tun_linux.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613
  1. //go:build !android && !e2e_testing
  2. // +build !android,!e2e_testing
  3. package overlay
  4. import (
  5. "fmt"
  6. "io"
  7. "net"
  8. "net/netip"
  9. "os"
  10. "strings"
  11. "sync/atomic"
  12. "unsafe"
  13. "github.com/gaissmai/bart"
  14. "github.com/sirupsen/logrus"
  15. "github.com/slackhq/nebula/config"
  16. "github.com/slackhq/nebula/util"
  17. "github.com/vishvananda/netlink"
  18. "golang.org/x/sys/unix"
  19. )
  20. type tun struct {
  21. io.ReadWriteCloser
  22. fd int
  23. Device string
  24. vpnNetworks []netip.Prefix
  25. MaxMTU int
  26. DefaultMTU int
  27. TXQueueLen int
  28. deviceIndex int
  29. ioctlFd uintptr
  30. Routes atomic.Pointer[[]Route]
  31. routeTree atomic.Pointer[bart.Table[netip.Addr]]
  32. routeChan chan struct{}
  33. useSystemRoutes bool
  34. l *logrus.Logger
  35. }
  36. func (t *tun) Networks() []netip.Prefix {
  37. return t.vpnNetworks
  38. }
  39. type ifReq struct {
  40. Name [16]byte
  41. Flags uint16
  42. pad [8]byte
  43. }
  44. type ifreqMTU struct {
  45. Name [16]byte
  46. MTU int32
  47. pad [8]byte
  48. }
  49. type ifreqQLEN struct {
  50. Name [16]byte
  51. Value int32
  52. pad [8]byte
  53. }
  54. func newTunFromFd(c *config.C, l *logrus.Logger, deviceFd int, vpnNetworks []netip.Prefix) (*tun, error) {
  55. file := os.NewFile(uintptr(deviceFd), "/dev/net/tun")
  56. t, err := newTunGeneric(c, l, file, vpnNetworks)
  57. if err != nil {
  58. return nil, err
  59. }
  60. t.Device = "tun0"
  61. return t, nil
  62. }
  63. func newTun(c *config.C, l *logrus.Logger, vpnNetworks []netip.Prefix, multiqueue bool) (*tun, error) {
  64. fd, err := unix.Open("/dev/net/tun", os.O_RDWR, 0)
  65. if err != nil {
  66. // If /dev/net/tun doesn't exist, try to create it (will happen in docker)
  67. if os.IsNotExist(err) {
  68. err = os.MkdirAll("/dev/net", 0755)
  69. if err != nil {
  70. return nil, fmt.Errorf("/dev/net/tun doesn't exist, failed to mkdir -p /dev/net: %w", err)
  71. }
  72. err = unix.Mknod("/dev/net/tun", unix.S_IFCHR|0600, int(unix.Mkdev(10, 200)))
  73. if err != nil {
  74. return nil, fmt.Errorf("failed to create /dev/net/tun: %w", err)
  75. }
  76. fd, err = unix.Open("/dev/net/tun", os.O_RDWR, 0)
  77. if err != nil {
  78. return nil, fmt.Errorf("created /dev/net/tun, but still failed: %w", err)
  79. }
  80. } else {
  81. return nil, err
  82. }
  83. }
  84. var req ifReq
  85. req.Flags = uint16(unix.IFF_TUN | unix.IFF_NO_PI)
  86. if multiqueue {
  87. req.Flags |= unix.IFF_MULTI_QUEUE
  88. }
  89. copy(req.Name[:], c.GetString("tun.dev", ""))
  90. if err = ioctl(uintptr(fd), uintptr(unix.TUNSETIFF), uintptr(unsafe.Pointer(&req))); err != nil {
  91. return nil, err
  92. }
  93. name := strings.Trim(string(req.Name[:]), "\x00")
  94. file := os.NewFile(uintptr(fd), "/dev/net/tun")
  95. t, err := newTunGeneric(c, l, file, vpnNetworks)
  96. if err != nil {
  97. return nil, err
  98. }
  99. t.Device = name
  100. return t, nil
  101. }
  102. func newTunGeneric(c *config.C, l *logrus.Logger, file *os.File, vpnNetworks []netip.Prefix) (*tun, error) {
  103. t := &tun{
  104. ReadWriteCloser: file,
  105. fd: int(file.Fd()),
  106. vpnNetworks: vpnNetworks,
  107. TXQueueLen: c.GetInt("tun.tx_queue", 500),
  108. useSystemRoutes: c.GetBool("tun.use_system_route_table", false),
  109. l: l,
  110. }
  111. err := t.reload(c, true)
  112. if err != nil {
  113. return nil, err
  114. }
  115. c.RegisterReloadCallback(func(c *config.C) {
  116. err := t.reload(c, false)
  117. if err != nil {
  118. util.LogWithContextIfNeeded("failed to reload tun device", err, t.l)
  119. }
  120. })
  121. return t, nil
  122. }
  123. func (t *tun) reload(c *config.C, initial bool) error {
  124. routeChange, routes, err := getAllRoutesFromConfig(c, t.vpnNetworks, initial)
  125. if err != nil {
  126. return err
  127. }
  128. if !initial && !routeChange && !c.HasChanged("tun.mtu") {
  129. return nil
  130. }
  131. routeTree, err := makeRouteTree(t.l, routes, true)
  132. if err != nil {
  133. return err
  134. }
  135. oldDefaultMTU := t.DefaultMTU
  136. oldMaxMTU := t.MaxMTU
  137. newDefaultMTU := c.GetInt("tun.mtu", DefaultMTU)
  138. newMaxMTU := newDefaultMTU
  139. for i, r := range routes {
  140. if r.MTU == 0 {
  141. routes[i].MTU = newDefaultMTU
  142. }
  143. if r.MTU > t.MaxMTU {
  144. newMaxMTU = r.MTU
  145. }
  146. }
  147. t.MaxMTU = newMaxMTU
  148. t.DefaultMTU = newDefaultMTU
  149. // Teach nebula how to handle the routes before establishing them in the system table
  150. oldRoutes := t.Routes.Swap(&routes)
  151. t.routeTree.Store(routeTree)
  152. if !initial {
  153. if oldMaxMTU != newMaxMTU {
  154. t.setMTU()
  155. t.l.Infof("Set max MTU to %v was %v", t.MaxMTU, oldMaxMTU)
  156. }
  157. if oldDefaultMTU != newDefaultMTU {
  158. for i := range t.vpnNetworks {
  159. err := t.setDefaultRoute(t.vpnNetworks[i])
  160. if err != nil {
  161. t.l.Warn(err)
  162. } else {
  163. t.l.Infof("Set default MTU to %v was %v", t.DefaultMTU, oldDefaultMTU)
  164. }
  165. }
  166. }
  167. // Remove first, if the system removes a wanted route hopefully it will be re-added next
  168. t.removeRoutes(findRemovedRoutes(routes, *oldRoutes))
  169. // Ensure any routes we actually want are installed
  170. err = t.addRoutes(true)
  171. if err != nil {
  172. // This should never be called since addRoutes should log its own errors in a reload condition
  173. util.LogWithContextIfNeeded("Failed to refresh routes", err, t.l)
  174. }
  175. }
  176. return nil
  177. }
  178. func (t *tun) NewMultiQueueReader() (io.ReadWriteCloser, error) {
  179. fd, err := unix.Open("/dev/net/tun", os.O_RDWR, 0)
  180. if err != nil {
  181. return nil, err
  182. }
  183. var req ifReq
  184. req.Flags = uint16(unix.IFF_TUN | unix.IFF_NO_PI | unix.IFF_MULTI_QUEUE)
  185. copy(req.Name[:], t.Device)
  186. if err = ioctl(uintptr(fd), uintptr(unix.TUNSETIFF), uintptr(unsafe.Pointer(&req))); err != nil {
  187. return nil, err
  188. }
  189. file := os.NewFile(uintptr(fd), "/dev/net/tun")
  190. return file, nil
  191. }
  192. func (t *tun) RouteFor(ip netip.Addr) netip.Addr {
  193. r, _ := t.routeTree.Load().Lookup(ip)
  194. return r
  195. }
  196. func (t *tun) Write(b []byte) (int, error) {
  197. var nn int
  198. maximum := len(b)
  199. for {
  200. n, err := unix.Write(t.fd, b[nn:maximum])
  201. if n > 0 {
  202. nn += n
  203. }
  204. if nn == len(b) {
  205. return nn, err
  206. }
  207. if err != nil {
  208. return nn, err
  209. }
  210. if n == 0 {
  211. return nn, io.ErrUnexpectedEOF
  212. }
  213. }
  214. }
  215. func (t *tun) deviceBytes() (o [16]byte) {
  216. for i, c := range t.Device {
  217. o[i] = byte(c)
  218. }
  219. return
  220. }
  221. func hasNetlinkAddr(al []*netlink.Addr, x netlink.Addr) bool {
  222. for i := range al {
  223. if al[i].Equal(x) {
  224. return true
  225. }
  226. }
  227. return false
  228. }
  229. // addIPs uses netlink to add all addresses that don't exist, then it removes ones that should not be there
  230. func (t *tun) addIPs(link netlink.Link) error {
  231. newAddrs := make([]*netlink.Addr, len(t.vpnNetworks))
  232. for i := range t.vpnNetworks {
  233. newAddrs[i] = &netlink.Addr{
  234. IPNet: &net.IPNet{
  235. IP: t.vpnNetworks[i].Addr().AsSlice(),
  236. Mask: net.CIDRMask(t.vpnNetworks[i].Bits(), t.vpnNetworks[i].Addr().BitLen()),
  237. },
  238. Label: t.vpnNetworks[i].Addr().Zone(),
  239. }
  240. }
  241. //add all new addresses
  242. for i := range newAddrs {
  243. //todo do we want to stack errors and try as many ops as possible?
  244. //AddrReplace still adds new IPs, but if their properties change it will change them as well
  245. if err := netlink.AddrReplace(link, newAddrs[i]); err != nil {
  246. return err
  247. }
  248. }
  249. //iterate over remainder, remove whoever shouldn't be there
  250. al, err := netlink.AddrList(link, netlink.FAMILY_ALL)
  251. if err != nil {
  252. return fmt.Errorf("failed to get tun address list: %s", err)
  253. }
  254. for i := range al {
  255. if hasNetlinkAddr(newAddrs, al[i]) {
  256. continue
  257. }
  258. err = netlink.AddrDel(link, &al[i])
  259. if err != nil {
  260. t.l.WithError(err).Error("failed to remove address from tun address list")
  261. } else {
  262. t.l.WithField("removed", al[i].String()).Info("removed address not listed in cert(s)")
  263. }
  264. }
  265. return nil
  266. }
  267. func (t *tun) Activate() error {
  268. devName := t.deviceBytes()
  269. if t.useSystemRoutes {
  270. t.watchRoutes()
  271. }
  272. s, err := unix.Socket(
  273. unix.AF_INET, //because everything we use t.ioctlFd for is address family independent, this is fine
  274. unix.SOCK_DGRAM,
  275. unix.IPPROTO_IP,
  276. )
  277. if err != nil {
  278. return err
  279. }
  280. t.ioctlFd = uintptr(s)
  281. // Set the device name
  282. ifrf := ifReq{Name: devName}
  283. if err = ioctl(t.ioctlFd, unix.SIOCGIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  284. return fmt.Errorf("failed to set tun device name: %s", err)
  285. }
  286. link, err := netlink.LinkByName(t.Device)
  287. if err != nil {
  288. return fmt.Errorf("failed to get tun device link: %s", err)
  289. }
  290. t.deviceIndex = link.Attrs().Index
  291. // Setup our default MTU
  292. t.setMTU()
  293. // Set the transmit queue length
  294. ifrq := ifreqQLEN{Name: devName, Value: int32(t.TXQueueLen)}
  295. if err = ioctl(t.ioctlFd, unix.SIOCSIFTXQLEN, uintptr(unsafe.Pointer(&ifrq))); err != nil {
  296. // If we can't set the queue length nebula will still work but it may lead to packet loss
  297. t.l.WithError(err).Error("Failed to set tun tx queue length")
  298. }
  299. if err = t.addIPs(link); err != nil {
  300. return err
  301. }
  302. // Bring up the interface
  303. ifrf.Flags = ifrf.Flags | unix.IFF_UP
  304. if err = ioctl(t.ioctlFd, unix.SIOCSIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  305. return fmt.Errorf("failed to bring the tun device up: %s", err)
  306. }
  307. // Run the interface
  308. ifrf.Flags = ifrf.Flags | unix.IFF_UP | unix.IFF_RUNNING
  309. if err = ioctl(t.ioctlFd, unix.SIOCSIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  310. return fmt.Errorf("failed to run tun device: %s", err)
  311. }
  312. //set route MTU
  313. for i := range t.vpnNetworks {
  314. if err = t.setDefaultRoute(t.vpnNetworks[i]); err != nil {
  315. return fmt.Errorf("failed to set default route MTU: %w", err)
  316. }
  317. }
  318. // Set the routes
  319. if err = t.addRoutes(false); err != nil {
  320. return err
  321. }
  322. //todo do we want to keep the link-local address?
  323. return nil
  324. }
  325. func (t *tun) setMTU() {
  326. // Set the MTU on the device
  327. ifm := ifreqMTU{Name: t.deviceBytes(), MTU: int32(t.MaxMTU)}
  328. if err := ioctl(t.ioctlFd, unix.SIOCSIFMTU, uintptr(unsafe.Pointer(&ifm))); err != nil {
  329. // This is currently a non fatal condition because the route table must have the MTU set appropriately as well
  330. t.l.WithError(err).Error("Failed to set tun mtu")
  331. }
  332. }
  333. func (t *tun) setDefaultRoute(cidr netip.Prefix) error {
  334. // Default route
  335. dr := &net.IPNet{
  336. IP: cidr.Masked().Addr().AsSlice(),
  337. Mask: net.CIDRMask(cidr.Bits(), cidr.Addr().BitLen()),
  338. }
  339. nr := netlink.Route{
  340. LinkIndex: t.deviceIndex,
  341. Dst: dr,
  342. MTU: t.DefaultMTU,
  343. AdvMSS: t.advMSS(Route{}),
  344. Scope: unix.RT_SCOPE_LINK,
  345. Src: net.IP(cidr.Addr().AsSlice()),
  346. Protocol: unix.RTPROT_KERNEL,
  347. Table: unix.RT_TABLE_MAIN,
  348. Type: unix.RTN_UNICAST,
  349. }
  350. err := netlink.RouteReplace(&nr)
  351. if err != nil {
  352. return fmt.Errorf("failed to set mtu %v on the default route %v; %v", t.DefaultMTU, dr, err)
  353. }
  354. return nil
  355. }
  356. func (t *tun) addRoutes(logErrors bool) error {
  357. // Path routes
  358. routes := *t.Routes.Load()
  359. for _, r := range routes {
  360. if !r.Install {
  361. continue
  362. }
  363. dr := &net.IPNet{
  364. IP: r.Cidr.Masked().Addr().AsSlice(),
  365. Mask: net.CIDRMask(r.Cidr.Bits(), r.Cidr.Addr().BitLen()),
  366. }
  367. nr := netlink.Route{
  368. LinkIndex: t.deviceIndex,
  369. Dst: dr,
  370. MTU: r.MTU,
  371. AdvMSS: t.advMSS(r),
  372. Scope: unix.RT_SCOPE_LINK,
  373. }
  374. if r.Metric > 0 {
  375. nr.Priority = r.Metric
  376. }
  377. err := netlink.RouteReplace(&nr)
  378. if err != nil {
  379. retErr := util.NewContextualError("Failed to add route", map[string]interface{}{"route": r}, err)
  380. if logErrors {
  381. retErr.Log(t.l)
  382. } else {
  383. return retErr
  384. }
  385. } else {
  386. t.l.WithField("route", r).Info("Added route")
  387. }
  388. }
  389. return nil
  390. }
  391. func (t *tun) removeRoutes(routes []Route) {
  392. for _, r := range routes {
  393. if !r.Install {
  394. continue
  395. }
  396. dr := &net.IPNet{
  397. IP: r.Cidr.Masked().Addr().AsSlice(),
  398. Mask: net.CIDRMask(r.Cidr.Bits(), r.Cidr.Addr().BitLen()),
  399. }
  400. nr := netlink.Route{
  401. LinkIndex: t.deviceIndex,
  402. Dst: dr,
  403. MTU: r.MTU,
  404. AdvMSS: t.advMSS(r),
  405. Scope: unix.RT_SCOPE_LINK,
  406. }
  407. if r.Metric > 0 {
  408. nr.Priority = r.Metric
  409. }
  410. err := netlink.RouteDel(&nr)
  411. if err != nil {
  412. t.l.WithError(err).WithField("route", r).Error("Failed to remove route")
  413. } else {
  414. t.l.WithField("route", r).Info("Removed route")
  415. }
  416. }
  417. }
  418. func (t *tun) Name() string {
  419. return t.Device
  420. }
  421. func (t *tun) advMSS(r Route) int {
  422. mtu := r.MTU
  423. if r.MTU == 0 {
  424. mtu = t.DefaultMTU
  425. }
  426. // We only need to set advmss if the route MTU does not match the device MTU
  427. if mtu != t.MaxMTU {
  428. return mtu - 40
  429. }
  430. return 0
  431. }
  432. func (t *tun) watchRoutes() {
  433. rch := make(chan netlink.RouteUpdate)
  434. doneChan := make(chan struct{})
  435. if err := netlink.RouteSubscribe(rch, doneChan); err != nil {
  436. t.l.WithError(err).Errorf("failed to subscribe to system route changes")
  437. return
  438. }
  439. t.routeChan = doneChan
  440. go func() {
  441. for {
  442. select {
  443. case r := <-rch:
  444. t.updateRoutes(r)
  445. case <-doneChan:
  446. // netlink.RouteSubscriber will close the rch for us
  447. return
  448. }
  449. }
  450. }()
  451. }
  452. func (t *tun) updateRoutes(r netlink.RouteUpdate) {
  453. if r.Gw == nil {
  454. // Not a gateway route, ignore
  455. t.l.WithField("route", r).Debug("Ignoring route update, not a gateway route")
  456. return
  457. }
  458. //TODO: IPV6-WORK what if not ok?
  459. gwAddr, ok := netip.AddrFromSlice(r.Gw)
  460. if !ok {
  461. t.l.WithField("route", r).Debug("Ignoring route update, invalid gateway address")
  462. return
  463. }
  464. gwAddr = gwAddr.Unmap()
  465. withinNetworks := false
  466. for i := range t.vpnNetworks {
  467. if t.vpnNetworks[i].Contains(gwAddr) {
  468. withinNetworks = true
  469. break
  470. }
  471. }
  472. if !withinNetworks {
  473. // Gateway isn't in our overlay network, ignore
  474. t.l.WithField("route", r).Debug("Ignoring route update, not in our networks")
  475. return
  476. }
  477. if x := r.Dst.IP.To4(); x == nil {
  478. // Nebula only handles ipv4 on the overlay currently
  479. t.l.WithField("route", r).Debug("Ignoring route update, destination is not ipv4")
  480. return
  481. }
  482. dstAddr, ok := netip.AddrFromSlice(r.Dst.IP)
  483. if !ok {
  484. t.l.WithField("route", r).Debug("Ignoring route update, invalid destination address")
  485. return
  486. }
  487. ones, _ := r.Dst.Mask.Size()
  488. dst := netip.PrefixFrom(dstAddr, ones)
  489. newTree := t.routeTree.Load().Clone()
  490. if r.Type == unix.RTM_NEWROUTE {
  491. t.l.WithField("destination", r.Dst).WithField("via", r.Gw).Info("Adding route")
  492. newTree.Insert(dst, gwAddr)
  493. } else {
  494. newTree.Delete(dst)
  495. t.l.WithField("destination", r.Dst).WithField("via", r.Gw).Info("Removing route")
  496. }
  497. t.routeTree.Store(newTree)
  498. }
  499. func (t *tun) Close() error {
  500. if t.routeChan != nil {
  501. close(t.routeChan)
  502. }
  503. if t.ReadWriteCloser != nil {
  504. t.ReadWriteCloser.Close()
  505. }
  506. if t.ioctlFd > 0 {
  507. os.NewFile(t.ioctlFd, "ioctlFd").Close()
  508. }
  509. return nil
  510. }