mirror of
				https://github.com/RGBCube/serenity
				synced 2025-10-30 01:12:07 +00:00 
			
		
		
		
	 cf16b2c8e6
			
		
	
	
		cf16b2c8e6
		
	
	
	
	
		
			
			This forces anyone who wants to look into and/or manipulate an address space to lock it. And this replaces the previous, more flimsy, manual spinlock use. Note that pointers *into* the address space are not safe to use after you unlock the space. We've got many issues like this, and we'll have to track those down as wlel.
		
			
				
	
	
		
			31 lines
		
	
	
	
		
			1 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
			
		
		
	
	
			31 lines
		
	
	
	
		
			1 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
| /*
 | |
|  * Copyright (c) 2018-2021, Andreas Kling <kling@serenityos.org>
 | |
|  *
 | |
|  * SPDX-License-Identifier: BSD-2-Clause
 | |
|  */
 | |
| 
 | |
| #include <Kernel/Memory/Region.h>
 | |
| #include <Kernel/Process.h>
 | |
| 
 | |
| namespace Kernel {
 | |
| 
 | |
| ErrorOr<FlatPtr> Process::sys$get_stack_bounds(Userspace<FlatPtr*> user_stack_base, Userspace<size_t*> user_stack_size)
 | |
| {
 | |
|     VERIFY_NO_PROCESS_BIG_LOCK(this);
 | |
|     auto& regs = Thread::current()->get_register_dump_from_stack();
 | |
|     FlatPtr stack_pointer = regs.userspace_sp();
 | |
|     return address_space().with([&](auto& space) -> ErrorOr<FlatPtr> {
 | |
|         auto* stack_region = space->find_region_containing(Memory::VirtualRange { VirtualAddress(stack_pointer), 1 });
 | |
| 
 | |
|         // The syscall handler should have killed us if we had an invalid stack pointer.
 | |
|         VERIFY(stack_region);
 | |
| 
 | |
|         FlatPtr stack_base = stack_region->range().base().get();
 | |
|         size_t stack_size = stack_region->size();
 | |
|         TRY(copy_to_user(user_stack_base, &stack_base));
 | |
|         TRY(copy_to_user(user_stack_size, &stack_size));
 | |
|         return 0;
 | |
|     });
 | |
| }
 | |
| 
 | |
| }
 |