/external/autotest/client/site_tests/security_ptraceRestrictions/src/ |
D | thread-prctl.c | 49 pid_t tracer, tracee; variable 88 printf("tracer to PTRACE_ATTACH my tracee %d\n", tracee); in tracer_main() 89 ptrace_result = ptrace(PTRACE_ATTACH, tracee, NULL, NULL); in tracer_main() 99 waitpid(tracee, NULL, 0); in tracer_main() 102 ptrace_result = ptrace(PTRACE_CONT, tracee, NULL, NULL); in tracer_main() 123 tracee = getpid(); in tracee_main() 126 printf("tracee %d reading tracer pid\n", tracee); in tracee_main() 136 printf("tracee %d started (expecting %d as tracer)\n", tracee, tracer); in tracee_main() 170 tracee = fork(); in start_tracee() 171 if (tracee < 0) { in start_tracee() [all …]
|
/external/strace/ |
D | README-linux-ptrace | 16 debugged. Therefore, "tracee" always means "(one) thread", never "a 18 a specific tracee using ptrace(PTRACE_foo, pid, ...), where pid is a 21 After attachment, each tracee can be in two states: running or stopped. 23 There are many kinds of states when tracee is stopped, and in ptrace 27 In this document, any stopped state in which tracee is ready to accept 38 not a ptrace-stop (because tracer can't query tracee status such as 39 register contents, cannot restart tracee etc) but the notification 44 tracee only), and only after it is injected by tracer (or after it was 55 Tracer can kill a tracee with ptrace(PTRACE_KILL, pid, 0, 0). This 61 When tracee executes exit syscall, it reports its death to its tracer. [all …]
|
D | NEWS | 6 * Warning is now issued when a tracee with unsupported personality 57 * Changes of tracee personalities are reported more reliably. 58 * Fixed the case when strace attaches to a tracee being inside exec and its 431 macros of the tracee's architecture and personality. 440 be read from tracee's memory, strace now prints its address consistently. 473 * Fixed potential short read of strings from tracee's memory. 681 * strace no longer detaches from a tracee which is supposed
|
D | ChangeLog | 147 In order to have the same view as tracee has, with regards to 461 if tracee is in compat personality. 813 behaviour indeed screwed all the syscall state tracking for the tracee. 820 if the tracee is not on exiting syscall. 844 because the latter leaves the tracee in a ptrace stop. 1727 Issue a warning when strace lacks tracee personality support. 1995 Since they call tracee-specific socket/sendmsg/recvmsg, we'd like to 2038 In preparation to passing tcp to all tracee-related syscalls. 5670 forward it to the unexpected tracee, and detach the tracee. 5741 printpath: do not fetch more than PATH_MAX bytes from tracee's memory. [all …]
|
D | ChangeLog-CVS | 1299 Block interrupting signals since the first tracee has been attached.
|
/external/seccomp-tests/linux/ |
D | seccomp_bpf.c | 1022 pid_t tracee, int status, void *args); 1024 void tracer(struct __test_metadata *_metadata, int fd, pid_t tracee, in tracer() argument 1038 ret = ptrace(PTRACE_ATTACH, tracee, NULL, 0); in tracer() 1040 kill(tracee, SIGKILL); in tracer() 1045 ret = ptrace(PTRACE_SETOPTIONS, tracee, NULL, PTRACE_O_TRACESECCOMP); in tracer() 1048 kill(tracee, SIGKILL); in tracer() 1050 ptrace(PTRACE_CONT, tracee, NULL, 0); in tracer() 1060 if (wait(&status) != tracee) in tracer() 1069 tracer_func(_metadata, tracee, status, args); in tracer() 1071 ret = ptrace(PTRACE_CONT, tracee, NULL, NULL); in tracer() [all …]
|
/external/linux-kselftest/tools/testing/selftests/seccomp/ |
D | seccomp_bpf.c | 1314 pid_t tracee, int status, void *args); 1316 void start_tracer(struct __test_metadata *_metadata, int fd, pid_t tracee, in start_tracer() argument 1330 ret = ptrace(PTRACE_ATTACH, tracee, NULL, 0); in start_tracer() 1332 kill(tracee, SIGKILL); in start_tracer() 1337 ret = ptrace(PTRACE_SETOPTIONS, tracee, NULL, ptrace_syscall ? in start_tracer() 1342 kill(tracee, SIGKILL); in start_tracer() 1345 tracee, NULL, 0); in start_tracer() 1356 if (wait(&status) != tracee) in start_tracer() 1365 tracer_func(_metadata, tracee, status, args); in start_tracer() 1368 tracee, NULL, 0); in start_tracer() [all …]
|
/external/strace/tests/ |
D | test_ucopy.c | 108 int status, tracee; in test_ucopy() local 111 tracee = wait(&status); in test_ucopy() 112 if (tracee != pid) { in test_ucopy()
|
D | ptrace.c | 109 int status, tracee, saved; in test_peeksiginfo() local 112 tracee = wait(&status); in test_peeksiginfo() 113 if (tracee <= 0) { in test_peeksiginfo()
|
/external/strace/tests-m32/ |
D | test_ucopy.c | 108 int status, tracee; in test_ucopy() local 111 tracee = wait(&status); in test_ucopy() 112 if (tracee != pid) { in test_ucopy()
|
D | ptrace.c | 109 int status, tracee, saved; in test_peeksiginfo() local 112 tracee = wait(&status); in test_peeksiginfo() 113 if (tracee <= 0) { in test_peeksiginfo()
|
/external/strace/tests-mx32/ |
D | test_ucopy.c | 108 int status, tracee; in test_ucopy() local 111 tracee = wait(&status); in test_ucopy() 112 if (tracee != pid) { in test_ucopy()
|
D | ptrace.c | 109 int status, tracee, saved; in test_peeksiginfo() local 112 tracee = wait(&status); in test_peeksiginfo() 113 if (tracee <= 0) { in test_peeksiginfo()
|
/external/linux-kselftest/android/patches/ |
D | 0017-seccomp_bpf_disable_tests.patch | 68 @@ -1717,8 +1725,10 @@ void tracer_ptrace(struct __test_metadata *_metadata, pid_t tracee, 71 change_syscall(_metadata, tracee, __NR_getppid); 74 change_syscall(_metadata, tracee, -1);
|
/external/autotest/client/site_tests/security_SeccompSyscallFilters/src/ |
D | seccomp_bpf_tests.c | 760 void tracer(struct __test_metadata *_metadata, pid_t tracee, in tracer() argument 773 ret = ptrace(PTRACE_ATTACH, tracee, NULL, 0); in tracer() 776 kill(tracee, SIGKILL); in tracer() 781 ret = ptrace(PTRACE_SETOPTIONS, tracee, NULL, PTRACE_O_TRACESECCOMP); in tracer() 784 kill(tracee, SIGKILL); in tracer() 786 ptrace(PTRACE_CONT, tracee, NULL, 0); in tracer() 796 if (wait(&status) != tracee) in tracer() 805 ret = ptrace(PTRACE_GETEVENTMSG, tracee, NULL, &msg); in tracer() 809 kill(tracee, SIGKILL); in tracer() 816 ret = ptrace(PTRACE_POKEDATA, tracee, poke_addr, 0x1001); in tracer() [all …]
|