wireguard-go/tun/tun_windows.go

340 lines
8.3 KiB
Go
Raw Normal View History

2019-02-04 17:29:52 +01:00
/* SPDX-License-Identifier: MIT
*
* Copyright (C) 2018-2019 WireGuard LLC. All Rights Reserved.
*/
package tun
import (
"errors"
"os"
"sync"
"syscall"
"time"
"unsafe"
2019-02-04 17:29:52 +01:00
"golang.org/x/sys/windows"
"golang.zx2c4.com/wireguard/tun/wintun"
2019-02-04 17:29:52 +01:00
)
const (
packetExchangeMax uint32 = 256 // Number of packets that may be written at a time
packetExchangeAlignment uint32 = 16 // Number of bytes packets are aligned to in exchange buffers
packetSizeMax uint32 = 0xf000 - packetExchangeAlignment // Maximum packet size
packetExchangeSize uint32 = 0x100000 // Exchange buffer size (defaults to 1MiB)
retryRate = 4 // Number of retries per second to reopen device pipe
retryTimeout = 5 // Number of seconds to tolerate adapter unavailable
2019-02-04 17:29:52 +01:00
)
type exchgBufRead struct {
data [packetExchangeSize]byte
offset uint32
avail uint32
}
type exchgBufWrite struct {
data [packetExchangeSize]byte
offset uint32
packetNum uint32
}
type NativeTun struct {
2019-03-18 09:42:00 +01:00
wt *wintun.Wintun
tunName *uint16
tunFile windows.Handle
2019-03-18 09:42:00 +01:00
tunLock sync.Mutex
close bool
2019-03-18 09:42:00 +01:00
rdBuff *exchgBufRead
wrBuff *exchgBufWrite
events chan TUNEvent
errors chan error
forcedMtu int
2019-02-04 17:29:52 +01:00
}
//sys getOverlappedResult(handle windows.Handle, overlapped *windows.Overlapped, done *uint32, wait bool) (err error) = kernel32.GetOverlappedResult
func packetAlign(size uint32) uint32 {
return (size + (packetExchangeAlignment - 1)) &^ (packetExchangeAlignment - 1)
2019-02-04 17:29:52 +01:00
}
//
// CreateTUN creates a Wintun adapter with the given name. Should a Wintun
// adapter with the same name exist, it is reused.
//
2019-02-04 17:29:52 +01:00
func CreateTUN(ifname string) (TUNDevice, error) {
// Does an interface with this name already exist?
wt, err := wintun.GetInterface(ifname, 0)
if wt == nil {
// Interface does not exist or an error occured. Create one.
wt, _, err = wintun.CreateInterface("WireGuard Tunnel Adapter", 0)
if err != nil {
return nil, errors.New("Creating Wintun adapter failed: " + err.Error())
}
} else if err != nil {
// Foreign interface with the same name found.
// We could create a Wintun interface under a temporary name. But, should our
// proces die without deleting this interface first, the interface would remain
// orphaned.
return nil, err
}
err = wt.SetInterfaceName(ifname)
if err != nil {
wt.DeleteInterface(0)
return nil, errors.New("Setting interface name failed: " + err.Error())
}
2019-02-07 18:24:28 +01:00
err = wt.FlushInterface()
if err != nil {
wt.DeleteInterface(0)
return nil, errors.New("Flushing interface failed: " + err.Error())
2019-02-07 18:24:28 +01:00
}
tunNameUTF16, err := windows.UTF16PtrFromString(wt.DataFileName())
if err != nil {
wt.DeleteInterface(0)
return nil, err
}
2019-03-18 09:42:00 +01:00
return &NativeTun{
wt: wt,
tunName: tunNameUTF16,
tunFile: windows.InvalidHandle,
2019-03-18 09:42:00 +01:00
rdBuff: &exchgBufRead{},
wrBuff: &exchgBufWrite{},
events: make(chan TUNEvent, 10),
errors: make(chan error, 1),
forcedMtu: 1500,
}, nil
2019-02-04 17:29:52 +01:00
}
func (tun *NativeTun) openTUN() error {
retries := retryTimeout * retryRate
2019-02-04 17:29:52 +01:00
for {
if tun.close {
return errors.New("Cancelled")
}
file, err := windows.CreateFile(tun.tunName, windows.GENERIC_READ|windows.GENERIC_WRITE, 0, nil, windows.OPEN_EXISTING, windows.FILE_ATTRIBUTE_NORMAL|windows.FILE_FLAG_OVERLAPPED|0x20000000 /*windows.FILE_FLAG_NO_BUFFERING*/, 0)
2019-02-04 17:29:52 +01:00
if err != nil {
if retries > 0 {
time.Sleep(time.Second / retryRate)
retries--
continue
}
return err
2019-02-04 17:29:52 +01:00
}
2019-02-04 17:29:52 +01:00
tun.tunFile = file
return nil
2019-02-04 17:29:52 +01:00
}
}
func (tun *NativeTun) closeTUN() (err error) {
if tun.tunFile != windows.InvalidHandle {
2019-03-18 09:42:00 +01:00
tun.tunLock.Lock()
defer tun.tunLock.Unlock()
if tun.tunFile == windows.InvalidHandle {
2019-03-18 09:42:00 +01:00
return
2019-02-04 17:29:52 +01:00
}
2019-03-18 09:42:00 +01:00
t := tun.tunFile
tun.tunFile = windows.InvalidHandle
err = windows.CloseHandle(t)
2019-02-04 17:29:52 +01:00
}
return
}
func (tun *NativeTun) getTUN() (windows.Handle, error) {
if tun.tunFile == windows.InvalidHandle {
2019-03-18 09:42:00 +01:00
tun.tunLock.Lock()
defer tun.tunLock.Unlock()
if tun.tunFile != windows.InvalidHandle {
2019-03-18 09:42:00 +01:00
return tun.tunFile, nil
}
err := tun.openTUN()
if err != nil {
return windows.InvalidHandle, err
}
}
2019-03-18 09:42:00 +01:00
return tun.tunFile, nil
}
func (tun *NativeTun) isIOCancelled(err error) bool {
// Read&WriteFile() return the same ERROR_OPERATION_ABORTED if we close the handle
// or the TUN device is put down. We need a "close" flag to distinguish.
en, ok := err.(syscall.Errno)
if tun.close && ok && en == windows.ERROR_OPERATION_ABORTED {
return true
}
return false
}
func (tun *NativeTun) Name() (string, error) {
return tun.wt.GetInterfaceName()
2019-02-04 17:29:52 +01:00
}
func (tun *NativeTun) File() *os.File {
2019-02-04 17:29:52 +01:00
return nil
}
func (tun *NativeTun) Events() chan TUNEvent {
2019-02-04 17:29:52 +01:00
return tun.events
}
func (tun *NativeTun) Close() error {
tun.close = true
2019-03-18 09:42:00 +01:00
err1 := tun.closeTUN()
2019-02-04 17:29:52 +01:00
if tun.events != nil {
close(tun.events)
}
2019-03-18 09:42:00 +01:00
_, _, err2 := tun.wt.DeleteInterface(0)
if err1 == nil {
err1 = err2
}
2019-03-18 09:42:00 +01:00
return err1
2019-02-04 17:29:52 +01:00
}
func (tun *NativeTun) MTU() (int, error) {
return tun.forcedMtu, nil
}
//TODO: This is a temporary hack. We really need to be monitoring the interface in real time and adapting to MTU changes.
func (tun *NativeTun) ForceMtu(mtu int) {
tun.forcedMtu = mtu
2019-02-04 17:29:52 +01:00
}
func (tun *NativeTun) Read(buff []byte, offset int) (int, error) {
2019-02-04 17:29:52 +01:00
select {
case err := <-tun.errors:
return 0, err
default:
}
2019-02-04 17:29:52 +01:00
for {
if tun.rdBuff.offset+packetExchangeAlignment <= tun.rdBuff.avail {
// Get packet from the exchange buffer.
packet := tun.rdBuff.data[tun.rdBuff.offset:]
size := *(*uint32)(unsafe.Pointer(&packet[0]))
pSize := packetAlign(packetExchangeAlignment + size)
if packetSizeMax < size || tun.rdBuff.avail < tun.rdBuff.offset+pSize {
// Invalid packet size.
tun.rdBuff.avail = 0
continue
2019-02-04 17:29:52 +01:00
}
2019-03-18 09:42:00 +01:00
packet = packet[packetExchangeAlignment : packetExchangeAlignment+size]
2019-02-04 17:29:52 +01:00
// Copy data.
2019-03-18 09:42:00 +01:00
copy(buff[offset:], packet)
tun.rdBuff.offset += pSize
return int(size), nil
}
// Get TUN data pipe.
2019-03-18 09:42:00 +01:00
file, err := tun.getTUN()
if err != nil {
return 0, err
}
// Fill queue.
var n uint32
overlapped := &windows.Overlapped{}
err = windows.ReadFile(file, tun.rdBuff.data[:], &n, overlapped)
if err != nil {
if en, ok := err.(syscall.Errno); ok && en == windows.ERROR_IO_PENDING {
err = getOverlappedResult(file, overlapped, &n, true)
}
if err != nil {
tun.rdBuff.avail = 0
if tun.isIOCancelled(err) {
return 0, err
}
tun.closeTUN()
continue
2019-03-18 09:42:00 +01:00
}
}
tun.rdBuff.offset = 0
tun.rdBuff.avail = uint32(n)
2019-02-04 17:29:52 +01:00
}
}
2019-02-07 04:08:05 +01:00
// Note: flush() and putTunPacket() assume the caller comes only from a single thread; there's no locking.
func (tun *NativeTun) flush() error {
// Get TUN data pipe.
2019-03-18 09:42:00 +01:00
file, err := tun.getTUN()
if err != nil {
return err
}
2019-02-04 17:29:52 +01:00
// Flush write buffer.
var n uint32
overlapped := &windows.Overlapped{}
err = windows.WriteFile(file, tun.wrBuff.data[:tun.wrBuff.offset], &n, overlapped)
tun.wrBuff.packetNum = 0
tun.wrBuff.offset = 0
2019-02-04 17:29:52 +01:00
if err != nil {
if en, ok := err.(syscall.Errno); ok && en == windows.ERROR_IO_PENDING {
err = getOverlappedResult(file, overlapped, &n, true)
}
if err != nil {
if tun.isIOCancelled(err) {
return err
}
tun.closeTUN()
return nil
}
2019-02-04 17:29:52 +01:00
}
return nil
}
func (tun *NativeTun) putTunPacket(buff []byte) error {
size := uint32(len(buff))
2019-02-04 17:29:52 +01:00
if size == 0 {
2019-02-05 14:06:25 +01:00
return errors.New("Empty packet")
2019-02-04 17:29:52 +01:00
}
if size > packetSizeMax {
2019-02-05 14:06:25 +01:00
return errors.New("Packet too big")
2019-02-04 17:29:52 +01:00
}
pSize := packetAlign(packetExchangeAlignment + size)
2019-02-04 17:29:52 +01:00
if tun.wrBuff.packetNum >= packetExchangeMax || tun.wrBuff.offset+pSize >= packetExchangeSize {
// Exchange buffer is full -> flush first.
2019-02-04 17:29:52 +01:00
err := tun.flush()
if err != nil {
return err
}
}
// Write packet to the exchange buffer.
packet := tun.wrBuff.data[tun.wrBuff.offset : tun.wrBuff.offset+pSize]
*(*uint32)(unsafe.Pointer(&packet[0])) = size
2019-03-18 09:42:00 +01:00
packet = packet[packetExchangeAlignment : packetExchangeAlignment+size]
copy(packet, buff)
2019-02-04 17:29:52 +01:00
tun.wrBuff.packetNum++
tun.wrBuff.offset += pSize
2019-02-04 17:29:52 +01:00
return nil
}
func (tun *NativeTun) Write(buff []byte, offset int) (int, error) {
2019-02-04 17:29:52 +01:00
err := tun.putTunPacket(buff[offset:])
if err != nil {
return 0, err
}
// Flush write buffer.
return len(buff) - offset, tun.flush()
}
2019-03-01 00:11:12 +01:00
//
// GUID returns Windows adapter instance ID.
//
2019-03-01 00:11:12 +01:00
func (tun *NativeTun) GUID() windows.GUID {
return *(*windows.GUID)(tun.wt)
2019-03-03 04:04:41 +01:00
}