1 Aug
2021
1 Aug
'21
10:43 a.m.
On 8/1/21, Gernot Heiser wrote:
I believe (but am not definite, things change over time) that seL4 syscall numbers don’t overlap Linux syscall numbers which would preclude that totally. But even if not, the chances of parameters to a Linux syscall magically matching arguments of a valid seL4 syscall are pretty remote. This is not a security issue, of course, all that app can do is mess with itself.
Note that on some architectures seL4 puts the system call number in a different register than linux does. This includes x86_64 and aarch64. - JB