mirror of
https://github.com/RGBCube/serenity
synced 2025-05-17 06:45:08 +00:00
![]() This achieves two things: - Programs can now intentionally perform arbitrary syscalls by calling syscall(). This allows us to work on things like syscall fuzzing. - It restricts the ability of userspace to make syscalls to a single 4KB page of code. In order to call the kernel directly, an attacker must now locate this page and call through it. |
||
---|---|---|
.. | ||
FB.h | ||
InodeWatcherEvent.h | ||
KeyCode.h | ||
MousePacket.h | ||
Syscall.h |