Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Prevent returning disposed HTTP/1.1 connections to the pool #112383

Merged
merged 2 commits into from
Feb 11, 2025

Conversation

antonfirsov
Copy link
Member

@antonfirsov antonfirsov commented Feb 10, 2025

Fixes #31254
Fixes #110577

There are race conditions in HTTP 1.1 response stream reading methods that may prevent the exceptional termination of those methods despite cancellation callbacks firing and disposing the connection, see the discussion starting with #31254 (comment).

As a result, these methods may call CompleteResponse returning the disposed connection to the pool.

This is a minimal fix for the mentioned issue, but I agree with @MihaZupan that we should rework the HTTP/1.1 cancellation, making sure to forward the CancellationTokens down to the underlying stream instead of relying on CancellationTokenRegistration + Dispose. In case we take this PR, I'm planning to open a new issue to track that work.

@antonfirsov
Copy link
Member Author

/azp run runtime-libraries stress-http

Copy link

Azure Pipelines successfully started running 1 pipeline(s).

Copy link
Member

@MihaZupan MihaZupan left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks

// leading to an actual cancellation of the response reading methods by an OperationCanceledException.
// To guard against these cases, it is necessary to check if the connection is disposed before
// attempting to return it to the pool.
if (!_inUse && !_disposed)
{
ReturnConnectionToPool();
Copy link
Member

@MihaZupan MihaZupan Feb 11, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Might be worth adding a Debug.Assert(!_disposed) in ReturnConnectionToPool.
(this issue may also be a +1 on #100339, specifically having a debug configuration run)

@antonfirsov
Copy link
Member Author

/azp run runtime-libraries-coreclr outerloop

Copy link

Azure Pipelines successfully started running 1 pipeline(s).

@antonfirsov
Copy link
Member Author

CI failures are unrelated.

@antonfirsov antonfirsov merged commit b0ad53e into dotnet:main Feb 11, 2025
81 of 93 checks passed
grendello added a commit to grendello/runtime that referenced this pull request Feb 12, 2025
* main:
  [Android] Run CoreCLR functional tests on Android (dotnet#112283)
  [LoongArch64] Fix some assertion failures for Debug ILC building Debug NativeAOT testcases. (dotnet#112229)
  Fix suspicious code fragments (dotnet#112384)
  `__ComObject` doesn't support dynamic interface map (dotnet#112375)
  Native DLLs: only load imported DLLs from System32 (dotnet#112359)
  [main] Update dependencies from dotnet/roslyn (dotnet#112314)
  Update SVE instructions that writes to GC regs (dotnet#112389)
  Bring up android+coreclr windows build.  (dotnet#112256)
  Never use heap for return buffers (dotnet#112060)
  Wait to complete the test before releasing the agile reference. (dotnet#112387)
  Prevent returning disposed HTTP/1.1 connections to the pool (dotnet#112383)
  Fingerprint dotnet.js if writing import map to html is enabled (dotnet#112407)
  Remove duplicate definition of CORECLR_HOSTING_API_LINKAGE (dotnet#112096)
  Update the exception message to reflect current behavior. (dotnet#112355)
  Use enum for frametype not v table (dotnet#112166)
  Enable AltJits build for LoongArch64 and RiscV64 (dotnet#110282)
  Guard members of MonoType union & fix related bugs (dotnet#111645)
  Add optional hooks for debugging OpenSSL memory allocations (dotnet#111539)
  JIT: Optimize struct parameter register accesses in the backend (dotnet#110819)
  NativeAOT: Cover more opcodes in type preinitializer (dotnet#112073)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

ObjectDisposedException in HTTP/1.1 Stress Cannot access a disposed object. Object name: 'SslStream'.
3 participants