mirror of
https://github.com/RGBCube/serenity
synced 2025-07-27 10:27:35 +00:00
Kernel: Allow configuring a Jail to not impose PID isolation restriction
This is quite useful for userspace applications that can't cope with the restriction, but it's still useful to impose other non-configurable restrictions by using jails.
This commit is contained in:
parent
cf8875426d
commit
8289759f1d
11 changed files with 62 additions and 23 deletions
|
@ -31,6 +31,10 @@
|
|||
#include <time.h>
|
||||
#include <utime.h>
|
||||
|
||||
#ifdef AK_OS_SERENITY
|
||||
# include <Kernel/API/Jail.h>
|
||||
#endif
|
||||
|
||||
#if !defined(AK_OS_BSD_GENERIC) && !defined(AK_OS_ANDROID)
|
||||
# include <shadow.h>
|
||||
#endif
|
||||
|
@ -191,7 +195,7 @@ ErrorOr<void> exec(StringView filename, ReadonlySpan<StringView> arguments, Sear
|
|||
|
||||
#ifdef AK_OS_SERENITY
|
||||
ErrorOr<void> join_jail(u64 jail_index);
|
||||
ErrorOr<u64> create_jail(StringView jail_name);
|
||||
ErrorOr<u64> create_jail(StringView jail_name, JailIsolationFlags);
|
||||
#endif
|
||||
|
||||
ErrorOr<int> socket(int domain, int type, int protocol);
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue