@@ -49,8 +49,8 @@ impl<P: Provider + Clone> Clone for AtomicMemoryOps<P> {
4949impl < P : Provider + PartialEq > PartialEq for AtomicMemoryOps < P > {
5050 fn eq ( & self , other : & Self ) -> bool {
5151 // Compare the underlying handlers (requires locking both)
52- let self_handler = self . handler . lock ) ;
53- let other_handler = other. handler . lock ) ;
52+ let self_handler = self . handler . lock ( ) ;
53+ let other_handler = other. handler . lock ( ) ;
5454 * self_handler == * other_handler && self . verification_level == other. verification_level
5555 }
5656}
@@ -62,7 +62,7 @@ impl<P: Provider> AtomicMemoryOps<P> {
6262 ///
6363 /// This wraps the handler in a mutex to ensure atomic operations.
6464 pub fn new ( handler : SafeMemoryHandler < P > ) -> Self {
65- let verification_level = handler. verification_level ) ;
65+ let verification_level = handler. verification_level ( ) ;
6666 Self { handler : WrtMutex :: new ( handler) , verification_level }
6767 }
6868
@@ -74,8 +74,8 @@ impl<P: Provider> AtomicMemoryOps<P> {
7474 where
7575 P : Sized + Clone ,
7676 {
77- let handler = SafeMemoryHandler :: new ( provider;
78- let verification_level = handler. verification_level ) ;
77+ let handler = SafeMemoryHandler :: new ( provider) ? ;
78+ let verification_level = handler. verification_level ( ) ;
7979 Ok ( Self { handler : WrtMutex :: new ( handler) , verification_level } )
8080 }
8181
@@ -92,8 +92,8 @@ impl<P: Provider> AtomicMemoryOps<P> {
9292 #[ cfg( feature = "std" ) ]
9393 pub fn read_data ( & self , offset : usize , len : usize ) -> Result < Vec < u8 > > {
9494 // Lock the handler for atomic access
95- let handler = self . handler . lock ) ;
96- record_global_operation ( OperationType :: MemoryRead , self . verification_level ;
95+ let handler = self . handler . lock ( ) ;
96+ record_global_operation ( OperationType :: MemoryRead , self . verification_level ) ;
9797
9898 // Get the slice and copy the data to avoid lifetime issues
9999 let slice = handler. borrow_slice ( offset, len) ?;
@@ -119,8 +119,8 @@ impl<P: Provider> AtomicMemoryOps<P> {
119119 /// verification fails.
120120 pub fn atomic_write_with_checksum ( & self , offset : usize , data : & [ u8 ] ) -> Result < ( ) > {
121121 // Lock the handler for atomic access with Acquire ordering
122- let mut handler = self . handler . lock ) ;
123- record_global_operation ( OperationType :: MemoryWrite , self . verification_level ;
122+ let mut handler = self . handler . lock ( ) ;
123+ record_global_operation ( OperationType :: MemoryWrite , self . verification_level ) ;
124124
125125 // Verify that the access is valid
126126 handler. verify_access ( offset, data. len ( ) ) ?;
@@ -132,11 +132,11 @@ impl<P: Provider> AtomicMemoryOps<P> {
132132 let slice_data = slice. data_mut ( ) ?;
133133
134134 // Copy the data while holding the lock
135- slice_data. copy_from_slice ( data;
135+ slice_data. copy_from_slice ( data) ;
136136
137137 // Update the checksum while still holding the lock
138138 // This ensures no bit flips can occur between write and checksum update
139- slice. update_checksum ) ;
139+ slice. update_checksum ( ) ;
140140
141141 // Lock is released automatically when handler goes out of scope
142142
@@ -157,8 +157,8 @@ impl<P: Provider> AtomicMemoryOps<P> {
157157 len : usize ,
158158 ) -> Result < ( ) > {
159159 // Lock the handler for atomic access
160- let mut handler = self . handler . lock ) ;
161- record_global_operation ( OperationType :: MemoryCopy , self . verification_level ;
160+ let mut handler = self . handler . lock ( ) ;
161+ record_global_operation ( OperationType :: MemoryCopy , self . verification_level ) ;
162162
163163 // Verify that the source access is valid
164164 handler. verify_access ( src_offset, len) ?;
@@ -179,15 +179,15 @@ impl<P: Provider> AtomicMemoryOps<P> {
179179 {
180180 let source_slice = handler. borrow_slice ( src_offset + src_pos, chunk_size) ?;
181181 let source_data = source_slice. data ( ) ?;
182- buffer[ ..chunk_size] . copy_from_slice ( & source_data[ ..chunk_size] ;
182+ buffer[ ..chunk_size] . copy_from_slice ( & source_data[ ..chunk_size] ) ;
183183 } // source_slice is dropped here, releasing immutable borrow
184184
185185 // Write to the destination atomically with checksum update
186186 let mut dst_slice =
187187 handler. provider_mut ( ) . get_slice_mut ( dst_offset + dst_pos, chunk_size) ?;
188188 let dst_data = dst_slice. data_mut ( ) ?;
189- dst_data. copy_from_slice ( & buffer[ ..chunk_size] ;
190- dst_slice. update_checksum ) ;
189+ dst_data. copy_from_slice ( & buffer[ ..chunk_size] ) ;
190+ dst_slice. update_checksum ( ) ;
191191
192192 remaining -= chunk_size;
193193 src_pos += chunk_size;
@@ -208,19 +208,19 @@ impl<P: Provider> AtomicMemoryOps<P> {
208208 /// underlying provider.
209209 pub fn set_verification_level ( & mut self , level : VerificationLevel ) {
210210 self . verification_level = level;
211- let mut handler = self . handler . lock ) ;
212- handler. set_verification_level ( level;
211+ let mut handler = self . handler . lock ( ) ;
212+ handler. set_verification_level ( level) ;
213213 }
214214
215215 /// Gets the underlying memory provider's size.
216216 pub fn size ( & self ) -> usize {
217- let handler = self . handler . lock ) ;
217+ let handler = self . handler . lock ( ) ;
218218 handler. size ( )
219219 }
220220
221221 /// Gets the underlying memory provider's capacity.
222222 pub fn capacity ( & self ) -> usize {
223- let handler = self . handler . lock ) ;
223+ let handler = self . handler . lock ( ) ;
224224 handler. capacity ( )
225225 }
226226
@@ -242,7 +242,7 @@ impl<P: Provider> AtomicMemoryOps<P> {
242242 ///
243243 /// Returns an error if an integrity violation is detected.
244244 pub fn verify_integrity ( & self ) -> Result < ( ) > {
245- let handler = self . handler . lock ) ;
245+ let handler = self . handler . lock ( ) ;
246246 handler. provider ( ) . verify_integrity ( )
247247 }
248248}
@@ -288,13 +288,13 @@ mod tests {
288288
289289 #[ cfg( not( feature = "std" ) ) ]
290290 let read_data = {
291- let handler = atomic_ops. handler . lock ) ;
291+ let handler = atomic_ops. handler . lock ( ) ;
292292 let slice = handler. borrow_slice ( 0 , test_data. len ( ) ) . unwrap ( ) ;
293293 slice. data ( ) . unwrap ( )
294294 } ;
295295
296296 // Verify the data
297- assert_eq!( read_data, & test_data;
297+ assert_eq ! ( read_data, & test_data) ;
298298 Ok ( ( ) )
299299 }
300300
@@ -314,14 +314,14 @@ mod tests {
314314 atomic_ops. atomic_write_with_checksum ( 0 , & test_data) . unwrap ( ) ;
315315
316316 // Verify integrity explicitly at both provider and slice levels
317- let handler = atomic_ops. handler. lock) ;
318- assert!( handler. provider( ) . verify_integrity( ) . is_ok( ) ;
317+ let handler = atomic_ops. handler . lock ( ) ;
318+ assert ! ( handler. provider( ) . verify_integrity( ) . is_ok( ) ) ;
319319
320320 // Access the internal slice to check its checksum
321321 let slice = handler. borrow_slice ( 0 , test_data. len ( ) ) . unwrap ( ) ;
322322
323323 // Verify integrity of the slice, which internally compares checksums
324- assert!( slice. verify_integrity( ) . is_ok( ) ;
324+ assert ! ( slice. verify_integrity( ) . is_ok( ) ) ;
325325 Ok ( ( ) )
326326 }
327327
@@ -349,13 +349,13 @@ mod tests {
349349
350350 #[ cfg( not( feature = "std" ) ) ]
351351 let read_data = {
352- let handler = atomic_ops. handler. lock) ;
352+ let handler = atomic_ops. handler . lock ( ) ;
353353 let slice = handler. borrow_slice ( 20 , 5 ) . unwrap ( ) ;
354354 slice. data ( ) . unwrap ( )
355355 } ;
356356
357357 // Verify the data was copied correctly
358- assert_eq!( read_data, & [ 3 , 4 , 5 , 6 , 7 ] ;
358+ assert_eq ! ( read_data, & [ 3 , 4 , 5 , 6 , 7 ] ) ;
359359 Ok ( ( ) )
360360 }
361361}
0 commit comments