fixed printd() bugs when DEBUG is defined
authorAndrew Waterman <waterman@s141.Millennium.Berkeley.EDU>
Sat, 28 May 2011 06:29:17 +0000 (23:29 -0700)
committerKevin Klues <klueska@cs.berkeley.edu>
Thu, 3 Nov 2011 00:36:02 +0000 (17:36 -0700)
kern/src/arsc.c
kern/src/kfs.c
kern/src/mm.c

index 444c8e0..9c20d05 100644 (file)
@@ -110,8 +110,6 @@ static intreg_t process_generic_syscalls(struct proc *p, size_t max)
                syscall_rsp_t rsp;
                // this assumes we get our answer immediately for the syscall.
                syscall_req_t* req = RING_GET_REQUEST(sysbr, ++sysbr->req_cons);
-               // print req
-               printd("req no %d, req arg %c\n", req->num, *((char*)req->args[0]));
                
                pcpui->cur_sysc = req->sc;
                run_local_syscall(req->sc); // TODO: blocking call will block arcs as well.
index d2a5fe3..c5e876c 100644 (file)
@@ -913,7 +913,7 @@ void parse_cpio_entries(struct super_block *sb, void *cpio_b)
                }
                c_bhdr->c_filename = (char*)c_hdr + sizeof(*c_hdr);
                namesize = cpio_strntol(buf, c_hdr->c_namesize, 8);
-               printd("Namesize: %d\n", size);
+               printd("Namesize: %d\n", namesize);
                if (!strcmp(c_bhdr->c_filename, "TRAILER!!!"))
                        break;
                c_bhdr->c_ino = cpio_strntol(buf, c_hdr->c_ino, 8);
index ba4cd26..edda11a 100644 (file)
@@ -492,7 +492,7 @@ int __do_mprotect(struct proc *p, uintptr_t addr, size_t len, int prot)
 
 int munmap(struct proc *p, uintptr_t addr, size_t len)
 {
-       printd("munmap(addr %x, len %x, prot %x)\n", addr, len, prot);
+       printd("munmap(addr %x, len %x)\n", addr, len);
        if (!len)
                return 0;
        if ((addr % PGSIZE) || (addr < MMAP_LOWEST_VA)) {