mirror of
				https://github.com/RGBCube/serenity
				synced 2025-10-31 03:02:45 +00:00 
			
		
		
		
	 9201a06027
			
		
	
	
		9201a06027
		
	
	
	
	
		
			
			Before we start disabling acquisition of the big process lock for specific syscalls, make sure to document and assert that all the lock is held during all syscalls.
		
			
				
	
	
		
			32 lines
		
	
	
	
		
			999 B
		
	
	
	
		
			C++
		
	
	
	
	
	
			
		
		
	
	
			32 lines
		
	
	
	
		
			999 B
		
	
	
	
		
			C++
		
	
	
	
	
	
| /*
 | |
|  * Copyright (c) 2018-2021, Andreas Kling <kling@serenityos.org>
 | |
|  *
 | |
|  * SPDX-License-Identifier: BSD-2-Clause
 | |
|  */
 | |
| 
 | |
| #include <Kernel/Panic.h>
 | |
| #include <Kernel/Process.h>
 | |
| #include <Kernel/VM/Region.h>
 | |
| 
 | |
| namespace Kernel {
 | |
| 
 | |
| KResultOr<FlatPtr> Process::sys$get_stack_bounds(Userspace<FlatPtr*> user_stack_base, Userspace<size_t*> user_stack_size)
 | |
| {
 | |
|     VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this);
 | |
|     auto& regs = Thread::current()->get_register_dump_from_stack();
 | |
|     FlatPtr stack_pointer = regs.userspace_sp();
 | |
|     auto* stack_region = space().find_region_containing(Range { VirtualAddress(stack_pointer), 1 });
 | |
| 
 | |
|     // The syscall handler should have killed us if we had an invalid stack pointer.
 | |
|     VERIFY(stack_region);
 | |
| 
 | |
|     FlatPtr stack_base = stack_region->range().base().get();
 | |
|     size_t stack_size = stack_region->size();
 | |
|     if (!copy_to_user(user_stack_base, &stack_base))
 | |
|         return EFAULT;
 | |
|     if (!copy_to_user(user_stack_size, &stack_size))
 | |
|         return EFAULT;
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| }
 |