From nobody Fri Dec 19 18:06:10 2025 X-Original-To: dev-commits-src-all@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4dXwSz0hXKz6M9Sx for ; Fri, 19 Dec 2025 18:06:11 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R12" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4dXwSy3MTzz44RD for ; Fri, 19 Dec 2025 18:06:10 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1766167570; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=TDC91gViYEcZe9RwdM3tAVjC1n2XcWTnuGX7ZXx2w+A=; b=GaezTcKaH0B9aolBLgQU3+8erCyRKUeyqxAMubN/eH+YPsZKbQuhIifeghvKjukwiKvKxL u9MabZIyOKdS+HB9ZDQVaTNERMKWqiPYl1R0paDOE1KbD/wTzrfuEiasqkAyQhYdwfvZrE 5+7+YAQwGGOGNxQBO6iKnBr/KPT4NaH/zamkSzacU6rn1D12MMfgX2IWBAnPcwg3c8pFdb osLN42yIO1ahWrmQtmvxnAJda6d0BwYB0Vj0BZrQb4CRewP7fJ+HUj72XZ7+opfGyJbtHA x0fnbtQ/9EiWknUIOn9upfx1lzzQXVKxlteafkwO/pj4D3J22bUr5E+WKNMbCg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1766167570; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=TDC91gViYEcZe9RwdM3tAVjC1n2XcWTnuGX7ZXx2w+A=; b=ppJX6nF2d3TrytxayM6mHWPWY9rLD+oq0/eCAqQ9t6mNj+1hyX8PgOzzsn/QoEUDz19FRH JuuHNwb3ZhAX5wgS87TV2GgFY80YR27JOy2qnYOPKkWnedQvpMcqeCqcvn5s8yE5+ZbVpb uameDo5JF7Rjgvz0C9uGDSN9HSR0agRct18o86eobjdGfLbDKrSuiSQFUkk2upA/EqVn8Z Cm9YvIjTyqMpoHWmxoub1b5m+xhkabhfs8bjEr7uwEQui9iAQwYBfnW13MkmYHhBOq8Cxj 6Kq28tCg9nED1JqjB123j4E6AJK9chTMuz4lgmOeyIClv1wXHZTVD0wFkgenXA== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1766167570; a=rsa-sha256; cv=none; b=sarni4/lrScX0ItG5jTrm4VoL2wlktt/FZ72NJqMmF/oe8WkpHWutzKirLnwcPSPosiheP XEwUvPauBkO8T/8egVC4peL8VAY3dQEQA/LtBuU3LML6p2Y2Yrt0DYZhRYHp1MN8d4e2nl bFlOL1lVmmEO7EvDieUc/OgmdcwsNEdkwzVSiDaA6EXbGGeTYuWRpwKxNV5LVMOZWgXASX 5phShJNDkuq75mnrQuhgbY2hL+vXdR1Qg6VqiSA3gYrct9EYP/eMMwqaJAbD/loXSXkfHA 1xogDwdhSxe7jaeI5aKPLxGO1MFGRX+Rb09FdZpPeCdbAFxkPA7cHuT/RiMTsw== ARC-Authentication-Results: i=1; mx1.freebsd.org; none Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) by mxrelay.nyi.freebsd.org (Postfix) with ESMTP id 4dXwSy2n2hz3wM for ; Fri, 19 Dec 2025 18:06:10 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from git (uid 1279) (envelope-from git@FreeBSD.org) id 225b7 by gitrepo.freebsd.org (DragonFly Mail Agent v0.13+ on gitrepo.freebsd.org); Fri, 19 Dec 2025 18:06:10 +0000 To: src-committers@FreeBSD.org, dev-commits-src-all@FreeBSD.org, dev-commits-src-branches@FreeBSD.org From: Dag-Erling=?utf-8?Q? Sm=C3=B8rg?=rav Subject: git: 00bdb832fd5d - stable/14 - proc: Fix proc_init / proc_dtor ordering issues List-Id: Commit messages for all branches of the src repository List-Archive: https://lists.freebsd.org/archives/dev-commits-src-all List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: dev-commits-src-all@freebsd.org Sender: owner-dev-commits-src-all@FreeBSD.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: des X-Git-Repository: src X-Git-Refname: refs/heads/stable/14 X-Git-Reftype: branch X-Git-Commit: 00bdb832fd5def6dee43773d93a4f69c8db44643 Auto-Submitted: auto-generated Date: Fri, 19 Dec 2025 18:06:10 +0000 Message-Id: <69459412.225b7.370f91ff@gitrepo.freebsd.org> The branch stable/14 has been updated by des: URL: https://cgit.FreeBSD.org/src/commit/?id=00bdb832fd5def6dee43773d93a4f69c8db44643 commit 00bdb832fd5def6dee43773d93a4f69c8db44643 Author: Dag-Erling Smørgrav AuthorDate: 2025-12-14 13:16:22 +0000 Commit: Dag-Erling Smørgrav CommitDate: 2025-12-19 18:06:00 +0000 proc: Fix proc_init / proc_dtor ordering issues * Move the initialization of p_ktr into proc_init() and make the check in proc_dtor() unconditional. Prior to this, it was possible to fail and invoke proc_dtor() after the first thread had been created (which was the condition for checking p_ktr in proc_dtor()) but before p_ktr had been initialized. * Move the p_klist initialization in fork1() past the last possible failure point so we don't have to free it on failure. We didn't, which meant we were leaking a knlist every time we failed to fork due to hitting the resource limit. PR: 291470 MFC after: 1 week Reviewed by: kib Differential Revision: https://reviews.freebsd.org/D54215 (cherry picked from commit 026d962ef14dafe19fa73361bea6dcc95f141dfa) --- sys/kern/kern_fork.c | 4 ++-- sys/kern/kern_proc.c | 8 ++++---- 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/sys/kern/kern_fork.c b/sys/kern/kern_fork.c index 8abf6ebc20be..7731ae4d14f3 100644 --- a/sys/kern/kern_fork.c +++ b/sys/kern/kern_fork.c @@ -1063,8 +1063,6 @@ fork1(struct thread *td, struct fork_req *fr) #ifdef MAC mac_proc_init(newproc); #endif - newproc->p_klist = knlist_alloc(&newproc->p_mtx); - STAILQ_INIT(&newproc->p_ktr); /* * Increment the count of procs running with this uid. Don't allow @@ -1077,6 +1075,8 @@ fork1(struct thread *td, struct fork_req *fr) chgproccnt(cred->cr_ruidinfo, 1, 0); } + newproc->p_klist = knlist_alloc(&newproc->p_mtx); + do_fork(td, fr, newproc, td2, vm2, fp_procdesc); error = 0; goto cleanup; diff --git a/sys/kern/kern_proc.c b/sys/kern/kern_proc.c index b7fa7bfb60e9..c4d5356bb292 100644 --- a/sys/kern/kern_proc.c +++ b/sys/kern/kern_proc.c @@ -241,11 +241,9 @@ proc_dtor(void *mem, int size, void *arg) p = (struct proc *)mem; td = FIRST_THREAD_IN_PROC(p); if (td != NULL) { -#ifdef INVARIANTS KASSERT((p->p_numthreads == 1), - ("bad number of threads in exiting process")); - KASSERT(STAILQ_EMPTY(&p->p_ktr), ("proc_dtor: non-empty p_ktr")); -#endif + ("too many threads in exiting process")); + /* Free all OSD associated to this thread. */ osd_thread_exit(td); ast_kclear(td); @@ -253,6 +251,7 @@ proc_dtor(void *mem, int size, void *arg) /* Make sure all thread destructors are executed */ EVENTHANDLER_DIRECT_INVOKE(thread_dtor, td); } + KASSERT(STAILQ_EMPTY(&p->p_ktr), ("proc_dtor: non-empty p_ktr")); EVENTHANDLER_DIRECT_INVOKE(process_dtor, p); #ifdef KDTRACE_HOOKS kdtrace_proc_dtor(p); @@ -281,6 +280,7 @@ proc_init(void *mem, int size, int flags) p->p_stats = pstats_alloc(); p->p_pgrp = NULL; TAILQ_INIT(&p->p_kqtim_stop); + STAILQ_INIT(&p->p_ktr); return (0); }