From: Emeric Brun Date: Tue, 10 May 2022 09:35:48 +0000 (+0200) Subject: BUG/MAJOR: dns: multi-thread concurrency issue on UDP socket X-Git-Tag: v2.6-dev10~62 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=314e6ec8224e3636d019502286ec46ab418a6e9b;p=thirdparty%2Fhaproxy.git BUG/MAJOR: dns: multi-thread concurrency issue on UDP socket This patch adds a lock on the struct dgram_conn to ensure that an other thread cannot trash a fd or alter its status while the current thread processing it on for send/receive/connect operations. Starting with the 2.4 version this could cause a crash when a DNS request is failing, setting the FD of the dgram structure to -1. If the dgram structure is reused after that, a read access to fdtab[-1] is attempted. The crash was only triggered when compiled with ASAN. In previous versions the concurrency issue also exists but is less likely to crash. This patch must be backported until v2.4 and should be adapt for v < 2.4. --- diff --git a/include/haproxy/dgram-t.h b/include/haproxy/dgram-t.h index 1a6f4c83a9..4e4c2afef5 100644 --- a/include/haproxy/dgram-t.h +++ b/include/haproxy/dgram-t.h @@ -28,6 +28,7 @@ * datagram related structure */ struct dgram_conn { + __decl_thread(HA_SPINLOCK_T lock); const struct dgram_data_cb *data; /* data layer callbacks. Must be set before */ void *owner; /* pointer to upper layer's entity */ union { /* definitions which depend on connection type */ diff --git a/src/dns.c b/src/dns.c index 9251bec3a2..712cc564eb 100644 --- a/src/dns.c +++ b/src/dns.c @@ -90,11 +90,15 @@ int dns_send_nameserver(struct dns_nameserver *ns, void *buf, size_t len) if (ns->dgram) { struct dgram_conn *dgram = &ns->dgram->conn; - int fd = dgram->t.sock.fd; + int fd; - if (dgram->t.sock.fd == -1) { - if (dns_connect_nameserver(ns) == -1) + HA_SPIN_LOCK(DNS_LOCK, &dgram->lock); + fd = dgram->t.sock.fd; + if (fd == -1) { + if (dns_connect_nameserver(ns) == -1) { + HA_SPIN_UNLOCK(DNS_LOCK, &dgram->lock); return -1; + } fd = dgram->t.sock.fd; } @@ -107,17 +111,21 @@ int dns_send_nameserver(struct dns_nameserver *ns, void *buf, size_t len) ret = ring_write(ns->dgram->ring_req, DNS_TCP_MSG_MAX_SIZE, NULL, 0, &myist, 1); if (!ret) { ns->counters->snd_error++; + HA_SPIN_UNLOCK(DNS_LOCK, &dgram->lock); return -1; } fd_cant_send(fd); + HA_SPIN_UNLOCK(DNS_LOCK, &dgram->lock); return ret; } ns->counters->snd_error++; fd_delete(fd); dgram->t.sock.fd = -1; + HA_SPIN_UNLOCK(DNS_LOCK, &dgram->lock); return -1; } ns->counters->sent++; + HA_SPIN_UNLOCK(DNS_LOCK, &dgram->lock); } else if (ns->stream) { struct ist myist; @@ -148,20 +156,27 @@ ssize_t dns_recv_nameserver(struct dns_nameserver *ns, void *data, size_t size) if (ns->dgram) { struct dgram_conn *dgram = &ns->dgram->conn; - int fd = dgram->t.sock.fd; + int fd; - if (fd == -1) + HA_SPIN_LOCK(DNS_LOCK, &dgram->lock); + fd = dgram->t.sock.fd; + if (fd == -1) { + HA_SPIN_UNLOCK(DNS_LOCK, &dgram->lock); return -1; + } if ((ret = recv(fd, data, size, 0)) < 0) { if (errno == EAGAIN || errno == EWOULDBLOCK) { fd_cant_recv(fd); + HA_SPIN_UNLOCK(DNS_LOCK, &dgram->lock); return 0; } fd_delete(fd); dgram->t.sock.fd = -1; + HA_SPIN_UNLOCK(DNS_LOCK, &dgram->lock); return -1; } + HA_SPIN_UNLOCK(DNS_LOCK, &dgram->lock); } else if (ns->stream) { struct dns_stream_server *dss = ns->stream; @@ -247,19 +262,26 @@ static void dns_resolve_recv(struct dgram_conn *dgram) struct dns_nameserver *ns; int fd; + HA_SPIN_LOCK(DNS_LOCK, &dgram->lock); + fd = dgram->t.sock.fd; /* check if ready for reading */ - if (!fd_recv_ready(fd)) + if ((fd == -1) || !fd_recv_ready(fd)) { + HA_SPIN_UNLOCK(DNS_LOCK, &dgram->lock); return; + } /* no need to go further if we can't retrieve the nameserver */ if ((ns = dgram->owner) == NULL) { _HA_ATOMIC_AND(&fdtab[fd].state, ~(FD_POLL_HUP|FD_POLL_ERR)); fd_stop_recv(fd); + HA_SPIN_UNLOCK(DNS_LOCK, &dgram->lock); return; } + HA_SPIN_UNLOCK(DNS_LOCK, &dgram->lock); + ns->process_responses(ns); } @@ -273,16 +295,21 @@ static void dns_resolve_send(struct dgram_conn *dgram) uint64_t msg_len; size_t len, cnt, ofs; + HA_SPIN_LOCK(DNS_LOCK, &dgram->lock); + fd = dgram->t.sock.fd; /* check if ready for sending */ - if (!fd_send_ready(fd)) + if ((fd == -1) || !fd_send_ready(fd)) { + HA_SPIN_UNLOCK(DNS_LOCK, &dgram->lock); return; + } /* no need to go further if we can't retrieve the nameserver */ if ((ns = dgram->owner) == NULL) { _HA_ATOMIC_AND(&fdtab[fd].state, ~(FD_POLL_HUP|FD_POLL_ERR)); fd_stop_send(fd); + HA_SPIN_UNLOCK(DNS_LOCK, &dgram->lock); return; } @@ -356,6 +383,7 @@ out: ofs += ring->ofs; ns->dgram->ofs_req = ofs; HA_RWLOCK_RDUNLOCK(DNS_LOCK, &ring->lock); + HA_SPIN_UNLOCK(DNS_LOCK, &dgram->lock); } @@ -378,6 +406,7 @@ int dns_dgram_init(struct dns_nameserver *ns, struct sockaddr_storage *sk) dgram->conn.data = &dns_dgram_cb; dgram->conn.t.sock.fd = -1; dgram->conn.addr.to = *sk; + HA_SPIN_INIT(&dgram->conn.lock); ns->dgram = dgram; dgram->ofs_req = ~0; /* init ring offset */