diff options
| author | Jakob Unterwurzacher | 2026-02-07 21:19:14 +0100 |
|---|---|---|
| committer | Jakob Unterwurzacher | 2026-02-07 22:40:22 +0100 |
| commit | c190dcdbbd623b76a2be7c41240fcc9ede35bac8 (patch) | |
| tree | f2469c63a23c3f4de8def3db8d0a127fa1b66bc4 /internal/fusefrontend | |
| parent | 7050921867531d5e47f8762490de14bd1ba5fb79 (diff) | |
darwin: syscallcompat: Openat: use O_SYMLINKo_symlink
Also add tests that opening a symlink (using unix.O_PATH | unix.O_NOFOLLOW)
works.
https://github.com/rfjakob/gocryptfs/issues/993
Diffstat (limited to 'internal/fusefrontend')
| -rw-r--r-- | internal/fusefrontend/root_node.go | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/internal/fusefrontend/root_node.go b/internal/fusefrontend/root_node.go index 489e3c6..7898366 100644 --- a/internal/fusefrontend/root_node.go +++ b/internal/fusefrontend/root_node.go @@ -124,11 +124,11 @@ func (rn *RootNode) mangleOpenFlags(flags uint32) (newFlags int) { // accesses. Running xfstests generic/013 on ext4 used to trigger lots of // EINVAL errors due to missing alignment. Just fall back to buffered IO. newFlags = newFlags &^ syscallcompat.O_DIRECT - // Create and Open are two separate FUSE operations, so O_CREAT should not - // be part of the open flags. + // Create and Open are two separate FUSE operations, so O_CREAT should usually not + // be part of the Open() flags. Create() will add O_CREAT back itself. newFlags = newFlags &^ syscall.O_CREAT // We always want O_NOFOLLOW to be safe against symlink races - newFlags |= syscall.O_NOFOLLOW + newFlags |= syscallcompat.OpenatFlagNofollowSymlink return newFlags } |
