Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
sweetjuly
16 days ago
|
parent
|
context
|
favorite
| on:
Why bother with argv[0]?
Note though that both of these solutions are racy and so should not be done if "someone symlinking really fast and swapping the binaries" is in your threat model. Linux proc/self is safe though, just not the result from readlink.
duped
16 days ago
[–]
Well that's true, but also something that can't be addressed within a currently running process afaik.
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: