cpuworker.c 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380
  1. /* Copyright 2003 Roger Dingledine. */
  2. /* See LICENSE for licensing information */
  3. /* $Id$ */
  4. /**
  5. * \file cpuworker.c
  6. * \brief Run computation-intensive tasks (generally for crypto) in
  7. * a separate execution context. [OR only.]
  8. *
  9. * Right now, we only use this for processing onionskins.
  10. **/
  11. #include "or.h"
  12. extern or_options_t options; /**< command-line and config-file options */
  13. /** The maximum number of cpuworker processes we will keep around */
  14. #define MAX_CPUWORKERS 16
  15. /** The minimum number of cpuworker processes we will keep around */
  16. #define MIN_CPUWORKERS 1
  17. /** The tag specifies which circuit this onionskin was from */
  18. #define TAG_LEN 8
  19. /** How many bytes are sent from tor to the cpuworker? */
  20. #define LEN_ONION_QUESTION (1+TAG_LEN+ONIONSKIN_CHALLENGE_LEN)
  21. /** How many bytes are sent from the cpuworker back to tor? */
  22. #define LEN_ONION_RESPONSE (1+TAG_LEN+ONIONSKIN_REPLY_LEN+40+32)
  23. /** How many cpuworkers we have running right now */
  24. static int num_cpuworkers=0;
  25. /** How many of the running cpuworkers have an assigned task right now */
  26. static int num_cpuworkers_busy=0;
  27. /** We need to spawn new cpuworkers whenever we rotate the onion keys
  28. * on platforms where execution contexts==processes. This variable stores
  29. * the last time we got a key rotation event.*/
  30. static time_t last_rotation_time=0;
  31. int cpuworker_main(void *data);
  32. static int spawn_cpuworker(void);
  33. static void spawn_enough_cpuworkers(void);
  34. static void process_pending_task(connection_t *cpuworker);
  35. /** Initialize the cpuworker subsystem.
  36. */
  37. void cpu_init(void) {
  38. last_rotation_time=time(NULL);
  39. spawn_enough_cpuworkers();
  40. }
  41. /** Called when we're done sending a request to a cpuworker. */
  42. int connection_cpu_finished_flushing(connection_t *conn) {
  43. tor_assert(conn && conn->type == CONN_TYPE_CPUWORKER);
  44. connection_stop_writing(conn);
  45. return 0;
  46. }
  47. /** Pack addr,port,and circ_id; set *tag to the result. (See note on
  48. * cpuworker_main for wire format.) */
  49. static void tag_pack(char *tag, uint32_t addr, uint16_t port, uint16_t circ_id) {
  50. *(uint32_t *)tag = addr;
  51. *(uint16_t *)(tag+4) = port;
  52. *(uint16_t *)(tag+6) = circ_id;
  53. }
  54. /** Unpack <b>tag</b> into addr, port, and circ_id.
  55. */
  56. static void tag_unpack(const char *tag, uint32_t *addr, uint16_t *port, uint16_t *circ_id) {
  57. struct in_addr in;
  58. *addr = *(const uint32_t *)tag;
  59. *port = *(const uint16_t *)(tag+4);
  60. *circ_id = *(const uint16_t *)(tag+6);
  61. in.s_addr = htonl(*addr);
  62. log_fn(LOG_DEBUG,"onion was from %s:%d, circ_id %d.", inet_ntoa(in), *port, *circ_id);
  63. }
  64. /** Called when the onion key has changed and we need to spawn new
  65. * cpuworkers. Close all currently idle cpuworkers, and mark the last
  66. * rotation time as now.
  67. */
  68. void cpuworkers_rotate(void)
  69. {
  70. connection_t *cpuworker;
  71. while ((cpuworker = connection_get_by_type_state(CONN_TYPE_CPUWORKER,
  72. CPUWORKER_STATE_IDLE))) {
  73. connection_mark_for_close(cpuworker,0);
  74. --num_cpuworkers;
  75. }
  76. last_rotation_time = time(NULL);
  77. spawn_enough_cpuworkers();
  78. }
  79. /** Called when we get data from a cpuworker. If the answer is not complete,
  80. * wait for a complete answer. If the cpuworker closes the connection,
  81. * mark it as closed and spawn a new one as needed. If the answer is complete,
  82. * process it as appropriate.
  83. */
  84. int connection_cpu_process_inbuf(connection_t *conn) {
  85. char success;
  86. unsigned char buf[LEN_ONION_RESPONSE];
  87. uint32_t addr;
  88. uint16_t port;
  89. uint16_t circ_id;
  90. connection_t *p_conn;
  91. circuit_t *circ;
  92. tor_assert(conn && conn->type == CONN_TYPE_CPUWORKER);
  93. if(conn->inbuf_reached_eof) {
  94. log_fn(LOG_WARN,"Read eof. Worker died unexpectedly.");
  95. if(conn->state != CPUWORKER_STATE_IDLE) {
  96. /* the circ associated with this cpuworker will have to wait until
  97. * it gets culled in run_connection_housekeeping(), since we have
  98. * no way to find out which circ it was. */
  99. log_fn(LOG_WARN,"...and it left a circuit queued; abandoning circ.");
  100. num_cpuworkers_busy--;
  101. }
  102. num_cpuworkers--;
  103. spawn_enough_cpuworkers(); /* try to regrow. hope we don't end up spinning. */
  104. connection_mark_for_close(conn,0);
  105. return 0;
  106. }
  107. if(conn->state == CPUWORKER_STATE_BUSY_ONION) {
  108. if(buf_datalen(conn->inbuf) < LEN_ONION_RESPONSE) /* entire answer available? */
  109. return 0; /* not yet */
  110. tor_assert(buf_datalen(conn->inbuf) == LEN_ONION_RESPONSE);
  111. connection_fetch_from_buf(&success,1,conn);
  112. connection_fetch_from_buf(buf,LEN_ONION_RESPONSE-1,conn);
  113. /* parse out the circ it was talking about */
  114. tag_unpack(buf, &addr, &port, &circ_id);
  115. circ = NULL;
  116. p_conn = connection_exact_get_by_addr_port(addr,port);
  117. if(p_conn)
  118. circ = circuit_get_by_circ_id_conn(circ_id, p_conn);
  119. if(success == 0) {
  120. log_fn(LOG_WARN,"decoding onionskin failed. Closing.");
  121. if(circ)
  122. circuit_mark_for_close(circ);
  123. goto done_processing;
  124. }
  125. if(!circ) {
  126. log_fn(LOG_INFO,"processed onion for a circ that's gone. Dropping.");
  127. goto done_processing;
  128. }
  129. tor_assert(circ->p_conn);
  130. if(onionskin_answer(circ, buf+TAG_LEN, buf+TAG_LEN+ONIONSKIN_REPLY_LEN) < 0) {
  131. log_fn(LOG_WARN,"onionskin_answer failed. Closing.");
  132. circuit_mark_for_close(circ);
  133. goto done_processing;
  134. }
  135. log_fn(LOG_DEBUG,"onionskin_answer succeeded. Yay.");
  136. } else {
  137. tor_assert(0); /* don't ask me to do handshakes yet */
  138. }
  139. done_processing:
  140. conn->state = CPUWORKER_STATE_IDLE;
  141. num_cpuworkers_busy--;
  142. if (conn->timestamp_created < last_rotation_time) {
  143. connection_mark_for_close(conn,0);
  144. num_cpuworkers--;
  145. spawn_enough_cpuworkers();
  146. } else {
  147. process_pending_task(conn);
  148. }
  149. return 0;
  150. }
  151. /** Implement a cpuworker. 'data' is an fdarray as returned by socketpair.
  152. * Read and writes from fdarray[1]. Reads requests, writes answers.
  153. *
  154. * Request format:
  155. * Task type [1 byte, always CPUWORKER_TASK_ONION]
  156. * Opaque tag TAG_LEN
  157. * Onionskin challenge ONIONSKIN_CHALLENGE_LEN
  158. * Response format:
  159. * Success/failure [1 byte, boolean.]
  160. * Opaque tag TAG_LEN
  161. * Onionskin challenge ONIONSKIN_REPLY_LEN
  162. * Negotiated keys KEY_LEN*2+DIGEST_LEN*2
  163. */
  164. int cpuworker_main(void *data) {
  165. unsigned char question[ONIONSKIN_CHALLENGE_LEN];
  166. unsigned char question_type;
  167. int *fdarray = data;
  168. int fd;
  169. /* variables for onion processing */
  170. unsigned char keys[40+32];
  171. unsigned char reply_to_proxy[ONIONSKIN_REPLY_LEN];
  172. unsigned char buf[LEN_ONION_RESPONSE];
  173. char tag[TAG_LEN];
  174. crypto_pk_env_t *onion_key = NULL, *last_onion_key = NULL;
  175. tor_close_socket(fdarray[0]); /* this is the side of the socketpair the parent uses */
  176. fd = fdarray[1]; /* this side is ours */
  177. #ifndef MS_WINDOWS
  178. connection_free_all(); /* so the child doesn't hold the parent's fd's open */
  179. #endif
  180. /* XXXX WINDOWS lock here. */
  181. onion_key = crypto_pk_dup_key(get_onion_key());
  182. if (get_previous_onion_key())
  183. last_onion_key = crypto_pk_dup_key(get_previous_onion_key());
  184. for(;;) {
  185. if(recv(fd, &question_type, 1, 0) != 1) {
  186. // log_fn(LOG_ERR,"read type failed. Exiting.");
  187. log_fn(LOG_INFO,"cpuworker exiting because tor process closed connection (either rotated keys or died).");
  188. goto end;
  189. }
  190. tor_assert(question_type == CPUWORKER_TASK_ONION);
  191. if(read_all(fd, tag, TAG_LEN, 1) != TAG_LEN) {
  192. log_fn(LOG_ERR,"read tag failed. Exiting.");
  193. goto end;
  194. }
  195. if(read_all(fd, question, ONIONSKIN_CHALLENGE_LEN, 1) != ONIONSKIN_CHALLENGE_LEN) {
  196. log_fn(LOG_ERR,"read question failed. Exiting.");
  197. goto end;
  198. }
  199. if(question_type == CPUWORKER_TASK_ONION) {
  200. if(onion_skin_server_handshake(question, onion_key, last_onion_key,
  201. reply_to_proxy, keys, 40+32) < 0) {
  202. /* failure */
  203. log_fn(LOG_WARN,"onion_skin_server_handshake failed.");
  204. memset(buf,0,LEN_ONION_RESPONSE); /* send all zeros for failure */
  205. } else {
  206. /* success */
  207. log_fn(LOG_INFO,"onion_skin_server_handshake succeeded.");
  208. buf[0] = 1; /* 1 means success */
  209. memcpy(buf+1,tag,TAG_LEN);
  210. memcpy(buf+1+TAG_LEN,reply_to_proxy,ONIONSKIN_REPLY_LEN);
  211. memcpy(buf+1+TAG_LEN+ONIONSKIN_REPLY_LEN,keys,40+32);
  212. }
  213. if(write_all(fd, buf, LEN_ONION_RESPONSE, 1) != LEN_ONION_RESPONSE) {
  214. log_fn(LOG_ERR,"writing response buf failed. Exiting.");
  215. spawn_exit();
  216. }
  217. log_fn(LOG_DEBUG,"finished writing response.");
  218. }
  219. }
  220. end:
  221. if (onion_key)
  222. crypto_free_pk_env(onion_key);
  223. if (last_onion_key)
  224. crypto_free_pk_env(last_onion_key);
  225. spawn_exit();
  226. return 0; /* windows wants this function to return an int */
  227. }
  228. /** Launch a new cpuworker.
  229. */
  230. static int spawn_cpuworker(void) {
  231. int fd[2];
  232. connection_t *conn;
  233. if(tor_socketpair(AF_UNIX, SOCK_STREAM, 0, fd) < 0) {
  234. log(LOG_ERR, "Couldn't construct socketpair: %s",
  235. tor_socket_strerror(tor_socket_errno(-1)));
  236. exit(1);
  237. }
  238. spawn_func(cpuworker_main, (void*)fd);
  239. log_fn(LOG_DEBUG,"just spawned a worker.");
  240. tor_close_socket(fd[1]); /* we don't need the worker's side of the pipe */
  241. conn = connection_new(CONN_TYPE_CPUWORKER);
  242. set_socket_nonblocking(fd[0]);
  243. /* set up conn so it's got all the data we need to remember */
  244. conn->s = fd[0];
  245. conn->address = tor_strdup("localhost");
  246. if(connection_add(conn) < 0) { /* no space, forget it */
  247. log_fn(LOG_WARN,"connection_add failed. Giving up.");
  248. connection_free(conn); /* this closes fd[0] */
  249. return -1;
  250. }
  251. conn->state = CPUWORKER_STATE_IDLE;
  252. connection_start_reading(conn);
  253. return 0; /* success */
  254. }
  255. /** If we have too few or too many active cpuworkers, try to spawn new ones
  256. * or kill idle ones.
  257. */
  258. static void spawn_enough_cpuworkers(void) {
  259. int num_cpuworkers_needed = options.NumCpus;
  260. if(num_cpuworkers_needed < MIN_CPUWORKERS)
  261. num_cpuworkers_needed = MIN_CPUWORKERS;
  262. if(num_cpuworkers_needed > MAX_CPUWORKERS)
  263. num_cpuworkers_needed = MAX_CPUWORKERS;
  264. while(num_cpuworkers < num_cpuworkers_needed) {
  265. if(spawn_cpuworker() < 0) {
  266. log_fn(LOG_WARN,"spawn failed!");
  267. return;
  268. }
  269. num_cpuworkers++;
  270. }
  271. }
  272. /** Take a pending task from the queue and assign it to 'cpuworker' */
  273. static void process_pending_task(connection_t *cpuworker) {
  274. circuit_t *circ;
  275. tor_assert(cpuworker);
  276. /* for now only process onion tasks */
  277. circ = onion_next_task();
  278. if(!circ)
  279. return;
  280. if(assign_to_cpuworker(cpuworker, CPUWORKER_TASK_ONION, circ) < 0)
  281. log_fn(LOG_WARN,"assign_to_cpuworker failed. Ignoring.");
  282. }
  283. /** if cpuworker is defined, assert that he's idle, and use him. else,
  284. * look for an idle cpuworker and use him. if none idle, queue task onto
  285. * the pending onion list and return.
  286. * If question_type is CPUWORKER_TASK_ONION then task is a circ.
  287. * No other question_types are allowed.
  288. */
  289. int assign_to_cpuworker(connection_t *cpuworker, unsigned char question_type,
  290. void *task) {
  291. circuit_t *circ;
  292. char tag[TAG_LEN];
  293. tor_assert(question_type == CPUWORKER_TASK_ONION);
  294. if(question_type == CPUWORKER_TASK_ONION) {
  295. circ = task;
  296. if(num_cpuworkers_busy == num_cpuworkers) {
  297. log_fn(LOG_DEBUG,"No idle cpuworkers. Queuing.");
  298. if(onion_pending_add(circ) < 0)
  299. return -1;
  300. return 0;
  301. }
  302. if (!cpuworker)
  303. cpuworker = connection_get_by_type_state(CONN_TYPE_CPUWORKER, CPUWORKER_STATE_IDLE);
  304. tor_assert(cpuworker);
  305. if(!circ->p_conn) {
  306. log_fn(LOG_INFO,"circ->p_conn gone. Failing circ.");
  307. return -1;
  308. }
  309. tag_pack(tag, circ->p_conn->addr, circ->p_conn->port, circ->p_circ_id);
  310. cpuworker->state = CPUWORKER_STATE_BUSY_ONION;
  311. num_cpuworkers_busy++;
  312. connection_write_to_buf(&question_type, 1, cpuworker);
  313. connection_write_to_buf(tag, sizeof(tag), cpuworker);
  314. connection_write_to_buf(circ->onionskin, ONIONSKIN_CHALLENGE_LEN, cpuworker);
  315. }
  316. return 0;
  317. }
  318. /*
  319. Local Variables:
  320. mode:c
  321. indent-tabs-mode:nil
  322. c-basic-offset:2
  323. End:
  324. */