equal
deleted
inserted
replaced
504 return; |
504 return; |
505 } |
505 } |
506 |
506 |
507 if (!is_directory_secure(dirname)) { |
507 if (!is_directory_secure(dirname)) { |
508 // the directory is not a secure directory |
508 // the directory is not a secure directory |
|
509 os::closedir(dirp); |
509 return; |
510 return; |
510 } |
511 } |
511 |
512 |
512 // for each entry in the directory that matches the expected file |
513 // for each entry in the directory that matches the expected file |
513 // name pattern, determine if the file resources are stale and if |
514 // name pattern, determine if the file resources are stale and if |
851 // since we don't follow symbolic links when creating the backing |
852 // since we don't follow symbolic links when creating the backing |
852 // store file, we don't follow them when attaching either. |
853 // store file, we don't follow them when attaching either. |
853 // |
854 // |
854 if (!is_directory_secure(dirname)) { |
855 if (!is_directory_secure(dirname)) { |
855 FREE_C_HEAP_ARRAY(char, dirname, mtInternal); |
856 FREE_C_HEAP_ARRAY(char, dirname, mtInternal); |
|
857 if (luser != user) { |
|
858 FREE_C_HEAP_ARRAY(char, luser, mtInternal); |
|
859 } |
856 THROW_MSG(vmSymbols::java_lang_IllegalArgumentException(), |
860 THROW_MSG(vmSymbols::java_lang_IllegalArgumentException(), |
857 "Process not found"); |
861 "Process not found"); |
858 } |
862 } |
859 |
863 |
860 char* filename = get_sharedmem_filename(dirname, vmid); |
864 char* filename = get_sharedmem_filename(dirname, vmid); |