diff options
author | Brian Gianforcaro <bgianf@serenityos.org> | 2021-07-18 11:20:12 -0700 |
---|---|---|
committer | Gunnar Beutner <gunnar@beutner.name> | 2021-07-20 03:21:14 +0200 |
commit | 9201a0602706a463d65ecf4b3623235f1f82cd03 (patch) | |
tree | f943b67898d4271d7dc1e33784262f95e018c59c /Kernel/Syscalls/utime.cpp | |
parent | 120b9bc05bb7c2569719f2d0b2d6d434f32840ff (diff) | |
download | serenity-9201a0602706a463d65ecf4b3623235f1f82cd03.zip |
Kernel: Annotate all syscalls with VERIFY_PROCESS_BIG_LOCK_ACQUIRED
Before we start disabling acquisition of the big process lock for
specific syscalls, make sure to document and assert that all the
lock is held during all syscalls.
Diffstat (limited to 'Kernel/Syscalls/utime.cpp')
-rw-r--r-- | Kernel/Syscalls/utime.cpp | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/Kernel/Syscalls/utime.cpp b/Kernel/Syscalls/utime.cpp index cec3fd2c9a..4930ee2b6a 100644 --- a/Kernel/Syscalls/utime.cpp +++ b/Kernel/Syscalls/utime.cpp @@ -12,6 +12,7 @@ namespace Kernel { KResultOr<FlatPtr> Process::sys$utime(Userspace<const char*> user_path, size_t path_length, Userspace<const struct utimbuf*> user_buf) { + VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this) REQUIRE_PROMISE(fattr); auto path = get_syscall_path_argument(user_path, path_length); if (path.is_error()) |