git: 96104caaf00e - main - rpcsec_tls: do not create an RPC client per vnet
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Sat, 01 Feb 2025 19:33:54 UTC
The branch main has been updated by glebius:
URL: https://cgit.FreeBSD.org/src/commit/?id=96104caaf00ef48d43c93e95f04ec4de01ee1550
commit 96104caaf00ef48d43c93e95f04ec4de01ee1550
Author: Gleb Smirnoff <glebius@FreeBSD.org>
AuthorDate: 2025-02-01 19:13:45 +0000
Commit: Gleb Smirnoff <glebius@FreeBSD.org>
CommitDate: 2025-02-01 19:13:45 +0000
rpcsec_tls: do not create an RPC client per vnet
A netlink RPC client should be global. The filtering of RPC calls is done
by the nl_send_group() that would distribute the call to all subscribers
in the curvnet of clnt_nl_call() context.
Fixes: a3a6dc24f34a1b0522bd0dd8fcb6b84c69686251
Fixes: 42eec5201ab936f7227950c2c159c02c9cb342d4
---
sys/rpc/rpcsec_tls/rpctls_impl.c | 48 ++++++++++------------------------------
1 file changed, 12 insertions(+), 36 deletions(-)
diff --git a/sys/rpc/rpcsec_tls/rpctls_impl.c b/sys/rpc/rpcsec_tls/rpctls_impl.c
index adca24c3e3d5..6745a04e8ac8 100644
--- a/sys/rpc/rpcsec_tls/rpctls_impl.c
+++ b/sys/rpc/rpcsec_tls/rpctls_impl.c
@@ -78,8 +78,8 @@ static struct opaque_auth rpctls_null_verf;
KRPC_VNET_DECLARE(uint64_t, svc_vc_tls_handshake_success);
KRPC_VNET_DECLARE(uint64_t, svc_vc_tls_handshake_failed);
-KRPC_VNET_DEFINE_STATIC(CLIENT *, rpctls_connect_handle);
-KRPC_VNET_DEFINE_STATIC(CLIENT *, rpctls_server_handle);
+static CLIENT *rpctls_connect_handle;
+static CLIENT *rpctls_server_handle;
struct upsock {
RB_ENTRY(upsock) tree;
@@ -127,28 +127,6 @@ rpctls_client_nl_create(const char *group, const rpcprog_t program,
return (cl);
}
-static void
-rpctls_vnetinit(const void *unused __unused)
-{
-
- KRPC_VNET(rpctls_connect_handle) =
- rpctls_client_nl_create("tlsclnt", RPCTLSCD, RPCTLSCDVERS);
- KRPC_VNET(rpctls_server_handle) =
- rpctls_client_nl_create("tlsserv", RPCTLSSD, RPCTLSSDVERS);
-}
-VNET_SYSINIT(rpctls_vnetinit, SI_SUB_VNET_DONE, SI_ORDER_ANY,
- rpctls_vnetinit, NULL);
-
-static void
-rpctls_cleanup(void *unused __unused)
-{
-
- clnt_destroy(KRPC_VNET(rpctls_connect_handle));
- clnt_destroy(KRPC_VNET(rpctls_server_handle));
-}
-VNET_SYSUNINIT(rpctls_cleanup, SI_SUB_VNET_DONE, SI_ORDER_ANY,
- rpctls_cleanup, NULL);
-
int
rpctls_init(void)
{
@@ -163,6 +141,10 @@ rpctls_init(void)
rpctls_null_verf.oa_flavor = AUTH_NULL;
rpctls_null_verf.oa_base = RPCTLS_START_STRING;
rpctls_null_verf.oa_length = strlen(RPCTLS_START_STRING);
+ rpctls_connect_handle = rpctls_client_nl_create("tlsclnt",
+ RPCTLSCD, RPCTLSCDVERS);
+ rpctls_server_handle = rpctls_client_nl_create("tlsserv",
+ RPCTLSSD, RPCTLSSDVERS);
return (0);
}
@@ -271,7 +253,6 @@ rpctls_connect(CLIENT *newclient, char *certname, struct socket *so,
.cl = newclient,
.server = false,
};
- CLIENT *cl = KRPC_VNET(rpctls_connect_handle);
/* First, do the AUTH_TLS NULL RPC. */
memset(&ext, 0, sizeof(ext));
@@ -298,7 +279,7 @@ rpctls_connect(CLIENT *newclient, char *certname, struct socket *so,
} else
arg.certname.certname_len = 0;
arg.socookie = (uint64_t)so;
- stat = rpctlscd_connect_2(&arg, &res, cl);
+ stat = rpctlscd_connect_2(&arg, &res, rpctls_connect_handle);
if (stat == RPC_SUCCESS)
*reterr = res.reterr;
else
@@ -323,11 +304,10 @@ rpctls_cl_handlerecord(void *socookie, uint32_t *reterr)
struct rpctlscd_handlerecord_arg arg;
struct rpctlscd_handlerecord_res res;
enum clnt_stat stat;
- CLIENT *cl = KRPC_VNET(rpctls_connect_handle);
/* Do the handlerecord upcall. */
arg.socookie = (uint64_t)socookie;
- stat = rpctlscd_handlerecord_2(&arg, &res, cl);
+ stat = rpctlscd_handlerecord_2(&arg, &res, rpctls_connect_handle);
if (stat == RPC_SUCCESS)
*reterr = res.reterr;
return (stat);
@@ -339,11 +319,10 @@ rpctls_srv_handlerecord(void *socookie, uint32_t *reterr)
struct rpctlssd_handlerecord_arg arg;
struct rpctlssd_handlerecord_res res;
enum clnt_stat stat;
- CLIENT *cl = KRPC_VNET(rpctls_server_handle);
/* Do the handlerecord upcall. */
arg.socookie = (uint64_t)socookie;
- stat = rpctlssd_handlerecord_2(&arg, &res, cl);
+ stat = rpctlssd_handlerecord_2(&arg, &res, rpctls_server_handle);
if (stat == RPC_SUCCESS)
*reterr = res.reterr;
return (stat);
@@ -356,11 +335,10 @@ rpctls_cl_disconnect(void *socookie, uint32_t *reterr)
struct rpctlscd_disconnect_arg arg;
struct rpctlscd_disconnect_res res;
enum clnt_stat stat;
- CLIENT *cl = KRPC_VNET(rpctls_connect_handle);
/* Do the disconnect upcall. */
arg.socookie = (uint64_t)socookie;
- stat = rpctlscd_disconnect_2(&arg, &res, cl);
+ stat = rpctlscd_disconnect_2(&arg, &res, rpctls_connect_handle);
if (stat == RPC_SUCCESS)
*reterr = res.reterr;
return (stat);
@@ -372,11 +350,10 @@ rpctls_srv_disconnect(void *socookie, uint32_t *reterr)
struct rpctlssd_disconnect_arg arg;
struct rpctlssd_disconnect_res res;
enum clnt_stat stat;
- CLIENT *cl = KRPC_VNET(rpctls_server_handle);
/* Do the disconnect upcall. */
arg.socookie = (uint64_t)socookie;
- stat = rpctlssd_disconnect_2(&arg, &res, cl);
+ stat = rpctlssd_disconnect_2(&arg, &res, rpctls_server_handle);
if (stat == RPC_SUCCESS)
*reterr = res.reterr;
return (stat);
@@ -393,7 +370,6 @@ rpctls_server(SVCXPRT *xprt, uint32_t *flags, uid_t *uid, int *ngrps,
.xp = xprt,
.server = true,
};
- CLIENT *cl = KRPC_VNET(rpctls_server_handle);
struct rpctlssd_connect_arg arg;
struct rpctlssd_connect_res res;
gid_t *gidp;
@@ -407,7 +383,7 @@ rpctls_server(SVCXPRT *xprt, uint32_t *flags, uid_t *uid, int *ngrps,
/* Do the server upcall. */
res.gid.gid_val = NULL;
arg.socookie = (uint64_t)xprt->xp_socket;
- stat = rpctlssd_connect_2(&arg, &res, cl);
+ stat = rpctlssd_connect_2(&arg, &res, rpctls_server_handle);
if (stat == RPC_SUCCESS) {
*flags = res.flags;
if ((*flags & (RPCTLS_FLAGS_CERTUSER |