You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
104 lines
2.6 KiB
104 lines
2.6 KiB
#!/bin/bash
|
|
#
|
|
# contrary to ttcn3-tcpdump-start.sh, this version is dumpcap-only and
|
|
# needed when we want to capture from interfaces of different link
|
|
# types. It will also store the results as pcap-ng, not plain old pcap.
|
|
|
|
PIDFILE_PCAP=/tmp/pcap.pid
|
|
DUMPCAP=/usr/bin/dumpcap
|
|
|
|
PIDFILE_NETCAT=/tmp/netcat.pid
|
|
NETCAT=/bin/nc
|
|
GSMTAP_PORT=4729
|
|
|
|
TESTCASE=$1
|
|
|
|
kill_rm_pidfile() {
|
|
if [ -e $1 ]; then
|
|
kill "$(cat "$1")"
|
|
rm $1
|
|
fi
|
|
}
|
|
|
|
echo "------ $TESTCASE ------"
|
|
date
|
|
|
|
if [ "z$TTCN3_PCAP_PATH" = "z" ]; then
|
|
TTCN3_PCAP_PATH=/tmp
|
|
fi
|
|
|
|
kill_rm_pidfile $PIDFILE_NETCAT
|
|
kill_rm_pidfile $PIDFILE_PCAP
|
|
|
|
if [ ! -x $DUMPCAP ]; then
|
|
echo "Missing required dumpcap binary at ${DUMPCAP}"
|
|
exit 31
|
|
fi
|
|
|
|
if [ "$(id -u)" = "0" ]; then
|
|
CMD="$DUMPCAP -q"
|
|
else
|
|
CAP_ERR="1"
|
|
if [ -x /sbin/setcap ]; then
|
|
# N. B: this check requires libcap2-bin package
|
|
/sbin/setcap -q -v 'cap_net_admin,cap_net_raw=pie' $DUMPCAP
|
|
CAP_ERR="$?"
|
|
fi
|
|
if [ -u $DUMPCAP -o "$CAP_ERR" = "0" ]; then
|
|
CMD="$DUMPCAP -q"
|
|
else
|
|
echo "NOTE: unable to use dumpcap due to missing capabilities or suid bit"
|
|
exit 32
|
|
fi
|
|
fi
|
|
|
|
# Create a dummy sink for GSMTAP packets
|
|
$NETCAT -l -u -k -p $GSMTAP_PORT >/dev/null 2>$TESTCASE.netcat.stderr &
|
|
PID=$!
|
|
echo $PID > $PIDFILE_NETCAT
|
|
|
|
# generate the list of interface arguments. For capturing from
|
|
# interfaces of different link-layer types, we cannot use "-i all"
|
|
# but must use dumpcap with each individual interface name. We also
|
|
# must write pcapng files, as only those can record the interface of
|
|
# each packet
|
|
ADDL_ARGS="-i lo"
|
|
for f in /sys/class/net/*; do
|
|
DEV=`basename $f`
|
|
if [[ "$DEV" == "hdlcnet"* ]]; then
|
|
# skip these as we only want the hdlcX devices, avoid capturing twice on both sides
|
|
continue
|
|
elif [[ "$DEV" == "hdlc"* ]]; then
|
|
# these are the user-side of the FR links, which is
|
|
# what we interface with from our test suite, emulating
|
|
# a BSS.
|
|
ADDL_ARGS="${ADDL_ARGS} -i ${DEV}"
|
|
elif [[ "$DEV" == "eth"* ]]; then
|
|
# we blindly assume that "normal" docker network devices
|
|
# are called ethXXX
|
|
ADDL_ARGS="${ADDL_ARGS} -i ${DEV}"
|
|
fi
|
|
done
|
|
|
|
$CMD -s 1500 -n ${ADDL_ARGS} -w "$TTCN3_PCAP_PATH/$TESTCASE.pcapng" >$TTCN3_PCAP_PATH/$TESTCASE.pcapng.stdout 2>&1 &
|
|
PID=$!
|
|
echo $PID > $PIDFILE_PCAP
|
|
|
|
# Wait until packet dumper creates the pcap file and starts recording.
|
|
# We generate some traffic until we see packet dumper catches it.
|
|
# Timeout is 10 seconds.
|
|
ping 127.0.0.1 >/dev/null 2>&1 &
|
|
PID=$!
|
|
i=0
|
|
while [ ! -f "$TTCN3_PCAP_PATH/$TESTCASE.pcapng" ] ||
|
|
[ "$(stat -c '%s' "$TTCN3_PCAP_PATH/$TESTCASE.pcapng")" -eq 32 ]
|
|
do
|
|
echo "Waiting for packet dumper to start... $i"
|
|
sleep 1
|
|
i=$((i+1))
|
|
if [ $i -eq 10 ]; then
|
|
break
|
|
fi
|
|
done
|
|
kill $PID
|