tun_linux.go 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816
  1. //go:build !android && !e2e_testing
  2. // +build !android,!e2e_testing
  3. package overlay
  4. import (
  5. "context"
  6. "fmt"
  7. "net"
  8. "net/netip"
  9. "os"
  10. "strings"
  11. "sync/atomic"
  12. "time"
  13. "unsafe"
  14. "github.com/gaissmai/bart"
  15. "github.com/sirupsen/logrus"
  16. "github.com/slackhq/nebula/config"
  17. "github.com/slackhq/nebula/overlay/vhostnet"
  18. "github.com/slackhq/nebula/packet"
  19. "github.com/slackhq/nebula/routing"
  20. "github.com/slackhq/nebula/util"
  21. "github.com/slackhq/nebula/util/virtio"
  22. "github.com/vishvananda/netlink"
  23. "golang.org/x/sys/unix"
  24. )
  25. type tun struct {
  26. file *os.File
  27. fd int
  28. vdev []*vhostnet.Device
  29. Device string
  30. vpnNetworks []netip.Prefix
  31. MaxMTU int
  32. DefaultMTU int
  33. TXQueueLen int
  34. deviceIndex int
  35. ioctlFd uintptr
  36. Routes atomic.Pointer[[]Route]
  37. routeTree atomic.Pointer[bart.Table[routing.Gateways]]
  38. routeChan chan struct{}
  39. useSystemRoutes bool
  40. useSystemRoutesBufferSize int
  41. isV6 bool
  42. l *logrus.Logger
  43. }
  44. func (t *tun) Networks() []netip.Prefix {
  45. return t.vpnNetworks
  46. }
  47. type ifReq struct {
  48. Name [16]byte
  49. Flags uint16
  50. pad [8]byte
  51. }
  52. type ifreqMTU struct {
  53. Name [16]byte
  54. MTU int32
  55. pad [8]byte
  56. }
  57. type ifreqQLEN struct {
  58. Name [16]byte
  59. Value int32
  60. pad [8]byte
  61. }
  62. func newTunFromFd(c *config.C, l *logrus.Logger, deviceFd int, vpnNetworks []netip.Prefix) (*tun, error) {
  63. file := os.NewFile(uintptr(deviceFd), "/dev/net/tun")
  64. t, err := newTunGeneric(c, l, file, vpnNetworks)
  65. if err != nil {
  66. return nil, err
  67. }
  68. t.Device = "tun0"
  69. return t, nil
  70. }
  71. func newTun(c *config.C, l *logrus.Logger, vpnNetworks []netip.Prefix, multiqueue bool) (*tun, error) {
  72. fd, err := unix.Open("/dev/net/tun", os.O_RDWR, 0)
  73. if err != nil {
  74. // If /dev/net/tun doesn't exist, try to create it (will happen in docker)
  75. if os.IsNotExist(err) {
  76. err = os.MkdirAll("/dev/net", 0755)
  77. if err != nil {
  78. return nil, fmt.Errorf("/dev/net/tun doesn't exist, failed to mkdir -p /dev/net: %w", err)
  79. }
  80. err = unix.Mknod("/dev/net/tun", unix.S_IFCHR|0600, int(unix.Mkdev(10, 200)))
  81. if err != nil {
  82. return nil, fmt.Errorf("failed to create /dev/net/tun: %w", err)
  83. }
  84. fd, err = unix.Open("/dev/net/tun", os.O_RDWR, 0)
  85. if err != nil {
  86. return nil, fmt.Errorf("created /dev/net/tun, but still failed: %w", err)
  87. }
  88. } else {
  89. return nil, err
  90. }
  91. }
  92. var req ifReq
  93. req.Flags = uint16(unix.IFF_TUN | unix.IFF_NO_PI | unix.IFF_TUN_EXCL | unix.IFF_VNET_HDR | unix.IFF_NAPI)
  94. if multiqueue {
  95. req.Flags |= unix.IFF_MULTI_QUEUE
  96. }
  97. copy(req.Name[:], c.GetString("tun.dev", ""))
  98. if err = ioctl(uintptr(fd), uintptr(unix.TUNSETIFF), uintptr(unsafe.Pointer(&req))); err != nil {
  99. return nil, err
  100. }
  101. name := strings.Trim(string(req.Name[:]), "\x00")
  102. if err = unix.SetNonblock(fd, true); err != nil {
  103. _ = unix.Close(fd)
  104. return nil, fmt.Errorf("make file descriptor non-blocking: %w", err)
  105. }
  106. file := os.NewFile(uintptr(fd), "/dev/net/tun")
  107. err = unix.IoctlSetPointerInt(fd, unix.TUNSETVNETHDRSZ, virtio.NetHdrSize)
  108. if err != nil {
  109. return nil, fmt.Errorf("set vnethdr size: %w", err)
  110. }
  111. flags := 0
  112. //flags = //unix.TUN_F_CSUM //| unix.TUN_F_TSO4 | unix.TUN_F_USO4 | unix.TUN_F_TSO6 | unix.TUN_F_USO6
  113. err = unix.IoctlSetInt(fd, unix.TUNSETOFFLOAD, flags)
  114. if err != nil {
  115. return nil, fmt.Errorf("set offloads: %w", err)
  116. }
  117. t, err := newTunGeneric(c, l, file, vpnNetworks)
  118. if err != nil {
  119. return nil, err
  120. }
  121. t.fd = fd
  122. t.Device = name
  123. vdev, err := vhostnet.NewDevice(
  124. vhostnet.WithBackendFD(fd),
  125. vhostnet.WithQueueSize(8192), //todo config
  126. )
  127. if err != nil {
  128. return nil, err
  129. }
  130. t.vdev = []*vhostnet.Device{vdev}
  131. return t, nil
  132. }
  133. func newTunGeneric(c *config.C, l *logrus.Logger, file *os.File, vpnNetworks []netip.Prefix) (*tun, error) {
  134. t := &tun{
  135. file: file,
  136. fd: int(file.Fd()),
  137. vpnNetworks: vpnNetworks,
  138. TXQueueLen: c.GetInt("tun.tx_queue", 500),
  139. useSystemRoutes: c.GetBool("tun.use_system_route_table", false),
  140. useSystemRoutesBufferSize: c.GetInt("tun.use_system_route_table_buffer_size", 0),
  141. l: l,
  142. }
  143. if len(vpnNetworks) != 0 {
  144. t.isV6 = vpnNetworks[0].Addr().Is6() //todo what about multi-IP?
  145. }
  146. err := t.reload(c, true)
  147. if err != nil {
  148. return nil, err
  149. }
  150. c.RegisterReloadCallback(func(c *config.C) {
  151. err := t.reload(c, false)
  152. if err != nil {
  153. util.LogWithContextIfNeeded("failed to reload tun device", err, t.l)
  154. }
  155. })
  156. return t, nil
  157. }
  158. func (t *tun) NewPacketArrays(batchSize int) []TunPacket {
  159. inPackets := make([]TunPacket, batchSize)
  160. for i := 0; i < batchSize; i++ {
  161. inPackets[i] = vhostnet.NewVIO()
  162. }
  163. return inPackets
  164. }
  165. func (t *tun) reload(c *config.C, initial bool) error {
  166. routeChange, routes, err := getAllRoutesFromConfig(c, t.vpnNetworks, initial)
  167. if err != nil {
  168. return err
  169. }
  170. if !initial && !routeChange && !c.HasChanged("tun.mtu") {
  171. return nil
  172. }
  173. routeTree, err := makeRouteTree(t.l, routes, true)
  174. if err != nil {
  175. return err
  176. }
  177. oldDefaultMTU := t.DefaultMTU
  178. oldMaxMTU := t.MaxMTU
  179. newDefaultMTU := c.GetInt("tun.mtu", DefaultMTU)
  180. newMaxMTU := newDefaultMTU
  181. for i, r := range routes {
  182. if r.MTU == 0 {
  183. routes[i].MTU = newDefaultMTU
  184. }
  185. if r.MTU > t.MaxMTU {
  186. newMaxMTU = r.MTU
  187. }
  188. }
  189. t.MaxMTU = newMaxMTU
  190. t.DefaultMTU = newDefaultMTU
  191. // Teach nebula how to handle the routes before establishing them in the system table
  192. oldRoutes := t.Routes.Swap(&routes)
  193. t.routeTree.Store(routeTree)
  194. if !initial {
  195. if oldMaxMTU != newMaxMTU {
  196. t.setMTU()
  197. t.l.Infof("Set max MTU to %v was %v", t.MaxMTU, oldMaxMTU)
  198. }
  199. if oldDefaultMTU != newDefaultMTU {
  200. for i := range t.vpnNetworks {
  201. err := t.setDefaultRoute(t.vpnNetworks[i])
  202. if err != nil {
  203. t.l.Warn(err)
  204. } else {
  205. t.l.Infof("Set default MTU to %v was %v", t.DefaultMTU, oldDefaultMTU)
  206. }
  207. }
  208. }
  209. // Remove first, if the system removes a wanted route hopefully it will be re-added next
  210. t.removeRoutes(findRemovedRoutes(routes, *oldRoutes))
  211. // Ensure any routes we actually want are installed
  212. err = t.addRoutes(true)
  213. if err != nil {
  214. // This should never be called since addRoutes should log its own errors in a reload condition
  215. util.LogWithContextIfNeeded("Failed to refresh routes", err, t.l)
  216. }
  217. }
  218. return nil
  219. }
  220. func (t *tun) SupportsMultiqueue() bool {
  221. return true
  222. }
  223. func (t *tun) NewMultiQueueReader() (TunDev, error) {
  224. fd, err := unix.Open("/dev/net/tun", os.O_RDWR, 0)
  225. if err != nil {
  226. return nil, err
  227. }
  228. var req ifReq
  229. req.Flags = uint16(unix.IFF_TUN | unix.IFF_NO_PI | unix.IFF_MULTI_QUEUE)
  230. copy(req.Name[:], t.Device)
  231. if err = ioctl(uintptr(fd), uintptr(unix.TUNSETIFF), uintptr(unsafe.Pointer(&req))); err != nil {
  232. return nil, err
  233. }
  234. vdev, err := vhostnet.NewDevice(
  235. vhostnet.WithBackendFD(fd),
  236. vhostnet.WithQueueSize(8192), //todo config
  237. )
  238. if err != nil {
  239. return nil, err
  240. }
  241. t.vdev = append(t.vdev, vdev)
  242. return t, nil
  243. }
  244. func (t *tun) RoutesFor(ip netip.Addr) routing.Gateways {
  245. r, _ := t.routeTree.Load().Lookup(ip)
  246. return r
  247. }
  248. func (t *tun) deviceBytes() (o [16]byte) {
  249. for i, c := range t.Device {
  250. o[i] = byte(c)
  251. }
  252. return
  253. }
  254. func hasNetlinkAddr(al []*netlink.Addr, x netlink.Addr) bool {
  255. for i := range al {
  256. if al[i].Equal(x) {
  257. return true
  258. }
  259. }
  260. return false
  261. }
  262. // addIPs uses netlink to add all addresses that don't exist, then it removes ones that should not be there
  263. func (t *tun) addIPs(link netlink.Link) error {
  264. newAddrs := make([]*netlink.Addr, len(t.vpnNetworks))
  265. for i := range t.vpnNetworks {
  266. newAddrs[i] = &netlink.Addr{
  267. IPNet: &net.IPNet{
  268. IP: t.vpnNetworks[i].Addr().AsSlice(),
  269. Mask: net.CIDRMask(t.vpnNetworks[i].Bits(), t.vpnNetworks[i].Addr().BitLen()),
  270. },
  271. Label: t.vpnNetworks[i].Addr().Zone(),
  272. }
  273. }
  274. //add all new addresses
  275. for i := range newAddrs {
  276. //AddrReplace still adds new IPs, but if their properties change it will change them as well
  277. if err := netlink.AddrReplace(link, newAddrs[i]); err != nil {
  278. return err
  279. }
  280. }
  281. //iterate over remainder, remove whoever shouldn't be there
  282. al, err := netlink.AddrList(link, netlink.FAMILY_ALL)
  283. if err != nil {
  284. return fmt.Errorf("failed to get tun address list: %s", err)
  285. }
  286. for i := range al {
  287. if hasNetlinkAddr(newAddrs, al[i]) {
  288. continue
  289. }
  290. err = netlink.AddrDel(link, &al[i])
  291. if err != nil {
  292. t.l.WithError(err).Error("failed to remove address from tun address list")
  293. } else {
  294. t.l.WithField("removed", al[i].String()).Info("removed address not listed in cert(s)")
  295. }
  296. }
  297. return nil
  298. }
  299. func (t *tun) Activate() error {
  300. devName := t.deviceBytes()
  301. if t.useSystemRoutes {
  302. t.watchRoutes()
  303. }
  304. s, err := unix.Socket(
  305. unix.AF_INET, //because everything we use t.ioctlFd for is address family independent, this is fine
  306. unix.SOCK_DGRAM,
  307. unix.IPPROTO_IP,
  308. )
  309. if err != nil {
  310. return err
  311. }
  312. t.ioctlFd = uintptr(s)
  313. // Set the device name
  314. ifrf := ifReq{Name: devName}
  315. if err = ioctl(t.ioctlFd, unix.SIOCGIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  316. return fmt.Errorf("failed to set tun device name: %s", err)
  317. }
  318. link, err := netlink.LinkByName(t.Device)
  319. if err != nil {
  320. return fmt.Errorf("failed to get tun device link: %s", err)
  321. }
  322. t.deviceIndex = link.Attrs().Index
  323. // Setup our default MTU
  324. t.setMTU()
  325. // Set the transmit queue length
  326. ifrq := ifreqQLEN{Name: devName, Value: int32(t.TXQueueLen)}
  327. if err = ioctl(t.ioctlFd, unix.SIOCSIFTXQLEN, uintptr(unsafe.Pointer(&ifrq))); err != nil {
  328. // If we can't set the queue length nebula will still work but it may lead to packet loss
  329. t.l.WithError(err).Error("Failed to set tun tx queue length")
  330. }
  331. const modeNone = 1
  332. if err = netlink.LinkSetIP6AddrGenMode(link, modeNone); err != nil {
  333. t.l.WithError(err).Warn("Failed to disable link local address generation")
  334. }
  335. if err = t.addIPs(link); err != nil {
  336. return err
  337. }
  338. // Bring up the interface
  339. ifrf.Flags = ifrf.Flags | unix.IFF_UP
  340. if err = ioctl(t.ioctlFd, unix.SIOCSIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  341. return fmt.Errorf("failed to bring the tun device up: %s", err)
  342. }
  343. //set route MTU
  344. for i := range t.vpnNetworks {
  345. if err = t.setDefaultRoute(t.vpnNetworks[i]); err != nil {
  346. return fmt.Errorf("failed to set default route MTU: %w", err)
  347. }
  348. }
  349. // Set the routes
  350. if err = t.addRoutes(false); err != nil {
  351. return err
  352. }
  353. // Run the interface
  354. ifrf.Flags = ifrf.Flags | unix.IFF_UP | unix.IFF_RUNNING
  355. if err = ioctl(t.ioctlFd, unix.SIOCSIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  356. return fmt.Errorf("failed to run tun device: %s", err)
  357. }
  358. return nil
  359. }
  360. func (t *tun) setMTU() {
  361. // Set the MTU on the device
  362. ifm := ifreqMTU{Name: t.deviceBytes(), MTU: int32(t.MaxMTU)}
  363. if err := ioctl(t.ioctlFd, unix.SIOCSIFMTU, uintptr(unsafe.Pointer(&ifm))); err != nil {
  364. // This is currently a non fatal condition because the route table must have the MTU set appropriately as well
  365. t.l.WithError(err).Error("Failed to set tun mtu")
  366. }
  367. }
  368. func (t *tun) setDefaultRoute(cidr netip.Prefix) error {
  369. dr := &net.IPNet{
  370. IP: cidr.Masked().Addr().AsSlice(),
  371. Mask: net.CIDRMask(cidr.Bits(), cidr.Addr().BitLen()),
  372. }
  373. nr := netlink.Route{
  374. LinkIndex: t.deviceIndex,
  375. Dst: dr,
  376. MTU: t.DefaultMTU,
  377. AdvMSS: t.advMSS(Route{}),
  378. Scope: unix.RT_SCOPE_LINK,
  379. Src: net.IP(cidr.Addr().AsSlice()),
  380. Protocol: unix.RTPROT_KERNEL,
  381. Table: unix.RT_TABLE_MAIN,
  382. Type: unix.RTN_UNICAST,
  383. }
  384. err := netlink.RouteReplace(&nr)
  385. if err != nil {
  386. t.l.WithError(err).WithField("cidr", cidr).Warn("Failed to set default route MTU, retrying")
  387. //retry twice more -- on some systems there appears to be a race condition where if we set routes too soon, netlink says `invalid argument`
  388. for i := 0; i < 2; i++ {
  389. time.Sleep(100 * time.Millisecond)
  390. err = netlink.RouteReplace(&nr)
  391. if err == nil {
  392. break
  393. } else {
  394. t.l.WithError(err).WithField("cidr", cidr).WithField("mtu", t.DefaultMTU).Warn("Failed to set default route MTU, retrying")
  395. }
  396. }
  397. if err != nil {
  398. return fmt.Errorf("failed to set mtu %v on the default route %v; %v", t.DefaultMTU, dr, err)
  399. }
  400. }
  401. return nil
  402. }
  403. func (t *tun) addRoutes(logErrors bool) error {
  404. // Path routes
  405. routes := *t.Routes.Load()
  406. for _, r := range routes {
  407. if !r.Install {
  408. continue
  409. }
  410. dr := &net.IPNet{
  411. IP: r.Cidr.Masked().Addr().AsSlice(),
  412. Mask: net.CIDRMask(r.Cidr.Bits(), r.Cidr.Addr().BitLen()),
  413. }
  414. nr := netlink.Route{
  415. LinkIndex: t.deviceIndex,
  416. Dst: dr,
  417. MTU: r.MTU,
  418. AdvMSS: t.advMSS(r),
  419. Scope: unix.RT_SCOPE_LINK,
  420. }
  421. if r.Metric > 0 {
  422. nr.Priority = r.Metric
  423. }
  424. err := netlink.RouteReplace(&nr)
  425. if err != nil {
  426. retErr := util.NewContextualError("Failed to add route", map[string]any{"route": r}, err)
  427. if logErrors {
  428. retErr.Log(t.l)
  429. } else {
  430. return retErr
  431. }
  432. } else {
  433. t.l.WithField("route", r).Info("Added route")
  434. }
  435. }
  436. return nil
  437. }
  438. func (t *tun) removeRoutes(routes []Route) {
  439. for _, r := range routes {
  440. if !r.Install {
  441. continue
  442. }
  443. dr := &net.IPNet{
  444. IP: r.Cidr.Masked().Addr().AsSlice(),
  445. Mask: net.CIDRMask(r.Cidr.Bits(), r.Cidr.Addr().BitLen()),
  446. }
  447. nr := netlink.Route{
  448. LinkIndex: t.deviceIndex,
  449. Dst: dr,
  450. MTU: r.MTU,
  451. AdvMSS: t.advMSS(r),
  452. Scope: unix.RT_SCOPE_LINK,
  453. }
  454. if r.Metric > 0 {
  455. nr.Priority = r.Metric
  456. }
  457. err := netlink.RouteDel(&nr)
  458. if err != nil {
  459. t.l.WithError(err).WithField("route", r).Error("Failed to remove route")
  460. } else {
  461. t.l.WithField("route", r).Info("Removed route")
  462. }
  463. }
  464. }
  465. func (t *tun) Name() string {
  466. return t.Device
  467. }
  468. func (t *tun) advMSS(r Route) int {
  469. mtu := r.MTU
  470. if r.MTU == 0 {
  471. mtu = t.DefaultMTU
  472. }
  473. // We only need to set advmss if the route MTU does not match the device MTU
  474. if mtu != t.MaxMTU {
  475. return mtu - 40
  476. }
  477. return 0
  478. }
  479. func (t *tun) watchRoutes() {
  480. rch := make(chan netlink.RouteUpdate)
  481. doneChan := make(chan struct{})
  482. netlinkOptions := netlink.RouteSubscribeOptions{
  483. ReceiveBufferSize: t.useSystemRoutesBufferSize,
  484. ReceiveBufferForceSize: t.useSystemRoutesBufferSize != 0,
  485. ErrorCallback: func(e error) { t.l.WithError(e).Errorf("netlink error") },
  486. }
  487. if err := netlink.RouteSubscribeWithOptions(rch, doneChan, netlinkOptions); err != nil {
  488. t.l.WithError(err).Errorf("failed to subscribe to system route changes")
  489. return
  490. }
  491. t.routeChan = doneChan
  492. go func() {
  493. for {
  494. select {
  495. case r, ok := <-rch:
  496. if ok {
  497. t.updateRoutes(r)
  498. } else {
  499. // may be should do something here as
  500. // netlink stops sending updates
  501. return
  502. }
  503. case <-doneChan:
  504. // netlink.RouteSubscriber will close the rch for us
  505. return
  506. }
  507. }
  508. }()
  509. }
  510. func (t *tun) isGatewayInVpnNetworks(gwAddr netip.Addr) bool {
  511. withinNetworks := false
  512. for i := range t.vpnNetworks {
  513. if t.vpnNetworks[i].Contains(gwAddr) {
  514. withinNetworks = true
  515. break
  516. }
  517. }
  518. return withinNetworks
  519. }
  520. func (t *tun) getGatewaysFromRoute(r *netlink.Route) routing.Gateways {
  521. var gateways routing.Gateways
  522. link, err := netlink.LinkByName(t.Device)
  523. if err != nil {
  524. t.l.WithField("deviceName", t.Device).Error("Ignoring route update: failed to get link by name")
  525. return gateways
  526. }
  527. // If this route is relevant to our interface and there is a gateway then add it
  528. if r.LinkIndex == link.Attrs().Index {
  529. gwAddr, ok := getGatewayAddr(r.Gw, r.Via)
  530. if ok {
  531. if t.isGatewayInVpnNetworks(gwAddr) {
  532. gateways = append(gateways, routing.NewGateway(gwAddr, 1))
  533. } else {
  534. // Gateway isn't in our overlay network, ignore
  535. t.l.WithField("route", r).Debug("Ignoring route update, gateway is not in our network")
  536. }
  537. } else {
  538. t.l.WithField("route", r).Debug("Ignoring route update, invalid gateway or via address")
  539. }
  540. }
  541. for _, p := range r.MultiPath {
  542. // If this route is relevant to our interface and there is a gateway then add it
  543. if p.LinkIndex == link.Attrs().Index {
  544. gwAddr, ok := getGatewayAddr(p.Gw, p.Via)
  545. if ok {
  546. if t.isGatewayInVpnNetworks(gwAddr) {
  547. gateways = append(gateways, routing.NewGateway(gwAddr, p.Hops+1))
  548. } else {
  549. // Gateway isn't in our overlay network, ignore
  550. t.l.WithField("route", r).Debug("Ignoring route update, gateway is not in our network")
  551. }
  552. } else {
  553. t.l.WithField("route", r).Debug("Ignoring route update, invalid gateway or via address")
  554. }
  555. }
  556. }
  557. routing.CalculateBucketsForGateways(gateways)
  558. return gateways
  559. }
  560. func getGatewayAddr(gw net.IP, via netlink.Destination) (netip.Addr, bool) {
  561. // Try to use the old RTA_GATEWAY first
  562. gwAddr, ok := netip.AddrFromSlice(gw)
  563. if !ok {
  564. // Fallback to the new RTA_VIA
  565. rVia, ok := via.(*netlink.Via)
  566. if ok {
  567. gwAddr, ok = netip.AddrFromSlice(rVia.Addr)
  568. }
  569. }
  570. if gwAddr.IsValid() {
  571. gwAddr = gwAddr.Unmap()
  572. return gwAddr, true
  573. }
  574. return netip.Addr{}, false
  575. }
  576. func (t *tun) updateRoutes(r netlink.RouteUpdate) {
  577. gateways := t.getGatewaysFromRoute(&r.Route)
  578. if len(gateways) == 0 {
  579. // No gateways relevant to our network, no routing changes required.
  580. t.l.WithField("route", r).Debug("Ignoring route update, no gateways")
  581. return
  582. }
  583. if r.Dst == nil {
  584. t.l.WithField("route", r).Debug("Ignoring route update, no destination address")
  585. return
  586. }
  587. dstAddr, ok := netip.AddrFromSlice(r.Dst.IP)
  588. if !ok {
  589. t.l.WithField("route", r).Debug("Ignoring route update, invalid destination address")
  590. return
  591. }
  592. ones, _ := r.Dst.Mask.Size()
  593. dst := netip.PrefixFrom(dstAddr, ones)
  594. newTree := t.routeTree.Load().Clone()
  595. if r.Type == unix.RTM_NEWROUTE {
  596. t.l.WithField("destination", dst).WithField("via", gateways).Info("Adding route")
  597. newTree.Insert(dst, gateways)
  598. } else {
  599. t.l.WithField("destination", dst).WithField("via", gateways).Info("Removing route")
  600. newTree.Delete(dst)
  601. }
  602. t.routeTree.Store(newTree)
  603. }
  604. func (t *tun) Close() error {
  605. if t.routeChan != nil {
  606. close(t.routeChan)
  607. }
  608. for _, v := range t.vdev {
  609. if v != nil {
  610. _ = v.Close()
  611. }
  612. }
  613. if t.file != nil {
  614. _ = t.file.Close()
  615. }
  616. if t.ioctlFd > 0 {
  617. _ = os.NewFile(t.ioctlFd, "ioctlFd").Close()
  618. }
  619. return nil
  620. }
  621. func (t *tun) ReadMany(p []TunPacket, q int) (int, error) {
  622. err := t.vdev[q].ReceiveQueue.WaitForUsedElements(context.TODO())
  623. if err != nil {
  624. return 0, err
  625. }
  626. i := 0
  627. for i = 0; i < len(p); i++ {
  628. item, ok := t.vdev[q].ReceiveQueue.TakeSingleNoBlock()
  629. if !ok {
  630. break
  631. }
  632. pkt := p[i].(*vhostnet.VirtIOPacket) //todo I'm not happy about this but I don't want to change how memory is "owned" rn
  633. _, err = t.vdev[q].ProcessRxChain(pkt, item)
  634. if err != nil {
  635. return i, err
  636. }
  637. i++
  638. }
  639. return i, nil
  640. }
  641. func (t *tun) Write(b []byte) (int, error) {
  642. maximum := len(b) //we are RXing
  643. //todo garbagey
  644. out := packet.NewOut()
  645. x, err := t.AllocSeg(out, 0)
  646. if err != nil {
  647. return 0, err
  648. }
  649. copy(out.SegmentPayloads[x], b)
  650. err = t.vdev[0].TransmitPacket(out, true)
  651. if err != nil {
  652. t.l.WithError(err).Error("Transmitting packet")
  653. return 0, err
  654. }
  655. return maximum, nil
  656. }
  657. func (t *tun) AllocSeg(pkt *packet.OutPacket, q int) (int, error) {
  658. idx, buf, err := t.vdev[q].GetPacketForTx()
  659. if err != nil {
  660. return 0, err
  661. }
  662. x := pkt.UseSegment(idx, buf, t.isV6)
  663. return x, nil
  664. }
  665. func (t *tun) WriteOne(x *packet.OutPacket, kick bool, q int) (int, error) {
  666. if err := t.vdev[q].TransmitPacket(x, kick); err != nil {
  667. t.l.WithError(err).Error("Transmitting packet")
  668. return 0, err
  669. }
  670. return 1, nil
  671. }
  672. func (t *tun) WriteMany(x []*packet.OutPacket, q int) (int, error) {
  673. maximum := len(x) //we are RXing
  674. if maximum == 0 {
  675. return 0, nil
  676. }
  677. err := t.vdev[q].TransmitPackets(x)
  678. if err != nil {
  679. t.l.WithError(err).Error("Transmitting packet")
  680. return 0, err
  681. }
  682. return maximum, nil
  683. }
  684. func (t *tun) RecycleRxSeg(pkt TunPacket, kick bool, q int) error {
  685. if pkt.GetPayload() == nil {
  686. return nil
  687. }
  688. vpkt := pkt.(*vhostnet.VirtIOPacket)
  689. err := t.vdev[q].ReceiveQueue.OfferDescriptorChains([]uint16{vpkt.Chain}, kick)
  690. vpkt.Reset() //intentionally ignoring err!
  691. return err
  692. }