From 64ec8aa157e5d5d09372def37cbab00628e1e5f5 Mon Sep 17 00:00:00 2001 From: Marvin Borner Date: Tue, 6 Apr 2021 22:20:58 +0200 Subject: Made exec syscall relative using app name My plan is to implement a mobile-OS-like sandboxing using manifests and permission middlewares. Let's see if I can manage to do this without sacrificing too much performance. I'm also wondering whether I should implement open/close syscalls which would result in a cleaner block/unblock mechanism. I need to think. Hmmm.. Naa --- boot/load.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'boot') diff --git a/boot/load.c b/boot/load.c index a3566f4..12102a2 100644 --- a/boot/load.c +++ b/boot/load.c @@ -893,7 +893,7 @@ int main(void *first, void *second) u8 drive = ata_probe(); assert(drive); - s32 elf = elf_load("/bin/kernel", drive); + s32 elf = elf_load("/apps/kernel/exec", drive); assert(elf > 0); void (*kernel)(void *, void *); -- cgit v1.2.3