blob: ac2613a0a880e81b99c8dfe2f2f21f971ba43fcb [file] [log] [blame]
Julian Anastasovea63a692012-10-03 12:07:39 +00001/*
2 * tcp_metrics.c "ip tcp_metrics/tcpmetrics"
3 *
4 * This program is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU General Public License
6 * version 2 as published by the Free Software Foundation;
7 *
8 * Authors: Julian Anastasov <ja@ssi.bg>, August 2012
9 */
10
11#include <stdio.h>
12#include <stdlib.h>
13#include <string.h>
14#include <unistd.h>
15#include <errno.h>
16#include <sys/types.h>
17#include <sys/socket.h>
18#include <arpa/inet.h>
19#include <sys/ioctl.h>
20#include <linux/if.h>
21
22#include <linux/genetlink.h>
23#include <linux/tcp_metrics.h>
24
25#include "utils.h"
26#include "ip_common.h"
27#include "libgenl.h"
28
29static void usage(void)
30{
31 fprintf(stderr, "Usage: ip tcp_metrics/tcpmetrics { COMMAND | help }\n");
32 fprintf(stderr, " ip tcp_metrics { show | flush } SELECTOR\n");
33 fprintf(stderr, " ip tcp_metrics delete [ address ] ADDRESS\n");
34 fprintf(stderr, "SELECTOR := [ [ address ] PREFIX ]\n");
35 exit(-1);
36}
37
38/* netlink socket */
39static struct rtnl_handle grth = { .fd = -1 };
40static int genl_family = -1;
41
42#define TCPM_REQUEST(_req, _bufsiz, _cmd, _flags) \
43 GENL_REQUEST(_req, _bufsiz, genl_family, 0, \
44 TCP_METRICS_GENL_VERSION, _cmd, _flags)
45
46#define CMD_LIST 0x0001 /* list, lst, show */
47#define CMD_DEL 0x0002 /* delete, remove */
48#define CMD_FLUSH 0x0004 /* flush */
49
50static struct {
51 char *name;
52 int code;
53} cmds[] = {
54 { "list", CMD_LIST },
55 { "lst", CMD_LIST },
56 { "show", CMD_LIST },
57 { "delete", CMD_DEL },
58 { "remove", CMD_DEL },
59 { "flush", CMD_FLUSH },
60};
61
62static char *metric_name[TCP_METRIC_MAX + 1] = {
63 [TCP_METRIC_RTT] = "rtt",
64 [TCP_METRIC_RTTVAR] = "rttvar",
65 [TCP_METRIC_SSTHRESH] = "ssthresh",
66 [TCP_METRIC_CWND] = "cwnd",
67 [TCP_METRIC_REORDERING] = "reordering",
68};
69
70static struct
71{
72 int flushed;
73 char *flushb;
74 int flushp;
75 int flushe;
76 int cmd;
Christoph Paasch54b237a2014-02-06 23:15:02 +010077 inet_prefix daddr;
Christoph Paaschc3304902014-02-06 23:15:04 +010078 inet_prefix saddr;
Julian Anastasovea63a692012-10-03 12:07:39 +000079} f;
80
81static int flush_update(void)
82{
83 if (rtnl_send_check(&grth, f.flushb, f.flushp) < 0) {
84 perror("Failed to send flush request\n");
85 return -1;
86 }
87 f.flushp = 0;
88 return 0;
89}
90
91static int process_msg(const struct sockaddr_nl *who, struct nlmsghdr *n,
92 void *arg)
93{
94 FILE *fp = (FILE *) arg;
95 struct genlmsghdr *ghdr;
96 struct rtattr *attrs[TCP_METRICS_ATTR_MAX + 1], *a;
97 int len = n->nlmsg_len;
Christoph Paasch114aa722014-02-06 23:15:03 +010098 inet_prefix daddr, saddr;
99 int family, i, atype, stype, dlen = 0, slen = 0;
Julian Anastasovea63a692012-10-03 12:07:39 +0000100
101 if (n->nlmsg_type != genl_family)
102 return -1;
103
104 len -= NLMSG_LENGTH(GENL_HDRLEN);
105 if (len < 0)
106 return -1;
107
108 ghdr = NLMSG_DATA(n);
109 if (ghdr->cmd != TCP_METRICS_CMD_GET)
110 return 0;
111
112 parse_rtattr(attrs, TCP_METRICS_ATTR_MAX, (void *) ghdr + GENL_HDRLEN,
113 len);
114
Jakub Sitnicki08401222016-06-22 13:34:13 +0200115 if (attrs[TCP_METRICS_ATTR_ADDR_IPV4]) {
Christoph Paasch54b237a2014-02-06 23:15:02 +0100116 if (f.daddr.family && f.daddr.family != AF_INET)
Julian Anastasovea63a692012-10-03 12:07:39 +0000117 return 0;
Jakub Sitnicki08401222016-06-22 13:34:13 +0200118 a = attrs[TCP_METRICS_ATTR_ADDR_IPV4];
Christoph Paasch54b237a2014-02-06 23:15:02 +0100119 memcpy(&daddr.data, RTA_DATA(a), 4);
120 daddr.bytelen = 4;
Julian Anastasovea63a692012-10-03 12:07:39 +0000121 family = AF_INET;
122 atype = TCP_METRICS_ATTR_ADDR_IPV4;
Christoph Paasch54b237a2014-02-06 23:15:02 +0100123 dlen = RTA_PAYLOAD(a);
Jakub Sitnicki08401222016-06-22 13:34:13 +0200124 } else if (attrs[TCP_METRICS_ATTR_ADDR_IPV6]) {
125 if (f.daddr.family && f.daddr.family != AF_INET6)
Julian Anastasovea63a692012-10-03 12:07:39 +0000126 return 0;
Jakub Sitnicki08401222016-06-22 13:34:13 +0200127 a = attrs[TCP_METRICS_ATTR_ADDR_IPV6];
128 memcpy(&daddr.data, RTA_DATA(a), 16);
129 daddr.bytelen = 16;
130 family = AF_INET6;
131 atype = TCP_METRICS_ATTR_ADDR_IPV6;
132 dlen = RTA_PAYLOAD(a);
133 } else {
134 return 0;
Julian Anastasovea63a692012-10-03 12:07:39 +0000135 }
136
Jakub Sitnicki08401222016-06-22 13:34:13 +0200137 if (attrs[TCP_METRICS_ATTR_SADDR_IPV4]) {
Christoph Paasch114aa722014-02-06 23:15:03 +0100138 if (f.saddr.family && f.saddr.family != AF_INET)
139 return 0;
Jakub Sitnicki08401222016-06-22 13:34:13 +0200140 a = attrs[TCP_METRICS_ATTR_SADDR_IPV4];
Christoph Paasch114aa722014-02-06 23:15:03 +0100141 memcpy(&saddr.data, RTA_DATA(a), 4);
142 saddr.bytelen = 4;
143 stype = TCP_METRICS_ATTR_SADDR_IPV4;
144 slen = RTA_PAYLOAD(a);
Jakub Sitnicki08401222016-06-22 13:34:13 +0200145 } else if (attrs[TCP_METRICS_ATTR_SADDR_IPV6]) {
146 if (f.saddr.family && f.saddr.family != AF_INET6)
147 return 0;
Christoph Paasch114aa722014-02-06 23:15:03 +0100148 a = attrs[TCP_METRICS_ATTR_SADDR_IPV6];
Jakub Sitnicki08401222016-06-22 13:34:13 +0200149 memcpy(&saddr.data, RTA_DATA(a), 16);
150 saddr.bytelen = 16;
151 stype = TCP_METRICS_ATTR_SADDR_IPV6;
152 slen = RTA_PAYLOAD(a);
Christoph Paasch114aa722014-02-06 23:15:03 +0100153 }
154
Christoph Paasch54b237a2014-02-06 23:15:02 +0100155 if (f.daddr.family && f.daddr.bitlen >= 0 &&
156 inet_addr_match(&daddr, &f.daddr, f.daddr.bitlen))
Christoph Paaschc3304902014-02-06 23:15:04 +0100157 return 0;
158 /* Only check for the source-address if the kernel supports it,
159 * meaning slen != 0.
160 */
161 if (slen && f.saddr.family && f.saddr.bitlen >= 0 &&
162 inet_addr_match(&saddr, &f.saddr, f.saddr.bitlen))
Julian Anastasovea63a692012-10-03 12:07:39 +0000163 return 0;
164
165 if (f.flushb) {
166 struct nlmsghdr *fn;
Stephen Hemminger56f5daa2016-03-21 11:52:19 -0700167
Julian Anastasovea63a692012-10-03 12:07:39 +0000168 TCPM_REQUEST(req2, 128, TCP_METRICS_CMD_DEL, NLM_F_REQUEST);
169
Christoph Paasch54b237a2014-02-06 23:15:02 +0100170 addattr_l(&req2.n, sizeof(req2), atype, &daddr.data,
171 daddr.bytelen);
Christoph Paaschc3304902014-02-06 23:15:04 +0100172 if (slen)
173 addattr_l(&req2.n, sizeof(req2), stype, &saddr.data,
174 saddr.bytelen);
Julian Anastasovea63a692012-10-03 12:07:39 +0000175
176 if (NLMSG_ALIGN(f.flushp) + req2.n.nlmsg_len > f.flushe) {
177 if (flush_update())
178 return -1;
179 }
180 fn = (struct nlmsghdr *) (f.flushb + NLMSG_ALIGN(f.flushp));
181 memcpy(fn, &req2.n, req2.n.nlmsg_len);
182 fn->nlmsg_seq = ++grth.seq;
183 f.flushp = (((char *) fn) + req2.n.nlmsg_len) - f.flushb;
184 f.flushed++;
185 if (show_stats < 2)
186 return 0;
187 }
188
189 if (f.cmd & (CMD_DEL | CMD_FLUSH))
190 fprintf(fp, "Deleted ");
191
192 fprintf(fp, "%s",
Phil Suttera418e452016-03-22 19:35:15 +0100193 format_host(family, dlen, &daddr.data));
Julian Anastasovea63a692012-10-03 12:07:39 +0000194
195 a = attrs[TCP_METRICS_ATTR_AGE];
196 if (a) {
Stephen Hemmingera55a8fd2013-02-28 08:51:46 -0800197 unsigned long long val = rta_getattr_u64(a);
Julian Anastasovea63a692012-10-03 12:07:39 +0000198
199 fprintf(fp, " age %llu.%03llusec",
200 val / 1000, val % 1000);
201 }
202
203 a = attrs[TCP_METRICS_ATTR_TW_TS_STAMP];
204 if (a) {
205 __s32 val = (__s32) rta_getattr_u32(a);
206 __u32 tsval;
207
208 a = attrs[TCP_METRICS_ATTR_TW_TSVAL];
209 tsval = a ? rta_getattr_u32(a) : 0;
210 fprintf(fp, " tw_ts %u/%dsec ago", tsval, val);
211 }
212
213 a = attrs[TCP_METRICS_ATTR_VALS];
214 if (a) {
215 struct rtattr *m[TCP_METRIC_MAX + 1 + 1];
Eric Dumazet9464a5f2014-09-05 16:54:04 -0700216 unsigned long rtt = 0, rttvar = 0;
Julian Anastasovea63a692012-10-03 12:07:39 +0000217
218 parse_rtattr_nested(m, TCP_METRIC_MAX + 1, a);
219
220 for (i = 0; i < TCP_METRIC_MAX + 1; i++) {
Stephen Hemmingera55a8fd2013-02-28 08:51:46 -0800221 unsigned long val;
Julian Anastasovea63a692012-10-03 12:07:39 +0000222
223 a = m[i + 1];
224 if (!a)
225 continue;
Eric Dumazet9464a5f2014-09-05 16:54:04 -0700226 if (i != TCP_METRIC_RTT &&
227 i != TCP_METRIC_RTT_US &&
228 i != TCP_METRIC_RTTVAR &&
229 i != TCP_METRIC_RTTVAR_US) {
230 if (metric_name[i])
231 fprintf(fp, " %s ", metric_name[i]);
232 else
233 fprintf(fp, " metric_%d ", i);
234 }
Julian Anastasovea63a692012-10-03 12:07:39 +0000235 val = rta_getattr_u32(a);
236 switch (i) {
237 case TCP_METRIC_RTT:
Eric Dumazet9464a5f2014-09-05 16:54:04 -0700238 if (!rtt)
239 rtt = (val * 1000UL) >> 3;
Julian Anastasovea63a692012-10-03 12:07:39 +0000240 break;
241 case TCP_METRIC_RTTVAR:
Eric Dumazet9464a5f2014-09-05 16:54:04 -0700242 if (!rttvar)
243 rttvar = (val * 1000UL) >> 2;
244 break;
245 case TCP_METRIC_RTT_US:
246 rtt = val >> 3;
247 break;
248 case TCP_METRIC_RTTVAR_US:
249 rttvar = val >> 2;
Julian Anastasovea63a692012-10-03 12:07:39 +0000250 break;
251 case TCP_METRIC_SSTHRESH:
252 case TCP_METRIC_CWND:
253 case TCP_METRIC_REORDERING:
254 default:
Stephen Hemmingera55a8fd2013-02-28 08:51:46 -0800255 fprintf(fp, "%lu", val);
Julian Anastasovea63a692012-10-03 12:07:39 +0000256 break;
257 }
258 }
Eric Dumazet9464a5f2014-09-05 16:54:04 -0700259 if (rtt)
260 fprintf(fp, " rtt %luus", rtt);
261 if (rttvar)
262 fprintf(fp, " rttvar %luus", rttvar);
Julian Anastasovea63a692012-10-03 12:07:39 +0000263 }
264
265 a = attrs[TCP_METRICS_ATTR_FOPEN_MSS];
266 if (a)
267 fprintf(fp, " fo_mss %u", rta_getattr_u16(a));
268
269 a = attrs[TCP_METRICS_ATTR_FOPEN_SYN_DROPS];
270 if (a) {
271 __u16 syn_loss = rta_getattr_u16(a);
Stephen Hemmingera55a8fd2013-02-28 08:51:46 -0800272 unsigned long long ts;
Julian Anastasovea63a692012-10-03 12:07:39 +0000273
274 a = attrs[TCP_METRICS_ATTR_FOPEN_SYN_DROP_TS];
275 ts = a ? rta_getattr_u64(a) : 0;
276
277 fprintf(fp, " fo_syn_drops %u/%llu.%03llusec ago",
278 syn_loss, ts / 1000, ts % 1000);
279 }
280
281 a = attrs[TCP_METRICS_ATTR_FOPEN_COOKIE];
282 if (a) {
283 char cookie[32 + 1];
284 unsigned char *ptr = RTA_DATA(a);
285 int i, max = RTA_PAYLOAD(a);
286
287 if (max > 16)
288 max = 16;
289 cookie[0] = 0;
290 for (i = 0; i < max; i++)
291 sprintf(cookie + i + i, "%02x", ptr[i]);
292 fprintf(fp, " fo_cookie %s", cookie);
293 }
294
Christoph Paasch114aa722014-02-06 23:15:03 +0100295 if (slen) {
296 fprintf(fp, " source %s",
Phil Suttera418e452016-03-22 19:35:15 +0100297 format_host(family, slen, &saddr.data));
Christoph Paasch114aa722014-02-06 23:15:03 +0100298 }
299
Julian Anastasovea63a692012-10-03 12:07:39 +0000300 fprintf(fp, "\n");
301
302 fflush(fp);
303 return 0;
304}
305
306static int tcpm_do_cmd(int cmd, int argc, char **argv)
307{
308 TCPM_REQUEST(req, 1024, TCP_METRICS_CMD_GET, NLM_F_REQUEST);
Christoph Paaschc3304902014-02-06 23:15:04 +0100309 int atype = -1, stype = -1;
Julian Anastasovea63a692012-10-03 12:07:39 +0000310 int ack;
311
312 memset(&f, 0, sizeof(f));
Christoph Paasch54b237a2014-02-06 23:15:02 +0100313 f.daddr.bitlen = -1;
314 f.daddr.family = preferred_family;
Christoph Paaschc3304902014-02-06 23:15:04 +0100315 f.saddr.bitlen = -1;
316 f.saddr.family = preferred_family;
Julian Anastasovea63a692012-10-03 12:07:39 +0000317
318 switch (preferred_family) {
319 case AF_UNSPEC:
320 case AF_INET:
321 case AF_INET6:
322 break;
323 default:
Kees van Reeuwijk14645ec2013-02-08 03:32:36 +0000324 fprintf(stderr, "Unsupported protocol family: %d\n", preferred_family);
Julian Anastasovea63a692012-10-03 12:07:39 +0000325 return -1;
326 }
327
328 for (; argc > 0; argc--, argv++) {
Christoph Paaschc3304902014-02-06 23:15:04 +0100329 if (strcmp(*argv, "src") == 0 ||
330 strcmp(*argv, "source") == 0) {
331 char *who = *argv;
Stephen Hemminger56f5daa2016-03-21 11:52:19 -0700332
Julian Anastasovea63a692012-10-03 12:07:39 +0000333 NEXT_ARG();
Christoph Paaschc3304902014-02-06 23:15:04 +0100334 if (matches(*argv, "help") == 0)
335 usage();
336 if (f.saddr.bitlen >= 0)
337 duparg2(who, *argv);
Julian Anastasovea63a692012-10-03 12:07:39 +0000338
Christoph Paaschc3304902014-02-06 23:15:04 +0100339 get_prefix(&f.saddr, *argv, preferred_family);
340 if (f.saddr.bytelen && f.saddr.bytelen * 8 == f.saddr.bitlen) {
341 if (f.saddr.family == AF_INET)
342 stype = TCP_METRICS_ATTR_SADDR_IPV4;
343 else if (f.saddr.family == AF_INET6)
344 stype = TCP_METRICS_ATTR_SADDR_IPV6;
345 }
Julian Anastasovea63a692012-10-03 12:07:39 +0000346
Christoph Paaschc3304902014-02-06 23:15:04 +0100347 if (stype < 0) {
348 fprintf(stderr, "Error: a specific IP address is expected rather than \"%s\"\n",
349 *argv);
350 return -1;
351 }
352 } else {
353 char *who = "address";
Stephen Hemminger56f5daa2016-03-21 11:52:19 -0700354
Christoph Paaschc3304902014-02-06 23:15:04 +0100355 if (strcmp(*argv, "addr") == 0 ||
356 strcmp(*argv, "address") == 0) {
357 who = *argv;
358 NEXT_ARG();
359 }
360 if (matches(*argv, "help") == 0)
361 usage();
362 if (f.daddr.bitlen >= 0)
363 duparg2(who, *argv);
364
365 get_prefix(&f.daddr, *argv, preferred_family);
366 if (f.daddr.bytelen && f.daddr.bytelen * 8 == f.daddr.bitlen) {
367 if (f.daddr.family == AF_INET)
368 atype = TCP_METRICS_ATTR_ADDR_IPV4;
369 else if (f.daddr.family == AF_INET6)
370 atype = TCP_METRICS_ATTR_ADDR_IPV6;
371 }
372 if ((CMD_DEL & cmd) && atype < 0) {
373 fprintf(stderr, "Error: a specific IP address is expected rather than \"%s\"\n",
374 *argv);
375 return -1;
376 }
377 }
Julian Anastasovea63a692012-10-03 12:07:39 +0000378 argc--; argv++;
379 }
380
381 if (cmd == CMD_DEL && atype < 0)
382 missarg("address");
383
384 /* flush for exact address ? Single del */
385 if (cmd == CMD_FLUSH && atype >= 0)
386 cmd = CMD_DEL;
387
388 /* flush for all addresses ? Single del without address */
Christoph Paasch54b237a2014-02-06 23:15:02 +0100389 if (cmd == CMD_FLUSH && f.daddr.bitlen <= 0 &&
Christoph Paaschc3304902014-02-06 23:15:04 +0100390 f.saddr.bitlen <= 0 && preferred_family == AF_UNSPEC) {
Julian Anastasovea63a692012-10-03 12:07:39 +0000391 cmd = CMD_DEL;
392 req.g.cmd = TCP_METRICS_CMD_DEL;
393 ack = 1;
394 } else if (cmd == CMD_DEL) {
395 req.g.cmd = TCP_METRICS_CMD_DEL;
396 ack = 1;
397 } else { /* CMD_FLUSH, CMD_LIST */
398 ack = 0;
399 }
400
401 if (genl_family < 0) {
402 if (rtnl_open_byproto(&grth, 0, NETLINK_GENERIC) < 0) {
403 fprintf(stderr, "Cannot open generic netlink socket\n");
404 exit(1);
405 }
406 genl_family = genl_resolve_family(&grth,
407 TCP_METRICS_GENL_NAME);
408 if (genl_family < 0)
409 exit(1);
410 req.n.nlmsg_type = genl_family;
411 }
412
413 if (!(cmd & CMD_FLUSH) && (atype >= 0 || (cmd & CMD_DEL))) {
414 if (ack)
415 req.n.nlmsg_flags |= NLM_F_ACK;
416 if (atype >= 0)
Christoph Paasch54b237a2014-02-06 23:15:02 +0100417 addattr_l(&req.n, sizeof(req), atype, &f.daddr.data,
418 f.daddr.bytelen);
Christoph Paaschc3304902014-02-06 23:15:04 +0100419 if (stype >= 0)
420 addattr_l(&req.n, sizeof(req), stype, &f.saddr.data,
421 f.saddr.bytelen);
Julian Anastasovea63a692012-10-03 12:07:39 +0000422 } else {
423 req.n.nlmsg_flags |= NLM_F_DUMP;
424 }
425
426 f.cmd = cmd;
427 if (cmd & CMD_FLUSH) {
428 int round = 0;
429 char flushb[4096-512];
430
431 f.flushb = flushb;
432 f.flushp = 0;
433 f.flushe = sizeof(flushb);
434
435 for (;;) {
436 req.n.nlmsg_seq = grth.dump = ++grth.seq;
437 if (rtnl_send(&grth, &req, req.n.nlmsg_len) < 0) {
438 perror("Failed to send flush request");
439 exit(1);
440 }
441 f.flushed = 0;
442 if (rtnl_dump_filter(&grth, process_msg, stdout) < 0) {
443 fprintf(stderr, "Flush terminated\n");
444 exit(1);
445 }
446 if (f.flushed == 0) {
447 if (round == 0) {
448 fprintf(stderr, "Nothing to flush.\n");
449 } else if (show_stats)
450 printf("*** Flush is complete after %d round%s ***\n",
451 round, round > 1 ? "s" : "");
452 fflush(stdout);
453 return 0;
454 }
455 round++;
456 if (flush_update() < 0)
457 exit(1);
458 if (show_stats) {
459 printf("\n*** Round %d, deleting %d entries ***\n",
460 round, f.flushed);
461 fflush(stdout);
462 }
463 }
464 return 0;
465 }
466
467 if (ack) {
Stephen Hemmingerc079e122015-05-27 12:26:14 -0700468 if (rtnl_talk(&grth, &req.n, NULL, 0) < 0)
Julian Anastasovea63a692012-10-03 12:07:39 +0000469 return -2;
470 } else if (atype >= 0) {
Stephen Hemmingerc079e122015-05-27 12:26:14 -0700471 if (rtnl_talk(&grth, &req.n, &req.n, sizeof(req)) < 0)
Julian Anastasovea63a692012-10-03 12:07:39 +0000472 return -2;
473 if (process_msg(NULL, &req.n, stdout) < 0) {
474 fprintf(stderr, "Dump terminated\n");
475 exit(1);
476 }
477 } else {
478 req.n.nlmsg_seq = grth.dump = ++grth.seq;
479 if (rtnl_send(&grth, &req, req.n.nlmsg_len) < 0) {
480 perror("Failed to send dump request");
481 exit(1);
482 }
483
484 if (rtnl_dump_filter(&grth, process_msg, stdout) < 0) {
485 fprintf(stderr, "Dump terminated\n");
486 exit(1);
487 }
488 }
489 return 0;
490}
491
492int do_tcp_metrics(int argc, char **argv)
493{
494 int i;
495
496 if (argc < 1)
497 return tcpm_do_cmd(CMD_LIST, 0, NULL);
498 for (i = 0; i < ARRAY_SIZE(cmds); i++) {
499 if (matches(argv[0], cmds[i].name) == 0)
500 return tcpm_do_cmd(cmds[i].code, argc-1, argv+1);
501 }
502 if (matches(argv[0], "help") == 0)
503 usage();
504
Stephen Hemminger56f5daa2016-03-21 11:52:19 -0700505 fprintf(stderr, "Command \"%s\" is unknown, try \"ip tcp_metrics help\".\n",
506 *argv);
Julian Anastasovea63a692012-10-03 12:07:39 +0000507 exit(-1);
508}