1 |
|
|
/* $OpenBSD: tcpbench.c,v 1.52 2016/09/19 18:58:39 bluhm Exp $ */ |
2 |
|
|
|
3 |
|
|
/* |
4 |
|
|
* Copyright (c) 2008 Damien Miller <djm@mindrot.org> |
5 |
|
|
* Copyright (c) 2011 Christiano F. Haesbaert <haesbaert@haesbaert.org> |
6 |
|
|
* |
7 |
|
|
* Permission to use, copy, modify, and distribute this software for any |
8 |
|
|
* purpose with or without fee is hereby granted, provided that the above |
9 |
|
|
* copyright notice and this permission notice appear in all copies. |
10 |
|
|
* |
11 |
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES |
12 |
|
|
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF |
13 |
|
|
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR |
14 |
|
|
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES |
15 |
|
|
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN |
16 |
|
|
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
17 |
|
|
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
18 |
|
|
*/ |
19 |
|
|
|
20 |
|
|
#include <sys/types.h> |
21 |
|
|
#include <sys/time.h> |
22 |
|
|
#include <sys/socket.h> |
23 |
|
|
#include <sys/socketvar.h> |
24 |
|
|
#include <sys/resource.h> |
25 |
|
|
#include <sys/queue.h> |
26 |
|
|
#include <sys/un.h> |
27 |
|
|
|
28 |
|
|
#include <net/route.h> |
29 |
|
|
|
30 |
|
|
#include <netinet/in.h> |
31 |
|
|
#include <netinet/ip.h> |
32 |
|
|
#include <netinet/tcp.h> |
33 |
|
|
#include <netinet/tcp_timer.h> |
34 |
|
|
#include <netinet/tcp_fsm.h> |
35 |
|
|
#include <netinet/in_pcb.h> |
36 |
|
|
#include <netinet/tcp_var.h> |
37 |
|
|
|
38 |
|
|
#include <arpa/inet.h> |
39 |
|
|
|
40 |
|
|
#include <unistd.h> |
41 |
|
|
#include <limits.h> |
42 |
|
|
#include <stdlib.h> |
43 |
|
|
#include <stdio.h> |
44 |
|
|
#include <string.h> |
45 |
|
|
#include <errno.h> |
46 |
|
|
#include <event.h> |
47 |
|
|
#include <netdb.h> |
48 |
|
|
#include <signal.h> |
49 |
|
|
#include <err.h> |
50 |
|
|
#include <fcntl.h> |
51 |
|
|
#include <poll.h> |
52 |
|
|
|
53 |
|
|
#include <kvm.h> |
54 |
|
|
#include <nlist.h> |
55 |
|
|
|
56 |
|
|
#define DEFAULT_PORT "12345" |
57 |
|
|
#define DEFAULT_STATS_INTERVAL 1000 /* ms */ |
58 |
|
|
#define DEFAULT_BUF (256 * 1024) |
59 |
|
|
#define DEFAULT_UDP_PKT (1500 - 28) /* TODO don't hardcode this */ |
60 |
|
|
#define TCP_MODE !ptb->uflag |
61 |
|
|
#define UDP_MODE ptb->uflag |
62 |
|
|
#define MAX_FD 1024 |
63 |
|
|
|
64 |
|
|
/* Our tcpbench globals */ |
65 |
|
|
struct { |
66 |
|
|
int Sflag; /* Socket buffer size (tcp mode) */ |
67 |
|
|
u_int rflag; /* Report rate (ms) */ |
68 |
|
|
int sflag; /* True if server */ |
69 |
|
|
int Tflag; /* ToS if != -1 */ |
70 |
|
|
int vflag; /* Verbose */ |
71 |
|
|
int uflag; /* UDP mode */ |
72 |
|
|
int Uflag; /* UNIX (AF_LOCAL) mode */ |
73 |
|
|
int Rflag; /* randomize client write size */ |
74 |
|
|
kvm_t *kvmh; /* Kvm handler */ |
75 |
|
|
char **kvars; /* Kvm enabled vars */ |
76 |
|
|
u_long ktcbtab; /* Ktcb */ |
77 |
|
|
char *dummybuf; /* IO buffer */ |
78 |
|
|
size_t dummybuf_len; /* IO buffer len */ |
79 |
|
|
} tcpbench, *ptb; |
80 |
|
|
|
81 |
|
|
struct tcpservsock { |
82 |
|
|
struct event ev; |
83 |
|
|
struct event evt; |
84 |
|
|
int fd; |
85 |
|
|
}; |
86 |
|
|
|
87 |
|
|
/* stats for a single tcp connection, udp uses only one */ |
88 |
|
|
struct statctx { |
89 |
|
|
TAILQ_ENTRY(statctx) entry; |
90 |
|
|
struct timeval t_start, t_last; |
91 |
|
|
unsigned long long bytes; |
92 |
|
|
int fd; |
93 |
|
|
char *buf; |
94 |
|
|
size_t buflen; |
95 |
|
|
struct event ev; |
96 |
|
|
/* TCP only */ |
97 |
|
|
struct tcpservsock *tcp_ts; |
98 |
|
|
u_long tcp_tcbaddr; |
99 |
|
|
/* UDP only */ |
100 |
|
|
u_long udp_slice_pkts; |
101 |
|
|
}; |
102 |
|
|
|
103 |
|
|
static void signal_handler(int, short, void *); |
104 |
|
|
static void saddr_ntop(const struct sockaddr *, socklen_t, char *, size_t); |
105 |
|
|
static void drop_gid(void); |
106 |
|
|
static void set_slice_timer(int); |
107 |
|
|
static void print_tcp_header(void); |
108 |
|
|
static void kget(u_long, void *, size_t); |
109 |
|
|
static u_long kfind_tcb(int); |
110 |
|
|
static void kupdate_stats(u_long, struct inpcb *, struct tcpcb *, |
111 |
|
|
struct socket *); |
112 |
|
|
static void list_kvars(void); |
113 |
|
|
static void check_kvar(const char *); |
114 |
|
|
static char ** check_prepare_kvars(char *); |
115 |
|
|
static void stats_prepare(struct statctx *); |
116 |
|
|
static void tcp_stats_display(unsigned long long, long double, float, |
117 |
|
|
struct statctx *, struct inpcb *, struct tcpcb *, struct socket *); |
118 |
|
|
static void tcp_process_slice(int, short, void *); |
119 |
|
|
static void tcp_server_handle_sc(int, short, void *); |
120 |
|
|
static void tcp_server_accept(int, short, void *); |
121 |
|
|
static void server_init(struct addrinfo *, struct statctx *); |
122 |
|
|
static void client_handle_sc(int, short, void *); |
123 |
|
|
static void client_init(struct addrinfo *, int, struct statctx *, |
124 |
|
|
struct addrinfo *); |
125 |
|
|
static int clock_gettime_tv(clockid_t, struct timeval *); |
126 |
|
|
static void udp_server_handle_sc(int, short, void *); |
127 |
|
|
static void udp_process_slice(int, short, void *); |
128 |
|
|
static int map_tos(char *, int *); |
129 |
|
|
/* |
130 |
|
|
* We account the mainstats here, that is the stats |
131 |
|
|
* for all connections, all variables starting with slice |
132 |
|
|
* are used to account information for the timeslice |
133 |
|
|
* between each output. Peak variables record the highest |
134 |
|
|
* between all slices so far. |
135 |
|
|
*/ |
136 |
|
|
static struct { |
137 |
|
|
unsigned long long slice_bytes; /* bytes for last slice */ |
138 |
|
|
long double peak_mbps; /* peak mbps so far */ |
139 |
|
|
int nconns; /* connected clients */ |
140 |
|
|
struct event timer; /* process timer */ |
141 |
|
|
} mainstats; |
142 |
|
|
|
143 |
|
|
/* When adding variables, also add to tcp_stats_display() */ |
144 |
|
|
static const char *allowed_kvars[] = { |
145 |
|
|
"inpcb.inp_flags", |
146 |
|
|
"sockb.so_rcv.sb_cc", |
147 |
|
|
"sockb.so_rcv.sb_hiwat", |
148 |
|
|
"sockb.so_rcv.sb_wat", |
149 |
|
|
"sockb.so_snd.sb_cc", |
150 |
|
|
"sockb.so_snd.sb_hiwat", |
151 |
|
|
"sockb.so_snd.sb_wat", |
152 |
|
|
"tcpcb.last_ack_sent", |
153 |
|
|
"tcpcb.max_sndwnd", |
154 |
|
|
"tcpcb.rcv_adv", |
155 |
|
|
"tcpcb.rcv_nxt", |
156 |
|
|
"tcpcb.rcv_scale", |
157 |
|
|
"tcpcb.rcv_wnd", |
158 |
|
|
"tcpcb.rfbuf_cnt", |
159 |
|
|
"tcpcb.rfbuf_ts", |
160 |
|
|
"tcpcb.snd_cwnd", |
161 |
|
|
"tcpcb.snd_max", |
162 |
|
|
"tcpcb.snd_nxt", |
163 |
|
|
"tcpcb.snd_scale", |
164 |
|
|
"tcpcb.snd_ssthresh", |
165 |
|
|
"tcpcb.snd_una", |
166 |
|
|
"tcpcb.snd_wl1", |
167 |
|
|
"tcpcb.snd_wl2", |
168 |
|
|
"tcpcb.snd_wnd", |
169 |
|
|
"tcpcb.t_rcvtime", |
170 |
|
|
"tcpcb.t_rtseq", |
171 |
|
|
"tcpcb.t_rttmin", |
172 |
|
|
"tcpcb.t_rtttime", |
173 |
|
|
"tcpcb.t_rttvar", |
174 |
|
|
"tcpcb.t_srtt", |
175 |
|
|
"tcpcb.ts_recent", |
176 |
|
|
"tcpcb.ts_recent_age", |
177 |
|
|
NULL |
178 |
|
|
}; |
179 |
|
|
|
180 |
|
|
TAILQ_HEAD(, statctx) sc_queue; |
181 |
|
|
|
182 |
|
|
static void __dead |
183 |
|
|
usage(void) |
184 |
|
|
{ |
185 |
|
|
fprintf(stderr, |
186 |
|
|
"usage: tcpbench -l\n" |
187 |
|
|
" tcpbench [-46RUuv] [-B buf] [-b addr] [-k kvars] [-n connections]\n" |
188 |
|
|
" [-p port] [-r interval] [-S space] [-T toskeyword]\n" |
189 |
|
|
" [-t secs] [-V rtable] hostname\n" |
190 |
|
|
" tcpbench -s [-46Uuv] [-B buf] [-k kvars] [-p port] [-r interval]\n" |
191 |
|
|
" [-S space] [-T toskeyword] [-V rtable] [hostname]\n"); |
192 |
|
|
exit(1); |
193 |
|
|
} |
194 |
|
|
|
195 |
|
|
static void |
196 |
|
|
signal_handler(int sig, short event, void *bula) |
197 |
|
|
{ |
198 |
|
|
/* |
199 |
|
|
* signal handler rules don't apply, libevent decouples for us |
200 |
|
|
*/ |
201 |
|
|
switch (sig) { |
202 |
|
|
case SIGINT: |
203 |
|
|
case SIGTERM: |
204 |
|
|
case SIGHUP: |
205 |
|
|
warnx("Terminated by signal %d", sig); |
206 |
|
|
exit(0); |
207 |
|
|
break; /* NOTREACHED */ |
208 |
|
|
default: |
209 |
|
|
errx(1, "unexpected signal %d", sig); |
210 |
|
|
break; /* NOTREACHED */ |
211 |
|
|
} |
212 |
|
|
} |
213 |
|
|
|
214 |
|
|
static void |
215 |
|
|
saddr_ntop(const struct sockaddr *addr, socklen_t alen, char *buf, size_t len) |
216 |
|
|
{ |
217 |
|
|
char hbuf[NI_MAXHOST], pbuf[NI_MAXSERV]; |
218 |
|
|
int herr; |
219 |
|
|
|
220 |
|
|
if (addr->sa_family == AF_UNIX) { |
221 |
|
|
struct sockaddr_un *sun = (struct sockaddr_un *)addr; |
222 |
|
|
snprintf(buf, len, "%s", sun->sun_path); |
223 |
|
|
return; |
224 |
|
|
} |
225 |
|
|
if ((herr = getnameinfo(addr, alen, hbuf, sizeof(hbuf), |
226 |
|
|
pbuf, sizeof(pbuf), NI_NUMERICHOST|NI_NUMERICSERV)) != 0) { |
227 |
|
|
if (herr == EAI_SYSTEM) |
228 |
|
|
err(1, "getnameinfo"); |
229 |
|
|
else |
230 |
|
|
errx(1, "getnameinfo: %s", gai_strerror(herr)); |
231 |
|
|
} |
232 |
|
|
snprintf(buf, len, "[%s]:%s", hbuf, pbuf); |
233 |
|
|
} |
234 |
|
|
|
235 |
|
|
static void |
236 |
|
|
drop_gid(void) |
237 |
|
|
{ |
238 |
|
|
gid_t gid; |
239 |
|
|
|
240 |
|
|
gid = getgid(); |
241 |
|
|
if (setresgid(gid, gid, gid) == -1) |
242 |
|
|
err(1, "setresgid"); |
243 |
|
|
} |
244 |
|
|
|
245 |
|
|
static void |
246 |
|
|
set_slice_timer(int on) |
247 |
|
|
{ |
248 |
|
|
struct timeval tv; |
249 |
|
|
|
250 |
|
|
if (ptb->rflag == 0) |
251 |
|
|
return; |
252 |
|
|
|
253 |
|
|
if (on) { |
254 |
|
|
if (evtimer_pending(&mainstats.timer, NULL)) |
255 |
|
|
return; |
256 |
|
|
timerclear(&tv); |
257 |
|
|
/* XXX Is there a better way to do this ? */ |
258 |
|
|
tv.tv_sec = ptb->rflag / 1000; |
259 |
|
|
tv.tv_usec = (ptb->rflag % 1000) * 1000; |
260 |
|
|
|
261 |
|
|
evtimer_add(&mainstats.timer, &tv); |
262 |
|
|
} else if (evtimer_pending(&mainstats.timer, NULL)) |
263 |
|
|
evtimer_del(&mainstats.timer); |
264 |
|
|
} |
265 |
|
|
|
266 |
|
|
static int |
267 |
|
|
clock_gettime_tv(clockid_t clock_id, struct timeval *tv) |
268 |
|
|
{ |
269 |
|
|
struct timespec ts; |
270 |
|
|
|
271 |
|
|
if (clock_gettime(clock_id, &ts) == -1) |
272 |
|
|
return (-1); |
273 |
|
|
|
274 |
|
|
TIMESPEC_TO_TIMEVAL(tv, &ts); |
275 |
|
|
|
276 |
|
|
return (0); |
277 |
|
|
} |
278 |
|
|
|
279 |
|
|
static void |
280 |
|
|
print_tcp_header(void) |
281 |
|
|
{ |
282 |
|
|
char **kv; |
283 |
|
|
|
284 |
|
|
printf("%12s %14s %12s %8s ", "elapsed_ms", "bytes", "mbps", |
285 |
|
|
"bwidth"); |
286 |
|
|
for (kv = ptb->kvars; ptb->kvars != NULL && *kv != NULL; kv++) |
287 |
|
|
printf("%s%s", kv != ptb->kvars ? "," : "", *kv); |
288 |
|
|
printf("\n"); |
289 |
|
|
} |
290 |
|
|
|
291 |
|
|
static void |
292 |
|
|
kget(u_long addr, void *buf, size_t size) |
293 |
|
|
{ |
294 |
|
|
if (kvm_read(ptb->kvmh, addr, buf, size) != (ssize_t)size) |
295 |
|
|
errx(1, "kvm_read: %s", kvm_geterr(ptb->kvmh)); |
296 |
|
|
} |
297 |
|
|
|
298 |
|
|
static u_long |
299 |
|
|
kfind_tcb(int sock) |
300 |
|
|
{ |
301 |
|
|
struct inpcbtable tcbtab; |
302 |
|
|
struct inpcb *next, *prev; |
303 |
|
|
struct inpcb inpcb, prevpcb; |
304 |
|
|
struct tcpcb tcpcb; |
305 |
|
|
|
306 |
|
|
struct sockaddr_storage me, them; |
307 |
|
|
socklen_t melen, themlen; |
308 |
|
|
struct sockaddr_in *in4; |
309 |
|
|
struct sockaddr_in6 *in6; |
310 |
|
|
char tmp1[64], tmp2[64]; |
311 |
|
|
int nretry; |
312 |
|
|
|
313 |
|
|
nretry = 10; |
314 |
|
|
melen = themlen = sizeof(struct sockaddr_storage); |
315 |
|
|
if (getsockname(sock, (struct sockaddr *)&me, &melen) == -1) |
316 |
|
|
err(1, "getsockname"); |
317 |
|
|
if (getpeername(sock, (struct sockaddr *)&them, &themlen) == -1) |
318 |
|
|
err(1, "getpeername"); |
319 |
|
|
if (me.ss_family != them.ss_family) |
320 |
|
|
errx(1, "%s: me.ss_family != them.ss_family", __func__); |
321 |
|
|
if (me.ss_family != AF_INET && me.ss_family != AF_INET6) |
322 |
|
|
errx(1, "%s: unknown socket family", __func__); |
323 |
|
|
if (ptb->vflag >= 2) { |
324 |
|
|
saddr_ntop((struct sockaddr *)&me, me.ss_len, |
325 |
|
|
tmp1, sizeof(tmp1)); |
326 |
|
|
saddr_ntop((struct sockaddr *)&them, them.ss_len, |
327 |
|
|
tmp2, sizeof(tmp2)); |
328 |
|
|
fprintf(stderr, "Our socket local %s remote %s\n", tmp1, tmp2); |
329 |
|
|
} |
330 |
|
|
if (ptb->vflag >= 2) |
331 |
|
|
fprintf(stderr, "Using PCB table at %lu\n", ptb->ktcbtab); |
332 |
|
|
retry: |
333 |
|
|
kget(ptb->ktcbtab, &tcbtab, sizeof(tcbtab)); |
334 |
|
|
prev = NULL; |
335 |
|
|
next = TAILQ_FIRST(&tcbtab.inpt_queue); |
336 |
|
|
|
337 |
|
|
if (ptb->vflag >= 2) |
338 |
|
|
fprintf(stderr, "PCB start at %p\n", next); |
339 |
|
|
while (next != NULL) { |
340 |
|
|
if (ptb->vflag >= 2) |
341 |
|
|
fprintf(stderr, "Checking PCB %p\n", next); |
342 |
|
|
kget((u_long)next, &inpcb, sizeof(inpcb)); |
343 |
|
|
if (prev != NULL) { |
344 |
|
|
kget((u_long)prev, &prevpcb, sizeof(prevpcb)); |
345 |
|
|
if (TAILQ_NEXT(&prevpcb, inp_queue) != next) { |
346 |
|
|
if (nretry--) { |
347 |
|
|
warnx("PCB prev pointer insane"); |
348 |
|
|
goto retry; |
349 |
|
|
} else |
350 |
|
|
errx(1, "PCB prev pointer insane," |
351 |
|
|
" all attempts exhaused"); |
352 |
|
|
} |
353 |
|
|
} |
354 |
|
|
prev = next; |
355 |
|
|
next = TAILQ_NEXT(&inpcb, inp_queue); |
356 |
|
|
|
357 |
|
|
if (me.ss_family == AF_INET) { |
358 |
|
|
if ((inpcb.inp_flags & INP_IPV6) != 0) { |
359 |
|
|
if (ptb->vflag >= 2) |
360 |
|
|
fprintf(stderr, "Skip: INP_IPV6"); |
361 |
|
|
continue; |
362 |
|
|
} |
363 |
|
|
if (ptb->vflag >= 2) { |
364 |
|
|
inet_ntop(AF_INET, &inpcb.inp_laddr, |
365 |
|
|
tmp1, sizeof(tmp1)); |
366 |
|
|
inet_ntop(AF_INET, &inpcb.inp_faddr, |
367 |
|
|
tmp2, sizeof(tmp2)); |
368 |
|
|
fprintf(stderr, "PCB %p local: [%s]:%d " |
369 |
|
|
"remote: [%s]:%d\n", prev, |
370 |
|
|
tmp1, inpcb.inp_lport, |
371 |
|
|
tmp2, inpcb.inp_fport); |
372 |
|
|
} |
373 |
|
|
in4 = (struct sockaddr_in *)&me; |
374 |
|
|
if (memcmp(&in4->sin_addr, &inpcb.inp_laddr, |
375 |
|
|
sizeof(struct in_addr)) != 0 || |
376 |
|
|
in4->sin_port != inpcb.inp_lport) |
377 |
|
|
continue; |
378 |
|
|
in4 = (struct sockaddr_in *)&them; |
379 |
|
|
if (memcmp(&in4->sin_addr, &inpcb.inp_faddr, |
380 |
|
|
sizeof(struct in_addr)) != 0 || |
381 |
|
|
in4->sin_port != inpcb.inp_fport) |
382 |
|
|
continue; |
383 |
|
|
} else { |
384 |
|
|
if ((inpcb.inp_flags & INP_IPV6) == 0) |
385 |
|
|
continue; |
386 |
|
|
if (ptb->vflag >= 2) { |
387 |
|
|
inet_ntop(AF_INET6, &inpcb.inp_laddr6, |
388 |
|
|
tmp1, sizeof(tmp1)); |
389 |
|
|
inet_ntop(AF_INET6, &inpcb.inp_faddr6, |
390 |
|
|
tmp2, sizeof(tmp2)); |
391 |
|
|
fprintf(stderr, "PCB %p local: [%s]:%d " |
392 |
|
|
"remote: [%s]:%d\n", prev, |
393 |
|
|
tmp1, inpcb.inp_lport, |
394 |
|
|
tmp2, inpcb.inp_fport); |
395 |
|
|
} |
396 |
|
|
in6 = (struct sockaddr_in6 *)&me; |
397 |
|
|
if (memcmp(&in6->sin6_addr, &inpcb.inp_laddr6, |
398 |
|
|
sizeof(struct in6_addr)) != 0 || |
399 |
|
|
in6->sin6_port != inpcb.inp_lport) |
400 |
|
|
continue; |
401 |
|
|
in6 = (struct sockaddr_in6 *)&them; |
402 |
|
|
if (memcmp(&in6->sin6_addr, &inpcb.inp_faddr6, |
403 |
|
|
sizeof(struct in6_addr)) != 0 || |
404 |
|
|
in6->sin6_port != inpcb.inp_fport) |
405 |
|
|
continue; |
406 |
|
|
} |
407 |
|
|
kget((u_long)inpcb.inp_ppcb, &tcpcb, sizeof(tcpcb)); |
408 |
|
|
if (tcpcb.t_state != TCPS_ESTABLISHED) { |
409 |
|
|
if (ptb->vflag >= 2) |
410 |
|
|
fprintf(stderr, "Not established\n"); |
411 |
|
|
continue; |
412 |
|
|
} |
413 |
|
|
if (ptb->vflag >= 2) |
414 |
|
|
fprintf(stderr, "Found PCB at %p\n", prev); |
415 |
|
|
return ((u_long)prev); |
416 |
|
|
} |
417 |
|
|
|
418 |
|
|
errx(1, "No matching PCB found"); |
419 |
|
|
} |
420 |
|
|
|
421 |
|
|
static void |
422 |
|
|
kupdate_stats(u_long tcbaddr, struct inpcb *inpcb, |
423 |
|
|
struct tcpcb *tcpcb, struct socket *sockb) |
424 |
|
|
{ |
425 |
|
|
kget(tcbaddr, inpcb, sizeof(*inpcb)); |
426 |
|
|
kget((u_long)inpcb->inp_ppcb, tcpcb, sizeof(*tcpcb)); |
427 |
|
|
kget((u_long)inpcb->inp_socket, sockb, sizeof(*sockb)); |
428 |
|
|
} |
429 |
|
|
|
430 |
|
|
static void |
431 |
|
|
check_kvar(const char *var) |
432 |
|
|
{ |
433 |
|
|
u_int i; |
434 |
|
|
|
435 |
|
|
for (i = 0; allowed_kvars[i] != NULL; i++) |
436 |
|
|
if (strcmp(allowed_kvars[i], var) == 0) |
437 |
|
|
return; |
438 |
|
|
errx(1, "Unrecognised kvar: %s", var); |
439 |
|
|
} |
440 |
|
|
|
441 |
|
|
static void |
442 |
|
|
list_kvars(void) |
443 |
|
|
{ |
444 |
|
|
u_int i; |
445 |
|
|
|
446 |
|
|
printf("Supported kernel variables:\n"); |
447 |
|
|
for (i = 0; allowed_kvars[i] != NULL; i++) |
448 |
|
|
printf("\t%s\n", allowed_kvars[i]); |
449 |
|
|
} |
450 |
|
|
|
451 |
|
|
static char ** |
452 |
|
|
check_prepare_kvars(char *list) |
453 |
|
|
{ |
454 |
|
|
char *item, **ret = NULL; |
455 |
|
|
u_int n = 0; |
456 |
|
|
|
457 |
|
|
while ((item = strsep(&list, ", \t\n")) != NULL) { |
458 |
|
|
check_kvar(item); |
459 |
|
|
if ((ret = reallocarray(ret, (++n + 1), sizeof(*ret))) == NULL) |
460 |
|
|
errx(1, "reallocarray(kvars)"); |
461 |
|
|
if ((ret[n - 1] = strdup(item)) == NULL) |
462 |
|
|
errx(1, "strdup"); |
463 |
|
|
ret[n] = NULL; |
464 |
|
|
} |
465 |
|
|
return (ret); |
466 |
|
|
} |
467 |
|
|
|
468 |
|
|
static void |
469 |
|
|
stats_prepare(struct statctx *sc) |
470 |
|
|
{ |
471 |
|
|
sc->buf = ptb->dummybuf; |
472 |
|
|
sc->buflen = ptb->dummybuf_len; |
473 |
|
|
|
474 |
|
|
if (ptb->kvars) |
475 |
|
|
sc->tcp_tcbaddr = kfind_tcb(sc->fd); |
476 |
|
|
if (clock_gettime_tv(CLOCK_MONOTONIC, &sc->t_start) == -1) |
477 |
|
|
err(1, "clock_gettime_tv"); |
478 |
|
|
sc->t_last = sc->t_start; |
479 |
|
|
|
480 |
|
|
} |
481 |
|
|
|
482 |
|
|
static void |
483 |
|
|
tcp_stats_display(unsigned long long total_elapsed, long double mbps, |
484 |
|
|
float bwperc, struct statctx *sc, struct inpcb *inpcb, |
485 |
|
|
struct tcpcb *tcpcb, struct socket *sockb) |
486 |
|
|
{ |
487 |
|
|
int j; |
488 |
|
|
|
489 |
|
|
printf("%12llu %14llu %12.3Lf %7.2f%% ", total_elapsed, sc->bytes, |
490 |
|
|
mbps, bwperc); |
491 |
|
|
|
492 |
|
|
if (ptb->kvars != NULL) { |
493 |
|
|
kupdate_stats(sc->tcp_tcbaddr, inpcb, tcpcb, |
494 |
|
|
sockb); |
495 |
|
|
|
496 |
|
|
for (j = 0; ptb->kvars[j] != NULL; j++) { |
497 |
|
|
#define S(a) #a |
498 |
|
|
#define P(b, v, f) \ |
499 |
|
|
if (strcmp(ptb->kvars[j], S(b.v)) == 0) { \ |
500 |
|
|
printf("%s"f, j > 0 ? "," : "", b->v); \ |
501 |
|
|
continue; \ |
502 |
|
|
} |
503 |
|
|
P(inpcb, inp_flags, "0x%08x") |
504 |
|
|
P(sockb, so_rcv.sb_cc, "%lu") |
505 |
|
|
P(sockb, so_rcv.sb_hiwat, "%lu") |
506 |
|
|
P(sockb, so_rcv.sb_wat, "%lu") |
507 |
|
|
P(sockb, so_snd.sb_cc, "%lu") |
508 |
|
|
P(sockb, so_snd.sb_hiwat, "%lu") |
509 |
|
|
P(sockb, so_snd.sb_wat, "%lu") |
510 |
|
|
P(tcpcb, last_ack_sent, "%u") |
511 |
|
|
P(tcpcb, max_sndwnd, "%lu") |
512 |
|
|
P(tcpcb, rcv_adv, "%u") |
513 |
|
|
P(tcpcb, rcv_nxt, "%u") |
514 |
|
|
P(tcpcb, rcv_scale, "%u") |
515 |
|
|
P(tcpcb, rcv_wnd, "%lu") |
516 |
|
|
P(tcpcb, rfbuf_cnt, "%u") |
517 |
|
|
P(tcpcb, rfbuf_ts, "%u") |
518 |
|
|
P(tcpcb, snd_cwnd, "%lu") |
519 |
|
|
P(tcpcb, snd_max, "%u") |
520 |
|
|
P(tcpcb, snd_nxt, "%u") |
521 |
|
|
P(tcpcb, snd_scale, "%u") |
522 |
|
|
P(tcpcb, snd_ssthresh, "%lu") |
523 |
|
|
P(tcpcb, snd_una, "%u") |
524 |
|
|
P(tcpcb, snd_wl1, "%u") |
525 |
|
|
P(tcpcb, snd_wl2, "%u") |
526 |
|
|
P(tcpcb, snd_wnd, "%lu") |
527 |
|
|
P(tcpcb, t_rcvtime, "%u") |
528 |
|
|
P(tcpcb, t_rtseq, "%u") |
529 |
|
|
P(tcpcb, t_rttmin, "%hu") |
530 |
|
|
P(tcpcb, t_rtttime, "%u") |
531 |
|
|
P(tcpcb, t_rttvar, "%hu") |
532 |
|
|
P(tcpcb, t_srtt, "%hu") |
533 |
|
|
P(tcpcb, ts_recent, "%u") |
534 |
|
|
P(tcpcb, ts_recent_age, "%u") |
535 |
|
|
#undef S |
536 |
|
|
#undef P |
537 |
|
|
} |
538 |
|
|
} |
539 |
|
|
printf("\n"); |
540 |
|
|
} |
541 |
|
|
|
542 |
|
|
static void |
543 |
|
|
tcp_process_slice(int fd, short event, void *bula) |
544 |
|
|
{ |
545 |
|
|
unsigned long long total_elapsed, since_last; |
546 |
|
|
long double mbps, slice_mbps = 0; |
547 |
|
|
float bwperc; |
548 |
|
|
struct statctx *sc; |
549 |
|
|
struct timeval t_cur, t_diff; |
550 |
|
|
struct inpcb inpcb; |
551 |
|
|
struct tcpcb tcpcb; |
552 |
|
|
struct socket sockb; |
553 |
|
|
|
554 |
|
|
TAILQ_FOREACH(sc, &sc_queue, entry) { |
555 |
|
|
if (clock_gettime_tv(CLOCK_MONOTONIC, &t_cur) == -1) |
556 |
|
|
err(1, "clock_gettime_tv"); |
557 |
|
|
if (ptb->kvars != NULL) /* process kernel stats */ |
558 |
|
|
kupdate_stats(sc->tcp_tcbaddr, &inpcb, &tcpcb, |
559 |
|
|
&sockb); |
560 |
|
|
|
561 |
|
|
timersub(&t_cur, &sc->t_start, &t_diff); |
562 |
|
|
total_elapsed = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000; |
563 |
|
|
timersub(&t_cur, &sc->t_last, &t_diff); |
564 |
|
|
since_last = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000; |
565 |
|
|
bwperc = (sc->bytes * 100.0) / mainstats.slice_bytes; |
566 |
|
|
mbps = (sc->bytes * 8) / (since_last * 1000.0); |
567 |
|
|
slice_mbps += mbps; |
568 |
|
|
|
569 |
|
|
tcp_stats_display(total_elapsed, mbps, bwperc, sc, |
570 |
|
|
&inpcb, &tcpcb, &sockb); |
571 |
|
|
|
572 |
|
|
sc->t_last = t_cur; |
573 |
|
|
sc->bytes = 0; |
574 |
|
|
} |
575 |
|
|
|
576 |
|
|
/* process stats for this slice */ |
577 |
|
|
if (slice_mbps > mainstats.peak_mbps) |
578 |
|
|
mainstats.peak_mbps = slice_mbps; |
579 |
|
|
printf("Conn: %3d Mbps: %12.3Lf Peak Mbps: %12.3Lf Avg Mbps: %12.3Lf\n", |
580 |
|
|
mainstats.nconns, slice_mbps, mainstats.peak_mbps, |
581 |
|
|
mainstats.nconns ? slice_mbps / mainstats.nconns : 0); |
582 |
|
|
mainstats.slice_bytes = 0; |
583 |
|
|
|
584 |
|
|
set_slice_timer(mainstats.nconns > 0); |
585 |
|
|
} |
586 |
|
|
|
587 |
|
|
static void |
588 |
|
|
udp_process_slice(int fd, short event, void *v_sc) |
589 |
|
|
{ |
590 |
|
|
struct statctx *sc = v_sc; |
591 |
|
|
unsigned long long total_elapsed, since_last, pps; |
592 |
|
|
long double slice_mbps; |
593 |
|
|
struct timeval t_cur, t_diff; |
594 |
|
|
|
595 |
|
|
if (clock_gettime_tv(CLOCK_MONOTONIC, &t_cur) == -1) |
596 |
|
|
err(1, "clock_gettime_tv"); |
597 |
|
|
/* Calculate pps */ |
598 |
|
|
timersub(&t_cur, &sc->t_start, &t_diff); |
599 |
|
|
total_elapsed = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000; |
600 |
|
|
timersub(&t_cur, &sc->t_last, &t_diff); |
601 |
|
|
since_last = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000; |
602 |
|
|
slice_mbps = (sc->bytes * 8) / (since_last * 1000.0); |
603 |
|
|
pps = (sc->udp_slice_pkts * 1000) / since_last; |
604 |
|
|
if (slice_mbps > mainstats.peak_mbps) |
605 |
|
|
mainstats.peak_mbps = slice_mbps; |
606 |
|
|
printf("Elapsed: %11llu Mbps: %11.3Lf Peak Mbps: %11.3Lf %s PPS: %7llu\n", |
607 |
|
|
total_elapsed, slice_mbps, mainstats.peak_mbps, |
608 |
|
|
ptb->sflag ? "Rx" : "Tx", pps); |
609 |
|
|
|
610 |
|
|
/* Clean up this slice time */ |
611 |
|
|
sc->t_last = t_cur; |
612 |
|
|
sc->bytes = 0; |
613 |
|
|
sc->udp_slice_pkts = 0; |
614 |
|
|
set_slice_timer(1); |
615 |
|
|
} |
616 |
|
|
|
617 |
|
|
static void |
618 |
|
|
udp_server_handle_sc(int fd, short event, void *v_sc) |
619 |
|
|
{ |
620 |
|
|
ssize_t n; |
621 |
|
|
struct statctx *sc = v_sc; |
622 |
|
|
|
623 |
|
|
n = read(fd, ptb->dummybuf, ptb->dummybuf_len); |
624 |
|
|
if (n == 0) |
625 |
|
|
return; |
626 |
|
|
else if (n == -1) { |
627 |
|
|
if (errno != EINTR && errno != EWOULDBLOCK) |
628 |
|
|
warn("fd %d read error", fd); |
629 |
|
|
return; |
630 |
|
|
} |
631 |
|
|
|
632 |
|
|
if (ptb->vflag >= 3) |
633 |
|
|
fprintf(stderr, "read: %zd bytes\n", n); |
634 |
|
|
/* If this was our first packet, start slice timer */ |
635 |
|
|
if (mainstats.peak_mbps == 0) |
636 |
|
|
set_slice_timer(1); |
637 |
|
|
/* Account packet */ |
638 |
|
|
sc->udp_slice_pkts++; |
639 |
|
|
sc->bytes += n; |
640 |
|
|
} |
641 |
|
|
|
642 |
|
|
static void |
643 |
|
|
tcp_server_handle_sc(int fd, short event, void *v_sc) |
644 |
|
|
{ |
645 |
|
|
struct statctx *sc = v_sc; |
646 |
|
|
ssize_t n; |
647 |
|
|
|
648 |
|
|
n = read(sc->fd, sc->buf, sc->buflen); |
649 |
|
|
if (n == -1) { |
650 |
|
|
if (errno != EINTR && errno != EWOULDBLOCK) |
651 |
|
|
warn("fd %d read error", sc->fd); |
652 |
|
|
return; |
653 |
|
|
} else if (n == 0) { |
654 |
|
|
if (ptb->vflag) |
655 |
|
|
fprintf(stderr, "%8d closed by remote end\n", sc->fd); |
656 |
|
|
|
657 |
|
|
TAILQ_REMOVE(&sc_queue, sc, entry); |
658 |
|
|
|
659 |
|
|
event_del(&sc->ev); |
660 |
|
|
close(sc->fd); |
661 |
|
|
|
662 |
|
|
/* Some file descriptors are available again. */ |
663 |
|
|
if (evtimer_pending(&sc->tcp_ts->evt, NULL)) { |
664 |
|
|
evtimer_del(&sc->tcp_ts->evt); |
665 |
|
|
event_add(&sc->tcp_ts->ev, NULL); |
666 |
|
|
} |
667 |
|
|
|
668 |
|
|
free(sc); |
669 |
|
|
mainstats.nconns--; |
670 |
|
|
return; |
671 |
|
|
} |
672 |
|
|
if (ptb->vflag >= 3) |
673 |
|
|
fprintf(stderr, "read: %zd bytes\n", n); |
674 |
|
|
sc->bytes += n; |
675 |
|
|
mainstats.slice_bytes += n; |
676 |
|
|
} |
677 |
|
|
|
678 |
|
|
static void |
679 |
|
|
tcp_server_accept(int fd, short event, void *arg) |
680 |
|
|
{ |
681 |
|
|
struct tcpservsock *ts = arg; |
682 |
|
|
int sock; |
683 |
|
|
struct statctx *sc; |
684 |
|
|
struct sockaddr_storage ss; |
685 |
|
|
socklen_t sslen; |
686 |
|
|
char tmp[128]; |
687 |
|
|
|
688 |
|
|
sslen = sizeof(ss); |
689 |
|
|
|
690 |
|
|
event_add(&ts->ev, NULL); |
691 |
|
|
if (event & EV_TIMEOUT) |
692 |
|
|
return; |
693 |
|
|
if ((sock = accept4(fd, (struct sockaddr *)&ss, &sslen, SOCK_NONBLOCK)) |
694 |
|
|
== -1) { |
695 |
|
|
/* |
696 |
|
|
* Pause accept if we are out of file descriptors, or |
697 |
|
|
* libevent will haunt us here too. |
698 |
|
|
*/ |
699 |
|
|
if (errno == ENFILE || errno == EMFILE) { |
700 |
|
|
struct timeval evtpause = { 1, 0 }; |
701 |
|
|
|
702 |
|
|
event_del(&ts->ev); |
703 |
|
|
evtimer_add(&ts->evt, &evtpause); |
704 |
|
|
} else if (errno != EWOULDBLOCK && errno != EINTR && |
705 |
|
|
errno != ECONNABORTED) |
706 |
|
|
warn("accept"); |
707 |
|
|
return; |
708 |
|
|
} |
709 |
|
|
saddr_ntop((struct sockaddr *)&ss, sslen, |
710 |
|
|
tmp, sizeof(tmp)); |
711 |
|
|
if (ptb->Tflag != -1 && ss.ss_family == AF_INET) { |
712 |
|
|
if (setsockopt(sock, IPPROTO_IP, IP_TOS, |
713 |
|
|
&ptb->Tflag, sizeof(ptb->Tflag))) |
714 |
|
|
err(1, "setsockopt IP_TOS"); |
715 |
|
|
} |
716 |
|
|
if (ptb->Tflag != -1 && ss.ss_family == AF_INET6) { |
717 |
|
|
if (setsockopt(sock, IPPROTO_IPV6, IPV6_TCLASS, |
718 |
|
|
&ptb->Tflag, sizeof(ptb->Tflag))) |
719 |
|
|
err(1, "setsockopt IPV6_TCLASS"); |
720 |
|
|
} |
721 |
|
|
/* Alloc client structure and register reading callback */ |
722 |
|
|
if ((sc = calloc(1, sizeof(*sc))) == NULL) |
723 |
|
|
err(1, "calloc"); |
724 |
|
|
sc->tcp_ts = ts; |
725 |
|
|
sc->fd = sock; |
726 |
|
|
stats_prepare(sc); |
727 |
|
|
event_set(&sc->ev, sc->fd, EV_READ | EV_PERSIST, |
728 |
|
|
tcp_server_handle_sc, sc); |
729 |
|
|
event_add(&sc->ev, NULL); |
730 |
|
|
TAILQ_INSERT_TAIL(&sc_queue, sc, entry); |
731 |
|
|
mainstats.nconns++; |
732 |
|
|
if (mainstats.nconns == 1) |
733 |
|
|
set_slice_timer(1); |
734 |
|
|
if (ptb->vflag) |
735 |
|
|
fprintf(stderr, "Accepted connection from %s, fd = %d\n", |
736 |
|
|
tmp, sc->fd); |
737 |
|
|
} |
738 |
|
|
|
739 |
|
|
static void |
740 |
|
|
server_init(struct addrinfo *aitop, struct statctx *udp_sc) |
741 |
|
|
{ |
742 |
|
|
char tmp[128]; |
743 |
|
|
int sock, on = 1; |
744 |
|
|
struct addrinfo *ai; |
745 |
|
|
struct event *ev; |
746 |
|
|
struct tcpservsock *ts; |
747 |
|
|
nfds_t lnfds; |
748 |
|
|
|
749 |
|
|
lnfds = 0; |
750 |
|
|
for (ai = aitop; ai != NULL; ai = ai->ai_next) { |
751 |
|
|
saddr_ntop(ai->ai_addr, ai->ai_addrlen, tmp, sizeof(tmp)); |
752 |
|
|
if (ptb->vflag) |
753 |
|
|
fprintf(stderr, "Try to bind to %s\n", tmp); |
754 |
|
|
if ((sock = socket(ai->ai_family, ai->ai_socktype, |
755 |
|
|
ai->ai_protocol)) == -1) { |
756 |
|
|
if (ai->ai_next == NULL) |
757 |
|
|
err(1, "socket"); |
758 |
|
|
if (ptb->vflag) |
759 |
|
|
warn("socket"); |
760 |
|
|
continue; |
761 |
|
|
} |
762 |
|
|
if (ptb->Tflag != -1 && ai->ai_family == AF_INET) { |
763 |
|
|
if (setsockopt(sock, IPPROTO_IP, IP_TOS, |
764 |
|
|
&ptb->Tflag, sizeof(ptb->Tflag))) |
765 |
|
|
err(1, "setsockopt IP_TOS"); |
766 |
|
|
} |
767 |
|
|
if (ptb->Tflag != -1 && ai->ai_family == AF_INET6) { |
768 |
|
|
if (setsockopt(sock, IPPROTO_IPV6, IPV6_TCLASS, |
769 |
|
|
&ptb->Tflag, sizeof(ptb->Tflag))) |
770 |
|
|
err(1, "setsockopt IPV6_TCLASS"); |
771 |
|
|
} |
772 |
|
|
if (setsockopt(sock, SOL_SOCKET, SO_REUSEADDR, |
773 |
|
|
&on, sizeof(on)) == -1) |
774 |
|
|
warn("reuse port"); |
775 |
|
|
if (bind(sock, ai->ai_addr, ai->ai_addrlen) != 0) { |
776 |
|
|
if (ai->ai_next == NULL) |
777 |
|
|
err(1, "bind"); |
778 |
|
|
if (ptb->vflag) |
779 |
|
|
warn("bind"); |
780 |
|
|
close(sock); |
781 |
|
|
continue; |
782 |
|
|
} |
783 |
|
|
if (ptb->Sflag) { |
784 |
|
|
if (setsockopt(sock, SOL_SOCKET, SO_RCVBUF, |
785 |
|
|
&ptb->Sflag, sizeof(ptb->Sflag)) == -1) |
786 |
|
|
warn("set receive buffer size"); |
787 |
|
|
} |
788 |
|
|
if (TCP_MODE) { |
789 |
|
|
if (listen(sock, 64) == -1) { |
790 |
|
|
if (ai->ai_next == NULL) |
791 |
|
|
err(1, "listen"); |
792 |
|
|
if (ptb->vflag) |
793 |
|
|
warn("listen"); |
794 |
|
|
close(sock); |
795 |
|
|
continue; |
796 |
|
|
} |
797 |
|
|
} |
798 |
|
|
if (UDP_MODE) { |
799 |
|
|
if ((ev = calloc(1, sizeof(*ev))) == NULL) |
800 |
|
|
err(1, "calloc"); |
801 |
|
|
event_set(ev, sock, EV_READ | EV_PERSIST, |
802 |
|
|
udp_server_handle_sc, udp_sc); |
803 |
|
|
event_add(ev, NULL); |
804 |
|
|
} else { |
805 |
|
|
if ((ts = calloc(1, sizeof(*ts))) == NULL) |
806 |
|
|
err(1, "calloc"); |
807 |
|
|
|
808 |
|
|
ts->fd = sock; |
809 |
|
|
evtimer_set(&ts->evt, tcp_server_accept, ts); |
810 |
|
|
event_set(&ts->ev, ts->fd, EV_READ, |
811 |
|
|
tcp_server_accept, ts); |
812 |
|
|
event_add(&ts->ev, NULL); |
813 |
|
|
} |
814 |
|
|
if (ptb->vflag >= 3) |
815 |
|
|
fprintf(stderr, "bound to fd %d\n", sock); |
816 |
|
|
lnfds++; |
817 |
|
|
} |
818 |
|
|
if (!ptb->Uflag) |
819 |
|
|
freeaddrinfo(aitop); |
820 |
|
|
if (lnfds == 0) |
821 |
|
|
errx(1, "No working listen addresses found"); |
822 |
|
|
} |
823 |
|
|
|
824 |
|
|
static void |
825 |
|
|
client_handle_sc(int fd, short event, void *v_sc) |
826 |
|
|
{ |
827 |
|
|
struct statctx *sc = v_sc; |
828 |
|
|
ssize_t n; |
829 |
|
|
size_t blen = sc->buflen; |
830 |
|
|
|
831 |
|
|
if (ptb->Rflag) |
832 |
|
|
blen = arc4random_uniform(blen) + 1; |
833 |
|
|
if ((n = write(sc->fd, sc->buf, blen)) == -1) { |
834 |
|
|
if (errno == EINTR || errno == EWOULDBLOCK || |
835 |
|
|
(UDP_MODE && errno == ENOBUFS)) |
836 |
|
|
return; |
837 |
|
|
err(1, "write"); |
838 |
|
|
} |
839 |
|
|
if (TCP_MODE && n == 0) { |
840 |
|
|
fprintf(stderr, "Remote end closed connection"); |
841 |
|
|
exit(1); |
842 |
|
|
} |
843 |
|
|
if (ptb->vflag >= 3) |
844 |
|
|
fprintf(stderr, "write: %zd bytes\n", n); |
845 |
|
|
sc->bytes += n; |
846 |
|
|
mainstats.slice_bytes += n; |
847 |
|
|
if (UDP_MODE) |
848 |
|
|
sc->udp_slice_pkts++; |
849 |
|
|
} |
850 |
|
|
|
851 |
|
|
static void |
852 |
|
|
client_init(struct addrinfo *aitop, int nconn, struct statctx *udp_sc, |
853 |
|
|
struct addrinfo *aib) |
854 |
|
|
{ |
855 |
|
|
struct statctx *sc; |
856 |
|
|
struct addrinfo *ai; |
857 |
|
|
char tmp[128]; |
858 |
|
|
int i, r, sock; |
859 |
|
|
|
860 |
|
|
sc = udp_sc; |
861 |
|
|
for (i = 0; i < nconn; i++) { |
862 |
|
|
for (sock = -1, ai = aitop; ai != NULL; ai = ai->ai_next) { |
863 |
|
|
saddr_ntop(ai->ai_addr, ai->ai_addrlen, tmp, |
864 |
|
|
sizeof(tmp)); |
865 |
|
|
if (ptb->vflag && i == 0) |
866 |
|
|
fprintf(stderr, "Trying %s\n", tmp); |
867 |
|
|
if ((sock = socket(ai->ai_family, ai->ai_socktype, |
868 |
|
|
ai->ai_protocol)) == -1) { |
869 |
|
|
if (ai->ai_next == NULL) |
870 |
|
|
err(1, "socket"); |
871 |
|
|
if (ptb->vflag) |
872 |
|
|
warn("socket"); |
873 |
|
|
continue; |
874 |
|
|
} |
875 |
|
|
if (aib != NULL) { |
876 |
|
|
saddr_ntop(aib->ai_addr, aib->ai_addrlen, |
877 |
|
|
tmp, sizeof(tmp)); |
878 |
|
|
if (ptb->vflag) |
879 |
|
|
fprintf(stderr, |
880 |
|
|
"Try to bind to %s\n", tmp); |
881 |
|
|
if (bind(sock, (struct sockaddr *)aib->ai_addr, |
882 |
|
|
aib->ai_addrlen) == -1) |
883 |
|
|
err(1, "bind"); |
884 |
|
|
} |
885 |
|
|
if (ptb->Tflag != -1 && ai->ai_family == AF_INET) { |
886 |
|
|
if (setsockopt(sock, IPPROTO_IP, IP_TOS, |
887 |
|
|
&ptb->Tflag, sizeof(ptb->Tflag))) |
888 |
|
|
err(1, "setsockopt IP_TOS"); |
889 |
|
|
} |
890 |
|
|
if (ptb->Tflag != -1 && ai->ai_family == AF_INET6) { |
891 |
|
|
if (setsockopt(sock, IPPROTO_IPV6, IPV6_TCLASS, |
892 |
|
|
&ptb->Tflag, sizeof(ptb->Tflag))) |
893 |
|
|
err(1, "setsockopt IPV6_TCLASS"); |
894 |
|
|
} |
895 |
|
|
if (ptb->Sflag) { |
896 |
|
|
if (setsockopt(sock, SOL_SOCKET, SO_SNDBUF, |
897 |
|
|
&ptb->Sflag, sizeof(ptb->Sflag)) == -1) |
898 |
|
|
warn("set TCP send buffer size"); |
899 |
|
|
} |
900 |
|
|
if (connect(sock, ai->ai_addr, ai->ai_addrlen) != 0) { |
901 |
|
|
if (ai->ai_next == NULL) |
902 |
|
|
err(1, "connect"); |
903 |
|
|
if (ptb->vflag) |
904 |
|
|
warn("connect"); |
905 |
|
|
close(sock); |
906 |
|
|
sock = -1; |
907 |
|
|
continue; |
908 |
|
|
} |
909 |
|
|
break; |
910 |
|
|
} |
911 |
|
|
if (sock == -1) |
912 |
|
|
errx(1, "No host found"); |
913 |
|
|
if ((r = fcntl(sock, F_GETFL)) == -1) |
914 |
|
|
err(1, "fcntl(F_GETFL)"); |
915 |
|
|
r |= O_NONBLOCK; |
916 |
|
|
if (fcntl(sock, F_SETFL, r) == -1) |
917 |
|
|
err(1, "fcntl(F_SETFL, O_NONBLOCK)"); |
918 |
|
|
/* Alloc and prepare stats */ |
919 |
|
|
if (TCP_MODE) { |
920 |
|
|
if ((sc = calloc(1, sizeof(*sc))) == NULL) |
921 |
|
|
err(1, "calloc"); |
922 |
|
|
} |
923 |
|
|
sc->fd = sock; |
924 |
|
|
stats_prepare(sc); |
925 |
|
|
event_set(&sc->ev, sc->fd, EV_WRITE | EV_PERSIST, |
926 |
|
|
client_handle_sc, sc); |
927 |
|
|
event_add(&sc->ev, NULL); |
928 |
|
|
TAILQ_INSERT_TAIL(&sc_queue, sc, entry); |
929 |
|
|
mainstats.nconns++; |
930 |
|
|
if (mainstats.nconns == 1) |
931 |
|
|
set_slice_timer(1); |
932 |
|
|
} |
933 |
|
|
if (!ptb->Uflag) |
934 |
|
|
freeaddrinfo(aitop); |
935 |
|
|
if (aib != NULL) |
936 |
|
|
freeaddrinfo(aib); |
937 |
|
|
|
938 |
|
|
if (ptb->vflag && nconn > 1) |
939 |
|
|
fprintf(stderr, "%d connections established\n", |
940 |
|
|
mainstats.nconns); |
941 |
|
|
} |
942 |
|
|
|
943 |
|
|
static int |
944 |
|
|
map_tos(char *s, int *val) |
945 |
|
|
{ |
946 |
|
|
/* DiffServ Codepoints and other TOS mappings */ |
947 |
|
|
const struct toskeywords { |
948 |
|
|
const char *keyword; |
949 |
|
|
int val; |
950 |
|
|
} *t, toskeywords[] = { |
951 |
|
|
{ "af11", IPTOS_DSCP_AF11 }, |
952 |
|
|
{ "af12", IPTOS_DSCP_AF12 }, |
953 |
|
|
{ "af13", IPTOS_DSCP_AF13 }, |
954 |
|
|
{ "af21", IPTOS_DSCP_AF21 }, |
955 |
|
|
{ "af22", IPTOS_DSCP_AF22 }, |
956 |
|
|
{ "af23", IPTOS_DSCP_AF23 }, |
957 |
|
|
{ "af31", IPTOS_DSCP_AF31 }, |
958 |
|
|
{ "af32", IPTOS_DSCP_AF32 }, |
959 |
|
|
{ "af33", IPTOS_DSCP_AF33 }, |
960 |
|
|
{ "af41", IPTOS_DSCP_AF41 }, |
961 |
|
|
{ "af42", IPTOS_DSCP_AF42 }, |
962 |
|
|
{ "af43", IPTOS_DSCP_AF43 }, |
963 |
|
|
{ "critical", IPTOS_PREC_CRITIC_ECP }, |
964 |
|
|
{ "cs0", IPTOS_DSCP_CS0 }, |
965 |
|
|
{ "cs1", IPTOS_DSCP_CS1 }, |
966 |
|
|
{ "cs2", IPTOS_DSCP_CS2 }, |
967 |
|
|
{ "cs3", IPTOS_DSCP_CS3 }, |
968 |
|
|
{ "cs4", IPTOS_DSCP_CS4 }, |
969 |
|
|
{ "cs5", IPTOS_DSCP_CS5 }, |
970 |
|
|
{ "cs6", IPTOS_DSCP_CS6 }, |
971 |
|
|
{ "cs7", IPTOS_DSCP_CS7 }, |
972 |
|
|
{ "ef", IPTOS_DSCP_EF }, |
973 |
|
|
{ "inetcontrol", IPTOS_PREC_INTERNETCONTROL }, |
974 |
|
|
{ "lowdelay", IPTOS_LOWDELAY }, |
975 |
|
|
{ "netcontrol", IPTOS_PREC_NETCONTROL }, |
976 |
|
|
{ "reliability", IPTOS_RELIABILITY }, |
977 |
|
|
{ "throughput", IPTOS_THROUGHPUT }, |
978 |
|
|
{ NULL, -1 }, |
979 |
|
|
}; |
980 |
|
|
|
981 |
|
|
for (t = toskeywords; t->keyword != NULL; t++) { |
982 |
|
|
if (strcmp(s, t->keyword) == 0) { |
983 |
|
|
*val = t->val; |
984 |
|
|
return (1); |
985 |
|
|
} |
986 |
|
|
} |
987 |
|
|
|
988 |
|
|
return (0); |
989 |
|
|
} |
990 |
|
|
|
991 |
|
|
static void |
992 |
|
|
quit(int sig, short event, void *arg) |
993 |
|
|
{ |
994 |
|
|
exit(0); |
995 |
|
|
} |
996 |
|
|
|
997 |
|
|
int |
998 |
|
|
main(int argc, char **argv) |
999 |
|
|
{ |
1000 |
|
|
struct timeval tv; |
1001 |
|
|
unsigned int secs, rtable; |
1002 |
|
|
|
1003 |
|
|
char kerr[_POSIX2_LINE_MAX], *tmp; |
1004 |
|
|
struct addrinfo *aitop, *aib, hints; |
1005 |
|
|
const char *errstr; |
1006 |
|
|
struct rlimit rl; |
1007 |
|
|
int ch, herr, nconn; |
1008 |
|
|
int family = PF_UNSPEC; |
1009 |
|
|
struct nlist nl[] = { { "_tcbtable" }, { "" } }; |
1010 |
|
|
const char *host = NULL, *port = DEFAULT_PORT, *srcbind = NULL; |
1011 |
|
|
struct event ev_sigint, ev_sigterm, ev_sighup, ev_progtimer; |
1012 |
|
|
struct statctx *udp_sc = NULL; |
1013 |
|
|
struct sockaddr_un sock_un; |
1014 |
|
|
|
1015 |
|
|
/* Init world */ |
1016 |
|
|
setvbuf(stdout, NULL, _IOLBF, 0); |
1017 |
|
|
ptb = &tcpbench; |
1018 |
|
|
ptb->dummybuf_len = 0; |
1019 |
|
|
ptb->Sflag = ptb->sflag = ptb->vflag = ptb->Rflag = ptb->Uflag = 0; |
1020 |
|
|
ptb->kvmh = NULL; |
1021 |
|
|
ptb->kvars = NULL; |
1022 |
|
|
ptb->rflag = DEFAULT_STATS_INTERVAL; |
1023 |
|
|
ptb->Tflag = -1; |
1024 |
|
|
nconn = 1; |
1025 |
|
|
aib = NULL; |
1026 |
|
|
secs = 0; |
1027 |
|
|
|
1028 |
|
|
while ((ch = getopt(argc, argv, "46b:B:hlk:n:p:Rr:sS:t:T:uUvV:")) != -1) { |
1029 |
|
|
switch (ch) { |
1030 |
|
|
case '4': |
1031 |
|
|
family = PF_INET; |
1032 |
|
|
break; |
1033 |
|
|
case '6': |
1034 |
|
|
family = PF_INET6; |
1035 |
|
|
break; |
1036 |
|
|
case 'b': |
1037 |
|
|
srcbind = optarg; |
1038 |
|
|
break; |
1039 |
|
|
case 'l': |
1040 |
|
|
list_kvars(); |
1041 |
|
|
exit(0); |
1042 |
|
|
case 'k': |
1043 |
|
|
if ((tmp = strdup(optarg)) == NULL) |
1044 |
|
|
errx(1, "strdup"); |
1045 |
|
|
ptb->kvars = check_prepare_kvars(tmp); |
1046 |
|
|
free(tmp); |
1047 |
|
|
break; |
1048 |
|
|
case 'R': |
1049 |
|
|
ptb->Rflag = 1; |
1050 |
|
|
break; |
1051 |
|
|
case 'r': |
1052 |
|
|
ptb->rflag = strtonum(optarg, 0, 60 * 60 * 24 * 1000, |
1053 |
|
|
&errstr); |
1054 |
|
|
if (errstr != NULL) |
1055 |
|
|
errx(1, "statistics interval is %s: %s", |
1056 |
|
|
errstr, optarg); |
1057 |
|
|
break; |
1058 |
|
|
case 'p': |
1059 |
|
|
port = optarg; |
1060 |
|
|
break; |
1061 |
|
|
case 's': |
1062 |
|
|
ptb->sflag = 1; |
1063 |
|
|
break; |
1064 |
|
|
case 'S': |
1065 |
|
|
ptb->Sflag = strtonum(optarg, 0, 1024*1024*1024, |
1066 |
|
|
&errstr); |
1067 |
|
|
if (errstr != NULL) |
1068 |
|
|
errx(1, "receive space interval is %s: %s", |
1069 |
|
|
errstr, optarg); |
1070 |
|
|
break; |
1071 |
|
|
case 'B': |
1072 |
|
|
ptb->dummybuf_len = strtonum(optarg, 0, 1024*1024*1024, |
1073 |
|
|
&errstr); |
1074 |
|
|
if (errstr != NULL) |
1075 |
|
|
errx(1, "read/write buffer size is %s: %s", |
1076 |
|
|
errstr, optarg); |
1077 |
|
|
break; |
1078 |
|
|
case 'v': |
1079 |
|
|
ptb->vflag++; |
1080 |
|
|
break; |
1081 |
|
|
case 'V': |
1082 |
|
|
rtable = (unsigned int)strtonum(optarg, 0, |
1083 |
|
|
RT_TABLEID_MAX, &errstr); |
1084 |
|
|
if (errstr) |
1085 |
|
|
errx(1, "rtable value is %s: %s", |
1086 |
|
|
errstr, optarg); |
1087 |
|
|
if (setrtable(rtable) == -1) |
1088 |
|
|
err(1, "setrtable"); |
1089 |
|
|
break; |
1090 |
|
|
case 'n': |
1091 |
|
|
nconn = strtonum(optarg, 0, 65535, &errstr); |
1092 |
|
|
if (errstr != NULL) |
1093 |
|
|
errx(1, "number of connections is %s: %s", |
1094 |
|
|
errstr, optarg); |
1095 |
|
|
break; |
1096 |
|
|
case 'u': |
1097 |
|
|
ptb->uflag = 1; |
1098 |
|
|
break; |
1099 |
|
|
case 'U': |
1100 |
|
|
ptb->Uflag = 1; |
1101 |
|
|
break; |
1102 |
|
|
case 'T': |
1103 |
|
|
if (map_tos(optarg, &ptb->Tflag)) |
1104 |
|
|
break; |
1105 |
|
|
errstr = NULL; |
1106 |
|
|
if (strlen(optarg) > 1 && optarg[0] == '0' && |
1107 |
|
|
optarg[1] == 'x') |
1108 |
|
|
ptb->Tflag = (int)strtol(optarg, NULL, 16); |
1109 |
|
|
else |
1110 |
|
|
ptb->Tflag = (int)strtonum(optarg, 0, 255, |
1111 |
|
|
&errstr); |
1112 |
|
|
if (ptb->Tflag == -1 || ptb->Tflag > 255 || errstr) |
1113 |
|
|
errx(1, "illegal tos value %s", optarg); |
1114 |
|
|
break; |
1115 |
|
|
case 't': |
1116 |
|
|
secs = strtonum(optarg, 1, UINT_MAX, &errstr); |
1117 |
|
|
if (errstr != NULL) |
1118 |
|
|
errx(1, "secs is %s: %s", |
1119 |
|
|
errstr, optarg); |
1120 |
|
|
break; |
1121 |
|
|
case 'h': |
1122 |
|
|
default: |
1123 |
|
|
usage(); |
1124 |
|
|
} |
1125 |
|
|
} |
1126 |
|
|
|
1127 |
|
|
if (pledge("stdio rpath dns inet unix id proc flock cpath wpath", NULL) == -1) |
1128 |
|
|
err(1, "pledge"); |
1129 |
|
|
|
1130 |
|
|
argv += optind; |
1131 |
|
|
argc -= optind; |
1132 |
|
|
if ((argc != (ptb->sflag && !ptb->Uflag ? 0 : 1)) || |
1133 |
|
|
(UDP_MODE && (ptb->kvars || nconn != 1))) |
1134 |
|
|
usage(); |
1135 |
|
|
|
1136 |
|
|
if (ptb->kvars) { |
1137 |
|
|
if ((ptb->kvmh = kvm_openfiles(NULL, NULL, NULL, |
1138 |
|
|
O_RDONLY, kerr)) == NULL) |
1139 |
|
|
errx(1, "kvm_open: %s", kerr); |
1140 |
|
|
drop_gid(); |
1141 |
|
|
if (kvm_nlist(ptb->kvmh, nl) < 0 || nl[0].n_type == 0) |
1142 |
|
|
errx(1, "kvm: no namelist"); |
1143 |
|
|
ptb->ktcbtab = nl[0].n_value; |
1144 |
|
|
} else |
1145 |
|
|
drop_gid(); |
1146 |
|
|
|
1147 |
|
|
if (pledge("stdio id dns inet unix flock rpath cpath wpath", NULL) == -1) |
1148 |
|
|
err(1, "pledge"); |
1149 |
|
|
|
1150 |
|
|
if (!ptb->sflag || ptb->Uflag) |
1151 |
|
|
host = argv[0]; |
1152 |
|
|
/* |
1153 |
|
|
* Rationale, |
1154 |
|
|
* If TCP, use a big buffer with big reads/writes. |
1155 |
|
|
* If UDP, use a big buffer in server and a buffer the size of a |
1156 |
|
|
* ethernet packet. |
1157 |
|
|
*/ |
1158 |
|
|
if (!ptb->dummybuf_len) { |
1159 |
|
|
if (ptb->sflag || TCP_MODE) |
1160 |
|
|
ptb->dummybuf_len = DEFAULT_BUF; |
1161 |
|
|
else |
1162 |
|
|
ptb->dummybuf_len = DEFAULT_UDP_PKT; |
1163 |
|
|
} |
1164 |
|
|
|
1165 |
|
|
bzero(&hints, sizeof(hints)); |
1166 |
|
|
hints.ai_family = family; |
1167 |
|
|
if (UDP_MODE) { |
1168 |
|
|
hints.ai_socktype = SOCK_DGRAM; |
1169 |
|
|
hints.ai_protocol = IPPROTO_UDP; |
1170 |
|
|
} else { |
1171 |
|
|
hints.ai_socktype = SOCK_STREAM; |
1172 |
|
|
hints.ai_protocol = IPPROTO_TCP; |
1173 |
|
|
} |
1174 |
|
|
if (ptb->Uflag) { |
1175 |
|
|
hints.ai_family = AF_UNIX; |
1176 |
|
|
hints.ai_protocol = 0; |
1177 |
|
|
sock_un.sun_family = AF_UNIX; |
1178 |
|
|
if (strlcpy(sock_un.sun_path, host, sizeof(sock_un.sun_path)) >= |
1179 |
|
|
sizeof(sock_un.sun_path)) |
1180 |
|
|
errx(1, "socket name '%s' too long", host); |
1181 |
|
|
hints.ai_addr = (struct sockaddr *)&sock_un; |
1182 |
|
|
hints.ai_addrlen = sizeof(sock_un); |
1183 |
|
|
aitop = &hints; |
1184 |
|
|
} else { |
1185 |
|
|
if (ptb->sflag) |
1186 |
|
|
hints.ai_flags = AI_PASSIVE; |
1187 |
|
|
if (srcbind != NULL) { |
1188 |
|
|
hints.ai_flags |= AI_NUMERICHOST; |
1189 |
|
|
herr = getaddrinfo(srcbind, NULL, &hints, &aib); |
1190 |
|
|
hints.ai_flags &= ~AI_NUMERICHOST; |
1191 |
|
|
if (herr != 0) { |
1192 |
|
|
if (herr == EAI_SYSTEM) |
1193 |
|
|
err(1, "getaddrinfo"); |
1194 |
|
|
else |
1195 |
|
|
errx(1, "getaddrinfo: %s", |
1196 |
|
|
gai_strerror(herr)); |
1197 |
|
|
} |
1198 |
|
|
} |
1199 |
|
|
if ((herr = getaddrinfo(host, port, &hints, &aitop)) != 0) { |
1200 |
|
|
if (herr == EAI_SYSTEM) |
1201 |
|
|
err(1, "getaddrinfo"); |
1202 |
|
|
else |
1203 |
|
|
errx(1, "getaddrinfo: %s", gai_strerror(herr)); |
1204 |
|
|
} |
1205 |
|
|
} |
1206 |
|
|
|
1207 |
|
|
if (pledge("stdio id inet unix flock rpath cpath wpath", NULL) == -1) |
1208 |
|
|
err(1, "pledge"); |
1209 |
|
|
|
1210 |
|
|
if (getrlimit(RLIMIT_NOFILE, &rl) == -1) |
1211 |
|
|
err(1, "getrlimit"); |
1212 |
|
|
if (rl.rlim_cur < MAX_FD) |
1213 |
|
|
rl.rlim_cur = MAX_FD; |
1214 |
|
|
if (setrlimit(RLIMIT_NOFILE, &rl)) |
1215 |
|
|
err(1, "setrlimit"); |
1216 |
|
|
if (getrlimit(RLIMIT_NOFILE, &rl) == -1) |
1217 |
|
|
err(1, "getrlimit"); |
1218 |
|
|
|
1219 |
|
|
if (pledge("stdio inet unix flock rpath cpath wpath", NULL) == -1) |
1220 |
|
|
err(1, "pledge"); |
1221 |
|
|
|
1222 |
|
|
/* Init world */ |
1223 |
|
|
TAILQ_INIT(&sc_queue); |
1224 |
|
|
if ((ptb->dummybuf = malloc(ptb->dummybuf_len)) == NULL) |
1225 |
|
|
err(1, "malloc"); |
1226 |
|
|
arc4random_buf(ptb->dummybuf, ptb->dummybuf_len); |
1227 |
|
|
|
1228 |
|
|
/* Setup libevent and signals */ |
1229 |
|
|
event_init(); |
1230 |
|
|
signal_set(&ev_sigterm, SIGTERM, signal_handler, NULL); |
1231 |
|
|
signal_set(&ev_sighup, SIGHUP, signal_handler, NULL); |
1232 |
|
|
signal_set(&ev_sigint, SIGINT, signal_handler, NULL); |
1233 |
|
|
signal_add(&ev_sigint, NULL); |
1234 |
|
|
signal_add(&ev_sigterm, NULL); |
1235 |
|
|
signal_add(&ev_sighup, NULL); |
1236 |
|
|
signal(SIGPIPE, SIG_IGN); |
1237 |
|
|
|
1238 |
|
|
if (UDP_MODE) { |
1239 |
|
|
if ((udp_sc = calloc(1, sizeof(*udp_sc))) == NULL) |
1240 |
|
|
err(1, "calloc"); |
1241 |
|
|
udp_sc->fd = -1; |
1242 |
|
|
stats_prepare(udp_sc); |
1243 |
|
|
evtimer_set(&mainstats.timer, udp_process_slice, udp_sc); |
1244 |
|
|
} else { |
1245 |
|
|
print_tcp_header(); |
1246 |
|
|
evtimer_set(&mainstats.timer, tcp_process_slice, NULL); |
1247 |
|
|
} |
1248 |
|
|
|
1249 |
|
|
if (ptb->sflag) |
1250 |
|
|
server_init(aitop, udp_sc); |
1251 |
|
|
else { |
1252 |
|
|
if (secs > 0) { |
1253 |
|
|
timerclear(&tv); |
1254 |
|
|
tv.tv_sec = secs + 1; |
1255 |
|
|
evtimer_set(&ev_progtimer, quit, NULL); |
1256 |
|
|
evtimer_add(&ev_progtimer, &tv); |
1257 |
|
|
} |
1258 |
|
|
client_init(aitop, nconn, udp_sc, aib); |
1259 |
|
|
|
1260 |
|
|
if (pledge("stdio flock rpath cpath wpath", NULL) == -1) |
1261 |
|
|
err(1, "pledge"); |
1262 |
|
|
} |
1263 |
|
|
|
1264 |
|
|
/* libevent main loop*/ |
1265 |
|
|
event_dispatch(); |
1266 |
|
|
|
1267 |
|
|
return (0); |
1268 |
|
|
} |