mirror of
https://github.com/lwip-tcpip/lwip.git
synced 2024-09-13 02:05:43 +00:00
LWIP_NETCONN_FULLDUPLEX: prevent taking recursive sys arch lock
Calling SYS_ARCH_PROTECT() could happen twice in 'free_socket()' if that free was executed delayed (e.g. in 'done_socket_locked()'). Signed-off-by: goldsimon <goldsimon@gmx.de>
This commit is contained in:
parent
b1fe8cf4b8
commit
1090e9cdec
@ -297,7 +297,8 @@ static void lwip_setsockopt_callback(void *arg);
|
|||||||
#endif
|
#endif
|
||||||
static int lwip_getsockopt_impl(int s, int level, int optname, void *optval, socklen_t *optlen);
|
static int lwip_getsockopt_impl(int s, int level, int optname, void *optval, socklen_t *optlen);
|
||||||
static int lwip_setsockopt_impl(int s, int level, int optname, const void *optval, socklen_t optlen);
|
static int lwip_setsockopt_impl(int s, int level, int optname, const void *optval, socklen_t optlen);
|
||||||
static void free_socket(struct lwip_sock *sock, int is_tcp);
|
static int free_socket_locked(struct lwip_sock *sock, int is_tcp, union lwip_sock_lastdata *lastdata);
|
||||||
|
static void free_socket_free_elements(int is_tcp, union lwip_sock_lastdata *lastdata);
|
||||||
|
|
||||||
#if LWIP_IPV4 && LWIP_IPV6
|
#if LWIP_IPV4 && LWIP_IPV6
|
||||||
static void
|
static void
|
||||||
@ -329,27 +330,41 @@ lwip_socket_thread_cleanup(void)
|
|||||||
|
|
||||||
#if LWIP_NETCONN_FULLDUPLEX
|
#if LWIP_NETCONN_FULLDUPLEX
|
||||||
/* Thread-safe increment of sock->fd_used, with overflow check */
|
/* Thread-safe increment of sock->fd_used, with overflow check */
|
||||||
static void
|
static int
|
||||||
sock_inc_used(struct lwip_sock *sock)
|
sock_inc_used(struct lwip_sock *sock)
|
||||||
{
|
{
|
||||||
|
int ret;
|
||||||
SYS_ARCH_DECL_PROTECT(lev);
|
SYS_ARCH_DECL_PROTECT(lev);
|
||||||
|
|
||||||
LWIP_ASSERT("sock != NULL", sock != NULL);
|
LWIP_ASSERT("sock != NULL", sock != NULL);
|
||||||
|
|
||||||
SYS_ARCH_PROTECT(lev);
|
SYS_ARCH_PROTECT(lev);
|
||||||
++sock->fd_used;
|
if (sock->fd_free_pending) {
|
||||||
LWIP_ASSERT("sock->fd_used != 0", sock->fd_used != 0);
|
/* prevent new usage of this socket if free is pending */
|
||||||
|
ret = 0;
|
||||||
|
} else {
|
||||||
|
++sock->fd_used;
|
||||||
|
ret = 1;
|
||||||
|
LWIP_ASSERT("sock->fd_used != 0", sock->fd_used != 0);
|
||||||
|
}
|
||||||
SYS_ARCH_UNPROTECT(lev);
|
SYS_ARCH_UNPROTECT(lev);
|
||||||
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Like sock_inc_used(), but called under SYS_ARCH_PROTECT lock. */
|
/* Like sock_inc_used(), but called under SYS_ARCH_PROTECT lock. */
|
||||||
static void
|
static int
|
||||||
sock_inc_used_locked(struct lwip_sock *sock)
|
sock_inc_used_locked(struct lwip_sock *sock)
|
||||||
{
|
{
|
||||||
LWIP_ASSERT("sock != NULL", sock != NULL);
|
LWIP_ASSERT("sock != NULL", sock != NULL);
|
||||||
|
|
||||||
|
if (sock->fd_free_pending) {
|
||||||
|
LWIP_ASSERT("sock->fd_used != 0", sock->fd_used != 0);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
++sock->fd_used;
|
++sock->fd_used;
|
||||||
LWIP_ASSERT("sock->fd_used != 0", sock->fd_used != 0);
|
LWIP_ASSERT("sock->fd_used != 0", sock->fd_used != 0);
|
||||||
|
return 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* In full-duplex mode,sock->fd_used != 0 prevents a socket descriptor from being
|
/* In full-duplex mode,sock->fd_used != 0 prevents a socket descriptor from being
|
||||||
@ -358,33 +373,35 @@ sock_inc_used_locked(struct lwip_sock *sock)
|
|||||||
* This function is called at the end of functions using (try)get_socket*().
|
* This function is called at the end of functions using (try)get_socket*().
|
||||||
*/
|
*/
|
||||||
static void
|
static void
|
||||||
done_socket_locked(struct lwip_sock *sock)
|
done_socket(struct lwip_sock *sock)
|
||||||
{
|
{
|
||||||
|
SYS_ARCH_DECL_PROTECT(lev);
|
||||||
|
int freed = 0;
|
||||||
|
int is_tcp = 0;
|
||||||
|
union lwip_sock_lastdata lastdata;
|
||||||
LWIP_ASSERT("sock != NULL", sock != NULL);
|
LWIP_ASSERT("sock != NULL", sock != NULL);
|
||||||
|
|
||||||
|
SYS_ARCH_PROTECT(lev);
|
||||||
LWIP_ASSERT("sock->fd_used > 0", sock->fd_used > 0);
|
LWIP_ASSERT("sock->fd_used > 0", sock->fd_used > 0);
|
||||||
if (--sock->fd_used == 0) {
|
if (--sock->fd_used == 0) {
|
||||||
if (sock->fd_free_pending) {
|
if (sock->fd_free_pending) {
|
||||||
/* free the socket */
|
/* free the socket */
|
||||||
sock->fd_used = 1;
|
sock->fd_used = 1;
|
||||||
free_socket(sock, sock->fd_free_pending & LWIP_SOCK_FD_FREE_TCP);
|
is_tcp = sock->fd_free_pending & LWIP_SOCK_FD_FREE_TCP;
|
||||||
|
freed = free_socket_locked(sock, is_tcp, &lastdata);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
SYS_ARCH_UNPROTECT(lev);
|
||||||
|
|
||||||
|
if (freed) {
|
||||||
|
free_socket_free_elements(is_tcp, &lastdata);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
static void
|
|
||||||
done_socket(struct lwip_sock *sock)
|
|
||||||
{
|
|
||||||
SYS_ARCH_DECL_PROTECT(lev);
|
|
||||||
SYS_ARCH_PROTECT(lev);
|
|
||||||
done_socket_locked(sock);
|
|
||||||
SYS_ARCH_UNPROTECT(lev);
|
|
||||||
}
|
|
||||||
#else /* LWIP_NETCONN_FULLDUPLEX */
|
#else /* LWIP_NETCONN_FULLDUPLEX */
|
||||||
#define sock_inc_used(sock)
|
#define sock_inc_used(sock) 1
|
||||||
#define sock_inc_used_locked(sock)
|
#define sock_inc_used_locked(sock) 1
|
||||||
#define done_socket(sock)
|
#define done_socket(sock)
|
||||||
#define done_socket_locked(sock)
|
|
||||||
#endif /* LWIP_NETCONN_FULLDUPLEX */
|
#endif /* LWIP_NETCONN_FULLDUPLEX */
|
||||||
|
|
||||||
/* Translate a socket 'int' into a pointer (only fails if the index is invalid) */
|
/* Translate a socket 'int' into a pointer (only fails if the index is invalid) */
|
||||||
@ -411,7 +428,9 @@ tryget_socket_unconn(int fd)
|
|||||||
{
|
{
|
||||||
struct lwip_sock *ret = tryget_socket_unconn_nouse(fd);
|
struct lwip_sock *ret = tryget_socket_unconn_nouse(fd);
|
||||||
if (ret != NULL) {
|
if (ret != NULL) {
|
||||||
sock_inc_used(ret);
|
if (!sock_inc_used(ret)) {
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
@ -422,7 +441,9 @@ tryget_socket_unconn_locked(int fd)
|
|||||||
{
|
{
|
||||||
struct lwip_sock *ret = tryget_socket_unconn_nouse(fd);
|
struct lwip_sock *ret = tryget_socket_unconn_nouse(fd);
|
||||||
if (ret != NULL) {
|
if (ret != NULL) {
|
||||||
sock_inc_used_locked(ret);
|
if (!sock_inc_used_locked(ret)) {
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
@ -514,6 +535,44 @@ alloc_socket(struct netconn *newconn, int accepted)
|
|||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/** Free a socket (under lock)
|
||||||
|
*
|
||||||
|
* @param sock the socket to free
|
||||||
|
* @param is_tcp != 0 for TCP sockets, used to free lastdata
|
||||||
|
* @param lastdata lastdata is stored here, must be freed externally
|
||||||
|
*/
|
||||||
|
static int
|
||||||
|
free_socket_locked(struct lwip_sock *sock, int is_tcp, union lwip_sock_lastdata *lastdata)
|
||||||
|
{
|
||||||
|
#if LWIP_NETCONN_FULLDUPLEX
|
||||||
|
LWIP_ASSERT("sock->fd_used > 0", sock->fd_used > 0);
|
||||||
|
sock->fd_used--;
|
||||||
|
if (sock->fd_used > 0) {
|
||||||
|
sock->fd_free_pending = LWIP_SOCK_FD_FREE_FREE | (is_tcp ? LWIP_SOCK_FD_FREE_TCP : 0);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
|
*lastdata = sock->lastdata;
|
||||||
|
sock->lastdata.pbuf = NULL;
|
||||||
|
sock->conn = NULL;
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
/** Free a socket's leftover members.
|
||||||
|
*/
|
||||||
|
static void
|
||||||
|
free_socket_free_elements(int is_tcp, union lwip_sock_lastdata *lastdata)
|
||||||
|
{
|
||||||
|
if (lastdata->pbuf != NULL) {
|
||||||
|
if (is_tcp) {
|
||||||
|
pbuf_free(lastdata->pbuf);
|
||||||
|
} else {
|
||||||
|
netbuf_delete(lastdata->netbuf);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
/** Free a socket. The socket's netconn must have been
|
/** Free a socket. The socket's netconn must have been
|
||||||
* delete before!
|
* delete before!
|
||||||
*
|
*
|
||||||
@ -523,34 +582,19 @@ alloc_socket(struct netconn *newconn, int accepted)
|
|||||||
static void
|
static void
|
||||||
free_socket(struct lwip_sock *sock, int is_tcp)
|
free_socket(struct lwip_sock *sock, int is_tcp)
|
||||||
{
|
{
|
||||||
|
int freed;
|
||||||
union lwip_sock_lastdata lastdata;
|
union lwip_sock_lastdata lastdata;
|
||||||
SYS_ARCH_DECL_PROTECT(lev);
|
SYS_ARCH_DECL_PROTECT(lev);
|
||||||
|
|
||||||
/* Protect socket array */
|
/* Protect socket array */
|
||||||
SYS_ARCH_PROTECT(lev);
|
SYS_ARCH_PROTECT(lev);
|
||||||
|
|
||||||
#if LWIP_NETCONN_FULLDUPLEX
|
freed = free_socket_locked(sock, is_tcp, &lastdata);
|
||||||
LWIP_ASSERT("sock->fd_used > 0", sock->fd_used > 0);
|
|
||||||
sock->fd_used--;
|
|
||||||
if (sock->fd_used > 0) {
|
|
||||||
sock->fd_free_pending = LWIP_SOCK_FD_FREE_FREE | (is_tcp ? LWIP_SOCK_FD_FREE_TCP : 0);
|
|
||||||
SYS_ARCH_UNPROTECT(lev);
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
|
|
||||||
lastdata = sock->lastdata;
|
|
||||||
sock->lastdata.pbuf = NULL;
|
|
||||||
sock->conn = NULL;
|
|
||||||
SYS_ARCH_UNPROTECT(lev);
|
SYS_ARCH_UNPROTECT(lev);
|
||||||
/* don't use 'sock' after this line, as another task might have allocated it */
|
/* don't use 'sock' after this line, as another task might have allocated it */
|
||||||
|
|
||||||
if (lastdata.pbuf != NULL) {
|
if (freed) {
|
||||||
if (is_tcp) {
|
free_socket_free_elements(is_tcp, &lastdata);
|
||||||
pbuf_free(lastdata.pbuf);
|
|
||||||
} else {
|
|
||||||
netbuf_delete(lastdata.netbuf);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -1993,14 +2037,15 @@ lwip_select(int maxfdp1, fd_set *readset, fd_set *writeset, fd_set *exceptset,
|
|||||||
if (sock->select_waiting == 0) {
|
if (sock->select_waiting == 0) {
|
||||||
/* overflow - too many threads waiting */
|
/* overflow - too many threads waiting */
|
||||||
sock->select_waiting--;
|
sock->select_waiting--;
|
||||||
done_socket_locked(sock);
|
|
||||||
nready = -1;
|
nready = -1;
|
||||||
maxfdp2 = i;
|
maxfdp2 = i;
|
||||||
SYS_ARCH_UNPROTECT(lev);
|
SYS_ARCH_UNPROTECT(lev);
|
||||||
|
done_socket(sock);
|
||||||
set_errno(EBUSY);
|
set_errno(EBUSY);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
done_socket_locked(sock);
|
SYS_ARCH_UNPROTECT(lev);
|
||||||
|
done_socket(sock);
|
||||||
} else {
|
} else {
|
||||||
/* Not a valid socket */
|
/* Not a valid socket */
|
||||||
nready = -1;
|
nready = -1;
|
||||||
@ -2009,7 +2054,6 @@ lwip_select(int maxfdp1, fd_set *readset, fd_set *writeset, fd_set *exceptset,
|
|||||||
set_errno(EBADF);
|
set_errno(EBADF);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
SYS_ARCH_UNPROTECT(lev);
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -2053,13 +2097,14 @@ lwip_select(int maxfdp1, fd_set *readset, fd_set *writeset, fd_set *exceptset,
|
|||||||
if (sock->select_waiting > 0) {
|
if (sock->select_waiting > 0) {
|
||||||
sock->select_waiting--;
|
sock->select_waiting--;
|
||||||
}
|
}
|
||||||
done_socket_locked(sock);
|
SYS_ARCH_UNPROTECT(lev);
|
||||||
|
done_socket(sock);
|
||||||
} else {
|
} else {
|
||||||
|
SYS_ARCH_UNPROTECT(lev);
|
||||||
/* Not a valid socket */
|
/* Not a valid socket */
|
||||||
nready = -1;
|
nready = -1;
|
||||||
set_errno(EBADF);
|
set_errno(EBADF);
|
||||||
}
|
}
|
||||||
SYS_ARCH_UNPROTECT(lev);
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -2165,9 +2210,9 @@ lwip_pollscan(struct pollfd *fds, nfds_t nfds, enum lwip_pollscan_opts opts)
|
|||||||
if (sock->select_waiting == 0) {
|
if (sock->select_waiting == 0) {
|
||||||
/* overflow - too many threads waiting */
|
/* overflow - too many threads waiting */
|
||||||
sock->select_waiting--;
|
sock->select_waiting--;
|
||||||
done_socket_locked(sock);
|
|
||||||
nready = -1;
|
nready = -1;
|
||||||
SYS_ARCH_UNPROTECT(lev);
|
SYS_ARCH_UNPROTECT(lev);
|
||||||
|
done_socket(sock);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
} else if ((opts & LWIP_POLLSCAN_DEC_WAIT) != 0) {
|
} else if ((opts & LWIP_POLLSCAN_DEC_WAIT) != 0) {
|
||||||
@ -2177,9 +2222,8 @@ lwip_pollscan(struct pollfd *fds, nfds_t nfds, enum lwip_pollscan_opts opts)
|
|||||||
sock->select_waiting--;
|
sock->select_waiting--;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
done_socket_locked(sock);
|
|
||||||
|
|
||||||
SYS_ARCH_UNPROTECT(lev);
|
SYS_ARCH_UNPROTECT(lev);
|
||||||
|
done_socket(sock);
|
||||||
|
|
||||||
/* ... then examine it: */
|
/* ... then examine it: */
|
||||||
/* See if netconn of this socket is ready for read */
|
/* See if netconn of this socket is ready for read */
|
||||||
|
Loading…
Reference in New Issue
Block a user