blob: 8564cd58b2ccc18d12dc2fafea0783884a997a51 [file] [log] [blame]
Harald Weltee0571462018-02-14 15:42:14 +01001#!/bin/sh
2
Pau Espin Pedrolad931f22019-10-02 13:00:51 +02003PIDFILE_PCAP=/tmp/pcap.pid
Oliver Smithfbf33452021-12-16 12:44:42 +01004TCPDUMP=$(command -v tcpdump)
5DUMPCAP=$(command -v dumpcap)
Pau Espin Pedrolad931f22019-10-02 13:00:51 +02006
7PIDFILE_NETCAT=/tmp/netcat.pid
Oliver Smithfbf33452021-12-16 12:44:42 +01008NETCAT=$(command -v nc)
Pau Espin Pedrolad931f22019-10-02 13:00:51 +02009GSMTAP_PORT=4729
10
Harald Weltee0571462018-02-14 15:42:14 +010011TESTCASE=$1
12
arehbeincf8c4502022-11-13 17:52:48 +010013
14SUDOSTR=""
15if ! [ "$(id -u)" = "0" ]; then
16 SUDOSTR="sudo -n"
17 # Otherwise, if sudo /usr/bin/kill, sudo /usr/bin/tcpdump cannot be run without a password prompt,
18 # and this script will hang indefinitely
19fi
20
Pau Espin Pedrolad931f22019-10-02 13:00:51 +020021kill_rm_pidfile() {
arehbeincf8c4502022-11-13 17:52:48 +010022 # NOTE: This requires you to be root or something like
23 # "laforge ALL=NOPASSWD: /usr/sbin/tcpdump, /bin/kill" in your sudoers file
arehbeine66c1f82022-11-28 22:39:21 +010024 if [ -e "$1" ]; then
25 if [ -s "$1" ]; then
26 $SUDOSTR kill "$(cat "$1")" 2>&1 | grep -v "No such process"
27 fi
Pau Espin Pedrolad931f22019-10-02 13:00:51 +020028 rm $1
29 fi
30}
31
Neels Hofmeyrced8acf2019-02-26 05:03:22 +010032echo "------ $TESTCASE ------"
33date
34
Harald Weltee0571462018-02-14 15:42:14 +010035if [ "z$TTCN3_PCAP_PATH" = "z" ]; then
36 TTCN3_PCAP_PATH=/tmp
37fi
38
Pau Espin Pedrolad931f22019-10-02 13:00:51 +020039kill_rm_pidfile $PIDFILE_NETCAT
40kill_rm_pidfile $PIDFILE_PCAP
Harald Weltee0571462018-02-14 15:42:14 +010041
arehbeincf8c4502022-11-13 17:52:48 +010042CMD="$SUDOSTR $TCPDUMP -U"
Max81487c82019-03-18 14:18:31 +010043
arehbeina084fbe2022-11-02 00:48:32 +010044if [ -x "$DUMPCAP" ]; then
Max81487c82019-03-18 14:18:31 +010045 CAP_ERR="1"
46 if [ -x /sbin/setcap ]; then
47 # N. B: this check requires libcap2-bin package
Harald Welte5b11d912020-12-11 15:33:48 +010048 /sbin/setcap -q -v 'cap_net_admin,cap_net_raw=pie' $DUMPCAP
Max81487c82019-03-18 14:18:31 +010049 CAP_ERR="$?"
50 fi
Eric Wildc01eada2022-03-30 01:43:26 +020051
52 # did we implicitly inherit all those caps because we're root in a netns?
53 if [ -u $DUMPCAP -o "$CAP_ERR" = "1" ]; then
54 getpcaps 0 2>&1 | grep -e cap_net_admin | grep -q -e cap_net_raw
55 CAP_ERR="$?"
56 fi
57
58 # did we implicitly inherit all those caps because we're root in a netns?
59 if [ -u $DUMPCAP -o "$CAP_ERR" = "1" ]; then
60 getpcaps 0 2>&1 | grep -q -e " =ep" # all perms
61 CAP_ERR="$?"
62 fi
63
Max81487c82019-03-18 14:18:31 +010064 if [ -u $DUMPCAP -o "$CAP_ERR" = "0" ]; then
65 CMD="$DUMPCAP -q"
66 else
67 echo "NOTE: unable to use dumpcap due to missing capabilities or suid bit"
68 fi
69fi
70
Pau Espin Pedrolad931f22019-10-02 13:00:51 +020071# Create a dummy sink for GSMTAP packets
72$NETCAT -l -u -k -p $GSMTAP_PORT >/dev/null 2>$TESTCASE.netcat.stderr &
73PID=$!
74echo $PID > $PIDFILE_NETCAT
75
arehbeinbc85a322022-11-13 18:46:32 +010076CMD_OUTFILE=$TTCN3_PCAP_PATH/$TESTCASE.pcap.stdout
77CMD_OUTFILE_ERR=$TTCN3_PCAP_PATH/$TESTCASE.pcap.stderr
78FIFO=/tmp/cmderr
79if ! [ -e $FIFO ]; then
80 mkfifo $FIFO
81else
82 echo "Warning: Named pipe already exists: $FIFO"
83fi
84
85# Log stderr to CMD_OUTFILE and a dedicated error log file
86tee $CMD_OUTFILE < $FIFO > $CMD_OUTFILE_ERR &
Pau Espin Pedrol7ae55ea2024-02-27 18:35:07 +010087CMD_STR="$CMD -s 1520 -n -i any -w \"$TTCN3_PCAP_PATH/$TESTCASE.pcap\" >$CMD_OUTFILE 2>$FIFO &"
arehbeinbc85a322022-11-13 18:46:32 +010088eval $CMD_STR
Pau Espin Pedrol7ae55ea2024-02-27 18:35:07 +010089# $CMD -s 1520 -n -i any -w \"$TTCN3_PCAP_PATH/$TESTCASE.pcap\" >$CMD_OUTFILE &
Harald Weltee0571462018-02-14 15:42:14 +010090PID=$!
Pau Espin Pedrolad931f22019-10-02 13:00:51 +020091echo $PID > $PIDFILE_PCAP
arehbeinbc85a322022-11-13 18:46:32 +010092if [ -f $CMD_OUTFILE_ERR ] && [ $(wc -l $CMD_OUTFILE_ERR | awk '{print $1}') -ne 0 ]; then
93 echo "Warnings or error messages from command:" >&2
94 echo " $CMD_STR" >&2
95 echo "Message:" >&2
96 echo "$(cat $CMD_OUTFILE_ERR)" | sed 's/^/\t/' >&2
97fi
Pau Espin Pedrolb01d3132018-02-15 14:43:58 +010098
Maxe5214452019-03-14 18:15:27 +010099# Wait until packet dumper creates the pcap file and starts recording.
100# We generate some traffic until we see packet dumper catches it.
Pau Espin Pedrolb01d3132018-02-15 14:43:58 +0100101# Timeout is 10 seconds.
Pau Espin Pedrol8fdd3132018-02-15 16:01:50 +0100102ping 127.0.0.1 >/dev/null 2>&1 &
103PID=$!
Pau Espin Pedrolb01d3132018-02-15 14:43:58 +0100104i=0
Pau Espin Pedrol8fdd3132018-02-15 16:01:50 +0100105while [ ! -f "$TTCN3_PCAP_PATH/$TESTCASE.pcap" ] ||
Alexander Couzensd1f40952018-05-12 16:52:59 +0200106 [ "$(stat -c '%s' "$TTCN3_PCAP_PATH/$TESTCASE.pcap")" -eq 32 ]
Pau Espin Pedrolb01d3132018-02-15 14:43:58 +0100107do
Maxe5214452019-03-14 18:15:27 +0100108 echo "Waiting for packet dumper to start... $i"
Pau Espin Pedrolb01d3132018-02-15 14:43:58 +0100109 sleep 1
110 i=$((i+1))
Pau Espin Pedrol8fdd3132018-02-15 16:01:50 +0100111 if [ $i -eq 10 ]; then
Pau Espin Pedrol5d800742024-05-15 18:25:22 +0200112 echo "Packet dumper didn't start filling pcap file after $i seconds!!!"
Pau Espin Pedrol8fdd3132018-02-15 16:01:50 +0100113 break
114 fi
Pau Espin Pedrolb01d3132018-02-15 14:43:58 +0100115done
Pau Espin Pedrol8fdd3132018-02-15 16:01:50 +0100116kill $PID