HomeSort by relevance Sort by last modified time
    Searched full:x_ok (Results 1 - 25 of 162) sorted by null

1 2 3 4 5 6 7

  /external/strace/xlat/
access_flags.in 4 X_OK
access_flags.h 20 #if defined(X_OK) || (defined(HAVE_DECL_X_OK) && HAVE_DECL_X_OK)
21 XLAT(X_OK),
  /external/valgrind/none/tests/darwin/
access_extended.stderr.exp 3 access_extended.c(X_OK) = 13 (Permission denied)
access_extended.c 30 entries[1].ad_flags = X_OK; // fails
41 fprintf(stderr, "%s(X_OK) = %d (%s)\n",
  /external/toybox/toys/other/
which.c 31 if (!access(filename, X_OK)) {
48 if (!access(list->str, X_OK)) {
  /bionic/libc/bionic/
faccessat.cpp 38 // bitwise OR of one or more of R_OK, W_OK, and X_OK."
39 if ((mode != F_OK) && ((mode & ~(R_OK | W_OK | X_OK)) != 0) &&
40 ((mode & (R_OK | W_OK | X_OK)) == 0)) {
  /system/vold/fs/
F2fs.cpp 38 return access(kMkfsPath, X_OK) == 0
39 && access(kFsckPath, X_OK) == 0
Ext4.cpp 62 return access(kMkfsPath, X_OK) == 0
63 && access(kFsckPath, X_OK) == 0
111 if (access(kFsckPath, X_OK)) {
Vfat.cpp 62 return access(kMkfsPath, X_OK) == 0
63 && access(kFsckPath, X_OK) == 0
68 if (access(kFsckPath, X_OK)) {
  /external/chromium-trace/catapult/catapult_base/catapult_base/
util.py 34 return os.access(path, os.X_OK)
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/X11/
Xw32defs.h 75 # define X_OK 1
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/X11/
Xw32defs.h 75 # define X_OK 1
  /development/tools/checkstyle/gitlint/
utils.py 47 os.access(program, os.X_OK)):
54 if os.path.isfile(candidate) and os.access(candidate, os.X_OK):
  /external/valgrind/none/tests/solaris/
proc_auxv.c 79 if (access(execname, R_OK | X_OK)) {
  /system/netd/server/
oem_iptables_hook.cpp 78 if (0 == access(OEM_SCRIPT_PATH, R_OK | X_OK)) {
  /external/libchrome/sandbox/linux/syscall_broker/
broker_process_unittest.cc 117 ret = open_broker.Access(kR_WhiteListed, X_OK);
119 ret = open_broker.Access(kR_WhiteListed, R_OK | X_OK);
143 ret = open_broker.Access(kR_WhiteListedButDenied, X_OK);
145 ret = open_broker.Access(kR_WhiteListedButDenied, R_OK | X_OK);
163 ret = open_broker.Access(kW_WhiteListed, X_OK);
165 ret = open_broker.Access(kW_WhiteListed, R_OK | X_OK);
182 ret = open_broker.Access(kRW_WhiteListed, X_OK);
184 ret = open_broker.Access(kRW_WhiteListed, R_OK | X_OK);
201 ret = open_broker.Access(k_NotWhitelisted, X_OK);
203 ret = open_broker.Access(k_NotWhitelisted, R_OK | X_OK);
    [all...]
broker_client.h 40 // X_OK will always return an error in practice since the broker process
  /bionic/tests/
sys_stat_test.cpp 253 ASSERT_EQ(-1, faccessat(AT_FDCWD, "/dev/null", ~(R_OK | W_OK | X_OK), 0));
256 ASSERT_EQ(0, faccessat(AT_FDCWD, "/dev/null", ~(R_OK | W_OK | X_OK), AT_SYMLINK_NOFOLLOW));
257 ASSERT_EQ(-1, faccessat(AT_FDCWD, "/dev/null", ~(R_OK | W_OK | X_OK), 0));
  /external/ppp/pppd/plugins/
passprompt.c 35 if (promptprog[0] == 0 || access(promptprog, X_OK) < 0)
  /libcore/ojluni/src/main/native/
jvm_md.h 57 #define JVM_X_OK X_OK
  /system/vold/
PublicVolume.cpp 66 if (!access(legacyPath.c_str(), R_OK | X_OK)
67 && access(securePath.c_str(), R_OK | X_OK)) {
  /toolchain/binutils/binutils-2.25/libiberty/
make-temp-file.c 47 #define X_OK 1
79 && access (dir, R_OK | W_OK | X_OK) == 0)
make-relative-prefix.c 73 #define X_OK 1
284 if (! access (nstore, X_OK)
286 || ! access (strcat (nstore, HOST_EXECUTABLE_SUFFIX), X_OK)
  /prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/
io.h 174 #define X_OK 1 /* Check for execute permission. */
350 /* Old versions of MSVCRT access() just ignored X_OK, while the version
354 return _access (__fname, __mode & ~X_OK);
  /cts/apps/CtsVerifier/jni/verifier/
com_android_cts_verifier_os_FileUtils.cpp 65 if (access(pathStr, X_OK) == 0) {

Completed in 1334 milliseconds

1 2 3 4 5 6 7