1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
|
#ifndef __EFIGUARD_GUID_H__
#define __EFIGUARD_GUID_H__
#include <Guid/GlobalVariable.h>
#ifdef __cplusplus
extern "C" {
#endif
//
// EfiGuard Bootkit Protocol GUID
//
#define EFI_EFIGUARD_DRIVER_PROTOCOL_GUID \
{ \
0xa2b65550, 0x8675, 0x48ac, { 0xbd, 0xe6, 0x02, 0xa5, 0x3b, 0xc2, 0x02, 0x3c } \
}
//
// Type of Driver Signature Enforcement bypass to use
//
typedef enum _EFIGUARD_DSE_BYPASS_TYPE {
//
// Do not disable DSE.
//
DSE_DISABLE_NONE = 0,
//
// Prevent DSE initialization at boot by patching SepInitializeCodeIntegrity.
// DSE will remain disabled until system reboot.
//
// Note: This can be trivially detected. If this is not a problem for you,
// this is the most convenient option.
//
DSE_DISABLE_AT_BOOT = 1,
//
// Hook the EFI SetVariable() runtime service to provide a stealth method for writing
// to any kernel address. This is therefore not a true DSE bypass but simply a backdoor.
// The most obvious use however is to set g_CiOptions/g_CiEnabled to 0 to load any driver.
//
// This is the default DSE bypass setting.
//
DSE_DISABLE_SETVARIABLE_HOOK = 2
} EFIGUARD_DSE_BYPASS_TYPE;
//
// Kernel read/write backdoor struct, used in combination with DSE bypass type DSE_DISABLE_SETVARIABLE_HOOK.
// For scalar values, use one of the Byte through Qword fields, set its size in Size, and set IsMemCopy to FALSE.
// For writes, the field that was used to supply the data will contain the original value on return.
//
// To perform a memcpy, set UserBuffer to a pointer-aligned buffer, Size to the size of the buffer, and IsMemCopy to TRUE.
// There is no SEH in UEFI for buffer probing, so it is the caller's responsibility that the address is valid and correctly aligned.
// No backup of the original buffer will be made because this would require memory allocation at runtime. If you wish to obtain
// the contents of the current data at KernelAddress, call the backdoor twice with the first call having IsReadOperation = TRUE.
//
// If IsReadOperation is TRUE, no writes to kernel memory will be performed. Instead either
// (1) one of the Byte through Qword fields (depending on size) will contain the value at KernelAddress, or
// (2) the memcpy performed will be in the opposite direction, i.e. from KernelAddress to UserBuffer.
//
#define EFIGUARD_BACKDOOR_VARIABLE_NAME L"GLM" // "MLG" // TODO: randomize?
#define EFIGUARD_BACKDOOR_VARIABLE_GUID &gEfiGlobalVariableGuid
#define EFIGUARD_BACKDOOR_VARIABLE_ATTRIBUTES (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_RUNTIME_ACCESS)
#define EFIGUARD_BACKDOOR_VARIABLE_DATASIZE sizeof(EFIGUARD_BACKDOOR_DATA)
#define EFIGUARD_BACKDOOR_COOKIE_VALUE (0xBEEFBEEF)
typedef struct _EFIGUARD_BACKDOOR_DATA {
UINTN CookieValue; // Currently must be EFIGUARD_BACKDOOR_COOKIE_VALUE
VOID* KernelAddress;
union {
struct {
UINT64 Byte : 8;
UINT64 Word : 16;
UINT64 Dword : 32;
UINT64 Spare : 8;
} s;
UINT64 Qword;
VOID* UserBuffer;
} u;
BOOLEAN IsMemCopy;
BOOLEAN IsReadOperation;
UINT32 Size;
} EFIGUARD_BACKDOOR_DATA;
//
// Main driver configuration data. This can be optionally sent to the driver using the Configure() pointer in the protocol.
//
typedef struct _EFIGUARD_CONFIGURATION_DATA {
//
// Type of Driver Signature Enforcement bypass to use.
// Default: DSE_DISABLE_SETVARIABLE_HOOK
//
EFIGUARD_DSE_BYPASS_TYPE DseBypassMethod;
//
// Whether to wait for a keypress at the end of each patch stage, regardless of success or failure.
// Recommended for debugging purposes only.
// Default: FALSE
//
BOOLEAN WaitForKeyPress;
} EFIGUARD_CONFIGURATION_DATA;
//
// Sends configuration data to the driver.
//
typedef
EFI_STATUS
(EFIAPI*
EFIGUARD_CONFIGURE)(
IN CONST EFIGUARD_CONFIGURATION_DATA* ConfigurationData
);
//
// The EfiGuard bootkit driver protocol.
//
typedef struct _EFIGUARD_DRIVER_PROTOCOL {
EFIGUARD_CONFIGURE Configure;
} EFIGUARD_DRIVER_PROTOCOL;
extern EFI_GUID gEfiGuardDriverProtocolGuid;
#ifdef __cplusplus
}
#endif
#endif
|