mirror of
https://github.com/SagerNet/sing-tun.git
synced 2025-04-02 19:37:40 +03:00
218 lines
6.2 KiB
Go
218 lines
6.2 KiB
Go
//go:build with_gvisor
|
|
|
|
package tun
|
|
|
|
import (
|
|
"context"
|
|
"net/netip"
|
|
"time"
|
|
"unsafe"
|
|
|
|
"github.com/sagernet/gvisor/pkg/tcpip"
|
|
"github.com/sagernet/gvisor/pkg/tcpip/adapters/gonet"
|
|
"github.com/sagernet/gvisor/pkg/tcpip/header"
|
|
"github.com/sagernet/gvisor/pkg/tcpip/network/ipv4"
|
|
"github.com/sagernet/gvisor/pkg/tcpip/network/ipv6"
|
|
"github.com/sagernet/gvisor/pkg/tcpip/stack"
|
|
"github.com/sagernet/gvisor/pkg/tcpip/transport/icmp"
|
|
"github.com/sagernet/gvisor/pkg/tcpip/transport/tcp"
|
|
"github.com/sagernet/gvisor/pkg/tcpip/transport/udp"
|
|
"github.com/sagernet/gvisor/pkg/waiter"
|
|
"github.com/sagernet/sing/common/bufio"
|
|
"github.com/sagernet/sing/common/canceler"
|
|
E "github.com/sagernet/sing/common/exceptions"
|
|
"github.com/sagernet/sing/common/logger"
|
|
M "github.com/sagernet/sing/common/metadata"
|
|
)
|
|
|
|
const WithGVisor = true
|
|
|
|
const defaultNIC tcpip.NICID = 1
|
|
|
|
type GVisor struct {
|
|
ctx context.Context
|
|
tun GVisorTun
|
|
tunMtu uint32
|
|
endpointIndependentNat bool
|
|
udpTimeout int64
|
|
handler Handler
|
|
logger logger.Logger
|
|
stack *stack.Stack
|
|
endpoint stack.LinkEndpoint
|
|
}
|
|
|
|
type GVisorTun interface {
|
|
Tun
|
|
NewEndpoint() (stack.LinkEndpoint, error)
|
|
}
|
|
|
|
func NewGVisor(
|
|
options StackOptions,
|
|
) (Stack, error) {
|
|
gTun, isGTun := options.Tun.(GVisorTun)
|
|
if !isGTun {
|
|
return nil, E.New("gVisor stack is unsupported on current platform")
|
|
}
|
|
|
|
gStack := &GVisor{
|
|
ctx: options.Context,
|
|
tun: gTun,
|
|
tunMtu: options.MTU,
|
|
endpointIndependentNat: options.EndpointIndependentNat,
|
|
udpTimeout: options.UDPTimeout,
|
|
handler: options.Handler,
|
|
logger: options.Logger,
|
|
}
|
|
return gStack, nil
|
|
}
|
|
|
|
func (t *GVisor) Start() error {
|
|
linkEndpoint, err := t.tun.NewEndpoint()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
ipStack, err := newGVisorStack(linkEndpoint)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
tcpForwarder := tcp.NewForwarder(ipStack, 0, 1024, func(r *tcp.ForwarderRequest) {
|
|
var wq waiter.Queue
|
|
handshakeCtx, cancel := context.WithCancel(context.Background())
|
|
go func() {
|
|
select {
|
|
case <-t.ctx.Done():
|
|
wq.Notify(wq.Events())
|
|
case <-handshakeCtx.Done():
|
|
}
|
|
}()
|
|
endpoint, err := r.CreateEndpoint(&wq)
|
|
cancel()
|
|
if err != nil {
|
|
r.Complete(true)
|
|
return
|
|
}
|
|
r.Complete(false)
|
|
endpoint.SocketOptions().SetKeepAlive(true)
|
|
keepAliveIdle := tcpip.KeepaliveIdleOption(15 * time.Second)
|
|
endpoint.SetSockOpt(&keepAliveIdle)
|
|
keepAliveInterval := tcpip.KeepaliveIntervalOption(15 * time.Second)
|
|
endpoint.SetSockOpt(&keepAliveInterval)
|
|
tcpConn := gonet.NewTCPConn(&wq, endpoint)
|
|
lAddr := tcpConn.RemoteAddr()
|
|
rAddr := tcpConn.LocalAddr()
|
|
if lAddr == nil || rAddr == nil {
|
|
tcpConn.Close()
|
|
return
|
|
}
|
|
go func() {
|
|
var metadata M.Metadata
|
|
metadata.Source = M.SocksaddrFromNet(lAddr)
|
|
metadata.Destination = M.SocksaddrFromNet(rAddr)
|
|
hErr := t.handler.NewConnection(t.ctx, &gTCPConn{tcpConn}, metadata)
|
|
if hErr != nil {
|
|
endpoint.Abort()
|
|
}
|
|
}()
|
|
})
|
|
ipStack.SetTransportProtocolHandler(tcp.ProtocolNumber, tcpForwarder.HandlePacket)
|
|
if !t.endpointIndependentNat {
|
|
udpForwarder := udp.NewForwarder(ipStack, func(request *udp.ForwarderRequest) {
|
|
var wq waiter.Queue
|
|
endpoint, err := request.CreateEndpoint(&wq)
|
|
if err != nil {
|
|
return
|
|
}
|
|
udpConn := gonet.NewUDPConn(ipStack, &wq, endpoint)
|
|
lAddr := udpConn.RemoteAddr()
|
|
rAddr := udpConn.LocalAddr()
|
|
if lAddr == nil || rAddr == nil {
|
|
endpoint.Abort()
|
|
return
|
|
}
|
|
gConn := &gUDPConn{UDPConn: udpConn, stack: ipStack, packet: (*gRequest)(unsafe.Pointer(request)).pkt.IncRef()}
|
|
go func() {
|
|
var metadata M.Metadata
|
|
metadata.Source = M.SocksaddrFromNet(lAddr)
|
|
metadata.Destination = M.SocksaddrFromNet(rAddr)
|
|
ctx, conn := canceler.NewPacketConn(t.ctx, bufio.NewPacketConn(&bufio.UnbindPacketConn{ExtendedConn: bufio.NewExtendedConn(gConn), Addr: M.SocksaddrFromNet(rAddr)}), time.Duration(t.udpTimeout)*time.Second)
|
|
hErr := t.handler.NewPacketConnection(ctx, conn, metadata)
|
|
if hErr != nil {
|
|
endpoint.Abort()
|
|
}
|
|
}()
|
|
})
|
|
ipStack.SetTransportProtocolHandler(udp.ProtocolNumber, udpForwarder.HandlePacket)
|
|
} else {
|
|
ipStack.SetTransportProtocolHandler(udp.ProtocolNumber, NewUDPForwarder(t.ctx, ipStack, t.handler, t.udpTimeout).HandlePacket)
|
|
}
|
|
|
|
t.stack = ipStack
|
|
t.endpoint = linkEndpoint
|
|
return nil
|
|
}
|
|
|
|
func (t *GVisor) Close() error {
|
|
t.endpoint.Attach(nil)
|
|
t.stack.Close()
|
|
for _, endpoint := range t.stack.CleanupEndpoints() {
|
|
endpoint.Abort()
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func AddressFromAddr(destination netip.Addr) tcpip.Address {
|
|
if destination.Is6() {
|
|
return tcpip.AddrFrom16(destination.As16())
|
|
} else {
|
|
return tcpip.AddrFrom4(destination.As4())
|
|
}
|
|
}
|
|
|
|
func AddrFromAddress(address tcpip.Address) netip.Addr {
|
|
if address.Len() == 16 {
|
|
return netip.AddrFrom16(address.As16())
|
|
} else {
|
|
return netip.AddrFrom4(address.As4())
|
|
}
|
|
}
|
|
|
|
func newGVisorStack(ep stack.LinkEndpoint) (*stack.Stack, error) {
|
|
ipStack := stack.New(stack.Options{
|
|
NetworkProtocols: []stack.NetworkProtocolFactory{
|
|
ipv4.NewProtocol,
|
|
ipv6.NewProtocol,
|
|
},
|
|
TransportProtocols: []stack.TransportProtocolFactory{
|
|
tcp.NewProtocol,
|
|
udp.NewProtocol,
|
|
icmp.NewProtocol4,
|
|
icmp.NewProtocol6,
|
|
},
|
|
})
|
|
tErr := ipStack.CreateNIC(defaultNIC, ep)
|
|
if tErr != nil {
|
|
return nil, E.New("create nic: ", wrapStackError(tErr))
|
|
}
|
|
ipStack.SetRouteTable([]tcpip.Route{
|
|
{Destination: header.IPv4EmptySubnet, NIC: defaultNIC},
|
|
{Destination: header.IPv6EmptySubnet, NIC: defaultNIC},
|
|
})
|
|
ipStack.SetSpoofing(defaultNIC, true)
|
|
ipStack.SetPromiscuousMode(defaultNIC, true)
|
|
bufSize := 20 * 1024
|
|
ipStack.SetTransportProtocolOption(tcp.ProtocolNumber, &tcpip.TCPReceiveBufferSizeRangeOption{
|
|
Min: 1,
|
|
Default: bufSize,
|
|
Max: bufSize,
|
|
})
|
|
ipStack.SetTransportProtocolOption(tcp.ProtocolNumber, &tcpip.TCPSendBufferSizeRangeOption{
|
|
Min: 1,
|
|
Default: bufSize,
|
|
Max: bufSize,
|
|
})
|
|
sOpt := tcpip.TCPSACKEnabled(true)
|
|
ipStack.SetTransportProtocolOption(tcp.ProtocolNumber, &sOpt)
|
|
mOpt := tcpip.TCPModerateReceiveBufferOption(true)
|
|
ipStack.SetTransportProtocolOption(tcp.ProtocolNumber, &mOpt)
|
|
return ipStack, nil
|
|
}
|