2022-09-15 12:20:38 +08:00
|
|
|
//go:build with_gvisor
|
2022-09-06 00:15:09 +08:00
|
|
|
|
|
|
|
package wireguard
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"net"
|
|
|
|
"net/netip"
|
|
|
|
"os"
|
|
|
|
|
2023-06-11 22:07:22 +08:00
|
|
|
"github.com/sagernet/gvisor/pkg/buffer"
|
|
|
|
"github.com/sagernet/gvisor/pkg/tcpip"
|
|
|
|
"github.com/sagernet/gvisor/pkg/tcpip/adapters/gonet"
|
|
|
|
"github.com/sagernet/gvisor/pkg/tcpip/header"
|
|
|
|
"github.com/sagernet/gvisor/pkg/tcpip/network/ipv4"
|
|
|
|
"github.com/sagernet/gvisor/pkg/tcpip/network/ipv6"
|
|
|
|
"github.com/sagernet/gvisor/pkg/tcpip/stack"
|
|
|
|
"github.com/sagernet/gvisor/pkg/tcpip/transport/icmp"
|
|
|
|
"github.com/sagernet/gvisor/pkg/tcpip/transport/tcp"
|
|
|
|
"github.com/sagernet/gvisor/pkg/tcpip/transport/udp"
|
2023-06-13 22:38:05 +08:00
|
|
|
"github.com/sagernet/sing-tun"
|
|
|
|
"github.com/sagernet/sing/common/buf"
|
|
|
|
E "github.com/sagernet/sing/common/exceptions"
|
|
|
|
M "github.com/sagernet/sing/common/metadata"
|
|
|
|
N "github.com/sagernet/sing/common/network"
|
|
|
|
wgTun "github.com/sagernet/wireguard-go/tun"
|
2022-09-06 00:15:09 +08:00
|
|
|
)
|
|
|
|
|
|
|
|
var _ Device = (*StackDevice)(nil)
|
|
|
|
|
|
|
|
const defaultNIC tcpip.NICID = 1
|
|
|
|
|
|
|
|
type StackDevice struct {
|
2023-04-20 13:16:31 +08:00
|
|
|
stack *stack.Stack
|
|
|
|
mtu uint32
|
|
|
|
events chan wgTun.Event
|
2024-02-14 13:08:08 +08:00
|
|
|
outbound chan *stack.PacketBuffer
|
2023-04-20 13:16:31 +08:00
|
|
|
packetOutbound chan *buf.Buffer
|
|
|
|
done chan struct{}
|
|
|
|
dispatcher stack.NetworkDispatcher
|
|
|
|
addr4 tcpip.Address
|
|
|
|
addr6 tcpip.Address
|
2022-09-06 00:15:09 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
func NewStackDevice(localAddresses []netip.Prefix, mtu uint32) (*StackDevice, error) {
|
|
|
|
ipStack := stack.New(stack.Options{
|
|
|
|
NetworkProtocols: []stack.NetworkProtocolFactory{ipv4.NewProtocol, ipv6.NewProtocol},
|
|
|
|
TransportProtocols: []stack.TransportProtocolFactory{tcp.NewProtocol, udp.NewProtocol, icmp.NewProtocol4, icmp.NewProtocol6},
|
|
|
|
HandleLocal: true,
|
|
|
|
})
|
|
|
|
tunDevice := &StackDevice{
|
2023-04-20 13:16:31 +08:00
|
|
|
stack: ipStack,
|
|
|
|
mtu: mtu,
|
|
|
|
events: make(chan wgTun.Event, 1),
|
2024-02-14 13:08:08 +08:00
|
|
|
outbound: make(chan *stack.PacketBuffer, 256),
|
2023-04-20 13:16:31 +08:00
|
|
|
packetOutbound: make(chan *buf.Buffer, 256),
|
|
|
|
done: make(chan struct{}),
|
2022-09-06 00:15:09 +08:00
|
|
|
}
|
|
|
|
err := ipStack.CreateNIC(defaultNIC, (*wireEndpoint)(tunDevice))
|
|
|
|
if err != nil {
|
|
|
|
return nil, E.New(err.String())
|
|
|
|
}
|
|
|
|
for _, prefix := range localAddresses {
|
2023-06-11 15:07:32 +08:00
|
|
|
addr := tun.AddressFromAddr(prefix.Addr())
|
2022-09-06 00:15:09 +08:00
|
|
|
protoAddr := tcpip.ProtocolAddress{
|
|
|
|
AddressWithPrefix: tcpip.AddressWithPrefix{
|
|
|
|
Address: addr,
|
|
|
|
PrefixLen: prefix.Bits(),
|
|
|
|
},
|
|
|
|
}
|
|
|
|
if prefix.Addr().Is4() {
|
|
|
|
tunDevice.addr4 = addr
|
|
|
|
protoAddr.Protocol = ipv4.ProtocolNumber
|
|
|
|
} else {
|
|
|
|
tunDevice.addr6 = addr
|
|
|
|
protoAddr.Protocol = ipv6.ProtocolNumber
|
|
|
|
}
|
|
|
|
err = ipStack.AddProtocolAddress(defaultNIC, protoAddr, stack.AddressProperties{})
|
|
|
|
if err != nil {
|
|
|
|
return nil, E.New("parse local address ", protoAddr.AddressWithPrefix, ": ", err.String())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
sOpt := tcpip.TCPSACKEnabled(true)
|
|
|
|
ipStack.SetTransportProtocolOption(tcp.ProtocolNumber, &sOpt)
|
|
|
|
cOpt := tcpip.CongestionControlOption("cubic")
|
|
|
|
ipStack.SetTransportProtocolOption(tcp.ProtocolNumber, &cOpt)
|
|
|
|
ipStack.AddRoute(tcpip.Route{Destination: header.IPv4EmptySubnet, NIC: defaultNIC})
|
|
|
|
ipStack.AddRoute(tcpip.Route{Destination: header.IPv6EmptySubnet, NIC: defaultNIC})
|
|
|
|
return tunDevice, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (w *StackDevice) NewEndpoint() (stack.LinkEndpoint, error) {
|
|
|
|
return (*wireEndpoint)(w), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (w *StackDevice) DialContext(ctx context.Context, network string, destination M.Socksaddr) (net.Conn, error) {
|
|
|
|
addr := tcpip.FullAddress{
|
|
|
|
NIC: defaultNIC,
|
|
|
|
Port: destination.Port,
|
2023-06-11 15:07:32 +08:00
|
|
|
Addr: tun.AddressFromAddr(destination.Addr),
|
2022-09-06 00:15:09 +08:00
|
|
|
}
|
|
|
|
bind := tcpip.FullAddress{
|
|
|
|
NIC: defaultNIC,
|
|
|
|
}
|
|
|
|
var networkProtocol tcpip.NetworkProtocolNumber
|
|
|
|
if destination.IsIPv4() {
|
|
|
|
networkProtocol = header.IPv4ProtocolNumber
|
|
|
|
bind.Addr = w.addr4
|
|
|
|
} else {
|
|
|
|
networkProtocol = header.IPv6ProtocolNumber
|
|
|
|
bind.Addr = w.addr6
|
|
|
|
}
|
|
|
|
switch N.NetworkName(network) {
|
|
|
|
case N.NetworkTCP:
|
2023-04-26 10:47:32 +08:00
|
|
|
tcpConn, err := DialTCPWithBind(ctx, w.stack, bind, addr, networkProtocol)
|
2023-03-13 13:24:42 +08:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return tcpConn, nil
|
2022-09-06 00:15:09 +08:00
|
|
|
case N.NetworkUDP:
|
2023-03-13 13:24:42 +08:00
|
|
|
udpConn, err := gonet.DialUDP(w.stack, &bind, &addr, networkProtocol)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return udpConn, nil
|
2022-09-06 00:15:09 +08:00
|
|
|
default:
|
|
|
|
return nil, E.Extend(N.ErrUnknownNetwork, network)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (w *StackDevice) ListenPacket(ctx context.Context, destination M.Socksaddr) (net.PacketConn, error) {
|
|
|
|
bind := tcpip.FullAddress{
|
|
|
|
NIC: defaultNIC,
|
|
|
|
}
|
|
|
|
var networkProtocol tcpip.NetworkProtocolNumber
|
2023-06-11 15:07:32 +08:00
|
|
|
if destination.IsIPv4() {
|
2022-09-06 00:15:09 +08:00
|
|
|
networkProtocol = header.IPv4ProtocolNumber
|
|
|
|
bind.Addr = w.addr4
|
|
|
|
} else {
|
|
|
|
networkProtocol = header.IPv6ProtocolNumber
|
|
|
|
bind.Addr = w.addr6
|
|
|
|
}
|
2023-03-13 13:24:42 +08:00
|
|
|
udpConn, err := gonet.DialUDP(w.stack, &bind, nil, networkProtocol)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return udpConn, nil
|
2022-09-06 00:15:09 +08:00
|
|
|
}
|
|
|
|
|
2023-04-20 13:16:31 +08:00
|
|
|
func (w *StackDevice) Inet4Address() netip.Addr {
|
2023-06-11 15:07:32 +08:00
|
|
|
return tun.AddrFromAddress(w.addr4)
|
2023-04-20 13:16:31 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
func (w *StackDevice) Inet6Address() netip.Addr {
|
2023-06-11 15:07:32 +08:00
|
|
|
return tun.AddrFromAddress(w.addr6)
|
2023-04-20 13:16:31 +08:00
|
|
|
}
|
|
|
|
|
2022-09-06 00:15:09 +08:00
|
|
|
func (w *StackDevice) Start() error {
|
2023-04-20 13:16:31 +08:00
|
|
|
w.events <- wgTun.EventUp
|
2022-09-06 00:15:09 +08:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (w *StackDevice) File() *os.File {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-04-20 13:16:31 +08:00
|
|
|
func (w *StackDevice) Read(bufs [][]byte, sizes []int, offset int) (count int, err error) {
|
2022-11-06 10:20:23 +08:00
|
|
|
select {
|
|
|
|
case packetBuffer, ok := <-w.outbound:
|
|
|
|
if !ok {
|
|
|
|
return 0, os.ErrClosed
|
|
|
|
}
|
|
|
|
defer packetBuffer.DecRef()
|
2023-04-20 13:16:31 +08:00
|
|
|
p := bufs[0]
|
2022-11-06 10:20:23 +08:00
|
|
|
p = p[offset:]
|
2023-04-20 13:16:31 +08:00
|
|
|
n := 0
|
2022-11-06 10:20:23 +08:00
|
|
|
for _, slice := range packetBuffer.AsSlices() {
|
|
|
|
n += copy(p[n:], slice)
|
|
|
|
}
|
2023-04-20 13:16:31 +08:00
|
|
|
sizes[0] = n
|
|
|
|
count = 1
|
|
|
|
return
|
|
|
|
case packet := <-w.packetOutbound:
|
|
|
|
defer packet.Release()
|
|
|
|
sizes[0] = copy(bufs[0][offset:], packet.Bytes())
|
|
|
|
count = 1
|
2022-11-06 10:20:23 +08:00
|
|
|
return
|
|
|
|
case <-w.done:
|
2022-09-06 00:15:09 +08:00
|
|
|
return 0, os.ErrClosed
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-04-20 13:16:31 +08:00
|
|
|
func (w *StackDevice) Write(bufs [][]byte, offset int) (count int, err error) {
|
|
|
|
for _, b := range bufs {
|
|
|
|
b = b[offset:]
|
|
|
|
if len(b) == 0 {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
var networkProtocol tcpip.NetworkProtocolNumber
|
|
|
|
switch header.IPVersion(b) {
|
|
|
|
case header.IPv4Version:
|
|
|
|
networkProtocol = header.IPv4ProtocolNumber
|
|
|
|
case header.IPv6Version:
|
|
|
|
networkProtocol = header.IPv6ProtocolNumber
|
|
|
|
}
|
|
|
|
packetBuffer := stack.NewPacketBuffer(stack.PacketBufferOptions{
|
2023-06-11 15:07:32 +08:00
|
|
|
Payload: buffer.MakeWithData(b),
|
2023-04-20 13:16:31 +08:00
|
|
|
})
|
|
|
|
w.dispatcher.DeliverNetworkPacket(networkProtocol, packetBuffer)
|
|
|
|
packetBuffer.DecRef()
|
|
|
|
count++
|
2022-09-06 00:15:09 +08:00
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
func (w *StackDevice) Flush() error {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (w *StackDevice) MTU() (int, error) {
|
|
|
|
return int(w.mtu), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (w *StackDevice) Name() (string, error) {
|
|
|
|
return "sing-box", nil
|
|
|
|
}
|
|
|
|
|
2023-04-20 13:16:31 +08:00
|
|
|
func (w *StackDevice) Events() <-chan wgTun.Event {
|
2022-09-06 00:15:09 +08:00
|
|
|
return w.events
|
|
|
|
}
|
|
|
|
|
|
|
|
func (w *StackDevice) Close() error {
|
2024-08-26 14:01:32 +08:00
|
|
|
close(w.done)
|
|
|
|
close(w.events)
|
2022-09-06 00:15:09 +08:00
|
|
|
w.stack.Close()
|
|
|
|
for _, endpoint := range w.stack.CleanupEndpoints() {
|
|
|
|
endpoint.Abort()
|
|
|
|
}
|
|
|
|
w.stack.Wait()
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-04-20 13:16:31 +08:00
|
|
|
func (w *StackDevice) BatchSize() int {
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2022-09-06 00:15:09 +08:00
|
|
|
var _ stack.LinkEndpoint = (*wireEndpoint)(nil)
|
|
|
|
|
|
|
|
type wireEndpoint StackDevice
|
|
|
|
|
|
|
|
func (ep *wireEndpoint) MTU() uint32 {
|
|
|
|
return ep.mtu
|
|
|
|
}
|
|
|
|
|
2024-10-21 23:38:34 +08:00
|
|
|
func (ep *wireEndpoint) SetMTU(mtu uint32) {
|
|
|
|
}
|
|
|
|
|
2022-09-06 00:15:09 +08:00
|
|
|
func (ep *wireEndpoint) MaxHeaderLength() uint16 {
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ep *wireEndpoint) LinkAddress() tcpip.LinkAddress {
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
2024-10-21 23:38:34 +08:00
|
|
|
func (ep *wireEndpoint) SetLinkAddress(addr tcpip.LinkAddress) {
|
|
|
|
}
|
|
|
|
|
2022-09-06 00:15:09 +08:00
|
|
|
func (ep *wireEndpoint) Capabilities() stack.LinkEndpointCapabilities {
|
2023-12-20 20:00:00 +08:00
|
|
|
return stack.CapabilityRXChecksumOffload
|
2022-09-06 00:15:09 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
func (ep *wireEndpoint) Attach(dispatcher stack.NetworkDispatcher) {
|
|
|
|
ep.dispatcher = dispatcher
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ep *wireEndpoint) IsAttached() bool {
|
|
|
|
return ep.dispatcher != nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ep *wireEndpoint) Wait() {
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ep *wireEndpoint) ARPHardwareType() header.ARPHardwareType {
|
|
|
|
return header.ARPHardwareNone
|
|
|
|
}
|
|
|
|
|
2024-02-14 13:08:08 +08:00
|
|
|
func (ep *wireEndpoint) AddHeader(buffer *stack.PacketBuffer) {
|
2022-09-06 00:15:09 +08:00
|
|
|
}
|
|
|
|
|
2024-02-14 13:08:08 +08:00
|
|
|
func (ep *wireEndpoint) ParseHeader(ptr *stack.PacketBuffer) bool {
|
2023-10-21 12:00:00 +08:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2022-09-06 00:15:09 +08:00
|
|
|
func (ep *wireEndpoint) WritePackets(list stack.PacketBufferList) (int, tcpip.Error) {
|
|
|
|
for _, packetBuffer := range list.AsSlice() {
|
|
|
|
packetBuffer.IncRef()
|
2022-11-06 10:20:23 +08:00
|
|
|
select {
|
|
|
|
case <-ep.done:
|
|
|
|
return 0, &tcpip.ErrClosedForSend{}
|
|
|
|
case ep.outbound <- packetBuffer:
|
|
|
|
}
|
2022-09-06 00:15:09 +08:00
|
|
|
}
|
|
|
|
return list.Len(), nil
|
|
|
|
}
|
2024-10-21 23:38:34 +08:00
|
|
|
|
|
|
|
func (ep *wireEndpoint) Close() {
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ep *wireEndpoint) SetOnCloseAction(f func()) {
|
|
|
|
}
|