diff options
-rw-r--r-- | Kernel/API/Syscall.h | 2 | ||||
-rw-r--r-- | Kernel/Syscalls/getrandom.cpp | 2 |
2 files changed, 2 insertions, 2 deletions
diff --git a/Kernel/API/Syscall.h b/Kernel/API/Syscall.h index 904c418935..852a4653d5 100644 --- a/Kernel/API/Syscall.h +++ b/Kernel/API/Syscall.h @@ -154,7 +154,7 @@ enum class NeedsBigProcessLock { S(realpath, NeedsBigProcessLock::Yes) \ S(get_process_name, NeedsBigProcessLock::Yes) \ S(fchdir, NeedsBigProcessLock::Yes) \ - S(getrandom, NeedsBigProcessLock::Yes) \ + S(getrandom, NeedsBigProcessLock::No) \ S(getkeymap, NeedsBigProcessLock::Yes) \ S(setkeymap, NeedsBigProcessLock::Yes) \ S(clock_gettime, NeedsBigProcessLock::Yes) \ diff --git a/Kernel/Syscalls/getrandom.cpp b/Kernel/Syscalls/getrandom.cpp index 7dca359907..942ffd0202 100644 --- a/Kernel/Syscalls/getrandom.cpp +++ b/Kernel/Syscalls/getrandom.cpp @@ -15,7 +15,7 @@ namespace Kernel { // do, we should be able of the caveats that Linux has dealt with. KResultOr<FlatPtr> Process::sys$getrandom(Userspace<void*> buffer, size_t buffer_size, [[maybe_unused]] unsigned flags) { - VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this); + VERIFY_NO_PROCESS_BIG_LOCK(this); REQUIRE_PROMISE(stdio); if (buffer_size > NumericLimits<ssize_t>::max()) return EINVAL; |