From 61410dbcc8d6521710702cf8ebc873058e1da0a4 Mon Sep 17 00:00:00 2001 From: Chris Johns Date: Thu, 29 Nov 2018 08:03:29 +1100 Subject: tester/coverage: Remove warnings in covoar on Windows. --- tester/covoar/ObjdumpProcessor.cc | 8 -------- 1 file changed, 8 deletions(-) (limited to 'tester/covoar/ObjdumpProcessor.cc') diff --git a/tester/covoar/ObjdumpProcessor.cc b/tester/covoar/ObjdumpProcessor.cc index b4c60c6..05507de 100644 --- a/tester/covoar/ObjdumpProcessor.cc +++ b/tester/covoar/ObjdumpProcessor.cc @@ -269,14 +269,12 @@ namespace Coverage { ) { std::string currentSymbol = ""; - uint32_t endAddress; uint32_t instructionOffset; int items; int found; objdumpLine_t lineInfo; uint32_t offset; bool processSymbol = false; - uint32_t startAddress = 0; char symbol[ MAX_LINE_LENGTH ]; char terminator1; char terminatorOne; @@ -348,8 +346,6 @@ namespace Coverage { // If all items found, we are at the beginning of a symbol's objdump. if ((items == 3) && (terminator1 == ':')) { - endAddress = executableInformation->getLoadAddress() + offset - 1; - // If we are currently processing a symbol, finalize it. if (processSymbol) { finalizeSymbol( @@ -360,14 +356,12 @@ namespace Coverage { } // Start processing of a new symbol. - startAddress = 0; currentSymbol = ""; processSymbol = false; theInstructions.clear(); // See if the new symbol is one that we care about. if (SymbolsToAnalyze->isDesired( symbol )) { - startAddress = executableInformation->getLoadAddress() + offset; currentSymbol = symbol; processSymbol = true; theInstructions.push_back( lineInfo ); @@ -379,8 +373,6 @@ namespace Coverage { && (jumpTableID.find( "+0x" ) != std::string::npos) && processSymbol ) { - endAddress = executableInformation->getLoadAddress() + offset - 1; - // If we are currently processing a symbol, finalize it. if ( processSymbol ) { finalizeSymbol( -- cgit v1.2.3