Lines Matching defs:access

988 	/* No one will access memory at this point */
1090 struct iovec iov[], int iov_size, int access);
1102 * could be access through iotlb. So -EAGAIN should
1137 * could be access through iotlb. So -EAGAIN should
1184 vq_err(vq, "Non atomic userspace memory access: uaddr "
1195 * could be access through iotlb. So -EAGAIN should
1351 static bool umem_access_ok(u64 uaddr, u64 size, int access)
1359 if ((access & VHOST_ACCESS_RO) &&
1362 if ((access & VHOST_ACCESS_WO) &&
1564 static int vhost_iotlb_miss(struct vhost_virtqueue *vq, u64 iova, int access)
1584 msg->perm = access;
1611 int access = (type == VHOST_ADDR_USED) ?
1614 if (likely(map->perm & access))
1619 int access, u64 addr, u64 len, int type)
1631 vhost_iotlb_miss(vq, addr, access);
1633 } else if (!(map->perm & access)) {
1634 /* Report the possible access violation by
1691 /* Verify access for write logging. */
1826 /* We only verify access here if backend is configured.
1836 /* Also validate log access for used ring if enabled. */
2319 vq_err(vq, "Can't access used idx at %p\n",
2333 struct iovec iov[], int iov_size, int access)
2357 } else if (!(map->perm & access)) {
2373 vhost_iotlb_miss(vq, addr, access);
2403 int ret, access;
2451 access = VHOST_ACCESS_WO;
2453 access = VHOST_ACCESS_RO;
2457 iov_size - iov_count, access);
2465 if (access == VHOST_ACCESS_WO) {
2487 * it to an iovec for convenient access. Since descriptors consist of some
2504 int ret, access;
2511 vq_err(vq, "Failed to access avail idx at %p\n",
2592 access = VHOST_ACCESS_WO;
2594 access = VHOST_ACCESS_RO;
2597 iov_size - iov_count, access);
2604 if (access == VHOST_ACCESS_WO) {