mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-10 21:23:58 +01:00
expand the scheduler to address SSL_read()'s pending bytes
svn:r505
This commit is contained in:
parent
677707433e
commit
c4c66e2c7f
@ -25,7 +25,7 @@ char *conn_type_to_string[] = {
|
||||
"CPU worker", /* 11 */
|
||||
};
|
||||
|
||||
char *conn_state_to_string[][15] = {
|
||||
char *conn_state_to_string[][_CONN_TYPE_MAX+1] = {
|
||||
{ NULL }, /* no type associated with 0 */
|
||||
{ "ready" }, /* op listener, 0 */
|
||||
{ "awaiting keys", /* op, 0 */
|
||||
@ -509,9 +509,6 @@ int connection_read_to_buf(connection_t *conn) {
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
if(connection_speaks_cells(conn) && conn->state != OR_CONN_STATE_CONNECTING)
|
||||
if(result == at_most)
|
||||
return connection_read_to_buf(conn);
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
@ -261,14 +261,17 @@ void connection_start_writing(connection_t *conn) {
|
||||
}
|
||||
|
||||
static void conn_read(int i) {
|
||||
connection_t *conn;
|
||||
connection_t *conn = connection_array[i];
|
||||
|
||||
/* see http://www.greenend.org.uk/rjk/2001/06/poll.html for
|
||||
* discussion of POLLIN vs POLLHUP */
|
||||
if(!(poll_array[i].revents & (POLLIN|POLLHUP|POLLERR)))
|
||||
return; /* this conn doesn't want to read */
|
||||
/* see http://www.greenend.org.uk/rjk/2001/06/poll.html for
|
||||
* discussion of POLLIN vs POLLHUP */
|
||||
if(!connection_speaks_cells(conn) ||
|
||||
conn->state != OR_CONN_STATE_OPEN ||
|
||||
!connection_is_reading(conn) ||
|
||||
!tor_tls_get_pending_bytes(conn->tls))
|
||||
return; /* this conn should not read */
|
||||
|
||||
conn = connection_array[i];
|
||||
log_fn(LOG_DEBUG,"socket %d wants to read.",conn->s);
|
||||
|
||||
assert_connection_ok(conn, time(NULL));
|
||||
@ -340,8 +343,9 @@ static void check_conn_marked(int i) {
|
||||
|
||||
static int prepare_for_poll(void) {
|
||||
int i;
|
||||
int timeout;
|
||||
connection_t *conn;
|
||||
struct timeval now; //soonest;
|
||||
struct timeval now;
|
||||
static long current_second = 0; /* from previous calls to gettimeofday */
|
||||
static long time_to_fetch_directory = 0;
|
||||
static long time_to_new_circuit = 0;
|
||||
@ -350,6 +354,7 @@ static int prepare_for_poll(void) {
|
||||
circuit_t *circ;
|
||||
|
||||
my_gettimeofday(&now);
|
||||
timeout = (1000 - (now.tv_usec / 1000)); /* how many milliseconds til the next second? */
|
||||
|
||||
if(now.tv_sec > current_second) { /* the second has rolled over. check more stuff. */
|
||||
|
||||
@ -404,6 +409,8 @@ static int prepare_for_poll(void) {
|
||||
/* check connections to see whether we should send a keepalive, expire, or wait */
|
||||
if(!connection_speaks_cells(conn))
|
||||
continue; /* this conn type doesn't send cells */
|
||||
if(connection_state_is_open(conn) && tor_tls_get_pending_bytes(conn->tls))
|
||||
timeout = 0; /* has pending bytes to read; don't let poll wait. */
|
||||
if(now.tv_sec >= conn->timestamp_lastwritten + options.KeepalivePeriod) {
|
||||
if((!options.OnionRouter && !circuit_get_by_conn(conn)) ||
|
||||
(!connection_state_is_open(conn))) {
|
||||
@ -423,7 +430,8 @@ static int prepare_for_poll(void) {
|
||||
}
|
||||
}
|
||||
/* blow away any connections that need to die. can't do this later
|
||||
* because we might open up a circuit and not realize it we're about to cull it.
|
||||
* because we might open up a circuit and not realize we're about to cull
|
||||
* the connection it's running over.
|
||||
*/
|
||||
for(i=0;i<nfds;i++)
|
||||
check_conn_marked(i);
|
||||
@ -431,7 +439,7 @@ static int prepare_for_poll(void) {
|
||||
current_second = now.tv_sec; /* remember which second it is, for next time */
|
||||
}
|
||||
|
||||
return (1000 - (now.tv_usec / 1000)); /* how many milliseconds til the next second? */
|
||||
return timeout;
|
||||
}
|
||||
|
||||
static crypto_pk_env_t *init_key_from_file(const char *fname)
|
||||
@ -828,6 +836,7 @@ list_running_servers(char **nicknames_out)
|
||||
length += strlen(nickname_lst[i]);
|
||||
}
|
||||
*nicknames_out = tor_malloc(length);
|
||||
log_fn(LOG_DEBUG,"total length %d malloced.",length);
|
||||
cp = *nicknames_out;
|
||||
for (i = 0; i<n; ++i) {
|
||||
if (i)
|
||||
@ -835,6 +844,8 @@ list_running_servers(char **nicknames_out)
|
||||
strcat(cp, nickname_lst[i]);
|
||||
while (*cp)
|
||||
++cp;
|
||||
log_fn(LOG_DEBUG,"end of loop %d, now %d written (nick %s)",
|
||||
i,1+(int)(cp-*nicknames_out),nickname_lst[i]);
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
@ -260,42 +260,14 @@ void router_forget_router(uint32_t addr, uint16_t port) {
|
||||
/* load the router list */
|
||||
int router_get_list_from_file(char *routerfile)
|
||||
{
|
||||
int fd; /* router file */
|
||||
struct stat statbuf;
|
||||
char *string;
|
||||
|
||||
assert(routerfile);
|
||||
|
||||
if (strcspn(routerfile,CONFIG_LEGAL_FILENAME_CHARACTERS) != 0) {
|
||||
log_fn(LOG_WARNING,"Filename %s contains illegal characters.",routerfile);
|
||||
string = read_file_to_str(routerfile);
|
||||
if(!string) {
|
||||
log_fn(LOG_WARNING,"Failed to load routerfile %s.",routerfile);
|
||||
return -1;
|
||||
}
|
||||
|
||||
if(stat(routerfile, &statbuf) < 0) {
|
||||
log_fn(LOG_WARNING,"Could not stat %s.",routerfile);
|
||||
return -1;
|
||||
}
|
||||
|
||||
/* open the router list */
|
||||
fd = open(routerfile,O_RDONLY,0);
|
||||
if (fd<0) {
|
||||
log_fn(LOG_WARNING,"Could not open %s.",routerfile);
|
||||
return -1;
|
||||
}
|
||||
|
||||
string = tor_malloc(statbuf.st_size+1);
|
||||
|
||||
if(read(fd,string,statbuf.st_size) != statbuf.st_size) {
|
||||
log_fn(LOG_WARNING,"Couldn't read all %ld bytes of file '%s'.",
|
||||
(long)statbuf.st_size,routerfile);
|
||||
free(string);
|
||||
close(fd);
|
||||
return -1;
|
||||
}
|
||||
close(fd);
|
||||
|
||||
string[statbuf.st_size] = 0; /* null terminate it */
|
||||
|
||||
if(router_get_list_from_string(string) < 0) {
|
||||
log_fn(LOG_WARNING,"The routerfile itself was corrupt.");
|
||||
free(string);
|
||||
|
Loading…
Reference in New Issue
Block a user