GCC Code Coverage Report
Directory: ./ Exec Total Coverage
File: usr.bin/tcpbench/tcpbench.c Lines: 0 642 0.0 %
Date: 2017-11-13 Branches: 0 507 0.0 %

Line Branch Exec Source
1
/*	$OpenBSD: tcpbench.c,v 1.52 2016/09/19 18:58:39 bluhm Exp $	*/
2
3
/*
4
 * Copyright (c) 2008 Damien Miller <djm@mindrot.org>
5
 * Copyright (c) 2011 Christiano F. Haesbaert <haesbaert@haesbaert.org>
6
 *
7
 * Permission to use, copy, modify, and distribute this software for any
8
 * purpose with or without fee is hereby granted, provided that the above
9
 * copyright notice and this permission notice appear in all copies.
10
 *
11
 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
12
 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
13
 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
14
 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
15
 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
16
 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
17
 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
18
 */
19
20
#include <sys/types.h>
21
#include <sys/time.h>
22
#include <sys/socket.h>
23
#include <sys/socketvar.h>
24
#include <sys/resource.h>
25
#include <sys/queue.h>
26
#include <sys/un.h>
27
28
#include <net/route.h>
29
30
#include <netinet/in.h>
31
#include <netinet/ip.h>
32
#include <netinet/tcp.h>
33
#include <netinet/tcp_timer.h>
34
#include <netinet/tcp_fsm.h>
35
#include <netinet/in_pcb.h>
36
#include <netinet/tcp_var.h>
37
38
#include <arpa/inet.h>
39
40
#include <unistd.h>
41
#include <limits.h>
42
#include <stdlib.h>
43
#include <stdio.h>
44
#include <string.h>
45
#include <errno.h>
46
#include <event.h>
47
#include <netdb.h>
48
#include <signal.h>
49
#include <err.h>
50
#include <fcntl.h>
51
#include <poll.h>
52
53
#include <kvm.h>
54
#include <nlist.h>
55
56
#define DEFAULT_PORT "12345"
57
#define DEFAULT_STATS_INTERVAL 1000 /* ms */
58
#define DEFAULT_BUF (256 * 1024)
59
#define DEFAULT_UDP_PKT (1500 - 28) /* TODO don't hardcode this */
60
#define TCP_MODE !ptb->uflag
61
#define UDP_MODE ptb->uflag
62
#define MAX_FD 1024
63
64
/* Our tcpbench globals */
65
struct {
66
	int	  Sflag;	/* Socket buffer size (tcp mode) */
67
	u_int	  rflag;	/* Report rate (ms) */
68
	int	  sflag;	/* True if server */
69
	int	  Tflag;	/* ToS if != -1 */
70
	int	  vflag;	/* Verbose */
71
	int	  uflag;	/* UDP mode */
72
	int	  Uflag;	/* UNIX (AF_LOCAL) mode */
73
	int	  Rflag;	/* randomize client write size */
74
	kvm_t	 *kvmh;		/* Kvm handler */
75
	char	**kvars;	/* Kvm enabled vars */
76
	u_long	  ktcbtab;	/* Ktcb */
77
	char	 *dummybuf;	/* IO buffer */
78
	size_t	  dummybuf_len;	/* IO buffer len */
79
} tcpbench, *ptb;
80
81
struct tcpservsock {
82
	struct event ev;
83
	struct event evt;
84
	int fd;
85
};
86
87
/* stats for a single tcp connection, udp uses only one  */
88
struct statctx {
89
	TAILQ_ENTRY(statctx) entry;
90
	struct timeval t_start, t_last;
91
	unsigned long long bytes;
92
	int fd;
93
	char *buf;
94
	size_t buflen;
95
	struct event ev;
96
	/* TCP only */
97
	struct tcpservsock *tcp_ts;
98
	u_long tcp_tcbaddr;
99
	/* UDP only */
100
	u_long udp_slice_pkts;
101
};
102
103
static void	signal_handler(int, short, void *);
104
static void	saddr_ntop(const struct sockaddr *, socklen_t, char *, size_t);
105
static void	drop_gid(void);
106
static void	set_slice_timer(int);
107
static void 	print_tcp_header(void);
108
static void	kget(u_long, void *, size_t);
109
static u_long	kfind_tcb(int);
110
static void	kupdate_stats(u_long, struct inpcb *, struct tcpcb *,
111
    struct socket *);
112
static void	list_kvars(void);
113
static void	check_kvar(const char *);
114
static char **	check_prepare_kvars(char *);
115
static void	stats_prepare(struct statctx *);
116
static void	tcp_stats_display(unsigned long long, long double, float,
117
    struct statctx *, struct inpcb *, struct tcpcb *, struct socket *);
118
static void	tcp_process_slice(int, short, void *);
119
static void	tcp_server_handle_sc(int, short, void *);
120
static void	tcp_server_accept(int, short, void *);
121
static void	server_init(struct addrinfo *, struct statctx *);
122
static void	client_handle_sc(int, short, void *);
123
static void	client_init(struct addrinfo *, int, struct statctx *,
124
    struct addrinfo *);
125
static int	clock_gettime_tv(clockid_t, struct timeval *);
126
static void	udp_server_handle_sc(int, short, void *);
127
static void	udp_process_slice(int, short, void *);
128
static int	map_tos(char *, int *);
129
/*
130
 * We account the mainstats here, that is the stats
131
 * for all connections, all variables starting with slice
132
 * are used to account information for the timeslice
133
 * between each output. Peak variables record the highest
134
 * between all slices so far.
135
 */
136
static struct {
137
	unsigned long long slice_bytes; /* bytes for last slice */
138
	long double peak_mbps;		/* peak mbps so far */
139
	int nconns; 		        /* connected clients */
140
	struct event timer;		/* process timer */
141
} mainstats;
142
143
/* When adding variables, also add to tcp_stats_display() */
144
static const char *allowed_kvars[] = {
145
	"inpcb.inp_flags",
146
	"sockb.so_rcv.sb_cc",
147
	"sockb.so_rcv.sb_hiwat",
148
	"sockb.so_rcv.sb_wat",
149
	"sockb.so_snd.sb_cc",
150
	"sockb.so_snd.sb_hiwat",
151
	"sockb.so_snd.sb_wat",
152
	"tcpcb.last_ack_sent",
153
	"tcpcb.max_sndwnd",
154
	"tcpcb.rcv_adv",
155
	"tcpcb.rcv_nxt",
156
	"tcpcb.rcv_scale",
157
	"tcpcb.rcv_wnd",
158
	"tcpcb.rfbuf_cnt",
159
	"tcpcb.rfbuf_ts",
160
	"tcpcb.snd_cwnd",
161
	"tcpcb.snd_max",
162
	"tcpcb.snd_nxt",
163
	"tcpcb.snd_scale",
164
	"tcpcb.snd_ssthresh",
165
	"tcpcb.snd_una",
166
	"tcpcb.snd_wl1",
167
	"tcpcb.snd_wl2",
168
	"tcpcb.snd_wnd",
169
	"tcpcb.t_rcvtime",
170
	"tcpcb.t_rtseq",
171
	"tcpcb.t_rttmin",
172
	"tcpcb.t_rtttime",
173
	"tcpcb.t_rttvar",
174
	"tcpcb.t_srtt",
175
	"tcpcb.ts_recent",
176
	"tcpcb.ts_recent_age",
177
	NULL
178
};
179
180
TAILQ_HEAD(, statctx) sc_queue;
181
182
static void __dead
183
usage(void)
184
{
185
	fprintf(stderr,
186
	    "usage: tcpbench -l\n"
187
	    "       tcpbench [-46RUuv] [-B buf] [-b addr] [-k kvars] [-n connections]\n"
188
	    "                [-p port] [-r interval] [-S space] [-T toskeyword]\n"
189
	    "                [-t secs] [-V rtable] hostname\n"
190
	    "       tcpbench -s [-46Uuv] [-B buf] [-k kvars] [-p port] [-r interval]\n"
191
	    "                [-S space] [-T toskeyword] [-V rtable] [hostname]\n");
192
	exit(1);
193
}
194
195
static void
196
signal_handler(int sig, short event, void *bula)
197
{
198
	/*
199
	 * signal handler rules don't apply, libevent decouples for us
200
	 */
201
	switch (sig) {
202
	case SIGINT:
203
	case SIGTERM:
204
	case SIGHUP:
205
		warnx("Terminated by signal %d", sig);
206
		exit(0);
207
		break;		/* NOTREACHED */
208
	default:
209
		errx(1, "unexpected signal %d", sig);
210
		break;		/* NOTREACHED */
211
	}
212
}
213
214
static void
215
saddr_ntop(const struct sockaddr *addr, socklen_t alen, char *buf, size_t len)
216
{
217
	char hbuf[NI_MAXHOST], pbuf[NI_MAXSERV];
218
	int herr;
219
220
	if (addr->sa_family == AF_UNIX) {
221
		struct sockaddr_un *sun = (struct sockaddr_un *)addr;
222
		snprintf(buf, len, "%s", sun->sun_path);
223
		return;
224
	}
225
	if ((herr = getnameinfo(addr, alen, hbuf, sizeof(hbuf),
226
	    pbuf, sizeof(pbuf), NI_NUMERICHOST|NI_NUMERICSERV)) != 0) {
227
		if (herr == EAI_SYSTEM)
228
			err(1, "getnameinfo");
229
		else
230
			errx(1, "getnameinfo: %s", gai_strerror(herr));
231
	}
232
	snprintf(buf, len, "[%s]:%s", hbuf, pbuf);
233
}
234
235
static void
236
drop_gid(void)
237
{
238
	gid_t gid;
239
240
	gid = getgid();
241
	if (setresgid(gid, gid, gid) == -1)
242
		err(1, "setresgid");
243
}
244
245
static void
246
set_slice_timer(int on)
247
{
248
	struct timeval tv;
249
250
	if (ptb->rflag == 0)
251
		return;
252
253
	if (on) {
254
		if (evtimer_pending(&mainstats.timer, NULL))
255
			return;
256
		timerclear(&tv);
257
		/* XXX Is there a better way to do this ? */
258
		tv.tv_sec = ptb->rflag / 1000;
259
		tv.tv_usec = (ptb->rflag % 1000) * 1000;
260
261
		evtimer_add(&mainstats.timer, &tv);
262
	} else if (evtimer_pending(&mainstats.timer, NULL))
263
		evtimer_del(&mainstats.timer);
264
}
265
266
static int
267
clock_gettime_tv(clockid_t clock_id, struct timeval *tv)
268
{
269
	struct timespec ts;
270
271
	if (clock_gettime(clock_id, &ts) == -1)
272
		return (-1);
273
274
	TIMESPEC_TO_TIMEVAL(tv, &ts);
275
276
	return (0);
277
}
278
279
static void
280
print_tcp_header(void)
281
{
282
	char **kv;
283
284
	printf("%12s %14s %12s %8s ", "elapsed_ms", "bytes", "mbps",
285
	    "bwidth");
286
	for (kv = ptb->kvars;  ptb->kvars != NULL && *kv != NULL; kv++)
287
		printf("%s%s", kv != ptb->kvars ? "," : "", *kv);
288
	printf("\n");
289
}
290
291
static void
292
kget(u_long addr, void *buf, size_t size)
293
{
294
	if (kvm_read(ptb->kvmh, addr, buf, size) != (ssize_t)size)
295
		errx(1, "kvm_read: %s", kvm_geterr(ptb->kvmh));
296
}
297
298
static u_long
299
kfind_tcb(int sock)
300
{
301
	struct inpcbtable tcbtab;
302
	struct inpcb *next, *prev;
303
	struct inpcb inpcb, prevpcb;
304
	struct tcpcb tcpcb;
305
306
	struct sockaddr_storage me, them;
307
	socklen_t melen, themlen;
308
	struct sockaddr_in *in4;
309
	struct sockaddr_in6 *in6;
310
	char tmp1[64], tmp2[64];
311
	int nretry;
312
313
	nretry = 10;
314
	melen = themlen = sizeof(struct sockaddr_storage);
315
	if (getsockname(sock, (struct sockaddr *)&me, &melen) == -1)
316
		err(1, "getsockname");
317
	if (getpeername(sock, (struct sockaddr *)&them, &themlen) == -1)
318
		err(1, "getpeername");
319
	if (me.ss_family != them.ss_family)
320
		errx(1, "%s: me.ss_family != them.ss_family", __func__);
321
	if (me.ss_family != AF_INET && me.ss_family != AF_INET6)
322
		errx(1, "%s: unknown socket family", __func__);
323
	if (ptb->vflag >= 2) {
324
		saddr_ntop((struct sockaddr *)&me, me.ss_len,
325
		    tmp1, sizeof(tmp1));
326
		saddr_ntop((struct sockaddr *)&them, them.ss_len,
327
		    tmp2, sizeof(tmp2));
328
		fprintf(stderr, "Our socket local %s remote %s\n", tmp1, tmp2);
329
	}
330
	if (ptb->vflag >= 2)
331
		fprintf(stderr, "Using PCB table at %lu\n", ptb->ktcbtab);
332
retry:
333
	kget(ptb->ktcbtab, &tcbtab, sizeof(tcbtab));
334
	prev = NULL;
335
	next = TAILQ_FIRST(&tcbtab.inpt_queue);
336
337
	if (ptb->vflag >= 2)
338
		fprintf(stderr, "PCB start at %p\n", next);
339
	while (next != NULL) {
340
		if (ptb->vflag >= 2)
341
			fprintf(stderr, "Checking PCB %p\n", next);
342
		kget((u_long)next, &inpcb, sizeof(inpcb));
343
		if (prev != NULL) {
344
			kget((u_long)prev, &prevpcb, sizeof(prevpcb));
345
			if (TAILQ_NEXT(&prevpcb, inp_queue) != next) {
346
				if (nretry--) {
347
					warnx("PCB prev pointer insane");
348
					goto retry;
349
				} else
350
					errx(1, "PCB prev pointer insane,"
351
					    " all attempts exhaused");
352
			}
353
		}
354
		prev = next;
355
		next = TAILQ_NEXT(&inpcb, inp_queue);
356
357
		if (me.ss_family == AF_INET) {
358
			if ((inpcb.inp_flags & INP_IPV6) != 0) {
359
				if (ptb->vflag >= 2)
360
					fprintf(stderr, "Skip: INP_IPV6");
361
				continue;
362
			}
363
			if (ptb->vflag >= 2) {
364
				inet_ntop(AF_INET, &inpcb.inp_laddr,
365
				    tmp1, sizeof(tmp1));
366
				inet_ntop(AF_INET, &inpcb.inp_faddr,
367
				    tmp2, sizeof(tmp2));
368
				fprintf(stderr, "PCB %p local: [%s]:%d "
369
				    "remote: [%s]:%d\n", prev,
370
				    tmp1, inpcb.inp_lport,
371
				    tmp2, inpcb.inp_fport);
372
			}
373
			in4 = (struct sockaddr_in *)&me;
374
			if (memcmp(&in4->sin_addr, &inpcb.inp_laddr,
375
			    sizeof(struct in_addr)) != 0 ||
376
			    in4->sin_port != inpcb.inp_lport)
377
				continue;
378
			in4 = (struct sockaddr_in *)&them;
379
			if (memcmp(&in4->sin_addr, &inpcb.inp_faddr,
380
			    sizeof(struct in_addr)) != 0 ||
381
			    in4->sin_port != inpcb.inp_fport)
382
				continue;
383
		} else {
384
			if ((inpcb.inp_flags & INP_IPV6) == 0)
385
				continue;
386
			if (ptb->vflag >= 2) {
387
				inet_ntop(AF_INET6, &inpcb.inp_laddr6,
388
				    tmp1, sizeof(tmp1));
389
				inet_ntop(AF_INET6, &inpcb.inp_faddr6,
390
				    tmp2, sizeof(tmp2));
391
				fprintf(stderr, "PCB %p local: [%s]:%d "
392
				    "remote: [%s]:%d\n", prev,
393
				    tmp1, inpcb.inp_lport,
394
				    tmp2, inpcb.inp_fport);
395
			}
396
			in6 = (struct sockaddr_in6 *)&me;
397
			if (memcmp(&in6->sin6_addr, &inpcb.inp_laddr6,
398
			    sizeof(struct in6_addr)) != 0 ||
399
			    in6->sin6_port != inpcb.inp_lport)
400
				continue;
401
			in6 = (struct sockaddr_in6 *)&them;
402
			if (memcmp(&in6->sin6_addr, &inpcb.inp_faddr6,
403
			    sizeof(struct in6_addr)) != 0 ||
404
			    in6->sin6_port != inpcb.inp_fport)
405
				continue;
406
		}
407
		kget((u_long)inpcb.inp_ppcb, &tcpcb, sizeof(tcpcb));
408
		if (tcpcb.t_state != TCPS_ESTABLISHED) {
409
			if (ptb->vflag >= 2)
410
				fprintf(stderr, "Not established\n");
411
			continue;
412
		}
413
		if (ptb->vflag >= 2)
414
			fprintf(stderr, "Found PCB at %p\n", prev);
415
		return ((u_long)prev);
416
	}
417
418
	errx(1, "No matching PCB found");
419
}
420
421
static void
422
kupdate_stats(u_long tcbaddr, struct inpcb *inpcb,
423
    struct tcpcb *tcpcb, struct socket *sockb)
424
{
425
	kget(tcbaddr, inpcb, sizeof(*inpcb));
426
	kget((u_long)inpcb->inp_ppcb, tcpcb, sizeof(*tcpcb));
427
	kget((u_long)inpcb->inp_socket, sockb, sizeof(*sockb));
428
}
429
430
static void
431
check_kvar(const char *var)
432
{
433
	u_int i;
434
435
	for (i = 0; allowed_kvars[i] != NULL; i++)
436
		if (strcmp(allowed_kvars[i], var) == 0)
437
			return;
438
	errx(1, "Unrecognised kvar: %s", var);
439
}
440
441
static void
442
list_kvars(void)
443
{
444
	u_int i;
445
446
	printf("Supported kernel variables:\n");
447
	for (i = 0; allowed_kvars[i] != NULL; i++)
448
		printf("\t%s\n", allowed_kvars[i]);
449
}
450
451
static char **
452
check_prepare_kvars(char *list)
453
{
454
	char *item, **ret = NULL;
455
	u_int n = 0;
456
457
	while ((item = strsep(&list, ", \t\n")) != NULL) {
458
		check_kvar(item);
459
		if ((ret = reallocarray(ret, (++n + 1), sizeof(*ret))) == NULL)
460
			errx(1, "reallocarray(kvars)");
461
		if ((ret[n - 1] = strdup(item)) == NULL)
462
			errx(1, "strdup");
463
		ret[n] = NULL;
464
	}
465
	return (ret);
466
}
467
468
static void
469
stats_prepare(struct statctx *sc)
470
{
471
	sc->buf = ptb->dummybuf;
472
	sc->buflen = ptb->dummybuf_len;
473
474
	if (ptb->kvars)
475
		sc->tcp_tcbaddr = kfind_tcb(sc->fd);
476
	if (clock_gettime_tv(CLOCK_MONOTONIC, &sc->t_start) == -1)
477
		err(1, "clock_gettime_tv");
478
	sc->t_last = sc->t_start;
479
480
}
481
482
static void
483
tcp_stats_display(unsigned long long total_elapsed, long double mbps,
484
    float bwperc, struct statctx *sc, struct inpcb *inpcb,
485
    struct tcpcb *tcpcb, struct socket *sockb)
486
{
487
	int j;
488
489
	printf("%12llu %14llu %12.3Lf %7.2f%% ", total_elapsed, sc->bytes,
490
	    mbps, bwperc);
491
492
	if (ptb->kvars != NULL) {
493
		kupdate_stats(sc->tcp_tcbaddr, inpcb, tcpcb,
494
		    sockb);
495
496
		for (j = 0; ptb->kvars[j] != NULL; j++) {
497
#define S(a) #a
498
#define P(b, v, f)							\
499
			if (strcmp(ptb->kvars[j], S(b.v)) == 0) {	\
500
				printf("%s"f, j > 0 ? "," : "", b->v);	\
501
				continue;				\
502
			}
503
			P(inpcb, inp_flags, "0x%08x")
504
			P(sockb, so_rcv.sb_cc, "%lu")
505
			P(sockb, so_rcv.sb_hiwat, "%lu")
506
			P(sockb, so_rcv.sb_wat, "%lu")
507
			P(sockb, so_snd.sb_cc, "%lu")
508
			P(sockb, so_snd.sb_hiwat, "%lu")
509
			P(sockb, so_snd.sb_wat, "%lu")
510
			P(tcpcb, last_ack_sent, "%u")
511
			P(tcpcb, max_sndwnd, "%lu")
512
			P(tcpcb, rcv_adv, "%u")
513
			P(tcpcb, rcv_nxt, "%u")
514
			P(tcpcb, rcv_scale, "%u")
515
			P(tcpcb, rcv_wnd, "%lu")
516
			P(tcpcb, rfbuf_cnt, "%u")
517
			P(tcpcb, rfbuf_ts, "%u")
518
			P(tcpcb, snd_cwnd, "%lu")
519
			P(tcpcb, snd_max, "%u")
520
			P(tcpcb, snd_nxt, "%u")
521
			P(tcpcb, snd_scale, "%u")
522
			P(tcpcb, snd_ssthresh, "%lu")
523
			P(tcpcb, snd_una, "%u")
524
			P(tcpcb, snd_wl1, "%u")
525
			P(tcpcb, snd_wl2, "%u")
526
			P(tcpcb, snd_wnd, "%lu")
527
			P(tcpcb, t_rcvtime, "%u")
528
			P(tcpcb, t_rtseq, "%u")
529
			P(tcpcb, t_rttmin, "%hu")
530
			P(tcpcb, t_rtttime, "%u")
531
			P(tcpcb, t_rttvar, "%hu")
532
			P(tcpcb, t_srtt, "%hu")
533
			P(tcpcb, ts_recent, "%u")
534
			P(tcpcb, ts_recent_age, "%u")
535
#undef S
536
#undef P
537
		}
538
	}
539
	printf("\n");
540
}
541
542
static void
543
tcp_process_slice(int fd, short event, void *bula)
544
{
545
	unsigned long long total_elapsed, since_last;
546
	long double mbps, slice_mbps = 0;
547
	float bwperc;
548
	struct statctx *sc;
549
	struct timeval t_cur, t_diff;
550
	struct inpcb inpcb;
551
	struct tcpcb tcpcb;
552
	struct socket sockb;
553
554
	TAILQ_FOREACH(sc, &sc_queue, entry) {
555
		if (clock_gettime_tv(CLOCK_MONOTONIC, &t_cur) == -1)
556
			err(1, "clock_gettime_tv");
557
		if (ptb->kvars != NULL) /* process kernel stats */
558
			kupdate_stats(sc->tcp_tcbaddr, &inpcb, &tcpcb,
559
			    &sockb);
560
561
		timersub(&t_cur, &sc->t_start, &t_diff);
562
		total_elapsed = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000;
563
		timersub(&t_cur, &sc->t_last, &t_diff);
564
		since_last = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000;
565
		bwperc = (sc->bytes * 100.0) / mainstats.slice_bytes;
566
		mbps = (sc->bytes * 8) / (since_last * 1000.0);
567
		slice_mbps += mbps;
568
569
		tcp_stats_display(total_elapsed, mbps, bwperc, sc,
570
		    &inpcb, &tcpcb, &sockb);
571
572
		sc->t_last = t_cur;
573
		sc->bytes = 0;
574
	}
575
576
	/* process stats for this slice */
577
	if (slice_mbps > mainstats.peak_mbps)
578
		mainstats.peak_mbps = slice_mbps;
579
	printf("Conn: %3d Mbps: %12.3Lf Peak Mbps: %12.3Lf Avg Mbps: %12.3Lf\n",
580
	    mainstats.nconns, slice_mbps, mainstats.peak_mbps,
581
	    mainstats.nconns ? slice_mbps / mainstats.nconns : 0);
582
	mainstats.slice_bytes = 0;
583
584
	set_slice_timer(mainstats.nconns > 0);
585
}
586
587
static void
588
udp_process_slice(int fd, short event, void *v_sc)
589
{
590
	struct statctx *sc = v_sc;
591
	unsigned long long total_elapsed, since_last, pps;
592
	long double slice_mbps;
593
	struct timeval t_cur, t_diff;
594
595
	if (clock_gettime_tv(CLOCK_MONOTONIC, &t_cur) == -1)
596
		err(1, "clock_gettime_tv");
597
	/* Calculate pps */
598
	timersub(&t_cur, &sc->t_start, &t_diff);
599
	total_elapsed = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000;
600
	timersub(&t_cur, &sc->t_last, &t_diff);
601
	since_last = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000;
602
	slice_mbps = (sc->bytes * 8) / (since_last * 1000.0);
603
	pps = (sc->udp_slice_pkts * 1000) / since_last;
604
	if (slice_mbps > mainstats.peak_mbps)
605
		mainstats.peak_mbps = slice_mbps;
606
	printf("Elapsed: %11llu Mbps: %11.3Lf Peak Mbps: %11.3Lf %s PPS: %7llu\n",
607
	    total_elapsed, slice_mbps, mainstats.peak_mbps,
608
	    ptb->sflag ? "Rx" : "Tx", pps);
609
610
	/* Clean up this slice time */
611
	sc->t_last = t_cur;
612
	sc->bytes = 0;
613
	sc->udp_slice_pkts = 0;
614
	set_slice_timer(1);
615
}
616
617
static void
618
udp_server_handle_sc(int fd, short event, void *v_sc)
619
{
620
	ssize_t n;
621
	struct statctx *sc = v_sc;
622
623
	n = read(fd, ptb->dummybuf, ptb->dummybuf_len);
624
	if (n == 0)
625
		return;
626
	else if (n == -1) {
627
		if (errno != EINTR && errno != EWOULDBLOCK)
628
			warn("fd %d read error", fd);
629
		return;
630
	}
631
632
	if (ptb->vflag >= 3)
633
		fprintf(stderr, "read: %zd bytes\n", n);
634
	/* If this was our first packet, start slice timer */
635
	if (mainstats.peak_mbps == 0)
636
		set_slice_timer(1);
637
	/* Account packet */
638
	sc->udp_slice_pkts++;
639
	sc->bytes += n;
640
}
641
642
static void
643
tcp_server_handle_sc(int fd, short event, void *v_sc)
644
{
645
	struct statctx *sc = v_sc;
646
	ssize_t n;
647
648
	n = read(sc->fd, sc->buf, sc->buflen);
649
	if (n == -1) {
650
		if (errno != EINTR && errno != EWOULDBLOCK)
651
			warn("fd %d read error", sc->fd);
652
		return;
653
	} else if (n == 0) {
654
		if (ptb->vflag)
655
			fprintf(stderr, "%8d closed by remote end\n", sc->fd);
656
657
		TAILQ_REMOVE(&sc_queue, sc, entry);
658
659
		event_del(&sc->ev);
660
		close(sc->fd);
661
662
		/* Some file descriptors are available again. */
663
		if (evtimer_pending(&sc->tcp_ts->evt, NULL)) {
664
			evtimer_del(&sc->tcp_ts->evt);
665
			event_add(&sc->tcp_ts->ev, NULL);
666
		}
667
668
		free(sc);
669
		mainstats.nconns--;
670
		return;
671
	}
672
	if (ptb->vflag >= 3)
673
		fprintf(stderr, "read: %zd bytes\n", n);
674
	sc->bytes += n;
675
	mainstats.slice_bytes += n;
676
}
677
678
static void
679
tcp_server_accept(int fd, short event, void *arg)
680
{
681
	struct tcpservsock *ts = arg;
682
	int sock;
683
	struct statctx *sc;
684
	struct sockaddr_storage ss;
685
	socklen_t sslen;
686
	char tmp[128];
687
688
	sslen = sizeof(ss);
689
690
	event_add(&ts->ev, NULL);
691
	if (event & EV_TIMEOUT)
692
		return;
693
	if ((sock = accept4(fd, (struct sockaddr *)&ss, &sslen, SOCK_NONBLOCK))
694
	    == -1) {
695
		/*
696
		 * Pause accept if we are out of file descriptors, or
697
		 * libevent will haunt us here too.
698
		 */
699
		if (errno == ENFILE || errno == EMFILE) {
700
			struct timeval evtpause = { 1, 0 };
701
702
			event_del(&ts->ev);
703
			evtimer_add(&ts->evt, &evtpause);
704
		} else if (errno != EWOULDBLOCK && errno != EINTR &&
705
		    errno != ECONNABORTED)
706
			warn("accept");
707
		return;
708
	}
709
	saddr_ntop((struct sockaddr *)&ss, sslen,
710
	    tmp, sizeof(tmp));
711
	if (ptb->Tflag != -1 && ss.ss_family == AF_INET) {
712
		if (setsockopt(sock, IPPROTO_IP, IP_TOS,
713
		    &ptb->Tflag, sizeof(ptb->Tflag)))
714
			err(1, "setsockopt IP_TOS");
715
	}
716
	if (ptb->Tflag != -1 && ss.ss_family == AF_INET6) {
717
		if (setsockopt(sock, IPPROTO_IPV6, IPV6_TCLASS,
718
		    &ptb->Tflag, sizeof(ptb->Tflag)))
719
			err(1, "setsockopt IPV6_TCLASS");
720
	}
721
	/* Alloc client structure and register reading callback */
722
	if ((sc = calloc(1, sizeof(*sc))) == NULL)
723
		err(1, "calloc");
724
	sc->tcp_ts = ts;
725
	sc->fd = sock;
726
	stats_prepare(sc);
727
	event_set(&sc->ev, sc->fd, EV_READ | EV_PERSIST,
728
	    tcp_server_handle_sc, sc);
729
	event_add(&sc->ev, NULL);
730
	TAILQ_INSERT_TAIL(&sc_queue, sc, entry);
731
	mainstats.nconns++;
732
	if (mainstats.nconns == 1)
733
		set_slice_timer(1);
734
	if (ptb->vflag)
735
		fprintf(stderr, "Accepted connection from %s, fd = %d\n",
736
		    tmp, sc->fd);
737
}
738
739
static void
740
server_init(struct addrinfo *aitop, struct statctx *udp_sc)
741
{
742
	char tmp[128];
743
	int sock, on = 1;
744
	struct addrinfo *ai;
745
	struct event *ev;
746
	struct tcpservsock *ts;
747
	nfds_t lnfds;
748
749
	lnfds = 0;
750
	for (ai = aitop; ai != NULL; ai = ai->ai_next) {
751
		saddr_ntop(ai->ai_addr, ai->ai_addrlen, tmp, sizeof(tmp));
752
		if (ptb->vflag)
753
			fprintf(stderr, "Try to bind to %s\n", tmp);
754
		if ((sock = socket(ai->ai_family, ai->ai_socktype,
755
		    ai->ai_protocol)) == -1) {
756
			if (ai->ai_next == NULL)
757
				err(1, "socket");
758
			if (ptb->vflag)
759
				warn("socket");
760
			continue;
761
		}
762
		if (ptb->Tflag != -1 && ai->ai_family == AF_INET) {
763
			if (setsockopt(sock, IPPROTO_IP, IP_TOS,
764
			    &ptb->Tflag, sizeof(ptb->Tflag)))
765
				err(1, "setsockopt IP_TOS");
766
		}
767
		if (ptb->Tflag != -1 && ai->ai_family == AF_INET6) {
768
			if (setsockopt(sock, IPPROTO_IPV6, IPV6_TCLASS,
769
			    &ptb->Tflag, sizeof(ptb->Tflag)))
770
				err(1, "setsockopt IPV6_TCLASS");
771
		}
772
		if (setsockopt(sock, SOL_SOCKET, SO_REUSEADDR,
773
		    &on, sizeof(on)) == -1)
774
			warn("reuse port");
775
		if (bind(sock, ai->ai_addr, ai->ai_addrlen) != 0) {
776
			if (ai->ai_next == NULL)
777
				err(1, "bind");
778
			if (ptb->vflag)
779
				warn("bind");
780
			close(sock);
781
			continue;
782
		}
783
		if (ptb->Sflag) {
784
			if (setsockopt(sock, SOL_SOCKET, SO_RCVBUF,
785
			    &ptb->Sflag, sizeof(ptb->Sflag)) == -1)
786
				warn("set receive buffer size");
787
		}
788
		if (TCP_MODE) {
789
			if (listen(sock, 64) == -1) {
790
				if (ai->ai_next == NULL)
791
					err(1, "listen");
792
				if (ptb->vflag)
793
					warn("listen");
794
				close(sock);
795
				continue;
796
			}
797
		}
798
		if (UDP_MODE) {
799
			if ((ev = calloc(1, sizeof(*ev))) == NULL)
800
				err(1, "calloc");
801
			event_set(ev, sock, EV_READ | EV_PERSIST,
802
			    udp_server_handle_sc, udp_sc);
803
			event_add(ev, NULL);
804
		} else {
805
			if ((ts = calloc(1, sizeof(*ts))) == NULL)
806
				err(1, "calloc");
807
808
			ts->fd = sock;
809
			evtimer_set(&ts->evt, tcp_server_accept, ts);
810
			event_set(&ts->ev, ts->fd, EV_READ,
811
			    tcp_server_accept, ts);
812
			event_add(&ts->ev, NULL);
813
		}
814
		if (ptb->vflag >= 3)
815
			fprintf(stderr, "bound to fd %d\n", sock);
816
		lnfds++;
817
	}
818
	if (!ptb->Uflag)
819
		freeaddrinfo(aitop);
820
	if (lnfds == 0)
821
		errx(1, "No working listen addresses found");
822
}
823
824
static void
825
client_handle_sc(int fd, short event, void *v_sc)
826
{
827
	struct statctx *sc = v_sc;
828
	ssize_t n;
829
	size_t blen = sc->buflen;
830
831
	if (ptb->Rflag)
832
		blen = arc4random_uniform(blen) + 1;
833
	if ((n = write(sc->fd, sc->buf, blen)) == -1) {
834
		if (errno == EINTR || errno == EWOULDBLOCK ||
835
		    (UDP_MODE && errno == ENOBUFS))
836
			return;
837
		err(1, "write");
838
	}
839
	if (TCP_MODE && n == 0) {
840
		fprintf(stderr, "Remote end closed connection");
841
		exit(1);
842
	}
843
	if (ptb->vflag >= 3)
844
		fprintf(stderr, "write: %zd bytes\n", n);
845
	sc->bytes += n;
846
	mainstats.slice_bytes += n;
847
	if (UDP_MODE)
848
		sc->udp_slice_pkts++;
849
}
850
851
static void
852
client_init(struct addrinfo *aitop, int nconn, struct statctx *udp_sc,
853
    struct addrinfo *aib)
854
{
855
	struct statctx *sc;
856
	struct addrinfo *ai;
857
	char tmp[128];
858
	int i, r, sock;
859
860
	sc = udp_sc;
861
	for (i = 0; i < nconn; i++) {
862
		for (sock = -1, ai = aitop; ai != NULL; ai = ai->ai_next) {
863
			saddr_ntop(ai->ai_addr, ai->ai_addrlen, tmp,
864
			    sizeof(tmp));
865
			if (ptb->vflag && i == 0)
866
				fprintf(stderr, "Trying %s\n", tmp);
867
			if ((sock = socket(ai->ai_family, ai->ai_socktype,
868
			    ai->ai_protocol)) == -1) {
869
				if (ai->ai_next == NULL)
870
					err(1, "socket");
871
				if (ptb->vflag)
872
					warn("socket");
873
				continue;
874
			}
875
			if (aib != NULL) {
876
				saddr_ntop(aib->ai_addr, aib->ai_addrlen,
877
				    tmp, sizeof(tmp));
878
				if (ptb->vflag)
879
					fprintf(stderr,
880
					    "Try to bind to %s\n", tmp);
881
				if (bind(sock, (struct sockaddr *)aib->ai_addr,
882
				    aib->ai_addrlen) == -1)
883
					err(1, "bind");
884
			}
885
			if (ptb->Tflag != -1 && ai->ai_family == AF_INET) {
886
				if (setsockopt(sock, IPPROTO_IP, IP_TOS,
887
				    &ptb->Tflag, sizeof(ptb->Tflag)))
888
					err(1, "setsockopt IP_TOS");
889
			}
890
			if (ptb->Tflag != -1 && ai->ai_family == AF_INET6) {
891
				if (setsockopt(sock, IPPROTO_IPV6, IPV6_TCLASS,
892
				    &ptb->Tflag, sizeof(ptb->Tflag)))
893
					err(1, "setsockopt IPV6_TCLASS");
894
			}
895
			if (ptb->Sflag) {
896
				if (setsockopt(sock, SOL_SOCKET, SO_SNDBUF,
897
				    &ptb->Sflag, sizeof(ptb->Sflag)) == -1)
898
					warn("set TCP send buffer size");
899
			}
900
			if (connect(sock, ai->ai_addr, ai->ai_addrlen) != 0) {
901
				if (ai->ai_next == NULL)
902
					err(1, "connect");
903
				if (ptb->vflag)
904
					warn("connect");
905
				close(sock);
906
				sock = -1;
907
				continue;
908
			}
909
			break;
910
		}
911
		if (sock == -1)
912
			errx(1, "No host found");
913
		if ((r = fcntl(sock, F_GETFL)) == -1)
914
			err(1, "fcntl(F_GETFL)");
915
		r |= O_NONBLOCK;
916
		if (fcntl(sock, F_SETFL, r) == -1)
917
			err(1, "fcntl(F_SETFL, O_NONBLOCK)");
918
		/* Alloc and prepare stats */
919
		if (TCP_MODE) {
920
			if ((sc = calloc(1, sizeof(*sc))) == NULL)
921
				err(1, "calloc");
922
		}
923
		sc->fd = sock;
924
		stats_prepare(sc);
925
		event_set(&sc->ev, sc->fd, EV_WRITE | EV_PERSIST,
926
		    client_handle_sc, sc);
927
		event_add(&sc->ev, NULL);
928
		TAILQ_INSERT_TAIL(&sc_queue, sc, entry);
929
		mainstats.nconns++;
930
		if (mainstats.nconns == 1)
931
			set_slice_timer(1);
932
	}
933
	if (!ptb->Uflag)
934
		freeaddrinfo(aitop);
935
	if (aib != NULL)
936
		freeaddrinfo(aib);
937
938
	if (ptb->vflag && nconn > 1)
939
		fprintf(stderr, "%d connections established\n",
940
		    mainstats.nconns);
941
}
942
943
static int
944
map_tos(char *s, int *val)
945
{
946
	/* DiffServ Codepoints and other TOS mappings */
947
	const struct toskeywords {
948
		const char	*keyword;
949
		int		 val;
950
	} *t, toskeywords[] = {
951
		{ "af11",		IPTOS_DSCP_AF11 },
952
		{ "af12",		IPTOS_DSCP_AF12 },
953
		{ "af13",		IPTOS_DSCP_AF13 },
954
		{ "af21",		IPTOS_DSCP_AF21 },
955
		{ "af22",		IPTOS_DSCP_AF22 },
956
		{ "af23",		IPTOS_DSCP_AF23 },
957
		{ "af31",		IPTOS_DSCP_AF31 },
958
		{ "af32",		IPTOS_DSCP_AF32 },
959
		{ "af33",		IPTOS_DSCP_AF33 },
960
		{ "af41",		IPTOS_DSCP_AF41 },
961
		{ "af42",		IPTOS_DSCP_AF42 },
962
		{ "af43",		IPTOS_DSCP_AF43 },
963
		{ "critical",		IPTOS_PREC_CRITIC_ECP },
964
		{ "cs0",		IPTOS_DSCP_CS0 },
965
		{ "cs1",		IPTOS_DSCP_CS1 },
966
		{ "cs2",		IPTOS_DSCP_CS2 },
967
		{ "cs3",		IPTOS_DSCP_CS3 },
968
		{ "cs4",		IPTOS_DSCP_CS4 },
969
		{ "cs5",		IPTOS_DSCP_CS5 },
970
		{ "cs6",		IPTOS_DSCP_CS6 },
971
		{ "cs7",		IPTOS_DSCP_CS7 },
972
		{ "ef",			IPTOS_DSCP_EF },
973
		{ "inetcontrol",	IPTOS_PREC_INTERNETCONTROL },
974
		{ "lowdelay",		IPTOS_LOWDELAY },
975
		{ "netcontrol",		IPTOS_PREC_NETCONTROL },
976
		{ "reliability",	IPTOS_RELIABILITY },
977
		{ "throughput",		IPTOS_THROUGHPUT },
978
		{ NULL, 		-1 },
979
	};
980
981
	for (t = toskeywords; t->keyword != NULL; t++) {
982
		if (strcmp(s, t->keyword) == 0) {
983
			*val = t->val;
984
			return (1);
985
		}
986
	}
987
988
	return (0);
989
}
990
991
static void
992
quit(int sig, short event, void *arg)
993
{
994
	exit(0);
995
}
996
997
int
998
main(int argc, char **argv)
999
{
1000
	struct timeval tv;
1001
	unsigned int secs, rtable;
1002
1003
	char kerr[_POSIX2_LINE_MAX], *tmp;
1004
	struct addrinfo *aitop, *aib, hints;
1005
	const char *errstr;
1006
	struct rlimit rl;
1007
	int ch, herr, nconn;
1008
	int family = PF_UNSPEC;
1009
	struct nlist nl[] = { { "_tcbtable" }, { "" } };
1010
	const char *host = NULL, *port = DEFAULT_PORT, *srcbind = NULL;
1011
	struct event ev_sigint, ev_sigterm, ev_sighup, ev_progtimer;
1012
	struct statctx *udp_sc = NULL;
1013
	struct sockaddr_un sock_un;
1014
1015
	/* Init world */
1016
	setvbuf(stdout, NULL, _IOLBF, 0);
1017
	ptb = &tcpbench;
1018
	ptb->dummybuf_len = 0;
1019
	ptb->Sflag = ptb->sflag = ptb->vflag = ptb->Rflag = ptb->Uflag = 0;
1020
	ptb->kvmh  = NULL;
1021
	ptb->kvars = NULL;
1022
	ptb->rflag = DEFAULT_STATS_INTERVAL;
1023
	ptb->Tflag = -1;
1024
	nconn = 1;
1025
	aib = NULL;
1026
	secs = 0;
1027
1028
	while ((ch = getopt(argc, argv, "46b:B:hlk:n:p:Rr:sS:t:T:uUvV:")) != -1) {
1029
		switch (ch) {
1030
		case '4':
1031
			family = PF_INET;
1032
			break;
1033
		case '6':
1034
			family = PF_INET6;
1035
			break;
1036
		case 'b':
1037
			srcbind = optarg;
1038
			break;
1039
		case 'l':
1040
			list_kvars();
1041
			exit(0);
1042
		case 'k':
1043
			if ((tmp = strdup(optarg)) == NULL)
1044
				errx(1, "strdup");
1045
			ptb->kvars = check_prepare_kvars(tmp);
1046
			free(tmp);
1047
			break;
1048
		case 'R':
1049
			ptb->Rflag = 1;
1050
			break;
1051
		case 'r':
1052
			ptb->rflag = strtonum(optarg, 0, 60 * 60 * 24 * 1000,
1053
			    &errstr);
1054
			if (errstr != NULL)
1055
				errx(1, "statistics interval is %s: %s",
1056
				    errstr, optarg);
1057
			break;
1058
		case 'p':
1059
			port = optarg;
1060
			break;
1061
		case 's':
1062
			ptb->sflag = 1;
1063
			break;
1064
		case 'S':
1065
			ptb->Sflag = strtonum(optarg, 0, 1024*1024*1024,
1066
			    &errstr);
1067
			if (errstr != NULL)
1068
				errx(1, "receive space interval is %s: %s",
1069
				    errstr, optarg);
1070
			break;
1071
		case 'B':
1072
			ptb->dummybuf_len = strtonum(optarg, 0, 1024*1024*1024,
1073
			    &errstr);
1074
			if (errstr != NULL)
1075
				errx(1, "read/write buffer size is %s: %s",
1076
				    errstr, optarg);
1077
			break;
1078
		case 'v':
1079
			ptb->vflag++;
1080
			break;
1081
		case 'V':
1082
			rtable = (unsigned int)strtonum(optarg, 0,
1083
			    RT_TABLEID_MAX, &errstr);
1084
			if (errstr)
1085
				errx(1, "rtable value is %s: %s",
1086
				    errstr, optarg);
1087
			if (setrtable(rtable) == -1)
1088
				err(1, "setrtable");
1089
			break;
1090
		case 'n':
1091
			nconn = strtonum(optarg, 0, 65535, &errstr);
1092
			if (errstr != NULL)
1093
				errx(1, "number of connections is %s: %s",
1094
				    errstr, optarg);
1095
			break;
1096
		case 'u':
1097
			ptb->uflag = 1;
1098
			break;
1099
		case 'U':
1100
			ptb->Uflag = 1;
1101
			break;
1102
		case 'T':
1103
			if (map_tos(optarg, &ptb->Tflag))
1104
				break;
1105
			errstr = NULL;
1106
			if (strlen(optarg) > 1 && optarg[0] == '0' &&
1107
			    optarg[1] == 'x')
1108
				ptb->Tflag = (int)strtol(optarg, NULL, 16);
1109
			else
1110
				ptb->Tflag = (int)strtonum(optarg, 0, 255,
1111
				    &errstr);
1112
			if (ptb->Tflag == -1 || ptb->Tflag > 255 || errstr)
1113
				errx(1, "illegal tos value %s", optarg);
1114
			break;
1115
		case 't':
1116
			secs = strtonum(optarg, 1, UINT_MAX, &errstr);
1117
			if (errstr != NULL)
1118
				errx(1, "secs is %s: %s",
1119
				    errstr, optarg);
1120
			break;
1121
		case 'h':
1122
		default:
1123
			usage();
1124
		}
1125
	}
1126
1127
	if (pledge("stdio rpath dns inet unix id proc flock cpath wpath", NULL) == -1)
1128
		err(1, "pledge");
1129
1130
	argv += optind;
1131
	argc -= optind;
1132
	if ((argc != (ptb->sflag && !ptb->Uflag ? 0 : 1)) ||
1133
	    (UDP_MODE && (ptb->kvars || nconn != 1)))
1134
		usage();
1135
1136
	if (ptb->kvars) {
1137
		if ((ptb->kvmh = kvm_openfiles(NULL, NULL, NULL,
1138
		    O_RDONLY, kerr)) == NULL)
1139
			errx(1, "kvm_open: %s", kerr);
1140
		drop_gid();
1141
		if (kvm_nlist(ptb->kvmh, nl) < 0 || nl[0].n_type == 0)
1142
			errx(1, "kvm: no namelist");
1143
		ptb->ktcbtab = nl[0].n_value;
1144
	} else
1145
		drop_gid();
1146
1147
	if (pledge("stdio id dns inet unix flock rpath cpath wpath", NULL) == -1)
1148
		err(1, "pledge");
1149
1150
	if (!ptb->sflag || ptb->Uflag)
1151
		host = argv[0];
1152
	/*
1153
	 * Rationale,
1154
	 * If TCP, use a big buffer with big reads/writes.
1155
	 * If UDP, use a big buffer in server and a buffer the size of a
1156
	 * ethernet packet.
1157
	 */
1158
	if (!ptb->dummybuf_len) {
1159
		if (ptb->sflag || TCP_MODE)
1160
			ptb->dummybuf_len = DEFAULT_BUF;
1161
		else
1162
			ptb->dummybuf_len = DEFAULT_UDP_PKT;
1163
	}
1164
1165
	bzero(&hints, sizeof(hints));
1166
	hints.ai_family = family;
1167
	if (UDP_MODE) {
1168
		hints.ai_socktype = SOCK_DGRAM;
1169
		hints.ai_protocol = IPPROTO_UDP;
1170
	} else {
1171
		hints.ai_socktype = SOCK_STREAM;
1172
		hints.ai_protocol = IPPROTO_TCP;
1173
	}
1174
	if (ptb->Uflag) {
1175
		hints.ai_family = AF_UNIX;
1176
		hints.ai_protocol = 0;
1177
		sock_un.sun_family = AF_UNIX;
1178
		if (strlcpy(sock_un.sun_path, host, sizeof(sock_un.sun_path)) >=
1179
		    sizeof(sock_un.sun_path))
1180
			errx(1, "socket name '%s' too long", host);
1181
		hints.ai_addr = (struct sockaddr *)&sock_un;
1182
		hints.ai_addrlen = sizeof(sock_un);
1183
		aitop = &hints;
1184
	} else {
1185
		if (ptb->sflag)
1186
			hints.ai_flags = AI_PASSIVE;
1187
		if (srcbind != NULL) {
1188
			hints.ai_flags |= AI_NUMERICHOST;
1189
			herr = getaddrinfo(srcbind, NULL, &hints, &aib);
1190
			hints.ai_flags &= ~AI_NUMERICHOST;
1191
			if (herr != 0) {
1192
				if (herr == EAI_SYSTEM)
1193
					err(1, "getaddrinfo");
1194
				else
1195
					errx(1, "getaddrinfo: %s",
1196
					    gai_strerror(herr));
1197
			}
1198
		}
1199
		if ((herr = getaddrinfo(host, port, &hints, &aitop)) != 0) {
1200
			if (herr == EAI_SYSTEM)
1201
				err(1, "getaddrinfo");
1202
			else
1203
				errx(1, "getaddrinfo: %s", gai_strerror(herr));
1204
		}
1205
	}
1206
1207
	if (pledge("stdio id inet unix flock rpath cpath wpath", NULL) == -1)
1208
		err(1, "pledge");
1209
1210
	if (getrlimit(RLIMIT_NOFILE, &rl) == -1)
1211
		err(1, "getrlimit");
1212
	if (rl.rlim_cur < MAX_FD)
1213
		rl.rlim_cur = MAX_FD;
1214
	if (setrlimit(RLIMIT_NOFILE, &rl))
1215
		err(1, "setrlimit");
1216
	if (getrlimit(RLIMIT_NOFILE, &rl) == -1)
1217
		err(1, "getrlimit");
1218
1219
	if (pledge("stdio inet unix flock rpath cpath wpath", NULL) == -1)
1220
		err(1, "pledge");
1221
1222
	/* Init world */
1223
	TAILQ_INIT(&sc_queue);
1224
	if ((ptb->dummybuf = malloc(ptb->dummybuf_len)) == NULL)
1225
		err(1, "malloc");
1226
	arc4random_buf(ptb->dummybuf, ptb->dummybuf_len);
1227
1228
	/* Setup libevent and signals */
1229
	event_init();
1230
	signal_set(&ev_sigterm, SIGTERM, signal_handler, NULL);
1231
	signal_set(&ev_sighup, SIGHUP, signal_handler, NULL);
1232
	signal_set(&ev_sigint, SIGINT, signal_handler, NULL);
1233
	signal_add(&ev_sigint, NULL);
1234
	signal_add(&ev_sigterm, NULL);
1235
	signal_add(&ev_sighup, NULL);
1236
	signal(SIGPIPE, SIG_IGN);
1237
1238
	if (UDP_MODE) {
1239
		if ((udp_sc = calloc(1, sizeof(*udp_sc))) == NULL)
1240
			err(1, "calloc");
1241
		udp_sc->fd = -1;
1242
		stats_prepare(udp_sc);
1243
		evtimer_set(&mainstats.timer, udp_process_slice, udp_sc);
1244
	} else {
1245
		print_tcp_header();
1246
		evtimer_set(&mainstats.timer, tcp_process_slice, NULL);
1247
	}
1248
1249
	if (ptb->sflag)
1250
		server_init(aitop, udp_sc);
1251
	else {
1252
		if (secs > 0) {
1253
			timerclear(&tv);
1254
			tv.tv_sec = secs + 1;
1255
			evtimer_set(&ev_progtimer, quit, NULL);
1256
			evtimer_add(&ev_progtimer, &tv);
1257
		}
1258
		client_init(aitop, nconn, udp_sc, aib);
1259
1260
		if (pledge("stdio flock rpath cpath wpath", NULL) == -1)
1261
			err(1, "pledge");
1262
	}
1263
1264
	/* libevent main loop*/
1265
	event_dispatch();
1266
1267
	return (0);
1268
}