mirror of
				https://github.com/RGBCube/serenity
				synced 2025-10-31 06:52:45 +00:00 
			
		
		
		
	 2c72d495a3
			
		
	
	
		2c72d495a3
		
	
	
	
	
		
			
			I believe this to be safe, as the main thing that LockRefPtr provides over RefPtr is safe copying from a shared LockRefPtr instance. I've inspected the uses of RefPtr<PhysicalPage> and it seems they're all guarded by external locking. Some of it is less obvious, but this is an area where we're making continuous headway.
		
			
				
	
	
		
			44 lines
		
	
	
	
		
			1.1 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
			
		
		
	
	
			44 lines
		
	
	
	
		
			1.1 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
| /*
 | |
|  * Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
 | |
|  *
 | |
|  * SPDX-License-Identifier: BSD-2-Clause
 | |
|  */
 | |
| 
 | |
| #pragma once
 | |
| 
 | |
| #include <AK/Bitmap.h>
 | |
| #include <Kernel/Memory/VMObject.h>
 | |
| #include <Kernel/UnixTypes.h>
 | |
| 
 | |
| namespace Kernel::Memory {
 | |
| 
 | |
| class InodeVMObject : public VMObject {
 | |
| public:
 | |
|     virtual ~InodeVMObject() override;
 | |
| 
 | |
|     Inode& inode() { return *m_inode; }
 | |
|     Inode const& inode() const { return *m_inode; }
 | |
| 
 | |
|     size_t amount_dirty() const;
 | |
|     size_t amount_clean() const;
 | |
| 
 | |
|     int release_all_clean_pages();
 | |
|     int try_release_clean_pages(int page_amount);
 | |
| 
 | |
|     u32 writable_mappings() const;
 | |
| 
 | |
| protected:
 | |
|     explicit InodeVMObject(Inode&, FixedArray<RefPtr<PhysicalPage>>&&, Bitmap dirty_pages);
 | |
|     explicit InodeVMObject(InodeVMObject const&, FixedArray<RefPtr<PhysicalPage>>&&, Bitmap dirty_pages);
 | |
| 
 | |
|     InodeVMObject& operator=(InodeVMObject const&) = delete;
 | |
|     InodeVMObject& operator=(InodeVMObject&&) = delete;
 | |
|     InodeVMObject(InodeVMObject&&) = delete;
 | |
| 
 | |
|     virtual bool is_inode() const final { return true; }
 | |
| 
 | |
|     NonnullLockRefPtr<Inode> m_inode;
 | |
|     Bitmap m_dirty_pages;
 | |
| };
 | |
| 
 | |
| }
 |