summaryrefslogtreecommitdiff
path: root/Kernel/Syscalls/mount.cpp
diff options
context:
space:
mode:
authorBrian Gianforcaro <bgianf@serenityos.org>2021-07-18 11:20:12 -0700
committerGunnar Beutner <gunnar@beutner.name>2021-07-20 03:21:14 +0200
commit9201a0602706a463d65ecf4b3623235f1f82cd03 (patch)
treef943b67898d4271d7dc1e33784262f95e018c59c /Kernel/Syscalls/mount.cpp
parent120b9bc05bb7c2569719f2d0b2d6d434f32840ff (diff)
downloadserenity-9201a0602706a463d65ecf4b3623235f1f82cd03.zip
Kernel: Annotate all syscalls with VERIFY_PROCESS_BIG_LOCK_ACQUIRED
Before we start disabling acquisition of the big process lock for specific syscalls, make sure to document and assert that all the lock is held during all syscalls.
Diffstat (limited to 'Kernel/Syscalls/mount.cpp')
-rw-r--r--Kernel/Syscalls/mount.cpp2
1 files changed, 2 insertions, 0 deletions
diff --git a/Kernel/Syscalls/mount.cpp b/Kernel/Syscalls/mount.cpp
index 9220551e5f..b83148f4b5 100644
--- a/Kernel/Syscalls/mount.cpp
+++ b/Kernel/Syscalls/mount.cpp
@@ -19,6 +19,7 @@ namespace Kernel {
KResultOr<FlatPtr> Process::sys$mount(Userspace<const Syscall::SC_mount_params*> user_params)
{
+ VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
if (!is_superuser())
return EPERM;
@@ -116,6 +117,7 @@ KResultOr<FlatPtr> Process::sys$mount(Userspace<const Syscall::SC_mount_params*>
KResultOr<FlatPtr> Process::sys$umount(Userspace<const char*> user_mountpoint, size_t mountpoint_length)
{
+ VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
if (!is_superuser())
return EPERM;