It would be nice if the kernel could randomize PID (and TID) values by default. We could use a random TIDs to support mutex hardening in glibc, detecting overwritten mutexes before using data in them in ways that could further corrupt the running process in an attacker-controlled way.
This discussion needs to happen upstream.
Can you please post a link(s) to upstream discussion(s)?
(In reply to Pavel Raiskup from comment #2) > Can you please post a link(s) to upstream discussion(s)? There aren't any that I'm aware of. Our team doesn't have time to work on this feature, and it needs to be done upstream.