2019-03-08 22:33:15 +01:00
|
|
|
/* SPDX-License-Identifier: GPL-2.0
|
|
|
|
*
|
|
|
|
* Copyright (C) 2018-2019 WireGuard LLC. All Rights Reserved.
|
|
|
|
*/
|
|
|
|
|
2019-05-30 21:39:33 +02:00
|
|
|
#include <ntifs.h>
|
2019-03-08 22:33:15 +01:00
|
|
|
#include <wdm.h>
|
|
|
|
#include <wdmsec.h>
|
|
|
|
#include <ndis.h>
|
|
|
|
#include <ntstrsafe.h>
|
2019-05-30 21:39:33 +02:00
|
|
|
#include "undocumented.h"
|
2019-03-08 22:33:15 +01:00
|
|
|
|
2019-06-27 15:08:29 +02:00
|
|
|
#pragma warning(disable : 4100) /* unreferenced formal parameter */
|
|
|
|
#pragma warning(disable : 4200) /* nonstandard: zero-sized array in struct/union */
|
|
|
|
#pragma warning(disable : 4204) /* nonstandard: non-constant aggregate initializer */
|
|
|
|
#pragma warning(disable : 4221) /* nonstandard: cannot be initialized using address of automatic variable */
|
|
|
|
#pragma warning(disable : 6320) /* exception-filter expression is the constant EXCEPTION_EXECUTE_HANDLER */
|
2019-06-26 14:52:38 +02:00
|
|
|
|
|
|
|
#define NDIS_MINIPORT_VERSION_MIN ((NDIS_MINIPORT_MINIMUM_MAJOR_VERSION << 16) | NDIS_MINIPORT_MINIMUM_MINOR_VERSION)
|
|
|
|
#define NDIS_MINIPORT_VERSION_MAX ((NDIS_MINIPORT_MAJOR_VERSION << 16) | NDIS_MINIPORT_MINOR_VERSION)
|
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
/* Data device name */
|
2019-06-26 14:52:38 +02:00
|
|
|
#define TUN_DEVICE_NAME L"WINTUN%u"
|
|
|
|
|
|
|
|
#define TUN_VENDOR_NAME "Wintun Tunnel"
|
|
|
|
#define TUN_VENDOR_ID 0xFFFFFF00
|
2019-06-27 15:08:29 +02:00
|
|
|
#define TUN_LINK_SPEED 100000000000ULL /* 100gbps */
|
2019-06-26 14:52:38 +02:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
/* Memory alignment of packets and rings */
|
|
|
|
#define TUN_ALIGNMENT sizeof(ULONG)
|
|
|
|
#define TUN_ALIGN(Size) (((ULONG)(Size) + (ULONG)(TUN_ALIGNMENT - 1)) & ~(ULONG)(TUN_ALIGNMENT - 1))
|
|
|
|
/* Maximum IP packet size */
|
|
|
|
#define TUN_MAX_IP_PACKET_SIZE 0xFFFF
|
|
|
|
/* Maximum packet size */
|
|
|
|
#define TUN_MAX_PACKET_SIZE TUN_ALIGN(sizeof(TUN_PACKET) + TUN_MAX_IP_PACKET_SIZE)
|
|
|
|
/* Minimum ring capacity. */
|
|
|
|
#define TUN_MIN_RING_CAPACITY 0x20000 /* 128kiB */
|
|
|
|
/* Maximum ring capacity. */
|
|
|
|
#define TUN_MAX_RING_CAPACITY 0x4000000 /* 64MiB */
|
|
|
|
/* Calculates ring capacity */
|
|
|
|
#define TUN_RING_CAPACITY(Size) ((Size) - sizeof(TUN_RING) - (TUN_MAX_PACKET_SIZE - TUN_ALIGNMENT))
|
|
|
|
/* Calculates ring offset modulo capacity */
|
|
|
|
#define TUN_RING_WRAP(Value, Capacity) ((Value) & (Capacity - 1))
|
2019-06-07 12:23:44 +02:00
|
|
|
|
|
|
|
#if REG_DWORD == REG_DWORD_BIG_ENDIAN
|
2019-06-26 14:52:38 +02:00
|
|
|
# define TUN_HTONS(x) ((USHORT)(x))
|
|
|
|
# define TUN_HTONL(x) ((ULONG)(x))
|
2019-06-07 12:23:44 +02:00
|
|
|
#elif REG_DWORD == REG_DWORD_LITTLE_ENDIAN
|
2019-06-26 19:37:29 +02:00
|
|
|
# define TUN_HTONS(x) ((((USHORT)(x)&0x00ff) << 8) | (((USHORT)(x)&0xff00) >> 8))
|
2019-06-26 14:52:38 +02:00
|
|
|
# define TUN_HTONL(x) \
|
2019-06-26 19:37:29 +02:00
|
|
|
((((ULONG)(x)&0x000000ff) << 24) | (((ULONG)(x)&0x0000ff00) << 8) | (((ULONG)(x)&0x00ff0000) >> 8) | \
|
|
|
|
(((ULONG)(x)&0xff000000) >> 24))
|
2019-06-07 12:23:44 +02:00
|
|
|
#else
|
2019-06-26 14:52:38 +02:00
|
|
|
# error "Unable to determine endianess"
|
2019-06-07 12:23:44 +02:00
|
|
|
#endif
|
2019-03-08 22:33:15 +01:00
|
|
|
|
2019-07-03 12:43:55 +02:00
|
|
|
#define TUN_MEMORY_TAG TUN_HTONL('wtun')
|
|
|
|
|
2019-06-26 14:52:38 +02:00
|
|
|
typedef struct _TUN_PACKET
|
|
|
|
{
|
2019-07-08 11:01:39 +02:00
|
|
|
/* Size of packet data (TUN_MAX_IP_PACKET_SIZE max) */
|
|
|
|
ULONG Size;
|
|
|
|
|
|
|
|
/* Packet data */
|
|
|
|
UCHAR _Field_size_bytes_(Size)
|
|
|
|
Data[];
|
2019-03-08 22:33:15 +01:00
|
|
|
} TUN_PACKET;
|
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
typedef struct _TUN_RING
|
|
|
|
{
|
|
|
|
/* Byte offset of the first packet in the ring. Its value must be a multiple of TUN_ALIGNMENT and less than ring
|
|
|
|
* capacity. */
|
|
|
|
volatile ULONG Head;
|
|
|
|
|
|
|
|
/* Byte offset of the first free space in the ring. Its value must be multiple of TUN_ALIGNMENT and less than ring
|
|
|
|
* capacity. */
|
|
|
|
volatile ULONG Tail;
|
|
|
|
|
|
|
|
/* Non-zero when consumer is in alertable state. */
|
|
|
|
volatile LONG Alertable;
|
|
|
|
|
|
|
|
/* Ring data. Its capacity must be a power of 2 + extra TUN_MAX_PACKET_SIZE-TUN_ALIGNMENT space to
|
|
|
|
* eliminate need for wrapping. */
|
|
|
|
UCHAR Data[];
|
|
|
|
} TUN_RING;
|
|
|
|
|
|
|
|
typedef struct _TUN_REGISTER_RINGS
|
|
|
|
{
|
|
|
|
struct
|
|
|
|
{
|
|
|
|
/* Size of the ring */
|
|
|
|
ULONG RingSize;
|
|
|
|
|
|
|
|
/* Pointer to client allocated ring */
|
|
|
|
TUN_RING *Ring;
|
|
|
|
|
|
|
|
/* On send: An event created by the client the Wintun signals after it moves the Tail member of the send ring.
|
|
|
|
* On receive: An event created by the client the client will signal when it moves the Tail member of
|
|
|
|
* the receive ring if receive ring is alertable. */
|
|
|
|
HANDLE TailMoved;
|
|
|
|
} Send, Receive;
|
|
|
|
} TUN_REGISTER_RINGS;
|
|
|
|
|
|
|
|
/* Register rings hosted by the client
|
|
|
|
* The lpInBuffer and nInBufferSize parameters of DeviceIoControl() must point to an TUN_REGISTER_RINGS struct.
|
|
|
|
* Client must wait for this IOCTL to finish before adding packets to the ring. */
|
|
|
|
#define TUN_IOCTL_REGISTER_RINGS CTL_CODE(FILE_DEVICE_UNKNOWN, 0x800, METHOD_BUFFERED, FILE_READ_DATA | FILE_WRITE_DATA)
|
|
|
|
/* TODO: Select and specify OEM-specific device type instead of FILE_DEVICE_UNKNOWN. */
|
|
|
|
|
2019-06-26 14:52:38 +02:00
|
|
|
typedef enum _TUN_FLAGS
|
|
|
|
{
|
2019-07-08 11:01:39 +02:00
|
|
|
TUN_FLAGS_RUNNING = 1 << 0, /* Toggles between paused and running state */
|
|
|
|
TUN_FLAGS_PRESENT = 1 << 1, /* Toggles between removal pending and being present */
|
|
|
|
TUN_FLAGS_CONNECTED = 1 << 2, /* Is client connected? */
|
2019-06-10 15:02:10 +02:00
|
|
|
} TUN_FLAGS;
|
2019-03-08 22:33:15 +01:00
|
|
|
|
2019-06-26 14:52:38 +02:00
|
|
|
typedef struct _TUN_CTX
|
|
|
|
{
|
|
|
|
volatile LONG Flags;
|
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
/* Used like RCU. When we're making use of rings, we take a shared lock. When we want to register or release the
|
|
|
|
* rings and toggle the state, we take an exclusive lock before toggling the atomic and then releasing. It's similar
|
|
|
|
* to setting the atomic and then calling rcu_barrier(). */
|
2019-06-26 14:52:38 +02:00
|
|
|
EX_SPIN_LOCK TransitionLock;
|
|
|
|
|
2019-06-27 15:08:29 +02:00
|
|
|
NDIS_HANDLE MiniportAdapterHandle; /* This is actually a pointer to NDIS_MINIPORT_BLOCK struct. */
|
2019-06-26 14:52:38 +02:00
|
|
|
NDIS_STATISTICS_INFO Statistics;
|
|
|
|
|
|
|
|
struct
|
|
|
|
{
|
|
|
|
NDIS_HANDLE Handle;
|
2019-07-08 11:01:39 +02:00
|
|
|
DEVICE_OBJECT *Object;
|
2019-06-26 14:52:38 +02:00
|
|
|
IO_REMOVE_LOCK RemoveLock;
|
2019-07-08 11:01:39 +02:00
|
|
|
FILE_OBJECT *volatile Owner;
|
2019-06-26 14:52:38 +02:00
|
|
|
|
|
|
|
struct
|
|
|
|
{
|
2019-07-08 11:01:39 +02:00
|
|
|
MDL *Mdl;
|
|
|
|
TUN_RING *Ring;
|
|
|
|
ULONG Capacity;
|
|
|
|
KEVENT *TailMoved;
|
2019-06-26 14:52:38 +02:00
|
|
|
KSPIN_LOCK Lock;
|
2019-07-08 11:01:39 +02:00
|
|
|
} Send;
|
2019-06-26 14:52:38 +02:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
struct
|
|
|
|
{
|
|
|
|
MDL *Mdl;
|
|
|
|
TUN_RING *Ring;
|
|
|
|
ULONG Capacity;
|
|
|
|
KEVENT *TailMoved;
|
|
|
|
HANDLE Thread;
|
|
|
|
} Receive;
|
2019-06-26 14:52:38 +02:00
|
|
|
} Device;
|
|
|
|
|
2019-07-05 13:23:29 +02:00
|
|
|
NDIS_HANDLE NblPool;
|
2019-03-08 22:33:15 +01:00
|
|
|
} TUN_CTX;
|
|
|
|
|
2019-04-03 03:01:28 +02:00
|
|
|
static UINT NdisVersion;
|
2019-05-31 00:50:07 +02:00
|
|
|
static NDIS_HANDLE NdisMiniportDriverHandle;
|
2019-06-20 09:46:52 +02:00
|
|
|
static DRIVER_DISPATCH *NdisDispatchPnP;
|
2019-06-20 13:42:35 +02:00
|
|
|
static volatile LONG64 TunAdapterCount;
|
2019-03-08 22:33:15 +01:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
static __forceinline ULONG
|
|
|
|
InterlockedExchangeU(_Inout_ _Interlocked_operand_ ULONG volatile *Target, _In_ ULONG Value)
|
|
|
|
{
|
|
|
|
return (ULONG)InterlockedExchange((LONG volatile *)Target, Value);
|
|
|
|
}
|
|
|
|
|
2019-07-05 15:38:35 +02:00
|
|
|
static __forceinline LONG
|
|
|
|
InterlockedGet(_In_ _Interlocked_operand_ LONG volatile *Value)
|
|
|
|
{
|
|
|
|
return *Value;
|
|
|
|
}
|
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
static __forceinline ULONG
|
|
|
|
InterlockedGetU(_In_ _Interlocked_operand_ ULONG volatile *Value)
|
|
|
|
{
|
|
|
|
return *Value;
|
|
|
|
}
|
|
|
|
|
2019-07-05 15:38:35 +02:00
|
|
|
static __forceinline PVOID
|
|
|
|
InterlockedGetPointer(_In_ _Interlocked_operand_ PVOID volatile *Value)
|
|
|
|
{
|
|
|
|
return *Value;
|
|
|
|
}
|
|
|
|
|
|
|
|
static __forceinline LONG64
|
|
|
|
InterlockedGet64(_In_ _Interlocked_operand_ LONG64 volatile *Value)
|
|
|
|
{
|
|
|
|
#ifdef _WIN64
|
|
|
|
return *Value;
|
|
|
|
#else
|
|
|
|
return InterlockedCompareExchange64(Value, 0, 0);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2019-06-26 14:52:38 +02:00
|
|
|
#define TunInitUnicodeString(str, buf) \
|
|
|
|
{ \
|
|
|
|
(str)->Length = 0; \
|
|
|
|
(str)->MaximumLength = sizeof(buf); \
|
|
|
|
(str)->Buffer = buf; \
|
|
|
|
}
|
2019-03-08 22:33:15 +01:00
|
|
|
|
|
|
|
_IRQL_requires_max_(DISPATCH_LEVEL)
|
2019-07-03 12:50:01 +02:00
|
|
|
static void
|
2019-06-26 14:52:38 +02:00
|
|
|
TunIndicateStatus(_In_ NDIS_HANDLE MiniportAdapterHandle, _In_ NDIS_MEDIA_CONNECT_STATE MediaConnectState)
|
2019-03-08 22:33:15 +01:00
|
|
|
{
|
2019-06-29 13:34:15 +02:00
|
|
|
NDIS_LINK_STATE State = { .Header = { .Type = NDIS_OBJECT_TYPE_DEFAULT,
|
2019-06-26 18:59:02 +02:00
|
|
|
.Revision = NDIS_LINK_STATE_REVISION_1,
|
|
|
|
.Size = NDIS_SIZEOF_LINK_STATE_REVISION_1 },
|
|
|
|
.MediaConnectState = MediaConnectState,
|
|
|
|
.MediaDuplexState = MediaDuplexStateFull,
|
|
|
|
.XmitLinkSpeed = TUN_LINK_SPEED,
|
|
|
|
.RcvLinkSpeed = TUN_LINK_SPEED,
|
|
|
|
.PauseFunctions = NdisPauseFunctionsUnsupported };
|
|
|
|
|
2019-06-29 13:34:15 +02:00
|
|
|
NDIS_STATUS_INDICATION Indication = { .Header = { .Type = NDIS_OBJECT_TYPE_STATUS_INDICATION,
|
|
|
|
.Revision = NDIS_STATUS_INDICATION_REVISION_1,
|
|
|
|
.Size = NDIS_SIZEOF_STATUS_INDICATION_REVISION_1 },
|
|
|
|
.SourceHandle = MiniportAdapterHandle,
|
|
|
|
.StatusCode = NDIS_STATUS_LINK_STATE,
|
|
|
|
.StatusBuffer = &State,
|
|
|
|
.StatusBufferSize = sizeof(State) };
|
2019-06-26 14:52:38 +02:00
|
|
|
|
2019-06-29 13:34:15 +02:00
|
|
|
NdisMIndicateStatusEx(MiniportAdapterHandle, &Indication);
|
2019-03-08 22:33:15 +01:00
|
|
|
}
|
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
static MINIPORT_SEND_NET_BUFFER_LISTS TunSendNetBufferLists;
|
2019-03-27 09:00:19 +01:00
|
|
|
_Use_decl_annotations_
|
2019-06-26 14:52:38 +02:00
|
|
|
static void
|
2019-07-08 11:01:39 +02:00
|
|
|
TunSendNetBufferLists(
|
|
|
|
NDIS_HANDLE MiniportAdapterContext,
|
|
|
|
NET_BUFFER_LIST *NetBufferLists,
|
|
|
|
NDIS_PORT_NUMBER PortNumber,
|
|
|
|
ULONG SendFlags)
|
2019-03-27 09:00:19 +01:00
|
|
|
{
|
2019-07-08 11:01:39 +02:00
|
|
|
TUN_CTX *Ctx = (TUN_CTX *)MiniportAdapterContext;
|
|
|
|
LONG64 SentPacketsCount = 0, SentPacketsSize = 0, DiscardedPacketsCount = 0;
|
2019-03-27 09:00:19 +01:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
/* TODO: This handler is called by NDIS in parallel. Consider implementing a lock-less MPSC ring. */
|
2019-03-27 09:00:19 +01:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
KIRQL Irql = ExAcquireSpinLockShared(&Ctx->TransitionLock);
|
|
|
|
LONG Flags = InterlockedGet(&Ctx->Flags);
|
2019-03-27 09:00:19 +01:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
for (NET_BUFFER_LIST *Nbl = NetBufferLists; Nbl; Nbl = NET_BUFFER_LIST_NEXT_NBL(Nbl))
|
2019-06-26 14:52:38 +02:00
|
|
|
{
|
2019-07-08 11:01:39 +02:00
|
|
|
for (NET_BUFFER *Nb = NET_BUFFER_LIST_FIRST_NB(Nbl); Nb; Nb = NET_BUFFER_NEXT_NB(Nb))
|
2019-06-26 14:52:38 +02:00
|
|
|
{
|
2019-07-08 11:01:39 +02:00
|
|
|
NDIS_STATUS Status;
|
|
|
|
if ((Status = NDIS_STATUS_ADAPTER_REMOVED, !(Flags & TUN_FLAGS_PRESENT)) ||
|
|
|
|
(Status = NDIS_STATUS_PAUSED, !(Flags & TUN_FLAGS_RUNNING)) ||
|
|
|
|
(Status = NDIS_STATUS_MEDIA_DISCONNECTED, !(Flags & TUN_FLAGS_CONNECTED)))
|
|
|
|
goto cleanupDiscardPacket;
|
|
|
|
|
|
|
|
TUN_RING *Ring = Ctx->Device.Send.Ring;
|
|
|
|
ULONG RingCapacity = Ctx->Device.Send.Capacity;
|
|
|
|
ULONG PacketSize = NET_BUFFER_DATA_LENGTH(Nb);
|
|
|
|
if (Status = NDIS_STATUS_INVALID_LENGTH, PacketSize > TUN_MAX_IP_PACKET_SIZE)
|
|
|
|
goto cleanupDiscardPacket;
|
|
|
|
ULONG AlignedPacketSize = TUN_ALIGN(sizeof(TUN_PACKET) + PacketSize);
|
|
|
|
|
|
|
|
KLOCK_QUEUE_HANDLE LockHandle;
|
|
|
|
KeAcquireInStackQueuedSpinLock(&Ctx->Device.Send.Lock, &LockHandle);
|
|
|
|
|
|
|
|
ULONG RingHead = InterlockedGetU(&Ring->Head);
|
|
|
|
if (Status = NDIS_STATUS_ADAPTER_NOT_READY, RingHead >= RingCapacity)
|
|
|
|
goto cleanupReleaseSpinLock;
|
|
|
|
|
|
|
|
ULONG RingTail = InterlockedGetU(&Ring->Tail);
|
|
|
|
if (Status = NDIS_STATUS_ADAPTER_NOT_READY, RingTail >= RingCapacity)
|
|
|
|
goto cleanupReleaseSpinLock;
|
|
|
|
|
|
|
|
ULONG RingSpace = TUN_RING_WRAP(RingHead - RingTail - TUN_ALIGNMENT, RingCapacity);
|
|
|
|
if (Status = NDIS_STATUS_BUFFER_OVERFLOW, AlignedPacketSize > RingSpace)
|
|
|
|
goto cleanupReleaseSpinLock;
|
|
|
|
|
|
|
|
TUN_PACKET *Packet = (TUN_PACKET *)(Ring->Data + RingTail);
|
|
|
|
Packet->Size = PacketSize;
|
|
|
|
void *NbData = NdisGetDataBuffer(Nb, PacketSize, Packet->Data, 1, 0);
|
|
|
|
if (!NbData)
|
|
|
|
goto cleanupReleaseSpinLock;
|
|
|
|
if (NbData != Packet->Data)
|
|
|
|
NdisMoveMemory(Packet->Data, NbData, PacketSize);
|
|
|
|
InterlockedExchangeU(&Ring->Tail, TUN_RING_WRAP(RingTail + AlignedPacketSize, RingCapacity));
|
|
|
|
KeSetEvent(Ctx->Device.Send.TailMoved, IO_NETWORK_INCREMENT, FALSE);
|
|
|
|
|
|
|
|
KeReleaseInStackQueuedSpinLock(&LockHandle);
|
|
|
|
SentPacketsCount++;
|
|
|
|
SentPacketsSize += PacketSize;
|
2019-06-26 14:52:38 +02:00
|
|
|
continue;
|
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
cleanupReleaseSpinLock:
|
|
|
|
KeReleaseInStackQueuedSpinLock(&LockHandle);
|
|
|
|
cleanupDiscardPacket:
|
|
|
|
DiscardedPacketsCount++;
|
|
|
|
NET_BUFFER_LIST_STATUS(Nbl) = Status;
|
2019-06-26 14:52:38 +02:00
|
|
|
}
|
|
|
|
}
|
2019-03-08 22:33:15 +01:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
NdisMSendNetBufferListsComplete(
|
|
|
|
Ctx->MiniportAdapterHandle, NetBufferLists, NDIS_SEND_COMPLETE_FLAGS_DISPATCH_LEVEL);
|
2019-06-26 14:52:38 +02:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
ExReleaseSpinLockShared(&Ctx->TransitionLock, Irql);
|
2019-06-26 14:52:38 +02:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
InterlockedAdd64((LONG64 *)&Ctx->Statistics.ifHCOutOctets, SentPacketsSize);
|
|
|
|
InterlockedAdd64((LONG64 *)&Ctx->Statistics.ifHCOutUcastOctets, SentPacketsSize);
|
|
|
|
InterlockedAdd64((LONG64 *)&Ctx->Statistics.ifHCOutUcastPkts, SentPacketsCount);
|
|
|
|
InterlockedAdd64((LONG64 *)&Ctx->Statistics.ifOutDiscards, DiscardedPacketsCount);
|
2019-03-27 09:00:19 +01:00
|
|
|
}
|
2019-03-08 22:33:15 +01:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
static MINIPORT_CANCEL_SEND TunCancelSend;
|
|
|
|
_Use_decl_annotations_
|
2019-06-26 14:52:38 +02:00
|
|
|
static void
|
2019-07-08 11:01:39 +02:00
|
|
|
TunCancelSend(NDIS_HANDLE MiniportAdapterContext, PVOID CancelId)
|
2019-03-27 09:00:19 +01:00
|
|
|
{
|
|
|
|
}
|
2019-03-08 22:33:15 +01:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
static MINIPORT_RETURN_NET_BUFFER_LISTS TunReturnNetBufferLists;
|
|
|
|
_Use_decl_annotations_
|
2019-06-26 14:52:38 +02:00
|
|
|
static void
|
2019-07-08 11:01:39 +02:00
|
|
|
TunReturnNetBufferLists(NDIS_HANDLE MiniportAdapterContext, PNET_BUFFER_LIST NetBufferLists, ULONG ReturnFlags)
|
2019-04-02 13:41:02 +02:00
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
_IRQL_requires_max_(PASSIVE_LEVEL)
|
|
|
|
_Function_class_(KSTART_ROUTINE)
|
2019-06-26 14:52:38 +02:00
|
|
|
static void
|
2019-07-08 11:01:39 +02:00
|
|
|
TunProcessReceiveData(_Inout_ TUN_CTX *Ctx)
|
2019-03-27 09:00:19 +01:00
|
|
|
{
|
2019-07-08 11:01:39 +02:00
|
|
|
KIRQL Irql = ExAcquireSpinLockShared(&Ctx->TransitionLock);
|
|
|
|
TUN_RING *Ring = Ctx->Device.Receive.Ring;
|
|
|
|
ULONG RingCapacity = Ctx->Device.Receive.Capacity;
|
2019-06-26 14:52:38 +02:00
|
|
|
|
|
|
|
for (;;)
|
|
|
|
{
|
2019-07-08 11:01:39 +02:00
|
|
|
LONG Flags = InterlockedGet(&Ctx->Flags);
|
|
|
|
if (!(Flags & TUN_FLAGS_CONNECTED))
|
|
|
|
break;
|
2019-06-26 14:52:38 +02:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
/* Get next packet from the ring. */
|
|
|
|
ULONG RingHead = InterlockedGetU(&Ring->Head);
|
|
|
|
if (RingHead >= RingCapacity)
|
|
|
|
break;
|
2019-06-26 14:52:38 +02:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
ULONG RingTail = InterlockedGetU(&Ring->Tail);
|
|
|
|
if (RingHead == RingTail)
|
2019-06-26 14:52:38 +02:00
|
|
|
{
|
2019-07-08 11:01:39 +02:00
|
|
|
InterlockedExchange(&Ring->Alertable, TRUE);
|
|
|
|
RingTail = InterlockedGetU(&Ring->Tail);
|
|
|
|
if (RingHead == RingTail)
|
2019-06-26 14:52:38 +02:00
|
|
|
{
|
2019-07-08 11:01:39 +02:00
|
|
|
ExReleaseSpinLockShared(&Ctx->TransitionLock, Irql);
|
|
|
|
KeWaitForSingleObject(Ctx->Device.Receive.TailMoved, Executive, KernelMode, FALSE, NULL);
|
|
|
|
InterlockedExchange(&Ring->Alertable, FALSE);
|
|
|
|
Irql = ExAcquireSpinLockShared(&Ctx->TransitionLock);
|
|
|
|
continue;
|
2019-06-26 14:52:38 +02:00
|
|
|
}
|
2019-07-08 11:01:39 +02:00
|
|
|
InterlockedExchange(&Ring->Alertable, FALSE);
|
|
|
|
KeClearEvent(Ctx->Device.Receive.TailMoved);
|
2019-06-26 14:52:38 +02:00
|
|
|
}
|
2019-07-08 11:01:39 +02:00
|
|
|
if (RingTail >= RingCapacity)
|
|
|
|
break;
|
2019-06-26 14:52:38 +02:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
ULONG RingContent = TUN_RING_WRAP(RingTail - RingHead, RingCapacity);
|
|
|
|
if (RingContent < sizeof(TUN_PACKET))
|
|
|
|
break;
|
|
|
|
|
|
|
|
TUN_PACKET *Packet = (TUN_PACKET *)(Ring->Data + RingHead);
|
|
|
|
ULONG PacketSize = Packet->Size;
|
|
|
|
if (PacketSize > TUN_MAX_IP_PACKET_SIZE)
|
|
|
|
break;
|
2019-06-26 14:52:38 +02:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
ULONG AlignedPacketSize = TUN_ALIGN(sizeof(TUN_PACKET) + PacketSize);
|
|
|
|
if (AlignedPacketSize > RingContent)
|
|
|
|
break;
|
2019-06-26 14:52:38 +02:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
ULONG NblFlags;
|
|
|
|
USHORT NblProto;
|
|
|
|
if (PacketSize >= 20 && Packet->Data[0] >> 4 == 4)
|
2019-06-26 14:52:38 +02:00
|
|
|
{
|
2019-07-08 11:01:39 +02:00
|
|
|
NblFlags = NDIS_NBL_FLAGS_IS_IPV4;
|
|
|
|
NblProto = TUN_HTONS(NDIS_ETH_TYPE_IPV4);
|
2019-06-26 14:52:38 +02:00
|
|
|
}
|
2019-07-08 11:01:39 +02:00
|
|
|
else if (PacketSize >= 40 && Packet->Data[0] >> 4 == 6)
|
2019-06-26 14:52:38 +02:00
|
|
|
{
|
2019-07-08 11:01:39 +02:00
|
|
|
NblFlags = NDIS_NBL_FLAGS_IS_IPV6;
|
|
|
|
NblProto = TUN_HTONS(NDIS_ETH_TYPE_IPV6);
|
2019-06-26 14:52:38 +02:00
|
|
|
}
|
2019-07-08 11:01:39 +02:00
|
|
|
else
|
|
|
|
break;
|
2019-06-26 14:52:38 +02:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
NET_BUFFER_LIST *Nbl = NdisAllocateNetBufferAndNetBufferList(
|
|
|
|
Ctx->NblPool, 0, 0, Ctx->Device.Receive.Mdl, (ULONG)(Packet->Data - (UCHAR *)Ring), PacketSize);
|
|
|
|
if (!Nbl)
|
|
|
|
goto cleanupDiscardPacket;
|
2019-06-07 12:23:44 +02:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
Nbl->SourceHandle = Ctx->MiniportAdapterHandle;
|
|
|
|
NdisSetNblFlag(Nbl, NblFlags);
|
|
|
|
NET_BUFFER_LIST_INFO(Nbl, NetBufferListFrameType) = (PVOID)NblProto;
|
|
|
|
NET_BUFFER_LIST_STATUS(Nbl) = NDIS_STATUS_SUCCESS;
|
2019-06-07 12:23:44 +02:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
/* Inform NDIS of the packet. */
|
|
|
|
if ((Flags & (TUN_FLAGS_PRESENT | TUN_FLAGS_RUNNING)) != (TUN_FLAGS_PRESENT | TUN_FLAGS_RUNNING))
|
|
|
|
goto cleanupFreeNbl;
|
2019-06-07 12:23:44 +02:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
/* TODO: Consider making packet(s) copy rather than using NDIS_RECEIVE_FLAGS_RESOURCES. */
|
|
|
|
NdisMIndicateReceiveNetBufferLists(
|
|
|
|
Ctx->MiniportAdapterHandle,
|
|
|
|
Nbl,
|
|
|
|
NDIS_DEFAULT_PORT_NUMBER,
|
|
|
|
1,
|
|
|
|
NDIS_RECEIVE_FLAGS_DISPATCH_LEVEL | NDIS_RECEIVE_FLAGS_RESOURCES | NDIS_RECEIVE_FLAGS_SINGLE_ETHER_TYPE);
|
|
|
|
InterlockedAdd64((LONG64 *)&Ctx->Statistics.ifHCInOctets, PacketSize);
|
|
|
|
InterlockedAdd64((LONG64 *)&Ctx->Statistics.ifHCInUcastOctets, PacketSize);
|
|
|
|
InterlockedIncrement64((LONG64 *)&Ctx->Statistics.ifHCInUcastPkts);
|
2019-06-26 14:52:38 +02:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
NdisFreeNetBufferList(Nbl);
|
|
|
|
goto nextPacket;
|
2019-06-26 14:52:38 +02:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
cleanupFreeNbl:
|
|
|
|
NdisFreeNetBufferList(Nbl);
|
|
|
|
cleanupDiscardPacket:
|
|
|
|
InterlockedIncrement64((LONG64 *)&Ctx->Statistics.ifInDiscards);
|
|
|
|
nextPacket:
|
|
|
|
InterlockedExchangeU(&Ring->Head, TUN_RING_WRAP(RingHead + AlignedPacketSize, RingCapacity));
|
2019-06-26 14:52:38 +02:00
|
|
|
}
|
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
InterlockedExchangeU(&Ring->Head, MAXULONG);
|
|
|
|
ExReleaseSpinLockShared(&Ctx->TransitionLock, Irql);
|
2019-06-07 12:23:44 +02:00
|
|
|
}
|
|
|
|
|
2019-06-26 12:30:52 +02:00
|
|
|
_IRQL_requires_max_(APC_LEVEL)
|
2019-06-12 20:00:36 +02:00
|
|
|
_Must_inspect_result_
|
2019-06-26 14:52:38 +02:00
|
|
|
static NTSTATUS
|
2019-07-08 11:01:39 +02:00
|
|
|
TunDispatchCreate(_Inout_ TUN_CTX *Ctx, _Inout_ IRP *Irp)
|
2019-06-12 20:00:36 +02:00
|
|
|
{
|
2019-07-05 16:41:54 +02:00
|
|
|
NTSTATUS Status;
|
|
|
|
|
2019-06-29 13:34:15 +02:00
|
|
|
KIRQL Irql = ExAcquireSpinLockShared(&Ctx->TransitionLock);
|
|
|
|
LONG Flags = InterlockedGet(&Ctx->Flags);
|
2019-07-08 11:01:39 +02:00
|
|
|
if (Status = STATUS_DELETE_PENDING, !(Flags & TUN_FLAGS_PRESENT))
|
2019-07-05 10:38:52 +02:00
|
|
|
goto cleanupReleaseSpinLock;
|
2019-06-12 20:00:36 +02:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
IO_STACK_LOCATION *Stack = IoGetCurrentIrpStackLocation(Irp);
|
|
|
|
Status = IoAcquireRemoveLock(&Ctx->Device.RemoveLock, Stack->FileObject);
|
2019-06-12 20:00:36 +02:00
|
|
|
|
2019-07-05 10:38:52 +02:00
|
|
|
cleanupReleaseSpinLock:
|
2019-06-29 13:34:15 +02:00
|
|
|
ExReleaseSpinLockShared(&Ctx->TransitionLock, Irql);
|
|
|
|
return Status;
|
2019-06-12 20:00:36 +02:00
|
|
|
}
|
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
_IRQL_requires_max_(PASSIVE_LEVEL)
|
2019-04-09 13:16:40 +02:00
|
|
|
_Must_inspect_result_
|
2019-06-26 14:52:38 +02:00
|
|
|
static NTSTATUS
|
2019-07-08 11:01:39 +02:00
|
|
|
TunDispatchRegisterBuffers(_Inout_ TUN_CTX *Ctx, _Inout_ IRP *Irp)
|
2019-03-08 22:33:15 +01:00
|
|
|
{
|
2019-06-29 13:34:15 +02:00
|
|
|
NTSTATUS Status;
|
2019-07-03 14:21:32 +02:00
|
|
|
IO_STACK_LOCATION *Stack = IoGetCurrentIrpStackLocation(Irp);
|
2019-06-26 14:52:38 +02:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
if (InterlockedCompareExchangePointer(&Ctx->Device.Owner, Stack->FileObject, NULL) != NULL)
|
|
|
|
return STATUS_ALREADY_INITIALIZED;
|
2019-06-26 14:52:38 +02:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
TUN_REGISTER_RINGS *Rrb = Irp->AssociatedIrp.SystemBuffer;
|
|
|
|
if (Status = STATUS_INVALID_PARAMETER, Stack->Parameters.DeviceIoControl.InputBufferLength != sizeof(*Rrb))
|
|
|
|
goto cleanupResetOwner;
|
2019-06-26 14:52:38 +02:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
/* Analyze and lock send ring. */
|
|
|
|
Ctx->Device.Send.Capacity = TUN_RING_CAPACITY(Rrb->Send.RingSize);
|
|
|
|
if (Status = STATUS_INVALID_PARAMETER,
|
|
|
|
(Ctx->Device.Send.Capacity < TUN_MIN_RING_CAPACITY || Ctx->Device.Send.Capacity > TUN_MAX_RING_CAPACITY ||
|
|
|
|
PopulationCount64(Ctx->Device.Send.Capacity) != 1 || !Rrb->Send.TailMoved || !Rrb->Send.Ring))
|
|
|
|
goto cleanupResetOwner;
|
2019-07-05 08:19:56 +02:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
if (!NT_SUCCESS(
|
|
|
|
Status = ObReferenceObjectByHandle(
|
|
|
|
Rrb->Send.TailMoved,
|
|
|
|
EVENT_MODIFY_STATE, /* We will not wait on send ring tail moved event. */
|
|
|
|
*ExEventObjectType,
|
|
|
|
UserMode,
|
|
|
|
&Ctx->Device.Send.TailMoved,
|
|
|
|
NULL)))
|
|
|
|
goto cleanupResetOwner;
|
|
|
|
|
|
|
|
Ctx->Device.Send.Mdl = IoAllocateMdl(Rrb->Send.Ring, Rrb->Send.RingSize, FALSE, FALSE, NULL);
|
|
|
|
if (Status = STATUS_INSUFFICIENT_RESOURCES, !Ctx->Device.Send.Mdl)
|
|
|
|
goto cleanupSendTailMoved;
|
|
|
|
try
|
2019-06-26 14:52:38 +02:00
|
|
|
{
|
2019-07-08 11:01:39 +02:00
|
|
|
Status = STATUS_INVALID_USER_BUFFER;
|
|
|
|
MmProbeAndLockPages(Ctx->Device.Send.Mdl, UserMode, IoWriteAccess);
|
2019-06-26 14:52:38 +02:00
|
|
|
}
|
2019-07-08 11:01:39 +02:00
|
|
|
except(EXCEPTION_EXECUTE_HANDLER) { goto cleanupSendMdl; }
|
2019-06-26 14:52:38 +02:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
Ctx->Device.Send.Ring =
|
|
|
|
MmGetSystemAddressForMdlSafe(Ctx->Device.Send.Mdl, NormalPagePriority | MdlMappingNoExecute);
|
|
|
|
if (Status = STATUS_INSUFFICIENT_RESOURCES, !Ctx->Device.Send.Ring)
|
|
|
|
goto cleanupSendUnlockPages;
|
2019-06-26 14:52:38 +02:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
/* Analyze and lock receive ring. */
|
|
|
|
Ctx->Device.Receive.Capacity = TUN_RING_CAPACITY(Rrb->Receive.RingSize);
|
|
|
|
if (Status = STATUS_INVALID_PARAMETER,
|
|
|
|
(Ctx->Device.Receive.Capacity < TUN_MIN_RING_CAPACITY || Ctx->Device.Receive.Capacity > TUN_MAX_RING_CAPACITY ||
|
|
|
|
PopulationCount64(Ctx->Device.Receive.Capacity) != 1 || !Rrb->Receive.TailMoved || !Rrb->Receive.Ring))
|
|
|
|
goto cleanupSendUnlockPages;
|
2019-03-22 13:47:17 +01:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
if (!NT_SUCCESS(
|
|
|
|
Status = ObReferenceObjectByHandle(
|
|
|
|
Rrb->Receive.TailMoved,
|
|
|
|
SYNCHRONIZE | EVENT_MODIFY_STATE, /* We need to set recv ring TailMoved event to unblock on close. */
|
|
|
|
*ExEventObjectType,
|
|
|
|
UserMode,
|
|
|
|
&Ctx->Device.Receive.TailMoved,
|
|
|
|
NULL)))
|
|
|
|
goto cleanupSendUnlockPages;
|
|
|
|
|
|
|
|
Ctx->Device.Receive.Mdl = IoAllocateMdl(Rrb->Receive.Ring, Rrb->Receive.RingSize, FALSE, FALSE, NULL);
|
|
|
|
if (Status = STATUS_INSUFFICIENT_RESOURCES, !Ctx->Device.Receive.Mdl)
|
|
|
|
goto cleanupReceiveTailMoved;
|
|
|
|
try
|
2019-06-26 14:52:38 +02:00
|
|
|
{
|
2019-07-08 11:01:39 +02:00
|
|
|
Status = STATUS_INVALID_USER_BUFFER;
|
|
|
|
MmProbeAndLockPages(Ctx->Device.Receive.Mdl, UserMode, IoWriteAccess);
|
2019-06-26 14:52:38 +02:00
|
|
|
}
|
2019-07-08 11:01:39 +02:00
|
|
|
except(EXCEPTION_EXECUTE_HANDLER) { goto cleanupReceiveMdl; }
|
2019-03-08 22:33:15 +01:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
Ctx->Device.Receive.Ring =
|
|
|
|
MmGetSystemAddressForMdlSafe(Ctx->Device.Receive.Mdl, NormalPagePriority | MdlMappingNoExecute);
|
|
|
|
if (Status = STATUS_INSUFFICIENT_RESOURCES, !Ctx->Device.Receive.Ring)
|
|
|
|
goto cleanupReceiveUnlockPages;
|
2019-06-12 20:00:36 +02:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
InterlockedOr(&Ctx->Flags, TUN_FLAGS_CONNECTED);
|
2019-06-12 20:00:36 +02:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
/* Spawn receiver thread. */
|
|
|
|
OBJECT_ATTRIBUTES ObjectAttributes;
|
|
|
|
InitializeObjectAttributes(&ObjectAttributes, NULL, OBJ_KERNEL_HANDLE, NULL, NULL);
|
|
|
|
if (Status = NDIS_STATUS_FAILURE,
|
|
|
|
!NT_SUCCESS(PsCreateSystemThread(
|
|
|
|
&Ctx->Device.Receive.Thread, THREAD_ALL_ACCESS, &ObjectAttributes, NULL, NULL, TunProcessReceiveData, Ctx)))
|
|
|
|
goto cleanupFlagsConnected;
|
2019-06-12 20:00:36 +02:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
TunIndicateStatus(Ctx->MiniportAdapterHandle, MediaConnectStateConnected);
|
|
|
|
return STATUS_SUCCESS;
|
2019-06-12 20:00:36 +02:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
cleanupFlagsConnected:
|
|
|
|
InterlockedAnd(&Ctx->Flags, ~TUN_FLAGS_CONNECTED);
|
|
|
|
ExReleaseSpinLockExclusive(
|
|
|
|
&Ctx->TransitionLock,
|
|
|
|
ExAcquireSpinLockExclusive(&Ctx->TransitionLock)); /* Ensure above change is visible to all readers. */
|
|
|
|
cleanupReceiveUnlockPages:
|
|
|
|
MmUnlockPages(Ctx->Device.Receive.Mdl);
|
|
|
|
cleanupReceiveMdl:
|
|
|
|
IoFreeMdl(Ctx->Device.Receive.Mdl);
|
|
|
|
cleanupReceiveTailMoved:
|
|
|
|
ObDereferenceObject(Ctx->Device.Receive.TailMoved);
|
|
|
|
cleanupSendUnlockPages:
|
|
|
|
MmUnlockPages(Ctx->Device.Send.Mdl);
|
|
|
|
cleanupSendMdl:
|
|
|
|
IoFreeMdl(Ctx->Device.Send.Mdl);
|
|
|
|
cleanupSendTailMoved:
|
|
|
|
ObDereferenceObject(Ctx->Device.Send.TailMoved);
|
|
|
|
cleanupResetOwner:
|
|
|
|
InterlockedExchangePointer(&Ctx->Device.Owner, NULL);
|
2019-06-29 13:34:15 +02:00
|
|
|
return Status;
|
2019-06-12 20:00:36 +02:00
|
|
|
}
|
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
_IRQL_requires_max_(PASSIVE_LEVEL)
|
2019-06-26 20:34:08 +02:00
|
|
|
static void
|
2019-07-08 11:01:39 +02:00
|
|
|
TunDispatchUnregisterBuffers(_Inout_ TUN_CTX *Ctx, _In_ FILE_OBJECT *Owner)
|
2019-06-26 20:34:08 +02:00
|
|
|
{
|
2019-07-08 11:01:39 +02:00
|
|
|
if (InterlockedCompareExchangePointer(&Ctx->Device.Owner, NULL, Owner) != Owner)
|
|
|
|
return;
|
|
|
|
|
|
|
|
InterlockedAnd(&Ctx->Flags, ~TUN_FLAGS_CONNECTED);
|
2019-06-27 11:59:22 +02:00
|
|
|
ExReleaseSpinLockExclusive(
|
|
|
|
&Ctx->TransitionLock,
|
2019-07-08 11:01:39 +02:00
|
|
|
ExAcquireSpinLockExclusive(&Ctx->TransitionLock)); /* Ensure Flags change is visible to all readers. */
|
|
|
|
KeSetEvent(Ctx->Device.Receive.TailMoved, IO_NO_INCREMENT, FALSE);
|
|
|
|
|
|
|
|
TunIndicateStatus(Ctx->MiniportAdapterHandle, MediaConnectStateDisconnected);
|
|
|
|
|
|
|
|
PKTHREAD ThreadObject;
|
|
|
|
if (NT_SUCCESS(
|
|
|
|
ObReferenceObjectByHandle(Ctx->Device.Receive.Thread, SYNCHRONIZE, NULL, KernelMode, &ThreadObject, NULL)))
|
2019-06-26 20:34:08 +02:00
|
|
|
{
|
2019-07-08 11:01:39 +02:00
|
|
|
KeWaitForSingleObject(ThreadObject, Executive, KernelMode, FALSE, NULL);
|
|
|
|
ObDereferenceObject(ThreadObject);
|
2019-06-26 20:34:08 +02:00
|
|
|
}
|
2019-07-08 11:01:39 +02:00
|
|
|
ZwClose(Ctx->Device.Receive.Thread);
|
|
|
|
|
|
|
|
InterlockedExchangeU(&Ctx->Device.Send.Ring->Tail, MAXULONG);
|
|
|
|
KeSetEvent(Ctx->Device.Send.TailMoved, IO_NO_INCREMENT, FALSE);
|
|
|
|
|
|
|
|
MmUnlockPages(Ctx->Device.Receive.Mdl);
|
|
|
|
IoFreeMdl(Ctx->Device.Receive.Mdl);
|
|
|
|
ObDereferenceObject(Ctx->Device.Receive.TailMoved);
|
|
|
|
MmUnlockPages(Ctx->Device.Send.Mdl);
|
|
|
|
IoFreeMdl(Ctx->Device.Send.Mdl);
|
|
|
|
ObDereferenceObject(Ctx->Device.Send.TailMoved);
|
2019-06-26 20:34:08 +02:00
|
|
|
}
|
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
static DRIVER_DISPATCH_PAGED TunDispatch;
|
2019-03-27 09:00:19 +01:00
|
|
|
_Use_decl_annotations_
|
2019-06-26 14:52:38 +02:00
|
|
|
static NTSTATUS
|
|
|
|
TunDispatch(DEVICE_OBJECT *DeviceObject, IRP *Irp)
|
2019-03-27 09:00:19 +01:00
|
|
|
{
|
2019-07-04 23:50:00 +02:00
|
|
|
NTSTATUS Status;
|
2019-06-26 14:52:38 +02:00
|
|
|
|
|
|
|
Irp->IoStatus.Information = 0;
|
2019-06-29 13:34:15 +02:00
|
|
|
TUN_CTX *Ctx = NdisGetDeviceReservedExtension(DeviceObject);
|
2019-07-04 23:50:00 +02:00
|
|
|
if (Status = STATUS_INVALID_HANDLE, !Ctx)
|
2019-07-05 10:38:52 +02:00
|
|
|
goto cleanupCompleteRequest;
|
2019-06-26 14:52:38 +02:00
|
|
|
|
2019-06-29 13:34:15 +02:00
|
|
|
IO_STACK_LOCATION *Stack = IoGetCurrentIrpStackLocation(Irp);
|
|
|
|
switch (Stack->MajorFunction)
|
2019-06-26 14:52:38 +02:00
|
|
|
{
|
|
|
|
case IRP_MJ_CREATE:
|
2019-06-29 13:34:15 +02:00
|
|
|
if (!NT_SUCCESS(Status = IoAcquireRemoveLock(&Ctx->Device.RemoveLock, Irp)))
|
2019-07-05 10:38:52 +02:00
|
|
|
goto cleanupCompleteRequest;
|
2019-07-08 11:01:39 +02:00
|
|
|
Status = TunDispatchCreate(Ctx, Irp);
|
|
|
|
IoReleaseRemoveLock(&Ctx->Device.RemoveLock, Irp);
|
|
|
|
break;
|
2019-06-26 14:52:38 +02:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
case IRP_MJ_DEVICE_CONTROL:
|
|
|
|
if ((Status = STATUS_INVALID_PARAMETER,
|
|
|
|
Stack->Parameters.DeviceIoControl.IoControlCode != TUN_IOCTL_REGISTER_RINGS) ||
|
|
|
|
!NT_SUCCESS(Status = IoAcquireRemoveLock(&Ctx->Device.RemoveLock, Irp)))
|
|
|
|
goto cleanupCompleteRequest;
|
|
|
|
Status = TunDispatchRegisterBuffers(Ctx, Irp);
|
|
|
|
IoReleaseRemoveLock(&Ctx->Device.RemoveLock, Irp);
|
2019-06-26 20:34:08 +02:00
|
|
|
break;
|
2019-06-26 14:52:38 +02:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
case IRP_MJ_CLOSE:
|
2019-07-04 23:50:00 +02:00
|
|
|
Status = STATUS_SUCCESS;
|
2019-07-08 11:01:39 +02:00
|
|
|
TunDispatchUnregisterBuffers(Ctx, Stack->FileObject);
|
|
|
|
IoReleaseRemoveLock(&Ctx->Device.RemoveLock, Stack->FileObject);
|
2019-06-26 20:34:08 +02:00
|
|
|
break;
|
2019-06-26 14:52:38 +02:00
|
|
|
|
|
|
|
default:
|
2019-06-29 13:34:15 +02:00
|
|
|
Status = STATUS_INVALID_PARAMETER;
|
2019-06-26 20:34:08 +02:00
|
|
|
break;
|
2019-06-26 14:52:38 +02:00
|
|
|
}
|
2019-03-27 09:00:19 +01:00
|
|
|
|
2019-07-05 10:38:52 +02:00
|
|
|
cleanupCompleteRequest:
|
2019-06-29 13:34:15 +02:00
|
|
|
Irp->IoStatus.Status = Status;
|
2019-06-26 14:52:38 +02:00
|
|
|
IoCompleteRequest(Irp, IO_NO_INCREMENT);
|
2019-06-29 13:34:15 +02:00
|
|
|
return Status;
|
2019-03-27 09:00:19 +01:00
|
|
|
}
|
|
|
|
|
2019-06-26 14:52:38 +02:00
|
|
|
_Dispatch_type_(IRP_MJ_PNP) static DRIVER_DISPATCH TunDispatchPnP;
|
2019-06-20 09:46:52 +02:00
|
|
|
_Use_decl_annotations_
|
2019-06-26 14:52:38 +02:00
|
|
|
static NTSTATUS
|
|
|
|
TunDispatchPnP(DEVICE_OBJECT *DeviceObject, IRP *Irp)
|
2019-06-20 09:46:52 +02:00
|
|
|
{
|
2019-06-29 13:34:15 +02:00
|
|
|
IO_STACK_LOCATION *Stack = IoGetCurrentIrpStackLocation(Irp);
|
|
|
|
if (Stack->MajorFunction == IRP_MJ_PNP)
|
2019-06-26 14:52:38 +02:00
|
|
|
{
|
|
|
|
#pragma warning(suppress : 28175)
|
2019-06-29 13:34:15 +02:00
|
|
|
TUN_CTX *Ctx = DeviceObject->Reserved;
|
|
|
|
if (!Ctx)
|
2019-06-27 13:57:14 +02:00
|
|
|
return NdisDispatchPnP(DeviceObject, Irp);
|
2019-06-26 14:52:38 +02:00
|
|
|
|
2019-06-29 13:34:15 +02:00
|
|
|
switch (Stack->MinorFunction)
|
2019-06-26 14:52:38 +02:00
|
|
|
{
|
|
|
|
case IRP_MN_QUERY_REMOVE_DEVICE:
|
2019-07-03 12:15:48 +02:00
|
|
|
case IRP_MN_SURPRISE_REMOVAL:
|
2019-06-29 13:34:15 +02:00
|
|
|
InterlockedAnd(&Ctx->Flags, ~TUN_FLAGS_PRESENT);
|
2019-06-27 11:59:22 +02:00
|
|
|
ExReleaseSpinLockExclusive(
|
2019-06-29 13:34:15 +02:00
|
|
|
&Ctx->TransitionLock,
|
|
|
|
ExAcquireSpinLockExclusive(&Ctx->TransitionLock)); /* Ensure above change is visible to all readers. */
|
2019-06-26 14:52:38 +02:00
|
|
|
break;
|
|
|
|
|
|
|
|
case IRP_MN_CANCEL_REMOVE_DEVICE:
|
2019-06-29 13:34:15 +02:00
|
|
|
InterlockedOr(&Ctx->Flags, TUN_FLAGS_PRESENT);
|
2019-06-26 14:52:38 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return NdisDispatchPnP(DeviceObject, Irp);
|
2019-06-20 09:46:52 +02:00
|
|
|
}
|
|
|
|
|
2019-03-08 22:33:15 +01:00
|
|
|
static MINIPORT_RESTART TunRestart;
|
|
|
|
_Use_decl_annotations_
|
2019-06-26 14:52:38 +02:00
|
|
|
static NDIS_STATUS
|
|
|
|
TunRestart(NDIS_HANDLE MiniportAdapterContext, PNDIS_MINIPORT_RESTART_PARAMETERS MiniportRestartParameters)
|
2019-03-08 22:33:15 +01:00
|
|
|
{
|
2019-06-29 13:34:15 +02:00
|
|
|
TUN_CTX *Ctx = (TUN_CTX *)MiniportAdapterContext;
|
2019-03-08 22:33:15 +01:00
|
|
|
|
2019-06-29 13:34:15 +02:00
|
|
|
InterlockedOr(&Ctx->Flags, TUN_FLAGS_RUNNING);
|
2019-05-24 14:18:18 +02:00
|
|
|
|
2019-06-26 14:52:38 +02:00
|
|
|
return NDIS_STATUS_SUCCESS;
|
2019-03-08 22:33:15 +01:00
|
|
|
}
|
|
|
|
|
2019-06-07 12:23:44 +02:00
|
|
|
static MINIPORT_PAUSE TunPause;
|
2019-03-08 22:33:15 +01:00
|
|
|
_Use_decl_annotations_
|
2019-06-26 14:52:38 +02:00
|
|
|
static NDIS_STATUS
|
|
|
|
TunPause(NDIS_HANDLE MiniportAdapterContext, PNDIS_MINIPORT_PAUSE_PARAMETERS MiniportPauseParameters)
|
2019-03-08 22:33:15 +01:00
|
|
|
{
|
2019-06-29 13:34:15 +02:00
|
|
|
TUN_CTX *Ctx = (TUN_CTX *)MiniportAdapterContext;
|
2019-03-08 22:33:15 +01:00
|
|
|
|
2019-06-29 13:34:15 +02:00
|
|
|
InterlockedAnd(&Ctx->Flags, ~TUN_FLAGS_RUNNING);
|
2019-06-27 11:59:22 +02:00
|
|
|
ExReleaseSpinLockExclusive(
|
2019-06-29 13:34:15 +02:00
|
|
|
&Ctx->TransitionLock,
|
|
|
|
ExAcquireSpinLockExclusive(&Ctx->TransitionLock)); /* Ensure above change is visible to all readers. */
|
2019-03-08 22:33:15 +01:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
return NDIS_STATUS_SUCCESS;
|
2019-03-08 22:33:15 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static MINIPORT_DEVICE_PNP_EVENT_NOTIFY TunDevicePnPEventNotify;
|
|
|
|
_Use_decl_annotations_
|
2019-06-26 14:52:38 +02:00
|
|
|
static void
|
|
|
|
TunDevicePnPEventNotify(NDIS_HANDLE MiniportAdapterContext, PNET_DEVICE_PNP_EVENT NetDevicePnPEvent)
|
2019-03-08 22:33:15 +01:00
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
static MINIPORT_INITIALIZE TunInitializeEx;
|
|
|
|
_Use_decl_annotations_
|
2019-06-26 14:52:38 +02:00
|
|
|
static NDIS_STATUS
|
|
|
|
TunInitializeEx(
|
|
|
|
NDIS_HANDLE MiniportAdapterHandle,
|
|
|
|
NDIS_HANDLE MiniportDriverContext,
|
|
|
|
PNDIS_MINIPORT_INIT_PARAMETERS MiniportInitParameters)
|
2019-03-08 22:33:15 +01:00
|
|
|
{
|
2019-06-29 13:34:15 +02:00
|
|
|
NDIS_STATUS Status;
|
2019-06-26 14:52:38 +02:00
|
|
|
|
|
|
|
if (!MiniportAdapterHandle)
|
|
|
|
return NDIS_STATUS_FAILURE;
|
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
/* Register data device first. Having only one device per adapter allows us to store adapter context inside device
|
|
|
|
* extension. */
|
2019-07-03 12:15:48 +02:00
|
|
|
WCHAR DeviceName[sizeof(L"\\Device\\" TUN_DEVICE_NAME L"4294967295") / sizeof(WCHAR) + 1] = { 0 };
|
2019-06-29 13:34:15 +02:00
|
|
|
UNICODE_STRING UnicodeDeviceName;
|
|
|
|
TunInitUnicodeString(&UnicodeDeviceName, DeviceName);
|
2019-06-26 14:52:38 +02:00
|
|
|
RtlUnicodeStringPrintf(
|
2019-06-29 13:34:15 +02:00
|
|
|
&UnicodeDeviceName, L"\\Device\\" TUN_DEVICE_NAME, (ULONG)MiniportInitParameters->NetLuid.Info.NetLuidIndex);
|
2019-06-26 14:52:38 +02:00
|
|
|
|
2019-07-03 12:15:48 +02:00
|
|
|
WCHAR SymbolicName[sizeof(L"\\DosDevices\\" TUN_DEVICE_NAME L"4294967295") / sizeof(WCHAR) + 1] = { 0 };
|
2019-06-29 13:34:15 +02:00
|
|
|
UNICODE_STRING UnicodeSymbolicName;
|
|
|
|
TunInitUnicodeString(&UnicodeSymbolicName, SymbolicName);
|
2019-06-26 14:52:38 +02:00
|
|
|
RtlUnicodeStringPrintf(
|
2019-06-29 13:34:15 +02:00
|
|
|
&UnicodeSymbolicName,
|
2019-06-26 14:52:38 +02:00
|
|
|
L"\\DosDevices\\" TUN_DEVICE_NAME,
|
|
|
|
(ULONG)MiniportInitParameters->NetLuid.Info.NetLuidIndex);
|
|
|
|
|
2019-06-29 13:34:15 +02:00
|
|
|
static PDRIVER_DISPATCH DispatchTable[IRP_MJ_MAXIMUM_FUNCTION + 1] = {
|
2019-06-26 14:52:38 +02:00
|
|
|
TunDispatch, /* IRP_MJ_CREATE */
|
|
|
|
NULL, /* IRP_MJ_CREATE_NAMED_PIPE */
|
|
|
|
TunDispatch, /* IRP_MJ_CLOSE */
|
2019-07-08 11:01:39 +02:00
|
|
|
NULL, /* IRP_MJ_READ */
|
|
|
|
NULL, /* IRP_MJ_WRITE */
|
2019-06-26 14:52:38 +02:00
|
|
|
NULL, /* IRP_MJ_QUERY_INFORMATION */
|
|
|
|
NULL, /* IRP_MJ_SET_INFORMATION */
|
|
|
|
NULL, /* IRP_MJ_QUERY_EA */
|
|
|
|
NULL, /* IRP_MJ_SET_EA */
|
|
|
|
NULL, /* IRP_MJ_FLUSH_BUFFERS */
|
|
|
|
NULL, /* IRP_MJ_QUERY_VOLUME_INFORMATION */
|
|
|
|
NULL, /* IRP_MJ_SET_VOLUME_INFORMATION */
|
|
|
|
NULL, /* IRP_MJ_DIRECTORY_CONTROL */
|
|
|
|
NULL, /* IRP_MJ_FILE_SYSTEM_CONTROL */
|
2019-07-08 11:01:39 +02:00
|
|
|
TunDispatch, /* IRP_MJ_DEVICE_CONTROL */
|
2019-06-26 14:52:38 +02:00
|
|
|
};
|
2019-06-29 13:34:15 +02:00
|
|
|
NDIS_DEVICE_OBJECT_ATTRIBUTES DeviceObjectAttributes = {
|
2019-06-26 18:59:02 +02:00
|
|
|
.Header = { .Type = NDIS_OBJECT_TYPE_DEVICE_OBJECT_ATTRIBUTES,
|
|
|
|
.Revision = NDIS_DEVICE_OBJECT_ATTRIBUTES_REVISION_1,
|
|
|
|
.Size = NDIS_SIZEOF_DEVICE_OBJECT_ATTRIBUTES_REVISION_1 },
|
2019-06-29 13:34:15 +02:00
|
|
|
.DeviceName = &UnicodeDeviceName,
|
|
|
|
.SymbolicName = &UnicodeSymbolicName,
|
|
|
|
.MajorFunctions = DispatchTable,
|
2019-06-26 14:52:38 +02:00
|
|
|
.ExtensionSize = sizeof(TUN_CTX),
|
|
|
|
.DefaultSDDLString = &SDDL_DEVOBJ_SYS_ALL /* Kernel, and SYSTEM: full control. Others: none */
|
|
|
|
};
|
2019-06-29 13:34:15 +02:00
|
|
|
NDIS_HANDLE DeviceObjectHandle;
|
|
|
|
DEVICE_OBJECT *DeviceObject;
|
|
|
|
if (!NT_SUCCESS(
|
|
|
|
Status = NdisRegisterDeviceEx(
|
|
|
|
NdisMiniportDriverHandle, &DeviceObjectAttributes, &DeviceObject, &DeviceObjectHandle)))
|
2019-06-26 14:52:38 +02:00
|
|
|
return NDIS_STATUS_FAILURE;
|
|
|
|
|
2019-06-29 13:34:15 +02:00
|
|
|
TUN_CTX *Ctx = NdisGetDeviceReservedExtension(DeviceObject);
|
2019-07-04 23:50:00 +02:00
|
|
|
if (Status = NDIS_STATUS_FAILURE, !Ctx)
|
2019-07-05 10:38:52 +02:00
|
|
|
goto cleanupDeregisterDevice;
|
2019-06-29 13:34:15 +02:00
|
|
|
DEVICE_OBJECT *FunctionalDeviceObject;
|
|
|
|
NdisMGetDeviceProperty(MiniportAdapterHandle, NULL, &FunctionalDeviceObject, NULL, NULL, NULL);
|
2019-06-26 14:52:38 +02:00
|
|
|
|
2019-06-27 11:46:33 +02:00
|
|
|
/* Reverse engineering indicates that we'd be better off calling
|
|
|
|
* NdisWdfGetAdapterContextFromAdapterHandle(functional_device),
|
|
|
|
* which points to our TUN_CTX object directly, but this isn't
|
|
|
|
* available before Windows 10, so for now we just stick it into
|
|
|
|
* this reserved field. Revisit this when we drop support for old
|
|
|
|
* Windows versions. */
|
2019-06-26 14:52:38 +02:00
|
|
|
#pragma warning(suppress : 28175)
|
2019-06-29 13:34:15 +02:00
|
|
|
ASSERT(!FunctionalDeviceObject->Reserved);
|
2019-06-26 14:52:38 +02:00
|
|
|
#pragma warning(suppress : 28175)
|
2019-06-29 13:34:15 +02:00
|
|
|
FunctionalDeviceObject->Reserved = Ctx;
|
2019-06-26 14:52:38 +02:00
|
|
|
|
2019-06-29 13:34:15 +02:00
|
|
|
NdisZeroMemory(Ctx, sizeof(*Ctx));
|
|
|
|
Ctx->MiniportAdapterHandle = MiniportAdapterHandle;
|
2019-06-26 14:52:38 +02:00
|
|
|
|
2019-06-29 13:34:15 +02:00
|
|
|
Ctx->Statistics.Header.Type = NDIS_OBJECT_TYPE_DEFAULT;
|
|
|
|
Ctx->Statistics.Header.Revision = NDIS_STATISTICS_INFO_REVISION_1;
|
|
|
|
Ctx->Statistics.Header.Size = NDIS_SIZEOF_STATISTICS_INFO_REVISION_1;
|
|
|
|
Ctx->Statistics.SupportedStatistics =
|
2019-06-26 14:52:38 +02:00
|
|
|
NDIS_STATISTICS_FLAGS_VALID_DIRECTED_FRAMES_RCV | NDIS_STATISTICS_FLAGS_VALID_MULTICAST_FRAMES_RCV |
|
|
|
|
NDIS_STATISTICS_FLAGS_VALID_BROADCAST_FRAMES_RCV | NDIS_STATISTICS_FLAGS_VALID_BYTES_RCV |
|
|
|
|
NDIS_STATISTICS_FLAGS_VALID_RCV_DISCARDS | NDIS_STATISTICS_FLAGS_VALID_RCV_ERROR |
|
|
|
|
NDIS_STATISTICS_FLAGS_VALID_DIRECTED_FRAMES_XMIT | NDIS_STATISTICS_FLAGS_VALID_MULTICAST_FRAMES_XMIT |
|
|
|
|
NDIS_STATISTICS_FLAGS_VALID_BROADCAST_FRAMES_XMIT | NDIS_STATISTICS_FLAGS_VALID_BYTES_XMIT |
|
|
|
|
NDIS_STATISTICS_FLAGS_VALID_XMIT_ERROR | NDIS_STATISTICS_FLAGS_VALID_XMIT_DISCARDS |
|
|
|
|
NDIS_STATISTICS_FLAGS_VALID_DIRECTED_BYTES_RCV | NDIS_STATISTICS_FLAGS_VALID_MULTICAST_BYTES_RCV |
|
|
|
|
NDIS_STATISTICS_FLAGS_VALID_BROADCAST_BYTES_RCV | NDIS_STATISTICS_FLAGS_VALID_DIRECTED_BYTES_XMIT |
|
|
|
|
NDIS_STATISTICS_FLAGS_VALID_MULTICAST_BYTES_XMIT | NDIS_STATISTICS_FLAGS_VALID_BROADCAST_BYTES_XMIT;
|
|
|
|
|
2019-06-29 13:34:15 +02:00
|
|
|
Ctx->Device.Handle = DeviceObjectHandle;
|
|
|
|
Ctx->Device.Object = DeviceObject;
|
2019-07-03 12:43:55 +02:00
|
|
|
IoInitializeRemoveLock(&Ctx->Device.RemoveLock, TUN_MEMORY_TAG, 0, 0);
|
2019-07-08 11:01:39 +02:00
|
|
|
KeInitializeSpinLock(&Ctx->Device.Send.Lock);
|
2019-06-26 14:52:38 +02:00
|
|
|
|
2019-06-29 13:34:15 +02:00
|
|
|
NET_BUFFER_LIST_POOL_PARAMETERS NblPoolParameters = {
|
2019-06-26 18:59:02 +02:00
|
|
|
.Header = { .Type = NDIS_OBJECT_TYPE_DEFAULT,
|
|
|
|
.Revision = NET_BUFFER_LIST_POOL_PARAMETERS_REVISION_1,
|
|
|
|
.Size = NDIS_SIZEOF_NET_BUFFER_LIST_POOL_PARAMETERS_REVISION_1 },
|
2019-06-26 14:52:38 +02:00
|
|
|
.ProtocolId = NDIS_PROTOCOL_ID_DEFAULT,
|
|
|
|
.fAllocateNetBuffer = TRUE,
|
2019-07-03 12:43:55 +02:00
|
|
|
.PoolTag = TUN_MEMORY_TAG
|
2019-06-26 18:59:02 +02:00
|
|
|
};
|
2019-07-08 11:09:09 +02:00
|
|
|
/* Leaking memory 'Ctx->NblPool'. Note: 'Ctx->NblPool' is freed in TunHaltEx; or on failure. */
|
2019-07-05 13:23:29 +02:00
|
|
|
#pragma warning(suppress : 6014)
|
|
|
|
Ctx->NblPool = NdisAllocateNetBufferListPool(MiniportAdapterHandle, &NblPoolParameters);
|
|
|
|
if (Status = NDIS_STATUS_FAILURE, !Ctx->NblPool)
|
2019-07-05 10:38:52 +02:00
|
|
|
goto cleanupDeregisterDevice;
|
2019-06-26 14:52:38 +02:00
|
|
|
|
2019-06-29 13:34:15 +02:00
|
|
|
NDIS_MINIPORT_ADAPTER_REGISTRATION_ATTRIBUTES AdapterRegistrationAttributes = {
|
2019-06-26 18:59:02 +02:00
|
|
|
.Header = { .Type = NDIS_OBJECT_TYPE_MINIPORT_ADAPTER_REGISTRATION_ATTRIBUTES,
|
|
|
|
.Revision = NdisVersion < NDIS_RUNTIME_VERSION_630
|
|
|
|
? NDIS_MINIPORT_ADAPTER_REGISTRATION_ATTRIBUTES_REVISION_1
|
|
|
|
: NDIS_MINIPORT_ADAPTER_REGISTRATION_ATTRIBUTES_REVISION_2,
|
|
|
|
.Size = NdisVersion < NDIS_RUNTIME_VERSION_630
|
|
|
|
? NDIS_SIZEOF_MINIPORT_ADAPTER_REGISTRATION_ATTRIBUTES_REVISION_1
|
|
|
|
: NDIS_SIZEOF_MINIPORT_ADAPTER_REGISTRATION_ATTRIBUTES_REVISION_2 },
|
2019-06-26 14:52:38 +02:00
|
|
|
.AttributeFlags = NDIS_MINIPORT_ATTRIBUTES_NO_HALT_ON_SUSPEND | NDIS_MINIPORT_ATTRIBUTES_SURPRISE_REMOVE_OK,
|
|
|
|
.InterfaceType = NdisInterfaceInternal,
|
2019-06-29 13:34:15 +02:00
|
|
|
.MiniportAdapterContext = Ctx
|
2019-06-26 18:59:02 +02:00
|
|
|
};
|
2019-07-04 23:50:00 +02:00
|
|
|
if (Status = NDIS_STATUS_FAILURE,
|
|
|
|
!NT_SUCCESS(NdisMSetMiniportAttributes(
|
|
|
|
MiniportAdapterHandle, (PNDIS_MINIPORT_ADAPTER_ATTRIBUTES)&AdapterRegistrationAttributes)))
|
2019-07-05 10:38:52 +02:00
|
|
|
goto cleanupFreeNblPool;
|
2019-06-26 14:52:38 +02:00
|
|
|
|
2019-06-29 13:34:15 +02:00
|
|
|
NDIS_PM_CAPABILITIES PmCapabilities = {
|
2019-06-26 18:59:02 +02:00
|
|
|
.Header = { .Type = NDIS_OBJECT_TYPE_DEFAULT,
|
|
|
|
.Revision = NdisVersion < NDIS_RUNTIME_VERSION_630 ? NDIS_PM_CAPABILITIES_REVISION_1
|
|
|
|
: NDIS_PM_CAPABILITIES_REVISION_2,
|
|
|
|
.Size = NdisVersion < NDIS_RUNTIME_VERSION_630 ? NDIS_SIZEOF_NDIS_PM_CAPABILITIES_REVISION_1
|
|
|
|
: NDIS_SIZEOF_NDIS_PM_CAPABILITIES_REVISION_2 },
|
2019-06-26 14:52:38 +02:00
|
|
|
.MinMagicPacketWakeUp = NdisDeviceStateUnspecified,
|
|
|
|
.MinPatternWakeUp = NdisDeviceStateUnspecified,
|
2019-06-26 18:59:02 +02:00
|
|
|
.MinLinkChangeWakeUp = NdisDeviceStateUnspecified
|
|
|
|
};
|
2019-06-29 13:34:15 +02:00
|
|
|
static NDIS_OID SupportedOids[] = { OID_GEN_MAXIMUM_TOTAL_SIZE,
|
2019-06-26 18:59:02 +02:00
|
|
|
OID_GEN_CURRENT_LOOKAHEAD,
|
|
|
|
OID_GEN_TRANSMIT_BUFFER_SPACE,
|
|
|
|
OID_GEN_RECEIVE_BUFFER_SPACE,
|
|
|
|
OID_GEN_TRANSMIT_BLOCK_SIZE,
|
|
|
|
OID_GEN_RECEIVE_BLOCK_SIZE,
|
|
|
|
OID_GEN_VENDOR_DESCRIPTION,
|
|
|
|
OID_GEN_VENDOR_ID,
|
|
|
|
OID_GEN_VENDOR_DRIVER_VERSION,
|
|
|
|
OID_GEN_XMIT_OK,
|
|
|
|
OID_GEN_RCV_OK,
|
|
|
|
OID_GEN_CURRENT_PACKET_FILTER,
|
|
|
|
OID_GEN_STATISTICS,
|
|
|
|
OID_GEN_INTERRUPT_MODERATION,
|
|
|
|
OID_GEN_LINK_PARAMETERS,
|
|
|
|
OID_PNP_SET_POWER,
|
|
|
|
OID_PNP_QUERY_POWER };
|
2019-06-29 13:34:15 +02:00
|
|
|
NDIS_MINIPORT_ADAPTER_GENERAL_ATTRIBUTES AdapterGeneralAttributes = {
|
2019-06-26 18:59:02 +02:00
|
|
|
.Header = { .Type = NDIS_OBJECT_TYPE_MINIPORT_ADAPTER_GENERAL_ATTRIBUTES,
|
|
|
|
.Revision = NDIS_MINIPORT_ADAPTER_GENERAL_ATTRIBUTES_REVISION_2,
|
|
|
|
.Size = NDIS_SIZEOF_MINIPORT_ADAPTER_GENERAL_ATTRIBUTES_REVISION_2 },
|
2019-06-26 14:52:38 +02:00
|
|
|
.MediaType = NdisMediumIP,
|
|
|
|
.PhysicalMediumType = NdisPhysicalMediumUnspecified,
|
2019-07-08 11:01:39 +02:00
|
|
|
.MtuSize = TUN_MAX_IP_PACKET_SIZE,
|
2019-06-26 14:52:38 +02:00
|
|
|
.MaxXmitLinkSpeed = TUN_LINK_SPEED,
|
|
|
|
.MaxRcvLinkSpeed = TUN_LINK_SPEED,
|
|
|
|
.RcvLinkSpeed = TUN_LINK_SPEED,
|
|
|
|
.XmitLinkSpeed = TUN_LINK_SPEED,
|
|
|
|
.MediaConnectState = MediaConnectStateDisconnected,
|
2019-07-08 11:01:39 +02:00
|
|
|
.LookaheadSize = TUN_MAX_IP_PACKET_SIZE,
|
2019-06-26 14:52:38 +02:00
|
|
|
.MacOptions =
|
|
|
|
NDIS_MAC_OPTION_TRANSFERS_NOT_PEND | NDIS_MAC_OPTION_COPY_LOOKAHEAD_DATA | NDIS_MAC_OPTION_NO_LOOPBACK,
|
|
|
|
.SupportedPacketFilters = NDIS_PACKET_TYPE_DIRECTED | NDIS_PACKET_TYPE_ALL_MULTICAST |
|
|
|
|
NDIS_PACKET_TYPE_BROADCAST | NDIS_PACKET_TYPE_ALL_LOCAL |
|
|
|
|
NDIS_PACKET_TYPE_ALL_FUNCTIONAL,
|
|
|
|
.AccessType = NET_IF_ACCESS_BROADCAST,
|
|
|
|
.DirectionType = NET_IF_DIRECTION_SENDRECEIVE,
|
|
|
|
.ConnectionType = NET_IF_CONNECTION_DEDICATED,
|
|
|
|
.IfType = IF_TYPE_PROP_VIRTUAL,
|
|
|
|
.IfConnectorPresent = FALSE,
|
2019-06-29 13:34:15 +02:00
|
|
|
.SupportedStatistics = Ctx->Statistics.SupportedStatistics,
|
2019-06-26 14:52:38 +02:00
|
|
|
.SupportedPauseFunctions = NdisPauseFunctionsUnsupported,
|
|
|
|
.AutoNegotiationFlags =
|
|
|
|
NDIS_LINK_STATE_XMIT_LINK_SPEED_AUTO_NEGOTIATED | NDIS_LINK_STATE_RCV_LINK_SPEED_AUTO_NEGOTIATED |
|
|
|
|
NDIS_LINK_STATE_DUPLEX_AUTO_NEGOTIATED | NDIS_LINK_STATE_PAUSE_FUNCTIONS_AUTO_NEGOTIATED,
|
2019-06-29 13:34:15 +02:00
|
|
|
.SupportedOidList = SupportedOids,
|
|
|
|
.SupportedOidListLength = sizeof(SupportedOids),
|
|
|
|
.PowerManagementCapabilitiesEx = &PmCapabilities
|
2019-06-26 18:59:02 +02:00
|
|
|
};
|
2019-07-04 23:50:00 +02:00
|
|
|
if (Status = NDIS_STATUS_FAILURE,
|
|
|
|
!NT_SUCCESS(NdisMSetMiniportAttributes(
|
|
|
|
MiniportAdapterHandle, (PNDIS_MINIPORT_ADAPTER_ATTRIBUTES)&AdapterGeneralAttributes)))
|
2019-07-05 10:38:52 +02:00
|
|
|
goto cleanupFreeNblPool;
|
2019-06-26 14:52:38 +02:00
|
|
|
|
|
|
|
/* A miniport driver can call NdisMIndicateStatusEx after setting its
|
|
|
|
* registration attributes even if the driver is still in the context
|
2019-06-26 19:37:29 +02:00
|
|
|
* of the MiniportInitializeEx function. */
|
2019-07-08 11:01:39 +02:00
|
|
|
TunIndicateStatus(Ctx->MiniportAdapterHandle, MediaConnectStateDisconnected);
|
2019-06-26 14:52:38 +02:00
|
|
|
InterlockedIncrement64(&TunAdapterCount);
|
2019-06-29 13:34:15 +02:00
|
|
|
InterlockedOr(&Ctx->Flags, TUN_FLAGS_PRESENT);
|
2019-06-26 14:52:38 +02:00
|
|
|
return NDIS_STATUS_SUCCESS;
|
2019-03-08 22:33:15 +01:00
|
|
|
|
2019-07-05 10:38:52 +02:00
|
|
|
cleanupFreeNblPool:
|
2019-07-05 13:23:29 +02:00
|
|
|
NdisFreeNetBufferListPool(Ctx->NblPool);
|
2019-07-05 10:38:52 +02:00
|
|
|
cleanupDeregisterDevice:
|
2019-06-29 13:34:15 +02:00
|
|
|
NdisDeregisterDeviceEx(DeviceObjectHandle);
|
|
|
|
return Status;
|
2019-03-08 22:33:15 +01:00
|
|
|
}
|
|
|
|
|
2019-06-17 04:05:45 +02:00
|
|
|
_IRQL_requires_max_(PASSIVE_LEVEL)
|
2019-06-26 14:52:38 +02:00
|
|
|
static NTSTATUS
|
2019-06-26 19:37:29 +02:00
|
|
|
TunDeviceSetDenyAllDacl(_In_ DEVICE_OBJECT *DeviceObject)
|
2019-06-17 04:05:45 +02:00
|
|
|
{
|
2019-06-29 13:34:15 +02:00
|
|
|
NTSTATUS Status;
|
|
|
|
SECURITY_DESCRIPTOR Sd;
|
|
|
|
ACL Acl;
|
|
|
|
HANDLE DeviceObjectHandle;
|
|
|
|
|
2019-07-04 23:50:00 +02:00
|
|
|
if (!NT_SUCCESS(Status = RtlCreateSecurityDescriptor(&Sd, SECURITY_DESCRIPTOR_REVISION)) ||
|
|
|
|
!NT_SUCCESS(Status = RtlCreateAcl(&Acl, sizeof(ACL), ACL_REVISION)) ||
|
|
|
|
!NT_SUCCESS(Status = RtlSetDaclSecurityDescriptor(&Sd, TRUE, &Acl, FALSE)) ||
|
|
|
|
!NT_SUCCESS(
|
|
|
|
Status = ObOpenObjectByPointer(
|
|
|
|
DeviceObject,
|
|
|
|
OBJ_KERNEL_HANDLE,
|
|
|
|
NULL,
|
|
|
|
WRITE_DAC,
|
|
|
|
*IoDeviceObjectType,
|
|
|
|
KernelMode,
|
|
|
|
&DeviceObjectHandle)))
|
2019-06-29 13:34:15 +02:00
|
|
|
return Status;
|
|
|
|
|
|
|
|
Status = ZwSetSecurityObject(DeviceObjectHandle, DACL_SECURITY_INFORMATION, &Sd);
|
|
|
|
ZwClose(DeviceObjectHandle);
|
|
|
|
return Status;
|
2019-06-17 04:05:45 +02:00
|
|
|
}
|
|
|
|
|
2019-06-07 12:23:44 +02:00
|
|
|
_IRQL_requires_max_(PASSIVE_LEVEL)
|
2019-06-26 14:52:38 +02:00
|
|
|
static void
|
2019-06-26 19:37:29 +02:00
|
|
|
TunForceHandlesClosed(_Inout_ TUN_CTX *Ctx)
|
2019-03-08 22:33:15 +01:00
|
|
|
{
|
2019-06-29 13:34:15 +02:00
|
|
|
NTSTATUS Status;
|
|
|
|
PEPROCESS Process;
|
|
|
|
KAPC_STATE ApcState;
|
|
|
|
PVOID Object = NULL;
|
|
|
|
ULONG VerifierFlags = 0;
|
|
|
|
OBJECT_HANDLE_INFORMATION HandleInfo;
|
|
|
|
SYSTEM_HANDLE_INFORMATION_EX *HandleTable = NULL;
|
|
|
|
|
|
|
|
MmIsVerifierEnabled(&VerifierFlags);
|
|
|
|
|
|
|
|
for (ULONG Size = 0, RequestedSize;
|
|
|
|
(Status = ZwQuerySystemInformation(SystemExtendedHandleInformation, HandleTable, Size, &RequestedSize)) ==
|
|
|
|
STATUS_INFO_LENGTH_MISMATCH;
|
|
|
|
Size = RequestedSize)
|
2019-06-26 14:52:38 +02:00
|
|
|
{
|
2019-06-29 13:34:15 +02:00
|
|
|
if (HandleTable)
|
2019-07-03 12:43:55 +02:00
|
|
|
ExFreePoolWithTag(HandleTable, TUN_MEMORY_TAG);
|
|
|
|
HandleTable = ExAllocatePoolWithTag(PagedPool, RequestedSize, TUN_MEMORY_TAG);
|
2019-06-29 13:34:15 +02:00
|
|
|
if (!HandleTable)
|
2019-06-26 14:52:38 +02:00
|
|
|
return;
|
|
|
|
}
|
2019-06-29 13:34:15 +02:00
|
|
|
if (!NT_SUCCESS(Status) || !HandleTable)
|
2019-07-05 10:38:52 +02:00
|
|
|
goto cleanup;
|
2019-06-26 14:52:38 +02:00
|
|
|
|
2019-06-29 13:34:15 +02:00
|
|
|
for (ULONG_PTR Index = 0; Index < HandleTable->NumberOfHandles; ++Index)
|
2019-06-26 14:52:38 +02:00
|
|
|
{
|
2019-06-27 15:08:29 +02:00
|
|
|
/* XXX: We should perhaps first look at table->Handles[i].ObjectTypeIndex, but
|
|
|
|
* the value changes lots between NT versions, and it should be implicit anyway. */
|
2019-06-29 13:34:15 +02:00
|
|
|
FILE_OBJECT *FileObject = HandleTable->Handles[Index].Object;
|
|
|
|
if (!FileObject || FileObject->Type != 5 || FileObject->DeviceObject != Ctx->Device.Object)
|
2019-06-26 14:52:38 +02:00
|
|
|
continue;
|
2019-06-29 13:34:15 +02:00
|
|
|
Status = PsLookupProcessByProcessId(HandleTable->Handles[Index].UniqueProcessId, &Process);
|
|
|
|
if (!NT_SUCCESS(Status))
|
2019-06-26 14:52:38 +02:00
|
|
|
continue;
|
2019-06-29 13:34:15 +02:00
|
|
|
KeStackAttachProcess(Process, &ApcState);
|
|
|
|
if (!VerifierFlags)
|
|
|
|
Status = ObReferenceObjectByHandle(
|
|
|
|
HandleTable->Handles[Index].HandleValue, 0, NULL, UserMode, &Object, &HandleInfo);
|
|
|
|
if (NT_SUCCESS(Status))
|
2019-06-26 14:52:38 +02:00
|
|
|
{
|
2019-06-29 13:34:15 +02:00
|
|
|
if (VerifierFlags || Object == FileObject)
|
|
|
|
ObCloseHandle(HandleTable->Handles[Index].HandleValue, UserMode);
|
|
|
|
if (!VerifierFlags)
|
|
|
|
ObfDereferenceObject(Object);
|
2019-06-26 14:52:38 +02:00
|
|
|
}
|
2019-06-29 13:34:15 +02:00
|
|
|
KeUnstackDetachProcess(&ApcState);
|
|
|
|
ObfDereferenceObject(Process);
|
2019-06-26 14:52:38 +02:00
|
|
|
}
|
2019-07-05 10:38:52 +02:00
|
|
|
cleanup:
|
2019-06-29 13:34:15 +02:00
|
|
|
if (HandleTable)
|
2019-07-03 12:43:55 +02:00
|
|
|
ExFreePoolWithTag(HandleTable, TUN_MEMORY_TAG);
|
2019-03-08 22:33:15 +01:00
|
|
|
}
|
|
|
|
|
2019-05-31 14:40:49 +02:00
|
|
|
_IRQL_requires_max_(APC_LEVEL)
|
2019-06-26 14:52:38 +02:00
|
|
|
static void
|
2019-06-29 13:34:15 +02:00
|
|
|
TunWaitForReferencesToDropToZero(_In_ DEVICE_OBJECT *DeviceObject)
|
2019-05-31 14:40:49 +02:00
|
|
|
{
|
2019-06-26 14:52:38 +02:00
|
|
|
/* The sleep loop isn't pretty, but we don't have a choice. This is an NDIS bug we're working around. */
|
|
|
|
enum
|
|
|
|
{
|
|
|
|
SleepTime = 50,
|
|
|
|
TotalTime = 2 * 60 * 1000,
|
|
|
|
MaxTries = TotalTime / SleepTime
|
|
|
|
};
|
|
|
|
#pragma warning(suppress : 28175)
|
2019-07-05 15:56:57 +02:00
|
|
|
for (INT Try = 0; Try < MaxTries && InterlockedGet(&DeviceObject->ReferenceCount); ++Try)
|
2019-06-26 14:52:38 +02:00
|
|
|
NdisMSleep(SleepTime);
|
2019-05-31 14:40:49 +02:00
|
|
|
}
|
|
|
|
|
2019-03-08 22:33:15 +01:00
|
|
|
static MINIPORT_HALT TunHaltEx;
|
|
|
|
_Use_decl_annotations_
|
2019-06-26 14:52:38 +02:00
|
|
|
static void
|
|
|
|
TunHaltEx(NDIS_HANDLE MiniportAdapterContext, NDIS_HALT_ACTION HaltAction)
|
2019-03-08 22:33:15 +01:00
|
|
|
{
|
2019-06-29 13:34:15 +02:00
|
|
|
TUN_CTX *Ctx = (TUN_CTX *)MiniportAdapterContext;
|
2019-03-08 22:33:15 +01:00
|
|
|
|
2019-06-29 13:34:15 +02:00
|
|
|
InterlockedAnd(&Ctx->Flags, ~TUN_FLAGS_PRESENT);
|
2019-06-27 11:59:22 +02:00
|
|
|
ExReleaseSpinLockExclusive(
|
2019-06-29 13:34:15 +02:00
|
|
|
&Ctx->TransitionLock,
|
|
|
|
ExAcquireSpinLockExclusive(&Ctx->TransitionLock)); /* Ensure above change is visible to all readers. */
|
2019-04-05 20:11:08 +02:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
/* Setting a deny-all DACL we prevent userspace to open the data device by symlink after TunForceHandlesClosed(). */
|
2019-06-29 13:34:15 +02:00
|
|
|
TunDeviceSetDenyAllDacl(Ctx->Device.Object);
|
2019-07-08 11:01:39 +02:00
|
|
|
TunForceHandlesClosed(Ctx);
|
2019-04-10 11:21:51 +02:00
|
|
|
|
2019-06-26 14:52:38 +02:00
|
|
|
/* Wait for processing IRP(s) to complete. */
|
2019-06-29 13:34:15 +02:00
|
|
|
IoAcquireRemoveLock(&Ctx->Device.RemoveLock, NULL);
|
|
|
|
IoReleaseRemoveLockAndWait(&Ctx->Device.RemoveLock, NULL);
|
2019-07-05 13:23:29 +02:00
|
|
|
NdisFreeNetBufferListPool(Ctx->NblPool);
|
2019-04-10 13:42:16 +02:00
|
|
|
|
2019-06-26 14:52:38 +02:00
|
|
|
/* MiniportAdapterHandle must not be used in TunDispatch(). After TunHaltEx() returns it is invalidated. */
|
2019-06-29 13:34:15 +02:00
|
|
|
InterlockedExchangePointer(&Ctx->MiniportAdapterHandle, NULL);
|
2019-04-10 13:42:16 +02:00
|
|
|
|
2019-06-26 14:52:38 +02:00
|
|
|
ASSERT(InterlockedGet64(&TunAdapterCount) > 0);
|
|
|
|
if (InterlockedDecrement64(&TunAdapterCount) <= 0)
|
2019-06-29 13:34:15 +02:00
|
|
|
TunWaitForReferencesToDropToZero(Ctx->Device.Object);
|
2019-05-31 14:40:49 +02:00
|
|
|
|
2019-07-08 11:01:39 +02:00
|
|
|
/* Deregister data device _after_ we are done using Ctx not to risk an UaF. The Ctx is hosted by device extension.
|
|
|
|
*/
|
2019-06-29 13:34:15 +02:00
|
|
|
NdisDeregisterDeviceEx(Ctx->Device.Handle);
|
2019-03-08 22:33:15 +01:00
|
|
|
}
|
|
|
|
|
2019-06-07 12:23:44 +02:00
|
|
|
static MINIPORT_SHUTDOWN TunShutdownEx;
|
|
|
|
_Use_decl_annotations_
|
2019-06-26 14:52:38 +02:00
|
|
|
static void
|
|
|
|
TunShutdownEx(NDIS_HANDLE MiniportAdapterContext, NDIS_SHUTDOWN_ACTION ShutdownAction)
|
2019-03-08 22:33:15 +01:00
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2019-04-05 11:04:13 +02:00
|
|
|
_IRQL_requires_max_(APC_LEVEL)
|
|
|
|
_Must_inspect_result_
|
2019-06-26 14:52:38 +02:00
|
|
|
static NDIS_STATUS
|
2019-06-26 19:37:29 +02:00
|
|
|
TunOidQueryWrite(_Inout_ NDIS_OID_REQUEST *OidRequest, _In_ ULONG Value)
|
2019-04-05 11:04:13 +02:00
|
|
|
{
|
2019-06-26 14:52:38 +02:00
|
|
|
if (OidRequest->DATA.QUERY_INFORMATION.InformationBufferLength < sizeof(ULONG))
|
|
|
|
{
|
|
|
|
OidRequest->DATA.QUERY_INFORMATION.BytesNeeded = sizeof(ULONG);
|
|
|
|
OidRequest->DATA.QUERY_INFORMATION.BytesWritten = 0;
|
|
|
|
return NDIS_STATUS_BUFFER_TOO_SHORT;
|
|
|
|
}
|
|
|
|
|
|
|
|
OidRequest->DATA.QUERY_INFORMATION.BytesNeeded = OidRequest->DATA.QUERY_INFORMATION.BytesWritten = sizeof(ULONG);
|
2019-06-26 19:37:29 +02:00
|
|
|
*(ULONG *)OidRequest->DATA.QUERY_INFORMATION.InformationBuffer = Value;
|
2019-06-26 14:52:38 +02:00
|
|
|
return NDIS_STATUS_SUCCESS;
|
2019-04-05 11:04:13 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
_IRQL_requires_max_(APC_LEVEL)
|
|
|
|
_Must_inspect_result_
|
2019-06-26 14:52:38 +02:00
|
|
|
static NDIS_STATUS
|
2019-06-26 19:37:29 +02:00
|
|
|
TunOidQueryWrite32or64(_Inout_ NDIS_OID_REQUEST *OidRequest, _In_ ULONG64 Value)
|
2019-04-05 11:04:13 +02:00
|
|
|
{
|
2019-06-26 14:52:38 +02:00
|
|
|
if (OidRequest->DATA.QUERY_INFORMATION.InformationBufferLength < sizeof(ULONG))
|
|
|
|
{
|
|
|
|
OidRequest->DATA.QUERY_INFORMATION.BytesNeeded = sizeof(ULONG64);
|
|
|
|
OidRequest->DATA.QUERY_INFORMATION.BytesWritten = 0;
|
|
|
|
return NDIS_STATUS_BUFFER_TOO_SHORT;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (OidRequest->DATA.QUERY_INFORMATION.InformationBufferLength < sizeof(ULONG64))
|
|
|
|
{
|
|
|
|
OidRequest->DATA.QUERY_INFORMATION.BytesNeeded = sizeof(ULONG64);
|
|
|
|
OidRequest->DATA.QUERY_INFORMATION.BytesWritten = sizeof(ULONG);
|
2019-06-26 19:37:29 +02:00
|
|
|
*(ULONG *)OidRequest->DATA.QUERY_INFORMATION.InformationBuffer = (ULONG)(Value & 0xffffffff);
|
2019-06-26 14:52:38 +02:00
|
|
|
return NDIS_STATUS_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
OidRequest->DATA.QUERY_INFORMATION.BytesNeeded = OidRequest->DATA.QUERY_INFORMATION.BytesWritten = sizeof(ULONG64);
|
2019-06-26 19:37:29 +02:00
|
|
|
*(ULONG64 *)OidRequest->DATA.QUERY_INFORMATION.InformationBuffer = Value;
|
2019-06-26 14:52:38 +02:00
|
|
|
return NDIS_STATUS_SUCCESS;
|
2019-04-05 11:04:13 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
_IRQL_requires_max_(APC_LEVEL)
|
|
|
|
_Must_inspect_result_
|
2019-06-26 14:52:38 +02:00
|
|
|
static NDIS_STATUS
|
2019-07-05 15:38:35 +02:00
|
|
|
TunOidQueryWriteBuf(_Inout_ NDIS_OID_REQUEST *OidRequest, _In_bytecount_(Size) const void *Buf, _In_ ULONG Size)
|
2019-04-05 11:04:13 +02:00
|
|
|
{
|
2019-06-26 19:37:29 +02:00
|
|
|
if (OidRequest->DATA.QUERY_INFORMATION.InformationBufferLength < Size)
|
2019-06-26 14:52:38 +02:00
|
|
|
{
|
2019-06-26 19:37:29 +02:00
|
|
|
OidRequest->DATA.QUERY_INFORMATION.BytesNeeded = Size;
|
2019-06-26 14:52:38 +02:00
|
|
|
OidRequest->DATA.QUERY_INFORMATION.BytesWritten = 0;
|
|
|
|
return NDIS_STATUS_BUFFER_TOO_SHORT;
|
|
|
|
}
|
|
|
|
|
2019-06-26 19:37:29 +02:00
|
|
|
OidRequest->DATA.QUERY_INFORMATION.BytesNeeded = OidRequest->DATA.QUERY_INFORMATION.BytesWritten = Size;
|
|
|
|
NdisMoveMemory(OidRequest->DATA.QUERY_INFORMATION.InformationBuffer, Buf, Size);
|
2019-06-26 14:52:38 +02:00
|
|
|
return NDIS_STATUS_SUCCESS;
|
2019-04-05 11:04:13 +02:00
|
|
|
}
|
|
|
|
|
2019-03-08 22:33:15 +01:00
|
|
|
_IRQL_requires_max_(APC_LEVEL)
|
2019-03-28 11:21:51 +01:00
|
|
|
_Must_inspect_result_
|
2019-06-26 14:52:38 +02:00
|
|
|
static NDIS_STATUS
|
2019-07-08 11:09:09 +02:00
|
|
|
TunOidQuery(_Inout_ TUN_CTX *Ctx, _Inout_ NDIS_OID_REQUEST *OidRequest)
|
2019-03-08 22:33:15 +01:00
|
|
|
{
|
2019-06-26 14:52:38 +02:00
|
|
|
ASSERT(
|
|
|
|
OidRequest->RequestType == NdisRequestQueryInformation ||
|
|
|
|
OidRequest->RequestType == NdisRequestQueryStatistics);
|
|
|
|
|
|
|
|
switch (OidRequest->DATA.QUERY_INFORMATION.Oid)
|
|
|
|
{
|
|
|
|
case OID_GEN_MAXIMUM_TOTAL_SIZE:
|
|
|
|
case OID_GEN_TRANSMIT_BLOCK_SIZE:
|
|
|
|
case OID_GEN_RECEIVE_BLOCK_SIZE:
|
2019-07-08 11:01:39 +02:00
|
|
|
return TunOidQueryWrite(OidRequest, TUN_MAX_IP_PACKET_SIZE);
|
2019-06-26 14:52:38 +02:00
|
|
|
|
|
|
|
case OID_GEN_TRANSMIT_BUFFER_SPACE:
|
2019-07-08 11:01:39 +02:00
|
|
|
return TunOidQueryWrite(OidRequest, TUN_MAX_RING_CAPACITY);
|
2019-06-26 14:52:38 +02:00
|
|
|
|
|
|
|
case OID_GEN_RECEIVE_BUFFER_SPACE:
|
2019-07-08 11:01:39 +02:00
|
|
|
return TunOidQueryWrite(OidRequest, TUN_MAX_RING_CAPACITY);
|
2019-06-26 14:52:38 +02:00
|
|
|
|
|
|
|
case OID_GEN_VENDOR_ID:
|
|
|
|
return TunOidQueryWrite(OidRequest, TUN_HTONL(TUN_VENDOR_ID));
|
|
|
|
|
|
|
|
case OID_GEN_VENDOR_DESCRIPTION:
|
2019-07-05 15:38:35 +02:00
|
|
|
return TunOidQueryWriteBuf(OidRequest, TUN_VENDOR_NAME, (ULONG)sizeof(TUN_VENDOR_NAME));
|
2019-06-26 14:52:38 +02:00
|
|
|
|
|
|
|
case OID_GEN_VENDOR_DRIVER_VERSION:
|
|
|
|
return TunOidQueryWrite(OidRequest, (WINTUN_VERSION_MAJ << 16) | WINTUN_VERSION_MIN);
|
|
|
|
|
|
|
|
case OID_GEN_XMIT_OK:
|
|
|
|
return TunOidQueryWrite32or64(
|
|
|
|
OidRequest,
|
2019-07-08 11:09:09 +02:00
|
|
|
InterlockedGet64((LONG64 *)&Ctx->Statistics.ifHCOutUcastPkts) +
|
|
|
|
InterlockedGet64((LONG64 *)&Ctx->Statistics.ifHCOutMulticastPkts) +
|
|
|
|
InterlockedGet64((LONG64 *)&Ctx->Statistics.ifHCOutBroadcastPkts));
|
2019-06-26 14:52:38 +02:00
|
|
|
|
|
|
|
case OID_GEN_RCV_OK:
|
|
|
|
return TunOidQueryWrite32or64(
|
|
|
|
OidRequest,
|
2019-07-08 11:09:09 +02:00
|
|
|
InterlockedGet64((LONG64 *)&Ctx->Statistics.ifHCInUcastPkts) +
|
|
|
|
InterlockedGet64((LONG64 *)&Ctx->Statistics.ifHCInMulticastPkts) +
|
|
|
|
InterlockedGet64((LONG64 *)&Ctx->Statistics.ifHCInBroadcastPkts));
|
2019-06-26 14:52:38 +02:00
|
|
|
|
|
|
|
case OID_GEN_STATISTICS:
|
2019-07-08 11:09:09 +02:00
|
|
|
return TunOidQueryWriteBuf(OidRequest, &Ctx->Statistics, (ULONG)sizeof(Ctx->Statistics));
|
2019-06-26 14:52:38 +02:00
|
|
|
|
|
|
|
case OID_GEN_INTERRUPT_MODERATION: {
|
2019-07-05 15:38:35 +02:00
|
|
|
static const NDIS_INTERRUPT_MODERATION_PARAMETERS InterruptParameters = {
|
2019-06-26 18:59:02 +02:00
|
|
|
.Header = { .Type = NDIS_OBJECT_TYPE_DEFAULT,
|
|
|
|
.Revision = NDIS_INTERRUPT_MODERATION_PARAMETERS_REVISION_1,
|
|
|
|
.Size = NDIS_SIZEOF_INTERRUPT_MODERATION_PARAMETERS_REVISION_1 },
|
|
|
|
.InterruptModeration = NdisInterruptModerationNotSupported
|
|
|
|
};
|
2019-07-05 15:38:35 +02:00
|
|
|
return TunOidQueryWriteBuf(OidRequest, &InterruptParameters, (ULONG)sizeof(InterruptParameters));
|
2019-06-26 14:52:38 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
case OID_PNP_QUERY_POWER:
|
|
|
|
OidRequest->DATA.QUERY_INFORMATION.BytesNeeded = OidRequest->DATA.QUERY_INFORMATION.BytesWritten = 0;
|
|
|
|
return NDIS_STATUS_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
OidRequest->DATA.QUERY_INFORMATION.BytesWritten = 0;
|
|
|
|
return NDIS_STATUS_NOT_SUPPORTED;
|
2019-03-08 22:33:15 +01:00
|
|
|
}
|
|
|
|
|
2019-06-07 12:23:44 +02:00
|
|
|
_IRQL_requires_max_(PASSIVE_LEVEL)
|
2019-06-26 14:52:38 +02:00
|
|
|
static NDIS_STATUS
|
2019-07-08 11:09:09 +02:00
|
|
|
TunOidSet(_Inout_ TUN_CTX *Ctx, _Inout_ NDIS_OID_REQUEST *OidRequest)
|
2019-06-07 12:23:44 +02:00
|
|
|
{
|
2019-06-26 14:52:38 +02:00
|
|
|
ASSERT(OidRequest->RequestType == NdisRequestSetInformation);
|
|
|
|
|
|
|
|
OidRequest->DATA.SET_INFORMATION.BytesNeeded = OidRequest->DATA.SET_INFORMATION.BytesRead = 0;
|
|
|
|
|
|
|
|
switch (OidRequest->DATA.SET_INFORMATION.Oid)
|
|
|
|
{
|
|
|
|
case OID_GEN_CURRENT_PACKET_FILTER:
|
|
|
|
case OID_GEN_CURRENT_LOOKAHEAD:
|
|
|
|
if (OidRequest->DATA.SET_INFORMATION.InformationBufferLength != 4)
|
|
|
|
{
|
|
|
|
OidRequest->DATA.SET_INFORMATION.BytesNeeded = 4;
|
|
|
|
return NDIS_STATUS_INVALID_LENGTH;
|
|
|
|
}
|
|
|
|
OidRequest->DATA.SET_INFORMATION.BytesRead = 4;
|
|
|
|
return NDIS_STATUS_SUCCESS;
|
|
|
|
|
|
|
|
case OID_GEN_LINK_PARAMETERS:
|
|
|
|
OidRequest->DATA.SET_INFORMATION.BytesRead = OidRequest->DATA.SET_INFORMATION.InformationBufferLength;
|
|
|
|
return NDIS_STATUS_SUCCESS;
|
|
|
|
|
|
|
|
case OID_GEN_INTERRUPT_MODERATION:
|
|
|
|
return NDIS_STATUS_INVALID_DATA;
|
|
|
|
|
|
|
|
case OID_PNP_SET_POWER:
|
|
|
|
if (OidRequest->DATA.SET_INFORMATION.InformationBufferLength != sizeof(NDIS_DEVICE_POWER_STATE))
|
|
|
|
{
|
|
|
|
OidRequest->DATA.SET_INFORMATION.BytesNeeded = sizeof(NDIS_DEVICE_POWER_STATE);
|
|
|
|
return NDIS_STATUS_INVALID_LENGTH;
|
|
|
|
}
|
|
|
|
OidRequest->DATA.SET_INFORMATION.BytesRead = sizeof(NDIS_DEVICE_POWER_STATE);
|
|
|
|
return NDIS_STATUS_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NDIS_STATUS_NOT_SUPPORTED;
|
2019-06-07 12:23:44 +02:00
|
|
|
}
|
|
|
|
|
2019-03-08 22:33:15 +01:00
|
|
|
static MINIPORT_OID_REQUEST TunOidRequest;
|
|
|
|
_Use_decl_annotations_
|
2019-06-26 14:52:38 +02:00
|
|
|
static NDIS_STATUS
|
|
|
|
TunOidRequest(NDIS_HANDLE MiniportAdapterContext, PNDIS_OID_REQUEST OidRequest)
|
2019-03-08 22:33:15 +01:00
|
|
|
{
|
2019-06-26 14:52:38 +02:00
|
|
|
switch (OidRequest->RequestType)
|
|
|
|
{
|
|
|
|
case NdisRequestQueryInformation:
|
|
|
|
case NdisRequestQueryStatistics:
|
|
|
|
return TunOidQuery(MiniportAdapterContext, OidRequest);
|
|
|
|
|
|
|
|
case NdisRequestSetInformation:
|
|
|
|
return TunOidSet(MiniportAdapterContext, OidRequest);
|
|
|
|
|
|
|
|
default:
|
|
|
|
return NDIS_STATUS_INVALID_OID;
|
|
|
|
}
|
2019-03-08 22:33:15 +01:00
|
|
|
}
|
|
|
|
|
2019-06-07 12:23:44 +02:00
|
|
|
static MINIPORT_CANCEL_OID_REQUEST TunCancelOidRequest;
|
|
|
|
_Use_decl_annotations_
|
2019-06-26 14:52:38 +02:00
|
|
|
static void
|
|
|
|
TunCancelOidRequest(NDIS_HANDLE MiniportAdapterContext, PVOID RequestId)
|
2019-06-07 12:23:44 +02:00
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2019-03-08 22:33:15 +01:00
|
|
|
static MINIPORT_DIRECT_OID_REQUEST TunDirectOidRequest;
|
|
|
|
_Use_decl_annotations_
|
2019-06-26 14:52:38 +02:00
|
|
|
static NDIS_STATUS
|
|
|
|
TunDirectOidRequest(NDIS_HANDLE MiniportAdapterContext, PNDIS_OID_REQUEST OidRequest)
|
2019-03-08 22:33:15 +01:00
|
|
|
{
|
2019-06-26 14:52:38 +02:00
|
|
|
switch (OidRequest->RequestType)
|
|
|
|
{
|
|
|
|
case NdisRequestQueryInformation:
|
|
|
|
case NdisRequestQueryStatistics:
|
|
|
|
case NdisRequestSetInformation:
|
|
|
|
return NDIS_STATUS_NOT_SUPPORTED;
|
|
|
|
|
|
|
|
default:
|
|
|
|
return NDIS_STATUS_INVALID_OID;
|
|
|
|
}
|
2019-03-08 22:33:15 +01:00
|
|
|
}
|
|
|
|
|
2019-06-07 12:23:44 +02:00
|
|
|
static MINIPORT_CANCEL_DIRECT_OID_REQUEST TunCancelDirectOidRequest;
|
2019-03-08 22:33:15 +01:00
|
|
|
_Use_decl_annotations_
|
2019-06-26 14:52:38 +02:00
|
|
|
static void
|
|
|
|
TunCancelDirectOidRequest(NDIS_HANDLE MiniportAdapterContext, PVOID RequestId)
|
2019-03-08 22:33:15 +01:00
|
|
|
{
|
2019-06-07 12:23:44 +02:00
|
|
|
}
|
2019-03-08 22:33:15 +01:00
|
|
|
|
2019-06-21 11:43:17 +02:00
|
|
|
static MINIPORT_SYNCHRONOUS_OID_REQUEST TunSynchronousOidRequest;
|
|
|
|
_Use_decl_annotations_
|
2019-06-26 14:52:38 +02:00
|
|
|
static NDIS_STATUS
|
|
|
|
TunSynchronousOidRequest(NDIS_HANDLE MiniportAdapterContext, PNDIS_OID_REQUEST OidRequest)
|
2019-06-21 11:43:17 +02:00
|
|
|
{
|
2019-06-26 14:52:38 +02:00
|
|
|
switch (OidRequest->RequestType)
|
|
|
|
{
|
|
|
|
case NdisRequestQueryInformation:
|
|
|
|
case NdisRequestQueryStatistics:
|
|
|
|
case NdisRequestSetInformation:
|
|
|
|
return NDIS_STATUS_NOT_SUPPORTED;
|
|
|
|
|
|
|
|
default:
|
|
|
|
return NDIS_STATUS_INVALID_OID;
|
|
|
|
}
|
2019-06-21 11:43:17 +02:00
|
|
|
}
|
|
|
|
|
2019-06-07 12:23:44 +02:00
|
|
|
static MINIPORT_UNLOAD TunUnload;
|
|
|
|
_Use_decl_annotations_
|
2019-06-26 14:52:38 +02:00
|
|
|
static VOID
|
|
|
|
TunUnload(PDRIVER_OBJECT DriverObject)
|
2019-06-07 12:23:44 +02:00
|
|
|
{
|
2019-06-26 14:52:38 +02:00
|
|
|
NdisMDeregisterMiniportDriver(NdisMiniportDriverHandle);
|
2019-03-08 22:33:15 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
DRIVER_INITIALIZE DriverEntry;
|
|
|
|
_Use_decl_annotations_
|
2019-06-26 14:52:38 +02:00
|
|
|
NTSTATUS
|
|
|
|
DriverEntry(DRIVER_OBJECT *DriverObject, UNICODE_STRING *RegistryPath)
|
2019-03-08 22:33:15 +01:00
|
|
|
{
|
2019-07-08 11:09:09 +02:00
|
|
|
NTSTATUS Status;
|
2019-06-26 14:52:38 +02:00
|
|
|
|
|
|
|
NdisVersion = NdisGetVersion();
|
|
|
|
if (NdisVersion < NDIS_MINIPORT_VERSION_MIN)
|
|
|
|
return NDIS_STATUS_UNSUPPORTED_REVISION;
|
|
|
|
if (NdisVersion > NDIS_MINIPORT_VERSION_MAX)
|
|
|
|
NdisVersion = NDIS_MINIPORT_VERSION_MAX;
|
|
|
|
|
|
|
|
NDIS_MINIPORT_DRIVER_CHARACTERISTICS miniport = {
|
2019-06-26 18:59:02 +02:00
|
|
|
.Header = { .Type = NDIS_OBJECT_TYPE_MINIPORT_DRIVER_CHARACTERISTICS,
|
|
|
|
.Revision = NdisVersion < NDIS_RUNTIME_VERSION_680
|
|
|
|
? NDIS_MINIPORT_DRIVER_CHARACTERISTICS_REVISION_2
|
|
|
|
: NDIS_MINIPORT_DRIVER_CHARACTERISTICS_REVISION_3,
|
|
|
|
.Size = NdisVersion < NDIS_RUNTIME_VERSION_680
|
|
|
|
? NDIS_SIZEOF_MINIPORT_DRIVER_CHARACTERISTICS_REVISION_2
|
|
|
|
: NDIS_SIZEOF_MINIPORT_DRIVER_CHARACTERISTICS_REVISION_3 },
|
2019-06-26 14:52:38 +02:00
|
|
|
|
|
|
|
.MajorNdisVersion = (UCHAR)((NdisVersion & 0x00ff0000) >> 16),
|
|
|
|
.MinorNdisVersion = (UCHAR)(NdisVersion & 0x000000ff),
|
|
|
|
|
|
|
|
.MajorDriverVersion = WINTUN_VERSION_MAJ,
|
|
|
|
.MinorDriverVersion = WINTUN_VERSION_MIN,
|
|
|
|
|
|
|
|
.InitializeHandlerEx = TunInitializeEx,
|
|
|
|
.HaltHandlerEx = TunHaltEx,
|
|
|
|
.UnloadHandler = TunUnload,
|
|
|
|
.PauseHandler = TunPause,
|
|
|
|
.RestartHandler = TunRestart,
|
|
|
|
.OidRequestHandler = TunOidRequest,
|
|
|
|
.SendNetBufferListsHandler = TunSendNetBufferLists,
|
|
|
|
.ReturnNetBufferListsHandler = TunReturnNetBufferLists,
|
|
|
|
.CancelSendHandler = TunCancelSend,
|
|
|
|
.DevicePnPEventNotifyHandler = TunDevicePnPEventNotify,
|
|
|
|
.ShutdownHandlerEx = TunShutdownEx,
|
|
|
|
.CancelOidRequestHandler = TunCancelOidRequest,
|
|
|
|
.DirectOidRequestHandler = TunDirectOidRequest,
|
|
|
|
.CancelDirectOidRequestHandler = TunCancelDirectOidRequest,
|
2019-06-26 18:59:02 +02:00
|
|
|
.SynchronousOidRequestHandler = TunSynchronousOidRequest
|
|
|
|
};
|
2019-07-08 11:09:09 +02:00
|
|
|
Status = NdisMRegisterMiniportDriver(DriverObject, RegistryPath, NULL, &miniport, &NdisMiniportDriverHandle);
|
|
|
|
if (!NT_SUCCESS(Status))
|
|
|
|
return Status;
|
2019-06-26 14:52:38 +02:00
|
|
|
|
|
|
|
NdisDispatchPnP = DriverObject->MajorFunction[IRP_MJ_PNP];
|
|
|
|
DriverObject->MajorFunction[IRP_MJ_PNP] = TunDispatchPnP;
|
|
|
|
|
|
|
|
return STATUS_SUCCESS;
|
2019-03-08 22:33:15 +01:00
|
|
|
}
|