device.go 7.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287
  1. package vxlan
  2. import (
  3. "fmt"
  4. "net"
  5. "os"
  6. "syscall"
  7. "time"
  8. log "github.com/coreos/flannel/Godeps/_workspace/src/github.com/golang/glog"
  9. "github.com/coreos/flannel/Godeps/_workspace/src/github.com/vishvananda/netlink"
  10. "github.com/coreos/flannel/Godeps/_workspace/src/github.com/vishvananda/netlink/nl"
  11. "github.com/coreos/flannel/pkg/ip"
  12. )
  13. type vxlanDeviceAttrs struct {
  14. vni uint32
  15. name string
  16. vtepIndex int
  17. vtepAddr net.IP
  18. vtepPort int
  19. }
  20. type vxlanDevice struct {
  21. link *netlink.Vxlan
  22. }
  23. func sysctlSet(path, value string) error {
  24. f, err := os.Create(path)
  25. if err != nil {
  26. return err
  27. }
  28. defer f.Close()
  29. _, err = f.Write([]byte(value))
  30. return err
  31. }
  32. func newVXLANDevice(devAttrs *vxlanDeviceAttrs) (*vxlanDevice, error) {
  33. link := &netlink.Vxlan{
  34. LinkAttrs: netlink.LinkAttrs{
  35. Name: devAttrs.name,
  36. },
  37. VxlanId: int(devAttrs.vni),
  38. VtepDevIndex: devAttrs.vtepIndex,
  39. SrcAddr: devAttrs.vtepAddr,
  40. Port: devAttrs.vtepPort,
  41. Learning: true,
  42. Proxy: true,
  43. L2miss: true,
  44. }
  45. link, err := ensureLink(link)
  46. if err != nil {
  47. return nil, err
  48. }
  49. // this enables ARP requests being sent to userspace via netlink
  50. sysctlPath := fmt.Sprintf("/proc/sys/net/ipv4/neigh/%s/app_solicit", devAttrs.name)
  51. sysctlSet(sysctlPath, "3")
  52. return &vxlanDevice{
  53. link: link,
  54. }, nil
  55. }
  56. func ensureLink(vxlan *netlink.Vxlan) (*netlink.Vxlan, error) {
  57. err := netlink.LinkAdd(vxlan)
  58. if err != nil {
  59. if err == syscall.EEXIST {
  60. // it's ok if the device already exists as long as config is similar
  61. existing, err := netlink.LinkByName(vxlan.Name)
  62. if err != nil {
  63. return nil, err
  64. }
  65. if incompat := vxlanLinksIncompat(vxlan, existing); incompat != "" {
  66. log.Warningf("%q already exists with incompatable configuration: %v; recreating device", vxlan.Name, incompat)
  67. // delete existing
  68. if err = netlink.LinkDel(existing); err != nil {
  69. return nil, fmt.Errorf("failed to delete interface: %v", err)
  70. }
  71. // create new
  72. if err = netlink.LinkAdd(vxlan); err != nil {
  73. return nil, fmt.Errorf("failed to create vxlan interface: %v", err)
  74. }
  75. } else {
  76. return existing.(*netlink.Vxlan), nil
  77. }
  78. } else {
  79. return nil, err
  80. }
  81. }
  82. ifindex := vxlan.Index
  83. link, err := netlink.LinkByIndex(vxlan.Index)
  84. if err != nil {
  85. return nil, fmt.Errorf("can't locate created vxlan device with index %v", ifindex)
  86. }
  87. var ok bool
  88. if vxlan, ok = link.(*netlink.Vxlan); !ok {
  89. return nil, fmt.Errorf("created vxlan device with index %v is not vxlan", ifindex)
  90. }
  91. return vxlan, nil
  92. }
  93. func (dev *vxlanDevice) Configure(ipn ip.IP4Net) error {
  94. setAddr4(dev.link, ipn.ToIPNet())
  95. if err := netlink.LinkSetUp(dev.link); err != nil {
  96. return fmt.Errorf("failed to set interface %s to UP state: %s", dev.link.Attrs().Name, err)
  97. }
  98. // explicitly add a route since there might be a route for a subnet already
  99. // installed by Docker and then it won't get auto added
  100. route := netlink.Route{
  101. LinkIndex: dev.link.Attrs().Index,
  102. Scope: netlink.SCOPE_UNIVERSE,
  103. Dst: ipn.Network().ToIPNet(),
  104. }
  105. if err := netlink.RouteAdd(&route); err != nil && err != syscall.EEXIST {
  106. return fmt.Errorf("failed to add route (%s -> %s): %v", ipn.Network().String(), dev.link.Attrs().Name, err)
  107. }
  108. return nil
  109. }
  110. func (dev *vxlanDevice) Destroy() {
  111. netlink.LinkDel(dev.link)
  112. }
  113. func (dev *vxlanDevice) MACAddr() net.HardwareAddr {
  114. return dev.link.HardwareAddr
  115. }
  116. func (dev *vxlanDevice) MTU() int {
  117. return dev.link.MTU
  118. }
  119. func (dev *vxlanDevice) MonitorMisses(misses chan *netlink.Neigh) {
  120. nlsock, err := nl.Subscribe(syscall.NETLINK_ROUTE, syscall.RTNLGRP_NEIGH)
  121. if err != nil {
  122. log.Error("Failed to subscribe to netlink RTNLGRP_NEIGH messages")
  123. return
  124. }
  125. for {
  126. msgs, err := nlsock.Recieve()
  127. if err != nil {
  128. log.Errorf("Failed to receive from netlink: %v ", err)
  129. // wait 1 sec before retrying but honor the cancel channel
  130. time.Sleep(1*time.Second)
  131. continue
  132. }
  133. for _, msg := range msgs {
  134. dev.processNeighMsg(msg, misses)
  135. }
  136. }
  137. }
  138. func isNeighResolving(state int) bool {
  139. return (state & (netlink.NUD_INCOMPLETE | netlink.NUD_STALE | netlink.NUD_DELAY | netlink.NUD_PROBE)) != 0
  140. }
  141. func (dev *vxlanDevice) processNeighMsg(msg syscall.NetlinkMessage, misses chan *netlink.Neigh) {
  142. neigh, err := netlink.NeighDeserialize(msg.Data)
  143. if err != nil {
  144. log.Error("Failed to deserialize netlink ndmsg: %v", err)
  145. return
  146. }
  147. if int(neigh.LinkIndex) != dev.link.Index {
  148. return
  149. }
  150. if msg.Header.Type != syscall.RTM_GETNEIGH && msg.Header.Type != syscall.RTM_NEWNEIGH {
  151. return
  152. }
  153. if !isNeighResolving(neigh.State) {
  154. // misses come with NUD_STALE bit set
  155. return
  156. }
  157. misses <- neigh
  158. }
  159. func (dev *vxlanDevice) AddL2(mac net.HardwareAddr, vtep net.IP) error {
  160. neigh := netlink.Neigh{
  161. LinkIndex: dev.link.Index,
  162. State: netlink.NUD_REACHABLE,
  163. Family: syscall.AF_BRIDGE,
  164. Flags: netlink.NTF_SELF,
  165. IP: vtep,
  166. HardwareAddr: mac,
  167. }
  168. log.Infof("calling NeighAdd: %v, %v", vtep, mac)
  169. return netlink.NeighAdd(&neigh)
  170. }
  171. func (dev *vxlanDevice) DelL2(mac net.HardwareAddr, vtep net.IP) error {
  172. neigh := netlink.Neigh{
  173. LinkIndex: dev.link.Index,
  174. Family: syscall.AF_BRIDGE,
  175. Flags: netlink.NTF_SELF,
  176. IP: vtep,
  177. HardwareAddr: mac,
  178. }
  179. log.Infof("calling NeighDel: %v, %v", vtep, mac)
  180. return netlink.NeighDel(&neigh)
  181. }
  182. func (dev *vxlanDevice) AddL3(ip net.IP, mac net.HardwareAddr) error {
  183. neigh := netlink.Neigh{
  184. LinkIndex: dev.link.Index,
  185. State: netlink.NUD_REACHABLE,
  186. Type: syscall.RTN_UNICAST,
  187. IP: ip,
  188. HardwareAddr: mac,
  189. }
  190. log.Infof("calling NeighSet: %v, %v", ip, mac)
  191. return netlink.NeighSet(&neigh)
  192. }
  193. func vxlanLinksIncompat(l1, l2 netlink.Link) string {
  194. if l1.Type() != l2.Type() {
  195. return fmt.Sprintf("link type: %v vs %v", l1.Type(), l2.Type())
  196. }
  197. v1 := l1.(*netlink.Vxlan)
  198. v2 := l2.(*netlink.Vxlan)
  199. if v1.VxlanId != v2.VxlanId {
  200. return fmt.Sprintf("vni: %v vs %v", v1.VxlanId, v2.VxlanId)
  201. }
  202. if v1.VtepDevIndex > 0 && v2.VtepDevIndex > 0 && v1.VtepDevIndex != v2.VtepDevIndex {
  203. return fmt.Sprintf("vtep (external) interface: %v vs %v", v1.VtepDevIndex, v2.VtepDevIndex)
  204. }
  205. if len(v1.SrcAddr) > 0 && len(v2.SrcAddr) > 0 && !v1.SrcAddr.Equal(v2.SrcAddr) {
  206. return fmt.Sprintf("vtep (external) IP: %v vs %v", v1.SrcAddr, v2.SrcAddr)
  207. }
  208. if len(v1.Group) > 0 && len(v2.Group) > 0 && !v1.Group.Equal(v2.Group) {
  209. return fmt.Sprintf("group address: %v vs %v", v1.Group, v2.Group)
  210. }
  211. if v1.L2miss != v2.L2miss {
  212. return fmt.Sprintf("l2miss: %v vs %v", v1.L2miss, v2.L2miss)
  213. }
  214. if v1.Port > 0 && v2.Port > 0 && v1.Port != v2.Port {
  215. return fmt.Sprintf("port: %v vs %v", v1.Port, v2.Port)
  216. }
  217. return ""
  218. }
  219. // sets IP4 addr on link removing any existing ones first
  220. func setAddr4(link *netlink.Vxlan, ipn *net.IPNet) error {
  221. addrs, err := netlink.AddrList(link, syscall.AF_INET)
  222. if err != nil {
  223. return err
  224. }
  225. for _, addr := range addrs {
  226. if err = netlink.AddrDel(link, &addr); err != nil {
  227. return fmt.Errorf("failed to delete IPv4 addr %s from %s", addr.String(), link.Attrs().Name)
  228. }
  229. }
  230. addr := netlink.Addr{ ipn, "" }
  231. if err = netlink.AddrAdd(link, &addr); err != nil {
  232. return fmt.Errorf("failed to add IP address %s to %s: %s", ipn.String(), link.Attrs().Name, err)
  233. }
  234. return nil
  235. }