/freebsd-10.2-release/contrib/sendmail/test/ |
H A D | t_pathconf.c | 62 i = fpathconf(fd, _PC_CHOWN_RESTRICTED); 63 printf("fpathconf(%s) returns %2d, errno = %d\n", tbuf, i, errno); 67 printf(" fpathconf claims that chown is safe "); 76 printf(" fpathconf claims that chown is not safe ");
|
/freebsd-10.2-release/contrib/ncurses/ncurses/tinfo/ |
H A D | lib_kernel.c | 62 value = fpathconf(0, _PC_VDISABLE);
|
/freebsd-10.2-release/lib/libc/posix1e/ |
H A D | acl_get.c | 106 if (fpathconf(fd, _PC_ACL_NFS4) == 1)
|
H A D | acl_set.c | 99 if (fpathconf(fd, _PC_ACL_NFS4) == 1)
|
/freebsd-10.2-release/sys/kern/ |
H A D | capabilities.conf | 194 ## Allow fpathconf(2), subject to capability rights. 196 fpathconf
|
/freebsd-10.2-release/bin/mv/ |
H A D | mv.c | 450 ret = fpathconf(source_fd, _PC_ACL_NFS4); 455 warn("fpathconf(..., _PC_ACL_NFS4) failed for %s", 460 ret = fpathconf(source_fd, _PC_ACL_EXTENDED); 465 warn("fpathconf(..., _PC_ACL_EXTENDED) failed for %s",
|
/freebsd-10.2-release/bin/cp/ |
H A D | utils.c | 401 ret = fpathconf(source_fd, _PC_ACL_NFS4); 406 warn("fpathconf(..., _PC_ACL_NFS4) failed for %s", to.p_path); 410 ret = fpathconf(source_fd, _PC_ACL_EXTENDED); 415 warn("fpathconf(..., _PC_ACL_EXTENDED) failed for %s", 461 warn("fpathconf(..., _PC_ACL_NFS4) failed for %s", source_dir); 470 warn("fpathconf(..., _PC_ACL_EXTENDED) failed for %s",
|
/freebsd-10.2-release/sys/sys/ |
H A D | syscall.mk | 135 fpathconf.o \
|
/freebsd-10.2-release/lib/libc/include/ |
H A D | namespace.h | 67 #define fpathconf _fpathconf macro
|
H A D | un-namespace.h | 48 #undef fpathconf macro
|
/freebsd-10.2-release/tools/regression/security/cap_test/ |
H A D | cap_test_capabilities.c | 343 ret = fpathconf(fd_cap, _PC_NAME_MAX); 344 CHECK_RESULT(fpathconf, CAP_FPATHCONF, ret >= 0);
|
/freebsd-10.2-release/include/ |
H A D | unistd.h | 337 long fpathconf(int, int);
|
/freebsd-10.2-release/contrib/libarchive/libarchive/ |
H A D | archive_read_disk_posix.c | 1432 fpathconf(fd, _PC_REC_INCR_XFER_SIZE); 1434 fpathconf(fd, _PC_REC_MAX_XFER_SIZE); 1436 fpathconf(fd, _PC_REC_MIN_XFER_SIZE); 1438 fpathconf(fd, _PC_REC_XFER_ALIGN); 1566 nm = fpathconf(tree_current_dir_fd(t), _PC_NAME_MAX); 1876 nm = fpathconf(tree_current_dir_fd(t), _PC_NAME_MAX);
|
H A D | archive_read_disk_entry_from_file.c | 1211 if (fpathconf(*fd, _PC_MIN_HOLE_SIZE) <= 0)
|
/freebsd-10.2-release/lib/libc/sys/ |
H A D | Makefile.inc | 406 MLINKS+=pathconf.2 fpathconf.2
|
/freebsd-10.2-release/contrib/tcsh/ |
H A D | ed.init.c | 158 if ((pcret = fpathconf(SHTTY, _PC_VDISABLE)) == -1L)
|
/freebsd-10.2-release/contrib/llvm/tools/lldb/source/Host/common/ |
H A D | FileSpec.cpp | 1028 long path_max = fpathconf (dirfd (dir_path_dir.get()), _PC_NAME_MAX);
|
/freebsd-10.2-release/contrib/pjdfstest/ |
H A D | pjdfstest.c | 204 { "fpathconf", ACTION_FPATHCONF, { TYPE_DESCRIPTOR, TYPE_STRING, TYPE_NONE } }, 923 lrval = fpathconf(NUM(0), name);
|
/freebsd-10.2-release/tools/regression/pjdfstest/ |
H A D | pjdfstest.c | 202 { "fpathconf", ACTION_FPATHCONF, { TYPE_DESCRIPTOR, TYPE_STRING, TYPE_NONE } }, 917 lrval = fpathconf(NUM(0), name);
|
/freebsd-10.2-release/tools/regression/security/open_to_operation/ |
H A D | open_to_operation.c | 51 * fpathconf(2) any yes 382 * fpathconf() should work regardless of open mode. 391 l = fpathconf(fd, _PC_FILESIZEBITS);
|
/freebsd-10.2-release/contrib/gcc/ |
H A D | sys-protos.h | 384 extern long int fpathconf(int, int);
|
/freebsd-10.2-release/contrib/ntp/ntpd/ |
H A D | refclock_parse.c | 3107 disablec = fpathconf(parse->generic->io.fd, _PC_VDISABLE); 3110 msyslog(LOG_ERR, "PARSE receiver #%d: parse_start: fpathconf(fd, _PC_VDISABLE): %m", CLK_UNIT(parse->peer));
|
/freebsd-10.2-release/contrib/sendmail/src/ |
H A D | conf.c | 3657 ** fpathconf() routine. According to IEEE 1003.1-1990, if 3663 ** Also, some systems (e.g., IRIX 6.2) return 1 from fpathconf() 3681 ** to the root) then we can relax slightly and trust fpathconf 3725 rval = fpathconf(fd, _PC_CHOWN_RESTRICTED);
|