Annotation of src/usr.bin/tcpbench/tcpbench.c, Revision 1.56
1.56 ! cheloha 1: /* $OpenBSD: tcpbench.c,v 1.55 2018/05/10 14:29:17 benno Exp $ */
1.52 bluhm 2:
1.1 djm 3: /*
4: * Copyright (c) 2008 Damien Miller <djm@mindrot.org>
1.20 claudio 5: * Copyright (c) 2011 Christiano F. Haesbaert <haesbaert@haesbaert.org>
1.1 djm 6: *
7: * Permission to use, copy, modify, and distribute this software for any
8: * purpose with or without fee is hereby granted, provided that the above
9: * copyright notice and this permission notice appear in all copies.
10: *
11: * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
12: * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
13: * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
14: * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
15: * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
16: * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
17: * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
18: */
19:
20: #include <sys/types.h>
21: #include <sys/time.h>
22: #include <sys/socket.h>
23: #include <sys/socketvar.h>
1.11 claudio 24: #include <sys/resource.h>
1.20 claudio 25: #include <sys/queue.h>
1.51 claudio 26: #include <sys/un.h>
1.1 djm 27:
28: #include <net/route.h>
29:
30: #include <netinet/in.h>
31: #include <netinet/ip.h>
32: #include <netinet/tcp.h>
33: #include <netinet/tcp_timer.h>
34: #include <netinet/tcp_fsm.h>
35: #include <netinet/in_pcb.h>
36: #include <netinet/tcp_var.h>
37:
38: #include <arpa/inet.h>
39:
40: #include <unistd.h>
41: #include <limits.h>
42: #include <stdlib.h>
43: #include <stdio.h>
44: #include <string.h>
45: #include <errno.h>
1.20 claudio 46: #include <event.h>
1.1 djm 47: #include <netdb.h>
48: #include <signal.h>
49: #include <err.h>
50: #include <fcntl.h>
51: #include <poll.h>
52:
53: #include <kvm.h>
54: #include <nlist.h>
55:
1.11 claudio 56: #define DEFAULT_PORT "12345"
57: #define DEFAULT_STATS_INTERVAL 1000 /* ms */
1.20 claudio 58: #define DEFAULT_BUF (256 * 1024)
59: #define DEFAULT_UDP_PKT (1500 - 28) /* TODO don't hardcode this */
60: #define TCP_MODE !ptb->uflag
61: #define UDP_MODE ptb->uflag
1.11 claudio 62: #define MAX_FD 1024
1.1 djm 63:
1.20 claudio 64: /* Our tcpbench globals */
65: struct {
1.54 bluhm 66: int Sflag; /* Socket buffer size */
1.20 claudio 67: u_int rflag; /* Report rate (ms) */
68: int sflag; /* True if server */
1.24 haesbaer 69: int Tflag; /* ToS if != -1 */
1.20 claudio 70: int vflag; /* Verbose */
71: int uflag; /* UDP mode */
1.51 claudio 72: int Uflag; /* UNIX (AF_LOCAL) mode */
73: int Rflag; /* randomize client write size */
1.20 claudio 74: kvm_t *kvmh; /* Kvm handler */
75: char **kvars; /* Kvm enabled vars */
76: u_long ktcbtab; /* Ktcb */
77: char *dummybuf; /* IO buffer */
78: size_t dummybuf_len; /* IO buffer len */
79: } tcpbench, *ptb;
1.1 djm 80:
1.33 haesbaer 81: struct tcpservsock {
82: struct event ev;
83: struct event evt;
84: int fd;
85: };
86:
1.20 claudio 87: /* stats for a single tcp connection, udp uses only one */
1.1 djm 88: struct statctx {
1.20 claudio 89: TAILQ_ENTRY(statctx) entry;
1.11 claudio 90: struct timeval t_start, t_last;
1.1 djm 91: unsigned long long bytes;
1.20 claudio 92: int fd;
93: char *buf;
94: size_t buflen;
95: struct event ev;
96: /* TCP only */
1.33 haesbaer 97: struct tcpservsock *tcp_ts;
1.20 claudio 98: u_long tcp_tcbaddr;
99: /* UDP only */
100: u_long udp_slice_pkts;
1.1 djm 101: };
102:
1.20 claudio 103: static void signal_handler(int, short, void *);
104: static void saddr_ntop(const struct sockaddr *, socklen_t, char *, size_t);
105: static void drop_gid(void);
106: static void set_slice_timer(int);
107: static void print_tcp_header(void);
108: static void kget(u_long, void *, size_t);
109: static u_long kfind_tcb(int);
110: static void kupdate_stats(u_long, struct inpcb *, struct tcpcb *,
111: struct socket *);
112: static void list_kvars(void);
113: static void check_kvar(const char *);
114: static char ** check_prepare_kvars(char *);
115: static void stats_prepare(struct statctx *);
116: static void tcp_stats_display(unsigned long long, long double, float,
117: struct statctx *, struct inpcb *, struct tcpcb *, struct socket *);
118: static void tcp_process_slice(int, short, void *);
119: static void tcp_server_handle_sc(int, short, void *);
120: static void tcp_server_accept(int, short, void *);
121: static void server_init(struct addrinfo *, struct statctx *);
122: static void client_handle_sc(int, short, void *);
1.25 haesbaer 123: static void client_init(struct addrinfo *, int, struct statctx *,
124: struct addrinfo *);
1.20 claudio 125: static int clock_gettime_tv(clockid_t, struct timeval *);
126: static void udp_server_handle_sc(int, short, void *);
127: static void udp_process_slice(int, short, void *);
1.24 haesbaer 128: static int map_tos(char *, int *);
1.11 claudio 129: /*
130: * We account the mainstats here, that is the stats
131: * for all connections, all variables starting with slice
132: * are used to account information for the timeslice
133: * between each output. Peak variables record the highest
134: * between all slices so far.
135: */
136: static struct {
137: unsigned long long slice_bytes; /* bytes for last slice */
138: long double peak_mbps; /* peak mbps so far */
139: int nconns; /* connected clients */
1.20 claudio 140: struct event timer; /* process timer */
1.11 claudio 141: } mainstats;
142:
1.20 claudio 143: /* When adding variables, also add to tcp_stats_display() */
1.1 djm 144: static const char *allowed_kvars[] = {
145: "inpcb.inp_flags",
146: "sockb.so_rcv.sb_cc",
1.26 haesbaer 147: "sockb.so_rcv.sb_hiwat",
1.19 claudio 148: "sockb.so_rcv.sb_wat",
1.1 djm 149: "sockb.so_snd.sb_cc",
1.26 haesbaer 150: "sockb.so_snd.sb_hiwat",
1.19 claudio 151: "sockb.so_snd.sb_wat",
1.26 haesbaer 152: "tcpcb.last_ack_sent",
153: "tcpcb.max_sndwnd",
154: "tcpcb.rcv_adv",
155: "tcpcb.rcv_nxt",
156: "tcpcb.rcv_scale",
157: "tcpcb.rcv_wnd",
158: "tcpcb.rfbuf_cnt",
159: "tcpcb.rfbuf_ts",
160: "tcpcb.snd_cwnd",
161: "tcpcb.snd_max",
162: "tcpcb.snd_nxt",
163: "tcpcb.snd_scale",
164: "tcpcb.snd_ssthresh",
1.1 djm 165: "tcpcb.snd_una",
166: "tcpcb.snd_wl1",
167: "tcpcb.snd_wl2",
168: "tcpcb.snd_wnd",
169: "tcpcb.t_rcvtime",
1.26 haesbaer 170: "tcpcb.t_rtseq",
171: "tcpcb.t_rttmin",
1.1 djm 172: "tcpcb.t_rtttime",
1.26 haesbaer 173: "tcpcb.t_rttvar",
1.1 djm 174: "tcpcb.t_srtt",
1.26 haesbaer 175: "tcpcb.ts_recent",
1.19 claudio 176: "tcpcb.ts_recent_age",
1.1 djm 177: NULL
178: };
179:
1.20 claudio 180: TAILQ_HEAD(, statctx) sc_queue;
1.1 djm 181:
182: static void __dead
183: usage(void)
184: {
185: fprintf(stderr,
1.6 jmc 186: "usage: tcpbench -l\n"
1.51 claudio 187: " tcpbench [-46RUuv] [-B buf] [-b addr] [-k kvars] [-n connections]\n"
1.25 haesbaer 188: " [-p port] [-r interval] [-S space] [-T toskeyword]\n"
1.30 henning 189: " [-t secs] [-V rtable] hostname\n"
1.51 claudio 190: " tcpbench -s [-46Uuv] [-B buf] [-k kvars] [-p port] [-r interval]\n"
191: " [-S space] [-T toskeyword] [-V rtable] [hostname]\n");
1.1 djm 192: exit(1);
193: }
194:
195: static void
1.20 claudio 196: signal_handler(int sig, short event, void *bula)
197: {
198: /*
199: * signal handler rules don't apply, libevent decouples for us
200: */
201: switch (sig) {
202: case SIGINT:
203: case SIGTERM:
204: case SIGHUP:
205: warnx("Terminated by signal %d", sig);
206: exit(0);
207: break; /* NOTREACHED */
208: default:
209: errx(1, "unexpected signal %d", sig);
210: break; /* NOTREACHED */
211: }
212: }
213:
214: static void
1.1 djm 215: saddr_ntop(const struct sockaddr *addr, socklen_t alen, char *buf, size_t len)
216: {
217: char hbuf[NI_MAXHOST], pbuf[NI_MAXSERV];
218: int herr;
219:
1.51 claudio 220: if (addr->sa_family == AF_UNIX) {
221: struct sockaddr_un *sun = (struct sockaddr_un *)addr;
222: snprintf(buf, len, "%s", sun->sun_path);
223: return;
224: }
1.3 djm 225: if ((herr = getnameinfo(addr, alen, hbuf, sizeof(hbuf),
226: pbuf, sizeof(pbuf), NI_NUMERICHOST|NI_NUMERICSERV)) != 0) {
1.1 djm 227: if (herr == EAI_SYSTEM)
228: err(1, "getnameinfo");
229: else
230: errx(1, "getnameinfo: %s", gai_strerror(herr));
231: }
232: snprintf(buf, len, "[%s]:%s", hbuf, pbuf);
233: }
234:
235: static void
1.20 claudio 236: drop_gid(void)
237: {
238: gid_t gid;
239:
240: gid = getgid();
241: if (setresgid(gid, gid, gid) == -1)
242: err(1, "setresgid");
243: }
244:
245: static void
246: set_slice_timer(int on)
1.11 claudio 247: {
1.20 claudio 248: struct timeval tv;
1.11 claudio 249:
1.20 claudio 250: if (ptb->rflag == 0)
1.11 claudio 251: return;
252:
1.20 claudio 253: if (on) {
254: if (evtimer_pending(&mainstats.timer, NULL))
255: return;
256: /* XXX Is there a better way to do this ? */
257: tv.tv_sec = ptb->rflag / 1000;
258: tv.tv_usec = (ptb->rflag % 1000) * 1000;
259:
260: evtimer_add(&mainstats.timer, &tv);
261: } else if (evtimer_pending(&mainstats.timer, NULL))
262: evtimer_del(&mainstats.timer);
263: }
1.11 claudio 264:
1.20 claudio 265: static int
266: clock_gettime_tv(clockid_t clock_id, struct timeval *tv)
267: {
268: struct timespec ts;
269:
270: if (clock_gettime(clock_id, &ts) == -1)
271: return (-1);
272:
273: TIMESPEC_TO_TIMEVAL(tv, &ts);
274:
275: return (0);
1.11 claudio 276: }
277:
278: static void
1.20 claudio 279: print_tcp_header(void)
1.11 claudio 280: {
281: char **kv;
1.20 claudio 282:
1.11 claudio 283: printf("%12s %14s %12s %8s ", "elapsed_ms", "bytes", "mbps",
284: "bwidth");
1.20 claudio 285: for (kv = ptb->kvars; ptb->kvars != NULL && *kv != NULL; kv++)
286: printf("%s%s", kv != ptb->kvars ? "," : "", *kv);
1.11 claudio 287: printf("\n");
288: }
289:
290: static void
1.20 claudio 291: kget(u_long addr, void *buf, size_t size)
1.1 djm 292: {
1.20 claudio 293: if (kvm_read(ptb->kvmh, addr, buf, size) != (ssize_t)size)
294: errx(1, "kvm_read: %s", kvm_geterr(ptb->kvmh));
1.1 djm 295: }
296:
297: static u_long
1.20 claudio 298: kfind_tcb(int sock)
1.1 djm 299: {
300: struct inpcbtable tcbtab;
1.40 tedu 301: struct inpcb *next, *prev;
1.41 tedu 302: struct inpcb inpcb, prevpcb;
1.1 djm 303: struct tcpcb tcpcb;
304:
305: struct sockaddr_storage me, them;
306: socklen_t melen, themlen;
307: struct sockaddr_in *in4;
308: struct sockaddr_in6 *in6;
309: char tmp1[64], tmp2[64];
1.11 claudio 310: int nretry;
1.1 djm 311:
1.11 claudio 312: nretry = 10;
1.1 djm 313: melen = themlen = sizeof(struct sockaddr_storage);
314: if (getsockname(sock, (struct sockaddr *)&me, &melen) == -1)
315: err(1, "getsockname");
316: if (getpeername(sock, (struct sockaddr *)&them, &themlen) == -1)
317: err(1, "getpeername");
318: if (me.ss_family != them.ss_family)
319: errx(1, "%s: me.ss_family != them.ss_family", __func__);
320: if (me.ss_family != AF_INET && me.ss_family != AF_INET6)
321: errx(1, "%s: unknown socket family", __func__);
1.20 claudio 322: if (ptb->vflag >= 2) {
1.1 djm 323: saddr_ntop((struct sockaddr *)&me, me.ss_len,
324: tmp1, sizeof(tmp1));
325: saddr_ntop((struct sockaddr *)&them, them.ss_len,
326: tmp2, sizeof(tmp2));
327: fprintf(stderr, "Our socket local %s remote %s\n", tmp1, tmp2);
328: }
1.20 claudio 329: if (ptb->vflag >= 2)
330: fprintf(stderr, "Using PCB table at %lu\n", ptb->ktcbtab);
1.11 claudio 331: retry:
1.20 claudio 332: kget(ptb->ktcbtab, &tcbtab, sizeof(tcbtab));
1.40 tedu 333: prev = NULL;
1.39 krw 334: next = TAILQ_FIRST(&tcbtab.inpt_queue);
1.1 djm 335:
1.20 claudio 336: if (ptb->vflag >= 2)
1.40 tedu 337: fprintf(stderr, "PCB start at %p\n", next);
338: while (next != NULL) {
1.20 claudio 339: if (ptb->vflag >= 2)
1.1 djm 340: fprintf(stderr, "Checking PCB %p\n", next);
1.20 claudio 341: kget((u_long)next, &inpcb, sizeof(inpcb));
1.41 tedu 342: if (prev != NULL) {
343: kget((u_long)prev, &prevpcb, sizeof(prevpcb));
344: if (TAILQ_NEXT(&prevpcb, inp_queue) != next) {
345: if (nretry--) {
346: warnx("PCB prev pointer insane");
347: goto retry;
348: } else
349: errx(1, "PCB prev pointer insane,"
350: " all attempts exhaused");
351: }
352: }
1.1 djm 353: prev = next;
1.39 krw 354: next = TAILQ_NEXT(&inpcb, inp_queue);
1.1 djm 355:
356: if (me.ss_family == AF_INET) {
357: if ((inpcb.inp_flags & INP_IPV6) != 0) {
1.20 claudio 358: if (ptb->vflag >= 2)
1.1 djm 359: fprintf(stderr, "Skip: INP_IPV6");
360: continue;
361: }
1.20 claudio 362: if (ptb->vflag >= 2) {
1.1 djm 363: inet_ntop(AF_INET, &inpcb.inp_laddr,
364: tmp1, sizeof(tmp1));
365: inet_ntop(AF_INET, &inpcb.inp_faddr,
366: tmp2, sizeof(tmp2));
367: fprintf(stderr, "PCB %p local: [%s]:%d "
368: "remote: [%s]:%d\n", prev,
369: tmp1, inpcb.inp_lport,
370: tmp2, inpcb.inp_fport);
371: }
372: in4 = (struct sockaddr_in *)&me;
373: if (memcmp(&in4->sin_addr, &inpcb.inp_laddr,
374: sizeof(struct in_addr)) != 0 ||
375: in4->sin_port != inpcb.inp_lport)
376: continue;
377: in4 = (struct sockaddr_in *)&them;
378: if (memcmp(&in4->sin_addr, &inpcb.inp_faddr,
379: sizeof(struct in_addr)) != 0 ||
380: in4->sin_port != inpcb.inp_fport)
381: continue;
382: } else {
383: if ((inpcb.inp_flags & INP_IPV6) == 0)
384: continue;
1.20 claudio 385: if (ptb->vflag >= 2) {
1.1 djm 386: inet_ntop(AF_INET6, &inpcb.inp_laddr6,
387: tmp1, sizeof(tmp1));
388: inet_ntop(AF_INET6, &inpcb.inp_faddr6,
389: tmp2, sizeof(tmp2));
390: fprintf(stderr, "PCB %p local: [%s]:%d "
391: "remote: [%s]:%d\n", prev,
392: tmp1, inpcb.inp_lport,
393: tmp2, inpcb.inp_fport);
394: }
395: in6 = (struct sockaddr_in6 *)&me;
396: if (memcmp(&in6->sin6_addr, &inpcb.inp_laddr6,
397: sizeof(struct in6_addr)) != 0 ||
398: in6->sin6_port != inpcb.inp_lport)
399: continue;
400: in6 = (struct sockaddr_in6 *)&them;
401: if (memcmp(&in6->sin6_addr, &inpcb.inp_faddr6,
402: sizeof(struct in6_addr)) != 0 ||
403: in6->sin6_port != inpcb.inp_fport)
404: continue;
405: }
1.20 claudio 406: kget((u_long)inpcb.inp_ppcb, &tcpcb, sizeof(tcpcb));
1.1 djm 407: if (tcpcb.t_state != TCPS_ESTABLISHED) {
1.20 claudio 408: if (ptb->vflag >= 2)
1.1 djm 409: fprintf(stderr, "Not established\n");
410: continue;
411: }
1.20 claudio 412: if (ptb->vflag >= 2)
1.1 djm 413: fprintf(stderr, "Found PCB at %p\n", prev);
1.20 claudio 414: return ((u_long)prev);
1.1 djm 415: }
416:
417: errx(1, "No matching PCB found");
418: }
419:
420: static void
1.20 claudio 421: kupdate_stats(u_long tcbaddr, struct inpcb *inpcb,
422: struct tcpcb *tcpcb, struct socket *sockb)
1.1 djm 423: {
1.20 claudio 424: kget(tcbaddr, inpcb, sizeof(*inpcb));
425: kget((u_long)inpcb->inp_ppcb, tcpcb, sizeof(*tcpcb));
426: kget((u_long)inpcb->inp_socket, sockb, sizeof(*sockb));
1.1 djm 427: }
428:
429: static void
430: check_kvar(const char *var)
431: {
1.16 deraadt 432: u_int i;
1.1 djm 433:
434: for (i = 0; allowed_kvars[i] != NULL; i++)
435: if (strcmp(allowed_kvars[i], var) == 0)
436: return;
437: errx(1, "Unrecognised kvar: %s", var);
438: }
439:
440: static void
441: list_kvars(void)
442: {
1.16 deraadt 443: u_int i;
1.1 djm 444:
1.26 haesbaer 445: printf("Supported kernel variables:\n");
1.1 djm 446: for (i = 0; allowed_kvars[i] != NULL; i++)
1.26 haesbaer 447: printf("\t%s\n", allowed_kvars[i]);
1.1 djm 448: }
449:
450: static char **
451: check_prepare_kvars(char *list)
452: {
453: char *item, **ret = NULL;
1.16 deraadt 454: u_int n = 0;
1.1 djm 455:
456: while ((item = strsep(&list, ", \t\n")) != NULL) {
457: check_kvar(item);
1.43 lteo 458: if ((ret = reallocarray(ret, (++n + 1), sizeof(*ret))) == NULL)
1.55 benno 459: err(1, "reallocarray(kvars)");
1.1 djm 460: if ((ret[n - 1] = strdup(item)) == NULL)
1.55 benno 461: err(1, "strdup");
1.1 djm 462: ret[n] = NULL;
463: }
1.20 claudio 464: return (ret);
1.1 djm 465: }
466:
467: static void
1.20 claudio 468: stats_prepare(struct statctx *sc)
1.1 djm 469: {
1.20 claudio 470: sc->buf = ptb->dummybuf;
471: sc->buflen = ptb->dummybuf_len;
472:
473: if (ptb->kvars)
474: sc->tcp_tcbaddr = kfind_tcb(sc->fd);
475: if (clock_gettime_tv(CLOCK_MONOTONIC, &sc->t_start) == -1)
476: err(1, "clock_gettime_tv");
1.1 djm 477: sc->t_last = sc->t_start;
478:
479: }
480:
481: static void
1.20 claudio 482: tcp_stats_display(unsigned long long total_elapsed, long double mbps,
1.11 claudio 483: float bwperc, struct statctx *sc, struct inpcb *inpcb,
484: struct tcpcb *tcpcb, struct socket *sockb)
485: {
486: int j;
487:
488: printf("%12llu %14llu %12.3Lf %7.2f%% ", total_elapsed, sc->bytes,
489: mbps, bwperc);
490:
1.20 claudio 491: if (ptb->kvars != NULL) {
492: kupdate_stats(sc->tcp_tcbaddr, inpcb, tcpcb,
1.11 claudio 493: sockb);
1.1 djm 494:
1.20 claudio 495: for (j = 0; ptb->kvars[j] != NULL; j++) {
1.11 claudio 496: #define S(a) #a
497: #define P(b, v, f) \
1.20 claudio 498: if (strcmp(ptb->kvars[j], S(b.v)) == 0) { \
1.11 claudio 499: printf("%s"f, j > 0 ? "," : "", b->v); \
500: continue; \
501: }
502: P(inpcb, inp_flags, "0x%08x")
503: P(sockb, so_rcv.sb_cc, "%lu")
1.26 haesbaer 504: P(sockb, so_rcv.sb_hiwat, "%lu")
1.19 claudio 505: P(sockb, so_rcv.sb_wat, "%lu")
1.11 claudio 506: P(sockb, so_snd.sb_cc, "%lu")
1.26 haesbaer 507: P(sockb, so_snd.sb_hiwat, "%lu")
1.19 claudio 508: P(sockb, so_snd.sb_wat, "%lu")
1.26 haesbaer 509: P(tcpcb, last_ack_sent, "%u")
510: P(tcpcb, max_sndwnd, "%lu")
511: P(tcpcb, rcv_adv, "%u")
512: P(tcpcb, rcv_nxt, "%u")
513: P(tcpcb, rcv_scale, "%u")
514: P(tcpcb, rcv_wnd, "%lu")
515: P(tcpcb, rfbuf_cnt, "%u")
516: P(tcpcb, rfbuf_ts, "%u")
517: P(tcpcb, snd_cwnd, "%lu")
518: P(tcpcb, snd_max, "%u")
519: P(tcpcb, snd_nxt, "%u")
520: P(tcpcb, snd_scale, "%u")
521: P(tcpcb, snd_ssthresh, "%lu")
1.11 claudio 522: P(tcpcb, snd_una, "%u")
523: P(tcpcb, snd_wl1, "%u")
524: P(tcpcb, snd_wl2, "%u")
525: P(tcpcb, snd_wnd, "%lu")
526: P(tcpcb, t_rcvtime, "%u")
1.26 haesbaer 527: P(tcpcb, t_rtseq, "%u")
528: P(tcpcb, t_rttmin, "%hu")
1.11 claudio 529: P(tcpcb, t_rtttime, "%u")
1.26 haesbaer 530: P(tcpcb, t_rttvar, "%hu")
1.11 claudio 531: P(tcpcb, t_srtt, "%hu")
1.26 haesbaer 532: P(tcpcb, ts_recent, "%u")
1.19 claudio 533: P(tcpcb, ts_recent_age, "%u")
1.11 claudio 534: #undef S
1.1 djm 535: #undef P
536: }
537: }
538: printf("\n");
539: }
540:
541: static void
1.20 claudio 542: tcp_process_slice(int fd, short event, void *bula)
1.1 djm 543: {
1.11 claudio 544: unsigned long long total_elapsed, since_last;
545: long double mbps, slice_mbps = 0;
546: float bwperc;
1.20 claudio 547: struct statctx *sc;
1.11 claudio 548: struct timeval t_cur, t_diff;
549: struct inpcb inpcb;
550: struct tcpcb tcpcb;
551: struct socket sockb;
552:
1.20 claudio 553: TAILQ_FOREACH(sc, &sc_queue, entry) {
554: if (clock_gettime_tv(CLOCK_MONOTONIC, &t_cur) == -1)
555: err(1, "clock_gettime_tv");
556: if (ptb->kvars != NULL) /* process kernel stats */
557: kupdate_stats(sc->tcp_tcbaddr, &inpcb, &tcpcb,
1.11 claudio 558: &sockb);
1.20 claudio 559:
1.11 claudio 560: timersub(&t_cur, &sc->t_start, &t_diff);
561: total_elapsed = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000;
562: timersub(&t_cur, &sc->t_last, &t_diff);
563: since_last = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000;
564: bwperc = (sc->bytes * 100.0) / mainstats.slice_bytes;
565: mbps = (sc->bytes * 8) / (since_last * 1000.0);
566: slice_mbps += mbps;
567:
1.20 claudio 568: tcp_stats_display(total_elapsed, mbps, bwperc, sc,
1.11 claudio 569: &inpcb, &tcpcb, &sockb);
570:
571: sc->t_last = t_cur;
572: sc->bytes = 0;
573: }
1.1 djm 574:
1.11 claudio 575: /* process stats for this slice */
576: if (slice_mbps > mainstats.peak_mbps)
577: mainstats.peak_mbps = slice_mbps;
1.20 claudio 578: printf("Conn: %3d Mbps: %12.3Lf Peak Mbps: %12.3Lf Avg Mbps: %12.3Lf\n",
579: mainstats.nconns, slice_mbps, mainstats.peak_mbps,
1.36 haesbaer 580: mainstats.nconns ? slice_mbps / mainstats.nconns : 0);
1.20 claudio 581: mainstats.slice_bytes = 0;
582:
583: set_slice_timer(mainstats.nconns > 0);
584: }
585:
586: static void
587: udp_process_slice(int fd, short event, void *v_sc)
588: {
589: struct statctx *sc = v_sc;
1.31 haesbaer 590: unsigned long long total_elapsed, since_last, pps;
591: long double slice_mbps;
1.20 claudio 592: struct timeval t_cur, t_diff;
593:
594: if (clock_gettime_tv(CLOCK_MONOTONIC, &t_cur) == -1)
595: err(1, "clock_gettime_tv");
596: /* Calculate pps */
597: timersub(&t_cur, &sc->t_start, &t_diff);
598: total_elapsed = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000;
599: timersub(&t_cur, &sc->t_last, &t_diff);
600: since_last = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000;
601: slice_mbps = (sc->bytes * 8) / (since_last * 1000.0);
602: pps = (sc->udp_slice_pkts * 1000) / since_last;
603: if (slice_mbps > mainstats.peak_mbps)
604: mainstats.peak_mbps = slice_mbps;
1.31 haesbaer 605: printf("Elapsed: %11llu Mbps: %11.3Lf Peak Mbps: %11.3Lf %s PPS: %7llu\n",
1.20 claudio 606: total_elapsed, slice_mbps, mainstats.peak_mbps,
607: ptb->sflag ? "Rx" : "Tx", pps);
608:
609: /* Clean up this slice time */
610: sc->t_last = t_cur;
611: sc->bytes = 0;
612: sc->udp_slice_pkts = 0;
613: set_slice_timer(1);
1.11 claudio 614: }
1.1 djm 615:
1.20 claudio 616: static void
617: udp_server_handle_sc(int fd, short event, void *v_sc)
1.11 claudio 618: {
619: ssize_t n;
1.20 claudio 620: struct statctx *sc = v_sc;
1.1 djm 621:
1.20 claudio 622: n = read(fd, ptb->dummybuf, ptb->dummybuf_len);
623: if (n == 0)
624: return;
625: else if (n == -1) {
1.34 haesbaer 626: if (errno != EINTR && errno != EWOULDBLOCK)
627: warn("fd %d read error", fd);
1.20 claudio 628: return;
629: }
1.11 claudio 630:
1.20 claudio 631: if (ptb->vflag >= 3)
632: fprintf(stderr, "read: %zd bytes\n", n);
633: /* If this was our first packet, start slice timer */
634: if (mainstats.peak_mbps == 0)
635: set_slice_timer(1);
636: /* Account packet */
637: sc->udp_slice_pkts++;
638: sc->bytes += n;
639: }
640:
641: static void
642: tcp_server_handle_sc(int fd, short event, void *v_sc)
643: {
644: struct statctx *sc = v_sc;
645: ssize_t n;
646:
647: n = read(sc->fd, sc->buf, sc->buflen);
648: if (n == -1) {
1.34 haesbaer 649: if (errno != EINTR && errno != EWOULDBLOCK)
650: warn("fd %d read error", sc->fd);
1.20 claudio 651: return;
652: } else if (n == 0) {
653: if (ptb->vflag)
654: fprintf(stderr, "%8d closed by remote end\n", sc->fd);
1.33 haesbaer 655:
656: TAILQ_REMOVE(&sc_queue, sc, entry);
657:
1.23 sthen 658: event_del(&sc->ev);
1.20 claudio 659: close(sc->fd);
1.33 haesbaer 660:
661: /* Some file descriptors are available again. */
662: if (evtimer_pending(&sc->tcp_ts->evt, NULL)) {
663: evtimer_del(&sc->tcp_ts->evt);
664: event_add(&sc->tcp_ts->ev, NULL);
665: }
666:
1.20 claudio 667: free(sc);
668: mainstats.nconns--;
669: return;
1.1 djm 670: }
1.20 claudio 671: if (ptb->vflag >= 3)
1.11 claudio 672: fprintf(stderr, "read: %zd bytes\n", n);
1.20 claudio 673: sc->bytes += n;
674: mainstats.slice_bytes += n;
675: }
1.11 claudio 676:
1.20 claudio 677: static void
1.33 haesbaer 678: tcp_server_accept(int fd, short event, void *arg)
1.20 claudio 679: {
1.33 haesbaer 680: struct tcpservsock *ts = arg;
1.49 chl 681: int sock;
1.20 claudio 682: struct statctx *sc;
683: struct sockaddr_storage ss;
684: socklen_t sslen;
685: char tmp[128];
686:
687: sslen = sizeof(ss);
1.33 haesbaer 688:
689: event_add(&ts->ev, NULL);
690: if (event & EV_TIMEOUT)
691: return;
1.48 guenther 692: if ((sock = accept4(fd, (struct sockaddr *)&ss, &sslen, SOCK_NONBLOCK))
693: == -1) {
1.33 haesbaer 694: /*
695: * Pause accept if we are out of file descriptors, or
696: * libevent will haunt us here too.
697: */
698: if (errno == ENFILE || errno == EMFILE) {
699: struct timeval evtpause = { 1, 0 };
700:
701: event_del(&ts->ev);
702: evtimer_add(&ts->evt, &evtpause);
1.38 deraadt 703: } else if (errno != EWOULDBLOCK && errno != EINTR &&
704: errno != ECONNABORTED)
1.33 haesbaer 705: warn("accept");
1.20 claudio 706: return;
707: }
708: saddr_ntop((struct sockaddr *)&ss, sslen,
709: tmp, sizeof(tmp));
1.24 haesbaer 710: if (ptb->Tflag != -1 && ss.ss_family == AF_INET) {
711: if (setsockopt(sock, IPPROTO_IP, IP_TOS,
712: &ptb->Tflag, sizeof(ptb->Tflag)))
713: err(1, "setsockopt IP_TOS");
714: }
715: if (ptb->Tflag != -1 && ss.ss_family == AF_INET6) {
716: if (setsockopt(sock, IPPROTO_IPV6, IPV6_TCLASS,
717: &ptb->Tflag, sizeof(ptb->Tflag)))
718: err(1, "setsockopt IPV6_TCLASS");
719: }
1.20 claudio 720: /* Alloc client structure and register reading callback */
721: if ((sc = calloc(1, sizeof(*sc))) == NULL)
722: err(1, "calloc");
1.33 haesbaer 723: sc->tcp_ts = ts;
1.20 claudio 724: sc->fd = sock;
725: stats_prepare(sc);
726: event_set(&sc->ev, sc->fd, EV_READ | EV_PERSIST,
727: tcp_server_handle_sc, sc);
728: event_add(&sc->ev, NULL);
729: TAILQ_INSERT_TAIL(&sc_queue, sc, entry);
730: mainstats.nconns++;
1.36 haesbaer 731: if (mainstats.nconns == 1)
732: set_slice_timer(1);
1.20 claudio 733: if (ptb->vflag)
1.28 haesbaer 734: fprintf(stderr, "Accepted connection from %s, fd = %d\n",
735: tmp, sc->fd);
1.1 djm 736: }
737:
1.20 claudio 738: static void
739: server_init(struct addrinfo *aitop, struct statctx *udp_sc)
1.1 djm 740: {
741: char tmp[128];
1.11 claudio 742: int sock, on = 1;
1.1 djm 743: struct addrinfo *ai;
1.20 claudio 744: struct event *ev;
1.33 haesbaer 745: struct tcpservsock *ts;
1.11 claudio 746: nfds_t lnfds;
1.1 djm 747:
1.11 claudio 748: lnfds = 0;
1.1 djm 749: for (ai = aitop; ai != NULL; ai = ai->ai_next) {
750: saddr_ntop(ai->ai_addr, ai->ai_addrlen, tmp, sizeof(tmp));
1.20 claudio 751: if (ptb->vflag)
752: fprintf(stderr, "Try to bind to %s\n", tmp);
1.1 djm 753: if ((sock = socket(ai->ai_family, ai->ai_socktype,
754: ai->ai_protocol)) == -1) {
755: if (ai->ai_next == NULL)
756: err(1, "socket");
1.20 claudio 757: if (ptb->vflag)
1.1 djm 758: warn("socket");
759: continue;
760: }
1.24 haesbaer 761: if (ptb->Tflag != -1 && ai->ai_family == AF_INET) {
762: if (setsockopt(sock, IPPROTO_IP, IP_TOS,
763: &ptb->Tflag, sizeof(ptb->Tflag)))
764: err(1, "setsockopt IP_TOS");
765: }
766: if (ptb->Tflag != -1 && ai->ai_family == AF_INET6) {
767: if (setsockopt(sock, IPPROTO_IPV6, IPV6_TCLASS,
768: &ptb->Tflag, sizeof(ptb->Tflag)))
769: err(1, "setsockopt IPV6_TCLASS");
770: }
1.1 djm 771: if (setsockopt(sock, SOL_SOCKET, SO_REUSEADDR,
772: &on, sizeof(on)) == -1)
773: warn("reuse port");
774: if (bind(sock, ai->ai_addr, ai->ai_addrlen) != 0) {
775: if (ai->ai_next == NULL)
776: err(1, "bind");
1.20 claudio 777: if (ptb->vflag)
1.1 djm 778: warn("bind");
779: close(sock);
780: continue;
781: }
1.20 claudio 782: if (ptb->Sflag) {
1.1 djm 783: if (setsockopt(sock, SOL_SOCKET, SO_RCVBUF,
1.20 claudio 784: &ptb->Sflag, sizeof(ptb->Sflag)) == -1)
1.54 bluhm 785: warn("set receive socket buffer size");
1.1 djm 786: }
1.20 claudio 787: if (TCP_MODE) {
788: if (listen(sock, 64) == -1) {
789: if (ai->ai_next == NULL)
790: err(1, "listen");
791: if (ptb->vflag)
792: warn("listen");
793: close(sock);
794: continue;
795: }
1.1 djm 796: }
1.33 haesbaer 797: if (UDP_MODE) {
798: if ((ev = calloc(1, sizeof(*ev))) == NULL)
799: err(1, "calloc");
1.20 claudio 800: event_set(ev, sock, EV_READ | EV_PERSIST,
801: udp_server_handle_sc, udp_sc);
1.33 haesbaer 802: event_add(ev, NULL);
803: } else {
804: if ((ts = calloc(1, sizeof(*ts))) == NULL)
805: err(1, "calloc");
806:
807: ts->fd = sock;
808: evtimer_set(&ts->evt, tcp_server_accept, ts);
809: event_set(&ts->ev, ts->fd, EV_READ,
810: tcp_server_accept, ts);
811: event_add(&ts->ev, NULL);
812: }
1.20 claudio 813: if (ptb->vflag >= 3)
814: fprintf(stderr, "bound to fd %d\n", sock);
1.11 claudio 815: lnfds++;
1.1 djm 816: }
1.51 claudio 817: if (!ptb->Uflag)
818: freeaddrinfo(aitop);
1.11 claudio 819: if (lnfds == 0)
1.1 djm 820: errx(1, "No working listen addresses found");
1.11 claudio 821: }
822:
823: static void
1.20 claudio 824: client_handle_sc(int fd, short event, void *v_sc)
825: {
826: struct statctx *sc = v_sc;
827: ssize_t n;
1.51 claudio 828: size_t blen = sc->buflen;
1.1 djm 829:
1.51 claudio 830: if (ptb->Rflag)
831: blen = arc4random_uniform(blen) + 1;
832: if ((n = write(sc->fd, sc->buf, blen)) == -1) {
1.34 haesbaer 833: if (errno == EINTR || errno == EWOULDBLOCK ||
1.20 claudio 834: (UDP_MODE && errno == ENOBUFS))
1.34 haesbaer 835: return;
1.20 claudio 836: err(1, "write");
1.11 claudio 837: }
1.20 claudio 838: if (TCP_MODE && n == 0) {
1.28 haesbaer 839: fprintf(stderr, "Remote end closed connection");
1.20 claudio 840: exit(1);
1.1 djm 841: }
1.20 claudio 842: if (ptb->vflag >= 3)
1.28 haesbaer 843: fprintf(stderr, "write: %zd bytes\n", n);
1.20 claudio 844: sc->bytes += n;
845: mainstats.slice_bytes += n;
846: if (UDP_MODE)
847: sc->udp_slice_pkts++;
1.1 djm 848: }
849:
1.20 claudio 850: static void
1.25 haesbaer 851: client_init(struct addrinfo *aitop, int nconn, struct statctx *udp_sc,
852: struct addrinfo *aib)
1.1 djm 853: {
1.20 claudio 854: struct statctx *sc;
855: struct addrinfo *ai;
1.14 claudio 856: char tmp[128];
857: int i, r, sock;
1.1 djm 858:
1.20 claudio 859: sc = udp_sc;
1.4 henning 860: for (i = 0; i < nconn; i++) {
861: for (sock = -1, ai = aitop; ai != NULL; ai = ai->ai_next) {
862: saddr_ntop(ai->ai_addr, ai->ai_addrlen, tmp,
863: sizeof(tmp));
1.20 claudio 864: if (ptb->vflag && i == 0)
1.4 henning 865: fprintf(stderr, "Trying %s\n", tmp);
866: if ((sock = socket(ai->ai_family, ai->ai_socktype,
867: ai->ai_protocol)) == -1) {
868: if (ai->ai_next == NULL)
869: err(1, "socket");
1.20 claudio 870: if (ptb->vflag)
1.4 henning 871: warn("socket");
872: continue;
873: }
1.25 haesbaer 874: if (aib != NULL) {
875: saddr_ntop(aib->ai_addr, aib->ai_addrlen,
876: tmp, sizeof(tmp));
877: if (ptb->vflag)
878: fprintf(stderr,
879: "Try to bind to %s\n", tmp);
880: if (bind(sock, (struct sockaddr *)aib->ai_addr,
881: aib->ai_addrlen) == -1)
882: err(1, "bind");
883: }
1.24 haesbaer 884: if (ptb->Tflag != -1 && ai->ai_family == AF_INET) {
885: if (setsockopt(sock, IPPROTO_IP, IP_TOS,
886: &ptb->Tflag, sizeof(ptb->Tflag)))
887: err(1, "setsockopt IP_TOS");
888: }
889: if (ptb->Tflag != -1 && ai->ai_family == AF_INET6) {
890: if (setsockopt(sock, IPPROTO_IPV6, IPV6_TCLASS,
891: &ptb->Tflag, sizeof(ptb->Tflag)))
892: err(1, "setsockopt IPV6_TCLASS");
893: }
1.20 claudio 894: if (ptb->Sflag) {
1.4 henning 895: if (setsockopt(sock, SOL_SOCKET, SO_SNDBUF,
1.20 claudio 896: &ptb->Sflag, sizeof(ptb->Sflag)) == -1)
1.54 bluhm 897: warn("set send socket buffer size");
1.4 henning 898: }
899: if (connect(sock, ai->ai_addr, ai->ai_addrlen) != 0) {
900: if (ai->ai_next == NULL)
901: err(1, "connect");
1.20 claudio 902: if (ptb->vflag)
1.4 henning 903: warn("connect");
904: close(sock);
905: sock = -1;
906: continue;
907: }
908: break;
1.1 djm 909: }
1.4 henning 910: if (sock == -1)
911: errx(1, "No host found");
1.50 krw 912: if ((r = fcntl(sock, F_GETFL)) == -1)
1.4 henning 913: err(1, "fcntl(F_GETFL)");
914: r |= O_NONBLOCK;
915: if (fcntl(sock, F_SETFL, r) == -1)
916: err(1, "fcntl(F_SETFL, O_NONBLOCK)");
1.20 claudio 917: /* Alloc and prepare stats */
918: if (TCP_MODE) {
919: if ((sc = calloc(1, sizeof(*sc))) == NULL)
920: err(1, "calloc");
921: }
922: sc->fd = sock;
923: stats_prepare(sc);
924: event_set(&sc->ev, sc->fd, EV_WRITE | EV_PERSIST,
925: client_handle_sc, sc);
926: event_add(&sc->ev, NULL);
927: TAILQ_INSERT_TAIL(&sc_queue, sc, entry);
928: mainstats.nconns++;
1.36 haesbaer 929: if (mainstats.nconns == 1)
930: set_slice_timer(1);
1.14 claudio 931: }
1.51 claudio 932: if (!ptb->Uflag)
933: freeaddrinfo(aitop);
1.35 haesbaer 934: if (aib != NULL)
935: freeaddrinfo(aib);
1.14 claudio 936:
1.20 claudio 937: if (ptb->vflag && nconn > 1)
1.29 haesbaer 938: fprintf(stderr, "%d connections established\n",
939: mainstats.nconns);
1.14 claudio 940: }
941:
1.24 haesbaer 942: static int
943: map_tos(char *s, int *val)
944: {
945: /* DiffServ Codepoints and other TOS mappings */
946: const struct toskeywords {
947: const char *keyword;
948: int val;
949: } *t, toskeywords[] = {
950: { "af11", IPTOS_DSCP_AF11 },
951: { "af12", IPTOS_DSCP_AF12 },
952: { "af13", IPTOS_DSCP_AF13 },
953: { "af21", IPTOS_DSCP_AF21 },
954: { "af22", IPTOS_DSCP_AF22 },
955: { "af23", IPTOS_DSCP_AF23 },
956: { "af31", IPTOS_DSCP_AF31 },
957: { "af32", IPTOS_DSCP_AF32 },
958: { "af33", IPTOS_DSCP_AF33 },
959: { "af41", IPTOS_DSCP_AF41 },
960: { "af42", IPTOS_DSCP_AF42 },
961: { "af43", IPTOS_DSCP_AF43 },
962: { "critical", IPTOS_PREC_CRITIC_ECP },
963: { "cs0", IPTOS_DSCP_CS0 },
964: { "cs1", IPTOS_DSCP_CS1 },
965: { "cs2", IPTOS_DSCP_CS2 },
966: { "cs3", IPTOS_DSCP_CS3 },
967: { "cs4", IPTOS_DSCP_CS4 },
968: { "cs5", IPTOS_DSCP_CS5 },
969: { "cs6", IPTOS_DSCP_CS6 },
970: { "cs7", IPTOS_DSCP_CS7 },
971: { "ef", IPTOS_DSCP_EF },
972: { "inetcontrol", IPTOS_PREC_INTERNETCONTROL },
973: { "lowdelay", IPTOS_LOWDELAY },
974: { "netcontrol", IPTOS_PREC_NETCONTROL },
975: { "reliability", IPTOS_RELIABILITY },
976: { "throughput", IPTOS_THROUGHPUT },
977: { NULL, -1 },
978: };
979:
980: for (t = toskeywords; t->keyword != NULL; t++) {
981: if (strcmp(s, t->keyword) == 0) {
982: *val = t->val;
983: return (1);
984: }
985: }
986:
987: return (0);
988: }
989:
1.30 henning 990: static void
991: quit(int sig, short event, void *arg)
992: {
993: exit(0);
994: }
995:
1.1 djm 996: int
997: main(int argc, char **argv)
998: {
1.30 henning 999: struct timeval tv;
1.37 haesbaer 1000: unsigned int secs, rtable;
1.1 djm 1001:
1002: char kerr[_POSIX2_LINE_MAX], *tmp;
1.25 haesbaer 1003: struct addrinfo *aitop, *aib, hints;
1.1 djm 1004: const char *errstr;
1.11 claudio 1005: struct rlimit rl;
1.20 claudio 1006: int ch, herr, nconn;
1.42 dlg 1007: int family = PF_UNSPEC;
1.12 deraadt 1008: struct nlist nl[] = { { "_tcbtable" }, { "" } };
1.25 haesbaer 1009: const char *host = NULL, *port = DEFAULT_PORT, *srcbind = NULL;
1.30 henning 1010: struct event ev_sigint, ev_sigterm, ev_sighup, ev_progtimer;
1.20 claudio 1011: struct statctx *udp_sc = NULL;
1.51 claudio 1012: struct sockaddr_un sock_un;
1.1 djm 1013:
1.20 claudio 1014: /* Init world */
1.45 millert 1015: setvbuf(stdout, NULL, _IOLBF, 0);
1.20 claudio 1016: ptb = &tcpbench;
1017: ptb->dummybuf_len = 0;
1.51 claudio 1018: ptb->Sflag = ptb->sflag = ptb->vflag = ptb->Rflag = ptb->Uflag = 0;
1.20 claudio 1019: ptb->kvmh = NULL;
1020: ptb->kvars = NULL;
1021: ptb->rflag = DEFAULT_STATS_INTERVAL;
1.24 haesbaer 1022: ptb->Tflag = -1;
1.20 claudio 1023: nconn = 1;
1.25 haesbaer 1024: aib = NULL;
1.30 henning 1025: secs = 0;
1.1 djm 1026:
1.51 claudio 1027: while ((ch = getopt(argc, argv, "46b:B:hlk:n:p:Rr:sS:t:T:uUvV:")) != -1) {
1.1 djm 1028: switch (ch) {
1.42 dlg 1029: case '4':
1030: family = PF_INET;
1031: break;
1032: case '6':
1033: family = PF_INET6;
1034: break;
1.25 haesbaer 1035: case 'b':
1036: srcbind = optarg;
1037: break;
1.1 djm 1038: case 'l':
1039: list_kvars();
1040: exit(0);
1041: case 'k':
1042: if ((tmp = strdup(optarg)) == NULL)
1.53 benno 1043: err(1, "strdup");
1.20 claudio 1044: ptb->kvars = check_prepare_kvars(tmp);
1.1 djm 1045: free(tmp);
1046: break;
1.51 claudio 1047: case 'R':
1048: ptb->Rflag = 1;
1049: break;
1.1 djm 1050: case 'r':
1.20 claudio 1051: ptb->rflag = strtonum(optarg, 0, 60 * 60 * 24 * 1000,
1.1 djm 1052: &errstr);
1053: if (errstr != NULL)
1054: errx(1, "statistics interval is %s: %s",
1055: errstr, optarg);
1056: break;
1057: case 'p':
1058: port = optarg;
1059: break;
1060: case 's':
1.20 claudio 1061: ptb->sflag = 1;
1.1 djm 1062: break;
1063: case 'S':
1.20 claudio 1064: ptb->Sflag = strtonum(optarg, 0, 1024*1024*1024,
1.1 djm 1065: &errstr);
1066: if (errstr != NULL)
1.54 bluhm 1067: errx(1, "socket buffer size is %s: %s",
1.1 djm 1068: errstr, optarg);
1069: break;
1070: case 'B':
1.20 claudio 1071: ptb->dummybuf_len = strtonum(optarg, 0, 1024*1024*1024,
1.1 djm 1072: &errstr);
1073: if (errstr != NULL)
1074: errx(1, "read/write buffer size is %s: %s",
1075: errstr, optarg);
1076: break;
1077: case 'v':
1.20 claudio 1078: ptb->vflag++;
1.9 claudio 1079: break;
1080: case 'V':
1.37 haesbaer 1081: rtable = (unsigned int)strtonum(optarg, 0,
1.9 claudio 1082: RT_TABLEID_MAX, &errstr);
1083: if (errstr)
1.17 guenther 1084: errx(1, "rtable value is %s: %s",
1.9 claudio 1085: errstr, optarg);
1.37 haesbaer 1086: if (setrtable(rtable) == -1)
1087: err(1, "setrtable");
1.1 djm 1088: break;
1.4 henning 1089: case 'n':
1090: nconn = strtonum(optarg, 0, 65535, &errstr);
1091: if (errstr != NULL)
1092: errx(1, "number of connections is %s: %s",
1093: errstr, optarg);
1094: break;
1.20 claudio 1095: case 'u':
1096: ptb->uflag = 1;
1.24 haesbaer 1097: break;
1.51 claudio 1098: case 'U':
1099: ptb->Uflag = 1;
1100: break;
1.24 haesbaer 1101: case 'T':
1102: if (map_tos(optarg, &ptb->Tflag))
1103: break;
1104: errstr = NULL;
1105: if (strlen(optarg) > 1 && optarg[0] == '0' &&
1106: optarg[1] == 'x')
1107: ptb->Tflag = (int)strtol(optarg, NULL, 16);
1108: else
1109: ptb->Tflag = (int)strtonum(optarg, 0, 255,
1110: &errstr);
1111: if (ptb->Tflag == -1 || ptb->Tflag > 255 || errstr)
1112: errx(1, "illegal tos value %s", optarg);
1.20 claudio 1113: break;
1.30 henning 1114: case 't':
1115: secs = strtonum(optarg, 1, UINT_MAX, &errstr);
1116: if (errstr != NULL)
1117: errx(1, "secs is %s: %s",
1118: errstr, optarg);
1119: break;
1.1 djm 1120: case 'h':
1121: default:
1122: usage();
1123: }
1124: }
1125:
1.51 claudio 1126: if (pledge("stdio rpath dns inet unix id proc", NULL) == -1)
1.47 benno 1127: err(1, "pledge");
1128:
1.1 djm 1129: argv += optind;
1130: argc -= optind;
1.51 claudio 1131: if ((argc != (ptb->sflag && !ptb->Uflag ? 0 : 1)) ||
1.20 claudio 1132: (UDP_MODE && (ptb->kvars || nconn != 1)))
1.1 djm 1133: usage();
1.4 henning 1134:
1.46 deraadt 1135: if (ptb->kvars) {
1136: if ((ptb->kvmh = kvm_openfiles(NULL, NULL, NULL,
1137: O_RDONLY, kerr)) == NULL)
1138: errx(1, "kvm_open: %s", kerr);
1139: drop_gid();
1140: if (kvm_nlist(ptb->kvmh, nl) < 0 || nl[0].n_type == 0)
1141: errx(1, "kvm: no namelist");
1142: ptb->ktcbtab = nl[0].n_value;
1143: } else
1144: drop_gid();
1145:
1.51 claudio 1146: if (pledge("stdio id dns inet unix", NULL) == -1)
1.47 benno 1147: err(1, "pledge");
1148:
1.51 claudio 1149: if (!ptb->sflag || ptb->Uflag)
1.1 djm 1150: host = argv[0];
1.20 claudio 1151: /*
1152: * Rationale,
1153: * If TCP, use a big buffer with big reads/writes.
1154: * If UDP, use a big buffer in server and a buffer the size of a
1155: * ethernet packet.
1156: */
1157: if (!ptb->dummybuf_len) {
1158: if (ptb->sflag || TCP_MODE)
1159: ptb->dummybuf_len = DEFAULT_BUF;
1160: else
1161: ptb->dummybuf_len = DEFAULT_UDP_PKT;
1162: }
1.1 djm 1163:
1.13 claudio 1164: bzero(&hints, sizeof(hints));
1.42 dlg 1165: hints.ai_family = family;
1.25 haesbaer 1166: if (UDP_MODE) {
1.20 claudio 1167: hints.ai_socktype = SOCK_DGRAM;
1.25 haesbaer 1168: hints.ai_protocol = IPPROTO_UDP;
1.27 haesbaer 1169: } else {
1.20 claudio 1170: hints.ai_socktype = SOCK_STREAM;
1.25 haesbaer 1171: hints.ai_protocol = IPPROTO_TCP;
1172: }
1.51 claudio 1173: if (ptb->Uflag) {
1174: hints.ai_family = AF_UNIX;
1175: hints.ai_protocol = 0;
1176: sock_un.sun_family = AF_UNIX;
1177: if (strlcpy(sock_un.sun_path, host, sizeof(sock_un.sun_path)) >=
1178: sizeof(sock_un.sun_path))
1179: errx(1, "socket name '%s' too long", host);
1180: hints.ai_addr = (struct sockaddr *)&sock_un;
1181: hints.ai_addrlen = sizeof(sock_un);
1182: aitop = &hints;
1183: } else {
1184: if (ptb->sflag)
1185: hints.ai_flags = AI_PASSIVE;
1186: if (srcbind != NULL) {
1187: hints.ai_flags |= AI_NUMERICHOST;
1188: herr = getaddrinfo(srcbind, NULL, &hints, &aib);
1189: hints.ai_flags &= ~AI_NUMERICHOST;
1190: if (herr != 0) {
1191: if (herr == EAI_SYSTEM)
1192: err(1, "getaddrinfo");
1193: else
1194: errx(1, "getaddrinfo: %s",
1195: gai_strerror(herr));
1196: }
1197: }
1198: if ((herr = getaddrinfo(host, port, &hints, &aitop)) != 0) {
1.25 haesbaer 1199: if (herr == EAI_SYSTEM)
1200: err(1, "getaddrinfo");
1201: else
1202: errx(1, "getaddrinfo: %s", gai_strerror(herr));
1203: }
1204: }
1.1 djm 1205:
1.51 claudio 1206: if (pledge("stdio id inet unix", NULL) == -1)
1.47 benno 1207: err(1, "pledge");
1208:
1.11 claudio 1209: if (getrlimit(RLIMIT_NOFILE, &rl) == -1)
1210: err(1, "getrlimit");
1211: if (rl.rlim_cur < MAX_FD)
1212: rl.rlim_cur = MAX_FD;
1213: if (setrlimit(RLIMIT_NOFILE, &rl))
1214: err(1, "setrlimit");
1215: if (getrlimit(RLIMIT_NOFILE, &rl) == -1)
1216: err(1, "getrlimit");
1.47 benno 1217:
1.51 claudio 1218: if (pledge("stdio inet unix", NULL) == -1)
1.47 benno 1219: err(1, "pledge");
1220:
1.20 claudio 1221: /* Init world */
1222: TAILQ_INIT(&sc_queue);
1223: if ((ptb->dummybuf = malloc(ptb->dummybuf_len)) == NULL)
1224: err(1, "malloc");
1225: arc4random_buf(ptb->dummybuf, ptb->dummybuf_len);
1226:
1227: /* Setup libevent and signals */
1228: event_init();
1229: signal_set(&ev_sigterm, SIGTERM, signal_handler, NULL);
1230: signal_set(&ev_sighup, SIGHUP, signal_handler, NULL);
1231: signal_set(&ev_sigint, SIGINT, signal_handler, NULL);
1232: signal_add(&ev_sigint, NULL);
1233: signal_add(&ev_sigterm, NULL);
1234: signal_add(&ev_sighup, NULL);
1235: signal(SIGPIPE, SIG_IGN);
1236:
1.27 haesbaer 1237: if (UDP_MODE) {
1238: if ((udp_sc = calloc(1, sizeof(*udp_sc))) == NULL)
1239: err(1, "calloc");
1240: udp_sc->fd = -1;
1241: stats_prepare(udp_sc);
1242: evtimer_set(&mainstats.timer, udp_process_slice, udp_sc);
1243: } else {
1.20 claudio 1244: print_tcp_header();
1245: evtimer_set(&mainstats.timer, tcp_process_slice, NULL);
1.27 haesbaer 1246: }
1.20 claudio 1247:
1.27 haesbaer 1248: if (ptb->sflag)
1.20 claudio 1249: server_init(aitop, udp_sc);
1.30 henning 1250: else {
1251: if (secs > 0) {
1252: timerclear(&tv);
1253: tv.tv_sec = secs + 1;
1254: evtimer_set(&ev_progtimer, quit, NULL);
1255: evtimer_add(&ev_progtimer, &tv);
1256: }
1.25 haesbaer 1257: client_init(aitop, nconn, udp_sc, aib);
1.47 benno 1258:
1259: if (pledge("stdio", NULL) == -1)
1260: err(1, "pledge");
1.30 henning 1261: }
1.47 benno 1262:
1.20 claudio 1263: /* libevent main loop*/
1264: event_dispatch();
1.1 djm 1265:
1.20 claudio 1266: return (0);
1.1 djm 1267: }