101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

478
active users

#syscall

0 posts0 participants0 posts today
The New Oil<p>Watch out for any <a href="https://mastodon.thenewoil.org/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.thenewoil.org/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> sneakily evading <a href="https://mastodon.thenewoil.org/tags/syscall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>syscall</span></a>-watching <a href="https://mastodon.thenewoil.org/tags/antivirus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>antivirus</span></a></p><p><a href="https://www.theregister.com/2025/04/29/linux_io_uring_security_flaw/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2025/04/29/lin</span><span class="invisible">ux_io_uring_security_flaw/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/FOSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FOSS</span></a> <a href="https://mastodon.thenewoil.org/tags/Curing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Curing</span></a></p>
cryptax<p>Decai decompiling a malicious shellcode. <br>The instructions are not so readable, if you're not used to syscalls int 0x80. AI does it for you.</p><p><a href="https://asciinema.org/a/4PY8wn2TPg2oBdDQ0Q5bgMYjk" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">asciinema.org/a/4PY8wn2TPg2oBd</span><span class="invisible">DQ0Q5bgMYjk</span></a></p><p><a href="https://mastodon.social/tags/r2ai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>r2ai</span></a> <a href="https://mastodon.social/tags/decai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>decai</span></a> <a href="https://mastodon.social/tags/r2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>r2</span></a> <a href="https://mastodon.social/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://mastodon.social/tags/shellcode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shellcode</span></a> <a href="https://mastodon.social/tags/syscall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>syscall</span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a></p>
Felix Palmen :freebsd: :c64:<p><span class="h-card" translate="no"><a href="https://freeradical.zone/@ax6761" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>ax6761</span></a></span> Well, you could call it an implementation glitch. <a href="https://mastodon.bsd.cafe/tags/uname" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>uname</span></a> is *meant* to give you information about "the OS", but has always been implemented as a <a href="https://mastodon.bsd.cafe/tags/syscall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>syscall</span></a>, therefore actually telling you something about the <a href="https://mastodon.bsd.cafe/tags/kernel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kernel</span></a>.</p><p>In <a href="https://mastodon.bsd.cafe/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a>, the kernel doesn't *have* to be the exact same version as the userland, and for security updates, a new kernel is only built when some patch actually affects the kernel.</p><p>Note that on a <a href="https://mastodon.bsd.cafe/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> system, it's arguably even "worse", as Linux is nothing but the kernel. TO know version information about the rest of your installed OS, you'll have to use distribution specific information (or more recently look at the now standardized /etc/osrelease).</p>
cryptax<p>I'm surprised at how badly <a href="https://mastodon.social/tags/Ghidra" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ghidra</span></a> decompiles this very simple function.</p><p>It's a syscall 0x57 which is unlink (remove a file).</p><p>I'm surprised it decompiles saying it *returns 0x57* ...</p><p><a href="https://mastodon.social/tags/decompiler" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>decompiler</span></a> <a href="https://mastodon.social/tags/syscall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>syscall</span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a></p>
hubertf<p>On thread vs. process permissions</p><p>In common Unix and POSIX systems, all threads in a process are supposed to have the same permission. So why does the vortex8 program work as exploited, where one thread sets different permissions than another one using setresuid/setresgid?</p><p>Reference: <a href="https://man7.org/linux/man-pages/man2/setresuid.2.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">man7.org/linux/man-pages/man2/</span><span class="invisible">setresuid.2.html</span></a></p><p>Answer in thread.</p><p><a href="https://mastodon.social/tags/ctf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ctf</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/posix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>posix</span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/glibc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>glibc</span></a> <a href="https://mastodon.social/tags/syscall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>syscall</span></a> <a href="https://mastodon.social/tags/overthewire" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>overthewire</span></a> <a href="https://mastodon.social/tags/vortex" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vortex</span></a></p>
IT News<p>Make Your Code Slower With Multithreading - With the performance of modern CPU cores plateauing recently, the main performance... - <a href="https://hackaday.com/2024/06/07/make-your-code-slower-with-multithreading/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2024/06/07/make-y</span><span class="invisible">our-code-slower-with-multithreading/</span></a> <a href="https://schleuss.online/tags/multithreading" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>multithreading</span></a> <a href="https://schleuss.online/tags/softwarehacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>softwarehacks</span></a> <a href="https://schleuss.online/tags/performance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>performance</span></a> <a href="https://schleuss.online/tags/profiling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>profiling</span></a> <a href="https://schleuss.online/tags/spinlocks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spinlocks</span></a> <a href="https://schleuss.online/tags/syscall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>syscall</span></a> <a href="https://schleuss.online/tags/futex" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>futex</span></a> <a href="https://schleuss.online/tags/mutex" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mutex</span></a> <a href="https://schleuss.online/tags/perf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>perf</span></a></p>
Peter N. M. Hansteen<p>syscall(2) removed from -current <a href="https://www.undeadly.org/cgi?action=article;sid=20231213062827" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">undeadly.org/cgi?action=articl</span><span class="invisible">e;sid=20231213062827</span></a> <a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.social/tags/syscall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>syscall</span></a> <a href="https://mastodon.social/tags/pinsyscall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pinsyscall</span></a> <a href="https://mastodon.social/tags/development" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>development</span></a> <a href="https://mastodon.social/tags/current" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>current</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a></p>
0xor0ne<p>Very useful website if you need a quick reference to Linux kernel syscalls (numbers and parameters for various architectures and kernel versions)</p><p><a href="https://syscalls.mebeim.net" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">syscalls.mebeim.net</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://infosec.exchange/tags/syscall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>syscall</span></a> <a href="https://infosec.exchange/tags/kernel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kernel</span></a></p>
Alfonso Siciliano<p>New blog post: "FreeBSD 15 System Calls Table".</p><p><a href="https://alfonsosiciliano.gitlab.io/posts/2023-08-28-freebsd-15-system-calls.html" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">alfonsosiciliano.gitlab.io/pos</span><span class="invisible">ts/2023-08-28-freebsd-15-system-calls.html</span></a></p><p><a href="https://mastodon.bsd.cafe/tags/UNIX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UNIX</span></a> <a href="https://mastodon.bsd.cafe/tags/POSIX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>POSIX</span></a> <a href="https://mastodon.bsd.cafe/tags/BSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BSD</span></a> <a href="https://mastodon.bsd.cafe/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a> <a href="https://mastodon.bsd.cafe/tags/coding" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>coding</span></a> <a href="https://mastodon.bsd.cafe/tags/C" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>C</span></a> <a href="https://mastodon.bsd.cafe/tags/Opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Opensource</span></a> <a href="https://mastodon.bsd.cafe/tags/OS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OS</span></a> <a href="https://mastodon.bsd.cafe/tags/kernel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kernel</span></a> <a href="https://mastodon.bsd.cafe/tags/syscall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>syscall</span></a></p>
signalblur 📡🛸:verified:<p>Searchable <a href="https://infosec.exchange/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://infosec.exchange/tags/Syscall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Syscall</span></a> Table for <a href="https://infosec.exchange/tags/x86" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>x86</span></a> and <a href="https://infosec.exchange/tags/x86_64" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>x86_64</span></a></p><p><span class="h-card"><a href="https://abyssdomain.expert/@filippo" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>filippo</span></a></span> is a wonderful follow. I’m grateful for him making this.</p><p>Also for some reason seeing it laid out like this made me think of them like they are the equivalent of the Linux Rules of Acquisition </p><p><a href="https://filippo.io/linux-syscall-table/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">filippo.io/linux-syscall-table</span><span class="invisible">/</span></a></p><p><a href="https://infosec.exchange/tags/StarTrek" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>StarTrek</span></a> <a href="https://infosec.exchange/tags/Ferengi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ferengi</span></a> <a href="https://infosec.exchange/tags/RulesOfAcquisition" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RulesOfAcquisition</span></a> <a href="https://infosec.exchange/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/Forensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Forensics</span></a> <a href="https://infosec.exchange/tags/LinuxForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LinuxForensics</span></a></p>
OSTechNix<p>Trace Syscall Activity In Linux With Process Monitor (Procmon) <a href="https://floss.social/tags/SystemCalls" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SystemCalls</span></a> <a href="https://floss.social/tags/Syscall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Syscall</span></a> <a href="https://floss.social/tags/ProcessMonitor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ProcessMonitor</span></a> <a href="https://floss.social/tags/Promon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Promon</span></a> <a href="https://floss.social/tags/SysinternalsSuite" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SysinternalsSuite</span></a> <a href="https://floss.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://floss.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <br><a href="https://ostechnix.com/trace-syscall-activity-in-linux-with-process-monitor-procmon/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ostechnix.com/trace-syscall-ac</span><span class="invisible">tivity-in-linux-with-process-monitor-procmon/</span></a></p>
Collabora<p>Next up at 17:15 GMT at <a href="https://floss.social/tags/OSSummit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OSSummit</span></a>, Gabriel Krisman Bertazi presents "Efficient Syscall Emulation on Linux", where he'll look at the new <a href="https://floss.social/tags/Syscall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Syscall</span></a> User Dispatch mechanism which arrived in <a href="https://floss.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> 5.9. See you there! <a href="https://sched.co/eCDx" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">sched.co/eCDx</span><span class="invisible"></span></a> <a href="https://floss.social/tags/Wine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wine</span></a> <a href="https://floss.social/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://floss.social/tags/Gaming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Gaming</span></a> <a href="https://floss.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a></p>