/external/autotest/client/site_tests/security_ptraceRestrictions/src/ |
H A D | thread-prctl.c | 49 pid_t tracer, tracee; variable 53 printf("tracee thread started\n"); 56 printf("tracee thread prtctl result: %d\n", ret); 58 printf("tracee thread finishing\n"); 74 printf("forking tracee from tracer\n"); 88 printf("tracer to PTRACE_ATTACH my tracee %d\n", tracee); 89 ptrace_result = ptrace(PTRACE_ATTACH, tracee, NULL, NULL); 98 printf("tracer waiting for tracee to SIGSTOP\n"); 99 waitpid(tracee, NUL [all...] |
/external/linux-kselftest/tools/testing/selftests/seccomp/ |
H A D | seccomp_bpf.c | 1022 pid_t tracee, int status, void *args); 1024 void start_tracer(struct __test_metadata *_metadata, int fd, pid_t tracee, argument 1038 ret = ptrace(PTRACE_ATTACH, tracee, NULL, 0); 1040 kill(tracee, SIGKILL); 1045 ret = ptrace(PTRACE_SETOPTIONS, tracee, NULL, ptrace_syscall ? 1050 kill(tracee, SIGKILL); 1053 tracee, NULL, 0); 1056 /* Unblock the tracee */ 1064 if (wait(&status) != tracee) 1073 tracer_func(_metadata, tracee, statu 1092 pid_t tracee = getpid(); local 1135 tracer_poke(struct __test_metadata *_metadata, pid_t tracee, int status, void *args) argument 1273 get_syscall(struct __test_metadata *_metadata, pid_t tracee) argument 1300 change_syscall(struct __test_metadata *_metadata, pid_t tracee, int syscall) argument 1373 tracer_syscall(struct __test_metadata *_metadata, pid_t tracee, int status, void *args) argument 1408 tracer_ptrace(struct __test_metadata *_metadata, pid_t tracee, int status, void *args) argument [all...] |
/external/seccomp-tests/linux/ |
H A D | seccomp_bpf.c | 1022 pid_t tracee, int status, void *args); 1024 void tracer(struct __test_metadata *_metadata, int fd, pid_t tracee, argument 1038 ret = ptrace(PTRACE_ATTACH, tracee, NULL, 0); 1040 kill(tracee, SIGKILL); 1045 ret = ptrace(PTRACE_SETOPTIONS, tracee, NULL, PTRACE_O_TRACESECCOMP); 1048 kill(tracee, SIGKILL); 1050 ptrace(PTRACE_CONT, tracee, NULL, 0); 1052 /* Unblock the tracee */ 1060 if (wait(&status) != tracee) 1069 tracer_func(_metadata, tracee, statu 1087 pid_t tracee = getpid(); local 1129 tracer_poke(struct __test_metadata *_metadata, pid_t tracee, int status, void *args) argument 1257 get_syscall(struct __test_metadata *_metadata, pid_t tracee) argument 1280 change_syscall(struct __test_metadata *_metadata, pid_t tracee, int syscall) argument 1342 tracer_syscall(struct __test_metadata *_metadata, pid_t tracee, int status, void *args) argument [all...] |
/external/autotest/client/site_tests/security_SeccompSyscallFilters/src/ |
H A D | seccomp_bpf_tests.c | 760 void tracer(struct __test_metadata *_metadata, pid_t tracee, argument 773 ret = ptrace(PTRACE_ATTACH, tracee, NULL, 0); 776 kill(tracee, SIGKILL); 781 ret = ptrace(PTRACE_SETOPTIONS, tracee, NULL, PTRACE_O_TRACESECCOMP); 784 kill(tracee, SIGKILL); 786 ptrace(PTRACE_CONT, tracee, NULL, 0); 788 /* Unblock the tracee */ 796 if (wait(&status) != tracee) 805 ret = ptrace(PTRACE_GETEVENTMSG, tracee, NULL, &msg); 809 kill(tracee, SIGKIL 845 pid_t tracee = getpid(); local [all...] |
/external/strace/tests/ |
H A D | ptrace.c | 110 int status, tracee, saved; local 113 tracee = wait(&status); 114 if (tracee <= 0) {
|
/external/strace/tests-m32/ |
H A D | ptrace.c | 110 int status, tracee, saved; local 113 tracee = wait(&status); 114 if (tracee <= 0) {
|
/external/strace/tests-mx32/ |
H A D | ptrace.c | 110 int status, tracee, saved; local 113 tracee = wait(&status); 114 if (tracee <= 0) {
|