Blame SOURCES/gdb-rhbz1186918-gdbserver-in-container-2of8.patch

01917d
Implement qXfer:exec-file:read in gdbserver
01917d
01917d
From: Gary Benson <gbenson@redhat.com>
01917d
01917d
This commit implements the "qXfer:exec-file:read" packet in gdbserver.
01917d
01917d
gdb/gdbserver/ChangeLog:
01917d
01917d
	* target.h (struct target_ops) <pid_to_exec_file>: New field.
01917d
	* linux-low.c (linux_target_ops): Initialize pid_to_exec_file.
01917d
	* server.c (handle_qxfer_exec_file): New function.
01917d
	(qxfer_packets): Add exec-file entry.
01917d
	(handle_query): Report qXfer:exec-file:read as supported packet.
01917d
---
01917d
 gdb/gdbserver/linux-low.c |   19 +++++++++++++++++++
01917d
 gdb/gdbserver/server.c    |   40 ++++++++++++++++++++++++++++++++++++++++
01917d
 gdb/gdbserver/target.h    |    7 +++++++
01917d
 3 files changed, 66 insertions(+)
01917d
01917d
Index: gdb-7.6.1/gdb/gdbserver/linux-low.c
01917d
===================================================================
01917d
--- gdb-7.6.1.orig/gdb/gdbserver/linux-low.c	2016-03-15 19:04:39.260193747 +0100
01917d
+++ gdb-7.6.1/gdb/gdbserver/linux-low.c	2016-03-15 19:04:48.841256052 +0100
01917d
@@ -5993,6 +5993,24 @@
01917d
 }
01917d
 #endif /* HAVE_LINUX_BTRACE */
01917d
 
01917d
+// gdb/nat/linux-procfs.c
01917d
+static char *
01917d
+linux_proc_pid_to_exec_file (int pid)
01917d
+{
01917d
+  static char buf[PATH_MAX];
01917d
+  char name[PATH_MAX];
01917d
+  ssize_t len;
01917d
+
01917d
+  xsnprintf (name, PATH_MAX, "/proc/%d/exe", pid);
01917d
+  len = readlink (name, buf, PATH_MAX - 1);
01917d
+  if (len <= 0)
01917d
+    strcpy (buf, name);
01917d
+  else
01917d
+    buf[len] = '\0';
01917d
+
01917d
+  return buf;
01917d
+}
01917d
+
01917d
 static struct target_ops linux_target_ops = {
01917d
   linux_create_inferior,
01917d
   linux_attach,
01917d
@@ -6070,6 +6088,7 @@
01917d
   NULL,
01917d
   NULL,
01917d
 #endif
01917d
+  linux_proc_pid_to_exec_file,
01917d
 };
01917d
 
01917d
 static void
01917d
Index: gdb-7.6.1/gdb/gdbserver/server.c
01917d
===================================================================
01917d
--- gdb-7.6.1.orig/gdb/gdbserver/server.c	2016-03-15 19:04:39.262193760 +0100
01917d
+++ gdb-7.6.1/gdb/gdbserver/server.c	2016-03-15 19:04:48.842256059 +0100
01917d
@@ -1006,6 +1006,42 @@
01917d
   return (*the_target->read_auxv) (offset, readbuf, len);
01917d
 }
01917d
 
01917d
+/* Handle qXfer:exec-file:read.  */
01917d
+
01917d
+static int
01917d
+handle_qxfer_exec_file (const char *const_annex,
01917d
+			gdb_byte *readbuf, const gdb_byte *writebuf,
01917d
+			ULONGEST offset, LONGEST len)
01917d
+{
01917d
+  char *annex, *file;
01917d
+  ULONGEST pid;
01917d
+  int total_len;
01917d
+
01917d
+  if (the_target->pid_to_exec_file == NULL || writebuf != NULL)
01917d
+    return -2;
01917d
+
01917d
+  annex = alloca (strlen (const_annex) + 1);
01917d
+  strcpy (annex, const_annex);
01917d
+  annex = unpack_varlen_hex (annex, &pid;;
01917d
+  if (annex[0] != '\0' || pid == 0)
01917d
+    return -1;
01917d
+
01917d
+  file = (*the_target->pid_to_exec_file) (pid);
01917d
+  if (file == NULL)
01917d
+    return -1;
01917d
+
01917d
+  total_len = strlen (file);
01917d
+
01917d
+  if (offset > total_len)
01917d
+    return -1;
01917d
+
01917d
+  if (offset + len > total_len)
01917d
+    len = total_len - offset;
01917d
+
01917d
+  memcpy (readbuf, file + offset, len);
01917d
+  return len;
01917d
+}
01917d
+
01917d
 /* Handle qXfer:features:read.  */
01917d
 
01917d
 static int
01917d
@@ -1408,6 +1444,7 @@
01917d
   {
01917d
     { "auxv", handle_qxfer_auxv },
01917d
     { "btrace", handle_qxfer_btrace },
01917d
+    { "exec-file", handle_qxfer_exec_file},
01917d
     { "fdpic", handle_qxfer_fdpic},
01917d
     { "features", handle_qxfer_features },
01917d
     { "libraries", handle_qxfer_libraries },
01917d
@@ -1828,6 +1865,9 @@
01917d
       if (target_supports_stopped_by_hw_breakpoint ())
01917d
 	strcat (own_buf, ";hwbreak+");
01917d
 
01917d
+      if (the_target->pid_to_exec_file != NULL)
01917d
+	strcat (own_buf, ";qXfer:exec-file:read+");
01917d
+
01917d
       return;
01917d
     }
01917d
 
01917d
Index: gdb-7.6.1/gdb/gdbserver/target.h
01917d
===================================================================
01917d
--- gdb-7.6.1.orig/gdb/gdbserver/target.h	2016-03-15 19:04:39.262193760 +0100
01917d
+++ gdb-7.6.1/gdb/gdbserver/target.h	2016-03-15 19:04:48.842256059 +0100
01917d
@@ -421,6 +421,13 @@
01917d
      to break a cyclic dependency.  */
01917d
   void (*read_btrace) (struct btrace_target_info *, struct buffer *, int type);
01917d
 
01917d
+  /* Return the full absolute name of the executable file that was
01917d
+     run to create the process PID.  If the executable file cannot
01917d
+     be determined, NULL is returned.  Otherwise, a pointer to a
01917d
+     character string containing the pathname is returned.  This
01917d
+     string should be copied into a buffer by the client if the string
01917d
+     will not be immediately used, or if it must persist.  */
01917d
+  char *(*pid_to_exec_file) (int pid);
01917d
 };
01917d
 
01917d
 extern struct target_ops *the_target;