summaryrefslogtreecommitdiffstats
path: root/sys/netgraph/bluetooth
diff options
context:
space:
mode:
authorjhb <jhb@FreeBSD.org>2009-06-01 21:17:03 +0000
committerjhb <jhb@FreeBSD.org>2009-06-01 21:17:03 +0000
commita1af9ecca44f362b24fe3a8342ca6ed8676a399c (patch)
tree13628b6be10af95db7dc7d8ef88b3291d48583ab /sys/netgraph/bluetooth
parent9956d85f164d16d3c1db67cc01f521c1c09d5fdb (diff)
downloadFreeBSD-src-a1af9ecca44f362b24fe3a8342ca6ed8676a399c.zip
FreeBSD-src-a1af9ecca44f362b24fe3a8342ca6ed8676a399c.tar.gz
Rework socket upcalls to close some races with setup/teardown of upcalls.
- Each socket upcall is now invoked with the appropriate socket buffer locked. It is not permissible to call soisconnected() with this lock held; however, so socket upcalls now return an integer value. The two possible values are SU_OK and SU_ISCONNECTED. If an upcall returns SU_ISCONNECTED, then the soisconnected() will be invoked on the socket after the socket buffer lock is dropped. - A new API is provided for setting and clearing socket upcalls. The API consists of soupcall_set() and soupcall_clear(). - To simplify locking, each socket buffer now has a separate upcall. - When a socket upcall returns SU_ISCONNECTED, the upcall is cleared from the receive socket buffer automatically. Note that a SO_SND upcall should never return SU_ISCONNECTED. - All this means that accept filters should now return SU_ISCONNECTED instead of calling soisconnected() directly. They also no longer need to explicitly clear the upcall on the new socket. - The HTTP accept filter still uses soupcall_set() to manage its internal state machine, but other accept filters no longer have any explicit knowlege of socket upcall internals aside from their return value. - The various RPC client upcalls currently drop the socket buffer lock while invoking soreceive() as a temporary band-aid. The plan for the future is to add a new flag to allow soreceive() to be called with the socket buffer locked. - The AIO callback for socket I/O is now also invoked with the socket buffer locked. Previously sowakeup() would drop the socket buffer lock only to call aio_swake() which immediately re-acquired the socket buffer lock for the duration of the function call. Discussed with: rwatson, rmacklem
Diffstat (limited to 'sys/netgraph/bluetooth')
-rw-r--r--sys/netgraph/bluetooth/socket/ng_btsocket_rfcomm.c23
1 files changed, 9 insertions, 14 deletions
diff --git a/sys/netgraph/bluetooth/socket/ng_btsocket_rfcomm.c b/sys/netgraph/bluetooth/socket/ng_btsocket_rfcomm.c
index 0f409b5..4904c19 100644
--- a/sys/netgraph/bluetooth/socket/ng_btsocket_rfcomm.c
+++ b/sys/netgraph/bluetooth/socket/ng_btsocket_rfcomm.c
@@ -93,7 +93,7 @@ MALLOC_DEFINE(M_NETGRAPH_BTSOCKET_RFCOMM, "netgraph_btsocks_rfcomm",
#define ALOT 0x7fff
/* Local prototypes */
-static void ng_btsocket_rfcomm_upcall
+static int ng_btsocket_rfcomm_upcall
(struct socket *so, void *arg, int waitflag);
static void ng_btsocket_rfcomm_sessions_task
(void *ctx, int pending);
@@ -1007,7 +1007,7 @@ ng_btsocket_rfcomm_sockaddr(struct socket *so, struct sockaddr **nam)
* Upcall function for L2CAP sockets. Enqueue RFCOMM task.
*/
-static void
+static int
ng_btsocket_rfcomm_upcall(struct socket *so, void *arg, int waitflag)
{
int error;
@@ -1018,6 +1018,7 @@ ng_btsocket_rfcomm_upcall(struct socket *so, void *arg, int waitflag)
if ((error = ng_btsocket_rfcomm_task_wakeup()) != 0)
NG_BTSOCKET_RFCOMM_ALERT(
"%s: Could not enqueue RFCOMM task, error=%d\n", __func__, error);
+ return (SU_OK);
} /* ng_btsocket_rfcomm_upcall */
/*
@@ -1047,13 +1048,11 @@ ng_btsocket_rfcomm_sessions_task(void *ctx, int pending)
panic("%s: DLC list is not empty\n", __func__);
/* Close L2CAP socket */
- s->l2so->so_upcallarg = NULL;
- s->l2so->so_upcall = NULL;
SOCKBUF_LOCK(&s->l2so->so_rcv);
- s->l2so->so_rcv.sb_flags &= ~SB_UPCALL;
+ soupcall_clear(s->l2so, SO_RCV);
SOCKBUF_UNLOCK(&s->l2so->so_rcv);
SOCKBUF_LOCK(&s->l2so->so_snd);
- s->l2so->so_snd.sb_flags &= ~SB_UPCALL;
+ soupcall_clear(s->l2so, SO_SND);
SOCKBUF_UNLOCK(&s->l2so->so_snd);
soclose(s->l2so);
@@ -1286,13 +1285,11 @@ ng_btsocket_rfcomm_session_create(ng_btsocket_rfcomm_session_p *sp,
LIST_INIT(&s->dlcs);
/* Prepare L2CAP socket */
- l2so->so_upcallarg = NULL;
- l2so->so_upcall = ng_btsocket_rfcomm_upcall;
SOCKBUF_LOCK(&l2so->so_rcv);
- l2so->so_rcv.sb_flags |= SB_UPCALL;
+ soupcall_set(l2so, SO_RCV, ng_btsocket_rfcomm_upcall, NULL);
SOCKBUF_UNLOCK(&l2so->so_rcv);
SOCKBUF_LOCK(&l2so->so_snd);
- l2so->so_snd.sb_flags |= SB_UPCALL;
+ soupcall_set(l2so, SO_SND, ng_btsocket_rfcomm_upcall, NULL);
SOCKBUF_UNLOCK(&l2so->so_snd);
l2so->so_state |= SS_NBIO;
s->l2so = l2so;
@@ -1370,13 +1367,11 @@ bad:
mtx_unlock(&s->session_mtx);
/* Return L2CAP socket back to its original state */
- l2so->so_upcallarg = NULL;
- l2so->so_upcall = NULL;
SOCKBUF_LOCK(&l2so->so_rcv);
- l2so->so_rcv.sb_flags &= ~SB_UPCALL;
+ soupcall_clear(s->l2so, SO_RCV);
SOCKBUF_UNLOCK(&l2so->so_rcv);
SOCKBUF_LOCK(&l2so->so_snd);
- l2so->so_snd.sb_flags &= ~SB_UPCALL;
+ soupcall_clear(s->l2so, SO_SND);
SOCKBUF_UNLOCK(&l2so->so_snd);
l2so->so_state &= ~SS_NBIO;
OpenPOWER on IntegriCloud