test_workqueue.c 9.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422
  1. /* Copyright (c) 2001-2004, Roger Dingledine.
  2. * Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
  3. * Copyright (c) 2007-2013, The Tor Project, Inc. */
  4. /* See LICENSE for licensing information */
  5. #include "or.h"
  6. #include "compat_threads.h"
  7. #include "onion.h"
  8. #include "workqueue.h"
  9. #include "crypto.h"
  10. #include "crypto_curve25519.h"
  11. #include "compat_libevent.h"
  12. #include <stdio.h>
  13. #ifdef HAVE_EVENT2_EVENT_H
  14. #include <event2/event.h>
  15. #else
  16. #include <event.h>
  17. #endif
  18. static int opt_verbose = 0;
  19. static int opt_n_threads = 8;
  20. static int opt_n_items = 10000;
  21. static int opt_n_inflight = 1000;
  22. static int opt_n_lowwater = 250;
  23. static int opt_n_cancel = 0;
  24. static int opt_ratio_rsa = 5;
  25. #ifdef TRACK_RESPONSES
  26. tor_mutex_t bitmap_mutex;
  27. int handled_len;
  28. bitarray_t *handled;
  29. #endif
  30. typedef struct state_s {
  31. int magic;
  32. int n_handled;
  33. crypto_pk_t *rsa;
  34. curve25519_secret_key_t ecdh;
  35. int is_shutdown;
  36. } state_t;
  37. typedef struct rsa_work_s {
  38. int serial;
  39. uint8_t msg[128];
  40. uint8_t msglen;
  41. } rsa_work_t;
  42. typedef struct ecdh_work_s {
  43. int serial;
  44. union {
  45. curve25519_public_key_t pk;
  46. uint8_t msg[32];
  47. } u;
  48. } ecdh_work_t;
  49. static void
  50. mark_handled(int serial)
  51. {
  52. #ifdef TRACK_RESPONSES
  53. tor_mutex_acquire(&bitmap_mutex);
  54. tor_assert(serial < handled_len);
  55. tor_assert(! bitarray_is_set(handled, serial));
  56. bitarray_set(handled, serial);
  57. tor_mutex_release(&bitmap_mutex);
  58. #else
  59. (void)serial;
  60. #endif
  61. }
  62. static int
  63. workqueue_do_rsa(void *state, void *work)
  64. {
  65. rsa_work_t *rw = work;
  66. state_t *st = state;
  67. crypto_pk_t *rsa = st->rsa;
  68. uint8_t sig[256];
  69. int len;
  70. tor_assert(st->magic == 13371337);
  71. len = crypto_pk_private_sign(rsa, (char*)sig, 256,
  72. (char*)rw->msg, rw->msglen);
  73. if (len < 0) {
  74. rw->msglen = 0;
  75. return WQ_RPL_ERROR;
  76. }
  77. memset(rw->msg, 0, sizeof(rw->msg));
  78. rw->msglen = len;
  79. memcpy(rw->msg, sig, len);
  80. ++st->n_handled;
  81. mark_handled(rw->serial);
  82. return WQ_RPL_REPLY;
  83. }
  84. static int
  85. workqueue_do_shutdown(void *state, void *work)
  86. {
  87. (void)state;
  88. (void)work;
  89. crypto_pk_free(((state_t*)state)->rsa);
  90. tor_free(state);
  91. return WQ_RPL_SHUTDOWN;
  92. }
  93. static int
  94. workqueue_do_ecdh(void *state, void *work)
  95. {
  96. ecdh_work_t *ew = work;
  97. uint8_t output[CURVE25519_OUTPUT_LEN];
  98. state_t *st = state;
  99. tor_assert(st->magic == 13371337);
  100. curve25519_handshake(output, &st->ecdh, &ew->u.pk);
  101. memcpy(ew->u.msg, output, CURVE25519_OUTPUT_LEN);
  102. ++st->n_handled;
  103. mark_handled(ew->serial);
  104. return WQ_RPL_REPLY;
  105. }
  106. static void *
  107. new_state(void *arg)
  108. {
  109. state_t *st;
  110. (void)arg;
  111. st = tor_malloc(sizeof(*st));
  112. /* Every thread gets its own keys. not a problem for benchmarking */
  113. st->rsa = crypto_pk_new();
  114. if (crypto_pk_generate_key_with_bits(st->rsa, 1024) < 0) {
  115. puts("keygen failed");
  116. crypto_pk_free(st->rsa);
  117. tor_free(st);
  118. return NULL;
  119. }
  120. curve25519_secret_key_generate(&st->ecdh, 0);
  121. st->magic = 13371337;
  122. return st;
  123. }
  124. static void
  125. free_state(void *arg)
  126. {
  127. state_t *st = arg;
  128. crypto_pk_free(st->rsa);
  129. tor_free(st);
  130. }
  131. static tor_weak_rng_t weak_rng;
  132. static int n_sent = 0;
  133. static int rsa_sent = 0;
  134. static int ecdh_sent = 0;
  135. static int n_received = 0;
  136. #ifdef TRACK_RESPONSES
  137. bitarray_t *received;
  138. #endif
  139. static void
  140. handle_reply(void *arg)
  141. {
  142. #ifdef TRACK_RESPONSES
  143. rsa_work_t *rw = arg; /* Naughty cast, but only looking at serial. */
  144. tor_assert(! bitarray_is_set(received, rw->serial));
  145. bitarray_set(received,rw->serial);
  146. #endif
  147. tor_free(arg);
  148. ++n_received;
  149. }
  150. static workqueue_entry_t *
  151. add_work(threadpool_t *tp)
  152. {
  153. int add_rsa =
  154. opt_ratio_rsa == 0 ||
  155. tor_weak_random_range(&weak_rng, opt_ratio_rsa) == 0;
  156. if (add_rsa) {
  157. rsa_work_t *w = tor_malloc_zero(sizeof(*w));
  158. w->serial = n_sent++;
  159. crypto_rand((char*)w->msg, 20);
  160. w->msglen = 20;
  161. ++rsa_sent;
  162. return threadpool_queue_work(tp, workqueue_do_rsa, handle_reply, w);
  163. } else {
  164. ecdh_work_t *w = tor_malloc_zero(sizeof(*w));
  165. w->serial = n_sent++;
  166. /* Not strictly right, but this is just for benchmarks. */
  167. crypto_rand((char*)w->u.pk.public_key, 32);
  168. ++ecdh_sent;
  169. return threadpool_queue_work(tp, workqueue_do_ecdh, handle_reply, w);
  170. }
  171. }
  172. static int n_failed_cancel = 0;
  173. static int n_successful_cancel = 0;
  174. static int
  175. add_n_work_items(threadpool_t *tp, int n)
  176. {
  177. int n_queued = 0;
  178. int n_try_cancel = 0, i;
  179. workqueue_entry_t **to_cancel;
  180. workqueue_entry_t *ent;
  181. to_cancel = tor_malloc(sizeof(workqueue_entry_t*) * opt_n_cancel);
  182. while (n_queued++ < n) {
  183. ent = add_work(tp);
  184. if (! ent) {
  185. puts("Couldn't add work.");
  186. tor_event_base_loopexit(tor_libevent_get_base(), NULL);
  187. return -1;
  188. }
  189. if (n_try_cancel < opt_n_cancel &&
  190. tor_weak_random_range(&weak_rng, n) < opt_n_cancel) {
  191. to_cancel[n_try_cancel++] = ent;
  192. }
  193. }
  194. for (i = 0; i < n_try_cancel; ++i) {
  195. void *work = workqueue_entry_cancel(to_cancel[i]);
  196. if (! work) {
  197. n_failed_cancel++;
  198. } else {
  199. n_successful_cancel++;
  200. tor_free(work);
  201. }
  202. }
  203. tor_free(to_cancel);
  204. return 0;
  205. }
  206. static int shutting_down = 0;
  207. static int n_shutdowns_done = 0;
  208. static void
  209. shutdown_reply(void *arg)
  210. {
  211. (void)arg;
  212. tor_assert(shutting_down);
  213. ++n_shutdowns_done;
  214. if (n_shutdowns_done == opt_n_threads) {
  215. tor_event_base_loopexit(tor_libevent_get_base(), NULL);
  216. }
  217. }
  218. static void
  219. replysock_readable_cb(tor_socket_t sock, short what, void *arg)
  220. {
  221. threadpool_t *tp = arg;
  222. replyqueue_t *rq = threadpool_get_replyqueue(tp);
  223. int old_r = n_received;
  224. (void) sock;
  225. (void) what;
  226. replyqueue_process(rq);
  227. if (old_r == n_received)
  228. return;
  229. if (opt_verbose) {
  230. printf("%d / %d", n_received, n_sent);
  231. if (opt_n_cancel)
  232. printf(" (%d cancelled, %d uncancellable)",
  233. n_successful_cancel, n_failed_cancel);
  234. puts("");
  235. }
  236. #ifdef TRACK_RESPONSES
  237. tor_mutex_acquire(&bitmap_mutex);
  238. for (i = 0; i < opt_n_items; ++i) {
  239. if (bitarray_is_set(received, i))
  240. putc('o', stdout);
  241. else if (bitarray_is_set(handled, i))
  242. putc('!', stdout);
  243. else
  244. putc('.', stdout);
  245. }
  246. puts("");
  247. tor_mutex_release(&bitmap_mutex);
  248. #endif
  249. if (n_sent - (n_received+n_successful_cancel) < opt_n_lowwater) {
  250. int n_to_send = n_received + opt_n_inflight - n_sent;
  251. if (n_to_send > opt_n_items - n_sent)
  252. n_to_send = opt_n_items - n_sent;
  253. add_n_work_items(tp, n_to_send);
  254. }
  255. if (shutting_down == 0 &&
  256. n_received+n_successful_cancel == n_sent &&
  257. n_sent >= opt_n_items) {
  258. shutting_down = 1;
  259. threadpool_queue_for_all(tp, NULL,
  260. workqueue_do_shutdown, shutdown_reply, NULL);
  261. }
  262. }
  263. static void
  264. help(void)
  265. {
  266. puts(
  267. "Options:\n"
  268. " -N <items> Run this many items of work\n"
  269. " -T <threads> Use this many threads\n"
  270. " -I <inflight> Have no more than this many requests queued at once\n"
  271. " -L <lowwater> Add items whenever fewer than this many are pending\n"
  272. " -C <cancel> Try to cancel N items of every batch that we add\n"
  273. " -R <ratio> Make one out of this many items be a slow (RSA) one\n"
  274. " --no-{eventfd2,eventfd,pipe2,pipe,socketpair}\n"
  275. " Disable one of the alert_socket backends.");
  276. }
  277. int
  278. main(int argc, char **argv)
  279. {
  280. replyqueue_t *rq;
  281. threadpool_t *tp;
  282. int i;
  283. tor_libevent_cfg evcfg;
  284. struct event *ev;
  285. uint32_t as_flags = 0;
  286. for (i = 1; i < argc; ++i) {
  287. if (!strcmp(argv[i], "-v")) {
  288. opt_verbose = 1;
  289. } else if (!strcmp(argv[i], "-T") && i+1<argc) {
  290. opt_n_threads = atoi(argv[++i]);
  291. } else if (!strcmp(argv[i], "-N") && i+1<argc) {
  292. opt_n_items = atoi(argv[++i]);
  293. } else if (!strcmp(argv[i], "-I") && i+1<argc) {
  294. opt_n_inflight = atoi(argv[++i]);
  295. } else if (!strcmp(argv[i], "-L") && i+1<argc) {
  296. opt_n_lowwater = atoi(argv[++i]);
  297. } else if (!strcmp(argv[i], "-R") && i+1<argc) {
  298. opt_ratio_rsa = atoi(argv[++i]);
  299. } else if (!strcmp(argv[i], "-C") && i+1<argc) {
  300. opt_n_cancel = atoi(argv[++i]);
  301. } else if (!strcmp(argv[i], "--no-eventfd2")) {
  302. as_flags |= ASOCKS_NOEVENTFD2;
  303. } else if (!strcmp(argv[i], "--no-eventfd")) {
  304. as_flags |= ASOCKS_NOEVENTFD;
  305. } else if (!strcmp(argv[i], "--no-pipe2")) {
  306. as_flags |= ASOCKS_NOPIPE2;
  307. } else if (!strcmp(argv[i], "--no-pipe")) {
  308. as_flags |= ASOCKS_NOPIPE;
  309. } else if (!strcmp(argv[i], "--no-socketpair")) {
  310. as_flags |= ASOCKS_NOSOCKETPAIR;
  311. } else if (!strcmp(argv[i], "-h")) {
  312. help();
  313. return 0;
  314. } else {
  315. help();
  316. return 1;
  317. }
  318. }
  319. if (opt_n_threads < 1 ||
  320. opt_n_items < 1 || opt_n_inflight < 1 || opt_n_lowwater < 0 ||
  321. opt_n_cancel > opt_n_inflight ||
  322. opt_ratio_rsa < 0) {
  323. help();
  324. return 1;
  325. }
  326. init_logging(1);
  327. crypto_global_init(1, NULL, NULL);
  328. crypto_seed_rng(1);
  329. rq = replyqueue_new(as_flags);
  330. tor_assert(rq);
  331. tp = threadpool_new(opt_n_threads,
  332. rq, new_state, free_state, NULL);
  333. tor_assert(tp);
  334. crypto_seed_weak_rng(&weak_rng);
  335. memset(&evcfg, 0, sizeof(evcfg));
  336. tor_libevent_initialize(&evcfg);
  337. ev = tor_event_new(tor_libevent_get_base(),
  338. replyqueue_get_socket(rq), EV_READ|EV_PERSIST,
  339. replysock_readable_cb, tp);
  340. event_add(ev, NULL);
  341. #ifdef TRACK_RESPONSES
  342. handled = bitarray_init_zero(opt_n_items);
  343. received = bitarray_init_zero(opt_n_items);
  344. tor_mutex_init(&bitmap_mutex);
  345. handled_len = opt_n_items;
  346. #endif
  347. for (i = 0; i < opt_n_inflight; ++i) {
  348. if (! add_work(tp)) {
  349. puts("Couldn't add work.");
  350. return 1;
  351. }
  352. }
  353. {
  354. struct timeval limit = { 30, 0 };
  355. tor_event_base_loopexit(tor_libevent_get_base(), &limit);
  356. }
  357. event_base_loop(tor_libevent_get_base(), 0);
  358. if (n_sent != opt_n_items || n_received+n_successful_cancel != n_sent ||
  359. n_shutdowns_done != opt_n_threads) {
  360. puts("FAIL");
  361. return 1;
  362. } else {
  363. puts("OK");
  364. return 0;
  365. }
  366. }