summaryrefslogtreecommitdiff
path: root/Kernel/Syscalls/getrandom.cpp
diff options
context:
space:
mode:
authorIdan Horowitz <idan.horowitz@gmail.com>2021-08-06 14:43:02 +0300
committerAndreas Kling <kling@serenityos.org>2021-08-06 23:36:12 +0200
commit48325e29598cc79aaccf9fa3992cbca7aeff9bf3 (patch)
tree8bca7d4f7098f74377f54511c99a8db91903fb4d /Kernel/Syscalls/getrandom.cpp
parentb1f4f6ee1581f18be58ddcdb3257fe3fb79190c7 (diff)
downloadserenity-48325e29598cc79aaccf9fa3992cbca7aeff9bf3.zip
Kernel: Disable big process lock for sys$getrandom
This syscall doesn't touch any intra-process shared resources and already holds the global kernel RNG lock so there's no reason to hold the big lock.
Diffstat (limited to 'Kernel/Syscalls/getrandom.cpp')
-rw-r--r--Kernel/Syscalls/getrandom.cpp2
1 files changed, 1 insertions, 1 deletions
diff --git a/Kernel/Syscalls/getrandom.cpp b/Kernel/Syscalls/getrandom.cpp
index 7dca359907..942ffd0202 100644
--- a/Kernel/Syscalls/getrandom.cpp
+++ b/Kernel/Syscalls/getrandom.cpp
@@ -15,7 +15,7 @@ namespace Kernel {
// do, we should be able of the caveats that Linux has dealt with.
KResultOr<FlatPtr> Process::sys$getrandom(Userspace<void*> buffer, size_t buffer_size, [[maybe_unused]] unsigned flags)
{
- VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this);
+ VERIFY_NO_PROCESS_BIG_LOCK(this);
REQUIRE_PROMISE(stdio);
if (buffer_size > NumericLimits<ssize_t>::max())
return EINVAL;