diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-15 18:21:43 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-15 18:21:43 +0000 |
commit | c8c3bd06ef1a7248c8195d050d8a4075d051256e (patch) | |
tree | 419655deec1b0af0c5d3ec488693f1494fb20959 /src/iperf_api.c | |
parent | Initial commit. (diff) | |
download | iperf3-c8c3bd06ef1a7248c8195d050d8a4075d051256e.tar.xz iperf3-c8c3bd06ef1a7248c8195d050d8a4075d051256e.zip |
Adding upstream version 3.16.upstream/3.16
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'src/iperf_api.c')
-rw-r--r-- | src/iperf_api.c | 5037 |
1 files changed, 5037 insertions, 0 deletions
diff --git a/src/iperf_api.c b/src/iperf_api.c new file mode 100644 index 0000000..eb23403 --- /dev/null +++ b/src/iperf_api.c @@ -0,0 +1,5037 @@ +/* + * iperf, Copyright (c) 2014-2022, The Regents of the University of + * California, through Lawrence Berkeley National Laboratory (subject + * to receipt of any required approvals from the U.S. Dept. of + * Energy). All rights reserved. + * + * If you have questions about your rights to use or distribute this + * software, please contact Berkeley Lab's Technology Transfer + * Department at TTD@lbl.gov. + * + * NOTICE. This software is owned by the U.S. Department of Energy. + * As such, the U.S. Government has been granted for itself and others + * acting on its behalf a paid-up, nonexclusive, irrevocable, + * worldwide license in the Software to reproduce, prepare derivative + * works, and perform publicly and display publicly. Beginning five + * (5) years after the date permission to assert copyright is obtained + * from the U.S. Department of Energy, and subject to any subsequent + * five (5) year renewals, the U.S. Government is granted for itself + * and others acting on its behalf a paid-up, nonexclusive, + * irrevocable, worldwide license in the Software to reproduce, + * prepare derivative works, distribute copies to the public, perform + * publicly and display publicly, and to permit others to do so. + * + * This code is distributed under a BSD style license, see the LICENSE file + * for complete information. + */ +#ifndef _GNU_SOURCE +# define _GNU_SOURCE +#endif +#define __USE_GNU + +#include "iperf_config.h" + +#include <stdio.h> +#include <stdlib.h> +#include <string.h> +#include <time.h> +#include <getopt.h> +#include <errno.h> +#include <signal.h> +#include <unistd.h> +#include <assert.h> +#include <fcntl.h> +#include <sys/socket.h> +#include <sys/types.h> +#include <netinet/in.h> +#include <arpa/inet.h> +#include <netdb.h> +#ifdef HAVE_STDINT_H +#include <stdint.h> +#endif +#include <sys/time.h> +#include <sys/resource.h> +#include <sys/mman.h> +#include <sys/stat.h> +#include <sched.h> +#include <setjmp.h> +#include <stdarg.h> +#include <math.h> + +#if defined(HAVE_CPUSET_SETAFFINITY) +#include <sys/param.h> +#include <sys/cpuset.h> +#endif /* HAVE_CPUSET_SETAFFINITY */ + +#if defined(__CYGWIN__) || defined(_WIN32) || defined(_WIN64) || defined(__WINDOWS__) +#define CPU_SETSIZE __CPU_SETSIZE +#endif /* __CYGWIN__, _WIN32, _WIN64, __WINDOWS__ */ + +#if defined(HAVE_SETPROCESSAFFINITYMASK) +#include <Windows.h> +#endif /* HAVE_SETPROCESSAFFINITYMASK */ + +#include "net.h" +#include "iperf.h" +#include "iperf_api.h" +#include "iperf_udp.h" +#include "iperf_tcp.h" +#if defined(HAVE_SCTP_H) +#include "iperf_sctp.h" +#endif /* HAVE_SCTP_H */ +#include "timer.h" + +#include "cjson.h" +#include "units.h" +#include "iperf_util.h" +#include "iperf_locale.h" +#include "version.h" +#if defined(HAVE_SSL) +#include <openssl/bio.h> +#include <openssl/err.h> +#include "iperf_auth.h" +#endif /* HAVE_SSL */ + +/* Forwards. */ +static int send_parameters(struct iperf_test *test); +static int get_parameters(struct iperf_test *test); +static int send_results(struct iperf_test *test); +static int get_results(struct iperf_test *test); +static int diskfile_send(struct iperf_stream *sp); +static int diskfile_recv(struct iperf_stream *sp); +static int JSON_write(int fd, cJSON *json); +static void print_interval_results(struct iperf_test *test, struct iperf_stream *sp, cJSON *json_interval_streams); +static cJSON *JSON_read(int fd); + + +/*************************** Print usage functions ****************************/ + +void +usage() +{ + fputs(usage_shortstr, stderr); +} + + +void +usage_long(FILE *f) +{ + fprintf(f, usage_longstr, DEFAULT_NO_MSG_RCVD_TIMEOUT, UDP_RATE / (1024*1024), DEFAULT_PACING_TIMER, DURATION, DEFAULT_TCP_BLKSIZE / 1024, DEFAULT_UDP_BLKSIZE); +} + + +void warning(const char *str) +{ + fprintf(stderr, "warning: %s\n", str); +} + + +/************** Getter routines for some fields inside iperf_test *************/ + +int +iperf_get_verbose(struct iperf_test *ipt) +{ + return ipt->verbose; +} + +int +iperf_get_control_socket(struct iperf_test *ipt) +{ + return ipt->ctrl_sck; +} + +int +iperf_get_control_socket_mss(struct iperf_test *ipt) +{ + return ipt->ctrl_sck_mss; +} + +int +iperf_get_test_omit(struct iperf_test *ipt) +{ + return ipt->omit; +} + +int +iperf_get_test_duration(struct iperf_test *ipt) +{ + return ipt->duration; +} + +uint64_t +iperf_get_test_rate(struct iperf_test *ipt) +{ + return ipt->settings->rate; +} + +uint64_t +iperf_get_test_bitrate_limit(struct iperf_test *ipt) +{ + return ipt->settings->bitrate_limit; +} + +double +iperf_get_test_bitrate_limit_interval(struct iperf_test *ipt) +{ + return ipt->settings->bitrate_limit_interval; +} + +int +iperf_get_test_bitrate_limit_stats_per_interval(struct iperf_test *ipt) +{ + return ipt->settings->bitrate_limit_stats_per_interval; +} + +uint64_t +iperf_get_test_fqrate(struct iperf_test *ipt) +{ + return ipt->settings->fqrate; +} + +int +iperf_get_test_pacing_timer(struct iperf_test *ipt) +{ + return ipt->settings->pacing_timer; +} + +uint64_t +iperf_get_test_bytes(struct iperf_test *ipt) +{ + return (uint64_t) ipt->settings->bytes; +} + +uint64_t +iperf_get_test_blocks(struct iperf_test *ipt) +{ + return (uint64_t) ipt->settings->blocks; +} + +int +iperf_get_test_burst(struct iperf_test *ipt) +{ + return ipt->settings->burst; +} + +char +iperf_get_test_role(struct iperf_test *ipt) +{ + return ipt->role; +} + +int +iperf_get_test_reverse(struct iperf_test *ipt) +{ + return ipt->reverse; +} + +int +iperf_get_test_bidirectional(struct iperf_test *ipt) +{ + return ipt->bidirectional; +} + +int +iperf_get_test_blksize(struct iperf_test *ipt) +{ + return ipt->settings->blksize; +} + +FILE * +iperf_get_test_outfile (struct iperf_test *ipt) +{ + return ipt->outfile; +} + +int +iperf_get_test_socket_bufsize(struct iperf_test *ipt) +{ + return ipt->settings->socket_bufsize; +} + +double +iperf_get_test_reporter_interval(struct iperf_test *ipt) +{ + return ipt->reporter_interval; +} + +double +iperf_get_test_stats_interval(struct iperf_test *ipt) +{ + return ipt->stats_interval; +} + +int +iperf_get_test_num_streams(struct iperf_test *ipt) +{ + return ipt->num_streams; +} + +int +iperf_get_test_timestamps(struct iperf_test *ipt) +{ + return ipt->timestamps; +} + +const char * +iperf_get_test_timestamp_format(struct iperf_test *ipt) +{ + return ipt->timestamp_format; +} + +int +iperf_get_test_repeating_payload(struct iperf_test *ipt) +{ + return ipt->repeating_payload; +} + +int +iperf_get_test_bind_port(struct iperf_test *ipt) +{ + return ipt->bind_port; +} + +int +iperf_get_test_server_port(struct iperf_test *ipt) +{ + return ipt->server_port; +} + +char* +iperf_get_test_server_hostname(struct iperf_test *ipt) +{ + return ipt->server_hostname; +} + +char* +iperf_get_test_template(struct iperf_test *ipt) +{ + return ipt->tmp_template; +} + +int +iperf_get_test_protocol_id(struct iperf_test *ipt) +{ + return ipt->protocol->id; +} + +int +iperf_get_test_json_output(struct iperf_test *ipt) +{ + return ipt->json_output; +} + +char * +iperf_get_test_json_output_string(struct iperf_test *ipt) +{ + return ipt->json_output_string; +} + +int +iperf_get_test_zerocopy(struct iperf_test *ipt) +{ + return ipt->zerocopy; +} + +int +iperf_get_test_get_server_output(struct iperf_test *ipt) +{ + return ipt->get_server_output; +} + +char +iperf_get_test_unit_format(struct iperf_test *ipt) +{ + return ipt->settings->unit_format; +} + +char * +iperf_get_test_bind_address(struct iperf_test *ipt) +{ + return ipt->bind_address; +} + +char * +iperf_get_test_bind_dev(struct iperf_test *ipt) +{ + return ipt->bind_dev; +} + +int +iperf_get_test_udp_counters_64bit(struct iperf_test *ipt) +{ + return ipt->udp_counters_64bit; +} + +int +iperf_get_test_one_off(struct iperf_test *ipt) +{ + return ipt->one_off; +} + +int +iperf_get_test_tos(struct iperf_test *ipt) +{ + return ipt->settings->tos; +} + +char * +iperf_get_test_extra_data(struct iperf_test *ipt) +{ + return ipt->extra_data; +} + +static const char iperf_version[] = IPERF_VERSION; +char * +iperf_get_iperf_version(void) +{ + return (char*)iperf_version; +} + +int +iperf_get_test_no_delay(struct iperf_test *ipt) +{ + return ipt->no_delay; +} + +int +iperf_get_test_connect_timeout(struct iperf_test *ipt) +{ + return ipt->settings->connect_timeout; +} + +int +iperf_get_test_idle_timeout(struct iperf_test *ipt) +{ + return ipt->settings->idle_timeout; +} + +int +iperf_get_dont_fragment(struct iperf_test *ipt) +{ + return ipt->settings->dont_fragment; +} + +struct iperf_time* +iperf_get_test_rcv_timeout(struct iperf_test *ipt) +{ + return &ipt->settings->rcv_timeout; +} + +char* +iperf_get_test_congestion_control(struct iperf_test* ipt) +{ + return ipt->congestion; +} + +int +iperf_get_test_mss(struct iperf_test *ipt) +{ + return ipt->settings->mss; +} + +int +iperf_get_mapped_v4(struct iperf_test* ipt) +{ + return ipt->mapped_v4; +} + +/************** Setter routines for some fields inside iperf_test *************/ + +void +iperf_set_verbose(struct iperf_test *ipt, int verbose) +{ + ipt->verbose = verbose; +} + +void +iperf_set_control_socket(struct iperf_test *ipt, int ctrl_sck) +{ + ipt->ctrl_sck = ctrl_sck; +} + +void +iperf_set_test_omit(struct iperf_test *ipt, int omit) +{ + ipt->omit = omit; +} + +void +iperf_set_test_duration(struct iperf_test *ipt, int duration) +{ + ipt->duration = duration; +} + +void +iperf_set_test_reporter_interval(struct iperf_test *ipt, double reporter_interval) +{ + ipt->reporter_interval = reporter_interval; +} + +void +iperf_set_test_stats_interval(struct iperf_test *ipt, double stats_interval) +{ + ipt->stats_interval = stats_interval; +} + +void +iperf_set_test_state(struct iperf_test *ipt, signed char state) +{ + ipt->state = state; +} + +void +iperf_set_test_blksize(struct iperf_test *ipt, int blksize) +{ + ipt->settings->blksize = blksize; +} + +void +iperf_set_test_logfile(struct iperf_test *ipt, const char *logfile) +{ + ipt->logfile = strdup(logfile); +} + +void +iperf_set_test_rate(struct iperf_test *ipt, uint64_t rate) +{ + ipt->settings->rate = rate; +} + +void +iperf_set_test_bitrate_limit_maximum(struct iperf_test *ipt, uint64_t total_rate) +{ + ipt->settings->bitrate_limit = total_rate; +} + +void +iperf_set_test_bitrate_limit_interval(struct iperf_test *ipt, uint64_t bitrate_limit_interval) +{ + ipt->settings->bitrate_limit_interval = bitrate_limit_interval; +} + +void +iperf_set_test_bitrate_limit_stats_per_interval(struct iperf_test *ipt, uint64_t bitrate_limit_stats_per_interval) +{ + ipt->settings->bitrate_limit_stats_per_interval = bitrate_limit_stats_per_interval; +} + +void +iperf_set_test_fqrate(struct iperf_test *ipt, uint64_t fqrate) +{ + ipt->settings->fqrate = fqrate; +} + +void +iperf_set_test_pacing_timer(struct iperf_test *ipt, int pacing_timer) +{ + ipt->settings->pacing_timer = pacing_timer; +} + +void +iperf_set_test_bytes(struct iperf_test *ipt, uint64_t bytes) +{ + ipt->settings->bytes = (iperf_size_t) bytes; +} + +void +iperf_set_test_blocks(struct iperf_test *ipt, uint64_t blocks) +{ + ipt->settings->blocks = (iperf_size_t) blocks; +} + +void +iperf_set_test_burst(struct iperf_test *ipt, int burst) +{ + ipt->settings->burst = burst; +} + +void +iperf_set_test_bind_port(struct iperf_test *ipt, int bind_port) +{ + ipt->bind_port = bind_port; +} + +void +iperf_set_test_server_port(struct iperf_test *ipt, int srv_port) +{ + ipt->server_port = srv_port; +} + +void +iperf_set_test_socket_bufsize(struct iperf_test *ipt, int socket_bufsize) +{ + ipt->settings->socket_bufsize = socket_bufsize; +} + +void +iperf_set_test_num_streams(struct iperf_test *ipt, int num_streams) +{ + ipt->num_streams = num_streams; +} + +void +iperf_set_test_repeating_payload(struct iperf_test *ipt, int repeating_payload) +{ + ipt->repeating_payload = repeating_payload; +} + +void +iperf_set_test_timestamps(struct iperf_test *ipt, int timestamps) +{ + ipt->timestamps = timestamps; +} + +void +iperf_set_test_timestamp_format(struct iperf_test *ipt, const char *tf) +{ + ipt->timestamp_format = strdup(tf); +} + +void +iperf_set_mapped_v4(struct iperf_test *ipt, const int val) +{ + ipt->mapped_v4 = val; +} + +void +iperf_set_on_new_stream_callback(struct iperf_test* ipt, void (*callback)()) +{ + ipt->on_new_stream = callback; +} + +void +iperf_set_on_test_start_callback(struct iperf_test* ipt, void (*callback)()) +{ + ipt->on_test_start = callback; +} + +void +iperf_set_on_test_connect_callback(struct iperf_test* ipt, void (*callback)()) +{ + ipt->on_connect = callback; +} + +void +iperf_set_on_test_finish_callback(struct iperf_test* ipt, void (*callback)()) +{ + ipt->on_test_finish = callback; +} + +static void +check_sender_has_retransmits(struct iperf_test *ipt) +{ + if (ipt->mode != RECEIVER && ipt->protocol->id == Ptcp && has_tcpinfo_retransmits()) + ipt->sender_has_retransmits = 1; + else + ipt->sender_has_retransmits = 0; +} + +void +iperf_set_test_role(struct iperf_test *ipt, char role) +{ + ipt->role = role; + if (!ipt->reverse) { + if (ipt->bidirectional) + ipt->mode = BIDIRECTIONAL; + else if (role == 'c') + ipt->mode = SENDER; + else if (role == 's') + ipt->mode = RECEIVER; + } else { + if (role == 'c') + ipt->mode = RECEIVER; + else if (role == 's') + ipt->mode = SENDER; + } + check_sender_has_retransmits(ipt); +} + +void +iperf_set_test_server_hostname(struct iperf_test *ipt, const char *server_hostname) +{ + ipt->server_hostname = strdup(server_hostname); +} + +void +iperf_set_test_template(struct iperf_test *ipt, const char *tmp_template) +{ + ipt->tmp_template = strdup(tmp_template); +} + +void +iperf_set_test_reverse(struct iperf_test *ipt, int reverse) +{ + ipt->reverse = reverse; + if (!ipt->reverse) { + if (ipt->role == 'c') + ipt->mode = SENDER; + else if (ipt->role == 's') + ipt->mode = RECEIVER; + } else { + if (ipt->role == 'c') + ipt->mode = RECEIVER; + else if (ipt->role == 's') + ipt->mode = SENDER; + } + check_sender_has_retransmits(ipt); +} + +void +iperf_set_test_json_output(struct iperf_test *ipt, int json_output) +{ + ipt->json_output = json_output; +} + +int +iperf_has_zerocopy( void ) +{ + return has_sendfile(); +} + +void +iperf_set_test_zerocopy(struct iperf_test *ipt, int zerocopy) +{ + ipt->zerocopy = (zerocopy && has_sendfile()); +} + +void +iperf_set_test_get_server_output(struct iperf_test *ipt, int get_server_output) +{ + ipt->get_server_output = get_server_output; +} + +void +iperf_set_test_unit_format(struct iperf_test *ipt, char unit_format) +{ + ipt->settings->unit_format = unit_format; +} + +#if defined(HAVE_SSL) +void +iperf_set_test_client_username(struct iperf_test *ipt, const char *client_username) +{ + ipt->settings->client_username = strdup(client_username); +} + +void +iperf_set_test_client_password(struct iperf_test *ipt, const char *client_password) +{ + ipt->settings->client_password = strdup(client_password); +} + +void +iperf_set_test_client_rsa_pubkey(struct iperf_test *ipt, const char *client_rsa_pubkey_base64) +{ + ipt->settings->client_rsa_pubkey = load_pubkey_from_base64(client_rsa_pubkey_base64); +} + +void +iperf_set_test_server_authorized_users(struct iperf_test *ipt, const char *server_authorized_users) +{ + ipt->server_authorized_users = strdup(server_authorized_users); +} + +void +iperf_set_test_server_skew_threshold(struct iperf_test *ipt, int server_skew_threshold) +{ + ipt->server_skew_threshold = server_skew_threshold; +} + +void +iperf_set_test_server_rsa_privkey(struct iperf_test *ipt, const char *server_rsa_privkey_base64) +{ + ipt->server_rsa_private_key = load_privkey_from_base64(server_rsa_privkey_base64); +} +#endif // HAVE_SSL + +void +iperf_set_test_bind_address(struct iperf_test *ipt, const char *bnd_address) +{ + ipt->bind_address = strdup(bnd_address); +} + +void +iperf_set_test_bind_dev(struct iperf_test *ipt, const char *bnd_dev) +{ + ipt->bind_dev = strdup(bnd_dev); +} + +void +iperf_set_test_udp_counters_64bit(struct iperf_test *ipt, int udp_counters_64bit) +{ + ipt->udp_counters_64bit = udp_counters_64bit; +} + +void +iperf_set_test_one_off(struct iperf_test *ipt, int one_off) +{ + ipt->one_off = one_off; +} + +void +iperf_set_test_tos(struct iperf_test *ipt, int tos) +{ + ipt->settings->tos = tos; +} + +void +iperf_set_test_extra_data(struct iperf_test *ipt, const char *dat) +{ + ipt->extra_data = strdup(dat); +} + +void +iperf_set_test_bidirectional(struct iperf_test* ipt, int bidirectional) +{ + ipt->bidirectional = bidirectional; + if (bidirectional) + ipt->mode = BIDIRECTIONAL; + else + iperf_set_test_reverse(ipt, ipt->reverse); +} + +void +iperf_set_test_no_delay(struct iperf_test* ipt, int no_delay) +{ + ipt->no_delay = no_delay; +} + +void +iperf_set_test_connect_timeout(struct iperf_test* ipt, int ct) +{ + ipt->settings->connect_timeout = ct; +} + +void +iperf_set_test_idle_timeout(struct iperf_test* ipt, int to) +{ + ipt->settings->idle_timeout = to; +} + +void +iperf_set_dont_fragment(struct iperf_test* ipt, int dnf) +{ + ipt->settings->dont_fragment = dnf; +} + +void +iperf_set_test_rcv_timeout(struct iperf_test* ipt, struct iperf_time* to) +{ + ipt->settings->rcv_timeout.secs = to->secs; + ipt->settings->rcv_timeout.usecs = to->usecs; +} + +void +iperf_set_test_congestion_control(struct iperf_test* ipt, char* cc) +{ + ipt->congestion = strdup(cc); +} + +void +iperf_set_test_mss(struct iperf_test *ipt, int mss) +{ + ipt->settings->mss = mss; +} + +/********************** Get/set test protocol structure ***********************/ + +struct protocol * +get_protocol(struct iperf_test *test, int prot_id) +{ + struct protocol *prot; + + SLIST_FOREACH(prot, &test->protocols, protocols) { + if (prot->id == prot_id) + break; + } + + if (prot == NULL) + i_errno = IEPROTOCOL; + + return prot; +} + +int +set_protocol(struct iperf_test *test, int prot_id) +{ + struct protocol *prot = NULL; + + SLIST_FOREACH(prot, &test->protocols, protocols) { + if (prot->id == prot_id) { + test->protocol = prot; + check_sender_has_retransmits(test); + return 0; + } + } + + i_errno = IEPROTOCOL; + return -1; +} + + +/************************** Iperf callback functions **************************/ + +void +iperf_on_new_stream(struct iperf_stream *sp) +{ + connect_msg(sp); +} + +void +iperf_on_test_start(struct iperf_test *test) +{ + if (test->json_output) { + cJSON_AddItemToObject(test->json_start, "test_start", iperf_json_printf("protocol: %s num_streams: %d blksize: %d omit: %d duration: %d bytes: %d blocks: %d reverse: %d tos: %d target_bitrate: %d bidir: %d fqrate: %d", test->protocol->name, (int64_t) test->num_streams, (int64_t) test->settings->blksize, (int64_t) test->omit, (int64_t) test->duration, (int64_t) test->settings->bytes, (int64_t) test->settings->blocks, test->reverse?(int64_t)1:(int64_t)0, (int64_t) test->settings->tos, (int64_t) test->settings->rate, (int64_t) test->bidirectional, (uint64_t) test->settings->fqrate)); + } else { + if (test->verbose) { + if (test->settings->bytes) + iperf_printf(test, test_start_bytes, test->protocol->name, test->num_streams, test->settings->blksize, test->omit, test->settings->bytes, test->settings->tos); + else if (test->settings->blocks) + iperf_printf(test, test_start_blocks, test->protocol->name, test->num_streams, test->settings->blksize, test->omit, test->settings->blocks, test->settings->tos); + else + iperf_printf(test, test_start_time, test->protocol->name, test->num_streams, test->settings->blksize, test->omit, test->duration, test->settings->tos); + } + } +} + +/* This converts an IPv6 string address from IPv4-mapped format into regular +** old IPv4 format, which is easier on the eyes of network veterans. +** +** If the v6 address is not v4-mapped it is left alone. +** +** Returns 1 if the v6 address is v4-mapped, 0 otherwise. +*/ +static int +mapped_v4_to_regular_v4(char *str) +{ + char *prefix = "::ffff:"; + int prefix_len; + + prefix_len = strlen(prefix); + if (strncmp(str, prefix, prefix_len) == 0) { + int str_len = strlen(str); + memmove(str, str + prefix_len, str_len - prefix_len + 1); + return 1; + } + return 0; +} + +void +iperf_on_connect(struct iperf_test *test) +{ + time_t now_secs; + const char* rfc1123_fmt = "%a, %d %b %Y %H:%M:%S %Z"; + char now_str[100]; + char ipr[INET6_ADDRSTRLEN]; + int port; + struct sockaddr_storage sa; + struct sockaddr_in *sa_inP; + struct sockaddr_in6 *sa_in6P; + socklen_t len; + + now_secs = time((time_t*) 0); + (void) strftime(now_str, sizeof(now_str), rfc1123_fmt, gmtime(&now_secs)); + if (test->json_output) + cJSON_AddItemToObject(test->json_start, "timestamp", iperf_json_printf("time: %s timesecs: %d", now_str, (int64_t) now_secs)); + else if (test->verbose) + iperf_printf(test, report_time, now_str); + + if (test->role == 'c') { + if (test->json_output) + cJSON_AddItemToObject(test->json_start, "connecting_to", iperf_json_printf("host: %s port: %d", test->server_hostname, (int64_t) test->server_port)); + else { + iperf_printf(test, report_connecting, test->server_hostname, test->server_port); + if (test->reverse) + iperf_printf(test, report_reverse, test->server_hostname); + } + } else { + len = sizeof(sa); + getpeername(test->ctrl_sck, (struct sockaddr *) &sa, &len); + if (getsockdomain(test->ctrl_sck) == AF_INET) { + sa_inP = (struct sockaddr_in *) &sa; + inet_ntop(AF_INET, &sa_inP->sin_addr, ipr, sizeof(ipr)); + port = ntohs(sa_inP->sin_port); + } else { + sa_in6P = (struct sockaddr_in6 *) &sa; + inet_ntop(AF_INET6, &sa_in6P->sin6_addr, ipr, sizeof(ipr)); + port = ntohs(sa_in6P->sin6_port); + } + if (mapped_v4_to_regular_v4(ipr)) { + iperf_set_mapped_v4(test, 1); + } + if (test->json_output) + cJSON_AddItemToObject(test->json_start, "accepted_connection", iperf_json_printf("host: %s port: %d", ipr, (int64_t) port)); + else + iperf_printf(test, report_accepted, ipr, port); + } + if (test->json_output) { + cJSON_AddStringToObject(test->json_start, "cookie", test->cookie); + if (test->protocol->id == SOCK_STREAM) { + if (test->settings->mss) + cJSON_AddNumberToObject(test->json_start, "tcp_mss", test->settings->mss); + else { + cJSON_AddNumberToObject(test->json_start, "tcp_mss_default", test->ctrl_sck_mss); + } + } + // Duplicate to make sure it appears on all output + cJSON_AddNumberToObject(test->json_start, "target_bitrate", test->settings->rate); + cJSON_AddNumberToObject(test->json_start, "fq_rate", test->settings->fqrate); + } else if (test->verbose) { + iperf_printf(test, report_cookie, test->cookie); + if (test->protocol->id == SOCK_STREAM) { + if (test->settings->mss) + iperf_printf(test, " TCP MSS: %d\n", test->settings->mss); + else { + iperf_printf(test, " TCP MSS: %d (default)\n", test->ctrl_sck_mss); + } + } + if (test->settings->rate) + iperf_printf(test, " Target Bitrate: %"PRIu64"\n", test->settings->rate); + } +} + +void +iperf_on_test_finish(struct iperf_test *test) +{ +} + + +/******************************************************************************/ + +/* + * iperf_parse_hostname tries to split apart a string into hostname % + * interface parts, which are returned in **p and **p1, if they + * exist. If the %interface part is detected, and it's not an IPv6 + * link local address, then returns 1, else returns 0. + * + * Modifies the string pointed to by spec in-place due to the use of + * strtok(3). The caller should strdup(3) or otherwise copy the string + * if an unmodified copy is needed. + */ +int +iperf_parse_hostname(struct iperf_test *test, char *spec, char **p, char **p1) { + struct in6_addr ipv6_addr; + + // Format is <addr>[%<device>] + if ((*p = strtok(spec, "%")) != NULL && + (*p1 = strtok(NULL, "%")) != NULL) { + + /* + * If an IPv6 literal for a link-local address, then + * tell the caller to leave the "%" in the hostname. + */ + if (inet_pton(AF_INET6, *p, &ipv6_addr) == 1 && + IN6_IS_ADDR_LINKLOCAL(&ipv6_addr)) { + if (test->debug) { + iperf_printf(test, "IPv6 link-local address literal detected\n"); + } + return 0; + } + /* + * Other kind of address or FQDN. The interface name after + * "%" is a shorthand for --bind-dev. + */ + else { + if (test->debug) { + iperf_printf(test, "p %s p1 %s\n", *p, *p1); + } + return 1; + } + } + else { + if (test->debug) { + iperf_printf(test, "noparse\n"); + } + return 0; + } +} + +int +iperf_parse_arguments(struct iperf_test *test, int argc, char **argv) +{ + static struct option longopts[] = + { + {"port", required_argument, NULL, 'p'}, + {"format", required_argument, NULL, 'f'}, + {"interval", required_argument, NULL, 'i'}, + {"daemon", no_argument, NULL, 'D'}, + {"one-off", no_argument, NULL, '1'}, + {"verbose", no_argument, NULL, 'V'}, + {"json", no_argument, NULL, 'J'}, + {"version", no_argument, NULL, 'v'}, + {"server", no_argument, NULL, 's'}, + {"client", required_argument, NULL, 'c'}, + {"udp", no_argument, NULL, 'u'}, + {"bitrate", required_argument, NULL, 'b'}, + {"bandwidth", required_argument, NULL, 'b'}, + {"server-bitrate-limit", required_argument, NULL, OPT_SERVER_BITRATE_LIMIT}, + {"time", required_argument, NULL, 't'}, + {"bytes", required_argument, NULL, 'n'}, + {"blockcount", required_argument, NULL, 'k'}, + {"length", required_argument, NULL, 'l'}, + {"parallel", required_argument, NULL, 'P'}, + {"reverse", no_argument, NULL, 'R'}, + {"bidir", no_argument, NULL, OPT_BIDIRECTIONAL}, + {"window", required_argument, NULL, 'w'}, + {"bind", required_argument, NULL, 'B'}, +#if defined(HAVE_SO_BINDTODEVICE) + {"bind-dev", required_argument, NULL, OPT_BIND_DEV}, +#endif /* HAVE_SO_BINDTODEVICE */ + {"cport", required_argument, NULL, OPT_CLIENT_PORT}, + {"set-mss", required_argument, NULL, 'M'}, + {"no-delay", no_argument, NULL, 'N'}, + {"version4", no_argument, NULL, '4'}, + {"version6", no_argument, NULL, '6'}, + {"tos", required_argument, NULL, 'S'}, + {"dscp", required_argument, NULL, OPT_DSCP}, + {"extra-data", required_argument, NULL, OPT_EXTRA_DATA}, +#if defined(HAVE_FLOWLABEL) + {"flowlabel", required_argument, NULL, 'L'}, +#endif /* HAVE_FLOWLABEL */ + {"zerocopy", no_argument, NULL, 'Z'}, + {"omit", required_argument, NULL, 'O'}, + {"file", required_argument, NULL, 'F'}, + {"repeating-payload", no_argument, NULL, OPT_REPEATING_PAYLOAD}, + {"timestamps", optional_argument, NULL, OPT_TIMESTAMPS}, +#if defined(HAVE_CPU_AFFINITY) + {"affinity", required_argument, NULL, 'A'}, +#endif /* HAVE_CPU_AFFINITY */ + {"title", required_argument, NULL, 'T'}, +#if defined(HAVE_TCP_CONGESTION) + {"congestion", required_argument, NULL, 'C'}, + {"linux-congestion", required_argument, NULL, 'C'}, +#endif /* HAVE_TCP_CONGESTION */ +#if defined(HAVE_SCTP_H) + {"sctp", no_argument, NULL, OPT_SCTP}, + {"nstreams", required_argument, NULL, OPT_NUMSTREAMS}, + {"xbind", required_argument, NULL, 'X'}, +#endif + {"pidfile", required_argument, NULL, 'I'}, + {"logfile", required_argument, NULL, OPT_LOGFILE}, + {"forceflush", no_argument, NULL, OPT_FORCEFLUSH}, + {"get-server-output", no_argument, NULL, OPT_GET_SERVER_OUTPUT}, + {"udp-counters-64bit", no_argument, NULL, OPT_UDP_COUNTERS_64BIT}, + {"no-fq-socket-pacing", no_argument, NULL, OPT_NO_FQ_SOCKET_PACING}, +#if defined(HAVE_DONT_FRAGMENT) + {"dont-fragment", no_argument, NULL, OPT_DONT_FRAGMENT}, +#endif /* HAVE_DONT_FRAGMENT */ +#if defined(HAVE_SSL) + {"username", required_argument, NULL, OPT_CLIENT_USERNAME}, + {"rsa-public-key-path", required_argument, NULL, OPT_CLIENT_RSA_PUBLIC_KEY}, + {"rsa-private-key-path", required_argument, NULL, OPT_SERVER_RSA_PRIVATE_KEY}, + {"authorized-users-path", required_argument, NULL, OPT_SERVER_AUTHORIZED_USERS}, + {"time-skew-threshold", required_argument, NULL, OPT_SERVER_SKEW_THRESHOLD}, +#endif /* HAVE_SSL */ + {"fq-rate", required_argument, NULL, OPT_FQ_RATE}, + {"pacing-timer", required_argument, NULL, OPT_PACING_TIMER}, + {"connect-timeout", required_argument, NULL, OPT_CONNECT_TIMEOUT}, + {"idle-timeout", required_argument, NULL, OPT_IDLE_TIMEOUT}, + {"rcv-timeout", required_argument, NULL, OPT_RCV_TIMEOUT}, + {"snd-timeout", required_argument, NULL, OPT_SND_TIMEOUT}, + {"debug", optional_argument, NULL, 'd'}, + {"help", no_argument, NULL, 'h'}, + {NULL, 0, NULL, 0} + }; + int flag; + int portno; + int blksize; + int server_flag, client_flag, rate_flag, duration_flag, rcv_timeout_flag, snd_timeout_flag; + char *endptr; +#if defined(HAVE_CPU_AFFINITY) + char* comma; +#endif /* HAVE_CPU_AFFINITY */ + char* slash; + char *p, *p1; + struct xbind_entry *xbe; + double farg; + int rcv_timeout_in = 0; + + blksize = 0; + server_flag = client_flag = rate_flag = duration_flag = rcv_timeout_flag = snd_timeout_flag =0; +#if defined(HAVE_SSL) + char *client_username = NULL, *client_rsa_public_key = NULL, *server_rsa_private_key = NULL; + FILE *ptr_file; +#endif /* HAVE_SSL */ + + while ((flag = getopt_long(argc, argv, "p:f:i:D1VJvsc:ub:t:n:k:l:P:Rw:B:M:N46S:L:ZO:F:A:T:C:dI:hX:", longopts, NULL)) != -1) { + switch (flag) { + case 'p': + portno = atoi(optarg); + if (portno < 1 || portno > 65535) { + i_errno = IEBADPORT; + return -1; + } + test->server_port = portno; + break; + case 'f': + if (!optarg) { + i_errno = IEBADFORMAT; + return -1; + } + test->settings->unit_format = *optarg; + if (test->settings->unit_format == 'k' || + test->settings->unit_format == 'K' || + test->settings->unit_format == 'm' || + test->settings->unit_format == 'M' || + test->settings->unit_format == 'g' || + test->settings->unit_format == 'G' || + test->settings->unit_format == 't' || + test->settings->unit_format == 'T') { + break; + } + else { + i_errno = IEBADFORMAT; + return -1; + } + break; + case 'i': + /* XXX: could potentially want separate stat collection and reporting intervals, + but just set them to be the same for now */ + test->stats_interval = test->reporter_interval = atof(optarg); + if ((test->stats_interval < MIN_INTERVAL || test->stats_interval > MAX_INTERVAL) && test->stats_interval != 0) { + i_errno = IEINTERVAL; + return -1; + } + break; + case 'D': + test->daemon = 1; + server_flag = 1; + break; + case '1': + test->one_off = 1; + server_flag = 1; + break; + case 'V': + test->verbose = 1; + break; + case 'J': + test->json_output = 1; + break; + case 'v': + printf("%s (cJSON %s)\n%s\n%s\n", version, cJSON_Version(), get_system_info(), + get_optional_features()); + exit(0); + case 's': + if (test->role == 'c') { + i_errno = IESERVCLIENT; + return -1; + } + iperf_set_test_role(test, 's'); + break; + case 'c': + if (test->role == 's') { + i_errno = IESERVCLIENT; + return -1; + } + iperf_set_test_role(test, 'c'); + iperf_set_test_server_hostname(test, optarg); + + if (iperf_parse_hostname(test, optarg, &p, &p1)) { +#if defined(HAVE_SO_BINDTODEVICE) + /* Get rid of the hostname we saved earlier. */ + free(iperf_get_test_server_hostname(test)); + iperf_set_test_server_hostname(test, p); + iperf_set_test_bind_dev(test, p1); +#else /* HAVE_SO_BINDTODEVICE */ + i_errno = IEBINDDEVNOSUPPORT; + return -1; +#endif /* HAVE_SO_BINDTODEVICE */ + } + break; + case 'u': + set_protocol(test, Pudp); + client_flag = 1; + break; + case OPT_SCTP: +#if defined(HAVE_SCTP_H) + set_protocol(test, Psctp); + client_flag = 1; + break; +#else /* HAVE_SCTP_H */ + i_errno = IEUNIMP; + return -1; +#endif /* HAVE_SCTP_H */ + + case OPT_NUMSTREAMS: +#if defined(linux) || defined(__FreeBSD__) + test->settings->num_ostreams = unit_atoi(optarg); + client_flag = 1; +#else /* linux */ + i_errno = IEUNIMP; + return -1; +#endif /* linux */ + case 'b': + slash = strchr(optarg, '/'); + if (slash) { + *slash = '\0'; + ++slash; + test->settings->burst = atoi(slash); + if (test->settings->burst <= 0 || + test->settings->burst > MAX_BURST) { + i_errno = IEBURST; + return -1; + } + } + test->settings->rate = unit_atof_rate(optarg); + rate_flag = 1; + client_flag = 1; + break; + case OPT_SERVER_BITRATE_LIMIT: + slash = strchr(optarg, '/'); + if (slash) { + *slash = '\0'; + ++slash; + test->settings->bitrate_limit_interval = atof(slash); + if (test->settings->bitrate_limit_interval != 0 && /* Using same Max/Min limits as for Stats Interval */ + (test->settings->bitrate_limit_interval < MIN_INTERVAL || test->settings->bitrate_limit_interval > MAX_INTERVAL) ) { + i_errno = IETOTALINTERVAL; + return -1; + } + } + test->settings->bitrate_limit = unit_atof_rate(optarg); + server_flag = 1; + break; + case 't': + test->duration = atoi(optarg); + if (test->duration > MAX_TIME) { + i_errno = IEDURATION; + return -1; + } + duration_flag = 1; + client_flag = 1; + break; + case 'n': + test->settings->bytes = unit_atoi(optarg); + client_flag = 1; + break; + case 'k': + test->settings->blocks = unit_atoi(optarg); + client_flag = 1; + break; + case 'l': + blksize = unit_atoi(optarg); + client_flag = 1; + break; + case 'P': + test->num_streams = atoi(optarg); + if (test->num_streams > MAX_STREAMS) { + i_errno = IENUMSTREAMS; + return -1; + } + client_flag = 1; + break; + case 'R': + if (test->bidirectional) { + i_errno = IEREVERSEBIDIR; + return -1; + } + iperf_set_test_reverse(test, 1); + client_flag = 1; + break; + case OPT_BIDIRECTIONAL: + if (test->reverse) { + i_errno = IEREVERSEBIDIR; + return -1; + } + iperf_set_test_bidirectional(test, 1); + client_flag = 1; + break; + case 'w': + // XXX: This is a socket buffer, not specific to TCP + // Do sanity checks as double-precision floating point + // to avoid possible integer overflows. + farg = unit_atof(optarg); + if (farg > (double) MAX_TCP_BUFFER) { + i_errno = IEBUFSIZE; + return -1; + } + test->settings->socket_bufsize = (int) farg; + client_flag = 1; + break; + + case 'B': + iperf_set_test_bind_address(test, optarg); + + if (iperf_parse_hostname(test, optarg, &p, &p1)) { +#if defined(HAVE_SO_BINDTODEVICE) + /* Get rid of the hostname we saved earlier. */ + free(iperf_get_test_bind_address(test)); + iperf_set_test_bind_address(test, p); + iperf_set_test_bind_dev(test, p1); +#else /* HAVE_SO_BINDTODEVICE */ + i_errno = IEBINDDEVNOSUPPORT; + return -1; +#endif /* HAVE_SO_BINDTODEVICE */ + } + break; +#if defined (HAVE_SO_BINDTODEVICE) + case OPT_BIND_DEV: + iperf_set_test_bind_dev(test, optarg); + break; +#endif /* HAVE_SO_BINDTODEVICE */ + case OPT_CLIENT_PORT: + portno = atoi(optarg); + if (portno < 1 || portno > 65535) { + i_errno = IEBADPORT; + return -1; + } + test->bind_port = portno; + break; + case 'M': + test->settings->mss = atoi(optarg); + if (test->settings->mss > MAX_MSS) { + i_errno = IEMSS; + return -1; + } + client_flag = 1; + break; + case 'N': + test->no_delay = 1; + client_flag = 1; + break; + case '4': + test->settings->domain = AF_INET; + break; + case '6': + test->settings->domain = AF_INET6; + break; + case 'S': + test->settings->tos = strtol(optarg, &endptr, 0); + if (endptr == optarg || + test->settings->tos < 0 || + test->settings->tos > 255) { + i_errno = IEBADTOS; + return -1; + } + client_flag = 1; + break; + case OPT_DSCP: + test->settings->tos = parse_qos(optarg); + if(test->settings->tos < 0) { + i_errno = IEBADTOS; + return -1; + } + client_flag = 1; + break; + case OPT_EXTRA_DATA: + test->extra_data = strdup(optarg); + client_flag = 1; + break; + case 'L': +#if defined(HAVE_FLOWLABEL) + test->settings->flowlabel = strtol(optarg, &endptr, 0); + if (endptr == optarg || + test->settings->flowlabel < 1 || test->settings->flowlabel > 0xfffff) { + i_errno = IESETFLOW; + return -1; + } + client_flag = 1; +#else /* HAVE_FLOWLABEL */ + i_errno = IEUNIMP; + return -1; +#endif /* HAVE_FLOWLABEL */ + break; + case 'X': + xbe = (struct xbind_entry *)malloc(sizeof(struct xbind_entry)); + if (!xbe) { + i_errno = IESETSCTPBINDX; + return -1; + } + memset(xbe, 0, sizeof(*xbe)); + xbe->name = strdup(optarg); + if (!xbe->name) { + i_errno = IESETSCTPBINDX; + return -1; + } + TAILQ_INSERT_TAIL(&test->xbind_addrs, xbe, link); + break; + case 'Z': + if (!has_sendfile()) { + i_errno = IENOSENDFILE; + return -1; + } + test->zerocopy = 1; + client_flag = 1; + break; + case OPT_REPEATING_PAYLOAD: + test->repeating_payload = 1; + client_flag = 1; + break; + case OPT_TIMESTAMPS: + iperf_set_test_timestamps(test, 1); + if (optarg) { + iperf_set_test_timestamp_format(test, optarg); + } + else { + iperf_set_test_timestamp_format(test, TIMESTAMP_FORMAT); + } + break; + case 'O': + test->omit = atoi(optarg); + if (test->omit < 0 || test->omit > 60) { + i_errno = IEOMIT; + return -1; + } + client_flag = 1; + break; + case 'F': + test->diskfile_name = optarg; + break; + case OPT_IDLE_TIMEOUT: + test->settings->idle_timeout = atoi(optarg); + if (test->settings->idle_timeout < 1 || test->settings->idle_timeout > MAX_TIME) { + i_errno = IEIDLETIMEOUT; + return -1; + } + server_flag = 1; + break; + case OPT_RCV_TIMEOUT: + rcv_timeout_in = atoi(optarg); + if (rcv_timeout_in < MIN_NO_MSG_RCVD_TIMEOUT || rcv_timeout_in > MAX_TIME * SEC_TO_mS) { + i_errno = IERCVTIMEOUT; + return -1; + } + test->settings->rcv_timeout.secs = rcv_timeout_in / SEC_TO_mS; + test->settings->rcv_timeout.usecs = (rcv_timeout_in % SEC_TO_mS) * mS_TO_US; + rcv_timeout_flag = 1; + break; +#if defined(HAVE_TCP_USER_TIMEOUT) + case OPT_SND_TIMEOUT: + test->settings->snd_timeout = atoi(optarg); + if (test->settings->snd_timeout < 0 || test->settings->snd_timeout > MAX_TIME * SEC_TO_mS) { + i_errno = IESNDTIMEOUT; + return -1; + } + snd_timeout_flag = 1; + break; +#endif /* HAVE_TCP_USER_TIMEOUT */ + case 'A': +#if defined(HAVE_CPU_AFFINITY) + test->affinity = strtol(optarg, &endptr, 0); + if (endptr == optarg || + test->affinity < 0 || test->affinity > 1024) { + i_errno = IEAFFINITY; + return -1; + } + comma = strchr(optarg, ','); + if (comma != NULL) { + test->server_affinity = atoi(comma+1); + if (test->server_affinity < 0 || test->server_affinity > 1024) { + i_errno = IEAFFINITY; + return -1; + } + client_flag = 1; + } +#else /* HAVE_CPU_AFFINITY */ + i_errno = IEUNIMP; + return -1; +#endif /* HAVE_CPU_AFFINITY */ + break; + case 'T': + test->title = strdup(optarg); + client_flag = 1; + break; + case 'C': +#if defined(HAVE_TCP_CONGESTION) + test->congestion = strdup(optarg); + client_flag = 1; +#else /* HAVE_TCP_CONGESTION */ + i_errno = IEUNIMP; + return -1; +#endif /* HAVE_TCP_CONGESTION */ + break; + case 'd': + test->debug = 1; + test->debug_level = DEBUG_LEVEL_MAX; + if (optarg) { + test->debug_level = atoi(optarg); + if (test->debug_level < 0) + test->debug_level = DEBUG_LEVEL_MAX; + } + break; + case 'I': + test->pidfile = strdup(optarg); + break; + case OPT_LOGFILE: + test->logfile = strdup(optarg); + break; + case OPT_FORCEFLUSH: + test->forceflush = 1; + break; + case OPT_GET_SERVER_OUTPUT: + test->get_server_output = 1; + client_flag = 1; + break; + case OPT_UDP_COUNTERS_64BIT: + test->udp_counters_64bit = 1; + break; + case OPT_NO_FQ_SOCKET_PACING: +#if defined(HAVE_SO_MAX_PACING_RATE) + printf("Warning: --no-fq-socket-pacing is deprecated\n"); + test->settings->fqrate = 0; + client_flag = 1; +#else /* HAVE_SO_MAX_PACING_RATE */ + i_errno = IEUNIMP; + return -1; +#endif + break; + case OPT_FQ_RATE: +#if defined(HAVE_SO_MAX_PACING_RATE) + test->settings->fqrate = unit_atof_rate(optarg); + client_flag = 1; +#else /* HAVE_SO_MAX_PACING_RATE */ + i_errno = IEUNIMP; + return -1; +#endif + break; +#if defined(HAVE_DONT_FRAGMENT) + case OPT_DONT_FRAGMENT: + test->settings->dont_fragment = 1; + client_flag = 1; + break; +#endif /* HAVE_DONT_FRAGMENT */ +#if defined(HAVE_SSL) + case OPT_CLIENT_USERNAME: + client_username = strdup(optarg); + break; + case OPT_CLIENT_RSA_PUBLIC_KEY: + client_rsa_public_key = strdup(optarg); + break; + case OPT_SERVER_RSA_PRIVATE_KEY: + server_rsa_private_key = strdup(optarg); + break; + case OPT_SERVER_AUTHORIZED_USERS: + test->server_authorized_users = strdup(optarg); + break; + case OPT_SERVER_SKEW_THRESHOLD: + test->server_skew_threshold = atoi(optarg); + if(test->server_skew_threshold <= 0){ + i_errno = IESKEWTHRESHOLD; + return -1; + } + break; +#endif /* HAVE_SSL */ + case OPT_PACING_TIMER: + test->settings->pacing_timer = unit_atoi(optarg); + client_flag = 1; + break; + case OPT_CONNECT_TIMEOUT: + test->settings->connect_timeout = unit_atoi(optarg); + client_flag = 1; + break; + case 'h': + usage_long(stdout); + exit(0); + default: + fprintf(stderr, "\n"); + usage(); + exit(1); + } + } + + /* Check flag / role compatibility. */ + if (test->role == 'c' && server_flag) { + i_errno = IESERVERONLY; + return -1; + } + if (test->role == 's' && client_flag) { + i_errno = IECLIENTONLY; + return -1; + } + +#if defined(HAVE_SSL) + + if (test->role == 's' && (client_username || client_rsa_public_key)){ + i_errno = IECLIENTONLY; + return -1; + } else if (test->role == 'c' && (client_username || client_rsa_public_key) && + !(client_username && client_rsa_public_key)) { + i_errno = IESETCLIENTAUTH; + return -1; + } else if (test->role == 'c' && (client_username && client_rsa_public_key)){ + + char *client_password = NULL; + size_t s; + if (test_load_pubkey_from_file(client_rsa_public_key) < 0){ + iperf_err(test, "%s\n", ERR_error_string(ERR_get_error(), NULL)); + i_errno = IESETCLIENTAUTH; + return -1; + } + /* Need to copy env var, so we can do a common free */ + if ((client_password = getenv("IPERF3_PASSWORD")) != NULL) + client_password = strdup(client_password); + else if (iperf_getpass(&client_password, &s, stdin) < 0){ + i_errno = IESETCLIENTAUTH; + return -1; + } + + test->settings->client_username = client_username; + test->settings->client_password = client_password; + test->settings->client_rsa_pubkey = load_pubkey_from_file(client_rsa_public_key); + free(client_rsa_public_key); + client_rsa_public_key = NULL; + } + + if (test->role == 'c' && (server_rsa_private_key || test->server_authorized_users)){ + i_errno = IESERVERONLY; + return -1; + } else if (test->role == 'c' && (test->server_skew_threshold != 0)){ + i_errno = IESERVERONLY; + return -1; + } else if (test->role == 'c' && rcv_timeout_flag && test->mode == SENDER){ + i_errno = IERVRSONLYRCVTIMEOUT; + return -1; + } else if (test->role == 's' && (server_rsa_private_key || test->server_authorized_users) && + !(server_rsa_private_key && test->server_authorized_users)) { + i_errno = IESETSERVERAUTH; + return -1; + } + + if (test->role == 's' && test->server_authorized_users) { + ptr_file =fopen(test->server_authorized_users, "r"); + if (!ptr_file) { + i_errno = IESERVERAUTHUSERS; + return -1; + } + fclose(ptr_file); + } + + if (test->role == 's' && server_rsa_private_key) { + test->server_rsa_private_key = load_privkey_from_file(server_rsa_private_key); + if (test->server_rsa_private_key == NULL){ + iperf_err(test, "%s\n", ERR_error_string(ERR_get_error(), NULL)); + i_errno = IESETSERVERAUTH; + return -1; + } + free(server_rsa_private_key); + server_rsa_private_key = NULL; + + if(test->server_skew_threshold == 0){ + // Set default value for time skew threshold + test->server_skew_threshold=10; + } + } + +#endif //HAVE_SSL + + // File cannot be transferred using UDP because of the UDP packets header (packet number, etc.) + if(test->role == 'c' && test->diskfile_name != (char*) 0 && test->protocol->id == Pudp) { + i_errno = IEUDPFILETRANSFER; + return -1; + } + + if (blksize == 0) { + if (test->protocol->id == Pudp) + blksize = 0; /* try to dynamically determine from MSS */ + else if (test->protocol->id == Psctp) + blksize = DEFAULT_SCTP_BLKSIZE; + else + blksize = DEFAULT_TCP_BLKSIZE; + } + if ((test->protocol->id != Pudp && blksize <= 0) + || blksize > MAX_BLOCKSIZE) { + i_errno = IEBLOCKSIZE; + return -1; + } + if (test->protocol->id == Pudp && + (blksize > 0 && + (blksize < MIN_UDP_BLOCKSIZE || blksize > MAX_UDP_BLOCKSIZE))) { + i_errno = IEUDPBLOCKSIZE; + return -1; + } + test->settings->blksize = blksize; + + if (!rate_flag) + test->settings->rate = test->protocol->id == Pudp ? UDP_RATE : 0; + + /* if no bytes or blocks specified, nor a duration_flag, and we have -F, + ** get the file-size as the bytes count to be transferred + */ + if (test->settings->bytes == 0 && + test->settings->blocks == 0 && + ! duration_flag && + test->diskfile_name != (char*) 0 && + test->role == 'c' + ){ + struct stat st; + if( stat(test->diskfile_name, &st) == 0 ){ + iperf_size_t file_bytes = st.st_size; + test->settings->bytes = file_bytes; + if (test->debug) + printf("End condition set to file-size: %"PRIu64" bytes\n", test->settings->bytes); + } + // if failing to read file stat, it should fallback to default duration mode + } + + if ((test->settings->bytes != 0 || test->settings->blocks != 0) && ! duration_flag) + test->duration = 0; + + /* Disallow specifying multiple test end conditions. The code actually + ** works just fine without this prohibition. As soon as any one of the + ** three possible end conditions is met, the test ends. So this check + ** could be removed if desired. + */ + if ((duration_flag && test->settings->bytes != 0) || + (duration_flag && test->settings->blocks != 0) || + (test->settings->bytes != 0 && test->settings->blocks != 0)) { + i_errno = IEENDCONDITIONS; + return -1; + } + + /* For subsequent calls to getopt */ +#ifdef __APPLE__ + optreset = 1; +#endif + optind = 0; + + if ((test->role != 'c') && (test->role != 's')) { + i_errno = IENOROLE; + return -1; + } + + /* Set Total-rate average interval to multiplicity of State interval */ + if (test->settings->bitrate_limit_interval != 0) { + test->settings->bitrate_limit_stats_per_interval = + (test->settings->bitrate_limit_interval <= test->stats_interval ? + 1 : round(test->settings->bitrate_limit_interval/test->stats_interval) ); + } + + /* Show warning if JSON output is used with explicit report format */ + if ((test->json_output) && (test->settings->unit_format != 'a')) { + warning("Report format (-f) flag ignored with JSON output (-J)"); + } + + /* Show warning if JSON output is used with verbose or debug flags */ + if (test->json_output && test->verbose) { + warning("Verbose output (-v) may interfere with JSON output (-J)"); + } + if (test->json_output && test->debug) { + warning("Debug output (-d) may interfere with JSON output (-J)"); + } + + return 0; +} + +/* + * Open the file specified by test->logfile and set test->outfile to its' FD. + */ +int iperf_open_logfile(struct iperf_test *test) +{ + test->outfile = fopen(test->logfile, "a+"); + if (test->outfile == NULL) { + i_errno = IELOGFILE; + return -1; + } + + return 0; +} + +void iperf_close_logfile(struct iperf_test *test) +{ + if (test->outfile && test->outfile != stdout) { + fclose(test->outfile); + test->outfile = NULL; + } +} + +int +iperf_set_send_state(struct iperf_test *test, signed char state) +{ + if (test->ctrl_sck >= 0) { + test->state = state; + if (Nwrite(test->ctrl_sck, (char*) &state, sizeof(state), Ptcp) < 0) { + i_errno = IESENDMESSAGE; + return -1; + } + } + return 0; +} + +void +iperf_check_throttle(struct iperf_stream *sp, struct iperf_time *nowP) +{ + struct iperf_time temp_time; + double seconds; + uint64_t bits_per_second; + + if (sp->test->done || sp->test->settings->rate == 0) + return; + iperf_time_diff(&sp->result->start_time_fixed, nowP, &temp_time); + seconds = iperf_time_in_secs(&temp_time); + bits_per_second = sp->result->bytes_sent * 8 / seconds; + if (bits_per_second < sp->test->settings->rate) { + sp->green_light = 1; + } else { + sp->green_light = 0; + } +} + +/* Verify that average traffic is not greater than the specified limit */ +void +iperf_check_total_rate(struct iperf_test *test, iperf_size_t last_interval_bytes_transferred) +{ + double seconds; + uint64_t bits_per_second; + iperf_size_t total_bytes; + int i; + + if (test->done || test->settings->bitrate_limit == 0) // Continue only if check should be done + return; + + /* Add last inetrval's transferred bytes to the array */ + if (++test->bitrate_limit_last_interval_index >= test->settings->bitrate_limit_stats_per_interval) + test->bitrate_limit_last_interval_index = 0; + test->bitrate_limit_intervals_traffic_bytes[test->bitrate_limit_last_interval_index] = last_interval_bytes_transferred; + + /* Ensure that enough stats periods passed to allow averaging throughput */ + test->bitrate_limit_stats_count += 1; + if (test->bitrate_limit_stats_count < test->settings->bitrate_limit_stats_per_interval) + return; + + /* Calculating total bytes traffic to be averaged */ + for (i = 0, total_bytes = 0; i < test->settings->bitrate_limit_stats_per_interval; i++) { + total_bytes += test->bitrate_limit_intervals_traffic_bytes[i]; + } + + seconds = test->stats_interval * test->settings->bitrate_limit_stats_per_interval; + bits_per_second = total_bytes * 8 / seconds; + if (test->debug) { + iperf_printf(test,"Interval %" PRIu64 " - throughput %" PRIu64 " bps (limit %" PRIu64 ")\n", test->bitrate_limit_stats_count, bits_per_second, test->settings->bitrate_limit); + } + + if (bits_per_second > test->settings->bitrate_limit) { + if (iperf_get_verbose(test)) + iperf_err(test, "Total throughput of %" PRIu64 " bps exceeded %" PRIu64 " bps limit", bits_per_second, test->settings->bitrate_limit); + test->bitrate_limit_exceeded = 1; + } +} + +int +iperf_send_mt(struct iperf_stream *sp) +{ + register int multisend, r, streams_active; + register struct iperf_test *test = sp->test; + struct iperf_time now; + int no_throttle_check; + + /* Can we do multisend mode? */ + if (test->settings->burst != 0) + multisend = test->settings->burst; + else if (test->settings->rate == 0) + multisend = test->multisend; + else + multisend = 1; /* nope */ + + /* Should bitrate throttle be checked for every send */ + no_throttle_check = test->settings->rate != 0 && test->settings->burst == 0; + + for (; multisend > 0; --multisend) { + if (no_throttle_check) + iperf_time_now(&now); + streams_active = 0; + { + if (sp->green_light && sp->sender) { + // XXX If we hit one of these ending conditions maybe + // want to stop even trying to send something? + if (multisend > 1 && test->settings->bytes != 0 && test->bytes_sent >= test->settings->bytes) + break; + if (multisend > 1 && test->settings->blocks != 0 && test->blocks_sent >= test->settings->blocks) + break; + if ((r = sp->snd(sp)) < 0) { + if (r == NET_SOFTERROR) + break; + i_errno = IESTREAMWRITE; + return r; + } + streams_active = 1; + test->bytes_sent += r; + if (!sp->pending_size) + ++test->blocks_sent; + if (no_throttle_check) + iperf_check_throttle(sp, &now); + } + } + if (!streams_active) + break; + } + if (!no_throttle_check) { /* Throttle check if was not checked for each send */ + iperf_time_now(&now); + if (sp->sender) + iperf_check_throttle(sp, &now); + } + return 0; +} + +int +iperf_recv_mt(struct iperf_stream *sp) +{ + int r; + struct iperf_test *test = sp->test; + + if ((r = sp->rcv(sp)) < 0) { + i_errno = IESTREAMREAD; + return r; + } + test->bytes_received += r; + ++test->blocks_received; + + return 0; +} + +int +iperf_init_test(struct iperf_test *test) +{ + struct iperf_time now; + struct iperf_stream *sp; + + if (test->protocol->init) { + if (test->protocol->init(test) < 0) + return -1; + } + + /* Init each stream. */ + if (iperf_time_now(&now) < 0) { + i_errno = IEINITTEST; + return -1; + } + SLIST_FOREACH(sp, &test->streams, streams) { + sp->result->start_time = sp->result->start_time_fixed = now; + } + + if (test->on_test_start) + test->on_test_start(test); + + return 0; +} + +static void +send_timer_proc(TimerClientData client_data, struct iperf_time *nowP) +{ + struct iperf_stream *sp = client_data.p; + + /* All we do here is set or clear the flag saying that this stream may + ** be sent to. The actual sending gets done in the send proc, after + ** checking the flag. + */ + iperf_check_throttle(sp, nowP); +} + +int +iperf_create_send_timers(struct iperf_test * test) +{ + struct iperf_time now; + struct iperf_stream *sp; + TimerClientData cd; + + if (iperf_time_now(&now) < 0) { + i_errno = IEINITTEST; + return -1; + } + SLIST_FOREACH(sp, &test->streams, streams) { + sp->green_light = 1; + if (test->settings->rate != 0 && sp->sender) { + cd.p = sp; + sp->send_timer = tmr_create(NULL, send_timer_proc, cd, test->settings->pacing_timer, 1); + if (sp->send_timer == NULL) { + i_errno = IEINITTEST; + return -1; + } + } + } + return 0; +} + +#if defined(HAVE_SSL) +int test_is_authorized(struct iperf_test *test){ + if ( !(test->server_rsa_private_key && test->server_authorized_users)) { + return 0; + } + + if (test->settings->authtoken){ + char *username = NULL, *password = NULL; + time_t ts; + int rc = decode_auth_setting(test->debug, test->settings->authtoken, test->server_rsa_private_key, &username, &password, &ts); + if (rc) { + return -1; + } + int ret = check_authentication(username, password, ts, test->server_authorized_users, test->server_skew_threshold); + if (ret == 0){ + if (test->debug) { + iperf_printf(test, report_authentication_succeeded, username, ts); + } + free(username); + free(password); + return 0; + } else { + if (test->debug) { + iperf_printf(test, report_authentication_failed, ret, username, ts); + } + free(username); + free(password); + return -1; + } + } + return -1; +} +#endif //HAVE_SSL + +/** + * iperf_exchange_parameters - handles the param_Exchange part for client + * + */ + +int +iperf_exchange_parameters(struct iperf_test *test) +{ + int s; + int32_t err; + + if (test->role == 'c') { + + if (send_parameters(test) < 0) + return -1; + + } else { + + if (get_parameters(test) < 0) + return -1; + +#if defined(HAVE_SSL) + if (test_is_authorized(test) < 0){ + if (iperf_set_send_state(test, SERVER_ERROR) != 0) + return -1; + i_errno = IEAUTHTEST; + err = htonl(i_errno); + if (Nwrite(test->ctrl_sck, (char*) &err, sizeof(err), Ptcp) < 0) { + i_errno = IECTRLWRITE; + return -1; + } + return -1; + } +#endif //HAVE_SSL + + if ((s = test->protocol->listen(test)) < 0) { + if (iperf_set_send_state(test, SERVER_ERROR) != 0) + return -1; + err = htonl(i_errno); + if (Nwrite(test->ctrl_sck, (char*) &err, sizeof(err), Ptcp) < 0) { + i_errno = IECTRLWRITE; + return -1; + } + err = htonl(errno); + if (Nwrite(test->ctrl_sck, (char*) &err, sizeof(err), Ptcp) < 0) { + i_errno = IECTRLWRITE; + return -1; + } + return -1; + } + + FD_SET(s, &test->read_set); + test->max_fd = (s > test->max_fd) ? s : test->max_fd; + test->prot_listener = s; + + // Send the control message to create streams and start the test + if (iperf_set_send_state(test, CREATE_STREAMS) != 0) + return -1; + + } + + return 0; +} + +/*************************************************************/ + +int +iperf_exchange_results(struct iperf_test *test) +{ + if (test->role == 'c') { + /* Send results to server. */ + if (send_results(test) < 0) + return -1; + /* Get server results. */ + if (get_results(test) < 0) + return -1; + } else { + /* Get client results. */ + if (get_results(test) < 0) + return -1; + /* Send results to client. */ + if (send_results(test) < 0) + return -1; + } + return 0; +} + +/*************************************************************/ + +static int +send_parameters(struct iperf_test *test) +{ + int r = 0; + cJSON *j; + + j = cJSON_CreateObject(); + if (j == NULL) { + i_errno = IESENDPARAMS; + r = -1; + } else { + if (test->protocol->id == Ptcp) + cJSON_AddTrueToObject(j, "tcp"); + else if (test->protocol->id == Pudp) + cJSON_AddTrueToObject(j, "udp"); + else if (test->protocol->id == Psctp) + cJSON_AddTrueToObject(j, "sctp"); + cJSON_AddNumberToObject(j, "omit", test->omit); + if (test->server_affinity != -1) + cJSON_AddNumberToObject(j, "server_affinity", test->server_affinity); + cJSON_AddNumberToObject(j, "time", test->duration); + cJSON_AddNumberToObject(j, "num", test->settings->bytes); + cJSON_AddNumberToObject(j, "blockcount", test->settings->blocks); + if (test->settings->mss) + cJSON_AddNumberToObject(j, "MSS", test->settings->mss); + if (test->no_delay) + cJSON_AddTrueToObject(j, "nodelay"); + cJSON_AddNumberToObject(j, "parallel", test->num_streams); + if (test->reverse) + cJSON_AddTrueToObject(j, "reverse"); + if (test->bidirectional) + cJSON_AddTrueToObject(j, "bidirectional"); + if (test->settings->socket_bufsize) + cJSON_AddNumberToObject(j, "window", test->settings->socket_bufsize); + if (test->settings->blksize) + cJSON_AddNumberToObject(j, "len", test->settings->blksize); + if (test->settings->rate) + cJSON_AddNumberToObject(j, "bandwidth", test->settings->rate); + if (test->settings->fqrate) + cJSON_AddNumberToObject(j, "fqrate", test->settings->fqrate); + if (test->settings->pacing_timer) + cJSON_AddNumberToObject(j, "pacing_timer", test->settings->pacing_timer); + if (test->settings->burst) + cJSON_AddNumberToObject(j, "burst", test->settings->burst); + if (test->settings->tos) + cJSON_AddNumberToObject(j, "TOS", test->settings->tos); + if (test->settings->flowlabel) + cJSON_AddNumberToObject(j, "flowlabel", test->settings->flowlabel); + if (test->title) + cJSON_AddStringToObject(j, "title", test->title); + if (test->extra_data) + cJSON_AddStringToObject(j, "extra_data", test->extra_data); + if (test->congestion) + cJSON_AddStringToObject(j, "congestion", test->congestion); + if (test->congestion_used) + cJSON_AddStringToObject(j, "congestion_used", test->congestion_used); + if (test->get_server_output) + cJSON_AddNumberToObject(j, "get_server_output", iperf_get_test_get_server_output(test)); + if (test->udp_counters_64bit) + cJSON_AddNumberToObject(j, "udp_counters_64bit", iperf_get_test_udp_counters_64bit(test)); + if (test->repeating_payload) + cJSON_AddNumberToObject(j, "repeating_payload", test->repeating_payload); + if (test->zerocopy) + cJSON_AddNumberToObject(j, "zerocopy", test->zerocopy); +#if defined(HAVE_DONT_FRAGMENT) + if (test->settings->dont_fragment) + cJSON_AddNumberToObject(j, "dont_fragment", test->settings->dont_fragment); +#endif /* HAVE_DONT_FRAGMENT */ +#if defined(HAVE_SSL) + /* Send authentication parameters */ + if (test->settings->client_username && test->settings->client_password && test->settings->client_rsa_pubkey){ + int rc = encode_auth_setting(test->settings->client_username, test->settings->client_password, test->settings->client_rsa_pubkey, &test->settings->authtoken); + + if (rc) { + cJSON_Delete(j); + i_errno = IESENDPARAMS; + return -1; + } + + cJSON_AddStringToObject(j, "authtoken", test->settings->authtoken); + } +#endif // HAVE_SSL + cJSON_AddStringToObject(j, "client_version", IPERF_VERSION); + + if (test->debug) { + char *str = cJSON_Print(j); + printf("send_parameters:\n%s\n", str); + cJSON_free(str); + } + + if (JSON_write(test->ctrl_sck, j) < 0) { + i_errno = IESENDPARAMS; + r = -1; + } + cJSON_Delete(j); + } + return r; +} + +/*************************************************************/ + +static int +get_parameters(struct iperf_test *test) +{ + int r = 0; + cJSON *j; + cJSON *j_p; + + j = JSON_read(test->ctrl_sck); + if (j == NULL) { + i_errno = IERECVPARAMS; + r = -1; + } else { + if (test->debug) { + char *str; + str = cJSON_Print(j); + printf("get_parameters:\n%s\n", str ); + cJSON_free(str); + } + + if ((j_p = cJSON_GetObjectItem(j, "tcp")) != NULL) + set_protocol(test, Ptcp); + if ((j_p = cJSON_GetObjectItem(j, "udp")) != NULL) + set_protocol(test, Pudp); + if ((j_p = cJSON_GetObjectItem(j, "sctp")) != NULL) + set_protocol(test, Psctp); + if ((j_p = cJSON_GetObjectItem(j, "omit")) != NULL) + test->omit = j_p->valueint; + if ((j_p = cJSON_GetObjectItem(j, "server_affinity")) != NULL) + test->server_affinity = j_p->valueint; + if ((j_p = cJSON_GetObjectItem(j, "time")) != NULL) + test->duration = j_p->valueint; + test->settings->bytes = 0; + if ((j_p = cJSON_GetObjectItem(j, "num")) != NULL) + test->settings->bytes = j_p->valueint; + test->settings->blocks = 0; + if ((j_p = cJSON_GetObjectItem(j, "blockcount")) != NULL) + test->settings->blocks = j_p->valueint; + if ((j_p = cJSON_GetObjectItem(j, "MSS")) != NULL) + test->settings->mss = j_p->valueint; + if ((j_p = cJSON_GetObjectItem(j, "nodelay")) != NULL) + test->no_delay = 1; + if ((j_p = cJSON_GetObjectItem(j, "parallel")) != NULL) + test->num_streams = j_p->valueint; + if ((j_p = cJSON_GetObjectItem(j, "reverse")) != NULL) + iperf_set_test_reverse(test, 1); + if ((j_p = cJSON_GetObjectItem(j, "bidirectional")) != NULL) + iperf_set_test_bidirectional(test, 1); + if ((j_p = cJSON_GetObjectItem(j, "window")) != NULL) + test->settings->socket_bufsize = j_p->valueint; + if ((j_p = cJSON_GetObjectItem(j, "len")) != NULL) + test->settings->blksize = j_p->valueint; + if ((j_p = cJSON_GetObjectItem(j, "bandwidth")) != NULL) + test->settings->rate = j_p->valueint; + if ((j_p = cJSON_GetObjectItem(j, "fqrate")) != NULL) + test->settings->fqrate = j_p->valueint; + if ((j_p = cJSON_GetObjectItem(j, "pacing_timer")) != NULL) + test->settings->pacing_timer = j_p->valueint; + if ((j_p = cJSON_GetObjectItem(j, "burst")) != NULL) + test->settings->burst = j_p->valueint; + if ((j_p = cJSON_GetObjectItem(j, "TOS")) != NULL) + test->settings->tos = j_p->valueint; + if ((j_p = cJSON_GetObjectItem(j, "flowlabel")) != NULL) + test->settings->flowlabel = j_p->valueint; + if ((j_p = cJSON_GetObjectItem(j, "title")) != NULL) + test->title = strdup(j_p->valuestring); + if ((j_p = cJSON_GetObjectItem(j, "extra_data")) != NULL) + test->extra_data = strdup(j_p->valuestring); + if ((j_p = cJSON_GetObjectItem(j, "congestion")) != NULL) + test->congestion = strdup(j_p->valuestring); + if ((j_p = cJSON_GetObjectItem(j, "congestion_used")) != NULL) + test->congestion_used = strdup(j_p->valuestring); + if ((j_p = cJSON_GetObjectItem(j, "get_server_output")) != NULL) + iperf_set_test_get_server_output(test, 1); + if ((j_p = cJSON_GetObjectItem(j, "udp_counters_64bit")) != NULL) + iperf_set_test_udp_counters_64bit(test, 1); + if ((j_p = cJSON_GetObjectItem(j, "repeating_payload")) != NULL) + test->repeating_payload = 1; + if ((j_p = cJSON_GetObjectItem(j, "zerocopy")) != NULL) + test->zerocopy = j_p->valueint; +#if defined(HAVE_DONT_FRAGMENT) + if ((j_p = cJSON_GetObjectItem(j, "dont_fragment")) != NULL) + test->settings->dont_fragment = j_p->valueint; +#endif /* HAVE_DONT_FRAGMENT */ +#if defined(HAVE_SSL) + if ((j_p = cJSON_GetObjectItem(j, "authtoken")) != NULL) + test->settings->authtoken = strdup(j_p->valuestring); +#endif //HAVE_SSL + if (test->mode && test->protocol->id == Ptcp && has_tcpinfo_retransmits()) + test->sender_has_retransmits = 1; + if (test->settings->rate) + cJSON_AddNumberToObject(test->json_start, "target_bitrate", test->settings->rate); + cJSON_Delete(j); + } + return r; +} + +/*************************************************************/ + +static int +send_results(struct iperf_test *test) +{ + int r = 0; + cJSON *j; + cJSON *j_streams; + struct iperf_stream *sp; + cJSON *j_stream; + int sender_has_retransmits; + iperf_size_t bytes_transferred; + int retransmits; + struct iperf_time temp_time; + double start_time, end_time; + + j = cJSON_CreateObject(); + if (j == NULL) { + i_errno = IEPACKAGERESULTS; + r = -1; + } else { + cJSON_AddNumberToObject(j, "cpu_util_total", test->cpu_util[0]); + cJSON_AddNumberToObject(j, "cpu_util_user", test->cpu_util[1]); + cJSON_AddNumberToObject(j, "cpu_util_system", test->cpu_util[2]); + if ( test->mode == RECEIVER ) + sender_has_retransmits = -1; + else + sender_has_retransmits = test->sender_has_retransmits; + cJSON_AddNumberToObject(j, "sender_has_retransmits", sender_has_retransmits); + if ( test->congestion_used ) { + cJSON_AddStringToObject(j, "congestion_used", test->congestion_used); + } + + /* If on the server and sending server output, then do this */ + if (test->role == 's' && test->get_server_output) { + if (test->json_output) { + /* Add JSON output */ + cJSON_AddItemReferenceToObject(j, "server_output_json", test->json_top); + } + else { + /* Add textual output */ + size_t buflen = 0; + + /* Figure out how much room we need to hold the complete output string */ + struct iperf_textline *t; + TAILQ_FOREACH(t, &(test->server_output_list), textlineentries) { + buflen += strlen(t->line); + } + + /* Allocate and build it up from the component lines */ + char *output = calloc(buflen + 1, 1); + TAILQ_FOREACH(t, &(test->server_output_list), textlineentries) { + strncat(output, t->line, buflen); + buflen -= strlen(t->line); + } + + cJSON_AddStringToObject(j, "server_output_text", output); + free(output); + } + } + + j_streams = cJSON_CreateArray(); + if (j_streams == NULL) { + i_errno = IEPACKAGERESULTS; + r = -1; + } else { + cJSON_AddItemToObject(j, "streams", j_streams); + SLIST_FOREACH(sp, &test->streams, streams) { + j_stream = cJSON_CreateObject(); + if (j_stream == NULL) { + i_errno = IEPACKAGERESULTS; + r = -1; + } else { + cJSON_AddItemToArray(j_streams, j_stream); + bytes_transferred = sp->sender ? (sp->result->bytes_sent - sp->result->bytes_sent_omit) : sp->result->bytes_received; + retransmits = (sp->sender && test->sender_has_retransmits) ? sp->result->stream_retrans : -1; + cJSON_AddNumberToObject(j_stream, "id", sp->id); + cJSON_AddNumberToObject(j_stream, "bytes", bytes_transferred); + cJSON_AddNumberToObject(j_stream, "retransmits", retransmits); + cJSON_AddNumberToObject(j_stream, "jitter", sp->jitter); + cJSON_AddNumberToObject(j_stream, "errors", sp->cnt_error); + cJSON_AddNumberToObject(j_stream, "omitted_errors", sp->omitted_cnt_error); + cJSON_AddNumberToObject(j_stream, "packets", sp->packet_count); + cJSON_AddNumberToObject(j_stream, "omitted_packets", sp->omitted_packet_count); + + iperf_time_diff(&sp->result->start_time, &sp->result->start_time, &temp_time); + start_time = iperf_time_in_secs(&temp_time); + iperf_time_diff(&sp->result->start_time, &sp->result->end_time, &temp_time); + end_time = iperf_time_in_secs(&temp_time); + cJSON_AddNumberToObject(j_stream, "start_time", start_time); + cJSON_AddNumberToObject(j_stream, "end_time", end_time); + + } + } + if (r == 0 && test->debug) { + char *str = cJSON_Print(j); + printf("send_results\n%s\n", str); + cJSON_free(str); + } + if (r == 0 && JSON_write(test->ctrl_sck, j) < 0) { + i_errno = IESENDRESULTS; + r = -1; + } + } + cJSON_Delete(j); + } + return r; +} + +/*************************************************************/ + +static int +get_results(struct iperf_test *test) +{ + int r = 0; + cJSON *j; + cJSON *j_cpu_util_total; + cJSON *j_cpu_util_user; + cJSON *j_cpu_util_system; + cJSON *j_remote_congestion_used; + cJSON *j_sender_has_retransmits; + int result_has_retransmits; + cJSON *j_streams; + int n, i; + cJSON *j_stream; + cJSON *j_id; + cJSON *j_bytes; + cJSON *j_retransmits; + cJSON *j_jitter; + cJSON *j_errors; + cJSON *j_omitted_errors; + cJSON *j_packets; + cJSON *j_omitted_packets; + cJSON *j_server_output; + cJSON *j_start_time, *j_end_time; + int sid; + int64_t cerror, pcount, omitted_cerror, omitted_pcount; + double jitter; + iperf_size_t bytes_transferred; + int retransmits; + struct iperf_stream *sp; + + j = JSON_read(test->ctrl_sck); + if (j == NULL) { + i_errno = IERECVRESULTS; + r = -1; + } else { + j_cpu_util_total = cJSON_GetObjectItem(j, "cpu_util_total"); + j_cpu_util_user = cJSON_GetObjectItem(j, "cpu_util_user"); + j_cpu_util_system = cJSON_GetObjectItem(j, "cpu_util_system"); + j_sender_has_retransmits = cJSON_GetObjectItem(j, "sender_has_retransmits"); + if (j_cpu_util_total == NULL || j_cpu_util_user == NULL || j_cpu_util_system == NULL || j_sender_has_retransmits == NULL) { + i_errno = IERECVRESULTS; + r = -1; + } else { + if (test->debug) { + char *str = cJSON_Print(j); + printf("get_results\n%s\n", str); + cJSON_free(str); + } + + test->remote_cpu_util[0] = j_cpu_util_total->valuedouble; + test->remote_cpu_util[1] = j_cpu_util_user->valuedouble; + test->remote_cpu_util[2] = j_cpu_util_system->valuedouble; + result_has_retransmits = j_sender_has_retransmits->valueint; + if ( test->mode == RECEIVER ) { + test->sender_has_retransmits = result_has_retransmits; + test->other_side_has_retransmits = 0; + } + else if ( test->mode == BIDIRECTIONAL ) + test->other_side_has_retransmits = result_has_retransmits; + + j_streams = cJSON_GetObjectItem(j, "streams"); + if (j_streams == NULL) { + i_errno = IERECVRESULTS; + r = -1; + } else { + n = cJSON_GetArraySize(j_streams); + for (i=0; i<n; ++i) { + j_stream = cJSON_GetArrayItem(j_streams, i); + if (j_stream == NULL) { + i_errno = IERECVRESULTS; + r = -1; + } else { + j_id = cJSON_GetObjectItem(j_stream, "id"); + j_bytes = cJSON_GetObjectItem(j_stream, "bytes"); + j_retransmits = cJSON_GetObjectItem(j_stream, "retransmits"); + j_jitter = cJSON_GetObjectItem(j_stream, "jitter"); + j_errors = cJSON_GetObjectItem(j_stream, "errors"); + j_omitted_errors = cJSON_GetObjectItem(j_stream, "omitted_errors"); + j_packets = cJSON_GetObjectItem(j_stream, "packets"); + j_omitted_packets = cJSON_GetObjectItem(j_stream, "omitted_packets"); + j_start_time = cJSON_GetObjectItem(j_stream, "start_time"); + j_end_time = cJSON_GetObjectItem(j_stream, "end_time"); + if (j_id == NULL || j_bytes == NULL || j_retransmits == NULL || j_jitter == NULL || j_errors == NULL || j_packets == NULL) { + i_errno = IERECVRESULTS; + r = -1; + } else if ( (j_omitted_errors == NULL && j_omitted_packets != NULL) || (j_omitted_errors != NULL && j_omitted_packets == NULL) ) { + /* For backward compatibility allow to not receive "omitted" statistcs */ + i_errno = IERECVRESULTS; + r = -1; + } else { + sid = j_id->valueint; + bytes_transferred = j_bytes->valueint; + retransmits = j_retransmits->valueint; + jitter = j_jitter->valuedouble; + cerror = j_errors->valueint; + pcount = j_packets->valueint; + if (j_omitted_packets != NULL) { + omitted_cerror = j_omitted_errors->valueint; + omitted_pcount = j_omitted_packets->valueint; + } + SLIST_FOREACH(sp, &test->streams, streams) + if (sp->id == sid) break; + if (sp == NULL) { + i_errno = IESTREAMID; + r = -1; + } else { + if (sp->sender) { + sp->jitter = jitter; + sp->cnt_error = cerror; + sp->peer_packet_count = pcount; + sp->result->bytes_received = bytes_transferred; + if (j_omitted_packets != NULL) { + sp->omitted_cnt_error = omitted_cerror; + sp->peer_omitted_packet_count = omitted_pcount; + } else { + sp->peer_omitted_packet_count = sp->omitted_packet_count; + if (sp->peer_omitted_packet_count > 0) { + /* -1 indicates unknown error count since it includes the omitted count */ + sp->omitted_cnt_error = (sp->cnt_error > 0) ? -1 : 0; + } else { + sp->omitted_cnt_error = sp->cnt_error; + } + } + /* + * We have to handle the possibility that + * start_time and end_time might not be + * available; this is the case for older (pre-3.2) + * servers. + * + * We need to have result structure members to hold + * the both sides' start_time and end_time. + */ + if (j_start_time && j_end_time) { + sp->result->receiver_time = j_end_time->valuedouble - j_start_time->valuedouble; + } + else { + sp->result->receiver_time = 0.0; + } + } else { + sp->peer_packet_count = pcount; + sp->result->bytes_sent = bytes_transferred; + sp->result->stream_retrans = retransmits; + if (j_omitted_packets != NULL) { + sp->peer_omitted_packet_count = omitted_pcount; + } else { + sp->peer_omitted_packet_count = sp->peer_packet_count; + } + if (j_start_time && j_end_time) { + sp->result->sender_time = j_end_time->valuedouble - j_start_time->valuedouble; + } + else { + sp->result->sender_time = 0.0; + } + } + } + } + } + } + /* + * If we're the client and we're supposed to get remote results, + * look them up and process accordingly. + */ + if (test->role == 'c' && iperf_get_test_get_server_output(test)) { + /* Look for JSON. If we find it, grab the object so it doesn't get deleted. */ + j_server_output = cJSON_DetachItemFromObject(j, "server_output_json"); + if (j_server_output != NULL) { + test->json_server_output = j_server_output; + } + else { + /* No JSON, look for textual output. Make a copy of the text for later. */ + j_server_output = cJSON_GetObjectItem(j, "server_output_text"); + if (j_server_output != NULL) { + test->server_output_text = strdup(j_server_output->valuestring); + } + } + } + } + } + + j_remote_congestion_used = cJSON_GetObjectItem(j, "congestion_used"); + if (j_remote_congestion_used != NULL) { + test->remote_congestion_used = strdup(j_remote_congestion_used->valuestring); + } + + cJSON_Delete(j); + } + return r; +} + +/*************************************************************/ + +static int +JSON_write(int fd, cJSON *json) +{ + uint32_t hsize, nsize; + char *str; + int r = 0; + + str = cJSON_PrintUnformatted(json); + if (str == NULL) + r = -1; + else { + hsize = strlen(str); + nsize = htonl(hsize); + if (Nwrite(fd, (char*) &nsize, sizeof(nsize), Ptcp) < 0) + r = -1; + else { + if (Nwrite(fd, str, hsize, Ptcp) < 0) + r = -1; + } + cJSON_free(str); + } + return r; +} + +/*************************************************************/ + +static cJSON * +JSON_read(int fd) +{ + uint32_t hsize, nsize; + size_t strsize; + char *str; + cJSON *json = NULL; + int rc; + + /* + * Read a four-byte integer, which is the length of the JSON to follow. + * Then read the JSON into a buffer and parse it. Return a parsed JSON + * structure, NULL if there was an error. + */ + if (Nread(fd, (char*) &nsize, sizeof(nsize), Ptcp) >= 0) { + hsize = ntohl(nsize); + /* Allocate a buffer to hold the JSON */ + strsize = hsize + 1; /* +1 for trailing NULL */ + if (strsize) { + str = (char *) calloc(sizeof(char), strsize); + if (str != NULL) { + rc = Nread(fd, str, hsize, Ptcp); + if (rc >= 0) { + /* + * We should be reading in the number of bytes corresponding to the + * length in that 4-byte integer. If we don't the socket might have + * prematurely closed. Only do the JSON parsing if we got the + * correct number of bytes. + */ + if (rc == hsize) { + json = cJSON_Parse(str); + } + else { + printf("WARNING: Size of data read does not correspond to offered length\n"); + } + } + } + free(str); + } + else { + printf("WARNING: Data length overflow\n"); + } + } + return json; +} + +/*************************************************************/ +/** + * add_to_interval_list -- adds new interval to the interval_list + */ + +void +add_to_interval_list(struct iperf_stream_result * rp, struct iperf_interval_results * new) +{ + struct iperf_interval_results *irp; + + irp = (struct iperf_interval_results *) malloc(sizeof(struct iperf_interval_results)); + memcpy(irp, new, sizeof(struct iperf_interval_results)); + TAILQ_INSERT_TAIL(&rp->interval_results, irp, irlistentries); +} + + +/************************************************************/ + +/** + * connect_msg -- displays connection message + * denoting sender/receiver details + * + */ + +void +connect_msg(struct iperf_stream *sp) +{ + char ipl[INET6_ADDRSTRLEN], ipr[INET6_ADDRSTRLEN]; + int lport, rport; + + if (getsockdomain(sp->socket) == AF_INET) { + inet_ntop(AF_INET, (void *) &((struct sockaddr_in *) &sp->local_addr)->sin_addr, ipl, sizeof(ipl)); + mapped_v4_to_regular_v4(ipl); + inet_ntop(AF_INET, (void *) &((struct sockaddr_in *) &sp->remote_addr)->sin_addr, ipr, sizeof(ipr)); + mapped_v4_to_regular_v4(ipr); + lport = ntohs(((struct sockaddr_in *) &sp->local_addr)->sin_port); + rport = ntohs(((struct sockaddr_in *) &sp->remote_addr)->sin_port); + } else { + inet_ntop(AF_INET6, (void *) &((struct sockaddr_in6 *) &sp->local_addr)->sin6_addr, ipl, sizeof(ipl)); + mapped_v4_to_regular_v4(ipl); + inet_ntop(AF_INET6, (void *) &((struct sockaddr_in6 *) &sp->remote_addr)->sin6_addr, ipr, sizeof(ipr)); + mapped_v4_to_regular_v4(ipr); + lport = ntohs(((struct sockaddr_in6 *) &sp->local_addr)->sin6_port); + rport = ntohs(((struct sockaddr_in6 *) &sp->remote_addr)->sin6_port); + } + + if (sp->test->json_output) + cJSON_AddItemToArray(sp->test->json_connected, iperf_json_printf("socket: %d local_host: %s local_port: %d remote_host: %s remote_port: %d", (int64_t) sp->socket, ipl, (int64_t) lport, ipr, (int64_t) rport)); + else + iperf_printf(sp->test, report_connected, sp->socket, ipl, lport, ipr, rport); +} + + +/**************************************************************************/ + +struct iperf_test * +iperf_new_test() +{ + struct iperf_test *test; + int rc; + + test = (struct iperf_test *) malloc(sizeof(struct iperf_test)); + if (!test) { + i_errno = IENEWTEST; + return NULL; + } + /* initialize everything to zero */ + memset(test, 0, sizeof(struct iperf_test)); + + /* Initialize mutex for printing output */ + pthread_mutexattr_t mutexattr; + pthread_mutexattr_init(&mutexattr); + rc = pthread_mutexattr_settype(&mutexattr, PTHREAD_MUTEX_ERRORCHECK); + if (rc != 0) { + errno = rc; + perror("iperf_new_test: pthread_mutexattr_settype"); + } + + if (pthread_mutex_init(&(test->print_mutex), &mutexattr) != 0) { + perror("iperf_new_test: pthread_mutex_init"); + } + + pthread_mutexattr_destroy(&mutexattr); + + test->settings = (struct iperf_settings *) malloc(sizeof(struct iperf_settings)); + if (!test->settings) { + free(test); + i_errno = IENEWTEST; + return NULL; + } + memset(test->settings, 0, sizeof(struct iperf_settings)); + + test->bitrate_limit_intervals_traffic_bytes = (iperf_size_t *) malloc(sizeof(iperf_size_t) * MAX_INTERVAL); + if (!test->bitrate_limit_intervals_traffic_bytes) { + free(test->settings); + free(test); + i_errno = IENEWTEST; + return NULL; + } + memset(test->bitrate_limit_intervals_traffic_bytes, 0, sizeof(sizeof(iperf_size_t) * MAX_INTERVAL)); + + /* By default all output goes to stdout */ + test->outfile = stdout; + + return test; +} + +/**************************************************************************/ + +struct protocol * +protocol_new(void) +{ + struct protocol *proto; + + proto = malloc(sizeof(struct protocol)); + if(!proto) { + return NULL; + } + memset(proto, 0, sizeof(struct protocol)); + + return proto; +} + +void +protocol_free(struct protocol *proto) +{ + free(proto); +} + +/**************************************************************************/ +int +iperf_defaults(struct iperf_test *testp) +{ + struct protocol *tcp, *udp; +#if defined(HAVE_SCTP_H) + struct protocol *sctp; +#endif /* HAVE_SCTP_H */ + + testp->omit = OMIT; + testp->duration = DURATION; + testp->diskfile_name = (char*) 0; + testp->affinity = -1; + testp->server_affinity = -1; + TAILQ_INIT(&testp->xbind_addrs); +#if defined(HAVE_CPUSET_SETAFFINITY) + CPU_ZERO(&testp->cpumask); +#endif /* HAVE_CPUSET_SETAFFINITY */ + testp->title = NULL; + testp->extra_data = NULL; + testp->congestion = NULL; + testp->congestion_used = NULL; + testp->remote_congestion_used = NULL; + testp->server_port = PORT; + testp->ctrl_sck = -1; + testp->listener = -1; + testp->prot_listener = -1; + testp->other_side_has_retransmits = 0; + + testp->stats_callback = iperf_stats_callback; + testp->reporter_callback = iperf_reporter_callback; + + testp->stats_interval = testp->reporter_interval = 1; + testp->num_streams = 1; + + testp->settings->domain = AF_UNSPEC; + testp->settings->unit_format = 'a'; + testp->settings->socket_bufsize = 0; /* use autotuning */ + testp->settings->blksize = DEFAULT_TCP_BLKSIZE; + testp->settings->rate = 0; + testp->settings->bitrate_limit = 0; + testp->settings->bitrate_limit_interval = 5; + testp->settings->bitrate_limit_stats_per_interval = 0; + testp->settings->fqrate = 0; + testp->settings->pacing_timer = DEFAULT_PACING_TIMER; + testp->settings->burst = 0; + testp->settings->mss = 0; + testp->settings->bytes = 0; + testp->settings->blocks = 0; + testp->settings->connect_timeout = -1; + testp->settings->rcv_timeout.secs = DEFAULT_NO_MSG_RCVD_TIMEOUT / SEC_TO_mS; + testp->settings->rcv_timeout.usecs = (DEFAULT_NO_MSG_RCVD_TIMEOUT % SEC_TO_mS) * mS_TO_US; + testp->zerocopy = 0; + + memset(testp->cookie, 0, COOKIE_SIZE); + + testp->multisend = 10; /* arbitrary */ + + /* Set up protocol list */ + SLIST_INIT(&testp->streams); + SLIST_INIT(&testp->protocols); + + tcp = protocol_new(); + if (!tcp) + return -1; + + tcp->id = Ptcp; + tcp->name = "TCP"; + tcp->accept = iperf_tcp_accept; + tcp->listen = iperf_tcp_listen; + tcp->connect = iperf_tcp_connect; + tcp->send = iperf_tcp_send; + tcp->recv = iperf_tcp_recv; + tcp->init = NULL; + SLIST_INSERT_HEAD(&testp->protocols, tcp, protocols); + + udp = protocol_new(); + if (!udp) { + protocol_free(tcp); + return -1; + } + + udp->id = Pudp; + udp->name = "UDP"; + udp->accept = iperf_udp_accept; + udp->listen = iperf_udp_listen; + udp->connect = iperf_udp_connect; + udp->send = iperf_udp_send; + udp->recv = iperf_udp_recv; + udp->init = iperf_udp_init; + SLIST_INSERT_AFTER(tcp, udp, protocols); + + set_protocol(testp, Ptcp); + +#if defined(HAVE_SCTP_H) + sctp = protocol_new(); + if (!sctp) { + protocol_free(tcp); + protocol_free(udp); + return -1; + } + + sctp->id = Psctp; + sctp->name = "SCTP"; + sctp->accept = iperf_sctp_accept; + sctp->listen = iperf_sctp_listen; + sctp->connect = iperf_sctp_connect; + sctp->send = iperf_sctp_send; + sctp->recv = iperf_sctp_recv; + sctp->init = iperf_sctp_init; + + SLIST_INSERT_AFTER(udp, sctp, protocols); +#endif /* HAVE_SCTP_H */ + + testp->on_new_stream = iperf_on_new_stream; + testp->on_test_start = iperf_on_test_start; + testp->on_connect = iperf_on_connect; + testp->on_test_finish = iperf_on_test_finish; + + TAILQ_INIT(&testp->server_output_list); + + return 0; +} + + +/**************************************************************************/ +void +iperf_free_test(struct iperf_test *test) +{ + struct protocol *prot; + struct iperf_stream *sp; + + /* Free streams */ + while (!SLIST_EMPTY(&test->streams)) { + sp = SLIST_FIRST(&test->streams); + SLIST_REMOVE_HEAD(&test->streams, streams); + iperf_free_stream(sp); + } + if (test->server_hostname) + free(test->server_hostname); + if (test->tmp_template) + free(test->tmp_template); + if (test->bind_address) + free(test->bind_address); + if (test->bind_dev) + free(test->bind_dev); + if (!TAILQ_EMPTY(&test->xbind_addrs)) { + struct xbind_entry *xbe; + + while (!TAILQ_EMPTY(&test->xbind_addrs)) { + xbe = TAILQ_FIRST(&test->xbind_addrs); + TAILQ_REMOVE(&test->xbind_addrs, xbe, link); + if (xbe->ai) + freeaddrinfo(xbe->ai); + free(xbe->name); + free(xbe); + } + } +#if defined(HAVE_SSL) + + if (test->server_rsa_private_key) + EVP_PKEY_free(test->server_rsa_private_key); + test->server_rsa_private_key = NULL; + + free(test->settings->authtoken); + test->settings->authtoken = NULL; + + free(test->settings->client_username); + test->settings->client_username = NULL; + + free(test->settings->client_password); + test->settings->client_password = NULL; + + if (test->settings->client_rsa_pubkey) + EVP_PKEY_free(test->settings->client_rsa_pubkey); + test->settings->client_rsa_pubkey = NULL; +#endif /* HAVE_SSL */ + + if (test->settings) + free(test->settings); + if (test->title) + free(test->title); + if (test->extra_data) + free(test->extra_data); + if (test->congestion) + free(test->congestion); + if (test->congestion_used) + free(test->congestion_used); + if (test->remote_congestion_used) + free(test->remote_congestion_used); + if (test->timestamp_format) + free(test->timestamp_format); + if (test->omit_timer != NULL) + tmr_cancel(test->omit_timer); + if (test->timer != NULL) + tmr_cancel(test->timer); + if (test->stats_timer != NULL) + tmr_cancel(test->stats_timer); + if (test->reporter_timer != NULL) + tmr_cancel(test->reporter_timer); + + /* Free protocol list */ + while (!SLIST_EMPTY(&test->protocols)) { + prot = SLIST_FIRST(&test->protocols); + SLIST_REMOVE_HEAD(&test->protocols, protocols); + free(prot); + } + + /* Destroy print mutex. iperf_printf() doesn't work after this point */ + int rc; + rc = pthread_mutex_destroy(&(test->print_mutex)); + if (rc != 0) { + errno = rc; + perror("iperf_free_test: pthread_mutex_destroy"); + } + + if (test->logfile) { + free(test->logfile); + test->logfile = NULL; + iperf_close_logfile(test); + } + + if (test->server_output_text) { + free(test->server_output_text); + test->server_output_text = NULL; + } + + if (test->json_output_string) { + free(test->json_output_string); + test->json_output_string = NULL; + } + + /* Free output line buffers, if any (on the server only) */ + struct iperf_textline *t; + while (!TAILQ_EMPTY(&test->server_output_list)) { + t = TAILQ_FIRST(&test->server_output_list); + TAILQ_REMOVE(&test->server_output_list, t, textlineentries); + free(t->line); + free(t); + } + + /* sctp_bindx: do not free the arguments, only the resolver results */ + if (!TAILQ_EMPTY(&test->xbind_addrs)) { + struct xbind_entry *xbe; + + TAILQ_FOREACH(xbe, &test->xbind_addrs, link) { + if (xbe->ai) { + freeaddrinfo(xbe->ai); + xbe->ai = NULL; + } + } + } + + /* Free interval's traffic array for average rate calculations */ + if (test->bitrate_limit_intervals_traffic_bytes != NULL) + free(test->bitrate_limit_intervals_traffic_bytes); + + /* XXX: Why are we setting these values to NULL? */ + // test->streams = NULL; + test->stats_callback = NULL; + test->reporter_callback = NULL; + free(test); +} + + +void +iperf_reset_test(struct iperf_test *test) +{ + struct iperf_stream *sp; + int i; + + iperf_close_logfile(test); + + /* Free streams */ + while (!SLIST_EMPTY(&test->streams)) { + sp = SLIST_FIRST(&test->streams); + SLIST_REMOVE_HEAD(&test->streams, streams); + iperf_free_stream(sp); + } + if (test->omit_timer != NULL) { + tmr_cancel(test->omit_timer); + test->omit_timer = NULL; + } + if (test->timer != NULL) { + tmr_cancel(test->timer); + test->timer = NULL; + } + if (test->stats_timer != NULL) { + tmr_cancel(test->stats_timer); + test->stats_timer = NULL; + } + if (test->reporter_timer != NULL) { + tmr_cancel(test->reporter_timer); + test->reporter_timer = NULL; + } + test->done = 0; + + SLIST_INIT(&test->streams); + + if (test->remote_congestion_used) + free(test->remote_congestion_used); + test->remote_congestion_used = NULL; + test->role = 's'; + test->mode = RECEIVER; + test->sender_has_retransmits = 0; + set_protocol(test, Ptcp); + test->omit = OMIT; + test->duration = DURATION; + test->server_affinity = -1; +#if defined(HAVE_CPUSET_SETAFFINITY) + CPU_ZERO(&test->cpumask); +#endif /* HAVE_CPUSET_SETAFFINITY */ + test->state = 0; + + test->ctrl_sck = -1; + test->listener = -1; + test->prot_listener = -1; + + test->bytes_sent = 0; + test->blocks_sent = 0; + + test->bytes_received = 0; + test->blocks_received = 0; + + test->other_side_has_retransmits = 0; + + test->bitrate_limit_stats_count = 0; + test->bitrate_limit_last_interval_index = 0; + test->bitrate_limit_exceeded = 0; + + for (i = 0; i < MAX_INTERVAL; i++) + test->bitrate_limit_intervals_traffic_bytes[i] = 0; + + test->reverse = 0; + test->bidirectional = 0; + test->no_delay = 0; + + FD_ZERO(&test->read_set); + FD_ZERO(&test->write_set); + + test->num_streams = 1; + test->settings->socket_bufsize = 0; + test->settings->blksize = DEFAULT_TCP_BLKSIZE; + test->settings->rate = 0; + test->settings->burst = 0; + test->settings->mss = 0; + test->settings->tos = 0; + test->settings->dont_fragment = 0; + test->zerocopy = 0; + +#if defined(HAVE_SSL) + if (test->settings->authtoken) { + free(test->settings->authtoken); + test->settings->authtoken = NULL; + } + if (test->settings->client_username) { + free(test->settings->client_username); + test->settings->client_username = NULL; + } + if (test->settings->client_password) { + free(test->settings->client_password); + test->settings->client_password = NULL; + } + if (test->settings->client_rsa_pubkey) { + EVP_PKEY_free(test->settings->client_rsa_pubkey); + test->settings->client_rsa_pubkey = NULL; + } +#endif /* HAVE_SSL */ + + memset(test->cookie, 0, COOKIE_SIZE); + test->multisend = 10; /* arbitrary */ + test->udp_counters_64bit = 0; + if (test->title) { + free(test->title); + test->title = NULL; + } + if (test->extra_data) { + free(test->extra_data); + test->extra_data = NULL; + } + + /* Free output line buffers, if any (on the server only) */ + struct iperf_textline *t; + while (!TAILQ_EMPTY(&test->server_output_list)) { + t = TAILQ_FIRST(&test->server_output_list); + TAILQ_REMOVE(&test->server_output_list, t, textlineentries); + free(t->line); + free(t); + } +} + + +/* Reset all of a test's stats back to zero. Called when the omitting +** period is over. +*/ +void +iperf_reset_stats(struct iperf_test *test) +{ + struct iperf_time now; + struct iperf_stream *sp; + struct iperf_stream_result *rp; + + test->bytes_sent = 0; + test->blocks_sent = 0; + iperf_time_now(&now); + SLIST_FOREACH(sp, &test->streams, streams) { + sp->omitted_packet_count = sp->packet_count; + sp->omitted_cnt_error = sp->cnt_error; + sp->omitted_outoforder_packets = sp->outoforder_packets; + sp->jitter = 0; + rp = sp->result; + rp->bytes_sent_omit = rp->bytes_sent; + rp->bytes_received = 0; + rp->bytes_sent_this_interval = rp->bytes_received_this_interval = 0; + if (test->sender_has_retransmits == 1) { + struct iperf_interval_results ir; /* temporary results structure */ + save_tcpinfo(sp, &ir); + rp->stream_prev_total_retrans = get_total_retransmits(&ir); + } + rp->stream_retrans = 0; + rp->start_time = now; + } +} + + +/**************************************************************************/ + +/** + * Gather statistics during a test. + * This function works for both the client and server side. + */ +void +iperf_stats_callback(struct iperf_test *test) +{ + struct iperf_stream *sp; + struct iperf_stream_result *rp = NULL; + struct iperf_interval_results *irp, temp; + struct iperf_time temp_time; + iperf_size_t total_interval_bytes_transferred = 0; + + temp.omitted = test->omitting; + SLIST_FOREACH(sp, &test->streams, streams) { + rp = sp->result; + temp.bytes_transferred = sp->sender ? rp->bytes_sent_this_interval : rp->bytes_received_this_interval; + + // Total bytes transferred this interval + total_interval_bytes_transferred += rp->bytes_sent_this_interval + rp->bytes_received_this_interval; + + irp = TAILQ_LAST(&rp->interval_results, irlisthead); + /* result->end_time contains timestamp of previous interval */ + if ( irp != NULL ) /* not the 1st interval */ + memcpy(&temp.interval_start_time, &rp->end_time, sizeof(struct iperf_time)); + else /* or use timestamp from beginning */ + memcpy(&temp.interval_start_time, &rp->start_time, sizeof(struct iperf_time)); + /* now save time of end of this interval */ + iperf_time_now(&rp->end_time); + memcpy(&temp.interval_end_time, &rp->end_time, sizeof(struct iperf_time)); + iperf_time_diff(&temp.interval_start_time, &temp.interval_end_time, &temp_time); + temp.interval_duration = iperf_time_in_secs(&temp_time); + if (test->protocol->id == Ptcp) { + if ( has_tcpinfo()) { + save_tcpinfo(sp, &temp); + if (test->sender_has_retransmits == 1) { + long total_retrans = get_total_retransmits(&temp); + temp.interval_retrans = total_retrans - rp->stream_prev_total_retrans; + rp->stream_retrans += temp.interval_retrans; + rp->stream_prev_total_retrans = total_retrans; + + temp.snd_cwnd = get_snd_cwnd(&temp); + if (temp.snd_cwnd > rp->stream_max_snd_cwnd) { + rp->stream_max_snd_cwnd = temp.snd_cwnd; + } + + temp.snd_wnd = get_snd_wnd(&temp); + if (temp.snd_wnd > rp->stream_max_snd_wnd) { + rp->stream_max_snd_wnd = temp.snd_wnd; + } + + temp.rtt = get_rtt(&temp); + if (temp.rtt > rp->stream_max_rtt) { + rp->stream_max_rtt = temp.rtt; + } + if (rp->stream_min_rtt == 0 || + temp.rtt < rp->stream_min_rtt) { + rp->stream_min_rtt = temp.rtt; + } + rp->stream_sum_rtt += temp.rtt; + rp->stream_count_rtt++; + + temp.rttvar = get_rttvar(&temp); + temp.pmtu = get_pmtu(&temp); + } + } + } else { + if (irp == NULL) { + temp.interval_packet_count = sp->packet_count; + temp.interval_outoforder_packets = sp->outoforder_packets; + temp.interval_cnt_error = sp->cnt_error; + } else { + temp.interval_packet_count = sp->packet_count - irp->packet_count; + temp.interval_outoforder_packets = sp->outoforder_packets - irp->outoforder_packets; + temp.interval_cnt_error = sp->cnt_error - irp->cnt_error; + } + temp.packet_count = sp->packet_count; + temp.jitter = sp->jitter; + temp.outoforder_packets = sp->outoforder_packets; + temp.cnt_error = sp->cnt_error; + } + add_to_interval_list(rp, &temp); + rp->bytes_sent_this_interval = rp->bytes_received_this_interval = 0; + } + + /* Verify that total server's throughput is not above specified limit */ + if (test->role == 's') { + iperf_check_total_rate(test, total_interval_bytes_transferred); + } +} + +/** + * Print intermediate results during a test (interval report). + * Uses print_interval_results to print the results for each stream, + * then prints an interval summary for all streams in this + * interval. + */ +static void +iperf_print_intermediate(struct iperf_test *test) +{ + struct iperf_stream *sp = NULL; + struct iperf_interval_results *irp; + struct iperf_time temp_time; + cJSON *json_interval; + cJSON *json_interval_streams; + + int lower_mode, upper_mode; + int current_mode; + + /* + * Due to timing oddities, there can be cases, especially on the + * server side, where at the end of a test there is a fairly short + * interval with no data transferred. This could caused by + * the control and data flows sharing the same path in the network, + * and having the control messages for stopping the test being + * queued behind the data packets. + * + * We'd like to try to omit that last interval when it happens, to + * avoid cluttering data and output with useless stuff. + * So we're going to try to ignore very short intervals (less than + * 10% of the interval time) that have no data. + */ + int interval_ok = 0; + SLIST_FOREACH(sp, &test->streams, streams) { + irp = TAILQ_LAST(&sp->result->interval_results, irlisthead); + if (irp) { + iperf_time_diff(&irp->interval_start_time, &irp->interval_end_time, &temp_time); + double interval_len = iperf_time_in_secs(&temp_time); + if (test->debug) { + printf("interval_len %f bytes_transferred %" PRIu64 "\n", interval_len, irp->bytes_transferred); + } + + /* + * If the interval is at least 10% the normal interval + * length, or if there were actual bytes transferred, + * then we want to keep this interval. + */ + if (interval_len >= test->stats_interval * 0.10 || + irp->bytes_transferred > 0) { + interval_ok = 1; + if (test->debug) { + printf("interval forces keep\n"); + } + } + } + } + if (!interval_ok) { + if (test->debug) { + printf("ignoring short interval with no data\n"); + } + return; + } + + if (test->json_output) { + json_interval = cJSON_CreateObject(); + if (json_interval == NULL) + return; + cJSON_AddItemToArray(test->json_intervals, json_interval); + json_interval_streams = cJSON_CreateArray(); + if (json_interval_streams == NULL) + return; + cJSON_AddItemToObject(json_interval, "streams", json_interval_streams); + } else { + json_interval = NULL; + json_interval_streams = NULL; + } + + /* + * We must to sum streams separately. + * For bidirectional mode we must to display + * information about sender and receiver streams. + * For client side we must handle sender streams + * firstly and receiver streams for server side. + * The following design allows us to do this. + */ + + if (test->mode == BIDIRECTIONAL) { + if (test->role == 'c') { + lower_mode = -1; + upper_mode = 0; + } else { + lower_mode = 0; + upper_mode = 1; + } + } else { + lower_mode = test->mode; + upper_mode = lower_mode; + } + + + for (current_mode = lower_mode; current_mode <= upper_mode; ++current_mode) { + char ubuf[UNIT_LEN]; + char nbuf[UNIT_LEN]; + char mbuf[UNIT_LEN]; + char zbuf[] = " "; + + iperf_size_t bytes = 0; + double bandwidth; + int retransmits = 0; + double start_time, end_time; + + int64_t total_packets = 0, lost_packets = 0; + double avg_jitter = 0.0, lost_percent; + int stream_must_be_sender = current_mode * current_mode; + + char *sum_name; + + /* Print stream role just for bidirectional mode. */ + + if (test->mode == BIDIRECTIONAL) { + sprintf(mbuf, "[%s-%s]", stream_must_be_sender?"TX":"RX", test->role == 'c'?"C":"S"); + } else { + mbuf[0] = '\0'; + zbuf[0] = '\0'; + } + + SLIST_FOREACH(sp, &test->streams, streams) { + if (sp->sender == stream_must_be_sender) { + print_interval_results(test, sp, json_interval_streams); + /* sum up all streams */ + irp = TAILQ_LAST(&sp->result->interval_results, irlisthead); + if (irp == NULL) { + iperf_err(test, + "iperf_print_intermediate error: interval_results is NULL"); + return; + } + bytes += irp->bytes_transferred; + if (test->protocol->id == Ptcp) { + if (test->sender_has_retransmits == 1) { + retransmits += irp->interval_retrans; + } + } else { + total_packets += irp->interval_packet_count; + lost_packets += irp->interval_cnt_error; + avg_jitter += irp->jitter; + } + } + } + + /* next build string with sum of all streams */ + if (test->num_streams > 1 || test->json_output) { + /* + * With BIDIR give a different JSON object name to the one sent/receive sums. + * The different name is given to the data sent from the server, which is + * the "reverse" channel. This makes sure that the name reported on the server + * and client are compatible, and the names are the same as with non-bidir, + * except for when reverse is used. + */ + sum_name = "sum"; + if (test->mode == BIDIRECTIONAL) { + if ((test->role == 'c' && !stream_must_be_sender) || + (test->role != 'c' && stream_must_be_sender)) + { + sum_name = "sum_bidir_reverse"; + } + } + + sp = SLIST_FIRST(&test->streams); /* reset back to 1st stream */ + /* Only do this of course if there was a first stream */ + if (sp) { + irp = TAILQ_LAST(&sp->result->interval_results, irlisthead); /* use 1st stream for timing info */ + + unit_snprintf(ubuf, UNIT_LEN, (double) bytes, 'A'); + bandwidth = (double) bytes / (double) irp->interval_duration; + unit_snprintf(nbuf, UNIT_LEN, bandwidth, test->settings->unit_format); + + iperf_time_diff(&sp->result->start_time,&irp->interval_start_time, &temp_time); + start_time = iperf_time_in_secs(&temp_time); + iperf_time_diff(&sp->result->start_time,&irp->interval_end_time, &temp_time); + end_time = iperf_time_in_secs(&temp_time); + if (test->protocol->id == Ptcp || test->protocol->id == Psctp) { + if (test->sender_has_retransmits == 1 && stream_must_be_sender) { + /* Interval sum, TCP with retransmits. */ + if (test->json_output) + cJSON_AddItemToObject(json_interval, sum_name, iperf_json_printf("start: %f end: %f seconds: %f bytes: %d bits_per_second: %f retransmits: %d omitted: %b sender: %b", (double) start_time, (double) end_time, (double) irp->interval_duration, (int64_t) bytes, bandwidth * 8, (int64_t) retransmits, irp->omitted, stream_must_be_sender)); /* XXX irp->omitted or test->omitting? */ + else + iperf_printf(test, report_sum_bw_retrans_format, mbuf, start_time, end_time, ubuf, nbuf, retransmits, irp->omitted?report_omitted:""); /* XXX irp->omitted or test->omitting? */ + } else { + /* Interval sum, TCP without retransmits. */ + if (test->json_output) + cJSON_AddItemToObject(json_interval, sum_name, iperf_json_printf("start: %f end: %f seconds: %f bytes: %d bits_per_second: %f omitted: %b sender: %b", (double) start_time, (double) end_time, (double) irp->interval_duration, (int64_t) bytes, bandwidth * 8, test->omitting, stream_must_be_sender)); + else + iperf_printf(test, report_sum_bw_format, mbuf, start_time, end_time, ubuf, nbuf, test->omitting?report_omitted:""); + } + } else { + /* Interval sum, UDP. */ + if (stream_must_be_sender) { + if (test->json_output) + cJSON_AddItemToObject(json_interval, sum_name, iperf_json_printf("start: %f end: %f seconds: %f bytes: %d bits_per_second: %f packets: %d omitted: %b sender: %b", (double) start_time, (double) end_time, (double) irp->interval_duration, (int64_t) bytes, bandwidth * 8, (int64_t) total_packets, test->omitting, stream_must_be_sender)); + else + iperf_printf(test, report_sum_bw_udp_sender_format, mbuf, start_time, end_time, ubuf, nbuf, zbuf, total_packets, test->omitting?report_omitted:""); + } else { + avg_jitter /= test->num_streams; + if (total_packets > 0) { + lost_percent = 100.0 * lost_packets / total_packets; + } + else { + lost_percent = 0.0; + } + if (test->json_output) + cJSON_AddItemToObject(json_interval, sum_name, iperf_json_printf("start: %f end: %f seconds: %f bytes: %d bits_per_second: %f jitter_ms: %f lost_packets: %d packets: %d lost_percent: %f omitted: %b sender: %b", (double) start_time, (double) end_time, (double) irp->interval_duration, (int64_t) bytes, bandwidth * 8, (double) avg_jitter * 1000.0, (int64_t) lost_packets, (int64_t) total_packets, (double) lost_percent, test->omitting, stream_must_be_sender)); + else + iperf_printf(test, report_sum_bw_udp_format, mbuf, start_time, end_time, ubuf, nbuf, avg_jitter * 1000.0, lost_packets, total_packets, lost_percent, test->omitting?report_omitted:""); + } + } + } + } + } +} + +/** + * Print overall summary statistics at the end of a test. + */ +static void +iperf_print_results(struct iperf_test *test) +{ + + cJSON *json_summary_streams = NULL; + + int lower_mode, upper_mode; + int current_mode; + + char *sum_sent_name, *sum_received_name, *sum_name; + + int tmp_sender_has_retransmits = test->sender_has_retransmits; + + /* print final summary for all intervals */ + + if (test->json_output) { + json_summary_streams = cJSON_CreateArray(); + if (json_summary_streams == NULL) + return; + cJSON_AddItemToObject(test->json_end, "streams", json_summary_streams); + } else { + iperf_printf(test, "%s", report_bw_separator); + if (test->verbose) + iperf_printf(test, "%s", report_summary); + if (test->protocol->id == Ptcp || test->protocol->id == Psctp) { + if (test->sender_has_retransmits || test->other_side_has_retransmits) { + if (test->bidirectional) + iperf_printf(test, "%s", report_bw_retrans_header_bidir); + else + iperf_printf(test, "%s", report_bw_retrans_header); + } + else { + if (test->bidirectional) + iperf_printf(test, "%s", report_bw_header_bidir); + else + iperf_printf(test, "%s", report_bw_header); + } + } else { + if (test->bidirectional) + iperf_printf(test, "%s", report_bw_udp_header_bidir); + else + iperf_printf(test, "%s", report_bw_udp_header); + } + } + + /* + * We must to sum streams separately. + * For bidirectional mode we must to display + * information about sender and receiver streams. + * For client side we must handle sender streams + * firstly and receiver streams for server side. + * The following design allows us to do this. + */ + + if (test->mode == BIDIRECTIONAL) { + if (test->role == 'c') { + lower_mode = -1; + upper_mode = 0; + } else { + lower_mode = 0; + upper_mode = 1; + } + } else { + lower_mode = test->mode; + upper_mode = lower_mode; + } + + + for (current_mode = lower_mode; current_mode <= upper_mode; ++current_mode) { + cJSON *json_summary_stream = NULL; + int64_t total_retransmits = 0; + int64_t total_packets = 0, lost_packets = 0; + int64_t sender_packet_count = 0, receiver_packet_count = 0; /* for this stream, this interval */ + int64_t sender_omitted_packet_count = 0, receiver_omitted_packet_count = 0; /* for this stream, this interval */ + int64_t sender_total_packets = 0, receiver_total_packets = 0; /* running total */ + char ubuf[UNIT_LEN]; + char nbuf[UNIT_LEN]; + struct stat sb; + char sbuf[UNIT_LEN]; + struct iperf_stream *sp = NULL; + iperf_size_t bytes_sent, total_sent = 0; + iperf_size_t bytes_received, total_received = 0; + double start_time, end_time = 0.0, avg_jitter = 0.0, lost_percent = 0.0; + double sender_time = 0.0, receiver_time = 0.0; + struct iperf_time temp_time; + double bandwidth; + + char mbuf[UNIT_LEN]; + int stream_must_be_sender = current_mode * current_mode; + + + /* Print stream role just for bidirectional mode. */ + + if (test->mode == BIDIRECTIONAL) { + sprintf(mbuf, "[%s-%s]", stream_must_be_sender?"TX":"RX", test->role == 'c'?"C":"S"); + } else { + mbuf[0] = '\0'; + } + + /* Get sender_has_retransmits for each sender side (client and server) */ + if (test->mode == BIDIRECTIONAL && stream_must_be_sender) + test->sender_has_retransmits = tmp_sender_has_retransmits; + else if (test->mode == BIDIRECTIONAL && !stream_must_be_sender) + test->sender_has_retransmits = test->other_side_has_retransmits; + + start_time = 0.; + sp = SLIST_FIRST(&test->streams); + + /* + * If there is at least one stream, then figure out the length of time + * we were running the tests and print out some statistics about + * the streams. It's possible to not have any streams at all + * if the client got interrupted before it got to do anything. + * + * Also note that we try to keep separate values for the sender + * and receiver ending times. Earlier iperf (3.1 and earlier) + * servers didn't send that to the clients, so in this case we fall + * back to using the client's ending timestamp. The fallback is + * basically emulating what iperf 3.1 did. + */ + + if (sp) { + iperf_time_diff(&sp->result->start_time, &sp->result->end_time, &temp_time); + end_time = iperf_time_in_secs(&temp_time); + if (sp->sender) { + sp->result->sender_time = end_time; + if (sp->result->receiver_time == 0.0) { + sp->result->receiver_time = sp->result->sender_time; + } + } + else { + sp->result->receiver_time = end_time; + if (sp->result->sender_time == 0.0) { + sp->result->sender_time = sp->result->receiver_time; + } + } + sender_time = sp->result->sender_time; + receiver_time = sp->result->receiver_time; + SLIST_FOREACH(sp, &test->streams, streams) { + if (sp->sender == stream_must_be_sender) { + if (test->json_output) { + json_summary_stream = cJSON_CreateObject(); + if (json_summary_stream == NULL) + return; + cJSON_AddItemToArray(json_summary_streams, json_summary_stream); + } + + bytes_sent = sp->result->bytes_sent - sp->result->bytes_sent_omit; + bytes_received = sp->result->bytes_received; + total_sent += bytes_sent; + total_received += bytes_received; + + if (sp->sender) { + sender_packet_count = sp->packet_count; + sender_omitted_packet_count = sp->omitted_packet_count; + receiver_packet_count = sp->peer_packet_count; + receiver_omitted_packet_count = sp->peer_omitted_packet_count; + } + else { + sender_packet_count = sp->peer_packet_count; + sender_omitted_packet_count = sp->peer_omitted_packet_count; + receiver_packet_count = sp->packet_count; + receiver_omitted_packet_count = sp->omitted_packet_count; + } + + if (test->protocol->id == Ptcp || test->protocol->id == Psctp) { + if (test->sender_has_retransmits) { + total_retransmits += sp->result->stream_retrans; + } + } else { + /* + * Running total of the total number of packets. Use the sender packet count if we + * have it, otherwise use the receiver packet count. + */ + int64_t packet_count = sender_packet_count ? sender_packet_count : receiver_packet_count; + total_packets += (packet_count - sp->omitted_packet_count); + sender_total_packets += (sender_packet_count - sender_omitted_packet_count); + receiver_total_packets += (receiver_packet_count - receiver_omitted_packet_count); + lost_packets += sp->cnt_error; + if (sp->omitted_cnt_error > -1) + lost_packets -= sp->omitted_cnt_error; + avg_jitter += sp->jitter; + } + + unit_snprintf(ubuf, UNIT_LEN, (double) bytes_sent, 'A'); + if (sender_time > 0.0) { + bandwidth = (double) bytes_sent / (double) sender_time; + } + else { + bandwidth = 0.0; + } + unit_snprintf(nbuf, UNIT_LEN, bandwidth, test->settings->unit_format); + if (test->protocol->id == Ptcp || test->protocol->id == Psctp) { + if (test->sender_has_retransmits) { + /* Sender summary, TCP and SCTP with retransmits. */ + if (test->json_output) + cJSON_AddItemToObject(json_summary_stream, report_sender, iperf_json_printf("socket: %d start: %f end: %f seconds: %f bytes: %d bits_per_second: %f retransmits: %d max_snd_cwnd: %d max_snd_wnd: %d max_rtt: %d min_rtt: %d mean_rtt: %d sender: %b", (int64_t) sp->socket, (double) start_time, (double) sender_time, (double) sender_time, (int64_t) bytes_sent, bandwidth * 8, (int64_t) sp->result->stream_retrans, (int64_t) sp->result->stream_max_snd_cwnd, (int64_t) sp->result->stream_max_snd_wnd, (int64_t) sp->result->stream_max_rtt, (int64_t) sp->result->stream_min_rtt, (int64_t) ((sp->result->stream_count_rtt == 0) ? 0 : sp->result->stream_sum_rtt / sp->result->stream_count_rtt), stream_must_be_sender)); + else + if (test->role == 's' && !sp->sender) { + if (test->verbose) + iperf_printf(test, report_sender_not_available_format, sp->socket); + } + else { + iperf_printf(test, report_bw_retrans_format, sp->socket, mbuf, start_time, sender_time, ubuf, nbuf, sp->result->stream_retrans, report_sender); + } + } else { + /* Sender summary, TCP and SCTP without retransmits. */ + if (test->json_output) + cJSON_AddItemToObject(json_summary_stream, report_sender, iperf_json_printf("socket: %d start: %f end: %f seconds: %f bytes: %d bits_per_second: %f sender: %b", (int64_t) sp->socket, (double) start_time, (double) sender_time, (double) sender_time, (int64_t) bytes_sent, bandwidth * 8, stream_must_be_sender)); + else + if (test->role == 's' && !sp->sender) { + if (test->verbose) + iperf_printf(test, report_sender_not_available_format, sp->socket); + } + else { + iperf_printf(test, report_bw_format, sp->socket, mbuf, start_time, sender_time, ubuf, nbuf, report_sender); + } + } + } else { + /* Sender summary, UDP. */ + if (sender_packet_count - sender_omitted_packet_count > 0) { + lost_percent = 100.0 * (sp->cnt_error - sp->omitted_cnt_error) / (sender_packet_count - sender_omitted_packet_count); + } + else { + lost_percent = 0.0; + } + if (test->json_output) { + /* + * For historical reasons, we only emit one JSON + * object for the UDP summary, and it contains + * information for both the sender and receiver + * side. + * + * The JSON format as currently defined only includes one + * value for the number of packets. We usually want that + * to be the sender's value (how many packets were sent + * by the sender). However this value might not be + * available on the receiver in certain circumstances + * specifically on the server side for a normal test or + * the client side for a reverse-mode test. If this + * is the case, then use the receiver's count of packets + * instead. + */ + int64_t packet_count = sender_packet_count ? sender_packet_count : receiver_packet_count; + cJSON_AddItemToObject(json_summary_stream, "udp", iperf_json_printf("socket: %d start: %f end: %f seconds: %f bytes: %d bits_per_second: %f jitter_ms: %f lost_packets: %d packets: %d lost_percent: %f out_of_order: %d sender: %b", (int64_t) sp->socket, (double) start_time, (double) sender_time, (double) sender_time, (int64_t) bytes_sent, bandwidth * 8, (double) sp->jitter * 1000.0, (int64_t) (sp->cnt_error - sp->omitted_cnt_error), (int64_t) (packet_count - sp->omitted_packet_count), (double) lost_percent, (int64_t) (sp->outoforder_packets - sp->omitted_outoforder_packets), stream_must_be_sender)); + } + else { + /* + * Due to ordering of messages on the control channel, + * the server cannot report on client-side summary + * statistics. If we're the server, omit one set of + * summary statistics to avoid giving meaningless + * results. + */ + if (test->role == 's' && !sp->sender) { + if (test->verbose) + iperf_printf(test, report_sender_not_available_format, sp->socket); + } + else { + iperf_printf(test, report_bw_udp_format, sp->socket, mbuf, start_time, sender_time, ubuf, nbuf, 0.0, (int64_t) 0, (sender_packet_count - sender_omitted_packet_count), (double) 0, report_sender); + } + if ((sp->outoforder_packets - sp->omitted_outoforder_packets) > 0) + iperf_printf(test, report_sum_outoforder, mbuf, start_time, sender_time, (sp->outoforder_packets - sp->omitted_outoforder_packets)); + } + } + + if (sp->diskfile_fd >= 0) { + if (fstat(sp->diskfile_fd, &sb) == 0) { + /* In the odd case that it's a zero-sized file, say it was all transferred. */ + int percent_sent = 100, percent_received = 100; + if (sb.st_size > 0) { + percent_sent = (int) ( ( (double) bytes_sent / (double) sb.st_size ) * 100.0 ); + percent_received = (int) ( ( (double) bytes_received / (double) sb.st_size ) * 100.0 ); + } + unit_snprintf(sbuf, UNIT_LEN, (double) sb.st_size, 'A'); + if (test->json_output) + cJSON_AddItemToObject(json_summary_stream, "diskfile", iperf_json_printf("sent: %d received: %d size: %d percent_sent: %d percent_received: %d filename: %s", (int64_t) bytes_sent, (int64_t) bytes_received, (int64_t) sb.st_size, (int64_t) percent_sent, (int64_t) percent_received, test->diskfile_name)); + else + if (stream_must_be_sender) { + iperf_printf(test, report_diskfile, ubuf, sbuf, percent_sent, test->diskfile_name); + } + else { + unit_snprintf(ubuf, UNIT_LEN, (double) bytes_received, 'A'); + iperf_printf(test, report_diskfile, ubuf, sbuf, percent_received, test->diskfile_name); + } + } + } + + unit_snprintf(ubuf, UNIT_LEN, (double) bytes_received, 'A'); + if (receiver_time > 0) { + bandwidth = (double) bytes_received / (double) receiver_time; + } + else { + bandwidth = 0.0; + } + unit_snprintf(nbuf, UNIT_LEN, bandwidth, test->settings->unit_format); + if (test->protocol->id == Ptcp || test->protocol->id == Psctp) { + /* Receiver summary, TCP and SCTP */ + if (test->json_output) + cJSON_AddItemToObject(json_summary_stream, report_receiver, iperf_json_printf("socket: %d start: %f end: %f seconds: %f bytes: %d bits_per_second: %f sender: %b", (int64_t) sp->socket, (double) start_time, (double) receiver_time, (double) end_time, (int64_t) bytes_received, bandwidth * 8, stream_must_be_sender)); + else + if (test->role == 's' && sp->sender) { + if (test->verbose) + iperf_printf(test, report_receiver_not_available_format, sp->socket); + } + else { + iperf_printf(test, report_bw_format, sp->socket, mbuf, start_time, receiver_time, ubuf, nbuf, report_receiver); + } + } + else { + /* + * Receiver summary, UDP. Note that JSON was emitted with + * the sender summary, so we only deal with human-readable + * data here. + */ + if (! test->json_output) { + if (receiver_packet_count - receiver_omitted_packet_count > 0 && sp->omitted_cnt_error > -1) { + lost_percent = 100.0 * (sp->cnt_error - sp->omitted_cnt_error) / (receiver_packet_count - receiver_omitted_packet_count); + } + else { + lost_percent = 0.0; + } + + if (test->role == 's' && sp->sender) { + if (test->verbose) + iperf_printf(test, report_receiver_not_available_format, sp->socket); + } + else { + if (sp->omitted_cnt_error > -1) { + iperf_printf(test, report_bw_udp_format, sp->socket, mbuf, start_time, receiver_time, ubuf, nbuf, sp->jitter * 1000.0, (sp->cnt_error - sp->omitted_cnt_error), (receiver_packet_count - receiver_omitted_packet_count), lost_percent, report_receiver); + } else { + iperf_printf(test, report_bw_udp_format_no_omitted_error, sp->socket, mbuf, start_time, receiver_time, ubuf, nbuf, sp->jitter * 1000.0, (receiver_packet_count - receiver_omitted_packet_count), report_receiver); + } + } + } + } + } + } + } + + if (test->num_streams > 1 || test->json_output) { + /* + * With BIDIR give a different JSON object name to the one sent/receive sums. + * The different name is given to the data sent from the server, which is + * the "reverse" channel. This makes sure that the name reported on the server + * and client are compatible, and the names are the same as with non-bidir, + * except for when reverse is used. + */ + sum_name = "sum"; + sum_sent_name = "sum_sent"; + sum_received_name = "sum_received"; + if (test->mode == BIDIRECTIONAL) { + if ((test->role == 'c' && !stream_must_be_sender) || + (test->role != 'c' && stream_must_be_sender)) + { + sum_name = "sum_bidir_reverse"; + sum_sent_name = "sum_sent_bidir_reverse"; + sum_received_name = "sum_received_bidir_reverse"; + } + + } + + unit_snprintf(ubuf, UNIT_LEN, (double) total_sent, 'A'); + /* If no tests were run, arbitrarily set bandwidth to 0. */ + if (sender_time > 0.0) { + bandwidth = (double) total_sent / (double) sender_time; + } + else { + bandwidth = 0.0; + } + unit_snprintf(nbuf, UNIT_LEN, bandwidth, test->settings->unit_format); + if (test->protocol->id == Ptcp || test->protocol->id == Psctp) { + if (test->sender_has_retransmits) { + /* Summary sum, TCP with retransmits. */ + if (test->json_output) + cJSON_AddItemToObject(test->json_end, sum_sent_name, iperf_json_printf("start: %f end: %f seconds: %f bytes: %d bits_per_second: %f retransmits: %d sender: %b", (double) start_time, (double) sender_time, (double) sender_time, (int64_t) total_sent, bandwidth * 8, (int64_t) total_retransmits, stream_must_be_sender)); + else + if (test->role == 's' && !stream_must_be_sender) { + if (test->verbose) + iperf_printf(test, report_sender_not_available_summary_format, "SUM"); + } + else { + iperf_printf(test, report_sum_bw_retrans_format, mbuf, start_time, sender_time, ubuf, nbuf, total_retransmits, report_sender); + } + } else { + /* Summary sum, TCP without retransmits. */ + if (test->json_output) + cJSON_AddItemToObject(test->json_end, sum_sent_name, iperf_json_printf("start: %f end: %f seconds: %f bytes: %d bits_per_second: %f sender: %b", (double) start_time, (double) sender_time, (double) sender_time, (int64_t) total_sent, bandwidth * 8, stream_must_be_sender)); + else + if (test->role == 's' && !stream_must_be_sender) { + if (test->verbose) + iperf_printf(test, report_sender_not_available_summary_format, "SUM"); + } + else { + iperf_printf(test, report_sum_bw_format, mbuf, start_time, sender_time, ubuf, nbuf, report_sender); + } + } + unit_snprintf(ubuf, UNIT_LEN, (double) total_received, 'A'); + /* If no tests were run, set received bandwidth to 0 */ + if (receiver_time > 0.0) { + bandwidth = (double) total_received / (double) receiver_time; + } + else { + bandwidth = 0.0; + } + unit_snprintf(nbuf, UNIT_LEN, bandwidth, test->settings->unit_format); + if (test->json_output) + cJSON_AddItemToObject(test->json_end, sum_received_name, iperf_json_printf("start: %f end: %f seconds: %f bytes: %d bits_per_second: %f sender: %b", (double) start_time, (double) receiver_time, (double) receiver_time, (int64_t) total_received, bandwidth * 8, stream_must_be_sender)); + else + if (test->role == 's' && stream_must_be_sender) { + if (test->verbose) + iperf_printf(test, report_receiver_not_available_summary_format, "SUM"); + } + else { + iperf_printf(test, report_sum_bw_format, mbuf, start_time, receiver_time, ubuf, nbuf, report_receiver); + } + } else { + /* Summary sum, UDP. */ + avg_jitter /= test->num_streams; + /* If no packets were sent, arbitrarily set loss percentage to 0. */ + if (total_packets > 0) { + lost_percent = 100.0 * lost_packets / total_packets; + } + else { + lost_percent = 0.0; + } + if (test->json_output) { + /* + * Original, summary structure. Using this + * structure is not recommended due to + * ambiguities between the sender and receiver. + */ + cJSON_AddItemToObject(test->json_end, sum_name, iperf_json_printf("start: %f end: %f seconds: %f bytes: %d bits_per_second: %f jitter_ms: %f lost_packets: %d packets: %d lost_percent: %f sender: %b", (double) start_time, (double) receiver_time, (double) receiver_time, (int64_t) total_sent, bandwidth * 8, (double) avg_jitter * 1000.0, (int64_t) lost_packets, (int64_t) total_packets, (double) lost_percent, stream_must_be_sender)); + /* + * Separate sum_sent and sum_received structures. + * Using these structures to get the most complete + * information about UDP transfer. + */ + cJSON_AddItemToObject(test->json_end, sum_sent_name, iperf_json_printf("start: %f end: %f seconds: %f bytes: %d bits_per_second: %f jitter_ms: %f lost_packets: %d packets: %d lost_percent: %f sender: %b", (double) start_time, (double) sender_time, (double) sender_time, (int64_t) total_sent, (double) total_sent * 8 / sender_time, (double) 0.0, (int64_t) 0, (int64_t) sender_total_packets, (double) 0.0, 1)); + cJSON_AddItemToObject(test->json_end, sum_received_name, iperf_json_printf("start: %f end: %f seconds: %f bytes: %d bits_per_second: %f jitter_ms: %f lost_packets: %d packets: %d lost_percent: %f sender: %b", (double) start_time, (double) receiver_time, (double) receiver_time, (int64_t) total_received, (double) total_received * 8 / receiver_time, (double) avg_jitter * 1000.0, (int64_t) lost_packets, (int64_t) receiver_total_packets, (double) lost_percent, 0)); + } else { + /* + * On the client we have both sender and receiver overall summary + * stats. On the server we have only the side that was on the + * server. Output whatever we have. + */ + if (! (test->role == 's' && !stream_must_be_sender) ) { + unit_snprintf(ubuf, UNIT_LEN, (double) total_sent, 'A'); + iperf_printf(test, report_sum_bw_udp_format, mbuf, start_time, sender_time, ubuf, nbuf, 0.0, (int64_t) 0, sender_total_packets, 0.0, report_sender); + } + if (! (test->role == 's' && stream_must_be_sender) ) { + + unit_snprintf(ubuf, UNIT_LEN, (double) total_received, 'A'); + /* Compute received bandwidth. */ + if (end_time > 0.0) { + bandwidth = (double) total_received / (double) receiver_time; + } + else { + bandwidth = 0.0; + } + unit_snprintf(nbuf, UNIT_LEN, bandwidth, test->settings->unit_format); + iperf_printf(test, report_sum_bw_udp_format, mbuf, start_time, receiver_time, ubuf, nbuf, avg_jitter * 1000.0, lost_packets, receiver_total_packets, lost_percent, report_receiver); + } + } + } + } + + if (test->json_output && current_mode == upper_mode) { + cJSON_AddItemToObject(test->json_end, "cpu_utilization_percent", iperf_json_printf("host_total: %f host_user: %f host_system: %f remote_total: %f remote_user: %f remote_system: %f", (double) test->cpu_util[0], (double) test->cpu_util[1], (double) test->cpu_util[2], (double) test->remote_cpu_util[0], (double) test->remote_cpu_util[1], (double) test->remote_cpu_util[2])); + if (test->protocol->id == Ptcp) { + char *snd_congestion = NULL, *rcv_congestion = NULL; + if (stream_must_be_sender) { + snd_congestion = test->congestion_used; + rcv_congestion = test->remote_congestion_used; + } + else { + snd_congestion = test->remote_congestion_used; + rcv_congestion = test->congestion_used; + } + if (snd_congestion) { + cJSON_AddStringToObject(test->json_end, "sender_tcp_congestion", snd_congestion); + } + if (rcv_congestion) { + cJSON_AddStringToObject(test->json_end, "receiver_tcp_congestion", rcv_congestion); + } + } + } + else { + if (test->verbose) { + if (stream_must_be_sender) { + if (test->bidirectional) { + iperf_printf(test, report_cpu, report_local, stream_must_be_sender?report_sender:report_receiver, test->cpu_util[0], test->cpu_util[1], test->cpu_util[2], report_remote, stream_must_be_sender?report_receiver:report_sender, test->remote_cpu_util[0], test->remote_cpu_util[1], test->remote_cpu_util[2]); + iperf_printf(test, report_cpu, report_local, !stream_must_be_sender?report_sender:report_receiver, test->cpu_util[0], test->cpu_util[1], test->cpu_util[2], report_remote, !stream_must_be_sender?report_receiver:report_sender, test->remote_cpu_util[0], test->remote_cpu_util[1], test->remote_cpu_util[2]); + } else + iperf_printf(test, report_cpu, report_local, stream_must_be_sender?report_sender:report_receiver, test->cpu_util[0], test->cpu_util[1], test->cpu_util[2], report_remote, stream_must_be_sender?report_receiver:report_sender, test->remote_cpu_util[0], test->remote_cpu_util[1], test->remote_cpu_util[2]); + } + if (test->protocol->id == Ptcp) { + char *snd_congestion = NULL, *rcv_congestion = NULL; + if (stream_must_be_sender) { + snd_congestion = test->congestion_used; + rcv_congestion = test->remote_congestion_used; + } + else { + snd_congestion = test->remote_congestion_used; + rcv_congestion = test->congestion_used; + } + if (snd_congestion) { + iperf_printf(test, "snd_tcp_congestion %s\n", snd_congestion); + } + if (rcv_congestion) { + iperf_printf(test, "rcv_tcp_congestion %s\n", rcv_congestion); + } + } + } + + /* Print server output if we're on the client and it was requested/provided */ + if (test->role == 'c' && iperf_get_test_get_server_output(test) && !test->json_output) { + if (test->json_server_output) { + char *str = cJSON_Print(test->json_server_output); + iperf_printf(test, "\nServer JSON output:\n%s\n", str); + cJSON_free(str); + cJSON_Delete(test->json_server_output); + test->json_server_output = NULL; + } + if (test->server_output_text) { + iperf_printf(test, "\nServer output:\n%s\n", test->server_output_text); + test->server_output_text = NULL; + } + } + } + } + + /* Set real sender_has_retransmits for current side */ + if (test->mode == BIDIRECTIONAL) + test->sender_has_retransmits = tmp_sender_has_retransmits; +} + +/**************************************************************************/ + +/** + * Main report-printing callback. + * Prints results either during a test (interval report only) or + * after the entire test has been run (last interval report plus + * overall summary). + */ +void +iperf_reporter_callback(struct iperf_test *test) +{ + switch (test->state) { + case TEST_RUNNING: + case STREAM_RUNNING: + /* print interval results for each stream */ + iperf_print_intermediate(test); + break; + case TEST_END: + case DISPLAY_RESULTS: + iperf_print_intermediate(test); + iperf_print_results(test); + break; + } + +} + +/** + * Print the interval results for one stream. + * This function needs to know about the overall test so it can determine the + * context for printing headers, separators, etc. + */ +static void +print_interval_results(struct iperf_test *test, struct iperf_stream *sp, cJSON *json_interval_streams) +{ + char ubuf[UNIT_LEN]; + char nbuf[UNIT_LEN]; + char cbuf[UNIT_LEN]; + char mbuf[UNIT_LEN]; + char zbuf[] = " "; + double st = 0., et = 0.; + struct iperf_time temp_time; + struct iperf_interval_results *irp = NULL; + double bandwidth, lost_percent; + + if (test->mode == BIDIRECTIONAL) { + sprintf(mbuf, "[%s-%s]", sp->sender?"TX":"RX", test->role == 'c'?"C":"S"); + } else { + mbuf[0] = '\0'; + zbuf[0] = '\0'; + } + + irp = TAILQ_LAST(&sp->result->interval_results, irlisthead); /* get last entry in linked list */ + if (irp == NULL) { + iperf_err(test, "print_interval_results error: interval_results is NULL"); + return; + } + if (!test->json_output) { + /* First stream? */ + if (sp == SLIST_FIRST(&test->streams)) { + /* It it's the first interval, print the header; + ** else if there's more than one stream, print the separator; + ** else nothing. + */ + if (iperf_time_compare(&sp->result->start_time, &irp->interval_start_time) == 0) { + if (test->protocol->id == Ptcp || test->protocol->id == Psctp) { + if (test->sender_has_retransmits == 1) { + if (test->bidirectional) + iperf_printf(test, "%s", report_bw_retrans_cwnd_header_bidir); + else + iperf_printf(test, "%s", report_bw_retrans_cwnd_header); + } + else { + if (test->bidirectional) + iperf_printf(test, "%s", report_bw_header_bidir); + else + iperf_printf(test, "%s", report_bw_header); + } + } else { + if (test->mode == SENDER) { + iperf_printf(test, "%s", report_bw_udp_sender_header); + } else if (test->mode == RECEIVER){ + iperf_printf(test, "%s", report_bw_udp_header); + } else { + /* BIDIRECTIONAL */ + iperf_printf(test, "%s", report_bw_udp_header_bidir); + } + } + } else if (test->num_streams > 1) + iperf_printf(test, "%s", report_bw_separator); + } + } + + unit_snprintf(ubuf, UNIT_LEN, (double) (irp->bytes_transferred), 'A'); + if (irp->interval_duration > 0.0) { + bandwidth = (double) irp->bytes_transferred / (double) irp->interval_duration; + } + else { + bandwidth = 0.0; + } + unit_snprintf(nbuf, UNIT_LEN, bandwidth, test->settings->unit_format); + + iperf_time_diff(&sp->result->start_time, &irp->interval_start_time, &temp_time); + st = iperf_time_in_secs(&temp_time); + iperf_time_diff(&sp->result->start_time, &irp->interval_end_time, &temp_time); + et = iperf_time_in_secs(&temp_time); + + if (test->protocol->id == Ptcp || test->protocol->id == Psctp) { + if (test->sender_has_retransmits == 1 && sp->sender) { + /* Interval, TCP with retransmits. */ + if (test->json_output) + cJSON_AddItemToArray(json_interval_streams, iperf_json_printf("socket: %d start: %f end: %f seconds: %f bytes: %d bits_per_second: %f retransmits: %d snd_cwnd: %d snd_wnd: %d rtt: %d rttvar: %d pmtu: %d omitted: %b sender: %b", (int64_t) sp->socket, (double) st, (double) et, (double) irp->interval_duration, (int64_t) irp->bytes_transferred, bandwidth * 8, (int64_t) irp->interval_retrans, (int64_t) irp->snd_cwnd, (int64_t) irp->snd_wnd, (int64_t) irp->rtt, (int64_t) irp->rttvar, (int64_t) irp->pmtu, irp->omitted, sp->sender)); + else { + unit_snprintf(cbuf, UNIT_LEN, irp->snd_cwnd, 'A'); + iperf_printf(test, report_bw_retrans_cwnd_format, sp->socket, mbuf, st, et, ubuf, nbuf, irp->interval_retrans, cbuf, irp->omitted?report_omitted:""); + } + } else { + /* Interval, TCP without retransmits. */ + if (test->json_output) + cJSON_AddItemToArray(json_interval_streams, iperf_json_printf("socket: %d start: %f end: %f seconds: %f bytes: %d bits_per_second: %f omitted: %b sender: %b", (int64_t) sp->socket, (double) st, (double) et, (double) irp->interval_duration, (int64_t) irp->bytes_transferred, bandwidth * 8, irp->omitted, sp->sender)); + else + iperf_printf(test, report_bw_format, sp->socket, mbuf, st, et, ubuf, nbuf, irp->omitted?report_omitted:""); + } + } else { + /* Interval, UDP. */ + if (sp->sender) { + if (test->json_output) + cJSON_AddItemToArray(json_interval_streams, iperf_json_printf("socket: %d start: %f end: %f seconds: %f bytes: %d bits_per_second: %f packets: %d omitted: %b sender: %b", (int64_t) sp->socket, (double) st, (double) et, (double) irp->interval_duration, (int64_t) irp->bytes_transferred, bandwidth * 8, (int64_t) irp->interval_packet_count, irp->omitted, sp->sender)); + else + iperf_printf(test, report_bw_udp_sender_format, sp->socket, mbuf, st, et, ubuf, nbuf, zbuf, irp->interval_packet_count, irp->omitted?report_omitted:""); + } else { + if (irp->interval_packet_count > 0) { + lost_percent = 100.0 * irp->interval_cnt_error / irp->interval_packet_count; + } + else { + lost_percent = 0.0; + } + if (test->json_output) + cJSON_AddItemToArray(json_interval_streams, iperf_json_printf("socket: %d start: %f end: %f seconds: %f bytes: %d bits_per_second: %f jitter_ms: %f lost_packets: %d packets: %d lost_percent: %f omitted: %b sender: %b", (int64_t) sp->socket, (double) st, (double) et, (double) irp->interval_duration, (int64_t) irp->bytes_transferred, bandwidth * 8, (double) irp->jitter * 1000.0, (int64_t) irp->interval_cnt_error, (int64_t) irp->interval_packet_count, (double) lost_percent, irp->omitted, sp->sender)); + else + iperf_printf(test, report_bw_udp_format, sp->socket, mbuf, st, et, ubuf, nbuf, irp->jitter * 1000.0, irp->interval_cnt_error, irp->interval_packet_count, lost_percent, irp->omitted?report_omitted:""); + } + } + + if (test->logfile || test->forceflush) + iflush(test); +} + +/**************************************************************************/ +void +iperf_free_stream(struct iperf_stream *sp) +{ + struct iperf_interval_results *irp, *nirp; + + /* XXX: need to free interval list too! */ + munmap(sp->buffer, sp->test->settings->blksize); + close(sp->buffer_fd); + if (sp->diskfile_fd >= 0) + close(sp->diskfile_fd); + for (irp = TAILQ_FIRST(&sp->result->interval_results); irp != NULL; irp = nirp) { + nirp = TAILQ_NEXT(irp, irlistentries); + free(irp); + } + free(sp->result); + if (sp->send_timer != NULL) + tmr_cancel(sp->send_timer); + free(sp); +} + +/**************************************************************************/ +struct iperf_stream * +iperf_new_stream(struct iperf_test *test, int s, int sender) +{ + struct iperf_stream *sp; + int ret = 0; + + char template[1024]; + if (test->tmp_template) { + snprintf(template, sizeof(template) / sizeof(char), "%s", test->tmp_template); + } else { + //find the system temporary dir *unix, windows, cygwin support + char* tempdir = getenv("TMPDIR"); + if (tempdir == 0){ + tempdir = getenv("TEMP"); + } + if (tempdir == 0){ + tempdir = getenv("TMP"); + } + if (tempdir == 0){ +#if defined(__ANDROID__) + tempdir = "/data/local/tmp"; +#else + tempdir = "/tmp"; +#endif + } + snprintf(template, sizeof(template) / sizeof(char), "%s/iperf3.XXXXXX", tempdir); + } + + sp = (struct iperf_stream *) malloc(sizeof(struct iperf_stream)); + if (!sp) { + i_errno = IECREATESTREAM; + return NULL; + } + + memset(sp, 0, sizeof(struct iperf_stream)); + + sp->sender = sender; + sp->test = test; + sp->settings = test->settings; + sp->result = (struct iperf_stream_result *) malloc(sizeof(struct iperf_stream_result)); + if (!sp->result) { + free(sp); + i_errno = IECREATESTREAM; + return NULL; + } + + memset(sp->result, 0, sizeof(struct iperf_stream_result)); + TAILQ_INIT(&sp->result->interval_results); + + /* Create and randomize the buffer */ + sp->buffer_fd = mkstemp(template); + if (sp->buffer_fd == -1) { + i_errno = IECREATESTREAM; + free(sp->result); + free(sp); + return NULL; + } + if (unlink(template) < 0) { + i_errno = IECREATESTREAM; + free(sp->result); + free(sp); + return NULL; + } + if (ftruncate(sp->buffer_fd, test->settings->blksize) < 0) { + i_errno = IECREATESTREAM; + free(sp->result); + free(sp); + return NULL; + } + sp->buffer = (char *) mmap(NULL, test->settings->blksize, PROT_READ|PROT_WRITE, MAP_PRIVATE, sp->buffer_fd, 0); + if (sp->buffer == MAP_FAILED) { + i_errno = IECREATESTREAM; + free(sp->result); + free(sp); + return NULL; + } + sp->pending_size = 0; + + /* Set socket */ + sp->socket = s; + + sp->snd = test->protocol->send; + sp->rcv = test->protocol->recv; + + if (test->diskfile_name != (char*) 0) { + sp->diskfile_fd = open(test->diskfile_name, sender ? O_RDONLY : (O_WRONLY|O_CREAT|O_TRUNC), S_IRUSR|S_IWUSR); + if (sp->diskfile_fd == -1) { + i_errno = IEFILE; + munmap(sp->buffer, sp->test->settings->blksize); + free(sp->result); + free(sp); + return NULL; + } + sp->snd2 = sp->snd; + sp->snd = diskfile_send; + sp->rcv2 = sp->rcv; + sp->rcv = diskfile_recv; + } else + sp->diskfile_fd = -1; + + /* Initialize stream */ + if (test->repeating_payload) + fill_with_repeating_pattern(sp->buffer, test->settings->blksize); + else + ret = readentropy(sp->buffer, test->settings->blksize); + + if ((ret < 0) || (iperf_init_stream(sp, test) < 0)) { + close(sp->buffer_fd); + munmap(sp->buffer, sp->test->settings->blksize); + free(sp->result); + free(sp); + return NULL; + } + iperf_add_stream(test, sp); + + return sp; +} + +/**************************************************************************/ +int +iperf_common_sockopts(struct iperf_test *test, int s) +{ + int opt; + + /* Set IP TOS */ + if ((opt = test->settings->tos)) { + if (getsockdomain(s) == AF_INET6) { +#ifdef IPV6_TCLASS + if (setsockopt(s, IPPROTO_IPV6, IPV6_TCLASS, &opt, sizeof(opt)) < 0) { + i_errno = IESETCOS; + return -1; + } + + /* if the control connection was established with a mapped v4 address + then set IP_TOS on v6 stream socket as well */ + if (iperf_get_mapped_v4(test)) { + if (setsockopt(s, IPPROTO_IP, IP_TOS, &opt, sizeof(opt)) < 0) { + /* ignore any failure of v4 TOS in IPv6 case */ + } + } +#else + i_errno = IESETCOS; + return -1; +#endif + } else { + if (setsockopt(s, IPPROTO_IP, IP_TOS, &opt, sizeof(opt)) < 0) { + i_errno = IESETTOS; + return -1; + } + } + } + return 0; +} + +/**************************************************************************/ +int +iperf_init_stream(struct iperf_stream *sp, struct iperf_test *test) +{ + int opt; + socklen_t len; + + len = sizeof(struct sockaddr_storage); + if (getsockname(sp->socket, (struct sockaddr *) &sp->local_addr, &len) < 0) { + i_errno = IEINITSTREAM; + return -1; + } + len = sizeof(struct sockaddr_storage); + if (getpeername(sp->socket, (struct sockaddr *) &sp->remote_addr, &len) < 0) { + i_errno = IEINITSTREAM; + return -1; + } + +#if defined(HAVE_DONT_FRAGMENT) + /* Set Don't Fragment (DF). Only applicable to IPv4/UDP tests. */ + if (iperf_get_test_protocol_id(test) == Pudp && + getsockdomain(sp->socket) == AF_INET && + iperf_get_dont_fragment(test)) { + + /* + * There are multiple implementations of this feature depending on the OS. + * We need to handle separately Linux, UNIX, and Windows, as well as + * the case that DF isn't supported at all (such as on macOS). + */ +#if defined(IP_MTU_DISCOVER) /* Linux version of IP_DONTFRAG */ + opt = IP_PMTUDISC_DO; + if (setsockopt(sp->socket, IPPROTO_IP, IP_MTU_DISCOVER, &opt, sizeof(opt)) < 0) { + i_errno = IESETDONTFRAGMENT; + return -1; + } +#else +#if defined(IP_DONTFRAG) /* UNIX does IP_DONTFRAG */ + opt = 1; + if (setsockopt(sp->socket, IPPROTO_IP, IP_DONTFRAG, &opt, sizeof(opt)) < 0) { + i_errno = IESETDONTFRAGMENT; + return -1; + } +#else +#if defined(IP_DONTFRAGMENT) /* Windows does IP_DONTFRAGMENT */ + opt = 1; + if (setsockopt(sp->socket, IPPROTO_IP, IP_DONTFRAGMENT, &opt, sizeof(opt)) < 0) { + i_errno = IESETDONTFRAGMENT; + return -1; + } +#else + i_errno = IESETDONTFRAGMENT; + return -1; +#endif /* IP_DONTFRAGMENT */ +#endif /* IP_DONTFRAG */ +#endif /* IP_MTU_DISCOVER */ + } +#endif /* HAVE_DONT_FRAGMENT */ + + return 0; +} + +/**************************************************************************/ +void +iperf_add_stream(struct iperf_test *test, struct iperf_stream *sp) +{ + int i; + struct iperf_stream *n, *prev; + + if (SLIST_EMPTY(&test->streams)) { + SLIST_INSERT_HEAD(&test->streams, sp, streams); + sp->id = 1; + } else { + // for (n = test->streams, i = 2; n->next; n = n->next, ++i); + // NOTE: this would ideally be set to 1, however this will not + // be changed since it is not causing a significant problem + // and changing it would break multi-stream tests between old + // and new iperf3 versions. + i = 2; + prev = NULL; + SLIST_FOREACH(n, &test->streams, streams) { + prev = n; + ++i; + } + if (prev) { + SLIST_INSERT_AFTER(prev, sp, streams); + sp->id = i; + } + } +} + +/* This pair of routines gets inserted into the snd/rcv function pointers +** when there's a -F flag. They handle the file stuff and call the real +** snd/rcv functions, which have been saved in snd2/rcv2. +** +** The advantage of doing it this way is that in the much more common +** case of no -F flag, there is zero extra overhead. +*/ + +static int +diskfile_send(struct iperf_stream *sp) +{ + int r; + int buffer_left = sp->diskfile_left; // represents total data in buffer to be sent out + static int rtot; + + /* if needed, read enough data from the disk to fill up the buffer */ + if (sp->diskfile_left < sp->test->settings->blksize && !sp->test->done) { + r = read(sp->diskfile_fd, sp->buffer, sp->test->settings->blksize - + sp->diskfile_left); + buffer_left += r; + rtot += r; + if (sp->test->debug) { + printf("read %d bytes from file, %d total\n", r, rtot); + } + + // If the buffer doesn't contain a full buffer at this point, + // adjust the size of the data to send. + if (buffer_left != sp->test->settings->blksize) { + if (sp->test->debug) + printf("possible eof\n"); + // setting data size to be sent, + // which is less than full block/buffer size + // (to be used by iperf_tcp_send, etc.) + sp->pending_size = buffer_left; + } + + // If there's no work left, we're done. + if (buffer_left == 0) { + sp->test->done = 1; + if (sp->test->debug) + printf("done\n"); + } + } + + // If there's no data left in the file or in the buffer, we're done. + // No more data available to be sent. + // Return without sending data to the network + if( sp->test->done || buffer_left == 0 ){ + if (sp->test->debug) + printf("already done\n"); + sp->test->done = 1; + return 0; + } + + r = sp->snd2(sp); + if (r < 0) { + return r; + } + /* + * Compute how much data is in the buffer but didn't get sent. + * If there are bytes that got left behind, slide them to the + * front of the buffer so they can hopefully go out on the next + * pass. + */ + sp->diskfile_left = buffer_left - r; + if (sp->diskfile_left && sp->diskfile_left < sp->test->settings->blksize) { + memcpy(sp->buffer, + sp->buffer + (sp->test->settings->blksize - sp->diskfile_left), + sp->diskfile_left); + if (sp->test->debug) + printf("Shifting %d bytes by %d\n", sp->diskfile_left, (sp->test->settings->blksize - sp->diskfile_left)); + } + return r; +} + +static int +diskfile_recv(struct iperf_stream *sp) +{ + int r; + + r = sp->rcv2(sp); + if (r > 0) { + // NOTE: Currently ignoring the return value of writing to disk + (void) (write(sp->diskfile_fd, sp->buffer, r) + 1); + } + return r; +} + + +void +iperf_catch_sigend(void (*handler)(int)) +{ +#ifdef SIGINT + signal(SIGINT, handler); +#endif +#ifdef SIGTERM + signal(SIGTERM, handler); +#endif +#ifdef SIGHUP + signal(SIGHUP, handler); +#endif +} + +/** + * Called as a result of getting a signal. + * Depending on the current state of the test (and the role of this + * process) compute and report one more set of ending statistics + * before cleaning up and exiting. + */ +void +iperf_got_sigend(struct iperf_test *test) +{ + /* + * If we're the client, or if we're a server and running a test, + * then dump out the accumulated stats so far. + */ + if (test->role == 'c' || + (test->role == 's' && test->state == TEST_RUNNING)) { + + test->done = 1; + cpu_util(test->cpu_util); + test->stats_callback(test); + test->state = DISPLAY_RESULTS; /* change local state only */ + if (test->on_test_finish) + test->on_test_finish(test); + test->reporter_callback(test); + } + + if (test->ctrl_sck >= 0) { + test->state = (test->role == 'c') ? CLIENT_TERMINATE : SERVER_TERMINATE; + (void) Nwrite(test->ctrl_sck, (char*) &test->state, sizeof(signed char), Ptcp); + } + i_errno = (test->role == 'c') ? IECLIENTTERM : IESERVERTERM; + iperf_errexit(test, "interrupt - %s", iperf_strerror(i_errno)); +} + +/* Try to write a PID file if requested, return -1 on an error. */ +int +iperf_create_pidfile(struct iperf_test *test) +{ + if (test->pidfile) { + int fd; + char buf[8]; + + /* See if the file already exists and we can read it. */ + fd = open(test->pidfile, O_RDONLY, 0); + if (fd >= 0) { + if (read(fd, buf, sizeof(buf) - 1) >= 0) { + + /* We read some bytes, see if they correspond to a valid PID */ + pid_t pid; + pid = atoi(buf); + if (pid > 0) { + + /* See if the process exists. */ + if (kill(pid, 0) == 0) { + /* + * Make sure not to try to delete existing PID file by + * scribbling over the pathname we'd use to refer to it. + * Then exit with an error. + */ + free(test->pidfile); + test->pidfile = NULL; + iperf_errexit(test, "Another instance of iperf3 appears to be running"); + } + } + } + } + + /* + * File didn't exist, we couldn't read it, or it didn't correspond to + * a running process. Try to create it. + */ + fd = open(test->pidfile, O_WRONLY | O_CREAT | O_TRUNC, S_IRUSR|S_IWUSR); + if (fd < 0) { + return -1; + } + snprintf(buf, sizeof(buf), "%d", getpid()); /* no trailing newline */ + if (write(fd, buf, strlen(buf)) < 0) { + (void)close(fd); + return -1; + } + if (close(fd) < 0) { + return -1; + }; + } + return 0; +} + +/* Get rid of a PID file, return -1 on error. */ +int +iperf_delete_pidfile(struct iperf_test *test) +{ + if (test->pidfile) { + if (unlink(test->pidfile) < 0) { + return -1; + } + } + return 0; +} + +int +iperf_json_start(struct iperf_test *test) +{ + test->json_top = cJSON_CreateObject(); + if (test->json_top == NULL) + return -1; + test->json_start = cJSON_CreateObject(); + if (test->json_start == NULL) + return -1; + cJSON_AddItemToObject(test->json_top, "start", test->json_start); + test->json_connected = cJSON_CreateArray(); + if (test->json_connected == NULL) + return -1; + cJSON_AddItemToObject(test->json_start, "connected", test->json_connected); + test->json_intervals = cJSON_CreateArray(); + if (test->json_intervals == NULL) + return -1; + cJSON_AddItemToObject(test->json_top, "intervals", test->json_intervals); + test->json_end = cJSON_CreateObject(); + if (test->json_end == NULL) + return -1; + cJSON_AddItemToObject(test->json_top, "end", test->json_end); + return 0; +} + +int +iperf_json_finish(struct iperf_test *test) +{ + if (test->json_top) { + if (test->title) { + cJSON_AddStringToObject(test->json_top, "title", test->title); + } + if (test->extra_data) { + cJSON_AddStringToObject(test->json_top, "extra_data", test->extra_data); + } + /* Include server output */ + if (test->json_server_output) { + cJSON_AddItemToObject(test->json_top, "server_output_json", test->json_server_output); + } + if (test->server_output_text) { + cJSON_AddStringToObject(test->json_top, "server_output_text", test->server_output_text); + } + // Get ASCII rendering of JSON structure. Then make our + // own copy of it and return the storage that cJSON allocated + // on our behalf. We keep our own copy around. + char *str = cJSON_Print(test->json_top); + if (str == NULL) { + return -1; + } + test->json_output_string = strdup(str); + cJSON_free(str); + if (test->json_output_string == NULL) { + return -1; + } + + if (pthread_mutex_lock(&(test->print_mutex)) != 0) { + perror("iperf_json_finish: pthread_mutex_lock"); + } + fprintf(test->outfile, "%s\n", test->json_output_string); + if (pthread_mutex_unlock(&(test->print_mutex)) != 0) { + perror("iperf_json_finish: pthread_mutex_unlock"); + } + iflush(test); + cJSON_Delete(test->json_top); + test->json_top = NULL; + } + test->json_start = test->json_connected = test->json_intervals = test->json_server_output = test->json_end = NULL; + return 0; +} + + +/* CPU affinity stuff - Linux, FreeBSD, and Windows only. */ + +int +iperf_setaffinity(struct iperf_test *test, int affinity) +{ +#if defined(HAVE_SCHED_SETAFFINITY) + cpu_set_t cpu_set; + + CPU_ZERO(&cpu_set); + CPU_SET(affinity, &cpu_set); + if (sched_setaffinity(0, sizeof(cpu_set_t), &cpu_set) != 0) { + i_errno = IEAFFINITY; + return -1; + } + return 0; +#elif defined(HAVE_CPUSET_SETAFFINITY) + cpuset_t cpumask; + + if(cpuset_getaffinity(CPU_LEVEL_WHICH, CPU_WHICH_PID, -1, + sizeof(cpuset_t), &test->cpumask) != 0) { + i_errno = IEAFFINITY; + return -1; + } + + CPU_ZERO(&cpumask); + CPU_SET(affinity, &cpumask); + + if(cpuset_setaffinity(CPU_LEVEL_WHICH,CPU_WHICH_PID, -1, + sizeof(cpuset_t), &cpumask) != 0) { + i_errno = IEAFFINITY; + return -1; + } + return 0; +#elif defined(HAVE_SETPROCESSAFFINITYMASK) + HANDLE process = GetCurrentProcess(); + DWORD_PTR processAffinityMask = 1 << affinity; + + if (SetProcessAffinityMask(process, processAffinityMask) == 0) { + i_errno = IEAFFINITY; + return -1; + } + return 0; +#else /* neither HAVE_SCHED_SETAFFINITY nor HAVE_CPUSET_SETAFFINITY nor HAVE_SETPROCESSAFFINITYMASK */ + i_errno = IEAFFINITY; + return -1; +#endif /* neither HAVE_SCHED_SETAFFINITY nor HAVE_CPUSET_SETAFFINITY nor HAVE_SETPROCESSAFFINITYMASK */ +} + +int +iperf_clearaffinity(struct iperf_test *test) +{ +#if defined(HAVE_SCHED_SETAFFINITY) + cpu_set_t cpu_set; + int i; + + CPU_ZERO(&cpu_set); + for (i = 0; i < CPU_SETSIZE; ++i) + CPU_SET(i, &cpu_set); + if (sched_setaffinity(0, sizeof(cpu_set_t), &cpu_set) != 0) { + i_errno = IEAFFINITY; + return -1; + } + return 0; +#elif defined(HAVE_CPUSET_SETAFFINITY) + if(cpuset_setaffinity(CPU_LEVEL_WHICH,CPU_WHICH_PID, -1, + sizeof(cpuset_t), &test->cpumask) != 0) { + i_errno = IEAFFINITY; + return -1; + } + return 0; +#elif defined(HAVE_SETPROCESSAFFINITYMASK) + HANDLE process = GetCurrentProcess(); + DWORD_PTR processAffinityMask; + DWORD_PTR lpSystemAffinityMask; + + if (GetProcessAffinityMask(process, &processAffinityMask, &lpSystemAffinityMask) == 0 + || SetProcessAffinityMask(process, lpSystemAffinityMask) == 0) { + i_errno = IEAFFINITY; + return -1; + } + return 0; +#else /* neither HAVE_SCHED_SETAFFINITY nor HAVE_CPUSET_SETAFFINITY nor HAVE_SETPROCESSAFFINITYMASK */ + i_errno = IEAFFINITY; + return -1; +#endif /* neither HAVE_SCHED_SETAFFINITY nor HAVE_CPUSET_SETAFFINITY nor HAVE_SETPROCESSAFFINITYMASK */ +} + +static char iperf_timestr[100]; +static char linebuffer[1024]; + +int +iperf_printf(struct iperf_test *test, const char* format, ...) +{ + va_list argp; + int r = 0, r0; + time_t now; + struct tm *ltm = NULL; + char *ct = NULL; + + if (pthread_mutex_lock(&(test->print_mutex)) != 0) { + perror("iperf_print: pthread_mutex_lock"); + } + + /* Timestamp if requested */ + if (iperf_get_test_timestamps(test)) { + time(&now); + ltm = localtime(&now); + strftime(iperf_timestr, sizeof(iperf_timestr), iperf_get_test_timestamp_format(test), ltm); + ct = iperf_timestr; + } + + /* + * There are roughly two use cases here. If we're the client, + * want to print stuff directly to the output stream. + * If we're the sender we might need to buffer up output to send + * to the client. + * + * This doesn't make a whole lot of difference except there are + * some chunks of output on the client (on particular the whole + * of the server output with --get-server-output) that could + * easily exceed the size of the line buffer, but which don't need + * to be buffered up anyway. + */ + if (test->role == 'c') { + if (ct) { + r0 = fprintf(test->outfile, "%s", ct); + if (r0 < 0) { + r = r0; + goto bottom; + } + r += r0; + } + if (test->title) { + r0 = fprintf(test->outfile, "%s: ", test->title); + if (r0 < 0) { + r = r0; + goto bottom; + } + r += r0; + } + va_start(argp, format); + r0 = vfprintf(test->outfile, format, argp); + va_end(argp); + if (r0 < 0) { + r = r0; + goto bottom; + } + r += r0; + } + else if (test->role == 's') { + if (ct) { + r0 = snprintf(linebuffer, sizeof(linebuffer), "%s", ct); + if (r0 < 0) { + r = r0; + goto bottom; + } + r += r0; + } + /* Should always be true as long as sizeof(ct) < sizeof(linebuffer) */ + if (r < sizeof(linebuffer)) { + va_start(argp, format); + r0 = vsnprintf(linebuffer + r, sizeof(linebuffer) - r, format, argp); + va_end(argp); + if (r0 < 0) { + r = r0; + goto bottom; + } + r += r0; + } + fprintf(test->outfile, "%s", linebuffer); + + if (test->role == 's' && iperf_get_test_get_server_output(test)) { + struct iperf_textline *l = (struct iperf_textline *) malloc(sizeof(struct iperf_textline)); + l->line = strdup(linebuffer); + TAILQ_INSERT_TAIL(&(test->server_output_list), l, textlineentries); + } + } + + bottom: + if (pthread_mutex_unlock(&(test->print_mutex)) != 0) { + perror("iperf_print: pthread_mutex_unlock"); + } + + return r; +} + +int +iflush(struct iperf_test *test) +{ + int rc2; + + int rc; + rc = pthread_mutex_lock(&(test->print_mutex)); + if (rc != 0) { + errno = rc; + perror("iflush: pthread_mutex_lock"); + } + + rc2 = fflush(test->outfile); + + rc = pthread_mutex_unlock(&(test->print_mutex)); + if (rc != 0) { + errno = rc; + perror("iflush: pthread_mutex_unlock"); + } + + return rc2; +} |