mirror of
				https://github.com/RGBCube/serenity
				synced 2025-10-31 15:12:45 +00:00 
			
		
		
		
	|  e87eac9273 This achieves two things: - Programs can now intentionally perform arbitrary syscalls by calling syscall(). This allows us to work on things like syscall fuzzing. - It restricts the ability of userspace to make syscalls to a single 4KB page of code. In order to call the kernel directly, an attacker must now locate this page and call through it. | ||
|---|---|---|
| .. | ||
| CharacterMap.cpp | ||
| CharacterMap.h | ||
| CharacterMapData.h | ||
| CharacterMapFile.cpp | ||
| CharacterMapFile.h | ||
| CMakeLists.txt | ||