2022-07-23 11:01:41 +00:00
|
|
|
//go:build linux
|
|
|
|
|
|
|
|
package process
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"encoding/binary"
|
|
|
|
"fmt"
|
2022-08-26 09:25:36 +00:00
|
|
|
"net"
|
2022-07-23 11:01:41 +00:00
|
|
|
"net/netip"
|
|
|
|
"os"
|
|
|
|
"path"
|
|
|
|
"strings"
|
|
|
|
"syscall"
|
|
|
|
"unicode"
|
|
|
|
"unsafe"
|
|
|
|
|
2022-08-26 09:25:36 +00:00
|
|
|
"github.com/sagernet/sing/common"
|
|
|
|
"github.com/sagernet/sing/common/buf"
|
|
|
|
E "github.com/sagernet/sing/common/exceptions"
|
2022-07-29 16:29:22 +00:00
|
|
|
N "github.com/sagernet/sing/common/network"
|
2022-07-23 11:01:41 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// from https://github.com/vishvananda/netlink/blob/bca67dfc8220b44ef582c9da4e9172bf1c9ec973/nl/nl_linux.go#L52-L62
|
|
|
|
var nativeEndian = func() binary.ByteOrder {
|
|
|
|
var x uint32 = 0x01020304
|
|
|
|
if *(*byte)(unsafe.Pointer(&x)) == 0x01 {
|
|
|
|
return binary.BigEndian
|
|
|
|
}
|
|
|
|
|
|
|
|
return binary.LittleEndian
|
|
|
|
}()
|
|
|
|
|
|
|
|
const (
|
|
|
|
sizeOfSocketDiagRequest = syscall.SizeofNlMsghdr + 8 + 48
|
|
|
|
socketDiagByFamily = 20
|
|
|
|
pathProc = "/proc"
|
|
|
|
)
|
|
|
|
|
2022-08-26 09:25:36 +00:00
|
|
|
func resolveSocketByNetlink(network string, source netip.AddrPort, destination netip.AddrPort) (inode, uid uint32, err error) {
|
2022-08-20 02:38:12 +00:00
|
|
|
var family uint8
|
|
|
|
var protocol uint8
|
2022-07-23 11:01:41 +00:00
|
|
|
|
|
|
|
switch network {
|
2022-07-29 16:29:22 +00:00
|
|
|
case N.NetworkTCP:
|
2022-07-23 11:01:41 +00:00
|
|
|
protocol = syscall.IPPROTO_TCP
|
2022-07-29 16:29:22 +00:00
|
|
|
case N.NetworkUDP:
|
2022-07-23 11:01:41 +00:00
|
|
|
protocol = syscall.IPPROTO_UDP
|
|
|
|
default:
|
2022-08-26 09:25:36 +00:00
|
|
|
return 0, 0, os.ErrInvalid
|
2022-07-23 11:01:41 +00:00
|
|
|
}
|
2022-08-26 09:25:36 +00:00
|
|
|
|
2022-08-20 02:38:12 +00:00
|
|
|
if source.Addr().Is4() {
|
2022-07-23 11:01:41 +00:00
|
|
|
family = syscall.AF_INET
|
|
|
|
} else {
|
|
|
|
family = syscall.AF_INET6
|
|
|
|
}
|
2022-08-26 09:25:36 +00:00
|
|
|
|
|
|
|
req := packSocketDiagRequest(family, protocol, source)
|
|
|
|
|
|
|
|
socket, err := syscall.Socket(syscall.AF_NETLINK, syscall.SOCK_DGRAM, syscall.NETLINK_INET_DIAG)
|
|
|
|
if err != nil {
|
|
|
|
return 0, 0, E.Cause(err, "dial netlink")
|
2022-07-23 11:01:41 +00:00
|
|
|
}
|
2022-08-26 09:25:36 +00:00
|
|
|
defer syscall.Close(socket)
|
|
|
|
|
|
|
|
syscall.SetsockoptTimeval(socket, syscall.SOL_SOCKET, syscall.SO_SNDTIMEO, &syscall.Timeval{Usec: 100})
|
|
|
|
syscall.SetsockoptTimeval(socket, syscall.SOL_SOCKET, syscall.SO_RCVTIMEO, &syscall.Timeval{Usec: 100})
|
|
|
|
|
|
|
|
err = syscall.Connect(socket, &syscall.SockaddrNetlink{
|
|
|
|
Family: syscall.AF_NETLINK,
|
|
|
|
Pad: 0,
|
|
|
|
Pid: 0,
|
|
|
|
Groups: 0,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
_, err = syscall.Write(socket, req)
|
|
|
|
if err != nil {
|
|
|
|
return 0, 0, E.Cause(err, "write netlink request")
|
|
|
|
}
|
|
|
|
|
|
|
|
_buffer := buf.StackNew()
|
|
|
|
defer common.KeepAlive(_buffer)
|
|
|
|
buffer := common.Dup(_buffer)
|
|
|
|
defer buffer.Release()
|
|
|
|
|
|
|
|
n, err := syscall.Read(socket, buffer.FreeBytes())
|
|
|
|
if err != nil {
|
|
|
|
return 0, 0, E.Cause(err, "read netlink response")
|
|
|
|
}
|
|
|
|
|
|
|
|
buffer.Truncate(n)
|
|
|
|
|
|
|
|
messages, err := syscall.ParseNetlinkMessage(buffer.Bytes())
|
2022-07-23 11:01:41 +00:00
|
|
|
if err != nil {
|
2022-08-26 09:25:36 +00:00
|
|
|
return 0, 0, E.Cause(err, "parse netlink message")
|
|
|
|
} else if len(messages) == 0 {
|
|
|
|
return 0, 0, E.New("unexcepted netlink response")
|
2022-07-23 11:01:41 +00:00
|
|
|
}
|
2022-08-26 09:25:36 +00:00
|
|
|
|
|
|
|
message := messages[0]
|
|
|
|
if message.Header.Type&syscall.NLMSG_ERROR != 0 {
|
|
|
|
return 0, 0, E.New("netlink message: NLMSG_ERROR")
|
2022-07-23 11:01:41 +00:00
|
|
|
}
|
2022-08-26 09:25:36 +00:00
|
|
|
|
|
|
|
inode, uid = unpackSocketDiagResponse(&messages[0])
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
func packSocketDiagRequest(family, protocol byte, source netip.AddrPort) []byte {
|
|
|
|
s := make([]byte, 16)
|
|
|
|
copy(s, source.Addr().AsSlice())
|
|
|
|
|
|
|
|
buf := make([]byte, sizeOfSocketDiagRequest)
|
|
|
|
|
|
|
|
nativeEndian.PutUint32(buf[0:4], sizeOfSocketDiagRequest)
|
|
|
|
nativeEndian.PutUint16(buf[4:6], socketDiagByFamily)
|
|
|
|
nativeEndian.PutUint16(buf[6:8], syscall.NLM_F_REQUEST|syscall.NLM_F_DUMP)
|
|
|
|
nativeEndian.PutUint32(buf[8:12], 0)
|
|
|
|
nativeEndian.PutUint32(buf[12:16], 0)
|
|
|
|
|
|
|
|
buf[16] = family
|
|
|
|
buf[17] = protocol
|
|
|
|
buf[18] = 0
|
|
|
|
buf[19] = 0
|
|
|
|
nativeEndian.PutUint32(buf[20:24], 0xFFFFFFFF)
|
|
|
|
|
|
|
|
binary.BigEndian.PutUint16(buf[24:26], source.Port())
|
|
|
|
binary.BigEndian.PutUint16(buf[26:28], 0)
|
|
|
|
|
|
|
|
copy(buf[28:44], s)
|
|
|
|
copy(buf[44:60], net.IPv6zero)
|
|
|
|
|
|
|
|
nativeEndian.PutUint32(buf[60:64], 0)
|
|
|
|
nativeEndian.PutUint64(buf[64:72], 0xFFFFFFFFFFFFFFFF)
|
|
|
|
|
|
|
|
return buf
|
|
|
|
}
|
|
|
|
|
|
|
|
func unpackSocketDiagResponse(msg *syscall.NetlinkMessage) (inode, uid uint32) {
|
|
|
|
if len(msg.Data) < 72 {
|
|
|
|
return 0, 0
|
|
|
|
}
|
|
|
|
|
|
|
|
data := msg.Data
|
|
|
|
|
|
|
|
uid = nativeEndian.Uint32(data[64:68])
|
|
|
|
inode = nativeEndian.Uint32(data[68:72])
|
|
|
|
|
|
|
|
return
|
2022-07-23 11:01:41 +00:00
|
|
|
}
|
|
|
|
|
2022-08-20 02:38:12 +00:00
|
|
|
func resolveProcessNameByProcSearch(inode, uid uint32) (string, error) {
|
2022-07-23 11:01:41 +00:00
|
|
|
files, err := os.ReadDir(pathProc)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
buffer := make([]byte, syscall.PathMax)
|
|
|
|
socket := []byte(fmt.Sprintf("socket:[%d]", inode))
|
|
|
|
|
|
|
|
for _, f := range files {
|
|
|
|
if !f.IsDir() || !isPid(f.Name()) {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
info, err := f.Info()
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
2022-08-20 02:38:12 +00:00
|
|
|
if info.Sys().(*syscall.Stat_t).Uid != uid {
|
2022-07-23 11:01:41 +00:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
processPath := path.Join(pathProc, f.Name())
|
|
|
|
fdPath := path.Join(processPath, "fd")
|
|
|
|
|
|
|
|
fds, err := os.ReadDir(fdPath)
|
|
|
|
if err != nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, fd := range fds {
|
|
|
|
n, err := syscall.Readlink(path.Join(fdPath, fd.Name()), buffer)
|
|
|
|
if err != nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
if bytes.Equal(buffer[:n], socket) {
|
|
|
|
return os.Readlink(path.Join(processPath, "exe"))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return "", fmt.Errorf("process of uid(%d),inode(%d) not found", uid, inode)
|
|
|
|
}
|
|
|
|
|
|
|
|
func isPid(s string) bool {
|
|
|
|
return strings.IndexFunc(s, func(r rune) bool {
|
|
|
|
return !unicode.IsDigit(r)
|
|
|
|
}) == -1
|
|
|
|
}
|