tun_freebsd.go 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643
  1. //go:build !e2e_testing
  2. // +build !e2e_testing
  3. package overlay
  4. import (
  5. "bytes"
  6. "errors"
  7. "fmt"
  8. "io"
  9. "io/fs"
  10. "net/netip"
  11. "sync/atomic"
  12. "syscall"
  13. "time"
  14. "unsafe"
  15. "github.com/gaissmai/bart"
  16. "github.com/sirupsen/logrus"
  17. "github.com/slackhq/nebula/config"
  18. "github.com/slackhq/nebula/routing"
  19. "github.com/slackhq/nebula/util"
  20. netroute "golang.org/x/net/route"
  21. "golang.org/x/sys/unix"
  22. )
  23. const (
  24. // FIODGNAME is defined in sys/sys/filio.h on FreeBSD
  25. // For 32-bit systems, use FIODGNAME_32 (not defined in this file: 0x80086678)
  26. FIODGNAME = 0x80106678
  27. TUNSIFMODE = 0x8004745e
  28. TUNSIFHEAD = 0x80047460
  29. OSIOCAIFADDR_IN6 = 0x8088691b
  30. IN6_IFF_NODAD = 0x0020
  31. )
  32. type fiodgnameArg struct {
  33. length int32
  34. pad [4]byte
  35. buf unsafe.Pointer
  36. }
  37. type ifreqRename struct {
  38. Name [unix.IFNAMSIZ]byte
  39. Data uintptr
  40. }
  41. type ifreqDestroy struct {
  42. Name [unix.IFNAMSIZ]byte
  43. pad [16]byte
  44. }
  45. type ifReq struct {
  46. Name [unix.IFNAMSIZ]byte
  47. Flags uint16
  48. }
  49. type ifreqMTU struct {
  50. Name [unix.IFNAMSIZ]byte
  51. MTU int32
  52. }
  53. type addrLifetime struct {
  54. Expire uint64
  55. Preferred uint64
  56. Vltime uint32
  57. Pltime uint32
  58. }
  59. type ifreqAlias4 struct {
  60. Name [unix.IFNAMSIZ]byte
  61. Addr unix.RawSockaddrInet4
  62. DstAddr unix.RawSockaddrInet4
  63. MaskAddr unix.RawSockaddrInet4
  64. VHid uint32
  65. }
  66. type ifreqAlias6 struct {
  67. Name [unix.IFNAMSIZ]byte
  68. Addr unix.RawSockaddrInet6
  69. DstAddr unix.RawSockaddrInet6
  70. PrefixMask unix.RawSockaddrInet6
  71. Flags uint32
  72. Lifetime addrLifetime
  73. VHid uint32
  74. }
  75. type tun struct {
  76. Device string
  77. vpnNetworks []netip.Prefix
  78. MTU int
  79. Routes atomic.Pointer[[]Route]
  80. routeTree atomic.Pointer[bart.Table[routing.Gateways]]
  81. linkAddr *netroute.LinkAddr
  82. l *logrus.Logger
  83. devFd int
  84. }
  85. func (t *tun) Read(to []byte) (int, error) {
  86. // use readv() to read from the tunnel device, to eliminate the need for copying the buffer
  87. if t.devFd < 0 {
  88. return -1, syscall.EINVAL
  89. }
  90. // first 4 bytes is protocol family, in network byte order
  91. head := make([]byte, 4)
  92. iovecs := []syscall.Iovec{
  93. {&head[0], 4},
  94. {&to[0], uint64(len(to))},
  95. }
  96. n, _, errno := syscall.Syscall(syscall.SYS_READV, uintptr(t.devFd), uintptr(unsafe.Pointer(&iovecs[0])), uintptr(2))
  97. var err error
  98. if errno != 0 {
  99. err = syscall.Errno(errno)
  100. } else {
  101. err = nil
  102. }
  103. // fix bytes read number to exclude header
  104. bytesRead := int(n)
  105. if bytesRead < 0 {
  106. return bytesRead, err
  107. } else if bytesRead < 4 {
  108. return 0, err
  109. } else {
  110. return bytesRead - 4, err
  111. }
  112. }
  113. // Write is only valid for single threaded use
  114. func (t *tun) Write(from []byte) (int, error) {
  115. // use writev() to write to the tunnel device, to eliminate the need for copying the buffer
  116. if t.devFd < 0 {
  117. return -1, syscall.EINVAL
  118. }
  119. if len(from) <= 1 {
  120. return 0, syscall.EIO
  121. }
  122. ipVer := from[0] >> 4
  123. var head []byte
  124. // first 4 bytes is protocol family, in network byte order
  125. if ipVer == 4 {
  126. head = []byte{0, 0, 0, syscall.AF_INET}
  127. } else if ipVer == 6 {
  128. head = []byte{0, 0, 0, syscall.AF_INET6}
  129. } else {
  130. return 0, fmt.Errorf("unable to determine IP version from packet")
  131. }
  132. iovecs := []syscall.Iovec{
  133. {&head[0], 4},
  134. {&from[0], uint64(len(from))},
  135. }
  136. n, _, errno := syscall.Syscall(syscall.SYS_WRITEV, uintptr(t.devFd), uintptr(unsafe.Pointer(&iovecs[0])), uintptr(2))
  137. var err error
  138. if errno != 0 {
  139. err = syscall.Errno(errno)
  140. } else {
  141. err = nil
  142. }
  143. return int(n) - 4, err
  144. }
  145. func (t *tun) Close() error {
  146. if t.devFd >= 0 {
  147. err := syscall.Close(t.devFd)
  148. if err != nil {
  149. t.l.WithError(err).Error("Error closing device")
  150. }
  151. t.devFd = -1
  152. c := make(chan struct{})
  153. go func() {
  154. // destroying the interface can block if a read() is still pending. Do this asynchronously.
  155. defer close(c)
  156. s, err := syscall.Socket(syscall.AF_INET, syscall.SOCK_DGRAM, syscall.IPPROTO_IP)
  157. if err == nil {
  158. defer syscall.Close(s)
  159. ifreq := ifreqDestroy{Name: t.deviceBytes()}
  160. err = ioctl(uintptr(s), syscall.SIOCIFDESTROY, uintptr(unsafe.Pointer(&ifreq)))
  161. }
  162. if err != nil {
  163. t.l.WithError(err).Error("Error destroying tunnel")
  164. }
  165. }()
  166. // wait up to 1 second so we start blocking at the ioctl
  167. select {
  168. case <-c:
  169. case <-time.After(1 * time.Second):
  170. }
  171. }
  172. return nil
  173. }
  174. func newTunFromFd(_ *config.C, _ *logrus.Logger, _ int, _ []netip.Prefix) (*tun, error) {
  175. return nil, fmt.Errorf("newTunFromFd not supported in FreeBSD")
  176. }
  177. func newTun(c *config.C, l *logrus.Logger, vpnNetworks []netip.Prefix, _ bool) (*tun, error) {
  178. // Try to open existing tun device
  179. var fd int
  180. var err error
  181. deviceName := c.GetString("tun.dev", "")
  182. if deviceName != "" {
  183. fd, err = syscall.Open("/dev/"+deviceName, syscall.O_RDWR, 0)
  184. }
  185. if errors.Is(err, fs.ErrNotExist) || deviceName == "" {
  186. // If the device doesn't already exist, request a new one and rename it
  187. fd, err = syscall.Open("/dev/tun", syscall.O_RDWR, 0)
  188. }
  189. if err != nil {
  190. return nil, err
  191. }
  192. // Read the name of the interface
  193. var name [16]byte
  194. arg := fiodgnameArg{length: 16, buf: unsafe.Pointer(&name)}
  195. ctrlErr := ioctl(uintptr(fd), FIODGNAME, uintptr(unsafe.Pointer(&arg)))
  196. if ctrlErr == nil {
  197. // set broadcast mode and multicast
  198. ifmode := uint32(unix.IFF_BROADCAST | unix.IFF_MULTICAST)
  199. ctrlErr = ioctl(uintptr(fd), TUNSIFMODE, uintptr(unsafe.Pointer(&ifmode)))
  200. }
  201. if ctrlErr == nil {
  202. // turn on link-layer mode, to support ipv6
  203. ifhead := uint32(1)
  204. ctrlErr = ioctl(uintptr(fd), TUNSIFHEAD, uintptr(unsafe.Pointer(&ifhead)))
  205. }
  206. if ctrlErr != nil {
  207. return nil, err
  208. }
  209. ifName := string(bytes.TrimRight(name[:], "\x00"))
  210. if deviceName == "" {
  211. deviceName = ifName
  212. }
  213. // If the name doesn't match the desired interface name, rename it now
  214. if ifName != deviceName {
  215. s, err := unix.Socket(unix.AF_INET, unix.SOCK_DGRAM, unix.IPPROTO_IP)
  216. if err != nil {
  217. return nil, err
  218. }
  219. defer syscall.Close(s)
  220. fd := uintptr(s)
  221. var fromName [16]byte
  222. var toName [16]byte
  223. copy(fromName[:], ifName)
  224. copy(toName[:], deviceName)
  225. ifrr := ifreqRename{
  226. Name: fromName,
  227. Data: uintptr(unsafe.Pointer(&toName)),
  228. }
  229. // Set the device name
  230. ioctl(fd, syscall.SIOCSIFNAME, uintptr(unsafe.Pointer(&ifrr)))
  231. }
  232. t := &tun{
  233. Device: deviceName,
  234. vpnNetworks: vpnNetworks,
  235. MTU: c.GetInt("tun.mtu", DefaultMTU),
  236. l: l,
  237. devFd: fd,
  238. }
  239. err = t.reload(c, true)
  240. if err != nil {
  241. return nil, err
  242. }
  243. c.RegisterReloadCallback(func(c *config.C) {
  244. err := t.reload(c, false)
  245. if err != nil {
  246. util.LogWithContextIfNeeded("failed to reload tun device", err, t.l)
  247. }
  248. })
  249. return t, nil
  250. }
  251. func (t *tun) addIp(cidr netip.Prefix) error {
  252. if cidr.Addr().Is4() {
  253. ifr := ifreqAlias4{
  254. Name: t.deviceBytes(),
  255. Addr: unix.RawSockaddrInet4{
  256. Len: unix.SizeofSockaddrInet4,
  257. Family: unix.AF_INET,
  258. Addr: cidr.Addr().As4(),
  259. },
  260. DstAddr: unix.RawSockaddrInet4{
  261. Len: unix.SizeofSockaddrInet4,
  262. Family: unix.AF_INET,
  263. Addr: getBroadcast(cidr).As4(),
  264. },
  265. MaskAddr: unix.RawSockaddrInet4{
  266. Len: unix.SizeofSockaddrInet4,
  267. Family: unix.AF_INET,
  268. Addr: prefixToMask(cidr).As4(),
  269. },
  270. VHid: 0,
  271. }
  272. s, err := unix.Socket(unix.AF_INET, unix.SOCK_DGRAM, unix.IPPROTO_IP)
  273. if err != nil {
  274. return err
  275. }
  276. defer syscall.Close(s)
  277. // Note: unix.SIOCAIFADDR corresponds to FreeBSD's OSIOCAIFADDR
  278. if err := ioctl(uintptr(s), unix.SIOCAIFADDR, uintptr(unsafe.Pointer(&ifr))); err != nil {
  279. return fmt.Errorf("failed to set tun address %s: %s", cidr.Addr().String(), err)
  280. }
  281. return nil
  282. }
  283. if cidr.Addr().Is6() {
  284. ifr := ifreqAlias6{
  285. Name: t.deviceBytes(),
  286. Addr: unix.RawSockaddrInet6{
  287. Len: unix.SizeofSockaddrInet6,
  288. Family: unix.AF_INET6,
  289. Addr: cidr.Addr().As16(),
  290. },
  291. PrefixMask: unix.RawSockaddrInet6{
  292. Len: unix.SizeofSockaddrInet6,
  293. Family: unix.AF_INET6,
  294. Addr: prefixToMask(cidr).As16(),
  295. },
  296. Lifetime: addrLifetime{
  297. Expire: 0,
  298. Preferred: 0,
  299. Vltime: 0xffffffff,
  300. Pltime: 0xffffffff,
  301. },
  302. Flags: IN6_IFF_NODAD,
  303. }
  304. s, err := syscall.Socket(syscall.AF_INET6, syscall.SOCK_DGRAM, syscall.IPPROTO_IP)
  305. if err != nil {
  306. return err
  307. }
  308. defer syscall.Close(s)
  309. if err := ioctl(uintptr(s), OSIOCAIFADDR_IN6, uintptr(unsafe.Pointer(&ifr))); err != nil {
  310. return fmt.Errorf("failed to set tun address %s: %s", cidr.Addr().String(), err)
  311. }
  312. return nil
  313. }
  314. return fmt.Errorf("unknown address type %v", cidr)
  315. }
  316. func (t *tun) Activate() error {
  317. // Setup our default MTU
  318. err := t.setMTU()
  319. if err != nil {
  320. return err
  321. }
  322. linkAddr, err := getLinkAddr(t.Device)
  323. if err != nil {
  324. return err
  325. }
  326. if linkAddr == nil {
  327. return fmt.Errorf("unable to discover link_addr for tun interface")
  328. }
  329. t.linkAddr = linkAddr
  330. for i := range t.vpnNetworks {
  331. err := t.addIp(t.vpnNetworks[i])
  332. if err != nil {
  333. return err
  334. }
  335. }
  336. return t.addRoutes(false)
  337. }
  338. func (t *tun) setMTU() error {
  339. // Set the MTU on the device
  340. s, err := unix.Socket(unix.AF_INET, unix.SOCK_DGRAM, unix.IPPROTO_IP)
  341. if err != nil {
  342. return err
  343. }
  344. defer syscall.Close(s)
  345. ifm := ifreqMTU{Name: t.deviceBytes(), MTU: int32(t.MTU)}
  346. err = ioctl(uintptr(s), unix.SIOCSIFMTU, uintptr(unsafe.Pointer(&ifm)))
  347. return err
  348. }
  349. func (t *tun) reload(c *config.C, initial bool) error {
  350. change, routes, err := getAllRoutesFromConfig(c, t.vpnNetworks, initial)
  351. if err != nil {
  352. return err
  353. }
  354. if !initial && !change {
  355. return nil
  356. }
  357. routeTree, err := makeRouteTree(t.l, routes, false)
  358. if err != nil {
  359. return err
  360. }
  361. // Teach nebula how to handle the routes before establishing them in the system table
  362. oldRoutes := t.Routes.Swap(&routes)
  363. t.routeTree.Store(routeTree)
  364. if !initial {
  365. // Remove first, if the system removes a wanted route hopefully it will be re-added next
  366. err := t.removeRoutes(findRemovedRoutes(routes, *oldRoutes))
  367. if err != nil {
  368. util.LogWithContextIfNeeded("Failed to remove routes", err, t.l)
  369. }
  370. // Ensure any routes we actually want are installed
  371. err = t.addRoutes(true)
  372. if err != nil {
  373. // Catch any stray logs
  374. util.LogWithContextIfNeeded("Failed to add routes", err, t.l)
  375. }
  376. }
  377. return nil
  378. }
  379. func (t *tun) RoutesFor(ip netip.Addr) routing.Gateways {
  380. r, _ := t.routeTree.Load().Lookup(ip)
  381. return r
  382. }
  383. func (t *tun) Networks() []netip.Prefix {
  384. return t.vpnNetworks
  385. }
  386. func (t *tun) Name() string {
  387. return t.Device
  388. }
  389. func (t *tun) NewMultiQueueReader() (io.ReadWriteCloser, error) {
  390. return nil, fmt.Errorf("TODO: multiqueue not implemented for freebsd")
  391. }
  392. func (t *tun) addRoutes(logErrors bool) error {
  393. routes := *t.Routes.Load()
  394. for _, r := range routes {
  395. if len(r.Via) == 0 || !r.Install {
  396. // We don't allow route MTUs so only install routes with a via
  397. continue
  398. }
  399. err := addRoute(r.Cidr, t.linkAddr)
  400. if err != nil {
  401. retErr := util.NewContextualError("Failed to add route", map[string]any{"route": r}, err)
  402. if logErrors {
  403. retErr.Log(t.l)
  404. } else {
  405. return retErr
  406. }
  407. } else {
  408. t.l.WithField("route", r).Info("Added route")
  409. }
  410. }
  411. return nil
  412. }
  413. func (t *tun) removeRoutes(routes []Route) error {
  414. for _, r := range routes {
  415. if !r.Install {
  416. continue
  417. }
  418. err := delRoute(r.Cidr, t.linkAddr)
  419. if err != nil {
  420. t.l.WithError(err).WithField("route", r).Error("Failed to remove route")
  421. } else {
  422. t.l.WithField("route", r).Info("Removed route")
  423. }
  424. }
  425. return nil
  426. }
  427. func (t *tun) deviceBytes() (o [16]byte) {
  428. for i, c := range t.Device {
  429. o[i] = byte(c)
  430. }
  431. return
  432. }
  433. func flipBytes(b []byte) []byte {
  434. for i := 0; i < len(b); i++ {
  435. b[i] ^= 0xFF
  436. }
  437. return b
  438. }
  439. func orBytes(a []byte, b []byte) []byte {
  440. ret := make([]byte, len(a))
  441. for i := 0; i < len(a); i++ {
  442. ret[i] = a[i] | b[i]
  443. }
  444. return ret
  445. }
  446. func getBroadcast(cidr netip.Prefix) netip.Addr {
  447. broadcast, _ := netip.AddrFromSlice(
  448. orBytes(
  449. cidr.Addr().AsSlice(),
  450. flipBytes(prefixToMask(cidr).AsSlice()),
  451. ),
  452. )
  453. return broadcast
  454. }
  455. func addRoute(prefix netip.Prefix, gateway netroute.Addr) error {
  456. sock, err := unix.Socket(unix.AF_ROUTE, unix.SOCK_RAW, unix.AF_UNSPEC)
  457. if err != nil {
  458. return fmt.Errorf("unable to create AF_ROUTE socket: %v", err)
  459. }
  460. defer unix.Close(sock)
  461. route := &netroute.RouteMessage{
  462. Version: unix.RTM_VERSION,
  463. Type: unix.RTM_ADD,
  464. Flags: unix.RTF_UP,
  465. Seq: 1,
  466. }
  467. if prefix.Addr().Is4() {
  468. route.Addrs = []netroute.Addr{
  469. unix.RTAX_DST: &netroute.Inet4Addr{IP: prefix.Masked().Addr().As4()},
  470. unix.RTAX_NETMASK: &netroute.Inet4Addr{IP: prefixToMask(prefix).As4()},
  471. unix.RTAX_GATEWAY: gateway,
  472. }
  473. } else {
  474. route.Addrs = []netroute.Addr{
  475. unix.RTAX_DST: &netroute.Inet6Addr{IP: prefix.Masked().Addr().As16()},
  476. unix.RTAX_NETMASK: &netroute.Inet6Addr{IP: prefixToMask(prefix).As16()},
  477. unix.RTAX_GATEWAY: gateway,
  478. }
  479. }
  480. data, err := route.Marshal()
  481. if err != nil {
  482. return fmt.Errorf("failed to create route.RouteMessage: %w", err)
  483. }
  484. _, err = unix.Write(sock, data[:])
  485. if err != nil {
  486. if errors.Is(err, unix.EEXIST) {
  487. // Try to do a change
  488. route.Type = unix.RTM_CHANGE
  489. data, err = route.Marshal()
  490. if err != nil {
  491. return fmt.Errorf("failed to create route.RouteMessage for change: %w", err)
  492. }
  493. _, err = unix.Write(sock, data[:])
  494. fmt.Println("DOING CHANGE")
  495. return err
  496. }
  497. return fmt.Errorf("failed to write route.RouteMessage to socket: %w", err)
  498. }
  499. return nil
  500. }
  501. func delRoute(prefix netip.Prefix, gateway netroute.Addr) error {
  502. sock, err := unix.Socket(unix.AF_ROUTE, unix.SOCK_RAW, unix.AF_UNSPEC)
  503. if err != nil {
  504. return fmt.Errorf("unable to create AF_ROUTE socket: %v", err)
  505. }
  506. defer unix.Close(sock)
  507. route := netroute.RouteMessage{
  508. Version: unix.RTM_VERSION,
  509. Type: unix.RTM_DELETE,
  510. Seq: 1,
  511. }
  512. if prefix.Addr().Is4() {
  513. route.Addrs = []netroute.Addr{
  514. unix.RTAX_DST: &netroute.Inet4Addr{IP: prefix.Masked().Addr().As4()},
  515. unix.RTAX_NETMASK: &netroute.Inet4Addr{IP: prefixToMask(prefix).As4()},
  516. unix.RTAX_GATEWAY: gateway,
  517. }
  518. } else {
  519. route.Addrs = []netroute.Addr{
  520. unix.RTAX_DST: &netroute.Inet6Addr{IP: prefix.Masked().Addr().As16()},
  521. unix.RTAX_NETMASK: &netroute.Inet6Addr{IP: prefixToMask(prefix).As16()},
  522. unix.RTAX_GATEWAY: gateway,
  523. }
  524. }
  525. data, err := route.Marshal()
  526. if err != nil {
  527. return fmt.Errorf("failed to create route.RouteMessage: %w", err)
  528. }
  529. _, err = unix.Write(sock, data[:])
  530. if err != nil {
  531. return fmt.Errorf("failed to write route.RouteMessage to socket: %w", err)
  532. }
  533. return nil
  534. }
  535. // getLinkAddr Gets the link address for the interface of the given name
  536. func getLinkAddr(name string) (*netroute.LinkAddr, error) {
  537. rib, err := netroute.FetchRIB(unix.AF_UNSPEC, unix.NET_RT_IFLIST, 0)
  538. if err != nil {
  539. return nil, err
  540. }
  541. msgs, err := netroute.ParseRIB(unix.NET_RT_IFLIST, rib)
  542. if err != nil {
  543. return nil, err
  544. }
  545. for _, m := range msgs {
  546. switch m := m.(type) {
  547. case *netroute.InterfaceMessage:
  548. if m.Name == name {
  549. sa, ok := m.Addrs[unix.RTAX_IFP].(*netroute.LinkAddr)
  550. if ok {
  551. return sa, nil
  552. }
  553. }
  554. }
  555. }
  556. return nil, nil
  557. }