ladybird/Kernel/Bus/VirtIO
Liav A d4b65f644e Kernel: Allow opening some device nodes sparingly for jailed processes
From now on, we don't allow jailed processes to open all device nodes in
/dev, but only allow jailed processes to open /dev/full, /dev/zero,
/dev/null, and various TTY and PTY devices (and not including virtual
consoles) so we basically restrict applications to what they can do when
they are in jail.
The motivation for this type of restriction is to ensure that even if a
remote code execution occurred, the damage that can be done is very
small.
We also don't restrict reading and writing on device nodes that were
already opened, because that limit seems not useful, especially in the
case where we do want to provide an OpenFileDescription to such device
but nothing further than that.
2022-12-09 23:09:00 -07:00
..
Console.cpp Kernel: Make self-contained locking smart pointers their own classes 2022-08-20 17:20:43 +02:00
Console.h Kernel: Make self-contained locking smart pointers their own classes 2022-08-20 17:20:43 +02:00
ConsolePort.cpp Kernel: Allow opening some device nodes sparingly for jailed processes 2022-12-09 23:09:00 -07:00
ConsolePort.h Kernel: Make self-contained locking smart pointers their own classes 2022-08-20 17:20:43 +02:00
Device.cpp Kernel: Introduce the IOWindow class 2022-09-23 17:22:15 +01:00
Device.h Kernel: Introduce the IOWindow class 2022-09-23 17:22:15 +01:00
Queue.cpp Everywhere: Run clang-format 2022-04-01 21:24:45 +01:00
Queue.h Kernel: Require lock rank for Spinlock construction 2022-08-19 20:26:47 -07:00
RNG.cpp Kernel: Make self-contained locking smart pointers their own classes 2022-08-20 17:20:43 +02:00
RNG.h Kernel: Make self-contained locking smart pointers their own classes 2022-08-20 17:20:43 +02:00