summaryrefslogtreecommitdiff
path: root/Libraries
diff options
context:
space:
mode:
authorAndreas Kling <awesomekling@gmail.com>2019-12-15 20:11:57 +0100
committerAndreas Kling <awesomekling@gmail.com>2019-12-15 20:11:57 +0100
commit931e4b7f5ec8a5ced69c3789ecdcf0772cbee7ef (patch)
tree1a38eee0122e00ebfd836c736ba0319e4a9323e4 /Libraries
parent39a6d29b398b6102d5d33719a4fcb713234b1453 (diff)
downloadserenity-931e4b7f5ec8a5ced69c3789ecdcf0772cbee7ef.zip
Kernel+SystemMonitor: Prevent userspace access to process ELF image
Every process keeps its own ELF executable mapped in memory in case we need to do symbol lookup (for backtraces, etc.) Until now, it was mapped in a way that made it accessible to the program, despite the program not having mapped it itself. I don't really see a need for userspace to have access to this right now, so let's lock things down a little bit. This patch makes it inaccessible to userspace and exposes that fact through /proc/PID/vm (per-region "user_accessible" flag.)
Diffstat (limited to 'Libraries')
0 files changed, 0 insertions, 0 deletions