diff options
| author | Russ Cox <rsc@golang.org> | 2025-10-28 21:54:33 -0400 |
|---|---|---|
| committer | Russ Cox <rsc@golang.org> | 2025-10-29 11:00:09 -0700 |
| commit | 49c1da474d68045458b9462b743e3f0f7dcefdfb (patch) | |
| tree | b44ac2cf3b548dd2e4bc3ab067614408ad0694eb /src/syscall/exec_linux.go | |
| parent | b2a346bbd1e1e9cb069001cf86ef39b0dd5722f8 (diff) | |
| download | go-49c1da474d68045458b9462b743e3f0f7dcefdfb.tar.xz | |
internal/itoa, internal/runtime/strconv: delete
Replaced by internal/strconv.
Change-Id: I0656a9ad5075e60339e963fbae7d194d2f3e16be
Reviewed-on: https://go-review.googlesource.com/c/go/+/716001
Reviewed-by: David Chase <drchase@google.com>
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
Diffstat (limited to 'src/syscall/exec_linux.go')
| -rw-r--r-- | src/syscall/exec_linux.go | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/src/syscall/exec_linux.go b/src/syscall/exec_linux.go index 14c13e273a..73582d0aea 100644 --- a/src/syscall/exec_linux.go +++ b/src/syscall/exec_linux.go @@ -8,7 +8,7 @@ package syscall import ( errpkg "errors" - "internal/itoa" + "internal/strconv" "runtime" "unsafe" ) @@ -681,7 +681,7 @@ childerror: func formatIDMappings(idMap []SysProcIDMap) []byte { var data []byte for _, im := range idMap { - data = append(data, itoa.Itoa(im.ContainerID)+" "+itoa.Itoa(im.HostID)+" "+itoa.Itoa(im.Size)+"\n"...) + data = append(data, strconv.Itoa(im.ContainerID)+" "+strconv.Itoa(im.HostID)+" "+strconv.Itoa(im.Size)+"\n"...) } return data } @@ -710,7 +710,7 @@ func writeIDMappings(path string, idMap []SysProcIDMap) error { // This is needed since kernel 3.19, because you can't write gid_map without // disabling setgroups() system call. func writeSetgroups(pid int, enable bool) error { - sgf := "/proc/" + itoa.Itoa(pid) + "/setgroups" + sgf := "/proc/" + strconv.Itoa(pid) + "/setgroups" fd, err := Open(sgf, O_RDWR, 0) if err != nil { return err @@ -735,7 +735,7 @@ func writeSetgroups(pid int, enable bool) error { // for a process and it is called from the parent process. func writeUidGidMappings(pid int, sys *SysProcAttr) error { if sys.UidMappings != nil { - uidf := "/proc/" + itoa.Itoa(pid) + "/uid_map" + uidf := "/proc/" + strconv.Itoa(pid) + "/uid_map" if err := writeIDMappings(uidf, sys.UidMappings); err != nil { return err } @@ -746,7 +746,7 @@ func writeUidGidMappings(pid int, sys *SysProcAttr) error { if err := writeSetgroups(pid, sys.GidMappingsEnableSetgroups); err != nil && err != ENOENT { return err } - gidf := "/proc/" + itoa.Itoa(pid) + "/gid_map" + gidf := "/proc/" + strconv.Itoa(pid) + "/gid_map" if err := writeIDMappings(gidf, sys.GidMappings); err != nil { return err } |
