tun_darwin.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549
  1. //go:build !ios && !e2e_testing
  2. // +build !ios,!e2e_testing
  3. package overlay
  4. import (
  5. "errors"
  6. "fmt"
  7. "io"
  8. "net"
  9. "os"
  10. "sync/atomic"
  11. "syscall"
  12. "unsafe"
  13. "github.com/sirupsen/logrus"
  14. "github.com/slackhq/nebula/cidr"
  15. "github.com/slackhq/nebula/config"
  16. "github.com/slackhq/nebula/iputil"
  17. "github.com/slackhq/nebula/util"
  18. netroute "golang.org/x/net/route"
  19. "golang.org/x/sys/unix"
  20. )
  21. type tun struct {
  22. io.ReadWriteCloser
  23. Device string
  24. cidr *net.IPNet
  25. DefaultMTU int
  26. Routes atomic.Pointer[[]Route]
  27. routeTree atomic.Pointer[cidr.Tree4[iputil.VpnIp]]
  28. linkAddr *netroute.LinkAddr
  29. l *logrus.Logger
  30. // cache out buffer since we need to prepend 4 bytes for tun metadata
  31. out []byte
  32. }
  33. type sockaddrCtl struct {
  34. scLen uint8
  35. scFamily uint8
  36. ssSysaddr uint16
  37. scID uint32
  38. scUnit uint32
  39. scReserved [5]uint32
  40. }
  41. type ifReq struct {
  42. Name [16]byte
  43. Flags uint16
  44. pad [8]byte
  45. }
  46. var sockaddrCtlSize uintptr = 32
  47. const (
  48. _SYSPROTO_CONTROL = 2 //define SYSPROTO_CONTROL 2 /* kernel control protocol */
  49. _AF_SYS_CONTROL = 2 //#define AF_SYS_CONTROL 2 /* corresponding sub address type */
  50. _PF_SYSTEM = unix.AF_SYSTEM //#define PF_SYSTEM AF_SYSTEM
  51. _CTLIOCGINFO = 3227799043 //#define CTLIOCGINFO _IOWR('N', 3, struct ctl_info)
  52. utunControlName = "com.apple.net.utun_control"
  53. )
  54. type ifreqAddr struct {
  55. Name [16]byte
  56. Addr unix.RawSockaddrInet4
  57. pad [8]byte
  58. }
  59. type ifreqMTU struct {
  60. Name [16]byte
  61. MTU int32
  62. pad [8]byte
  63. }
  64. func newTun(c *config.C, l *logrus.Logger, cidr *net.IPNet, _ bool) (*tun, error) {
  65. name := c.GetString("tun.dev", "")
  66. ifIndex := -1
  67. if name != "" && name != "utun" {
  68. _, err := fmt.Sscanf(name, "utun%d", &ifIndex)
  69. if err != nil || ifIndex < 0 {
  70. // NOTE: we don't make this error so we don't break existing
  71. // configs that set a name before it was used.
  72. l.Warn("interface name must be utun[0-9]+ on Darwin, ignoring")
  73. ifIndex = -1
  74. }
  75. }
  76. fd, err := unix.Socket(_PF_SYSTEM, unix.SOCK_DGRAM, _SYSPROTO_CONTROL)
  77. if err != nil {
  78. return nil, fmt.Errorf("system socket: %v", err)
  79. }
  80. var ctlInfo = &struct {
  81. ctlID uint32
  82. ctlName [96]byte
  83. }{}
  84. copy(ctlInfo.ctlName[:], utunControlName)
  85. err = ioctl(uintptr(fd), uintptr(_CTLIOCGINFO), uintptr(unsafe.Pointer(ctlInfo)))
  86. if err != nil {
  87. return nil, fmt.Errorf("CTLIOCGINFO: %v", err)
  88. }
  89. sc := sockaddrCtl{
  90. scLen: uint8(sockaddrCtlSize),
  91. scFamily: unix.AF_SYSTEM,
  92. ssSysaddr: _AF_SYS_CONTROL,
  93. scID: ctlInfo.ctlID,
  94. scUnit: uint32(ifIndex) + 1,
  95. }
  96. _, _, errno := unix.RawSyscall(
  97. unix.SYS_CONNECT,
  98. uintptr(fd),
  99. uintptr(unsafe.Pointer(&sc)),
  100. sockaddrCtlSize,
  101. )
  102. if errno != 0 {
  103. return nil, fmt.Errorf("SYS_CONNECT: %v", errno)
  104. }
  105. var ifName struct {
  106. name [16]byte
  107. }
  108. ifNameSize := uintptr(len(ifName.name))
  109. _, _, errno = syscall.Syscall6(syscall.SYS_GETSOCKOPT, uintptr(fd),
  110. 2, // SYSPROTO_CONTROL
  111. 2, // UTUN_OPT_IFNAME
  112. uintptr(unsafe.Pointer(&ifName)),
  113. uintptr(unsafe.Pointer(&ifNameSize)), 0)
  114. if errno != 0 {
  115. return nil, fmt.Errorf("SYS_GETSOCKOPT: %v", errno)
  116. }
  117. name = string(ifName.name[:ifNameSize-1])
  118. err = syscall.SetNonblock(fd, true)
  119. if err != nil {
  120. return nil, fmt.Errorf("SetNonblock: %v", err)
  121. }
  122. file := os.NewFile(uintptr(fd), "")
  123. t := &tun{
  124. ReadWriteCloser: file,
  125. Device: name,
  126. cidr: cidr,
  127. DefaultMTU: c.GetInt("tun.mtu", DefaultMTU),
  128. l: l,
  129. }
  130. err = t.reload(c, true)
  131. if err != nil {
  132. return nil, err
  133. }
  134. c.RegisterReloadCallback(func(c *config.C) {
  135. err := t.reload(c, false)
  136. if err != nil {
  137. util.LogWithContextIfNeeded("failed to reload tun device", err, t.l)
  138. }
  139. })
  140. return t, nil
  141. }
  142. func (t *tun) deviceBytes() (o [16]byte) {
  143. for i, c := range t.Device {
  144. o[i] = byte(c)
  145. }
  146. return
  147. }
  148. func newTunFromFd(_ *config.C, _ *logrus.Logger, _ int, _ *net.IPNet) (*tun, error) {
  149. return nil, fmt.Errorf("newTunFromFd not supported in Darwin")
  150. }
  151. func (t *tun) Close() error {
  152. if t.ReadWriteCloser != nil {
  153. return t.ReadWriteCloser.Close()
  154. }
  155. return nil
  156. }
  157. func (t *tun) Activate() error {
  158. devName := t.deviceBytes()
  159. var addr, mask [4]byte
  160. copy(addr[:], t.cidr.IP.To4())
  161. copy(mask[:], t.cidr.Mask)
  162. s, err := unix.Socket(
  163. unix.AF_INET,
  164. unix.SOCK_DGRAM,
  165. unix.IPPROTO_IP,
  166. )
  167. if err != nil {
  168. return err
  169. }
  170. defer unix.Close(s)
  171. fd := uintptr(s)
  172. ifra := ifreqAddr{
  173. Name: devName,
  174. Addr: unix.RawSockaddrInet4{
  175. Family: unix.AF_INET,
  176. Addr: addr,
  177. },
  178. }
  179. // Set the device ip address
  180. if err = ioctl(fd, unix.SIOCSIFADDR, uintptr(unsafe.Pointer(&ifra))); err != nil {
  181. return fmt.Errorf("failed to set tun address: %s", err)
  182. }
  183. // Set the device network
  184. ifra.Addr.Addr = mask
  185. if err = ioctl(fd, unix.SIOCSIFNETMASK, uintptr(unsafe.Pointer(&ifra))); err != nil {
  186. return fmt.Errorf("failed to set tun netmask: %s", err)
  187. }
  188. // Set the device name
  189. ifrf := ifReq{Name: devName}
  190. if err = ioctl(fd, unix.SIOCGIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  191. return fmt.Errorf("failed to set tun device name: %s", err)
  192. }
  193. // Set the MTU on the device
  194. ifm := ifreqMTU{Name: devName, MTU: int32(t.DefaultMTU)}
  195. if err = ioctl(fd, unix.SIOCSIFMTU, uintptr(unsafe.Pointer(&ifm))); err != nil {
  196. return fmt.Errorf("failed to set tun mtu: %v", err)
  197. }
  198. /*
  199. // Set the transmit queue length
  200. ifrq := ifreqQLEN{Name: devName, Value: int32(t.TXQueueLen)}
  201. if err = ioctl(fd, unix.SIOCSIFTXQLEN, uintptr(unsafe.Pointer(&ifrq))); err != nil {
  202. // If we can't set the queue length nebula will still work but it may lead to packet loss
  203. l.WithError(err).Error("Failed to set tun tx queue length")
  204. }
  205. */
  206. // Bring up the interface
  207. ifrf.Flags = ifrf.Flags | unix.IFF_UP
  208. if err = ioctl(fd, unix.SIOCSIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  209. return fmt.Errorf("failed to bring the tun device up: %s", err)
  210. }
  211. routeSock, err := unix.Socket(unix.AF_ROUTE, unix.SOCK_RAW, unix.AF_UNSPEC)
  212. if err != nil {
  213. return fmt.Errorf("unable to create AF_ROUTE socket: %v", err)
  214. }
  215. defer func() {
  216. unix.Shutdown(routeSock, unix.SHUT_RDWR)
  217. err := unix.Close(routeSock)
  218. if err != nil {
  219. t.l.WithError(err).Error("failed to close AF_ROUTE socket")
  220. }
  221. }()
  222. routeAddr := &netroute.Inet4Addr{}
  223. maskAddr := &netroute.Inet4Addr{}
  224. linkAddr, err := getLinkAddr(t.Device)
  225. if err != nil {
  226. return err
  227. }
  228. if linkAddr == nil {
  229. return fmt.Errorf("unable to discover link_addr for tun interface")
  230. }
  231. t.linkAddr = linkAddr
  232. copy(routeAddr.IP[:], addr[:])
  233. copy(maskAddr.IP[:], mask[:])
  234. err = addRoute(routeSock, routeAddr, maskAddr, linkAddr)
  235. if err != nil {
  236. if errors.Is(err, unix.EEXIST) {
  237. err = fmt.Errorf("unable to add tun route, identical route already exists: %s", t.cidr)
  238. }
  239. return err
  240. }
  241. // Run the interface
  242. ifrf.Flags = ifrf.Flags | unix.IFF_UP | unix.IFF_RUNNING
  243. if err = ioctl(fd, unix.SIOCSIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  244. return fmt.Errorf("failed to run tun device: %s", err)
  245. }
  246. // Unsafe path routes
  247. return t.addRoutes(false)
  248. }
  249. func (t *tun) reload(c *config.C, initial bool) error {
  250. change, routes, err := getAllRoutesFromConfig(c, t.cidr, initial)
  251. if err != nil {
  252. return err
  253. }
  254. if !initial && !change {
  255. return nil
  256. }
  257. routeTree, err := makeRouteTree(t.l, routes, false)
  258. if err != nil {
  259. return err
  260. }
  261. // Teach nebula how to handle the routes before establishing them in the system table
  262. oldRoutes := t.Routes.Swap(&routes)
  263. t.routeTree.Store(routeTree)
  264. if !initial {
  265. // Remove first, if the system removes a wanted route hopefully it will be re-added next
  266. err := t.removeRoutes(findRemovedRoutes(routes, *oldRoutes))
  267. if err != nil {
  268. util.LogWithContextIfNeeded("Failed to remove routes", err, t.l)
  269. }
  270. // Ensure any routes we actually want are installed
  271. err = t.addRoutes(true)
  272. if err != nil {
  273. // Catch any stray logs
  274. util.LogWithContextIfNeeded("Failed to add routes", err, t.l)
  275. }
  276. }
  277. return nil
  278. }
  279. func (t *tun) RouteFor(ip iputil.VpnIp) iputil.VpnIp {
  280. ok, r := t.routeTree.Load().MostSpecificContains(ip)
  281. if ok {
  282. return r
  283. }
  284. return 0
  285. }
  286. // Get the LinkAddr for the interface of the given name
  287. // TODO: Is there an easier way to fetch this when we create the interface?
  288. // Maybe SIOCGIFINDEX? but this doesn't appear to exist in the darwin headers.
  289. func getLinkAddr(name string) (*netroute.LinkAddr, error) {
  290. rib, err := netroute.FetchRIB(unix.AF_UNSPEC, unix.NET_RT_IFLIST, 0)
  291. if err != nil {
  292. return nil, err
  293. }
  294. msgs, err := netroute.ParseRIB(unix.NET_RT_IFLIST, rib)
  295. if err != nil {
  296. return nil, err
  297. }
  298. for _, m := range msgs {
  299. switch m := m.(type) {
  300. case *netroute.InterfaceMessage:
  301. if m.Name == name {
  302. sa, ok := m.Addrs[unix.RTAX_IFP].(*netroute.LinkAddr)
  303. if ok {
  304. return sa, nil
  305. }
  306. }
  307. }
  308. }
  309. return nil, nil
  310. }
  311. func (t *tun) addRoutes(logErrors bool) error {
  312. routeSock, err := unix.Socket(unix.AF_ROUTE, unix.SOCK_RAW, unix.AF_UNSPEC)
  313. if err != nil {
  314. return fmt.Errorf("unable to create AF_ROUTE socket: %v", err)
  315. }
  316. defer func() {
  317. unix.Shutdown(routeSock, unix.SHUT_RDWR)
  318. err := unix.Close(routeSock)
  319. if err != nil {
  320. t.l.WithError(err).Error("failed to close AF_ROUTE socket")
  321. }
  322. }()
  323. routeAddr := &netroute.Inet4Addr{}
  324. maskAddr := &netroute.Inet4Addr{}
  325. routes := *t.Routes.Load()
  326. for _, r := range routes {
  327. if r.Via == nil || !r.Install {
  328. // We don't allow route MTUs so only install routes with a via
  329. continue
  330. }
  331. copy(routeAddr.IP[:], r.Cidr.IP.To4())
  332. copy(maskAddr.IP[:], net.IP(r.Cidr.Mask).To4())
  333. err := addRoute(routeSock, routeAddr, maskAddr, t.linkAddr)
  334. if err != nil {
  335. if errors.Is(err, unix.EEXIST) {
  336. t.l.WithField("route", r.Cidr).
  337. Warnf("unable to add unsafe_route, identical route already exists")
  338. } else {
  339. retErr := util.NewContextualError("Failed to add route", map[string]interface{}{"route": r}, err)
  340. if logErrors {
  341. retErr.Log(t.l)
  342. } else {
  343. return retErr
  344. }
  345. }
  346. } else {
  347. t.l.WithField("route", r).Info("Added route")
  348. }
  349. }
  350. return nil
  351. }
  352. func (t *tun) removeRoutes(routes []Route) error {
  353. routeSock, err := unix.Socket(unix.AF_ROUTE, unix.SOCK_RAW, unix.AF_UNSPEC)
  354. if err != nil {
  355. return fmt.Errorf("unable to create AF_ROUTE socket: %v", err)
  356. }
  357. defer func() {
  358. unix.Shutdown(routeSock, unix.SHUT_RDWR)
  359. err := unix.Close(routeSock)
  360. if err != nil {
  361. t.l.WithError(err).Error("failed to close AF_ROUTE socket")
  362. }
  363. }()
  364. routeAddr := &netroute.Inet4Addr{}
  365. maskAddr := &netroute.Inet4Addr{}
  366. for _, r := range routes {
  367. if !r.Install {
  368. continue
  369. }
  370. copy(routeAddr.IP[:], r.Cidr.IP.To4())
  371. copy(maskAddr.IP[:], net.IP(r.Cidr.Mask).To4())
  372. err := delRoute(routeSock, routeAddr, maskAddr, t.linkAddr)
  373. if err != nil {
  374. t.l.WithError(err).WithField("route", r).Error("Failed to remove route")
  375. } else {
  376. t.l.WithField("route", r).Info("Removed route")
  377. }
  378. }
  379. return nil
  380. }
  381. func addRoute(sock int, addr, mask *netroute.Inet4Addr, link *netroute.LinkAddr) error {
  382. r := netroute.RouteMessage{
  383. Version: unix.RTM_VERSION,
  384. Type: unix.RTM_ADD,
  385. Flags: unix.RTF_UP,
  386. Seq: 1,
  387. Addrs: []netroute.Addr{
  388. unix.RTAX_DST: addr,
  389. unix.RTAX_GATEWAY: link,
  390. unix.RTAX_NETMASK: mask,
  391. },
  392. }
  393. data, err := r.Marshal()
  394. if err != nil {
  395. return fmt.Errorf("failed to create route.RouteMessage: %w", err)
  396. }
  397. _, err = unix.Write(sock, data[:])
  398. if err != nil {
  399. return fmt.Errorf("failed to write route.RouteMessage to socket: %w", err)
  400. }
  401. return nil
  402. }
  403. func delRoute(sock int, addr, mask *netroute.Inet4Addr, link *netroute.LinkAddr) error {
  404. r := netroute.RouteMessage{
  405. Version: unix.RTM_VERSION,
  406. Type: unix.RTM_DELETE,
  407. Seq: 1,
  408. Addrs: []netroute.Addr{
  409. unix.RTAX_DST: addr,
  410. unix.RTAX_GATEWAY: link,
  411. unix.RTAX_NETMASK: mask,
  412. },
  413. }
  414. data, err := r.Marshal()
  415. if err != nil {
  416. return fmt.Errorf("failed to create route.RouteMessage: %w", err)
  417. }
  418. _, err = unix.Write(sock, data[:])
  419. if err != nil {
  420. return fmt.Errorf("failed to write route.RouteMessage to socket: %w", err)
  421. }
  422. return nil
  423. }
  424. func (t *tun) Read(to []byte) (int, error) {
  425. buf := make([]byte, len(to)+4)
  426. n, err := t.ReadWriteCloser.Read(buf)
  427. copy(to, buf[4:])
  428. return n - 4, err
  429. }
  430. // Write is only valid for single threaded use
  431. func (t *tun) Write(from []byte) (int, error) {
  432. buf := t.out
  433. if cap(buf) < len(from)+4 {
  434. buf = make([]byte, len(from)+4)
  435. t.out = buf
  436. }
  437. buf = buf[:len(from)+4]
  438. if len(from) == 0 {
  439. return 0, syscall.EIO
  440. }
  441. // Determine the IP Family for the NULL L2 Header
  442. ipVer := from[0] >> 4
  443. if ipVer == 4 {
  444. buf[3] = syscall.AF_INET
  445. } else if ipVer == 6 {
  446. buf[3] = syscall.AF_INET6
  447. } else {
  448. return 0, fmt.Errorf("unable to determine IP version from packet")
  449. }
  450. copy(buf[4:], from)
  451. n, err := t.ReadWriteCloser.Write(buf)
  452. return n - 4, err
  453. }
  454. func (t *tun) Cidr() *net.IPNet {
  455. return t.cidr
  456. }
  457. func (t *tun) Name() string {
  458. return t.Device
  459. }
  460. func (t *tun) NewMultiQueueReader() (io.ReadWriteCloser, error) {
  461. return nil, fmt.Errorf("TODO: multiqueue not implemented for darwin")
  462. }