summaryrefslogtreecommitdiff
path: root/libpod/runtime_ctr.go
diff options
context:
space:
mode:
authorMatthew Heon <matthew.heon@pm.me>2020-11-11 15:57:06 -0500
committerMatthew Heon <matthew.heon@pm.me>2020-11-11 16:06:03 -0500
commit0f637e09da85b2aaefa279cfb571b004a2cc6d59 (patch)
treeb9fcdd548ba1b0064c204fb49d450ac069a776aa /libpod/runtime_ctr.go
parentdc58d4e2858bf6688a775277adf8f775afc30e73 (diff)
downloadpodman-0f637e09da85b2aaefa279cfb571b004a2cc6d59.tar.gz
podman-0f637e09da85b2aaefa279cfb571b004a2cc6d59.tar.bz2
podman-0f637e09da85b2aaefa279cfb571b004a2cc6d59.zip
Ensure we do not double-lock the same volume in create
When making containers, we want to lock all named volumes we are adding the container to, to ensure they aren't removed from under us while we are working. Unfortunately, this code did not account for a container having the same volume mounted in multiple places so it could deadlock. Add a map to ensure that we don't lock the same name more than once to resolve this. Fixes #8221 Signed-off-by: Matthew Heon <matthew.heon@pm.me>
Diffstat (limited to 'libpod/runtime_ctr.go')
-rw-r--r--libpod/runtime_ctr.go7
1 files changed, 7 insertions, 0 deletions
diff --git a/libpod/runtime_ctr.go b/libpod/runtime_ctr.go
index c84268889..14b537ca2 100644
--- a/libpod/runtime_ctr.go
+++ b/libpod/runtime_ctr.go
@@ -345,8 +345,15 @@ func (r *Runtime) setupContainer(ctx context.Context, ctr *Container) (_ *Contai
// Lock all named volumes we are adding ourself to, to ensure we can't
// use a volume being removed.
+ volsLocked := make(map[string]bool)
for _, namedVol := range ctrNamedVolumes {
toLock := namedVol
+ // Ensure that we don't double-lock a named volume that is used
+ // more than once.
+ if volsLocked[namedVol.Name()] {
+ continue
+ }
+ volsLocked[namedVol.Name()] = true
toLock.lock.Lock()
defer toLock.lock.Unlock()
}