[SPARC64]: Kill ancient and unused SYSCALL_TRACING debugging code.

Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
David S. Miller
2005-07-10 15:56:40 -07:00
parent d369ddd2fc
commit af166d15c3
2 changed files with 0 additions and 34 deletions

View File

@@ -33,22 +33,6 @@
extern struct sparc_phys_banks sp_banks[SPARC_PHYS_BANKS];
/*
* To debug kernel during syscall entry.
*/
void syscall_trace_entry(struct pt_regs *regs)
{
printk("scall entry: %s[%d]/cpu%d: %d\n", current->comm, current->pid, smp_processor_id(), (int) regs->u_regs[UREG_G1]);
}
/*
* To debug kernel during syscall exit.
*/
void syscall_trace_exit(struct pt_regs *regs)
{
printk("scall exit: %s[%d]/cpu%d: %d\n", current->comm, current->pid, smp_processor_id(), (int) regs->u_regs[UREG_G1]);
}
/*
* To debug kernel to catch accesses to certain virtual/physical addresses.
* Mode = 0 selects physical watchpoints, mode = 1 selects virtual watchpoints.