Files
ladybird/Libraries/LibC
Andreas Kling 952bb95baa Kernel: Enable SMAP protection during the execve() syscall
The userspace execve() wrapper now measures all the strings and puts
them in a neat and tidy structure on the stack.

This way we know exactly how much to copy in the kernel, and we don't
have to use the SMAP-violating validate_read_str(). :^)
2020-01-10 12:20:36 +01:00
..
2019-11-16 16:27:48 +01:00
2019-10-03 08:18:05 +02:00
2020-01-07 15:35:41 +01:00
2020-01-03 09:10:55 +01:00
2019-11-16 12:50:50 +01:00
2019-12-27 23:09:08 +01:00
2019-12-27 23:09:08 +01:00
2020-01-03 09:27:09 +01:00