tun_linux.go 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730
  1. //go:build !android && !e2e_testing
  2. // +build !android,!e2e_testing
  3. package overlay
  4. import (
  5. "fmt"
  6. "io"
  7. "net"
  8. "net/netip"
  9. "os"
  10. "runtime"
  11. "strings"
  12. "sync/atomic"
  13. "time"
  14. "unsafe"
  15. "github.com/gaissmai/bart"
  16. "github.com/sirupsen/logrus"
  17. "github.com/slackhq/nebula/config"
  18. "github.com/slackhq/nebula/routing"
  19. "github.com/slackhq/nebula/util"
  20. wgtun "github.com/slackhq/nebula/wgstack/tun"
  21. "github.com/vishvananda/netlink"
  22. "golang.org/x/sys/unix"
  23. )
  24. type tun struct {
  25. io.ReadWriteCloser
  26. fd int
  27. Device string
  28. vpnNetworks []netip.Prefix
  29. MaxMTU int
  30. DefaultMTU int
  31. TXQueueLen int
  32. deviceIndex int
  33. ioctlFd uintptr
  34. wgDevice wgtun.Device
  35. Routes atomic.Pointer[[]Route]
  36. routeTree atomic.Pointer[bart.Table[routing.Gateways]]
  37. routeChan chan struct{}
  38. useSystemRoutes bool
  39. useSystemRoutesBufferSize int
  40. l *logrus.Logger
  41. }
  42. func (t *tun) Networks() []netip.Prefix {
  43. return t.vpnNetworks
  44. }
  45. type ifReq struct {
  46. Name [16]byte
  47. Flags uint16
  48. pad [8]byte
  49. }
  50. type ifreqMTU struct {
  51. Name [16]byte
  52. MTU int32
  53. pad [8]byte
  54. }
  55. type ifreqQLEN struct {
  56. Name [16]byte
  57. Value int32
  58. pad [8]byte
  59. }
  60. func newTunFromFd(c *config.C, l *logrus.Logger, deviceFd int, vpnNetworks []netip.Prefix) (*tun, error) {
  61. file := os.NewFile(uintptr(deviceFd), "/dev/net/tun")
  62. useWGDefault := runtime.GOOS == "linux"
  63. useWG := c.GetBool("tun.use_wireguard_stack", c.GetBool("listen.use_wireguard_stack", useWGDefault))
  64. t, err := newTunGeneric(c, l, file, vpnNetworks, useWG)
  65. if err != nil {
  66. return nil, err
  67. }
  68. t.Device = "tun0"
  69. return t, nil
  70. }
  71. func newTun(c *config.C, l *logrus.Logger, vpnNetworks []netip.Prefix, multiqueue bool) (*tun, error) {
  72. fd, err := unix.Open("/dev/net/tun", os.O_RDWR, 0)
  73. if err != nil {
  74. // If /dev/net/tun doesn't exist, try to create it (will happen in docker)
  75. if os.IsNotExist(err) {
  76. err = os.MkdirAll("/dev/net", 0755)
  77. if err != nil {
  78. return nil, fmt.Errorf("/dev/net/tun doesn't exist, failed to mkdir -p /dev/net: %w", err)
  79. }
  80. err = unix.Mknod("/dev/net/tun", unix.S_IFCHR|0600, int(unix.Mkdev(10, 200)))
  81. if err != nil {
  82. return nil, fmt.Errorf("failed to create /dev/net/tun: %w", err)
  83. }
  84. fd, err = unix.Open("/dev/net/tun", os.O_RDWR, 0)
  85. if err != nil {
  86. return nil, fmt.Errorf("created /dev/net/tun, but still failed: %w", err)
  87. }
  88. } else {
  89. return nil, err
  90. }
  91. }
  92. var req ifReq
  93. req.Flags = uint16(unix.IFF_TUN | unix.IFF_NO_PI)
  94. if multiqueue {
  95. req.Flags |= unix.IFF_MULTI_QUEUE
  96. }
  97. copy(req.Name[:], c.GetString("tun.dev", ""))
  98. if err = ioctl(uintptr(fd), uintptr(unix.TUNSETIFF), uintptr(unsafe.Pointer(&req))); err != nil {
  99. return nil, err
  100. }
  101. name := strings.Trim(string(req.Name[:]), "\x00")
  102. file := os.NewFile(uintptr(fd), "/dev/net/tun")
  103. useWGDefault := runtime.GOOS == "linux"
  104. useWG := c.GetBool("tun.use_wireguard_stack", c.GetBool("listen.use_wireguard_stack", useWGDefault))
  105. t, err := newTunGeneric(c, l, file, vpnNetworks, useWG)
  106. if err != nil {
  107. return nil, err
  108. }
  109. t.Device = name
  110. return t, nil
  111. }
  112. func newTunGeneric(c *config.C, l *logrus.Logger, file *os.File, vpnNetworks []netip.Prefix, useWireguard bool) (*tun, error) {
  113. var (
  114. rw io.ReadWriteCloser = file
  115. fd = int(file.Fd())
  116. wgDev wgtun.Device
  117. )
  118. if useWireguard {
  119. dev, err := wgtun.CreateTUNFromFile(file, c.GetInt("tun.mtu", DefaultMTU))
  120. if err != nil {
  121. return nil, fmt.Errorf("failed to initialize wireguard tun device: %w", err)
  122. }
  123. wgDev = dev
  124. rw = newWireguardTunIO(dev, c.GetInt("tun.mtu", DefaultMTU))
  125. fd = int(dev.File().Fd())
  126. }
  127. t := &tun{
  128. ReadWriteCloser: rw,
  129. fd: fd,
  130. vpnNetworks: vpnNetworks,
  131. TXQueueLen: c.GetInt("tun.tx_queue", 500),
  132. useSystemRoutes: c.GetBool("tun.use_system_route_table", false),
  133. useSystemRoutesBufferSize: c.GetInt("tun.use_system_route_table_buffer_size", 0),
  134. l: l,
  135. }
  136. if wgDev != nil {
  137. t.wgDevice = wgDev
  138. }
  139. if wgDev != nil {
  140. // replace ioctl fd with device file descriptor to keep route management working
  141. file = wgDev.File()
  142. t.fd = int(file.Fd())
  143. t.ioctlFd = file.Fd()
  144. }
  145. if t.ioctlFd == 0 {
  146. t.ioctlFd = file.Fd()
  147. }
  148. err := t.reload(c, true)
  149. if err != nil {
  150. return nil, err
  151. }
  152. c.RegisterReloadCallback(func(c *config.C) {
  153. err := t.reload(c, false)
  154. if err != nil {
  155. util.LogWithContextIfNeeded("failed to reload tun device", err, t.l)
  156. }
  157. })
  158. return t, nil
  159. }
  160. func (t *tun) reload(c *config.C, initial bool) error {
  161. routeChange, routes, err := getAllRoutesFromConfig(c, t.vpnNetworks, initial)
  162. if err != nil {
  163. return err
  164. }
  165. if !initial && !routeChange && !c.HasChanged("tun.mtu") {
  166. return nil
  167. }
  168. routeTree, err := makeRouteTree(t.l, routes, true)
  169. if err != nil {
  170. return err
  171. }
  172. oldDefaultMTU := t.DefaultMTU
  173. oldMaxMTU := t.MaxMTU
  174. newDefaultMTU := c.GetInt("tun.mtu", DefaultMTU)
  175. newMaxMTU := newDefaultMTU
  176. for i, r := range routes {
  177. if r.MTU == 0 {
  178. routes[i].MTU = newDefaultMTU
  179. }
  180. if r.MTU > t.MaxMTU {
  181. newMaxMTU = r.MTU
  182. }
  183. }
  184. t.MaxMTU = newMaxMTU
  185. t.DefaultMTU = newDefaultMTU
  186. // Teach nebula how to handle the routes before establishing them in the system table
  187. oldRoutes := t.Routes.Swap(&routes)
  188. t.routeTree.Store(routeTree)
  189. if !initial {
  190. if oldMaxMTU != newMaxMTU {
  191. t.setMTU()
  192. t.l.Infof("Set max MTU to %v was %v", t.MaxMTU, oldMaxMTU)
  193. }
  194. if oldDefaultMTU != newDefaultMTU {
  195. for i := range t.vpnNetworks {
  196. err := t.setDefaultRoute(t.vpnNetworks[i])
  197. if err != nil {
  198. t.l.Warn(err)
  199. } else {
  200. t.l.Infof("Set default MTU to %v was %v", t.DefaultMTU, oldDefaultMTU)
  201. }
  202. }
  203. }
  204. // Remove first, if the system removes a wanted route hopefully it will be re-added next
  205. t.removeRoutes(findRemovedRoutes(routes, *oldRoutes))
  206. // Ensure any routes we actually want are installed
  207. err = t.addRoutes(true)
  208. if err != nil {
  209. // This should never be called since addRoutes should log its own errors in a reload condition
  210. util.LogWithContextIfNeeded("Failed to refresh routes", err, t.l)
  211. }
  212. }
  213. return nil
  214. }
  215. func (t *tun) NewMultiQueueReader() (io.ReadWriteCloser, error) {
  216. fd, err := unix.Open("/dev/net/tun", os.O_RDWR, 0)
  217. if err != nil {
  218. return nil, err
  219. }
  220. var req ifReq
  221. req.Flags = uint16(unix.IFF_TUN | unix.IFF_NO_PI | unix.IFF_MULTI_QUEUE)
  222. copy(req.Name[:], t.Device)
  223. if err = ioctl(uintptr(fd), uintptr(unix.TUNSETIFF), uintptr(unsafe.Pointer(&req))); err != nil {
  224. return nil, err
  225. }
  226. file := os.NewFile(uintptr(fd), "/dev/net/tun")
  227. return file, nil
  228. }
  229. func (t *tun) RoutesFor(ip netip.Addr) routing.Gateways {
  230. r, _ := t.routeTree.Load().Lookup(ip)
  231. return r
  232. }
  233. func (t *tun) Write(b []byte) (int, error) {
  234. var nn int
  235. maximum := len(b)
  236. for {
  237. n, err := unix.Write(t.fd, b[nn:maximum])
  238. if n > 0 {
  239. nn += n
  240. }
  241. if nn == len(b) {
  242. return nn, err
  243. }
  244. if err != nil {
  245. return nn, err
  246. }
  247. if n == 0 {
  248. return nn, io.ErrUnexpectedEOF
  249. }
  250. }
  251. }
  252. func (t *tun) deviceBytes() (o [16]byte) {
  253. for i, c := range t.Device {
  254. o[i] = byte(c)
  255. }
  256. return
  257. }
  258. func hasNetlinkAddr(al []*netlink.Addr, x netlink.Addr) bool {
  259. for i := range al {
  260. if al[i].Equal(x) {
  261. return true
  262. }
  263. }
  264. return false
  265. }
  266. // addIPs uses netlink to add all addresses that don't exist, then it removes ones that should not be there
  267. func (t *tun) addIPs(link netlink.Link) error {
  268. newAddrs := make([]*netlink.Addr, len(t.vpnNetworks))
  269. for i := range t.vpnNetworks {
  270. newAddrs[i] = &netlink.Addr{
  271. IPNet: &net.IPNet{
  272. IP: t.vpnNetworks[i].Addr().AsSlice(),
  273. Mask: net.CIDRMask(t.vpnNetworks[i].Bits(), t.vpnNetworks[i].Addr().BitLen()),
  274. },
  275. Label: t.vpnNetworks[i].Addr().Zone(),
  276. }
  277. }
  278. //add all new addresses
  279. for i := range newAddrs {
  280. //AddrReplace still adds new IPs, but if their properties change it will change them as well
  281. if err := netlink.AddrReplace(link, newAddrs[i]); err != nil {
  282. return err
  283. }
  284. }
  285. //iterate over remainder, remove whoever shouldn't be there
  286. al, err := netlink.AddrList(link, netlink.FAMILY_ALL)
  287. if err != nil {
  288. return fmt.Errorf("failed to get tun address list: %s", err)
  289. }
  290. for i := range al {
  291. if hasNetlinkAddr(newAddrs, al[i]) {
  292. continue
  293. }
  294. err = netlink.AddrDel(link, &al[i])
  295. if err != nil {
  296. t.l.WithError(err).Error("failed to remove address from tun address list")
  297. } else {
  298. t.l.WithField("removed", al[i].String()).Info("removed address not listed in cert(s)")
  299. }
  300. }
  301. return nil
  302. }
  303. func (t *tun) Activate() error {
  304. devName := t.deviceBytes()
  305. if t.useSystemRoutes {
  306. t.watchRoutes()
  307. }
  308. s, err := unix.Socket(
  309. unix.AF_INET, //because everything we use t.ioctlFd for is address family independent, this is fine
  310. unix.SOCK_DGRAM,
  311. unix.IPPROTO_IP,
  312. )
  313. if err != nil {
  314. return err
  315. }
  316. t.ioctlFd = uintptr(s)
  317. // Set the device name
  318. ifrf := ifReq{Name: devName}
  319. if err = ioctl(t.ioctlFd, unix.SIOCGIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  320. return fmt.Errorf("failed to set tun device name: %s", err)
  321. }
  322. link, err := netlink.LinkByName(t.Device)
  323. if err != nil {
  324. return fmt.Errorf("failed to get tun device link: %s", err)
  325. }
  326. t.deviceIndex = link.Attrs().Index
  327. // Setup our default MTU
  328. t.setMTU()
  329. // Set the transmit queue length
  330. ifrq := ifreqQLEN{Name: devName, Value: int32(t.TXQueueLen)}
  331. if err = ioctl(t.ioctlFd, unix.SIOCSIFTXQLEN, uintptr(unsafe.Pointer(&ifrq))); err != nil {
  332. // If we can't set the queue length nebula will still work but it may lead to packet loss
  333. t.l.WithError(err).Error("Failed to set tun tx queue length")
  334. }
  335. const modeNone = 1
  336. if err = netlink.LinkSetIP6AddrGenMode(link, modeNone); err != nil {
  337. t.l.WithError(err).Warn("Failed to disable link local address generation")
  338. }
  339. if err = t.addIPs(link); err != nil {
  340. return err
  341. }
  342. // Bring up the interface
  343. ifrf.Flags = ifrf.Flags | unix.IFF_UP
  344. if err = ioctl(t.ioctlFd, unix.SIOCSIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  345. return fmt.Errorf("failed to bring the tun device up: %s", err)
  346. }
  347. //set route MTU
  348. for i := range t.vpnNetworks {
  349. if err = t.setDefaultRoute(t.vpnNetworks[i]); err != nil {
  350. return fmt.Errorf("failed to set default route MTU: %w", err)
  351. }
  352. }
  353. // Set the routes
  354. if err = t.addRoutes(false); err != nil {
  355. return err
  356. }
  357. // Run the interface
  358. ifrf.Flags = ifrf.Flags | unix.IFF_UP | unix.IFF_RUNNING
  359. if err = ioctl(t.ioctlFd, unix.SIOCSIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  360. return fmt.Errorf("failed to run tun device: %s", err)
  361. }
  362. return nil
  363. }
  364. func (t *tun) setMTU() {
  365. // Set the MTU on the device
  366. ifm := ifreqMTU{Name: t.deviceBytes(), MTU: int32(t.MaxMTU)}
  367. if err := ioctl(t.ioctlFd, unix.SIOCSIFMTU, uintptr(unsafe.Pointer(&ifm))); err != nil {
  368. // This is currently a non fatal condition because the route table must have the MTU set appropriately as well
  369. t.l.WithError(err).Error("Failed to set tun mtu")
  370. }
  371. }
  372. func (t *tun) setDefaultRoute(cidr netip.Prefix) error {
  373. dr := &net.IPNet{
  374. IP: cidr.Masked().Addr().AsSlice(),
  375. Mask: net.CIDRMask(cidr.Bits(), cidr.Addr().BitLen()),
  376. }
  377. nr := netlink.Route{
  378. LinkIndex: t.deviceIndex,
  379. Dst: dr,
  380. MTU: t.DefaultMTU,
  381. AdvMSS: t.advMSS(Route{}),
  382. Scope: unix.RT_SCOPE_LINK,
  383. Src: net.IP(cidr.Addr().AsSlice()),
  384. Protocol: unix.RTPROT_KERNEL,
  385. Table: unix.RT_TABLE_MAIN,
  386. Type: unix.RTN_UNICAST,
  387. }
  388. err := netlink.RouteReplace(&nr)
  389. if err != nil {
  390. t.l.WithError(err).WithField("cidr", cidr).Warn("Failed to set default route MTU, retrying")
  391. //retry twice more -- on some systems there appears to be a race condition where if we set routes too soon, netlink says `invalid argument`
  392. for i := 0; i < 2; i++ {
  393. time.Sleep(100 * time.Millisecond)
  394. err = netlink.RouteReplace(&nr)
  395. if err == nil {
  396. break
  397. } else {
  398. t.l.WithError(err).WithField("cidr", cidr).WithField("mtu", t.DefaultMTU).Warn("Failed to set default route MTU, retrying")
  399. }
  400. }
  401. if err != nil {
  402. return fmt.Errorf("failed to set mtu %v on the default route %v; %v", t.DefaultMTU, dr, err)
  403. }
  404. }
  405. return nil
  406. }
  407. func (t *tun) addRoutes(logErrors bool) error {
  408. // Path routes
  409. routes := *t.Routes.Load()
  410. for _, r := range routes {
  411. if !r.Install {
  412. continue
  413. }
  414. dr := &net.IPNet{
  415. IP: r.Cidr.Masked().Addr().AsSlice(),
  416. Mask: net.CIDRMask(r.Cidr.Bits(), r.Cidr.Addr().BitLen()),
  417. }
  418. nr := netlink.Route{
  419. LinkIndex: t.deviceIndex,
  420. Dst: dr,
  421. MTU: r.MTU,
  422. AdvMSS: t.advMSS(r),
  423. Scope: unix.RT_SCOPE_LINK,
  424. }
  425. if r.Metric > 0 {
  426. nr.Priority = r.Metric
  427. }
  428. err := netlink.RouteReplace(&nr)
  429. if err != nil {
  430. retErr := util.NewContextualError("Failed to add route", map[string]any{"route": r}, err)
  431. if logErrors {
  432. retErr.Log(t.l)
  433. } else {
  434. return retErr
  435. }
  436. } else {
  437. t.l.WithField("route", r).Info("Added route")
  438. }
  439. }
  440. return nil
  441. }
  442. func (t *tun) removeRoutes(routes []Route) {
  443. for _, r := range routes {
  444. if !r.Install {
  445. continue
  446. }
  447. dr := &net.IPNet{
  448. IP: r.Cidr.Masked().Addr().AsSlice(),
  449. Mask: net.CIDRMask(r.Cidr.Bits(), r.Cidr.Addr().BitLen()),
  450. }
  451. nr := netlink.Route{
  452. LinkIndex: t.deviceIndex,
  453. Dst: dr,
  454. MTU: r.MTU,
  455. AdvMSS: t.advMSS(r),
  456. Scope: unix.RT_SCOPE_LINK,
  457. }
  458. if r.Metric > 0 {
  459. nr.Priority = r.Metric
  460. }
  461. err := netlink.RouteDel(&nr)
  462. if err != nil {
  463. t.l.WithError(err).WithField("route", r).Error("Failed to remove route")
  464. } else {
  465. t.l.WithField("route", r).Info("Removed route")
  466. }
  467. }
  468. }
  469. func (t *tun) Name() string {
  470. return t.Device
  471. }
  472. func (t *tun) advMSS(r Route) int {
  473. mtu := r.MTU
  474. if r.MTU == 0 {
  475. mtu = t.DefaultMTU
  476. }
  477. // We only need to set advmss if the route MTU does not match the device MTU
  478. if mtu != t.MaxMTU {
  479. return mtu - 40
  480. }
  481. return 0
  482. }
  483. func (t *tun) watchRoutes() {
  484. rch := make(chan netlink.RouteUpdate)
  485. doneChan := make(chan struct{})
  486. netlinkOptions := netlink.RouteSubscribeOptions{
  487. ReceiveBufferSize: t.useSystemRoutesBufferSize,
  488. ReceiveBufferForceSize: t.useSystemRoutesBufferSize != 0,
  489. ErrorCallback: func(e error) { t.l.WithError(e).Errorf("netlink error") },
  490. }
  491. if err := netlink.RouteSubscribeWithOptions(rch, doneChan, netlinkOptions); err != nil {
  492. t.l.WithError(err).Errorf("failed to subscribe to system route changes")
  493. return
  494. }
  495. t.routeChan = doneChan
  496. go func() {
  497. for {
  498. select {
  499. case r, ok := <-rch:
  500. if ok {
  501. t.updateRoutes(r)
  502. } else {
  503. // may be should do something here as
  504. // netlink stops sending updates
  505. return
  506. }
  507. case <-doneChan:
  508. // netlink.RouteSubscriber will close the rch for us
  509. return
  510. }
  511. }
  512. }()
  513. }
  514. func (t *tun) isGatewayInVpnNetworks(gwAddr netip.Addr) bool {
  515. withinNetworks := false
  516. for i := range t.vpnNetworks {
  517. if t.vpnNetworks[i].Contains(gwAddr) {
  518. withinNetworks = true
  519. break
  520. }
  521. }
  522. return withinNetworks
  523. }
  524. func (t *tun) getGatewaysFromRoute(r *netlink.Route) routing.Gateways {
  525. var gateways routing.Gateways
  526. link, err := netlink.LinkByName(t.Device)
  527. if err != nil {
  528. t.l.WithField("Devicename", t.Device).Error("Ignoring route update: failed to get link by name")
  529. return gateways
  530. }
  531. // If this route is relevant to our interface and there is a gateway then add it
  532. if r.LinkIndex == link.Attrs().Index && len(r.Gw) > 0 {
  533. gwAddr, ok := netip.AddrFromSlice(r.Gw)
  534. if !ok {
  535. t.l.WithField("route", r).Debug("Ignoring route update, invalid gateway address")
  536. } else {
  537. gwAddr = gwAddr.Unmap()
  538. if !t.isGatewayInVpnNetworks(gwAddr) {
  539. // Gateway isn't in our overlay network, ignore
  540. t.l.WithField("route", r).Debug("Ignoring route update, not in our network")
  541. } else {
  542. gateways = append(gateways, routing.NewGateway(gwAddr, 1))
  543. }
  544. }
  545. }
  546. for _, p := range r.MultiPath {
  547. // If this route is relevant to our interface and there is a gateway then add it
  548. if p.LinkIndex == link.Attrs().Index && len(p.Gw) > 0 {
  549. gwAddr, ok := netip.AddrFromSlice(p.Gw)
  550. if !ok {
  551. t.l.WithField("route", r).Debug("Ignoring multipath route update, invalid gateway address")
  552. } else {
  553. gwAddr = gwAddr.Unmap()
  554. if !t.isGatewayInVpnNetworks(gwAddr) {
  555. // Gateway isn't in our overlay network, ignore
  556. t.l.WithField("route", r).Debug("Ignoring route update, not in our network")
  557. } else {
  558. // p.Hops+1 = weight of the route
  559. gateways = append(gateways, routing.NewGateway(gwAddr, p.Hops+1))
  560. }
  561. }
  562. }
  563. }
  564. routing.CalculateBucketsForGateways(gateways)
  565. return gateways
  566. }
  567. func (t *tun) updateRoutes(r netlink.RouteUpdate) {
  568. gateways := t.getGatewaysFromRoute(&r.Route)
  569. if len(gateways) == 0 {
  570. // No gateways relevant to our network, no routing changes required.
  571. t.l.WithField("route", r).Debug("Ignoring route update, no gateways")
  572. return
  573. }
  574. if r.Dst == nil {
  575. t.l.WithField("route", r).Debug("Ignoring route update, no destination address")
  576. return
  577. }
  578. dstAddr, ok := netip.AddrFromSlice(r.Dst.IP)
  579. if !ok {
  580. t.l.WithField("route", r).Debug("Ignoring route update, invalid destination address")
  581. return
  582. }
  583. ones, _ := r.Dst.Mask.Size()
  584. dst := netip.PrefixFrom(dstAddr, ones)
  585. newTree := t.routeTree.Load().Clone()
  586. if r.Type == unix.RTM_NEWROUTE {
  587. t.l.WithField("destination", dst).WithField("via", gateways).Info("Adding route")
  588. newTree.Insert(dst, gateways)
  589. } else {
  590. t.l.WithField("destination", dst).WithField("via", gateways).Info("Removing route")
  591. newTree.Delete(dst)
  592. }
  593. t.routeTree.Store(newTree)
  594. }
  595. func (t *tun) Close() error {
  596. if t.routeChan != nil {
  597. close(t.routeChan)
  598. }
  599. if t.ReadWriteCloser != nil {
  600. _ = t.ReadWriteCloser.Close()
  601. }
  602. if t.wgDevice != nil {
  603. _ = t.wgDevice.Close()
  604. if t.ioctlFd > 0 {
  605. // underlying fd already closed by the device
  606. t.ioctlFd = 0
  607. }
  608. }
  609. if t.ioctlFd > 0 {
  610. _ = os.NewFile(t.ioctlFd, "ioctlFd").Close()
  611. }
  612. return nil
  613. }