df1f5e796c
Prior to this, BoringSSL was using OpenSSL's technique of having users register a callback for locking operation. This change adds native mutex support. Since mutexes often need to be in objects that are exposed via public headers, the non-static mutexes are defined in thread.h. However, on Windows we don't want to #include windows.h for CRITICAL_SECTION and, on Linux, pthread.h doesn't define pthread_rwlock_t unless the feature flags are set correctly—something that we can't control in general for public header files. Thus, on both platforms, the mutex is defined as a uint8_t[] of equal or greater size and we depend on static asserts to ensure that everything works out ok. Change-Id: Iafec17ae7e3422325e587878a5384107ec6647ab Reviewed-on: https://boringssl-review.googlesource.com/4321 Reviewed-by: Adam Langley <agl@google.com>
163 lines
4.4 KiB
C
163 lines
4.4 KiB
C
/* Copyright (c) 2015, Google Inc.
|
|
*
|
|
* Permission to use, copy, modify, and/or distribute this software for any
|
|
* purpose with or without fee is hereby granted, provided that the above
|
|
* copyright notice and this permission notice appear in all copies.
|
|
*
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
|
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
|
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
|
|
* SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
|
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
|
|
* OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
|
|
* CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */
|
|
|
|
#include "internal.h"
|
|
|
|
#if !defined(OPENSSL_WINDOWS)
|
|
|
|
#include <pthread.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
|
|
#include <openssl/mem.h>
|
|
#include <openssl/type_check.h>
|
|
|
|
|
|
OPENSSL_COMPILE_ASSERT(sizeof(CRYPTO_MUTEX) >= sizeof(pthread_rwlock_t),
|
|
CRYPTO_MUTEX_too_small);
|
|
|
|
void CRYPTO_MUTEX_init(CRYPTO_MUTEX *lock) {
|
|
if (pthread_rwlock_init((pthread_rwlock_t *) lock, NULL) != 0) {
|
|
abort();
|
|
}
|
|
}
|
|
|
|
void CRYPTO_MUTEX_lock_read(CRYPTO_MUTEX *lock) {
|
|
if (pthread_rwlock_rdlock((pthread_rwlock_t *) lock) != 0) {
|
|
abort();
|
|
}
|
|
}
|
|
|
|
void CRYPTO_MUTEX_lock_write(CRYPTO_MUTEX *lock) {
|
|
if (pthread_rwlock_wrlock((pthread_rwlock_t *) lock) != 0) {
|
|
abort();
|
|
}
|
|
}
|
|
|
|
void CRYPTO_MUTEX_unlock(CRYPTO_MUTEX *lock) {
|
|
if (pthread_rwlock_unlock((pthread_rwlock_t *) lock) != 0) {
|
|
abort();
|
|
}
|
|
}
|
|
|
|
void CRYPTO_MUTEX_cleanup(CRYPTO_MUTEX *lock) {
|
|
pthread_rwlock_destroy((pthread_rwlock_t *) lock);
|
|
}
|
|
|
|
void CRYPTO_STATIC_MUTEX_lock_read(struct CRYPTO_STATIC_MUTEX *lock) {
|
|
if (pthread_rwlock_rdlock(&lock->lock) != 0) {
|
|
abort();
|
|
}
|
|
}
|
|
|
|
void CRYPTO_STATIC_MUTEX_lock_write(struct CRYPTO_STATIC_MUTEX *lock) {
|
|
if (pthread_rwlock_wrlock(&lock->lock) != 0) {
|
|
abort();
|
|
}
|
|
}
|
|
|
|
void CRYPTO_STATIC_MUTEX_unlock(struct CRYPTO_STATIC_MUTEX *lock) {
|
|
if (pthread_rwlock_unlock(&lock->lock) != 0) {
|
|
abort();
|
|
}
|
|
}
|
|
|
|
void CRYPTO_once(CRYPTO_once_t *once, void (*init)(void)) {
|
|
pthread_once(once, init);
|
|
}
|
|
|
|
static pthread_mutex_t g_destructors_lock = PTHREAD_MUTEX_INITIALIZER;
|
|
static thread_local_destructor_t g_destructors[NUM_OPENSSL_THREAD_LOCALS];
|
|
|
|
static void thread_local_destructor(void *arg) {
|
|
if (arg == NULL) {
|
|
return;
|
|
}
|
|
|
|
thread_local_destructor_t destructors[NUM_OPENSSL_THREAD_LOCALS];
|
|
if (pthread_mutex_lock(&g_destructors_lock) != 0) {
|
|
return;
|
|
}
|
|
memcpy(destructors, g_destructors, sizeof(destructors));
|
|
pthread_mutex_unlock(&g_destructors_lock);
|
|
|
|
unsigned i;
|
|
void **pointers = arg;
|
|
for (i = 0; i < NUM_OPENSSL_THREAD_LOCALS; i++) {
|
|
if (destructors[i] != NULL) {
|
|
destructors[i](pointers[i]);
|
|
}
|
|
}
|
|
|
|
OPENSSL_free(pointers);
|
|
}
|
|
|
|
static pthread_once_t g_thread_local_init_once = PTHREAD_ONCE_INIT;
|
|
static pthread_key_t g_thread_local_key;
|
|
static int g_thread_local_failed = 0;
|
|
|
|
static void thread_local_init(void) {
|
|
g_thread_local_failed =
|
|
pthread_key_create(&g_thread_local_key, thread_local_destructor) != 0;
|
|
}
|
|
|
|
void *CRYPTO_get_thread_local(thread_local_data_t index) {
|
|
CRYPTO_once(&g_thread_local_init_once, thread_local_init);
|
|
if (g_thread_local_failed) {
|
|
return NULL;
|
|
}
|
|
|
|
void **pointers = pthread_getspecific(g_thread_local_key);
|
|
if (pointers == NULL) {
|
|
return NULL;
|
|
}
|
|
return pointers[index];
|
|
}
|
|
|
|
int CRYPTO_set_thread_local(thread_local_data_t index, void *value,
|
|
thread_local_destructor_t destructor) {
|
|
CRYPTO_once(&g_thread_local_init_once, thread_local_init);
|
|
if (g_thread_local_failed) {
|
|
destructor(value);
|
|
return 0;
|
|
}
|
|
|
|
void **pointers = pthread_getspecific(g_thread_local_key);
|
|
if (pointers == NULL) {
|
|
pointers = OPENSSL_malloc(sizeof(void *) * NUM_OPENSSL_THREAD_LOCALS);
|
|
if (pointers == NULL) {
|
|
destructor(value);
|
|
return 0;
|
|
}
|
|
memset(pointers, 0, sizeof(void *) * NUM_OPENSSL_THREAD_LOCALS);
|
|
if (pthread_setspecific(g_thread_local_key, pointers) != 0) {
|
|
OPENSSL_free(pointers);
|
|
destructor(value);
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
if (pthread_mutex_lock(&g_destructors_lock) != 0) {
|
|
destructor(value);
|
|
return 0;
|
|
}
|
|
g_destructors[index] = destructor;
|
|
pthread_mutex_unlock(&g_destructors_lock);
|
|
|
|
pointers[index] = value;
|
|
return 1;
|
|
}
|
|
|
|
#endif /* !OPENSSL_WINDOWS */
|