A crop of new capabilities
A crop of new capabilities
Posted Jun 9, 2020 0:15 UTC (Tue) by nickodell (subscriber, #125165)Parent article: A crop of new capabilities
>Setting the ID of a new process is possible with clone3(), but this feature is not available to unprivileged processes. The ability to create processes with a chosen ID would make a number of attacks easier, so ID setting is restricted to processes with, of course, CAP_SYS_ADMIN. Administrators tend to balk at handing out that capability, so CRIU users have been resorting to a number of workarounds; Reber listed a few that vary from the reasonable to the appalling:
So what are you supposed to do if some other process starts using that PID?
So what are you supposed to do if some other process starts using that PID?
I don't get what the issue is with using a PID namespace. It seems like it fixes both the permissions issue and the collision issue.
