summaryrefslogtreecommitdiff
path: root/Kernel/Devices/KCOVDevice.h
diff options
context:
space:
mode:
authorAndreas Kling <kling@serenityos.org>2022-08-23 17:58:05 +0200
committerAndreas Kling <kling@serenityos.org>2022-08-24 14:57:51 +0200
commitcf16b2c8e64709d570c5f54a981017d217e95ed0 (patch)
tree16c9efdaaa579ae51682a51a58949ce02c3d2092 /Kernel/Devices/KCOVDevice.h
parentd6ef18f587d4a7e4f58487c84e0b9eb260f3ec5a (diff)
downloadserenity-cf16b2c8e64709d570c5f54a981017d217e95ed0.zip
Kernel: Wrap process address spaces in SpinlockProtected
This forces anyone who wants to look into and/or manipulate an address space to lock it. And this replaces the previous, more flimsy, manual spinlock use. Note that pointers *into* the address space are not safe to use after you unlock the space. We've got many issues like this, and we'll have to track those down as wlel.
Diffstat (limited to 'Kernel/Devices/KCOVDevice.h')
-rw-r--r--Kernel/Devices/KCOVDevice.h2
1 files changed, 1 insertions, 1 deletions
diff --git a/Kernel/Devices/KCOVDevice.h b/Kernel/Devices/KCOVDevice.h
index f4860fc2ab..bc5883c61f 100644
--- a/Kernel/Devices/KCOVDevice.h
+++ b/Kernel/Devices/KCOVDevice.h
@@ -22,7 +22,7 @@ public:
static void free_process();
// ^File
- ErrorOr<Memory::Region*> mmap(Process&, OpenFileDescription&, Memory::VirtualRange const&, u64 offset, int prot, bool shared) override;
+ ErrorOr<Memory::Region*> mmap(Process&, Memory::AddressSpace&, OpenFileDescription&, Memory::VirtualRange const&, u64 offset, int prot, bool shared) override;
ErrorOr<NonnullLockRefPtr<OpenFileDescription>> open(int options) override;
protected: