0938100596
We are going to introduce a variant of the function to use vhost-user buffers rather than passt internal buffers. Signed-off-by: Laurent Vivier <lvivier@redhat.com>
400 lines
10 KiB
C
400 lines
10 KiB
C
// SPDX-License-Identifier: GPL-2.0-or-later
|
|
|
|
/* PASST - Plug A Simple Socket Transport
|
|
* for qemu/UNIX domain socket mode
|
|
*
|
|
* PASTA - Pack A Subtle Tap Abstraction
|
|
* for network namespace/tap device mode
|
|
*
|
|
* passt.c - Daemon implementation
|
|
*
|
|
* Copyright (c) 2020-2021 Red Hat GmbH
|
|
* Author: Stefano Brivio <sbrivio@redhat.com>
|
|
*
|
|
* Grab Ethernet frames from AF_UNIX socket (in "passt" mode) or tap device (in
|
|
* "pasta" mode), build SOCK_DGRAM/SOCK_STREAM sockets for each 5-tuple from
|
|
* TCP, UDP packets, perform connection tracking and forward them. Forward
|
|
* packets received on sockets back to the UNIX domain socket (typically, a
|
|
* socket virtio_net file descriptor from qemu) or to the tap device (typically,
|
|
* created in a separate network namespace).
|
|
*/
|
|
|
|
#include <sys/epoll.h>
|
|
#include <fcntl.h>
|
|
#include <sys/mman.h>
|
|
#include <sys/resource.h>
|
|
#include <stdbool.h>
|
|
#include <stdlib.h>
|
|
#include <unistd.h>
|
|
#include <netdb.h>
|
|
#include <signal.h>
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include <errno.h>
|
|
#include <time.h>
|
|
#include <syslog.h>
|
|
#include <sys/prctl.h>
|
|
#include <netinet/if_ether.h>
|
|
#ifdef HAS_GETRANDOM
|
|
#include <sys/random.h>
|
|
#endif
|
|
|
|
#include "util.h"
|
|
#include "passt.h"
|
|
#include "dhcp.h"
|
|
#include "dhcpv6.h"
|
|
#include "isolation.h"
|
|
#include "pcap.h"
|
|
#include "tap.h"
|
|
#include "conf.h"
|
|
#include "pasta.h"
|
|
#include "arch.h"
|
|
#include "log.h"
|
|
#include "tcp_splice.h"
|
|
|
|
#define EPOLL_EVENTS 8
|
|
|
|
#define TIMER_INTERVAL__ MIN(TCP_TIMER_INTERVAL, UDP_TIMER_INTERVAL)
|
|
#define TIMER_INTERVAL_ MIN(TIMER_INTERVAL__, ICMP_TIMER_INTERVAL)
|
|
#define TIMER_INTERVAL MIN(TIMER_INTERVAL_, FLOW_TIMER_INTERVAL)
|
|
|
|
char pkt_buf[PKT_BUF_BYTES] __attribute__ ((aligned(PAGE_SIZE)));
|
|
|
|
char *epoll_type_str[] = {
|
|
[EPOLL_TYPE_TCP] = "connected TCP socket",
|
|
[EPOLL_TYPE_TCP_SPLICE] = "connected spliced TCP socket",
|
|
[EPOLL_TYPE_TCP_LISTEN] = "listening TCP socket",
|
|
[EPOLL_TYPE_TCP_TIMER] = "TCP timer",
|
|
[EPOLL_TYPE_UDP] = "UDP socket",
|
|
[EPOLL_TYPE_ICMP] = "ICMP socket",
|
|
[EPOLL_TYPE_ICMPV6] = "ICMPv6 socket",
|
|
[EPOLL_TYPE_NSQUIT_INOTIFY] = "namespace inotify watch",
|
|
[EPOLL_TYPE_NSQUIT_TIMER] = "namespace timer watch",
|
|
[EPOLL_TYPE_TAP_PASTA] = "/dev/net/tun device",
|
|
[EPOLL_TYPE_TAP_PASST] = "connected qemu socket",
|
|
[EPOLL_TYPE_TAP_LISTEN] = "listening qemu socket",
|
|
};
|
|
static_assert(ARRAY_SIZE(epoll_type_str) == EPOLL_NUM_TYPES,
|
|
"epoll_type_str[] doesn't match enum epoll_type");
|
|
|
|
/**
|
|
* post_handler() - Run periodic and deferred tasks for L4 protocol handlers
|
|
* @c: Execution context
|
|
* @now: Current timestamp
|
|
*/
|
|
static void post_handler(struct ctx *c, const struct timespec *now)
|
|
{
|
|
#define CALL_PROTO_HANDLER(c, now, lc, uc) \
|
|
do { \
|
|
extern void \
|
|
lc ## _defer_handler (struct ctx *c) \
|
|
__attribute__ ((weak)); \
|
|
\
|
|
if (!c->no_ ## lc) { \
|
|
if (lc ## _defer_handler) \
|
|
lc ## _defer_handler(c); \
|
|
\
|
|
if (timespec_diff_ms((now), &c->lc.timer_run) \
|
|
>= uc ## _TIMER_INTERVAL) { \
|
|
lc ## _timer(c, now); \
|
|
c->lc.timer_run = *now; \
|
|
} \
|
|
} \
|
|
} while (0)
|
|
|
|
/* NOLINTNEXTLINE(bugprone-branch-clone): intervals can be the same */
|
|
CALL_PROTO_HANDLER(c, now, tcp, TCP);
|
|
/* NOLINTNEXTLINE(bugprone-branch-clone): intervals can be the same */
|
|
CALL_PROTO_HANDLER(c, now, udp, UDP);
|
|
/* NOLINTNEXTLINE(bugprone-branch-clone): intervals can be the same */
|
|
CALL_PROTO_HANDLER(c, now, icmp, ICMP);
|
|
|
|
flow_defer_handler(c, now);
|
|
#undef CALL_PROTO_HANDLER
|
|
}
|
|
|
|
/**
|
|
* secret_init() - Create secret value for SipHash calculations
|
|
* @c: Execution context
|
|
*/
|
|
static void secret_init(struct ctx *c)
|
|
{
|
|
#ifndef HAS_GETRANDOM
|
|
int dev_random = open("/dev/random", O_RDONLY);
|
|
unsigned int random_read = 0;
|
|
|
|
while (dev_random && random_read < sizeof(c->hash_secret)) {
|
|
int ret = read(dev_random,
|
|
(uint8_t *)&c->hash_secret + random_read,
|
|
sizeof(c->hash_secret) - random_read);
|
|
|
|
if (ret == -1 && errno == EINTR)
|
|
continue;
|
|
|
|
if (ret <= 0)
|
|
break;
|
|
|
|
random_read += ret;
|
|
}
|
|
if (dev_random >= 0)
|
|
close(dev_random);
|
|
if (random_read < sizeof(c->hash_secret)) {
|
|
#else
|
|
if (getrandom(&c->hash_secret, sizeof(c->hash_secret),
|
|
GRND_RANDOM) < 0) {
|
|
#endif /* !HAS_GETRANDOM */
|
|
perror("TCP initial sequence getrandom");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* timer_init() - Set initial timestamp for timer runs to current time
|
|
* @c: Execution context
|
|
* @now: Current timestamp
|
|
*/
|
|
static void timer_init(struct ctx *c, const struct timespec *now)
|
|
{
|
|
c->tcp.timer_run = c->udp.timer_run = c->icmp.timer_run = *now;
|
|
}
|
|
|
|
/**
|
|
* proto_update_l2_buf() - Update scatter-gather L2 buffers in protocol handlers
|
|
* @eth_d: Ethernet destination address, NULL if unchanged
|
|
* @eth_s: Ethernet source address, NULL if unchanged
|
|
*/
|
|
void proto_update_l2_buf(const unsigned char *eth_d, const unsigned char *eth_s)
|
|
{
|
|
tcp_buf_update_l2(eth_d, eth_s);
|
|
udp_update_l2_buf(eth_d, eth_s);
|
|
}
|
|
|
|
/**
|
|
* exit_handler() - Signal handler for SIGQUIT and SIGTERM
|
|
* @unused: Unused, handler deals with SIGQUIT and SIGTERM only
|
|
*
|
|
* TODO: After unsharing the PID namespace and forking, SIG_DFL for SIGTERM and
|
|
* SIGQUIT unexpectedly doesn't cause the process to terminate, figure out why.
|
|
*
|
|
* #syscalls exit_group
|
|
*/
|
|
void exit_handler(int signal)
|
|
{
|
|
(void)signal;
|
|
|
|
exit(EXIT_SUCCESS);
|
|
}
|
|
|
|
/**
|
|
* main() - Entry point and main loop
|
|
* @argc: Argument count
|
|
* @argv: Options, plus optional target PID for pasta mode
|
|
*
|
|
* Return: non-zero on failure
|
|
*
|
|
* #syscalls read write writev
|
|
* #syscalls socket bind connect getsockopt setsockopt s390x:socketcall close
|
|
* #syscalls recvfrom sendto shutdown
|
|
* #syscalls armv6l:recv armv7l:recv ppc64le:recv
|
|
* #syscalls armv6l:send armv7l:send ppc64le:send
|
|
* #syscalls accept4|accept listen epoll_ctl epoll_wait|epoll_pwait epoll_pwait
|
|
* #syscalls clock_gettime armv6l:clock_gettime64 armv7l:clock_gettime64
|
|
*/
|
|
int main(int argc, char **argv)
|
|
{
|
|
int nfds, i, devnull_fd = -1, pidfile_fd = -1;
|
|
struct epoll_event events[EPOLL_EVENTS];
|
|
char *log_name, argv0[PATH_MAX], *name;
|
|
struct ctx c = { 0 };
|
|
struct rlimit limit;
|
|
struct timespec now;
|
|
struct sigaction sa;
|
|
|
|
arch_avx2_exec(argv);
|
|
|
|
isolate_initial();
|
|
|
|
c.pasta_netns_fd = c.fd_tap = c.fd_tap_listen = -1;
|
|
|
|
sigemptyset(&sa.sa_mask);
|
|
sa.sa_flags = 0;
|
|
sa.sa_handler = exit_handler;
|
|
sigaction(SIGTERM, &sa, NULL);
|
|
sigaction(SIGQUIT, &sa, NULL);
|
|
|
|
if (argc < 1)
|
|
exit(EXIT_FAILURE);
|
|
|
|
strncpy(argv0, argv[0], PATH_MAX - 1);
|
|
name = basename(argv0);
|
|
if (strstr(name, "pasta")) {
|
|
sa.sa_handler = pasta_child_handler;
|
|
if (sigaction(SIGCHLD, &sa, NULL)) {
|
|
die("Couldn't install signal handlers: %s",
|
|
strerror(errno));
|
|
}
|
|
|
|
if (signal(SIGPIPE, SIG_IGN) == SIG_ERR) {
|
|
die("Couldn't set disposition for SIGPIPE: %s",
|
|
strerror(errno));
|
|
}
|
|
|
|
c.mode = MODE_PASTA;
|
|
log_name = "pasta";
|
|
} else if (strstr(name, "passt")) {
|
|
c.mode = MODE_PASST;
|
|
log_name = "passt";
|
|
} else {
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
madvise(pkt_buf, TAP_BUF_BYTES, MADV_HUGEPAGE);
|
|
|
|
__openlog(log_name, 0, LOG_DAEMON);
|
|
|
|
c.epollfd = epoll_create1(EPOLL_CLOEXEC);
|
|
if (c.epollfd == -1) {
|
|
perror("epoll_create1");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
if (getrlimit(RLIMIT_NOFILE, &limit)) {
|
|
perror("getrlimit");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
c.nofile = limit.rlim_cur = limit.rlim_max;
|
|
if (setrlimit(RLIMIT_NOFILE, &limit)) {
|
|
perror("setrlimit");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
sock_probe_mem(&c);
|
|
|
|
conf(&c, argc, argv);
|
|
trace_init(c.trace);
|
|
|
|
if (c.force_stderr || isatty(fileno(stdout)))
|
|
__openlog(log_name, LOG_PERROR, LOG_DAEMON);
|
|
|
|
pasta_netns_quit_init(&c);
|
|
|
|
tap_sock_init(&c);
|
|
|
|
secret_init(&c);
|
|
|
|
clock_gettime(CLOCK_MONOTONIC, &now);
|
|
|
|
flow_init();
|
|
|
|
if ((!c.no_udp && udp_init(&c)) || (!c.no_tcp && tcp_init(&c)))
|
|
exit(EXIT_FAILURE);
|
|
|
|
if (!c.no_icmp)
|
|
icmp_init();
|
|
|
|
proto_update_l2_buf(c.mac_guest, c.mac);
|
|
|
|
if (c.ifi4 && !c.no_dhcp)
|
|
dhcp_init();
|
|
|
|
if (c.ifi6 && !c.no_dhcpv6)
|
|
dhcpv6_init(&c);
|
|
|
|
pcap_init(&c);
|
|
|
|
if (!c.foreground) {
|
|
if ((devnull_fd = open("/dev/null", O_RDWR | O_CLOEXEC)) < 0) {
|
|
perror("/dev/null open");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
}
|
|
|
|
if (*c.pid_file) {
|
|
if ((pidfile_fd = open(c.pid_file,
|
|
O_CREAT | O_TRUNC | O_WRONLY | O_CLOEXEC,
|
|
S_IRUSR | S_IWUSR)) < 0) {
|
|
perror("PID file open");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
}
|
|
|
|
if (isolate_prefork(&c))
|
|
die("Failed to sandbox process, exiting");
|
|
|
|
if (!c.foreground)
|
|
__daemon(pidfile_fd, devnull_fd);
|
|
else
|
|
write_pidfile(pidfile_fd, getpid());
|
|
|
|
if (pasta_child_pid)
|
|
kill(pasta_child_pid, SIGUSR1);
|
|
|
|
isolate_postfork(&c);
|
|
|
|
timer_init(&c, &now);
|
|
|
|
loop:
|
|
/* NOLINTNEXTLINE(bugprone-branch-clone): intervals can be the same */
|
|
/* cppcheck-suppress [duplicateValueTernary, unmatchedSuppression] */
|
|
nfds = epoll_wait(c.epollfd, events, EPOLL_EVENTS, TIMER_INTERVAL);
|
|
if (nfds == -1 && errno != EINTR) {
|
|
perror("epoll_wait");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
clock_gettime(CLOCK_MONOTONIC, &now);
|
|
|
|
for (i = 0; i < nfds; i++) {
|
|
union epoll_ref ref = *((union epoll_ref *)&events[i].data.u64);
|
|
uint32_t eventmask = events[i].events;
|
|
|
|
trace("%s: epoll event on %s %i (events: 0x%08x)",
|
|
c.mode == MODE_PASST ? "passt" : "pasta",
|
|
EPOLL_TYPE_STR(ref.type), ref.fd, eventmask);
|
|
|
|
switch (ref.type) {
|
|
case EPOLL_TYPE_TAP_PASTA:
|
|
tap_handler_pasta(&c, eventmask, &now);
|
|
break;
|
|
case EPOLL_TYPE_TAP_PASST:
|
|
tap_handler_passt(&c, eventmask, &now);
|
|
break;
|
|
case EPOLL_TYPE_TAP_LISTEN:
|
|
tap_listen_handler(&c, eventmask);
|
|
break;
|
|
case EPOLL_TYPE_NSQUIT_INOTIFY:
|
|
pasta_netns_quit_inotify_handler(&c, ref.fd);
|
|
break;
|
|
case EPOLL_TYPE_NSQUIT_TIMER:
|
|
pasta_netns_quit_timer_handler(&c, ref);
|
|
break;
|
|
case EPOLL_TYPE_TCP:
|
|
tcp_sock_handler(&c, ref, eventmask);
|
|
break;
|
|
case EPOLL_TYPE_TCP_SPLICE:
|
|
tcp_splice_sock_handler(&c, ref, eventmask);
|
|
break;
|
|
case EPOLL_TYPE_TCP_LISTEN:
|
|
tcp_listen_handler(&c, ref, &now);
|
|
break;
|
|
case EPOLL_TYPE_TCP_TIMER:
|
|
tcp_timer_handler(&c, ref);
|
|
break;
|
|
case EPOLL_TYPE_UDP:
|
|
udp_buf_sock_handler(&c, ref, eventmask, &now);
|
|
break;
|
|
case EPOLL_TYPE_ICMP:
|
|
icmp_sock_handler(&c, AF_INET, ref);
|
|
break;
|
|
case EPOLL_TYPE_ICMPV6:
|
|
icmp_sock_handler(&c, AF_INET6, ref);
|
|
break;
|
|
default:
|
|
/* Can't happen */
|
|
ASSERT(0);
|
|
}
|
|
}
|
|
|
|
post_handler(&c, &now);
|
|
|
|
goto loop;
|
|
}
|