e7fad38a07
NDIS may call MINIPORT_SEND_NET_BUFFER_LISTS from parallel threads to queue as many packets as fast as possible. Initial implementation of ring buffers used a spin lock to completely serialize sending packets making it sub-optimal and burning large amount of CPU. This commit uses locked section to allocate space for packet(s) in the ring. It copies the packets unlocked, then it locks again to adjust the ring tail. Signed-off-by: Simon Rozman <simon@rozman.si> |
||
---|---|---|
.clang-format | ||
.editorconfig | ||
.gitignore | ||
COPYING | ||
README.md | ||
undocumented.h | ||
wintun.c | ||
wintun.inf | ||
wintun.proj | ||
wintun.props | ||
wintun.rc | ||
wintun.sln | ||
wintun.vcxproj | ||
wintun.vcxproj.filters | ||
wintun.wixproj | ||
wintun.wxs |
Wintun Network Adapter
TUN Device Driver for Windows
This is a layer 3 TUN driver for Windows 7, 8, 8.1, and 10. Originally created for WireGuard, it is intended to be useful to a wide variety of projects that require layer 3 tunneling devices with implementations primarily in userspace.
Build Requirements
Digital Signing
Digital signing is an integral part of the build process. By default, the driver will be test-signed using a certificate that the WDK should automatically generate. To subsequently load the driver, you will need to put your computer into test mode by executing as Administrator bcdedit /set testsigning on
.
If you possess an EV certificate for kernel mode code signing you should switch TUN driver digital signing from test-signing to production-signing by authoring your wintun.vcxproj.user
file to look something like this:
<?xml version="1.0" encoding="utf-8"?>
<Project ToolsVersion="15.0" xmlns="http://schemas.microsoft.com/developer/msbuild/2003">
<PropertyGroup>
<SignMode>ProductionSign</SignMode>
<CrossCertificateFile>$(WDKContentRoot)CrossCertificates\DigiCert_High_Assurance_EV_Root_CA.crt</CrossCertificateFile>
<ProductionCertificate>DF98E075A012ED8C86FBCF14854B8F9555CB3D45</ProductionCertificate>
<TimestampServer>http://timestamp.digicert.com</TimestampServer>
</PropertyGroup>
</Project>
Modify the <CrossCertificateFile>
to contain the full path to the cross-signing certificate of CA that issued your certificate. You should be able to find its .crt
file in C:\Program Files (x86)\Windows Kits\10\CrossCertificates
. Note that the $(WDKContentRoot)
expands to C:\Program Files (x86)\Windows Kits\10\
.
If you already have wintun.vcxproj.user
file, just add the <PropertyGroup>
section.
Building from Command Line
Open Developer Command Prompt for VS 2019 and use the msbuild
command:
msbuild wintun.proj [/t:<target>]
Targets
-
Build
: Builds the driver release configurations of all supported platforms. This is the default target. -
Clean
: Deletes all intermediate and output files. -
Rebuild
: Alias forClean
followed byBuild
. -
SDV
: Runs Static Driver Verifier, which includes a clean driver build, only for AMD64 release configuration. -
DVL
: Runs theSDV
, and creates a Driver Verification Log, only for AMD64 release configurations. -
MSM
: Builds Microsoft Installer Merge Modules in<output folder>\wintun-<platform>-<version>.msm
. Requires WHQL signed driver.
The driver output folders are:
Platform and Configuration | Folder |
---|---|
x86 Debug | x86\Debug\wintun |
x86 Release | x86\Release\wintun |
AMD64 Debug | amd64\Debug\wintun |
AMD64 Release | amd64\Release\wintun |
ARM64 Debug | arm64\Debug\wintun |
ARM64 Release | arm64\Release\wintun |
Do note that since the Build
target builds for all supported platforms, you will need to have the toolchains installed for those platforms.
Building Microsoft Installer Merge Modules
msbuild wintun.proj /t:DVL;Build
.- Perform Windows Hardware Lab Kit tests.
- Submit submission package to Microsoft.
- Copy WHQL-signed driver to
x86\Release\whql\
andamd64\Release\whql\
subfolders. msbuild wintun.proj /t:MSM
- MSM files are placed in
dist
subfolder.
Note: due to the use of SHA256 signatures throughout, Windows 7 users who would like a prompt-less installation generally need to have the KB2921916 hotfix installed, which can be obtained from these mirrors: amd64 and x86.
Usage
After loading the driver and creating a network interface the typical way using SetupAPI, open \\.\Global\WINTUN%d
as Local System, where %d
is the LUID index (NetLuidIndex
member) of the network device.
You may then allocate two ring structs to use for exchanging packets:
typedef struct _TUN_RING {
volatile ULONG Head;
volatile ULONG Tail;
volatile LONG Alertable;
UCHAR Data[];
} TUN_RING;
-
Head
: Byte offset of the first packet in the ring. Its value must be a multiple of 4 and less than ring capacity. -
Tail
: Byte offset of the start of free space in the ring. Its value must be multiple of 4 and less than ring capacity. -
Alertable
: Zero when the consumer is processing packets; Non-zero when the consumer has processed all packets and is waiting forTailMoved
event. -
Data
: The ring data. Determine the size of this array as:- Pick the ring capacity ranging from 128kiB to 64MiB in bytes. The capacity must be a power of two (e.g. 1MiB). The ring can hold up to this much data (4 bytes less to prevent
Tail
to overflowHead
). - Add 0x10000 trailing bytes to the capacity. The trailing space allows a packet to remain contiguous that would otherwise require it to be wrapped at the ring edge. Mind that the
Tail
value must be wrapped modulo capacity nevertheless.
- Pick the ring capacity ranging from 128kiB to 64MiB in bytes. The capacity must be a power of two (e.g. 1MiB). The ring can hold up to this much data (4 bytes less to prevent
The total ring size memory is then sizeof(TUN_RING)
+ capacity + 0x10000.
Each packet is stored in the ring (4-byte aligned) as:
typedef struct _TUN_PACKET {
ULONG Size;
UCHAR Data[];
} TUN_PACKET;
-
Size
: Size of packet (0xFFFF max) -
Data
: Layer 3 IPv4 or IPv6 packet
Prepare a descriptor struct as:
typedef struct _TUN_REGISTER_RINGS
{
struct
{
ULONG RingSize;
TUN_RING *Ring;
HANDLE TailMoved;
} Send, Receive;
} TUN_REGISTER_RINGS;
-
Send.RingSize
,Receive.RingSize
: Sizes of the rings (sizeof(TUN_RING)
+ capacity + 0x10000 above) -
Send.Ring
,Receive.Ring
: Pointers to rings -
Send.TailMoved
: An event created by the client the Wintun signals after it moves the Tail member of the send ring. -
Receive.TailMoved
: An event created by the client the client will signal when it moves the Tail member of the receive ring (if receive ring is alertable).
With events created, send and receive rings allocated, descriptor struct initialized, call TUN_IOCTL_REGISTER_RINGS
(0x22E000) DeviceIoControl
with pointer and size of descriptor struct specified as lpInBuffer
and nInBufferSize
parameters. You may call TUN_IOCTL_REGISTER_RINGS
on one handle only.
Reading packets from the send ring:
for (;;) {
TUN_PACKET *next = pop_from_ring(ring_descr->Send.Ring);
if (!next) {
ring_desc->Send.Ring->Alertable = TRUE;
next = pop_from_ring(ring_descr->Send.Ring);
if (!next) {
WaitForSingleObject(ring_desc->Send.TailMoved, INFINITE);
ring_desc->Send.Ring->Alertable = FALSE;
continue;
}
ring_desc->Send.Ring->Alertable = FALSE;
ResetEvent(ring_desc->Send.TailMoved);
}
send_to_encrypted_channel(encrypted_packets_channel, next);
}
When closing the handle, Wintun will set the Tail
to 0xFFFFFFFF and set the TailMoved
event to unblock the waiting user process.
Writing packets to the receive ring is:
for (;;) {
TUN_PACKET *next = receive_from_encrypted_channel(encrypted_packets_channel);
write_to_ring(ring_desc->Receive.Ring, next);
if (ring_desc->Receive.Ring->Alertable)
SetEvent(ring_desc->Recieve.TailMoved);
}
Wintun will abort reading the receive ring on invalid Head
or Tail
, invalid packet or an internal error. In this case, Wintun will set the Head
to 0xFFFFFFFF. In order to restart it, you need to reopen the handle and call TUN_IOCTL_REGISTER_RINGS
again.
Release the rings memory only after closing the handle to the Wintun adapter.