r13715@catbus: nickm | 2007-07-12 12:11:09 -0400
[tor.git] / src / or / rephist.c
blob4f18a093e0a4dd4c4b14f994155f9ae487302816
1 /* Copyright 2004-2007 Roger Dingledine, Nick Mathewson. */
2 /* See LICENSE for licensing information */
3 /* $Id$ */
4 const char rephist_c_id[] =
5 "$Id$";
7 /**
8 * \file rephist.c
9 * \brief Basic history and "reputation" functionality to remember
10 * which servers have worked in the past, how much bandwidth we've
11 * been using, which ports we tend to want, and so on.
12 **/
14 #include "or.h"
16 static void bw_arrays_init(void);
17 static void predicted_ports_init(void);
19 uint64_t rephist_total_alloc=0;
20 uint32_t rephist_total_num=0;
22 /** History of an OR-\>OR link. */
23 typedef struct link_history_t {
24 /** When did we start tracking this list? */
25 time_t since;
26 /** When did we most recently note a change to this link */
27 time_t changed;
28 /** How many times did extending from OR1 to OR2 succeed? */
29 unsigned long n_extend_ok;
30 /** How many times did extending from OR1 to OR2 fail? */
31 unsigned long n_extend_fail;
32 } link_history_t;
34 /** History of an OR. */
35 typedef struct or_history_t {
36 /** When did we start tracking this OR? */
37 time_t since;
38 /** When did we most recently note a change to this OR? */
39 time_t changed;
40 /** How many times did we successfully connect? */
41 unsigned long n_conn_ok;
42 /** How many times did we try to connect and fail?*/
43 unsigned long n_conn_fail;
44 /** How many seconds have we been connected to this OR before
45 * 'up_since'? */
46 unsigned long uptime;
47 /** How many seconds have we been unable to connect to this OR before
48 * 'down_since'? */
49 unsigned long downtime;
50 /** If nonzero, we have been connected since this time. */
51 time_t up_since;
52 /** If nonzero, we have been unable to connect since this time. */
53 time_t down_since;
54 /** Map from hex OR2 identity digest to a link_history_t for the link
55 * from this OR to OR2. */
56 digestmap_t *link_history_map;
57 } or_history_t;
59 /** Map from hex OR identity digest to or_history_t. */
60 static digestmap_t *history_map = NULL;
62 /** Return the or_history_t for the named OR, creating it if necessary. */
63 static or_history_t *
64 get_or_history(const char* id)
66 or_history_t *hist;
68 if (tor_mem_is_zero(id, DIGEST_LEN))
69 return NULL;
71 hist = digestmap_get(history_map, id);
72 if (!hist) {
73 hist = tor_malloc_zero(sizeof(or_history_t));
74 rephist_total_alloc += sizeof(or_history_t);
75 rephist_total_num++;
76 hist->link_history_map = digestmap_new();
77 hist->since = hist->changed = time(NULL);
78 digestmap_set(history_map, id, hist);
80 return hist;
83 /** Return the link_history_t for the link from the first named OR to
84 * the second, creating it if necessary. (ORs are identified by
85 * identity digest.)
87 static link_history_t *
88 get_link_history(const char *from_id, const char *to_id)
90 or_history_t *orhist;
91 link_history_t *lhist;
92 orhist = get_or_history(from_id);
93 if (!orhist)
94 return NULL;
95 if (tor_mem_is_zero(to_id, DIGEST_LEN))
96 return NULL;
97 lhist = (link_history_t*) digestmap_get(orhist->link_history_map, to_id);
98 if (!lhist) {
99 lhist = tor_malloc_zero(sizeof(link_history_t));
100 rephist_total_alloc += sizeof(link_history_t);
101 lhist->since = lhist->changed = time(NULL);
102 digestmap_set(orhist->link_history_map, to_id, lhist);
104 return lhist;
107 /** Helper: free storage held by a single link history entry. */
108 static void
109 _free_link_history(void *val)
111 rephist_total_alloc -= sizeof(link_history_t);
112 tor_free(val);
115 /** Helper: free storage held by a single OR history entry. */
116 static void
117 free_or_history(void *_hist)
119 or_history_t *hist = _hist;
120 digestmap_free(hist->link_history_map, _free_link_history);
121 rephist_total_alloc -= sizeof(or_history_t);
122 rephist_total_num--;
123 tor_free(hist);
126 /** Update an or_history_t object <b>hist</b> so that its uptime/downtime
127 * count is up-to-date as of <b>when</b>.
129 static void
130 update_or_history(or_history_t *hist, time_t when)
132 tor_assert(hist);
133 if (hist->up_since) {
134 tor_assert(!hist->down_since);
135 hist->uptime += (when - hist->up_since);
136 hist->up_since = when;
137 } else if (hist->down_since) {
138 hist->downtime += (when - hist->down_since);
139 hist->down_since = when;
143 /** Initialize the static data structures for tracking history. */
144 void
145 rep_hist_init(void)
147 history_map = digestmap_new();
148 bw_arrays_init();
149 predicted_ports_init();
152 /** Remember that an attempt to connect to the OR with identity digest
153 * <b>id</b> failed at <b>when</b>.
155 void
156 rep_hist_note_connect_failed(const char* id, time_t when)
158 or_history_t *hist;
159 hist = get_or_history(id);
160 if (!hist)
161 return;
162 ++hist->n_conn_fail;
163 if (hist->up_since) {
164 hist->uptime += (when - hist->up_since);
165 hist->up_since = 0;
167 if (!hist->down_since)
168 hist->down_since = when;
169 hist->changed = when;
172 /** Remember that an attempt to connect to the OR with identity digest
173 * <b>id</b> succeeded at <b>when</b>.
175 void
176 rep_hist_note_connect_succeeded(const char* id, time_t when)
178 or_history_t *hist;
179 hist = get_or_history(id);
180 if (!hist)
181 return;
182 ++hist->n_conn_ok;
183 if (hist->down_since) {
184 hist->downtime += (when - hist->down_since);
185 hist->down_since = 0;
187 if (!hist->up_since)
188 hist->up_since = when;
189 hist->changed = when;
192 /** Remember that we intentionally closed our connection to the OR
193 * with identity digest <b>id</b> at <b>when</b>.
195 void
196 rep_hist_note_disconnect(const char* id, time_t when)
198 or_history_t *hist;
199 hist = get_or_history(id);
200 if (!hist)
201 return;
202 ++hist->n_conn_ok;
203 if (hist->up_since) {
204 hist->uptime += (when - hist->up_since);
205 hist->up_since = 0;
207 hist->changed = when;
210 /** Remember that our connection to the OR with identity digest
211 * <b>id</b> had an error and stopped working at <b>when</b>.
213 void
214 rep_hist_note_connection_died(const char* id, time_t when)
216 or_history_t *hist;
217 if (!id) {
218 /* If conn has no nickname, it didn't complete its handshake, or something
219 * went wrong. Ignore it.
221 return;
223 hist = get_or_history(id);
224 if (!hist)
225 return;
226 if (hist->up_since) {
227 hist->uptime += (when - hist->up_since);
228 hist->up_since = 0;
230 if (!hist->down_since)
231 hist->down_since = when;
232 hist->changed = when;
235 /** Remember that we successfully extended from the OR with identity
236 * digest <b>from_id</b> to the OR with identity digest
237 * <b>to_name</b>.
239 void
240 rep_hist_note_extend_succeeded(const char *from_id, const char *to_id)
242 link_history_t *hist;
243 /* log_fn(LOG_WARN, "EXTEND SUCCEEDED: %s->%s",from_name,to_name); */
244 hist = get_link_history(from_id, to_id);
245 if (!hist)
246 return;
247 ++hist->n_extend_ok;
248 hist->changed = time(NULL);
251 /** Remember that we tried to extend from the OR with identity digest
252 * <b>from_id</b> to the OR with identity digest <b>to_name</b>, but
253 * failed.
255 void
256 rep_hist_note_extend_failed(const char *from_id, const char *to_id)
258 link_history_t *hist;
259 /* log_fn(LOG_WARN, "EXTEND FAILED: %s->%s",from_name,to_name); */
260 hist = get_link_history(from_id, to_id);
261 if (!hist)
262 return;
263 ++hist->n_extend_fail;
264 hist->changed = time(NULL);
267 /** Log all the reliability data we have remembered, with the chosen
268 * severity.
270 void
271 rep_hist_dump_stats(time_t now, int severity)
273 digestmap_iter_t *lhist_it;
274 digestmap_iter_t *orhist_it;
275 const char *name1, *name2, *digest1, *digest2;
276 char hexdigest1[HEX_DIGEST_LEN+1];
277 or_history_t *or_history;
278 link_history_t *link_history;
279 void *or_history_p, *link_history_p;
280 double uptime;
281 char buffer[2048];
282 size_t len;
283 int ret;
284 unsigned long upt, downt;
285 routerinfo_t *r;
287 rep_history_clean(now - get_options()->RephistTrackTime);
289 log(severity, LD_GENERAL, "--------------- Dumping history information:");
291 for (orhist_it = digestmap_iter_init(history_map);
292 !digestmap_iter_done(orhist_it);
293 orhist_it = digestmap_iter_next(history_map,orhist_it)) {
294 digestmap_iter_get(orhist_it, &digest1, &or_history_p);
295 or_history = (or_history_t*) or_history_p;
297 if ((r = router_get_by_digest(digest1)))
298 name1 = r->nickname;
299 else
300 name1 = "(unknown)";
301 base16_encode(hexdigest1, sizeof(hexdigest1), digest1, DIGEST_LEN);
302 update_or_history(or_history, now);
303 upt = or_history->uptime;
304 downt = or_history->downtime;
305 if (upt+downt) {
306 uptime = ((double)upt) / (upt+downt);
307 } else {
308 uptime=1.0;
310 log(severity, LD_GENERAL,
311 "OR %s [%s]: %ld/%ld good connections; uptime %ld/%ld sec (%.2f%%)",
312 name1, hexdigest1,
313 or_history->n_conn_ok, or_history->n_conn_fail+or_history->n_conn_ok,
314 upt, upt+downt, uptime*100.0);
316 if (!digestmap_isempty(or_history->link_history_map)) {
317 strlcpy(buffer, " Extend attempts: ", sizeof(buffer));
318 len = strlen(buffer);
319 for (lhist_it = digestmap_iter_init(or_history->link_history_map);
320 !digestmap_iter_done(lhist_it);
321 lhist_it = digestmap_iter_next(or_history->link_history_map,
322 lhist_it)) {
323 digestmap_iter_get(lhist_it, &digest2, &link_history_p);
324 if ((r = router_get_by_digest(digest2)))
325 name2 = r->nickname;
326 else
327 name2 = "(unknown)";
329 link_history = (link_history_t*) link_history_p;
331 ret = tor_snprintf(buffer+len, 2048-len, "%s(%ld/%ld); ", name2,
332 link_history->n_extend_ok,
333 link_history->n_extend_ok+link_history->n_extend_fail);
334 if (ret<0)
335 break;
336 else
337 len += ret;
339 log(severity, LD_GENERAL, "%s", buffer);
344 /** Remove history info for routers/links that haven't changed since
345 * <b>before</b>.
347 void
348 rep_history_clean(time_t before)
350 or_history_t *or_history;
351 link_history_t *link_history;
352 void *or_history_p, *link_history_p;
353 digestmap_iter_t *orhist_it, *lhist_it;
354 const char *d1, *d2;
356 orhist_it = digestmap_iter_init(history_map);
357 while (!digestmap_iter_done(orhist_it)) {
358 digestmap_iter_get(orhist_it, &d1, &or_history_p);
359 or_history = or_history_p;
360 if (or_history->changed < before) {
361 orhist_it = digestmap_iter_next_rmv(history_map, orhist_it);
362 free_or_history(or_history);
363 continue;
365 for (lhist_it = digestmap_iter_init(or_history->link_history_map);
366 !digestmap_iter_done(lhist_it); ) {
367 digestmap_iter_get(lhist_it, &d2, &link_history_p);
368 link_history = link_history_p;
369 if (link_history->changed < before) {
370 lhist_it = digestmap_iter_next_rmv(or_history->link_history_map,
371 lhist_it);
372 rephist_total_alloc -= sizeof(link_history_t);
373 tor_free(link_history);
374 continue;
376 lhist_it = digestmap_iter_next(or_history->link_history_map,lhist_it);
378 orhist_it = digestmap_iter_next(history_map, orhist_it);
382 /** For how many seconds do we keep track of individual per-second bandwidth
383 * totals? */
384 #define NUM_SECS_ROLLING_MEASURE 10
385 /** How large are the intervals for with we track and report bandwidth use? */
386 #define NUM_SECS_BW_SUM_INTERVAL (15*60)
387 /** How far in the past do we remember and publish bandwidth use? */
388 #define NUM_SECS_BW_SUM_IS_VALID (24*60*60)
389 /** How many bandwidth usage intervals do we remember? (derived) */
390 #define NUM_TOTALS (NUM_SECS_BW_SUM_IS_VALID/NUM_SECS_BW_SUM_INTERVAL)
392 /** Structure to track bandwidth use, and remember the maxima for a given
393 * time period.
395 typedef struct bw_array_t {
396 /** Observation array: Total number of bytes transferred in each of the last
397 * NUM_SECS_ROLLING_MEASURE seconds. This is used as a circular array. */
398 uint64_t obs[NUM_SECS_ROLLING_MEASURE];
399 int cur_obs_idx; /**< Current position in obs. */
400 time_t cur_obs_time; /**< Time represented in obs[cur_obs_idx] */
401 uint64_t total_obs; /**< Total for all members of obs except
402 * obs[cur_obs_idx] */
403 uint64_t max_total; /**< Largest value that total_obs has taken on in the
404 * current period. */
405 uint64_t total_in_period; /**< Total bytes transferred in the current
406 * period. */
408 /** When does the next period begin? */
409 time_t next_period;
410 /** Where in 'maxima' should the maximum bandwidth usage for the current
411 * period be stored? */
412 int next_max_idx;
413 /** How many values in maxima/totals have been set ever? */
414 int num_maxes_set;
415 /** Circular array of the maximum
416 * bandwidth-per-NUM_SECS_ROLLING_MEASURE usage for the last
417 * NUM_TOTALS periods */
418 uint64_t maxima[NUM_TOTALS];
419 /** Circular array of the total bandwidth usage for the last NUM_TOTALS
420 * periods */
421 uint64_t totals[NUM_TOTALS];
422 } bw_array_t;
424 /** Shift the current period of b forward by one. */
425 static void
426 commit_max(bw_array_t *b)
428 /* Store total from current period. */
429 b->totals[b->next_max_idx] = b->total_in_period;
430 /* Store maximum from current period. */
431 b->maxima[b->next_max_idx++] = b->max_total;
432 /* Advance next_period and next_max_idx */
433 b->next_period += NUM_SECS_BW_SUM_INTERVAL;
434 if (b->next_max_idx == NUM_TOTALS)
435 b->next_max_idx = 0;
436 if (b->num_maxes_set < NUM_TOTALS)
437 ++b->num_maxes_set;
438 /* Reset max_total. */
439 b->max_total = 0;
440 /* Reset total_in_period. */
441 b->total_in_period = 0;
444 /** Shift the current observation time of 'b' forward by one second. */
445 static INLINE void
446 advance_obs(bw_array_t *b)
448 int nextidx;
449 uint64_t total;
451 /* Calculate the total bandwidth for the last NUM_SECS_ROLLING_MEASURE
452 * seconds; adjust max_total as needed.*/
453 total = b->total_obs + b->obs[b->cur_obs_idx];
454 if (total > b->max_total)
455 b->max_total = total;
457 nextidx = b->cur_obs_idx+1;
458 if (nextidx == NUM_SECS_ROLLING_MEASURE)
459 nextidx = 0;
461 b->total_obs = total - b->obs[nextidx];
462 b->obs[nextidx]=0;
463 b->cur_obs_idx = nextidx;
465 if (++b->cur_obs_time >= b->next_period)
466 commit_max(b);
469 /** Add 'n' bytes to the number of bytes in b for second 'when'. */
470 static INLINE void
471 add_obs(bw_array_t *b, time_t when, uint64_t n)
473 /* Don't record data in the past. */
474 if (when<b->cur_obs_time)
475 return;
476 /* If we're currently adding observations for an earlier second than
477 * 'when', advance b->cur_obs_time and b->cur_obs_idx by an
478 * appropriate number of seconds, and do all the other housekeeping */
479 while (when>b->cur_obs_time)
480 advance_obs(b);
482 b->obs[b->cur_obs_idx] += n;
483 b->total_in_period += n;
486 /** Allocate, initialize, and return a new bw_array. */
487 static bw_array_t *
488 bw_array_new(void)
490 bw_array_t *b;
491 time_t start;
492 b = tor_malloc_zero(sizeof(bw_array_t));
493 rephist_total_alloc += sizeof(bw_array_t);
494 start = time(NULL);
495 b->cur_obs_time = start;
496 b->next_period = start + NUM_SECS_BW_SUM_INTERVAL;
497 return b;
500 static bw_array_t *read_array = NULL;
501 static bw_array_t *write_array = NULL;
503 /** Set up read_array and write_array. */
504 static void
505 bw_arrays_init(void)
507 read_array = bw_array_new();
508 write_array = bw_array_new();
511 /** We read <b>num_bytes</b> more bytes in second <b>when</b>.
513 * Add num_bytes to the current running total for <b>when</b>.
515 * <b>when</b> can go back to time, but it's safe to ignore calls
516 * earlier than the latest <b>when</b> you've heard of.
518 void
519 rep_hist_note_bytes_written(int num_bytes, time_t when)
521 /* Maybe a circular array for recent seconds, and step to a new point
522 * every time a new second shows up. Or simpler is to just to have
523 * a normal array and push down each item every second; it's short.
525 /* When a new second has rolled over, compute the sum of the bytes we've
526 * seen over when-1 to when-1-NUM_SECS_ROLLING_MEASURE, and stick it
527 * somewhere. See rep_hist_bandwidth_assess() below.
529 add_obs(write_array, when, num_bytes);
532 /** We wrote <b>num_bytes</b> more bytes in second <b>when</b>.
533 * (like rep_hist_note_bytes_written() above)
535 void
536 rep_hist_note_bytes_read(int num_bytes, time_t when)
538 /* if we're smart, we can make this func and the one above share code */
539 add_obs(read_array, when, num_bytes);
542 /** Helper: Return the largest value in b->maxima. (This is equal to the
543 * most bandwidth used in any NUM_SECS_ROLLING_MEASURE period for the last
544 * NUM_SECS_BW_SUM_IS_VALID seconds.)
546 static uint64_t
547 find_largest_max(bw_array_t *b)
549 int i;
550 uint64_t max;
551 max=0;
552 for (i=0; i<NUM_TOTALS; ++i) {
553 if (b->maxima[i]>max)
554 max = b->maxima[i];
556 return max;
559 /** Find the largest sums in the past NUM_SECS_BW_SUM_IS_VALID (roughly)
560 * seconds. Find one sum for reading and one for writing. They don't have
561 * to be at the same time).
563 * Return the smaller of these sums, divided by NUM_SECS_ROLLING_MEASURE.
566 rep_hist_bandwidth_assess(void)
568 uint64_t w,r;
569 r = find_largest_max(read_array);
570 w = find_largest_max(write_array);
571 if (r>w)
572 return (int)(U64_TO_DBL(w)/NUM_SECS_ROLLING_MEASURE);
573 else
574 return (int)(U64_TO_DBL(r)/NUM_SECS_ROLLING_MEASURE);
577 /** Print the bandwidth history of b (either read_array or write_array)
578 * into the buffer pointed to by buf. The format is simply comma
579 * separated numbers, from oldest to newest.
581 * It returns the number of bytes written.
583 static size_t
584 rep_hist_fill_bandwidth_history(char *buf, size_t len, bw_array_t *b)
586 char *cp = buf;
587 int i, n;
589 if (b->num_maxes_set <= b->next_max_idx) {
590 /* We haven't been through the circular array yet; time starts at i=0.*/
591 i = 0;
592 } else {
593 /* We've been around the array at least once. The next i to be
594 overwritten is the oldest. */
595 i = b->next_max_idx;
598 for (n=0; n<b->num_maxes_set; ++n,++i) {
599 uint64_t total;
600 while (i >= NUM_TOTALS) i -= NUM_TOTALS;
601 /* Round the bandwidth used down to the nearest 1k. */
602 total = b->totals[i] & ~0x3ff;
603 if (n==(b->num_maxes_set-1))
604 tor_snprintf(cp, len-(cp-buf), U64_FORMAT, U64_PRINTF_ARG(total));
605 else
606 tor_snprintf(cp, len-(cp-buf), U64_FORMAT",", U64_PRINTF_ARG(total));
607 cp += strlen(cp);
609 return cp-buf;
612 /** Allocate and return lines for representing this server's bandwidth
613 * history in its descriptor.
615 char *
616 rep_hist_get_bandwidth_lines(void)
618 char *buf, *cp;
619 char t[ISO_TIME_LEN+1];
620 int r;
621 bw_array_t *b;
622 size_t len;
624 /* opt (read|write)-history yyyy-mm-dd HH:MM:SS (n s) n,n,n,n,n... */
625 len = (60+20*NUM_TOTALS)*2;
626 buf = tor_malloc_zero(len);
627 cp = buf;
628 for (r=0;r<2;++r) {
629 b = r?read_array:write_array;
630 tor_assert(b);
631 format_iso_time(t, b->next_period-NUM_SECS_BW_SUM_INTERVAL);
632 tor_snprintf(cp, len-(cp-buf), "opt %s %s (%d s) ",
633 r ? "read-history" : "write-history", t,
634 NUM_SECS_BW_SUM_INTERVAL);
635 cp += strlen(cp);
636 cp += rep_hist_fill_bandwidth_history(cp, len-(cp-buf), b);
637 strlcat(cp, "\n", len-(cp-buf));
638 ++cp;
640 return buf;
643 /** Update <b>state</b> with the newest bandwidth history. */
644 void
645 rep_hist_update_state(or_state_t *state)
647 int len, r;
648 char *buf, *cp;
649 smartlist_t **s_values;
650 time_t *s_begins;
651 int *s_interval;
652 bw_array_t *b;
654 len = 20*NUM_TOTALS+1;
655 buf = tor_malloc_zero(len);
657 for (r=0;r<2;++r) {
658 b = r?read_array:write_array;
659 s_begins = r?&state->BWHistoryReadEnds :&state->BWHistoryWriteEnds;
660 s_interval= r?&state->BWHistoryReadInterval:&state->BWHistoryWriteInterval;
661 s_values = r?&state->BWHistoryReadValues :&state->BWHistoryWriteValues;
663 if (*s_values) {
664 SMARTLIST_FOREACH(*s_values, char *, cp, tor_free(cp));
665 smartlist_free(*s_values);
667 if (! server_mode(get_options())) {
668 /* Clients don't need to store bandwidth history persistently;
669 * force these values to the defaults. */
670 /* FFFF we should pull the default out of config.c's state table,
671 * so we don't have two defaults. */
672 if (*s_begins != 0 || *s_interval != 900) {
673 time_t now = time(NULL);
674 time_t save_at = get_options()->AvoidDiskWrites ? now+3600 : now+600;
675 or_state_mark_dirty(state, save_at);
677 *s_begins = 0;
678 *s_interval = 900;
679 *s_values = smartlist_create();
680 continue;
682 *s_begins = b->next_period;
683 *s_interval = NUM_SECS_BW_SUM_INTERVAL;
684 cp = buf;
685 cp += rep_hist_fill_bandwidth_history(cp, len, b);
686 tor_snprintf(cp, len-(cp-buf), cp == buf ? U64_FORMAT : ","U64_FORMAT,
687 U64_PRINTF_ARG(b->total_in_period));
688 *s_values = smartlist_create();
689 if (server_mode(get_options()))
690 smartlist_split_string(*s_values, buf, ",", SPLIT_SKIP_SPACE, 0);
692 tor_free(buf);
693 if (server_mode(get_options())) {
694 or_state_mark_dirty(get_or_state(), time(NULL)+(2*3600));
698 /** Set bandwidth history from our saved state. */
700 rep_hist_load_state(or_state_t *state, char **err)
702 time_t s_begins, start;
703 time_t now = time(NULL);
704 uint64_t v;
705 int r,i,ok;
706 int all_ok = 1;
707 int s_interval;
708 smartlist_t *s_values;
709 bw_array_t *b;
711 /* Assert they already have been malloced */
712 tor_assert(read_array && write_array);
714 for (r=0;r<2;++r) {
715 b = r?read_array:write_array;
716 s_begins = r?state->BWHistoryReadEnds:state->BWHistoryWriteEnds;
717 s_interval = r?state->BWHistoryReadInterval:state->BWHistoryWriteInterval;
718 s_values = r?state->BWHistoryReadValues:state->BWHistoryWriteValues;
719 if (s_values && s_begins >= now - NUM_SECS_BW_SUM_INTERVAL*NUM_TOTALS) {
720 start = s_begins - s_interval*(smartlist_len(s_values));
722 b->cur_obs_time = start;
723 b->next_period = start + NUM_SECS_BW_SUM_INTERVAL;
724 SMARTLIST_FOREACH(s_values, char *, cp, {
725 v = tor_parse_uint64(cp, 10, 0, UINT64_MAX, &ok, NULL);
726 if (!ok) {
727 all_ok=0;
728 log_notice(LD_GENERAL, "Could not parse '%s' into a number.'", cp);
730 add_obs(b, start, v);
731 start += NUM_SECS_BW_SUM_INTERVAL;
735 /* Clean up maxima and observed */
736 /* Do we really want to zero this for the purpose of max capacity? */
737 for (i=0; i<NUM_SECS_ROLLING_MEASURE; ++i) {
738 b->obs[i] = 0;
740 b->total_obs = 0;
741 for (i=0; i<NUM_TOTALS; ++i) {
742 b->maxima[i] = 0;
744 b->max_total = 0;
747 if (!all_ok) {
748 *err = tor_strdup("Parsing of bandwidth history values failed");
749 /* and create fresh arrays */
750 tor_free(read_array);
751 tor_free(write_array);
752 read_array = bw_array_new();
753 write_array = bw_array_new();
754 return -1;
756 return 0;
759 /*********************************************************************/
761 /** A list of port numbers that have been used recently. */
762 static smartlist_t *predicted_ports_list=NULL;
763 /** The corresponding most recently used time for each port. */
764 static smartlist_t *predicted_ports_times=NULL;
766 /** We just got an application request for a connection with
767 * port <b>port</b>. Remember it for the future, so we can keep
768 * some circuits open that will exit to this port.
770 static void
771 add_predicted_port(uint16_t port, time_t now)
773 /* XXXX we could just use uintptr_t here, I think. */
774 uint16_t *tmp_port = tor_malloc(sizeof(uint16_t));
775 time_t *tmp_time = tor_malloc(sizeof(time_t));
776 *tmp_port = port;
777 *tmp_time = now;
778 rephist_total_alloc += sizeof(uint16_t) + sizeof(time_t);
779 smartlist_add(predicted_ports_list, tmp_port);
780 smartlist_add(predicted_ports_times, tmp_time);
783 /** Initialize whatever memory and structs are needed for predicting
784 * which ports will be used. Also seed it with port 80, so we'll build
785 * circuits on start-up.
787 static void
788 predicted_ports_init(void)
790 predicted_ports_list = smartlist_create();
791 predicted_ports_times = smartlist_create();
792 add_predicted_port(80, time(NULL)); /* add one to kickstart us */
795 /** Free whatever memory is needed for predicting which ports will
796 * be used.
798 static void
799 predicted_ports_free(void)
801 rephist_total_alloc -= smartlist_len(predicted_ports_list)*sizeof(uint16_t);
802 SMARTLIST_FOREACH(predicted_ports_list, char *, cp, tor_free(cp));
803 smartlist_free(predicted_ports_list);
804 rephist_total_alloc -= smartlist_len(predicted_ports_times)*sizeof(time_t);
805 SMARTLIST_FOREACH(predicted_ports_times, char *, cp, tor_free(cp));
806 smartlist_free(predicted_ports_times);
809 /** Remember that <b>port</b> has been asked for as of time <b>now</b>.
810 * This is used for predicting what sorts of streams we'll make in the
811 * future and making exit circuits to anticipate that.
813 void
814 rep_hist_note_used_port(uint16_t port, time_t now)
816 int i;
817 uint16_t *tmp_port;
818 time_t *tmp_time;
820 tor_assert(predicted_ports_list);
821 tor_assert(predicted_ports_times);
823 if (!port) /* record nothing */
824 return;
826 for (i = 0; i < smartlist_len(predicted_ports_list); ++i) {
827 tmp_port = smartlist_get(predicted_ports_list, i);
828 tmp_time = smartlist_get(predicted_ports_times, i);
829 if (*tmp_port == port) {
830 *tmp_time = now;
831 return;
834 /* it's not there yet; we need to add it */
835 add_predicted_port(port, now);
838 /** For this long after we've seen a request for a given port, assume that
839 * we'll want to make connections to the same port in the future. */
840 #define PREDICTED_CIRCS_RELEVANCE_TIME (60*60)
842 /** Return a pointer to the list of port numbers that
843 * are likely to be asked for in the near future.
845 * The caller promises not to mess with it.
847 smartlist_t *
848 rep_hist_get_predicted_ports(time_t now)
850 int i;
851 uint16_t *tmp_port;
852 time_t *tmp_time;
854 tor_assert(predicted_ports_list);
855 tor_assert(predicted_ports_times);
857 /* clean out obsolete entries */
858 for (i = 0; i < smartlist_len(predicted_ports_list); ++i) {
859 tmp_time = smartlist_get(predicted_ports_times, i);
860 if (*tmp_time + PREDICTED_CIRCS_RELEVANCE_TIME < now) {
861 tmp_port = smartlist_get(predicted_ports_list, i);
862 log_debug(LD_CIRC, "Expiring predicted port %d", *tmp_port);
863 smartlist_del(predicted_ports_list, i);
864 smartlist_del(predicted_ports_times, i);
865 rephist_total_alloc -= sizeof(uint16_t)+sizeof(time_t);
866 tor_free(tmp_port);
867 tor_free(tmp_time);
868 i--;
871 return predicted_ports_list;
874 /** The user asked us to do a resolve. Rather than keeping track of
875 * timings and such of resolves, we fake it for now by making treating
876 * it the same way as a connection to port 80. This way we will continue
877 * to have circuits lying around if the user only uses Tor for resolves.
879 void
880 rep_hist_note_used_resolve(time_t now)
882 rep_hist_note_used_port(80, now);
885 /** The last time at which we needed an internal circ. */
886 static time_t predicted_internal_time = 0;
887 /** The last time we needed an internal circ with good uptime. */
888 static time_t predicted_internal_uptime_time = 0;
889 /** The last time we needed an internal circ with good capacity. */
890 static time_t predicted_internal_capacity_time = 0;
892 /** Remember that we used an internal circ at time <b>now</b>. */
893 void
894 rep_hist_note_used_internal(time_t now, int need_uptime, int need_capacity)
896 predicted_internal_time = now;
897 if (need_uptime)
898 predicted_internal_uptime_time = now;
899 if (need_capacity)
900 predicted_internal_capacity_time = now;
903 /** Return 1 if we've used an internal circ recently; else return 0. */
905 rep_hist_get_predicted_internal(time_t now, int *need_uptime,
906 int *need_capacity)
908 if (!predicted_internal_time) { /* initialize it */
909 predicted_internal_time = now;
910 predicted_internal_uptime_time = now;
911 predicted_internal_capacity_time = now;
913 if (predicted_internal_time + PREDICTED_CIRCS_RELEVANCE_TIME < now)
914 return 0; /* too long ago */
915 if (predicted_internal_uptime_time + PREDICTED_CIRCS_RELEVANCE_TIME >= now)
916 *need_uptime = 1;
917 if (predicted_internal_capacity_time + PREDICTED_CIRCS_RELEVANCE_TIME >= now)
918 *need_capacity = 1;
919 return 1;
922 /** Any ports used lately? These are pre-seeded if we just started
923 * up or if we're running a hidden service. */
925 any_predicted_circuits(time_t now)
927 return smartlist_len(predicted_ports_list) ||
928 predicted_internal_time + PREDICTED_CIRCS_RELEVANCE_TIME >= now;
931 /** Return 1 if we have no need for circuits currently, else return 0. */
933 rep_hist_circbuilding_dormant(time_t now)
935 if (any_predicted_circuits(now))
936 return 0;
938 /* see if we'll still need to build testing circuits */
939 if (server_mode(get_options()) && !check_whether_orport_reachable())
940 return 0;
941 if (!check_whether_dirport_reachable())
942 return 0;
944 return 1;
947 static uint32_t n_signed_dir_objs = 0;
948 static uint32_t n_signed_routerdescs = 0;
949 static uint32_t n_verified_dir_objs = 0;
950 static uint32_t n_verified_routerdescs = 0;
951 static uint32_t n_onionskins_encrypted = 0;
952 static uint32_t n_onionskins_decrypted = 0;
953 static uint32_t n_tls_client_handshakes = 0;
954 static uint32_t n_tls_server_handshakes = 0;
955 static uint32_t n_rend_client_ops = 0;
956 static uint32_t n_rend_mid_ops = 0;
957 static uint32_t n_rend_server_ops = 0;
959 /** Increment the count of the number of times we've done <b>operation</b>. */
960 void
961 note_crypto_pk_op(pk_op_t operation)
963 switch (operation)
965 case SIGN_DIR:
966 n_signed_dir_objs++;
967 break;
968 case SIGN_RTR:
969 n_signed_routerdescs++;
970 break;
971 case VERIFY_DIR:
972 n_verified_dir_objs++;
973 break;
974 case VERIFY_RTR:
975 n_verified_routerdescs++;
976 break;
977 case ENC_ONIONSKIN:
978 n_onionskins_encrypted++;
979 break;
980 case DEC_ONIONSKIN:
981 n_onionskins_decrypted++;
982 break;
983 case TLS_HANDSHAKE_C:
984 n_tls_client_handshakes++;
985 break;
986 case TLS_HANDSHAKE_S:
987 n_tls_server_handshakes++;
988 break;
989 case REND_CLIENT:
990 n_rend_client_ops++;
991 break;
992 case REND_MID:
993 n_rend_mid_ops++;
994 break;
995 case REND_SERVER:
996 n_rend_server_ops++;
997 break;
998 default:
999 log_warn(LD_BUG, "Unknown pk operation %d", operation);
1003 /** Log the number of times we've done each public/private-key operation. */
1004 void
1005 dump_pk_ops(int severity)
1007 log(severity, LD_GENERAL,
1008 "PK operations: %lu directory objects signed, "
1009 "%lu directory objects verified, "
1010 "%lu routerdescs signed, "
1011 "%lu routerdescs verified, "
1012 "%lu onionskins encrypted, "
1013 "%lu onionskins decrypted, "
1014 "%lu client-side TLS handshakes, "
1015 "%lu server-side TLS handshakes, "
1016 "%lu rendezvous client operations, "
1017 "%lu rendezvous middle operations, "
1018 "%lu rendezvous server operations.",
1019 (unsigned long) n_signed_dir_objs,
1020 (unsigned long) n_verified_dir_objs,
1021 (unsigned long) n_signed_routerdescs,
1022 (unsigned long) n_verified_routerdescs,
1023 (unsigned long) n_onionskins_encrypted,
1024 (unsigned long) n_onionskins_decrypted,
1025 (unsigned long) n_tls_client_handshakes,
1026 (unsigned long) n_tls_server_handshakes,
1027 (unsigned long) n_rend_client_ops,
1028 (unsigned long) n_rend_mid_ops,
1029 (unsigned long) n_rend_server_ops);
1032 /** Free all storage held by the OR/link history caches, by the
1033 * bandwidth history arrays, or by the port history. */
1034 void
1035 rep_hist_free_all(void)
1037 digestmap_free(history_map, free_or_history);
1038 tor_free(read_array);
1039 tor_free(write_array);
1040 predicted_ports_free();