diff options
author | Marvin Borner | 2021-04-06 22:20:58 +0200 |
---|---|---|
committer | Marvin Borner | 2021-04-06 22:35:13 +0200 |
commit | 64ec8aa157e5d5d09372def37cbab00628e1e5f5 (patch) | |
tree | 13d0c864780a62506d40266fa6f2ab9571cbd216 /kernel/features/proc.c | |
parent | 9326d3970fe6eedbcb042ac68aca3074aacef32f (diff) |
Made exec syscall relative using app name
My plan is to implement a mobile-OS-like sandboxing using manifests
and permission middlewares. Let's see if I can manage to do this
without sacrificing too much performance.
I'm also wondering whether I should implement open/close syscalls
which would result in a cleaner block/unblock mechanism. I need to
think. Hmmm.. Naa
Diffstat (limited to 'kernel/features/proc.c')
-rw-r--r-- | kernel/features/proc.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/kernel/features/proc.c b/kernel/features/proc.c index f547193..479427c 100644 --- a/kernel/features/proc.c +++ b/kernel/features/proc.c @@ -559,7 +559,7 @@ NORETURN void proc_init(void) // Idle proc // TODO: Reimplement hlt privileges in idle proc (SMEP!) struct proc *kernel_proc = proc_make(PROC_PRIV_NONE); - assert(elf_load("/bin/idle", kernel_proc) == EOK); + assert(elf_load("idle", kernel_proc) == EOK); proc_stack_push(kernel_proc, 0); proc_stack_push(kernel_proc, 0); kernel_proc->state = PROC_BLOCKED; @@ -570,7 +570,7 @@ NORETURN void proc_init(void) // Init proc (root) struct proc *init = proc_make(PROC_PRIV_ROOT); - assert(elf_load("/bin/init", init) == EOK); + assert(elf_load("init", init) == EOK); proc_stack_push(init, 0); proc_stack_push(init, 0); current = list_first_data(proc_list_running, init); |