ladybird/Kernel/Arch/i386
Andreas Kling 1d94b5eb04 Kernel: Add a random offset to kernel stacks upon syscall entry
When entering the kernel from a syscall, we now insert a small bit of
stack padding after the RegisterDump. This makes kernel stacks less
deterministic across syscalls and may make some bugs harder to exploit.

Inspired by Elena Reshetova's talk on kernel stack exploitation.
2020-01-01 23:21:24 +01:00
..
Boot Kernel: Enable PAE (Physical Address Extension) 2019-12-25 13:35:57 +01:00
APIC.cpp APIC: Enable APIC and start APs 2019-10-16 19:14:02 +02:00
APIC.h APIC: Enable APIC and start APs 2019-10-16 19:14:02 +02:00
CPU.cpp Kernel: Disable x86 RDTSC instruction in userspace 2020-01-01 18:22:20 +01:00
CPU.h Kernel: Add a random offset to kernel stacks upon syscall entry 2020-01-01 23:21:24 +01:00
PIC.cpp Kernel: Disable interrupts while modifying the PIC IMR 2019-12-14 16:16:37 +01:00
PIC.h Kernel: Move PIC.cpp into Arch/i386/ 2019-07-09 15:04:43 +02:00
PIT.cpp Kernel: Make separate kernel entry points for each PIC IRQ 2019-12-15 12:47:53 +01:00
PIT.h Kernel: Move i8253.cpp => Arch/i386/PIT.cpp 2019-07-09 15:04:45 +02:00