2 * tcp_metrics.c "ip tcp_metrics/tcpmetrics"
4 * This program is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU General Public License
6 * version 2 as published by the Free Software Foundation;
8 * Authors: Julian Anastasov <ja@ssi.bg>, August 2012
16 #include <sys/types.h>
17 #include <sys/socket.h>
18 #include <arpa/inet.h>
19 #include <sys/ioctl.h>
22 #include <linux/genetlink.h>
23 #include <linux/tcp_metrics.h>
26 #include "ip_common.h"
29 static void usage(void)
31 fprintf(stderr, "Usage: ip tcp_metrics/tcpmetrics { COMMAND | help }\n");
32 fprintf(stderr, " ip tcp_metrics { show | flush } SELECTOR\n");
33 fprintf(stderr, " ip tcp_metrics delete [ address ] ADDRESS\n");
34 fprintf(stderr, "SELECTOR := [ [ address ] PREFIX ]\n");
39 static struct rtnl_handle grth = { .fd = -1 };
40 static int genl_family = -1;
42 #define TCPM_REQUEST(_req, _bufsiz, _cmd, _flags) \
43 GENL_REQUEST(_req, _bufsiz, genl_family, 0, \
44 TCP_METRICS_GENL_VERSION, _cmd, _flags)
46 #define CMD_LIST 0x0001 /* list, lst, show */
47 #define CMD_DEL 0x0002 /* delete, remove */
48 #define CMD_FLUSH 0x0004 /* flush */
57 { "delete", CMD_DEL },
58 { "remove", CMD_DEL },
59 { "flush", CMD_FLUSH },
62 static char *metric_name[TCP_METRIC_MAX + 1] = {
63 [TCP_METRIC_RTT] = "rtt",
64 [TCP_METRIC_RTTVAR] = "rttvar",
65 [TCP_METRIC_SSTHRESH] = "ssthresh",
66 [TCP_METRIC_CWND] = "cwnd",
67 [TCP_METRIC_REORDERING] = "reordering",
81 static int flush_update(void)
83 if (rtnl_send_check(&grth, f.flushb, f.flushp) < 0) {
84 perror("Failed to send flush request\n");
91 static int process_msg(const struct sockaddr_nl *who, struct nlmsghdr *n,
94 FILE *fp = (FILE *) arg;
95 struct genlmsghdr *ghdr;
96 struct rtattr *attrs[TCP_METRICS_ATTR_MAX + 1], *a;
97 int len = n->nlmsg_len;
98 inet_prefix daddr, saddr;
99 int family, i, atype, stype, dlen = 0, slen = 0;
101 if (n->nlmsg_type != genl_family)
104 len -= NLMSG_LENGTH(GENL_HDRLEN);
108 ghdr = NLMSG_DATA(n);
109 if (ghdr->cmd != TCP_METRICS_CMD_GET)
112 parse_rtattr(attrs, TCP_METRICS_ATTR_MAX, (void *) ghdr + GENL_HDRLEN,
115 a = attrs[TCP_METRICS_ATTR_ADDR_IPV4];
117 if (f.daddr.family && f.daddr.family != AF_INET)
119 memcpy(&daddr.data, RTA_DATA(a), 4);
122 atype = TCP_METRICS_ATTR_ADDR_IPV4;
123 dlen = RTA_PAYLOAD(a);
125 a = attrs[TCP_METRICS_ATTR_ADDR_IPV6];
127 if (f.daddr.family && f.daddr.family != AF_INET6)
129 memcpy(&daddr.data, RTA_DATA(a), 16);
132 atype = TCP_METRICS_ATTR_ADDR_IPV6;
133 dlen = RTA_PAYLOAD(a);
138 a = attrs[TCP_METRICS_ATTR_SADDR_IPV4];
140 if (f.saddr.family && f.saddr.family != AF_INET)
142 memcpy(&saddr.data, RTA_DATA(a), 4);
144 stype = TCP_METRICS_ATTR_SADDR_IPV4;
145 slen = RTA_PAYLOAD(a);
147 a = attrs[TCP_METRICS_ATTR_SADDR_IPV6];
149 if (f.saddr.family && f.saddr.family != AF_INET6)
151 memcpy(&saddr.data, RTA_DATA(a), 16);
153 stype = TCP_METRICS_ATTR_SADDR_IPV6;
154 slen = RTA_PAYLOAD(a);
158 if (f.daddr.family && f.daddr.bitlen >= 0 &&
159 inet_addr_match(&daddr, &f.daddr, f.daddr.bitlen))
161 /* Only check for the source-address if the kernel supports it,
164 if (slen && f.saddr.family && f.saddr.bitlen >= 0 &&
165 inet_addr_match(&saddr, &f.saddr, f.saddr.bitlen))
171 TCPM_REQUEST(req2, 128, TCP_METRICS_CMD_DEL, NLM_F_REQUEST);
173 addattr_l(&req2.n, sizeof(req2), atype, &daddr.data,
176 addattr_l(&req2.n, sizeof(req2), stype, &saddr.data,
179 if (NLMSG_ALIGN(f.flushp) + req2.n.nlmsg_len > f.flushe) {
183 fn = (struct nlmsghdr *) (f.flushb + NLMSG_ALIGN(f.flushp));
184 memcpy(fn, &req2.n, req2.n.nlmsg_len);
185 fn->nlmsg_seq = ++grth.seq;
186 f.flushp = (((char *) fn) + req2.n.nlmsg_len) - f.flushb;
192 if (f.cmd & (CMD_DEL | CMD_FLUSH))
193 fprintf(fp, "Deleted ");
196 format_host(family, dlen, &daddr.data));
198 a = attrs[TCP_METRICS_ATTR_AGE];
200 unsigned long long val = rta_getattr_u64(a);
202 fprintf(fp, " age %llu.%03llusec",
203 val / 1000, val % 1000);
206 a = attrs[TCP_METRICS_ATTR_TW_TS_STAMP];
208 __s32 val = (__s32) rta_getattr_u32(a);
211 a = attrs[TCP_METRICS_ATTR_TW_TSVAL];
212 tsval = a ? rta_getattr_u32(a) : 0;
213 fprintf(fp, " tw_ts %u/%dsec ago", tsval, val);
216 a = attrs[TCP_METRICS_ATTR_VALS];
218 struct rtattr *m[TCP_METRIC_MAX + 1 + 1];
219 unsigned long rtt = 0, rttvar = 0;
221 parse_rtattr_nested(m, TCP_METRIC_MAX + 1, a);
223 for (i = 0; i < TCP_METRIC_MAX + 1; i++) {
229 if (i != TCP_METRIC_RTT &&
230 i != TCP_METRIC_RTT_US &&
231 i != TCP_METRIC_RTTVAR &&
232 i != TCP_METRIC_RTTVAR_US) {
234 fprintf(fp, " %s ", metric_name[i]);
236 fprintf(fp, " metric_%d ", i);
238 val = rta_getattr_u32(a);
242 rtt = (val * 1000UL) >> 3;
244 case TCP_METRIC_RTTVAR:
246 rttvar = (val * 1000UL) >> 2;
248 case TCP_METRIC_RTT_US:
251 case TCP_METRIC_RTTVAR_US:
254 case TCP_METRIC_SSTHRESH:
255 case TCP_METRIC_CWND:
256 case TCP_METRIC_REORDERING:
258 fprintf(fp, "%lu", val);
263 fprintf(fp, " rtt %luus", rtt);
265 fprintf(fp, " rttvar %luus", rttvar);
268 a = attrs[TCP_METRICS_ATTR_FOPEN_MSS];
270 fprintf(fp, " fo_mss %u", rta_getattr_u16(a));
272 a = attrs[TCP_METRICS_ATTR_FOPEN_SYN_DROPS];
274 __u16 syn_loss = rta_getattr_u16(a);
275 unsigned long long ts;
277 a = attrs[TCP_METRICS_ATTR_FOPEN_SYN_DROP_TS];
278 ts = a ? rta_getattr_u64(a) : 0;
280 fprintf(fp, " fo_syn_drops %u/%llu.%03llusec ago",
281 syn_loss, ts / 1000, ts % 1000);
284 a = attrs[TCP_METRICS_ATTR_FOPEN_COOKIE];
287 unsigned char *ptr = RTA_DATA(a);
288 int i, max = RTA_PAYLOAD(a);
293 for (i = 0; i < max; i++)
294 sprintf(cookie + i + i, "%02x", ptr[i]);
295 fprintf(fp, " fo_cookie %s", cookie);
299 fprintf(fp, " source %s",
300 format_host(family, slen, &saddr.data));
309 static int tcpm_do_cmd(int cmd, int argc, char **argv)
311 TCPM_REQUEST(req, 1024, TCP_METRICS_CMD_GET, NLM_F_REQUEST);
312 int atype = -1, stype = -1;
315 memset(&f, 0, sizeof(f));
317 f.daddr.family = preferred_family;
319 f.saddr.family = preferred_family;
321 switch (preferred_family) {
327 fprintf(stderr, "Unsupported protocol family: %d\n", preferred_family);
331 for (; argc > 0; argc--, argv++) {
332 if (strcmp(*argv, "src") == 0 ||
333 strcmp(*argv, "source") == 0) {
337 if (matches(*argv, "help") == 0)
339 if (f.saddr.bitlen >= 0)
342 get_prefix(&f.saddr, *argv, preferred_family);
343 if (f.saddr.bytelen && f.saddr.bytelen * 8 == f.saddr.bitlen) {
344 if (f.saddr.family == AF_INET)
345 stype = TCP_METRICS_ATTR_SADDR_IPV4;
346 else if (f.saddr.family == AF_INET6)
347 stype = TCP_METRICS_ATTR_SADDR_IPV6;
351 fprintf(stderr, "Error: a specific IP address is expected rather than \"%s\"\n",
356 char *who = "address";
358 if (strcmp(*argv, "addr") == 0 ||
359 strcmp(*argv, "address") == 0) {
363 if (matches(*argv, "help") == 0)
365 if (f.daddr.bitlen >= 0)
368 get_prefix(&f.daddr, *argv, preferred_family);
369 if (f.daddr.bytelen && f.daddr.bytelen * 8 == f.daddr.bitlen) {
370 if (f.daddr.family == AF_INET)
371 atype = TCP_METRICS_ATTR_ADDR_IPV4;
372 else if (f.daddr.family == AF_INET6)
373 atype = TCP_METRICS_ATTR_ADDR_IPV6;
375 if ((CMD_DEL & cmd) && atype < 0) {
376 fprintf(stderr, "Error: a specific IP address is expected rather than \"%s\"\n",
384 if (cmd == CMD_DEL && atype < 0)
387 /* flush for exact address ? Single del */
388 if (cmd == CMD_FLUSH && atype >= 0)
391 /* flush for all addresses ? Single del without address */
392 if (cmd == CMD_FLUSH && f.daddr.bitlen <= 0 &&
393 f.saddr.bitlen <= 0 && preferred_family == AF_UNSPEC) {
395 req.g.cmd = TCP_METRICS_CMD_DEL;
397 } else if (cmd == CMD_DEL) {
398 req.g.cmd = TCP_METRICS_CMD_DEL;
400 } else { /* CMD_FLUSH, CMD_LIST */
404 if (genl_family < 0) {
405 if (rtnl_open_byproto(&grth, 0, NETLINK_GENERIC) < 0) {
406 fprintf(stderr, "Cannot open generic netlink socket\n");
409 genl_family = genl_resolve_family(&grth,
410 TCP_METRICS_GENL_NAME);
413 req.n.nlmsg_type = genl_family;
416 if (!(cmd & CMD_FLUSH) && (atype >= 0 || (cmd & CMD_DEL))) {
418 req.n.nlmsg_flags |= NLM_F_ACK;
420 addattr_l(&req.n, sizeof(req), atype, &f.daddr.data,
423 addattr_l(&req.n, sizeof(req), stype, &f.saddr.data,
426 req.n.nlmsg_flags |= NLM_F_DUMP;
430 if (cmd & CMD_FLUSH) {
432 char flushb[4096-512];
436 f.flushe = sizeof(flushb);
439 req.n.nlmsg_seq = grth.dump = ++grth.seq;
440 if (rtnl_send(&grth, &req, req.n.nlmsg_len) < 0) {
441 perror("Failed to send flush request");
445 if (rtnl_dump_filter(&grth, process_msg, stdout) < 0) {
446 fprintf(stderr, "Flush terminated\n");
449 if (f.flushed == 0) {
451 fprintf(stderr, "Nothing to flush.\n");
452 } else if (show_stats)
453 printf("*** Flush is complete after %d round%s ***\n",
454 round, round > 1 ? "s" : "");
459 if (flush_update() < 0)
462 printf("\n*** Round %d, deleting %d entries ***\n",
471 if (rtnl_talk(&grth, &req.n, NULL, 0) < 0)
473 } else if (atype >= 0) {
474 if (rtnl_talk(&grth, &req.n, &req.n, sizeof(req)) < 0)
476 if (process_msg(NULL, &req.n, stdout) < 0) {
477 fprintf(stderr, "Dump terminated\n");
481 req.n.nlmsg_seq = grth.dump = ++grth.seq;
482 if (rtnl_send(&grth, &req, req.n.nlmsg_len) < 0) {
483 perror("Failed to send dump request");
487 if (rtnl_dump_filter(&grth, process_msg, stdout) < 0) {
488 fprintf(stderr, "Dump terminated\n");
495 int do_tcp_metrics(int argc, char **argv)
500 return tcpm_do_cmd(CMD_LIST, 0, NULL);
501 for (i = 0; i < ARRAY_SIZE(cmds); i++) {
502 if (matches(argv[0], cmds[i].name) == 0)
503 return tcpm_do_cmd(cmds[i].code, argc-1, argv+1);
505 if (matches(argv[0], "help") == 0)
508 fprintf(stderr, "Command \"%s\" is unknown, try \"ip tcp_metrics help\".\n",