From nobody Wed Feb 1 23:41:45 2023 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4P6djk4z6Tz3cMgQ for ; Wed, 1 Feb 2023 23:41:46 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4P6djk3kHnz3Nwy for ; Wed, 1 Feb 2023 23:41:46 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1675294906; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=utGJgCsxEaBGk+HGbWt4r5swfUSDyydty3cQjuzXlMI=; b=x/g7IUG3MUD35T3AMxrhAuCngXGNXJyCJF4h58Yasi3dF4Xt4jKG+89EVG5TwKEdDyd49p 06hWl7+4ZpnBgJKacWlKUpIBRWq/WlkBl3Hf9ZUXApnzjnwBQ3DI67Ap3Sx4cznYYXyfWw io2XYP+jyi3n4g/UxiSpRtvsBsKTlAERc6x3uvatP37SL6CVKCajcFIzhrOvSbK/f7UYG1 29NCAi7hx7tP1RWfA6aHRMa27/SNECH/Qq2CcfW5gZpW2k8l5qeDYJ4hRy+kXgtqsaqmZJ wpKWOyqEoKLUvDJQMWHP0f+y+Po/oeZpRZJHvpHidLogKuDJsGl7L+SxAZpokg== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1675294906; a=rsa-sha256; cv=none; b=MtYGIjwfvdsi5m9+kqHCHJQ7b8n0fpfNswUoPcmeMQkbtzVkf0MX3cQY+JvgURlfCmfDAl 9oqGSWOPMVHpX+wyRu6KXuWMK4dErrO483gnEWINbnGgoHm5J9Uk0Uy7Pfpi7QOUkfGdph lCK/ZWF2A3yXmCzoLgY7ojoF5I39PWsLgyhej+F102woVoVggDmwIZtmPigRZfAAtAdWgX pCuTvW+7IBp/NvRDnxnrF86tCatDDUv6zQFoV3jWXD3b3/dbEZ/SHbznN9H3fM3Q/o8mZo ljJPBI/A5UlE11qarBFdjBRSX+/2iA2Fb3MvQ4AkZ/+Aw0v+/DzMj+HU5ZFvOA== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4P6djk2SJgzYNY for ; Wed, 1 Feb 2023 23:41:46 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 311NfkFx028643 for ; Wed, 1 Feb 2023 23:41:46 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from bugzilla@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 311NfkKg028641 for bugs@FreeBSD.org; Wed, 1 Feb 2023 23:41:46 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: bugzilla set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 269277] On 12.3, process-shared mutex may fail locking operations after usage of ANOTHER process-shared mutex. Date: Wed, 01 Feb 2023 23:41:45 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 12.3-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: commit-hook@FreeBSD.org X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@freebsd.org MIME-Version: 1.0 X-ThisMailContainsUnwantedMimeParts: N https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D269277 --- Comment #2 from commit-hook@FreeBSD.org --- A commit in branch main references this bug: URL: https://cgit.FreeBSD.org/src/commit/?id=3D25c862ae503a1c99458f4e055fd50c878= fadbea3 commit 25c862ae503a1c99458f4e055fd50c878fadbea3 Author: Konstantin Belousov AuthorDate: 2023-02-01 20:12:45 +0000 Commit: Konstantin Belousov CommitDate: 2023-02-01 22:59:27 +0000 libthr pshared: correct a bug in allocation When __thr_pshared_offpage() is called for allocation, it must not use the cached offpage for the key. Instead, the cached offpage must be unmapped and removed from the cache, if any. It is legitimate for the user code to unmap the shared lock object with= out destroying it, and then mapping something over the freed VA to carry another shared lock. In this case the cached offpage must be un-cached. PR: 269277 Reported by: rau8344@gmail.com Reviewed by: markj Sponsored by: The FreeBSD Foundation MFC after: 1 week Differential revision: https://reviews.freebsd.org/D38345 lib/libthr/thread/thr_pshared.c | 15 ++++++++++----- 1 file changed, 10 insertions(+), 5 deletions(-) --=20 You are receiving this mail because: You are the assignee for the bug.=