| /external/bcc/tools/ |
| D | capable_example.txt | 11 22:11:23 0 7003 chmod 3 CAP_FOWNER 1 12 22:11:23 0 7003 chmod 4 CAP_FSETID 1 13 22:11:23 0 7005 chmod 4 CAP_FSETID 1 14 22:11:23 0 7005 chmod 4 CAP_FSETID 1 21 22:11:24 0 7026 chmod 3 CAP_FOWNER 1 22 22:11:24 0 7026 chmod 4 CAP_FSETID 1 23 22:11:24 0 7028 chmod 4 CAP_FSETID 1 24 22:11:24 0 7028 chmod 4 CAP_FSETID 1 31 22:11:25 0 7049 chmod 3 CAP_FOWNER 1 32 22:11:25 0 7049 chmod 4 CAP_FSETID 1 [all …]
|
| /external/selinux/libsemanage/tests/ |
| D | test_semanage_store.c | 163 err = chmod(modpath, 0); in test_semanage_store_access_check() 165 err = chmod(readlockpath, 0); in test_semanage_store_access_check() 167 err = chmod(polpath, 0); in test_semanage_store_access_check() 174 err = chmod(polpath, S_IRUSR | S_IXUSR); in test_semanage_store_access_check() 176 err = chmod(readlockpath, S_IRUSR); in test_semanage_store_access_check() 178 err = chmod(modpath, S_IRUSR | S_IXUSR); in test_semanage_store_access_check() 185 err = chmod(polpath, S_IRUSR | S_IWUSR | S_IXUSR); in test_semanage_store_access_check() 187 err = chmod(readlockpath, S_IRUSR | S_IWUSR); in test_semanage_store_access_check() 189 err = chmod(modpath, S_IRUSR | S_IWUSR | S_IXUSR); in test_semanage_store_access_check() 196 err = chmod(polpath, S_IRUSR | S_IXUSR); in test_semanage_store_access_check() [all …]
|
| /external/skia/infra/bots/recipe_modules/docker/examples/full.expected/ |
| D | test.json | 36 "chmod", 41 "name": "Docker setup.chmod 777 /host-out", 48 "chmod", 53 "name": "Docker setup.chmod 755 /host-src", 60 "chmod", 65 "name": "Docker setup.chmod 0755 ./do-stuff.sh", 107 "chmod", 112 "name": "Docker setup.chmod 644 /copy-dst/myfile", 119 "chmod", 125 "name": "Docker setup.chmod -R a+r /host-src",
|
| /external/toybox/toys/posix/ |
| D | chmod.c | 1 /* chmod.c - Change file mode bits 5 * See http://opengroup.org/onlinepubs/9699919799/utilities/chmod.html 7 USE_CHMOD(NEWTOY(chmod, "<2?vfR[-vf]", TOYFLAG_BIN)) 9 config CHMOD 10 bool "chmod" 13 usage: chmod [-R] MODE FILE... 31 chmod u+w file - allow owner of "file" to write to it. 32 chmod 744 file - user can read/write/execute, everyone else read only 57 printf("chmod '%s' to %s\n", s, TT.mode);
|
| /external/skia/infra/bots/recipes/test_pathkit.expected/ |
| D | pathkit_trybot.json | 36 "chmod", 41 "name": "Docker setup.chmod 777 [START_DIR]/[SWARM_OUT_DIR]", 48 "chmod", 53 "name": "Docker setup.chmod 755 [START_DIR]", 60 "chmod", 65 "name": "Docker setup.chmod 0755 [START_DIR]/skia/infra/pathkit/test_pathkit.sh", 107 "chmod", 112 "name": "Docker setup.chmod 644 [START_DIR]/skia/modules/pathkit/build/wasm/pathkit.js", 154 "chmod", 159 "name": "Docker setup.chmod 644 [START_DIR]/skia/modules/pathkit/build/wasm/pathkit.wasm", [all …]
|
| D | Test-Debian10-EMCC-GCE-CPU-AVX2-wasm-Debug-All-PathKit.json | 36 "chmod", 41 "name": "Docker setup.chmod 777 [START_DIR]/[SWARM_OUT_DIR]", 48 "chmod", 53 "name": "Docker setup.chmod 755 [START_DIR]", 60 "chmod", 65 "name": "Docker setup.chmod 0755 [START_DIR]/skia/infra/pathkit/test_pathkit.sh", 107 "chmod", 112 "name": "Docker setup.chmod 644 [START_DIR]/skia/modules/pathkit/build/wasm/pathkit.js", 154 "chmod", 159 "name": "Docker setup.chmod 644 [START_DIR]/skia/modules/pathkit/build/wasm/pathkit.wasm", [all …]
|
| D | Test-Debian10-EMCC-GCE-CPU-AVX2-asmjs-Release-All-PathKit.json | 36 "chmod", 41 "name": "Docker setup.chmod 777 [START_DIR]/[SWARM_OUT_DIR]", 48 "chmod", 53 "name": "Docker setup.chmod 755 [START_DIR]", 60 "chmod", 65 "name": "Docker setup.chmod 0755 [START_DIR]/skia/infra/pathkit/test_pathkit.sh", 107 "chmod", 112 "name": "Docker setup.chmod 644 [START_DIR]/skia/modules/pathkit/build/asmjs/pathkit.js", 154 "chmod", 159 "name": "Docker setup.chmod 644 [START_DIR]/skia/modules/pathkit/build/asmjs/pathkit.js.mem", [all …]
|
| D | Test-Debian10-EMCC-GCE-CPU-AVX2-asmjs-Debug-All-PathKit.json | 36 "chmod", 41 "name": "Docker setup.chmod 777 [START_DIR]/[SWARM_OUT_DIR]", 48 "chmod", 53 "name": "Docker setup.chmod 755 [START_DIR]", 60 "chmod", 65 "name": "Docker setup.chmod 0755 [START_DIR]/skia/infra/pathkit/test_pathkit.sh", 107 "chmod", 112 "name": "Docker setup.chmod 644 [START_DIR]/skia/modules/pathkit/build/asmjs/pathkit.js", 119 "chmod", 125 "name": "Docker setup.chmod -R a+r [START_DIR]/skia",
|
| /external/skia/infra/bots/recipes/perf_pathkit.expected/ |
| D | pathkit_trybot.json | 67 "chmod", 72 "name": "Docker setup.chmod 777 [START_DIR]/[SWARM_OUT_DIR]", 79 "chmod", 84 "name": "Docker setup.chmod 755 [START_DIR]", 91 "chmod", 96 "name": "Docker setup.chmod 0755 [START_DIR]/skia/infra/pathkit/perf_pathkit.sh", 138 "chmod", 143 "name": "Docker setup.chmod 644 [START_DIR]/skia/modules/pathkit/npm-wasm/bin/pathkit.js", 185 "chmod", 190 "name": "Docker setup.chmod 644 [START_DIR]/skia/modules/pathkit/npm-wasm/bin/pathkit.wasm", [all …]
|
| D | Perf-Debian10-EMCC-GCE-CPU-AVX2-asmjs-Release-All-PathKit.json | 67 "chmod", 72 "name": "Docker setup.chmod 777 [START_DIR]/[SWARM_OUT_DIR]", 79 "chmod", 84 "name": "Docker setup.chmod 755 [START_DIR]", 91 "chmod", 96 "name": "Docker setup.chmod 0755 [START_DIR]/skia/infra/pathkit/perf_pathkit.sh", 138 "chmod", 143 "name": "Docker setup.chmod 644 [START_DIR]/skia/modules/pathkit/npm-asmjs/bin/pathkit.js", 185 "chmod", 190 "name": "Docker setup.chmod 644 [START_DIR]/skia/modules/pathkit/npm-asmjs/bin/pathkit.js.mem", [all …]
|
| D | Perf-Debian10-EMCC-GCE-CPU-AVX2-wasm-Release-All-PathKit.json | 67 "chmod", 72 "name": "Docker setup.chmod 777 [START_DIR]/[SWARM_OUT_DIR]", 79 "chmod", 84 "name": "Docker setup.chmod 755 [START_DIR]", 91 "chmod", 96 "name": "Docker setup.chmod 0755 [START_DIR]/skia/infra/pathkit/perf_pathkit.sh", 138 "chmod", 143 "name": "Docker setup.chmod 644 [START_DIR]/skia/modules/pathkit/npm-wasm/bin/pathkit.js", 185 "chmod", 190 "name": "Docker setup.chmod 644 [START_DIR]/skia/modules/pathkit/npm-wasm/bin/pathkit.wasm", [all …]
|
| /external/skia/infra/bots/recipes/test_canvaskit.expected/ |
| D | Test-Debian10-EMCC-GCE-GPU-WEBGL1-wasm-Debug-All-CanvasKit.json | 51 "chmod", 56 "name": "Docker setup.chmod 777 [START_DIR]/[SWARM_OUT_DIR]", 63 "chmod", 68 "name": "Docker setup.chmod 755 [START_DIR]", 75 "chmod", 80 "name": "Docker setup.chmod 0755 [START_DIR]/skia/infra/canvaskit/test_canvaskit.sh", 122 "chmod", 127 "name": "Docker setup.chmod 644 [START_DIR]/skia/modules/canvaskit/build/canvaskit.js", 169 "chmod", 174 "name": "Docker setup.chmod 644 [START_DIR]/skia/modules/canvaskit/build/canvaskit.wasm", [all …]
|
| D | canvaskit_trybot.json | 51 "chmod", 56 "name": "Docker setup.chmod 777 [START_DIR]/[SWARM_OUT_DIR]", 63 "chmod", 68 "name": "Docker setup.chmod 755 [START_DIR]", 75 "chmod", 80 "name": "Docker setup.chmod 0755 [START_DIR]/skia/infra/canvaskit/test_canvaskit.sh", 122 "chmod", 127 "name": "Docker setup.chmod 644 [START_DIR]/skia/modules/canvaskit/build/canvaskit.js", 169 "chmod", 174 "name": "Docker setup.chmod 644 [START_DIR]/skia/modules/canvaskit/build/canvaskit.wasm", [all …]
|
| /external/skia/infra/bots/recipes/test_lottie_web.expected/ |
| D | Test-Debian10-none-GCE-CPU-AVX2-x86_64-Debug-All-LottieWeb.json | 94 "chmod", 99 "name": "Docker setup.chmod 777 [START_DIR]/[SWARM_OUT_DIR]", 106 "chmod", 111 "name": "Docker setup.chmod 755 [START_DIR]", 118 "chmod", 123 "name": "Docker setup.chmod 0755 [START_DIR]/skia/infra/lottiecap/docker/lottiecap_gold.sh", 130 "chmod", 136 "name": "Docker setup.chmod -R a+r [START_DIR]/lottie/build/player", 143 "chmod", 149 "name": "Docker setup.chmod -R a+r /tmp/lottie_files",
|
| D | lottie_web_trybot.json | 94 "chmod", 99 "name": "Docker setup.chmod 777 [START_DIR]/[SWARM_OUT_DIR]", 106 "chmod", 111 "name": "Docker setup.chmod 755 [START_DIR]", 118 "chmod", 123 "name": "Docker setup.chmod 0755 [START_DIR]/skia/infra/lottiecap/docker/lottiecap_gold.sh", 130 "chmod", 136 "name": "Docker setup.chmod -R a+r [START_DIR]/lottie/build/player", 143 "chmod", 149 "name": "Docker setup.chmod -R a+r /tmp/lottie_files",
|
| /external/cronet/stable/third_party/llvm-libc/src/test/src/sys/stat/ |
| D | chmod_test.cpp | 1 //===-- Unittests for chmod -----------------------------------------------===// 11 #include "src/sys/stat/chmod.h" 26 // make it readonly using chmod. We test that chmod actually succeeded by in TEST() 28 constexpr const char *TEST_FILE = "testdata/chmod.test"; in TEST() 44 EXPECT_THAT(LIBC_NAMESPACE::chmod(TEST_FILE, S_IRUSR), Succeeds(0)); in TEST() 56 EXPECT_THAT(LIBC_NAMESPACE::chmod(TEST_FILE, S_IRWXU), Succeeds(0)); in TEST() 62 ASSERT_THAT(LIBC_NAMESPACE::chmod("non-existent-file", S_IRUSR), in TEST()
|
| /external/llvm-libc/test/src/sys/stat/ |
| D | chmod_test.cpp | 1 //===-- Unittests for chmod -----------------------------------------------===// 11 #include "src/sys/stat/chmod.h" 26 // make it readonly using chmod. We test that chmod actually succeeded by in TEST() 28 constexpr const char *TEST_FILE = "testdata/chmod.test"; in TEST() 44 EXPECT_THAT(LIBC_NAMESPACE::chmod(TEST_FILE, S_IRUSR), Succeeds(0)); in TEST() 56 EXPECT_THAT(LIBC_NAMESPACE::chmod(TEST_FILE, S_IRWXU), Succeeds(0)); in TEST() 62 ASSERT_THAT(LIBC_NAMESPACE::chmod("non-existent-file", S_IRUSR), in TEST()
|
| /external/cronet/tot/third_party/llvm-libc/src/test/src/sys/stat/ |
| D | chmod_test.cpp | 1 //===-- Unittests for chmod -----------------------------------------------===// 11 #include "src/sys/stat/chmod.h" 26 // make it readonly using chmod. We test that chmod actually succeeded by in TEST() 28 constexpr const char *TEST_FILE = "testdata/chmod.test"; in TEST() 44 EXPECT_THAT(LIBC_NAMESPACE::chmod(TEST_FILE, S_IRUSR), Succeeds(0)); in TEST() 56 EXPECT_THAT(LIBC_NAMESPACE::chmod(TEST_FILE, S_IRWXU), Succeeds(0)); in TEST() 62 ASSERT_THAT(LIBC_NAMESPACE::chmod("non-existent-file", S_IRUSR), in TEST()
|
| /external/bzip2/ |
| D | Makefile | 82 chmod a+x $(PREFIX)/bin/bzip2 83 chmod a+x $(PREFIX)/bin/bunzip2 84 chmod a+x $(PREFIX)/bin/bzcat 85 chmod a+x $(PREFIX)/bin/bzip2recover 87 chmod a+r $(PREFIX)/man/man1/bzip2.1 89 chmod a+r $(PREFIX)/include/bzlib.h 91 chmod a+r $(PREFIX)/lib/libbz2.a 95 chmod a+x $(PREFIX)/bin/bzgrep 98 chmod a+x $(PREFIX)/bin/bzmore 101 chmod a+x $(PREFIX)/bin/bzdiff [all …]
|
| /external/libexif/doc/ |
| D | Makefile.am | 52 \( -type d -exec chmod 0755 {} \; \) -or \ 53 \( -type f -exec chmod 0644 {} \; \) 67 \( -type d -exec chmod 0755 {} \; \) -or \ 68 \( -type f -exec chmod 0644 {} \; \) 82 find $(DOXYGEN_OUTPUT_DIR) \( -type d -exec chmod a+rx,go-w,g+s {} \; \) \ 83 -or \( -type f -exec chmod a+r {} \; \) 88 …chmod g+rwxs,a+rx {} \; \) -or \( -type f -exec chgrp libexif {} \; -exec chmod g+rw {} \; \( -nam…
|
| /external/toybox/tests/ |
| D | chmod.test | 22 # Creating test files to test chmod command 28 chmod 777 $T 2>/dev/null 37 testing "$U$G$O $T" "chmod $U$G$O $T && ls -ld $T | cut -d' ' -f 1" \ 43 testing "750 dir 640 file" "chmod 750 dir 640 file && 49 chmod -fR 700 dir file 2>/dev/null 52 "chmod $1 dir file && ls -ld dir file | cut -d' ' -f 1 | cut -d. -f 1" \ 107 chmod +s s-supported 2>/dev/null || SKIP=99 122 "mkdir -m 000 Xd && touch Xf && chmod +X Xd Xf && ls -ld Xd Xf | cut -d' ' -f 1" \ 127 # If you explicitly ask us, we'll try (and fail) to chmod a symlink. 128 testing "-R symlink arg" 'chmod -R 750 foo/baz 2>/dev/null; echo $?' "1\n" "" "" [all …]
|
| /external/ltp/testcases/kernel/syscalls/chmod/ |
| D | chmod07.c | 10 * Verify that, chmod(2) will succeed to change the mode of a file/directory 18 * chmod() should return value 0 on success and succeeds to set sticky bit 43 * Call chmod(2) with specified mode argument in test_chmod() 46 TEST(chmod(TESTFILE, PERMS)); in test_chmod() 48 tst_brk(TFAIL | TTERRNO, "chmod(%s, %#o) failed", in test_chmod() 58 tst_res(TPASS, "Functionality of chmod(%s, %#o) successful", in test_chmod()
|
| /external/libcap/contrib/ |
| D | pcaps4server | 89 chmod $VERBOSE u+s /usr/sbin/httpd 99 chmod $VERBOSE u-s /usr/sbin/httpd 124 chmod $VERBOSE u+s /usr/sbin/httpd 135 chmod $VERBOSE u-s /usr/sbin/httpd 160 chmod $VERBOSE u+s /usr/sbin/smbd /usr/sbin/nmbd 174 chmod $VERBOSE u-s /usr/sbin/smbd /usr/sbin/nmbd 199 chmod $VERBOSE u+s /usr/sbin/named 209 chmod $VERBOSE u-s /usr/sbin/named 232 chmod $VERBOSE u+s /usr/sbin/dhcpd 242 chmod $VERBOSE u-s /usr/sbin/dhcpd [all …]
|
| /external/skia/infra/bots/recipe_modules/build/examples/full.expected/ |
| D | Build-Debian11-GCC-x86-Debug-Docker.json | 36 "chmod", 41 …"name": "Docker setup.chmod 777 [START_DIR]/cache/work/skia/out/Build-Debian11-GCC-x86-Debug-Docke… 48 "chmod", 53 "name": "Docker setup.chmod 755 [START_DIR]/cache/work", 60 "chmod", 65 "name": "Docker setup.chmod 0755 RECIPE_MODULE[skia::build]/resources/docker-compile.sh",
|
| D | Build-Debian11-GCC-x86_64-Debug-Docker.json | 36 "chmod", 41 …"name": "Docker setup.chmod 777 [START_DIR]/cache/work/skia/out/Build-Debian11-GCC-x86_64-Debug-Do… 48 "chmod", 53 "name": "Docker setup.chmod 755 [START_DIR]/cache/work", 60 "chmod", 65 "name": "Docker setup.chmod 0755 RECIPE_MODULE[skia::build]/resources/docker-compile.sh",
|