the newer pidfd-related APIs return CLOEXEC fds by default, which prevents fd leakage through inheritance across fork/execve (e.g. after setreuid privdrop). hopefully new kernel APIs follow this trend! https://github.com/torvalds/linux/blob/v5.4/kernel/pid.c#L462 … https://github.com/torvalds/linux/blob/v5.4/kernel/fork.c#L2042 …
-
Prikaži ovu nit
-
Mostly unrelated, but it doesn’t look like macOS has “atomic” CLOEXEC APIs. You can set it with fctnl(...) after opening (as you can in Linux), but see open(2)‘s man pages for why that’s risky:pic.twitter.com/oAMXBTniBG
1 reply 0 proslijeđenih tweetova 1 korisnik označava da mu se sviđaPrikaži ovu nit
(not surprised i transposed fcntl 
)
23:38 - 21. sij 2020.
0 replies
0 proslijeđenih tweetova
0 korisnika označava da im se sviđa
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.