run.rs 23 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544
  1. use std::{path::{Path, PathBuf}, fs::{File, self, OpenOptions}, io::{BufWriter, Write, self, Read, BufRead}, net::Ipv4Addr, process::{Command, self, Stdio}, time::{Instant, Duration}, thread};
  2. use json::JsonValue;
  3. use log::info;
  4. use rand::prelude::*;
  5. use anyhow::{Context, ensure, anyhow};
  6. mod args;
  7. mod error;
  8. pub use crate::run::args::*;
  9. pub use crate::run::error::*;
  10. pub use crate::run::args::TestType::*;
  11. pub use crate::run::args::FilterType::*;
  12. pub const BENCH_BASE_PATH: &str = "./bench";
  13. pub const BENCH_DATA_PATH: &str = "data";
  14. pub const BENCH_BIN_PATH: &str = "bin";
  15. pub const BENCH_LOG_PATH: &str = "log";
  16. const XDP_LOAD_TIMEOUT_SECS: u64 = 5;
  17. const PRIVILEGE_RUNNER: [&str;1] = ["sudo"];
  18. fn log<R>(log_path: &Path, reader: &mut R, name: &str) -> anyhow::Result<()>
  19. where
  20. R: ?Sized,
  21. R: Read
  22. {
  23. fs::create_dir_all(log_path)?;
  24. let path = log_path.join(format!("{}.log", name));
  25. let mut file = OpenOptions::new().append(true).create(true).open(&path)
  26. .context(format!("Failed to create logfile {}", path.to_str().unwrap()))?;
  27. io::copy(reader, &mut file)
  28. .context(format!("Failed to write to logfile {}", path.to_str().unwrap()))?;
  29. Ok(())
  30. }
  31. fn log_both<R1, R2>(log_path: &Path, stderr: &mut R1, stdout: &mut R2, name: &str) -> anyhow::Result<()>
  32. where
  33. R1: ?Sized,
  34. R2: ?Sized,
  35. R1: Read,
  36. R2: Read
  37. {
  38. let stderr_name = format!("{}.stderr", name);
  39. log(log_path, stderr, &stderr_name.as_str())?;
  40. let stdout_name = format!("{}.stdout", name);
  41. log(log_path, stdout, &stdout_name.as_str())?;
  42. Ok(())
  43. }
  44. pub fn run() -> Result<(), anyhow::Error> {
  45. clean().context("Cleaning bench folder")?;
  46. let cores: u32 = 4;
  47. let seed: u64 = 0x1337133713371337;
  48. let scan_sizes: Vec<u64> = vec![8, 16];//, 24];//,32]; // TODO 8 only for test purposes
  49. // let scan_sizes: Vec<u64> = vec![24];
  50. // let hit_rates: Vec<f64> = vec![0.001, 0.0032,0.01,0.032,0.1];
  51. let hit_rates: Vec<f64> = vec![0.02];
  52. // let false_positive_rates: Vec<TestType> = vec![Baseline, EmptyFilter,Normal(0.1),Normal(0.01),Normal(0.001),Normal(0.0001)];
  53. let false_positive_rates: Vec<TestType> = vec![Baseline, Normal(0.001), BpfStats(0.001)];
  54. let filter_types: Vec<FilterType> = vec![Bitmap, Bloom];
  55. let baseline_filter_types: Vec<FilterType> = vec![Bitmap];
  56. // let scan_rates: Vec<u64> = vec![316_000, 562_000, 1_000_000, 1_780_000, 3_160_000];
  57. let scan_rates: Vec<u64> = vec![500000, 629463, 792447, 997631, 1255943, 1581139, 1990536, 2505936, 3154787, 3971641, 5000000];
  58. for scan_size in &scan_sizes {
  59. for hit_rate in &hit_rates {
  60. let data_args = DataArgs::from(seed, *scan_size, *hit_rate);
  61. if data_args.entries == 0 {
  62. info!("Skipping {}; no entries", data_args);
  63. continue;
  64. }
  65. info!("Building IP file for {}", data_args);
  66. let (ip_file_path, subnet) = build_ip_file(data_args)
  67. .context(format!("Building ip file for {}", data_args))?;
  68. info!("subnet for {} is {}", data_args, subnet);
  69. for test_type in &false_positive_rates {
  70. let filter_types = match test_type {
  71. Normal(_) | BpfStats(_) => {
  72. &filter_types
  73. },
  74. Baseline => {
  75. &baseline_filter_types
  76. }
  77. };
  78. for filter_type in filter_types {
  79. let bloom_args = FilterArgs::from(data_args, *test_type, *filter_type);
  80. info!("Building binaries for {} {}", data_args, bloom_args);
  81. build_binaries(data_args, bloom_args)
  82. .context(format!("Failed to build binaries for {} {}", data_args, bloom_args))?;
  83. let filter_path = match test_type {
  84. Normal(_) | BpfStats(_) => {
  85. info!("Building filter for {} {}", data_args, bloom_args);
  86. let filter_path = build_filter(data_args, bloom_args, *filter_type, ip_file_path.as_path())
  87. .context(format!("Failed to build filter for {} {}", data_args, bloom_args))?;
  88. Some(filter_path)
  89. },
  90. Baseline => {
  91. None
  92. }
  93. };
  94. for scan_rate in &scan_rates {
  95. let scan_args = ScanArgs::new(*scan_rate);
  96. let args = BenchArgs {data_args, bloom_filter_args: bloom_args, scan_args};
  97. let run_output = (|| {
  98. fs::create_dir_all(args.wd_path())
  99. .context("Failed to create wd")
  100. .map_err(|e| (None, e))?;
  101. let (handle, stderr_handle, stdout_handle) = match test_type {
  102. Normal(_) | BpfStats(_) => {
  103. info!("Loading XDP program for {}", args);
  104. let (handle, stderr_handle, stdout_handle) = load_xdp(args, filter_path.clone().unwrap().as_path())
  105. .map_err(|(h, e)| (h, e.context(format!("Loading XDP program for {}", args))))?;
  106. (Some(handle), Some(stderr_handle), Some(stdout_handle))
  107. },
  108. Baseline => {
  109. info!("Not loading XDP program for {}", args);
  110. (None, None, None)
  111. }
  112. };
  113. if let BpfStats(_) = test_type {
  114. info!("Enabling bpf_stats");
  115. if let Err(e) = set_bpf_stats(args, true) {
  116. return Err((handle, e));
  117. }
  118. }
  119. info!("Running zmap for {}", args);
  120. let zmap_result = run_zmap(args, subnet)
  121. .context(format!("Running zmap for {}", args));
  122. if let Err(e) = zmap_result {
  123. return Err((handle, e));
  124. }
  125. let zmap_output = zmap_result.unwrap();
  126. let bpf_stats = match test_type {
  127. BpfStats(_) => {
  128. info!("Disabling and collecting bpf_stats");
  129. if let Err(e) = set_bpf_stats(args, false) {
  130. return Err((handle, e));
  131. }
  132. let bpf_stats_result = read_bpf_stats(args)
  133. .context(format!("Failed to read bpf stats for {}", args));
  134. if let Err(e) = bpf_stats_result {
  135. return Err((handle, e));
  136. }
  137. let bpf_stats = bpf_stats_result.unwrap();
  138. Some(bpf_stats)
  139. }
  140. _ => {
  141. None
  142. }
  143. };
  144. let responder_output = match test_type {
  145. BpfStats(_) | Normal(_) => {
  146. info!("Telling 'responder' to unload XDP");
  147. let responder_output = unload_xdp(args, handle.unwrap())
  148. .map_err(|(h, e)| (h, e.context(format!("Could not successfully unload XDP program for {}", args))))?;
  149. Some(responder_output)
  150. }
  151. Baseline => {
  152. None
  153. }
  154. };
  155. Ok((zmap_output, responder_output, bpf_stats, stderr_handle, stdout_handle))
  156. })();
  157. let (zmap_output, _responder_output, bpf_stats, responder_stderr_handle, responder_stdout_handle) = run_output.map_err(|(handle, e)| {
  158. if let Some(mut handle) = handle {
  159. let kill_result = handle.kill();
  160. if let Err(kill_e) = kill_result {
  161. return anyhow!(kill_e)
  162. .context(e)
  163. .context(format!("Failed to kill responder process for {}; Killed because of reason below", args));
  164. }
  165. }
  166. e
  167. })?;
  168. if let Some(responder_stderr_handle) = responder_stderr_handle {
  169. responder_stderr_handle.join()
  170. .map_err(|_| anyhow!("stderr thread panicked"))
  171. .and(responder_stdout_handle.unwrap().join()
  172. .map_err(|_| anyhow!("stdout thread panicked")))
  173. .and_then(|res| res)
  174. .context(format!("Error occured in a log thread for {}", args))?;
  175. }
  176. File::create(args.wd_path().join("zmap_stats.txt"))
  177. .context(format!("Failed to create zmap_stats.txt file for {}", args))?
  178. .write_all(&zmap_output.stderr.as_slice())
  179. .context(format!("Failed to write to zmap_stats.txt file for {}", args))?;
  180. if let Some(bpf_stats) = bpf_stats {
  181. File::create(args.wd_path().join("bpf_stats.json"))
  182. .context(format!("Failed to create bpf_stats.json file for {}", args))?
  183. .write_all(format!("{{\"run_count\": {}, \"run_time\": {}, \"mem_lock\": {}}}", bpf_stats.0, bpf_stats.1, bpf_stats.2).as_bytes())
  184. .context(format!("Failed to write to bpf_stats.json file for {}", args))?;
  185. }
  186. }
  187. }
  188. }
  189. }
  190. }
  191. Ok(())
  192. }
  193. fn clean() -> anyhow::Result<()> {
  194. let path = PathBuf::from(BENCH_BASE_PATH);
  195. if (&path).exists() {
  196. fs::remove_dir_all(&path).context(format!("Failed to clean path: {:?}", &path))?;
  197. }
  198. Ok(())
  199. }
  200. fn next_ip(rng: &mut SmallRng, mask: u32) -> u32 {
  201. loop {
  202. let ip = rng.next_u32() & mask;
  203. if ip & 0xff000000 != 0x7f000000 {
  204. // can not have ips in 127.0.0.0/8
  205. break ip;
  206. }
  207. }
  208. }
  209. fn build_ip_file(data_args: DataArgs) -> anyhow::Result<(PathBuf, Ipv4Addr)> {
  210. let mut path = PathBuf::new();
  211. path.push(BENCH_BASE_PATH);
  212. path.push(BENCH_DATA_PATH);
  213. path.push(data_args.rel_path());
  214. path.push("ips.txt");
  215. fs::create_dir_all(path.parent().unwrap())?;
  216. let ip_file = File::create(&path)?;
  217. let mut writer = BufWriter::new(ip_file);
  218. let mut rng = SmallRng::seed_from_u64(data_args.seed);
  219. let lower_subnet_mask = ((1u64 << (data_args.scan_subnet_size)) - 1u64) as u32;
  220. let upper_subnet_mask = u32::MAX - lower_subnet_mask;
  221. let subnet = next_ip(&mut rng, upper_subnet_mask);
  222. for _ in 0..data_args.entries {
  223. let ip = subnet | next_ip(&mut rng, lower_subnet_mask);
  224. writer.write(Ipv4Addr::from(ip).to_string().as_bytes())?;
  225. writer.write(b"\n")?;
  226. }
  227. Ok((path, Ipv4Addr::from(subnet)))
  228. }
  229. fn build_binaries(data_args: DataArgs, bloom_args: FilterArgs) -> anyhow::Result<()> {
  230. let bin_path = BenchArgs::bin_bin_path(data_args, bloom_args);
  231. fs::create_dir_all(&bin_path).context("Failed to create bench dir")?;
  232. let output = Command::new("cargo")
  233. .args([
  234. "xtask",
  235. "build-artifacts",
  236. "--output-folder", bin_path.to_str().unwrap()
  237. ])
  238. .env("BLOOMFILTER_ADDRESS_BITS", bloom_args.address_bits.to_string())
  239. .env("BLOOMFILTER_ADDRESS_BITS_CHUNK", bloom_args.chunk_address_bits.to_string())
  240. .env("BLOOMFILTER_HASH_COUNT", bloom_args.hash_count.unwrap_or(0).to_string())
  241. .stdin(Stdio::null())
  242. .stderr(Stdio::piped())
  243. .stdout(Stdio::null())
  244. .output()
  245. .context("Failed to run cargo xtask build-artifacts")?;
  246. let log_path = BenchArgs::bin_log_path(data_args, bloom_args);
  247. log_both(&log_path, &mut output.stderr.as_slice(), &mut output.stdout.as_slice(), "build-artifacts")?;
  248. ensure!(output.status.success(), CommandError::new(output, log_path));
  249. Ok(())
  250. }
  251. fn build_filter(data_args: DataArgs, bloom_args: FilterArgs, filter_type: FilterType, ip_file_path: &Path) -> anyhow::Result<PathBuf> {
  252. let filter_file = match filter_type {
  253. Bloom => "ips.bfb",
  254. Bitmap => "ips.fb",
  255. };
  256. let path = BenchArgs::bin_wd_path(data_args, bloom_args).join(filter_file);
  257. fs::create_dir_all(path.parent().unwrap()).context("Failed to create bench dir")?;
  258. let filter_type_string = filter_type.to_string().to_lowercase();
  259. let output = Command::new("/usr/bin/time")
  260. .args([
  261. // time args
  262. "-o", BenchArgs::bin_wd_path(data_args, bloom_args).join("filter_extern_time.json").to_str().unwrap(),
  263. "--format", "{\"clock\": %e, \"cpu_p\": \"%P\", \"kernel_s\": %S, \"user_s\": %U}",
  264. // actual command
  265. BenchArgs::bin_bin_path(data_args, bloom_args).join("tools/build_filter").to_str().unwrap(),
  266. "--force",
  267. "--timing-path", BenchArgs::bin_wd_path(data_args, bloom_args).join("filter_intern_time.json").to_str().unwrap(),
  268. filter_type_string.as_str(),
  269. ip_file_path.to_str().unwrap(),
  270. path.to_str().unwrap()
  271. ])
  272. .env("RUST_LOG", "info")
  273. .stdin(Stdio::null())
  274. .stderr(Stdio::piped())
  275. .stdout(Stdio::piped())
  276. .output()
  277. .context("Failed to run build_filter binary")?;
  278. let log_path = BenchArgs::bin_log_path(data_args, bloom_args);
  279. log_both(&log_path, &mut output.stderr.as_slice(), &mut output.stdout.as_slice(), "build-filter")?;
  280. ensure!(output.status.success(), CommandError::new(output, log_path));
  281. Ok(path)
  282. }
  283. type LogJoinHandle = thread::JoinHandle<anyhow::Result<()>>;
  284. fn load_xdp(bench_args: BenchArgs, filter_path: &Path) -> Result<(process::Child, LogJoinHandle, LogJoinHandle), (Option<process::Child>, anyhow::Error)> {
  285. let responder_path = bench_args.bin_path().join("responder");
  286. let target= bench_args.bin_path().join("ebpf");
  287. let fd_info_out_path = bench_args.wd_path().join("responder_info.json");
  288. let filter_type = bench_args.bloom_filter_args.filter_type.to_string().to_lowercase();
  289. let mut args = Vec::from(PRIVILEGE_RUNNER);
  290. args.extend_from_slice(&[
  291. responder_path.to_str().unwrap(),
  292. "--filter-path", filter_path.to_str().unwrap(),
  293. "--target", target.to_str().unwrap(),
  294. "--fd-info-out-path", fd_info_out_path.to_str().unwrap(),
  295. "--filter-type", filter_type.as_str(),
  296. ]);
  297. println!("{:?}", args);
  298. let mut handle = Command::new(args.remove(0))
  299. .args(args)
  300. .env("RUST_LOG", "info")
  301. .stdin(Stdio::piped())
  302. .stderr(Stdio::piped())
  303. .stdout(Stdio::piped())
  304. .spawn()
  305. .context("Failed to run responder to load XDP")
  306. .map_err(|e| (None, e))?;
  307. let mut stderr = handle.stderr.take().unwrap();
  308. let mut stdout = handle.stdout.take().unwrap();
  309. let stderr_handle = thread::spawn(move || log(&bench_args.log_path(), &mut stderr, "responder.stderr"));
  310. let stdout_handle = thread::spawn(move || log(&bench_args.log_path(), &mut stdout, "responder.stdout"));
  311. if let Err(e) = try_wait_xdp_loaded(bench_args, &mut handle) {
  312. return Err((Some(handle), e));
  313. }
  314. return Ok((handle, stderr_handle, stdout_handle));
  315. }
  316. fn try_wait_xdp_loaded(_bench_args: BenchArgs, handle: &mut process::Child) -> anyhow::Result<()> {
  317. let start = Instant::now();
  318. let mut last_ip_link = None;
  319. while start.elapsed().as_secs() < XDP_LOAD_TIMEOUT_SECS {
  320. if let Some(_) = handle.try_wait()? {
  321. return Err(anyhow!("Responder exited too early"));
  322. }
  323. let output = Command::new("ip")
  324. .args(["link", "show", "lo"])
  325. .output()
  326. .context("Failed to run 'ip link show lo'")?;
  327. let ip_link_info = String::from_utf8(output.stdout)?;
  328. last_ip_link = Some(ip_link_info.clone());
  329. if let Some(l) = ip_link_info.lines().skip(2).next() {
  330. if let Some(id) = l.strip_prefix(" prog/xdp id") {
  331. info!("XDP loaded; id:{}", id);
  332. return Ok(())
  333. }
  334. }
  335. thread::sleep(Duration::from_millis(100));
  336. }
  337. Err(anyhow!(
  338. "XDP program did not load within timeout ({}); last ip link show lo info: {}",
  339. XDP_LOAD_TIMEOUT_SECS,
  340. last_ip_link.unwrap_or(String::from("no ip link info"))
  341. ))
  342. }
  343. fn unload_xdp(bench_args: BenchArgs,mut handle: process::Child) -> Result<process::Output, (Option<process::Child>, anyhow::Error)> {
  344. let result = handle.stdin.take().unwrap().write(&[b'\n']);
  345. if let Err(e) = result {
  346. return Err((Some(handle), anyhow!(e)));
  347. }
  348. let output = handle.wait_with_output().map_err(|e| (None, anyhow!(e)))?;
  349. if !output.status.success() {
  350. return Err((None, anyhow!(CommandError::new(output, bench_args.log_path()))));
  351. }
  352. return Ok(output);
  353. }
  354. fn set_bpf_stats(bench_args: BenchArgs, enabled: bool) -> anyhow::Result<()> {
  355. let setting = format!("kernel.bpf_stats_enabled={}", if enabled {1} else {0});
  356. let mut args = Vec::from(PRIVILEGE_RUNNER);
  357. args.extend_from_slice(&[
  358. "sysctl", "-w", setting.as_str()
  359. ]);
  360. let output = Command::new(args.remove(0))
  361. .args(args)
  362. .stdin(Stdio::null())
  363. .stderr(Stdio::piped())
  364. .stdout(Stdio::piped())
  365. .output()
  366. .context("Failed to run sysctl")?;
  367. let name = format!("sysctl_{}", if enabled {"enable"} else {"disable"});
  368. log_both(&bench_args.log_path(), &mut output.stderr.as_slice(), &mut output.stdout.as_slice(), name.as_str())?;
  369. ensure!(output.status.success(), CommandError::new(output, bench_args.log_path()));
  370. Ok(())
  371. }
  372. fn read_bpf_stats(bench_args: BenchArgs) -> anyhow::Result<(u128, u128, u128)> {
  373. // TODO Also collect memlock
  374. let mut info = vec![];
  375. File::open(bench_args.wd_path().join("responder_info.json"))
  376. .context("Failed to open responder_info.json file")?
  377. .read_to_end(&mut info)?;
  378. let info = json::parse(String::from_utf8(info)?.as_str())?;
  379. if let JsonValue::Object(o) = info {
  380. let fd = o.get("fd").ok_or(anyhow!("No key fd found in responder_info.json file"))?.as_u64().unwrap();
  381. let pid = o.get("pid").ok_or(anyhow!("No key pid found in responder_info.json file"))?.as_u64().unwrap();
  382. let mut path = PathBuf::from("/proc");
  383. path.push(pid.to_string());
  384. path.push("fdinfo");
  385. path.push(fd.to_string());
  386. let mut args = Vec::from(PRIVILEGE_RUNNER);
  387. args.extend_from_slice(&[
  388. "cat", path.to_str().unwrap()
  389. ]);
  390. let output = Command::new(args.remove(0))
  391. .args(args)
  392. .stdin(Stdio::null())
  393. .stderr(Stdio::piped())
  394. .stdout(Stdio::piped())
  395. .output()
  396. .context("Failed to read fd info from /proc/[pid]/fdinfo/[fd]")?;
  397. log_both(&bench_args.log_path(), &mut output.stderr.as_slice(), &mut output.stdout.as_slice(), "procfs")?;
  398. ensure!(output.status.success(), CommandError::new(output, bench_args.log_path()));
  399. let mut run_time: Option<u128> = None;
  400. let mut run_count: Option<u128> = None;
  401. let mut mem_lock: Option<u128> = None;
  402. for line in output.stdout.lines() {
  403. let line = line?;
  404. if let Some(run_time_str) = line.as_str().strip_prefix("run_time_ns:") {
  405. run_time = Some(run_time_str.trim().parse()?);
  406. } else if let Some(run_count_str) = line.as_str().strip_prefix("run_cnt:") {
  407. run_count = Some(run_count_str.trim().parse()?);
  408. } else if let Some(mem_lock_str) = line.as_str().strip_prefix("memlock:") {
  409. mem_lock = Some(mem_lock_str.trim().parse()?);
  410. }
  411. }
  412. return match (run_count, run_time, mem_lock) {
  413. (None, _, _) => Err(anyhow!("Could not read run_cnt from fdinfo file")),
  414. (_, None, _) => Err(anyhow!("Could not read run_time_ns from fdinfo file")),
  415. (_, _, None) => Err(anyhow!("Could not read mem_lock from fdinfo file")),
  416. (Some(run_count), Some(run_time), Some(mem_lock)) => Ok((run_count, run_time, mem_lock))
  417. }
  418. } else {
  419. return Err(anyhow!("Could not read json object from responder_info.json file"));
  420. }
  421. }
  422. fn run_zmap(bench_args: BenchArgs, subnet: Ipv4Addr) -> anyhow::Result<process::Output> {
  423. let subnet_string = format!("{}/{}",subnet, 32 - bench_args.data_args.scan_subnet_size);
  424. let output_file = bench_args.wd_path().join("zmap_out_ips.txt");
  425. let rate_string = bench_args.scan_args.rate.to_string();
  426. let interface = match bench_args.bloom_filter_args.test_type {
  427. Baseline => "dummyif",
  428. _ => "lo",
  429. };
  430. let seed = bench_args.data_args.seed.to_string();
  431. let mut args = Vec::from(PRIVILEGE_RUNNER);
  432. args.extend_from_slice(&[
  433. "zmap",
  434. subnet_string.as_str(),
  435. "--target-port=80",
  436. "--interface", interface,
  437. "--gateway-mac=00:00:00:00:00:00",
  438. "--output-file", output_file.to_str().unwrap(),
  439. "--rate", rate_string.as_str(),
  440. "--sender-threads=7",
  441. "--cooldown-time=1",
  442. "--seed", seed.as_str(),
  443. "--blacklist-file=blocklist",
  444. "--max-sendto-failures=-1"
  445. ]);
  446. let output = Command::new(args.remove(0))
  447. .args(args)
  448. .stdin(Stdio::null())
  449. .stderr(Stdio::piped())
  450. .stdout(Stdio::piped())
  451. .output()
  452. .context("Failed to run zmap")?;
  453. log_both(&bench_args.log_path(), &mut output.stderr.as_slice(), &mut output.stdout.as_slice(), "zmap")?;
  454. ensure!(output.status.success(), CommandError::new(output, bench_args.log_path()));
  455. return Ok(output);
  456. }