Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
linux-seco-imx
Manage
Activity
Members
Labels
Plan
Issues
0
Issue boards
Milestones
Iterations
Jira
Code
Merge requests
12
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Locked files
Deploy
Releases
Package Registry
Model registry
Operate
Terraform modules
Analyze
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Clea OS
bsp
nxp
linux-seco-imx
Commits
af166d15
Commit
af166d15
authored
19 years ago
by
David S. Miller
Browse files
Options
Downloads
Patches
Plain Diff
[SPARC64]: Kill ancient and unused SYSCALL_TRACING debugging code.
Signed-off-by:
David S. Miller
<
davem@davemloft.net
>
parent
d369ddd2
Loading
Loading
No related merge requests found
Changes
2
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
arch/sparc64/kernel/entry.S
+0
-18
0 additions, 18 deletions
arch/sparc64/kernel/entry.S
arch/sparc64/mm/fault.c
+0
-16
0 additions, 16 deletions
arch/sparc64/mm/fault.c
with
0 additions
and
34 deletions
arch/sparc64/kernel/entry.S
+
0
−
18
View file @
af166d15
...
@@ -22,8 +22,6 @@
...
@@ -22,8 +22,6 @@
#include <asm/estate.h>
#include <asm/estate.h>
#include <asm/auxio.h>
#include <asm/auxio.h>
/*
#
define
SYSCALL_TRACING
1
*/
#define curptr g6
#define curptr g6
#define NR_SYSCALLS 284 /* Each OS is different... */
#define NR_SYSCALLS 284 /* Each OS is different... */
...
@@ -1671,11 +1669,6 @@ linux_sparc_syscall32:
...
@@ -1671,11 +1669,6 @@ linux_sparc_syscall32:
bgeu
,
pn
%
xcc
,
linux_sparc_ni_syscall
!
CTI
bgeu
,
pn
%
xcc
,
linux_sparc_ni_syscall
!
CTI
srl
%
i0
,
0
,
%
o0
!
IEU0
srl
%
i0
,
0
,
%
o0
!
IEU0
sll
%
g1
,
2
,
%
l4
!
IEU0
Group
sll
%
g1
,
2
,
%
l4
!
IEU0
Group
#ifdef SYSCALL_TRACING
call
syscall_trace_entry
add
%
sp
,
PTREGS_OFF
,
%
o0
srl
%
i0
,
0
,
%
o0
#endif
srl
%
i4
,
0
,
%
o4
!
IEU1
srl
%
i4
,
0
,
%
o4
!
IEU1
lduw
[%
l7
+
%
l4
],
%
l7
!
Load
lduw
[%
l7
+
%
l4
],
%
l7
!
Load
srl
%
i1
,
0
,
%
o1
!
IEU0
Group
srl
%
i1
,
0
,
%
o1
!
IEU0
Group
...
@@ -1699,11 +1692,6 @@ linux_sparc_syscall:
...
@@ -1699,11 +1692,6 @@ linux_sparc_syscall:
bgeu
,
pn
%
xcc
,
linux_sparc_ni_syscall
!
CTI
bgeu
,
pn
%
xcc
,
linux_sparc_ni_syscall
!
CTI
mov
%
i0
,
%
o0
!
IEU0
mov
%
i0
,
%
o0
!
IEU0
sll
%
g1
,
2
,
%
l4
!
IEU0
Group
sll
%
g1
,
2
,
%
l4
!
IEU0
Group
#ifdef SYSCALL_TRACING
call
syscall_trace_entry
add
%
sp
,
PTREGS_OFF
,
%
o0
mov
%
i0
,
%
o0
#endif
mov
%
i1
,
%
o1
!
IEU1
mov
%
i1
,
%
o1
!
IEU1
lduw
[%
l7
+
%
l4
],
%
l7
!
Load
lduw
[%
l7
+
%
l4
],
%
l7
!
Load
4
:
mov
%
i2
,
%
o2
!
IEU0
Group
4
:
mov
%
i2
,
%
o2
!
IEU0
Group
...
@@ -1720,12 +1708,6 @@ linux_sparc_syscall:
...
@@ -1720,12 +1708,6 @@ linux_sparc_syscall:
3
:
stx
%
o0
,
[%
sp
+
PTREGS_OFF
+
PT_V9_I0
]
3
:
stx
%
o0
,
[%
sp
+
PTREGS_OFF
+
PT_V9_I0
]
ret_sys_call
:
ret_sys_call
:
#ifdef SYSCALL_TRACING
mov
%
o0
,
%
o1
call
syscall_trace_exit
add
%
sp
,
PTREGS_OFF
,
%
o0
mov
%
o1
,
%
o0
#endif
ldx
[%
sp
+
PTREGS_OFF
+
PT_V9_TSTATE
],
%
g3
ldx
[%
sp
+
PTREGS_OFF
+
PT_V9_TSTATE
],
%
g3
ldx
[%
sp
+
PTREGS_OFF
+
PT_V9_TNPC
],
%
l1
!
pc
=
npc
ldx
[%
sp
+
PTREGS_OFF
+
PT_V9_TNPC
],
%
l1
!
pc
=
npc
sra
%
o0
,
0
,
%
o0
sra
%
o0
,
0
,
%
o0
...
...
This diff is collapsed.
Click to expand it.
arch/sparc64/mm/fault.c
+
0
−
16
View file @
af166d15
...
@@ -33,22 +33,6 @@
...
@@ -33,22 +33,6 @@
extern
struct
sparc_phys_banks
sp_banks
[
SPARC_PHYS_BANKS
];
extern
struct
sparc_phys_banks
sp_banks
[
SPARC_PHYS_BANKS
];
/*
* To debug kernel during syscall entry.
*/
void
syscall_trace_entry
(
struct
pt_regs
*
regs
)
{
printk
(
"scall entry: %s[%d]/cpu%d: %d
\n
"
,
current
->
comm
,
current
->
pid
,
smp_processor_id
(),
(
int
)
regs
->
u_regs
[
UREG_G1
]);
}
/*
* To debug kernel during syscall exit.
*/
void
syscall_trace_exit
(
struct
pt_regs
*
regs
)
{
printk
(
"scall exit: %s[%d]/cpu%d: %d
\n
"
,
current
->
comm
,
current
->
pid
,
smp_processor_id
(),
(
int
)
regs
->
u_regs
[
UREG_G1
]);
}
/*
/*
* To debug kernel to catch accesses to certain virtual/physical addresses.
* To debug kernel to catch accesses to certain virtual/physical addresses.
* Mode = 0 selects physical watchpoints, mode = 1 selects virtual watchpoints.
* Mode = 0 selects physical watchpoints, mode = 1 selects virtual watchpoints.
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment