3
0

udp_rio_windows.go 9.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410
  1. //go:build !e2e_testing
  2. // +build !e2e_testing
  3. // Inspired by https://git.zx2c4.com/wireguard-go/tree/conn/bind_windows.go
  4. package udp
  5. import (
  6. "errors"
  7. "fmt"
  8. "io"
  9. "net"
  10. "net/netip"
  11. "sync"
  12. "sync/atomic"
  13. "syscall"
  14. "unsafe"
  15. "github.com/sirupsen/logrus"
  16. "github.com/slackhq/nebula/config"
  17. "golang.org/x/sys/windows"
  18. "golang.zx2c4.com/wireguard/conn/winrio"
  19. )
  20. // Assert we meet the standard conn interface
  21. var _ Conn = &RIOConn{}
  22. //go:linkname procyield runtime.procyield
  23. func procyield(cycles uint32)
  24. const (
  25. packetsPerRing = 1024
  26. bytesPerPacket = 2048 - 32
  27. receiveSpins = 15
  28. )
  29. type ringPacket struct {
  30. addr windows.RawSockaddrInet6
  31. data [bytesPerPacket]byte
  32. }
  33. type ringBuffer struct {
  34. packets uintptr
  35. head, tail uint32
  36. id winrio.BufferId
  37. iocp windows.Handle
  38. isFull bool
  39. cq winrio.Cq
  40. mu sync.Mutex
  41. overlapped windows.Overlapped
  42. }
  43. type RIOConn struct {
  44. isOpen atomic.Bool
  45. l *logrus.Logger
  46. sock windows.Handle
  47. rx, tx ringBuffer
  48. rq winrio.Rq
  49. results [packetsPerRing]winrio.Result
  50. }
  51. func NewRIOListener(l *logrus.Logger, addr netip.Addr, port int) (*RIOConn, error) {
  52. if !winrio.Initialize() {
  53. return nil, errors.New("could not initialize winrio")
  54. }
  55. u := &RIOConn{l: l}
  56. err := u.bind(&windows.SockaddrInet6{Addr: addr.As16(), Port: port})
  57. if err != nil {
  58. return nil, fmt.Errorf("bind: %w", err)
  59. }
  60. for i := 0; i < packetsPerRing; i++ {
  61. err = u.insertReceiveRequest()
  62. if err != nil {
  63. return nil, fmt.Errorf("init rx ring: %w", err)
  64. }
  65. }
  66. u.isOpen.Store(true)
  67. return u, nil
  68. }
  69. func (u *RIOConn) bind(sa windows.Sockaddr) error {
  70. var err error
  71. u.sock, err = winrio.Socket(windows.AF_INET6, windows.SOCK_DGRAM, windows.IPPROTO_UDP)
  72. if err != nil {
  73. return err
  74. }
  75. // Enable v4 for this socket
  76. syscall.SetsockoptInt(syscall.Handle(u.sock), syscall.IPPROTO_IPV6, syscall.IPV6_V6ONLY, 0)
  77. // Disable reporting of PORT_UNREACHABLE and NET_UNREACHABLE errors from the UDP socket receive call.
  78. // These errors are returned on Windows during UDP receives based on the receipt of ICMP packets. Disable
  79. // the UDP receive error returns with these ioctl calls.
  80. ret := uint32(0)
  81. flag := uint32(0)
  82. size := uint32(unsafe.Sizeof(flag))
  83. err = syscall.WSAIoctl(syscall.Handle(u.sock), syscall.SIO_UDP_CONNRESET, (*byte)(unsafe.Pointer(&flag)), size, nil, 0, &ret, nil, 0)
  84. if err != nil {
  85. return err
  86. }
  87. ret = 0
  88. flag = 0
  89. size = uint32(unsafe.Sizeof(flag))
  90. SIO_UDP_NETRESET := uint32(syscall.IOC_IN | syscall.IOC_VENDOR | 15)
  91. err = syscall.WSAIoctl(syscall.Handle(u.sock), SIO_UDP_NETRESET, (*byte)(unsafe.Pointer(&flag)), size, nil, 0, &ret, nil, 0)
  92. if err != nil {
  93. return err
  94. }
  95. err = u.rx.Open()
  96. if err != nil {
  97. return err
  98. }
  99. err = u.tx.Open()
  100. if err != nil {
  101. return err
  102. }
  103. u.rq, err = winrio.CreateRequestQueue(u.sock, packetsPerRing, 1, packetsPerRing, 1, u.rx.cq, u.tx.cq, 0)
  104. if err != nil {
  105. return err
  106. }
  107. err = windows.Bind(u.sock, sa)
  108. if err != nil {
  109. return err
  110. }
  111. return nil
  112. }
  113. func (u *RIOConn) ListenOut(r EncReader) {
  114. buffer := make([]byte, MTU)
  115. for {
  116. // Just read one packet at a time
  117. n, rua, err := u.receive(buffer)
  118. if err != nil {
  119. if errors.Is(err, net.ErrClosed) {
  120. u.l.WithError(err).Debug("udp socket is closed, exiting read loop")
  121. return
  122. }
  123. u.l.WithError(err).Error("unexpected udp socket receive error")
  124. continue
  125. }
  126. r(netip.AddrPortFrom(netip.AddrFrom16(rua.Addr).Unmap(), (rua.Port>>8)|((rua.Port&0xff)<<8)), buffer[:n])
  127. }
  128. }
  129. func (u *RIOConn) insertReceiveRequest() error {
  130. packet := u.rx.Push()
  131. dataBuffer := &winrio.Buffer{
  132. Id: u.rx.id,
  133. Offset: uint32(uintptr(unsafe.Pointer(&packet.data[0])) - u.rx.packets),
  134. Length: uint32(len(packet.data)),
  135. }
  136. addressBuffer := &winrio.Buffer{
  137. Id: u.rx.id,
  138. Offset: uint32(uintptr(unsafe.Pointer(&packet.addr)) - u.rx.packets),
  139. Length: uint32(unsafe.Sizeof(packet.addr)),
  140. }
  141. return winrio.ReceiveEx(u.rq, dataBuffer, 1, nil, addressBuffer, nil, nil, 0, uintptr(unsafe.Pointer(packet)))
  142. }
  143. func (u *RIOConn) receive(buf []byte) (int, windows.RawSockaddrInet6, error) {
  144. if !u.isOpen.Load() {
  145. return 0, windows.RawSockaddrInet6{}, net.ErrClosed
  146. }
  147. u.rx.mu.Lock()
  148. defer u.rx.mu.Unlock()
  149. var err error
  150. var count uint32
  151. var results [1]winrio.Result
  152. retry:
  153. count = 0
  154. for tries := 0; count == 0 && tries < receiveSpins; tries++ {
  155. if tries > 0 {
  156. if !u.isOpen.Load() {
  157. return 0, windows.RawSockaddrInet6{}, net.ErrClosed
  158. }
  159. procyield(1)
  160. }
  161. count = winrio.DequeueCompletion(u.rx.cq, results[:])
  162. }
  163. if count == 0 {
  164. err = winrio.Notify(u.rx.cq)
  165. if err != nil {
  166. return 0, windows.RawSockaddrInet6{}, err
  167. }
  168. var bytes uint32
  169. var key uintptr
  170. var overlapped *windows.Overlapped
  171. err = windows.GetQueuedCompletionStatus(u.rx.iocp, &bytes, &key, &overlapped, windows.INFINITE)
  172. if err != nil {
  173. return 0, windows.RawSockaddrInet6{}, err
  174. }
  175. if !u.isOpen.Load() {
  176. return 0, windows.RawSockaddrInet6{}, net.ErrClosed
  177. }
  178. count = winrio.DequeueCompletion(u.rx.cq, results[:])
  179. if count == 0 {
  180. return 0, windows.RawSockaddrInet6{}, io.ErrNoProgress
  181. }
  182. }
  183. u.rx.Return(1)
  184. err = u.insertReceiveRequest()
  185. if err != nil {
  186. return 0, windows.RawSockaddrInet6{}, err
  187. }
  188. // We limit the MTU well below the 65k max for practicality, but this means a remote host can still send us
  189. // huge packets. Just try again when this happens. The infinite loop this could cause is still limited to
  190. // attacker bandwidth, just like the rest of the receive path.
  191. if windows.Errno(results[0].Status) == windows.WSAEMSGSIZE {
  192. goto retry
  193. }
  194. if results[0].Status != 0 {
  195. return 0, windows.RawSockaddrInet6{}, windows.Errno(results[0].Status)
  196. }
  197. packet := (*ringPacket)(unsafe.Pointer(uintptr(results[0].RequestContext)))
  198. ep := packet.addr
  199. n := copy(buf, packet.data[:results[0].BytesTransferred])
  200. return n, ep, nil
  201. }
  202. func (u *RIOConn) WriteTo(buf []byte, ip netip.AddrPort) error {
  203. if !u.isOpen.Load() {
  204. return net.ErrClosed
  205. }
  206. if len(buf) > bytesPerPacket {
  207. return io.ErrShortBuffer
  208. }
  209. u.tx.mu.Lock()
  210. defer u.tx.mu.Unlock()
  211. count := winrio.DequeueCompletion(u.tx.cq, u.results[:])
  212. if count == 0 && u.tx.isFull {
  213. err := winrio.Notify(u.tx.cq)
  214. if err != nil {
  215. return err
  216. }
  217. var bytes uint32
  218. var key uintptr
  219. var overlapped *windows.Overlapped
  220. err = windows.GetQueuedCompletionStatus(u.tx.iocp, &bytes, &key, &overlapped, windows.INFINITE)
  221. if err != nil {
  222. return err
  223. }
  224. if !u.isOpen.Load() {
  225. return net.ErrClosed
  226. }
  227. count = winrio.DequeueCompletion(u.tx.cq, u.results[:])
  228. if count == 0 {
  229. return io.ErrNoProgress
  230. }
  231. }
  232. if count > 0 {
  233. u.tx.Return(count)
  234. }
  235. packet := u.tx.Push()
  236. packet.addr.Family = windows.AF_INET6
  237. packet.addr.Addr = ip.Addr().As16()
  238. port := ip.Port()
  239. packet.addr.Port = (port >> 8) | ((port & 0xff) << 8)
  240. copy(packet.data[:], buf)
  241. dataBuffer := &winrio.Buffer{
  242. Id: u.tx.id,
  243. Offset: uint32(uintptr(unsafe.Pointer(&packet.data[0])) - u.tx.packets),
  244. Length: uint32(len(buf)),
  245. }
  246. addressBuffer := &winrio.Buffer{
  247. Id: u.tx.id,
  248. Offset: uint32(uintptr(unsafe.Pointer(&packet.addr)) - u.tx.packets),
  249. Length: uint32(unsafe.Sizeof(packet.addr)),
  250. }
  251. return winrio.SendEx(u.rq, dataBuffer, 1, nil, addressBuffer, nil, nil, 0, 0)
  252. }
  253. func (u *RIOConn) LocalAddr() (netip.AddrPort, error) {
  254. sa, err := windows.Getsockname(u.sock)
  255. if err != nil {
  256. return netip.AddrPort{}, err
  257. }
  258. v6 := sa.(*windows.SockaddrInet6)
  259. return netip.AddrPortFrom(netip.AddrFrom16(v6.Addr).Unmap(), uint16(v6.Port)), nil
  260. }
  261. func (u *RIOConn) Rebind() error {
  262. return nil
  263. }
  264. func (u *RIOConn) ReloadConfig(*config.C) {}
  265. func (u *RIOConn) Close() error {
  266. if !u.isOpen.CompareAndSwap(true, false) {
  267. return nil
  268. }
  269. windows.PostQueuedCompletionStatus(u.rx.iocp, 0, 0, nil)
  270. windows.PostQueuedCompletionStatus(u.tx.iocp, 0, 0, nil)
  271. u.rx.CloseAndZero()
  272. u.tx.CloseAndZero()
  273. if u.sock != 0 {
  274. windows.CloseHandle(u.sock)
  275. }
  276. return nil
  277. }
  278. func (ring *ringBuffer) Push() *ringPacket {
  279. for ring.isFull {
  280. panic("ring is full")
  281. }
  282. ret := (*ringPacket)(unsafe.Pointer(ring.packets + (uintptr(ring.tail%packetsPerRing) * unsafe.Sizeof(ringPacket{}))))
  283. ring.tail += 1
  284. if ring.tail%packetsPerRing == ring.head%packetsPerRing {
  285. ring.isFull = true
  286. }
  287. return ret
  288. }
  289. func (ring *ringBuffer) Return(count uint32) {
  290. if ring.head%packetsPerRing == ring.tail%packetsPerRing && !ring.isFull {
  291. return
  292. }
  293. ring.head += count
  294. ring.isFull = false
  295. }
  296. func (ring *ringBuffer) CloseAndZero() {
  297. if ring.cq != 0 {
  298. winrio.CloseCompletionQueue(ring.cq)
  299. ring.cq = 0
  300. }
  301. if ring.iocp != 0 {
  302. windows.CloseHandle(ring.iocp)
  303. ring.iocp = 0
  304. }
  305. if ring.id != 0 {
  306. winrio.DeregisterBuffer(ring.id)
  307. ring.id = 0
  308. }
  309. if ring.packets != 0 {
  310. windows.VirtualFree(ring.packets, 0, windows.MEM_RELEASE)
  311. ring.packets = 0
  312. }
  313. ring.head = 0
  314. ring.tail = 0
  315. ring.isFull = false
  316. }
  317. func (ring *ringBuffer) Open() error {
  318. var err error
  319. packetsLen := unsafe.Sizeof(ringPacket{}) * packetsPerRing
  320. ring.packets, err = windows.VirtualAlloc(0, packetsLen, windows.MEM_COMMIT|windows.MEM_RESERVE, windows.PAGE_READWRITE)
  321. if err != nil {
  322. return err
  323. }
  324. ring.id, err = winrio.RegisterPointer(unsafe.Pointer(ring.packets), uint32(packetsLen))
  325. if err != nil {
  326. return err
  327. }
  328. ring.iocp, err = windows.CreateIoCompletionPort(windows.InvalidHandle, 0, 0, 0)
  329. if err != nil {
  330. return err
  331. }
  332. ring.cq, err = winrio.CreateIOCPCompletionQueue(packetsPerRing, ring.iocp, 0, &ring.overlapped)
  333. if err != nil {
  334. return err
  335. }
  336. return nil
  337. }