diff --git a/src/sys/init/main.c b/src/sys/init/main.c index 5cfcaf0..9828773 100644 --- a/src/sys/init/main.c +++ b/src/sys/init/main.c @@ -144,7 +144,7 @@ execThread(systemTask, (uInt32) sysTask + 0x2000, 0x0); kprintf("Thread Start!\n"); - // execFile("sys:/bin/init", 0x0, 0x0, 0x0); /* OS Initializer */ + execFile("sys:/bin/init", 0x0, 0x0, 0x0); /* OS Initializer */ //execFile( "sys:/bin/login", 0x0, 0x0, 0x0 ); /* OS Initializer */ irqEnable(0x0); diff --git a/src/sys/net/api/api_lib.c b/src/sys/net/api/api_lib.c index c68c7c1..a50b00b 100644 --- a/src/sys/net/api/api_lib.c +++ b/src/sys/net/api/api_lib.c @@ -149,7 +149,6 @@ return NULL; } } - kprintf("netconn_new"); API_MSG_VAR_FREE(msg); return conn; } @@ -422,23 +421,19 @@ #else sys_arch_mbox_fetch(&conn->acceptmbox, &accept_ptr, 0); #endif /* LWIP_SO_RCVTIMEO*/ -kprintf("%s:%i", __FILE__, __LINE__); newconn = (struct netconn *)accept_ptr; /* Register event with callback */ API_EVENT(conn, NETCONN_EVT_RCVMINUS, 0); -kprintf("%s:%i", __FILE__, __LINE__); if (accept_ptr == &netconn_aborted) { /* a connection has been aborted: out of pcbs or out of netconns during accept */ /* @todo: set netconn error, but this would be fatal and thus block further accepts */ #if TCP_LISTEN_BACKLOG -kprintf("[%s:%i]", __FILE__, __LINE__); API_MSG_VAR_FREE(msg); #endif /* TCP_LISTEN_BACKLOG */ return ERR_ABRT; } if (newconn == NULL) { -kprintf("[%s:%i]", __FILE__, __LINE__); /* connection has been aborted */ /* in this special case, we set the netconn error from application thread, as on a ready-to-accept listening netconn, there should not be anything running @@ -449,7 +444,6 @@ #endif /* TCP_LISTEN_BACKLOG */ return ERR_CLSD; } -kprintf("[%s:%i]", __FILE__, __LINE__); #if TCP_LISTEN_BACKLOG /* Let the stack know that we have accepted the connection. */ API_MSG_VAR_REF(msg).conn = newconn; @@ -458,10 +452,8 @@ API_MSG_VAR_FREE(msg); #endif /* TCP_LISTEN_BACKLOG */ -kprintf("[%s:%i]", __FILE__, __LINE__); *new_conn = newconn; /* don't set conn->last_err: it's only ERR_OK, anyway */ -kprintf("[%s:%i]", __FILE__, __LINE__); return ERR_OK; #else /* LWIP_TCP */ LWIP_UNUSED_ARG(conn); diff --git a/src/sys/net/core/init.c b/src/sys/net/core/init.c index 67468ad..09ef246 100644 --- a/src/sys/net/core/init.c +++ b/src/sys/net/core/init.c @@ -341,54 +341,39 @@ /* Modules initialization */ stats_init(); -kprintf("STATS INIT"); #if !NO_SYS sys_init(); -kprintf("SYS INIT"); #endif /* !NO_SYS */ mem_init(); -kprintf("MEM INIT"); memp_init(); -kprintf("MEMP INIT"); pbuf_init(); -kprintf("PBUF INIT"); netif_init(); -kprintf("NETIF INIT"); #if LWIP_IPV4 ip_init(); -kprintf("IP INIT"); #if LWIP_ARP etharp_init(); -kprintf("ETHARP INIT"); #endif /* LWIP_ARP */ #endif /* LWIP_IPV4 */ #if LWIP_RAW raw_init(); -kprintf("RAW INIT"); #endif /* LWIP_RAW */ #if LWIP_UDP udp_init(); -kprintf("UDP INIT"); #endif /* LWIP_UDP */ #if LWIP_TCP tcp_init(); -kprintf("TCP INIT"); #endif /* LWIP_TCP */ #if LWIP_IGMP igmp_init(); -kprintf("IGMP INIT"); #endif /* LWIP_IGMP */ #if LWIP_DNS dns_init(); -kprintf("DNS INIT"); #endif /* LWIP_DNS */ #if PPP_SUPPORT ppp_init(); -kprintf("PPP INIT"); #endif #if LWIP_TIMERS sys_timeouts_init(); -kprintf("SYS TIMEOUTS INIT"); #endif /* LWIP_TIMERS */ } diff --git a/src/sys/net/core/ipv4/ip4.c b/src/sys/net/core/ipv4/ip4.c index 870b8ae..bef5a85 100644 --- a/src/sys/net/core/ipv4/ip4.c +++ b/src/sys/net/core/ipv4/ip4.c @@ -387,7 +387,6 @@ /* identify the IP header */ iphdr = (struct ip_hdr *)p->payload; if (IPH_V(iphdr) != 4) { -//kprintf("%s:%i", __FILE__, __LINE__); LWIP_DEBUGF(IP_DEBUG | LWIP_DBG_LEVEL_WARNING, ("IP packet dropped due to bad version number %"U16_F"\n", (u16_t)IPH_V(iphdr))); ip4_debug_print(p); pbuf_free(p); @@ -493,7 +492,6 @@ netif = inp; do { if (ip4_addr_get_u32(&iphdr->dest) == ip4_addr_get_u32(netif_ip4_addr(netif))) -//kprintf("netif: 0x%X-0x%X-0x%X", netif, ip4_addr_get_u32(&iphdr->dest), ip4_addr_get_u32(netif_ip4_addr(netif))); LWIP_DEBUGF(IP_DEBUG, ("ip_input: iphdr->dest 0x%"X32_F" netif->ip_addr 0x%"X32_F" (0x%"X32_F", 0x%"X32_F", 0x%"X32_F")\n", ip4_addr_get_u32(&iphdr->dest), ip4_addr_get_u32(netif_ip4_addr(netif)), ip4_addr_get_u32(&iphdr->dest) & ip4_addr_get_u32(netif_ip4_netmask(netif)), @@ -559,7 +557,6 @@ * #define LWIP_IP_ACCEPT_UDP_PORT(dst_port) ((dst_port) == PP_NTOHS(12345)) */ if (netif == NULL) { -//kprintf("%s:%i", __FILE__, __LINE__); /* remote port is DHCP server? */ if (IPH_PROTO(iphdr) == IP_PROTO_UDP) { struct udp_hdr *udphdr = (struct udp_hdr *)((u8_t *)iphdr + iphdr_hlen); @@ -584,7 +581,6 @@ ) #endif /* LWIP_IGMP || IP_ACCEPT_LINK_LAYER_ADDRESSING */ { -//kprintf("%s:%i", __FILE__, __LINE__); if ((ip4_addr_isbroadcast(ip4_current_src_addr(), inp)) || (ip4_addr_ismulticast(ip4_current_src_addr()))) { /* packet source is not valid */ @@ -594,15 +590,12 @@ IP_STATS_INC(ip.drop); MIB2_STATS_INC(mib2.ipinaddrerrors); MIB2_STATS_INC(mib2.ipindiscards); -//kprintf("%s:%i", __FILE__, __LINE__); return ERR_OK; } } -//kprintf("%s:%i", __FILE__, __LINE__); /* packet not for us? */ if (netif == NULL) { -//kprintf("%s:%i", __FILE__, __LINE__); /* packet not for us, route or discard */ LWIP_DEBUGF(IP_DEBUG | LWIP_DBG_TRACE, ("ip4_input: packet not for us.\n")); #if IP_FORWARD @@ -620,10 +613,8 @@ pbuf_free(p); return ERR_OK; } -//kprintf("%s:%i", __FILE__, __LINE__); /* packet consists of multiple fragments? */ if ((IPH_OFFSET(iphdr) & PP_HTONS(IP_OFFMASK | IP_MF)) != 0) { -//kprintf("%s:%i", __FILE__, __LINE__); #if IP_REASSEMBLY /* packet fragment reassembly code present? */ LWIP_DEBUGF(IP_DEBUG, ("IP packet is a fragment (id=0x%04"X16_F" tot_len=%"U16_F" len=%"U16_F" MF=%"U16_F" offset=%"U16_F"), calling ip4_reass()\n", lwip_ntohs(IPH_ID(iphdr)), p->tot_len, lwip_ntohs(IPH_LEN(iphdr)), (u16_t)!!(IPH_OFFSET(iphdr) & PP_HTONS(IP_MF)), (u16_t)((lwip_ntohs(IPH_OFFSET(iphdr)) & IP_OFFMASK)*8))); @@ -631,11 +622,9 @@ p = ip4_reass(p); /* packet not fully reassembled yet? */ if (p == NULL) { -//kprintf("%s:%i", __FILE__, __LINE__); return ERR_OK; } iphdr = (struct ip_hdr *)p->payload; -//kprintf("%s:%i", __FILE__, __LINE__); #else /* IP_REASSEMBLY == 0, no packet fragment reassembly code present */ pbuf_free(p); LWIP_DEBUGF(IP_DEBUG | LWIP_DBG_LEVEL_SERIOUS, ("IP packet dropped since it was fragmented (0x%"X16_F") (while IP_REASSEMBLY == 0).\n", @@ -662,7 +651,6 @@ IP_STATS_INC(ip.drop); /* unsupported protocol feature */ MIB2_STATS_INC(mib2.ipinunknownprotos); -//kprintf("%s:%i", __FILE__, __LINE__); return ERR_OK; } #endif /* IP_OPTIONS_ALLOWED == 0 */ @@ -676,7 +664,6 @@ ip_data.current_input_netif = inp; ip_data.current_ip4_header = iphdr; ip_data.current_ip_header_tot_len = IPH_HL(iphdr) * 4; -//kprintf("%s:%i", __FILE__, __LINE__); #if LWIP_RAW /* raw input did not eat the packet? */ @@ -685,7 +672,6 @@ { pbuf_header(p, -(s16_t)iphdr_hlen); /* Move to payload, no check necessary. */ -//kprintf("IPH_PROTO(%i))", IPH_PROTO(iphdr)); switch (IPH_PROTO(iphdr)) { #if LWIP_UDP @@ -694,7 +680,6 @@ case IP_PROTO_UDPLITE: #endif /* LWIP_UDPLITE */ MIB2_STATS_INC(mib2.ipindelivers); -//kprintf("UDP"); udp_input(p, inp); break; #endif /* LWIP_UDP */ diff --git a/src/sys/net/core/mem.c b/src/sys/net/core/mem.c index 21c75df..353c9d7 100644 --- a/src/sys/net/core/mem.c +++ b/src/sys/net/core/mem.c @@ -627,17 +627,13 @@ } /* protect the heap from concurrent access */ -//kprintf("SML: [0x%i][0x%X][0x%X]", __LINE__, mem_mutex, &mem_mutex); sys_mutex_lock(&mem_mutex); -//kprintf("SML: [0x%i]", __LINE__); LWIP_MEM_ALLOC_PROTECT(); -//kprintf("SML: [0x%i]", __LINE__); #if LWIP_ALLOW_MEM_FREE_FROM_OTHER_CONTEXT /* run as long as a mem_free disturbed mem_malloc or mem_trim */ do { local_mem_free_count = 0; #endif /* LWIP_ALLOW_MEM_FREE_FROM_OTHER_CONTEXT */ -//kprintf("SML: [0x%i]", __LINE__); /* Scan through the heap searching for a free block that is big enough, * beginning with the lowest free block. @@ -656,15 +652,12 @@ local_mem_free_count = 1; break; } -//kprintf("SML: [0x%i]", __LINE__); #endif /* LWIP_ALLOW_MEM_FREE_FROM_OTHER_CONTEXT */ -//kprintf("SML: [0x%i]", __LINE__); if ((!mem->used) && (mem->next - (ptr + SIZEOF_STRUCT_MEM)) >= size) { /* mem is not used and at least perfect fit is possible: * mem->next - (ptr + SIZEOF_STRUCT_MEM) gives us the 'user data size' of mem */ -//kprintf("SML: [0x%i]", __LINE__); if (mem->next - (ptr + SIZEOF_STRUCT_MEM) >= (size + SIZEOF_STRUCT_MEM + MIN_SIZE_ALIGNED)) { /* (in addition to the above, we test if another struct mem (SIZEOF_STRUCT_MEM) containing @@ -686,7 +679,6 @@ /* and insert it between mem and mem->next */ mem->next = ptr2; mem->used = 1; -//kprintf("SML: [0x%i]", __LINE__); if (mem2->next != MEM_SIZE_ALIGNED) { ((struct mem *)(void *)&ram[mem2->next])->prev = ptr2; @@ -700,7 +692,6 @@ * also can't move mem->next directly behind mem, since mem->next * will always be used at this point! */ -//kprintf("SML: [0x%i]", __LINE__); mem->used = 1; MEM_STATS_INC_USED(used, mem->next - (mem_size_t)((u8_t *)mem - ram)); } @@ -709,7 +700,6 @@ #endif /* LWIP_ALLOW_MEM_FREE_FROM_OTHER_CONTEXT */ if (mem == lfree) { struct mem *cur = lfree; -//kprintf("SML: [0x%i]", __LINE__); /* Find next free block after mem and update lowest free pointer */ while (cur->used && cur != ram_end) { #if LWIP_ALLOW_MEM_FREE_FROM_OTHER_CONTEXT @@ -725,16 +715,11 @@ #endif /* LWIP_ALLOW_MEM_FREE_FROM_OTHER_CONTEXT */ cur = (struct mem *)(void *)&ram[cur->next]; } -//kprintf("SML: [0x%i]", __LINE__); lfree = cur; LWIP_ASSERT("mem_malloc: !lfree->used", ((lfree == ram_end) || (!lfree->used))); -//kprintf("SML: [0x%i]", __LINE__); } -//kprintf("SML: [0x%i]", __LINE__); LWIP_MEM_ALLOC_UNPROTECT(); -//kprintf("SML: [0x%i][0x%X][0x%X]", __LINE__, mem_mutex, &mem_mutex); sys_mutex_unlock(&mem_mutex); -//kprintf("SML: [0x%i]", __LINE__); LWIP_ASSERT("mem_malloc: allocated memory not above ram_end.", (mem_ptr_t)mem + SIZEOF_STRUCT_MEM + size <= (mem_ptr_t)ram_end); LWIP_ASSERT("mem_malloc: allocated memory properly aligned.", @@ -742,11 +727,9 @@ LWIP_ASSERT("mem_malloc: sanity check alignment", (((mem_ptr_t)mem) & (MEM_ALIGNMENT-1)) == 0); -//kprintf("SML: [0x%i]", __LINE__); return (u8_t *)mem + SIZEOF_STRUCT_MEM; } } -//kprintf("SML: [0x%i]", __LINE__); #if LWIP_ALLOW_MEM_FREE_FROM_OTHER_CONTEXT /* if we got interrupted by a mem_free, try again */ } while (local_mem_free_count != 0); @@ -754,9 +737,7 @@ LWIP_DEBUGF(MEM_DEBUG | LWIP_DBG_LEVEL_SERIOUS, ("mem_malloc: could not allocate %"S16_F" bytes\n", (s16_t)size)); MEM_STATS_INC(err); LWIP_MEM_ALLOC_UNPROTECT(); -//kprintf("SML: [0x%i]]\n", __LINE__); sys_mutex_unlock(&mem_mutex); -//kprintf("SML: [0x%i]]\n", __LINE__); return NULL; } diff --git a/src/sys/net/core/pbuf.c b/src/sys/net/core/pbuf.c index ea2a6a2..26fd2d6 100644 --- a/src/sys/net/core/pbuf.c +++ b/src/sys/net/core/pbuf.c @@ -745,7 +745,6 @@ SYS_ARCH_PROTECT(old_level); /* all pbufs in a chain are referenced at least once */ if (_current->id == 4) - kprintf("p->ref %i", p->ref); LWIP_ASSERT("pbuf_free: p->ref > 0", p->ref > 0); /* decrease reference count (number of pointers to pbuf) */ ref = --(p->ref); diff --git a/src/sys/net/net/shell.c b/src/sys/net/net/shell.c index c48ca16..eddaa8b 100644 --- a/src/sys/net/net/shell.c +++ b/src/sys/net/net/shell.c @@ -56,9 +56,7 @@ // UBU static struct netconn *conns[NCONNS]; static void sendstr(const char *str, struct netconn *conn) { -kprintf("[%s:%i](%s){%i}", __FILE__,__LINE__, str, strlen(str)); netconn_write(conn, (void *) str, strlen(str), NETCONN_COPY); -kprintf("[%s:%i]", __FILE__,__LINE__); } static void prompt(struct netconn *conn) { @@ -72,9 +70,7 @@ // UBU int i; // UBU char bufr[1500]; buf = kmalloc(1500); -kprintf("[%s:%i]", __FILE__,__LINE__); prompt(conn); -kprintf("[%s:%i]", __FILE__,__LINE__); while (1) { err = netconn_recv(conn, &buf); if (buf != 0x0) @@ -82,7 +78,6 @@ len = netbuf_len(buf); netbuf_delete(buf); buffer[len - 2] = '\0'; - kprintf("Buffer: [%s:%i]\n", buffer, len); if (!strcmp(buffer, "quit")) { netconn_close(conn); break; @@ -102,20 +97,14 @@ buffer = (char *) kmalloc(1024); - kprintf("shell_thread: %i", _current->id); - conn = netconn_new(NETCONN_TCP); netconn_bind(conn, IP4_ADDR_ANY, 23); netconn_listen(conn); while (1) { - kprintf("shell1: 0x%X:0x%X", conn->recvmbox, conn->acceptmbox); netconn_accept(conn,&newconn); - kprintf("2"); shell_main(newconn); - kprintf("3"); //netconn_delete(newconn); - kprintf("4"); } } diff --git a/src/sys/net/net/sys_arch.c b/src/sys/net/net/sys_arch.c index 7b5b3bf..63890bc 100644 --- a/src/sys/net/net/sys_arch.c +++ b/src/sys/net/net/sys_arch.c @@ -128,7 +128,6 @@ void sys_sem_set_invalid(struct sys_sem **s) { *s = 0x0; - kprintf("NEED TO DO THIS"); } err_t sys_mutex_new(sys_mutex_t *mutex) { @@ -173,7 +172,6 @@ //mbox->queue = kmalloc(sizeof(void *) * size);//calloc(size, sizeof(void *)); //if (!mbox->queue) { - // kprintf("WTF: [%i]", size); // return ERR_MEM; //} @@ -275,9 +273,6 @@ LWIP_ASSERT("invalid mbox", (mb != NULL) && (*mb != NULL)); mbox = *mb; - if (_current->id == 4) - kprintf("MBOX: 0x%X]", mbox); - /* The mutex lock is quick so we don't bother with the timeout stuff here. */ sys_arch_sem_wait(&mbox->lock, 0); @@ -371,11 +366,8 @@ LWIP_ASSERT("Non-positive prio", prio > 0); LWIP_ASSERT("Prio is too big", prio < 20); - kprintf("sys_thread: [0x%X]\n", sizeof(struct sys_thread)); - new_thread = kmalloc(sizeof(struct sys_thread)); memset(new_thread, 0x0, sizeof(struct sys_thread)); - kprintf("THREAD: [0x%X]\n", new_thread); spinLock(&netThreadSpinlock); new_thread->next = threads; @@ -392,11 +384,9 @@ thread_param->thread = thread; */ //execThread((void *)function,0x0,0x0); - kprintf("thread->ubthread: [0x%X]\n", new_thread->ubthread); if (ubthread_create(&new_thread->ubthread, 0x0, (void *) (thread), arg) != 0x0) { kpanic("sys_thread_new: ubthread_create"); } - kprintf("thread->ubthread: [0x%X]\n", new_thread->ubthread); return (new_thread); } @@ -451,16 +441,13 @@ struct sys_thread *st; kTask_t *pt; pt = ubthread_self(); - //kprintf("SL: %i-0x%X]", _current->id, &netThreadSpinlock); spinLock(&netThreadSpinlock); for (st = threads; st != NULL; st = st->next) { if (st->ubthread == pt) { - //kprintf("SUL: %i-0x%X]", _current->id, &netThreadSpinlock); spinUnlock(&netThreadSpinlock); return st; } } - //kprintf("SUL: %i-0x%X]", _current->id, &netThreadSpinlock); spinUnlock(&netThreadSpinlock); kprintf("sys: current_thread: could not find current thread!\n"); kprintf("This is due to a race condition in the LinuxThreads\n"); diff --git a/src/sys/net/net/udpecho.c b/src/sys/net/net/udpecho.c index 30e9087..228717a 100644 --- a/src/sys/net/net/udpecho.c +++ b/src/sys/net/net/udpecho.c @@ -47,28 +47,17 @@ static unsigned short port; char buffer[4096]; - kprintf("1"); conn = netconn_new(NETCONN_UDP); - kprintf("2"); netconn_bind(conn, NULL, 7); - kprintf("3"); while (1) { - kprintf("a"); buf = netconn_recv(conn); - kprintf("b"); addr = netbuf_fromaddr(buf); - kprintf("c"); port = netbuf_fromport(buf); - kprintf("d"); netconn_connect(conn, addr, port); - kprintf("e"); netconn_send(conn, buf); - kprintf("f"); netbuf_copy(buf, buffer, sizeof(buffer)); - kprintf("got %s\n", buffer); netbuf_delete(buf); - kprintf("g"); } } /*-----------------------------------------------------------------------------------*/ diff --git a/src/sys/net/netif/ethernet.c b/src/sys/net/netif/ethernet.c index 4290609..c9f31b4 100644 --- a/src/sys/net/netif/ethernet.c +++ b/src/sys/net/netif/ethernet.c @@ -166,7 +166,6 @@ #if LWIP_IPV4 && LWIP_ARP /* IP packet? */ case PP_HTONS(ETHTYPE_IP): -//kprintf("%s:%i - Type: %i", __FILE__, __LINE__, type); if (!(netif->flags & NETIF_FLAG_ETHARP)) { goto free_and_return; } @@ -179,15 +178,12 @@ goto free_and_return; } else { /* pass to IP layer */ -//kprintf("%s:%i - Type: %i", __FILE__, __LINE__, type); ip4_input(p, netif); } break; case PP_HTONS(ETHTYPE_ARP): -//kprintf("%s:%i - Type: %i", __FILE__, __LINE__, type); if (!(netif->flags & NETIF_FLAG_ETHARP)) { -//kprintf("%s:%i - Type: %i", __FILE__, __LINE__, type); goto free_and_return; } /* skip Ethernet header */ @@ -198,30 +194,25 @@ LWIP_DEBUGF(ETHARP_DEBUG | LWIP_DBG_TRACE, ("Can't move over header in packet")); ETHARP_STATS_INC(etharp.lenerr); ETHARP_STATS_INC(etharp.drop); -//kprintf("%s:%i - Type: %i", __FILE__, __LINE__, type); goto free_and_return; } else { /* pass p to ARP module */ -//kprintf("%s:%i - Type: %i", __FILE__, __LINE__, type); etharp_input(p, netif); } break; #endif /* LWIP_IPV4 && LWIP_ARP */ #if PPPOE_SUPPORT case PP_HTONS(ETHTYPE_PPPOEDISC): /* PPP Over Ethernet Discovery Stage */ -//kprintf("%s:%i - Type: %i", __FILE__, __LINE__, type); pppoe_disc_input(netif, p); break; case PP_HTONS(ETHTYPE_PPPOE): /* PPP Over Ethernet Session Stage */ -//kprintf("%s:%i - Type: %i", __FILE__, __LINE__, type); pppoe_data_input(netif, p); break; #endif /* PPPOE_SUPPORT */ #if LWIP_IPV6 case PP_HTONS(ETHTYPE_IPV6): /* IPv6 */ -//kprintf("%s:%i - Type: %i", __FILE__, __LINE__, type); /* skip Ethernet header */ if ((p->len < ip_hdr_offset) || pbuf_header(p, (s16_t)-ip_hdr_offset)) { LWIP_DEBUGF(ETHARP_DEBUG | LWIP_DBG_TRACE | LWIP_DBG_LEVEL_WARNING, @@ -236,7 +227,6 @@ #endif /* LWIP_IPV6 */ default: -//kprintf("%s:%i - Type: %i", __FILE__, __LINE__, type); #ifdef LWIP_HOOK_UNKNOWN_ETH_PROTOCOL if(LWIP_HOOK_UNKNOWN_ETH_PROTOCOL(p, netif) == ERR_OK) { break; diff --git a/src/sys/net/netif/ethernetif.c b/src/sys/net/netif/ethernetif.c index 8237635..925a515 100644 --- a/src/sys/net/netif/ethernetif.c +++ b/src/sys/net/netif/ethernetif.c @@ -155,7 +155,6 @@ time. The size of the data in each pbuf is kept in the ->len variable. */ //send data from(q->payload, q->len); - //kprintf("SENDING DATA!!!!!"); lnc_sendPacket(lnc, q->payload, q->len,0x0); } @@ -276,23 +275,16 @@ ethernetif = netif->state; /* move received packet into a new pbuf */ -//kprintf("ethernetif_input0\n"); p = low_level_input(netif); -//kprintf("ethernetif_input1\n"); /* if no packet could be read, silently ignore this */ if (p != NULL) { -//kprintf("ethernetif_input2\n"); -//kprintf("netif->input: [0x%X][0x%X]\n", netif->input, tcpip_input); /* pass all packets to ethernet_input, which decides what packets it supports */ if (netif->input(p, netif) != ERR_OK) { -//kprintf("ethernetif_input3\n"); LWIP_DEBUGF(NETIF_DEBUG, ("ethernetif_input: IP input error\n")); pbuf_free(p); -//kprintf("ethernetif_input4\n"); p = NULL; } } -//kprintf("ethernetif_input5\n"); } /**