/kernel/linux/linux-6.6/tools/testing/selftests/exec/ |
H A D | null-argv.c | 71 FORK(execve(argv[0], str, NULL)); in main() 72 FORK(execve(argv[0], NULL, NULL)); in main() 73 FORK(execve(argv[0], NULL, envp)); in main() 74 FORK(execve(argv[0], args, NULL)); in main() 75 FORK(execve(argv[0], args, envp)); in main()
|
H A D | recursion-depth.c | 61 int rv = execve(FILENAME, NULL, NULL); in main() 65 fprintf(stderr, "error: execve, rv %d, errno %d\n", rv, errno); in main()
|
/third_party/musl/libc-test/src/functionalext/supplement/process/ |
H A D | execve.c | 31 execve("/bin/touch", argv, my_env); in execve_0100() 47 int ret = execve(" ", argv, my_env); in execve_0200() 63 int ret = execve(buff, argv, my_env); in execve_0300()
|
/kernel/liteos_a/apps/init/src/ |
H A D | init.c | 63 (void)execve(samplePath, NULL, NULL);
in main() 89 (void)execve(shellPath, NULL, NULL);
in main()
|
/third_party/musl/src/process/ |
H A D | execvp.c | 19 return execve(file, argv, envp); in __execvpe() 39 execve(b, argv, envp); in __execvpe()
|
H A D | execv.c | 7 return execve(path, argv, __environ); in execv()
|
H A D | execve.c | 4 int execve(const char *path, char *const argv[], char *const envp[]) in execve() function
|
H A D | fexecve.c | 15 execve(buf, argv, envp); in fexecve()
|
H A D | execle.c | 21 return execve(path, argv, envp); in execle()
|
/third_party/ltp/testcases/kernel/syscalls/prctl/ |
H A D | prctl06.c | 13 * A value of 0 indicates the regular execve(2) behavior. A value of 14 * 1 indicates execve(2) will operate in the privilege-restricting mode. 17 * at execve-time. For example, a process will not be able to execute a 22 * and preserved across execve(2). We also check NoNewPrivs field in 36 char *const argv[] = {BIN_PATH, "After execve, parent process", proc_sup, NULL}; in do_prctl() 37 char *const childargv[] = {BIN_PATH, "After execve, child process", proc_sup, NULL}; in do_prctl() 58 execve(BIN_PATH, childargv, envp); in do_prctl() 65 execve(BIN_PATH, argv, envp); in do_prctl()
|
/third_party/rust/crates/rustix/src/ |
H A D | runtime.rs | 153 /// The program environment in the child after a `fork` and before an `execve` 253 /// `execve(path.as_c_str(), argv, envp)`—Execute a new command using the 264 /// [Linux]: https://man7.org/linux/man-pages/man2/execve.2.html 267 pub unsafe fn execve(path: &CStr, argv: *const *const u8, envp: *const *const u8) -> io::Errno { in execve() functions 268 backend::runtime::syscalls::execve(path, argv, envp) in execve()
|
/third_party/ltp/lib/newlib_tests/ |
H A D | test_exec.c | 26 execve(path, argv, environ); in do_test()
|
/third_party/musl/porting/liteos_a/user/src/process/ |
H A D | fexecve.c | 15 execve(buf, argv, envp); in fexecve()
|
/third_party/ltp/testcases/kernel/syscalls/execve/ |
H A D | execve06.c | 10 * execve(). This fixes at least one CVE where userspace programs start to 37 execve(path, argv, envp); in verify_execve()
|
H A D | execve01.c | 36 execve(path, args, envp); in verify_execve()
|
H A D | execve05.c | 15 * This testcase tests the basic functionality of the execve(2) system 19 * This tests the functionality of the execve(2) system call by spawning 53 TEST(execve(TEST_APP, argv, environ)); in do_child() 54 tst_res(TFAIL | TTERRNO, "execve() returned unexpected errno"); in do_child()
|
H A D | execve02.c | 12 * Attempt to execve(2) an executable owned by root with no execute permissions 13 * for the other users, fails when execve(2) is used as a non-root user, the 46 TEST(execve(TEST_APP, argv, environ)); in do_child() 49 tst_brk(TFAIL, "execve() passed unexpectedly"); in do_child() 52 tst_brk(TFAIL | TTERRNO, "execve() failed unexpectedly"); in do_child() 54 tst_res(TPASS | TTERRNO, "execve() failed expectedly"); in do_child()
|
H A D | execve04.c | 12 * Attempt to execve(2) a file which is being opened by another process for 45 TEST(execve(TEST_APP, argv, environ)); in verify_execve() 48 tst_res(TFAIL | TTERRNO, "execve succeeded, expected failure"); in verify_execve() 50 tst_res(TPASS | TTERRNO, "execve failed as expected"); in verify_execve()
|
/kernel/linux/linux-5.10/tools/testing/selftests/exec/ |
H A D | recursion-depth.c | 61 int rv = execve(FILENAME, NULL, NULL); in main() 65 fprintf(stderr, "error: execve, rv %d, errno %d\n", rv, errno); in main()
|
/test/xts/acts/kernel_lite/utils/ |
H A D | utils.cpp | 106 // start an elf, only check if execve success or not
115 int rt = execve(fname, argv, envp);
in StartElf() 117 LOGE("ERROR: execve return -1, errno=%d, err=%s\n", errno, strerror(errno));
in StartElf() 120 LOGE("ERROR: execve should never return on success. rt=%d, errno=%d, err=%s\n", rt, errno, strerror(errno));
in StartElf() 176 int rt = execve(fname, argv, envp);
in StartExecveError() 178 LOG("ERROR: execve return -1, errno=%d, err=%s\n", errno, strerror(errno));
in StartExecveError() 181 LOGE("ERROR: execve should never return on success. rt=%d, errno=%d, err=%s\n", rt, errno, strerror(errno));
in StartExecveError()
|
/test/xts/hats/kernel/syscalls/process/processid/ |
H A D | ProcessApiTest.cpp | 125 * @tc.desc : execve exec cmd touch success. 139 ret = execve("/bin/touch", argv, envp); in HWTEST_F() 151 * @tc.desc : execve exec cmd touch success. 163 int ret = execve(nullptr, argv, envp); in HWTEST_F()
|
/kernel/linux/linux-6.6/tools/testing/selftests/riscv/vector/ |
H A D | vstate_exec_nolibc.c | 33 rc = execve(THIS_PROGRAM, exec_argv, exec_envp); in main() 35 puts("child execve failed\n"); in main()
|
/third_party/libunwind/libunwind/tests/ |
H A D | forker.c | 56 execve (program, child_argv, envp); in main()
|
/third_party/toybox/toys/example/ |
H A D | logwrapper.c | 73 execve(list->str, toys.argv, environ); in logwrapper_main()
|
/third_party/selinux/libselinux/src/ |
H A D | setexecfilecon.c | 67 return execve(filename, argv, envp); in rpm_execcon()
|