block: Use CAFs when working with backing chains
[qemu.git] / bsd-user / uaccess.c
blob91e2067933dd59394014b9afdb684cb44bf2cc31
1 /* User memory access */
2 #include "qemu/osdep.h"
3 #include "qemu/cutils.h"
5 #include "qemu.h"
7 /* copy_from_user() and copy_to_user() are usually used to copy data
8 * buffers between the target and host. These internally perform
9 * locking/unlocking of the memory.
11 abi_long copy_from_user(void *hptr, abi_ulong gaddr, size_t len)
13 abi_long ret = 0;
14 void *ghptr;
16 if ((ghptr = lock_user(VERIFY_READ, gaddr, len, 1))) {
17 memcpy(hptr, ghptr, len);
18 unlock_user(ghptr, gaddr, 0);
19 } else
20 ret = -TARGET_EFAULT;
22 return ret;
26 abi_long copy_to_user(abi_ulong gaddr, void *hptr, size_t len)
28 abi_long ret = 0;
29 void *ghptr;
31 if ((ghptr = lock_user(VERIFY_WRITE, gaddr, len, 0))) {
32 memcpy(ghptr, hptr, len);
33 unlock_user(ghptr, gaddr, len);
34 } else
35 ret = -TARGET_EFAULT;
37 return ret;
40 /* Return the length of a string in target memory or -TARGET_EFAULT if
41 access error */
42 abi_long target_strlen(abi_ulong guest_addr1)
44 uint8_t *ptr;
45 abi_ulong guest_addr;
46 int max_len, len;
48 guest_addr = guest_addr1;
49 for(;;) {
50 max_len = TARGET_PAGE_SIZE - (guest_addr & ~TARGET_PAGE_MASK);
51 ptr = lock_user(VERIFY_READ, guest_addr, max_len, 1);
52 if (!ptr)
53 return -TARGET_EFAULT;
54 len = qemu_strnlen((const char *)ptr, max_len);
55 unlock_user(ptr, guest_addr, 0);
56 guest_addr += len;
57 /* we don't allow wrapping or integer overflow */
58 if (guest_addr == 0 ||
59 (guest_addr - guest_addr1) > 0x7fffffff)
60 return -TARGET_EFAULT;
61 if (len != max_len)
62 break;
64 return guest_addr - guest_addr1;