// SPDX-License-Identifier: GPL-2.0-only #define _GNU_SOURCE #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include "bpf_util.h" #include "network_helpers.h" #include "test_progs.h" #ifdef TRAFFIC_MONITOR /* Prevent pcap.h from including pcap/bpf.h and causing conflicts */ #define PCAP_DONT_INCLUDE_PCAP_BPF_H 1 #include #include #endif #ifndef IPPROTO_MPTCP #define IPPROTO_MPTCP 262 #endif #define clean_errno() (errno == 0 ? "None" : strerror(errno)) #define log_err(MSG, ...) ({ \ int __save = errno; \ fprintf(stderr, "(%s:%d: errno: %s) " MSG "\n", \ __FILE__, __LINE__, clean_errno(), \ ##__VA_ARGS__); \ errno = __save; \ }) struct ipv4_packet pkt_v4 = { .eth.h_proto = __bpf_constant_htons(ETH_P_IP), .iph.ihl = 5, .iph.protocol = IPPROTO_TCP, .iph.tot_len = __bpf_constant_htons(MAGIC_BYTES), .tcp.urg_ptr = 123, .tcp.doff = 5, }; struct ipv6_packet pkt_v6 = { .eth.h_proto = __bpf_constant_htons(ETH_P_IPV6), .iph.nexthdr = IPPROTO_TCP, .iph.payload_len = __bpf_constant_htons(MAGIC_BYTES), .tcp.urg_ptr = 123, .tcp.doff = 5, }; static const struct network_helper_opts default_opts; int settimeo(int fd, int timeout_ms) { struct timeval timeout = { .tv_sec = 3 }; if (timeout_ms > 0) { timeout.tv_sec = timeout_ms / 1000; timeout.tv_usec = (timeout_ms % 1000) * 1000; } if (setsockopt(fd, SOL_SOCKET, SO_RCVTIMEO, &timeout, sizeof(timeout))) { log_err("Failed to set SO_RCVTIMEO"); return -1; } if (setsockopt(fd, SOL_SOCKET, SO_SNDTIMEO, &timeout, sizeof(timeout))) { log_err("Failed to set SO_SNDTIMEO"); return -1; } return 0; } #define save_errno_close(fd) ({ int __save = errno; close(fd); errno = __save; }) int start_server_addr(int type, const struct sockaddr_storage *addr, socklen_t addrlen, const struct network_helper_opts *opts) { int fd; if (!opts) opts = &default_opts; fd = socket(addr->ss_family, type, opts->proto); if (fd < 0) { log_err("Failed to create server socket"); return -1; } if (settimeo(fd, opts->timeout_ms)) goto error_close; if (opts->post_socket_cb && opts->post_socket_cb(fd, opts->cb_opts)) { log_err("Failed to call post_socket_cb"); goto error_close; } if (bind(fd, (struct sockaddr *)addr, addrlen) < 0) { log_err("Failed to bind socket"); goto error_close; } if (type == SOCK_STREAM) { if (listen(fd, opts->backlog ? MAX(opts->backlog, 0) : 1) < 0) { log_err("Failed to listed on socket"); goto error_close; } } return fd; error_close: save_errno_close(fd); return -1; } int start_server_str(int family, int type, const char *addr_str, __u16 port, const struct network_helper_opts *opts) { struct sockaddr_storage addr; socklen_t addrlen; if (!opts) opts = &default_opts; if (make_sockaddr(family, addr_str, port, &addr, &addrlen)) return -1; return start_server_addr(type, &addr, addrlen, opts); } int start_server(int family, int type, const char *addr_str, __u16 port, int timeout_ms) { struct network_helper_opts opts = { .timeout_ms = timeout_ms, }; return start_server_str(family, type, addr_str, port, &opts); } static int reuseport_cb(int fd, void *opts) { int on = 1; return setsockopt(fd, SOL_SOCKET, SO_REUSEPORT, &on, sizeof(on)); } int *start_reuseport_server(int family, int type, const char *addr_str, __u16 port, int timeout_ms, unsigned int nr_listens) { struct network_helper_opts opts = { .timeout_ms = timeout_ms, .post_socket_cb = reuseport_cb, }; struct sockaddr_storage addr; unsigned int nr_fds = 0; socklen_t addrlen; int *fds; if (!nr_listens) return NULL; if (make_sockaddr(family, addr_str, port, &addr, &addrlen)) return NULL; fds = malloc(sizeof(*fds) * nr_listens); if (!fds) return NULL; fds[0] = start_server_addr(type, &addr, addrlen, &opts); if (fds[0] == -1) goto close_fds; nr_fds = 1; if (getsockname(fds[0], (struct sockaddr *)&addr, &addrlen)) goto close_fds; for (; nr_fds < nr_listens; nr_fds++) { fds[nr_fds] = start_server_addr(type, &addr, addrlen, &opts); if (fds[nr_fds] == -1) goto close_fds; } return fds; close_fds: free_fds(fds, nr_fds); return NULL; } void free_fds(int *fds, unsigned int nr_close_fds) { if (fds) { while (nr_close_fds) close(fds[--nr_close_fds]); free(fds); } } int fastopen_connect(int server_fd, const char *data, unsigned int data_len, int timeout_ms) { struct sockaddr_storage addr; socklen_t addrlen = sizeof(addr); struct sockaddr_in *addr_in; int fd, ret; if (getsockname(server_fd, (struct sockaddr *)&addr, &addrlen)) { log_err("Failed to get server addr"); return -1; } addr_in = (struct sockaddr_in *)&addr; fd = socket(addr_in->sin_family, SOCK_STREAM, 0); if (fd < 0) { log_err("Failed to create client socket"); return -1; } if (settimeo(fd, timeout_ms)) goto error_close; ret = sendto(fd, data, data_len, MSG_FASTOPEN, (struct sockaddr *)&addr, addrlen); if (ret != data_len) { log_err("sendto(data, %u) != %d\n", data_len, ret); goto error_close; } return fd; error_close: save_errno_close(fd); return -1; } int client_socket(int family, int type, const struct network_helper_opts *opts) { int fd; if (!opts) opts = &default_opts; fd = socket(family, type, opts->proto); if (fd < 0) { log_err("Failed to create client socket"); return -1; } if (settimeo(fd, opts->timeout_ms)) goto error_close; if (opts->post_socket_cb && opts->post_socket_cb(fd, opts->cb_opts)) goto error_close; return fd; error_close: save_errno_close(fd); return -1; } int connect_to_addr(int type, const struct sockaddr_storage *addr, socklen_t addrlen, const struct network_helper_opts *opts) { int fd; if (!opts) opts = &default_opts; fd = client_socket(addr->ss_family, type, opts); if (fd < 0) { log_err("Failed to create client socket"); return -1; } if (connect(fd, (const struct sockaddr *)addr, addrlen)) { log_err("Failed to connect to server"); save_errno_close(fd); return -1; } return fd; } int connect_to_addr_str(int family, int type, const char *addr_str, __u16 port, const struct network_helper_opts *opts) { struct sockaddr_storage addr; socklen_t addrlen; if (!opts) opts = &default_opts; if (make_sockaddr(family, addr_str, port, &addr, &addrlen)) return -1; return connect_to_addr(type, &addr, addrlen, opts); } int connect_to_fd_opts(int server_fd, const struct network_helper_opts *opts) { struct sockaddr_storage addr; socklen_t addrlen, optlen; int type; if (!opts) opts = &default_opts; optlen = sizeof(type); if (getsockopt(server_fd, SOL_SOCKET, SO_TYPE, &type, &optlen)) { log_err("getsockopt(SOL_TYPE)"); return -1; } addrlen = sizeof(addr); if (getsockname(server_fd, (struct sockaddr *)&addr, &addrlen)) { log_err("Failed to get server addr"); return -1; } return connect_to_addr(type, &addr, addrlen, opts); } int connect_to_fd(int server_fd, int timeout_ms) { struct network_helper_opts opts = { .timeout_ms = timeout_ms, }; socklen_t optlen; int protocol; optlen = sizeof(protocol); if (getsockopt(server_fd, SOL_SOCKET, SO_PROTOCOL, &protocol, &optlen)) { log_err("getsockopt(SOL_PROTOCOL)"); return -1; } opts.proto = protocol; return connect_to_fd_opts(server_fd, &opts); } int connect_fd_to_fd(int client_fd, int server_fd, int timeout_ms) { struct sockaddr_storage addr; socklen_t len = sizeof(addr); if (settimeo(client_fd, timeout_ms)) return -1; if (getsockname(server_fd, (struct sockaddr *)&addr, &len)) { log_err("Failed to get server addr"); return -1; } if (connect(client_fd, (const struct sockaddr *)&addr, len)) { log_err("Failed to connect to server"); return -1; } return 0; } int make_sockaddr(int family, const char *addr_str, __u16 port, struct sockaddr_storage *addr, socklen_t *len) { if (family == AF_INET) { struct sockaddr_in *sin = (void *)addr; memset(addr, 0, sizeof(*sin)); sin->sin_family = AF_INET; sin->sin_port = htons(port); if (addr_str && inet_pton(AF_INET, addr_str, &sin->sin_addr) != 1) { log_err("inet_pton(AF_INET, %s)", addr_str); return -1; } if (len) *len = sizeof(*sin); return 0; } else if (family == AF_INET6) { struct sockaddr_in6 *sin6 = (void *)addr; memset(addr, 0, sizeof(*sin6)); sin6->sin6_family = AF_INET6; sin6->sin6_port = htons(port); if (addr_str && inet_pton(AF_INET6, addr_str, &sin6->sin6_addr) != 1) { log_err("inet_pton(AF_INET6, %s)", addr_str); return -1; } if (len) *len = sizeof(*sin6); return 0; } else if (family == AF_UNIX) { /* Note that we always use abstract unix sockets to avoid having * to clean up leftover files. */ struct sockaddr_un *sun = (void *)addr; memset(addr, 0, sizeof(*sun)); sun->sun_family = family; sun->sun_path[0] = 0; strcpy(sun->sun_path + 1, addr_str); if (len) *len = offsetof(struct sockaddr_un, sun_path) + 1 + strlen(addr_str); return 0; } return -1; } char *ping_command(int family) { if (family == AF_INET6) { /* On some systems 'ping' doesn't support IPv6, so use ping6 if it is present. */ if (!system("which ping6 >/dev/null 2>&1")) return "ping6"; else return "ping -6"; } return "ping"; } int remove_netns(const char *name) { char *cmd; int r; r = asprintf(&cmd, "ip netns del %s >/dev/null 2>&1", name); if (r < 0) { log_err("Failed to malloc cmd"); return -1; } r = system(cmd); free(cmd); return r; } int make_netns(const char *name) { char *cmd; int r; r = asprintf(&cmd, "ip netns add %s", name); if (r < 0) { log_err("Failed to malloc cmd"); return -1; } r = system(cmd); free(cmd); if (r) return r; r = asprintf(&cmd, "ip -n %s link set lo up", name); if (r < 0) { log_err("Failed to malloc cmd for setting up lo"); remove_netns(name); return -1; } r = system(cmd); free(cmd); return r; } struct nstoken { int orig_netns_fd; }; struct nstoken *open_netns(const char *name) { int nsfd; char nspath[PATH_MAX]; int err; struct nstoken *token; token = calloc(1, sizeof(struct nstoken)); if (!token) { log_err("Failed to malloc token"); return NULL; } token->orig_netns_fd = open("/proc/self/ns/net", O_RDONLY); if (token->orig_netns_fd == -1) { log_err("Failed to open(/proc/self/ns/net)"); goto fail; } snprintf(nspath, sizeof(nspath), "%s/%s", "/var/run/netns", name); nsfd = open(nspath, O_RDONLY | O_CLOEXEC); if (nsfd == -1) { log_err("Failed to open(%s)", nspath); goto fail; } err = setns(nsfd, CLONE_NEWNET); close(nsfd); if (err) { log_err("Failed to setns(nsfd)"); goto fail; } return token; fail: if (token->orig_netns_fd != -1) close(token->orig_netns_fd); free(token); return NULL; } void close_netns(struct nstoken *token) { if (!token) return; if (setns(token->orig_netns_fd, CLONE_NEWNET)) log_err("Failed to setns(orig_netns_fd)"); close(token->orig_netns_fd); free(token); } int get_socket_local_port(int sock_fd) { struct sockaddr_storage addr; socklen_t addrlen = sizeof(addr); int err; err = getsockname(sock_fd, (struct sockaddr *)&addr, &addrlen); if (err < 0) return err; if (addr.ss_family == AF_INET) { struct sockaddr_in *sin = (struct sockaddr_in *)&addr; return sin->sin_port; } else if (addr.ss_family == AF_INET6) { struct sockaddr_in6 *sin = (struct sockaddr_in6 *)&addr; return sin->sin6_port; } return -1; } int get_hw_ring_size(char *ifname, struct ethtool_ringparam *ring_param) { struct ifreq ifr = {0}; int sockfd, err; sockfd = socket(AF_INET, SOCK_DGRAM, 0); if (sockfd < 0) return -errno; memcpy(ifr.ifr_name, ifname, sizeof(ifr.ifr_name)); ring_param->cmd = ETHTOOL_GRINGPARAM; ifr.ifr_data = (char *)ring_param; if (ioctl(sockfd, SIOCETHTOOL, &ifr) < 0) { err = errno; close(sockfd); return -err; } close(sockfd); return 0; } int set_hw_ring_size(char *ifname, struct ethtool_ringparam *ring_param) { struct ifreq ifr = {0}; int sockfd, err; sockfd = socket(AF_INET, SOCK_DGRAM, 0); if (sockfd < 0) return -errno; memcpy(ifr.ifr_name, ifname, sizeof(ifr.ifr_name)); ring_param->cmd = ETHTOOL_SRINGPARAM; ifr.ifr_data = (char *)ring_param; if (ioctl(sockfd, SIOCETHTOOL, &ifr) < 0) { err = errno; close(sockfd); return -err; } close(sockfd); return 0; } struct send_recv_arg { int fd; uint32_t bytes; int stop; }; static void *send_recv_server(void *arg) { struct send_recv_arg *a = (struct send_recv_arg *)arg; ssize_t nr_sent = 0, bytes = 0; char batch[1500]; int err = 0, fd; fd = accept(a->fd, NULL, NULL); while (fd == -1) { if (errno == EINTR) continue; err = -errno; goto done; } if (settimeo(fd, 0)) { err = -errno; goto done; } while (bytes < a->bytes && !READ_ONCE(a->stop)) { nr_sent = send(fd, &batch, MIN(a->bytes - bytes, sizeof(batch)), 0); if (nr_sent == -1 && errno == EINTR) continue; if (nr_sent == -1) { err = -errno; break; } bytes += nr_sent; } if (bytes != a->bytes) { log_err("send %zd expected %u", bytes, a->bytes); if (!err) err = bytes > a->bytes ? -E2BIG : -EINTR; } done: if (fd >= 0) close(fd); if (err) { WRITE_ONCE(a->stop, 1); return ERR_PTR(err); } return NULL; } int send_recv_data(int lfd, int fd, uint32_t total_bytes) { ssize_t nr_recv = 0, bytes = 0; struct send_recv_arg arg = { .fd = lfd, .bytes = total_bytes, .stop = 0, }; pthread_t srv_thread; void *thread_ret; char batch[1500]; int err = 0; err = pthread_create(&srv_thread, NULL, send_recv_server, (void *)&arg); if (err) { log_err("Failed to pthread_create"); return err; } /* recv total_bytes */ while (bytes < total_bytes && !READ_ONCE(arg.stop)) { nr_recv = recv(fd, &batch, MIN(total_bytes - bytes, sizeof(batch)), 0); if (nr_recv == -1 && errno == EINTR) continue; if (nr_recv == -1) { err = -errno; break; } bytes += nr_recv; } if (bytes != total_bytes) { log_err("recv %zd expected %u", bytes, total_bytes); if (!err) err = bytes > total_bytes ? -E2BIG : -EINTR; } WRITE_ONCE(arg.stop, 1); pthread_join(srv_thread, &thread_ret); if (IS_ERR(thread_ret)) { log_err("Failed in thread_ret %ld", PTR_ERR(thread_ret)); err = err ? : PTR_ERR(thread_ret); } return err; } #ifdef TRAFFIC_MONITOR struct tmonitor_ctx { pcap_t *pcap; pcap_dumper_t *dumper; pthread_t thread; int wake_fd; volatile bool done; char pkt_fname[PATH_MAX]; int pcap_fd; }; /* Is this packet captured with a Ethernet protocol type? */ static bool is_ethernet(const u_char *packet) { u16 arphdr_type; memcpy(&arphdr_type, packet + 8, 2); arphdr_type = ntohs(arphdr_type); /* Except the following cases, the protocol type contains the * Ethernet protocol type for the packet. * * https://www.tcpdump.org/linktypes/LINKTYPE_LINUX_SLL2.html */ switch (arphdr_type) { case 770: /* ARPHRD_FRAD */ case 778: /* ARPHDR_IPGRE */ case 803: /* ARPHRD_IEEE80211_RADIOTAP */ printf("Packet captured: arphdr_type=%d\n", arphdr_type); return false; } return true; } static const char * const pkt_types[] = { "In", "B", /* Broadcast */ "M", /* Multicast */ "C", /* Captured with the promiscuous mode */ "Out", }; static const char *pkt_type_str(u16 pkt_type) { if (pkt_type < ARRAY_SIZE(pkt_types)) return pkt_types[pkt_type]; return "Unknown"; } /* Show the information of the transport layer in the packet */ static void show_transport(const u_char *packet, u16 len, u32 ifindex, const char *src_addr, const char *dst_addr, u16 proto, bool ipv6, u8 pkt_type) { char *ifname, _ifname[IF_NAMESIZE]; const char *transport_str; u16 src_port, dst_port; struct udphdr *udp; struct tcphdr *tcp; ifname = if_indextoname(ifindex, _ifname); if (!ifname) { snprintf(_ifname, sizeof(_ifname), "unknown(%d)", ifindex); ifname = _ifname; } if (proto == IPPROTO_UDP) { udp = (struct udphdr *)packet; src_port = ntohs(udp->source); dst_port = ntohs(udp->dest); transport_str = "UDP"; } else if (proto == IPPROTO_TCP) { tcp = (struct tcphdr *)packet; src_port = ntohs(tcp->source); dst_port = ntohs(tcp->dest); transport_str = "TCP"; } else if (proto == IPPROTO_ICMP) { printf("%-7s %-3s IPv4 %s > %s: ICMP, length %d, type %d, code %d\n", ifname, pkt_type_str(pkt_type), src_addr, dst_addr, len, packet[0], packet[1]); return; } else if (proto == IPPROTO_ICMPV6) { printf("%-7s %-3s IPv6 %s > %s: ICMPv6, length %d, type %d, code %d\n", ifname, pkt_type_str(pkt_type), src_addr, dst_addr, len, packet[0], packet[1]); return; } else { printf("%-7s %-3s %s %s > %s: protocol %d\n", ifname, pkt_type_str(pkt_type), ipv6 ? "IPv6" : "IPv4", src_addr, dst_addr, proto); return; } /* TCP or UDP*/ flockfile(stdout); if (ipv6) printf("%-7s %-3s IPv6 %s.%d > %s.%d: %s, length %d", ifname, pkt_type_str(pkt_type), src_addr, src_port, dst_addr, dst_port, transport_str, len); else printf("%-7s %-3s IPv4 %s:%d > %s:%d: %s, length %d", ifname, pkt_type_str(pkt_type), src_addr, src_port, dst_addr, dst_port, transport_str, len); if (proto == IPPROTO_TCP) { if (tcp->fin) printf(", FIN"); if (tcp->syn) printf(", SYN"); if (tcp->rst) printf(", RST"); if (tcp->ack) printf(", ACK"); } printf("\n"); funlockfile(stdout); } static void show_ipv6_packet(const u_char *packet, u32 ifindex, u8 pkt_type) { char src_buf[INET6_ADDRSTRLEN], dst_buf[INET6_ADDRSTRLEN]; struct ipv6hdr *pkt = (struct ipv6hdr *)packet; const char *src, *dst; u_char proto; src = inet_ntop(AF_INET6, &pkt->saddr, src_buf, sizeof(src_buf)); if (!src) src = ""; dst = inet_ntop(AF_INET6, &pkt->daddr, dst_buf, sizeof(dst_buf)); if (!dst) dst = ""; proto = pkt->nexthdr; show_transport(packet + sizeof(struct ipv6hdr), ntohs(pkt->payload_len), ifindex, src, dst, proto, true, pkt_type); } static void show_ipv4_packet(const u_char *packet, u32 ifindex, u8 pkt_type) { char src_buf[INET_ADDRSTRLEN], dst_buf[INET_ADDRSTRLEN]; struct iphdr *pkt = (struct iphdr *)packet; const char *src, *dst; u_char proto; src = inet_ntop(AF_INET, &pkt->saddr, src_buf, sizeof(src_buf)); if (!src) src = ""; dst = inet_ntop(AF_INET, &pkt->daddr, dst_buf, sizeof(dst_buf)); if (!dst) dst = ""; proto = pkt->protocol; show_transport(packet + sizeof(struct iphdr), ntohs(pkt->tot_len), ifindex, src, dst, proto, false, pkt_type); } static void *traffic_monitor_thread(void *arg) { char *ifname, _ifname[IF_NAMESIZE]; const u_char *packet, *payload; struct tmonitor_ctx *ctx = arg; pcap_dumper_t *dumper = ctx->dumper; int fd = ctx->pcap_fd, nfds, r; int wake_fd = ctx->wake_fd; struct pcap_pkthdr header; pcap_t *pcap = ctx->pcap; u32 ifindex; fd_set fds; u16 proto; u8 ptype; nfds = (fd > wake_fd ? fd : wake_fd) + 1; FD_ZERO(&fds); while (!ctx->done) { FD_SET(fd, &fds); FD_SET(wake_fd, &fds); r = select(nfds, &fds, NULL, NULL, NULL); if (!r) continue; if (r < 0) { if (errno == EINTR) continue; log_err("Fail to select on pcap fd and wake fd"); break; } /* This instance of pcap is non-blocking */ packet = pcap_next(pcap, &header); if (!packet) continue; /* According to the man page of pcap_dump(), first argument * is the pcap_dumper_t pointer even it's argument type is * u_char *. */ pcap_dump((u_char *)dumper, &header, packet); /* Not sure what other types of packets look like. Here, we * parse only Ethernet and compatible packets. */ if (!is_ethernet(packet)) continue; /* Skip SLL2 header * https://www.tcpdump.org/linktypes/LINKTYPE_LINUX_SLL2.html * * Although the document doesn't mention that, the payload * doesn't include the Ethernet header. The payload starts * from the first byte of the network layer header. */ payload = packet + 20; memcpy(&proto, packet, 2); proto = ntohs(proto); memcpy(&ifindex, packet + 4, 4); ifindex = ntohl(ifindex); ptype = packet[10]; if (proto == ETH_P_IPV6) { show_ipv6_packet(payload, ifindex, ptype); } else if (proto == ETH_P_IP) { show_ipv4_packet(payload, ifindex, ptype); } else { ifname = if_indextoname(ifindex, _ifname); if (!ifname) { snprintf(_ifname, sizeof(_ifname), "unknown(%d)", ifindex); ifname = _ifname; } printf("%-7s %-3s Unknown network protocol type 0x%x\n", ifname, pkt_type_str(ptype), proto); } } return NULL; } /* Prepare the pcap handle to capture packets. * * This pcap is non-blocking and immediate mode is enabled to receive * captured packets as soon as possible. The snaplen is set to 1024 bytes * to limit the size of captured content. The format of the link-layer * header is set to DLT_LINUX_SLL2 to enable handling various link-layer * technologies. */ static pcap_t *traffic_monitor_prepare_pcap(void) { char errbuf[PCAP_ERRBUF_SIZE]; pcap_t *pcap; int r; /* Listen on all NICs in the namespace */ pcap = pcap_create("any", errbuf); if (!pcap) { log_err("Failed to open pcap: %s", errbuf); return NULL; } /* Limit the size of the packet (first N bytes) */ r = pcap_set_snaplen(pcap, 1024); if (r) { log_err("Failed to set snaplen: %s", pcap_geterr(pcap)); goto error; } /* To receive packets as fast as possible */ r = pcap_set_immediate_mode(pcap, 1); if (r) { log_err("Failed to set immediate mode: %s", pcap_geterr(pcap)); goto error; } r = pcap_setnonblock(pcap, 1, errbuf); if (r) { log_err("Failed to set nonblock: %s", errbuf); goto error; } r = pcap_activate(pcap); if (r) { log_err("Failed to activate pcap: %s", pcap_geterr(pcap)); goto error; } /* Determine the format of the link-layer header */ r = pcap_set_datalink(pcap, DLT_LINUX_SLL2); if (r) { log_err("Failed to set datalink: %s", pcap_geterr(pcap)); goto error; } return pcap; error: pcap_close(pcap); return NULL; } static void encode_test_name(char *buf, size_t len, const char *test_name, const char *subtest_name) { char *p; if (subtest_name) snprintf(buf, len, "%s__%s", test_name, subtest_name); else snprintf(buf, len, "%s", test_name); while ((p = strchr(buf, '/'))) *p = '_'; while ((p = strchr(buf, ' '))) *p = '_'; } #define PCAP_DIR "/tmp/tmon_pcap" /* Start to monitor the network traffic in the given network namespace. * * netns: the name of the network namespace to monitor. If NULL, the * current network namespace is monitored. * test_name: the name of the running test. * subtest_name: the name of the running subtest if there is. It should be * NULL if it is not a subtest. * * This function will start a thread to capture packets going through NICs * in the give network namespace. */ struct tmonitor_ctx *traffic_monitor_start(const char *netns, const char *test_name, const char *subtest_name) { struct nstoken *nstoken = NULL; struct tmonitor_ctx *ctx; char test_name_buf[64]; static int tmon_seq; int r; if (netns) { nstoken = open_netns(netns); if (!nstoken) return NULL; } ctx = malloc(sizeof(*ctx)); if (!ctx) { log_err("Failed to malloc ctx"); goto fail_ctx; } memset(ctx, 0, sizeof(*ctx)); encode_test_name(test_name_buf, sizeof(test_name_buf), test_name, subtest_name); snprintf(ctx->pkt_fname, sizeof(ctx->pkt_fname), PCAP_DIR "/packets-%d-%d-%s-%s.log", getpid(), tmon_seq++, test_name_buf, netns ? netns : "unknown"); r = mkdir(PCAP_DIR, 0755); if (r && errno != EEXIST) { log_err("Failed to create " PCAP_DIR); goto fail_pcap; } ctx->pcap = traffic_monitor_prepare_pcap(); if (!ctx->pcap) goto fail_pcap; ctx->pcap_fd = pcap_get_selectable_fd(ctx->pcap); if (ctx->pcap_fd < 0) { log_err("Failed to get pcap fd"); goto fail_dumper; } /* Create a packet file */ ctx->dumper = pcap_dump_open(ctx->pcap, ctx->pkt_fname); if (!ctx->dumper) { log_err("Failed to open pcap dump: %s", ctx->pkt_fname); goto fail_dumper; } /* Create an eventfd to wake up the monitor thread */ ctx->wake_fd = eventfd(0, 0); if (ctx->wake_fd < 0) { log_err("Failed to create eventfd"); goto fail_eventfd; } r = pthread_create(&ctx->thread, NULL, traffic_monitor_thread, ctx); if (r) { log_err("Failed to create thread"); goto fail; } close_netns(nstoken); return ctx; fail: close(ctx->wake_fd); fail_eventfd: pcap_dump_close(ctx->dumper); unlink(ctx->pkt_fname); fail_dumper: pcap_close(ctx->pcap); fail_pcap: free(ctx); fail_ctx: close_netns(nstoken); return NULL; } static void traffic_monitor_release(struct tmonitor_ctx *ctx) { pcap_close(ctx->pcap); pcap_dump_close(ctx->dumper); close(ctx->wake_fd); free(ctx); } /* Stop the network traffic monitor. * * ctx: the context returned by traffic_monitor_start() */ void traffic_monitor_stop(struct tmonitor_ctx *ctx) { __u64 w = 1; if (!ctx) return; /* Stop the monitor thread */ ctx->done = true; /* Wake up the background thread. */ write(ctx->wake_fd, &w, sizeof(w)); pthread_join(ctx->thread, NULL); printf("Packet file: %s\n", strrchr(ctx->pkt_fname, '/') + 1); traffic_monitor_release(ctx); } #endif /* TRAFFIC_MONITOR */