Commit a0fa0b63 authored by Kang Minchul's avatar Kang Minchul Committed by Will Deacon

kselftest/arm64: fix array_size.cocci warning

Use ARRAY_SIZE to fix the following coccicheck warnings:
tools/testing/selftests/arm64/mte/check_buffer_fill.c:341:20-21:
WARNING: Use ARRAY_SIZE
tools/testing/selftests/arm64/mte/check_buffer_fill.c:35:20-21:
WARNING: Use ARRAY_SIZE
tools/testing/selftests/arm64/mte/check_buffer_fill.c:168:20-21:
WARNING: Use ARRAY_SIZE
tools/testing/selftests/arm64/mte/check_buffer_fill.c:72:20-21:
WARNING: Use ARRAY_SIZE
tools/testing/selftests/arm64/mte/check_buffer_fill.c:369:25-26:
WARNING: Use ARRAY_SIZE
Signed-off-by: default avatarKang Minchul <tegongkang@gmail.com>
Link: https://lore.kernel.org/r/20221105073143.78521-1-tegongkang@gmail.comSigned-off-by: default avatarWill Deacon <will@kernel.org>
parent 9b283888
...@@ -32,7 +32,7 @@ static int check_buffer_by_byte(int mem_type, int mode) ...@@ -32,7 +32,7 @@ static int check_buffer_by_byte(int mem_type, int mode)
bool err; bool err;
mte_switch_mode(mode, MTE_ALLOW_NON_ZERO_TAG); mte_switch_mode(mode, MTE_ALLOW_NON_ZERO_TAG);
item = sizeof(sizes)/sizeof(int); item = ARRAY_SIZE(sizes);
for (i = 0; i < item; i++) { for (i = 0; i < item; i++) {
ptr = (char *)mte_allocate_memory(sizes[i], mem_type, 0, true); ptr = (char *)mte_allocate_memory(sizes[i], mem_type, 0, true);
...@@ -69,7 +69,7 @@ static int check_buffer_underflow_by_byte(int mem_type, int mode, ...@@ -69,7 +69,7 @@ static int check_buffer_underflow_by_byte(int mem_type, int mode,
char *und_ptr = NULL; char *und_ptr = NULL;
mte_switch_mode(mode, MTE_ALLOW_NON_ZERO_TAG); mte_switch_mode(mode, MTE_ALLOW_NON_ZERO_TAG);
item = sizeof(sizes)/sizeof(int); item = ARRAY_SIZE(sizes);
for (i = 0; i < item; i++) { for (i = 0; i < item; i++) {
ptr = (char *)mte_allocate_memory_tag_range(sizes[i], mem_type, 0, ptr = (char *)mte_allocate_memory_tag_range(sizes[i], mem_type, 0,
underflow_range, 0); underflow_range, 0);
...@@ -165,7 +165,7 @@ static int check_buffer_overflow_by_byte(int mem_type, int mode, ...@@ -165,7 +165,7 @@ static int check_buffer_overflow_by_byte(int mem_type, int mode,
char *over_ptr = NULL; char *over_ptr = NULL;
mte_switch_mode(mode, MTE_ALLOW_NON_ZERO_TAG); mte_switch_mode(mode, MTE_ALLOW_NON_ZERO_TAG);
item = sizeof(sizes)/sizeof(int); item = ARRAY_SIZE(sizes);
for (i = 0; i < item; i++) { for (i = 0; i < item; i++) {
ptr = (char *)mte_allocate_memory_tag_range(sizes[i], mem_type, 0, ptr = (char *)mte_allocate_memory_tag_range(sizes[i], mem_type, 0,
0, overflow_range); 0, overflow_range);
...@@ -338,7 +338,7 @@ static int check_buffer_by_block(int mem_type, int mode) ...@@ -338,7 +338,7 @@ static int check_buffer_by_block(int mem_type, int mode)
int i, item, result = KSFT_PASS; int i, item, result = KSFT_PASS;
mte_switch_mode(mode, MTE_ALLOW_NON_ZERO_TAG); mte_switch_mode(mode, MTE_ALLOW_NON_ZERO_TAG);
item = sizeof(sizes)/sizeof(int); item = ARRAY_SIZE(sizes);
cur_mte_cxt.fault_valid = false; cur_mte_cxt.fault_valid = false;
for (i = 0; i < item; i++) { for (i = 0; i < item; i++) {
result = check_buffer_by_block_iterate(mem_type, mode, sizes[i]); result = check_buffer_by_block_iterate(mem_type, mode, sizes[i]);
...@@ -366,7 +366,7 @@ static int check_memory_initial_tags(int mem_type, int mode, int mapping) ...@@ -366,7 +366,7 @@ static int check_memory_initial_tags(int mem_type, int mode, int mapping)
{ {
char *ptr; char *ptr;
int run, fd; int run, fd;
int total = sizeof(sizes)/sizeof(int); int total = ARRAY_SIZE(sizes);
mte_switch_mode(mode, MTE_ALLOW_NON_ZERO_TAG); mte_switch_mode(mode, MTE_ALLOW_NON_ZERO_TAG);
for (run = 0; run < total; run++) { for (run = 0; run < total; run++) {
...@@ -404,7 +404,7 @@ int main(int argc, char *argv[]) ...@@ -404,7 +404,7 @@ int main(int argc, char *argv[])
{ {
int err; int err;
size_t page_size = getpagesize(); size_t page_size = getpagesize();
int item = sizeof(sizes)/sizeof(int); int item = ARRAY_SIZE(sizes);
sizes[item - 3] = page_size - 1; sizes[item - 3] = page_size - 1;
sizes[item - 2] = page_size; sizes[item - 2] = page_size;
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment