tun_linux.go 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724
  1. //go:build !android && !e2e_testing
  2. // +build !android,!e2e_testing
  3. package overlay
  4. import (
  5. "fmt"
  6. "io"
  7. "net"
  8. "net/netip"
  9. "os"
  10. "strings"
  11. "sync"
  12. "sync/atomic"
  13. "time"
  14. "unsafe"
  15. "github.com/gaissmai/bart"
  16. "github.com/sirupsen/logrus"
  17. "github.com/slackhq/nebula/config"
  18. "github.com/slackhq/nebula/routing"
  19. "github.com/slackhq/nebula/util"
  20. "github.com/vishvananda/netlink"
  21. "golang.org/x/sys/unix"
  22. )
  23. type tun struct {
  24. io.ReadWriteCloser
  25. fd int
  26. Device string
  27. vpnNetworks []netip.Prefix
  28. MaxMTU int
  29. DefaultMTU int
  30. TXQueueLen int
  31. deviceIndex int
  32. ioctlFd uintptr
  33. Routes atomic.Pointer[[]Route]
  34. routeTree atomic.Pointer[bart.Table[routing.Gateways]]
  35. routeChan chan struct{}
  36. useSystemRoutes bool
  37. useSystemRoutesBufferSize int
  38. // These are routes learned from `tun.use_system_route_table`
  39. // stored here to make it easier to restore them after a reload
  40. routesFromSystem map[netip.Prefix]routing.Gateways
  41. routesFromSystemLock sync.Mutex
  42. l *logrus.Logger
  43. }
  44. func (t *tun) Networks() []netip.Prefix {
  45. return t.vpnNetworks
  46. }
  47. type ifReq struct {
  48. Name [16]byte
  49. Flags uint16
  50. pad [8]byte
  51. }
  52. type ifreqMTU struct {
  53. Name [16]byte
  54. MTU int32
  55. pad [8]byte
  56. }
  57. type ifreqQLEN struct {
  58. Name [16]byte
  59. Value int32
  60. pad [8]byte
  61. }
  62. func newTunFromFd(c *config.C, l *logrus.Logger, deviceFd int, vpnNetworks []netip.Prefix) (*tun, error) {
  63. file := os.NewFile(uintptr(deviceFd), "/dev/net/tun")
  64. t, err := newTunGeneric(c, l, file, vpnNetworks)
  65. if err != nil {
  66. return nil, err
  67. }
  68. t.Device = "tun0"
  69. return t, nil
  70. }
  71. func newTun(c *config.C, l *logrus.Logger, vpnNetworks []netip.Prefix, multiqueue bool) (*tun, error) {
  72. fd, err := unix.Open("/dev/net/tun", os.O_RDWR, 0)
  73. if err != nil {
  74. // If /dev/net/tun doesn't exist, try to create it (will happen in docker)
  75. if os.IsNotExist(err) {
  76. err = os.MkdirAll("/dev/net", 0755)
  77. if err != nil {
  78. return nil, fmt.Errorf("/dev/net/tun doesn't exist, failed to mkdir -p /dev/net: %w", err)
  79. }
  80. err = unix.Mknod("/dev/net/tun", unix.S_IFCHR|0600, int(unix.Mkdev(10, 200)))
  81. if err != nil {
  82. return nil, fmt.Errorf("failed to create /dev/net/tun: %w", err)
  83. }
  84. fd, err = unix.Open("/dev/net/tun", os.O_RDWR, 0)
  85. if err != nil {
  86. return nil, fmt.Errorf("created /dev/net/tun, but still failed: %w", err)
  87. }
  88. } else {
  89. return nil, err
  90. }
  91. }
  92. var req ifReq
  93. req.Flags = uint16(unix.IFF_TUN | unix.IFF_NO_PI)
  94. if multiqueue {
  95. req.Flags |= unix.IFF_MULTI_QUEUE
  96. }
  97. nameStr := c.GetString("tun.dev", "")
  98. copy(req.Name[:], nameStr)
  99. if err = ioctl(uintptr(fd), uintptr(unix.TUNSETIFF), uintptr(unsafe.Pointer(&req))); err != nil {
  100. return nil, &NameError{
  101. Name: nameStr,
  102. Underlying: err,
  103. }
  104. }
  105. name := strings.Trim(string(req.Name[:]), "\x00")
  106. file := os.NewFile(uintptr(fd), "/dev/net/tun")
  107. t, err := newTunGeneric(c, l, file, vpnNetworks)
  108. if err != nil {
  109. return nil, err
  110. }
  111. t.Device = name
  112. return t, nil
  113. }
  114. func newTunGeneric(c *config.C, l *logrus.Logger, file *os.File, vpnNetworks []netip.Prefix) (*tun, error) {
  115. t := &tun{
  116. ReadWriteCloser: file,
  117. fd: int(file.Fd()),
  118. vpnNetworks: vpnNetworks,
  119. TXQueueLen: c.GetInt("tun.tx_queue", 500),
  120. useSystemRoutes: c.GetBool("tun.use_system_route_table", false),
  121. useSystemRoutesBufferSize: c.GetInt("tun.use_system_route_table_buffer_size", 0),
  122. routesFromSystem: map[netip.Prefix]routing.Gateways{},
  123. l: l,
  124. }
  125. err := t.reload(c, true)
  126. if err != nil {
  127. return nil, err
  128. }
  129. c.RegisterReloadCallback(func(c *config.C) {
  130. err := t.reload(c, false)
  131. if err != nil {
  132. util.LogWithContextIfNeeded("failed to reload tun device", err, t.l)
  133. }
  134. })
  135. return t, nil
  136. }
  137. func (t *tun) reload(c *config.C, initial bool) error {
  138. routeChange, routes, err := getAllRoutesFromConfig(c, t.vpnNetworks, initial)
  139. if err != nil {
  140. return err
  141. }
  142. if !initial && !routeChange && !c.HasChanged("tun.mtu") {
  143. return nil
  144. }
  145. routeTree, err := makeRouteTree(t.l, routes, true)
  146. if err != nil {
  147. return err
  148. }
  149. // Bring along any routes learned from the system route table on reload
  150. t.routesFromSystemLock.Lock()
  151. for dst, gw := range t.routesFromSystem {
  152. routeTree.Insert(dst, gw)
  153. }
  154. t.routesFromSystemLock.Unlock()
  155. oldDefaultMTU := t.DefaultMTU
  156. oldMaxMTU := t.MaxMTU
  157. newDefaultMTU := c.GetInt("tun.mtu", DefaultMTU)
  158. newMaxMTU := newDefaultMTU
  159. for i, r := range routes {
  160. if r.MTU == 0 {
  161. routes[i].MTU = newDefaultMTU
  162. }
  163. if r.MTU > t.MaxMTU {
  164. newMaxMTU = r.MTU
  165. }
  166. }
  167. t.MaxMTU = newMaxMTU
  168. t.DefaultMTU = newDefaultMTU
  169. // Teach nebula how to handle the routes before establishing them in the system table
  170. oldRoutes := t.Routes.Swap(&routes)
  171. t.routeTree.Store(routeTree)
  172. if !initial {
  173. if oldMaxMTU != newMaxMTU {
  174. t.setMTU()
  175. t.l.Infof("Set max MTU to %v was %v", t.MaxMTU, oldMaxMTU)
  176. }
  177. if oldDefaultMTU != newDefaultMTU {
  178. for i := range t.vpnNetworks {
  179. err := t.setDefaultRoute(t.vpnNetworks[i])
  180. if err != nil {
  181. t.l.Warn(err)
  182. } else {
  183. t.l.Infof("Set default MTU to %v was %v", t.DefaultMTU, oldDefaultMTU)
  184. }
  185. }
  186. }
  187. // Remove first, if the system removes a wanted route hopefully it will be re-added next
  188. t.removeRoutes(findRemovedRoutes(routes, *oldRoutes))
  189. // Ensure any routes we actually want are installed
  190. err = t.addRoutes(true)
  191. if err != nil {
  192. // This should never be called since addRoutes should log its own errors in a reload condition
  193. util.LogWithContextIfNeeded("Failed to refresh routes", err, t.l)
  194. }
  195. }
  196. return nil
  197. }
  198. func (t *tun) SupportsMultiqueue() bool {
  199. return true
  200. }
  201. func (t *tun) NewMultiQueueReader() (io.ReadWriteCloser, error) {
  202. fd, err := unix.Open("/dev/net/tun", os.O_RDWR, 0)
  203. if err != nil {
  204. return nil, err
  205. }
  206. var req ifReq
  207. req.Flags = uint16(unix.IFF_TUN | unix.IFF_NO_PI | unix.IFF_MULTI_QUEUE)
  208. copy(req.Name[:], t.Device)
  209. if err = ioctl(uintptr(fd), uintptr(unix.TUNSETIFF), uintptr(unsafe.Pointer(&req))); err != nil {
  210. return nil, err
  211. }
  212. file := os.NewFile(uintptr(fd), "/dev/net/tun")
  213. return file, nil
  214. }
  215. func (t *tun) RoutesFor(ip netip.Addr) routing.Gateways {
  216. r, _ := t.routeTree.Load().Lookup(ip)
  217. return r
  218. }
  219. func (t *tun) Write(b []byte) (int, error) {
  220. var nn int
  221. maximum := len(b)
  222. for {
  223. n, err := unix.Write(t.fd, b[nn:maximum])
  224. if n > 0 {
  225. nn += n
  226. }
  227. if nn == len(b) {
  228. return nn, err
  229. }
  230. if err != nil {
  231. return nn, err
  232. }
  233. if n == 0 {
  234. return nn, io.ErrUnexpectedEOF
  235. }
  236. }
  237. }
  238. func (t *tun) deviceBytes() (o [16]byte) {
  239. for i, c := range t.Device {
  240. o[i] = byte(c)
  241. }
  242. return
  243. }
  244. func hasNetlinkAddr(al []*netlink.Addr, x netlink.Addr) bool {
  245. for i := range al {
  246. if al[i].Equal(x) {
  247. return true
  248. }
  249. }
  250. return false
  251. }
  252. // addIPs uses netlink to add all addresses that don't exist, then it removes ones that should not be there
  253. func (t *tun) addIPs(link netlink.Link) error {
  254. newAddrs := make([]*netlink.Addr, len(t.vpnNetworks))
  255. for i := range t.vpnNetworks {
  256. newAddrs[i] = &netlink.Addr{
  257. IPNet: &net.IPNet{
  258. IP: t.vpnNetworks[i].Addr().AsSlice(),
  259. Mask: net.CIDRMask(t.vpnNetworks[i].Bits(), t.vpnNetworks[i].Addr().BitLen()),
  260. },
  261. Label: t.vpnNetworks[i].Addr().Zone(),
  262. }
  263. }
  264. //add all new addresses
  265. for i := range newAddrs {
  266. //AddrReplace still adds new IPs, but if their properties change it will change them as well
  267. if err := netlink.AddrReplace(link, newAddrs[i]); err != nil {
  268. return err
  269. }
  270. }
  271. //iterate over remainder, remove whoever shouldn't be there
  272. al, err := netlink.AddrList(link, netlink.FAMILY_ALL)
  273. if err != nil {
  274. return fmt.Errorf("failed to get tun address list: %s", err)
  275. }
  276. for i := range al {
  277. if hasNetlinkAddr(newAddrs, al[i]) {
  278. continue
  279. }
  280. err = netlink.AddrDel(link, &al[i])
  281. if err != nil {
  282. t.l.WithError(err).Error("failed to remove address from tun address list")
  283. } else {
  284. t.l.WithField("removed", al[i].String()).Info("removed address not listed in cert(s)")
  285. }
  286. }
  287. return nil
  288. }
  289. func (t *tun) Activate() error {
  290. devName := t.deviceBytes()
  291. if t.useSystemRoutes {
  292. t.watchRoutes()
  293. }
  294. s, err := unix.Socket(
  295. unix.AF_INET, //because everything we use t.ioctlFd for is address family independent, this is fine
  296. unix.SOCK_DGRAM,
  297. unix.IPPROTO_IP,
  298. )
  299. if err != nil {
  300. return err
  301. }
  302. t.ioctlFd = uintptr(s)
  303. // Set the device name
  304. ifrf := ifReq{Name: devName}
  305. if err = ioctl(t.ioctlFd, unix.SIOCGIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  306. return fmt.Errorf("failed to set tun device name: %s", err)
  307. }
  308. link, err := netlink.LinkByName(t.Device)
  309. if err != nil {
  310. return fmt.Errorf("failed to get tun device link: %s", err)
  311. }
  312. t.deviceIndex = link.Attrs().Index
  313. // Setup our default MTU
  314. t.setMTU()
  315. // Set the transmit queue length
  316. ifrq := ifreqQLEN{Name: devName, Value: int32(t.TXQueueLen)}
  317. if err = ioctl(t.ioctlFd, unix.SIOCSIFTXQLEN, uintptr(unsafe.Pointer(&ifrq))); err != nil {
  318. // If we can't set the queue length nebula will still work but it may lead to packet loss
  319. t.l.WithError(err).Error("Failed to set tun tx queue length")
  320. }
  321. const modeNone = 1
  322. if err = netlink.LinkSetIP6AddrGenMode(link, modeNone); err != nil {
  323. t.l.WithError(err).Warn("Failed to disable link local address generation")
  324. }
  325. if err = t.addIPs(link); err != nil {
  326. return err
  327. }
  328. // Bring up the interface
  329. ifrf.Flags = ifrf.Flags | unix.IFF_UP
  330. if err = ioctl(t.ioctlFd, unix.SIOCSIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  331. return fmt.Errorf("failed to bring the tun device up: %s", err)
  332. }
  333. //set route MTU
  334. for i := range t.vpnNetworks {
  335. if err = t.setDefaultRoute(t.vpnNetworks[i]); err != nil {
  336. return fmt.Errorf("failed to set default route MTU: %w", err)
  337. }
  338. }
  339. // Set the routes
  340. if err = t.addRoutes(false); err != nil {
  341. return err
  342. }
  343. // Run the interface
  344. ifrf.Flags = ifrf.Flags | unix.IFF_UP | unix.IFF_RUNNING
  345. if err = ioctl(t.ioctlFd, unix.SIOCSIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  346. return fmt.Errorf("failed to run tun device: %s", err)
  347. }
  348. return nil
  349. }
  350. func (t *tun) setMTU() {
  351. // Set the MTU on the device
  352. ifm := ifreqMTU{Name: t.deviceBytes(), MTU: int32(t.MaxMTU)}
  353. if err := ioctl(t.ioctlFd, unix.SIOCSIFMTU, uintptr(unsafe.Pointer(&ifm))); err != nil {
  354. // This is currently a non fatal condition because the route table must have the MTU set appropriately as well
  355. t.l.WithError(err).Error("Failed to set tun mtu")
  356. }
  357. }
  358. func (t *tun) setDefaultRoute(cidr netip.Prefix) error {
  359. dr := &net.IPNet{
  360. IP: cidr.Masked().Addr().AsSlice(),
  361. Mask: net.CIDRMask(cidr.Bits(), cidr.Addr().BitLen()),
  362. }
  363. nr := netlink.Route{
  364. LinkIndex: t.deviceIndex,
  365. Dst: dr,
  366. MTU: t.DefaultMTU,
  367. AdvMSS: t.advMSS(Route{}),
  368. Scope: unix.RT_SCOPE_LINK,
  369. Src: net.IP(cidr.Addr().AsSlice()),
  370. Protocol: unix.RTPROT_KERNEL,
  371. Table: unix.RT_TABLE_MAIN,
  372. Type: unix.RTN_UNICAST,
  373. }
  374. err := netlink.RouteReplace(&nr)
  375. if err != nil {
  376. t.l.WithError(err).WithField("cidr", cidr).Warn("Failed to set default route MTU, retrying")
  377. //retry twice more -- on some systems there appears to be a race condition where if we set routes too soon, netlink says `invalid argument`
  378. for i := 0; i < 2; i++ {
  379. time.Sleep(100 * time.Millisecond)
  380. err = netlink.RouteReplace(&nr)
  381. if err == nil {
  382. break
  383. } else {
  384. t.l.WithError(err).WithField("cidr", cidr).WithField("mtu", t.DefaultMTU).Warn("Failed to set default route MTU, retrying")
  385. }
  386. }
  387. if err != nil {
  388. return fmt.Errorf("failed to set mtu %v on the default route %v; %v", t.DefaultMTU, dr, err)
  389. }
  390. }
  391. return nil
  392. }
  393. func (t *tun) addRoutes(logErrors bool) error {
  394. // Path routes
  395. routes := *t.Routes.Load()
  396. for _, r := range routes {
  397. if !r.Install {
  398. continue
  399. }
  400. dr := &net.IPNet{
  401. IP: r.Cidr.Masked().Addr().AsSlice(),
  402. Mask: net.CIDRMask(r.Cidr.Bits(), r.Cidr.Addr().BitLen()),
  403. }
  404. nr := netlink.Route{
  405. LinkIndex: t.deviceIndex,
  406. Dst: dr,
  407. MTU: r.MTU,
  408. AdvMSS: t.advMSS(r),
  409. Scope: unix.RT_SCOPE_LINK,
  410. }
  411. if r.Metric > 0 {
  412. nr.Priority = r.Metric
  413. }
  414. err := netlink.RouteReplace(&nr)
  415. if err != nil {
  416. retErr := util.NewContextualError("Failed to add route", map[string]any{"route": r}, err)
  417. if logErrors {
  418. retErr.Log(t.l)
  419. } else {
  420. return retErr
  421. }
  422. } else {
  423. t.l.WithField("route", r).Info("Added route")
  424. }
  425. }
  426. return nil
  427. }
  428. func (t *tun) removeRoutes(routes []Route) {
  429. for _, r := range routes {
  430. if !r.Install {
  431. continue
  432. }
  433. dr := &net.IPNet{
  434. IP: r.Cidr.Masked().Addr().AsSlice(),
  435. Mask: net.CIDRMask(r.Cidr.Bits(), r.Cidr.Addr().BitLen()),
  436. }
  437. nr := netlink.Route{
  438. LinkIndex: t.deviceIndex,
  439. Dst: dr,
  440. MTU: r.MTU,
  441. AdvMSS: t.advMSS(r),
  442. Scope: unix.RT_SCOPE_LINK,
  443. }
  444. if r.Metric > 0 {
  445. nr.Priority = r.Metric
  446. }
  447. err := netlink.RouteDel(&nr)
  448. if err != nil {
  449. t.l.WithError(err).WithField("route", r).Error("Failed to remove route")
  450. } else {
  451. t.l.WithField("route", r).Info("Removed route")
  452. }
  453. }
  454. }
  455. func (t *tun) Name() string {
  456. return t.Device
  457. }
  458. func (t *tun) advMSS(r Route) int {
  459. mtu := r.MTU
  460. if r.MTU == 0 {
  461. mtu = t.DefaultMTU
  462. }
  463. // We only need to set advmss if the route MTU does not match the device MTU
  464. if mtu != t.MaxMTU {
  465. return mtu - 40
  466. }
  467. return 0
  468. }
  469. func (t *tun) watchRoutes() {
  470. rch := make(chan netlink.RouteUpdate)
  471. doneChan := make(chan struct{})
  472. netlinkOptions := netlink.RouteSubscribeOptions{
  473. ReceiveBufferSize: t.useSystemRoutesBufferSize,
  474. ReceiveBufferForceSize: t.useSystemRoutesBufferSize != 0,
  475. ErrorCallback: func(e error) { t.l.WithError(e).Errorf("netlink error") },
  476. }
  477. if err := netlink.RouteSubscribeWithOptions(rch, doneChan, netlinkOptions); err != nil {
  478. t.l.WithError(err).Errorf("failed to subscribe to system route changes")
  479. return
  480. }
  481. t.routeChan = doneChan
  482. go func() {
  483. for {
  484. select {
  485. case r, ok := <-rch:
  486. if ok {
  487. t.updateRoutes(r)
  488. } else {
  489. // may be should do something here as
  490. // netlink stops sending updates
  491. return
  492. }
  493. case <-doneChan:
  494. // netlink.RouteSubscriber will close the rch for us
  495. return
  496. }
  497. }
  498. }()
  499. }
  500. func (t *tun) isGatewayInVpnNetworks(gwAddr netip.Addr) bool {
  501. withinNetworks := false
  502. for i := range t.vpnNetworks {
  503. if t.vpnNetworks[i].Contains(gwAddr) {
  504. withinNetworks = true
  505. break
  506. }
  507. }
  508. return withinNetworks
  509. }
  510. func (t *tun) getGatewaysFromRoute(r *netlink.Route) routing.Gateways {
  511. var gateways routing.Gateways
  512. link, err := netlink.LinkByName(t.Device)
  513. if err != nil {
  514. t.l.WithField("deviceName", t.Device).Error("Ignoring route update: failed to get link by name")
  515. return gateways
  516. }
  517. // If this route is relevant to our interface and there is a gateway then add it
  518. if r.LinkIndex == link.Attrs().Index {
  519. gwAddr, ok := getGatewayAddr(r.Gw, r.Via)
  520. if ok {
  521. if t.isGatewayInVpnNetworks(gwAddr) {
  522. gateways = append(gateways, routing.NewGateway(gwAddr, 1))
  523. } else {
  524. // Gateway isn't in our overlay network, ignore
  525. t.l.WithField("route", r).Debug("Ignoring route update, gateway is not in our network")
  526. }
  527. } else {
  528. t.l.WithField("route", r).Debug("Ignoring route update, invalid gateway or via address")
  529. }
  530. }
  531. for _, p := range r.MultiPath {
  532. // If this route is relevant to our interface and there is a gateway then add it
  533. if p.LinkIndex == link.Attrs().Index {
  534. gwAddr, ok := getGatewayAddr(p.Gw, p.Via)
  535. if ok {
  536. if t.isGatewayInVpnNetworks(gwAddr) {
  537. gateways = append(gateways, routing.NewGateway(gwAddr, p.Hops+1))
  538. } else {
  539. // Gateway isn't in our overlay network, ignore
  540. t.l.WithField("route", r).Debug("Ignoring route update, gateway is not in our network")
  541. }
  542. } else {
  543. t.l.WithField("route", r).Debug("Ignoring route update, invalid gateway or via address")
  544. }
  545. }
  546. }
  547. routing.CalculateBucketsForGateways(gateways)
  548. return gateways
  549. }
  550. func getGatewayAddr(gw net.IP, via netlink.Destination) (netip.Addr, bool) {
  551. // Try to use the old RTA_GATEWAY first
  552. gwAddr, ok := netip.AddrFromSlice(gw)
  553. if !ok {
  554. // Fallback to the new RTA_VIA
  555. rVia, ok := via.(*netlink.Via)
  556. if ok {
  557. gwAddr, ok = netip.AddrFromSlice(rVia.Addr)
  558. }
  559. }
  560. if gwAddr.IsValid() {
  561. gwAddr = gwAddr.Unmap()
  562. return gwAddr, true
  563. }
  564. return netip.Addr{}, false
  565. }
  566. func (t *tun) updateRoutes(r netlink.RouteUpdate) {
  567. gateways := t.getGatewaysFromRoute(&r.Route)
  568. if len(gateways) == 0 {
  569. // No gateways relevant to our network, no routing changes required.
  570. t.l.WithField("route", r).Debug("Ignoring route update, no gateways")
  571. return
  572. }
  573. if r.Dst == nil {
  574. t.l.WithField("route", r).Debug("Ignoring route update, no destination address")
  575. return
  576. }
  577. dstAddr, ok := netip.AddrFromSlice(r.Dst.IP)
  578. if !ok {
  579. t.l.WithField("route", r).Debug("Ignoring route update, invalid destination address")
  580. return
  581. }
  582. ones, _ := r.Dst.Mask.Size()
  583. dst := netip.PrefixFrom(dstAddr, ones)
  584. newTree := t.routeTree.Load().Clone()
  585. t.routesFromSystemLock.Lock()
  586. if r.Type == unix.RTM_NEWROUTE {
  587. t.l.WithField("destination", dst).WithField("via", gateways).Info("Adding route")
  588. t.routesFromSystem[dst] = gateways
  589. newTree.Insert(dst, gateways)
  590. } else {
  591. t.l.WithField("destination", dst).WithField("via", gateways).Info("Removing route")
  592. delete(t.routesFromSystem, dst)
  593. newTree.Delete(dst)
  594. }
  595. t.routesFromSystemLock.Unlock()
  596. t.routeTree.Store(newTree)
  597. }
  598. func (t *tun) Close() error {
  599. if t.routeChan != nil {
  600. close(t.routeChan)
  601. }
  602. if t.ReadWriteCloser != nil {
  603. _ = t.ReadWriteCloser.Close()
  604. }
  605. if t.ioctlFd > 0 {
  606. _ = os.NewFile(t.ioctlFd, "ioctlFd").Close()
  607. t.ioctlFd = 0
  608. }
  609. return nil
  610. }