aboutsummaryrefslogtreecommitdiff
path: root/gdb
diff options
context:
space:
mode:
Diffstat (limited to 'gdb')
-rw-r--r--gdb/ChangeLog45
-rw-r--r--gdb/doc/ChangeLog5
-rw-r--r--gdb/doc/gdb.texinfo143
-rw-r--r--gdb/gdbserver/ChangeLog14
-rw-r--r--gdb/gdbserver/linux-low.c9
-rw-r--r--gdb/gdbserver/server.c14
-rw-r--r--gdb/gdbserver/thread-db.c2
-rw-r--r--gdb/gdbsupport/gdb-dlfcn.h4
-rw-r--r--gdb/inf-ptrace.c17
-rw-r--r--gdb/inf-ptrace.h10
-rw-r--r--gdb/linux-nat.c9
-rw-r--r--gdb/nat/fork-inferior.c4
-rw-r--r--gdb/nat/fork-inferior.h7
-rw-r--r--gdb/nat/linux-ptrace.c192
-rw-r--r--gdb/nat/linux-ptrace.h27
-rw-r--r--gdb/remote.c16
16 files changed, 487 insertions, 31 deletions
diff --git a/gdb/ChangeLog b/gdb/ChangeLog
index f323cf6..37626bd 100644
--- a/gdb/ChangeLog
+++ b/gdb/ChangeLog
@@ -1,3 +1,48 @@
+2019-09-26 Sergio Durigan Junior <sergiodj@redhat.com>
+ Jan Kratochvil <jan.kratochvil@redhat.com>
+ Pedro Alves <palves@redhat.com>
+
+ * gdbsupport/gdb-dlfcn.h (gdb_dlopen): Update comment and
+ mention that the function throws an error.
+ * inf-ptrace.c (default_inf_ptrace_me_fail_reason): New
+ function.
+ (inf_ptrace_me_fail_reason): New variable.
+ (inf_ptrace_me): Update call to 'trace_start_error_with_name'.
+ * inf-ptrace.h (inf_ptrace_me_fail_reason): New variable.
+ * linux-nat.c (attach_proc_task_lwp_callback): Call
+ 'linux_ptrace_attach_fail_reason_lwp'.
+ (linux_nat_target::attach): Update call to
+ 'linux_ptrace_attach_fail_reason'.
+ (_initialize_linux_nat): Set 'inf_ptrace_me_fail_reason'.
+ * nat/fork-inferior.c (trace_start_error_with_name): Add
+ optional 'append' argument.
+ * nat/fork-inferior.h (trace_start_error_with_name): Update
+ prototype.
+ * nat/linux-ptrace.c: Include "gdbsupport/gdb-dlfcn.h",
+ "gdbsupport/filestuff.h" and "nat/fork-inferior.h".
+ (selinux_ftype): New typedef.
+ (linux_ptrace_restricted_fail_reason): New function.
+ (linux_ptrace_attach_fail_reason_1): New function.
+ (linux_ptrace_attach_fail_reason): Change first argument type
+ from 'ptid_t' to 'pid_t'. Call
+ 'linux_ptrace_attach_fail_reason_1' and
+ 'linux_ptrace_restricted_fail_reason'.
+ (linux_ptrace_attach_fail_reason_lwp): New function.
+ (linux_ptrace_me_fail_reason): New function.
+ (errno_pipe): New variable.
+ (linux_fork_to_function): Initialize pipe before forking.
+ (linux_child_function): Deal with errno-passing from child.
+ Handle ptrace error.
+ (linux_check_child_ptrace_errno): New function.
+ (linux_check_child_ptrace_errno): Call
+ 'linux_check_child_ptrace_errno'.
+ * nat/linux-ptrace.h (linux_ptrace_attach_fail_reason): Update
+ prototype.
+ (linux_ptrace_attach_fail_reason_lwp): New prototype.
+ (linux_ptrace_me_fail_reason): New prototype.
+ * remote.c (extended_remote_target::attach): Handle error
+ message passed by the server when attach fails.
+
2019-09-26 Christian Biesinger <cbiesinger@google.com>
* blockframe.c (find_pc_partial_function): Change return type to bool.
diff --git a/gdb/doc/ChangeLog b/gdb/doc/ChangeLog
index 0a10fa3..003c8c2 100644
--- a/gdb/doc/ChangeLog
+++ b/gdb/doc/ChangeLog
@@ -1,3 +1,8 @@
+2019-09-26 Sergio Durigan Junior <sergiodj@redhat.com>
+
+ * gdb.texinfo (Linux kernel ptrace restrictions): New appendix
+ section.
+
2019-09-20 Ulrich Weigand <uweigand@de.ibm.com>
* doc/gdb.texinfo (Remote Configuration): Remove documentation for
diff --git a/gdb/doc/gdb.texinfo b/gdb/doc/gdb.texinfo
index f2713c0..e7b5b18 100644
--- a/gdb/doc/gdb.texinfo
+++ b/gdb/doc/gdb.texinfo
@@ -182,6 +182,9 @@ software in general. We will miss him.
@value{GDBN}
* Operating System Information:: Getting additional information from
the operating system
+* Linux kernel ptrace restrictions:: Restrictions sometimes
+ imposed by the Linux
+ kernel on @code{ptrace}
* Trace File Format:: GDB trace file format
* Index Section Format:: .gdb_index section format
* Man Pages:: Manual pages
@@ -44665,6 +44668,146 @@ should contain a comma-separated list of cores that this process
is running on. Target may provide additional columns,
which @value{GDBN} currently ignores.
+@node Linux kernel ptrace restrictions
+@appendix Linux kernel @code{ptrace} restrictions
+@cindex linux kernel ptrace restrictions, attach
+
+The @code{ptrace} system call is used by @value{GDBN} and
+@code{gdbserver} on GNU/Linux to, among other things, attach to a new
+or existing inferior in order to start debugging it. Due to security
+concerns, some distributions and vendors disable or severely restrict
+the ability to perform these operations, which can make @value{GDBN}
+or @code{gdbserver} malfunction. In this section, we will expand on
+how this malfunction can manifest itself, and how to modify the
+system's settings in order to be able to use @value{GDBN} and
+@code{gdbserver} properly.
+
+@menu
+* The error message:: The error message displayed when the
+ system prevents @value{GDBN}
+ or @code{gdbserver} from using
+ @code{ptrace}
+* SELinux's deny_ptrace:: SELinux and the @code{deny_ptrace} option
+* Yama's ptrace_scope:: Yama and the @code{ptrace_scope} setting
+* Docker and seccomp:: Docker and the @code{seccomp}
+ infrastructure
+@end menu
+
+@node The error message
+@appendixsection The error message
+
+When the system prevents @value{GDBN} or @code{gdbserver} from using
+the @code{ptrace} system call, you will likely see a descriptive error
+message explaining what is wrong and how to attempt to fix the
+problem. For example, when SELinux's @code{deny_ptrace} option is
+enabled, you can see:
+
+@smallexample
+$ gdb program
+...
+(@value{GDBP}) run
+Starting program: program
+warning: Could not trace the inferior process.
+Error:
+warning: ptrace: Permission denied
+The SELinux 'deny_ptrace' option is enabled and preventing @value{GDBN}
+from using 'ptrace'. You can disable it by executing (as root):
+
+ setsebool deny_ptrace off
+
+If you are debugging the inferior remotely, the instruction(s) above must
+be performed in the target system (e.g., where GDBserver is running).
+During startup program exited with code 127.
+(@value{GDBP})
+@end smallexample
+
+Sometimes, it may not be possible to acquire the necessary data to
+determine the root cause of the failure. In this case, you will see a
+generic error message pointing you to this section:
+
+@smallexample
+$ gdb program
+...
+Starting program: program
+warning: Could not trace the inferior process.
+Error:
+warning: ptrace: Permission denied
+There might be restrictions preventing ptrace from working. Please see
+the appendix "Linux kernel ptrace restrictions" in the GDB documentation
+for more details.
+During startup program exited with code 127.
+(@value{GDBP})
+@end smallexample
+
+@node SELinux's deny_ptrace
+@appendixsection SELinux's @code{deny_ptrace}
+@cindex SELinux
+@cindex deny_ptrace
+
+If you are using SELinux, you might want to check whether the
+@code{deny_ptrace} option is enabled by doing:
+
+@smallexample
+$ getsebool deny_ptrace
+deny_ptrace --> on
+@end smallexample
+
+If the option is enabled, you can disable it by doing, as root:
+
+@smallexample
+# setsebool deny_ptrace off
+@end smallexample
+
+The option will be disabled until the next reboot. If you would like
+to disable it permanently, you can do (as root):
+
+@smallexample
+# setsebool -P deny_ptrace off
+@end smallexample
+
+@node Yama's ptrace_scope
+@appendixsection Yama's @code{ptrace_scope}
+@cindex yama, ptrace_scope
+
+If your system has Yama enabled, you might want to check whether the
+@code{ptrace_scope} setting is enabled by checking the value of
+@file{/proc/sys/kernel/yama/ptrace_scope}:
+
+@smallexample
+$ cat /proc/sys/kernel/yama/ptrace_scope
+0
+@end smallexample
+
+If you see anything other than @code{0}, @value{GDBN} or
+@code{gdbserver} can be affected by it. You can temporarily disable
+the feature by doing, as root:
+
+@smallexample
+# sysctl kernel.yama.ptrace_scope=0
+kernel.yama.ptrace_scope = 0
+@end smallexample
+
+You can make this permanent by doing, as root:
+
+@smallexample
+# sysctl -w kernel.yama.ptrace_scope=0
+kernel.yama.ptrace_scope = 0
+@end smallexample
+
+@node Docker and seccomp
+@appendixsection Docker and @code{seccomp}
+@cindex docker, seccomp
+
+If you are using Docker (@uref{https://www.docker.com/}) containers,
+you will probably have to disable its @code{seccomp} protections in
+order to be able to use @value{GDBN} or @code{gdbserver}. To do that,
+you can use the options @code{--cap-add=SYS_PTRACE --security-opt
+seccomp=unconfined} when invoking Docker:
+
+@smallexample
+$ docker run --cap-add=SYS_PTRACE --security-opt seccomp=unconfined
+@end smallexample
+
@node Trace File Format
@appendix Trace File Format
@cindex trace file format
diff --git a/gdb/gdbserver/ChangeLog b/gdb/gdbserver/ChangeLog
index c0c6f51..e60980d 100644
--- a/gdb/gdbserver/ChangeLog
+++ b/gdb/gdbserver/ChangeLog
@@ -1,3 +1,17 @@
+2019-09-26 Sergio Durigan Junior <sergiodj@redhat.com>
+ Pedro Alves <palves@redhat.com>
+
+ * linux-low.c (linux_ptrace_fun): Call
+ 'linux_ptrace_me_fail_reason'.
+ (attach_proc_task_lwp_callback): Call
+ 'linux_ptrace_attach_fail_reason_lwp'.
+ (linux_attach): Call 'linux_ptrace_attach_fail_reason'.
+ * server.c (handle_v_attach): Use try..catch when calling
+ 'attach_inferior', and send an error message to the client
+ when needed.
+ * thread-db.c (attach_thread): Call
+ 'linux_ptrace_attach_fail_reason_lwp'.
+
2019-09-20 Christian Biesinger <cbiesinger@google.com>
* debug.c (debug_threads): Remove comment in favor of the header.
diff --git a/gdb/gdbserver/linux-low.c b/gdb/gdbserver/linux-low.c
index d64c364..c0e15c1 100644
--- a/gdb/gdbserver/linux-low.c
+++ b/gdb/gdbserver/linux-low.c
@@ -967,7 +967,8 @@ linux_ptrace_fun ()
{
if (ptrace (PTRACE_TRACEME, 0, (PTRACE_TYPE_ARG3) 0,
(PTRACE_TYPE_ARG4) 0) < 0)
- trace_start_error_with_name ("ptrace");
+ trace_start_error_with_name ("ptrace",
+ linux_ptrace_me_fail_reason (errno).c_str ());
if (setpgid (0, 0) < 0)
trace_start_error_with_name ("setpgid");
@@ -1165,7 +1166,7 @@ attach_proc_task_lwp_callback (ptid_t ptid)
else if (err != 0)
{
std::string reason
- = linux_ptrace_attach_fail_reason_string (ptid, err);
+ = linux_ptrace_attach_fail_reason_lwp (ptid, err);
warning (_("Cannot attach to lwp %d: %s"), lwpid, reason.c_str ());
}
@@ -1197,8 +1198,8 @@ linux_attach (unsigned long pid)
{
remove_process (proc);
- std::string reason = linux_ptrace_attach_fail_reason_string (ptid, err);
- error ("Cannot attach to process %ld: %s", pid, reason.c_str ());
+ std::string reason = linux_ptrace_attach_fail_reason (pid, err);
+ error (_("Cannot attach to process %ld: %s"), pid, reason.c_str ());
}
/* Don't ignore the initial SIGSTOP if we just attached to this
diff --git a/gdb/gdbserver/server.c b/gdb/gdbserver/server.c
index 67e8e3e..976ecbd 100644
--- a/gdb/gdbserver/server.c
+++ b/gdb/gdbserver/server.c
@@ -2893,9 +2893,21 @@ handle_v_attach (char *own_buf)
{
client_state &cs = get_client_state ();
int pid;
+ int ret;
pid = strtol (own_buf + 8, NULL, 16);
- if (pid != 0 && attach_inferior (pid) == 0)
+
+ try
+ {
+ ret = attach_inferior (pid);
+ }
+ catch (const gdb_exception_error &e)
+ {
+ snprintf (own_buf, PBUFSIZ, "E.%s", e.what ());
+ return 0;
+ }
+
+ if (pid != 0 && ret == 0)
{
/* Don't report shared library events after attaching, even if
some libraries are preloaded. GDB will always poll the
diff --git a/gdb/gdbserver/thread-db.c b/gdb/gdbserver/thread-db.c
index c6b43a0..e3acf83 100644
--- a/gdb/gdbserver/thread-db.c
+++ b/gdb/gdbserver/thread-db.c
@@ -224,7 +224,7 @@ attach_thread (const td_thrhandle_t *th_p, td_thrinfo_t *ti_p)
err = linux_attach_lwp (ptid);
if (err != 0)
{
- std::string reason = linux_ptrace_attach_fail_reason_string (ptid, err);
+ std::string reason = linux_ptrace_attach_fail_reason_lwp (ptid, err);
warning ("Could not attach to thread %ld (LWP %d): %s",
(unsigned long) ti_p->ti_tid, ti_p->ti_lid, reason.c_str ());
diff --git a/gdb/gdbsupport/gdb-dlfcn.h b/gdb/gdbsupport/gdb-dlfcn.h
index 6a39d38..e933b7a 100644
--- a/gdb/gdbsupport/gdb-dlfcn.h
+++ b/gdb/gdbsupport/gdb-dlfcn.h
@@ -32,8 +32,8 @@ struct dlclose_deleter
typedef std::unique_ptr<void, dlclose_deleter> gdb_dlhandle_up;
/* Load the dynamic library file named FILENAME, and return a handle
- for that dynamic library. Return NULL if the loading fails for any
- reason. */
+ for that dynamic library. Throw an error if the loading fails for
+ any reason. */
gdb_dlhandle_up gdb_dlopen (const char *filename);
diff --git a/gdb/inf-ptrace.c b/gdb/inf-ptrace.c
index 4a8e732..b792af0 100644
--- a/gdb/inf-ptrace.c
+++ b/gdb/inf-ptrace.c
@@ -94,6 +94,20 @@ inf_ptrace_target::remove_fork_catchpoint (int pid)
#endif /* PT_GET_PROCESS_STATE */
+/* Default method for "inf_ptrace_me_fail_reason", which returns an
+ empty string. */
+
+static std::string
+default_inf_ptrace_me_fail_reason (int err)
+{
+ return {};
+}
+
+/* See inf-ptrace.h. */
+
+std::string (*inf_ptrace_me_fail_reason) (int err)
+ = default_inf_ptrace_me_fail_reason;
+
/* Prepare to be traced. */
static void
@@ -101,7 +115,8 @@ inf_ptrace_me (void)
{
/* "Trace me, Dr. Memory!" */
if (ptrace (PT_TRACE_ME, 0, (PTRACE_TYPE_ARG3) 0, 0) < 0)
- trace_start_error_with_name ("ptrace");
+ trace_start_error_with_name ("ptrace",
+ inf_ptrace_me_fail_reason (errno).c_str ());
}
/* Start a new inferior Unix child process. EXEC_FILE is the file to
diff --git a/gdb/inf-ptrace.h b/gdb/inf-ptrace.h
index 98b5d2e..7cdab9a 100644
--- a/gdb/inf-ptrace.h
+++ b/gdb/inf-ptrace.h
@@ -83,4 +83,14 @@ protected:
extern pid_t get_ptrace_pid (ptid_t);
+/* Pointer to "inf_ptrace_me_fail_reason", which implements a function
+ that can be called by "inf_ptrace_me" in order to obtain the reason
+ for a ptrace failure. ERR is the ERRNO value set by the failing
+ ptrace call.
+
+ This pointer can be overriden by targets that want to personalize
+ the error message printed when ptrace fails (see linux-nat.c, for
+ example). */
+extern std::string (*inf_ptrace_me_fail_reason) (int err);
+
#endif
diff --git a/gdb/linux-nat.c b/gdb/linux-nat.c
index cd5cf18..2c7ded7 100644
--- a/gdb/linux-nat.c
+++ b/gdb/linux-nat.c
@@ -1132,7 +1132,7 @@ attach_proc_task_lwp_callback (ptid_t ptid)
else
{
std::string reason
- = linux_ptrace_attach_fail_reason_string (ptid, err);
+ = linux_ptrace_attach_fail_reason_lwp (ptid, err);
warning (_("Cannot attach to lwp %d: %s"),
lwpid, reason.c_str ());
@@ -1187,8 +1187,9 @@ linux_nat_target::attach (const char *args, int from_tty)
}
catch (const gdb_exception_error &ex)
{
+ int saved_errno = errno;
pid_t pid = parse_pid_to_attach (args);
- std::string reason = linux_ptrace_attach_fail_reason (pid);
+ std::string reason = linux_ptrace_attach_fail_reason (pid, saved_errno);
if (!reason.empty ())
throw_error (ex.error, "warning: %s\n%s", reason.c_str (),
@@ -4567,6 +4568,10 @@ Enables printf debugging output."),
sigemptyset (&blocked_mask);
lwp_lwpid_htab_create ();
+
+ /* Set the proper function to generate a message when ptrace
+ fails. */
+ inf_ptrace_me_fail_reason = linux_ptrace_me_fail_reason;
}
diff --git a/gdb/nat/fork-inferior.c b/gdb/nat/fork-inferior.c
index 355e9be..2ead4a4 100644
--- a/gdb/nat/fork-inferior.c
+++ b/gdb/nat/fork-inferior.c
@@ -591,7 +591,7 @@ trace_start_error (const char *fmt, ...)
/* See nat/fork-inferior.h. */
void
-trace_start_error_with_name (const char *string)
+trace_start_error_with_name (const char *string, const char *append)
{
- trace_start_error ("%s: %s", string, safe_strerror (errno));
+ trace_start_error ("%s: %s%s", string, safe_strerror (errno), append);
}
diff --git a/gdb/nat/fork-inferior.h b/gdb/nat/fork-inferior.h
index 065496c..405f2cf 100644
--- a/gdb/nat/fork-inferior.h
+++ b/gdb/nat/fork-inferior.h
@@ -98,9 +98,10 @@ extern void trace_start_error (const char *fmt, ...)
ATTRIBUTE_NORETURN ATTRIBUTE_PRINTF (1, 2);
/* Like "trace_start_error", but the error message is constructed by
- combining STRING with the system error message for errno. This
- function does not return. */
-extern void trace_start_error_with_name (const char *string)
+ combining STRING with the system error message for errno, and
+ (optionally) with APPEND. This function does not return. */
+extern void trace_start_error_with_name (const char *string,
+ const char *append = "")
ATTRIBUTE_NORETURN;
#endif /* NAT_FORK_INFERIOR_H */
diff --git a/gdb/nat/linux-ptrace.c b/gdb/nat/linux-ptrace.c
index c1ebc0a..8a048d2 100644
--- a/gdb/nat/linux-ptrace.c
+++ b/gdb/nat/linux-ptrace.c
@@ -21,6 +21,9 @@
#include "linux-procfs.h"
#include "linux-waitpid.h"
#include "gdbsupport/buffer.h"
+#include "gdbsupport/gdb-dlfcn.h"
+#include "nat/fork-inferior.h"
+#include "gdbsupport/filestuff.h"
#ifdef HAVE_SYS_PROCFS_H
#include <sys/procfs.h>
#endif
@@ -30,11 +33,94 @@
of 0 means there are no supported features. */
static int supported_ptrace_options = -1;
-/* Find all possible reasons we could fail to attach PID and return these
- as a string. An empty string is returned if we didn't find any reason. */
+typedef int (*selinux_ftype) (const char *);
-std::string
-linux_ptrace_attach_fail_reason (pid_t pid)
+/* Helper function which checks if ptrace is probably restricted
+ (i.e., if ERR is either EACCES or EPERM), and returns a string with
+ possible workarounds. */
+
+static std::string
+linux_ptrace_restricted_fail_reason (int err)
+{
+ if (err != EACCES && err != EPERM)
+ {
+ /* It just makes sense to perform the checks below if errno was
+ either EACCES or EPERM. */
+ return {};
+ }
+
+ std::string ret;
+ gdb_dlhandle_up handle;
+
+ try
+ {
+ handle = gdb_dlopen ("libselinux.so.1");
+ }
+ catch (const gdb_exception_error &e)
+ {
+ handle.reset (nullptr);
+ }
+
+ if (handle != nullptr)
+ {
+ selinux_ftype selinux_get_bool
+ = (selinux_ftype) gdb_dlsym (handle, "security_get_boolean_active");
+
+ if (selinux_get_bool != NULL
+ && (*selinux_get_bool) ("deny_ptrace") == 1)
+ string_appendf (ret,
+ _("\n\
+The SELinux 'deny_ptrace' option is enabled and preventing GDB\n\
+from using 'ptrace'. You can disable it by executing (as root):\n\
+\n\
+ setsebool deny_ptrace off\n"));
+ }
+
+ gdb_file_up yama_ptrace_scope
+ = gdb_fopen_cloexec ("/proc/sys/kernel/yama/ptrace_scope", "r");
+
+ if (yama_ptrace_scope != nullptr)
+ {
+ char yama_scope = fgetc (yama_ptrace_scope.get ());
+
+ if (yama_scope != '0')
+ string_appendf (ret,
+ _("\n\
+The Linux kernel's Yama ptrace scope is in effect, which can prevent\n\
+GDB from using 'ptrace'. You can disable it by executing (as root):\n\
+\n\
+ echo 0 > /proc/sys/kernel/yama/ptrace_scope\n"));
+ }
+
+ if (ret.empty ())
+ {
+ /* It wasn't possible to determine the exact reason for the
+ ptrace error. Let's just emit a generic error message
+ pointing the user to our documentation, where she can find
+ instructions on how to try to diagnose the problem. */
+ ret = _("\n\
+There might be restrictions preventing ptrace from working. Please see\n\
+the appendix \"Linux kernel ptrace restrictions\" in the GDB documentation\n\
+for more details.");
+ }
+
+ /* The user may be debugging remotely, so we have to warn that
+ the instructions above should be performed in the target. */
+ string_appendf (ret,
+ _("\n\
+If you are debugging the inferior remotely, the ptrace restriction(s) must\n\
+be disabled in the target system (e.g., where GDBserver is running)."));
+
+ return ret;
+}
+
+/* Find all possible reasons we could fail to attach PID and return
+ these as a string. An empty string is returned if we didn't find
+ any reason. Helper for linux_ptrace_attach_fail_reason and
+ linux_ptrace_attach_fail_reason_lwp. */
+
+static std::string
+linux_ptrace_attach_fail_reason_1 (pid_t pid)
{
pid_t tracerpid = linux_proc_get_tracerpid_nowarn (pid);
std::string result;
@@ -56,10 +142,24 @@ linux_ptrace_attach_fail_reason (pid_t pid)
/* See linux-ptrace.h. */
std::string
-linux_ptrace_attach_fail_reason_string (ptid_t ptid, int err)
+linux_ptrace_attach_fail_reason (pid_t pid, int err)
+{
+ std::string result = linux_ptrace_attach_fail_reason_1 (pid);
+ std::string ptrace_restrict = linux_ptrace_restricted_fail_reason (err);
+
+ if (!ptrace_restrict.empty ())
+ result += "\n" + ptrace_restrict;
+
+ return result;
+}
+
+/* See linux-ptrace.h. */
+
+std::string
+linux_ptrace_attach_fail_reason_lwp (ptid_t ptid, int err)
{
long lwpid = ptid.lwp ();
- std::string reason = linux_ptrace_attach_fail_reason (lwpid);
+ std::string reason = linux_ptrace_attach_fail_reason_1 (lwpid);
if (!reason.empty ())
return string_printf ("%s (%d), %s", safe_strerror (err), err,
@@ -68,6 +168,14 @@ linux_ptrace_attach_fail_reason_string (ptid_t ptid, int err)
return string_printf ("%s (%d)", safe_strerror (err), err);
}
+/* See linux-ptrace.h. */
+
+std::string
+linux_ptrace_me_fail_reason (int err)
+{
+ return linux_ptrace_restricted_fail_reason (err);
+}
+
#if defined __i386__ || defined __x86_64__
/* Address of the 'ret' instruction in asm code block below. */
@@ -257,6 +365,12 @@ linux_ptrace_test_ret_to_nx (void)
#endif /* defined __i386__ || defined __x86_64__ */
}
+/* If the PTRACE_TRACEME call on linux_child_function errors, we need
+ to be able to send ERRNO back to the parent so that it can check
+ whether there are restrictions in place preventing ptrace from
+ working. We do that with a pipe. */
+static int errno_pipe[2];
+
/* Helper function to fork a process and make the child process call
the function FUNCTION, passing CHILD_STACK as parameter.
@@ -273,6 +387,11 @@ linux_fork_to_function (gdb_byte *child_stack, int (*function) (void *))
/* Sanity check the function pointer. */
gdb_assert (function != NULL);
+ /* Create the pipe that will be used by the child to pass ERRNO
+ after the PTRACE_TRACEME call. */
+ if (pipe (errno_pipe) != 0)
+ trace_start_error_with_name ("pipe");
+
#if defined(__UCLIBC__) && defined(HAS_NOMMU)
#define STACK_SIZE 4096
@@ -321,7 +440,21 @@ linux_grandchild_function (void *child_stack)
static int
linux_child_function (void *child_stack)
{
- ptrace (PTRACE_TRACEME, 0, (PTRACE_TYPE_ARG3) 0, (PTRACE_TYPE_ARG4) 0);
+ /* Close read end. */
+ close (errno_pipe[0]);
+
+ int ret = ptrace (PTRACE_TRACEME, 0, (PTRACE_TYPE_ARG3) 0,
+ (PTRACE_TYPE_ARG4) 0);
+ int ptrace_errno = errno;
+
+ /* Write ERRNO to the pipe, even if it's zero, and close the writing
+ end of the pipe. */
+ write (errno_pipe[1], &ptrace_errno, sizeof (ptrace_errno));
+ close (errno_pipe[1]);
+
+ if (ret != 0)
+ _exit (0);
+
kill (getpid (), SIGSTOP);
/* Fork a grandchild. */
@@ -336,6 +469,48 @@ static void linux_test_for_tracesysgood (int child_pid);
static void linux_test_for_tracefork (int child_pid);
static void linux_test_for_exitkill (int child_pid);
+/* Helper function to wait for the child to send us the ptrace ERRNO,
+ and check if it's OK. */
+
+static void
+linux_check_child_ptrace_errno ()
+{
+ int child_errno;
+ fd_set rset;
+ struct timeval timeout;
+
+ /* Close the writing end of the pipe. */
+ close (errno_pipe[1]);
+
+ FD_ZERO (&rset);
+ FD_SET (errno_pipe[0], &rset);
+
+ /* One second should be plenty of time to wait for the child's
+ reply. */
+ timeout.tv_sec = 1;
+ timeout.tv_usec = 0;
+
+ int ret = select (errno_pipe[0] + 1, &rset, NULL, NULL, &timeout);
+
+ if (ret < 0)
+ trace_start_error_with_name ("select");
+ else if (ret == 0)
+ error (_("Timeout while waiting for child's ptrace errno"));
+ else
+ read (errno_pipe[0], &child_errno, sizeof (child_errno));
+
+ if (child_errno != 0)
+ {
+ /* The child can't use PTRACE_TRACEME. We just bail out. */
+ std::string reason = linux_ptrace_restricted_fail_reason (child_errno);
+
+ errno = child_errno;
+ trace_start_error_with_name ("ptrace", reason.c_str ());
+ }
+
+ close (errno_pipe[0]);
+}
+
/* Determine ptrace features available on this target. */
void
@@ -352,6 +527,9 @@ linux_check_ptrace_features (void)
reporting. */
child_pid = linux_fork_to_function (NULL, linux_child_function);
+ /* Check if the child can successfully use ptrace. */
+ linux_check_child_ptrace_errno ();
+
ret = my_waitpid (child_pid, &status, 0);
if (ret == -1)
perror_with_name (("waitpid"));
diff --git a/gdb/nat/linux-ptrace.h b/gdb/nat/linux-ptrace.h
index fd2f12a..90afb60 100644
--- a/gdb/nat/linux-ptrace.h
+++ b/gdb/nat/linux-ptrace.h
@@ -176,12 +176,27 @@ struct buffer;
# define TRAP_HWBKPT 4
#endif
-extern std::string linux_ptrace_attach_fail_reason (pid_t pid);
-
-/* Find all possible reasons we could have failed to attach to PTID
- and return them as a string. ERR is the error PTRACE_ATTACH failed
- with (an errno). */
-extern std::string linux_ptrace_attach_fail_reason_string (ptid_t ptid, int err);
+/* Find all possible reasons we could fail to attach PID and return
+ these as a string. An empty string is returned if we didn't find
+ any reason. If ERR is EACCES or EPERM, we also add a warning about
+ possible restrictions to use ptrace. */
+extern std::string linux_ptrace_attach_fail_reason (pid_t pid, int err);
+
+/* Find all possible reasons we could have failed to attach to PID's
+ LWPID and return them as a string. ERR is the error PTRACE_ATTACH
+ failed with (an errno). Unlike linux_ptrace_attach_fail_reason,
+ this function should be used when attaching to an LWP other than
+ the leader; it does not warn about ptrace restrictions. */
+extern std::string linux_ptrace_attach_fail_reason_lwp (ptid_t pid, int err);
+
+/* When the call to 'ptrace (PTRACE_TRACEME...' fails, and we have
+ already forked, this function can be called in order to try to
+ obtain the reason why ptrace failed. ERR should be the ERRNO value
+ returned by ptrace.
+
+ This function will return a 'std::string' containing the fail
+ reason, or an empty string otherwise. */
+extern std::string linux_ptrace_me_fail_reason (int err);
extern void linux_ptrace_init_warnings (void);
extern void linux_check_ptrace_features (void);
diff --git a/gdb/remote.c b/gdb/remote.c
index 21160e1..efc5084 100644
--- a/gdb/remote.c
+++ b/gdb/remote.c
@@ -5825,8 +5825,20 @@ extended_remote_target::attach (const char *args, int from_tty)
case PACKET_UNKNOWN:
error (_("This target does not support attaching to a process"));
default:
- error (_("Attaching to %s failed"),
- target_pid_to_str (ptid_t (pid)).c_str ());
+ {
+ std::string errmsg = rs->buf.data ();
+
+ if (!errmsg.empty ())
+ {
+ /* Get rid of the "E." prefix. */
+ errmsg.erase (0, 2);
+ }
+
+ error (_("Attaching to %s failed%s%s"),
+ target_pid_to_str (ptid_t (pid)).c_str (),
+ !errmsg.empty () ? "\n" : "",
+ errmsg.c_str ());
+ }
}
set_current_inferior (remote_add_inferior (false, pid, 1, 0));