From patchwork Mon Mar 24 22:01:30 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Tamir Duberstein X-Patchwork-Id: 875878 Received: from mail-qt1-f179.google.com (mail-qt1-f179.google.com [209.85.160.179]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id CAB671A83F8; Mon, 24 Mar 2025 22:01:46 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.160.179 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1742853708; cv=none; b=V+m0Y7aE2WzlqC7UaYWOxLE3+nnm4swec80mhIxkV8dIAMznDsVxpPGpSkyDCsc7ybzBabWODzVA0xmqd0jFASYk3vY5PIlAsWShj7/4r2pNv/K2Po6fLx8h3p7040gDkm5tRi+hs0reC/21e64FVG0+WGDl4qxdbY7D3uNNdVE= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1742853708; c=relaxed/simple; bh=jXBOpo5UWtwyrzWvahiJ2pLNqcTsAoQ2rJCCE9+N488=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=slJO5rD3MoadNeR75vNe4ZTNhytdw5tbgTpMKBAPwd2V7+GNOajxctO7dE79TwFleHmbaNNbTcxCFZ3ZC2KEca8oqJC8Gtbo5rb7BIxR0VIhB2veCZgG2vUQEQb7T9/maPJOHkDB5vJigrHhvFqa716mvcUc14rCuO78VGxMy00= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=ac5C/BK+; arc=none smtp.client-ip=209.85.160.179 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="ac5C/BK+" Received: by mail-qt1-f179.google.com with SMTP id d75a77b69052e-474f0c1e1c6so75604391cf.1; Mon, 24 Mar 2025 15:01:46 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1742853705; x=1743458505; darn=vger.kernel.org; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:from:to:cc:subject:date:message-id :reply-to; bh=VLYdB8oz2i/GfcI4zN53mys18Ki2XN46F1DPNODr+Tk=; b=ac5C/BK+lIVre3hExgxqeJbkMUWOQvXcwgQROQDkqqIB9dKRl/wWUAtEbIWsTjxgbG IHaaOovBCkrHQEiRxkn/82LyeIOFg8S5v6szFc2mHIv2jjXT9Z4gtFV63zSRZtfH466S n/BY9gytp+PrHv4MHxc/pvjik6315rsTpi7HndyxC/KSLuXdLvjHquq9kPLdCtz6gg1/ bDACxnGLtD92L8SKpBGGU2iN7NOZVOL3VnJW1Ugdrg2bum3gasQIDv/8LJsx43ectCAc 4iF/KnaU7jVfbkEbhrnpdDwZ1bNhd3a+L9QmxD+Wo6iRpH12025+xgHLlwqut65xBnWS 1EnA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1742853705; x=1743458505; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=VLYdB8oz2i/GfcI4zN53mys18Ki2XN46F1DPNODr+Tk=; b=n+B++mf1p4SI698CgKjn2yTdBY9ymhfWCWAvESUD7j08tlKHyEr4hrLj+dYfZdNwvt ATZmepU6nuuCjovLbZTaPqHUD93EaYgJ8jfrzmTk/6CFPEKAlBQAksczMyiYddbXAErq 6VFTXZmJLJyT9KP/oYCLsg9tB050XEL2HMkaRVX6b5VP0GL6+a6JEwRFgeRhbkBDT1Iv tNCFAEWCqdZ1uos3rDlKhFJUIWsfWczj9G/+Rzq4/65dBptQm736xzTcDAQmrLiBqRZT 9PRTQigA9Yl1wejkNV3NqjLXSYntz2eaDdXaG3lqManVEJXcxdhfN3eUfE5VN3KqkX6y CKrQ== X-Forwarded-Encrypted: i=1; AJvYcCULFhBpyYtztMZ3bA6fiP+FJ4+T5ttDAhtRKGImXLqfjXxnsVH4IMRI2lm94iQh+wDwJ8MDJjUMQhPX@vger.kernel.org, AJvYcCUh1PlhQqd8aUdZK2JWf2bDKQJgmHyFocSG9j+dD26v7g0JkSmh/oONgXoFjYUKWEaW9pzPN8SoDI9AgaVzcAw=@vger.kernel.org, AJvYcCWhq/YWJvSX7Ew1uXCttWmLnfbXBBeQMADpl8AHRBRIuYWX4NyvnunZvoX4FZsimTepwEX4FZxQ@vger.kernel.org, AJvYcCWoKH35vVesDjkS07LbF7Oiwg3b2dPBKJuyaOgw/9NE6wzUH7Q5fRAMKbf6wxgB3gyWDxi7S04gw8WPDH0=@vger.kernel.org, AJvYcCXgMw64Bh+MbdyoWHWcQkNRcYBSusfqF8eKxrpnsH1TIGB3fvCYXWr1vvVjL+9x7sYRcV7o/1xtzcRk@vger.kernel.org, AJvYcCXsrbC2451oV+9hIqOhaEjvynJIe30HsIdTkUaeaYZI4gMbrpRE1FAWZvy7DOkQWvLepp/Bep6CQA0Mo7JgJmBz@vger.kernel.org, AJvYcCXuyLtcH54cof2cvy7QBvLjE+ZK4Y74Y/wRrS9OlD9t1Aj8+AhVQOssJzPrIjtHhbDb2KKyyN2XvoHIa0tj@vger.kernel.org X-Gm-Message-State: AOJu0Yxyg4vD8T6G0HngbpqiMf6ZhN6xpjA90TSYIvNm4BDOTWqt7BMO yjxAGGcs4807E0SkJKsdPnMXMA8EOaPTx8Lbbai3pUWP0tnOnhNi X-Gm-Gg: ASbGnctFsJSkOngo5Ym09GRV9peJLYcTx5QzBVZi5pI9Fhhtcgnww/XYHWoxvSFsI38 E2IbijVKoQpqiLTIpc9ddAYzIDidH5Riu6GsHIsQRRlI6mzgxdsMsO+XicYXZRGhGOXxYi5CvLs 4WR3zee0H61zDB2bbUGSryz6aHzEGK2gCFORhz3iC2od6LF+QDsm6iKgvhKmdN3LiFkPynX410l y0uXBtlBdGFth6sMbGjo02hvwSBLuYfnEbNWcTmMcjt+BhsHKp51cMyIZ8kmpYriT7jQgXMzXpD 3RxsR1y5pn/JakZ97Rll70POsPsiNBMDFxX+JoW5T4BZtXj6kKKteLs+pi/Pi0m7I346mmBciII ENZwKrr0rhQ6wuORRYS1UYiBJCjx9Lb7GtgL8h1DOcq1clOXSpO2a6fjSbS9HCY/8 X-Google-Smtp-Source: AGHT+IETbkIsiMSS3aJnwxSeNF2HAjbJX2SYSBhI/Fk+fnGg2Vjy1M9GacySt+Gyh5yE9AnyKA+qog== X-Received: by 2002:a05:622a:4d03:b0:476:77a5:3106 with SMTP id d75a77b69052e-4771dd615e2mr239659571cf.5.1742853705391; Mon, 24 Mar 2025 15:01:45 -0700 (PDT) Received: from 1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.ip6.arpa ([2620:10d:c091:600::1:43c7]) by smtp.gmail.com with ESMTPSA id d75a77b69052e-4771d0ad87esm52129541cf.0.2025.03.24.15.01.43 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 24 Mar 2025 15:01:44 -0700 (PDT) From: Tamir Duberstein Date: Mon, 24 Mar 2025 18:01:30 -0400 Subject: [PATCH v6 1/6] rust: retain pointer mut-ness in `container_of!` Precedence: bulk X-Mailing-List: linux-kselftest@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Message-Id: <20250324-ptr-as-ptr-v6-1-49d1b7fd4290@gmail.com> References: <20250324-ptr-as-ptr-v6-0-49d1b7fd4290@gmail.com> In-Reply-To: <20250324-ptr-as-ptr-v6-0-49d1b7fd4290@gmail.com> To: Masahiro Yamada , Nathan Chancellor , Nicolas Schier , Miguel Ojeda , Alex Gaynor , Boqun Feng , Gary Guo , =?utf-8?q?Bj=C3=B6rn_Roy_Baron?= , Benno Lossin , Andreas Hindborg , Alice Ryhl , Trevor Gross , Danilo Krummrich , Greg Kroah-Hartman , "Rafael J. Wysocki" , Brendan Higgins , David Gow , Rae Moar , Bjorn Helgaas , Luis Chamberlain , Russ Weight , Rob Herring , Saravana Kannan , Abdiel Janulgue , Daniel Almeida , Robin Murphy , Maarten Lankhorst , Maxime Ripard , Thomas Zimmermann , David Airlie , Simona Vetter , FUJITA Tomonori Cc: linux-kbuild@vger.kernel.org, linux-kernel@vger.kernel.org, rust-for-linux@vger.kernel.org, linux-kselftest@vger.kernel.org, kunit-dev@googlegroups.com, linux-pci@vger.kernel.org, linux-block@vger.kernel.org, devicetree@vger.kernel.org, dri-devel@lists.freedesktop.org, netdev@vger.kernel.org, Tamir Duberstein X-Mailer: b4 0.15-dev Avoid casting the input pointer to `*const _`, allowing the output pointer to be `*mut` if the input is `*mut`. This allows a number of `*const` to `*mut` conversions to be removed at the cost of slightly worse ergonomics when the macro is used with a reference rather than a pointer; the only example of this was in the macro's own doctest. Reviewed-by: Benno Lossin Reviewed-by: Alice Ryhl Signed-off-by: Tamir Duberstein --- rust/kernel/lib.rs | 5 ++--- rust/kernel/pci.rs | 2 +- rust/kernel/platform.rs | 2 +- rust/kernel/rbtree.rs | 23 ++++++++++------------- 4 files changed, 14 insertions(+), 18 deletions(-) diff --git a/rust/kernel/lib.rs b/rust/kernel/lib.rs index ba0f3b0297b2..cffa0d837f06 100644 --- a/rust/kernel/lib.rs +++ b/rust/kernel/lib.rs @@ -190,7 +190,7 @@ fn panic(info: &core::panic::PanicInfo<'_>) -> ! { /// } /// /// let test = Test { a: 10, b: 20 }; -/// let b_ptr = &test.b; +/// let b_ptr: *const _ = &test.b; /// // SAFETY: The pointer points at the `b` field of a `Test`, so the resulting pointer will be /// // in-bounds of the same allocation as `b_ptr`. /// let test_alias = unsafe { container_of!(b_ptr, Test, b) }; @@ -199,9 +199,8 @@ fn panic(info: &core::panic::PanicInfo<'_>) -> ! { #[macro_export] macro_rules! container_of { ($ptr:expr, $type:ty, $($f:tt)*) => {{ - let ptr = $ptr as *const _ as *const u8; let offset: usize = ::core::mem::offset_of!($type, $($f)*); - ptr.sub(offset) as *const $type + $ptr.byte_sub(offset).cast::<$type>() }} } diff --git a/rust/kernel/pci.rs b/rust/kernel/pci.rs index f7b2743828ae..271a7690a9a0 100644 --- a/rust/kernel/pci.rs +++ b/rust/kernel/pci.rs @@ -364,7 +364,7 @@ pub unsafe fn from_dev(dev: ARef) -> Self { fn as_raw(&self) -> *mut bindings::pci_dev { // SAFETY: By the type invariant `self.0.as_raw` is a pointer to the `struct device` // embedded in `struct pci_dev`. - unsafe { container_of!(self.0.as_raw(), bindings::pci_dev, dev) as _ } + unsafe { container_of!(self.0.as_raw(), bindings::pci_dev, dev) } } /// Returns the PCI vendor ID. diff --git a/rust/kernel/platform.rs b/rust/kernel/platform.rs index 1297f5292ba9..84a4ecc642a1 100644 --- a/rust/kernel/platform.rs +++ b/rust/kernel/platform.rs @@ -189,7 +189,7 @@ unsafe fn from_dev(dev: ARef) -> Self { fn as_raw(&self) -> *mut bindings::platform_device { // SAFETY: By the type invariant `self.0.as_raw` is a pointer to the `struct device` // embedded in `struct platform_device`. - unsafe { container_of!(self.0.as_raw(), bindings::platform_device, dev) }.cast_mut() + unsafe { container_of!(self.0.as_raw(), bindings::platform_device, dev) } } } diff --git a/rust/kernel/rbtree.rs b/rust/kernel/rbtree.rs index 5246b2c8a4ff..8d978c896747 100644 --- a/rust/kernel/rbtree.rs +++ b/rust/kernel/rbtree.rs @@ -424,7 +424,7 @@ pub fn cursor_lower_bound(&mut self, key: &K) -> Option> while !node.is_null() { // SAFETY: By the type invariant of `Self`, all non-null `rb_node` pointers stored in `self` // point to the links field of `Node` objects. - let this = unsafe { container_of!(node, Node, links) }.cast_mut(); + let this = unsafe { container_of!(node, Node, links) }; // SAFETY: `this` is a non-null node so it is valid by the type invariants. let this_key = unsafe { &(*this).key }; // SAFETY: `node` is a non-null node so it is valid by the type invariants. @@ -496,7 +496,7 @@ fn drop(&mut self) { // but it is not observable. The loop invariant is still maintained. // SAFETY: `this` is valid per the loop invariant. - unsafe { drop(KBox::from_raw(this.cast_mut())) }; + unsafe { drop(KBox::from_raw(this)) }; } } } @@ -761,7 +761,7 @@ pub fn remove_current(self) -> (Option, RBTreeNode) { let next = self.get_neighbor_raw(Direction::Next); // SAFETY: By the type invariant of `Self`, all non-null `rb_node` pointers stored in `self` // point to the links field of `Node` objects. - let this = unsafe { container_of!(self.current.as_ptr(), Node, links) }.cast_mut(); + let this = unsafe { container_of!(self.current.as_ptr(), Node, links) }; // SAFETY: `this` is valid by the type invariants as described above. let node = unsafe { KBox::from_raw(this) }; let node = RBTreeNode { node }; @@ -806,7 +806,7 @@ fn remove_neighbor(&mut self, direction: Direction) -> Option> unsafe { bindings::rb_erase(neighbor, addr_of_mut!(self.tree.root)) }; // SAFETY: By the type invariant of `Self`, all non-null `rb_node` pointers stored in `self` // point to the links field of `Node` objects. - let this = unsafe { container_of!(neighbor, Node, links) }.cast_mut(); + let this = unsafe { container_of!(neighbor, Node, links) }; // SAFETY: `this` is valid by the type invariants as described above. let node = unsafe { KBox::from_raw(this) }; return Some(RBTreeNode { node }); @@ -912,7 +912,7 @@ unsafe fn to_key_value_mut<'b>(node: NonNull) -> (&'b K, &'b unsafe fn to_key_value_raw<'b>(node: NonNull) -> (&'b K, *mut V) { // SAFETY: By the type invariant of `Self`, all non-null `rb_node` pointers stored in `self` // point to the links field of `Node` objects. - let this = unsafe { container_of!(node.as_ptr(), Node, links) }.cast_mut(); + let this = unsafe { container_of!(node.as_ptr(), Node, links) }; // SAFETY: The passed `node` is the current node or a non-null neighbor, // thus `this` is valid by the type invariants. let k = unsafe { &(*this).key }; @@ -1021,7 +1021,7 @@ fn next(&mut self) -> Option { // SAFETY: By the type invariant of `IterRaw`, `self.next` is a valid node in an `RBTree`, // and by the type invariant of `RBTree`, all nodes point to the links field of `Node` objects. - let cur = unsafe { container_of!(self.next, Node, links) }.cast_mut(); + let cur = unsafe { container_of!(self.next, Node, links) }; // SAFETY: `self.next` is a valid tree node by the type invariants. self.next = unsafe { bindings::rb_next(self.next) }; @@ -1216,7 +1216,7 @@ pub fn get_mut(&mut self) -> &mut V { // SAFETY: // - `self.node_links` is a valid pointer to a node in the tree. // - We have exclusive access to the underlying tree, and can thus give out a mutable reference. - unsafe { &mut (*(container_of!(self.node_links, Node, links).cast_mut())).value } + unsafe { &mut (*(container_of!(self.node_links, Node, links))).value } } /// Converts the entry into a mutable reference to its value. @@ -1226,7 +1226,7 @@ pub fn into_mut(self) -> &'a mut V { // SAFETY: // - `self.node_links` is a valid pointer to a node in the tree. // - This consumes the `&'a mut RBTree`, therefore it can give out a mutable reference that lives for `'a`. - unsafe { &mut (*(container_of!(self.node_links, Node, links).cast_mut())).value } + unsafe { &mut (*(container_of!(self.node_links, Node, links))).value } } /// Remove this entry from the [`RBTree`]. @@ -1239,9 +1239,7 @@ pub fn remove_node(self) -> RBTreeNode { RBTreeNode { // SAFETY: The node was a node in the tree, but we removed it, so we can convert it // back into a box. - node: unsafe { - KBox::from_raw(container_of!(self.node_links, Node, links).cast_mut()) - }, + node: unsafe { KBox::from_raw(container_of!(self.node_links, Node, links)) }, } } @@ -1272,8 +1270,7 @@ fn replace(self, node: RBTreeNode) -> RBTreeNode { // SAFETY: // - `self.node_ptr` produces a valid pointer to a node in the tree. // - Now that we removed this entry from the tree, we can convert the node to a box. - let old_node = - unsafe { KBox::from_raw(container_of!(self.node_links, Node, links).cast_mut()) }; + let old_node = unsafe { KBox::from_raw(container_of!(self.node_links, Node, links)) }; RBTreeNode { node: old_node } } From patchwork Mon Mar 24 22:01:32 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Tamir Duberstein X-Patchwork-Id: 875877 Received: from mail-qt1-f171.google.com (mail-qt1-f171.google.com [209.85.160.171]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 3FDA71F1307; Mon, 24 Mar 2025 22:01:49 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.160.171 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1742853712; cv=none; b=JuggLmUFWJeIKuQcCbSFcx97yTDTnMHVg5jw595L08CVdbxEtVWEUeQ/IDnG0bDyL+jNiHQrRJv/oy6TbU56z/Sa4vJPuucS/xg1EGEQSX7REquWq1e3/MiMo8Ca4jN8NOFXtDWBGP5Nb+jA/I4bCyFv1vkofaZV8lzd2fo5344= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1742853712; c=relaxed/simple; bh=xbVg7Xhp/6dsdm/KyWD3Le3ZeFNfssrbQ2pquJNc7H4=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=OuTkz98ybLprDPYzvd0IDxLr+zhOdzV0Na+Emu83r3usGf/ZX9yJX2Sv3J4Em/MiZEntXm2IgZSnNztYj5D+fBcTCTxMYOc9dirjkumY8oJzE/Fl06KSePVSNX5aRAK/4XuN0Pn3F3Cp/TpKlf2LPjqoDZ7ACH1oFZSA1X16TDw= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=BnbMKDEN; arc=none smtp.client-ip=209.85.160.171 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="BnbMKDEN" Received: by mail-qt1-f171.google.com with SMTP id d75a77b69052e-4767e969b94so30224591cf.2; Mon, 24 Mar 2025 15:01:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1742853709; x=1743458509; darn=vger.kernel.org; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:from:to:cc:subject:date:message-id :reply-to; bh=RrSMUDZZYlyoJ9Y4j+pFyX1Efp/qPB5Vo8olgw4flH0=; b=BnbMKDEN2KtY+5hcjtIpZkS7G5MyUQRQQyrySnCLFM0FTEuixN9XGNHSmQgqWOSL6J zILwIrzKsWQHg9pKet3G3r4aWv8EXNI/I538coHJFzhTAMol0jNe8OrJv6gnp08QsBEj LJd0APxhaKet08L3alrrpP7Wv67MU6xT/QV/kVLxeYAiHfq9qBAWLOxX6n99p2QrXKYM gewoEry4isIXBfz7t9KdKPr+Erkreua95GGMwlXh0TQY/a2rxyesapKHYCZkOqpjGygl ayIC0hu+u7OV/H3wm7YYPB1QlVpDvMws352/AQMG/4QEPAyOxXn0yo4ktNzd4RsLqXec hieQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1742853709; x=1743458509; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=RrSMUDZZYlyoJ9Y4j+pFyX1Efp/qPB5Vo8olgw4flH0=; b=fRDi+z4cJ/jHqOjbg0XprGWizQzhBEDWQdPAusHBLrBhWSzFnIfT6H1Ikk70fMHTpI XBv02OgpLsPe0EpPHboyVom8CdRCz9Mg5VP/ouwXwHIUaM8/BpfajjrBQZJh4nee91WY RxOPSQ6QvhqpBh8ZtjEz80YErmk0g26XRVgikhxbLuAzjwMXSKEDFHSaalO9Gn+0dlvo MGUDzI5QaQpTEH+wRI0SzWFpOd9fDFrfGtfUuKBGsPRMLCX8zYbvVCUez5d3CFQk0qqc dAidLRL8ji6MW7XSapo6bsFjl20FLhAoK09xO1+68ZMV+DzyV5Uda9AOrEp9A4b6/8Wv PCFw== X-Forwarded-Encrypted: i=1; AJvYcCUk2xJV4cE2TODzGlUKKG8e/DSDJimARAgTArLCOzemwXRxj9AlX5ZQBJu1gg2Kv36M77DWEQGX1mQUDLpn@vger.kernel.org, AJvYcCVuOf67s9jsGlr87XxtY92bVCznYfh/xesN2jPBGLOaQzFs+phqXnqHmsLkvJJhDhoLqKUlb0BUQjmLOLU=@vger.kernel.org, AJvYcCWORogAWEVISootgX6imclFlyLZLTtIAbIf+oYnUrqId90fAjTPwOhZ7XVBR0LPP0b+Gf0ylolvXp2r5nEAwg8=@vger.kernel.org, AJvYcCWoQwvrpylitY6OkAgtK2gTT2sCtWjtt9O4pq65Vf6ay1DQSLnT+CnDkDiUiggrAyyh3rKU2nWtoc2v@vger.kernel.org, AJvYcCWuwthuN6VdW22MR4w+PaEXkNCSk1twVatdqtGdQtCgxA02IAAVWCzpjTpyiUkYZsL5+S1Xo4XTpr4Uv8f/4fL5@vger.kernel.org, AJvYcCXOg2qrGlErKJVCVysDM9Dor2Qwa5y3boxH2drnKdHMGDCg+KxgxYVROgFivJ++vnC9QD/PnUJiO/bx@vger.kernel.org, AJvYcCXkIfq3+S192a2KNVNi85IBV4idr9PRcz6ElbNuN1hnCAupD98xPIMrcoxZk58xPyy1Dalw7MCL@vger.kernel.org X-Gm-Message-State: AOJu0YxIyrIFowa3vZ8E1mPoAACpG2C17pAPrYETaVUEfo3akwq9JfBA SjZO1jkOauyMYLPVp6unUIPtFfgN46cmEOG0H7xNkGvaLftDUO/K X-Gm-Gg: ASbGncu80opFwyTPLPJ1/JU+8B+U8GpSHFuVXrHZAiTLQ3+h7sq/g/hx6VdAFRoNeXe +b0WsZ4oul8rKzIETFiIXlZSEbj6Y/e6k1JH5ntJ8xhyQgXaXcM/0u+4QBOqh0xVQvVzjaCnmhM pslEaWNNBGmdO1YoZv8F59XzejgXFX0VCyb6pjfylhuzcJMqivLT/Vp4X3ZlhPw/uYAdq/DBZup LBi3hwTz1Pw5H1SMbuX56KSO/cvKseOKcfQ+MsJe4++wNcZisGMpNq9av1ocn7Si/JHkrQagQfP V3k/T4b8YkCQfCNSGLjwOCkulDQ0zb0Cj+G3NAawV/Yq+YoELSODCC0/U3zc+8VWREUSaWTDQCb JgMEmtOV5K+nVNB2EOsIYCLwr+4+OnOuWkCZtTs9f+KtqP+hcqy8k6g== X-Google-Smtp-Source: AGHT+IGClCAaATZslBV1U1w4j++Vn9oRujV1utPTcSNqeAgqWjnn31iDitDZyWoTomflHvtQ1nvRqA== X-Received: by 2002:a05:622a:244a:b0:477:db8:e15b with SMTP id d75a77b69052e-4771dd608acmr207554641cf.9.1742853708852; Mon, 24 Mar 2025 15:01:48 -0700 (PDT) Received: from 1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.ip6.arpa ([2620:10d:c091:600::1:43c7]) by smtp.gmail.com with ESMTPSA id d75a77b69052e-4771d0ad87esm52129541cf.0.2025.03.24.15.01.47 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 24 Mar 2025 15:01:48 -0700 (PDT) From: Tamir Duberstein Date: Mon, 24 Mar 2025 18:01:32 -0400 Subject: [PATCH v6 3/6] rust: enable `clippy::ptr_cast_constness` lint Precedence: bulk X-Mailing-List: linux-kselftest@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Message-Id: <20250324-ptr-as-ptr-v6-3-49d1b7fd4290@gmail.com> References: <20250324-ptr-as-ptr-v6-0-49d1b7fd4290@gmail.com> In-Reply-To: <20250324-ptr-as-ptr-v6-0-49d1b7fd4290@gmail.com> To: Masahiro Yamada , Nathan Chancellor , Nicolas Schier , Miguel Ojeda , Alex Gaynor , Boqun Feng , Gary Guo , =?utf-8?q?Bj=C3=B6rn_Roy_Baron?= , Benno Lossin , Andreas Hindborg , Alice Ryhl , Trevor Gross , Danilo Krummrich , Greg Kroah-Hartman , "Rafael J. Wysocki" , Brendan Higgins , David Gow , Rae Moar , Bjorn Helgaas , Luis Chamberlain , Russ Weight , Rob Herring , Saravana Kannan , Abdiel Janulgue , Daniel Almeida , Robin Murphy , Maarten Lankhorst , Maxime Ripard , Thomas Zimmermann , David Airlie , Simona Vetter , FUJITA Tomonori Cc: linux-kbuild@vger.kernel.org, linux-kernel@vger.kernel.org, rust-for-linux@vger.kernel.org, linux-kselftest@vger.kernel.org, kunit-dev@googlegroups.com, linux-pci@vger.kernel.org, linux-block@vger.kernel.org, devicetree@vger.kernel.org, dri-devel@lists.freedesktop.org, netdev@vger.kernel.org, Tamir Duberstein X-Mailer: b4 0.15-dev In Rust 1.72.0, Clippy introduced the `ptr_cast_constness` lint [1]: > Though `as` casts between raw pointers are not terrible, > `pointer::cast_mut` and `pointer::cast_const` are safer because they > cannot accidentally cast the pointer to another type. There are only 2 affected sites: - `*mut T as *const U as *mut U` becomes `(*mut T).cast()` - `&self as *const Self as *mut Self` becomes a reference-to-pointer coercion + `(*const Self).cast()`. Apply these changes and enable the lint -- no functional change intended. Link: https://rust-lang.github.io/rust-clippy/master/index.html#ptr_cast_constness [1] Reviewed-by: Benno Lossin Signed-off-by: Tamir Duberstein --- Makefile | 1 + rust/kernel/block/mq/request.rs | 5 +++-- rust/kernel/dma.rs | 2 +- 3 files changed, 5 insertions(+), 3 deletions(-) diff --git a/Makefile b/Makefile index ec8efc8e23ba..c62bae2b107b 100644 --- a/Makefile +++ b/Makefile @@ -484,6 +484,7 @@ export rust_common_flags := --edition=2021 \ -Aclippy::needless_lifetimes \ -Wclippy::no_mangle_with_rust_abi \ -Wclippy::ptr_as_ptr \ + -Wclippy::ptr_cast_constness \ -Wclippy::undocumented_unsafe_blocks \ -Wclippy::unnecessary_safety_comment \ -Wclippy::unnecessary_safety_doc \ diff --git a/rust/kernel/block/mq/request.rs b/rust/kernel/block/mq/request.rs index 4a5b7ec914ef..c9f8046af65c 100644 --- a/rust/kernel/block/mq/request.rs +++ b/rust/kernel/block/mq/request.rs @@ -69,7 +69,7 @@ pub(crate) unsafe fn aref_from_raw(ptr: *mut bindings::request) -> ARef { // INVARIANT: By the safety requirements of this function, invariants are upheld. // SAFETY: By the safety requirement of this function, we own a // reference count that we can pass to `ARef`. - unsafe { ARef::from_raw(NonNull::new_unchecked(ptr as *const Self as *mut Self)) } + unsafe { ARef::from_raw(NonNull::new_unchecked(ptr.cast())) } } /// Notify the block layer that a request is going to be processed now. @@ -151,11 +151,12 @@ pub(crate) unsafe fn wrapper_ptr(this: *mut Self) -> NonNull /// Return a reference to the [`RequestDataWrapper`] stored in the private /// area of the request structure. pub(crate) fn wrapper_ref(&self) -> &RequestDataWrapper { + let this: *const _ = self; // SAFETY: By type invariant, `self.0` is a valid allocation. Further, // the private data associated with this request is initialized and // valid. The existence of `&self` guarantees that the private data is // valid as a shared reference. - unsafe { Self::wrapper_ptr(self as *const Self as *mut Self).as_ref() } + unsafe { Self::wrapper_ptr(this.cast_mut()).as_ref() } } } diff --git a/rust/kernel/dma.rs b/rust/kernel/dma.rs index f395d1a6fe48..43ecf3c2e860 100644 --- a/rust/kernel/dma.rs +++ b/rust/kernel/dma.rs @@ -186,7 +186,7 @@ pub fn alloc_attrs( dev: dev.into(), dma_handle, count, - cpu_addr: ret.cast(), + cpu_addr: ret.cast::(), dma_attrs, }) } From patchwork Mon Mar 24 22:01:34 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Tamir Duberstein X-Patchwork-Id: 875876 Received: from mail-qt1-f178.google.com (mail-qt1-f178.google.com [209.85.160.178]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 988DC1EDA33; Mon, 24 Mar 2025 22:01:53 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.160.178 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1742853716; cv=none; b=qiJQmZimCqSeLC7vBD1bh9MqopfOLobqrv6kLbiBex57TBeEgUK1FAOrq9sw0AWrYlNe0JJ9Z4hoQlbH9TqYlyZWoWSnObfxcwoDfAuu/BPWXDRgEE24FBnYn1a7NICIJvbiAuxRZwxG8x4rygJs0jAhGZfdATA1PFUyNKwZYTs= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1742853716; c=relaxed/simple; bh=vaB+g5yKu2Mlnf772JK5VkB679nHOhi2QuEegk9Z1pA=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=FtLJZjzkoQz31V9Dfc2G3DCMxqIT3UfFq26isW1kxozKK/xS6gWUl+QNRr8G1ASt039d38KyCJqfjXXsiuIqibzhumRoHAZc2dyPGvAWiEjS7Vlq2WanYJ6JJPRO81+dRdR/5ohhbULj4xE4wENtGqKu1uBUIf7XUSFyJo0C6go= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=RG1NQeeH; arc=none smtp.client-ip=209.85.160.178 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="RG1NQeeH" Received: by mail-qt1-f178.google.com with SMTP id d75a77b69052e-476f4e9cf92so33006381cf.3; Mon, 24 Mar 2025 15:01:53 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1742853712; x=1743458512; darn=vger.kernel.org; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:from:to:cc:subject:date:message-id :reply-to; bh=3msj9yCtJiGy0EO2iHZnNA6wr/0BgpnHoxtNdRcAn/w=; b=RG1NQeeHT6Nf0y1HV8JSBQwdLUmTkAz9e0ascPHJ5X8E1lR95FrEvzTj3WnsXcaJhP kvn19PBLdlaBYWrWLHeyXI1zasXWXKVECP1ZHiXPzrAYRriG4J6IdePgYUhRFHrTrZds KMBYHiiy6qA8doFk+O67OkuMJOF3qi+VtbsACfpu1W0dzOYrlBggBSdVsfZOaJKs/i40 1vwh9j6VQqpXODv9sYh1S9eBkvJDf7Ca6yjh3y3ZhyjT9rWqhaMvbEEzc+irycRcAAwQ sFjBBt9pw9H6Mq7K3tNrAYrkYwEsQwoNst4stKliF/zgpDDc6ZzVR9mbYGu+EtLfo7Cs 3pIw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1742853712; x=1743458512; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=3msj9yCtJiGy0EO2iHZnNA6wr/0BgpnHoxtNdRcAn/w=; b=ib/uP+6MtfsuAulL+Q2nhRlMQ7TeFFKi/t1vHxpqpU55oKVmDXRYTNgrJnRq78Jbdp 9//+Rx3aiJst+l5jxYyC1x4ZvFfa728aZ7+BtbXDe6uD3MXu7hXfvIHpreJmUG2xwx23 oj3XcpkCyirLX/Mi14JE5fDJpk5EqYyoGd6657sBFYGwI71pZMTaEi34WlUyq+VqPbEu kCPzfTrD0EBZZfTJlRlcqOxne8KORaDGkWuiq0SD9yhfx1hP7MBLZ/eZjDvtRFKly+PN qTUyy0/cZeAWmaaoYxRYvqAcim7ECrVy3b7DtDg6/r+xK+UFHfHxYvHtzj+oqLdlLiuu SBmQ== X-Forwarded-Encrypted: i=1; AJvYcCUMvlSMIUZ7OVgHzd3d+g4Q6E0oraMV3p9TkTyv1qmkRe23FkheOIVq2ZZbqTA4mtMQz4gPNA//@vger.kernel.org, AJvYcCUh/dE2z/dO3aRezUfOIP5/7XiW6W+zjCpWH/xeZVfWecsR9AZuK8AaKikYLwpZt0T2k4hai83N0ZTSXhhC@vger.kernel.org, AJvYcCW5MRWekYfNaixORdo4NpBsFEnmhXh63BqpBRQlRbHjNEgcPE2EjUdthV0ua015lRyLbne6ki9AP41rHYw=@vger.kernel.org, AJvYcCWIvw4dTPV6/0ZjCGRCo4bVAHAbFxJNKOvJ1H1jgE62M/CI/ywZHmTfDLnp04jWy2lfpiB5L3VD3AGIP7qyJKg=@vger.kernel.org, AJvYcCWOxZJZR9hJ2y2CPQsHZLZhWyhqkOPaDzue2qy7HQ/wMwAFYIzlqIuo9FxsrA8BHKmw2d9NMxrlbF5x@vger.kernel.org, AJvYcCXdaAFWA7+2zaK/mbGyeRHkvsOh0lpYNJ5EPjL1r8FYZJBQ1q12KVUvvEIu+6oGtye/BHNTwhyNaLedmOXcRvna@vger.kernel.org, AJvYcCXe0et6llvhRUSok4YfwWGj5yLd/KiZQ2hkBAV4jm4ijOWUNr82sYVJ0r5j1UUDle7WFC+L/RMT0Hx7@vger.kernel.org X-Gm-Message-State: AOJu0YwY7Pc9z/7ewy+u4sxNRpT3q1hKM8FbttALv7mNeIBTY7qD+0EL dm1xF+s83zkSmot5kjbNL5UH3+evAMMpfU1BbamtNKlGWHW0i0sy X-Gm-Gg: ASbGnctReSxwABnGeJfanHlwY7G0TCXii1prj/waHwilmh7plahZOeDQO2+4tcT9l5U ohhSwjONnd5nU/s2Ew5YIRz6eXhGzg8hNrJuwOS4QIesZ49ssaksB0sXtVc+TT/iOpobN3nYR42 6OwpkSjJXXThhRaynolWUdAqq3UbBD9BJGuRqU53wZRsqYw9Kn4KeEyHoFmIUdfSGwP8nWCVh1g jcruO1cNJApJzi7AZ4qTPNb2LpNy1aNdzGSU2a+rRHPgjFQepyWPMlpBPJoTsLDwMZXGts8W10W g3yMWaJyP7VLygfYx61u7bIMHxg1h9rRTu3wqJsHFu4R8BCrjEbFcfmumjx8XJYrOTnLF4mKI0P knjj9DelwYa/GfUHUqA51x0Q9TC8RwtakSQolrGS+zz2DVBd8q0jhPRpP3UHVvYMr X-Google-Smtp-Source: AGHT+IGy6TR0vEfH8SPazsfXhisCujtVWVyKHe6XCKSv4lKoF54XubMeM3jWpXfsqZ4o8KMulfUKQA== X-Received: by 2002:a05:622a:4d0e:b0:477:114a:ba0c with SMTP id d75a77b69052e-4771dd61cb1mr222380531cf.6.1742853712003; Mon, 24 Mar 2025 15:01:52 -0700 (PDT) Received: from 1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.ip6.arpa ([2620:10d:c091:600::1:43c7]) by smtp.gmail.com with ESMTPSA id d75a77b69052e-4771d0ad87esm52129541cf.0.2025.03.24.15.01.50 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 24 Mar 2025 15:01:51 -0700 (PDT) From: Tamir Duberstein Date: Mon, 24 Mar 2025 18:01:34 -0400 Subject: [PATCH v6 5/6] rust: enable `clippy::as_underscore` lint Precedence: bulk X-Mailing-List: linux-kselftest@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Message-Id: <20250324-ptr-as-ptr-v6-5-49d1b7fd4290@gmail.com> References: <20250324-ptr-as-ptr-v6-0-49d1b7fd4290@gmail.com> In-Reply-To: <20250324-ptr-as-ptr-v6-0-49d1b7fd4290@gmail.com> To: Masahiro Yamada , Nathan Chancellor , Nicolas Schier , Miguel Ojeda , Alex Gaynor , Boqun Feng , Gary Guo , =?utf-8?q?Bj=C3=B6rn_Roy_Baron?= , Benno Lossin , Andreas Hindborg , Alice Ryhl , Trevor Gross , Danilo Krummrich , Greg Kroah-Hartman , "Rafael J. Wysocki" , Brendan Higgins , David Gow , Rae Moar , Bjorn Helgaas , Luis Chamberlain , Russ Weight , Rob Herring , Saravana Kannan , Abdiel Janulgue , Daniel Almeida , Robin Murphy , Maarten Lankhorst , Maxime Ripard , Thomas Zimmermann , David Airlie , Simona Vetter , FUJITA Tomonori Cc: linux-kbuild@vger.kernel.org, linux-kernel@vger.kernel.org, rust-for-linux@vger.kernel.org, linux-kselftest@vger.kernel.org, kunit-dev@googlegroups.com, linux-pci@vger.kernel.org, linux-block@vger.kernel.org, devicetree@vger.kernel.org, dri-devel@lists.freedesktop.org, netdev@vger.kernel.org, Tamir Duberstein X-Mailer: b4 0.15-dev In Rust 1.63.0, Clippy introduced the `as_underscore` lint [1]: > The conversion might include lossy conversion or a dangerous cast that > might go undetected due to the type being inferred. > > The lint is allowed by default as using `_` is less wordy than always > specifying the type. Always specifying the type is especially helpful in function call contexts where the inferred type may change at a distance. Specifying the type also allows Clippy to spot more cases of `useless_conversion`. The primary downside is the need to specify the type in trivial getters. There are 4 such functions: 3 have become slightly less ergonomic, 1 was revealed to be a `useless_conversion`. While this doesn't eliminate unchecked `as` conversions, it makes such conversions easier to scrutinize. It also has the slight benefit of removing a degree of freedom on which to bikeshed. Thus apply the changes and enable the lint -- no functional change intended. Link: https://rust-lang.github.io/rust-clippy/master/index.html#as_underscore [1] Reviewed-by: Benno Lossin Signed-off-by: Tamir Duberstein --- Makefile | 1 + rust/kernel/block/mq/operations.rs | 2 +- rust/kernel/block/mq/request.rs | 2 +- rust/kernel/device_id.rs | 2 +- rust/kernel/devres.rs | 15 ++++++++------- rust/kernel/dma.rs | 2 +- rust/kernel/error.rs | 2 +- rust/kernel/io.rs | 18 +++++++++--------- rust/kernel/miscdevice.rs | 2 +- rust/kernel/of.rs | 6 +++--- rust/kernel/pci.rs | 9 ++++++--- rust/kernel/str.rs | 8 ++++---- rust/kernel/workqueue.rs | 2 +- 13 files changed, 38 insertions(+), 33 deletions(-) diff --git a/Makefile b/Makefile index bb15b86182a3..2af40bfed9ce 100644 --- a/Makefile +++ b/Makefile @@ -478,6 +478,7 @@ export rust_common_flags := --edition=2021 \ -Wunreachable_pub \ -Wclippy::all \ -Wclippy::as_ptr_cast_mut \ + -Wclippy::as_underscore \ -Wclippy::ignored_unit_patterns \ -Wclippy::mut_mut \ -Wclippy::needless_bitwise_bool \ diff --git a/rust/kernel/block/mq/operations.rs b/rust/kernel/block/mq/operations.rs index 864ff379dc91..d18ef55490da 100644 --- a/rust/kernel/block/mq/operations.rs +++ b/rust/kernel/block/mq/operations.rs @@ -101,7 +101,7 @@ impl OperationsVTable { if let Err(e) = ret { e.to_blk_status() } else { - bindings::BLK_STS_OK as _ + bindings::BLK_STS_OK as u8 } } diff --git a/rust/kernel/block/mq/request.rs b/rust/kernel/block/mq/request.rs index c9f8046af65c..807a72de6455 100644 --- a/rust/kernel/block/mq/request.rs +++ b/rust/kernel/block/mq/request.rs @@ -125,7 +125,7 @@ pub fn end_ok(this: ARef) -> Result<(), ARef> { // success of the call to `try_set_end` guarantees that there are no // `ARef`s pointing to this request. Therefore it is safe to hand it // back to the block layer. - unsafe { bindings::blk_mq_end_request(request_ptr, bindings::BLK_STS_OK as _) }; + unsafe { bindings::blk_mq_end_request(request_ptr, bindings::BLK_STS_OK as u8) }; Ok(()) } diff --git a/rust/kernel/device_id.rs b/rust/kernel/device_id.rs index e5859217a579..4063f09d76d9 100644 --- a/rust/kernel/device_id.rs +++ b/rust/kernel/device_id.rs @@ -82,7 +82,7 @@ impl IdArray { unsafe { raw_ids[i] .as_mut_ptr() - .byte_offset(T::DRIVER_DATA_OFFSET as _) + .byte_add(T::DRIVER_DATA_OFFSET) .cast::() .write(i); } diff --git a/rust/kernel/devres.rs b/rust/kernel/devres.rs index 598001157293..34571f992f0d 100644 --- a/rust/kernel/devres.rs +++ b/rust/kernel/devres.rs @@ -45,7 +45,7 @@ struct DevresInner { /// # Example /// /// ```no_run -/// # use kernel::{bindings, c_str, device::Device, devres::Devres, io::{Io, IoRaw}}; +/// # use kernel::{bindings, c_str, device::Device, devres::Devres, ffi::c_void, io::{Io, IoRaw}}; /// # use core::ops::Deref; /// /// // See also [`pci::Bar`] for a real example. @@ -59,19 +59,19 @@ struct DevresInner { /// unsafe fn new(paddr: usize) -> Result{ /// // SAFETY: By the safety requirements of this function [`paddr`, `paddr` + `SIZE`) is /// // valid for `ioremap`. -/// let addr = unsafe { bindings::ioremap(paddr as _, SIZE as _) }; +/// let addr = unsafe { bindings::ioremap(paddr as bindings::phys_addr_t, SIZE) }; /// if addr.is_null() { /// return Err(ENOMEM); /// } /// -/// Ok(IoMem(IoRaw::new(addr as _, SIZE)?)) +/// Ok(IoMem(IoRaw::new(addr as usize, SIZE)?)) /// } /// } /// /// impl Drop for IoMem { /// fn drop(&mut self) { /// // SAFETY: `self.0.addr()` is guaranteed to be properly mapped by `Self::new`. -/// unsafe { bindings::iounmap(self.0.addr() as _); }; +/// unsafe { bindings::iounmap(self.0.addr() as *mut c_void); }; /// } /// } /// @@ -115,8 +115,9 @@ fn new(dev: &Device, data: T, flags: Flags) -> Result>> { // SAFETY: `devm_add_action` guarantees to call `Self::devres_callback` once `dev` is // detached. - let ret = - unsafe { bindings::devm_add_action(dev.as_raw(), Some(inner.callback), data as _) }; + let ret = unsafe { + bindings::devm_add_action(dev.as_raw(), Some(inner.callback), data.cast_mut().cast()) + }; if ret != 0 { // SAFETY: We just created another reference to `inner` in order to pass it to @@ -130,7 +131,7 @@ fn new(dev: &Device, data: T, flags: Flags) -> Result>> { } fn as_ptr(&self) -> *const Self { - self as _ + self } fn remove_action(this: &Arc) { diff --git a/rust/kernel/dma.rs b/rust/kernel/dma.rs index 43ecf3c2e860..851a6339aa90 100644 --- a/rust/kernel/dma.rs +++ b/rust/kernel/dma.rs @@ -38,7 +38,7 @@ impl Attrs { /// Get the raw representation of this attribute. pub(crate) fn as_raw(self) -> crate::ffi::c_ulong { - self.0 as _ + self.0 as crate::ffi::c_ulong } /// Check whether `flags` is contained in `self`. diff --git a/rust/kernel/error.rs b/rust/kernel/error.rs index b0e3d1bc0449..cff84d427627 100644 --- a/rust/kernel/error.rs +++ b/rust/kernel/error.rs @@ -153,7 +153,7 @@ pub(crate) fn to_blk_status(self) -> bindings::blk_status_t { /// Returns the error encoded as a pointer. pub fn to_ptr(self) -> *mut T { // SAFETY: `self.0` is a valid error due to its invariant. - unsafe { bindings::ERR_PTR(self.0.get() as _).cast() } + unsafe { bindings::ERR_PTR(self.0.get() as isize).cast() } } /// Returns a string representing the error, if one exists. diff --git a/rust/kernel/io.rs b/rust/kernel/io.rs index d4a73e52e3ee..9d2aadf40edf 100644 --- a/rust/kernel/io.rs +++ b/rust/kernel/io.rs @@ -5,7 +5,7 @@ //! C header: [`include/asm-generic/io.h`](srctree/include/asm-generic/io.h) use crate::error::{code::EINVAL, Result}; -use crate::{bindings, build_assert}; +use crate::{bindings, build_assert, ffi::c_void}; /// Raw representation of an MMIO region. /// @@ -56,7 +56,7 @@ pub fn maxsize(&self) -> usize { /// # Examples /// /// ```no_run -/// # use kernel::{bindings, io::{Io, IoRaw}}; +/// # use kernel::{bindings, ffi::c_void, io::{Io, IoRaw}}; /// # use core::ops::Deref; /// /// // See also [`pci::Bar`] for a real example. @@ -70,19 +70,19 @@ pub fn maxsize(&self) -> usize { /// unsafe fn new(paddr: usize) -> Result{ /// // SAFETY: By the safety requirements of this function [`paddr`, `paddr` + `SIZE`) is /// // valid for `ioremap`. -/// let addr = unsafe { bindings::ioremap(paddr as _, SIZE as _) }; +/// let addr = unsafe { bindings::ioremap(paddr as bindings::phys_addr_t, SIZE) }; /// if addr.is_null() { /// return Err(ENOMEM); /// } /// -/// Ok(IoMem(IoRaw::new(addr as _, SIZE)?)) +/// Ok(IoMem(IoRaw::new(addr as usize, SIZE)?)) /// } /// } /// /// impl Drop for IoMem { /// fn drop(&mut self) { /// // SAFETY: `self.0.addr()` is guaranteed to be properly mapped by `Self::new`. -/// unsafe { bindings::iounmap(self.0.addr() as _); }; +/// unsafe { bindings::iounmap(self.0.addr() as *mut c_void); }; /// } /// } /// @@ -119,7 +119,7 @@ pub fn $name(&self, offset: usize) -> $type_name { let addr = self.io_addr_assert::<$type_name>(offset); // SAFETY: By the type invariant `addr` is a valid address for MMIO operations. - unsafe { bindings::$name(addr as _) } + unsafe { bindings::$name(addr as *const c_void) } } /// Read IO data from a given offset. @@ -131,7 +131,7 @@ pub fn $try_name(&self, offset: usize) -> Result<$type_name> { let addr = self.io_addr::<$type_name>(offset)?; // SAFETY: By the type invariant `addr` is a valid address for MMIO operations. - Ok(unsafe { bindings::$name(addr as _) }) + Ok(unsafe { bindings::$name(addr as *const c_void) }) } }; } @@ -148,7 +148,7 @@ pub fn $name(&self, value: $type_name, offset: usize) { let addr = self.io_addr_assert::<$type_name>(offset); // SAFETY: By the type invariant `addr` is a valid address for MMIO operations. - unsafe { bindings::$name(value, addr as _, ) } + unsafe { bindings::$name(value, addr as *mut c_void) } } /// Write IO data from a given offset. @@ -160,7 +160,7 @@ pub fn $try_name(&self, value: $type_name, offset: usize) -> Result { let addr = self.io_addr::<$type_name>(offset)?; // SAFETY: By the type invariant `addr` is a valid address for MMIO operations. - unsafe { bindings::$name(value, addr as _) } + unsafe { bindings::$name(value, addr as *mut c_void) } Ok(()) } }; diff --git a/rust/kernel/miscdevice.rs b/rust/kernel/miscdevice.rs index e14433b2ab9d..2c66e926bffb 100644 --- a/rust/kernel/miscdevice.rs +++ b/rust/kernel/miscdevice.rs @@ -33,7 +33,7 @@ impl MiscDeviceOptions { pub const fn into_raw(self) -> bindings::miscdevice { // SAFETY: All zeros is valid for this C type. let mut result: bindings::miscdevice = unsafe { MaybeUninit::zeroed().assume_init() }; - result.minor = bindings::MISC_DYNAMIC_MINOR as _; + result.minor = bindings::MISC_DYNAMIC_MINOR as i32; result.name = self.name.as_char_ptr(); result.fops = create_vtable::(); result diff --git a/rust/kernel/of.rs b/rust/kernel/of.rs index 04f2d8ef29cb..40d1bd13682c 100644 --- a/rust/kernel/of.rs +++ b/rust/kernel/of.rs @@ -22,7 +22,7 @@ unsafe impl RawDeviceId for DeviceId { const DRIVER_DATA_OFFSET: usize = core::mem::offset_of!(bindings::of_device_id, data); fn index(&self) -> usize { - self.0.data as _ + self.0.data as usize } } @@ -34,10 +34,10 @@ pub const fn new(compatible: &'static CStr) -> Self { // SAFETY: FFI type is valid to be zero-initialized. let mut of: bindings::of_device_id = unsafe { core::mem::zeroed() }; - // TODO: Use `clone_from_slice` once the corresponding types do match. + // TODO: Use `copy_from_slice` once stabilized for `const`. let mut i = 0; while i < src.len() { - of.compatible[i] = src[i] as _; + of.compatible[i] = src[i]; i += 1; } diff --git a/rust/kernel/pci.rs b/rust/kernel/pci.rs index 003c9aaafb24..a26f154ae1b9 100644 --- a/rust/kernel/pci.rs +++ b/rust/kernel/pci.rs @@ -166,7 +166,7 @@ unsafe impl RawDeviceId for DeviceId { const DRIVER_DATA_OFFSET: usize = core::mem::offset_of!(bindings::pci_device_id, driver_data); fn index(&self) -> usize { - self.0.driver_data as _ + self.0.driver_data } } @@ -201,7 +201,10 @@ macro_rules! pci_device_table { /// MODULE_PCI_TABLE, /// ::IdInfo, /// [ -/// (pci::DeviceId::from_id(bindings::PCI_VENDOR_ID_REDHAT, bindings::PCI_ANY_ID as _), ()) +/// ( +/// pci::DeviceId::from_id(bindings::PCI_VENDOR_ID_REDHAT, bindings::PCI_ANY_ID as u32), +/// (), +/// ) /// ] /// ); /// @@ -317,7 +320,7 @@ unsafe fn do_release(pdev: &Device, ioptr: usize, num: i32) { // `ioptr` is valid by the safety requirements. // `num` is valid by the safety requirements. unsafe { - bindings::pci_iounmap(pdev.as_raw(), ioptr as _); + bindings::pci_iounmap(pdev.as_raw(), ioptr as *mut kernel::ffi::c_void); bindings::pci_release_region(pdev.as_raw(), num); } } diff --git a/rust/kernel/str.rs b/rust/kernel/str.rs index 02863c40c21b..40034f77fc2f 100644 --- a/rust/kernel/str.rs +++ b/rust/kernel/str.rs @@ -738,9 +738,9 @@ fn new() -> Self { pub(crate) unsafe fn from_ptrs(pos: *mut u8, end: *mut u8) -> Self { // INVARIANT: The safety requirements guarantee the type invariants. Self { - beg: pos as _, - pos: pos as _, - end: end as _, + beg: pos as usize, + pos: pos as usize, + end: end as usize, } } @@ -765,7 +765,7 @@ pub(crate) unsafe fn from_buffer(buf: *mut u8, len: usize) -> Self { /// /// N.B. It may point to invalid memory. pub(crate) fn pos(&self) -> *mut u8 { - self.pos as _ + self.pos as *mut u8 } /// Returns the number of bytes written to the formatter. diff --git a/rust/kernel/workqueue.rs b/rust/kernel/workqueue.rs index 8ff54105be3f..d03f3440cb5a 100644 --- a/rust/kernel/workqueue.rs +++ b/rust/kernel/workqueue.rs @@ -198,7 +198,7 @@ pub fn enqueue(&self, w: W) -> W::EnqueueOutput unsafe { w.__enqueue(move |work_ptr| { bindings::queue_work_on( - bindings::wq_misc_consts_WORK_CPU_UNBOUND as _, + bindings::wq_misc_consts_WORK_CPU_UNBOUND as i32, queue_ptr, work_ptr, )