aboutsummaryrefslogtreecommitdiffstats
path: root/tun/wintun/dll_windows.go
diff options
context:
space:
mode:
authorSimon Rozman <simon@rozman.si>2020-11-06 05:24:50 +0100
committerJason A. Donenfeld <Jason@zx2c4.com>2020-11-07 15:20:49 +0100
commit65e03a918274534015ca189bfadc33cbba9e3ec8 (patch)
treea7b84f08e1602324f22bf857ca9148194562e923 /tun/wintun/dll_windows.go
parentwintun: migrate to wintun.dll API (diff)
downloadwireguard-go-65e03a918274534015ca189bfadc33cbba9e3ec8.tar.xz
wireguard-go-65e03a918274534015ca189bfadc33cbba9e3ec8.zip
wintun: load wintun.dll from RCDATA resource
Signed-off-by: Simon Rozman <simon@rozman.si> Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
Diffstat (limited to 'tun/wintun/dll_windows.go')
-rw-r--r--tun/wintun/dll_windows.go97
1 files changed, 97 insertions, 0 deletions
diff --git a/tun/wintun/dll_windows.go b/tun/wintun/dll_windows.go
new file mode 100644
index 0000000..af1e016
--- /dev/null
+++ b/tun/wintun/dll_windows.go
@@ -0,0 +1,97 @@
+/* SPDX-License-Identifier: MIT
+ *
+ * Copyright (C) 2020 WireGuard LLC. All Rights Reserved.
+ */
+
+package wintun
+
+import (
+ "fmt"
+ "sync"
+ "sync/atomic"
+ "unsafe"
+
+ "golang.org/x/sys/windows"
+ "golang.zx2c4.com/wireguard/tun/wintun/memmod"
+ "golang.zx2c4.com/wireguard/tun/wintun/resource"
+)
+
+type lazyDLL struct {
+ Name string
+ mu sync.Mutex
+ module *memmod.Module
+}
+
+func newLazyDLL(name string) *lazyDLL {
+ return &lazyDLL{Name: name}
+}
+
+func (d *lazyDLL) Load() error {
+ if atomic.LoadPointer((*unsafe.Pointer)(unsafe.Pointer(&d.module))) != nil {
+ return nil
+ }
+ d.mu.Lock()
+ defer d.mu.Unlock()
+ if d.module != nil {
+ return nil
+ }
+
+ const ourModule windows.Handle = 0
+ resInfo, err := resource.FindByName(ourModule, d.Name, resource.RT_RCDATA)
+ if err != nil {
+ return fmt.Errorf("Unable to find \"%v\" RCDATA resource: %v", d.Name, err)
+ }
+ data, err := resource.Load(ourModule, resInfo)
+ if err != nil {
+ return fmt.Errorf("Unable to load resource: %v", err)
+ }
+ module, err := memmod.LoadLibrary(data)
+ if err != nil {
+ return fmt.Errorf("Unable to load library: %v", err)
+ }
+
+ atomic.StorePointer((*unsafe.Pointer)(unsafe.Pointer(&d.module)), unsafe.Pointer(module))
+ return nil
+}
+
+func (d *lazyDLL) NewProc(name string) *lazyProc {
+ return &lazyProc{dll: d, Name: name}
+}
+
+type lazyProc struct {
+ Name string
+ mu sync.Mutex
+ dll *lazyDLL
+ addr uintptr
+}
+
+func (p *lazyProc) Find() error {
+ if atomic.LoadPointer((*unsafe.Pointer)(unsafe.Pointer(&p.addr))) != nil {
+ return nil
+ }
+ p.mu.Lock()
+ defer p.mu.Unlock()
+ if p.addr != 0 {
+ return nil
+ }
+
+ err := p.dll.Load()
+ if err != nil {
+ return fmt.Errorf("Error loading %v DLL: %v", p.dll.Name, err)
+ }
+ addr, err := p.dll.module.ProcAddressByName(p.Name)
+ if err != nil {
+ return fmt.Errorf("Error getting %v address: %v", p.Name, err)
+ }
+
+ atomic.StorePointer((*unsafe.Pointer)(unsafe.Pointer(&p.addr)), unsafe.Pointer(addr))
+ return nil
+}
+
+func (p *lazyProc) Addr() uintptr {
+ err := p.Find()
+ if err != nil {
+ panic(err)
+ }
+ return p.addr
+}