diff options
author | Liav A <liavalb@gmail.com> | 2022-12-15 20:38:19 +0200 |
---|---|---|
committer | Andrew Kaster <andrewdkaster@gmail.com> | 2022-12-16 01:02:00 -0700 |
commit | 6c0486277e9bc8238ae82ee857a70014c9397db9 (patch) | |
tree | d0a599c10308e18709c1fefc33f726de489f7dcc /Tests/Kernel/crash.cpp | |
parent | 1b5a565e5587bcf58d8801601a2c519771c1e971 (diff) | |
download | serenity-6c0486277e9bc8238ae82ee857a70014c9397db9.zip |
Kernel: Reintroduce the msyscall syscall as the annotate_mapping syscall
This syscall will be used later on to ensure we can declare virtual
memory mappings as immutable (which means that the underlying Region is
basically immutable for both future annotations or changing the
protection bits of it).
Diffstat (limited to 'Tests/Kernel/crash.cpp')
-rw-r--r-- | Tests/Kernel/crash.cpp | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/Tests/Kernel/crash.cpp b/Tests/Kernel/crash.cpp index 6f8864626e..737fae8865 100644 --- a/Tests/Kernel/crash.cpp +++ b/Tests/Kernel/crash.cpp @@ -71,7 +71,7 @@ int main(int argc, char** argv) args_parser.add_option(do_invalid_stack_pointer_on_syscall, "Make a syscall while using an invalid stack pointer", nullptr, 'T'); args_parser.add_option(do_invalid_stack_pointer_on_page_fault, "Trigger a page fault while using an invalid stack pointer", nullptr, 't'); args_parser.add_option(do_syscall_from_writeable_memory, "Make a syscall from writeable memory", nullptr, 'S'); - args_parser.add_option(do_legitimate_syscall, "Make a syscall from legitimate memory (but outside msyscall)", nullptr, 'y'); + args_parser.add_option(do_legitimate_syscall, "Make a syscall from legitimate memory (but outside syscall-code mapped region)", nullptr, 'y'); args_parser.add_option(do_execute_non_executable_memory, "Attempt to execute non-executable memory (not mapped with PROT_EXEC)", nullptr, 'X'); args_parser.add_option(do_trigger_user_mode_instruction_prevention, "Attempt to trigger an x86 User Mode Instruction Prevention fault. WARNING: This test runs only when invoked manually, see #10042.", nullptr, 'U'); #if ARCH(I386) || ARCH(X86_64) @@ -262,7 +262,7 @@ int main(int argc, char** argv) } if (do_legitimate_syscall || do_all_crash_types) { - any_failures |= !Crash("Regular syscall from outside msyscall", []() { + any_failures |= !Crash("Regular syscall from outside syscall-code mapped region", []() { // Since 'crash' is dynamically linked, and DynamicLoader only allows LibSystem to make syscalls, this should kill us: Syscall::invoke(Syscall::SC_getuid); return Crash::Failure::DidNotCrash; |