/external/strace/ |
D | README-linux-ptrace | 16 debugged. Therefore, "tracee" always means "(one) thread", never "a 18 a specific tracee using ptrace(PTRACE_foo, pid, ...), where pid is a 21 After attachment, each tracee can be in two states: running or stopped. 23 There are many kinds of states when tracee is stopped, and in ptrace 27 In this document, any stopped state in which tracee is ready to accept 38 not a ptrace-stop (because tracer can't query tracee status such as 39 register contents, cannot restart tracee etc) but the notification 44 tracee only), and only after it is injected by tracer (or after it was 55 Tracer can kill a tracee with ptrace(PTRACE_KILL, pid, 0, 0). This 61 When tracee executes exit syscall, it reports its death to its tracer. [all …]
|
D | NEWS | 159 * Warning is now issued when a tracee with unsupported personality 210 * Changes of tracee personalities are reported more reliably. 211 * Fixed the case when strace attaches to a tracee being inside exec and its 584 macros of the tracee's architecture and personality. 593 be read from tracee's memory, strace now prints its address consistently. 626 * Fixed potential short read of strings from tracee's memory. 834 * strace no longer detaches from a tracee which is supposed
|
D | ChangeLog | 1695 * alpha/set_error.c (arch_set_error): Set alpha_r3 to 1, update tracee's 1698 update tracee's PT_CCR. 4959 There is no need to call unwind_tcb_init before the tracee is attached. 7709 In order to have the same view as tracee has, with regards to 8023 if tracee is in compat personality. 8375 behaviour indeed screwed all the syscall state tracking for the tracee. 8382 if the tracee is not on exiting syscall. 8406 because the latter leaves the tracee in a ptrace stop. 9289 Issue a warning when strace lacks tracee personality support. 9557 Since they call tracee-specific socket/sendmsg/recvmsg, we'd like to [all …]
|
D | ChangeLog-CVS | 1299 Block interrupting signals since the first tracee has been attached.
|
/external/strace/tests-m32/ |
D | test_ucopy.c | 108 int status, tracee; in test_ucopy() local 111 tracee = wait(&status); in test_ucopy() 112 if (tracee != pid) { in test_ucopy()
|
D | ptrace.c | 112 int status, tracee, saved; in test_peeksiginfo() local 115 tracee = wait(&status); in test_peeksiginfo() 116 if (tracee <= 0) { in test_peeksiginfo()
|
/external/strace/tests-mx32/ |
D | test_ucopy.c | 108 int status, tracee; in test_ucopy() local 111 tracee = wait(&status); in test_ucopy() 112 if (tracee != pid) { in test_ucopy()
|
D | ptrace.c | 112 int status, tracee, saved; in test_peeksiginfo() local 115 tracee = wait(&status); in test_peeksiginfo() 116 if (tracee <= 0) { in test_peeksiginfo()
|
/external/strace/tests/ |
D | test_ucopy.c | 108 int status, tracee; in test_ucopy() local 111 tracee = wait(&status); in test_ucopy() 112 if (tracee != pid) { in test_ucopy()
|
D | ptrace.c | 112 int status, tracee, saved; in test_peeksiginfo() local 115 tracee = wait(&status); in test_peeksiginfo() 116 if (tracee <= 0) { in test_peeksiginfo()
|
/external/seccomp-tests/linux/ |
D | seccomp_bpf.c | 1022 pid_t tracee, int status, void *args); 1024 void tracer(struct __test_metadata *_metadata, int fd, pid_t tracee, in tracer() argument 1038 ret = ptrace(PTRACE_ATTACH, tracee, NULL, 0); in tracer() 1040 kill(tracee, SIGKILL); in tracer() 1045 ret = ptrace(PTRACE_SETOPTIONS, tracee, NULL, PTRACE_O_TRACESECCOMP); in tracer() 1048 kill(tracee, SIGKILL); in tracer() 1050 ptrace(PTRACE_CONT, tracee, NULL, 0); in tracer() 1060 if (wait(&status) != tracee) in tracer() 1069 tracer_func(_metadata, tracee, status, args); in tracer() 1071 ret = ptrace(PTRACE_CONT, tracee, NULL, NULL); in tracer() [all …]
|
/external/linux-kselftest/tools/testing/selftests/seccomp/ |
D | seccomp_bpf.c | 1388 pid_t tracee, int status, void *args); 1390 void start_tracer(struct __test_metadata *_metadata, int fd, pid_t tracee, in start_tracer() argument 1404 ret = ptrace(PTRACE_ATTACH, tracee, NULL, 0); in start_tracer() 1406 kill(tracee, SIGKILL); in start_tracer() 1411 ret = ptrace(PTRACE_SETOPTIONS, tracee, NULL, ptrace_syscall ? in start_tracer() 1416 kill(tracee, SIGKILL); in start_tracer() 1419 tracee, NULL, 0); in start_tracer() 1430 if (wait(&status) != tracee) in start_tracer() 1439 tracer_func(_metadata, tracee, status, args); in start_tracer() 1442 tracee, NULL, 0); in start_tracer() [all …]
|
/external/autotest/client/site_tests/security_SeccompSyscallFilters/src/ |
D | seccomp_bpf_tests.c | 752 void tracer(struct __test_metadata *_metadata, pid_t tracee, in tracer() argument 765 ret = ptrace(PTRACE_ATTACH, tracee, NULL, 0); in tracer() 768 kill(tracee, SIGKILL); in tracer() 773 ret = ptrace(PTRACE_SETOPTIONS, tracee, NULL, PTRACE_O_TRACESECCOMP); in tracer() 776 kill(tracee, SIGKILL); in tracer() 778 ptrace(PTRACE_CONT, tracee, NULL, 0); in tracer() 788 if (wait(&status) != tracee) in tracer() 797 ret = ptrace(PTRACE_GETEVENTMSG, tracee, NULL, &msg); in tracer() 801 kill(tracee, SIGKILL); in tracer() 808 ret = ptrace(PTRACE_POKEDATA, tracee, poke_addr, 0x1001); in tracer() [all …]
|
/external/rust/crates/nix/ |
D | CHANGELOG.md | 476 - Added `ptrace` functions for reads and writes to tracee memory and ptrace kill
|