The AT_EACCESS and AT_SYMLINK_NOFOLLOW flags are actually implemented
within the glibc wrapper function for faccessat(). If either of these
flags are specified, then the wrapper function employs fstatat() to
determine access permissions.
Details
Details
- Reviewers
trasz - Group Reviewers
Linux Emulation - Commits
- rS283428: Change linux faccessat syscall definition to match actual linux one.
Diff Detail
Diff Detail
- Repository
- rS FreeBSD src repository - subversion
- Lint
Lint Not Applicable - Unit
Tests Not Applicable
Event Timeline
sys/compat/linux/linux_file.c | ||
---|---|---|
601 ↗ | (On Diff #2224) | Get rid of flag variable and pass AT_EACCESS directly, perhaps? |