tun_linux.go 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701
  1. //go:build !android && !e2e_testing
  2. // +build !android,!e2e_testing
  3. package overlay
  4. import (
  5. "fmt"
  6. "io"
  7. "net"
  8. "net/netip"
  9. "os"
  10. "strings"
  11. "sync/atomic"
  12. "time"
  13. "unsafe"
  14. "github.com/gaissmai/bart"
  15. "github.com/sirupsen/logrus"
  16. "github.com/slackhq/nebula/config"
  17. "github.com/slackhq/nebula/routing"
  18. "github.com/slackhq/nebula/util"
  19. "github.com/vishvananda/netlink"
  20. "golang.org/x/sys/unix"
  21. )
  22. type tun struct {
  23. io.ReadWriteCloser
  24. fd int
  25. Device string
  26. vpnNetworks []netip.Prefix
  27. MaxMTU int
  28. DefaultMTU int
  29. TXQueueLen int
  30. deviceIndex int
  31. ioctlFd uintptr
  32. Routes atomic.Pointer[[]Route]
  33. routeTree atomic.Pointer[bart.Table[routing.Gateways]]
  34. routeChan chan struct{}
  35. useSystemRoutes bool
  36. useSystemRoutesBufferSize int
  37. l *logrus.Logger
  38. }
  39. func (t *tun) Networks() []netip.Prefix {
  40. return t.vpnNetworks
  41. }
  42. type ifReq struct {
  43. Name [16]byte
  44. Flags uint16
  45. pad [8]byte
  46. }
  47. type ifreqMTU struct {
  48. Name [16]byte
  49. MTU int32
  50. pad [8]byte
  51. }
  52. type ifreqQLEN struct {
  53. Name [16]byte
  54. Value int32
  55. pad [8]byte
  56. }
  57. func newTunFromFd(c *config.C, l *logrus.Logger, deviceFd int, vpnNetworks []netip.Prefix) (*tun, error) {
  58. file := os.NewFile(uintptr(deviceFd), "/dev/net/tun")
  59. t, err := newTunGeneric(c, l, file, vpnNetworks)
  60. if err != nil {
  61. return nil, err
  62. }
  63. t.Device = "tun0"
  64. return t, nil
  65. }
  66. func newTun(c *config.C, l *logrus.Logger, vpnNetworks []netip.Prefix, multiqueue bool) (*tun, error) {
  67. fd, err := unix.Open("/dev/net/tun", os.O_RDWR, 0)
  68. if err != nil {
  69. // If /dev/net/tun doesn't exist, try to create it (will happen in docker)
  70. if os.IsNotExist(err) {
  71. err = os.MkdirAll("/dev/net", 0755)
  72. if err != nil {
  73. return nil, fmt.Errorf("/dev/net/tun doesn't exist, failed to mkdir -p /dev/net: %w", err)
  74. }
  75. err = unix.Mknod("/dev/net/tun", unix.S_IFCHR|0600, int(unix.Mkdev(10, 200)))
  76. if err != nil {
  77. return nil, fmt.Errorf("failed to create /dev/net/tun: %w", err)
  78. }
  79. fd, err = unix.Open("/dev/net/tun", os.O_RDWR, 0)
  80. if err != nil {
  81. return nil, fmt.Errorf("created /dev/net/tun, but still failed: %w", err)
  82. }
  83. } else {
  84. return nil, err
  85. }
  86. }
  87. var req ifReq
  88. req.Flags = uint16(unix.IFF_TUN | unix.IFF_NO_PI)
  89. if multiqueue {
  90. req.Flags |= unix.IFF_MULTI_QUEUE
  91. }
  92. copy(req.Name[:], c.GetString("tun.dev", ""))
  93. if err = ioctl(uintptr(fd), uintptr(unix.TUNSETIFF), uintptr(unsafe.Pointer(&req))); err != nil {
  94. return nil, err
  95. }
  96. name := strings.Trim(string(req.Name[:]), "\x00")
  97. file := os.NewFile(uintptr(fd), "/dev/net/tun")
  98. t, err := newTunGeneric(c, l, file, vpnNetworks)
  99. if err != nil {
  100. return nil, err
  101. }
  102. t.Device = name
  103. return t, nil
  104. }
  105. func newTunGeneric(c *config.C, l *logrus.Logger, file *os.File, vpnNetworks []netip.Prefix) (*tun, error) {
  106. t := &tun{
  107. ReadWriteCloser: file,
  108. fd: int(file.Fd()),
  109. vpnNetworks: vpnNetworks,
  110. TXQueueLen: c.GetInt("tun.tx_queue", 500),
  111. useSystemRoutes: c.GetBool("tun.use_system_route_table", false),
  112. useSystemRoutesBufferSize: c.GetInt("tun.use_system_route_table_buffer_size", 0),
  113. l: l,
  114. }
  115. err := t.reload(c, true)
  116. if err != nil {
  117. return nil, err
  118. }
  119. c.RegisterReloadCallback(func(c *config.C) {
  120. err := t.reload(c, false)
  121. if err != nil {
  122. util.LogWithContextIfNeeded("failed to reload tun device", err, t.l)
  123. }
  124. })
  125. return t, nil
  126. }
  127. func (t *tun) reload(c *config.C, initial bool) error {
  128. routeChange, routes, err := getAllRoutesFromConfig(c, t.vpnNetworks, initial)
  129. if err != nil {
  130. return err
  131. }
  132. if !initial && !routeChange && !c.HasChanged("tun.mtu") {
  133. return nil
  134. }
  135. routeTree, err := makeRouteTree(t.l, routes, true)
  136. if err != nil {
  137. return err
  138. }
  139. oldDefaultMTU := t.DefaultMTU
  140. oldMaxMTU := t.MaxMTU
  141. newDefaultMTU := c.GetInt("tun.mtu", DefaultMTU)
  142. newMaxMTU := newDefaultMTU
  143. for i, r := range routes {
  144. if r.MTU == 0 {
  145. routes[i].MTU = newDefaultMTU
  146. }
  147. if r.MTU > t.MaxMTU {
  148. newMaxMTU = r.MTU
  149. }
  150. }
  151. t.MaxMTU = newMaxMTU
  152. t.DefaultMTU = newDefaultMTU
  153. // Teach nebula how to handle the routes before establishing them in the system table
  154. oldRoutes := t.Routes.Swap(&routes)
  155. t.routeTree.Store(routeTree)
  156. if !initial {
  157. if oldMaxMTU != newMaxMTU {
  158. t.setMTU()
  159. t.l.Infof("Set max MTU to %v was %v", t.MaxMTU, oldMaxMTU)
  160. }
  161. if oldDefaultMTU != newDefaultMTU {
  162. for i := range t.vpnNetworks {
  163. err := t.setDefaultRoute(t.vpnNetworks[i])
  164. if err != nil {
  165. t.l.Warn(err)
  166. } else {
  167. t.l.Infof("Set default MTU to %v was %v", t.DefaultMTU, oldDefaultMTU)
  168. }
  169. }
  170. }
  171. // Remove first, if the system removes a wanted route hopefully it will be re-added next
  172. t.removeRoutes(findRemovedRoutes(routes, *oldRoutes))
  173. // Ensure any routes we actually want are installed
  174. err = t.addRoutes(true)
  175. if err != nil {
  176. // This should never be called since addRoutes should log its own errors in a reload condition
  177. util.LogWithContextIfNeeded("Failed to refresh routes", err, t.l)
  178. }
  179. }
  180. return nil
  181. }
  182. func (t *tun) SupportsMultiqueue() bool {
  183. return true
  184. }
  185. func (t *tun) NewMultiQueueReader() (io.ReadWriteCloser, error) {
  186. fd, err := unix.Open("/dev/net/tun", os.O_RDWR, 0)
  187. if err != nil {
  188. return nil, err
  189. }
  190. var req ifReq
  191. req.Flags = uint16(unix.IFF_TUN | unix.IFF_NO_PI | unix.IFF_MULTI_QUEUE)
  192. copy(req.Name[:], t.Device)
  193. if err = ioctl(uintptr(fd), uintptr(unix.TUNSETIFF), uintptr(unsafe.Pointer(&req))); err != nil {
  194. return nil, err
  195. }
  196. file := os.NewFile(uintptr(fd), "/dev/net/tun")
  197. return file, nil
  198. }
  199. func (t *tun) RoutesFor(ip netip.Addr) routing.Gateways {
  200. r, _ := t.routeTree.Load().Lookup(ip)
  201. return r
  202. }
  203. func (t *tun) Write(b []byte) (int, error) {
  204. var nn int
  205. maximum := len(b)
  206. for {
  207. n, err := unix.Write(t.fd, b[nn:maximum])
  208. if n > 0 {
  209. nn += n
  210. }
  211. if nn == len(b) {
  212. return nn, err
  213. }
  214. if err != nil {
  215. return nn, err
  216. }
  217. if n == 0 {
  218. return nn, io.ErrUnexpectedEOF
  219. }
  220. }
  221. }
  222. func (t *tun) deviceBytes() (o [16]byte) {
  223. for i, c := range t.Device {
  224. o[i] = byte(c)
  225. }
  226. return
  227. }
  228. func hasNetlinkAddr(al []*netlink.Addr, x netlink.Addr) bool {
  229. for i := range al {
  230. if al[i].Equal(x) {
  231. return true
  232. }
  233. }
  234. return false
  235. }
  236. // addIPs uses netlink to add all addresses that don't exist, then it removes ones that should not be there
  237. func (t *tun) addIPs(link netlink.Link) error {
  238. newAddrs := make([]*netlink.Addr, len(t.vpnNetworks))
  239. for i := range t.vpnNetworks {
  240. newAddrs[i] = &netlink.Addr{
  241. IPNet: &net.IPNet{
  242. IP: t.vpnNetworks[i].Addr().AsSlice(),
  243. Mask: net.CIDRMask(t.vpnNetworks[i].Bits(), t.vpnNetworks[i].Addr().BitLen()),
  244. },
  245. Label: t.vpnNetworks[i].Addr().Zone(),
  246. }
  247. }
  248. //add all new addresses
  249. for i := range newAddrs {
  250. //AddrReplace still adds new IPs, but if their properties change it will change them as well
  251. if err := netlink.AddrReplace(link, newAddrs[i]); err != nil {
  252. return err
  253. }
  254. }
  255. //iterate over remainder, remove whoever shouldn't be there
  256. al, err := netlink.AddrList(link, netlink.FAMILY_ALL)
  257. if err != nil {
  258. return fmt.Errorf("failed to get tun address list: %s", err)
  259. }
  260. for i := range al {
  261. if hasNetlinkAddr(newAddrs, al[i]) {
  262. continue
  263. }
  264. err = netlink.AddrDel(link, &al[i])
  265. if err != nil {
  266. t.l.WithError(err).Error("failed to remove address from tun address list")
  267. } else {
  268. t.l.WithField("removed", al[i].String()).Info("removed address not listed in cert(s)")
  269. }
  270. }
  271. return nil
  272. }
  273. func (t *tun) Activate() error {
  274. devName := t.deviceBytes()
  275. if t.useSystemRoutes {
  276. t.watchRoutes()
  277. }
  278. s, err := unix.Socket(
  279. unix.AF_INET, //because everything we use t.ioctlFd for is address family independent, this is fine
  280. unix.SOCK_DGRAM,
  281. unix.IPPROTO_IP,
  282. )
  283. if err != nil {
  284. return err
  285. }
  286. t.ioctlFd = uintptr(s)
  287. // Set the device name
  288. ifrf := ifReq{Name: devName}
  289. if err = ioctl(t.ioctlFd, unix.SIOCGIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  290. return fmt.Errorf("failed to set tun device name: %s", err)
  291. }
  292. link, err := netlink.LinkByName(t.Device)
  293. if err != nil {
  294. return fmt.Errorf("failed to get tun device link: %s", err)
  295. }
  296. t.deviceIndex = link.Attrs().Index
  297. // Setup our default MTU
  298. t.setMTU()
  299. // Set the transmit queue length
  300. ifrq := ifreqQLEN{Name: devName, Value: int32(t.TXQueueLen)}
  301. if err = ioctl(t.ioctlFd, unix.SIOCSIFTXQLEN, uintptr(unsafe.Pointer(&ifrq))); err != nil {
  302. // If we can't set the queue length nebula will still work but it may lead to packet loss
  303. t.l.WithError(err).Error("Failed to set tun tx queue length")
  304. }
  305. const modeNone = 1
  306. if err = netlink.LinkSetIP6AddrGenMode(link, modeNone); err != nil {
  307. t.l.WithError(err).Warn("Failed to disable link local address generation")
  308. }
  309. if err = t.addIPs(link); err != nil {
  310. return err
  311. }
  312. // Bring up the interface
  313. ifrf.Flags = ifrf.Flags | unix.IFF_UP
  314. if err = ioctl(t.ioctlFd, unix.SIOCSIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  315. return fmt.Errorf("failed to bring the tun device up: %s", err)
  316. }
  317. //set route MTU
  318. for i := range t.vpnNetworks {
  319. if err = t.setDefaultRoute(t.vpnNetworks[i]); err != nil {
  320. return fmt.Errorf("failed to set default route MTU: %w", err)
  321. }
  322. }
  323. // Set the routes
  324. if err = t.addRoutes(false); err != nil {
  325. return err
  326. }
  327. // Run the interface
  328. ifrf.Flags = ifrf.Flags | unix.IFF_UP | unix.IFF_RUNNING
  329. if err = ioctl(t.ioctlFd, unix.SIOCSIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  330. return fmt.Errorf("failed to run tun device: %s", err)
  331. }
  332. return nil
  333. }
  334. func (t *tun) setMTU() {
  335. // Set the MTU on the device
  336. ifm := ifreqMTU{Name: t.deviceBytes(), MTU: int32(t.MaxMTU)}
  337. if err := ioctl(t.ioctlFd, unix.SIOCSIFMTU, uintptr(unsafe.Pointer(&ifm))); err != nil {
  338. // This is currently a non fatal condition because the route table must have the MTU set appropriately as well
  339. t.l.WithError(err).Error("Failed to set tun mtu")
  340. }
  341. }
  342. func (t *tun) setDefaultRoute(cidr netip.Prefix) error {
  343. dr := &net.IPNet{
  344. IP: cidr.Masked().Addr().AsSlice(),
  345. Mask: net.CIDRMask(cidr.Bits(), cidr.Addr().BitLen()),
  346. }
  347. nr := netlink.Route{
  348. LinkIndex: t.deviceIndex,
  349. Dst: dr,
  350. MTU: t.DefaultMTU,
  351. AdvMSS: t.advMSS(Route{}),
  352. Scope: unix.RT_SCOPE_LINK,
  353. Src: net.IP(cidr.Addr().AsSlice()),
  354. Protocol: unix.RTPROT_KERNEL,
  355. Table: unix.RT_TABLE_MAIN,
  356. Type: unix.RTN_UNICAST,
  357. }
  358. err := netlink.RouteReplace(&nr)
  359. if err != nil {
  360. t.l.WithError(err).WithField("cidr", cidr).Warn("Failed to set default route MTU, retrying")
  361. //retry twice more -- on some systems there appears to be a race condition where if we set routes too soon, netlink says `invalid argument`
  362. for i := 0; i < 2; i++ {
  363. time.Sleep(100 * time.Millisecond)
  364. err = netlink.RouteReplace(&nr)
  365. if err == nil {
  366. break
  367. } else {
  368. t.l.WithError(err).WithField("cidr", cidr).WithField("mtu", t.DefaultMTU).Warn("Failed to set default route MTU, retrying")
  369. }
  370. }
  371. if err != nil {
  372. return fmt.Errorf("failed to set mtu %v on the default route %v; %v", t.DefaultMTU, dr, err)
  373. }
  374. }
  375. return nil
  376. }
  377. func (t *tun) addRoutes(logErrors bool) error {
  378. // Path routes
  379. routes := *t.Routes.Load()
  380. for _, r := range routes {
  381. if !r.Install {
  382. continue
  383. }
  384. dr := &net.IPNet{
  385. IP: r.Cidr.Masked().Addr().AsSlice(),
  386. Mask: net.CIDRMask(r.Cidr.Bits(), r.Cidr.Addr().BitLen()),
  387. }
  388. nr := netlink.Route{
  389. LinkIndex: t.deviceIndex,
  390. Dst: dr,
  391. MTU: r.MTU,
  392. AdvMSS: t.advMSS(r),
  393. Scope: unix.RT_SCOPE_LINK,
  394. }
  395. if r.Metric > 0 {
  396. nr.Priority = r.Metric
  397. }
  398. err := netlink.RouteReplace(&nr)
  399. if err != nil {
  400. retErr := util.NewContextualError("Failed to add route", map[string]any{"route": r}, err)
  401. if logErrors {
  402. retErr.Log(t.l)
  403. } else {
  404. return retErr
  405. }
  406. } else {
  407. t.l.WithField("route", r).Info("Added route")
  408. }
  409. }
  410. return nil
  411. }
  412. func (t *tun) removeRoutes(routes []Route) {
  413. for _, r := range routes {
  414. if !r.Install {
  415. continue
  416. }
  417. dr := &net.IPNet{
  418. IP: r.Cidr.Masked().Addr().AsSlice(),
  419. Mask: net.CIDRMask(r.Cidr.Bits(), r.Cidr.Addr().BitLen()),
  420. }
  421. nr := netlink.Route{
  422. LinkIndex: t.deviceIndex,
  423. Dst: dr,
  424. MTU: r.MTU,
  425. AdvMSS: t.advMSS(r),
  426. Scope: unix.RT_SCOPE_LINK,
  427. }
  428. if r.Metric > 0 {
  429. nr.Priority = r.Metric
  430. }
  431. err := netlink.RouteDel(&nr)
  432. if err != nil {
  433. t.l.WithError(err).WithField("route", r).Error("Failed to remove route")
  434. } else {
  435. t.l.WithField("route", r).Info("Removed route")
  436. }
  437. }
  438. }
  439. func (t *tun) Name() string {
  440. return t.Device
  441. }
  442. func (t *tun) advMSS(r Route) int {
  443. mtu := r.MTU
  444. if r.MTU == 0 {
  445. mtu = t.DefaultMTU
  446. }
  447. // We only need to set advmss if the route MTU does not match the device MTU
  448. if mtu != t.MaxMTU {
  449. return mtu - 40
  450. }
  451. return 0
  452. }
  453. func (t *tun) watchRoutes() {
  454. rch := make(chan netlink.RouteUpdate)
  455. doneChan := make(chan struct{})
  456. netlinkOptions := netlink.RouteSubscribeOptions{
  457. ReceiveBufferSize: t.useSystemRoutesBufferSize,
  458. ReceiveBufferForceSize: t.useSystemRoutesBufferSize != 0,
  459. ErrorCallback: func(e error) { t.l.WithError(e).Errorf("netlink error") },
  460. }
  461. if err := netlink.RouteSubscribeWithOptions(rch, doneChan, netlinkOptions); err != nil {
  462. t.l.WithError(err).Errorf("failed to subscribe to system route changes")
  463. return
  464. }
  465. t.routeChan = doneChan
  466. go func() {
  467. for {
  468. select {
  469. case r, ok := <-rch:
  470. if ok {
  471. t.updateRoutes(r)
  472. } else {
  473. // may be should do something here as
  474. // netlink stops sending updates
  475. return
  476. }
  477. case <-doneChan:
  478. // netlink.RouteSubscriber will close the rch for us
  479. return
  480. }
  481. }
  482. }()
  483. }
  484. func (t *tun) isGatewayInVpnNetworks(gwAddr netip.Addr) bool {
  485. withinNetworks := false
  486. for i := range t.vpnNetworks {
  487. if t.vpnNetworks[i].Contains(gwAddr) {
  488. withinNetworks = true
  489. break
  490. }
  491. }
  492. return withinNetworks
  493. }
  494. func (t *tun) getGatewaysFromRoute(r *netlink.Route) routing.Gateways {
  495. var gateways routing.Gateways
  496. link, err := netlink.LinkByName(t.Device)
  497. if err != nil {
  498. t.l.WithField("deviceName", t.Device).Error("Ignoring route update: failed to get link by name")
  499. return gateways
  500. }
  501. // If this route is relevant to our interface and there is a gateway then add it
  502. if r.LinkIndex == link.Attrs().Index {
  503. gwAddr, ok := getGatewayAddr(r.Gw, r.Via)
  504. if ok {
  505. if t.isGatewayInVpnNetworks(gwAddr) {
  506. gateways = append(gateways, routing.NewGateway(gwAddr, 1))
  507. } else {
  508. // Gateway isn't in our overlay network, ignore
  509. t.l.WithField("route", r).Debug("Ignoring route update, gateway is not in our network")
  510. }
  511. } else {
  512. t.l.WithField("route", r).Debug("Ignoring route update, invalid gateway or via address")
  513. }
  514. }
  515. for _, p := range r.MultiPath {
  516. // If this route is relevant to our interface and there is a gateway then add it
  517. if p.LinkIndex == link.Attrs().Index {
  518. gwAddr, ok := getGatewayAddr(p.Gw, p.Via)
  519. if ok {
  520. if t.isGatewayInVpnNetworks(gwAddr) {
  521. gateways = append(gateways, routing.NewGateway(gwAddr, p.Hops+1))
  522. } else {
  523. // Gateway isn't in our overlay network, ignore
  524. t.l.WithField("route", r).Debug("Ignoring route update, gateway is not in our network")
  525. }
  526. } else {
  527. t.l.WithField("route", r).Debug("Ignoring route update, invalid gateway or via address")
  528. }
  529. }
  530. }
  531. routing.CalculateBucketsForGateways(gateways)
  532. return gateways
  533. }
  534. func getGatewayAddr(gw net.IP, via netlink.Destination) (netip.Addr, bool) {
  535. // Try to use the old RTA_GATEWAY first
  536. gwAddr, ok := netip.AddrFromSlice(gw)
  537. if !ok {
  538. // Fallback to the new RTA_VIA
  539. rVia, ok := via.(*netlink.Via)
  540. if ok {
  541. gwAddr, ok = netip.AddrFromSlice(rVia.Addr)
  542. }
  543. }
  544. if gwAddr.IsValid() {
  545. gwAddr = gwAddr.Unmap()
  546. return gwAddr, true
  547. }
  548. return netip.Addr{}, false
  549. }
  550. func (t *tun) updateRoutes(r netlink.RouteUpdate) {
  551. gateways := t.getGatewaysFromRoute(&r.Route)
  552. if len(gateways) == 0 {
  553. // No gateways relevant to our network, no routing changes required.
  554. t.l.WithField("route", r).Debug("Ignoring route update, no gateways")
  555. return
  556. }
  557. if r.Dst == nil {
  558. t.l.WithField("route", r).Debug("Ignoring route update, no destination address")
  559. return
  560. }
  561. dstAddr, ok := netip.AddrFromSlice(r.Dst.IP)
  562. if !ok {
  563. t.l.WithField("route", r).Debug("Ignoring route update, invalid destination address")
  564. return
  565. }
  566. ones, _ := r.Dst.Mask.Size()
  567. dst := netip.PrefixFrom(dstAddr, ones)
  568. newTree := t.routeTree.Load().Clone()
  569. if r.Type == unix.RTM_NEWROUTE {
  570. t.l.WithField("destination", dst).WithField("via", gateways).Info("Adding route")
  571. newTree.Insert(dst, gateways)
  572. } else {
  573. t.l.WithField("destination", dst).WithField("via", gateways).Info("Removing route")
  574. newTree.Delete(dst)
  575. }
  576. t.routeTree.Store(newTree)
  577. }
  578. func (t *tun) Close() error {
  579. if t.routeChan != nil {
  580. close(t.routeChan)
  581. }
  582. if t.ReadWriteCloser != nil {
  583. _ = t.ReadWriteCloser.Close()
  584. }
  585. if t.ioctlFd > 0 {
  586. _ = os.NewFile(t.ioctlFd, "ioctlFd").Close()
  587. }
  588. return nil
  589. }