2021-10-21 15:24:11 -06:00
|
|
|
//go:build !android && !e2e_testing
|
|
|
|
// +build !android,!e2e_testing
|
2020-07-01 09:20:52 -06:00
|
|
|
|
2021-11-11 15:37:29 -07:00
|
|
|
package overlay
|
2019-11-19 10:00:20 -07:00
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
"net"
|
2024-07-31 09:18:56 -06:00
|
|
|
"net/netip"
|
2019-11-19 10:00:20 -07:00
|
|
|
"os"
|
|
|
|
"strings"
|
2023-05-09 09:36:55 -06:00
|
|
|
"sync/atomic"
|
2019-11-19 10:00:20 -07:00
|
|
|
"unsafe"
|
|
|
|
|
2024-07-31 09:18:56 -06:00
|
|
|
"github.com/gaissmai/bart"
|
2021-03-26 08:46:30 -06:00
|
|
|
"github.com/sirupsen/logrus"
|
2024-03-28 14:17:28 -06:00
|
|
|
"github.com/slackhq/nebula/config"
|
|
|
|
"github.com/slackhq/nebula/util"
|
2019-11-19 10:00:20 -07:00
|
|
|
"github.com/vishvananda/netlink"
|
|
|
|
"golang.org/x/sys/unix"
|
|
|
|
)
|
|
|
|
|
2021-11-12 09:47:36 -07:00
|
|
|
type tun struct {
|
2019-11-19 10:00:20 -07:00
|
|
|
io.ReadWriteCloser
|
2024-03-28 14:17:28 -06:00
|
|
|
fd int
|
|
|
|
Device string
|
2024-07-31 09:18:56 -06:00
|
|
|
cidr netip.Prefix
|
2024-03-28 14:17:28 -06:00
|
|
|
MaxMTU int
|
|
|
|
DefaultMTU int
|
|
|
|
TXQueueLen int
|
|
|
|
deviceIndex int
|
|
|
|
ioctlFd uintptr
|
|
|
|
|
|
|
|
Routes atomic.Pointer[[]Route]
|
2024-07-31 09:18:56 -06:00
|
|
|
routeTree atomic.Pointer[bart.Table[netip.Addr]]
|
2023-05-09 09:36:55 -06:00
|
|
|
routeChan chan struct{}
|
|
|
|
useSystemRoutes bool
|
|
|
|
|
|
|
|
l *logrus.Logger
|
2019-11-19 10:00:20 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
type ifReq struct {
|
|
|
|
Name [16]byte
|
|
|
|
Flags uint16
|
|
|
|
pad [8]byte
|
|
|
|
}
|
|
|
|
|
|
|
|
type ifreqAddr struct {
|
|
|
|
Name [16]byte
|
Add linux-386, linux-ppc64le targets (#56)
* Use golang.org/x/sys/unix for _linux.go sources
To support builds on GOARCH=386 and possibly elsewhere, it's necessary
to use the x/sys/unix package instead of the syscall package. This is
because the syscall package is frozen and does not support
SYS_GETSOCKNAME, SYS_RECVFROM, nor SYS_SENDTO for GOARCH=386.
This commit alone doesn't add support for 386 builds, just gets things
onto x/sys/unix so that it's possible.
The remaining uses of the syscall package relate to signals, which
cannot be switched to the x/sys/unix package at this time. Windows
support breaks, so they can either continue using the syscall package
(it's frozen, this is safe for Go 1.x at minimum), or something can be
written to just use both windows- and unix-compatible signals.
* Add linux-386, ppc64le targets to Makefile
Because 'linux' is linux-amd64 already, just add linux-386 and
linux-ppc64le targets to distinguish them. Would rename the linux
target but that might break existing uses.
2019-12-11 18:51:55 -07:00
|
|
|
Addr unix.RawSockaddrInet4
|
2019-11-19 10:00:20 -07:00
|
|
|
pad [8]byte
|
|
|
|
}
|
|
|
|
|
|
|
|
type ifreqMTU struct {
|
|
|
|
Name [16]byte
|
2019-11-25 12:21:48 -07:00
|
|
|
MTU int32
|
2019-11-19 10:00:20 -07:00
|
|
|
pad [8]byte
|
|
|
|
}
|
|
|
|
|
|
|
|
type ifreqQLEN struct {
|
|
|
|
Name [16]byte
|
2019-12-11 13:02:57 -07:00
|
|
|
Value int32
|
2019-11-19 10:00:20 -07:00
|
|
|
pad [8]byte
|
|
|
|
}
|
|
|
|
|
2024-07-31 09:18:56 -06:00
|
|
|
func newTunFromFd(c *config.C, l *logrus.Logger, deviceFd int, cidr netip.Prefix) (*tun, error) {
|
2024-03-28 14:17:28 -06:00
|
|
|
file := os.NewFile(uintptr(deviceFd), "/dev/net/tun")
|
|
|
|
|
|
|
|
t, err := newTunGeneric(c, l, file, cidr)
|
2021-11-12 10:19:28 -07:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2020-06-30 12:48:58 -06:00
|
|
|
|
2024-03-28 14:17:28 -06:00
|
|
|
t.Device = "tun0"
|
2020-06-30 12:48:58 -06:00
|
|
|
|
2023-05-09 09:36:55 -06:00
|
|
|
return t, nil
|
2020-06-30 12:48:58 -06:00
|
|
|
}
|
|
|
|
|
2024-07-31 09:18:56 -06:00
|
|
|
func newTun(c *config.C, l *logrus.Logger, cidr netip.Prefix, multiqueue bool) (*tun, error) {
|
2019-11-19 10:00:20 -07:00
|
|
|
fd, err := unix.Open("/dev/net/tun", os.O_RDWR, 0)
|
|
|
|
if err != nil {
|
2024-05-02 07:37:11 -06:00
|
|
|
// If /dev/net/tun doesn't exist, try to create it (will happen in docker)
|
|
|
|
if os.IsNotExist(err) {
|
|
|
|
err = os.MkdirAll("/dev/net", 0755)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("/dev/net/tun doesn't exist, failed to mkdir -p /dev/net: %w", err)
|
|
|
|
}
|
|
|
|
err = unix.Mknod("/dev/net/tun", unix.S_IFCHR|0600, int(unix.Mkdev(10, 200)))
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to create /dev/net/tun: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
fd, err = unix.Open("/dev/net/tun", os.O_RDWR, 0)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("created /dev/net/tun, but still failed: %w", err)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
return nil, err
|
|
|
|
}
|
2019-11-19 10:00:20 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
var req ifReq
|
2021-11-12 09:47:36 -07:00
|
|
|
req.Flags = uint16(unix.IFF_TUN | unix.IFF_NO_PI)
|
2021-02-25 13:01:14 -07:00
|
|
|
if multiqueue {
|
2021-11-12 09:47:36 -07:00
|
|
|
req.Flags |= unix.IFF_MULTI_QUEUE
|
2021-02-25 13:01:14 -07:00
|
|
|
}
|
2024-03-28 14:17:28 -06:00
|
|
|
copy(req.Name[:], c.GetString("tun.dev", ""))
|
Add linux-386, linux-ppc64le targets (#56)
* Use golang.org/x/sys/unix for _linux.go sources
To support builds on GOARCH=386 and possibly elsewhere, it's necessary
to use the x/sys/unix package instead of the syscall package. This is
because the syscall package is frozen and does not support
SYS_GETSOCKNAME, SYS_RECVFROM, nor SYS_SENDTO for GOARCH=386.
This commit alone doesn't add support for 386 builds, just gets things
onto x/sys/unix so that it's possible.
The remaining uses of the syscall package relate to signals, which
cannot be switched to the x/sys/unix package at this time. Windows
support breaks, so they can either continue using the syscall package
(it's frozen, this is safe for Go 1.x at minimum), or something can be
written to just use both windows- and unix-compatible signals.
* Add linux-386, ppc64le targets to Makefile
Because 'linux' is linux-amd64 already, just add linux-386 and
linux-ppc64le targets to distinguish them. Would rename the linux
target but that might break existing uses.
2019-12-11 18:51:55 -07:00
|
|
|
if err = ioctl(uintptr(fd), uintptr(unix.TUNSETIFF), uintptr(unsafe.Pointer(&req))); err != nil {
|
2021-02-25 13:01:14 -07:00
|
|
|
return nil, err
|
2019-11-19 10:00:20 -07:00
|
|
|
}
|
|
|
|
name := strings.Trim(string(req.Name[:]), "\x00")
|
|
|
|
|
|
|
|
file := os.NewFile(uintptr(fd), "/dev/net/tun")
|
2024-03-28 14:17:28 -06:00
|
|
|
t, err := newTunGeneric(c, l, file, cidr)
|
2021-11-12 10:19:28 -07:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2024-03-28 14:17:28 -06:00
|
|
|
t.Device = name
|
|
|
|
|
|
|
|
return t, nil
|
|
|
|
}
|
|
|
|
|
2024-07-31 09:18:56 -06:00
|
|
|
func newTunGeneric(c *config.C, l *logrus.Logger, file *os.File, cidr netip.Prefix) (*tun, error) {
|
2023-05-09 09:36:55 -06:00
|
|
|
t := &tun{
|
2019-11-19 10:00:20 -07:00
|
|
|
ReadWriteCloser: file,
|
|
|
|
fd: int(file.Fd()),
|
2021-11-12 11:47:09 -07:00
|
|
|
cidr: cidr,
|
2024-03-28 14:17:28 -06:00
|
|
|
TXQueueLen: c.GetInt("tun.tx_queue", 500),
|
|
|
|
useSystemRoutes: c.GetBool("tun.use_system_route_table", false),
|
2021-03-26 08:46:30 -06:00
|
|
|
l: l,
|
2023-05-09 09:36:55 -06:00
|
|
|
}
|
2024-03-28 14:17:28 -06:00
|
|
|
|
|
|
|
err := t.reload(c, true)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
c.RegisterReloadCallback(func(c *config.C) {
|
|
|
|
err := t.reload(c, false)
|
|
|
|
if err != nil {
|
|
|
|
util.LogWithContextIfNeeded("failed to reload tun device", err, t.l)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
2023-05-09 09:36:55 -06:00
|
|
|
return t, nil
|
2019-11-19 10:00:20 -07:00
|
|
|
}
|
|
|
|
|
2024-03-28 14:17:28 -06:00
|
|
|
func (t *tun) reload(c *config.C, initial bool) error {
|
|
|
|
routeChange, routes, err := getAllRoutesFromConfig(c, t.cidr, initial)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if !initial && !routeChange && !c.HasChanged("tun.mtu") {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
routeTree, err := makeRouteTree(t.l, routes, true)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
oldDefaultMTU := t.DefaultMTU
|
|
|
|
oldMaxMTU := t.MaxMTU
|
|
|
|
newDefaultMTU := c.GetInt("tun.mtu", DefaultMTU)
|
|
|
|
newMaxMTU := newDefaultMTU
|
|
|
|
for i, r := range routes {
|
|
|
|
if r.MTU == 0 {
|
|
|
|
routes[i].MTU = newDefaultMTU
|
|
|
|
}
|
|
|
|
|
|
|
|
if r.MTU > t.MaxMTU {
|
|
|
|
newMaxMTU = r.MTU
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
t.MaxMTU = newMaxMTU
|
|
|
|
t.DefaultMTU = newDefaultMTU
|
|
|
|
|
|
|
|
// Teach nebula how to handle the routes before establishing them in the system table
|
|
|
|
oldRoutes := t.Routes.Swap(&routes)
|
|
|
|
t.routeTree.Store(routeTree)
|
|
|
|
|
|
|
|
if !initial {
|
|
|
|
if oldMaxMTU != newMaxMTU {
|
|
|
|
t.setMTU()
|
|
|
|
t.l.Infof("Set max MTU to %v was %v", t.MaxMTU, oldMaxMTU)
|
|
|
|
}
|
|
|
|
|
|
|
|
if oldDefaultMTU != newDefaultMTU {
|
|
|
|
err := t.setDefaultRoute()
|
|
|
|
if err != nil {
|
|
|
|
t.l.Warn(err)
|
|
|
|
} else {
|
|
|
|
t.l.Infof("Set default MTU to %v was %v", t.DefaultMTU, oldDefaultMTU)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Remove first, if the system removes a wanted route hopefully it will be re-added next
|
|
|
|
t.removeRoutes(findRemovedRoutes(routes, *oldRoutes))
|
|
|
|
|
|
|
|
// Ensure any routes we actually want are installed
|
|
|
|
err = t.addRoutes(true)
|
|
|
|
if err != nil {
|
|
|
|
// This should never be called since addRoutes should log its own errors in a reload condition
|
|
|
|
util.LogWithContextIfNeeded("Failed to refresh routes", err, t.l)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2021-11-12 09:47:36 -07:00
|
|
|
func (t *tun) NewMultiQueueReader() (io.ReadWriteCloser, error) {
|
2021-02-25 13:01:14 -07:00
|
|
|
fd, err := unix.Open("/dev/net/tun", os.O_RDWR, 0)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
var req ifReq
|
2021-11-12 09:47:36 -07:00
|
|
|
req.Flags = uint16(unix.IFF_TUN | unix.IFF_NO_PI | unix.IFF_MULTI_QUEUE)
|
|
|
|
copy(req.Name[:], t.Device)
|
2021-02-25 13:01:14 -07:00
|
|
|
if err = ioctl(uintptr(fd), uintptr(unix.TUNSETIFF), uintptr(unsafe.Pointer(&req))); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
file := os.NewFile(uintptr(fd), "/dev/net/tun")
|
|
|
|
|
|
|
|
return file, nil
|
|
|
|
}
|
|
|
|
|
2024-07-31 09:18:56 -06:00
|
|
|
func (t *tun) RouteFor(ip netip.Addr) netip.Addr {
|
|
|
|
r, _ := t.routeTree.Load().Lookup(ip)
|
2023-11-02 16:05:08 -06:00
|
|
|
return r
|
2021-11-12 10:19:28 -07:00
|
|
|
}
|
|
|
|
|
2021-11-12 11:47:09 -07:00
|
|
|
func (t *tun) Write(b []byte) (int, error) {
|
2019-11-19 10:00:20 -07:00
|
|
|
var nn int
|
2021-11-12 11:47:09 -07:00
|
|
|
max := len(b)
|
|
|
|
|
2019-11-19 10:00:20 -07:00
|
|
|
for {
|
2021-11-12 09:47:36 -07:00
|
|
|
n, err := unix.Write(t.fd, b[nn:max])
|
2019-11-19 10:00:20 -07:00
|
|
|
if n > 0 {
|
|
|
|
nn += n
|
|
|
|
}
|
|
|
|
if nn == len(b) {
|
2021-11-12 11:47:09 -07:00
|
|
|
return nn, err
|
2019-11-19 10:00:20 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
if err != nil {
|
2021-11-12 11:47:09 -07:00
|
|
|
return nn, err
|
2019-11-19 10:00:20 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
if n == 0 {
|
2021-11-12 11:47:09 -07:00
|
|
|
return nn, io.ErrUnexpectedEOF
|
2019-11-19 10:00:20 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-05-09 09:36:55 -06:00
|
|
|
func (t *tun) deviceBytes() (o [16]byte) {
|
2021-11-12 09:47:36 -07:00
|
|
|
for i, c := range t.Device {
|
2019-11-19 10:00:20 -07:00
|
|
|
o[i] = byte(c)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-05-09 09:36:55 -06:00
|
|
|
func (t *tun) Activate() error {
|
2021-11-12 09:47:36 -07:00
|
|
|
devName := t.deviceBytes()
|
2019-11-19 10:00:20 -07:00
|
|
|
|
2023-05-09 09:36:55 -06:00
|
|
|
if t.useSystemRoutes {
|
|
|
|
t.watchRoutes()
|
|
|
|
}
|
|
|
|
|
2019-11-19 10:00:20 -07:00
|
|
|
var addr, mask [4]byte
|
|
|
|
|
2024-07-31 09:18:56 -06:00
|
|
|
//TODO: IPV6-WORK
|
|
|
|
addr = t.cidr.Addr().As4()
|
|
|
|
tmask := net.CIDRMask(t.cidr.Bits(), 32)
|
|
|
|
copy(mask[:], tmask)
|
2019-11-19 10:00:20 -07:00
|
|
|
|
Add linux-386, linux-ppc64le targets (#56)
* Use golang.org/x/sys/unix for _linux.go sources
To support builds on GOARCH=386 and possibly elsewhere, it's necessary
to use the x/sys/unix package instead of the syscall package. This is
because the syscall package is frozen and does not support
SYS_GETSOCKNAME, SYS_RECVFROM, nor SYS_SENDTO for GOARCH=386.
This commit alone doesn't add support for 386 builds, just gets things
onto x/sys/unix so that it's possible.
The remaining uses of the syscall package relate to signals, which
cannot be switched to the x/sys/unix package at this time. Windows
support breaks, so they can either continue using the syscall package
(it's frozen, this is safe for Go 1.x at minimum), or something can be
written to just use both windows- and unix-compatible signals.
* Add linux-386, ppc64le targets to Makefile
Because 'linux' is linux-amd64 already, just add linux-386 and
linux-ppc64le targets to distinguish them. Would rename the linux
target but that might break existing uses.
2019-12-11 18:51:55 -07:00
|
|
|
s, err := unix.Socket(
|
|
|
|
unix.AF_INET,
|
|
|
|
unix.SOCK_DGRAM,
|
|
|
|
unix.IPPROTO_IP,
|
2019-11-19 10:00:20 -07:00
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2024-03-28 14:17:28 -06:00
|
|
|
t.ioctlFd = uintptr(s)
|
2019-11-19 10:00:20 -07:00
|
|
|
|
|
|
|
ifra := ifreqAddr{
|
|
|
|
Name: devName,
|
Add linux-386, linux-ppc64le targets (#56)
* Use golang.org/x/sys/unix for _linux.go sources
To support builds on GOARCH=386 and possibly elsewhere, it's necessary
to use the x/sys/unix package instead of the syscall package. This is
because the syscall package is frozen and does not support
SYS_GETSOCKNAME, SYS_RECVFROM, nor SYS_SENDTO for GOARCH=386.
This commit alone doesn't add support for 386 builds, just gets things
onto x/sys/unix so that it's possible.
The remaining uses of the syscall package relate to signals, which
cannot be switched to the x/sys/unix package at this time. Windows
support breaks, so they can either continue using the syscall package
(it's frozen, this is safe for Go 1.x at minimum), or something can be
written to just use both windows- and unix-compatible signals.
* Add linux-386, ppc64le targets to Makefile
Because 'linux' is linux-amd64 already, just add linux-386 and
linux-ppc64le targets to distinguish them. Would rename the linux
target but that might break existing uses.
2019-12-11 18:51:55 -07:00
|
|
|
Addr: unix.RawSockaddrInet4{
|
|
|
|
Family: unix.AF_INET,
|
2019-11-19 10:00:20 -07:00
|
|
|
Addr: addr,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set the device ip address
|
2024-03-28 14:17:28 -06:00
|
|
|
if err = ioctl(t.ioctlFd, unix.SIOCSIFADDR, uintptr(unsafe.Pointer(&ifra))); err != nil {
|
2019-11-24 00:18:03 -07:00
|
|
|
return fmt.Errorf("failed to set tun address: %s", err)
|
2019-11-19 10:00:20 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
// Set the device network
|
|
|
|
ifra.Addr.Addr = mask
|
2024-03-28 14:17:28 -06:00
|
|
|
if err = ioctl(t.ioctlFd, unix.SIOCSIFNETMASK, uintptr(unsafe.Pointer(&ifra))); err != nil {
|
2019-11-24 00:18:03 -07:00
|
|
|
return fmt.Errorf("failed to set tun netmask: %s", err)
|
2019-11-19 10:00:20 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
// Set the device name
|
|
|
|
ifrf := ifReq{Name: devName}
|
2024-03-28 14:17:28 -06:00
|
|
|
if err = ioctl(t.ioctlFd, unix.SIOCGIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
|
2019-11-24 00:18:03 -07:00
|
|
|
return fmt.Errorf("failed to set tun device name: %s", err)
|
2019-11-19 10:00:20 -07:00
|
|
|
}
|
|
|
|
|
2024-03-28 14:17:28 -06:00
|
|
|
// Setup our default MTU
|
|
|
|
t.setMTU()
|
2019-11-19 10:00:20 -07:00
|
|
|
|
|
|
|
// Set the transmit queue length
|
2021-11-12 09:47:36 -07:00
|
|
|
ifrq := ifreqQLEN{Name: devName, Value: int32(t.TXQueueLen)}
|
2024-03-28 14:17:28 -06:00
|
|
|
if err = ioctl(t.ioctlFd, unix.SIOCSIFTXQLEN, uintptr(unsafe.Pointer(&ifrq))); err != nil {
|
2019-12-20 10:10:26 -07:00
|
|
|
// If we can't set the queue length nebula will still work but it may lead to packet loss
|
2021-11-12 09:47:36 -07:00
|
|
|
t.l.WithError(err).Error("Failed to set tun tx queue length")
|
2019-11-19 10:00:20 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
// Bring up the interface
|
Add linux-386, linux-ppc64le targets (#56)
* Use golang.org/x/sys/unix for _linux.go sources
To support builds on GOARCH=386 and possibly elsewhere, it's necessary
to use the x/sys/unix package instead of the syscall package. This is
because the syscall package is frozen and does not support
SYS_GETSOCKNAME, SYS_RECVFROM, nor SYS_SENDTO for GOARCH=386.
This commit alone doesn't add support for 386 builds, just gets things
onto x/sys/unix so that it's possible.
The remaining uses of the syscall package relate to signals, which
cannot be switched to the x/sys/unix package at this time. Windows
support breaks, so they can either continue using the syscall package
(it's frozen, this is safe for Go 1.x at minimum), or something can be
written to just use both windows- and unix-compatible signals.
* Add linux-386, ppc64le targets to Makefile
Because 'linux' is linux-amd64 already, just add linux-386 and
linux-ppc64le targets to distinguish them. Would rename the linux
target but that might break existing uses.
2019-12-11 18:51:55 -07:00
|
|
|
ifrf.Flags = ifrf.Flags | unix.IFF_UP
|
2024-03-28 14:17:28 -06:00
|
|
|
if err = ioctl(t.ioctlFd, unix.SIOCSIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
|
2019-11-24 00:18:03 -07:00
|
|
|
return fmt.Errorf("failed to bring the tun device up: %s", err)
|
2019-11-19 10:00:20 -07:00
|
|
|
}
|
|
|
|
|
2021-11-12 09:47:36 -07:00
|
|
|
link, err := netlink.LinkByName(t.Device)
|
2019-11-19 10:00:20 -07:00
|
|
|
if err != nil {
|
2019-11-24 00:18:03 -07:00
|
|
|
return fmt.Errorf("failed to get tun device link: %s", err)
|
2019-11-19 10:00:20 -07:00
|
|
|
}
|
2024-03-28 14:17:28 -06:00
|
|
|
t.deviceIndex = link.Attrs().Index
|
|
|
|
|
|
|
|
if err = t.setDefaultRoute(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set the routes
|
|
|
|
if err = t.addRoutes(false); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-11-19 10:00:20 -07:00
|
|
|
|
2024-03-28 14:17:28 -06:00
|
|
|
// Run the interface
|
|
|
|
ifrf.Flags = ifrf.Flags | unix.IFF_UP | unix.IFF_RUNNING
|
|
|
|
if err = ioctl(t.ioctlFd, unix.SIOCSIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
|
|
|
|
return fmt.Errorf("failed to run tun device: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (t *tun) setMTU() {
|
|
|
|
// Set the MTU on the device
|
|
|
|
ifm := ifreqMTU{Name: t.deviceBytes(), MTU: int32(t.MaxMTU)}
|
|
|
|
if err := ioctl(t.ioctlFd, unix.SIOCSIFMTU, uintptr(unsafe.Pointer(&ifm))); err != nil {
|
|
|
|
// This is currently a non fatal condition because the route table must have the MTU set appropriately as well
|
|
|
|
t.l.WithError(err).Error("Failed to set tun mtu")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (t *tun) setDefaultRoute() error {
|
2019-11-19 10:00:20 -07:00
|
|
|
// Default route
|
2024-07-31 09:18:56 -06:00
|
|
|
|
|
|
|
dr := &net.IPNet{
|
|
|
|
IP: t.cidr.Masked().Addr().AsSlice(),
|
|
|
|
Mask: net.CIDRMask(t.cidr.Bits(), t.cidr.Addr().BitLen()),
|
|
|
|
}
|
|
|
|
|
2019-11-19 10:00:20 -07:00
|
|
|
nr := netlink.Route{
|
2024-03-28 14:17:28 -06:00
|
|
|
LinkIndex: t.deviceIndex,
|
2019-11-19 10:00:20 -07:00
|
|
|
Dst: dr,
|
2021-11-12 09:47:36 -07:00
|
|
|
MTU: t.DefaultMTU,
|
|
|
|
AdvMSS: t.advMSS(Route{}),
|
2019-11-19 10:00:20 -07:00
|
|
|
Scope: unix.RT_SCOPE_LINK,
|
2024-07-31 09:18:56 -06:00
|
|
|
Src: net.IP(t.cidr.Addr().AsSlice()),
|
2019-11-19 10:00:20 -07:00
|
|
|
Protocol: unix.RTPROT_KERNEL,
|
|
|
|
Table: unix.RT_TABLE_MAIN,
|
|
|
|
Type: unix.RTN_UNICAST,
|
|
|
|
}
|
2024-03-28 14:17:28 -06:00
|
|
|
err := netlink.RouteReplace(&nr)
|
2019-11-19 10:00:20 -07:00
|
|
|
if err != nil {
|
2021-11-12 09:47:36 -07:00
|
|
|
return fmt.Errorf("failed to set mtu %v on the default route %v; %v", t.DefaultMTU, dr, err)
|
2019-11-19 10:00:20 -07:00
|
|
|
}
|
|
|
|
|
2024-03-28 14:17:28 -06:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (t *tun) addRoutes(logErrors bool) error {
|
2019-11-19 10:00:20 -07:00
|
|
|
// Path routes
|
2024-03-28 14:17:28 -06:00
|
|
|
routes := *t.Routes.Load()
|
|
|
|
for _, r := range routes {
|
2023-04-10 11:32:37 -06:00
|
|
|
if !r.Install {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2024-07-31 09:18:56 -06:00
|
|
|
dr := &net.IPNet{
|
|
|
|
IP: r.Cidr.Masked().Addr().AsSlice(),
|
|
|
|
Mask: net.CIDRMask(r.Cidr.Bits(), r.Cidr.Addr().BitLen()),
|
|
|
|
}
|
|
|
|
|
2019-11-19 10:00:20 -07:00
|
|
|
nr := netlink.Route{
|
2024-03-28 14:17:28 -06:00
|
|
|
LinkIndex: t.deviceIndex,
|
2024-07-31 09:18:56 -06:00
|
|
|
Dst: dr,
|
2021-11-11 15:37:29 -07:00
|
|
|
MTU: r.MTU,
|
2021-11-12 09:47:36 -07:00
|
|
|
AdvMSS: t.advMSS(r),
|
2019-11-19 10:00:20 -07:00
|
|
|
Scope: unix.RT_SCOPE_LINK,
|
|
|
|
}
|
|
|
|
|
2021-11-12 10:19:28 -07:00
|
|
|
if r.Metric > 0 {
|
|
|
|
nr.Priority = r.Metric
|
2019-12-12 09:34:17 -07:00
|
|
|
}
|
|
|
|
|
2024-03-28 14:17:28 -06:00
|
|
|
err := netlink.RouteReplace(&nr)
|
2019-12-12 09:34:17 -07:00
|
|
|
if err != nil {
|
2024-03-28 14:17:28 -06:00
|
|
|
retErr := util.NewContextualError("Failed to add route", map[string]interface{}{"route": r}, err)
|
|
|
|
if logErrors {
|
|
|
|
retErr.Log(t.l)
|
|
|
|
} else {
|
|
|
|
return retErr
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
t.l.WithField("route", r).Info("Added route")
|
2019-12-12 09:34:17 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-11-19 10:00:20 -07:00
|
|
|
return nil
|
|
|
|
}
|
2020-06-26 11:47:21 -06:00
|
|
|
|
2024-03-28 14:17:28 -06:00
|
|
|
func (t *tun) removeRoutes(routes []Route) {
|
|
|
|
for _, r := range routes {
|
|
|
|
if !r.Install {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2024-07-31 09:18:56 -06:00
|
|
|
dr := &net.IPNet{
|
|
|
|
IP: r.Cidr.Masked().Addr().AsSlice(),
|
|
|
|
Mask: net.CIDRMask(r.Cidr.Bits(), r.Cidr.Addr().BitLen()),
|
|
|
|
}
|
|
|
|
|
2024-03-28 14:17:28 -06:00
|
|
|
nr := netlink.Route{
|
|
|
|
LinkIndex: t.deviceIndex,
|
2024-07-31 09:18:56 -06:00
|
|
|
Dst: dr,
|
2024-03-28 14:17:28 -06:00
|
|
|
MTU: r.MTU,
|
|
|
|
AdvMSS: t.advMSS(r),
|
|
|
|
Scope: unix.RT_SCOPE_LINK,
|
|
|
|
}
|
|
|
|
|
|
|
|
if r.Metric > 0 {
|
|
|
|
nr.Priority = r.Metric
|
|
|
|
}
|
|
|
|
|
|
|
|
err := netlink.RouteDel(&nr)
|
|
|
|
if err != nil {
|
|
|
|
t.l.WithError(err).WithField("route", r).Error("Failed to remove route")
|
|
|
|
} else {
|
|
|
|
t.l.WithField("route", r).Info("Removed route")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-07-31 09:18:56 -06:00
|
|
|
func (t *tun) Cidr() netip.Prefix {
|
2021-11-12 11:47:09 -07:00
|
|
|
return t.cidr
|
2020-07-28 06:53:16 -06:00
|
|
|
}
|
|
|
|
|
2021-11-12 11:47:09 -07:00
|
|
|
func (t *tun) Name() string {
|
2021-11-12 09:47:36 -07:00
|
|
|
return t.Device
|
2020-07-28 06:53:16 -06:00
|
|
|
}
|
|
|
|
|
2023-05-09 09:36:55 -06:00
|
|
|
func (t *tun) advMSS(r Route) int {
|
2021-11-11 15:37:29 -07:00
|
|
|
mtu := r.MTU
|
|
|
|
if r.MTU == 0 {
|
2021-11-12 09:47:36 -07:00
|
|
|
mtu = t.DefaultMTU
|
2020-06-26 11:47:21 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
// We only need to set advmss if the route MTU does not match the device MTU
|
2021-11-12 09:47:36 -07:00
|
|
|
if mtu != t.MaxMTU {
|
2020-06-26 11:47:21 -06:00
|
|
|
return mtu - 40
|
|
|
|
}
|
|
|
|
return 0
|
|
|
|
}
|
2023-05-09 09:36:55 -06:00
|
|
|
|
|
|
|
func (t *tun) watchRoutes() {
|
|
|
|
rch := make(chan netlink.RouteUpdate)
|
|
|
|
doneChan := make(chan struct{})
|
|
|
|
|
|
|
|
if err := netlink.RouteSubscribe(rch, doneChan); err != nil {
|
|
|
|
t.l.WithError(err).Errorf("failed to subscribe to system route changes")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
t.routeChan = doneChan
|
|
|
|
|
|
|
|
go func() {
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case r := <-rch:
|
|
|
|
t.updateRoutes(r)
|
|
|
|
case <-doneChan:
|
|
|
|
// netlink.RouteSubscriber will close the rch for us
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (t *tun) updateRoutes(r netlink.RouteUpdate) {
|
|
|
|
if r.Gw == nil {
|
|
|
|
// Not a gateway route, ignore
|
|
|
|
t.l.WithField("route", r).Debug("Ignoring route update, not a gateway route")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-07-31 09:18:56 -06:00
|
|
|
//TODO: IPV6-WORK what if not ok?
|
|
|
|
gwAddr, ok := netip.AddrFromSlice(r.Gw)
|
|
|
|
if !ok {
|
|
|
|
t.l.WithField("route", r).Debug("Ignoring route update, invalid gateway address")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
gwAddr = gwAddr.Unmap()
|
|
|
|
if !t.cidr.Contains(gwAddr) {
|
2023-05-09 09:36:55 -06:00
|
|
|
// Gateway isn't in our overlay network, ignore
|
|
|
|
t.l.WithField("route", r).Debug("Ignoring route update, not in our network")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if x := r.Dst.IP.To4(); x == nil {
|
|
|
|
// Nebula only handles ipv4 on the overlay currently
|
|
|
|
t.l.WithField("route", r).Debug("Ignoring route update, destination is not ipv4")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-07-31 09:18:56 -06:00
|
|
|
dstAddr, ok := netip.AddrFromSlice(r.Dst.IP)
|
|
|
|
if !ok {
|
|
|
|
t.l.WithField("route", r).Debug("Ignoring route update, invalid destination address")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
ones, _ := r.Dst.Mask.Size()
|
|
|
|
dst := netip.PrefixFrom(dstAddr, ones)
|
|
|
|
|
|
|
|
newTree := t.routeTree.Load().Clone()
|
2023-05-09 09:36:55 -06:00
|
|
|
|
2024-07-31 09:18:56 -06:00
|
|
|
if r.Type == unix.RTM_NEWROUTE {
|
2023-05-09 09:36:55 -06:00
|
|
|
t.l.WithField("destination", r.Dst).WithField("via", r.Gw).Info("Adding route")
|
2024-07-31 09:18:56 -06:00
|
|
|
newTree.Insert(dst, gwAddr)
|
2023-05-09 09:36:55 -06:00
|
|
|
|
|
|
|
} else {
|
2024-07-31 09:18:56 -06:00
|
|
|
newTree.Delete(dst)
|
|
|
|
t.l.WithField("destination", r.Dst).WithField("via", r.Gw).Info("Removing route")
|
2023-05-09 09:36:55 -06:00
|
|
|
}
|
|
|
|
t.routeTree.Store(newTree)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (t *tun) Close() error {
|
|
|
|
if t.routeChan != nil {
|
|
|
|
close(t.routeChan)
|
|
|
|
}
|
|
|
|
|
|
|
|
if t.ReadWriteCloser != nil {
|
|
|
|
t.ReadWriteCloser.Close()
|
|
|
|
}
|
|
|
|
|
2024-03-28 14:17:28 -06:00
|
|
|
if t.ioctlFd > 0 {
|
|
|
|
os.NewFile(t.ioctlFd, "ioctlFd").Close()
|
|
|
|
}
|
|
|
|
|
2023-05-09 09:36:55 -06:00
|
|
|
return nil
|
|
|
|
}
|