nuke the leprechaun from VOP_ACCESS
Paul Lavoie, kern/37542
This commit is contained in:
parent
03dcf031ab
commit
2780a147ca
@ -1,4 +1,4 @@
|
||||
/* $NetBSD: exec_script.c,v 1.58 2007/11/26 19:02:00 pooka Exp $ */
|
||||
/* $NetBSD: exec_script.c,v 1.59 2007/12/14 16:48:24 pooka Exp $ */
|
||||
|
||||
/*
|
||||
* Copyright (c) 1993, 1994, 1996 Christopher G. Demetriou
|
||||
@ -31,7 +31,7 @@
|
||||
*/
|
||||
|
||||
#include <sys/cdefs.h>
|
||||
__KERNEL_RCSID(0, "$NetBSD: exec_script.c,v 1.58 2007/11/26 19:02:00 pooka Exp $");
|
||||
__KERNEL_RCSID(0, "$NetBSD: exec_script.c,v 1.59 2007/12/14 16:48:24 pooka Exp $");
|
||||
|
||||
#if defined(SETUIDSCRIPTS) && !defined(FDSCRIPTS)
|
||||
#define FDSCRIPTS /* Need this for safe set-id scripts. */
|
||||
@ -179,7 +179,7 @@ check_shell:
|
||||
* method of implementing "safe" set-id and x-only scripts.
|
||||
*/
|
||||
vn_lock(epp->ep_vp, LK_EXCLUSIVE | LK_RETRY);
|
||||
error = VOP_ACCESS(epp->ep_vp, VREAD, l->l_cred, l);
|
||||
error = VOP_ACCESS(epp->ep_vp, VREAD, l->l_cred);
|
||||
VOP_UNLOCK(epp->ep_vp, 0);
|
||||
if (error == EACCES
|
||||
#ifdef SETUIDSCRIPTS
|
||||
|
Loading…
Reference in New Issue
Block a user