From 39100c30b7a16103e75187c9840a79c7df54f3da Mon Sep 17 00:00:00 2001 From: Miguel Date: Mon, 20 Aug 2018 00:47:53 +0200 Subject: schicophrenic cleanup after realizing many fundamental desgin problems! --- kernel/syscalls.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) (limited to 'kernel/syscalls.c') diff --git a/kernel/syscalls.c b/kernel/syscalls.c index 3f2a811..0c334bc 100644 --- a/kernel/syscalls.c +++ b/kernel/syscalls.c @@ -149,15 +149,15 @@ int syscall_tune(int v1,int v2, int v3) int copy_args(char **in, char **out) { - log(FOOLOS_MODULE_NAME,FOOLOS_LOG_INFO,"copy_args(0x%08x, 0x%08X)",in,out); + //log(FOOLOS_MODULE_NAME,FOOLOS_LOG_INFO,"copy_args(0x%08x, 0x%08X)",in,out); int count=0; while(in[count]!=NULL) { - log(FOOLOS_MODULE_NAME,FOOLOS_LOG_INFO,"args(0x%08x: %s)",in[count],out); +// log(FOOLOS_MODULE_NAME,FOOLOS_LOG_INFO,"args(0x%08x: %s)",in[count],out); count++; }; - log(FOOLOS_MODULE_NAME,FOOLOS_LOG_INFO,"copy_args : count: %d",count); + // log(FOOLOS_MODULE_NAME,FOOLOS_LOG_INFO,"copy_args : count: %d",count); char **pos=out; pos+=sizeof(char **)*(count+1); @@ -218,7 +218,7 @@ int syscall_execve(char *name, char **argv, char **env) /* try to move this to asm */ // asm volatile("jmp ."); // loop forever - log(FOOLOS_MODULE_NAME,FOOLOS_LOG_INFO,"returning to jump addy (0x%08X)", entry_global); + //log(FOOLOS_MODULE_NAME,FOOLOS_LOG_INFO,"returning to jump addy (0x%08X)", entry_global); asm volatile("mov $0x8fff000,%esp"); // set stack at high end of process image -- cgit v1.2.3