mirror of
				https://github.com/RGBCube/serenity
				synced 2025-10-31 22:02:44 +00:00 
			
		
		
		
	 efeb01e35f
			
		
	
	
		efeb01e35f
		
	
	
	
	
		
			
			This syscall only reads from the shared m_space field, but that field is only over written to by Process::attach_resources, before the process was initialized (aka, before syscalls can happen), by Process::finalize which is only called after all the process' threads have exited (aka, syscalls can not happen anymore), and by Process::do_exec which calls all other syscall-capable threads before doing so. Space's find_region_containing already holds its own lock, and as such there's no need to hold the big lock.
		
			
				
	
	
		
			31 lines
		
	
	
	
		
			994 B
		
	
	
	
		
			C++
		
	
	
	
	
	
			
		
		
	
	
			31 lines
		
	
	
	
		
			994 B
		
	
	
	
		
			C++
		
	
	
	
	
	
| /*
 | |
|  * Copyright (c) 2018-2021, Andreas Kling <kling@serenityos.org>
 | |
|  *
 | |
|  * SPDX-License-Identifier: BSD-2-Clause
 | |
|  */
 | |
| 
 | |
| #include <Kernel/Memory/Region.h>
 | |
| #include <Kernel/Process.h>
 | |
| 
 | |
| namespace Kernel {
 | |
| 
 | |
| KResultOr<FlatPtr> Process::sys$get_stack_bounds(Userspace<FlatPtr*> user_stack_base, Userspace<size_t*> user_stack_size)
 | |
| {
 | |
|     VERIFY_NO_PROCESS_BIG_LOCK(this);
 | |
|     auto& regs = Thread::current()->get_register_dump_from_stack();
 | |
|     FlatPtr stack_pointer = regs.userspace_sp();
 | |
|     auto* stack_region = address_space().find_region_containing(Memory::VirtualRange { VirtualAddress(stack_pointer), 1 });
 | |
| 
 | |
|     // The syscall handler should have killed us if we had an invalid stack pointer.
 | |
|     VERIFY(stack_region);
 | |
| 
 | |
|     FlatPtr stack_base = stack_region->range().base().get();
 | |
|     size_t stack_size = stack_region->size();
 | |
|     if (!copy_to_user(user_stack_base, &stack_base))
 | |
|         return EFAULT;
 | |
|     if (!copy_to_user(user_stack_size, &stack_size))
 | |
|         return EFAULT;
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| }
 |