Skip to content

Commit 13965ef

Browse files
committed
chore: appease clippy
Signed-off-by: Patrick Roy <[email protected]>
1 parent 2e346b9 commit 13965ef

File tree

7 files changed

+44
-47
lines changed

7 files changed

+44
-47
lines changed

src/address.rs

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -12,11 +12,11 @@
1212
//!
1313
//! Two traits are defined to represent an address within an address space:
1414
//! - [`AddressValue`](trait.AddressValue.html): stores the raw value of an address. Typically
15-
//! `u32`,`u64` or `usize` is used to store the raw value. But pointers, such as `*u8`, can't be used
16-
//! because they don't implement the [`Add`](https://doc.rust-lang.org/std/ops/trait.Add.html) and
17-
//! [`Sub`](https://doc.rust-lang.org/std/ops/trait.Sub.html) traits.
15+
//! `u32`,`u64` or `usize` is used to store the raw value. But pointers, such as `*u8`, can't be used
16+
//! because they don't implement the [`Add`](https://doc.rust-lang.org/std/ops/trait.Add.html) and
17+
//! [`Sub`](https://doc.rust-lang.org/std/ops/trait.Sub.html) traits.
1818
//! - [Address](trait.Address.html): encapsulates an [`AddressValue`](trait.AddressValue.html)
19-
//! object and defines methods to access and manipulate it.
19+
//! object and defines methods to access and manipulate it.
2020
2121
use std::cmp::{Eq, Ord, PartialEq, PartialOrd};
2222
use std::fmt::Debug;
@@ -243,7 +243,7 @@ mod tests {
243243
#[test]
244244
fn test_new() {
245245
assert_eq!(MockAddress::new(0), MockAddress(0));
246-
assert_eq!(MockAddress::new(std::u64::MAX), MockAddress(std::u64::MAX));
246+
assert_eq!(MockAddress::new(u64::MAX), MockAddress(u64::MAX));
247247
}
248248

249249
#[test]
@@ -285,7 +285,7 @@ mod tests {
285285
Some(MockAddress(0x130))
286286
);
287287
assert_eq!(
288-
MockAddress::new(std::u64::MAX - 0x3fff).checked_align_up(0x10000),
288+
MockAddress::new(u64::MAX - 0x3fff).checked_align_up(0x10000),
289289
None
290290
);
291291
}
@@ -343,10 +343,10 @@ mod tests {
343343
// normal case
344344
check_add(10, 10, false, 20);
345345
// edge case
346-
check_add(std::u64::MAX - 1, 1, false, std::u64::MAX);
346+
check_add(u64::MAX - 1, 1, false, u64::MAX);
347347

348348
// with overflow
349-
check_add(std::u64::MAX, 1, true, 0);
349+
check_add(u64::MAX, 1, true, 0);
350350
}
351351

352352
fn check_sub(a: u64, b: u64, expected_overflow: bool, expected_result: u64) {
@@ -384,7 +384,7 @@ mod tests {
384384
check_sub(1, 1, false, 0);
385385

386386
// with underflow
387-
check_sub(0, 1, true, std::u64::MAX);
387+
check_sub(0, 1, true, u64::MAX);
388388
}
389389

390390
#[test]

src/bytes.rs

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -527,11 +527,11 @@ pub(crate) mod tests {
527527
fn test_bytes() {
528528
let bytes = MockBytesContainer::new();
529529

530-
assert!(bytes.write_obj(std::u64::MAX, 0).is_ok());
531-
assert_eq!(bytes.read_obj::<u64>(0).unwrap(), std::u64::MAX);
530+
assert!(bytes.write_obj(u64::MAX, 0).is_ok());
531+
assert_eq!(bytes.read_obj::<u64>(0).unwrap(), u64::MAX);
532532

533533
assert!(bytes
534-
.write_obj(std::u64::MAX, MOCK_BYTES_CONTAINER_SIZE)
534+
.write_obj(u64::MAX, MOCK_BYTES_CONTAINER_SIZE)
535535
.is_err());
536536
assert!(bytes.read_obj::<u64>(MOCK_BYTES_CONTAINER_SIZE).is_err());
537537
}

src/guest_memory.rs

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -19,12 +19,12 @@
1919
//! Traits and Structs
2020
//! - [`GuestAddress`](struct.GuestAddress.html): represents a guest physical address (GPA).
2121
//! - [`MemoryRegionAddress`](struct.MemoryRegionAddress.html): represents an offset inside a
22-
//! region.
22+
//! region.
2323
//! - [`GuestMemoryRegion`](trait.GuestMemoryRegion.html): represent a continuous region of guest's
24-
//! physical memory.
24+
//! physical memory.
2525
//! - [`GuestMemory`](trait.GuestMemory.html): represent a collection of `GuestMemoryRegion`
26-
//! objects.
27-
//! The main responsibilities of the `GuestMemory` trait are:
26+
//! objects.
27+
//! The main responsibilities of the `GuestMemory` trait are:
2828
//! - hide the detail of accessing guest's physical address.
2929
//! - map a request address to a `GuestMemoryRegion` object and relay the request to it.
3030
//! - handle cases where an access request spanning two or more `GuestMemoryRegion` objects.
@@ -514,7 +514,7 @@ pub trait GuestMemory {
514514
///
515515
/// * Compute the total size of all memory mappings in KB by iterating over the memory regions
516516
/// and dividing their sizes to 1024, then summing up the values in an accumulator. (uses the
517-
/// `backend-mmap` feature)
517+
/// `backend-mmap` feature)
518518
///
519519
/// ```
520520
/// # #[cfg(feature = "backend-mmap")]
@@ -550,7 +550,7 @@ pub trait GuestMemory {
550550
///
551551
/// * Compute the total size of all memory mappings in KB by iterating over the memory regions
552552
/// and dividing their sizes to 1024, then summing up the values in an accumulator. (uses the
553-
/// `backend-mmap` feature)
553+
/// `backend-mmap` feature)
554554
///
555555
/// ```
556556
/// # #[cfg(feature = "backend-mmap")]

src/mmap.rs

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -951,7 +951,7 @@ mod tests {
951951
])
952952
.unwrap();
953953

954-
let guest_mem_list = vec![guest_mem, guest_mem_backed_by_file];
954+
let guest_mem_list = [guest_mem, guest_mem_backed_by_file];
955955
for guest_mem in guest_mem_list.iter() {
956956
assert!(guest_mem.address_in_range(GuestAddress(0x200)));
957957
assert!(!guest_mem.address_in_range(GuestAddress(0x600)));
@@ -977,7 +977,7 @@ mod tests {
977977
])
978978
.unwrap();
979979

980-
let guest_mem_list = vec![guest_mem, guest_mem_backed_by_file];
980+
let guest_mem_list = [guest_mem, guest_mem_backed_by_file];
981981
for guest_mem in guest_mem_list.iter() {
982982
assert_eq!(
983983
guest_mem.check_address(GuestAddress(0x200)),
@@ -1009,7 +1009,7 @@ mod tests {
10091009
])
10101010
.unwrap();
10111011

1012-
let guest_mem_list = vec![guest_mem, guest_mem_backed_by_file];
1012+
let guest_mem_list = [guest_mem, guest_mem_backed_by_file];
10131013
for guest_mem in guest_mem_list.iter() {
10141014
assert!(guest_mem.to_region_addr(GuestAddress(0x600)).is_none());
10151015
let (r0, addr0) = guest_mem.to_region_addr(GuestAddress(0x800)).unwrap();
@@ -1037,7 +1037,7 @@ mod tests {
10371037
])
10381038
.unwrap();
10391039

1040-
let guest_mem_list = vec![guest_mem, guest_mem_backed_by_file];
1040+
let guest_mem_list = [guest_mem, guest_mem_backed_by_file];
10411041
for guest_mem in guest_mem_list.iter() {
10421042
assert!(guest_mem.get_host_address(GuestAddress(0x600)).is_err());
10431043
let ptr0 = guest_mem.get_host_address(GuestAddress(0x800)).unwrap();
@@ -1064,7 +1064,7 @@ mod tests {
10641064
)])
10651065
.unwrap();
10661066

1067-
let guest_mem_list = vec![guest_mem, guest_mem_backed_by_file];
1067+
let guest_mem_list = [guest_mem, guest_mem_backed_by_file];
10681068
for guest_mem in guest_mem_list.iter() {
10691069
let sample_buf = &[1, 2, 3, 4, 5];
10701070

@@ -1102,7 +1102,7 @@ mod tests {
11021102
])
11031103
.unwrap();
11041104

1105-
let gm_list = vec![gm, gm_backed_by_file];
1105+
let gm_list = [gm, gm_backed_by_file];
11061106
for gm in gm_list.iter() {
11071107
let val1: u64 = 0xaa55_aa55_aa55_aa55;
11081108
let val2: u64 = 0x55aa_55aa_55aa_55aa;
@@ -1142,7 +1142,7 @@ mod tests {
11421142
)])
11431143
.unwrap();
11441144

1145-
let gm_list = vec![gm, gm_backed_by_file];
1145+
let gm_list = [gm, gm_backed_by_file];
11461146
for gm in gm_list.iter() {
11471147
let sample_buf = &[1, 2, 3, 4, 5];
11481148

@@ -1173,7 +1173,7 @@ mod tests {
11731173
)])
11741174
.unwrap();
11751175

1176-
let gm_list = vec![gm, gm_backed_by_file];
1176+
let gm_list = [gm, gm_backed_by_file];
11771177
for gm in gm_list.iter() {
11781178
let addr = GuestAddress(0x1010);
11791179
let mut file = if cfg!(unix) {
@@ -1276,7 +1276,7 @@ mod tests {
12761276
])
12771277
.unwrap();
12781278

1279-
let gm_list = vec![gm, gm_backed_by_file];
1279+
let gm_list = [gm, gm_backed_by_file];
12801280
for gm in gm_list.iter() {
12811281
let sample_buf = &[1, 2, 3, 4, 5];
12821282
assert_eq!(gm.write(sample_buf, GuestAddress(0xffc)).unwrap(), 5);
@@ -1489,7 +1489,7 @@ mod tests {
14891489
Some(GuestAddress(0xfff))
14901490
);
14911491
assert_eq!(guest_mem.checked_offset(start_addr2, 0xc00), None);
1492-
assert_eq!(guest_mem.checked_offset(start_addr1, std::usize::MAX), None);
1492+
assert_eq!(guest_mem.checked_offset(start_addr1, usize::MAX), None);
14931493

14941494
assert_eq!(guest_mem.checked_offset(start_addr1, 0x400), None);
14951495
assert_eq!(
@@ -1518,7 +1518,7 @@ mod tests {
15181518
assert!(guest_mem.check_range(start_addr2, 0x800));
15191519
assert!(!guest_mem.check_range(start_addr2, 0x801));
15201520
assert!(!guest_mem.check_range(start_addr2, 0xc00));
1521-
assert!(!guest_mem.check_range(start_addr1, std::usize::MAX));
1521+
assert!(!guest_mem.check_range(start_addr1, usize::MAX));
15221522
}
15231523

15241524
#[test]

src/mmap_unix.rs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -461,7 +461,7 @@ mod tests {
461461
pub fn raw_os_error(&self) -> i32 {
462462
match self {
463463
Error::Mmap(e) => e.raw_os_error().unwrap(),
464-
_ => std::i32::MIN,
464+
_ => i32::MIN,
465465
}
466466
}
467467
}
@@ -552,7 +552,7 @@ mod tests {
552552

553553
// Offset + size will overflow.
554554
let r = MmapRegion::build(
555-
Some(FileOffset::from_arc(a.clone(), std::u64::MAX)),
555+
Some(FileOffset::from_arc(a.clone(), u64::MAX)),
556556
size,
557557
prot,
558558
flags,

src/mmap_xen.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1036,7 +1036,7 @@ mod tests {
10361036
fn raw_os_error(&self) -> i32 {
10371037
match self {
10381038
Error::Mmap(e) => e.raw_os_error().unwrap(),
1039-
_ => std::i32::MIN,
1039+
_ => i32::MIN,
10401040
}
10411041
}
10421042
}

src/volatile_memory.rs

Lines changed: 12 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -18,10 +18,10 @@
1818
//! For the purposes of maintaining safety, volatile memory has some rules of its own:
1919
//! 1. No references or slices to volatile memory (`&` or `&mut`).
2020
//! 2. Access should always been done with a volatile read or write.
21-
//! The First rule is because having references of any kind to memory considered volatile would
22-
//! violate pointer aliasing. The second is because unvolatile accesses are inherently undefined if
23-
//! done concurrently without synchronization. With volatile access we know that the compiler has
24-
//! not reordered or elided the access.
21+
//! The First rule is because having references of any kind to memory considered volatile would
22+
//! violate pointer aliasing. The second is because unvolatile accesses are inherently undefined if
23+
//! done concurrently without synchronization. With volatile access we know that the compiler has
24+
//! not reordered or elided the access.
2525
2626
use std::cmp::min;
2727
use std::io::{self, Read, Write};
@@ -31,7 +31,6 @@ use std::ptr::copy;
3131
use std::ptr::{read_volatile, write_volatile};
3232
use std::result;
3333
use std::sync::atomic::Ordering;
34-
use std::usize;
3534

3635
use crate::atomic_integer::AtomicInteger;
3736
use crate::bitmap::{Bitmap, BitmapSlice, BS};
@@ -1889,8 +1888,8 @@ mod tests {
18891888
assert!(slice.subslice(101, 0).is_err());
18901889
assert!(slice.subslice(101, 1).is_err());
18911890

1892-
assert!(slice.subslice(std::usize::MAX, 2).is_err());
1893-
assert!(slice.subslice(2, std::usize::MAX).is_err());
1891+
assert!(slice.subslice(usize::MAX, 2).is_err());
1892+
assert!(slice.subslice(2, usize::MAX).is_err());
18941893

18951894
let maybe_offset_slice = slice.subslice(10, 80);
18961895
assert!(maybe_offset_slice.is_ok());
@@ -1998,14 +1997,13 @@ mod tests {
19981997

19991998
#[test]
20001999
fn slice_overflow_error() {
2001-
use std::usize::MAX;
20022000
let mut backing = vec![0u8];
20032001
let a = VolatileSlice::from(backing.as_mut_slice());
2004-
let res = a.get_slice(MAX, 1).unwrap_err();
2002+
let res = a.get_slice(usize::MAX, 1).unwrap_err();
20052003
assert_matches!(
20062004
res,
20072005
Error::Overflow {
2008-
base: MAX,
2006+
base: usize::MAX,
20092007
offset: 1,
20102008
}
20112009
);
@@ -2022,14 +2020,13 @@ mod tests {
20222020

20232021
#[test]
20242022
fn ref_overflow_error() {
2025-
use std::usize::MAX;
20262023
let mut backing = vec![0u8];
20272024
let a = VolatileSlice::from(backing.as_mut_slice());
2028-
let res = a.get_ref::<u8>(MAX).unwrap_err();
2025+
let res = a.get_ref::<u8>(usize::MAX).unwrap_err();
20292026
assert_matches!(
20302027
res,
20312028
Error::Overflow {
2032-
base: MAX,
2029+
base: usize::MAX,
20332030
offset: 1,
20342031
}
20352032
);
@@ -2104,11 +2101,11 @@ mod tests {
21042101
let a = VolatileSlice::from(backing.as_mut_slice());
21052102
let s = a.as_volatile_slice();
21062103
assert!(s.write_obj(55u16, 4).is_err());
2107-
assert!(s.write_obj(55u16, core::usize::MAX).is_err());
2104+
assert!(s.write_obj(55u16, usize::MAX).is_err());
21082105
assert!(s.write_obj(55u16, 2).is_ok());
21092106
assert_eq!(s.read_obj::<u16>(2).unwrap(), 55u16);
21102107
assert!(s.read_obj::<u16>(4).is_err());
2111-
assert!(s.read_obj::<u16>(core::usize::MAX).is_err());
2108+
assert!(s.read_obj::<u16>(usize::MAX).is_err());
21122109
}
21132110

21142111
#[test]

0 commit comments

Comments
 (0)