aboutsummaryrefslogtreecommitdiff
path: root/kernel/features/proc.c
diff options
context:
space:
mode:
authorMarvin Borner2021-04-06 22:20:58 +0200
committerMarvin Borner2021-04-06 22:35:13 +0200
commit64ec8aa157e5d5d09372def37cbab00628e1e5f5 (patch)
tree13d0c864780a62506d40266fa6f2ab9571cbd216 /kernel/features/proc.c
parent9326d3970fe6eedbcb042ac68aca3074aacef32f (diff)
Made exec syscall relative using app name
My plan is to implement a mobile-OS-like sandboxing using manifests and permission middlewares. Let's see if I can manage to do this without sacrificing too much performance. I'm also wondering whether I should implement open/close syscalls which would result in a cleaner block/unblock mechanism. I need to think. Hmmm.. Naa
Diffstat (limited to 'kernel/features/proc.c')
-rw-r--r--kernel/features/proc.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/kernel/features/proc.c b/kernel/features/proc.c
index f547193..479427c 100644
--- a/kernel/features/proc.c
+++ b/kernel/features/proc.c
@@ -559,7 +559,7 @@ NORETURN void proc_init(void)
// Idle proc
// TODO: Reimplement hlt privileges in idle proc (SMEP!)
struct proc *kernel_proc = proc_make(PROC_PRIV_NONE);
- assert(elf_load("/bin/idle", kernel_proc) == EOK);
+ assert(elf_load("idle", kernel_proc) == EOK);
proc_stack_push(kernel_proc, 0);
proc_stack_push(kernel_proc, 0);
kernel_proc->state = PROC_BLOCKED;
@@ -570,7 +570,7 @@ NORETURN void proc_init(void)
// Init proc (root)
struct proc *init = proc_make(PROC_PRIV_ROOT);
- assert(elf_load("/bin/init", init) == EOK);
+ assert(elf_load("init", init) == EOK);
proc_stack_push(init, 0);
proc_stack_push(init, 0);
current = list_first_data(proc_list_running, init);