mirror of
https://github.com/LadybirdBrowser/ladybird.git
synced 2025-01-24 02:03:06 -05:00
9201a06027
Before we start disabling acquisition of the big process lock for specific syscalls, make sure to document and assert that all the lock is held during all syscalls.
32 lines
999 B
C++
32 lines
999 B
C++
/*
|
|
* Copyright (c) 2018-2021, Andreas Kling <kling@serenityos.org>
|
|
*
|
|
* SPDX-License-Identifier: BSD-2-Clause
|
|
*/
|
|
|
|
#include <Kernel/Panic.h>
|
|
#include <Kernel/Process.h>
|
|
#include <Kernel/VM/Region.h>
|
|
|
|
namespace Kernel {
|
|
|
|
KResultOr<FlatPtr> Process::sys$get_stack_bounds(Userspace<FlatPtr*> user_stack_base, Userspace<size_t*> user_stack_size)
|
|
{
|
|
VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this);
|
|
auto& regs = Thread::current()->get_register_dump_from_stack();
|
|
FlatPtr stack_pointer = regs.userspace_sp();
|
|
auto* stack_region = space().find_region_containing(Range { VirtualAddress(stack_pointer), 1 });
|
|
|
|
// The syscall handler should have killed us if we had an invalid stack pointer.
|
|
VERIFY(stack_region);
|
|
|
|
FlatPtr stack_base = stack_region->range().base().get();
|
|
size_t stack_size = stack_region->size();
|
|
if (!copy_to_user(user_stack_base, &stack_base))
|
|
return EFAULT;
|
|
if (!copy_to_user(user_stack_size, &stack_size))
|
|
return EFAULT;
|
|
return 0;
|
|
}
|
|
|
|
}
|