[release-branch.go1.9] database/sql: prevent race in driver by locking dc in Next

Database drivers should be called from a single goroutine to ease
driver's design. If a driver chooses to handle context
cancels internally it may do so.

The sql package violated this agreement when calling Next or
NextResultSet. It was possible for a concurrent rollback
triggered from a context cancel to call a Tx.Rollback (which
takes a driver connection lock) while a Rows.Next is in progress
(which does not tack the driver connection lock).

The current internal design of the sql package is each call takes
roughly two locks: a closemu lock which prevents an disposing of
internal resources (assigning nil or removing from lists)
and a driver connection lock that prevents calling driver code from
multiple goroutines.

Fixes #21117

Change-Id: Ie340dc752a503089c27f57ffd43e191534829360
Reviewed-on: https://go-review.googlesource.com/65731
Reviewed-by: Ian Lance Taylor <iant@golang.org>
Reviewed-on: https://go-review.googlesource.com/71510
Run-TryBot: Russ Cox <rsc@golang.org>
TryBot-Result: Gobot Gobot <gobot@golang.org>
Reviewed-by: Daniel Theophanes <kardianos@gmail.com>
This commit is contained in:
Daniel Theophanes 2017-09-23 15:30:46 -07:00 committed by Russ Cox
parent 7e7cb30475
commit fd17253587
3 changed files with 20 additions and 1 deletions

View file

@ -943,6 +943,7 @@ type rowsCursor struct {
} }
func (rc *rowsCursor) touchMem() { func (rc *rowsCursor) touchMem() {
rc.parentMem.touchMem()
rc.line++ rc.line++
} }

View file

@ -2454,6 +2454,12 @@ func (rs *Rows) nextLocked() (doClose, ok bool) {
if rs.lastcols == nil { if rs.lastcols == nil {
rs.lastcols = make([]driver.Value, len(rs.rowsi.Columns())) rs.lastcols = make([]driver.Value, len(rs.rowsi.Columns()))
} }
// Lock the driver connection before calling the driver interface
// rowsi to prevent a Tx from rolling back the connection at the same time.
rs.dc.Lock()
defer rs.dc.Unlock()
rs.lasterr = rs.rowsi.Next(rs.lastcols) rs.lasterr = rs.rowsi.Next(rs.lastcols)
if rs.lasterr != nil { if rs.lasterr != nil {
// Close the connection if there is a driver error. // Close the connection if there is a driver error.
@ -2503,6 +2509,12 @@ func (rs *Rows) NextResultSet() bool {
doClose = true doClose = true
return false return false
} }
// Lock the driver connection before calling the driver interface
// rowsi to prevent a Tx from rolling back the connection at the same time.
rs.dc.Lock()
defer rs.dc.Unlock()
rs.lasterr = nextResultSet.NextResultSet() rs.lasterr = nextResultSet.NextResultSet()
if rs.lasterr != nil { if rs.lasterr != nil {
doClose = true doClose = true

View file

@ -3106,6 +3106,9 @@ func TestIssue6081(t *testing.T) {
// In the test, a context is canceled while the query is in process so // In the test, a context is canceled while the query is in process so
// the internal rollback will run concurrently with the explicitly called // the internal rollback will run concurrently with the explicitly called
// Tx.Rollback. // Tx.Rollback.
//
// The addition of calling rows.Next also tests
// Issue 21117.
func TestIssue18429(t *testing.T) { func TestIssue18429(t *testing.T) {
db := newTestDB(t, "people") db := newTestDB(t, "people")
defer closeDB(t, db) defer closeDB(t, db)
@ -3116,7 +3119,7 @@ func TestIssue18429(t *testing.T) {
const milliWait = 30 const milliWait = 30
for i := 0; i < 100; i++ { for i := 0; i < 1000; i++ {
sem <- true sem <- true
wg.Add(1) wg.Add(1)
go func() { go func() {
@ -3138,6 +3141,9 @@ func TestIssue18429(t *testing.T) {
// reported. // reported.
rows, _ := tx.QueryContext(ctx, "WAIT|"+qwait+"|SELECT|people|name|") rows, _ := tx.QueryContext(ctx, "WAIT|"+qwait+"|SELECT|people|name|")
if rows != nil { if rows != nil {
// Call Next to test Issue 21117 and check for races.
for rows.Next() {
}
rows.Close() rows.Close()
} }
// This call will race with the context cancel rollback to complete // This call will race with the context cancel rollback to complete