Small patch around execve again. Now unlinkat() goes through into execve. Here is the fix. /yoshii
diff -u -p -r1.157 syscall.c --- a/linux-user/syscall.c 9 Dec 2007 23:12:55 -0000 1.157 +++ b/linux-user/syscall.c 11 Dec 2007 17:02:11 -0000 @@ -3177,6 +3176,7 @@ abi_long do_syscall(void *cpu_env, int n goto efault; ret = get_errno(sys_unlinkat(arg1, p, arg3)); unlock_user(p, arg2, 0); + break; #endif case TARGET_NR_execve: {