Annotation of src/usr.bin/tcpbench/tcpbench.c, Revision 1.27
1.1 djm 1: /*
2: * Copyright (c) 2008 Damien Miller <djm@mindrot.org>
1.20 claudio 3: * Copyright (c) 2011 Christiano F. Haesbaert <haesbaert@haesbaert.org>
1.1 djm 4: *
5: * Permission to use, copy, modify, and distribute this software for any
6: * purpose with or without fee is hereby granted, provided that the above
7: * copyright notice and this permission notice appear in all copies.
8: *
9: * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
10: * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
11: * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
12: * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
13: * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
14: * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
15: * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
16: */
17:
18: #include <sys/types.h>
19: #include <sys/time.h>
20: #include <sys/socket.h>
21: #include <sys/socketvar.h>
1.11 claudio 22: #include <sys/resource.h>
1.20 claudio 23: #include <sys/queue.h>
1.1 djm 24:
25: #include <net/route.h>
26:
27: #include <netinet/in.h>
28: #include <netinet/in_systm.h>
29: #include <netinet/ip.h>
30: #include <netinet/tcp.h>
31: #include <netinet/tcp_timer.h>
32: #include <netinet/tcp_fsm.h>
33: #include <netinet/in_pcb.h>
34: #include <netinet/tcp_var.h>
35:
36: #include <arpa/inet.h>
37:
38: #include <unistd.h>
39: #include <limits.h>
40: #include <stdlib.h>
41: #include <stdio.h>
42: #include <string.h>
43: #include <errno.h>
1.20 claudio 44: #include <event.h>
1.1 djm 45: #include <netdb.h>
46: #include <signal.h>
47: #include <err.h>
48: #include <fcntl.h>
49: #include <poll.h>
50:
51: #include <kvm.h>
52: #include <nlist.h>
53:
1.11 claudio 54: #define DEFAULT_PORT "12345"
55: #define DEFAULT_STATS_INTERVAL 1000 /* ms */
1.20 claudio 56: #define DEFAULT_BUF (256 * 1024)
57: #define DEFAULT_UDP_PKT (1500 - 28) /* TODO don't hardcode this */
58: #define TCP_MODE !ptb->uflag
59: #define UDP_MODE ptb->uflag
1.11 claudio 60: #define MAX_FD 1024
1.1 djm 61:
1.20 claudio 62: /* Our tcpbench globals */
63: struct {
64: u_int Vflag; /* rtableid */
65: int Sflag; /* Socket buffer size (tcp mode) */
66: u_int rflag; /* Report rate (ms) */
67: int sflag; /* True if server */
1.24 haesbaer 68: int Tflag; /* ToS if != -1 */
1.20 claudio 69: int vflag; /* Verbose */
70: int uflag; /* UDP mode */
71: kvm_t *kvmh; /* Kvm handler */
72: char **kvars; /* Kvm enabled vars */
73: u_long ktcbtab; /* Ktcb */
74: char *dummybuf; /* IO buffer */
75: size_t dummybuf_len; /* IO buffer len */
76: } tcpbench, *ptb;
1.1 djm 77:
1.20 claudio 78: /* stats for a single tcp connection, udp uses only one */
1.1 djm 79: struct statctx {
1.20 claudio 80: TAILQ_ENTRY(statctx) entry;
1.11 claudio 81: struct timeval t_start, t_last;
1.1 djm 82: unsigned long long bytes;
1.20 claudio 83: int fd;
84: char *buf;
85: size_t buflen;
86: struct event ev;
87: /* TCP only */
88: u_long tcp_tcbaddr;
89: /* UDP only */
90: u_long udp_slice_pkts;
1.1 djm 91: };
92:
1.20 claudio 93: static void signal_handler(int, short, void *);
94: static void saddr_ntop(const struct sockaddr *, socklen_t, char *, size_t);
95: static void drop_gid(void);
96: static void set_slice_timer(int);
97: static void print_tcp_header(void);
98: static void kget(u_long, void *, size_t);
99: static u_long kfind_tcb(int);
100: static void kupdate_stats(u_long, struct inpcb *, struct tcpcb *,
101: struct socket *);
102: static void list_kvars(void);
103: static void check_kvar(const char *);
104: static char ** check_prepare_kvars(char *);
105: static void stats_prepare(struct statctx *);
106: static void tcp_stats_display(unsigned long long, long double, float,
107: struct statctx *, struct inpcb *, struct tcpcb *, struct socket *);
108: static void tcp_process_slice(int, short, void *);
109: static void tcp_server_handle_sc(int, short, void *);
110: static void tcp_server_accept(int, short, void *);
111: static void server_init(struct addrinfo *, struct statctx *);
112: static void client_handle_sc(int, short, void *);
1.25 haesbaer 113: static void client_init(struct addrinfo *, int, struct statctx *,
114: struct addrinfo *);
1.20 claudio 115: static int clock_gettime_tv(clockid_t, struct timeval *);
116: static void udp_server_handle_sc(int, short, void *);
117: static void udp_process_slice(int, short, void *);
1.24 haesbaer 118: static int map_tos(char *, int *);
1.11 claudio 119: /*
120: * We account the mainstats here, that is the stats
121: * for all connections, all variables starting with slice
122: * are used to account information for the timeslice
123: * between each output. Peak variables record the highest
124: * between all slices so far.
125: */
126: static struct {
127: unsigned long long slice_bytes; /* bytes for last slice */
128: long double peak_mbps; /* peak mbps so far */
129: int nconns; /* connected clients */
1.20 claudio 130: struct event timer; /* process timer */
1.11 claudio 131: } mainstats;
132:
1.20 claudio 133: /* When adding variables, also add to tcp_stats_display() */
1.1 djm 134: static const char *allowed_kvars[] = {
135: "inpcb.inp_flags",
136: "sockb.so_rcv.sb_cc",
1.26 haesbaer 137: "sockb.so_rcv.sb_hiwat",
1.19 claudio 138: "sockb.so_rcv.sb_wat",
1.1 djm 139: "sockb.so_snd.sb_cc",
1.26 haesbaer 140: "sockb.so_snd.sb_hiwat",
1.19 claudio 141: "sockb.so_snd.sb_wat",
1.26 haesbaer 142: "tcpcb.last_ack_sent",
143: "tcpcb.max_sndwnd",
144: "tcpcb.rcv_adv",
145: "tcpcb.rcv_nxt",
146: "tcpcb.rcv_scale",
147: "tcpcb.rcv_wnd",
148: "tcpcb.rfbuf_cnt",
149: "tcpcb.rfbuf_ts",
150: "tcpcb.snd_cwnd",
151: "tcpcb.snd_max",
152: "tcpcb.snd_nxt",
153: "tcpcb.snd_scale",
154: "tcpcb.snd_ssthresh",
1.1 djm 155: "tcpcb.snd_una",
156: "tcpcb.snd_wl1",
157: "tcpcb.snd_wl2",
158: "tcpcb.snd_wnd",
159: "tcpcb.t_rcvtime",
1.26 haesbaer 160: "tcpcb.t_rtseq",
161: "tcpcb.t_rttmin",
1.1 djm 162: "tcpcb.t_rtttime",
1.26 haesbaer 163: "tcpcb.t_rttvar",
1.1 djm 164: "tcpcb.t_srtt",
1.26 haesbaer 165: "tcpcb.ts_recent",
1.19 claudio 166: "tcpcb.ts_recent_age",
1.1 djm 167: NULL
168: };
169:
1.20 claudio 170: TAILQ_HEAD(, statctx) sc_queue;
1.1 djm 171:
172: static void __dead
173: usage(void)
174: {
175: fprintf(stderr,
1.6 jmc 176: "usage: tcpbench -l\n"
1.25 haesbaer 177: " tcpbench [-uv] [-B buf] [-b addr] [-k kvars] [-n connections]\n"
178: " [-p port] [-r interval] [-S space] [-T toskeyword]\n"
179: " [-V rtable] hostname\n"
1.21 jmc 180: " tcpbench -s [-uv] [-B buf] [-k kvars] [-p port]\n"
1.24 haesbaer 181: " [-r interval] [-S space] [-T toskeyword] [-V rtable]\n");
1.1 djm 182: exit(1);
183: }
184:
185: static void
1.20 claudio 186: signal_handler(int sig, short event, void *bula)
187: {
188: /*
189: * signal handler rules don't apply, libevent decouples for us
190: */
191: switch (sig) {
192: case SIGINT:
193: case SIGTERM:
194: case SIGHUP:
195: warnx("Terminated by signal %d", sig);
196: exit(0);
197: break; /* NOTREACHED */
198: default:
199: errx(1, "unexpected signal %d", sig);
200: break; /* NOTREACHED */
201: }
202: }
203:
204: static void
1.1 djm 205: saddr_ntop(const struct sockaddr *addr, socklen_t alen, char *buf, size_t len)
206: {
207: char hbuf[NI_MAXHOST], pbuf[NI_MAXSERV];
208: int herr;
209:
1.3 djm 210: if ((herr = getnameinfo(addr, alen, hbuf, sizeof(hbuf),
211: pbuf, sizeof(pbuf), NI_NUMERICHOST|NI_NUMERICSERV)) != 0) {
1.1 djm 212: if (herr == EAI_SYSTEM)
213: err(1, "getnameinfo");
214: else
215: errx(1, "getnameinfo: %s", gai_strerror(herr));
216: }
217: snprintf(buf, len, "[%s]:%s", hbuf, pbuf);
218: }
219:
220: static void
1.20 claudio 221: drop_gid(void)
222: {
223: gid_t gid;
224:
225: gid = getgid();
226: if (setresgid(gid, gid, gid) == -1)
227: err(1, "setresgid");
228: }
229:
230: static void
231: set_slice_timer(int on)
1.11 claudio 232: {
1.20 claudio 233: struct timeval tv;
1.11 claudio 234:
1.20 claudio 235: if (ptb->rflag == 0)
1.11 claudio 236: return;
237:
1.20 claudio 238: if (on) {
239: if (evtimer_pending(&mainstats.timer, NULL))
240: return;
241: timerclear(&tv);
242: /* XXX Is there a better way to do this ? */
243: tv.tv_sec = ptb->rflag / 1000;
244: tv.tv_usec = (ptb->rflag % 1000) * 1000;
245:
246: evtimer_add(&mainstats.timer, &tv);
247: } else if (evtimer_pending(&mainstats.timer, NULL))
248: evtimer_del(&mainstats.timer);
249: }
1.11 claudio 250:
1.20 claudio 251: static int
252: clock_gettime_tv(clockid_t clock_id, struct timeval *tv)
253: {
254: struct timespec ts;
255:
256: if (clock_gettime(clock_id, &ts) == -1)
257: return (-1);
258:
259: TIMESPEC_TO_TIMEVAL(tv, &ts);
260:
261: return (0);
1.11 claudio 262: }
263:
264: static void
1.20 claudio 265: print_tcp_header(void)
1.11 claudio 266: {
267: char **kv;
1.20 claudio 268:
1.11 claudio 269: printf("%12s %14s %12s %8s ", "elapsed_ms", "bytes", "mbps",
270: "bwidth");
1.20 claudio 271: for (kv = ptb->kvars; ptb->kvars != NULL && *kv != NULL; kv++)
272: printf("%s%s", kv != ptb->kvars ? "," : "", *kv);
1.11 claudio 273: printf("\n");
274: }
275:
276: static void
1.20 claudio 277: kget(u_long addr, void *buf, size_t size)
1.1 djm 278: {
1.20 claudio 279: if (kvm_read(ptb->kvmh, addr, buf, size) != (ssize_t)size)
280: errx(1, "kvm_read: %s", kvm_geterr(ptb->kvmh));
1.1 djm 281: }
282:
283: static u_long
1.20 claudio 284: kfind_tcb(int sock)
1.1 djm 285: {
286: struct inpcbtable tcbtab;
287: struct inpcb *head, *next, *prev;
288: struct inpcb inpcb;
289: struct tcpcb tcpcb;
290:
291: struct sockaddr_storage me, them;
292: socklen_t melen, themlen;
293: struct sockaddr_in *in4;
294: struct sockaddr_in6 *in6;
295: char tmp1[64], tmp2[64];
1.11 claudio 296: int nretry;
1.1 djm 297:
1.11 claudio 298: nretry = 10;
1.1 djm 299: melen = themlen = sizeof(struct sockaddr_storage);
300: if (getsockname(sock, (struct sockaddr *)&me, &melen) == -1)
301: err(1, "getsockname");
302: if (getpeername(sock, (struct sockaddr *)&them, &themlen) == -1)
303: err(1, "getpeername");
304: if (me.ss_family != them.ss_family)
305: errx(1, "%s: me.ss_family != them.ss_family", __func__);
306: if (me.ss_family != AF_INET && me.ss_family != AF_INET6)
307: errx(1, "%s: unknown socket family", __func__);
1.20 claudio 308: if (ptb->vflag >= 2) {
1.1 djm 309: saddr_ntop((struct sockaddr *)&me, me.ss_len,
310: tmp1, sizeof(tmp1));
311: saddr_ntop((struct sockaddr *)&them, them.ss_len,
312: tmp2, sizeof(tmp2));
313: fprintf(stderr, "Our socket local %s remote %s\n", tmp1, tmp2);
314: }
1.20 claudio 315: if (ptb->vflag >= 2)
316: fprintf(stderr, "Using PCB table at %lu\n", ptb->ktcbtab);
1.11 claudio 317: retry:
1.20 claudio 318: kget(ptb->ktcbtab, &tcbtab, sizeof(tcbtab));
1.1 djm 319: prev = head = (struct inpcb *)&CIRCLEQ_FIRST(
1.20 claudio 320: &((struct inpcbtable *)ptb->ktcbtab)->inpt_queue);
1.1 djm 321: next = CIRCLEQ_FIRST(&tcbtab.inpt_queue);
322:
1.20 claudio 323: if (ptb->vflag >= 2)
1.1 djm 324: fprintf(stderr, "PCB head at %p\n", head);
325: while (next != head) {
1.20 claudio 326: if (ptb->vflag >= 2)
1.1 djm 327: fprintf(stderr, "Checking PCB %p\n", next);
1.20 claudio 328: kget((u_long)next, &inpcb, sizeof(inpcb));
1.11 claudio 329: if (CIRCLEQ_PREV(&inpcb, inp_queue) != prev) {
330: if (nretry--) {
331: warnx("pcb prev pointer insane");
332: goto retry;
333: }
334: else
335: errx(1, "pcb prev pointer insane,"
336: " all attempts exausted");
337: }
1.1 djm 338: prev = next;
339: next = CIRCLEQ_NEXT(&inpcb, inp_queue);
340:
341: if (me.ss_family == AF_INET) {
342: if ((inpcb.inp_flags & INP_IPV6) != 0) {
1.20 claudio 343: if (ptb->vflag >= 2)
1.1 djm 344: fprintf(stderr, "Skip: INP_IPV6");
345: continue;
346: }
1.20 claudio 347: if (ptb->vflag >= 2) {
1.1 djm 348: inet_ntop(AF_INET, &inpcb.inp_laddr,
349: tmp1, sizeof(tmp1));
350: inet_ntop(AF_INET, &inpcb.inp_faddr,
351: tmp2, sizeof(tmp2));
352: fprintf(stderr, "PCB %p local: [%s]:%d "
353: "remote: [%s]:%d\n", prev,
354: tmp1, inpcb.inp_lport,
355: tmp2, inpcb.inp_fport);
356: }
357: in4 = (struct sockaddr_in *)&me;
358: if (memcmp(&in4->sin_addr, &inpcb.inp_laddr,
359: sizeof(struct in_addr)) != 0 ||
360: in4->sin_port != inpcb.inp_lport)
361: continue;
362: in4 = (struct sockaddr_in *)&them;
363: if (memcmp(&in4->sin_addr, &inpcb.inp_faddr,
364: sizeof(struct in_addr)) != 0 ||
365: in4->sin_port != inpcb.inp_fport)
366: continue;
367: } else {
368: if ((inpcb.inp_flags & INP_IPV6) == 0)
369: continue;
1.20 claudio 370: if (ptb->vflag >= 2) {
1.1 djm 371: inet_ntop(AF_INET6, &inpcb.inp_laddr6,
372: tmp1, sizeof(tmp1));
373: inet_ntop(AF_INET6, &inpcb.inp_faddr6,
374: tmp2, sizeof(tmp2));
375: fprintf(stderr, "PCB %p local: [%s]:%d "
376: "remote: [%s]:%d\n", prev,
377: tmp1, inpcb.inp_lport,
378: tmp2, inpcb.inp_fport);
379: }
380: in6 = (struct sockaddr_in6 *)&me;
381: if (memcmp(&in6->sin6_addr, &inpcb.inp_laddr6,
382: sizeof(struct in6_addr)) != 0 ||
383: in6->sin6_port != inpcb.inp_lport)
384: continue;
385: in6 = (struct sockaddr_in6 *)&them;
386: if (memcmp(&in6->sin6_addr, &inpcb.inp_faddr6,
387: sizeof(struct in6_addr)) != 0 ||
388: in6->sin6_port != inpcb.inp_fport)
389: continue;
390: }
1.20 claudio 391: kget((u_long)inpcb.inp_ppcb, &tcpcb, sizeof(tcpcb));
1.1 djm 392: if (tcpcb.t_state != TCPS_ESTABLISHED) {
1.20 claudio 393: if (ptb->vflag >= 2)
1.1 djm 394: fprintf(stderr, "Not established\n");
395: continue;
396: }
1.20 claudio 397: if (ptb->vflag >= 2)
1.1 djm 398: fprintf(stderr, "Found PCB at %p\n", prev);
1.20 claudio 399: return ((u_long)prev);
1.1 djm 400: }
401:
402: errx(1, "No matching PCB found");
403: }
404:
405: static void
1.20 claudio 406: kupdate_stats(u_long tcbaddr, struct inpcb *inpcb,
407: struct tcpcb *tcpcb, struct socket *sockb)
1.1 djm 408: {
1.20 claudio 409: kget(tcbaddr, inpcb, sizeof(*inpcb));
410: kget((u_long)inpcb->inp_ppcb, tcpcb, sizeof(*tcpcb));
411: kget((u_long)inpcb->inp_socket, sockb, sizeof(*sockb));
1.1 djm 412: }
413:
414: static void
415: check_kvar(const char *var)
416: {
1.16 deraadt 417: u_int i;
1.1 djm 418:
419: for (i = 0; allowed_kvars[i] != NULL; i++)
420: if (strcmp(allowed_kvars[i], var) == 0)
421: return;
422: errx(1, "Unrecognised kvar: %s", var);
423: }
424:
425: static void
426: list_kvars(void)
427: {
1.16 deraadt 428: u_int i;
1.1 djm 429:
1.26 haesbaer 430: printf("Supported kernel variables:\n");
1.1 djm 431: for (i = 0; allowed_kvars[i] != NULL; i++)
1.26 haesbaer 432: printf("\t%s\n", allowed_kvars[i]);
1.1 djm 433: }
434:
435: static char **
436: check_prepare_kvars(char *list)
437: {
438: char *item, **ret = NULL;
1.16 deraadt 439: u_int n = 0;
1.1 djm 440:
441: while ((item = strsep(&list, ", \t\n")) != NULL) {
442: check_kvar(item);
443: if ((ret = realloc(ret, sizeof(*ret) * (++n + 1))) == NULL)
444: errx(1, "realloc(kvars)");
445: if ((ret[n - 1] = strdup(item)) == NULL)
446: errx(1, "strdup");
447: ret[n] = NULL;
448: }
1.20 claudio 449: return (ret);
1.1 djm 450: }
451:
452: static void
1.20 claudio 453: stats_prepare(struct statctx *sc)
1.1 djm 454: {
1.20 claudio 455: sc->buf = ptb->dummybuf;
456: sc->buflen = ptb->dummybuf_len;
457:
458: if (ptb->kvars)
459: sc->tcp_tcbaddr = kfind_tcb(sc->fd);
460: if (clock_gettime_tv(CLOCK_MONOTONIC, &sc->t_start) == -1)
461: err(1, "clock_gettime_tv");
1.1 djm 462: sc->t_last = sc->t_start;
463:
464: }
465:
466: static void
1.20 claudio 467: tcp_stats_display(unsigned long long total_elapsed, long double mbps,
1.11 claudio 468: float bwperc, struct statctx *sc, struct inpcb *inpcb,
469: struct tcpcb *tcpcb, struct socket *sockb)
470: {
471: int j;
472:
473: printf("%12llu %14llu %12.3Lf %7.2f%% ", total_elapsed, sc->bytes,
474: mbps, bwperc);
475:
1.20 claudio 476: if (ptb->kvars != NULL) {
477: kupdate_stats(sc->tcp_tcbaddr, inpcb, tcpcb,
1.11 claudio 478: sockb);
1.1 djm 479:
1.20 claudio 480: for (j = 0; ptb->kvars[j] != NULL; j++) {
1.11 claudio 481: #define S(a) #a
482: #define P(b, v, f) \
1.20 claudio 483: if (strcmp(ptb->kvars[j], S(b.v)) == 0) { \
1.11 claudio 484: printf("%s"f, j > 0 ? "," : "", b->v); \
485: continue; \
486: }
487: P(inpcb, inp_flags, "0x%08x")
488: P(sockb, so_rcv.sb_cc, "%lu")
1.26 haesbaer 489: P(sockb, so_rcv.sb_hiwat, "%lu")
1.19 claudio 490: P(sockb, so_rcv.sb_wat, "%lu")
1.11 claudio 491: P(sockb, so_snd.sb_cc, "%lu")
1.26 haesbaer 492: P(sockb, so_snd.sb_hiwat, "%lu")
1.19 claudio 493: P(sockb, so_snd.sb_wat, "%lu")
1.26 haesbaer 494: P(tcpcb, last_ack_sent, "%u")
495: P(tcpcb, max_sndwnd, "%lu")
496: P(tcpcb, rcv_adv, "%u")
497: P(tcpcb, rcv_nxt, "%u")
498: P(tcpcb, rcv_scale, "%u")
499: P(tcpcb, rcv_wnd, "%lu")
500: P(tcpcb, rfbuf_cnt, "%u")
501: P(tcpcb, rfbuf_ts, "%u")
502: P(tcpcb, snd_cwnd, "%lu")
503: P(tcpcb, snd_max, "%u")
504: P(tcpcb, snd_nxt, "%u")
505: P(tcpcb, snd_scale, "%u")
506: P(tcpcb, snd_ssthresh, "%lu")
1.11 claudio 507: P(tcpcb, snd_una, "%u")
508: P(tcpcb, snd_wl1, "%u")
509: P(tcpcb, snd_wl2, "%u")
510: P(tcpcb, snd_wnd, "%lu")
511: P(tcpcb, t_rcvtime, "%u")
1.26 haesbaer 512: P(tcpcb, t_rtseq, "%u")
513: P(tcpcb, t_rttmin, "%hu")
1.11 claudio 514: P(tcpcb, t_rtttime, "%u")
1.26 haesbaer 515: P(tcpcb, t_rttvar, "%hu")
1.11 claudio 516: P(tcpcb, t_srtt, "%hu")
1.26 haesbaer 517: P(tcpcb, ts_recent, "%u")
1.19 claudio 518: P(tcpcb, ts_recent_age, "%u")
1.11 claudio 519: #undef S
1.1 djm 520: #undef P
521: }
522: }
523: printf("\n");
524: }
525:
526: static void
1.20 claudio 527: tcp_process_slice(int fd, short event, void *bula)
1.1 djm 528: {
1.11 claudio 529: unsigned long long total_elapsed, since_last;
530: long double mbps, slice_mbps = 0;
531: float bwperc;
1.20 claudio 532: struct statctx *sc;
1.11 claudio 533: struct timeval t_cur, t_diff;
534: struct inpcb inpcb;
535: struct tcpcb tcpcb;
536: struct socket sockb;
537:
1.20 claudio 538: TAILQ_FOREACH(sc, &sc_queue, entry) {
539: if (clock_gettime_tv(CLOCK_MONOTONIC, &t_cur) == -1)
540: err(1, "clock_gettime_tv");
541: if (ptb->kvars != NULL) /* process kernel stats */
542: kupdate_stats(sc->tcp_tcbaddr, &inpcb, &tcpcb,
1.11 claudio 543: &sockb);
1.20 claudio 544:
1.11 claudio 545: timersub(&t_cur, &sc->t_start, &t_diff);
546: total_elapsed = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000;
547: timersub(&t_cur, &sc->t_last, &t_diff);
548: since_last = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000;
549: bwperc = (sc->bytes * 100.0) / mainstats.slice_bytes;
550: mbps = (sc->bytes * 8) / (since_last * 1000.0);
551: slice_mbps += mbps;
552:
1.20 claudio 553: tcp_stats_display(total_elapsed, mbps, bwperc, sc,
1.11 claudio 554: &inpcb, &tcpcb, &sockb);
555:
556: sc->t_last = t_cur;
557: sc->bytes = 0;
558: }
1.1 djm 559:
1.11 claudio 560: /* process stats for this slice */
561: if (slice_mbps > mainstats.peak_mbps)
562: mainstats.peak_mbps = slice_mbps;
1.20 claudio 563: printf("Conn: %3d Mbps: %12.3Lf Peak Mbps: %12.3Lf Avg Mbps: %12.3Lf\n",
564: mainstats.nconns, slice_mbps, mainstats.peak_mbps,
565: slice_mbps / mainstats.nconns);
566: mainstats.slice_bytes = 0;
567:
568: set_slice_timer(mainstats.nconns > 0);
569: }
570:
571: static void
572: udp_process_slice(int fd, short event, void *v_sc)
573: {
574: struct statctx *sc = v_sc;
575: unsigned long long total_elapsed, since_last;
576: long double slice_mbps, pps;
577: struct timeval t_cur, t_diff;
578:
579: if (clock_gettime_tv(CLOCK_MONOTONIC, &t_cur) == -1)
580: err(1, "clock_gettime_tv");
581: /* Calculate pps */
582: timersub(&t_cur, &sc->t_start, &t_diff);
583: total_elapsed = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000;
584: timersub(&t_cur, &sc->t_last, &t_diff);
585: since_last = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000;
586: slice_mbps = (sc->bytes * 8) / (since_last * 1000.0);
587: pps = (sc->udp_slice_pkts * 1000) / since_last;
588: if (slice_mbps > mainstats.peak_mbps)
589: mainstats.peak_mbps = slice_mbps;
590: printf("Elapsed: %11llu Mbps: %11.3Lf Peak Mbps: %11.3Lf %s PPS: %10.3Lf\n",
591: total_elapsed, slice_mbps, mainstats.peak_mbps,
592: ptb->sflag ? "Rx" : "Tx", pps);
593:
594: /* Clean up this slice time */
595: sc->t_last = t_cur;
596: sc->bytes = 0;
597: sc->udp_slice_pkts = 0;
598: set_slice_timer(1);
1.11 claudio 599: }
1.1 djm 600:
1.20 claudio 601: static void
602: udp_server_handle_sc(int fd, short event, void *v_sc)
1.11 claudio 603: {
604: ssize_t n;
1.20 claudio 605: struct statctx *sc = v_sc;
1.1 djm 606:
1.11 claudio 607: again:
1.20 claudio 608: n = read(fd, ptb->dummybuf, ptb->dummybuf_len);
609: if (n == 0)
610: return;
611: else if (n == -1) {
1.11 claudio 612: if (errno == EINTR)
613: goto again;
614: else if (errno == EWOULDBLOCK)
1.20 claudio 615: return;
1.11 claudio 616: warn("fd %d read error", fd);
1.20 claudio 617: return;
618: }
1.11 claudio 619:
1.20 claudio 620: if (ptb->vflag >= 3)
621: fprintf(stderr, "read: %zd bytes\n", n);
622: /* If this was our first packet, start slice timer */
623: if (mainstats.peak_mbps == 0)
624: set_slice_timer(1);
625: /* Account packet */
626: sc->udp_slice_pkts++;
627: sc->bytes += n;
628: }
629:
630: static void
631: tcp_server_handle_sc(int fd, short event, void *v_sc)
632: {
633: struct statctx *sc = v_sc;
634: ssize_t n;
635:
636: again:
637: n = read(sc->fd, sc->buf, sc->buflen);
638: if (n == -1) {
639: if (errno == EINTR)
640: goto again;
641: else if (errno == EWOULDBLOCK)
642: return;
643: warn("fd %d read error", sc->fd);
644: return;
645: } else if (n == 0) {
646: if (ptb->vflag)
647: fprintf(stderr, "%8d closed by remote end\n", sc->fd);
1.23 sthen 648: event_del(&sc->ev);
1.20 claudio 649: close(sc->fd);
650: TAILQ_REMOVE(&sc_queue, sc, entry);
651: free(sc);
652: mainstats.nconns--;
653: set_slice_timer(mainstats.nconns > 0);
654: return;
1.1 djm 655: }
1.20 claudio 656: if (ptb->vflag >= 3)
1.11 claudio 657: fprintf(stderr, "read: %zd bytes\n", n);
1.20 claudio 658: sc->bytes += n;
659: mainstats.slice_bytes += n;
660: }
1.11 claudio 661:
1.20 claudio 662: static void
663: tcp_server_accept(int fd, short event, void *bula)
664: {
665: int sock, r;
666: struct statctx *sc;
667: struct sockaddr_storage ss;
668: socklen_t sslen;
669: char tmp[128];
670:
671: sslen = sizeof(ss);
672: again:
673: if ((sock = accept(fd, (struct sockaddr *)&ss, &sslen)) == -1) {
674: if (errno == EINTR)
675: goto again;
676: warn("accept");
677: return;
678: }
679: saddr_ntop((struct sockaddr *)&ss, sslen,
680: tmp, sizeof(tmp));
681: if ((r = fcntl(sock, F_GETFL, 0)) == -1)
682: err(1, "fcntl(F_GETFL)");
683: r |= O_NONBLOCK;
684: if (fcntl(sock, F_SETFL, r) == -1)
685: err(1, "fcntl(F_SETFL, O_NONBLOCK)");
1.24 haesbaer 686: if (ptb->Tflag != -1 && ss.ss_family == AF_INET) {
687: if (setsockopt(sock, IPPROTO_IP, IP_TOS,
688: &ptb->Tflag, sizeof(ptb->Tflag)))
689: err(1, "setsockopt IP_TOS");
690: }
691: if (ptb->Tflag != -1 && ss.ss_family == AF_INET6) {
692: if (setsockopt(sock, IPPROTO_IPV6, IPV6_TCLASS,
693: &ptb->Tflag, sizeof(ptb->Tflag)))
694: err(1, "setsockopt IPV6_TCLASS");
695: }
1.20 claudio 696: /* Alloc client structure and register reading callback */
697: if ((sc = calloc(1, sizeof(*sc))) == NULL)
698: err(1, "calloc");
699: sc->fd = sock;
700: stats_prepare(sc);
701: event_set(&sc->ev, sc->fd, EV_READ | EV_PERSIST,
702: tcp_server_handle_sc, sc);
703: event_add(&sc->ev, NULL);
704: TAILQ_INSERT_TAIL(&sc_queue, sc, entry);
705: mainstats.nconns++;
706: set_slice_timer(mainstats.nconns > 0);
707: if (ptb->vflag)
708: warnx("Accepted connection from %s, fd = %d\n", tmp, sc->fd);
1.1 djm 709: }
710:
1.20 claudio 711: static void
712: server_init(struct addrinfo *aitop, struct statctx *udp_sc)
1.1 djm 713: {
714: char tmp[128];
1.11 claudio 715: int sock, on = 1;
1.1 djm 716: struct addrinfo *ai;
1.20 claudio 717: struct event *ev;
1.11 claudio 718: nfds_t lnfds;
1.1 djm 719:
1.20 claudio 720: if (setpgid(0, 0) == -1)
721: err(1, "setpgid");
722:
1.11 claudio 723: lnfds = 0;
1.1 djm 724: for (ai = aitop; ai != NULL; ai = ai->ai_next) {
725: saddr_ntop(ai->ai_addr, ai->ai_addrlen, tmp, sizeof(tmp));
1.20 claudio 726: if (ptb->vflag)
727: fprintf(stderr, "Try to bind to %s\n", tmp);
1.1 djm 728: if ((sock = socket(ai->ai_family, ai->ai_socktype,
729: ai->ai_protocol)) == -1) {
730: if (ai->ai_next == NULL)
731: err(1, "socket");
1.20 claudio 732: if (ptb->vflag)
1.1 djm 733: warn("socket");
734: continue;
735: }
1.22 mikeb 736: if (ptb->Vflag) {
737: if (setsockopt(sock, SOL_SOCKET, SO_RTABLE,
738: &ptb->Vflag, sizeof(ptb->Vflag)) == -1) {
739: if (errno == ENOPROTOOPT)
740: warn("set rtable");
741: else
742: err(1, "setsockopt SO_RTABLE");
743: }
744: }
1.24 haesbaer 745: if (ptb->Tflag != -1 && ai->ai_family == AF_INET) {
746: if (setsockopt(sock, IPPROTO_IP, IP_TOS,
747: &ptb->Tflag, sizeof(ptb->Tflag)))
748: err(1, "setsockopt IP_TOS");
749: }
750: if (ptb->Tflag != -1 && ai->ai_family == AF_INET6) {
751: if (setsockopt(sock, IPPROTO_IPV6, IPV6_TCLASS,
752: &ptb->Tflag, sizeof(ptb->Tflag)))
753: err(1, "setsockopt IPV6_TCLASS");
754: }
1.1 djm 755: if (setsockopt(sock, SOL_SOCKET, SO_REUSEADDR,
756: &on, sizeof(on)) == -1)
757: warn("reuse port");
758: if (bind(sock, ai->ai_addr, ai->ai_addrlen) != 0) {
759: if (ai->ai_next == NULL)
760: err(1, "bind");
1.20 claudio 761: if (ptb->vflag)
1.1 djm 762: warn("bind");
763: close(sock);
764: continue;
765: }
1.20 claudio 766: if (ptb->Sflag) {
1.1 djm 767: if (setsockopt(sock, SOL_SOCKET, SO_RCVBUF,
1.20 claudio 768: &ptb->Sflag, sizeof(ptb->Sflag)) == -1)
769: warn("set receive buffer size");
1.1 djm 770: }
1.20 claudio 771: if (TCP_MODE) {
772: if (listen(sock, 64) == -1) {
773: if (ai->ai_next == NULL)
774: err(1, "listen");
775: if (ptb->vflag)
776: warn("listen");
777: close(sock);
778: continue;
779: }
1.1 djm 780: }
1.20 claudio 781: if ((ev = calloc(1, sizeof(*ev))) == NULL)
782: err(1, "calloc");
783: if (UDP_MODE)
784: event_set(ev, sock, EV_READ | EV_PERSIST,
785: udp_server_handle_sc, udp_sc);
786: else
787: event_set(ev, sock, EV_READ | EV_PERSIST,
788: tcp_server_accept, NULL);
789: event_add(ev, NULL);
790: if (ptb->vflag >= 3)
791: fprintf(stderr, "bound to fd %d\n", sock);
1.11 claudio 792: lnfds++;
1.1 djm 793: }
794: freeaddrinfo(aitop);
1.11 claudio 795: if (lnfds == 0)
1.1 djm 796: errx(1, "No working listen addresses found");
1.11 claudio 797: }
798:
799: static void
1.20 claudio 800: client_handle_sc(int fd, short event, void *v_sc)
801: {
802: struct statctx *sc = v_sc;
803: ssize_t n;
1.1 djm 804:
1.20 claudio 805: again:
806: if ((n = write(sc->fd, sc->buf, sc->buflen)) == -1) {
807: if (errno == EINTR || errno == EAGAIN ||
808: (UDP_MODE && errno == ENOBUFS))
809: goto again;
810: err(1, "write");
1.11 claudio 811: }
1.20 claudio 812: if (TCP_MODE && n == 0) {
813: warnx("Remote end closed connection");
814: exit(1);
1.1 djm 815: }
1.20 claudio 816: if (ptb->vflag >= 3)
817: warnx("write: %zd bytes\n", n);
818: sc->bytes += n;
819: mainstats.slice_bytes += n;
820: if (UDP_MODE)
821: sc->udp_slice_pkts++;
1.1 djm 822: }
823:
1.20 claudio 824: static void
1.25 haesbaer 825: client_init(struct addrinfo *aitop, int nconn, struct statctx *udp_sc,
826: struct addrinfo *aib)
1.1 djm 827: {
1.20 claudio 828: struct statctx *sc;
829: struct addrinfo *ai;
1.14 claudio 830: char tmp[128];
831: int i, r, sock;
1.1 djm 832:
1.20 claudio 833: sc = udp_sc;
1.4 henning 834: for (i = 0; i < nconn; i++) {
835: for (sock = -1, ai = aitop; ai != NULL; ai = ai->ai_next) {
836: saddr_ntop(ai->ai_addr, ai->ai_addrlen, tmp,
837: sizeof(tmp));
1.20 claudio 838: if (ptb->vflag && i == 0)
1.4 henning 839: fprintf(stderr, "Trying %s\n", tmp);
840: if ((sock = socket(ai->ai_family, ai->ai_socktype,
841: ai->ai_protocol)) == -1) {
842: if (ai->ai_next == NULL)
843: err(1, "socket");
1.20 claudio 844: if (ptb->vflag)
1.4 henning 845: warn("socket");
846: continue;
847: }
1.25 haesbaer 848: if (aib != NULL) {
849: saddr_ntop(aib->ai_addr, aib->ai_addrlen,
850: tmp, sizeof(tmp));
851: if (ptb->vflag)
852: fprintf(stderr,
853: "Try to bind to %s\n", tmp);
854: if (bind(sock, (struct sockaddr *)aib->ai_addr,
855: aib->ai_addrlen) == -1)
856: err(1, "bind");
857: freeaddrinfo(aib);
858: }
1.24 haesbaer 859: if (ptb->Tflag != -1 && ai->ai_family == AF_INET) {
860: if (setsockopt(sock, IPPROTO_IP, IP_TOS,
861: &ptb->Tflag, sizeof(ptb->Tflag)))
862: err(1, "setsockopt IP_TOS");
863: }
864: if (ptb->Tflag != -1 && ai->ai_family == AF_INET6) {
865: if (setsockopt(sock, IPPROTO_IPV6, IPV6_TCLASS,
866: &ptb->Tflag, sizeof(ptb->Tflag)))
867: err(1, "setsockopt IPV6_TCLASS");
868: }
1.22 mikeb 869: if (ptb->Vflag) {
870: if (setsockopt(sock, SOL_SOCKET, SO_RTABLE,
871: &ptb->Vflag, sizeof(ptb->Vflag)) == -1) {
872: if (errno == ENOPROTOOPT)
873: warn("set rtable");
874: else
875: err(1, "setsockopt SO_RTABLE");
876: }
877: }
1.20 claudio 878: if (ptb->Sflag) {
1.4 henning 879: if (setsockopt(sock, SOL_SOCKET, SO_SNDBUF,
1.20 claudio 880: &ptb->Sflag, sizeof(ptb->Sflag)) == -1)
1.4 henning 881: warn("set TCP send buffer size");
882: }
883: if (connect(sock, ai->ai_addr, ai->ai_addrlen) != 0) {
884: if (ai->ai_next == NULL)
885: err(1, "connect");
1.20 claudio 886: if (ptb->vflag)
1.4 henning 887: warn("connect");
888: close(sock);
889: sock = -1;
890: continue;
891: }
892: break;
1.1 djm 893: }
1.4 henning 894: if (sock == -1)
895: errx(1, "No host found");
896: if ((r = fcntl(sock, F_GETFL, 0)) == -1)
897: err(1, "fcntl(F_GETFL)");
898: r |= O_NONBLOCK;
899: if (fcntl(sock, F_SETFL, r) == -1)
900: err(1, "fcntl(F_SETFL, O_NONBLOCK)");
1.20 claudio 901: /* Alloc and prepare stats */
902: if (TCP_MODE) {
903: if ((sc = calloc(1, sizeof(*sc))) == NULL)
904: err(1, "calloc");
905: }
906: sc->fd = sock;
907: stats_prepare(sc);
908: event_set(&sc->ev, sc->fd, EV_WRITE | EV_PERSIST,
909: client_handle_sc, sc);
910: event_add(&sc->ev, NULL);
911: TAILQ_INSERT_TAIL(&sc_queue, sc, entry);
912: mainstats.nconns++;
913: set_slice_timer(mainstats.nconns > 0);
1.14 claudio 914: }
915: freeaddrinfo(aitop);
916:
1.20 claudio 917: if (ptb->vflag && nconn > 1)
1.14 claudio 918: fprintf(stderr, "%u connections established\n", nconn);
919: }
920:
1.24 haesbaer 921: static int
922: map_tos(char *s, int *val)
923: {
924: /* DiffServ Codepoints and other TOS mappings */
925: const struct toskeywords {
926: const char *keyword;
927: int val;
928: } *t, toskeywords[] = {
929: { "af11", IPTOS_DSCP_AF11 },
930: { "af12", IPTOS_DSCP_AF12 },
931: { "af13", IPTOS_DSCP_AF13 },
932: { "af21", IPTOS_DSCP_AF21 },
933: { "af22", IPTOS_DSCP_AF22 },
934: { "af23", IPTOS_DSCP_AF23 },
935: { "af31", IPTOS_DSCP_AF31 },
936: { "af32", IPTOS_DSCP_AF32 },
937: { "af33", IPTOS_DSCP_AF33 },
938: { "af41", IPTOS_DSCP_AF41 },
939: { "af42", IPTOS_DSCP_AF42 },
940: { "af43", IPTOS_DSCP_AF43 },
941: { "critical", IPTOS_PREC_CRITIC_ECP },
942: { "cs0", IPTOS_DSCP_CS0 },
943: { "cs1", IPTOS_DSCP_CS1 },
944: { "cs2", IPTOS_DSCP_CS2 },
945: { "cs3", IPTOS_DSCP_CS3 },
946: { "cs4", IPTOS_DSCP_CS4 },
947: { "cs5", IPTOS_DSCP_CS5 },
948: { "cs6", IPTOS_DSCP_CS6 },
949: { "cs7", IPTOS_DSCP_CS7 },
950: { "ef", IPTOS_DSCP_EF },
951: { "inetcontrol", IPTOS_PREC_INTERNETCONTROL },
952: { "lowdelay", IPTOS_LOWDELAY },
953: { "netcontrol", IPTOS_PREC_NETCONTROL },
954: { "reliability", IPTOS_RELIABILITY },
955: { "throughput", IPTOS_THROUGHPUT },
956: { NULL, -1 },
957: };
958:
959: for (t = toskeywords; t->keyword != NULL; t++) {
960: if (strcmp(s, t->keyword) == 0) {
961: *val = t->val;
962: return (1);
963: }
964: }
965:
966: return (0);
967: }
968:
1.1 djm 969: int
970: main(int argc, char **argv)
971: {
972: extern int optind;
973: extern char *optarg;
974:
975: char kerr[_POSIX2_LINE_MAX], *tmp;
1.25 haesbaer 976: struct addrinfo *aitop, *aib, hints;
1.1 djm 977: const char *errstr;
1.11 claudio 978: struct rlimit rl;
1.20 claudio 979: int ch, herr, nconn;
1.12 deraadt 980: struct nlist nl[] = { { "_tcbtable" }, { "" } };
1.25 haesbaer 981: const char *host = NULL, *port = DEFAULT_PORT, *srcbind = NULL;
1.20 claudio 982: struct event ev_sigint, ev_sigterm, ev_sighup;
983: struct statctx *udp_sc = NULL;
1.1 djm 984:
1.20 claudio 985: /* Init world */
1.26 haesbaer 986: setlinebuf(stdout);
1.20 claudio 987: ptb = &tcpbench;
988: ptb->dummybuf_len = 0;
989: ptb->Sflag = ptb->sflag = ptb->vflag = ptb->Vflag = 0;
990: ptb->kvmh = NULL;
991: ptb->kvars = NULL;
992: ptb->rflag = DEFAULT_STATS_INTERVAL;
1.24 haesbaer 993: ptb->Tflag = -1;
1.20 claudio 994: nconn = 1;
1.25 haesbaer 995: aib = NULL;
1.1 djm 996:
1.25 haesbaer 997: while ((ch = getopt(argc, argv, "b:B:hlk:n:p:r:sS:T:uvV:")) != -1) {
1.1 djm 998: switch (ch) {
1.25 haesbaer 999: case 'b':
1000: srcbind = optarg;
1001: break;
1.1 djm 1002: case 'l':
1003: list_kvars();
1004: exit(0);
1005: case 'k':
1006: if ((tmp = strdup(optarg)) == NULL)
1007: errx(1, "strdup");
1.20 claudio 1008: ptb->kvars = check_prepare_kvars(tmp);
1.1 djm 1009: free(tmp);
1010: break;
1011: case 'r':
1.20 claudio 1012: ptb->rflag = strtonum(optarg, 0, 60 * 60 * 24 * 1000,
1.1 djm 1013: &errstr);
1014: if (errstr != NULL)
1015: errx(1, "statistics interval is %s: %s",
1016: errstr, optarg);
1017: break;
1018: case 'p':
1019: port = optarg;
1020: break;
1021: case 's':
1.20 claudio 1022: ptb->sflag = 1;
1.1 djm 1023: break;
1024: case 'S':
1.20 claudio 1025: ptb->Sflag = strtonum(optarg, 0, 1024*1024*1024,
1.1 djm 1026: &errstr);
1027: if (errstr != NULL)
1028: errx(1, "receive space interval is %s: %s",
1029: errstr, optarg);
1030: break;
1031: case 'B':
1.20 claudio 1032: ptb->dummybuf_len = strtonum(optarg, 0, 1024*1024*1024,
1.1 djm 1033: &errstr);
1034: if (errstr != NULL)
1035: errx(1, "read/write buffer size is %s: %s",
1036: errstr, optarg);
1037: break;
1038: case 'v':
1.20 claudio 1039: ptb->vflag++;
1.9 claudio 1040: break;
1041: case 'V':
1.20 claudio 1042: ptb->Vflag = (unsigned int)strtonum(optarg, 0,
1.9 claudio 1043: RT_TABLEID_MAX, &errstr);
1044: if (errstr)
1.17 guenther 1045: errx(1, "rtable value is %s: %s",
1.9 claudio 1046: errstr, optarg);
1.1 djm 1047: break;
1.4 henning 1048: case 'n':
1049: nconn = strtonum(optarg, 0, 65535, &errstr);
1050: if (errstr != NULL)
1051: errx(1, "number of connections is %s: %s",
1052: errstr, optarg);
1053: break;
1.20 claudio 1054: case 'u':
1055: ptb->uflag = 1;
1.24 haesbaer 1056: break;
1057: case 'T':
1058: if (map_tos(optarg, &ptb->Tflag))
1059: break;
1060: errstr = NULL;
1061: if (strlen(optarg) > 1 && optarg[0] == '0' &&
1062: optarg[1] == 'x')
1063: ptb->Tflag = (int)strtol(optarg, NULL, 16);
1064: else
1065: ptb->Tflag = (int)strtonum(optarg, 0, 255,
1066: &errstr);
1067: if (ptb->Tflag == -1 || ptb->Tflag > 255 || errstr)
1068: errx(1, "illegal tos value %s", optarg);
1.20 claudio 1069: break;
1.1 djm 1070: case 'h':
1071: default:
1072: usage();
1073: }
1074: }
1075:
1076: argv += optind;
1077: argc -= optind;
1.20 claudio 1078: if ((argc != (ptb->sflag ? 0 : 1)) ||
1079: (UDP_MODE && (ptb->kvars || nconn != 1)))
1.1 djm 1080: usage();
1.4 henning 1081:
1.20 claudio 1082: if (!ptb->sflag)
1.1 djm 1083: host = argv[0];
1.20 claudio 1084: /*
1085: * Rationale,
1086: * If TCP, use a big buffer with big reads/writes.
1087: * If UDP, use a big buffer in server and a buffer the size of a
1088: * ethernet packet.
1089: */
1090: if (!ptb->dummybuf_len) {
1091: if (ptb->sflag || TCP_MODE)
1092: ptb->dummybuf_len = DEFAULT_BUF;
1093: else
1094: ptb->dummybuf_len = DEFAULT_UDP_PKT;
1095: }
1.1 djm 1096:
1.13 claudio 1097: bzero(&hints, sizeof(hints));
1.25 haesbaer 1098: if (UDP_MODE) {
1.20 claudio 1099: hints.ai_socktype = SOCK_DGRAM;
1.25 haesbaer 1100: hints.ai_protocol = IPPROTO_UDP;
1.27 ! haesbaer 1101: } else {
1.20 claudio 1102: hints.ai_socktype = SOCK_STREAM;
1.25 haesbaer 1103: hints.ai_protocol = IPPROTO_TCP;
1104: }
1.20 claudio 1105: if (ptb->sflag)
1.4 henning 1106: hints.ai_flags = AI_PASSIVE;
1.25 haesbaer 1107: if (srcbind != NULL) {
1108: hints.ai_flags |= AI_NUMERICHOST;
1109: herr = getaddrinfo(srcbind, NULL, &hints, &aib);
1110: hints.ai_flags &= ~AI_NUMERICHOST;
1111: if (herr != 0) {
1112: if (herr == EAI_SYSTEM)
1113: err(1, "getaddrinfo");
1114: else
1115: errx(1, "getaddrinfo: %s", gai_strerror(herr));
1116: }
1117: }
1.13 claudio 1118: if ((herr = getaddrinfo(host, port, &hints, &aitop)) != 0) {
1119: if (herr == EAI_SYSTEM)
1120: err(1, "getaddrinfo");
1121: else
1122: errx(1, "getaddrinfo: %s", gai_strerror(herr));
1.1 djm 1123: }
1.20 claudio 1124: if (ptb->kvars) {
1125: if ((ptb->kvmh = kvm_openfiles(NULL, NULL, NULL,
1.1 djm 1126: O_RDONLY, kerr)) == NULL)
1127: errx(1, "kvm_open: %s", kerr);
1128: drop_gid();
1.20 claudio 1129: if (kvm_nlist(ptb->kvmh, nl) < 0 || nl[0].n_type == 0)
1.1 djm 1130: errx(1, "kvm: no namelist");
1.20 claudio 1131: ptb->ktcbtab = nl[0].n_value;
1.1 djm 1132: } else
1133: drop_gid();
1134:
1.11 claudio 1135: if (getrlimit(RLIMIT_NOFILE, &rl) == -1)
1136: err(1, "getrlimit");
1137: if (rl.rlim_cur < MAX_FD)
1138: rl.rlim_cur = MAX_FD;
1139: if (setrlimit(RLIMIT_NOFILE, &rl))
1140: err(1, "setrlimit");
1141: if (getrlimit(RLIMIT_NOFILE, &rl) == -1)
1142: err(1, "getrlimit");
1143:
1.20 claudio 1144: /* Init world */
1145: TAILQ_INIT(&sc_queue);
1146: if ((ptb->dummybuf = malloc(ptb->dummybuf_len)) == NULL)
1147: err(1, "malloc");
1148: arc4random_buf(ptb->dummybuf, ptb->dummybuf_len);
1149:
1150: /* Setup libevent and signals */
1151: event_init();
1152: signal_set(&ev_sigterm, SIGTERM, signal_handler, NULL);
1153: signal_set(&ev_sighup, SIGHUP, signal_handler, NULL);
1154: signal_set(&ev_sigint, SIGINT, signal_handler, NULL);
1155: signal_add(&ev_sigint, NULL);
1156: signal_add(&ev_sigterm, NULL);
1157: signal_add(&ev_sighup, NULL);
1158: signal(SIGPIPE, SIG_IGN);
1159:
1.27 ! haesbaer 1160: if (UDP_MODE) {
! 1161: if ((udp_sc = calloc(1, sizeof(*udp_sc))) == NULL)
! 1162: err(1, "calloc");
! 1163: udp_sc->fd = -1;
! 1164: stats_prepare(udp_sc);
! 1165: evtimer_set(&mainstats.timer, udp_process_slice, udp_sc);
! 1166: } else {
1.20 claudio 1167: print_tcp_header();
1168: evtimer_set(&mainstats.timer, tcp_process_slice, NULL);
1.27 ! haesbaer 1169: }
1.20 claudio 1170:
1.27 ! haesbaer 1171: if (ptb->sflag)
1.20 claudio 1172: server_init(aitop, udp_sc);
1.27 ! haesbaer 1173: else
1.25 haesbaer 1174: client_init(aitop, nconn, udp_sc, aib);
1.20 claudio 1175:
1176: /* libevent main loop*/
1177: event_dispatch();
1.1 djm 1178:
1.20 claudio 1179: return (0);
1.1 djm 1180: }