@@ -684,8 +684,6 @@ search_linux_map_for_section(proc_handle_t *handle, const char* secname, const c
684
684
}
685
685
686
686
uintptr_t retval = 0 ;
687
- int lines_processed = 0 ;
688
- int matches_found = 0 ;
689
687
690
688
while (fgets (line + linelen , linesz - linelen , maps_file ) != NULL ) {
691
689
linelen = strlen (line );
@@ -710,7 +708,6 @@ search_linux_map_for_section(proc_handle_t *handle, const char* secname, const c
710
708
line [linelen - 1 ] = '\0' ;
711
709
// and prepare to read the next line into the start of the buffer.
712
710
linelen = 0 ;
713
- lines_processed ++ ;
714
711
715
712
unsigned long start = 0 ;
716
713
unsigned long path_pos = 0 ;
@@ -731,7 +728,6 @@ search_linux_map_for_section(proc_handle_t *handle, const char* secname, const c
731
728
}
732
729
733
730
if (strstr (filename , substr )) {
734
- matches_found ++ ;
735
731
retval = search_elf_file_for_section (handle , secname , start , path );
736
732
if (retval ) {
737
733
break ;
@@ -850,15 +846,10 @@ search_windows_map_for_section(proc_handle_t* handle, const char* secname, const
850
846
MODULEENTRY32W moduleEntry ;
851
847
moduleEntry .dwSize = sizeof (moduleEntry );
852
848
void * runtime_addr = NULL ;
853
- int modules_examined = 0 ;
854
- int matches_found = 0 ;
855
849
856
850
for (BOOL hasModule = Module32FirstW (hProcSnap , & moduleEntry ); hasModule ; hasModule = Module32NextW (hProcSnap , & moduleEntry )) {
857
- modules_examined ++ ;
858
-
859
851
// Look for either python executable or DLL
860
852
if (wcsstr (moduleEntry .szModule , substr )) {
861
- matches_found ++ ;
862
853
runtime_addr = analyze_pe (moduleEntry .szExePath , moduleEntry .modBaseAddr , secname );
863
854
if (runtime_addr != NULL ) {
864
855
break ;
0 commit comments