@@ -224,8 +224,6 @@ static int read_object_code(u64 addr, size_t len, u8 cpumode,
224
224
unsigned char buf2 [BUFSZ ];
225
225
size_t ret_len ;
226
226
u64 objdump_addr ;
227
- const char * objdump_name ;
228
- char decomp_name [KMOD_DECOMP_LEN ];
229
227
int ret ;
230
228
231
229
pr_debug ("Reading object code for memory address: %#" PRIx64 "\n" , addr );
@@ -286,25 +284,9 @@ static int read_object_code(u64 addr, size_t len, u8 cpumode,
286
284
state -> done [state -> done_cnt ++ ] = al .map -> start ;
287
285
}
288
286
289
- objdump_name = al .map -> dso -> long_name ;
290
- if (dso__needs_decompress (al .map -> dso )) {
291
- if (dso__decompress_kmodule_path (al .map -> dso , objdump_name ,
292
- decomp_name ,
293
- sizeof (decomp_name )) < 0 ) {
294
- pr_debug ("decompression failed\n" );
295
- return -1 ;
296
- }
297
-
298
- objdump_name = decomp_name ;
299
- }
300
-
301
287
/* Read the object code using objdump */
302
288
objdump_addr = map__rip_2objdump (al .map , al .addr );
303
- ret = read_via_objdump (objdump_name , objdump_addr , buf2 , len );
304
-
305
- if (dso__needs_decompress (al .map -> dso ))
306
- unlink (objdump_name );
307
-
289
+ ret = read_via_objdump (al .map -> dso -> long_name , objdump_addr , buf2 , len );
308
290
if (ret > 0 ) {
309
291
/*
310
292
* The kernel maps are inaccurate - assume objdump is right in
0 commit comments