diff options
author | Gurchetan Singh <gurchetansingh@chromium.org> | 2019-05-22 08:57:16 -0700 |
---|---|---|
committer | chrome-bot <chrome-bot@chromium.org> | 2019-05-24 15:09:26 -0700 |
commit | 53edb817dac31c549464040339a16be3a52e3f74 (patch) | |
tree | ab5db62289dc2f34560791cf6f40d5b4765ea7be /src/linux.rs | |
parent | 56ebd1238048a71ab5e58c3b20b81c92770eca54 (diff) | |
download | crosvm-53edb817dac31c549464040339a16be3a52e3f74.tar crosvm-53edb817dac31c549464040339a16be3a52e3f74.tar.gz crosvm-53edb817dac31c549464040339a16be3a52e3f74.tar.bz2 crosvm-53edb817dac31c549464040339a16be3a52e3f74.tar.lz crosvm-53edb817dac31c549464040339a16be3a52e3f74.tar.xz crosvm-53edb817dac31c549464040339a16be3a52e3f74.tar.zst crosvm-53edb817dac31c549464040339a16be3a52e3f74.zip |
crosvm: {WlDriverRequest, WlDriverResponse} --> {VmMemoryRequest, VmMemoryResponse}
These type of requests are not necessarily specific to the virtio-wl, and other devices (virtio-gpu) may want to use them. BUG=chromium:924405 TEST=compile Change-Id: Iad0889da8ab3d23bb2378448fc05e3c840a93d93 Reviewed-on: https://chromium-review.googlesource.com/1626791 Commit-Ready: ChromeOS CL Exonerator Bot <chromiumos-cl-exonerator@appspot.gserviceaccount.com> Tested-by: kokoro <noreply+kokoro@google.com> Legacy-Commit-Queue: Commit Bot <commit-bot@chromium.org> Reviewed-by: Zach Reizner <zachr@chromium.org>
Diffstat (limited to 'src/linux.rs')
-rw-r--r-- | src/linux.rs | 24 |
1 files changed, 12 insertions, 12 deletions
diff --git a/src/linux.rs b/src/linux.rs index 979666e..58a0667 100644 --- a/src/linux.rs +++ b/src/linux.rs @@ -48,8 +48,8 @@ use vhost; use vm_control::{ BalloonControlCommand, BalloonControlRequestSocket, BalloonControlResponseSocket, DiskControlCommand, DiskControlRequestSocket, DiskControlResponseSocket, DiskControlResult, - UsbControlSocket, VmControlResponseSocket, VmRunMode, WlControlRequestSocket, - WlControlResponseSocket, WlDriverRequest, WlDriverResponse, + UsbControlSocket, VmControlResponseSocket, VmMemoryControlRequestSocket, + VmMemoryControlResponseSocket, VmMemoryRequest, VmMemoryResponse, VmRunMode, }; use crate::{Config, DiskOption, TouchDeviceOption}; @@ -235,7 +235,7 @@ type Result<T> = std::result::Result<T, Error>; enum TaggedControlSocket { Vm(VmControlResponseSocket), - Wayland(WlControlResponseSocket), + VmMemory(VmMemoryControlResponseSocket), } impl AsRef<UnixSeqpacket> for TaggedControlSocket { @@ -243,7 +243,7 @@ impl AsRef<UnixSeqpacket> for TaggedControlSocket { use self::TaggedControlSocket::*; match &self { Vm(ref socket) => socket, - Wayland(ref socket) => socket, + VmMemory(ref socket) => socket, } } } @@ -596,7 +596,7 @@ fn create_gpu_device( fn create_wayland_device( cfg: &Config, socket_path: &Path, - socket: WlControlRequestSocket, + socket: VmMemoryControlRequestSocket, resource_bridge: Option<virtio::resource_bridge::ResourceRequestSocket>, ) -> DeviceResult { let wayland_socket_dir = socket_path.parent().ok_or(Error::InvalidWaylandPath)?; @@ -692,7 +692,7 @@ fn create_virtio_devices( cfg: &Config, mem: &GuestMemory, _exit_evt: &EventFd, - wayland_device_socket: WlControlRequestSocket, + wayland_device_socket: VmMemoryControlRequestSocket, balloon_device_socket: BalloonControlResponseSocket, disk_device_sockets: &mut Vec<DiskControlResponseSocket>, ) -> DeviceResult<Vec<VirtioDeviceStub>> { @@ -792,7 +792,7 @@ fn create_devices( cfg: &Config, mem: &GuestMemory, exit_evt: &EventFd, - wayland_device_socket: WlControlRequestSocket, + wayland_device_socket: VmMemoryControlRequestSocket, balloon_device_socket: BalloonControlResponseSocket, disk_device_sockets: &mut Vec<DiskControlResponseSocket>, usb_provider: HostBackendDeviceProvider, @@ -1161,8 +1161,8 @@ pub fn run_config(cfg: Config) -> Result<()> { let mut control_sockets = Vec::new(); let (wayland_host_socket, wayland_device_socket) = - msg_socket::pair::<WlDriverResponse, WlDriverRequest>().map_err(Error::CreateSocket)?; - control_sockets.push(TaggedControlSocket::Wayland(wayland_host_socket)); + msg_socket::pair::<VmMemoryResponse, VmMemoryRequest>().map_err(Error::CreateSocket)?; + control_sockets.push(TaggedControlSocket::VmMemory(wayland_host_socket)); // Balloon gets a special socket so balloon requests can be forwarded from the main process. let (balloon_host_socket, balloon_device_socket) = msg_socket::pair::<BalloonControlCommand, ()>().map_err(Error::CreateSocket)?; @@ -1569,19 +1569,19 @@ fn run_control( } } }, - TaggedControlSocket::Wayland(socket) => match socket.recv() { + TaggedControlSocket::VmMemory(socket) => match socket.recv() { Ok(request) => { let response = request.execute(&mut linux.vm, &mut linux.resources); if let Err(e) = socket.send(&response) { - error!("failed to send WlControlResponse: {}", e); + error!("failed to send VmMemoryControlResponse: {}", e); } } Err(e) => { if let MsgError::BadRecvSize { actual: 0, .. } = e { vm_control_indices_to_remove.push(index); } else { - error!("failed to recv WlControlRequest: {}", e); + error!("failed to recv VmMemoryControlRequest: {}", e); } } }, |