mirror of
				https://github.com/RGBCube/serenity
				synced 2025-10-31 12:02:43 +00:00 
			
		
		
		
	 e87eac9273
			
		
	
	
		e87eac9273
		
	
	
	
	
		
			
			This achieves two things: - Programs can now intentionally perform arbitrary syscalls by calling syscall(). This allows us to work on things like syscall fuzzing. - It restricts the ability of userspace to make syscalls to a single 4KB page of code. In order to call the kernel directly, an attacker must now locate this page and call through it.
		
			
				
	
	
		
			8 lines
		
	
	
	
		
			209 B
		
	
	
	
		
			CMake
		
	
	
	
	
	
			
		
		
	
	
			8 lines
		
	
	
	
		
			209 B
		
	
	
	
		
			CMake
		
	
	
	
	
	
| set(SOURCES
 | |
|     pthread.cpp
 | |
|     pthread_once.cpp
 | |
| )
 | |
| 
 | |
| serenity_libc(LibPthread pthread)
 | |
| target_link_libraries(LibPthread LibC LibSystem)
 | |
| target_include_directories(LibPthread PUBLIC ${CMAKE_CURRENT_SOURCE_DIR})
 |