/glibc-2.36/sysdeps/unix/sysv/linux/ |
D | access.c | 27 return INLINE_SYSCALL_CALL (access, file, type); in __access() 33 weak_alias (__access, access)
|
D | not-errno.h | 30 res = INTERNAL_SYSCALL_CALL (access, pathname, mode); in __access_noerrno()
|
/glibc-2.36/io/ |
D | access.c | 43 stub_warning (access) 45 weak_alias (__access, access)
|
D | Versions | 11 access;
|
/glibc-2.36/posix/ |
D | tst-spawn-chdir.c | 64 if (access (paths[i], X_OK) == 0) in get_pwd_program() 141 TEST_COMPARE (access (probe_file_path, F_OK), -1); in do_test() 204 TEST_COMPARE (access (probe_file_path, F_OK), 0); in do_test()
|
/glibc-2.36/scripts/ |
D | check-wrapper-headers.py | 76 is_nonsysdep_header = os.access(header, os.R_OK) 83 if not os.access(include_path, os.R_OK):
|
/glibc-2.36/manual/ |
D | io.texi | 25 directories and for manipulating file attributes such as access modes 69 to access the contents of files. 140 position is incremented. In other words, access to the file is normally 143 @cindex sequential-access files 147 do permit this are sometimes referred to as @dfn{random-access} files. 151 position on a file that doesn't support random access, you get the 153 @cindex random-access files 155 Streams and descriptors that are opened for @dfn{append access} are 160 @cindex append-access files 374 that run other operating systems, it may still be possible to access [all …]
|
D | filesys.texi | 13 access permissions and modification times. 245 * Low-level Directory Access:: AS-Safe functions for directory access. 360 @code{DIR} data types, since the directory access functions do that for 450 was exposed and programs could access the fields. This does not happen 452 access. 551 even when access to the same @var{dirstream} is serialized. But in 1028 use this parameter to access the file. @code{ftw} also calls 1716 network access to a file system on another machine. 1751 * Permission Bits:: How information about a file's access 1753 * Access Permission:: How the system decides who can access a file. [all …]
|
D | job.texi | 91 The shell can give unlimited access to the controlling terminal to only 94 that are executing without such access to the terminal are called 138 @cindex controlling terminal, access to 141 unrestricted access to that terminal; background processes do not. This 143 background job tries to access its controlling terminal. 189 but it still cannot access the terminal any more. 646 When a foreground job is launched, the shell must first give it access 905 the shell should first invoke @code{tcsetpgrp} to give the job access to 1002 * Terminal Access Functions:: Functions for controlling terminal access. 1037 any reason. Even if a file name is returned, access to the file it [all …]
|
D | users.texi | 7 says which user's access permissions it has. 9 Users are classified into @dfn{groups} for access control purposes. Each 11 process can use for access to files. 14 @dfn{persona}. This determines which files the process can access. 17 change its access permissions. 39 * Enable/Disable Setuid:: Turning setuid access on and off. 41 * Tips for Setuid:: How to avoid granting unlimited access. 68 in a data base which you can access as described in @ref{User Database}. 93 is'' for purposes of access control. 104 user's default group. These values do not play a role in access [all …]
|
/glibc-2.36/sysdeps/unix/ |
D | syscalls.list | 4 access - access i:si __access access
|
/glibc-2.36/mach/ |
D | err_server.sub | 144 "(server/us) invalid access", 147 "(server/us) access denied", 156 "(server/us) exclusive access", 204 "(server/exception) invalid access",
|
D | err_kern.sub | 61 "(os/kern) no access", 106 "(os/unix) access denied", 107 "(os/unix) memory access fault",
|
/glibc-2.36/elf/ |
D | tst-tls20.c | 61 access (int i) in access() function 116 access (i); in start()
|
D | tst-tls-ie-mod.h | 35 CONCAT (access, N) (void) in CONCAT() argument
|
D | sln.c | 185 if (access (dest, F_OK)) in makesymlink()
|
/glibc-2.36/support/ |
D | support_need_proc.c | 32 if (access ("/proc/self/maps", R_OK)) in support_need_proc()
|
/glibc-2.36/sysdeps/mach/hurd/ |
D | access.c | 39 weak_alias (__access, access)
|
/glibc-2.36/sysdeps/loongarch/ |
D | configure.ac | 4 dnl It is always possible to access static and hidden symbols in an
|
/glibc-2.36/nss/ |
D | bug-erange.c | 40 if (access ("/etc/resolv.conf", R_OK)) in main()
|
/glibc-2.36/nis/ |
D | nis_defaults.c | 125 searchaccess (char *str, unsigned int access) in searchaccess() argument 129 unsigned int result = access; in searchaccess()
|
D | nis_print.c | 139 nis_print_rights (const unsigned int access) in nis_print_rights() argument 145 acc = access; /* Parameter is const ! */ in nis_print_rights()
|
/glibc-2.36/nptl/ |
D | TODO-kernel | 5 + use UID/GID in access(2), chmod(2), chown(2), link(2)
|
/glibc-2.36/sysdeps/unix/sysv/linux/ia64/ |
D | syscalls.list | 14 # DIG-compliant access to PCI configuration space:
|
/glibc-2.36/sysdeps/unix/sysv/linux/alpha/ |
D | syscalls.list | 18 # access pci space protected from machine checks:
|