From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mailman by lists.gnu.org with tmda-scanned (Exim 4.43) id 1MMkNm-0004zl-TX for qemu-devel@nongnu.org; Fri, 03 Jul 2009 11:08:58 -0400 Received: from exim by lists.gnu.org with spam-scanned (Exim 4.43) id 1MMkNg-0004ss-M3 for qemu-devel@nongnu.org; Fri, 03 Jul 2009 11:08:57 -0400 Received: from [199.232.76.173] (port=33316 helo=monty-python.gnu.org) by lists.gnu.org with esmtp (Exim 4.43) id 1MMkNg-0004sR-2y for qemu-devel@nongnu.org; Fri, 03 Jul 2009 11:08:52 -0400 Received: from cantor2.suse.de ([195.135.220.15]:41347 helo=mx2.suse.de) by monty-python.gnu.org with esmtps (TLS-1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.60) (envelope-from ) id 1MMkNf-0008Pf-7Q for qemu-devel@nongnu.org; Fri, 03 Jul 2009 11:08:51 -0400 Received: from relay2.suse.de (relay-ext.suse.de [195.135.221.8]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mx2.suse.de (Postfix) with ESMTP id 4D6D78640B for ; Fri, 3 Jul 2009 17:08:48 +0200 (CEST) From: Ulrich Hecht Date: Fri, 3 Jul 2009 17:09:29 +0200 Message-Id: <1246633770-13404-5-git-send-email-uli@suse.de> In-Reply-To: <1246633770-13404-4-git-send-email-uli@suse.de> References: <1246633770-13404-1-git-send-email-uli@suse.de> <1246633770-13404-2-git-send-email-uli@suse.de> <1246633770-13404-3-git-send-email-uli@suse.de> <1246633770-13404-4-git-send-email-uli@suse.de> Subject: [Qemu-devel] [PATCH 3/4] wrap path for access syscall List-Id: qemu-devel.nongnu.org List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: qemu-devel@nongnu.org Signed-off-by: Ulrich Hecht --- linux-user/syscall.c | 2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/linux-user/syscall.c b/linux-user/syscall.c index e541b0d..498ce49 100644 --- a/linux-user/syscall.c +++ b/linux-user/syscall.c @@ -4529,7 +4529,7 @@ abi_long do_syscall(void *cpu_env, int num, abi_long arg1, case TARGET_NR_access: if (!(p = lock_user_string(arg1))) goto efault; - ret = get_errno(access(p, arg2)); + ret = get_errno(access(path(p), arg2)); unlock_user(p, arg1, 0); break; #if defined(TARGET_NR_faccessat) && defined(__NR_faccessat) -- 1.6.2.1