summaryrefslogtreecommitdiffhomepage
path: root/pkg
diff options
context:
space:
mode:
authorFabricio Voznika <fvoznika@google.com>2018-06-27 14:40:37 -0700
committerShentubot <shentubot@google.com>2018-06-27 14:41:32 -0700
commit6b6852bceb12900f27a541682ddfe47893911c6e (patch)
tree5b3f93bef62538be2f302956a75a8f342cb2c18a /pkg
parent99afc982f1f0e40059e1446ea6f3cb725b1fbde7 (diff)
Fix semaphore data races
PiperOrigin-RevId: 202371908 Change-Id: I72603b1d321878cae6404987c49e64732b676331
Diffstat (limited to 'pkg')
-rw-r--r--pkg/sentry/kernel/semaphore/semaphore.go12
1 files changed, 8 insertions, 4 deletions
diff --git a/pkg/sentry/kernel/semaphore/semaphore.go b/pkg/sentry/kernel/semaphore/semaphore.go
index e9027dc14..a1ee83ce5 100644
--- a/pkg/sentry/kernel/semaphore/semaphore.go
+++ b/pkg/sentry/kernel/semaphore/semaphore.go
@@ -118,6 +118,9 @@ func (r *Registry) FindOrCreate(ctx context.Context, key, nsems int32, mode linu
if !private {
// Look up an existing semaphore.
if set := r.findByKey(key); set != nil {
+ set.mu.Lock()
+ defer set.mu.Unlock()
+
// Check that caller can access semaphore set.
creds := auth.CredentialsFromContext(ctx)
if !set.checkPerms(creds, fs.PermsFromMode(mode)) {
@@ -170,6 +173,9 @@ func (r *Registry) RemoveID(id int32, creds *auth.Credentials) error {
return syserror.EINVAL
}
+ set.mu.Lock()
+ defer set.mu.Unlock()
+
// "The effective user ID of the calling process must match the creator or
// owner of the semaphore set, or the caller must be privileged."
if !set.checkCredentials(creds) && !set.checkCapability(creds) {
@@ -444,11 +450,9 @@ func (s *Set) checkPerms(creds *auth.Credentials, reqPerms fs.PermMask) bool {
return s.checkCapability(creds)
}
+// destroy destroys the set. Caller must hold 's.mu'.
func (s *Set) destroy() {
- s.mu.Lock()
- defer s.mu.Unlock()
-
- // Notify all waiters. Tney will fail on the next attempt to execute
+ // Notify all waiters. They will fail on the next attempt to execute
// operations and return error.
s.dead = true
for _, s := range s.sems {