Annotation of src/usr.bin/tcpbench/tcpbench.c, Revision 1.51
1.1 djm 1: /*
2: * Copyright (c) 2008 Damien Miller <djm@mindrot.org>
1.20 claudio 3: * Copyright (c) 2011 Christiano F. Haesbaert <haesbaert@haesbaert.org>
1.1 djm 4: *
5: * Permission to use, copy, modify, and distribute this software for any
6: * purpose with or without fee is hereby granted, provided that the above
7: * copyright notice and this permission notice appear in all copies.
8: *
9: * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
10: * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
11: * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
12: * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
13: * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
14: * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
15: * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
16: */
17:
18: #include <sys/types.h>
19: #include <sys/time.h>
20: #include <sys/socket.h>
21: #include <sys/socketvar.h>
1.11 claudio 22: #include <sys/resource.h>
1.20 claudio 23: #include <sys/queue.h>
1.51 ! claudio 24: #include <sys/un.h>
1.1 djm 25:
26: #include <net/route.h>
27:
28: #include <netinet/in.h>
29: #include <netinet/ip.h>
30: #include <netinet/tcp.h>
31: #include <netinet/tcp_timer.h>
32: #include <netinet/tcp_fsm.h>
33: #include <netinet/in_pcb.h>
34: #include <netinet/tcp_var.h>
35:
36: #include <arpa/inet.h>
37:
38: #include <unistd.h>
39: #include <limits.h>
40: #include <stdlib.h>
41: #include <stdio.h>
42: #include <string.h>
43: #include <errno.h>
1.20 claudio 44: #include <event.h>
1.1 djm 45: #include <netdb.h>
46: #include <signal.h>
47: #include <err.h>
48: #include <fcntl.h>
49: #include <poll.h>
50:
51: #include <kvm.h>
52: #include <nlist.h>
53:
1.11 claudio 54: #define DEFAULT_PORT "12345"
55: #define DEFAULT_STATS_INTERVAL 1000 /* ms */
1.20 claudio 56: #define DEFAULT_BUF (256 * 1024)
57: #define DEFAULT_UDP_PKT (1500 - 28) /* TODO don't hardcode this */
58: #define TCP_MODE !ptb->uflag
59: #define UDP_MODE ptb->uflag
1.11 claudio 60: #define MAX_FD 1024
1.1 djm 61:
1.20 claudio 62: /* Our tcpbench globals */
63: struct {
64: int Sflag; /* Socket buffer size (tcp mode) */
65: u_int rflag; /* Report rate (ms) */
66: int sflag; /* True if server */
1.24 haesbaer 67: int Tflag; /* ToS if != -1 */
1.20 claudio 68: int vflag; /* Verbose */
69: int uflag; /* UDP mode */
1.51 ! claudio 70: int Uflag; /* UNIX (AF_LOCAL) mode */
! 71: int Rflag; /* randomize client write size */
1.20 claudio 72: kvm_t *kvmh; /* Kvm handler */
73: char **kvars; /* Kvm enabled vars */
74: u_long ktcbtab; /* Ktcb */
75: char *dummybuf; /* IO buffer */
76: size_t dummybuf_len; /* IO buffer len */
77: } tcpbench, *ptb;
1.1 djm 78:
1.33 haesbaer 79: struct tcpservsock {
80: struct event ev;
81: struct event evt;
82: int fd;
83: };
84:
1.20 claudio 85: /* stats for a single tcp connection, udp uses only one */
1.1 djm 86: struct statctx {
1.20 claudio 87: TAILQ_ENTRY(statctx) entry;
1.11 claudio 88: struct timeval t_start, t_last;
1.1 djm 89: unsigned long long bytes;
1.20 claudio 90: int fd;
91: char *buf;
92: size_t buflen;
93: struct event ev;
94: /* TCP only */
1.33 haesbaer 95: struct tcpservsock *tcp_ts;
1.20 claudio 96: u_long tcp_tcbaddr;
97: /* UDP only */
98: u_long udp_slice_pkts;
1.1 djm 99: };
100:
1.20 claudio 101: static void signal_handler(int, short, void *);
102: static void saddr_ntop(const struct sockaddr *, socklen_t, char *, size_t);
103: static void drop_gid(void);
104: static void set_slice_timer(int);
105: static void print_tcp_header(void);
106: static void kget(u_long, void *, size_t);
107: static u_long kfind_tcb(int);
108: static void kupdate_stats(u_long, struct inpcb *, struct tcpcb *,
109: struct socket *);
110: static void list_kvars(void);
111: static void check_kvar(const char *);
112: static char ** check_prepare_kvars(char *);
113: static void stats_prepare(struct statctx *);
114: static void tcp_stats_display(unsigned long long, long double, float,
115: struct statctx *, struct inpcb *, struct tcpcb *, struct socket *);
116: static void tcp_process_slice(int, short, void *);
117: static void tcp_server_handle_sc(int, short, void *);
118: static void tcp_server_accept(int, short, void *);
119: static void server_init(struct addrinfo *, struct statctx *);
120: static void client_handle_sc(int, short, void *);
1.25 haesbaer 121: static void client_init(struct addrinfo *, int, struct statctx *,
122: struct addrinfo *);
1.20 claudio 123: static int clock_gettime_tv(clockid_t, struct timeval *);
124: static void udp_server_handle_sc(int, short, void *);
125: static void udp_process_slice(int, short, void *);
1.24 haesbaer 126: static int map_tos(char *, int *);
1.11 claudio 127: /*
128: * We account the mainstats here, that is the stats
129: * for all connections, all variables starting with slice
130: * are used to account information for the timeslice
131: * between each output. Peak variables record the highest
132: * between all slices so far.
133: */
134: static struct {
135: unsigned long long slice_bytes; /* bytes for last slice */
136: long double peak_mbps; /* peak mbps so far */
137: int nconns; /* connected clients */
1.20 claudio 138: struct event timer; /* process timer */
1.11 claudio 139: } mainstats;
140:
1.20 claudio 141: /* When adding variables, also add to tcp_stats_display() */
1.1 djm 142: static const char *allowed_kvars[] = {
143: "inpcb.inp_flags",
144: "sockb.so_rcv.sb_cc",
1.26 haesbaer 145: "sockb.so_rcv.sb_hiwat",
1.19 claudio 146: "sockb.so_rcv.sb_wat",
1.1 djm 147: "sockb.so_snd.sb_cc",
1.26 haesbaer 148: "sockb.so_snd.sb_hiwat",
1.19 claudio 149: "sockb.so_snd.sb_wat",
1.26 haesbaer 150: "tcpcb.last_ack_sent",
151: "tcpcb.max_sndwnd",
152: "tcpcb.rcv_adv",
153: "tcpcb.rcv_nxt",
154: "tcpcb.rcv_scale",
155: "tcpcb.rcv_wnd",
156: "tcpcb.rfbuf_cnt",
157: "tcpcb.rfbuf_ts",
158: "tcpcb.snd_cwnd",
159: "tcpcb.snd_max",
160: "tcpcb.snd_nxt",
161: "tcpcb.snd_scale",
162: "tcpcb.snd_ssthresh",
1.1 djm 163: "tcpcb.snd_una",
164: "tcpcb.snd_wl1",
165: "tcpcb.snd_wl2",
166: "tcpcb.snd_wnd",
167: "tcpcb.t_rcvtime",
1.26 haesbaer 168: "tcpcb.t_rtseq",
169: "tcpcb.t_rttmin",
1.1 djm 170: "tcpcb.t_rtttime",
1.26 haesbaer 171: "tcpcb.t_rttvar",
1.1 djm 172: "tcpcb.t_srtt",
1.26 haesbaer 173: "tcpcb.ts_recent",
1.19 claudio 174: "tcpcb.ts_recent_age",
1.1 djm 175: NULL
176: };
177:
1.20 claudio 178: TAILQ_HEAD(, statctx) sc_queue;
1.1 djm 179:
180: static void __dead
181: usage(void)
182: {
183: fprintf(stderr,
1.6 jmc 184: "usage: tcpbench -l\n"
1.51 ! claudio 185: " tcpbench [-46RUuv] [-B buf] [-b addr] [-k kvars] [-n connections]\n"
1.25 haesbaer 186: " [-p port] [-r interval] [-S space] [-T toskeyword]\n"
1.30 henning 187: " [-t secs] [-V rtable] hostname\n"
1.51 ! claudio 188: " tcpbench -s [-46Uuv] [-B buf] [-k kvars] [-p port] [-r interval]\n"
! 189: " [-S space] [-T toskeyword] [-V rtable] [hostname]\n");
1.1 djm 190: exit(1);
191: }
192:
193: static void
1.20 claudio 194: signal_handler(int sig, short event, void *bula)
195: {
196: /*
197: * signal handler rules don't apply, libevent decouples for us
198: */
199: switch (sig) {
200: case SIGINT:
201: case SIGTERM:
202: case SIGHUP:
203: warnx("Terminated by signal %d", sig);
204: exit(0);
205: break; /* NOTREACHED */
206: default:
207: errx(1, "unexpected signal %d", sig);
208: break; /* NOTREACHED */
209: }
210: }
211:
212: static void
1.1 djm 213: saddr_ntop(const struct sockaddr *addr, socklen_t alen, char *buf, size_t len)
214: {
215: char hbuf[NI_MAXHOST], pbuf[NI_MAXSERV];
216: int herr;
217:
1.51 ! claudio 218: if (addr->sa_family == AF_UNIX) {
! 219: struct sockaddr_un *sun = (struct sockaddr_un *)addr;
! 220: snprintf(buf, len, "%s", sun->sun_path);
! 221: return;
! 222: }
1.3 djm 223: if ((herr = getnameinfo(addr, alen, hbuf, sizeof(hbuf),
224: pbuf, sizeof(pbuf), NI_NUMERICHOST|NI_NUMERICSERV)) != 0) {
1.1 djm 225: if (herr == EAI_SYSTEM)
226: err(1, "getnameinfo");
227: else
228: errx(1, "getnameinfo: %s", gai_strerror(herr));
229: }
230: snprintf(buf, len, "[%s]:%s", hbuf, pbuf);
231: }
232:
233: static void
1.20 claudio 234: drop_gid(void)
235: {
236: gid_t gid;
237:
238: gid = getgid();
239: if (setresgid(gid, gid, gid) == -1)
240: err(1, "setresgid");
241: }
242:
243: static void
244: set_slice_timer(int on)
1.11 claudio 245: {
1.20 claudio 246: struct timeval tv;
1.11 claudio 247:
1.20 claudio 248: if (ptb->rflag == 0)
1.11 claudio 249: return;
250:
1.20 claudio 251: if (on) {
252: if (evtimer_pending(&mainstats.timer, NULL))
253: return;
254: timerclear(&tv);
255: /* XXX Is there a better way to do this ? */
256: tv.tv_sec = ptb->rflag / 1000;
257: tv.tv_usec = (ptb->rflag % 1000) * 1000;
258:
259: evtimer_add(&mainstats.timer, &tv);
260: } else if (evtimer_pending(&mainstats.timer, NULL))
261: evtimer_del(&mainstats.timer);
262: }
1.11 claudio 263:
1.20 claudio 264: static int
265: clock_gettime_tv(clockid_t clock_id, struct timeval *tv)
266: {
267: struct timespec ts;
268:
269: if (clock_gettime(clock_id, &ts) == -1)
270: return (-1);
271:
272: TIMESPEC_TO_TIMEVAL(tv, &ts);
273:
274: return (0);
1.11 claudio 275: }
276:
277: static void
1.20 claudio 278: print_tcp_header(void)
1.11 claudio 279: {
280: char **kv;
1.20 claudio 281:
1.11 claudio 282: printf("%12s %14s %12s %8s ", "elapsed_ms", "bytes", "mbps",
283: "bwidth");
1.20 claudio 284: for (kv = ptb->kvars; ptb->kvars != NULL && *kv != NULL; kv++)
285: printf("%s%s", kv != ptb->kvars ? "," : "", *kv);
1.11 claudio 286: printf("\n");
287: }
288:
289: static void
1.20 claudio 290: kget(u_long addr, void *buf, size_t size)
1.1 djm 291: {
1.20 claudio 292: if (kvm_read(ptb->kvmh, addr, buf, size) != (ssize_t)size)
293: errx(1, "kvm_read: %s", kvm_geterr(ptb->kvmh));
1.1 djm 294: }
295:
296: static u_long
1.20 claudio 297: kfind_tcb(int sock)
1.1 djm 298: {
299: struct inpcbtable tcbtab;
1.40 tedu 300: struct inpcb *next, *prev;
1.41 tedu 301: struct inpcb inpcb, prevpcb;
1.1 djm 302: struct tcpcb tcpcb;
303:
304: struct sockaddr_storage me, them;
305: socklen_t melen, themlen;
306: struct sockaddr_in *in4;
307: struct sockaddr_in6 *in6;
308: char tmp1[64], tmp2[64];
1.11 claudio 309: int nretry;
1.1 djm 310:
1.11 claudio 311: nretry = 10;
1.1 djm 312: melen = themlen = sizeof(struct sockaddr_storage);
313: if (getsockname(sock, (struct sockaddr *)&me, &melen) == -1)
314: err(1, "getsockname");
315: if (getpeername(sock, (struct sockaddr *)&them, &themlen) == -1)
316: err(1, "getpeername");
317: if (me.ss_family != them.ss_family)
318: errx(1, "%s: me.ss_family != them.ss_family", __func__);
319: if (me.ss_family != AF_INET && me.ss_family != AF_INET6)
320: errx(1, "%s: unknown socket family", __func__);
1.20 claudio 321: if (ptb->vflag >= 2) {
1.1 djm 322: saddr_ntop((struct sockaddr *)&me, me.ss_len,
323: tmp1, sizeof(tmp1));
324: saddr_ntop((struct sockaddr *)&them, them.ss_len,
325: tmp2, sizeof(tmp2));
326: fprintf(stderr, "Our socket local %s remote %s\n", tmp1, tmp2);
327: }
1.20 claudio 328: if (ptb->vflag >= 2)
329: fprintf(stderr, "Using PCB table at %lu\n", ptb->ktcbtab);
1.11 claudio 330: retry:
1.20 claudio 331: kget(ptb->ktcbtab, &tcbtab, sizeof(tcbtab));
1.40 tedu 332: prev = NULL;
1.39 krw 333: next = TAILQ_FIRST(&tcbtab.inpt_queue);
1.1 djm 334:
1.20 claudio 335: if (ptb->vflag >= 2)
1.40 tedu 336: fprintf(stderr, "PCB start at %p\n", next);
337: while (next != NULL) {
1.20 claudio 338: if (ptb->vflag >= 2)
1.1 djm 339: fprintf(stderr, "Checking PCB %p\n", next);
1.20 claudio 340: kget((u_long)next, &inpcb, sizeof(inpcb));
1.41 tedu 341: if (prev != NULL) {
342: kget((u_long)prev, &prevpcb, sizeof(prevpcb));
343: if (TAILQ_NEXT(&prevpcb, inp_queue) != next) {
344: if (nretry--) {
345: warnx("PCB prev pointer insane");
346: goto retry;
347: } else
348: errx(1, "PCB prev pointer insane,"
349: " all attempts exhaused");
350: }
351: }
1.1 djm 352: prev = next;
1.39 krw 353: next = TAILQ_NEXT(&inpcb, inp_queue);
1.1 djm 354:
355: if (me.ss_family == AF_INET) {
356: if ((inpcb.inp_flags & INP_IPV6) != 0) {
1.20 claudio 357: if (ptb->vflag >= 2)
1.1 djm 358: fprintf(stderr, "Skip: INP_IPV6");
359: continue;
360: }
1.20 claudio 361: if (ptb->vflag >= 2) {
1.1 djm 362: inet_ntop(AF_INET, &inpcb.inp_laddr,
363: tmp1, sizeof(tmp1));
364: inet_ntop(AF_INET, &inpcb.inp_faddr,
365: tmp2, sizeof(tmp2));
366: fprintf(stderr, "PCB %p local: [%s]:%d "
367: "remote: [%s]:%d\n", prev,
368: tmp1, inpcb.inp_lport,
369: tmp2, inpcb.inp_fport);
370: }
371: in4 = (struct sockaddr_in *)&me;
372: if (memcmp(&in4->sin_addr, &inpcb.inp_laddr,
373: sizeof(struct in_addr)) != 0 ||
374: in4->sin_port != inpcb.inp_lport)
375: continue;
376: in4 = (struct sockaddr_in *)&them;
377: if (memcmp(&in4->sin_addr, &inpcb.inp_faddr,
378: sizeof(struct in_addr)) != 0 ||
379: in4->sin_port != inpcb.inp_fport)
380: continue;
381: } else {
382: if ((inpcb.inp_flags & INP_IPV6) == 0)
383: continue;
1.20 claudio 384: if (ptb->vflag >= 2) {
1.1 djm 385: inet_ntop(AF_INET6, &inpcb.inp_laddr6,
386: tmp1, sizeof(tmp1));
387: inet_ntop(AF_INET6, &inpcb.inp_faddr6,
388: tmp2, sizeof(tmp2));
389: fprintf(stderr, "PCB %p local: [%s]:%d "
390: "remote: [%s]:%d\n", prev,
391: tmp1, inpcb.inp_lport,
392: tmp2, inpcb.inp_fport);
393: }
394: in6 = (struct sockaddr_in6 *)&me;
395: if (memcmp(&in6->sin6_addr, &inpcb.inp_laddr6,
396: sizeof(struct in6_addr)) != 0 ||
397: in6->sin6_port != inpcb.inp_lport)
398: continue;
399: in6 = (struct sockaddr_in6 *)&them;
400: if (memcmp(&in6->sin6_addr, &inpcb.inp_faddr6,
401: sizeof(struct in6_addr)) != 0 ||
402: in6->sin6_port != inpcb.inp_fport)
403: continue;
404: }
1.20 claudio 405: kget((u_long)inpcb.inp_ppcb, &tcpcb, sizeof(tcpcb));
1.1 djm 406: if (tcpcb.t_state != TCPS_ESTABLISHED) {
1.20 claudio 407: if (ptb->vflag >= 2)
1.1 djm 408: fprintf(stderr, "Not established\n");
409: continue;
410: }
1.20 claudio 411: if (ptb->vflag >= 2)
1.1 djm 412: fprintf(stderr, "Found PCB at %p\n", prev);
1.20 claudio 413: return ((u_long)prev);
1.1 djm 414: }
415:
416: errx(1, "No matching PCB found");
417: }
418:
419: static void
1.20 claudio 420: kupdate_stats(u_long tcbaddr, struct inpcb *inpcb,
421: struct tcpcb *tcpcb, struct socket *sockb)
1.1 djm 422: {
1.20 claudio 423: kget(tcbaddr, inpcb, sizeof(*inpcb));
424: kget((u_long)inpcb->inp_ppcb, tcpcb, sizeof(*tcpcb));
425: kget((u_long)inpcb->inp_socket, sockb, sizeof(*sockb));
1.1 djm 426: }
427:
428: static void
429: check_kvar(const char *var)
430: {
1.16 deraadt 431: u_int i;
1.1 djm 432:
433: for (i = 0; allowed_kvars[i] != NULL; i++)
434: if (strcmp(allowed_kvars[i], var) == 0)
435: return;
436: errx(1, "Unrecognised kvar: %s", var);
437: }
438:
439: static void
440: list_kvars(void)
441: {
1.16 deraadt 442: u_int i;
1.1 djm 443:
1.26 haesbaer 444: printf("Supported kernel variables:\n");
1.1 djm 445: for (i = 0; allowed_kvars[i] != NULL; i++)
1.26 haesbaer 446: printf("\t%s\n", allowed_kvars[i]);
1.1 djm 447: }
448:
449: static char **
450: check_prepare_kvars(char *list)
451: {
452: char *item, **ret = NULL;
1.16 deraadt 453: u_int n = 0;
1.1 djm 454:
455: while ((item = strsep(&list, ", \t\n")) != NULL) {
456: check_kvar(item);
1.43 lteo 457: if ((ret = reallocarray(ret, (++n + 1), sizeof(*ret))) == NULL)
458: errx(1, "reallocarray(kvars)");
1.1 djm 459: if ((ret[n - 1] = strdup(item)) == NULL)
460: errx(1, "strdup");
461: ret[n] = NULL;
462: }
1.20 claudio 463: return (ret);
1.1 djm 464: }
465:
466: static void
1.20 claudio 467: stats_prepare(struct statctx *sc)
1.1 djm 468: {
1.20 claudio 469: sc->buf = ptb->dummybuf;
470: sc->buflen = ptb->dummybuf_len;
471:
472: if (ptb->kvars)
473: sc->tcp_tcbaddr = kfind_tcb(sc->fd);
474: if (clock_gettime_tv(CLOCK_MONOTONIC, &sc->t_start) == -1)
475: err(1, "clock_gettime_tv");
1.1 djm 476: sc->t_last = sc->t_start;
477:
478: }
479:
480: static void
1.20 claudio 481: tcp_stats_display(unsigned long long total_elapsed, long double mbps,
1.11 claudio 482: float bwperc, struct statctx *sc, struct inpcb *inpcb,
483: struct tcpcb *tcpcb, struct socket *sockb)
484: {
485: int j;
486:
487: printf("%12llu %14llu %12.3Lf %7.2f%% ", total_elapsed, sc->bytes,
488: mbps, bwperc);
489:
1.20 claudio 490: if (ptb->kvars != NULL) {
491: kupdate_stats(sc->tcp_tcbaddr, inpcb, tcpcb,
1.11 claudio 492: sockb);
1.1 djm 493:
1.20 claudio 494: for (j = 0; ptb->kvars[j] != NULL; j++) {
1.11 claudio 495: #define S(a) #a
496: #define P(b, v, f) \
1.20 claudio 497: if (strcmp(ptb->kvars[j], S(b.v)) == 0) { \
1.11 claudio 498: printf("%s"f, j > 0 ? "," : "", b->v); \
499: continue; \
500: }
501: P(inpcb, inp_flags, "0x%08x")
502: P(sockb, so_rcv.sb_cc, "%lu")
1.26 haesbaer 503: P(sockb, so_rcv.sb_hiwat, "%lu")
1.19 claudio 504: P(sockb, so_rcv.sb_wat, "%lu")
1.11 claudio 505: P(sockb, so_snd.sb_cc, "%lu")
1.26 haesbaer 506: P(sockb, so_snd.sb_hiwat, "%lu")
1.19 claudio 507: P(sockb, so_snd.sb_wat, "%lu")
1.26 haesbaer 508: P(tcpcb, last_ack_sent, "%u")
509: P(tcpcb, max_sndwnd, "%lu")
510: P(tcpcb, rcv_adv, "%u")
511: P(tcpcb, rcv_nxt, "%u")
512: P(tcpcb, rcv_scale, "%u")
513: P(tcpcb, rcv_wnd, "%lu")
514: P(tcpcb, rfbuf_cnt, "%u")
515: P(tcpcb, rfbuf_ts, "%u")
516: P(tcpcb, snd_cwnd, "%lu")
517: P(tcpcb, snd_max, "%u")
518: P(tcpcb, snd_nxt, "%u")
519: P(tcpcb, snd_scale, "%u")
520: P(tcpcb, snd_ssthresh, "%lu")
1.11 claudio 521: P(tcpcb, snd_una, "%u")
522: P(tcpcb, snd_wl1, "%u")
523: P(tcpcb, snd_wl2, "%u")
524: P(tcpcb, snd_wnd, "%lu")
525: P(tcpcb, t_rcvtime, "%u")
1.26 haesbaer 526: P(tcpcb, t_rtseq, "%u")
527: P(tcpcb, t_rttmin, "%hu")
1.11 claudio 528: P(tcpcb, t_rtttime, "%u")
1.26 haesbaer 529: P(tcpcb, t_rttvar, "%hu")
1.11 claudio 530: P(tcpcb, t_srtt, "%hu")
1.26 haesbaer 531: P(tcpcb, ts_recent, "%u")
1.19 claudio 532: P(tcpcb, ts_recent_age, "%u")
1.11 claudio 533: #undef S
1.1 djm 534: #undef P
535: }
536: }
537: printf("\n");
538: }
539:
540: static void
1.20 claudio 541: tcp_process_slice(int fd, short event, void *bula)
1.1 djm 542: {
1.11 claudio 543: unsigned long long total_elapsed, since_last;
544: long double mbps, slice_mbps = 0;
545: float bwperc;
1.20 claudio 546: struct statctx *sc;
1.11 claudio 547: struct timeval t_cur, t_diff;
548: struct inpcb inpcb;
549: struct tcpcb tcpcb;
550: struct socket sockb;
551:
1.20 claudio 552: TAILQ_FOREACH(sc, &sc_queue, entry) {
553: if (clock_gettime_tv(CLOCK_MONOTONIC, &t_cur) == -1)
554: err(1, "clock_gettime_tv");
555: if (ptb->kvars != NULL) /* process kernel stats */
556: kupdate_stats(sc->tcp_tcbaddr, &inpcb, &tcpcb,
1.11 claudio 557: &sockb);
1.20 claudio 558:
1.11 claudio 559: timersub(&t_cur, &sc->t_start, &t_diff);
560: total_elapsed = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000;
561: timersub(&t_cur, &sc->t_last, &t_diff);
562: since_last = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000;
563: bwperc = (sc->bytes * 100.0) / mainstats.slice_bytes;
564: mbps = (sc->bytes * 8) / (since_last * 1000.0);
565: slice_mbps += mbps;
566:
1.20 claudio 567: tcp_stats_display(total_elapsed, mbps, bwperc, sc,
1.11 claudio 568: &inpcb, &tcpcb, &sockb);
569:
570: sc->t_last = t_cur;
571: sc->bytes = 0;
572: }
1.1 djm 573:
1.11 claudio 574: /* process stats for this slice */
575: if (slice_mbps > mainstats.peak_mbps)
576: mainstats.peak_mbps = slice_mbps;
1.20 claudio 577: printf("Conn: %3d Mbps: %12.3Lf Peak Mbps: %12.3Lf Avg Mbps: %12.3Lf\n",
578: mainstats.nconns, slice_mbps, mainstats.peak_mbps,
1.36 haesbaer 579: mainstats.nconns ? slice_mbps / mainstats.nconns : 0);
1.20 claudio 580: mainstats.slice_bytes = 0;
581:
582: set_slice_timer(mainstats.nconns > 0);
583: }
584:
585: static void
586: udp_process_slice(int fd, short event, void *v_sc)
587: {
588: struct statctx *sc = v_sc;
1.31 haesbaer 589: unsigned long long total_elapsed, since_last, pps;
590: long double slice_mbps;
1.20 claudio 591: struct timeval t_cur, t_diff;
592:
593: if (clock_gettime_tv(CLOCK_MONOTONIC, &t_cur) == -1)
594: err(1, "clock_gettime_tv");
595: /* Calculate pps */
596: timersub(&t_cur, &sc->t_start, &t_diff);
597: total_elapsed = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000;
598: timersub(&t_cur, &sc->t_last, &t_diff);
599: since_last = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000;
600: slice_mbps = (sc->bytes * 8) / (since_last * 1000.0);
601: pps = (sc->udp_slice_pkts * 1000) / since_last;
602: if (slice_mbps > mainstats.peak_mbps)
603: mainstats.peak_mbps = slice_mbps;
1.31 haesbaer 604: printf("Elapsed: %11llu Mbps: %11.3Lf Peak Mbps: %11.3Lf %s PPS: %7llu\n",
1.20 claudio 605: total_elapsed, slice_mbps, mainstats.peak_mbps,
606: ptb->sflag ? "Rx" : "Tx", pps);
607:
608: /* Clean up this slice time */
609: sc->t_last = t_cur;
610: sc->bytes = 0;
611: sc->udp_slice_pkts = 0;
612: set_slice_timer(1);
1.11 claudio 613: }
1.1 djm 614:
1.20 claudio 615: static void
616: udp_server_handle_sc(int fd, short event, void *v_sc)
1.11 claudio 617: {
618: ssize_t n;
1.20 claudio 619: struct statctx *sc = v_sc;
1.1 djm 620:
1.20 claudio 621: n = read(fd, ptb->dummybuf, ptb->dummybuf_len);
622: if (n == 0)
623: return;
624: else if (n == -1) {
1.34 haesbaer 625: if (errno != EINTR && errno != EWOULDBLOCK)
626: warn("fd %d read error", fd);
1.20 claudio 627: return;
628: }
1.11 claudio 629:
1.20 claudio 630: if (ptb->vflag >= 3)
631: fprintf(stderr, "read: %zd bytes\n", n);
632: /* If this was our first packet, start slice timer */
633: if (mainstats.peak_mbps == 0)
634: set_slice_timer(1);
635: /* Account packet */
636: sc->udp_slice_pkts++;
637: sc->bytes += n;
638: }
639:
640: static void
641: tcp_server_handle_sc(int fd, short event, void *v_sc)
642: {
643: struct statctx *sc = v_sc;
644: ssize_t n;
645:
646: n = read(sc->fd, sc->buf, sc->buflen);
647: if (n == -1) {
1.34 haesbaer 648: if (errno != EINTR && errno != EWOULDBLOCK)
649: warn("fd %d read error", sc->fd);
1.20 claudio 650: return;
651: } else if (n == 0) {
652: if (ptb->vflag)
653: fprintf(stderr, "%8d closed by remote end\n", sc->fd);
1.33 haesbaer 654:
655: TAILQ_REMOVE(&sc_queue, sc, entry);
656:
1.23 sthen 657: event_del(&sc->ev);
1.20 claudio 658: close(sc->fd);
1.33 haesbaer 659:
660: /* Some file descriptors are available again. */
661: if (evtimer_pending(&sc->tcp_ts->evt, NULL)) {
662: evtimer_del(&sc->tcp_ts->evt);
663: event_add(&sc->tcp_ts->ev, NULL);
664: }
665:
1.20 claudio 666: free(sc);
667: mainstats.nconns--;
668: return;
1.1 djm 669: }
1.20 claudio 670: if (ptb->vflag >= 3)
1.11 claudio 671: fprintf(stderr, "read: %zd bytes\n", n);
1.20 claudio 672: sc->bytes += n;
673: mainstats.slice_bytes += n;
674: }
1.11 claudio 675:
1.20 claudio 676: static void
1.33 haesbaer 677: tcp_server_accept(int fd, short event, void *arg)
1.20 claudio 678: {
1.33 haesbaer 679: struct tcpservsock *ts = arg;
1.49 chl 680: int sock;
1.20 claudio 681: struct statctx *sc;
682: struct sockaddr_storage ss;
683: socklen_t sslen;
684: char tmp[128];
685:
686: sslen = sizeof(ss);
1.33 haesbaer 687:
688: event_add(&ts->ev, NULL);
689: if (event & EV_TIMEOUT)
690: return;
1.48 guenther 691: if ((sock = accept4(fd, (struct sockaddr *)&ss, &sslen, SOCK_NONBLOCK))
692: == -1) {
1.33 haesbaer 693: /*
694: * Pause accept if we are out of file descriptors, or
695: * libevent will haunt us here too.
696: */
697: if (errno == ENFILE || errno == EMFILE) {
698: struct timeval evtpause = { 1, 0 };
699:
700: event_del(&ts->ev);
701: evtimer_add(&ts->evt, &evtpause);
1.38 deraadt 702: } else if (errno != EWOULDBLOCK && errno != EINTR &&
703: errno != ECONNABORTED)
1.33 haesbaer 704: warn("accept");
1.20 claudio 705: return;
706: }
707: saddr_ntop((struct sockaddr *)&ss, sslen,
708: tmp, sizeof(tmp));
1.24 haesbaer 709: if (ptb->Tflag != -1 && ss.ss_family == AF_INET) {
710: if (setsockopt(sock, IPPROTO_IP, IP_TOS,
711: &ptb->Tflag, sizeof(ptb->Tflag)))
712: err(1, "setsockopt IP_TOS");
713: }
714: if (ptb->Tflag != -1 && ss.ss_family == AF_INET6) {
715: if (setsockopt(sock, IPPROTO_IPV6, IPV6_TCLASS,
716: &ptb->Tflag, sizeof(ptb->Tflag)))
717: err(1, "setsockopt IPV6_TCLASS");
718: }
1.20 claudio 719: /* Alloc client structure and register reading callback */
720: if ((sc = calloc(1, sizeof(*sc))) == NULL)
721: err(1, "calloc");
1.33 haesbaer 722: sc->tcp_ts = ts;
1.20 claudio 723: sc->fd = sock;
724: stats_prepare(sc);
725: event_set(&sc->ev, sc->fd, EV_READ | EV_PERSIST,
726: tcp_server_handle_sc, sc);
727: event_add(&sc->ev, NULL);
728: TAILQ_INSERT_TAIL(&sc_queue, sc, entry);
729: mainstats.nconns++;
1.36 haesbaer 730: if (mainstats.nconns == 1)
731: set_slice_timer(1);
1.20 claudio 732: if (ptb->vflag)
1.28 haesbaer 733: fprintf(stderr, "Accepted connection from %s, fd = %d\n",
734: tmp, sc->fd);
1.1 djm 735: }
736:
1.20 claudio 737: static void
738: server_init(struct addrinfo *aitop, struct statctx *udp_sc)
1.1 djm 739: {
740: char tmp[128];
1.11 claudio 741: int sock, on = 1;
1.1 djm 742: struct addrinfo *ai;
1.20 claudio 743: struct event *ev;
1.33 haesbaer 744: struct tcpservsock *ts;
1.11 claudio 745: nfds_t lnfds;
1.1 djm 746:
1.11 claudio 747: lnfds = 0;
1.1 djm 748: for (ai = aitop; ai != NULL; ai = ai->ai_next) {
749: saddr_ntop(ai->ai_addr, ai->ai_addrlen, tmp, sizeof(tmp));
1.20 claudio 750: if (ptb->vflag)
751: fprintf(stderr, "Try to bind to %s\n", tmp);
1.1 djm 752: if ((sock = socket(ai->ai_family, ai->ai_socktype,
753: ai->ai_protocol)) == -1) {
754: if (ai->ai_next == NULL)
755: err(1, "socket");
1.20 claudio 756: if (ptb->vflag)
1.1 djm 757: warn("socket");
758: continue;
759: }
1.24 haesbaer 760: if (ptb->Tflag != -1 && ai->ai_family == AF_INET) {
761: if (setsockopt(sock, IPPROTO_IP, IP_TOS,
762: &ptb->Tflag, sizeof(ptb->Tflag)))
763: err(1, "setsockopt IP_TOS");
764: }
765: if (ptb->Tflag != -1 && ai->ai_family == AF_INET6) {
766: if (setsockopt(sock, IPPROTO_IPV6, IPV6_TCLASS,
767: &ptb->Tflag, sizeof(ptb->Tflag)))
768: err(1, "setsockopt IPV6_TCLASS");
769: }
1.1 djm 770: if (setsockopt(sock, SOL_SOCKET, SO_REUSEADDR,
771: &on, sizeof(on)) == -1)
772: warn("reuse port");
773: if (bind(sock, ai->ai_addr, ai->ai_addrlen) != 0) {
774: if (ai->ai_next == NULL)
775: err(1, "bind");
1.20 claudio 776: if (ptb->vflag)
1.1 djm 777: warn("bind");
778: close(sock);
779: continue;
780: }
1.20 claudio 781: if (ptb->Sflag) {
1.1 djm 782: if (setsockopt(sock, SOL_SOCKET, SO_RCVBUF,
1.20 claudio 783: &ptb->Sflag, sizeof(ptb->Sflag)) == -1)
784: warn("set receive buffer size");
1.1 djm 785: }
1.20 claudio 786: if (TCP_MODE) {
787: if (listen(sock, 64) == -1) {
788: if (ai->ai_next == NULL)
789: err(1, "listen");
790: if (ptb->vflag)
791: warn("listen");
792: close(sock);
793: continue;
794: }
1.1 djm 795: }
1.33 haesbaer 796: if (UDP_MODE) {
797: if ((ev = calloc(1, sizeof(*ev))) == NULL)
798: err(1, "calloc");
1.20 claudio 799: event_set(ev, sock, EV_READ | EV_PERSIST,
800: udp_server_handle_sc, udp_sc);
1.33 haesbaer 801: event_add(ev, NULL);
802: } else {
803: if ((ts = calloc(1, sizeof(*ts))) == NULL)
804: err(1, "calloc");
805:
806: ts->fd = sock;
807: evtimer_set(&ts->evt, tcp_server_accept, ts);
808: event_set(&ts->ev, ts->fd, EV_READ,
809: tcp_server_accept, ts);
810: event_add(&ts->ev, NULL);
811: }
1.20 claudio 812: if (ptb->vflag >= 3)
813: fprintf(stderr, "bound to fd %d\n", sock);
1.11 claudio 814: lnfds++;
1.1 djm 815: }
1.51 ! claudio 816: if (!ptb->Uflag)
! 817: freeaddrinfo(aitop);
1.11 claudio 818: if (lnfds == 0)
1.1 djm 819: errx(1, "No working listen addresses found");
1.11 claudio 820: }
821:
822: static void
1.20 claudio 823: client_handle_sc(int fd, short event, void *v_sc)
824: {
825: struct statctx *sc = v_sc;
826: ssize_t n;
1.51 ! claudio 827: size_t blen = sc->buflen;
1.1 djm 828:
1.51 ! claudio 829: if (ptb->Rflag)
! 830: blen = arc4random_uniform(blen) + 1;
! 831: if ((n = write(sc->fd, sc->buf, blen)) == -1) {
1.34 haesbaer 832: if (errno == EINTR || errno == EWOULDBLOCK ||
1.20 claudio 833: (UDP_MODE && errno == ENOBUFS))
1.34 haesbaer 834: return;
1.20 claudio 835: err(1, "write");
1.11 claudio 836: }
1.20 claudio 837: if (TCP_MODE && n == 0) {
1.28 haesbaer 838: fprintf(stderr, "Remote end closed connection");
1.20 claudio 839: exit(1);
1.1 djm 840: }
1.20 claudio 841: if (ptb->vflag >= 3)
1.28 haesbaer 842: fprintf(stderr, "write: %zd bytes\n", n);
1.20 claudio 843: sc->bytes += n;
844: mainstats.slice_bytes += n;
845: if (UDP_MODE)
846: sc->udp_slice_pkts++;
1.1 djm 847: }
848:
1.20 claudio 849: static void
1.25 haesbaer 850: client_init(struct addrinfo *aitop, int nconn, struct statctx *udp_sc,
851: struct addrinfo *aib)
1.1 djm 852: {
1.20 claudio 853: struct statctx *sc;
854: struct addrinfo *ai;
1.14 claudio 855: char tmp[128];
856: int i, r, sock;
1.1 djm 857:
1.20 claudio 858: sc = udp_sc;
1.4 henning 859: for (i = 0; i < nconn; i++) {
860: for (sock = -1, ai = aitop; ai != NULL; ai = ai->ai_next) {
861: saddr_ntop(ai->ai_addr, ai->ai_addrlen, tmp,
862: sizeof(tmp));
1.20 claudio 863: if (ptb->vflag && i == 0)
1.4 henning 864: fprintf(stderr, "Trying %s\n", tmp);
865: if ((sock = socket(ai->ai_family, ai->ai_socktype,
866: ai->ai_protocol)) == -1) {
867: if (ai->ai_next == NULL)
868: err(1, "socket");
1.20 claudio 869: if (ptb->vflag)
1.4 henning 870: warn("socket");
871: continue;
872: }
1.25 haesbaer 873: if (aib != NULL) {
874: saddr_ntop(aib->ai_addr, aib->ai_addrlen,
875: tmp, sizeof(tmp));
876: if (ptb->vflag)
877: fprintf(stderr,
878: "Try to bind to %s\n", tmp);
879: if (bind(sock, (struct sockaddr *)aib->ai_addr,
880: aib->ai_addrlen) == -1)
881: err(1, "bind");
882: }
1.24 haesbaer 883: if (ptb->Tflag != -1 && ai->ai_family == AF_INET) {
884: if (setsockopt(sock, IPPROTO_IP, IP_TOS,
885: &ptb->Tflag, sizeof(ptb->Tflag)))
886: err(1, "setsockopt IP_TOS");
887: }
888: if (ptb->Tflag != -1 && ai->ai_family == AF_INET6) {
889: if (setsockopt(sock, IPPROTO_IPV6, IPV6_TCLASS,
890: &ptb->Tflag, sizeof(ptb->Tflag)))
891: err(1, "setsockopt IPV6_TCLASS");
892: }
1.20 claudio 893: if (ptb->Sflag) {
1.4 henning 894: if (setsockopt(sock, SOL_SOCKET, SO_SNDBUF,
1.20 claudio 895: &ptb->Sflag, sizeof(ptb->Sflag)) == -1)
1.4 henning 896: warn("set TCP send buffer size");
897: }
898: if (connect(sock, ai->ai_addr, ai->ai_addrlen) != 0) {
899: if (ai->ai_next == NULL)
900: err(1, "connect");
1.20 claudio 901: if (ptb->vflag)
1.4 henning 902: warn("connect");
903: close(sock);
904: sock = -1;
905: continue;
906: }
907: break;
1.1 djm 908: }
1.4 henning 909: if (sock == -1)
910: errx(1, "No host found");
1.50 krw 911: if ((r = fcntl(sock, F_GETFL)) == -1)
1.4 henning 912: err(1, "fcntl(F_GETFL)");
913: r |= O_NONBLOCK;
914: if (fcntl(sock, F_SETFL, r) == -1)
915: err(1, "fcntl(F_SETFL, O_NONBLOCK)");
1.20 claudio 916: /* Alloc and prepare stats */
917: if (TCP_MODE) {
918: if ((sc = calloc(1, sizeof(*sc))) == NULL)
919: err(1, "calloc");
920: }
921: sc->fd = sock;
922: stats_prepare(sc);
923: event_set(&sc->ev, sc->fd, EV_WRITE | EV_PERSIST,
924: client_handle_sc, sc);
925: event_add(&sc->ev, NULL);
926: TAILQ_INSERT_TAIL(&sc_queue, sc, entry);
927: mainstats.nconns++;
1.36 haesbaer 928: if (mainstats.nconns == 1)
929: set_slice_timer(1);
1.14 claudio 930: }
1.51 ! claudio 931: if (!ptb->Uflag)
! 932: freeaddrinfo(aitop);
1.35 haesbaer 933: if (aib != NULL)
934: freeaddrinfo(aib);
1.14 claudio 935:
1.20 claudio 936: if (ptb->vflag && nconn > 1)
1.29 haesbaer 937: fprintf(stderr, "%d connections established\n",
938: mainstats.nconns);
1.14 claudio 939: }
940:
1.24 haesbaer 941: static int
942: map_tos(char *s, int *val)
943: {
944: /* DiffServ Codepoints and other TOS mappings */
945: const struct toskeywords {
946: const char *keyword;
947: int val;
948: } *t, toskeywords[] = {
949: { "af11", IPTOS_DSCP_AF11 },
950: { "af12", IPTOS_DSCP_AF12 },
951: { "af13", IPTOS_DSCP_AF13 },
952: { "af21", IPTOS_DSCP_AF21 },
953: { "af22", IPTOS_DSCP_AF22 },
954: { "af23", IPTOS_DSCP_AF23 },
955: { "af31", IPTOS_DSCP_AF31 },
956: { "af32", IPTOS_DSCP_AF32 },
957: { "af33", IPTOS_DSCP_AF33 },
958: { "af41", IPTOS_DSCP_AF41 },
959: { "af42", IPTOS_DSCP_AF42 },
960: { "af43", IPTOS_DSCP_AF43 },
961: { "critical", IPTOS_PREC_CRITIC_ECP },
962: { "cs0", IPTOS_DSCP_CS0 },
963: { "cs1", IPTOS_DSCP_CS1 },
964: { "cs2", IPTOS_DSCP_CS2 },
965: { "cs3", IPTOS_DSCP_CS3 },
966: { "cs4", IPTOS_DSCP_CS4 },
967: { "cs5", IPTOS_DSCP_CS5 },
968: { "cs6", IPTOS_DSCP_CS6 },
969: { "cs7", IPTOS_DSCP_CS7 },
970: { "ef", IPTOS_DSCP_EF },
971: { "inetcontrol", IPTOS_PREC_INTERNETCONTROL },
972: { "lowdelay", IPTOS_LOWDELAY },
973: { "netcontrol", IPTOS_PREC_NETCONTROL },
974: { "reliability", IPTOS_RELIABILITY },
975: { "throughput", IPTOS_THROUGHPUT },
976: { NULL, -1 },
977: };
978:
979: for (t = toskeywords; t->keyword != NULL; t++) {
980: if (strcmp(s, t->keyword) == 0) {
981: *val = t->val;
982: return (1);
983: }
984: }
985:
986: return (0);
987: }
988:
1.30 henning 989: static void
990: quit(int sig, short event, void *arg)
991: {
992: exit(0);
993: }
994:
1.1 djm 995: int
996: main(int argc, char **argv)
997: {
1.30 henning 998: struct timeval tv;
1.37 haesbaer 999: unsigned int secs, rtable;
1.1 djm 1000:
1001: char kerr[_POSIX2_LINE_MAX], *tmp;
1.25 haesbaer 1002: struct addrinfo *aitop, *aib, hints;
1.1 djm 1003: const char *errstr;
1.11 claudio 1004: struct rlimit rl;
1.20 claudio 1005: int ch, herr, nconn;
1.42 dlg 1006: int family = PF_UNSPEC;
1.12 deraadt 1007: struct nlist nl[] = { { "_tcbtable" }, { "" } };
1.25 haesbaer 1008: const char *host = NULL, *port = DEFAULT_PORT, *srcbind = NULL;
1.30 henning 1009: struct event ev_sigint, ev_sigterm, ev_sighup, ev_progtimer;
1.20 claudio 1010: struct statctx *udp_sc = NULL;
1.51 ! claudio 1011: struct sockaddr_un sock_un;
1.1 djm 1012:
1.20 claudio 1013: /* Init world */
1.45 millert 1014: setvbuf(stdout, NULL, _IOLBF, 0);
1.20 claudio 1015: ptb = &tcpbench;
1016: ptb->dummybuf_len = 0;
1.51 ! claudio 1017: ptb->Sflag = ptb->sflag = ptb->vflag = ptb->Rflag = ptb->Uflag = 0;
1.20 claudio 1018: ptb->kvmh = NULL;
1019: ptb->kvars = NULL;
1020: ptb->rflag = DEFAULT_STATS_INTERVAL;
1.24 haesbaer 1021: ptb->Tflag = -1;
1.20 claudio 1022: nconn = 1;
1.25 haesbaer 1023: aib = NULL;
1.30 henning 1024: secs = 0;
1.1 djm 1025:
1.51 ! claudio 1026: while ((ch = getopt(argc, argv, "46b:B:hlk:n:p:Rr:sS:t:T:uUvV:")) != -1) {
1.1 djm 1027: switch (ch) {
1.42 dlg 1028: case '4':
1029: family = PF_INET;
1030: break;
1031: case '6':
1032: family = PF_INET6;
1033: break;
1.25 haesbaer 1034: case 'b':
1035: srcbind = optarg;
1036: break;
1.1 djm 1037: case 'l':
1038: list_kvars();
1039: exit(0);
1040: case 'k':
1041: if ((tmp = strdup(optarg)) == NULL)
1042: errx(1, "strdup");
1.20 claudio 1043: ptb->kvars = check_prepare_kvars(tmp);
1.1 djm 1044: free(tmp);
1045: break;
1.51 ! claudio 1046: case 'R':
! 1047: ptb->Rflag = 1;
! 1048: break;
1.1 djm 1049: case 'r':
1.20 claudio 1050: ptb->rflag = strtonum(optarg, 0, 60 * 60 * 24 * 1000,
1.1 djm 1051: &errstr);
1052: if (errstr != NULL)
1053: errx(1, "statistics interval is %s: %s",
1054: errstr, optarg);
1055: break;
1056: case 'p':
1057: port = optarg;
1058: break;
1059: case 's':
1.20 claudio 1060: ptb->sflag = 1;
1.1 djm 1061: break;
1062: case 'S':
1.20 claudio 1063: ptb->Sflag = strtonum(optarg, 0, 1024*1024*1024,
1.1 djm 1064: &errstr);
1065: if (errstr != NULL)
1066: errx(1, "receive space interval is %s: %s",
1067: errstr, optarg);
1068: break;
1069: case 'B':
1.20 claudio 1070: ptb->dummybuf_len = strtonum(optarg, 0, 1024*1024*1024,
1.1 djm 1071: &errstr);
1072: if (errstr != NULL)
1073: errx(1, "read/write buffer size is %s: %s",
1074: errstr, optarg);
1075: break;
1076: case 'v':
1.20 claudio 1077: ptb->vflag++;
1.9 claudio 1078: break;
1079: case 'V':
1.37 haesbaer 1080: rtable = (unsigned int)strtonum(optarg, 0,
1.9 claudio 1081: RT_TABLEID_MAX, &errstr);
1082: if (errstr)
1.17 guenther 1083: errx(1, "rtable value is %s: %s",
1.9 claudio 1084: errstr, optarg);
1.37 haesbaer 1085: if (setrtable(rtable) == -1)
1086: err(1, "setrtable");
1.1 djm 1087: break;
1.4 henning 1088: case 'n':
1089: nconn = strtonum(optarg, 0, 65535, &errstr);
1090: if (errstr != NULL)
1091: errx(1, "number of connections is %s: %s",
1092: errstr, optarg);
1093: break;
1.20 claudio 1094: case 'u':
1095: ptb->uflag = 1;
1.24 haesbaer 1096: break;
1.51 ! claudio 1097: case 'U':
! 1098: ptb->Uflag = 1;
! 1099: break;
1.24 haesbaer 1100: case 'T':
1101: if (map_tos(optarg, &ptb->Tflag))
1102: break;
1103: errstr = NULL;
1104: if (strlen(optarg) > 1 && optarg[0] == '0' &&
1105: optarg[1] == 'x')
1106: ptb->Tflag = (int)strtol(optarg, NULL, 16);
1107: else
1108: ptb->Tflag = (int)strtonum(optarg, 0, 255,
1109: &errstr);
1110: if (ptb->Tflag == -1 || ptb->Tflag > 255 || errstr)
1111: errx(1, "illegal tos value %s", optarg);
1.20 claudio 1112: break;
1.30 henning 1113: case 't':
1114: secs = strtonum(optarg, 1, UINT_MAX, &errstr);
1115: if (errstr != NULL)
1116: errx(1, "secs is %s: %s",
1117: errstr, optarg);
1118: break;
1.1 djm 1119: case 'h':
1120: default:
1121: usage();
1122: }
1123: }
1124:
1.51 ! claudio 1125: if (pledge("stdio rpath dns inet unix id proc", NULL) == -1)
1.47 benno 1126: err(1, "pledge");
1127:
1.1 djm 1128: argv += optind;
1129: argc -= optind;
1.51 ! claudio 1130: if ((argc != (ptb->sflag && !ptb->Uflag ? 0 : 1)) ||
1.20 claudio 1131: (UDP_MODE && (ptb->kvars || nconn != 1)))
1.1 djm 1132: usage();
1.4 henning 1133:
1.46 deraadt 1134: if (ptb->kvars) {
1135: if ((ptb->kvmh = kvm_openfiles(NULL, NULL, NULL,
1136: O_RDONLY, kerr)) == NULL)
1137: errx(1, "kvm_open: %s", kerr);
1138: drop_gid();
1139: if (kvm_nlist(ptb->kvmh, nl) < 0 || nl[0].n_type == 0)
1140: errx(1, "kvm: no namelist");
1141: ptb->ktcbtab = nl[0].n_value;
1142: } else
1143: drop_gid();
1144:
1.51 ! claudio 1145: if (pledge("stdio id dns inet unix", NULL) == -1)
1.47 benno 1146: err(1, "pledge");
1147:
1.51 ! claudio 1148: if (!ptb->sflag || ptb->Uflag)
1.1 djm 1149: host = argv[0];
1.20 claudio 1150: /*
1151: * Rationale,
1152: * If TCP, use a big buffer with big reads/writes.
1153: * If UDP, use a big buffer in server and a buffer the size of a
1154: * ethernet packet.
1155: */
1156: if (!ptb->dummybuf_len) {
1157: if (ptb->sflag || TCP_MODE)
1158: ptb->dummybuf_len = DEFAULT_BUF;
1159: else
1160: ptb->dummybuf_len = DEFAULT_UDP_PKT;
1161: }
1.1 djm 1162:
1.13 claudio 1163: bzero(&hints, sizeof(hints));
1.42 dlg 1164: hints.ai_family = family;
1.25 haesbaer 1165: if (UDP_MODE) {
1.20 claudio 1166: hints.ai_socktype = SOCK_DGRAM;
1.25 haesbaer 1167: hints.ai_protocol = IPPROTO_UDP;
1.27 haesbaer 1168: } else {
1.20 claudio 1169: hints.ai_socktype = SOCK_STREAM;
1.25 haesbaer 1170: hints.ai_protocol = IPPROTO_TCP;
1171: }
1.51 ! claudio 1172: if (ptb->Uflag) {
! 1173: hints.ai_family = AF_UNIX;
! 1174: hints.ai_protocol = 0;
! 1175: sock_un.sun_family = AF_UNIX;
! 1176: if (strlcpy(sock_un.sun_path, host, sizeof(sock_un.sun_path)) >=
! 1177: sizeof(sock_un.sun_path))
! 1178: errx(1, "socket name '%s' too long", host);
! 1179: hints.ai_addr = (struct sockaddr *)&sock_un;
! 1180: hints.ai_addrlen = sizeof(sock_un);
! 1181: aitop = &hints;
! 1182: } else {
! 1183: if (ptb->sflag)
! 1184: hints.ai_flags = AI_PASSIVE;
! 1185: if (srcbind != NULL) {
! 1186: hints.ai_flags |= AI_NUMERICHOST;
! 1187: herr = getaddrinfo(srcbind, NULL, &hints, &aib);
! 1188: hints.ai_flags &= ~AI_NUMERICHOST;
! 1189: if (herr != 0) {
! 1190: if (herr == EAI_SYSTEM)
! 1191: err(1, "getaddrinfo");
! 1192: else
! 1193: errx(1, "getaddrinfo: %s",
! 1194: gai_strerror(herr));
! 1195: }
! 1196: }
! 1197: if ((herr = getaddrinfo(host, port, &hints, &aitop)) != 0) {
1.25 haesbaer 1198: if (herr == EAI_SYSTEM)
1199: err(1, "getaddrinfo");
1200: else
1201: errx(1, "getaddrinfo: %s", gai_strerror(herr));
1202: }
1203: }
1.1 djm 1204:
1.51 ! claudio 1205: if (pledge("stdio id inet unix", NULL) == -1)
1.47 benno 1206: err(1, "pledge");
1207:
1.11 claudio 1208: if (getrlimit(RLIMIT_NOFILE, &rl) == -1)
1209: err(1, "getrlimit");
1210: if (rl.rlim_cur < MAX_FD)
1211: rl.rlim_cur = MAX_FD;
1212: if (setrlimit(RLIMIT_NOFILE, &rl))
1213: err(1, "setrlimit");
1214: if (getrlimit(RLIMIT_NOFILE, &rl) == -1)
1215: err(1, "getrlimit");
1.47 benno 1216:
1.51 ! claudio 1217: if (pledge("stdio inet unix", NULL) == -1)
1.47 benno 1218: err(1, "pledge");
1219:
1.20 claudio 1220: /* Init world */
1221: TAILQ_INIT(&sc_queue);
1222: if ((ptb->dummybuf = malloc(ptb->dummybuf_len)) == NULL)
1223: err(1, "malloc");
1224: arc4random_buf(ptb->dummybuf, ptb->dummybuf_len);
1225:
1226: /* Setup libevent and signals */
1227: event_init();
1228: signal_set(&ev_sigterm, SIGTERM, signal_handler, NULL);
1229: signal_set(&ev_sighup, SIGHUP, signal_handler, NULL);
1230: signal_set(&ev_sigint, SIGINT, signal_handler, NULL);
1231: signal_add(&ev_sigint, NULL);
1232: signal_add(&ev_sigterm, NULL);
1233: signal_add(&ev_sighup, NULL);
1234: signal(SIGPIPE, SIG_IGN);
1235:
1.27 haesbaer 1236: if (UDP_MODE) {
1237: if ((udp_sc = calloc(1, sizeof(*udp_sc))) == NULL)
1238: err(1, "calloc");
1239: udp_sc->fd = -1;
1240: stats_prepare(udp_sc);
1241: evtimer_set(&mainstats.timer, udp_process_slice, udp_sc);
1242: } else {
1.20 claudio 1243: print_tcp_header();
1244: evtimer_set(&mainstats.timer, tcp_process_slice, NULL);
1.27 haesbaer 1245: }
1.20 claudio 1246:
1.27 haesbaer 1247: if (ptb->sflag)
1.20 claudio 1248: server_init(aitop, udp_sc);
1.30 henning 1249: else {
1250: if (secs > 0) {
1251: timerclear(&tv);
1252: tv.tv_sec = secs + 1;
1253: evtimer_set(&ev_progtimer, quit, NULL);
1254: evtimer_add(&ev_progtimer, &tv);
1255: }
1.25 haesbaer 1256: client_init(aitop, nconn, udp_sc, aib);
1.47 benno 1257:
1258: if (pledge("stdio", NULL) == -1)
1259: err(1, "pledge");
1.30 henning 1260: }
1.47 benno 1261:
1.20 claudio 1262: /* libevent main loop*/
1263: event_dispatch();
1.1 djm 1264:
1.20 claudio 1265: return (0);
1.1 djm 1266: }