tun_darwin.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572
  1. //go:build !ios && !e2e_testing
  2. // +build !ios,!e2e_testing
  3. package overlay
  4. import (
  5. "errors"
  6. "fmt"
  7. "io"
  8. "net"
  9. "net/netip"
  10. "os"
  11. "sync/atomic"
  12. "syscall"
  13. "unsafe"
  14. "github.com/gaissmai/bart"
  15. "github.com/sirupsen/logrus"
  16. "github.com/slackhq/nebula/config"
  17. "github.com/slackhq/nebula/util"
  18. netroute "golang.org/x/net/route"
  19. "golang.org/x/sys/unix"
  20. )
  21. type tun struct {
  22. io.ReadWriteCloser
  23. Device string
  24. cidr netip.Prefix
  25. DefaultMTU int
  26. Routes atomic.Pointer[[]Route]
  27. routeTree atomic.Pointer[bart.Table[netip.Addr]]
  28. linkAddr *netroute.LinkAddr
  29. l *logrus.Logger
  30. // cache out buffer since we need to prepend 4 bytes for tun metadata
  31. out []byte
  32. }
  33. type sockaddrCtl struct {
  34. scLen uint8
  35. scFamily uint8
  36. ssSysaddr uint16
  37. scID uint32
  38. scUnit uint32
  39. scReserved [5]uint32
  40. }
  41. type ifReq struct {
  42. Name [16]byte
  43. Flags uint16
  44. pad [8]byte
  45. }
  46. var sockaddrCtlSize uintptr = 32
  47. const (
  48. _SYSPROTO_CONTROL = 2 //define SYSPROTO_CONTROL 2 /* kernel control protocol */
  49. _AF_SYS_CONTROL = 2 //#define AF_SYS_CONTROL 2 /* corresponding sub address type */
  50. _PF_SYSTEM = unix.AF_SYSTEM //#define PF_SYSTEM AF_SYSTEM
  51. _CTLIOCGINFO = 3227799043 //#define CTLIOCGINFO _IOWR('N', 3, struct ctl_info)
  52. utunControlName = "com.apple.net.utun_control"
  53. )
  54. type ifreqAddr struct {
  55. Name [16]byte
  56. Addr unix.RawSockaddrInet4
  57. pad [8]byte
  58. }
  59. type ifreqMTU struct {
  60. Name [16]byte
  61. MTU int32
  62. pad [8]byte
  63. }
  64. func newTun(c *config.C, l *logrus.Logger, cidr netip.Prefix, _ bool) (*tun, error) {
  65. name := c.GetString("tun.dev", "")
  66. ifIndex := -1
  67. if name != "" && name != "utun" {
  68. _, err := fmt.Sscanf(name, "utun%d", &ifIndex)
  69. if err != nil || ifIndex < 0 {
  70. // NOTE: we don't make this error so we don't break existing
  71. // configs that set a name before it was used.
  72. l.Warn("interface name must be utun[0-9]+ on Darwin, ignoring")
  73. ifIndex = -1
  74. }
  75. }
  76. fd, err := unix.Socket(_PF_SYSTEM, unix.SOCK_DGRAM, _SYSPROTO_CONTROL)
  77. if err != nil {
  78. return nil, fmt.Errorf("system socket: %v", err)
  79. }
  80. var ctlInfo = &struct {
  81. ctlID uint32
  82. ctlName [96]byte
  83. }{}
  84. copy(ctlInfo.ctlName[:], utunControlName)
  85. err = ioctl(uintptr(fd), uintptr(_CTLIOCGINFO), uintptr(unsafe.Pointer(ctlInfo)))
  86. if err != nil {
  87. return nil, fmt.Errorf("CTLIOCGINFO: %v", err)
  88. }
  89. sc := sockaddrCtl{
  90. scLen: uint8(sockaddrCtlSize),
  91. scFamily: unix.AF_SYSTEM,
  92. ssSysaddr: _AF_SYS_CONTROL,
  93. scID: ctlInfo.ctlID,
  94. scUnit: uint32(ifIndex) + 1,
  95. }
  96. _, _, errno := unix.RawSyscall(
  97. unix.SYS_CONNECT,
  98. uintptr(fd),
  99. uintptr(unsafe.Pointer(&sc)),
  100. sockaddrCtlSize,
  101. )
  102. if errno != 0 {
  103. return nil, fmt.Errorf("SYS_CONNECT: %v", errno)
  104. }
  105. var ifName struct {
  106. name [16]byte
  107. }
  108. ifNameSize := uintptr(len(ifName.name))
  109. _, _, errno = syscall.Syscall6(syscall.SYS_GETSOCKOPT, uintptr(fd),
  110. 2, // SYSPROTO_CONTROL
  111. 2, // UTUN_OPT_IFNAME
  112. uintptr(unsafe.Pointer(&ifName)),
  113. uintptr(unsafe.Pointer(&ifNameSize)), 0)
  114. if errno != 0 {
  115. return nil, fmt.Errorf("SYS_GETSOCKOPT: %v", errno)
  116. }
  117. name = string(ifName.name[:ifNameSize-1])
  118. err = syscall.SetNonblock(fd, true)
  119. if err != nil {
  120. return nil, fmt.Errorf("SetNonblock: %v", err)
  121. }
  122. file := os.NewFile(uintptr(fd), "")
  123. t := &tun{
  124. ReadWriteCloser: file,
  125. Device: name,
  126. cidr: cidr,
  127. DefaultMTU: c.GetInt("tun.mtu", DefaultMTU),
  128. l: l,
  129. }
  130. err = t.reload(c, true)
  131. if err != nil {
  132. return nil, err
  133. }
  134. c.RegisterReloadCallback(func(c *config.C) {
  135. err := t.reload(c, false)
  136. if err != nil {
  137. util.LogWithContextIfNeeded("failed to reload tun device", err, t.l)
  138. }
  139. })
  140. return t, nil
  141. }
  142. func (t *tun) deviceBytes() (o [16]byte) {
  143. for i, c := range t.Device {
  144. o[i] = byte(c)
  145. }
  146. return
  147. }
  148. func newTunFromFd(_ *config.C, _ *logrus.Logger, _ int, _ netip.Prefix) (*tun, error) {
  149. return nil, fmt.Errorf("newTunFromFd not supported in Darwin")
  150. }
  151. func (t *tun) Close() error {
  152. if t.ReadWriteCloser != nil {
  153. return t.ReadWriteCloser.Close()
  154. }
  155. return nil
  156. }
  157. func (t *tun) Activate() error {
  158. devName := t.deviceBytes()
  159. var addr, mask [4]byte
  160. if !t.cidr.Addr().Is4() {
  161. //TODO: IPV6-WORK
  162. panic("need ipv6")
  163. }
  164. addr = t.cidr.Addr().As4()
  165. copy(mask[:], prefixToMask(t.cidr))
  166. s, err := unix.Socket(
  167. unix.AF_INET,
  168. unix.SOCK_DGRAM,
  169. unix.IPPROTO_IP,
  170. )
  171. if err != nil {
  172. return err
  173. }
  174. defer unix.Close(s)
  175. fd := uintptr(s)
  176. ifra := ifreqAddr{
  177. Name: devName,
  178. Addr: unix.RawSockaddrInet4{
  179. Family: unix.AF_INET,
  180. Addr: addr,
  181. },
  182. }
  183. // Set the device ip address
  184. if err = ioctl(fd, unix.SIOCSIFADDR, uintptr(unsafe.Pointer(&ifra))); err != nil {
  185. return fmt.Errorf("failed to set tun address: %s", err)
  186. }
  187. // Set the device network
  188. ifra.Addr.Addr = mask
  189. if err = ioctl(fd, unix.SIOCSIFNETMASK, uintptr(unsafe.Pointer(&ifra))); err != nil {
  190. return fmt.Errorf("failed to set tun netmask: %s", err)
  191. }
  192. // Set the device name
  193. ifrf := ifReq{Name: devName}
  194. if err = ioctl(fd, unix.SIOCGIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  195. return fmt.Errorf("failed to set tun device name: %s", err)
  196. }
  197. // Set the MTU on the device
  198. ifm := ifreqMTU{Name: devName, MTU: int32(t.DefaultMTU)}
  199. if err = ioctl(fd, unix.SIOCSIFMTU, uintptr(unsafe.Pointer(&ifm))); err != nil {
  200. return fmt.Errorf("failed to set tun mtu: %v", err)
  201. }
  202. /*
  203. // Set the transmit queue length
  204. ifrq := ifreqQLEN{Name: devName, Value: int32(t.TXQueueLen)}
  205. if err = ioctl(fd, unix.SIOCSIFTXQLEN, uintptr(unsafe.Pointer(&ifrq))); err != nil {
  206. // If we can't set the queue length nebula will still work but it may lead to packet loss
  207. l.WithError(err).Error("Failed to set tun tx queue length")
  208. }
  209. */
  210. // Bring up the interface
  211. ifrf.Flags = ifrf.Flags | unix.IFF_UP
  212. if err = ioctl(fd, unix.SIOCSIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  213. return fmt.Errorf("failed to bring the tun device up: %s", err)
  214. }
  215. routeSock, err := unix.Socket(unix.AF_ROUTE, unix.SOCK_RAW, unix.AF_UNSPEC)
  216. if err != nil {
  217. return fmt.Errorf("unable to create AF_ROUTE socket: %v", err)
  218. }
  219. defer func() {
  220. unix.Shutdown(routeSock, unix.SHUT_RDWR)
  221. err := unix.Close(routeSock)
  222. if err != nil {
  223. t.l.WithError(err).Error("failed to close AF_ROUTE socket")
  224. }
  225. }()
  226. routeAddr := &netroute.Inet4Addr{}
  227. maskAddr := &netroute.Inet4Addr{}
  228. linkAddr, err := getLinkAddr(t.Device)
  229. if err != nil {
  230. return err
  231. }
  232. if linkAddr == nil {
  233. return fmt.Errorf("unable to discover link_addr for tun interface")
  234. }
  235. t.linkAddr = linkAddr
  236. copy(routeAddr.IP[:], addr[:])
  237. copy(maskAddr.IP[:], mask[:])
  238. err = addRoute(routeSock, routeAddr, maskAddr, linkAddr)
  239. if err != nil {
  240. if errors.Is(err, unix.EEXIST) {
  241. err = fmt.Errorf("unable to add tun route, identical route already exists: %s", t.cidr)
  242. }
  243. return err
  244. }
  245. // Run the interface
  246. ifrf.Flags = ifrf.Flags | unix.IFF_UP | unix.IFF_RUNNING
  247. if err = ioctl(fd, unix.SIOCSIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  248. return fmt.Errorf("failed to run tun device: %s", err)
  249. }
  250. // Unsafe path routes
  251. return t.addRoutes(false)
  252. }
  253. func (t *tun) reload(c *config.C, initial bool) error {
  254. change, routes, err := getAllRoutesFromConfig(c, t.cidr, initial)
  255. if err != nil {
  256. return err
  257. }
  258. if !initial && !change {
  259. return nil
  260. }
  261. routeTree, err := makeRouteTree(t.l, routes, false)
  262. if err != nil {
  263. return err
  264. }
  265. // Teach nebula how to handle the routes before establishing them in the system table
  266. oldRoutes := t.Routes.Swap(&routes)
  267. t.routeTree.Store(routeTree)
  268. if !initial {
  269. // Remove first, if the system removes a wanted route hopefully it will be re-added next
  270. err := t.removeRoutes(findRemovedRoutes(routes, *oldRoutes))
  271. if err != nil {
  272. util.LogWithContextIfNeeded("Failed to remove routes", err, t.l)
  273. }
  274. // Ensure any routes we actually want are installed
  275. err = t.addRoutes(true)
  276. if err != nil {
  277. // Catch any stray logs
  278. util.LogWithContextIfNeeded("Failed to add routes", err, t.l)
  279. }
  280. }
  281. return nil
  282. }
  283. func (t *tun) RouteFor(ip netip.Addr) netip.Addr {
  284. r, ok := t.routeTree.Load().Lookup(ip)
  285. if ok {
  286. return r
  287. }
  288. return netip.Addr{}
  289. }
  290. // Get the LinkAddr for the interface of the given name
  291. // TODO: Is there an easier way to fetch this when we create the interface?
  292. // Maybe SIOCGIFINDEX? but this doesn't appear to exist in the darwin headers.
  293. func getLinkAddr(name string) (*netroute.LinkAddr, error) {
  294. rib, err := netroute.FetchRIB(unix.AF_UNSPEC, unix.NET_RT_IFLIST, 0)
  295. if err != nil {
  296. return nil, err
  297. }
  298. msgs, err := netroute.ParseRIB(unix.NET_RT_IFLIST, rib)
  299. if err != nil {
  300. return nil, err
  301. }
  302. for _, m := range msgs {
  303. switch m := m.(type) {
  304. case *netroute.InterfaceMessage:
  305. if m.Name == name {
  306. sa, ok := m.Addrs[unix.RTAX_IFP].(*netroute.LinkAddr)
  307. if ok {
  308. return sa, nil
  309. }
  310. }
  311. }
  312. }
  313. return nil, nil
  314. }
  315. func (t *tun) addRoutes(logErrors bool) error {
  316. routeSock, err := unix.Socket(unix.AF_ROUTE, unix.SOCK_RAW, unix.AF_UNSPEC)
  317. if err != nil {
  318. return fmt.Errorf("unable to create AF_ROUTE socket: %v", err)
  319. }
  320. defer func() {
  321. unix.Shutdown(routeSock, unix.SHUT_RDWR)
  322. err := unix.Close(routeSock)
  323. if err != nil {
  324. t.l.WithError(err).Error("failed to close AF_ROUTE socket")
  325. }
  326. }()
  327. routeAddr := &netroute.Inet4Addr{}
  328. maskAddr := &netroute.Inet4Addr{}
  329. routes := *t.Routes.Load()
  330. for _, r := range routes {
  331. if !r.Via.IsValid() || !r.Install {
  332. // We don't allow route MTUs so only install routes with a via
  333. continue
  334. }
  335. if !r.Cidr.Addr().Is4() {
  336. //TODO: implement ipv6
  337. panic("Cant handle ipv6 routes yet")
  338. }
  339. routeAddr.IP = r.Cidr.Addr().As4()
  340. //TODO: we could avoid the copy
  341. copy(maskAddr.IP[:], prefixToMask(r.Cidr))
  342. err := addRoute(routeSock, routeAddr, maskAddr, t.linkAddr)
  343. if err != nil {
  344. if errors.Is(err, unix.EEXIST) {
  345. t.l.WithField("route", r.Cidr).
  346. Warnf("unable to add unsafe_route, identical route already exists")
  347. } else {
  348. retErr := util.NewContextualError("Failed to add route", map[string]interface{}{"route": r}, err)
  349. if logErrors {
  350. retErr.Log(t.l)
  351. } else {
  352. return retErr
  353. }
  354. }
  355. } else {
  356. t.l.WithField("route", r).Info("Added route")
  357. }
  358. }
  359. return nil
  360. }
  361. func (t *tun) removeRoutes(routes []Route) error {
  362. routeSock, err := unix.Socket(unix.AF_ROUTE, unix.SOCK_RAW, unix.AF_UNSPEC)
  363. if err != nil {
  364. return fmt.Errorf("unable to create AF_ROUTE socket: %v", err)
  365. }
  366. defer func() {
  367. unix.Shutdown(routeSock, unix.SHUT_RDWR)
  368. err := unix.Close(routeSock)
  369. if err != nil {
  370. t.l.WithError(err).Error("failed to close AF_ROUTE socket")
  371. }
  372. }()
  373. routeAddr := &netroute.Inet4Addr{}
  374. maskAddr := &netroute.Inet4Addr{}
  375. for _, r := range routes {
  376. if !r.Install {
  377. continue
  378. }
  379. if r.Cidr.Addr().Is6() {
  380. //TODO: implement ipv6
  381. panic("Cant handle ipv6 routes yet")
  382. }
  383. routeAddr.IP = r.Cidr.Addr().As4()
  384. copy(maskAddr.IP[:], prefixToMask(r.Cidr))
  385. err := delRoute(routeSock, routeAddr, maskAddr, t.linkAddr)
  386. if err != nil {
  387. t.l.WithError(err).WithField("route", r).Error("Failed to remove route")
  388. } else {
  389. t.l.WithField("route", r).Info("Removed route")
  390. }
  391. }
  392. return nil
  393. }
  394. func addRoute(sock int, addr, mask *netroute.Inet4Addr, link *netroute.LinkAddr) error {
  395. r := netroute.RouteMessage{
  396. Version: unix.RTM_VERSION,
  397. Type: unix.RTM_ADD,
  398. Flags: unix.RTF_UP,
  399. Seq: 1,
  400. Addrs: []netroute.Addr{
  401. unix.RTAX_DST: addr,
  402. unix.RTAX_GATEWAY: link,
  403. unix.RTAX_NETMASK: mask,
  404. },
  405. }
  406. data, err := r.Marshal()
  407. if err != nil {
  408. return fmt.Errorf("failed to create route.RouteMessage: %w", err)
  409. }
  410. _, err = unix.Write(sock, data[:])
  411. if err != nil {
  412. return fmt.Errorf("failed to write route.RouteMessage to socket: %w", err)
  413. }
  414. return nil
  415. }
  416. func delRoute(sock int, addr, mask *netroute.Inet4Addr, link *netroute.LinkAddr) error {
  417. r := netroute.RouteMessage{
  418. Version: unix.RTM_VERSION,
  419. Type: unix.RTM_DELETE,
  420. Seq: 1,
  421. Addrs: []netroute.Addr{
  422. unix.RTAX_DST: addr,
  423. unix.RTAX_GATEWAY: link,
  424. unix.RTAX_NETMASK: mask,
  425. },
  426. }
  427. data, err := r.Marshal()
  428. if err != nil {
  429. return fmt.Errorf("failed to create route.RouteMessage: %w", err)
  430. }
  431. _, err = unix.Write(sock, data[:])
  432. if err != nil {
  433. return fmt.Errorf("failed to write route.RouteMessage to socket: %w", err)
  434. }
  435. return nil
  436. }
  437. func (t *tun) Read(to []byte) (int, error) {
  438. buf := make([]byte, len(to)+4)
  439. n, err := t.ReadWriteCloser.Read(buf)
  440. copy(to, buf[4:])
  441. return n - 4, err
  442. }
  443. // Write is only valid for single threaded use
  444. func (t *tun) Write(from []byte) (int, error) {
  445. buf := t.out
  446. if cap(buf) < len(from)+4 {
  447. buf = make([]byte, len(from)+4)
  448. t.out = buf
  449. }
  450. buf = buf[:len(from)+4]
  451. if len(from) == 0 {
  452. return 0, syscall.EIO
  453. }
  454. // Determine the IP Family for the NULL L2 Header
  455. ipVer := from[0] >> 4
  456. if ipVer == 4 {
  457. buf[3] = syscall.AF_INET
  458. } else if ipVer == 6 {
  459. buf[3] = syscall.AF_INET6
  460. } else {
  461. return 0, fmt.Errorf("unable to determine IP version from packet")
  462. }
  463. copy(buf[4:], from)
  464. n, err := t.ReadWriteCloser.Write(buf)
  465. return n - 4, err
  466. }
  467. func (t *tun) Cidr() netip.Prefix {
  468. return t.cidr
  469. }
  470. func (t *tun) Name() string {
  471. return t.Device
  472. }
  473. func (t *tun) NewMultiQueueReader() (io.ReadWriteCloser, error) {
  474. return nil, fmt.Errorf("TODO: multiqueue not implemented for darwin")
  475. }
  476. func prefixToMask(prefix netip.Prefix) []byte {
  477. pLen := 128
  478. if prefix.Addr().Is4() {
  479. pLen = 32
  480. }
  481. return net.CIDRMask(prefix.Bits(), pLen)
  482. }