[SPARC64]: Kill ancient and unused SYSCALL_TRACING debugging code.
Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
Родитель
d369ddd2fc
Коммит
af166d15c3
|
@ -22,8 +22,6 @@
|
|||
#include <asm/estate.h>
|
||||
#include <asm/auxio.h>
|
||||
|
||||
/* #define SYSCALL_TRACING 1 */
|
||||
|
||||
#define curptr g6
|
||||
|
||||
#define NR_SYSCALLS 284 /* Each OS is different... */
|
||||
|
@ -1671,11 +1669,6 @@ linux_sparc_syscall32:
|
|||
bgeu,pn %xcc, linux_sparc_ni_syscall ! CTI
|
||||
srl %i0, 0, %o0 ! IEU0
|
||||
sll %g1, 2, %l4 ! IEU0 Group
|
||||
#ifdef SYSCALL_TRACING
|
||||
call syscall_trace_entry
|
||||
add %sp, PTREGS_OFF, %o0
|
||||
srl %i0, 0, %o0
|
||||
#endif
|
||||
srl %i4, 0, %o4 ! IEU1
|
||||
lduw [%l7 + %l4], %l7 ! Load
|
||||
srl %i1, 0, %o1 ! IEU0 Group
|
||||
|
@ -1699,11 +1692,6 @@ linux_sparc_syscall:
|
|||
bgeu,pn %xcc, linux_sparc_ni_syscall ! CTI
|
||||
mov %i0, %o0 ! IEU0
|
||||
sll %g1, 2, %l4 ! IEU0 Group
|
||||
#ifdef SYSCALL_TRACING
|
||||
call syscall_trace_entry
|
||||
add %sp, PTREGS_OFF, %o0
|
||||
mov %i0, %o0
|
||||
#endif
|
||||
mov %i1, %o1 ! IEU1
|
||||
lduw [%l7 + %l4], %l7 ! Load
|
||||
4: mov %i2, %o2 ! IEU0 Group
|
||||
|
@ -1720,12 +1708,6 @@ linux_sparc_syscall:
|
|||
|
||||
3: stx %o0, [%sp + PTREGS_OFF + PT_V9_I0]
|
||||
ret_sys_call:
|
||||
#ifdef SYSCALL_TRACING
|
||||
mov %o0, %o1
|
||||
call syscall_trace_exit
|
||||
add %sp, PTREGS_OFF, %o0
|
||||
mov %o1, %o0
|
||||
#endif
|
||||
ldx [%sp + PTREGS_OFF + PT_V9_TSTATE], %g3
|
||||
ldx [%sp + PTREGS_OFF + PT_V9_TNPC], %l1 ! pc = npc
|
||||
sra %o0, 0, %o0
|
||||
|
|
|
@ -33,22 +33,6 @@
|
|||
|
||||
extern struct sparc_phys_banks sp_banks[SPARC_PHYS_BANKS];
|
||||
|
||||
/*
|
||||
* To debug kernel during syscall entry.
|
||||
*/
|
||||
void syscall_trace_entry(struct pt_regs *regs)
|
||||
{
|
||||
printk("scall entry: %s[%d]/cpu%d: %d\n", current->comm, current->pid, smp_processor_id(), (int) regs->u_regs[UREG_G1]);
|
||||
}
|
||||
|
||||
/*
|
||||
* To debug kernel during syscall exit.
|
||||
*/
|
||||
void syscall_trace_exit(struct pt_regs *regs)
|
||||
{
|
||||
printk("scall exit: %s[%d]/cpu%d: %d\n", current->comm, current->pid, smp_processor_id(), (int) regs->u_regs[UREG_G1]);
|
||||
}
|
||||
|
||||
/*
|
||||
* To debug kernel to catch accesses to certain virtual/physical addresses.
|
||||
* Mode = 0 selects physical watchpoints, mode = 1 selects virtual watchpoints.
|
||||
|
|
Загрузка…
Ссылка в новой задаче