From c4927ceb08d445d96258a1b788604ec86af80715 Mon Sep 17 00:00:00 2001 From: Brian Gianforcaro Date: Sun, 9 Aug 2020 15:36:41 -0700 Subject: [PATCH] Kernel: Use Userspace for the module_load syscall --- Kernel/Process.h | 2 +- Kernel/Syscalls/module.cpp | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/Kernel/Process.h b/Kernel/Process.h index 956759a258..9171c68d58 100644 --- a/Kernel/Process.h +++ b/Kernel/Process.h @@ -325,7 +325,7 @@ public: int sys$realpath(Userspace); ssize_t sys$getrandom(Userspace, size_t, unsigned int); int sys$setkeymap(Userspace); - int sys$module_load(const char* path, size_t path_length); + int sys$module_load(Userspace path, size_t path_length); int sys$module_unload(const char* name, size_t name_length); int sys$profiling_enable(pid_t); int sys$profiling_disable(pid_t); diff --git a/Kernel/Syscalls/module.cpp b/Kernel/Syscalls/module.cpp index 85d0ef49b8..46dcc80ef9 100644 --- a/Kernel/Syscalls/module.cpp +++ b/Kernel/Syscalls/module.cpp @@ -35,7 +35,7 @@ namespace Kernel { extern HashMap>* g_modules; -int Process::sys$module_load(const char* user_path, size_t path_length) +int Process::sys$module_load(Userspace user_path, size_t path_length) { if (!is_superuser()) return -EPERM;