From 64ec8aa157e5d5d09372def37cbab00628e1e5f5 Mon Sep 17 00:00:00 2001 From: Marvin Borner Date: Tue, 6 Apr 2021 22:20:58 +0200 Subject: Made exec syscall relative using app name My plan is to implement a mobile-OS-like sandboxing using manifests and permission middlewares. Let's see if I can manage to do this without sacrificing too much performance. I'm also wondering whether I should implement open/close syscalls which would result in a cleaner block/unblock mechanism. I need to think. Hmmm.. Naa --- run | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) (limited to 'run') diff --git a/run b/run index af67dbc..a232762 100755 --- a/run +++ b/run @@ -178,7 +178,7 @@ make_build() { fi $SUDO cp -r disk/* mnt/ $SUDO chmod -R 0 mnt/conf/ - $SUDO cp -r build/apps/ mnt/bin/ + $SUDO cp -r build/apps/ mnt/apps/ $SUDO cp build/load.bin mnt/ $SUDO umount mnt/ rm -rf mnt/ @@ -210,7 +210,7 @@ make_disasm() { echo "Usage: './run disasm {kernel, wm, ...} [-S]'" exit 1 fi - objdump -drwC "$2" -Mintel build/apps/"$1" | less -R + objdump -drwC "$2" -Mintel build/apps/"$1"/exec | less -R #hexdump -C build/kernel.bin | less -R } @@ -220,7 +220,7 @@ make_addr() { echo "Usage: './run addr kernel 0x50042'" exit 1 fi - addr2line -e build/apps/"$1" -f -p "$2" + addr2line -e build/apps/"$1"/exec -f -p "$2" } make_cloc() { -- cgit v1.2.3