A completely-from-scratch hobby operating system: bootloader, kernel, drivers, C library, and userspace including a composited graphical UI, dynamic linker, syntax-highlighting text editor, network stack, etc.
It was possible to crash the kernel when specifying the kernel address for the buffer in readlink. Potentially, you can write an exploit (but I'm too lazy). Apparently missed PTRCHECK(ptr) in sys_readlink.
P. S. I just wanted to help the project, but for some reason I was banned :(.
From turbocat2001: