aboutsummaryrefslogtreecommitdiff
path: root/KMemDriver/KMemDriver.c
diff options
context:
space:
mode:
authorsegfault <toni@impl.cc>2020-10-12 11:28:33 -0700
committersegfault <toni@impl.cc>2020-10-12 11:28:33 -0700
commitea105e2f9790ca7f3d1b7d604aaa5c7b5f29a184 (patch)
tree834dd656892941294afa4b5795e15b103ab91784 /KMemDriver/KMemDriver.c
parent639f1137e3f7e5ef845e3f69ad34b514749c87fc (diff)
Added Crypto function bodies, renamed ASM fn to get next RIP after return and improved CRYPTO_* macros.
Diffstat (limited to 'KMemDriver/KMemDriver.c')
-rw-r--r--KMemDriver/KMemDriver.c6
1 files changed, 2 insertions, 4 deletions
diff --git a/KMemDriver/KMemDriver.c b/KMemDriver/KMemDriver.c
index 921ab0f..db865d1 100644
--- a/KMemDriver/KMemDriver.c
+++ b/KMemDriver/KMemDriver.c
@@ -27,8 +27,6 @@
#define WAIT_OBJECT_0 ((STATUS_WAIT_0 ) + 0 )
-extern PVOID getCurrentRIP(void);
-
DRIVER_INITIALIZE DriverEntry;
#pragma alloc_text(INIT, DriverEntry)
void OnImageLoad(
@@ -165,6 +163,7 @@ NTSTATUS DriverEntry(
_In_ PUNICODE_STRING RegistryPath
)
{
+ CryptoInit(CRYPTO_FNPTR(DriverEntry), NULL);
CRYPT_PROLOGUE();
NTSTATUS status;
HANDLE hThread = NULL;
@@ -175,6 +174,7 @@ NTSTATUS DriverEntry(
UNREFERENCED_PARAMETER(RegistryPath);
KDBG("Driver Loaded\n");
+
if (!DriverObject && RegistryPath) {
/* assume that we are manual mapped by PastDSE */
mmapedBase = RegistryPath;
@@ -198,8 +198,6 @@ NTSTATUS WaitForControlProcess(OUT PEPROCESS *ppEProcess)
if (!ppEProcess)
return STATUS_INVALID_ADDRESS;
- KDBG("CurrentRIP: %p\n", getCurrentRIP());
-
imageBase = NULL;
ctrlPID = NULL;