Missing fork() handling and pitfalls #10

오픈
" crtxcr2021-08-09 20:17:19 +02:00을 오픈" · 0개의 코멘트
소유자

We don't do fork()/clone() ourselves, opening the door for many pitfalls, e. g. we inherit open file descriptories which may enable bypassing of the policies we set. Otoh, some open fd's may actually be desired.

We must either offer a safe fork()/clone() or check that the current process is in a reasonable state and/or transform to that state.

We don't do fork()/clone() ourselves, opening the door for many pitfalls, e. g. we inherit open file descriptories which may enable bypassing of the policies we set. Otoh, some open fd's may actually be desired. We must either offer a safe fork()/clone() or check that the current process is in a reasonable state and/or transform to that state.
crtxcr added the
bug
enhancement
labels 2021-08-09 20:17:19 +02:00
"로그인하여 이 대화에 참여"
참여자 1명
알림
마감일
마감일이 설정되지 않았습니다.
의존성

No dependencies set.

Reference: crtxcr/exile.h#10
No description provided.