[or-cvs] Define a schedule for how long to wait between retrying
arma at seul.org
arma at seul.org
Tue Jul 18 04:42:34 UTC 2006
Update of /home2/or/cvsroot/tor/src/or
In directory moria:/home/arma/work/onion/cvs/tor/src/or
Modified Files:
connection_edge.c or.h
Log Message:
Define a schedule for how long to wait between retrying
application connections. Rather than waiting a fixed amount of
time between each retry, we wait only 5 seconds for the first,
10 seconds for the second, and 15 seconds for each retry after
that. Hopefully this will improve the expected experience.
Addresses bug 297.
Index: connection_edge.c
===================================================================
RCS file: /home2/or/cvsroot/tor/src/or/connection_edge.c,v
retrieving revision 1.404
retrieving revision 1.405
diff -u -p -d -r1.404 -r1.405
--- connection_edge.c 18 Jul 2006 00:58:11 -0000 1.404
+++ connection_edge.c 18 Jul 2006 04:42:32 -0000 1.405
@@ -306,6 +306,21 @@ connection_edge_finished_connecting(conn
return connection_edge_process_inbuf(conn, 1);
}
+/** Define a schedule for how long to wait between retrying
+ * application connections. Rather than waiting a fixed amount of
+ * time between each retry, we wait only 5 seconds for the first,
+ * 10 seconds for the second, and 15 seconds for each retry after
+ * that. Hopefully this will improve the expected experience. */
+static int
+compute_socks_timeout(connection_t *conn)
+{
+ if (conn->num_socks_retries == 0)
+ return 5;
+ if (conn->num_socks_retries == 1)
+ return 10;
+ return 15;
+}
+
/** Find all general-purpose AP streams waiting for a response that sent their
* begin/resolve cell >=15 seconds ago. Detach from their current circuit, and
* mark their current circuit as unsuitable for new streams. Then call
@@ -326,6 +341,7 @@ connection_ap_expire_beginning(void)
time_t now = time(NULL);
or_options_t *options = get_options();
int severity;
+ int cutoff;
get_connection_array(&carray, &n);
@@ -343,10 +359,11 @@ connection_ap_expire_beginning(void)
continue;
}
- else if (conn->state != AP_CONN_STATE_RESOLVE_WAIT &&
+ if (conn->state != AP_CONN_STATE_RESOLVE_WAIT &&
conn->state != AP_CONN_STATE_CONNECT_WAIT)
continue;
- if (now - conn->timestamp_lastread < 15)
+ cutoff = compute_socks_timeout(conn);
+ if (now - conn->timestamp_lastread < cutoff)
continue;
circ = circuit_get_by_edge_conn(conn);
if (!circ) { /* it's vanished? */
@@ -385,8 +402,9 @@ connection_ap_expire_beginning(void)
* unattractive to use for new streams */
tor_assert(circ->timestamp_dirty);
circ->timestamp_dirty -= options->MaxCircuitDirtiness;
- /* give our stream another 15 seconds to try */
- conn->timestamp_lastread += 15;
+ /* give our stream another 'cutoff' seconds to try */
+ conn->timestamp_lastread += cutoff;
+ conn->num_socks_retries++;
/* move it back into 'pending' state, and try to attach. */
if (connection_ap_detach_retriable(conn, circ)<0) {
connection_mark_unattached_ap(conn, END_STREAM_REASON_CANT_ATTACH);
Index: or.h
===================================================================
RCS file: /home2/or/cvsroot/tor/src/or/or.h,v
retrieving revision 1.852
retrieving revision 1.853
diff -u -p -d -r1.852 -r1.853
--- or.h 18 Jul 2006 00:58:11 -0000 1.852
+++ or.h 18 Jul 2006 04:42:32 -0000 1.853
@@ -658,6 +658,10 @@ struct connection_t {
char *chosen_exit_name;
/** If 1, and we fail to reach the chosen exit, stop requiring it. */
unsigned int chosen_exit_optional:1;
+ /** Number of times we've reassigned this application connection to
+ * a new circuit. We keep track because the timeout is longer if we've
+ * already retried several times. */
+ int num_socks_retries;
/* Used only by OR connections: */
tor_tls_t *tls; /**< TLS connection state (OR only.) */
More information about the tor-commits
mailing list