00001
00002
00003
00004
00005
00006
00007
00008
00009
00010
00011
00012
00013
00014
00015
00016
00017
00018
00019
00020
00021
00022
00023
00024
#include "mi.h"
00025
00026
#ifdef ALLOC_PRAGMA
00027
#pragma alloc_text(PAGE, MmHibernateInformation)
00028
#endif
00029
00030
#if _WIN64
00031
#if DBGXX
00032
VOID
00033 MiCheckPageTableTrim(
00034 IN
PMMPTE PointerPte
00035 );
00036
#endif
00037
#endif
00038
00039
00040 ULONG
00041
FASTCALL
00042 MiIsPteDecommittedPage (
00043 IN
PMMPTE PointerPte
00044 )
00045
00046
00047
00048
00049
00050
00051
00052
00053
00054
00055
00056
00057
00058
00059
00060
00061
00062
00063
00064
00065
00066
00067
00068
00069
00070
00071 {
00072
MMPTE PteContents;
00073
00074 PteContents = *PointerPte;
00075
00076
00077
00078
00079
00080
if (PteContents.
u.Soft.Protection !=
MM_DECOMMIT) {
00081
return FALSE;
00082 }
00083
00084
00085
00086
00087
00088
00089
if (PteContents.
u.Hard.Valid == 1) {
00090
00091
00092
00093
00094
00095
return FALSE;
00096 }
00097
00098
if ((PteContents.
u.Soft.Prototype == 1) &&
00099 (PteContents.
u.Soft.PageFileHigh !=
MI_PTE_LOOKUP_NEEDED)) {
00100
00101
00102
00103
00104
00105
00106
return FALSE;
00107 }
00108
00109
00110
00111
00112
00113
return TRUE;
00114 }
00115
00116
00117
00118
00119
00120 ULONG
MmCompatibleProtectionMask[8] = {
00121 PAGE_NOACCESS,
00122 PAGE_NOACCESS | PAGE_READONLY | PAGE_WRITECOPY,
00123 PAGE_NOACCESS | PAGE_EXECUTE,
00124 PAGE_NOACCESS | PAGE_READONLY | PAGE_WRITECOPY | PAGE_EXECUTE |
00125 PAGE_EXECUTE_READ,
00126 PAGE_NOACCESS | PAGE_READONLY | PAGE_WRITECOPY | PAGE_READWRITE,
00127 PAGE_NOACCESS | PAGE_READONLY | PAGE_WRITECOPY,
00128 PAGE_NOACCESS | PAGE_READONLY | PAGE_WRITECOPY | PAGE_READWRITE |
00129 PAGE_EXECUTE | PAGE_EXECUTE_READ | PAGE_EXECUTE_READWRITE |
00130 PAGE_EXECUTE_WRITECOPY,
00131 PAGE_NOACCESS | PAGE_READONLY | PAGE_WRITECOPY | PAGE_EXECUTE |
00132 PAGE_EXECUTE_READ | PAGE_EXECUTE_WRITECOPY
00133 };
00134
00135
00136
00137 ULONG
00138
FASTCALL
00139 MiIsProtectionCompatible (
00140 IN ULONG OldProtect,
00141 IN ULONG NewProtect
00142 )
00143
00144
00145
00146
00147
00148
00149
00150
00151
00152
00153
00154
00155
00156
00157
00158
00159
00160
00161
00162
00163
00164
00165
00166
00167
00168
00169
00170
00171
00172
00173
00174
00175
00176
00177
00178
00179
00180
00181 {
00182 ULONG Mask;
00183 ULONG ProtectMask;
00184
00185
try {
00186 Mask =
MiMakeProtectionMask (OldProtect) & 0x7;
00187 } except (
EXCEPTION_EXECUTE_HANDLER) {
00188
return FALSE;
00189 }
00190
00191 ProtectMask =
MmCompatibleProtectionMask[Mask] | PAGE_GUARD | PAGE_NOCACHE;
00192
00193
if ((ProtectMask | NewProtect) != ProtectMask) {
00194
return FALSE;
00195 }
00196
return TRUE;
00197 }
00198
00199
00200
00201
00202
00203
00204 CCHAR
MmUserProtectionToMask1[16] = {
00205 0,
00206
MM_NOACCESS,
00207
MM_READONLY,
00208 -1,
00209
MM_READWRITE,
00210 -1,
00211 -1,
00212 -1,
00213
MM_WRITECOPY,
00214 -1,
00215 -1,
00216 -1,
00217 -1,
00218 -1,
00219 -1,
00220 -1 };
00221
00222 CCHAR
MmUserProtectionToMask2[16] = {
00223 0,
00224
MM_EXECUTE,
00225
MM_EXECUTE_READ,
00226 -1,
00227
MM_EXECUTE_READWRITE,
00228 -1,
00229 -1,
00230 -1,
00231
MM_EXECUTE_WRITECOPY,
00232 -1,
00233 -1,
00234 -1,
00235 -1,
00236 -1,
00237 -1,
00238 -1 };
00239
00240
00241 ULONG
00242
FASTCALL
00243 MiMakeProtectionMask (
00244 IN ULONG Protect
00245 )
00246
00247
00248
00249
00250
00251
00252
00253
00254
00255
00256
00257
00258
00259
00260
00261
00262
00263
00264
00265
00266
00267
00268
00269
00270 {
00271 ULONG Field1;
00272 ULONG Field2;
00273 ULONG ProtectCode;
00274
00275
if (Protect >= (PAGE_NOCACHE * 2)) {
00276
ExRaiseStatus (STATUS_INVALID_PAGE_PROTECTION);
00277 }
00278
00279 Field1 = Protect & 0xF;
00280 Field2 = (Protect >> 4) & 0xF;
00281
00282
00283
00284
00285
00286
if (Field1 == 0) {
00287
if (Field2 == 0) {
00288
00289
00290
00291
00292
00293
ExRaiseStatus (STATUS_INVALID_PAGE_PROTECTION);
00294
return 0;
00295 }
00296 ProtectCode =
MmUserProtectionToMask2[Field2];
00297 }
else {
00298
if (Field2 != 0) {
00299
00300
00301
00302
00303
ExRaiseStatus (STATUS_INVALID_PAGE_PROTECTION);
00304
return 0;
00305 }
00306 ProtectCode =
MmUserProtectionToMask1[Field1];
00307 }
00308
00309
if (ProtectCode == -1) {
00310
ExRaiseStatus (STATUS_INVALID_PAGE_PROTECTION);
00311 }
00312
00313
if (Protect & PAGE_GUARD) {
00314
if (ProtectCode ==
MM_NOACCESS) {
00315
00316
00317
00318
00319
00320
ExRaiseStatus (STATUS_INVALID_PAGE_PROTECTION);
00321 }
00322
00323 ProtectCode |=
MM_GUARD_PAGE;
00324 }
00325
00326
if (Protect & PAGE_NOCACHE) {
00327
00328
if (ProtectCode ==
MM_NOACCESS) {
00329
00330
00331
00332
00333
00334
ExRaiseStatus (STATUS_INVALID_PAGE_PROTECTION);
00335 }
00336
00337 ProtectCode |=
MM_NOCACHE;
00338 }
00339
00340
return ProtectCode;
00341 }
00342
00343
#if defined (_WIN64)
00344
00345 LOGICAL
00346
MiDoesPpeExistAndMakeValid (
00347 IN
PMMPTE PointerPpe,
00348 IN
PEPROCESS TargetProcess,
00349 IN ULONG PfnMutexHeld,
00350 OUT PULONG Waited
00351 )
00352
00353
00354
00355
00356
00357
00358
00359
00360
00361
00362
00363
00364
00365
00366
00367
00368
00369
00370
00371
00372
00373
00374
00375
00376
00377
00378
00379
00380
00381
00382
00383
00384
00385
00386
00387
00388
00389
00390 {
00391
PMMPTE PointerPde;
00392 KIRQL OldIrql;
00393
00394 OldIrql =
APC_LEVEL;
00395
00396
if (PointerPpe->u.Long == 0) {
00397
00398
00399
00400
00401
00402
return FALSE;
00403 }
00404
00405
if (PointerPpe->u.Hard.Valid == 1) {
00406
00407
00408
00409
00410
00411
return TRUE;
00412 }
00413
00414
00415
00416
00417
00418
00419
if (PfnMutexHeld) {
00420
UNLOCK_PFN (OldIrql);
00421 *Waited += 1;
00422 }
00423
00424 PointerPde =
MiGetVirtualAddressMappedByPte (PointerPpe);
00425
00426 *Waited +=
MiMakeSystemAddressValid (PointerPde, TargetProcess);
00427
00428
if (PfnMutexHeld) {
00429
LOCK_PFN (OldIrql);
00430 }
00431
return TRUE;
00432 }
00433
#endif
00434
00435
00436 ULONG
00437 MiDoesPdeExistAndMakeValid (
00438 IN
PMMPTE PointerPde,
00439 IN
PEPROCESS TargetProcess,
00440 IN ULONG PfnMutexHeld,
00441 OUT PULONG Waited
00442 )
00443
00444
00445
00446
00447
00448
00449
00450
00451
00452
00453
00454
00455
00456
00457
00458
00459
00460
00461
00462
00463
00464
00465
00466
00467
00468
00469
00470
00471
00472
00473
00474
00475
00476
00477
00478
00479
00480
00481 {
00482
PMMPTE PointerPte;
00483 KIRQL OldIrql;
00484
00485 OldIrql =
APC_LEVEL;
00486
00487
if (PointerPde->u.Long == 0) {
00488
00489
00490
00491
00492
00493
return FALSE;
00494 }
00495
00496
if (PointerPde->u.Hard.Valid == 1) {
00497
00498
00499
00500
00501
00502
return TRUE;
00503 }
00504
00505
00506
00507
00508
00509
00510
if (PfnMutexHeld) {
00511
UNLOCK_PFN (OldIrql);
00512 *Waited += 1;
00513 }
00514
00515 PointerPte =
MiGetVirtualAddressMappedByPte (PointerPde);
00516
00517 *Waited +=
MiMakeSystemAddressValid (PointerPte, TargetProcess);
00518
00519
if (PfnMutexHeld) {
00520
LOCK_PFN (OldIrql);
00521 }
00522
return TRUE;
00523 }
00524
00525
#if defined (_WIN64)
00526
00527 ULONG
00528
MiMakePpeExistAndMakeValid (
00529 IN
PMMPTE PointerPpe,
00530 IN
PEPROCESS TargetProcess,
00531 IN ULONG PfnMutexHeld
00532 )
00533
00534
00535
00536
00537
00538
00539
00540
00541
00542
00543
00544
00545
00546
00547
00548
00549
00550
00551
00552
00553
00554
00555
00556
00557
00558
00559
00560
00561
00562
00563
00564
00565
00566
00567
00568
00569
00570
00571
00572 {
00573
PMMPTE PointerPde;
00574 KIRQL OldIrql;
00575 ULONG ReturnValue;
00576
00577
if (PointerPpe->u.Hard.Valid == 1) {
00578
00579
00580
00581
00582
00583
return TRUE;
00584 }
00585
00586
00587
00588
00589
00590
if (PointerPpe->u.Long == 0) {
00591 ReturnValue =
FALSE;
00592 }
else {
00593 ReturnValue =
TRUE;
00594 }
00595
00596
00597
00598
00599
00600 OldIrql =
APC_LEVEL;
00601
00602
if (PfnMutexHeld) {
00603
UNLOCK_PFN (OldIrql);
00604 }
00605
00606
00607
00608
00609
00610 PointerPde =
MiGetVirtualAddressMappedByPte (PointerPpe);
00611
MiMakeSystemAddressValid (PointerPde, TargetProcess);
00612
00613
ASSERT (PointerPpe->u.Hard.Valid == 1);
00614
00615
if (PfnMutexHeld) {
00616
LOCK_PFN (OldIrql);
00617 }
00618
00619
return ReturnValue;
00620 }
00621
#endif
00622
00623 ULONG
00624 MiMakePdeExistAndMakeValid (
00625 IN
PMMPTE PointerPde,
00626 IN
PEPROCESS TargetProcess,
00627 IN ULONG PfnMutexHeld
00628 )
00629
00630
00631
00632
00633
00634
00635
00636
00637
00638
00639
00640
00641
00642
00643
00644
00645
00646
00647
00648
00649
00650
00651
00652
00653
00654
00655
00656
00657
00658
00659
00660
00661
00662
00663
00664
00665
00666
00667
00668
00669
00670 {
00671
PMMPTE PointerPte;
00672
PMMPTE PointerPpe;
00673 KIRQL OldIrql;
00674 ULONG ReturnValue;
00675
00676 PointerPpe =
MiGetPteAddress (PointerPde);
00677
00678
if (PointerPpe->
u.Hard.Valid == 1 && PointerPde->u.Hard.Valid == 1) {
00679
00680
00681
00682
00683
00684
return TRUE;
00685 }
00686
00687
00688
00689
00690
00691
if (PointerPpe->
u.Long == 0) {
00692 ReturnValue =
FALSE;
00693 }
else {
00694 ReturnValue =
TRUE;
00695 }
00696
00697
00698
00699
00700
00701 OldIrql =
APC_LEVEL;
00702
00703
do {
00704
00705
if (PfnMutexHeld) {
00706
UNLOCK_PFN (OldIrql);
00707 }
00708
00709
00710
00711
00712
00713
MiMakeSystemAddressValid (PointerPde, TargetProcess);
00714
00715
ASSERT (PointerPpe->
u.Hard.Valid == 1);
00716
00717
if (PfnMutexHeld) {
00718
LOCK_PFN (OldIrql);
00719 }
00720
00721
00722
00723
00724
00725
if (ReturnValue ==
TRUE) {
00726
if (PointerPde->u.Long == 0) {
00727 ReturnValue =
FALSE;
00728 }
else {
00729 ReturnValue =
TRUE;
00730 }
00731 }
00732
00733
00734
00735
00736
00737 OldIrql =
APC_LEVEL;
00738
00739
if (PfnMutexHeld) {
00740
UNLOCK_PFN (OldIrql);
00741 }
00742
00743 PointerPte =
MiGetVirtualAddressMappedByPte (PointerPde);
00744
00745
00746
00747
00748
00749
MiMakeSystemAddressValid (PointerPte, TargetProcess);
00750
00751
ASSERT (PointerPde->u.Hard.Valid == 1);
00752
00753
if (PfnMutexHeld) {
00754
LOCK_PFN (OldIrql);
00755 }
00756
00757 }
while (PointerPpe->
u.Hard.Valid == 0 || PointerPde->u.Hard.Valid == 0);
00758
00759
return ReturnValue;
00760 }
00761
00762 ULONG
00763
FASTCALL
00764 MiMakeSystemAddressValid (
00765 IN PVOID VirtualAddress,
00766 IN
PEPROCESS CurrentProcess
00767 )
00768
00769
00770
00771
00772
00773
00774
00775
00776
00777
00778
00779
00780
00781
00782
00783
00784
00785
00786
00787
00788
00789
00790
00791
00792 {
00793
NTSTATUS status;
00794 LOGICAL WsHeldSafe;
00795 ULONG Waited;
00796
00797 Waited =
FALSE;
00798
00799
ASSERT (VirtualAddress > MM_HIGHEST_USER_ADDRESS);
00800
00801
ASSERT ((VirtualAddress <
MM_PAGED_POOL_START) ||
00802 (VirtualAddress >
MmPagedPoolEnd));
00803
00804
while (!
MmIsAddressValid(VirtualAddress)) {
00805
00806
00807
00808
00809
00810
00811
00812
00813
00814
UNLOCK_WS_REGARDLESS(CurrentProcess, WsHeldSafe);
00815
00816 status =
MmAccessFault (
FALSE, VirtualAddress,
KernelMode, (PVOID)0);
00817
if (!
NT_SUCCESS(status)) {
00818 KdPrint ((
"MM:page fault status %lx\n",status));
00819
KeBugCheckEx (KERNEL_DATA_INPAGE_ERROR,
00820 1,
00821 (ULONG)status,
00822 (ULONG_PTR)CurrentProcess,
00823 (ULONG_PTR)VirtualAddress);
00824 }
00825
00826
LOCK_WS_REGARDLESS(CurrentProcess, WsHeldSafe);
00827
00828 Waited =
TRUE;
00829 }
00830
00831
return Waited;
00832 }
00833
00834
00835 ULONG
00836
FASTCALL
00837 MiMakeSystemAddressValidPfnWs (
00838 IN PVOID VirtualAddress,
00839 IN
PEPROCESS CurrentProcess OPTIONAL
00840 )
00841
00842
00843
00844
00845
00846
00847
00848
00849
00850
00851
00852
00853
00854
00855
00856
00857
00858
00859
00860
00861
00862
00863
00864
00865
00866
00867 {
00868
NTSTATUS status;
00869 ULONG Waited;
00870 KIRQL OldIrql;
00871 LOGICAL WsHeldSafe;
00872
00873 Waited =
FALSE;
00874 OldIrql =
APC_LEVEL;
00875
00876
ASSERT (VirtualAddress > MM_HIGHEST_USER_ADDRESS);
00877
00878
while (!
MmIsAddressValid(VirtualAddress)) {
00879
00880
00881
00882
00883
00884
00885
UNLOCK_PFN (OldIrql);
00886
if (CurrentProcess !=
NULL) {
00887
00888
00889
00890
00891
00892
00893
UNLOCK_WS_REGARDLESS(CurrentProcess, WsHeldSafe);
00894 }
00895 status =
MmAccessFault (
FALSE, VirtualAddress,
KernelMode, (PVOID)0);
00896
if (!
NT_SUCCESS(status)) {
00897 KdPrint ((
"MM:page fault status %lx\n",status));
00898
KeBugCheckEx (KERNEL_DATA_INPAGE_ERROR,
00899 2,
00900 (ULONG)status,
00901 (ULONG_PTR)CurrentProcess,
00902 (ULONG_PTR)VirtualAddress);
00903 }
00904
if (CurrentProcess !=
NULL) {
00905
LOCK_WS_REGARDLESS(CurrentProcess, WsHeldSafe);
00906 }
00907
LOCK_PFN (OldIrql);
00908
00909 Waited =
TRUE;
00910 }
00911
return Waited;
00912 }
00913
00914 ULONG
00915
FASTCALL
00916 MiMakeSystemAddressValidPfnSystemWs (
00917 IN PVOID VirtualAddress
00918 )
00919
00920
00921
00922
00923
00924
00925
00926
00927
00928
00929
00930
00931
00932
00933
00934
00935
00936
00937
00938
00939
00940
00941 {
00942
NTSTATUS status;
00943 ULONG Waited;
00944 KIRQL OldIrql;
00945 KIRQL OldIrqlWs;
00946 LOGICAL SessionSpace;
00947
00948 Waited =
FALSE;
00949 OldIrql =
APC_LEVEL;
00950 OldIrqlWs =
APC_LEVEL;
00951
00952
ASSERT (VirtualAddress > MM_HIGHEST_USER_ADDRESS);
00953
00954 SessionSpace =
MI_IS_SESSION_IMAGE_ADDRESS (VirtualAddress);
00955
00956
while (!
MmIsAddressValid(VirtualAddress)) {
00957
00958
00959
00960
00961
00962
00963
UNLOCK_PFN (OldIrql);
00964
00965
if (SessionSpace ==
TRUE) {
00966
UNLOCK_SESSION_SPACE_WS (OldIrqlWs);
00967 }
00968
else {
00969
UNLOCK_SYSTEM_WS (OldIrqlWs);
00970 }
00971
00972 status =
MmAccessFault (
FALSE, VirtualAddress,
KernelMode, (PVOID)0);
00973
if (!
NT_SUCCESS(status)) {
00974 KdPrint ((
"MM:page fault status %lx\n",status));
00975
KeBugCheckEx (KERNEL_DATA_INPAGE_ERROR,
00976 2,
00977 (ULONG)status,
00978 (ULONG_PTR)0,
00979 (ULONG_PTR)VirtualAddress);
00980 }
00981
if (SessionSpace ==
TRUE) {
00982
LOCK_SESSION_SPACE_WS (OldIrqlWs);
00983 }
00984
else {
00985
LOCK_SYSTEM_WS (OldIrqlWs);
00986 }
00987
LOCK_PFN (OldIrql);
00988
00989 Waited =
TRUE;
00990 }
00991
return Waited;
00992 }
00993
00994 ULONG
00995
FASTCALL
00996 MiMakeSystemAddressValidPfn (
00997 IN PVOID VirtualAddress
00998 )
00999
01000
01001
01002
01003
01004
01005
01006
01007
01008
01009
01010
01011
01012
01013
01014
01015
01016
01017
01018
01019
01020
01021 {
01022
NTSTATUS status;
01023 KIRQL OldIrql =
APC_LEVEL;
01024
01025 ULONG Waited =
FALSE;
01026
01027
ASSERT (VirtualAddress > MM_HIGHEST_USER_ADDRESS);
01028
01029
while (!
MmIsAddressValid(VirtualAddress)) {
01030
01031
01032
01033
01034
01035
01036
UNLOCK_PFN (OldIrql);
01037
01038 status =
MmAccessFault (
FALSE, VirtualAddress,
KernelMode, (PVOID)0);
01039
if (!
NT_SUCCESS(status)) {
01040 KdPrint ((
"MM:page fault status %lx\n",status));
01041
KeBugCheckEx (KERNEL_DATA_INPAGE_ERROR,
01042 3,
01043 (ULONG)status,
01044 (ULONG_PTR)VirtualAddress,
01045 0);
01046 }
01047
01048
LOCK_PFN (OldIrql);
01049
01050 Waited =
TRUE;
01051 }
01052
01053
return Waited;
01054 }
01055
01056 ULONG
01057
FASTCALL
01058 MiLockPagedAddress (
01059 IN PVOID VirtualAddress,
01060 IN ULONG PfnLockHeld
01061 )
01062
01063
01064
01065
01066
01067
01068
01069
01070
01071
01072
01073
01074
01075
01076
01077
01078
01079
01080
01081
01082
01083
01084
01085
01086 {
01087
01088
PMMPTE PointerPte;
01089
PMMPFN Pfn1;
01090 KIRQL OldIrql;
01091 ULONG Waited =
FALSE;
01092
01093 PointerPte =
MiGetPteAddress(VirtualAddress);
01094
01095
01096
01097
01098
01099
if (PfnLockHeld ==
FALSE) {
01100
LOCK_PFN2 (OldIrql);
01101 }
01102
01103
if (PointerPte->
u.Hard.Valid == 0) {
01104
01105 Waited =
MiMakeSystemAddressValidPfn (
01106
MiGetVirtualAddressMappedByPte(PointerPte));
01107
01108 }
01109
01110 Pfn1 =
MI_PFN_ELEMENT (PointerPte->
u.Hard.PageFrameNumber);
01111
MI_ADD_LOCKED_PAGE_CHARGE(Pfn1, 6);
01112 Pfn1->
u3.e2.ReferenceCount += 1;
01113
01114
if (PfnLockHeld ==
FALSE) {
01115
UNLOCK_PFN2 (OldIrql);
01116 }
01117
return Waited;
01118 }
01119
01120
01121
VOID
01122
FASTCALL
01123 MiUnlockPagedAddress (
01124 IN PVOID VirtualAddress,
01125 IN ULONG PfnLockHeld
01126 )
01127
01128
01129
01130
01131
01132
01133
01134
01135
01136
01137
01138
01139
01140
01141
01142
01143
01144
01145
01146
01147
01148
01149
01150 {
01151
PMMPFN Pfn1;
01152
PMMPTE PointerPte;
01153 KIRQL OldIrql;
01154 PFN_NUMBER PageFrameIndex;
01155
01156 PointerPte =
MiGetPteAddress(VirtualAddress);
01157
01158
01159
01160
01161
01162
if (PfnLockHeld ==
FALSE) {
01163
LOCK_PFN2 (OldIrql);
01164 }
01165
01166
ASSERT (PointerPte->
u.Hard.Valid == 1);
01167 PageFrameIndex =
MI_GET_PAGE_FRAME_FROM_PTE (PointerPte);
01168 Pfn1 =
MI_PFN_ELEMENT (PageFrameIndex);
01169
01170
ASSERT (Pfn1->
u3.e2.ReferenceCount > 1);
01171
01172
MI_REMOVE_LOCKED_PAGE_CHARGE(Pfn1, 7);
01173
01174
MiDecrementReferenceCount (PageFrameIndex);
01175
01176
if (PfnLockHeld ==
FALSE) {
01177
UNLOCK_PFN2 (OldIrql);
01178 }
01179
return;
01180 }
01181
01182
VOID
01183
FASTCALL
01184 MiZeroPhysicalPage (
01185 IN PFN_NUMBER PageFrameIndex,
01186 IN ULONG PageColor
01187 )
01188
01189
01190
01191
01192
01193
01194
01195
01196
01197
01198
01199
01200
01201
01202
01203
01204
01205
01206
01207
01208
01209
01210
01211 {
01212 PULONG va;
01213 KIRQL OldIrql;
01214
01215
#if defined(_ALPHA_)
01216
01217 HalZeroPage((PVOID)ULongToPtr((PageColor &
MM_COLOR_MASK) <<
PAGE_SHIFT),
01218 (PVOID)ULongToPtr((PageColor &
MM_COLOR_MASK) <<
PAGE_SHIFT),
01219 PageFrameIndex);
01220
#else
01221
01222 UNREFERENCED_PARAMETER (PageColor);
01223
01224 va = (PULONG)
MiMapPageInHyperSpace (PageFrameIndex, &OldIrql);
01225
01226
#if defined(_X86_)
01227
01228
KeZeroPage(va);
01229
01230
#else
01231
01232 RtlZeroMemory (va,
PAGE_SIZE);
01233
01234
#endif // X86
01235
01236
MiUnmapPageInHyperSpace (OldIrql);
01237
01238
#endif // ALPHA
01239
01240
return;
01241 }
01242
01243
VOID
01244
FASTCALL
01245 MiRestoreTransitionPte (
01246 IN PFN_NUMBER PageFrameIndex
01247 )
01248
01249
01250
01251
01252
01253
01254
01255
01256
01257
01258
01259
01260
01261
01262
01263
01264
01265
01266
01267
01268
01269
01270
01271
01272
01273
01274
01275
01276 {
01277
PMMPFN Pfn1;
01278
PMMPTE PointerPte;
01279
PSUBSECTION Subsection;
01280
PCONTROL_AREA ControlArea;
01281 KIRQL OldIrql = 99;
01282
01283 Pfn1 =
MI_PFN_ELEMENT (PageFrameIndex);
01284
01285
ASSERT (Pfn1->
u3.e1.PageLocation ==
StandbyPageList);
01286
01287
if (Pfn1->
u3.e1.PrototypePte) {
01288
01289
if (
MmIsAddressValid (Pfn1->
PteAddress)) {
01290 PointerPte = Pfn1->
PteAddress;
01291 }
else {
01292
01293
01294
01295
01296
01297
01298 PointerPte =
MiMapPageInHyperSpace (Pfn1->
PteFrame, &OldIrql);
01299 PointerPte = (
PMMPTE)((PCHAR)PointerPte +
01300
MiGetByteOffset(Pfn1->
PteAddress));
01301 }
01302
01303
ASSERT ((
MI_GET_PAGE_FRAME_FROM_TRANSITION_PTE (PointerPte) == PageFrameIndex) &&
01304 (PointerPte->u.Hard.Valid == 0));
01305
01306
01307
01308
01309
01310
01311
01312
if (Pfn1->
OriginalPte.
u.Soft.Prototype) {
01313
01314
01315
01316
01317
01318
01319
01320
01321
01322 Subsection =
MiGetSubsectionAddress (&Pfn1->
OriginalPte);
01323 ControlArea = Subsection->
ControlArea;
01324 ControlArea->
NumberOfPfnReferences -= 1;
01325
ASSERT ((LONG)ControlArea->
NumberOfPfnReferences >= 0);
01326
01327
MiCheckForControlAreaDeletion (ControlArea);
01328 }
01329
01330 }
else {
01331
01332
01333
01334
01335
01336
01337
01338
01339
01340
01341
01342 PointerPte = Pfn1->
PteAddress;
01343
01344
if (PointerPte <
MiGetPteAddress (
MM_SYSTEM_SPACE_START) ||
01345
MI_IS_SESSION_PTE (PointerPte)) {
01346
01347 PointerPte =
MiMapPageInHyperSpace (Pfn1->
PteFrame, &OldIrql);
01348 PointerPte = (
PMMPTE)((PCHAR)PointerPte +
01349
MiGetByteOffset(Pfn1->
PteAddress));
01350 }
01351
ASSERT ((
MI_GET_PAGE_FRAME_FROM_TRANSITION_PTE (PointerPte) == PageFrameIndex) &&
01352 (PointerPte->u.Hard.Valid == 0));
01353
01354
MI_CAPTURE_USED_PAGETABLE_ENTRIES (Pfn1);
01355
01356
#if _WIN64
01357
#if DBGXX
01358
MiCheckPageTableTrim(PointerPte);
01359
#endif
01360
#endif
01361
}
01362
01363
ASSERT (Pfn1->
OriginalPte.
u.Hard.Valid == 0);
01364
ASSERT (!((Pfn1->
OriginalPte.
u.Soft.Prototype == 0) &&
01365 (Pfn1->
OriginalPte.
u.Soft.Transition == 1)));
01366
01367
MI_WRITE_INVALID_PTE (PointerPte, Pfn1->
OriginalPte);
01368
01369
if (OldIrql != 99) {
01370
MiUnmapPageInHyperSpace (OldIrql);
01371 }
01372
01373
01374
01375
01376
01377
01378
01379
MiDecrementShareCount (Pfn1->
PteFrame);
01380
01381
return;
01382 }
01383
01384
PSUBSECTION
01385 MiGetSubsectionAndProtoFromPte (
01386 IN
PMMPTE PointerPte,
01387 OUT
PMMPTE *ProtoPte,
01388 IN
PEPROCESS Process
01389 )
01390
01391
01392
01393
01394
01395
01396
01397
01398
01399
01400
01401
01402
01403
01404
01405
01406
01407
01408
01409
01410
01411
01412
01413
01414
01415
01416
01417
01418
01419
01420 {
01421
PMMPTE PointerProto;
01422
PMMPFN Pfn1;
01423
01424
if (PointerPte->u.Hard.Valid == 1) {
01425 Pfn1 =
MI_PFN_ELEMENT (PointerPte->u.Hard.PageFrameNumber);
01426 *ProtoPte = Pfn1->
PteAddress;
01427
return MiGetSubsectionAddress (&Pfn1->
OriginalPte);
01428 }
01429
01430 PointerProto =
MiPteToProto (PointerPte);
01431 *ProtoPte = PointerProto;
01432
01433
MiMakeSystemAddressValidPfnWs (PointerProto, Process);
01434
01435
if (PointerProto->u.Hard.Valid == 1) {
01436
01437
01438
01439
01440 Pfn1 =
MI_PFN_ELEMENT (PointerProto->u.Hard.PageFrameNumber);
01441
return MiGetSubsectionAddress (&Pfn1->
OriginalPte);
01442 }
01443
01444
if ((PointerProto->u.Soft.Transition == 1) &&
01445 (PointerProto->u.Soft.Prototype == 0)) {
01446
01447
01448
01449
01450
01451 Pfn1 =
MI_PFN_ELEMENT (PointerProto->u.Trans.PageFrameNumber);
01452
return MiGetSubsectionAddress (&Pfn1->
OriginalPte);
01453 }
01454
01455
ASSERT (PointerProto->u.Soft.Prototype == 1);
01456
return MiGetSubsectionAddress (PointerProto);
01457 }
01458
01459 BOOLEAN
01460 MmIsNonPagedSystemAddressValid (
01461 IN PVOID VirtualAddress
01462 )
01463
01464
01465
01466
01467
01468
01469
01470
01471
01472
01473
01474
01475
01476
01477
01478
01479
01480
01481
01482
01483
01484
01485
01486
01487 {
01488
01489
01490
01491
01492
01493
01494
if ((VirtualAddress >=
MmPagedPoolStart) &&
01495 (VirtualAddress <=
MmPagedPoolEnd)) {
01496
return FALSE;
01497 }
01498
01499
return TRUE;
01500 }
01501
01502
VOID
01503 MmHibernateInformation (
01504 IN PVOID MemoryMap,
01505 OUT PULONG_PTR HiberVa,
01506 OUT PPHYSICAL_ADDRESS HiberPte
01507 )
01508 {
01509
01510
01511
01512
01513
PoSetHiberRange (
01514 MemoryMap,
01515
PO_MEM_CLONE,
01516
MmCrashDumpPte,
01517 1,
01518 ' etP'
01519 );
01520
01521
01522
01523
01524
01525
01526
01527 *HiberVa = (ULONG_PTR)
MiGetVirtualAddressMappedByPte(
MmCrashDumpPte);
01528 *HiberPte =
MmGetPhysicalAddress(
MmCrashDumpPte);
01529 }
01530
01531
#if _WIN64
01532
#if DBGXX
01533
01534 ULONG zok[16];
01535
01536
VOID
01537 MiCheckPageTableTrim(
01538 IN
PMMPTE PointerPte
01539 )
01540 {
01541 ULONG i;
01542 PFN_NUMBER Frame;
01543
PMMPFN Pfn;
01544
PMMPTE FrameData;
01545
PMMPTE p;
01546 ULONG count;
01547
01548 Frame =
MI_GET_PAGE_FRAME_FROM_PTE(PointerPte);
01549 Pfn =
MI_PFN_ELEMENT (Frame);
01550
01551
if (Pfn->UsedPageTableEntries) {
01552
01553 count = 0;
01554
01555 p = FrameData = (
PMMPTE)KSEG_ADDRESS (Frame);
01556
01557
for (i = 0; i <
PTE_PER_PAGE; i += 1, p += 1) {
01558
if (p->u.Long != 0) {
01559 count += 1;
01560 }
01561 }
01562
01563
DbgPrint (
"MiCheckPageTableTrim: %I64X %I64X %I64X\n",
01564 PointerPte, Pfn, Pfn->UsedPageTableEntries);
01565
01566
if (count != Pfn->UsedPageTableEntries) {
01567
DbgPrint (
"MiCheckPageTableTrim1: %I64X %I64X %I64X %I64X\n",
01568 PointerPte, Pfn, Pfn->UsedPageTableEntries, count);
01569 DbgBreakPoint();
01570 }
01571 zok[0] += 1;
01572 }
01573
else {
01574 zok[1] += 1;
01575 }
01576 }
01577
01578
VOID
01579 MiCheckPageTableInPage(
01580 IN
PMMPFN Pfn,
01581 IN
PMMINPAGE_SUPPORT Support
01582 )
01583 {
01584 ULONG i;
01585 PFN_NUMBER Frame;
01586
PMMPTE FrameData;
01587
PMMPTE p;
01588 ULONG count;
01589
01590
if (Support->UsedPageTableEntries) {
01591
01592 Frame = (PFN_NUMBER)((
PMMPFN)Pfn - (
PMMPFN)
MmPfnDatabase);
01593
01594 count = 0;
01595
01596 p = FrameData = (
PMMPTE)KSEG_ADDRESS (Frame);
01597
01598
for (i = 0; i <
PTE_PER_PAGE; i += 1, p += 1) {
01599
if (p->u.Long != 0) {
01600 count += 1;
01601 }
01602 }
01603
01604
DbgPrint (
"MiCheckPageTableIn: %I64X %I64X %I64X\n",
01605 FrameData, Pfn, Support->UsedPageTableEntries);
01606
01607
if (count != Support->UsedPageTableEntries) {
01608
DbgPrint (
"MiCheckPageTableIn1: %I64X %I64X %I64X %I64X\n",
01609 FrameData, Pfn, Support->UsedPageTableEntries, count);
01610 DbgBreakPoint();
01611 }
01612 zok[2] += 1;
01613 }
01614
else {
01615 zok[3] += 1;
01616 }
01617 }
01618
#endif
01619
#endif