diff --git a/repos/gems/src/server/ssh_terminal/login.h b/repos/gems/src/server/ssh_terminal/login.h index 4f4fc5781..c4b946df9 100644 --- a/repos/gems/src/server/ssh_terminal/login.h +++ b/repos/gems/src/server/ssh_terminal/login.h @@ -109,7 +109,7 @@ struct Ssh::Login : Genode::Registry::Element struct Ssh::Login_registry : Genode::Registry { Genode::Allocator &_alloc; - Genode::Lock _lock { }; + Genode::Mutex _mutex { }; /** * Import one login from node @@ -153,9 +153,9 @@ struct Ssh::Login_registry : Genode::Registry Login_registry(Genode::Allocator &alloc) : _alloc(alloc) { } /** - * Return registry lock + * Return registry mutex */ - Genode::Lock &lock() { return _lock; } + Genode::Mutex &mutex() { return _mutex; } /** * Import all login information from config diff --git a/repos/gems/src/server/ssh_terminal/root_component.h b/repos/gems/src/server/ssh_terminal/root_component.h index 70c039b02..fce00e5ce 100644 --- a/repos/gems/src/server/ssh_terminal/root_component.h +++ b/repos/gems/src/server/ssh_terminal/root_component.h @@ -56,7 +56,7 @@ class Terminal::Root_component : public Genode::Root_componentrequest_terminal) { return false; @@ -502,7 +502,7 @@ bool Ssh::Server::auth_password(ssh_session s, char const *u, char const *pass) * Even if there is no valid login for the user, let * the client try anyway and check multi login afterwards. */ - Genode::Lock::Guard g(_logins.lock()); + Genode::Mutex::Guard guard(_logins.mutex()); Login const *l = _logins.lookup(u); if (l && l->user == u && l->password == pass) { if (_allow_multi_login(s, *l)) { @@ -563,7 +563,7 @@ bool Ssh::Server::auth_pubkey(ssh_session s, char const *u, * matches allow authentication to proceed. */ if (signature_state == SSH_PUBLICKEY_STATE_VALID) { - Genode::Lock::Guard g(_logins.lock()); + Genode::Mutex::Guard guard(_logins.mutex()); Login const *l = _logins.lookup(u); if (l && !ssh_key_cmp(pubkey, l->pub_key, SSH_KEY_CMP_PUBLIC)) { @@ -591,7 +591,7 @@ void Ssh::Server::loop() } { - Genode::Lock::Guard g(_terminals.lock()); + Genode::Mutex::Guard guard(_terminals.mutex()); /* first remove all stale sessions */ auto cleanup = [&] (Session &s) { diff --git a/repos/gems/src/server/ssh_terminal/server.h b/repos/gems/src/server/ssh_terminal/server.h index ee790c77b..1d7f1bae0 100644 --- a/repos/gems/src/server/ssh_terminal/server.h +++ b/repos/gems/src/server/ssh_terminal/server.h @@ -60,10 +60,10 @@ struct Ssh::Session : Genode::Registry::Element Ssh::Terminal *terminal { nullptr }; - Genode::Lock _access_lock { }; - Genode::Lock &lock_terminal() + Genode::Mutex _access_mutex { }; + Genode::Mutex &mutex_terminal() { - return _access_lock; + return _access_mutex; } bool spawn_terminal { false }; @@ -110,8 +110,8 @@ struct Ssh::Terminal_session : Genode::Registry::Element struct Ssh::Terminal_registry : Genode::Registry { - Genode::Lock _lock { }; - Genode::Lock &lock() { return _lock; } + Genode::Mutex _mutex { }; + Genode::Mutex &mutex() { return _mutex; } }; diff --git a/repos/gems/src/server/ssh_terminal/ssh_callbacks.cc b/repos/gems/src/server/ssh_terminal/ssh_callbacks.cc index ecff52bd3..3e5e2198b 100644 --- a/repos/gems/src/server/ssh_terminal/ssh_callbacks.cc +++ b/repos/gems/src/server/ssh_terminal/ssh_callbacks.cc @@ -36,7 +36,7 @@ int channel_data_cb(ssh_session session, ssh_channel channel, void *userdata) { using Genode::error; - using Genode::Lock; + using Genode::Mutex; if (len == 0) { return 0; @@ -60,7 +60,7 @@ int channel_data_cb(ssh_session session, ssh_channel channel, } Ssh::Terminal &conn { *p->terminal }; - Lock::Guard guard { conn.read_buf.lock() }; + Mutex::Guard guard { conn.read_buf.mutex() }; char const *src { reinterpret_cast(data) }; size_t num_bytes { 0 }; diff --git a/repos/gems/src/server/ssh_terminal/terminal.h b/repos/gems/src/server/ssh_terminal/terminal.h index 34a231b0e..8d6ff22f9 100644 --- a/repos/gems/src/server/ssh_terminal/terminal.h +++ b/repos/gems/src/server/ssh_terminal/terminal.h @@ -159,7 +159,7 @@ class Ssh::Terminal */ void send(ssh_channel channel) { - Lock::Guard g(_write_buf.lock()); + Mutex::Guard guard(_write_buf.mutex()); if (!_write_buf.read_avail()) { return; } @@ -192,7 +192,7 @@ class Ssh::Terminal */ size_t read(char *dst, size_t dst_len) { - Genode::Lock::Guard g(read_buf.lock()); + Mutex::Guard guard(read_buf.mutex()); size_t const num_bytes = min(dst_len, read_buf.read_avail()); Genode::memcpy(dst, read_buf.content(), num_bytes); @@ -214,7 +214,7 @@ class Ssh::Terminal */ size_t write(char const *src, Genode::size_t src_len) { - Lock::Guard g(_write_buf.lock()); + Mutex::Guard g(_write_buf.mutex()); size_t num_bytes = 0; size_t i = 0; @@ -247,7 +247,7 @@ class Ssh::Terminal */ bool read_buffer_empty() { - Genode::Lock::Guard g(read_buf.lock()); + Mutex::Guard guard(read_buf.mutex()); return !read_buf.read_avail(); } }; diff --git a/repos/gems/src/server/ssh_terminal/util.h b/repos/gems/src/server/ssh_terminal/util.h index 562fdd678..9d692a6c6 100644 --- a/repos/gems/src/server/ssh_terminal/util.h +++ b/repos/gems/src/server/ssh_terminal/util.h @@ -42,10 +42,10 @@ namespace Util template struct Util::Buffer { - Genode::Lock _lock { }; - char _data[C] { }; - size_t _head { 0 }; - size_t _tail { 0 }; + Genode::Mutex _mutex { }; + char _data[C] { }; + size_t _head { 0 }; + size_t _tail { 0 }; size_t read_avail() const { return _head > _tail ? _head - _tail : 0; } size_t write_avail() const { return _head <= C ? C - _head : 0; } @@ -55,7 +55,7 @@ struct Util::Buffer void consume(size_t n) { _tail += n; } void reset() { _head = _tail = 0; } - Genode::Lock &lock() { return _lock; } + Genode::Mutex &mutex() { return _mutex; } }; #endif /* _SSH_TERMINAL_UTIL_H_ */