/freebsd-13-stable/contrib/sendmail/test/ |
H A D | t_pathconf.c | 62 i = fpathconf(fd, _PC_CHOWN_RESTRICTED); 63 printf("fpathconf(%s) returns %2d, errno = %d\n", tbuf, i, errno); 67 printf(" fpathconf claims that chown is safe "); 76 printf(" fpathconf claims that chown is not safe ");
|
/freebsd-13-stable/tests/sys/fs/fusefs/ |
H A D | lseek.cc | 78 EXPECT_EQ(-1, fpathconf(fd, _PC_MIN_HOLE_SIZE)); 110 EXPECT_EQ(1, fpathconf(fd, _PC_MIN_HOLE_SIZE)); 136 EXPECT_EQ(-1, fpathconf(fd, _PC_MIN_HOLE_SIZE)); 143 * will only try SEEK_HOLE/SEEK_DATA if fpathconf says they're supported. 169 EXPECT_EQ(1, fpathconf(fd, _PC_MIN_HOLE_SIZE)); 195 EXPECT_EQ(-1, fpathconf(fd, _PC_MIN_HOLE_SIZE));
|
/freebsd-13-stable/contrib/ncurses/ncurses/tinfo/ |
H A D | lib_kernel.c | 63 value = (int) fpathconf(0, _PC_VDISABLE);
|
/freebsd-13-stable/lib/libc/posix1e/ |
H A D | acl_get.c | 108 if (fpathconf(fd, _PC_ACL_NFS4) == 1)
|
H A D | acl_set.c | 101 if (fpathconf(fd, _PC_ACL_NFS4) == 1)
|
/freebsd-13-stable/sys/kern/ |
H A D | capabilities.conf | 212 ## Allow fpathconf(2), subject to capability rights. 214 fpathconf
|
/freebsd-13-stable/bin/mv/ |
H A D | mv.c | 461 ret = fpathconf(source_fd, _PC_ACL_NFS4); 466 warn("fpathconf(..., _PC_ACL_NFS4) failed for %s", 471 ret = fpathconf(source_fd, _PC_ACL_EXTENDED); 476 warn("fpathconf(..., _PC_ACL_EXTENDED) failed for %s",
|
/freebsd-13-stable/bin/cp/ |
H A D | utils.c | 437 ret = fpathconf(source_fd, _PC_ACL_NFS4); 442 warn("fpathconf(..., _PC_ACL_NFS4) failed for %s", to.p_path); 446 ret = fpathconf(source_fd, _PC_ACL_EXTENDED); 451 warn("fpathconf(..., _PC_ACL_EXTENDED) failed for %s", 497 warn("fpathconf(..., _PC_ACL_NFS4) failed for %s", source_dir); 506 warn("fpathconf(..., _PC_ACL_EXTENDED) failed for %s",
|
/freebsd-13-stable/sys/sys/ |
H A D | syscall.mk | 126 fpathconf.o \
|
/freebsd-13-stable/lib/libc/include/ |
H A D | namespace.h | 70 #define fpathconf _fpathconf macro
|
H A D | un-namespace.h | 51 #undef fpathconf macro
|
/freebsd-13-stable/tools/regression/security/cap_test/ |
H A D | cap_test_capabilities.c | 343 ret = fpathconf(fd_cap, _PC_NAME_MAX); 344 CHECK_RESULT(fpathconf, CAP_FPATHCONF, ret >= 0);
|
/freebsd-13-stable/include/ |
H A D | unistd.h | 339 long fpathconf(int, int);
|
/freebsd-13-stable/contrib/libarchive/libarchive/ |
H A D | archive_read_disk_posix.c | 1491 fpathconf(fd, _PC_REC_INCR_XFER_SIZE); 1493 fpathconf(fd, _PC_REC_MAX_XFER_SIZE); 1495 fpathconf(fd, _PC_REC_MIN_XFER_SIZE); 1497 fpathconf(fd, _PC_REC_XFER_ALIGN); 1639 nm = fpathconf(tree_current_dir_fd(t), _PC_NAME_MAX); 1973 nm = fpathconf(tree_current_dir_fd(t), _PC_NAME_MAX);
|
H A D | archive_read_disk_entry_from_file.c | 981 if (fpathconf(*fd, _PC_MIN_HOLE_SIZE) <= 0)
|
/freebsd-13-stable/lib/libc/sys/ |
H A D | Makefile.inc | 443 MLINKS+=pathconf.2 fpathconf.2
|
/freebsd-13-stable/tests/sys/audit/ |
H A D | file-attribute-access.c | 808 "fpathconf(2) call"); 814 snprintf(extregex, sizeof(extregex), "fpathconf.*%d.*success", pid); 816 /* File needs to exist to call fpathconf(2) */ 820 ATF_REQUIRE(fpathconf(filedesc, _PC_NAME_MAX) != -1); 835 "fpathconf(2) call"); 841 const char *regex = "fpathconf.*return,failure : Bad file descriptor"; 843 ATF_REQUIRE_ERRNO(EBADF, fpathconf(-1, _PC_NAME_MAX) == -1);
|
/freebsd-13-stable/contrib/tcsh/ |
H A D | ed.init.c | 154 if ((pcret = fpathconf(SHTTY, _PC_VDISABLE)) == -1L)
|
/freebsd-13-stable/contrib/pjdfstest/ |
H A D | pjdfstest.c | 253 { "fpathconf", ACTION_FPATHCONF, { TYPE_DESCRIPTOR, TYPE_STRING, TYPE_NONE } }, 1095 lrval = fpathconf(NUM(0), name);
|
/freebsd-13-stable/tests/sys/file/ |
H A D | path_test.c | 127 /* fpathconf(2) and fstat(2) are permitted. */ 129 ATF_REQUIRE_MSG(fpathconf(pathfd, _PC_LINK_MAX) != -1, 130 FMT_ERR("fpathconf"));
|
/freebsd-13-stable/tools/regression/security/open_to_operation/ |
H A D | open_to_operation.c | 51 * fpathconf(2) any yes 382 * fpathconf() should work regardless of open mode. 391 l = fpathconf(fd, _PC_FILESIZEBITS);
|
/freebsd-13-stable/contrib/capsicum-test/ |
H A D | capability-fd.cc | 579 CHECK_RIGHT_RESULT(fpathconf(cap_fd, _PC_NAME_MAX), rights, CAP_FPATHCONF);
|
/freebsd-13-stable/contrib/lib9p/backend/ |
H A D | fs.c | 2158 name_max = fpathconf(fd, _PC_NAME_MAX);
|
/freebsd-13-stable/contrib/sendmail/src/ |
H A D | conf.c | 3722 ** fpathconf() routine. According to IEEE 1003.1-1990, if 3728 ** Also, some systems (e.g., IRIX 6.2) return 1 from fpathconf() 3746 ** to the root) then we can relax slightly and trust fpathconf 3790 rval = fpathconf(fd, _PC_CHOWN_RESTRICTED);
|
/freebsd-13-stable/contrib/ntp/ntpd/ |
H A D | refclock_parse.c | 3108 disablec = fpathconf(parse->generic->io.fd, _PC_VDISABLE); 3111 msyslog(LOG_ERR, "PARSE receiver #%d: parse_start: fpathconf(fd, _PC_VDISABLE): %m", CLK_UNIT(parse->peer));
|