summaryrefslogtreecommitdiff
path: root/trafgen.c
diff options
context:
space:
mode:
Diffstat (limited to 'trafgen.c')
-rw-r--r--trafgen.c1064
1 files changed, 1064 insertions, 0 deletions
diff --git a/trafgen.c b/trafgen.c
new file mode 100644
index 0000000..03c12c5
--- /dev/null
+++ b/trafgen.c
@@ -0,0 +1,1064 @@
+/*
+ * netsniff-ng - the packet sniffing beast
+ * Copyright 2011 - 2013 Daniel Borkmann <dborkma@tik.ee.ethz.ch>,
+ * Swiss federal institute of technology (ETH Zurich)
+ * Subject to the GPL, version 2.
+ */
+
+#include <stdio.h>
+#include <string.h>
+#include <getopt.h>
+#include <ctype.h>
+#include <stdbool.h>
+#include <sys/socket.h>
+#include <sys/types.h>
+#include <sys/fsuid.h>
+#include <sys/stat.h>
+#include <sys/time.h>
+#include <sys/wait.h>
+#include <sys/mman.h>
+#include <net/ethernet.h>
+#include <netinet/in.h>
+#include <netinet/ip.h>
+#include <linux/icmp.h>
+#include <arpa/inet.h>
+#include <signal.h>
+#include <stdint.h>
+#include <stdlib.h>
+#include <fcntl.h>
+#include <time.h>
+#include <poll.h>
+#include <netdb.h>
+#include <math.h>
+#include <unistd.h>
+
+#include "xmalloc.h"
+#include "die.h"
+#include "mac80211.h"
+#include "xutils.h"
+#include "xio.h"
+#include "built_in.h"
+#include "trafgen_conf.h"
+#include "tprintf.h"
+#include "ring_tx.h"
+#include "csum.h"
+
+struct ctx {
+ bool rand, rfraw, jumbo_support, verbose, smoke_test, enforce;
+ unsigned long kpull, num, gap, reserve_size, cpus;
+ uid_t uid; gid_t gid; char *device, *device_trans, *rhost;
+ struct sockaddr_in dest;
+};
+
+struct cpu_stats {
+ unsigned long tv_sec, tv_usec;
+ unsigned long long tx_packets, tx_bytes;
+ unsigned long long cf_packets, cf_bytes;
+ unsigned long long cd_packets;
+ sig_atomic_t state;
+};
+
+sig_atomic_t sigint = 0;
+
+struct packet *packets = NULL;
+size_t plen = 0;
+
+struct packet_dyn *packet_dyn = NULL;
+size_t dlen = 0;
+
+static const char *short_options = "d:c:n:t:vJhS:rk:i:o:VRs:P:eE:pu:g:";
+static const struct option long_options[] = {
+ {"dev", required_argument, NULL, 'd'},
+ {"out", required_argument, NULL, 'o'},
+ {"in", required_argument, NULL, 'i'},
+ {"conf", required_argument, NULL, 'c'},
+ {"num", required_argument, NULL, 'n'},
+ {"gap", required_argument, NULL, 't'},
+ {"cpus", required_argument, NULL, 'P'},
+ {"ring-size", required_argument, NULL, 'S'},
+ {"kernel-pull", required_argument, NULL, 'k'},
+ {"smoke-test", required_argument, NULL, 's'},
+ {"seed", required_argument, NULL, 'E'},
+ {"user", required_argument, NULL, 'u'},
+ {"group", required_argument, NULL, 'g'},
+ {"jumbo-support", no_argument, NULL, 'J'},
+ {"cpp", no_argument, NULL, 'p'},
+ {"rfraw", no_argument, NULL, 'R'},
+ {"rand", no_argument, NULL, 'r'},
+ {"verbose", no_argument, NULL, 'V'},
+ {"version", no_argument, NULL, 'v'},
+ {"example", no_argument, NULL, 'e'},
+ {"help", no_argument, NULL, 'h'},
+ {NULL, 0, NULL, 0}
+};
+
+static int sock;
+
+static struct itimerval itimer;
+
+static unsigned long interval = TX_KERNEL_PULL_INT;
+
+static struct cpu_stats *stats;
+
+unsigned int seed;
+
+#define CPU_STATS_STATE_CFG 1
+#define CPU_STATS_STATE_CHK 2
+#define CPU_STATS_STATE_RES 4
+
+#ifndef ICMP_FILTER
+# define ICMP_FILTER 1
+
+struct icmp_filter {
+ __u32 data;
+};
+#endif
+
+static void signal_handler(int number)
+{
+ switch (number) {
+ case SIGINT:
+ sigint = 1;
+ case SIGHUP:
+ default:
+ break;
+ }
+}
+
+static void timer_elapsed(int number)
+{
+ set_itimer_interval_value(&itimer, 0, interval);
+ pull_and_flush_tx_ring(sock);
+ setitimer(ITIMER_REAL, &itimer, NULL);
+}
+
+static void help(void)
+{
+ printf("\ntrafgen %s, multithreaded zero-copy network packet generator\n", VERSION_STRING);
+ puts("http://www.netsniff-ng.org\n\n"
+ "Usage: trafgen [options]\n"
+ "Options:\n"
+ " -i|-c|--in|--conf <cfg/-> Packet configuration file/stdin\n"
+ " -o|-d|--out|--dev <netdev> Networking device i.e., eth0\n"
+ " -p|--cpp Run packet config through C preprocessor\n"
+ " -J|--jumbo-support Support 64KB super jumbo frames (def: 2048B)\n"
+ " -R|--rfraw Inject raw 802.11 frames\n"
+ " -s|--smoke-test <ipv4> Probe if machine survived fuzz-tested packet\n"
+ " -n|--num <uint> Number of packets until exit (def: 0)\n"
+ " -r|--rand Randomize packet selection (def: round robin)\n"
+ " -P|--cpus <uint> Specify number of forks(<= CPUs) (def: #CPUs)\n"
+ " -t|--gap <uint> Interpacket gap in us (approx)\n"
+ " -S|--ring-size <size> Manually set mmap size (KiB/MiB/GiB)\n"
+ " -k|--kernel-pull <uint> Kernel batch interval in us (def: 10us)\n"
+ " -E|--seed <uint> Manually set srand(3) seed\n"
+ " -u|--user <userid> Drop privileges and change to userid\n"
+ " -g|--group <groupid> Drop privileges and change to groupid\n"
+ " -V|--verbose Be more verbose\n"
+ " -v|--version Show version\n"
+ " -e|--example Show built-in packet config example\n"
+ " -h|--help Guess what?!\n\n"
+ "Examples:\n"
+ " See trafgen.txf for configuration file examples.\n"
+ " trafgen --dev eth0 --conf trafgen.cfg\n"
+ " trafgen -e | trafgen -i - -o eth0 --cpp -n 1\n"
+ " trafgen --dev eth0 --conf fuzzing.cfg --smoke-test 10.0.0.1\n"
+ " trafgen --dev wlan0 --rfraw --conf beacon-test.txf -V --cpus 2\n"
+ " trafgen --dev eth0 --conf frag_dos.cfg --rand --gap 1000\n"
+ " trafgen --dev eth0 --conf icmp.cfg --rand --num 1400000 -k1000\n"
+ " trafgen --dev eth0 --conf tcp_syn.cfg -u `id -u bob` -g `id -g bob`\n\n"
+ "Arbitrary packet config examples (e.g. trafgen -e > trafgen.cfg):\n"
+ " Run packet on all CPUs: { fill(0xff, 64) csum16(0, 64) }\n"
+ " Run packet only on CPU1: cpu(1): { rnd(64), 0b11001100, 0xaa }\n"
+ " Run packet only on CPU1-2: cpu(1:2): { drnd(64),'a',csum16(1, 8),'b',42 }\n\n"
+ "Note:\n"
+ " Smoke/fuzz test example: machine A, 10.0.0.2 (trafgen) is directly\n"
+ " connected to machine B (test kernel), 10.0.0.1. If ICMP reply fails\n"
+ " we assume the kernel crashed, thus we print the packet and quit.\n"
+ " In case you find a ping-of-death, please mention trafgen in your\n"
+ " commit message of the fix!\n\n"
+ " For introducing bit errors, delays with random variation and more,\n"
+ " make use of tc(8) with its different disciplines, i.e. netem.\n\n"
+ " For generating different package distributions, you can use scripting\n"
+ " to generate a trafgen config file with packet ratios as:\n\n"
+ " IMIX 64:7, 570:4, 1518:1\n"
+ " Tolly 64:55, 78:5, 576:17, 1518:23\n"
+ " Cisco 64:7, 594:4, 1518:1\n"
+ " RPR Trimodal 64:60, 512:20, 1518:20\n"
+ " RPR Quadrimodal 64:50, 512:15, 1518:15, 9218:20\n\n"
+ "Please report bugs to <bugs@netsniff-ng.org>\n"
+ "Copyright (C) 2011-2013 Daniel Borkmann <dborkma@tik.ee.ethz.ch>,\n"
+ "Swiss federal institute of technology (ETH Zurich)\n"
+ "License: GNU GPL version 2.0\n"
+ "This is free software: you are free to change and redistribute it.\n"
+ "There is NO WARRANTY, to the extent permitted by law.\n");
+ die();
+}
+
+static void example(void)
+{
+ const char *e =
+ "/* Note: dynamic elements make trafgen slower! */\n"
+ "#include <stddef.h>\n\n"
+ "{\n"
+ " /* MAC Destination */\n"
+ " fill(0xff, ETH_ALEN),\n"
+ " /* MAC Source */\n"
+ " 0x00, 0x02, 0xb3, drnd(3),\n"
+ " /* IPv4 Protocol */\n"
+ " c16(ETH_P_IP),\n"
+ " /* IPv4 Version, IHL, TOS */\n"
+ " 0b01000101, 0,\n"
+ " /* IPv4 Total Len */\n"
+ " c16(58),\n"
+ " /* IPv4 Ident */\n"
+ " drnd(2),\n"
+ " /* IPv4 Flags, Frag Off */\n"
+ " 0b01000000, 0,\n"
+ " /* IPv4 TTL */\n"
+ " 64,\n"
+ " /* Proto TCP */\n"
+ " 0x06,\n"
+ " /* IPv4 Checksum (IP header from, to) */\n"
+ " csumip(14, 33),\n"
+ " /* Source IP */\n"
+ " drnd(4),\n"
+ " /* Dest IP */\n"
+ " drnd(4),\n"
+ " /* TCP Source Port */\n"
+ " drnd(2),\n"
+ " /* TCP Dest Port */\n"
+ " c16(80),\n"
+ " /* TCP Sequence Number */\n"
+ " drnd(4),\n"
+ " /* TCP Ackn. Number */\n"
+ " c32(0),\n"
+ " /* TCP Header length + TCP SYN/ECN Flag */\n"
+ " c16((8 << 12) | TCP_FLAG_SYN | TCP_FLAG_ECE)\n"
+ " /* Window Size */\n"
+ " c16(16),\n"
+ " /* TCP Checksum (offset IP, offset TCP) */\n"
+ " csumtcp(14, 34),\n"
+ " /* TCP Options */\n"
+ " 0x00, 0x00, 0x01, 0x01, 0x08, 0x0a, 0x06,\n"
+ " 0x91, 0x68, 0x7d, 0x06, 0x91, 0x68, 0x6f,\n"
+ " /* Data blob */\n"
+ " \"gotcha!\",\n"
+ "}";
+ puts(e);
+ die();
+}
+
+static void version(void)
+{
+ printf("\ntrafgen %s, multithreaded zero-copy network packet generator\n", VERSION_STRING);
+ puts("http://www.netsniff-ng.org\n\n"
+ "Please report bugs to <bugs@netsniff-ng.org>\n"
+ "Copyright (C) 2011-2013 Daniel Borkmann <dborkma@tik.ee.ethz.ch>,\n"
+ "Swiss federal institute of technology (ETH Zurich)\n"
+ "License: GNU GPL version 2.0\n"
+ "This is free software: you are free to change and redistribute it.\n"
+ "There is NO WARRANTY, to the extent permitted by law.\n");
+ die();
+}
+
+static void apply_counter(int counter_id)
+{
+ int j, i = counter_id;
+ size_t counter_max = packet_dyn[i].clen;
+
+ for (j = 0; j < counter_max; ++j) {
+ uint8_t val;
+ struct counter *counter = &packet_dyn[i].cnt[j];
+
+ val = counter->val - counter->min;
+
+ switch (counter->type) {
+ case TYPE_INC:
+ val = (val + counter->inc) % (counter->max - counter->min + 1);
+ break;
+ case TYPE_DEC:
+ val = (val - counter->inc) % (counter->min - counter->max + 1);
+ break;
+ default:
+ bug();
+ }
+
+ counter->val = val + counter->min;
+ packets[i].payload[counter->off] = val;
+ }
+}
+
+static void apply_randomizer(int rand_id)
+{
+ int j, i = rand_id;
+ size_t rand_max = packet_dyn[i].rlen;
+
+ for (j = 0; j < rand_max; ++j) {
+ uint8_t val = (uint8_t) rand();
+ struct randomizer *randomizer = &packet_dyn[i].rnd[j];
+
+ packets[i].payload[randomizer->off] = val;
+ }
+}
+
+static void apply_csum16(int csum_id)
+{
+ int j, i = csum_id;
+ size_t csum_max = packet_dyn[i].slen;
+
+ for (j = 0; j < csum_max; ++j) {
+ uint16_t sum = 0;
+ struct csum16 *csum = &packet_dyn[i].csum[j];
+
+ fmemset(&packets[i].payload[csum->off], 0, sizeof(sum));
+
+ switch (csum->which) {
+ case CSUM_IP:
+ if (csum->to >= packets[i].len)
+ csum->to = packets[i].len - 1;
+ sum = calc_csum(packets[i].payload + csum->from,
+ csum->to - csum->from + 1, 0);
+ break;
+ case CSUM_UDP:
+ sum = p4_csum((void *) packets[i].payload + csum->from,
+ packets[i].payload + csum->to,
+ (packets[i].len - csum->to),
+ IPPROTO_UDP);
+ break;
+ case CSUM_TCP:
+ sum = p4_csum((void *) packets[i].payload + csum->from,
+ packets[i].payload + csum->to,
+ (packets[i].len - csum->to),
+ IPPROTO_TCP);
+ break;
+ }
+
+ fmemcpy(&packets[i].payload[csum->off], &sum, sizeof(sum));
+ }
+}
+
+static struct cpu_stats *setup_shared_var(unsigned long cpus)
+{
+ int fd;
+ char zbuff[cpus * sizeof(struct cpu_stats)], file[256];
+ struct cpu_stats *buff;
+
+ fmemset(zbuff, 0, sizeof(zbuff));
+ slprintf(file, sizeof(file), ".tmp_mmap.%u", (unsigned int) rand());
+
+ fd = creat(file, S_IRUSR | S_IWUSR);
+ bug_on(fd < 0);
+ close(fd);
+
+ fd = open_or_die_m(file, O_RDWR | O_CREAT | O_TRUNC,
+ S_IRUSR | S_IWUSR);
+ write_or_die(fd, zbuff, sizeof(zbuff));
+
+ buff = (void *) mmap(0, sizeof(zbuff), PROT_READ | PROT_WRITE,
+ MAP_SHARED, fd, 0);
+ if (buff == (void *) -1)
+ panic("Cannot setup shared variable!\n");
+
+ close(fd);
+ unlink(file);
+
+ memset(buff, 0, sizeof(zbuff));
+
+ return buff;
+}
+
+static void destroy_shared_var(void *buff, unsigned long cpus)
+{
+ munmap(buff, cpus * sizeof(struct cpu_stats));
+}
+
+static void dump_trafgen_snippet(uint8_t *payload, size_t len)
+{
+ int i;
+
+ printf("{");
+ for (i = 0; i < len; ++i) {
+ if (i % 15 == 0)
+ printf("\n ");
+ printf("0x%02x, ", payload[i]);
+ }
+ printf("\n}\n");
+ fflush(stdout);
+}
+
+static int xmit_smoke_setup(struct ctx *ctx)
+{
+ int icmp_sock, ret, ttl = 64;
+ struct icmp_filter filter;
+
+ icmp_sock = socket(AF_INET, SOCK_RAW, IPPROTO_ICMP);
+ if (icmp_sock < 0)
+ panic("Cannot get a ICMP socket: %s!\n", strerror(errno));
+
+ filter.data = ~(1 << ICMP_ECHOREPLY);
+
+ ret = setsockopt(icmp_sock, SOL_RAW, ICMP_FILTER, &filter, sizeof(filter));
+ if (ret < 0)
+ panic("Cannot install filter!\n");
+
+ ret = setsockopt(icmp_sock, SOL_IP, IP_TTL, &ttl, sizeof(ttl));
+ if (ret < 0)
+ panic("Cannot set TTL!\n");
+
+ memset(&ctx->dest, 0, sizeof(ctx->dest));
+ ctx->dest.sin_family = AF_INET;
+ ctx->dest.sin_port = 0;
+
+ ret = inet_aton(ctx->rhost, &ctx->dest.sin_addr);
+ if (ret < 0)
+ panic("Cannot resolv address!\n");
+
+ return icmp_sock;
+}
+
+static int xmit_smoke_probe(int icmp_sock, struct ctx *ctx)
+{
+ int ret, i, j = 0, probes = 100;
+ short ident, cnt = 1, idstore[probes];
+ uint8_t outpack[512], *data;
+ struct icmphdr *icmp;
+ struct iphdr *ip;
+ size_t len = sizeof(*icmp) + 56;
+ struct sockaddr_in from;
+ socklen_t from_len;
+ struct pollfd fds = {
+ .fd = icmp_sock,
+ .events = POLLIN,
+ };
+
+ fmemset(idstore, 0, sizeof(idstore));
+ while (probes-- > 0) {
+ while ((ident = htons((short) rand())) == 0)
+ sleep(0);
+ idstore[j++] = ident;
+
+ memset(outpack, 0, sizeof(outpack));
+ icmp = (void *) outpack;
+ icmp->type = ICMP_ECHO;
+ icmp->code = 0;
+ icmp->checksum = 0;
+ icmp->un.echo.id = ident;
+ icmp->un.echo.sequence = htons(cnt++);
+
+ data = ((uint8_t *) outpack + sizeof(*icmp));
+ for (i = 0; i < 56; ++i)
+ data[i] = (uint8_t) rand();
+
+ icmp->checksum = csum((unsigned short *) outpack,
+ len / sizeof(unsigned short));
+
+ ret = sendto(icmp_sock, outpack, len, MSG_DONTWAIT,
+ (struct sockaddr *) &ctx->dest, sizeof(ctx->dest));
+ if (unlikely(ret != len))
+ panic("Cannot send out probe: %s!\n", strerror(errno));
+
+ ret = poll(&fds, 1, 50);
+ if (ret < 0)
+ panic("Poll failed!\n");
+
+ if (fds.revents & POLLIN) {
+ ret = recvfrom(icmp_sock, outpack, sizeof(outpack), 0,
+ (struct sockaddr *) &from, &from_len);
+ if (unlikely(ret <= 0))
+ panic("Probe receive failed!\n");
+ if (unlikely(from_len != sizeof(ctx->dest)))
+ continue;
+ if (unlikely(memcmp(&from, &ctx->dest, sizeof(ctx->dest))))
+ continue;
+ if (unlikely(ret < sizeof(*ip) + sizeof(*icmp)))
+ continue;
+ ip = (void *) outpack;
+ if (unlikely(ip->ihl * 4 + sizeof(*icmp) > ret))
+ continue;
+ icmp = (void *) outpack + ip->ihl * 4;
+ for (i = 0; i < array_size(idstore); ++i) {
+ if (unlikely(icmp->un.echo.id != idstore[i]))
+ continue;
+ return 0;
+ }
+ }
+ }
+
+ return -1;
+}
+
+static void xmit_slowpath_or_die(struct ctx *ctx, int cpu)
+{
+ int ret, icmp_sock = -1;
+ unsigned long num = 1, i = 0;
+ struct timeval start, end, diff;
+ unsigned long long tx_bytes = 0, tx_packets = 0;
+ struct packet_dyn *pktd;
+ struct sockaddr_ll saddr = {
+ .sll_family = PF_PACKET,
+ .sll_halen = ETH_ALEN,
+ .sll_ifindex = device_ifindex(ctx->device),
+ };
+
+ if (ctx->num > 0)
+ num = ctx->num;
+
+ if (ctx->smoke_test)
+ icmp_sock = xmit_smoke_setup(ctx);
+
+ drop_privileges(ctx->enforce, ctx->uid, ctx->gid);
+
+ bug_on(gettimeofday(&start, NULL));
+
+ while (likely(sigint == 0) && likely(num > 0)) {
+ pktd = &packet_dyn[i];
+ if (pktd->clen + pktd->rlen + pktd->slen) {
+ apply_counter(i);
+ apply_randomizer(i);
+ apply_csum16(i);
+ }
+retry:
+ ret = sendto(sock, packets[i].payload, packets[i].len, 0,
+ (struct sockaddr *) &saddr, sizeof(saddr));
+ if (unlikely(ret < 0)) {
+ if (errno == ENOBUFS) {
+ sched_yield();
+ goto retry;
+ }
+
+ panic("Sendto error: %s!\n", strerror(errno));
+ }
+
+ tx_bytes += packets[i].len;
+ tx_packets++;
+
+ if (ctx->smoke_test) {
+ ret = xmit_smoke_probe(icmp_sock, ctx);
+ if (unlikely(ret < 0)) {
+ printf("%sSmoke test alert:%s\n", colorize_start(bold), colorize_end());
+ printf(" Remote host seems to be unresponsive to ICMP probes!\n");
+ printf(" Last instance was packet%lu, seed:%u, trafgen snippet:\n\n",
+ i, seed);
+
+ dump_trafgen_snippet(packets[i].payload, packets[i].len);
+ break;
+ }
+ }
+
+ if (!ctx->rand) {
+ i++;
+ if (i >= plen)
+ i = 0;
+ } else
+ i = rand() % plen;
+
+ if (ctx->num > 0)
+ num--;
+
+ if (ctx->gap > 0)
+ usleep(ctx->gap);
+ }
+
+ bug_on(gettimeofday(&end, NULL));
+ timersub(&end, &start, &diff);
+
+ if (ctx->smoke_test)
+ close(icmp_sock);
+
+ stats[cpu].tx_packets = tx_packets;
+ stats[cpu].tx_bytes = tx_bytes;
+ stats[cpu].tv_sec = diff.tv_sec;
+ stats[cpu].tv_usec = diff.tv_usec;
+
+ stats[cpu].state |= CPU_STATS_STATE_RES;
+}
+
+static void xmit_fastpath_or_die(struct ctx *ctx, int cpu)
+{
+ int ifindex = device_ifindex(ctx->device);
+ uint8_t *out = NULL;
+ unsigned int it = 0;
+ unsigned long num = 1, i = 0, size;
+ struct ring tx_ring;
+ struct frame_map *hdr;
+ struct timeval start, end, diff;
+ struct packet_dyn *pktd;
+ unsigned long long tx_bytes = 0, tx_packets = 0;
+
+ fmemset(&tx_ring, 0, sizeof(tx_ring));
+
+ size = ring_size(ctx->device, ctx->reserve_size);
+
+ set_sock_prio(sock, 512);
+ set_packet_loss_discard(sock);
+
+ setup_tx_ring_layout(sock, &tx_ring, size, ctx->jumbo_support);
+ create_tx_ring(sock, &tx_ring, ctx->verbose);
+ mmap_tx_ring(sock, &tx_ring);
+ alloc_tx_ring_frames(&tx_ring);
+ bind_tx_ring(sock, &tx_ring, ifindex);
+
+ drop_privileges(ctx->enforce, ctx->uid, ctx->gid);
+
+ if (ctx->kpull)
+ interval = ctx->kpull;
+ if (ctx->num > 0)
+ num = ctx->num;
+
+ set_itimer_interval_value(&itimer, 0, interval);
+ setitimer(ITIMER_REAL, &itimer, NULL);
+
+ bug_on(gettimeofday(&start, NULL));
+
+ while (likely(sigint == 0) && likely(num > 0)) {
+ while (user_may_pull_from_tx(tx_ring.frames[it].iov_base) && likely(num > 0)) {
+ hdr = tx_ring.frames[it].iov_base;
+ out = ((uint8_t *) hdr) + TPACKET2_HDRLEN - sizeof(struct sockaddr_ll);
+
+ hdr->tp_h.tp_snaplen = packets[i].len;
+ hdr->tp_h.tp_len = packets[i].len;
+
+ pktd = &packet_dyn[i];
+ if (pktd->clen + pktd->rlen + pktd->slen) {
+ apply_counter(i);
+ apply_randomizer(i);
+ apply_csum16(i);
+ }
+
+ fmemcpy(out, packets[i].payload, packets[i].len);
+
+ tx_bytes += packets[i].len;
+ tx_packets++;
+
+ if (!ctx->rand) {
+ i++;
+ if (i >= plen)
+ i = 0;
+ } else
+ i = rand() % plen;
+
+ kernel_may_pull_from_tx(&hdr->tp_h);
+
+ it++;
+ if (it >= tx_ring.layout.tp_frame_nr)
+ it = 0;
+
+ if (ctx->num > 0)
+ num--;
+
+ if (unlikely(sigint == 1))
+ break;
+ }
+ }
+
+ bug_on(gettimeofday(&end, NULL));
+ timersub(&end, &start, &diff);
+
+ destroy_tx_ring(sock, &tx_ring);
+
+ stats[cpu].tx_packets = tx_packets;
+ stats[cpu].tx_bytes = tx_bytes;
+ stats[cpu].tv_sec = diff.tv_sec;
+ stats[cpu].tv_usec = diff.tv_usec;
+
+ stats[cpu].state |= CPU_STATS_STATE_RES;
+}
+
+static inline void __set_state(int cpu, sig_atomic_t s)
+{
+ stats[cpu].state = s;
+}
+
+static inline sig_atomic_t __get_state(int cpu)
+{
+ return stats[cpu].state;
+}
+
+static unsigned long __wait_and_sum_others(struct ctx *ctx, int cpu)
+{
+ int i;
+ unsigned long total;
+
+ for (i = 0, total = plen; i < ctx->cpus; i++) {
+ if (i == cpu)
+ continue;
+
+ while ((__get_state(i) & CPU_STATS_STATE_CFG) == 0 &&
+ sigint == 0)
+ sched_yield();
+
+ total += stats[i].cf_packets;
+ }
+
+ return total;
+}
+
+static void __correct_global_delta(struct ctx *ctx, int cpu, unsigned long orig)
+{
+ int i, cpu_sel;
+ unsigned long total;
+ long long delta_correction = 0;
+
+ for (i = 0, total = ctx->num; i < ctx->cpus; i++) {
+ if (i == cpu)
+ continue;
+
+ while ((__get_state(i) & CPU_STATS_STATE_CHK) == 0 &&
+ sigint == 0)
+ sched_yield();
+
+ total += stats[i].cd_packets;
+ }
+
+ if (total > orig)
+ delta_correction = -1 * ((long long) total - orig);
+ if (total < orig)
+ delta_correction = +1 * ((long long) orig - total);
+
+ for (cpu_sel = -1, i = 0; i < ctx->cpus; i++) {
+ if (stats[i].cd_packets > 0) {
+ if ((long long) stats[i].cd_packets +
+ delta_correction > 0) {
+ cpu_sel = i;
+ break;
+ }
+ }
+ }
+
+ if (cpu == cpu_sel)
+ ctx->num += delta_correction;
+}
+
+static void __set_state_cf(int cpu, unsigned long p, unsigned long b,
+ sig_atomic_t s)
+{
+ stats[cpu].cf_packets = p;
+ stats[cpu].cf_bytes = b;
+ stats[cpu].state = s;
+}
+
+static void __set_state_cd(int cpu, unsigned long p, sig_atomic_t s)
+{
+ stats[cpu].cd_packets = p;
+ stats[cpu].state = s;
+}
+
+static int xmit_packet_precheck(struct ctx *ctx, int cpu)
+{
+ int i;
+ unsigned long plen_total, orig = ctx->num;
+ size_t mtu, total_len = 0;
+
+ bug_on(plen != dlen);
+
+ for (i = 0; i < plen; ++i)
+ total_len += packets[i].len;
+
+ __set_state_cf(cpu, plen, total_len, CPU_STATS_STATE_CFG);
+ plen_total = __wait_and_sum_others(ctx, cpu);
+
+ if (orig > 0) {
+ ctx->num = (unsigned long) nearbyint((1.0 * plen / plen_total) * orig);
+
+ __set_state_cd(cpu, ctx->num, CPU_STATS_STATE_CHK |
+ CPU_STATS_STATE_CFG);
+ __correct_global_delta(ctx, cpu, orig);
+ }
+
+ if (plen == 0) {
+ __set_state(cpu, CPU_STATS_STATE_RES);
+ return -1;
+ }
+
+ for (mtu = device_mtu(ctx->device), i = 0; i < plen; ++i) {
+ if (packets[i].len > mtu + 14)
+ panic("Device MTU < than packet%d's size!\n", i);
+ if (packets[i].len <= 14)
+ panic("Packet%d's size too short!\n", i);
+ }
+
+ return 0;
+}
+
+static void main_loop(struct ctx *ctx, char *confname, bool slow,
+ int cpu, bool invoke_cpp)
+{
+ compile_packets(confname, ctx->verbose, cpu, invoke_cpp);
+ if (xmit_packet_precheck(ctx, cpu) < 0)
+ return;
+
+ if (cpu == 0) {
+ int i;
+ size_t total_len = 0, total_pkts = 0;
+
+ for (i = 0; i < ctx->cpus; ++i) {
+ total_len += stats[i].cf_bytes;
+ total_pkts += stats[i].cf_packets;
+ }
+
+ printf("%6zu packets to schedule\n", total_pkts);
+ printf("%6zu bytes in total\n", total_len);
+ printf("Running! Hang up with ^C!\n\n");
+ fflush(stdout);
+ }
+
+ sock = pf_socket();
+
+ if (slow)
+ xmit_slowpath_or_die(ctx, cpu);
+ else
+ xmit_fastpath_or_die(ctx, cpu);
+
+ close(sock);
+
+ cleanup_packets();
+}
+
+static unsigned int generate_srand_seed(void)
+{
+ int fd;
+ unsigned int seed;
+
+ fd = open("/dev/urandom", O_RDONLY);
+ if (fd < 0)
+ return time(0);
+
+ read_or_die(fd, &seed, sizeof(seed));
+
+ close(fd);
+ return seed;
+}
+
+int main(int argc, char **argv)
+{
+ bool slow = false, invoke_cpp = false, reseed = true;
+ int c, opt_index, i, j, vals[4] = {0}, irq;
+ char *confname = NULL, *ptr;
+ unsigned long cpus_tmp;
+ unsigned long long tx_packets, tx_bytes;
+ struct ctx ctx;
+
+ fmemset(&ctx, 0, sizeof(ctx));
+ ctx.cpus = get_number_cpus_online();
+ ctx.uid = getuid();
+ ctx.gid = getgid();
+
+ while ((c = getopt_long(argc, argv, short_options, long_options,
+ &opt_index)) != EOF) {
+ switch (c) {
+ case 'h':
+ help();
+ break;
+ case 'v':
+ version();
+ break;
+ case 'e':
+ example();
+ break;
+ case 'p':
+ invoke_cpp = true;
+ break;
+ case 'V':
+ ctx.verbose = true;
+ break;
+ case 'P':
+ cpus_tmp = strtoul(optarg, NULL, 0);
+ if (cpus_tmp > 0 && cpus_tmp < ctx.cpus)
+ ctx.cpus = cpus_tmp;
+ break;
+ case 'd':
+ case 'o':
+ ctx.device = xstrndup(optarg, IFNAMSIZ);
+ break;
+ case 'r':
+ ctx.rand = true;
+ break;
+ case 's':
+ slow = true;
+ ctx.cpus = 1;
+ ctx.smoke_test = true;
+ ctx.rhost = xstrdup(optarg);
+ break;
+ case 'R':
+ ctx.rfraw = true;
+ break;
+ case 'J':
+ ctx.jumbo_support = true;
+ break;
+ case 'c':
+ case 'i':
+ confname = xstrdup(optarg);
+ if (!strncmp("-", confname, strlen("-")))
+ ctx.cpus = 1;
+ break;
+ case 'u':
+ ctx.uid = strtoul(optarg, NULL, 0);
+ ctx.enforce = true;
+ break;
+ case 'g':
+ ctx.gid = strtoul(optarg, NULL, 0);
+ ctx.enforce = true;
+ break;
+ case 'k':
+ ctx.kpull = strtoul(optarg, NULL, 0);
+ break;
+ case 'E':
+ seed = strtoul(optarg, NULL, 0);
+ reseed = false;
+ break;
+ case 'n':
+ ctx.num = strtoul(optarg, NULL, 0);
+ break;
+ case 't':
+ slow = true;
+ ctx.gap = strtoul(optarg, NULL, 0);
+ if (ctx.gap > 0)
+ /* Fall back to single core to not
+ * mess up correct timing. We are slow
+ * anyway!
+ */
+ ctx.cpus = 1;
+ break;
+ case 'S':
+ ptr = optarg;
+ ctx.reserve_size = 0;
+
+ for (j = i = strlen(optarg); i > 0; --i) {
+ if (!isdigit(optarg[j - i]))
+ break;
+ ptr++;
+ }
+
+ if (!strncmp(ptr, "KiB", strlen("KiB")))
+ ctx.reserve_size = 1 << 10;
+ else if (!strncmp(ptr, "MiB", strlen("MiB")))
+ ctx.reserve_size = 1 << 20;
+ else if (!strncmp(ptr, "GiB", strlen("GiB")))
+ ctx.reserve_size = 1 << 30;
+ else
+ panic("Syntax error in ring size param!\n");
+ *ptr = 0;
+
+ ctx.reserve_size *= strtol(optarg, NULL, 0);
+ break;
+ case '?':
+ switch (optopt) {
+ case 'd':
+ case 'c':
+ case 'n':
+ case 'S':
+ case 's':
+ case 'P':
+ case 'o':
+ case 'E':
+ case 'i':
+ case 'k':
+ case 'u':
+ case 'g':
+ case 't':
+ panic("Option -%c requires an argument!\n",
+ optopt);
+ default:
+ if (isprint(optopt))
+ printf("Unknown option character `0x%X\'!\n", optopt);
+ die();
+ }
+ default:
+ break;
+ }
+ }
+
+ if (argc < 5)
+ help();
+ if (ctx.device == NULL)
+ panic("No networking device given!\n");
+ if (confname == NULL)
+ panic("No configuration file given!\n");
+ if (device_mtu(ctx.device) == 0)
+ panic("This is no networking device!\n");
+ if (!ctx.rfraw && device_up_and_running(ctx.device) == 0)
+ panic("Networking device not running!\n");
+
+ register_signal(SIGINT, signal_handler);
+ register_signal(SIGHUP, signal_handler);
+ register_signal_f(SIGALRM, timer_elapsed, SA_SIGINFO);
+
+ set_system_socket_memory(vals, array_size(vals));
+ xlockme();
+
+ if (ctx.rfraw) {
+ ctx.device_trans = xstrdup(ctx.device);
+ xfree(ctx.device);
+
+ enter_rfmon_mac80211(ctx.device_trans, &ctx.device);
+ sleep(0);
+ }
+
+ irq = device_irq_number(ctx.device);
+ device_set_irq_affinity_list(irq, 0, ctx.cpus - 1);
+
+ if (ctx.num > 0 && ctx.num <= ctx.cpus)
+ ctx.cpus = 1;
+
+ stats = setup_shared_var(ctx.cpus);
+
+ for (i = 0; i < ctx.cpus; i++) {
+ pid_t pid = fork();
+
+ switch (pid) {
+ case 0:
+ if (reseed)
+ seed = generate_srand_seed();
+ srand(seed);
+
+ cpu_affinity(i);
+ main_loop(&ctx, confname, slow, i, invoke_cpp);
+
+ goto thread_out;
+ case -1:
+ panic("Cannot fork processes!\n");
+ }
+ }
+
+ for (i = 0; i < ctx.cpus; i++) {
+ int status;
+
+ wait(&status);
+ if (WEXITSTATUS(status) == EXIT_FAILURE)
+ die();
+ }
+
+ if (ctx.rfraw)
+ leave_rfmon_mac80211(ctx.device_trans, ctx.device);
+
+ reset_system_socket_memory(vals, array_size(vals));
+
+ for (i = 0, tx_packets = tx_bytes = 0; i < ctx.cpus; i++) {
+ while ((__get_state(i) & CPU_STATS_STATE_RES) == 0)
+ sched_yield();
+
+ tx_packets += stats[i].tx_packets;
+ tx_bytes += stats[i].tx_bytes;
+ }
+
+ fflush(stdout);
+ printf("\n");
+ printf("\r%12llu packets outgoing\n", tx_packets);
+ printf("\r%12llu bytes outgoing\n", tx_bytes);
+ for (i = 0; i < ctx.cpus; i++) {
+ printf("\r%12lu sec, %lu usec on CPU%d (%llu packets)\n",
+ stats[i].tv_sec, stats[i].tv_usec, i,
+ stats[i].tx_packets);
+ }
+
+thread_out:
+ xunlockme();
+ destroy_shared_var(stats, ctx.cpus);
+
+ free(ctx.device);
+ free(ctx.device_trans);
+ free(ctx.rhost);
+ free(confname);
+
+ return 0;
+}