/external/strace/xlat/ |
access_flags.in | 4 X_OK
|
access_flags.h | 20 #if defined(X_OK) || (defined(HAVE_DECL_X_OK) && HAVE_DECL_X_OK) 21 XLAT(X_OK),
|
/external/valgrind/none/tests/darwin/ |
access_extended.stderr.exp | 3 access_extended.c(X_OK) = 13 (Permission denied)
|
access_extended.c | 30 entries[1].ad_flags = X_OK; // fails 41 fprintf(stderr, "%s(X_OK) = %d (%s)\n",
|
/external/toybox/toys/other/ |
which.c | 31 if (!access(filename, X_OK)) { 48 if (!access(list->str, X_OK)) {
|
/bionic/libc/bionic/ |
faccessat.cpp | 38 // bitwise OR of one or more of R_OK, W_OK, and X_OK." 39 if ((mode != F_OK) && ((mode & ~(R_OK | W_OK | X_OK)) != 0) && 40 ((mode & (R_OK | W_OK | X_OK)) == 0)) {
|
/system/vold/fs/ |
F2fs.cpp | 38 return access(kMkfsPath, X_OK) == 0 39 && access(kFsckPath, X_OK) == 0
|
Ext4.cpp | 62 return access(kMkfsPath, X_OK) == 0 63 && access(kFsckPath, X_OK) == 0 111 if (access(kFsckPath, X_OK)) {
|
Vfat.cpp | 62 return access(kMkfsPath, X_OK) == 0 63 && access(kFsckPath, X_OK) == 0 68 if (access(kFsckPath, X_OK)) {
|
/external/chromium-trace/catapult/catapult_base/catapult_base/ |
util.py | 34 return os.access(path, os.X_OK)
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/X11/ |
Xw32defs.h | 75 # define X_OK 1
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/X11/ |
Xw32defs.h | 75 # define X_OK 1
|
/development/tools/checkstyle/gitlint/ |
utils.py | 47 os.access(program, os.X_OK)): 54 if os.path.isfile(candidate) and os.access(candidate, os.X_OK):
|
/external/valgrind/none/tests/solaris/ |
proc_auxv.c | 79 if (access(execname, R_OK | X_OK)) {
|
/system/netd/server/ |
oem_iptables_hook.cpp | 78 if (0 == access(OEM_SCRIPT_PATH, R_OK | X_OK)) {
|
/external/libchrome/sandbox/linux/syscall_broker/ |
broker_process_unittest.cc | 117 ret = open_broker.Access(kR_WhiteListed, X_OK); 119 ret = open_broker.Access(kR_WhiteListed, R_OK | X_OK); 143 ret = open_broker.Access(kR_WhiteListedButDenied, X_OK); 145 ret = open_broker.Access(kR_WhiteListedButDenied, R_OK | X_OK); 163 ret = open_broker.Access(kW_WhiteListed, X_OK); 165 ret = open_broker.Access(kW_WhiteListed, R_OK | X_OK); 182 ret = open_broker.Access(kRW_WhiteListed, X_OK); 184 ret = open_broker.Access(kRW_WhiteListed, R_OK | X_OK); 201 ret = open_broker.Access(k_NotWhitelisted, X_OK); 203 ret = open_broker.Access(k_NotWhitelisted, R_OK | X_OK); [all...] |
broker_client.h | 40 // X_OK will always return an error in practice since the broker process
|
/bionic/tests/ |
sys_stat_test.cpp | 253 ASSERT_EQ(-1, faccessat(AT_FDCWD, "/dev/null", ~(R_OK | W_OK | X_OK), 0)); 256 ASSERT_EQ(0, faccessat(AT_FDCWD, "/dev/null", ~(R_OK | W_OK | X_OK), AT_SYMLINK_NOFOLLOW)); 257 ASSERT_EQ(-1, faccessat(AT_FDCWD, "/dev/null", ~(R_OK | W_OK | X_OK), 0));
|
/external/ppp/pppd/plugins/ |
passprompt.c | 35 if (promptprog[0] == 0 || access(promptprog, X_OK) < 0)
|
/libcore/ojluni/src/main/native/ |
jvm_md.h | 57 #define JVM_X_OK X_OK
|
/system/vold/ |
PublicVolume.cpp | 66 if (!access(legacyPath.c_str(), R_OK | X_OK) 67 && access(securePath.c_str(), R_OK | X_OK)) {
|
/toolchain/binutils/binutils-2.25/libiberty/ |
make-temp-file.c | 47 #define X_OK 1 79 && access (dir, R_OK | W_OK | X_OK) == 0)
|
make-relative-prefix.c | 73 #define X_OK 1 284 if (! access (nstore, X_OK) 286 || ! access (strcat (nstore, HOST_EXECUTABLE_SUFFIX), X_OK)
|
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/ |
io.h | 174 #define X_OK 1 /* Check for execute permission. */ 350 /* Old versions of MSVCRT access() just ignored X_OK, while the version 354 return _access (__fname, __mode & ~X_OK);
|
/cts/apps/CtsVerifier/jni/verifier/ |
com_android_cts_verifier_os_FileUtils.cpp | 65 if (access(pathStr, X_OK) == 0) {
|