@@ -674,8 +674,6 @@ search_linux_map_for_section(proc_handle_t *handle, const char* secname, const c
674674 }
675675
676676 uintptr_t retval = 0 ;
677- int lines_processed = 0 ;
678- int matches_found = 0 ;
679677
680678 while (fgets (line + linelen , linesz - linelen , maps_file ) != NULL ) {
681679 linelen = strlen (line );
@@ -700,7 +698,6 @@ search_linux_map_for_section(proc_handle_t *handle, const char* secname, const c
700698 line [linelen - 1 ] = '\0' ;
701699 // and prepare to read the next line into the start of the buffer.
702700 linelen = 0 ;
703- lines_processed ++ ;
704701
705702 unsigned long start = 0 ;
706703 unsigned long path_pos = 0 ;
@@ -721,7 +718,6 @@ search_linux_map_for_section(proc_handle_t *handle, const char* secname, const c
721718 }
722719
723720 if (strstr (filename , substr )) {
724- matches_found ++ ;
725721 retval = search_elf_file_for_section (handle , secname , start , path );
726722 if (retval ) {
727723 break ;
@@ -840,15 +836,10 @@ search_windows_map_for_section(proc_handle_t* handle, const char* secname, const
840836 MODULEENTRY32W moduleEntry ;
841837 moduleEntry .dwSize = sizeof (moduleEntry );
842838 void * runtime_addr = NULL ;
843- int modules_examined = 0 ;
844- int matches_found = 0 ;
845839
846840 for (BOOL hasModule = Module32FirstW (hProcSnap , & moduleEntry ); hasModule ; hasModule = Module32NextW (hProcSnap , & moduleEntry )) {
847- modules_examined ++ ;
848-
849841 // Look for either python executable or DLL
850842 if (wcsstr (moduleEntry .szModule , substr )) {
851- matches_found ++ ;
852843 runtime_addr = analyze_pe (moduleEntry .szExePath , moduleEntry .modBaseAddr , secname );
853844 if (runtime_addr != NULL ) {
854845 break ;
0 commit comments