate nested guest
138 host pages, and gpa->hpa translations when NPT or EPT is active.
198 element of this array can be calculated from the gfn field when used, in
212 translation. This is equivalent to the state of the tlb when a pte is
214 are synchronized when the guest executes invlpg or flushes its tlb by
246 reached given its gfn. This is used, for example, when swapping out a page.
256 protected, and synchronize sptes to gptes when a gpte is written.
258 A special case is when a guest page table is reachable from the current
262 We synchronize modified gptes when the guest invokes invlpg. This reduces
263 the amount of emulation we have to do when the guest modifies multiple gptes,
264 or when the a guest page is no longer used as a page table and is used for
281 - when logging dirty pages, memory is write protected
343 cr0.wp=1, this does not present a problem. However when the guest cr0.wp=0,
361 spte.nx=gpte.nx back. For this to work, KVM forces EFER.NX to 1 when
364 page, it can not be reused when CR4.SMAP is enabled. We set
372 with one value of cr0.wp cannot be used when cr0.wp has a different value -
374 exists when an spte created with cr0.wp=0 and cr4.smep=0 is used after
410 the current global generation-number into sp->mmu_valid_gen when it
443 pages are zapped when there is an overflow.
446 times, the last one happening when the generation number is retrieved and
455 is not stored in MMIO spte, and presumed zero when it is extracted out of the