mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-30 15:43:32 +01:00
456 lines
11 KiB
C
456 lines
11 KiB
C
/* Copyright (c) 2001-2004, Roger Dingledine.
|
|
* Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
|
|
* Copyright (c) 2007-2021, The Tor Project, Inc. */
|
|
/* See LICENSE for licensing information */
|
|
|
|
#include "core/or/or.h"
|
|
#include "lib/thread/threads.h"
|
|
#include "core/or/onion.h"
|
|
#include "lib/evloop/workqueue.h"
|
|
#include "lib/crypt_ops/crypto_curve25519.h"
|
|
#include "lib/crypt_ops/crypto_rand.h"
|
|
#include "lib/net/alertsock.h"
|
|
#include "lib/evloop/compat_libevent.h"
|
|
#include "lib/intmath/weakrng.h"
|
|
#include "lib/crypt_ops/crypto_init.h"
|
|
|
|
#include <stdio.h>
|
|
|
|
#define MAX_INFLIGHT (1<<16)
|
|
|
|
static int opt_verbose = 0;
|
|
static int opt_n_threads = 8;
|
|
static int opt_n_items = 10000;
|
|
static int opt_n_inflight = 1000;
|
|
static int opt_n_lowwater = 250;
|
|
static int opt_n_cancel = 0;
|
|
static int opt_ratio_rsa = 5;
|
|
|
|
#ifdef TRACK_RESPONSES
|
|
tor_mutex_t bitmap_mutex;
|
|
int handled_len;
|
|
bitarray_t *handled;
|
|
#endif
|
|
|
|
typedef struct state_t {
|
|
int magic;
|
|
int n_handled;
|
|
crypto_pk_t *rsa;
|
|
curve25519_secret_key_t ecdh;
|
|
int is_shutdown;
|
|
} state_t;
|
|
|
|
typedef struct rsa_work_t {
|
|
int serial;
|
|
uint8_t msg[128];
|
|
uint8_t msglen;
|
|
} rsa_work_t;
|
|
|
|
typedef struct ecdh_work_t {
|
|
int serial;
|
|
union {
|
|
curve25519_public_key_t pk;
|
|
uint8_t msg[32];
|
|
} u;
|
|
} ecdh_work_t;
|
|
|
|
static void
|
|
mark_handled(int serial)
|
|
{
|
|
#ifdef TRACK_RESPONSES
|
|
tor_mutex_acquire(&bitmap_mutex);
|
|
tor_assert(serial < handled_len);
|
|
tor_assert(! bitarray_is_set(handled, serial));
|
|
bitarray_set(handled, serial);
|
|
tor_mutex_release(&bitmap_mutex);
|
|
#else /* !defined(TRACK_RESPONSES) */
|
|
(void)serial;
|
|
#endif /* defined(TRACK_RESPONSES) */
|
|
}
|
|
|
|
static workqueue_reply_t
|
|
workqueue_do_rsa(void *state, void *work)
|
|
{
|
|
rsa_work_t *rw = work;
|
|
state_t *st = state;
|
|
crypto_pk_t *rsa = st->rsa;
|
|
uint8_t sig[256];
|
|
int len;
|
|
|
|
tor_assert(st->magic == 13371337);
|
|
|
|
len = crypto_pk_private_sign(rsa, (char*)sig, 256,
|
|
(char*)rw->msg, rw->msglen);
|
|
if (len < 0) {
|
|
rw->msglen = 0;
|
|
return WQ_RPL_ERROR;
|
|
}
|
|
|
|
memset(rw->msg, 0, sizeof(rw->msg));
|
|
rw->msglen = len;
|
|
memcpy(rw->msg, sig, len);
|
|
++st->n_handled;
|
|
|
|
mark_handled(rw->serial);
|
|
|
|
return WQ_RPL_REPLY;
|
|
}
|
|
|
|
static workqueue_reply_t
|
|
workqueue_do_shutdown(void *state, void *work)
|
|
{
|
|
(void)state;
|
|
(void)work;
|
|
crypto_pk_free(((state_t*)state)->rsa);
|
|
tor_free(state);
|
|
return WQ_RPL_SHUTDOWN;
|
|
}
|
|
|
|
static workqueue_reply_t
|
|
workqueue_do_ecdh(void *state, void *work)
|
|
{
|
|
ecdh_work_t *ew = work;
|
|
uint8_t output[CURVE25519_OUTPUT_LEN];
|
|
state_t *st = state;
|
|
|
|
tor_assert(st->magic == 13371337);
|
|
|
|
curve25519_handshake(output, &st->ecdh, &ew->u.pk);
|
|
memcpy(ew->u.msg, output, CURVE25519_OUTPUT_LEN);
|
|
++st->n_handled;
|
|
mark_handled(ew->serial);
|
|
return WQ_RPL_REPLY;
|
|
}
|
|
|
|
static workqueue_reply_t
|
|
workqueue_shutdown_error(void *state, void *work)
|
|
{
|
|
(void)state;
|
|
(void)work;
|
|
return WQ_RPL_REPLY;
|
|
}
|
|
|
|
static void *
|
|
new_state(void *arg)
|
|
{
|
|
state_t *st;
|
|
(void)arg;
|
|
|
|
st = tor_malloc(sizeof(*st));
|
|
/* Every thread gets its own keys. not a problem for benchmarking */
|
|
st->rsa = crypto_pk_new();
|
|
if (crypto_pk_generate_key_with_bits(st->rsa, 1024) < 0) {
|
|
crypto_pk_free(st->rsa);
|
|
tor_free(st);
|
|
return NULL;
|
|
}
|
|
curve25519_secret_key_generate(&st->ecdh, 0);
|
|
st->magic = 13371337;
|
|
return st;
|
|
}
|
|
|
|
static void
|
|
free_state(void *arg)
|
|
{
|
|
state_t *st = arg;
|
|
crypto_pk_free(st->rsa);
|
|
tor_free(st);
|
|
}
|
|
|
|
static tor_weak_rng_t weak_rng;
|
|
static int n_sent = 0;
|
|
static int rsa_sent = 0;
|
|
static int ecdh_sent = 0;
|
|
static int n_received_previously = 0;
|
|
static int n_received = 0;
|
|
static int no_shutdown = 0;
|
|
|
|
#ifdef TRACK_RESPONSES
|
|
bitarray_t *received;
|
|
#endif
|
|
|
|
static void
|
|
handle_reply(void *arg)
|
|
{
|
|
#ifdef TRACK_RESPONSES
|
|
rsa_work_t *rw = arg; /* Naughty cast, but only looking at serial. */
|
|
tor_assert(! bitarray_is_set(received, rw->serial));
|
|
bitarray_set(received,rw->serial);
|
|
#endif
|
|
|
|
tor_free(arg);
|
|
++n_received;
|
|
}
|
|
|
|
/* This should never get called. */
|
|
static void
|
|
handle_reply_shutdown(void *arg)
|
|
{
|
|
(void)arg;
|
|
no_shutdown = 1;
|
|
}
|
|
|
|
static workqueue_entry_t *
|
|
add_work(threadpool_t *tp)
|
|
{
|
|
int add_rsa =
|
|
opt_ratio_rsa == 0 ||
|
|
tor_weak_random_range(&weak_rng, opt_ratio_rsa) == 0;
|
|
|
|
if (add_rsa) {
|
|
rsa_work_t *w = tor_malloc_zero(sizeof(*w));
|
|
w->serial = n_sent++;
|
|
crypto_rand((char*)w->msg, 20);
|
|
w->msglen = 20;
|
|
++rsa_sent;
|
|
return threadpool_queue_work_priority(tp,
|
|
WQ_PRI_MED,
|
|
workqueue_do_rsa, handle_reply, w);
|
|
} else {
|
|
ecdh_work_t *w = tor_malloc_zero(sizeof(*w));
|
|
w->serial = n_sent++;
|
|
/* Not strictly right, but this is just for benchmarks. */
|
|
crypto_rand((char*)w->u.pk.public_key, 32);
|
|
++ecdh_sent;
|
|
return threadpool_queue_work(tp, workqueue_do_ecdh, handle_reply, w);
|
|
}
|
|
}
|
|
|
|
static int n_failed_cancel = 0;
|
|
static int n_successful_cancel = 0;
|
|
|
|
static int
|
|
add_n_work_items(threadpool_t *tp, int n)
|
|
{
|
|
int n_queued = 0;
|
|
int n_try_cancel = 0, i;
|
|
workqueue_entry_t **to_cancel;
|
|
workqueue_entry_t *ent;
|
|
|
|
// We'll choose randomly which entries to cancel.
|
|
to_cancel = tor_calloc(opt_n_cancel, sizeof(workqueue_entry_t*));
|
|
|
|
while (n_queued++ < n) {
|
|
ent = add_work(tp);
|
|
if (! ent) {
|
|
puts("Z");
|
|
tor_libevent_exit_loop_after_delay(tor_libevent_get_base(), NULL);
|
|
return -1;
|
|
}
|
|
|
|
if (n_try_cancel < opt_n_cancel) {
|
|
to_cancel[n_try_cancel++] = ent;
|
|
} else {
|
|
int p = tor_weak_random_range(&weak_rng, n_queued);
|
|
if (p < n_try_cancel) {
|
|
to_cancel[p] = ent;
|
|
}
|
|
}
|
|
}
|
|
|
|
for (i = 0; i < n_try_cancel; ++i) {
|
|
void *work = workqueue_entry_cancel(to_cancel[i]);
|
|
if (! work) {
|
|
n_failed_cancel++;
|
|
} else {
|
|
n_successful_cancel++;
|
|
tor_free(work);
|
|
}
|
|
}
|
|
|
|
tor_free(to_cancel);
|
|
return 0;
|
|
}
|
|
|
|
static int shutting_down = 0;
|
|
|
|
static void
|
|
replysock_readable_cb(threadpool_t *tp)
|
|
{
|
|
if (n_received_previously == n_received)
|
|
return;
|
|
|
|
n_received_previously = n_received;
|
|
|
|
if (opt_verbose) {
|
|
printf("%d / %d", n_received, n_sent);
|
|
if (opt_n_cancel)
|
|
printf(" (%d cancelled, %d uncancellable)",
|
|
n_successful_cancel, n_failed_cancel);
|
|
puts("");
|
|
}
|
|
#ifdef TRACK_RESPONSES
|
|
tor_mutex_acquire(&bitmap_mutex);
|
|
for (i = 0; i < opt_n_items; ++i) {
|
|
if (bitarray_is_set(received, i))
|
|
putc('o', stdout);
|
|
else if (bitarray_is_set(handled, i))
|
|
putc('!', stdout);
|
|
else
|
|
putc('.', stdout);
|
|
}
|
|
puts("");
|
|
tor_mutex_release(&bitmap_mutex);
|
|
#endif /* defined(TRACK_RESPONSES) */
|
|
|
|
if (n_sent - (n_received+n_successful_cancel) < opt_n_lowwater) {
|
|
int n_to_send = n_received + opt_n_inflight - n_sent;
|
|
if (n_to_send > opt_n_items - n_sent)
|
|
n_to_send = opt_n_items - n_sent;
|
|
add_n_work_items(tp, n_to_send);
|
|
}
|
|
|
|
if (shutting_down == 0 &&
|
|
n_received+n_successful_cancel == n_sent &&
|
|
n_sent >= opt_n_items) {
|
|
shutting_down = 1;
|
|
threadpool_queue_update(tp, NULL,
|
|
workqueue_do_shutdown, NULL, NULL);
|
|
// Anything we add after starting the shutdown must not be executed.
|
|
threadpool_queue_work(tp, workqueue_shutdown_error,
|
|
handle_reply_shutdown, NULL);
|
|
{
|
|
struct timeval limit = { 2, 0 };
|
|
tor_libevent_exit_loop_after_delay(tor_libevent_get_base(), &limit);
|
|
}
|
|
}
|
|
}
|
|
|
|
static void
|
|
help(void)
|
|
{
|
|
puts(
|
|
"Options:\n"
|
|
" -h Display this information\n"
|
|
" -v Be verbose\n"
|
|
" -N <items> Run this many items of work\n"
|
|
" -T <threads> Use this many threads\n"
|
|
" -I <inflight> Have no more than this many requests queued at once\n"
|
|
" -L <lowwater> Add items whenever fewer than this many are pending\n"
|
|
" -C <cancel> Try to cancel N items of every batch that we add\n"
|
|
" -R <ratio> Make one out of this many items be a slow (RSA) one\n"
|
|
" --no-{eventfd2,eventfd,pipe2,pipe,socketpair}\n"
|
|
" Disable one of the alert_socket backends.");
|
|
}
|
|
|
|
int
|
|
main(int argc, char **argv)
|
|
{
|
|
replyqueue_t *rq;
|
|
threadpool_t *tp;
|
|
int i;
|
|
tor_libevent_cfg_t evcfg;
|
|
uint32_t as_flags = 0;
|
|
|
|
for (i = 1; i < argc; ++i) {
|
|
if (!strcmp(argv[i], "-v")) {
|
|
opt_verbose = 1;
|
|
} else if (!strcmp(argv[i], "-T") && i+1<argc) {
|
|
opt_n_threads = atoi(argv[++i]);
|
|
} else if (!strcmp(argv[i], "-N") && i+1<argc) {
|
|
opt_n_items = atoi(argv[++i]);
|
|
} else if (!strcmp(argv[i], "-I") && i+1<argc) {
|
|
opt_n_inflight = atoi(argv[++i]);
|
|
} else if (!strcmp(argv[i], "-L") && i+1<argc) {
|
|
opt_n_lowwater = atoi(argv[++i]);
|
|
} else if (!strcmp(argv[i], "-R") && i+1<argc) {
|
|
opt_ratio_rsa = atoi(argv[++i]);
|
|
} else if (!strcmp(argv[i], "-C") && i+1<argc) {
|
|
opt_n_cancel = atoi(argv[++i]);
|
|
} else if (!strcmp(argv[i], "--no-eventfd2")) {
|
|
as_flags |= ASOCKS_NOEVENTFD2;
|
|
} else if (!strcmp(argv[i], "--no-eventfd")) {
|
|
as_flags |= ASOCKS_NOEVENTFD;
|
|
} else if (!strcmp(argv[i], "--no-pipe2")) {
|
|
as_flags |= ASOCKS_NOPIPE2;
|
|
} else if (!strcmp(argv[i], "--no-pipe")) {
|
|
as_flags |= ASOCKS_NOPIPE;
|
|
} else if (!strcmp(argv[i], "--no-socketpair")) {
|
|
as_flags |= ASOCKS_NOSOCKETPAIR;
|
|
} else if (!strcmp(argv[i], "-h")) {
|
|
help();
|
|
return 0;
|
|
} else {
|
|
help();
|
|
return 1;
|
|
}
|
|
}
|
|
|
|
if (opt_n_threads < 1 ||
|
|
opt_n_items < 1 || opt_n_inflight < 1 || opt_n_lowwater < 0 ||
|
|
opt_n_cancel > opt_n_inflight || opt_n_inflight > MAX_INFLIGHT ||
|
|
opt_ratio_rsa < 0) {
|
|
help();
|
|
return 1;
|
|
}
|
|
|
|
if (opt_n_inflight > opt_n_items) {
|
|
opt_n_inflight = opt_n_items;
|
|
}
|
|
|
|
init_logging(1);
|
|
network_init();
|
|
if (crypto_global_init(1, NULL, NULL) < 0) {
|
|
printf("Couldn't initialize crypto subsystem; exiting.\n");
|
|
return 1;
|
|
}
|
|
if (crypto_seed_rng() < 0) {
|
|
printf("Couldn't seed RNG; exiting.\n");
|
|
return 1;
|
|
}
|
|
|
|
rq = replyqueue_new(as_flags);
|
|
if (as_flags && rq == NULL)
|
|
return 77; // 77 means "skipped".
|
|
|
|
tor_assert(rq);
|
|
tp = threadpool_new(opt_n_threads,
|
|
rq, new_state, free_state, NULL);
|
|
tor_assert(tp);
|
|
|
|
crypto_seed_weak_rng(&weak_rng);
|
|
|
|
memset(&evcfg, 0, sizeof(evcfg));
|
|
tor_libevent_initialize(&evcfg);
|
|
|
|
{
|
|
int r = threadpool_register_reply_event(tp,
|
|
replysock_readable_cb);
|
|
tor_assert(r == 0);
|
|
}
|
|
|
|
#ifdef TRACK_RESPONSES
|
|
handled = bitarray_init_zero(opt_n_items);
|
|
received = bitarray_init_zero(opt_n_items);
|
|
tor_mutex_init(&bitmap_mutex);
|
|
handled_len = opt_n_items;
|
|
#endif /* defined(TRACK_RESPONSES) */
|
|
|
|
for (i = 0; i < opt_n_inflight; ++i) {
|
|
if (! add_work(tp)) {
|
|
puts("Couldn't add work.");
|
|
return 1;
|
|
}
|
|
}
|
|
|
|
{
|
|
struct timeval limit = { 180, 0 };
|
|
tor_libevent_exit_loop_after_delay(tor_libevent_get_base(), &limit);
|
|
}
|
|
|
|
tor_libevent_run_event_loop(tor_libevent_get_base(), 0);
|
|
|
|
if (n_sent != opt_n_items || n_received+n_successful_cancel != n_sent) {
|
|
printf("%d vs %d\n", n_sent, opt_n_items);
|
|
printf("%d+%d vs %d\n", n_received, n_successful_cancel, n_sent);
|
|
puts("FAIL");
|
|
return 1;
|
|
} else if (no_shutdown) {
|
|
puts("Accepted work after shutdown\n");
|
|
puts("FAIL");
|
|
} else {
|
|
puts("OK");
|
|
return 0;
|
|
}
|
|
}
|