1 // SPDX-License-Identifier: GPL-2.0
9 #include <linux/errqueue.h>
10 #include <linux/if_packet.h>
11 #include <linux/socket.h>
12 #include <linux/sockios.h>
13 #include <net/ethernet.h>
15 #include <netinet/ip.h>
16 #include <netinet/ip6.h>
17 #include <netinet/tcp.h>
18 #include <netinet/udp.h>
26 #include <sys/ioctl.h>
27 #include <sys/socket.h>
30 #include <sys/types.h>
38 static int cfg_port = 8000;
40 static bool cfg_verify;
41 static bool cfg_read_all;
42 static bool cfg_gro_segment;
43 static int cfg_family = PF_INET6;
44 static int cfg_alen = sizeof(struct sockaddr_in6);
45 static int cfg_expected_pkt_nr;
46 static int cfg_expected_pkt_len;
47 static int cfg_expected_gso_size;
48 static int cfg_connect_timeout_ms;
49 static int cfg_rcv_timeout_ms;
50 static struct sockaddr_storage cfg_bind_addr;
52 static bool interrupted;
53 static unsigned long packets, bytes;
55 static void sigint_handler(int signum)
61 static void setup_sockaddr(int domain, const char *str_addr, void *sockaddr)
63 struct sockaddr_in6 *addr6 = (void *) sockaddr;
64 struct sockaddr_in *addr4 = (void *) sockaddr;
68 addr4->sin_family = AF_INET;
69 addr4->sin_port = htons(cfg_port);
70 if (inet_pton(AF_INET, str_addr, &(addr4->sin_addr)) != 1)
71 error(1, 0, "ipv4 parse error: %s", str_addr);
74 addr6->sin6_family = AF_INET6;
75 addr6->sin6_port = htons(cfg_port);
76 if (inet_pton(AF_INET6, str_addr, &(addr6->sin6_addr)) != 1)
77 error(1, 0, "ipv6 parse error: %s", str_addr);
80 error(1, 0, "illegal domain");
84 static unsigned long gettimeofday_ms(void)
88 gettimeofday(&tv, NULL);
89 return (tv.tv_sec * 1000) + (tv.tv_usec / 1000);
92 static void do_poll(int fd, int timeout_ms)
102 ret = poll(&pfd, 1, 10);
106 error(1, errno, "poll");
112 if (timeout_ms <= 0) {
117 if (pfd.revents != POLLIN)
118 error(1, errno, "poll: 0x%x expected 0x%x\n",
119 pfd.revents, POLLIN);
123 static int do_socket(bool do_tcp)
127 fd = socket(cfg_family, cfg_tcp ? SOCK_STREAM : SOCK_DGRAM, 0);
129 error(1, errno, "socket");
132 if (setsockopt(fd, SOL_SOCKET, SO_RCVBUF, &val, sizeof(val)))
133 error(1, errno, "setsockopt rcvbuf");
135 if (setsockopt(fd, SOL_SOCKET, SO_REUSEPORT, &val, sizeof(val)))
136 error(1, errno, "setsockopt reuseport");
138 if (bind(fd, (void *)&cfg_bind_addr, cfg_alen))
139 error(1, errno, "bind");
144 if (listen(accept_fd, 1))
145 error(1, errno, "listen");
147 do_poll(accept_fd, cfg_connect_timeout_ms);
151 fd = accept(accept_fd, NULL, NULL);
153 error(1, errno, "accept");
154 if (close(accept_fd))
155 error(1, errno, "close accept fd");
161 /* Flush all outstanding bytes for the tcp receive queue */
162 static void do_flush_tcp(int fd)
167 /* MSG_TRUNC flushes up to len bytes */
168 ret = recv(fd, NULL, 1 << 21, MSG_TRUNC | MSG_DONTWAIT);
169 if (ret == -1 && errno == EAGAIN)
172 error(1, errno, "flush");
174 /* client detached */
184 static char sanitized_char(char val)
186 return (val >= 'a' && val <= 'z') ? val : '.';
189 static void do_verify_udp(const char *data, int len)
194 /* verify contents */
195 if (cur < 'a' || cur > 'z')
196 error(1, 0, "data initial byte out of range");
198 for (i = 1; i < len; i++) {
205 error(1, 0, "data[%d]: len %d, %c(%hhu) != %c(%hhu)\n",
207 sanitized_char(data[i]), data[i],
208 sanitized_char(cur), cur);
212 static int recv_msg(int fd, char *buf, int len, int *gso_size)
214 char control[CMSG_SPACE(sizeof(uint16_t))] = {0};
215 struct msghdr msg = {0};
216 struct iovec iov = {0};
217 struct cmsghdr *cmsg;
218 uint16_t *gsosizeptr;
227 msg.msg_control = control;
228 msg.msg_controllen = sizeof(control);
231 ret = recvmsg(fd, &msg, MSG_TRUNC | MSG_DONTWAIT);
233 for (cmsg = CMSG_FIRSTHDR(&msg); cmsg != NULL;
234 cmsg = CMSG_NXTHDR(&msg, cmsg)) {
235 if (cmsg->cmsg_level == SOL_UDP
236 && cmsg->cmsg_type == UDP_GRO) {
237 gsosizeptr = (uint16_t *) CMSG_DATA(cmsg);
238 *gso_size = *gsosizeptr;
246 /* Flush all outstanding datagrams. Verify first few bytes of each. */
247 static void do_flush_udp(int fd)
249 static char rbuf[ETH_MAX_MTU];
250 int ret, len, gso_size, budget = 256;
252 len = cfg_read_all ? sizeof(rbuf) : 0;
254 /* MSG_TRUNC will make return value full datagram length */
255 if (!cfg_expected_gso_size)
256 ret = recv(fd, rbuf, len, MSG_TRUNC | MSG_DONTWAIT);
258 ret = recv_msg(fd, rbuf, len, &gso_size);
259 if (ret == -1 && errno == EAGAIN)
262 error(1, errno, "recv");
263 if (cfg_expected_pkt_len && ret != cfg_expected_pkt_len)
264 error(1, 0, "recv: bad packet len, got %d,"
265 " expected %d\n", ret, cfg_expected_pkt_len);
266 if (len && cfg_verify) {
268 error(1, errno, "recv: 0 byte datagram\n");
270 do_verify_udp(rbuf, ret);
272 if (cfg_expected_gso_size && cfg_expected_gso_size != gso_size)
273 error(1, 0, "recv: bad gso size, got %d, expected %d "
274 "(-1 == no gso cmsg))\n", gso_size,
275 cfg_expected_gso_size);
279 if (cfg_expected_pkt_nr && packets >= cfg_expected_pkt_nr)
284 static void usage(const char *filepath)
286 error(1, 0, "Usage: %s [-C connect_timeout] [-Grtv] [-b addr] [-p port]"
287 " [-l pktlen] [-n packetnr] [-R rcv_timeout] [-S gsosize]",
291 static void parse_opts(int argc, char **argv)
295 /* bind to any by default */
296 setup_sockaddr(PF_INET6, "::", &cfg_bind_addr);
297 while ((c = getopt(argc, argv, "4b:C:Gl:n:p:rR:S:tv")) != -1) {
300 cfg_family = PF_INET;
301 cfg_alen = sizeof(struct sockaddr_in);
302 setup_sockaddr(PF_INET, "0.0.0.0", &cfg_bind_addr);
305 setup_sockaddr(cfg_family, optarg, &cfg_bind_addr);
308 cfg_connect_timeout_ms = strtoul(optarg, NULL, 0);
311 cfg_gro_segment = true;
314 cfg_expected_pkt_len = strtoul(optarg, NULL, 0);
317 cfg_expected_pkt_nr = strtoul(optarg, NULL, 0);
320 cfg_port = strtoul(optarg, NULL, 0);
326 cfg_rcv_timeout_ms = strtoul(optarg, NULL, 0);
329 cfg_expected_gso_size = strtol(optarg, NULL, 0);
344 if (cfg_tcp && cfg_verify)
345 error(1, 0, "TODO: implement verify mode for tcp");
348 static void do_recv(void)
350 int timeout_ms = cfg_tcp ? cfg_rcv_timeout_ms : cfg_connect_timeout_ms;
351 unsigned long tnow, treport;
354 fd = do_socket(cfg_tcp);
356 if (cfg_gro_segment && !cfg_tcp) {
358 if (setsockopt(fd, IPPROTO_UDP, UDP_GRO, &val, sizeof(val)))
359 error(1, errno, "setsockopt UDP_GRO");
362 treport = gettimeofday_ms() + 1000;
364 do_poll(fd, timeout_ms);
371 tnow = gettimeofday_ms();
372 if (tnow > treport) {
375 "%s rx: %6lu MB/s %8lu calls/s\n",
376 cfg_tcp ? "tcp" : "udp",
377 bytes >> 20, packets);
379 treport = tnow + 1000;
382 timeout_ms = cfg_rcv_timeout_ms;
384 } while (!interrupted);
386 if (cfg_expected_pkt_nr && (packets != cfg_expected_pkt_nr))
387 error(1, 0, "wrong packet number! got %ld, expected %d\n",
388 packets, cfg_expected_pkt_nr);
391 error(1, errno, "close");
394 int main(int argc, char **argv)
396 parse_opts(argc, argv);
398 signal(SIGINT, sigint_handler);