mirror of
				https://github.com/RGBCube/serenity
				synced 2025-10-31 03:02:45 +00:00 
			
		
		
		
	 9201a06027
			
		
	
	
		9201a06027
		
	
	
	
	
		
			
			Before we start disabling acquisition of the big process lock for specific syscalls, make sure to document and assert that all the lock is held during all syscalls.
		
			
				
	
	
		
			36 lines
		
	
	
	
		
			1.1 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
			
		
		
	
	
			36 lines
		
	
	
	
		
			1.1 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
| /*
 | |
|  * Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
 | |
|  *
 | |
|  * SPDX-License-Identifier: BSD-2-Clause
 | |
|  */
 | |
| 
 | |
| #include <Kernel/Process.h>
 | |
| #include <Kernel/Random.h>
 | |
| #include <Kernel/UserOrKernelBuffer.h>
 | |
| 
 | |
| namespace Kernel {
 | |
| 
 | |
| // We don't use the flag yet, but we could use it for distinguishing
 | |
| // random source like Linux, unlike the OpenBSD equivalent. However, if we
 | |
| // do, we should be able of the caveats that Linux has dealt with.
 | |
| KResultOr<FlatPtr> Process::sys$getrandom(Userspace<void*> buffer, size_t buffer_size, [[maybe_unused]] unsigned flags)
 | |
| {
 | |
|     VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this);
 | |
|     REQUIRE_PROMISE(stdio);
 | |
|     if (buffer_size > NumericLimits<ssize_t>::max())
 | |
|         return EINVAL;
 | |
| 
 | |
|     auto data_buffer = UserOrKernelBuffer::for_user_buffer(buffer, buffer_size);
 | |
|     if (!data_buffer.has_value())
 | |
|         return EFAULT;
 | |
|     auto result = data_buffer.value().write_buffered<1024>(buffer_size, [&](u8* buffer, size_t buffer_bytes) {
 | |
|         get_good_random_bytes(buffer, buffer_bytes);
 | |
|         return buffer_bytes;
 | |
|     });
 | |
|     if (result.is_error())
 | |
|         return result.error();
 | |
|     else
 | |
|         return result.release_value();
 | |
| }
 | |
| 
 | |
| }
 |