/external/avahi/avahi-compat-libdns_sd/ |
D | warn.c | 51 static char exe_name[1024] = ""; in avahi_exe_name() 59 if (exe_name[0] == 0) { in avahi_exe_name() 62 if ((k = readlink("/proc/self/exe", exe_name, sizeof(exe_name)-1)) < 0) in avahi_exe_name() 63 snprintf(exe_name, sizeof(exe_name), "(unknown)"); in avahi_exe_name() 67 assert((size_t) k <= sizeof(exe_name)-1); in avahi_exe_name() 68 exe_name[k] = 0; in avahi_exe_name() 70 if ((slash = strrchr(exe_name, '/'))) in avahi_exe_name() 71 memmove(exe_name, slash+1, strlen(slash)+1); in avahi_exe_name() 77 return exe_name; in avahi_exe_name()
|
/external/valgrind/coregrind/m_ume/ |
D | main.c | 68 VG_(pre_exec_check)(const HChar* exe_name, Int* out_fd, Bool allow_setuid) in VG_() 77 res = VG_(open)(exe_name, VKI_O_RDONLY, 0); in VG_() 84 ret = VG_(check_executable)(&is_setuid, exe_name, allow_setuid); in VG_() 91 exe_name); in VG_() 200 static Int do_exec_shell_followup(Int ret, const HChar* exe_name, ExeInfo* info) in do_exec_shell_followup() argument 219 if (is_binary_file(exe_name)) { in do_exec_shell_followup() 220 VG_(fmsg)("%s: cannot execute binary file\n", exe_name); in do_exec_shell_followup() 230 info->argv[0] = exe_name; in do_exec_shell_followup() 237 exe_name, info->interp_name, VG_(strerror)(ret)); in do_exec_shell_followup() 246 res = VG_(stat)(exe_name, &st); in do_exec_shell_followup() [all …]
|
/external/libchrome/base/process/ |
D | process_handle_linux.cc | 22 FilePath exe_name; in GetProcessExecutablePath() local 23 if (!ReadSymbolicLink(stat_file, &exe_name)) { in GetProcessExecutablePath() 27 return exe_name; in GetProcessExecutablePath()
|
/external/valgrind/coregrind/m_initimg/ |
D | initimg-solaris.c | 68 const HChar *exe_name; in load_client() local 73 exe_name = ML_(find_executable)(VG_(args_the_exename)); in load_client() 75 if (!exe_name) { in load_client() 83 ret = VG_(do_exec)(exe_name, info); in load_client() 85 VG_(printf)("valgrind: could not execute '%s'\n", exe_name); in load_client() 93 if (VG_(strlen)(exe_name) + 1 > out_exe_name_size) { in load_client() 95 VG_(printf)("valgrind: execname %s is too long\n", exe_name); in load_client() 99 VG_(strcpy)(out_exe_name, exe_name); in load_client() 103 res = VG_(open)(exe_name, VKI_O_RDONLY, VKI_S_IRUSR); in load_client()
|
D | initimg-darwin.c | 64 const HChar* exe_name; in load_client() local 69 exe_name = ML_(find_executable)( VG_(args_the_exename) ); in load_client() 71 if (!exe_name) { in load_client() 77 ret = VG_(do_exec)(exe_name, info); in load_client() 83 res = VG_(open)(exe_name, VKI_O_RDONLY, VKI_S_IRUSR); in load_client()
|
D | initimg-linux.c | 73 const HChar* exe_name; in load_client() local 78 exe_name = ML_(find_executable)( VG_(args_the_exename) ); in load_client() 80 if (!exe_name) { in load_client() 86 ret = VG_(do_exec)(exe_name, info); in load_client() 88 VG_(printf)("valgrind: could not execute '%s'\n", exe_name); in load_client() 96 res = VG_(open)(exe_name, VKI_O_RDONLY, VKI_S_IRUSR); in load_client()
|
/external/google-breakpad/src/common/linux/ |
D | file_id_unittest.cc | 76 char exe_name[PATH_MAX]; in TEST() local 77 ASSERT_TRUE(SafeReadLink("/proc/self/exe", exe_name)); in TEST() 83 sprintf(cmdline, "cp \"%s\" \"%s\"", exe_name, templ.c_str()); in TEST() 92 FileID fileid1(exe_name); in TEST()
|
/external/google-breakpad/src/client/linux/minidump_writer/ |
D | linux_ptrace_dumper_unittest.cc | 329 char exe_name[PATH_MAX]; in TEST_F() local 330 ASSERT_TRUE(SafeReadLink("/proc/self/exe", exe_name)); in TEST_F() 339 if (!strcmp(mapping->name, exe_name)) { in TEST_F() 350 FileID fileid(exe_name); in TEST_F()
|
/external/compiler-rt/lib/sanitizer_common/ |
D | sanitizer_printf.cc | 262 const char *exe_name = GetProcessName(); in SharedPrintfCode() local 263 if (common_flags()->log_exe_name && exe_name) { in SharedPrintfCode() 265 "==%s", exe_name); in SharedPrintfCode()
|
D | sanitizer_common.cc | 60 const char *exe_name = GetProcessName(); in ReopenIfNecessary() local 61 if (common_flags()->log_exe_name && exe_name) { in ReopenIfNecessary() 63 exe_name, pid); in ReopenIfNecessary()
|
D | sanitizer_flags.inc | 57 "append executable name to logs (as in \"log_path.exe_name.pid\").")
|
/external/valgrind/coregrind/ |
D | pub_core_ume.h | 90 extern SysRes VG_(pre_exec_check)(const HChar* exe_name, Int* out_fd,
|
/external/autotest/client/site_tests/security_ASLR/ |
D | security_ASLR.py | 23 def _pidof(exe_name): argument 25 pid = utils.system_output('pidof %s' % exe_name, ignore_status=True).strip()
|
/external/valgrind/coregrind/m_syswrap/ |
D | syswrap-darwin.c | 3369 static SysRes simple_pre_exec_check ( const HChar* exe_name, in simple_pre_exec_check() argument 3377 res = VG_(open)(exe_name, VKI_O_RDONLY, 0); in simple_pre_exec_check() 3389 exe_name, setuid_allowed); in simple_pre_exec_check()
|