Skip to content

Commit bbe40d8

Browse files
antonio-hickeyintel-lab-lkp
authored andcommitted
rust: replace addr_of[_mut]! with &raw [mut]
Replacing all occurrences of `addr_of!(place)` with `&raw place`, and all occurrences of `addr_of_mut!(place)` with `&raw mut place`. Utilizing the new feature will allow us to reduce macro complexity, and improve consistency with existing reference syntax as `&raw`, `&raw mut` is very similar to `&`, `&mut` making it fit more naturally with other existing code. Depends on: Patch 1/3 0001-rust-enable-raw_ref_op-feature.patch Suggested-by: Benno Lossin <[email protected]> Link: Rust-for-Linux#1148 Signed-off-by: Antonio Hickey <[email protected]>
1 parent 7497cdd commit bbe40d8

16 files changed

+54
-56
lines changed

rust/kernel/block/mq/request.rs

+2-2
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ use crate::{
1212
};
1313
use core::{
1414
marker::PhantomData,
15-
ptr::{addr_of_mut, NonNull},
15+
ptr::NonNull,
1616
sync::atomic::{AtomicU64, Ordering},
1717
};
1818

@@ -187,7 +187,7 @@ impl RequestDataWrapper {
187187
pub(crate) unsafe fn refcount_ptr(this: *mut Self) -> *mut AtomicU64 {
188188
// SAFETY: Because of the safety requirements of this function, the
189189
// field projection is safe.
190-
unsafe { addr_of_mut!((*this).refcount) }
190+
unsafe { &raw mut (*this).refcount }
191191
}
192192
}
193193

rust/kernel/faux.rs

+2-2
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
//! C header: [`include/linux/device/faux.h`]
88
99
use crate::{bindings, device, error::code::*, prelude::*};
10-
use core::ptr::{addr_of_mut, null, null_mut, NonNull};
10+
use core::ptr::{null, null_mut, NonNull};
1111

1212
/// The registration of a faux device.
1313
///
@@ -45,7 +45,7 @@ impl AsRef<device::Device> for Registration {
4545
fn as_ref(&self) -> &device::Device {
4646
// SAFETY: The underlying `device` in `faux_device` is guaranteed by the C API to be
4747
// a valid initialized `device`.
48-
unsafe { device::Device::as_ref(addr_of_mut!((*self.as_raw()).dev)) }
48+
unsafe { device::Device::as_ref((&raw mut (*self.as_raw()).dev)) }
4949
}
5050
}
5151

rust/kernel/fs/file.rs

+1-1
Original file line numberDiff line numberDiff line change
@@ -331,7 +331,7 @@ impl LocalFile {
331331
// SAFETY: The file is valid because the shared reference guarantees a nonzero refcount.
332332
//
333333
// FIXME(read_once): Replace with `read_once` when available on the Rust side.
334-
unsafe { core::ptr::addr_of!((*self.as_ptr()).f_flags).read_volatile() }
334+
unsafe { (&raw const (*self.as_ptr()).f_flags).read_volatile() }
335335
}
336336
}
337337

rust/kernel/init.rs

+4-4
Original file line numberDiff line numberDiff line change
@@ -122,7 +122,7 @@
122122
//! ```rust
123123
//! # #![expect(unreachable_pub, clippy::disallowed_names)]
124124
//! use kernel::{init, types::Opaque};
125-
//! use core::{ptr::addr_of_mut, marker::PhantomPinned, pin::Pin};
125+
//! use core::{marker::PhantomPinned, pin::Pin};
126126
//! # mod bindings {
127127
//! # #![expect(non_camel_case_types)]
128128
//! # #![expect(clippy::missing_safety_doc)]
@@ -159,7 +159,7 @@
159159
//! unsafe {
160160
//! init::pin_init_from_closure(move |slot: *mut Self| {
161161
//! // `slot` contains uninit memory, avoid creating a reference.
162-
//! let foo = addr_of_mut!((*slot).foo);
162+
//! let foo = &raw mut (*slot).foo;
163163
//!
164164
//! // Initialize the `foo`
165165
//! bindings::init_foo(Opaque::raw_get(foo));
@@ -541,7 +541,7 @@ macro_rules! stack_try_pin_init {
541541
///
542542
/// ```rust
543543
/// # use kernel::{macros::{Zeroable, pin_data}, pin_init};
544-
/// # use core::{ptr::addr_of_mut, marker::PhantomPinned};
544+
/// # use core::marker::PhantomPinned;
545545
/// #[pin_data]
546546
/// #[derive(Zeroable)]
547547
/// struct Buf {
@@ -554,7 +554,7 @@ macro_rules! stack_try_pin_init {
554554
/// pin_init!(&this in Buf {
555555
/// buf: [0; 64],
556556
/// // SAFETY: TODO.
557-
/// ptr: unsafe { addr_of_mut!((*this.as_ptr()).buf).cast() },
557+
/// ptr: unsafe { &raw mut (*this.as_ptr()).buf.cast() },
558558
/// pin: PhantomPinned,
559559
/// });
560560
/// pin_init!(Buf {

rust/kernel/init/macros.rs

+14-14
Original file line numberDiff line numberDiff line change
@@ -244,25 +244,25 @@
244244
//! struct __InitOk;
245245
//! // This is the expansion of `t,`, which is syntactic sugar for `t: t,`.
246246
//! {
247-
//! unsafe { ::core::ptr::write(::core::addr_of_mut!((*slot).t), t) };
247+
//! unsafe { ::core::ptr::write(&raw mut (*slot).t, t) };
248248
//! }
249249
//! // Since initialization could fail later (not in this case, since the
250250
//! // error type is `Infallible`) we will need to drop this field if there
251251
//! // is an error later. This `DropGuard` will drop the field when it gets
252252
//! // dropped and has not yet been forgotten.
253253
//! let __t_guard = unsafe {
254-
//! ::pinned_init::__internal::DropGuard::new(::core::addr_of_mut!((*slot).t))
254+
//! ::pinned_init::__internal::DropGuard::new(&raw mut (*slot).t)
255255
//! };
256256
//! // Expansion of `x: 0,`:
257257
//! // Since this can be an arbitrary expression we cannot place it inside
258258
//! // of the `unsafe` block, so we bind it here.
259259
//! {
260260
//! let x = 0;
261-
//! unsafe { ::core::ptr::write(::core::addr_of_mut!((*slot).x), x) };
261+
//! unsafe { ::core::ptr::write(&raw mut (*slot).x, x) };
262262
//! }
263263
//! // We again create a `DropGuard`.
264264
//! let __x_guard = unsafe {
265-
//! ::kernel::init::__internal::DropGuard::new(::core::addr_of_mut!((*slot).x))
265+
//! ::kernel::init::__internal::DropGuard::new(&raw mut (*slot).x)
266266
//! };
267267
//! // Since initialization has successfully completed, we can now forget
268268
//! // the guards. This is not `mem::forget`, since we only have
@@ -459,15 +459,15 @@
459459
//! {
460460
//! struct __InitOk;
461461
//! {
462-
//! unsafe { ::core::ptr::write(::core::addr_of_mut!((*slot).a), a) };
462+
//! unsafe { ::core::ptr::write(&raw mut (*slot).a, a) };
463463
//! }
464464
//! let __a_guard = unsafe {
465-
//! ::kernel::init::__internal::DropGuard::new(::core::addr_of_mut!((*slot).a))
465+
//! ::kernel::init::__internal::DropGuard::new(&raw mut (*slot).a)
466466
//! };
467467
//! let init = Bar::new(36);
468-
//! unsafe { data.b(::core::addr_of_mut!((*slot).b), b)? };
468+
//! unsafe { data.b(&raw mut (*slot).b, b)? };
469469
//! let __b_guard = unsafe {
470-
//! ::kernel::init::__internal::DropGuard::new(::core::addr_of_mut!((*slot).b))
470+
//! ::kernel::init::__internal::DropGuard::new(&raw mut (*slot).b)
471471
//! };
472472
//! ::core::mem::forget(__b_guard);
473473
//! ::core::mem::forget(__a_guard);
@@ -1210,15 +1210,15 @@ macro_rules! __init_internal {
12101210
// SAFETY: `slot` is valid, because we are inside of an initializer closure, we
12111211
// return when an error/panic occurs.
12121212
// We also use the `data` to require the correct trait (`Init` or `PinInit`) for `$field`.
1213-
unsafe { $data.$field(::core::ptr::addr_of_mut!((*$slot).$field), init)? };
1213+
unsafe { $data.$field(&raw mut (*$slot).$field, init)? };
12141214
// Create the drop guard:
12151215
//
12161216
// We rely on macro hygiene to make it impossible for users to access this local variable.
12171217
// We use `paste!` to create new hygiene for `$field`.
12181218
::kernel::macros::paste! {
12191219
// SAFETY: We forget the guard later when initialization has succeeded.
12201220
let [< __ $field _guard >] = unsafe {
1221-
$crate::init::__internal::DropGuard::new(::core::ptr::addr_of_mut!((*$slot).$field))
1221+
$crate::init::__internal::DropGuard::new(&raw mut (*$slot).$field)
12221222
};
12231223

12241224
$crate::__init_internal!(init_slot($use_data):
@@ -1241,15 +1241,15 @@ macro_rules! __init_internal {
12411241
//
12421242
// SAFETY: `slot` is valid, because we are inside of an initializer closure, we
12431243
// return when an error/panic occurs.
1244-
unsafe { $crate::init::Init::__init(init, ::core::ptr::addr_of_mut!((*$slot).$field))? };
1244+
unsafe { $crate::init::Init::__init(init, &raw mut (*$slot).$field)? };
12451245
// Create the drop guard:
12461246
//
12471247
// We rely on macro hygiene to make it impossible for users to access this local variable.
12481248
// We use `paste!` to create new hygiene for `$field`.
12491249
::kernel::macros::paste! {
12501250
// SAFETY: We forget the guard later when initialization has succeeded.
12511251
let [< __ $field _guard >] = unsafe {
1252-
$crate::init::__internal::DropGuard::new(::core::ptr::addr_of_mut!((*$slot).$field))
1252+
$crate::init::__internal::DropGuard::new(&raw mut (*$slot).$field)
12531253
};
12541254

12551255
$crate::__init_internal!(init_slot():
@@ -1272,7 +1272,7 @@ macro_rules! __init_internal {
12721272
// Initialize the field.
12731273
//
12741274
// SAFETY: The memory at `slot` is uninitialized.
1275-
unsafe { ::core::ptr::write(::core::ptr::addr_of_mut!((*$slot).$field), $field) };
1275+
unsafe { ::core::ptr::write(&raw mut (*$slot).$field, $field) };
12761276
}
12771277
// Create the drop guard:
12781278
//
@@ -1281,7 +1281,7 @@ macro_rules! __init_internal {
12811281
::kernel::macros::paste! {
12821282
// SAFETY: We forget the guard later when initialization has succeeded.
12831283
let [< __ $field _guard >] = unsafe {
1284-
$crate::init::__internal::DropGuard::new(::core::ptr::addr_of_mut!((*$slot).$field))
1284+
$crate::init::__internal::DropGuard::new(&raw mut (*$slot).$field)
12851285
};
12861286

12871287
$crate::__init_internal!(init_slot($($use_data)?):

rust/kernel/jump_label.rs

+2-2
Original file line numberDiff line numberDiff line change
@@ -20,8 +20,8 @@
2020
#[macro_export]
2121
macro_rules! static_branch_unlikely {
2222
($key:path, $keytyp:ty, $field:ident) => {{
23-
let _key: *const $keytyp = ::core::ptr::addr_of!($key);
24-
let _key: *const $crate::bindings::static_key_false = ::core::ptr::addr_of!((*_key).$field);
23+
let _key: *const $keytyp = &raw $key;
24+
let _key: *const $crate::bindings::static_key_false = &raw (*_key).$field;
2525
let _key: *const $crate::bindings::static_key = _key.cast();
2626

2727
#[cfg(not(CONFIG_JUMP_LABEL))]

rust/kernel/kunit.rs

+2-2
Original file line numberDiff line numberDiff line change
@@ -128,9 +128,9 @@ macro_rules! kunit_assert {
128128
unsafe {
129129
$crate::bindings::__kunit_do_failed_assertion(
130130
kunit_test,
131-
core::ptr::addr_of!(LOCATION.0),
131+
&raw LOCATION.0,
132132
$crate::bindings::kunit_assert_type_KUNIT_ASSERTION,
133-
core::ptr::addr_of!(ASSERTION.0.assert),
133+
&raw ASSERTION.0.assert,
134134
Some($crate::bindings::kunit_unary_assert_format),
135135
core::ptr::null(),
136136
);

rust/kernel/list.rs

+1-1
Original file line numberDiff line numberDiff line change
@@ -176,7 +176,7 @@ impl<const ID: u64> ListLinks<ID> {
176176
#[inline]
177177
unsafe fn fields(me: *mut Self) -> *mut ListLinksFields {
178178
// SAFETY: The caller promises that the pointer is valid.
179-
unsafe { Opaque::raw_get(ptr::addr_of!((*me).inner)) }
179+
unsafe { Opaque::raw_get(&raw const (*me).inner) }
180180
}
181181

182182
/// # Safety

rust/kernel/list/impl_list_item_mod.rs

+3-3
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ macro_rules! impl_has_list_links {
4949
// SAFETY: The implementation of `raw_get_list_links` only compiles if the field has the
5050
// right type.
5151
//
52-
// The behavior of `raw_get_list_links` is not changed since the `addr_of_mut!` macro is
52+
// The behavior of `raw_get_list_links` is not changed since the `&raw mut` op is
5353
// equivalent to the pointer offset operation in the trait definition.
5454
unsafe impl$(<$($implarg),*>)? $crate::list::HasListLinks$(<$id>)? for
5555
$self $(<$($selfarg),*>)?
@@ -61,7 +61,7 @@ macro_rules! impl_has_list_links {
6161
// SAFETY: The caller promises that the pointer is not dangling. We know that this
6262
// expression doesn't follow any pointers, as the `offset_of!` invocation above
6363
// would otherwise not compile.
64-
unsafe { ::core::ptr::addr_of_mut!((*ptr)$(.$field)*) }
64+
unsafe { &raw mut (*ptr)$(.$field)* }
6565
}
6666
}
6767
)*};
@@ -103,7 +103,7 @@ macro_rules! impl_has_list_links_self_ptr {
103103
unsafe fn raw_get_list_links(ptr: *mut Self) -> *mut $crate::list::ListLinks$(<$id>)? {
104104
// SAFETY: The caller promises that the pointer is not dangling.
105105
let ptr: *mut $crate::list::ListLinksSelfPtr<$item_type $(, $id)?> =
106-
unsafe { ::core::ptr::addr_of_mut!((*ptr).$field) };
106+
unsafe { &raw mut (*ptr).$field };
107107
ptr.cast()
108108
}
109109
}

rust/kernel/net/phy.rs

+2-2
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
//! C headers: [`include/linux/phy.h`](srctree/include/linux/phy.h).
88
99
use crate::{error::*, prelude::*, types::Opaque};
10-
use core::{marker::PhantomData, ptr::addr_of_mut};
10+
use core::marker::PhantomData;
1111

1212
pub mod reg;
1313

@@ -285,7 +285,7 @@ impl AsRef<kernel::device::Device> for Device {
285285
fn as_ref(&self) -> &kernel::device::Device {
286286
let phydev = self.0.get();
287287
// SAFETY: The struct invariant ensures that `mdio.dev` is valid.
288-
unsafe { kernel::device::Device::as_ref(addr_of_mut!((*phydev).mdio.dev)) }
288+
unsafe { kernel::device::Device::as_ref(&raw mut (*phydev).mdio.dev) }
289289
}
290290
}
291291

rust/kernel/pci.rs

+2-2
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ use crate::{
1717
types::{ARef, ForeignOwnable, Opaque},
1818
ThisModule,
1919
};
20-
use core::{ops::Deref, ptr::addr_of_mut};
20+
use core::ops::Deref;
2121
use kernel::prelude::*;
2222

2323
/// An adapter for the registration of PCI drivers.
@@ -60,7 +60,7 @@ impl<T: Driver + 'static> Adapter<T> {
6060
) -> kernel::ffi::c_int {
6161
// SAFETY: The PCI bus only ever calls the probe callback with a valid pointer to a
6262
// `struct pci_dev`.
63-
let dev = unsafe { device::Device::get_device(addr_of_mut!((*pdev).dev)) };
63+
let dev = unsafe { device::Device::get_device(&raw mut (*pdev).dev) };
6464
// SAFETY: `dev` is guaranteed to be embedded in a valid `struct pci_dev` by the call
6565
// above.
6666
let mut pdev = unsafe { Device::from_dev(dev) };

rust/kernel/platform.rs

+1-3
Original file line numberDiff line numberDiff line change
@@ -14,8 +14,6 @@ use crate::{
1414
ThisModule,
1515
};
1616

17-
use core::ptr::addr_of_mut;
18-
1917
/// An adapter for the registration of platform drivers.
2018
pub struct Adapter<T: Driver>(T);
2119

@@ -55,7 +53,7 @@ unsafe impl<T: Driver + 'static> driver::RegistrationOps for Adapter<T> {
5553
impl<T: Driver + 'static> Adapter<T> {
5654
extern "C" fn probe_callback(pdev: *mut bindings::platform_device) -> kernel::ffi::c_int {
5755
// SAFETY: The platform bus only ever calls the probe callback with a valid `pdev`.
58-
let dev = unsafe { device::Device::get_device(addr_of_mut!((*pdev).dev)) };
56+
let dev = unsafe { device::Device::get_device(&raw mut (*pdev).dev) };
5957
// SAFETY: `dev` is guaranteed to be embedded in a valid `struct platform_device` by the
6058
// call above.
6159
let mut pdev = unsafe { Device::from_dev(dev) };

rust/kernel/rbtree.rs

+11-11
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ use core::{
1111
cmp::{Ord, Ordering},
1212
marker::PhantomData,
1313
mem::MaybeUninit,
14-
ptr::{addr_of_mut, from_mut, NonNull},
14+
ptr::{from_mut, NonNull},
1515
};
1616

1717
/// A red-black tree with owned nodes.
@@ -238,7 +238,7 @@ impl<K, V> RBTree<K, V> {
238238

239239
/// Returns a cursor over the tree nodes, starting with the smallest key.
240240
pub fn cursor_front(&mut self) -> Option<Cursor<'_, K, V>> {
241-
let root = addr_of_mut!(self.root);
241+
let root = &raw mut self.root;
242242
// SAFETY: `self.root` is always a valid root node
243243
let current = unsafe { bindings::rb_first(root) };
244244
NonNull::new(current).map(|current| {
@@ -253,7 +253,7 @@ impl<K, V> RBTree<K, V> {
253253

254254
/// Returns a cursor over the tree nodes, starting with the largest key.
255255
pub fn cursor_back(&mut self) -> Option<Cursor<'_, K, V>> {
256-
let root = addr_of_mut!(self.root);
256+
let root = &raw mut self.root;
257257
// SAFETY: `self.root` is always a valid root node
258258
let current = unsafe { bindings::rb_last(root) };
259259
NonNull::new(current).map(|current| {
@@ -459,7 +459,7 @@ where
459459
let best = best_match?;
460460

461461
// SAFETY: `best` is a non-null node so it is valid by the type invariants.
462-
let links = unsafe { addr_of_mut!((*best.as_ptr()).links) };
462+
let links = unsafe { &raw mut (*best.as_ptr()).links };
463463

464464
NonNull::new(links).map(|current| {
465465
// INVARIANT:
@@ -767,7 +767,7 @@ impl<'a, K, V> Cursor<'a, K, V> {
767767
let node = RBTreeNode { node };
768768
// SAFETY: The reference to the tree used to create the cursor outlives the cursor, so
769769
// the tree cannot change. By the tree invariant, all nodes are valid.
770-
unsafe { bindings::rb_erase(&mut (*this).links, addr_of_mut!(self.tree.root)) };
770+
unsafe { bindings::rb_erase(&mut (*this).links, &raw mut self.tree.root) };
771771

772772
let current = match (prev, next) {
773773
(_, Some(next)) => next,
@@ -803,7 +803,7 @@ impl<'a, K, V> Cursor<'a, K, V> {
803803
let neighbor = neighbor.as_ptr();
804804
// SAFETY: The reference to the tree used to create the cursor outlives the cursor, so
805805
// the tree cannot change. By the tree invariant, all nodes are valid.
806-
unsafe { bindings::rb_erase(neighbor, addr_of_mut!(self.tree.root)) };
806+
unsafe { bindings::rb_erase(neighbor, &raw mut self.tree.root) };
807807
// SAFETY: By the type invariant of `Self`, all non-null `rb_node` pointers stored in `self`
808808
// point to the links field of `Node<K, V>` objects.
809809
let this = unsafe { container_of!(neighbor, Node<K, V>, links) }.cast_mut();
@@ -918,7 +918,7 @@ impl<'a, K, V> Cursor<'a, K, V> {
918918
let k = unsafe { &(*this).key };
919919
// SAFETY: The passed `node` is the current node or a non-null neighbor,
920920
// thus `this` is valid by the type invariants.
921-
let v = unsafe { addr_of_mut!((*this).value) };
921+
let v = unsafe { &raw mut (*this).value };
922922
(k, v)
923923
}
924924
}
@@ -1027,7 +1027,7 @@ impl<K, V> Iterator for IterRaw<K, V> {
10271027
self.next = unsafe { bindings::rb_next(self.next) };
10281028

10291029
// SAFETY: By the same reasoning above, it is safe to dereference the node.
1030-
Some(unsafe { (addr_of_mut!((*cur).key), addr_of_mut!((*cur).value)) })
1030+
Some(unsafe { (&raw mut (*cur).key, &raw mut (*cur).value) })
10311031
}
10321032
}
10331033

@@ -1170,15 +1170,15 @@ impl<'a, K, V> RawVacantEntry<'a, K, V> {
11701170

11711171
// SAFETY: `node` is valid at least until we call `Box::from_raw`, which only happens when
11721172
// the node is removed or replaced.
1173-
let node_links = unsafe { addr_of_mut!((*node).links) };
1173+
let node_links = unsafe { &raw mut (*node).links };
11741174

11751175
// INVARIANT: We are linking in a new node, which is valid. It remains valid because we
11761176
// "forgot" it with `Box::into_raw`.
11771177
// SAFETY: The type invariants of `RawVacantEntry` are exactly the safety requirements of `rb_link_node`.
11781178
unsafe { bindings::rb_link_node(node_links, self.parent, self.child_field_of_parent) };
11791179

11801180
// SAFETY: All pointers are valid. `node` has just been inserted into the tree.
1181-
unsafe { bindings::rb_insert_color(node_links, addr_of_mut!((*self.rbtree).root)) };
1181+
unsafe { bindings::rb_insert_color(node_links, &raw mut (*self.rbtree).root) };
11821182

11831183
// SAFETY: The node is valid until we remove it from the tree.
11841184
unsafe { &mut (*node).value }
@@ -1261,7 +1261,7 @@ impl<'a, K, V> OccupiedEntry<'a, K, V> {
12611261

12621262
// SAFETY: `node` is valid at least until we call `Box::from_raw`, which only happens when
12631263
// the node is removed or replaced.
1264-
let new_node_links = unsafe { addr_of_mut!((*node).links) };
1264+
let new_node_links = unsafe { &raw mut (*node).links };
12651265

12661266
// SAFETY: This updates the pointers so that `new_node_links` is in the tree where
12671267
// `self.node_links` used to be.

0 commit comments

Comments
 (0)