Skip to content

Commit

Permalink
[SPARC64]: Kill ancient and unused SYSCALL_TRACING debugging code.
Browse files Browse the repository at this point in the history
Signed-off-by: David S. Miller <[email protected]>
  • Loading branch information
davem330 committed Jul 10, 2005
1 parent d369ddd commit af166d1
Show file tree
Hide file tree
Showing 2 changed files with 0 additions and 34 deletions.
18 changes: 0 additions & 18 deletions arch/sparc64/kernel/entry.S
Original file line number Diff line number Diff line change
Expand Up @@ -22,8 +22,6 @@
#include <asm/estate.h>
#include <asm/auxio.h>

/* #define SYSCALL_TRACING 1 */

#define curptr g6

#define NR_SYSCALLS 284 /* Each OS is different... */
Expand Down Expand Up @@ -1671,11 +1669,6 @@ linux_sparc_syscall32:
bgeu,pn %xcc, linux_sparc_ni_syscall ! CTI
srl %i0, 0, %o0 ! IEU0
sll %g1, 2, %l4 ! IEU0 Group
#ifdef SYSCALL_TRACING
call syscall_trace_entry
add %sp, PTREGS_OFF, %o0
srl %i0, 0, %o0
#endif
srl %i4, 0, %o4 ! IEU1
lduw [%l7 + %l4], %l7 ! Load
srl %i1, 0, %o1 ! IEU0 Group
Expand All @@ -1699,11 +1692,6 @@ linux_sparc_syscall:
bgeu,pn %xcc, linux_sparc_ni_syscall ! CTI
mov %i0, %o0 ! IEU0
sll %g1, 2, %l4 ! IEU0 Group
#ifdef SYSCALL_TRACING
call syscall_trace_entry
add %sp, PTREGS_OFF, %o0
mov %i0, %o0
#endif
mov %i1, %o1 ! IEU1
lduw [%l7 + %l4], %l7 ! Load
4: mov %i2, %o2 ! IEU0 Group
Expand All @@ -1720,12 +1708,6 @@ linux_sparc_syscall:

3: stx %o0, [%sp + PTREGS_OFF + PT_V9_I0]
ret_sys_call:
#ifdef SYSCALL_TRACING
mov %o0, %o1
call syscall_trace_exit
add %sp, PTREGS_OFF, %o0
mov %o1, %o0
#endif
ldx [%sp + PTREGS_OFF + PT_V9_TSTATE], %g3
ldx [%sp + PTREGS_OFF + PT_V9_TNPC], %l1 ! pc = npc
sra %o0, 0, %o0
Expand Down
16 changes: 0 additions & 16 deletions arch/sparc64/mm/fault.c
Original file line number Diff line number Diff line change
Expand Up @@ -33,22 +33,6 @@

extern struct sparc_phys_banks sp_banks[SPARC_PHYS_BANKS];

/*
* To debug kernel during syscall entry.
*/
void syscall_trace_entry(struct pt_regs *regs)
{
printk("scall entry: %s[%d]/cpu%d: %d\n", current->comm, current->pid, smp_processor_id(), (int) regs->u_regs[UREG_G1]);
}

/*
* To debug kernel during syscall exit.
*/
void syscall_trace_exit(struct pt_regs *regs)
{
printk("scall exit: %s[%d]/cpu%d: %d\n", current->comm, current->pid, smp_processor_id(), (int) regs->u_regs[UREG_G1]);
}

/*
* To debug kernel to catch accesses to certain virtual/physical addresses.
* Mode = 0 selects physical watchpoints, mode = 1 selects virtual watchpoints.
Expand Down

0 comments on commit af166d1

Please sign in to comment.