blob: a6fccc528b6768b83762129ebdac43d31fb8207a [file] [log] [blame]
/*
* Copyright (c) 2009, The Regents of the University of California, through
* Lawrence Berkeley National Laboratory (subject to receipt of any required
* approvals from the U.S. Dept. of Energy). All rights reserved.
*/
/* iperf_server_api.c: Functions to be used by an iperf server
*/
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <getopt.h>
#include <errno.h>
#include <signal.h>
#include <unistd.h>
#include <assert.h>
#include <fcntl.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#include <netdb.h>
#include <pthread.h>
#include <stdint.h>
#include <netinet/tcp.h>
#include <sys/time.h>
#include <sys/resource.h>
#include <sched.h>
#include <setjmp.h>
#include "iperf.h"
#include "iperf_server_api.h"
#include "iperf_api.h"
#include "iperf_udp.h"
#include "iperf_tcp.h"
#include "timer.h"
#include "net.h"
#include "units.h"
#include "tcp_window_size.h"
#include "iperf_util.h"
#include "locale.h"
jmp_buf env;
int
iperf_server_listen(struct iperf_test *test)
{
char ubuf[UNIT_LEN];
int x;
if((test->listener_tcp = netannounce(Ptcp, NULL, test->server_port)) < 0) {
// Needs to set some sort of error number/message
perror("netannounce test->listener_tcp");
return -1;
}
printf("-----------------------------------------------------------\n");
printf("Server listening on %d\n", test->server_port);
// This needs to be changed to reflect if client has different window size
// make sure we got what we asked for
/* XXX: This needs to be moved to the stream listener
if ((x = get_tcp_windowsize(test->listener_tcp, SO_RCVBUF)) < 0) {
// Needs to set some sort of error number/message
perror("SO_RCVBUF");
return -1;
}
*/
// XXX: This code needs to be moved to after parameter exhange
/*
if (test->protocol == Ptcp) {
if (test->default_settings->socket_bufsize > 0) {
unit_snprintf(ubuf, UNIT_LEN, (double) x, 'A');
printf("TCP window size: %s\n", ubuf);
} else {
printf("Using TCP Autotuning\n");
}
}
*/
printf("-----------------------------------------------------------\n");
FD_ZERO(&test->read_set);
FD_ZERO(&test->write_set);
FD_SET(test->listener_tcp, &test->read_set);
test->max_fd = (test->listener_tcp > test->max_fd) ? test->listener_tcp : test->max_fd;
return 0;
}
int
iperf_accept(struct iperf_test *test)
{
int s;
int rbuf = ACCESS_DENIED;
char ipl[512], ipr[512];
char cookie[COOKIE_SIZE];
socklen_t len;
struct sockaddr_in addr;
struct sockaddr_in temp1, temp2;
struct iperf_stream *sp;
static int streams_accepted;
len = sizeof(addr);
if ((s = accept(test->listener_tcp, (struct sockaddr *) &addr, &len)) < 0) {
perror("accept");
return -1;
}
if (test->ctrl_sck == -1) {
/* Server free, accept new client */
if (Nread(s, test->default_settings->cookie, COOKIE_SIZE, Ptcp) < 0) {
perror("Nread COOKIE\n");
return -1;
}
FD_SET(s, &test->read_set);
FD_SET(s, &test->write_set);
test->max_fd = (s > test->max_fd) ? s : test->max_fd;
test->ctrl_sck = s;
streams_accepted = 0;
len = sizeof(struct sockaddr_in);
if (getsockname(s, (struct sockaddr *) &temp1, &len) < 0)
perror("getsockname");
if (getpeername(s, (struct sockaddr *) &temp2, &len) < 0)
perror("getpeername");
inet_ntop(AF_INET, (void *) &temp1.sin_addr, ipl, sizeof(ipl));
inet_ntop(AF_INET, (void *) &temp2.sin_addr, ipr, sizeof(ipr));
printf(report_peer, s, ipl, ntohs(temp1.sin_port), ipr, ntohs(temp2.sin_port));
test->state = PARAM_EXCHANGE;
if (Nwrite(test->ctrl_sck, &test->state, sizeof(char), Ptcp) < 0) {
perror("Nwrite PARAM_EXCHANGE\n");
exit(1);
}
iperf_exchange_parameters(test);
} else {
if (Nread(s, cookie, COOKIE_SIZE, Ptcp) < 0) {
perror("Nread COOKIE\n");
return -1;
}
if ((strcmp(test->default_settings->cookie, cookie) == 0) && (test->state == CREATE_STREAMS)) {
sp = test->new_stream(test);
sp->socket = s;
iperf_init_stream(sp, test);
iperf_add_stream(test, sp);
FD_SET(s, &test->read_set);
FD_SET(s, &test->write_set);
test->max_fd = (s > test->max_fd) ? s : test->max_fd;
connect_msg(sp);
++streams_accepted;
if (streams_accepted == test->num_streams) {
test->state = TEST_START;
if (Nwrite(test->ctrl_sck, &test->state, sizeof(char), Ptcp) < 0) {
perror("Nwrite TEST_START\n");
return -1;
}
}
} else {
if (Nwrite(s, &rbuf, sizeof(int), Ptcp) < 0) {
perror("Nwrite ACCESS_DENIED");
return -1;
}
close(s);
}
}
return 0;
}
int
iperf_accept_tcp_stream(struct iperf_test *test)
{
int s;
int rbuf = ACCESS_DENIED;
char cookie[COOKIE_SIZE];
socklen_t len;
struct sockaddr_in addr;
struct iperf_stream *sp;
len = sizeof(addr);
if ((s = accept(test->listener_tcp, (struct sockaddr *) &addr, &len)) < 0) {
perror("accept tcp stream");
return (-1);
}
if (Nread(s, cookie, COOKIE_SIZE, Ptcp) < 0) {
perror("Nread cookie");
return (-1);
}
if (strcmp(test->default_settings->cookie, cookie) == 0) {
// XXX: CANNOT USE iperf_tcp_accept since stream is alread accepted at this point. New model needed!
sp = test->new_stream(test);
sp->socket = s;
iperf_init_stream(sp, test);
iperf_add_stream(test, sp);
FD_SET(s, &test->read_set);
FD_SET(s, &test->write_set);
test->max_fd = (s > test->max_fd) ? s : test->max_fd;
test->streams_accepted++;
connect_msg(sp);
} else {
if (Nwrite(s, &rbuf, sizeof(char), Ptcp) < 0) {
perror("Nwrite ACCESS_DENIED");
return (-1);
}
close(s);
}
return (0);
}
int
iperf_accept_udp_stream(struct iperf_test *test)
{
// do nothing for now
return (0);
}
/**************************************************************************/
int
iperf_handle_message_server(struct iperf_test *test)
{
int rval;
struct iperf_stream *sp;
if ((rval = read(test->ctrl_sck, &test->state, sizeof(char))) <= 0) {
if (rval == 0) {
fprintf(stderr, "The client has unexpectedly closed the connection.\n");
test->state = IPERF_DONE;
return 0;
} else {
perror("read ctrl_sck");
return -1;
}
}
switch(test->state) {
case TEST_START:
break;
case TEST_END:
test->stats_callback(test);
for (sp = test->streams; sp; sp = sp->next) {
FD_CLR(sp->socket, &test->read_set);
FD_CLR(sp->socket, &test->write_set);
close(sp->socket);
}
test->state = EXCHANGE_RESULTS;
if (Nwrite(test->ctrl_sck, &test->state, sizeof(char), Ptcp) < 0) {
perror("Nwrite EXCHANGE_RESULTS");
exit(1);
}
iperf_exchange_results(test);
test->state = DISPLAY_RESULTS;
if (Nwrite(test->ctrl_sck, &test->state, sizeof(char), Ptcp) < 0) {
perror("Nwrite DISPLAY_RESULTS");
exit(1);
}
test->reporter_callback(test);
break;
case IPERF_DONE:
break;
case CLIENT_TERMINATE:
fprintf(stderr, "The client has terminated.\n");
for (sp = test->streams; sp; sp = sp->next) {
FD_CLR(sp->socket, &test->read_set);
FD_CLR(sp->socket, &test->write_set);
close(sp->socket);
}
test->state = IPERF_DONE;
break;
default:
// XXX: This needs to be replaced by actual error handling
fprintf(stderr, "Unrecognized state: %d\n", test->state);
return -1;
}
return 0;
}
void
iperf_test_reset(struct iperf_test *test)
{
struct iperf_stream *sp, *np;
close(test->ctrl_sck);
/* Free streams */
for (sp = test->streams; sp; sp = np) {
np = sp->next;
iperf_free_stream(sp);
}
free_timer(test->timer);
free_timer(test->stats_timer);
free_timer(test->reporter_timer);
test->timer = NULL;
test->stats_timer = NULL;
test->reporter_timer = NULL;
test->streams = NULL;
test->role = 's';
test->protocol = Ptcp;
test->duration = DURATION;
test->state = 0;
test->server_hostname = NULL;
test->ctrl_sck = -1;
test->bytes_sent = 0;
test->new_stream = iperf_new_tcp_stream;
test->reverse = 0;
test->no_delay = 0;
FD_ZERO(&test->read_set);
FD_ZERO(&test->write_set);
FD_SET(test->listener_tcp, &test->read_set);
test->max_fd = test->listener_tcp;
test->num_streams = 1;
test->streams_accepted = 0;
test->default_settings->socket_bufsize = 0;
test->default_settings->blksize = DEFAULT_TCP_BLKSIZE;
test->default_settings->rate = RATE; /* UDP only */
test->default_settings->mss = 0;
memset(test->default_settings->cookie, 0, COOKIE_SIZE);
}
int
iperf_run_server(struct iperf_test *test)
{
int result, s;
fd_set temp_read_set, temp_write_set;
struct timeval tv;
// Open socket and listen
if (iperf_server_listen(test) < 0) {
// XXX: This needs to be replaced by more formal error handling
fprintf(stderr, "An error occurred. Exiting.\n");
exit(1);
}
signal(SIGINT, sig_handler);
if (setjmp(env)) {
fprintf(stderr, "Exiting...\n");
test->state = SERVER_TERMINATE;
if (test->ctrl_sck >= 0) {
if (Nwrite(test->ctrl_sck, &test->state, sizeof(char), Ptcp) < 0) {
fprintf(stderr, "Unable to send SERVER_TERMINATE message to client\n");
}
}
return 0;
}
for ( ; ; ) {
test->state = IPERF_START;
while (test->state != IPERF_DONE) {
memcpy(&temp_read_set, &test->read_set, sizeof(fd_set));
memcpy(&temp_write_set, &test->write_set, sizeof(fd_set));
tv.tv_sec = 15;
tv.tv_usec = 0;
result = select(test->max_fd + 1, &temp_read_set, &temp_write_set, NULL, &tv);
if (result < 0 && errno != EINTR) {
// Change the way this handles errors
perror("select");
exit(1);
} else if (result > 0) {
if (FD_ISSET(test->listener_tcp, &temp_read_set)) {
if (test->state != CREATE_STREAMS) {
if (iperf_accept(test) < 0) {
fprintf(stderr, "iperf_accept: error accepting control socket. exiting...\n");
exit(1);
}
FD_CLR(test->listener_tcp, &temp_read_set);
}
}
if (FD_ISSET(test->ctrl_sck, &temp_read_set)) {
iperf_handle_message_server(test);
FD_CLR(test->ctrl_sck, &temp_read_set);
}
if (test->state == CREATE_STREAMS) {
if (test->protocol == Ptcp) {
if (FD_ISSET(test->listener_tcp, &temp_read_set)) {
if (iperf_accept_tcp_stream(test) < 0) {
fprintf(stderr, "iperf_accept_tcp_stream: an error occurred.\n");
exit(1);
}
FD_CLR(test->listener_tcp, &temp_read_set);
}
} else {
if (FD_ISSET(test->listener_udp, &temp_read_set)) {
if (iperf_udp_accept(test) < 0) {
fprintf(stderr, "iperf_accept_udp_stream: an error occurred.\n");
exit(1);
}
FD_CLR(test->listener_udp, &temp_read_set);
}
}
if (test->streams_accepted == test->num_streams) {
if (test->protocol == Pudp) {
FD_CLR(test->listener_udp, &test->read_set);
close(test->listener_udp);
test->listener_udp = -1;
} else if (test->protocol == Ptcp) {
if (test->no_delay || test->default_settings->mss) {
FD_CLR(test->listener_tcp, &test->read_set);
close(test->listener_tcp);
if ((s = netannounce(Ptcp, NULL, test->server_port)) < 0) {
perror("reconnect tcp listener");
return (-1);
}
test->listener_tcp = s;
test->max_fd = (s > test->max_fd ? s : test->max_fd);
FD_SET(test->listener_tcp, &test->read_set);
}
}
test->state = TEST_START;
if (Nwrite(test->ctrl_sck, &test->state, sizeof(char), Ptcp) < 0) {
perror("Nwrite TEST_START");
return -1;
}
iperf_init_test(test);
test->state = TEST_RUNNING;
if (Nwrite(test->ctrl_sck, &test->state, sizeof(char), Ptcp) < 0) {
perror("Nwrite TEST_RUNNING");
return -1;
}
}
}
if (test->state == TEST_RUNNING) {
if (test->reverse) {
// Reverse mode. Server sends.
iperf_send(test);
} else {
// Regular mode. Server receives.
iperf_recv(test);
}
/* Perform callbacks */
if (timer_expired(test->stats_timer)) {
test->stats_callback(test);
update_timer(test->stats_timer, test->stats_interval, 0);
}
if (timer_expired(test->reporter_timer)) {
test->reporter_callback(test);
update_timer(test->reporter_timer, test->reporter_interval, 0);
}
}
}
}
/* Clean up the last test */
iperf_test_reset(test);
printf("\n");
}
return 0;
}