Home
last modified time | relevance | path

Searched refs:ptrace (Results 1 – 25 of 31) sorted by relevance

12

/system/core/debuggerd/arm/
Dmachine.cpp33 if (ptrace(PTRACE_GETREGS, backtrace->Tid(), 0, &regs)) { in dump_memory_and_code()
53 if (ptrace(PTRACE_GETREGS, tid, 0, &r)) { in dump_registers()
73 if (ptrace(PTRACE_GETVFPREGS, tid, 0, &vfp_regs)) { in dump_registers()
/system/core/debuggerd/arm64/
Dmachine.cpp39 if (ptrace(PTRACE_GETREGSET, backtrace->Tid(), reinterpret_cast<void*>(NT_PRSTATUS), &io) == -1) { in dump_memory_and_code()
61 if (ptrace(PTRACE_GETREGSET, tid, (void*) NT_PRSTATUS, (void*) &io) == -1) { in dump_registers()
85 if (ptrace(PTRACE_GETREGSET, tid, (void*) NT_PRFPREG, (void*) &io) == -1) { in dump_registers()
/system/sepolicy/
Drecovery_persist.te21 # ptrace any other app
22 neverallow recovery_persist domain:process ptrace;
Drecovery_refresh.te19 # ptrace any other app
20 neverallow recovery_refresh domain:process ptrace;
Disolated_app.te22 # Google Breakpad (crash reporter for Chrome) relies on ptrace
23 # functionality. Without the ability to ptrace, the crash reporter
27 allow isolated_app self:process ptrace;
Daudioserver.te24 # ptrace to processes in the same domain for memory leak detection
25 allow audioserver self:process ptrace;
Dlogd.te51 # ptrace any other app
52 neverallow logd domain:process ptrace;
Dkeystore.te32 neverallow * keystore:process ptrace;
Dmediaserver.te19 # ptrace to processes in the same domain for memory leak detection
20 allow mediaserver self:process ptrace;
Dnetd.te88 # ptrace any other app
89 neverallow netd { domain }:process ptrace;
Ddebuggerd.te21 }:process { ptrace getattr };
Dmls26 mlsconstrain process { getsched getsession getpgid getcap getattr ptrace share }
30 mlsconstrain process { sigkill sigstop signal setsched setpgid setcap setrlimit ptrace share }
Dpriv_app.te11 # webview crash handling depends on self ptrace (b/27697529, b/20150694, b/19277529#comment7)
12 allow priv_app self:process ptrace;
Dperfprofd.te44 neverallow perfprofd domain:process ptrace;
Duntrusted_app.te89 # gdbserver for ndk-gdb ptrace attaches to app process.
90 allow untrusted_app self:process ptrace;
/system/core/debuggerd/x86/
Dmachine.cpp32 if (ptrace(PTRACE_GETREGS, backtrace->Tid(), 0, &r) == -1) { in dump_memory_and_code()
49 if (ptrace(PTRACE_GETREGS, tid, 0, &r) == -1) { in dump_registers()
/system/core/debuggerd/x86_64/
Dmachine.cpp33 if (ptrace(PTRACE_GETREGS, backtrace->Tid(), 0, &r) == -1) { in dump_memory_and_code()
50 if (ptrace(PTRACE_GETREGS, tid, 0, &r) == -1) { in dump_registers()
/system/core/libmemunreachable/
DThreadCapture.cpp179 if (ptrace(PTRACE_DETACH, tid, NULL, sig_ptr) < 0 && errno != ESRCH) { in PtraceDetach()
188 int ret = ptrace(PTRACE_SEIZE, tid, NULL, NULL); in PtraceAttach()
199 if (ptrace(PTRACE_INTERRUPT, tid, 0, 0) < 0) { in PtraceAttach()
221 if (ptrace(PTRACE_GETREGSET, tid, reinterpret_cast<void*>(NT_PRSTATUS), &iovec)) { in PtraceThreadInfo()
DREADME.md40 4. *Collection process*: All threads in the original process are paused with `ptrace()`.
42 …locations are re-enabled using `malloc_enable()`, but all threads are still paused with `ptrace()`.
44 8. Collection process releases all threads from `ptrace` and exits
/system/core/debuggerd/mips/
Dmachine.cpp37 if (ptrace(PTRACE_GETREGS, backtrace->Tid(), 0, &r)) { in dump_memory_and_code()
66 if(ptrace(PTRACE_GETREGS, tid, 0, &r)) { in dump_registers()
/system/core/debuggerd/mips64/
Dmachine.cpp37 if (ptrace(PTRACE_GETREGS, backtrace->Tid(), 0, &r)) { in dump_memory_and_code()
66 if(ptrace(PTRACE_GETREGS, tid, 0, &r)) { in dump_registers()
/system/core/libbacktrace/
Dbacktrace_test.cpp110 while (ptrace(PTRACE_GETSIGINFO, pid, 0, &si) < 0 && (errno == EINTR || errno == ESRCH)) { in WaitForStop()
313 if (ptrace(PTRACE_ATTACH, ptrace_tid, 0, 0) == 0) { in VerifyProcTest()
332 ASSERT_TRUE(ptrace(PTRACE_DETACH, ptrace_tid, 0, 0) == 0); in VerifyProcTest()
456 ASSERT_TRUE(ptrace(PTRACE_ATTACH, pid, 0, 0) == 0); in TEST()
465 ASSERT_TRUE(ptrace(PTRACE_DETACH, pid, 0, 0) == 0); in TEST()
919 ASSERT_TRUE(ptrace(PTRACE_ATTACH, pid, 0, 0) == 0); in TEST()
927 ASSERT_TRUE(ptrace(PTRACE_DETACH, pid, 0, 0) == 0); in TEST()
1084 if (ptrace(PTRACE_ATTACH, pid, 0, 0) == 0) { in TEST()
1107 ASSERT_TRUE(ptrace(PTRACE_DETACH, pid, 0, 0) == 0); in TEST()
1253 ASSERT_TRUE(ptrace(PTRACE_ATTACH, pid, 0, 0) == 0); in TEST()
[all …]
DBacktracePtrace.cpp38 *out_value = ptrace(PTRACE_PEEKTEXT, tid, reinterpret_cast<void*>(addr), nullptr); in PtraceRead()
/system/core/debuggerd/
Ddebuggerd.cpp446 if (ptrace(PTRACE_ATTACH, tid, 0, 0) < 0) { in ptrace_siblings()
481 if (ptrace(PTRACE_CONT, request.tid, 0, 0) != 0) { in perform_dump()
571 if (ptrace(PTRACE_ATTACH, request.tid, 0, 0) != 0) { in worker_process()
638 if (ptrace(PTRACE_DETACH, request.tid, 0, 0) != 0) { in worker_process()
643 ptrace(PTRACE_DETACH, sibling, 0, 0); in worker_process()
Dtombstone.cpp182 if (ptrace(PTRACE_GETSIGINFO, tid, 0, &si) == -1) { in dump_signal_info()
364 if (ptrace(PTRACE_GETSIGINFO, tid, 0, &si) != -1) { in dump_all_maps()

12