From patchwork Mon Jul 11 15:26:44 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Christophe Milard X-Patchwork-Id: 71736 Delivered-To: patch@linaro.org Received: by 10.140.29.52 with SMTP id a49csp12711qga; Mon, 11 Jul 2016 08:29:20 -0700 (PDT) X-Received: by 10.107.15.157 with SMTP id 29mr1520863iop.123.1468250960853; Mon, 11 Jul 2016 08:29:20 -0700 (PDT) Return-Path: Received: from lists.linaro.org (lists.linaro.org. [54.225.227.206]) by mx.google.com with ESMTP id n2si2396124ioe.105.2016.07.11.08.29.20; Mon, 11 Jul 2016 08:29:20 -0700 (PDT) Received-SPF: pass (google.com: domain of lng-odp-bounces@lists.linaro.org designates 54.225.227.206 as permitted sender) client-ip=54.225.227.206; Authentication-Results: mx.google.com; spf=pass (google.com: domain of lng-odp-bounces@lists.linaro.org designates 54.225.227.206 as permitted sender) smtp.mailfrom=lng-odp-bounces@lists.linaro.org; dmarc=pass (p=NONE dis=NONE) header.from=linaro.org Received: by lists.linaro.org (Postfix, from userid 109) id 607D868792; Mon, 11 Jul 2016 15:29:20 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on ip-10-142-244-252 X-Spam-Level: X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00, RCVD_IN_DNSWL_LOW, RCVD_IN_MSPIKE_H3, RCVD_IN_MSPIKE_WL, URIBL_BLOCKED autolearn=disabled version=3.4.0 Received: from [127.0.0.1] (localhost [127.0.0.1]) by lists.linaro.org (Postfix) with ESMTP id 6BA1067463; Mon, 11 Jul 2016 15:27:24 +0000 (UTC) X-Original-To: lng-odp@lists.linaro.org Delivered-To: lng-odp@lists.linaro.org Received: by lists.linaro.org (Postfix, from userid 109) id 5876161950; Mon, 11 Jul 2016 15:27:20 +0000 (UTC) Received: from mail-lf0-f51.google.com (mail-lf0-f51.google.com [209.85.215.51]) by lists.linaro.org (Postfix) with ESMTPS id 9312C61710 for ; Mon, 11 Jul 2016 15:27:18 +0000 (UTC) Received: by mail-lf0-f51.google.com with SMTP id h129so76346263lfh.1 for ; Mon, 11 Jul 2016 08:27:18 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=ThsfQyKdeygBrrfieey3hNqipw+rRv2KA/Br0jjy5JY=; b=Qx6C1LX7mXYunKLXdppPB0QTLpnfs5smYFNQfj3r8dOYq6xf9Tnc2slkJFuRExLidL +fpWTdqFDOSAiQRqqN6pICV+573zxEaDum2rB84q9ybMqVsQG6JDnOBXP2MpFl3pg+/h g9ler1/q0MQ+3y6g4GaS+boGpIolH/aITXDoaWm+PIWunOadhUAMSDovZGyahNbb9rM7 e9cvo07pc0+jpmkSuwbIh8Zy/bNXRsuBDsQE8w9UqQ/HlRnZkqidBYGBD1YsTK3AfF+O H18yCTptw6KtJtc0lNJ/7loWh/eoxX8c/awTKKqRSMAYfmA8VHp6/4ygPxXgZGFEyIuu T36g== X-Gm-Message-State: ALyK8tIBySLB0YGpB4brkvpXl2XmnNnH4WGJxq6/BTVLEwOxe/X/mj3VErtKkVCczczp3aBEacg= X-Received: by 10.25.82.10 with SMTP id g10mr6377623lfb.141.1468250837330; Mon, 11 Jul 2016 08:27:17 -0700 (PDT) Received: from localhost.localdomain (c-83-233-90-46.cust.bredband2.com. [83.233.90.46]) by smtp.gmail.com with ESMTPSA id r76sm4944914lfe.1.2016.07.11.08.27.16 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Mon, 11 Jul 2016 08:27:16 -0700 (PDT) From: Christophe Milard To: mike.holmes@linaro.org, yi.he@linaro.org, lng-odp@lists.linaro.org Date: Mon, 11 Jul 2016 17:26:44 +0200 Message-Id: <1468250807-23566-2-git-send-email-christophe.milard@linaro.org> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1468250807-23566-1-git-send-email-christophe.milard@linaro.org> References: <1468250807-23566-1-git-send-email-christophe.milard@linaro.org> X-Topics: patch Subject: [lng-odp] [PATCH 1/4] validation: diverse cosmetic fixes for checkpatch X-BeenThere: lng-odp@lists.linaro.org X-Mailman-Version: 2.1.16 Precedence: list List-Id: "The OpenDataPlane \(ODP\) List" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: lng-odp-bounces@lists.linaro.org Sender: "lng-odp" To reduce the number of issues picked up by check-odp when moving the files in next patch Signed-off-by: Christophe Milard --- .../classification/odp_classification_test_pmr.c | 1 - test/validation/crypto/odp_crypto_test_inp.c | 32 ++++----- test/validation/crypto/test_vectors.h | 2 +- test/validation/hash/hash.c | 1 - test/validation/pktio/pktio.c | 2 - test/validation/queue/queue.c | 7 +- test/validation/scheduler/scheduler.c | 13 ++-- test/validation/timer/timer.c | 75 +++++++++++++--------- 8 files changed, 72 insertions(+), 61 deletions(-) -- 2.7.4 diff --git a/test/validation/classification/odp_classification_test_pmr.c b/test/validation/classification/odp_classification_test_pmr.c index 7c7d07e..c8bbf50 100644 --- a/test/validation/classification/odp_classification_test_pmr.c +++ b/test/validation/classification/odp_classification_test_pmr.c @@ -70,7 +70,6 @@ void configure_default_cos(odp_pktio_t pktio, odp_cos_t *cos, *cos = default_cos; *queue = default_queue; *pool = default_pool; - return; } int classification_suite_pmr_term(void) diff --git a/test/validation/crypto/odp_crypto_test_inp.c b/test/validation/crypto/odp_crypto_test_inp.c index 0c5b110..4ac4a07 100644 --- a/test/validation/crypto/odp_crypto_test_inp.c +++ b/test/validation/crypto/odp_crypto_test_inp.c @@ -53,6 +53,10 @@ static void alg_test(odp_crypto_op_t op, odp_event_t event; odp_crypto_compl_t compl_event; odp_crypto_op_result_t result; + odp_crypto_session_params_t ses_params; + odp_crypto_op_params_t op_params; + uint8_t *data_addr; + int data_off; rc = odp_crypto_capability(&capability); CU_ASSERT(!rc); @@ -100,7 +104,6 @@ static void alg_test(odp_crypto_op_t op, CU_ASSERT(!rc); /* Create a crypto session */ - odp_crypto_session_params_t ses_params; memset(&ses_params, 0, sizeof(ses_params)); ses_params.op = op; ses_params.auth_cipher_text = false; @@ -123,12 +126,11 @@ static void alg_test(odp_crypto_op_t op, odp_packet_t pkt = odp_packet_alloc(suite_context.pool, plaintext_len + digest_len); CU_ASSERT(pkt != ODP_PACKET_INVALID); - uint8_t *data_addr = odp_packet_data(pkt); + data_addr = odp_packet_data(pkt); memcpy(data_addr, plaintext, plaintext_len); - int data_off = 0; + data_off = 0; /* Prepare input/output params */ - odp_crypto_op_params_t op_params; memset(&op_params, 0, sizeof(op_params)); op_params.session = session; op_params.pkt = pkt; @@ -199,10 +201,10 @@ void crypto_test_enc_alg_3des_cbc(void) odp_crypto_key_t cipher_key = { .data = NULL, .length = 0 }, auth_key = { .data = NULL, .length = 0 }; odp_crypto_iv_t iv; - unsigned int test_vec_num = (sizeof(tdes_cbc_reference_length)/ + unsigned int test_vec_num = (sizeof(tdes_cbc_reference_length) / sizeof(tdes_cbc_reference_length[0])); - unsigned int i; + for (i = 0; i < test_vec_num; i++) { cipher_key.data = tdes_cbc_reference_key[i]; cipher_key.length = sizeof(tdes_cbc_reference_key[i]); @@ -232,10 +234,10 @@ void crypto_test_enc_alg_3des_cbc_ovr_iv(void) odp_crypto_key_t cipher_key = { .data = NULL, .length = 0 }, auth_key = { .data = NULL, .length = 0 }; odp_crypto_iv_t iv = { .data = NULL, .length = TDES_CBC_IV_LEN }; - unsigned int test_vec_num = (sizeof(tdes_cbc_reference_length)/ + unsigned int test_vec_num = (sizeof(tdes_cbc_reference_length) / sizeof(tdes_cbc_reference_length[0])); - unsigned int i; + for (i = 0; i < test_vec_num; i++) { cipher_key.data = tdes_cbc_reference_key[i]; cipher_key.length = sizeof(tdes_cbc_reference_key[i]); @@ -255,7 +257,6 @@ void crypto_test_enc_alg_3des_cbc_ovr_iv(void) } } - /* This test verifies the correctness of decode (ciphertext -> plaintext) * operation for 3DES_CBC algorithm. IV for the operation is the session IV * In addition the test verifies if the implementation can use the @@ -266,10 +267,10 @@ void crypto_test_dec_alg_3des_cbc(void) odp_crypto_key_t cipher_key = { .data = NULL, .length = 0 }, auth_key = { .data = NULL, .length = 0 }; odp_crypto_iv_t iv = { .data = NULL, .length = 0 }; - unsigned int test_vec_num = (sizeof(tdes_cbc_reference_length)/ + unsigned int test_vec_num = (sizeof(tdes_cbc_reference_length) / sizeof(tdes_cbc_reference_length[0])); - unsigned int i; + for (i = 0; i < test_vec_num; i++) { cipher_key.data = tdes_cbc_reference_key[i]; cipher_key.length = sizeof(tdes_cbc_reference_key[i]); @@ -301,10 +302,10 @@ void crypto_test_dec_alg_3des_cbc_ovr_iv(void) odp_crypto_key_t cipher_key = { .data = NULL, .length = 0 }, auth_key = { .data = NULL, .length = 0 }; odp_crypto_iv_t iv = { .data = NULL, .length = TDES_CBC_IV_LEN }; - unsigned int test_vec_num = (sizeof(tdes_cbc_reference_length)/ + unsigned int test_vec_num = (sizeof(tdes_cbc_reference_length) / sizeof(tdes_cbc_reference_length[0])); - unsigned int i; + for (i = 0; i < test_vec_num; i++) { cipher_key.data = tdes_cbc_reference_key[i]; cipher_key.length = sizeof(tdes_cbc_reference_key[i]); @@ -607,7 +608,6 @@ void crypto_test_dec_alg_aes128_cbc_ovr_iv(void) } } - /* This test verifies the correctness of HMAC_MD5 digest operation. * The output check length is truncated to 12 bytes (96 bits) as * returned by the crypto operation API call. @@ -621,10 +621,10 @@ void crypto_test_alg_hmac_md5(void) auth_key = { .data = NULL, .length = 0 }; odp_crypto_iv_t iv = { .data = NULL, .length = 0 }; - unsigned int test_vec_num = (sizeof(hmac_md5_reference_length)/ + unsigned int test_vec_num = (sizeof(hmac_md5_reference_length) / sizeof(hmac_md5_reference_length[0])); - unsigned int i; + for (i = 0; i < test_vec_num; i++) { auth_key.data = hmac_md5_reference_key[i]; auth_key.length = sizeof(hmac_md5_reference_key[i]); diff --git a/test/validation/crypto/test_vectors.h b/test/validation/crypto/test_vectors.h index 1b760a2..da4610f 100644 --- a/test/validation/crypto/test_vectors.h +++ b/test/validation/crypto/test_vectors.h @@ -266,7 +266,7 @@ aes128_gcm_reference_ciphertext[][AES128_GCM_MAX_DATA_LEN] = { static uint8_t hmac_md5_reference_key[][HMAC_MD5_KEY_LEN] = { { 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, - 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b } , + 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b }, /* "Jefe" */ { 0x4a, 0x65, 0x66, 0x65 }, diff --git a/test/validation/hash/hash.c b/test/validation/hash/hash.c index feaa6ae..b353fce 100644 --- a/test/validation/hash/hash.c +++ b/test/validation/hash/hash.c @@ -51,5 +51,4 @@ int hash_main(int argc, char *argv[]) ret = odp_cunit_run(); return ret; - } diff --git a/test/validation/pktio/pktio.c b/test/validation/pktio/pktio.c index d53a419..a6a18c3 100644 --- a/test/validation/pktio/pktio.c +++ b/test/validation/pktio/pktio.c @@ -1547,7 +1547,6 @@ void pktio_test_start_stop(void) /* Test Rx on a stopped interface. Only works if there are 2 */ if (num_ifaces > 1) { - alloc = create_packets(tx_pkt, pkt_seq, 1000, pktio[0], pktio[1]); @@ -1591,7 +1590,6 @@ void pktio_test_start_stop(void) } } - if (num_ifaces > 1) pktio_in = pktio[1]; else diff --git a/test/validation/queue/queue.c b/test/validation/queue/queue.c index 96941f4..dc3a977 100644 --- a/test/validation/queue/queue.c +++ b/test/validation/queue/queue.c @@ -148,6 +148,7 @@ void queue_test_param(void) int nr_deq_entries = 0; int max_iteration = CONFIG_MAX_ITERATION; odp_queue_param_t qparams; + odp_buffer_t enbuf; /* Schedule type queue */ odp_queue_param_init(&qparams); @@ -197,7 +198,7 @@ void queue_test_param(void) } for (i = 0; i < MAX_BUFFER_QUEUE; i++) { - odp_buffer_t buf = odp_buffer_alloc(msg_pool); + buf = odp_buffer_alloc(msg_pool); enev[i] = odp_buffer_to_event(buf); } @@ -223,7 +224,7 @@ void queue_test_param(void) } while (nr_deq_entries < MAX_BUFFER_QUEUE); for (i = 0; i < MAX_BUFFER_QUEUE; i++) { - odp_buffer_t enbuf = odp_buffer_from_event(enev[i]); + enbuf = odp_buffer_from_event(enev[i]); CU_ASSERT(enev[i] == deev[i]); odp_buffer_free(enbuf); } @@ -283,7 +284,7 @@ void queue_test_info(void) CU_ASSERT(info.param.sched.group == odp_queue_sched_group(q_order)); ret = odp_queue_lock_count(q_order); CU_ASSERT(ret >= 0); - lock_count = (unsigned) ret; + lock_count = (unsigned)ret; CU_ASSERT(info.param.sched.lock_count == lock_count); CU_ASSERT(odp_queue_destroy(q_plain) == 0); diff --git a/test/validation/scheduler/scheduler.c b/test/validation/scheduler/scheduler.c index 316370d..919cfb6 100644 --- a/test/validation/scheduler/scheduler.c +++ b/test/validation/scheduler/scheduler.c @@ -676,6 +676,9 @@ static int schedule_common_(void *arg) odp_pool_t pool; int locked; int num; + odp_event_t ev; + odp_buffer_t buf, buf_cpy; + odp_queue_t from; globals = args->globals; sync = args->sync; @@ -687,9 +690,7 @@ static int schedule_common_(void *arg) odp_barrier_wait(&globals->barrier); while (1) { - odp_event_t ev; - odp_buffer_t buf, buf_cpy; - odp_queue_t from = ODP_QUEUE_INVALID; + from = ODP_QUEUE_INVALID; num = 0; odp_ticketlock_lock(&globals->lock); @@ -902,6 +903,8 @@ static void fill_queues(thread_args_t *args) test_globals_t *globals; char name[32]; int ret; + odp_buffer_t buf; + odp_event_t ev; globals = args->globals; sync = args->sync; @@ -937,8 +940,6 @@ static void fill_queues(thread_args_t *args) CU_ASSERT_FATAL(queue != ODP_QUEUE_INVALID); for (k = 0; k < args->num_bufs; k++) { - odp_buffer_t buf; - odp_event_t ev; buf = odp_buffer_alloc(pool); CU_ASSERT_FATAL(buf != ODP_BUFFER_INVALID); ev = odp_buffer_to_event(buf); @@ -1332,6 +1333,7 @@ static int create_queues(void) odp_buffer_t queue_ctx_buf; queue_context *qctx, *pqctx; uint32_t ndx; + odp_queue_param_t p; if (odp_queue_capability(&capa) < 0) { printf("Queue capability query failed\n"); @@ -1359,7 +1361,6 @@ static int create_queues(void) } for (i = 0; i < prios; i++) { - odp_queue_param_t p; odp_queue_param_init(&p); p.type = ODP_QUEUE_TYPE_SCHED; p.sched.prio = i; diff --git a/test/validation/timer/timer.c b/test/validation/timer/timer.c index 33eb478..0007639 100644 --- a/test/validation/timer/timer.c +++ b/test/validation/timer/timer.c @@ -251,7 +251,8 @@ static void handle_tmo(odp_event_t ev, bool stale, uint64_t prev_tick) CU_FAIL("Wrong status (stale) for fresh timeout"); /* Fresh timeout => local timer must have matching tick */ if (ttp && ttp->tick != tick) { - LOG_DBG("Wrong tick: expected %" PRIu64 " actual %" PRIu64 "\n", + LOG_DBG("Wrong tick: expected %" PRIu64 + " actual %" PRIu64 "\n", ttp->tick, tick); CU_FAIL("odp_timeout_tick() wrong tick"); } @@ -259,7 +260,8 @@ static void handle_tmo(odp_event_t ev, bool stale, uint64_t prev_tick) if (tick > odp_timer_current_tick(tp)) CU_FAIL("Timeout delivered early"); if (tick < prev_tick) { - LOG_DBG("Too late tick: %" PRIu64 " prev_tick %" PRIu64"\n", + LOG_DBG("Too late tick: %" PRIu64 + " prev_tick %" PRIu64"\n", tick, prev_tick); /* We don't report late timeouts using CU_FAIL */ odp_atomic_inc_u32(&ndelivtoolate); @@ -281,12 +283,26 @@ static int worker_entrypoint(void *arg TEST_UNUSED) uint32_t i, allocated; unsigned seed = thr; int rc; + odp_queue_t queue; + struct test_timer *tt; + uint32_t nset; + uint64_t tck; + uint32_t nrcv; + uint32_t nreset; + uint32_t ncancel; + uint32_t ntoolate; + uint32_t ms; + uint64_t prev_tick; + odp_event_t ev; + struct timespec ts; + uint32_t nstale; + odp_timer_set_t timer_rc; - odp_queue_t queue = odp_queue_create("timer_queue", NULL); + queue = odp_queue_create("timer_queue", NULL); if (queue == ODP_QUEUE_INVALID) CU_FAIL_FATAL("Queue create failed"); - struct test_timer *tt = malloc(sizeof(struct test_timer) * NTIMERS); + tt = malloc(sizeof(struct test_timer) * NTIMERS); if (!tt) CU_FAIL_FATAL("malloc failed"); @@ -316,15 +332,13 @@ static int worker_entrypoint(void *arg TEST_UNUSED) odp_barrier_wait(&test_barrier); /* Initial set all timers with a random expiration time */ - uint32_t nset = 0; + nset = 0; for (i = 0; i < allocated; i++) { - uint64_t tck = odp_timer_current_tick(tp) + 1 + - odp_timer_ns_to_tick(tp, - (rand_r(&seed) % RANGE_MS) - * 1000000ULL); - odp_timer_set_t rc; - rc = odp_timer_set_abs(tt[i].tim, tck, &tt[i].ev); - if (rc != ODP_TIMER_SUCCESS) { + tck = odp_timer_current_tick(tp) + 1 + + odp_timer_ns_to_tick(tp, (rand_r(&seed) % RANGE_MS) + * 1000000ULL); + timer_rc = odp_timer_set_abs(tt[i].tim, tck, &tt[i].ev); + if (timer_rc != ODP_TIMER_SUCCESS) { CU_FAIL("Failed to set timer"); } else { tt[i].tick = tck; @@ -333,15 +347,13 @@ static int worker_entrypoint(void *arg TEST_UNUSED) } /* Step through wall time, 1ms at a time and check for expired timers */ - uint32_t nrcv = 0; - uint32_t nreset = 0; - uint32_t ncancel = 0; - uint32_t ntoolate = 0; - uint32_t ms; - uint64_t prev_tick = odp_timer_current_tick(tp); + nrcv = 0; + nreset = 0; + ncancel = 0; + ntoolate = 0; + prev_tick = odp_timer_current_tick(tp); for (ms = 0; ms < 7 * RANGE_MS / 10 && allocated > 0; ms++) { - odp_event_t ev; while ((ev = odp_queue_deq(queue)) != ODP_EVENT_INVALID) { /* Subtract one from prev_tick to allow for timeouts * to be delivered a tick late */ @@ -388,7 +400,6 @@ static int worker_entrypoint(void *arg TEST_UNUSED) tt[i].tick = cur_tick + tck; } } - struct timespec ts; ts.tv_sec = 0; ts.tv_nsec = 1000000; /* 1ms */ if (nanosleep(&ts, NULL) < 0) @@ -396,7 +407,7 @@ static int worker_entrypoint(void *arg TEST_UNUSED) } /* Cancel and free all timers */ - uint32_t nstale = 0; + nstale = 0; for (i = 0; i < allocated; i++) { (void)odp_timer_cancel(tt[i].tim, &tt[i].ev); tt[i].tick = TICK_INVALID; @@ -412,22 +423,22 @@ static int worker_entrypoint(void *arg TEST_UNUSED) LOG_DBG("Thread %u: %" PRIu32 " timers reset/cancelled too late\n", thr, ntoolate); LOG_DBG("Thread %u: %" PRIu32 " timeouts received\n", thr, nrcv); - LOG_DBG("Thread %u: %" PRIu32 " stale timeout(s) after odp_timer_free()\n", + LOG_DBG("Thread %u: %" PRIu32 + " stale timeout(s) after odp_timer_free()\n", thr, nstale); /* Delay some more to ensure timeouts for expired timers can be * received. Can not use busy loop here to make background timer * thread finish their work. */ - struct timespec ts; ts.tv_sec = 0; ts.tv_nsec = (3 * RANGE_MS / 10 + 50) * ODP_TIME_MSEC_IN_NS; if (nanosleep(&ts, NULL) < 0) CU_FAIL_FATAL("nanosleep failed"); while (nstale != 0) { - odp_event_t ev = odp_queue_deq(queue); + ev = odp_queue_deq(queue); if (ev != ODP_EVENT_INVALID) { - handle_tmo(ev, true, 0/*Dont' care for stale tmo's*/); + handle_tmo(ev, true, 0/*Don't care for stale tmo's*/); nstale--; } else { CU_FAIL("Failed to receive stale timeout"); @@ -441,7 +452,7 @@ static int worker_entrypoint(void *arg TEST_UNUSED) } /* Check if there any more (unexpected) events */ - odp_event_t ev = odp_queue_deq(queue); + ev = odp_queue_deq(queue); if (ev != ODP_EVENT_INVALID) CU_FAIL("Unexpected event received"); @@ -464,6 +475,11 @@ void timer_test_odp_timer_all(void) odp_pool_param_t params; odp_timer_pool_param_t tparam; odp_cpumask_t unused; + odp_timer_pool_info_t tpinfo; + uint64_t tick; + uint64_t ns; + uint64_t t2; + pthrd_arg thrdarg; /* Reserve at least one core for running other processes so the timer * test hopefully can run undisturbed and thus get better timing @@ -505,7 +521,6 @@ void timer_test_odp_timer_all(void) /* Start all created timer pools */ odp_timer_pool_start(); - odp_timer_pool_info_t tpinfo; if (odp_timer_pool_info(tp, &tpinfo) != 0) CU_FAIL("odp_timer_pool_info"); CU_ASSERT(strcmp(tpinfo.name, NAME) == 0); @@ -519,10 +534,9 @@ void timer_test_odp_timer_all(void) LOG_DBG("Tmo range: %u ms (%" PRIu64 " ticks)\n", RANGE_MS, odp_timer_ns_to_tick(tp, 1000000ULL * RANGE_MS)); - uint64_t tick; for (tick = 0; tick < 1000000000000ULL; tick += 1000000ULL) { - uint64_t ns = odp_timer_tick_to_ns(tp, tick); - uint64_t t2 = odp_timer_ns_to_tick(tp, ns); + ns = odp_timer_tick_to_ns(tp, tick); + t2 = odp_timer_ns_to_tick(tp, ns); if (tick != t2) CU_FAIL("Invalid conversion tick->ns->tick"); } @@ -537,7 +551,6 @@ void timer_test_odp_timer_all(void) odp_atomic_init_u32(&timers_allocated, 0); /* Create and start worker threads */ - pthrd_arg thrdarg; thrdarg.testcase = 0; thrdarg.numthrds = num_workers; odp_cunit_thread_create(worker_entrypoint, &thrdarg);