/prebuilts/ndk/current/platforms/android-24/arch-arm64/usr/include/linux/ |
ptrace.h | 35 #define PTRACE_ATTACH 16
|
/prebuilts/ndk/current/platforms/android-24/arch-mips/usr/include/linux/ |
ptrace.h | 35 #define PTRACE_ATTACH 16
|
/prebuilts/ndk/current/platforms/android-24/arch-mips64/usr/include/linux/ |
ptrace.h | 35 #define PTRACE_ATTACH 16
|
/prebuilts/ndk/current/platforms/android-24/arch-x86/usr/include/linux/ |
ptrace.h | 35 #define PTRACE_ATTACH 16
|
/prebuilts/ndk/current/platforms/android-24/arch-x86_64/usr/include/linux/ |
ptrace.h | 35 #define PTRACE_ATTACH 16
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/i386-linux-gnu/sys/ |
ptrace.h | 94 PTRACE_ATTACH = 16, 95 #define PT_ATTACH PTRACE_ATTACH 97 /* Detach from a process attached to with PTRACE_ATTACH. */ 139 /* Like PTRACE_ATTACH, but do not force tracee to trap and do not affect
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/x86_64-linux-gnu/sys/ |
ptrace.h | 94 PTRACE_ATTACH = 16, 95 #define PT_ATTACH PTRACE_ATTACH 97 /* Detach from a process attached to with PTRACE_ATTACH. */ 139 /* Like PTRACE_ATTACH, but do not force tracee to trap and do not affect
|
/bionic/libc/kernel/uapi/linux/ |
ptrace.h | 35 #define PTRACE_ATTACH 16
|
/external/kernel-headers/original/uapi/linux/ |
ptrace.h | 21 #define PTRACE_ATTACH 16
|
/external/strace/xlat/ |
ptrace_cmds.h | 41 #if defined(PTRACE_ATTACH) || (defined(HAVE_DECL_PTRACE_ATTACH) && HAVE_DECL_PTRACE_ATTACH) 42 XLAT(PTRACE_ATTACH),
|
/art/test/137-cfi/ |
cfi.cc | 205 if (ptrace(PTRACE_ATTACH, pid, 0, 0)) {
|
/external/autotest/client/site_tests/security_ptraceRestrictions/src/ |
thread-prctl.c | 88 printf("tracer to PTRACE_ATTACH my tracee %d\n", tracee); 89 ptrace_result = ptrace(PTRACE_ATTACH, tracee, NULL, NULL);
|
/external/libchrome/sandbox/linux/services/ |
yama_unittests.cc | 45 ret = ptrace(PTRACE_ATTACH, pid, NULL, NULL);
|
/external/google-breakpad/src/client/linux/minidump_writer/ |
linux_ptrace_dumper.cc | 66 if (sys_ptrace(PTRACE_ATTACH, pid, NULL, NULL) != 0 &&
|
/system/core/libbacktrace/ |
backtrace_test.cpp | 313 if (ptrace(PTRACE_ATTACH, ptrace_tid, 0, 0) == 0) { 456 ASSERT_TRUE(ptrace(PTRACE_ATTACH, pid, 0, 0) == 0); 920 ASSERT_TRUE(ptrace(PTRACE_ATTACH, pid, 0, 0) == 0); [all...] |
/external/compiler-rt/lib/sanitizer_common/ |
sanitizer_stoptheworld_linux_libcdep.cc | 122 if (internal_iserror(internal_ptrace(PTRACE_ATTACH, tid, nullptr, nullptr),
|
/external/elfutils/libdwfl/ |
linux-pid-attach.c | 74 if (ptrace (PTRACE_ATTACH, tid, NULL, NULL) != 0) 84 a SIGSTOP notification in that case in response to our PTRACE_ATTACH
|
/external/strace/ |
strace.c | 369 return ptrace(PTRACE_ATTACH, pid, 0L, 0L); 377 # define ptrace_attach_or_seize(pid) ptrace(PTRACE_ATTACH, (pid), 0, 0) 982 * between PTRACE_ATTACH and wait4() on SIGSTOP. 1062 perror_msg("attach: ptrace(PTRACE_ATTACH, ...)"); 1086 perror_msg("attach: ptrace(PTRACE_ATTACH, ...)"); [all...] |
/external/valgrind/coregrind/ |
vgdb-invoker-ptrace.c | 84 /* True if we have continued pid_of_save_regs after PTRACE_ATTACH. */ 364 DEBUG(1, "%s PTRACE_ATTACH pid %d\n", msg, pid); 365 res = ptrace (PTRACE_ATTACH, pid, NULL, NULL); 368 ERROR(errno, "%s PTRACE_ATTACH pid %d %ld\n", msg, pid, res); [all...] |
/system/core/debuggerd/ |
debuggerd.cpp | 425 if (ptrace(PTRACE_ATTACH, tid, 0, 0) != 0) { 589 // time to PTRACE_ATTACH to it before it has a chance to really fault. 591 // The PTRACE_ATTACH sends a SIGSTOP to the target process, but it
|
/external/autotest/client/site_tests/security_SeccompSyscallFilters/src/ |
seccomp_bpf_tests.c | 773 ret = ptrace(PTRACE_ATTACH, tracee, NULL, 0); [all...] |
/external/ltrace/sysdeps/linux-gnu/ |
trace.c | 69 * PTRACE_ATTACH is forbidden. */ 95 /* man ptrace: PTRACE_ATTACH attaches to the process specified 114 if (ptrace(PTRACE_ATTACH, pid, 0, 0) < 0) [all...] |
/cts/tests/tests/os/jni/seccomp-tests/tests/ |
seccomp_bpf_tests.c | 904 ret = ptrace(PTRACE_ATTACH, tracee, NULL, 0); [all...] |