| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182 |
- // Copyright (c) Tailscale Inc & AUTHORS
- // SPDX-License-Identifier: BSD-3-Clause
- // Package neterror classifies network errors.
- package neterror
- import (
- "errors"
- "fmt"
- "runtime"
- "syscall"
- )
- var errEPERM error = syscall.EPERM // box it into interface just once
- // TreatAsLostUDP reports whether err is an error from a UDP send
- // operation that should be treated as a UDP packet that just got
- // lost.
- //
- // Notably, on Linux this reports true for EPERM errors (from outbound
- // firewall blocks) which aren't really send errors; they're just
- // sends that are never going to make it because the local OS blocked
- // it.
- func TreatAsLostUDP(err error) bool {
- if err == nil {
- return false
- }
- switch runtime.GOOS {
- case "linux":
- // Linux, while not documented in the man page,
- // returns EPERM when there's an OUTPUT rule with -j
- // DROP or -j REJECT. We use this very specific
- // Linux+EPERM check rather than something super broad
- // like net.Error.Temporary which could be anything.
- //
- // For now we only do this on Linux, as such outgoing
- // firewall violations mapping to syscall errors
- // hasn't yet been observed on other OSes.
- return errors.Is(err, errEPERM)
- }
- return false
- }
- var packetWasTruncated func(error) bool // non-nil on Windows at least
- // PacketWasTruncated reports whether err indicates truncation but the RecvFrom
- // that generated err was otherwise successful. On Windows, Go's UDP RecvFrom
- // calls WSARecvFrom which returns the WSAEMSGSIZE error code when the received
- // datagram is larger than the provided buffer. When that happens, both a valid
- // size and an error are returned (as per the partial fix for golang/go#14074).
- // If the WSAEMSGSIZE error is returned, then we ignore the error to get
- // semantics similar to the POSIX operating systems. One caveat is that it
- // appears that the source address is not returned when WSAEMSGSIZE occurs, but
- // we do not currently look at the source address.
- func PacketWasTruncated(err error) bool {
- if packetWasTruncated == nil {
- return false
- }
- return packetWasTruncated(err)
- }
- var shouldDisableUDPGSO func(error) bool // non-nil on Linux
- func ShouldDisableUDPGSO(err error) bool {
- if shouldDisableUDPGSO == nil {
- return false
- }
- return shouldDisableUDPGSO(err)
- }
- type ErrUDPGSODisabled struct {
- OnLaddr string
- RetryErr error
- }
- func (e ErrUDPGSODisabled) Error() string {
- return fmt.Sprintf("disabled UDP GSO on %s, NIC(s) may not support checksum offload", e.OnLaddr)
- }
- func (e ErrUDPGSODisabled) Unwrap() error {
- return e.RetryErr
- }
|