mirror of
https://github.com/RGBCube/serenity
synced 2026-01-19 10:31:00 +00:00
This achieves two things: - Programs can now intentionally perform arbitrary syscalls by calling syscall(). This allows us to work on things like syscall fuzzing. - It restricts the ability of userspace to make syscalls to a single 4KB page of code. In order to call the kernel directly, an attacker must now locate this page and call through it. |
||
|---|---|---|
| .. | ||
| Arch/i386 | ||
| AuxiliaryVector.h | ||
| CMakeLists.txt | ||
| CoreDump.h | ||
| DynamicLinker.cpp | ||
| DynamicLinker.h | ||
| DynamicLoader.cpp | ||
| DynamicLoader.h | ||
| DynamicObject.cpp | ||
| DynamicObject.h | ||
| exec_elf.h | ||
| Image.cpp | ||
| Image.h | ||
| Validation.cpp | ||
| Validation.h | ||