tun_freebsd.go 6.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307
  1. //go:build !e2e_testing
  2. // +build !e2e_testing
  3. package overlay
  4. import (
  5. "bytes"
  6. "errors"
  7. "fmt"
  8. "io"
  9. "io/fs"
  10. "net/netip"
  11. "os"
  12. "os/exec"
  13. "strconv"
  14. "sync/atomic"
  15. "syscall"
  16. "unsafe"
  17. "github.com/gaissmai/bart"
  18. "github.com/sirupsen/logrus"
  19. "github.com/slackhq/nebula/config"
  20. "github.com/slackhq/nebula/util"
  21. )
  22. const (
  23. // FIODGNAME is defined in sys/sys/filio.h on FreeBSD
  24. // For 32-bit systems, use FIODGNAME_32 (not defined in this file: 0x80086678)
  25. FIODGNAME = 0x80106678
  26. )
  27. type fiodgnameArg struct {
  28. length int32
  29. pad [4]byte
  30. buf unsafe.Pointer
  31. }
  32. type ifreqRename struct {
  33. Name [16]byte
  34. Data uintptr
  35. }
  36. type ifreqDestroy struct {
  37. Name [16]byte
  38. pad [16]byte
  39. }
  40. type tun struct {
  41. Device string
  42. vpnNetworks []netip.Prefix
  43. MTU int
  44. Routes atomic.Pointer[[]Route]
  45. routeTree atomic.Pointer[bart.Table[netip.Addr]]
  46. l *logrus.Logger
  47. io.ReadWriteCloser
  48. }
  49. func (t *tun) Close() error {
  50. if t.ReadWriteCloser != nil {
  51. if err := t.ReadWriteCloser.Close(); err != nil {
  52. return err
  53. }
  54. s, err := syscall.Socket(syscall.AF_INET, syscall.SOCK_DGRAM, syscall.IPPROTO_IP)
  55. if err != nil {
  56. return err
  57. }
  58. defer syscall.Close(s)
  59. ifreq := ifreqDestroy{Name: t.deviceBytes()}
  60. // Destroy the interface
  61. err = ioctl(uintptr(s), syscall.SIOCIFDESTROY, uintptr(unsafe.Pointer(&ifreq)))
  62. return err
  63. }
  64. return nil
  65. }
  66. func newTunFromFd(_ *config.C, _ *logrus.Logger, _ int, _ []netip.Prefix) (*tun, error) {
  67. return nil, fmt.Errorf("newTunFromFd not supported in FreeBSD")
  68. }
  69. func newTun(c *config.C, l *logrus.Logger, vpnNetworks []netip.Prefix, _ bool) (*tun, error) {
  70. // Try to open existing tun device
  71. var file *os.File
  72. var err error
  73. deviceName := c.GetString("tun.dev", "")
  74. if deviceName != "" {
  75. file, err = os.OpenFile("/dev/"+deviceName, os.O_RDWR, 0)
  76. }
  77. if errors.Is(err, fs.ErrNotExist) || deviceName == "" {
  78. // If the device doesn't already exist, request a new one and rename it
  79. file, err = os.OpenFile("/dev/tun", os.O_RDWR, 0)
  80. }
  81. if err != nil {
  82. return nil, err
  83. }
  84. rawConn, err := file.SyscallConn()
  85. if err != nil {
  86. return nil, fmt.Errorf("SyscallConn: %v", err)
  87. }
  88. var name [16]byte
  89. var ctrlErr error
  90. rawConn.Control(func(fd uintptr) {
  91. // Read the name of the interface
  92. arg := fiodgnameArg{length: 16, buf: unsafe.Pointer(&name)}
  93. ctrlErr = ioctl(fd, FIODGNAME, uintptr(unsafe.Pointer(&arg)))
  94. })
  95. if ctrlErr != nil {
  96. return nil, err
  97. }
  98. ifName := string(bytes.TrimRight(name[:], "\x00"))
  99. if deviceName == "" {
  100. deviceName = ifName
  101. }
  102. // If the name doesn't match the desired interface name, rename it now
  103. if ifName != deviceName {
  104. s, err := syscall.Socket(
  105. syscall.AF_INET,
  106. syscall.SOCK_DGRAM,
  107. syscall.IPPROTO_IP,
  108. )
  109. if err != nil {
  110. return nil, err
  111. }
  112. defer syscall.Close(s)
  113. fd := uintptr(s)
  114. var fromName [16]byte
  115. var toName [16]byte
  116. copy(fromName[:], ifName)
  117. copy(toName[:], deviceName)
  118. ifrr := ifreqRename{
  119. Name: fromName,
  120. Data: uintptr(unsafe.Pointer(&toName)),
  121. }
  122. // Set the device name
  123. ioctl(fd, syscall.SIOCSIFNAME, uintptr(unsafe.Pointer(&ifrr)))
  124. }
  125. t := &tun{
  126. ReadWriteCloser: file,
  127. Device: deviceName,
  128. vpnNetworks: vpnNetworks,
  129. MTU: c.GetInt("tun.mtu", DefaultMTU),
  130. l: l,
  131. }
  132. err = t.reload(c, true)
  133. if err != nil {
  134. return nil, err
  135. }
  136. c.RegisterReloadCallback(func(c *config.C) {
  137. err := t.reload(c, false)
  138. if err != nil {
  139. util.LogWithContextIfNeeded("failed to reload tun device", err, t.l)
  140. }
  141. })
  142. return t, nil
  143. }
  144. func (t *tun) addIp(cidr netip.Prefix) error {
  145. var err error
  146. // TODO use syscalls instead of exec.Command
  147. cmd := exec.Command("/sbin/ifconfig", t.Device, cidr.String(), cidr.Addr().String())
  148. t.l.Debug("command: ", cmd.String())
  149. if err = cmd.Run(); err != nil {
  150. return fmt.Errorf("failed to run 'ifconfig': %s", err)
  151. }
  152. cmd = exec.Command("/sbin/route", "-n", "add", "-net", cidr.String(), "-interface", t.Device)
  153. t.l.Debug("command: ", cmd.String())
  154. if err = cmd.Run(); err != nil {
  155. return fmt.Errorf("failed to run 'route add': %s", err)
  156. }
  157. cmd = exec.Command("/sbin/ifconfig", t.Device, "mtu", strconv.Itoa(t.MTU))
  158. t.l.Debug("command: ", cmd.String())
  159. if err = cmd.Run(); err != nil {
  160. return fmt.Errorf("failed to run 'ifconfig': %s", err)
  161. }
  162. // Unsafe path routes
  163. return t.addRoutes(false)
  164. }
  165. func (t *tun) Activate() error {
  166. for i := range t.vpnNetworks {
  167. err := t.addIp(t.vpnNetworks[i])
  168. if err != nil {
  169. return err
  170. }
  171. }
  172. return nil
  173. }
  174. func (t *tun) reload(c *config.C, initial bool) error {
  175. change, routes, err := getAllRoutesFromConfig(c, t.vpnNetworks, initial)
  176. if err != nil {
  177. return err
  178. }
  179. if !initial && !change {
  180. return nil
  181. }
  182. routeTree, err := makeRouteTree(t.l, routes, false)
  183. if err != nil {
  184. return err
  185. }
  186. // Teach nebula how to handle the routes before establishing them in the system table
  187. oldRoutes := t.Routes.Swap(&routes)
  188. t.routeTree.Store(routeTree)
  189. if !initial {
  190. // Remove first, if the system removes a wanted route hopefully it will be re-added next
  191. err := t.removeRoutes(findRemovedRoutes(routes, *oldRoutes))
  192. if err != nil {
  193. util.LogWithContextIfNeeded("Failed to remove routes", err, t.l)
  194. }
  195. // Ensure any routes we actually want are installed
  196. err = t.addRoutes(true)
  197. if err != nil {
  198. // Catch any stray logs
  199. util.LogWithContextIfNeeded("Failed to add routes", err, t.l)
  200. }
  201. }
  202. return nil
  203. }
  204. func (t *tun) RouteFor(ip netip.Addr) netip.Addr {
  205. r, _ := t.routeTree.Load().Lookup(ip)
  206. return r
  207. }
  208. func (t *tun) Networks() []netip.Prefix {
  209. return t.vpnNetworks
  210. }
  211. func (t *tun) Name() string {
  212. return t.Device
  213. }
  214. func (t *tun) NewMultiQueueReader() (io.ReadWriteCloser, error) {
  215. return nil, fmt.Errorf("TODO: multiqueue not implemented for freebsd")
  216. }
  217. func (t *tun) addRoutes(logErrors bool) error {
  218. routes := *t.Routes.Load()
  219. for _, r := range routes {
  220. if !r.Via.IsValid() || !r.Install {
  221. // We don't allow route MTUs so only install routes with a via
  222. continue
  223. }
  224. cmd := exec.Command("/sbin/route", "-n", "add", "-net", r.Cidr.String(), "-interface", t.Device)
  225. t.l.Debug("command: ", cmd.String())
  226. if err := cmd.Run(); err != nil {
  227. retErr := util.NewContextualError("failed to run 'route add' for unsafe_route", map[string]interface{}{"route": r}, err)
  228. if logErrors {
  229. retErr.Log(t.l)
  230. } else {
  231. return retErr
  232. }
  233. }
  234. }
  235. return nil
  236. }
  237. func (t *tun) removeRoutes(routes []Route) error {
  238. for _, r := range routes {
  239. if !r.Install {
  240. continue
  241. }
  242. cmd := exec.Command("/sbin/route", "-n", "delete", "-net", r.Cidr.String(), "-interface", t.Device)
  243. t.l.Debug("command: ", cmd.String())
  244. if err := cmd.Run(); err != nil {
  245. t.l.WithError(err).WithField("route", r).Error("Failed to remove route")
  246. } else {
  247. t.l.WithField("route", r).Info("Removed route")
  248. }
  249. }
  250. return nil
  251. }
  252. func (t *tun) deviceBytes() (o [16]byte) {
  253. for i, c := range t.Device {
  254. o[i] = byte(c)
  255. }
  256. return
  257. }