diff mbox series

selftests: bpf: remove unused variables

Message ID 20231013013536.2047-1-zhujun2@cmss.chinamobile.com (mailing list archive)
State Rejected
Delegated to: BPF
Headers show
Series selftests: bpf: remove unused variables | expand

Checks

Context Check Description
bpf/vmtest-bpf-next-PR success PR summary
bpf/vmtest-bpf-next-VM_Test-1 success Logs for ShellCheck
bpf/vmtest-bpf-next-VM_Test-4 fail Logs for build for x86_64 with gcc
bpf/vmtest-bpf-next-VM_Test-0 success Logs for ${{ matrix.test }} on ${{ matrix.arch }} with ${{ matrix.toolchain_full }}
bpf/vmtest-bpf-next-VM_Test-7 success Logs for veristat
bpf/vmtest-bpf-next-VM_Test-6 success Logs for set-matrix
bpf/vmtest-bpf-next-VM_Test-5 fail Logs for build for x86_64 with llvm-16
bpf/vmtest-bpf-next-VM_Test-3 fail Logs for build for s390x with gcc
bpf/vmtest-bpf-next-VM_Test-2 fail Logs for build for aarch64 with gcc
netdev/tree_selection success Not a local patch

Commit Message

Zhu Jun Oct. 13, 2023, 1:35 a.m. UTC
These variables are never referenced in the code, just remove them.

Signed-off-by: zhujun2 <zhujun2@cmss.chinamobile.com>
---
 tools/testing/selftests/bpf/prog_tests/atomic_bounds.c      | 1 -
 tools/testing/selftests/bpf/prog_tests/kfree_skb.c          | 2 --
 tools/testing/selftests/bpf/prog_tests/perf_branches.c      | 6 +-----
 .../testing/selftests/bpf/prog_tests/probe_read_user_str.c  | 4 ++--
 tools/testing/selftests/bpf/prog_tests/test_overhead.c      | 4 ++--
 tools/testing/selftests/bpf/prog_tests/xdp_synproxy.c       | 1 -
 6 files changed, 5 insertions(+), 13 deletions(-)

Comments

Andrii Nakryiko Oct. 13, 2023, 2:25 a.m. UTC | #1
On Thu, Oct 12, 2023 at 6:35 PM zhujun2 <zhujun2@cmss.chinamobile.com> wrote:
>
> These variables are never referenced in the code, just remove them.
>
> Signed-off-by: zhujun2 <zhujun2@cmss.chinamobile.com>
> ---

  Why do you stubbornly keep submitting the same untested and broken
patch, ignoring the feedback ([0])? Your changes don't even compile
successfully ([1]).

  [0] https://lore.kernel.org/bpf/2e4c17ac-9a61-4901-8f98-c783242eec28@iogearbox.net/
  [1] https://github.com/kernel-patches/bpf/actions/runs/6502998724/job/17662867681

>  tools/testing/selftests/bpf/prog_tests/atomic_bounds.c      | 1 -
>  tools/testing/selftests/bpf/prog_tests/kfree_skb.c          | 2 --
>  tools/testing/selftests/bpf/prog_tests/perf_branches.c      | 6 +-----
>  .../testing/selftests/bpf/prog_tests/probe_read_user_str.c  | 4 ++--
>  tools/testing/selftests/bpf/prog_tests/test_overhead.c      | 4 ++--
>  tools/testing/selftests/bpf/prog_tests/xdp_synproxy.c       | 1 -
>  6 files changed, 5 insertions(+), 13 deletions(-)
>
> diff --git a/tools/testing/selftests/bpf/prog_tests/atomic_bounds.c b/tools/testing/selftests/bpf/prog_tests/atomic_bounds.c
> index 69bd7853e..4715cde38 100644
> --- a/tools/testing/selftests/bpf/prog_tests/atomic_bounds.c
> +++ b/tools/testing/selftests/bpf/prog_tests/atomic_bounds.c
> @@ -7,7 +7,6 @@
>  void test_atomic_bounds(void)
>  {
>         struct atomic_bounds *skel;
> -       __u32 duration = 0;
>
>         skel = atomic_bounds__open_and_load();
>         if (CHECK(!skel, "skel_load", "couldn't load program\n"))
> diff --git a/tools/testing/selftests/bpf/prog_tests/kfree_skb.c b/tools/testing/selftests/bpf/prog_tests/kfree_skb.c
> index c07991544..b0992a9ed 100644
> --- a/tools/testing/selftests/bpf/prog_tests/kfree_skb.c
> +++ b/tools/testing/selftests/bpf/prog_tests/kfree_skb.c
> @@ -20,7 +20,6 @@ static void on_sample(void *ctx, int cpu, void *data, __u32 size)
>  {
>         struct meta *meta = (struct meta *)data;
>         struct ipv6_packet *pkt_v6 = data + sizeof(*meta);
> -       int duration = 0;
>
>         if (CHECK(size != 72 + sizeof(*meta), "check_size", "size %u != %zu\n",
>                   size, 72 + sizeof(*meta)))
> @@ -65,7 +64,6 @@ void serial_test_kfree_skb(void)
>         struct perf_buffer *pb = NULL;
>         int err, prog_fd;
>         bool passed = false;
> -       __u32 duration = 0;
>         const int zero = 0;
>         bool test_ok[2];
>
> diff --git a/tools/testing/selftests/bpf/prog_tests/perf_branches.c b/tools/testing/selftests/bpf/prog_tests/perf_branches.c
> index bc24f8333..0942b9891 100644
> --- a/tools/testing/selftests/bpf/prog_tests/perf_branches.c
> +++ b/tools/testing/selftests/bpf/prog_tests/perf_branches.c
> @@ -13,7 +13,6 @@ static void check_good_sample(struct test_perf_branches *skel)
>         int required_size = skel->bss->required_size_out;
>         int written_stack = skel->bss->written_stack_out;
>         int pbe_size = sizeof(struct perf_branch_entry);
> -       int duration = 0;
>
>         if (CHECK(!skel->bss->valid, "output not valid",
>                  "no valid sample from prog"))
> @@ -43,7 +42,6 @@ static void check_bad_sample(struct test_perf_branches *skel)
>         int written_global = skel->bss->written_global_out;
>         int required_size = skel->bss->required_size_out;
>         int written_stack = skel->bss->written_stack_out;
> -       int duration = 0;
>
>         if (CHECK(!skel->bss->valid, "output not valid",
>                  "no valid sample from prog"))
> @@ -61,7 +59,7 @@ static void test_perf_branches_common(int perf_fd,
>                                       void (*cb)(struct test_perf_branches *))
>  {
>         struct test_perf_branches *skel;
> -       int err, i, duration = 0;
> +       int err, i;
>         bool detached = false;
>         struct bpf_link *link;
>         volatile int j = 0;
> @@ -102,7 +100,6 @@ static void test_perf_branches_common(int perf_fd,
>  static void test_perf_branches_hw(void)
>  {
>         struct perf_event_attr attr = {0};
> -       int duration = 0;
>         int pfd;
>
>         /* create perf event */
> @@ -143,7 +140,6 @@ static void test_perf_branches_hw(void)
>  static void test_perf_branches_no_hw(void)
>  {
>         struct perf_event_attr attr = {0};
> -       int duration = 0;
>         int pfd;
>
>         /* create perf event */
> diff --git a/tools/testing/selftests/bpf/prog_tests/probe_read_user_str.c b/tools/testing/selftests/bpf/prog_tests/probe_read_user_str.c
> index e41929813..a7c6ad8d6 100644
> --- a/tools/testing/selftests/bpf/prog_tests/probe_read_user_str.c
> +++ b/tools/testing/selftests/bpf/prog_tests/probe_read_user_str.c
> @@ -9,7 +9,7 @@ static const char str3[] = "mestringblubblubblubblubblub";
>  static int test_one_str(struct test_probe_read_user_str *skel, const char *str,
>                         size_t len)
>  {
> -       int err, duration = 0;
> +       int err;
>         char buf[256];
>
>         /* Ensure bytes after string are ones */
> @@ -44,7 +44,7 @@ static int test_one_str(struct test_probe_read_user_str *skel, const char *str,
>  void test_probe_read_user_str(void)
>  {
>         struct test_probe_read_user_str *skel;
> -       int err, duration = 0;
> +       int err;
>
>         skel = test_probe_read_user_str__open_and_load();
>         if (CHECK(!skel, "test_probe_read_user_str__open_and_load",
> diff --git a/tools/testing/selftests/bpf/prog_tests/test_overhead.c b/tools/testing/selftests/bpf/prog_tests/test_overhead.c
> index f27013e38..6161009df 100644
> --- a/tools/testing/selftests/bpf/prog_tests/test_overhead.c
> +++ b/tools/testing/selftests/bpf/prog_tests/test_overhead.c
> @@ -17,7 +17,7 @@ static __u64 time_get_ns(void)
>
>  static int test_task_rename(const char *prog)
>  {
> -       int i, fd, duration = 0, err;
> +       int i, fd, err;
>         char buf[] = "test_overhead";
>         __u64 start_time;
>
> @@ -66,7 +66,7 @@ void test_test_overhead(void)
>         struct bpf_program *fentry_prog, *fexit_prog;
>         struct bpf_object *obj;
>         struct bpf_link *link;
> -       int err, duration = 0;
> +       int err;
>         char comm[16] = {};
>
>         if (CHECK_FAIL(prctl(PR_GET_NAME, comm, 0L, 0L, 0L)))
> diff --git a/tools/testing/selftests/bpf/prog_tests/xdp_synproxy.c b/tools/testing/selftests/bpf/prog_tests/xdp_synproxy.c
> index 8b50a992d..5af434353 100644
> --- a/tools/testing/selftests/bpf/prog_tests/xdp_synproxy.c
> +++ b/tools/testing/selftests/bpf/prog_tests/xdp_synproxy.c
> @@ -40,7 +40,6 @@ static bool expect_str(char *buf, size_t size, const char *str, const char *name
>  {
>         static char escbuf_expected[CMD_OUT_BUF_SIZE * 4];
>         static char escbuf_actual[CMD_OUT_BUF_SIZE * 4];
> -       static int duration = 0;
>         bool ok;
>
>         ok = size == strlen(str) && !memcmp(buf, str, size);
> --
> 2.17.1
>
>
>
>
Yafang Shao Oct. 13, 2023, 8:32 a.m. UTC | #2
On Fri, Oct 13, 2023 at 9:35 AM zhujun2 <zhujun2@cmss.chinamobile.com> wrote:
>
> These variables are never referenced in the code, just remove them.

You can't remove them because they are really referenced in the CHECK() marco.
Sending a patch without even testing a build is bad :(

>
> Signed-off-by: zhujun2 <zhujun2@cmss.chinamobile.com>
> ---
>  tools/testing/selftests/bpf/prog_tests/atomic_bounds.c      | 1 -
>  tools/testing/selftests/bpf/prog_tests/kfree_skb.c          | 2 --
>  tools/testing/selftests/bpf/prog_tests/perf_branches.c      | 6 +-----
>  .../testing/selftests/bpf/prog_tests/probe_read_user_str.c  | 4 ++--
>  tools/testing/selftests/bpf/prog_tests/test_overhead.c      | 4 ++--
>  tools/testing/selftests/bpf/prog_tests/xdp_synproxy.c       | 1 -
>  6 files changed, 5 insertions(+), 13 deletions(-)
>
> diff --git a/tools/testing/selftests/bpf/prog_tests/atomic_bounds.c b/tools/testing/selftests/bpf/prog_tests/atomic_bounds.c
> index 69bd7853e..4715cde38 100644
> --- a/tools/testing/selftests/bpf/prog_tests/atomic_bounds.c
> +++ b/tools/testing/selftests/bpf/prog_tests/atomic_bounds.c
> @@ -7,7 +7,6 @@
>  void test_atomic_bounds(void)
>  {
>         struct atomic_bounds *skel;
> -       __u32 duration = 0;
>
>         skel = atomic_bounds__open_and_load();
>         if (CHECK(!skel, "skel_load", "couldn't load program\n"))
> diff --git a/tools/testing/selftests/bpf/prog_tests/kfree_skb.c b/tools/testing/selftests/bpf/prog_tests/kfree_skb.c
> index c07991544..b0992a9ed 100644
> --- a/tools/testing/selftests/bpf/prog_tests/kfree_skb.c
> +++ b/tools/testing/selftests/bpf/prog_tests/kfree_skb.c
> @@ -20,7 +20,6 @@ static void on_sample(void *ctx, int cpu, void *data, __u32 size)
>  {
>         struct meta *meta = (struct meta *)data;
>         struct ipv6_packet *pkt_v6 = data + sizeof(*meta);
> -       int duration = 0;
>
>         if (CHECK(size != 72 + sizeof(*meta), "check_size", "size %u != %zu\n",
>                   size, 72 + sizeof(*meta)))
> @@ -65,7 +64,6 @@ void serial_test_kfree_skb(void)
>         struct perf_buffer *pb = NULL;
>         int err, prog_fd;
>         bool passed = false;
> -       __u32 duration = 0;
>         const int zero = 0;
>         bool test_ok[2];
>
> diff --git a/tools/testing/selftests/bpf/prog_tests/perf_branches.c b/tools/testing/selftests/bpf/prog_tests/perf_branches.c
> index bc24f8333..0942b9891 100644
> --- a/tools/testing/selftests/bpf/prog_tests/perf_branches.c
> +++ b/tools/testing/selftests/bpf/prog_tests/perf_branches.c
> @@ -13,7 +13,6 @@ static void check_good_sample(struct test_perf_branches *skel)
>         int required_size = skel->bss->required_size_out;
>         int written_stack = skel->bss->written_stack_out;
>         int pbe_size = sizeof(struct perf_branch_entry);
> -       int duration = 0;
>
>         if (CHECK(!skel->bss->valid, "output not valid",
>                  "no valid sample from prog"))
> @@ -43,7 +42,6 @@ static void check_bad_sample(struct test_perf_branches *skel)
>         int written_global = skel->bss->written_global_out;
>         int required_size = skel->bss->required_size_out;
>         int written_stack = skel->bss->written_stack_out;
> -       int duration = 0;
>
>         if (CHECK(!skel->bss->valid, "output not valid",
>                  "no valid sample from prog"))
> @@ -61,7 +59,7 @@ static void test_perf_branches_common(int perf_fd,
>                                       void (*cb)(struct test_perf_branches *))
>  {
>         struct test_perf_branches *skel;
> -       int err, i, duration = 0;
> +       int err, i;
>         bool detached = false;
>         struct bpf_link *link;
>         volatile int j = 0;
> @@ -102,7 +100,6 @@ static void test_perf_branches_common(int perf_fd,
>  static void test_perf_branches_hw(void)
>  {
>         struct perf_event_attr attr = {0};
> -       int duration = 0;
>         int pfd;
>
>         /* create perf event */
> @@ -143,7 +140,6 @@ static void test_perf_branches_hw(void)
>  static void test_perf_branches_no_hw(void)
>  {
>         struct perf_event_attr attr = {0};
> -       int duration = 0;
>         int pfd;
>
>         /* create perf event */
> diff --git a/tools/testing/selftests/bpf/prog_tests/probe_read_user_str.c b/tools/testing/selftests/bpf/prog_tests/probe_read_user_str.c
> index e41929813..a7c6ad8d6 100644
> --- a/tools/testing/selftests/bpf/prog_tests/probe_read_user_str.c
> +++ b/tools/testing/selftests/bpf/prog_tests/probe_read_user_str.c
> @@ -9,7 +9,7 @@ static const char str3[] = "mestringblubblubblubblubblub";
>  static int test_one_str(struct test_probe_read_user_str *skel, const char *str,
>                         size_t len)
>  {
> -       int err, duration = 0;
> +       int err;
>         char buf[256];
>
>         /* Ensure bytes after string are ones */
> @@ -44,7 +44,7 @@ static int test_one_str(struct test_probe_read_user_str *skel, const char *str,
>  void test_probe_read_user_str(void)
>  {
>         struct test_probe_read_user_str *skel;
> -       int err, duration = 0;
> +       int err;
>
>         skel = test_probe_read_user_str__open_and_load();
>         if (CHECK(!skel, "test_probe_read_user_str__open_and_load",
> diff --git a/tools/testing/selftests/bpf/prog_tests/test_overhead.c b/tools/testing/selftests/bpf/prog_tests/test_overhead.c
> index f27013e38..6161009df 100644
> --- a/tools/testing/selftests/bpf/prog_tests/test_overhead.c
> +++ b/tools/testing/selftests/bpf/prog_tests/test_overhead.c
> @@ -17,7 +17,7 @@ static __u64 time_get_ns(void)
>
>  static int test_task_rename(const char *prog)
>  {
> -       int i, fd, duration = 0, err;
> +       int i, fd, err;
>         char buf[] = "test_overhead";
>         __u64 start_time;
>
> @@ -66,7 +66,7 @@ void test_test_overhead(void)
>         struct bpf_program *fentry_prog, *fexit_prog;
>         struct bpf_object *obj;
>         struct bpf_link *link;
> -       int err, duration = 0;
> +       int err;
>         char comm[16] = {};
>
>         if (CHECK_FAIL(prctl(PR_GET_NAME, comm, 0L, 0L, 0L)))
> diff --git a/tools/testing/selftests/bpf/prog_tests/xdp_synproxy.c b/tools/testing/selftests/bpf/prog_tests/xdp_synproxy.c
> index 8b50a992d..5af434353 100644
> --- a/tools/testing/selftests/bpf/prog_tests/xdp_synproxy.c
> +++ b/tools/testing/selftests/bpf/prog_tests/xdp_synproxy.c
> @@ -40,7 +40,6 @@ static bool expect_str(char *buf, size_t size, const char *str, const char *name
>  {
>         static char escbuf_expected[CMD_OUT_BUF_SIZE * 4];
>         static char escbuf_actual[CMD_OUT_BUF_SIZE * 4];
> -       static int duration = 0;
>         bool ok;
>
>         ok = size == strlen(str) && !memcmp(buf, str, size);
> --
> 2.17.1
>
>
>
>
diff mbox series

Patch

diff --git a/tools/testing/selftests/bpf/prog_tests/atomic_bounds.c b/tools/testing/selftests/bpf/prog_tests/atomic_bounds.c
index 69bd7853e..4715cde38 100644
--- a/tools/testing/selftests/bpf/prog_tests/atomic_bounds.c
+++ b/tools/testing/selftests/bpf/prog_tests/atomic_bounds.c
@@ -7,7 +7,6 @@ 
 void test_atomic_bounds(void)
 {
 	struct atomic_bounds *skel;
-	__u32 duration = 0;
 
 	skel = atomic_bounds__open_and_load();
 	if (CHECK(!skel, "skel_load", "couldn't load program\n"))
diff --git a/tools/testing/selftests/bpf/prog_tests/kfree_skb.c b/tools/testing/selftests/bpf/prog_tests/kfree_skb.c
index c07991544..b0992a9ed 100644
--- a/tools/testing/selftests/bpf/prog_tests/kfree_skb.c
+++ b/tools/testing/selftests/bpf/prog_tests/kfree_skb.c
@@ -20,7 +20,6 @@  static void on_sample(void *ctx, int cpu, void *data, __u32 size)
 {
 	struct meta *meta = (struct meta *)data;
 	struct ipv6_packet *pkt_v6 = data + sizeof(*meta);
-	int duration = 0;
 
 	if (CHECK(size != 72 + sizeof(*meta), "check_size", "size %u != %zu\n",
 		  size, 72 + sizeof(*meta)))
@@ -65,7 +64,6 @@  void serial_test_kfree_skb(void)
 	struct perf_buffer *pb = NULL;
 	int err, prog_fd;
 	bool passed = false;
-	__u32 duration = 0;
 	const int zero = 0;
 	bool test_ok[2];
 
diff --git a/tools/testing/selftests/bpf/prog_tests/perf_branches.c b/tools/testing/selftests/bpf/prog_tests/perf_branches.c
index bc24f8333..0942b9891 100644
--- a/tools/testing/selftests/bpf/prog_tests/perf_branches.c
+++ b/tools/testing/selftests/bpf/prog_tests/perf_branches.c
@@ -13,7 +13,6 @@  static void check_good_sample(struct test_perf_branches *skel)
 	int required_size = skel->bss->required_size_out;
 	int written_stack = skel->bss->written_stack_out;
 	int pbe_size = sizeof(struct perf_branch_entry);
-	int duration = 0;
 
 	if (CHECK(!skel->bss->valid, "output not valid",
 		 "no valid sample from prog"))
@@ -43,7 +42,6 @@  static void check_bad_sample(struct test_perf_branches *skel)
 	int written_global = skel->bss->written_global_out;
 	int required_size = skel->bss->required_size_out;
 	int written_stack = skel->bss->written_stack_out;
-	int duration = 0;
 
 	if (CHECK(!skel->bss->valid, "output not valid",
 		 "no valid sample from prog"))
@@ -61,7 +59,7 @@  static void test_perf_branches_common(int perf_fd,
 				      void (*cb)(struct test_perf_branches *))
 {
 	struct test_perf_branches *skel;
-	int err, i, duration = 0;
+	int err, i;
 	bool detached = false;
 	struct bpf_link *link;
 	volatile int j = 0;
@@ -102,7 +100,6 @@  static void test_perf_branches_common(int perf_fd,
 static void test_perf_branches_hw(void)
 {
 	struct perf_event_attr attr = {0};
-	int duration = 0;
 	int pfd;
 
 	/* create perf event */
@@ -143,7 +140,6 @@  static void test_perf_branches_hw(void)
 static void test_perf_branches_no_hw(void)
 {
 	struct perf_event_attr attr = {0};
-	int duration = 0;
 	int pfd;
 
 	/* create perf event */
diff --git a/tools/testing/selftests/bpf/prog_tests/probe_read_user_str.c b/tools/testing/selftests/bpf/prog_tests/probe_read_user_str.c
index e41929813..a7c6ad8d6 100644
--- a/tools/testing/selftests/bpf/prog_tests/probe_read_user_str.c
+++ b/tools/testing/selftests/bpf/prog_tests/probe_read_user_str.c
@@ -9,7 +9,7 @@  static const char str3[] = "mestringblubblubblubblubblub";
 static int test_one_str(struct test_probe_read_user_str *skel, const char *str,
 			size_t len)
 {
-	int err, duration = 0;
+	int err;
 	char buf[256];
 
 	/* Ensure bytes after string are ones */
@@ -44,7 +44,7 @@  static int test_one_str(struct test_probe_read_user_str *skel, const char *str,
 void test_probe_read_user_str(void)
 {
 	struct test_probe_read_user_str *skel;
-	int err, duration = 0;
+	int err;
 
 	skel = test_probe_read_user_str__open_and_load();
 	if (CHECK(!skel, "test_probe_read_user_str__open_and_load",
diff --git a/tools/testing/selftests/bpf/prog_tests/test_overhead.c b/tools/testing/selftests/bpf/prog_tests/test_overhead.c
index f27013e38..6161009df 100644
--- a/tools/testing/selftests/bpf/prog_tests/test_overhead.c
+++ b/tools/testing/selftests/bpf/prog_tests/test_overhead.c
@@ -17,7 +17,7 @@  static __u64 time_get_ns(void)
 
 static int test_task_rename(const char *prog)
 {
-	int i, fd, duration = 0, err;
+	int i, fd, err;
 	char buf[] = "test_overhead";
 	__u64 start_time;
 
@@ -66,7 +66,7 @@  void test_test_overhead(void)
 	struct bpf_program *fentry_prog, *fexit_prog;
 	struct bpf_object *obj;
 	struct bpf_link *link;
-	int err, duration = 0;
+	int err;
 	char comm[16] = {};
 
 	if (CHECK_FAIL(prctl(PR_GET_NAME, comm, 0L, 0L, 0L)))
diff --git a/tools/testing/selftests/bpf/prog_tests/xdp_synproxy.c b/tools/testing/selftests/bpf/prog_tests/xdp_synproxy.c
index 8b50a992d..5af434353 100644
--- a/tools/testing/selftests/bpf/prog_tests/xdp_synproxy.c
+++ b/tools/testing/selftests/bpf/prog_tests/xdp_synproxy.c
@@ -40,7 +40,6 @@  static bool expect_str(char *buf, size_t size, const char *str, const char *name
 {
 	static char escbuf_expected[CMD_OUT_BUF_SIZE * 4];
 	static char escbuf_actual[CMD_OUT_BUF_SIZE * 4];
-	static int duration = 0;
 	bool ok;
 
 	ok = size == strlen(str) && !memcmp(buf, str, size);