You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Jun 20, 2024. It is now read-only.
Fixed inconsistency and also potential data race in weave/vendor/github.com/gogo/protobuf/proto/table_unmarshal.go:
u.reqFields is read/written 4 times in weave/vendor/github.com/gogo/protobuf/proto/table_unmarshal.go; 3 out of 4 times it is protected by u.lock; 1 out of 4 times it is read without a Lock, which is in func unmarshal() on L260.
A data race may happen when unmarshal() and other func computeUnmarshalInfo() are called in parallel.
In order to avoid potential data race here, I use u.lock.RLock(); defer u.lock.RUnlock() to make sure that all usages of items is in critical section.
The text was updated successfully, but these errors were encountered:
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Fixed inconsistency and also potential data race in weave/vendor/github.com/gogo/protobuf/proto/table_unmarshal.go:
u.reqFields is read/written 4 times in weave/vendor/github.com/gogo/protobuf/proto/table_unmarshal.go; 3 out of 4 times it is protected by u.lock; 1 out of 4 times it is read without a Lock, which is in func unmarshal() on L260.
A data race may happen when unmarshal() and other func computeUnmarshalInfo() are called in parallel.
In order to avoid potential data race here, I use u.lock.RLock(); defer u.lock.RUnlock() to make sure that all usages of items is in critical section.
The text was updated successfully, but these errors were encountered: