Small patch around execve again. Now unlinkat() goes through into execve. Here is the fix. /yoshii
diff -u -p -r1.157 syscall.c
--- a/linux-user/syscall.c 9 Dec 2007 23:12:55 -0000 1.157
+++ b/linux-user/syscall.c 11 Dec 2007 17:02:11 -0000
@@ -3177,6 +3176,7 @@ abi_long do_syscall(void *cpu_env, int n
goto efault;
ret = get_errno(sys_unlinkat(arg1, p, arg3));
unlock_user(p, arg2, 0);
+ break;
#endif
case TARGET_NR_execve:
{
