tun_linux.go 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663
  1. //go:build !android && !e2e_testing
  2. // +build !android,!e2e_testing
  3. package overlay
  4. import (
  5. "fmt"
  6. "io"
  7. "net"
  8. "net/netip"
  9. "os"
  10. "strings"
  11. "sync/atomic"
  12. "time"
  13. "unsafe"
  14. "github.com/gaissmai/bart"
  15. "github.com/sirupsen/logrus"
  16. "github.com/slackhq/nebula/config"
  17. "github.com/slackhq/nebula/routing"
  18. "github.com/slackhq/nebula/util"
  19. "github.com/vishvananda/netlink"
  20. "golang.org/x/sys/unix"
  21. )
  22. type tun struct {
  23. io.ReadWriteCloser
  24. fd int
  25. Device string
  26. vpnNetworks []netip.Prefix
  27. MaxMTU int
  28. DefaultMTU int
  29. TXQueueLen int
  30. deviceIndex int
  31. ioctlFd uintptr
  32. Routes atomic.Pointer[[]Route]
  33. routeTree atomic.Pointer[bart.Table[routing.Gateways]]
  34. routeChan chan struct{}
  35. useSystemRoutes bool
  36. l *logrus.Logger
  37. }
  38. func (t *tun) Networks() []netip.Prefix {
  39. return t.vpnNetworks
  40. }
  41. type ifReq struct {
  42. Name [16]byte
  43. Flags uint16
  44. pad [8]byte
  45. }
  46. type ifreqMTU struct {
  47. Name [16]byte
  48. MTU int32
  49. pad [8]byte
  50. }
  51. type ifreqQLEN struct {
  52. Name [16]byte
  53. Value int32
  54. pad [8]byte
  55. }
  56. func newTunFromFd(c *config.C, l *logrus.Logger, deviceFd int, vpnNetworks []netip.Prefix) (*tun, error) {
  57. file := os.NewFile(uintptr(deviceFd), "/dev/net/tun")
  58. t, err := newTunGeneric(c, l, file, vpnNetworks)
  59. if err != nil {
  60. return nil, err
  61. }
  62. t.Device = "tun0"
  63. return t, nil
  64. }
  65. func newTun(c *config.C, l *logrus.Logger, vpnNetworks []netip.Prefix, multiqueue bool) (*tun, error) {
  66. fd, err := unix.Open("/dev/net/tun", os.O_RDWR, 0)
  67. if err != nil {
  68. // If /dev/net/tun doesn't exist, try to create it (will happen in docker)
  69. if os.IsNotExist(err) {
  70. err = os.MkdirAll("/dev/net", 0755)
  71. if err != nil {
  72. return nil, fmt.Errorf("/dev/net/tun doesn't exist, failed to mkdir -p /dev/net: %w", err)
  73. }
  74. err = unix.Mknod("/dev/net/tun", unix.S_IFCHR|0600, int(unix.Mkdev(10, 200)))
  75. if err != nil {
  76. return nil, fmt.Errorf("failed to create /dev/net/tun: %w", err)
  77. }
  78. fd, err = unix.Open("/dev/net/tun", os.O_RDWR, 0)
  79. if err != nil {
  80. return nil, fmt.Errorf("created /dev/net/tun, but still failed: %w", err)
  81. }
  82. } else {
  83. return nil, err
  84. }
  85. }
  86. var req ifReq
  87. req.Flags = uint16(unix.IFF_TUN | unix.IFF_NO_PI)
  88. if multiqueue {
  89. req.Flags |= unix.IFF_MULTI_QUEUE
  90. }
  91. copy(req.Name[:], c.GetString("tun.dev", ""))
  92. if err = ioctl(uintptr(fd), uintptr(unix.TUNSETIFF), uintptr(unsafe.Pointer(&req))); err != nil {
  93. return nil, err
  94. }
  95. name := strings.Trim(string(req.Name[:]), "\x00")
  96. file := os.NewFile(uintptr(fd), "/dev/net/tun")
  97. t, err := newTunGeneric(c, l, file, vpnNetworks)
  98. if err != nil {
  99. return nil, err
  100. }
  101. t.Device = name
  102. return t, nil
  103. }
  104. func newTunGeneric(c *config.C, l *logrus.Logger, file *os.File, vpnNetworks []netip.Prefix) (*tun, error) {
  105. t := &tun{
  106. ReadWriteCloser: file,
  107. fd: int(file.Fd()),
  108. vpnNetworks: vpnNetworks,
  109. TXQueueLen: c.GetInt("tun.tx_queue", 500),
  110. useSystemRoutes: c.GetBool("tun.use_system_route_table", false),
  111. l: l,
  112. }
  113. err := t.reload(c, true)
  114. if err != nil {
  115. return nil, err
  116. }
  117. c.RegisterReloadCallback(func(c *config.C) {
  118. err := t.reload(c, false)
  119. if err != nil {
  120. util.LogWithContextIfNeeded("failed to reload tun device", err, t.l)
  121. }
  122. })
  123. return t, nil
  124. }
  125. func (t *tun) reload(c *config.C, initial bool) error {
  126. routeChange, routes, err := getAllRoutesFromConfig(c, t.vpnNetworks, initial)
  127. if err != nil {
  128. return err
  129. }
  130. if !initial && !routeChange && !c.HasChanged("tun.mtu") {
  131. return nil
  132. }
  133. routeTree, err := makeRouteTree(t.l, routes, true)
  134. if err != nil {
  135. return err
  136. }
  137. oldDefaultMTU := t.DefaultMTU
  138. oldMaxMTU := t.MaxMTU
  139. newDefaultMTU := c.GetInt("tun.mtu", DefaultMTU)
  140. newMaxMTU := newDefaultMTU
  141. for i, r := range routes {
  142. if r.MTU == 0 {
  143. routes[i].MTU = newDefaultMTU
  144. }
  145. if r.MTU > t.MaxMTU {
  146. newMaxMTU = r.MTU
  147. }
  148. }
  149. t.MaxMTU = newMaxMTU
  150. t.DefaultMTU = newDefaultMTU
  151. // Teach nebula how to handle the routes before establishing them in the system table
  152. oldRoutes := t.Routes.Swap(&routes)
  153. t.routeTree.Store(routeTree)
  154. if !initial {
  155. if oldMaxMTU != newMaxMTU {
  156. t.setMTU()
  157. t.l.Infof("Set max MTU to %v was %v", t.MaxMTU, oldMaxMTU)
  158. }
  159. if oldDefaultMTU != newDefaultMTU {
  160. for i := range t.vpnNetworks {
  161. err := t.setDefaultRoute(t.vpnNetworks[i])
  162. if err != nil {
  163. t.l.Warn(err)
  164. } else {
  165. t.l.Infof("Set default MTU to %v was %v", t.DefaultMTU, oldDefaultMTU)
  166. }
  167. }
  168. }
  169. // Remove first, if the system removes a wanted route hopefully it will be re-added next
  170. t.removeRoutes(findRemovedRoutes(routes, *oldRoutes))
  171. // Ensure any routes we actually want are installed
  172. err = t.addRoutes(true)
  173. if err != nil {
  174. // This should never be called since addRoutes should log its own errors in a reload condition
  175. util.LogWithContextIfNeeded("Failed to refresh routes", err, t.l)
  176. }
  177. }
  178. return nil
  179. }
  180. func (t *tun) NewMultiQueueReader() (io.ReadWriteCloser, error) {
  181. fd, err := unix.Open("/dev/net/tun", os.O_RDWR, 0)
  182. if err != nil {
  183. return nil, err
  184. }
  185. var req ifReq
  186. req.Flags = uint16(unix.IFF_TUN | unix.IFF_NO_PI | unix.IFF_MULTI_QUEUE)
  187. copy(req.Name[:], t.Device)
  188. if err = ioctl(uintptr(fd), uintptr(unix.TUNSETIFF), uintptr(unsafe.Pointer(&req))); err != nil {
  189. return nil, err
  190. }
  191. file := os.NewFile(uintptr(fd), "/dev/net/tun")
  192. return file, nil
  193. }
  194. func (t *tun) RoutesFor(ip netip.Addr) routing.Gateways {
  195. r, _ := t.routeTree.Load().Lookup(ip)
  196. return r
  197. }
  198. func (t *tun) Write(b []byte) (int, error) {
  199. var nn int
  200. maximum := len(b)
  201. for {
  202. n, err := unix.Write(t.fd, b[nn:maximum])
  203. if n > 0 {
  204. nn += n
  205. }
  206. if nn == len(b) {
  207. return nn, err
  208. }
  209. if err != nil {
  210. return nn, err
  211. }
  212. if n == 0 {
  213. return nn, io.ErrUnexpectedEOF
  214. }
  215. }
  216. }
  217. func (t *tun) deviceBytes() (o [16]byte) {
  218. for i, c := range t.Device {
  219. o[i] = byte(c)
  220. }
  221. return
  222. }
  223. func hasNetlinkAddr(al []*netlink.Addr, x netlink.Addr) bool {
  224. for i := range al {
  225. if al[i].Equal(x) {
  226. return true
  227. }
  228. }
  229. return false
  230. }
  231. // addIPs uses netlink to add all addresses that don't exist, then it removes ones that should not be there
  232. func (t *tun) addIPs(link netlink.Link) error {
  233. newAddrs := make([]*netlink.Addr, len(t.vpnNetworks))
  234. for i := range t.vpnNetworks {
  235. newAddrs[i] = &netlink.Addr{
  236. IPNet: &net.IPNet{
  237. IP: t.vpnNetworks[i].Addr().AsSlice(),
  238. Mask: net.CIDRMask(t.vpnNetworks[i].Bits(), t.vpnNetworks[i].Addr().BitLen()),
  239. },
  240. Label: t.vpnNetworks[i].Addr().Zone(),
  241. }
  242. }
  243. //add all new addresses
  244. for i := range newAddrs {
  245. //TODO: CERT-V2 do we want to stack errors and try as many ops as possible?
  246. //AddrReplace still adds new IPs, but if their properties change it will change them as well
  247. if err := netlink.AddrReplace(link, newAddrs[i]); err != nil {
  248. return err
  249. }
  250. }
  251. //iterate over remainder, remove whoever shouldn't be there
  252. al, err := netlink.AddrList(link, netlink.FAMILY_ALL)
  253. if err != nil {
  254. return fmt.Errorf("failed to get tun address list: %s", err)
  255. }
  256. for i := range al {
  257. if hasNetlinkAddr(newAddrs, al[i]) {
  258. continue
  259. }
  260. err = netlink.AddrDel(link, &al[i])
  261. if err != nil {
  262. t.l.WithError(err).Error("failed to remove address from tun address list")
  263. } else {
  264. t.l.WithField("removed", al[i].String()).Info("removed address not listed in cert(s)")
  265. }
  266. }
  267. return nil
  268. }
  269. func (t *tun) Activate() error {
  270. devName := t.deviceBytes()
  271. if t.useSystemRoutes {
  272. t.watchRoutes()
  273. }
  274. s, err := unix.Socket(
  275. unix.AF_INET, //because everything we use t.ioctlFd for is address family independent, this is fine
  276. unix.SOCK_DGRAM,
  277. unix.IPPROTO_IP,
  278. )
  279. if err != nil {
  280. return err
  281. }
  282. t.ioctlFd = uintptr(s)
  283. // Set the device name
  284. ifrf := ifReq{Name: devName}
  285. if err = ioctl(t.ioctlFd, unix.SIOCGIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  286. return fmt.Errorf("failed to set tun device name: %s", err)
  287. }
  288. link, err := netlink.LinkByName(t.Device)
  289. if err != nil {
  290. return fmt.Errorf("failed to get tun device link: %s", err)
  291. }
  292. t.deviceIndex = link.Attrs().Index
  293. // Setup our default MTU
  294. t.setMTU()
  295. // Set the transmit queue length
  296. ifrq := ifreqQLEN{Name: devName, Value: int32(t.TXQueueLen)}
  297. if err = ioctl(t.ioctlFd, unix.SIOCSIFTXQLEN, uintptr(unsafe.Pointer(&ifrq))); err != nil {
  298. // If we can't set the queue length nebula will still work but it may lead to packet loss
  299. t.l.WithError(err).Error("Failed to set tun tx queue length")
  300. }
  301. if err = t.addIPs(link); err != nil {
  302. return err
  303. }
  304. // Bring up the interface
  305. ifrf.Flags = ifrf.Flags | unix.IFF_UP
  306. if err = ioctl(t.ioctlFd, unix.SIOCSIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  307. return fmt.Errorf("failed to bring the tun device up: %s", err)
  308. }
  309. //set route MTU
  310. for i := range t.vpnNetworks {
  311. if err = t.setDefaultRoute(t.vpnNetworks[i]); err != nil {
  312. return fmt.Errorf("failed to set default route MTU: %w", err)
  313. }
  314. }
  315. // Set the routes
  316. if err = t.addRoutes(false); err != nil {
  317. return err
  318. }
  319. // Run the interface
  320. ifrf.Flags = ifrf.Flags | unix.IFF_UP | unix.IFF_RUNNING
  321. if err = ioctl(t.ioctlFd, unix.SIOCSIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  322. return fmt.Errorf("failed to run tun device: %s", err)
  323. }
  324. return nil
  325. }
  326. func (t *tun) setMTU() {
  327. // Set the MTU on the device
  328. ifm := ifreqMTU{Name: t.deviceBytes(), MTU: int32(t.MaxMTU)}
  329. if err := ioctl(t.ioctlFd, unix.SIOCSIFMTU, uintptr(unsafe.Pointer(&ifm))); err != nil {
  330. // This is currently a non fatal condition because the route table must have the MTU set appropriately as well
  331. t.l.WithError(err).Error("Failed to set tun mtu")
  332. }
  333. }
  334. func (t *tun) setDefaultRoute(cidr netip.Prefix) error {
  335. dr := &net.IPNet{
  336. IP: cidr.Masked().Addr().AsSlice(),
  337. Mask: net.CIDRMask(cidr.Bits(), cidr.Addr().BitLen()),
  338. }
  339. nr := netlink.Route{
  340. LinkIndex: t.deviceIndex,
  341. Dst: dr,
  342. MTU: t.DefaultMTU,
  343. AdvMSS: t.advMSS(Route{}),
  344. Scope: unix.RT_SCOPE_LINK,
  345. Src: net.IP(cidr.Addr().AsSlice()),
  346. Protocol: unix.RTPROT_KERNEL,
  347. Table: unix.RT_TABLE_MAIN,
  348. Type: unix.RTN_UNICAST,
  349. }
  350. err := netlink.RouteReplace(&nr)
  351. if err != nil {
  352. t.l.WithError(err).WithField("cidr", cidr).Warn("Failed to set default route MTU, retrying")
  353. //retry twice more -- on some systems there appears to be a race condition where if we set routes too soon, netlink says `invalid argument`
  354. for i := 0; i < 2; i++ {
  355. time.Sleep(100 * time.Millisecond)
  356. err = netlink.RouteReplace(&nr)
  357. if err == nil {
  358. break
  359. } else {
  360. t.l.WithError(err).WithField("cidr", cidr).WithField("mtu", t.DefaultMTU).Warn("Failed to set default route MTU, retrying")
  361. }
  362. }
  363. if err != nil {
  364. return fmt.Errorf("failed to set mtu %v on the default route %v; %v", t.DefaultMTU, dr, err)
  365. }
  366. }
  367. return nil
  368. }
  369. func (t *tun) addRoutes(logErrors bool) error {
  370. // Path routes
  371. routes := *t.Routes.Load()
  372. for _, r := range routes {
  373. if !r.Install {
  374. continue
  375. }
  376. dr := &net.IPNet{
  377. IP: r.Cidr.Masked().Addr().AsSlice(),
  378. Mask: net.CIDRMask(r.Cidr.Bits(), r.Cidr.Addr().BitLen()),
  379. }
  380. nr := netlink.Route{
  381. LinkIndex: t.deviceIndex,
  382. Dst: dr,
  383. MTU: r.MTU,
  384. AdvMSS: t.advMSS(r),
  385. Scope: unix.RT_SCOPE_LINK,
  386. }
  387. if r.Metric > 0 {
  388. nr.Priority = r.Metric
  389. }
  390. err := netlink.RouteReplace(&nr)
  391. if err != nil {
  392. retErr := util.NewContextualError("Failed to add route", map[string]any{"route": r}, err)
  393. if logErrors {
  394. retErr.Log(t.l)
  395. } else {
  396. return retErr
  397. }
  398. } else {
  399. t.l.WithField("route", r).Info("Added route")
  400. }
  401. }
  402. return nil
  403. }
  404. func (t *tun) removeRoutes(routes []Route) {
  405. for _, r := range routes {
  406. if !r.Install {
  407. continue
  408. }
  409. dr := &net.IPNet{
  410. IP: r.Cidr.Masked().Addr().AsSlice(),
  411. Mask: net.CIDRMask(r.Cidr.Bits(), r.Cidr.Addr().BitLen()),
  412. }
  413. nr := netlink.Route{
  414. LinkIndex: t.deviceIndex,
  415. Dst: dr,
  416. MTU: r.MTU,
  417. AdvMSS: t.advMSS(r),
  418. Scope: unix.RT_SCOPE_LINK,
  419. }
  420. if r.Metric > 0 {
  421. nr.Priority = r.Metric
  422. }
  423. err := netlink.RouteDel(&nr)
  424. if err != nil {
  425. t.l.WithError(err).WithField("route", r).Error("Failed to remove route")
  426. } else {
  427. t.l.WithField("route", r).Info("Removed route")
  428. }
  429. }
  430. }
  431. func (t *tun) Name() string {
  432. return t.Device
  433. }
  434. func (t *tun) advMSS(r Route) int {
  435. mtu := r.MTU
  436. if r.MTU == 0 {
  437. mtu = t.DefaultMTU
  438. }
  439. // We only need to set advmss if the route MTU does not match the device MTU
  440. if mtu != t.MaxMTU {
  441. return mtu - 40
  442. }
  443. return 0
  444. }
  445. func (t *tun) watchRoutes() {
  446. rch := make(chan netlink.RouteUpdate)
  447. doneChan := make(chan struct{})
  448. if err := netlink.RouteSubscribe(rch, doneChan); err != nil {
  449. t.l.WithError(err).Errorf("failed to subscribe to system route changes")
  450. return
  451. }
  452. t.routeChan = doneChan
  453. go func() {
  454. for {
  455. select {
  456. case r := <-rch:
  457. t.updateRoutes(r)
  458. case <-doneChan:
  459. // netlink.RouteSubscriber will close the rch for us
  460. return
  461. }
  462. }
  463. }()
  464. }
  465. func (t *tun) isGatewayInVpnNetworks(gwAddr netip.Addr) bool {
  466. withinNetworks := false
  467. for i := range t.vpnNetworks {
  468. if t.vpnNetworks[i].Contains(gwAddr) {
  469. withinNetworks = true
  470. break
  471. }
  472. }
  473. return withinNetworks
  474. }
  475. func (t *tun) getGatewaysFromRoute(r *netlink.Route) routing.Gateways {
  476. var gateways routing.Gateways
  477. link, err := netlink.LinkByName(t.Device)
  478. if err != nil {
  479. t.l.WithField("Devicename", t.Device).Error("Ignoring route update: failed to get link by name")
  480. return gateways
  481. }
  482. // If this route is relevant to our interface and there is a gateway then add it
  483. if r.LinkIndex == link.Attrs().Index && len(r.Gw) > 0 {
  484. gwAddr, ok := netip.AddrFromSlice(r.Gw)
  485. if !ok {
  486. t.l.WithField("route", r).Debug("Ignoring route update, invalid gateway address")
  487. } else {
  488. gwAddr = gwAddr.Unmap()
  489. if !t.isGatewayInVpnNetworks(gwAddr) {
  490. // Gateway isn't in our overlay network, ignore
  491. t.l.WithField("route", r).Debug("Ignoring route update, not in our network")
  492. } else {
  493. gateways = append(gateways, routing.NewGateway(gwAddr, 1))
  494. }
  495. }
  496. }
  497. for _, p := range r.MultiPath {
  498. // If this route is relevant to our interface and there is a gateway then add it
  499. if p.LinkIndex == link.Attrs().Index && len(p.Gw) > 0 {
  500. gwAddr, ok := netip.AddrFromSlice(p.Gw)
  501. if !ok {
  502. t.l.WithField("route", r).Debug("Ignoring multipath route update, invalid gateway address")
  503. } else {
  504. gwAddr = gwAddr.Unmap()
  505. if !t.isGatewayInVpnNetworks(gwAddr) {
  506. // Gateway isn't in our overlay network, ignore
  507. t.l.WithField("route", r).Debug("Ignoring route update, not in our network")
  508. } else {
  509. // p.Hops+1 = weight of the route
  510. gateways = append(gateways, routing.NewGateway(gwAddr, p.Hops+1))
  511. }
  512. }
  513. }
  514. }
  515. routing.CalculateBucketsForGateways(gateways)
  516. return gateways
  517. }
  518. func (t *tun) updateRoutes(r netlink.RouteUpdate) {
  519. gateways := t.getGatewaysFromRoute(&r.Route)
  520. if len(gateways) == 0 {
  521. // No gateways relevant to our network, no routing changes required.
  522. t.l.WithField("route", r).Debug("Ignoring route update, no gateways")
  523. return
  524. }
  525. dstAddr, ok := netip.AddrFromSlice(r.Dst.IP)
  526. if !ok {
  527. t.l.WithField("route", r).Debug("Ignoring route update, invalid destination address")
  528. return
  529. }
  530. ones, _ := r.Dst.Mask.Size()
  531. dst := netip.PrefixFrom(dstAddr, ones)
  532. newTree := t.routeTree.Load().Clone()
  533. if r.Type == unix.RTM_NEWROUTE {
  534. t.l.WithField("destination", dst).WithField("via", gateways).Info("Adding route")
  535. newTree.Insert(dst, gateways)
  536. } else {
  537. t.l.WithField("destination", dst).WithField("via", gateways).Info("Removing route")
  538. newTree.Delete(dst)
  539. }
  540. t.routeTree.Store(newTree)
  541. }
  542. func (t *tun) Close() error {
  543. if t.routeChan != nil {
  544. close(t.routeChan)
  545. }
  546. if t.ReadWriteCloser != nil {
  547. _ = t.ReadWriteCloser.Close()
  548. }
  549. if t.ioctlFd > 0 {
  550. _ = os.NewFile(t.ioctlFd, "ioctlFd").Close()
  551. }
  552. return nil
  553. }