Home
last modified time | relevance | path

Searched refs:tracee (Results 1 – 15 of 15) sorted by relevance

/external/autotest/client/site_tests/security_ptraceRestrictions/src/
Dthread-prctl.c49 pid_t tracer, tracee; variable
88 printf("tracer to PTRACE_ATTACH my tracee %d\n", tracee); in tracer_main()
89 ptrace_result = ptrace(PTRACE_ATTACH, tracee, NULL, NULL); in tracer_main()
99 waitpid(tracee, NULL, 0); in tracer_main()
102 ptrace_result = ptrace(PTRACE_CONT, tracee, NULL, NULL); in tracer_main()
123 tracee = getpid(); in tracee_main()
126 printf("tracee %d reading tracer pid\n", tracee); in tracee_main()
136 printf("tracee %d started (expecting %d as tracer)\n", tracee, tracer); in tracee_main()
170 tracee = fork(); in start_tracee()
171 if (tracee < 0) { in start_tracee()
[all …]
/external/strace/
DREADME-linux-ptrace16 debugged. Therefore, "tracee" always means "(one) thread", never "a
18 a specific tracee using ptrace(PTRACE_foo, pid, ...), where pid is a
21 After attachment, each tracee can be in two states: running or stopped.
23 There are many kinds of states when tracee is stopped, and in ptrace
27 In this document, any stopped state in which tracee is ready to accept
38 not a ptrace-stop (because tracer can't query tracee status such as
39 register contents, cannot restart tracee etc) but the notification
44 tracee only), and only after it is injected by tracer (or after it was
55 Tracer can kill a tracee with ptrace(PTRACE_KILL, pid, 0, 0). This
61 When tracee executes exit syscall, it reports its death to its tracer.
[all …]
DNEWS6 * Warning is now issued when a tracee with unsupported personality
57 * Changes of tracee personalities are reported more reliably.
58 * Fixed the case when strace attaches to a tracee being inside exec and its
431 macros of the tracee's architecture and personality.
440 be read from tracee's memory, strace now prints its address consistently.
473 * Fixed potential short read of strings from tracee's memory.
681 * strace no longer detaches from a tracee which is supposed
DChangeLog147 In order to have the same view as tracee has, with regards to
461 if tracee is in compat personality.
813 behaviour indeed screwed all the syscall state tracking for the tracee.
820 if the tracee is not on exiting syscall.
844 because the latter leaves the tracee in a ptrace stop.
1727 Issue a warning when strace lacks tracee personality support.
1995 Since they call tracee-specific socket/sendmsg/recvmsg, we'd like to
2038 In preparation to passing tcp to all tracee-related syscalls.
5670 forward it to the unexpected tracee, and detach the tracee.
5741 printpath: do not fetch more than PATH_MAX bytes from tracee's memory.
[all …]
DChangeLog-CVS1299 Block interrupting signals since the first tracee has been attached.
/external/seccomp-tests/linux/
Dseccomp_bpf.c1022 pid_t tracee, int status, void *args);
1024 void tracer(struct __test_metadata *_metadata, int fd, pid_t tracee, in tracer() argument
1038 ret = ptrace(PTRACE_ATTACH, tracee, NULL, 0); in tracer()
1040 kill(tracee, SIGKILL); in tracer()
1045 ret = ptrace(PTRACE_SETOPTIONS, tracee, NULL, PTRACE_O_TRACESECCOMP); in tracer()
1048 kill(tracee, SIGKILL); in tracer()
1050 ptrace(PTRACE_CONT, tracee, NULL, 0); in tracer()
1060 if (wait(&status) != tracee) in tracer()
1069 tracer_func(_metadata, tracee, status, args); in tracer()
1071 ret = ptrace(PTRACE_CONT, tracee, NULL, NULL); in tracer()
[all …]
/external/linux-kselftest/tools/testing/selftests/seccomp/
Dseccomp_bpf.c1314 pid_t tracee, int status, void *args);
1316 void start_tracer(struct __test_metadata *_metadata, int fd, pid_t tracee, in start_tracer() argument
1330 ret = ptrace(PTRACE_ATTACH, tracee, NULL, 0); in start_tracer()
1332 kill(tracee, SIGKILL); in start_tracer()
1337 ret = ptrace(PTRACE_SETOPTIONS, tracee, NULL, ptrace_syscall ? in start_tracer()
1342 kill(tracee, SIGKILL); in start_tracer()
1345 tracee, NULL, 0); in start_tracer()
1356 if (wait(&status) != tracee) in start_tracer()
1365 tracer_func(_metadata, tracee, status, args); in start_tracer()
1368 tracee, NULL, 0); in start_tracer()
[all …]
/external/strace/tests/
Dtest_ucopy.c108 int status, tracee; in test_ucopy() local
111 tracee = wait(&status); in test_ucopy()
112 if (tracee != pid) { in test_ucopy()
Dptrace.c109 int status, tracee, saved; in test_peeksiginfo() local
112 tracee = wait(&status); in test_peeksiginfo()
113 if (tracee <= 0) { in test_peeksiginfo()
/external/strace/tests-m32/
Dtest_ucopy.c108 int status, tracee; in test_ucopy() local
111 tracee = wait(&status); in test_ucopy()
112 if (tracee != pid) { in test_ucopy()
Dptrace.c109 int status, tracee, saved; in test_peeksiginfo() local
112 tracee = wait(&status); in test_peeksiginfo()
113 if (tracee <= 0) { in test_peeksiginfo()
/external/strace/tests-mx32/
Dtest_ucopy.c108 int status, tracee; in test_ucopy() local
111 tracee = wait(&status); in test_ucopy()
112 if (tracee != pid) { in test_ucopy()
Dptrace.c109 int status, tracee, saved; in test_peeksiginfo() local
112 tracee = wait(&status); in test_peeksiginfo()
113 if (tracee <= 0) { in test_peeksiginfo()
/external/linux-kselftest/android/patches/
D0017-seccomp_bpf_disable_tests.patch68 @@ -1717,8 +1725,10 @@ void tracer_ptrace(struct __test_metadata *_metadata, pid_t tracee,
71 change_syscall(_metadata, tracee, __NR_getppid);
74 change_syscall(_metadata, tracee, -1);
/external/autotest/client/site_tests/security_SeccompSyscallFilters/src/
Dseccomp_bpf_tests.c760 void tracer(struct __test_metadata *_metadata, pid_t tracee, in tracer() argument
773 ret = ptrace(PTRACE_ATTACH, tracee, NULL, 0); in tracer()
776 kill(tracee, SIGKILL); in tracer()
781 ret = ptrace(PTRACE_SETOPTIONS, tracee, NULL, PTRACE_O_TRACESECCOMP); in tracer()
784 kill(tracee, SIGKILL); in tracer()
786 ptrace(PTRACE_CONT, tracee, NULL, 0); in tracer()
796 if (wait(&status) != tracee) in tracer()
805 ret = ptrace(PTRACE_GETEVENTMSG, tracee, NULL, &msg); in tracer()
809 kill(tracee, SIGKILL); in tracer()
816 ret = ptrace(PTRACE_POKEDATA, tracee, poke_addr, 0x1001); in tracer()
[all …]