tun_netbsd.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549
  1. //go:build !e2e_testing
  2. // +build !e2e_testing
  3. package overlay
  4. import (
  5. "errors"
  6. "fmt"
  7. "io"
  8. "net/netip"
  9. "os"
  10. "regexp"
  11. "sync/atomic"
  12. "syscall"
  13. "unsafe"
  14. "github.com/gaissmai/bart"
  15. "github.com/sirupsen/logrus"
  16. "github.com/slackhq/nebula/config"
  17. "github.com/slackhq/nebula/routing"
  18. "github.com/slackhq/nebula/util"
  19. netroute "golang.org/x/net/route"
  20. "golang.org/x/sys/unix"
  21. )
  22. const (
  23. SIOCAIFADDR_IN6 = 0x8080696b
  24. TUNSIFHEAD = 0x80047442
  25. TUNSIFMODE = 0x80047458
  26. )
  27. type ifreqAlias4 struct {
  28. Name [unix.IFNAMSIZ]byte
  29. Addr unix.RawSockaddrInet4
  30. DstAddr unix.RawSockaddrInet4
  31. MaskAddr unix.RawSockaddrInet4
  32. }
  33. type ifreqAlias6 struct {
  34. Name [unix.IFNAMSIZ]byte
  35. Addr unix.RawSockaddrInet6
  36. DstAddr unix.RawSockaddrInet6
  37. PrefixMask unix.RawSockaddrInet6
  38. Flags uint32
  39. Lifetime addrLifetime
  40. }
  41. type ifreq struct {
  42. Name [unix.IFNAMSIZ]byte
  43. data int
  44. }
  45. type addrLifetime struct {
  46. Expire uint64
  47. Preferred uint64
  48. Vltime uint32
  49. Pltime uint32
  50. }
  51. type tun struct {
  52. Device string
  53. vpnNetworks []netip.Prefix
  54. MTU int
  55. Routes atomic.Pointer[[]Route]
  56. routeTree atomic.Pointer[bart.Table[routing.Gateways]]
  57. l *logrus.Logger
  58. f *os.File
  59. fd int
  60. }
  61. var deviceNameRE = regexp.MustCompile(`^tun[0-9]+$`)
  62. func newTunFromFd(_ *config.C, _ *logrus.Logger, _ int, _ []netip.Prefix) (*tun, error) {
  63. return nil, fmt.Errorf("newTunFromFd not supported in NetBSD")
  64. }
  65. func newTun(c *config.C, l *logrus.Logger, vpnNetworks []netip.Prefix, _ bool) (*tun, error) {
  66. // Try to open tun device
  67. var err error
  68. deviceName := c.GetString("tun.dev", "")
  69. if deviceName == "" {
  70. return nil, fmt.Errorf("a device name in the format of /dev/tunN must be specified")
  71. }
  72. if !deviceNameRE.MatchString(deviceName) {
  73. return nil, fmt.Errorf("a device name in the format of /dev/tunN must be specified")
  74. }
  75. fd, err := unix.Open("/dev/"+deviceName, os.O_RDWR, 0)
  76. if err != nil {
  77. return nil, err
  78. }
  79. err = unix.SetNonblock(fd, true)
  80. if err != nil {
  81. l.WithError(err).Warn("Failed to set the tun device as nonblocking")
  82. }
  83. t := &tun{
  84. f: os.NewFile(uintptr(fd), ""),
  85. fd: fd,
  86. Device: deviceName,
  87. vpnNetworks: vpnNetworks,
  88. MTU: c.GetInt("tun.mtu", DefaultMTU),
  89. l: l,
  90. }
  91. err = t.reload(c, true)
  92. if err != nil {
  93. return nil, err
  94. }
  95. c.RegisterReloadCallback(func(c *config.C) {
  96. err := t.reload(c, false)
  97. if err != nil {
  98. util.LogWithContextIfNeeded("failed to reload tun device", err, t.l)
  99. }
  100. })
  101. return t, nil
  102. }
  103. func (t *tun) Close() error {
  104. if t.f != nil {
  105. if err := t.f.Close(); err != nil {
  106. return fmt.Errorf("error closing tun file: %w", err)
  107. }
  108. // t.f.Close should have handled it for us but let's be extra sure
  109. _ = unix.Close(t.fd)
  110. s, err := syscall.Socket(syscall.AF_INET, syscall.SOCK_DGRAM, syscall.IPPROTO_IP)
  111. if err != nil {
  112. return err
  113. }
  114. defer syscall.Close(s)
  115. ifr := ifreq{Name: t.deviceBytes()}
  116. err = ioctl(uintptr(s), syscall.SIOCIFDESTROY, uintptr(unsafe.Pointer(&ifr)))
  117. return err
  118. }
  119. return nil
  120. }
  121. func (t *tun) Read(to []byte) (int, error) {
  122. rc, err := t.f.SyscallConn()
  123. if err != nil {
  124. return 0, fmt.Errorf("failed to get syscall conn for tun: %w", err)
  125. }
  126. var errno syscall.Errno
  127. var n uintptr
  128. err = rc.Read(func(fd uintptr) bool {
  129. // first 4 bytes is protocol family, in network byte order
  130. head := [4]byte{}
  131. iovecs := []syscall.Iovec{
  132. {&head[0], 4},
  133. {&to[0], uint64(len(to))},
  134. }
  135. n, _, errno = syscall.Syscall(syscall.SYS_READV, fd, uintptr(unsafe.Pointer(&iovecs[0])), uintptr(2))
  136. if errno.Temporary() {
  137. // We got an EAGAIN, EINTR, or EWOULDBLOCK, go again
  138. return false
  139. }
  140. return true
  141. })
  142. if err != nil {
  143. if err == syscall.EBADF || err.Error() == "use of closed file" {
  144. // Go doesn't export poll.ErrFileClosing but happily reports it to us so here we are
  145. // https://github.com/golang/go/blob/master/src/internal/poll/fd_poll_runtime.go#L121
  146. return 0, os.ErrClosed
  147. }
  148. return 0, fmt.Errorf("failed to make read call for tun: %w", err)
  149. }
  150. if errno != 0 {
  151. return 0, fmt.Errorf("failed to make inner read call for tun: %w", errno)
  152. }
  153. // fix bytes read number to exclude header
  154. bytesRead := int(n)
  155. if bytesRead < 0 {
  156. return bytesRead, nil
  157. } else if bytesRead < 4 {
  158. return 0, nil
  159. } else {
  160. return bytesRead - 4, nil
  161. }
  162. }
  163. // Write is only valid for single threaded use
  164. func (t *tun) Write(from []byte) (int, error) {
  165. if len(from) <= 1 {
  166. return 0, syscall.EIO
  167. }
  168. ipVer := from[0] >> 4
  169. var head [4]byte
  170. // first 4 bytes is protocol family, in network byte order
  171. if ipVer == 4 {
  172. head[3] = syscall.AF_INET
  173. } else if ipVer == 6 {
  174. head[3] = syscall.AF_INET6
  175. } else {
  176. return 0, fmt.Errorf("unable to determine IP version from packet")
  177. }
  178. rc, err := t.f.SyscallConn()
  179. if err != nil {
  180. return 0, err
  181. }
  182. var errno syscall.Errno
  183. var n uintptr
  184. err = rc.Write(func(fd uintptr) bool {
  185. iovecs := []syscall.Iovec{
  186. {&head[0], 4},
  187. {&from[0], uint64(len(from))},
  188. }
  189. n, _, errno = syscall.Syscall(syscall.SYS_WRITEV, fd, uintptr(unsafe.Pointer(&iovecs[0])), uintptr(2))
  190. // According to NetBSD documentation for TUN, writes will only return errors in which
  191. // this packet will never be delivered so just go on living life.
  192. return true
  193. })
  194. if err != nil {
  195. return 0, err
  196. }
  197. if errno != 0 {
  198. return 0, errno
  199. }
  200. return int(n) - 4, err
  201. }
  202. func (t *tun) addIp(cidr netip.Prefix) error {
  203. if cidr.Addr().Is4() {
  204. var req ifreqAlias4
  205. req.Name = t.deviceBytes()
  206. req.Addr = unix.RawSockaddrInet4{
  207. Len: unix.SizeofSockaddrInet4,
  208. Family: unix.AF_INET,
  209. Addr: cidr.Addr().As4(),
  210. }
  211. req.DstAddr = unix.RawSockaddrInet4{
  212. Len: unix.SizeofSockaddrInet4,
  213. Family: unix.AF_INET,
  214. Addr: cidr.Addr().As4(),
  215. }
  216. req.MaskAddr = unix.RawSockaddrInet4{
  217. Len: unix.SizeofSockaddrInet4,
  218. Family: unix.AF_INET,
  219. Addr: prefixToMask(cidr).As4(),
  220. }
  221. s, err := unix.Socket(unix.AF_INET, unix.SOCK_DGRAM, unix.IPPROTO_IP)
  222. if err != nil {
  223. return err
  224. }
  225. defer syscall.Close(s)
  226. if err := ioctl(uintptr(s), unix.SIOCAIFADDR, uintptr(unsafe.Pointer(&req))); err != nil {
  227. return fmt.Errorf("failed to set tun address %s: %s", cidr.Addr(), err)
  228. }
  229. return nil
  230. }
  231. if cidr.Addr().Is6() {
  232. var req ifreqAlias6
  233. req.Name = t.deviceBytes()
  234. req.Addr = unix.RawSockaddrInet6{
  235. Len: unix.SizeofSockaddrInet6,
  236. Family: unix.AF_INET6,
  237. Addr: cidr.Addr().As16(),
  238. }
  239. req.PrefixMask = unix.RawSockaddrInet6{
  240. Len: unix.SizeofSockaddrInet6,
  241. Family: unix.AF_INET6,
  242. Addr: prefixToMask(cidr).As16(),
  243. }
  244. req.Lifetime = addrLifetime{
  245. Vltime: 0xffffffff,
  246. Pltime: 0xffffffff,
  247. }
  248. s, err := unix.Socket(unix.AF_INET6, unix.SOCK_DGRAM, unix.IPPROTO_IP)
  249. if err != nil {
  250. return err
  251. }
  252. defer syscall.Close(s)
  253. if err := ioctl(uintptr(s), SIOCAIFADDR_IN6, uintptr(unsafe.Pointer(&req))); err != nil {
  254. return fmt.Errorf("failed to set tun address %s: %s", cidr.Addr().String(), err)
  255. }
  256. return nil
  257. }
  258. return fmt.Errorf("unknown address type %v", cidr)
  259. }
  260. func (t *tun) Activate() error {
  261. mode := int32(unix.IFF_BROADCAST)
  262. err := ioctl(uintptr(t.fd), TUNSIFMODE, uintptr(unsafe.Pointer(&mode)))
  263. if err != nil {
  264. return fmt.Errorf("failed to set tun device mode: %w", err)
  265. }
  266. v := 1
  267. err = ioctl(uintptr(t.fd), TUNSIFHEAD, uintptr(unsafe.Pointer(&v)))
  268. if err != nil {
  269. return fmt.Errorf("failed to set tun device head: %w", err)
  270. }
  271. err = t.doIoctlByName(unix.SIOCSIFMTU, uint32(t.MTU))
  272. if err != nil {
  273. return fmt.Errorf("failed to set tun mtu: %w", err)
  274. }
  275. for i := range t.vpnNetworks {
  276. err = t.addIp(t.vpnNetworks[i])
  277. if err != nil {
  278. return err
  279. }
  280. }
  281. return t.addRoutes(false)
  282. }
  283. func (t *tun) doIoctlByName(ctl uintptr, value uint32) error {
  284. s, err := unix.Socket(unix.AF_INET, unix.SOCK_DGRAM, unix.IPPROTO_IP)
  285. if err != nil {
  286. return err
  287. }
  288. defer syscall.Close(s)
  289. ir := ifreq{Name: t.deviceBytes(), data: int(value)}
  290. err = ioctl(uintptr(s), ctl, uintptr(unsafe.Pointer(&ir)))
  291. return err
  292. }
  293. func (t *tun) reload(c *config.C, initial bool) error {
  294. change, routes, err := getAllRoutesFromConfig(c, t.vpnNetworks, initial)
  295. if err != nil {
  296. return err
  297. }
  298. if !initial && !change {
  299. return nil
  300. }
  301. routeTree, err := makeRouteTree(t.l, routes, false)
  302. if err != nil {
  303. return err
  304. }
  305. // Teach nebula how to handle the routes before establishing them in the system table
  306. oldRoutes := t.Routes.Swap(&routes)
  307. t.routeTree.Store(routeTree)
  308. if !initial {
  309. // Remove first, if the system removes a wanted route hopefully it will be re-added next
  310. err := t.removeRoutes(findRemovedRoutes(routes, *oldRoutes))
  311. if err != nil {
  312. util.LogWithContextIfNeeded("Failed to remove routes", err, t.l)
  313. }
  314. // Ensure any routes we actually want are installed
  315. err = t.addRoutes(true)
  316. if err != nil {
  317. // Catch any stray logs
  318. util.LogWithContextIfNeeded("Failed to add routes", err, t.l)
  319. }
  320. }
  321. return nil
  322. }
  323. func (t *tun) RoutesFor(ip netip.Addr) routing.Gateways {
  324. r, _ := t.routeTree.Load().Lookup(ip)
  325. return r
  326. }
  327. func (t *tun) Networks() []netip.Prefix {
  328. return t.vpnNetworks
  329. }
  330. func (t *tun) Name() string {
  331. return t.Device
  332. }
  333. func (t *tun) NewMultiQueueReader() (io.ReadWriteCloser, error) {
  334. return nil, fmt.Errorf("TODO: multiqueue not implemented for netbsd")
  335. }
  336. func (t *tun) addRoutes(logErrors bool) error {
  337. routes := *t.Routes.Load()
  338. for _, r := range routes {
  339. if len(r.Via) == 0 || !r.Install {
  340. // We don't allow route MTUs so only install routes with a via
  341. continue
  342. }
  343. err := addRoute(r.Cidr, t.vpnNetworks)
  344. if err != nil {
  345. retErr := util.NewContextualError("Failed to add route", map[string]any{"route": r}, err)
  346. if logErrors {
  347. retErr.Log(t.l)
  348. } else {
  349. return retErr
  350. }
  351. } else {
  352. t.l.WithField("route", r).Info("Added route")
  353. }
  354. }
  355. return nil
  356. }
  357. func (t *tun) removeRoutes(routes []Route) error {
  358. for _, r := range routes {
  359. if !r.Install {
  360. continue
  361. }
  362. err := delRoute(r.Cidr, t.vpnNetworks)
  363. if err != nil {
  364. t.l.WithError(err).WithField("route", r).Error("Failed to remove route")
  365. } else {
  366. t.l.WithField("route", r).Info("Removed route")
  367. }
  368. }
  369. return nil
  370. }
  371. func (t *tun) deviceBytes() (o [16]byte) {
  372. for i, c := range t.Device {
  373. o[i] = byte(c)
  374. }
  375. return
  376. }
  377. func addRoute(prefix netip.Prefix, gateways []netip.Prefix) error {
  378. sock, err := unix.Socket(unix.AF_ROUTE, unix.SOCK_RAW, unix.AF_UNSPEC)
  379. if err != nil {
  380. return fmt.Errorf("unable to create AF_ROUTE socket: %v", err)
  381. }
  382. defer unix.Close(sock)
  383. route := &netroute.RouteMessage{
  384. Version: unix.RTM_VERSION,
  385. Type: unix.RTM_ADD,
  386. Flags: unix.RTF_UP | unix.RTF_GATEWAY,
  387. Seq: 1,
  388. }
  389. if prefix.Addr().Is4() {
  390. gw, err := selectGateway(prefix, gateways)
  391. if err != nil {
  392. return err
  393. }
  394. route.Addrs = []netroute.Addr{
  395. unix.RTAX_DST: &netroute.Inet4Addr{IP: prefix.Masked().Addr().As4()},
  396. unix.RTAX_NETMASK: &netroute.Inet4Addr{IP: prefixToMask(prefix).As4()},
  397. unix.RTAX_GATEWAY: &netroute.Inet4Addr{IP: gw.Addr().As4()},
  398. }
  399. } else {
  400. gw, err := selectGateway(prefix, gateways)
  401. if err != nil {
  402. return err
  403. }
  404. route.Addrs = []netroute.Addr{
  405. unix.RTAX_DST: &netroute.Inet6Addr{IP: prefix.Masked().Addr().As16()},
  406. unix.RTAX_NETMASK: &netroute.Inet6Addr{IP: prefixToMask(prefix).As16()},
  407. unix.RTAX_GATEWAY: &netroute.Inet6Addr{IP: gw.Addr().As16()},
  408. }
  409. }
  410. data, err := route.Marshal()
  411. if err != nil {
  412. return fmt.Errorf("failed to create route.RouteMessage: %w", err)
  413. }
  414. _, err = unix.Write(sock, data[:])
  415. if err != nil {
  416. if errors.Is(err, unix.EEXIST) {
  417. // Try to do a change
  418. route.Type = unix.RTM_CHANGE
  419. data, err = route.Marshal()
  420. if err != nil {
  421. return fmt.Errorf("failed to create route.RouteMessage for change: %w", err)
  422. }
  423. _, err = unix.Write(sock, data[:])
  424. return err
  425. }
  426. return fmt.Errorf("failed to write route.RouteMessage to socket: %w", err)
  427. }
  428. return nil
  429. }
  430. func delRoute(prefix netip.Prefix, gateways []netip.Prefix) error {
  431. sock, err := unix.Socket(unix.AF_ROUTE, unix.SOCK_RAW, unix.AF_UNSPEC)
  432. if err != nil {
  433. return fmt.Errorf("unable to create AF_ROUTE socket: %v", err)
  434. }
  435. defer unix.Close(sock)
  436. route := netroute.RouteMessage{
  437. Version: unix.RTM_VERSION,
  438. Type: unix.RTM_DELETE,
  439. Seq: 1,
  440. }
  441. if prefix.Addr().Is4() {
  442. gw, err := selectGateway(prefix, gateways)
  443. if err != nil {
  444. return err
  445. }
  446. route.Addrs = []netroute.Addr{
  447. unix.RTAX_DST: &netroute.Inet4Addr{IP: prefix.Masked().Addr().As4()},
  448. unix.RTAX_NETMASK: &netroute.Inet4Addr{IP: prefixToMask(prefix).As4()},
  449. unix.RTAX_GATEWAY: &netroute.Inet4Addr{IP: gw.Addr().As4()},
  450. }
  451. } else {
  452. gw, err := selectGateway(prefix, gateways)
  453. if err != nil {
  454. return err
  455. }
  456. route.Addrs = []netroute.Addr{
  457. unix.RTAX_DST: &netroute.Inet6Addr{IP: prefix.Masked().Addr().As16()},
  458. unix.RTAX_NETMASK: &netroute.Inet6Addr{IP: prefixToMask(prefix).As16()},
  459. unix.RTAX_GATEWAY: &netroute.Inet6Addr{IP: gw.Addr().As16()},
  460. }
  461. }
  462. data, err := route.Marshal()
  463. if err != nil {
  464. return fmt.Errorf("failed to create route.RouteMessage: %w", err)
  465. }
  466. _, err = unix.Write(sock, data[:])
  467. if err != nil {
  468. return fmt.Errorf("failed to write route.RouteMessage to socket: %w", err)
  469. }
  470. return nil
  471. }