netplika/probe.c

226 lines
5.7 KiB
C

/** Probing for RTT, Loss, Duplication, Corruption.
*
* @author Steffen Vogel <post@steffenvogel.de>
* @copyright 2014-2017, Steffen Vogel
* @license GPLv3
*********************************************************************************/
#define _POSIX_C_SOURCE 199309L
#define _DEFAULT_SOURCE
#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
#include <errno.h>
#include <error.h>
#include <string.h>
#include <sys/time.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <sys/poll.h>
#include <sys/timerfd.h>
#include <netinet/in.h>
#include <net/if.h>
#include <arpa/inet.h>
#include <netlink/addr.h>
#include <linux/ip.h>
#include "ts.h"
#include "timing.h"
#include "config.h"
#include "utils.h"
#include "hist.h"
struct phdr {
struct in_addr source;
struct in_addr destination;
uint8_t reserved;
uint8_t protocol;
uint16_t length;
} __attribute__((packed));
int probe_tcp(int sd, unsigned short dport, struct in_addr src, struct in_addr dst, struct timespec *ts)
{
struct timespec ts_syn, ts_ack;
struct phdr *phdr;
struct iphdr *ihdr;
struct tcphdr *thdr;
char buf[sizeof(struct phdr) + sizeof(struct iphdr) + sizeof(struct tcphdr)];
struct msghdr msgh;
ssize_t len;
/* Sending SYN */
memset(buf, 0, sizeof(buf));
memset(&msgh, 0, sizeof(msgh));
/* Randomize sequence number and source port */
unsigned int seq = (unsigned) rand();
unsigned short sport = (rand() + 1024) & 0xFFFF;
phdr = (struct phdr *) buf;
thdr = (struct tcphdr *) (phdr + 1);
phdr->source = src;
phdr->destination = dst;
phdr->protocol = IPPROTO_TCP;
phdr->length = sizeof(struct tcphdr);
thdr->syn = 1;
thdr->seq = htonl(seq);
thdr->source = htons(sport);
thdr->dest = htons(dport);
thdr->doff = 5;
thdr->check = chksum_rfc1071((unsigned short *) &phdr, sizeof(struct phdr) + sizeof(struct tcphdr));
struct iovec iov1[] = {
{ .iov_base = thdr, .iov_len = sizeof(struct tcphdr) } // TCP header
};
msgh.msg_iov = iov1; // only send TCP header
msgh.msg_iovlen = 1;
if (ts_sendmsg(sd, &msgh, 0, &ts_syn) < 0)
error(-1, errno, "Failed to send SYN packet");
/* Receiving ACK */
memset(buf, 0, sizeof(buf));
ihdr = (struct iphdr *) buf;
thdr = (struct tcphdr *) (ihdr + 1);
struct iovec iov2[] = {
{ .iov_base = ihdr, .iov_len = sizeof(struct iphdr) }, // IP header
{ .iov_base = thdr, .iov_len = sizeof(struct tcphdr) } // TCP header
};
msgh.msg_iov = iov2; // receive IP + TCP header
msgh.msg_iovlen = 2;
retry: len = ts_recvmsg(sd, &msgh, 0, &ts_ack);
if (len < 0)
error(-1, 0, "Failed to receive ACK / RST packet");
//printf("TCP: len=%u, syn=%u, ack=%u, rst=%u, seq=%u, ack_seq=%u, src=%u, dst=%u\n",
// len, thdr.syn, thdr.ack, thdr.rst, ntohl(thdr.seq), ntohl(thdr.ack_seq), ntohs(thdr.source), ntohs(thdr.dest));
/* Check response */
if (thdr->source != htons(dport) || thdr->dest != htons(sport)) {
printf("Skipping invalid ports\n");
goto retry;
}
else if (!thdr->rst && !(thdr->ack && thdr->syn)) {
printf("Skipping invalid flags\n");
goto retry;
}
else if (ntohl(thdr->ack_seq) != seq + 1) {
printf("Skipping invalid seq\n");
goto retry;
}
*ts = time_diff(&ts_syn, &ts_ack);
return 0;
}
int probe(int argc, char *argv[])
{
int run = 0, tfd;
/* Parse address */
struct nl_addr *addr;
struct sockaddr_in sin;
struct in_addr src, dst;
/* Parse args */
if (argc != 2)
error(-1, 0, "usage: netem probe IP PORT");
if (nl_addr_parse(argv[0], AF_UNSPEC, &addr))
error(-1, 0, "Failed to parse address: %s", argv[0]);
unsigned short dport = atoi(argv[1]);
if (!dport)
error(-1, 0, "Failed to parse port: %s", argv[1]);
socklen_t sinlen = sizeof(sin);
if (nl_addr_fill_sockaddr(addr, (struct sockaddr *) &sin, &sinlen))
error(-1, 0, "Failed to fill sockaddr");
dst = sin.sin_addr;
inet_aton("134.130.169.31", &src);
/* Create RAW socket */
int sd = socket(AF_INET, SOCK_RAW, IPPROTO_TCP);
if (sd < 0)
error(-1, errno, "Failed to create socket");
/* Bind socket to destination */
if (connect(sd, (struct sockaddr *) &sin, sizeof(sin)))
error(-1, 0, "Failed to connect socket");
/* Enable Kernel TS support */
if (ts_enable_if("lo"))
fprintf(stderr, "Failed to enable timestamping: %s\n", strerror(errno));
if (ts_enable_sd(sd))
fprintf(stderr, "Failed to set SO_TIMESTAMPING: %s\n", strerror(errno));
/* Prepare payload */
struct timespec ts;
/* Prepare statistics */
struct hist hist;
hist_create(&hist, 0, 0, 1);
/* Start timer */
if ((tfd = timerfd_init(cfg.rate)) < 0)
error(-1, errno, "Failed to initilize timer");
do {
probe_tcp(sd, dport, src, dst, &ts);
double rtt = time_to_double(&ts);
hist_put(&hist, rtt);
//printf("n=%u, rtt=%f, min=%f, max=%f, avg=%f, stddev=%f\n",
// hist.total, rtt, hist.lowest, hist.highest, hist_mean(&hist), hist_stddev(&hist));
/* Warmup: adjust histogram after rough estimation of RTT */
if (run == cfg.warmup) {
double span = hist.highest - hist.lowest;
hist_destroy(&hist);
hist_create(&hist, MAX(0, hist.lowest - span * 0.1), hist.highest + span * 0.2, span / 20);
fprintf(stderr, "Created new histogram: high=%f, low=%f, buckets=%u\n",
hist.high, hist.low, hist.length);
/* Print header for output */
time_t t = time(NULL);
struct tm *tm = localtime(&t);
char addrs[32], date[32];
nl_addr2str(addr, addrs, sizeof(addrs));
strftime(date, sizeof(date), "%a, %d %b %Y %T %z", tm);
printf("# Probing: %s on port %u\n", addrs, dport);
printf("# Started: %s\n", date);
printf("# RTT mu sigma (units in S)\n");
}
printf("%f %f %f\n", rtt, hist_mean(&hist), hist_stddev(&hist));
fflush(stdout);
run += timerfd_wait(tfd);
} while (cfg.limit && run < cfg.limit);
hist_print(&hist, stderr);
hist_destroy(&hist);
return 0;
}