This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author vstinner
Recipients vstinner
Date 2015-02-13.12:32:39
SpamBayes Score -1.0
Marked as misclassified Yes
Message-id <1423830759.75.0.255479243543.issue23459@psf.upfronthosting.co.za>
In-reply-to
Content
execveat() was added to Linux in kernel 3.19:
http://man7.org/linux/man-pages/man2/execveat.2.html

It may be interesting to expose it in Python.

"The primary aim of adding an execveat syscall is to allow an
implementation of fexecve(3) that does not rely on the /proc
filesystem.  The current glibc version of fexecve(3) is implemented
via /proc, which causes problems in sandboxed or otherwise restricted
environments."
http://lwn.net/Articles/600344/
History
Date User Action Args
2015-02-13 12:32:39vstinnersetrecipients: + vstinner
2015-02-13 12:32:39vstinnersetmessageid: <1423830759.75.0.255479243543.issue23459@psf.upfronthosting.co.za>
2015-02-13 12:32:39vstinnerlinkissue23459 messages
2015-02-13 12:32:39vstinnercreate