005af4a9c7
All was well with NetSetupAnticipatedInstanceId, until a bug crept into recent Windows builds that caused old GUIDs not to be properly removed, resulting in subsequent adapter creations to fail, because NetSetup AnticipatedInstanceId considers it fatal when the target GUID already exists, even if in diminished form. The initial solution was to detect cruft, and then steal a TrustedInstaller token and sleuth around the registry cleaning things up. The horror! Uncomfortable with this, I reopened IDA and had a look around with fresh eyes, three years after the original discovery of NetSetupAnticipated InstanceId. There, I found some interesting behavior in NetSetupSvcDeviceManager::InstallNetworkInterfaces, which amounts to something like: if (IsSet("RetiredNetCfgInstanceId") { if (IsSet("NetSetupAnticipatedInstanceId") DeleteAdapter(GetValue("RetiredNetCfgInstanceId")); else Set("NetSetupAnticipatedInstanceId", GetValue("RetiredNetCfgInstanceId")); Delete("RetiredNetCfgInstanceId"); } CreateAdapter = TRUE; if (IsSet("NetSetupAnticipatedInstanceId")) { Guid = GetValue("NetSetupAnticipatedInstanceId"); if (AdapterAlreadyExists(Guid)) CreateAdapter = FALSE; else SetGuidOfNewAdapter(Guid); Delete("NetSetupAnticipatedInstanceId"); } else if (IsSet("SuggestedInstanceId")) { Guid = GetValue("SuggestedInstanceId"); if (!AdapterAlreadyExists(Guid)) SetGuidOfNewAdapter(Guid); Delete("SuggestedInstanceId"); } Thus, one appealing strategy would be to set both NetSetupAnticipated InstanceId and RetiredInstanceId to the same value, and let the service handle deleting the old one for us before creating the new one. However, the cleanup of the old adapter winds up being quasi- asynchronous, and thus we still wind up in the CreateAdapter = FALSE case. So, the remaining strategy is to simply use SuggestedInstanceId instead. This has the behavior that if there's an adapter already in use, it'll use a new random GUID. The result is that adapter creation won't fail. That's not great, but the docs have always made it clear that "requested" is a best-effort sort of thing. Plus, hopefully the creation of the new adapter will help nudge the bug a bit and cleanup the old cruft. In some ways, transitioning from our old strategy of "cudgel the registry until we get the GUID we want" to "ask politely and accept no for an answer" is a disappointing regression in functionality. But it also means we don't need to keep crazy token stealing code around, or fish around in the registry dangerously. This probably also increases the likelihood that an adapter will be created during edge cases, which means fewer errors for users, which could be a good thing. On the downside, we have the perpetual tensions caused by a system that now "fails open" instead of "fails closed". But so it goes in Windows land. Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
293 lines
9.9 KiB
C
293 lines
9.9 KiB
C
/* SPDX-License-Identifier: GPL-2.0
|
|
*
|
|
* Copyright (C) 2018-2021 WireGuard LLC. All Rights Reserved.
|
|
*/
|
|
|
|
#include "adapter.h"
|
|
#include "entry.h"
|
|
#include "logger.h"
|
|
#include "wintun.h"
|
|
#include <Windows.h>
|
|
|
|
#pragma warning(disable : 4200) /* nonstandard: zero-sized array in struct/union */
|
|
|
|
#define TUN_ALIGNMENT sizeof(ULONG)
|
|
#define TUN_ALIGN(Size) (((ULONG)(Size) + ((ULONG)TUN_ALIGNMENT - 1)) & ~((ULONG)TUN_ALIGNMENT - 1))
|
|
#define TUN_IS_ALIGNED(Size) (!((ULONG)(Size) & ((ULONG)TUN_ALIGNMENT - 1)))
|
|
#define TUN_MAX_PACKET_SIZE TUN_ALIGN(sizeof(TUN_PACKET) + WINTUN_MAX_IP_PACKET_SIZE)
|
|
#define TUN_RING_CAPACITY(Size) ((Size) - sizeof(TUN_RING) - (TUN_MAX_PACKET_SIZE - TUN_ALIGNMENT))
|
|
#define TUN_RING_SIZE(Capacity) (sizeof(TUN_RING) + (Capacity) + (TUN_MAX_PACKET_SIZE - TUN_ALIGNMENT))
|
|
#define TUN_RING_WRAP(Value, Capacity) ((Value) & (Capacity - 1))
|
|
#define LOCK_SPIN_COUNT 0x10000
|
|
#define TUN_PACKET_RELEASE ((DWORD)0x80000000)
|
|
|
|
typedef struct _TUN_PACKET
|
|
{
|
|
ULONG Size;
|
|
UCHAR Data[];
|
|
} TUN_PACKET;
|
|
|
|
typedef struct _TUN_RING
|
|
{
|
|
volatile ULONG Head;
|
|
volatile ULONG Tail;
|
|
volatile LONG Alertable;
|
|
UCHAR Data[];
|
|
} TUN_RING;
|
|
|
|
#define TUN_IOCTL_REGISTER_RINGS CTL_CODE(51820U, 0x970U, METHOD_BUFFERED, FILE_READ_DATA | FILE_WRITE_DATA)
|
|
|
|
typedef struct _TUN_REGISTER_RINGS
|
|
{
|
|
struct
|
|
{
|
|
ULONG RingSize;
|
|
TUN_RING *Ring;
|
|
HANDLE TailMoved;
|
|
} Send, Receive;
|
|
} TUN_REGISTER_RINGS;
|
|
|
|
typedef struct _TUN_SESSION
|
|
{
|
|
ULONG Capacity;
|
|
struct
|
|
{
|
|
ULONG Tail;
|
|
ULONG TailRelease;
|
|
ULONG PacketsToRelease;
|
|
CRITICAL_SECTION Lock;
|
|
} Receive;
|
|
struct
|
|
{
|
|
ULONG Head;
|
|
ULONG HeadRelease;
|
|
ULONG PacketsToRelease;
|
|
CRITICAL_SECTION Lock;
|
|
} Send;
|
|
TUN_REGISTER_RINGS Descriptor;
|
|
HANDLE Handle;
|
|
} TUN_SESSION;
|
|
|
|
_Return_type_success_(return != NULL) TUN_SESSION *WINAPI
|
|
WintunStartSession(_In_ const WINTUN_ADAPTER *Adapter, _In_ DWORD Capacity)
|
|
{
|
|
DWORD LastError;
|
|
TUN_SESSION *Session = Zalloc(sizeof(TUN_SESSION));
|
|
if (!Session)
|
|
{
|
|
LastError = GetLastError();
|
|
goto cleanup;
|
|
}
|
|
const ULONG RingSize = TUN_RING_SIZE(Capacity);
|
|
BYTE *AllocatedRegion = VirtualAlloc(0, (size_t)RingSize * 2, MEM_COMMIT | MEM_RESERVE, PAGE_READWRITE);
|
|
if (!AllocatedRegion)
|
|
{
|
|
LastError = LOG_LAST_ERROR(L"Failed to allocate ring memory (requested size: 0x%zx)", (size_t)RingSize * 2);
|
|
goto cleanupRings;
|
|
}
|
|
Session->Descriptor.Send.RingSize = RingSize;
|
|
Session->Descriptor.Send.Ring = (TUN_RING *)AllocatedRegion;
|
|
Session->Descriptor.Send.TailMoved = CreateEventW(&SecurityAttributes, FALSE, FALSE, NULL);
|
|
if (!Session->Descriptor.Send.TailMoved)
|
|
{
|
|
LastError = LOG_LAST_ERROR(L"Failed to create send event");
|
|
goto cleanupAllocatedRegion;
|
|
}
|
|
|
|
Session->Descriptor.Receive.RingSize = RingSize;
|
|
Session->Descriptor.Receive.Ring = (TUN_RING *)(AllocatedRegion + RingSize);
|
|
Session->Descriptor.Receive.TailMoved = CreateEventW(&SecurityAttributes, FALSE, FALSE, NULL);
|
|
if (!Session->Descriptor.Receive.TailMoved)
|
|
{
|
|
LastError = LOG_LAST_ERROR(L"Failed to create receive event");
|
|
goto cleanupSendTailMoved;
|
|
}
|
|
|
|
Session->Handle = AdapterOpenDeviceObject(Adapter);
|
|
if (Session->Handle == INVALID_HANDLE_VALUE)
|
|
{
|
|
LastError = LOG(WINTUN_LOG_ERR, L"Failed to open adapter device object");
|
|
goto cleanupReceiveTailMoved;
|
|
}
|
|
DWORD BytesReturned;
|
|
if (!DeviceIoControl(
|
|
Session->Handle,
|
|
TUN_IOCTL_REGISTER_RINGS,
|
|
&Session->Descriptor,
|
|
sizeof(TUN_REGISTER_RINGS),
|
|
NULL,
|
|
0,
|
|
&BytesReturned,
|
|
NULL))
|
|
{
|
|
LastError = LOG_LAST_ERROR(L"Failed to register rings");
|
|
goto cleanupHandle;
|
|
}
|
|
Session->Capacity = Capacity;
|
|
(void)InitializeCriticalSectionAndSpinCount(&Session->Receive.Lock, LOCK_SPIN_COUNT);
|
|
(void)InitializeCriticalSectionAndSpinCount(&Session->Send.Lock, LOCK_SPIN_COUNT);
|
|
return Session;
|
|
cleanupHandle:
|
|
CloseHandle(Session->Handle);
|
|
cleanupReceiveTailMoved:
|
|
CloseHandle(Session->Descriptor.Receive.TailMoved);
|
|
cleanupSendTailMoved:
|
|
CloseHandle(Session->Descriptor.Send.TailMoved);
|
|
cleanupAllocatedRegion:
|
|
VirtualFree(AllocatedRegion, 0, MEM_RELEASE);
|
|
cleanupRings:
|
|
Free(Session);
|
|
cleanup:
|
|
SetLastError(LastError);
|
|
return NULL;
|
|
}
|
|
|
|
void WINAPI
|
|
WintunEndSession(_In_ TUN_SESSION *Session)
|
|
{
|
|
DeleteCriticalSection(&Session->Send.Lock);
|
|
DeleteCriticalSection(&Session->Receive.Lock);
|
|
CloseHandle(Session->Handle);
|
|
CloseHandle(Session->Descriptor.Send.TailMoved);
|
|
CloseHandle(Session->Descriptor.Receive.TailMoved);
|
|
VirtualFree(Session->Descriptor.Send.Ring, 0, MEM_RELEASE);
|
|
Free(Session);
|
|
}
|
|
|
|
HANDLE WINAPI
|
|
WintunGetReadWaitEvent(_In_ TUN_SESSION *Session)
|
|
{
|
|
return Session->Descriptor.Send.TailMoved;
|
|
}
|
|
|
|
_Return_type_success_(return != NULL) _Ret_bytecount_(*PacketSize) BYTE *WINAPI
|
|
WintunReceivePacket(_In_ TUN_SESSION *Session, _Out_ DWORD *PacketSize)
|
|
{
|
|
DWORD LastError;
|
|
EnterCriticalSection(&Session->Send.Lock);
|
|
if (Session->Send.Head >= Session->Capacity)
|
|
{
|
|
LastError = ERROR_HANDLE_EOF;
|
|
goto cleanup;
|
|
}
|
|
const ULONG BuffTail = ReadULongAcquire(&Session->Descriptor.Send.Ring->Tail);
|
|
if (BuffTail >= Session->Capacity)
|
|
{
|
|
LastError = ERROR_HANDLE_EOF;
|
|
goto cleanup;
|
|
}
|
|
if (Session->Send.Head == BuffTail)
|
|
{
|
|
LastError = ERROR_NO_MORE_ITEMS;
|
|
goto cleanup;
|
|
}
|
|
const ULONG BuffContent = TUN_RING_WRAP(BuffTail - Session->Send.Head, Session->Capacity);
|
|
if (BuffContent < sizeof(TUN_PACKET))
|
|
{
|
|
LastError = ERROR_INVALID_DATA;
|
|
goto cleanup;
|
|
}
|
|
TUN_PACKET *BuffPacket = (TUN_PACKET *)&Session->Descriptor.Send.Ring->Data[Session->Send.Head];
|
|
if (BuffPacket->Size > WINTUN_MAX_IP_PACKET_SIZE)
|
|
{
|
|
LastError = ERROR_INVALID_DATA;
|
|
goto cleanup;
|
|
}
|
|
const ULONG AlignedPacketSize = TUN_ALIGN(sizeof(TUN_PACKET) + BuffPacket->Size);
|
|
if (AlignedPacketSize > BuffContent)
|
|
{
|
|
LastError = ERROR_INVALID_DATA;
|
|
goto cleanup;
|
|
}
|
|
*PacketSize = BuffPacket->Size;
|
|
BYTE *Packet = BuffPacket->Data;
|
|
Session->Send.Head = TUN_RING_WRAP(Session->Send.Head + AlignedPacketSize, Session->Capacity);
|
|
Session->Send.PacketsToRelease++;
|
|
LeaveCriticalSection(&Session->Send.Lock);
|
|
return Packet;
|
|
cleanup:
|
|
LeaveCriticalSection(&Session->Send.Lock);
|
|
SetLastError(LastError);
|
|
return NULL;
|
|
}
|
|
|
|
void WINAPI
|
|
WintunReleaseReceivePacket(_In_ TUN_SESSION *Session, _In_ const BYTE *Packet)
|
|
{
|
|
EnterCriticalSection(&Session->Send.Lock);
|
|
TUN_PACKET *ReleasedBuffPacket = (TUN_PACKET *)(Packet - offsetof(TUN_PACKET, Data));
|
|
ReleasedBuffPacket->Size |= TUN_PACKET_RELEASE;
|
|
while (Session->Send.PacketsToRelease)
|
|
{
|
|
const TUN_PACKET *BuffPacket = (TUN_PACKET *)&Session->Descriptor.Send.Ring->Data[Session->Send.HeadRelease];
|
|
if ((BuffPacket->Size & TUN_PACKET_RELEASE) == 0)
|
|
break;
|
|
const ULONG AlignedPacketSize = TUN_ALIGN(sizeof(TUN_PACKET) + (BuffPacket->Size & ~TUN_PACKET_RELEASE));
|
|
Session->Send.HeadRelease = TUN_RING_WRAP(Session->Send.HeadRelease + AlignedPacketSize, Session->Capacity);
|
|
Session->Send.PacketsToRelease--;
|
|
}
|
|
WriteULongRelease(&Session->Descriptor.Send.Ring->Head, Session->Send.HeadRelease);
|
|
LeaveCriticalSection(&Session->Send.Lock);
|
|
}
|
|
|
|
_Return_type_success_(return != NULL) _Ret_bytecount_(PacketSize) BYTE *WINAPI
|
|
WintunAllocateSendPacket(_In_ TUN_SESSION *Session, _In_ DWORD PacketSize)
|
|
{
|
|
DWORD LastError;
|
|
EnterCriticalSection(&Session->Receive.Lock);
|
|
if (Session->Receive.Tail >= Session->Capacity)
|
|
{
|
|
LastError = ERROR_HANDLE_EOF;
|
|
goto cleanup;
|
|
}
|
|
const ULONG AlignedPacketSize = TUN_ALIGN(sizeof(TUN_PACKET) + PacketSize);
|
|
const ULONG BuffHead = ReadULongAcquire(&Session->Descriptor.Receive.Ring->Head);
|
|
if (BuffHead >= Session->Capacity)
|
|
{
|
|
LastError = ERROR_HANDLE_EOF;
|
|
goto cleanup;
|
|
}
|
|
const ULONG BuffSpace = TUN_RING_WRAP(BuffHead - Session->Receive.Tail - TUN_ALIGNMENT, Session->Capacity);
|
|
if (AlignedPacketSize > BuffSpace)
|
|
{
|
|
LastError = ERROR_BUFFER_OVERFLOW;
|
|
goto cleanup;
|
|
}
|
|
TUN_PACKET *BuffPacket = (TUN_PACKET *)&Session->Descriptor.Receive.Ring->Data[Session->Receive.Tail];
|
|
BuffPacket->Size = PacketSize | TUN_PACKET_RELEASE;
|
|
BYTE *Packet = BuffPacket->Data;
|
|
Session->Receive.Tail = TUN_RING_WRAP(Session->Receive.Tail + AlignedPacketSize, Session->Capacity);
|
|
Session->Receive.PacketsToRelease++;
|
|
LeaveCriticalSection(&Session->Receive.Lock);
|
|
return Packet;
|
|
cleanup:
|
|
LeaveCriticalSection(&Session->Receive.Lock);
|
|
SetLastError(LastError);
|
|
return NULL;
|
|
}
|
|
|
|
void WINAPI
|
|
WintunSendPacket(_In_ TUN_SESSION *Session, _In_ const BYTE *Packet)
|
|
{
|
|
EnterCriticalSection(&Session->Receive.Lock);
|
|
TUN_PACKET *ReleasedBuffPacket = (TUN_PACKET *)(Packet - offsetof(TUN_PACKET, Data));
|
|
ReleasedBuffPacket->Size &= ~TUN_PACKET_RELEASE;
|
|
while (Session->Receive.PacketsToRelease)
|
|
{
|
|
const TUN_PACKET *BuffPacket =
|
|
(TUN_PACKET *)&Session->Descriptor.Receive.Ring->Data[Session->Receive.TailRelease];
|
|
if (BuffPacket->Size & TUN_PACKET_RELEASE)
|
|
break;
|
|
const ULONG AlignedPacketSize = TUN_ALIGN(sizeof(TUN_PACKET) + BuffPacket->Size);
|
|
Session->Receive.TailRelease =
|
|
TUN_RING_WRAP(Session->Receive.TailRelease + AlignedPacketSize, Session->Capacity);
|
|
Session->Receive.PacketsToRelease--;
|
|
}
|
|
if (Session->Descriptor.Receive.Ring->Tail != Session->Receive.TailRelease) {
|
|
WriteULongRelease(&Session->Descriptor.Receive.Ring->Tail, Session->Receive.TailRelease);
|
|
if (ReadAcquire(&Session->Descriptor.Receive.Ring->Alertable))
|
|
SetEvent(Session->Descriptor.Receive.TailMoved);
|
|
}
|
|
LeaveCriticalSection(&Session->Receive.Lock);
|
|
}
|