mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-24 12:23:32 +01:00
Revert "Make pending libevent actions cancelable"
This reverts commit aba25a6939
.
This commit is contained in:
parent
50fd99d7ef
commit
135a5102a3
@ -558,17 +558,17 @@ tor_check_libevent_header_compatibility(void)
|
|||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
struct tor_libevent_action_t {
|
typedef struct runnable_t {
|
||||||
struct event *ev;
|
struct event *ev;
|
||||||
void (*cb)(void *arg);
|
void (*cb)(void *arg);
|
||||||
void *arg;
|
void *arg;
|
||||||
};
|
} runnable_t;
|
||||||
|
|
||||||
/** Callback for tor_run_in_libevent_loop */
|
/** Callback for tor_run_in_libevent_loop */
|
||||||
static void
|
static void
|
||||||
run_runnable_cb(evutil_socket_t s, short what, void *arg)
|
run_runnable_cb(evutil_socket_t s, short what, void *arg)
|
||||||
{
|
{
|
||||||
tor_libevent_action_t *r = arg;
|
runnable_t *r = arg;
|
||||||
void (*cb)(void *) = r->cb;
|
void (*cb)(void *) = r->cb;
|
||||||
void *cb_arg = r->arg;
|
void *cb_arg = r->arg;
|
||||||
(void)what;
|
(void)what;
|
||||||
@ -584,32 +584,22 @@ run_runnable_cb(evutil_socket_t s, short what, void *arg)
|
|||||||
* deep inside a no-reentrant code and there's some function you want to call
|
* deep inside a no-reentrant code and there's some function you want to call
|
||||||
* without worrying about whether it might cause reeentrant invocation.
|
* without worrying about whether it might cause reeentrant invocation.
|
||||||
*/
|
*/
|
||||||
tor_libevent_action_t *
|
int
|
||||||
tor_run_in_libevent_loop(void (*cb)(void *arg), void *arg)
|
tor_run_in_libevent_loop(void (*cb)(void *arg), void *arg)
|
||||||
{
|
{
|
||||||
tor_libevent_action_t *r = tor_malloc(sizeof(tor_libevent_action_t));
|
runnable_t *r = tor_malloc(sizeof(runnable_t));
|
||||||
r->cb = cb;
|
r->cb = cb;
|
||||||
r->arg = arg;
|
r->arg = arg;
|
||||||
r->ev = tor_event_new(tor_libevent_get_base(), -1, EV_TIMEOUT,
|
r->ev = tor_event_new(tor_libevent_get_base(), -1, EV_TIMEOUT,
|
||||||
run_runnable_cb, r);
|
run_runnable_cb, r);
|
||||||
if (!r->ev) {
|
if (!r->ev) {
|
||||||
tor_free(r);
|
tor_free(r);
|
||||||
return NULL;
|
return -1;
|
||||||
}
|
}
|
||||||
/* Make the event active immediately. */
|
/* Make the event active immediately. */
|
||||||
event_active(r->ev, EV_TIMEOUT, 1);
|
event_active(r->ev, EV_TIMEOUT, 1);
|
||||||
|
|
||||||
return r;
|
return 0;
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Cancel <b>action</b> without running it.
|
|
||||||
*/
|
|
||||||
void
|
|
||||||
tor_cancel_libevent_action(tor_libevent_action_t *action)
|
|
||||||
{
|
|
||||||
tor_event_free(action->ev);
|
|
||||||
tor_free(action);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
|
@ -44,12 +44,10 @@ void tor_event_free(struct event *ev);
|
|||||||
#define tor_evdns_add_server_port evdns_add_server_port
|
#define tor_evdns_add_server_port evdns_add_server_port
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
typedef struct tor_libevent_action_t tor_libevent_action_t;
|
|
||||||
tor_libevent_action_t *tor_run_in_libevent_loop(void (*cb)(void *arg),
|
|
||||||
void *arg);
|
|
||||||
void tor_cancel_libevent_action(tor_libevent_action_t *action);
|
|
||||||
|
|
||||||
typedef struct periodic_timer_t periodic_timer_t;
|
typedef struct periodic_timer_t periodic_timer_t;
|
||||||
|
|
||||||
|
int tor_run_in_libevent_loop(void (*cb)(void *arg), void *arg);
|
||||||
|
|
||||||
periodic_timer_t *periodic_timer_new(struct event_base *base,
|
periodic_timer_t *periodic_timer_new(struct event_base *base,
|
||||||
const struct timeval *tv,
|
const struct timeval *tv,
|
||||||
void (*cb)(periodic_timer_t *timer, void *data),
|
void (*cb)(periodic_timer_t *timer, void *data),
|
||||||
|
@ -1339,9 +1339,16 @@ tor_tls_got_client_hello(tor_tls_t *tls)
|
|||||||
tls->excess_renegotiations_callback) {
|
tls->excess_renegotiations_callback) {
|
||||||
/* We got more than one renegotiation requests. The Tor protocol
|
/* We got more than one renegotiation requests. The Tor protocol
|
||||||
needs just one renegotiation; more than that probably means
|
needs just one renegotiation; more than that probably means
|
||||||
They are trying to DoS us and we have to stop them. */
|
They are trying to DoS us and we have to stop them. We can't
|
||||||
|
close their connection from in here since it's an OpenSSL
|
||||||
|
callback, so we set a libevent timer that triggers in the next
|
||||||
|
event loop and closes the connection. */
|
||||||
|
|
||||||
tls->excess_renegotiations_callback(tls->callback_arg);
|
if (tor_run_in_libevent_loop(tls->excess_renegotiations_callback,
|
||||||
|
tls->callback_arg) < 0) {
|
||||||
|
log_warn(LD_GENERAL, "Didn't manage to set a renegotiation "
|
||||||
|
"limiting callback.");
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Now check the cipher list. */
|
/* Now check the cipher list. */
|
||||||
|
@ -492,9 +492,6 @@ connection_or_about_to_close(or_connection_t *or_conn)
|
|||||||
time_t now = time(NULL);
|
time_t now = time(NULL);
|
||||||
connection_t *conn = TO_CONN(or_conn);
|
connection_t *conn = TO_CONN(or_conn);
|
||||||
|
|
||||||
if (or_conn->pending_action)
|
|
||||||
tor_cancel_libevent_action(or_conn->pending_action);
|
|
||||||
|
|
||||||
/* Remember why we're closing this connection. */
|
/* Remember why we're closing this connection. */
|
||||||
if (conn->state != OR_CONN_STATE_OPEN) {
|
if (conn->state != OR_CONN_STATE_OPEN) {
|
||||||
/* Inform any pending (not attached) circs that they should
|
/* Inform any pending (not attached) circs that they should
|
||||||
@ -1159,34 +1156,20 @@ connection_or_tls_renegotiated_cb(tor_tls_t *tls, void *_conn)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/*DOCDOC*/
|
/** Invoked on the server side using a timer from inside
|
||||||
|
* tor_tls_got_client_hello() when the server receives excess
|
||||||
|
* renegotiation attempts; probably indicating a DoS. */
|
||||||
static void
|
static void
|
||||||
close_connection_libevent_cb(void *_conn)
|
connection_or_close_connection_cb(void *_conn)
|
||||||
{
|
{
|
||||||
or_connection_t *or_conn = _conn;
|
or_connection_t *or_conn = _conn;
|
||||||
connection_t *conn = TO_CONN(or_conn);
|
connection_t *conn = TO_CONN(or_conn);
|
||||||
|
|
||||||
or_conn->pending_action = NULL;
|
|
||||||
|
|
||||||
connection_stop_reading(conn);
|
connection_stop_reading(conn);
|
||||||
if (!conn->marked_for_close)
|
if (!conn->marked_for_close)
|
||||||
connection_mark_for_close(conn);
|
connection_mark_for_close(conn);
|
||||||
}
|
}
|
||||||
|
|
||||||
/* DOCDOC */
|
|
||||||
static void
|
|
||||||
connection_or_close_connection_cb(void *_conn)
|
|
||||||
{
|
|
||||||
/* We can't close their connection from in here since it's an OpenSSL
|
|
||||||
callback, so we set a libevent event that triggers in the next event
|
|
||||||
loop and closes the connection. */
|
|
||||||
or_connection_t *or_conn = _conn;
|
|
||||||
if (or_conn->_base.marked_for_close || or_conn->pending_action)
|
|
||||||
return;
|
|
||||||
or_conn->pending_action =
|
|
||||||
tor_run_in_libevent_loop(close_connection_libevent_cb, or_conn);
|
|
||||||
}
|
|
||||||
|
|
||||||
/** Move forward with the tls handshake. If it finishes, hand
|
/** Move forward with the tls handshake. If it finishes, hand
|
||||||
* <b>conn</b> to connection_tls_finish_handshake().
|
* <b>conn</b> to connection_tls_finish_handshake().
|
||||||
*
|
*
|
||||||
|
@ -1276,8 +1276,6 @@ typedef struct or_connection_t {
|
|||||||
unsigned active_circuit_pqueue_last_recalibrated;
|
unsigned active_circuit_pqueue_last_recalibrated;
|
||||||
struct or_connection_t *next_with_same_id; /**< Next connection with same
|
struct or_connection_t *next_with_same_id; /**< Next connection with same
|
||||||
* identity digest as this one. */
|
* identity digest as this one. */
|
||||||
|
|
||||||
tor_libevent_action_t *pending_action;
|
|
||||||
} or_connection_t;
|
} or_connection_t;
|
||||||
|
|
||||||
/** Subtype of connection_t for an "edge connection" -- that is, an entry (ap)
|
/** Subtype of connection_t for an "edge connection" -- that is, an entry (ap)
|
||||||
|
Loading…
Reference in New Issue
Block a user