Skip to content

Commit f3b5d27

Browse files
olivier-le-sagenordicjm
authored andcommitted
bluetooth: services: Fix RAS ring buffer alloc overflow issue
When the ranging counter wrapped, alloc() would fail due to not finding that the buffer with ranging counter 65535 could be freed. To ensure the buffer selected to be freed is always the oldest, a new approach is used. It's based on how many counts have elapsed relative to the counter we are trying to allocate. Signed-off-by: Olivier Lesage <olivier.lesage@nordicsemi.no>
1 parent 98235e8 commit f3b5d27

File tree

1 file changed

+6
-1
lines changed

1 file changed

+6
-1
lines changed

subsys/bluetooth/services/ras/rrsp/ras_rd_buffer.c

+6-1
Original file line numberDiff line numberDiff line change
@@ -96,20 +96,25 @@ static struct ras_rd_buffer *rd_buffer_alloc(struct bt_conn *conn, uint16_t rang
9696
{
9797
uint16_t conn_buffer_count = 0;
9898
uint16_t oldest_ranging_counter = UINT16_MAX;
99+
uint16_t oldest_ranging_counter_age = 0;
99100
struct ras_rd_buffer *available_free_buffer = NULL;
100101
struct ras_rd_buffer *available_oldest_buffer = NULL;
101102

102103
for (uint8_t i = 0; i < ARRAY_SIZE(rd_buffer_pool); i++) {
103104
if (rd_buffer_pool[i].conn == conn) {
104105
conn_buffer_count++;
105106

107+
const uint16_t ranging_counter_age = ranging_counter
108+
- rd_buffer_pool[i].ranging_counter;
109+
106110
/* Only overwrite buffers that have ranging data stored
107111
* and are not being read.
108112
*/
109113
if (rd_buffer_pool[i].ready && !rd_buffer_pool[i].busy &&
110114
atomic_get(&rd_buffer_pool[i].refcount) == 0 &&
111-
rd_buffer_pool[i].ranging_counter < oldest_ranging_counter) {
115+
ranging_counter_age > oldest_ranging_counter_age) {
112116
oldest_ranging_counter = rd_buffer_pool[i].ranging_counter;
117+
oldest_ranging_counter_age = ranging_counter_age;
113118
available_oldest_buffer = &rd_buffer_pool[i];
114119
}
115120
}

0 commit comments

Comments
 (0)