Le 13 août 08 à 15:27, Kyle Sluder a écrit :

On Tue, Aug 12, 2008 at 10:14 PM, Steve Byan <[EMAIL PROTECTED]> wrote:
Actually, the man-page is incomplete and doesn't tell you how to read and
write another process's memory.

The manpage also fails to mention the undocumented PT_DENY_ATTACH flag
that applications can pass to force ptrace to fail to attach.  Pro
Tools, for example, does this because the "programmers" who wrote it
spent twice as much time on the copy protection as on the actual
application.

man ptrace:

PTRACE(2) BSD System Calls Manual PTRACE(2)

NAME
     ptrace -- process tracing and debugging

...

PT_DENY_ATTACH
This request is the other operation used by the traced process; it allows a process that is not currently being traced to deny future traces by its parent. All other arguments are ignored. If the process is currently being traced, it will exit with the exit status of ENOTSUP; other- wise, it sets a flag that denies future traces. An attempt by the parent to trace a process which has set this flag will result in a segmenta-
                   tion violation in the parent.


_______________________________________________

Cocoa-dev mailing list (Cocoa-dev@lists.apple.com)

Please do not post admin requests or moderator comments to the list.
Contact the moderators at cocoa-dev-admins(at)lists.apple.com

Help/Unsubscribe/Update your Subscription:
http://lists.apple.com/mailman/options/cocoa-dev/archive%40mail-archive.com

This email sent to [EMAIL PROTECTED]

Reply via email to