2019-01-02 00:55:51 +00:00
|
|
|
/* SPDX-License-Identifier: MIT
|
2018-05-03 13:04:00 +00:00
|
|
|
*
|
2019-01-02 00:55:51 +00:00
|
|
|
* Copyright (C) 2017-2019 WireGuard LLC. All Rights Reserved.
|
2018-05-03 13:04:00 +00:00
|
|
|
*/
|
|
|
|
|
2018-05-23 00:10:54 +00:00
|
|
|
package tun
|
2017-06-04 19:48:15 +00:00
|
|
|
|
2017-07-20 13:06:24 +00:00
|
|
|
/* Implementation of the TUN device interface for linux
|
|
|
|
*/
|
|
|
|
|
2017-06-04 19:48:15 +00:00
|
|
|
import (
|
2018-05-05 00:48:21 +00:00
|
|
|
"bytes"
|
2017-06-04 19:48:15 +00:00
|
|
|
"errors"
|
2017-08-16 22:25:39 +00:00
|
|
|
"fmt"
|
2017-08-04 14:15:53 +00:00
|
|
|
"net"
|
2017-06-04 19:48:15 +00:00
|
|
|
"os"
|
2018-05-21 01:31:44 +00:00
|
|
|
"sync"
|
2019-03-07 00:51:41 +00:00
|
|
|
"syscall"
|
2017-11-29 17:46:31 +00:00
|
|
|
"time"
|
2017-06-04 19:48:15 +00:00
|
|
|
"unsafe"
|
2019-05-14 07:09:52 +00:00
|
|
|
|
|
|
|
"golang.org/x/net/ipv6"
|
|
|
|
"golang.org/x/sys/unix"
|
|
|
|
"golang.zx2c4.com/wireguard/rwcancel"
|
2017-06-04 19:48:15 +00:00
|
|
|
)
|
|
|
|
|
2017-08-16 22:25:39 +00:00
|
|
|
const (
|
2018-02-13 15:43:07 +00:00
|
|
|
cloneDevicePath = "/dev/net/tun"
|
|
|
|
ifReqSize = unix.IFNAMSIZ + 64
|
2017-08-16 22:25:39 +00:00
|
|
|
)
|
2017-06-04 19:48:15 +00:00
|
|
|
|
2019-02-28 23:05:57 +00:00
|
|
|
type NativeTun struct {
|
2018-10-17 19:26:53 +00:00
|
|
|
tunFile *os.File
|
2019-06-10 21:33:40 +00:00
|
|
|
index int32 // if index
|
|
|
|
name string // name of interface
|
|
|
|
errors chan error // async error handling
|
|
|
|
events chan Event // device related events
|
|
|
|
nopi bool // the device was pased IFF_NO_PI
|
2018-05-21 01:31:44 +00:00
|
|
|
netlinkSock int
|
|
|
|
netlinkCancel *rwcancel.RWCancel
|
|
|
|
hackListenerClosed sync.Mutex
|
2018-05-14 01:43:56 +00:00
|
|
|
statusListenersShutdown chan struct{}
|
2017-08-16 22:25:39 +00:00
|
|
|
}
|
|
|
|
|
2019-02-28 23:05:57 +00:00
|
|
|
func (tun *NativeTun) File() *os.File {
|
2018-10-17 19:26:53 +00:00
|
|
|
return tun.tunFile
|
2017-11-14 17:26:28 +00:00
|
|
|
}
|
|
|
|
|
2019-02-28 23:05:57 +00:00
|
|
|
func (tun *NativeTun) routineHackListener() {
|
2018-05-21 01:31:44 +00:00
|
|
|
defer tun.hackListenerClosed.Unlock()
|
2017-11-29 20:12:09 +00:00
|
|
|
/* This is needed for the detection to work across network namespaces
|
2017-11-29 17:46:31 +00:00
|
|
|
* If you are reading this and know a better method, please get in touch.
|
|
|
|
*/
|
|
|
|
for {
|
2019-03-07 00:51:41 +00:00
|
|
|
sysconn, err := tun.tunFile.SyscallConn()
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
err2 := sysconn.Control(func(fd uintptr) {
|
|
|
|
_, err = unix.Write(int(fd), nil)
|
|
|
|
})
|
|
|
|
if err2 != nil {
|
|
|
|
return
|
|
|
|
}
|
2017-11-29 17:46:31 +00:00
|
|
|
switch err {
|
|
|
|
case unix.EINVAL:
|
2019-06-10 21:33:40 +00:00
|
|
|
tun.events <- EventUp
|
2017-11-29 17:46:31 +00:00
|
|
|
case unix.EIO:
|
2019-06-10 21:33:40 +00:00
|
|
|
tun.events <- EventDown
|
2017-11-29 17:46:31 +00:00
|
|
|
default:
|
2018-05-14 00:14:33 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
select {
|
2018-05-20 02:03:11 +00:00
|
|
|
case <-time.After(time.Second):
|
2018-05-14 01:43:56 +00:00
|
|
|
case <-tun.statusListenersShutdown:
|
2018-05-14 00:14:33 +00:00
|
|
|
return
|
2017-11-29 17:46:31 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-05-14 00:14:33 +00:00
|
|
|
func createNetlinkSocket() (int, error) {
|
2018-04-27 00:23:48 +00:00
|
|
|
sock, err := unix.Socket(unix.AF_NETLINK, unix.SOCK_RAW, unix.NETLINK_ROUTE)
|
2018-02-13 15:43:07 +00:00
|
|
|
if err != nil {
|
2018-05-14 00:14:33 +00:00
|
|
|
return -1, err
|
2017-08-16 22:25:39 +00:00
|
|
|
}
|
2018-04-27 00:23:48 +00:00
|
|
|
saddr := &unix.SockaddrNetlink{
|
|
|
|
Family: unix.AF_NETLINK,
|
2018-05-14 00:14:33 +00:00
|
|
|
Groups: uint32((1 << (unix.RTNLGRP_LINK - 1)) | (1 << (unix.RTNLGRP_IPV4_IFADDR - 1)) | (1 << (unix.RTNLGRP_IPV6_IFADDR - 1))),
|
2018-04-27 00:23:48 +00:00
|
|
|
}
|
|
|
|
err = unix.Bind(sock, saddr)
|
|
|
|
if err != nil {
|
2018-05-14 00:14:33 +00:00
|
|
|
return -1, err
|
2018-04-27 00:23:48 +00:00
|
|
|
}
|
2018-05-14 00:14:33 +00:00
|
|
|
return sock, nil
|
|
|
|
}
|
2018-04-27 00:23:48 +00:00
|
|
|
|
2019-02-28 23:05:57 +00:00
|
|
|
func (tun *NativeTun) routineNetlinkListener() {
|
2018-05-20 04:38:39 +00:00
|
|
|
defer func() {
|
|
|
|
unix.Close(tun.netlinkSock)
|
2018-05-21 01:31:44 +00:00
|
|
|
tun.hackListenerClosed.Lock()
|
2018-05-20 04:38:39 +00:00
|
|
|
close(tun.events)
|
|
|
|
}()
|
2018-05-14 12:08:03 +00:00
|
|
|
|
2017-08-16 22:25:39 +00:00
|
|
|
for msg := make([]byte, 1<<16); ; {
|
|
|
|
|
2018-05-14 12:08:03 +00:00
|
|
|
var err error
|
|
|
|
var msgn int
|
|
|
|
for {
|
|
|
|
msgn, _, _, _, err = unix.Recvmsg(tun.netlinkSock, msg[:], nil, 0)
|
2018-05-24 13:29:16 +00:00
|
|
|
if err == nil || !rwcancel.RetryAfterError(err) {
|
2018-05-14 12:08:03 +00:00
|
|
|
break
|
|
|
|
}
|
|
|
|
if !tun.netlinkCancel.ReadyRead() {
|
|
|
|
tun.errors <- fmt.Errorf("netlink socket closed: %s", err.Error())
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
2017-08-16 22:25:39 +00:00
|
|
|
if err != nil {
|
2018-05-14 00:14:33 +00:00
|
|
|
tun.errors <- fmt.Errorf("failed to receive netlink message: %s", err.Error())
|
2017-08-16 22:25:39 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2018-05-14 01:43:56 +00:00
|
|
|
select {
|
|
|
|
case <-tun.statusListenersShutdown:
|
|
|
|
return
|
|
|
|
default:
|
|
|
|
}
|
|
|
|
|
2017-08-16 22:25:39 +00:00
|
|
|
for remain := msg[:msgn]; len(remain) >= unix.SizeofNlMsghdr; {
|
|
|
|
|
|
|
|
hdr := *(*unix.NlMsghdr)(unsafe.Pointer(&remain[0]))
|
|
|
|
|
|
|
|
if int(hdr.Len) > len(remain) {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
|
|
|
|
switch hdr.Type {
|
|
|
|
case unix.NLMSG_DONE:
|
|
|
|
remain = []byte{}
|
|
|
|
|
|
|
|
case unix.RTM_NEWLINK:
|
|
|
|
info := *(*unix.IfInfomsg)(unsafe.Pointer(&remain[unix.SizeofNlMsghdr]))
|
2017-08-22 12:57:32 +00:00
|
|
|
remain = remain[hdr.Len:]
|
2017-08-16 22:25:39 +00:00
|
|
|
|
2017-08-17 10:58:18 +00:00
|
|
|
if info.Index != tun.index {
|
|
|
|
// not our interface
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2017-08-16 22:25:39 +00:00
|
|
|
if info.Flags&unix.IFF_RUNNING != 0 {
|
2019-06-10 21:33:40 +00:00
|
|
|
tun.events <- EventUp
|
2017-08-16 22:25:39 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if info.Flags&unix.IFF_RUNNING == 0 {
|
2019-06-10 21:33:40 +00:00
|
|
|
tun.events <- EventDown
|
2017-08-16 22:25:39 +00:00
|
|
|
}
|
|
|
|
|
2019-06-10 21:33:40 +00:00
|
|
|
tun.events <- EventMTUUpdate
|
2017-08-16 22:25:39 +00:00
|
|
|
|
|
|
|
default:
|
|
|
|
remain = remain[hdr.Len:]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2017-06-04 19:48:15 +00:00
|
|
|
}
|
|
|
|
|
2019-02-28 23:05:57 +00:00
|
|
|
func (tun *NativeTun) isUp() (bool, error) {
|
2017-08-04 14:15:53 +00:00
|
|
|
inter, err := net.InterfaceByName(tun.name)
|
|
|
|
return inter.Flags&net.FlagUp != 0, err
|
|
|
|
}
|
|
|
|
|
2019-02-27 00:06:43 +00:00
|
|
|
func getIFIndex(name string) (int32, error) {
|
|
|
|
fd, err := unix.Socket(
|
2017-08-16 22:25:39 +00:00
|
|
|
unix.AF_INET,
|
|
|
|
unix.SOCK_DGRAM,
|
|
|
|
0,
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return 0, err
|
|
|
|
}
|
|
|
|
|
|
|
|
defer unix.Close(fd)
|
|
|
|
|
2018-02-13 15:43:07 +00:00
|
|
|
var ifr [ifReqSize]byte
|
2017-08-16 22:25:39 +00:00
|
|
|
copy(ifr[:], name)
|
|
|
|
_, _, errno := unix.Syscall(
|
|
|
|
unix.SYS_IOCTL,
|
|
|
|
uintptr(fd),
|
|
|
|
uintptr(unix.SIOCGIFINDEX),
|
|
|
|
uintptr(unsafe.Pointer(&ifr[0])),
|
|
|
|
)
|
|
|
|
|
|
|
|
if errno != 0 {
|
|
|
|
return 0, errno
|
|
|
|
}
|
|
|
|
|
2018-05-23 00:10:54 +00:00
|
|
|
return *(*int32)(unsafe.Pointer(&ifr[unix.IFNAMSIZ])), nil
|
2017-08-16 22:25:39 +00:00
|
|
|
}
|
|
|
|
|
2019-02-28 23:05:57 +00:00
|
|
|
func (tun *NativeTun) setMTU(n int) error {
|
2017-07-15 14:27:59 +00:00
|
|
|
// open datagram socket
|
2017-07-20 13:06:24 +00:00
|
|
|
fd, err := unix.Socket(
|
|
|
|
unix.AF_INET,
|
|
|
|
unix.SOCK_DGRAM,
|
2017-07-15 14:27:59 +00:00
|
|
|
0,
|
|
|
|
)
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2017-07-20 13:06:24 +00:00
|
|
|
defer unix.Close(fd)
|
2017-07-18 12:15:29 +00:00
|
|
|
|
2017-07-15 14:27:59 +00:00
|
|
|
// do ioctl call
|
|
|
|
|
2018-02-13 15:43:07 +00:00
|
|
|
var ifr [ifReqSize]byte
|
2017-07-15 14:27:59 +00:00
|
|
|
copy(ifr[:], tun.name)
|
2018-05-23 00:10:54 +00:00
|
|
|
*(*uint32)(unsafe.Pointer(&ifr[unix.IFNAMSIZ])) = uint32(n)
|
2017-07-20 13:06:24 +00:00
|
|
|
_, _, errno := unix.Syscall(
|
|
|
|
unix.SYS_IOCTL,
|
2017-07-15 14:27:59 +00:00
|
|
|
uintptr(fd),
|
2017-07-20 13:06:24 +00:00
|
|
|
uintptr(unix.SIOCSIFMTU),
|
2017-07-15 14:27:59 +00:00
|
|
|
uintptr(unsafe.Pointer(&ifr[0])),
|
|
|
|
)
|
|
|
|
|
|
|
|
if errno != 0 {
|
2018-05-21 15:27:18 +00:00
|
|
|
return errors.New("failed to set MTU of TUN device")
|
2017-07-15 14:27:59 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-02-28 23:05:57 +00:00
|
|
|
func (tun *NativeTun) MTU() (int, error) {
|
2017-07-11 20:48:58 +00:00
|
|
|
// open datagram socket
|
2017-07-20 13:06:24 +00:00
|
|
|
fd, err := unix.Socket(
|
|
|
|
unix.AF_INET,
|
|
|
|
unix.SOCK_DGRAM,
|
2017-07-11 20:48:58 +00:00
|
|
|
0,
|
|
|
|
)
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return 0, err
|
|
|
|
}
|
|
|
|
|
2017-07-20 13:06:24 +00:00
|
|
|
defer unix.Close(fd)
|
2017-07-18 12:15:29 +00:00
|
|
|
|
2017-07-11 20:48:58 +00:00
|
|
|
// do ioctl call
|
|
|
|
|
2018-02-13 15:43:07 +00:00
|
|
|
var ifr [ifReqSize]byte
|
2017-07-11 20:48:58 +00:00
|
|
|
copy(ifr[:], tun.name)
|
2017-07-20 13:06:24 +00:00
|
|
|
_, _, errno := unix.Syscall(
|
|
|
|
unix.SYS_IOCTL,
|
2017-07-11 20:48:58 +00:00
|
|
|
uintptr(fd),
|
2017-07-20 13:06:24 +00:00
|
|
|
uintptr(unix.SIOCGIFMTU),
|
2017-07-11 20:48:58 +00:00
|
|
|
uintptr(unsafe.Pointer(&ifr[0])),
|
|
|
|
)
|
|
|
|
if errno != 0 {
|
2019-03-07 00:51:41 +00:00
|
|
|
return 0, errors.New("failed to get MTU of TUN device: " + errno.Error())
|
2017-07-11 20:48:58 +00:00
|
|
|
}
|
|
|
|
|
2018-05-23 00:10:54 +00:00
|
|
|
return int(*(*int32)(unsafe.Pointer(&ifr[unix.IFNAMSIZ]))), nil
|
2017-06-04 19:48:15 +00:00
|
|
|
}
|
|
|
|
|
2019-02-28 23:05:57 +00:00
|
|
|
func (tun *NativeTun) Name() (string, error) {
|
2019-03-07 00:51:41 +00:00
|
|
|
sysconn, err := tun.tunFile.SyscallConn()
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
2018-04-18 14:39:14 +00:00
|
|
|
var ifr [ifReqSize]byte
|
2019-03-07 00:51:41 +00:00
|
|
|
var errno syscall.Errno
|
|
|
|
err = sysconn.Control(func(fd uintptr) {
|
|
|
|
_, _, errno = unix.Syscall(
|
|
|
|
unix.SYS_IOCTL,
|
|
|
|
fd,
|
|
|
|
uintptr(unix.TUNGETIFF),
|
|
|
|
uintptr(unsafe.Pointer(&ifr[0])),
|
|
|
|
)
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return "", errors.New("failed to get name of TUN device: " + err.Error())
|
|
|
|
}
|
2018-04-18 14:39:14 +00:00
|
|
|
if errno != 0 {
|
2019-03-07 00:51:41 +00:00
|
|
|
return "", errors.New("failed to get name of TUN device: " + errno.Error())
|
2018-04-18 14:39:14 +00:00
|
|
|
}
|
2018-05-05 00:47:35 +00:00
|
|
|
nullStr := ifr[:]
|
|
|
|
i := bytes.IndexByte(nullStr, 0)
|
|
|
|
if i != -1 {
|
|
|
|
nullStr = nullStr[:i]
|
|
|
|
}
|
|
|
|
tun.name = string(nullStr)
|
2018-04-18 14:39:14 +00:00
|
|
|
return tun.name, nil
|
|
|
|
}
|
|
|
|
|
2019-02-28 23:05:57 +00:00
|
|
|
func (tun *NativeTun) Write(buff []byte, offset int) (int, error) {
|
2017-12-04 20:39:06 +00:00
|
|
|
|
2018-02-28 11:40:56 +00:00
|
|
|
if tun.nopi {
|
|
|
|
buff = buff[offset:]
|
|
|
|
} else {
|
|
|
|
// reserve space for header
|
2017-12-04 20:39:06 +00:00
|
|
|
|
2018-02-28 11:40:56 +00:00
|
|
|
buff = buff[offset-4:]
|
2017-12-04 20:39:06 +00:00
|
|
|
|
2018-02-28 11:40:56 +00:00
|
|
|
// add packet information header
|
2017-12-04 20:39:06 +00:00
|
|
|
|
2018-02-28 11:40:56 +00:00
|
|
|
buff[0] = 0x00
|
|
|
|
buff[1] = 0x00
|
2017-12-04 20:39:06 +00:00
|
|
|
|
2018-04-20 03:30:22 +00:00
|
|
|
if buff[4]>>4 == ipv6.Version {
|
2018-02-28 11:40:56 +00:00
|
|
|
buff[2] = 0x86
|
|
|
|
buff[3] = 0xdd
|
|
|
|
} else {
|
|
|
|
buff[2] = 0x08
|
|
|
|
buff[3] = 0x00
|
|
|
|
}
|
2017-12-04 20:39:06 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// write
|
|
|
|
|
2018-10-17 19:26:53 +00:00
|
|
|
return tun.tunFile.Write(buff)
|
2017-06-04 19:48:15 +00:00
|
|
|
}
|
|
|
|
|
2019-03-21 20:43:04 +00:00
|
|
|
func (tun *NativeTun) Flush() error {
|
2019-06-06 21:00:15 +00:00
|
|
|
// TODO: can flushing be implemented by buffering and using sendmmsg?
|
2019-03-21 20:43:04 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-03-07 00:51:41 +00:00
|
|
|
func (tun *NativeTun) Read(buff []byte, offset int) (int, error) {
|
2017-08-16 22:25:39 +00:00
|
|
|
select {
|
|
|
|
case err := <-tun.errors:
|
|
|
|
return 0, err
|
|
|
|
default:
|
2018-02-28 11:40:56 +00:00
|
|
|
if tun.nopi {
|
2018-10-17 19:26:53 +00:00
|
|
|
return tun.tunFile.Read(buff[offset:])
|
2018-02-28 11:40:56 +00:00
|
|
|
} else {
|
|
|
|
buff := buff[offset-4:]
|
2018-10-17 19:26:53 +00:00
|
|
|
n, err := tun.tunFile.Read(buff[:])
|
2018-02-28 11:40:56 +00:00
|
|
|
if n < 4 {
|
|
|
|
return 0, err
|
|
|
|
}
|
|
|
|
return n - 4, err
|
2017-12-04 20:39:06 +00:00
|
|
|
}
|
2017-08-16 22:25:39 +00:00
|
|
|
}
|
2017-06-04 19:48:15 +00:00
|
|
|
}
|
|
|
|
|
2019-06-10 21:33:40 +00:00
|
|
|
func (tun *NativeTun) Events() chan Event {
|
2017-08-07 13:25:04 +00:00
|
|
|
return tun.events
|
|
|
|
}
|
|
|
|
|
2019-02-28 23:05:57 +00:00
|
|
|
func (tun *NativeTun) Close() error {
|
2018-05-14 12:08:03 +00:00
|
|
|
var err1 error
|
2018-05-21 12:16:46 +00:00
|
|
|
if tun.statusListenersShutdown != nil {
|
|
|
|
close(tun.statusListenersShutdown)
|
|
|
|
if tun.netlinkCancel != nil {
|
|
|
|
err1 = tun.netlinkCancel.Cancel()
|
|
|
|
}
|
|
|
|
} else if tun.events != nil {
|
|
|
|
close(tun.events)
|
2018-05-14 12:08:03 +00:00
|
|
|
}
|
2018-10-17 19:26:53 +00:00
|
|
|
err2 := tun.tunFile.Close()
|
2018-05-14 00:14:33 +00:00
|
|
|
|
|
|
|
if err1 != nil {
|
|
|
|
return err1
|
|
|
|
}
|
2019-03-07 00:51:41 +00:00
|
|
|
return err2
|
2017-08-07 13:25:04 +00:00
|
|
|
}
|
|
|
|
|
2019-06-10 21:33:40 +00:00
|
|
|
func CreateTUN(name string, mtu int) (Device, error) {
|
2019-02-27 03:10:01 +00:00
|
|
|
nfd, err := unix.Open(cloneDevicePath, os.O_RDWR, 0)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2018-02-13 15:43:07 +00:00
|
|
|
var ifr [ifReqSize]byte
|
|
|
|
var flags uint16 = unix.IFF_TUN // | unix.IFF_NO_PI (disabled for TUN status hack)
|
2017-06-04 19:48:15 +00:00
|
|
|
nameBytes := []byte(name)
|
2017-07-20 13:06:24 +00:00
|
|
|
if len(nameBytes) >= unix.IFNAMSIZ {
|
2018-05-14 00:14:33 +00:00
|
|
|
return nil, errors.New("interface name too long")
|
2017-06-04 19:48:15 +00:00
|
|
|
}
|
|
|
|
copy(ifr[:], nameBytes)
|
2018-05-23 00:10:54 +00:00
|
|
|
*(*uint16)(unsafe.Pointer(&ifr[unix.IFNAMSIZ])) = flags
|
2017-06-04 19:48:15 +00:00
|
|
|
|
2019-02-27 03:10:01 +00:00
|
|
|
_, _, errno := unix.Syscall(
|
|
|
|
unix.SYS_IOCTL,
|
2019-03-07 00:51:41 +00:00
|
|
|
uintptr(nfd),
|
2019-02-27 03:10:01 +00:00
|
|
|
uintptr(unix.TUNSETIFF),
|
|
|
|
uintptr(unsafe.Pointer(&ifr[0])),
|
|
|
|
)
|
2017-06-04 19:48:15 +00:00
|
|
|
if errno != 0 {
|
2017-08-16 22:25:39 +00:00
|
|
|
return nil, errno
|
2017-06-04 19:48:15 +00:00
|
|
|
}
|
2019-03-07 00:51:41 +00:00
|
|
|
err = unix.SetNonblock(nfd, true)
|
|
|
|
|
|
|
|
// Note that the above -- open,ioctl,nonblock -- must happen prior to handing it to netpoll as below this line.
|
|
|
|
|
|
|
|
fd := os.NewFile(uintptr(nfd), cloneDevicePath)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2017-06-04 19:48:15 +00:00
|
|
|
|
2019-02-27 03:10:01 +00:00
|
|
|
return CreateTUNFromFile(fd, mtu)
|
2018-05-05 01:36:09 +00:00
|
|
|
}
|
2017-07-11 20:48:58 +00:00
|
|
|
|
2019-06-10 21:33:40 +00:00
|
|
|
func CreateTUNFromFile(file *os.File, mtu int) (Device, error) {
|
2019-02-28 23:05:57 +00:00
|
|
|
tun := &NativeTun{
|
2018-10-17 19:26:53 +00:00
|
|
|
tunFile: file,
|
2019-06-10 21:33:40 +00:00
|
|
|
events: make(chan Event, 5),
|
2018-05-14 01:43:56 +00:00
|
|
|
errors: make(chan error, 5),
|
2018-05-14 02:19:25 +00:00
|
|
|
statusListenersShutdown: make(chan struct{}),
|
2018-10-17 19:26:53 +00:00
|
|
|
nopi: false,
|
2017-07-15 14:27:59 +00:00
|
|
|
}
|
2018-05-05 01:36:09 +00:00
|
|
|
var err error
|
|
|
|
|
2018-05-14 10:27:29 +00:00
|
|
|
_, err = tun.Name()
|
2018-05-05 01:36:09 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2017-07-15 14:27:59 +00:00
|
|
|
|
2017-08-17 10:58:18 +00:00
|
|
|
// start event listener
|
2017-08-16 22:25:39 +00:00
|
|
|
|
2018-05-14 10:27:29 +00:00
|
|
|
tun.index, err = getIFIndex(tun.name)
|
2017-08-16 22:25:39 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2018-05-14 10:27:29 +00:00
|
|
|
tun.netlinkSock, err = createNetlinkSocket()
|
2018-05-14 00:14:33 +00:00
|
|
|
if err != nil {
|
2018-05-14 12:08:03 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
tun.netlinkCancel, err = rwcancel.NewRWCancel(tun.netlinkSock)
|
|
|
|
if err != nil {
|
2019-02-27 01:20:17 +00:00
|
|
|
unix.Close(tun.netlinkSock)
|
2018-05-14 00:14:33 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2018-05-21 01:31:44 +00:00
|
|
|
tun.hackListenerClosed.Lock()
|
2018-05-23 00:10:54 +00:00
|
|
|
go tun.routineNetlinkListener()
|
|
|
|
go tun.routineHackListener() // cross namespace
|
2018-05-14 10:27:29 +00:00
|
|
|
|
2018-05-23 00:10:54 +00:00
|
|
|
err = tun.setMTU(mtu)
|
2018-05-14 00:14:33 +00:00
|
|
|
if err != nil {
|
2019-02-27 01:20:17 +00:00
|
|
|
unix.Close(tun.netlinkSock)
|
2018-05-14 00:14:33 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2018-05-14 10:27:29 +00:00
|
|
|
return tun, nil
|
2017-06-04 19:48:15 +00:00
|
|
|
}
|
2019-03-03 04:20:13 +00:00
|
|
|
|
2019-06-10 21:33:40 +00:00
|
|
|
func CreateUnmonitoredTUNFromFD(fd int) (Device, string, error) {
|
2019-03-07 00:51:41 +00:00
|
|
|
err := unix.SetNonblock(fd, true)
|
|
|
|
if err != nil {
|
|
|
|
return nil, "", err
|
|
|
|
}
|
|
|
|
file := os.NewFile(uintptr(fd), "/dev/tun")
|
2019-03-03 04:20:13 +00:00
|
|
|
tun := &NativeTun{
|
|
|
|
tunFile: file,
|
2019-06-10 21:33:40 +00:00
|
|
|
events: make(chan Event, 5),
|
2019-03-03 04:20:13 +00:00
|
|
|
errors: make(chan error, 5),
|
|
|
|
nopi: true,
|
|
|
|
}
|
|
|
|
name, err := tun.Name()
|
|
|
|
if err != nil {
|
|
|
|
return nil, "", err
|
|
|
|
}
|
|
|
|
return tun, name, nil
|
|
|
|
}
|