-
Updated
Sep 30, 2020 - C
syscalls
Here are 127 public repositories matching this topic...
-
Updated
Aug 30, 2020 - C
-
Updated
Feb 27, 2019 - Python
-
Updated
Sep 17, 2020 - JavaScript
-
Updated
Aug 19, 2019 - Go
-
Updated
Aug 31, 2020 - C
-
Updated
Feb 25, 2020 - C++
-
Updated
Oct 5, 2020 - HTML
-
Updated
Nov 6, 2019 - C
-
Updated
Sep 18, 2020 - Shell
-
Updated
Nov 25, 2019 - C
-
Updated
Mar 10, 2018 - Rust
-
Updated
May 14, 2018 - C
-
Updated
Mar 4, 2016 - C
-
Updated
Aug 20, 2018 - Python
-
Updated
Aug 9, 2019 - C
-
Updated
Nov 7, 2019 - Go
Improve this page
Add a description, image, and links to the syscalls topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the syscalls topic, visit your repo's landing page and select "manage topics."
One problem with faulting programs under KRF is that KRF might decide to inject a fault during the dynamic link/load phase, aborting
ld-linux.soinstead of the actual target image. This usually isn't helpful, since it doesn't indicate any mistakes in the target itself.It should be possible to check the loaded program's name via the
currenttask, probably viacomm. We should use that (or