Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

waddrmgr: fix deadlock #967

Merged
merged 3 commits into from
Nov 27, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
70 changes: 25 additions & 45 deletions waddrmgr/manager.go
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,7 @@ import (
"crypto/sha512"
"fmt"
"sync"
"sync/atomic"
"time"

"github.com/btcsuite/btcd/btcutil"
Expand Down Expand Up @@ -345,9 +346,9 @@ type Manager struct {
internalAddrSchemas map[AddressType][]KeyScope

syncState syncState
watchingOnly bool
watchingOnly atomic.Bool
birthday time.Time
locked bool
locked atomic.Bool
closed bool
chainParams *chaincfg.Params

Expand Down Expand Up @@ -392,18 +393,7 @@ type Manager struct {
// WatchOnly returns true if the root manager is in watch only mode, and false
// otherwise.
func (m *Manager) WatchOnly() bool {
m.mtx.RLock()
defer m.mtx.RUnlock()

return m.watchOnly()
}

// watchOnly returns true if the root manager is in watch only mode, and false
// otherwise.
//
// NOTE: This method requires the Manager's lock to be held.
func (m *Manager) watchOnly() bool {
return m.watchingOnly
return m.watchingOnly.Load()
}

// IsWatchOnlyAccount determines if the account with the given key scope is set
Expand Down Expand Up @@ -469,7 +459,7 @@ func (m *Manager) lock() {
// which uses a separate derived key from the database even when it is
// locked.

m.locked = true
m.locked.Store(true)
}

// Close cleanly shuts down the manager. It makes a best try effort to remove
Expand All @@ -489,7 +479,7 @@ func (m *Manager) Close() {
}

// Attempt to clear private key material from memory.
if !m.watchingOnly && !m.locked {
if !m.WatchOnly() && !m.IsLocked() {
m.lock()
}

Expand Down Expand Up @@ -517,10 +507,10 @@ func (m *Manager) NewScopedKeyManager(ns walletdb.ReadWriteBucket,
defer m.mtx.Unlock()

var rootPriv *hdkeychain.ExtendedKey
if !m.watchingOnly {
if !m.WatchOnly() {
// If the manager is locked, then we can't create a new scoped
// manager.
if m.locked {
if m.IsLocked() {
return nil, managerError(ErrLocked, errLocked, nil)
}

Expand Down Expand Up @@ -588,7 +578,7 @@ func (m *Manager) NewScopedKeyManager(ns walletdb.ReadWriteBucket,
return nil, err
}

if !m.watchingOnly {
if !m.WatchOnly() {
// With the database state created, we'll now derive the
// cointype key using the master HD private key, then encrypt
// it along with the first account using our crypto keys.
Expand Down Expand Up @@ -888,7 +878,7 @@ func (m *Manager) ChangePassphrase(ns walletdb.ReadWriteBucket, oldPassphrase,
newPassphrase []byte, private bool, config *ScryptOptions) error {

// No private passphrase to change for a watching-only address manager.
if private && m.watchingOnly {
if private && m.WatchOnly() {
return managerError(ErrWatchingOnly, errWatchingOnly, nil)
}

Expand Down Expand Up @@ -979,7 +969,7 @@ func (m *Manager) ChangePassphrase(ns walletdb.ReadWriteBucket, oldPassphrase,
// If unlocked, create the new passphrase hash with the new
// passphrase and salt.
var hashedPassphrase [sha512.Size]byte
if m.locked {
if m.IsLocked() {
newMasterKey.Zero()
} else {
saltedPassphrase := append(passphraseSalt[:],
Expand Down Expand Up @@ -1053,7 +1043,7 @@ func (m *Manager) ConvertToWatchingOnly(ns walletdb.ReadWriteBucket) error {
defer m.mtx.Unlock()

// Exit now if the manager is already watching-only.
if m.watchingOnly {
if m.WatchOnly() {
return nil
}

Expand All @@ -1072,7 +1062,7 @@ func (m *Manager) ConvertToWatchingOnly(ns walletdb.ReadWriteBucket) error {

// Lock the manager to remove all clear text private key material from
// memory if needed.
if !m.locked {
if !m.IsLocked() {
m.lock()
}

Expand Down Expand Up @@ -1118,7 +1108,7 @@ func (m *Manager) ConvertToWatchingOnly(ns walletdb.ReadWriteBucket) error {
m.masterKeyPriv = nil

// Mark the manager watching-only.
m.watchingOnly = true
m.watchingOnly.Store(true)
return nil

}
Expand All @@ -1127,19 +1117,7 @@ func (m *Manager) ConvertToWatchingOnly(ns walletdb.ReadWriteBucket) error {
// unlocked, the decryption key needed to decrypt private keys used for signing
// is in memory.
func (m *Manager) IsLocked() bool {
m.mtx.RLock()
defer m.mtx.RUnlock()

return m.isLocked()
}

// isLocked is an internal method returning whether or not the address manager
// is locked via an unprotected read.
//
// NOTE: The caller *MUST* acquire the Manager's mutex before invocation to
// avoid data races.
func (m *Manager) isLocked() bool {
return m.locked
return m.locked.Load()
}

// Lock performs a best try effort to remove and zero all secret keys associated
Expand All @@ -1149,15 +1127,15 @@ func (m *Manager) isLocked() bool {
// manager.
func (m *Manager) Lock() error {
// A watching-only address manager can't be locked.
if m.watchingOnly {
if m.WatchOnly() {
return managerError(ErrWatchingOnly, errWatchingOnly, nil)
}

m.mtx.Lock()
defer m.mtx.Unlock()

// Error on attempt to lock an already locked manager.
if m.locked {
if m.IsLocked() {
return managerError(ErrLocked, errLocked, nil)
}

Expand All @@ -1175,7 +1153,7 @@ func (m *Manager) Lock() error {
// manager.
func (m *Manager) Unlock(ns walletdb.ReadBucket, passphrase []byte) error {
// A watching-only address manager can't be unlocked.
if m.watchingOnly {
if m.WatchOnly() {
return managerError(ErrWatchingOnly, errWatchingOnly, nil)
}

Expand All @@ -1184,7 +1162,7 @@ func (m *Manager) Unlock(ns walletdb.ReadBucket, passphrase []byte) error {

// Avoid actually unlocking if the manager is already unlocked
// and the passphrases match.
if !m.locked {
if !m.IsLocked() {
saltedPassphrase := append(m.privPassphraseSalt[:],
passphrase...)
hashedPassphrase := sha512.Sum512(saltedPassphrase)
Expand Down Expand Up @@ -1283,7 +1261,7 @@ func (m *Manager) Unlock(ns walletdb.ReadBucket, passphrase []byte) error {
}
}

m.locked = false
m.locked.Store(false)
saltedPassphrase := append(m.privPassphraseSalt[:], passphrase...)
m.hashedPrivPassphrase = sha512.Sum512(saltedPassphrase)
zero.Bytes(saltedPassphrase)
Expand Down Expand Up @@ -1330,7 +1308,7 @@ func (m *Manager) LookupAccount(ns walletdb.ReadBucket, name string) (KeyScope,
func (m *Manager) selectCryptoKey(keyType CryptoKeyType) (EncryptorDecryptor, error) {
if keyType == CKTPrivate || keyType == CKTScript {
// The manager must be unlocked to work with the private keys.
if m.locked || m.watchingOnly {
if m.IsLocked() || m.WatchOnly() {
return nil, managerError(ErrLocked, errLocked, nil)
}
}
Expand Down Expand Up @@ -1399,7 +1377,6 @@ func newManager(chainParams *chaincfg.Params, masterKeyPub *snacl.SecretKey,
m := &Manager{
chainParams: chainParams,
syncState: *syncInfo,
locked: true,
birthday: birthday,
masterKeyPub: masterKeyPub,
masterKeyPriv: masterKeyPriv,
Expand All @@ -1412,9 +1389,12 @@ func newManager(chainParams *chaincfg.Params, masterKeyPub *snacl.SecretKey,
scopedManagers: scopedManagers,
externalAddrSchemas: make(map[AddressType][]KeyScope),
internalAddrSchemas: make(map[AddressType][]KeyScope),
watchingOnly: watchingOnly,
}

// Store the atomic.Bool values for the manager.
m.watchingOnly.Store(watchingOnly)
m.locked.Store(true)

for _, sMgr := range m.scopedManagers {
externalType := sMgr.AddrSchema().ExternalAddrType
internalType := sMgr.AddrSchema().InternalAddrType
Expand Down
8 changes: 8 additions & 0 deletions waddrmgr/manager_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -2439,6 +2439,14 @@ func TestScopedKeyManagerManagement(t *testing.T) {
err = walletdb.Update(db, func(tx walletdb.ReadWriteTx) error {
ns := tx.ReadWriteBucket(waddrmgrNamespaceKey)

// For this test, since we've fetched the scoped key manager,
// we want to check that this runs correctly while the root
// manager is locked for another task. This will be possible
// with Postgres-backed wallets having multiple connections to
// the database backend, executing transactions in parallel.
mgr.mtx.Lock()
defer mgr.mtx.Unlock()

// We'll now create a new external address to ensure we
// retrieve the proper type.
externalAddr, err = scopedMgr.NextExternalAddresses(
Expand Down
10 changes: 4 additions & 6 deletions waddrmgr/scoped_manager.go
Original file line number Diff line number Diff line change
Expand Up @@ -447,8 +447,8 @@ func (s *ScopedKeyManager) loadAccountInfo(ns walletdb.ReadBucket,

// The wallet will only contain private keys for default accounts if the
// wallet's not set up as watch-only and it's been unlocked.
watchOnly := s.rootManager.watchOnly()
hasPrivateKey := !s.rootManager.isLocked() && !watchOnly
watchOnly := s.rootManager.WatchOnly()
hasPrivateKey := !s.rootManager.IsLocked() && !watchOnly

// Create the new account info with the known information. The rest of
// the fields are filled out below.
Expand Down Expand Up @@ -775,9 +775,7 @@ func (s *ScopedKeyManager) deriveKeyFromPath(ns walletdb.ReadBucket,
func (s *ScopedKeyManager) chainAddressRowToManaged(ns walletdb.ReadBucket,
row *dbChainAddressRow) (ManagedAddress, error) {

// Since the manger's mutex is assumed to held when invoking this
aakselrod marked this conversation as resolved.
Show resolved Hide resolved
// function, we use the internal isLocked to avoid a deadlock.
private := !s.rootManager.isLocked() && !s.rootManager.watchOnly()
private := !s.rootManager.IsLocked() && !s.rootManager.WatchOnly()

addressKey, acctKey, masterKeyFingerprint, err := s.deriveKeyFromPath(
ns, row.account, row.branch, row.index, private,
Expand Down Expand Up @@ -1203,7 +1201,7 @@ func (s *ScopedKeyManager) nextAddresses(ns walletdb.ReadWriteBucket,
// Add the new managed address to the list of addresses
// that need their private keys derived when the
// address manager is next unlocked.
if s.rootManager.isLocked() && !watchOnly {
if s.rootManager.IsLocked() && !watchOnly {
s.deriveOnUnlock = append(s.deriveOnUnlock, info)
}
}
Expand Down
Loading