/system/extras/runconuid/ |
D | runconuid.cpp | 72 ptrace(PTRACE_TRACEME, 0, 0, 0); in do_child() 186 if (ptrace(PTRACE_ATTACH, child, 0, 0) < 0) { in main() 200 ptrace(PTRACE_SETOPTIONS, child, 0, PTRACE_O_TRACESYSGOOD); in main() 203 ptrace(PTRACE_SYSCALL, child, 0, 0); in main() 228 ptrace(PTRACE_DETACH, child, 0, 0); in main()
|
/system/sepolicy/public/ |
D | logd.te | 52 # ptrace any other app 53 neverallow logd domain:process ptrace; 55 # ... and nobody may ptrace me (except on userdebug or eng builds) 56 neverallow { domain userdebug_or_eng(`-crash_dump') } logd:process ptrace;
|
D | recovery_persist.te | 19 # ptrace any other app 20 neverallow recovery_persist domain:process ptrace;
|
D | recovery_refresh.te | 17 # ptrace any other app 18 neverallow recovery_refresh domain:process ptrace;
|
D | logpersist.te | 12 # ptrace any other app 13 neverallow logpersist domain:process ptrace;
|
D | crash_dump.te | 10 }:process { ptrace signal sigchld sigstop sigkill }; 17 allow crash_dump logd:process { ptrace signal sigchld sigstop sigkill };
|
D | keystore.te | 34 neverallow * keystore:process ptrace;
|
D | netd.te | 98 # ptrace any other app 99 neverallow netd { domain }:process ptrace;
|
/system/core/debuggerd/libdebuggerd/arm/ |
D | machine.cpp | 33 if (ptrace(PTRACE_GETREGS, backtrace->Tid(), 0, ®s)) { in dump_memory_and_code() 68 if (ptrace(PTRACE_GETREGS, tid, 0, &r)) { in dump_registers() 76 if (ptrace(PTRACE_GETVFPREGS, tid, 0, &vfp_regs)) { in dump_registers()
|
/system/core/debuggerd/libdebuggerd/arm64/ |
D | machine.cpp | 39 if (ptrace(PTRACE_GETREGSET, backtrace->Tid(), reinterpret_cast<void*>(NT_PRSTATUS), &io) == -1) { in dump_memory_and_code() 72 if (ptrace(PTRACE_GETREGSET, tid, (void*) NT_PRSTATUS, (void*) &io) == -1) { in dump_registers() 83 if (ptrace(PTRACE_GETREGSET, tid, (void*) NT_PRFPREG, (void*) &io) == -1) { in dump_registers()
|
/system/core/libunwindstack/tests/ |
D | MemoryRemoteTest.cpp | 45 if (ptrace(PTRACE_ATTACH, pid, 0, 0) == -1) { in Attach() 51 while (TEMP_FAILURE_RETRY(ptrace(PTRACE_GETSIGINFO, pid, 0, &si)) < 0 && errno == ESRCH) { in Attach() 62 return ptrace(PTRACE_DETACH, pid, 0, 0) == 0; in Detach()
|
/system/core/debuggerd/libdebuggerd/x86/ |
D | machine.cpp | 32 if (ptrace(PTRACE_GETREGS, backtrace->Tid(), 0, &r) == -1) { in dump_memory_and_code() 49 if (ptrace(PTRACE_GETREGS, tid, 0, &r) == -1) { in dump_registers()
|
/system/core/debuggerd/libdebuggerd/x86_64/ |
D | machine.cpp | 33 if (ptrace(PTRACE_GETREGS, backtrace->Tid(), 0, &r) == -1) { in dump_memory_and_code() 50 if (ptrace(PTRACE_GETREGS, tid, 0, &r) == -1) { in dump_registers()
|
/system/core/debuggerd/ |
D | crash_dump.cpp | 82 if (ptrace(PTRACE_SEIZE, tid, 0, 0) != 0) { in ptrace_seize_thread() 89 if (ptrace(PTRACE_DETACH, tid, 0, 0) != 0) { in ptrace_seize_thread() 97 if (ptrace(PTRACE_INTERRUPT, tid, 0, 0) != 0) { in ptrace_seize_thread() 344 if (ptrace(PTRACE_CONT, main_tid, 0, 0) != 0) { in main() 393 if (ptrace(PTRACE_INTERRUPT, main_tid, 0, 0) != 0) { in main()
|
/system/sepolicy/private/ |
D | untrusted_v2_app.te | 42 # gdbserver for ndk-gdb ptrace attaches to app process. 43 allow untrusted_v2_app self:process ptrace;
|
D | audioserver.te | 27 # ptrace to processes in the same domain for memory leak detection 28 allow audioserver self:process ptrace;
|
D | isolated_app.te | 20 # Google Breakpad (crash reporter for Chrome) relies on ptrace 21 # functionality. Without the ability to ptrace, the crash reporter 25 allow isolated_app self:process ptrace;
|
D | domain.te | 6 # Limit ability to ptrace or read sensitive /proc/pid files of processes
|
D | storaged.te | 50 neverallow storaged domain:process ptrace;
|
/system/core/libmemunreachable/ |
D | ThreadCapture.cpp | 179 if (ptrace(PTRACE_DETACH, tid, NULL, sig_ptr) < 0 && errno != ESRCH) { in PtraceDetach() 188 int ret = ptrace(PTRACE_SEIZE, tid, NULL, NULL); in PtraceAttach() 199 if (ptrace(PTRACE_INTERRUPT, tid, 0, 0) < 0) { in PtraceAttach() 221 if (ptrace(PTRACE_GETREGSET, tid, reinterpret_cast<void*>(NT_PRSTATUS), &iovec)) { in PtraceThreadInfo()
|
D | README.md | 40 4. *Collection process*: All threads in the original process are paused with `ptrace()`. 42 …locations are re-enabled using `malloc_enable()`, but all threads are still paused with `ptrace()`. 44 8. Collection process releases all threads from `ptrace` and exits
|
/system/core/debuggerd/libdebuggerd/mips64/ |
D | machine.cpp | 37 if (ptrace(PTRACE_GETREGS, backtrace->Tid(), 0, &r)) { in dump_memory_and_code() 66 if(ptrace(PTRACE_GETREGS, tid, 0, &r)) { in dump_registers()
|
/system/core/debuggerd/libdebuggerd/mips/ |
D | machine.cpp | 37 if (ptrace(PTRACE_GETREGS, backtrace->Tid(), 0, &r)) { in dump_memory_and_code() 66 if(ptrace(PTRACE_GETREGS, tid, 0, &r)) { in dump_registers()
|
/system/core/libbacktrace/ |
D | backtrace_test.cpp | 107 while (ptrace(PTRACE_GETSIGINFO, pid, 0, &si) < 0 && (errno == EINTR || errno == ESRCH)) { in WaitForStop() 124 ASSERT_TRUE(ptrace(PTRACE_ATTACH, *pid, 0, 0) == 0); in CreateRemoteProcess() 131 ASSERT_TRUE(ptrace(PTRACE_DETACH, pid, 0, 0) == 0); in FinishRemoteProcess() 320 if (ptrace(PTRACE_ATTACH, ptrace_tid, 0, 0) == 0) { in VerifyProcTest() 339 ASSERT_TRUE(ptrace(PTRACE_DETACH, ptrace_tid, 0, 0) == 0); in VerifyProcTest() 462 ASSERT_TRUE(ptrace(PTRACE_ATTACH, pid, 0, 0) == 0); in TEST() 1072 if (ptrace(PTRACE_ATTACH, pid, 0, 0) == 0) { in TEST() 1095 ASSERT_TRUE(ptrace(PTRACE_DETACH, pid, 0, 0) == 0); in TEST() 1241 ASSERT_TRUE(ptrace(PTRACE_ATTACH, pid, 0, 0) == 0); in TEST() 1270 ASSERT_TRUE(ptrace(PTRACE_DETACH, pid, 0, 0) == 0); in TEST() [all …]
|
D | BacktracePtrace.cpp | 38 *out_value = ptrace(PTRACE_PEEKTEXT, tid, reinterpret_cast<void*>(addr), nullptr); in PtraceRead()
|