From patchwork Tue Nov 23 15:26:04 2010 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Schildbach, Wolfgang" X-Patchwork-Id: 72690 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Received: from lists.gnu.org (lists.gnu.org [199.232.76.165]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by ozlabs.org (Postfix) with ESMTPS id A1988B70D4 for ; Wed, 24 Nov 2010 02:40:54 +1100 (EST) Received: from localhost ([127.0.0.1]:39392 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.43) id 1PKuzC-0008Pa-Oc for incoming@patchwork.ozlabs.org; Tue, 23 Nov 2010 10:40:50 -0500 Received: from [140.186.70.92] (port=57812 helo=eggs.gnu.org) by lists.gnu.org with esmtp (Exim 4.43) id 1PKulL-00024u-Jq for qemu-devel@nongnu.org; Tue, 23 Nov 2010 10:26:39 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1PKulG-0002s0-2P for qemu-devel@nongnu.org; Tue, 23 Nov 2010 10:26:31 -0500 Received: from mx0b-000fd501.pphosted.com ([67.231.152.235]:60002) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1PKulF-0002rE-Uu for qemu-devel@nongnu.org; Tue, 23 Nov 2010 10:26:26 -0500 Received: from pps.filterd (m0000695 [127.0.0.1]) by m0000695.ppops.net (8.14.4/8.14.4) with SMTP id oANFPZFG014599 for ; Tue, 23 Nov 2010 07:26:23 -0800 Received: from sparrow.dolby.net (244-177-105-81.static.virginmedia.com [81.105.177.244] (may be forged)) by mx0b-000fd501.pphosted.com with ESMTP id srapsrvpw-1 for ; Tue, 23 Nov 2010 07:26:22 -0800 X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Date: Tue, 23 Nov 2010 15:26:04 -0000 Message-ID: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: [PATCH] Fix commandline handling for ARM semihosted executables, on Linux and BSD hosts Thread-Index: AcuLIr5T6qGY/9TnTCyAZE92WOrqvg== From: "Schildbach, Wolfgang" To: X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:5.2.15, 1.0.148, 0.0.0000 definitions=2010-11-23_07:2010-11-23, 2010-11-23, 1970-01-01 signatures=0 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 ipscore=0 suspectscore=1 phishscore=0 bulkscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=6.0.2-1010190000 definitions=main-1011230092 X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.6, seldom 2.4 (older, 4) Subject: [Qemu-devel] [PATCH] Fix commandline handling for ARM semihosted executables, on Linux and BSD hosts X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: qemu-devel.nongnu.org List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org Errors-To: qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org When running an ARM semihosted executable on a linux machine, the command line is not delivered to the guest (see https://bugs.launchpad.net/qemu/+bug/673613). This patch fixes this, for Linux and BSD hosts. Thanks to Peter Maydell for suggesting this patch, and to Nathan Froyd for helping me with the list netiquette! - Wolfgang Schildbach Signed-off-by: Wolfgang Schildbach --- arm-semi.c | 73 ++++++++++++++++++++++++++++------------------- bsd-user/bsdload.c | 2 - bsd-user/qemu.h | 1 - linux-user/linuxload.c | 2 - linux-user/qemu.h | 1 - 5 files changed, 43 insertions(+), 36 deletions(-) diff --git a/arm-semi.c b/arm-semi.c index 0687b03..65dc398 100644 --- a/arm-semi.c +++ b/arm-semi.c @@ -373,45 +373,58 @@ uint32_t do_arm_semihosting(CPUState *env) #ifdef CONFIG_USER_ONLY /* Build a commandline from the original argv. */ { - char **arg = ts->info->host_argv; - int len = ARG(1); - /* lock the buffer on the ARM side */ - char *cmdline_buffer = (char*)lock_user(VERIFY_WRITE, ARG(0), len, 0); + char *arm_cmdline_buffer; + const char *host_cmdline_buffer; - if (!cmdline_buffer) - /* FIXME - should this error code be -TARGET_EFAULT ? */ - return (uint32_t)-1; + unsigned int i; + unsigned int arm_cmdline_len = ARG(1); + unsigned int host_cmdline_len = + ts->info->arg_end-ts->info->arg_start; + + if (host_cmdline_len > arm_cmdline_len) { + return -1; /* command line too long */ + } + + /* lock the buffers on the ARM side */ + arm_cmdline_buffer = + lock_user(VERIFY_WRITE, ARG(0), host_cmdline_len, 0); + host_cmdline_buffer = + lock_user(VERIFY_READ, ts->info->arg_start, + host_cmdline_len, 1); - s = cmdline_buffer; - while (*arg && len > 2) { - int n = strlen(*arg); + if (arm_cmdline_buffer && host_cmdline_buffer) + { + /* the last argument is zero-terminated; + no need for additional termination */ + memcpy(arm_cmdline_buffer, host_cmdline_buffer, + host_cmdline_len); - if (s != cmdline_buffer) { - *(s++) = ' '; - len--; + /* separate arguments by white spaces */ + for (i = 0; i < host_cmdline_len-1; i++) { + if (arm_cmdline_buffer[i] == 0) { + arm_cmdline_buffer[i] = ' '; + } } - if (n >= len) - n = len - 1; - memcpy(s, *arg, n); - s += n; - len -= n; - arg++; - } - /* Null terminate the string. */ - *s = 0; - len = s - cmdline_buffer; - /* Unlock the buffer on the ARM side. */ - unlock_user(cmdline_buffer, ARG(0), len); + if (!host_cmdline_len) { + /* is arcg==0 even a possibility? */ + arm_cmdline_buffer[0] = 0; + host_cmdline_len=1; + } - /* Adjust the commandline length argument. */ - SET_ARG(1, len); + /* Adjust the commandline length argument. */ + SET_ARG(1, host_cmdline_len-1); + } - /* Return success if commandline fit into buffer. */ - return *arg ? -1 : 0; + /* Unlock the buffers on the ARM side. */ + unlock_user(arm_cmdline_buffer, ARG(0), host_cmdline_len); + unlock_user((void*)host_cmdline_buffer, ts->info->arg_start, 0); + + /* Return success if we could return a commandline. */ + return (arm_cmdline_buffer && host_cmdline_buffer) ? 0 : -1; } #else - return -1; + return -1; #endif case SYS_HEAPINFO: { diff --git a/bsd-user/bsdload.c b/bsd-user/bsdload.c index 14a93bf..6d9bb6f 100644 --- a/bsd-user/bsdload.c +++ b/bsd-user/bsdload.c @@ -176,8 +176,6 @@ int loader_exec(const char * filename, char ** argv, char ** envp, retval = prepare_binprm(&bprm); - infop->host_argv = argv; - if(retval>=0) { if (bprm.buf[0] == 0x7f && bprm.buf[1] == 'E' diff --git a/bsd-user/qemu.h b/bsd-user/qemu.h index 9763616..e343894 100644 --- a/bsd-user/qemu.h +++ b/bsd-user/qemu.h @@ -50,7 +50,6 @@ struct image_info { abi_ulong entry; abi_ulong code_offset; abi_ulong data_offset; - char **host_argv; int personality; }; diff --git a/linux-user/linuxload.c b/linux-user/linuxload.c index 9ee27c3..ac8c486 100644 --- a/linux-user/linuxload.c +++ b/linux-user/linuxload.c @@ -174,8 +174,6 @@ int loader_exec(const char * filename, char ** argv, char ** envp, retval = prepare_binprm(bprm); - infop->host_argv = argv; - if(retval>=0) { if (bprm->buf[0] == 0x7f && bprm->buf[1] == 'E' diff --git a/linux-user/qemu.h b/linux-user/qemu.h index 708021e..8f0a81f 100644 --- a/linux-user/qemu.h +++ b/linux-user/qemu.h @@ -50,7 +50,6 @@ struct image_info { abi_ulong saved_auxv; abi_ulong arg_start; abi_ulong arg_end; - char **host_argv; int personality; };