1 /* Copyright 2004-2006 Roger Dingledine, Nick Mathewson. */
2 /* See LICENSE for licensing information */
4 const char rephist_c_id
[] =
9 * \brief Basic history and "reputation" functionality to remember
10 * which servers have worked in the past, how much bandwidth we've
11 * been using, which ports we tend to want, and so on.
16 static void bw_arrays_init(void);
17 static void predicted_ports_init(void);
19 uint64_t rephist_total_alloc
=0;
20 uint32_t rephist_total_num
=0;
22 /** History of an OR-\>OR link. */
23 typedef struct link_history_t
{
24 /** When did we start tracking this list? */
26 /** When did we most recently note a change to this link */
28 /** How many times did extending from OR1 to OR2 succeed? */
29 unsigned long n_extend_ok
;
30 /** How many times did extending from OR1 to OR2 fail? */
31 unsigned long n_extend_fail
;
34 /** History of an OR. */
35 typedef struct or_history_t
{
36 /** When did we start tracking this OR? */
38 /** When did we most recently note a change to this OR? */
40 /** How many times did we successfully connect? */
41 unsigned long n_conn_ok
;
42 /** How many times did we try to connect and fail?*/
43 unsigned long n_conn_fail
;
44 /** How many seconds have we been connected to this OR before
47 /** How many seconds have we been unable to connect to this OR before
49 unsigned long downtime
;
50 /** If nonzero, we have been connected since this time. */
52 /** If nonzero, we have been unable to connect since this time. */
54 /** Map from hex OR2 identity digest to a link_history_t for the link
55 * from this OR to OR2. */
56 digestmap_t
*link_history_map
;
59 /** Map from hex OR identity digest to or_history_t. */
60 static digestmap_t
*history_map
= NULL
;
62 /** Return the or_history_t for the named OR, creating it if necessary. */
64 get_or_history(const char* id
)
68 if (tor_mem_is_zero(id
, DIGEST_LEN
))
71 hist
= digestmap_get(history_map
, id
);
73 hist
= tor_malloc_zero(sizeof(or_history_t
));
74 rephist_total_alloc
+= sizeof(or_history_t
);
76 hist
->link_history_map
= digestmap_new();
77 hist
->since
= hist
->changed
= time(NULL
);
78 digestmap_set(history_map
, id
, hist
);
83 /** Return the link_history_t for the link from the first named OR to
84 * the second, creating it if necessary. (ORs are identified by
87 static link_history_t
*
88 get_link_history(const char *from_id
, const char *to_id
)
91 link_history_t
*lhist
;
92 orhist
= get_or_history(from_id
);
95 if (tor_mem_is_zero(to_id
, DIGEST_LEN
))
97 lhist
= (link_history_t
*) digestmap_get(orhist
->link_history_map
, to_id
);
99 lhist
= tor_malloc_zero(sizeof(link_history_t
));
100 rephist_total_alloc
+= sizeof(link_history_t
);
101 lhist
->since
= lhist
->changed
= time(NULL
);
102 digestmap_set(orhist
->link_history_map
, to_id
, lhist
);
107 /** Helper: free storage held by a single link history entry. */
109 _free_link_history(void *val
)
111 rephist_total_alloc
-= sizeof(link_history_t
);
115 /** Helper: free storage held by a single OR history entry. */
117 free_or_history(void *_hist
)
119 or_history_t
*hist
= _hist
;
120 digestmap_free(hist
->link_history_map
, _free_link_history
);
121 rephist_total_alloc
-= sizeof(or_history_t
);
126 /** Update an or_history_t object <b>hist</b> so that its uptime/downtime
127 * count is up-to-date as of <b>when</b>.
130 update_or_history(or_history_t
*hist
, time_t when
)
133 if (hist
->up_since
) {
134 tor_assert(!hist
->down_since
);
135 hist
->uptime
+= (when
- hist
->up_since
);
136 hist
->up_since
= when
;
137 } else if (hist
->down_since
) {
138 hist
->downtime
+= (when
- hist
->down_since
);
139 hist
->down_since
= when
;
143 /** Initialize the static data structures for tracking history. */
147 history_map
= digestmap_new();
149 predicted_ports_init();
152 /** Remember that an attempt to connect to the OR with identity digest
153 * <b>id</b> failed at <b>when</b>.
156 rep_hist_note_connect_failed(const char* id
, time_t when
)
159 hist
= get_or_history(id
);
163 if (hist
->up_since
) {
164 hist
->uptime
+= (when
- hist
->up_since
);
167 if (!hist
->down_since
)
168 hist
->down_since
= when
;
169 hist
->changed
= when
;
172 /** Remember that an attempt to connect to the OR with identity digest
173 * <b>id</b> succeeded at <b>when</b>.
176 rep_hist_note_connect_succeeded(const char* id
, time_t when
)
179 hist
= get_or_history(id
);
183 if (hist
->down_since
) {
184 hist
->downtime
+= (when
- hist
->down_since
);
185 hist
->down_since
= 0;
188 hist
->up_since
= when
;
189 hist
->changed
= when
;
192 /** Remember that we intentionally closed our connection to the OR
193 * with identity digest <b>id</b> at <b>when</b>.
196 rep_hist_note_disconnect(const char* id
, time_t when
)
199 hist
= get_or_history(id
);
203 if (hist
->up_since
) {
204 hist
->uptime
+= (when
- hist
->up_since
);
207 hist
->changed
= when
;
210 /** Remember that our connection to the OR with identity digest
211 * <b>id</b> had an error and stopped working at <b>when</b>.
214 rep_hist_note_connection_died(const char* id
, time_t when
)
218 /* If conn has no nickname, it didn't complete its handshake, or something
219 * went wrong. Ignore it.
223 hist
= get_or_history(id
);
226 if (hist
->up_since
) {
227 hist
->uptime
+= (when
- hist
->up_since
);
230 if (!hist
->down_since
)
231 hist
->down_since
= when
;
232 hist
->changed
= when
;
235 /** Remember that we successfully extended from the OR with identity
236 * digest <b>from_id</b> to the OR with identity digest
240 rep_hist_note_extend_succeeded(const char *from_id
, const char *to_id
)
242 link_history_t
*hist
;
243 /* log_fn(LOG_WARN, "EXTEND SUCCEEDED: %s->%s",from_name,to_name); */
244 hist
= get_link_history(from_id
, to_id
);
248 hist
->changed
= time(NULL
);
251 /** Remember that we tried to extend from the OR with identity digest
252 * <b>from_id</b> to the OR with identity digest <b>to_name</b>, but
256 rep_hist_note_extend_failed(const char *from_id
, const char *to_id
)
258 link_history_t
*hist
;
259 /* log_fn(LOG_WARN, "EXTEND FAILED: %s->%s",from_name,to_name); */
260 hist
= get_link_history(from_id
, to_id
);
263 ++hist
->n_extend_fail
;
264 hist
->changed
= time(NULL
);
267 /** Log all the reliability data we have remembered, with the chosen
271 rep_hist_dump_stats(time_t now
, int severity
)
273 digestmap_iter_t
*lhist_it
;
274 digestmap_iter_t
*orhist_it
;
275 const char *name1
, *name2
, *digest1
, *digest2
;
276 char hexdigest1
[HEX_DIGEST_LEN
+1];
277 or_history_t
*or_history
;
278 link_history_t
*link_history
;
279 void *or_history_p
, *link_history_p
;
284 unsigned long upt
, downt
;
287 rep_history_clean(now
- get_options()->RephistTrackTime
);
289 log(severity
, LD_GENERAL
, "--------------- Dumping history information:");
291 for (orhist_it
= digestmap_iter_init(history_map
);
292 !digestmap_iter_done(orhist_it
);
293 orhist_it
= digestmap_iter_next(history_map
,orhist_it
)) {
294 digestmap_iter_get(orhist_it
, &digest1
, &or_history_p
);
295 or_history
= (or_history_t
*) or_history_p
;
297 if ((r
= router_get_by_digest(digest1
)))
301 base16_encode(hexdigest1
, sizeof(hexdigest1
), digest1
, DIGEST_LEN
);
302 update_or_history(or_history
, now
);
303 upt
= or_history
->uptime
;
304 downt
= or_history
->downtime
;
306 uptime
= ((double)upt
) / (upt
+downt
);
310 log(severity
, LD_GENERAL
,
311 "OR %s [%s]: %ld/%ld good connections; uptime %ld/%ld sec (%.2f%%)",
313 or_history
->n_conn_ok
, or_history
->n_conn_fail
+or_history
->n_conn_ok
,
314 upt
, upt
+downt
, uptime
*100.0);
316 if (!digestmap_isempty(or_history
->link_history_map
)) {
317 strlcpy(buffer
, " Extend attempts: ", sizeof(buffer
));
318 len
= strlen(buffer
);
319 for (lhist_it
= digestmap_iter_init(or_history
->link_history_map
);
320 !digestmap_iter_done(lhist_it
);
321 lhist_it
= digestmap_iter_next(or_history
->link_history_map
,
323 digestmap_iter_get(lhist_it
, &digest2
, &link_history_p
);
324 if ((r
= router_get_by_digest(digest2
)))
329 link_history
= (link_history_t
*) link_history_p
;
331 ret
= tor_snprintf(buffer
+len
, 2048-len
, "%s(%ld/%ld); ", name2
,
332 link_history
->n_extend_ok
,
333 link_history
->n_extend_ok
+link_history
->n_extend_fail
);
339 log(severity
, LD_GENERAL
, "%s", buffer
);
344 /** Remove history info for routers/links that haven't changed since
348 rep_history_clean(time_t before
)
350 or_history_t
*or_history
;
351 link_history_t
*link_history
;
352 void *or_history_p
, *link_history_p
;
353 digestmap_iter_t
*orhist_it
, *lhist_it
;
356 orhist_it
= digestmap_iter_init(history_map
);
357 while (!digestmap_iter_done(orhist_it
)) {
358 digestmap_iter_get(orhist_it
, &d1
, &or_history_p
);
359 or_history
= or_history_p
;
360 if (or_history
->changed
< before
) {
361 orhist_it
= digestmap_iter_next_rmv(history_map
, orhist_it
);
362 free_or_history(or_history
);
365 for (lhist_it
= digestmap_iter_init(or_history
->link_history_map
);
366 !digestmap_iter_done(lhist_it
); ) {
367 digestmap_iter_get(lhist_it
, &d2
, &link_history_p
);
368 link_history
= link_history_p
;
369 if (link_history
->changed
< before
) {
370 lhist_it
= digestmap_iter_next_rmv(or_history
->link_history_map
,
372 rephist_total_alloc
-= sizeof(link_history_t
);
373 tor_free(link_history
);
376 lhist_it
= digestmap_iter_next(or_history
->link_history_map
,lhist_it
);
378 orhist_it
= digestmap_iter_next(history_map
, orhist_it
);
382 /** For how many seconds do we keep track of individual per-second bandwidth
384 #define NUM_SECS_ROLLING_MEASURE 10
385 /** How large are the intervals for with we track and report bandwidth use? */
386 #define NUM_SECS_BW_SUM_INTERVAL (15*60)
387 /** How far in the past do we remember and publish bandwidth use? */
388 #define NUM_SECS_BW_SUM_IS_VALID (24*60*60)
389 /** How many bandwidth usage intervals do we remember? (derived) */
390 #define NUM_TOTALS (NUM_SECS_BW_SUM_IS_VALID/NUM_SECS_BW_SUM_INTERVAL)
392 /** Structure to track bandwidth use, and remember the maxima for a given
395 typedef struct bw_array_t
{
396 /** Observation array: Total number of bytes transferred in each of the last
397 * NUM_SECS_ROLLING_MEASURE seconds. This is used as a circular array. */
398 uint64_t obs
[NUM_SECS_ROLLING_MEASURE
];
399 int cur_obs_idx
; /**< Current position in obs. */
400 time_t cur_obs_time
; /**< Time represented in obs[cur_obs_idx] */
401 uint64_t total_obs
; /**< Total for all members of obs except
402 * obs[cur_obs_idx] */
403 uint64_t max_total
; /**< Largest value that total_obs has taken on in the
405 uint64_t total_in_period
; /**< Total bytes transferred in the current
408 /** When does the next period begin? */
410 /** Where in 'maxima' should the maximum bandwidth usage for the current
411 * period be stored? */
413 /** How many values in maxima/totals have been set ever? */
415 /** Circular array of the maximum
416 * bandwidth-per-NUM_SECS_ROLLING_MEASURE usage for the last
417 * NUM_TOTALS periods */
418 uint64_t maxima
[NUM_TOTALS
];
419 /** Circular array of the total bandwidth usage for the last NUM_TOTALS
421 uint64_t totals
[NUM_TOTALS
];
424 /** Shift the current period of b forward by one. */
426 commit_max(bw_array_t
*b
)
428 /* Store total from current period. */
429 b
->totals
[b
->next_max_idx
] = b
->total_in_period
;
430 /* Store maximum from current period. */
431 b
->maxima
[b
->next_max_idx
++] = b
->max_total
;
432 /* Advance next_period and next_max_idx */
433 b
->next_period
+= NUM_SECS_BW_SUM_INTERVAL
;
434 if (b
->next_max_idx
== NUM_TOTALS
)
436 if (b
->num_maxes_set
< NUM_TOTALS
)
438 /* Reset max_total. */
440 /* Reset total_in_period. */
441 b
->total_in_period
= 0;
444 /** Shift the current observation time of 'b' forward by one second. */
446 advance_obs(bw_array_t
*b
)
451 /* Calculate the total bandwidth for the last NUM_SECS_ROLLING_MEASURE
452 * seconds; adjust max_total as needed.*/
453 total
= b
->total_obs
+ b
->obs
[b
->cur_obs_idx
];
454 if (total
> b
->max_total
)
455 b
->max_total
= total
;
457 nextidx
= b
->cur_obs_idx
+1;
458 if (nextidx
== NUM_SECS_ROLLING_MEASURE
)
461 b
->total_obs
= total
- b
->obs
[nextidx
];
463 b
->cur_obs_idx
= nextidx
;
465 if (++b
->cur_obs_time
>= b
->next_period
)
469 /** Add 'n' bytes to the number of bytes in b for second 'when'. */
471 add_obs(bw_array_t
*b
, time_t when
, uint64_t n
)
473 /* Don't record data in the past. */
474 if (when
<b
->cur_obs_time
)
476 /* If we're currently adding observations for an earlier second than
477 * 'when', advance b->cur_obs_time and b->cur_obs_idx by an
478 * appropriate number of seconds, and do all the other housekeeping */
479 while (when
>b
->cur_obs_time
)
482 b
->obs
[b
->cur_obs_idx
] += n
;
483 b
->total_in_period
+= n
;
486 /** Allocate, initialize, and return a new bw_array. */
492 b
= tor_malloc_zero(sizeof(bw_array_t
));
493 rephist_total_alloc
+= sizeof(bw_array_t
);
495 b
->cur_obs_time
= start
;
496 b
->next_period
= start
+ NUM_SECS_BW_SUM_INTERVAL
;
500 static bw_array_t
*read_array
= NULL
;
501 static bw_array_t
*write_array
= NULL
;
503 /** Set up read_array and write_array. */
507 read_array
= bw_array_new();
508 write_array
= bw_array_new();
511 /** We read <b>num_bytes</b> more bytes in second <b>when</b>.
513 * Add num_bytes to the current running total for <b>when</b>.
515 * <b>when</b> can go back to time, but it's safe to ignore calls
516 * earlier than the latest <b>when</b> you've heard of.
519 rep_hist_note_bytes_written(int num_bytes
, time_t when
)
521 /* Maybe a circular array for recent seconds, and step to a new point
522 * every time a new second shows up. Or simpler is to just to have
523 * a normal array and push down each item every second; it's short.
525 /* When a new second has rolled over, compute the sum of the bytes we've
526 * seen over when-1 to when-1-NUM_SECS_ROLLING_MEASURE, and stick it
527 * somewhere. See rep_hist_bandwidth_assess() below.
529 add_obs(write_array
, when
, num_bytes
);
532 /** We wrote <b>num_bytes</b> more bytes in second <b>when</b>.
533 * (like rep_hist_note_bytes_written() above)
536 rep_hist_note_bytes_read(int num_bytes
, time_t when
)
538 /* if we're smart, we can make this func and the one above share code */
539 add_obs(read_array
, when
, num_bytes
);
542 /** Helper: Return the largest value in b->maxima. (This is equal to the
543 * most bandwidth used in any NUM_SECS_ROLLING_MEASURE period for the last
544 * NUM_SECS_BW_SUM_IS_VALID seconds.)
547 find_largest_max(bw_array_t
*b
)
552 for (i
=0; i
<NUM_TOTALS
; ++i
) {
553 if (b
->maxima
[i
]>max
)
559 /** Find the largest sums in the past NUM_SECS_BW_SUM_IS_VALID (roughly)
560 * seconds. Find one sum for reading and one for writing. They don't have
561 * to be at the same time).
563 * Return the smaller of these sums, divided by NUM_SECS_ROLLING_MEASURE.
566 rep_hist_bandwidth_assess(void)
569 r
= find_largest_max(read_array
);
570 w
= find_largest_max(write_array
);
572 return (int)(U64_TO_DBL(w
)/NUM_SECS_ROLLING_MEASURE
);
574 return (int)(U64_TO_DBL(r
)/NUM_SECS_ROLLING_MEASURE
);
577 /** Print the bandwidth history of b (either read_array or write_array)
578 * into the buffer pointed to by buf. The format is simply comma
579 * separated numbers, from oldest to newest.
581 * It returns the number of bytes written.
584 rep_hist_fill_bandwidth_history(char *buf
, size_t len
, bw_array_t
*b
)
589 if (b
->num_maxes_set
<= b
->next_max_idx
) {
590 /* We haven't been through the circular array yet; time starts at i=0.*/
593 /* We've been around the array at least once. The next i to be
594 overwritten is the oldest. */
598 for (n
=0; n
<b
->num_maxes_set
; ++n
,++i
) {
600 while (i
>= NUM_TOTALS
) i
-= NUM_TOTALS
;
601 /* Round the bandwidth used down to the nearest 1k. */
602 total
= b
->totals
[i
] & ~0x3ff;
603 if (n
==(b
->num_maxes_set
-1))
604 tor_snprintf(cp
, len
-(cp
-buf
), U64_FORMAT
, U64_PRINTF_ARG(total
));
606 tor_snprintf(cp
, len
-(cp
-buf
), U64_FORMAT
",", U64_PRINTF_ARG(total
));
612 /** Allocate and return lines for representing this server's bandwidth
613 * history in its descriptor.
616 rep_hist_get_bandwidth_lines(void)
619 char t
[ISO_TIME_LEN
+1];
624 /* opt (read|write)-history yyyy-mm-dd HH:MM:SS (n s) n,n,n,n,n... */
625 len
= (60+20*NUM_TOTALS
)*2;
626 buf
= tor_malloc_zero(len
);
629 b
= r
?read_array
:write_array
;
631 format_iso_time(t
, b
->next_period
-NUM_SECS_BW_SUM_INTERVAL
);
632 tor_snprintf(cp
, len
-(cp
-buf
), "opt %s %s (%d s) ",
633 r
? "read-history" : "write-history", t
,
634 NUM_SECS_BW_SUM_INTERVAL
);
636 cp
+= rep_hist_fill_bandwidth_history(cp
, len
-(cp
-buf
), b
);
637 strlcat(cp
, "\n", len
-(cp
-buf
));
643 /** Update <b>state</b> with the newest bandwidth history. */
645 rep_hist_update_state(or_state_t
*state
)
649 smartlist_t
**s_values
;
654 len
= 20*NUM_TOTALS
+1;
655 buf
= tor_malloc_zero(len
);
658 b
= r
?read_array
:write_array
;
659 s_begins
= r
?&state
->BWHistoryReadEnds
:&state
->BWHistoryWriteEnds
;
660 s_interval
= r
?&state
->BWHistoryReadInterval
:&state
->BWHistoryWriteInterval
;
661 s_values
= r
?&state
->BWHistoryReadValues
:&state
->BWHistoryWriteValues
;
664 SMARTLIST_FOREACH(*s_values
, char *, cp
, tor_free(cp
));
665 smartlist_free(*s_values
);
667 if (! server_mode(get_options())) {
668 /* Clients don't need to store bandwidth history persistently;
669 * force these values to the defaults. */
670 /* FFFF we should pull the default out of config.c's state table,
671 * so we don't have two defaults. */
672 if (*s_begins
!= 0 || *s_interval
!= 900) {
673 time_t now
= time(NULL
);
674 time_t save_at
= get_options()->AvoidDiskWrites
? now
+3600 : now
+600;
675 or_state_mark_dirty(state
, save_at
);
679 *s_values
= smartlist_create();
682 *s_begins
= b
->next_period
;
683 *s_interval
= NUM_SECS_BW_SUM_INTERVAL
;
685 cp
+= rep_hist_fill_bandwidth_history(cp
, len
, b
);
686 tor_snprintf(cp
, len
-(cp
-buf
), cp
== buf
? U64_FORMAT
: ","U64_FORMAT
,
687 U64_PRINTF_ARG(b
->total_in_period
));
688 *s_values
= smartlist_create();
689 if (server_mode(get_options()))
690 smartlist_split_string(*s_values
, buf
, ",", SPLIT_SKIP_SPACE
, 0);
693 if (server_mode(get_options())) {
694 or_state_mark_dirty(get_or_state(), time(NULL
)+(2*3600));
698 /** Set bandwidth history from our saved state. */
700 rep_hist_load_state(or_state_t
*state
, char **err
)
702 time_t s_begins
, start
;
703 time_t now
= time(NULL
);
708 smartlist_t
*s_values
;
711 /* Assert they already have been malloced */
712 tor_assert(read_array
&& write_array
);
715 b
= r
?read_array
:write_array
;
716 s_begins
= r
?state
->BWHistoryReadEnds
:state
->BWHistoryWriteEnds
;
717 s_interval
= r
?state
->BWHistoryReadInterval
:state
->BWHistoryWriteInterval
;
718 s_values
= r
?state
->BWHistoryReadValues
:state
->BWHistoryWriteValues
;
719 if (s_values
&& s_begins
>= now
- NUM_SECS_BW_SUM_INTERVAL
*NUM_TOTALS
) {
720 start
= s_begins
- s_interval
*(smartlist_len(s_values
));
722 b
->cur_obs_time
= start
;
723 b
->next_period
= start
+ NUM_SECS_BW_SUM_INTERVAL
;
724 SMARTLIST_FOREACH(s_values
, char *, cp
, {
725 v
= tor_parse_uint64(cp
, 10, 0, UINT64_MAX
, &ok
, NULL
);
728 log_notice(LD_GENERAL
, "Could not parse '%s' into a number.'", cp
);
730 add_obs(b
, start
, v
);
731 start
+= NUM_SECS_BW_SUM_INTERVAL
;
735 /* Clean up maxima and observed */
736 /* Do we really want to zero this for the purpose of max capacity? */
737 for (i
=0; i
<NUM_SECS_ROLLING_MEASURE
; ++i
) {
741 for (i
=0; i
<NUM_TOTALS
; ++i
) {
748 *err
= tor_strdup("Parsing of bandwidth history values failed");
749 /* and create fresh arrays */
750 tor_free(read_array
);
751 tor_free(write_array
);
752 read_array
= bw_array_new();
753 write_array
= bw_array_new();
759 /*********************************************************************/
761 /** A list of port numbers that have been used recently. */
762 static smartlist_t
*predicted_ports_list
=NULL
;
763 /** The corresponding most recently used time for each port. */
764 static smartlist_t
*predicted_ports_times
=NULL
;
766 /** We just got an application request for a connection with
767 * port <b>port</b>. Remember it for the future, so we can keep
768 * some circuits open that will exit to this port.
771 add_predicted_port(uint16_t port
, time_t now
)
773 /* XXXX we could just use uintptr_t here, I think. */
774 uint16_t *tmp_port
= tor_malloc(sizeof(uint16_t));
775 time_t *tmp_time
= tor_malloc(sizeof(time_t));
778 rephist_total_alloc
+= sizeof(uint16_t) + sizeof(time_t);
779 smartlist_add(predicted_ports_list
, tmp_port
);
780 smartlist_add(predicted_ports_times
, tmp_time
);
783 /** Initialize whatever memory and structs are needed for predicting
784 * which ports will be used. Also seed it with port 80, so we'll build
785 * circuits on start-up.
788 predicted_ports_init(void)
790 predicted_ports_list
= smartlist_create();
791 predicted_ports_times
= smartlist_create();
792 add_predicted_port(80, time(NULL
)); /* add one to kickstart us */
795 /** Free whatever memory is needed for predicting which ports will
799 predicted_ports_free(void)
801 rephist_total_alloc
-= smartlist_len(predicted_ports_list
)*sizeof(uint16_t);
802 SMARTLIST_FOREACH(predicted_ports_list
, char *, cp
, tor_free(cp
));
803 smartlist_free(predicted_ports_list
);
804 rephist_total_alloc
-= smartlist_len(predicted_ports_times
)*sizeof(time_t);
805 SMARTLIST_FOREACH(predicted_ports_times
, char *, cp
, tor_free(cp
));
806 smartlist_free(predicted_ports_times
);
809 /** Remember that <b>port</b> has been asked for as of time <b>now</b>.
810 * This is used for predicting what sorts of streams we'll make in the
811 * future and making exit circuits to anticipate that.
814 rep_hist_note_used_port(uint16_t port
, time_t now
)
820 tor_assert(predicted_ports_list
);
821 tor_assert(predicted_ports_times
);
823 if (!port
) /* record nothing */
826 for (i
= 0; i
< smartlist_len(predicted_ports_list
); ++i
) {
827 tmp_port
= smartlist_get(predicted_ports_list
, i
);
828 tmp_time
= smartlist_get(predicted_ports_times
, i
);
829 if (*tmp_port
== port
) {
834 /* it's not there yet; we need to add it */
835 add_predicted_port(port
, now
);
838 /** For this long after we've seen a request for a given port, assume that
839 * we'll want to make connections to the same port in the future. */
840 #define PREDICTED_CIRCS_RELEVANCE_TIME (60*60)
842 /** Return a pointer to the list of port numbers that
843 * are likely to be asked for in the near future.
845 * The caller promises not to mess with it.
848 rep_hist_get_predicted_ports(time_t now
)
854 tor_assert(predicted_ports_list
);
855 tor_assert(predicted_ports_times
);
857 /* clean out obsolete entries */
858 for (i
= 0; i
< smartlist_len(predicted_ports_list
); ++i
) {
859 tmp_time
= smartlist_get(predicted_ports_times
, i
);
860 if (*tmp_time
+ PREDICTED_CIRCS_RELEVANCE_TIME
< now
) {
861 tmp_port
= smartlist_get(predicted_ports_list
, i
);
862 log_debug(LD_CIRC
, "Expiring predicted port %d", *tmp_port
);
863 smartlist_del(predicted_ports_list
, i
);
864 smartlist_del(predicted_ports_times
, i
);
865 rephist_total_alloc
-= sizeof(uint16_t)+sizeof(time_t);
871 return predicted_ports_list
;
874 /** The user asked us to do a resolve. Rather than keeping track of
875 * timings and such of resolves, we fake it for now by making treating
876 * it the same way as a connection to port 80. This way we will continue
877 * to have circuits lying around if the user only uses Tor for resolves.
880 rep_hist_note_used_resolve(time_t now
)
882 rep_hist_note_used_port(80, now
);
885 /** The last time at which we needed an internal circ. */
886 static time_t predicted_internal_time
= 0;
887 /** The last time we needed an internal circ with good uptime. */
888 static time_t predicted_internal_uptime_time
= 0;
889 /** The last time we needed an internal circ with good capacity. */
890 static time_t predicted_internal_capacity_time
= 0;
892 /** Remember that we used an internal circ at time <b>now</b>. */
894 rep_hist_note_used_internal(time_t now
, int need_uptime
, int need_capacity
)
896 predicted_internal_time
= now
;
898 predicted_internal_uptime_time
= now
;
900 predicted_internal_capacity_time
= now
;
903 /** Return 1 if we've used an internal circ recently; else return 0. */
905 rep_hist_get_predicted_internal(time_t now
, int *need_uptime
,
908 if (!predicted_internal_time
) { /* initialize it */
909 predicted_internal_time
= now
;
910 predicted_internal_uptime_time
= now
;
911 predicted_internal_capacity_time
= now
;
913 if (predicted_internal_time
+ PREDICTED_CIRCS_RELEVANCE_TIME
< now
)
914 return 0; /* too long ago */
915 if (predicted_internal_uptime_time
+ PREDICTED_CIRCS_RELEVANCE_TIME
>= now
)
917 if (predicted_internal_capacity_time
+ PREDICTED_CIRCS_RELEVANCE_TIME
>= now
)
922 /** Any ports used lately? These are pre-seeded if we just started
923 * up or if we're running a hidden service. */
925 any_predicted_circuits(time_t now
)
927 return smartlist_len(predicted_ports_list
) ||
928 predicted_internal_time
+ PREDICTED_CIRCS_RELEVANCE_TIME
>= now
;
931 /** Return 1 if we have no need for circuits currently, else return 0. */
933 rep_hist_circbuilding_dormant(time_t now
)
935 if (any_predicted_circuits(now
))
938 /* see if we'll still need to build testing circuits */
939 if (server_mode(get_options()) && !check_whether_orport_reachable())
941 if (!check_whether_dirport_reachable())
947 static uint32_t n_signed_dir_objs
= 0;
948 static uint32_t n_signed_routerdescs
= 0;
949 static uint32_t n_verified_dir_objs
= 0;
950 static uint32_t n_verified_routerdescs
= 0;
951 static uint32_t n_onionskins_encrypted
= 0;
952 static uint32_t n_onionskins_decrypted
= 0;
953 static uint32_t n_tls_client_handshakes
= 0;
954 static uint32_t n_tls_server_handshakes
= 0;
955 static uint32_t n_rend_client_ops
= 0;
956 static uint32_t n_rend_mid_ops
= 0;
957 static uint32_t n_rend_server_ops
= 0;
961 note_crypto_pk_op(pk_op_t operation
)
969 n_signed_routerdescs
++;
972 n_verified_dir_objs
++;
975 n_verified_routerdescs
++;
978 n_onionskins_encrypted
++;
981 n_onionskins_decrypted
++;
983 case TLS_HANDSHAKE_C
:
984 n_tls_client_handshakes
++;
986 case TLS_HANDSHAKE_S
:
987 n_tls_server_handshakes
++;
999 log_warn(LD_BUG
, "Unknown pk operation %d", operation
);
1005 dump_pk_ops(int severity
)
1007 log(severity
, LD_GENERAL
,
1008 "PK operations: %lu directory objects signed, "
1009 "%lu directory objects verified, "
1010 "%lu routerdescs signed, "
1011 "%lu routerdescs verified, "
1012 "%lu onionskins encrypted, "
1013 "%lu onionskins decrypted, "
1014 "%lu client-side TLS handshakes, "
1015 "%lu server-side TLS handshakes, "
1016 "%lu rendezvous client operations, "
1017 "%lu rendezvous middle operations, "
1018 "%lu rendezvous server operations.",
1019 (unsigned long) n_signed_dir_objs
,
1020 (unsigned long) n_verified_dir_objs
,
1021 (unsigned long) n_signed_routerdescs
,
1022 (unsigned long) n_verified_routerdescs
,
1023 (unsigned long) n_onionskins_encrypted
,
1024 (unsigned long) n_onionskins_decrypted
,
1025 (unsigned long) n_tls_client_handshakes
,
1026 (unsigned long) n_tls_server_handshakes
,
1027 (unsigned long) n_rend_client_ops
,
1028 (unsigned long) n_rend_mid_ops
,
1029 (unsigned long) n_rend_server_ops
);
1032 /** Free all storage held by the OR/link history caches, by the
1033 * bandwidth history arrays, or by the port history. */
1035 rep_hist_free_all(void)
1037 digestmap_free(history_map
, free_or_history
);
1038 tor_free(read_array
);
1039 tor_free(write_array
);
1040 predicted_ports_free();