mirror of
https://github.com/RGBCube/serenity
synced 2025-10-25 06:02:33 +00:00
When loading a new executable, we now map the ELF image in kernel-only memory and parse it there. Then we use copy_to_user() when initializing writable regions with data from the executable. Note that the exec() syscall still disables SMAP protection and will require additional work. This patch only affects kernel-originated process spawns. |
||
|---|---|---|
| .. | ||
| Arch/i386 | ||
| ELFDynamicLoader.cpp | ||
| ELFDynamicLoader.h | ||
| ELFDynamicObject.cpp | ||
| ELFDynamicObject.h | ||
| ELFImage.cpp | ||
| ELFImage.h | ||
| ELFLoader.cpp | ||
| ELFLoader.h | ||
| exec_elf.h | ||
| Makefile | ||