EtherGuard-VPN/tun/tun_darwin.go

377 lines
6.7 KiB
Go
Raw Normal View History

2019-01-02 01:55:51 +01:00
/* SPDX-License-Identifier: MIT
*
2019-01-02 01:55:51 +01:00
* Copyright (C) 2017-2019 WireGuard LLC. All Rights Reserved.
*/
2018-05-23 02:10:54 +02:00
package tun
import (
"fmt"
2018-05-14 19:23:44 +02:00
"io/ioutil"
"net"
"os"
2018-05-24 15:29:16 +02:00
"syscall"
"unsafe"
2019-05-14 09:09:52 +02:00
"golang.org/x/net/ipv6"
"golang.org/x/sys/unix"
)
const utunControlName = "com.apple.net.utun_control"
// _CTLIOCGINFO value derived from /usr/include/sys/{kern_control,ioccom}.h
const _CTLIOCGINFO = (0x40000000 | 0x80000000) | ((100 & 0x1fff) << 16) | uint32(byte('N'))<<8 | 3
// sockaddr_ctl specifeid in /usr/include/sys/kern_control.h
type sockaddrCtl struct {
scLen uint8
scFamily uint8
ssSysaddr uint16
scID uint32
scUnit uint32
scReserved [5]uint32
}
type NativeTun struct {
2018-05-20 05:43:22 +02:00
name string
tunFile *os.File
2018-05-20 05:43:22 +02:00
events chan TUNEvent
errors chan error
routeSocket int
}
var sockaddrCtlSize uintptr = 32
func (tun *NativeTun) routineRouteListener(tunIfindex int) {
2018-05-20 05:43:22 +02:00
var (
statusUp bool
statusMTU int
)
defer func() {
close(tun.events)
tun.routeSocket = -1
}()
2018-05-20 05:43:22 +02:00
data := make([]byte, os.Getpagesize())
for {
2018-05-24 15:29:16 +02:00
retry:
2018-05-20 05:43:22 +02:00
n, err := unix.Read(tun.routeSocket, data)
if err != nil {
2018-05-24 15:29:16 +02:00
if errno, ok := err.(syscall.Errno); ok && errno == syscall.EINTR {
goto retry
}
2018-05-20 05:43:22 +02:00
tun.errors <- err
return
}
if n < 14 {
continue
}
2018-05-21 17:27:18 +02:00
if data[3 /* type */] != unix.RTM_IFINFO {
2018-05-20 05:43:22 +02:00
continue
}
ifindex := int(*(*uint16)(unsafe.Pointer(&data[12 /* ifindex */])))
if ifindex != tunIfindex {
continue
}
iface, err := net.InterfaceByIndex(ifindex)
if err != nil {
tun.errors <- err
return
}
// Up / Down event
up := (iface.Flags & net.FlagUp) != 0
if up != statusUp && up {
tun.events <- TUNEventUp
}
if up != statusUp && !up {
tun.events <- TUNEventDown
}
statusUp = up
// MTU changes
if iface.MTU != statusMTU {
tun.events <- TUNEventMTUUpdate
}
statusMTU = iface.MTU
}
}
2018-05-23 02:10:54 +02:00
func CreateTUN(name string, mtu int) (TUNDevice, error) {
ifIndex := -1
2018-05-05 02:48:21 +02:00
if name != "utun" {
_, err := fmt.Sscanf(name, "utun%d", &ifIndex)
if err != nil || ifIndex < 0 {
2018-05-04 21:11:38 +02:00
return nil, fmt.Errorf("Interface name must be utun[0-9]*")
}
}
fd, err := unix.Socket(unix.AF_SYSTEM, unix.SOCK_DGRAM, 2)
if err != nil {
2018-05-03 04:49:35 +02:00
return nil, err
}
var ctlInfo = &struct {
ctlID uint32
ctlName [96]byte
}{}
copy(ctlInfo.ctlName[:], []byte(utunControlName))
_, _, errno := unix.Syscall(
unix.SYS_IOCTL,
uintptr(fd),
uintptr(_CTLIOCGINFO),
uintptr(unsafe.Pointer(ctlInfo)),
)
if errno != 0 {
2018-05-03 04:49:35 +02:00
return nil, fmt.Errorf("_CTLIOCGINFO: %v", errno)
}
sc := sockaddrCtl{
scLen: uint8(sockaddrCtlSize),
scFamily: unix.AF_SYSTEM,
ssSysaddr: 2,
scID: ctlInfo.ctlID,
scUnit: uint32(ifIndex) + 1,
}
scPointer := unsafe.Pointer(&sc)
_, _, errno = unix.RawSyscall(
unix.SYS_CONNECT,
uintptr(fd),
uintptr(scPointer),
uintptr(sockaddrCtlSize),
)
if errno != 0 {
2018-05-03 04:49:35 +02:00
return nil, fmt.Errorf("SYS_CONNECT: %v", errno)
}
err = syscall.SetNonblock(fd, true)
if err != nil {
return nil, err
}
2018-05-23 02:10:54 +02:00
tun, err := CreateTUNFromFile(os.NewFile(uintptr(fd), ""), mtu)
if err == nil && name == "utun" {
2018-05-22 15:17:35 +02:00
fname := os.Getenv("WG_TUN_NAME_FILE")
2018-05-14 19:23:44 +02:00
if fname != "" {
ioutil.WriteFile(fname, []byte(tun.(*NativeTun).name+"\n"), 0400)
2018-05-14 19:23:44 +02:00
}
}
return tun, err
2018-05-03 04:49:35 +02:00
}
2018-05-23 02:10:54 +02:00
func CreateTUNFromFile(file *os.File, mtu int) (TUNDevice, error) {
tun := &NativeTun{
tunFile: file,
events: make(chan TUNEvent, 10),
2019-03-03 05:20:13 +01:00
errors: make(chan error, 5),
}
2018-05-20 05:43:22 +02:00
name, err := tun.Name()
if err != nil {
tun.tunFile.Close()
2018-05-20 05:43:22 +02:00
return nil, err
}
tunIfindex, err := func() (int, error) {
iface, err := net.InterfaceByName(name)
if err != nil {
return -1, err
}
return iface.Index, nil
}()
2018-05-03 04:49:35 +02:00
if err != nil {
tun.tunFile.Close()
2018-05-03 04:49:35 +02:00
return nil, err
}
2018-05-20 05:43:22 +02:00
tun.routeSocket, err = unix.Socket(unix.AF_ROUTE, unix.SOCK_RAW, unix.AF_UNSPEC)
if err != nil {
tun.tunFile.Close()
2018-05-20 05:43:22 +02:00
return nil, err
}
2018-05-23 02:10:54 +02:00
go tun.routineRouteListener(tunIfindex)
2019-03-03 05:20:13 +01:00
if mtu > 0 {
err = tun.setMTU(mtu)
if err != nil {
tun.Close()
return nil, err
}
2018-05-14 12:27:29 +02:00
}
2018-05-14 03:55:46 +02:00
return tun, nil
}
func (tun *NativeTun) Name() (string, error) {
2018-05-03 04:49:35 +02:00
var ifName struct {
name [16]byte
}
ifNameSize := uintptr(16)
var errno syscall.Errno
tun.operateOnFd(func(fd uintptr) {
_, _, errno = unix.Syscall6(
unix.SYS_GETSOCKOPT,
fd,
2, /* #define SYSPROTO_CONTROL 2 */
2, /* #define UTUN_OPT_IFNAME 2 */
uintptr(unsafe.Pointer(&ifName)),
uintptr(unsafe.Pointer(&ifNameSize)), 0)
})
2018-05-03 04:49:35 +02:00
if errno != 0 {
return "", fmt.Errorf("SYS_GETSOCKOPT: %v", errno)
}
2018-05-03 04:49:35 +02:00
tun.name = string(ifName.name[:ifNameSize-1])
return tun.name, nil
}
func (tun *NativeTun) File() *os.File {
return tun.tunFile
2018-05-03 04:49:35 +02:00
}
func (tun *NativeTun) Events() chan TUNEvent {
2018-05-03 04:49:35 +02:00
return tun.events
}
func (tun *NativeTun) Read(buff []byte, offset int) (int, error) {
2018-05-14 03:55:46 +02:00
select {
case err := <-tun.errors:
2018-05-03 04:49:35 +02:00
return 0, err
2018-05-14 03:55:46 +02:00
default:
buff := buff[offset-4:]
n, err := tun.tunFile.Read(buff[:])
2018-05-14 03:55:46 +02:00
if n < 4 {
return 0, err
}
return n - 4, err
}
}
func (tun *NativeTun) Write(buff []byte, offset int) (int, error) {
2018-05-03 04:49:35 +02:00
// reserve space for header
2018-05-03 04:49:35 +02:00
buff = buff[offset-4:]
2018-05-03 04:49:35 +02:00
// add packet information header
2018-05-03 04:49:35 +02:00
buff[0] = 0x00
buff[1] = 0x00
buff[2] = 0x00
2018-05-03 04:49:35 +02:00
if buff[4]>>4 == ipv6.Version {
buff[3] = unix.AF_INET6
} else {
buff[3] = unix.AF_INET
}
2018-05-03 04:49:35 +02:00
// write
return tun.tunFile.Write(buff)
}
2019-03-21 21:43:04 +01:00
func (tun *NativeTun) Flush() error {
2019-06-06 23:00:15 +02:00
// TODO: can flushing be implemented by buffering and using sendmmsg?
2019-03-21 21:43:04 +01:00
return nil
}
func (tun *NativeTun) Close() error {
var err2 error
err1 := tun.tunFile.Close()
2018-05-20 05:43:22 +02:00
if tun.routeSocket != -1 {
unix.Shutdown(tun.routeSocket, unix.SHUT_RDWR)
err2 = unix.Close(tun.routeSocket)
} else if tun.events != nil {
close(tun.events)
2018-05-20 05:43:22 +02:00
}
2018-05-14 03:55:46 +02:00
if err1 != nil {
return err1
}
return err2
}
func (tun *NativeTun) setMTU(n int) error {
// open datagram socket
var fd int
fd, err := unix.Socket(
unix.AF_INET,
unix.SOCK_DGRAM,
0,
)
if err != nil {
return err
}
defer unix.Close(fd)
// do ioctl call
var ifr [32]byte
2018-05-03 04:49:35 +02:00
copy(ifr[:], tun.name)
2018-05-23 02:10:54 +02:00
*(*uint32)(unsafe.Pointer(&ifr[unix.IFNAMSIZ])) = uint32(n)
_, _, errno := unix.Syscall(
unix.SYS_IOCTL,
uintptr(fd),
uintptr(unix.SIOCSIFMTU),
uintptr(unsafe.Pointer(&ifr[0])),
)
if errno != 0 {
2018-05-21 17:27:18 +02:00
return fmt.Errorf("failed to set MTU on %s", tun.name)
}
return nil
}
func (tun *NativeTun) MTU() (int, error) {
// open datagram socket
fd, err := unix.Socket(
unix.AF_INET,
unix.SOCK_DGRAM,
0,
)
if err != nil {
return 0, err
}
defer unix.Close(fd)
// do ioctl call
var ifr [64]byte
2018-05-03 04:49:35 +02:00
copy(ifr[:], tun.name)
_, _, errno := unix.Syscall(
unix.SYS_IOCTL,
uintptr(fd),
uintptr(unix.SIOCGIFMTU),
uintptr(unsafe.Pointer(&ifr[0])),
)
if errno != 0 {
2018-05-21 17:27:18 +02:00
return 0, fmt.Errorf("failed to get MTU on %s", tun.name)
}
2018-05-22 18:33:50 +02:00
return int(*(*int32)(unsafe.Pointer(&ifr[16]))), nil
}