mirror of
https://github.com/fergalmoran/ladybird.git
synced 2026-02-02 05:46:20 +00:00
When loading a new executable, we now map the ELF image in kernel-only memory and parse it there. Then we use copy_to_user() when initializing writable regions with data from the executable. Note that the exec() syscall still disables SMAP protection and will require additional work. This patch only affects kernel-originated process spawns.
5.6 KiB
5.6 KiB