00001
00002
00003
00004
00005
00006
00007
00008
00009
00010
00011
00012
00013
00014
00015
00016
00017
00018
00019
00020
00021
00022
00023
#include "mi.h"
00024
00025
00026
00027
00028
00029
00030 #define MAX_LOCK_SIZE ((ULONG)(14 * PAGE_SIZE))
00031
00032
00033
00034
00035
00036 #define MAX_MOVE_SIZE (LONG)0x10000
00037
00038
00039
00040
00041
00042 #define MINIMUM_ALLOCATION (LONG)128
00043
00044
00045
00046
00047
00048 #define POOL_MOVE_THRESHOLD 511
00049
00050
00051
00052
00053
00054
NTSTATUS
00055
MiValidateUserTransfer(
00056 IN PVOID BaseAddress,
00057 IN PVOID Buffer,
00058 IN ULONG BufferSize
00059 );
00060
00061 ULONG
00062
MiGetExceptionInfo (
00063 IN PEXCEPTION_POINTERS ExceptionPointers,
00064 IN PULONG_PTR BadVa1,
00065 IN PULONG_PTR BadVa2
00066 );
00067
00068
NTSTATUS
00069
MiDoMappedCopy (
00070 IN
PEPROCESS FromProcess,
00071 IN PVOID FromAddress,
00072 IN
PEPROCESS ToProcess,
00073 OUT PVOID ToAddress,
00074 IN ULONG BufferSize,
00075 IN KPROCESSOR_MODE PreviousMode,
00076 OUT PULONG NumberOfBytesRead
00077 );
00078
00079
NTSTATUS
00080
MiDoPoolCopy (
00081 IN
PEPROCESS FromProcess,
00082 IN PVOID FromAddress,
00083 IN
PEPROCESS ToProcess,
00084 OUT PVOID ToAddress,
00085 IN ULONG BufferSize,
00086 IN KPROCESSOR_MODE PreviousMode,
00087 OUT PULONG NumberOfBytesRead
00088 );
00089
00090
#ifdef ALLOC_PRAGMA
00091
#pragma alloc_text(PAGE,MiGetExceptionInfo)
00092
#pragma alloc_text(PAGE,NtReadVirtualMemory)
00093
#pragma alloc_text(PAGE,NtWriteVirtualMemory)
00094
#pragma alloc_text(PAGE,MiDoMappedCopy)
00095
#pragma alloc_text(PAGE,MiDoPoolCopy)
00096
#pragma alloc_text(PAGE,MiValidateUserTransfer)
00097
#endif
00098
00099 #define COPY_STACK_SIZE 64
00100
00101
NTSTATUS
00102 NtReadVirtualMemory (
00103 IN HANDLE ProcessHandle,
00104 IN PVOID BaseAddress,
00105 OUT PVOID Buffer,
00106 IN ULONG BufferSize,
00107 OUT PULONG NumberOfBytesRead OPTIONAL
00108 )
00109
00110
00111
00112
00113
00114
00115
00116
00117
00118
00119
00120
00121
00122
00123
00124
00125
00126
00127
00128
00129
00130
00131
00132
00133
00134
00135
00136
00137
00138
00139 {
00140
00141 ULONG BytesCopied;
00142
KPROCESSOR_MODE PreviousMode;
00143
PEPROCESS Process;
00144
NTSTATUS Status;
00145
00146
PAGED_CODE();
00147
00148
00149
00150
00151
00152 PreviousMode = KeGetPreviousMode();
00153
if (PreviousMode !=
KernelMode) {
00154
00155
Status =
MiValidateUserTransfer(BaseAddress,
Buffer,
BufferSize);
00156
if (
Status != STATUS_SUCCESS) {
00157
return Status;
00158 }
00159
00160
if (ARGUMENT_PRESENT(NumberOfBytesRead)) {
00161
try {
00162
ProbeForWriteUlong(NumberOfBytesRead);
00163
00164 } except(
EXCEPTION_EXECUTE_HANDLER) {
00165
return GetExceptionCode();
00166 }
00167 }
00168 }
00169
00170
00171
00172
00173
00174
00175
00176 BytesCopied = 0;
00177
Status = STATUS_SUCCESS;
00178
if (
BufferSize != 0) {
00179
00180
00181
00182
00183
00184
Status =
ObReferenceObjectByHandle(ProcessHandle,
00185 PROCESS_VM_READ,
00186
PsProcessType,
00187 PreviousMode,
00188 (PVOID *)&Process,
00189
NULL);
00190
00191
00192
00193
00194
00195
00196
00197
if (
Status == STATUS_SUCCESS) {
00198
00199
Status =
MmCopyVirtualMemory (Process,
00200 BaseAddress,
00201
PsGetCurrentProcess(),
00202
Buffer,
00203
BufferSize,
00204 PreviousMode,
00205 &BytesCopied);
00206
00207
00208
00209
00210
00211
ObDereferenceObject(Process);
00212 }
00213 }
00214
00215
00216
00217
00218
00219
if (ARGUMENT_PRESENT(NumberOfBytesRead)) {
00220
try {
00221 *NumberOfBytesRead = BytesCopied;
00222
00223 } except(
EXCEPTION_EXECUTE_HANDLER) {
00224 NOTHING;
00225 }
00226 }
00227
00228
return Status;
00229 }
00230
NTSTATUS
00231 NtWriteVirtualMemory(
00232 IN HANDLE ProcessHandle,
00233 OUT PVOID BaseAddress,
00234 IN PVOID Buffer,
00235 IN ULONG BufferSize,
00236 OUT PULONG NumberOfBytesWritten OPTIONAL
00237 )
00238
00239
00240
00241
00242
00243
00244
00245
00246
00247
00248
00249
00250
00251
00252
00253
00254
00255
00256
00257
00258
00259
00260
00261
00262
00263
00264
00265
00266
00267
00268
00269
00270 {
00271 ULONG BytesCopied;
00272
KPROCESSOR_MODE PreviousMode;
00273
PEPROCESS Process;
00274
NTSTATUS Status;
00275
00276
PAGED_CODE();
00277
00278
00279
00280
00281
00282 PreviousMode = KeGetPreviousMode();
00283
if (PreviousMode !=
KernelMode) {
00284
00285
Status =
MiValidateUserTransfer(BaseAddress,
Buffer,
BufferSize);
00286
if (
Status != STATUS_SUCCESS) {
00287
return Status;
00288 }
00289
00290
if (ARGUMENT_PRESENT(NumberOfBytesWritten)) {
00291
try {
00292
ProbeForWriteUlong(NumberOfBytesWritten);
00293
00294 } except(
EXCEPTION_EXECUTE_HANDLER) {
00295
return GetExceptionCode();
00296 }
00297 }
00298 }
00299
00300
00301
00302
00303
00304
00305 BytesCopied = 0;
00306
Status = STATUS_SUCCESS;
00307
if (
BufferSize != 0) {
00308
00309
00310
00311
00312
00313
Status =
ObReferenceObjectByHandle(ProcessHandle,
00314 PROCESS_VM_WRITE,
00315
PsProcessType,
00316 PreviousMode,
00317 (PVOID *)&Process,
00318
NULL);
00319
00320
00321
00322
00323
00324
00325
00326
if (
Status == STATUS_SUCCESS) {
00327
00328
Status =
MmCopyVirtualMemory (
PsGetCurrentProcess(),
00329
Buffer,
00330 Process,
00331 BaseAddress,
00332
BufferSize,
00333 PreviousMode,
00334 &BytesCopied);
00335
00336
00337
00338
00339
00340
ObDereferenceObject(Process);
00341 }
00342 }
00343
00344
00345
00346
00347
00348
if (ARGUMENT_PRESENT(NumberOfBytesWritten)) {
00349
try {
00350 *NumberOfBytesWritten = BytesCopied;
00351
00352 } except(
EXCEPTION_EXECUTE_HANDLER) {
00353 NOTHING;
00354 }
00355 }
00356
00357
return Status;
00358 }
00359
00360
00361
NTSTATUS
00362 MmCopyVirtualMemory(
00363 IN
PEPROCESS FromProcess,
00364 IN PVOID FromAddress,
00365 IN
PEPROCESS ToProcess,
00366 OUT PVOID ToAddress,
00367 IN ULONG BufferSize,
00368 IN KPROCESSOR_MODE PreviousMode,
00369 OUT PULONG NumberOfBytesCopied
00370 )
00371 {
00372
NTSTATUS Status;
00373 KIRQL OldIrql;
00374
PEPROCESS ProcessToLock;
00375
00376
if (
BufferSize == 0) {
00377
ASSERT (
FALSE);
00378
return STATUS_SUCCESS;
00379 }
00380
00381 ProcessToLock = FromProcess;
00382
if (FromProcess ==
PsGetCurrentProcess()) {
00383 ProcessToLock = ToProcess;
00384 }
00385
00386
00387
00388
00389
00390
MiLockSystemSpace(OldIrql);
00391
if (ProcessToLock->
AddressSpaceDeleted != 0) {
00392
MiUnlockSystemSpace(OldIrql);
00393
return STATUS_PROCESS_IS_TERMINATING;
00394 }
00395 ProcessToLock->
VmOperation += 1;
00396
MiUnlockSystemSpace(OldIrql);
00397
00398
00399
00400
00401
00402
00403
00404
if (
BufferSize >
POOL_MOVE_THRESHOLD) {
00405
Status =
MiDoMappedCopy(FromProcess,
00406 FromAddress,
00407 ToProcess,
00408 ToAddress,
00409
BufferSize,
00410 PreviousMode,
00411 NumberOfBytesCopied);
00412
00413
00414
00415
00416
00417
00418
00419
if (
Status != STATUS_WORKING_SET_QUOTA) {
00420
goto CompleteService;
00421 }
00422
00423 *NumberOfBytesCopied = 0;
00424 }
00425
00426
00427
00428
00429
00430
00431
00432
00433
Status =
MiDoPoolCopy(FromProcess,
00434 FromAddress,
00435 ToProcess,
00436 ToAddress,
00437
BufferSize,
00438 PreviousMode,
00439 NumberOfBytesCopied);
00440
00441
00442
00443
00444
00445 CompleteService:
00446
00447
00448
00449
00450
00451
MiLockSystemSpace(OldIrql);
00452 ProcessToLock->
VmOperation -= 1;
00453
if ((ProcessToLock->
VmOperation == 0) &&
00454 (ProcessToLock->
VmOperationEvent !=
NULL)) {
00455
KeSetEvent (ProcessToLock->
VmOperationEvent, 0,
FALSE);
00456 }
00457
MiUnlockSystemSpace(OldIrql);
00458
00459
return Status;
00460 }
00461
00462
00463 ULONG
00464 MiGetExceptionInfo (
00465 IN PEXCEPTION_POINTERS ExceptionPointers,
00466 IN PULONG_PTR BadVa1,
00467 IN PULONG_PTR BadVa2
00468 )
00469
00470
00471
00472
00473
00474
00475
00476
00477
00478
00479
00480
00481
00482
00483
00484
00485
00486
00487
00488
00489 {
00490 PEXCEPTION_RECORD ExceptionRecord;
00491
00492
PAGED_CODE();
00493
00494
00495
00496
00497
00498
00499
00500 *BadVa2 = 0;
00501 ExceptionRecord = ExceptionPointers->ExceptionRecord;
00502
if ((ExceptionRecord->ExceptionCode == STATUS_ACCESS_VIOLATION) ||
00503 (ExceptionRecord->ExceptionCode == STATUS_GUARD_PAGE_VIOLATION) ||
00504 (ExceptionRecord->ExceptionCode == STATUS_IN_PAGE_ERROR)) {
00505
00506
00507
00508
00509
00510
00511 *BadVa1 = ExceptionRecord->ExceptionInformation[1];
00512
if (ExceptionRecord->NumberParameters == 3) {
00513 *BadVa2 = ExceptionRecord->ExceptionInformation[2];
00514 }
00515
00516 }
else {
00517
00518
00519
00520
00521
00522 *BadVa2 = 0xFFFFFFFF;
00523 }
00524
00525
return EXCEPTION_EXECUTE_HANDLER;
00526 }
00527
00528
NTSTATUS
00529 MiDoMappedCopy (
00530 IN
PEPROCESS FromProcess,
00531 IN PVOID FromAddress,
00532 IN
PEPROCESS ToProcess,
00533 OUT PVOID ToAddress,
00534 IN ULONG BufferSize,
00535 IN KPROCESSOR_MODE PreviousMode,
00536 OUT PULONG NumberOfBytesRead
00537 )
00538
00539
00540
00541
00542
00543
00544
00545
00546
00547
00548
00549
00550
00551
00552
00553
00554
00555
00556
00557
00558
00559
00560
00561
00562
00563
00564
00565
00566
00567
00568
00569
00570
00571
00572 {
00573
00574 ULONG AmountToMove;
00575 ULONG_PTR BadVa1;
00576 ULONG_PTR BadVa2;
00577
PEPROCESS CurrentProcess;
00578 LOGICAL Moving;
00579 LOGICAL Probing;
00580 BOOLEAN LockedMdlPages;
00581 PVOID InVa;
00582 ULONG LeftToMove;
00583 PULONG MappedAddress;
00584 ULONG MaximumMoved;
00585
PMDL Mdl;
00586 PFN_NUMBER MdlHack[(
sizeof(
MDL)/
sizeof(PFN_NUMBER)) + (
MAX_LOCK_SIZE >>
PAGE_SHIFT) + 1];
00587 PVOID OutVa;
00588 LOGICAL MappingFailed;
00589
00590
PAGED_CODE();
00591
00592 MappingFailed =
FALSE;
00593
00594
00595
00596
00597
00598
00599 CurrentProcess =
PsGetCurrentProcess();
00600
00601 InVa = FromAddress;
00602 OutVa = ToAddress;
00603
00604 MaximumMoved =
MAX_LOCK_SIZE;
00605
if (
BufferSize <=
MAX_LOCK_SIZE) {
00606 MaximumMoved =
BufferSize;
00607 }
00608
00609 Mdl = (
PMDL)&MdlHack[0];
00610
00611
00612
00613
00614
00615 LeftToMove =
BufferSize;
00616 AmountToMove = MaximumMoved;
00617
while (LeftToMove > 0) {
00618
00619
if (LeftToMove < AmountToMove) {
00620
00621
00622
00623
00624
00625 AmountToMove = LeftToMove;
00626 }
00627
00628
KeDetachProcess();
00629
KeAttachProcess (&FromProcess->Pcb);
00630
00631
00632
00633
00634
00635
00636
try {
00637
00638
00639
00640
00641
00642
00643 MappedAddress =
NULL;
00644 LockedMdlPages =
FALSE;
00645
00646
if ((InVa == FromAddress) && (PreviousMode !=
KernelMode)){
00647 Probing =
TRUE;
00648
ProbeForRead (FromAddress,
BufferSize,
sizeof(
CHAR));
00649 }
00650 Probing =
FALSE;
00651
00652
00653
00654
00655
00656
MmInitializeMdl (Mdl, (PVOID)InVa, AmountToMove);
00657
00658 Moving =
TRUE;
00659
MmProbeAndLockPages (Mdl, PreviousMode,
IoReadAccess);
00660 Moving =
FALSE;
00661
00662 LockedMdlPages =
TRUE;
00663
00664 MappedAddress =
MmMapLockedPagesSpecifyCache (Mdl,
00665
KernelMode,
00666
MmCached,
00667
NULL,
00668
FALSE,
00669
HighPagePriority);
00670
00671
if (MappedAddress ==
NULL) {
00672 MappingFailed =
TRUE;
00673
ExRaiseStatus(STATUS_INSUFFICIENT_RESOURCES);
00674 }
00675
00676
00677
00678
00679
00680
KeDetachProcess();
00681
KeAttachProcess (&ToProcess->Pcb);
00682
00683
00684
00685
00686
if ((InVa == FromAddress) && (PreviousMode !=
KernelMode)){
00687 Probing =
TRUE;
00688
ProbeForWrite (ToAddress,
BufferSize,
sizeof(
CHAR));
00689 }
00690 Probing =
FALSE;
00691
00692 RtlCopyMemory (OutVa, MappedAddress, AmountToMove);
00693
00694 } except (
MiGetExceptionInfo (GetExceptionInformation(),
00695 &BadVa1,
00696 &BadVa2)) {
00697
00698
00699
00700
00701
00702
00703
00704
KeDetachProcess();
00705
if (MappedAddress !=
NULL) {
00706
MmUnmapLockedPages (MappedAddress, Mdl);
00707 }
00708
if (LockedMdlPages ==
TRUE) {
00709
MmUnlockPages (Mdl);
00710 }
00711
00712
if (GetExceptionCode() == STATUS_WORKING_SET_QUOTA) {
00713
return STATUS_WORKING_SET_QUOTA;
00714 }
00715
00716
if ((Probing ==
TRUE) || (MappingFailed ==
TRUE)) {
00717
return GetExceptionCode();
00718
00719 }
else {
00720
00721
00722
00723
00724
00725
00726
00727
if (Moving ==
TRUE) {
00728
if (BadVa1 != 0xFFFFFFFF) {
00729 *NumberOfBytesRead = (ULONG)((ULONG_PTR)BadVa2 - (ULONG_PTR)FromAddress);
00730 }
00731
00732 }
else {
00733 *NumberOfBytesRead =
BufferSize - LeftToMove;
00734 }
00735 }
00736
00737
return STATUS_PARTIAL_COPY;
00738 }
00739
MmUnmapLockedPages (MappedAddress, Mdl);
00740
MmUnlockPages (Mdl);
00741
00742 LeftToMove -= AmountToMove;
00743 InVa = (PVOID)((ULONG_PTR)InVa + AmountToMove);
00744 OutVa = (PVOID)((ULONG_PTR)OutVa + AmountToMove);
00745 }
00746
00747
KeDetachProcess();
00748
00749
00750
00751
00752
00753 *NumberOfBytesRead =
BufferSize;
00754
return STATUS_SUCCESS;
00755 }
00756
00757
NTSTATUS
00758 MiDoPoolCopy (
00759 IN
PEPROCESS FromProcess,
00760 IN PVOID FromAddress,
00761 IN
PEPROCESS ToProcess,
00762 OUT PVOID ToAddress,
00763 IN ULONG BufferSize,
00764 IN KPROCESSOR_MODE PreviousMode,
00765 OUT PULONG NumberOfBytesRead
00766 )
00767
00768
00769
00770
00771
00772
00773
00774
00775
00776
00777
00778
00779
00780
00781
00782
00783
00784
00785
00786
00787
00788
00789
00790
00791
00792
00793
00794
00795
00796
00797
00798
00799 {
00800
00801 ULONG AmountToMove;
00802 ULONG_PTR BadVa1;
00803 ULONG_PTR BadVa2;
00804
PEPROCESS CurrentProcess;
00805 LOGICAL Moving;
00806 LOGICAL Probing;
00807 PVOID InVa;
00808 ULONG LeftToMove;
00809 ULONG MaximumMoved;
00810 PVOID OutVa;
00811 PVOID PoolArea;
00812 LONGLONG StackArray[
COPY_STACK_SIZE];
00813 ULONG FreePool;
00814
00815
PAGED_CODE();
00816
00817
ASSERT (
BufferSize != 0);
00818
00819
00820
00821
00822
00823
00824 CurrentProcess =
PsGetCurrentProcess();
00825
00826 InVa = FromAddress;
00827 OutVa = ToAddress;
00828
00829
00830
00831
00832
00833 MaximumMoved =
MAX_MOVE_SIZE;
00834
if (
BufferSize <=
MAX_MOVE_SIZE) {
00835 MaximumMoved =
BufferSize;
00836 }
00837
00838 FreePool =
FALSE;
00839
if (
BufferSize <=
sizeof(StackArray)) {
00840 PoolArea = (PULONG)&StackArray[0];
00841 }
else {
00842
do {
00843 PoolArea =
ExAllocatePoolWithTag (
NonPagedPool, MaximumMoved, 'wRmM');
00844
if (PoolArea !=
NULL) {
00845 FreePool =
TRUE;
00846
break;
00847 }
00848
00849 MaximumMoved = MaximumMoved >> 1;
00850
if (MaximumMoved <=
sizeof(StackArray)) {
00851 PoolArea = (PULONG)&StackArray[0];
00852
break;
00853 }
00854 }
while (
TRUE);
00855 }
00856
00857
00858
00859
00860
00861 LeftToMove =
BufferSize;
00862 AmountToMove = MaximumMoved;
00863
while (LeftToMove > 0) {
00864
00865
if (LeftToMove < AmountToMove) {
00866
00867
00868
00869
00870
00871 AmountToMove = LeftToMove;
00872 }
00873
00874
KeDetachProcess();
00875
KeAttachProcess (&FromProcess->Pcb);
00876
00877
00878
00879
00880
00881
00882
try {
00883
00884
00885
00886
00887
00888
00889
if ((InVa == FromAddress) && (PreviousMode !=
KernelMode)){
00890 Probing =
TRUE;
00891
ProbeForRead (FromAddress,
BufferSize,
sizeof(
CHAR));
00892 }
00893
00894 Probing =
FALSE;
00895
00896 Moving =
TRUE;
00897
00898 RtlCopyMemory (PoolArea, InVa, AmountToMove);
00899
00900 Moving =
FALSE;
00901
00902
KeDetachProcess();
00903
KeAttachProcess (&ToProcess->Pcb);
00904
00905
00906
00907
00908
00909
if ((InVa == FromAddress) && (PreviousMode !=
KernelMode)){
00910 Probing =
TRUE;
00911
ProbeForWrite (ToAddress,
BufferSize,
sizeof(
CHAR));
00912 }
00913 Probing =
FALSE;
00914
00915 RtlCopyMemory (OutVa, PoolArea, AmountToMove);
00916
00917 } except (
MiGetExceptionInfo (GetExceptionInformation(),
00918 &BadVa1,
00919 &BadVa2)) {
00920
00921
00922
00923
00924
00925
00926
KeDetachProcess();
00927
00928
if (FreePool) {
00929
ExFreePool (PoolArea);
00930 }
00931
if (Probing ==
TRUE) {
00932
return GetExceptionCode();
00933
00934 }
else {
00935
00936
00937
00938
00939
00940
00941
00942
if (Moving ==
TRUE) {
00943
00944
00945
00946
00947
00948
if (BadVa1 != 0xFFFFFFFF) {
00949 *NumberOfBytesRead = (ULONG)((ULONG_PTR)(BadVa2 - (ULONG_PTR)FromAddress));
00950 }
00951
00952 }
else {
00953
00954
00955
00956
00957
00958 *NumberOfBytesRead =
BufferSize - LeftToMove;
00959 }
00960 }
00961
00962
return STATUS_PARTIAL_COPY;
00963 }
00964
00965 LeftToMove -= AmountToMove;
00966 InVa = (PVOID)((ULONG_PTR)InVa + AmountToMove);
00967 OutVa = (PVOID)((ULONG_PTR)OutVa + AmountToMove);
00968 }
00969
00970
if (FreePool) {
00971
ExFreePool (PoolArea);
00972 }
00973
KeDetachProcess();
00974
00975
00976
00977
00978
00979 *NumberOfBytesRead =
BufferSize;
00980
return STATUS_SUCCESS;
00981 }
00982
00983
00984
NTSTATUS
00985 MiValidateUserTransfer(
00986 IN PVOID BaseAddressPointer,
00987 IN PVOID BufferPointer,
00988 IN ULONG BufferSize
00989 )
00990
00991
00992
00993
00994
00995
00996
00997
00998
00999
01000
01001
01002
01003
01004
01005
01006
01007
01008
01009
01010
01011
01012
01013
01014
01015
01016
01017
01018
01019
01020 {
01021 ULONG_PTR BaseAddress;
01022 ULONG_PTR
Buffer;
01023
01024 BaseAddress = (ULONG_PTR)BaseAddressPointer;
01025
Buffer = (ULONG_PTR)BufferPointer;
01026
01027
PAGED_CODE();
01028
01029
01030
01031
01032
01033
if (BaseAddress +
BufferSize < BaseAddress) {
01034
return STATUS_ACCESS_VIOLATION;
01035 }
01036
01037
if (((PVOID)BaseAddress > MM_HIGHEST_USER_ADDRESS) ||
01038 ((PVOID)(BaseAddress +
BufferSize) > MM_HIGHEST_USER_ADDRESS)) {
01039
01040
return STATUS_ACCESS_VIOLATION;
01041 }
01042
01043
if (
Buffer +
BufferSize <
Buffer) {
01044
return STATUS_ACCESS_VIOLATION;
01045 }
01046
01047
if (((PVOID)
Buffer > MM_HIGHEST_USER_ADDRESS) ||
01048 ((PVOID)(
Buffer +
BufferSize) > MM_HIGHEST_USER_ADDRESS)) {
01049
01050
return STATUS_ACCESS_VIOLATION;
01051 }
01052
01053
return STATUS_SUCCESS;
01054 }