aboutsummaryrefslogtreecommitdiff
path: root/src/kernel/fs/elf.c
diff options
context:
space:
mode:
authorMarvin Borner2020-04-01 22:58:54 +0200
committerMarvin Borner2020-04-01 22:58:54 +0200
commitce13b28b90e8f7d8083658e083831c6528847099 (patch)
tree54882764e8bdad831c6a787b7c1d5d52d1ae4f48 /src/kernel/fs/elf.c
parentf79ada76d2e4056ff5a81b53998d6d2696523d0f (diff)
Static address linking approach for userspace
Kinda works but loading an statically linked binary into memory via kmalloc seems to create a crash which results in a bootloop.
Diffstat (limited to 'src/kernel/fs/elf.c')
-rw-r--r--src/kernel/fs/elf.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/src/kernel/fs/elf.c b/src/kernel/fs/elf.c
index 2f1b463..62c4e8d 100644
--- a/src/kernel/fs/elf.c
+++ b/src/kernel/fs/elf.c
@@ -40,13 +40,13 @@ uint32_t load_elf(char *elf_data)
v_begin = p_entry->vaddr;
v_end = p_entry->vaddr + p_entry->memsz;
if (v_begin < USER_OFFSET) {
- printf("INFO: load_elf(): can't load executable below %x\n",
+ warn("load_elf(): can't load executable below %x\n",
USER_OFFSET);
return 0;
}
if (v_end > USER_STACK) {
- printf("INFO: load_elf(): can't load executable above %x\n",
+ warn("load_elf(): can't load executable above %x\n",
USER_STACK);
return 0;
}