Home
last modified time | relevance | path

Searched refs:tracee (Results 1 – 15 of 15) sorted by relevance

/external/autotest/client/site_tests/security_ptraceRestrictions/src/
Dthread-prctl.c49 pid_t tracer, tracee; variable
88 printf("tracer to PTRACE_ATTACH my tracee %d\n", tracee); in tracer_main()
89 ptrace_result = ptrace(PTRACE_ATTACH, tracee, NULL, NULL); in tracer_main()
99 waitpid(tracee, NULL, 0); in tracer_main()
102 ptrace_result = ptrace(PTRACE_CONT, tracee, NULL, NULL); in tracer_main()
123 tracee = getpid(); in tracee_main()
126 printf("tracee %d reading tracer pid\n", tracee); in tracee_main()
136 printf("tracee %d started (expecting %d as tracer)\n", tracee, tracer); in tracee_main()
170 tracee = fork(); in start_tracee()
171 if (tracee < 0) { in start_tracee()
[all …]
/external/strace/
DREADME-linux-ptrace16 debugged. Therefore, "tracee" always means "(one) thread", never "a
18 a specific tracee using ptrace(PTRACE_foo, pid, ...), where pid is a
21 After attachment, each tracee can be in two states: running or stopped.
23 There are many kinds of states when tracee is stopped, and in ptrace
27 In this document, any stopped state in which tracee is ready to accept
38 not a ptrace-stop (because tracer can't query tracee status such as
39 register contents, cannot restart tracee etc) but the notification
44 tracee only), and only after it is injected by tracer (or after it was
55 Tracer can kill a tracee with ptrace(PTRACE_KILL, pid, 0, 0). This
61 When tracee executes exit syscall, it reports its death to its tracer.
[all …]
DNEWS159 * Warning is now issued when a tracee with unsupported personality
210 * Changes of tracee personalities are reported more reliably.
211 * Fixed the case when strace attaches to a tracee being inside exec and its
584 macros of the tracee's architecture and personality.
593 be read from tracee's memory, strace now prints its address consistently.
626 * Fixed potential short read of strings from tracee's memory.
834 * strace no longer detaches from a tracee which is supposed
DChangeLog1695 * alpha/set_error.c (arch_set_error): Set alpha_r3 to 1, update tracee's
1698 update tracee's PT_CCR.
4959 There is no need to call unwind_tcb_init before the tracee is attached.
7709 In order to have the same view as tracee has, with regards to
8023 if tracee is in compat personality.
8375 behaviour indeed screwed all the syscall state tracking for the tracee.
8382 if the tracee is not on exiting syscall.
8406 because the latter leaves the tracee in a ptrace stop.
9289 Issue a warning when strace lacks tracee personality support.
9557 Since they call tracee-specific socket/sendmsg/recvmsg, we'd like to
[all …]
DChangeLog-CVS1299 Block interrupting signals since the first tracee has been attached.
/external/seccomp-tests/linux/
Dseccomp_bpf.c1022 pid_t tracee, int status, void *args);
1024 void tracer(struct __test_metadata *_metadata, int fd, pid_t tracee, in tracer() argument
1038 ret = ptrace(PTRACE_ATTACH, tracee, NULL, 0); in tracer()
1040 kill(tracee, SIGKILL); in tracer()
1045 ret = ptrace(PTRACE_SETOPTIONS, tracee, NULL, PTRACE_O_TRACESECCOMP); in tracer()
1048 kill(tracee, SIGKILL); in tracer()
1050 ptrace(PTRACE_CONT, tracee, NULL, 0); in tracer()
1060 if (wait(&status) != tracee) in tracer()
1069 tracer_func(_metadata, tracee, status, args); in tracer()
1071 ret = ptrace(PTRACE_CONT, tracee, NULL, NULL); in tracer()
[all …]
/external/linux-kselftest/tools/testing/selftests/seccomp/
Dseccomp_bpf.c1327 pid_t tracee, int status, void *args);
1329 void start_tracer(struct __test_metadata *_metadata, int fd, pid_t tracee, in start_tracer() argument
1343 ret = ptrace(PTRACE_ATTACH, tracee, NULL, 0); in start_tracer()
1345 kill(tracee, SIGKILL); in start_tracer()
1350 ret = ptrace(PTRACE_SETOPTIONS, tracee, NULL, ptrace_syscall ? in start_tracer()
1355 kill(tracee, SIGKILL); in start_tracer()
1358 tracee, NULL, 0); in start_tracer()
1369 if (wait(&status) != tracee) in start_tracer()
1378 tracer_func(_metadata, tracee, status, args); in start_tracer()
1381 tracee, NULL, 0); in start_tracer()
[all …]
/external/strace/tests-m32/
Dtest_ucopy.c108 int status, tracee; in test_ucopy() local
111 tracee = wait(&status); in test_ucopy()
112 if (tracee != pid) { in test_ucopy()
Dptrace.c112 int status, tracee, saved; in test_peeksiginfo() local
115 tracee = wait(&status); in test_peeksiginfo()
116 if (tracee <= 0) { in test_peeksiginfo()
/external/strace/tests-mx32/
Dtest_ucopy.c108 int status, tracee; in test_ucopy() local
111 tracee = wait(&status); in test_ucopy()
112 if (tracee != pid) { in test_ucopy()
Dptrace.c112 int status, tracee, saved; in test_peeksiginfo() local
115 tracee = wait(&status); in test_peeksiginfo()
116 if (tracee <= 0) { in test_peeksiginfo()
/external/strace/tests/
Dtest_ucopy.c108 int status, tracee; in test_ucopy() local
111 tracee = wait(&status); in test_ucopy()
112 if (tracee != pid) { in test_ucopy()
Dptrace.c112 int status, tracee, saved; in test_peeksiginfo() local
115 tracee = wait(&status); in test_peeksiginfo()
116 if (tracee <= 0) { in test_peeksiginfo()
/external/linux-kselftest/android/patches/
D0017-seccomp_bpf_disable_tests.patch68 @@ -1717,8 +1725,10 @@ void tracer_ptrace(struct __test_metadata *_metadata, pid_t tracee,
71 change_syscall(_metadata, tracee, __NR_getppid);
74 change_syscall(_metadata, tracee, -1);
/external/autotest/client/site_tests/security_SeccompSyscallFilters/src/
Dseccomp_bpf_tests.c752 void tracer(struct __test_metadata *_metadata, pid_t tracee, in tracer() argument
765 ret = ptrace(PTRACE_ATTACH, tracee, NULL, 0); in tracer()
768 kill(tracee, SIGKILL); in tracer()
773 ret = ptrace(PTRACE_SETOPTIONS, tracee, NULL, PTRACE_O_TRACESECCOMP); in tracer()
776 kill(tracee, SIGKILL); in tracer()
778 ptrace(PTRACE_CONT, tracee, NULL, 0); in tracer()
788 if (wait(&status) != tracee) in tracer()
797 ret = ptrace(PTRACE_GETEVENTMSG, tracee, NULL, &msg); in tracer()
801 kill(tracee, SIGKILL); in tracer()
808 ret = ptrace(PTRACE_POKEDATA, tracee, poke_addr, 0x1001); in tracer()
[all …]