trafgen: don't bother about device going down, just continue sending
[netsniff-ng.git] / trafgen.c
blobe502fffb68f3e4f8439b938dd7d848148095bb55
1 /*
2 * netsniff-ng - the packet sniffing beast
3 * Copyright 2011 - 2013 Daniel Borkmann <dborkma@tik.ee.ethz.ch>,
4 * Swiss federal institute of technology (ETH Zurich)
5 * Subject to the GPL, version 2.
6 */
8 #include <stdio.h>
9 #include <string.h>
10 #include <getopt.h>
11 #include <ctype.h>
12 #include <stdbool.h>
13 #include <sched.h>
14 #include <sys/socket.h>
15 #include <sys/types.h>
16 #include <sys/fsuid.h>
17 #include <sys/stat.h>
18 #include <sys/time.h>
19 #include <sys/wait.h>
20 #include <sys/mman.h>
21 #include <net/ethernet.h>
22 #include <netinet/in.h>
23 #include <netinet/ip.h>
24 #include <linux/icmp.h>
25 #include <linux/if.h>
26 #include <arpa/inet.h>
27 #include <signal.h>
28 #include <stdint.h>
29 #include <stdlib.h>
30 #include <fcntl.h>
31 #include <time.h>
32 #include <poll.h>
33 #include <netdb.h>
34 #include <math.h>
35 #include <unistd.h>
37 #include "xmalloc.h"
38 #include "die.h"
39 #include "str.h"
40 #include "sig.h"
41 #include "sock.h"
42 #include "cpus.h"
43 #include "lockme.h"
44 #include "privs.h"
45 #include "proc.h"
46 #include "mac80211.h"
47 #include "ioops.h"
48 #include "irq.h"
49 #include "config.h"
50 #include "built_in.h"
51 #include "trafgen_conf.h"
52 #include "tprintf.h"
53 #include "timer.h"
54 #include "ring_tx.h"
55 #include "csum.h"
57 struct ctx {
58 bool rand, rfraw, jumbo_support, verbose, smoke_test, enforce;
59 unsigned long kpull, num, reserve_size;
60 unsigned int cpus;
61 uid_t uid; gid_t gid;
62 char *device, *device_trans, *rhost;
63 struct timespec gap;
64 struct sockaddr_in dest;
67 struct cpu_stats {
68 unsigned long tv_sec, tv_usec;
69 unsigned long long tx_packets, tx_bytes;
70 unsigned long long cf_packets, cf_bytes;
71 unsigned long long cd_packets;
72 sig_atomic_t state;
75 static sig_atomic_t sigint = 0;
77 struct packet *packets = NULL;
78 size_t plen = 0;
80 struct packet_dyn *packet_dyn = NULL;
81 size_t dlen = 0;
83 static const char *short_options = "d:c:n:t:vJhS:rk:i:o:VRs:P:eE:pu:g:C";
84 static const struct option long_options[] = {
85 {"dev", required_argument, NULL, 'd'},
86 {"out", required_argument, NULL, 'o'},
87 {"in", required_argument, NULL, 'i'},
88 {"conf", required_argument, NULL, 'c'},
89 {"num", required_argument, NULL, 'n'},
90 {"gap", required_argument, NULL, 't'},
91 {"cpus", required_argument, NULL, 'P'},
92 {"ring-size", required_argument, NULL, 'S'},
93 {"kernel-pull", required_argument, NULL, 'k'},
94 {"smoke-test", required_argument, NULL, 's'},
95 {"seed", required_argument, NULL, 'E'},
96 {"user", required_argument, NULL, 'u'},
97 {"group", required_argument, NULL, 'g'},
98 {"jumbo-support", no_argument, NULL, 'J'},
99 {"no-cpu-stats", no_argument, NULL, 'C'},
100 {"cpp", no_argument, NULL, 'p'},
101 {"rfraw", no_argument, NULL, 'R'},
102 {"rand", no_argument, NULL, 'r'},
103 {"verbose", no_argument, NULL, 'V'},
104 {"version", no_argument, NULL, 'v'},
105 {"example", no_argument, NULL, 'e'},
106 {"help", no_argument, NULL, 'h'},
107 {NULL, 0, NULL, 0}
110 static int sock;
111 static struct itimerval itimer;
112 static unsigned long interval = TX_KERNEL_PULL_INT;
113 static struct cpu_stats *stats;
114 static unsigned int seed;
116 #define CPU_STATS_STATE_CFG 1
117 #define CPU_STATS_STATE_CHK 2
118 #define CPU_STATS_STATE_RES 4
120 #ifndef ICMP_FILTER
121 # define ICMP_FILTER 1
123 struct icmp_filter {
124 __u32 data;
126 #endif
128 static void signal_handler(int number)
130 switch (number) {
131 case SIGINT:
132 sigint = 1;
133 case SIGHUP:
134 default:
135 break;
139 static void timer_elapsed(int unused __maybe_unused)
141 int ret = pull_and_flush_tx_ring(sock);
142 if (unlikely(ret < 0)) {
143 /* We could hit EBADF if the socket has been closed before
144 * the timer was triggered.
146 if (errno != EBADF && errno != ENOBUFS)
147 panic("Flushing TX_RING failed: %s!\n", strerror(errno));
150 set_itimer_interval_value(&itimer, 0, interval);
151 setitimer(ITIMER_REAL, &itimer, NULL);
154 static void timer_purge(void)
156 int ret;
158 ret = pull_and_flush_tx_ring_wait(sock);
159 if (unlikely(ret < 0)) {
160 /* We could hit EBADF if the socket has been closed before
161 * the timer was triggered.
163 if (errno != EBADF && errno != ENOBUFS)
164 panic("Flushing TX_RING failed: %s!\n", strerror(errno));
167 set_itimer_interval_value(&itimer, 0, 0);
168 setitimer(ITIMER_REAL, &itimer, NULL);
171 static void __noreturn help(void)
173 printf("\ntrafgen %s, multithreaded zero-copy network packet generator\n", VERSION_STRING);
174 puts("http://www.netsniff-ng.org\n\n"
175 "Usage: trafgen [options]\n"
176 "Options:\n"
177 " -i|-c|--in|--conf <cfg/-> Packet configuration file/stdin\n"
178 " -o|-d|--out|--dev <netdev> Networking device i.e., eth0\n"
179 " -p|--cpp Run packet config through C preprocessor\n"
180 " -J|--jumbo-support Support 64KB super jumbo frames (def: 2048B)\n"
181 " -R|--rfraw Inject raw 802.11 frames\n"
182 " -s|--smoke-test <ipv4> Probe if machine survived fuzz-tested packet\n"
183 " -n|--num <uint> Number of packets until exit (def: 0)\n"
184 " -r|--rand Randomize packet selection (def: round robin)\n"
185 " -P|--cpus <uint> Specify number of forks(<= CPUs) (def: #CPUs)\n"
186 " -t|--gap <time> Set approx. interpacket gap (s/ms/us/ns, def: us)\n"
187 " -S|--ring-size <size> Manually set mmap size (KiB/MiB/GiB)\n"
188 " -k|--kernel-pull <uint> Kernel batch interval in us (def: 10us)\n"
189 " -E|--seed <uint> Manually set srand(3) seed\n"
190 " -u|--user <userid> Drop privileges and change to userid\n"
191 " -g|--group <groupid> Drop privileges and change to groupid\n"
192 " -V|--verbose Be more verbose\n"
193 " -C|--no-cpu-stats Do not print CPU time statistics on exit\n"
194 " -v|--version Show version and exit\n"
195 " -e|--example Show built-in packet config example\n"
196 " -h|--help Guess what?!\n\n"
197 "Examples:\n"
198 " See trafgen.txf for configuration file examples.\n"
199 " trafgen --dev eth0 --conf trafgen.cfg\n"
200 " trafgen -e | trafgen -i - -o eth0 --cpp -n 1\n"
201 " trafgen --dev eth0 --conf fuzzing.cfg --smoke-test 10.0.0.1\n"
202 " trafgen --dev wlan0 --rfraw --conf beacon-test.txf -V --cpus 2\n"
203 " trafgen --dev eth0 --conf frag_dos.cfg --rand --gap 1000us\n"
204 " trafgen --dev eth0 --conf icmp.cfg --rand --num 1400000 -k1000\n"
205 " trafgen --dev eth0 --conf tcp_syn.cfg -u `id -u bob` -g `id -g bob`\n\n"
206 "Arbitrary packet config examples (e.g. trafgen -e > trafgen.cfg):\n"
207 " Run packet on all CPUs: { fill(0xff, 64) csum16(0, 64) }\n"
208 " Run packet only on CPU1: cpu(1): { rnd(64), 0b11001100, 0xaa }\n"
209 " Run packet only on CPU1-2: cpu(1-2): { drnd(64),'a',csum16(1, 8),'b',42 }\n\n"
210 "Note:\n"
211 " Smoke/fuzz test example: machine A, 10.0.0.2 (trafgen) is directly\n"
212 " connected to machine B (test kernel), 10.0.0.1. If ICMP reply fails\n"
213 " we assume the kernel crashed, thus we print the packet and quit.\n"
214 " In case you find a ping-of-death, please mention trafgen in your\n"
215 " commit message of the fix!\n\n"
216 " For introducing bit errors, delays with random variation and more,\n"
217 " make use of tc(8) with its different disciplines, i.e. netem.\n\n"
218 " For generating different package distributions, you can use scripting\n"
219 " to generate a trafgen config file with packet ratios as:\n\n"
220 " IMIX 64:7, 570:4, 1518:1\n"
221 " Tolly 64:55, 78:5, 576:17, 1518:23\n"
222 " Cisco 64:7, 594:4, 1518:1\n"
223 " RPR Trimodal 64:60, 512:20, 1518:20\n"
224 " RPR Quadrimodal 64:50, 512:15, 1518:15, 9218:20\n\n"
225 "Please report bugs to <bugs@netsniff-ng.org>\n"
226 "Copyright (C) 2011-2013 Daniel Borkmann <dborkma@tik.ee.ethz.ch>,\n"
227 "Swiss federal institute of technology (ETH Zurich)\n"
228 "License: GNU GPL version 2.0\n"
229 "This is free software: you are free to change and redistribute it.\n"
230 "There is NO WARRANTY, to the extent permitted by law.\n");
231 die();
234 static void __noreturn example(void)
236 const char *e =
237 "/* Note: dynamic elements make trafgen slower! */\n"
238 "#include <stddef.h>\n\n"
239 "{\n"
240 " /* MAC Destination */\n"
241 " fill(0xff, ETH_ALEN),\n"
242 " /* MAC Source */\n"
243 " 0x00, 0x02, 0xb3, drnd(3),\n"
244 " /* IPv4 Protocol */\n"
245 " c16(ETH_P_IP),\n"
246 " /* IPv4 Version, IHL, TOS */\n"
247 " 0b01000101, 0,\n"
248 " /* IPv4 Total Len */\n"
249 " c16(59),\n"
250 " /* IPv4 Ident */\n"
251 " drnd(2),\n"
252 " /* IPv4 Flags, Frag Off */\n"
253 " 0b01000000, 0,\n"
254 " /* IPv4 TTL */\n"
255 " 64,\n"
256 " /* Proto TCP */\n"
257 " 0x06,\n"
258 " /* IPv4 Checksum (IP header from, to) */\n"
259 " csumip(14, 33),\n"
260 " /* Source IP */\n"
261 " drnd(4),\n"
262 " /* Dest IP */\n"
263 " drnd(4),\n"
264 " /* TCP Source Port */\n"
265 " drnd(2),\n"
266 " /* TCP Dest Port */\n"
267 " c16(80),\n"
268 " /* TCP Sequence Number */\n"
269 " drnd(4),\n"
270 " /* TCP Ackn. Number */\n"
271 " c32(0),\n"
272 " /* TCP Header length + TCP SYN/ECN Flag */\n"
273 " c16((8 << 12) | TCP_FLAG_SYN | TCP_FLAG_ECE)\n"
274 " /* Window Size */\n"
275 " c16(16),\n"
276 " /* TCP Checksum (offset IP, offset TCP) */\n"
277 " csumtcp(14, 34),\n"
278 " /* TCP Options */\n"
279 " 0x00, 0x00, 0x01, 0x01, 0x08, 0x0a, 0x06,\n"
280 " 0x91, 0x68, 0x7d, 0x06, 0x91, 0x68, 0x6f,\n"
281 " /* Data blob */\n"
282 " \"gotcha!\",\n"
283 "}";
284 puts(e);
285 die();
288 static void __noreturn version(void)
290 printf("\ntrafgen %s, Git id: %s\n", VERSION_LONG, GITVERSION);
291 puts("multithreaded zero-copy network packet generator\n"
292 "http://www.netsniff-ng.org\n\n"
293 "Please report bugs to <bugs@netsniff-ng.org>\n"
294 "Copyright (C) 2011-2013 Daniel Borkmann <dborkma@tik.ee.ethz.ch>,\n"
295 "Swiss federal institute of technology (ETH Zurich)\n"
296 "License: GNU GPL version 2.0\n"
297 "This is free software: you are free to change and redistribute it.\n"
298 "There is NO WARRANTY, to the extent permitted by law.\n");
299 die();
302 static void apply_counter(int id)
304 size_t j, counter_max = packet_dyn[id].clen;
306 for (j = 0; j < counter_max; ++j) {
307 uint8_t val;
308 struct counter *counter = &packet_dyn[id].cnt[j];
310 val = counter->val - counter->min;
312 switch (counter->type) {
313 case TYPE_INC:
314 val = (val + counter->inc) % (counter->max - counter->min + 1);
315 break;
316 case TYPE_DEC:
317 val = (val - counter->inc) % (counter->min - counter->max + 1);
318 break;
319 default:
320 bug();
323 counter->val = val + counter->min;
324 packets[id].payload[counter->off] = val;
328 static void apply_randomizer(int id)
330 size_t j, rand_max = packet_dyn[id].rlen;
332 for (j = 0; j < rand_max; ++j) {
333 uint8_t val = (uint8_t) rand();
334 struct randomizer *randomizer = &packet_dyn[id].rnd[j];
336 packets[id].payload[randomizer->off] = val;
340 static void apply_csum16(int id)
342 size_t j, csum_max = packet_dyn[id].slen;
344 for (j = 0; j < csum_max; ++j) {
345 uint16_t sum = 0;
346 struct csum16 *csum = &packet_dyn[id].csum[j];
348 fmemset(&packets[id].payload[csum->off], 0, sizeof(sum));
349 if (unlikely((size_t) csum->to >= packets[id].len))
350 csum->to = packets[id].len - 1;
352 switch (csum->which) {
353 case CSUM_IP:
354 sum = calc_csum(packets[id].payload + csum->from,
355 csum->to - csum->from + 1, 0);
356 break;
357 case CSUM_UDP:
358 sum = p4_csum((void *) packets[id].payload + csum->from,
359 packets[id].payload + csum->to,
360 (packets[id].len - csum->to),
361 IPPROTO_UDP);
362 break;
363 case CSUM_TCP:
364 sum = p4_csum((void *) packets[id].payload + csum->from,
365 packets[id].payload + csum->to,
366 (packets[id].len - csum->to),
367 IPPROTO_TCP);
368 break;
369 default:
370 bug();
371 break;
374 fmemcpy(&packets[id].payload[csum->off], &sum, sizeof(sum));
378 static struct cpu_stats *setup_shared_var(unsigned long cpus)
380 int fd;
381 size_t len = cpus * sizeof(struct cpu_stats);
382 char zbuff[len], file[256];
383 struct cpu_stats *buff;
385 fmemset(zbuff, 0, len);
386 slprintf(file, sizeof(file), ".tmp_mmap.%u", (unsigned int) rand());
388 fd = creat(file, S_IRUSR | S_IWUSR);
389 bug_on(fd < 0);
390 close(fd);
392 fd = open_or_die_m(file, O_RDWR | O_CREAT | O_TRUNC,
393 S_IRUSR | S_IWUSR);
394 write_or_die(fd, zbuff, len);
396 buff = mmap(NULL, len, PROT_READ | PROT_WRITE,
397 MAP_SHARED, fd, 0);
398 if (buff == MAP_FAILED)
399 panic("Cannot setup shared variable!\n");
401 close(fd);
402 unlink(file);
404 memset(buff, 0, len);
405 return buff;
408 static void destroy_shared_var(void *buff, unsigned long cpus)
410 munmap(buff, cpus * sizeof(struct cpu_stats));
413 static void dump_trafgen_snippet(uint8_t *payload, size_t len)
415 size_t i;
417 printf("{");
418 for (i = 0; i < len; ++i) {
419 if (i % 15 == 0)
420 printf("\n ");
421 printf("0x%02x, ", payload[i]);
423 printf("\n}\n");
424 fflush(stdout);
427 static int xmit_smoke_setup(struct ctx *ctx)
429 int icmp_sock, ret, ttl = 64;
430 struct icmp_filter filter;
432 icmp_sock = socket(AF_INET, SOCK_RAW, IPPROTO_ICMP);
433 if (icmp_sock < 0)
434 panic("Cannot get a ICMP socket: %s!\n", strerror(errno));
436 filter.data = ~(1 << ICMP_ECHOREPLY);
438 ret = setsockopt(icmp_sock, SOL_RAW, ICMP_FILTER, &filter, sizeof(filter));
439 if (ret < 0)
440 panic("Cannot install filter!\n");
442 ret = setsockopt(icmp_sock, SOL_IP, IP_TTL, &ttl, sizeof(ttl));
443 if (ret < 0)
444 panic("Cannot set TTL!\n");
446 memset(&ctx->dest, 0, sizeof(ctx->dest));
447 ctx->dest.sin_family = AF_INET;
448 ctx->dest.sin_port = 0;
450 ret = inet_aton(ctx->rhost, &ctx->dest.sin_addr);
451 if (ret < 0)
452 panic("Cannot resolv address!\n");
454 return icmp_sock;
457 static int xmit_smoke_probe(int icmp_sock, struct ctx *ctx)
459 int ret;
460 unsigned int i, j = 0, probes = 100;
461 short ident, cnt = 1, idstore[probes];
462 uint8_t outpack[512], *data;
463 struct icmphdr *icmp;
464 struct iphdr *ip;
465 size_t len = sizeof(*icmp) + 56;
466 struct sockaddr_in from;
467 socklen_t from_len;
468 struct pollfd fds = {
469 .fd = icmp_sock,
470 .events = POLLIN,
473 fmemset(idstore, 0, sizeof(idstore));
474 while (probes-- > 0) {
475 while ((ident = htons((short) rand())) == 0)
476 sleep(0);
477 idstore[j++] = ident;
479 memset(outpack, 0, sizeof(outpack));
480 icmp = (void *) outpack;
481 icmp->type = ICMP_ECHO;
482 icmp->un.echo.id = ident;
483 icmp->un.echo.sequence = htons(cnt++);
485 data = ((uint8_t *) outpack + sizeof(*icmp));
486 for (i = 0; i < 56; ++i)
487 data[i] = (uint8_t) rand();
489 icmp->checksum = csum((unsigned short *) outpack,
490 len / sizeof(unsigned short));
492 ret = sendto(icmp_sock, outpack, len, MSG_DONTWAIT,
493 (struct sockaddr *) &ctx->dest, sizeof(ctx->dest));
494 if (unlikely(ret != (int) len))
495 panic("Cannot send out probe: %s!\n", strerror(errno));
497 ret = poll(&fds, 1, 50);
498 if (ret < 0)
499 panic("Poll failed!\n");
501 if (fds.revents & POLLIN) {
502 ret = recvfrom(icmp_sock, outpack, sizeof(outpack), 0,
503 (struct sockaddr *) &from, &from_len);
504 if (unlikely(ret <= 0))
505 panic("Probe receive failed!\n");
506 if (unlikely(from_len != sizeof(ctx->dest)))
507 continue;
508 if (unlikely(memcmp(&from, &ctx->dest, sizeof(ctx->dest))))
509 continue;
510 if (unlikely((size_t) ret < sizeof(*ip) + sizeof(*icmp)))
511 continue;
512 ip = (void *) outpack;
513 if (unlikely(ip->ihl * 4 + sizeof(*icmp) > (size_t) ret))
514 continue;
515 icmp = (void *) outpack + ip->ihl * 4;
516 for (i = 0; i < array_size(idstore); ++i) {
517 if (unlikely(icmp->un.echo.id != idstore[i]))
518 continue;
519 return 0;
524 return -1;
527 static void xmit_slowpath_or_die(struct ctx *ctx, int cpu, unsigned long orig_num)
529 int ret, icmp_sock = -1;
530 unsigned long num = 1, i = 0;
531 struct timeval start, end, diff;
532 unsigned long long tx_bytes = 0, tx_packets = 0;
533 struct packet_dyn *pktd;
534 struct sockaddr_ll saddr = {
535 .sll_family = PF_PACKET,
536 .sll_halen = ETH_ALEN,
537 .sll_ifindex = device_ifindex(ctx->device),
540 if (ctx->num > 0)
541 num = ctx->num;
542 if (ctx->num == 0 && orig_num > 0)
543 num = 0;
545 if (ctx->smoke_test)
546 icmp_sock = xmit_smoke_setup(ctx);
548 drop_privileges(ctx->enforce, ctx->uid, ctx->gid);
550 bug_on(gettimeofday(&start, NULL));
552 while (likely(sigint == 0 && num > 0 && plen > 0)) {
553 pktd = &packet_dyn[i];
554 if (pktd->clen + pktd->rlen + pktd->slen) {
555 apply_counter(i);
556 apply_randomizer(i);
557 apply_csum16(i);
559 retry:
560 ret = sendto(sock, packets[i].payload, packets[i].len, 0,
561 (struct sockaddr *) &saddr, sizeof(saddr));
562 if (unlikely(ret < 0)) {
563 if (errno == ENOBUFS) {
564 sched_yield();
565 goto retry;
567 if (ctx->smoke_test)
568 panic("Sendto error: %s!\n", strerror(errno));
571 tx_bytes += packets[i].len;
572 tx_packets++;
574 if (ctx->smoke_test) {
575 ret = xmit_smoke_probe(icmp_sock, ctx);
576 if (unlikely(ret < 0)) {
577 printf("%sSmoke test alert:%s\n", colorize_start(bold), colorize_end());
578 printf(" Remote host seems to be unresponsive to ICMP probes!\n");
579 printf(" Last instance was packet%lu, seed:%u, trafgen snippet:\n\n",
580 i, seed);
582 dump_trafgen_snippet(packets[i].payload, packets[i].len);
583 break;
587 if (!ctx->rand) {
588 i++;
589 if (i >= plen)
590 i = 0;
591 } else
592 i = rand() % plen;
594 if (ctx->num > 0)
595 num--;
597 if ((ctx->gap.tv_sec | ctx->gap.tv_nsec) > 0)
598 nanosleep(&ctx->gap, NULL);
601 bug_on(gettimeofday(&end, NULL));
602 timersub(&end, &start, &diff);
604 if (ctx->smoke_test)
605 close(icmp_sock);
607 stats[cpu].tx_packets = tx_packets;
608 stats[cpu].tx_bytes = tx_bytes;
609 stats[cpu].tv_sec = diff.tv_sec;
610 stats[cpu].tv_usec = diff.tv_usec;
612 stats[cpu].state |= CPU_STATS_STATE_RES;
615 static void xmit_fastpath_or_die(struct ctx *ctx, int cpu, unsigned long orig_num)
617 int ifindex = device_ifindex(ctx->device);
618 uint8_t *out = NULL;
619 unsigned int it = 0;
620 unsigned long num = 1, i = 0, size;
621 struct ring tx_ring;
622 struct frame_map *hdr;
623 struct timeval start, end, diff;
624 struct packet_dyn *pktd;
625 unsigned long long tx_bytes = 0, tx_packets = 0;
627 fmemset(&tx_ring, 0, sizeof(tx_ring));
629 size = ring_size(ctx->device, ctx->reserve_size);
631 set_sock_prio(sock, 512);
632 set_packet_loss_discard(sock);
634 setup_tx_ring_layout(sock, &tx_ring, size, ctx->jumbo_support);
635 create_tx_ring(sock, &tx_ring, ctx->verbose);
636 mmap_tx_ring(sock, &tx_ring);
637 alloc_tx_ring_frames(sock, &tx_ring);
638 bind_tx_ring(sock, &tx_ring, ifindex);
640 drop_privileges(ctx->enforce, ctx->uid, ctx->gid);
642 if (ctx->kpull)
643 interval = ctx->kpull;
644 if (ctx->num > 0)
645 num = ctx->num;
646 if (ctx->num == 0 && orig_num > 0)
647 num = 0;
649 set_itimer_interval_value(&itimer, 0, interval);
650 setitimer(ITIMER_REAL, &itimer, NULL);
652 bug_on(gettimeofday(&start, NULL));
654 while (likely(sigint == 0 && num > 0 && plen > 0)) {
655 if (!user_may_pull_from_tx(tx_ring.frames[it].iov_base)) {
656 sched_yield();
657 continue;
660 hdr = tx_ring.frames[it].iov_base;
661 out = ((uint8_t *) hdr) + TPACKET2_HDRLEN - sizeof(struct sockaddr_ll);
663 hdr->tp_h.tp_snaplen = packets[i].len;
664 hdr->tp_h.tp_len = packets[i].len;
666 pktd = &packet_dyn[i];
667 if (pktd->clen + pktd->rlen + pktd->slen) {
668 apply_counter(i);
669 apply_randomizer(i);
670 apply_csum16(i);
673 fmemcpy(out, packets[i].payload, packets[i].len);
675 tx_bytes += packets[i].len;
676 tx_packets++;
678 if (!ctx->rand) {
679 i++;
680 if (i >= plen)
681 i = 0;
682 } else
683 i = rand() % plen;
685 kernel_may_pull_from_tx(&hdr->tp_h);
687 it++;
688 if (it >= tx_ring.layout.tp_frame_nr)
689 it = 0;
691 if (ctx->num > 0)
692 num--;
695 bug_on(gettimeofday(&end, NULL));
696 timersub(&end, &start, &diff);
698 timer_purge();
700 destroy_tx_ring(sock, &tx_ring);
702 stats[cpu].tx_packets = tx_packets;
703 stats[cpu].tx_bytes = tx_bytes;
704 stats[cpu].tv_sec = diff.tv_sec;
705 stats[cpu].tv_usec = diff.tv_usec;
707 stats[cpu].state |= CPU_STATS_STATE_RES;
710 static inline void __set_state(int cpu, sig_atomic_t s)
712 stats[cpu].state = s;
715 static inline sig_atomic_t __get_state(int cpu)
717 return stats[cpu].state;
720 static unsigned long __wait_and_sum_others(struct ctx *ctx, unsigned int cpu)
722 unsigned int i;
723 unsigned long total;
725 for (i = 0, total = plen; i < ctx->cpus; i++) {
726 if (i == cpu)
727 continue;
729 while ((__get_state(i) &
730 (CPU_STATS_STATE_CFG |
731 CPU_STATS_STATE_RES)) == 0 &&
732 sigint == 0)
733 sched_yield();
735 total += stats[i].cf_packets;
738 return total;
741 static void __correct_global_delta(struct ctx *ctx, unsigned int cpu, unsigned long orig)
743 unsigned int i;
744 unsigned long total;
745 int cpu_sel;
746 long long delta_correction = 0;
748 for (i = 0, total = ctx->num; i < ctx->cpus; i++) {
749 if (i == cpu)
750 continue;
752 while ((__get_state(i) &
753 (CPU_STATS_STATE_CHK |
754 CPU_STATS_STATE_RES)) == 0 &&
755 sigint == 0)
756 sched_yield();
758 total += stats[i].cd_packets;
761 if (total > orig)
762 delta_correction = -1 * ((long long) total - orig);
763 if (total < orig)
764 delta_correction = +1 * ((long long) orig - total);
766 for (cpu_sel = -1, i = 0; i < ctx->cpus; i++) {
767 if (stats[i].cd_packets > 0) {
768 if ((long long) stats[i].cd_packets +
769 delta_correction >= 0) {
770 cpu_sel = i;
771 break;
776 if ((int) cpu == cpu_sel)
777 ctx->num += delta_correction;
780 static void __set_state_cf(int cpu, unsigned long p, unsigned long b,
781 sig_atomic_t s)
783 stats[cpu].cf_packets = p;
784 stats[cpu].cf_bytes = b;
785 stats[cpu].state = s;
788 static void __set_state_cd(int cpu, unsigned long p, sig_atomic_t s)
790 stats[cpu].cd_packets = p;
791 stats[cpu].state = s;
794 static int xmit_packet_precheck(struct ctx *ctx, int cpu)
796 unsigned int i;
797 unsigned long plen_total, orig = ctx->num;
798 size_t mtu, total_len = 0;
800 bug_on(plen != dlen);
802 for (i = 0; i < plen; ++i)
803 total_len += packets[i].len;
805 __set_state_cf(cpu, plen, total_len, CPU_STATS_STATE_CFG);
806 plen_total = __wait_and_sum_others(ctx, cpu);
808 if (orig > 0) {
809 ctx->num = (unsigned long) round((1.0 * plen / plen_total) * orig);
811 __set_state_cd(cpu, ctx->num, CPU_STATS_STATE_CHK |
812 CPU_STATS_STATE_CFG);
813 __correct_global_delta(ctx, cpu, orig);
816 if (plen == 0) {
817 __set_state(cpu, CPU_STATS_STATE_RES);
818 return 0;
821 for (mtu = device_mtu(ctx->device), i = 0; i < plen; ++i) {
822 if (packets[i].len > mtu + 14)
823 panic("Device MTU < than packet%d's size!\n", i);
824 if (packets[i].len <= 14)
825 panic("Packet%d's size too short!\n", i);
828 return 0;
831 static void main_loop(struct ctx *ctx, char *confname, bool slow,
832 unsigned int cpu, bool invoke_cpp, unsigned long orig_num)
834 compile_packets(confname, ctx->verbose, cpu, invoke_cpp);
835 if (xmit_packet_precheck(ctx, cpu) < 0)
836 return;
838 if (cpu == 0) {
839 unsigned int i;
840 size_t total_len = 0, total_pkts = 0;
842 for (i = 0; i < ctx->cpus; ++i) {
843 total_len += stats[i].cf_bytes;
844 total_pkts += stats[i].cf_packets;
847 printf("%6zu packets to schedule\n", total_pkts);
848 printf("%6zu bytes in total\n", total_len);
849 printf("Running! Hang up with ^C!\n\n");
850 fflush(stdout);
853 sock = pf_socket();
855 if (slow)
856 xmit_slowpath_or_die(ctx, cpu, orig_num);
857 else
858 xmit_fastpath_or_die(ctx, cpu, orig_num);
860 close(sock);
862 cleanup_packets();
865 static unsigned int generate_srand_seed(void)
867 int fd;
868 unsigned int _seed;
870 fd = open("/dev/urandom", O_RDONLY);
871 if (fd < 0)
872 return time(NULL);
874 read_or_die(fd, &_seed, sizeof(_seed));
876 close(fd);
877 return _seed;
880 int main(int argc, char **argv)
882 bool slow = false, invoke_cpp = false, reseed = true, cpustats = true;
883 int c, opt_index, vals[4] = {0}, irq;
884 uint64_t gap = 0;
885 unsigned int i, j;
886 char *confname = NULL, *ptr;
887 unsigned long cpus_tmp, orig_num = 0;
888 unsigned long long tx_packets, tx_bytes;
889 struct ctx ctx;
891 fmemset(&ctx, 0, sizeof(ctx));
892 ctx.cpus = get_number_cpus_online();
893 ctx.uid = getuid();
894 ctx.gid = getgid();
896 while ((c = getopt_long(argc, argv, short_options, long_options,
897 &opt_index)) != EOF) {
898 switch (c) {
899 case 'h':
900 help();
901 break;
902 case 'v':
903 version();
904 break;
905 case 'C':
906 cpustats = false;
907 break;
908 case 'e':
909 example();
910 break;
911 case 'p':
912 invoke_cpp = true;
913 break;
914 case 'V':
915 ctx.verbose = true;
916 break;
917 case 'P':
918 cpus_tmp = strtoul(optarg, NULL, 0);
919 if (cpus_tmp > 0 && cpus_tmp < ctx.cpus)
920 ctx.cpus = cpus_tmp;
921 break;
922 case 'd':
923 case 'o':
924 ctx.device = xstrndup(optarg, IFNAMSIZ);
925 break;
926 case 'r':
927 ctx.rand = true;
928 break;
929 case 's':
930 slow = true;
931 ctx.cpus = 1;
932 ctx.smoke_test = true;
933 ctx.rhost = xstrdup(optarg);
934 break;
935 case 'R':
936 ctx.rfraw = true;
937 break;
938 case 'J':
939 ctx.jumbo_support = true;
940 break;
941 case 'c':
942 case 'i':
943 confname = xstrdup(optarg);
944 if (!strncmp("-", confname, strlen("-")))
945 ctx.cpus = 1;
946 break;
947 case 'u':
948 ctx.uid = strtoul(optarg, NULL, 0);
949 ctx.enforce = true;
950 break;
951 case 'g':
952 ctx.gid = strtoul(optarg, NULL, 0);
953 ctx.enforce = true;
954 break;
955 case 'k':
956 ctx.kpull = strtoul(optarg, NULL, 0);
957 break;
958 case 'E':
959 seed = strtoul(optarg, NULL, 0);
960 reseed = false;
961 break;
962 case 'n':
963 orig_num = strtoul(optarg, NULL, 0);
964 ctx.num = orig_num;
965 break;
966 case 't':
967 slow = true;
968 ptr = optarg;
969 gap = strtoul(optarg, NULL, 0);
971 for (j = i = strlen(optarg); i > 0; --i) {
972 if (!isdigit(optarg[j - i]))
973 break;
974 ptr++;
977 if (!strncmp(ptr, "ns", strlen("ns"))) {
978 ctx.gap.tv_sec = gap / 1000000000;
979 ctx.gap.tv_nsec = gap % 1000000000;
980 } else if (*ptr == '\0' || !strncmp(ptr, "us", strlen("us"))) {
981 /* Default to microseconds for backwards
982 * compatibility if no postfix is given.
984 ctx.gap.tv_sec = gap / 1000000;
985 ctx.gap.tv_nsec = (gap % 1000000) * 1000;
986 } else if (!strncmp(ptr, "ms", strlen("ms"))) {
987 ctx.gap.tv_sec = gap / 1000;
988 ctx.gap.tv_nsec = (gap % 1000) * 1000000;
989 } else if (!strncmp(ptr, "s", strlen("s"))) {
990 ctx.gap.tv_sec = gap;
991 ctx.gap.tv_nsec = 0;
992 } else
993 panic("Syntax error in time param!\n");
995 if (gap > 0)
996 /* Fall back to single core to not mess up
997 * correct timing. We are slow anyway!
999 ctx.cpus = 1;
1000 break;
1001 case 'S':
1002 ptr = optarg;
1003 ctx.reserve_size = 0;
1005 for (j = i = strlen(optarg); i > 0; --i) {
1006 if (!isdigit(optarg[j - i]))
1007 break;
1008 ptr++;
1011 if (!strncmp(ptr, "KiB", strlen("KiB")))
1012 ctx.reserve_size = 1 << 10;
1013 else if (!strncmp(ptr, "MiB", strlen("MiB")))
1014 ctx.reserve_size = 1 << 20;
1015 else if (!strncmp(ptr, "GiB", strlen("GiB")))
1016 ctx.reserve_size = 1 << 30;
1017 else
1018 panic("Syntax error in ring size param!\n");
1019 *ptr = 0;
1021 ctx.reserve_size *= strtol(optarg, NULL, 0);
1022 break;
1023 case '?':
1024 switch (optopt) {
1025 case 'd':
1026 case 'c':
1027 case 'n':
1028 case 'S':
1029 case 's':
1030 case 'P':
1031 case 'o':
1032 case 'E':
1033 case 'i':
1034 case 'k':
1035 case 'u':
1036 case 'g':
1037 case 't':
1038 panic("Option -%c requires an argument!\n",
1039 optopt);
1040 default:
1041 if (isprint(optopt))
1042 printf("Unknown option character `0x%X\'!\n", optopt);
1043 die();
1045 default:
1046 break;
1050 if (argc < 5)
1051 help();
1052 if (ctx.device == NULL)
1053 panic("No networking device given!\n");
1054 if (confname == NULL)
1055 panic("No configuration file given!\n");
1056 if (device_mtu(ctx.device) == 0)
1057 panic("This is no networking device!\n");
1059 register_signal(SIGINT, signal_handler);
1060 register_signal(SIGHUP, signal_handler);
1061 register_signal_f(SIGALRM, timer_elapsed, SA_SIGINFO);
1063 set_system_socket_memory(vals, array_size(vals));
1064 xlockme();
1066 if (ctx.rfraw) {
1067 ctx.device_trans = xstrdup(ctx.device);
1068 xfree(ctx.device);
1070 enter_rfmon_mac80211(ctx.device_trans, &ctx.device);
1071 sleep(0);
1074 irq = device_irq_number(ctx.device);
1075 device_set_irq_affinity_list(irq, 0, ctx.cpus - 1);
1077 stats = setup_shared_var(ctx.cpus);
1079 for (i = 0; i < ctx.cpus; i++) {
1080 pid_t pid = fork();
1082 switch (pid) {
1083 case 0:
1084 if (reseed)
1085 seed = generate_srand_seed();
1086 srand(seed);
1088 cpu_affinity(i);
1089 main_loop(&ctx, confname, slow, i, invoke_cpp, orig_num);
1091 goto thread_out;
1092 case -1:
1093 panic("Cannot fork processes!\n");
1097 for (i = 0; i < ctx.cpus; i++) {
1098 int status;
1100 wait(&status);
1101 if (WEXITSTATUS(status) == EXIT_FAILURE)
1102 die();
1105 if (ctx.rfraw)
1106 leave_rfmon_mac80211(ctx.device);
1108 reset_system_socket_memory(vals, array_size(vals));
1110 for (i = 0, tx_packets = tx_bytes = 0; i < ctx.cpus; i++) {
1111 while ((__get_state(i) & CPU_STATS_STATE_RES) == 0)
1112 sched_yield();
1114 tx_packets += stats[i].tx_packets;
1115 tx_bytes += stats[i].tx_bytes;
1118 fflush(stdout);
1119 printf("\n");
1120 printf("\r%12llu packets outgoing\n", tx_packets);
1121 printf("\r%12llu bytes outgoing\n", tx_bytes);
1122 for (i = 0; cpustats && i < ctx.cpus; i++) {
1123 printf("\r%12lu sec, %lu usec on CPU%d (%llu packets)\n",
1124 stats[i].tv_sec, stats[i].tv_usec, i,
1125 stats[i].tx_packets);
1128 thread_out:
1129 xunlockme();
1130 destroy_shared_var(stats, ctx.cpus);
1131 device_restore_irq_affinity_list();
1133 free(ctx.device);
1134 free(ctx.device_trans);
1135 free(ctx.rhost);
1136 free(confname);
1138 return 0;