diff options
author | Marvin Borner | 2020-04-01 22:58:54 +0200 |
---|---|---|
committer | Marvin Borner | 2020-04-01 22:58:54 +0200 |
commit | ce13b28b90e8f7d8083658e083831c6528847099 (patch) | |
tree | 54882764e8bdad831c6a787b7c1d5d52d1ae4f48 /src/kernel/fs/elf.c | |
parent | f79ada76d2e4056ff5a81b53998d6d2696523d0f (diff) |
Static address linking approach for userspace
Kinda works but loading an statically linked binary into memory via
kmalloc seems to create a crash which results in a bootloop.
Diffstat (limited to 'src/kernel/fs/elf.c')
-rw-r--r-- | src/kernel/fs/elf.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/src/kernel/fs/elf.c b/src/kernel/fs/elf.c index 2f1b463..62c4e8d 100644 --- a/src/kernel/fs/elf.c +++ b/src/kernel/fs/elf.c @@ -40,13 +40,13 @@ uint32_t load_elf(char *elf_data) v_begin = p_entry->vaddr; v_end = p_entry->vaddr + p_entry->memsz; if (v_begin < USER_OFFSET) { - printf("INFO: load_elf(): can't load executable below %x\n", + warn("load_elf(): can't load executable below %x\n", USER_OFFSET); return 0; } if (v_end > USER_STACK) { - printf("INFO: load_elf(): can't load executable above %x\n", + warn("load_elf(): can't load executable above %x\n", USER_STACK); return 0; } |