From owner-freebsd-bugs@FreeBSD.ORG Mon Jun 4 12:50:09 2007 Return-Path: X-Original-To: freebsd-bugs@hub.freebsd.org Delivered-To: freebsd-bugs@hub.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id F185116A400 for ; Mon, 4 Jun 2007 12:50:08 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [69.147.83.40]) by mx1.freebsd.org (Postfix) with ESMTP id 9E39913C455 for ; Mon, 4 Jun 2007 12:50:08 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1]) by freefall.freebsd.org (8.13.4/8.13.4) with ESMTP id l54Co8QI054271 for ; Mon, 4 Jun 2007 12:50:08 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.13.4/8.13.4/Submit) id l54Co8aL054269; Mon, 4 Jun 2007 12:50:08 GMT (envelope-from gnats) Date: Mon, 4 Jun 2007 12:50:08 GMT Message-Id: <200706041250.l54Co8aL054269@freefall.freebsd.org> To: freebsd-bugs@FreeBSD.org From: "Vasim Valejev" Cc: Subject: Re: kern/113218: [sysvipc] [patch] Overflow in shmget's memory size check X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: Vasim Valejev List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 04 Jun 2007 12:50:09 -0000 The following reply was made to PR kern/113218; it has been noted by GNATS. From: "Vasim Valejev" To: , "Vasim Valejev" Cc: Subject: Re: kern/113218: [sysvipc] [patch] Overflow in shmget's memory size check Date: Mon, 4 Jun 2007 16:16:13 +0400 Just found that there more modifications needed. Big chunk of shared memory (2GB or more) won't deallocate properly because "shmid_ds" structure has int type for "shm_segsz" field. So, will need to change in sys/sys/shm.h (and /usr/include/sys/shm.h), sysv_shm.c (there is shmid_ds's definition too) and usr.bin/ipcs/ipcs.c source ("%12d" -> "%12ld" in line that prints segment size information). Vasim V.