// vim: ts=8 sw=2 smarttab
#include "ProtocolV2.h"
+#include "AsyncMessenger.h"
#include "common/errno.h"
-#include "AsyncConnection.h"
-#include "AsyncMessenger.h"
-#include "common/EventTrace.h"
-#include "include/random.h"
-
#define dout_subsys ceph_subsys_ms
#undef dout_prefix
#define dout_prefix _conn_prefix(_dout)
<< " l=" << connection->policy.lossy << ").";
}
-using CtPtr = Ct<ProtocolV2> *;
-
#define WRITE(B, C) write(CONTINUATION(C), B)
#define READ(L, C) read(CONTINUATION(C), L)
#define READB(L, B, C) read(CONTINUATION(C), L, B)
-// Constant to limit starting sequence number to 2^31. Nothing special about
-// it, just a big number. PLR
-#define SEQ_MASK 0x7fffffff
-
-const int ASYNC_COALESCE_THRESHOLD = 256;
-
-using namespace std;
-
-static void alloc_aligned_buffer(bufferlist &data, unsigned len, unsigned off) {
- // create a buffer to read into that matches the data alignment
- unsigned alloc_len = 0;
- unsigned left = len;
- unsigned head = 0;
- if (off & ~CEPH_PAGE_MASK) {
- // head
- alloc_len += CEPH_PAGE_SIZE;
- head = std::min<uint64_t>(CEPH_PAGE_SIZE - (off & ~CEPH_PAGE_MASK), left);
- left -= head;
- }
- alloc_len += left;
- bufferptr ptr(buffer::create_small_page_aligned(alloc_len));
- if (head) ptr.set_offset(CEPH_PAGE_SIZE - head);
- data.push_back(std::move(ptr));
-}
-
-/**
- * Protocol V2
- **/
+using CtPtr = Ct<ProtocolV2> *;
ProtocolV2::ProtocolV2(AsyncConnection *connection)
: Protocol(2, connection),
temp_buffer(nullptr),
- peer_addr_count(0),
- can_write(WriteStatus::NOWRITE),
- keepalive(false),
- connect_seq(0),
- peer_global_seq(0),
- msg_left(0),
- cur_msg_size(0),
- replacing(false),
- is_reset_from_peer(false),
- once_ready(false),
state(NONE),
- global_seq(0),
- authorizer(nullptr),
- wait_for_seq(false) {
+ bannerExchangeCallback(nullptr) {
temp_buffer = new char[4096];
}
-ProtocolV2::~ProtocolV2() {
- ceph_assert(out_q.empty());
- ceph_assert(sent.empty());
-
- delete[] temp_buffer;
-
- if (authorizer) {
- delete authorizer;
- }
-}
-
-void ProtocolV2::connect() {
- this->state = START_CONNECT;
-
- // reset connect state variables
- if (authorizer) {
- delete authorizer;
- authorizer = nullptr;
- }
- authorizer_buf.clear();
- memset(&connect_msg, 0, sizeof(connect_msg));
- memset(&connect_reply, 0, sizeof(connect_reply));
-
- global_seq = messenger->get_global_seq();
-}
-
-void ProtocolV2::accept() {
- this->state = START_ACCEPT;
-}
-
-bool ProtocolV2::is_connected() {
- return can_write.load() == WriteStatus::CANWRITE;
-}
-
-void ProtocolV2::stop() {
- ldout(cct, 20) << __func__ << dendl;
- if (state == CLOSED) {
- return;
- }
-
- if (connection->delay_state) connection->delay_state->flush();
-
- ldout(cct, 2) << __func__ << dendl;
- std::lock_guard<std::mutex> l(connection->write_lock);
-
- reset_recv_state();
- discard_out_queue();
-
- connection->_stop();
-
- can_write = WriteStatus::CLOSED;
- state = CLOSED;
-}
-
-void ProtocolV2::fault() {
- ldout(cct, 20) << __func__ << dendl;
-
- if (state == CLOSED || state == NONE) {
- ldout(cct, 10) << __func__ << " connection is already closed" << dendl;
- return;
- }
-
- if (connection->policy.lossy && state != START_CONNECT &&
- state != CONNECTING) {
- ldout(cct, 1) << __func__ << " on lossy channel, failing" << dendl;
- stop();
- connection->dispatch_queue->queue_reset(connection);
- return;
- }
-
- connection->write_lock.lock();
- can_write = WriteStatus::NOWRITE;
- is_reset_from_peer = false;
-
- // requeue sent items
- requeue_sent();
-
- if (!once_ready && out_q.empty() && state >= START_ACCEPT &&
- state <= ACCEPTING_WAIT_CONNECT_MSG_AUTH && !replacing) {
- ldout(cct, 10) << __func__ << " with nothing to send and in the half "
- << " accept state just closed" << dendl;
- connection->write_lock.unlock();
- stop();
- connection->dispatch_queue->queue_reset(connection);
- return;
- }
- replacing = false;
-
- connection->fault();
-
- reset_recv_state();
-
- if (connection->policy.standby && out_q.empty() && !keepalive &&
- state != WAIT) {
- ldout(cct, 10) << __func__ << " with nothing to send, going to standby"
- << dendl;
- state = STANDBY;
- connection->write_lock.unlock();
- return;
- }
-
- connection->write_lock.unlock();
-
- if ((state >= START_CONNECT && state <= CONNECTING_SEND_CONNECT_MSG) ||
- state == WAIT) {
- // backoff!
- if (state == WAIT) {
- backoff.set_from_double(cct->_conf->ms_max_backoff);
- } else if (backoff == utime_t()) {
- backoff.set_from_double(cct->_conf->ms_initial_backoff);
- } else {
- backoff += backoff;
- if (backoff > cct->_conf->ms_max_backoff)
- backoff.set_from_double(cct->_conf->ms_max_backoff);
- }
-
- global_seq = messenger->get_global_seq();
- state = START_CONNECT;
- connection->state = AsyncConnection::STATE_CONNECTING;
- ldout(cct, 10) << __func__ << " waiting " << backoff << dendl;
- // woke up again;
- connection->register_time_events.insert(
- connection->center->create_time_event(backoff.to_nsec() / 1000,
- connection->wakeup_handler));
- } else {
- // policy maybe empty when state is in accept
- if (connection->policy.server) {
- ldout(cct, 0) << __func__ << " server, going to standby" << dendl;
- state = STANDBY;
- } else {
- ldout(cct, 0) << __func__ << " initiating reconnect" << dendl;
- connect_seq++;
- global_seq = messenger->get_global_seq();
- state = START_CONNECT;
- connection->state = AsyncConnection::STATE_CONNECTING;
- }
- backoff = utime_t();
- connection->center->dispatch_event_external(connection->read_handler);
- }
-}
-
-void ProtocolV2::send_message(Message *m) {
- bufferlist bl;
- uint64_t f = connection->get_features();
+ProtocolV2::~ProtocolV2() { delete[] temp_buffer; }
- // TODO: Currently not all messages supports reencode like MOSDMap, so here
- // only let fast dispatch support messages prepare message
- bool can_fast_prepare = messenger->ms_can_fast_dispatch(m);
- if (can_fast_prepare) {
- prepare_send_message(f, m, bl);
- }
+void ProtocolV2::connect() { state = START_CONNECT; }
- std::lock_guard<std::mutex> l(connection->write_lock);
- // "features" changes will change the payload encoding
- if (can_fast_prepare &&
- (can_write == WriteStatus::NOWRITE || connection->get_features() != f)) {
- // ensure the correctness of message encoding
- bl.clear();
- m->clear_payload();
- ldout(cct, 5) << __func__ << " clear encoded buffer previous " << f
- << " != " << connection->get_features() << dendl;
- }
- if (can_write == WriteStatus::CLOSED) {
- ldout(cct, 10) << __func__ << " connection closed."
- << " Drop message " << m << dendl;
- m->put();
- } else {
- m->trace.event("async enqueueing message");
- out_q[m->get_priority()].emplace_back(std::move(bl), m);
- ldout(cct, 15) << __func__ << " inline write is denied, reschedule m=" << m
- << dendl;
- if (can_write != WriteStatus::REPLACING) {
- connection->center->dispatch_event_external(connection->write_handler);
- }
- }
-}
+void ProtocolV2::accept() { state = START_ACCEPT; }
-void ProtocolV2::prepare_send_message(uint64_t features, Message *m,
- bufferlist &bl) {
- ldout(cct, 20) << __func__ << " m " << *m << dendl;
+bool ProtocolV2::is_connected() { return false; }
- // associate message with Connection (for benefit of encode_payload)
- if (m->empty_payload()) {
- ldout(cct, 20) << __func__ << " encoding features " << features << " " << m
- << " " << *m << dendl;
- } else {
- ldout(cct, 20) << __func__ << " half-reencoding features " << features
- << " " << m << " " << *m << dendl;
- }
+void ProtocolV2::stop() {}
- // encode and copy out of *m
- m->encode(features, messenger->crcflags);
+void ProtocolV2::fault() { _fault(); }
- bl.append(m->get_payload());
- bl.append(m->get_middle());
- bl.append(m->get_data());
-}
+void ProtocolV2::send_message(Message *m) {}
-void ProtocolV2::send_keepalive() {
- ldout(cct, 10) << __func__ << dendl;
- std::lock_guard<std::mutex> l(connection->write_lock);
- if (can_write != WriteStatus::CLOSED) {
- keepalive = true;
- connection->center->dispatch_event_external(connection->write_handler);
- }
-}
+void ProtocolV2::send_keepalive() {}
void ProtocolV2::read_event() {
ldout(cct, 20) << __func__ << dendl;
+
switch (state) {
case START_CONNECT:
- CONTINUATION_RUN(CONTINUATION(send_client_banner));
+ CONTINUATION_RUN(CONTINUATION(start_client_banner_exchange));
break;
case START_ACCEPT:
- CONTINUATION_RUN(CONTINUATION(send_server_banner));
- break;
- case OPENED:
- CONTINUATION_RUN(CONTINUATION(wait_message));
- break;
- case THROTTLE_MESSAGE:
- CONTINUATION_RUN(CONTINUATION(throttle_message));
- break;
- case THROTTLE_BYTES:
- CONTINUATION_RUN(CONTINUATION(throttle_bytes));
- break;
- case THROTTLE_DISPATCH_QUEUE:
- CONTINUATION_RUN(CONTINUATION(throttle_dispatch_queue));
+ CONTINUATION_RUN(CONTINUATION(start_server_banner_exchange));
break;
default:
break;
}
}
-void ProtocolV2::write_event() {
- ldout(cct, 10) << __func__ << dendl;
- ssize_t r = 0;
-
- connection->write_lock.lock();
- if (can_write == WriteStatus::CANWRITE) {
- if (keepalive) {
- append_keepalive_or_ack();
- keepalive = false;
- }
-
- auto start = ceph::mono_clock::now();
- bool more;
- do {
- bufferlist data;
- Message *m = _get_next_outgoing(&data);
- if (!m) {
- break;
- }
-
- if (!connection->policy.lossy) {
- // put on sent list
- sent.push_back(m);
- m->get();
- }
- more = !out_q.empty();
- connection->write_lock.unlock();
-
- // send_message or requeue messages may not encode message
- if (!data.length()) {
- prepare_send_message(connection->get_features(), m, data);
- }
-
- r = write_message(m, data, more);
-
- connection->write_lock.lock();
- if (r == 0) {
- ;
- } else if (r < 0) {
- ldout(cct, 1) << __func__ << " send msg failed" << dendl;
- break;
- } else if (r > 0)
- break;
- } while (can_write == WriteStatus::CANWRITE);
- connection->write_lock.unlock();
-
- // if r > 0 mean data still lefted, so no need _try_send.
- if (r == 0) {
- uint64_t left = ack_left;
- if (left) {
- ceph_le64 s;
- s = in_seq;
- connection->outcoming_bl.append(CEPH_MSGR_TAG_ACK);
- connection->outcoming_bl.append((char *)&s, sizeof(s));
- ldout(cct, 10) << __func__ << " try send msg ack, acked " << left
- << " messages" << dendl;
- ack_left -= left;
- left = ack_left;
- r = connection->_try_send(left);
- } else if (is_queued()) {
- r = connection->_try_send();
- }
- }
-
- connection->logger->tinc(l_msgr_running_send_time,
- ceph::mono_clock::now() - start);
- if (r < 0) {
- ldout(cct, 1) << __func__ << " send msg failed" << dendl;
- connection->lock.lock();
- fault();
- connection->lock.unlock();
- return;
- }
- } else {
- connection->write_lock.unlock();
- connection->lock.lock();
- connection->write_lock.lock();
- if (state == STANDBY && !connection->policy.server && is_queued()) {
- ldout(cct, 10) << __func__ << " policy.server is false" << dendl;
- connection->_connect();
- } else if (connection->cs && state != NONE && state != CLOSED &&
- state != START_CONNECT) {
- r = connection->_try_send();
- if (r < 0) {
- ldout(cct, 1) << __func__ << " send outcoming bl failed" << dendl;
- connection->write_lock.unlock();
- fault();
- connection->lock.unlock();
- return;
- }
- }
- connection->write_lock.unlock();
- connection->lock.unlock();
- }
-}
-
-bool ProtocolV2::is_queued() {
- return !out_q.empty() || connection->is_queued();
-}
+void ProtocolV2::write_event() {}
-void ProtocolV2::run_continuation(CtPtr continuation) {
- CONTINUATION_RUN(continuation);
-}
+bool ProtocolV2::is_queued() { return false; }
CtPtr ProtocolV2::read(CONTINUATION_PARAM(next, ProtocolV2, char *, int),
int len, char *buffer) {
return nullptr;
}
-CtPtr ProtocolV2::ready() {
- ldout(cct, 25) << __func__ << dendl;
-
- // make sure no pending tick timer
- if (connection->last_tick_id) {
- connection->center->delete_time_event(connection->last_tick_id);
- }
- connection->last_tick_id = connection->center->create_time_event(
- connection->inactive_timeout_us, connection->tick_handler);
-
- connection->write_lock.lock();
- can_write = WriteStatus::CANWRITE;
- if (is_queued()) {
- connection->center->dispatch_event_external(connection->write_handler);
- }
- connection->write_lock.unlock();
- connection->maybe_start_delay_thread();
-
- state = OPENED;
- return wait_message();
-}
-
-CtPtr ProtocolV2::wait_message() {
- if (state != OPENED) { // must have changed due to a replace
- return nullptr;
- }
-
+CtPtr ProtocolV2::_banner_exchange(CtPtr callback) {
ldout(cct, 20) << __func__ << dendl;
+ bannerExchangeCallback = callback;
- return READ(sizeof(char), handle_message);
-}
-
-CtPtr ProtocolV2::handle_message(char *buffer, int r) {
- ldout(cct, 20) << __func__ << " r=" << r << dendl;
-
- if (r < 0) {
- ldout(cct, 1) << __func__ << " read tag failed" << dendl;
- return _fault();
- }
-
- char tag = buffer[0];
- ldout(cct, 20) << __func__ << " process tag " << (int)tag << dendl;
-
- if (tag == CEPH_MSGR_TAG_KEEPALIVE) {
- ldout(cct, 20) << __func__ << " got KEEPALIVE" << dendl;
- connection->set_last_keepalive(ceph_clock_now());
- } else if (tag == CEPH_MSGR_TAG_KEEPALIVE2) {
- return READ(sizeof(ceph_timespec), handle_keepalive2);
- } else if (tag == CEPH_MSGR_TAG_KEEPALIVE2_ACK) {
- return READ(sizeof(ceph_timespec), handle_keepalive2_ack);
- } else if (tag == CEPH_MSGR_TAG_ACK) {
- return READ(sizeof(ceph_le64), handle_tag_ack);
- } else if (tag == CEPH_MSGR_TAG_MSG) {
-#if defined(WITH_LTTNG) && defined(WITH_EVENTTRACE)
- ltt_recv_stamp = ceph_clock_now();
-#endif
- recv_stamp = ceph_clock_now();
- ldout(cct, 20) << __func__ << " begin MSG" << dendl;
- return READ(sizeof(ceph_msg_header), handle_message_header);
- } else if (tag == CEPH_MSGR_TAG_CLOSE) {
- ldout(cct, 20) << __func__ << " got CLOSE" << dendl;
- stop();
- } else {
- ldout(cct, 0) << __func__ << " bad tag " << (int)tag << dendl;
- return _fault();
- }
- return nullptr;
-}
-
-CtPtr ProtocolV2::handle_keepalive2(char *buffer, int r) {
- ldout(cct, 20) << __func__ << " r=" << r << dendl;
-
- if (r < 0) {
- ldout(cct, 1) << __func__ << " read keeplive timespec failed" << dendl;
- return _fault();
- }
-
- ldout(cct, 30) << __func__ << " got KEEPALIVE2 tag ..." << dendl;
-
- ceph_timespec *t;
- t = (ceph_timespec *)buffer;
- utime_t kp_t = utime_t(*t);
- connection->write_lock.lock();
- append_keepalive_or_ack(true, &kp_t);
- connection->write_lock.unlock();
-
- ldout(cct, 20) << __func__ << " got KEEPALIVE2 " << kp_t << dendl;
- connection->set_last_keepalive(ceph_clock_now());
-
- if (is_connected()) {
- connection->center->dispatch_event_external(connection->write_handler);
- }
-
- return CONTINUE(wait_message);
-}
-
-void ProtocolV2::append_keepalive_or_ack(bool ack, utime_t *tp) {
- ldout(cct, 10) << __func__ << dendl;
- if (ack) {
- ceph_assert(tp);
- struct ceph_timespec ts;
- tp->encode_timeval(&ts);
- connection->outcoming_bl.append(CEPH_MSGR_TAG_KEEPALIVE2_ACK);
- connection->outcoming_bl.append((char *)&ts, sizeof(ts));
- } else if (connection->has_feature(CEPH_FEATURE_MSGR_KEEPALIVE2)) {
- struct ceph_timespec ts;
- utime_t t = ceph_clock_now();
- t.encode_timeval(&ts);
- connection->outcoming_bl.append(CEPH_MSGR_TAG_KEEPALIVE2);
- connection->outcoming_bl.append((char *)&ts, sizeof(ts));
- } else {
- connection->outcoming_bl.append(CEPH_MSGR_TAG_KEEPALIVE);
- }
-}
+ __u64 supported_features = CEPH_MSGR2_SUPPORTED_FEATURES;
+ __u64 required_features = CEPH_MSGR2_REQUIRED_FEATURES;
-CtPtr ProtocolV2::handle_keepalive2_ack(char *buffer, int r) {
- ldout(cct, 20) << __func__ << " r=" << r << dendl;
-
- if (r < 0) {
- ldout(cct, 1) << __func__ << " read keeplive timespec failed" << dendl;
- return _fault();
- }
+ size_t banner_prefix_len = strlen(CEPH_BANNER_V2_PREFIX);
+ size_t banner_len = banner_prefix_len + 2 * sizeof(__u64);
+ char banner[banner_len];
+ memcpy(banner, CEPH_BANNER_V2_PREFIX, banner_prefix_len);
+ memcpy(banner + banner_prefix_len, (void *)&supported_features,
+ sizeof(__u64));
+ memcpy(banner + banner_prefix_len + sizeof(__u64), (void *)&required_features,
+ sizeof(__u64));
- ceph_timespec *t;
- t = (ceph_timespec *)buffer;
- connection->set_last_keepalive_ack(utime_t(*t));
- ldout(cct, 20) << __func__ << " got KEEPALIVE_ACK" << dendl;
+ bufferlist bl;
+ bl.append(banner, banner_len);
- return CONTINUE(wait_message);
+ return WRITE(bl, _banner_exchange_handle_write);
}
-CtPtr ProtocolV2::handle_tag_ack(char *buffer, int r) {
+CtPtr ProtocolV2::_banner_exchange_handle_write(int r) {
ldout(cct, 20) << __func__ << " r=" << r << dendl;
-
if (r < 0) {
- ldout(cct, 1) << __func__ << " read ack seq failed" << dendl;
+ ldout(cct, 1) << __func__ << " write banner failed r=" << r << " ("
+ << cpp_strerror(r) << ")" << dendl;
return _fault();
}
- ceph_le64 seq;
- seq = *(ceph_le64 *)buffer;
- ldout(cct, 20) << __func__ << " got ACK" << dendl;
-
- ldout(cct, 15) << __func__ << " got ack seq " << seq << dendl;
- // trim sent list
- static const int max_pending = 128;
- int i = 0;
- Message *pending[max_pending];
- connection->write_lock.lock();
- while (!sent.empty() && sent.front()->get_seq() <= seq && i < max_pending) {
- Message *m = sent.front();
- sent.pop_front();
- pending[i++] = m;
- ldout(cct, 10) << __func__ << " got ack seq " << seq
- << " >= " << m->get_seq() << " on " << m << " " << *m
- << dendl;
- }
- connection->write_lock.unlock();
- for (int k = 0; k < i; k++) {
- pending[k]->put();
- }
-
- return CONTINUE(wait_message);
+ unsigned banner_len = strlen(CEPH_BANNER_V2_PREFIX) + 2 * sizeof(__u64);
+ return READ(banner_len, _banner_exchange_handle_peer_banner);
}
-CtPtr ProtocolV2::handle_message_header(char *buffer, int r) {
+CtPtr ProtocolV2::_banner_exchange_handle_peer_banner(char *buffer, int r) {
ldout(cct, 20) << __func__ << " r=" << r << dendl;
if (r < 0) {
- ldout(cct, 1) << __func__ << " read message header failed" << dendl;
+ ldout(cct, 1) << __func__ << " read peer banner failed r=" << r << " ("
+ << cpp_strerror(r) << ")" << dendl;
return _fault();
}
- ldout(cct, 20) << __func__ << " got MSG header" << dendl;
-
- current_header = *((ceph_msg_header *)buffer);
+unsigned banner_prefix_len = strlen(CEPH_BANNER_V2_PREFIX);
- ldout(cct, 20) << __func__ << " got envelope type=" << current_header.type << " src "
- << entity_name_t(current_header.src) << " front=" << current_header.front_len
- << " data=" << current_header.data_len << " off " << current_header.data_off
- << dendl;
-
- if (messenger->crcflags & MSG_CRC_HEADER) {
- __u32 header_crc = 0;
- header_crc = ceph_crc32c(0, (unsigned char *)¤t_header,
- sizeof(current_header) - sizeof(current_header.crc));
- // verify header crc
- if (header_crc != current_header.crc) {
- ldout(cct, 0) << __func__ << " got bad header crc " << header_crc
- << " != " << current_header.crc << dendl;
+ if (memcmp(buffer, CEPH_BANNER_V2_PREFIX, banner_prefix_len)) {
+ if (memcmp(buffer, CEPH_BANNER, strlen(CEPH_BANNER))) {
+ lderr(cct) << __func__ << " peer " << *connection->peer_addrs
+ << " is using msgr V1 protocol" << dendl;
return _fault();
}
+ ldout(cct, 1) << __func__ << " accept peer sent bad banner" << dendl;
+ return _fault();
}
- // Reset state
- data_buf.clear();
- front.clear();
- middle.clear();
- data.clear();
-
- state = THROTTLE_MESSAGE;
- return CONTINUE(throttle_message);
-}
+ __u64 peer_supported_features;
+ __u64 peer_required_features;
-CtPtr ProtocolV2::throttle_message() {
- ldout(cct, 20) << __func__ << dendl;
+ peer_supported_features = *(__u64 *)(buffer + banner_prefix_len);
+ peer_required_features =
+ *(__u64 *)(buffer + banner_prefix_len + sizeof(__u64));
- if (connection->policy.throttler_messages) {
- ldout(cct, 10) << __func__ << " wants " << 1
- << " message from policy throttler "
- << connection->policy.throttler_messages->get_current()
- << "/" << connection->policy.throttler_messages->get_max()
- << dendl;
- if (!connection->policy.throttler_messages->get_or_fail()) {
- ldout(cct, 10) << __func__ << " wants 1 message from policy throttle "
- << connection->policy.throttler_messages->get_current()
- << "/" << connection->policy.throttler_messages->get_max()
- << " failed, just wait." << dendl;
- // following thread pool deal with th full message queue isn't a
- // short time, so we can wait a ms.
- if (connection->register_time_events.empty()) {
- connection->register_time_events.insert(
- connection->center->create_time_event(1000,
- connection->wakeup_handler));
- }
- return nullptr;
- }
- }
+ ldout(cct, 1) << __func__ << " peer " << *connection->peer_addrs
+ << " banner supported=" << std::hex << peer_supported_features
+ << " required=" << std::hex << peer_required_features << dendl;
- state = THROTTLE_BYTES;
- return CONTINUE(throttle_bytes);
-}
+ // Check feature bit compatibility
-CtPtr ProtocolV2::throttle_bytes() {
- ldout(cct, 20) << __func__ << dendl;
+ __u64 supported_features = CEPH_MSGR2_SUPPORTED_FEATURES;
+ __u64 required_features = CEPH_MSGR2_REQUIRED_FEATURES;
- cur_msg_size = current_header.front_len + current_header.middle_len +
- current_header.data_len;
- if (cur_msg_size) {
- if (connection->policy.throttler_bytes) {
- ldout(cct, 10) << __func__ << " wants " << cur_msg_size
- << " bytes from policy throttler "
- << connection->policy.throttler_bytes->get_current() << "/"
- << connection->policy.throttler_bytes->get_max() << dendl;
- if (!connection->policy.throttler_bytes->get_or_fail(cur_msg_size)) {
- ldout(cct, 10) << __func__ << " wants " << cur_msg_size
- << " bytes from policy throttler "
- << connection->policy.throttler_bytes->get_current()
- << "/" << connection->policy.throttler_bytes->get_max()
- << " failed, just wait." << dendl;
- // following thread pool deal with th full message queue isn't a
- // short time, so we can wait a ms.
- if (connection->register_time_events.empty()) {
- connection->register_time_events.insert(
- connection->center->create_time_event(
- 1000, connection->wakeup_handler));
- }
- return nullptr;
- }
- }
+ if ((required_features & peer_supported_features) != required_features) {
+ ldout(cct, 1) << __func__ << " peer does not support all required features"
+ << " required=" << std::hex << required_features
+ << " supported=" << std::hex << peer_supported_features
+ << dendl;
+ stop();
+ connection->dispatch_queue->queue_reset(connection);
+ return nullptr;
}
-
- state = THROTTLE_DISPATCH_QUEUE;
- return CONTINUE(throttle_dispatch_queue);
-}
-
-CtPtr ProtocolV2::throttle_dispatch_queue() {
- ldout(cct, 20) << __func__ << dendl;
-
- if (cur_msg_size) {
- if (!connection->dispatch_queue->dispatch_throttler.get_or_fail(
- cur_msg_size)) {
- ldout(cct, 10)
- << __func__ << " wants " << cur_msg_size
- << " bytes from dispatch throttle "
- << connection->dispatch_queue->dispatch_throttler.get_current() << "/"
- << connection->dispatch_queue->dispatch_throttler.get_max()
- << " failed, just wait." << dendl;
- // following thread pool deal with th full message queue isn't a
- // short time, so we can wait a ms.
- if (connection->register_time_events.empty()) {
- connection->register_time_events.insert(
- connection->center->create_time_event(1000,
- connection->wakeup_handler));
- }
- return nullptr;
- }
+ if ((supported_features & peer_required_features) != peer_required_features) {
+ ldout(cct, 1) << __func__ << " we do not support all peer required features"
+ << " required=" << std::hex << peer_required_features
+ << " supported=" << std::hex << supported_features << dendl;
+ stop();
+ connection->dispatch_queue->queue_reset(connection);
+ return nullptr;
}
- throttle_stamp = ceph_clock_now();
-
- state = READ_MESSAGE_FRONT;
- return read_message_front();
-}
-
-CtPtr ProtocolV2::read_message_front() {
- ldout(cct, 20) << __func__ << dendl;
+ this->peer_required_features = peer_required_features;
- unsigned front_len = current_header.front_len;
- if (front_len) {
- if (!front.length()) {
- front.push_back(buffer::create(front_len));
- }
- return READB(front_len, front.c_str(), handle_message_front);
- }
- return read_message_middle();
+ CtPtr callback;
+ callback = bannerExchangeCallback;
+ bannerExchangeCallback = nullptr;
+ ceph_assert(callback);
+ return callback;
}
-CtPtr ProtocolV2::handle_message_front(char *buffer, int r) {
- ldout(cct, 20) << __func__ << " r=" << r << dendl;
-
- if (r < 0) {
- ldout(cct, 1) << __func__ << " read message front failed" << dendl;
- return _fault();
- }
-
- ldout(cct, 20) << __func__ << " got front " << front.length() << dendl;
-
- return read_message_middle();
-}
+/* Client Protocol Methods */
-CtPtr ProtocolV2::read_message_middle() {
+CtPtr ProtocolV2::start_client_banner_exchange() {
ldout(cct, 20) << __func__ << dendl;
+ state = CONNECTING;
- if (current_header.middle_len) {
- if (!middle.length()) {
- middle.push_back(buffer::create(current_header.middle_len));
- }
- return READB(current_header.middle_len, middle.c_str(),
- handle_message_middle);
- }
-
- return read_message_data_prepare();
-}
-
-CtPtr ProtocolV2::handle_message_middle(char *buffer, int r) {
- ldout(cct, 20) << __func__ << " r" << r << dendl;
-
- if (r < 0) {
- ldout(cct, 1) << __func__ << " read message middle failed" << dendl;
- return _fault();
- }
-
- ldout(cct, 20) << __func__ << " got middle " << middle.length() << dendl;
-
- return read_message_data_prepare();
+ return _banner_exchange(CONTINUATION(post_client_banner_exchange));
}
-CtPtr ProtocolV2::read_message_data_prepare() {
+CtPtr ProtocolV2::post_client_banner_exchange() {
ldout(cct, 20) << __func__ << dendl;
- unsigned data_len = le32_to_cpu(current_header.data_len);
- unsigned data_off = le32_to_cpu(current_header.data_off);
-
- if (data_len) {
- // get a buffer
- map<ceph_tid_t, pair<bufferlist, int> >::iterator p =
- connection->rx_buffers.find(current_header.tid);
- if (p != connection->rx_buffers.end()) {
- ldout(cct, 10) << __func__ << " seleting rx buffer v " << p->second.second
- << " at offset " << data_off << " len "
- << p->second.first.length() << dendl;
- data_buf = p->second.first;
- // make sure it's big enough
- if (data_buf.length() < data_len)
- data_buf.push_back(buffer::create(data_len - data_buf.length()));
- data_blp = data_buf.begin();
- } else {
- ldout(cct, 20) << __func__ << " allocating new rx buffer at offset "
- << data_off << dendl;
- alloc_aligned_buffer(data_buf, data_len, data_off);
- data_blp = data_buf.begin();
- }
- }
-
- msg_left = data_len;
-
- return CONTINUE(read_message_data);
-}
-
-CtPtr ProtocolV2::read_message_data() {
- ldout(cct, 20) << __func__ << " msg_left=" << msg_left << dendl;
+ // at this point we can change how the client protocol behaves based on
+ // this->peer_required_features
- if (msg_left > 0) {
- bufferptr bp = data_blp.get_current_ptr();
- unsigned read_len = std::min(bp.length(), msg_left);
-
- return READB(read_len, bp.c_str(), handle_message_data);
- }
-
- return read_message_footer();
+ ceph_abort();
+ return nullptr;
}
-CtPtr ProtocolV2::handle_message_data(char *buffer, int r) {
- ldout(cct, 20) << __func__ << " r=" << r << dendl;
-
- if (r < 0) {
- ldout(cct, 1) << __func__ << " read data error " << dendl;
- return _fault();
- }
+/* Server Protocol Methods */
- bufferptr bp = data_blp.get_current_ptr();
- unsigned read_len = std::min(bp.length(), msg_left);
- ceph_assert(read_len < std::numeric_limits<int>::max());
- data_blp.advance(read_len);
- data.append(bp, 0, read_len);
- msg_left -= read_len;
+CtPtr ProtocolV2::start_server_banner_exchange() {
+ ldout(cct, 20) << __func__ << dendl;
+ state = ACCEPTING;
- return CONTINUE(read_message_data);
+ return _banner_exchange(CONTINUATION(post_server_banner_exchange));
}
-CtPtr ProtocolV2::read_message_footer() {
+CtPtr ProtocolV2::post_server_banner_exchange() {
ldout(cct, 20) << __func__ << dendl;
- state = READ_FOOTER_AND_DISPATCH;
-
- unsigned len;
- if (connection->has_feature(CEPH_FEATURE_MSG_AUTH)) {
- len = sizeof(ceph_msg_footer);
- } else {
- len = sizeof(ceph_msg_footer_old);
- }
+ // at this point we can change how the server protocol behaves based on
+ // this->peer_required_features
- return READ(len, handle_message_footer);
+ ceph_abort();
+ return nullptr;
}
-CtPtr ProtocolV2::handle_message_footer(char *buffer, int r) {
- ldout(cct, 20) << __func__ << " r=" << r << dendl;
-
- if (r < 0) {
- ldout(cct, 1) << __func__ << " read footer data error " << dendl;
- return _fault();
- }
-
- ceph_msg_footer footer;
- ceph_msg_footer_old old_footer;
-
- if (connection->has_feature(CEPH_FEATURE_MSG_AUTH)) {
- footer = *((ceph_msg_footer *)buffer);
- } else {
- old_footer = *((ceph_msg_footer_old *)buffer);
- footer.front_crc = old_footer.front_crc;
- footer.middle_crc = old_footer.middle_crc;
- footer.data_crc = old_footer.data_crc;
- footer.sig = 0;
- footer.flags = old_footer.flags;
- }
-
- int aborted = (footer.flags & CEPH_MSG_FOOTER_COMPLETE) == 0;
- ldout(cct, 10) << __func__ << " aborted = " << aborted << dendl;
- if (aborted) {
- ldout(cct, 0) << __func__ << " got " << front.length() << " + "
- << middle.length() << " + " << data.length()
- << " byte message.. ABORTED" << dendl;
- return _fault();
- }
-
- ldout(cct, 20) << __func__ << " got " << front.length() << " + "
- << middle.length() << " + " << data.length() << " byte message"
- << dendl;
- Message *message = decode_message(cct, messenger->crcflags, current_header,
- footer, front, middle, data, connection);
- if (!message) {
- ldout(cct, 1) << __func__ << " decode message failed " << dendl;
- return _fault();
- }
-
- //
- // Check the signature if one should be present. A zero return indicates
- // success. PLR
- //
-
- if (session_security.get() == NULL) {
- ldout(cct, 10) << __func__ << " no session security set" << dendl;
- } else {
- if (session_security->check_message_signature(message)) {
- ldout(cct, 0) << __func__ << " Signature check failed" << dendl;
- message->put();
- return _fault();
- }
- }
- message->set_byte_throttler(connection->policy.throttler_bytes);
- message->set_message_throttler(connection->policy.throttler_messages);
-
- // store reservation size in message, so we don't get confused
- // by messages entering the dispatch queue through other paths.
- message->set_dispatch_throttle_size(cur_msg_size);
-
- message->set_recv_stamp(recv_stamp);
- message->set_throttle_stamp(throttle_stamp);
- message->set_recv_complete_stamp(ceph_clock_now());
-
- // check received seq#. if it is old, drop the message.
- // note that incoming messages may skip ahead. this is convenient for the
- // client side queueing because messages can't be renumbered, but the (kernel)
- // client will occasionally pull a message out of the sent queue to send
- // elsewhere. in that case it doesn't matter if we "got" it or not.
- uint64_t cur_seq = in_seq;
- if (message->get_seq() <= cur_seq) {
- ldout(cct, 0) << __func__ << " got old message " << message->get_seq()
- << " <= " << cur_seq << " " << message << " " << *message
- << ", discarding" << dendl;
- message->put();
- if (connection->has_feature(CEPH_FEATURE_RECONNECT_SEQ) &&
- cct->_conf->ms_die_on_old_message) {
- ceph_assert(0 == "old msgs despite reconnect_seq feature");
- }
- return nullptr;
- }
- if (message->get_seq() > cur_seq + 1) {
- ldout(cct, 0) << __func__ << " missed message? skipped from seq "
- << cur_seq << " to " << message->get_seq() << dendl;
- if (cct->_conf->ms_die_on_skipped_message) {
- ceph_assert(0 == "skipped incoming seq");
- }
- }
-
- message->set_connection(connection);
-
-#if defined(WITH_LTTNG) && defined(WITH_EVENTTRACE)
- if (message->get_type() == CEPH_MSG_OSD_OP ||
- message->get_type() == CEPH_MSG_OSD_OPREPLY) {
- utime_t ltt_processed_stamp = ceph_clock_now();
- double usecs_elapsed =
- (ltt_processed_stamp.to_nsec() - ltt_recv_stamp.to_nsec()) / 1000;
- ostringstream buf;
- if (message->get_type() == CEPH_MSG_OSD_OP)
- OID_ELAPSED_WITH_MSG(message, usecs_elapsed, "TIME_TO_DECODE_OSD_OP",
- false);
- else
- OID_ELAPSED_WITH_MSG(message, usecs_elapsed, "TIME_TO_DECODE_OSD_OPREPLY",
- false);
- }
-#endif
-
- // note last received message.
- in_seq = message->get_seq();
- ldout(cct, 5) << " rx " << message->get_source() << " seq "
- << message->get_seq() << " " << message << " " << *message
- << dendl;
-
- bool need_dispatch_writer = true;
- if (!connection->policy.lossy) {
- ack_left++;
- need_dispatch_writer = true;
- }
-
- state = OPENED;
-
- connection->logger->inc(l_msgr_recv_messages);
- connection->logger->inc(
- l_msgr_recv_bytes,
- cur_msg_size + sizeof(ceph_msg_header) + sizeof(ceph_msg_footer));
-
- messenger->ms_fast_preprocess(message);
- auto fast_dispatch_time = ceph::mono_clock::now();
- connection->logger->tinc(l_msgr_running_recv_time,
- fast_dispatch_time - connection->recv_start_time);
- if (connection->delay_state) {
- double delay_period = 0;
- if (rand() % 10000 < cct->_conf->ms_inject_delay_probability * 10000.0) {
- delay_period =
- cct->_conf->ms_inject_delay_max * (double)(rand() % 10000) / 10000.0;
- ldout(cct, 1) << "queue_received will delay after "
- << (ceph_clock_now() + delay_period) << " on " << message
- << " " << *message << dendl;
- }
- connection->delay_state->queue(delay_period, message);
- } else if (messenger->ms_can_fast_dispatch(message)) {
- connection->lock.unlock();
- connection->dispatch_queue->fast_dispatch(message);
- connection->recv_start_time = ceph::mono_clock::now();
- connection->logger->tinc(l_msgr_running_fast_dispatch_time,
- connection->recv_start_time - fast_dispatch_time);
- connection->lock.lock();
- } else {
- connection->dispatch_queue->enqueue(message, message->get_priority(),
- connection->conn_id);
- }
-
- // clean up local buffer references
- data_buf.clear();
- front.clear();
- middle.clear();
- data.clear();
-
- if (need_dispatch_writer && connection->is_connected()) {
- connection->center->dispatch_event_external(connection->write_handler);
- }
-
- return CONTINUE(wait_message);
-}
-
-void ProtocolV2::session_reset() {
- ldout(cct, 10) << __func__ << " started" << dendl;
-
- std::lock_guard<std::mutex> l(connection->write_lock);
- if (connection->delay_state) {
- connection->delay_state->discard();
- }
-
- connection->dispatch_queue->discard_queue(connection->conn_id);
- discard_out_queue();
- // note: we need to clear outcoming_bl here, but session_reset may be
- // called by other thread, so let caller clear this itself!
- // outcoming_bl.clear();
-
- connection->dispatch_queue->queue_remote_reset(connection);
-
- randomize_out_seq();
-
- in_seq = 0;
- connect_seq = 0;
- // it's safe to directly set 0, double locked
- ack_left = 0;
- once_ready = false;
- can_write = WriteStatus::NOWRITE;
-}
-
-void ProtocolV2::randomize_out_seq() {
- if (connection->get_features() & CEPH_FEATURE_MSG_AUTH) {
- // Set out_seq to a random value, so CRC won't be predictable.
- auto rand_seq = ceph::util::generate_random_number<uint64_t>(0, SEQ_MASK);
- ldout(cct, 10) << __func__ << " randomize_out_seq " << rand_seq << dendl;
- out_seq = rand_seq;
- } else {
- // previously, seq #'s always started at 0.
- out_seq = 0;
- }
-}
-
-ssize_t ProtocolV2::write_message(Message *m, bufferlist &bl, bool more) {
- FUNCTRACE(cct);
- ceph_assert(connection->center->in_thread());
- m->set_seq(++out_seq);
-
- if (messenger->crcflags & MSG_CRC_HEADER) {
- m->calc_header_crc();
- }
-
- ceph_msg_header &header = m->get_header();
- ceph_msg_footer &footer = m->get_footer();
-
- // TODO: let sign_message could be reentry?
- // Now that we have all the crcs calculated, handle the
- // digital signature for the message, if the AsyncConnection has session
- // security set up. Some session security options do not
- // actually calculate and check the signature, but they should
- // handle the calls to sign_message and check_signature. PLR
- if (session_security.get() == NULL) {
- ldout(cct, 20) << __func__ << " no session security" << dendl;
- } else {
- if (session_security->sign_message(m)) {
- ldout(cct, 20) << __func__ << " failed to sign m=" << m
- << "): sig = " << footer.sig << dendl;
- } else {
- ldout(cct, 20) << __func__ << " signed m=" << m
- << "): sig = " << footer.sig << dendl;
- }
- }
-
- connection->outcoming_bl.append(CEPH_MSGR_TAG_MSG);
- connection->outcoming_bl.append((char *)&header, sizeof(header));
-
- ldout(cct, 20) << __func__ << " sending message type=" << header.type
- << " src " << entity_name_t(header.src)
- << " front=" << header.front_len << " data=" << header.data_len
- << " off " << header.data_off << dendl;
-
- if ((bl.length() <= ASYNC_COALESCE_THRESHOLD) && (bl.buffers().size() > 1)) {
- for (const auto &pb : bl.buffers()) {
- connection->outcoming_bl.append((char *)pb.c_str(), pb.length());
- }
- } else {
- connection->outcoming_bl.claim_append(bl);
- }
-
- // send footer; if receiver doesn't support signatures, use the old footer
- // format
- ceph_msg_footer_old old_footer;
- if (connection->has_feature(CEPH_FEATURE_MSG_AUTH)) {
- connection->outcoming_bl.append((char *)&footer, sizeof(footer));
- } else {
- if (messenger->crcflags & MSG_CRC_HEADER) {
- old_footer.front_crc = footer.front_crc;
- old_footer.middle_crc = footer.middle_crc;
- old_footer.data_crc = footer.data_crc;
- } else {
- old_footer.front_crc = old_footer.middle_crc = 0;
- }
- old_footer.data_crc =
- messenger->crcflags & MSG_CRC_DATA ? footer.data_crc : 0;
- old_footer.flags = footer.flags;
- connection->outcoming_bl.append((char *)&old_footer, sizeof(old_footer));
- }
-
- m->trace.event("async writing message");
- ldout(cct, 20) << __func__ << " sending " << m->get_seq() << " " << m
- << dendl;
- ssize_t total_send_size = connection->outcoming_bl.length();
- ssize_t rc = connection->_try_send(more);
- if (rc < 0) {
- ldout(cct, 1) << __func__ << " error sending " << m << ", "
- << cpp_strerror(rc) << dendl;
- } else {
- connection->logger->inc(
- l_msgr_send_bytes, total_send_size - connection->outcoming_bl.length());
- ldout(cct, 10) << __func__ << " sending " << m
- << (rc ? " continuely." : " done.") << dendl;
- }
- if (m->get_type() == CEPH_MSG_OSD_OP)
- OID_EVENT_TRACE_WITH_MSG(m, "SEND_MSG_OSD_OP_END", false);
- else if (m->get_type() == CEPH_MSG_OSD_OPREPLY)
- OID_EVENT_TRACE_WITH_MSG(m, "SEND_MSG_OSD_OPREPLY_END", false);
- m->put();
-
- return rc;
-}
-
-void ProtocolV2::requeue_sent() {
- if (sent.empty()) {
- return;
- }
-
- list<pair<bufferlist, Message *> > &rq = out_q[CEPH_MSG_PRIO_HIGHEST];
- out_seq -= sent.size();
- while (!sent.empty()) {
- Message *m = sent.back();
- sent.pop_back();
- ldout(cct, 10) << __func__ << " " << *m << " for resend "
- << " (" << m->get_seq() << ")" << dendl;
- rq.push_front(make_pair(bufferlist(), m));
- }
-}
-
-uint64_t ProtocolV2::discard_requeued_up_to(uint64_t out_seq, uint64_t seq) {
- ldout(cct, 10) << __func__ << " " << seq << dendl;
- std::lock_guard<std::mutex> l(connection->write_lock);
- if (out_q.count(CEPH_MSG_PRIO_HIGHEST) == 0) {
- return seq;
- }
- list<pair<bufferlist, Message *> > &rq = out_q[CEPH_MSG_PRIO_HIGHEST];
- uint64_t count = out_seq;
- while (!rq.empty()) {
- pair<bufferlist, Message *> p = rq.front();
- if (p.second->get_seq() == 0 || p.second->get_seq() > seq) break;
- ldout(cct, 10) << __func__ << " " << *(p.second) << " for resend seq "
- << p.second->get_seq() << " <= " << seq << ", discarding"
- << dendl;
- p.second->put();
- rq.pop_front();
- count++;
- }
- if (rq.empty()) out_q.erase(CEPH_MSG_PRIO_HIGHEST);
- return count;
-}
-
-/*
- * Tears down the message queues, and removes them from the
- * DispatchQueue Must hold write_lock prior to calling.
- */
-void ProtocolV2::discard_out_queue() {
- ldout(cct, 10) << __func__ << " started" << dendl;
-
- for (list<Message *>::iterator p = sent.begin(); p != sent.end(); ++p) {
- ldout(cct, 20) << __func__ << " discard " << *p << dendl;
- (*p)->put();
- }
- sent.clear();
- for (map<int, list<pair<bufferlist, Message *> > >::iterator p =
- out_q.begin();
- p != out_q.end(); ++p) {
- for (list<pair<bufferlist, Message *> >::iterator r = p->second.begin();
- r != p->second.end(); ++r) {
- ldout(cct, 20) << __func__ << " discard " << r->second << dendl;
- r->second->put();
- }
- }
- out_q.clear();
-}
-
-void ProtocolV2::reset_recv_state() {
- // clean up state internal variables and states
- if (state == CONNECTING_SEND_CONNECT_MSG) {
- if (authorizer) {
- delete authorizer;
- }
- authorizer = nullptr;
- }
-
- // clean read and write callbacks
- connection->pendingReadLen.reset();
- connection->writeCallback.reset();
-
- if (state > THROTTLE_MESSAGE && state <= READ_FOOTER_AND_DISPATCH &&
- connection->policy.throttler_messages) {
- ldout(cct, 10) << __func__ << " releasing " << 1
- << " message to policy throttler "
- << connection->policy.throttler_messages->get_current()
- << "/" << connection->policy.throttler_messages->get_max()
- << dendl;
- connection->policy.throttler_messages->put();
- }
- if (state > THROTTLE_BYTES && state <= READ_FOOTER_AND_DISPATCH) {
- if (connection->policy.throttler_bytes) {
- ldout(cct, 10) << __func__ << " releasing " << cur_msg_size
- << " bytes to policy throttler "
- << connection->policy.throttler_bytes->get_current() << "/"
- << connection->policy.throttler_bytes->get_max() << dendl;
- connection->policy.throttler_bytes->put(cur_msg_size);
- }
- }
- if (state > THROTTLE_DISPATCH_QUEUE && state <= READ_FOOTER_AND_DISPATCH) {
- ldout(cct, 10)
- << __func__ << " releasing " << cur_msg_size
- << " bytes to dispatch_queue throttler "
- << connection->dispatch_queue->dispatch_throttler.get_current() << "/"
- << connection->dispatch_queue->dispatch_throttler.get_max() << dendl;
- connection->dispatch_queue->dispatch_throttle_release(cur_msg_size);
- }
-}
-
-Message *ProtocolV2::_get_next_outgoing(bufferlist *bl) {
- Message *m = 0;
- if (!out_q.empty()) {
- map<int, list<pair<bufferlist, Message *> > >::reverse_iterator it =
- out_q.rbegin();
- ceph_assert(!it->second.empty());
- list<pair<bufferlist, Message *> >::iterator p = it->second.begin();
- m = p->second;
- if (bl) bl->swap(p->first);
- it->second.erase(p);
- if (it->second.empty()) out_q.erase(it->first);
- }
- return m;
-}
-
-/**
- * Client Protocol V2
- **/
-
-CtPtr ProtocolV2::send_client_banner() {
- ldout(cct, 20) << __func__ << dendl;
- state = CONNECTING;
-
- bufferlist bl;
- bl.append(CEPH_BANNER, strlen(CEPH_BANNER));
- return WRITE(bl, handle_client_banner_write);
-}
-
-CtPtr ProtocolV2::handle_client_banner_write(int r) {
- ldout(cct, 20) << __func__ << " r=" << r << dendl;
-
- if (r < 0) {
- ldout(cct, 1) << __func__ << " write client banner failed" << dendl;
- return _fault();
- }
- ldout(cct, 10) << __func__ << " connect write banner done: "
- << connection->get_peer_addr() << dendl;
-
- return wait_server_banner();
-}
-
-CtPtr ProtocolV2::wait_server_banner() {
- state = CONNECTING_WAIT_BANNER_AND_IDENTIFY;
-
- ldout(cct, 20) << __func__ << dendl;
-
- unsigned banner_len = strlen(CEPH_BANNER);
- unsigned need_len = banner_len + sizeof(uint32_t);
- return READ(need_len, handle_server_banner);
-}
-
-CtPtr ProtocolV2::handle_server_banner(char *buffer, int r) {
- ldout(cct, 20) << __func__ << " r=" << r << dendl;
-
- if (r < 0) {
- ldout(cct, 1) << __func__ << " read banner failed" << dendl;
- return _fault();
- }
-
- unsigned banner_len = strlen(CEPH_BANNER);
- if (memcmp(buffer, CEPH_BANNER, banner_len)) {
- ldout(cct, 0) << __func__ << " connect protocol error (bad banner) on peer "
- << connection->get_peer_addr() << dendl;
- return _fault();
- }
-
- peer_addr_count = *(uint32_t *)(buffer + banner_len);
- ldout(cct, 10) << __func__ << " server has " << peer_addr_count
- << " bytes of addresses" << dendl;
- unsigned need_len = peer_addr_count;
- return READ(need_len, handle_server_addrvec_and_identify);
-}
-
-CtPtr ProtocolV2::handle_server_addrvec_and_identify(char *buffer, int r) {
- ldout(cct, 20) << __func__ << " r=" << r << dendl;
-
- if (r < 0) {
- ldout(cct, 1) << __func__ << " read addrvec and identify addresses failed"
- << dendl;
- return _fault();
- }
-
- bufferlist bl;
- bl.append(buffer, peer_addr_count);
-
- entity_addr_t peer_addr;
- entity_addrvec_t paddrs;
- entity_addr_t peer_addr_for_me;
-
- auto p = bl.cbegin();
- try {
- decode(peer_addr, p);
- decode(paddrs, p);
- decode(peer_addr_for_me, p);
- } catch (const buffer::error &e) {
- lderr(cct) << __func__ << " decode peer addr failed " << dendl;
- return _fault();
- }
- ldout(cct, 20) << __func__ << " read peer addr " << peer_addr
- << " of " << paddrs
- << " on socket " << connection->cs.fd() << dendl;
-
- // Be somewhat flexible with our identity check. In particular, we
- // may be trying to connect to a v2 addr, and the remote may
- // identify themselves by several other addrs as well. This happens
- // with mon discovery.
- if (!connection->peer_addrs->contains(peer_addr)) {
- ldout(cct, 10) << __func__ << " server claims to be " << peer_addr
- << " (of " << paddrs << "), but we are trying to reach "
- << *connection->peer_addrs << dendl;
- return _fault();
- }
-
- connection->set_peer_addrs(paddrs);
-
- ldout(cct, 20) << __func__ << " peer addr for me is "
- << peer_addr_for_me << dendl;
- connection->lock.unlock();
- bool learned = messenger->learned_addr(peer_addr_for_me);
- if (cct->_conf->ms_inject_internal_delays &&
- cct->_conf->ms_inject_socket_failures) {
- if (rand() % cct->_conf->ms_inject_socket_failures == 0) {
- ldout(cct, 10) << __func__ << " sleep for "
- << cct->_conf->ms_inject_internal_delays << dendl;
- utime_t t;
- t.set_from_double(cct->_conf->ms_inject_internal_delays);
- t.sleep();
- }
- }
-
- connection->lock.lock();
- if (learned) {
- connection->socket_addr = peer_addr_for_me;
- }
- if (state != CONNECTING_WAIT_BANNER_AND_IDENTIFY) {
- ldout(cct, 1) << __func__
- << " state changed while learned_addr, mark_down or "
- << " replacing must be happened just now" << dendl;
- return nullptr;
- }
-
- bufferlist myaddrbl;
- if (messenger->get_myaddrs().front().is_msgr2()) {
- ldout(cct, 20) << "encoding myaddrs: " << messenger->get_myaddrs() << dendl;
- encode(messenger->get_myaddrs(), myaddrbl, -1ll);
- } else {
- entity_addr_t a = messenger->get_myaddrs().front();
- a.set_type(entity_addr_t::TYPE_MSGR2);
- ldout(cct, 20) << "encoding addr " << a
- << " instead of non-v2 myaddrs " << messenger->get_myaddrs()
- << dendl;
- encode(a, myaddrbl, -1ll);
- }
- bufferlist conbl;
- encode(myaddrbl, conbl);
- return WRITE(conbl, handle_my_addrs_write);
-}
-
-CtPtr ProtocolV2::handle_my_addrs_write(int r) {
- ldout(cct, 20) << __func__ << " r=" << r << dendl;
-
- if (r < 0) {
- ldout(cct, 2) << __func__ << " connect couldn't write my addr, "
- << cpp_strerror(r) << dendl;
- return _fault();
- }
- ldout(cct, 10) << __func__ << " connect sent my addrs "
- << messenger->get_myaddrs() << dendl;
-
- return CONTINUE(send_connect_message);
-}
-
-CtPtr ProtocolV2::send_connect_message() {
- state = CONNECTING_SEND_CONNECT_MSG;
-
- ldout(cct, 20) << __func__ << dendl;
-
- if (!authorizer) {
- authorizer =
- messenger->ms_deliver_get_authorizer(connection->peer_type);
- }
-
- ceph_msg_connect connect;
- connect.features = connection->policy.features_supported;
- connect.host_type = messenger->get_myname().type();
- connect.global_seq = global_seq;
- connect.connect_seq = connect_seq;
- connect.protocol_version =
- messenger->get_proto_version(connection->peer_type, true);
- connect.authorizer_protocol = authorizer ? authorizer->protocol : 0;
- connect.authorizer_len = authorizer ? authorizer->bl.length() : 0;
-
- if (authorizer) {
- ldout(cct, 10) << __func__
- << " connect_msg.authorizer_len=" << connect.authorizer_len
- << " protocol=" << connect.authorizer_protocol << dendl;
- }
-
- connect.flags = 0;
- if (connection->policy.lossy) {
- connect.flags |=
- CEPH_MSG_CONNECT_LOSSY; // this is fyi, actually, server decides!
- }
-
- bufferlist bl;
- bl.append((char *)&connect, sizeof(connect));
- if (authorizer) {
- bl.append(authorizer->bl.c_str(), authorizer->bl.length());
- }
-
- ldout(cct, 10) << __func__ << " connect sending gseq=" << global_seq
- << " cseq=" << connect_seq
- << " proto=" << connect.protocol_version << dendl;
-
- return WRITE(bl, handle_connect_message_write);
-}
-
-CtPtr ProtocolV2::handle_connect_message_write(int r) {
- ldout(cct, 20) << __func__ << " r=" << r << dendl;
-
- if (r < 0) {
- ldout(cct, 2) << __func__ << " connect couldn't send reply "
- << cpp_strerror(r) << dendl;
- return _fault();
- }
-
- ldout(cct, 20) << __func__
- << " connect wrote (self +) cseq, waiting for reply" << dendl;
-
- return wait_connect_reply();
-}
-
-CtPtr ProtocolV2::wait_connect_reply() {
- ldout(cct, 20) << __func__ << dendl;
-
- memset(&connect_reply, 0, sizeof(connect_reply));
- return READ(sizeof(connect_reply), handle_connect_reply_1);
-}
-
-CtPtr ProtocolV2::handle_connect_reply_1(char *buffer, int r) {
- ldout(cct, 20) << __func__ << " r=" << r << dendl;
-
- if (r < 0) {
- ldout(cct, 1) << __func__ << " read connect reply failed" << dendl;
- return _fault();
- }
-
- connect_reply = *((ceph_msg_connect_reply *)buffer);
-
- ldout(cct, 20) << __func__ << " connect got reply tag "
- << (int)connect_reply.tag << " connect_seq "
- << connect_reply.connect_seq << " global_seq "
- << connect_reply.global_seq << " proto "
- << connect_reply.protocol_version << " flags "
- << (int)connect_reply.flags << " features "
- << connect_reply.features << dendl;
-
- if (connect_reply.authorizer_len) {
- return wait_connect_reply_auth();
- }
-
- return handle_connect_reply_2();
-}
-
-CtPtr ProtocolV2::wait_connect_reply_auth() {
- ldout(cct, 20) << __func__ << dendl;
-
- ldout(cct, 10) << __func__
- << " reply.authorizer_len=" << connect_reply.authorizer_len
- << dendl;
-
- ceph_assert(connect_reply.authorizer_len < 4096);
-
- return READ(connect_reply.authorizer_len, handle_connect_reply_auth);
-}
-
-CtPtr ProtocolV2::handle_connect_reply_auth(char *buffer, int r) {
- ldout(cct, 20) << __func__ << " r=" << r << dendl;
-
- if (r < 0) {
- ldout(cct, 1) << __func__ << " read connect reply authorizer failed"
- << dendl;
- return _fault();
- }
-
- bufferlist authorizer_reply;
- authorizer_reply.append(buffer, connect_reply.authorizer_len);
-
- if (connect_reply.tag == CEPH_MSGR_TAG_CHALLENGE_AUTHORIZER) {
- ldout(cct, 10) << __func__ << " connect got auth challenge" << dendl;
- authorizer->add_challenge(cct, authorizer_reply);
- return CONTINUE(send_connect_message);
- }
-
- auto iter = authorizer_reply.cbegin();
- if (authorizer && !authorizer->verify_reply(iter)) {
- ldout(cct, 0) << __func__ << " failed verifying authorize reply" << dendl;
- return _fault();
- }
-
- return handle_connect_reply_2();
-}
-
-CtPtr ProtocolV2::handle_connect_reply_2() {
- ldout(cct, 20) << __func__ << dendl;
-
- if (connect_reply.tag == CEPH_MSGR_TAG_FEATURES) {
- ldout(cct, 0) << __func__ << " connect protocol feature mismatch, my "
- << std::hex << connection->policy.features_supported
- << " < peer " << connect_reply.features << " missing "
- << (connect_reply.features &
- ~connection->policy.features_supported)
- << std::dec << dendl;
- return _fault();
- }
-
- if (connect_reply.tag == CEPH_MSGR_TAG_BADPROTOVER) {
- ldout(cct, 0) << __func__ << " connect protocol version mismatch, my "
- << messenger->get_proto_version(connection->peer_type, true)
- << " != " << connect_reply.protocol_version << dendl;
- return _fault();
- }
-
- if (connect_reply.tag == CEPH_MSGR_TAG_BADAUTHORIZER) {
- ldout(cct, 0) << __func__ << " connect got BADAUTHORIZER" << dendl;
- return _fault();
- }
-
- if (connect_reply.tag == CEPH_MSGR_TAG_RESETSESSION) {
- ldout(cct, 0) << __func__ << " connect got RESETSESSION" << dendl;
- session_reset();
- connect_seq = 0;
-
- // see session_reset
- connection->outcoming_bl.clear();
-
- return CONTINUE(send_connect_message);
- }
-
- if (connect_reply.tag == CEPH_MSGR_TAG_RETRY_GLOBAL) {
- global_seq = messenger->get_global_seq(connect_reply.global_seq);
- ldout(cct, 5) << __func__ << " connect got RETRY_GLOBAL "
- << connect_reply.global_seq << " chose new " << global_seq
- << dendl;
- return CONTINUE(send_connect_message);
- }
-
- if (connect_reply.tag == CEPH_MSGR_TAG_RETRY_SESSION) {
- ceph_assert(connect_reply.connect_seq > connect_seq);
- ldout(cct, 5) << __func__ << " connect got RETRY_SESSION " << connect_seq
- << " -> " << connect_reply.connect_seq << dendl;
- connect_seq = connect_reply.connect_seq;
- return CONTINUE(send_connect_message);
- }
-
- if (connect_reply.tag == CEPH_MSGR_TAG_WAIT) {
- ldout(cct, 1) << __func__ << " connect got WAIT (connection race)" << dendl;
- state = WAIT;
- return _fault();
- }
-
- uint64_t feat_missing;
- feat_missing =
- connection->policy.features_required & ~(uint64_t)connect_reply.features;
- if (feat_missing) {
- ldout(cct, 1) << __func__ << " missing required features " << std::hex
- << feat_missing << std::dec << dendl;
- return _fault();
- }
-
- if (connect_reply.tag == CEPH_MSGR_TAG_SEQ) {
- ldout(cct, 10)
- << __func__
- << " got CEPH_MSGR_TAG_SEQ, reading acked_seq and writing in_seq"
- << dendl;
-
- return wait_ack_seq();
- }
-
- if (connect_reply.tag == CEPH_MSGR_TAG_READY) {
- ldout(cct, 10) << __func__ << " got CEPH_MSGR_TAG_READY " << dendl;
- }
-
- return client_ready();
-}
-
-CtPtr ProtocolV2::wait_ack_seq() {
- ldout(cct, 20) << __func__ << dendl;
-
- return READ(sizeof(uint64_t), handle_ack_seq);
-}
-
-CtPtr ProtocolV2::handle_ack_seq(char *buffer, int r) {
- ldout(cct, 20) << __func__ << " r=" << r << dendl;
-
- if (r < 0) {
- ldout(cct, 1) << __func__ << " read connect ack seq failed" << dendl;
- return _fault();
- }
-
- uint64_t newly_acked_seq = 0;
-
- newly_acked_seq = *((uint64_t *)buffer);
- ldout(cct, 2) << __func__ << " got newly_acked_seq " << newly_acked_seq
- << " vs out_seq " << out_seq << dendl;
- out_seq = discard_requeued_up_to(out_seq, newly_acked_seq);
-
- bufferlist bl;
- uint64_t s = in_seq;
- bl.append((char *)&s, sizeof(s));
-
- return WRITE(bl, handle_in_seq_write);
-}
-
-CtPtr ProtocolV2::handle_in_seq_write(int r) {
- ldout(cct, 20) << __func__ << " r=" << r << dendl;
-
- if (r < 0) {
- ldout(cct, 10) << __func__ << " failed to send in_seq " << dendl;
- return _fault();
- }
-
- ldout(cct, 10) << __func__ << " send in_seq done " << dendl;
-
- return client_ready();
-}
-
-CtPtr ProtocolV2::client_ready() {
- ldout(cct, 20) << __func__ << dendl;
-
- // hooray!
- peer_global_seq = connect_reply.global_seq;
- connection->policy.lossy = connect_reply.flags & CEPH_MSG_CONNECT_LOSSY;
-
- once_ready = true;
- connect_seq += 1;
- ceph_assert(connect_seq == connect_reply.connect_seq);
- backoff = utime_t();
- connection->set_features((uint64_t)connect_reply.features &
- (uint64_t)connection->policy.features_supported);
- ldout(cct, 10) << __func__ << " connect success " << connect_seq
- << ", lossy = " << connection->policy.lossy << ", features "
- << connection->get_features() << dendl;
-
- // If we have an authorizer, get a new AuthSessionHandler to deal with
- // ongoing security of the connection. PLR
- if (authorizer != NULL) {
- ldout(cct, 10) << __func__ << " setting up session_security with auth "
- << authorizer << dendl;
- session_security.reset(get_auth_session_handler(
- cct, authorizer->protocol, authorizer->session_key,
- connection->get_features()));
- } else {
- // We have no authorizer, so we shouldn't be applying security to messages
- // in this AsyncConnection. PLR
- ldout(cct, 10) << __func__ << " no authorizer, clearing session_security"
- << dendl;
- session_security.reset();
- }
-
- if (connection->delay_state) {
- ceph_assert(connection->delay_state->ready());
- }
- connection->dispatch_queue->queue_connect(connection);
- messenger->ms_deliver_handle_fast_connect(connection);
-
- return ready();
-}
-
-/**
- * Server Protocol V2
- **/
-
-CtPtr ProtocolV2::send_server_banner() {
- ldout(cct, 20) << __func__ << dendl;
- state = ACCEPTING;
-
- bufferlist bl;
-
- bl.append(CEPH_BANNER, strlen(CEPH_BANNER));
-
- bufferlist addrbl;
- encode(connection->socket_addr, addrbl, -1ll);
- encode(messenger->get_myaddrs(), addrbl, -1ll);
- encode(connection->target_addr, addrbl, -1ll);
-
- encode(addrbl, bl);
-
- connection->port = connection->target_addr.get_port();
-
- ldout(cct, 1) << __func__ << " sd=" << connection->cs.fd() << " "
- << connection->socket_addr
- << " myaddrs " << messenger->get_myaddrs()
- << " target_addr " << connection->target_addr
- << " addrs are " << addrbl.length() << dendl;
-
- return WRITE(bl, handle_server_banner_write);
-}
-
-CtPtr ProtocolV2::handle_server_banner_write(int r) {
- ldout(cct, 20) << __func__ << " r=" << r << dendl;
-
- if (r < 0) {
- ldout(cct, 1) << " write server banner failed" << dendl;
- return _fault();
- }
- ldout(cct, 10) << __func__ << " write banner and addr done: "
- << connection->get_peer_addr() << dendl;
-
- return wait_client_banner();
-}
-
-CtPtr ProtocolV2::wait_client_banner() {
- ldout(cct, 20) << __func__ << dendl;
-
- return READ(strlen(CEPH_BANNER) + sizeof(unsigned), handle_client_banner);
-}
-
-CtPtr ProtocolV2::handle_client_banner(char *buffer, int r) {
- ldout(cct, 20) << __func__ << " r=" << r << dendl;
-
- if (r < 0) {
- ldout(cct, 1) << __func__ << " read peer banner failed" << dendl;
- return _fault();
- }
-
- if (memcmp(buffer, CEPH_BANNER, strlen(CEPH_BANNER))) {
- ldout(cct, 1) << __func__ << " accept peer sent bad banner '" << buffer
- << "' (should be '" << CEPH_BANNER << "')" << dendl;
- return _fault();
- }
-
- peer_addr_count = *(unsigned *)(buffer + strlen(CEPH_BANNER));
- ldout(cct, 10) << __func__ << " peer has " << peer_addr_count << " addresses"
- << dendl;
-
- return READ(peer_addr_count, handle_client_addrvec);
-}
-
-CtPtr ProtocolV2::handle_client_addrvec(char *buffer, int r) {
- bufferlist addr_bl;
- entity_addrvec_t peer_addrs;
-
- addr_bl.append(buffer, peer_addr_count);
- try {
- auto ti = addr_bl.cbegin();
- decode(peer_addrs, ti);
- } catch (const buffer::error &e) {
- lderr(cct) << __func__ << " decode peer_addrs failed " << dendl;
- return _fault();
- }
-
- ldout(cct, 10) << __func__ << " accept peer addrs is " << peer_addrs << dendl;
- entity_addr_t *peer_addr_p = nullptr;
- for (auto &peer_addr : peer_addrs.v) {
- if (peer_addr.is_blank_ip()) {
- // peer apparently doesn't know what ip they have; figure it out for them.
- int port = peer_addr.get_port();
- peer_addr.set_sockaddr(connection->target_addr.get_sockaddr());
- peer_addr.set_port(port);
- ldout(cct, 0) << __func__ << " accept peer addr is really " << peer_addr
- << " (target is " << connection->target_addr << ")"
- << dendl;
- peer_addr_p = &peer_addr;
- }
- }
-
- connection->set_peer_addrs(peer_addrs); // so that connection_state gets set up
- if (peer_addr_p != nullptr) {
- connection->target_addr = *peer_addr_p;
- } else {
- connection->target_addr = peer_addrs.front();
- }
-
- return CONTINUE(wait_connect_message);
-}
-
-CtPtr ProtocolV2::wait_connect_message() {
- ldout(cct, 20) << __func__ << dendl;
-
- memset(&connect_msg, 0, sizeof(connect_msg));
- return READ(sizeof(connect_msg), handle_connect_message_1);
-}
-
-CtPtr ProtocolV2::handle_connect_message_1(char *buffer, int r) {
- ldout(cct, 20) << __func__ << " r=" << r << dendl;
-
- if (r < 0) {
- ldout(cct, 1) << __func__ << " read connect msg failed" << dendl;
- return _fault();
- }
-
- connect_msg = *((ceph_msg_connect *)buffer);
-
- state = ACCEPTING_WAIT_CONNECT_MSG_AUTH;
-
- if (connect_msg.authorizer_len) {
- return wait_connect_message_auth();
- }
-
- return handle_connect_message_2();
-}
-
-CtPtr ProtocolV2::wait_connect_message_auth() {
- ldout(cct, 20) << __func__ << dendl;
-
- if (!authorizer_buf.length()) {
- authorizer_buf.push_back(buffer::create(connect_msg.authorizer_len));
- }
- return READB(connect_msg.authorizer_len, authorizer_buf.c_str(),
- handle_connect_message_auth);
-}
-
-CtPtr ProtocolV2::handle_connect_message_auth(char *buffer, int r) {
- ldout(cct, 20) << __func__ << " r=" << r << dendl;
-
- if (r < 0) {
- ldout(cct, 1) << __func__ << " read connect authorizer failed" << dendl;
- return _fault();
- }
-
- return handle_connect_message_2();
-}
-
-CtPtr ProtocolV2::handle_connect_message_2() {
- ldout(cct, 20) << __func__ << dendl;
-
- ldout(cct, 20) << __func__ << " accept got peer connect_seq "
- << connect_msg.connect_seq << " global_seq "
- << connect_msg.global_seq << dendl;
-
- connection->set_peer_type(connect_msg.host_type);
- connection->policy = messenger->get_policy(connect_msg.host_type);
-
- ldout(cct, 10) << __func__ << " accept of host_type " << connect_msg.host_type
- << ", policy.lossy=" << connection->policy.lossy
- << " policy.server=" << connection->policy.server
- << " policy.standby=" << connection->policy.standby
- << " policy.resetcheck=" << connection->policy.resetcheck
- << dendl;
-
- ceph_msg_connect_reply reply;
- bufferlist authorizer_reply;
-
- memset(&reply, 0, sizeof(reply));
- reply.protocol_version =
- messenger->get_proto_version(connection->peer_type, false);
-
- // mismatch?
- ldout(cct, 10) << __func__ << " accept my proto " << reply.protocol_version
- << ", their proto " << connect_msg.protocol_version << dendl;
-
- if (connect_msg.protocol_version != reply.protocol_version) {
- return send_connect_message_reply(CEPH_MSGR_TAG_BADPROTOVER, reply,
- authorizer_reply);
- }
-
- // require signatures for cephx?
- if (connect_msg.authorizer_protocol == CEPH_AUTH_CEPHX) {
- if (connection->peer_type == CEPH_ENTITY_TYPE_OSD ||
- connection->peer_type == CEPH_ENTITY_TYPE_MDS) {
- if (cct->_conf->cephx_require_signatures ||
- cct->_conf->cephx_cluster_require_signatures) {
- ldout(cct, 10)
- << __func__
- << " using cephx, requiring MSG_AUTH feature bit for cluster"
- << dendl;
- connection->policy.features_required |= CEPH_FEATURE_MSG_AUTH;
- }
- } else {
- if (cct->_conf->cephx_require_signatures ||
- cct->_conf->cephx_service_require_signatures) {
- ldout(cct, 10)
- << __func__
- << " using cephx, requiring MSG_AUTH feature bit for service"
- << dendl;
- connection->policy.features_required |= CEPH_FEATURE_MSG_AUTH;
- }
- }
- }
-
- uint64_t feat_missing =
- connection->policy.features_required & ~(uint64_t)connect_msg.features;
- if (feat_missing) {
- ldout(cct, 1) << __func__ << " peer missing required features " << std::hex
- << feat_missing << std::dec << dendl;
- return send_connect_message_reply(CEPH_MSGR_TAG_FEATURES, reply,
- authorizer_reply);
- }
-
- connection->lock.unlock();
- ldout(cct, 10) << __func__ << " authorizor_protocol "
- << connect_msg.authorizer_protocol << " len "
- << authorizer_buf.length() << dendl;
- bool authorizer_valid;
- bool need_challenge = HAVE_FEATURE(connect_msg.features, CEPHX_V2);
- bool had_challenge = (bool)authorizer_challenge;
- if (!messenger->ms_deliver_verify_authorizer(
- connection, connection->peer_type, connect_msg.authorizer_protocol,
- authorizer_buf, authorizer_reply, authorizer_valid, session_key,
- need_challenge ? &authorizer_challenge : nullptr) ||
- !authorizer_valid) {
- connection->lock.lock();
- if (state != ACCEPTING_WAIT_CONNECT_MSG_AUTH) {
- ldout(cct, 1) << __func__
- << " state changed while accept, it must be mark_down"
- << dendl;
- ceph_assert(state == CLOSED);
- return _fault();
- }
-
- if (need_challenge && !had_challenge && authorizer_challenge) {
- ldout(cct, 10) << __func__ << ": challenging authorizer" << dendl;
- ceph_assert(authorizer_reply.length());
- return send_connect_message_reply(CEPH_MSGR_TAG_CHALLENGE_AUTHORIZER,
- reply, authorizer_reply);
- } else {
- ldout(cct, 0) << __func__ << ": got bad authorizer, auth_reply_len="
- << authorizer_reply.length() << dendl;
- session_security.reset();
- return send_connect_message_reply(CEPH_MSGR_TAG_BADAUTHORIZER, reply,
- authorizer_reply);
- }
- }
-
- // We've verified the authorizer for this AsyncConnection, so set up the
- // session security structure. PLR
- ldout(cct, 10) << __func__ << " accept setting up session_security." << dendl;
-
- // existing?
- AsyncConnectionRef existing = messenger->lookup_conn(*connection->peer_addrs);
- ldout(cct, 10) << __func__ << " existing " << existing
- << " on " << *connection->peer_addrs << dendl;
- connection->inject_delay();
-
- connection->lock.lock();
- if (state != ACCEPTING_WAIT_CONNECT_MSG_AUTH) {
- ldout(cct, 1) << __func__
- << " state changed while accept, it must be mark_down"
- << dendl;
- ceph_assert(state == CLOSED);
- return _fault();
- }
-
- if (existing == connection) {
- existing = nullptr;
- }
-
- if (existing) {
- // There is no possible that existing connection will acquire this
- // connection's lock
- existing->lock.lock(); // skip lockdep check (we are locking a second
- // AsyncConnection here)
-
- ProtocolV2 *exproto = dynamic_cast<ProtocolV2 *>(existing->protocol.get());
- ldout(cct,10) << __func__ << " existing=" << existing << " exproto="
- << exproto << dendl;
- assert(exproto->proto_type == 2);
-
- if (!exproto) {
- ldout(cct, 1) << __func__ << " existing=" << existing << dendl;
- ceph_assert(false);
- }
-
- if (exproto->state == CLOSED) {
- ldout(cct, 1) << __func__ << " existing " << existing
- << " already closed." << dendl;
- existing->lock.unlock();
- existing = nullptr;
-
- return open(reply, authorizer_reply);
- }
-
- if (exproto->replacing) {
- ldout(cct, 1) << __func__
- << " existing racing replace happened while replacing."
- << " existing_state="
- << connection->get_state_name(existing->state) << dendl;
- reply.global_seq = exproto->peer_global_seq;
- existing->lock.unlock();
- return send_connect_message_reply(CEPH_MSGR_TAG_RETRY_GLOBAL, reply,
- authorizer_reply);
- }
-
- if (connect_msg.global_seq < exproto->peer_global_seq) {
- ldout(cct, 10) << __func__ << " accept existing " << existing << ".gseq "
- << exproto->peer_global_seq << " > "
- << connect_msg.global_seq << ", RETRY_GLOBAL" << dendl;
- reply.global_seq = exproto->peer_global_seq; // so we can send it below..
- existing->lock.unlock();
- return send_connect_message_reply(CEPH_MSGR_TAG_RETRY_GLOBAL, reply,
- authorizer_reply);
- } else {
- ldout(cct, 10) << __func__ << " accept existing " << existing << ".gseq "
- << exproto->peer_global_seq
- << " <= " << connect_msg.global_seq << ", looks ok"
- << dendl;
- }
-
- if (existing->policy.lossy) {
- ldout(cct, 0)
- << __func__
- << " accept replacing existing (lossy) channel (new one lossy="
- << connection->policy.lossy << ")" << dendl;
- exproto->session_reset();
- return replace(existing, reply, authorizer_reply);
- }
-
- ldout(cct, 1) << __func__ << " accept connect_seq "
- << connect_msg.connect_seq
- << " vs existing csq=" << exproto->connect_seq
- << " existing_state="
- << connection->get_state_name(existing->state) << dendl;
-
- if (connect_msg.connect_seq == 0 && exproto->connect_seq > 0) {
- ldout(cct, 0)
- << __func__
- << " accept peer reset, then tried to connect to us, replacing"
- << dendl;
- // this is a hard reset from peer
- is_reset_from_peer = true;
- if (connection->policy.resetcheck) {
- exproto->session_reset(); // this resets out_queue, msg_ and
- // connect_seq #'s
- }
- return replace(existing, reply, authorizer_reply);
- }
-
- if (connect_msg.connect_seq < exproto->connect_seq) {
- // old attempt, or we sent READY but they didn't get it.
- ldout(cct, 10) << __func__ << " accept existing " << existing << ".cseq "
- << exproto->connect_seq << " > " << connect_msg.connect_seq
- << ", RETRY_SESSION" << dendl;
- reply.connect_seq = exproto->connect_seq + 1;
- existing->lock.unlock();
- return send_connect_message_reply(CEPH_MSGR_TAG_RETRY_SESSION, reply,
- authorizer_reply);
- }
-
- if (connect_msg.connect_seq == exproto->connect_seq) {
- // if the existing connection successfully opened, and/or
- // subsequently went to standby, then the peer should bump
- // their connect_seq and retry: this is not a connection race
- // we need to resolve here.
- if (exproto->state == OPENED || exproto->state == STANDBY) {
- ldout(cct, 10) << __func__ << " accept connection race, existing "
- << existing << ".cseq " << exproto->connect_seq
- << " == " << connect_msg.connect_seq
- << ", OPEN|STANDBY, RETRY_SESSION " << dendl;
- // if connect_seq both zero, dont stuck into dead lock. it's ok to
- // replace
- if (connection->policy.resetcheck && exproto->connect_seq == 0) {
- return replace(existing, reply, authorizer_reply);
- }
-
- reply.connect_seq = exproto->connect_seq + 1;
- existing->lock.unlock();
- return send_connect_message_reply(CEPH_MSGR_TAG_RETRY_SESSION, reply,
- authorizer_reply);
- }
-
- // connection race?
- if (connection->peer_addrs->legacy_addr() < messenger->get_myaddr() ||
- existing->policy.server) {
- // incoming wins
- ldout(cct, 10) << __func__ << " accept connection race, existing "
- << existing << ".cseq " << exproto->connect_seq
- << " == " << connect_msg.connect_seq
- << ", or we are server, replacing my attempt" << dendl;
- return replace(existing, reply, authorizer_reply);
- } else {
- // our existing outgoing wins
- ldout(messenger->cct, 10)
- << __func__ << " accept connection race, existing " << existing
- << ".cseq " << exproto->connect_seq
- << " == " << connect_msg.connect_seq << ", sending WAIT" << dendl;
- ceph_assert(connection->peer_addrs->legacy_addr() >
- messenger->get_myaddr());
- existing->lock.unlock();
- // make sure we follow through with opening the existing
- // connection (if it isn't yet open) since we know the peer
- // has something to send to us.
- existing->send_keepalive();
- return send_connect_message_reply(CEPH_MSGR_TAG_WAIT, reply,
- authorizer_reply);
- }
- }
-
- ceph_assert(connect_msg.connect_seq > exproto->connect_seq);
- ceph_assert(connect_msg.global_seq >= exproto->peer_global_seq);
- if (connection->policy.resetcheck && // RESETSESSION only used by servers;
- // peers do not reset each other
- exproto->connect_seq == 0) {
- ldout(cct, 0) << __func__ << " accept we reset (peer sent cseq "
- << connect_msg.connect_seq << ", " << existing
- << ".cseq = " << exproto->connect_seq
- << "), sending RESETSESSION " << dendl;
- existing->lock.unlock();
- return send_connect_message_reply(CEPH_MSGR_TAG_RESETSESSION, reply,
- authorizer_reply);
- }
-
- // reconnect
- ldout(cct, 10) << __func__ << " accept peer sent cseq "
- << connect_msg.connect_seq << " > " << exproto->connect_seq
- << dendl;
- return replace(existing, reply, authorizer_reply);
- } // existing
- else if (!replacing && connect_msg.connect_seq > 0) {
- // we reset, and they are opening a new session
- ldout(cct, 0) << __func__ << " accept we reset (peer sent cseq "
- << connect_msg.connect_seq << "), sending RESETSESSION"
- << dendl;
- return send_connect_message_reply(CEPH_MSGR_TAG_RESETSESSION, reply,
- authorizer_reply);
- } else {
- // new session
- ldout(cct, 10) << __func__ << " accept new session" << dendl;
- existing = nullptr;
- return open(reply, authorizer_reply);
- }
-}
-
-CtPtr ProtocolV2::send_connect_message_reply(char tag,
- ceph_msg_connect_reply &reply,
- bufferlist &authorizer_reply) {
- ldout(cct, 20) << __func__ << dendl;
- bufferlist reply_bl;
- reply.tag = tag;
- reply.features =
- ((uint64_t)connect_msg.features & connection->policy.features_supported) |
- connection->policy.features_required;
- reply.authorizer_len = authorizer_reply.length();
- reply_bl.append((char *)&reply, sizeof(reply));
-
- if (reply.authorizer_len) {
- reply_bl.append(authorizer_reply.c_str(), authorizer_reply.length());
- authorizer_reply.clear();
- }
-
- return WRITE(reply_bl, handle_connect_message_reply_write);
-}
-
-CtPtr ProtocolV2::handle_connect_message_reply_write(int r) {
- ldout(cct, 20) << __func__ << " r=" << r << dendl;
-
- if (r < 0) {
- ldout(cct, 1) << " write connect message reply failed" << dendl;
- connection->inject_delay();
- return _fault();
- }
-
- return CONTINUE(wait_connect_message);
-}
-
-CtPtr ProtocolV2::replace(AsyncConnectionRef existing,
- ceph_msg_connect_reply &reply,
- bufferlist &authorizer_reply) {
- ldout(cct, 10) << __func__ << " accept replacing " << existing << dendl;
-
- connection->inject_delay();
- if (existing->policy.lossy) {
- // disconnect from the Connection
- ldout(cct, 1) << __func__ << " replacing on lossy channel, failing existing"
- << dendl;
- existing->protocol->stop();
- existing->dispatch_queue->queue_reset(existing.get());
- } else {
- ceph_assert(can_write == WriteStatus::NOWRITE);
- existing->write_lock.lock();
-
- ProtocolV2 *exproto = dynamic_cast<ProtocolV2 *>(existing->protocol.get());
-
- // reset the in_seq if this is a hard reset from peer,
- // otherwise we respect our original connection's value
- if (is_reset_from_peer) {
- exproto->is_reset_from_peer = true;
- }
-
- connection->center->delete_file_event(connection->cs.fd(),
- EVENT_READABLE | EVENT_WRITABLE);
-
- if (existing->delay_state) {
- existing->delay_state->flush();
- ceph_assert(!connection->delay_state);
- }
- exproto->reset_recv_state();
-
- exproto->connect_msg.features = connect_msg.features;
-
- auto temp_cs = std::move(connection->cs);
- EventCenter *new_center = connection->center;
- Worker *new_worker = connection->worker;
- // avoid _stop shutdown replacing socket
- // queue a reset on the new connection, which we're dumping for the old
- stop();
-
- connection->dispatch_queue->queue_reset(connection);
- ldout(messenger->cct, 1)
- << __func__ << " stop myself to swap existing" << dendl;
- exproto->can_write = WriteStatus::REPLACING;
- exproto->replacing = true;
- existing->state_offset = 0;
- // avoid previous thread modify event
- exproto->state = NONE;
- existing->state = AsyncConnection::STATE_NONE;
- // Discard existing prefetch buffer in `recv_buf`
- existing->recv_start = existing->recv_end = 0;
- // there shouldn't exist any buffer
- ceph_assert(connection->recv_start == connection->recv_end);
-
- exproto->authorizer_challenge.reset();
-
- auto deactivate_existing = std::bind(
- [existing, new_worker, new_center, exproto, reply,
- authorizer_reply](ConnectedSocket &cs) mutable {
- // we need to delete time event in original thread
- {
- std::lock_guard<std::mutex> l(existing->lock);
- existing->write_lock.lock();
- exproto->requeue_sent();
- existing->outcoming_bl.clear();
- existing->open_write = false;
- existing->write_lock.unlock();
- if (exproto->state == NONE) {
- existing->shutdown_socket();
- existing->cs = std::move(cs);
- existing->worker->references--;
- new_worker->references++;
- existing->logger = new_worker->get_perf_counter();
- existing->worker = new_worker;
- existing->center = new_center;
- if (existing->delay_state)
- existing->delay_state->set_center(new_center);
- } else if (exproto->state == CLOSED) {
- auto back_to_close =
- std::bind([](ConnectedSocket &cs) mutable { cs.close(); },
- std::move(cs));
- new_center->submit_to(new_center->get_id(),
- std::move(back_to_close), true);
- return;
- } else {
- ceph_abort();
- }
- }
-
- // Before changing existing->center, it may already exists some
- // events in existing->center's queue. Then if we mark down
- // `existing`, it will execute in another thread and clean up
- // connection. Previous event will result in segment fault
- auto transfer_existing = [existing, exproto, reply,
- authorizer_reply]() mutable {
- std::lock_guard<std::mutex> l(existing->lock);
- if (exproto->state == CLOSED) return;
- ceph_assert(exproto->state == NONE);
-
- existing->state = AsyncConnection::STATE_CONNECTION_ESTABLISHED;
- exproto->state = ACCEPTING;
-
- existing->center->create_file_event(
- existing->cs.fd(), EVENT_READABLE, existing->read_handler);
- reply.global_seq = exproto->peer_global_seq;
- exproto->run_continuation(exproto->send_connect_message_reply(
- CEPH_MSGR_TAG_RETRY_GLOBAL, reply, authorizer_reply));
- };
- if (existing->center->in_thread())
- transfer_existing();
- else
- existing->center->submit_to(existing->center->get_id(),
- std::move(transfer_existing), true);
- },
- std::move(temp_cs));
-
- existing->center->submit_to(existing->center->get_id(),
- std::move(deactivate_existing), true);
- existing->write_lock.unlock();
- existing->lock.unlock();
- return nullptr;
- }
- existing->lock.unlock();
-
- return open(reply, authorizer_reply);
-}
-
-CtPtr ProtocolV2::open(ceph_msg_connect_reply &reply,
- bufferlist &authorizer_reply) {
- ldout(cct, 20) << __func__ << dendl;
-
- connect_seq = connect_msg.connect_seq + 1;
- peer_global_seq = connect_msg.global_seq;
- ldout(cct, 10) << __func__ << " accept success, connect_seq = " << connect_seq
- << " in_seq=" << in_seq << ", sending READY" << dendl;
-
- // if it is a hard reset from peer, we don't need a round-trip to negotiate
- // in/out sequence
- if ((connect_msg.features & CEPH_FEATURE_RECONNECT_SEQ) &&
- !is_reset_from_peer) {
- reply.tag = CEPH_MSGR_TAG_SEQ;
- wait_for_seq = true;
- } else {
- reply.tag = CEPH_MSGR_TAG_READY;
- wait_for_seq = false;
- out_seq = discard_requeued_up_to(out_seq, 0);
- is_reset_from_peer = false;
- in_seq = 0;
- }
-
- // send READY reply
- reply.features = connection->policy.features_supported;
- reply.global_seq = messenger->get_global_seq();
- reply.connect_seq = connect_seq;
- reply.flags = 0;
- reply.authorizer_len = authorizer_reply.length();
- if (connection->policy.lossy) {
- reply.flags = reply.flags | CEPH_MSG_CONNECT_LOSSY;
- }
-
- connection->set_features((uint64_t)reply.features &
- (uint64_t)connect_msg.features);
- ldout(cct, 10) << __func__ << " accept features "
- << connection->get_features() << " authorizer_protocol "
- << connect_msg.authorizer_protocol << dendl;
-
- session_security.reset(
- get_auth_session_handler(cct, connect_msg.authorizer_protocol,
- session_key, connection->get_features()));
-
- bufferlist reply_bl;
- reply_bl.append((char *)&reply, sizeof(reply));
-
- if (reply.authorizer_len) {
- reply_bl.append(authorizer_reply.c_str(), authorizer_reply.length());
- }
-
- if (reply.tag == CEPH_MSGR_TAG_SEQ) {
- uint64_t s = in_seq;
- reply_bl.append((char *)&s, sizeof(s));
- }
-
- connection->lock.unlock();
- // Because "replacing" will prevent other connections preempt this addr,
- // it's safe that here we don't acquire Connection's lock
- ssize_t r = messenger->accept_conn(connection);
-
- connection->inject_delay();
-
- connection->lock.lock();
- replacing = false;
- if (r < 0) {
- ldout(cct, 1) << __func__ << " existing race replacing process for addr = "
- << connection->peer_addrs->legacy_addr()
- << " just fail later one(this)" << dendl;
- ldout(cct, 10) << "accept fault after register" << dendl;
- connection->inject_delay();
- return _fault();
- }
- if (state != ACCEPTING_WAIT_CONNECT_MSG_AUTH) {
- ldout(cct, 1) << __func__
- << " state changed while accept_conn, it must be mark_down"
- << dendl;
- ceph_assert(state == CLOSED || state == NONE);
- ldout(cct, 10) << "accept fault after register" << dendl;
- messenger->unregister_conn(connection);
- connection->inject_delay();
- return _fault();
- }
-
- return WRITE(reply_bl, handle_ready_connect_message_reply_write);
-}
-
-CtPtr ProtocolV2::handle_ready_connect_message_reply_write(int r) {
- ldout(cct, 20) << __func__ << " r=" << r << dendl;
-
- if (r < 0) {
- ldout(cct, 1) << __func__ << " write ready connect message reply failed"
- << dendl;
- return _fault();
- }
-
- // notify
- connection->dispatch_queue->queue_accept(connection);
- messenger->ms_deliver_handle_fast_accept(connection);
- once_ready = true;
-
- state = ACCEPTING_HANDLED_CONNECT_MSG;
-
- if (wait_for_seq) {
- return wait_seq();
- }
-
- return server_ready();
-}
-
-CtPtr ProtocolV2::wait_seq() {
- ldout(cct, 20) << __func__ << dendl;
-
- return READ(sizeof(uint64_t), handle_seq);
-}
-
-CtPtr ProtocolV2::handle_seq(char *buffer, int r) {
- ldout(cct, 20) << __func__ << " r=" << r << dendl;
-
- if (r < 0) {
- ldout(cct, 1) << __func__ << " read ack seq failed" << dendl;
- return _fault();
- }
-
- uint64_t newly_acked_seq = *(uint64_t *)buffer;
- ldout(cct, 2) << __func__ << " accept get newly_acked_seq " << newly_acked_seq
- << dendl;
- out_seq = discard_requeued_up_to(out_seq, newly_acked_seq);
-
- return server_ready();
-}
-
-CtPtr ProtocolV2::server_ready() {
- ldout(cct, 20) << __func__ << " session_security is " << session_security
- << dendl;
-
- ldout(cct, 20) << __func__ << " accept done" << dendl;
- memset(&connect_msg, 0, sizeof(connect_msg));
-
- if (connection->delay_state) {
- ceph_assert(connection->delay_state->ready());
- }
-
- return ready();
-}