Annotation of src/usr.bin/tcpbench/tcpbench.c, Revision 1.60
1.60 ! stsp 1: /* $OpenBSD: tcpbench.c,v 1.59 2018/09/28 19:01:52 bluhm Exp $ */
1.52 bluhm 2:
1.1 djm 3: /*
4: * Copyright (c) 2008 Damien Miller <djm@mindrot.org>
1.20 claudio 5: * Copyright (c) 2011 Christiano F. Haesbaert <haesbaert@haesbaert.org>
1.1 djm 6: *
7: * Permission to use, copy, modify, and distribute this software for any
8: * purpose with or without fee is hereby granted, provided that the above
9: * copyright notice and this permission notice appear in all copies.
10: *
11: * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
12: * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
13: * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
14: * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
15: * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
16: * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
17: * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
18: */
19:
20: #include <sys/types.h>
21: #include <sys/time.h>
22: #include <sys/socket.h>
23: #include <sys/socketvar.h>
1.11 claudio 24: #include <sys/resource.h>
1.20 claudio 25: #include <sys/queue.h>
1.51 claudio 26: #include <sys/un.h>
1.1 djm 27:
28: #include <net/route.h>
29:
30: #include <netinet/in.h>
31: #include <netinet/ip.h>
32: #include <netinet/tcp.h>
33: #include <netinet/tcp_timer.h>
34: #include <netinet/tcp_fsm.h>
35: #include <netinet/in_pcb.h>
36: #include <netinet/tcp_var.h>
37:
38: #include <arpa/inet.h>
39:
40: #include <unistd.h>
41: #include <limits.h>
42: #include <stdlib.h>
43: #include <stdio.h>
44: #include <string.h>
45: #include <errno.h>
1.20 claudio 46: #include <event.h>
1.1 djm 47: #include <netdb.h>
48: #include <signal.h>
49: #include <err.h>
50: #include <fcntl.h>
51: #include <poll.h>
1.57 deraadt 52: #include <paths.h>
1.1 djm 53:
54: #include <kvm.h>
55: #include <nlist.h>
56:
1.11 claudio 57: #define DEFAULT_PORT "12345"
58: #define DEFAULT_STATS_INTERVAL 1000 /* ms */
1.20 claudio 59: #define DEFAULT_BUF (256 * 1024)
60: #define DEFAULT_UDP_PKT (1500 - 28) /* TODO don't hardcode this */
61: #define TCP_MODE !ptb->uflag
62: #define UDP_MODE ptb->uflag
1.11 claudio 63: #define MAX_FD 1024
1.1 djm 64:
1.20 claudio 65: /* Our tcpbench globals */
66: struct {
1.54 bluhm 67: int Sflag; /* Socket buffer size */
1.20 claudio 68: u_int rflag; /* Report rate (ms) */
69: int sflag; /* True if server */
1.24 haesbaer 70: int Tflag; /* ToS if != -1 */
1.20 claudio 71: int vflag; /* Verbose */
72: int uflag; /* UDP mode */
1.51 claudio 73: int Uflag; /* UNIX (AF_LOCAL) mode */
74: int Rflag; /* randomize client write size */
1.20 claudio 75: kvm_t *kvmh; /* Kvm handler */
76: char **kvars; /* Kvm enabled vars */
77: u_long ktcbtab; /* Ktcb */
78: char *dummybuf; /* IO buffer */
79: size_t dummybuf_len; /* IO buffer len */
80: } tcpbench, *ptb;
1.1 djm 81:
1.33 haesbaer 82: struct tcpservsock {
83: struct event ev;
84: struct event evt;
85: int fd;
86: };
87:
1.20 claudio 88: /* stats for a single tcp connection, udp uses only one */
1.1 djm 89: struct statctx {
1.20 claudio 90: TAILQ_ENTRY(statctx) entry;
1.11 claudio 91: struct timeval t_start, t_last;
1.1 djm 92: unsigned long long bytes;
1.20 claudio 93: int fd;
94: char *buf;
95: size_t buflen;
96: struct event ev;
97: /* TCP only */
1.33 haesbaer 98: struct tcpservsock *tcp_ts;
1.20 claudio 99: u_long tcp_tcbaddr;
100: /* UDP only */
101: u_long udp_slice_pkts;
1.1 djm 102: };
103:
1.20 claudio 104: static void signal_handler(int, short, void *);
105: static void saddr_ntop(const struct sockaddr *, socklen_t, char *, size_t);
106: static void drop_gid(void);
107: static void set_slice_timer(int);
1.58 bluhm 108: static void print_tcp_header(void);
1.20 claudio 109: static void kget(u_long, void *, size_t);
110: static u_long kfind_tcb(int);
111: static void kupdate_stats(u_long, struct inpcb *, struct tcpcb *,
112: struct socket *);
113: static void list_kvars(void);
114: static void check_kvar(const char *);
115: static char ** check_prepare_kvars(char *);
116: static void stats_prepare(struct statctx *);
117: static void tcp_stats_display(unsigned long long, long double, float,
118: struct statctx *, struct inpcb *, struct tcpcb *, struct socket *);
119: static void tcp_process_slice(int, short, void *);
120: static void tcp_server_handle_sc(int, short, void *);
121: static void tcp_server_accept(int, short, void *);
122: static void server_init(struct addrinfo *, struct statctx *);
123: static void client_handle_sc(int, short, void *);
1.25 haesbaer 124: static void client_init(struct addrinfo *, int, struct statctx *,
125: struct addrinfo *);
1.20 claudio 126: static int clock_gettime_tv(clockid_t, struct timeval *);
127: static void udp_server_handle_sc(int, short, void *);
128: static void udp_process_slice(int, short, void *);
1.24 haesbaer 129: static int map_tos(char *, int *);
1.11 claudio 130: /*
131: * We account the mainstats here, that is the stats
132: * for all connections, all variables starting with slice
133: * are used to account information for the timeslice
134: * between each output. Peak variables record the highest
135: * between all slices so far.
136: */
137: static struct {
138: unsigned long long slice_bytes; /* bytes for last slice */
139: long double peak_mbps; /* peak mbps so far */
1.58 bluhm 140: int nconns; /* connected clients */
1.20 claudio 141: struct event timer; /* process timer */
1.11 claudio 142: } mainstats;
143:
1.20 claudio 144: /* When adding variables, also add to tcp_stats_display() */
1.1 djm 145: static const char *allowed_kvars[] = {
146: "inpcb.inp_flags",
147: "sockb.so_rcv.sb_cc",
1.26 haesbaer 148: "sockb.so_rcv.sb_hiwat",
1.19 claudio 149: "sockb.so_rcv.sb_wat",
1.1 djm 150: "sockb.so_snd.sb_cc",
1.26 haesbaer 151: "sockb.so_snd.sb_hiwat",
1.19 claudio 152: "sockb.so_snd.sb_wat",
1.26 haesbaer 153: "tcpcb.last_ack_sent",
154: "tcpcb.max_sndwnd",
155: "tcpcb.rcv_adv",
156: "tcpcb.rcv_nxt",
157: "tcpcb.rcv_scale",
158: "tcpcb.rcv_wnd",
159: "tcpcb.rfbuf_cnt",
160: "tcpcb.rfbuf_ts",
161: "tcpcb.snd_cwnd",
162: "tcpcb.snd_max",
163: "tcpcb.snd_nxt",
164: "tcpcb.snd_scale",
165: "tcpcb.snd_ssthresh",
1.1 djm 166: "tcpcb.snd_una",
167: "tcpcb.snd_wl1",
168: "tcpcb.snd_wl2",
169: "tcpcb.snd_wnd",
170: "tcpcb.t_rcvtime",
1.26 haesbaer 171: "tcpcb.t_rtseq",
172: "tcpcb.t_rttmin",
1.1 djm 173: "tcpcb.t_rtttime",
1.26 haesbaer 174: "tcpcb.t_rttvar",
1.1 djm 175: "tcpcb.t_srtt",
1.26 haesbaer 176: "tcpcb.ts_recent",
1.19 claudio 177: "tcpcb.ts_recent_age",
1.1 djm 178: NULL
179: };
180:
1.20 claudio 181: TAILQ_HEAD(, statctx) sc_queue;
1.1 djm 182:
183: static void __dead
184: usage(void)
185: {
186: fprintf(stderr,
1.6 jmc 187: "usage: tcpbench -l\n"
1.51 claudio 188: " tcpbench [-46RUuv] [-B buf] [-b addr] [-k kvars] [-n connections]\n"
1.25 haesbaer 189: " [-p port] [-r interval] [-S space] [-T toskeyword]\n"
1.30 henning 190: " [-t secs] [-V rtable] hostname\n"
1.51 claudio 191: " tcpbench -s [-46Uuv] [-B buf] [-k kvars] [-p port] [-r interval]\n"
192: " [-S space] [-T toskeyword] [-V rtable] [hostname]\n");
1.1 djm 193: exit(1);
194: }
195:
196: static void
1.20 claudio 197: signal_handler(int sig, short event, void *bula)
198: {
199: /*
200: * signal handler rules don't apply, libevent decouples for us
201: */
202: switch (sig) {
203: case SIGINT:
204: case SIGTERM:
205: case SIGHUP:
206: warnx("Terminated by signal %d", sig);
207: exit(0);
208: break; /* NOTREACHED */
209: default:
210: errx(1, "unexpected signal %d", sig);
211: break; /* NOTREACHED */
212: }
213: }
214:
215: static void
1.1 djm 216: saddr_ntop(const struct sockaddr *addr, socklen_t alen, char *buf, size_t len)
217: {
218: char hbuf[NI_MAXHOST], pbuf[NI_MAXSERV];
219: int herr;
220:
1.51 claudio 221: if (addr->sa_family == AF_UNIX) {
222: struct sockaddr_un *sun = (struct sockaddr_un *)addr;
223: snprintf(buf, len, "%s", sun->sun_path);
224: return;
225: }
1.3 djm 226: if ((herr = getnameinfo(addr, alen, hbuf, sizeof(hbuf),
227: pbuf, sizeof(pbuf), NI_NUMERICHOST|NI_NUMERICSERV)) != 0) {
1.1 djm 228: if (herr == EAI_SYSTEM)
229: err(1, "getnameinfo");
230: else
231: errx(1, "getnameinfo: %s", gai_strerror(herr));
232: }
233: snprintf(buf, len, "[%s]:%s", hbuf, pbuf);
234: }
235:
236: static void
1.20 claudio 237: drop_gid(void)
238: {
239: gid_t gid;
240:
241: gid = getgid();
242: if (setresgid(gid, gid, gid) == -1)
243: err(1, "setresgid");
244: }
245:
246: static void
247: set_slice_timer(int on)
1.11 claudio 248: {
1.20 claudio 249: struct timeval tv;
1.11 claudio 250:
1.20 claudio 251: if (ptb->rflag == 0)
1.11 claudio 252: return;
253:
1.20 claudio 254: if (on) {
255: if (evtimer_pending(&mainstats.timer, NULL))
256: return;
257: /* XXX Is there a better way to do this ? */
258: tv.tv_sec = ptb->rflag / 1000;
259: tv.tv_usec = (ptb->rflag % 1000) * 1000;
1.58 bluhm 260:
1.20 claudio 261: evtimer_add(&mainstats.timer, &tv);
262: } else if (evtimer_pending(&mainstats.timer, NULL))
263: evtimer_del(&mainstats.timer);
264: }
1.58 bluhm 265:
1.20 claudio 266: static int
267: clock_gettime_tv(clockid_t clock_id, struct timeval *tv)
268: {
269: struct timespec ts;
270:
271: if (clock_gettime(clock_id, &ts) == -1)
272: return (-1);
1.58 bluhm 273:
1.20 claudio 274: TIMESPEC_TO_TIMEVAL(tv, &ts);
1.58 bluhm 275:
1.20 claudio 276: return (0);
1.11 claudio 277: }
278:
279: static void
1.20 claudio 280: print_tcp_header(void)
1.11 claudio 281: {
282: char **kv;
1.59 bluhm 283:
284: if (ptb->rflag == 0)
285: return;
1.20 claudio 286:
1.11 claudio 287: printf("%12s %14s %12s %8s ", "elapsed_ms", "bytes", "mbps",
288: "bwidth");
1.58 bluhm 289: for (kv = ptb->kvars; ptb->kvars != NULL && *kv != NULL; kv++)
1.20 claudio 290: printf("%s%s", kv != ptb->kvars ? "," : "", *kv);
1.11 claudio 291: printf("\n");
292: }
293:
294: static void
1.20 claudio 295: kget(u_long addr, void *buf, size_t size)
1.1 djm 296: {
1.20 claudio 297: if (kvm_read(ptb->kvmh, addr, buf, size) != (ssize_t)size)
298: errx(1, "kvm_read: %s", kvm_geterr(ptb->kvmh));
1.1 djm 299: }
300:
301: static u_long
1.20 claudio 302: kfind_tcb(int sock)
1.1 djm 303: {
304: struct inpcbtable tcbtab;
1.40 tedu 305: struct inpcb *next, *prev;
1.41 tedu 306: struct inpcb inpcb, prevpcb;
1.1 djm 307: struct tcpcb tcpcb;
308:
309: struct sockaddr_storage me, them;
310: socklen_t melen, themlen;
311: struct sockaddr_in *in4;
312: struct sockaddr_in6 *in6;
313: char tmp1[64], tmp2[64];
1.11 claudio 314: int nretry;
1.1 djm 315:
1.11 claudio 316: nretry = 10;
1.1 djm 317: melen = themlen = sizeof(struct sockaddr_storage);
318: if (getsockname(sock, (struct sockaddr *)&me, &melen) == -1)
319: err(1, "getsockname");
320: if (getpeername(sock, (struct sockaddr *)&them, &themlen) == -1)
321: err(1, "getpeername");
322: if (me.ss_family != them.ss_family)
323: errx(1, "%s: me.ss_family != them.ss_family", __func__);
324: if (me.ss_family != AF_INET && me.ss_family != AF_INET6)
325: errx(1, "%s: unknown socket family", __func__);
1.20 claudio 326: if (ptb->vflag >= 2) {
1.1 djm 327: saddr_ntop((struct sockaddr *)&me, me.ss_len,
328: tmp1, sizeof(tmp1));
329: saddr_ntop((struct sockaddr *)&them, them.ss_len,
330: tmp2, sizeof(tmp2));
331: fprintf(stderr, "Our socket local %s remote %s\n", tmp1, tmp2);
332: }
1.20 claudio 333: if (ptb->vflag >= 2)
334: fprintf(stderr, "Using PCB table at %lu\n", ptb->ktcbtab);
1.11 claudio 335: retry:
1.20 claudio 336: kget(ptb->ktcbtab, &tcbtab, sizeof(tcbtab));
1.40 tedu 337: prev = NULL;
1.39 krw 338: next = TAILQ_FIRST(&tcbtab.inpt_queue);
1.1 djm 339:
1.20 claudio 340: if (ptb->vflag >= 2)
1.40 tedu 341: fprintf(stderr, "PCB start at %p\n", next);
342: while (next != NULL) {
1.20 claudio 343: if (ptb->vflag >= 2)
1.1 djm 344: fprintf(stderr, "Checking PCB %p\n", next);
1.20 claudio 345: kget((u_long)next, &inpcb, sizeof(inpcb));
1.41 tedu 346: if (prev != NULL) {
347: kget((u_long)prev, &prevpcb, sizeof(prevpcb));
348: if (TAILQ_NEXT(&prevpcb, inp_queue) != next) {
349: if (nretry--) {
350: warnx("PCB prev pointer insane");
351: goto retry;
352: } else
353: errx(1, "PCB prev pointer insane,"
354: " all attempts exhaused");
355: }
356: }
1.1 djm 357: prev = next;
1.39 krw 358: next = TAILQ_NEXT(&inpcb, inp_queue);
1.1 djm 359:
360: if (me.ss_family == AF_INET) {
361: if ((inpcb.inp_flags & INP_IPV6) != 0) {
1.20 claudio 362: if (ptb->vflag >= 2)
1.1 djm 363: fprintf(stderr, "Skip: INP_IPV6");
364: continue;
365: }
1.20 claudio 366: if (ptb->vflag >= 2) {
1.1 djm 367: inet_ntop(AF_INET, &inpcb.inp_laddr,
368: tmp1, sizeof(tmp1));
369: inet_ntop(AF_INET, &inpcb.inp_faddr,
370: tmp2, sizeof(tmp2));
371: fprintf(stderr, "PCB %p local: [%s]:%d "
372: "remote: [%s]:%d\n", prev,
373: tmp1, inpcb.inp_lport,
374: tmp2, inpcb.inp_fport);
375: }
376: in4 = (struct sockaddr_in *)&me;
377: if (memcmp(&in4->sin_addr, &inpcb.inp_laddr,
378: sizeof(struct in_addr)) != 0 ||
379: in4->sin_port != inpcb.inp_lport)
380: continue;
381: in4 = (struct sockaddr_in *)&them;
382: if (memcmp(&in4->sin_addr, &inpcb.inp_faddr,
383: sizeof(struct in_addr)) != 0 ||
384: in4->sin_port != inpcb.inp_fport)
385: continue;
386: } else {
387: if ((inpcb.inp_flags & INP_IPV6) == 0)
388: continue;
1.20 claudio 389: if (ptb->vflag >= 2) {
1.1 djm 390: inet_ntop(AF_INET6, &inpcb.inp_laddr6,
391: tmp1, sizeof(tmp1));
392: inet_ntop(AF_INET6, &inpcb.inp_faddr6,
393: tmp2, sizeof(tmp2));
394: fprintf(stderr, "PCB %p local: [%s]:%d "
395: "remote: [%s]:%d\n", prev,
396: tmp1, inpcb.inp_lport,
397: tmp2, inpcb.inp_fport);
398: }
399: in6 = (struct sockaddr_in6 *)&me;
400: if (memcmp(&in6->sin6_addr, &inpcb.inp_laddr6,
401: sizeof(struct in6_addr)) != 0 ||
402: in6->sin6_port != inpcb.inp_lport)
403: continue;
404: in6 = (struct sockaddr_in6 *)&them;
405: if (memcmp(&in6->sin6_addr, &inpcb.inp_faddr6,
406: sizeof(struct in6_addr)) != 0 ||
407: in6->sin6_port != inpcb.inp_fport)
408: continue;
409: }
1.20 claudio 410: kget((u_long)inpcb.inp_ppcb, &tcpcb, sizeof(tcpcb));
1.1 djm 411: if (tcpcb.t_state != TCPS_ESTABLISHED) {
1.20 claudio 412: if (ptb->vflag >= 2)
1.1 djm 413: fprintf(stderr, "Not established\n");
414: continue;
415: }
1.20 claudio 416: if (ptb->vflag >= 2)
1.1 djm 417: fprintf(stderr, "Found PCB at %p\n", prev);
1.20 claudio 418: return ((u_long)prev);
1.1 djm 419: }
420:
421: errx(1, "No matching PCB found");
422: }
423:
424: static void
1.20 claudio 425: kupdate_stats(u_long tcbaddr, struct inpcb *inpcb,
426: struct tcpcb *tcpcb, struct socket *sockb)
1.1 djm 427: {
1.20 claudio 428: kget(tcbaddr, inpcb, sizeof(*inpcb));
429: kget((u_long)inpcb->inp_ppcb, tcpcb, sizeof(*tcpcb));
430: kget((u_long)inpcb->inp_socket, sockb, sizeof(*sockb));
1.1 djm 431: }
432:
433: static void
434: check_kvar(const char *var)
435: {
1.16 deraadt 436: u_int i;
1.1 djm 437:
438: for (i = 0; allowed_kvars[i] != NULL; i++)
439: if (strcmp(allowed_kvars[i], var) == 0)
440: return;
441: errx(1, "Unrecognised kvar: %s", var);
442: }
443:
444: static void
445: list_kvars(void)
446: {
1.16 deraadt 447: u_int i;
1.1 djm 448:
1.26 haesbaer 449: printf("Supported kernel variables:\n");
1.1 djm 450: for (i = 0; allowed_kvars[i] != NULL; i++)
1.26 haesbaer 451: printf("\t%s\n", allowed_kvars[i]);
1.1 djm 452: }
453:
454: static char **
455: check_prepare_kvars(char *list)
456: {
457: char *item, **ret = NULL;
1.16 deraadt 458: u_int n = 0;
1.1 djm 459:
460: while ((item = strsep(&list, ", \t\n")) != NULL) {
461: check_kvar(item);
1.43 lteo 462: if ((ret = reallocarray(ret, (++n + 1), sizeof(*ret))) == NULL)
1.55 benno 463: err(1, "reallocarray(kvars)");
1.1 djm 464: if ((ret[n - 1] = strdup(item)) == NULL)
1.55 benno 465: err(1, "strdup");
1.1 djm 466: ret[n] = NULL;
467: }
1.20 claudio 468: return (ret);
1.1 djm 469: }
470:
471: static void
1.20 claudio 472: stats_prepare(struct statctx *sc)
1.1 djm 473: {
1.20 claudio 474: sc->buf = ptb->dummybuf;
475: sc->buflen = ptb->dummybuf_len;
476:
477: if (ptb->kvars)
478: sc->tcp_tcbaddr = kfind_tcb(sc->fd);
479: if (clock_gettime_tv(CLOCK_MONOTONIC, &sc->t_start) == -1)
480: err(1, "clock_gettime_tv");
1.1 djm 481: sc->t_last = sc->t_start;
482:
483: }
484:
485: static void
1.20 claudio 486: tcp_stats_display(unsigned long long total_elapsed, long double mbps,
1.11 claudio 487: float bwperc, struct statctx *sc, struct inpcb *inpcb,
488: struct tcpcb *tcpcb, struct socket *sockb)
489: {
490: int j;
1.58 bluhm 491:
1.11 claudio 492: printf("%12llu %14llu %12.3Lf %7.2f%% ", total_elapsed, sc->bytes,
493: mbps, bwperc);
1.58 bluhm 494:
1.20 claudio 495: if (ptb->kvars != NULL) {
496: kupdate_stats(sc->tcp_tcbaddr, inpcb, tcpcb,
1.11 claudio 497: sockb);
1.1 djm 498:
1.20 claudio 499: for (j = 0; ptb->kvars[j] != NULL; j++) {
1.11 claudio 500: #define S(a) #a
501: #define P(b, v, f) \
1.20 claudio 502: if (strcmp(ptb->kvars[j], S(b.v)) == 0) { \
1.11 claudio 503: printf("%s"f, j > 0 ? "," : "", b->v); \
504: continue; \
505: }
506: P(inpcb, inp_flags, "0x%08x")
507: P(sockb, so_rcv.sb_cc, "%lu")
1.26 haesbaer 508: P(sockb, so_rcv.sb_hiwat, "%lu")
1.19 claudio 509: P(sockb, so_rcv.sb_wat, "%lu")
1.11 claudio 510: P(sockb, so_snd.sb_cc, "%lu")
1.26 haesbaer 511: P(sockb, so_snd.sb_hiwat, "%lu")
1.19 claudio 512: P(sockb, so_snd.sb_wat, "%lu")
1.26 haesbaer 513: P(tcpcb, last_ack_sent, "%u")
514: P(tcpcb, max_sndwnd, "%lu")
515: P(tcpcb, rcv_adv, "%u")
516: P(tcpcb, rcv_nxt, "%u")
517: P(tcpcb, rcv_scale, "%u")
518: P(tcpcb, rcv_wnd, "%lu")
519: P(tcpcb, rfbuf_cnt, "%u")
520: P(tcpcb, rfbuf_ts, "%u")
521: P(tcpcb, snd_cwnd, "%lu")
522: P(tcpcb, snd_max, "%u")
523: P(tcpcb, snd_nxt, "%u")
524: P(tcpcb, snd_scale, "%u")
525: P(tcpcb, snd_ssthresh, "%lu")
1.11 claudio 526: P(tcpcb, snd_una, "%u")
527: P(tcpcb, snd_wl1, "%u")
528: P(tcpcb, snd_wl2, "%u")
529: P(tcpcb, snd_wnd, "%lu")
530: P(tcpcb, t_rcvtime, "%u")
1.26 haesbaer 531: P(tcpcb, t_rtseq, "%u")
532: P(tcpcb, t_rttmin, "%hu")
1.11 claudio 533: P(tcpcb, t_rtttime, "%u")
1.26 haesbaer 534: P(tcpcb, t_rttvar, "%hu")
1.11 claudio 535: P(tcpcb, t_srtt, "%hu")
1.26 haesbaer 536: P(tcpcb, ts_recent, "%u")
1.19 claudio 537: P(tcpcb, ts_recent_age, "%u")
1.58 bluhm 538: #undef S
1.1 djm 539: #undef P
540: }
541: }
542: printf("\n");
543: }
544:
545: static void
1.20 claudio 546: tcp_process_slice(int fd, short event, void *bula)
1.1 djm 547: {
1.11 claudio 548: unsigned long long total_elapsed, since_last;
549: long double mbps, slice_mbps = 0;
550: float bwperc;
1.20 claudio 551: struct statctx *sc;
1.11 claudio 552: struct timeval t_cur, t_diff;
553: struct inpcb inpcb;
554: struct tcpcb tcpcb;
555: struct socket sockb;
1.58 bluhm 556:
1.20 claudio 557: TAILQ_FOREACH(sc, &sc_queue, entry) {
558: if (clock_gettime_tv(CLOCK_MONOTONIC, &t_cur) == -1)
559: err(1, "clock_gettime_tv");
560: if (ptb->kvars != NULL) /* process kernel stats */
561: kupdate_stats(sc->tcp_tcbaddr, &inpcb, &tcpcb,
1.11 claudio 562: &sockb);
1.58 bluhm 563:
1.11 claudio 564: timersub(&t_cur, &sc->t_start, &t_diff);
565: total_elapsed = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000;
566: timersub(&t_cur, &sc->t_last, &t_diff);
567: since_last = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000;
1.60 ! stsp 568: if (since_last == 0)
! 569: continue;
1.11 claudio 570: bwperc = (sc->bytes * 100.0) / mainstats.slice_bytes;
571: mbps = (sc->bytes * 8) / (since_last * 1000.0);
572: slice_mbps += mbps;
1.58 bluhm 573:
1.20 claudio 574: tcp_stats_display(total_elapsed, mbps, bwperc, sc,
1.11 claudio 575: &inpcb, &tcpcb, &sockb);
1.58 bluhm 576:
1.11 claudio 577: sc->t_last = t_cur;
578: sc->bytes = 0;
579: }
1.1 djm 580:
1.11 claudio 581: /* process stats for this slice */
582: if (slice_mbps > mainstats.peak_mbps)
583: mainstats.peak_mbps = slice_mbps;
1.20 claudio 584: printf("Conn: %3d Mbps: %12.3Lf Peak Mbps: %12.3Lf Avg Mbps: %12.3Lf\n",
585: mainstats.nconns, slice_mbps, mainstats.peak_mbps,
1.58 bluhm 586: mainstats.nconns ? slice_mbps / mainstats.nconns : 0);
1.20 claudio 587: mainstats.slice_bytes = 0;
588:
589: set_slice_timer(mainstats.nconns > 0);
590: }
591:
592: static void
593: udp_process_slice(int fd, short event, void *v_sc)
594: {
595: struct statctx *sc = v_sc;
1.31 haesbaer 596: unsigned long long total_elapsed, since_last, pps;
597: long double slice_mbps;
1.20 claudio 598: struct timeval t_cur, t_diff;
599:
600: if (clock_gettime_tv(CLOCK_MONOTONIC, &t_cur) == -1)
601: err(1, "clock_gettime_tv");
602: /* Calculate pps */
603: timersub(&t_cur, &sc->t_start, &t_diff);
604: total_elapsed = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000;
605: timersub(&t_cur, &sc->t_last, &t_diff);
606: since_last = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000;
1.60 ! stsp 607: if (since_last == 0)
! 608: return;
1.20 claudio 609: slice_mbps = (sc->bytes * 8) / (since_last * 1000.0);
610: pps = (sc->udp_slice_pkts * 1000) / since_last;
611: if (slice_mbps > mainstats.peak_mbps)
612: mainstats.peak_mbps = slice_mbps;
1.31 haesbaer 613: printf("Elapsed: %11llu Mbps: %11.3Lf Peak Mbps: %11.3Lf %s PPS: %7llu\n",
1.20 claudio 614: total_elapsed, slice_mbps, mainstats.peak_mbps,
615: ptb->sflag ? "Rx" : "Tx", pps);
616:
617: /* Clean up this slice time */
618: sc->t_last = t_cur;
619: sc->bytes = 0;
620: sc->udp_slice_pkts = 0;
621: set_slice_timer(1);
1.11 claudio 622: }
1.1 djm 623:
1.20 claudio 624: static void
625: udp_server_handle_sc(int fd, short event, void *v_sc)
1.11 claudio 626: {
627: ssize_t n;
1.20 claudio 628: struct statctx *sc = v_sc;
1.1 djm 629:
1.20 claudio 630: n = read(fd, ptb->dummybuf, ptb->dummybuf_len);
631: if (n == 0)
632: return;
633: else if (n == -1) {
1.34 haesbaer 634: if (errno != EINTR && errno != EWOULDBLOCK)
635: warn("fd %d read error", fd);
1.20 claudio 636: return;
637: }
1.58 bluhm 638:
1.20 claudio 639: if (ptb->vflag >= 3)
640: fprintf(stderr, "read: %zd bytes\n", n);
641: /* If this was our first packet, start slice timer */
642: if (mainstats.peak_mbps == 0)
643: set_slice_timer(1);
644: /* Account packet */
645: sc->udp_slice_pkts++;
646: sc->bytes += n;
647: }
648:
649: static void
650: tcp_server_handle_sc(int fd, short event, void *v_sc)
651: {
652: struct statctx *sc = v_sc;
653: ssize_t n;
654:
655: n = read(sc->fd, sc->buf, sc->buflen);
656: if (n == -1) {
1.34 haesbaer 657: if (errno != EINTR && errno != EWOULDBLOCK)
658: warn("fd %d read error", sc->fd);
1.20 claudio 659: return;
660: } else if (n == 0) {
661: if (ptb->vflag)
662: fprintf(stderr, "%8d closed by remote end\n", sc->fd);
1.33 haesbaer 663:
664: TAILQ_REMOVE(&sc_queue, sc, entry);
665:
1.23 sthen 666: event_del(&sc->ev);
1.20 claudio 667: close(sc->fd);
1.33 haesbaer 668:
669: /* Some file descriptors are available again. */
670: if (evtimer_pending(&sc->tcp_ts->evt, NULL)) {
671: evtimer_del(&sc->tcp_ts->evt);
672: event_add(&sc->tcp_ts->ev, NULL);
673: }
674:
1.20 claudio 675: free(sc);
676: mainstats.nconns--;
677: return;
1.1 djm 678: }
1.20 claudio 679: if (ptb->vflag >= 3)
1.11 claudio 680: fprintf(stderr, "read: %zd bytes\n", n);
1.20 claudio 681: sc->bytes += n;
682: mainstats.slice_bytes += n;
683: }
1.58 bluhm 684:
1.20 claudio 685: static void
1.33 haesbaer 686: tcp_server_accept(int fd, short event, void *arg)
1.20 claudio 687: {
1.33 haesbaer 688: struct tcpservsock *ts = arg;
1.49 chl 689: int sock;
1.20 claudio 690: struct statctx *sc;
691: struct sockaddr_storage ss;
692: socklen_t sslen;
693: char tmp[128];
1.58 bluhm 694:
1.20 claudio 695: sslen = sizeof(ss);
1.33 haesbaer 696:
697: event_add(&ts->ev, NULL);
698: if (event & EV_TIMEOUT)
699: return;
1.48 guenther 700: if ((sock = accept4(fd, (struct sockaddr *)&ss, &sslen, SOCK_NONBLOCK))
701: == -1) {
1.33 haesbaer 702: /*
703: * Pause accept if we are out of file descriptors, or
704: * libevent will haunt us here too.
705: */
706: if (errno == ENFILE || errno == EMFILE) {
707: struct timeval evtpause = { 1, 0 };
708:
709: event_del(&ts->ev);
710: evtimer_add(&ts->evt, &evtpause);
1.38 deraadt 711: } else if (errno != EWOULDBLOCK && errno != EINTR &&
712: errno != ECONNABORTED)
1.33 haesbaer 713: warn("accept");
1.20 claudio 714: return;
715: }
716: saddr_ntop((struct sockaddr *)&ss, sslen,
717: tmp, sizeof(tmp));
1.24 haesbaer 718: if (ptb->Tflag != -1 && ss.ss_family == AF_INET) {
719: if (setsockopt(sock, IPPROTO_IP, IP_TOS,
720: &ptb->Tflag, sizeof(ptb->Tflag)))
721: err(1, "setsockopt IP_TOS");
722: }
723: if (ptb->Tflag != -1 && ss.ss_family == AF_INET6) {
724: if (setsockopt(sock, IPPROTO_IPV6, IPV6_TCLASS,
725: &ptb->Tflag, sizeof(ptb->Tflag)))
726: err(1, "setsockopt IPV6_TCLASS");
727: }
1.20 claudio 728: /* Alloc client structure and register reading callback */
729: if ((sc = calloc(1, sizeof(*sc))) == NULL)
730: err(1, "calloc");
1.33 haesbaer 731: sc->tcp_ts = ts;
1.20 claudio 732: sc->fd = sock;
733: stats_prepare(sc);
734: event_set(&sc->ev, sc->fd, EV_READ | EV_PERSIST,
735: tcp_server_handle_sc, sc);
736: event_add(&sc->ev, NULL);
737: TAILQ_INSERT_TAIL(&sc_queue, sc, entry);
738: mainstats.nconns++;
1.36 haesbaer 739: if (mainstats.nconns == 1)
740: set_slice_timer(1);
1.20 claudio 741: if (ptb->vflag)
1.28 haesbaer 742: fprintf(stderr, "Accepted connection from %s, fd = %d\n",
743: tmp, sc->fd);
1.1 djm 744: }
745:
1.20 claudio 746: static void
747: server_init(struct addrinfo *aitop, struct statctx *udp_sc)
1.1 djm 748: {
749: char tmp[128];
1.11 claudio 750: int sock, on = 1;
1.1 djm 751: struct addrinfo *ai;
1.20 claudio 752: struct event *ev;
1.33 haesbaer 753: struct tcpservsock *ts;
1.11 claudio 754: nfds_t lnfds;
1.1 djm 755:
1.11 claudio 756: lnfds = 0;
1.1 djm 757: for (ai = aitop; ai != NULL; ai = ai->ai_next) {
758: saddr_ntop(ai->ai_addr, ai->ai_addrlen, tmp, sizeof(tmp));
1.20 claudio 759: if (ptb->vflag)
760: fprintf(stderr, "Try to bind to %s\n", tmp);
1.1 djm 761: if ((sock = socket(ai->ai_family, ai->ai_socktype,
762: ai->ai_protocol)) == -1) {
763: if (ai->ai_next == NULL)
764: err(1, "socket");
1.20 claudio 765: if (ptb->vflag)
1.1 djm 766: warn("socket");
767: continue;
768: }
1.24 haesbaer 769: if (ptb->Tflag != -1 && ai->ai_family == AF_INET) {
770: if (setsockopt(sock, IPPROTO_IP, IP_TOS,
771: &ptb->Tflag, sizeof(ptb->Tflag)))
772: err(1, "setsockopt IP_TOS");
773: }
774: if (ptb->Tflag != -1 && ai->ai_family == AF_INET6) {
775: if (setsockopt(sock, IPPROTO_IPV6, IPV6_TCLASS,
776: &ptb->Tflag, sizeof(ptb->Tflag)))
777: err(1, "setsockopt IPV6_TCLASS");
778: }
1.1 djm 779: if (setsockopt(sock, SOL_SOCKET, SO_REUSEADDR,
780: &on, sizeof(on)) == -1)
781: warn("reuse port");
782: if (bind(sock, ai->ai_addr, ai->ai_addrlen) != 0) {
783: if (ai->ai_next == NULL)
784: err(1, "bind");
1.20 claudio 785: if (ptb->vflag)
1.1 djm 786: warn("bind");
787: close(sock);
788: continue;
789: }
1.20 claudio 790: if (ptb->Sflag) {
1.1 djm 791: if (setsockopt(sock, SOL_SOCKET, SO_RCVBUF,
1.20 claudio 792: &ptb->Sflag, sizeof(ptb->Sflag)) == -1)
1.54 bluhm 793: warn("set receive socket buffer size");
1.1 djm 794: }
1.20 claudio 795: if (TCP_MODE) {
796: if (listen(sock, 64) == -1) {
797: if (ai->ai_next == NULL)
798: err(1, "listen");
799: if (ptb->vflag)
800: warn("listen");
801: close(sock);
802: continue;
803: }
1.1 djm 804: }
1.33 haesbaer 805: if (UDP_MODE) {
806: if ((ev = calloc(1, sizeof(*ev))) == NULL)
807: err(1, "calloc");
1.20 claudio 808: event_set(ev, sock, EV_READ | EV_PERSIST,
809: udp_server_handle_sc, udp_sc);
1.33 haesbaer 810: event_add(ev, NULL);
811: } else {
812: if ((ts = calloc(1, sizeof(*ts))) == NULL)
813: err(1, "calloc");
814:
815: ts->fd = sock;
816: evtimer_set(&ts->evt, tcp_server_accept, ts);
817: event_set(&ts->ev, ts->fd, EV_READ,
818: tcp_server_accept, ts);
819: event_add(&ts->ev, NULL);
820: }
1.20 claudio 821: if (ptb->vflag >= 3)
822: fprintf(stderr, "bound to fd %d\n", sock);
1.11 claudio 823: lnfds++;
1.1 djm 824: }
1.51 claudio 825: if (!ptb->Uflag)
826: freeaddrinfo(aitop);
1.11 claudio 827: if (lnfds == 0)
1.1 djm 828: errx(1, "No working listen addresses found");
1.58 bluhm 829: }
1.11 claudio 830:
831: static void
1.20 claudio 832: client_handle_sc(int fd, short event, void *v_sc)
833: {
834: struct statctx *sc = v_sc;
835: ssize_t n;
1.51 claudio 836: size_t blen = sc->buflen;
1.1 djm 837:
1.51 claudio 838: if (ptb->Rflag)
839: blen = arc4random_uniform(blen) + 1;
840: if ((n = write(sc->fd, sc->buf, blen)) == -1) {
1.34 haesbaer 841: if (errno == EINTR || errno == EWOULDBLOCK ||
1.20 claudio 842: (UDP_MODE && errno == ENOBUFS))
1.34 haesbaer 843: return;
1.20 claudio 844: err(1, "write");
1.11 claudio 845: }
1.58 bluhm 846: if (TCP_MODE && n == 0) {
1.28 haesbaer 847: fprintf(stderr, "Remote end closed connection");
1.20 claudio 848: exit(1);
1.1 djm 849: }
1.20 claudio 850: if (ptb->vflag >= 3)
1.28 haesbaer 851: fprintf(stderr, "write: %zd bytes\n", n);
1.20 claudio 852: sc->bytes += n;
853: mainstats.slice_bytes += n;
854: if (UDP_MODE)
855: sc->udp_slice_pkts++;
1.1 djm 856: }
857:
1.20 claudio 858: static void
1.25 haesbaer 859: client_init(struct addrinfo *aitop, int nconn, struct statctx *udp_sc,
860: struct addrinfo *aib)
1.1 djm 861: {
1.20 claudio 862: struct statctx *sc;
863: struct addrinfo *ai;
1.14 claudio 864: char tmp[128];
865: int i, r, sock;
1.1 djm 866:
1.20 claudio 867: sc = udp_sc;
1.4 henning 868: for (i = 0; i < nconn; i++) {
869: for (sock = -1, ai = aitop; ai != NULL; ai = ai->ai_next) {
870: saddr_ntop(ai->ai_addr, ai->ai_addrlen, tmp,
871: sizeof(tmp));
1.20 claudio 872: if (ptb->vflag && i == 0)
1.4 henning 873: fprintf(stderr, "Trying %s\n", tmp);
874: if ((sock = socket(ai->ai_family, ai->ai_socktype,
875: ai->ai_protocol)) == -1) {
876: if (ai->ai_next == NULL)
877: err(1, "socket");
1.20 claudio 878: if (ptb->vflag)
1.4 henning 879: warn("socket");
880: continue;
881: }
1.25 haesbaer 882: if (aib != NULL) {
883: saddr_ntop(aib->ai_addr, aib->ai_addrlen,
884: tmp, sizeof(tmp));
885: if (ptb->vflag)
886: fprintf(stderr,
887: "Try to bind to %s\n", tmp);
888: if (bind(sock, (struct sockaddr *)aib->ai_addr,
889: aib->ai_addrlen) == -1)
890: err(1, "bind");
891: }
1.24 haesbaer 892: if (ptb->Tflag != -1 && ai->ai_family == AF_INET) {
893: if (setsockopt(sock, IPPROTO_IP, IP_TOS,
894: &ptb->Tflag, sizeof(ptb->Tflag)))
895: err(1, "setsockopt IP_TOS");
896: }
897: if (ptb->Tflag != -1 && ai->ai_family == AF_INET6) {
898: if (setsockopt(sock, IPPROTO_IPV6, IPV6_TCLASS,
899: &ptb->Tflag, sizeof(ptb->Tflag)))
900: err(1, "setsockopt IPV6_TCLASS");
901: }
1.20 claudio 902: if (ptb->Sflag) {
1.4 henning 903: if (setsockopt(sock, SOL_SOCKET, SO_SNDBUF,
1.20 claudio 904: &ptb->Sflag, sizeof(ptb->Sflag)) == -1)
1.54 bluhm 905: warn("set send socket buffer size");
1.4 henning 906: }
907: if (connect(sock, ai->ai_addr, ai->ai_addrlen) != 0) {
908: if (ai->ai_next == NULL)
909: err(1, "connect");
1.20 claudio 910: if (ptb->vflag)
1.4 henning 911: warn("connect");
912: close(sock);
913: sock = -1;
914: continue;
915: }
916: break;
1.1 djm 917: }
1.4 henning 918: if (sock == -1)
919: errx(1, "No host found");
1.50 krw 920: if ((r = fcntl(sock, F_GETFL)) == -1)
1.4 henning 921: err(1, "fcntl(F_GETFL)");
922: r |= O_NONBLOCK;
923: if (fcntl(sock, F_SETFL, r) == -1)
924: err(1, "fcntl(F_SETFL, O_NONBLOCK)");
1.20 claudio 925: /* Alloc and prepare stats */
926: if (TCP_MODE) {
927: if ((sc = calloc(1, sizeof(*sc))) == NULL)
928: err(1, "calloc");
929: }
930: sc->fd = sock;
931: stats_prepare(sc);
932: event_set(&sc->ev, sc->fd, EV_WRITE | EV_PERSIST,
933: client_handle_sc, sc);
934: event_add(&sc->ev, NULL);
935: TAILQ_INSERT_TAIL(&sc_queue, sc, entry);
936: mainstats.nconns++;
1.36 haesbaer 937: if (mainstats.nconns == 1)
938: set_slice_timer(1);
1.14 claudio 939: }
1.51 claudio 940: if (!ptb->Uflag)
941: freeaddrinfo(aitop);
1.35 haesbaer 942: if (aib != NULL)
943: freeaddrinfo(aib);
1.14 claudio 944:
1.20 claudio 945: if (ptb->vflag && nconn > 1)
1.29 haesbaer 946: fprintf(stderr, "%d connections established\n",
947: mainstats.nconns);
1.14 claudio 948: }
949:
1.24 haesbaer 950: static int
951: map_tos(char *s, int *val)
952: {
953: /* DiffServ Codepoints and other TOS mappings */
954: const struct toskeywords {
955: const char *keyword;
956: int val;
957: } *t, toskeywords[] = {
958: { "af11", IPTOS_DSCP_AF11 },
959: { "af12", IPTOS_DSCP_AF12 },
960: { "af13", IPTOS_DSCP_AF13 },
961: { "af21", IPTOS_DSCP_AF21 },
962: { "af22", IPTOS_DSCP_AF22 },
963: { "af23", IPTOS_DSCP_AF23 },
964: { "af31", IPTOS_DSCP_AF31 },
965: { "af32", IPTOS_DSCP_AF32 },
966: { "af33", IPTOS_DSCP_AF33 },
967: { "af41", IPTOS_DSCP_AF41 },
968: { "af42", IPTOS_DSCP_AF42 },
969: { "af43", IPTOS_DSCP_AF43 },
970: { "critical", IPTOS_PREC_CRITIC_ECP },
971: { "cs0", IPTOS_DSCP_CS0 },
972: { "cs1", IPTOS_DSCP_CS1 },
973: { "cs2", IPTOS_DSCP_CS2 },
974: { "cs3", IPTOS_DSCP_CS3 },
975: { "cs4", IPTOS_DSCP_CS4 },
976: { "cs5", IPTOS_DSCP_CS5 },
977: { "cs6", IPTOS_DSCP_CS6 },
978: { "cs7", IPTOS_DSCP_CS7 },
979: { "ef", IPTOS_DSCP_EF },
980: { "inetcontrol", IPTOS_PREC_INTERNETCONTROL },
981: { "lowdelay", IPTOS_LOWDELAY },
982: { "netcontrol", IPTOS_PREC_NETCONTROL },
983: { "reliability", IPTOS_RELIABILITY },
984: { "throughput", IPTOS_THROUGHPUT },
1.58 bluhm 985: { NULL, -1 },
1.24 haesbaer 986: };
1.58 bluhm 987:
1.24 haesbaer 988: for (t = toskeywords; t->keyword != NULL; t++) {
989: if (strcmp(s, t->keyword) == 0) {
990: *val = t->val;
991: return (1);
992: }
993: }
1.58 bluhm 994:
1.24 haesbaer 995: return (0);
996: }
997:
1.30 henning 998: static void
999: quit(int sig, short event, void *arg)
1000: {
1001: exit(0);
1002: }
1003:
1.1 djm 1004: int
1005: main(int argc, char **argv)
1006: {
1.30 henning 1007: struct timeval tv;
1.37 haesbaer 1008: unsigned int secs, rtable;
1.1 djm 1009:
1010: char kerr[_POSIX2_LINE_MAX], *tmp;
1.25 haesbaer 1011: struct addrinfo *aitop, *aib, hints;
1.1 djm 1012: const char *errstr;
1.11 claudio 1013: struct rlimit rl;
1.20 claudio 1014: int ch, herr, nconn;
1.42 dlg 1015: int family = PF_UNSPEC;
1.12 deraadt 1016: struct nlist nl[] = { { "_tcbtable" }, { "" } };
1.25 haesbaer 1017: const char *host = NULL, *port = DEFAULT_PORT, *srcbind = NULL;
1.30 henning 1018: struct event ev_sigint, ev_sigterm, ev_sighup, ev_progtimer;
1.20 claudio 1019: struct statctx *udp_sc = NULL;
1.51 claudio 1020: struct sockaddr_un sock_un;
1.1 djm 1021:
1.20 claudio 1022: /* Init world */
1.45 millert 1023: setvbuf(stdout, NULL, _IOLBF, 0);
1.20 claudio 1024: ptb = &tcpbench;
1025: ptb->dummybuf_len = 0;
1.51 claudio 1026: ptb->Sflag = ptb->sflag = ptb->vflag = ptb->Rflag = ptb->Uflag = 0;
1.20 claudio 1027: ptb->kvmh = NULL;
1028: ptb->kvars = NULL;
1029: ptb->rflag = DEFAULT_STATS_INTERVAL;
1.24 haesbaer 1030: ptb->Tflag = -1;
1.20 claudio 1031: nconn = 1;
1.25 haesbaer 1032: aib = NULL;
1.30 henning 1033: secs = 0;
1.1 djm 1034:
1.51 claudio 1035: while ((ch = getopt(argc, argv, "46b:B:hlk:n:p:Rr:sS:t:T:uUvV:")) != -1) {
1.1 djm 1036: switch (ch) {
1.42 dlg 1037: case '4':
1038: family = PF_INET;
1039: break;
1040: case '6':
1041: family = PF_INET6;
1042: break;
1.25 haesbaer 1043: case 'b':
1044: srcbind = optarg;
1045: break;
1.1 djm 1046: case 'l':
1047: list_kvars();
1048: exit(0);
1049: case 'k':
1050: if ((tmp = strdup(optarg)) == NULL)
1.53 benno 1051: err(1, "strdup");
1.20 claudio 1052: ptb->kvars = check_prepare_kvars(tmp);
1.1 djm 1053: free(tmp);
1054: break;
1.51 claudio 1055: case 'R':
1056: ptb->Rflag = 1;
1057: break;
1.1 djm 1058: case 'r':
1.20 claudio 1059: ptb->rflag = strtonum(optarg, 0, 60 * 60 * 24 * 1000,
1.1 djm 1060: &errstr);
1061: if (errstr != NULL)
1062: errx(1, "statistics interval is %s: %s",
1063: errstr, optarg);
1064: break;
1065: case 'p':
1066: port = optarg;
1067: break;
1068: case 's':
1.20 claudio 1069: ptb->sflag = 1;
1.1 djm 1070: break;
1071: case 'S':
1.20 claudio 1072: ptb->Sflag = strtonum(optarg, 0, 1024*1024*1024,
1.1 djm 1073: &errstr);
1074: if (errstr != NULL)
1.54 bluhm 1075: errx(1, "socket buffer size is %s: %s",
1.1 djm 1076: errstr, optarg);
1077: break;
1078: case 'B':
1.20 claudio 1079: ptb->dummybuf_len = strtonum(optarg, 0, 1024*1024*1024,
1.1 djm 1080: &errstr);
1081: if (errstr != NULL)
1082: errx(1, "read/write buffer size is %s: %s",
1083: errstr, optarg);
1084: break;
1085: case 'v':
1.20 claudio 1086: ptb->vflag++;
1.9 claudio 1087: break;
1088: case 'V':
1.37 haesbaer 1089: rtable = (unsigned int)strtonum(optarg, 0,
1.9 claudio 1090: RT_TABLEID_MAX, &errstr);
1091: if (errstr)
1.17 guenther 1092: errx(1, "rtable value is %s: %s",
1.9 claudio 1093: errstr, optarg);
1.37 haesbaer 1094: if (setrtable(rtable) == -1)
1095: err(1, "setrtable");
1.1 djm 1096: break;
1.4 henning 1097: case 'n':
1098: nconn = strtonum(optarg, 0, 65535, &errstr);
1099: if (errstr != NULL)
1100: errx(1, "number of connections is %s: %s",
1101: errstr, optarg);
1102: break;
1.20 claudio 1103: case 'u':
1104: ptb->uflag = 1;
1.24 haesbaer 1105: break;
1.51 claudio 1106: case 'U':
1107: ptb->Uflag = 1;
1108: break;
1.24 haesbaer 1109: case 'T':
1110: if (map_tos(optarg, &ptb->Tflag))
1111: break;
1112: errstr = NULL;
1113: if (strlen(optarg) > 1 && optarg[0] == '0' &&
1114: optarg[1] == 'x')
1115: ptb->Tflag = (int)strtol(optarg, NULL, 16);
1116: else
1117: ptb->Tflag = (int)strtonum(optarg, 0, 255,
1118: &errstr);
1119: if (ptb->Tflag == -1 || ptb->Tflag > 255 || errstr)
1120: errx(1, "illegal tos value %s", optarg);
1.20 claudio 1121: break;
1.30 henning 1122: case 't':
1123: secs = strtonum(optarg, 1, UINT_MAX, &errstr);
1124: if (errstr != NULL)
1125: errx(1, "secs is %s: %s",
1126: errstr, optarg);
1127: break;
1.1 djm 1128: case 'h':
1129: default:
1130: usage();
1131: }
1132: }
1133:
1.57 deraadt 1134: if (pledge("stdio unveil rpath dns inet unix id proc", NULL) == -1)
1.47 benno 1135: err(1, "pledge");
1136:
1.1 djm 1137: argv += optind;
1138: argc -= optind;
1.51 claudio 1139: if ((argc != (ptb->sflag && !ptb->Uflag ? 0 : 1)) ||
1.20 claudio 1140: (UDP_MODE && (ptb->kvars || nconn != 1)))
1.1 djm 1141: usage();
1.4 henning 1142:
1.46 deraadt 1143: if (ptb->kvars) {
1.57 deraadt 1144: if (unveil(_PATH_MEM, "r") == -1)
1145: err(1, "unveil");
1146: if (unveil(_PATH_KMEM, "r") == -1)
1147: err(1, "unveil");
1148: if (unveil(_PATH_KSYMS, "r") == -1)
1149: err(1, "unveil");
1150:
1.46 deraadt 1151: if ((ptb->kvmh = kvm_openfiles(NULL, NULL, NULL,
1152: O_RDONLY, kerr)) == NULL)
1153: errx(1, "kvm_open: %s", kerr);
1154: drop_gid();
1155: if (kvm_nlist(ptb->kvmh, nl) < 0 || nl[0].n_type == 0)
1156: errx(1, "kvm: no namelist");
1157: ptb->ktcbtab = nl[0].n_value;
1158: } else
1159: drop_gid();
1160:
1.57 deraadt 1161: if (!ptb->sflag || ptb->Uflag)
1162: host = argv[0];
1163:
1164: if (ptb->Uflag)
1165: if (unveil(host, "rwc") == -1)
1166: err(1, "unveil");
1167:
1.51 claudio 1168: if (pledge("stdio id dns inet unix", NULL) == -1)
1.47 benno 1169: err(1, "pledge");
1170:
1.20 claudio 1171: /*
1172: * Rationale,
1173: * If TCP, use a big buffer with big reads/writes.
1174: * If UDP, use a big buffer in server and a buffer the size of a
1175: * ethernet packet.
1176: */
1177: if (!ptb->dummybuf_len) {
1.58 bluhm 1178: if (ptb->sflag || TCP_MODE)
1.20 claudio 1179: ptb->dummybuf_len = DEFAULT_BUF;
1180: else
1181: ptb->dummybuf_len = DEFAULT_UDP_PKT;
1182: }
1.1 djm 1183:
1.13 claudio 1184: bzero(&hints, sizeof(hints));
1.42 dlg 1185: hints.ai_family = family;
1.25 haesbaer 1186: if (UDP_MODE) {
1.20 claudio 1187: hints.ai_socktype = SOCK_DGRAM;
1.25 haesbaer 1188: hints.ai_protocol = IPPROTO_UDP;
1.27 haesbaer 1189: } else {
1.20 claudio 1190: hints.ai_socktype = SOCK_STREAM;
1.25 haesbaer 1191: hints.ai_protocol = IPPROTO_TCP;
1192: }
1.51 claudio 1193: if (ptb->Uflag) {
1194: hints.ai_family = AF_UNIX;
1195: hints.ai_protocol = 0;
1196: sock_un.sun_family = AF_UNIX;
1197: if (strlcpy(sock_un.sun_path, host, sizeof(sock_un.sun_path)) >=
1198: sizeof(sock_un.sun_path))
1199: errx(1, "socket name '%s' too long", host);
1200: hints.ai_addr = (struct sockaddr *)&sock_un;
1201: hints.ai_addrlen = sizeof(sock_un);
1202: aitop = &hints;
1203: } else {
1204: if (ptb->sflag)
1205: hints.ai_flags = AI_PASSIVE;
1206: if (srcbind != NULL) {
1207: hints.ai_flags |= AI_NUMERICHOST;
1208: herr = getaddrinfo(srcbind, NULL, &hints, &aib);
1209: hints.ai_flags &= ~AI_NUMERICHOST;
1210: if (herr != 0) {
1211: if (herr == EAI_SYSTEM)
1212: err(1, "getaddrinfo");
1213: else
1214: errx(1, "getaddrinfo: %s",
1215: gai_strerror(herr));
1216: }
1217: }
1218: if ((herr = getaddrinfo(host, port, &hints, &aitop)) != 0) {
1.25 haesbaer 1219: if (herr == EAI_SYSTEM)
1220: err(1, "getaddrinfo");
1221: else
1222: errx(1, "getaddrinfo: %s", gai_strerror(herr));
1223: }
1224: }
1.1 djm 1225:
1.51 claudio 1226: if (pledge("stdio id inet unix", NULL) == -1)
1.47 benno 1227: err(1, "pledge");
1228:
1.11 claudio 1229: if (getrlimit(RLIMIT_NOFILE, &rl) == -1)
1230: err(1, "getrlimit");
1231: if (rl.rlim_cur < MAX_FD)
1232: rl.rlim_cur = MAX_FD;
1233: if (setrlimit(RLIMIT_NOFILE, &rl))
1234: err(1, "setrlimit");
1235: if (getrlimit(RLIMIT_NOFILE, &rl) == -1)
1236: err(1, "getrlimit");
1.47 benno 1237:
1.51 claudio 1238: if (pledge("stdio inet unix", NULL) == -1)
1.47 benno 1239: err(1, "pledge");
1240:
1.20 claudio 1241: /* Init world */
1242: TAILQ_INIT(&sc_queue);
1243: if ((ptb->dummybuf = malloc(ptb->dummybuf_len)) == NULL)
1244: err(1, "malloc");
1245: arc4random_buf(ptb->dummybuf, ptb->dummybuf_len);
1246:
1247: /* Setup libevent and signals */
1248: event_init();
1249: signal_set(&ev_sigterm, SIGTERM, signal_handler, NULL);
1250: signal_set(&ev_sighup, SIGHUP, signal_handler, NULL);
1251: signal_set(&ev_sigint, SIGINT, signal_handler, NULL);
1252: signal_add(&ev_sigint, NULL);
1253: signal_add(&ev_sigterm, NULL);
1254: signal_add(&ev_sighup, NULL);
1255: signal(SIGPIPE, SIG_IGN);
1.58 bluhm 1256:
1.27 haesbaer 1257: if (UDP_MODE) {
1258: if ((udp_sc = calloc(1, sizeof(*udp_sc))) == NULL)
1259: err(1, "calloc");
1260: udp_sc->fd = -1;
1261: stats_prepare(udp_sc);
1262: evtimer_set(&mainstats.timer, udp_process_slice, udp_sc);
1263: } else {
1.20 claudio 1264: print_tcp_header();
1265: evtimer_set(&mainstats.timer, tcp_process_slice, NULL);
1.27 haesbaer 1266: }
1.20 claudio 1267:
1.27 haesbaer 1268: if (ptb->sflag)
1.20 claudio 1269: server_init(aitop, udp_sc);
1.30 henning 1270: else {
1271: if (secs > 0) {
1272: timerclear(&tv);
1273: tv.tv_sec = secs + 1;
1274: evtimer_set(&ev_progtimer, quit, NULL);
1275: evtimer_add(&ev_progtimer, &tv);
1276: }
1.25 haesbaer 1277: client_init(aitop, nconn, udp_sc, aib);
1.47 benno 1278:
1279: if (pledge("stdio", NULL) == -1)
1280: err(1, "pledge");
1.30 henning 1281: }
1.47 benno 1282:
1.20 claudio 1283: /* libevent main loop*/
1284: event_dispatch();
1.1 djm 1285:
1.20 claudio 1286: return (0);
1.1 djm 1287: }