mirror of
https://github.com/LadybirdBrowser/ladybird.git
synced 2024-09-21 18:37:58 +03:00
e87eac9273
This achieves two things: - Programs can now intentionally perform arbitrary syscalls by calling syscall(). This allows us to work on things like syscall fuzzing. - It restricts the ability of userspace to make syscalls to a single 4KB page of code. In order to call the kernel directly, an attacker must now locate this page and call through it. |
||
---|---|---|
.. | ||
Arch/i386 | ||
AuxiliaryVector.h | ||
CMakeLists.txt | ||
CoreDump.h | ||
DynamicLinker.cpp | ||
DynamicLinker.h | ||
DynamicLoader.cpp | ||
DynamicLoader.h | ||
DynamicObject.cpp | ||
DynamicObject.h | ||
exec_elf.h | ||
Image.cpp | ||
Image.h | ||
Validation.cpp | ||
Validation.h |