tun_darwin.go 9.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417
  1. //go:build !ios && !e2e_testing
  2. // +build !ios,!e2e_testing
  3. package overlay
  4. import (
  5. "errors"
  6. "fmt"
  7. "io"
  8. "net"
  9. "os"
  10. "syscall"
  11. "unsafe"
  12. "github.com/sirupsen/logrus"
  13. "github.com/slackhq/nebula/cidr"
  14. "github.com/slackhq/nebula/iputil"
  15. netroute "golang.org/x/net/route"
  16. "golang.org/x/sys/unix"
  17. )
  18. type tun struct {
  19. io.ReadWriteCloser
  20. Device string
  21. cidr *net.IPNet
  22. DefaultMTU int
  23. Routes []Route
  24. routeTree *cidr.Tree4[iputil.VpnIp]
  25. l *logrus.Logger
  26. // cache out buffer since we need to prepend 4 bytes for tun metadata
  27. out []byte
  28. }
  29. type sockaddrCtl struct {
  30. scLen uint8
  31. scFamily uint8
  32. ssSysaddr uint16
  33. scID uint32
  34. scUnit uint32
  35. scReserved [5]uint32
  36. }
  37. type ifReq struct {
  38. Name [16]byte
  39. Flags uint16
  40. pad [8]byte
  41. }
  42. var sockaddrCtlSize uintptr = 32
  43. const (
  44. _SYSPROTO_CONTROL = 2 //define SYSPROTO_CONTROL 2 /* kernel control protocol */
  45. _AF_SYS_CONTROL = 2 //#define AF_SYS_CONTROL 2 /* corresponding sub address type */
  46. _PF_SYSTEM = unix.AF_SYSTEM //#define PF_SYSTEM AF_SYSTEM
  47. _CTLIOCGINFO = 3227799043 //#define CTLIOCGINFO _IOWR('N', 3, struct ctl_info)
  48. utunControlName = "com.apple.net.utun_control"
  49. )
  50. type ifreqAddr struct {
  51. Name [16]byte
  52. Addr unix.RawSockaddrInet4
  53. pad [8]byte
  54. }
  55. type ifreqMTU struct {
  56. Name [16]byte
  57. MTU int32
  58. pad [8]byte
  59. }
  60. func newTun(l *logrus.Logger, name string, cidr *net.IPNet, defaultMTU int, routes []Route, _ int, _ bool, _ bool) (*tun, error) {
  61. routeTree, err := makeRouteTree(l, routes, false)
  62. if err != nil {
  63. return nil, err
  64. }
  65. ifIndex := -1
  66. if name != "" && name != "utun" {
  67. _, err := fmt.Sscanf(name, "utun%d", &ifIndex)
  68. if err != nil || ifIndex < 0 {
  69. // NOTE: we don't make this error so we don't break existing
  70. // configs that set a name before it was used.
  71. l.Warn("interface name must be utun[0-9]+ on Darwin, ignoring")
  72. ifIndex = -1
  73. }
  74. }
  75. fd, err := unix.Socket(_PF_SYSTEM, unix.SOCK_DGRAM, _SYSPROTO_CONTROL)
  76. if err != nil {
  77. return nil, fmt.Errorf("system socket: %v", err)
  78. }
  79. var ctlInfo = &struct {
  80. ctlID uint32
  81. ctlName [96]byte
  82. }{}
  83. copy(ctlInfo.ctlName[:], utunControlName)
  84. err = ioctl(uintptr(fd), uintptr(_CTLIOCGINFO), uintptr(unsafe.Pointer(ctlInfo)))
  85. if err != nil {
  86. return nil, fmt.Errorf("CTLIOCGINFO: %v", err)
  87. }
  88. sc := sockaddrCtl{
  89. scLen: uint8(sockaddrCtlSize),
  90. scFamily: unix.AF_SYSTEM,
  91. ssSysaddr: _AF_SYS_CONTROL,
  92. scID: ctlInfo.ctlID,
  93. scUnit: uint32(ifIndex) + 1,
  94. }
  95. _, _, errno := unix.RawSyscall(
  96. unix.SYS_CONNECT,
  97. uintptr(fd),
  98. uintptr(unsafe.Pointer(&sc)),
  99. sockaddrCtlSize,
  100. )
  101. if errno != 0 {
  102. return nil, fmt.Errorf("SYS_CONNECT: %v", errno)
  103. }
  104. var ifName struct {
  105. name [16]byte
  106. }
  107. ifNameSize := uintptr(len(ifName.name))
  108. _, _, errno = syscall.Syscall6(syscall.SYS_GETSOCKOPT, uintptr(fd),
  109. 2, // SYSPROTO_CONTROL
  110. 2, // UTUN_OPT_IFNAME
  111. uintptr(unsafe.Pointer(&ifName)),
  112. uintptr(unsafe.Pointer(&ifNameSize)), 0)
  113. if errno != 0 {
  114. return nil, fmt.Errorf("SYS_GETSOCKOPT: %v", errno)
  115. }
  116. name = string(ifName.name[:ifNameSize-1])
  117. err = syscall.SetNonblock(fd, true)
  118. if err != nil {
  119. return nil, fmt.Errorf("SetNonblock: %v", err)
  120. }
  121. file := os.NewFile(uintptr(fd), "")
  122. tun := &tun{
  123. ReadWriteCloser: file,
  124. Device: name,
  125. cidr: cidr,
  126. DefaultMTU: defaultMTU,
  127. Routes: routes,
  128. routeTree: routeTree,
  129. l: l,
  130. }
  131. return tun, nil
  132. }
  133. func (t *tun) deviceBytes() (o [16]byte) {
  134. for i, c := range t.Device {
  135. o[i] = byte(c)
  136. }
  137. return
  138. }
  139. func newTunFromFd(_ *logrus.Logger, _ int, _ *net.IPNet, _ int, _ []Route, _ int, _ bool) (*tun, error) {
  140. return nil, fmt.Errorf("newTunFromFd not supported in Darwin")
  141. }
  142. func (t *tun) Close() error {
  143. if t.ReadWriteCloser != nil {
  144. return t.ReadWriteCloser.Close()
  145. }
  146. return nil
  147. }
  148. func (t *tun) Activate() error {
  149. devName := t.deviceBytes()
  150. var addr, mask [4]byte
  151. copy(addr[:], t.cidr.IP.To4())
  152. copy(mask[:], t.cidr.Mask)
  153. s, err := unix.Socket(
  154. unix.AF_INET,
  155. unix.SOCK_DGRAM,
  156. unix.IPPROTO_IP,
  157. )
  158. if err != nil {
  159. return err
  160. }
  161. defer unix.Close(s)
  162. fd := uintptr(s)
  163. ifra := ifreqAddr{
  164. Name: devName,
  165. Addr: unix.RawSockaddrInet4{
  166. Family: unix.AF_INET,
  167. Addr: addr,
  168. },
  169. }
  170. // Set the device ip address
  171. if err = ioctl(fd, unix.SIOCSIFADDR, uintptr(unsafe.Pointer(&ifra))); err != nil {
  172. return fmt.Errorf("failed to set tun address: %s", err)
  173. }
  174. // Set the device network
  175. ifra.Addr.Addr = mask
  176. if err = ioctl(fd, unix.SIOCSIFNETMASK, uintptr(unsafe.Pointer(&ifra))); err != nil {
  177. return fmt.Errorf("failed to set tun netmask: %s", err)
  178. }
  179. // Set the device name
  180. ifrf := ifReq{Name: devName}
  181. if err = ioctl(fd, unix.SIOCGIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  182. return fmt.Errorf("failed to set tun device name: %s", err)
  183. }
  184. // Set the MTU on the device
  185. ifm := ifreqMTU{Name: devName, MTU: int32(t.DefaultMTU)}
  186. if err = ioctl(fd, unix.SIOCSIFMTU, uintptr(unsafe.Pointer(&ifm))); err != nil {
  187. return fmt.Errorf("failed to set tun mtu: %v", err)
  188. }
  189. /*
  190. // Set the transmit queue length
  191. ifrq := ifreqQLEN{Name: devName, Value: int32(t.TXQueueLen)}
  192. if err = ioctl(fd, unix.SIOCSIFTXQLEN, uintptr(unsafe.Pointer(&ifrq))); err != nil {
  193. // If we can't set the queue length nebula will still work but it may lead to packet loss
  194. l.WithError(err).Error("Failed to set tun tx queue length")
  195. }
  196. */
  197. // Bring up the interface
  198. ifrf.Flags = ifrf.Flags | unix.IFF_UP
  199. if err = ioctl(fd, unix.SIOCSIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  200. return fmt.Errorf("failed to bring the tun device up: %s", err)
  201. }
  202. routeSock, err := unix.Socket(unix.AF_ROUTE, unix.SOCK_RAW, unix.AF_UNSPEC)
  203. if err != nil {
  204. return fmt.Errorf("unable to create AF_ROUTE socket: %v", err)
  205. }
  206. defer func() {
  207. unix.Shutdown(routeSock, unix.SHUT_RDWR)
  208. err := unix.Close(routeSock)
  209. if err != nil {
  210. t.l.WithError(err).Error("failed to close AF_ROUTE socket")
  211. }
  212. }()
  213. routeAddr := &netroute.Inet4Addr{}
  214. maskAddr := &netroute.Inet4Addr{}
  215. linkAddr, err := getLinkAddr(t.Device)
  216. if err != nil {
  217. return err
  218. }
  219. if linkAddr == nil {
  220. return fmt.Errorf("unable to discover link_addr for tun interface")
  221. }
  222. copy(routeAddr.IP[:], addr[:])
  223. copy(maskAddr.IP[:], mask[:])
  224. err = addRoute(routeSock, routeAddr, maskAddr, linkAddr)
  225. if err != nil {
  226. if errors.Is(err, unix.EEXIST) {
  227. err = fmt.Errorf("unable to add tun route, identical route already exists: %s", t.cidr)
  228. }
  229. return err
  230. }
  231. // Run the interface
  232. ifrf.Flags = ifrf.Flags | unix.IFF_UP | unix.IFF_RUNNING
  233. if err = ioctl(fd, unix.SIOCSIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  234. return fmt.Errorf("failed to run tun device: %s", err)
  235. }
  236. // Unsafe path routes
  237. for _, r := range t.Routes {
  238. if r.Via == nil || !r.Install {
  239. // We don't allow route MTUs so only install routes with a via
  240. continue
  241. }
  242. copy(routeAddr.IP[:], r.Cidr.IP.To4())
  243. copy(maskAddr.IP[:], net.IP(r.Cidr.Mask).To4())
  244. err = addRoute(routeSock, routeAddr, maskAddr, linkAddr)
  245. if err != nil {
  246. if errors.Is(err, unix.EEXIST) {
  247. t.l.WithField("route", r.Cidr).
  248. Warnf("unable to add unsafe_route, identical route already exists")
  249. } else {
  250. return err
  251. }
  252. }
  253. // TODO how to set metric
  254. }
  255. return nil
  256. }
  257. func (t *tun) RouteFor(ip iputil.VpnIp) iputil.VpnIp {
  258. ok, r := t.routeTree.MostSpecificContains(ip)
  259. if ok {
  260. return r
  261. }
  262. return 0
  263. }
  264. // Get the LinkAddr for the interface of the given name
  265. // TODO: Is there an easier way to fetch this when we create the interface?
  266. // Maybe SIOCGIFINDEX? but this doesn't appear to exist in the darwin headers.
  267. func getLinkAddr(name string) (*netroute.LinkAddr, error) {
  268. rib, err := netroute.FetchRIB(unix.AF_UNSPEC, unix.NET_RT_IFLIST, 0)
  269. if err != nil {
  270. return nil, err
  271. }
  272. msgs, err := netroute.ParseRIB(unix.NET_RT_IFLIST, rib)
  273. if err != nil {
  274. return nil, err
  275. }
  276. for _, m := range msgs {
  277. switch m := m.(type) {
  278. case *netroute.InterfaceMessage:
  279. if m.Name == name {
  280. sa, ok := m.Addrs[unix.RTAX_IFP].(*netroute.LinkAddr)
  281. if ok {
  282. return sa, nil
  283. }
  284. }
  285. }
  286. }
  287. return nil, nil
  288. }
  289. func addRoute(sock int, addr, mask *netroute.Inet4Addr, link *netroute.LinkAddr) error {
  290. r := netroute.RouteMessage{
  291. Version: unix.RTM_VERSION,
  292. Type: unix.RTM_ADD,
  293. Flags: unix.RTF_UP,
  294. Seq: 1,
  295. Addrs: []netroute.Addr{
  296. unix.RTAX_DST: addr,
  297. unix.RTAX_GATEWAY: link,
  298. unix.RTAX_NETMASK: mask,
  299. },
  300. }
  301. data, err := r.Marshal()
  302. if err != nil {
  303. return fmt.Errorf("failed to create route.RouteMessage: %w", err)
  304. }
  305. _, err = unix.Write(sock, data[:])
  306. if err != nil {
  307. return fmt.Errorf("failed to write route.RouteMessage to socket: %w", err)
  308. }
  309. return nil
  310. }
  311. func (t *tun) Read(to []byte) (int, error) {
  312. buf := make([]byte, len(to)+4)
  313. n, err := t.ReadWriteCloser.Read(buf)
  314. copy(to, buf[4:])
  315. return n - 4, err
  316. }
  317. // Write is only valid for single threaded use
  318. func (t *tun) Write(from []byte) (int, error) {
  319. buf := t.out
  320. if cap(buf) < len(from)+4 {
  321. buf = make([]byte, len(from)+4)
  322. t.out = buf
  323. }
  324. buf = buf[:len(from)+4]
  325. if len(from) == 0 {
  326. return 0, syscall.EIO
  327. }
  328. // Determine the IP Family for the NULL L2 Header
  329. ipVer := from[0] >> 4
  330. if ipVer == 4 {
  331. buf[3] = syscall.AF_INET
  332. } else if ipVer == 6 {
  333. buf[3] = syscall.AF_INET6
  334. } else {
  335. return 0, fmt.Errorf("unable to determine IP version from packet")
  336. }
  337. copy(buf[4:], from)
  338. n, err := t.ReadWriteCloser.Write(buf)
  339. return n - 4, err
  340. }
  341. func (t *tun) Cidr() *net.IPNet {
  342. return t.cidr
  343. }
  344. func (t *tun) Name() string {
  345. return t.Device
  346. }
  347. func (t *tun) NewMultiQueueReader() (io.ReadWriteCloser, error) {
  348. return nil, fmt.Errorf("TODO: multiqueue not implemented for darwin")
  349. }