Annotation of src/usr.bin/tcpbench/tcpbench.c, Revision 1.39
1.1 djm 1: /*
2: * Copyright (c) 2008 Damien Miller <djm@mindrot.org>
1.20 claudio 3: * Copyright (c) 2011 Christiano F. Haesbaert <haesbaert@haesbaert.org>
1.1 djm 4: *
5: * Permission to use, copy, modify, and distribute this software for any
6: * purpose with or without fee is hereby granted, provided that the above
7: * copyright notice and this permission notice appear in all copies.
8: *
9: * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
10: * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
11: * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
12: * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
13: * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
14: * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
15: * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
16: */
17:
18: #include <sys/types.h>
19: #include <sys/time.h>
20: #include <sys/socket.h>
21: #include <sys/socketvar.h>
1.11 claudio 22: #include <sys/resource.h>
1.20 claudio 23: #include <sys/queue.h>
1.1 djm 24:
25: #include <net/route.h>
26:
27: #include <netinet/in.h>
28: #include <netinet/in_systm.h>
29: #include <netinet/ip.h>
30: #include <netinet/tcp.h>
31: #include <netinet/tcp_timer.h>
32: #include <netinet/tcp_fsm.h>
33: #include <netinet/in_pcb.h>
34: #include <netinet/tcp_var.h>
35:
36: #include <arpa/inet.h>
37:
38: #include <unistd.h>
39: #include <limits.h>
40: #include <stdlib.h>
41: #include <stdio.h>
42: #include <string.h>
43: #include <errno.h>
1.20 claudio 44: #include <event.h>
1.1 djm 45: #include <netdb.h>
46: #include <signal.h>
47: #include <err.h>
48: #include <fcntl.h>
49: #include <poll.h>
50:
51: #include <kvm.h>
52: #include <nlist.h>
53:
1.11 claudio 54: #define DEFAULT_PORT "12345"
55: #define DEFAULT_STATS_INTERVAL 1000 /* ms */
1.20 claudio 56: #define DEFAULT_BUF (256 * 1024)
57: #define DEFAULT_UDP_PKT (1500 - 28) /* TODO don't hardcode this */
58: #define TCP_MODE !ptb->uflag
59: #define UDP_MODE ptb->uflag
1.11 claudio 60: #define MAX_FD 1024
1.1 djm 61:
1.20 claudio 62: /* Our tcpbench globals */
63: struct {
64: int Sflag; /* Socket buffer size (tcp mode) */
65: u_int rflag; /* Report rate (ms) */
66: int sflag; /* True if server */
1.24 haesbaer 67: int Tflag; /* ToS if != -1 */
1.20 claudio 68: int vflag; /* Verbose */
69: int uflag; /* UDP mode */
70: kvm_t *kvmh; /* Kvm handler */
71: char **kvars; /* Kvm enabled vars */
72: u_long ktcbtab; /* Ktcb */
73: char *dummybuf; /* IO buffer */
74: size_t dummybuf_len; /* IO buffer len */
75: } tcpbench, *ptb;
1.1 djm 76:
1.33 haesbaer 77: struct tcpservsock {
78: struct event ev;
79: struct event evt;
80: int fd;
81: };
82:
1.20 claudio 83: /* stats for a single tcp connection, udp uses only one */
1.1 djm 84: struct statctx {
1.20 claudio 85: TAILQ_ENTRY(statctx) entry;
1.11 claudio 86: struct timeval t_start, t_last;
1.1 djm 87: unsigned long long bytes;
1.20 claudio 88: int fd;
89: char *buf;
90: size_t buflen;
91: struct event ev;
92: /* TCP only */
1.33 haesbaer 93: struct tcpservsock *tcp_ts;
1.20 claudio 94: u_long tcp_tcbaddr;
95: /* UDP only */
96: u_long udp_slice_pkts;
1.1 djm 97: };
98:
1.20 claudio 99: static void signal_handler(int, short, void *);
100: static void saddr_ntop(const struct sockaddr *, socklen_t, char *, size_t);
101: static void drop_gid(void);
102: static void set_slice_timer(int);
103: static void print_tcp_header(void);
104: static void kget(u_long, void *, size_t);
105: static u_long kfind_tcb(int);
106: static void kupdate_stats(u_long, struct inpcb *, struct tcpcb *,
107: struct socket *);
108: static void list_kvars(void);
109: static void check_kvar(const char *);
110: static char ** check_prepare_kvars(char *);
111: static void stats_prepare(struct statctx *);
112: static void tcp_stats_display(unsigned long long, long double, float,
113: struct statctx *, struct inpcb *, struct tcpcb *, struct socket *);
114: static void tcp_process_slice(int, short, void *);
115: static void tcp_server_handle_sc(int, short, void *);
116: static void tcp_server_accept(int, short, void *);
117: static void server_init(struct addrinfo *, struct statctx *);
118: static void client_handle_sc(int, short, void *);
1.25 haesbaer 119: static void client_init(struct addrinfo *, int, struct statctx *,
120: struct addrinfo *);
1.20 claudio 121: static int clock_gettime_tv(clockid_t, struct timeval *);
122: static void udp_server_handle_sc(int, short, void *);
123: static void udp_process_slice(int, short, void *);
1.24 haesbaer 124: static int map_tos(char *, int *);
1.11 claudio 125: /*
126: * We account the mainstats here, that is the stats
127: * for all connections, all variables starting with slice
128: * are used to account information for the timeslice
129: * between each output. Peak variables record the highest
130: * between all slices so far.
131: */
132: static struct {
133: unsigned long long slice_bytes; /* bytes for last slice */
134: long double peak_mbps; /* peak mbps so far */
135: int nconns; /* connected clients */
1.20 claudio 136: struct event timer; /* process timer */
1.11 claudio 137: } mainstats;
138:
1.20 claudio 139: /* When adding variables, also add to tcp_stats_display() */
1.1 djm 140: static const char *allowed_kvars[] = {
141: "inpcb.inp_flags",
142: "sockb.so_rcv.sb_cc",
1.26 haesbaer 143: "sockb.so_rcv.sb_hiwat",
1.19 claudio 144: "sockb.so_rcv.sb_wat",
1.1 djm 145: "sockb.so_snd.sb_cc",
1.26 haesbaer 146: "sockb.so_snd.sb_hiwat",
1.19 claudio 147: "sockb.so_snd.sb_wat",
1.26 haesbaer 148: "tcpcb.last_ack_sent",
149: "tcpcb.max_sndwnd",
150: "tcpcb.rcv_adv",
151: "tcpcb.rcv_nxt",
152: "tcpcb.rcv_scale",
153: "tcpcb.rcv_wnd",
154: "tcpcb.rfbuf_cnt",
155: "tcpcb.rfbuf_ts",
156: "tcpcb.snd_cwnd",
157: "tcpcb.snd_max",
158: "tcpcb.snd_nxt",
159: "tcpcb.snd_scale",
160: "tcpcb.snd_ssthresh",
1.1 djm 161: "tcpcb.snd_una",
162: "tcpcb.snd_wl1",
163: "tcpcb.snd_wl2",
164: "tcpcb.snd_wnd",
165: "tcpcb.t_rcvtime",
1.26 haesbaer 166: "tcpcb.t_rtseq",
167: "tcpcb.t_rttmin",
1.1 djm 168: "tcpcb.t_rtttime",
1.26 haesbaer 169: "tcpcb.t_rttvar",
1.1 djm 170: "tcpcb.t_srtt",
1.26 haesbaer 171: "tcpcb.ts_recent",
1.19 claudio 172: "tcpcb.ts_recent_age",
1.1 djm 173: NULL
174: };
175:
1.20 claudio 176: TAILQ_HEAD(, statctx) sc_queue;
1.1 djm 177:
178: static void __dead
179: usage(void)
180: {
181: fprintf(stderr,
1.6 jmc 182: "usage: tcpbench -l\n"
1.25 haesbaer 183: " tcpbench [-uv] [-B buf] [-b addr] [-k kvars] [-n connections]\n"
184: " [-p port] [-r interval] [-S space] [-T toskeyword]\n"
1.30 henning 185: " [-t secs] [-V rtable] hostname\n"
1.21 jmc 186: " tcpbench -s [-uv] [-B buf] [-k kvars] [-p port]\n"
1.24 haesbaer 187: " [-r interval] [-S space] [-T toskeyword] [-V rtable]\n");
1.1 djm 188: exit(1);
189: }
190:
191: static void
1.20 claudio 192: signal_handler(int sig, short event, void *bula)
193: {
194: /*
195: * signal handler rules don't apply, libevent decouples for us
196: */
197: switch (sig) {
198: case SIGINT:
199: case SIGTERM:
200: case SIGHUP:
201: warnx("Terminated by signal %d", sig);
202: exit(0);
203: break; /* NOTREACHED */
204: default:
205: errx(1, "unexpected signal %d", sig);
206: break; /* NOTREACHED */
207: }
208: }
209:
210: static void
1.1 djm 211: saddr_ntop(const struct sockaddr *addr, socklen_t alen, char *buf, size_t len)
212: {
213: char hbuf[NI_MAXHOST], pbuf[NI_MAXSERV];
214: int herr;
215:
1.3 djm 216: if ((herr = getnameinfo(addr, alen, hbuf, sizeof(hbuf),
217: pbuf, sizeof(pbuf), NI_NUMERICHOST|NI_NUMERICSERV)) != 0) {
1.1 djm 218: if (herr == EAI_SYSTEM)
219: err(1, "getnameinfo");
220: else
221: errx(1, "getnameinfo: %s", gai_strerror(herr));
222: }
223: snprintf(buf, len, "[%s]:%s", hbuf, pbuf);
224: }
225:
226: static void
1.20 claudio 227: drop_gid(void)
228: {
229: gid_t gid;
230:
231: gid = getgid();
232: if (setresgid(gid, gid, gid) == -1)
233: err(1, "setresgid");
234: }
235:
236: static void
237: set_slice_timer(int on)
1.11 claudio 238: {
1.20 claudio 239: struct timeval tv;
1.11 claudio 240:
1.20 claudio 241: if (ptb->rflag == 0)
1.11 claudio 242: return;
243:
1.20 claudio 244: if (on) {
245: if (evtimer_pending(&mainstats.timer, NULL))
246: return;
247: timerclear(&tv);
248: /* XXX Is there a better way to do this ? */
249: tv.tv_sec = ptb->rflag / 1000;
250: tv.tv_usec = (ptb->rflag % 1000) * 1000;
251:
252: evtimer_add(&mainstats.timer, &tv);
253: } else if (evtimer_pending(&mainstats.timer, NULL))
254: evtimer_del(&mainstats.timer);
255: }
1.11 claudio 256:
1.20 claudio 257: static int
258: clock_gettime_tv(clockid_t clock_id, struct timeval *tv)
259: {
260: struct timespec ts;
261:
262: if (clock_gettime(clock_id, &ts) == -1)
263: return (-1);
264:
265: TIMESPEC_TO_TIMEVAL(tv, &ts);
266:
267: return (0);
1.11 claudio 268: }
269:
270: static void
1.20 claudio 271: print_tcp_header(void)
1.11 claudio 272: {
273: char **kv;
1.20 claudio 274:
1.11 claudio 275: printf("%12s %14s %12s %8s ", "elapsed_ms", "bytes", "mbps",
276: "bwidth");
1.20 claudio 277: for (kv = ptb->kvars; ptb->kvars != NULL && *kv != NULL; kv++)
278: printf("%s%s", kv != ptb->kvars ? "," : "", *kv);
1.11 claudio 279: printf("\n");
280: }
281:
282: static void
1.20 claudio 283: kget(u_long addr, void *buf, size_t size)
1.1 djm 284: {
1.20 claudio 285: if (kvm_read(ptb->kvmh, addr, buf, size) != (ssize_t)size)
286: errx(1, "kvm_read: %s", kvm_geterr(ptb->kvmh));
1.1 djm 287: }
288:
289: static u_long
1.20 claudio 290: kfind_tcb(int sock)
1.1 djm 291: {
292: struct inpcbtable tcbtab;
293: struct inpcb *head, *next, *prev;
294: struct inpcb inpcb;
295: struct tcpcb tcpcb;
296:
297: struct sockaddr_storage me, them;
298: socklen_t melen, themlen;
299: struct sockaddr_in *in4;
300: struct sockaddr_in6 *in6;
301: char tmp1[64], tmp2[64];
1.11 claudio 302: int nretry;
1.1 djm 303:
1.11 claudio 304: nretry = 10;
1.1 djm 305: melen = themlen = sizeof(struct sockaddr_storage);
306: if (getsockname(sock, (struct sockaddr *)&me, &melen) == -1)
307: err(1, "getsockname");
308: if (getpeername(sock, (struct sockaddr *)&them, &themlen) == -1)
309: err(1, "getpeername");
310: if (me.ss_family != them.ss_family)
311: errx(1, "%s: me.ss_family != them.ss_family", __func__);
312: if (me.ss_family != AF_INET && me.ss_family != AF_INET6)
313: errx(1, "%s: unknown socket family", __func__);
1.20 claudio 314: if (ptb->vflag >= 2) {
1.1 djm 315: saddr_ntop((struct sockaddr *)&me, me.ss_len,
316: tmp1, sizeof(tmp1));
317: saddr_ntop((struct sockaddr *)&them, them.ss_len,
318: tmp2, sizeof(tmp2));
319: fprintf(stderr, "Our socket local %s remote %s\n", tmp1, tmp2);
320: }
1.20 claudio 321: if (ptb->vflag >= 2)
322: fprintf(stderr, "Using PCB table at %lu\n", ptb->ktcbtab);
1.11 claudio 323: retry:
1.20 claudio 324: kget(ptb->ktcbtab, &tcbtab, sizeof(tcbtab));
1.39 ! krw 325: prev = head = (struct inpcb *)&TAILQ_FIRST(
1.20 claudio 326: &((struct inpcbtable *)ptb->ktcbtab)->inpt_queue);
1.39 ! krw 327: next = TAILQ_FIRST(&tcbtab.inpt_queue);
1.1 djm 328:
1.20 claudio 329: if (ptb->vflag >= 2)
1.1 djm 330: fprintf(stderr, "PCB head at %p\n", head);
331: while (next != head) {
1.20 claudio 332: if (ptb->vflag >= 2)
1.1 djm 333: fprintf(stderr, "Checking PCB %p\n", next);
1.20 claudio 334: kget((u_long)next, &inpcb, sizeof(inpcb));
1.39 ! krw 335: if (TAILQ_PREV(&inpcb, inpthead, inp_queue) != prev) {
1.11 claudio 336: if (nretry--) {
337: warnx("pcb prev pointer insane");
338: goto retry;
1.28 haesbaer 339: } else
1.11 claudio 340: errx(1, "pcb prev pointer insane,"
341: " all attempts exausted");
342: }
1.1 djm 343: prev = next;
1.39 ! krw 344: next = TAILQ_NEXT(&inpcb, inp_queue);
1.1 djm 345:
346: if (me.ss_family == AF_INET) {
347: if ((inpcb.inp_flags & INP_IPV6) != 0) {
1.20 claudio 348: if (ptb->vflag >= 2)
1.1 djm 349: fprintf(stderr, "Skip: INP_IPV6");
350: continue;
351: }
1.20 claudio 352: if (ptb->vflag >= 2) {
1.1 djm 353: inet_ntop(AF_INET, &inpcb.inp_laddr,
354: tmp1, sizeof(tmp1));
355: inet_ntop(AF_INET, &inpcb.inp_faddr,
356: tmp2, sizeof(tmp2));
357: fprintf(stderr, "PCB %p local: [%s]:%d "
358: "remote: [%s]:%d\n", prev,
359: tmp1, inpcb.inp_lport,
360: tmp2, inpcb.inp_fport);
361: }
362: in4 = (struct sockaddr_in *)&me;
363: if (memcmp(&in4->sin_addr, &inpcb.inp_laddr,
364: sizeof(struct in_addr)) != 0 ||
365: in4->sin_port != inpcb.inp_lport)
366: continue;
367: in4 = (struct sockaddr_in *)&them;
368: if (memcmp(&in4->sin_addr, &inpcb.inp_faddr,
369: sizeof(struct in_addr)) != 0 ||
370: in4->sin_port != inpcb.inp_fport)
371: continue;
372: } else {
373: if ((inpcb.inp_flags & INP_IPV6) == 0)
374: continue;
1.20 claudio 375: if (ptb->vflag >= 2) {
1.1 djm 376: inet_ntop(AF_INET6, &inpcb.inp_laddr6,
377: tmp1, sizeof(tmp1));
378: inet_ntop(AF_INET6, &inpcb.inp_faddr6,
379: tmp2, sizeof(tmp2));
380: fprintf(stderr, "PCB %p local: [%s]:%d "
381: "remote: [%s]:%d\n", prev,
382: tmp1, inpcb.inp_lport,
383: tmp2, inpcb.inp_fport);
384: }
385: in6 = (struct sockaddr_in6 *)&me;
386: if (memcmp(&in6->sin6_addr, &inpcb.inp_laddr6,
387: sizeof(struct in6_addr)) != 0 ||
388: in6->sin6_port != inpcb.inp_lport)
389: continue;
390: in6 = (struct sockaddr_in6 *)&them;
391: if (memcmp(&in6->sin6_addr, &inpcb.inp_faddr6,
392: sizeof(struct in6_addr)) != 0 ||
393: in6->sin6_port != inpcb.inp_fport)
394: continue;
395: }
1.20 claudio 396: kget((u_long)inpcb.inp_ppcb, &tcpcb, sizeof(tcpcb));
1.1 djm 397: if (tcpcb.t_state != TCPS_ESTABLISHED) {
1.20 claudio 398: if (ptb->vflag >= 2)
1.1 djm 399: fprintf(stderr, "Not established\n");
400: continue;
401: }
1.20 claudio 402: if (ptb->vflag >= 2)
1.1 djm 403: fprintf(stderr, "Found PCB at %p\n", prev);
1.20 claudio 404: return ((u_long)prev);
1.1 djm 405: }
406:
407: errx(1, "No matching PCB found");
408: }
409:
410: static void
1.20 claudio 411: kupdate_stats(u_long tcbaddr, struct inpcb *inpcb,
412: struct tcpcb *tcpcb, struct socket *sockb)
1.1 djm 413: {
1.20 claudio 414: kget(tcbaddr, inpcb, sizeof(*inpcb));
415: kget((u_long)inpcb->inp_ppcb, tcpcb, sizeof(*tcpcb));
416: kget((u_long)inpcb->inp_socket, sockb, sizeof(*sockb));
1.1 djm 417: }
418:
419: static void
420: check_kvar(const char *var)
421: {
1.16 deraadt 422: u_int i;
1.1 djm 423:
424: for (i = 0; allowed_kvars[i] != NULL; i++)
425: if (strcmp(allowed_kvars[i], var) == 0)
426: return;
427: errx(1, "Unrecognised kvar: %s", var);
428: }
429:
430: static void
431: list_kvars(void)
432: {
1.16 deraadt 433: u_int i;
1.1 djm 434:
1.26 haesbaer 435: printf("Supported kernel variables:\n");
1.1 djm 436: for (i = 0; allowed_kvars[i] != NULL; i++)
1.26 haesbaer 437: printf("\t%s\n", allowed_kvars[i]);
1.1 djm 438: }
439:
440: static char **
441: check_prepare_kvars(char *list)
442: {
443: char *item, **ret = NULL;
1.16 deraadt 444: u_int n = 0;
1.1 djm 445:
446: while ((item = strsep(&list, ", \t\n")) != NULL) {
447: check_kvar(item);
448: if ((ret = realloc(ret, sizeof(*ret) * (++n + 1))) == NULL)
449: errx(1, "realloc(kvars)");
450: if ((ret[n - 1] = strdup(item)) == NULL)
451: errx(1, "strdup");
452: ret[n] = NULL;
453: }
1.20 claudio 454: return (ret);
1.1 djm 455: }
456:
457: static void
1.20 claudio 458: stats_prepare(struct statctx *sc)
1.1 djm 459: {
1.20 claudio 460: sc->buf = ptb->dummybuf;
461: sc->buflen = ptb->dummybuf_len;
462:
463: if (ptb->kvars)
464: sc->tcp_tcbaddr = kfind_tcb(sc->fd);
465: if (clock_gettime_tv(CLOCK_MONOTONIC, &sc->t_start) == -1)
466: err(1, "clock_gettime_tv");
1.1 djm 467: sc->t_last = sc->t_start;
468:
469: }
470:
471: static void
1.20 claudio 472: tcp_stats_display(unsigned long long total_elapsed, long double mbps,
1.11 claudio 473: float bwperc, struct statctx *sc, struct inpcb *inpcb,
474: struct tcpcb *tcpcb, struct socket *sockb)
475: {
476: int j;
477:
478: printf("%12llu %14llu %12.3Lf %7.2f%% ", total_elapsed, sc->bytes,
479: mbps, bwperc);
480:
1.20 claudio 481: if (ptb->kvars != NULL) {
482: kupdate_stats(sc->tcp_tcbaddr, inpcb, tcpcb,
1.11 claudio 483: sockb);
1.1 djm 484:
1.20 claudio 485: for (j = 0; ptb->kvars[j] != NULL; j++) {
1.11 claudio 486: #define S(a) #a
487: #define P(b, v, f) \
1.20 claudio 488: if (strcmp(ptb->kvars[j], S(b.v)) == 0) { \
1.11 claudio 489: printf("%s"f, j > 0 ? "," : "", b->v); \
490: continue; \
491: }
492: P(inpcb, inp_flags, "0x%08x")
493: P(sockb, so_rcv.sb_cc, "%lu")
1.26 haesbaer 494: P(sockb, so_rcv.sb_hiwat, "%lu")
1.19 claudio 495: P(sockb, so_rcv.sb_wat, "%lu")
1.11 claudio 496: P(sockb, so_snd.sb_cc, "%lu")
1.26 haesbaer 497: P(sockb, so_snd.sb_hiwat, "%lu")
1.19 claudio 498: P(sockb, so_snd.sb_wat, "%lu")
1.26 haesbaer 499: P(tcpcb, last_ack_sent, "%u")
500: P(tcpcb, max_sndwnd, "%lu")
501: P(tcpcb, rcv_adv, "%u")
502: P(tcpcb, rcv_nxt, "%u")
503: P(tcpcb, rcv_scale, "%u")
504: P(tcpcb, rcv_wnd, "%lu")
505: P(tcpcb, rfbuf_cnt, "%u")
506: P(tcpcb, rfbuf_ts, "%u")
507: P(tcpcb, snd_cwnd, "%lu")
508: P(tcpcb, snd_max, "%u")
509: P(tcpcb, snd_nxt, "%u")
510: P(tcpcb, snd_scale, "%u")
511: P(tcpcb, snd_ssthresh, "%lu")
1.11 claudio 512: P(tcpcb, snd_una, "%u")
513: P(tcpcb, snd_wl1, "%u")
514: P(tcpcb, snd_wl2, "%u")
515: P(tcpcb, snd_wnd, "%lu")
516: P(tcpcb, t_rcvtime, "%u")
1.26 haesbaer 517: P(tcpcb, t_rtseq, "%u")
518: P(tcpcb, t_rttmin, "%hu")
1.11 claudio 519: P(tcpcb, t_rtttime, "%u")
1.26 haesbaer 520: P(tcpcb, t_rttvar, "%hu")
1.11 claudio 521: P(tcpcb, t_srtt, "%hu")
1.26 haesbaer 522: P(tcpcb, ts_recent, "%u")
1.19 claudio 523: P(tcpcb, ts_recent_age, "%u")
1.11 claudio 524: #undef S
1.1 djm 525: #undef P
526: }
527: }
528: printf("\n");
529: }
530:
531: static void
1.20 claudio 532: tcp_process_slice(int fd, short event, void *bula)
1.1 djm 533: {
1.11 claudio 534: unsigned long long total_elapsed, since_last;
535: long double mbps, slice_mbps = 0;
536: float bwperc;
1.20 claudio 537: struct statctx *sc;
1.11 claudio 538: struct timeval t_cur, t_diff;
539: struct inpcb inpcb;
540: struct tcpcb tcpcb;
541: struct socket sockb;
542:
1.20 claudio 543: TAILQ_FOREACH(sc, &sc_queue, entry) {
544: if (clock_gettime_tv(CLOCK_MONOTONIC, &t_cur) == -1)
545: err(1, "clock_gettime_tv");
546: if (ptb->kvars != NULL) /* process kernel stats */
547: kupdate_stats(sc->tcp_tcbaddr, &inpcb, &tcpcb,
1.11 claudio 548: &sockb);
1.20 claudio 549:
1.11 claudio 550: timersub(&t_cur, &sc->t_start, &t_diff);
551: total_elapsed = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000;
552: timersub(&t_cur, &sc->t_last, &t_diff);
553: since_last = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000;
554: bwperc = (sc->bytes * 100.0) / mainstats.slice_bytes;
555: mbps = (sc->bytes * 8) / (since_last * 1000.0);
556: slice_mbps += mbps;
557:
1.20 claudio 558: tcp_stats_display(total_elapsed, mbps, bwperc, sc,
1.11 claudio 559: &inpcb, &tcpcb, &sockb);
560:
561: sc->t_last = t_cur;
562: sc->bytes = 0;
563: }
1.1 djm 564:
1.11 claudio 565: /* process stats for this slice */
566: if (slice_mbps > mainstats.peak_mbps)
567: mainstats.peak_mbps = slice_mbps;
1.20 claudio 568: printf("Conn: %3d Mbps: %12.3Lf Peak Mbps: %12.3Lf Avg Mbps: %12.3Lf\n",
569: mainstats.nconns, slice_mbps, mainstats.peak_mbps,
1.36 haesbaer 570: mainstats.nconns ? slice_mbps / mainstats.nconns : 0);
1.20 claudio 571: mainstats.slice_bytes = 0;
572:
573: set_slice_timer(mainstats.nconns > 0);
574: }
575:
576: static void
577: udp_process_slice(int fd, short event, void *v_sc)
578: {
579: struct statctx *sc = v_sc;
1.31 haesbaer 580: unsigned long long total_elapsed, since_last, pps;
581: long double slice_mbps;
1.20 claudio 582: struct timeval t_cur, t_diff;
583:
584: if (clock_gettime_tv(CLOCK_MONOTONIC, &t_cur) == -1)
585: err(1, "clock_gettime_tv");
586: /* Calculate pps */
587: timersub(&t_cur, &sc->t_start, &t_diff);
588: total_elapsed = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000;
589: timersub(&t_cur, &sc->t_last, &t_diff);
590: since_last = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000;
591: slice_mbps = (sc->bytes * 8) / (since_last * 1000.0);
592: pps = (sc->udp_slice_pkts * 1000) / since_last;
593: if (slice_mbps > mainstats.peak_mbps)
594: mainstats.peak_mbps = slice_mbps;
1.31 haesbaer 595: printf("Elapsed: %11llu Mbps: %11.3Lf Peak Mbps: %11.3Lf %s PPS: %7llu\n",
1.20 claudio 596: total_elapsed, slice_mbps, mainstats.peak_mbps,
597: ptb->sflag ? "Rx" : "Tx", pps);
598:
599: /* Clean up this slice time */
600: sc->t_last = t_cur;
601: sc->bytes = 0;
602: sc->udp_slice_pkts = 0;
603: set_slice_timer(1);
1.11 claudio 604: }
1.1 djm 605:
1.20 claudio 606: static void
607: udp_server_handle_sc(int fd, short event, void *v_sc)
1.11 claudio 608: {
609: ssize_t n;
1.20 claudio 610: struct statctx *sc = v_sc;
1.1 djm 611:
1.20 claudio 612: n = read(fd, ptb->dummybuf, ptb->dummybuf_len);
613: if (n == 0)
614: return;
615: else if (n == -1) {
1.34 haesbaer 616: if (errno != EINTR && errno != EWOULDBLOCK)
617: warn("fd %d read error", fd);
1.20 claudio 618: return;
619: }
1.11 claudio 620:
1.20 claudio 621: if (ptb->vflag >= 3)
622: fprintf(stderr, "read: %zd bytes\n", n);
623: /* If this was our first packet, start slice timer */
624: if (mainstats.peak_mbps == 0)
625: set_slice_timer(1);
626: /* Account packet */
627: sc->udp_slice_pkts++;
628: sc->bytes += n;
629: }
630:
631: static void
632: tcp_server_handle_sc(int fd, short event, void *v_sc)
633: {
634: struct statctx *sc = v_sc;
635: ssize_t n;
636:
637: n = read(sc->fd, sc->buf, sc->buflen);
638: if (n == -1) {
1.34 haesbaer 639: if (errno != EINTR && errno != EWOULDBLOCK)
640: warn("fd %d read error", sc->fd);
1.20 claudio 641: return;
642: } else if (n == 0) {
643: if (ptb->vflag)
644: fprintf(stderr, "%8d closed by remote end\n", sc->fd);
1.33 haesbaer 645:
646: TAILQ_REMOVE(&sc_queue, sc, entry);
647:
1.23 sthen 648: event_del(&sc->ev);
1.20 claudio 649: close(sc->fd);
1.33 haesbaer 650:
651: /* Some file descriptors are available again. */
652: if (evtimer_pending(&sc->tcp_ts->evt, NULL)) {
653: evtimer_del(&sc->tcp_ts->evt);
654: event_add(&sc->tcp_ts->ev, NULL);
655: }
656:
1.20 claudio 657: free(sc);
658: mainstats.nconns--;
659: return;
1.1 djm 660: }
1.20 claudio 661: if (ptb->vflag >= 3)
1.11 claudio 662: fprintf(stderr, "read: %zd bytes\n", n);
1.20 claudio 663: sc->bytes += n;
664: mainstats.slice_bytes += n;
665: }
1.11 claudio 666:
1.20 claudio 667: static void
1.33 haesbaer 668: tcp_server_accept(int fd, short event, void *arg)
1.20 claudio 669: {
1.33 haesbaer 670: struct tcpservsock *ts = arg;
1.20 claudio 671: int sock, r;
672: struct statctx *sc;
673: struct sockaddr_storage ss;
674: socklen_t sslen;
675: char tmp[128];
676:
677: sslen = sizeof(ss);
1.33 haesbaer 678:
679: event_add(&ts->ev, NULL);
680: if (event & EV_TIMEOUT)
681: return;
1.20 claudio 682: if ((sock = accept(fd, (struct sockaddr *)&ss, &sslen)) == -1) {
1.33 haesbaer 683: /*
684: * Pause accept if we are out of file descriptors, or
685: * libevent will haunt us here too.
686: */
687: if (errno == ENFILE || errno == EMFILE) {
688: struct timeval evtpause = { 1, 0 };
689:
690: event_del(&ts->ev);
691: evtimer_add(&ts->evt, &evtpause);
1.38 deraadt 692: } else if (errno != EWOULDBLOCK && errno != EINTR &&
693: errno != ECONNABORTED)
1.33 haesbaer 694: warn("accept");
1.20 claudio 695: return;
696: }
697: saddr_ntop((struct sockaddr *)&ss, sslen,
698: tmp, sizeof(tmp));
699: if ((r = fcntl(sock, F_GETFL, 0)) == -1)
700: err(1, "fcntl(F_GETFL)");
701: r |= O_NONBLOCK;
702: if (fcntl(sock, F_SETFL, r) == -1)
703: err(1, "fcntl(F_SETFL, O_NONBLOCK)");
1.24 haesbaer 704: if (ptb->Tflag != -1 && ss.ss_family == AF_INET) {
705: if (setsockopt(sock, IPPROTO_IP, IP_TOS,
706: &ptb->Tflag, sizeof(ptb->Tflag)))
707: err(1, "setsockopt IP_TOS");
708: }
709: if (ptb->Tflag != -1 && ss.ss_family == AF_INET6) {
710: if (setsockopt(sock, IPPROTO_IPV6, IPV6_TCLASS,
711: &ptb->Tflag, sizeof(ptb->Tflag)))
712: err(1, "setsockopt IPV6_TCLASS");
713: }
1.20 claudio 714: /* Alloc client structure and register reading callback */
715: if ((sc = calloc(1, sizeof(*sc))) == NULL)
716: err(1, "calloc");
1.33 haesbaer 717: sc->tcp_ts = ts;
1.20 claudio 718: sc->fd = sock;
719: stats_prepare(sc);
720: event_set(&sc->ev, sc->fd, EV_READ | EV_PERSIST,
721: tcp_server_handle_sc, sc);
722: event_add(&sc->ev, NULL);
723: TAILQ_INSERT_TAIL(&sc_queue, sc, entry);
724: mainstats.nconns++;
1.36 haesbaer 725: if (mainstats.nconns == 1)
726: set_slice_timer(1);
1.20 claudio 727: if (ptb->vflag)
1.28 haesbaer 728: fprintf(stderr, "Accepted connection from %s, fd = %d\n",
729: tmp, sc->fd);
1.1 djm 730: }
731:
1.20 claudio 732: static void
733: server_init(struct addrinfo *aitop, struct statctx *udp_sc)
1.1 djm 734: {
735: char tmp[128];
1.11 claudio 736: int sock, on = 1;
1.1 djm 737: struct addrinfo *ai;
1.20 claudio 738: struct event *ev;
1.33 haesbaer 739: struct tcpservsock *ts;
1.11 claudio 740: nfds_t lnfds;
1.1 djm 741:
1.11 claudio 742: lnfds = 0;
1.1 djm 743: for (ai = aitop; ai != NULL; ai = ai->ai_next) {
744: saddr_ntop(ai->ai_addr, ai->ai_addrlen, tmp, sizeof(tmp));
1.20 claudio 745: if (ptb->vflag)
746: fprintf(stderr, "Try to bind to %s\n", tmp);
1.1 djm 747: if ((sock = socket(ai->ai_family, ai->ai_socktype,
748: ai->ai_protocol)) == -1) {
749: if (ai->ai_next == NULL)
750: err(1, "socket");
1.20 claudio 751: if (ptb->vflag)
1.1 djm 752: warn("socket");
753: continue;
754: }
1.24 haesbaer 755: if (ptb->Tflag != -1 && ai->ai_family == AF_INET) {
756: if (setsockopt(sock, IPPROTO_IP, IP_TOS,
757: &ptb->Tflag, sizeof(ptb->Tflag)))
758: err(1, "setsockopt IP_TOS");
759: }
760: if (ptb->Tflag != -1 && ai->ai_family == AF_INET6) {
761: if (setsockopt(sock, IPPROTO_IPV6, IPV6_TCLASS,
762: &ptb->Tflag, sizeof(ptb->Tflag)))
763: err(1, "setsockopt IPV6_TCLASS");
764: }
1.1 djm 765: if (setsockopt(sock, SOL_SOCKET, SO_REUSEADDR,
766: &on, sizeof(on)) == -1)
767: warn("reuse port");
768: if (bind(sock, ai->ai_addr, ai->ai_addrlen) != 0) {
769: if (ai->ai_next == NULL)
770: err(1, "bind");
1.20 claudio 771: if (ptb->vflag)
1.1 djm 772: warn("bind");
773: close(sock);
774: continue;
775: }
1.20 claudio 776: if (ptb->Sflag) {
1.1 djm 777: if (setsockopt(sock, SOL_SOCKET, SO_RCVBUF,
1.20 claudio 778: &ptb->Sflag, sizeof(ptb->Sflag)) == -1)
779: warn("set receive buffer size");
1.1 djm 780: }
1.20 claudio 781: if (TCP_MODE) {
782: if (listen(sock, 64) == -1) {
783: if (ai->ai_next == NULL)
784: err(1, "listen");
785: if (ptb->vflag)
786: warn("listen");
787: close(sock);
788: continue;
789: }
1.1 djm 790: }
1.33 haesbaer 791: if (UDP_MODE) {
792: if ((ev = calloc(1, sizeof(*ev))) == NULL)
793: err(1, "calloc");
1.20 claudio 794: event_set(ev, sock, EV_READ | EV_PERSIST,
795: udp_server_handle_sc, udp_sc);
1.33 haesbaer 796: event_add(ev, NULL);
797: } else {
798: if ((ts = calloc(1, sizeof(*ts))) == NULL)
799: err(1, "calloc");
800:
801: ts->fd = sock;
802: evtimer_set(&ts->evt, tcp_server_accept, ts);
803: event_set(&ts->ev, ts->fd, EV_READ,
804: tcp_server_accept, ts);
805: event_add(&ts->ev, NULL);
806: }
1.20 claudio 807: if (ptb->vflag >= 3)
808: fprintf(stderr, "bound to fd %d\n", sock);
1.11 claudio 809: lnfds++;
1.1 djm 810: }
811: freeaddrinfo(aitop);
1.11 claudio 812: if (lnfds == 0)
1.1 djm 813: errx(1, "No working listen addresses found");
1.11 claudio 814: }
815:
816: static void
1.20 claudio 817: client_handle_sc(int fd, short event, void *v_sc)
818: {
819: struct statctx *sc = v_sc;
820: ssize_t n;
1.1 djm 821:
1.20 claudio 822: if ((n = write(sc->fd, sc->buf, sc->buflen)) == -1) {
1.34 haesbaer 823: if (errno == EINTR || errno == EWOULDBLOCK ||
1.20 claudio 824: (UDP_MODE && errno == ENOBUFS))
1.34 haesbaer 825: return;
1.20 claudio 826: err(1, "write");
1.11 claudio 827: }
1.20 claudio 828: if (TCP_MODE && n == 0) {
1.28 haesbaer 829: fprintf(stderr, "Remote end closed connection");
1.20 claudio 830: exit(1);
1.1 djm 831: }
1.20 claudio 832: if (ptb->vflag >= 3)
1.28 haesbaer 833: fprintf(stderr, "write: %zd bytes\n", n);
1.20 claudio 834: sc->bytes += n;
835: mainstats.slice_bytes += n;
836: if (UDP_MODE)
837: sc->udp_slice_pkts++;
1.1 djm 838: }
839:
1.20 claudio 840: static void
1.25 haesbaer 841: client_init(struct addrinfo *aitop, int nconn, struct statctx *udp_sc,
842: struct addrinfo *aib)
1.1 djm 843: {
1.20 claudio 844: struct statctx *sc;
845: struct addrinfo *ai;
1.14 claudio 846: char tmp[128];
847: int i, r, sock;
1.1 djm 848:
1.20 claudio 849: sc = udp_sc;
1.4 henning 850: for (i = 0; i < nconn; i++) {
851: for (sock = -1, ai = aitop; ai != NULL; ai = ai->ai_next) {
852: saddr_ntop(ai->ai_addr, ai->ai_addrlen, tmp,
853: sizeof(tmp));
1.20 claudio 854: if (ptb->vflag && i == 0)
1.4 henning 855: fprintf(stderr, "Trying %s\n", tmp);
856: if ((sock = socket(ai->ai_family, ai->ai_socktype,
857: ai->ai_protocol)) == -1) {
858: if (ai->ai_next == NULL)
859: err(1, "socket");
1.20 claudio 860: if (ptb->vflag)
1.4 henning 861: warn("socket");
862: continue;
863: }
1.25 haesbaer 864: if (aib != NULL) {
865: saddr_ntop(aib->ai_addr, aib->ai_addrlen,
866: tmp, sizeof(tmp));
867: if (ptb->vflag)
868: fprintf(stderr,
869: "Try to bind to %s\n", tmp);
870: if (bind(sock, (struct sockaddr *)aib->ai_addr,
871: aib->ai_addrlen) == -1)
872: err(1, "bind");
873: }
1.24 haesbaer 874: if (ptb->Tflag != -1 && ai->ai_family == AF_INET) {
875: if (setsockopt(sock, IPPROTO_IP, IP_TOS,
876: &ptb->Tflag, sizeof(ptb->Tflag)))
877: err(1, "setsockopt IP_TOS");
878: }
879: if (ptb->Tflag != -1 && ai->ai_family == AF_INET6) {
880: if (setsockopt(sock, IPPROTO_IPV6, IPV6_TCLASS,
881: &ptb->Tflag, sizeof(ptb->Tflag)))
882: err(1, "setsockopt IPV6_TCLASS");
883: }
1.20 claudio 884: if (ptb->Sflag) {
1.4 henning 885: if (setsockopt(sock, SOL_SOCKET, SO_SNDBUF,
1.20 claudio 886: &ptb->Sflag, sizeof(ptb->Sflag)) == -1)
1.4 henning 887: warn("set TCP send buffer size");
888: }
889: if (connect(sock, ai->ai_addr, ai->ai_addrlen) != 0) {
890: if (ai->ai_next == NULL)
891: err(1, "connect");
1.20 claudio 892: if (ptb->vflag)
1.4 henning 893: warn("connect");
894: close(sock);
895: sock = -1;
896: continue;
897: }
898: break;
1.1 djm 899: }
1.4 henning 900: if (sock == -1)
901: errx(1, "No host found");
902: if ((r = fcntl(sock, F_GETFL, 0)) == -1)
903: err(1, "fcntl(F_GETFL)");
904: r |= O_NONBLOCK;
905: if (fcntl(sock, F_SETFL, r) == -1)
906: err(1, "fcntl(F_SETFL, O_NONBLOCK)");
1.20 claudio 907: /* Alloc and prepare stats */
908: if (TCP_MODE) {
909: if ((sc = calloc(1, sizeof(*sc))) == NULL)
910: err(1, "calloc");
911: }
912: sc->fd = sock;
913: stats_prepare(sc);
914: event_set(&sc->ev, sc->fd, EV_WRITE | EV_PERSIST,
915: client_handle_sc, sc);
916: event_add(&sc->ev, NULL);
917: TAILQ_INSERT_TAIL(&sc_queue, sc, entry);
918: mainstats.nconns++;
1.36 haesbaer 919: if (mainstats.nconns == 1)
920: set_slice_timer(1);
1.14 claudio 921: }
922: freeaddrinfo(aitop);
1.35 haesbaer 923: if (aib != NULL)
924: freeaddrinfo(aib);
1.14 claudio 925:
1.20 claudio 926: if (ptb->vflag && nconn > 1)
1.29 haesbaer 927: fprintf(stderr, "%d connections established\n",
928: mainstats.nconns);
1.14 claudio 929: }
930:
1.24 haesbaer 931: static int
932: map_tos(char *s, int *val)
933: {
934: /* DiffServ Codepoints and other TOS mappings */
935: const struct toskeywords {
936: const char *keyword;
937: int val;
938: } *t, toskeywords[] = {
939: { "af11", IPTOS_DSCP_AF11 },
940: { "af12", IPTOS_DSCP_AF12 },
941: { "af13", IPTOS_DSCP_AF13 },
942: { "af21", IPTOS_DSCP_AF21 },
943: { "af22", IPTOS_DSCP_AF22 },
944: { "af23", IPTOS_DSCP_AF23 },
945: { "af31", IPTOS_DSCP_AF31 },
946: { "af32", IPTOS_DSCP_AF32 },
947: { "af33", IPTOS_DSCP_AF33 },
948: { "af41", IPTOS_DSCP_AF41 },
949: { "af42", IPTOS_DSCP_AF42 },
950: { "af43", IPTOS_DSCP_AF43 },
951: { "critical", IPTOS_PREC_CRITIC_ECP },
952: { "cs0", IPTOS_DSCP_CS0 },
953: { "cs1", IPTOS_DSCP_CS1 },
954: { "cs2", IPTOS_DSCP_CS2 },
955: { "cs3", IPTOS_DSCP_CS3 },
956: { "cs4", IPTOS_DSCP_CS4 },
957: { "cs5", IPTOS_DSCP_CS5 },
958: { "cs6", IPTOS_DSCP_CS6 },
959: { "cs7", IPTOS_DSCP_CS7 },
960: { "ef", IPTOS_DSCP_EF },
961: { "inetcontrol", IPTOS_PREC_INTERNETCONTROL },
962: { "lowdelay", IPTOS_LOWDELAY },
963: { "netcontrol", IPTOS_PREC_NETCONTROL },
964: { "reliability", IPTOS_RELIABILITY },
965: { "throughput", IPTOS_THROUGHPUT },
966: { NULL, -1 },
967: };
968:
969: for (t = toskeywords; t->keyword != NULL; t++) {
970: if (strcmp(s, t->keyword) == 0) {
971: *val = t->val;
972: return (1);
973: }
974: }
975:
976: return (0);
977: }
978:
1.30 henning 979: static void
980: quit(int sig, short event, void *arg)
981: {
982: exit(0);
983: }
984:
1.1 djm 985: int
986: main(int argc, char **argv)
987: {
988: extern int optind;
989: extern char *optarg;
1.30 henning 990: struct timeval tv;
1.37 haesbaer 991: unsigned int secs, rtable;
1.1 djm 992:
993: char kerr[_POSIX2_LINE_MAX], *tmp;
1.25 haesbaer 994: struct addrinfo *aitop, *aib, hints;
1.1 djm 995: const char *errstr;
1.11 claudio 996: struct rlimit rl;
1.20 claudio 997: int ch, herr, nconn;
1.12 deraadt 998: struct nlist nl[] = { { "_tcbtable" }, { "" } };
1.25 haesbaer 999: const char *host = NULL, *port = DEFAULT_PORT, *srcbind = NULL;
1.30 henning 1000: struct event ev_sigint, ev_sigterm, ev_sighup, ev_progtimer;
1.20 claudio 1001: struct statctx *udp_sc = NULL;
1.1 djm 1002:
1.20 claudio 1003: /* Init world */
1.26 haesbaer 1004: setlinebuf(stdout);
1.20 claudio 1005: ptb = &tcpbench;
1006: ptb->dummybuf_len = 0;
1.37 haesbaer 1007: ptb->Sflag = ptb->sflag = ptb->vflag = 0;
1.20 claudio 1008: ptb->kvmh = NULL;
1009: ptb->kvars = NULL;
1010: ptb->rflag = DEFAULT_STATS_INTERVAL;
1.24 haesbaer 1011: ptb->Tflag = -1;
1.20 claudio 1012: nconn = 1;
1.25 haesbaer 1013: aib = NULL;
1.30 henning 1014: secs = 0;
1.1 djm 1015:
1.30 henning 1016: while ((ch = getopt(argc, argv, "b:B:hlk:n:p:r:sS:t:T:uvV:")) != -1) {
1.1 djm 1017: switch (ch) {
1.25 haesbaer 1018: case 'b':
1019: srcbind = optarg;
1020: break;
1.1 djm 1021: case 'l':
1022: list_kvars();
1023: exit(0);
1024: case 'k':
1025: if ((tmp = strdup(optarg)) == NULL)
1026: errx(1, "strdup");
1.20 claudio 1027: ptb->kvars = check_prepare_kvars(tmp);
1.1 djm 1028: free(tmp);
1029: break;
1030: case 'r':
1.20 claudio 1031: ptb->rflag = strtonum(optarg, 0, 60 * 60 * 24 * 1000,
1.1 djm 1032: &errstr);
1033: if (errstr != NULL)
1034: errx(1, "statistics interval is %s: %s",
1035: errstr, optarg);
1036: break;
1037: case 'p':
1038: port = optarg;
1039: break;
1040: case 's':
1.20 claudio 1041: ptb->sflag = 1;
1.1 djm 1042: break;
1043: case 'S':
1.20 claudio 1044: ptb->Sflag = strtonum(optarg, 0, 1024*1024*1024,
1.1 djm 1045: &errstr);
1046: if (errstr != NULL)
1047: errx(1, "receive space interval is %s: %s",
1048: errstr, optarg);
1049: break;
1050: case 'B':
1.20 claudio 1051: ptb->dummybuf_len = strtonum(optarg, 0, 1024*1024*1024,
1.1 djm 1052: &errstr);
1053: if (errstr != NULL)
1054: errx(1, "read/write buffer size is %s: %s",
1055: errstr, optarg);
1056: break;
1057: case 'v':
1.20 claudio 1058: ptb->vflag++;
1.9 claudio 1059: break;
1060: case 'V':
1.37 haesbaer 1061: rtable = (unsigned int)strtonum(optarg, 0,
1.9 claudio 1062: RT_TABLEID_MAX, &errstr);
1063: if (errstr)
1.17 guenther 1064: errx(1, "rtable value is %s: %s",
1.9 claudio 1065: errstr, optarg);
1.37 haesbaer 1066: if (setrtable(rtable) == -1)
1067: err(1, "setrtable");
1.1 djm 1068: break;
1.4 henning 1069: case 'n':
1070: nconn = strtonum(optarg, 0, 65535, &errstr);
1071: if (errstr != NULL)
1072: errx(1, "number of connections is %s: %s",
1073: errstr, optarg);
1074: break;
1.20 claudio 1075: case 'u':
1076: ptb->uflag = 1;
1.24 haesbaer 1077: break;
1078: case 'T':
1079: if (map_tos(optarg, &ptb->Tflag))
1080: break;
1081: errstr = NULL;
1082: if (strlen(optarg) > 1 && optarg[0] == '0' &&
1083: optarg[1] == 'x')
1084: ptb->Tflag = (int)strtol(optarg, NULL, 16);
1085: else
1086: ptb->Tflag = (int)strtonum(optarg, 0, 255,
1087: &errstr);
1088: if (ptb->Tflag == -1 || ptb->Tflag > 255 || errstr)
1089: errx(1, "illegal tos value %s", optarg);
1.20 claudio 1090: break;
1.30 henning 1091: case 't':
1092: secs = strtonum(optarg, 1, UINT_MAX, &errstr);
1093: if (errstr != NULL)
1094: errx(1, "secs is %s: %s",
1095: errstr, optarg);
1096: break;
1.1 djm 1097: case 'h':
1098: default:
1099: usage();
1100: }
1101: }
1102:
1103: argv += optind;
1104: argc -= optind;
1.20 claudio 1105: if ((argc != (ptb->sflag ? 0 : 1)) ||
1106: (UDP_MODE && (ptb->kvars || nconn != 1)))
1.1 djm 1107: usage();
1.4 henning 1108:
1.20 claudio 1109: if (!ptb->sflag)
1.1 djm 1110: host = argv[0];
1.20 claudio 1111: /*
1112: * Rationale,
1113: * If TCP, use a big buffer with big reads/writes.
1114: * If UDP, use a big buffer in server and a buffer the size of a
1115: * ethernet packet.
1116: */
1117: if (!ptb->dummybuf_len) {
1118: if (ptb->sflag || TCP_MODE)
1119: ptb->dummybuf_len = DEFAULT_BUF;
1120: else
1121: ptb->dummybuf_len = DEFAULT_UDP_PKT;
1122: }
1.1 djm 1123:
1.13 claudio 1124: bzero(&hints, sizeof(hints));
1.25 haesbaer 1125: if (UDP_MODE) {
1.20 claudio 1126: hints.ai_socktype = SOCK_DGRAM;
1.25 haesbaer 1127: hints.ai_protocol = IPPROTO_UDP;
1.27 haesbaer 1128: } else {
1.20 claudio 1129: hints.ai_socktype = SOCK_STREAM;
1.25 haesbaer 1130: hints.ai_protocol = IPPROTO_TCP;
1131: }
1.20 claudio 1132: if (ptb->sflag)
1.4 henning 1133: hints.ai_flags = AI_PASSIVE;
1.25 haesbaer 1134: if (srcbind != NULL) {
1135: hints.ai_flags |= AI_NUMERICHOST;
1136: herr = getaddrinfo(srcbind, NULL, &hints, &aib);
1137: hints.ai_flags &= ~AI_NUMERICHOST;
1138: if (herr != 0) {
1139: if (herr == EAI_SYSTEM)
1140: err(1, "getaddrinfo");
1141: else
1142: errx(1, "getaddrinfo: %s", gai_strerror(herr));
1143: }
1144: }
1.13 claudio 1145: if ((herr = getaddrinfo(host, port, &hints, &aitop)) != 0) {
1146: if (herr == EAI_SYSTEM)
1147: err(1, "getaddrinfo");
1148: else
1149: errx(1, "getaddrinfo: %s", gai_strerror(herr));
1.1 djm 1150: }
1.20 claudio 1151: if (ptb->kvars) {
1152: if ((ptb->kvmh = kvm_openfiles(NULL, NULL, NULL,
1.1 djm 1153: O_RDONLY, kerr)) == NULL)
1154: errx(1, "kvm_open: %s", kerr);
1155: drop_gid();
1.20 claudio 1156: if (kvm_nlist(ptb->kvmh, nl) < 0 || nl[0].n_type == 0)
1.1 djm 1157: errx(1, "kvm: no namelist");
1.20 claudio 1158: ptb->ktcbtab = nl[0].n_value;
1.1 djm 1159: } else
1160: drop_gid();
1161:
1.11 claudio 1162: if (getrlimit(RLIMIT_NOFILE, &rl) == -1)
1163: err(1, "getrlimit");
1164: if (rl.rlim_cur < MAX_FD)
1165: rl.rlim_cur = MAX_FD;
1166: if (setrlimit(RLIMIT_NOFILE, &rl))
1167: err(1, "setrlimit");
1168: if (getrlimit(RLIMIT_NOFILE, &rl) == -1)
1169: err(1, "getrlimit");
1170:
1.20 claudio 1171: /* Init world */
1172: TAILQ_INIT(&sc_queue);
1173: if ((ptb->dummybuf = malloc(ptb->dummybuf_len)) == NULL)
1174: err(1, "malloc");
1175: arc4random_buf(ptb->dummybuf, ptb->dummybuf_len);
1176:
1177: /* Setup libevent and signals */
1178: event_init();
1179: signal_set(&ev_sigterm, SIGTERM, signal_handler, NULL);
1180: signal_set(&ev_sighup, SIGHUP, signal_handler, NULL);
1181: signal_set(&ev_sigint, SIGINT, signal_handler, NULL);
1182: signal_add(&ev_sigint, NULL);
1183: signal_add(&ev_sigterm, NULL);
1184: signal_add(&ev_sighup, NULL);
1185: signal(SIGPIPE, SIG_IGN);
1186:
1.27 haesbaer 1187: if (UDP_MODE) {
1188: if ((udp_sc = calloc(1, sizeof(*udp_sc))) == NULL)
1189: err(1, "calloc");
1190: udp_sc->fd = -1;
1191: stats_prepare(udp_sc);
1192: evtimer_set(&mainstats.timer, udp_process_slice, udp_sc);
1193: } else {
1.20 claudio 1194: print_tcp_header();
1195: evtimer_set(&mainstats.timer, tcp_process_slice, NULL);
1.27 haesbaer 1196: }
1.20 claudio 1197:
1.27 haesbaer 1198: if (ptb->sflag)
1.20 claudio 1199: server_init(aitop, udp_sc);
1.30 henning 1200: else {
1201: if (secs > 0) {
1202: timerclear(&tv);
1203: tv.tv_sec = secs + 1;
1204: evtimer_set(&ev_progtimer, quit, NULL);
1205: evtimer_add(&ev_progtimer, &tv);
1206: }
1.25 haesbaer 1207: client_init(aitop, nconn, udp_sc, aib);
1.30 henning 1208: }
1.20 claudio 1209:
1210: /* libevent main loop*/
1211: event_dispatch();
1.1 djm 1212:
1.20 claudio 1213: return (0);
1.1 djm 1214: }