Author sbt
Recipients Arfrever, DLitz, aliles, amaury.forgeotdarc, asvetlov, christian.heimes, georg.brandl, grahamd, gregory.p.smith, jcea, lemburg, neologix, pitrou, sbt, twouters, vstinner
Date 2013-11-01.16:28:52
SpamBayes Score -1.0
Marked as misclassified Yes
Message-id <1383323332.96.0.854990222022.issue16500@psf.upfronthosting.co.za>
In-reply-to
Content
It is a recent kernel and does support pipe2().

After some debugging it appears that a pipe handle created in Popen.__init__() was being leaked to a forked process, preventing Popen.__init__() from completing before the forked process did.

Previously the test passed because Popen.__init__() acquired the fork lock.
History
Date User Action Args
2013-11-01 16:28:53sbtsetrecipients: + sbt, lemburg, twouters, georg.brandl, gregory.p.smith, jcea, amaury.forgeotdarc, pitrou, vstinner, christian.heimes, grahamd, Arfrever, asvetlov, neologix, aliles, DLitz
2013-11-01 16:28:52sbtsetmessageid: <1383323332.96.0.854990222022.issue16500@psf.upfronthosting.co.za>
2013-11-01 16:28:52sbtlinkissue16500 messages
2013-11-01 16:28:52sbtcreate