Files
ladybird/Kernel
Andreas Kling 952bb95baa Kernel: Enable SMAP protection during the execve() syscall
The userspace execve() wrapper now measures all the strings and puts
them in a neat and tidy structure on the stack.

This way we know exactly how much to copy in the kernel, and we don't
have to use the SMAP-violating validate_read_str(). :^)
2020-01-10 12:20:36 +01:00
..
2019-12-29 19:08:02 +01:00
2019-12-31 19:31:42 +01:00
2019-12-20 22:59:11 +01:00
2019-12-26 11:43:23 +01:00
2020-01-02 21:45:04 +01:00