tun_darwin.go 9.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404
  1. //go:build !ios && !e2e_testing
  2. // +build !ios,!e2e_testing
  3. package overlay
  4. import (
  5. "fmt"
  6. "io"
  7. "net"
  8. "os"
  9. "syscall"
  10. "unsafe"
  11. "github.com/sirupsen/logrus"
  12. netroute "golang.org/x/net/route"
  13. "golang.org/x/sys/unix"
  14. )
  15. type tun struct {
  16. io.ReadWriteCloser
  17. Device string
  18. Cidr *net.IPNet
  19. DefaultMTU int
  20. TXQueueLen int
  21. UnsafeRoutes []Route
  22. l *logrus.Logger
  23. // cache out buffer since we need to prepend 4 bytes for tun metadata
  24. out []byte
  25. }
  26. type sockaddrCtl struct {
  27. scLen uint8
  28. scFamily uint8
  29. ssSysaddr uint16
  30. scID uint32
  31. scUnit uint32
  32. scReserved [5]uint32
  33. }
  34. type ifReq struct {
  35. Name [16]byte
  36. Flags uint16
  37. pad [8]byte
  38. }
  39. func ioctl(a1, a2, a3 uintptr) error {
  40. _, _, errno := unix.Syscall(unix.SYS_IOCTL, a1, a2, a3)
  41. if errno != 0 {
  42. return errno
  43. }
  44. return nil
  45. }
  46. var sockaddrCtlSize uintptr = 32
  47. const (
  48. _SYSPROTO_CONTROL = 2 //define SYSPROTO_CONTROL 2 /* kernel control protocol */
  49. _AF_SYS_CONTROL = 2 //#define AF_SYS_CONTROL 2 /* corresponding sub address type */
  50. _PF_SYSTEM = unix.AF_SYSTEM //#define PF_SYSTEM AF_SYSTEM
  51. _CTLIOCGINFO = 3227799043 //#define CTLIOCGINFO _IOWR('N', 3, struct ctl_info)
  52. utunControlName = "com.apple.net.utun_control"
  53. )
  54. type ifreqAddr struct {
  55. Name [16]byte
  56. Addr unix.RawSockaddrInet4
  57. pad [8]byte
  58. }
  59. type ifreqMTU struct {
  60. Name [16]byte
  61. MTU int32
  62. pad [8]byte
  63. }
  64. func newTun(l *logrus.Logger, name string, cidr *net.IPNet, defaultMTU int, routes []Route, unsafeRoutes []Route, txQueueLen int, _ bool) (*tun, error) {
  65. if len(routes) > 0 {
  66. return nil, fmt.Errorf("route MTU not supported in Darwin")
  67. }
  68. ifIndex := -1
  69. if name != "" && name != "utun" {
  70. _, err := fmt.Sscanf(name, "utun%d", &ifIndex)
  71. if err != nil || ifIndex < 0 {
  72. // NOTE: we don't make this error so we don't break existing
  73. // configs that set a name before it was used.
  74. l.Warn("interface name must be utun[0-9]+ on Darwin, ignoring")
  75. ifIndex = -1
  76. }
  77. }
  78. fd, err := unix.Socket(_PF_SYSTEM, unix.SOCK_DGRAM, _SYSPROTO_CONTROL)
  79. if err != nil {
  80. return nil, fmt.Errorf("system socket: %v", err)
  81. }
  82. var ctlInfo = &struct {
  83. ctlID uint32
  84. ctlName [96]byte
  85. }{}
  86. copy(ctlInfo.ctlName[:], utunControlName)
  87. err = ioctl(uintptr(fd), uintptr(_CTLIOCGINFO), uintptr(unsafe.Pointer(ctlInfo)))
  88. if err != nil {
  89. return nil, fmt.Errorf("CTLIOCGINFO: %v", err)
  90. }
  91. sc := sockaddrCtl{
  92. scLen: uint8(sockaddrCtlSize),
  93. scFamily: unix.AF_SYSTEM,
  94. ssSysaddr: _AF_SYS_CONTROL,
  95. scID: ctlInfo.ctlID,
  96. scUnit: uint32(ifIndex) + 1,
  97. }
  98. _, _, errno := unix.RawSyscall(
  99. unix.SYS_CONNECT,
  100. uintptr(fd),
  101. uintptr(unsafe.Pointer(&sc)),
  102. sockaddrCtlSize,
  103. )
  104. if errno != 0 {
  105. return nil, fmt.Errorf("SYS_CONNECT: %v", errno)
  106. }
  107. var ifName struct {
  108. name [16]byte
  109. }
  110. ifNameSize := uintptr(len(ifName.name))
  111. _, _, errno = syscall.Syscall6(syscall.SYS_GETSOCKOPT, uintptr(fd),
  112. 2, // SYSPROTO_CONTROL
  113. 2, // UTUN_OPT_IFNAME
  114. uintptr(unsafe.Pointer(&ifName)),
  115. uintptr(unsafe.Pointer(&ifNameSize)), 0)
  116. if errno != 0 {
  117. return nil, fmt.Errorf("SYS_GETSOCKOPT: %v", errno)
  118. }
  119. name = string(ifName.name[:ifNameSize-1])
  120. err = syscall.SetNonblock(fd, true)
  121. if err != nil {
  122. return nil, fmt.Errorf("SetNonblock: %v", err)
  123. }
  124. file := os.NewFile(uintptr(fd), "")
  125. tun := &tun{
  126. ReadWriteCloser: file,
  127. Device: name,
  128. Cidr: cidr,
  129. DefaultMTU: defaultMTU,
  130. TXQueueLen: txQueueLen,
  131. UnsafeRoutes: unsafeRoutes,
  132. l: l,
  133. }
  134. return tun, nil
  135. }
  136. func (t *tun) deviceBytes() (o [16]byte) {
  137. for i, c := range t.Device {
  138. o[i] = byte(c)
  139. }
  140. return
  141. }
  142. func newTunFromFd(_ *logrus.Logger, _ int, _ *net.IPNet, _ int, _ []Route, _ []Route, _ int) (*tun, error) {
  143. return nil, fmt.Errorf("newTunFromFd not supported in Darwin")
  144. }
  145. func (t *tun) Close() error {
  146. if t.ReadWriteCloser != nil {
  147. return t.ReadWriteCloser.Close()
  148. }
  149. return nil
  150. }
  151. func (t *tun) Activate() error {
  152. devName := t.deviceBytes()
  153. var addr, mask [4]byte
  154. copy(addr[:], t.Cidr.IP.To4())
  155. copy(mask[:], t.Cidr.Mask)
  156. s, err := unix.Socket(
  157. unix.AF_INET,
  158. unix.SOCK_DGRAM,
  159. unix.IPPROTO_IP,
  160. )
  161. if err != nil {
  162. return err
  163. }
  164. fd := uintptr(s)
  165. ifra := ifreqAddr{
  166. Name: devName,
  167. Addr: unix.RawSockaddrInet4{
  168. Family: unix.AF_INET,
  169. Addr: addr,
  170. },
  171. }
  172. // Set the device ip address
  173. if err = ioctl(fd, unix.SIOCSIFADDR, uintptr(unsafe.Pointer(&ifra))); err != nil {
  174. return fmt.Errorf("failed to set tun address: %s", err)
  175. }
  176. // Set the device network
  177. ifra.Addr.Addr = mask
  178. if err = ioctl(fd, unix.SIOCSIFNETMASK, uintptr(unsafe.Pointer(&ifra))); err != nil {
  179. return fmt.Errorf("failed to set tun netmask: %s", err)
  180. }
  181. // Set the device name
  182. ifrf := ifReq{Name: devName}
  183. if err = ioctl(fd, unix.SIOCGIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  184. return fmt.Errorf("failed to set tun device name: %s", err)
  185. }
  186. // Set the MTU on the device
  187. ifm := ifreqMTU{Name: devName, MTU: int32(t.DefaultMTU)}
  188. if err = ioctl(fd, unix.SIOCSIFMTU, uintptr(unsafe.Pointer(&ifm))); err != nil {
  189. return fmt.Errorf("failed to set tun mtu: %v", err)
  190. }
  191. /*
  192. // Set the transmit queue length
  193. ifrq := ifreqQLEN{Name: devName, Value: int32(t.TXQueueLen)}
  194. if err = ioctl(fd, unix.SIOCSIFTXQLEN, uintptr(unsafe.Pointer(&ifrq))); err != nil {
  195. // If we can't set the queue length nebula will still work but it may lead to packet loss
  196. l.WithError(err).Error("Failed to set tun tx queue length")
  197. }
  198. */
  199. // Bring up the interface
  200. ifrf.Flags = ifrf.Flags | unix.IFF_UP
  201. if err = ioctl(fd, unix.SIOCSIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  202. return fmt.Errorf("failed to bring the tun device up: %s", err)
  203. }
  204. routeSock, err := unix.Socket(unix.AF_ROUTE, unix.SOCK_RAW, unix.AF_UNSPEC)
  205. if err != nil {
  206. return fmt.Errorf("unable to create AF_ROUTE socket: %v", err)
  207. }
  208. defer func() {
  209. unix.Shutdown(routeSock, unix.SHUT_RDWR)
  210. err := unix.Close(routeSock)
  211. if err != nil {
  212. t.l.WithError(err).Error("failed to close AF_ROUTE socket")
  213. }
  214. }()
  215. routeAddr := &netroute.Inet4Addr{}
  216. maskAddr := &netroute.Inet4Addr{}
  217. linkAddr, err := getLinkAddr(t.Device)
  218. if err != nil {
  219. return err
  220. }
  221. if linkAddr == nil {
  222. return fmt.Errorf("unable to discover link_addr for tun interface")
  223. }
  224. copy(routeAddr.IP[:], addr[:])
  225. copy(maskAddr.IP[:], mask[:])
  226. err = addRoute(routeSock, routeAddr, maskAddr, linkAddr)
  227. if err != nil {
  228. return err
  229. }
  230. // Run the interface
  231. ifrf.Flags = ifrf.Flags | unix.IFF_UP | unix.IFF_RUNNING
  232. if err = ioctl(fd, unix.SIOCSIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  233. return fmt.Errorf("failed to run tun device: %s", err)
  234. }
  235. // Unsafe path routes
  236. for _, r := range t.UnsafeRoutes {
  237. copy(routeAddr.IP[:], r.Cidr.IP.To4())
  238. copy(maskAddr.IP[:], net.IP(r.Cidr.Mask).To4())
  239. err = addRoute(routeSock, routeAddr, maskAddr, linkAddr)
  240. if err != nil {
  241. return err
  242. }
  243. // TODO how to set metric
  244. }
  245. return nil
  246. }
  247. // Get the LinkAddr for the interface of the given name
  248. // TODO: Is there an easier way to fetch this when we create the interface?
  249. // Maybe SIOCGIFINDEX? but this doesn't appear to exist in the darwin headers.
  250. func getLinkAddr(name string) (*netroute.LinkAddr, error) {
  251. rib, err := netroute.FetchRIB(unix.AF_UNSPEC, unix.NET_RT_IFLIST, 0)
  252. if err != nil {
  253. return nil, err
  254. }
  255. msgs, err := netroute.ParseRIB(unix.NET_RT_IFLIST, rib)
  256. if err != nil {
  257. return nil, err
  258. }
  259. for _, m := range msgs {
  260. switch m := m.(type) {
  261. case *netroute.InterfaceMessage:
  262. if m.Name == name {
  263. sa, ok := m.Addrs[unix.RTAX_IFP].(*netroute.LinkAddr)
  264. if ok {
  265. return sa, nil
  266. }
  267. }
  268. }
  269. }
  270. return nil, nil
  271. }
  272. func addRoute(sock int, addr, mask *netroute.Inet4Addr, link *netroute.LinkAddr) error {
  273. r := netroute.RouteMessage{
  274. Version: unix.RTM_VERSION,
  275. Type: unix.RTM_ADD,
  276. Flags: unix.RTF_UP,
  277. Seq: 1,
  278. Addrs: []netroute.Addr{
  279. unix.RTAX_DST: addr,
  280. unix.RTAX_GATEWAY: link,
  281. unix.RTAX_NETMASK: mask,
  282. },
  283. }
  284. data, err := r.Marshal()
  285. if err != nil {
  286. return fmt.Errorf("failed to create route.RouteMessage: %v", err)
  287. }
  288. _, err = unix.Write(sock, data[:])
  289. if err != nil {
  290. return fmt.Errorf("failed to write route.RouteMessage to socket: %v", err)
  291. }
  292. return nil
  293. }
  294. func (t *tun) Read(to []byte) (int, error) {
  295. buf := make([]byte, len(to)+4)
  296. n, err := t.ReadWriteCloser.Read(buf)
  297. copy(to, buf[4:])
  298. return n - 4, err
  299. }
  300. // Write is only valid for single threaded use
  301. func (t *tun) Write(from []byte) (int, error) {
  302. buf := t.out
  303. if cap(buf) < len(from)+4 {
  304. buf = make([]byte, len(from)+4)
  305. t.out = buf
  306. }
  307. buf = buf[:len(from)+4]
  308. if len(from) == 0 {
  309. return 0, syscall.EIO
  310. }
  311. // Determine the IP Family for the NULL L2 Header
  312. ipVer := from[0] >> 4
  313. if ipVer == 4 {
  314. buf[3] = syscall.AF_INET
  315. } else if ipVer == 6 {
  316. buf[3] = syscall.AF_INET6
  317. } else {
  318. return 0, fmt.Errorf("unable to determine IP version from packet")
  319. }
  320. copy(buf[4:], from)
  321. n, err := t.ReadWriteCloser.Write(buf)
  322. return n - 4, err
  323. }
  324. func (t *tun) CidrNet() *net.IPNet {
  325. return t.Cidr
  326. }
  327. func (t *tun) DeviceName() string {
  328. return t.Device
  329. }
  330. func (t *tun) WriteRaw(b []byte) error {
  331. _, err := t.Write(b)
  332. return err
  333. }
  334. func (t *tun) NewMultiQueueReader() (io.ReadWriteCloser, error) {
  335. return nil, fmt.Errorf("TODO: multiqueue not implemented for darwin")
  336. }