| ▲ | otterley 3 hours ago | |
The code uses Linux's clone3() syscall under the hood: see https://github.com/jer-irl/threadprocs/blob/main/docs/02-imp... The interesting thing is that it's loading existing binaries and executing them in a different way than usual. I think it's pretty clever (even if unsafe, as you mentioned). This is a splendid example of a "hack" and I wish HN had more of these! | ||
| ▲ | 3 hours ago | parent [-] | |
| [deleted] | ||