/* * Copyright 2002-2019 Intel Corporation. * * This software is provided to you as Sample Source Code as defined in the accompanying * End User License Agreement for the Intel(R) Software Development Products ("Agreement") * section 1.L. * * This software and the related documents are provided as is, with no express or implied * warranties, other than those that are expressly stated in the License. */ /* * This application is used by the tests: "child_process_injection1.test" and "child_process_injection1_mac.test" * The argument passed should be an app with setuid privileges. In Linux chfn is used when available, whilst in macOS* a * utility is built and its privileges are altered. * For this test we run pin with -follow-execv, so pin will try to inject and should be unsuccessful due to privilege, but we * still expect the child to run natively. */ #include #include #include #include #include int main(int argc, char * argv[]) { pid_t pid = fork(); if (pid == 0) { int err = execv(argv[1], argv+1); fprintf(stdout, "%s\n", "Child report: Execve failed "); } else { int status; waitpid(pid, &status, 0); fprintf(stdout, "%s%d\n", "status", status); if (status !=0) fprintf(stdout, "%s%d\n", "Parent report: Child process failed. Status of the child process is " , WEXITSTATUS(status)); else fprintf(stdout, "%s\n", "Parent report: Child process exited successfully"); } return 0; }