syscallcompat: add Faccessat
Add faccessat(2) with a hack for symlink, because the kernel does not actually looks at the passed flags. From man 2 faccessat: C library/kernel differences The raw faccessat() system call takes only the first three argu‐ ments. The AT_EACCESS and AT_SYMLINK_NOFOLLOW flags are actually implemented within the glibc wrapper function for faccessat().
This commit is contained in:
parent
6bd2da89d3
commit
2ceef01afe
@ -1,6 +1,8 @@
|
|||||||
package syscallcompat
|
package syscallcompat
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"syscall"
|
||||||
|
|
||||||
"golang.org/x/sys/unix"
|
"golang.org/x/sys/unix"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -21,3 +23,18 @@ func Readlinkat(dirfd int, path string) (string, error) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Faccessat exists both in Linux and in MacOS 10.10+, but the Linux version
|
||||||
|
// DOES NOT support any flags. Emulate AT_SYMLINK_NOFOLLOW like glibc does.
|
||||||
|
func Faccessat(dirfd int, path string, mode uint32) error {
|
||||||
|
var st unix.Stat_t
|
||||||
|
err := Fstatat(dirfd, path, &st, unix.AT_SYMLINK_NOFOLLOW)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if st.Mode&syscall.S_IFMT == syscall.S_IFLNK {
|
||||||
|
// Pretend that a symlink is always accessible
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
return unix.Faccessat(dirfd, path, mode, 0)
|
||||||
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user