summaryrefslogtreecommitdiff
path: root/internal/syscallcompat/sys_linux.go
diff options
context:
space:
mode:
authorSebastian Lackner2019-01-14 02:32:28 +0100
committerrfjakob2019-01-14 21:27:28 +0100
commitda557702d713e38a8c6c4c28275724c70988f919 (patch)
tree615a8c9487b52c18d74bed29defd03d03c933743 /internal/syscallcompat/sys_linux.go
parentd7be76685128cb2cdca01becd856ea57cc18ef34 (diff)
syscallcompat: Drop Openat emulation on macOS.
Diffstat (limited to 'internal/syscallcompat/sys_linux.go')
-rw-r--r--internal/syscallcompat/sys_linux.go18
1 files changed, 0 insertions, 18 deletions
diff --git a/internal/syscallcompat/sys_linux.go b/internal/syscallcompat/sys_linux.go
index 6f2a70d..d5dc021 100644
--- a/internal/syscallcompat/sys_linux.go
+++ b/internal/syscallcompat/sys_linux.go
@@ -58,24 +58,6 @@ func Fallocate(fd int, mode uint32, off int64, len int64) (err error) {
return syscall.Fallocate(fd, mode, off, len)
}
-// Openat wraps the Openat syscall.
-func Openat(dirfd int, path string, flags int, mode uint32) (fd int, err error) {
- if flags&syscall.O_CREAT != 0 {
- // O_CREAT should be used with O_EXCL. O_NOFOLLOW has no effect with O_EXCL.
- if flags&syscall.O_EXCL == 0 {
- tlog.Warn.Printf("Openat: O_CREAT without O_EXCL: flags = %#x", flags)
- flags |= syscall.O_EXCL
- }
- } else {
- // If O_CREAT is not used, we should use O_NOFOLLOW
- if flags&syscall.O_NOFOLLOW == 0 {
- tlog.Warn.Printf("Openat: O_NOFOLLOW missing: flags = %#x", flags)
- flags |= syscall.O_NOFOLLOW
- }
- }
- return syscall.Openat(dirfd, path, flags, mode)
-}
-
// OpenatUser runs the Openat syscall in the context of a different user.
func OpenatUser(dirfd int, path string, flags int, mode uint32, context *fuse.Context) (fd int, err error) {
if context != nil {