Message235889
| Author |
vstinner |
| Recipients |
vstinner |
| Date |
2015年02月13日.12:32:39 |
| SpamBayes Score |
-1.0 |
| Marked as misclassified |
Yes |
| Message-id |
<1423830759.75.0.255479243543.issue23459@psf.upfronthosting.co.za> |
| In-reply-to |
| Content |
execveat() was added to Linux in kernel 3.19:
http://man7.org/linux/man-pages/man2/execveat.2.html
It may be interesting to expose it in Python.
"The primary aim of adding an execveat syscall is to allow an
implementation of fexecve(3) that does not rely on the /proc
filesystem. The current glibc version of fexecve(3) is implemented
via /proc, which causes problems in sandboxed or otherwise restricted
environments."
http://lwn.net/Articles/600344/ |
|
History
|
|---|
| Date |
User |
Action |
Args |
| 2015年02月13日 12:32:39 | vstinner | set | recipients:
+ vstinner |
| 2015年02月13日 12:32:39 | vstinner | set | messageid: <1423830759.75.0.255479243543.issue23459@psf.upfronthosting.co.za> |
| 2015年02月13日 12:32:39 | vstinner | link | issue23459 messages |
| 2015年02月13日 12:32:39 | vstinner | create |
|