Use RTE_DIM instead of computing directly with sizeof.
Patch automatically generated via cocci/rte_dim.cocci.

Signed-off-by: Stephen Hemminger <step...@networkplumber.org>
---
 app/test-flow-perf/main.c              |  4 +--
 app/test/test_ethdev_link.c            |  3 +-
 app/test/test_security_inline_macsec.c | 47 +++++++++++++-------------
 3 files changed, 25 insertions(+), 29 deletions(-)

diff --git a/app/test-flow-perf/main.c b/app/test-flow-perf/main.c
index e224ef6798..e9ef1ae04c 100644
--- a/app/test-flow-perf/main.c
+++ b/app/test-flow-perf/main.c
@@ -965,9 +965,7 @@ args_parse(int argc, char **argv)
                                                "meter-profile") == 0) {
                                i = 0;
                                token = strsep(&optarg, ",\0");
-                               while (token != NULL && i < sizeof(
-                                               meter_profile_values) /
-                                               sizeof(uint64_t)) {
+                               while (token != NULL && i < 
RTE_DIM(meter_profile_values)) {
                                        meter_profile_values[i++] = atol(token);
                                        token = strsep(&optarg, ",\0");
                                }
diff --git a/app/test/test_ethdev_link.c b/app/test/test_ethdev_link.c
index f063a5fe26..e305df71be 100644
--- a/app/test/test_ethdev_link.c
+++ b/app/test/test_ethdev_link.c
@@ -135,8 +135,7 @@ test_link_speed_all_values(void)
                { "Invalid",   50505 }
        };
 
-       for (i = 0; i < sizeof(speed_str_map) / sizeof(struct link_speed_t);
-                       i++) {
+       for (i = 0; i < RTE_DIM(speed_str_map); i++) {
                speed = rte_eth_link_speed_to_str(speed_str_map[i].link_speed);
                TEST_ASSERT_BUFFERS_ARE_EQUAL(speed_str_map[i].value,
                        speed, strlen(speed_str_map[i].value),
diff --git a/app/test/test_security_inline_macsec.c 
b/app/test/test_security_inline_macsec.c
index f11e9da8c3..26f7504dc2 100644
--- a/app/test/test_security_inline_macsec.c
+++ b/app/test/test_security_inline_macsec.c
@@ -1294,7 +1294,7 @@ test_inline_macsec_encap_all(void)
        opts.sectag_insert_mode = 1;
        opts.mtu = RTE_ETHER_MTU;
 
-       size = (sizeof(list_mcs_cipher_vectors) / 
sizeof((list_mcs_cipher_vectors)[0]));
+       size = RTE_DIM(list_mcs_cipher_vectors);
        for (i = 0; i < size; i++) {
                cur_td = &list_mcs_cipher_vectors[i];
                err = test_macsec(&cur_td, MCS_ENCAP, &opts);
@@ -1332,7 +1332,7 @@ test_inline_macsec_decap_all(void)
        opts.sectag_insert_mode = 1;
        opts.mtu = RTE_ETHER_MTU;
 
-       size = (sizeof(list_mcs_cipher_vectors) / 
sizeof((list_mcs_cipher_vectors)[0]));
+       size = RTE_DIM(list_mcs_cipher_vectors);
        for (i = 0; i < size; i++) {
                cur_td = &list_mcs_cipher_vectors[i];
                err = test_macsec(&cur_td, MCS_DECAP, &opts);
@@ -1371,7 +1371,7 @@ test_inline_macsec_auth_only_all(void)
        opts.sectag_insert_mode = 1;
        opts.mtu = RTE_ETHER_MTU;
 
-       size = (sizeof(list_mcs_integrity_vectors) / 
sizeof((list_mcs_integrity_vectors)[0]));
+       size = RTE_DIM(list_mcs_integrity_vectors);
 
        for (i = 0; i < size; i++) {
                cur_td = &list_mcs_integrity_vectors[i];
@@ -1410,7 +1410,7 @@ test_inline_macsec_verify_only_all(void)
        opts.sectag_insert_mode = 1;
        opts.mtu = RTE_ETHER_MTU;
 
-       size = (sizeof(list_mcs_integrity_vectors) / 
sizeof((list_mcs_integrity_vectors)[0]));
+       size = RTE_DIM(list_mcs_integrity_vectors);
 
        for (i = 0; i < size; i++) {
                cur_td = &list_mcs_integrity_vectors[i];
@@ -1451,7 +1451,7 @@ test_inline_macsec_encap_decap_all(void)
        opts.sectag_insert_mode = 1;
        opts.mtu = RTE_ETHER_MTU;
 
-       size = (sizeof(list_mcs_cipher_vectors) / 
sizeof((list_mcs_cipher_vectors)[0]));
+       size = RTE_DIM(list_mcs_cipher_vectors);
 
        for (i = 0; i < size; i++) {
                cur_td = &list_mcs_cipher_vectors[i];
@@ -1492,7 +1492,7 @@ test_inline_macsec_auth_verify_all(void)
        opts.sectag_insert_mode = 1;
        opts.mtu = RTE_ETHER_MTU;
 
-       size = (sizeof(list_mcs_integrity_vectors) / 
sizeof((list_mcs_integrity_vectors)[0]));
+       size = RTE_DIM(list_mcs_integrity_vectors);
 
        for (i = 0; i < size; i++) {
                cur_td = &list_mcs_integrity_vectors[i];
@@ -1578,7 +1578,7 @@ test_inline_macsec_with_vlan(void)
        opts.nb_td = 1;
        opts.mtu = RTE_ETHER_MTU;
 
-       size = (sizeof(list_mcs_vlan_vectors) / 
sizeof((list_mcs_vlan_vectors)[0]));
+       size = RTE_DIM(list_mcs_vlan_vectors);
 
        for (i = 0; i < size; i++) {
                cur_td = &list_mcs_vlan_vectors[i];
@@ -1653,7 +1653,7 @@ test_inline_macsec_pkt_drop(void)
        opts.sectag_insert_mode = 1;
        opts.mtu = RTE_ETHER_MTU;
 
-       size = (sizeof(list_mcs_err_cipher_vectors) / 
sizeof((list_mcs_err_cipher_vectors)[0]));
+       size = RTE_DIM(list_mcs_err_cipher_vectors);
 
        for (i = 0; i < size; i++) {
                cur_td = &list_mcs_err_cipher_vectors[i];
@@ -1693,8 +1693,7 @@ test_inline_macsec_untagged_rx(void)
        opts.mtu = RTE_ETHER_MTU;
        opts.check_untagged_rx = 1;
 
-       size = (sizeof(list_mcs_untagged_cipher_vectors) /
-               sizeof((list_mcs_untagged_cipher_vectors)[0]));
+       size = RTE_DIM(list_mcs_untagged_cipher_vectors);
 
        for (i = 0; i < size; i++) {
                cur_td = &list_mcs_untagged_cipher_vectors[i];
@@ -1747,7 +1746,7 @@ test_inline_macsec_bad_tag_rx(void)
        opts.mtu = RTE_ETHER_MTU;
        opts.check_bad_tag_cnt = 1;
 
-       size = (sizeof(list_mcs_bad_tag_vectors) / 
sizeof((list_mcs_bad_tag_vectors)[0]));
+       size = RTE_DIM(list_mcs_bad_tag_vectors);
 
        for (i = 0; i < size; i++) {
                cur_td = &list_mcs_bad_tag_vectors[i];
@@ -1786,7 +1785,7 @@ test_inline_macsec_sa_not_in_use(void)
        opts.mtu = RTE_ETHER_MTU;
        opts.check_sa_not_in_use = 1;
 
-       size = (sizeof(list_mcs_cipher_vectors) / 
sizeof((list_mcs_cipher_vectors)[0]));
+       size = RTE_DIM(list_mcs_cipher_vectors);
 
        for (i = 0; i < size; i++) {
                cur_td = &list_mcs_cipher_vectors[i];
@@ -1825,7 +1824,7 @@ test_inline_macsec_decap_stats(void)
        opts.mtu = RTE_ETHER_MTU;
        opts.check_decap_stats = 1;
 
-       size = (sizeof(list_mcs_cipher_vectors) / 
sizeof((list_mcs_cipher_vectors)[0]));
+       size = RTE_DIM(list_mcs_cipher_vectors);
 
        for (i = 0; i < size; i++) {
                cur_td = &list_mcs_cipher_vectors[i];
@@ -1866,7 +1865,7 @@ test_inline_macsec_verify_only_stats(void)
        opts.mtu = RTE_ETHER_MTU;
        opts.check_verify_only_stats = 1;
 
-       size = (sizeof(list_mcs_integrity_vectors) / 
sizeof((list_mcs_integrity_vectors)[0]));
+       size = RTE_DIM(list_mcs_integrity_vectors);
 
        for (i = 0; i < size; i++) {
                cur_td = &list_mcs_integrity_vectors[i];
@@ -1906,7 +1905,7 @@ test_inline_macsec_pkts_invalid_stats(void)
        opts.sectag_insert_mode = 1;
        opts.mtu = RTE_ETHER_MTU;
 
-       size = (sizeof(list_mcs_err_cipher_vectors) / 
sizeof((list_mcs_err_cipher_vectors)[0]));
+       size = RTE_DIM(list_mcs_err_cipher_vectors);
 
        for (i = 0; i < size; i++) {
                cur_td = &list_mcs_err_cipher_vectors[i];
@@ -1943,7 +1942,7 @@ test_inline_macsec_pkts_unchecked_stats(void)
        opts.mtu = RTE_ETHER_MTU;
        opts.check_pkts_unchecked_stats = 1;
 
-       size = (sizeof(list_mcs_integrity_vectors) / 
sizeof((list_mcs_integrity_vectors)[0]));
+       size = RTE_DIM(list_mcs_integrity_vectors);
 
        for (i = 0; i < size; i++) {
                cur_td = &list_mcs_integrity_vectors[i];
@@ -1982,7 +1981,7 @@ test_inline_macsec_out_pkts_untagged(void)
        opts.mtu = RTE_ETHER_MTU;
        opts.check_out_pkts_untagged = 1;
 
-       size = (sizeof(list_mcs_cipher_vectors) / 
sizeof((list_mcs_cipher_vectors)[0]));
+       size = RTE_DIM(list_mcs_cipher_vectors);
        for (i = 0; i < size; i++) {
                cur_td = &list_mcs_cipher_vectors[i];
                err = test_macsec(&cur_td, MCS_ENCAP, &opts);
@@ -2020,7 +2019,7 @@ test_inline_macsec_out_pkts_toolong(void)
        opts.mtu = 50;
        opts.check_out_pkts_toolong = 1;
 
-       size = (sizeof(list_mcs_cipher_vectors) / 
sizeof((list_mcs_cipher_vectors)[0]));
+       size = RTE_DIM(list_mcs_cipher_vectors);
        for (i = 0; i < size; i++) {
                cur_td = &list_mcs_cipher_vectors[i];
                err = test_macsec(&cur_td, MCS_ENCAP, &opts);
@@ -2058,7 +2057,7 @@ test_inline_macsec_encap_stats(void)
        opts.mtu = RTE_ETHER_MTU;
        opts.check_encap_stats = 1;
 
-       size = (sizeof(list_mcs_cipher_vectors) / 
sizeof((list_mcs_cipher_vectors)[0]));
+       size = RTE_DIM(list_mcs_cipher_vectors);
        for (i = 0; i < size; i++) {
                cur_td = &list_mcs_cipher_vectors[i];
                err = test_macsec(&cur_td, MCS_ENCAP, &opts);
@@ -2095,7 +2094,7 @@ test_inline_macsec_auth_only_stats(void)
        opts.mtu = RTE_ETHER_MTU;
        opts.check_auth_only_stats = 1;
 
-       size = (sizeof(list_mcs_integrity_vectors) / 
sizeof((list_mcs_integrity_vectors)[0]));
+       size = RTE_DIM(list_mcs_integrity_vectors);
 
        for (i = 0; i < size; i++) {
                cur_td = &list_mcs_integrity_vectors[i];
@@ -2146,7 +2145,7 @@ test_inline_macsec_interrupts_all(void)
        rte_eth_dev_callback_register(port_id, RTE_ETH_EVENT_MACSEC,
                        test_macsec_event_callback, &err_vector);
 
-       size = (sizeof(list_mcs_intr_test_vectors) / 
sizeof((list_mcs_intr_test_vectors)[0]));
+       size = RTE_DIM(list_mcs_intr_test_vectors);
 
        for (i = 0; i < size; i++) {
                cur_td = &list_mcs_intr_test_vectors[i];
@@ -2194,7 +2193,7 @@ test_inline_macsec_rekey_tx(void)
        opts.mtu = RTE_ETHER_MTU;
        opts.rekey_en = 1;
 
-       size = (sizeof(list_mcs_rekey_vectors) / 
sizeof((list_mcs_rekey_vectors)[0]));
+       size = RTE_DIM(list_mcs_rekey_vectors);
 
        for (i = 0; i < size; i++) {
                cur_td = &list_mcs_rekey_vectors[i];
@@ -2236,7 +2235,7 @@ test_inline_macsec_rekey_rx(void)
        opts.mtu = RTE_ETHER_MTU;
        opts.rekey_en = 1;
 
-       size = (sizeof(list_mcs_rekey_vectors) / 
sizeof((list_mcs_rekey_vectors)[0]));
+       size = RTE_DIM(list_mcs_rekey_vectors);
        for (i = 0; i < size; i++) {
                cur_td = &list_mcs_rekey_vectors[i];
                opts.rekey_td = &list_mcs_rekey_vectors[++i];
@@ -2277,7 +2276,7 @@ test_inline_macsec_anti_replay(void)
        opts.sectag_insert_mode = 1;
        opts.replay_protect = 1;
 
-       size = (sizeof(list_mcs_anti_replay_vectors) / 
sizeof((list_mcs_anti_replay_vectors)[0]));
+       size = RTE_DIM(list_mcs_anti_replay_vectors);
 
        for (j = 0; j < 2; j++) {
                opts.replay_win_sz = replay_win_sz[j];
-- 
2.43.0

Reply via email to