tun_freebsd.go 6.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308
  1. //go:build !e2e_testing
  2. // +build !e2e_testing
  3. package overlay
  4. import (
  5. "bytes"
  6. "errors"
  7. "fmt"
  8. "io"
  9. "io/fs"
  10. "net/netip"
  11. "os"
  12. "os/exec"
  13. "strconv"
  14. "sync/atomic"
  15. "syscall"
  16. "unsafe"
  17. "github.com/gaissmai/bart"
  18. "github.com/sirupsen/logrus"
  19. "github.com/slackhq/nebula/config"
  20. "github.com/slackhq/nebula/routing"
  21. "github.com/slackhq/nebula/util"
  22. )
  23. const (
  24. // FIODGNAME is defined in sys/sys/filio.h on FreeBSD
  25. // For 32-bit systems, use FIODGNAME_32 (not defined in this file: 0x80086678)
  26. FIODGNAME = 0x80106678
  27. )
  28. type fiodgnameArg struct {
  29. length int32
  30. pad [4]byte
  31. buf unsafe.Pointer
  32. }
  33. type ifreqRename struct {
  34. Name [16]byte
  35. Data uintptr
  36. }
  37. type ifreqDestroy struct {
  38. Name [16]byte
  39. pad [16]byte
  40. }
  41. type tun struct {
  42. Device string
  43. vpnNetworks []netip.Prefix
  44. MTU int
  45. Routes atomic.Pointer[[]Route]
  46. routeTree atomic.Pointer[bart.Table[routing.Gateways]]
  47. l *logrus.Logger
  48. io.ReadWriteCloser
  49. }
  50. func (t *tun) Close() error {
  51. if t.ReadWriteCloser != nil {
  52. if err := t.ReadWriteCloser.Close(); err != nil {
  53. return err
  54. }
  55. s, err := syscall.Socket(syscall.AF_INET, syscall.SOCK_DGRAM, syscall.IPPROTO_IP)
  56. if err != nil {
  57. return err
  58. }
  59. defer syscall.Close(s)
  60. ifreq := ifreqDestroy{Name: t.deviceBytes()}
  61. // Destroy the interface
  62. err = ioctl(uintptr(s), syscall.SIOCIFDESTROY, uintptr(unsafe.Pointer(&ifreq)))
  63. return err
  64. }
  65. return nil
  66. }
  67. func newTunFromFd(_ *config.C, _ *logrus.Logger, _ int, _ []netip.Prefix) (*tun, error) {
  68. return nil, fmt.Errorf("newTunFromFd not supported in FreeBSD")
  69. }
  70. func newTun(c *config.C, l *logrus.Logger, vpnNetworks []netip.Prefix, _ bool) (*tun, error) {
  71. // Try to open existing tun device
  72. var file *os.File
  73. var err error
  74. deviceName := c.GetString("tun.dev", "")
  75. if deviceName != "" {
  76. file, err = os.OpenFile("/dev/"+deviceName, os.O_RDWR, 0)
  77. }
  78. if errors.Is(err, fs.ErrNotExist) || deviceName == "" {
  79. // If the device doesn't already exist, request a new one and rename it
  80. file, err = os.OpenFile("/dev/tun", os.O_RDWR, 0)
  81. }
  82. if err != nil {
  83. return nil, err
  84. }
  85. rawConn, err := file.SyscallConn()
  86. if err != nil {
  87. return nil, fmt.Errorf("SyscallConn: %v", err)
  88. }
  89. var name [16]byte
  90. var ctrlErr error
  91. rawConn.Control(func(fd uintptr) {
  92. // Read the name of the interface
  93. arg := fiodgnameArg{length: 16, buf: unsafe.Pointer(&name)}
  94. ctrlErr = ioctl(fd, FIODGNAME, uintptr(unsafe.Pointer(&arg)))
  95. })
  96. if ctrlErr != nil {
  97. return nil, err
  98. }
  99. ifName := string(bytes.TrimRight(name[:], "\x00"))
  100. if deviceName == "" {
  101. deviceName = ifName
  102. }
  103. // If the name doesn't match the desired interface name, rename it now
  104. if ifName != deviceName {
  105. s, err := syscall.Socket(
  106. syscall.AF_INET,
  107. syscall.SOCK_DGRAM,
  108. syscall.IPPROTO_IP,
  109. )
  110. if err != nil {
  111. return nil, err
  112. }
  113. defer syscall.Close(s)
  114. fd := uintptr(s)
  115. var fromName [16]byte
  116. var toName [16]byte
  117. copy(fromName[:], ifName)
  118. copy(toName[:], deviceName)
  119. ifrr := ifreqRename{
  120. Name: fromName,
  121. Data: uintptr(unsafe.Pointer(&toName)),
  122. }
  123. // Set the device name
  124. ioctl(fd, syscall.SIOCSIFNAME, uintptr(unsafe.Pointer(&ifrr)))
  125. }
  126. t := &tun{
  127. ReadWriteCloser: file,
  128. Device: deviceName,
  129. vpnNetworks: vpnNetworks,
  130. MTU: c.GetInt("tun.mtu", DefaultMTU),
  131. l: l,
  132. }
  133. err = t.reload(c, true)
  134. if err != nil {
  135. return nil, err
  136. }
  137. c.RegisterReloadCallback(func(c *config.C) {
  138. err := t.reload(c, false)
  139. if err != nil {
  140. util.LogWithContextIfNeeded("failed to reload tun device", err, t.l)
  141. }
  142. })
  143. return t, nil
  144. }
  145. func (t *tun) addIp(cidr netip.Prefix) error {
  146. var err error
  147. // TODO use syscalls instead of exec.Command
  148. cmd := exec.Command("/sbin/ifconfig", t.Device, cidr.String(), cidr.Addr().String())
  149. t.l.Debug("command: ", cmd.String())
  150. if err = cmd.Run(); err != nil {
  151. return fmt.Errorf("failed to run 'ifconfig': %s", err)
  152. }
  153. cmd = exec.Command("/sbin/route", "-n", "add", "-net", cidr.String(), "-interface", t.Device)
  154. t.l.Debug("command: ", cmd.String())
  155. if err = cmd.Run(); err != nil {
  156. return fmt.Errorf("failed to run 'route add': %s", err)
  157. }
  158. cmd = exec.Command("/sbin/ifconfig", t.Device, "mtu", strconv.Itoa(t.MTU))
  159. t.l.Debug("command: ", cmd.String())
  160. if err = cmd.Run(); err != nil {
  161. return fmt.Errorf("failed to run 'ifconfig': %s", err)
  162. }
  163. // Unsafe path routes
  164. return t.addRoutes(false)
  165. }
  166. func (t *tun) Activate() error {
  167. for i := range t.vpnNetworks {
  168. err := t.addIp(t.vpnNetworks[i])
  169. if err != nil {
  170. return err
  171. }
  172. }
  173. return nil
  174. }
  175. func (t *tun) reload(c *config.C, initial bool) error {
  176. change, routes, err := getAllRoutesFromConfig(c, t.vpnNetworks, initial)
  177. if err != nil {
  178. return err
  179. }
  180. if !initial && !change {
  181. return nil
  182. }
  183. routeTree, err := makeRouteTree(t.l, routes, false)
  184. if err != nil {
  185. return err
  186. }
  187. // Teach nebula how to handle the routes before establishing them in the system table
  188. oldRoutes := t.Routes.Swap(&routes)
  189. t.routeTree.Store(routeTree)
  190. if !initial {
  191. // Remove first, if the system removes a wanted route hopefully it will be re-added next
  192. err := t.removeRoutes(findRemovedRoutes(routes, *oldRoutes))
  193. if err != nil {
  194. util.LogWithContextIfNeeded("Failed to remove routes", err, t.l)
  195. }
  196. // Ensure any routes we actually want are installed
  197. err = t.addRoutes(true)
  198. if err != nil {
  199. // Catch any stray logs
  200. util.LogWithContextIfNeeded("Failed to add routes", err, t.l)
  201. }
  202. }
  203. return nil
  204. }
  205. func (t *tun) RoutesFor(ip netip.Addr) routing.Gateways {
  206. r, _ := t.routeTree.Load().Lookup(ip)
  207. return r
  208. }
  209. func (t *tun) Networks() []netip.Prefix {
  210. return t.vpnNetworks
  211. }
  212. func (t *tun) Name() string {
  213. return t.Device
  214. }
  215. func (t *tun) NewMultiQueueReader() (io.ReadWriteCloser, error) {
  216. return nil, fmt.Errorf("TODO: multiqueue not implemented for freebsd")
  217. }
  218. func (t *tun) addRoutes(logErrors bool) error {
  219. routes := *t.Routes.Load()
  220. for _, r := range routes {
  221. if len(r.Via) == 0 || !r.Install {
  222. // We don't allow route MTUs so only install routes with a via
  223. continue
  224. }
  225. cmd := exec.Command("/sbin/route", "-n", "add", "-net", r.Cidr.String(), "-interface", t.Device)
  226. t.l.Debug("command: ", cmd.String())
  227. if err := cmd.Run(); err != nil {
  228. retErr := util.NewContextualError("failed to run 'route add' for unsafe_route", map[string]any{"route": r}, err)
  229. if logErrors {
  230. retErr.Log(t.l)
  231. } else {
  232. return retErr
  233. }
  234. }
  235. }
  236. return nil
  237. }
  238. func (t *tun) removeRoutes(routes []Route) error {
  239. for _, r := range routes {
  240. if !r.Install {
  241. continue
  242. }
  243. cmd := exec.Command("/sbin/route", "-n", "delete", "-net", r.Cidr.String(), "-interface", t.Device)
  244. t.l.Debug("command: ", cmd.String())
  245. if err := cmd.Run(); err != nil {
  246. t.l.WithError(err).WithField("route", r).Error("Failed to remove route")
  247. } else {
  248. t.l.WithField("route", r).Info("Removed route")
  249. }
  250. }
  251. return nil
  252. }
  253. func (t *tun) deviceBytes() (o [16]byte) {
  254. for i, c := range t.Device {
  255. o[i] = byte(c)
  256. }
  257. return
  258. }