diff options
author | rwatson <rwatson@FreeBSD.org> | 2007-02-19 22:56:10 +0000 |
---|---|---|
committer | rwatson <rwatson@FreeBSD.org> | 2007-02-19 22:56:10 +0000 |
commit | ef9ccd29e1a576002ccd772709022d4bf551e69f (patch) | |
tree | 8db3f58609c3f393924c81326947cb65e08ed0d8 /sys | |
parent | ac3a9d22a9b4175e5e359d25781e64b9aeb740cb (diff) | |
download | FreeBSD-src-ef9ccd29e1a576002ccd772709022d4bf551e69f.zip FreeBSD-src-ef9ccd29e1a576002ccd772709022d4bf551e69f.tar.gz |
Remove call to ipcperm() in shmget_existing(). The flags argument is
ignored on other systems I investigated when accessing an existing
memory segment rather than creating a new one. This call to ipcperm()
is the only one to pass in a complete mode flag to the permission
checks rather than a simple access request mask, and caused problems
for the revised ipcperm() based on the priv(9) interface, which can
now be restored.
PR: 106078
Diffstat (limited to 'sys')
-rw-r--r-- | sys/kern/sysv_shm.c | 3 |
1 files changed, 0 insertions, 3 deletions
diff --git a/sys/kern/sysv_shm.c b/sys/kern/sysv_shm.c index 2fc2d71..fe568b4 100644 --- a/sys/kern/sysv_shm.c +++ b/sys/kern/sysv_shm.c @@ -722,9 +722,6 @@ shmget_existing(td, uap, mode, segnum) if (error != 0) return (error); #endif - error = ipcperm(td, &shmseg->u.shm_perm, mode); - if (error) - return (error); if (uap->size && uap->size > shmseg->u.shm_segsz) return (EINVAL); td->td_retval[0] = IXSEQ_TO_IPCID(segnum, shmseg->u.shm_perm); |