[OE-core] pseudo: host user contamination
Enrico Scholz
enrico.scholz at sigma-chemnitz.de
Tue Mar 27 16:35:32 UTC 2018
Seebs <seebs-59Mtl4G6ZbFeoWH0uzbU5w at public.gmane.org> writes:
> On Tue, 27 Mar 2018 16:42:03 +0200
> Enrico Scholz <enrico.scholz-wttK6gPy29v+Hn7q9Vec/7NAH6kLmebB at public.gmane.org> wrote:
>
>> will work to wrap syscall(2). Params for _renameat2_syscall() can be
>> extracted by va_args.
>
> Does anyone have access to an actual 64-bit EABI ARM system to verify
> the argument passing for renameat2 there?
Does this really matter here? Because the caller has to set them
accordingly the ABI, you can extract the arguments by
int olddirfd = va_arg(ap, int);
char const *oldpath = va_arg(ap, char consr *);
int newdirfd = va_arg(ap, int);
char const *newpath = va_arg(ap, char consr *);
unsigned int flags = va_arg(ap, unsigned int);
There are no 64 bit arguments (on 32 bit platforms) which might require a
special treatment as described in [1] "Architecture-specific requirements".
Enrico
Footnotes:
[1] http://man7.org/linux/man-pages/man2/syscall.2.html
More information about the Openembedded-core
mailing list