tun_linux.go 9.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414
  1. //go:build !android && !e2e_testing
  2. // +build !android,!e2e_testing
  3. package overlay
  4. import (
  5. "bytes"
  6. "fmt"
  7. "io"
  8. "net"
  9. "os"
  10. "strings"
  11. "sync/atomic"
  12. "unsafe"
  13. "github.com/sirupsen/logrus"
  14. "github.com/slackhq/nebula/cidr"
  15. "github.com/slackhq/nebula/iputil"
  16. "github.com/vishvananda/netlink"
  17. "golang.org/x/sys/unix"
  18. )
  19. type tun struct {
  20. io.ReadWriteCloser
  21. fd int
  22. Device string
  23. cidr *net.IPNet
  24. MaxMTU int
  25. DefaultMTU int
  26. TXQueueLen int
  27. Routes []Route
  28. routeTree atomic.Pointer[cidr.Tree4[iputil.VpnIp]]
  29. routeChan chan struct{}
  30. useSystemRoutes bool
  31. l *logrus.Logger
  32. }
  33. type ifReq struct {
  34. Name [16]byte
  35. Flags uint16
  36. pad [8]byte
  37. }
  38. type ifreqAddr struct {
  39. Name [16]byte
  40. Addr unix.RawSockaddrInet4
  41. pad [8]byte
  42. }
  43. type ifreqMTU struct {
  44. Name [16]byte
  45. MTU int32
  46. pad [8]byte
  47. }
  48. type ifreqQLEN struct {
  49. Name [16]byte
  50. Value int32
  51. pad [8]byte
  52. }
  53. func newTunFromFd(l *logrus.Logger, deviceFd int, cidr *net.IPNet, defaultMTU int, routes []Route, txQueueLen int, useSystemRoutes bool) (*tun, error) {
  54. routeTree, err := makeRouteTree(l, routes, true)
  55. if err != nil {
  56. return nil, err
  57. }
  58. file := os.NewFile(uintptr(deviceFd), "/dev/net/tun")
  59. t := &tun{
  60. ReadWriteCloser: file,
  61. fd: int(file.Fd()),
  62. Device: "tun0",
  63. cidr: cidr,
  64. DefaultMTU: defaultMTU,
  65. TXQueueLen: txQueueLen,
  66. Routes: routes,
  67. useSystemRoutes: useSystemRoutes,
  68. l: l,
  69. }
  70. t.routeTree.Store(routeTree)
  71. return t, nil
  72. }
  73. func newTun(l *logrus.Logger, deviceName string, cidr *net.IPNet, defaultMTU int, routes []Route, txQueueLen int, multiqueue bool, useSystemRoutes bool) (*tun, error) {
  74. fd, err := unix.Open("/dev/net/tun", os.O_RDWR, 0)
  75. if err != nil {
  76. return nil, err
  77. }
  78. var req ifReq
  79. req.Flags = uint16(unix.IFF_TUN | unix.IFF_NO_PI)
  80. if multiqueue {
  81. req.Flags |= unix.IFF_MULTI_QUEUE
  82. }
  83. copy(req.Name[:], deviceName)
  84. if err = ioctl(uintptr(fd), uintptr(unix.TUNSETIFF), uintptr(unsafe.Pointer(&req))); err != nil {
  85. return nil, err
  86. }
  87. name := strings.Trim(string(req.Name[:]), "\x00")
  88. file := os.NewFile(uintptr(fd), "/dev/net/tun")
  89. maxMTU := defaultMTU
  90. for _, r := range routes {
  91. if r.MTU == 0 {
  92. r.MTU = defaultMTU
  93. }
  94. if r.MTU > maxMTU {
  95. maxMTU = r.MTU
  96. }
  97. }
  98. routeTree, err := makeRouteTree(l, routes, true)
  99. if err != nil {
  100. return nil, err
  101. }
  102. t := &tun{
  103. ReadWriteCloser: file,
  104. fd: int(file.Fd()),
  105. Device: name,
  106. cidr: cidr,
  107. MaxMTU: maxMTU,
  108. DefaultMTU: defaultMTU,
  109. TXQueueLen: txQueueLen,
  110. Routes: routes,
  111. useSystemRoutes: useSystemRoutes,
  112. l: l,
  113. }
  114. t.routeTree.Store(routeTree)
  115. return t, nil
  116. }
  117. func (t *tun) NewMultiQueueReader() (io.ReadWriteCloser, error) {
  118. fd, err := unix.Open("/dev/net/tun", os.O_RDWR, 0)
  119. if err != nil {
  120. return nil, err
  121. }
  122. var req ifReq
  123. req.Flags = uint16(unix.IFF_TUN | unix.IFF_NO_PI | unix.IFF_MULTI_QUEUE)
  124. copy(req.Name[:], t.Device)
  125. if err = ioctl(uintptr(fd), uintptr(unix.TUNSETIFF), uintptr(unsafe.Pointer(&req))); err != nil {
  126. return nil, err
  127. }
  128. file := os.NewFile(uintptr(fd), "/dev/net/tun")
  129. return file, nil
  130. }
  131. func (t *tun) RouteFor(ip iputil.VpnIp) iputil.VpnIp {
  132. _, r := t.routeTree.Load().MostSpecificContains(ip)
  133. return r
  134. }
  135. func (t *tun) Write(b []byte) (int, error) {
  136. var nn int
  137. max := len(b)
  138. for {
  139. n, err := unix.Write(t.fd, b[nn:max])
  140. if n > 0 {
  141. nn += n
  142. }
  143. if nn == len(b) {
  144. return nn, err
  145. }
  146. if err != nil {
  147. return nn, err
  148. }
  149. if n == 0 {
  150. return nn, io.ErrUnexpectedEOF
  151. }
  152. }
  153. }
  154. func (t *tun) deviceBytes() (o [16]byte) {
  155. for i, c := range t.Device {
  156. o[i] = byte(c)
  157. }
  158. return
  159. }
  160. func (t *tun) Activate() error {
  161. devName := t.deviceBytes()
  162. if t.useSystemRoutes {
  163. t.watchRoutes()
  164. }
  165. var addr, mask [4]byte
  166. copy(addr[:], t.cidr.IP.To4())
  167. copy(mask[:], t.cidr.Mask)
  168. s, err := unix.Socket(
  169. unix.AF_INET,
  170. unix.SOCK_DGRAM,
  171. unix.IPPROTO_IP,
  172. )
  173. if err != nil {
  174. return err
  175. }
  176. fd := uintptr(s)
  177. ifra := ifreqAddr{
  178. Name: devName,
  179. Addr: unix.RawSockaddrInet4{
  180. Family: unix.AF_INET,
  181. Addr: addr,
  182. },
  183. }
  184. // Set the device ip address
  185. if err = ioctl(fd, unix.SIOCSIFADDR, uintptr(unsafe.Pointer(&ifra))); err != nil {
  186. return fmt.Errorf("failed to set tun address: %s", err)
  187. }
  188. // Set the device network
  189. ifra.Addr.Addr = mask
  190. if err = ioctl(fd, unix.SIOCSIFNETMASK, uintptr(unsafe.Pointer(&ifra))); err != nil {
  191. return fmt.Errorf("failed to set tun netmask: %s", err)
  192. }
  193. // Set the device name
  194. ifrf := ifReq{Name: devName}
  195. if err = ioctl(fd, unix.SIOCGIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  196. return fmt.Errorf("failed to set tun device name: %s", err)
  197. }
  198. // Set the MTU on the device
  199. ifm := ifreqMTU{Name: devName, MTU: int32(t.MaxMTU)}
  200. if err = ioctl(fd, unix.SIOCSIFMTU, uintptr(unsafe.Pointer(&ifm))); err != nil {
  201. // This is currently a non fatal condition because the route table must have the MTU set appropriately as well
  202. t.l.WithError(err).Error("Failed to set tun mtu")
  203. }
  204. // Set the transmit queue length
  205. ifrq := ifreqQLEN{Name: devName, Value: int32(t.TXQueueLen)}
  206. if err = ioctl(fd, unix.SIOCSIFTXQLEN, uintptr(unsafe.Pointer(&ifrq))); err != nil {
  207. // If we can't set the queue length nebula will still work but it may lead to packet loss
  208. t.l.WithError(err).Error("Failed to set tun tx queue length")
  209. }
  210. // Bring up the interface
  211. ifrf.Flags = ifrf.Flags | unix.IFF_UP
  212. if err = ioctl(fd, unix.SIOCSIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  213. return fmt.Errorf("failed to bring the tun device up: %s", err)
  214. }
  215. // Set the routes
  216. link, err := netlink.LinkByName(t.Device)
  217. if err != nil {
  218. return fmt.Errorf("failed to get tun device link: %s", err)
  219. }
  220. // Default route
  221. dr := &net.IPNet{IP: t.cidr.IP.Mask(t.cidr.Mask), Mask: t.cidr.Mask}
  222. nr := netlink.Route{
  223. LinkIndex: link.Attrs().Index,
  224. Dst: dr,
  225. MTU: t.DefaultMTU,
  226. AdvMSS: t.advMSS(Route{}),
  227. Scope: unix.RT_SCOPE_LINK,
  228. Src: t.cidr.IP,
  229. Protocol: unix.RTPROT_KERNEL,
  230. Table: unix.RT_TABLE_MAIN,
  231. Type: unix.RTN_UNICAST,
  232. }
  233. err = netlink.RouteReplace(&nr)
  234. if err != nil {
  235. return fmt.Errorf("failed to set mtu %v on the default route %v; %v", t.DefaultMTU, dr, err)
  236. }
  237. // Path routes
  238. for _, r := range t.Routes {
  239. if !r.Install {
  240. continue
  241. }
  242. nr := netlink.Route{
  243. LinkIndex: link.Attrs().Index,
  244. Dst: r.Cidr,
  245. MTU: r.MTU,
  246. AdvMSS: t.advMSS(r),
  247. Scope: unix.RT_SCOPE_LINK,
  248. }
  249. if r.Metric > 0 {
  250. nr.Priority = r.Metric
  251. }
  252. err = netlink.RouteAdd(&nr)
  253. if err != nil {
  254. return fmt.Errorf("failed to set mtu %v on route %v; %v", r.MTU, r.Cidr, err)
  255. }
  256. }
  257. // Run the interface
  258. ifrf.Flags = ifrf.Flags | unix.IFF_UP | unix.IFF_RUNNING
  259. if err = ioctl(fd, unix.SIOCSIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  260. return fmt.Errorf("failed to run tun device: %s", err)
  261. }
  262. return nil
  263. }
  264. func (t *tun) Cidr() *net.IPNet {
  265. return t.cidr
  266. }
  267. func (t *tun) Name() string {
  268. return t.Device
  269. }
  270. func (t *tun) advMSS(r Route) int {
  271. mtu := r.MTU
  272. if r.MTU == 0 {
  273. mtu = t.DefaultMTU
  274. }
  275. // We only need to set advmss if the route MTU does not match the device MTU
  276. if mtu != t.MaxMTU {
  277. return mtu - 40
  278. }
  279. return 0
  280. }
  281. func (t *tun) watchRoutes() {
  282. rch := make(chan netlink.RouteUpdate)
  283. doneChan := make(chan struct{})
  284. if err := netlink.RouteSubscribe(rch, doneChan); err != nil {
  285. t.l.WithError(err).Errorf("failed to subscribe to system route changes")
  286. return
  287. }
  288. t.routeChan = doneChan
  289. go func() {
  290. for {
  291. select {
  292. case r := <-rch:
  293. t.updateRoutes(r)
  294. case <-doneChan:
  295. // netlink.RouteSubscriber will close the rch for us
  296. return
  297. }
  298. }
  299. }()
  300. }
  301. func (t *tun) updateRoutes(r netlink.RouteUpdate) {
  302. if r.Gw == nil {
  303. // Not a gateway route, ignore
  304. t.l.WithField("route", r).Debug("Ignoring route update, not a gateway route")
  305. return
  306. }
  307. if !t.cidr.Contains(r.Gw) {
  308. // Gateway isn't in our overlay network, ignore
  309. t.l.WithField("route", r).Debug("Ignoring route update, not in our network")
  310. return
  311. }
  312. if x := r.Dst.IP.To4(); x == nil {
  313. // Nebula only handles ipv4 on the overlay currently
  314. t.l.WithField("route", r).Debug("Ignoring route update, destination is not ipv4")
  315. return
  316. }
  317. newTree := cidr.NewTree4[iputil.VpnIp]()
  318. if r.Type == unix.RTM_NEWROUTE {
  319. for _, oldR := range t.routeTree.Load().List() {
  320. newTree.AddCIDR(oldR.CIDR, oldR.Value)
  321. }
  322. t.l.WithField("destination", r.Dst).WithField("via", r.Gw).Info("Adding route")
  323. newTree.AddCIDR(r.Dst, iputil.Ip2VpnIp(r.Gw))
  324. } else {
  325. gw := iputil.Ip2VpnIp(r.Gw)
  326. for _, oldR := range t.routeTree.Load().List() {
  327. if bytes.Equal(oldR.CIDR.IP, r.Dst.IP) && bytes.Equal(oldR.CIDR.Mask, r.Dst.Mask) && oldR.Value == gw {
  328. // This is the record to delete
  329. t.l.WithField("destination", r.Dst).WithField("via", r.Gw).Info("Removing route")
  330. continue
  331. }
  332. newTree.AddCIDR(oldR.CIDR, oldR.Value)
  333. }
  334. }
  335. t.routeTree.Store(newTree)
  336. }
  337. func (t *tun) Close() error {
  338. if t.routeChan != nil {
  339. close(t.routeChan)
  340. }
  341. if t.ReadWriteCloser != nil {
  342. t.ReadWriteCloser.Close()
  343. }
  344. return nil
  345. }