From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dan.rpsys.net (5751f4a1.skybroadband.com [87.81.244.161]) by mail.openembedded.org (Postfix) with ESMTP id D4FCB788CE for ; Fri, 23 Mar 2018 23:47:35 +0000 (UTC) Received: from hex ([192.168.3.34]) (authenticated bits=0) by dan.rpsys.net (8.15.2/8.15.2/Debian-3) with ESMTPSA id w2NNlUrw030342 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NOT); Fri, 23 Mar 2018 23:47:31 GMT Message-ID: <1521848850.11431.36.camel@linuxfoundation.org> From: Richard Purdie To: Seebs , "Burton, Ross" Date: Fri, 23 Mar 2018 23:47:30 +0000 In-Reply-To: <20180323114939.218c0607@seebsdell> References: <20180323112820.12bc94a4@seebsdell> <20180323114939.218c0607@seebsdell> X-Mailer: Evolution 3.18.5.2-0ubuntu3.2 Mime-Version: 1.0 X-Virus-Scanned: clamav-milter 0.99.3 at dan X-Virus-Status: Clean Cc: Enrico Scholz , OE-core Subject: Re: pseudo: host user contamination X-BeenThere: openembedded-core@lists.openembedded.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Patches and discussions about the oe-core layer List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 23 Mar 2018 23:47:36 -0000 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit On Fri, 2018-03-23 at 11:49 -0500, Seebs wrote: > On Fri, 23 Mar 2018 16:30:55 +0000 > "Burton, Ross" wrote: > > > > > Because in GNU's infinite wisdom they're using renameat2() to do > > atomic renames in the mv command, and as renameat2 isn't in the > > headers for F27 it just does a syscall directly. This is in > > upstream > > coreutils so once they make a release, everyone gets it. > UGH. > > I... am really unsure whether it's possible to catch that, because > I really, really, don't want to try to intercept raw syscall() calls. > I don't think that ends well. Just out of interest for my education, why is that a really bad idea? Loops, e.g. with memory allocation issues? Cheers, Richard