Searched refs:S_IXUSR (Results 1 – 10 of 10) sorted by relevance
| /xnu-12377.41.6/bsd/sys/_types/ |
| H A D | _s_ifmt.h | 52 #define S_IXUSR 0000100 /* [XSI] X for owner */ macro 72 #define S_IEXEC S_IXUSR /* backward compatability */
|
| /xnu-12377.41.6/tests/vm/ |
| H A D | vm_tainted_executable.c | 92 T_QUIET; T_ASSERT_POSIX_SUCCESS(fchmod(fd2, S_IRUSR | S_IXUSR), NULL);
|
| /xnu-12377.41.6/tests/ |
| H A D | vm_test_code_signing.c | 317 T_ASSERT_BITS_SET(sb.st_mode, S_IXUSR, "check %s EXEC permission", exec_path); in check_executable()
|
| H A D | net_bridge.c | 3158 return stat(path, &statb) == 0 && (statb.st_mode & S_IXUSR) != 0; in executable_is_present()
|
| /xnu-12377.41.6/bsd/miscfs/nullfs/ |
| H A D | null_vnops.c | 230 …VATTR_RETURN(args->a_vap, va_mode, S_IFDIR | S_IRUSR | S_IXUSR | S_IRGRP | S_IXGRP | S_IROTH | S_I… in nullfs_special_getattr() 306 mode |= S_IXUSR; in nullfs_getattr() 308 mode &= ~S_IXUSR; in nullfs_getattr()
|
| /xnu-12377.41.6/bsd/miscfs/devfs/ |
| H A D | devfs_fdesc_support.c | 498 vap->va_mode &= ~(S_IXUSR | S_IXGRP | S_IXOTH); in fdesc_attr()
|
| /xnu-12377.41.6/tests/ktrace/ |
| H A D | kdebug_tests.c | 1538 ret = mkdir(dir, S_IRUSR | S_IWUSR | S_IXUSR);
|
| /xnu-12377.41.6/bsd/vfs/ |
| H A D | vfs_subr.c | 9328 needed |= S_IXUSR; in vnode_authorize_posix() 9445 (vap->va_mode & S_IXUSR) ? "x" : "-", in vnode_authorize_posix() 10191 !(vcp->vap->va_mode & (S_IXUSR | S_IXGRP | S_IXOTH))) { in vnode_attr_authorize_internal() 10426 ((va.va_mode & (S_IXUSR | S_IXGRP | S_IXOTH)) == in vnode_authorize_callback_int() 10427 (S_IXUSR | S_IXGRP | S_IXOTH))) { in vnode_authorize_callback_int()
|
| H A D | vfs_xattr.c | 1256 VATTR_SET(&va, va_mode, S_IRUSR | S_IXUSR); in get_shadow_dir()
|
| /xnu-12377.41.6/bsd/kern/ |
| H A D | kern_exec.c | 7250 if (!vfs_authopaque(vnode_mount(vp)) && ((vap->va_mode & (S_IXUSR | S_IXGRP | S_IXOTH)) == 0)) { in exec_check_permissions()
|