/system/core/debuggerd/arm/ |
D | machine.cpp | 33 if (ptrace(PTRACE_GETREGS, backtrace->Tid(), 0, ®s)) { in dump_memory_and_code() 53 if (ptrace(PTRACE_GETREGS, tid, 0, &r)) { in dump_registers() 73 if (ptrace(PTRACE_GETVFPREGS, tid, 0, &vfp_regs)) { in dump_registers()
|
/system/core/debuggerd/arm64/ |
D | machine.cpp | 39 if (ptrace(PTRACE_GETREGSET, backtrace->Tid(), reinterpret_cast<void*>(NT_PRSTATUS), &io) == -1) { in dump_memory_and_code() 61 if (ptrace(PTRACE_GETREGSET, tid, (void*) NT_PRSTATUS, (void*) &io) == -1) { in dump_registers() 85 if (ptrace(PTRACE_GETREGSET, tid, (void*) NT_PRFPREG, (void*) &io) == -1) { in dump_registers()
|
/system/sepolicy/ |
D | recovery_persist.te | 21 # ptrace any other app 22 neverallow recovery_persist domain:process ptrace;
|
D | recovery_refresh.te | 19 # ptrace any other app 20 neverallow recovery_refresh domain:process ptrace;
|
D | isolated_app.te | 22 # Google Breakpad (crash reporter for Chrome) relies on ptrace 23 # functionality. Without the ability to ptrace, the crash reporter 27 allow isolated_app self:process ptrace;
|
D | audioserver.te | 24 # ptrace to processes in the same domain for memory leak detection 25 allow audioserver self:process ptrace;
|
D | logd.te | 51 # ptrace any other app 52 neverallow logd domain:process ptrace;
|
D | keystore.te | 32 neverallow * keystore:process ptrace;
|
D | mediaserver.te | 19 # ptrace to processes in the same domain for memory leak detection 20 allow mediaserver self:process ptrace;
|
D | netd.te | 88 # ptrace any other app 89 neverallow netd { domain }:process ptrace;
|
D | debuggerd.te | 21 }:process { ptrace getattr };
|
D | mls | 26 mlsconstrain process { getsched getsession getpgid getcap getattr ptrace share } 30 mlsconstrain process { sigkill sigstop signal setsched setpgid setcap setrlimit ptrace share }
|
D | priv_app.te | 11 # webview crash handling depends on self ptrace (b/27697529, b/20150694, b/19277529#comment7) 12 allow priv_app self:process ptrace;
|
D | perfprofd.te | 44 neverallow perfprofd domain:process ptrace;
|
D | untrusted_app.te | 89 # gdbserver for ndk-gdb ptrace attaches to app process. 90 allow untrusted_app self:process ptrace;
|
/system/core/debuggerd/x86/ |
D | machine.cpp | 32 if (ptrace(PTRACE_GETREGS, backtrace->Tid(), 0, &r) == -1) { in dump_memory_and_code() 49 if (ptrace(PTRACE_GETREGS, tid, 0, &r) == -1) { in dump_registers()
|
/system/core/debuggerd/x86_64/ |
D | machine.cpp | 33 if (ptrace(PTRACE_GETREGS, backtrace->Tid(), 0, &r) == -1) { in dump_memory_and_code() 50 if (ptrace(PTRACE_GETREGS, tid, 0, &r) == -1) { in dump_registers()
|
/system/core/libmemunreachable/ |
D | ThreadCapture.cpp | 179 if (ptrace(PTRACE_DETACH, tid, NULL, sig_ptr) < 0 && errno != ESRCH) { in PtraceDetach() 188 int ret = ptrace(PTRACE_SEIZE, tid, NULL, NULL); in PtraceAttach() 199 if (ptrace(PTRACE_INTERRUPT, tid, 0, 0) < 0) { in PtraceAttach() 221 if (ptrace(PTRACE_GETREGSET, tid, reinterpret_cast<void*>(NT_PRSTATUS), &iovec)) { in PtraceThreadInfo()
|
D | README.md | 40 4. *Collection process*: All threads in the original process are paused with `ptrace()`. 42 …locations are re-enabled using `malloc_enable()`, but all threads are still paused with `ptrace()`. 44 8. Collection process releases all threads from `ptrace` and exits
|
/system/core/debuggerd/mips/ |
D | machine.cpp | 37 if (ptrace(PTRACE_GETREGS, backtrace->Tid(), 0, &r)) { in dump_memory_and_code() 66 if(ptrace(PTRACE_GETREGS, tid, 0, &r)) { in dump_registers()
|
/system/core/debuggerd/mips64/ |
D | machine.cpp | 37 if (ptrace(PTRACE_GETREGS, backtrace->Tid(), 0, &r)) { in dump_memory_and_code() 66 if(ptrace(PTRACE_GETREGS, tid, 0, &r)) { in dump_registers()
|
/system/core/libbacktrace/ |
D | backtrace_test.cpp | 110 while (ptrace(PTRACE_GETSIGINFO, pid, 0, &si) < 0 && (errno == EINTR || errno == ESRCH)) { in WaitForStop() 313 if (ptrace(PTRACE_ATTACH, ptrace_tid, 0, 0) == 0) { in VerifyProcTest() 332 ASSERT_TRUE(ptrace(PTRACE_DETACH, ptrace_tid, 0, 0) == 0); in VerifyProcTest() 456 ASSERT_TRUE(ptrace(PTRACE_ATTACH, pid, 0, 0) == 0); in TEST() 465 ASSERT_TRUE(ptrace(PTRACE_DETACH, pid, 0, 0) == 0); in TEST() 919 ASSERT_TRUE(ptrace(PTRACE_ATTACH, pid, 0, 0) == 0); in TEST() 927 ASSERT_TRUE(ptrace(PTRACE_DETACH, pid, 0, 0) == 0); in TEST() 1084 if (ptrace(PTRACE_ATTACH, pid, 0, 0) == 0) { in TEST() 1107 ASSERT_TRUE(ptrace(PTRACE_DETACH, pid, 0, 0) == 0); in TEST() 1253 ASSERT_TRUE(ptrace(PTRACE_ATTACH, pid, 0, 0) == 0); in TEST() [all …]
|
D | BacktracePtrace.cpp | 38 *out_value = ptrace(PTRACE_PEEKTEXT, tid, reinterpret_cast<void*>(addr), nullptr); in PtraceRead()
|
/system/core/debuggerd/ |
D | debuggerd.cpp | 446 if (ptrace(PTRACE_ATTACH, tid, 0, 0) < 0) { in ptrace_siblings() 481 if (ptrace(PTRACE_CONT, request.tid, 0, 0) != 0) { in perform_dump() 571 if (ptrace(PTRACE_ATTACH, request.tid, 0, 0) != 0) { in worker_process() 638 if (ptrace(PTRACE_DETACH, request.tid, 0, 0) != 0) { in worker_process() 643 ptrace(PTRACE_DETACH, sibling, 0, 0); in worker_process()
|
D | tombstone.cpp | 182 if (ptrace(PTRACE_GETSIGINFO, tid, 0, &si) == -1) { in dump_signal_info() 364 if (ptrace(PTRACE_GETSIGINFO, tid, 0, &si) != -1) { in dump_all_maps()
|