mirror of
https://github.com/bitcoin/bitcoin.git
synced 2025-04-29 14:59:39 -04:00
Merge bitcoin/bitcoin#25832: tracing: network connection tracepoints
Some checks are pending
CI / test each commit (push) Waiting to run
CI / macOS 14 native, arm64, no depends, sqlite only, gui (push) Waiting to run
CI / macOS 14 native, arm64, fuzz (push) Waiting to run
CI / Win64 native, VS 2022 (push) Waiting to run
CI / Win64 native fuzz, VS 2022 (push) Waiting to run
CI / ASan + LSan + UBSan + integer, no depends, USDT (push) Waiting to run
Some checks are pending
CI / test each commit (push) Waiting to run
CI / macOS 14 native, arm64, no depends, sqlite only, gui (push) Waiting to run
CI / macOS 14 native, arm64, fuzz (push) Waiting to run
CI / Win64 native, VS 2022 (push) Waiting to run
CI / Win64 native fuzz, VS 2022 (push) Waiting to run
CI / ASan + LSan + UBSan + integer, no depends, USDT (push) Waiting to run
e3622a9692
tracing: document that peer addrs can be >68 chars (0xb10c)b19b526758
tracing: log_p2p_connections.bt example (0xb10c)caa5486574
tracing: connection closed tracepoint (0xb10c)b2ad6ede95
tracing: add misbehaving conn tracepoint (0xb10c)68c1ef4f19
tracing: add inbound connection eviction tracepoint (0xb10c)4d61d52f43
tracing: add outbound connection tracepoint (0xb10c)85b2603eec
tracing: add inbound connection tracepoint (0xb10c) Pull request description: This adds five new tracepoints with documentation and tests for network connections: - established connections with `net:inbound_connection` and `net:outbound_connection` - closed connections (both closed by us or by the peer) with `net:closed_connnection` - inbound connections that we choose to evict with `net:evicted_inbound_connection` - connections that are misbehaving and punished with `net:misbehaving_connection` I've been using these tracepoints for a few months now to monitor connection lifetimes, re-connection frequency by IP and netgroup, misbehavior, peer discouragement, and eviction and more. Together with the two existing P2P message tracepoints they allow for a good overview of local P2P network activity. Also sort-of addresses https://github.com/bitcoin/bitcoin/pull/22006#discussion_r636775863. I've been back and forth on which arguments to include. For example, `net:evicted_connection` could also include some of the eviction metrics like e.g. `last_block_time`, `min_ping_time`, ... but I've left them out for now. If wanted, this can be added here or in a follow-up. I've tried to minimize a potential performance impact by measuring executed instructions with `gdb` where possible (method described [here](https://github.com/bitcoin/bitcoin/pull/23724#issuecomment-996919963)). I don't think a few hundred extra instructions are too crucial, as connection opens/closes aren't too frequent (compared to e.g. P2P messages). Note: e.g. `CreateNodeFromAcceptedSocket()` usually executes between 80k and 90k instructions for each new inbound connection. | tracepoint | instructions | |----------------------------|--------------------------------------------------------| | net:inbound_connection | 390 ins | | net:outbound_connection | between 700 and 1000 ins | | net:closed_connnection | 473 ins | | net:evicted_inbound_connection | not measured; likely similar to net:closed_connnection | | net:misbehaving_connection | not measured | Also added a bpftrace (tested with v0.14.1) `log_p2p_connections.bt` example script that produces output similar to: ``` Attaching 6 probes... Logging opened, closed, misbehaving, and evicted P2P connections OUTBOUND conn to 127.0.0.1:15287: id=0, type=block-relay-only, network=0, total_out=1 INBOUND conn from 127.0.0.1:45324: id=1, type=inbound, network=0, total_in=1 MISBEHAVING conn id=1, message='getdata message size = 50001' CLOSED conn to 127.0.0.1:15287: id=0, type=block-relay-only, network=0, established=1231006505 EVICTED conn to 127.0.0.1:45324: id=1, type=inbound, network=0, established=1612312312 ``` ACKs for top commit: laanwj: re-ACKe3622a9692
vasild: ACKe3622a9692
sipa: utACKe3622a9692
Tree-SHA512: 1032dcac6fe0ced981715606f82c2db47016407d3accb8f216c978f010da9bc20453e24a167dcc95287f4783b48562ffb90f645bf230990e3df1b9b9a6d4e5d0
This commit is contained in:
commit
a43f08c4ae
6 changed files with 515 additions and 5 deletions
|
@ -335,4 +335,25 @@ $ python3 contrib/tracing/mempool_monitor.py $(pidof bitcoind)
|
|||
│ 13:10:32Z added c78e87be86c828137a6e7e00a177c03b52202ce4c39029b99904c2a094b9da87 with feerate 11.00 sat/vB (1562 sat, 142 vbytes) │
|
||||
│ │
|
||||
└──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────┘
|
||||
|
||||
### log_p2p_connections.bt
|
||||
|
||||
A `bpftrace` script to log information about opened, closed, misbehaving, and
|
||||
evicted P2P connections. Uses the `net:*_connection` tracepoints.
|
||||
|
||||
```bash
|
||||
$ bpftrace contrib/tracing/log_p2p_connections.bt
|
||||
```
|
||||
|
||||
This should produce an output similar to the following.
|
||||
|
||||
```bash
|
||||
Attaching 6 probes...
|
||||
Logging opened, closed, misbehaving, and evicted P2P connections
|
||||
OUTBOUND conn to 127.0.0.1:15287: id=0, type=block-relay-only, network=0, total_out=1
|
||||
INBOUND conn from 127.0.0.1:45324: id=1, type=inbound, network=0, total_in=1
|
||||
MISBEHAVING conn id=1, score_before=0, score_increase=20, message='getdata message size = 50001', threshold_exceeded=false
|
||||
CLOSED conn to 127.0.0.1:15287: id=0, type=block-relay-only, network=0, established=1231006505
|
||||
EVICTED conn to 127.0.0.1:45324: id=1, type=inbound, network=0, established=1612312312
|
||||
...
|
||||
```
|
||||
|
|
51
contrib/tracing/log_p2p_connections.bt
Executable file
51
contrib/tracing/log_p2p_connections.bt
Executable file
|
@ -0,0 +1,51 @@
|
|||
#!/usr/bin/env bpftrace
|
||||
|
||||
BEGIN
|
||||
{
|
||||
printf("Logging opened, closed, misbehaving, and evicted P2P connections\n")
|
||||
}
|
||||
|
||||
usdt:./build/src/bitcoind:net:inbound_connection
|
||||
{
|
||||
$id = (int64) arg0;
|
||||
$addr = str(arg1);
|
||||
$conn_type = str(arg2);
|
||||
$network = (int32) arg3;
|
||||
$existing = (uint64) arg4;
|
||||
printf("INBOUND conn from %s: id=%ld, type=%s, network=%d, total=%d\n", $addr, $id, $conn_type, $network, $existing);
|
||||
}
|
||||
|
||||
usdt:./build/src/bitcoind:net:outbound_connection
|
||||
{
|
||||
$id = (int64) arg0;
|
||||
$addr = str(arg1);
|
||||
$conn_type = str(arg2);
|
||||
$network = (int32) arg3;
|
||||
$existing = (uint64) arg4;
|
||||
printf("OUTBOUND conn to %s: id=%ld, type=%s, network=%d, total=%d\n", $addr, $id, $conn_type, $network, $existing);
|
||||
}
|
||||
|
||||
usdt:./build/src/bitcoind:net:closed_connection
|
||||
{
|
||||
$id = (int64) arg0;
|
||||
$addr = str(arg1);
|
||||
$conn_type = str(arg2);
|
||||
$network = (int32) arg3;
|
||||
printf("CLOSED conn to %s: id=%ld, type=%s, network=%d, established=%ld\n", $addr, $id, $conn_type, $network, arg4);
|
||||
}
|
||||
|
||||
usdt:./build/src/bitcoind:net:evicted_inbound_connection
|
||||
{
|
||||
$id = (int64) arg0;
|
||||
$addr = str(arg1);
|
||||
$conn_type = str(arg2);
|
||||
$network = (int32) arg3;
|
||||
printf("EVICTED conn to %s: id=%ld, type=%s, network=%d, established=%ld\n", $addr, $id, $conn_type, $network, arg4);
|
||||
}
|
||||
|
||||
usdt:./build/src/bitcoind:net:misbehaving_connection
|
||||
{
|
||||
$id = (int64) arg0;
|
||||
$message = str(arg1);
|
||||
printf("MISBEHAVING conn id=%ld, message='%s'\n", $id, $message);
|
||||
}
|
|
@ -55,6 +55,9 @@ The currently available tracepoints are listed here.
|
|||
|
||||
### Context `net`
|
||||
|
||||
[^address-length]: An Onion v3 address with a `:` and a five digit port has 68
|
||||
chars. However, addresses of peers added with host names might be longer.
|
||||
|
||||
#### Tracepoint `net:inbound_message`
|
||||
|
||||
Is called when a message is received from a peer over the P2P network. Passes
|
||||
|
@ -62,7 +65,7 @@ information about our peer, the connection and the message as arguments.
|
|||
|
||||
Arguments passed:
|
||||
1. Peer ID as `int64`
|
||||
2. Peer Address and Port (IPv4, IPv6, Tor v3, I2P, ...) as `pointer to C-style String` (max. length 68 characters)
|
||||
2. Peer Address and Port (IPv4, IPv6, Tor v3, I2P, ...) as `pointer to C-style String` (normally up to 68 characters[^address-length])
|
||||
3. Connection Type (inbound, feeler, outbound-full-relay, ...) as `pointer to C-style String` (max. length 20 characters)
|
||||
4. Message Type (inv, ping, getdata, addrv2, ...) as `pointer to C-style String` (max. length 20 characters)
|
||||
5. Message Size in bytes as `uint64`
|
||||
|
@ -81,7 +84,7 @@ information about our peer, the connection and the message as arguments.
|
|||
|
||||
Arguments passed:
|
||||
1. Peer ID as `int64`
|
||||
2. Peer Address and Port (IPv4, IPv6, Tor v3, I2P, ...) as `pointer to C-style String` (max. length 68 characters)
|
||||
2. Peer Address and Port (IPv4, IPv6, Tor v3, I2P, ...) as `pointer to C-style String` (normally up to 68 characters[^address-length])
|
||||
3. Connection Type (inbound, feeler, outbound-full-relay, ...) as `pointer to C-style String` (max. length 20 characters)
|
||||
4. Message Type (inv, ping, getdata, addrv2, ...) as `pointer to C-style String` (max. length 20 characters)
|
||||
5. Message Size in bytes as `uint64`
|
||||
|
@ -93,6 +96,62 @@ to user-space in full. Messages longer than a 32kb might be cut off. This can
|
|||
be detected in tracing scripts by comparing the message size to the length of
|
||||
the passed message.
|
||||
|
||||
#### Tracepoint `net:inbound_connection`
|
||||
|
||||
Is called when a new inbound connection is opened to us. Passes information about
|
||||
the peer and the number of inbound connections including the newly opened connection.
|
||||
|
||||
Arguments passed:
|
||||
1. Peer ID as `int64`
|
||||
2. Peer address and port (IPv4, IPv6, Tor v3, I2P, ...) as `pointer to C-style String` (normally up to 68 characters[^address-length])
|
||||
3. Connection Type (inbound, feeler, outbound-full-relay, ...) as `pointer to C-style String` (max. length 20 characters)
|
||||
4. Network the peer connects from as `uint32` (1 = IPv4, 2 = IPv6, 3 = Onion, 4 = I2P, 5 = CJDNS). See `Network` enum in `netaddress.h`.
|
||||
5. Number of existing inbound connections as `uint64` including the newly opened inbound connection.
|
||||
|
||||
#### Tracepoint `net:outbound_connection`
|
||||
|
||||
Is called when a new outbound connection is opened by us. Passes information about
|
||||
the peer and the number of outbound connections including the newly opened connection.
|
||||
|
||||
Arguments passed:
|
||||
1. Peer ID as `int64`
|
||||
2. Peer address and port (IPv4, IPv6, Tor v3, I2P, ...) as `pointer to C-style String` (normally up to 68 characters[^address-length])
|
||||
3. Connection Type (inbound, feeler, outbound-full-relay, ...) as `pointer to C-style String` (max. length 20 characters)
|
||||
4. Network of the peer as `uint32` (1 = IPv4, 2 = IPv6, 3 = Onion, 4 = I2P, 5 = CJDNS). See `Network` enum in `netaddress.h`.
|
||||
5. Number of existing outbound connections as `uint64` including the newly opened outbound connection.
|
||||
|
||||
#### Tracepoint `net:evicted_inbound_connection`
|
||||
|
||||
Is called when a inbound connection is evicted by us. Passes information about the evicted peer and the time at connection establishment.
|
||||
|
||||
Arguments passed:
|
||||
1. Peer ID as `int64`
|
||||
2. Peer address and port (IPv4, IPv6, Tor v3, I2P, ...) as `pointer to C-style String` (normally up to 68 characters[^address-length])
|
||||
3. Connection Type (inbound, feeler, outbound-full-relay, ...) as `pointer to C-style String` (max. length 20 characters)
|
||||
4. Network the peer connects from as `uint32` (1 = IPv4, 2 = IPv6, 3 = Onion, 4 = I2P, 5 = CJDNS). See `Network` enum in `netaddress.h`.
|
||||
5. Connection established UNIX epoch timestamp in seconds as `uint64`.
|
||||
|
||||
#### Tracepoint `net:misbehaving_connection`
|
||||
|
||||
Is called when a connection is misbehaving. Passes the peer id and a
|
||||
reason for the peers misbehavior.
|
||||
|
||||
Arguments passed:
|
||||
1. Peer ID as `int64`.
|
||||
2. Reason why the peer is misbehaving as `pointer to C-style String` (max. length 128 characters).
|
||||
|
||||
#### Tracepoint `net:closed_connection`
|
||||
|
||||
Is called when a connection is closed. Passes information about the closed peer
|
||||
and the time at connection establishment.
|
||||
|
||||
Arguments passed:
|
||||
1. Peer ID as `int64`
|
||||
2. Peer address and port (IPv4, IPv6, Tor v3, I2P, ...) as `pointer to C-style String` (normally up to 68 characters[^address-length])
|
||||
3. Connection Type (inbound, feeler, outbound-full-relay, ...) as `pointer to C-style String` (max. length 20 characters)
|
||||
4. Network the peer connects from as `uint32` (1 = IPv4, 2 = IPv6, 3 = Onion, 4 = I2P, 5 = CJDNS). See `Network` enum in `netaddress.h`.
|
||||
5. Connection established UNIX epoch timestamp in seconds as `uint64`.
|
||||
|
||||
### Context `validation`
|
||||
|
||||
#### Tracepoint `validation:block_connected`
|
||||
|
|
30
src/net.cpp
30
src/net.cpp
|
@ -53,6 +53,10 @@
|
|||
#include <optional>
|
||||
#include <unordered_map>
|
||||
|
||||
TRACEPOINT_SEMAPHORE(net, closed_connection);
|
||||
TRACEPOINT_SEMAPHORE(net, evicted_inbound_connection);
|
||||
TRACEPOINT_SEMAPHORE(net, inbound_connection);
|
||||
TRACEPOINT_SEMAPHORE(net, outbound_connection);
|
||||
TRACEPOINT_SEMAPHORE(net, outbound_message);
|
||||
|
||||
/** Maximum number of block-relay-only anchor connections */
|
||||
|
@ -560,6 +564,13 @@ void CNode::CloseSocketDisconnect()
|
|||
if (m_sock) {
|
||||
LogDebug(BCLog::NET, "Resetting socket for peer=%d%s", GetId(), LogIP(fLogIPs));
|
||||
m_sock.reset();
|
||||
|
||||
TRACEPOINT(net, closed_connection,
|
||||
GetId(),
|
||||
m_addr_name.c_str(),
|
||||
ConnectionTypeAsString().c_str(),
|
||||
ConnectedThroughNetwork(),
|
||||
Ticks<std::chrono::seconds>(m_connected));
|
||||
}
|
||||
m_i2p_sam_session.reset();
|
||||
}
|
||||
|
@ -1708,6 +1719,12 @@ bool CConnman::AttemptToEvictConnection()
|
|||
for (CNode* pnode : m_nodes) {
|
||||
if (pnode->GetId() == *node_id_to_evict) {
|
||||
LogDebug(BCLog::NET, "selected %s connection for eviction, %s", pnode->ConnectionTypeAsString(), pnode->DisconnectMsg(fLogIPs));
|
||||
TRACEPOINT(net, evicted_inbound_connection,
|
||||
pnode->GetId(),
|
||||
pnode->m_addr_name.c_str(),
|
||||
pnode->ConnectionTypeAsString().c_str(),
|
||||
pnode->ConnectedThroughNetwork(),
|
||||
Ticks<std::chrono::seconds>(pnode->m_connected));
|
||||
pnode->fDisconnect = true;
|
||||
return true;
|
||||
}
|
||||
|
@ -1833,6 +1850,12 @@ void CConnman::CreateNodeFromAcceptedSocket(std::unique_ptr<Sock>&& sock,
|
|||
m_nodes.push_back(pnode);
|
||||
}
|
||||
LogDebug(BCLog::NET, "connection from %s accepted\n", addr.ToStringAddrPort());
|
||||
TRACEPOINT(net, inbound_connection,
|
||||
pnode->GetId(),
|
||||
pnode->m_addr_name.c_str(),
|
||||
pnode->ConnectionTypeAsString().c_str(),
|
||||
pnode->ConnectedThroughNetwork(),
|
||||
GetNodeCount(ConnectionDirection::In));
|
||||
|
||||
// We received a new connection, harvest entropy from the time (and our peer count)
|
||||
RandAddEvent((uint32_t)id);
|
||||
|
@ -2995,6 +3018,13 @@ void CConnman::OpenNetworkConnection(const CAddress& addrConnect, bool fCountFai
|
|||
// update connection count by network
|
||||
if (pnode->IsManualOrFullOutboundConn()) ++m_network_conn_counts[pnode->addr.GetNetwork()];
|
||||
}
|
||||
|
||||
TRACEPOINT(net, outbound_connection,
|
||||
pnode->GetId(),
|
||||
pnode->m_addr_name.c_str(),
|
||||
pnode->ConnectionTypeAsString().c_str(),
|
||||
pnode->ConnectedThroughNetwork(),
|
||||
GetNodeCount(ConnectionDirection::Out));
|
||||
}
|
||||
|
||||
Mutex NetEventsInterface::g_msgproc_mutex;
|
||||
|
|
|
@ -58,6 +58,7 @@
|
|||
using namespace util::hex_literals;
|
||||
|
||||
TRACEPOINT_SEMAPHORE(net, inbound_message);
|
||||
TRACEPOINT_SEMAPHORE(net, misbehaving_connection);
|
||||
|
||||
/** Headers download timeout.
|
||||
* Timeout = base + per_header * (expected number of headers) */
|
||||
|
@ -1752,6 +1753,10 @@ void PeerManagerImpl::Misbehaving(Peer& peer, const std::string& message)
|
|||
const std::string message_prefixed = message.empty() ? "" : (": " + message);
|
||||
peer.m_should_discourage = true;
|
||||
LogDebug(BCLog::NET, "Misbehaving: peer=%d%s\n", peer.m_id, message_prefixed);
|
||||
TRACEPOINT(net, misbehaving_connection,
|
||||
peer.m_id,
|
||||
message.c_str()
|
||||
);
|
||||
}
|
||||
|
||||
void PeerManagerImpl::MaybePunishNodeForBlock(NodeId nodeid, const BlockValidationState& state,
|
||||
|
|
|
@ -11,10 +11,10 @@ import ctypes
|
|||
from io import BytesIO
|
||||
# Test will be skipped if we don't have bcc installed
|
||||
try:
|
||||
from bcc import BPF, USDT # type: ignore[import]
|
||||
from bcc import BPF, USDT # type: ignore[import]
|
||||
except ImportError:
|
||||
pass
|
||||
from test_framework.messages import msg_version
|
||||
from test_framework.messages import CBlockHeader, MAX_HEADERS_RESULTS, msg_headers, msg_version
|
||||
from test_framework.p2p import P2PInterface
|
||||
from test_framework.test_framework import BitcoinTestFramework
|
||||
from test_framework.util import assert_equal
|
||||
|
@ -23,10 +23,17 @@ from test_framework.util import assert_equal
|
|||
MAX_PEER_ADDR_LENGTH = 68
|
||||
MAX_PEER_CONN_TYPE_LENGTH = 20
|
||||
MAX_MSG_TYPE_LENGTH = 20
|
||||
MAX_MISBEHAVING_MESSAGE_LENGTH = 128
|
||||
# We won't process messages larger than 150 byte in this test. For reading
|
||||
# larger messanges see contrib/tracing/log_raw_p2p_msgs.py
|
||||
MAX_MSG_DATA_LENGTH = 150
|
||||
|
||||
# from net_address.h
|
||||
NETWORK_TYPE_UNROUTABLE = 0
|
||||
# Use in -maxconnections. Results in a maximum of 21 inbound connections
|
||||
MAX_CONNECTIONS = 32
|
||||
MAX_INBOUND_CONNECTIONS = MAX_CONNECTIONS - 10 - 1 # 10 outbound and 1 feeler
|
||||
|
||||
net_tracepoints_program = """
|
||||
#include <uapi/linux/ptrace.h>
|
||||
|
||||
|
@ -34,11 +41,13 @@ net_tracepoints_program = """
|
|||
#define MAX_PEER_CONN_TYPE_LENGTH {}
|
||||
#define MAX_MSG_TYPE_LENGTH {}
|
||||
#define MAX_MSG_DATA_LENGTH {}
|
||||
#define MAX_MISBEHAVING_MESSAGE_LENGTH {}
|
||||
""".format(
|
||||
MAX_PEER_ADDR_LENGTH,
|
||||
MAX_PEER_CONN_TYPE_LENGTH,
|
||||
MAX_MSG_TYPE_LENGTH,
|
||||
MAX_MSG_DATA_LENGTH
|
||||
MAX_MSG_DATA_LENGTH,
|
||||
MAX_MISBEHAVING_MESSAGE_LENGTH,
|
||||
) + """
|
||||
// A min() macro. Prefixed with _TRACEPOINT_TEST to avoid collision with other MIN macros.
|
||||
#define _TRACEPOINT_TEST_MIN(a,b) ({ __typeof__ (a) _a = (a); __typeof__ (b) _b = (b); _a < _b ? _a : _b; })
|
||||
|
@ -53,6 +62,32 @@ struct p2p_message
|
|||
u8 msg[MAX_MSG_DATA_LENGTH];
|
||||
};
|
||||
|
||||
struct Connection
|
||||
{
|
||||
u64 id;
|
||||
char addr[MAX_PEER_ADDR_LENGTH];
|
||||
char type[MAX_PEER_CONN_TYPE_LENGTH];
|
||||
u32 network;
|
||||
};
|
||||
|
||||
struct NewConnection
|
||||
{
|
||||
struct Connection conn;
|
||||
u64 existing;
|
||||
};
|
||||
|
||||
struct ClosedConnection
|
||||
{
|
||||
struct Connection conn;
|
||||
u64 time_established;
|
||||
};
|
||||
|
||||
struct MisbehavingConnection
|
||||
{
|
||||
u64 id;
|
||||
char message[MAX_MISBEHAVING_MESSAGE_LENGTH];
|
||||
};
|
||||
|
||||
BPF_PERF_OUTPUT(inbound_messages);
|
||||
int trace_inbound_message(struct pt_regs *ctx) {
|
||||
struct p2p_message msg = {};
|
||||
|
@ -78,12 +113,126 @@ int trace_outbound_message(struct pt_regs *ctx) {
|
|||
outbound_messages.perf_submit(ctx, &msg, sizeof(msg));
|
||||
return 0;
|
||||
};
|
||||
|
||||
BPF_PERF_OUTPUT(inbound_connections);
|
||||
int trace_inbound_connection(struct pt_regs *ctx) {
|
||||
struct NewConnection inbound = {};
|
||||
void *conn_type_pointer = NULL, *address_pointer = NULL;
|
||||
bpf_usdt_readarg(1, ctx, &inbound.conn.id);
|
||||
bpf_usdt_readarg(2, ctx, &address_pointer);
|
||||
bpf_usdt_readarg(3, ctx, &conn_type_pointer);
|
||||
bpf_usdt_readarg(4, ctx, &inbound.conn.network);
|
||||
bpf_usdt_readarg(5, ctx, &inbound.existing);
|
||||
bpf_probe_read_user_str(&inbound.conn.addr, sizeof(inbound.conn.addr), address_pointer);
|
||||
bpf_probe_read_user_str(&inbound.conn.type, sizeof(inbound.conn.type), conn_type_pointer);
|
||||
inbound_connections.perf_submit(ctx, &inbound, sizeof(inbound));
|
||||
return 0;
|
||||
};
|
||||
|
||||
BPF_PERF_OUTPUT(outbound_connections);
|
||||
int trace_outbound_connection(struct pt_regs *ctx) {
|
||||
struct NewConnection outbound = {};
|
||||
void *conn_type_pointer = NULL, *address_pointer = NULL;
|
||||
bpf_usdt_readarg(1, ctx, &outbound.conn.id);
|
||||
bpf_usdt_readarg(2, ctx, &address_pointer);
|
||||
bpf_usdt_readarg(3, ctx, &conn_type_pointer);
|
||||
bpf_usdt_readarg(4, ctx, &outbound.conn.network);
|
||||
bpf_usdt_readarg(5, ctx, &outbound.existing);
|
||||
bpf_probe_read_user_str(&outbound.conn.addr, sizeof(outbound.conn.addr), address_pointer);
|
||||
bpf_probe_read_user_str(&outbound.conn.type, sizeof(outbound.conn.type), conn_type_pointer);
|
||||
outbound_connections.perf_submit(ctx, &outbound, sizeof(outbound));
|
||||
return 0;
|
||||
};
|
||||
|
||||
BPF_PERF_OUTPUT(evicted_inbound_connections);
|
||||
int trace_evicted_inbound_connection(struct pt_regs *ctx) {
|
||||
struct ClosedConnection evicted = {};
|
||||
void *conn_type_pointer = NULL, *address_pointer = NULL;
|
||||
bpf_usdt_readarg(1, ctx, &evicted.conn.id);
|
||||
bpf_usdt_readarg(2, ctx, &address_pointer);
|
||||
bpf_usdt_readarg(3, ctx, &conn_type_pointer);
|
||||
bpf_usdt_readarg(4, ctx, &evicted.conn.network);
|
||||
bpf_usdt_readarg(5, ctx, &evicted.time_established);
|
||||
bpf_probe_read_user_str(&evicted.conn.addr, sizeof(evicted.conn.addr), address_pointer);
|
||||
bpf_probe_read_user_str(&evicted.conn.type, sizeof(evicted.conn.type), conn_type_pointer);
|
||||
evicted_inbound_connections.perf_submit(ctx, &evicted, sizeof(evicted));
|
||||
return 0;
|
||||
};
|
||||
|
||||
BPF_PERF_OUTPUT(misbehaving_connections);
|
||||
int trace_misbehaving_connection(struct pt_regs *ctx) {
|
||||
struct MisbehavingConnection misbehaving = {};
|
||||
void *message_pointer = NULL;
|
||||
bpf_usdt_readarg(1, ctx, &misbehaving.id);
|
||||
bpf_usdt_readarg(2, ctx, &message_pointer);
|
||||
bpf_probe_read_user_str(&misbehaving.message, sizeof(misbehaving.message), message_pointer);
|
||||
misbehaving_connections.perf_submit(ctx, &misbehaving, sizeof(misbehaving));
|
||||
return 0;
|
||||
};
|
||||
|
||||
BPF_PERF_OUTPUT(closed_connections);
|
||||
int trace_closed_connection(struct pt_regs *ctx) {
|
||||
struct ClosedConnection closed = {};
|
||||
void *conn_type_pointer = NULL, *address_pointer = NULL;
|
||||
bpf_usdt_readarg(1, ctx, &closed.conn.id);
|
||||
bpf_usdt_readarg(2, ctx, &address_pointer);
|
||||
bpf_usdt_readarg(3, ctx, &conn_type_pointer);
|
||||
bpf_usdt_readarg(4, ctx, &closed.conn.network);
|
||||
bpf_usdt_readarg(5, ctx, &closed.time_established);
|
||||
bpf_probe_read_user_str(&closed.conn.addr, sizeof(closed.conn.addr), address_pointer);
|
||||
bpf_probe_read_user_str(&closed.conn.type, sizeof(closed.conn.type), conn_type_pointer);
|
||||
closed_connections.perf_submit(ctx, &closed, sizeof(closed));
|
||||
return 0;
|
||||
};
|
||||
"""
|
||||
|
||||
|
||||
class Connection(ctypes.Structure):
|
||||
_fields_ = [
|
||||
("id", ctypes.c_uint64),
|
||||
("addr", ctypes.c_char * MAX_PEER_ADDR_LENGTH),
|
||||
("conn_type", ctypes.c_char * MAX_PEER_CONN_TYPE_LENGTH),
|
||||
("network", ctypes.c_uint32),
|
||||
]
|
||||
|
||||
def __repr__(self):
|
||||
return f"Connection(peer={self.id}, addr={self.addr.decode('utf-8')}, conn_type={self.conn_type.decode('utf-8')}, network={self.network})"
|
||||
|
||||
|
||||
class NewConnection(ctypes.Structure):
|
||||
_fields_ = [
|
||||
("conn", Connection),
|
||||
("existing", ctypes.c_uint64),
|
||||
]
|
||||
|
||||
def __repr__(self):
|
||||
return f"NewConnection(conn={self.conn}, existing={self.existing})"
|
||||
|
||||
|
||||
class ClosedConnection(ctypes.Structure):
|
||||
_fields_ = [
|
||||
("conn", Connection),
|
||||
("time_established", ctypes.c_uint64),
|
||||
]
|
||||
|
||||
def __repr__(self):
|
||||
return f"ClosedConnection(conn={self.conn}, time_established={self.time_established})"
|
||||
|
||||
|
||||
class MisbehavingConnection(ctypes.Structure):
|
||||
_fields_ = [
|
||||
("id", ctypes.c_uint64),
|
||||
("message", ctypes.c_char * MAX_MISBEHAVING_MESSAGE_LENGTH),
|
||||
]
|
||||
|
||||
def __repr__(self):
|
||||
return f"MisbehavingConnection(id={self.id}, message={self.message})"
|
||||
|
||||
|
||||
class NetTracepointTest(BitcoinTestFramework):
|
||||
def set_test_params(self):
|
||||
self.num_nodes = 1
|
||||
self.extra_args = [[f'-maxconnections={MAX_CONNECTIONS}']]
|
||||
|
||||
def skip_test_if_missing_module(self):
|
||||
self.skip_if_platform_not_linux()
|
||||
|
@ -92,6 +241,14 @@ class NetTracepointTest(BitcoinTestFramework):
|
|||
self.skip_if_no_bpf_permissions()
|
||||
|
||||
def run_test(self):
|
||||
self.p2p_message_tracepoint_test()
|
||||
self.inbound_conn_tracepoint_test()
|
||||
self.outbound_conn_tracepoint_test()
|
||||
self.evicted_inbound_conn_tracepoint_test()
|
||||
self.misbehaving_conn_tracepoint_test()
|
||||
self.closed_conn_tracepoint_test()
|
||||
|
||||
def p2p_message_tracepoint_test(self):
|
||||
# Tests the net:inbound_message and net:outbound_message tracepoints
|
||||
# See https://github.com/bitcoin/bitcoin/blob/master/doc/tracing.md#context-net
|
||||
|
||||
|
@ -166,7 +323,194 @@ class NetTracepointTest(BitcoinTestFramework):
|
|||
|
||||
|
||||
bpf.cleanup()
|
||||
test_node.peer_disconnect()
|
||||
|
||||
def inbound_conn_tracepoint_test(self):
|
||||
self.log.info("hook into the net:inbound_connection tracepoint")
|
||||
ctx = USDT(pid=self.nodes[0].process.pid)
|
||||
ctx.enable_probe(probe="net:inbound_connection",
|
||||
fn_name="trace_inbound_connection")
|
||||
bpf = BPF(text=net_tracepoints_program, usdt_contexts=[ctx], debug=0, cflags=["-Wno-error=implicit-function-declaration"])
|
||||
|
||||
inbound_connections = []
|
||||
EXPECTED_INBOUND_CONNECTIONS = 2
|
||||
|
||||
def handle_inbound_connection(_, data, __):
|
||||
nonlocal inbound_connections
|
||||
event = ctypes.cast(data, ctypes.POINTER(NewConnection)).contents
|
||||
self.log.info(f"handle_inbound_connection(): {event}")
|
||||
inbound_connections.append(event)
|
||||
|
||||
bpf["inbound_connections"].open_perf_buffer(handle_inbound_connection)
|
||||
|
||||
self.log.info("connect two P2P test nodes to our bitcoind node")
|
||||
testnodes = list()
|
||||
for _ in range(EXPECTED_INBOUND_CONNECTIONS):
|
||||
testnode = P2PInterface()
|
||||
self.nodes[0].add_p2p_connection(testnode)
|
||||
testnodes.append(testnode)
|
||||
bpf.perf_buffer_poll(timeout=200)
|
||||
|
||||
assert_equal(EXPECTED_INBOUND_CONNECTIONS, len(inbound_connections))
|
||||
for inbound_connection in inbound_connections:
|
||||
assert inbound_connection.conn.id > 0
|
||||
assert inbound_connection.existing > 0
|
||||
assert_equal(b'inbound', inbound_connection.conn.conn_type)
|
||||
assert_equal(NETWORK_TYPE_UNROUTABLE, inbound_connection.conn.network)
|
||||
|
||||
bpf.cleanup()
|
||||
for node in testnodes:
|
||||
node.peer_disconnect()
|
||||
|
||||
def outbound_conn_tracepoint_test(self):
|
||||
self.log.info("hook into the net:outbound_connection tracepoint")
|
||||
ctx = USDT(pid=self.nodes[0].process.pid)
|
||||
ctx.enable_probe(probe="net:outbound_connection",
|
||||
fn_name="trace_outbound_connection")
|
||||
bpf = BPF(text=net_tracepoints_program, usdt_contexts=[ctx], debug=0, cflags=["-Wno-error=implicit-function-declaration"])
|
||||
|
||||
# that the handle_* function succeeds.
|
||||
EXPECTED_OUTBOUND_CONNECTIONS = 2
|
||||
EXPECTED_CONNECTION_TYPE = "feeler"
|
||||
outbound_connections = []
|
||||
|
||||
def handle_outbound_connection(_, data, __):
|
||||
event = ctypes.cast(data, ctypes.POINTER(NewConnection)).contents
|
||||
self.log.info(f"handle_outbound_connection(): {event}")
|
||||
outbound_connections.append(event)
|
||||
|
||||
bpf["outbound_connections"].open_perf_buffer(
|
||||
handle_outbound_connection)
|
||||
|
||||
self.log.info(
|
||||
f"connect {EXPECTED_OUTBOUND_CONNECTIONS} P2P test nodes to our bitcoind node")
|
||||
testnodes = list()
|
||||
for p2p_idx in range(EXPECTED_OUTBOUND_CONNECTIONS):
|
||||
testnode = P2PInterface()
|
||||
self.nodes[0].add_outbound_p2p_connection(
|
||||
testnode, p2p_idx=p2p_idx, connection_type=EXPECTED_CONNECTION_TYPE)
|
||||
testnodes.append(testnode)
|
||||
bpf.perf_buffer_poll(timeout=200)
|
||||
|
||||
assert_equal(EXPECTED_OUTBOUND_CONNECTIONS, len(outbound_connections))
|
||||
for outbound_connection in outbound_connections:
|
||||
assert outbound_connection.conn.id > 0
|
||||
assert outbound_connection.existing > 0
|
||||
assert_equal(EXPECTED_CONNECTION_TYPE, outbound_connection.conn.conn_type.decode('utf-8'))
|
||||
assert_equal(NETWORK_TYPE_UNROUTABLE, outbound_connection.conn.network)
|
||||
|
||||
bpf.cleanup()
|
||||
for node in testnodes:
|
||||
node.peer_disconnect()
|
||||
|
||||
def evicted_inbound_conn_tracepoint_test(self):
|
||||
self.log.info("hook into the net:evicted_inbound_connection tracepoint")
|
||||
ctx = USDT(pid=self.nodes[0].process.pid)
|
||||
ctx.enable_probe(probe="net:evicted_inbound_connection",
|
||||
fn_name="trace_evicted_inbound_connection")
|
||||
bpf = BPF(text=net_tracepoints_program, usdt_contexts=[ctx], debug=0, cflags=["-Wno-error=implicit-function-declaration"])
|
||||
|
||||
EXPECTED_EVICTED_CONNECTIONS = 2
|
||||
evicted_connections = []
|
||||
|
||||
def handle_evicted_inbound_connection(_, data, __):
|
||||
event = ctypes.cast(data, ctypes.POINTER(ClosedConnection)).contents
|
||||
self.log.info(f"handle_evicted_inbound_connection(): {event}")
|
||||
evicted_connections.append(event)
|
||||
|
||||
bpf["evicted_inbound_connections"].open_perf_buffer(handle_evicted_inbound_connection)
|
||||
|
||||
self.log.info(
|
||||
f"connect {MAX_INBOUND_CONNECTIONS + EXPECTED_EVICTED_CONNECTIONS} P2P test nodes to our bitcoind node and expect {EXPECTED_EVICTED_CONNECTIONS} evictions")
|
||||
testnodes = list()
|
||||
for p2p_idx in range(MAX_INBOUND_CONNECTIONS + EXPECTED_EVICTED_CONNECTIONS):
|
||||
testnode = P2PInterface()
|
||||
self.nodes[0].add_p2p_connection(testnode)
|
||||
testnodes.append(testnode)
|
||||
bpf.perf_buffer_poll(timeout=200)
|
||||
|
||||
assert_equal(EXPECTED_EVICTED_CONNECTIONS, len(evicted_connections))
|
||||
for evicted_connection in evicted_connections:
|
||||
assert evicted_connection.conn.id > 0
|
||||
assert evicted_connection.time_established > 0
|
||||
assert_equal("inbound", evicted_connection.conn.conn_type.decode('utf-8'))
|
||||
assert_equal(NETWORK_TYPE_UNROUTABLE, evicted_connection.conn.network)
|
||||
|
||||
bpf.cleanup()
|
||||
for node in testnodes:
|
||||
node.peer_disconnect()
|
||||
|
||||
def misbehaving_conn_tracepoint_test(self):
|
||||
self.log.info("hook into the net:misbehaving_connection tracepoint")
|
||||
ctx = USDT(pid=self.nodes[0].process.pid)
|
||||
ctx.enable_probe(probe="net:misbehaving_connection",
|
||||
fn_name="trace_misbehaving_connection")
|
||||
bpf = BPF(text=net_tracepoints_program, usdt_contexts=[ctx], debug=0, cflags=["-Wno-error=implicit-function-declaration"])
|
||||
|
||||
EXPECTED_MISBEHAVING_CONNECTIONS = 2
|
||||
misbehaving_connections = []
|
||||
|
||||
def handle_misbehaving_connection(_, data, __):
|
||||
event = ctypes.cast(data, ctypes.POINTER(MisbehavingConnection)).contents
|
||||
self.log.info(f"handle_misbehaving_connection(): {event}")
|
||||
misbehaving_connections.append(event)
|
||||
|
||||
bpf["misbehaving_connections"].open_perf_buffer(handle_misbehaving_connection)
|
||||
|
||||
self.log.info("connect a misbehaving P2P test nodes to our bitcoind node")
|
||||
msg = msg_headers([CBlockHeader()] * (MAX_HEADERS_RESULTS + 1))
|
||||
for _ in range(EXPECTED_MISBEHAVING_CONNECTIONS):
|
||||
testnode = P2PInterface()
|
||||
self.nodes[0].add_p2p_connection(testnode)
|
||||
testnode.send_message(msg)
|
||||
bpf.perf_buffer_poll(timeout=500)
|
||||
testnode.peer_disconnect()
|
||||
|
||||
assert_equal(EXPECTED_MISBEHAVING_CONNECTIONS, len(misbehaving_connections))
|
||||
for misbehaving_connection in misbehaving_connections:
|
||||
assert misbehaving_connection.id > 0
|
||||
assert len(misbehaving_connection.message) > 0
|
||||
assert misbehaving_connection.message == b"headers message size = 2001"
|
||||
|
||||
bpf.cleanup()
|
||||
|
||||
def closed_conn_tracepoint_test(self):
|
||||
self.log.info("hook into the net:closed_connection tracepoint")
|
||||
ctx = USDT(pid=self.nodes[0].process.pid)
|
||||
ctx.enable_probe(probe="net:closed_connection",
|
||||
fn_name="trace_closed_connection")
|
||||
bpf = BPF(text=net_tracepoints_program, usdt_contexts=[ctx], debug=0, cflags=["-Wno-error=implicit-function-declaration"])
|
||||
|
||||
EXPECTED_CLOSED_CONNECTIONS = 2
|
||||
closed_connections = []
|
||||
|
||||
def handle_closed_connection(_, data, __):
|
||||
event = ctypes.cast(data, ctypes.POINTER(ClosedConnection)).contents
|
||||
self.log.info(f"handle_closed_connection(): {event}")
|
||||
closed_connections.append(event)
|
||||
|
||||
bpf["closed_connections"].open_perf_buffer(handle_closed_connection)
|
||||
|
||||
self.log.info(
|
||||
f"connect {EXPECTED_CLOSED_CONNECTIONS} P2P test nodes to our bitcoind node")
|
||||
testnodes = list()
|
||||
for p2p_idx in range(EXPECTED_CLOSED_CONNECTIONS):
|
||||
testnode = P2PInterface()
|
||||
self.nodes[0].add_p2p_connection(testnode)
|
||||
testnodes.append(testnode)
|
||||
for node in testnodes:
|
||||
node.peer_disconnect()
|
||||
self.wait_until(lambda: len(self.nodes[0].getpeerinfo()) == 0)
|
||||
bpf.perf_buffer_poll(timeout=400)
|
||||
|
||||
assert_equal(EXPECTED_CLOSED_CONNECTIONS, len(closed_connections))
|
||||
for closed_connection in closed_connections:
|
||||
assert closed_connection.conn.id > 0
|
||||
assert_equal("inbound", closed_connection.conn.conn_type.decode('utf-8'))
|
||||
assert_equal(0, closed_connection.conn.network)
|
||||
assert closed_connection.time_established > 0
|
||||
|
||||
bpf.cleanup()
|
||||
|
||||
if __name__ == '__main__':
|
||||
NetTracepointTest(__file__).main()
|
||||
|
|
Loading…
Add table
Reference in a new issue