/* * netsniff-ng - the packet sniffing beast * Copyright 2011 - 2013 Daniel Borkmann , * Swiss federal institute of technology (ETH Zurich) * Subject to the GPL, version 2. */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include "xmalloc.h" #include "die.h" #include "str.h" #include "lockme.h" #include "mac80211.h" #include "xutils.h" #include "xio.h" #include "irq.h" #include "built_in.h" #include "trafgen_conf.h" #include "tprintf.h" #include "ring_tx.h" #include "csum.h" struct ctx { bool rand, rfraw, jumbo_support, verbose, smoke_test, enforce; unsigned long kpull, num, gap, reserve_size, cpus; uid_t uid; gid_t gid; char *device, *device_trans, *rhost; struct sockaddr_in dest; }; struct cpu_stats { unsigned long tv_sec, tv_usec; unsigned long long tx_packets, tx_bytes; unsigned long long cf_packets, cf_bytes; unsigned long long cd_packets; sig_atomic_t state; }; sig_atomic_t sigint = 0; struct packet *packets = NULL; size_t plen = 0; struct packet_dyn *packet_dyn = NULL; size_t dlen = 0; static const char *short_options = "d:c:n:t:vJhS:rk:i:o:VRs:P:eE:pu:g:"; static const struct option long_options[] = { {"dev", required_argument, NULL, 'd'}, {"out", required_argument, NULL, 'o'}, {"in", required_argument, NULL, 'i'}, {"conf", required_argument, NULL, 'c'}, {"num", required_argument, NULL, 'n'}, {"gap", required_argument, NULL, 't'}, {"cpus", required_argument, NULL, 'P'}, {"ring-size", required_argument, NULL, 'S'}, {"kernel-pull", required_argument, NULL, 'k'}, {"smoke-test", required_argument, NULL, 's'}, {"seed", required_argument, NULL, 'E'}, {"user", required_argument, NULL, 'u'}, {"group", required_argument, NULL, 'g'}, {"jumbo-support", no_argument, NULL, 'J'}, {"cpp", no_argument, NULL, 'p'}, {"rfraw", no_argument, NULL, 'R'}, {"rand", no_argument, NULL, 'r'}, {"verbose", no_argument, NULL, 'V'}, {"version", no_argument, NULL, 'v'}, {"example", no_argument, NULL, 'e'}, {"help", no_argument, NULL, 'h'}, {NULL, 0, NULL, 0} }; static int sock; static struct itimerval itimer; static unsigned long interval = TX_KERNEL_PULL_INT; static struct cpu_stats *stats; unsigned int seed; #define CPU_STATS_STATE_CFG 1 #define CPU_STATS_STATE_CHK 2 #define CPU_STATS_STATE_RES 4 #ifndef ICMP_FILTER # define ICMP_FILTER 1 struct icmp_filter { __u32 data; }; #endif static void signal_handler(int number) { switch (number) { case SIGINT: sigint = 1; case SIGHUP: default: break; } } static void timer_elapsed(int number) { int ret = pull_and_flush_tx_ring(sock); if (unlikely(ret < 0)) { /* We could hit EBADF if the socket has been closed before * the timer was triggered. */ if (errno != EBADF && errno != ENOBUFS) panic("Flushing TX_RING failed: %s!\n", strerror(errno)); } set_itimer_interval_value(&itimer, 0, interval); setitimer(ITIMER_REAL, &itimer, NULL); } static void timer_purge(void) { int ret; ret = pull_and_flush_tx_ring_wait(sock); if (unlikely(ret < 0)) { /* We could hit EBADF if the socket has been closed before * the timer was triggered. */ if (errno != EBADF && errno != ENOBUFS) panic("Flushing TX_RING failed: %s!\n", strerror(errno)); } set_itimer_interval_value(&itimer, 0, 0); setitimer(ITIMER_REAL, &itimer, NULL); } static void __noreturn help(void) { printf("\ntrafgen %s, multithreaded zero-copy network packet generator\n", VERSION_STRING); puts("http://www.netsniff-ng.org\n\n" "Usage: trafgen [options]\n" "Options:\n" " -i|-c|--in|--conf Packet configuration file/stdin\n" " -o|-d|--out|--dev Networking device i.e., eth0\n" " -p|--cpp Run packet config through C preprocessor\n" " -J|--jumbo-support Support 64KB super jumbo frames (def: 2048B)\n" " -R|--rfraw Inject raw 802.11 frames\n" " -s|--smoke-test Probe if machine survived fuzz-tested packet\n" " -n|--num Number of packets until exit (def: 0)\n" " -r|--rand Randomize packet selection (def: round robin)\n" " -P|--cpus Specify number of forks(<= CPUs) (def: #CPUs)\n" " -t|--gap Interpacket gap in us (approx)\n" " -S|--ring-size Manually set mmap size (KiB/MiB/GiB)\n" " -k|--kernel-pull Kernel batch interval in us (def: 10us)\n" " -E|--seed Manually set srand(3) seed\n" " -u|--user Drop privileges and change to userid\n" " -g|--group Drop privileges and change to groupid\n" " -V|--verbose Be more verbose\n" " -v|--version Show version and exit\n" " -e|--example Show built-in packet config example\n" " -h|--help Guess what?!\n\n" "Examples:\n" " See trafgen.txf for configuration file examples.\n" " trafgen --dev eth0 --conf trafgen.cfg\n" " trafgen -e | trafgen -i - -o eth0 --cpp -n 1\n" " trafgen --dev eth0 --conf fuzzing.cfg --smoke-test 10.0.0.1\n" " trafgen --dev wlan0 --rfraw --conf beacon-test.txf -V --cpus 2\n" " trafgen --dev eth0 --conf frag_dos.cfg --rand --gap 1000\n" " trafgen --dev eth0 --conf icmp.cfg --rand --num 1400000 -k1000\n" " trafgen --dev eth0 --conf tcp_syn.cfg -u `id -u bob` -g `id -g bob`\n\n" "Arbitrary packet config examples (e.g. trafgen -e > trafgen.cfg):\n" " Run packet on all CPUs: { fill(0xff, 64) csum16(0, 64) }\n" " Run packet only on CPU1: cpu(1): { rnd(64), 0b11001100, 0xaa }\n" " Run packet only on CPU1-2: cpu(1-2): { drnd(64),'a',csum16(1, 8),'b',42 }\n\n" "Note:\n" " Smoke/fuzz test example: machine A, 10.0.0.2 (trafgen) is directly\n" " connected to machine B (test kernel), 10.0.0.1. If ICMP reply fails\n" " we assume the kernel crashed, thus we print the packet and quit.\n" " In case you find a ping-of-death, please mention trafgen in your\n" " commit message of the fix!\n\n" " For introducing bit errors, delays with random variation and more,\n" " make use of tc(8) with its different disciplines, i.e. netem.\n\n" " For generating different package distributions, you can use scripting\n" " to generate a trafgen config file with packet ratios as:\n\n" " IMIX 64:7, 570:4, 1518:1\n" " Tolly 64:55, 78:5, 576:17, 1518:23\n" " Cisco 64:7, 594:4, 1518:1\n" " RPR Trimodal 64:60, 512:20, 1518:20\n" " RPR Quadrimodal 64:50, 512:15, 1518:15, 9218:20\n\n" "Please report bugs to \n" "Copyright (C) 2011-2013 Daniel Borkmann ,\n" "Swiss federal institute of technology (ETH Zurich)\n" "License: GNU GPL version 2.0\n" "This is free software: you are free to change and redistribute it.\n" "There is NO WARRANTY, to the extent permitted by law.\n"); die(); } static void __noreturn example(void) { const char *e = "/* Note: dynamic elements make trafgen slower! */\n" "#include \n\n" "{\n" " /* MAC Destination */\n" " fill(0xff, ETH_ALEN),\n" " /* MAC Source */\n" " 0x00, 0x02, 0xb3, drnd(3),\n" " /* IPv4 Protocol */\n" " c16(ETH_P_IP),\n" " /* IPv4 Version, IHL, TOS */\n" " 0b01000101, 0,\n" " /* IPv4 Total Len */\n" " c16(58),\n" " /* IPv4 Ident */\n" " drnd(2),\n" " /* IPv4 Flags, Frag Off */\n" " 0b01000000, 0,\n" " /* IPv4 TTL */\n" " 64,\n" " /* Proto TCP */\n" " 0x06,\n" " /* IPv4 Checksum (IP header from, to) */\n" " csumip(14, 33),\n" " /* Source IP */\n" " drnd(4),\n" " /* Dest IP */\n" " drnd(4),\n" " /* TCP Source Port */\n" " drnd(2),\n" " /* TCP Dest Port */\n" " c16(80),\n" " /* TCP Sequence Number */\n" " drnd(4),\n" " /* TCP Ackn. Number */\n" " c32(0),\n" " /* TCP Header length + TCP SYN/ECN Flag */\n" " c16((8 << 12) | TCP_FLAG_SYN | TCP_FLAG_ECE)\n" " /* Window Size */\n" " c16(16),\n" " /* TCP Checksum (offset IP, offset TCP) */\n" " csumtcp(14, 34),\n" " /* TCP Options */\n" " 0x00, 0x00, 0x01, 0x01, 0x08, 0x0a, 0x06,\n" " 0x91, 0x68, 0x7d, 0x06, 0x91, 0x68, 0x6f,\n" " /* Data blob */\n" " \"gotcha!\",\n" "}"; puts(e); die(); } static void __noreturn version(void) { printf("\ntrafgen %s, multithreaded zero-copy network packet generator\n", VERSION_LONG); puts("http://www.netsniff-ng.org\n\n" "Please report bugs to \n" "Copyright (C) 2011-2013 Daniel Borkmann ,\n" "Swiss federal institute of technology (ETH Zurich)\n" "License: GNU GPL version 2.0\n" "This is free software: you are free to change and redistribute it.\n" "There is NO WARRANTY, to the extent permitted by law.\n"); die(); } static void apply_counter(int counter_id) { int j, i = counter_id; size_t counter_max = packet_dyn[i].clen; for (j = 0; j < counter_max; ++j) { uint8_t val; struct counter *counter = &packet_dyn[i].cnt[j]; val = counter->val - counter->min; switch (counter->type) { case TYPE_INC: val = (val + counter->inc) % (counter->max - counter->min + 1); break; case TYPE_DEC: val = (val - counter->inc) % (counter->min - counter->max + 1); break; default: bug(); } counter->val = val + counter->min; packets[i].payload[counter->off] = val; } } static void apply_randomizer(int rand_id) { int j, i = rand_id; size_t rand_max = packet_dyn[i].rlen; for (j = 0; j < rand_max; ++j) { uint8_t val = (uint8_t) rand(); struct randomizer *randomizer = &packet_dyn[i].rnd[j]; packets[i].payload[randomizer->off] = val; } } static void apply_csum16(int csum_id) { int j, i = csum_id; size_t csum_max = packet_dyn[i].slen; for (j = 0; j < csum_max; ++j) { uint16_t sum = 0; struct csum16 *csum = &packet_dyn[i].csum[j]; fmemset(&packets[i].payload[csum->off], 0, sizeof(sum)); switch (csum->which) { case CSUM_IP: if (csum->to >= packets[i].len) csum->to = packets[i].len - 1; sum = calc_csum(packets[i].payload + csum->from, csum->to - csum->from + 1, 0); break; case CSUM_UDP: sum = p4_csum((void *) packets[i].payload + csum->from, packets[i].payload + csum->to, (packets[i].len - csum->to), IPPROTO_UDP); break; case CSUM_TCP: sum = p4_csum((void *) packets[i].payload + csum->from, packets[i].payload + csum->to, (packets[i].len - csum->to), IPPROTO_TCP); break; } fmemcpy(&packets[i].payload[csum->off], &sum, sizeof(sum)); } } static struct cpu_stats *setup_shared_var(unsigned long cpus) { int fd; char zbuff[cpus * sizeof(struct cpu_stats)], file[256]; struct cpu_stats *buff; fmemset(zbuff, 0, sizeof(zbuff)); slprintf(file, sizeof(file), ".tmp_mmap.%u", (unsigned int) rand()); fd = creat(file, S_IRUSR | S_IWUSR); bug_on(fd < 0); close(fd); fd = open_or_die_m(file, O_RDWR | O_CREAT | O_TRUNC, S_IRUSR | S_IWUSR); write_or_die(fd, zbuff, sizeof(zbuff)); buff = (void *) mmap(0, sizeof(zbuff), PROT_READ | PROT_WRITE, MAP_SHARED, fd, 0); if (buff == (void *) -1) panic("Cannot setup shared variable!\n"); close(fd); unlink(file); memset(buff, 0, sizeof(zbuff)); return buff; } static void destroy_shared_var(void *buff, unsigned long cpus) { munmap(buff, cpus * sizeof(struct cpu_stats)); } static void dump_trafgen_snippet(uint8_t *payload, size_t len) { int i; printf("{"); for (i = 0; i < len; ++i) { if (i % 15 == 0) printf("\n "); printf("0x%02x, ", payload[i]); } printf("\n}\n"); fflush(stdout); } static int xmit_smoke_setup(struct ctx *ctx) { int icmp_sock, ret, ttl = 64; struct icmp_filter filter; icmp_sock = socket(AF_INET, SOCK_RAW, IPPROTO_ICMP); if (icmp_sock < 0) panic("Cannot get a ICMP socket: %s!\n", strerror(errno)); filter.data = ~(1 << ICMP_ECHOREPLY); ret = setsockopt(icmp_sock, SOL_RAW, ICMP_FILTER, &filter, sizeof(filter)); if (ret < 0) panic("Cannot install filter!\n"); ret = setsockopt(icmp_sock, SOL_IP, IP_TTL, &ttl, sizeof(ttl)); if (ret < 0) panic("Cannot set TTL!\n"); memset(&ctx->dest, 0, sizeof(ctx->dest)); ctx->dest.sin_family = AF_INET; ctx->dest.sin_port = 0; ret = inet_aton(ctx->rhost, &ctx->dest.sin_addr); if (ret < 0) panic("Cannot resolv address!\n"); return icmp_sock; } static int xmit_smoke_probe(int icmp_sock, struct ctx *ctx) { int ret, i, j = 0, probes = 100; short ident, cnt = 1, idstore[probes]; uint8_t outpack[512], *data; struct icmphdr *icmp; struct iphdr *ip; size_t len = sizeof(*icmp) + 56; struct sockaddr_in from; socklen_t from_len; struct pollfd fds = { .fd = icmp_sock, .events = POLLIN, }; fmemset(idstore, 0, sizeof(idstore)); while (probes-- > 0) { while ((ident = htons((short) rand())) == 0) sleep(0); idstore[j++] = ident; memset(outpack, 0, sizeof(outpack)); icmp = (void *) outpack; icmp->type = ICMP_ECHO; icmp->un.echo.id = ident; icmp->un.echo.sequence = htons(cnt++); data = ((uint8_t *) outpack + sizeof(*icmp)); for (i = 0; i < 56; ++i) data[i] = (uint8_t) rand(); icmp->checksum = csum((unsigned short *) outpack, len / sizeof(unsigned short)); ret = sendto(icmp_sock, outpack, len, MSG_DONTWAIT, (struct sockaddr *) &ctx->dest, sizeof(ctx->dest)); if (unlikely(ret != len)) panic("Cannot send out probe: %s!\n", strerror(errno)); ret = poll(&fds, 1, 50); if (ret < 0) panic("Poll failed!\n"); if (fds.revents & POLLIN) { ret = recvfrom(icmp_sock, outpack, sizeof(outpack), 0, (struct sockaddr *) &from, &from_len); if (unlikely(ret <= 0)) panic("Probe receive failed!\n"); if (unlikely(from_len != sizeof(ctx->dest))) continue; if (unlikely(memcmp(&from, &ctx->dest, sizeof(ctx->dest)))) continue; if (unlikely(ret < sizeof(*ip) + sizeof(*icmp))) continue; ip = (void *) outpack; if (unlikely(ip->ihl * 4 + sizeof(*icmp) > ret)) continue; icmp = (void *) outpack + ip->ihl * 4; for (i = 0; i < array_size(idstore); ++i) { if (unlikely(icmp->un.echo.id != idstore[i])) continue; return 0; } } } return -1; } static void xmit_slowpath_or_die(struct ctx *ctx, int cpu, unsigned long orig_num) { int ret, icmp_sock = -1; unsigned long num = 1, i = 0; struct timeval start, end, diff; unsigned long long tx_bytes = 0, tx_packets = 0; struct packet_dyn *pktd; struct sockaddr_ll saddr = { .sll_family = PF_PACKET, .sll_halen = ETH_ALEN, .sll_ifindex = device_ifindex(ctx->device), }; if (ctx->num > 0) num = ctx->num; if (ctx->num == 0 && orig_num > 0) num = 0; if (ctx->smoke_test) icmp_sock = xmit_smoke_setup(ctx); drop_privileges(ctx->enforce, ctx->uid, ctx->gid); bug_on(gettimeofday(&start, NULL)); while (likely(sigint == 0) && likely(num > 0) && likely(plen > 0)) { pktd = &packet_dyn[i]; if (pktd->clen + pktd->rlen + pktd->slen) { apply_counter(i); apply_randomizer(i); apply_csum16(i); } retry: ret = sendto(sock, packets[i].payload, packets[i].len, 0, (struct sockaddr *) &saddr, sizeof(saddr)); if (unlikely(ret < 0)) { if (errno == ENOBUFS) { sched_yield(); goto retry; } panic("Sendto error: %s!\n", strerror(errno)); } tx_bytes += packets[i].len; tx_packets++; if (ctx->smoke_test) { ret = xmit_smoke_probe(icmp_sock, ctx); if (unlikely(ret < 0)) { printf("%sSmoke test alert:%s\n", colorize_start(bold), colorize_end()); printf(" Remote host seems to be unresponsive to ICMP probes!\n"); printf(" Last instance was packet%lu, seed:%u, trafgen snippet:\n\n", i, seed); dump_trafgen_snippet(packets[i].payload, packets[i].len); break; } } if (!ctx->rand) { i++; if (i >= plen) i = 0; } else i = rand() % plen; if (ctx->num > 0) num--; if (ctx->gap > 0) usleep(ctx->gap); } bug_on(gettimeofday(&end, NULL)); timersub(&end, &start, &diff); if (ctx->smoke_test) close(icmp_sock); stats[cpu].tx_packets = tx_packets; stats[cpu].tx_bytes = tx_bytes; stats[cpu].tv_sec = diff.tv_sec; stats[cpu].tv_usec = diff.tv_usec; stats[cpu].state |= CPU_STATS_STATE_RES; } static void xmit_fastpath_or_die(struct ctx *ctx, int cpu, unsigned long orig_num) { int ifindex = device_ifindex(ctx->device); uint8_t *out = NULL; unsigned int it = 0; unsigned long num = 1, i = 0, size; struct ring tx_ring; struct frame_map *hdr; struct timeval start, end, diff; struct packet_dyn *pktd; unsigned long long tx_bytes = 0, tx_packets = 0; fmemset(&tx_ring, 0, sizeof(tx_ring)); size = ring_size(ctx->device, ctx->reserve_size); set_sock_prio(sock, 512); set_packet_loss_discard(sock); setup_tx_ring_layout(sock, &tx_ring, size, ctx->jumbo_support); create_tx_ring(sock, &tx_ring, ctx->verbose); mmap_tx_ring(sock, &tx_ring); alloc_tx_ring_frames(sock, &tx_ring); bind_tx_ring(sock, &tx_ring, ifindex); drop_privileges(ctx->enforce, ctx->uid, ctx->gid); if (ctx->kpull) interval = ctx->kpull; if (ctx->num > 0) num = ctx->num; if (ctx->num == 0 && orig_num > 0) num = 0; set_itimer_interval_value(&itimer, 0, interval); setitimer(ITIMER_REAL, &itimer, NULL); bug_on(gettimeofday(&start, NULL)); while (likely(sigint == 0) && likely(num > 0) && likely(plen > 0)) { while (user_may_pull_from_tx(tx_ring.frames[it].iov_base) && likely(num > 0)) { hdr = tx_ring.frames[it].iov_base; out = ((uint8_t *) hdr) + TPACKET2_HDRLEN - sizeof(struct sockaddr_ll); hdr->tp_h.tp_snaplen = packets[i].len; hdr->tp_h.tp_len = packets[i].len; pktd = &packet_dyn[i]; if (pktd->clen + pktd->rlen + pktd->slen) { apply_counter(i); apply_randomizer(i); apply_csum16(i); } fmemcpy(out, packets[i].payload, packets[i].len); tx_bytes += packets[i].len; tx_packets++; if (!ctx->rand) { i++; if (i >= plen) i = 0; } else i = rand() % plen; kernel_may_pull_from_tx(&hdr->tp_h); it++; if (it >= tx_ring.layout.tp_frame_nr) it = 0; if (ctx->num > 0) num--; if (unlikely(sigint == 1)) break; } } bug_on(gettimeofday(&end, NULL)); timersub(&end, &start, &diff); timer_purge(); destroy_tx_ring(sock, &tx_ring); stats[cpu].tx_packets = tx_packets; stats[cpu].tx_bytes = tx_bytes; stats[cpu].tv_sec = diff.tv_sec; stats[cpu].tv_usec = diff.tv_usec; stats[cpu].state |= CPU_STATS_STATE_RES; } static inline void __set_state(int cpu, sig_atomic_t s) { stats[cpu].state = s; } static inline sig_atomic_t __get_state(int cpu) { return stats[cpu].state; } static unsigned long __wait_and_sum_others(struct ctx *ctx, int cpu) { int i; unsigned long total; for (i = 0, total = plen; i < ctx->cpus; i++) { if (i == cpu) continue; while ((__get_state(i) & (CPU_STATS_STATE_CFG | CPU_STATS_STATE_RES)) == 0 && sigint == 0) sched_yield(); total += stats[i].cf_packets; } return total; } static void __correct_global_delta(struct ctx *ctx, int cpu, unsigned long orig) { int i, cpu_sel; unsigned long total; long long delta_correction = 0; for (i = 0, total = ctx->num; i < ctx->cpus; i++) { if (i == cpu) continue; while ((__get_state(i) & (CPU_STATS_STATE_CHK | CPU_STATS_STATE_RES)) == 0 && sigint == 0) sched_yield(); total += stats[i].cd_packets; } if (total > orig) delta_correction = -1 * ((long long) total - orig); if (total < orig) delta_correction = +1 * ((long long) orig - total); for (cpu_sel = -1, i = 0; i < ctx->cpus; i++) { if (stats[i].cd_packets > 0) { if ((long long) stats[i].cd_packets + delta_correction > 0) { cpu_sel = i; break; } } } if (cpu == cpu_sel) ctx->num += delta_correction; } static void __set_state_cf(int cpu, unsigned long p, unsigned long b, sig_atomic_t s) { stats[cpu].cf_packets = p; stats[cpu].cf_bytes = b; stats[cpu].state = s; } static void __set_state_cd(int cpu, unsigned long p, sig_atomic_t s) { stats[cpu].cd_packets = p; stats[cpu].state = s; } static int xmit_packet_precheck(struct ctx *ctx, int cpu) { int i; unsigned long plen_total, orig = ctx->num; size_t mtu, total_len = 0; bug_on(plen != dlen); for (i = 0; i < plen; ++i) total_len += packets[i].len; __set_state_cf(cpu, plen, total_len, CPU_STATS_STATE_CFG); plen_total = __wait_and_sum_others(ctx, cpu); if (orig > 0) { ctx->num = (unsigned long) nearbyint((1.0 * plen / plen_total) * orig); __set_state_cd(cpu, ctx->num, CPU_STATS_STATE_CHK | CPU_STATS_STATE_CFG); __correct_global_delta(ctx, cpu, orig); } if (plen == 0) { __set_state(cpu, CPU_STATS_STATE_RES); return 0; } for (mtu = device_mtu(ctx->device), i = 0; i < plen; ++i) { if (packets[i].len > mtu + 14) panic("Device MTU < than packet%d's size!\n", i); if (packets[i].len <= 14) panic("Packet%d's size too short!\n", i); } return 0; } static void main_loop(struct ctx *ctx, char *confname, bool slow, int cpu, bool invoke_cpp, unsigned long orig_num) { compile_packets(confname, ctx->verbose, cpu, invoke_cpp); if (xmit_packet_precheck(ctx, cpu) < 0) return; if (cpu == 0) { int i; size_t total_len = 0, total_pkts = 0; for (i = 0; i < ctx->cpus; ++i) { total_len += stats[i].cf_bytes; total_pkts += stats[i].cf_packets; } printf("%6zu packets to schedule\n", total_pkts); printf("%6zu bytes in total\n", total_len); printf("Running! Hang up with ^C!\n\n"); fflush(stdout); } sock = pf_socket(); if (slow) xmit_slowpath_or_die(ctx, cpu, orig_num); else xmit_fastpath_or_die(ctx, cpu, orig_num); close(sock); cleanup_packets(); } static unsigned int generate_srand_seed(void) { int fd; unsigned int seed; fd = open("/dev/urandom", O_RDONLY); if (fd < 0) return time(0); read_or_die(fd, &seed, sizeof(seed)); close(fd); return seed; } int main(int argc, char **argv) { bool slow = false, invoke_cpp = false, reseed = true; int c, opt_index, i, j, vals[4] = {0}, irq; char *confname = NULL, *ptr; unsigned long cpus_tmp, orig_num = 0; unsigned long long tx_packets, tx_bytes; struct ctx ctx; fmemset(&ctx, 0, sizeof(ctx)); ctx.cpus = get_number_cpus_online(); ctx.uid = getuid(); ctx.gid = getgid(); while ((c = getopt_long(argc, argv, short_options, long_options, &opt_index)) != EOF) { switch (c) { case 'h': help(); break; case 'v': version(); break; case 'e': example(); break; case 'p': invoke_cpp = true; break; case 'V': ctx.verbose = true; break; case 'P': cpus_tmp = strtoul(optarg, NULL, 0); if (cpus_tmp > 0 && cpus_tmp < ctx.cpus) ctx.cpus = cpus_tmp; break; case 'd': case 'o': ctx.device = xstrndup(optarg, IFNAMSIZ); break; case 'r': ctx.rand = true; break; case 's': slow = true; ctx.cpus = 1; ctx.smoke_test = true; ctx.rhost = xstrdup(optarg); break; case 'R': ctx.rfraw = true; break; case 'J': ctx.jumbo_support = true; break; case 'c': case 'i': confname = xstrdup(optarg); if (!strncmp("-", confname, strlen("-"))) ctx.cpus = 1; break; case 'u': ctx.uid = strtoul(optarg, NULL, 0); ctx.enforce = true; break; case 'g': ctx.gid = strtoul(optarg, NULL, 0); ctx.enforce = true; break; case 'k': ctx.kpull = strtoul(optarg, NULL, 0); break; case 'E': seed = strtoul(optarg, NULL, 0); reseed = false; break; case 'n': orig_num = strtoul(optarg, NULL, 0); ctx.num = orig_num; break; case 't': slow = true; ctx.gap = strtoul(optarg, NULL, 0); if (ctx.gap > 0) /* Fall back to single core to not * mess up correct timing. We are slow * anyway! */ ctx.cpus = 1; break; case 'S': ptr = optarg; ctx.reserve_size = 0; for (j = i = strlen(optarg); i > 0; --i) { if (!isdigit(optarg[j - i])) break; ptr++; } if (!strncmp(ptr, "KiB", strlen("KiB"))) ctx.reserve_size = 1 << 10; else if (!strncmp(ptr, "MiB", strlen("MiB"))) ctx.reserve_size = 1 << 20; else if (!strncmp(ptr, "GiB", strlen("GiB"))) ctx.reserve_size = 1 << 30; else panic("Syntax error in ring size param!\n"); *ptr = 0; ctx.reserve_size *= strtol(optarg, NULL, 0); break; case '?': switch (optopt) { case 'd': case 'c': case 'n': case 'S': case 's': case 'P': case 'o': case 'E': case 'i': case 'k': case 'u': case 'g': case 't': panic("Option -%c requires an argument!\n", optopt); default: if (isprint(optopt)) printf("Unknown option character `0x%X\'!\n", optopt); die(); } default: break; } } if (argc < 5) help(); if (ctx.device == NULL) panic("No networking device given!\n"); if (confname == NULL) panic("No configuration file given!\n"); if (device_mtu(ctx.device) == 0) panic("This is no networking device!\n"); register_signal(SIGINT, signal_handler); register_signal(SIGHUP, signal_handler); register_signal_f(SIGALRM, timer_elapsed, SA_SIGINFO); set_system_socket_memory(vals, array_size(vals)); xlockme(); if (ctx.rfraw) { ctx.device_trans = xstrdup(ctx.device); xfree(ctx.device); enter_rfmon_mac80211(ctx.device_trans, &ctx.device); sleep(0); } irq = device_irq_number(ctx.device); device_set_irq_affinity_list(irq, 0, ctx.cpus - 1); stats = setup_shared_var(ctx.cpus); for (i = 0; i < ctx.cpus; i++) { pid_t pid = fork(); switch (pid) { case 0: if (reseed) seed = generate_srand_seed(); srand(seed); cpu_affinity(i); main_loop(&ctx, confname, slow, i, invoke_cpp, orig_num); goto thread_out; case -1: panic("Cannot fork processes!\n"); } } for (i = 0; i < ctx.cpus; i++) { int status; wait(&status); if (WEXITSTATUS(status) == EXIT_FAILURE) die(); } if (ctx.rfraw) leave_rfmon_mac80211(ctx.device_trans, ctx.device); reset_system_socket_memory(vals, array_size(vals)); for (i = 0, tx_packets = tx_bytes = 0; i < ctx.cpus; i++) { while ((__get_state(i) & CPU_STATS_STATE_RES) == 0) sched_yield(); tx_packets += stats[i].tx_packets; tx_bytes += stats[i].tx_bytes; } fflush(stdout); printf("\n"); printf("\r%12llu packets outgoing\n", tx_packets); printf("\r%12llu bytes outgoing\n", tx_bytes); for (i = 0; i < ctx.cpus; i++) { printf("\r%12lu sec, %lu usec on CPU%d (%llu packets)\n", stats[i].tv_sec, stats[i].tv_usec, i, stats[i].tx_packets); } thread_out: xunlockme(); destroy_shared_var(stats, ctx.cpus); device_restore_irq_affinity_list(); free(ctx.device); free(ctx.device_trans); free(ctx.rhost); free(confname); return 0; }