Searched refs:exe_name (Results 1 - 14 of 14) sorted by relevance

/external/libchrome/base/process/
H A Dprocess_handle_linux.cc22 FilePath exe_name; local
23 if (!ReadSymbolicLink(stat_file, &exe_name)) {
27 return exe_name;
/external/valgrind/coregrind/m_ume/
H A Dmain.c68 VG_(pre_exec_check)(const HChar* exe_name, Int* out_fd, Bool allow_setuid) argument
77 res = VG_(open)(exe_name, VKI_O_RDONLY, 0);
84 ret = VG_(check_executable)(&is_setuid, exe_name, allow_setuid);
91 exe_name);
200 static Int do_exec_shell_followup(Int ret, const HChar* exe_name, ExeInfo* info) argument
219 if (is_binary_file(exe_name)) {
220 VG_(fmsg)("%s: cannot execute binary file\n", exe_name);
230 info->argv[0] = exe_name;
237 exe_name, info->interp_name, VG_(strerror)(ret));
246 res = VG_(stat)(exe_name,
281 do_exec(const HChar* exe_name, ExeInfo* info) argument
[all...]
/external/valgrind/coregrind/
H A Dpub_core_ume.h95 extern SysRes VG_(pre_exec_check)(const HChar* exe_name, Int* out_fd,
/external/libcxx/utils/google-benchmark/tools/gbench/
H A Dutil.py97 def run_benchmark(exe_name, benchmark_flags):
99 Run a benchmark specified by 'exe_name' with the specified
106 cmd = [exe_name] + benchmark_flags
/external/google-benchmark/tools/gbench/
H A Dutil.py117 def run_benchmark(exe_name, benchmark_flags):
119 Run a benchmark specified by 'exe_name' with the specified
134 cmd = [exe_name] + benchmark_flags
/external/google-breakpad/src/common/linux/
H A Dfile_id_unittest.cc76 char exe_name[PATH_MAX]; local
77 ASSERT_TRUE(SafeReadLink("/proc/self/exe", exe_name));
83 sprintf(cmdline, "cp \"%s\" \"%s\"", exe_name, templ.c_str());
92 FileID fileid1(exe_name);
/external/valgrind/coregrind/m_initimg/
H A Dinitimg-solaris.c68 const HChar *exe_name; local
73 exe_name = ML_(find_executable)(VG_(args_the_exename));
75 if (!exe_name) {
83 ret = VG_(do_exec)(exe_name, info);
85 VG_(printf)("valgrind: could not execute '%s'\n", exe_name);
93 if (VG_(strlen)(exe_name) + 1 > out_exe_name_size) {
95 VG_(printf)("valgrind: execname %s is too long\n", exe_name);
99 VG_(strcpy)(out_exe_name, exe_name);
103 res = VG_(open)(exe_name, VKI_O_RDONLY, VKI_S_IRUSR);
H A Dinitimg-darwin.c64 const HChar* exe_name; local
69 exe_name = ML_(find_executable)( VG_(args_the_exename) );
71 if (!exe_name) {
77 ret = VG_(do_exec)(exe_name, info);
83 res = VG_(open)(exe_name, VKI_O_RDONLY, VKI_S_IRUSR);
H A Dinitimg-linux.c73 const HChar* exe_name; local
78 exe_name = ML_(find_executable)( VG_(args_the_exename) );
80 if (!exe_name) {
85 ret = VG_(do_exec)(exe_name, info);
87 VG_(printf)("valgrind: could not execute '%s'\n", exe_name);
95 res = VG_(open)(exe_name, VKI_O_RDONLY, VKI_S_IRUSR);
/external/compiler-rt/lib/sanitizer_common/
H A Dsanitizer_printf.cc262 const char *exe_name = GetProcessName(); local
263 if (common_flags()->log_exe_name && exe_name) {
265 "==%s", exe_name);
H A Dsanitizer_common.cc55 const char *exe_name = GetProcessName(); local
56 if (common_flags()->log_exe_name && exe_name) {
58 exe_name, pid);
/external/google-breakpad/src/client/linux/minidump_writer/
H A Dlinux_ptrace_dumper_unittest.cc329 char exe_name[PATH_MAX]; local
330 ASSERT_TRUE(SafeReadLink("/proc/self/exe", exe_name));
339 if (!strcmp(mapping->name, exe_name)) {
350 FileID fileid(exe_name);
/external/autotest/client/site_tests/security_ASLR/
H A Dsecurity_ASLR.py23 def _pidsof(exe_name):
25 output = utils.system_output('pidof %s' % exe_name,
/external/valgrind/coregrind/m_syswrap/
H A Dsyswrap-darwin.c3374 static SysRes simple_pre_exec_check ( const HChar* exe_name, argument
3382 res = VG_(open)(exe_name, VKI_O_RDONLY, 0);
3394 exe_name, setuid_allowed);

Completed in 1098 milliseconds