mirror of
https://github.com/LadybirdBrowser/ladybird.git
synced 2025-01-23 17:52:26 -05:00
197e73ee31
When loading a new executable, we now map the ELF image in kernel-only memory and parse it there. Then we use copy_to_user() when initializing writable regions with data from the executable. Note that the exec() syscall still disables SMAP protection and will require additional work. This patch only affects kernel-originated process spawns. |
||
---|---|---|
.. | ||
Arch/i386 | ||
ELFDynamicLoader.cpp | ||
ELFDynamicLoader.h | ||
ELFDynamicObject.cpp | ||
ELFDynamicObject.h | ||
ELFImage.cpp | ||
ELFImage.h | ||
ELFLoader.cpp | ||
ELFLoader.h | ||
exec_elf.h | ||
Makefile |