homepage

This issue tracker has been migrated to GitHub , and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author r.david.murray
Recipients r.david.murray, socketpair, vstinner
Date 2016年05月30日.23:57:43
SpamBayes Score -1.0
Marked as misclassified Yes
Message-id <1464652663.15.0.205967385871.issue23459@psf.upfronthosting.co.za>
In-reply-to
Content
You can currently call os.execve with a file pointer. How is that different from adding an execveat with AS_EMPTY_PATH, functionally? I think we don't need to add this syscall, because it is intended to allow more robust implementation of fexecve, and we are already effectvely exposing fexecve. We should be able to assume that glibc will switch to using execveat under the hood, and not worry about it ourselves. If that's not true, then we can revisit this.
History
Date User Action Args
2016年05月30日 23:57:43r.david.murraysetrecipients: + r.david.murray, vstinner, socketpair
2016年05月30日 23:57:43r.david.murraysetmessageid: <1464652663.15.0.205967385871.issue23459@psf.upfronthosting.co.za>
2016年05月30日 23:57:43r.david.murraylinkissue23459 messages
2016年05月30日 23:57:43r.david.murraycreate

AltStyle によって変換されたページ (->オリジナル) /