]> xenbits.xensource.com Git - libvirt.git/commitdiff
Use G_N_ELEMENTS instead of ARRAY_CARDINALITY
authorJán Tomko <jtomko@redhat.com>
Tue, 15 Oct 2019 11:55:26 +0000 (13:55 +0200)
committerJán Tomko <jtomko@redhat.com>
Tue, 15 Oct 2019 14:14:19 +0000 (16:14 +0200)
Prefer the GLib version of the macro.

Signed-off-by: Ján Tomko <jtomko@redhat.com>
Reviewed-by: Michal Privoznik <mprivozn@redhat.com>
110 files changed:
build-aux/syntax-check.mk
src/access/viraccessmanager.c
src/conf/domain_capabilities.h
src/conf/domain_conf.c
src/conf/storage_conf.c
src/conf/virdomainsnapshotobjlist.c
src/cpu/cpu.c
src/cpu/cpu_arm.c
src/cpu/cpu_ppc64.c
src/cpu/cpu_s390.c
src/cpu/cpu_x86.c
src/esx/esx_vi.c
src/internal.h
src/libvirt-domain.c
src/libvirt-host.c
src/libxl/libxl_capabilities.c
src/libxl/libxl_driver.c
src/libxl/libxl_migration.c
src/libxl/xen_xl.c
src/locking/domain_lock.c
src/locking/lock_daemon.c
src/locking/sanlock_helper.c
src/logging/log_daemon.c
src/lxc/lxc_container.c
src/lxc/lxc_controller.c
src/lxc/lxc_monitor.c
src/node_device/node_device_hal.c
src/node_device/node_device_udev.c
src/nwfilter/nwfilter_dhcpsnoop.c
src/nwfilter/nwfilter_learnipaddr.c
src/phyp/phyp_driver.c
src/qemu/qemu_agent.c
src/qemu/qemu_capabilities.c
src/qemu/qemu_command.c
src/qemu/qemu_conf.c
src/qemu/qemu_domain.c
src/qemu/qemu_migration.c
src/qemu/qemu_migration_params.c
src/qemu/qemu_monitor_json.c
src/qemu/qemu_qapi.c
src/remote/remote_daemon.c
src/remote/remote_daemon_dispatch.c
src/remote/remote_driver.c
src/rpc/gendispatch.pl
src/rpc/virnetclient.c
src/security/security_dac.c
src/security/security_driver.c
src/security/security_selinux.c
src/security/virt-aa-helper.c
src/test/test_driver.c
src/util/virarch.c
src/util/viraudit.c
src/util/vircgroupv1.c
src/util/vircgroupv2.c
src/util/vircrypto.c
src/util/virdbus.c
src/util/virenum.h
src/util/virfirewall.c
src/util/virhostcpu.c
src/util/viriptables.c
src/util/virkeycode.c
src/util/virlog.c
src/util/virnetdev.c
src/util/virnetlink.c
src/util/virperf.c
src/util/virprocess.c
src/util/virstoragefile.c
src/util/virtpm.c
src/util/virutil.c
src/vbox/vbox_XPCOMCGlue.c
src/vmware/vmware_driver.c
src/vz/vz_driver.c
tests/commandhelper.c
tests/esxutilstest.c
tests/nwfilterxml2firewalltest.c
tests/openvzutilstest.c
tests/qemufirmwaretest.c
tests/qemumonitorjsontest.c
tests/qemuvhostusertest.c
tests/qemuxml2argvmock.c
tests/qemuxml2argvtest.c
tests/testutils.c
tests/testutilshostcpus.h
tests/testutilsqemu.c
tests/testutilsxen.c
tests/utiltest.c
tests/virbitmaptest.c
tests/vircgrouptest.c
tests/virfiletest.c
tests/virfirewalltest.c
tests/virhashtest.c
tests/virhostcputest.c
tests/viriscsitest.c
tests/virnetmessagetest.c
tests/virnettlscontexttest.c
tests/virnettlssessiontest.c
tests/virnumamock.c
tests/virpcitest.c
tests/virpolkittest.c
tests/virrotatingfiletest.c
tests/virstoragetest.c
tests/virstringtest.c
tests/virsystemdtest.c
tests/virtypedparamtest.c
tools/virsh-domain.c
tools/virsh-network.c
tools/virsh-nodedev.c
tools/virsh-pool.c
tools/virsh-secret.c
tools/virt-host-validate-common.c

index 63b9ce70f6f981657ce38256ed36d0139233a505..033eaf70c416c10193df911bac6fdf5a42984d51 100644 (file)
@@ -634,6 +634,12 @@ sc_prohibit_attribute_macros:
        halt='use GLib macros: G_GNUC_<ATTRIBUTE_SUFFIX> for most' \
          $(_sc_search_regexp)
 
+sc_prohibit_non_glib_macros:
+       @prohibit='ARRAY_CARDINALITY' \
+       in_vc_files='\.[ch]$$' \
+       halt='use GLib macros: G_N_ELEMENTS' \
+         $(_sc_search_regexp)
+
 sc_prohibit_int_index:
        @prohibit='\<(int|unsigned)\s*\*?index\>(\s|,|;)' \
        halt='use different name than 'index' for declaration' \
index 24d9713cfdf83131839aa73021ccab4f321a9b5a..31e1787919bd1eabdb84081985d3c14ab98d840f 100644 (file)
@@ -118,7 +118,7 @@ static virAccessDriverPtr accessDrivers[] = {
 static virAccessDriverPtr virAccessManagerFindDriver(const char *name)
 {
     size_t i;
-    for (i = 0; i < ARRAY_CARDINALITY(accessDrivers); i++) {
+    for (i = 0; i < G_N_ELEMENTS(accessDrivers); i++) {
         if (STREQ(name, accessDrivers[i]->name))
             return accessDrivers[i];
     }
index f5571b218807f49325b587b7dbb1cca721cdfe4e..3a921946021c7de234c68165b573340600aace2e 100644 (file)
@@ -215,7 +215,7 @@ virDomainCapsCPUModelsGet(virDomainCapsCPUModelsPtr cpuModels,
 #define VIR_DOMAIN_CAPS_ENUM_SET(capsEnum, ...) \
     do { \
         unsigned int __values[] = {__VA_ARGS__}; \
-        size_t __nvalues = ARRAY_CARDINALITY(__values); \
+        size_t __nvalues = G_N_ELEMENTS(__values); \
         virDomainCapsEnumSet(&(capsEnum), #capsEnum, \
                              __nvalues, __values); \
     } while (0)
index c128d34ba2c12c1a6751932885529de4b1248caa..10d6bf0eea9432397b77645f5cc4cfa1a6b43d63 100644 (file)
@@ -29809,7 +29809,7 @@ virDomainNetSetModelString(virDomainNetDefPtr net,
     if (!model)
         return 0;
 
-    for (i = 0; i < ARRAY_CARDINALITY(virDomainNetModelTypeList); i++) {
+    for (i = 0; i < G_N_ELEMENTS(virDomainNetModelTypeList); i++) {
         if (STRCASEEQ(virDomainNetModelTypeList[i], model)) {
             net->model = i;
             return 0;
index fcd1701d377a13af10f5d4b5d58b7e4d6dc5eced..2658f80e334d65519d0a62cf5d22586ebd7c469d 100644 (file)
@@ -309,7 +309,7 @@ static virStoragePoolTypeInfoPtr
 virStoragePoolTypeInfoLookup(int type)
 {
     size_t i;
-    for (i = 0; i < ARRAY_CARDINALITY(poolTypeInfo); i++)
+    for (i = 0; i < G_N_ELEMENTS(poolTypeInfo); i++)
         if (poolTypeInfo[i].poolType == type)
             return &poolTypeInfo[i];
 
index 95622f0ba7fc9fcfcca3e7b4668f0de9aae1befc..910b0714c7cabb763faab8c6ca143a124b2730ff 100644 (file)
@@ -131,7 +131,7 @@ virDomainSnapshotObjListGetNames(virDomainSnapshotObjListPtr snapshots,
     };
     size_t i;
 
-    for (i = 0; i < ARRAY_CARDINALITY(map); i++) {
+    for (i = 0; i < G_N_ELEMENTS(map); i++) {
         if (flags & map[i].snap_flag) {
             flags &= ~map[i].snap_flag;
             moment_flags |= map[i].moment_flag;
index 2278d79a774aae0518c36e401ce78ac4ff26718f..40f725fd21b18041ab8ba01949c0cdf4b0e4a2a1 100644 (file)
@@ -57,7 +57,7 @@ cpuGetSubDriver(virArch arch)
         return NULL;
     }
 
-    for (i = 0; i < ARRAY_CARDINALITY(drivers); i++) {
+    for (i = 0; i < G_N_ELEMENTS(drivers); i++) {
         for (j = 0; j < drivers[i]->narch; j++) {
             if (arch == drivers[i]->arch[j])
                 return drivers[i];
@@ -76,7 +76,7 @@ cpuGetSubDriverByName(const char *name)
 {
     size_t i;
 
-    for (i = 0; i < ARRAY_CARDINALITY(drivers); i++) {
+    for (i = 0; i < G_N_ELEMENTS(drivers); i++) {
         if (STREQ_NULLABLE(name, drivers[i]->name))
             return drivers[i];
     }
index d464d7add2ca2688963dd239f0f0ed7bcb8604f5..c271e53a90858f0686075736002961450dc23c75 100644 (file)
@@ -101,7 +101,7 @@ virCPUarmCompare(virCPUDefPtr host G_GNUC_UNUSED,
 struct cpuArchDriver cpuDriverArm = {
     .name = "arm",
     .arch = archs,
-    .narch = ARRAY_CARDINALITY(archs),
+    .narch = G_N_ELEMENTS(archs),
     .compare = virCPUarmCompare,
     .decode = NULL,
     .encode = NULL,
index b11695f24d732d2749b615a429c39aa610e49f4a..1d9d6bca12d9030719b50acaa21aaf3319fefc42 100644 (file)
@@ -452,7 +452,7 @@ ppc64Compute(virCPUDefPtr host,
     if (cpu->arch != VIR_ARCH_NONE) {
         bool found = false;
 
-        for (i = 0; i < ARRAY_CARDINALITY(archs); i++) {
+        for (i = 0; i < G_N_ELEMENTS(archs); i++) {
             if (archs[i] == cpu->arch) {
                 found = true;
                 break;
@@ -824,7 +824,7 @@ virCPUppc64DriverGetModels(char ***models)
 struct cpuArchDriver cpuDriverPPC64 = {
     .name       = "ppc64",
     .arch       = archs,
-    .narch      = ARRAY_CARDINALITY(archs),
+    .narch      = G_N_ELEMENTS(archs),
     .compare    = virCPUppc64Compare,
     .decode     = ppc64DriverDecode,
     .encode     = NULL,
index 712e249f233c0af17b5e9dfb28c71ac1fd7d7f57..a4a381f4b899faec7cd149e3a1d1f952874f99f5 100644 (file)
@@ -114,7 +114,7 @@ virCPUs390ValidateFeatures(virCPUDefPtr cpu)
 struct cpuArchDriver cpuDriverS390 = {
     .name = "s390",
     .arch = archs,
-    .narch = ARRAY_CARDINALITY(archs),
+    .narch = G_N_ELEMENTS(archs),
     .compare    = virCPUs390Compare,
     .decode     = NULL,
     .encode     = NULL,
index b2b16ca51238d14f8285fcef3ed15c0e918e12a3..70159a6613408cd99c520cd710d192827ad0092f 100644 (file)
@@ -68,7 +68,7 @@ struct _virCPUx86Feature {
     { \
         .name = (char *) Name, \
         .data = { \
-            .len = ARRAY_CARDINALITY(Name ## _data), \
+            .len = G_N_ELEMENTS(Name ## _data), \
             .items = Name ## _data, \
         } \
     }
@@ -364,7 +364,7 @@ static virCPUx86FeaturePtr
 x86FeatureFindInternal(const char *name)
 {
     size_t i;
-    size_t count = ARRAY_CARDINALITY(x86_kvm_features);
+    size_t count = G_N_ELEMENTS(x86_kvm_features);
 
     for (i = 0; i < count; i++) {
         if (STREQ(x86_kvm_features[i].name, name))
@@ -1757,7 +1757,7 @@ x86Compute(virCPUDefPtr host,
     if (cpu->arch != VIR_ARCH_NONE) {
         bool found = false;
 
-        for (i = 0; i < ARRAY_CARDINALITY(archs); i++) {
+        for (i = 0; i < G_N_ELEMENTS(archs); i++) {
             if (archs[i] == cpu->arch) {
                 found = true;
                 break;
@@ -3422,7 +3422,7 @@ virCPUx86FeatureFilterDropMSR(const char *name,
 struct cpuArchDriver cpuDriverX86 = {
     .name = "x86",
     .arch = archs,
-    .narch = ARRAY_CARDINALITY(archs),
+    .narch = G_N_ELEMENTS(archs),
     .compare    = virCPUx86Compare,
     .decode     = x86DecodeCPUData,
     .encode     = x86Encode,
index fc21a7b6ebed4af7da44673cbeb39d7efa42f578..004434c45423b8719bb64f431aea370442e3af84 100644 (file)
@@ -547,7 +547,7 @@ ESX_VI__TEMPLATE__FREE(SharedCURL,
     if (item->handle)
         curl_share_cleanup(item->handle);
 
-    for (i = 0; i < ARRAY_CARDINALITY(item->locks); ++i)
+    for (i = 0; i < G_N_ELEMENTS(item->locks); ++i)
         virMutexDestroy(&item->locks[i]);
 })
 
@@ -587,7 +587,7 @@ esxVI_SharedCURL_Add(esxVI_SharedCURL *shared, esxVI_CURL *curl)
         curl_share_setopt(shared->handle, CURLSHOPT_SHARE,
                           CURL_LOCK_DATA_DNS);
 
-        for (i = 0; i < ARRAY_CARDINALITY(shared->locks); ++i) {
+        for (i = 0; i < G_N_ELEMENTS(shared->locks); ++i) {
             if (virMutexInit(&shared->locks[i]) < 0) {
                 virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                                _("Could not initialize a CURL (share) mutex"));
index 59c58a72e157c2b65dbbd28b006c09ebbbd6b45b..25df0560af4caeb23e589f3965eb1073ba891c83 100644 (file)
@@ -91,7 +91,6 @@
     ((a) ? !(b) || STRNEQ((a), (b)) : !!(b))
 
 #define NUL_TERMINATE(buf) do { (buf)[sizeof(buf)-1] = '\0'; } while (0)
-#define ARRAY_CARDINALITY(Array) (sizeof(Array) / sizeof(*(Array)))
 
 /**
  * G_GNUC_NO_INLINE:
index 6b12ff5a0319e188fbf16d33987ac06e1d78cfe5..68e8ffff3c67089556b467e2d8300226de0ccfdd 100644 (file)
@@ -3323,7 +3323,7 @@ virDomainMigrateUnmanagedProto2(virDomainPtr domain,
     unsigned long long bandwidth = 0;
 
     if (!virTypedParamsCheck(params, nparams, compatParams,
-                             ARRAY_CARDINALITY(compatParams))) {
+                             G_N_ELEMENTS(compatParams))) {
         virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                        _("Some parameters are not supported by migration "
                          "protocol 2"));
@@ -3372,7 +3372,7 @@ virDomainMigrateUnmanagedProto3(virDomainPtr domain,
     unsigned long long bandwidth = 0;
 
     if (!virTypedParamsCheck(params, nparams, compatParams,
-                             ARRAY_CARDINALITY(compatParams))) {
+                             G_N_ELEMENTS(compatParams))) {
         virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                        _("Some parameters are not supported by migration "
                          "protocol 3"));
@@ -3933,7 +3933,7 @@ virDomainMigrate3(virDomainPtr domain,
     }
 
     if (!virTypedParamsCheck(params, nparams, compatParams,
-                             ARRAY_CARDINALITY(compatParams))) {
+                             G_N_ELEMENTS(compatParams))) {
         virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                        _("Migration APIs with extensible parameters are not "
                          "supported but extended parameters were passed"));
index d7b1b8227736f17bb513a32b8705e65106703eb5..221a1b7a4353a80e7b0c0cf99003f863f81cb05a 100644 (file)
@@ -1551,7 +1551,7 @@ virNodeGetCPUMap(virConnectPtr conn,
  * Example how to use this API:
  *
  *   unsigned int pages[] = { 4, 2048, 1048576}
- *   unsigned int npages = ARRAY_CARDINALITY(pages);
+ *   unsigned int npages = G_N_ELEMENTS(pages);
  *   int startcell = 0;
  *   unsigned int cellcount = 2;
  *
index 65c68ffb52d613722b15866697323df87a75cd99..54a8c090b06876950561ad9b90fff573ad79bbde 100644 (file)
@@ -134,11 +134,11 @@ libxlCapsNodeData(virCPUDefPtr cpu, libxl_hwcap hwcap,
     if (!(cpudata = virCPUDataNew(cpu->arch)))
         goto error;
 
-    ncaps = ARRAY_CARDINALITY(cpuid);
+    ncaps = G_N_ELEMENTS(cpuid);
     if (libxlCapsAddCPUID(cpudata, cpuid, ncaps) < 0)
         goto error;
 
-    ncaps = ARRAY_CARDINALITY(cpuid_ver1);
+    ncaps = G_N_ELEMENTS(cpuid_ver1);
     if (version > LIBXL_HWCAP_V0 &&
         libxlCapsAddCPUID(cpudata, cpuid_ver1, ncaps) < 0)
         goto error;
@@ -471,7 +471,7 @@ libxlCapsInitGuests(libxl_ctx *ctx, virCapsPtr caps)
             }
 
             /* Too many arch flavours - highly unlikely ! */
-            if (i >= ARRAY_CARDINALITY(guest_archs))
+            if (i >= G_N_ELEMENTS(guest_archs))
                 continue;
             /* Didn't find a match, so create a new one */
             if (i == nr_guest_archs)
@@ -500,7 +500,7 @@ libxlCapsInitGuests(libxl_ctx *ctx, virCapsPtr caps)
 #ifdef HAVE_XEN_PVH
             if (hvm && i == nr_guest_archs-1) {
                 /* Ensure we have not exhausted the guest_archs array */
-                if (nr_guest_archs >= ARRAY_CARDINALITY(guest_archs))
+                if (nr_guest_archs >= G_N_ELEMENTS(guest_archs))
                     continue;
                 i = nr_guest_archs;
                 nr_guest_archs++;
index 7153a82e203c172202f3b11dc18e04d5a08c0b82..59398a0a4dea65b3d7b3044c0e603622a8729f9d 100644 (file)
@@ -5339,7 +5339,7 @@ libxlDiskPathToID(const char *virtpath)
     fmt = id = -1;
 
     /* Find any disk prefixes we know about */
-    for (i = 0; i < ARRAY_CARDINALITY(drive_prefix); i++) {
+    for (i = 0; i < G_N_ELEMENTS(drive_prefix); i++) {
         if (STRPREFIX(virtpath, drive_prefix[i]) &&
             !virDiskNameParse(virtpath, &disk, &partition)) {
             fmt = i;
index ea325bf2cbd40a213d33d1956a3458bd4f44d874..8a41e9374d8c6d76265cff91b45b1dfb032cbc5b 100644 (file)
@@ -860,7 +860,7 @@ static void libxlTunnel3MigrationSrcFunc(void *arg)
 
         fds[0].events = POLLIN;
         fds[0].revents = 0;
-        ret = poll(fds, ARRAY_CARDINALITY(fds), timeout);
+        ret = poll(fds, G_N_ELEMENTS(fds), timeout);
         if (ret < 0) {
             if (errno == EAGAIN || errno == EINTR)
                 continue;
@@ -1138,7 +1138,7 @@ static int virConnectCredType[] = {
 
 static virConnectAuth virConnectAuthConfig = {
     .credtype = virConnectCredType,
-    .ncredtype = ARRAY_CARDINALITY(virConnectCredType),
+    .ncredtype = G_N_ELEMENTS(virConnectCredType),
 };
 
 /* On P2P mode there is only the Perform3 phase and we need to handle
index 015f0aa620d5dbdd212d885881cbf1d153326852..9e3d307078925c9816d7993e0d111ded91c7d81b 100644 (file)
@@ -250,7 +250,7 @@ xenTranslateCPUFeature(const char *feature_name, bool from_libxl)
     };
     size_t i;
 
-    for (i = 0; i < ARRAY_CARDINALITY(translation_table); i++)
+    for (i = 0; i < G_N_ELEMENTS(translation_table); i++)
         if (STREQ(translation_table[i][from_libxl], feature_name))
             return translation_table[i][!from_libxl];
     return feature_name;
index d91ac83c45f5893ce2064bcbe79e75bb5bec8a49..bc281eac541b9803441844833bda30cfb33b92c0 100644 (file)
@@ -50,7 +50,7 @@ static int virDomainLockManagerAddLease(virLockManagerPtr lock,
           .value = { .str = lease->lockspace },
         },
     };
-    size_t nparams = ARRAY_CARDINALITY(lparams);
+    size_t nparams = G_N_ELEMENTS(lparams);
     if (!lease->lockspace)
         nparams--;
 
@@ -137,7 +137,7 @@ static virLockManagerPtr virDomainLockManagerNew(virLockManagerPluginPtr plugin,
 
     if (!(lock = virLockManagerNew(virLockManagerPluginGetDriver(plugin),
                                    VIR_LOCK_MANAGER_OBJECT_TYPE_DOMAIN,
-                                   ARRAY_CARDINALITY(params),
+                                   G_N_ELEMENTS(params),
                                    params,
                                    flags)))
         goto error;
index 59167d7d318e6991424ea8ae81aa1724da31b5da..baffaa6de9581e2ec213a58c224de0c4e0b49b2f 100644 (file)
@@ -314,7 +314,7 @@ virLockDaemonNewPostExecRestart(virJSONValuePtr object, bool privileged)
     }
 
     if (!(lockd->dmn = virNetDaemonNewPostExecRestart(child,
-                                                      ARRAY_CARDINALITY(serverNames),
+                                                      G_N_ELEMENTS(serverNames),
                                                       serverNames,
                                                       virLockDaemonNewServerPostExecRestart,
                                                       (void*)(intptr_t)(privileged ? 0x1 : 0x0))))
@@ -1317,7 +1317,7 @@ int main(int argc, char **argv) {
         }
 
         if (virSystemdGetActivation(actmap,
-                                    ARRAY_CARDINALITY(actmap),
+                                    G_N_ELEMENTS(actmap),
                                     &act) < 0) {
             ret = VIR_LOCK_DAEMON_ERR_NETWORK;
             goto cleanup;
index e07db8a6df1e32d9472f5b0f3d4cedd314d4dc90..50deccfd67c17e1de3fb3f6c763306494f60ffe1 100644 (file)
@@ -63,7 +63,7 @@ main(int argc, char **argv)
     };
     virConnectAuth auth = {
         .credtype = authTypes,
-        .ncredtype = ARRAY_CARDINALITY(authTypes),
+        .ncredtype = G_N_ELEMENTS(authTypes),
         .cb = authCallback,
     };
 
index e56dbf291971cc57501da2d5d6ca88a75fce2ca1..c667e3118545708ef1baab6e6f109cb712966309 100644 (file)
@@ -266,7 +266,7 @@ virLogDaemonNewPostExecRestart(virJSONValuePtr object, bool privileged,
     }
 
     if (!(logd->dmn = virNetDaemonNewPostExecRestart(child,
-                                                     ARRAY_CARDINALITY(serverNames),
+                                                     G_N_ELEMENTS(serverNames),
                                                      serverNames,
                                                      virLogDaemonNewServerPostExecRestart,
                                                      (void*)(intptr_t)(privileged ? 0x1 : 0x0))))
@@ -1090,7 +1090,7 @@ int main(int argc, char **argv) {
         }
 
         if (virSystemdGetActivation(actmap,
-                                    ARRAY_CARDINALITY(actmap),
+                                    G_N_ELEMENTS(actmap),
                                     &act) < 0) {
             ret = VIR_LOG_DAEMON_ERR_NETWORK;
             goto cleanup;
index 7fcbbb424afb16f9bb3c9f828b44fe67debf1475..5002356fe71332bd52e7d66637912b007e7964d5 100644 (file)
@@ -823,7 +823,7 @@ bool lxcIsBasicMountLocation(const char *path)
 {
     size_t i;
 
-    for (i = 0; i < ARRAY_CARDINALITY(lxcBasicMounts); i++) {
+    for (i = 0; i < G_N_ELEMENTS(lxcBasicMounts); i++) {
         if (STREQ(path, lxcBasicMounts[i].dst))
             return true;
     }
@@ -900,7 +900,7 @@ static int lxcContainerMountBasicFS(bool userns_enabled,
 
     VIR_DEBUG("Mounting basic filesystems");
 
-    for (i = 0; i < ARRAY_CARDINALITY(lxcBasicMounts); i++) {
+    for (i = 0; i < G_N_ELEMENTS(lxcBasicMounts); i++) {
         bool bindOverReadonly;
         virLXCBasicMountInfo const *mnt = &lxcBasicMounts[i];
 
@@ -1126,7 +1126,7 @@ static int lxcContainerSetupDevices(char **ttyPaths, size_t nttyPaths)
         { "/proc/self/fd", "/dev/fd" },
     };
 
-    for (i = 0; i < ARRAY_CARDINALITY(links); i++) {
+    for (i = 0; i < G_N_ELEMENTS(links); i++) {
         if (symlink(links[i].src, links[i].dst) < 0) {
             virReportSystemError(errno,
                                  _("Failed to symlink device %s to %s"),
index a1f4ae88126cf86834dcd2a055e66c641e9e580c..3c4e68524cd41c39c530461d8641a514e3df6331 100644 (file)
@@ -1521,7 +1521,7 @@ static int virLXCControllerPopulateDevices(virLXCControllerPtr ctrl)
         goto cleanup;
 
     /* Populate /dev/ with a few important bits */
-    for (i = 0; i < ARRAY_CARDINALITY(devs); i++) {
+    for (i = 0; i < G_N_ELEMENTS(devs); i++) {
         if (virAsprintf(&path, "/%s/%s.dev/%s",
                         LXC_STATE_DIR, ctrl->def->name, devs[i].path) < 0)
             goto cleanup;
index 4e67e29293a81804e3b2d89129bfb55a3d23cb39..028e401236de064baadd1a9f9aee15222de527c3 100644 (file)
@@ -171,7 +171,7 @@ virLXCMonitorPtr virLXCMonitorNew(virDomainObjPtr vm,
     if (!(mon->program = virNetClientProgramNew(VIR_LXC_MONITOR_PROGRAM,
                                                 VIR_LXC_MONITOR_PROGRAM_VERSION,
                                                 virLXCMonitorEvents,
-                                                ARRAY_CARDINALITY(virLXCMonitorEvents),
+                                                G_N_ELEMENTS(virLXCMonitorEvents),
                                                 mon)))
         goto error;
 
index b046f03c835dda02f9964085f98bb61288b0b857..32e99bc830da3daf75a1019ff3d3c849f9b2875d 100644 (file)
@@ -362,7 +362,7 @@ gather_capability(LibHalContext *ctx, const char *udi,
 {
     caps_tbl_entry *entry;
 
-    entry = bsearch(&cap_name, caps_tbl, ARRAY_CARDINALITY(caps_tbl),
+    entry = bsearch(&cap_name, caps_tbl, G_N_ELEMENTS(caps_tbl),
                     sizeof(caps_tbl[0]), cmpstringp);
 
     if (entry) {
@@ -604,7 +604,7 @@ nodeStateInitialize(bool privileged G_GNUC_UNUSED,
     DBusError err;
 
     /* Ensure caps_tbl is sorted by capability name */
-    qsort(caps_tbl, ARRAY_CARDINALITY(caps_tbl), sizeof(caps_tbl[0]),
+    qsort(caps_tbl, G_N_ELEMENTS(caps_tbl), sizeof(caps_tbl[0]),
           cmpstringp);
 
     if (VIR_ALLOC(driver) < 0)
index 80d39e9509e4300b0ba554459cdc1190a56d9e3b..75cf576c3c42cef4bcf47642001a1e385058ed62 100644 (file)
@@ -1425,7 +1425,7 @@ udevEnumerateAddMatches(struct udev_enumerate *udev_enumerate)
 {
     size_t i;
 
-    for (i = 0; i < ARRAY_CARDINALITY(subsystem_blacklist); i++) {
+    for (i = 0; i < G_N_ELEMENTS(subsystem_blacklist); i++) {
         const char *s = subsystem_blacklist[i];
         if (udev_enumerate_add_nomatch_subsystem(udev_enumerate, s) < 0) {
             virReportSystemError(errno, "%s", _("failed to add susbsystem filter"));
index dae2ad611dab27269d856436456b33a796b20038..90f3933959e2a16f08ca8e9fbda6aa4a854994a1 100644 (file)
@@ -1382,7 +1382,7 @@ virNWFilterDHCPSnoopThread(void *req0)
     virNWFilterSnoopReqLock(req);
 
     if (req->binding->portdevname && req->threadkey) {
-        for (i = 0; i < ARRAY_CARDINALITY(pcapConf); i++) {
+        for (i = 0; i < G_N_ELEMENTS(pcapConf); i++) {
             pcapConf[i].handle =
                 virNWFilterSnoopDHCPOpen(req->binding->portdevname,
                                          &req->binding->mac,
@@ -1419,7 +1419,7 @@ virNWFilterDHCPSnoopThread(void *req0)
 
     while (!error) {
         if (virNWFilterSnoopAdjustPoll(pcapConf,
-                                       ARRAY_CARDINALITY(pcapConf),
+                                       G_N_ELEMENTS(pcapConf),
                                        fds, &pollTo) < 0) {
             break;
         }
@@ -1428,7 +1428,7 @@ virNWFilterDHCPSnoopThread(void *req0)
         if (pollTo < 0 || pollTo > SNOOP_POLL_MAX_TIMEOUT_MS)
             pollTo = SNOOP_POLL_MAX_TIMEOUT_MS;
 
-        n = poll(fds, ARRAY_CARDINALITY(fds), pollTo);
+        n = poll(fds, G_N_ELEMENTS(fds), pollTo);
 
         if (n < 0) {
             if (errno != EAGAIN && errno != EINTR)
@@ -1445,7 +1445,7 @@ virNWFilterDHCPSnoopThread(void *req0)
             req->jobCompletionStatus != 0)
             goto exit;
 
-        for (i = 0; n > 0 && i < ARRAY_CARDINALITY(fds); i++) {
+        for (i = 0; n > 0 && i < G_N_ELEMENTS(fds); i++) {
             if (!fds[i].revents)
                 continue;
 
@@ -1567,7 +1567,7 @@ virNWFilterDHCPSnoopThread(void *req0)
 
     VIR_FREE(threadkey);
 
-    for (i = 0; i < ARRAY_CARDINALITY(pcapConf); i++) {
+    for (i = 0; i < G_N_ELEMENTS(pcapConf); i++) {
         if (pcapConf[i].handle)
             pcap_close(pcapConf[i].handle);
     }
index 36bc3b06da2082518414df6ab5c300b18386fd0f..d7754c0c7aab53743216db67f8b203e3f7d5bb0a 100644 (file)
@@ -479,7 +479,7 @@ learnIPAddressThread(void *arg)
     pcap_freecode(&fp);
 
     while (req->status == 0 && vmaddr == 0) {
-        int n = poll(fds, ARRAY_CARDINALITY(fds), PKT_TIMEOUT_MS);
+        int n = poll(fds, G_N_ELEMENTS(fds), PKT_TIMEOUT_MS);
 
         if (threadsTerminate || req->terminate) {
             req->status = ECANCELED;
index 572ca9e2cb80bbf41c10d8efa0d786c493d98f5d..2b4dd7c9bb2fade4f301fb4e84d7e7cc3ed46d9e 100644 (file)
@@ -127,7 +127,7 @@ waitsocket(int socket_fd, LIBSSH2_SESSION * session)
     if (dir & LIBSSH2_SESSION_BLOCK_OUTBOUND)
         fds[0].events |= POLLOUT;
 
-    return poll(fds, ARRAY_CARDINALITY(fds), -1);
+    return poll(fds, G_N_ELEMENTS(fds), -1);
 }
 
 /* this function is the layer that manipulates the ssh channel itself
index 62edb665a7dd5155f468cfb721eb48b0b4224cba..9e4b4d802ec996252db6e9b04ef73d04101f6b9e 100644 (file)
@@ -264,7 +264,7 @@ qemuAgentIOProcessEvent(qemuAgentPtr mon,
     }
 
 /*
-    for (i = 0; i < ARRAY_CARDINALITY(eventHandlers); i++) {
+    for (i = 0; i < G_N_ELEMENTS(eventHandlers); i++) {
         if (STREQ(eventHandlers[i].type, type)) {
             virJSONValuePtr data = virJSONValueObjectGet(obj, "data");
             VIR_DEBUG("handle %s handler=%p data=%p", type,
index cbd4ebc8ea094129b360f7daba2e6bb5d6dd60bd..efd71d69c5eff5d2b10dce470123ca054d6c4e1b 100644 (file)
@@ -1313,103 +1313,103 @@ typedef int (*virQEMUCapsObjectTypePropsCB)(qemuMonitorPtr mon,
 
 static virQEMUCapsObjectTypeProps virQEMUCapsDeviceProps[] = {
     { "virtio-blk-pci", virQEMUCapsDevicePropsVirtioBlk,
-      ARRAY_CARDINALITY(virQEMUCapsDevicePropsVirtioBlk),
+      G_N_ELEMENTS(virQEMUCapsDevicePropsVirtioBlk),
       -1 },
     { "virtio-net-pci", virQEMUCapsDevicePropsVirtioNet,
-      ARRAY_CARDINALITY(virQEMUCapsDevicePropsVirtioNet),
+      G_N_ELEMENTS(virQEMUCapsDevicePropsVirtioNet),
       QEMU_CAPS_DEVICE_VIRTIO_NET },
     { "virtio-scsi-pci", virQEMUCapsDevicePropsVirtioSCSI,
-      ARRAY_CARDINALITY(virQEMUCapsDevicePropsVirtioSCSI),
+      G_N_ELEMENTS(virQEMUCapsDevicePropsVirtioSCSI),
       QEMU_CAPS_VIRTIO_SCSI },
     { "virtio-blk-ccw", virQEMUCapsDevicePropsVirtioBlk,
-      ARRAY_CARDINALITY(virQEMUCapsDevicePropsVirtioBlk),
+      G_N_ELEMENTS(virQEMUCapsDevicePropsVirtioBlk),
       QEMU_CAPS_VIRTIO_CCW },
     { "virtio-net-ccw", virQEMUCapsDevicePropsVirtioNet,
-      ARRAY_CARDINALITY(virQEMUCapsDevicePropsVirtioNet),
+      G_N_ELEMENTS(virQEMUCapsDevicePropsVirtioNet),
       QEMU_CAPS_DEVICE_VIRTIO_NET },
     { "virtio-scsi-ccw", virQEMUCapsDevicePropsVirtioSCSI,
-      ARRAY_CARDINALITY(virQEMUCapsDevicePropsVirtioSCSI),
+      G_N_ELEMENTS(virQEMUCapsDevicePropsVirtioSCSI),
       QEMU_CAPS_VIRTIO_SCSI },
     { "virtio-blk-s390", virQEMUCapsDevicePropsVirtioBlk,
-      ARRAY_CARDINALITY(virQEMUCapsDevicePropsVirtioBlk),
+      G_N_ELEMENTS(virQEMUCapsDevicePropsVirtioBlk),
       QEMU_CAPS_VIRTIO_S390 },
     { "virtio-net-s390", virQEMUCapsDevicePropsVirtioNet,
-      ARRAY_CARDINALITY(virQEMUCapsDevicePropsVirtioNet),
+      G_N_ELEMENTS(virQEMUCapsDevicePropsVirtioNet),
       QEMU_CAPS_DEVICE_VIRTIO_NET },
     { "vfio-pci", virQEMUCapsDevicePropsVfioPCI,
-      ARRAY_CARDINALITY(virQEMUCapsDevicePropsVfioPCI),
+      G_N_ELEMENTS(virQEMUCapsDevicePropsVfioPCI),
       QEMU_CAPS_DEVICE_VFIO_PCI },
     { "scsi-hd", virQEMUCapsDevicePropsSCSIDisk,
-      ARRAY_CARDINALITY(virQEMUCapsDevicePropsSCSIDisk),
+      G_N_ELEMENTS(virQEMUCapsDevicePropsSCSIDisk),
       -1 },
     { "ide-hd", virQEMUCapsDevicePropsIDEDrive,
-      ARRAY_CARDINALITY(virQEMUCapsDevicePropsIDEDrive),
+      G_N_ELEMENTS(virQEMUCapsDevicePropsIDEDrive),
       -1 },
     { "PIIX4_PM", virQEMUCapsDevicePropsPiix4PM,
-      ARRAY_CARDINALITY(virQEMUCapsDevicePropsPiix4PM),
+      G_N_ELEMENTS(virQEMUCapsDevicePropsPiix4PM),
       -1 },
     { "usb-redir", virQEMUCapsDevicePropsUSBRedir,
-      ARRAY_CARDINALITY(virQEMUCapsDevicePropsUSBRedir),
+      G_N_ELEMENTS(virQEMUCapsDevicePropsUSBRedir),
       QEMU_CAPS_USB_REDIR },
     { "i440FX-pcihost", virQEMUCapsDevicePropsI440FXPCIHost,
-      ARRAY_CARDINALITY(virQEMUCapsDevicePropsI440FXPCIHost),
+      G_N_ELEMENTS(virQEMUCapsDevicePropsI440FXPCIHost),
       -1 },
     { "q35-pcihost", virQEMUCapsDevicePropsQ35PCIHost,
-      ARRAY_CARDINALITY(virQEMUCapsDevicePropsQ35PCIHost),
+      G_N_ELEMENTS(virQEMUCapsDevicePropsQ35PCIHost),
       -1 },
     { "usb-storage", virQEMUCapsDevicePropsUSBStorage,
-      ARRAY_CARDINALITY(virQEMUCapsDevicePropsUSBStorage),
+      G_N_ELEMENTS(virQEMUCapsDevicePropsUSBStorage),
       QEMU_CAPS_DEVICE_USB_STORAGE },
     { "kvm-pit", virQEMUCapsDevicePropsKVMPit,
-      ARRAY_CARDINALITY(virQEMUCapsDevicePropsKVMPit),
+      G_N_ELEMENTS(virQEMUCapsDevicePropsKVMPit),
       -1 },
     { "VGA", virQEMUCapsDevicePropsVGA,
-      ARRAY_CARDINALITY(virQEMUCapsDevicePropsVGA),
+      G_N_ELEMENTS(virQEMUCapsDevicePropsVGA),
       QEMU_CAPS_DEVICE_VGA },
     { "vmware-svga", virQEMUCapsDevicePropsVmwareSvga,
-      ARRAY_CARDINALITY(virQEMUCapsDevicePropsVmwareSvga),
+      G_N_ELEMENTS(virQEMUCapsDevicePropsVmwareSvga),
       QEMU_CAPS_DEVICE_VMWARE_SVGA },
     { "qxl", virQEMUCapsDevicePropsQxl,
-      ARRAY_CARDINALITY(virQEMUCapsDevicePropsQxl),
+      G_N_ELEMENTS(virQEMUCapsDevicePropsQxl),
       QEMU_CAPS_DEVICE_QXL },
     { "virtio-gpu-pci", virQEMUCapsDevicePropsVirtioGpu,
-      ARRAY_CARDINALITY(virQEMUCapsDevicePropsVirtioGpu),
+      G_N_ELEMENTS(virQEMUCapsDevicePropsVirtioGpu),
       QEMU_CAPS_DEVICE_VIRTIO_GPU },
     { "virtio-gpu-device", virQEMUCapsDevicePropsVirtioGpu,
-      ARRAY_CARDINALITY(virQEMUCapsDevicePropsVirtioGpu),
+      G_N_ELEMENTS(virQEMUCapsDevicePropsVirtioGpu),
       QEMU_CAPS_DEVICE_VIRTIO_GPU },
     { "ICH9-LPC", virQEMUCapsDevicePropsICH9,
-      ARRAY_CARDINALITY(virQEMUCapsDevicePropsICH9),
+      G_N_ELEMENTS(virQEMUCapsDevicePropsICH9),
       -1 },
     { "virtio-balloon-pci", virQEMUCapsDevicePropsVirtioBalloon,
-      ARRAY_CARDINALITY(virQEMUCapsDevicePropsVirtioBalloon),
+      G_N_ELEMENTS(virQEMUCapsDevicePropsVirtioBalloon),
       -1 },
     { "virtio-balloon-ccw", virQEMUCapsDevicePropsVirtioBalloon,
-      ARRAY_CARDINALITY(virQEMUCapsDevicePropsVirtioBalloon),
+      G_N_ELEMENTS(virQEMUCapsDevicePropsVirtioBalloon),
       -1 },
     { "virtio-balloon-device", virQEMUCapsDevicePropsVirtioBalloon,
-      ARRAY_CARDINALITY(virQEMUCapsDevicePropsVirtioBalloon),
+      G_N_ELEMENTS(virQEMUCapsDevicePropsVirtioBalloon),
       -1 },
     { "nec-usb-xhci", virQEMUCapsDevicePropsUSBNECXHCI,
-      ARRAY_CARDINALITY(virQEMUCapsDevicePropsUSBNECXHCI),
+      G_N_ELEMENTS(virQEMUCapsDevicePropsUSBNECXHCI),
       QEMU_CAPS_NEC_USB_XHCI },
     { "intel-iommu", virQEMUCapsDevicePropsIntelIOMMU,
-      ARRAY_CARDINALITY(virQEMUCapsDevicePropsIntelIOMMU),
+      G_N_ELEMENTS(virQEMUCapsDevicePropsIntelIOMMU),
       QEMU_CAPS_DEVICE_INTEL_IOMMU },
     { "spapr-pci-host-bridge", virQEMUCapsDevicePropsSpaprPCIHostBridge,
-      ARRAY_CARDINALITY(virQEMUCapsDevicePropsSpaprPCIHostBridge),
+      G_N_ELEMENTS(virQEMUCapsDevicePropsSpaprPCIHostBridge),
       QEMU_CAPS_DEVICE_SPAPR_PCI_HOST_BRIDGE },
     { "virtio-gpu-ccw", virQEMUCapsDevicePropsVirtioGpu,
-      ARRAY_CARDINALITY(virQEMUCapsDevicePropsVirtioGpu),
+      G_N_ELEMENTS(virQEMUCapsDevicePropsVirtioGpu),
       QEMU_CAPS_DEVICE_VIRTIO_GPU_CCW },
     { "virtual-css-bridge", virQEMUCapsObjectPropsVirtualCSSBridge,
-      ARRAY_CARDINALITY(virQEMUCapsObjectPropsVirtualCSSBridge),
+      G_N_ELEMENTS(virQEMUCapsObjectPropsVirtualCSSBridge),
       QEMU_CAPS_CCW },
     { "mch", virQEMUCapsDevicePropsMCH,
-      ARRAY_CARDINALITY(virQEMUCapsDevicePropsMCH),
+      G_N_ELEMENTS(virQEMUCapsDevicePropsMCH),
       QEMU_CAPS_DEVICE_MCH },
     { "nvdimm", virQEMUCapsDevicePropsNVDIMM,
-      ARRAY_CARDINALITY(virQEMUCapsDevicePropsNVDIMM),
+      G_N_ELEMENTS(virQEMUCapsDevicePropsNVDIMM),
       QEMU_CAPS_DEVICE_NVDIMM },
 };
 
@@ -1429,13 +1429,13 @@ static struct virQEMUCapsStringFlags virQEMUCapsObjectPropsMaxX86CPU[] = {
 
 static virQEMUCapsObjectTypeProps virQEMUCapsObjectProps[] = {
     { "memory-backend-file", virQEMUCapsObjectPropsMemoryBackendFile,
-      ARRAY_CARDINALITY(virQEMUCapsObjectPropsMemoryBackendFile),
+      G_N_ELEMENTS(virQEMUCapsObjectPropsMemoryBackendFile),
       QEMU_CAPS_OBJECT_MEMORY_FILE },
     { "memory-backend-memfd", virQEMUCapsObjectPropsMemoryBackendMemfd,
-      ARRAY_CARDINALITY(virQEMUCapsObjectPropsMemoryBackendMemfd),
+      G_N_ELEMENTS(virQEMUCapsObjectPropsMemoryBackendMemfd),
       QEMU_CAPS_OBJECT_MEMORY_MEMFD },
     { "max-x86_64-cpu", virQEMUCapsObjectPropsMaxX86CPU,
-      ARRAY_CARDINALITY(virQEMUCapsObjectPropsMaxX86CPU),
+      G_N_ELEMENTS(virQEMUCapsObjectPropsMaxX86CPU),
       QEMU_CAPS_X86_MAX_CPU },
 };
 
@@ -1452,10 +1452,10 @@ static struct virQEMUCapsStringFlags virQEMUCapsMachinePropsVirt[] = {
 
 static virQEMUCapsObjectTypeProps virQEMUCapsMachineProps[] = {
     { "pseries", virQEMUCapsMachinePropsPSeries,
-      ARRAY_CARDINALITY(virQEMUCapsMachinePropsPSeries),
+      G_N_ELEMENTS(virQEMUCapsMachinePropsPSeries),
       -1 },
     { "virt", virQEMUCapsMachinePropsVirt,
-      ARRAY_CARDINALITY(virQEMUCapsMachinePropsVirt),
+      G_N_ELEMENTS(virQEMUCapsMachinePropsVirt),
       -1 },
 };
 
@@ -2171,7 +2171,7 @@ virQEMUCapsProbeQMPCommands(virQEMUCapsPtr qemuCaps,
         return -1;
 
     virQEMUCapsProcessStringFlags(qemuCaps,
-                                  ARRAY_CARDINALITY(virQEMUCapsCommands),
+                                  G_N_ELEMENTS(virQEMUCapsCommands),
                                   virQEMUCapsCommands,
                                   ncommands, commands);
     virStringListFreeCount(commands, ncommands);
@@ -2201,7 +2201,7 @@ virQEMUCapsProbeQMPEvents(virQEMUCapsPtr qemuCaps,
         return -1;
 
     virQEMUCapsProcessStringFlags(qemuCaps,
-                                  ARRAY_CARDINALITY(virQEMUCapsEvents),
+                                  G_N_ELEMENTS(virQEMUCapsEvents),
                                   virQEMUCapsEvents,
                                   nevents, events);
     virStringListFreeCount(events, nevents);
@@ -2249,7 +2249,7 @@ virQEMUCapsProbeQMPDevices(virQEMUCapsPtr qemuCaps,
     if ((nvalues = qemuMonitorGetObjectTypes(mon, &values)) < 0)
         return -1;
     virQEMUCapsProcessStringFlags(qemuCaps,
-                                  ARRAY_CARDINALITY(virQEMUCapsObjectTypes),
+                                  G_N_ELEMENTS(virQEMUCapsObjectTypes),
                                   virQEMUCapsObjectTypes,
                                   nvalues, values);
     virStringListFreeCount(values, nvalues);
@@ -2257,7 +2257,7 @@ virQEMUCapsProbeQMPDevices(virQEMUCapsPtr qemuCaps,
     if (virQEMUCapsProbeQMPGenericProps(qemuCaps,
                                         mon,
                                         virQEMUCapsDeviceProps,
-                                        ARRAY_CARDINALITY(virQEMUCapsDeviceProps),
+                                        G_N_ELEMENTS(virQEMUCapsDeviceProps),
                                         qemuMonitorGetDeviceProps) < 0)
         return -1;
 
@@ -2265,7 +2265,7 @@ virQEMUCapsProbeQMPDevices(virQEMUCapsPtr qemuCaps,
         virQEMUCapsProbeQMPGenericProps(qemuCaps,
                                         mon,
                                         virQEMUCapsObjectProps,
-                                        ARRAY_CARDINALITY(virQEMUCapsObjectProps),
+                                        G_N_ELEMENTS(virQEMUCapsObjectProps),
                                         qemuMonitorGetObjectProps) < 0)
         return -1;
 
@@ -2330,7 +2330,7 @@ static const char *preferredMachines[] =
     "sim", /* VIR_ARCH_XTENSA */
     "sim", /* VIR_ARCH_XTENSAEB */
 };
-verify(ARRAY_CARDINALITY(preferredMachines) == VIR_ARCH_LAST);
+verify(G_N_ELEMENTS(preferredMachines) == VIR_ARCH_LAST);
 
 
 static int
@@ -2412,7 +2412,7 @@ virQEMUCapsProbeQMPMachineProps(virQEMUCapsPtr qemuCaps,
     if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_QOM_LIST_PROPERTIES))
         return 0;
 
-    for (i = 0; i < ARRAY_CARDINALITY(virQEMUCapsMachineProps); i++) {
+    for (i = 0; i < G_N_ELEMENTS(virQEMUCapsMachineProps); i++) {
         virQEMUCapsObjectTypeProps props = virQEMUCapsMachineProps[i];
         const char *canon = virQEMUCapsGetCanonicalMachine(qemuCaps, props.type);
         VIR_AUTOFREE(char *) type = NULL;
@@ -2717,7 +2717,7 @@ virQEMUCapsProbeQMPTPM(virQEMUCapsPtr qemuCaps,
         return -1;
 
     if (nentries > 0) {
-        for (i = 0; i < ARRAY_CARDINALITY(virQEMUCapsTPMModelsToCaps); i++) {
+        for (i = 0; i < G_N_ELEMENTS(virQEMUCapsTPMModelsToCaps); i++) {
             const char *needle = virDomainTPMModelTypeToString(
                 virQEMUCapsTPMModelsToCaps[i].type);
             if (virStringListHasString((const char **)entries, needle))
@@ -2731,7 +2731,7 @@ virQEMUCapsProbeQMPTPM(virQEMUCapsPtr qemuCaps,
         return -1;
 
     if (nentries > 0) {
-        for (i = 0; i < ARRAY_CARDINALITY(virQEMUCapsTPMTypesToCaps); i++) {
+        for (i = 0; i < G_N_ELEMENTS(virQEMUCapsTPMTypesToCaps); i++) {
             const char *needle = virDomainTPMBackendTypeToString(
                 virQEMUCapsTPMTypesToCaps[i].type);
             if (virStringListHasString((const char **)entries, needle))
@@ -2808,7 +2808,7 @@ virQEMUCapsProbeQMPCommandLine(virQEMUCapsPtr qemuCaps,
     char **values;
     size_t i, j;
 
-    for (i = 0; i < ARRAY_CARDINALITY(virQEMUCapsCommandLine); i++) {
+    for (i = 0; i < G_N_ELEMENTS(virQEMUCapsCommandLine); i++) {
         if ((nvalues = qemuMonitorGetCommandLineOptionParameters(mon,
                                                                  virQEMUCapsCommandLine[i].option,
                                                                  &values,
@@ -2841,7 +2841,7 @@ virQEMUCapsProbeQMPMigrationCapabilities(virQEMUCapsPtr qemuCaps,
         return -1;
 
     virQEMUCapsProcessStringFlags(qemuCaps,
-                                  ARRAY_CARDINALITY(virQEMUCapsMigration),
+                                  G_N_ELEMENTS(virQEMUCapsMigration),
                                   virQEMUCapsMigration,
                                   ncaps, caps);
     virStringListFreeCount(caps, ncaps);
@@ -4155,7 +4155,7 @@ virQEMUCapsKVMSupportsNesting(void)
     int rc;
     size_t i;
 
-    for (i = 0; i < ARRAY_CARDINALITY(kmod); i++) {
+    for (i = 0; i < G_N_ELEMENTS(kmod); i++) {
         VIR_FREE(value);
         rc = virFileReadValueString(&value, "/sys/module/%s/parameters/nested",
                                     kmod[i]);
@@ -4513,7 +4513,7 @@ virQEMUCapsProbeQMPSchemaCapabilities(virQEMUCapsPtr qemuCaps,
         return -1;
     schemareply = NULL;
 
-    for (i = 0; i < ARRAY_CARDINALITY(virQEMUCapsQMPSchemaQueries); i++) {
+    for (i = 0; i < G_N_ELEMENTS(virQEMUCapsQMPSchemaQueries); i++) {
         entry = virQEMUCapsQMPSchemaQueries + i;
 
         if (virQEMUQAPISchemaPathExists(entry->value, schema))
@@ -4521,7 +4521,7 @@ virQEMUCapsProbeQMPSchemaCapabilities(virQEMUCapsPtr qemuCaps,
     }
 
     /* probe also for basic event support */
-    for (i = 0; i < ARRAY_CARDINALITY(virQEMUCapsEvents); i++) {
+    for (i = 0; i < G_N_ELEMENTS(virQEMUCapsEvents); i++) {
         entry = virQEMUCapsEvents + i;
 
         if (virQEMUQAPISchemaPathExists(entry->value, schema))
@@ -4816,7 +4816,7 @@ struct virQEMUCapsMachineTypeFilter {
 
 static const struct virQEMUCapsMachineTypeFilter virQEMUCapsMachineFilter[] = {
     /* { "blah", virQEMUCapsMachineBLAHFilter,
-         ARRAY_CARDINALITY(virQEMUCapsMachineBLAHFilter) }, */
+         G_N_ELEMENTS(virQEMUCapsMachineBLAHFilter) }, */
     { "", NULL, 0 },
 };
 
@@ -4830,7 +4830,7 @@ virQEMUCapsFilterByMachineType(virQEMUCapsPtr qemuCaps,
     if (!machineType)
         return;
 
-    for (i = 0; i < ARRAY_CARDINALITY(virQEMUCapsMachineFilter); i++) {
+    for (i = 0; i < G_N_ELEMENTS(virQEMUCapsMachineFilter); i++) {
         const struct virQEMUCapsMachineTypeFilter *filter = &virQEMUCapsMachineFilter[i];
         size_t j;
 
@@ -4977,8 +4977,8 @@ virQEMUCapsCacheLookupByArch(virFileCachePtr cache,
 
     priv->microcodeVersion = virHostCPUGetMicrocodeVersion();
 
-    for (i = 0; i < ARRAY_CARDINALITY(binaryFilters); i++) {
-        for (j = 0; j < ARRAY_CARDINALITY(archs); j++) {
+    for (i = 0; i < G_N_ELEMENTS(binaryFilters); i++) {
+        for (j = 0; j < G_N_ELEMENTS(archs); j++) {
             struct virQEMUCapsSearchData data = {
                 .arch = archs[j],
                 .binaryFilter = binaryFilters[i],
index d2fc7b6f1e330ab8ef7bb7e01c2ed2453333a0b7..c2a19689c5152aa0db50daf4720bd36b2b5ee452 100644 (file)
@@ -3234,7 +3234,7 @@ qemuBuildControllersCommandLine(virCommandPtr cmd,
         VIR_DOMAIN_CONTROLLER_TYPE_VIRTIO_SERIAL,
     };
 
-    for (i = 0; i < ARRAY_CARDINALITY(contOrder); i++) {
+    for (i = 0; i < G_N_ELEMENTS(contOrder); i++) {
         if (qemuBuildControllersByTypeCommandLine(cmd, def, qemuCaps, contOrder[i]) < 0)
             return -1;
     }
index 4df0ca78f5e46fd5ffcdf072955e807e0dc42908..08cd78405417bd4e3b0ce18c5585f02efaa33547 100644 (file)
@@ -1280,7 +1280,7 @@ virCapsPtr virQEMUDriverCreateCapabilities(virQEMUDriverPtr driver)
             VIR_STRDUP(sm->doi, doi) < 0)
             return NULL;
 
-        for (j = 0; j < ARRAY_CARDINALITY(virtTypes); j++) {
+        for (j = 0; j < G_N_ELEMENTS(virtTypes); j++) {
             lbl = qemuSecurityGetBaseLabel(sec_managers[i], virtTypes[j]);
             type = virDomainVirtTypeToString(virtTypes[j]);
             if (lbl &&
index e11c0c8ea2ad96e28f3049e4a0090e9c3d777c6a..c638077aa8bed7cb916928850229f925ab9d0a06 100644 (file)
@@ -11712,7 +11712,7 @@ ppc64VFIODeviceIsNV2Bridge(const char *device)
                                   "ibm,nvlink-speed", "memory-region"};
     size_t i;
 
-    for (i = 0; i < ARRAY_CARDINALITY(nvlink2Files); i++) {
+    for (i = 0; i < G_N_ELEMENTS(nvlink2Files); i++) {
         VIR_AUTOFREE(char *) file = NULL;
 
         if ((virAsprintf(&file, "/sys/bus/pci/devices/%s/of_node/%s",
index 59661fd6b0114537162e4abf4467362bebc289f5..52ef1874aae065efd0547e0a0bad54aa22cdbbc3 100644 (file)
@@ -3149,7 +3149,7 @@ static void qemuMigrationSrcIOFunc(void *arg)
         fds[0].events = fds[1].events = POLLIN;
         fds[0].revents = fds[1].revents = 0;
 
-        ret = poll(fds, ARRAY_CARDINALITY(fds), timeout);
+        ret = poll(fds, G_N_ELEMENTS(fds), timeout);
 
         if (ret < 0) {
             if (errno == EAGAIN || errno == EINTR)
@@ -4395,7 +4395,7 @@ static int virConnectCredType[] = {
 
 static virConnectAuth virConnectAuthConfig = {
     .credtype = virConnectCredType,
-    .ncredtype = ARRAY_CARDINALITY(virConnectCredType),
+    .ncredtype = G_N_ELEMENTS(virConnectCredType),
 };
 
 
index e296fc192768d5f910ccb3f5533ea163ea2a665b..85fa8f8de595a6d0d4cf2223971a3220fefca4c9 100644 (file)
@@ -214,7 +214,7 @@ static const qemuMigrationParamType qemuMigrationParamTypes[] = {
     [QEMU_MIGRATION_PARAM_MAX_POSTCOPY_BANDWIDTH] = QEMU_MIGRATION_PARAM_TYPE_ULL,
     [QEMU_MIGRATION_PARAM_MULTIFD_CHANNELS] = QEMU_MIGRATION_PARAM_TYPE_INT,
 };
-verify(ARRAY_CARDINALITY(qemuMigrationParamTypes) == QEMU_MIGRATION_PARAM_LAST);
+verify(G_N_ELEMENTS(qemuMigrationParamTypes) == QEMU_MIGRATION_PARAM_LAST);
 
 
 virBitmapPtr
@@ -226,7 +226,7 @@ qemuMigrationParamsGetAlwaysOnCaps(qemuMigrationParty party)
     if (!(caps = virBitmapNew(QEMU_MIGRATION_CAP_LAST)))
         return NULL;
 
-    for (i = 0; i < ARRAY_CARDINALITY(qemuMigrationParamsAlwaysOn); i++) {
+    for (i = 0; i < G_N_ELEMENTS(qemuMigrationParamsAlwaysOn); i++) {
         if (!(qemuMigrationParamsAlwaysOn[i].party & party))
             continue;
 
@@ -500,7 +500,7 @@ qemuMigrationParamsFromFlags(virTypedParameterPtr params,
     if (!(migParams = qemuMigrationParamsNew()))
         return NULL;
 
-    for (i = 0; i < ARRAY_CARDINALITY(qemuMigrationParamsFlagMap); i++) {
+    for (i = 0; i < G_N_ELEMENTS(qemuMigrationParamsFlagMap); i++) {
         qemuMigrationCapability cap = qemuMigrationParamsFlagMap[i].cap;
 
         if (qemuMigrationParamsFlagMap[i].party & party &&
@@ -511,7 +511,7 @@ qemuMigrationParamsFromFlags(virTypedParameterPtr params,
         }
     }
 
-    for (i = 0; i < ARRAY_CARDINALITY(qemuMigrationParamsTPMap); i++) {
+    for (i = 0; i < G_N_ELEMENTS(qemuMigrationParamsTPMap); i++) {
         const qemuMigrationParamsTPMapItem *item = &qemuMigrationParamsTPMap[i];
 
         if (!(item->party & party))
@@ -590,7 +590,7 @@ qemuMigrationParamsDump(qemuMigrationParamsPtr migParams,
             return -1;
     }
 
-    for (i = 0; i < ARRAY_CARDINALITY(qemuMigrationParamsTPMap); i++) {
+    for (i = 0; i < G_N_ELEMENTS(qemuMigrationParamsTPMap); i++) {
         const qemuMigrationParamsTPMapItem *item = &qemuMigrationParamsTPMap[i];
 
         if (!(item->party & QEMU_MIGRATION_DESTINATION))
@@ -1149,7 +1149,7 @@ qemuMigrationParamsCheck(virQEMUDriverPtr driver,
         }
     }
 
-    for (i = 0; i < ARRAY_CARDINALITY(qemuMigrationParamsAlwaysOn); i++) {
+    for (i = 0; i < G_N_ELEMENTS(qemuMigrationParamsAlwaysOn); i++) {
         cap = qemuMigrationParamsAlwaysOn[i].cap;
 
         if (qemuMigrationParamsAlwaysOn[i].party & party &&
index 1e55b166fae2ced00d99af268ca4f147c65b3083..d3447dd2f366085ada854351589d13aed4abdcf0 100644 (file)
@@ -200,7 +200,7 @@ qemuMonitorJSONIOProcessEvent(qemuMonitorPtr mon,
     qemuMonitorEmitEvent(mon, type, seconds, micros, details);
     VIR_FREE(details);
 
-    handler = bsearch(type, eventHandlers, ARRAY_CARDINALITY(eventHandlers),
+    handler = bsearch(type, eventHandlers, G_N_ELEMENTS(eventHandlers),
                       sizeof(eventHandlers[0]), qemuMonitorEventCompare);
     if (handler) {
         VIR_DEBUG("handle %s handler=%p data=%p", type,
index 5101ed6aaec5e0096b09a04c3f88195512f36020..2fc56dcfa4963a1df764e083ce3104a2d97bdb6a 100644 (file)
@@ -357,7 +357,7 @@ virQEMUQAPISchemaTraverse(const char *baseName,
     if (!(metatype = virJSONValueObjectGetString(cur, "meta-type")))
         return -2;
 
-    for (i = 0; i < ARRAY_CARDINALITY(traverseMetaType); i++) {
+    for (i = 0; i < G_N_ELEMENTS(traverseMetaType); i++) {
         if (STREQ(metatype, traverseMetaType[i].metatype))
             return traverseMetaType[i].func(cur, ctxt);
     }
index 5f50d07002aaa75c5767380923d8ce22de0853df..916b14dc7f8a0cf956e5446da9441ccf95358a0c 100644 (file)
@@ -419,7 +419,7 @@ daemonSetupNetworking(virNetServerPtr srv,
         return -1;
 #endif /* ! WITH_IP */
 
-    if (virSystemdGetActivation(actmap, ARRAY_CARDINALITY(actmap), &act) < 0)
+    if (virSystemdGetActivation(actmap, G_N_ELEMENTS(actmap), &act) < 0)
         return -1;
 
 #ifdef WITH_IP
@@ -955,7 +955,7 @@ daemonUsage(const char *argv0, bool privileged)
     fprintf(stderr, "\n");
 
     fprintf(stderr, "%s\n", _("Options:"));
-    for (i = 0; i < ARRAY_CARDINALITY(opthelp); i++)
+    for (i = 0; i < G_N_ELEMENTS(opthelp); i++)
         fprintf(stderr, "  %-22s %s\n", opthelp[i].opts,
                 _(opthelp[i].help));
     fprintf(stderr, "\n");
index cd929c36da361ef9798c28f2ddc85208c229de51..9153791b3c2fb2a3b42d83a2ae717e421fa2e7fe 100644 (file)
@@ -1493,7 +1493,7 @@ static virConnectDomainEventGenericCallback domainEventCallbacks[] = {
     VIR_DOMAIN_EVENT_CALLBACK(remoteRelayDomainEventBlockThreshold),
 };
 
-verify(ARRAY_CARDINALITY(domainEventCallbacks) == VIR_DOMAIN_EVENT_ID_LAST);
+verify(G_N_ELEMENTS(domainEventCallbacks) == VIR_DOMAIN_EVENT_ID_LAST);
 
 static int
 remoteRelayNetworkEventLifecycle(virConnectPtr conn,
@@ -1536,7 +1536,7 @@ static virConnectNetworkEventGenericCallback networkEventCallbacks[] = {
     VIR_NETWORK_EVENT_CALLBACK(remoteRelayNetworkEventLifecycle),
 };
 
-verify(ARRAY_CARDINALITY(networkEventCallbacks) == VIR_NETWORK_EVENT_ID_LAST);
+verify(G_N_ELEMENTS(networkEventCallbacks) == VIR_NETWORK_EVENT_ID_LAST);
 
 static int
 remoteRelayStoragePoolEventLifecycle(virConnectPtr conn,
@@ -1615,7 +1615,7 @@ static virConnectStoragePoolEventGenericCallback storageEventCallbacks[] = {
     VIR_STORAGE_POOL_EVENT_CALLBACK(remoteRelayStoragePoolEventRefresh),
 };
 
-verify(ARRAY_CARDINALITY(storageEventCallbacks) == VIR_STORAGE_POOL_EVENT_ID_LAST);
+verify(G_N_ELEMENTS(storageEventCallbacks) == VIR_STORAGE_POOL_EVENT_ID_LAST);
 
 static int
 remoteRelayNodeDeviceEventLifecycle(virConnectPtr conn,
@@ -1694,7 +1694,7 @@ static virConnectNodeDeviceEventGenericCallback nodeDeviceEventCallbacks[] = {
     VIR_NODE_DEVICE_EVENT_CALLBACK(remoteRelayNodeDeviceEventUpdate),
 };
 
-verify(ARRAY_CARDINALITY(nodeDeviceEventCallbacks) == VIR_NODE_DEVICE_EVENT_ID_LAST);
+verify(G_N_ELEMENTS(nodeDeviceEventCallbacks) == VIR_NODE_DEVICE_EVENT_ID_LAST);
 
 static int
 remoteRelaySecretEventLifecycle(virConnectPtr conn,
@@ -1773,7 +1773,7 @@ static virConnectSecretEventGenericCallback secretEventCallbacks[] = {
     VIR_SECRET_EVENT_CALLBACK(remoteRelaySecretEventValueChanged),
 };
 
-verify(ARRAY_CARDINALITY(secretEventCallbacks) == VIR_SECRET_EVENT_ID_LAST);
+verify(G_N_ELEMENTS(secretEventCallbacks) == VIR_SECRET_EVENT_ID_LAST);
 
 static void
 remoteRelayDomainQemuMonitorEvent(virConnectPtr conn,
@@ -2176,7 +2176,7 @@ remoteDispatchProbeURI(bool readonly,
         };
         ssize_t i;
 
-        for (i = 0; i < (ssize_t) ARRAY_CARDINALITY(drivers) && !*probeduri; i++) {
+        for (i = 0; i < (ssize_t) G_N_ELEMENTS(drivers) && !*probeduri; i++) {
             VIR_AUTOFREE(char *) daemonname = NULL;
             VIR_AUTOFREE(char *) daemonpath = NULL;
 
@@ -2222,7 +2222,7 @@ remoteDispatchProbeURI(bool readonly,
         };
         ssize_t i;
 
-        for (i = 0; i < (ssize_t) ARRAY_CARDINALITY(drivers) && !*probeduri; i++) {
+        for (i = 0; i < (ssize_t) G_N_ELEMENTS(drivers) && !*probeduri; i++) {
             VIR_AUTOFREE(char *) sockname = NULL;
 
             if (virAsprintf(&sockname, "%s/libvirt/virt%sd-%s",
index bd4017c4dc9fed3e4fa6355027d995f968d196f4..52510792823d0bdb6d0e5a20754b132912187166 100644 (file)
@@ -1313,7 +1313,7 @@ doRemoteOpen(virConnectPtr conn,
     if (!(priv->remoteProgram = virNetClientProgramNew(REMOTE_PROGRAM,
                                                        REMOTE_PROTOCOL_VERSION,
                                                        remoteEvents,
-                                                       ARRAY_CARDINALITY(remoteEvents),
+                                                       G_N_ELEMENTS(remoteEvents),
                                                        conn)))
         goto failed;
     if (!(priv->lxcProgram = virNetClientProgramNew(LXC_PROGRAM,
@@ -1325,7 +1325,7 @@ doRemoteOpen(virConnectPtr conn,
     if (!(priv->qemuProgram = virNetClientProgramNew(QEMU_PROGRAM,
                                                      QEMU_PROTOCOL_VERSION,
                                                      qemuEvents,
-                                                     ARRAY_CARDINALITY(qemuEvents),
+                                                     G_N_ELEMENTS(qemuEvents),
                                                      conn)))
         goto failed;
 
@@ -6596,7 +6596,7 @@ remoteDomainOpenGraphics(virDomainPtr dom,
     remote_domain_open_graphics_args args;
     struct private_data *priv = dom->conn->privateData;
     int fdin[] = { fd };
-    size_t fdinlen = ARRAY_CARDINALITY(fdin);
+    size_t fdinlen = G_N_ELEMENTS(fdin);
 
     remoteDriverLock(priv);
 
index 5d1583980e670273359a3f6d824d595daa01fafa..6d9838c398af7358e0119f1d025ef1e0536629c7 100755 (executable)
@@ -1292,7 +1292,7 @@ elsif ($mode eq "server") {
         print "{ $comment\n   ${name},\n   $arglen,\n   (xdrproc_t)$argfilter,\n   $retlen,\n   (xdrproc_t)$retfilter,\n   true,\n   $priority\n},\n";
     }
     print "};\n";
-    print "size_t ${structprefix}NProcs = ARRAY_CARDINALITY(${structprefix}Procs);\n";
+    print "size_t ${structprefix}NProcs = G_N_ELEMENTS(${structprefix}Procs);\n";
 }
 
 # Bodies for client functions ("remote_client_bodies.h").
index 53d8b219ea726d2a4be570af42f78d47a9a3b6c5..1d846cd1314b866fb99e6403f0280585c47172dc 100644 (file)
@@ -368,7 +368,7 @@ virNetClientFindDefaultSshKey(const char *homedir, char **retPath)
 
     const char *keys[] = { "identity", "id_dsa", "id_ecdsa", "id_ed25519", "id_rsa" };
 
-    for (i = 0; i < ARRAY_CARDINALITY(keys); ++i) {
+    for (i = 0; i < G_N_ELEMENTS(keys); ++i) {
         int ret = virNetClientCheckKeyExists(homedir, keys[i], retPath);
         if (ret != 0)
             return ret;
@@ -939,7 +939,7 @@ int virNetClientSetTLSSession(virNetClientPtr client,
         ignore_value(pthread_sigmask(SIG_BLOCK, &blockedsigs, &oldmask));
 
     repoll:
-        ret = poll(fds, ARRAY_CARDINALITY(fds), -1);
+        ret = poll(fds, G_N_ELEMENTS(fds), -1);
         if (ret < 0 && (errno == EAGAIN || errno == EINTR))
             goto repoll;
 
@@ -963,7 +963,7 @@ int virNetClientSetTLSSession(virNetClientPtr client,
     ignore_value(pthread_sigmask(SIG_BLOCK, &blockedsigs, &oldmask));
 
     repoll2:
-    ret = poll(fds, ARRAY_CARDINALITY(fds), -1);
+    ret = poll(fds, G_N_ELEMENTS(fds), -1);
     if (ret < 0 && (errno == EAGAIN || errno == EINTR))
         goto repoll2;
 
@@ -1682,7 +1682,7 @@ static int virNetClientIOEventLoop(virNetClientPtr client,
         ignore_value(pthread_sigmask(SIG_BLOCK, &blockedsigs, &oldmask));
 
     repoll:
-        ret = poll(fds, ARRAY_CARDINALITY(fds), timeout);
+        ret = poll(fds, G_N_ELEMENTS(fds), timeout);
         if (ret < 0 && (errno == EAGAIN || errno == EINTR))
             goto repoll;
 
index 0f7046ab1cb08b710bf8d369752f81a6e8744edc..5d975f5903e43dc47ed1df258fdb88c151fc7f4d 100644 (file)
@@ -1073,7 +1073,7 @@ virSecurityDACMoveImageMetadataHelper(pid_t pid G_GNUC_UNUSED,
     virSecurityManagerMetadataLockStatePtr state;
     int ret;
 
-    if (!(state = virSecurityManagerMetadataLock(data->mgr, paths, ARRAY_CARDINALITY(paths))))
+    if (!(state = virSecurityManagerMetadataLock(data->mgr, paths, G_N_ELEMENTS(paths))))
         return -1;
 
     ret = virSecurityMoveRememberedLabel(SECURITY_DAC_NAME, data->src, data->dst);
index bd32a9c20794bf95c0d5ce379513820326e23ccd..da3b8c1491d39c0ce5e0e8ea763cfefaea532aef 100644 (file)
@@ -53,7 +53,7 @@ virSecurityDriverPtr virSecurityDriverLookup(const char *name,
 
     VIR_DEBUG("name=%s", NULLSTR(name));
 
-    for (i = 0; i < ARRAY_CARDINALITY(security_drivers) && !drv; i++) {
+    for (i = 0; i < G_N_ELEMENTS(security_drivers) && !drv; i++) {
         virSecurityDriverPtr tmp = security_drivers[i];
 
         if (name &&
index d59888b228cc343bfb701ff9d6fa52ca84f307ac..17d39125bb08512f3fe92e968b0118a7734b0cb3 100644 (file)
@@ -1974,7 +1974,7 @@ virSecuritySELinuxMoveImageMetadataHelper(pid_t pid G_GNUC_UNUSED,
     virSecurityManagerMetadataLockStatePtr state;
     int ret;
 
-    if (!(state = virSecurityManagerMetadataLock(data->mgr, paths, ARRAY_CARDINALITY(paths))))
+    if (!(state = virSecurityManagerMetadataLock(data->mgr, paths, G_N_ELEMENTS(paths))))
         return -1;
 
     ret = virSecurityMoveRememberedLabel(SECURITY_SELINUX_NAME, data->src, data->dst);
index 6a1aa9607846fff5ed5d74b01a2a6efd9c29c424..2ff34dacbdc68a3ec501ae8390a7bc7b4fecf77c 100644 (file)
@@ -519,9 +519,9 @@ valid_path(const char *path, const bool readonly)
         "/etc/libvirt-sandbox/services/"   /* for virt-sandbox service config */
     };
 
-    const int nropaths = ARRAY_CARDINALITY(restricted);
-    const int nrwpaths = ARRAY_CARDINALITY(restricted_rw);
-    const int nopaths = ARRAY_CARDINALITY(override);
+    const int nropaths = G_N_ELEMENTS(restricted);
+    const int nrwpaths = G_N_ELEMENTS(restricted_rw);
+    const int nopaths = G_N_ELEMENTS(override);
 
     if (path == NULL) {
         vah_error(NULL, 0, _("bad pathname"));
index d2a4e100bbb1416691148f9d848f57453916ac74..338d459e1483034b29fdb45dc4555fc47d50d6e8 100644 (file)
@@ -332,7 +332,7 @@ testBuildCapabilities(virConnectPtr conn)
             goto error;
     }
 
-    for (i = 0; i < ARRAY_CARDINALITY(guest_types); i++) {
+    for (i = 0; i < G_N_ELEMENTS(guest_types); i++) {
         if ((guest = virCapabilitiesAddGuest(caps,
                                              guest_types[i],
                                              VIR_ARCH_I686,
index 3f5efde8e2037fbb34d855d77d1d9d5dcbb10ba9..f41e3e86bb814ea798a3c269c5beb6d2e11df993 100644 (file)
@@ -81,7 +81,7 @@ static const struct virArchData {
     { "xtensaeb",     32, VIR_ARCH_BIG_ENDIAN },
 };
 
-verify(ARRAY_CARDINALITY(virArchData) == VIR_ARCH_LAST);
+verify(G_N_ELEMENTS(virArchData) == VIR_ARCH_LAST);
 
 
 /**
index 23bc44734ecce71bc76db79fdf806f1ba8a9b241..b54ae1283eb66cbe9266d8995168160f220368c9 100644 (file)
@@ -133,7 +133,7 @@ void virAuditSend(virLogSourcePtr source,
             [VIR_AUDIT_RECORD_RESOURCE] = AUDIT_VIRT_RESOURCE,
         };
 
-        if (type >= ARRAY_CARDINALITY(record_types) || record_types[type] == 0)
+        if (type >= G_N_ELEMENTS(record_types) || record_types[type] == 0)
             VIR_WARN("Unknown audit record type %d", type);
         else if (audit_log_user_message(auditfd, record_types[type], str, NULL,
                                         clientaddr, clienttty, success) < 0) {
index 23908d769d3d17b071ec22e65a90371e59ef0786..dcf8e3383befdfbf7cc634e28a1cb9d46d9ec86d 100644 (file)
@@ -555,7 +555,7 @@ virCgroupV1CpuSetInherit(virCgroupPtr parent,
     };
 
     VIR_DEBUG("Setting up inheritance %s -> %s", parent->path, group->path);
-    for (i = 0; i < ARRAY_CARDINALITY(inherit_values); i++) {
+    for (i = 0; i < G_N_ELEMENTS(inherit_values); i++) {
         VIR_AUTOFREE(char *) value = NULL;
 
         if (virCgroupGetValueStr(parent,
@@ -1065,7 +1065,7 @@ virCgroupV1GetBlkioIoServiced(virCgroupPtr group,
         return -1;
 
     /* sum up all entries of the same kind, from all devices */
-    for (i = 0; i < ARRAY_CARDINALITY(value_names); i++) {
+    for (i = 0; i < G_N_ELEMENTS(value_names); i++) {
         p1 = str1;
         p2 = str2;
 
@@ -1171,7 +1171,7 @@ virCgroupV1GetBlkioIoDeviceServiced(virCgroupPtr group,
         return -1;
     }
 
-    for (i = 0; i < ARRAY_CARDINALITY(value_names); i++) {
+    for (i = 0; i < G_N_ELEMENTS(value_names); i++) {
         if (!(p1 = strstr(p1, value_names[i]))) {
             virReportError(VIR_ERR_INTERNAL_ERROR,
                            _("Cannot find byte %sstats for block device '%s'"),
index ce8851f8006b1ebc4f606045a6cd4ec5e79e440e..5d940b020954e944d4d33bc48e51ba061ccf6597 100644 (file)
@@ -730,7 +730,7 @@ virCgroupV2GetBlkioIoServiced(virCgroupPtr group,
     }
 
     /* sum up all entries of the same kind, from all devices */
-    for (i = 0; i < ARRAY_CARDINALITY(value_names); i++) {
+    for (i = 0; i < G_N_ELEMENTS(value_names); i++) {
         p1 = str1;
 
         while ((p1 = strstr(p1, value_names[i]))) {
@@ -799,7 +799,7 @@ virCgroupV2GetBlkioIoDeviceServiced(virCgroupPtr group,
         return -1;
     }
 
-    for (i = 0; i < ARRAY_CARDINALITY(value_names); i++) {
+    for (i = 0; i < G_N_ELEMENTS(value_names); i++) {
         if (!(p1 = strstr(p1, value_names[i]))) {
             virReportError(VIR_ERR_INTERNAL_ERROR,
                            _("Cannot find byte '%s' stats for block device '%s'"),
index 3a3ea227a5f79f62713fa0c50ac73e79b722691c..87fabfbba141ddec50631c158bfd648fd84a9441 100644 (file)
@@ -47,7 +47,7 @@ struct virHashInfo {
 };
 
 
-verify(ARRAY_CARDINALITY(hashinfo) == VIR_CRYPTO_HASH_LAST);
+verify(G_N_ELEMENTS(hashinfo) == VIR_CRYPTO_HASH_LAST);
 
 ssize_t
 virCryptoHashBuf(virCryptoHash hash,
index 1e59294fc3bb965f7079ef70819bec53093d266b..f423305e1119939fdcdbb582e5651c26341acba7 100644 (file)
@@ -305,7 +305,7 @@ static const char virDBusBasicTypes[] = {
 
 static bool virDBusIsBasicType(char c)
 {
-    return !!memchr(virDBusBasicTypes, c, ARRAY_CARDINALITY(virDBusBasicTypes));
+    return !!memchr(virDBusBasicTypes, c, G_N_ELEMENTS(virDBusBasicTypes));
 }
 
 /*
index ab443aa5286f56a49eef61a5e50227badc23e232..d68421b203c3138933bedba10635f08da7633b63 100644 (file)
@@ -34,15 +34,15 @@ virEnumToString(const char * const *types,
     static const char *const name ## TypeList[] = { __VA_ARGS__ }; \
     const char *name ## TypeToString(int type) { \
         return virEnumToString(name ## TypeList, \
-                               ARRAY_CARDINALITY(name ## TypeList), \
+                               G_N_ELEMENTS(name ## TypeList), \
                                type); \
     } \
     int name ## TypeFromString(const char *type) { \
         return virEnumFromString(name ## TypeList, \
-                                 ARRAY_CARDINALITY(name ## TypeList), \
+                                 G_N_ELEMENTS(name ## TypeList), \
                                  type); \
     } \
-    verify(ARRAY_CARDINALITY(name ## TypeList) == lastVal)
+    verify(G_N_ELEMENTS(name ## TypeList) == lastVal)
 
 #define VIR_ENUM_DECL(name) \
     const char *name ## TypeToString(int type); \
index f6344b631c07798f3994834fb9abe7f5849454e4..0d4bfae8f80e89ec89a508767f1c4769b80cbde3 100644 (file)
@@ -178,7 +178,7 @@ virFirewallValidateBackend(virFirewallBackend backend)
         };
         size_t i;
 
-        for (i = 0; i < ARRAY_CARDINALITY(commands); i++) {
+        for (i = 0; i < G_N_ELEMENTS(commands); i++) {
             if (!virFileIsExecutable(commands[i])) {
                 virReportSystemError(errno,
                                      _("direct firewall backend requested, but %s is not available"),
index 952766dc3af5219d37394687a8cba74702d5426c..d544d36c61b11ca3640d9cb562247d85e3f5fcec 100644 (file)
@@ -168,7 +168,7 @@ virHostCPUGetStatsFreeBSD(int cpuNum,
         }
 
         param->value = 0;
-        for (j = 0; j < ARRAY_CARDINALITY(cpu_map[i].idx); j++)
+        for (j = 0; j < G_N_ELEMENTS(cpu_map[i].idx); j++)
             param->value += cpu_times[offset + cpu_map[i].idx[j]] * TICK_TO_NSEC;
     }
 
index 0e3c0ad73a63016347afd4b9a8be31310bb629da..e1b876d36c7aeac8e3ff717a3e1fa069346da32a 100644 (file)
@@ -144,11 +144,11 @@ iptablesSetupPrivateChains(virFirewallLayer layer)
     bool changed = false;
     iptablesGlobalChainData data[] = {
         { layer, "filter",
-          filter_chains, ARRAY_CARDINALITY(filter_chains), &changed },
+          filter_chains, G_N_ELEMENTS(filter_chains), &changed },
         { layer, "nat",
-          natmangle_chains, ARRAY_CARDINALITY(natmangle_chains), &changed },
+          natmangle_chains, G_N_ELEMENTS(natmangle_chains), &changed },
         { layer, "mangle",
-          natmangle_chains, ARRAY_CARDINALITY(natmangle_chains), &changed },
+          natmangle_chains, G_N_ELEMENTS(natmangle_chains), &changed },
     };
     size_t i;
 
@@ -156,7 +156,7 @@ iptablesSetupPrivateChains(virFirewallLayer layer)
 
     virFirewallStartTransaction(fw, 0);
 
-    for (i = 0; i < ARRAY_CARDINALITY(data); i++)
+    for (i = 0; i < G_N_ELEMENTS(data); i++)
         virFirewallAddRuleFull(fw, data[i].layer,
                                false, iptablesPrivateChainCreate,
                                &(data[i]), "--table", data[i].table,
index 336443e01d10941d944e5defb727213a3eb706e1..1a0a94e3abf31b45d425b52b1a2aeaeb39459a09 100644 (file)
@@ -54,19 +54,19 @@ static const unsigned short *virKeymapValues[VIR_KEYCODE_SET_LAST] = {
     [VIR_KEYCODE_SET_QNUM] = virKeyCodeTable_qnum,
 };
 
-#define VIR_KEYMAP_ENTRY_MAX ARRAY_CARDINALITY(virKeyCodeTable_linux)
-
-verify(VIR_KEYMAP_ENTRY_MAX == ARRAY_CARDINALITY(virKeyCodeTable_atset1));
-verify(VIR_KEYMAP_ENTRY_MAX == ARRAY_CARDINALITY(virKeyCodeTable_atset2));
-verify(VIR_KEYMAP_ENTRY_MAX == ARRAY_CARDINALITY(virKeyCodeTable_atset3));
-verify(VIR_KEYMAP_ENTRY_MAX == ARRAY_CARDINALITY(virKeyCodeTable_osx));
-verify(VIR_KEYMAP_ENTRY_MAX == ARRAY_CARDINALITY(virKeyCodeTable_xtkbd));
-verify(VIR_KEYMAP_ENTRY_MAX == ARRAY_CARDINALITY(virKeyCodeTable_usb));
-verify(VIR_KEYMAP_ENTRY_MAX == ARRAY_CARDINALITY(virKeyCodeTable_win32));
-verify(VIR_KEYMAP_ENTRY_MAX == ARRAY_CARDINALITY(virKeyCodeTable_qnum));
-verify(VIR_KEYMAP_ENTRY_MAX == ARRAY_CARDINALITY(virKeyNameTable_linux));
-verify(VIR_KEYMAP_ENTRY_MAX == ARRAY_CARDINALITY(virKeyNameTable_osx));
-verify(VIR_KEYMAP_ENTRY_MAX == ARRAY_CARDINALITY(virKeyNameTable_win32));
+#define VIR_KEYMAP_ENTRY_MAX G_N_ELEMENTS(virKeyCodeTable_linux)
+
+verify(VIR_KEYMAP_ENTRY_MAX == G_N_ELEMENTS(virKeyCodeTable_atset1));
+verify(VIR_KEYMAP_ENTRY_MAX == G_N_ELEMENTS(virKeyCodeTable_atset2));
+verify(VIR_KEYMAP_ENTRY_MAX == G_N_ELEMENTS(virKeyCodeTable_atset3));
+verify(VIR_KEYMAP_ENTRY_MAX == G_N_ELEMENTS(virKeyCodeTable_osx));
+verify(VIR_KEYMAP_ENTRY_MAX == G_N_ELEMENTS(virKeyCodeTable_xtkbd));
+verify(VIR_KEYMAP_ENTRY_MAX == G_N_ELEMENTS(virKeyCodeTable_usb));
+verify(VIR_KEYMAP_ENTRY_MAX == G_N_ELEMENTS(virKeyCodeTable_win32));
+verify(VIR_KEYMAP_ENTRY_MAX == G_N_ELEMENTS(virKeyCodeTable_qnum));
+verify(VIR_KEYMAP_ENTRY_MAX == G_N_ELEMENTS(virKeyNameTable_linux));
+verify(VIR_KEYMAP_ENTRY_MAX == G_N_ELEMENTS(virKeyNameTable_osx));
+verify(VIR_KEYMAP_ENTRY_MAX == G_N_ELEMENTS(virKeyNameTable_win32));
 
 VIR_ENUM_IMPL(virKeycodeSet,
               VIR_KEYCODE_SET_LAST,
index 4414a8fa6332f783407ff48bf082e7a531b5c369..5881a59cc5e770dbbf43c33d9ec3dedbd376b267 100644 (file)
@@ -702,7 +702,7 @@ virLogStackTraceToFd(int fd)
     const char *msg = "Stack trace not available on this platform\n";
 
 #define STRIP_DEPTH 3
-    size = backtrace(array, ARRAY_CARDINALITY(array));
+    size = backtrace(array, G_N_ELEMENTS(array));
     if (size) {
         backtrace_symbols_fd(array +  STRIP_DEPTH, size - STRIP_DEPTH, fd);
         ignore_value(safewrite(fd, "\n", 1));
@@ -1004,9 +1004,9 @@ virLogOutputToJournald(virLogSourcePtr source,
     struct journalState state;
 
     state.iov = iov;
-    state.iov_end = iov + ARRAY_CARDINALITY(iov);
+    state.iov_end = iov + G_N_ELEMENTS(iov);
     state.bufs = iov_bufs;
-    state.bufs_end = iov_bufs + ARRAY_CARDINALITY(iov_bufs);
+    state.bufs_end = iov_bufs + G_N_ELEMENTS(iov_bufs);
 
     journalAddString(&state, "MESSAGE", rawstr);
     journalAddInt(&state, "PRIORITY",
index d3f1595ae4578775ad616ffa773d5fbc22353a69..894ae86a169d8139014ae90a41f7b0bab8ef053a 100644 (file)
@@ -3050,7 +3050,7 @@ virNetDevGetEthtoolFeatures(virBitmapPtr bitmap,
     };
 # endif
 
-    for (i = 0; i < ARRAY_CARDINALITY(ethtool_cmds); i++) {
+    for (i = 0; i < G_N_ELEMENTS(ethtool_cmds); i++) {
         cmd.cmd = ethtool_cmds[i].cmd;
         if (virNetDevFeatureAvailable(fd, ifr, &cmd))
             ignore_value(virBitmapSetBit(bitmap, ethtool_cmds[i].feat));
@@ -3059,7 +3059,7 @@ virNetDevGetEthtoolFeatures(virBitmapPtr bitmap,
 # if HAVE_DECL_ETHTOOL_GFLAGS
     cmd.cmd = ETHTOOL_GFLAGS;
     if (virNetDevFeatureAvailable(fd, ifr, &cmd)) {
-        for (i = 0; i < ARRAY_CARDINALITY(flags); i++) {
+        for (i = 0; i < G_N_ELEMENTS(flags); i++) {
             if (cmd.data & flags[i].cmd)
                 ignore_value(virBitmapSetBit(bitmap, flags[i].feat));
         }
index 0b1f3262f472b0ae2e43b29e6349d127033081ac..f07eb2f2e2e254feea95a30f694da8d65c2a040a 100644 (file)
@@ -253,7 +253,7 @@ virNetlinkSendRequest(struct nl_msg *nl_msg, uint32_t src_pid,
     fds[0].fd = fd;
     fds[0].events = POLLIN;
 
-    n = poll(fds, ARRAY_CARDINALITY(fds), NETLINK_ACK_TIMEOUT_S);
+    n = poll(fds, G_N_ELEMENTS(fds), NETLINK_ACK_TIMEOUT_S);
     if (n <= 0) {
         if (n < 0)
             virReportSystemError(errno, "%s",
index 7714d57f6b54c478f0200682dbf5c259d2b9ae85..e334d415e4d1172375cc0f3756032ab0d07cb825 100644 (file)
@@ -168,7 +168,7 @@ static struct virPerfEventAttr attrs[] = {
         .attrConfig = PERF_COUNT_SW_EMULATION_FAULTS
     },
 };
-verify(ARRAY_CARDINALITY(attrs) == VIR_PERF_EVENT_LAST);
+verify(G_N_ELEMENTS(attrs) == VIR_PERF_EVENT_LAST);
 typedef struct virPerfEventAttr *virPerfEventAttrPtr;
 
 
index c91301e525f8b3eb431a019f1c24566ddcdeee43..e8d4ba08b468136b7629418677055f0b3595d72e 100644 (file)
@@ -628,7 +628,7 @@ int virProcessGetNamespaces(pid_t pid,
     *nfdlist = 0;
     *fdlist = NULL;
 
-    for (i = 0; i < ARRAY_CARDINALITY(ns); i++) {
+    for (i = 0; i < G_N_ELEMENTS(ns); i++) {
         int fd;
         VIR_AUTOFREE(char *) nsfile = NULL;
 
index ef6d7f3ba5b8b907fa4827d0e3dc6fc35940746b..6c2693fec97acbb794a2ce2dbcf88326dd9e3e77 100644 (file)
@@ -387,7 +387,7 @@ static struct FileTypeInfo const fileTypeInfo[] = {
         4+4+4, 8, 512, NULL, vmdk4GetBackingStore, NULL
     },
 };
-verify(ARRAY_CARDINALITY(fileTypeInfo) == VIR_STORAGE_FILE_LAST);
+verify(G_N_ELEMENTS(fileTypeInfo) == VIR_STORAGE_FILE_LAST);
 
 
 /* qcow2 compatible features in the order they appear on-disk */
@@ -401,7 +401,7 @@ enum qcow2CompatibleFeature {
 static const int qcow2CompatibleFeatureArray[] = {
     VIR_STORAGE_FILE_FEATURE_LAZY_REFCOUNTS,
 };
-verify(ARRAY_CARDINALITY(qcow2CompatibleFeatureArray) ==
+verify(G_N_ELEMENTS(qcow2CompatibleFeatureArray) ==
        QCOW2_COMPATIBLE_FEATURE_LAST);
 
 static int
@@ -3640,7 +3640,7 @@ virStorageSourceParseBackingJSONInternal(virStorageSourcePtr src,
         return -1;
     }
 
-    for (i = 0; i < ARRAY_CARDINALITY(jsonParsers); i++) {
+    for (i = 0; i < G_N_ELEMENTS(jsonParsers); i++) {
         if (STREQ(drvname, jsonParsers[i].drvname))
             return jsonParsers[i].func(src, file, jsonParsers[i].opaque);
     }
index b5d5cb7236474bf424a6c8c994cd3f823f3d53b6..26056bf50330fc291a10d9c2e6ab597aa0524509 100644 (file)
@@ -64,7 +64,7 @@ virTPMCreateCancelPath(const char *devpath)
         dev = strrchr(devpath, '/');
         if (dev) {
             dev++;
-            for (i = 0; i < ARRAY_CARDINALITY(prefix); i++) {
+            for (i = 0; i < G_N_ELEMENTS(prefix); i++) {
                 if (virAsprintf(&path, "/sys/class/%s%s/device/cancel",
                                 prefix[i], dev) < 0)
                      goto cleanup;
@@ -290,7 +290,7 @@ virTPMEmulatorInit(void)
 
     virMutexLock(&swtpm_tools_lock);
 
-    for (i = 0; i < ARRAY_CARDINALITY(prgs); i++) {
+    for (i = 0; i < G_N_ELEMENTS(prgs); i++) {
         VIR_AUTOFREE(char *) path = NULL;
         bool findit = *prgs[i].path == NULL;
         struct stat statbuf;
index aae07d48e6d0fb1a28e0fcc442b95fad5fa9ab36..940c6d70e163e09a51a9d14b92df2541c6072432 100644 (file)
@@ -386,7 +386,7 @@ int virDiskNameParse(const char *name, int *disk, int *partition)
     static char const* const drive_prefix[] = {"fd", "hd", "vd", "sd", "xvd", "ubd"};
     size_t i;
 
-    for (i = 0; i < ARRAY_CARDINALITY(drive_prefix); i++) {
+    for (i = 0; i < G_N_ELEMENTS(drive_prefix); i++) {
         if (STRPREFIX(name, drive_prefix[i])) {
             ptr = name + strlen(drive_prefix[i]);
             break;
@@ -1108,7 +1108,7 @@ virGetWin32DirectoryRoot(char **path)
 
     *path = NULL;
 
-    if (GetWindowsDirectory(windowsdir, ARRAY_CARDINALITY(windowsdir))) {
+    if (GetWindowsDirectory(windowsdir, G_N_ELEMENTS(windowsdir))) {
         const char *tmp;
         /* Usually X:\Windows, but in terminal server environments
          * might be an UNC path, AFAIK.
index 72ae49b6b2d5f73b563a70ee6637cf8f07794e3b..9310cace3ea8e3f9910a2dece63e3d51bd752ca3 100644 (file)
@@ -205,7 +205,7 @@ VBoxCGlueInit(unsigned int *version)
     }
 
     /* Try the known locations. */
-    for (i = 0; i < ARRAY_CARDINALITY(knownDirs); ++i) {
+    for (i = 0; i < G_N_ELEMENTS(knownDirs); ++i) {
         if (tryLoadOne(knownDirs[i], true, true, version) >= 0)
             return 0;
     }
index 08fc84e002cd40f19b5caf9a15f92ea6da397a4f..724345330731c6baef811dbccf706d7fb30afa7d 100644 (file)
@@ -182,7 +182,7 @@ vmwareConnectOpen(virConnectPtr conn,
      * the VMware hypervisor. We look this up first since we use it
      * for auto detection of the backend
      */
-    for (i = 0; i < ARRAY_CARDINALITY(vmrun_candidates); i++) {
+    for (i = 0; i < G_N_ELEMENTS(vmrun_candidates); i++) {
         vmrun = virFindFileInPath(vmrun_candidates[i]);
         if (vmrun == NULL)
             continue;
index c5fe59376ebc4d194903958ea8c03c058368b7ac..917acdae579d90209f30735fd153a432ff64e47e 100644 (file)
@@ -122,11 +122,11 @@ vzBuildCapabilities(void)
     if (virCapabilitiesInitCaches(caps) < 0)
         goto error;
 
-    verify(ARRAY_CARDINALITY(archs) == ARRAY_CARDINALITY(emulators));
+    verify(G_N_ELEMENTS(archs) == G_N_ELEMENTS(emulators));
 
-    for (i = 0; i < ARRAY_CARDINALITY(ostypes); i++)
-        for (j = 0; j < ARRAY_CARDINALITY(archs); j++)
-            for (k = 0; k < ARRAY_CARDINALITY(emulators); k++)
+    for (i = 0; i < G_N_ELEMENTS(ostypes); i++)
+        for (j = 0; j < G_N_ELEMENTS(archs); j++)
+            for (k = 0; k < G_N_ELEMENTS(emulators); k++)
                 if (vzCapsAddGuestDomain(caps, ostypes[i], archs[j],
                                          emulators[k], virt_types[k]) < 0)
                     goto error;
index 872564b1444231ec0bd76f60374b18e289b32a91..77cbcd4680bf21f73042624e82ccc4b0d7fc4b2d 100644 (file)
@@ -219,7 +219,7 @@ int main(int argc, char **argv) {
     ret = EXIT_SUCCESS;
 
  cleanup:
-    for (i = 0; i < ARRAY_CARDINALITY(buffers); i++)
+    for (i = 0; i < G_N_ELEMENTS(buffers); i++)
         free(buffers[i]);
     fclose(log);
     free(newenv);
index 49a159a2be44b694d52f4caa5f9e2d9b24acbedb..2e2020006e6bd4de130a590260f1ac90da7c5911 100644 (file)
@@ -41,7 +41,7 @@ testParseDatastorePath(const void *data G_GNUC_UNUSED)
     char *directoryName = NULL;
     char *directoryAndFileName = NULL;
 
-    for (i = 0; i < ARRAY_CARDINALITY(paths); ++i) {
+    for (i = 0; i < G_N_ELEMENTS(paths); ++i) {
         VIR_FREE(datastoreName);
         VIR_FREE(directoryName);
         VIR_FREE(directoryAndFileName);
@@ -127,7 +127,7 @@ testConvertDateTimeToCalendarTime(const void *data G_GNUC_UNUSED)
     esxVI_DateTime dateTime;
     long long calendarTime;
 
-    for (i = 0; i < ARRAY_CARDINALITY(times); ++i) {
+    for (i = 0; i < G_N_ELEMENTS(times); ++i) {
         dateTime.value = (char *)times[i].dateTime;
 
         if (esxVI_DateTime_ConvertToCalendarTime(&dateTime,
@@ -177,7 +177,7 @@ testEscapeDatastoreItem(const void *data G_GNUC_UNUSED)
     size_t i;
     char *escaped = NULL;
 
-    for (i = 0; i < ARRAY_CARDINALITY(datastoreItems); ++i) {
+    for (i = 0; i < G_N_ELEMENTS(datastoreItems); ++i) {
         VIR_FREE(escaped);
 
         escaped = esxUtil_EscapeDatastoreItem(datastoreItems[i].string);
@@ -217,7 +217,7 @@ testConvertWindows1252ToUTF8(const void *data G_GNUC_UNUSED)
     size_t i;
     char *utf8 = NULL;
 
-    for (i = 0; i < ARRAY_CARDINALITY(windows1252ToUTF8); ++i) {
+    for (i = 0; i < G_N_ELEMENTS(windows1252ToUTF8); ++i) {
         VIR_FREE(utf8);
 
         utf8 = virVMXConvertToUTF8("Windows-1252",
index bea267f0fc76f557b7117fad5db7cdc7f909a966..bef3790da297de05da6f141af8cbbcb3e41a2c17 100644 (file)
@@ -313,7 +313,7 @@ static void testRemoveCommonRules(char *rules)
     size_t i;
     char *offset = rules;
 
-    for (i = 0; i < ARRAY_CARDINALITY(commonRules); i++) {
+    for (i = 0; i < G_N_ELEMENTS(commonRules); i++) {
         char *tmp = strstr(offset, commonRules[i]);
         size_t len = strlen(commonRules[i]);
         if (tmp) {
index b5e23d4d8d63f6ca8e6db7bd905ff6162691449f..1fcd4d2caa49e10704b9b6a7a567e588bc7fe5f8 100644 (file)
@@ -43,7 +43,7 @@ testReadConfigParam(const void *data G_GNUC_UNUSED)
     if (virAsprintf(&conf, "%s/openvzutilstest.conf", abs_srcdir) < 0)
         return -1;
 
-    for (i = 0; i < ARRAY_CARDINALITY(configParams); ++i) {
+    for (i = 0; i < G_N_ELEMENTS(configParams); ++i) {
         if (openvzReadConfigParam(conf, configParams[i].param,
                                   &value) != configParams[i].ret) {
             goto cleanup;
index 14710b11f39e5eba511ef02aec92edd78286981a..e4d867c1b27f7249c3b2c7c46531065ae580a046 100644 (file)
@@ -68,7 +68,7 @@ testFWPrecedence(const void *opaque G_GNUC_UNUSED)
         PREFIX "/share/qemu/firmware/61-ovmf.json",
         PREFIX "/share/qemu/firmware/70-aavmf.json",
     };
-    const size_t nexpected = ARRAY_CARDINALITY(expected);
+    const size_t nexpected = G_N_ELEMENTS(expected);
 
     if (VIR_STRDUP(fakehome, abs_srcdir "/qemufirmwaredata/home/user/.config") < 0)
         return -1;
@@ -236,7 +236,7 @@ mymain(void)
     do { \
         unsigned int interfaces[] = {__VA_ARGS__}; \
         struct supportedData data = {machine, arch, secure, fwlist, \
-                                     interfaces, ARRAY_CARDINALITY(interfaces)}; \
+                                     interfaces, G_N_ELEMENTS(interfaces)}; \
         if (virTestRun("QEMU FW SUPPORTED " machine " " #arch, \
                        testSupportedFW, &data) < 0) \
             ret = -1; \
index 8179e802c17128649cff7442ddfda89f78ef0194..1248db59f2c2994b5608bde93fbbb6d0e5e53d38 100644 (file)
@@ -2320,7 +2320,7 @@ testQemuMonitorJSONqemuMonitorJSONSendKey(const void *opaque)
         return -1;
 
     if (qemuMonitorJSONSendKey(qemuMonitorTestGetMonitor(test),
-                               0, keycodes, ARRAY_CARDINALITY(keycodes)) < 0)
+                               0, keycodes, G_N_ELEMENTS(keycodes)) < 0)
         return -1;
 
     return 0;
@@ -2349,7 +2349,7 @@ testQemuMonitorJSONqemuMonitorJSONSendKeyHoldtime(const void *opaque)
 
     if (qemuMonitorJSONSendKey(qemuMonitorTestGetMonitor(test),
                                31337, keycodes,
-                               ARRAY_CARDINALITY(keycodes)) < 0)
+                               G_N_ELEMENTS(keycodes)) < 0)
         return -1;
 
     return 0;
index 691c94b8faf83f100c85244dfe7a878596355ce4..b5a7d9bbd268a2e9fc89039a71e77f0cb01698a7 100644 (file)
@@ -66,7 +66,7 @@ testVUPrecedence(const void *opaque G_GNUC_UNUSED)
         SYSCONFDIR "/qemu/vhost-user/40-gpu.json",
         PREFIX "/share/qemu/vhost-user/60-gpu.json",
     };
-    const size_t nexpected = ARRAY_CARDINALITY(expected);
+    const size_t nexpected = G_N_ELEMENTS(expected);
 
     if (VIR_STRDUP(fakehome, abs_srcdir "/qemuvhostuserdata/home/user/.config") < 0)
         return -1;
index 4c114212e9bd42343184515ba636d766bdc4edde..cc9a3ccbff8dd8a693aa35a2ccd6872149d100f1 100644 (file)
@@ -214,7 +214,7 @@ virCommandPassFD(virCommandPtr cmd,
 {
     size_t i;
 
-    for (i = 0; i < ARRAY_CARDINALITY(testCommandPassSafeFDs); i++) {
+    for (i = 0; i < G_N_ELEMENTS(testCommandPassSafeFDs); i++) {
         if (testCommandPassSafeFDs[i] == fd) {
             if (!real_virCommandPassFD)
                 VIR_MOCK_REAL_INIT(virCommandPassFD);
index a84ea0954d8496f7a24618978cdf30fb95341eb1..5212ce50bded532ccb746e5f34afb3674cd0cc81 100644 (file)
@@ -316,43 +316,43 @@ testAddCPUModels(virQEMUCapsPtr caps, bool skipLegacy)
 
     if (ARCH_IS_X86(arch)) {
         if (virQEMUCapsAddCPUDefinitions(caps, VIR_DOMAIN_VIRT_KVM, x86Models,
-                                         ARRAY_CARDINALITY(x86Models),
+                                         G_N_ELEMENTS(x86Models),
                                          VIR_DOMCAPS_CPU_USABLE_UNKNOWN) < 0 ||
             virQEMUCapsAddCPUDefinitions(caps, VIR_DOMAIN_VIRT_QEMU, x86Models,
-                                         ARRAY_CARDINALITY(x86Models),
+                                         G_N_ELEMENTS(x86Models),
                                          VIR_DOMCAPS_CPU_USABLE_UNKNOWN) < 0)
             return -1;
 
         if (!skipLegacy) {
             if (virQEMUCapsAddCPUDefinitions(caps, VIR_DOMAIN_VIRT_KVM,
                                              x86LegacyModels,
-                                             ARRAY_CARDINALITY(x86LegacyModels),
+                                             G_N_ELEMENTS(x86LegacyModels),
                                              VIR_DOMCAPS_CPU_USABLE_UNKNOWN) < 0 ||
                 virQEMUCapsAddCPUDefinitions(caps, VIR_DOMAIN_VIRT_QEMU,
                                              x86LegacyModels,
-                                             ARRAY_CARDINALITY(x86LegacyModels),
+                                             G_N_ELEMENTS(x86LegacyModels),
                                              VIR_DOMCAPS_CPU_USABLE_UNKNOWN) < 0)
                 return -1;
         }
     } else if (ARCH_IS_ARM(arch)) {
         if (virQEMUCapsAddCPUDefinitions(caps, VIR_DOMAIN_VIRT_KVM, armModels,
-                                         ARRAY_CARDINALITY(armModels),
+                                         G_N_ELEMENTS(armModels),
                                          VIR_DOMCAPS_CPU_USABLE_UNKNOWN) < 0 ||
             virQEMUCapsAddCPUDefinitions(caps, VIR_DOMAIN_VIRT_QEMU, armModels,
-                                         ARRAY_CARDINALITY(armModels),
+                                         G_N_ELEMENTS(armModels),
                                          VIR_DOMCAPS_CPU_USABLE_UNKNOWN) < 0)
             return -1;
     } else if (ARCH_IS_PPC64(arch)) {
         if (virQEMUCapsAddCPUDefinitions(caps, VIR_DOMAIN_VIRT_KVM, ppc64Models,
-                                         ARRAY_CARDINALITY(ppc64Models),
+                                         G_N_ELEMENTS(ppc64Models),
                                          VIR_DOMCAPS_CPU_USABLE_UNKNOWN) < 0 ||
             virQEMUCapsAddCPUDefinitions(caps, VIR_DOMAIN_VIRT_QEMU, ppc64Models,
-                                         ARRAY_CARDINALITY(ppc64Models),
+                                         G_N_ELEMENTS(ppc64Models),
                                          VIR_DOMCAPS_CPU_USABLE_UNKNOWN) < 0)
             return -1;
     } else if (ARCH_IS_S390(arch)) {
         if (virQEMUCapsAddCPUDefinitions(caps, VIR_DOMAIN_VIRT_KVM, s390xModels,
-                                         ARRAY_CARDINALITY(s390xModels),
+                                         G_N_ELEMENTS(s390xModels),
                                          VIR_DOMCAPS_CPU_USABLE_UNKNOWN) < 0)
             return -1;
     }
index 80b7b083ffaf1c3818b220eba57b6c9815b57f09..89972746211720d752b80ccdefe2102fae20f72b 100644 (file)
@@ -1193,7 +1193,7 @@ virTestCounterReset(const char *prefix)
 const char
 *virTestCounterNext(void)
 {
-    size_t len = ARRAY_CARDINALITY(virtTestCounterStr);
+    size_t len = G_N_ELEMENTS(virtTestCounterStr);
 
     /* calculate length of the rest of the string */
     len -= (virtTestCounterPrefixEndOffset - virtTestCounterStr);
index a8c34cfc4a93d6e792e3e6b4e2222b78efe5a7e2..a54b181c090cd2f6d6cc869fe407936fdb5c0193 100644 (file)
@@ -43,8 +43,8 @@ static virCPUDef cpuDefaultData = {
     .sockets = 1,
     .cores = 2,
     .threads = 1,
-    .nfeatures = ARRAY_CARDINALITY(cpuDefaultFeatures),
-    .nfeatures_max = ARRAY_CARDINALITY(cpuDefaultFeatures),
+    .nfeatures = G_N_ELEMENTS(cpuDefaultFeatures),
+    .nfeatures_max = G_N_ELEMENTS(cpuDefaultFeatures),
     .features = cpuDefaultFeatures,
 };
 
@@ -82,8 +82,8 @@ static virCPUDef cpuHaswellData = {
     .sockets = 1,
     .cores = 2,
     .threads = 2,
-    .nfeatures = ARRAY_CARDINALITY(cpuHaswellFeatures),
-    .nfeatures_max = ARRAY_CARDINALITY(cpuHaswellFeatures),
+    .nfeatures = G_N_ELEMENTS(cpuHaswellFeatures),
+    .nfeatures_max = G_N_ELEMENTS(cpuHaswellFeatures),
     .features = cpuHaswellFeatures,
 };
 
index 265107fb5e89a46718935f38e1b52331d1115ff6..68a0b15cd021d9cfa62b2582f465466b7f380279 100644 (file)
@@ -53,11 +53,11 @@ static virCapsGuestMachinePtr *testQemuAllocMachines(int *nmachines)
     };
 
     machines = virCapabilitiesAllocMachines(x86_machines,
-                                            ARRAY_CARDINALITY(x86_machines));
+                                            G_N_ELEMENTS(x86_machines));
     if (machines == NULL)
         return NULL;
 
-    *nmachines = ARRAY_CARDINALITY(x86_machines);
+    *nmachines = G_N_ELEMENTS(x86_machines);
 
     return machines;
 }
@@ -78,7 +78,7 @@ static virCapsGuestMachinePtr *testQemuAllocNewerMachines(int *nmachines)
         return NULL;
 
     machines = virCapabilitiesAllocMachines(x86_machines,
-                                            ARRAY_CARDINALITY(x86_machines));
+                                            G_N_ELEMENTS(x86_machines));
     if (machines == NULL) {
         VIR_FREE(canonical);
         return NULL;
@@ -86,7 +86,7 @@ static virCapsGuestMachinePtr *testQemuAllocNewerMachines(int *nmachines)
 
     machines[1]->canonical = canonical;
 
-    *nmachines = ARRAY_CARDINALITY(x86_machines);
+    *nmachines = G_N_ELEMENTS(x86_machines);
 
     return machines;
 }
@@ -304,7 +304,7 @@ static int testQemuAddRISCV32Guest(virCapsPtr caps)
                                    "sifive_e",
                                    "virt",
                                    "sifive_u" };
-    static const int nmachines = ARRAY_CARDINALITY(names);
+    static const int nmachines = G_N_ELEMENTS(names);
     virCapsGuestMachinePtr *machines = NULL;
     virCapsGuestPtr guest;
 
@@ -335,7 +335,7 @@ static int testQemuAddRISCV64Guest(virCapsPtr caps)
                                    "sifive_e",
                                    "virt",
                                    "sifive_u" };
-    static const int nmachines = ARRAY_CARDINALITY(names);
+    static const int nmachines = G_N_ELEMENTS(names);
     virCapsGuestMachinePtr *machines = NULL;
     virCapsGuestPtr guest;
 
@@ -367,14 +367,14 @@ static int testQemuAddS390Guest(virCapsPtr caps)
     virCapsGuestPtr guest;
 
     machines = virCapabilitiesAllocMachines(s390_machines,
-                                            ARRAY_CARDINALITY(s390_machines));
+                                            G_N_ELEMENTS(s390_machines));
     if (!machines)
         goto error;
 
     guest = virCapabilitiesAddGuest(caps, VIR_DOMAIN_OSTYPE_HVM, VIR_ARCH_S390X,
                                     QEMUBinList[TEST_UTILS_QEMU_BIN_S390X],
                                     NULL,
-                                    ARRAY_CARDINALITY(s390_machines),
+                                    G_N_ELEMENTS(s390_machines),
                                     machines);
     if (!guest)
         goto error;
@@ -388,7 +388,7 @@ static int testQemuAddS390Guest(virCapsPtr caps)
     return 0;
 
  error:
-    virCapabilitiesFreeMachines(machines, ARRAY_CARDINALITY(s390_machines));
+    virCapabilitiesFreeMachines(machines, G_N_ELEMENTS(s390_machines));
     return -1;
 }
 
@@ -399,14 +399,14 @@ static int testQemuAddArm6Guest(virCapsPtr caps)
     virCapsGuestPtr guest;
 
     capsmachines = virCapabilitiesAllocMachines(machines,
-                                                ARRAY_CARDINALITY(machines));
+                                                G_N_ELEMENTS(machines));
     if (!capsmachines)
         goto error;
 
     guest = virCapabilitiesAddGuest(caps, VIR_DOMAIN_OSTYPE_HVM, VIR_ARCH_ARMV6L,
                                     QEMUBinList[TEST_UTILS_QEMU_BIN_ARM],
                                     NULL,
-                                    ARRAY_CARDINALITY(machines),
+                                    G_N_ELEMENTS(machines),
                                     capsmachines);
     if (!guest)
         goto error;
@@ -420,7 +420,7 @@ static int testQemuAddArm6Guest(virCapsPtr caps)
     return 0;
 
  error:
-    virCapabilitiesFreeMachines(capsmachines, ARRAY_CARDINALITY(machines));
+    virCapabilitiesFreeMachines(capsmachines, G_N_ELEMENTS(machines));
     return -1;
 }
 
@@ -433,14 +433,14 @@ static int testQemuAddArm7Guest(virCapsPtr caps)
     virCapsGuestPtr guest;
 
     capsmachines = virCapabilitiesAllocMachines(machines,
-                                                ARRAY_CARDINALITY(machines));
+                                                G_N_ELEMENTS(machines));
     if (!capsmachines)
         goto error;
 
     guest = virCapabilitiesAddGuest(caps, VIR_DOMAIN_OSTYPE_HVM, VIR_ARCH_ARMV7L,
                                     QEMUBinList[TEST_UTILS_QEMU_BIN_ARM],
                                     NULL,
-                                    ARRAY_CARDINALITY(machines),
+                                    G_N_ELEMENTS(machines),
                                     capsmachines);
     if (!guest)
         goto error;
@@ -454,7 +454,7 @@ static int testQemuAddArm7Guest(virCapsPtr caps)
     return 0;
 
  error:
-    virCapabilitiesFreeMachines(capsmachines, ARRAY_CARDINALITY(machines));
+    virCapabilitiesFreeMachines(capsmachines, G_N_ELEMENTS(machines));
     return -1;
 }
 
@@ -465,14 +465,14 @@ static int testQemuAddAARCH64Guest(virCapsPtr caps)
     virCapsGuestPtr guest;
 
     capsmachines = virCapabilitiesAllocMachines(machines,
-                                                ARRAY_CARDINALITY(machines));
+                                                G_N_ELEMENTS(machines));
     if (!capsmachines)
         goto error;
 
     guest = virCapabilitiesAddGuest(caps, VIR_DOMAIN_OSTYPE_HVM, VIR_ARCH_AARCH64,
                                     QEMUBinList[TEST_UTILS_QEMU_BIN_AARCH64],
                                     NULL,
-                                    ARRAY_CARDINALITY(machines),
+                                    G_N_ELEMENTS(machines),
                                     capsmachines);
     if (!guest)
         goto error;
@@ -486,7 +486,7 @@ static int testQemuAddAARCH64Guest(virCapsPtr caps)
     return 0;
 
  error:
-    virCapabilitiesFreeMachines(capsmachines, ARRAY_CARDINALITY(machines));
+    virCapabilitiesFreeMachines(capsmachines, G_N_ELEMENTS(machines));
     return -1;
 }
 
@@ -669,7 +669,7 @@ int qemuTestCapsCacheInsert(virFileCachePtr cache,
             return -ENOMEM;
     }
 
-    for (i = 0; i < ARRAY_CARDINALITY(QEMUBinList); i++) {
+    for (i = 0; i < G_N_ELEMENTS(QEMUBinList); i++) {
         virObjectRef(tmpCaps);
         if (virFileCacheInsertData(cache, QEMUBinList[i], tmpCaps) < 0) {
             virObjectUnref(tmpCaps);
@@ -884,7 +884,7 @@ testQemuGetLatestCaps(void)
 
     VIR_TEST_VERBOSE("");
 
-    for (i = 0; i < ARRAY_CARDINALITY(archs); ++i) {
+    for (i = 0; i < G_N_ELEMENTS(archs); ++i) {
         char *cap = testQemuGetLatestCapsForArch(archs[i], "xml");
 
         if (!cap || virHashAddEntry(capslatest, archs[i], cap) < 0)
index 2c347a7f3f9c39c722ec90e52c36cba1796a9bcc..314d96abe89a821bb5599f449d68a5ce571e25ed 100644 (file)
@@ -29,7 +29,7 @@ testXLInitCaps(void)
 
     caps->host.cpu = virCPUDefCopy(&cpuDefaultData);
 
-    nmachines = ARRAY_CARDINALITY(x86_machines);
+    nmachines = G_N_ELEMENTS(x86_machines);
     if ((machines = virCapabilitiesAllocMachines(x86_machines, nmachines)) == NULL)
         goto cleanup;
     if ((guest = virCapabilitiesAddGuest(caps, VIR_DOMAIN_OSTYPE_HVM,
@@ -42,7 +42,7 @@ testXLInitCaps(void)
     if (virCapabilitiesAddGuestDomain(guest, VIR_DOMAIN_VIRT_XEN, NULL,
                                       NULL, 0, NULL) == NULL)
         goto cleanup;
-    nmachines = ARRAY_CARDINALITY(xen_machines);
+    nmachines = G_N_ELEMENTS(xen_machines);
     if ((machines = virCapabilitiesAllocMachines(xen_machines, nmachines)) == NULL)
         goto cleanup;
 
@@ -57,7 +57,7 @@ testXLInitCaps(void)
     if (virCapabilitiesAddGuestDomain(guest, VIR_DOMAIN_VIRT_XEN, NULL,
                                       NULL, 0, NULL) == NULL)
         goto cleanup;
-    nmachines = ARRAY_CARDINALITY(pvh_machines);
+    nmachines = G_N_ELEMENTS(pvh_machines);
     if ((machines = virCapabilitiesAllocMachines(pvh_machines, nmachines)) == NULL)
         goto cleanup;
 
index 176e6ca20a19596088606ed33424e50b1cbd6e06..5ae04585cb8bb1de91f0b3ce267c1da5b1ec8ce3 100644 (file)
@@ -44,7 +44,7 @@ testIndexToDiskName(const void *data G_GNUC_UNUSED)
     size_t i;
     char *diskName = NULL;
 
-    for (i = 0; i < ARRAY_CARDINALITY(diskNames); ++i) {
+    for (i = 0; i < G_N_ELEMENTS(diskNames); ++i) {
         VIR_FREE(diskName);
 
         diskName = virIndexToDiskName(i, "sd");
@@ -102,7 +102,7 @@ testDiskNameParse(const void *data G_GNUC_UNUSED)
     int partition;
     struct testDiskName *disk = NULL;
 
-    for (i = 0; i < ARRAY_CARDINALITY(diskNamesPart); ++i) {
+    for (i = 0; i < G_N_ELEMENTS(diskNamesPart); ++i) {
         disk = &diskNamesPart[i];
         if (virDiskNameParse(disk->name, &idx, &partition))
             return -1;
@@ -120,7 +120,7 @@ testDiskNameParse(const void *data G_GNUC_UNUSED)
         }
     }
 
-    for (i = 0; i < ARRAY_CARDINALITY(diskNamesInvalid); ++i) {
+    for (i = 0; i < G_N_ELEMENTS(diskNamesInvalid); ++i) {
         if (!virDiskNameParse(diskNamesInvalid[i], &idx, &partition)) {
             VIR_TEST_DEBUG("Should Fail [%s]", diskNamesInvalid[i]);
             return -1;
@@ -161,7 +161,7 @@ testParseVersionString(const void *data G_GNUC_UNUSED)
     size_t i;
     unsigned long version;
 
-    for (i = 0; i < ARRAY_CARDINALITY(versions); ++i) {
+    for (i = 0; i < G_N_ELEMENTS(versions); ++i) {
         result = virParseVersionString(versions[i].string, &version,
                                        versions[i].allowMissing);
 
@@ -210,7 +210,7 @@ testRoundValueToPowerOfTwo(const void *data G_GNUC_UNUSED)
     unsigned int result;
     size_t i;
 
-    for (i = 0; i < ARRAY_CARDINALITY(roundData); i++) {
+    for (i = 0; i < G_N_ELEMENTS(roundData); i++) {
         result = VIR_ROUND_UP_POWER_OF_TWO(roundData[i].input);
         if (roundData[i].output != result) {
             VIR_TEST_DEBUG("\nInput number [%u]", roundData[i].input);
index 9fec1fcc6e95c449d6fd3c20020293a894a41bca..ff6b506b7db612f3232afc1bc70e26a0b80f1036 100644 (file)
@@ -188,7 +188,7 @@ test4(const void *data G_GNUC_UNUSED)
     virBitmapPtr bitmap = NULL;
     ssize_t i, j;
 
-    if (ARRAY_CARDINALITY(bitsPos) + ARRAY_CARDINALITY(bitsPosInv) != size)
+    if (G_N_ELEMENTS(bitsPos) + G_N_ELEMENTS(bitsPosInv) != size)
         goto error;
 
     /* 0. empty set */
@@ -243,7 +243,7 @@ test4(const void *data G_GNUC_UNUSED)
     j = 0;
     i = -1;
 
-    while (j < ARRAY_CARDINALITY(bitsPos)) {
+    while (j < G_N_ELEMENTS(bitsPos)) {
         i = virBitmapNextSetBit(bitmap, i);
         if (i != bitsPos[j++])
             goto error;
@@ -260,7 +260,7 @@ test4(const void *data G_GNUC_UNUSED)
     j = 0;
     i = -1;
 
-    while (j < ARRAY_CARDINALITY(bitsPosInv)) {
+    while (j < G_N_ELEMENTS(bitsPosInv)) {
         i = virBitmapNextClearBit(bitmap, i);
         if (i != bitsPosInv[j++])
             goto error;
@@ -680,7 +680,7 @@ test13(const void *opaque G_GNUC_UNUSED)
     size_t i = 0;
     int ret = -1;
 
-    for (i = 0; i < ARRAY_CARDINALITY(strings); i++) {
+    for (i = 0; i < G_N_ELEMENTS(strings); i++) {
         map = virBitmapNewString(strings[i]);
         str = virBitmapToString(map, false, true);
 
index ec58d71a6334002f5d3bc4df10e15e04a28c4c04..cecb15ae5b33f4a9f8ce8c62ae1dfdeccc4024c4 100644 (file)
@@ -825,7 +825,7 @@ testCgroupGetMemoryStat(const void *args G_GNUC_UNUSED)
         "inactive_file",
         "unevictable"
     };
-    unsigned long long values[ARRAY_CARDINALITY(expected_values)];
+    unsigned long long values[G_N_ELEMENTS(expected_values)];
 
     if ((rv = virCgroupNewPartition("/virtualmachines", true,
                                     (1 << VIR_CGROUP_CONTROLLER_MEMORY),
@@ -842,7 +842,7 @@ testCgroupGetMemoryStat(const void *args G_GNUC_UNUSED)
         goto cleanup;
     }
 
-    for (i = 0; i < ARRAY_CARDINALITY(expected_values); i++) {
+    for (i = 0; i < G_N_ELEMENTS(expected_values); i++) {
         /* NB: virCgroupGetMemoryStat returns a KiB scaled value */
         if ((expected_values[i] >> 10) != values[i]) {
             fprintf(stderr,
@@ -879,7 +879,7 @@ static int testCgroupGetBlkioIoServiced(const void *args G_GNUC_UNUSED)
         "requests read",
         "requests written"
     };
-    long long values[ARRAY_CARDINALITY(expected_values)];
+    long long values[G_N_ELEMENTS(expected_values)];
 
     if ((rv = virCgroupNewPartition("/virtualmachines", true,
                                     (1 << VIR_CGROUP_CONTROLLER_BLKIO),
@@ -895,7 +895,7 @@ static int testCgroupGetBlkioIoServiced(const void *args G_GNUC_UNUSED)
         goto cleanup;
     }
 
-    for (i = 0; i < ARRAY_CARDINALITY(expected_values); i++) {
+    for (i = 0; i < G_N_ELEMENTS(expected_values); i++) {
         if (expected_values[i] != values[i]) {
             fprintf(stderr,
                     "Wrong value for %s from virCgroupBlkioIoServiced (expected %lld)\n",
@@ -934,7 +934,7 @@ static int testCgroupGetBlkioIoDeviceServiced(const void *args G_GNUC_UNUSED)
         "requests read",
         "requests written"
     };
-    long long values[ARRAY_CARDINALITY(expected_values0)];
+    long long values[G_N_ELEMENTS(expected_values0)];
 
     if ((rv = virCgroupNewPartition("/virtualmachines", true,
                                     (1 << VIR_CGROUP_CONTROLLER_BLKIO),
@@ -951,7 +951,7 @@ static int testCgroupGetBlkioIoDeviceServiced(const void *args G_GNUC_UNUSED)
         goto cleanup;
     }
 
-    for (i = 0; i < ARRAY_CARDINALITY(expected_values0); i++) {
+    for (i = 0; i < G_N_ELEMENTS(expected_values0); i++) {
         if (expected_values0[i] != values[i]) {
             fprintf(stderr,
                     "Wrong value for %s from virCgroupGetBlkioIoDeviceServiced (expected %lld)\n",
@@ -968,7 +968,7 @@ static int testCgroupGetBlkioIoDeviceServiced(const void *args G_GNUC_UNUSED)
         goto cleanup;
     }
 
-    for (i = 0; i < ARRAY_CARDINALITY(expected_values1); i++) {
+    for (i = 0; i < G_N_ELEMENTS(expected_values1); i++) {
         if (expected_values1[i] != values[i]) {
             fprintf(stderr,
                     "Wrong value for %s from virCgroupGetBlkioIoDeviceServiced (expected %lld)\n",
index cda29bb7354114c202467a881bb559546337b874..ed0daf8478070a1e3ba8001a9e2be45260344da2 100644 (file)
@@ -376,7 +376,7 @@ mymain(void)
 # define DO_TEST_MOUNT_SUBTREE(name, path, prefix, mounts, rev) \
     do { \
         struct testFileGetMountSubtreeData data = { \
-            path, prefix, mounts, ARRAY_CARDINALITY(mounts), rev \
+            path, prefix, mounts, G_N_ELEMENTS(mounts), rev \
         }; \
         if (virTestRun(name, testFileGetMountSubtree, &data) < 0) \
             ret = -1; \
index 3325986b2d4f5361b233bca6f563d0caceace5ab..824e9f46c2299ea7b3ef8cdb575ccbf7222d1ee5 100644 (file)
@@ -991,7 +991,7 @@ testFirewallQueryCallback(virFirewallPtr fw,
                        "--jump", "REJECT", NULL);
 
     for (i = 0; lines[i] != NULL; i++) {
-        if (expectedLineNum >= ARRAY_CARDINALITY(expectedLines)) {
+        if (expectedLineNum >= G_N_ELEMENTS(expectedLines)) {
             expectedLineError = true;
             break;
         }
index 1e9098e0e667ebc67b1fc77d9424e13bff42bdfb..3132095463ee463a13d514707b3fd511e986cda7 100644 (file)
@@ -26,7 +26,7 @@ testHashInit(int size)
     /* entries are added in reverse order so that they will be linked in
      * collision list in the same order as in the uuids array
      */
-    for (i = ARRAY_CARDINALITY(uuids) - 1; i >= 0; i--) {
+    for (i = G_N_ELEMENTS(uuids) - 1; i >= 0; i--) {
         ssize_t oldsize = virHashTableSize(hash);
         if (virHashAddEntry(hash, uuids[i], (void *) uuids[i]) < 0) {
             virHashFree(hash);
@@ -39,7 +39,7 @@ testHashInit(int size)
         }
     }
 
-    for (i = 0; i < ARRAY_CARDINALITY(uuids); i++) {
+    for (i = 0; i < G_N_ELEMENTS(uuids); i++) {
         if (!virHashLookup(hash, uuids[i])) {
             VIR_TEST_VERBOSE("\nentry \"%s\" could not be found", uuids[i]);
             virHashFree(hash);
@@ -98,7 +98,7 @@ testHashGrow(const void *data)
     if (!(hash = testHashInit(info->count)))
         return -1;
 
-    if (testHashCheckCount(hash, ARRAY_CARDINALITY(uuids)) < 0)
+    if (testHashCheckCount(hash, G_N_ELEMENTS(uuids)) < 0)
         goto cleanup;
 
     ret = 0;
@@ -112,7 +112,7 @@ testHashGrow(const void *data)
 static int
 testHashUpdate(const void *data G_GNUC_UNUSED)
 {
-    int count = ARRAY_CARDINALITY(uuids) + ARRAY_CARDINALITY(uuids_new);
+    int count = G_N_ELEMENTS(uuids) + G_N_ELEMENTS(uuids_new);
     virHashTablePtr hash;
     size_t i;
     int ret = -1;
@@ -120,7 +120,7 @@ testHashUpdate(const void *data G_GNUC_UNUSED)
     if (!(hash = testHashInit(0)))
         return -1;
 
-    for (i = 0; i < ARRAY_CARDINALITY(uuids_subset); i++) {
+    for (i = 0; i < G_N_ELEMENTS(uuids_subset); i++) {
         if (virHashUpdateEntry(hash, uuids_subset[i], (void *) 1) < 0) {
             VIR_TEST_VERBOSE("\nentry \"%s\" could not be updated",
                     uuids_subset[i]);
@@ -128,7 +128,7 @@ testHashUpdate(const void *data G_GNUC_UNUSED)
         }
     }
 
-    for (i = 0; i < ARRAY_CARDINALITY(uuids_new); i++) {
+    for (i = 0; i < G_N_ELEMENTS(uuids_new); i++) {
         if (virHashUpdateEntry(hash, uuids_new[i], (void *) 1) < 0) {
             VIR_TEST_VERBOSE("\nnew entry \"%s\" could not be updated",
                     uuids_new[i]);
@@ -150,7 +150,7 @@ testHashUpdate(const void *data G_GNUC_UNUSED)
 static int
 testHashRemove(const void *data G_GNUC_UNUSED)
 {
-    int count = ARRAY_CARDINALITY(uuids) - ARRAY_CARDINALITY(uuids_subset);
+    int count = G_N_ELEMENTS(uuids) - G_N_ELEMENTS(uuids_subset);
     virHashTablePtr hash;
     size_t i;
     int ret = -1;
@@ -158,7 +158,7 @@ testHashRemove(const void *data G_GNUC_UNUSED)
     if (!(hash = testHashInit(0)))
         return -1;
 
-    for (i = 0; i < ARRAY_CARDINALITY(uuids_subset); i++) {
+    for (i = 0; i < G_N_ELEMENTS(uuids_subset); i++) {
         if (virHashRemoveEntry(hash, uuids_subset[i]) < 0) {
             VIR_TEST_VERBOSE("\nentry \"%s\" could not be removed",
                     uuids_subset[i]);
@@ -178,7 +178,7 @@ testHashRemove(const void *data G_GNUC_UNUSED)
 
 
 const int testHashCountRemoveForEachSome =
-    ARRAY_CARDINALITY(uuids) - ARRAY_CARDINALITY(uuids_subset);
+    G_N_ELEMENTS(uuids) - G_N_ELEMENTS(uuids_subset);
 
 static int
 testHashRemoveForEachSome(void *payload G_GNUC_UNUSED,
@@ -188,7 +188,7 @@ testHashRemoveForEachSome(void *payload G_GNUC_UNUSED,
     virHashTablePtr hash = data;
     size_t i;
 
-    for (i = 0; i < ARRAY_CARDINALITY(uuids_subset); i++) {
+    for (i = 0; i < G_N_ELEMENTS(uuids_subset); i++) {
         if (STREQ(uuids_subset[i], name)) {
             if (virHashRemoveEntry(hash, name) < 0) {
                 VIR_TEST_VERBOSE("\nentry \"%s\" could not be removed",
@@ -244,7 +244,7 @@ testHashRemoveForEach(const void *data)
 static int
 testHashSteal(const void *data G_GNUC_UNUSED)
 {
-    int count = ARRAY_CARDINALITY(uuids) - ARRAY_CARDINALITY(uuids_subset);
+    int count = G_N_ELEMENTS(uuids) - G_N_ELEMENTS(uuids_subset);
     virHashTablePtr hash;
     size_t i;
     int ret = -1;
@@ -252,7 +252,7 @@ testHashSteal(const void *data G_GNUC_UNUSED)
     if (!(hash = testHashInit(0)))
         return -1;
 
-    for (i = 0; i < ARRAY_CARDINALITY(uuids_subset); i++) {
+    for (i = 0; i < G_N_ELEMENTS(uuids_subset); i++) {
         if (!virHashSteal(hash, uuids_subset[i])) {
             VIR_TEST_VERBOSE("\nentry \"%s\" could not be stolen",
                     uuids_subset[i]);
@@ -280,7 +280,7 @@ testHashRemoveSetIter(const void *payload G_GNUC_UNUSED,
     bool rem = false;
     size_t i;
 
-    for (i = 0; i < ARRAY_CARDINALITY(uuids_subset); i++) {
+    for (i = 0; i < G_N_ELEMENTS(uuids_subset); i++) {
         if (STREQ(uuids_subset[i], name)) {
             rem = true;
             break;
@@ -318,7 +318,7 @@ testHashRemoveSet(const void *data G_GNUC_UNUSED)
         goto cleanup;
     }
 
-    if (testHashCheckCount(hash, ARRAY_CARDINALITY(uuids) - count) < 0)
+    if (testHashCheckCount(hash, G_N_ELEMENTS(uuids) - count) < 0)
         goto cleanup;
 
     ret = 0;
@@ -329,7 +329,7 @@ testHashRemoveSet(const void *data G_GNUC_UNUSED)
 }
 
 
-const int testSearchIndex = ARRAY_CARDINALITY(uuids_subset) / 2;
+const int testSearchIndex = G_N_ELEMENTS(uuids_subset) / 2;
 
 static int
 testHashSearchIter(const void *payload G_GNUC_UNUSED,
@@ -357,7 +357,7 @@ testHashSearch(const void *data G_GNUC_UNUSED)
         goto cleanup;
     }
 
-    if (testHashCheckCount(hash, ARRAY_CARDINALITY(uuids)) < 0)
+    if (testHashCheckCount(hash, G_N_ELEMENTS(uuids)) < 0)
         goto cleanup;
 
     ret = 0;
index d9bdef701d41d82ab2a4fae3a1f8d5dbaca79aa2..81a126ff730b513f82f99337f8ff0be0ae93f1a2 100644 (file)
@@ -260,7 +260,7 @@ mymain(void)
     if (virInitialize() < 0)
         return EXIT_FAILURE;
 
-    for (i = 0; i < ARRAY_CARDINALITY(nodeData); i++)
+    for (i = 0; i < G_N_ELEMENTS(nodeData); i++)
         if (virTestRun(nodeData[i].testName, linuxTestHostCPU, &nodeData[i]) != 0)
             ret = -1;
 
index 6ebe404762abeda6cdd0c486360c77b413f81816..4722591b866b7bfe66fcb51dfa9a91f816a66186 100644 (file)
@@ -343,7 +343,7 @@ mymain(void)
         .fake_cmd_output = "iscsiadm_sendtargets",
         .portal = "10.20.30.40:3260,1",
         .expected_targets = targets,
-        .nexpected = ARRAY_CARDINALITY(targets),
+        .nexpected = G_N_ELEMENTS(targets),
     };
     if (virTestRun("ISCSI scan targets", testISCSIScanTargets, &infoTargets) < 0)
         rv = -1;
index 3251df8873511a00fd98ee01b1158501b4fa40ac..53544abbdb28e473d728dd29f80cbb5372babd90 100644 (file)
@@ -61,7 +61,7 @@ static int testMessageHeaderEncode(const void *args G_GNUC_UNUSED)
     if (virNetMessageEncodeHeader(msg) < 0)
         goto cleanup;
 
-    if (ARRAY_CARDINALITY(expect) != msg->bufferOffset) {
+    if (G_N_ELEMENTS(expect) != msg->bufferOffset) {
         VIR_DEBUG("Expect message offset %zu got %zu",
                   sizeof(expect), msg->bufferOffset);
         goto cleanup;
@@ -253,7 +253,7 @@ static int testMessagePayloadEncode(const void *args G_GNUC_UNUSED)
     if (virNetMessageEncodePayload(msg, (xdrproc_t)xdr_virNetMessageError, &err) < 0)
         goto cleanup;
 
-    if (ARRAY_CARDINALITY(expect) != msg->bufferLength) {
+    if (G_N_ELEMENTS(expect) != msg->bufferLength) {
         VIR_DEBUG("Expect message length %zu got %zu",
                   sizeof(expect), msg->bufferLength);
         goto cleanup;
@@ -495,7 +495,7 @@ static int testMessagePayloadStreamEncode(const void *args G_GNUC_UNUSED)
     if (virNetMessageEncodePayloadRaw(msg, stream, strlen(stream)) < 0)
         goto cleanup;
 
-    if (ARRAY_CARDINALITY(expect) != msg->bufferLength) {
+    if (G_N_ELEMENTS(expect) != msg->bufferLength) {
         VIR_DEBUG("Expect message length %zu got %zu",
                   sizeof(expect), msg->bufferLength);
         goto cleanup;
index 9a0d947c1b1baaabc1e9b8236d64cce31ec2cf13..6c0133642089f83c398af15bed20a64f866e7eae 100644 (file)
@@ -562,7 +562,7 @@ mymain(void)
 
     testTLSWriteCertChain("cacertchain-ctx.pem",
                           certchain,
-                          ARRAY_CARDINALITY(certchain));
+                          G_N_ELEMENTS(certchain));
 
     DO_CTX_TEST(true, "cacertchain-ctx.pem", servercertlevel3areq.filename, false);
     DO_CTX_TEST(false, "cacertchain-ctx.pem", clientcertlevel2breq.filename, false);
index 8d89b16814655d98acc4492d06a45e43a1b99179..997cf5a372ab79dc60011a024f5aecf6a495a9d5 100644 (file)
@@ -456,7 +456,7 @@ mymain(void)
 
     testTLSWriteCertChain("cacertchain-sess.pem",
                           certchain,
-                          ARRAY_CARDINALITY(certchain));
+                          G_N_ELEMENTS(certchain));
 
     DO_SESS_TEST("cacertchain-sess.pem", servercertlevel3areq.filename, clientcertlevel2breq.filename,
                  false, false, "libvirt.org", NULL);
index fe5e9b4940d1f5902c01122e367780681447a254..3eefb7ccee2bfd59d52193440c3bc7eede5fe978 100644 (file)
@@ -130,7 +130,7 @@ virNumaGetPages(int node,
                 size_t *npages)
 {
     const int pages_def[] = { 4, 2 * 1024, 1 * 1024 * 1024};
-    const int npages_def = ARRAY_CARDINALITY(pages_def);
+    const int npages_def = G_N_ELEMENTS(pages_def);
     size_t i = 0;
 
     if (pages_size)
index de96e6eb7e0323f9fafe79c00382494a787f3f59..4078dc4c694dac3e998a0f073ca90ffed83112b7 100644 (file)
@@ -91,7 +91,7 @@ testVirPCIDeviceDetach(const void *opaque G_GNUC_UNUSED)
 {
     int ret = -1;
     virPCIDevicePtr dev[] = {NULL, NULL, NULL};
-    size_t i, nDev = ARRAY_CARDINALITY(dev);
+    size_t i, nDev = G_N_ELEMENTS(dev);
     virPCIDeviceListPtr activeDevs = NULL, inactiveDevs = NULL;
     int count;
 
@@ -132,7 +132,7 @@ testVirPCIDeviceReset(const void *opaque G_GNUC_UNUSED)
 {
     int ret = -1;
     virPCIDevicePtr dev[] = {NULL, NULL, NULL};
-    size_t i, nDev = ARRAY_CARDINALITY(dev);
+    size_t i, nDev = G_N_ELEMENTS(dev);
     virPCIDeviceListPtr activeDevs = NULL, inactiveDevs = NULL;
     int count;
 
@@ -167,7 +167,7 @@ testVirPCIDeviceReattach(const void *opaque G_GNUC_UNUSED)
 {
     int ret = -1;
     virPCIDevicePtr dev[] = {NULL, NULL, NULL};
-    size_t i, nDev = ARRAY_CARDINALITY(dev);
+    size_t i, nDev = G_N_ELEMENTS(dev);
     virPCIDeviceListPtr activeDevs = NULL, inactiveDevs = NULL;
     int count;
 
index e80ccfedb7f18913c82579680dc4ef469d00c70d..97fa877445cce094651a33521a6958a667b61281 100644 (file)
@@ -96,7 +96,7 @@ VIR_MOCK_WRAP_RET_ARGS(dbus_connection_send_with_reply_and_block,
             is_authorized = 0;
             is_challenge = 0;
             retdetails = retdetailscancelled;
-            retdetailslen = ARRAY_CARDINALITY(retdetailscancelled) / 2;
+            retdetailslen = G_N_ELEMENTS(retdetailscancelled) / 2;
         } else if (STREQ(actionid, "org.libvirt.test.details")) {
             size_t i;
             is_authorized = 0;
index 3ccd9a8535a880c5a8dbf27bc78a252c2e9175c4..df392f374e9dc2061a60da7c3dc05420aeefc9e6 100644 (file)
@@ -85,7 +85,7 @@ static int testRotatingFileReaderAssertBufferContent(const char *buf,
     char bytes[] = { FILEBYTE, FILEBYTE0, FILEBYTE1 };
     size_t total = 0;
 
-    if (nregions > ARRAY_CARDINALITY(bytes)) {
+    if (nregions > G_N_ELEMENTS(bytes)) {
         fprintf(stderr, "Too many regions %zu\n", nregions);
         return -1;
     }
@@ -573,7 +573,7 @@ static int testRotatingFileReaderOne(const void *data G_GNUC_UNUSED)
         goto cleanup;
 
     if (testRotatingFileReaderAssertBufferContent(buf, got,
-                                                  ARRAY_CARDINALITY(regions),
+                                                  G_N_ELEMENTS(regions),
                                                   regions) < 0)
         goto cleanup;
 
@@ -605,7 +605,7 @@ static int testRotatingFileReaderAll(const void *data G_GNUC_UNUSED)
         goto cleanup;
 
     if (testRotatingFileReaderAssertBufferContent(buf, got,
-                                                  ARRAY_CARDINALITY(regions),
+                                                  G_N_ELEMENTS(regions),
                                                   regions) < 0)
         goto cleanup;
 
@@ -637,7 +637,7 @@ static int testRotatingFileReaderPartial(const void *data G_GNUC_UNUSED)
         goto cleanup;
 
     if (testRotatingFileReaderAssertBufferContent(buf, got,
-                                                  ARRAY_CARDINALITY(regions),
+                                                  G_N_ELEMENTS(regions),
                                                   regions) < 0)
         goto cleanup;
 
@@ -678,7 +678,7 @@ static int testRotatingFileReaderSeek(const void *data G_GNUC_UNUSED)
         goto cleanup;
 
     if (testRotatingFileReaderAssertBufferContent(buf, got,
-                                                  ARRAY_CARDINALITY(regions),
+                                                  G_N_ELEMENTS(regions),
                                                   regions) < 0)
         goto cleanup;
 
index 77e8e0e40492cad293de170225f32ceb8df15fb9..20e407448fcf37708e95ed7e0502ea1857c4282d 100644 (file)
@@ -478,7 +478,7 @@ testPathCanonicalizeReadlink(const char *path,
 
     *linkpath = NULL;
 
-    for (i = 0; i < ARRAY_CARDINALITY(testPathCanonicalizeSymlinks); i++) {
+    for (i = 0; i < G_N_ELEMENTS(testPathCanonicalizeSymlinks); i++) {
         if (STREQ(path, testPathCanonicalizeSymlinks[i][0])) {
             if (VIR_STRDUP(*linkpath, testPathCanonicalizeSymlinks[i][1]) < 0)
                 return -1;
@@ -519,9 +519,9 @@ testPathRelativePrepare(void)
 {
     size_t i;
 
-    for (i = 0; i < ARRAY_CARDINALITY(backingchain); i++) {
+    for (i = 0; i < G_N_ELEMENTS(backingchain); i++) {
         backingchain[i].type = VIR_STORAGE_TYPE_FILE;
-        if (i < ARRAY_CARDINALITY(backingchain) - 1)
+        if (i < G_N_ELEMENTS(backingchain) - 1)
             backingchain[i].backingStore = &backingchain[i + 1];
         else
             backingchain[i].backingStore = NULL;
@@ -681,7 +681,7 @@ mymain(void)
         data = (struct testChainData){ \
             start, format, { __VA_ARGS__ }, 0, flags, \
         }; \
-        for (i = 0; i < ARRAY_CARDINALITY(data.files); i++) \
+        for (i = 0; i < G_N_ELEMENTS(data.files); i++) \
             if (data.files[i]) \
                 data.nfiles++; \
         if (virTestRun(virTestCounterNext(), \
index 12dab85ab8fabb3ab337b3f3c8fcc57a41427417..43c76ccda0f11c719e67d177170178538e0f018a 100644 (file)
@@ -325,7 +325,7 @@ testStrdup(const void *data G_GNUC_UNUSED)
 
     ret = 0;
  cleanup:
-    for (i = 0; i < ARRAY_CARDINALITY(array); i++)
+    for (i = 0; i < G_N_ELEMENTS(array); i++)
         VIR_FREE(array[i]);
     return ret;
 }
@@ -384,12 +384,12 @@ testStringSortCompare(const void *opaque G_GNUC_UNUSED)
     int ret = -1;
     size_t i;
 
-    qsort(randlist, ARRAY_CARDINALITY(randlist), sizeof(randlist[0]),
+    qsort(randlist, G_N_ELEMENTS(randlist), sizeof(randlist[0]),
           virStringSortCompare);
-    qsort(randrlist, ARRAY_CARDINALITY(randrlist), sizeof(randrlist[0]),
+    qsort(randrlist, G_N_ELEMENTS(randrlist), sizeof(randrlist[0]),
           virStringSortRevCompare);
 
-    for (i = 0; i < ARRAY_CARDINALITY(randlist); i++) {
+    for (i = 0; i < G_N_ELEMENTS(randlist); i++) {
         if (STRNEQ(randlist[i], sortlist[i])) {
             fprintf(stderr, "sortlist[%zu] '%s' != randlist[%zu] '%s'\n",
                     i, sortlist[i], i, randlist[i]);
index 0a974437790f02185e0f3eaabbe5ffa99dac0100..8aaac097e9ac20e7c6081b0450451305e60082f1 100644 (file)
@@ -340,7 +340,7 @@ static int testCreateNetwork(const void *opaque G_GNUC_UNUSED)
     int nicindexes[] = {
         2, 1729, 87539319,
     };
-    size_t nnicindexes = ARRAY_CARDINALITY(nicindexes);
+    size_t nnicindexes = G_N_ELEMENTS(nicindexes);
     if (virSystemdCreateMachine("demo",
                                 "lxc",
                                 uuid,
@@ -586,7 +586,7 @@ testActivation(bool useNames)
     map[1].family = AF_INET;
     map[1].port = virNetSocketGetPort(sockIP[0]);
 
-    if (virSystemdGetActivation(map, ARRAY_CARDINALITY(map), &act) < 0)
+    if (virSystemdGetActivation(map, G_N_ELEMENTS(map), &act) < 0)
         goto cleanup;
 
     if (act == NULL) {
index 9714a0a4c66cf526c2fde737aa3491de3881b5b7..87b47ba86ed59d63d20f2aef8f78cb7c58abe179 100644 (file)
@@ -74,7 +74,7 @@ testTypedParamsValidate(const void *opaque)
 }
 
 #define PARAMS_ARRAY(...) ((virTypedParameter[]){ __VA_ARGS__ })
-#define PARAMS_SIZE(...) ARRAY_CARDINALITY(PARAMS_ARRAY(__VA_ARGS__))
+#define PARAMS_SIZE(...) G_N_ELEMENTS(PARAMS_ARRAY(__VA_ARGS__))
 
 #define PARAMS(...) \
     .params  = PARAMS_ARRAY(__VA_ARGS__), \
@@ -96,7 +96,7 @@ testTypedParamsFilter(const void *opaque G_GNUC_UNUSED)
     virTypedParameterPtr *filtered = NULL;
 
 
-    nfiltered = virTypedParamsFilter(params, ARRAY_CARDINALITY(params),
+    nfiltered = virTypedParamsFilter(params, G_N_ELEMENTS(params),
                                      "foo", &filtered);
     if (nfiltered != 3)
         goto cleanup;
@@ -108,7 +108,7 @@ testTypedParamsFilter(const void *opaque G_GNUC_UNUSED)
     VIR_FREE(filtered);
     filtered = NULL;
 
-    nfiltered = virTypedParamsFilter(params, ARRAY_CARDINALITY(params),
+    nfiltered = virTypedParamsFilter(params, G_N_ELEMENTS(params),
                                      "bar", &filtered);
 
     if (nfiltered != 2)
@@ -175,7 +175,7 @@ testTypedParamsGetStringList(const void *opaque G_GNUC_UNUSED)
     };
 
     picked = virTypedParamsGetStringList(params,
-                                         ARRAY_CARDINALITY(params),
+                                         G_N_ELEMENTS(params),
                                          "bar",
                                          &strings);
 
index 5c0aa0e588fddbdb7dbce4433f88b07754a57ff2..a83c47a1628ac6f713e7d78d8f4643ef39bedf69 100644 (file)
@@ -13467,7 +13467,7 @@ virshDomainEventCallback virshDomainEventCallbacks[] = {
     { "block-threshold",
       VIR_DOMAIN_EVENT_CALLBACK(virshEventBlockThresholdPrint), },
 };
-verify(VIR_DOMAIN_EVENT_ID_LAST == ARRAY_CARDINALITY(virshDomainEventCallbacks));
+verify(VIR_DOMAIN_EVENT_ID_LAST == G_N_ELEMENTS(virshDomainEventCallbacks));
 
 static const vshCmdInfo info_event[] = {
     {.name = "help",
index 163cf21af91618f4b53a131178e6b3a01e495ea7..3589d84116effb15e896d01023342f95f95adf9e 100644 (file)
@@ -1242,7 +1242,7 @@ virshNetworkEventCallback virshNetworkEventCallbacks[] = {
     { "lifecycle",
       VIR_NETWORK_EVENT_CALLBACK(vshEventLifecyclePrint), },
 };
-verify(VIR_NETWORK_EVENT_ID_LAST == ARRAY_CARDINALITY(virshNetworkEventCallbacks));
+verify(VIR_NETWORK_EVENT_ID_LAST == G_N_ELEMENTS(virshNetworkEventCallbacks));
 
 static const vshCmdInfo info_network_event[] = {
     {.name = "help",
index 9236d159ed2d0be73796fab01185446f7259bb8a..455ddedc2d4e04664974f05e45a77897b11996e7 100644 (file)
@@ -846,7 +846,7 @@ virshNodeDeviceEventCallback virshNodeDeviceEventCallbacks[] = {
       VIR_NODE_DEVICE_EVENT_CALLBACK(vshEventLifecyclePrint), },
     { "update", vshEventGenericPrint, }
 };
-verify(VIR_NODE_DEVICE_EVENT_ID_LAST == ARRAY_CARDINALITY(virshNodeDeviceEventCallbacks));
+verify(VIR_NODE_DEVICE_EVENT_ID_LAST == G_N_ELEMENTS(virshNodeDeviceEventCallbacks));
 
 
 static const vshCmdInfo info_node_device_event[] = {
index 55af2e4e4ecd64645ed72161e3a7488b08f4dd25..b01186f3390402deadde9dc31bbee11ace56fb5c 100644 (file)
@@ -1986,7 +1986,7 @@ virshPoolEventCallback virshPoolEventCallbacks[] = {
       VIR_STORAGE_POOL_EVENT_CALLBACK(vshEventLifecyclePrint), },
     { "refresh", vshEventGenericPrint, }
 };
-verify(VIR_STORAGE_POOL_EVENT_ID_LAST == ARRAY_CARDINALITY(virshPoolEventCallbacks));
+verify(VIR_STORAGE_POOL_EVENT_ID_LAST == G_N_ELEMENTS(virshPoolEventCallbacks));
 
 
 static const vshCmdInfo info_pool_event[] = {
index 7558c4c4769ded6b92b0efc65797e661e731a46a..f0446c83ae582d336951636e42fcd219a693569b 100644 (file)
@@ -649,7 +649,7 @@ virshSecretEventCallback virshSecretEventCallbacks[] = {
       VIR_SECRET_EVENT_CALLBACK(vshEventLifecyclePrint), },
     { "value-changed", vshEventGenericPrint, },
 };
-verify(VIR_SECRET_EVENT_ID_LAST == ARRAY_CARDINALITY(virshSecretEventCallbacks));
+verify(VIR_SECRET_EVENT_ID_LAST == G_N_ELEMENTS(virshSecretEventCallbacks));
 
 static const vshCmdInfo info_secret_event[] = {
     {.name = "help",
index 7fb13351947bdc32173a7940b845fccb00099088..daeb2f0e1c1f0b0ce5dcebc2aabe922e2b439dbd 100644 (file)
@@ -99,7 +99,7 @@ static const char * failMessages[] = {
     N_("NOTE"),
 };
 
-verify(ARRAY_CARDINALITY(failMessages) == VIR_HOST_VALIDATE_LAST);
+verify(G_N_ELEMENTS(failMessages) == VIR_HOST_VALIDATE_LAST);
 
 static const char *failEscapeCodes[] = {
     "\033[31m",
@@ -107,7 +107,7 @@ static const char *failEscapeCodes[] = {
     "\033[34m",
 };
 
-verify(ARRAY_CARDINALITY(failEscapeCodes) == VIR_HOST_VALIDATE_LAST);
+verify(G_N_ELEMENTS(failEscapeCodes) == VIR_HOST_VALIDATE_LAST);
 
 void virHostMsgFail(virHostValidateLevel level,
                     const char *format,