[tor-commits] [tor/maint-0.2.6] Avoid crashing on busy/NEWNYM+hidden service clients
nickm at torproject.org
nickm at torproject.org
Thu Jun 25 15:14:47 UTC 2015
commit 68eaaed7982b63abedfcfba33f7e2656c68e3e4a
Author: Nick Mathewson <nickm at torproject.org>
Date: Thu Jun 25 11:10:43 2015 -0400
Avoid crashing on busy/NEWNYM+hidden service clients
When we ran out of intro points for a hidden service (which could
happen on a newnym), we would change the connection's state back to
"waiting for hidden service descriptor." But this would make an
assertion fail if we went on to call circuit_get_open_circ_or_launch
again.
This fixes bug 16013; I believe the bug was introduced in
38be533c69417aacf28cedec1c3bae808ce29f4, where we made it possible for
circuit_get_open_circ_or_launch() to change the connection's state.
---
changes/bug16013 | 5 +++++
src/or/circuituse.c | 12 ++++++++++++
2 files changed, 17 insertions(+)
diff --git a/changes/bug16013 b/changes/bug16013
new file mode 100644
index 0000000..d194c60
--- /dev/null
+++ b/changes/bug16013
@@ -0,0 +1,5 @@
+ o Major bugfixes (hidden service, stability):
+ - Stop randomly crashing with an assertion failure when connecting to a
+ busy hidden service, or connecting to a hidden service while a NEWNYM
+ is in progress. Fixes bug 16013; bugfix on 0.1.0.1-rc.
+
diff --git a/src/or/circuituse.c b/src/or/circuituse.c
index 714754a..75cd4fe 100644
--- a/src/or/circuituse.c
+++ b/src/or/circuituse.c
@@ -2346,6 +2346,18 @@ connection_ap_handshake_attach_circuit(entry_connection_t *conn)
return 1;
}
+ /* At this point we need to re-check the state, since it's possible that
+ * our call to circuit_get_open_circ_or_launch() changed the connection's
+ * state from "CIRCUIT_WAIT" to "RENDDESC_WAIT" because we decided to
+ * re-fetch the descriptor.
+ */
+ if (ENTRY_TO_CONN(conn)->state != AP_CONN_STATE_CIRCUIT_WAIT) {
+ log_info(LD_REND, "This connection is no longer ready to attach; its "
+ "state changed."
+ "(We probably have to re-fetch its descriptor.)");
+ return 0;
+ }
+
if (rendcirc && (rendcirc->base_.purpose ==
CIRCUIT_PURPOSE_C_REND_READY_INTRO_ACKED)) {
log_info(LD_REND,
More information about the tor-commits
mailing list