tun_darwin.go 9.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412
  1. //go:build !ios && !e2e_testing
  2. // +build !ios,!e2e_testing
  3. package nebula
  4. import (
  5. "fmt"
  6. "io"
  7. "net"
  8. "os"
  9. "syscall"
  10. "unsafe"
  11. "github.com/sirupsen/logrus"
  12. netroute "golang.org/x/net/route"
  13. "golang.org/x/sys/unix"
  14. )
  15. type Tun struct {
  16. io.ReadWriteCloser
  17. Device string
  18. Cidr *net.IPNet
  19. DefaultMTU int
  20. TXQueueLen int
  21. UnsafeRoutes []route
  22. l *logrus.Logger
  23. // cache out buffer since we need to prepend 4 bytes for tun metadata
  24. out []byte
  25. }
  26. type sockaddrCtl struct {
  27. scLen uint8
  28. scFamily uint8
  29. ssSysaddr uint16
  30. scID uint32
  31. scUnit uint32
  32. scReserved [5]uint32
  33. }
  34. type ifReq struct {
  35. Name [16]byte
  36. Flags uint16
  37. pad [8]byte
  38. }
  39. func ioctl(a1, a2, a3 uintptr) error {
  40. _, _, errno := unix.Syscall(unix.SYS_IOCTL, a1, a2, a3)
  41. if errno != 0 {
  42. return errno
  43. }
  44. return nil
  45. }
  46. var sockaddrCtlSize uintptr = 32
  47. const (
  48. _SYSPROTO_CONTROL = 2 //define SYSPROTO_CONTROL 2 /* kernel control protocol */
  49. _AF_SYS_CONTROL = 2 //#define AF_SYS_CONTROL 2 /* corresponding sub address type */
  50. _PF_SYSTEM = unix.AF_SYSTEM //#define PF_SYSTEM AF_SYSTEM
  51. _CTLIOCGINFO = 3227799043 //#define CTLIOCGINFO _IOWR('N', 3, struct ctl_info)
  52. utunControlName = "com.apple.net.utun_control"
  53. )
  54. type ifreqAddr struct {
  55. Name [16]byte
  56. Addr unix.RawSockaddrInet4
  57. pad [8]byte
  58. }
  59. type ifreqMTU struct {
  60. Name [16]byte
  61. MTU int32
  62. pad [8]byte
  63. }
  64. type ifreqQLEN struct {
  65. Name [16]byte
  66. Value int32
  67. pad [8]byte
  68. }
  69. func newTun(l *logrus.Logger, name string, cidr *net.IPNet, defaultMTU int, routes []route, unsafeRoutes []route, txQueueLen int, multiqueue bool) (ifce *Tun, err error) {
  70. if len(routes) > 0 {
  71. return nil, fmt.Errorf("route MTU not supported in Darwin")
  72. }
  73. ifIndex := -1
  74. if name != "" && name != "utun" {
  75. _, err := fmt.Sscanf(name, "utun%d", &ifIndex)
  76. if err != nil || ifIndex < 0 {
  77. // NOTE: we don't make this error so we don't break existing
  78. // configs that set a name before it was used.
  79. l.Warn("interface name must be utun[0-9]+ on Darwin, ignoring")
  80. ifIndex = -1
  81. }
  82. }
  83. fd, err := unix.Socket(_PF_SYSTEM, unix.SOCK_DGRAM, _SYSPROTO_CONTROL)
  84. if err != nil {
  85. return nil, fmt.Errorf("system socket: %v", err)
  86. }
  87. var ctlInfo = &struct {
  88. ctlID uint32
  89. ctlName [96]byte
  90. }{}
  91. copy(ctlInfo.ctlName[:], []byte(utunControlName))
  92. err = ioctl(uintptr(fd), uintptr(_CTLIOCGINFO), uintptr(unsafe.Pointer(ctlInfo)))
  93. if err != nil {
  94. return nil, fmt.Errorf("CTLIOCGINFO: %v", err)
  95. }
  96. sc := sockaddrCtl{
  97. scLen: uint8(sockaddrCtlSize),
  98. scFamily: unix.AF_SYSTEM,
  99. ssSysaddr: _AF_SYS_CONTROL,
  100. scID: ctlInfo.ctlID,
  101. scUnit: uint32(ifIndex) + 1,
  102. }
  103. _, _, errno := unix.RawSyscall(
  104. unix.SYS_CONNECT,
  105. uintptr(fd),
  106. uintptr(unsafe.Pointer(&sc)),
  107. uintptr(sockaddrCtlSize),
  108. )
  109. if errno != 0 {
  110. return nil, fmt.Errorf("SYS_CONNECT: %v", errno)
  111. }
  112. var ifName struct {
  113. name [16]byte
  114. }
  115. ifNameSize := uintptr(len(ifName.name))
  116. _, _, errno = syscall.Syscall6(syscall.SYS_GETSOCKOPT, uintptr(fd),
  117. 2, // SYSPROTO_CONTROL
  118. 2, // UTUN_OPT_IFNAME
  119. uintptr(unsafe.Pointer(&ifName)),
  120. uintptr(unsafe.Pointer(&ifNameSize)), 0)
  121. if errno != 0 {
  122. return nil, fmt.Errorf("SYS_GETSOCKOPT: %v", errno)
  123. }
  124. name = string(ifName.name[:ifNameSize-1])
  125. err = syscall.SetNonblock(fd, true)
  126. if err != nil {
  127. return nil, fmt.Errorf("SetNonblock: %v", err)
  128. }
  129. file := os.NewFile(uintptr(fd), "")
  130. tun := &Tun{
  131. ReadWriteCloser: file,
  132. Device: name,
  133. Cidr: cidr,
  134. DefaultMTU: defaultMTU,
  135. TXQueueLen: txQueueLen,
  136. UnsafeRoutes: unsafeRoutes,
  137. l: l,
  138. }
  139. return tun, nil
  140. }
  141. func (t *Tun) deviceBytes() (o [16]byte) {
  142. for i, c := range t.Device {
  143. o[i] = byte(c)
  144. }
  145. return
  146. }
  147. func newTunFromFd(l *logrus.Logger, deviceFd int, cidr *net.IPNet, defaultMTU int, routes []route, unsafeRoutes []route, txQueueLen int) (ifce *Tun, err error) {
  148. return nil, fmt.Errorf("newTunFromFd not supported in Darwin")
  149. }
  150. func (c *Tun) Close() error {
  151. if c.ReadWriteCloser != nil {
  152. return c.ReadWriteCloser.Close()
  153. }
  154. return nil
  155. }
  156. func (t *Tun) Activate() error {
  157. devName := t.deviceBytes()
  158. var addr, mask [4]byte
  159. copy(addr[:], t.Cidr.IP.To4())
  160. copy(mask[:], t.Cidr.Mask)
  161. s, err := unix.Socket(
  162. unix.AF_INET,
  163. unix.SOCK_DGRAM,
  164. unix.IPPROTO_IP,
  165. )
  166. if err != nil {
  167. return err
  168. }
  169. fd := uintptr(s)
  170. ifra := ifreqAddr{
  171. Name: devName,
  172. Addr: unix.RawSockaddrInet4{
  173. Family: unix.AF_INET,
  174. Addr: addr,
  175. },
  176. }
  177. // Set the device ip address
  178. if err = ioctl(fd, unix.SIOCSIFADDR, uintptr(unsafe.Pointer(&ifra))); err != nil {
  179. return fmt.Errorf("failed to set tun address: %s", err)
  180. }
  181. // Set the device network
  182. ifra.Addr.Addr = mask
  183. if err = ioctl(fd, unix.SIOCSIFNETMASK, uintptr(unsafe.Pointer(&ifra))); err != nil {
  184. return fmt.Errorf("failed to set tun netmask: %s", err)
  185. }
  186. // Set the device name
  187. ifrf := ifReq{Name: devName}
  188. if err = ioctl(fd, unix.SIOCGIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  189. return fmt.Errorf("failed to set tun device name: %s", err)
  190. }
  191. // Set the MTU on the device
  192. ifm := ifreqMTU{Name: devName, MTU: int32(t.DefaultMTU)}
  193. if err = ioctl(fd, unix.SIOCSIFMTU, uintptr(unsafe.Pointer(&ifm))); err != nil {
  194. return fmt.Errorf("Failed to set tun mtu: %v", err)
  195. }
  196. /*
  197. // Set the transmit queue length
  198. ifrq := ifreqQLEN{Name: devName, Value: int32(t.TXQueueLen)}
  199. if err = ioctl(fd, unix.SIOCSIFTXQLEN, uintptr(unsafe.Pointer(&ifrq))); err != nil {
  200. // If we can't set the queue length nebula will still work but it may lead to packet loss
  201. l.WithError(err).Error("Failed to set tun tx queue length")
  202. }
  203. */
  204. // Bring up the interface
  205. ifrf.Flags = ifrf.Flags | unix.IFF_UP
  206. if err = ioctl(fd, unix.SIOCSIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  207. return fmt.Errorf("failed to bring the tun device up: %s", err)
  208. }
  209. routeSock, err := unix.Socket(unix.AF_ROUTE, unix.SOCK_RAW, unix.AF_UNSPEC)
  210. if err != nil {
  211. return fmt.Errorf("unable to create AF_ROUTE socket: %v", err)
  212. }
  213. defer func() {
  214. unix.Shutdown(routeSock, unix.SHUT_RDWR)
  215. err := unix.Close(routeSock)
  216. if err != nil {
  217. t.l.WithError(err).Error("failed to close AF_ROUTE socket")
  218. }
  219. }()
  220. routeAddr := &netroute.Inet4Addr{}
  221. maskAddr := &netroute.Inet4Addr{}
  222. linkAddr, err := getLinkAddr(t.Device)
  223. if err != nil {
  224. return err
  225. }
  226. if linkAddr == nil {
  227. return fmt.Errorf("unable to discover link_addr for tun interface")
  228. }
  229. copy(routeAddr.IP[:], addr[:])
  230. copy(maskAddr.IP[:], mask[:])
  231. err = addRoute(routeSock, routeAddr, maskAddr, linkAddr)
  232. if err != nil {
  233. return err
  234. }
  235. // Run the interface
  236. ifrf.Flags = ifrf.Flags | unix.IFF_UP | unix.IFF_RUNNING
  237. if err = ioctl(fd, unix.SIOCSIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  238. return fmt.Errorf("failed to run tun device: %s", err)
  239. }
  240. // Unsafe path routes
  241. for _, r := range t.UnsafeRoutes {
  242. copy(routeAddr.IP[:], r.route.IP.To4())
  243. copy(maskAddr.IP[:], net.IP(r.route.Mask).To4())
  244. err = addRoute(routeSock, routeAddr, maskAddr, linkAddr)
  245. if err != nil {
  246. return err
  247. }
  248. // TODO how to set metric
  249. }
  250. return nil
  251. }
  252. // Get the LinkAddr for the interface of the given name
  253. // TODO: Is there an easier way to fetch this when we create the interface?
  254. // Maybe SIOCGIFINDEX? but this doesn't appear to exist in the darwin headers.
  255. func getLinkAddr(name string) (*netroute.LinkAddr, error) {
  256. rib, err := netroute.FetchRIB(unix.AF_UNSPEC, unix.NET_RT_IFLIST, 0)
  257. if err != nil {
  258. return nil, err
  259. }
  260. msgs, err := netroute.ParseRIB(unix.NET_RT_IFLIST, rib)
  261. if err != nil {
  262. return nil, err
  263. }
  264. for _, m := range msgs {
  265. switch m := m.(type) {
  266. case *netroute.InterfaceMessage:
  267. if m.Name == name {
  268. sa, ok := m.Addrs[unix.RTAX_IFP].(*netroute.LinkAddr)
  269. if ok {
  270. return sa, nil
  271. }
  272. }
  273. }
  274. }
  275. return nil, nil
  276. }
  277. func addRoute(sock int, addr, mask *netroute.Inet4Addr, link *netroute.LinkAddr) error {
  278. r := netroute.RouteMessage{
  279. Version: unix.RTM_VERSION,
  280. Type: unix.RTM_ADD,
  281. Flags: unix.RTF_UP,
  282. Seq: 1,
  283. Addrs: []netroute.Addr{
  284. unix.RTAX_DST: addr,
  285. unix.RTAX_GATEWAY: link,
  286. unix.RTAX_NETMASK: mask,
  287. },
  288. }
  289. data, err := r.Marshal()
  290. if err != nil {
  291. return fmt.Errorf("failed to create route.RouteMessage: %v", err)
  292. }
  293. _, err = unix.Write(sock, data[:])
  294. if err != nil {
  295. return fmt.Errorf("failed to write route.RouteMessage to socket: %v", err)
  296. }
  297. return nil
  298. }
  299. var _ io.ReadWriteCloser = (*Tun)(nil)
  300. func (t *Tun) Read(to []byte) (int, error) {
  301. buf := make([]byte, len(to)+4)
  302. n, err := t.ReadWriteCloser.Read(buf)
  303. copy(to, buf[4:])
  304. return n - 4, err
  305. }
  306. // Write is only valid for single threaded use
  307. func (t *Tun) Write(from []byte) (int, error) {
  308. buf := t.out
  309. if cap(buf) < len(from)+4 {
  310. buf = make([]byte, len(from)+4)
  311. t.out = buf
  312. }
  313. buf = buf[:len(from)+4]
  314. if len(from) == 0 {
  315. return 0, syscall.EIO
  316. }
  317. // Determine the IP Family for the NULL L2 Header
  318. ipVer := from[0] >> 4
  319. if ipVer == 4 {
  320. buf[3] = syscall.AF_INET
  321. } else if ipVer == 6 {
  322. buf[3] = syscall.AF_INET6
  323. } else {
  324. return 0, fmt.Errorf("Unable to determine IP version from packet")
  325. }
  326. copy(buf[4:], from)
  327. n, err := t.ReadWriteCloser.Write(buf)
  328. return n - 4, err
  329. }
  330. func (c *Tun) CidrNet() *net.IPNet {
  331. return c.Cidr
  332. }
  333. func (c *Tun) DeviceName() string {
  334. return c.Device
  335. }
  336. func (c *Tun) WriteRaw(b []byte) error {
  337. _, err := c.Write(b)
  338. return err
  339. }
  340. func (t *Tun) NewMultiQueueReader() (io.ReadWriteCloser, error) {
  341. return nil, fmt.Errorf("TODO: multiqueue not implemented for darwin")
  342. }