/external/valgrind/coregrind/m_ume/ |
D | main.c | 68 VG_(pre_exec_check)(const HChar* exe_name, Int* out_fd, Bool allow_setuid) in VG_() 77 res = VG_(open)(exe_name, VKI_O_RDONLY, 0); in VG_() 84 ret = VG_(check_executable)(&is_setuid, exe_name, allow_setuid); in VG_() 91 exe_name); in VG_() 200 static Int do_exec_shell_followup(Int ret, const HChar* exe_name, ExeInfo* info) in do_exec_shell_followup() argument 219 if (is_binary_file(exe_name)) { in do_exec_shell_followup() 220 VG_(fmsg)("%s: cannot execute binary file\n", exe_name); in do_exec_shell_followup() 230 info->argv[0] = exe_name; in do_exec_shell_followup() 237 exe_name, info->interp_name, VG_(strerror)(ret)); in do_exec_shell_followup() 246 res = VG_(stat)(exe_name, &st); in do_exec_shell_followup() [all …]
|
/external/libchrome/base/process/ |
D | process_handle_linux.cc | 22 FilePath exe_name; in GetProcessExecutablePath() local 23 if (!ReadSymbolicLink(stat_file, &exe_name)) { in GetProcessExecutablePath() 27 return exe_name; in GetProcessExecutablePath()
|
/external/valgrind/coregrind/m_initimg/ |
D | initimg-solaris.c | 68 const HChar *exe_name; in load_client() local 73 exe_name = ML_(find_executable)(VG_(args_the_exename)); in load_client() 75 if (!exe_name) { in load_client() 83 ret = VG_(do_exec)(exe_name, info); in load_client() 85 VG_(printf)("valgrind: could not execute '%s'\n", exe_name); in load_client() 93 if (VG_(strlen)(exe_name) + 1 > out_exe_name_size) { in load_client() 95 VG_(printf)("valgrind: execname %s is too long\n", exe_name); in load_client() 99 VG_(strcpy)(out_exe_name, exe_name); in load_client() 103 res = VG_(open)(exe_name, VKI_O_RDONLY, VKI_S_IRUSR); in load_client()
|
D | initimg-darwin.c | 64 const HChar* exe_name; in load_client() local 69 exe_name = ML_(find_executable)( VG_(args_the_exename) ); in load_client() 71 if (!exe_name) { in load_client() 77 ret = VG_(do_exec)(exe_name, info); in load_client() 83 res = VG_(open)(exe_name, VKI_O_RDONLY, VKI_S_IRUSR); in load_client()
|
D | initimg-linux.c | 73 const HChar* exe_name; in load_client() local 78 exe_name = ML_(find_executable)( VG_(args_the_exename) ); in load_client() 80 if (!exe_name) { in load_client() 85 ret = VG_(do_exec)(exe_name, info); in load_client() 87 VG_(printf)("valgrind: could not execute '%s'\n", exe_name); in load_client() 95 res = VG_(open)(exe_name, VKI_O_RDONLY, VKI_S_IRUSR); in load_client()
|
/external/google-breakpad/src/common/linux/ |
D | file_id_unittest.cc | 76 char exe_name[PATH_MAX]; in TEST() local 77 ASSERT_TRUE(SafeReadLink("/proc/self/exe", exe_name)); in TEST() 83 sprintf(cmdline, "cp \"%s\" \"%s\"", exe_name, templ.c_str()); in TEST() 92 FileID fileid1(exe_name); in TEST()
|
/external/google-breakpad/src/client/linux/minidump_writer/ |
D | linux_ptrace_dumper_unittest.cc | 329 char exe_name[PATH_MAX]; in TEST_F() local 330 ASSERT_TRUE(SafeReadLink("/proc/self/exe", exe_name)); in TEST_F() 339 if (!strcmp(mapping->name, exe_name)) { in TEST_F() 350 FileID fileid(exe_name); in TEST_F()
|
/external/google-benchmark/tools/gbench/ |
D | util.py | 117 def run_benchmark(exe_name, benchmark_flags): argument 134 cmd = [exe_name] + benchmark_flags
|
/external/libcxx/utils/google-benchmark/tools/gbench/ |
D | util.py | 117 def run_benchmark(exe_name, benchmark_flags): argument 134 cmd = [exe_name] + benchmark_flags
|
/external/compiler-rt/lib/sanitizer_common/ |
D | sanitizer_printf.cc | 262 const char *exe_name = GetProcessName(); in SharedPrintfCode() local 263 if (common_flags()->log_exe_name && exe_name) { in SharedPrintfCode() 265 "==%s", exe_name); in SharedPrintfCode()
|
D | sanitizer_common.cc | 55 const char *exe_name = GetProcessName(); in ReopenIfNecessary() local 56 if (common_flags()->log_exe_name && exe_name) { in ReopenIfNecessary() 58 exe_name, pid); in ReopenIfNecessary()
|
D | sanitizer_flags.inc | 57 "append executable name to logs (as in \"log_path.exe_name.pid\").")
|
/external/autotest/client/site_tests/security_ASLR/ |
D | security_ASLR.py | 23 def _pidsof(exe_name): argument 25 output = utils.system_output('pidof %s' % exe_name,
|
/external/valgrind/coregrind/ |
D | pub_core_ume.h | 95 extern SysRes VG_(pre_exec_check)(const HChar* exe_name, Int* out_fd,
|
/external/valgrind/coregrind/m_syswrap/ |
D | syswrap-darwin.c | 3374 static SysRes simple_pre_exec_check ( const HChar* exe_name, in simple_pre_exec_check() argument 3382 res = VG_(open)(exe_name, VKI_O_RDONLY, 0); in simple_pre_exec_check() 3394 exe_name, setuid_allowed); in simple_pre_exec_check()
|