aboutsummaryrefslogtreecommitdiff
path: root/src/syscall/exec_linux.go
diff options
context:
space:
mode:
authorRuss Cox <rsc@golang.org>2025-10-28 21:54:33 -0400
committerRuss Cox <rsc@golang.org>2025-10-29 11:00:09 -0700
commit49c1da474d68045458b9462b743e3f0f7dcefdfb (patch)
treeb44ac2cf3b548dd2e4bc3ab067614408ad0694eb /src/syscall/exec_linux.go
parentb2a346bbd1e1e9cb069001cf86ef39b0dd5722f8 (diff)
downloadgo-49c1da474d68045458b9462b743e3f0f7dcefdfb.tar.xz
internal/itoa, internal/runtime/strconv: delete
Replaced by internal/strconv. Change-Id: I0656a9ad5075e60339e963fbae7d194d2f3e16be Reviewed-on: https://go-review.googlesource.com/c/go/+/716001 Reviewed-by: David Chase <drchase@google.com> LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
Diffstat (limited to 'src/syscall/exec_linux.go')
-rw-r--r--src/syscall/exec_linux.go10
1 files changed, 5 insertions, 5 deletions
diff --git a/src/syscall/exec_linux.go b/src/syscall/exec_linux.go
index 14c13e273a..73582d0aea 100644
--- a/src/syscall/exec_linux.go
+++ b/src/syscall/exec_linux.go
@@ -8,7 +8,7 @@ package syscall
import (
errpkg "errors"
- "internal/itoa"
+ "internal/strconv"
"runtime"
"unsafe"
)
@@ -681,7 +681,7 @@ childerror:
func formatIDMappings(idMap []SysProcIDMap) []byte {
var data []byte
for _, im := range idMap {
- data = append(data, itoa.Itoa(im.ContainerID)+" "+itoa.Itoa(im.HostID)+" "+itoa.Itoa(im.Size)+"\n"...)
+ data = append(data, strconv.Itoa(im.ContainerID)+" "+strconv.Itoa(im.HostID)+" "+strconv.Itoa(im.Size)+"\n"...)
}
return data
}
@@ -710,7 +710,7 @@ func writeIDMappings(path string, idMap []SysProcIDMap) error {
// This is needed since kernel 3.19, because you can't write gid_map without
// disabling setgroups() system call.
func writeSetgroups(pid int, enable bool) error {
- sgf := "/proc/" + itoa.Itoa(pid) + "/setgroups"
+ sgf := "/proc/" + strconv.Itoa(pid) + "/setgroups"
fd, err := Open(sgf, O_RDWR, 0)
if err != nil {
return err
@@ -735,7 +735,7 @@ func writeSetgroups(pid int, enable bool) error {
// for a process and it is called from the parent process.
func writeUidGidMappings(pid int, sys *SysProcAttr) error {
if sys.UidMappings != nil {
- uidf := "/proc/" + itoa.Itoa(pid) + "/uid_map"
+ uidf := "/proc/" + strconv.Itoa(pid) + "/uid_map"
if err := writeIDMappings(uidf, sys.UidMappings); err != nil {
return err
}
@@ -746,7 +746,7 @@ func writeUidGidMappings(pid int, sys *SysProcAttr) error {
if err := writeSetgroups(pid, sys.GidMappingsEnableSetgroups); err != nil && err != ENOENT {
return err
}
- gidf := "/proc/" + itoa.Itoa(pid) + "/gid_map"
+ gidf := "/proc/" + strconv.Itoa(pid) + "/gid_map"
if err := writeIDMappings(gidf, sys.GidMappings); err != nil {
return err
}