@@ -137,8 +137,12 @@ propagated.
137137
138138### Disabling reception of ` SCM_RIGHTS ` for ` AF_UNIX ` sockets
139139
140- Ability to turn off ` SCM_RIGHTS ` reception for ` AF_UNIX `
141- sockets. Right now reception of file descriptors is always on when
140+ [ x] Ability to turn off ` SCM_RIGHTS ` reception for ` AF_UNIX `
141+ sockets.
142+
143+ ** 🙇 ` 77cbe1a6d8730a07f99f9263c2d5f2304cf5e830 ("af_unix: Introduce SO_PASSRIGHTS") ` 🙇**
144+
145+ Right now reception of file descriptors is always on when
142146a process makes the mistake of invoking ` recvmsg() ` on such a
143147socket. This is problematic since ` SCM_RIGHTS ` installs file
144148descriptors in the recipient process' file descriptor
@@ -189,14 +193,18 @@ received" may be expressed. (BPF?).
189193
190194### A reliable way to check for PID namespacing
191195
192- A reliable (non-heuristic) way to detect from userspace if the
196+ [ x ] A reliable (non-heuristic) way to detect from userspace if the
193197current process is running in a PID namespace that is not the main
194198PID namespace. PID namespaces are probably the primary type of
195199namespace that identify a container environment. While many
196200heuristics exist to determine generically whether one is executed
197201inside a container, it would be good to have a correct,
198202well-defined way to determine this.
199203
204+ ** 🙇 The inode number of the root PID namespace is fixed (0xEFFFFFFC)
205+ and now considered API. It can be used to distinguish the root PID
206+ namespace from all others. 🙇**
207+
200208** Use-Case:** tools such as ` systemd-detect-virt ` exist to determine
201209container execution, but typically resolve to checking for
202210specific implementations. It would be much nicer and universally
@@ -206,7 +214,6 @@ descriptor that reveals this kind of information in some form.
206214
207215### Excluding processes watched via ` pidfd ` from ` waitid(P_ALL, …) `
208216
209-
210217** Use-Case:** various programs use ` waitid(P_ALL, …) ` to collect exit
211218information of exited child processes. In particular PID 1 and
212219processes using ` PR_SET_CHILD_SUBREAPER ` use this as they may
0 commit comments