list_sort.c's core code should only change on sync with Linux, so we
don't really need separate testing code. The code doesn't compile as
we neither have a CONFIG_TEST_LIST_SORT symbol nor do we have a
<linux/random.h> header. Remove it.

Signed-off-by: Ahmad Fatoum <a.fat...@pengutronix.de>
---
 lib/list_sort.c | 149 ------------------------------------------------
 1 file changed, 149 deletions(-)

diff --git a/lib/list_sort.c b/lib/list_sort.c
index 84c6f6465b7a..f5122b259229 100644
--- a/lib/list_sort.c
+++ b/lib/list_sort.c
@@ -144,152 +144,3 @@ void list_sort(void *priv, struct list_head *head,
        merge_and_restore_back_links(priv, cmp, head, part[max_lev], list);
 }
 EXPORT_SYMBOL(list_sort);
-
-#ifdef CONFIG_TEST_LIST_SORT
-
-#include <linux/random.h>
-
-/*
- * The pattern of set bits in the list length determines which cases
- * are hit in list_sort().
- */
-#define TEST_LIST_LEN (512+128+2) /* not including head */
-
-#define TEST_POISON1 0xDEADBEEF
-#define TEST_POISON2 0xA324354C
-
-struct debug_el {
-       unsigned int poison1;
-       struct list_head list;
-       unsigned int poison2;
-       int value;
-       unsigned serial;
-};
-
-/* Array, containing pointers to all elements in the test list */
-static struct debug_el **elts __initdata;
-
-static int __init check(struct debug_el *ela, struct debug_el *elb)
-{
-       if (ela->serial >= TEST_LIST_LEN) {
-               printk(KERN_ERR "list_sort_test: error: incorrect serial %d\n",
-                               ela->serial);
-               return -EINVAL;
-       }
-       if (elb->serial >= TEST_LIST_LEN) {
-               printk(KERN_ERR "list_sort_test: error: incorrect serial %d\n",
-                               elb->serial);
-               return -EINVAL;
-       }
-       if (elts[ela->serial] != ela || elts[elb->serial] != elb) {
-               printk(KERN_ERR "list_sort_test: error: phantom element\n");
-               return -EINVAL;
-       }
-       if (ela->poison1 != TEST_POISON1 || ela->poison2 != TEST_POISON2) {
-               printk(KERN_ERR "list_sort_test: error: bad poison: %#x/%#x\n",
-                               ela->poison1, ela->poison2);
-               return -EINVAL;
-       }
-       if (elb->poison1 != TEST_POISON1 || elb->poison2 != TEST_POISON2) {
-               printk(KERN_ERR "list_sort_test: error: bad poison: %#x/%#x\n",
-                               elb->poison1, elb->poison2);
-               return -EINVAL;
-       }
-       return 0;
-}
-
-static int __init cmp(void *priv, struct list_head *a, struct list_head *b)
-{
-       struct debug_el *ela, *elb;
-
-       ela = container_of(a, struct debug_el, list);
-       elb = container_of(b, struct debug_el, list);
-
-       check(ela, elb);
-       return ela->value - elb->value;
-}
-
-static int __init list_sort_test(void)
-{
-       int i, count = 1, err = -EINVAL;
-       struct debug_el *el;
-       struct list_head *cur, *tmp;
-       LIST_HEAD(head);
-
-       printk(KERN_DEBUG "list_sort_test: start testing list_sort()\n");
-
-       elts = kmalloc(sizeof(void *) * TEST_LIST_LEN, GFP_KERNEL);
-       if (!elts) {
-               printk(KERN_ERR "list_sort_test: error: cannot allocate "
-                               "memory\n");
-               goto exit;
-       }
-
-       for (i = 0; i < TEST_LIST_LEN; i++) {
-               el = kmalloc(sizeof(*el), GFP_KERNEL);
-               if (!el) {
-                       printk(KERN_ERR "list_sort_test: error: cannot "
-                                       "allocate memory\n");
-                       goto exit;
-               }
-                /* force some equivalencies */
-               el->value = prandom_u32() % (TEST_LIST_LEN / 3);
-               el->serial = i;
-               el->poison1 = TEST_POISON1;
-               el->poison2 = TEST_POISON2;
-               elts[i] = el;
-               list_add_tail(&el->list, &head);
-       }
-
-       list_sort(NULL, &head, cmp);
-
-       for (cur = head.next; cur->next != &head; cur = cur->next) {
-               struct debug_el *el1;
-               int cmp_result;
-
-               if (cur->next->prev != cur) {
-                       printk(KERN_ERR "list_sort_test: error: list is "
-                                       "corrupted\n");
-                       goto exit;
-               }
-
-               cmp_result = cmp(NULL, cur, cur->next);
-               if (cmp_result > 0) {
-                       printk(KERN_ERR "list_sort_test: error: list is not "
-                                       "sorted\n");
-                       goto exit;
-               }
-
-               el = container_of(cur, struct debug_el, list);
-               el1 = container_of(cur->next, struct debug_el, list);
-               if (cmp_result == 0 && el->serial >= el1->serial) {
-                       printk(KERN_ERR "list_sort_test: error: order of "
-                                       "equivalent elements not preserved\n");
-                       goto exit;
-               }
-
-               if (check(el, el1)) {
-                       printk(KERN_ERR "list_sort_test: error: element check "
-                                       "failed\n");
-                       goto exit;
-               }
-               count++;
-       }
-
-       if (count != TEST_LIST_LEN) {
-               printk(KERN_ERR "list_sort_test: error: bad list length %d",
-                               count);
-               goto exit;
-       }
-
-       err = 0;
-exit:
-       kfree(elts);
-       list_for_each_safe(cur, tmp, &head) {
-               list_del(cur);
-               kfree(container_of(cur, struct debug_el, list));
-       }
-       return err;
-}
-module_init(list_sort_test);
-#endif /* CONFIG_TEST_LIST_SORT */
-- 
2.27.0


_______________________________________________
barebox mailing list
barebox@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/barebox

Reply via email to