diff options
author | Idan Horowitz <idan.horowitz@gmail.com> | 2021-08-06 14:43:02 +0300 |
---|---|---|
committer | Andreas Kling <kling@serenityos.org> | 2021-08-06 23:36:12 +0200 |
commit | 48325e29598cc79aaccf9fa3992cbca7aeff9bf3 (patch) | |
tree | 8bca7d4f7098f74377f54511c99a8db91903fb4d /Kernel/Syscalls/getrandom.cpp | |
parent | b1f4f6ee1581f18be58ddcdb3257fe3fb79190c7 (diff) | |
download | serenity-48325e29598cc79aaccf9fa3992cbca7aeff9bf3.zip |
Kernel: Disable big process lock for sys$getrandom
This syscall doesn't touch any intra-process shared resources and
already holds the global kernel RNG lock so there's no reason to hold
the big lock.
Diffstat (limited to 'Kernel/Syscalls/getrandom.cpp')
-rw-r--r-- | Kernel/Syscalls/getrandom.cpp | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/Kernel/Syscalls/getrandom.cpp b/Kernel/Syscalls/getrandom.cpp index 7dca359907..942ffd0202 100644 --- a/Kernel/Syscalls/getrandom.cpp +++ b/Kernel/Syscalls/getrandom.cpp @@ -15,7 +15,7 @@ namespace Kernel { // do, we should be able of the caveats that Linux has dealt with. KResultOr<FlatPtr> Process::sys$getrandom(Userspace<void*> buffer, size_t buffer_size, [[maybe_unused]] unsigned flags) { - VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this); + VERIFY_NO_PROCESS_BIG_LOCK(this); REQUIRE_PROMISE(stdio); if (buffer_size > NumericLimits<ssize_t>::max()) return EINVAL; |