mirror of
https://chromium.googlesource.com/crosvm/crosvm
synced 2025-02-10 20:19:07 +00:00
kvm: Fix typos.
BUG=None TEST=cargo test Change-Id: Id731f8087b391319329eca1f59bee906f3046bdd Reviewed-on: https://chromium-review.googlesource.com/c/chromiumos/platform/crosvm/+/2283337 Commit-Queue: Zach Reizner <zachr@chromium.org> Auto-Submit: Andrew Walbran <qwandor@google.com> Tested-by: Zach Reizner <zachr@chromium.org> Reviewed-by: Zach Reizner <zachr@chromium.org>
This commit is contained in:
parent
5b1655cc66
commit
945b980e1a
1 changed files with 2 additions and 3 deletions
|
@ -1616,8 +1616,7 @@ impl Vcpu {
|
|||
}
|
||||
|
||||
/// Specifies set of signals that are blocked during execution of KVM_RUN.
|
||||
/// Signals that are not blocked will will cause KVM_RUN to return
|
||||
/// with -EINTR.
|
||||
/// Signals that are not blocked will cause KVM_RUN to return with -EINTR.
|
||||
///
|
||||
/// See the documentation for KVM_SET_SIGNAL_MASK
|
||||
pub fn set_signal_mask(&self, signals: &[c_int]) -> Result<()> {
|
||||
|
@ -1660,7 +1659,7 @@ impl Vcpu {
|
|||
id: reg_id,
|
||||
addr: data_ref as u64,
|
||||
};
|
||||
// safe becuase we allocated the struct and we know the kernel will read
|
||||
// safe because we allocated the struct and we know the kernel will read
|
||||
// exactly the size of the struct
|
||||
let ret = unsafe { ioctl_with_ref(self, KVM_SET_ONE_REG(), &onereg) };
|
||||
if ret < 0 {
|
||||
|
|
Loading…
Reference in a new issue