summaryrefslogtreecommitdiffstats
path: root/src/libnetdata/maps
diff options
context:
space:
mode:
Diffstat (limited to 'src/libnetdata/maps')
-rw-r--r--src/libnetdata/maps/local-sockets.h1419
-rw-r--r--src/libnetdata/maps/system-groups.h67
-rw-r--r--src/libnetdata/maps/system-services.h92
-rw-r--r--src/libnetdata/maps/system-users.h67
4 files changed, 0 insertions, 1645 deletions
diff --git a/src/libnetdata/maps/local-sockets.h b/src/libnetdata/maps/local-sockets.h
deleted file mode 100644
index 6f2ffd81a..000000000
--- a/src/libnetdata/maps/local-sockets.h
+++ /dev/null
@@ -1,1419 +0,0 @@
-// SPDX-License-Identifier: GPL-3.0-or-later
-
-#ifndef NETDATA_LOCAL_SOCKETS_H
-#define NETDATA_LOCAL_SOCKETS_H
-
-#include "libnetdata/libnetdata.h"
-
-#ifdef HAVE_LIBMNL
-#include <linux/rtnetlink.h>
-#include <linux/inet_diag.h>
-#include <linux/sock_diag.h>
-#include <linux/unix_diag.h>
-#include <linux/netlink.h>
-#include <libmnl/libmnl.h>
-#endif
-
-#define UID_UNSET (uid_t)(UINT32_MAX)
-
-// --------------------------------------------------------------------------------------------------------------------
-// hashtable for keeping the namespaces
-// key and value is the namespace inode
-
-#define SIMPLE_HASHTABLE_VALUE_TYPE uint64_t
-#define SIMPLE_HASHTABLE_NAME _NET_NS
-#include "libnetdata/simple_hashtable.h"
-
-// --------------------------------------------------------------------------------------------------------------------
-// hashtable for keeping the sockets of PIDs
-// key is the inode
-
-struct pid_socket;
-#define SIMPLE_HASHTABLE_VALUE_TYPE struct pid_socket
-#define SIMPLE_HASHTABLE_NAME _PID_SOCKET
-#include "libnetdata/simple_hashtable.h"
-
-// --------------------------------------------------------------------------------------------------------------------
-// hashtable for keeping all the sockets
-// key is the inode
-
-struct local_socket;
-#define SIMPLE_HASHTABLE_VALUE_TYPE struct local_socket
-#define SIMPLE_HASHTABLE_NAME _LOCAL_SOCKET
-#include "libnetdata/simple_hashtable.h"
-
-// --------------------------------------------------------------------------------------------------------------------
-// hashtable for keeping all local IPs
-// key is XXH3_64bits hash of the IP
-
-union ipv46;
-#define SIMPLE_HASHTABLE_VALUE_TYPE union ipv46
-#define SIMPLE_HASHTABLE_NAME _LOCAL_IP
-#include "libnetdata/simple_hashtable.h"
-
-// --------------------------------------------------------------------------------------------------------------------
-// hashtable for keeping all listening ports
-// key is XXH3_64bits hash of the family, protocol, port number, namespace
-
-struct local_port;
-#define SIMPLE_HASHTABLE_VALUE_TYPE struct local_port
-#define SIMPLE_HASHTABLE_NAME _LISTENING_PORT
-#include "libnetdata/simple_hashtable.h"
-
-// --------------------------------------------------------------------------------------------------------------------
-
-struct local_socket_state;
-typedef void (*local_sockets_cb_t)(struct local_socket_state *state, struct local_socket *n, void *data);
-
-struct local_sockets_config {
- bool listening;
- bool inbound;
- bool outbound;
- bool local;
- bool tcp4;
- bool tcp6;
- bool udp4;
- bool udp6;
- bool pid;
- bool cmdline;
- bool comm;
- bool uid;
- bool namespaces;
- bool tcp_info;
-
- size_t max_errors;
- size_t max_concurrent_namespaces;
-
- local_sockets_cb_t cb;
- void *data;
-
- const char *host_prefix;
-
- // internal use
- uint64_t net_ns_inode;
-};
-
-typedef struct local_socket_state {
- struct local_sockets_config config;
-
- struct {
- size_t mnl_sends;
- size_t namespaces_found;
- size_t tcp_info_received;
- size_t pid_fds_processed;
- size_t pid_fds_opendir_failed;
- size_t pid_fds_readlink_failed;
- size_t pid_fds_parse_failed;
- size_t errors_encountered;
- } stats;
-
- bool spawn_server_is_mine;
- SPAWN_SERVER *spawn_server;
-
-#ifdef HAVE_LIBMNL
- bool use_nl;
- struct mnl_socket *nl;
- uint16_t tmp_protocol;
-#endif
-
- ARAL *local_socket_aral;
- ARAL *pid_socket_aral;
- SPINLOCK spinlock; // for namespaces
-
- uint64_t proc_self_net_ns_inode;
-
- SIMPLE_HASHTABLE_NET_NS ns_hashtable;
- SIMPLE_HASHTABLE_PID_SOCKET pid_sockets_hashtable;
- SIMPLE_HASHTABLE_LOCAL_SOCKET sockets_hashtable;
- SIMPLE_HASHTABLE_LOCAL_IP local_ips_hashtable;
- SIMPLE_HASHTABLE_LISTENING_PORT listening_ports_hashtable;
-} LS_STATE;
-
-// --------------------------------------------------------------------------------------------------------------------
-
-typedef enum __attribute__((packed)) {
- SOCKET_DIRECTION_NONE = 0,
- SOCKET_DIRECTION_LISTEN = (1 << 0), // a listening socket
- SOCKET_DIRECTION_INBOUND = (1 << 1), // an inbound socket connecting a remote system to a local listening socket
- SOCKET_DIRECTION_OUTBOUND = (1 << 2), // a socket initiated by this system, connecting to another system
- SOCKET_DIRECTION_LOCAL_INBOUND = (1 << 3), // the socket connecting 2 localhost applications
- SOCKET_DIRECTION_LOCAL_OUTBOUND = (1 << 4), // the socket connecting 2 localhost applications
-} SOCKET_DIRECTION;
-
-#ifndef TASK_COMM_LEN
-#define TASK_COMM_LEN 16
-#endif
-
-struct pid_socket {
- uint64_t inode;
- pid_t pid;
- uid_t uid;
- uint64_t net_ns_inode;
- char *cmdline;
- char comm[TASK_COMM_LEN];
-};
-
-struct local_port {
- uint16_t protocol;
- uint16_t family;
- uint16_t port;
- uint64_t net_ns_inode;
-};
-
-union ipv46 {
- uint32_t ipv4;
- struct in6_addr ipv6;
-};
-
-struct socket_endpoint {
- uint16_t protocol;
- uint16_t family;
- uint16_t port;
- union ipv46 ip;
-};
-
-static inline void ipv6_to_in6_addr(const char *ipv6_str, struct in6_addr *d) {
- char buf[9];
-
- for (size_t k = 0; k < 4; ++k) {
- memcpy(buf, ipv6_str + (k * 8), 8);
- buf[sizeof(buf) - 1] = '\0';
- d->s6_addr32[k] = str2uint32_hex(buf, NULL);
- }
-}
-
-typedef struct local_socket {
- uint64_t inode;
- uint64_t net_ns_inode;
-
- int state;
- struct socket_endpoint local;
- struct socket_endpoint remote;
- pid_t pid;
-
- SOCKET_DIRECTION direction;
-
- uint8_t timer;
- uint8_t retransmits; // the # of packets currently queued for retransmission (not yet acknowledged)
- uint32_t expires;
- uint32_t rqueue;
- uint32_t wqueue;
- uid_t uid;
-
- struct {
- bool checked;
- bool ipv46;
- } ipv6ony;
-
- union {
- struct tcp_info tcp;
- } info;
-
- char comm[TASK_COMM_LEN];
- STRING *cmdline;
-
- struct local_port local_port_key;
-
- XXH64_hash_t local_ip_hash;
- XXH64_hash_t remote_ip_hash;
- XXH64_hash_t local_port_hash;
-
-#ifdef LOCAL_SOCKETS_EXTENDED_MEMBERS
- LOCAL_SOCKETS_EXTENDED_MEMBERS
-#endif
-} LOCAL_SOCKET;
-
-static inline void local_sockets_spawn_server_callback(SPAWN_REQUEST *request);
-
-// --------------------------------------------------------------------------------------------------------------------
-
-static inline void local_sockets_log(LS_STATE *ls, const char *format, ...) PRINTFLIKE(2, 3);
-static inline void local_sockets_log(LS_STATE *ls, const char *format, ...) {
- if(ls && ++ls->stats.errors_encountered == ls->config.max_errors) {
- nd_log(NDLS_COLLECTORS, NDLP_ERR, "LOCAL-SOCKETS: max number of logs reached. Not logging anymore");
- return;
- }
-
- if(ls && ls->stats.errors_encountered > ls->config.max_errors)
- return;
-
- char buf[16384];
- va_list args;
- va_start(args, format);
- vsnprintf(buf, sizeof(buf), format, args);
- va_end(args);
-
- nd_log(NDLS_COLLECTORS, NDLP_ERR, "LOCAL-SOCKETS: %s", buf);
-}
-
-// --------------------------------------------------------------------------------------------------------------------
-
-static bool local_sockets_is_ipv4_mapped_ipv6_address(const struct in6_addr *addr) {
- // An IPv4-mapped IPv6 address starts with 80 bits of zeros followed by 16 bits of ones
- static const unsigned char ipv4_mapped_prefix[12] = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0xFF, 0xFF };
- return memcmp(addr->s6_addr, ipv4_mapped_prefix, 12) == 0;
-}
-
-static bool local_sockets_is_loopback_address(struct socket_endpoint *se) {
- if (se->family == AF_INET) {
- // For IPv4, loopback addresses are in the 127.0.0.0/8 range
- return (ntohl(se->ip.ipv4) >> 24) == 127; // Check if the first byte is 127
- } else if (se->family == AF_INET6) {
- // Check if the address is an IPv4-mapped IPv6 address
- if (local_sockets_is_ipv4_mapped_ipv6_address(&se->ip.ipv6)) {
- // Extract the last 32 bits (IPv4 address) and check if it's in the 127.0.0.0/8 range
- uint8_t *ip6 = (uint8_t *)&se->ip.ipv6;
- const uint32_t ipv4_addr = *((const uint32_t *)(ip6 + 12));
- return (ntohl(ipv4_addr) >> 24) == 127;
- }
-
- // For IPv6, loopback address is ::1
- return memcmp(&se->ip.ipv6, &in6addr_loopback, sizeof(se->ip.ipv6)) == 0;
- }
-
- return false;
-}
-
-static inline bool local_sockets_is_ipv4_reserved_address(uint32_t ip) {
- // Check for the reserved address ranges
- ip = ntohl(ip);
- return (
- (ip >> 24 == 10) || // Private IP range (A class)
- (ip >> 20 == (172 << 4) + 1) || // Private IP range (B class)
- (ip >> 16 == (192 << 8) + 168) || // Private IP range (C class)
- (ip >> 24 == 127) || // Loopback address (127.0.0.0)
- (ip >> 24 == 0) || // Reserved (0.0.0.0)
- (ip >> 24 == 169 && (ip >> 16) == 254) || // Link-local address (169.254.0.0)
- (ip >> 16 == (192 << 8) + 0) // Test-Net (192.0.0.0)
- );
-}
-
-static inline bool local_sockets_is_private_address(struct socket_endpoint *se) {
- if (se->family == AF_INET) {
- return local_sockets_is_ipv4_reserved_address(se->ip.ipv4);
- }
- else if (se->family == AF_INET6) {
- uint8_t *ip6 = (uint8_t *)&se->ip.ipv6;
-
- // Check if the address is an IPv4-mapped IPv6 address
- if (local_sockets_is_ipv4_mapped_ipv6_address(&se->ip.ipv6)) {
- // Extract the last 32 bits (IPv4 address) and check if it's in the 127.0.0.0/8 range
- const uint32_t ipv4_addr = *((const uint32_t *)(ip6 + 12));
- return local_sockets_is_ipv4_reserved_address(ipv4_addr);
- }
-
- // Check for link-local addresses (fe80::/10)
- if ((ip6[0] == 0xFE) && ((ip6[1] & 0xC0) == 0x80))
- return true;
-
- // Check for Unique Local Addresses (ULA) (fc00::/7)
- if ((ip6[0] & 0xFE) == 0xFC)
- return true;
-
- // Check for multicast addresses (ff00::/8)
- if (ip6[0] == 0xFF)
- return true;
-
- // For IPv6, loopback address is :: or ::1
- return memcmp(&se->ip.ipv6, &in6addr_any, sizeof(se->ip.ipv6)) == 0 ||
- memcmp(&se->ip.ipv6, &in6addr_loopback, sizeof(se->ip.ipv6)) == 0;
- }
-
- return false;
-}
-
-static bool local_sockets_is_multicast_address(struct socket_endpoint *se) {
- if (se->family == AF_INET) {
- // For IPv4, check if the address is 0.0.0.0
- uint32_t ip = htonl(se->ip.ipv4);
- return (ip >= 0xE0000000 && ip <= 0xEFFFFFFF); // Multicast address range (224.0.0.0/4)
- }
- else if (se->family == AF_INET6) {
- // For IPv6, check if the address is ff00::/8
- uint8_t *ip6 = (uint8_t *)&se->ip.ipv6;
- return ip6[0] == 0xff;
- }
-
- return false;
-}
-
-static bool local_sockets_is_zero_address(struct socket_endpoint *se) {
- if (se->family == AF_INET) {
- // For IPv4, check if the address is 0.0.0.0
- return se->ip.ipv4 == 0;
- }
- else if (se->family == AF_INET6) {
- // For IPv6, check if the address is ::
- return memcmp(&se->ip.ipv6, &in6addr_any, sizeof(se->ip.ipv6)) == 0;
- }
-
- return false;
-}
-
-static inline const char *local_sockets_address_space(struct socket_endpoint *se) {
- if(local_sockets_is_zero_address(se))
- return "zero";
- else if(local_sockets_is_loopback_address(se))
- return "loopback";
- else if(local_sockets_is_multicast_address(se))
- return "multicast";
- else if(local_sockets_is_private_address(se))
- return "private";
- else
- return "public";
-}
-
-// --------------------------------------------------------------------------------------------------------------------
-
-static inline bool is_local_socket_ipv46(LOCAL_SOCKET *n) {
- return n->local.family == AF_INET6 &&
- n->direction == SOCKET_DIRECTION_LISTEN &&
- local_sockets_is_zero_address(&n->local) &&
- n->ipv6ony.checked &&
- n->ipv6ony.ipv46;
-}
-
-// --------------------------------------------------------------------------------------------------------------------
-
-static void local_sockets_foreach_local_socket_call_cb(LS_STATE *ls) {
- for(SIMPLE_HASHTABLE_SLOT_LOCAL_SOCKET *sl = simple_hashtable_first_read_only_LOCAL_SOCKET(&ls->sockets_hashtable);
- sl;
- sl = simple_hashtable_next_read_only_LOCAL_SOCKET(&ls->sockets_hashtable, sl)) {
- LOCAL_SOCKET *n = SIMPLE_HASHTABLE_SLOT_DATA(sl);
- if(!n) continue;
-
- if((ls->config.listening && n->direction & SOCKET_DIRECTION_LISTEN) ||
- (ls->config.local && n->direction & (SOCKET_DIRECTION_LOCAL_INBOUND|SOCKET_DIRECTION_LOCAL_OUTBOUND)) ||
- (ls->config.inbound && n->direction & SOCKET_DIRECTION_INBOUND) ||
- (ls->config.outbound && n->direction & SOCKET_DIRECTION_OUTBOUND)
- ) {
- // we have to call the callback for this socket
- if (ls->config.cb)
- ls->config.cb(ls, n, ls->config.data);
- }
- }
-}
-
-// --------------------------------------------------------------------------------------------------------------------
-
-static inline void local_sockets_fix_cmdline(char* str) {
- char *s = str;
-
- // map invalid characters to underscores
- while(*s) {
- if(*s == '|' || iscntrl(*s)) *s = '_';
- s++;
- }
-}
-
-// --------------------------------------------------------------------------------------------------------------------
-
-static inline bool
-local_sockets_read_proc_inode_link(LS_STATE *ls, const char *filename, uint64_t *inode, const char *type) {
- char link_target[FILENAME_MAX + 1];
-
- *inode = 0;
-
- ssize_t len = readlink(filename, link_target, sizeof(link_target) - 1);
- if (len == -1) {
- local_sockets_log(ls, "cannot read '%s' link '%s'", type, filename);
-
- ls->stats.pid_fds_readlink_failed++;
- return false;
- }
- link_target[len] = '\0';
-
- len = strlen(type);
- if(strncmp(link_target, type, len) == 0 && link_target[len] == ':' && link_target[len + 1] == '[' && isdigit(link_target[len + 2])) {
- *inode = strtoull(&link_target[len + 2], NULL, 10);
- // ll_log(ls, "read link of type '%s' '%s' from '%s', inode = %"PRIu64, type, link_target, filename, *inode);
- return true;
- }
- else {
- // ll_log(ls, "cannot read '%s' link '%s' from '%s'", type, link_target, filename);
- ls->stats.pid_fds_processed++;
- return false;
- }
-}
-
-static inline bool local_sockets_is_path_a_pid(const char *s) {
- if(!s || !*s) return false;
-
- while(*s) {
- if(!isdigit(*s++))
- return false;
- }
-
- return true;
-}
-
-static inline bool local_sockets_find_all_sockets_in_proc(LS_STATE *ls, const char *proc_filename) {
- DIR *proc_dir;
- struct dirent *proc_entry;
- char filename[FILENAME_MAX + 1];
- char comm[TASK_COMM_LEN];
- char cmdline[8192];
- const char *cmdline_trimmed;
- uint64_t net_ns_inode;
-
- proc_dir = opendir(proc_filename);
- if (proc_dir == NULL) {
- local_sockets_log(ls, "cannot opendir() '%s'", proc_filename);
- ls->stats.pid_fds_readlink_failed++;
- return false;
- }
-
- while ((proc_entry = readdir(proc_dir)) != NULL) {
- if(proc_entry->d_type != DT_DIR)
- continue;
-
- if(!strcmp(proc_entry->d_name, ".") || !strcmp(proc_entry->d_name, ".."))
- continue;
-
- if(!local_sockets_is_path_a_pid(proc_entry->d_name))
- continue;
-
- // Build the path to the fd directory of the process
- snprintfz(filename, FILENAME_MAX, "%s/%s/fd/", proc_filename, proc_entry->d_name);
- DIR *fd_dir = opendir(filename);
- if (fd_dir == NULL) {
- local_sockets_log(ls, "cannot opendir() '%s'", filename);
- ls->stats.pid_fds_opendir_failed++;
- continue;
- }
-
- comm[0] = '\0';
- cmdline[0] = '\0';
- cmdline_trimmed = NULL;
- pid_t pid = (pid_t)strtoul(proc_entry->d_name, NULL, 10);
- if(!pid) {
- local_sockets_log(ls, "cannot parse pid of '%s'", proc_entry->d_name);
- closedir(fd_dir);
- continue;
- }
- net_ns_inode = 0;
- uid_t uid = UID_UNSET;
-
- struct dirent *fd_entry;
- while ((fd_entry = readdir(fd_dir)) != NULL) {
- if(fd_entry->d_type != DT_LNK)
- continue;
-
- snprintfz(filename, sizeof(filename), "%s/%s/fd/%s", proc_filename, proc_entry->d_name, fd_entry->d_name);
- uint64_t inode = 0;
- if(!local_sockets_read_proc_inode_link(ls, filename, &inode, "socket"))
- continue;
-
- SIMPLE_HASHTABLE_SLOT_PID_SOCKET *sl = simple_hashtable_get_slot_PID_SOCKET(&ls->pid_sockets_hashtable, inode, &inode, true);
- struct pid_socket *ps = SIMPLE_HASHTABLE_SLOT_DATA(sl);
- if(!ps || (ps->pid == 1 && pid != 1)) {
- if(uid == UID_UNSET && ls->config.uid) {
- char status_buf[512];
- snprintfz(filename, sizeof(filename), "%s/%s/status", proc_filename, proc_entry->d_name);
- if (read_txt_file(filename, status_buf, sizeof(status_buf)))
- local_sockets_log(ls, "cannot open file: %s\n", filename);
- else {
- char *u = strstr(status_buf, "Uid:");
- if(u) {
- u += 4;
- while(isspace(*u)) u++; // skip spaces
- while(*u >= '0' && *u <= '9') u++; // skip the first number (real uid)
- while(isspace(*u)) u++; // skip spaces again
- uid = strtol(u, NULL, 10); // parse the 2nd number (effective uid)
- }
- }
- }
- if(!comm[0] && ls->config.comm) {
- snprintfz(filename, sizeof(filename), "%s/%s/comm", proc_filename, proc_entry->d_name);
- if (read_txt_file(filename, comm, sizeof(comm)))
- local_sockets_log(ls, "cannot open file: %s\n", filename);
- else {
- size_t clen = strlen(comm);
- if(comm[clen - 1] == '\n')
- comm[clen - 1] = '\0';
- }
- }
- if(!cmdline[0] && ls->config.cmdline) {
- snprintfz(filename, sizeof(filename), "%s/%s/cmdline", proc_filename, proc_entry->d_name);
- if (read_proc_cmdline(filename, cmdline, sizeof(cmdline)))
- local_sockets_log(ls, "cannot open file: %s\n", filename);
- else {
- local_sockets_fix_cmdline(cmdline);
- cmdline_trimmed = trim(cmdline);
- }
- }
- if(!net_ns_inode && ls->config.namespaces) {
- snprintfz(filename, sizeof(filename), "%s/%s/ns/net", proc_filename, proc_entry->d_name);
- if(local_sockets_read_proc_inode_link(ls, filename, &net_ns_inode, "net")) {
- SIMPLE_HASHTABLE_SLOT_NET_NS *sl_ns = simple_hashtable_get_slot_NET_NS(&ls->ns_hashtable, net_ns_inode, (uint64_t *)net_ns_inode, true);
- simple_hashtable_set_slot_NET_NS(&ls->ns_hashtable, sl_ns, net_ns_inode, (uint64_t *)net_ns_inode);
- }
- }
-
- if(!ps)
- ps = aral_callocz(ls->pid_socket_aral);
-
- ps->inode = inode;
- ps->pid = pid;
- ps->uid = uid;
- ps->net_ns_inode = net_ns_inode;
- strncpyz(ps->comm, comm, sizeof(ps->comm) - 1);
-
- if(ps->cmdline)
- freez(ps->cmdline);
-
- ps->cmdline = cmdline_trimmed ? strdupz(cmdline_trimmed) : NULL;
- simple_hashtable_set_slot_PID_SOCKET(&ls->pid_sockets_hashtable, sl, inode, ps);
- }
- }
-
- closedir(fd_dir);
- }
-
- closedir(proc_dir);
- return true;
-}
-
-// --------------------------------------------------------------------------------------------------------------------
-
-static inline void local_sockets_index_listening_port(LS_STATE *ls, LOCAL_SOCKET *n) {
- if(n->direction & SOCKET_DIRECTION_LISTEN) {
- // for the listening sockets, keep a hashtable with all the local ports
- // so that we will be able to detect INBOUND sockets
-
- SIMPLE_HASHTABLE_SLOT_LISTENING_PORT *sl_port =
- simple_hashtable_get_slot_LISTENING_PORT(&ls->listening_ports_hashtable, n->local_port_hash, &n->local_port_key, true);
-
- struct local_port *port = SIMPLE_HASHTABLE_SLOT_DATA(sl_port);
- if(!port)
- simple_hashtable_set_slot_LISTENING_PORT(&ls->listening_ports_hashtable, sl_port, n->local_port_hash, &n->local_port_key);
- }
-}
-
-static inline bool local_sockets_add_socket(LS_STATE *ls, LOCAL_SOCKET *tmp) {
- if(!tmp->inode) return false;
-
- SIMPLE_HASHTABLE_SLOT_LOCAL_SOCKET *sl = simple_hashtable_get_slot_LOCAL_SOCKET(&ls->sockets_hashtable, tmp->inode, &tmp->inode, true);
- LOCAL_SOCKET *n = SIMPLE_HASHTABLE_SLOT_DATA(sl);
- if(n) {
- local_sockets_log(ls, "inode %" PRIu64" already exists in hashtable - ignoring duplicate", tmp->inode);
- return false;
- }
-
- n = aral_mallocz(ls->local_socket_aral);
- *n = *tmp; // copy all contents
-
- // fix the key
- n->local_port_key.port = n->local.port;
- n->local_port_key.family = n->local.family;
- n->local_port_key.protocol = n->local.protocol;
- n->local_port_key.net_ns_inode = ls->proc_self_net_ns_inode;
-
- n->local_ip_hash = XXH3_64bits(&n->local.ip, sizeof(n->local.ip));
- n->remote_ip_hash = XXH3_64bits(&n->remote.ip, sizeof(n->remote.ip));
- n->local_port_hash = XXH3_64bits(&n->local_port_key, sizeof(n->local_port_key));
-
- // --- look up a pid for it -----------------------------------------------------------------------------------
-
- SIMPLE_HASHTABLE_SLOT_PID_SOCKET *sl_pid = simple_hashtable_get_slot_PID_SOCKET(&ls->pid_sockets_hashtable, n->inode, &n->inode, false);
- struct pid_socket *ps = SIMPLE_HASHTABLE_SLOT_DATA(sl_pid);
- if(ps) {
- n->net_ns_inode = ps->net_ns_inode;
- n->pid = ps->pid;
-
- if(ps->uid != UID_UNSET && n->uid == UID_UNSET)
- n->uid = ps->uid;
-
- if(ps->cmdline)
- n->cmdline = string_strdupz(ps->cmdline);
-
- strncpyz(n->comm, ps->comm, sizeof(n->comm) - 1);
- }
-
- // --- index it -----------------------------------------------------------------------------------------------
-
- simple_hashtable_set_slot_LOCAL_SOCKET(&ls->sockets_hashtable, sl, n->inode, n);
-
- if(!local_sockets_is_zero_address(&n->local)) {
- // put all the local IPs into the local_ips hashtable
- // so, we learn all local IPs the system has
-
- SIMPLE_HASHTABLE_SLOT_LOCAL_IP *sl_ip =
- simple_hashtable_get_slot_LOCAL_IP(&ls->local_ips_hashtable, n->local_ip_hash, &n->local.ip, true);
-
- union ipv46 *ip = SIMPLE_HASHTABLE_SLOT_DATA(sl_ip);
- if(!ip)
- simple_hashtable_set_slot_LOCAL_IP(&ls->local_ips_hashtable, sl_ip, n->local_ip_hash, &n->local.ip);
- }
-
- // --- 1st phase for direction detection ----------------------------------------------------------------------
-
- if((n->local.protocol == IPPROTO_TCP && n->state == TCP_LISTEN) ||
- local_sockets_is_zero_address(&n->local) ||
- local_sockets_is_zero_address(&n->remote)) {
- // the socket is either in a TCP LISTEN, or
- // the remote address is zero
- n->direction |= SOCKET_DIRECTION_LISTEN;
- }
- else {
- // we can't say yet if it is inbound or outboud
- // so, mark it as both inbound and outbound
- n->direction |= SOCKET_DIRECTION_INBOUND | SOCKET_DIRECTION_OUTBOUND;
- }
-
- // --- index it in LISTENING_PORT -----------------------------------------------------------------------------
-
- local_sockets_index_listening_port(ls, n);
-
- return true;
-}
-
-#ifdef HAVE_LIBMNL
-
-static inline void local_sockets_libmnl_init(LS_STATE *ls) {
- ls->nl = mnl_socket_open(NETLINK_INET_DIAG);
- if (ls->nl == NULL) {
- local_sockets_log(ls, "cannot open libmnl netlink socket");
- ls->use_nl = false;
- }
- else if (mnl_socket_bind(ls->nl, 0, MNL_SOCKET_AUTOPID) < 0) {
- local_sockets_log(ls, "cannot bind libmnl netlink socket");
- mnl_socket_close(ls->nl);
- ls->nl = NULL;
- ls->use_nl = false;
- }
- else
- ls->use_nl = true;
-}
-
-static inline void local_sockets_libmnl_cleanup(LS_STATE *ls) {
- if(ls->nl) {
- mnl_socket_close(ls->nl);
- ls->nl = NULL;
- ls->use_nl = false;
- }
-}
-
-static inline int local_sockets_libmnl_cb_data(const struct nlmsghdr *nlh, void *data) {
- LS_STATE *ls = data;
-
- struct inet_diag_msg *diag_msg = mnl_nlmsg_get_payload(nlh);
-
- LOCAL_SOCKET n = {
- .inode = diag_msg->idiag_inode,
- .direction = SOCKET_DIRECTION_NONE,
- .state = diag_msg->idiag_state,
- .ipv6ony = {
- .checked = false,
- .ipv46 = false,
- },
- .local = {
- .protocol = ls->tmp_protocol,
- .family = diag_msg->idiag_family,
- .port = ntohs(diag_msg->id.idiag_sport),
- },
- .remote = {
- .protocol = ls->tmp_protocol,
- .family = diag_msg->idiag_family,
- .port = ntohs(diag_msg->id.idiag_dport),
- },
- .timer = diag_msg->idiag_timer,
- .retransmits = diag_msg->idiag_retrans,
- .expires = diag_msg->idiag_expires,
- .rqueue = diag_msg->idiag_rqueue,
- .wqueue = diag_msg->idiag_wqueue,
- .uid = diag_msg->idiag_uid,
- };
-
- if (diag_msg->idiag_family == AF_INET) {
- memcpy(&n.local.ip.ipv4, diag_msg->id.idiag_src, sizeof(n.local.ip.ipv4));
- memcpy(&n.remote.ip.ipv4, diag_msg->id.idiag_dst, sizeof(n.remote.ip.ipv4));
- }
- else if (diag_msg->idiag_family == AF_INET6) {
- memcpy(&n.local.ip.ipv6, diag_msg->id.idiag_src, sizeof(n.local.ip.ipv6));
- memcpy(&n.remote.ip.ipv6, diag_msg->id.idiag_dst, sizeof(n.remote.ip.ipv6));
- }
-
- struct rtattr *attr = (struct rtattr *)(diag_msg + 1);
- int rtattrlen = nlh->nlmsg_len - NLMSG_LENGTH(sizeof(*diag_msg));
- for (; !n.ipv6ony.checked && RTA_OK(attr, rtattrlen); attr = RTA_NEXT(attr, rtattrlen)) {
- switch (attr->rta_type) {
- case INET_DIAG_INFO: {
- if(ls->tmp_protocol == IPPROTO_TCP) {
- struct tcp_info *info = (struct tcp_info *)RTA_DATA(attr);
- n.info.tcp = *info;
- ls->stats.tcp_info_received++;
- }
- }
- break;
-
- case INET_DIAG_SKV6ONLY: {
- n.ipv6ony.checked = true;
- int ipv6only = *(int *)RTA_DATA(attr);
- n.ipv6ony.ipv46 = !ipv6only;
- }
- break;
-
- default:
- break;
- }
- }
-
- local_sockets_add_socket(ls, &n);
-
- return MNL_CB_OK;
-}
-
-static inline bool local_sockets_libmnl_get_sockets(LS_STATE *ls, uint16_t family, uint16_t protocol) {
- ls->tmp_protocol = protocol;
-
- char buf[MNL_SOCKET_BUFFER_SIZE];
- struct nlmsghdr *nlh;
- struct inet_diag_req_v2 req;
- unsigned int seq, portid = mnl_socket_get_portid(ls->nl);
-
- memset(&req, 0, sizeof(req));
- req.sdiag_family = family;
- req.sdiag_protocol = protocol;
- req.idiag_states = -1;
- req.idiag_ext = 0;
-
- if(family == AF_INET6)
- req.idiag_ext |= 1 << (INET_DIAG_SKV6ONLY - 1);
-
- if(protocol == IPPROTO_TCP && ls->config.tcp_info)
- req.idiag_ext |= 1 << (INET_DIAG_INFO - 1);
-
- nlh = mnl_nlmsg_put_header(buf);
- nlh->nlmsg_type = SOCK_DIAG_BY_FAMILY;
- nlh->nlmsg_flags = NLM_F_ROOT | NLM_F_MATCH | NLM_F_REQUEST;
- nlh->nlmsg_seq = seq = time(NULL);
- mnl_nlmsg_put_extra_header(nlh, sizeof(req));
- memcpy(mnl_nlmsg_get_payload(nlh), &req, sizeof(req));
-
- ls->stats.mnl_sends++;
- if (mnl_socket_sendto(ls->nl, nlh, nlh->nlmsg_len) < 0) {
- local_sockets_log(ls, "mnl_socket_send failed");
- return false;
- }
-
- ssize_t ret;
- while ((ret = mnl_socket_recvfrom(ls->nl, buf, sizeof(buf))) > 0) {
- ret = mnl_cb_run(buf, ret, seq, portid, local_sockets_libmnl_cb_data, ls);
- if (ret <= MNL_CB_STOP)
- break;
- }
- if (ret == -1) {
- local_sockets_log(ls, "mnl_socket_recvfrom");
- return false;
- }
-
- return true;
-}
-#endif // HAVE_LIBMNL
-
-static inline bool local_sockets_read_proc_net_x(LS_STATE *ls, const char *filename, uint16_t family, uint16_t protocol) {
- static bool is_space[256] = {
- [':'] = true,
- [' '] = true,
- };
-
- if(family != AF_INET && family != AF_INET6)
- return false;
-
- FILE *fp = fopen(filename, "r");
- if (fp == NULL)
- return false;
-
- char *line = malloc(1024); // no mallocz() here because getline() may resize
- if(!line) {
- fclose(fp);
- return false;
- }
-
- size_t len = 1024;
- ssize_t read;
-
- ssize_t min_line_length = (family == AF_INET) ? 105 : 155;
- size_t counter = 0;
-
- // Read line by line
- while ((read = getline(&line, &len, fp)) != -1) {
- if(counter++ == 0) continue; // skip the first line
-
- if(read < min_line_length) {
- local_sockets_log(ls, "too small line No %zu of filename '%s': %s", counter, filename, line);
- continue;
- }
-
- LOCAL_SOCKET n = {
- .direction = SOCKET_DIRECTION_NONE,
- .ipv6ony = {
- .checked = false,
- .ipv46 = false,
- },
- .local = {
- .family = family,
- .protocol = protocol,
- },
- .remote = {
- .family = family,
- .protocol = protocol,
- },
- .uid = UID_UNSET,
- };
-
- char *words[32];
- size_t num_words = quoted_strings_splitter(line, words, 32, is_space);
- // char *sl_txt = get_word(words, num_words, 0);
- char *local_ip_txt = get_word(words, num_words, 1);
- char *local_port_txt = get_word(words, num_words, 2);
- char *remote_ip_txt = get_word(words, num_words, 3);
- char *remote_port_txt = get_word(words, num_words, 4);
- char *state_txt = get_word(words, num_words, 5);
- char *tx_queue_txt = get_word(words, num_words, 6);
- char *rx_queue_txt = get_word(words, num_words, 7);
- char *tr_txt = get_word(words, num_words, 8);
- char *tm_when_txt = get_word(words, num_words, 9);
- char *retrans_txt = get_word(words, num_words, 10);
- char *uid_txt = get_word(words, num_words, 11);
- // char *timeout_txt = get_word(words, num_words, 12);
- char *inode_txt = get_word(words, num_words, 13);
-
- if(!local_ip_txt || !local_port_txt || !remote_ip_txt || !remote_port_txt || !state_txt ||
- !tx_queue_txt || !rx_queue_txt || !tr_txt || !tm_when_txt || !retrans_txt || !uid_txt || !inode_txt) {
- local_sockets_log(ls, "cannot parse ipv4 line No %zu of filename '%s'", counter, filename);
- continue;
- }
-
- n.local.port = str2uint32_hex(local_port_txt, NULL);
- n.remote.port = str2uint32_hex(remote_port_txt, NULL);
- n.state = str2uint32_hex(state_txt, NULL);
- n.wqueue = str2uint32_hex(tx_queue_txt, NULL);
- n.rqueue = str2uint32_hex(rx_queue_txt, NULL);
- n.timer = str2uint32_hex(tr_txt, NULL);
- n.expires = str2uint32_hex(tm_when_txt, NULL);
- n.retransmits = str2uint32_hex(retrans_txt, NULL);
- n.uid = str2uint32_t(uid_txt, NULL);
- n.inode = str2uint64_t(inode_txt, NULL);
-
- if(family == AF_INET) {
- n.local.ip.ipv4 = str2uint32_hex(local_ip_txt, NULL);
- n.remote.ip.ipv4 = str2uint32_hex(remote_ip_txt, NULL);
- }
- else if(family == AF_INET6) {
- ipv6_to_in6_addr(local_ip_txt, &n.local.ip.ipv6);
- ipv6_to_in6_addr(remote_ip_txt, &n.remote.ip.ipv6);
- }
-
- local_sockets_add_socket(ls, &n);
- }
-
- fclose(fp);
-
- if (line)
- free(line); // no freez() here because getline() may resize
-
- return true;
-}
-
-// --------------------------------------------------------------------------------------------------------------------
-
-static inline void local_sockets_detect_directions(LS_STATE *ls) {
- for(SIMPLE_HASHTABLE_SLOT_LOCAL_SOCKET *sl = simple_hashtable_first_read_only_LOCAL_SOCKET(&ls->sockets_hashtable);
- sl ;
- sl = simple_hashtable_next_read_only_LOCAL_SOCKET(&ls->sockets_hashtable, sl)) {
- LOCAL_SOCKET *n = SIMPLE_HASHTABLE_SLOT_DATA(sl);
- if (!n) continue;
-
- if ((n->direction & (SOCKET_DIRECTION_INBOUND|SOCKET_DIRECTION_OUTBOUND)) !=
- (SOCKET_DIRECTION_INBOUND|SOCKET_DIRECTION_OUTBOUND))
- continue;
-
- // check if the local port is one of our listening ports
- {
- SIMPLE_HASHTABLE_SLOT_LISTENING_PORT *sl_port =
- simple_hashtable_get_slot_LISTENING_PORT(&ls->listening_ports_hashtable, n->local_port_hash, &n->local_port_key, false);
-
- struct local_port *port = SIMPLE_HASHTABLE_SLOT_DATA(sl_port); // do not reference this pointer - is invalid
- if(port) {
- // the local port of this socket is a port we listen to
- n->direction &= ~SOCKET_DIRECTION_OUTBOUND;
- }
- else
- n->direction &= ~SOCKET_DIRECTION_INBOUND;
- }
-
- // check if the remote IP is one of our local IPs
- {
- SIMPLE_HASHTABLE_SLOT_LOCAL_IP *sl_ip =
- simple_hashtable_get_slot_LOCAL_IP(&ls->local_ips_hashtable, n->remote_ip_hash, &n->remote.ip, false);
-
- union ipv46 *d = SIMPLE_HASHTABLE_SLOT_DATA(sl_ip);
- if (d) {
- // the remote IP of this socket is one of our local IPs
- if(n->direction & SOCKET_DIRECTION_INBOUND) {
- n->direction &= ~SOCKET_DIRECTION_INBOUND;
- n->direction |= SOCKET_DIRECTION_LOCAL_INBOUND;
- }
- else if(n->direction & SOCKET_DIRECTION_OUTBOUND) {
- n->direction &= ~SOCKET_DIRECTION_OUTBOUND;
- n->direction |= SOCKET_DIRECTION_LOCAL_OUTBOUND;
- }
- continue;
- }
- }
-
- if (local_sockets_is_loopback_address(&n->local) ||
- local_sockets_is_loopback_address(&n->remote)) {
- // both IP addresses are loopback
- if(n->direction & SOCKET_DIRECTION_INBOUND) {
- n->direction &= ~SOCKET_DIRECTION_INBOUND;
- n->direction |= SOCKET_DIRECTION_LOCAL_INBOUND;
- }
- else if(n->direction & SOCKET_DIRECTION_OUTBOUND) {
- n->direction &= ~SOCKET_DIRECTION_OUTBOUND;
- n->direction |= SOCKET_DIRECTION_LOCAL_OUTBOUND;
- }
- }
- }
-}
-
-// --------------------------------------------------------------------------------------------------------------------
-
-static inline void local_sockets_init(LS_STATE *ls) {
- ls->config.host_prefix = netdata_configured_host_prefix;
-
- spinlock_init(&ls->spinlock);
-
- simple_hashtable_init_NET_NS(&ls->ns_hashtable, 1024);
- simple_hashtable_init_PID_SOCKET(&ls->pid_sockets_hashtable, 65535);
- simple_hashtable_init_LOCAL_SOCKET(&ls->sockets_hashtable, 65535);
- simple_hashtable_init_LOCAL_IP(&ls->local_ips_hashtable, 4096);
- simple_hashtable_init_LISTENING_PORT(&ls->listening_ports_hashtable, 4096);
-
- ls->local_socket_aral = aral_create(
- "local-sockets",
- sizeof(LOCAL_SOCKET),
- 65536,
- 65536,
- NULL, NULL, NULL, false, true);
-
- ls->pid_socket_aral = aral_create(
- "pid-sockets",
- sizeof(struct pid_socket),
- 65536,
- 65536,
- NULL, NULL, NULL, false, true);
-
- memset(&ls->stats, 0, sizeof(ls->stats));
-
-#ifdef HAVE_LIBMNL
- ls->use_nl = false;
- ls->nl = NULL;
- ls->tmp_protocol = 0;
- local_sockets_libmnl_init(ls);
-#endif
-
- if(ls->config.namespaces && ls->spawn_server == NULL) {
- ls->spawn_server = spawn_server_create(SPAWN_SERVER_OPTION_CALLBACK, NULL, local_sockets_spawn_server_callback, 0, NULL);
- ls->spawn_server_is_mine = true;
- }
- else
- ls->spawn_server_is_mine = false;
-}
-
-static inline void local_sockets_cleanup(LS_STATE *ls) {
-
- if(ls->spawn_server_is_mine) {
- spawn_server_destroy(ls->spawn_server);
- ls->spawn_server = NULL;
- ls->spawn_server_is_mine = false;
- }
-
-#ifdef HAVE_LIBMNL
- local_sockets_libmnl_cleanup(ls);
-#endif
-
- // free the sockets hashtable data
- for(SIMPLE_HASHTABLE_SLOT_LOCAL_SOCKET *sl = simple_hashtable_first_read_only_LOCAL_SOCKET(&ls->sockets_hashtable);
- sl;
- sl = simple_hashtable_next_read_only_LOCAL_SOCKET(&ls->sockets_hashtable, sl)) {
- LOCAL_SOCKET *n = SIMPLE_HASHTABLE_SLOT_DATA(sl);
- if(!n) continue;
-
- string_freez(n->cmdline);
- aral_freez(ls->local_socket_aral, n);
- }
-
- // free the pid_socket hashtable data
- for(SIMPLE_HASHTABLE_SLOT_PID_SOCKET *sl = simple_hashtable_first_read_only_PID_SOCKET(&ls->pid_sockets_hashtable);
- sl;
- sl = simple_hashtable_next_read_only_PID_SOCKET(&ls->pid_sockets_hashtable, sl)) {
- struct pid_socket *ps = SIMPLE_HASHTABLE_SLOT_DATA(sl);
- if(!ps) continue;
-
- freez(ps->cmdline);
- aral_freez(ls->pid_socket_aral, ps);
- }
-
- // free the hashtable
- simple_hashtable_destroy_NET_NS(&ls->ns_hashtable);
- simple_hashtable_destroy_PID_SOCKET(&ls->pid_sockets_hashtable);
- simple_hashtable_destroy_LISTENING_PORT(&ls->listening_ports_hashtable);
- simple_hashtable_destroy_LOCAL_IP(&ls->local_ips_hashtable);
- simple_hashtable_destroy_LOCAL_SOCKET(&ls->sockets_hashtable);
-
- aral_destroy(ls->local_socket_aral);
- aral_destroy(ls->pid_socket_aral);
-}
-
-// --------------------------------------------------------------------------------------------------------------------
-
-static inline void local_sockets_do_family_protocol(LS_STATE *ls, const char *filename, uint16_t family, uint16_t protocol) {
-#ifdef HAVE_LIBMNL
- if(ls->nl && ls->use_nl) {
- ls->use_nl = local_sockets_libmnl_get_sockets(ls, family, protocol);
-
- if(ls->use_nl)
- return;
- }
-#endif
-
- local_sockets_read_proc_net_x(ls, filename, family, protocol);
-}
-
-static inline void local_sockets_read_all_system_sockets(LS_STATE *ls) {
- char path[FILENAME_MAX + 1];
-
- if(ls->config.namespaces) {
- snprintfz(path, sizeof(path), "%s/proc/self/ns/net", ls->config.host_prefix);
- local_sockets_read_proc_inode_link(ls, path, &ls->proc_self_net_ns_inode, "net");
- }
-
- if(ls->config.cmdline || ls->config.comm || ls->config.pid || ls->config.namespaces) {
- snprintfz(path, sizeof(path), "%s/proc", ls->config.host_prefix);
- local_sockets_find_all_sockets_in_proc(ls, path);
- }
-
- if(ls->config.tcp4) {
- snprintfz(path, sizeof(path), "%s/proc/net/tcp", ls->config.host_prefix);
- local_sockets_do_family_protocol(ls, path, AF_INET, IPPROTO_TCP);
- }
-
- if(ls->config.udp4) {
- snprintfz(path, sizeof(path), "%s/proc/net/udp", ls->config.host_prefix);
- local_sockets_do_family_protocol(ls, path, AF_INET, IPPROTO_UDP);
- }
-
- if(ls->config.tcp6) {
- snprintfz(path, sizeof(path), "%s/proc/net/tcp6", ls->config.host_prefix);
- local_sockets_do_family_protocol(ls, path, AF_INET6, IPPROTO_TCP);
- }
-
- if(ls->config.udp6) {
- snprintfz(path, sizeof(path), "%s/proc/net/udp6", ls->config.host_prefix);
- local_sockets_do_family_protocol(ls, path, AF_INET6, IPPROTO_UDP);
- }
-}
-
-// --------------------------------------------------------------------------------------------------------------------
-
-struct local_sockets_child_work {
- int fd;
- uint64_t net_ns_inode;
-};
-
-static inline void local_sockets_send_to_parent(struct local_socket_state *ls __maybe_unused, struct local_socket *n, void *data) {
- struct local_sockets_child_work *cw = data;
- int fd = cw->fd;
-
- if(n->net_ns_inode != cw->net_ns_inode)
- return;
-
- // local_sockets_log(ls, "child is sending inode %"PRIu64" of namespace %"PRIu64, n->inode, n->net_ns_inode);
-
- if(write(fd, n, sizeof(*n)) != sizeof(*n))
- local_sockets_log(ls, "failed to write local socket to pipe");
-
- size_t len = n->cmdline ? string_strlen(n->cmdline) + 1 : 0;
- if(write(fd, &len, sizeof(len)) != sizeof(len))
- local_sockets_log(ls, "failed to write cmdline length to pipe");
-
- if(len)
- if(write(fd, string2str(n->cmdline), len) != (ssize_t)len)
- local_sockets_log(ls, "failed to write cmdline to pipe");
-}
-
-static inline void local_sockets_spawn_server_callback(SPAWN_REQUEST *request) {
- LS_STATE ls = { 0 };
- ls.config = *((struct local_sockets_config *)request->data);
-
- // we don't need these inside namespaces
- ls.config.cmdline = false;
- ls.config.comm = false;
- ls.config.pid = false;
- ls.config.namespaces = false;
-
- // initialize local sockets
- local_sockets_init(&ls);
-
- ls.config.host_prefix = ""; // we need the /proc of the container
-
- struct local_sockets_child_work cw = {
- .net_ns_inode = ls.proc_self_net_ns_inode,
- .fd = request->fds[1], // stdout
- };
-
- ls.config.cb = local_sockets_send_to_parent;
- ls.config.data = &cw;
- ls.proc_self_net_ns_inode = ls.config.net_ns_inode;
-
- // switch namespace using the custom fd passed via the spawn server
- if (setns(request->fds[3], CLONE_NEWNET) == -1) {
- local_sockets_log(&ls, "failed to switch network namespace at child process using fd %d", request->fds[3]);
- exit(EXIT_FAILURE);
- }
-
- // read all sockets from /proc
- local_sockets_read_all_system_sockets(&ls);
-
- // send all sockets to parent
- local_sockets_foreach_local_socket_call_cb(&ls);
-
- // send the terminating socket
- struct local_socket zero = {
- .net_ns_inode = ls.config.net_ns_inode,
- };
- local_sockets_send_to_parent(&ls, &zero, &cw);
-
- exit(EXIT_SUCCESS);
-}
-
-static inline bool local_sockets_get_namespace_sockets_with_pid(LS_STATE *ls, struct pid_socket *ps) {
- char filename[1024];
- snprintfz(filename, sizeof(filename), "%s/proc/%d/ns/net", ls->config.host_prefix, ps->pid);
-
- // verify the pid is in the target namespace
- int fd = open(filename, O_RDONLY | O_CLOEXEC);
- if (fd == -1) {
- local_sockets_log(ls, "cannot open file '%s'", filename);
- return false;
- }
-
- struct stat statbuf;
- if (fstat(fd, &statbuf) == -1) {
- close(fd);
- local_sockets_log(ls, "failed to get file statistics for '%s'", filename);
- return false;
- }
-
- if (statbuf.st_ino != ps->net_ns_inode) {
- close(fd);
- local_sockets_log(ls, "pid %d is not in the wanted network namespace", ps->pid);
- return false;
- }
-
- if(ls->spawn_server == NULL) {
- close(fd);
- local_sockets_log(ls, "spawn server is not available");
- return false;
- }
-
- struct local_sockets_config config = ls->config;
- config.net_ns_inode = ps->net_ns_inode;
- SPAWN_INSTANCE *si = spawn_server_exec(ls->spawn_server, STDERR_FILENO, fd, NULL, &config, sizeof(config), SPAWN_INSTANCE_TYPE_CALLBACK);
- close(fd); fd = -1;
-
- if(si == NULL) {
- local_sockets_log(ls, "cannot create spawn instance");
- return false;
- }
-
- size_t received = 0;
- struct local_socket buf;
- while(read(spawn_server_instance_read_fd(si), &buf, sizeof(buf)) == sizeof(buf)) {
- size_t len = 0;
- if(read(spawn_server_instance_read_fd(si), &len, sizeof(len)) != sizeof(len))
- local_sockets_log(ls, "failed to read cmdline length from pipe");
-
- if(len) {
- char cmdline[len + 1];
- if(read(spawn_server_instance_read_fd(si), cmdline, len) != (ssize_t)len)
- local_sockets_log(ls, "failed to read cmdline from pipe");
- else {
- cmdline[len] = '\0';
- buf.cmdline = string_strdupz(cmdline);
- }
- }
- else
- buf.cmdline = NULL;
-
- received++;
-
- struct local_socket zero = {
- .net_ns_inode = ps->net_ns_inode,
- };
- if(memcmp(&buf, &zero, sizeof(buf)) == 0) {
- // the terminator
- break;
- }
-
- spinlock_lock(&ls->spinlock);
-
- SIMPLE_HASHTABLE_SLOT_LOCAL_SOCKET *sl = simple_hashtable_get_slot_LOCAL_SOCKET(&ls->sockets_hashtable, buf.inode, &buf, true);
- LOCAL_SOCKET *n = SIMPLE_HASHTABLE_SLOT_DATA(sl);
- if(n) {
- string_freez(buf.cmdline);
-// local_sockets_log(ls,
-// "ns inode %" PRIu64" (comm: '%s', pid: %u, ns: %"PRIu64") already exists in hashtable (comm: '%s', pid: %u, ns: %"PRIu64") - ignoring duplicate",
-// buf.inode, buf.comm, buf.pid, buf.net_ns_inode, n->comm, n->pid, n->net_ns_inode);
- }
- else {
- n = aral_mallocz(ls->local_socket_aral);
- memcpy(n, &buf, sizeof(*n));
- simple_hashtable_set_slot_LOCAL_SOCKET(&ls->sockets_hashtable, sl, n->inode, n);
-
- local_sockets_index_listening_port(ls, n);
- }
-
- spinlock_unlock(&ls->spinlock);
- }
-
- spawn_server_exec_kill(ls->spawn_server, si);
- return received > 0;
-}
-
-struct local_sockets_namespace_worker {
- LS_STATE *ls;
- uint64_t inode;
-};
-
-static inline void *local_sockets_get_namespace_sockets(void *arg) {
- struct local_sockets_namespace_worker *data = arg;
- LS_STATE *ls = data->ls;
- const uint64_t inode = data->inode;
-
- spinlock_lock(&ls->spinlock);
-
- // find a pid_socket that has this namespace
- for(SIMPLE_HASHTABLE_SLOT_PID_SOCKET *sl_pid = simple_hashtable_first_read_only_PID_SOCKET(&ls->pid_sockets_hashtable) ;
- sl_pid ;
- sl_pid = simple_hashtable_next_read_only_PID_SOCKET(&ls->pid_sockets_hashtable, sl_pid)) {
- struct pid_socket *ps = SIMPLE_HASHTABLE_SLOT_DATA(sl_pid);
- if(!ps || ps->net_ns_inode != inode) continue;
-
- // now we have a pid that has the same namespace inode
-
- spinlock_unlock(&ls->spinlock);
- const bool worked = local_sockets_get_namespace_sockets_with_pid(ls, ps);
- spinlock_lock(&ls->spinlock);
-
- if(worked)
- break;
- }
-
- spinlock_unlock(&ls->spinlock);
-
- return NULL;
-}
-
-static inline void local_sockets_namespaces(LS_STATE *ls) {
- size_t threads = ls->config.max_concurrent_namespaces;
- if(threads == 0) threads = 5;
- if(threads > 100) threads = 100;
-
- size_t last_thread = 0;
- ND_THREAD *workers[threads];
- struct local_sockets_namespace_worker workers_data[threads];
- memset(workers, 0, sizeof(workers));
- memset(workers_data, 0, sizeof(workers_data));
-
- spinlock_lock(&ls->spinlock);
-
- for(SIMPLE_HASHTABLE_SLOT_NET_NS *sl = simple_hashtable_first_read_only_NET_NS(&ls->ns_hashtable);
- sl;
- sl = simple_hashtable_next_read_only_NET_NS(&ls->ns_hashtable, sl)) {
- const uint64_t inode = (uint64_t)SIMPLE_HASHTABLE_SLOT_DATA(sl);
-
- if(inode == ls->proc_self_net_ns_inode)
- continue;
-
- spinlock_unlock(&ls->spinlock);
-
- ls->stats.namespaces_found++;
-
- if(workers[last_thread] != NULL) {
- if(++last_thread >= threads)
- last_thread = 0;
-
- if(workers[last_thread]) {
- nd_thread_join(workers[last_thread]);
- workers[last_thread] = NULL;
- }
- }
-
- workers_data[last_thread].ls = ls;
- workers_data[last_thread].inode = inode;
- workers[last_thread] = nd_thread_create(
- "local-sockets-worker", NETDATA_THREAD_OPTION_JOINABLE,
- local_sockets_get_namespace_sockets, &workers_data[last_thread]);
-
- spinlock_lock(&ls->spinlock);
- }
-
- spinlock_unlock(&ls->spinlock);
-
- // wait all the threads running
- for(size_t i = 0; i < threads ;i++) {
- if(workers[i])
- nd_thread_join(workers[i]);
- }
-}
-
-// --------------------------------------------------------------------------------------------------------------------
-
-static inline void local_sockets_process(LS_STATE *ls) {
- // initialize our hashtables
- local_sockets_init(ls);
-
- // read all sockets from /proc
- local_sockets_read_all_system_sockets(ls);
-
- // check all socket namespaces
- if(ls->config.namespaces)
- local_sockets_namespaces(ls);
-
- // detect the directions of the sockets
- if(ls->config.inbound || ls->config.outbound || ls->config.local)
- local_sockets_detect_directions(ls);
-
- // call the callback for each socket
- local_sockets_foreach_local_socket_call_cb(ls);
-
- // free all memory
- local_sockets_cleanup(ls);
-}
-
-static inline void ipv6_address_to_txt(struct in6_addr *in6_addr, char *dst) {
- struct sockaddr_in6 sa = { 0 };
-
- sa.sin6_family = AF_INET6;
- sa.sin6_port = htons(0);
- sa.sin6_addr = *in6_addr;
-
- // Convert to human-readable format
- if (inet_ntop(AF_INET6, &(sa.sin6_addr), dst, INET6_ADDRSTRLEN) == NULL)
- *dst = '\0';
-}
-
-static inline void ipv4_address_to_txt(uint32_t ip, char *dst) {
- uint8_t octets[4];
- octets[0] = ip & 0xFF;
- octets[1] = (ip >> 8) & 0xFF;
- octets[2] = (ip >> 16) & 0xFF;
- octets[3] = (ip >> 24) & 0xFF;
- sprintf(dst, "%u.%u.%u.%u", octets[0], octets[1], octets[2], octets[3]);
-}
-
-#endif //NETDATA_LOCAL_SOCKETS_H
diff --git a/src/libnetdata/maps/system-groups.h b/src/libnetdata/maps/system-groups.h
deleted file mode 100644
index fd042cd4e..000000000
--- a/src/libnetdata/maps/system-groups.h
+++ /dev/null
@@ -1,67 +0,0 @@
-// SPDX-License-Identifier: GPL-3.0-or-later
-
-#ifndef NETDATA_SYSTEM_GROUPS_H
-#define NETDATA_SYSTEM_GROUPS_H
-
-#include "libnetdata/libnetdata.h"
-
-// --------------------------------------------------------------------------------------------------------------------
-// hashtable for caching uid to username mappings
-// key is the uid, value is username (STRING)
-
-#define SIMPLE_HASHTABLE_VALUE_TYPE STRING
-#define SIMPLE_HASHTABLE_NAME _GROUPNAMES_CACHE
-#include "libnetdata/simple_hashtable.h"
-
-typedef struct groupnames_cache {
- SPINLOCK spinlock;
- SIMPLE_HASHTABLE_GROUPNAMES_CACHE ht;
-} GROUPNAMES_CACHE;
-
-static inline STRING *system_groupnames_cache_lookup_gid(GROUPNAMES_CACHE *gc, gid_t gid) {
- spinlock_lock(&gc->spinlock);
-
- SIMPLE_HASHTABLE_SLOT_GROUPNAMES_CACHE *sl = simple_hashtable_get_slot_GROUPNAMES_CACHE(&gc->ht, gid, &gid, true);
- STRING *g = SIMPLE_HASHTABLE_SLOT_DATA(sl);
- if(!g) {
- char tmp[1024 + 1];
- struct group grp, *result = NULL;
-
- if (getgrgid_r(gid, &grp, tmp, sizeof(tmp), &result) != 0 || !result || !grp.gr_name || !(*grp.gr_name)) {
- char name[50];
- snprintfz(name, sizeof(name), "%u", gid);
- g = string_strdupz(name);
- }
- else
- g = string_strdupz(grp.gr_name);
-
- simple_hashtable_set_slot_GROUPNAMES_CACHE(&gc->ht, sl, gid, g);
- }
-
- g = string_dup(g);
- spinlock_unlock(&gc->spinlock);
- return g;
-}
-
-static inline GROUPNAMES_CACHE *system_groupnames_cache_init(void) {
- GROUPNAMES_CACHE *gc = callocz(1, sizeof(*gc));
- spinlock_init(&gc->spinlock);
- simple_hashtable_init_GROUPNAMES_CACHE(&gc->ht, 100);
- return gc;
-}
-
-static inline void system_groupnames_cache_destroy(GROUPNAMES_CACHE *gc) {
- spinlock_lock(&gc->spinlock);
-
- for(SIMPLE_HASHTABLE_SLOT_GROUPNAMES_CACHE *sl = simple_hashtable_first_read_only_GROUPNAMES_CACHE(&gc->ht);
- sl;
- sl = simple_hashtable_next_read_only_GROUPNAMES_CACHE(&gc->ht, sl)) {
- STRING *u = SIMPLE_HASHTABLE_SLOT_DATA(sl);
- string_freez(u);
- }
-
- simple_hashtable_destroy_GROUPNAMES_CACHE(&gc->ht);
- freez(gc);
-}
-
-#endif //NETDATA_SYSTEM_GROUPS_H
diff --git a/src/libnetdata/maps/system-services.h b/src/libnetdata/maps/system-services.h
deleted file mode 100644
index 123f4f10b..000000000
--- a/src/libnetdata/maps/system-services.h
+++ /dev/null
@@ -1,92 +0,0 @@
-// SPDX-License-Identifier: GPL-3.0-or-later
-
-#ifndef NETDATA_SYSTEM_SERVICES_H
-#define NETDATA_SYSTEM_SERVICES_H
-
-#include "libnetdata/libnetdata.h"
-#include <netdb.h>
-
-// --------------------------------------------------------------------------------------------------------------------
-// hashtable for caching port and protocol to service name mappings
-// key is the combination of protocol and port packed into a uint64_t, value is service name (STRING)
-
-#define SIMPLE_HASHTABLE_VALUE_TYPE STRING
-#define SIMPLE_HASHTABLE_NAME _SERVICENAMES_CACHE
-#include "libnetdata/simple_hashtable.h"
-
-typedef struct servicenames_cache {
- SPINLOCK spinlock;
- SIMPLE_HASHTABLE_SERVICENAMES_CACHE ht;
-} SERVICENAMES_CACHE;
-
-static inline uint64_t system_servicenames_key(uint16_t port, uint16_t ipproto) {
- return ((uint64_t)ipproto << 16) | (uint64_t)port;
-}
-
-static inline const char *system_servicenames_ipproto2str(uint16_t ipproto) {
- return (ipproto == IPPROTO_TCP) ? "tcp" : "udp";
-}
-
-static inline const char *static_portnames(uint16_t port, uint16_t ipproto) {
- if(port == 19999 && ipproto == IPPROTO_TCP)
- return "netdata";
-
- if(port == 8125)
- return "statsd";
-
- return NULL;
-}
-
-static inline STRING *system_servicenames_cache_lookup(SERVICENAMES_CACHE *sc, uint16_t port, uint16_t ipproto) {
- uint64_t key = system_servicenames_key(port, ipproto);
- spinlock_lock(&sc->spinlock);
-
- SIMPLE_HASHTABLE_SLOT_SERVICENAMES_CACHE *sl = simple_hashtable_get_slot_SERVICENAMES_CACHE(&sc->ht, key, &key, true);
- STRING *s = SIMPLE_HASHTABLE_SLOT_DATA(sl);
- if (!s) {
- const char *st = static_portnames(port, ipproto);
- if(st) {
- s = string_strdupz(st);
- }
- else {
- struct servent *se = getservbyport(htons(port), system_servicenames_ipproto2str(ipproto));
-
- if (!se || !se->s_name) {
- char name[50];
- snprintfz(name, sizeof(name), "%u/%s", port, system_servicenames_ipproto2str(ipproto));
- s = string_strdupz(name);
- }
- else
- s = string_strdupz(se->s_name);
- }
-
- simple_hashtable_set_slot_SERVICENAMES_CACHE(&sc->ht, sl, key, s);
- }
-
- s = string_dup(s);
- spinlock_unlock(&sc->spinlock);
- return s;
-}
-
-static inline SERVICENAMES_CACHE *system_servicenames_cache_init(void) {
- SERVICENAMES_CACHE *sc = callocz(1, sizeof(*sc));
- spinlock_init(&sc->spinlock);
- simple_hashtable_init_SERVICENAMES_CACHE(&sc->ht, 100);
- return sc;
-}
-
-static inline void system_servicenames_cache_destroy(SERVICENAMES_CACHE *sc) {
- spinlock_lock(&sc->spinlock);
-
- for (SIMPLE_HASHTABLE_SLOT_SERVICENAMES_CACHE *sl = simple_hashtable_first_read_only_SERVICENAMES_CACHE(&sc->ht);
- sl;
- sl = simple_hashtable_next_read_only_SERVICENAMES_CACHE(&sc->ht, sl)) {
- STRING *s = SIMPLE_HASHTABLE_SLOT_DATA(sl);
- string_freez(s);
- }
-
- simple_hashtable_destroy_SERVICENAMES_CACHE(&sc->ht);
- freez(sc);
-}
-
-#endif //NETDATA_SYSTEM_SERVICES_H
diff --git a/src/libnetdata/maps/system-users.h b/src/libnetdata/maps/system-users.h
deleted file mode 100644
index 5f7dfae1a..000000000
--- a/src/libnetdata/maps/system-users.h
+++ /dev/null
@@ -1,67 +0,0 @@
-// SPDX-License-Identifier: GPL-3.0-or-later
-
-#ifndef NETDATA_SYSTEM_USERS_H
-#define NETDATA_SYSTEM_USERS_H
-
-#include "libnetdata/libnetdata.h"
-
-// --------------------------------------------------------------------------------------------------------------------
-// hashtable for caching uid to username mappings
-// key is the uid, value is username (STRING)
-
-#define SIMPLE_HASHTABLE_VALUE_TYPE STRING
-#define SIMPLE_HASHTABLE_NAME _USERNAMES_CACHE
-#include "libnetdata/simple_hashtable.h"
-
-typedef struct usernames_cache {
- SPINLOCK spinlock;
- SIMPLE_HASHTABLE_USERNAMES_CACHE ht;
-} USERNAMES_CACHE;
-
-static inline STRING *system_usernames_cache_lookup_uid(USERNAMES_CACHE *uc, uid_t uid) {
- spinlock_lock(&uc->spinlock);
-
- SIMPLE_HASHTABLE_SLOT_USERNAMES_CACHE *sl = simple_hashtable_get_slot_USERNAMES_CACHE(&uc->ht, uid, &uid, true);
- STRING *u = SIMPLE_HASHTABLE_SLOT_DATA(sl);
- if(!u) {
- char tmp[1024 + 1];
- struct passwd pw, *result = NULL;
-
- if (getpwuid_r(uid, &pw, tmp, sizeof(tmp), &result) != 0 || !result || !pw.pw_name || !(*pw.pw_name)) {
- char name[50];
- snprintfz(name, sizeof(name), "%u", uid);
- u = string_strdupz(name);
- }
- else
- u = string_strdupz(pw.pw_name);
-
- simple_hashtable_set_slot_USERNAMES_CACHE(&uc->ht, sl, uid, u);
- }
-
- u = string_dup(u);
- spinlock_unlock(&uc->spinlock);
- return u;
-}
-
-static inline USERNAMES_CACHE *system_usernames_cache_init(void) {
- USERNAMES_CACHE *uc = callocz(1, sizeof(*uc));
- spinlock_init(&uc->spinlock);
- simple_hashtable_init_USERNAMES_CACHE(&uc->ht, 100);
- return uc;
-}
-
-static inline void system_usernames_cache_destroy(USERNAMES_CACHE *uc) {
- spinlock_lock(&uc->spinlock);
-
- for(SIMPLE_HASHTABLE_SLOT_USERNAMES_CACHE *sl = simple_hashtable_first_read_only_USERNAMES_CACHE(&uc->ht);
- sl;
- sl = simple_hashtable_next_read_only_USERNAMES_CACHE(&uc->ht, sl)) {
- STRING *u = SIMPLE_HASHTABLE_SLOT_DATA(sl);
- string_freez(u);
- }
-
- simple_hashtable_destroy_USERNAMES_CACHE(&uc->ht);
- freez(uc);
-}
-
-#endif //NETDATA_SYSTEM_USERS_H