wireguard-go/tun_linux.go

368 lines
6.7 KiB
Go
Raw Normal View History

package main
/* Implementation of the TUN device interface for linux
*/
import (
"encoding/binary"
"errors"
2017-08-17 00:25:39 +02:00
"fmt"
"golang.org/x/net/ipv6"
"golang.org/x/sys/unix"
2017-08-04 16:15:53 +02:00
"net"
"os"
"strings"
"time"
"unsafe"
)
2017-08-17 00:25:39 +02:00
const (
cloneDevicePath = "/dev/net/tun"
ifReqSize = unix.IFNAMSIZ + 64
2017-08-17 00:25:39 +02:00
)
type NativeTun struct {
fd *os.File
index int32 // if index
name string // name of interface
errors chan error // async error handling
events chan TUNEvent // device related events
2017-08-17 00:25:39 +02:00
}
func toRTMGRP(sc uint) uint {
return 1 << (sc - 1)
}
func (tun *NativeTun) bindRTMGRP() (int, error) {
groups := toRTMGRP(unix.RTNLGRP_LINK)
groups |= toRTMGRP(unix.RTNLGRP_IPV4_IFADDR)
groups |= toRTMGRP(unix.RTNLGRP_IPV6_IFADDR)
sock, err := unix.Socket(unix.AF_NETLINK, unix.SOCK_RAW, unix.NETLINK_ROUTE)
if err != nil {
return 0, err
}
saddr := &unix.SockaddrNetlink{
Family: unix.AF_NETLINK,
Pid: uint32(os.Getpid()),
Groups: uint32(groups),
}
return sock, unix.Bind(sock, saddr)
}
2017-11-14 18:26:28 +01:00
func (tun *NativeTun) File() *os.File {
return tun.fd
}
func (tun *NativeTun) RoutineHackListener() {
2017-11-29 21:12:09 +01:00
/* This is needed for the detection to work across network namespaces
* If you are reading this and know a better method, please get in touch.
*/
fd := int(tun.fd.Fd())
for {
_, err := unix.Write(fd, nil)
switch err {
case unix.EINVAL:
tun.events <- TUNEventUp
case unix.EIO:
tun.events <- TUNEventDown
default:
}
time.Sleep(time.Second / 10)
}
}
2017-08-17 00:25:39 +02:00
func (tun *NativeTun) RoutineNetlinkListener() {
sock, err := tun.bindRTMGRP()
if err != nil {
2017-08-17 00:25:39 +02:00
tun.errors <- errors.New("Failed to create netlink event listener")
return
}
for msg := make([]byte, 1<<16); ; {
msgn, _, _, _, err := unix.Recvmsg(sock, msg[:], nil, 0)
if err != nil {
tun.errors <- fmt.Errorf("Failed to receive netlink message: %s", err.Error())
return
}
for remain := msg[:msgn]; len(remain) >= unix.SizeofNlMsghdr; {
hdr := *(*unix.NlMsghdr)(unsafe.Pointer(&remain[0]))
if int(hdr.Len) > len(remain) {
break
}
switch hdr.Type {
case unix.NLMSG_DONE:
remain = []byte{}
case unix.RTM_NEWLINK:
info := *(*unix.IfInfomsg)(unsafe.Pointer(&remain[unix.SizeofNlMsghdr]))
remain = remain[hdr.Len:]
2017-08-17 00:25:39 +02:00
2017-08-17 12:58:18 +02:00
if info.Index != tun.index {
// not our interface
continue
}
2017-08-17 00:25:39 +02:00
if info.Flags&unix.IFF_RUNNING != 0 {
tun.events <- TUNEventUp
2017-08-17 00:25:39 +02:00
}
if info.Flags&unix.IFF_RUNNING == 0 {
tun.events <- TUNEventDown
2017-08-17 00:25:39 +02:00
}
tun.events <- TUNEventMTUUpdate
2017-08-17 00:25:39 +02:00
default:
remain = remain[hdr.Len:]
}
}
}
}
func (tun *NativeTun) isUp() (bool, error) {
2017-08-04 16:15:53 +02:00
inter, err := net.InterfaceByName(tun.name)
return inter.Flags&net.FlagUp != 0, err
}
func (tun *NativeTun) Name() string {
return tun.name
}
2017-08-17 00:25:39 +02:00
func getDummySock() (int, error) {
return unix.Socket(
unix.AF_INET,
unix.SOCK_DGRAM,
0,
)
}
2017-08-17 12:58:18 +02:00
func getIFIndex(name string) (int32, error) {
2017-08-17 00:25:39 +02:00
fd, err := getDummySock()
if err != nil {
return 0, err
}
defer unix.Close(fd)
var ifr [ifReqSize]byte
2017-08-17 00:25:39 +02:00
copy(ifr[:], name)
_, _, errno := unix.Syscall(
unix.SYS_IOCTL,
uintptr(fd),
uintptr(unix.SIOCGIFINDEX),
uintptr(unsafe.Pointer(&ifr[0])),
)
if errno != 0 {
return 0, errno
}
index := binary.LittleEndian.Uint32(ifr[unix.IFNAMSIZ:])
return toInt32(index), nil
2017-08-17 00:25:39 +02:00
}
func (tun *NativeTun) setMTU(n int) error {
// open datagram socket
fd, err := unix.Socket(
unix.AF_INET,
unix.SOCK_DGRAM,
0,
)
if err != nil {
return err
}
defer unix.Close(fd)
2017-07-18 14:15:29 +02:00
// do ioctl call
var ifr [ifReqSize]byte
copy(ifr[:], tun.name)
binary.LittleEndian.PutUint32(ifr[16:20], uint32(n))
_, _, errno := unix.Syscall(
unix.SYS_IOCTL,
uintptr(fd),
uintptr(unix.SIOCSIFMTU),
uintptr(unsafe.Pointer(&ifr[0])),
)
if errno != 0 {
return errors.New("Failed to set MTU of TUN device")
}
return nil
}
func (tun *NativeTun) MTU() (int, error) {
// open datagram socket
fd, err := unix.Socket(
unix.AF_INET,
unix.SOCK_DGRAM,
0,
)
if err != nil {
return 0, err
}
defer unix.Close(fd)
2017-07-18 14:15:29 +02:00
// do ioctl call
var ifr [ifReqSize]byte
copy(ifr[:], tun.name)
_, _, errno := unix.Syscall(
unix.SYS_IOCTL,
uintptr(fd),
uintptr(unix.SIOCGIFMTU),
uintptr(unsafe.Pointer(&ifr[0])),
)
if errno != 0 {
return 0, errors.New("Failed to get MTU of TUN device")
}
// convert result to signed 32-bit int
val := binary.LittleEndian.Uint32(ifr[16:20])
if val >= (1 << 31) {
2017-11-17 14:36:08 +01:00
return int(toInt32(val)), nil
}
return int(val), nil
}
func (tun *NativeTun) Write(buff []byte, offset int) (int, error) {
// reserve space for header
buff = buff[offset-4:]
// add packet information header
buff[0] = 0x00
buff[1] = 0x00
if buff[4] == ipv6.Version<<4 {
buff[2] = 0x86
buff[3] = 0xdd
} else {
buff[2] = 0x08
buff[3] = 0x00
}
// write
return tun.fd.Write(buff)
}
func (tun *NativeTun) Read(buff []byte, offset int) (int, error) {
2017-08-17 00:25:39 +02:00
select {
case err := <-tun.errors:
return 0, err
default:
buff := buff[offset-4:]
n, err := tun.fd.Read(buff[:])
if n < 4 {
return 0, err
}
return n - 4, err
2017-08-17 00:25:39 +02:00
}
}
func (tun *NativeTun) Events() chan TUNEvent {
return tun.events
}
func (tun *NativeTun) Close() error {
2018-02-18 22:54:33 +01:00
return tun.fd.Close()
}
2017-11-14 18:26:28 +01:00
func CreateTUNFromFile(name string, fd *os.File) (TUNDevice, error) {
device := &NativeTun{
fd: fd,
name: name,
events: make(chan TUNEvent, 5),
2017-11-14 18:26:28 +01:00
errors: make(chan error, 5),
}
// start event listener
var err error
device.index, err = getIFIndex(device.name)
if err != nil {
return nil, err
}
go device.RoutineNetlinkListener()
2018-02-04 16:08:26 +01:00
go device.RoutineHackListener() // cross namespace
2017-11-14 18:26:28 +01:00
// set default MTU
return device, device.setMTU(DefaultMTU)
}
func CreateTUN(name string) (TUNDevice, error) {
// open clone device
fd, err := os.OpenFile(cloneDevicePath, os.O_RDWR, 0)
if err != nil {
return nil, err
}
// create new device
var ifr [ifReqSize]byte
var flags uint16 = unix.IFF_TUN // | unix.IFF_NO_PI (disabled for TUN status hack)
nameBytes := []byte(name)
if len(nameBytes) >= unix.IFNAMSIZ {
2017-08-17 00:25:39 +02:00
return nil, errors.New("Interface name too long")
}
copy(ifr[:], nameBytes)
binary.LittleEndian.PutUint16(ifr[16:], flags)
_, _, errno := unix.Syscall(
unix.SYS_IOCTL,
uintptr(fd.Fd()),
uintptr(unix.TUNSETIFF),
uintptr(unsafe.Pointer(&ifr[0])),
)
if errno != 0 {
2017-08-17 00:25:39 +02:00
return nil, errno
}
// read (new) name of interface
newName := string(ifr[:])
newName = newName[:strings.Index(newName, "\000")]
device := &NativeTun{
fd: fd,
name: newName,
events: make(chan TUNEvent, 5),
2017-08-17 00:25:39 +02:00
errors: make(chan error, 5),
}
2017-08-17 12:58:18 +02:00
// start event listener
2017-08-17 00:25:39 +02:00
device.index, err = getIFIndex(device.name)
if err != nil {
return nil, err
}
go device.RoutineNetlinkListener()
2018-02-04 16:08:26 +01:00
go device.RoutineHackListener() // cross namespace
// set default MTU
2017-08-17 00:25:39 +02:00
return device, device.setMTU(DefaultMTU)
}