Missing fork() handling and pitfalls #10

Atvērta
crtxcr atvēra 2021-08-09 20:17:19 +02:00 · 0 komentāri
Īpašnieks

We don't do fork()/clone() ourselves, opening the door for many pitfalls, e. g. we inherit open file descriptories which may enable bypassing of the policies we set. Otoh, some open fd's may actually be desired.

We must either offer a safe fork()/clone() or check that the current process is in a reasonable state and/or transform to that state.

We don't do fork()/clone() ourselves, opening the door for many pitfalls, e. g. we inherit open file descriptories which may enable bypassing of the policies we set. Otoh, some open fd's may actually be desired. We must either offer a safe fork()/clone() or check that the current process is in a reasonable state and/or transform to that state.
crtxcr pievienoja
bug
enhancement
iezīmes 2021-08-09 20:17:19 +02:00
Nepieciešams pieteikties, lai pievienotos šai sarunai.
1 dalībnieki
Paziņojumi
Izpildes termiņš
Izpildes termiņš nav uzstādīts.
Atkarības

Nav atkarību.

Atsaucas uz: crtxcr/exile.h#10
Nav sniegts apraksts.