Searched refs:memslots (Results 1 – 13 of 13) sorted by relevance
23 use the same memslots array. kvm->slots_lock and kvm->slots_arch_lock24 are taken on the waiting side when modifying memslots, so MMU notifiers263 :Protects: - kvm->memslots265 :Comment: The srcu read lock must be held while accessing memslots (e.g.275 :Protects: any arch-specific fields of memslots that have to be modified277 :Comment: must be held before reading the pointer to the current memslots,278 until after all changes to the memslots are complete
375 ENOSYS data abort outside memslots with no syndrome info and7581 When this capability is enabled all memory in memslots must be mapped as
109 vm->memslots[i] = 0; in create_main_memslot()121 vm->memslots[MEM_REGION_TEST_DATA] = TEST_DATA_MEMSLOT; in create_test_memslot()
601 vm->memslots[MEM_REGION_CODE] = CODE_AND_DATA_MEMSLOT; in setup_memslots()602 vm->memslots[MEM_REGION_DATA] = CODE_AND_DATA_MEMSLOT; in setup_memslots()607 vm->memslots[MEM_REGION_PT] = PAGE_TABLE_MEMSLOT; in setup_memslots()612 vm->memslots[MEM_REGION_TEST_DATA] = TEST_DATA_MEMSLOT; in setup_memslots()
25 vm->memslots[MEM_REGION_PT]); in virt_arch_pgd_alloc()
125 uint32_t memslots[NR_MEM_REGIONS]; member162 return memslot2region(vm, vm->memslots[type]); in vm_get_mem_region()
540 return rcu_dereference_raw_check(kvm->memslots[0]); in kvm_memslots_raw()
366 vm->memslots[i] = 0; in __vm_create()1340 vm->memslots[type]); in __vm_vaddr_alloc()1989 vm->memslots[MEM_REGION_PT]); in vm_alloc_page_table()
65 vm->memslots[MEM_REGION_PT]); in virt_arch_pgd_alloc()
104 vm->memslots[MEM_REGION_PT]); in virt_arch_pgd_alloc()
726 struct kvm_memslots __rcu *memslots[KVM_ADDRESS_SPACE_NUM]; member993 return srcu_dereference_check(kvm->memslots[as_id], &kvm->srcu, in __kvm_memslots()
305 Dirty tracking must be enabled on all memslots, else -EINVAL is returned. When
1212 rcu_assign_pointer(kvm->memslots[i], &kvm->__memslots[i][0]); in kvm_create_vm()1586 rcu_assign_pointer(kvm->memslots[as_id], slots); in kvm_swap_active_memslots()