2018-04-27 00:42:25 +07:00
|
|
|
// SPDX-License-Identifier: GPL-2.0
|
|
|
|
|
|
|
|
#define _GNU_SOURCE
|
|
|
|
|
|
|
|
#include <arpa/inet.h>
|
|
|
|
#include <error.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <limits.h>
|
|
|
|
#include <linux/errqueue.h>
|
|
|
|
#include <linux/if_packet.h>
|
|
|
|
#include <linux/socket.h>
|
|
|
|
#include <linux/sockios.h>
|
|
|
|
#include <net/ethernet.h>
|
|
|
|
#include <net/if.h>
|
|
|
|
#include <netinet/ip.h>
|
|
|
|
#include <netinet/ip6.h>
|
|
|
|
#include <netinet/tcp.h>
|
|
|
|
#include <netinet/udp.h>
|
|
|
|
#include <poll.h>
|
|
|
|
#include <sched.h>
|
|
|
|
#include <stdbool.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdint.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <sys/ioctl.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <sys/time.h>
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/wait.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
|
2018-11-07 18:38:34 +07:00
|
|
|
#ifndef UDP_GRO
|
|
|
|
#define UDP_GRO 104
|
|
|
|
#endif
|
|
|
|
|
2018-04-27 00:42:25 +07:00
|
|
|
static int cfg_port = 8000;
|
|
|
|
static bool cfg_tcp;
|
|
|
|
static bool cfg_verify;
|
2018-11-07 18:38:34 +07:00
|
|
|
static bool cfg_read_all;
|
|
|
|
static bool cfg_gro_segment;
|
2018-11-07 18:38:37 +07:00
|
|
|
static int cfg_family = PF_INET6;
|
|
|
|
static int cfg_alen = sizeof(struct sockaddr_in6);
|
|
|
|
static int cfg_expected_pkt_nr;
|
|
|
|
static int cfg_expected_pkt_len;
|
|
|
|
static int cfg_expected_gso_size;
|
2019-02-26 21:27:43 +07:00
|
|
|
static int cfg_connect_timeout_ms;
|
|
|
|
static int cfg_rcv_timeout_ms;
|
2018-11-07 18:38:37 +07:00
|
|
|
static struct sockaddr_storage cfg_bind_addr;
|
2018-04-27 00:42:25 +07:00
|
|
|
|
|
|
|
static bool interrupted;
|
|
|
|
static unsigned long packets, bytes;
|
|
|
|
|
|
|
|
static void sigint_handler(int signum)
|
|
|
|
{
|
|
|
|
if (signum == SIGINT)
|
|
|
|
interrupted = true;
|
|
|
|
}
|
|
|
|
|
2018-11-07 18:38:37 +07:00
|
|
|
static void setup_sockaddr(int domain, const char *str_addr, void *sockaddr)
|
|
|
|
{
|
|
|
|
struct sockaddr_in6 *addr6 = (void *) sockaddr;
|
|
|
|
struct sockaddr_in *addr4 = (void *) sockaddr;
|
|
|
|
|
|
|
|
switch (domain) {
|
|
|
|
case PF_INET:
|
|
|
|
addr4->sin_family = AF_INET;
|
|
|
|
addr4->sin_port = htons(cfg_port);
|
|
|
|
if (inet_pton(AF_INET, str_addr, &(addr4->sin_addr)) != 1)
|
|
|
|
error(1, 0, "ipv4 parse error: %s", str_addr);
|
|
|
|
break;
|
|
|
|
case PF_INET6:
|
|
|
|
addr6->sin6_family = AF_INET6;
|
|
|
|
addr6->sin6_port = htons(cfg_port);
|
|
|
|
if (inet_pton(AF_INET6, str_addr, &(addr6->sin6_addr)) != 1)
|
|
|
|
error(1, 0, "ipv6 parse error: %s", str_addr);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
error(1, 0, "illegal domain");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-04-27 00:42:25 +07:00
|
|
|
static unsigned long gettimeofday_ms(void)
|
|
|
|
{
|
|
|
|
struct timeval tv;
|
|
|
|
|
|
|
|
gettimeofday(&tv, NULL);
|
|
|
|
return (tv.tv_sec * 1000) + (tv.tv_usec / 1000);
|
|
|
|
}
|
|
|
|
|
2019-02-26 21:27:43 +07:00
|
|
|
static void do_poll(int fd, int timeout_ms)
|
2018-04-27 00:42:25 +07:00
|
|
|
{
|
|
|
|
struct pollfd pfd;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
pfd.events = POLLIN;
|
|
|
|
pfd.revents = 0;
|
|
|
|
pfd.fd = fd;
|
|
|
|
|
|
|
|
do {
|
|
|
|
ret = poll(&pfd, 1, 10);
|
2018-11-07 18:38:34 +07:00
|
|
|
if (interrupted)
|
|
|
|
break;
|
2018-04-27 00:42:25 +07:00
|
|
|
if (ret == -1)
|
|
|
|
error(1, errno, "poll");
|
2019-02-26 21:27:43 +07:00
|
|
|
if (ret == 0) {
|
|
|
|
if (!timeout_ms)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
timeout_ms -= 10;
|
|
|
|
if (timeout_ms <= 0) {
|
|
|
|
interrupted = true;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2018-04-27 00:42:25 +07:00
|
|
|
if (pfd.revents != POLLIN)
|
|
|
|
error(1, errno, "poll: 0x%x expected 0x%x\n",
|
|
|
|
pfd.revents, POLLIN);
|
2018-11-07 18:38:34 +07:00
|
|
|
} while (!ret);
|
2018-04-27 00:42:25 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
static int do_socket(bool do_tcp)
|
|
|
|
{
|
|
|
|
int fd, val;
|
|
|
|
|
2018-11-07 18:38:37 +07:00
|
|
|
fd = socket(cfg_family, cfg_tcp ? SOCK_STREAM : SOCK_DGRAM, 0);
|
2018-04-27 00:42:25 +07:00
|
|
|
if (fd == -1)
|
|
|
|
error(1, errno, "socket");
|
|
|
|
|
|
|
|
val = 1 << 21;
|
|
|
|
if (setsockopt(fd, SOL_SOCKET, SO_RCVBUF, &val, sizeof(val)))
|
|
|
|
error(1, errno, "setsockopt rcvbuf");
|
|
|
|
val = 1;
|
|
|
|
if (setsockopt(fd, SOL_SOCKET, SO_REUSEPORT, &val, sizeof(val)))
|
|
|
|
error(1, errno, "setsockopt reuseport");
|
|
|
|
|
2018-11-07 18:38:37 +07:00
|
|
|
if (bind(fd, (void *)&cfg_bind_addr, cfg_alen))
|
2018-04-27 00:42:25 +07:00
|
|
|
error(1, errno, "bind");
|
|
|
|
|
|
|
|
if (do_tcp) {
|
|
|
|
int accept_fd = fd;
|
|
|
|
|
|
|
|
if (listen(accept_fd, 1))
|
|
|
|
error(1, errno, "listen");
|
|
|
|
|
2019-02-26 21:27:43 +07:00
|
|
|
do_poll(accept_fd, cfg_connect_timeout_ms);
|
2018-11-07 18:38:34 +07:00
|
|
|
if (interrupted)
|
|
|
|
exit(0);
|
2018-04-27 00:42:25 +07:00
|
|
|
|
|
|
|
fd = accept(accept_fd, NULL, NULL);
|
|
|
|
if (fd == -1)
|
|
|
|
error(1, errno, "accept");
|
|
|
|
if (close(accept_fd))
|
|
|
|
error(1, errno, "close accept fd");
|
|
|
|
}
|
|
|
|
|
|
|
|
return fd;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Flush all outstanding bytes for the tcp receive queue */
|
|
|
|
static void do_flush_tcp(int fd)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
while (true) {
|
|
|
|
/* MSG_TRUNC flushes up to len bytes */
|
|
|
|
ret = recv(fd, NULL, 1 << 21, MSG_TRUNC | MSG_DONTWAIT);
|
|
|
|
if (ret == -1 && errno == EAGAIN)
|
|
|
|
return;
|
|
|
|
if (ret == -1)
|
|
|
|
error(1, errno, "flush");
|
|
|
|
if (ret == 0) {
|
|
|
|
/* client detached */
|
|
|
|
exit(0);
|
|
|
|
}
|
|
|
|
|
|
|
|
packets++;
|
|
|
|
bytes += ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
static char sanitized_char(char val)
|
|
|
|
{
|
|
|
|
return (val >= 'a' && val <= 'z') ? val : '.';
|
|
|
|
}
|
|
|
|
|
|
|
|
static void do_verify_udp(const char *data, int len)
|
|
|
|
{
|
|
|
|
char cur = data[0];
|
|
|
|
int i;
|
|
|
|
|
|
|
|
/* verify contents */
|
|
|
|
if (cur < 'a' || cur > 'z')
|
|
|
|
error(1, 0, "data initial byte out of range");
|
|
|
|
|
|
|
|
for (i = 1; i < len; i++) {
|
|
|
|
if (cur == 'z')
|
|
|
|
cur = 'a';
|
|
|
|
else
|
|
|
|
cur++;
|
|
|
|
|
|
|
|
if (data[i] != cur)
|
|
|
|
error(1, 0, "data[%d]: len %d, %c(%hhu) != %c(%hhu)\n",
|
|
|
|
i, len,
|
|
|
|
sanitized_char(data[i]), data[i],
|
|
|
|
sanitized_char(cur), cur);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-11-07 18:38:37 +07:00
|
|
|
static int recv_msg(int fd, char *buf, int len, int *gso_size)
|
|
|
|
{
|
|
|
|
char control[CMSG_SPACE(sizeof(uint16_t))] = {0};
|
|
|
|
struct msghdr msg = {0};
|
|
|
|
struct iovec iov = {0};
|
|
|
|
struct cmsghdr *cmsg;
|
|
|
|
uint16_t *gsosizeptr;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
iov.iov_base = buf;
|
|
|
|
iov.iov_len = len;
|
|
|
|
|
|
|
|
msg.msg_iov = &iov;
|
|
|
|
msg.msg_iovlen = 1;
|
|
|
|
|
|
|
|
msg.msg_control = control;
|
|
|
|
msg.msg_controllen = sizeof(control);
|
|
|
|
|
|
|
|
*gso_size = -1;
|
|
|
|
ret = recvmsg(fd, &msg, MSG_TRUNC | MSG_DONTWAIT);
|
|
|
|
if (ret != -1) {
|
|
|
|
for (cmsg = CMSG_FIRSTHDR(&msg); cmsg != NULL;
|
|
|
|
cmsg = CMSG_NXTHDR(&msg, cmsg)) {
|
|
|
|
if (cmsg->cmsg_level == SOL_UDP
|
|
|
|
&& cmsg->cmsg_type == UDP_GRO) {
|
|
|
|
gsosizeptr = (uint16_t *) CMSG_DATA(cmsg);
|
|
|
|
*gso_size = *gsosizeptr;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2018-04-27 00:42:25 +07:00
|
|
|
/* Flush all outstanding datagrams. Verify first few bytes of each. */
|
|
|
|
static void do_flush_udp(int fd)
|
|
|
|
{
|
2018-11-07 18:38:34 +07:00
|
|
|
static char rbuf[ETH_MAX_MTU];
|
2018-11-07 18:38:37 +07:00
|
|
|
int ret, len, gso_size, budget = 256;
|
2018-04-27 00:42:25 +07:00
|
|
|
|
2018-11-07 18:38:34 +07:00
|
|
|
len = cfg_read_all ? sizeof(rbuf) : 0;
|
2018-04-27 00:42:25 +07:00
|
|
|
while (budget--) {
|
|
|
|
/* MSG_TRUNC will make return value full datagram length */
|
2018-11-07 18:38:37 +07:00
|
|
|
if (!cfg_expected_gso_size)
|
|
|
|
ret = recv(fd, rbuf, len, MSG_TRUNC | MSG_DONTWAIT);
|
|
|
|
else
|
|
|
|
ret = recv_msg(fd, rbuf, len, &gso_size);
|
2018-04-27 00:42:25 +07:00
|
|
|
if (ret == -1 && errno == EAGAIN)
|
2018-11-07 18:38:37 +07:00
|
|
|
break;
|
2018-04-27 00:42:25 +07:00
|
|
|
if (ret == -1)
|
|
|
|
error(1, errno, "recv");
|
2018-11-07 18:38:37 +07:00
|
|
|
if (cfg_expected_pkt_len && ret != cfg_expected_pkt_len)
|
|
|
|
error(1, 0, "recv: bad packet len, got %d,"
|
|
|
|
" expected %d\n", ret, cfg_expected_pkt_len);
|
2018-11-07 18:38:34 +07:00
|
|
|
if (len && cfg_verify) {
|
2018-04-27 00:42:25 +07:00
|
|
|
if (ret == 0)
|
|
|
|
error(1, errno, "recv: 0 byte datagram\n");
|
|
|
|
|
|
|
|
do_verify_udp(rbuf, ret);
|
|
|
|
}
|
2018-11-07 18:38:37 +07:00
|
|
|
if (cfg_expected_gso_size && cfg_expected_gso_size != gso_size)
|
|
|
|
error(1, 0, "recv: bad gso size, got %d, expected %d "
|
|
|
|
"(-1 == no gso cmsg))\n", gso_size,
|
|
|
|
cfg_expected_gso_size);
|
2018-04-27 00:42:25 +07:00
|
|
|
|
|
|
|
packets++;
|
|
|
|
bytes += ret;
|
2018-11-07 18:38:37 +07:00
|
|
|
if (cfg_expected_pkt_nr && packets >= cfg_expected_pkt_nr)
|
|
|
|
break;
|
2018-04-27 00:42:25 +07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void usage(const char *filepath)
|
|
|
|
{
|
2019-02-26 21:27:43 +07:00
|
|
|
error(1, 0, "Usage: %s [-C connect_timeout] [-Grtv] [-b addr] [-p port]"
|
|
|
|
" [-l pktlen] [-n packetnr] [-R rcv_timeout] [-S gsosize]",
|
|
|
|
filepath);
|
2018-04-27 00:42:25 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
static void parse_opts(int argc, char **argv)
|
|
|
|
{
|
|
|
|
int c;
|
|
|
|
|
2018-11-07 18:38:37 +07:00
|
|
|
/* bind to any by default */
|
|
|
|
setup_sockaddr(PF_INET6, "::", &cfg_bind_addr);
|
2019-02-26 21:27:43 +07:00
|
|
|
while ((c = getopt(argc, argv, "4b:C:Gl:n:p:rR:S:tv")) != -1) {
|
2018-04-27 00:42:25 +07:00
|
|
|
switch (c) {
|
2018-11-07 18:38:37 +07:00
|
|
|
case '4':
|
|
|
|
cfg_family = PF_INET;
|
|
|
|
cfg_alen = sizeof(struct sockaddr_in);
|
|
|
|
setup_sockaddr(PF_INET, "0.0.0.0", &cfg_bind_addr);
|
|
|
|
break;
|
|
|
|
case 'b':
|
|
|
|
setup_sockaddr(cfg_family, optarg, &cfg_bind_addr);
|
|
|
|
break;
|
2019-02-26 21:27:43 +07:00
|
|
|
case 'C':
|
|
|
|
cfg_connect_timeout_ms = strtoul(optarg, NULL, 0);
|
|
|
|
break;
|
2018-11-07 18:38:34 +07:00
|
|
|
case 'G':
|
|
|
|
cfg_gro_segment = true;
|
|
|
|
break;
|
2018-11-07 18:38:37 +07:00
|
|
|
case 'l':
|
|
|
|
cfg_expected_pkt_len = strtoul(optarg, NULL, 0);
|
|
|
|
break;
|
|
|
|
case 'n':
|
|
|
|
cfg_expected_pkt_nr = strtoul(optarg, NULL, 0);
|
|
|
|
break;
|
2018-04-27 00:42:25 +07:00
|
|
|
case 'p':
|
2018-11-07 18:38:34 +07:00
|
|
|
cfg_port = strtoul(optarg, NULL, 0);
|
|
|
|
break;
|
|
|
|
case 'r':
|
|
|
|
cfg_read_all = true;
|
2018-04-27 00:42:25 +07:00
|
|
|
break;
|
2019-02-26 21:27:43 +07:00
|
|
|
case 'R':
|
|
|
|
cfg_rcv_timeout_ms = strtoul(optarg, NULL, 0);
|
|
|
|
break;
|
2018-11-07 18:38:37 +07:00
|
|
|
case 'S':
|
|
|
|
cfg_expected_gso_size = strtol(optarg, NULL, 0);
|
|
|
|
break;
|
2018-04-27 00:42:25 +07:00
|
|
|
case 't':
|
|
|
|
cfg_tcp = true;
|
|
|
|
break;
|
|
|
|
case 'v':
|
|
|
|
cfg_verify = true;
|
2018-11-07 18:38:34 +07:00
|
|
|
cfg_read_all = true;
|
2018-04-27 00:42:25 +07:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (optind != argc)
|
|
|
|
usage(argv[0]);
|
|
|
|
|
|
|
|
if (cfg_tcp && cfg_verify)
|
|
|
|
error(1, 0, "TODO: implement verify mode for tcp");
|
|
|
|
}
|
|
|
|
|
|
|
|
static void do_recv(void)
|
|
|
|
{
|
2019-02-26 21:27:43 +07:00
|
|
|
int timeout_ms = cfg_tcp ? cfg_rcv_timeout_ms : cfg_connect_timeout_ms;
|
2018-04-27 00:42:25 +07:00
|
|
|
unsigned long tnow, treport;
|
2019-02-26 21:27:43 +07:00
|
|
|
int fd;
|
2018-04-27 00:42:25 +07:00
|
|
|
|
|
|
|
fd = do_socket(cfg_tcp);
|
|
|
|
|
2018-11-07 18:38:34 +07:00
|
|
|
if (cfg_gro_segment && !cfg_tcp) {
|
|
|
|
int val = 1;
|
|
|
|
if (setsockopt(fd, IPPROTO_UDP, UDP_GRO, &val, sizeof(val)))
|
|
|
|
error(1, errno, "setsockopt UDP_GRO");
|
|
|
|
}
|
|
|
|
|
2018-04-27 00:42:25 +07:00
|
|
|
treport = gettimeofday_ms() + 1000;
|
|
|
|
do {
|
2019-02-26 21:27:43 +07:00
|
|
|
do_poll(fd, timeout_ms);
|
2018-04-27 00:42:25 +07:00
|
|
|
|
|
|
|
if (cfg_tcp)
|
|
|
|
do_flush_tcp(fd);
|
|
|
|
else
|
|
|
|
do_flush_udp(fd);
|
|
|
|
|
|
|
|
tnow = gettimeofday_ms();
|
|
|
|
if (tnow > treport) {
|
|
|
|
if (packets)
|
|
|
|
fprintf(stderr,
|
|
|
|
"%s rx: %6lu MB/s %8lu calls/s\n",
|
|
|
|
cfg_tcp ? "tcp" : "udp",
|
|
|
|
bytes >> 20, packets);
|
|
|
|
bytes = packets = 0;
|
|
|
|
treport = tnow + 1000;
|
|
|
|
}
|
|
|
|
|
2019-02-26 21:27:43 +07:00
|
|
|
timeout_ms = cfg_rcv_timeout_ms;
|
|
|
|
|
2018-04-27 00:42:25 +07:00
|
|
|
} while (!interrupted);
|
|
|
|
|
2018-11-07 18:38:37 +07:00
|
|
|
if (cfg_expected_pkt_nr && (packets != cfg_expected_pkt_nr))
|
|
|
|
error(1, 0, "wrong packet number! got %ld, expected %d\n",
|
|
|
|
packets, cfg_expected_pkt_nr);
|
|
|
|
|
2018-04-27 00:42:25 +07:00
|
|
|
if (close(fd))
|
|
|
|
error(1, errno, "close");
|
|
|
|
}
|
|
|
|
|
|
|
|
int main(int argc, char **argv)
|
|
|
|
{
|
|
|
|
parse_opts(argc, argv);
|
|
|
|
|
|
|
|
signal(SIGINT, sigint_handler);
|
|
|
|
|
|
|
|
do_recv();
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|