From 64ec8aa157e5d5d09372def37cbab00628e1e5f5 Mon Sep 17 00:00:00 2001 From: Marvin Borner Date: Tue, 6 Apr 2021 22:20:58 +0200 Subject: Made exec syscall relative using app name My plan is to implement a mobile-OS-like sandboxing using manifests and permission middlewares. Let's see if I can manage to do this without sacrificing too much performance. I'm also wondering whether I should implement open/close syscalls which would result in a cleaner block/unblock mechanism. I need to think. Hmmm.. Naa --- kernel/features/proc.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'kernel/features/proc.c') diff --git a/kernel/features/proc.c b/kernel/features/proc.c index f547193..479427c 100644 --- a/kernel/features/proc.c +++ b/kernel/features/proc.c @@ -559,7 +559,7 @@ NORETURN void proc_init(void) // Idle proc // TODO: Reimplement hlt privileges in idle proc (SMEP!) struct proc *kernel_proc = proc_make(PROC_PRIV_NONE); - assert(elf_load("/bin/idle", kernel_proc) == EOK); + assert(elf_load("idle", kernel_proc) == EOK); proc_stack_push(kernel_proc, 0); proc_stack_push(kernel_proc, 0); kernel_proc->state = PROC_BLOCKED; @@ -570,7 +570,7 @@ NORETURN void proc_init(void) // Init proc (root) struct proc *init = proc_make(PROC_PRIV_ROOT); - assert(elf_load("/bin/init", init) == EOK); + assert(elf_load("init", init) == EOK); proc_stack_push(init, 0); proc_stack_push(init, 0); current = list_first_data(proc_list_running, init); -- cgit v1.2.3