Searched refs:memslots (Results 1 – 12 of 12) sorted by relevance
23 use the same memslots array. kvm->slots_lock and kvm->slots_arch_lock263 :Protects: - kvm->memslots265 :Comment: The srcu read lock must be held while accessing memslots (e.g.275 :Protects: any arch-specific fields of memslots that have to be modified277 :Comment: must be held before reading the pointer to the current memslots,278 until after all changes to the memslots are complete
375 ENOSYS data abort outside memslots with no syndrome info and7514 When this capability is enabled all memory in memslots must be mapped as
602 vm->memslots[MEM_REGION_CODE] = CODE_AND_DATA_MEMSLOT; in setup_memslots()603 vm->memslots[MEM_REGION_DATA] = CODE_AND_DATA_MEMSLOT; in setup_memslots()608 vm->memslots[MEM_REGION_PT] = PAGE_TABLE_MEMSLOT; in setup_memslots()613 vm->memslots[MEM_REGION_TEST_DATA] = TEST_DATA_MEMSLOT; in setup_memslots()
25 vm->memslots[MEM_REGION_PT]); in virt_arch_pgd_alloc()
124 uint32_t memslots[NR_MEM_REGIONS]; member141 return memslot2region(vm, vm->memslots[type]); in vm_get_mem_region()
357 vm->memslots[i] = 0; in __vm_create()1314 vm->memslots[type]); in __vm_vaddr_alloc()1948 vm->memslots[MEM_REGION_PT]); in vm_alloc_page_table()
540 return rcu_dereference_raw_check(kvm->memslots[0]); in kvm_memslots_raw()
65 vm->memslots[MEM_REGION_PT]); in virt_arch_pgd_alloc()
87 vm->memslots[MEM_REGION_PT]); in virt_arch_pgd_alloc()
724 struct kvm_memslots __rcu *memslots[KVM_ADDRESS_SPACE_NUM]; member971 return srcu_dereference_check(kvm->memslots[as_id], &kvm->srcu, in __kvm_memslots()
305 Dirty tracking must be enabled on all memslots, else -EINVAL is returned. When
1183 rcu_assign_pointer(kvm->memslots[i], &kvm->__memslots[i][0]); in kvm_create_vm()1557 rcu_assign_pointer(kvm->memslots[as_id], slots); in kvm_swap_active_memslots()
Completed in 50 milliseconds