mirror of
				https://github.com/RGBCube/serenity
				synced 2025-10-31 02:52:43 +00:00 
			
		
		
		
	 9201a06027
			
		
	
	
		9201a06027
		
	
	
	
	
		
			
			Before we start disabling acquisition of the big process lock for specific syscalls, make sure to document and assert that all the lock is held during all syscalls.
		
			
				
	
	
		
			79 lines
		
	
	
	
		
			2.7 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
			
		
		
	
	
			79 lines
		
	
	
	
		
			2.7 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
| /*
 | |
|  * Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
 | |
|  *
 | |
|  * SPDX-License-Identifier: BSD-2-Clause
 | |
|  */
 | |
| 
 | |
| #include <Kernel/Devices/HID/HIDManagement.h>
 | |
| #include <Kernel/Process.h>
 | |
| 
 | |
| namespace Kernel {
 | |
| 
 | |
| constexpr size_t map_name_max_size = 50;
 | |
| 
 | |
| KResultOr<FlatPtr> Process::sys$setkeymap(Userspace<const Syscall::SC_setkeymap_params*> user_params)
 | |
| {
 | |
|     VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this);
 | |
|     REQUIRE_PROMISE(setkeymap);
 | |
| 
 | |
|     if (!is_superuser())
 | |
|         return EPERM;
 | |
| 
 | |
|     Syscall::SC_setkeymap_params params;
 | |
|     if (!copy_from_user(¶ms, user_params))
 | |
|         return EFAULT;
 | |
| 
 | |
|     Keyboard::CharacterMapData character_map_data;
 | |
| 
 | |
|     if (!copy_n_from_user(character_map_data.map, params.map, CHAR_MAP_SIZE))
 | |
|         return EFAULT;
 | |
|     if (!copy_n_from_user(character_map_data.shift_map, params.shift_map, CHAR_MAP_SIZE))
 | |
|         return EFAULT;
 | |
|     if (!copy_n_from_user(character_map_data.alt_map, params.alt_map, CHAR_MAP_SIZE))
 | |
|         return EFAULT;
 | |
|     if (!copy_n_from_user(character_map_data.altgr_map, params.altgr_map, CHAR_MAP_SIZE))
 | |
|         return EFAULT;
 | |
|     if (!copy_n_from_user(character_map_data.shift_altgr_map, params.shift_altgr_map, CHAR_MAP_SIZE))
 | |
|         return EFAULT;
 | |
| 
 | |
|     auto map_name = get_syscall_path_argument(params.map_name);
 | |
|     if (map_name.is_error())
 | |
|         return map_name.error();
 | |
|     if (map_name.value()->length() > map_name_max_size)
 | |
|         return ENAMETOOLONG;
 | |
| 
 | |
|     HIDManagement::the().set_maps(character_map_data, map_name.value()->view());
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| KResultOr<FlatPtr> Process::sys$getkeymap(Userspace<const Syscall::SC_getkeymap_params*> user_params)
 | |
| {
 | |
|     REQUIRE_PROMISE(getkeymap);
 | |
| 
 | |
|     Syscall::SC_getkeymap_params params;
 | |
|     if (!copy_from_user(¶ms, user_params))
 | |
|         return EFAULT;
 | |
| 
 | |
|     String keymap_name = HIDManagement::the().keymap_name();
 | |
|     const Keyboard::CharacterMapData& character_maps = HIDManagement::the().character_maps();
 | |
| 
 | |
|     if (!copy_to_user(params.map, character_maps.map, CHAR_MAP_SIZE * sizeof(u32)))
 | |
|         return EFAULT;
 | |
|     if (!copy_to_user(params.shift_map, character_maps.shift_map, CHAR_MAP_SIZE * sizeof(u32)))
 | |
|         return EFAULT;
 | |
|     if (!copy_to_user(params.alt_map, character_maps.alt_map, CHAR_MAP_SIZE * sizeof(u32)))
 | |
|         return EFAULT;
 | |
|     if (!copy_to_user(params.altgr_map, character_maps.altgr_map, CHAR_MAP_SIZE * sizeof(u32)))
 | |
|         return EFAULT;
 | |
|     if (!copy_to_user(params.shift_altgr_map, character_maps.shift_altgr_map, CHAR_MAP_SIZE * sizeof(u32)))
 | |
|         return EFAULT;
 | |
| 
 | |
|     if (params.map_name.size < keymap_name.length())
 | |
|         return ENAMETOOLONG;
 | |
|     if (!copy_to_user(params.map_name.data, keymap_name.characters(), keymap_name.length()))
 | |
|         return EFAULT;
 | |
| 
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| }
 |