Home
last modified time | relevance | path

Searched refs:exe_name (Results 1 – 14 of 14) sorted by relevance

/external/avahi/avahi-compat-libdns_sd/
Dwarn.c51 static char exe_name[1024] = ""; in avahi_exe_name()
59 if (exe_name[0] == 0) { in avahi_exe_name()
62 if ((k = readlink("/proc/self/exe", exe_name, sizeof(exe_name)-1)) < 0) in avahi_exe_name()
63 snprintf(exe_name, sizeof(exe_name), "(unknown)"); in avahi_exe_name()
67 assert((size_t) k <= sizeof(exe_name)-1); in avahi_exe_name()
68 exe_name[k] = 0; in avahi_exe_name()
70 if ((slash = strrchr(exe_name, '/'))) in avahi_exe_name()
71 memmove(exe_name, slash+1, strlen(slash)+1); in avahi_exe_name()
77 return exe_name; in avahi_exe_name()
/external/valgrind/coregrind/m_ume/
Dmain.c68 VG_(pre_exec_check)(const HChar* exe_name, Int* out_fd, Bool allow_setuid) in VG_()
77 res = VG_(open)(exe_name, VKI_O_RDONLY, 0); in VG_()
84 ret = VG_(check_executable)(&is_setuid, exe_name, allow_setuid); in VG_()
91 exe_name); in VG_()
200 static Int do_exec_shell_followup(Int ret, const HChar* exe_name, ExeInfo* info) in do_exec_shell_followup() argument
219 if (is_binary_file(exe_name)) { in do_exec_shell_followup()
220 VG_(fmsg)("%s: cannot execute binary file\n", exe_name); in do_exec_shell_followup()
230 info->argv[0] = exe_name; in do_exec_shell_followup()
237 exe_name, info->interp_name, VG_(strerror)(ret)); in do_exec_shell_followup()
246 res = VG_(stat)(exe_name, &st); in do_exec_shell_followup()
[all …]
/external/libchrome/base/process/
Dprocess_handle_linux.cc22 FilePath exe_name; in GetProcessExecutablePath() local
23 if (!ReadSymbolicLink(stat_file, &exe_name)) { in GetProcessExecutablePath()
27 return exe_name; in GetProcessExecutablePath()
/external/valgrind/coregrind/m_initimg/
Dinitimg-solaris.c68 const HChar *exe_name; in load_client() local
73 exe_name = ML_(find_executable)(VG_(args_the_exename)); in load_client()
75 if (!exe_name) { in load_client()
83 ret = VG_(do_exec)(exe_name, info); in load_client()
85 VG_(printf)("valgrind: could not execute '%s'\n", exe_name); in load_client()
93 if (VG_(strlen)(exe_name) + 1 > out_exe_name_size) { in load_client()
95 VG_(printf)("valgrind: execname %s is too long\n", exe_name); in load_client()
99 VG_(strcpy)(out_exe_name, exe_name); in load_client()
103 res = VG_(open)(exe_name, VKI_O_RDONLY, VKI_S_IRUSR); in load_client()
Dinitimg-darwin.c64 const HChar* exe_name; in load_client() local
69 exe_name = ML_(find_executable)( VG_(args_the_exename) ); in load_client()
71 if (!exe_name) { in load_client()
77 ret = VG_(do_exec)(exe_name, info); in load_client()
83 res = VG_(open)(exe_name, VKI_O_RDONLY, VKI_S_IRUSR); in load_client()
Dinitimg-linux.c73 const HChar* exe_name; in load_client() local
78 exe_name = ML_(find_executable)( VG_(args_the_exename) ); in load_client()
80 if (!exe_name) { in load_client()
86 ret = VG_(do_exec)(exe_name, info); in load_client()
88 VG_(printf)("valgrind: could not execute '%s'\n", exe_name); in load_client()
96 res = VG_(open)(exe_name, VKI_O_RDONLY, VKI_S_IRUSR); in load_client()
/external/google-breakpad/src/common/linux/
Dfile_id_unittest.cc76 char exe_name[PATH_MAX]; in TEST() local
77 ASSERT_TRUE(SafeReadLink("/proc/self/exe", exe_name)); in TEST()
83 sprintf(cmdline, "cp \"%s\" \"%s\"", exe_name, templ.c_str()); in TEST()
92 FileID fileid1(exe_name); in TEST()
/external/google-breakpad/src/client/linux/minidump_writer/
Dlinux_ptrace_dumper_unittest.cc329 char exe_name[PATH_MAX]; in TEST_F() local
330 ASSERT_TRUE(SafeReadLink("/proc/self/exe", exe_name)); in TEST_F()
339 if (!strcmp(mapping->name, exe_name)) { in TEST_F()
350 FileID fileid(exe_name); in TEST_F()
/external/compiler-rt/lib/sanitizer_common/
Dsanitizer_printf.cc262 const char *exe_name = GetProcessName(); in SharedPrintfCode() local
263 if (common_flags()->log_exe_name && exe_name) { in SharedPrintfCode()
265 "==%s", exe_name); in SharedPrintfCode()
Dsanitizer_common.cc60 const char *exe_name = GetProcessName(); in ReopenIfNecessary() local
61 if (common_flags()->log_exe_name && exe_name) { in ReopenIfNecessary()
63 exe_name, pid); in ReopenIfNecessary()
Dsanitizer_flags.inc57 "append executable name to logs (as in \"log_path.exe_name.pid\").")
/external/valgrind/coregrind/
Dpub_core_ume.h90 extern SysRes VG_(pre_exec_check)(const HChar* exe_name, Int* out_fd,
/external/autotest/client/site_tests/security_ASLR/
Dsecurity_ASLR.py23 def _pidof(exe_name): argument
25 pid = utils.system_output('pidof %s' % exe_name, ignore_status=True).strip()
/external/valgrind/coregrind/m_syswrap/
Dsyswrap-darwin.c3369 static SysRes simple_pre_exec_check ( const HChar* exe_name, in simple_pre_exec_check() argument
3377 res = VG_(open)(exe_name, VKI_O_RDONLY, 0); in simple_pre_exec_check()
3389 exe_name, setuid_allowed); in simple_pre_exec_check()