ladybird/Libraries/LibELF
Andreas Kling 197e73ee31 Kernel+LibELF: Enable SMAP protection during non-syscall exec()
When loading a new executable, we now map the ELF image in kernel-only
memory and parse it there. Then we use copy_to_user() when initializing
writable regions with data from the executable.

Note that the exec() syscall still disables SMAP protection and will
require additional work. This patch only affects kernel-originated
process spawns.
2020-01-10 10:57:06 +01:00
..
Arch/i386 LibELF: Re-organize ELFDynamicObject::load and add PLT trampoline 2020-01-01 23:54:06 +01:00
ELFDynamicLoader.cpp LibELF: Map .text segment with MAP_ANONYMOUS for shared objects 2020-01-09 09:29:36 +01:00
ELFDynamicLoader.h LibELF: Map .text segment with MAP_ANONYMOUS for shared objects 2020-01-09 09:29:36 +01:00
ELFDynamicObject.cpp LibELF: Map .text segment with MAP_ANONYMOUS for shared objects 2020-01-09 09:29:36 +01:00
ELFDynamicObject.h LibELF: Map .text segment with MAP_ANONYMOUS for shared objects 2020-01-09 09:29:36 +01:00
ELFImage.cpp LibELF: Remove DynamicSection from ELFImage 2020-01-09 09:29:36 +01:00
ELFImage.h LibELF: Remove DynamicSection from ELFImage 2020-01-09 09:29:36 +01:00
ELFLoader.cpp Kernel+LibELF: Enable SMAP protection during non-syscall exec() 2020-01-10 10:57:06 +01:00
ELFLoader.h Kernel+LibELF: Validate PT_LOAD and PT_TLS offsets before memcpy()'ing 2020-01-06 21:04:57 +01:00
exec_elf.h LibELF: Add ELFDynamicObject to dynamically load libaries 2020-01-01 17:48:41 +01:00
Makefile Build: clean up build system, use one shared Makefile 2019-12-20 20:20:54 +01:00