tun_linux.go 9.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418
  1. //go:build !android && !e2e_testing
  2. // +build !android,!e2e_testing
  3. package overlay
  4. import (
  5. "bytes"
  6. "fmt"
  7. "io"
  8. "net"
  9. "os"
  10. "strings"
  11. "sync/atomic"
  12. "unsafe"
  13. "github.com/sirupsen/logrus"
  14. "github.com/slackhq/nebula/cidr"
  15. "github.com/slackhq/nebula/iputil"
  16. "github.com/vishvananda/netlink"
  17. "golang.org/x/sys/unix"
  18. )
  19. type tun struct {
  20. io.ReadWriteCloser
  21. fd int
  22. Device string
  23. cidr *net.IPNet
  24. MaxMTU int
  25. DefaultMTU int
  26. TXQueueLen int
  27. Routes []Route
  28. routeTree atomic.Pointer[cidr.Tree4]
  29. routeChan chan struct{}
  30. useSystemRoutes bool
  31. l *logrus.Logger
  32. }
  33. type ifReq struct {
  34. Name [16]byte
  35. Flags uint16
  36. pad [8]byte
  37. }
  38. type ifreqAddr struct {
  39. Name [16]byte
  40. Addr unix.RawSockaddrInet4
  41. pad [8]byte
  42. }
  43. type ifreqMTU struct {
  44. Name [16]byte
  45. MTU int32
  46. pad [8]byte
  47. }
  48. type ifreqQLEN struct {
  49. Name [16]byte
  50. Value int32
  51. pad [8]byte
  52. }
  53. func newTunFromFd(l *logrus.Logger, deviceFd int, cidr *net.IPNet, defaultMTU int, routes []Route, txQueueLen int, useSystemRoutes bool) (*tun, error) {
  54. routeTree, err := makeRouteTree(l, routes, true)
  55. if err != nil {
  56. return nil, err
  57. }
  58. file := os.NewFile(uintptr(deviceFd), "/dev/net/tun")
  59. t := &tun{
  60. ReadWriteCloser: file,
  61. fd: int(file.Fd()),
  62. Device: "tun0",
  63. cidr: cidr,
  64. DefaultMTU: defaultMTU,
  65. TXQueueLen: txQueueLen,
  66. Routes: routes,
  67. useSystemRoutes: useSystemRoutes,
  68. l: l,
  69. }
  70. t.routeTree.Store(routeTree)
  71. return t, nil
  72. }
  73. func newTun(l *logrus.Logger, deviceName string, cidr *net.IPNet, defaultMTU int, routes []Route, txQueueLen int, multiqueue bool, useSystemRoutes bool) (*tun, error) {
  74. fd, err := unix.Open("/dev/net/tun", os.O_RDWR, 0)
  75. if err != nil {
  76. return nil, err
  77. }
  78. var req ifReq
  79. req.Flags = uint16(unix.IFF_TUN | unix.IFF_NO_PI)
  80. if multiqueue {
  81. req.Flags |= unix.IFF_MULTI_QUEUE
  82. }
  83. copy(req.Name[:], deviceName)
  84. if err = ioctl(uintptr(fd), uintptr(unix.TUNSETIFF), uintptr(unsafe.Pointer(&req))); err != nil {
  85. return nil, err
  86. }
  87. name := strings.Trim(string(req.Name[:]), "\x00")
  88. file := os.NewFile(uintptr(fd), "/dev/net/tun")
  89. maxMTU := defaultMTU
  90. for _, r := range routes {
  91. if r.MTU == 0 {
  92. r.MTU = defaultMTU
  93. }
  94. if r.MTU > maxMTU {
  95. maxMTU = r.MTU
  96. }
  97. }
  98. routeTree, err := makeRouteTree(l, routes, true)
  99. if err != nil {
  100. return nil, err
  101. }
  102. t := &tun{
  103. ReadWriteCloser: file,
  104. fd: int(file.Fd()),
  105. Device: name,
  106. cidr: cidr,
  107. MaxMTU: maxMTU,
  108. DefaultMTU: defaultMTU,
  109. TXQueueLen: txQueueLen,
  110. Routes: routes,
  111. useSystemRoutes: useSystemRoutes,
  112. l: l,
  113. }
  114. t.routeTree.Store(routeTree)
  115. return t, nil
  116. }
  117. func (t *tun) NewMultiQueueReader() (io.ReadWriteCloser, error) {
  118. fd, err := unix.Open("/dev/net/tun", os.O_RDWR, 0)
  119. if err != nil {
  120. return nil, err
  121. }
  122. var req ifReq
  123. req.Flags = uint16(unix.IFF_TUN | unix.IFF_NO_PI | unix.IFF_MULTI_QUEUE)
  124. copy(req.Name[:], t.Device)
  125. if err = ioctl(uintptr(fd), uintptr(unix.TUNSETIFF), uintptr(unsafe.Pointer(&req))); err != nil {
  126. return nil, err
  127. }
  128. file := os.NewFile(uintptr(fd), "/dev/net/tun")
  129. return file, nil
  130. }
  131. func (t *tun) RouteFor(ip iputil.VpnIp) iputil.VpnIp {
  132. r := t.routeTree.Load().MostSpecificContains(ip)
  133. if r != nil {
  134. return r.(iputil.VpnIp)
  135. }
  136. return 0
  137. }
  138. func (t *tun) Write(b []byte) (int, error) {
  139. var nn int
  140. max := len(b)
  141. for {
  142. n, err := unix.Write(t.fd, b[nn:max])
  143. if n > 0 {
  144. nn += n
  145. }
  146. if nn == len(b) {
  147. return nn, err
  148. }
  149. if err != nil {
  150. return nn, err
  151. }
  152. if n == 0 {
  153. return nn, io.ErrUnexpectedEOF
  154. }
  155. }
  156. }
  157. func (t *tun) deviceBytes() (o [16]byte) {
  158. for i, c := range t.Device {
  159. o[i] = byte(c)
  160. }
  161. return
  162. }
  163. func (t *tun) Activate() error {
  164. devName := t.deviceBytes()
  165. if t.useSystemRoutes {
  166. t.watchRoutes()
  167. }
  168. var addr, mask [4]byte
  169. copy(addr[:], t.cidr.IP.To4())
  170. copy(mask[:], t.cidr.Mask)
  171. s, err := unix.Socket(
  172. unix.AF_INET,
  173. unix.SOCK_DGRAM,
  174. unix.IPPROTO_IP,
  175. )
  176. if err != nil {
  177. return err
  178. }
  179. fd := uintptr(s)
  180. ifra := ifreqAddr{
  181. Name: devName,
  182. Addr: unix.RawSockaddrInet4{
  183. Family: unix.AF_INET,
  184. Addr: addr,
  185. },
  186. }
  187. // Set the device ip address
  188. if err = ioctl(fd, unix.SIOCSIFADDR, uintptr(unsafe.Pointer(&ifra))); err != nil {
  189. return fmt.Errorf("failed to set tun address: %s", err)
  190. }
  191. // Set the device network
  192. ifra.Addr.Addr = mask
  193. if err = ioctl(fd, unix.SIOCSIFNETMASK, uintptr(unsafe.Pointer(&ifra))); err != nil {
  194. return fmt.Errorf("failed to set tun netmask: %s", err)
  195. }
  196. // Set the device name
  197. ifrf := ifReq{Name: devName}
  198. if err = ioctl(fd, unix.SIOCGIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  199. return fmt.Errorf("failed to set tun device name: %s", err)
  200. }
  201. // Set the MTU on the device
  202. ifm := ifreqMTU{Name: devName, MTU: int32(t.MaxMTU)}
  203. if err = ioctl(fd, unix.SIOCSIFMTU, uintptr(unsafe.Pointer(&ifm))); err != nil {
  204. // This is currently a non fatal condition because the route table must have the MTU set appropriately as well
  205. t.l.WithError(err).Error("Failed to set tun mtu")
  206. }
  207. // Set the transmit queue length
  208. ifrq := ifreqQLEN{Name: devName, Value: int32(t.TXQueueLen)}
  209. if err = ioctl(fd, unix.SIOCSIFTXQLEN, uintptr(unsafe.Pointer(&ifrq))); err != nil {
  210. // If we can't set the queue length nebula will still work but it may lead to packet loss
  211. t.l.WithError(err).Error("Failed to set tun tx queue length")
  212. }
  213. // Bring up the interface
  214. ifrf.Flags = ifrf.Flags | unix.IFF_UP
  215. if err = ioctl(fd, unix.SIOCSIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  216. return fmt.Errorf("failed to bring the tun device up: %s", err)
  217. }
  218. // Set the routes
  219. link, err := netlink.LinkByName(t.Device)
  220. if err != nil {
  221. return fmt.Errorf("failed to get tun device link: %s", err)
  222. }
  223. // Default route
  224. dr := &net.IPNet{IP: t.cidr.IP.Mask(t.cidr.Mask), Mask: t.cidr.Mask}
  225. nr := netlink.Route{
  226. LinkIndex: link.Attrs().Index,
  227. Dst: dr,
  228. MTU: t.DefaultMTU,
  229. AdvMSS: t.advMSS(Route{}),
  230. Scope: unix.RT_SCOPE_LINK,
  231. Src: t.cidr.IP,
  232. Protocol: unix.RTPROT_KERNEL,
  233. Table: unix.RT_TABLE_MAIN,
  234. Type: unix.RTN_UNICAST,
  235. }
  236. err = netlink.RouteReplace(&nr)
  237. if err != nil {
  238. return fmt.Errorf("failed to set mtu %v on the default route %v; %v", t.DefaultMTU, dr, err)
  239. }
  240. // Path routes
  241. for _, r := range t.Routes {
  242. if !r.Install {
  243. continue
  244. }
  245. nr := netlink.Route{
  246. LinkIndex: link.Attrs().Index,
  247. Dst: r.Cidr,
  248. MTU: r.MTU,
  249. AdvMSS: t.advMSS(r),
  250. Scope: unix.RT_SCOPE_LINK,
  251. }
  252. if r.Metric > 0 {
  253. nr.Priority = r.Metric
  254. }
  255. err = netlink.RouteAdd(&nr)
  256. if err != nil {
  257. return fmt.Errorf("failed to set mtu %v on route %v; %v", r.MTU, r.Cidr, err)
  258. }
  259. }
  260. // Run the interface
  261. ifrf.Flags = ifrf.Flags | unix.IFF_UP | unix.IFF_RUNNING
  262. if err = ioctl(fd, unix.SIOCSIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  263. return fmt.Errorf("failed to run tun device: %s", err)
  264. }
  265. return nil
  266. }
  267. func (t *tun) Cidr() *net.IPNet {
  268. return t.cidr
  269. }
  270. func (t *tun) Name() string {
  271. return t.Device
  272. }
  273. func (t *tun) advMSS(r Route) int {
  274. mtu := r.MTU
  275. if r.MTU == 0 {
  276. mtu = t.DefaultMTU
  277. }
  278. // We only need to set advmss if the route MTU does not match the device MTU
  279. if mtu != t.MaxMTU {
  280. return mtu - 40
  281. }
  282. return 0
  283. }
  284. func (t *tun) watchRoutes() {
  285. rch := make(chan netlink.RouteUpdate)
  286. doneChan := make(chan struct{})
  287. if err := netlink.RouteSubscribe(rch, doneChan); err != nil {
  288. t.l.WithError(err).Errorf("failed to subscribe to system route changes")
  289. return
  290. }
  291. t.routeChan = doneChan
  292. go func() {
  293. for {
  294. select {
  295. case r := <-rch:
  296. t.updateRoutes(r)
  297. case <-doneChan:
  298. // netlink.RouteSubscriber will close the rch for us
  299. return
  300. }
  301. }
  302. }()
  303. }
  304. func (t *tun) updateRoutes(r netlink.RouteUpdate) {
  305. if r.Gw == nil {
  306. // Not a gateway route, ignore
  307. t.l.WithField("route", r).Debug("Ignoring route update, not a gateway route")
  308. return
  309. }
  310. if !t.cidr.Contains(r.Gw) {
  311. // Gateway isn't in our overlay network, ignore
  312. t.l.WithField("route", r).Debug("Ignoring route update, not in our network")
  313. return
  314. }
  315. if x := r.Dst.IP.To4(); x == nil {
  316. // Nebula only handles ipv4 on the overlay currently
  317. t.l.WithField("route", r).Debug("Ignoring route update, destination is not ipv4")
  318. return
  319. }
  320. newTree := cidr.NewTree4()
  321. if r.Type == unix.RTM_NEWROUTE {
  322. for _, oldR := range t.routeTree.Load().List() {
  323. newTree.AddCIDR(oldR.CIDR, oldR.Value)
  324. }
  325. t.l.WithField("destination", r.Dst).WithField("via", r.Gw).Info("Adding route")
  326. newTree.AddCIDR(r.Dst, iputil.Ip2VpnIp(r.Gw))
  327. } else {
  328. gw := iputil.Ip2VpnIp(r.Gw)
  329. for _, oldR := range t.routeTree.Load().List() {
  330. if bytes.Equal(oldR.CIDR.IP, r.Dst.IP) && bytes.Equal(oldR.CIDR.Mask, r.Dst.Mask) && *oldR.Value != nil && (*oldR.Value).(iputil.VpnIp) == gw {
  331. // This is the record to delete
  332. t.l.WithField("destination", r.Dst).WithField("via", r.Gw).Info("Removing route")
  333. continue
  334. }
  335. newTree.AddCIDR(oldR.CIDR, oldR.Value)
  336. }
  337. }
  338. t.routeTree.Store(newTree)
  339. }
  340. func (t *tun) Close() error {
  341. if t.routeChan != nil {
  342. close(t.routeChan)
  343. }
  344. if t.ReadWriteCloser != nil {
  345. t.ReadWriteCloser.Close()
  346. }
  347. return nil
  348. }