mirror of
https://github.com/LadybirdBrowser/ladybird.git
synced 2024-12-04 05:20:30 +00:00
9201a06027
Before we start disabling acquisition of the big process lock for specific syscalls, make sure to document and assert that all the lock is held during all syscalls.
36 lines
1.1 KiB
C++
36 lines
1.1 KiB
C++
/*
|
|
* Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
|
|
*
|
|
* SPDX-License-Identifier: BSD-2-Clause
|
|
*/
|
|
|
|
#include <Kernel/Process.h>
|
|
#include <Kernel/Random.h>
|
|
#include <Kernel/UserOrKernelBuffer.h>
|
|
|
|
namespace Kernel {
|
|
|
|
// We don't use the flag yet, but we could use it for distinguishing
|
|
// random source like Linux, unlike the OpenBSD equivalent. However, if we
|
|
// do, we should be able of the caveats that Linux has dealt with.
|
|
KResultOr<FlatPtr> Process::sys$getrandom(Userspace<void*> buffer, size_t buffer_size, [[maybe_unused]] unsigned flags)
|
|
{
|
|
VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this);
|
|
REQUIRE_PROMISE(stdio);
|
|
if (buffer_size > NumericLimits<ssize_t>::max())
|
|
return EINVAL;
|
|
|
|
auto data_buffer = UserOrKernelBuffer::for_user_buffer(buffer, buffer_size);
|
|
if (!data_buffer.has_value())
|
|
return EFAULT;
|
|
auto result = data_buffer.value().write_buffered<1024>(buffer_size, [&](u8* buffer, size_t buffer_bytes) {
|
|
get_good_random_bytes(buffer, buffer_bytes);
|
|
return buffer_bytes;
|
|
});
|
|
if (result.is_error())
|
|
return result.error();
|
|
else
|
|
return result.release_value();
|
|
}
|
|
|
|
}
|