123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455 |
- /* Copyright (c) 2001-2004, Roger Dingledine.
- * Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
- * Copyright (c) 2007-2019, The Tor Project, Inc. */
- /* See LICENSE for licensing information */
- #include "core/or/or.h"
- #include "lib/thread/threads.h"
- #include "core/or/onion.h"
- #include "lib/evloop/workqueue.h"
- #include "lib/crypt_ops/crypto_curve25519.h"
- #include "lib/crypt_ops/crypto_rand.h"
- #include "lib/net/alertsock.h"
- #include "lib/evloop/compat_libevent.h"
- #include "lib/intmath/weakrng.h"
- #include "lib/crypt_ops/crypto_init.h"
- #include <stdio.h>
- #define MAX_INFLIGHT (1<<16)
- static int opt_verbose = 0;
- static int opt_n_threads = 8;
- static int opt_n_items = 10000;
- static int opt_n_inflight = 1000;
- static int opt_n_lowwater = 250;
- static int opt_n_cancel = 0;
- static int opt_ratio_rsa = 5;
- #ifdef TRACK_RESPONSES
- tor_mutex_t bitmap_mutex;
- int handled_len;
- bitarray_t *handled;
- #endif
- typedef struct state_s {
- int magic;
- int n_handled;
- crypto_pk_t *rsa;
- curve25519_secret_key_t ecdh;
- int is_shutdown;
- } state_t;
- typedef struct rsa_work_s {
- int serial;
- uint8_t msg[128];
- uint8_t msglen;
- } rsa_work_t;
- typedef struct ecdh_work_s {
- int serial;
- union {
- curve25519_public_key_t pk;
- uint8_t msg[32];
- } u;
- } ecdh_work_t;
- static void
- mark_handled(int serial)
- {
- #ifdef TRACK_RESPONSES
- tor_mutex_acquire(&bitmap_mutex);
- tor_assert(serial < handled_len);
- tor_assert(! bitarray_is_set(handled, serial));
- bitarray_set(handled, serial);
- tor_mutex_release(&bitmap_mutex);
- #else /* !(defined(TRACK_RESPONSES)) */
- (void)serial;
- #endif /* defined(TRACK_RESPONSES) */
- }
- static workqueue_reply_t
- workqueue_do_rsa(void *state, void *work)
- {
- rsa_work_t *rw = work;
- state_t *st = state;
- crypto_pk_t *rsa = st->rsa;
- uint8_t sig[256];
- int len;
- tor_assert(st->magic == 13371337);
- len = crypto_pk_private_sign(rsa, (char*)sig, 256,
- (char*)rw->msg, rw->msglen);
- if (len < 0) {
- rw->msglen = 0;
- return WQ_RPL_ERROR;
- }
- memset(rw->msg, 0, sizeof(rw->msg));
- rw->msglen = len;
- memcpy(rw->msg, sig, len);
- ++st->n_handled;
- mark_handled(rw->serial);
- return WQ_RPL_REPLY;
- }
- static workqueue_reply_t
- workqueue_do_shutdown(void *state, void *work)
- {
- (void)state;
- (void)work;
- crypto_pk_free(((state_t*)state)->rsa);
- tor_free(state);
- return WQ_RPL_SHUTDOWN;
- }
- static workqueue_reply_t
- workqueue_do_ecdh(void *state, void *work)
- {
- ecdh_work_t *ew = work;
- uint8_t output[CURVE25519_OUTPUT_LEN];
- state_t *st = state;
- tor_assert(st->magic == 13371337);
- curve25519_handshake(output, &st->ecdh, &ew->u.pk);
- memcpy(ew->u.msg, output, CURVE25519_OUTPUT_LEN);
- ++st->n_handled;
- mark_handled(ew->serial);
- return WQ_RPL_REPLY;
- }
- static workqueue_reply_t
- workqueue_shutdown_error(void *state, void *work)
- {
- (void)state;
- (void)work;
- return WQ_RPL_REPLY;
- }
- static void *
- new_state(void *arg)
- {
- state_t *st;
- (void)arg;
- st = tor_malloc(sizeof(*st));
- /* Every thread gets its own keys. not a problem for benchmarking */
- st->rsa = crypto_pk_new();
- if (crypto_pk_generate_key_with_bits(st->rsa, 1024) < 0) {
- crypto_pk_free(st->rsa);
- tor_free(st);
- return NULL;
- }
- curve25519_secret_key_generate(&st->ecdh, 0);
- st->magic = 13371337;
- return st;
- }
- static void
- free_state(void *arg)
- {
- state_t *st = arg;
- crypto_pk_free(st->rsa);
- tor_free(st);
- }
- static tor_weak_rng_t weak_rng;
- static int n_sent = 0;
- static int rsa_sent = 0;
- static int ecdh_sent = 0;
- static int n_received_previously = 0;
- static int n_received = 0;
- static int no_shutdown = 0;
- #ifdef TRACK_RESPONSES
- bitarray_t *received;
- #endif
- static void
- handle_reply(void *arg)
- {
- #ifdef TRACK_RESPONSES
- rsa_work_t *rw = arg; /* Naughty cast, but only looking at serial. */
- tor_assert(! bitarray_is_set(received, rw->serial));
- bitarray_set(received,rw->serial);
- #endif
- tor_free(arg);
- ++n_received;
- }
- /* This should never get called. */
- static void
- handle_reply_shutdown(void *arg)
- {
- (void)arg;
- no_shutdown = 1;
- }
- static workqueue_entry_t *
- add_work(threadpool_t *tp)
- {
- int add_rsa =
- opt_ratio_rsa == 0 ||
- tor_weak_random_range(&weak_rng, opt_ratio_rsa) == 0;
- if (add_rsa) {
- rsa_work_t *w = tor_malloc_zero(sizeof(*w));
- w->serial = n_sent++;
- crypto_rand((char*)w->msg, 20);
- w->msglen = 20;
- ++rsa_sent;
- return threadpool_queue_work_priority(tp,
- WQ_PRI_MED,
- workqueue_do_rsa, handle_reply, w);
- } else {
- ecdh_work_t *w = tor_malloc_zero(sizeof(*w));
- w->serial = n_sent++;
- /* Not strictly right, but this is just for benchmarks. */
- crypto_rand((char*)w->u.pk.public_key, 32);
- ++ecdh_sent;
- return threadpool_queue_work(tp, workqueue_do_ecdh, handle_reply, w);
- }
- }
- static int n_failed_cancel = 0;
- static int n_successful_cancel = 0;
- static int
- add_n_work_items(threadpool_t *tp, int n)
- {
- int n_queued = 0;
- int n_try_cancel = 0, i;
- workqueue_entry_t **to_cancel;
- workqueue_entry_t *ent;
- // We'll choose randomly which entries to cancel.
- to_cancel = tor_calloc(opt_n_cancel, sizeof(workqueue_entry_t*));
- while (n_queued++ < n) {
- ent = add_work(tp);
- if (! ent) {
- puts("Z");
- tor_libevent_exit_loop_after_delay(tor_libevent_get_base(), NULL);
- return -1;
- }
- if (n_try_cancel < opt_n_cancel) {
- to_cancel[n_try_cancel++] = ent;
- } else {
- int p = tor_weak_random_range(&weak_rng, n_queued);
- if (p < n_try_cancel) {
- to_cancel[p] = ent;
- }
- }
- }
- for (i = 0; i < n_try_cancel; ++i) {
- void *work = workqueue_entry_cancel(to_cancel[i]);
- if (! work) {
- n_failed_cancel++;
- } else {
- n_successful_cancel++;
- tor_free(work);
- }
- }
- tor_free(to_cancel);
- return 0;
- }
- static int shutting_down = 0;
- static void
- replysock_readable_cb(threadpool_t *tp)
- {
- if (n_received_previously == n_received)
- return;
- n_received_previously = n_received;
- if (opt_verbose) {
- printf("%d / %d", n_received, n_sent);
- if (opt_n_cancel)
- printf(" (%d cancelled, %d uncancellable)",
- n_successful_cancel, n_failed_cancel);
- puts("");
- }
- #ifdef TRACK_RESPONSES
- tor_mutex_acquire(&bitmap_mutex);
- for (i = 0; i < opt_n_items; ++i) {
- if (bitarray_is_set(received, i))
- putc('o', stdout);
- else if (bitarray_is_set(handled, i))
- putc('!', stdout);
- else
- putc('.', stdout);
- }
- puts("");
- tor_mutex_release(&bitmap_mutex);
- #endif /* defined(TRACK_RESPONSES) */
- if (n_sent - (n_received+n_successful_cancel) < opt_n_lowwater) {
- int n_to_send = n_received + opt_n_inflight - n_sent;
- if (n_to_send > opt_n_items - n_sent)
- n_to_send = opt_n_items - n_sent;
- add_n_work_items(tp, n_to_send);
- }
- if (shutting_down == 0 &&
- n_received+n_successful_cancel == n_sent &&
- n_sent >= opt_n_items) {
- shutting_down = 1;
- threadpool_queue_update(tp, NULL,
- workqueue_do_shutdown, NULL, NULL);
- // Anything we add after starting the shutdown must not be executed.
- threadpool_queue_work(tp, workqueue_shutdown_error,
- handle_reply_shutdown, NULL);
- {
- struct timeval limit = { 2, 0 };
- tor_libevent_exit_loop_after_delay(tor_libevent_get_base(), &limit);
- }
- }
- }
- static void
- help(void)
- {
- puts(
- "Options:\n"
- " -h Display this information\n"
- " -v Be verbose\n"
- " -N <items> Run this many items of work\n"
- " -T <threads> Use this many threads\n"
- " -I <inflight> Have no more than this many requests queued at once\n"
- " -L <lowwater> Add items whenever fewer than this many are pending\n"
- " -C <cancel> Try to cancel N items of every batch that we add\n"
- " -R <ratio> Make one out of this many items be a slow (RSA) one\n"
- " --no-{eventfd2,eventfd,pipe2,pipe,socketpair}\n"
- " Disable one of the alert_socket backends.");
- }
- int
- main(int argc, char **argv)
- {
- replyqueue_t *rq;
- threadpool_t *tp;
- int i;
- tor_libevent_cfg evcfg;
- uint32_t as_flags = 0;
- for (i = 1; i < argc; ++i) {
- if (!strcmp(argv[i], "-v")) {
- opt_verbose = 1;
- } else if (!strcmp(argv[i], "-T") && i+1<argc) {
- opt_n_threads = atoi(argv[++i]);
- } else if (!strcmp(argv[i], "-N") && i+1<argc) {
- opt_n_items = atoi(argv[++i]);
- } else if (!strcmp(argv[i], "-I") && i+1<argc) {
- opt_n_inflight = atoi(argv[++i]);
- } else if (!strcmp(argv[i], "-L") && i+1<argc) {
- opt_n_lowwater = atoi(argv[++i]);
- } else if (!strcmp(argv[i], "-R") && i+1<argc) {
- opt_ratio_rsa = atoi(argv[++i]);
- } else if (!strcmp(argv[i], "-C") && i+1<argc) {
- opt_n_cancel = atoi(argv[++i]);
- } else if (!strcmp(argv[i], "--no-eventfd2")) {
- as_flags |= ASOCKS_NOEVENTFD2;
- } else if (!strcmp(argv[i], "--no-eventfd")) {
- as_flags |= ASOCKS_NOEVENTFD;
- } else if (!strcmp(argv[i], "--no-pipe2")) {
- as_flags |= ASOCKS_NOPIPE2;
- } else if (!strcmp(argv[i], "--no-pipe")) {
- as_flags |= ASOCKS_NOPIPE;
- } else if (!strcmp(argv[i], "--no-socketpair")) {
- as_flags |= ASOCKS_NOSOCKETPAIR;
- } else if (!strcmp(argv[i], "-h")) {
- help();
- return 0;
- } else {
- help();
- return 1;
- }
- }
- if (opt_n_threads < 1 ||
- opt_n_items < 1 || opt_n_inflight < 1 || opt_n_lowwater < 0 ||
- opt_n_cancel > opt_n_inflight || opt_n_inflight > MAX_INFLIGHT ||
- opt_ratio_rsa < 0) {
- help();
- return 1;
- }
- if (opt_n_inflight > opt_n_items) {
- opt_n_inflight = opt_n_items;
- }
- init_logging(1);
- network_init();
- if (crypto_global_init(1, NULL, NULL) < 0) {
- printf("Couldn't initialize crypto subsystem; exiting.\n");
- return 1;
- }
- if (crypto_seed_rng() < 0) {
- printf("Couldn't seed RNG; exiting.\n");
- return 1;
- }
- rq = replyqueue_new(as_flags);
- if (as_flags && rq == NULL)
- return 77; // 77 means "skipped".
- tor_assert(rq);
- tp = threadpool_new(opt_n_threads,
- rq, new_state, free_state, NULL);
- tor_assert(tp);
- crypto_seed_weak_rng(&weak_rng);
- memset(&evcfg, 0, sizeof(evcfg));
- tor_libevent_initialize(&evcfg);
- {
- int r = threadpool_register_reply_event(tp,
- replysock_readable_cb);
- tor_assert(r == 0);
- }
- #ifdef TRACK_RESPONSES
- handled = bitarray_init_zero(opt_n_items);
- received = bitarray_init_zero(opt_n_items);
- tor_mutex_init(&bitmap_mutex);
- handled_len = opt_n_items;
- #endif /* defined(TRACK_RESPONSES) */
- for (i = 0; i < opt_n_inflight; ++i) {
- if (! add_work(tp)) {
- puts("Couldn't add work.");
- return 1;
- }
- }
- {
- struct timeval limit = { 180, 0 };
- tor_libevent_exit_loop_after_delay(tor_libevent_get_base(), &limit);
- }
- tor_libevent_run_event_loop(tor_libevent_get_base(), 0);
- if (n_sent != opt_n_items || n_received+n_successful_cancel != n_sent) {
- printf("%d vs %d\n", n_sent, opt_n_items);
- printf("%d+%d vs %d\n", n_received, n_successful_cancel, n_sent);
- puts("FAIL");
- return 1;
- } else if (no_shutdown) {
- puts("Accepted work after shutdown\n");
- puts("FAIL");
- } else {
- puts("OK");
- return 0;
- }
- }
|