Lines Matching defs:access
709 /* No one will access memory at this point */
816 struct iovec iov[], int iov_size, int access);
828 * could be access through iotlb. So -EAGAIN should
863 * could be access through iotlb. So -EAGAIN should
910 vq_err(vq, "Non atomic userspace memory access: uaddr "
921 * could be access through iotlb. So -EAGAIN should
1077 static bool umem_access_ok(u64 uaddr, u64 size, int access)
1085 if ((access & VHOST_ACCESS_RO) &&
1088 if ((access & VHOST_ACCESS_WO) &&
1272 static int vhost_iotlb_miss(struct vhost_virtqueue *vq, u64 iova, int access)
1292 msg->perm = access;
1319 int access = (type == VHOST_ADDR_USED) ?
1322 if (likely(map->perm & access))
1327 int access, u64 addr, u64 len, int type)
1339 vhost_iotlb_miss(vq, addr, access);
1341 } else if (!(map->perm & access)) {
1342 /* Report the possible access violation by
1399 /* Verify access for write logging. */
1534 /* We only verify access here if backend is configured.
1544 /* Also validate log access for used ring if enabled. */
2033 vq_err(vq, "Can't access used idx at %p\n",
2047 struct iovec iov[], int iov_size, int access)
2071 } else if (!(map->perm & access)) {
2087 vhost_iotlb_miss(vq, addr, access);
2117 int ret, access;
2165 access = VHOST_ACCESS_WO;
2167 access = VHOST_ACCESS_RO;
2171 iov_size - iov_count, access);
2179 if (access == VHOST_ACCESS_WO) {
2201 * it to an iovec for convenient access. Since descriptors consist of some
2218 int ret, access;
2225 vq_err(vq, "Failed to access avail idx at %p\n",
2306 access = VHOST_ACCESS_WO;
2308 access = VHOST_ACCESS_RO;
2311 iov_size - iov_count, access);
2318 if (access == VHOST_ACCESS_WO) {