2012-08-23 21:30:32 +00:00
|
|
|
#include <netinet/tcp.h>
|
|
|
|
|
|
|
|
#include <event2/buffer.h>
|
|
|
|
#include <event2/bufferevent.h>
|
|
|
|
#include <event2/dns.h>
|
|
|
|
#include <event2/event.h>
|
|
|
|
#include <event2/thread.h>
|
|
|
|
#include <event2/util.h>
|
|
|
|
|
|
|
|
#include "config.h"
|
|
|
|
|
|
|
|
#include "Connection.h"
|
|
|
|
#include "distributions.h"
|
|
|
|
#include "Generator.h"
|
|
|
|
#include "mutilate.h"
|
2013-03-01 13:36:35 +00:00
|
|
|
#include "binary_protocol.h"
|
2012-08-23 21:30:32 +00:00
|
|
|
#include "util.h"
|
|
|
|
|
|
|
|
Connection::Connection(struct event_base* _base, struct evdns_base* _evdns,
|
|
|
|
string _hostname, string _port, options_t _options,
|
2013-03-04 17:31:13 +00:00
|
|
|
bool sampling) :
|
2012-08-23 21:30:32 +00:00
|
|
|
hostname(_hostname), port(_port), start_time(0),
|
2013-03-04 17:31:13 +00:00
|
|
|
stats(sampling), options(_options), base(_base), evdns(_evdns)
|
2012-08-23 21:30:32 +00:00
|
|
|
{
|
|
|
|
valuesize = createGenerator(options.valuesize);
|
|
|
|
keysize = createGenerator(options.keysize);
|
|
|
|
keygen = new KeyGenerator(keysize, options.records);
|
|
|
|
|
|
|
|
if (options.lambda <= 0) {
|
|
|
|
iagen = createGenerator("0");
|
|
|
|
} else {
|
|
|
|
D("iagen = createGenerator(%s)", options.ia);
|
|
|
|
iagen = createGenerator(options.ia);
|
|
|
|
iagen->set_lambda(options.lambda);
|
|
|
|
}
|
|
|
|
|
|
|
|
read_state = INIT_READ;
|
|
|
|
write_state = INIT_WRITE;
|
|
|
|
|
2013-04-15 20:27:06 +00:00
|
|
|
last_tx = last_rx = 0.0;
|
|
|
|
|
2012-08-23 21:30:32 +00:00
|
|
|
bev = bufferevent_socket_new(base, -1, BEV_OPT_CLOSE_ON_FREE);
|
|
|
|
bufferevent_setcb(bev, bev_read_cb, bev_write_cb, bev_event_cb, this);
|
|
|
|
bufferevent_enable(bev, EV_READ | EV_WRITE);
|
|
|
|
|
|
|
|
if (bufferevent_socket_connect_hostname(bev, evdns, AF_UNSPEC,
|
|
|
|
hostname.c_str(),
|
|
|
|
atoi(port.c_str())))
|
|
|
|
DIE("bufferevent_socket_connect_hostname()");
|
|
|
|
|
|
|
|
timer = evtimer_new(base, timer_cb, this);
|
|
|
|
}
|
|
|
|
|
|
|
|
Connection::~Connection() {
|
|
|
|
event_free(timer);
|
|
|
|
timer = NULL;
|
|
|
|
|
|
|
|
// FIXME: W("Drain op_q?");
|
|
|
|
|
|
|
|
bufferevent_free(bev);
|
|
|
|
|
|
|
|
delete iagen;
|
|
|
|
delete keygen;
|
|
|
|
delete keysize;
|
|
|
|
delete valuesize;
|
|
|
|
}
|
|
|
|
|
|
|
|
void Connection::reset() {
|
|
|
|
// FIXME: Actually check the connection, drain all bufferevents, drain op_q.
|
|
|
|
assert(op_queue.size() == 0);
|
|
|
|
evtimer_del(timer);
|
|
|
|
read_state = IDLE;
|
|
|
|
write_state = INIT_WRITE;
|
|
|
|
stats = ConnectionStats(stats.sampling);
|
|
|
|
}
|
|
|
|
|
2013-03-02 13:46:39 +00:00
|
|
|
|
2013-03-04 17:31:13 +00:00
|
|
|
void Connection::issue_sasl() {
|
|
|
|
read_state = WAITING_FOR_SASL;
|
2013-03-02 13:46:39 +00:00
|
|
|
|
2013-03-04 17:31:13 +00:00
|
|
|
string username = string(options.username);
|
|
|
|
string password = string(options.password);
|
2013-03-02 13:46:39 +00:00
|
|
|
|
2013-07-10 18:14:00 +00:00
|
|
|
binary_header_t header = {0x80, CMD_SASL, 0, 0, 0, {0}, 0, 0, 0};
|
2013-03-04 17:31:13 +00:00
|
|
|
header.key_len = htons(5);
|
|
|
|
header.body_len = htonl(6 + username.length() + 1 + password.length());
|
|
|
|
|
|
|
|
bufferevent_write(bev, &header, 24);
|
|
|
|
bufferevent_write(bev, "PLAIN\0", 6);
|
|
|
|
bufferevent_write(bev, username.c_str(), username.length() + 1);
|
|
|
|
bufferevent_write(bev, password.c_str(), password.length());
|
2013-03-02 13:46:39 +00:00
|
|
|
}
|
|
|
|
|
2013-03-04 17:31:13 +00:00
|
|
|
void Connection::issue_get(const char* key, double now) {
|
2012-08-23 21:30:32 +00:00
|
|
|
Operation op;
|
2013-03-01 13:36:35 +00:00
|
|
|
int l;
|
2013-03-04 17:31:13 +00:00
|
|
|
uint16_t keylen = strlen(key);
|
2012-08-23 21:30:32 +00:00
|
|
|
|
|
|
|
#if HAVE_CLOCK_GETTIME
|
|
|
|
op.start_time = get_time_accurate();
|
|
|
|
#else
|
|
|
|
if (now == 0.0) {
|
|
|
|
#if USE_CACHED_TIME
|
|
|
|
struct timeval now_tv;
|
|
|
|
event_base_gettimeofday_cached(base, &now_tv);
|
|
|
|
|
|
|
|
op.start_time = tv_to_double(&now_tv);
|
|
|
|
#else
|
|
|
|
op.start_time = get_time();
|
|
|
|
#endif
|
|
|
|
} else {
|
|
|
|
op.start_time = now;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
op.type = Operation::GET;
|
|
|
|
op.key = string(key);
|
|
|
|
|
|
|
|
op_queue.push(op);
|
|
|
|
|
|
|
|
if (read_state == IDLE)
|
|
|
|
read_state = WAITING_FOR_GET;
|
|
|
|
|
2013-03-04 17:31:13 +00:00
|
|
|
if (options.binary) {
|
2013-03-01 13:36:35 +00:00
|
|
|
// each line is 4-bytes
|
2013-03-04 17:31:13 +00:00
|
|
|
binary_header_t h = {0x80, CMD_GET, htons(keylen),
|
2013-07-10 18:14:00 +00:00
|
|
|
0x00, 0x00, {htons(0)}, //TODO(syang0) get actual vbucket?
|
|
|
|
htonl(keylen) };
|
2013-03-01 13:36:35 +00:00
|
|
|
|
2013-03-04 17:31:13 +00:00
|
|
|
bufferevent_write(bev, &h, 24); // size does not include extras
|
|
|
|
bufferevent_write(bev, key, keylen);
|
|
|
|
l = 24 + keylen;
|
2013-03-01 13:36:35 +00:00
|
|
|
} else {
|
2013-03-04 17:31:13 +00:00
|
|
|
l = evbuffer_add_printf(bufferevent_get_output(bev), "get %s\r\n", key);
|
2013-03-01 13:36:35 +00:00
|
|
|
}
|
|
|
|
|
2012-08-23 21:30:32 +00:00
|
|
|
if (read_state != LOADING) stats.tx_bytes += l;
|
|
|
|
}
|
|
|
|
|
2013-03-04 22:23:50 +00:00
|
|
|
void Connection::issue_set(const char* key, const char* value, int length,
|
2012-08-23 21:30:32 +00:00
|
|
|
double now) {
|
|
|
|
Operation op;
|
2013-03-01 13:36:35 +00:00
|
|
|
int l;
|
2013-03-04 17:31:13 +00:00
|
|
|
uint16_t keylen = strlen(key);
|
2012-08-23 21:30:32 +00:00
|
|
|
|
|
|
|
#if HAVE_CLOCK_GETTIME
|
|
|
|
op.start_time = get_time_accurate();
|
|
|
|
#else
|
|
|
|
if (now == 0.0) op.start_time = get_time();
|
|
|
|
else op.start_time = now;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
op.type = Operation::SET;
|
|
|
|
op_queue.push(op);
|
|
|
|
|
|
|
|
if (read_state == IDLE)
|
|
|
|
read_state = WAITING_FOR_SET;
|
|
|
|
|
2013-03-04 17:31:13 +00:00
|
|
|
if (options.binary) {
|
2013-03-01 13:36:35 +00:00
|
|
|
// each line is 4-bytes
|
2013-03-04 17:31:13 +00:00
|
|
|
binary_header_t h = { 0x80, CMD_SET, htons(keylen),
|
2013-07-10 18:14:00 +00:00
|
|
|
0x08, 0x00, {htons(0)}, //TODO(syang0) get actual vbucket?
|
|
|
|
htonl(keylen + 8 + length)};
|
2013-03-01 13:36:35 +00:00
|
|
|
|
|
|
|
bufferevent_write(bev, &h, 32); // With extras
|
|
|
|
bufferevent_write(bev, key, keylen);
|
|
|
|
bufferevent_write(bev, value, length);
|
|
|
|
l = 24 + h.body_len;
|
|
|
|
} else {
|
|
|
|
l = evbuffer_add_printf(bufferevent_get_output(bev),
|
|
|
|
"set %s 0 0 %d\r\n", key, length);
|
2013-03-04 17:31:13 +00:00
|
|
|
bufferevent_write(bev, value, length);
|
|
|
|
bufferevent_write(bev, "\r\n", 2);
|
|
|
|
l += length + 2;
|
2013-03-01 13:36:35 +00:00
|
|
|
}
|
2012-08-23 21:30:32 +00:00
|
|
|
|
|
|
|
if (read_state != LOADING) stats.tx_bytes += l;
|
|
|
|
}
|
|
|
|
|
|
|
|
void Connection::issue_something(double now) {
|
|
|
|
char key[256];
|
|
|
|
// FIXME: generate key distribution here!
|
|
|
|
string keystr = keygen->generate(lrand48() % options.records);
|
|
|
|
strcpy(key, keystr.c_str());
|
|
|
|
// int key_index = lrand48() % options.records;
|
|
|
|
// generate_key(key_index, options.keysize, key);
|
|
|
|
|
|
|
|
if (drand48() < options.update) {
|
|
|
|
int index = lrand48() % (1024 * 1024);
|
|
|
|
// issue_set(key, &random_char[index], options.valuesize, now);
|
2013-03-04 17:31:13 +00:00
|
|
|
issue_set(key, &random_char[index], valuesize->generate(), now);
|
2012-08-23 21:30:32 +00:00
|
|
|
} else {
|
2013-03-04 17:31:13 +00:00
|
|
|
issue_get(key, now);
|
2012-08-23 21:30:32 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void Connection::pop_op() {
|
|
|
|
assert(op_queue.size() > 0);
|
|
|
|
|
|
|
|
op_queue.pop();
|
|
|
|
|
|
|
|
if (read_state == LOADING) return;
|
|
|
|
read_state = IDLE;
|
|
|
|
|
|
|
|
// Advance the read state machine.
|
|
|
|
if (op_queue.size() > 0) {
|
|
|
|
Operation& op = op_queue.front();
|
|
|
|
switch (op.type) {
|
|
|
|
case Operation::GET: read_state = WAITING_FOR_GET; break;
|
|
|
|
case Operation::SET: read_state = WAITING_FOR_SET; break;
|
|
|
|
default: DIE("Not implemented.");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
bool Connection::check_exit_condition(double now) {
|
|
|
|
if (read_state == INIT_READ) return false;
|
|
|
|
if (now == 0.0) now = get_time();
|
|
|
|
if (now > start_time + options.time) return true;
|
|
|
|
if (options.loadonly && read_state == IDLE) return true;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// drive_write_machine() determines whether or not to issue a new
|
|
|
|
// command. Note that this function loops. Be wary of break
|
|
|
|
// vs. return.
|
|
|
|
|
|
|
|
void Connection::drive_write_machine(double now) {
|
|
|
|
if (now == 0.0) now = get_time();
|
|
|
|
|
|
|
|
double delay;
|
|
|
|
struct timeval tv;
|
|
|
|
|
|
|
|
if (check_exit_condition(now)) return;
|
|
|
|
|
|
|
|
while (1) {
|
|
|
|
switch (write_state) {
|
|
|
|
case INIT_WRITE:
|
|
|
|
delay = iagen->generate();
|
|
|
|
|
|
|
|
next_time = now + delay;
|
|
|
|
double_to_tv(delay, &tv);
|
|
|
|
evtimer_add(timer, &tv);
|
|
|
|
|
|
|
|
write_state = WAITING_FOR_TIME;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case ISSUING:
|
|
|
|
if (op_queue.size() >= (size_t) options.depth) {
|
|
|
|
write_state = WAITING_FOR_OPQ;
|
|
|
|
return;
|
|
|
|
} else if (now < next_time) {
|
|
|
|
write_state = WAITING_FOR_TIME;
|
|
|
|
break; // We want to run through the state machine one more time
|
|
|
|
// to make sure the timer is armed.
|
2013-04-15 20:27:06 +00:00
|
|
|
// } else if (options.moderate && options.lambda > 0.0 &&
|
|
|
|
// now < last_rx + 0.25 / options.lambda) {
|
|
|
|
} else if (options.moderate && now < last_rx + 0.00025) {
|
|
|
|
write_state = WAITING_FOR_TIME;
|
|
|
|
if (!event_pending(timer, EV_TIMEOUT, NULL)) {
|
|
|
|
// delay = last_rx + 0.25 / options.lambda - now;
|
|
|
|
delay = last_rx + 0.00025 - now;
|
|
|
|
// I("MODERATE %f %f %f %f %f", now - last_rx, 0.25/options.lambda,
|
|
|
|
// 1/options.lambda, now-last_tx, delay);
|
|
|
|
|
|
|
|
double_to_tv(delay, &tv);
|
|
|
|
evtimer_add(timer, &tv);
|
|
|
|
}
|
|
|
|
return;
|
2012-08-23 21:30:32 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
issue_something(now);
|
2013-04-15 20:27:06 +00:00
|
|
|
last_tx = now;
|
2012-08-23 21:30:32 +00:00
|
|
|
stats.log_op(op_queue.size());
|
|
|
|
|
2013-03-13 22:40:00 +00:00
|
|
|
next_time += iagen->generate();
|
|
|
|
|
|
|
|
if (options.skip && options.lambda > 0.0 &&
|
|
|
|
now - next_time > 0.005000 &&
|
|
|
|
op_queue.size() >= (size_t) options.depth) {
|
2013-03-12 22:27:29 +00:00
|
|
|
|
2013-04-15 20:27:06 +00:00
|
|
|
while (next_time < now - 0.004000) {
|
2013-03-12 22:27:29 +00:00
|
|
|
stats.skips++;
|
|
|
|
next_time += iagen->generate();
|
|
|
|
}
|
|
|
|
}
|
2012-08-23 21:30:32 +00:00
|
|
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
case WAITING_FOR_TIME:
|
|
|
|
if (now < next_time) {
|
|
|
|
if (!event_pending(timer, EV_TIMEOUT, NULL)) {
|
|
|
|
delay = next_time - now;
|
|
|
|
double_to_tv(delay, &tv);
|
|
|
|
evtimer_add(timer, &tv);
|
|
|
|
}
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
write_state = ISSUING;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case WAITING_FOR_OPQ:
|
|
|
|
if (op_queue.size() >= (size_t) options.depth) return;
|
|
|
|
write_state = ISSUING;
|
|
|
|
break;
|
|
|
|
|
|
|
|
default: DIE("Not implemented");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void Connection::event_callback(short events) {
|
|
|
|
// struct timeval now_tv;
|
|
|
|
// event_base_gettimeofday_cached(base, &now_tv);
|
|
|
|
|
|
|
|
if (events & BEV_EVENT_CONNECTED) {
|
|
|
|
D("Connected to %s:%s.", hostname.c_str(), port.c_str());
|
|
|
|
int fd = bufferevent_getfd(bev);
|
|
|
|
if (fd < 0) DIE("bufferevent_getfd");
|
|
|
|
|
|
|
|
if (!options.no_nodelay) {
|
|
|
|
int one = 1;
|
|
|
|
if (setsockopt(fd, IPPROTO_TCP, TCP_NODELAY,
|
|
|
|
(void *) &one, sizeof(one)) < 0)
|
|
|
|
DIE("setsockopt()");
|
|
|
|
}
|
|
|
|
|
2013-03-04 17:31:13 +00:00
|
|
|
if (options.sasl)
|
|
|
|
issue_sasl();
|
|
|
|
else
|
|
|
|
read_state = IDLE; // This is the most important part!
|
2012-08-23 21:30:32 +00:00
|
|
|
} else if (events & BEV_EVENT_ERROR) {
|
|
|
|
int err = bufferevent_socket_get_dns_error(bev);
|
|
|
|
if (err) DIE("DNS error: %s", evutil_gai_strerror(err));
|
|
|
|
|
|
|
|
DIE("BEV_EVENT_ERROR: %s", strerror(errno));
|
|
|
|
} else if (events & BEV_EVENT_EOF) {
|
|
|
|
DIE("Unexpected EOF from server.");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void Connection::read_callback() {
|
|
|
|
struct evbuffer *input = bufferevent_get_input(bev);
|
|
|
|
#if USE_CACHED_TIME
|
|
|
|
struct timeval now_tv;
|
|
|
|
event_base_gettimeofday_cached(base, &now_tv);
|
|
|
|
#endif
|
|
|
|
|
2013-07-10 18:14:00 +00:00
|
|
|
char *buf = NULL;
|
2012-08-23 21:30:32 +00:00
|
|
|
Operation *op = NULL;
|
|
|
|
int length;
|
|
|
|
size_t n_read_out;
|
|
|
|
|
|
|
|
double now;
|
|
|
|
|
|
|
|
// Protocol processing loop.
|
|
|
|
|
|
|
|
if (op_queue.size() == 0) V("Spurious read callback.");
|
|
|
|
|
|
|
|
while (1) {
|
|
|
|
if (op_queue.size() > 0) op = &op_queue.front();
|
|
|
|
|
|
|
|
switch (read_state) {
|
|
|
|
case INIT_READ: DIE("event from uninitialized connection");
|
|
|
|
case IDLE: return; // We munched all the data we expected?
|
|
|
|
|
2013-03-01 13:36:35 +00:00
|
|
|
// Note: for binary, the whole get suite (GET, GET_DATA, END) is collapsed
|
|
|
|
// into one state
|
2012-08-23 21:30:32 +00:00
|
|
|
case WAITING_FOR_GET:
|
|
|
|
assert(op_queue.size() > 0);
|
|
|
|
|
2013-03-04 17:31:13 +00:00
|
|
|
if (options.binary) {
|
2013-03-01 13:36:35 +00:00
|
|
|
if (consume_binary_response(input)) {
|
|
|
|
#if USE_CACHED_TIME
|
|
|
|
now = tv_to_double(&now_tv);
|
|
|
|
#else
|
|
|
|
now = get_time();
|
|
|
|
#endif
|
|
|
|
#if HAVE_CLOCK_GETTIME
|
|
|
|
op->end_time = get_time_accurate();
|
|
|
|
#else
|
|
|
|
op->end_time = now;
|
|
|
|
#endif
|
|
|
|
stats.log_get(*op);
|
|
|
|
|
2013-04-15 20:27:06 +00:00
|
|
|
last_rx = now;
|
2013-03-01 13:36:35 +00:00
|
|
|
pop_op();
|
|
|
|
drive_write_machine(now);
|
|
|
|
break;
|
|
|
|
} else {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-08-23 21:30:32 +00:00
|
|
|
buf = evbuffer_readln(input, &n_read_out, EVBUFFER_EOL_CRLF);
|
|
|
|
if (buf == NULL) return; // A whole line not received yet. Punt.
|
|
|
|
|
|
|
|
stats.rx_bytes += n_read_out; // strlen(buf);
|
|
|
|
|
|
|
|
if (!strcmp(buf, "END")) {
|
|
|
|
// D("GET (%s) miss.", op->key.c_str());
|
|
|
|
stats.get_misses++;
|
|
|
|
|
|
|
|
#if USE_CACHED_TIME
|
|
|
|
now = tv_to_double(&now_tv);
|
|
|
|
#else
|
|
|
|
now = get_time();
|
|
|
|
#endif
|
|
|
|
#if HAVE_CLOCK_GETTIME
|
|
|
|
op->end_time = get_time_accurate();
|
|
|
|
#else
|
|
|
|
op->end_time = now;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
stats.log_get(*op);
|
|
|
|
|
|
|
|
free(buf);
|
|
|
|
|
2013-04-15 20:27:06 +00:00
|
|
|
last_rx = now;
|
2012-08-23 21:30:32 +00:00
|
|
|
pop_op();
|
|
|
|
drive_write_machine();
|
|
|
|
break;
|
|
|
|
} else if (!strncmp(buf, "VALUE", 5)) {
|
|
|
|
sscanf(buf, "VALUE %*s %*d %d", &length);
|
|
|
|
|
|
|
|
// FIXME: check key name to see if it corresponds to the op at
|
|
|
|
// the head of the op queue? This will be necessary to
|
|
|
|
// support "gets" where there may be misses.
|
|
|
|
|
|
|
|
data_length = length;
|
|
|
|
read_state = WAITING_FOR_GET_DATA;
|
|
|
|
}
|
|
|
|
|
|
|
|
free(buf);
|
|
|
|
|
|
|
|
case WAITING_FOR_GET_DATA:
|
|
|
|
assert(op_queue.size() > 0);
|
|
|
|
|
|
|
|
length = evbuffer_get_length(input);
|
|
|
|
|
|
|
|
if (length >= data_length + 2) {
|
|
|
|
// FIXME: Actually parse the value? Right now we just drain it.
|
|
|
|
evbuffer_drain(input, data_length + 2);
|
|
|
|
read_state = WAITING_FOR_END;
|
|
|
|
|
|
|
|
stats.rx_bytes += data_length + 2;
|
|
|
|
} else {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
case WAITING_FOR_END:
|
|
|
|
assert(op_queue.size() > 0);
|
|
|
|
|
|
|
|
buf = evbuffer_readln(input, &n_read_out, EVBUFFER_EOL_CRLF);
|
|
|
|
if (buf == NULL) return; // Haven't received a whole line yet. Punt.
|
|
|
|
|
|
|
|
stats.rx_bytes += n_read_out;
|
|
|
|
|
|
|
|
if (!strcmp(buf, "END")) {
|
|
|
|
#if USE_CACHED_TIME
|
|
|
|
now = tv_to_double(&now_tv);
|
|
|
|
#else
|
|
|
|
now = get_time();
|
|
|
|
#endif
|
|
|
|
#if HAVE_CLOCK_GETTIME
|
|
|
|
op->end_time = get_time_accurate();
|
|
|
|
#else
|
|
|
|
op->end_time = now;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
stats.log_get(*op);
|
|
|
|
|
|
|
|
free(buf);
|
|
|
|
|
2013-04-15 20:27:06 +00:00
|
|
|
last_rx = now;
|
2012-08-23 21:30:32 +00:00
|
|
|
pop_op();
|
|
|
|
drive_write_machine(now);
|
|
|
|
break;
|
|
|
|
} else {
|
|
|
|
DIE("Unexpected result when waiting for END");
|
|
|
|
}
|
|
|
|
|
|
|
|
case WAITING_FOR_SET:
|
|
|
|
assert(op_queue.size() > 0);
|
|
|
|
|
2013-03-04 17:31:13 +00:00
|
|
|
if (options.binary) {
|
2013-03-01 13:36:35 +00:00
|
|
|
if (!consume_binary_response(input)) return;
|
|
|
|
} else {
|
|
|
|
buf = evbuffer_readln(input, &n_read_out, EVBUFFER_EOL_CRLF);
|
|
|
|
if (buf == NULL) return; // Haven't received a whole line yet. Punt.
|
|
|
|
stats.rx_bytes += n_read_out;
|
|
|
|
}
|
2012-08-23 21:30:32 +00:00
|
|
|
|
|
|
|
now = get_time();
|
|
|
|
|
|
|
|
#if HAVE_CLOCK_GETTIME
|
|
|
|
op->end_time = get_time_accurate();
|
|
|
|
#else
|
|
|
|
op->end_time = now;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
stats.log_set(*op);
|
|
|
|
|
2013-03-04 17:31:13 +00:00
|
|
|
if (!options.binary)
|
2013-03-01 13:36:35 +00:00
|
|
|
free(buf);
|
2012-08-23 21:30:32 +00:00
|
|
|
|
2013-04-15 20:27:06 +00:00
|
|
|
last_rx = now;
|
2012-08-23 21:30:32 +00:00
|
|
|
pop_op();
|
|
|
|
drive_write_machine(now);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case LOADING:
|
|
|
|
assert(op_queue.size() > 0);
|
|
|
|
|
2013-03-04 17:31:13 +00:00
|
|
|
if (options.binary) {
|
2013-03-01 13:36:35 +00:00
|
|
|
if (!consume_binary_response(input)) return;
|
|
|
|
} else {
|
|
|
|
buf = evbuffer_readln(input, NULL, EVBUFFER_EOL_CRLF);
|
|
|
|
if (buf == NULL) return; // Haven't received a whole line yet.
|
|
|
|
free(buf);
|
|
|
|
}
|
2012-08-23 21:30:32 +00:00
|
|
|
|
|
|
|
loader_completed++;
|
|
|
|
pop_op();
|
|
|
|
|
|
|
|
if (loader_completed == options.records) {
|
|
|
|
D("Finished loading.");
|
|
|
|
read_state = IDLE;
|
|
|
|
} else {
|
|
|
|
while (loader_issued < loader_completed + LOADER_CHUNK) {
|
|
|
|
if (loader_issued >= options.records) break;
|
|
|
|
|
|
|
|
char key[256];
|
|
|
|
string keystr = keygen->generate(loader_issued);
|
|
|
|
strcpy(key, keystr.c_str());
|
|
|
|
int index = lrand48() % (1024 * 1024);
|
|
|
|
// generate_key(loader_issued, options.keysize, key);
|
|
|
|
// issue_set(key, &random_char[index], options.valuesize);
|
2013-03-04 17:31:13 +00:00
|
|
|
issue_set(key, &random_char[index], valuesize->generate());
|
2012-08-23 21:30:32 +00:00
|
|
|
|
|
|
|
loader_issued++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
break;
|
|
|
|
|
2013-03-02 13:46:39 +00:00
|
|
|
case WAITING_FOR_SASL:
|
2013-03-04 17:31:13 +00:00
|
|
|
assert(options.binary);
|
2013-03-02 13:46:39 +00:00
|
|
|
if (!consume_binary_response(input)) return;
|
2013-03-04 17:31:13 +00:00
|
|
|
read_state = IDLE;
|
2013-03-02 13:46:39 +00:00
|
|
|
break;
|
|
|
|
|
2012-08-23 21:30:32 +00:00
|
|
|
default: DIE("not implemented");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-01 13:36:35 +00:00
|
|
|
/**
|
|
|
|
* Tries to consume a binary response (in its entirety) from an evbuffer.
|
|
|
|
*
|
|
|
|
* @param input evBuffer to read response from
|
|
|
|
* @return true if consumed, false if not enough data in buffer.
|
|
|
|
*/
|
|
|
|
bool Connection::consume_binary_response(evbuffer *input) {
|
|
|
|
// Read the first 24 bytes as a header
|
|
|
|
int length = evbuffer_get_length(input);
|
|
|
|
if (length < 24) return false;
|
2013-03-04 17:31:13 +00:00
|
|
|
binary_header_t* h =
|
|
|
|
reinterpret_cast<binary_header_t*>(evbuffer_pullup(input, 24));
|
2013-03-01 13:36:35 +00:00
|
|
|
assert(h);
|
|
|
|
|
|
|
|
// Not whole response
|
|
|
|
int targetLen = 24 + ntohl(h->body_len);
|
|
|
|
if (length < targetLen) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// if something other than success, count it as a miss
|
|
|
|
if (h->opcode == CMD_GET && h->status) {
|
|
|
|
stats.get_misses++;
|
|
|
|
}
|
|
|
|
|
2013-03-02 13:46:39 +00:00
|
|
|
#define unlikely(x) __builtin_expect((x),0)
|
|
|
|
if (unlikely(h->opcode == CMD_SASL)) {
|
|
|
|
if (h->status == RESP_OK) {
|
|
|
|
V("SASL authentication succeeded");
|
|
|
|
} else {
|
|
|
|
DIE("SASL authentication failed");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-01 13:36:35 +00:00
|
|
|
evbuffer_drain(input, targetLen);
|
|
|
|
stats.rx_bytes += targetLen;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2012-08-23 21:30:32 +00:00
|
|
|
void Connection::write_callback() {}
|
|
|
|
void Connection::timer_callback() { drive_write_machine(); }
|
|
|
|
|
|
|
|
// The follow are C trampolines for libevent callbacks.
|
|
|
|
void bev_event_cb(struct bufferevent *bev, short events, void *ptr) {
|
|
|
|
Connection* conn = (Connection*) ptr;
|
|
|
|
conn->event_callback(events);
|
|
|
|
}
|
|
|
|
|
|
|
|
void bev_read_cb(struct bufferevent *bev, void *ptr) {
|
|
|
|
Connection* conn = (Connection*) ptr;
|
|
|
|
conn->read_callback();
|
|
|
|
}
|
|
|
|
|
|
|
|
void bev_write_cb(struct bufferevent *bev, void *ptr) {
|
|
|
|
Connection* conn = (Connection*) ptr;
|
|
|
|
conn->write_callback();
|
|
|
|
}
|
|
|
|
|
|
|
|
void timer_cb(evutil_socket_t fd, short what, void *ptr) {
|
|
|
|
Connection* conn = (Connection*) ptr;
|
|
|
|
conn->timer_callback();
|
|
|
|
}
|
|
|
|
|
|
|
|
void Connection::set_priority(int pri) {
|
|
|
|
if (bufferevent_priority_set(bev, pri))
|
|
|
|
DIE("bufferevent_set_priority(bev, %d) failed", pri);
|
|
|
|
}
|
|
|
|
|
|
|
|
void Connection::start_loading() {
|
|
|
|
read_state = LOADING;
|
|
|
|
loader_issued = loader_completed = 0;
|
|
|
|
|
|
|
|
for (int i = 0; i < LOADER_CHUNK; i++) {
|
|
|
|
if (loader_issued >= options.records) break;
|
|
|
|
|
|
|
|
char key[256];
|
|
|
|
int index = lrand48() % (1024 * 1024);
|
|
|
|
string keystr = keygen->generate(loader_issued);
|
|
|
|
strcpy(key, keystr.c_str());
|
|
|
|
// generate_key(loader_issued, options.keysize, key);
|
|
|
|
// issue_set(key, &random_char[index], options.valuesize);
|
2013-03-04 17:31:13 +00:00
|
|
|
issue_set(key, &random_char[index], valuesize->generate());
|
2012-08-23 21:30:32 +00:00
|
|
|
loader_issued++;
|
|
|
|
}
|
|
|
|
}
|