From: Peter Xu <peterx@redhat.com>
To: qemu-devel@nongnu.org
Cc: "Paolo Bonzini" <pbonzini@redhat.com>,
"Daniel P . Berrange" <berrange@redhat.com>,
"Juan Quintela" <quintela@redhat.com>,
peterx@redhat.com, "Markus Armbruster" <armbru@redhat.com>,
"Marc-André Lureau" <marcandre.lureau@redhat.com>,
"Stefan Hajnoczi" <stefanha@redhat.com>,
"Dr . David Alan Gilbert" <dgilbert@redhat.com>
Subject: [Qemu-devel] [PATCH 14/14] qio/chardev: specify gcontext for TLS handshake
Date: Wed, 28 Feb 2018 13:06:33 +0800 [thread overview]
Message-ID: <20180228050633.7410-15-peterx@redhat.com> (raw)
In-Reply-To: <20180228050633.7410-1-peterx@redhat.com>
We allow the TLS code to be run with non-default gcontext by providing a
new qio_channel_tls_handshake_full() API.
With the new API, we can re-setup the TLS handshake GSource by calling
it again with the correct gcontext. Any call to the function will clean
up existing GSource tasks, and re-setup using the new gcontext.
Signed-off-by: Peter Xu <peterx@redhat.com>
---
chardev/char-socket.c | 30 +++++++++++++---
include/io/channel-tls.h | 22 +++++++++++-
io/channel-tls.c | 91 ++++++++++++++++++++++++++++++++++++++++--------
3 files changed, 123 insertions(+), 20 deletions(-)
diff --git a/chardev/char-socket.c b/chardev/char-socket.c
index 164a64ff34..406d33c04f 100644
--- a/chardev/char-socket.c
+++ b/chardev/char-socket.c
@@ -72,6 +72,9 @@ typedef struct {
static gboolean socket_reconnect_timeout(gpointer opaque);
static void tcp_chr_telnet_init(Chardev *chr);
+static void tcp_chr_tls_handshake_setup(Chardev *chr,
+ QIOChannelTLS *tioc,
+ GMainContext *context);
static void tcp_chr_reconn_timer_cancel(SocketChardev *s)
{
@@ -570,6 +573,7 @@ static void tcp_chr_telnet_destroy(SocketChardev *s)
static void tcp_chr_update_read_handler(Chardev *chr)
{
SocketChardev *s = SOCKET_CHARDEV(chr);
+ QIOChannelTLS *tioc;
if (s->listener) {
/*
@@ -589,6 +593,17 @@ static void tcp_chr_update_read_handler(Chardev *chr)
qio_task_context_set(s->thread_task, chr->gcontext);
}
+ tioc = (QIOChannelTLS *)object_dynamic_cast(OBJECT(s->ioc),
+ TYPE_QIO_CHANNEL_TLS);
+ if (tioc) {
+ /*
+ * TLS session enabled; reconfigure things up. Note that, if
+ * there is existing handshake task, it'll be cleaned up first
+ * in QIO code.
+ */
+ tcp_chr_tls_handshake_setup(chr, tioc, chr->gcontext);
+ }
+
if (!s->connected) {
return;
}
@@ -704,6 +719,16 @@ static void tcp_chr_tls_handshake(QIOTask *task,
}
}
+static void tcp_chr_tls_handshake_setup(Chardev *chr,
+ QIOChannelTLS *tioc,
+ GMainContext *context)
+{
+ qio_channel_tls_handshake_full(tioc,
+ tcp_chr_tls_handshake,
+ chr,
+ NULL,
+ context);
+}
static void tcp_chr_tls_init(Chardev *chr)
{
@@ -736,10 +761,7 @@ static void tcp_chr_tls_init(Chardev *chr)
object_unref(OBJECT(s->ioc));
s->ioc = QIO_CHANNEL(tioc);
- qio_channel_tls_handshake(tioc,
- tcp_chr_tls_handshake,
- chr,
- NULL);
+ tcp_chr_tls_handshake_setup(chr, tioc, NULL);
}
diff --git a/include/io/channel-tls.h b/include/io/channel-tls.h
index d157eb10e8..98b7cd1e51 100644
--- a/include/io/channel-tls.h
+++ b/include/io/channel-tls.h
@@ -48,6 +48,9 @@ struct QIOChannelTLS {
QIOChannel parent;
QIOChannel *master;
QCryptoTLSSession *session;
+ GMainContext *context;
+ GSource *tls_source;
+ QIOTask *task;
};
/**
@@ -111,11 +114,12 @@ qio_channel_tls_new_client(QIOChannel *master,
Error **errp);
/**
- * qio_channel_tls_handshake:
+ * qio_channel_tls_handshake_full:
* @ioc: the TLS channel object
* @func: the callback to invoke when completed
* @opaque: opaque data to pass to @func
* @destroy: optional callback to free @opaque
+ * @context: the context that will run the handshake task
*
* Perform the TLS session handshake. This method
* will return immediately and the handshake will
@@ -123,6 +127,22 @@ qio_channel_tls_new_client(QIOChannel *master,
* loop is running. When the handshake is complete,
* or fails, the @func callback will be invoked.
*/
+void qio_channel_tls_handshake_full(QIOChannelTLS *ioc,
+ QIOTaskFunc func,
+ gpointer opaque,
+ GDestroyNotify destroy,
+ GMainContext *context);
+
+/**
+ * qio_channel_tls_handshake:
+ * @ioc: the TLS channel object
+ * @func: the callback to invoke when completed
+ * @opaque: opaque data to pass to @func
+ * @destroy: optional callback to free @opaque
+ *
+ * Wrapper of qio_channel_tls_handshake_full(), only that we are
+ * running the handshake always on default main context.
+ */
void qio_channel_tls_handshake(QIOChannelTLS *ioc,
QIOTaskFunc func,
gpointer opaque,
diff --git a/io/channel-tls.c b/io/channel-tls.c
index 6182702dab..b173680526 100644
--- a/io/channel-tls.c
+++ b/io/channel-tls.c
@@ -145,8 +145,12 @@ static gboolean qio_channel_tls_handshake_io(QIOChannel *ioc,
GIOCondition condition,
gpointer user_data);
-static void qio_channel_tls_handshake_task(QIOChannelTLS *ioc,
- QIOTask *task)
+/*
+ * Returns NULL if handshake completed, or a GSource pointer of the
+ * pending handshake task to be executed.
+ */
+static GSource *qio_channel_tls_handshake_task(QIOChannelTLS *ioc,
+ QIOTask *task)
{
Error *err = NULL;
QCryptoTLSSessionHandshakeStatus status;
@@ -155,7 +159,7 @@ static void qio_channel_tls_handshake_task(QIOChannelTLS *ioc,
trace_qio_channel_tls_handshake_fail(ioc);
qio_task_set_error(task, err);
qio_task_complete(task);
- return;
+ return NULL;
}
status = qcrypto_tls_session_get_handshake_status(ioc->session);
@@ -169,6 +173,7 @@ static void qio_channel_tls_handshake_task(QIOChannelTLS *ioc,
trace_qio_channel_tls_credentials_allow(ioc);
}
qio_task_complete(task);
+ return NULL;
} else {
GIOCondition condition;
if (status == QCRYPTO_TLS_HANDSHAKE_SENDING) {
@@ -178,14 +183,36 @@ static void qio_channel_tls_handshake_task(QIOChannelTLS *ioc,
}
trace_qio_channel_tls_handshake_pending(ioc, status);
- qio_channel_add_watch(ioc->master,
- condition,
- qio_channel_tls_handshake_io,
- task,
- NULL);
+ return qio_channel_add_watch_full(ioc->master,
+ condition,
+ qio_channel_tls_handshake_io,
+ task,
+ NULL,
+ ioc->context);
+ }
+}
+
+static void qio_channel_tls_context_set(QIOChannelTLS *ioc,
+ GMainContext *context)
+{
+ if (ioc->context) {
+ g_main_context_unref(ioc->context);
+ ioc->context = NULL;
+ }
+ if (context) {
+ g_main_context_ref(context);
+ ioc->context = context;
}
}
+static void qio_channel_tls_source_destroy(QIOChannelTLS *ioc)
+{
+ if (ioc->tls_source) {
+ g_source_destroy(ioc->tls_source);
+ g_source_unref(ioc->tls_source);
+ ioc->tls_source = NULL;
+ }
+}
static gboolean qio_channel_tls_handshake_io(QIOChannel *ioc,
GIOCondition condition,
@@ -194,27 +221,59 @@ static gboolean qio_channel_tls_handshake_io(QIOChannel *ioc,
QIOTask *task = user_data;
QIOChannelTLS *tioc = QIO_CHANNEL_TLS(
qio_task_get_source(task));
+ GSource *source;
- qio_channel_tls_handshake_task(
- tioc, task);
+ source = qio_channel_tls_handshake_task(tioc, task);
+ /* Release existing GSource and cache the new one */
+ g_source_unref(tioc->tls_source);
+ tioc->tls_source = source;
return FALSE;
}
-void qio_channel_tls_handshake(QIOChannelTLS *ioc,
- QIOTaskFunc func,
- gpointer opaque,
- GDestroyNotify destroy)
+static void qio_channel_tls_cleanup(QIOChannelTLS *ioc)
+{
+ if (ioc->task) {
+ qio_task_unref(ioc->task);
+ ioc->task = NULL;
+ }
+
+ qio_channel_tls_source_destroy(ioc);
+ qio_channel_tls_context_set(ioc, NULL);
+}
+
+void qio_channel_tls_handshake_full(QIOChannelTLS *ioc,
+ QIOTaskFunc func,
+ gpointer opaque,
+ GDestroyNotify destroy,
+ GMainContext *context)
{
QIOTask *task;
+ GSource *source;
+
+ /* Drop existing tasks if there is */
+ qio_channel_tls_cleanup(ioc);
task = qio_task_new(OBJECT(ioc),
func, opaque, destroy);
+ qio_task_ref(ioc->task);
+ ioc->task = task;
trace_qio_channel_tls_handshake_start(ioc);
- qio_channel_tls_handshake_task(ioc, task);
+
+ assert(ioc->tls_source == NULL);
+ qio_channel_tls_context_set(ioc, context);
+ source = qio_channel_tls_handshake_task(ioc, task);
+ ioc->tls_source = source;
}
+void qio_channel_tls_handshake(QIOChannelTLS *ioc,
+ QIOTaskFunc func,
+ gpointer opaque,
+ GDestroyNotify destroy)
+{
+ qio_channel_tls_handshake_full(ioc, func, opaque, destroy, NULL);
+}
static void qio_channel_tls_init(Object *obj G_GNUC_UNUSED)
{
@@ -225,6 +284,8 @@ static void qio_channel_tls_finalize(Object *obj)
{
QIOChannelTLS *ioc = QIO_CHANNEL_TLS(obj);
+ qio_channel_tls_source_destroy(ioc);
+ qio_channel_tls_context_set(ioc, NULL);
object_unref(OBJECT(ioc->master));
qcrypto_tls_session_free(ioc->session);
}
--
2.14.3
next prev parent reply other threads:[~2018-02-28 5:07 UTC|newest]
Thread overview: 41+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-02-28 5:06 [Qemu-devel] [PATCH 00/14] qio: general non-default GMainContext support Peter Xu
2018-02-28 5:06 ` [Qemu-devel] [PATCH 01/14] chardev: fix leak in tcp_chr_telnet_init_io() Peter Xu
2018-02-28 9:26 ` Daniel P. Berrangé
2018-02-28 5:06 ` [Qemu-devel] [PATCH 02/14] qio: rename qio_task_thread_result Peter Xu
2018-02-28 9:26 ` Daniel P. Berrangé
2018-02-28 5:06 ` [Qemu-devel] [PATCH 03/14] qio: introduce qio_channel_add_watch_full() Peter Xu
2018-02-28 9:08 ` Daniel P. Berrangé
2018-02-28 12:44 ` Peter Xu
2018-02-28 12:47 ` Daniel P. Berrangé
2018-02-28 13:01 ` Peter Xu
2018-02-28 5:06 ` [Qemu-devel] [PATCH 04/14] migration: let incoming side use thread context Peter Xu
2018-02-28 9:10 ` Daniel P. Berrangé
2018-03-01 4:33 ` Peter Xu
2018-02-28 17:43 ` Dr. David Alan Gilbert
2018-03-01 2:53 ` Peter Xu
2018-03-01 9:58 ` Dr. David Alan Gilbert
2018-02-28 5:06 ` [Qemu-devel] [PATCH 05/14] qio: refactor net listener source operations Peter Xu
2018-02-28 5:06 ` [Qemu-devel] [PATCH 06/14] qio: store gsources for net listeners Peter Xu
2018-02-28 5:06 ` [Qemu-devel] [PATCH 07/14] qio/chardev: update net listener gcontext Peter Xu
2018-02-28 9:25 ` Daniel P. Berrangé
2018-02-28 12:52 ` Peter Xu
2018-02-28 13:06 ` Daniel P. Berrangé
2018-02-28 5:06 ` [Qemu-devel] [PATCH 08/14] chardev: allow telnet gsource to switch gcontext Peter Xu
2018-02-28 5:06 ` [Qemu-devel] [PATCH 09/14] qio: basic non-default context support for thread Peter Xu
2018-02-28 5:06 ` [Qemu-devel] [PATCH 10/14] qio: refcount QIOTask Peter Xu
2018-02-28 9:16 ` Daniel P. Berrangé
2018-02-28 12:54 ` Peter Xu
2018-02-28 13:07 ` Daniel P. Berrangé
2018-02-28 13:15 ` Peter Xu
2018-02-28 5:06 ` [Qemu-devel] [PATCH 11/14] qio/chardev: return QIOTask when connect async Peter Xu
2018-02-28 9:20 ` Daniel P. Berrangé
2018-02-28 13:07 ` Peter Xu
2018-02-28 5:06 ` [Qemu-devel] [PATCH 12/14] qio: move QIOTaskThreadData into QIOTask Peter Xu
2018-02-28 5:06 ` [Qemu-devel] [PATCH 13/14] qio: allow threaded qiotask to switch contexts Peter Xu
2018-02-28 9:23 ` Daniel P. Berrangé
2018-02-28 13:05 ` Peter Xu
2018-02-28 13:20 ` Daniel P. Berrangé
2018-03-01 8:49 ` Peter Xu
2018-02-28 5:06 ` Peter Xu [this message]
2018-02-28 13:22 ` [Qemu-devel] [PATCH 14/14] qio/chardev: specify gcontext for TLS handshake Daniel P. Berrangé
2018-03-01 6:28 ` Peter Xu
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20180228050633.7410-15-peterx@redhat.com \
--to=peterx@redhat.com \
--cc=armbru@redhat.com \
--cc=berrange@redhat.com \
--cc=dgilbert@redhat.com \
--cc=marcandre.lureau@redhat.com \
--cc=pbonzini@redhat.com \
--cc=qemu-devel@nongnu.org \
--cc=quintela@redhat.com \
--cc=stefanha@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).