mirror of
https://github.com/zerotier/ZeroTierOne.git
synced 2025-06-02 07:20:51 +00:00
Fix deadlock-causing regression in Network.
This commit is contained in:
parent
1eeebba2f7
commit
9eaa3756f8
234
node/Network.cpp
234
node/Network.cpp
@ -886,118 +886,130 @@ uint64_t Network::handleConfigChunk(const Packet &chunk,unsigned int ptr)
|
|||||||
const unsigned int chunkLen = chunk.at<uint16_t>(ptr); ptr += 2;
|
const unsigned int chunkLen = chunk.at<uint16_t>(ptr); ptr += 2;
|
||||||
const void *chunkData = chunk.field(ptr,chunkLen); ptr += chunkLen;
|
const void *chunkData = chunk.field(ptr,chunkLen); ptr += chunkLen;
|
||||||
|
|
||||||
Mutex::Lock _l(_lock);
|
NetworkConfig *nc = (NetworkConfig *)0;
|
||||||
|
|
||||||
_IncomingConfigChunk *c = (_IncomingConfigChunk *)0;
|
|
||||||
uint64_t chunkId = 0;
|
|
||||||
uint64_t configUpdateId;
|
uint64_t configUpdateId;
|
||||||
unsigned long totalLength,chunkIndex;
|
{
|
||||||
if (ptr < chunk.size()) {
|
Mutex::Lock _l(_lock);
|
||||||
const bool fastPropagate = ((chunk[ptr++] & 0x01) != 0);
|
|
||||||
configUpdateId = chunk.at<uint64_t>(ptr); ptr += 8;
|
|
||||||
totalLength = chunk.at<uint32_t>(ptr); ptr += 4;
|
|
||||||
chunkIndex = chunk.at<uint32_t>(ptr); ptr += 4;
|
|
||||||
|
|
||||||
if (((chunkIndex + chunkLen) > totalLength)||(totalLength >= ZT_NETWORKCONFIG_DICT_CAPACITY)) { // >= since we need room for a null at the end
|
_IncomingConfigChunk *c = (_IncomingConfigChunk *)0;
|
||||||
TRACE("discarded chunk from %s: invalid length or length overflow",chunk.source().toString().c_str());
|
uint64_t chunkId = 0;
|
||||||
return 0;
|
unsigned long totalLength,chunkIndex;
|
||||||
}
|
if (ptr < chunk.size()) {
|
||||||
|
const bool fastPropagate = ((chunk[ptr++] & 0x01) != 0);
|
||||||
|
configUpdateId = chunk.at<uint64_t>(ptr); ptr += 8;
|
||||||
|
totalLength = chunk.at<uint32_t>(ptr); ptr += 4;
|
||||||
|
chunkIndex = chunk.at<uint32_t>(ptr); ptr += 4;
|
||||||
|
|
||||||
if ((chunk[ptr] != 1)||(chunk.at<uint16_t>(ptr + 1) != ZT_C25519_SIGNATURE_LEN)) {
|
if (((chunkIndex + chunkLen) > totalLength)||(totalLength >= ZT_NETWORKCONFIG_DICT_CAPACITY)) { // >= since we need room for a null at the end
|
||||||
TRACE("discarded chunk from %s: unrecognized signature type",chunk.source().toString().c_str());
|
TRACE("discarded chunk from %s: invalid length or length overflow",chunk.source().toString().c_str());
|
||||||
return 0;
|
return 0;
|
||||||
}
|
|
||||||
const uint8_t *sig = reinterpret_cast<const uint8_t *>(chunk.field(ptr + 3,ZT_C25519_SIGNATURE_LEN));
|
|
||||||
|
|
||||||
// We can use the signature, which is unique per chunk, to get a per-chunk ID for local deduplication use
|
|
||||||
for(unsigned int i=0;i<16;++i)
|
|
||||||
reinterpret_cast<uint8_t *>(&chunkId)[i & 7] ^= sig[i];
|
|
||||||
|
|
||||||
// Find existing or new slot for this update and check if this is a duplicate chunk
|
|
||||||
for(int i=0;i<ZT_NETWORK_MAX_INCOMING_UPDATES;++i) {
|
|
||||||
if (_incomingConfigChunks[i].updateId == configUpdateId) {
|
|
||||||
c = &(_incomingConfigChunks[i]);
|
|
||||||
|
|
||||||
for(unsigned long j=0;j<c->haveChunks;++j) {
|
|
||||||
if (c->haveChunkIds[j] == chunkId)
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
break;
|
|
||||||
} else if ((!c)||(_incomingConfigChunks[i].ts < c->ts)) {
|
|
||||||
c = &(_incomingConfigChunks[i]);
|
|
||||||
}
|
}
|
||||||
}
|
|
||||||
|
|
||||||
// If it's not a duplicate, check chunk signature
|
if ((chunk[ptr] != 1)||(chunk.at<uint16_t>(ptr + 1) != ZT_C25519_SIGNATURE_LEN)) {
|
||||||
const Identity controllerId(RR->topology->getIdentity(controller()));
|
TRACE("discarded chunk from %s: unrecognized signature type",chunk.source().toString().c_str());
|
||||||
if (!controllerId) { // we should always have the controller identity by now, otherwise how would we have queried it the first time?
|
return 0;
|
||||||
TRACE("unable to verify chunk from %s: don't have controller identity",chunk.source().toString().c_str());
|
}
|
||||||
return 0;
|
const uint8_t *sig = reinterpret_cast<const uint8_t *>(chunk.field(ptr + 3,ZT_C25519_SIGNATURE_LEN));
|
||||||
}
|
|
||||||
if (!controllerId.verify(chunk.field(start,ptr - start),ptr - start,sig,ZT_C25519_SIGNATURE_LEN)) {
|
|
||||||
TRACE("discarded chunk from %s: signature check failed",chunk.source().toString().c_str());
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
// New properly verified chunks can be flooded "virally" through the network
|
// We can use the signature, which is unique per chunk, to get a per-chunk ID for local deduplication use
|
||||||
if (fastPropagate) {
|
for(unsigned int i=0;i<16;++i)
|
||||||
Address *a = (Address *)0;
|
reinterpret_cast<uint8_t *>(&chunkId)[i & 7] ^= sig[i];
|
||||||
Membership *m = (Membership *)0;
|
|
||||||
Hashtable<Address,Membership>::Iterator i(_memberships);
|
// Find existing or new slot for this update and check if this is a duplicate chunk
|
||||||
while (i.next(a,m)) {
|
for(int i=0;i<ZT_NETWORK_MAX_INCOMING_UPDATES;++i) {
|
||||||
if ((*a != chunk.source())&&(*a != controller())) {
|
if (_incomingConfigChunks[i].updateId == configUpdateId) {
|
||||||
Packet outp(*a,RR->identity.address(),Packet::VERB_NETWORK_CONFIG);
|
c = &(_incomingConfigChunks[i]);
|
||||||
outp.append(reinterpret_cast<const uint8_t *>(chunk.data()) + start,chunk.size() - start);
|
|
||||||
RR->sw->send(outp,true);
|
for(unsigned long j=0;j<c->haveChunks;++j) {
|
||||||
|
if (c->haveChunkIds[j] == chunkId)
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
break;
|
||||||
|
} else if ((!c)||(_incomingConfigChunks[i].ts < c->ts)) {
|
||||||
|
c = &(_incomingConfigChunks[i]);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
|
||||||
} else if (chunk.source() == controller()) {
|
|
||||||
// Legacy support for OK(NETWORK_CONFIG_REQUEST) from older controllers
|
|
||||||
chunkId = chunk.packetId();
|
|
||||||
configUpdateId = chunkId;
|
|
||||||
totalLength = chunkLen;
|
|
||||||
chunkIndex = 0;
|
|
||||||
|
|
||||||
if (totalLength >= ZT_NETWORKCONFIG_DICT_CAPACITY)
|
// If it's not a duplicate, check chunk signature
|
||||||
|
const Identity controllerId(RR->topology->getIdentity(controller()));
|
||||||
|
if (!controllerId) { // we should always have the controller identity by now, otherwise how would we have queried it the first time?
|
||||||
|
TRACE("unable to verify chunk from %s: don't have controller identity",chunk.source().toString().c_str());
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
if (!controllerId.verify(chunk.field(start,ptr - start),ptr - start,sig,ZT_C25519_SIGNATURE_LEN)) {
|
||||||
|
TRACE("discarded chunk from %s: signature check failed",chunk.source().toString().c_str());
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
// New properly verified chunks can be flooded "virally" through the network
|
||||||
|
if (fastPropagate) {
|
||||||
|
Address *a = (Address *)0;
|
||||||
|
Membership *m = (Membership *)0;
|
||||||
|
Hashtable<Address,Membership>::Iterator i(_memberships);
|
||||||
|
while (i.next(a,m)) {
|
||||||
|
if ((*a != chunk.source())&&(*a != controller())) {
|
||||||
|
Packet outp(*a,RR->identity.address(),Packet::VERB_NETWORK_CONFIG);
|
||||||
|
outp.append(reinterpret_cast<const uint8_t *>(chunk.data()) + start,chunk.size() - start);
|
||||||
|
RR->sw->send(outp,true);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
} else if (chunk.source() == controller()) {
|
||||||
|
// Legacy support for OK(NETWORK_CONFIG_REQUEST) from older controllers
|
||||||
|
chunkId = chunk.packetId();
|
||||||
|
configUpdateId = chunkId;
|
||||||
|
totalLength = chunkLen;
|
||||||
|
chunkIndex = 0;
|
||||||
|
|
||||||
|
if (totalLength >= ZT_NETWORKCONFIG_DICT_CAPACITY)
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
for(int i=0;i<ZT_NETWORK_MAX_INCOMING_UPDATES;++i) {
|
||||||
|
if ((!c)||(_incomingConfigChunks[i].ts < c->ts))
|
||||||
|
c = &(_incomingConfigChunks[i]);
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
TRACE("discarded single-chunk unsigned legacy config: this is only allowed if the sender is the controller itself");
|
||||||
return 0;
|
return 0;
|
||||||
|
|
||||||
for(int i=0;i<ZT_NETWORK_MAX_INCOMING_UPDATES;++i) {
|
|
||||||
if ((!c)||(_incomingConfigChunks[i].ts < c->ts))
|
|
||||||
c = &(_incomingConfigChunks[i]);
|
|
||||||
}
|
}
|
||||||
} else {
|
|
||||||
TRACE("discarded single-chunk unsigned legacy config: this is only allowed if the sender is the controller itself");
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
++c->ts; // newer is higher, that's all we need
|
++c->ts; // newer is higher, that's all we need
|
||||||
|
|
||||||
if (c->updateId != configUpdateId) {
|
if (c->updateId != configUpdateId) {
|
||||||
c->updateId = configUpdateId;
|
c->updateId = configUpdateId;
|
||||||
c->haveChunks = 0;
|
c->haveChunks = 0;
|
||||||
c->haveBytes = 0;
|
c->haveBytes = 0;
|
||||||
}
|
}
|
||||||
if (c->haveChunks >= ZT_NETWORK_MAX_UPDATE_CHUNKS)
|
if (c->haveChunks >= ZT_NETWORK_MAX_UPDATE_CHUNKS)
|
||||||
return false;
|
return false;
|
||||||
c->haveChunkIds[c->haveChunks++] = chunkId;
|
c->haveChunkIds[c->haveChunks++] = chunkId;
|
||||||
|
|
||||||
memcpy(c->data.unsafeData() + chunkIndex,chunkData,chunkLen);
|
memcpy(c->data.unsafeData() + chunkIndex,chunkData,chunkLen);
|
||||||
c->haveBytes += chunkLen;
|
c->haveBytes += chunkLen;
|
||||||
|
|
||||||
if (c->haveBytes == totalLength) {
|
if (c->haveBytes == totalLength) {
|
||||||
c->data.unsafeData()[c->haveBytes] = (char)0; // ensure null terminated
|
c->data.unsafeData()[c->haveBytes] = (char)0; // ensure null terminated
|
||||||
|
|
||||||
NetworkConfig *const nc = new NetworkConfig();
|
nc = new NetworkConfig();
|
||||||
try {
|
try {
|
||||||
if (nc->fromDictionary(c->data)) {
|
if (!nc->fromDictionary(c->data)) {
|
||||||
this->_setConfiguration(*nc,true);
|
delete nc;
|
||||||
|
nc = (NetworkConfig *)0;
|
||||||
|
}
|
||||||
|
} catch ( ... ) {
|
||||||
delete nc;
|
delete nc;
|
||||||
return configUpdateId;
|
nc = (NetworkConfig *)0;
|
||||||
}
|
}
|
||||||
} catch ( ... ) {}
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (nc) {
|
||||||
|
this->_setConfiguration(*nc,true);
|
||||||
delete nc;
|
delete nc;
|
||||||
|
return configUpdateId;
|
||||||
|
} else {
|
||||||
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
@ -1027,10 +1039,9 @@ void Network::requestConfiguration()
|
|||||||
NetworkConfig *nconf = new NetworkConfig();
|
NetworkConfig *nconf = new NetworkConfig();
|
||||||
try {
|
try {
|
||||||
switch(RR->localNetworkController->doNetworkConfigRequest(InetAddress(),RR->identity,RR->identity,_id,rmd,*nconf)) {
|
switch(RR->localNetworkController->doNetworkConfigRequest(InetAddress(),RR->identity,RR->identity,_id,rmd,*nconf)) {
|
||||||
case NetworkController::NETCONF_QUERY_OK: {
|
case NetworkController::NETCONF_QUERY_OK:
|
||||||
Mutex::Lock _l(_lock);
|
|
||||||
this->_setConfiguration(*nconf,true);
|
this->_setConfiguration(*nconf,true);
|
||||||
} break;
|
break;
|
||||||
case NetworkController::NETCONF_QUERY_OBJECT_NOT_FOUND:
|
case NetworkController::NETCONF_QUERY_OBJECT_NOT_FOUND:
|
||||||
this->setNotFound();
|
this->setNotFound();
|
||||||
break;
|
break;
|
||||||
@ -1238,7 +1249,7 @@ ZT_VirtualNetworkStatus Network::_status() const
|
|||||||
|
|
||||||
int Network::_setConfiguration(const NetworkConfig &nconf,bool saveToDisk)
|
int Network::_setConfiguration(const NetworkConfig &nconf,bool saveToDisk)
|
||||||
{
|
{
|
||||||
// assumes _lock is locked
|
// _lock is NOT locked when this is called
|
||||||
try {
|
try {
|
||||||
if ((nconf.issuedTo != RR->identity.address())||(nconf.networkId != _id))
|
if ((nconf.issuedTo != RR->identity.address())||(nconf.networkId != _id))
|
||||||
return 0;
|
return 0;
|
||||||
@ -1246,20 +1257,27 @@ int Network::_setConfiguration(const NetworkConfig &nconf,bool saveToDisk)
|
|||||||
return 1; // OK config, but duplicate of what we already have
|
return 1; // OK config, but duplicate of what we already have
|
||||||
|
|
||||||
ZT_VirtualNetworkConfig ctmp;
|
ZT_VirtualNetworkConfig ctmp;
|
||||||
_config = nconf;
|
bool oldPortInitialized;
|
||||||
_lastConfigUpdate = RR->node->now();
|
{
|
||||||
_netconfFailure = NETCONF_FAILURE_NONE;
|
Mutex::Lock _l(_lock);
|
||||||
_externalConfig(&ctmp);
|
_config = nconf;
|
||||||
const bool oldPortInitialized = _portInitialized;
|
_lastConfigUpdate = RR->node->now();
|
||||||
_portInitialized = true;
|
_netconfFailure = NETCONF_FAILURE_NONE;
|
||||||
|
oldPortInitialized = _portInitialized;
|
||||||
|
_portInitialized = true;
|
||||||
|
_externalConfig(&ctmp);
|
||||||
|
}
|
||||||
_portError = RR->node->configureVirtualNetworkPort(_id,&_uPtr,(oldPortInitialized) ? ZT_VIRTUAL_NETWORK_CONFIG_OPERATION_CONFIG_UPDATE : ZT_VIRTUAL_NETWORK_CONFIG_OPERATION_UP,&ctmp);
|
_portError = RR->node->configureVirtualNetworkPort(_id,&_uPtr,(oldPortInitialized) ? ZT_VIRTUAL_NETWORK_CONFIG_OPERATION_CONFIG_UPDATE : ZT_VIRTUAL_NETWORK_CONFIG_OPERATION_UP,&ctmp);
|
||||||
|
|
||||||
if (saveToDisk) {
|
if (saveToDisk) {
|
||||||
char n[64];
|
Dictionary<ZT_NETWORKCONFIG_DICT_CAPACITY> *d = new Dictionary<ZT_NETWORKCONFIG_DICT_CAPACITY>();
|
||||||
Utils::snprintf(n,sizeof(n),"networks.d/%.16llx.conf",_id);
|
try {
|
||||||
Dictionary<ZT_NETWORKCONFIG_DICT_CAPACITY> d;
|
char n[64];
|
||||||
if (nconf.toDictionary(d,false))
|
Utils::snprintf(n,sizeof(n),"networks.d/%.16llx.conf",_id);
|
||||||
RR->node->dataStorePut(n,(const void *)d.data(),d.sizeBytes(),true);
|
if (nconf.toDictionary(*d,false))
|
||||||
|
RR->node->dataStorePut(n,(const void *)d->data(),d->sizeBytes(),true);
|
||||||
|
} catch ( ... ) {}
|
||||||
|
delete d;
|
||||||
}
|
}
|
||||||
|
|
||||||
return 2; // OK and configuration has changed
|
return 2; // OK and configuration has changed
|
||||||
|
Loading…
x
Reference in New Issue
Block a user