diff options
author | dchagin <dchagin@FreeBSD.org> | 2016-01-09 16:21:39 +0000 |
---|---|---|
committer | dchagin <dchagin@FreeBSD.org> | 2016-01-09 16:21:39 +0000 |
commit | f186d260e20055dcef427cd84b8175fb7b70b81b (patch) | |
tree | 3daa74fea849f02f303adaf7e9ab730e5dc281cf /sys/i386 | |
parent | 9bb36bc01cd74565fb879d43a4431edff14a2741 (diff) | |
download | FreeBSD-src-f186d260e20055dcef427cd84b8175fb7b70b81b.zip FreeBSD-src-f186d260e20055dcef427cd84b8175fb7b70b81b.tar.gz |
MFC r283428:
Change linux faccessat syscall definition to match actual linux one.
The AT_EACCESS and AT_SYMLINK_NOFOLLOW flags are actually implemented
within the glibc wrapper function for faccessat(). If either of these
flags are specified, then the wrapper function employs fstatat() to
determine access permissions.
Diffstat (limited to 'sys/i386')
-rw-r--r-- | sys/i386/linux/syscalls.master | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/sys/i386/linux/syscalls.master b/sys/i386/linux/syscalls.master index 4455c33..9477910 100644 --- a/sys/i386/linux/syscalls.master +++ b/sys/i386/linux/syscalls.master @@ -515,7 +515,8 @@ char *buf, l_int bufsiz); } 306 AUE_FCHMODAT STD { int linux_fchmodat(l_int dfd, const char *filename, \ l_mode_t mode); } -307 AUE_FACCESSAT STD { int linux_faccessat(l_int dfd, const char *filename, l_int amode, l_int flag); } +307 AUE_FACCESSAT STD { int linux_faccessat(l_int dfd, const char *filename, \ + l_int amode); } 308 AUE_SELECT STD { int linux_pselect6(l_int nfds, l_fd_set *readfds, \ l_fd_set *writefds, l_fd_set *exceptfds, \ struct l_timespec *tsp, l_uintptr_t *sig); } |