diff --git a/src/lib.rs b/src/lib.rs
index 1083532ea225ee371f2a2deba67fa34151685aaa..6e7bfdbdd1397f44bebbb1d3c6fbe7c6021fb8ab 100644
--- a/src/lib.rs
+++ b/src/lib.rs
@@ -137,6 +137,7 @@ static mut INIT_ENV: &[u8] = &[];
 /// Initialize userspace by running the initfs:bin/init process
 /// This function will also set the CWD to initfs:bin and open debug: as stdio
 pub extern fn userspace_init() {
+    let path = b"/bin/init";
     let env = unsafe { INIT_ENV };
 
     assert_eq!(syscall::chdir(b"initfs:"), Ok(0));
@@ -145,17 +146,17 @@ pub extern fn userspace_init() {
     assert_eq!(syscall::open(b"debug:", syscall::flag::O_WRONLY).map(FileHandle::into), Ok(1));
     assert_eq!(syscall::open(b"debug:", syscall::flag::O_WRONLY).map(FileHandle::into), Ok(2));
 
-    let fd = syscall::open(b"/bin/init", syscall::flag::O_RDONLY).expect("failed to open init");
+    let fd = syscall::open(path, syscall::flag::O_RDONLY).expect("failed to open init");
 
-    let mut env_ptrs = Vec::new();
-    for line in env.split(|b| *b == b'\n') {
-        env_ptrs.push([
-            line.as_ptr() as usize,
-            line.len(),
-        ]);
+    let mut args = Vec::new();
+    args.push(path.to_vec().into_boxed_slice());
+
+    let mut vars = Vec::new();
+    for var in env.split(|b| *b == b'\n') {
+        vars.push(var.to_vec().into_boxed_slice());
     }
 
-    syscall::fexec(fd, &[], &env_ptrs).expect("failed to execute init");
+    syscall::fexec_kernel(fd, args.into_boxed_slice(), vars.into_boxed_slice()).expect("failed to execute init");
 
     panic!("init returned");
 }
@@ -164,6 +165,7 @@ pub extern fn userspace_init() {
 pub fn kmain(cpus: usize, env: &'static [u8]) -> ! {
     CPU_ID.store(0, Ordering::SeqCst);
     CPU_COUNT.store(cpus, Ordering::SeqCst);
+    unsafe { INIT_ENV = env };
 
     //Initialize the first context, stored in kernel/src/context/mod.rs
     context::init();
@@ -172,7 +174,6 @@ pub fn kmain(cpus: usize, env: &'static [u8]) -> ! {
     println!("BSP: {:?} {}", pid, cpus);
     println!("Env: {:?}", ::core::str::from_utf8(env));
 
-    unsafe { INIT_ENV = env };
     match context::contexts_mut().spawn(userspace_init) {
         Ok(context_lock) => {
             let mut context = context_lock.write();
diff --git a/src/syscall/process.rs b/src/syscall/process.rs
index 3fe5df78a043c228906ac36864676bcfd91ba50a..0f8878f82bcf771233bcdd6f26173efab4e66394 100644
--- a/src/syscall/process.rs
+++ b/src/syscall/process.rs
@@ -527,7 +527,7 @@ impl Drop for ExecFile {
     }
 }
 
-fn exec_noreturn(
+fn fexec_noreturn(
     setuid: Option<u32>,
     setgid: Option<u32>,
     data: Box<[u8]>,
@@ -765,21 +765,7 @@ fn exec_noreturn(
     unsafe { usermode(entry, sp, 0); }
 }
 
-pub fn fexec(fd: FileHandle, arg_ptrs: &[[usize; 2]], var_ptrs: &[[usize; 2]]) -> Result<usize> {
-    let mut args = Vec::new();
-    for arg_ptr in arg_ptrs {
-        let arg = validate_slice(arg_ptr[0] as *const u8, arg_ptr[1])?;
-        // Argument must be moved into kernel space before exec unmaps all memory
-        args.push(arg.to_vec().into_boxed_slice());
-    }
-
-    let mut vars = Vec::new();
-    for var_ptr in var_ptrs {
-        let var = validate_slice(var_ptr[0] as *const u8, var_ptr[1])?;
-        // Argument must be moved into kernel space before exec unmaps all memory
-        vars.push(var.to_vec().into_boxed_slice());
-    }
-
+pub fn fexec_kernel(fd: FileHandle, args: Box<[Box<[u8]>]>, vars: Box<[Box<[u8]>]>) -> Result<usize> {
     let (uid, gid) = {
         let contexts = context::contexts();
         let context_lock = contexts.current().ok_or(Error::new(ESRCH))?;
@@ -899,14 +885,30 @@ pub fn fexec(fd: FileHandle, arg_ptrs: &[[usize; 2]], var_ptrs: &[[usize; 2]]) -
         }
     }
 
-    // Drop so that usage is not allowed after unmapping context
-    drop(arg_ptrs);
-    drop(var_ptrs);
-
     // This is the point of no return, quite literaly. Any checks for validity need
     // to be done before, and appropriate errors returned. Otherwise, we have nothing
     // to return to.
-    exec_noreturn(setuid, setgid, data.into_boxed_slice(), args.into_boxed_slice(), vars.into_boxed_slice());
+    fexec_noreturn(setuid, setgid, data.into_boxed_slice(), args, vars);
+}
+
+pub fn fexec(fd: FileHandle, arg_ptrs: &[[usize; 2]], var_ptrs: &[[usize; 2]]) -> Result<usize> {
+    let mut args = Vec::new();
+    for arg_ptr in arg_ptrs {
+        let arg = validate_slice(arg_ptr[0] as *const u8, arg_ptr[1])?;
+        // Argument must be moved into kernel space before exec unmaps all memory
+        args.push(arg.to_vec().into_boxed_slice());
+    }
+    drop(arg_ptrs);
+
+    let mut vars = Vec::new();
+    for var_ptr in var_ptrs {
+        let var = validate_slice(var_ptr[0] as *const u8, var_ptr[1])?;
+        // Argument must be moved into kernel space before exec unmaps all memory
+        vars.push(var.to_vec().into_boxed_slice());
+    }
+    drop(var_ptrs);
+
+    fexec_kernel(fd, args.into_boxed_slice(), vars.into_boxed_slice())
 }
 
 pub fn exit(status: usize) -> ! {