Fix double-free when creating more than one block in JIT debug info reader
[deliverable/binutils-gdb.git] / gdb / break-catch-syscall.c
CommitLineData
10304ef3
SDJ
1/* Everything about syscall catchpoints, for GDB.
2
42a4f53d 3 Copyright (C) 2009-2019 Free Software Foundation, Inc.
10304ef3
SDJ
4
5 This file is part of GDB.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
19
20#include "defs.h"
21#include <ctype.h>
22#include "breakpoint.h"
23#include "gdbcmd.h"
24#include "inferior.h"
4de283e4
TT
25#include "cli/cli-utils.h"
26#include "annotate.h"
10304ef3 27#include "mi/mi-common.h"
d55e5aa6 28#include "valprint.h"
4de283e4
TT
29#include "arch-utils.h"
30#include "observable.h"
10304ef3 31#include "xml-syscall.h"
7f6aba03 32#include "cli/cli-style.h"
10304ef3
SDJ
33
34/* An instance of this type is used to represent a syscall catchpoint.
c1fc2657 35 A breakpoint is really of this type iff its ops pointer points to
10304ef3
SDJ
36 CATCH_SYSCALL_BREAKPOINT_OPS. */
37
c1fc2657 38struct syscall_catchpoint : public breakpoint
10304ef3 39{
10304ef3 40 /* Syscall numbers used for the 'catch syscall' feature. If no
e12c9b7a
TT
41 syscall has been specified for filtering, it is empty.
42 Otherwise, it holds a list of all syscalls to be caught. */
43 std::vector<int> syscalls_to_be_caught;
10304ef3
SDJ
44};
45
10304ef3
SDJ
46struct catch_syscall_inferior_data
47{
48 /* We keep a count of the number of times the user has requested a
49 particular syscall to be tracked, and pass this information to the
50 target. This lets capable targets implement filtering directly. */
51
52 /* Number of times that "any" syscall is requested. */
53 int any_syscall_count;
54
55 /* Count of each system call. */
b6f48cb0 56 std::vector<int> syscalls_counts;
10304ef3
SDJ
57
58 /* This counts all syscall catch requests, so we can readily determine
59 if any catching is necessary. */
60 int total_syscalls_count;
61};
62
6ae614f6
TT
63static const struct inferior_key<struct catch_syscall_inferior_data>
64 catch_syscall_inferior_data;
65
b6f48cb0 66static struct catch_syscall_inferior_data *
10304ef3
SDJ
67get_catch_syscall_inferior_data (struct inferior *inf)
68{
69 struct catch_syscall_inferior_data *inf_data;
70
6ae614f6 71 inf_data = catch_syscall_inferior_data.get (inf);
10304ef3 72 if (inf_data == NULL)
6ae614f6 73 inf_data = catch_syscall_inferior_data.emplace (inf);
10304ef3
SDJ
74
75 return inf_data;
76}
77
10304ef3
SDJ
78/* Implement the "insert" breakpoint_ops method for syscall
79 catchpoints. */
80
81static int
82insert_catch_syscall (struct bp_location *bl)
83{
84 struct syscall_catchpoint *c = (struct syscall_catchpoint *) bl->owner;
85 struct inferior *inf = current_inferior ();
86 struct catch_syscall_inferior_data *inf_data
87 = get_catch_syscall_inferior_data (inf);
88
89 ++inf_data->total_syscalls_count;
e12c9b7a 90 if (c->syscalls_to_be_caught.empty ())
10304ef3
SDJ
91 ++inf_data->any_syscall_count;
92 else
93 {
e12c9b7a 94 for (int iter : c->syscalls_to_be_caught)
10304ef3 95 {
b6f48cb0
TT
96 if (iter >= inf_data->syscalls_counts.size ())
97 inf_data->syscalls_counts.resize (iter + 1);
98 ++inf_data->syscalls_counts[iter];
10304ef3
SDJ
99 }
100 }
101
e99b03dc 102 return target_set_syscall_catchpoint (inferior_ptid.pid (),
10304ef3
SDJ
103 inf_data->total_syscalls_count != 0,
104 inf_data->any_syscall_count,
649a140c 105 inf_data->syscalls_counts);
10304ef3
SDJ
106}
107
108/* Implement the "remove" breakpoint_ops method for syscall
109 catchpoints. */
110
111static int
73971819 112remove_catch_syscall (struct bp_location *bl, enum remove_bp_reason reason)
10304ef3
SDJ
113{
114 struct syscall_catchpoint *c = (struct syscall_catchpoint *) bl->owner;
115 struct inferior *inf = current_inferior ();
116 struct catch_syscall_inferior_data *inf_data
117 = get_catch_syscall_inferior_data (inf);
118
119 --inf_data->total_syscalls_count;
e12c9b7a 120 if (c->syscalls_to_be_caught.empty ())
10304ef3
SDJ
121 --inf_data->any_syscall_count;
122 else
123 {
e12c9b7a 124 for (int iter : c->syscalls_to_be_caught)
10304ef3 125 {
b6f48cb0 126 if (iter >= inf_data->syscalls_counts.size ())
10304ef3
SDJ
127 /* Shouldn't happen. */
128 continue;
b6f48cb0 129 --inf_data->syscalls_counts[iter];
10304ef3
SDJ
130 }
131 }
132
e99b03dc 133 return target_set_syscall_catchpoint (inferior_ptid.pid (),
10304ef3
SDJ
134 inf_data->total_syscalls_count != 0,
135 inf_data->any_syscall_count,
649a140c 136 inf_data->syscalls_counts);
10304ef3
SDJ
137}
138
139/* Implement the "breakpoint_hit" breakpoint_ops method for syscall
140 catchpoints. */
141
142static int
143breakpoint_hit_catch_syscall (const struct bp_location *bl,
bd522513 144 const address_space *aspace, CORE_ADDR bp_addr,
10304ef3
SDJ
145 const struct target_waitstatus *ws)
146{
147 /* We must check if we are catching specific syscalls in this
148 breakpoint. If we are, then we must guarantee that the called
149 syscall is the same syscall we are catching. */
150 int syscall_number = 0;
151 const struct syscall_catchpoint *c
152 = (const struct syscall_catchpoint *) bl->owner;
153
154 if (ws->kind != TARGET_WAITKIND_SYSCALL_ENTRY
155 && ws->kind != TARGET_WAITKIND_SYSCALL_RETURN)
156 return 0;
157
158 syscall_number = ws->value.syscall_number;
159
160 /* Now, checking if the syscall is the same. */
e12c9b7a 161 if (!c->syscalls_to_be_caught.empty ())
10304ef3 162 {
e12c9b7a 163 for (int iter : c->syscalls_to_be_caught)
10304ef3
SDJ
164 if (syscall_number == iter)
165 return 1;
166
167 return 0;
168 }
169
170 return 1;
171}
172
173/* Implement the "print_it" breakpoint_ops method for syscall
174 catchpoints. */
175
176static enum print_stop_action
177print_it_catch_syscall (bpstat bs)
178{
179 struct ui_out *uiout = current_uiout;
180 struct breakpoint *b = bs->breakpoint_at;
181 /* These are needed because we want to know in which state a
182 syscall is. It can be in the TARGET_WAITKIND_SYSCALL_ENTRY
183 or TARGET_WAITKIND_SYSCALL_RETURN, and depending on it we
184 must print "called syscall" or "returned from syscall". */
185 ptid_t ptid;
186 struct target_waitstatus last;
187 struct syscall s;
188 struct gdbarch *gdbarch = bs->bp_location_at->gdbarch;
189
190 get_last_target_status (&ptid, &last);
191
192 get_syscall_by_number (gdbarch, last.value.syscall_number, &s);
193
194 annotate_catchpoint (b->number);
f303dbd6 195 maybe_print_thread_hit_breakpoint (uiout);
10304ef3
SDJ
196
197 if (b->disposition == disp_del)
112e8700 198 uiout->text ("Temporary catchpoint ");
10304ef3 199 else
112e8700
SM
200 uiout->text ("Catchpoint ");
201 if (uiout->is_mi_like_p ())
10304ef3 202 {
112e8700 203 uiout->field_string ("reason",
10304ef3
SDJ
204 async_reason_lookup (last.kind == TARGET_WAITKIND_SYSCALL_ENTRY
205 ? EXEC_ASYNC_SYSCALL_ENTRY
206 : EXEC_ASYNC_SYSCALL_RETURN));
112e8700 207 uiout->field_string ("disp", bpdisp_text (b->disposition));
10304ef3 208 }
381befee 209 uiout->field_signed ("bkptno", b->number);
10304ef3
SDJ
210
211 if (last.kind == TARGET_WAITKIND_SYSCALL_ENTRY)
112e8700 212 uiout->text (" (call to syscall ");
10304ef3 213 else
112e8700 214 uiout->text (" (returned from syscall ");
10304ef3 215
112e8700 216 if (s.name == NULL || uiout->is_mi_like_p ())
381befee 217 uiout->field_signed ("syscall-number", last.value.syscall_number);
10304ef3 218 if (s.name != NULL)
112e8700 219 uiout->field_string ("syscall-name", s.name);
10304ef3 220
112e8700 221 uiout->text ("), ");
10304ef3
SDJ
222
223 return PRINT_SRC_AND_LOC;
224}
225
226/* Implement the "print_one" breakpoint_ops method for syscall
227 catchpoints. */
228
229static void
230print_one_catch_syscall (struct breakpoint *b,
231 struct bp_location **last_loc)
232{
233 struct syscall_catchpoint *c = (struct syscall_catchpoint *) b;
234 struct value_print_options opts;
235 struct ui_out *uiout = current_uiout;
236 struct gdbarch *gdbarch = b->loc->gdbarch;
237
238 get_user_print_options (&opts);
239 /* Field 4, the address, is omitted (which makes the columns not
240 line up too nicely with the headers, but the effect is relatively
241 readable). */
242 if (opts.addressprint)
112e8700 243 uiout->field_skip ("addr");
10304ef3
SDJ
244 annotate_field (5);
245
e12c9b7a 246 if (c->syscalls_to_be_caught.size () > 1)
112e8700 247 uiout->text ("syscalls \"");
10304ef3 248 else
112e8700 249 uiout->text ("syscall \"");
10304ef3 250
e12c9b7a 251 if (!c->syscalls_to_be_caught.empty ())
10304ef3 252 {
10304ef3
SDJ
253 char *text = xstrprintf ("%s", "");
254
e12c9b7a 255 for (int iter : c->syscalls_to_be_caught)
10304ef3 256 {
5b38f9c1 257 char *previous_text = text;
10304ef3
SDJ
258 struct syscall s;
259 get_syscall_by_number (gdbarch, iter, &s);
260
261 if (s.name != NULL)
262 text = xstrprintf ("%s%s, ", text, s.name);
263 else
264 text = xstrprintf ("%s%d, ", text, iter);
265
5b38f9c1
PW
266 /* We have to xfree previous_text because xstrprintf dynamically
267 allocates new space for text on every call. */
268 xfree (previous_text);
10304ef3
SDJ
269 }
270 /* Remove the last comma. */
271 text[strlen (text) - 2] = '\0';
112e8700 272 uiout->field_string ("what", text);
5b38f9c1
PW
273 /* xfree last text. */
274 xfree (text);
10304ef3
SDJ
275 }
276 else
7f6aba03 277 uiout->field_string ("what", "<any syscall>", metadata_style.style ());
112e8700 278 uiout->text ("\" ");
10304ef3 279
112e8700
SM
280 if (uiout->is_mi_like_p ())
281 uiout->field_string ("catch-type", "syscall");
10304ef3
SDJ
282}
283
284/* Implement the "print_mention" breakpoint_ops method for syscall
285 catchpoints. */
286
287static void
288print_mention_catch_syscall (struct breakpoint *b)
289{
290 struct syscall_catchpoint *c = (struct syscall_catchpoint *) b;
291 struct gdbarch *gdbarch = b->loc->gdbarch;
292
e12c9b7a 293 if (!c->syscalls_to_be_caught.empty ())
10304ef3 294 {
e12c9b7a 295 if (c->syscalls_to_be_caught.size () > 1)
10304ef3
SDJ
296 printf_filtered (_("Catchpoint %d (syscalls"), b->number);
297 else
298 printf_filtered (_("Catchpoint %d (syscall"), b->number);
299
e12c9b7a 300 for (int iter : c->syscalls_to_be_caught)
10304ef3
SDJ
301 {
302 struct syscall s;
303 get_syscall_by_number (gdbarch, iter, &s);
304
e12c9b7a 305 if (s.name != NULL)
10304ef3
SDJ
306 printf_filtered (" '%s' [%d]", s.name, s.number);
307 else
308 printf_filtered (" %d", s.number);
309 }
310 printf_filtered (")");
311 }
312 else
313 printf_filtered (_("Catchpoint %d (any syscall)"),
314 b->number);
315}
316
317/* Implement the "print_recreate" breakpoint_ops method for syscall
318 catchpoints. */
319
320static void
321print_recreate_catch_syscall (struct breakpoint *b, struct ui_file *fp)
322{
323 struct syscall_catchpoint *c = (struct syscall_catchpoint *) b;
324 struct gdbarch *gdbarch = b->loc->gdbarch;
325
326 fprintf_unfiltered (fp, "catch syscall");
327
e12c9b7a 328 for (int iter : c->syscalls_to_be_caught)
10304ef3 329 {
e12c9b7a 330 struct syscall s;
10304ef3 331
e12c9b7a
TT
332 get_syscall_by_number (gdbarch, iter, &s);
333 if (s.name != NULL)
334 fprintf_unfiltered (fp, " %s", s.name);
335 else
336 fprintf_unfiltered (fp, " %d", s.number);
10304ef3 337 }
e12c9b7a 338
10304ef3
SDJ
339 print_recreate_thread (b, fp);
340}
341
342/* The breakpoint_ops structure to be used in syscall catchpoints. */
343
344static struct breakpoint_ops catch_syscall_breakpoint_ops;
345
346/* Returns non-zero if 'b' is a syscall catchpoint. */
347
348static int
349syscall_catchpoint_p (struct breakpoint *b)
350{
351 return (b->ops == &catch_syscall_breakpoint_ops);
352}
353
354static void
e12c9b7a 355create_syscall_event_catchpoint (int tempflag, std::vector<int> &&filter,
10304ef3
SDJ
356 const struct breakpoint_ops *ops)
357{
10304ef3
SDJ
358 struct gdbarch *gdbarch = get_current_arch ();
359
b270e6f9
TT
360 std::unique_ptr<syscall_catchpoint> c (new syscall_catchpoint ());
361 init_catchpoint (c.get (), gdbarch, tempflag, NULL, ops);
2f5404b3 362 c->syscalls_to_be_caught = std::move (filter);
10304ef3 363
b270e6f9 364 install_breakpoint (0, std::move (c), 1);
10304ef3
SDJ
365}
366
e12c9b7a
TT
367/* Splits the argument using space as delimiter. */
368
369static std::vector<int>
eb4c3f4a 370catch_syscall_split_args (const char *arg)
10304ef3 371{
e12c9b7a 372 std::vector<int> result;
10304ef3
SDJ
373 struct gdbarch *gdbarch = target_gdbarch ();
374
375 while (*arg != '\0')
376 {
377 int i, syscall_number;
378 char *endptr;
379 char cur_name[128];
380 struct syscall s;
381
382 /* Skip whitespace. */
383 arg = skip_spaces (arg);
384
385 for (i = 0; i < 127 && arg[i] && !isspace (arg[i]); ++i)
386 cur_name[i] = arg[i];
387 cur_name[i] = '\0';
388 arg += i;
389
e3487908 390 /* Check if the user provided a syscall name, group, or a number. */
10304ef3
SDJ
391 syscall_number = (int) strtol (cur_name, &endptr, 0);
392 if (*endptr == '\0')
e3487908
GKB
393 {
394 get_syscall_by_number (gdbarch, syscall_number, &s);
e12c9b7a 395 result.push_back (s.number);
e3487908
GKB
396 }
397 else if (startswith (cur_name, "g:")
398 || startswith (cur_name, "group:"))
399 {
400 /* We have a syscall group. Let's expand it into a syscall
401 list before inserting. */
e3487908
GKB
402 const char *group_name;
403
404 /* Skip over "g:" and "group:" prefix strings. */
405 group_name = strchr (cur_name, ':') + 1;
406
4794efbf 407 if (!get_syscalls_by_group (gdbarch, group_name, &result))
e3487908 408 error (_("Unknown syscall group '%s'."), group_name);
e3487908 409 }
10304ef3
SDJ
410 else
411 {
e9076973
JB
412 /* We have a name. Let's check if it's valid and fetch a
413 list of matching numbers. */
414 if (!get_syscalls_by_name (gdbarch, cur_name, &result))
10304ef3
SDJ
415 /* Here we have to issue an error instead of a warning,
416 because GDB cannot do anything useful if there's no
417 syscall number to be caught. */
418 error (_("Unknown syscall name '%s'."), cur_name);
e3487908 419 }
10304ef3
SDJ
420 }
421
10304ef3
SDJ
422 return result;
423}
424
425/* Implement the "catch syscall" command. */
426
427static void
eb4c3f4a 428catch_syscall_command_1 (const char *arg, int from_tty,
10304ef3
SDJ
429 struct cmd_list_element *command)
430{
431 int tempflag;
e12c9b7a 432 std::vector<int> filter;
10304ef3
SDJ
433 struct syscall s;
434 struct gdbarch *gdbarch = get_current_arch ();
435
436 /* Checking if the feature if supported. */
437 if (gdbarch_get_syscall_number_p (gdbarch) == 0)
438 error (_("The feature 'catch syscall' is not supported on \
439this architecture yet."));
440
441 tempflag = get_cmd_context (command) == CATCH_TEMPORARY;
442
443 arg = skip_spaces (arg);
444
445 /* We need to do this first "dummy" translation in order
446 to get the syscall XML file loaded or, most important,
447 to display a warning to the user if there's no XML file
448 for his/her architecture. */
449 get_syscall_by_number (gdbarch, 0, &s);
450
451 /* The allowed syntax is:
452 catch syscall
453 catch syscall <name | number> [<name | number> ... <name | number>]
454
455 Let's check if there's a syscall name. */
456
457 if (arg != NULL)
458 filter = catch_syscall_split_args (arg);
10304ef3 459
e12c9b7a 460 create_syscall_event_catchpoint (tempflag, std::move (filter),
10304ef3
SDJ
461 &catch_syscall_breakpoint_ops);
462}
463
464
465/* Returns 0 if 'bp' is NOT a syscall catchpoint,
466 non-zero otherwise. */
467static int
468is_syscall_catchpoint_enabled (struct breakpoint *bp)
469{
470 if (syscall_catchpoint_p (bp)
471 && bp->enable_state != bp_disabled
472 && bp->enable_state != bp_call_disabled)
473 return 1;
474 else
475 return 0;
476}
477
478int
479catch_syscall_enabled (void)
480{
481 struct catch_syscall_inferior_data *inf_data
482 = get_catch_syscall_inferior_data (current_inferior ());
483
484 return inf_data->total_syscalls_count != 0;
485}
486
487/* Helper function for catching_syscall_number. If B is a syscall
488 catchpoint for SYSCALL_NUMBER, return 1 (which will make
489 'breakpoint_find_if' return). Otherwise, return 0. */
490
491static int
492catching_syscall_number_1 (struct breakpoint *b,
493 void *data)
494{
495 int syscall_number = (int) (uintptr_t) data;
496
497 if (is_syscall_catchpoint_enabled (b))
498 {
499 struct syscall_catchpoint *c = (struct syscall_catchpoint *) b;
500
e12c9b7a 501 if (!c->syscalls_to_be_caught.empty ())
10304ef3 502 {
e12c9b7a 503 for (int iter : c->syscalls_to_be_caught)
10304ef3
SDJ
504 if (syscall_number == iter)
505 return 1;
506 }
507 else
508 return 1;
509 }
510
511 return 0;
512}
513
514int
515catching_syscall_number (int syscall_number)
516{
517 struct breakpoint *b = breakpoint_find_if (catching_syscall_number_1,
518 (void *) (uintptr_t) syscall_number);
519
520 return b != NULL;
521}
522
523/* Complete syscall names. Used by "catch syscall". */
eb3ff9a5
PA
524
525static void
10304ef3 526catch_syscall_completer (struct cmd_list_element *cmd,
eb3ff9a5 527 completion_tracker &tracker,
10304ef3
SDJ
528 const char *text, const char *word)
529{
e3487908 530 struct gdbarch *gdbarch = get_current_arch ();
3d415c26 531 gdb::unique_xmalloc_ptr<const char *> group_list;
e3487908 532 const char *prefix;
e3487908
GKB
533
534 /* Completion considers ':' to be a word separator, so we use this to
535 verify whether the previous word was a group prefix. If so, we
536 build the completion list using group names only. */
537 for (prefix = word; prefix != text && prefix[-1] != ' '; prefix--)
538 ;
539
540 if (startswith (prefix, "g:") || startswith (prefix, "group:"))
541 {
542 /* Perform completion inside 'group:' namespace only. */
3d415c26 543 group_list.reset (get_syscall_group_names (gdbarch));
eb3ff9a5 544 if (group_list != NULL)
3d415c26 545 complete_on_enum (tracker, group_list.get (), word, word);
e3487908
GKB
546 }
547 else
548 {
549 /* Complete with both, syscall names and groups. */
3d415c26
TT
550 gdb::unique_xmalloc_ptr<const char *> syscall_list
551 (get_syscall_names (gdbarch));
552 group_list.reset (get_syscall_group_names (gdbarch));
553
554 const char **group_ptr = group_list.get ();
555
556 /* Hold on to strings while we're using them. */
557 std::vector<std::string> holders;
e3487908
GKB
558
559 /* Append "group:" prefix to syscall groups. */
9a93831c
SM
560 for (int i = 0; group_ptr[i] != NULL; i++)
561 holders.push_back (string_printf ("group:%s", group_ptr[i]));
e3487908 562
9a93831c
SM
563 for (int i = 0; group_ptr[i] != NULL; i++)
564 group_ptr[i] = holders[i].c_str ();
e3487908 565
eb3ff9a5 566 if (syscall_list != NULL)
3d415c26 567 complete_on_enum (tracker, syscall_list.get (), word, word);
eb3ff9a5 568 if (group_list != NULL)
3d415c26 569 complete_on_enum (tracker, group_ptr, word, word);
e3487908 570 }
10304ef3
SDJ
571}
572
573static void
574clear_syscall_counts (struct inferior *inf)
575{
576 struct catch_syscall_inferior_data *inf_data
577 = get_catch_syscall_inferior_data (inf);
578
579 inf_data->total_syscalls_count = 0;
580 inf_data->any_syscall_count = 0;
b6f48cb0 581 inf_data->syscalls_counts.clear ();
10304ef3
SDJ
582}
583
584static void
585initialize_syscall_catchpoint_ops (void)
586{
587 struct breakpoint_ops *ops;
588
589 initialize_breakpoint_ops ();
590
591 /* Syscall catchpoints. */
592 ops = &catch_syscall_breakpoint_ops;
593 *ops = base_breakpoint_ops;
10304ef3
SDJ
594 ops->insert_location = insert_catch_syscall;
595 ops->remove_location = remove_catch_syscall;
596 ops->breakpoint_hit = breakpoint_hit_catch_syscall;
597 ops->print_it = print_it_catch_syscall;
598 ops->print_one = print_one_catch_syscall;
599 ops->print_mention = print_mention_catch_syscall;
600 ops->print_recreate = print_recreate_catch_syscall;
601}
602
10304ef3
SDJ
603void
604_initialize_break_catch_syscall (void)
605{
606 initialize_syscall_catchpoint_ops ();
607
76727919 608 gdb::observers::inferior_exit.attach (clear_syscall_counts);
10304ef3
SDJ
609
610 add_catch_command ("syscall", _("\
e3487908
GKB
611Catch system calls by their names, groups and/or numbers.\n\
612Arguments say which system calls to catch. If no arguments are given,\n\
613every system call will be caught. Arguments, if given, should be one\n\
614or more system call names (if your system supports that), system call\n\
615groups or system call numbers."),
10304ef3
SDJ
616 catch_syscall_command_1,
617 catch_syscall_completer,
618 CATCH_PERMANENT,
619 CATCH_TEMPORARY);
620}
This page took 0.409363 seconds and 4 git commands to generate.