README.md
Rendering markdown...
/*
* PS4 WebKit Exploit 6.20
* By Specter (@SpecterDev)
* -
* This file contains an (incomplete) list of system calls for post-exploit stuff. A lot
* of syscalls are missing so feel free to add ones you need. I didn't include a more complete
* list like I have with previous firmwares because having too many seemed to affect exploit
* stability.
*/
window.nameforsyscall = swapkeyval(window.syscallnames);
function swapkeyval(json){
var ret = {};
for(var key in json){
if (json.hasOwnProperty(key)) {
ret[json[key]] = key;
}
}
return ret;
}
/* A long ass map of system call names -> number, you shouldn't need to touch this */
window.syscallnames =
{
"sys_exit": 1,
"sys_fork": 2,
"sys_read": 3,
"sys_write": 4,
"sys_open": 5,
"sys_close": 6,
"sys_wait4": 7,
"sys_unlink": 10,
"sys_chdir": 12,
"sys_chmod": 15,
"sys_getpid": 20,
"sys_setuid": 23,
"sys_getuid": 24,
"sys_stat": 38,
"sys_pipe": 42,
"sys_getgid": 47,
"sys_getlogin": 49,
"sys_setlogin": 50,
"sys_ioctl": 54,
"sys_munmap": 73,
"sys_socket": 97,
"sys_connect": 98,
"sys_send": 101,
"sys_recv": 102,
"sys_bind": 104,
"sys_setsockopt": 105,
"sys_listen": 106,
"sys_recvmsg": 113,
"sys_sendmsg": 114,
"sys_mkdir": 136,
"sys_rmdir": 137,
"sys_fstat": 189,
"sys_lstat": 190,
"sys_getdents": 272,
"sys_mmap": 477,
"sys_lseek": 478,
};