]>
Commit | Line | Data |
---|---|---|
ea63a69b JA |
1 | /* |
2 | * tcp_metrics.c "ip tcp_metrics/tcpmetrics" | |
3 | * | |
4 | * This program is free software; you can redistribute it and/or | |
5 | * modify it under the terms of the GNU General Public License | |
6 | * version 2 as published by the Free Software Foundation; | |
7 | * | |
8 | * Authors: Julian Anastasov <ja@ssi.bg>, August 2012 | |
9 | */ | |
10 | ||
11 | #include <stdio.h> | |
12 | #include <stdlib.h> | |
13 | #include <string.h> | |
14 | #include <unistd.h> | |
15 | #include <errno.h> | |
16 | #include <sys/types.h> | |
17 | #include <sys/socket.h> | |
18 | #include <arpa/inet.h> | |
19 | #include <sys/ioctl.h> | |
20 | #include <linux/if.h> | |
21 | ||
22 | #include <linux/genetlink.h> | |
23 | #include <linux/tcp_metrics.h> | |
24 | ||
25 | #include "utils.h" | |
26 | #include "ip_common.h" | |
27 | #include "libgenl.h" | |
28 | ||
29 | static void usage(void) | |
30 | { | |
31 | fprintf(stderr, "Usage: ip tcp_metrics/tcpmetrics { COMMAND | help }\n"); | |
32 | fprintf(stderr, " ip tcp_metrics { show | flush } SELECTOR\n"); | |
33 | fprintf(stderr, " ip tcp_metrics delete [ address ] ADDRESS\n"); | |
34 | fprintf(stderr, "SELECTOR := [ [ address ] PREFIX ]\n"); | |
35 | exit(-1); | |
36 | } | |
37 | ||
38 | /* netlink socket */ | |
39 | static struct rtnl_handle grth = { .fd = -1 }; | |
40 | static int genl_family = -1; | |
41 | ||
42 | #define TCPM_REQUEST(_req, _bufsiz, _cmd, _flags) \ | |
43 | GENL_REQUEST(_req, _bufsiz, genl_family, 0, \ | |
44 | TCP_METRICS_GENL_VERSION, _cmd, _flags) | |
45 | ||
46 | #define CMD_LIST 0x0001 /* list, lst, show */ | |
47 | #define CMD_DEL 0x0002 /* delete, remove */ | |
48 | #define CMD_FLUSH 0x0004 /* flush */ | |
49 | ||
50 | static struct { | |
51 | char *name; | |
52 | int code; | |
53 | } cmds[] = { | |
54 | { "list", CMD_LIST }, | |
55 | { "lst", CMD_LIST }, | |
56 | { "show", CMD_LIST }, | |
57 | { "delete", CMD_DEL }, | |
58 | { "remove", CMD_DEL }, | |
59 | { "flush", CMD_FLUSH }, | |
60 | }; | |
61 | ||
62 | static char *metric_name[TCP_METRIC_MAX + 1] = { | |
63 | [TCP_METRIC_RTT] = "rtt", | |
64 | [TCP_METRIC_RTTVAR] = "rttvar", | |
65 | [TCP_METRIC_SSTHRESH] = "ssthresh", | |
66 | [TCP_METRIC_CWND] = "cwnd", | |
67 | [TCP_METRIC_REORDERING] = "reordering", | |
68 | }; | |
69 | ||
70 | static struct | |
71 | { | |
72 | int flushed; | |
73 | char *flushb; | |
74 | int flushp; | |
75 | int flushe; | |
76 | int cmd; | |
54b237a0 | 77 | inet_prefix daddr; |
c3304904 | 78 | inet_prefix saddr; |
ea63a69b JA |
79 | } f; |
80 | ||
81 | static int flush_update(void) | |
82 | { | |
83 | if (rtnl_send_check(&grth, f.flushb, f.flushp) < 0) { | |
84 | perror("Failed to send flush request\n"); | |
85 | return -1; | |
86 | } | |
87 | f.flushp = 0; | |
88 | return 0; | |
89 | } | |
90 | ||
91 | static int process_msg(const struct sockaddr_nl *who, struct nlmsghdr *n, | |
92 | void *arg) | |
93 | { | |
94 | FILE *fp = (FILE *) arg; | |
95 | struct genlmsghdr *ghdr; | |
96 | struct rtattr *attrs[TCP_METRICS_ATTR_MAX + 1], *a; | |
97 | int len = n->nlmsg_len; | |
98 | char abuf[256]; | |
114aa720 CP |
99 | inet_prefix daddr, saddr; |
100 | int family, i, atype, stype, dlen = 0, slen = 0; | |
ea63a69b JA |
101 | |
102 | if (n->nlmsg_type != genl_family) | |
103 | return -1; | |
104 | ||
105 | len -= NLMSG_LENGTH(GENL_HDRLEN); | |
106 | if (len < 0) | |
107 | return -1; | |
108 | ||
109 | ghdr = NLMSG_DATA(n); | |
110 | if (ghdr->cmd != TCP_METRICS_CMD_GET) | |
111 | return 0; | |
112 | ||
113 | parse_rtattr(attrs, TCP_METRICS_ATTR_MAX, (void *) ghdr + GENL_HDRLEN, | |
114 | len); | |
115 | ||
116 | a = attrs[TCP_METRICS_ATTR_ADDR_IPV4]; | |
117 | if (a) { | |
54b237a0 | 118 | if (f.daddr.family && f.daddr.family != AF_INET) |
ea63a69b | 119 | return 0; |
54b237a0 CP |
120 | memcpy(&daddr.data, RTA_DATA(a), 4); |
121 | daddr.bytelen = 4; | |
ea63a69b JA |
122 | family = AF_INET; |
123 | atype = TCP_METRICS_ATTR_ADDR_IPV4; | |
54b237a0 | 124 | dlen = RTA_PAYLOAD(a); |
ea63a69b JA |
125 | } else { |
126 | a = attrs[TCP_METRICS_ATTR_ADDR_IPV6]; | |
127 | if (a) { | |
54b237a0 | 128 | if (f.daddr.family && f.daddr.family != AF_INET6) |
ea63a69b | 129 | return 0; |
54b237a0 CP |
130 | memcpy(&daddr.data, RTA_DATA(a), 16); |
131 | daddr.bytelen = 16; | |
ea63a69b JA |
132 | family = AF_INET6; |
133 | atype = TCP_METRICS_ATTR_ADDR_IPV6; | |
54b237a0 | 134 | dlen = RTA_PAYLOAD(a); |
ea63a69b JA |
135 | } else |
136 | return 0; | |
137 | } | |
138 | ||
114aa720 CP |
139 | a = attrs[TCP_METRICS_ATTR_SADDR_IPV4]; |
140 | if (a) { | |
141 | if (f.saddr.family && f.saddr.family != AF_INET) | |
142 | return 0; | |
143 | memcpy(&saddr.data, RTA_DATA(a), 4); | |
144 | saddr.bytelen = 4; | |
145 | stype = TCP_METRICS_ATTR_SADDR_IPV4; | |
146 | slen = RTA_PAYLOAD(a); | |
147 | } else { | |
148 | a = attrs[TCP_METRICS_ATTR_SADDR_IPV6]; | |
149 | if (a) { | |
150 | if (f.saddr.family && f.saddr.family != AF_INET6) | |
151 | return 0; | |
152 | memcpy(&saddr.data, RTA_DATA(a), 16); | |
153 | saddr.bytelen = 16; | |
154 | stype = TCP_METRICS_ATTR_SADDR_IPV6; | |
155 | slen = RTA_PAYLOAD(a); | |
156 | } | |
157 | } | |
158 | ||
54b237a0 CP |
159 | if (f.daddr.family && f.daddr.bitlen >= 0 && |
160 | inet_addr_match(&daddr, &f.daddr, f.daddr.bitlen)) | |
c3304904 CP |
161 | return 0; |
162 | /* Only check for the source-address if the kernel supports it, | |
163 | * meaning slen != 0. | |
164 | */ | |
165 | if (slen && f.saddr.family && f.saddr.bitlen >= 0 && | |
166 | inet_addr_match(&saddr, &f.saddr, f.saddr.bitlen)) | |
ea63a69b JA |
167 | return 0; |
168 | ||
169 | if (f.flushb) { | |
170 | struct nlmsghdr *fn; | |
171 | TCPM_REQUEST(req2, 128, TCP_METRICS_CMD_DEL, NLM_F_REQUEST); | |
172 | ||
54b237a0 CP |
173 | addattr_l(&req2.n, sizeof(req2), atype, &daddr.data, |
174 | daddr.bytelen); | |
c3304904 CP |
175 | if (slen) |
176 | addattr_l(&req2.n, sizeof(req2), stype, &saddr.data, | |
177 | saddr.bytelen); | |
ea63a69b JA |
178 | |
179 | if (NLMSG_ALIGN(f.flushp) + req2.n.nlmsg_len > f.flushe) { | |
180 | if (flush_update()) | |
181 | return -1; | |
182 | } | |
183 | fn = (struct nlmsghdr *) (f.flushb + NLMSG_ALIGN(f.flushp)); | |
184 | memcpy(fn, &req2.n, req2.n.nlmsg_len); | |
185 | fn->nlmsg_seq = ++grth.seq; | |
186 | f.flushp = (((char *) fn) + req2.n.nlmsg_len) - f.flushb; | |
187 | f.flushed++; | |
188 | if (show_stats < 2) | |
189 | return 0; | |
190 | } | |
191 | ||
192 | if (f.cmd & (CMD_DEL | CMD_FLUSH)) | |
193 | fprintf(fp, "Deleted "); | |
194 | ||
195 | fprintf(fp, "%s", | |
54b237a0 | 196 | format_host(family, dlen, &daddr.data, abuf, sizeof(abuf))); |
ea63a69b JA |
197 | |
198 | a = attrs[TCP_METRICS_ATTR_AGE]; | |
199 | if (a) { | |
a55a8fd8 | 200 | unsigned long long val = rta_getattr_u64(a); |
ea63a69b JA |
201 | |
202 | fprintf(fp, " age %llu.%03llusec", | |
203 | val / 1000, val % 1000); | |
204 | } | |
205 | ||
206 | a = attrs[TCP_METRICS_ATTR_TW_TS_STAMP]; | |
207 | if (a) { | |
208 | __s32 val = (__s32) rta_getattr_u32(a); | |
209 | __u32 tsval; | |
210 | ||
211 | a = attrs[TCP_METRICS_ATTR_TW_TSVAL]; | |
212 | tsval = a ? rta_getattr_u32(a) : 0; | |
213 | fprintf(fp, " tw_ts %u/%dsec ago", tsval, val); | |
214 | } | |
215 | ||
216 | a = attrs[TCP_METRICS_ATTR_VALS]; | |
217 | if (a) { | |
218 | struct rtattr *m[TCP_METRIC_MAX + 1 + 1]; | |
9464a5f2 | 219 | unsigned long rtt = 0, rttvar = 0; |
ea63a69b JA |
220 | |
221 | parse_rtattr_nested(m, TCP_METRIC_MAX + 1, a); | |
222 | ||
223 | for (i = 0; i < TCP_METRIC_MAX + 1; i++) { | |
a55a8fd8 | 224 | unsigned long val; |
ea63a69b JA |
225 | |
226 | a = m[i + 1]; | |
227 | if (!a) | |
228 | continue; | |
9464a5f2 ED |
229 | if (i != TCP_METRIC_RTT && |
230 | i != TCP_METRIC_RTT_US && | |
231 | i != TCP_METRIC_RTTVAR && | |
232 | i != TCP_METRIC_RTTVAR_US) { | |
233 | if (metric_name[i]) | |
234 | fprintf(fp, " %s ", metric_name[i]); | |
235 | else | |
236 | fprintf(fp, " metric_%d ", i); | |
237 | } | |
ea63a69b JA |
238 | val = rta_getattr_u32(a); |
239 | switch (i) { | |
240 | case TCP_METRIC_RTT: | |
9464a5f2 ED |
241 | if (!rtt) |
242 | rtt = (val * 1000UL) >> 3; | |
ea63a69b JA |
243 | break; |
244 | case TCP_METRIC_RTTVAR: | |
9464a5f2 ED |
245 | if (!rttvar) |
246 | rttvar = (val * 1000UL) >> 2; | |
247 | break; | |
248 | case TCP_METRIC_RTT_US: | |
249 | rtt = val >> 3; | |
250 | break; | |
251 | case TCP_METRIC_RTTVAR_US: | |
252 | rttvar = val >> 2; | |
ea63a69b JA |
253 | break; |
254 | case TCP_METRIC_SSTHRESH: | |
255 | case TCP_METRIC_CWND: | |
256 | case TCP_METRIC_REORDERING: | |
257 | default: | |
a55a8fd8 | 258 | fprintf(fp, "%lu", val); |
ea63a69b JA |
259 | break; |
260 | } | |
261 | } | |
9464a5f2 ED |
262 | if (rtt) |
263 | fprintf(fp, " rtt %luus", rtt); | |
264 | if (rttvar) | |
265 | fprintf(fp, " rttvar %luus", rttvar); | |
ea63a69b JA |
266 | } |
267 | ||
268 | a = attrs[TCP_METRICS_ATTR_FOPEN_MSS]; | |
269 | if (a) | |
270 | fprintf(fp, " fo_mss %u", rta_getattr_u16(a)); | |
271 | ||
272 | a = attrs[TCP_METRICS_ATTR_FOPEN_SYN_DROPS]; | |
273 | if (a) { | |
274 | __u16 syn_loss = rta_getattr_u16(a); | |
a55a8fd8 | 275 | unsigned long long ts; |
ea63a69b JA |
276 | |
277 | a = attrs[TCP_METRICS_ATTR_FOPEN_SYN_DROP_TS]; | |
278 | ts = a ? rta_getattr_u64(a) : 0; | |
279 | ||
280 | fprintf(fp, " fo_syn_drops %u/%llu.%03llusec ago", | |
281 | syn_loss, ts / 1000, ts % 1000); | |
282 | } | |
283 | ||
284 | a = attrs[TCP_METRICS_ATTR_FOPEN_COOKIE]; | |
285 | if (a) { | |
286 | char cookie[32 + 1]; | |
287 | unsigned char *ptr = RTA_DATA(a); | |
288 | int i, max = RTA_PAYLOAD(a); | |
289 | ||
290 | if (max > 16) | |
291 | max = 16; | |
292 | cookie[0] = 0; | |
293 | for (i = 0; i < max; i++) | |
294 | sprintf(cookie + i + i, "%02x", ptr[i]); | |
295 | fprintf(fp, " fo_cookie %s", cookie); | |
296 | } | |
297 | ||
114aa720 CP |
298 | if (slen) { |
299 | fprintf(fp, " source %s", | |
300 | format_host(family, slen, &saddr.data, abuf, | |
301 | sizeof(abuf))); | |
302 | } | |
303 | ||
ea63a69b JA |
304 | fprintf(fp, "\n"); |
305 | ||
306 | fflush(fp); | |
307 | return 0; | |
308 | } | |
309 | ||
310 | static int tcpm_do_cmd(int cmd, int argc, char **argv) | |
311 | { | |
312 | TCPM_REQUEST(req, 1024, TCP_METRICS_CMD_GET, NLM_F_REQUEST); | |
c3304904 | 313 | int atype = -1, stype = -1; |
ea63a69b JA |
314 | int ack; |
315 | ||
316 | memset(&f, 0, sizeof(f)); | |
54b237a0 CP |
317 | f.daddr.bitlen = -1; |
318 | f.daddr.family = preferred_family; | |
c3304904 CP |
319 | f.saddr.bitlen = -1; |
320 | f.saddr.family = preferred_family; | |
ea63a69b JA |
321 | |
322 | switch (preferred_family) { | |
323 | case AF_UNSPEC: | |
324 | case AF_INET: | |
325 | case AF_INET6: | |
326 | break; | |
327 | default: | |
14645ec2 | 328 | fprintf(stderr, "Unsupported protocol family: %d\n", preferred_family); |
ea63a69b JA |
329 | return -1; |
330 | } | |
331 | ||
332 | for (; argc > 0; argc--, argv++) { | |
c3304904 CP |
333 | if (strcmp(*argv, "src") == 0 || |
334 | strcmp(*argv, "source") == 0) { | |
335 | char *who = *argv; | |
ea63a69b | 336 | NEXT_ARG(); |
c3304904 CP |
337 | if (matches(*argv, "help") == 0) |
338 | usage(); | |
339 | if (f.saddr.bitlen >= 0) | |
340 | duparg2(who, *argv); | |
341 | ||
342 | get_prefix(&f.saddr, *argv, preferred_family); | |
343 | if (f.saddr.bytelen && f.saddr.bytelen * 8 == f.saddr.bitlen) { | |
344 | if (f.saddr.family == AF_INET) | |
345 | stype = TCP_METRICS_ATTR_SADDR_IPV4; | |
346 | else if (f.saddr.family == AF_INET6) | |
347 | stype = TCP_METRICS_ATTR_SADDR_IPV6; | |
348 | } | |
ea63a69b | 349 | |
c3304904 CP |
350 | if (stype < 0) { |
351 | fprintf(stderr, "Error: a specific IP address is expected rather than \"%s\"\n", | |
352 | *argv); | |
353 | return -1; | |
354 | } | |
355 | } else { | |
356 | char *who = "address"; | |
357 | if (strcmp(*argv, "addr") == 0 || | |
358 | strcmp(*argv, "address") == 0) { | |
359 | who = *argv; | |
360 | NEXT_ARG(); | |
361 | } | |
362 | if (matches(*argv, "help") == 0) | |
363 | usage(); | |
364 | if (f.daddr.bitlen >= 0) | |
365 | duparg2(who, *argv); | |
366 | ||
367 | get_prefix(&f.daddr, *argv, preferred_family); | |
368 | if (f.daddr.bytelen && f.daddr.bytelen * 8 == f.daddr.bitlen) { | |
369 | if (f.daddr.family == AF_INET) | |
370 | atype = TCP_METRICS_ATTR_ADDR_IPV4; | |
371 | else if (f.daddr.family == AF_INET6) | |
372 | atype = TCP_METRICS_ATTR_ADDR_IPV6; | |
373 | } | |
374 | if ((CMD_DEL & cmd) && atype < 0) { | |
375 | fprintf(stderr, "Error: a specific IP address is expected rather than \"%s\"\n", | |
376 | *argv); | |
377 | return -1; | |
378 | } | |
379 | } | |
ea63a69b JA |
380 | argc--; argv++; |
381 | } | |
382 | ||
383 | if (cmd == CMD_DEL && atype < 0) | |
384 | missarg("address"); | |
385 | ||
386 | /* flush for exact address ? Single del */ | |
387 | if (cmd == CMD_FLUSH && atype >= 0) | |
388 | cmd = CMD_DEL; | |
389 | ||
390 | /* flush for all addresses ? Single del without address */ | |
54b237a0 | 391 | if (cmd == CMD_FLUSH && f.daddr.bitlen <= 0 && |
c3304904 | 392 | f.saddr.bitlen <= 0 && preferred_family == AF_UNSPEC) { |
ea63a69b JA |
393 | cmd = CMD_DEL; |
394 | req.g.cmd = TCP_METRICS_CMD_DEL; | |
395 | ack = 1; | |
396 | } else if (cmd == CMD_DEL) { | |
397 | req.g.cmd = TCP_METRICS_CMD_DEL; | |
398 | ack = 1; | |
399 | } else { /* CMD_FLUSH, CMD_LIST */ | |
400 | ack = 0; | |
401 | } | |
402 | ||
403 | if (genl_family < 0) { | |
404 | if (rtnl_open_byproto(&grth, 0, NETLINK_GENERIC) < 0) { | |
405 | fprintf(stderr, "Cannot open generic netlink socket\n"); | |
406 | exit(1); | |
407 | } | |
408 | genl_family = genl_resolve_family(&grth, | |
409 | TCP_METRICS_GENL_NAME); | |
410 | if (genl_family < 0) | |
411 | exit(1); | |
412 | req.n.nlmsg_type = genl_family; | |
413 | } | |
414 | ||
415 | if (!(cmd & CMD_FLUSH) && (atype >= 0 || (cmd & CMD_DEL))) { | |
416 | if (ack) | |
417 | req.n.nlmsg_flags |= NLM_F_ACK; | |
418 | if (atype >= 0) | |
54b237a0 CP |
419 | addattr_l(&req.n, sizeof(req), atype, &f.daddr.data, |
420 | f.daddr.bytelen); | |
c3304904 CP |
421 | if (stype >= 0) |
422 | addattr_l(&req.n, sizeof(req), stype, &f.saddr.data, | |
423 | f.saddr.bytelen); | |
ea63a69b JA |
424 | } else { |
425 | req.n.nlmsg_flags |= NLM_F_DUMP; | |
426 | } | |
427 | ||
428 | f.cmd = cmd; | |
429 | if (cmd & CMD_FLUSH) { | |
430 | int round = 0; | |
431 | char flushb[4096-512]; | |
432 | ||
433 | f.flushb = flushb; | |
434 | f.flushp = 0; | |
435 | f.flushe = sizeof(flushb); | |
436 | ||
437 | for (;;) { | |
438 | req.n.nlmsg_seq = grth.dump = ++grth.seq; | |
439 | if (rtnl_send(&grth, &req, req.n.nlmsg_len) < 0) { | |
440 | perror("Failed to send flush request"); | |
441 | exit(1); | |
442 | } | |
443 | f.flushed = 0; | |
444 | if (rtnl_dump_filter(&grth, process_msg, stdout) < 0) { | |
445 | fprintf(stderr, "Flush terminated\n"); | |
446 | exit(1); | |
447 | } | |
448 | if (f.flushed == 0) { | |
449 | if (round == 0) { | |
450 | fprintf(stderr, "Nothing to flush.\n"); | |
451 | } else if (show_stats) | |
452 | printf("*** Flush is complete after %d round%s ***\n", | |
453 | round, round > 1 ? "s" : ""); | |
454 | fflush(stdout); | |
455 | return 0; | |
456 | } | |
457 | round++; | |
458 | if (flush_update() < 0) | |
459 | exit(1); | |
460 | if (show_stats) { | |
461 | printf("\n*** Round %d, deleting %d entries ***\n", | |
462 | round, f.flushed); | |
463 | fflush(stdout); | |
464 | } | |
465 | } | |
466 | return 0; | |
467 | } | |
468 | ||
469 | if (ack) { | |
470 | if (rtnl_talk(&grth, &req.n, 0, 0, NULL) < 0) | |
471 | return -2; | |
472 | } else if (atype >= 0) { | |
473 | if (rtnl_talk(&grth, &req.n, 0, 0, &req.n) < 0) | |
474 | return -2; | |
475 | if (process_msg(NULL, &req.n, stdout) < 0) { | |
476 | fprintf(stderr, "Dump terminated\n"); | |
477 | exit(1); | |
478 | } | |
479 | } else { | |
480 | req.n.nlmsg_seq = grth.dump = ++grth.seq; | |
481 | if (rtnl_send(&grth, &req, req.n.nlmsg_len) < 0) { | |
482 | perror("Failed to send dump request"); | |
483 | exit(1); | |
484 | } | |
485 | ||
486 | if (rtnl_dump_filter(&grth, process_msg, stdout) < 0) { | |
487 | fprintf(stderr, "Dump terminated\n"); | |
488 | exit(1); | |
489 | } | |
490 | } | |
491 | return 0; | |
492 | } | |
493 | ||
494 | int do_tcp_metrics(int argc, char **argv) | |
495 | { | |
496 | int i; | |
497 | ||
498 | if (argc < 1) | |
499 | return tcpm_do_cmd(CMD_LIST, 0, NULL); | |
500 | for (i = 0; i < ARRAY_SIZE(cmds); i++) { | |
501 | if (matches(argv[0], cmds[i].name) == 0) | |
502 | return tcpm_do_cmd(cmds[i].code, argc-1, argv+1); | |
503 | } | |
504 | if (matches(argv[0], "help") == 0) | |
505 | usage(); | |
506 | ||
507 | fprintf(stderr, "Command \"%s\" is unknown, " | |
508 | "try \"ip tcp_metrics help\".\n", *argv); | |
509 | exit(-1); | |
510 | } | |
511 |