/third_party/musl/libc-test/src/functionalext/supplement/process/ |
H A D | execve.c | 31 execve("/bin/touch", argv, my_env); in execve_0100() 47 int ret = execve(" ", argv, my_env); in execve_0200() 63 int ret = execve(buff, argv, my_env); in execve_0300()
|
/third_party/musl/src/process/ |
H A D | execvp.c | 19 return execve(file, argv, envp); in __execvpe() 39 execve(b, argv, envp); in __execvpe()
|
H A D | execv.c | 7 return execve(path, argv, __environ); in execv()
|
H A D | execve.c | 4 int execve(const char *path, char *const argv[], char *const envp[]) in execve() function
|
H A D | fexecve.c | 15 execve(buf, argv, envp); in fexecve()
|
H A D | execle.c | 21 return execve(path, argv, envp); in execle()
|
/third_party/ltp/testcases/kernel/syscalls/prctl/ |
H A D | prctl06.c | 13 * A value of 0 indicates the regular execve(2) behavior. A value of 14 * 1 indicates execve(2) will operate in the privilege-restricting mode. 17 * at execve-time. For example, a process will not be able to execute a 22 * and preserved across execve(2). We also check NoNewPrivs field in 36 char *const argv[] = {BIN_PATH, "After execve, parent process", proc_sup, NULL}; in do_prctl() 37 char *const childargv[] = {BIN_PATH, "After execve, child process", proc_sup, NULL}; in do_prctl() 58 execve(BIN_PATH, childargv, envp); in do_prctl() 65 execve(BIN_PATH, argv, envp); in do_prctl()
|
/third_party/rust/crates/rustix/src/ |
H A D | runtime.rs | 153 /// The program environment in the child after a `fork` and before an `execve` 253 /// `execve(path.as_c_str(), argv, envp)`—Execute a new command using the 264 /// [Linux]: https://man7.org/linux/man-pages/man2/execve.2.html 267 pub unsafe fn execve(path: &CStr, argv: *const *const u8, envp: *const *const u8) -> io::Errno { in execve() functions 268 backend::runtime::syscalls::execve(path, argv, envp) in execve()
|
/third_party/ltp/lib/newlib_tests/ |
H A D | test_exec.c | 26 execve(path, argv, environ); in do_test()
|
/third_party/musl/porting/liteos_a/user/src/process/ |
H A D | fexecve.c | 15 execve(buf, argv, envp); in fexecve()
|
/third_party/ltp/testcases/kernel/syscalls/execve/ |
H A D | execve06.c | 10 * execve(). This fixes at least one CVE where userspace programs start to 37 execve(path, argv, envp); in verify_execve()
|
H A D | execve01.c | 36 execve(path, args, envp); in verify_execve()
|
H A D | execve05.c | 15 * This testcase tests the basic functionality of the execve(2) system 19 * This tests the functionality of the execve(2) system call by spawning 53 TEST(execve(TEST_APP, argv, environ)); in do_child() 54 tst_res(TFAIL | TTERRNO, "execve() returned unexpected errno"); in do_child()
|
H A D | execve02.c | 12 * Attempt to execve(2) an executable owned by root with no execute permissions 13 * for the other users, fails when execve(2) is used as a non-root user, the 46 TEST(execve(TEST_APP, argv, environ)); in do_child() 49 tst_brk(TFAIL, "execve() passed unexpectedly"); in do_child() 52 tst_brk(TFAIL | TTERRNO, "execve() failed unexpectedly"); in do_child() 54 tst_res(TPASS | TTERRNO, "execve() failed expectedly"); in do_child()
|
H A D | execve04.c | 12 * Attempt to execve(2) a file which is being opened by another process for 45 TEST(execve(TEST_APP, argv, environ)); in verify_execve() 48 tst_res(TFAIL | TTERRNO, "execve succeeded, expected failure"); in verify_execve() 50 tst_res(TPASS | TTERRNO, "execve failed as expected"); in verify_execve()
|
H A D | execve03.c | 10 * Testcase to check execve sets the following errnos correctly: 19 * 1. Attempt to execve(2) a file whose name is more than 22 * 2. Attempt to execve(2) a file which doesn't exist fails with 25 * 3. Attempt to execve(2) a pathname (executabl) comprising of a 28 * 4. Attempt to execve(2) a filename not within the address space 31 * 5. Attempt to execve(2) a filename that does not have executable 34 * 6. Attempt to execve(2) a zero length file with executable 116 TEST(execve(tc->tname, argv, NULL)); in verify_execve() 124 tst_res(TPASS | TTERRNO, "execve failed as expected"); in verify_execve() 128 tst_res(TFAIL | TTERRNO, "execve faile in verify_execve() [all...] |
/third_party/libunwind/libunwind/tests/ |
H A D | forker.c | 56 execve (program, child_argv, envp); in main()
|
/third_party/toybox/toys/example/ |
H A D | logwrapper.c | 73 execve(list->str, toys.argv, environ); in logwrapper_main()
|
/third_party/selinux/libselinux/src/ |
H A D | setexecfilecon.c | 67 return execve(filename, argv, envp); in rpm_execcon()
|
/third_party/python/Tools/scripts/ |
H A D | run_tests.py | 88 os.execve(sys.executable, args, environ)
|
/third_party/python/Lib/ |
H A D | _bootsubprocess.py | 23 os.execve(self._cmd[0], self._cmd, self._env)
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/ |
H A D | browser-wpadebug.c | 117 execve("/system/bin/am", argv, envp); in hs20_web_browser() 118 wpa_printf(MSG_ERROR, "execve: %s", strerror(errno)); in hs20_web_browser()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/ |
H A D | browser-wpadebug.c | 117 execve("/system/bin/am", argv, envp); in hs20_web_browser() 118 wpa_printf(MSG_ERROR, "execve: %s", strerror(errno)); in hs20_web_browser()
|
/third_party/node/tools/ |
H A D | pseudo-tty.py | 83 os.execve(argv[0], argv, os.environ)
|
/third_party/python/Mac/Tools/ |
H A D | pythonw.c | 236 execve(exec_path, argv, environ); in main() 237 err(1, "execve: %s", argv[0]); in main()
|