Copy TCP GRO probe from tailscale

This commit is contained in:
世界 2024-11-23 13:13:48 +08:00
parent 6ef42f019b
commit c177abb523
No known key found for this signature in database
GPG key ID: CD109927C34A63C4
2 changed files with 49 additions and 16 deletions

2
tun.go
View file

@ -40,8 +40,6 @@ type LinuxTUN interface {
BatchSize() int BatchSize() int
BatchRead(buffers [][]byte, offset int, readN []int) (n int, err error) BatchRead(buffers [][]byte, offset int, readN []int) (n int, err error)
BatchWrite(buffers [][]byte, offset int) (n int, err error) BatchWrite(buffers [][]byte, offset int) (n int, err error)
DisableUDPGRO()
DisableTCPGRO()
TXChecksumOffload() bool TXChecksumOffload() bool
} }

View file

@ -14,6 +14,8 @@ import (
"unsafe" "unsafe"
"github.com/sagernet/netlink" "github.com/sagernet/netlink"
"github.com/sagernet/sing-tun/internal/gtcpip/checksum"
"github.com/sagernet/sing-tun/internal/gtcpip/header"
"github.com/sagernet/sing/common" "github.com/sagernet/sing/common"
"github.com/sagernet/sing/common/buf" "github.com/sagernet/sing/common/buf"
"github.com/sagernet/sing/common/bufio" "github.com/sagernet/sing/common/bufio"
@ -194,20 +196,44 @@ func (t *NativeTun) BatchSize() int {
return idealBatchSize return idealBatchSize
} }
// DisableUDPGRO disables UDP GRO if it is enabled. See the GRODevice interface func (t *NativeTun) probeTCPGRO() error {
// for cases where it should be called. ipPort := netip.AddrPortFrom(t.options.Inet4Address[0].Addr(), 0)
func (t *NativeTun) DisableUDPGRO() { fingerprint := []byte("sing-tun-probe-tun-gro")
t.writeAccess.Lock() segmentSize := len(fingerprint)
t.gro.disableUDPGRO() iphLen := 20
t.writeAccess.Unlock() tcphLen := 20
} totalLen := iphLen + tcphLen + segmentSize
bufs := make([][]byte, 2)
// DisableTCPGRO disables TCP GRO if it is enabled. See the GRODevice interface for i := range bufs {
// for cases where it should be called. bufs[i] = make([]byte, virtioNetHdrLen+totalLen, virtioNetHdrLen+(totalLen*2))
func (t *NativeTun) DisableTCPGRO() { ipv4H := header.IPv4(bufs[i][virtioNetHdrLen:])
t.writeAccess.Lock() ipv4H.Encode(&header.IPv4Fields{
t.gro.disableTCPGRO() SrcAddr: ipPort.Addr(),
t.writeAccess.Unlock() DstAddr: ipPort.Addr(),
Protocol: unix.IPPROTO_TCP,
// Use a zero value TTL as best effort means to reduce chance of
// probe packet leaking further than it needs to.
TTL: 0,
TotalLength: uint16(totalLen),
})
tcpH := header.TCP(bufs[i][virtioNetHdrLen+iphLen:])
tcpH.Encode(&header.TCPFields{
SrcPort: ipPort.Port(),
DstPort: ipPort.Port(),
SeqNum: 1 + uint32(i*segmentSize),
AckNum: 1,
DataOffset: 20,
Flags: header.TCPFlagAck,
WindowSize: 3000,
})
copy(bufs[i][virtioNetHdrLen+iphLen+tcphLen:], fingerprint)
ipv4H.SetChecksum(^ipv4H.CalculateChecksum())
pseudoCsum := header.PseudoHeaderChecksum(unix.IPPROTO_TCP, ipv4H.SourceAddressSlice(), ipv4H.DestinationAddressSlice(), uint16(tcphLen+segmentSize))
pseudoCsum = checksum.Checksum(bufs[i][virtioNetHdrLen+iphLen+tcphLen:], pseudoCsum)
tcpH.SetChecksum(^tcpH.CalculateChecksum(pseudoCsum))
}
_, err := t.BatchWrite(bufs, virtioNetHdrLen)
return err
} }
func (t *NativeTun) BatchRead(buffers [][]byte, offset int, readN []int) (n int, err error) { func (t *NativeTun) BatchRead(buffers [][]byte, offset int, readN []int) (n int, err error) {
@ -397,6 +423,15 @@ func (t *NativeTun) Start() error {
return err return err
} }
if t.vnetHdr && len(t.options.Inet4Address) > 0 {
err = t.probeTCPGRO()
if err != nil {
t.gro.disableTCPGRO()
t.gro.disableUDPGRO()
t.options.Logger.Warn(E.Cause(err, "disabled TUN TCP & UDP GRO due to GRO probe error"))
}
}
if t.options.IPRoute2TableIndex == 0 { if t.options.IPRoute2TableIndex == 0 {
for { for {
t.options.IPRoute2TableIndex = int(rand.Uint32()) t.options.IPRoute2TableIndex = int(rand.Uint32())