2017-02-02 23:07:22 +00:00
|
|
|
package netlink
|
|
|
|
|
|
|
|
import (
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
"net"
|
2020-04-13 14:32:22 +00:00
|
|
|
"syscall"
|
2017-02-02 23:07:22 +00:00
|
|
|
|
|
|
|
"github.com/vishvananda/netlink/nl"
|
2017-10-20 20:38:07 +00:00
|
|
|
"golang.org/x/sys/unix"
|
2017-02-02 23:07:22 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
2023-11-15 22:05:25 +00:00
|
|
|
sizeofSocketID = 0x30
|
|
|
|
sizeofSocketRequest = sizeofSocketID + 0x8
|
|
|
|
sizeofSocket = sizeofSocketID + 0x18
|
|
|
|
sizeofUnixSocketRequest = 0x18 // 24 byte
|
|
|
|
sizeofUnixSocket = 0x10 // 16 byte
|
2017-02-02 23:07:22 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
type socketRequest struct {
|
|
|
|
Family uint8
|
|
|
|
Protocol uint8
|
|
|
|
Ext uint8
|
|
|
|
pad uint8
|
|
|
|
States uint32
|
|
|
|
ID SocketID
|
|
|
|
}
|
|
|
|
|
|
|
|
type writeBuffer struct {
|
|
|
|
Bytes []byte
|
|
|
|
pos int
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *writeBuffer) Write(c byte) {
|
|
|
|
b.Bytes[b.pos] = c
|
|
|
|
b.pos++
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *writeBuffer) Next(n int) []byte {
|
|
|
|
s := b.Bytes[b.pos : b.pos+n]
|
|
|
|
b.pos += n
|
|
|
|
return s
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r *socketRequest) Serialize() []byte {
|
|
|
|
b := writeBuffer{Bytes: make([]byte, sizeofSocketRequest)}
|
|
|
|
b.Write(r.Family)
|
|
|
|
b.Write(r.Protocol)
|
|
|
|
b.Write(r.Ext)
|
|
|
|
b.Write(r.pad)
|
|
|
|
native.PutUint32(b.Next(4), r.States)
|
|
|
|
networkOrder.PutUint16(b.Next(2), r.ID.SourcePort)
|
|
|
|
networkOrder.PutUint16(b.Next(2), r.ID.DestinationPort)
|
2020-04-13 14:32:22 +00:00
|
|
|
if r.Family == unix.AF_INET6 {
|
|
|
|
copy(b.Next(16), r.ID.Source)
|
|
|
|
copy(b.Next(16), r.ID.Destination)
|
|
|
|
} else {
|
2023-09-19 13:05:05 +00:00
|
|
|
copy(b.Next(16), r.ID.Source.To4())
|
|
|
|
copy(b.Next(16), r.ID.Destination.To4())
|
2020-04-13 14:32:22 +00:00
|
|
|
}
|
2017-02-02 23:07:22 +00:00
|
|
|
native.PutUint32(b.Next(4), r.ID.Interface)
|
|
|
|
native.PutUint32(b.Next(4), r.ID.Cookie[0])
|
|
|
|
native.PutUint32(b.Next(4), r.ID.Cookie[1])
|
|
|
|
return b.Bytes
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r *socketRequest) Len() int { return sizeofSocketRequest }
|
|
|
|
|
2023-11-15 22:05:25 +00:00
|
|
|
// According to linux/include/uapi/linux/unix_diag.h
|
|
|
|
type unixSocketRequest struct {
|
|
|
|
Family uint8
|
|
|
|
Protocol uint8
|
|
|
|
pad uint16
|
|
|
|
States uint32
|
|
|
|
INode uint32
|
|
|
|
Show uint32
|
|
|
|
Cookie [2]uint32
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r *unixSocketRequest) Serialize() []byte {
|
|
|
|
b := writeBuffer{Bytes: make([]byte, sizeofUnixSocketRequest)}
|
|
|
|
b.Write(r.Family)
|
|
|
|
b.Write(r.Protocol)
|
|
|
|
native.PutUint16(b.Next(2), r.pad)
|
|
|
|
native.PutUint32(b.Next(4), r.States)
|
|
|
|
native.PutUint32(b.Next(4), r.INode)
|
|
|
|
native.PutUint32(b.Next(4), r.Show)
|
|
|
|
native.PutUint32(b.Next(4), r.Cookie[0])
|
|
|
|
native.PutUint32(b.Next(4), r.Cookie[1])
|
|
|
|
return b.Bytes
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r *unixSocketRequest) Len() int { return sizeofUnixSocketRequest }
|
|
|
|
|
2017-02-02 23:07:22 +00:00
|
|
|
type readBuffer struct {
|
|
|
|
Bytes []byte
|
|
|
|
pos int
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *readBuffer) Read() byte {
|
|
|
|
c := b.Bytes[b.pos]
|
|
|
|
b.pos++
|
|
|
|
return c
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *readBuffer) Next(n int) []byte {
|
|
|
|
s := b.Bytes[b.pos : b.pos+n]
|
|
|
|
b.pos += n
|
|
|
|
return s
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Socket) deserialize(b []byte) error {
|
|
|
|
if len(b) < sizeofSocket {
|
|
|
|
return fmt.Errorf("socket data short read (%d); want %d", len(b), sizeofSocket)
|
|
|
|
}
|
|
|
|
rb := readBuffer{Bytes: b}
|
|
|
|
s.Family = rb.Read()
|
|
|
|
s.State = rb.Read()
|
|
|
|
s.Timer = rb.Read()
|
|
|
|
s.Retrans = rb.Read()
|
|
|
|
s.ID.SourcePort = networkOrder.Uint16(rb.Next(2))
|
|
|
|
s.ID.DestinationPort = networkOrder.Uint16(rb.Next(2))
|
2020-04-13 14:32:22 +00:00
|
|
|
if s.Family == unix.AF_INET6 {
|
|
|
|
s.ID.Source = net.IP(rb.Next(16))
|
|
|
|
s.ID.Destination = net.IP(rb.Next(16))
|
|
|
|
} else {
|
|
|
|
s.ID.Source = net.IPv4(rb.Read(), rb.Read(), rb.Read(), rb.Read())
|
|
|
|
rb.Next(12)
|
|
|
|
s.ID.Destination = net.IPv4(rb.Read(), rb.Read(), rb.Read(), rb.Read())
|
|
|
|
rb.Next(12)
|
|
|
|
}
|
2017-02-02 23:07:22 +00:00
|
|
|
s.ID.Interface = native.Uint32(rb.Next(4))
|
|
|
|
s.ID.Cookie[0] = native.Uint32(rb.Next(4))
|
|
|
|
s.ID.Cookie[1] = native.Uint32(rb.Next(4))
|
|
|
|
s.Expires = native.Uint32(rb.Next(4))
|
|
|
|
s.RQueue = native.Uint32(rb.Next(4))
|
|
|
|
s.WQueue = native.Uint32(rb.Next(4))
|
|
|
|
s.UID = native.Uint32(rb.Next(4))
|
|
|
|
s.INode = native.Uint32(rb.Next(4))
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-11-15 22:05:25 +00:00
|
|
|
func (u *UnixSocket) deserialize(b []byte) error {
|
|
|
|
if len(b) < sizeofUnixSocket {
|
|
|
|
return fmt.Errorf("unix diag data short read (%d); want %d", len(b), sizeofUnixSocket)
|
|
|
|
}
|
|
|
|
rb := readBuffer{Bytes: b}
|
|
|
|
u.Type = rb.Read()
|
|
|
|
u.Family = rb.Read()
|
|
|
|
u.State = rb.Read()
|
|
|
|
u.pad = rb.Read()
|
|
|
|
u.INode = native.Uint32(rb.Next(4))
|
|
|
|
u.Cookie[0] = native.Uint32(rb.Next(4))
|
|
|
|
u.Cookie[1] = native.Uint32(rb.Next(4))
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-02-02 23:07:22 +00:00
|
|
|
// SocketGet returns the Socket identified by its local and remote addresses.
|
|
|
|
func SocketGet(local, remote net.Addr) (*Socket, error) {
|
2023-09-19 13:05:05 +00:00
|
|
|
var protocol uint8
|
|
|
|
var localIP, remoteIP net.IP
|
|
|
|
var localPort, remotePort uint16
|
|
|
|
switch l := local.(type) {
|
|
|
|
case *net.TCPAddr:
|
|
|
|
r, ok := remote.(*net.TCPAddr)
|
|
|
|
if !ok {
|
|
|
|
return nil, ErrNotImplemented
|
|
|
|
}
|
|
|
|
localIP = l.IP
|
|
|
|
localPort = uint16(l.Port)
|
|
|
|
remoteIP = r.IP
|
|
|
|
remotePort = uint16(r.Port)
|
|
|
|
protocol = unix.IPPROTO_TCP
|
|
|
|
case *net.UDPAddr:
|
|
|
|
r, ok := remote.(*net.UDPAddr)
|
|
|
|
if !ok {
|
|
|
|
return nil, ErrNotImplemented
|
|
|
|
}
|
|
|
|
localIP = l.IP
|
|
|
|
localPort = uint16(l.Port)
|
|
|
|
remoteIP = r.IP
|
|
|
|
remotePort = uint16(r.Port)
|
|
|
|
protocol = unix.IPPROTO_UDP
|
|
|
|
default:
|
2017-02-02 23:07:22 +00:00
|
|
|
return nil, ErrNotImplemented
|
|
|
|
}
|
2023-09-19 13:05:05 +00:00
|
|
|
|
|
|
|
var family uint8
|
|
|
|
if localIP.To4() != nil && remoteIP.To4() != nil {
|
|
|
|
family = unix.AF_INET
|
2017-02-02 23:07:22 +00:00
|
|
|
}
|
2023-09-19 13:05:05 +00:00
|
|
|
|
|
|
|
if family == 0 && localIP.To16() != nil && remoteIP.To16() != nil {
|
|
|
|
family = unix.AF_INET6
|
2017-02-02 23:07:22 +00:00
|
|
|
}
|
2023-09-19 13:05:05 +00:00
|
|
|
|
|
|
|
if family == 0 {
|
2017-02-02 23:07:22 +00:00
|
|
|
return nil, ErrNotImplemented
|
|
|
|
}
|
|
|
|
|
2017-10-20 20:38:07 +00:00
|
|
|
s, err := nl.Subscribe(unix.NETLINK_INET_DIAG)
|
2017-02-02 23:07:22 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
defer s.Close()
|
2023-09-19 13:05:05 +00:00
|
|
|
req := nl.NewNetlinkRequest(nl.SOCK_DIAG_BY_FAMILY, unix.NLM_F_DUMP)
|
2017-02-02 23:07:22 +00:00
|
|
|
req.AddData(&socketRequest{
|
2023-09-19 13:05:05 +00:00
|
|
|
Family: family,
|
|
|
|
Protocol: protocol,
|
|
|
|
States: 0xffffffff,
|
2017-02-02 23:07:22 +00:00
|
|
|
ID: SocketID{
|
2023-09-19 13:05:05 +00:00
|
|
|
SourcePort: localPort,
|
|
|
|
DestinationPort: remotePort,
|
2017-02-02 23:07:22 +00:00
|
|
|
Source: localIP,
|
|
|
|
Destination: remoteIP,
|
|
|
|
Cookie: [2]uint32{nl.TCPDIAG_NOCOOKIE, nl.TCPDIAG_NOCOOKIE},
|
|
|
|
},
|
|
|
|
})
|
2023-09-19 13:05:05 +00:00
|
|
|
|
|
|
|
if err := s.Send(req); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2019-07-15 17:54:20 +00:00
|
|
|
msgs, from, err := s.Receive()
|
2017-02-02 23:07:22 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2019-07-15 17:54:20 +00:00
|
|
|
if from.Pid != nl.PidKernel {
|
2023-11-15 22:05:25 +00:00
|
|
|
return nil, fmt.Errorf("wrong sender portid %d, expected %d", from.Pid, nl.PidKernel)
|
2019-07-15 17:54:20 +00:00
|
|
|
}
|
2017-02-02 23:07:22 +00:00
|
|
|
if len(msgs) == 0 {
|
|
|
|
return nil, errors.New("no message nor error from netlink")
|
|
|
|
}
|
|
|
|
if len(msgs) > 2 {
|
|
|
|
return nil, fmt.Errorf("multiple (%d) matching sockets", len(msgs))
|
|
|
|
}
|
|
|
|
sock := &Socket{}
|
|
|
|
if err := sock.deserialize(msgs[0].Data); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return sock, nil
|
|
|
|
}
|
2020-04-13 14:32:22 +00:00
|
|
|
|
2022-05-18 11:42:13 +00:00
|
|
|
// SocketDestroy kills the Socket identified by its local and remote addresses.
|
|
|
|
func SocketDestroy(local, remote net.Addr) error {
|
|
|
|
localTCP, ok := local.(*net.TCPAddr)
|
|
|
|
if !ok {
|
|
|
|
return ErrNotImplemented
|
|
|
|
}
|
|
|
|
remoteTCP, ok := remote.(*net.TCPAddr)
|
|
|
|
if !ok {
|
|
|
|
return ErrNotImplemented
|
|
|
|
}
|
|
|
|
localIP := localTCP.IP.To4()
|
|
|
|
if localIP == nil {
|
|
|
|
return ErrNotImplemented
|
|
|
|
}
|
|
|
|
remoteIP := remoteTCP.IP.To4()
|
|
|
|
if remoteIP == nil {
|
|
|
|
return ErrNotImplemented
|
|
|
|
}
|
|
|
|
|
|
|
|
s, err := nl.Subscribe(unix.NETLINK_INET_DIAG)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer s.Close()
|
|
|
|
req := nl.NewNetlinkRequest(nl.SOCK_DESTROY, unix.NLM_F_ACK)
|
|
|
|
req.AddData(&socketRequest{
|
|
|
|
Family: unix.AF_INET,
|
|
|
|
Protocol: unix.IPPROTO_TCP,
|
|
|
|
ID: SocketID{
|
|
|
|
SourcePort: uint16(localTCP.Port),
|
|
|
|
DestinationPort: uint16(remoteTCP.Port),
|
|
|
|
Source: localIP,
|
|
|
|
Destination: remoteIP,
|
|
|
|
Cookie: [2]uint32{nl.TCPDIAG_NOCOOKIE, nl.TCPDIAG_NOCOOKIE},
|
|
|
|
},
|
|
|
|
})
|
|
|
|
return s.Send(req)
|
|
|
|
}
|
|
|
|
|
2021-05-27 10:27:05 +00:00
|
|
|
// SocketDiagTCPInfo requests INET_DIAG_INFO for TCP protocol for specified family type and return with extension TCP info.
|
2020-04-13 14:32:22 +00:00
|
|
|
func SocketDiagTCPInfo(family uint8) ([]*InetDiagTCPInfoResp, error) {
|
2023-11-15 14:50:31 +00:00
|
|
|
// Construct the request
|
|
|
|
req := nl.NewNetlinkRequest(nl.SOCK_DIAG_BY_FAMILY, unix.NLM_F_DUMP)
|
|
|
|
req.AddData(&socketRequest{
|
|
|
|
Family: family,
|
|
|
|
Protocol: unix.IPPROTO_TCP,
|
|
|
|
Ext: (1 << (INET_DIAG_VEGASINFO - 1)) | (1 << (INET_DIAG_INFO - 1)),
|
|
|
|
States: uint32(0xfff), // all states
|
|
|
|
})
|
|
|
|
|
|
|
|
// Do the query and parse the result
|
2021-05-27 10:27:05 +00:00
|
|
|
var result []*InetDiagTCPInfoResp
|
2023-11-15 14:50:31 +00:00
|
|
|
err := socketDiagExecutor(req, func(m syscall.NetlinkMessage) error {
|
2021-05-27 10:27:05 +00:00
|
|
|
sockInfo := &Socket{}
|
|
|
|
if err := sockInfo.deserialize(m.Data); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
attrs, err := nl.ParseRouteAttr(m.Data[sizeofSocket:])
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
res, err := attrsToInetDiagTCPInfoResp(attrs, sockInfo)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
result = append(result, res)
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return result, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// SocketDiagTCP requests INET_DIAG_INFO for TCP protocol for specified family type and return related socket.
|
|
|
|
func SocketDiagTCP(family uint8) ([]*Socket, error) {
|
2023-11-15 14:50:31 +00:00
|
|
|
// Construct the request
|
|
|
|
req := nl.NewNetlinkRequest(nl.SOCK_DIAG_BY_FAMILY, unix.NLM_F_DUMP)
|
|
|
|
req.AddData(&socketRequest{
|
|
|
|
Family: family,
|
|
|
|
Protocol: unix.IPPROTO_TCP,
|
|
|
|
Ext: (1 << (INET_DIAG_VEGASINFO - 1)) | (1 << (INET_DIAG_INFO - 1)),
|
|
|
|
States: uint32(0xfff), // all states
|
|
|
|
})
|
|
|
|
|
|
|
|
// Do the query and parse the result
|
2021-05-27 10:27:05 +00:00
|
|
|
var result []*Socket
|
2023-11-15 14:50:31 +00:00
|
|
|
err := socketDiagExecutor(req, func(m syscall.NetlinkMessage) error {
|
2021-05-27 10:27:05 +00:00
|
|
|
sockInfo := &Socket{}
|
|
|
|
if err := sockInfo.deserialize(m.Data); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
result = append(result, sockInfo)
|
|
|
|
return nil
|
|
|
|
})
|
2020-04-13 14:32:22 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2021-05-27 10:27:05 +00:00
|
|
|
return result, nil
|
|
|
|
}
|
|
|
|
|
2023-11-15 14:50:31 +00:00
|
|
|
// SocketDiagUDPInfo requests INET_DIAG_INFO for UDP protocol for specified family type and return with extension info.
|
|
|
|
func SocketDiagUDPInfo(family uint8) ([]*InetDiagUDPInfoResp, error) {
|
|
|
|
// Construct the request
|
|
|
|
var extensions uint8
|
|
|
|
extensions = 1 << (INET_DIAG_VEGASINFO - 1)
|
|
|
|
extensions |= 1 << (INET_DIAG_INFO - 1)
|
|
|
|
extensions |= 1 << (INET_DIAG_MEMINFO - 1)
|
|
|
|
|
|
|
|
req := nl.NewNetlinkRequest(nl.SOCK_DIAG_BY_FAMILY, unix.NLM_F_DUMP)
|
|
|
|
req.AddData(&socketRequest{
|
|
|
|
Family: family,
|
|
|
|
Protocol: unix.IPPROTO_UDP,
|
|
|
|
Ext: extensions,
|
|
|
|
States: uint32(0xfff), // all states
|
|
|
|
})
|
|
|
|
|
|
|
|
// Do the query and parse the result
|
|
|
|
var result []*InetDiagUDPInfoResp
|
|
|
|
err := socketDiagExecutor(req, func(m syscall.NetlinkMessage) error {
|
|
|
|
sockInfo := &Socket{}
|
|
|
|
if err := sockInfo.deserialize(m.Data); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
attrs, err := nl.ParseRouteAttr(m.Data[sizeofSocket:])
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
res, err := attrsToInetDiagUDPInfoResp(attrs, sockInfo)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
result = append(result, res)
|
|
|
|
return nil
|
|
|
|
})
|
2021-05-27 10:27:05 +00:00
|
|
|
if err != nil {
|
2023-11-15 14:50:31 +00:00
|
|
|
return nil, err
|
2021-05-27 10:27:05 +00:00
|
|
|
}
|
2023-11-15 14:50:31 +00:00
|
|
|
return result, nil
|
|
|
|
}
|
2020-04-13 14:32:22 +00:00
|
|
|
|
2023-11-15 14:50:31 +00:00
|
|
|
// SocketDiagUDP requests INET_DIAG_INFO for UDP protocol for specified family type and return related socket.
|
|
|
|
func SocketDiagUDP(family uint8) ([]*Socket, error) {
|
|
|
|
// Construct the request
|
2020-04-13 14:32:22 +00:00
|
|
|
req := nl.NewNetlinkRequest(nl.SOCK_DIAG_BY_FAMILY, unix.NLM_F_DUMP)
|
|
|
|
req.AddData(&socketRequest{
|
|
|
|
Family: family,
|
2023-11-15 14:50:31 +00:00
|
|
|
Protocol: unix.IPPROTO_UDP,
|
2020-10-01 15:56:11 +00:00
|
|
|
Ext: (1 << (INET_DIAG_VEGASINFO - 1)) | (1 << (INET_DIAG_INFO - 1)),
|
2023-11-15 14:50:31 +00:00
|
|
|
States: uint32(0xfff), // all states
|
2020-04-13 14:32:22 +00:00
|
|
|
})
|
2023-11-15 14:50:31 +00:00
|
|
|
|
|
|
|
// Do the query and parse the result
|
|
|
|
var result []*Socket
|
|
|
|
err := socketDiagExecutor(req, func(m syscall.NetlinkMessage) error {
|
|
|
|
sockInfo := &Socket{}
|
|
|
|
if err := sockInfo.deserialize(m.Data); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
result = append(result, sockInfo)
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return result, nil
|
|
|
|
}
|
|
|
|
|
2023-11-15 22:05:25 +00:00
|
|
|
// UnixSocketDiagInfo requests UNIX_DIAG_INFO for unix sockets and return with extension info.
|
|
|
|
func UnixSocketDiagInfo() ([]*UnixDiagInfoResp, error) {
|
|
|
|
// Construct the request
|
|
|
|
var extensions uint8
|
|
|
|
extensions = 1 << UNIX_DIAG_NAME
|
|
|
|
extensions |= 1 << UNIX_DIAG_PEER
|
|
|
|
extensions |= 1 << UNIX_DIAG_RQLEN
|
|
|
|
req := nl.NewNetlinkRequest(nl.SOCK_DIAG_BY_FAMILY, unix.NLM_F_DUMP)
|
|
|
|
req.AddData(&unixSocketRequest{
|
|
|
|
Family: unix.AF_UNIX,
|
|
|
|
States: ^uint32(0), // all states
|
|
|
|
Show: uint32(extensions),
|
|
|
|
})
|
|
|
|
|
|
|
|
var result []*UnixDiagInfoResp
|
|
|
|
err := socketDiagExecutor(req, func(m syscall.NetlinkMessage) error {
|
|
|
|
sockInfo := &UnixSocket{}
|
|
|
|
if err := sockInfo.deserialize(m.Data); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Diagnosis also delivers sockets with AF_INET family, filter those
|
|
|
|
if sockInfo.Family != unix.AF_UNIX {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
attrs, err := nl.ParseRouteAttr(m.Data[sizeofUnixSocket:])
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
res, err := attrsToUnixDiagInfoResp(attrs, sockInfo)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
result = append(result, res)
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return result, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// UnixSocketDiag requests UNIX_DIAG_INFO for unix sockets.
|
|
|
|
func UnixSocketDiag() ([]*UnixSocket, error) {
|
|
|
|
// Construct the request
|
|
|
|
req := nl.NewNetlinkRequest(nl.SOCK_DIAG_BY_FAMILY, unix.NLM_F_DUMP)
|
|
|
|
req.AddData(&unixSocketRequest{
|
|
|
|
Family: unix.AF_UNIX,
|
|
|
|
States: ^uint32(0), // all states
|
|
|
|
})
|
|
|
|
|
|
|
|
var result []*UnixSocket
|
|
|
|
err := socketDiagExecutor(req, func(m syscall.NetlinkMessage) error {
|
|
|
|
sockInfo := &UnixSocket{}
|
|
|
|
if err := sockInfo.deserialize(m.Data); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Diagnosis also delivers sockets with AF_INET family, filter those
|
|
|
|
if sockInfo.Family == unix.AF_UNIX {
|
|
|
|
result = append(result, sockInfo)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return result, nil
|
|
|
|
}
|
|
|
|
|
2023-11-15 14:50:31 +00:00
|
|
|
// socketDiagExecutor requests diagnoses info from the NETLINK_INET_DIAG socket for the specified request.
|
|
|
|
func socketDiagExecutor(req *nl.NetlinkRequest, receiver func(syscall.NetlinkMessage) error) error {
|
|
|
|
s, err := nl.Subscribe(unix.NETLINK_INET_DIAG)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer s.Close()
|
2020-04-13 14:32:22 +00:00
|
|
|
s.Send(req)
|
|
|
|
|
|
|
|
loop:
|
|
|
|
for {
|
|
|
|
msgs, from, err := s.Receive()
|
|
|
|
if err != nil {
|
2021-05-27 10:27:05 +00:00
|
|
|
return err
|
2020-04-13 14:32:22 +00:00
|
|
|
}
|
|
|
|
if from.Pid != nl.PidKernel {
|
2023-11-15 14:50:31 +00:00
|
|
|
return fmt.Errorf("wrong sender portid %d, expected %d", from.Pid, nl.PidKernel)
|
2020-04-13 14:32:22 +00:00
|
|
|
}
|
|
|
|
if len(msgs) == 0 {
|
2021-05-27 10:27:05 +00:00
|
|
|
return errors.New("no message nor error from netlink")
|
2020-04-13 14:32:22 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
for _, m := range msgs {
|
|
|
|
switch m.Header.Type {
|
|
|
|
case unix.NLMSG_DONE:
|
|
|
|
break loop
|
|
|
|
case unix.NLMSG_ERROR:
|
|
|
|
error := int32(native.Uint32(m.Data[0:4]))
|
2021-05-27 10:27:05 +00:00
|
|
|
return syscall.Errno(-error)
|
2020-04-13 14:32:22 +00:00
|
|
|
}
|
2021-05-27 10:27:05 +00:00
|
|
|
if err := receiver(m); err != nil {
|
|
|
|
return err
|
2020-04-13 14:32:22 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2021-05-27 10:27:05 +00:00
|
|
|
return nil
|
2020-04-13 14:32:22 +00:00
|
|
|
}
|
2020-10-01 15:56:11 +00:00
|
|
|
|
|
|
|
func attrsToInetDiagTCPInfoResp(attrs []syscall.NetlinkRouteAttr, sockInfo *Socket) (*InetDiagTCPInfoResp, error) {
|
2023-11-15 14:50:31 +00:00
|
|
|
info := &InetDiagTCPInfoResp{
|
|
|
|
InetDiagMsg: sockInfo,
|
|
|
|
}
|
2020-10-01 15:56:11 +00:00
|
|
|
for _, a := range attrs {
|
2023-11-15 14:50:31 +00:00
|
|
|
switch a.Attr.Type {
|
|
|
|
case INET_DIAG_INFO:
|
|
|
|
info.TCPInfo = &TCPInfo{}
|
|
|
|
if err := info.TCPInfo.deserialize(a.Value); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
case INET_DIAG_BBRINFO:
|
|
|
|
info.TCPBBRInfo = &TCPBBRInfo{}
|
|
|
|
if err := info.TCPBBRInfo.deserialize(a.Value); err != nil {
|
2020-10-01 15:56:11 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
2023-11-15 14:50:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return info, nil
|
|
|
|
}
|
2020-10-01 15:56:11 +00:00
|
|
|
|
2023-11-15 14:50:31 +00:00
|
|
|
func attrsToInetDiagUDPInfoResp(attrs []syscall.NetlinkRouteAttr, sockInfo *Socket) (*InetDiagUDPInfoResp, error) {
|
|
|
|
info := &InetDiagUDPInfoResp{
|
|
|
|
InetDiagMsg: sockInfo,
|
|
|
|
}
|
|
|
|
for _, a := range attrs {
|
|
|
|
switch a.Attr.Type {
|
|
|
|
case INET_DIAG_MEMINFO:
|
|
|
|
info.Memory = &MemInfo{}
|
|
|
|
if err := info.Memory.deserialize(a.Value); err != nil {
|
2020-10-01 15:56:11 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-11-15 14:50:31 +00:00
|
|
|
return info, nil
|
2020-10-01 15:56:11 +00:00
|
|
|
}
|
2023-11-15 22:05:25 +00:00
|
|
|
|
|
|
|
func attrsToUnixDiagInfoResp(attrs []syscall.NetlinkRouteAttr, sockInfo *UnixSocket) (*UnixDiagInfoResp, error) {
|
|
|
|
info := &UnixDiagInfoResp{
|
|
|
|
DiagMsg: sockInfo,
|
|
|
|
}
|
|
|
|
for _, a := range attrs {
|
|
|
|
switch a.Attr.Type {
|
|
|
|
case UNIX_DIAG_NAME:
|
|
|
|
name := string(a.Value[:a.Attr.Len])
|
|
|
|
info.Name = &name
|
|
|
|
case UNIX_DIAG_PEER:
|
|
|
|
peer := native.Uint32(a.Value)
|
|
|
|
info.Peer = &peer
|
|
|
|
case UNIX_DIAG_RQLEN:
|
|
|
|
info.Queue = &QueueInfo{
|
|
|
|
RQueue: native.Uint32(a.Value[:4]),
|
|
|
|
WQueue: native.Uint32(a.Value[4:]),
|
|
|
|
}
|
|
|
|
// default:
|
|
|
|
// fmt.Println("unknown unix attribute type", a.Attr.Type, "with data", a.Value)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return info, nil
|
|
|
|
}
|