/external/libchrome/base/process/ |
H A D | process_handle_linux.cc | 22 FilePath exe_name; local 23 if (!ReadSymbolicLink(stat_file, &exe_name)) { 27 return exe_name;
|
/external/valgrind/coregrind/m_ume/ |
H A D | main.c | 68 VG_(pre_exec_check)(const HChar* exe_name, Int* out_fd, Bool allow_setuid) argument 77 res = VG_(open)(exe_name, VKI_O_RDONLY, 0); 84 ret = VG_(check_executable)(&is_setuid, exe_name, allow_setuid); 91 exe_name); 200 static Int do_exec_shell_followup(Int ret, const HChar* exe_name, ExeInfo* info) argument 219 if (is_binary_file(exe_name)) { 220 VG_(fmsg)("%s: cannot execute binary file\n", exe_name); 230 info->argv[0] = exe_name; 237 exe_name, info->interp_name, VG_(strerror)(ret)); 246 res = VG_(stat)(exe_name, 281 do_exec(const HChar* exe_name, ExeInfo* info) argument [all...] |
/external/valgrind/coregrind/ |
H A D | pub_core_ume.h | 95 extern SysRes VG_(pre_exec_check)(const HChar* exe_name, Int* out_fd,
|
/external/libcxx/utils/google-benchmark/tools/gbench/ |
H A D | util.py | 97 def run_benchmark(exe_name, benchmark_flags): 99 Run a benchmark specified by 'exe_name' with the specified 106 cmd = [exe_name] + benchmark_flags
|
/external/google-benchmark/tools/gbench/ |
H A D | util.py | 117 def run_benchmark(exe_name, benchmark_flags): 119 Run a benchmark specified by 'exe_name' with the specified 134 cmd = [exe_name] + benchmark_flags
|
/external/google-breakpad/src/common/linux/ |
H A D | file_id_unittest.cc | 76 char exe_name[PATH_MAX]; local 77 ASSERT_TRUE(SafeReadLink("/proc/self/exe", exe_name)); 83 sprintf(cmdline, "cp \"%s\" \"%s\"", exe_name, templ.c_str()); 92 FileID fileid1(exe_name);
|
/external/valgrind/coregrind/m_initimg/ |
H A D | initimg-solaris.c | 68 const HChar *exe_name; local 73 exe_name = ML_(find_executable)(VG_(args_the_exename)); 75 if (!exe_name) { 83 ret = VG_(do_exec)(exe_name, info); 85 VG_(printf)("valgrind: could not execute '%s'\n", exe_name); 93 if (VG_(strlen)(exe_name) + 1 > out_exe_name_size) { 95 VG_(printf)("valgrind: execname %s is too long\n", exe_name); 99 VG_(strcpy)(out_exe_name, exe_name); 103 res = VG_(open)(exe_name, VKI_O_RDONLY, VKI_S_IRUSR);
|
H A D | initimg-darwin.c | 64 const HChar* exe_name; local 69 exe_name = ML_(find_executable)( VG_(args_the_exename) ); 71 if (!exe_name) { 77 ret = VG_(do_exec)(exe_name, info); 83 res = VG_(open)(exe_name, VKI_O_RDONLY, VKI_S_IRUSR);
|
H A D | initimg-linux.c | 73 const HChar* exe_name; local 78 exe_name = ML_(find_executable)( VG_(args_the_exename) ); 80 if (!exe_name) { 85 ret = VG_(do_exec)(exe_name, info); 87 VG_(printf)("valgrind: could not execute '%s'\n", exe_name); 95 res = VG_(open)(exe_name, VKI_O_RDONLY, VKI_S_IRUSR);
|
/external/compiler-rt/lib/sanitizer_common/ |
H A D | sanitizer_printf.cc | 262 const char *exe_name = GetProcessName(); local 263 if (common_flags()->log_exe_name && exe_name) { 265 "==%s", exe_name);
|
H A D | sanitizer_common.cc | 55 const char *exe_name = GetProcessName(); local 56 if (common_flags()->log_exe_name && exe_name) { 58 exe_name, pid);
|
/external/google-breakpad/src/client/linux/minidump_writer/ |
H A D | linux_ptrace_dumper_unittest.cc | 329 char exe_name[PATH_MAX]; local 330 ASSERT_TRUE(SafeReadLink("/proc/self/exe", exe_name)); 339 if (!strcmp(mapping->name, exe_name)) { 350 FileID fileid(exe_name);
|
/external/autotest/client/site_tests/security_ASLR/ |
H A D | security_ASLR.py | 23 def _pidsof(exe_name): 25 output = utils.system_output('pidof %s' % exe_name,
|
/external/valgrind/coregrind/m_syswrap/ |
H A D | syswrap-darwin.c | 3374 static SysRes simple_pre_exec_check ( const HChar* exe_name, argument 3382 res = VG_(open)(exe_name, VKI_O_RDONLY, 0); 3394 exe_name, setuid_allowed);
|