/external/autotest/client/site_tests/security_ptraceRestrictions/src/ |
D | thread-prctl.c | 49 pid_t tracer, tracee; variable 88 printf("tracer to PTRACE_ATTACH my tracee %d\n", tracee); in tracer_main() 89 ptrace_result = ptrace(PTRACE_ATTACH, tracee, NULL, NULL); in tracer_main() 99 waitpid(tracee, NULL, 0); in tracer_main() 102 ptrace_result = ptrace(PTRACE_CONT, tracee, NULL, NULL); in tracer_main() 123 tracee = getpid(); in tracee_main() 126 printf("tracee %d reading tracer pid\n", tracee); in tracee_main() 136 printf("tracee %d started (expecting %d as tracer)\n", tracee, tracer); in tracee_main() 170 tracee = fork(); in start_tracee() 171 if (tracee < 0) { in start_tracee() [all …]
|
/external/strace/ |
D | README-linux-ptrace | 16 debugged. Therefore, "tracee" always means "(one) thread", never "a 18 a specific tracee using ptrace(PTRACE_foo, pid, ...), where pid is a 21 After attachment, each tracee can be in two states: running or stopped. 23 There are many kinds of states when tracee is stopped, and in ptrace 27 In this document, any stopped state in which tracee is ready to accept 38 not a ptrace-stop (because tracer can't query tracee status such as 39 register contents, cannot restart tracee etc) but the notification 44 tracee only), and only after it is injected by tracer (or after it was 55 Tracer can kill a tracee with ptrace(PTRACE_KILL, pid, 0, 0). This 61 When tracee executes exit syscall, it reports its death to its tracer. [all …]
|
D | NEWS | 159 * Warning is now issued when a tracee with unsupported personality 210 * Changes of tracee personalities are reported more reliably. 211 * Fixed the case when strace attaches to a tracee being inside exec and its 584 macros of the tracee's architecture and personality. 593 be read from tracee's memory, strace now prints its address consistently. 626 * Fixed potential short read of strings from tracee's memory. 834 * strace no longer detaches from a tracee which is supposed
|
D | ChangeLog | 1695 * alpha/set_error.c (arch_set_error): Set alpha_r3 to 1, update tracee's 1698 update tracee's PT_CCR. 4959 There is no need to call unwind_tcb_init before the tracee is attached. 7709 In order to have the same view as tracee has, with regards to 8023 if tracee is in compat personality. 8375 behaviour indeed screwed all the syscall state tracking for the tracee. 8382 if the tracee is not on exiting syscall. 8406 because the latter leaves the tracee in a ptrace stop. 9289 Issue a warning when strace lacks tracee personality support. 9557 Since they call tracee-specific socket/sendmsg/recvmsg, we'd like to [all …]
|
D | ChangeLog-CVS | 1299 Block interrupting signals since the first tracee has been attached.
|
/external/seccomp-tests/linux/ |
D | seccomp_bpf.c | 1022 pid_t tracee, int status, void *args); 1024 void tracer(struct __test_metadata *_metadata, int fd, pid_t tracee, in tracer() argument 1038 ret = ptrace(PTRACE_ATTACH, tracee, NULL, 0); in tracer() 1040 kill(tracee, SIGKILL); in tracer() 1045 ret = ptrace(PTRACE_SETOPTIONS, tracee, NULL, PTRACE_O_TRACESECCOMP); in tracer() 1048 kill(tracee, SIGKILL); in tracer() 1050 ptrace(PTRACE_CONT, tracee, NULL, 0); in tracer() 1060 if (wait(&status) != tracee) in tracer() 1069 tracer_func(_metadata, tracee, status, args); in tracer() 1071 ret = ptrace(PTRACE_CONT, tracee, NULL, NULL); in tracer() [all …]
|
/external/linux-kselftest/tools/testing/selftests/seccomp/ |
D | seccomp_bpf.c | 1327 pid_t tracee, int status, void *args); 1329 void start_tracer(struct __test_metadata *_metadata, int fd, pid_t tracee, in start_tracer() argument 1343 ret = ptrace(PTRACE_ATTACH, tracee, NULL, 0); in start_tracer() 1345 kill(tracee, SIGKILL); in start_tracer() 1350 ret = ptrace(PTRACE_SETOPTIONS, tracee, NULL, ptrace_syscall ? in start_tracer() 1355 kill(tracee, SIGKILL); in start_tracer() 1358 tracee, NULL, 0); in start_tracer() 1369 if (wait(&status) != tracee) in start_tracer() 1378 tracer_func(_metadata, tracee, status, args); in start_tracer() 1381 tracee, NULL, 0); in start_tracer() [all …]
|
/external/strace/tests-m32/ |
D | test_ucopy.c | 108 int status, tracee; in test_ucopy() local 111 tracee = wait(&status); in test_ucopy() 112 if (tracee != pid) { in test_ucopy()
|
D | ptrace.c | 112 int status, tracee, saved; in test_peeksiginfo() local 115 tracee = wait(&status); in test_peeksiginfo() 116 if (tracee <= 0) { in test_peeksiginfo()
|
/external/strace/tests-mx32/ |
D | test_ucopy.c | 108 int status, tracee; in test_ucopy() local 111 tracee = wait(&status); in test_ucopy() 112 if (tracee != pid) { in test_ucopy()
|
D | ptrace.c | 112 int status, tracee, saved; in test_peeksiginfo() local 115 tracee = wait(&status); in test_peeksiginfo() 116 if (tracee <= 0) { in test_peeksiginfo()
|
/external/strace/tests/ |
D | test_ucopy.c | 108 int status, tracee; in test_ucopy() local 111 tracee = wait(&status); in test_ucopy() 112 if (tracee != pid) { in test_ucopy()
|
D | ptrace.c | 112 int status, tracee, saved; in test_peeksiginfo() local 115 tracee = wait(&status); in test_peeksiginfo() 116 if (tracee <= 0) { in test_peeksiginfo()
|
/external/linux-kselftest/android/patches/ |
D | 0017-seccomp_bpf_disable_tests.patch | 68 @@ -1717,8 +1725,10 @@ void tracer_ptrace(struct __test_metadata *_metadata, pid_t tracee, 71 change_syscall(_metadata, tracee, __NR_getppid); 74 change_syscall(_metadata, tracee, -1);
|
/external/autotest/client/site_tests/security_SeccompSyscallFilters/src/ |
D | seccomp_bpf_tests.c | 752 void tracer(struct __test_metadata *_metadata, pid_t tracee, in tracer() argument 765 ret = ptrace(PTRACE_ATTACH, tracee, NULL, 0); in tracer() 768 kill(tracee, SIGKILL); in tracer() 773 ret = ptrace(PTRACE_SETOPTIONS, tracee, NULL, PTRACE_O_TRACESECCOMP); in tracer() 776 kill(tracee, SIGKILL); in tracer() 778 ptrace(PTRACE_CONT, tracee, NULL, 0); in tracer() 788 if (wait(&status) != tracee) in tracer() 797 ret = ptrace(PTRACE_GETEVENTMSG, tracee, NULL, &msg); in tracer() 801 kill(tracee, SIGKILL); in tracer() 808 ret = ptrace(PTRACE_POKEDATA, tracee, poke_addr, 0x1001); in tracer() [all …]
|