Skip to content

Commit 0893a4c

Browse files
committed
Change maxdgram sysctl variable to host interface mtu
1 parent 57ffeee commit 0893a4c

File tree

5 files changed

+116
-70
lines changed

5 files changed

+116
-70
lines changed

test/Cargo.lock

+2
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

test/test-manager/src/tests/tunnel_state.rs

+12-33
Original file line numberDiff line numberDiff line change
@@ -29,42 +29,21 @@ use test_macro::test_function;
2929
use test_rpc::ServiceClient;
3030

3131
#[cfg(target_os = "macos")]
32-
async fn setup_packetfilter_drop_pings_rule(
32+
async fn set_bridge_interface_mtu(
3333
max_packet_size: u16,
3434
) -> anyhow::Result<scopeguard::ScopeGuard<(), impl FnOnce(())>> {
35-
use anyhow::{bail, Context};
36-
37-
// Enable forwarding
38-
let mut cmd = tokio::process::Command::new("/usr/bin/sudo");
39-
cmd.args(["/usr/sbin/sysctl", "-n", "net.inet.raw.maxdgram"]);
40-
let output = cmd.output().await.context("Run sysctl")?;
41-
if !output.status.success() {
42-
bail!("sysctl failed: {}", output.status.code().unwrap());
43-
}
44-
let output = String::from_utf8(output.stdout).unwrap();
45-
let previous_maxdgram: u16 = output.trim().parse().unwrap();
46-
log::warn!("{}", &previous_maxdgram); // TODO(seb) DELETE ME
47-
48-
let mut cmd = tokio::process::Command::new("/usr/bin/sudo");
49-
cmd.args([
50-
"/usr/sbin/sysctl",
51-
&format!("net.inet.raw.maxdgram={max_packet_size}"),
52-
]);
53-
let output = cmd.output().await.context("Run sysctl")?;
54-
if !output.status.success() {
55-
bail!("sysctl failed: {}", output.status.code().unwrap());
56-
}
35+
use anyhow::Context;
36+
use test_rpc::net::unix;
37+
let bridge_iface = crate::vm::network::macos::find_vm_bridge()
38+
.context("Failed to get bridge interface name")?;
39+
40+
let previous_mtu = unix::get_mtu(bridge_iface)
41+
.with_context(|| format!("Failed to get MTU for bridge interface '{bridge_iface}'"))?;
42+
unix::set_mtu(bridge_iface, max_packet_size)
43+
.with_context(|| format!("Failed to set MTU for bridge interface '{bridge_iface}'"))?;
5744

5845
Ok(scopeguard::guard((), move |()| {
59-
let mut cmd = std::process::Command::new("/usr/bin/sudo");
60-
cmd.args([
61-
"/usr/sbin/sysctl",
62-
&format!("net.inet.raw.maxdgram={previous_maxdgram}"),
63-
]);
64-
let output = cmd.output().expect("Run sysctl");
65-
if !output.status.success() {
66-
panic!("sysctl failed: {}", output.status.code().unwrap());
67-
}
46+
unix::set_mtu(bridge_iface, previous_mtu).expect("Failed to set MTU on bridge interface");
6847
}))
6948
}
7049

@@ -132,7 +111,7 @@ async fn test_mtu_detection(
132111
#[cfg(target_os = "linux")]
133112
let _nft_guard = setup_nftables_drop_pings_rule(MAX_PACKET_SIZE).await;
134113
#[cfg(target_os = "macos")]
135-
let _pf_guard = setup_packetfilter_drop_pings_rule(MAX_PACKET_SIZE).await?;
114+
let _mtu_guard = set_bridge_interface_mtu(MAX_PACKET_SIZE).await?;
136115

137116
// Test that the firewall rule works
138117
log::info!("Sending large ping outside tunnel");

test/test-rpc/Cargo.toml

+3
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,9 @@ hyper-rustls = { version = "0.24", features = ["log", "webpki-roots"] }
2929
tokio-rustls = "0.24"
3030
rustls-pemfile = "0.2"
3131

32+
socket2 = { version = "0.5", features = ["all"] }
33+
libc = "0.2"
34+
3235
[dependencies.tokio-util]
3336
version = "0.7"
3437
features = ["codec"]

test/test-rpc/src/net.rs

+97
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ use hyper::{Client, Uri};
33
use once_cell::sync::Lazy;
44
use serde::{de::DeserializeOwned, Deserialize, Serialize};
55
use std::net::SocketAddr;
6+
67
use tokio_rustls::rustls::ClientConfig;
78

89
use crate::{AmIMullvad, Error};
@@ -118,3 +119,99 @@ fn read_cert_store() -> tokio_rustls::rustls::RootCertStore {
118119

119120
cert_store
120121
}
122+
123+
#[cfg(unix)]
124+
pub mod unix {
125+
use std::{io, os::fd::AsRawFd};
126+
// TODO: These functions are copied/derived from `talpid_wireguard::unix`, since we don't want
127+
// to depend on the entire `talpid_wireguard` crate. Perhaps they should be moved to a new
128+
// crate, e.g. `talpid_unix`?
129+
130+
#[cfg(target_os = "macos")]
131+
const SIOCGIFMTU: u64 = 0xc0206933;
132+
#[cfg(target_os = "linux")]
133+
const SIOCGIFMTU: u64 = libc::SIOCGIFMTU;
134+
135+
// #[cfg(target_os = "macos")]
136+
pub fn get_mtu(interface_name: &str) -> Result<u16, io::Error> {
137+
let sock = socket2::Socket::new(
138+
socket2::Domain::IPV4,
139+
socket2::Type::STREAM,
140+
Some(socket2::Protocol::TCP),
141+
)?;
142+
143+
let mut ifr: libc::ifreq = unsafe { std::mem::zeroed() };
144+
if interface_name.len() >= ifr.ifr_name.len() {
145+
return Err(io::Error::new(
146+
io::ErrorKind::InvalidInput,
147+
"Interface name too long",
148+
));
149+
}
150+
151+
// SAFETY: interface_name is shorter than ifr.ifr_name
152+
unsafe {
153+
std::ptr::copy_nonoverlapping(
154+
interface_name.as_ptr() as *const libc::c_char,
155+
&mut ifr.ifr_name as *mut _,
156+
interface_name.len(),
157+
)
158+
};
159+
160+
// TODO: define SIOCGIFMTU for macos
161+
// SAFETY: SIOCGIFMTU expects an ifreq, and the socket is valid
162+
if unsafe { libc::ioctl(sock.as_raw_fd(), SIOCGIFMTU, &mut ifr) } < 0 {
163+
let e = io::Error::last_os_error();
164+
log::error!("SIOCGIFMTU failed: {}", e);
165+
return Err(e);
166+
}
167+
168+
// SAFETY: ifru_mtu is set since SIOGCIFMTU succeeded
169+
Ok(unsafe { ifr.ifr_ifru.ifru_mtu }
170+
.try_into()
171+
.expect("MTU should fit in u16"))
172+
}
173+
174+
#[cfg(target_os = "macos")]
175+
const SIOCSIFMTU: u64 = 0x80206934;
176+
#[cfg(target_os = "linux")]
177+
const SIOCSIFMTU: u64 = libc::SIOCSIFMTU;
178+
179+
pub fn set_mtu(interface_name: &str, mtu: u16) -> Result<(), io::Error> {
180+
debug_assert_ne!(
181+
interface_name, "eth0",
182+
"Should be name of mullvad tunnel interface, e.g. 'wg0-mullvad'"
183+
);
184+
185+
let sock = socket2::Socket::new(
186+
socket2::Domain::IPV4,
187+
socket2::Type::STREAM,
188+
Some(socket2::Protocol::TCP),
189+
)?;
190+
191+
let mut ifr: libc::ifreq = unsafe { std::mem::zeroed() };
192+
if interface_name.len() >= ifr.ifr_name.len() {
193+
return Err(io::Error::new(
194+
io::ErrorKind::InvalidInput,
195+
"Interface name too long",
196+
));
197+
}
198+
199+
// SAFETY: interface_name is shorter than ifr.ifr_name
200+
unsafe {
201+
std::ptr::copy_nonoverlapping(
202+
interface_name.as_ptr() as *const libc::c_char,
203+
&mut ifr.ifr_name as *mut _,
204+
interface_name.len(),
205+
)
206+
};
207+
ifr.ifr_ifru.ifru_mtu = mtu as i32;
208+
209+
// SAFETY: SIOCGIFMTU expects an ifreq, and the socket is valid
210+
if unsafe { libc::ioctl(sock.as_raw_fd(), SIOCSIFMTU, &ifr) } < 0 {
211+
let e = io::Error::last_os_error();
212+
log::error!("SIOCSIFMTU failed: {}", e);
213+
return Err(e);
214+
}
215+
Ok(())
216+
}
217+
}

test/test-runner/src/net.rs

+2-37
Original file line numberDiff line numberDiff line change
@@ -247,44 +247,9 @@ pub fn get_interface_mtu(_interface_name: &str) -> Result<u16, test_rpc::Error>
247247
todo!("Implement setting MTU on macOS")
248248
}
249249

250-
#[cfg(target_os = "linux")]
250+
// #[cfg(target_os = "macos")]
251251
pub fn get_interface_mtu(interface_name: &str) -> Result<u16, test_rpc::Error> {
252-
use std::os::fd::AsRawFd;
253-
254-
let sock = socket2::Socket::new(
255-
socket2::Domain::IPV4,
256-
socket2::Type::STREAM,
257-
Some(socket2::Protocol::TCP),
258-
)
259-
.map_err(|e| test_rpc::Error::Io(e.to_string()))?;
260-
261-
let mut ifr: libc::ifreq = unsafe { std::mem::zeroed() };
262-
if interface_name.len() >= ifr.ifr_name.len() {
263-
panic!("Interface '{interface_name}' name too long")
264-
}
265-
266-
// SAFETY: interface_name is shorter than ifr.ifr_name
267-
unsafe {
268-
std::ptr::copy_nonoverlapping(
269-
interface_name.as_ptr() as *const libc::c_char,
270-
&mut ifr.ifr_name as *mut _,
271-
interface_name.len(),
272-
)
273-
};
274-
275-
// TODO: define SIOCGIFMTU for macos
276-
// SAFETY: SIOCGIFMTU expects an ifreq, and the socket is valid
277-
if unsafe { libc::ioctl(sock.as_raw_fd(), libc::SIOCGIFMTU, &mut ifr) } < 0 {
278-
let e = std::io::Error::last_os_error();
279-
280-
log::error!("{}", e);
281-
return Err(test_rpc::Error::Io(e.to_string()));
282-
}
283-
284-
// SAFETY: ifru_mtu is set since SIOGCIFMTU succeeded
285-
Ok(unsafe { ifr.ifr_ifru.ifru_mtu }
286-
.try_into()
287-
.expect("MTU should fit in u16"))
252+
test_rpc::net::unix::get_mtu(interface_name).map_err(|e| test_rpc::Error::Io(e.to_string()))
288253
}
289254

290255
#[cfg(target_os = "windows")]

0 commit comments

Comments
 (0)