Lines Matching full:process
73 "tracing other processes. You can disable this process attach protection by\n"
89 /* There's a (hopefully) brief period of time after the child process
91 * prepare the process. */
95 /* man ptrace: PTRACE_ATTACH attaches to the process specified
121 trace_set_options(struct process *proc)
173 /* Only really continue the process if there are no events in
174 the queue for this process. Otherwise just wait for the
216 task_stopped(struct process *task, void *data)
242 task_blocked(struct process *task, void *data)
256 task_vforked(struct process *task, void *data)
265 is_vfork_parent(struct process *task)
271 send_sigstop(struct process *task, void *data)
273 struct process *leader = task->leader;
305 /* Also don't attempt to stop the process if it's a parent of
306 * vforked process. We set up event handler specially to hint
328 breakpoint where IP points and let the process continue. After
329 this the breakpoint can be retracted and the process detached. */
331 ugly_workaround(struct process *proc)
346 struct process *leader)
348 debug(DEBUG_PROCESS, "process stopping done %d",
393 untrace_task(struct process *task, void *data)
401 remove_task(struct process *task, void *data)
410 retract_breakpoint_cb(struct process *proc, struct breakpoint *bp, void *data)
417 detach_process(struct process *leader)
423 /* Now untrace the process, if it was attached to by -p. */
426 struct process *proc = pid2proc(it->pid);
468 * that process, continue it, so that the SIGSTOP can be delivered and
469 * caught by ltrace. We don't mind that the process is after
471 * because the signal will be delivered without the process actually
507 /* If we still didn't get our SIGSTOP, continue the process
554 arch_sw_singlestep(struct process *proc, struct breakpoint *bp,
566 remove_sw_breakpoints(struct process *proc)
583 sw_singlestep_bp_on_hit(struct breakpoint *bp, struct process *proc)
596 struct process *proc = self->task_enabling_breakpoint;
655 struct process *proc = self->task_enabling_breakpoint;
664 struct process *teb = self->task_enabling_breakpoint;
675 struct process *teb = self->task_enabling_breakpoint;
691 struct process *teb = self->task_enabling_breakpoint;
711 /* This event handler is installed when we are in the process of
721 struct process *task = event->proc;
722 struct process *leader = task->leader;
723 struct process *teb = self->task_enabling_breakpoint;
742 * sys it rets from may need to be determined based on process
744 * that we don't continue the process after the sysret is
863 process_install_stopping_handler(struct process *proc, struct breakpoint *sbp,
912 continue_after_breakpoint(struct process *proc, struct breakpoint *sbp)
948 struct process *task = event->proc;
949 struct process *leader = task->leader;
981 ltrace_exiting_install_handler(struct process *proc)
988 * several -p options that are tasks of one process. */
1025 * When the traced process vforks, it's suspended until the child
1026 * process calls _exit or exec*. In the meantime, the two share the
1029 * The child process should only ever call _exit or exec*, but we
1057 struct process *proc = event->proc;
1093 continue_after_vfork(struct process *proc)
1099 /* Carry on not bothering to treat the process as
1122 is_mid_stopping(struct process *proc)
1130 continue_after_syscall(struct process *proc, int sysnum, int ret_p)
1143 continue_after_exec(struct process *proc)
1161 * to be delivered and the process terminated, which we notice and
1175 struct process *proc = pid2proc(it->pid);
1197 umovebytes(struct process *proc, arch_addr_t addr, void *buf, size_t len)
1283 linux_elf_add_plt_entry_irelative(struct process *proc, struct ltelf *lte,
1339 os_elf_add_func_entry(struct process *proc, struct ltelf *lte,
1384 ifunc_ret_hit(struct breakpoint *bp, struct process *proc)
1482 struct breakpoint *bp, struct process *proc)
1498 os_breakpoint_init(struct process *proc, struct breakpoint *bp)