1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
|
#pragma once
#include <Uefi.h>
#include <Protocol/DriverSupportedEfiVersion.h>
#include <Protocol/EfiGuard.h>
#include <Library/UefiLib.h>
#include <Library/DebugLib.h>
#include <Library/MemoryAllocationLib.h>
#include <Library/UefiBootServicesTableLib.h>
#include <Library/UefiRuntimeServicesTableLib.h>
#include <Zydis/Zydis.h>
#include "ntdef.h"
#include "pe.h"
#include "arc.h"
#include "util.h"
#ifdef __cplusplus
extern "C" {
#endif
//
// EfiGuard driver protocol handle
//
extern EFIGUARD_DRIVER_PROTOCOL gEfiGuardDriverProtocol;
//
// Driver configuration data
//
extern EFIGUARD_CONFIGURATION_DATA gDriverConfig;
//
// Bootmgfw.efi handle
//
extern EFI_HANDLE gBootmgfwHandle;
//
// TRUE if ExitBootServices() has been called
//
extern BOOLEAN gEfiAtRuntime;
//
// TRUE if SetVirtualAddressMap() has been called
//
extern BOOLEAN gEfiGoneVirtual;
//
// Universal template bytes for a faux call inline hook (mov [e|r]ax, <addr>, push [e|r]ax, ret)
//
extern CONST UINT8 gHookTemplate[(sizeof(VOID*) / 4) + sizeof(VOID*) + 2];
//
// [bootmgfw|bootmgr]!ImgArch[Efi]StartBootApplication hook to patch either winload.efi or bootmgr.efi
// This function was named ImgArchEfiStartBootApplication on versions <= 10.0.16299.0, later simply ImgArchStartBootApplication.
//
// Windows Vista/7 prototype
typedef
EFI_STATUS
(EFIAPI*
t_ImgArchStartBootApplication_Vista)(
IN PBL_APPLICATION_ENTRY AppEntry,
IN VOID* ImageBase,
IN UINT32 ImageSize,
OUT PBL_RETURN_ARGUMENTS ReturnArguments
);
// Windows 8+ prototype
typedef
EFI_STATUS
(EFIAPI*
t_ImgArchStartBootApplication_Eight)(
IN PBL_APPLICATION_ENTRY AppEntry,
IN VOID* ImageBase,
IN UINT32 ImageSize,
IN UINT32 BootOption,
OUT PBL_RETURN_ARGUMENTS ReturnArguments
);
extern VOID* /*t_ImgArchStartBootApplication_XX*/ gOriginalBootmgfwImgArchStartBootApplication;
extern UINT8 gBootmgfwImgArchStartBootApplicationBackup[sizeof(gHookTemplate)];
// This is only used if bootmgr.efi is invoked during the boot process
extern VOID* /*t_ImgArchStartBootApplication_XX*/ gOriginalBootmgrImgArchStartBootApplication;
extern UINT8 gBootmgrImgArchStartBootApplicationBackup[sizeof(gHookTemplate)];
//
// Patches the Windows Boot Manager: either bootmgfw.efi or bootmgr.efi; normally the former unless booting a WIM file
//
EFI_STATUS
EFIAPI
PatchBootManager(
IN INPUT_FILETYPE FileType,
IN VOID* ImageBase,
IN UINTN ImageSize
);
//
// winload!OslFwpKernelSetupPhase1 hook
//
typedef
EFI_STATUS
(EFIAPI*
t_OslFwpKernelSetupPhase1)(
IN PLOADER_PARAMETER_BLOCK LoaderBlock
);
extern t_OslFwpKernelSetupPhase1 gOriginalOslFwpKernelSetupPhase1;
extern UINT8 gOslFwpKernelSetupPhase1Backup[sizeof(gHookTemplate)];
EFI_STATUS
EFIAPI
HookedOslFwpKernelSetupPhase1(
IN PLOADER_PARAMETER_BLOCK LoaderBlock
);
//
// Patches winload.efi
//
EFI_STATUS
EFIAPI
PatchWinload(
IN VOID* ImageBase,
IN PEFI_IMAGE_NT_HEADERS NtHeaders
);
//
// Patches ImgpValidateImageHash in bootmgfw.efi, bootmgr.efi, and winload.[efi|exe]
// This patch is completely optional, unless you want to boot a custom kernel or winload image.
// It is applied if possible, but failures are ignored.
//
EFI_STATUS
EFIAPI
PatchImgpValidateImageHash(
IN INPUT_FILETYPE FileType,
IN UINT8* ImageBase,
IN PEFI_IMAGE_NT_HEADERS NtHeaders
);
//
// Patches ImgpFilterValidationFailure in bootmgfw.efi, bootmgr.efi, and winload.[efi|exe]
// This patch is completely optional, unless you want to boot a custom kernel or winload image.
// It is applied if possible, but failures are ignored.
//
EFI_STATUS
EFIAPI
PatchImgpFilterValidationFailure(
IN INPUT_FILETYPE FileType,
IN UINT8* ImageBase,
IN PEFI_IMAGE_NT_HEADERS NtHeaders
);
//
// winload!BlStatusPrint. This is not hooked, but used to print debug output to kd or WinDbg
// from the OslFwpKernelSetupPhase1 hook (in which gST->ConOut is no longer available)
//
typedef
NTSTATUS
(EFIAPI*
t_BlStatusPrint)(
IN CONST CHAR16 *Format,
...
);
extern t_BlStatusPrint gBlStatusPrint;
NTSTATUS
EFIAPI
BlStatusPrintNoop(
IN CONST CHAR16 *Format,
...
);
//
// Patches ntoskrnl.exe
//
EFI_STATUS
EFIAPI
PatchNtoskrnl(
IN VOID* ImageBase,
IN PEFI_IMAGE_NT_HEADERS NtHeaders
);
//
// The kernel patch result. This is used to hold data generated during
// HookedOslFwpKernelSetupPhase1 and PatchNtoskrnl until we can safely access
// boot services to print the output. This is done during the ExitBootServices() callback.
//
// Status holds the final patch status. If this is not EFI_SUCCESS, the buffer holds an
// error message, and the user will be prompted to reboot or continue.
// If Status is EFI_SUCCESS, the buffer holds concatenated patch information similar to what
// is printed during the patching of bootmgfw.efi/bootmgr.efi/winload.efi.
//
typedef struct _KERNEL_PATCH_INFORMATION
{
EFI_STATUS Status;
UINTN BufferSize; // In bytes, excluding null terminator. This may be 0. The maximum buffer size is simply sizeof(Buffer).
CHAR16 Buffer[8192]; // 8K ought to be enough for everyone
UINT32 BuildNumber; // Used to determine whether the loader block provided by winload.efi will be for Vista (or older) kernels
VOID* KernelBase;
} KERNEL_PATCH_INFORMATION;
extern KERNEL_PATCH_INFORMATION gKernelPatchInfo;
//
// Appends a kernel patch status info or error message to the buffer for delayed printing,
// and prints it to a boot debugger immediately if one is connected.
//
#define PRINT_KERNEL_PATCH_MSG(Fmt, ...) \
do { \
gBlStatusPrint(Fmt, ##__VA_ARGS__); \
AppendKernelPatchMessage(Fmt, ##__VA_ARGS__); \
} while (FALSE)
#ifdef __cplusplus
}
#endif
|