mirror of
https://github.com/RGBCube/serenity
synced 2025-05-18 11:55:07 +00:00

This achieves two things: - Programs can now intentionally perform arbitrary syscalls by calling syscall(). This allows us to work on things like syscall fuzzing. - It restricts the ability of userspace to make syscalls to a single 4KB page of code. In order to call the kernel directly, an attacker must now locate this page and call through it.
8 lines
209 B
CMake
8 lines
209 B
CMake
set(SOURCES
|
|
pthread.cpp
|
|
pthread_once.cpp
|
|
)
|
|
|
|
serenity_libc(LibPthread pthread)
|
|
target_link_libraries(LibPthread LibC LibSystem)
|
|
target_include_directories(LibPthread PUBLIC ${CMAKE_CURRENT_SOURCE_DIR})
|