From owner-freebsd-bugs@freebsd.org Sat Jun 17 07:08:07 2017 Return-Path: Delivered-To: freebsd-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id A0633BF314E for ; Sat, 17 Jun 2017 07:08:07 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 8E01B826F7 for ; Sat, 17 Jun 2017 07:08:07 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id v5H786HB085695 for ; Sat, 17 Jun 2017 07:08:07 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-bugs@FreeBSD.org Subject: [Bug 220074] [kern] sys/kern/kern_prot.c: a sleep-under-mutex bug in crextend Date: Sat, 17 Jun 2017 07:08:06 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 11.0-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: mjg@FreeBSD.org X-Bugzilla-Status: Closed X-Bugzilla-Resolution: Not A Bug X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: mjg@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_status rep_platform resolution cc assigned_to Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 17 Jun 2017 07:08:07 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D220074 Mateusz Guzik changed: What |Removed |Added ---------------------------------------------------------------------------- Status|New |Closed Hardware|i386 |Any Resolution|--- |Not A Bug CC| |mjg@FreeBSD.org Assignee|freebsd-bugs@FreeBSD.org |mjg@FreeBSD.org --- Comment #1 from Mateusz Guzik --- The loop in crcopysafe is supposed to guarantee that the memory allocated f= or the new credential set is sufficient. i.e. it is an invariant that crcopy as called from here does not have to malloc. it would be better if there was no malloc codepath from here in the first place, but there is no bug here and the entire cr* family needs to be refactored as such I'm closing as NOTABUG. thanks for reporting. --=20 You are receiving this mail because: You are the assignee for the bug.=