1 | ␉/*␊ |
2 | * Copyright (c) 2009-2010 Evan Lojewski. All rights reserved.␊ |
3 | *␊ |
4 | */␊ |
5 | ␊ |
6 | #include "libsaio.h"␊ |
7 | #include "kernel_patcher.h"␊ |
8 | #include "platform.h"␊ |
9 | #include "modules.h"␊ |
10 | extern PlatformInfo_t* Platform;␊ |
11 | ␊ |
12 | patchRoutine_t* patches = NULL;␊ |
13 | kernSymbols_t* kernelSymbols = NULL;␊ |
14 | ␊ |
15 | void kernel_patcher_ignore_cache(void* arg1, void* arg2, void* arg3, void *arg4, void* arg5, void* arg6){}␊ |
16 | ␊ |
17 | void KernelPatcher_start()␊ |
18 | {␊ |
19 | ␉register_kernel_patch(patch_cpuid_set_info_all, KERNEL_ANY, CPUID_MODEL_UNKNOWN); ␊ |
20 | ␊ |
21 | ␉register_kernel_patch(patch_commpage_stuff_routine, KERNEL_ANY, CPUID_MODEL_ANY);␊ |
22 | ␉␊ |
23 | ␉register_kernel_patch(patch_lapic_init, KERNEL_ANY, CPUID_MODEL_ANY);␊ |
24 | ␊ |
25 | ␉// NOTE: following is currently 32bit only␊ |
26 | ␉register_kernel_patch(patch_lapic_configure, KERNEL_32, CPUID_MODEL_ANY);␊ |
27 | ␊ |
28 | ␉register_kernel_symbol(KERNEL_ANY, "_panic");␊ |
29 | ␉register_kernel_symbol(KERNEL_ANY, "_cpuid_set_info");␊ |
30 | ␉register_kernel_symbol(KERNEL_ANY, "_pmCPUExitHaltToOff");␊ |
31 | ␉register_kernel_symbol(KERNEL_ANY, "_lapic_init");␊ |
32 | ␉register_kernel_symbol(KERNEL_ANY, "_commpage_stuff_routine");␊ |
33 | ␊ |
34 | ␉// lapic_configure symbols␊ |
35 | ␉register_kernel_symbol(KERNEL_ANY, "_lapic_configure");␊ |
36 | ␉register_kernel_symbol(KERNEL_ANY, "_lapic_start");␊ |
37 | ␉register_kernel_symbol(KERNEL_ANY, "_lapic_interrupt_base");␊ |
38 | ␊ |
39 | ␉// lapic_interrup symbols␊ |
40 | ␉//register_kernel_patch(patch_lapic_interrupt, KERNEL_ANY, CPUID_MODEL_ANY);␊ |
41 | ␉//register_kernel_symbol(KERNEL_ANY, "_lapic_interrupt");␊ |
42 | ␊ |
43 | ␉// TODO: register needed symbols␊ |
44 | ␊ |
45 | ␉register_hook_callback("ExecKernel", &patch_kernel); ␊ |
46 | ␉␊ |
47 | ␉replace_function("_getKernelCachePath", &kernel_patcher_ignore_cache);␊ |
48 | }␊ |
49 | ␊ |
50 | /*␊ |
51 | * Register a kerenl patch␊ |
52 | */␊ |
53 | void register_kernel_patch(void* patch, int arch, int cpus)␊ |
54 | {␊ |
55 | ␉// TODO: only insert valid patches based on current cpuid and architecture␊ |
56 | ␉// AKA, don't at 64bit patches if it's a 32bit only machine␊ |
57 | ␉patchRoutine_t* entry;␊ |
58 | ␉␊ |
59 | ␉// TODO: verify Platform->CPU.Model is populated this early in bootup␊ |
60 | ␉// Check to ensure that the patch is valid on this machine␊ |
61 | ␉// If it is not, exit early form this function␊ |
62 | ␉if(cpus != Platform->CPU.Model)␊ |
63 | ␉{␊ |
64 | ␉␉if(cpus != CPUID_MODEL_ANY)␊ |
65 | ␉␉{␊ |
66 | ␉␉␉if(cpus == CPUID_MODEL_UNKNOWN)␊ |
67 | ␉␉␉{␊ |
68 | ␉␉␉␉switch(Platform->CPU.Model)␊ |
69 | ␉␉␉␉{␊ |
70 | ␉␉␉␉␉case CPU_MODEL_PENTIUM_M:␊ |
71 | ␉␉␉␉␉case CPU_MODEL_YONAH:␊ |
72 | ␉␉␉␉␉case CPU_MODEL_MEROM:␊ |
73 | ␉␉␉␉␉case CPU_MODEL_PENRYN:␊ |
74 | ␉␉␉␉␉case CPU_MODEL_NEHALEM:␊ |
75 | ␉␉␉␉␉case CPU_MODEL_FIELDS:␊ |
76 | ␉␉␉␉␉case CPU_MODEL_DALES:␊ |
77 | ␉␉␉␉␉case CPU_MODEL_NEHALEM_EX:␊ |
78 | ␉␉␉␉␉␉// Known cpu's we don't want to add the patch␊ |
79 | ␉␉␉␉␉␉return;␊ |
80 | ␉␉␉␉␉␉break;␊ |
81 | ␊ |
82 | ␉␉␉␉␉default:␊ |
83 | ␉␉␉␉␉␉// CPU not in supported list, so we are going to add␊ |
84 | ␉␉␉␉␉␉// The patch will be applied␊ |
85 | ␉␉␉␉␉␉break;␊ |
86 | ␉␉␉␉}␊ |
87 | ␉␉␉}␊ |
88 | ␉␉␉else␊ |
89 | ␉␉␉{␊ |
90 | ␉␉␉␉// Invalid cpuid for current cpu. Ignoring patch␊ |
91 | ␉␉␉␉return;␊ |
92 | ␉␉␉}␊ |
93 | ␉␉}␊ |
94 | ␉}␊ |
95 | ␉␉␊ |
96 | ␉if(patches == NULL)␊ |
97 | ␉{␊ |
98 | ␉␉patches = entry = malloc(sizeof(patchRoutine_t));␊ |
99 | ␉}␊ |
100 | ␉else␊ |
101 | ␉{␊ |
102 | ␉␉entry = patches;␊ |
103 | ␉␉while(entry->next)␊ |
104 | ␉␉{␊ |
105 | ␉␉␉entry = entry->next;␊ |
106 | ␉␉}␊ |
107 | ␉␉␊ |
108 | ␉␉entry->next = malloc(sizeof(patchRoutine_t));␊ |
109 | ␉␉entry = entry->next;␊ |
110 | ␉}␊ |
111 | ␉␊ |
112 | ␉entry->next = NULL;␊ |
113 | ␉entry->patchRoutine = patch;␊ |
114 | ␉entry->validArchs = arch;␊ |
115 | ␉entry->validCpu = cpus;␊ |
116 | }␊ |
117 | ␊ |
118 | void register_kernel_symbol(int kernelType, const char* name)␊ |
119 | {␊ |
120 | ␉if(kernelSymbols == NULL)␊ |
121 | ␉{␊ |
122 | ␉␉kernelSymbols = malloc(sizeof(kernSymbols_t));␊ |
123 | ␉␉kernelSymbols->next = NULL;␊ |
124 | ␉␉kernelSymbols->symbol = (char*)name;␊ |
125 | ␉␉kernelSymbols->addr = 0;␊ |
126 | ␉}␊ |
127 | ␉else␊ |
128 | ␉{␊ |
129 | ␉␉kernSymbols_t *symbol = kernelSymbols;␊ |
130 | ␉␉while(symbol->next != NULL)␊ |
131 | ␉␉{␊ |
132 | ␉␉␉symbol = symbol->next;␊ |
133 | ␉␉}␊ |
134 | ␉␉␊ |
135 | ␉␉symbol->next = malloc(sizeof(kernSymbols_t));␊ |
136 | ␉␉symbol = symbol->next;␊ |
137 | ␊ |
138 | ␉␉symbol->next = NULL;␊ |
139 | ␉␉symbol->symbol = (char*)name;␊ |
140 | ␉␉symbol->addr = 0;␊ |
141 | ␉}␊ |
142 | }␊ |
143 | ␊ |
144 | kernSymbols_t* lookup_kernel_symbol(const char* name)␊ |
145 | {␊ |
146 | ␉kernSymbols_t *symbol = kernelSymbols;␊ |
147 | ␊ |
148 | ␉while(symbol && strcmp(symbol->symbol, name) !=0)␊ |
149 | ␉{␊ |
150 | ␉␉symbol = symbol->next;␊ |
151 | ␉}␊ |
152 | ␉␊ |
153 | ␉if(!symbol)␊ |
154 | ␉{␊ |
155 | ␉␉return NULL;␊ |
156 | ␉}␊ |
157 | ␉else␊ |
158 | ␉{␊ |
159 | ␉␉return symbol;␊ |
160 | ␉}␊ |
161 | }␊ |
162 | ␊ |
163 | void patch_kernel(void* kernelData, void* arg2, void* arg3, void *arg4)␊ |
164 | {␊ |
165 | ␉patchRoutine_t* entry = patches;␊ |
166 | ␊ |
167 | ␉int arch = determineKernelArchitecture(kernelData);␊ |
168 | ␊ |
169 | ␉locate_symbols(kernelData);␊ |
170 | ␉␊ |
171 | ␉if(patches != NULL)␊ |
172 | ␉{␊ |
173 | ␉␉while(entry)␊ |
174 | ␉␉{␊ |
175 | ␉␉␉if(entry->validArchs == KERNEL_ANY || arch == entry->validArchs)␊ |
176 | ␉␉␉{␊ |
177 | ␉␉␉␉if(entry->patchRoutine) entry->patchRoutine(kernelData);␊ |
178 | ␉␉␉}␊ |
179 | ␉␉␉entry = entry->next;␊ |
180 | ␉␉}␊ |
181 | ␉}␊ |
182 | }␊ |
183 | ␊ |
184 | int determineKernelArchitecture(void* kernelData)␊ |
185 | {␉␊ |
186 | ␉if(((struct mach_header*)kernelData)->magic == MH_MAGIC)␊ |
187 | ␉{␊ |
188 | ␉␉return KERNEL_32;␊ |
189 | ␉}␊ |
190 | ␊ |
191 | ␉if(((struct mach_header*)kernelData)->magic == MH_MAGIC_64)␊ |
192 | ␉{␊ |
193 | ␉␉return KERNEL_64;␊ |
194 | ␉}␊ |
195 | ␉else␊ |
196 | ␉{␊ |
197 | ␉␉return KERNEL_ERR;␊ |
198 | ␉}␊ |
199 | }␊ |
200 | ␊ |
201 | /**␊ |
202 | **␉␉This functions located the requested symbols in the mach-o file.␊ |
203 | **␉␉␉as well as determines the start of the __TEXT segment and __TEXT,__text sections␊ |
204 | **/␊ |
205 | int locate_symbols(void* kernelData)␊ |
206 | {␊ |
207 | ␉char is64 = 1;␊ |
208 | ␉parse_mach(kernelData, NULL, symbol_handler, NULL);␊ |
209 | ␉//handle_symtable((UInt32)kernelData, symtableData, &symbol_handler, determineKernelArchitecture(kernelData) == KERNEL_64);␊ |
210 | ␉return 1ull << is64;␊ |
211 | }␊ |
212 | ␊ |
213 | long long symbol_handler(char* symbolName, long long addr, char is64)␊ |
214 | {␊ |
215 | ␉// Locate the symbol in the list, if it exists, update it's address␊ |
216 | ␉kernSymbols_t *symbol = lookup_kernel_symbol(symbolName);␊ |
217 | ␉␊ |
218 | ␉if(symbol)␊ |
219 | ␉{␊ |
220 | ␉␉symbol->addr = addr;␊ |
221 | ␉}␊ |
222 | ␉␊ |
223 | ␉return 0xFFFFFFFF; // fixme␊ |
224 | }␊ |
225 | ␊ |
226 | /**␊ |
227 | ** Locate the fisrt instance of _panic inside of _cpuid_set_info, and either remove it␊ |
228 | ** Or replace it so that the cpuid is set to a valid value.␊ |
229 | **/␊ |
230 | void patch_cpuid_set_info_all(void* kernelData)␊ |
231 | {␊ |
232 | ␉switch(Platform->CPU.Model)␊ |
233 | ␉{␊ |
234 | ␉␉case CPU_MODEL_ATOM:␊ |
235 | ␉␉␉if(determineKernelArchitecture(kernelData) == KERNEL_32)␊ |
236 | ␉␉␉{␊ |
237 | ␉␉␉␉patch_cpuid_set_info_32(kernelData, CPUFAMILY_INTEL_PENRYN, CPU_MODEL_PENRYN);␊ |
238 | ␉␉␉}␊ |
239 | ␉␉␉else ␊ |
240 | ␉␉␉{␊ |
241 | ␉␉␉␉patch_cpuid_set_info_64(kernelData, CPUFAMILY_INTEL_PENRYN, CPU_MODEL_PENRYN);␊ |
242 | ␉␉␉}␊ |
243 | ␊ |
244 | ␉␉␉break;␊ |
245 | ␊ |
246 | ␉␉default:␊ |
247 | ␉␉{␊ |
248 | ␉␉␉// AnV: Extra cpuid fix for spoofing Nehalem CPU for i5/i9␊ |
249 | ␉␉␉switch(Platform->CPU.Family)␊ |
250 | ␉␉␉{␊ |
251 | ␉␉␉␉case CPU_MODEL_FIELDS: /* Intel i5 */␊ |
252 | ␉␉␉␉case CPU_MODEL_WESTMERE: /* Intel i9 */␊ |
253 | ␉␉␉␉␉if(determineKernelArchitecture(kernelData) == KERNEL_32)␊ |
254 | ␉␉␉␉␉{␊ |
255 | ␉␉␉␉␉␉patch_cpuid_set_info_32(kernelData, CPUFAMILY_INTEL_NEHALEM, CPU_MODEL_NEHALEM);␊ |
256 | ␉␉␉␉␉}␊ |
257 | ␉␉␉␉␉else ␊ |
258 | ␉␉␉␉␉{␊ |
259 | ␉␉␉␉␉␉patch_cpuid_set_info_64(kernelData, CPUFAMILY_INTEL_NEHALEM, CPU_MODEL_NEHALEM);␊ |
260 | ␉␉␉␉␉}␊ |
261 | ␉␉␉␉␉␊ |
262 | ␉␉␉␉␉break;␊ |
263 | ␉␉␉␉␊ |
264 | ␉␉␉␉default:␊ |
265 | ␉␉␉␉␉if(determineKernelArchitecture(kernelData) == KERNEL_32)␊ |
266 | ␉␉␉␉␉{␊ |
267 | ␉␉␉␉␉␉patch_cpuid_set_info_32(kernelData, 0, 0);␊ |
268 | ␉␉␉␉␉}␊ |
269 | ␉␉␉␉␉else␊ |
270 | ␉␉␉␉␉{␊ |
271 | ␉␉␉␉␉␉patch_cpuid_set_info_64(kernelData, 0, 0);␊ |
272 | ␉␉␉␉␉}␉␉␉␉␉␊ |
273 | ␉␉␉␉␉break;␊ |
274 | ␉␉␉}␊ |
275 | ␉␉␉break;␉␉␉␊ |
276 | ␉␉}␊ |
277 | ␉}␊ |
278 | }␊ |
279 | ␊ |
280 | void patch_cpuid_set_info_64(void* kernelData, UInt32 impersonateFamily, UInt8 impersonateModel)␊ |
281 | {␊ |
282 | ␉UInt8* bytes = (UInt8*)kernelData;␊ |
283 | ␉␊ |
284 | ␉kernSymbols_t *symbol = lookup_kernel_symbol("_cpuid_set_info");␊ |
285 | ␉␊ |
286 | ␉UInt32 patchLocation = symbol ? symbol->addr - textAddress + textSection: 0; //␉(kernelSymbolAddresses[SYMBOL_CPUID_SET_INFO] - textAddress + textSection);␊ |
287 | ␉patchLocation -= (UInt32)kernelData;␉// Remove offset␊ |
288 | ␊ |
289 | ␉//UInt32 jumpLocation = 0;␊ |
290 | ␊ |
291 | ␉if(symbol == 0 || symbol->addr == 0)␊ |
292 | ␉{␊ |
293 | ␉␉verbose("Unable to locate _cpuid_set_info\n");␊ |
294 | ␉␉return;␊ |
295 | ␉}␊ |
296 | ␉␊ |
297 | ␉symbol = lookup_kernel_symbol("_panic");␊ |
298 | ␉UInt32 panicAddr = symbol ? symbol->addr - textAddress: 0; //kernelSymbolAddresses[SYMBOL_PANIC] - textAddress;␊ |
299 | ␉if(symbol == 0 || symbol->addr == 0)␊ |
300 | ␉{␊ |
301 | ␉␉printf("Unable to locate _panic\n");␊ |
302 | ␉␉return;␊ |
303 | ␉}␊ |
304 | ␉panicAddr -= (UInt32)kernelData;␊ |
305 | ␊ |
306 | ␉//TODO: don't assume it'll always work (Look for *next* function address in symtab and fail once it's been reached)␊ |
307 | ␉while( ␊ |
308 | ␉␉ (bytes[patchLocation -1] != 0xE8) ||␊ |
309 | ␉␉ ( ( (UInt32)(panicAddr - patchLocation - 4) + textSection ) != (UInt32)((bytes[patchLocation + 0] << 0 | ␊ |
310 | ␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉bytes[patchLocation + 1] << 8 | ␊ |
311 | ␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉bytes[patchLocation + 2] << 16 |␊ |
312 | ␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉bytes[patchLocation + 3] << 24)))␊ |
313 | ␉␉ )␊ |
314 | ␉{␊ |
315 | ␉␉patchLocation++;␊ |
316 | ␉}␊ |
317 | ␉patchLocation--;␊ |
318 | ␊ |
319 | ␉// Remove panic just in ca se␊ |
320 | ␉// The panic instruction is exactly 5 bytes long.␊ |
321 | ␉bytes[patchLocation + 0] = 0x90;␊ |
322 | ␉bytes[patchLocation + 1] = 0x90;␊ |
323 | ␉bytes[patchLocation + 2] = 0x90;␊ |
324 | ␉bytes[patchLocation + 3] = 0x90;␊ |
325 | ␉bytes[patchLocation + 4] = 0x90;␊ |
326 | ␊ |
327 | ␉// Check for a 10.2.0+ kernel␊ |
328 | ␉if(bytes[patchLocation - 19] == 0xC7 && bytes[patchLocation - 18] == 0x05)␊ |
329 | ␉{␊ |
330 | ␉␉UInt32 cpuid_cpufamily_addr =␉bytes[patchLocation - 17] << 0 |␊ |
331 | ␉␉␉␉␉␉␉␉␉␉bytes[patchLocation - 16] << 8 |␊ |
332 | ␉␉␉␉␉␉␉␉␉␉bytes[patchLocation - 15] << 16 |␊ |
333 | ␉␉␉␉␉␉␉␉␉␉bytes[patchLocation - 14] << 24;␊ |
334 | ␉␉␊ |
335 | ␉␉// NOTE: may change, determined based on cpuid_info struct␊ |
336 | ␉␉UInt32 cpuid_model_addr = cpuid_cpufamily_addr - 310; ␊ |
337 | ␊ |
338 | ␉␉//ffffff8000228b3b -> 0x00490e8b␊ |
339 | ␉␉//ffffff8000228c28 -> -237 -> 0x490D9E -> -310␊ |
340 | ␊ |
341 | ␉␉// The mov is 10 bytes␊ |
342 | ␉␉/*␊ |
343 | ␉␉ bytes[patchLocation - 19] = 0x90;␉// c7␊ |
344 | ␉␉ bytes[patchLocation - 18] = 0x90;␉// 05␊ |
345 | ␉␉ bytes[patchLocation - 17] = 0x90;␉// family location␊ |
346 | ␉␉ bytes[patchLocation - 16] = 0x90;␉// family location␊ |
347 | ␉␉ bytes[patchLocation - 15] = 0x90;␉// family location␊ |
348 | ␉␉ bytes[patchLocation - 14] = 0x90;␉// family location␊ |
349 | ␉␉ */␊ |
350 | ␉␉bytes[patchLocation - 13] = (impersonateFamily & 0x000000FF) >> 0;␊ |
351 | ␉␉bytes[patchLocation - 12] = (impersonateFamily & 0x0000FF00) >> 8;␊ |
352 | ␉␉bytes[patchLocation - 11] = (impersonateFamily & 0x00FF0000) >> 16;␉␊ |
353 | ␉␉bytes[patchLocation - 10] = (impersonateFamily & 0xFF000000) >> 24;␊ |
354 | ␊ |
355 | ␉␉// The lea (%rip),%rip is 7 bytes␊ |
356 | ␉␉bytes[patchLocation - 9] = 0xC7;␊ |
357 | ␉␉bytes[patchLocation - 8] = 0x05;␊ |
358 | ␉␉bytes[patchLocation - 7] = ((cpuid_model_addr -10) & 0x000000FF) >> 0;␉// NOTE: this opcode is relative in 64bit mode, subtract offset␊ |
359 | ␉␉bytes[patchLocation - 6] = ((cpuid_model_addr -10) & 0x0000FF00) >> 8;␉␊ |
360 | ␉␉bytes[patchLocation - 5] = ((cpuid_model_addr -10) & 0x00FF0000) >> 16;␊ |
361 | ␉␉bytes[patchLocation - 4] = ((cpuid_model_addr -10) & 0xFF000000) >> 24;␊ |
362 | ␉␉bytes[patchLocation - 3] = impersonateModel;␉// cpuid_model␊ |
363 | ␊ |
364 | ␉␉// The xor eax eax is 2 bytes␊ |
365 | ␉␉bytes[patchLocation - 2] = 0x01;␉// cpuid_extmodel␊ |
366 | ␉␉bytes[patchLocation - 1] = 0x00;␉// cpuid_extfamily␊ |
367 | ␉␉␊ |
368 | ␉␉// The panic instruction is exactly 5 bytes long.␊ |
369 | ␉␉bytes[patchLocation - 0] = 0x02;␉// cpuid_stepping␊ |
370 | ␉␉/*bytes[patchLocation + 1] = 0x90;␊ |
371 | ␉␉bytes[patchLocation + 2] = 0x90;␊ |
372 | ␉␉bytes[patchLocation + 3] = 0x90;␊ |
373 | ␉␉bytes[patchLocation + 4] = 0x90;␊ |
374 | ␉␉*/␊ |
375 | ␉␉␊ |
376 | ␉␉// Panic call has been removed.␊ |
377 | ␉␉// Override the CPUID now. This requires ~ 10 bytes on 10.0.0 kernels␊ |
378 | ␉␉// On 10.2.0+ kernels, this requires ~16 bytes␊ |
379 | ␉␉␊ |
380 | ␉␉// Total: 24 bytes␊ |
381 | ␉␉verbose("Running on a 10.2.0+ kernel\n");␊ |
382 | //␉␉getchar();␊ |
383 | ␉}␊ |
384 | ␉else {␊ |
385 | ␉␉printf("Running on a 10.0.0 kernel, patch unsupported\n");␊ |
386 | ␉␉pause();␊ |
387 | ␉}␊ |
388 | }␊ |
389 | ␊ |
390 | void patch_cpuid_set_info_32(void* kernelData, UInt32 impersonateFamily, UInt8 impersonateModel)␊ |
391 | {␉␊ |
392 | ␉UInt8* bytes = (UInt8*)kernelData;␊ |
393 | ␉␊ |
394 | ␉kernSymbols_t *symbol = lookup_kernel_symbol("_cpuid_set_info");␊ |
395 | ␊ |
396 | ␉UInt32 patchLocation = symbol ? symbol->addr - textAddress + textSection: 0; //␉(kernelSymbolAddresses[SYMBOL_CPUID_SET_INFO] - textAddress + textSection);␊ |
397 | ␉patchLocation -= (UInt32)kernelData;␉// Remove offset␊ |
398 | ␊ |
399 | ␉UInt32 jumpLocation = 0;␉␊ |
400 | ␊ |
401 | ␉if(symbol == 0 || symbol->addr == 0)␊ |
402 | ␉{␊ |
403 | ␉␉verbose("Unable to locate _cpuid_set_info\n");␊ |
404 | ␉␉return;␊ |
405 | ␉}␊ |
406 | ␊ |
407 | ␉symbol = lookup_kernel_symbol("_panic");␊ |
408 | ␉UInt32 panicAddr = symbol ? symbol->addr - textAddress: 0; //kernelSymbolAddresses[SYMBOL_PANIC] - textAddress;␊ |
409 | ␉if(symbol == 0 || symbol->addr == 0)␊ |
410 | ␉{␊ |
411 | ␉␉printf("Unable to locate _panic\n");␊ |
412 | ␉␉return;␊ |
413 | ␉}␊ |
414 | ␉panicAddr -= (UInt32)kernelData;␊ |
415 | ␊ |
416 | ␉//TODO: don't assume it'll always work (Look for *next* function address in symtab and fail once it's been reached)␊ |
417 | ␉while( ␊ |
418 | ␉␉ (bytes[patchLocation -1] != 0xE8) ||␊ |
419 | ␉␉ ( ( (UInt32)(panicAddr - patchLocation - 4) + textSection ) != (UInt32)((bytes[patchLocation + 0] << 0 | ␊ |
420 | ␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉bytes[patchLocation + 1] << 8 | ␊ |
421 | ␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉bytes[patchLocation + 2] << 16 |␊ |
422 | ␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉bytes[patchLocation + 3] << 24)))␊ |
423 | ␉␉ )␊ |
424 | ␉{␊ |
425 | ␉␉patchLocation++;␊ |
426 | ␉}␊ |
427 | ␉patchLocation--;␊ |
428 | ␉␊ |
429 | ␉// Remove panic call, just in case the following patch routines fail␊ |
430 | ␉bytes[patchLocation + 0] = 0x90;␊ |
431 | ␉bytes[patchLocation + 1] = 0x90;␊ |
432 | ␉bytes[patchLocation + 2] = 0x90;␊ |
433 | ␉bytes[patchLocation + 3] = 0x90;␊ |
434 | ␉bytes[patchLocation + 4] = 0x90;␊ |
435 | ␊ |
436 | ␉// Locate the jump call, so that 10 bytes can be reclamed.␊ |
437 | ␉// NOTE: This will *NOT* be located on pre 10.6.2 kernels␊ |
438 | ␉jumpLocation = patchLocation - 15;␊ |
439 | ␉while((bytes[jumpLocation - 1] != 0x77 ||␊ |
440 | ␉␉ bytes[jumpLocation] != (patchLocation - jumpLocation - -8)) &&␊ |
441 | ␉␉ (patchLocation - jumpLocation) < 0xF0)␊ |
442 | ␉{␊ |
443 | ␉␉jumpLocation--;␊ |
444 | ␉}␊ |
445 | ␉␊ |
446 | ␉// If found... AND we want to impersonate a specific cpumodel / family...␊ |
447 | ␉if(impersonateFamily &&␊ |
448 | ␉ impersonateModel &&␊ |
449 | ␉ ((patchLocation - jumpLocation) < 0xF0))␊ |
450 | ␉{␊ |
451 | ␉␉␊ |
452 | ␉␉bytes[jumpLocation] -= 10;␉␉// sizeof(movl␉$0x6b5a4cd2,0x00872eb4) = 10bytes␊ |
453 | ␉␉␊ |
454 | ␉␉/* ␊ |
455 | ␉␉ * Inpersonate the specified CPU FAMILY and CPU Model␊ |
456 | ␉␉ */␊ |
457 | ␉␉␊ |
458 | ␉␉// bytes[patchLocation - 17] = 0xC7;␉// already here... not needed to be done␊ |
459 | ␉␉// bytes[patchLocation - 16] = 0x05;␉// see above␊ |
460 | ␉␉UInt32 cpuid_cpufamily_addr =␉bytes[patchLocation - 15] << 0 |␊ |
461 | ␉␉bytes[patchLocation - 14] << 8 |␊ |
462 | ␉␉bytes[patchLocation - 13] << 16 |␊ |
463 | ␉␉bytes[patchLocation - 12] << 24;␊ |
464 | ␉␉␊ |
465 | ␉␉// NOTE: may change, determined based on cpuid_info struct␊ |
466 | ␉␉UInt32 cpuid_model_addr = cpuid_cpufamily_addr - 299; ␊ |
467 | ␊ |
468 | ␉␉// cpufamily␊ |
469 | ␉␉bytes[patchLocation - 11] = (impersonateFamily & 0x000000FF) >> 0;␊ |
470 | ␉␉bytes[patchLocation - 10] = (impersonateFamily & 0x0000FF00) >> 8;␊ |
471 | ␉␉bytes[patchLocation - 9] = (impersonateFamily & 0x00FF0000) >> 16;␉␊ |
472 | ␉␉bytes[patchLocation - 8] = (impersonateFamily & 0xFF000000) >> 24;␊ |
473 | ␉␉␊ |
474 | ␉␉// NOPS, just in case if the jmp call wasn't patched, we'll jump to a␊ |
475 | ␉␉// nop and continue with the rest of the patch␊ |
476 | ␉␉// Yay two free bytes :), 10 more can be reclamed if needed, as well as a few␊ |
477 | ␉␉// from the above code (only cpuid_model needs to be set.␊ |
478 | ␉␉bytes[patchLocation - 7] = 0x90;␊ |
479 | ␉␉bytes[patchLocation - 6] = 0x90;␊ |
480 | ␉␉␊ |
481 | ␉␉bytes[patchLocation - 5] = 0xC7;␊ |
482 | ␉␉bytes[patchLocation - 4] = 0x05;␊ |
483 | ␉␉bytes[patchLocation - 3] = (cpuid_model_addr & 0x000000FF) >> 0;␊ |
484 | ␉␉bytes[patchLocation - 2] = (cpuid_model_addr & 0x0000FF00) >> 8;␉␊ |
485 | ␉␉bytes[patchLocation - 1] = (cpuid_model_addr & 0x00FF0000) >> 16;␊ |
486 | ␉␉bytes[patchLocation - 0] = (cpuid_model_addr & 0xFF000000) >> 24;␊ |
487 | ␉␉␊ |
488 | ␉␉// Note: I could have just copied the 8bit cpuid_model in and saved about 4 bytes␊ |
489 | ␉␉// so if this function need a different patch it's still possible. Also, about ten bytes previous can be freed.␊ |
490 | ␉␉bytes[patchLocation + 1] = impersonateModel;␉// cpuid_model␊ |
491 | ␉␉bytes[patchLocation + 2] = 0x01;␉// cpuid_extmodel␊ |
492 | ␉␉bytes[patchLocation + 3] = 0x00;␉// cpuid_extfamily␊ |
493 | ␉␉bytes[patchLocation + 4] = 0x02;␉// cpuid_stepping␊ |
494 | ␉}␊ |
495 | ␉else if(impersonateFamily && impersonateModel)␊ |
496 | ␉{␊ |
497 | ␉␉// pre 10.6.2 kernel␊ |
498 | ␉␉// Locate the jump to directly *after* the panic call,␊ |
499 | ␉␉jumpLocation = patchLocation - 4;␊ |
500 | ␉␉while((bytes[jumpLocation - 1] != 0x77 ||␊ |
501 | ␉␉␉ bytes[jumpLocation] != (patchLocation - jumpLocation + 4)) &&␊ |
502 | ␉␉␉ (patchLocation - jumpLocation) < 0x20)␊ |
503 | ␉␉{␊ |
504 | ␉␉␉jumpLocation--;␊ |
505 | ␉␉}␊ |
506 | ␉␉// NOTE above isn't needed (I was going to use it, but I'm not, so instead,␊ |
507 | ␉␉// I'll just leave it to verify the binary stucture.␊ |
508 | ␉␉␊ |
509 | ␉␉// NOTE: the cpumodel_familt data is not set in _cpuid_set_info␊ |
510 | ␉␉// so we don't need to set it here, I'll get set later based on the model␊ |
511 | ␉␉// we set now.␊ |
512 | ␉␉␊ |
513 | ␉␉if((patchLocation - jumpLocation) < 0x20)␊ |
514 | ␉␉{␊ |
515 | ␉␉␉UInt32 cpuid_model_addr =␉(bytes[patchLocation - 14] << 0 |␊ |
516 | ␉␉␉␉␉␉␉␉␉␉ bytes[patchLocation - 13] << 8 |␊ |
517 | ␉␉␉␉␉␉␉␉␉␉ bytes[patchLocation - 12] << 16 |␊ |
518 | ␉␉␉␉␉␉␉␉␉␉ bytes[patchLocation - 11] << 24);␊ |
519 | ␉␉␉// Remove jump␊ |
520 | ␉␉␉bytes[patchLocation - 9] = 0x90;␉␉/// Was a jump if supported cpu␊ |
521 | ␉␉␉bytes[patchLocation - 8] = 0x90;␉␉// jumped past the panic call, we want to override the panic␊ |
522 | ␉␉␉␊ |
523 | ␉␉␉bytes[patchLocation - 7] = 0x90;␊ |
524 | ␉␉␉bytes[patchLocation - 6] = 0x90;␊ |
525 | ␉␉␉␊ |
526 | ␉␉␉bytes[patchLocation - 5] = 0xC7;␊ |
527 | ␉␉␉bytes[patchLocation - 4] = 0x05;␊ |
528 | ␉␉␉bytes[patchLocation - 3] = (cpuid_model_addr & 0x000000FF) >> 0;␊ |
529 | ␉␉␉bytes[patchLocation - 2] = (cpuid_model_addr & 0x0000FF00) >> 8;␉␊ |
530 | ␉␉␉bytes[patchLocation - 1] = (cpuid_model_addr & 0x00FF0000) >> 16;␊ |
531 | ␉␉␉bytes[patchLocation - 0] = (cpuid_model_addr & 0xFF000000) >> 24;␊ |
532 | ␉␉␉␊ |
533 | ␉␉␉// Note: I could have just copied the 8bit cpuid_model in and saved about 4 bytes␊ |
534 | ␉␉␉// so if this function need a different patch it's still possible. Also, about ten bytes previous can be freed.␊ |
535 | ␉␉␉bytes[patchLocation + 1] = impersonateModel;␉// cpuid_model␊ |
536 | ␉␉␉bytes[patchLocation + 2] = 0x01;␉// cpuid_extmodel␊ |
537 | ␉␉␉bytes[patchLocation + 3] = 0x00;␉// cpuid_extfamily␊ |
538 | ␉␉␉bytes[patchLocation + 4] = 0x02;␉// cpuid_stepping␊ |
539 | ␊ |
540 | ␉␉␉patchLocation = jumpLocation;␊ |
541 | ␉␉␉// We now have 14 bytes available for a patch␊ |
542 | ␉␉}␊ |
543 | ␉␉else ␊ |
544 | ␉␉{␊ |
545 | ␉␉␉// Patching failed, using NOP replacement done initialy␊ |
546 | ␉␉}␊ |
547 | ␉}␊ |
548 | ␉else ␊ |
549 | ␉{␊ |
550 | ␉␉// Either We were unable to change the jump call due to the function's sctructure␊ |
551 | ␉␉// changing, or the user did not request a patch. As such, resort to just ␊ |
552 | ␉␉// removing the panic call (using NOP replacement above). Note that the␊ |
553 | ␉␉// IntelCPUPM kext may still panic due to the cpu's Model ID not being patched␊ |
554 | ␉}␊ |
555 | }␊ |
556 | ␊ |
557 | /**␊ |
558 | ** SleepEnabler.kext replacement (for those that need it)␊ |
559 | ** Located the KERN_INVALID_ARGUMENT return and replace it with KERN_SUCCESS␊ |
560 | **/␊ |
561 | void patch_pmCPUExitHaltToOff(void* kernelData)␊ |
562 | {␊ |
563 | ␉UInt8* bytes = (UInt8*)kernelData;␊ |
564 | ␊ |
565 | ␉kernSymbols_t *symbol = lookup_kernel_symbol("_PmCpuExitHaltToOff");␊ |
566 | ␉UInt32 patchLocation = symbol ? symbol->addr - textAddress + textSection: 0;␊ |
567 | ␉␊ |
568 | ␉if(symbol == 0 || symbol->addr == 0)␊ |
569 | ␉{␊ |
570 | ␉␉printf("Unable to locate _pmCPUExitHaltToOff\n");␊ |
571 | ␉␉return;␊ |
572 | ␉}␊ |
573 | ␉␊ |
574 | ␉patchLocation -= (UInt32)kernelData;␉// Remove offset␊ |
575 | ␊ |
576 | ␉while(bytes[patchLocation - 1]␉!= 0xB8 ||␊ |
577 | ␉␉ bytes[patchLocation]␉␉!= 0x04 ||␉// KERN_INVALID_ARGUMENT (0x00000004)␊ |
578 | ␉␉ bytes[patchLocation + 1]␉!= 0x00 ||␉// KERN_INVALID_ARGUMENT␊ |
579 | ␉␉ bytes[patchLocation + 2]␉!= 0x00 ||␉// KERN_INVALID_ARGUMENT␊ |
580 | ␉␉ bytes[patchLocation + 3]␉!= 0x00)␉// KERN_INVALID_ARGUMENT␊ |
581 | ␊ |
582 | ␉{␊ |
583 | ␉␉patchLocation++;␊ |
584 | ␉}␊ |
585 | ␉bytes[patchLocation] = 0x00;␉// KERN_SUCCESS;␊ |
586 | }␊ |
587 | ␊ |
588 | void patch_lapic_init(void* kernelData)␊ |
589 | {␊ |
590 | ␉UInt8 panicIndex = 0;␊ |
591 | ␉UInt8* bytes = (UInt8*)kernelData;␊ |
592 | ␉␊ |
593 | ␉kernSymbols_t *symbol = lookup_kernel_symbol("_lapic_init");␊ |
594 | ␉UInt32 patchLocation = symbol ? symbol->addr - textAddress + textSection: 0; ␊ |
595 | ␉if(symbol == 0 || symbol->addr == 0)␊ |
596 | ␉{␊ |
597 | ␉␉printf("Unable to locate %s\n", "_lapic_init");␊ |
598 | ␉␉return;␊ |
599 | ␉}␊ |
600 | ␉␊ |
601 | ␉symbol = lookup_kernel_symbol("_panic");␊ |
602 | ␉UInt32 panicAddr = symbol ? symbol->addr - textAddress: 0; ␊ |
603 | ␉if(symbol == 0 || symbol->addr == 0)␊ |
604 | ␉{␊ |
605 | ␉␉printf("Unable to locate %s\n", "_panic");␊ |
606 | ␉␉return;␊ |
607 | ␉}␊ |
608 | ␉␊ |
609 | ␉patchLocation -= (UInt32)kernelData;␉// Remove offset␊ |
610 | ␉panicAddr -= (UInt32)kernelData;␉// Remove offset␊ |
611 | ␊ |
612 | ␉// Locate the (panicIndex + 1) panic call␊ |
613 | ␉while(panicIndex < 3)␉// Find the third panic call␊ |
614 | ␉{␊ |
615 | ␉␉while( ␊ |
616 | ␉␉␉ (bytes[patchLocation -1] != 0xE8) ||␊ |
617 | ␉␉␉ ( ( (UInt32)(panicAddr - patchLocation - 4) + textSection ) != (UInt32)((bytes[patchLocation + 0] << 0 | ␊ |
618 | ␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉bytes[patchLocation + 1] << 8 | ␊ |
619 | ␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉bytes[patchLocation + 2] << 16 |␊ |
620 | ␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉bytes[patchLocation + 3] << 24)))␊ |
621 | ␉␉␉ )␊ |
622 | ␉␉{␊ |
623 | ␉␉␉patchLocation++;␊ |
624 | ␉␉}␊ |
625 | ␉␉patchLocation++;␊ |
626 | ␉␉panicIndex++;␊ |
627 | ␉}␊ |
628 | ␉patchLocation--;␉// Remove extra increment from the < 3 while loop␊ |
629 | ␉␊ |
630 | ␉bytes[--patchLocation] = 0x90;␉␊ |
631 | ␉bytes[++patchLocation] = 0x90;␊ |
632 | ␉bytes[++patchLocation] = 0x90;␊ |
633 | ␉bytes[++patchLocation] = 0x90;␊ |
634 | ␉bytes[++patchLocation] = 0x90;␊ |
635 | }␊ |
636 | ␊ |
637 | void patch_commpage_stuff_routine(void* kernelData)␊ |
638 | {␊ |
639 | ␉UInt8* bytes = (UInt8*)kernelData;␊ |
640 | ␊ |
641 | ␉kernSymbols_t *symbol = lookup_kernel_symbol("_commpage_stuff_routine");␊ |
642 | ␉if(symbol == 0 || symbol->addr == 0)␊ |
643 | ␉{␊ |
644 | ␉␉//printf("Unable to locate %s\n", "_commpage_stuff_routine");␊ |
645 | ␉␉return;␊ |
646 | ␉␉␊ |
647 | ␉}␊ |
648 | ␉␊ |
649 | ␉UInt32 patchLocation = symbol->addr - textAddress + textSection; ␊ |
650 | ␊ |
651 | ␉symbol = lookup_kernel_symbol("_panic");␊ |
652 | ␉if(symbol == 0 || symbol->addr == 0)␊ |
653 | ␉{␊ |
654 | ␉␉printf("Unable to locate %s\n", "_panic");␊ |
655 | ␉␉return;␊ |
656 | ␉}␊ |
657 | ␉UInt32 panicAddr = symbol->addr - textAddress; ␊ |
658 | ␊ |
659 | ␉patchLocation -= (UInt32)kernelData;␊ |
660 | ␉panicAddr -= (UInt32)kernelData;␊ |
661 | ␉␊ |
662 | ␉while( ␊ |
663 | ␉␉ (bytes[patchLocation -1] != 0xE8) ||␊ |
664 | ␉␉ ( ( (UInt32)(panicAddr - patchLocation - 4) + textSection ) != (UInt32)((bytes[patchLocation + 0] << 0 | ␊ |
665 | ␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉bytes[patchLocation + 1] << 8 | ␊ |
666 | ␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉bytes[patchLocation + 2] << 16 |␊ |
667 | ␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉bytes[patchLocation + 3] << 24)))␊ |
668 | ␉␉ )␊ |
669 | ␉{␊ |
670 | ␉␉patchLocation++;␊ |
671 | ␉}␊ |
672 | ␉patchLocation--;␊ |
673 | ␉␊ |
674 | ␉// Replace panic with nops␊ |
675 | ␉bytes[patchLocation + 0] = 0x90;␊ |
676 | ␉bytes[patchLocation + 1] = 0x90;␊ |
677 | ␉bytes[patchLocation + 2] = 0x90;␊ |
678 | ␉bytes[patchLocation + 3] = 0x90;␊ |
679 | ␉bytes[patchLocation + 4] = 0x90;␊ |
680 | }␊ |
681 | ␊ |
682 | void patch_lapic_interrupt(void* kernelData)␊ |
683 | {␊ |
684 | ␉// NOTE: this is a hack untill I finish patch_lapic_configure␊ |
685 | ␉UInt8* bytes = (UInt8*)kernelData;␊ |
686 | ␊ |
687 | ␉kernSymbols_t *symbol = lookup_kernel_symbol("_lapic_interrupt");␊ |
688 | ␉if(symbol == 0 || symbol->addr == 0)␊ |
689 | ␉{␊ |
690 | ␉␉printf("Unable to locate %s\n", "_lapic_interrupt");␊ |
691 | ␉␉return;␊ |
692 | ␉}␊ |
693 | ␊ |
694 | ␉UInt32 patchLocation = symbol->addr - textAddress + textSection; ␊ |
695 | ␊ |
696 | ␉symbol = lookup_kernel_symbol("_panic");␊ |
697 | ␉if(symbol == 0 || symbol->addr == 0)␊ |
698 | ␉{␊ |
699 | ␉␉printf("Unable to locate %s\n", "_panic");␊ |
700 | ␉␉return;␊ |
701 | ␉}␊ |
702 | ␉UInt32 panicAddr = symbol->addr - textAddress; ␊ |
703 | ␉␊ |
704 | ␉patchLocation -= (UInt32)kernelData;␊ |
705 | ␉panicAddr -= (UInt32)kernelData;␊ |
706 | ␉␊ |
707 | ␉while( ␊ |
708 | ␉␉ (bytes[patchLocation -1] != 0xE8) ||␊ |
709 | ␉␉ ( ( (UInt32)(panicAddr - patchLocation - 4) + textSection ) != (UInt32)((bytes[patchLocation + 0] << 0 | ␊ |
710 | ␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉bytes[patchLocation + 1] << 8 | ␊ |
711 | ␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉bytes[patchLocation + 2] << 16 |␊ |
712 | ␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉␉bytes[patchLocation + 3] << 24)))␊ |
713 | ␉␉ )␊ |
714 | ␉{␊ |
715 | ␉␉patchLocation++;␊ |
716 | ␉}␊ |
717 | ␉patchLocation--;␊ |
718 | ␉␊ |
719 | ␉// Replace panic with nops␊ |
720 | ␉bytes[patchLocation + 0] = 0x90;␊ |
721 | ␉bytes[patchLocation + 1] = 0x90;␊ |
722 | ␉bytes[patchLocation + 2] = 0x90;␊ |
723 | ␉bytes[patchLocation + 3] = 0x90;␊ |
724 | ␉bytes[patchLocation + 4] = 0x90;␊ |
725 | }␊ |
726 | ␊ |
727 | void patch_lapic_configure(void* kernelData)␊ |
728 | {␊ |
729 | ␉UInt8* bytes = (UInt8*)kernelData;␊ |
730 | ␉␊ |
731 | ␉UInt32 patchLocation;␊ |
732 | ␉UInt32 lapicStart;␊ |
733 | ␉UInt32 lapicInterruptBase;␊ |
734 | ␉␊ |
735 | ␉kernSymbols_t *symbol = lookup_kernel_symbol("_lapic_configure");␊ |
736 | ␉if(symbol == 0 || symbol->addr == 0)␊ |
737 | ␉{␊ |
738 | ␉␉printf("Unable to locate %s\n", "_lapic_configure");␊ |
739 | ␉␉return;␊ |
740 | ␉}␊ |
741 | ␉patchLocation = symbol->addr - textAddress + textSection; ␊ |
742 | ␉␊ |
743 | ␉symbol = lookup_kernel_symbol("_lapic_start");␊ |
744 | ␉if(symbol == 0 || symbol->addr == 0)␊ |
745 | ␉{␊ |
746 | ␉␉printf("Unable to locate %s\n", "_lapic_start");␊ |
747 | ␉␉return;␊ |
748 | ␉}␊ |
749 | ␉lapicStart = symbol->addr; ␊ |
750 | ␊ |
751 | ␉symbol = lookup_kernel_symbol("_lapic_interrupt_base");␊ |
752 | ␉if(symbol == 0 || symbol->addr == 0)␊ |
753 | ␉{␊ |
754 | ␉␉printf("Unable to locate %s\n", "_lapic_interrupt_base");␊ |
755 | ␉␉return;␊ |
756 | ␉}␊ |
757 | ␉lapicInterruptBase = symbol->addr;␊ |
758 | ␉patchLocation -= (UInt32)kernelData;␊ |
759 | ␉lapicStart -= (UInt32)kernelData;␊ |
760 | ␉lapicInterruptBase -= (UInt32)kernelData;␊ |
761 | ␉␊ |
762 | ␉// Looking for the following:␊ |
763 | ␉//movl _lapic_start,%e_x␊ |
764 | ␉//addl $0x00000320,%e_x␊ |
765 | ␉// 8b 15 __ __ __ __ 81 c2 20 03 00 00␊ |
766 | ␉while( ␊ |
767 | ␉␉ (bytes[patchLocation - 2] != 0x8b) ||␊ |
768 | ␉␉ //bytes[patchLocation -1] != 0x15) ||␉// Register, we don't care what it is␊ |
769 | ␉␉ ( lapicStart != (UInt32)(␊ |
770 | ␉␉␉␉␉␉␉␉␉(bytes[patchLocation + 0] << 0 | ␊ |
771 | ␉␉␉␉␉␉␉␉␉ bytes[patchLocation + 1] << 8 | ␊ |
772 | ␉␉␉␉␉␉␉␉␉ bytes[patchLocation + 2] << 16 |␊ |
773 | ␉␉␉␉␉␉␉␉␉ bytes[patchLocation + 3] << 24␊ |
774 | ␉␉␉␉␉␉␉␉␉)␊ |
775 | ␉␉␉␉␉␉␉␉ )␊ |
776 | ␉␉ ) || ␊ |
777 | ␉␉ (bytes[patchLocation + 4 ] != 0x81) ||␊ |
778 | ␉␉ //(bytes[patchLocation + 5 ] != 0Cx2) ||␉// register␊ |
779 | ␉␉ (bytes[patchLocation + 6 ] != 0x20) ||␊ |
780 | ␉␉ (bytes[patchLocation + 7 ] != 0x03) ||␊ |
781 | ␉␉ (bytes[patchLocation + 8 ] != 0x00) ||␊ |
782 | ␉␉ (bytes[patchLocation + 9] != 0x00)␊ |
783 | ␊ |
784 | ␉␉ )␊ |
785 | ␉{␊ |
786 | ␉␉patchLocation++;␊ |
787 | ␉}␊ |
788 | ␉patchLocation-=2;␊ |
789 | ␊ |
790 | ␉// NOTE: this is currently hardcoded, change it to be more resilient to changes␊ |
791 | ␉// At a minimum, I should have this do a cheksup first and if not matching, remove the panic instead.␊ |
792 | ␉␊ |
793 | ␉// 8b 15 __ __ __ __ -> movl␉␉ _lapic_start,%edx (NOTE: this should already be here)␊ |
794 | ␉/*␊ |
795 | ␉bytes[patchLocation++] = 0x8B;␊ |
796 | ␉bytes[patchLocation++] = 0x15;␊ |
797 | ␉bytes[patchLocation++] = (lapicStart & 0x000000FF) >> 0;␊ |
798 | ␉bytes[patchLocation++] = (lapicStart & 0x0000FF00) >> 8;␊ |
799 | ␉bytes[patchLocation++] = (lapicStart & 0x00FF0000) >> 16;␊ |
800 | ␉bytes[patchLocation++] = (lapicStart & 0xFF000000) >> 24;␊ |
801 | ␉*/␊ |
802 | ␉patchLocation += 6;␊ |
803 | ␉␊ |
804 | ␉// 81 c2 60 03 00 00 -> addl␉␉ $0x00000320,%edx␊ |
805 | ␉/*␊ |
806 | ␉bytes[patchLocation++] = 0x81;␊ |
807 | ␉bytes[patchLocation++] = 0xC2;␊ |
808 | ␉*/␊ |
809 | ␉patchLocation += 2;␊ |
810 | ␉bytes[patchLocation++] = 0x60;␊ |
811 | ␉/*␊ |
812 | ␉bytes[patchLocation++];// = 0x03;␊ |
813 | ␉bytes[patchLocation++];// = 0x00;␊ |
814 | ␉bytes[patchLocation++];// = 0x00;␊ |
815 | ␉*/␊ |
816 | ␉patchLocation += 3;␊ |
817 | ␊ |
818 | ␉// c7 02 00 04 00 00 -> movl␉␉ $0x00000400,(%edx)␊ |
819 | ␉bytes[patchLocation++] = 0xC7;␊ |
820 | ␉bytes[patchLocation++] = 0x02;␊ |
821 | ␉bytes[patchLocation++] = 0x00;␊ |
822 | ␉bytes[patchLocation++] = 0x04;␊ |
823 | ␉bytes[patchLocation++] = 0x00;␊ |
824 | ␉bytes[patchLocation++] = 0x00;␊ |
825 | ␉␊ |
826 | ␉// 83 ea 40 -> subl␉␉ $0x40,edx␊ |
827 | ␉bytes[patchLocation++] = 0x83;␊ |
828 | ␉bytes[patchLocation++] = 0xEA;␊ |
829 | ␉bytes[patchLocation++] = 0x40;␊ |
830 | ␊ |
831 | ␉// a1 __ __ __ __ -> movl␉␉ _lapic_interrupt_base,%eax␊ |
832 | ␉bytes[patchLocation++] = 0xA1;␊ |
833 | ␉bytes[patchLocation++] = (lapicInterruptBase & 0x000000FF) >> 0;␊ |
834 | ␉bytes[patchLocation++] = (lapicInterruptBase & 0x0000FF00) >> 8;␊ |
835 | ␉bytes[patchLocation++] = (lapicInterruptBase & 0x00FF0000) >> 16;␊ |
836 | ␉bytes[patchLocation++] = (lapicInterruptBase & 0xFF000000) >> 24;␊ |
837 | ␊ |
838 | ␉// 83 c0 0e -> addl␉␉ $0x0e,%eax␊ |
839 | ␉bytes[patchLocation++] = 0x83;␊ |
840 | ␉bytes[patchLocation++] = 0xC0;␊ |
841 | ␉bytes[patchLocation++] = 0x0E;␊ |
842 | ␊ |
843 | ␉// 89 02 -> movl␉␉ %eax,(%edx)␊ |
844 | ␉bytes[patchLocation++] = 0x89;␊ |
845 | ␉bytes[patchLocation++] = 0x02;␊ |
846 | ␉␊ |
847 | ␉// 81c230030000␉␉ addl␉␉ $0x00000330,%edx␊ |
848 | ␉bytes[patchLocation++] = 0x81;␊ |
849 | ␉bytes[patchLocation++] = 0xC2;␊ |
850 | ␉bytes[patchLocation++] = 0x30;␊ |
851 | ␉bytes[patchLocation++] = 0x03;␊ |
852 | ␉bytes[patchLocation++] = 0x00;␊ |
853 | ␉bytes[patchLocation++] = 0x00;␊ |
854 | ␉␊ |
855 | ␉// a1 __ __ __ __ -> movl␉␉ _lapic_interrupt_base,%eax␊ |
856 | ␉bytes[patchLocation++] = 0xA1;␊ |
857 | ␉bytes[patchLocation++] = (lapicInterruptBase & 0x000000FF) >> 0;␊ |
858 | ␉bytes[patchLocation++] = (lapicInterruptBase & 0x0000FF00) >> 8;␊ |
859 | ␉bytes[patchLocation++] = (lapicInterruptBase & 0x00FF0000) >> 16;␊ |
860 | ␉bytes[patchLocation++] = (lapicInterruptBase & 0xFF000000) >> 24;␊ |
861 | ␉␊ |
862 | ␉// 83 c0 0f -> addl␉␉ $0x0f,%eax␊ |
863 | ␉bytes[patchLocation++] = 0x83;␊ |
864 | ␉bytes[patchLocation++] = 0xC0;␊ |
865 | ␉bytes[patchLocation++] = 0x0F;␊ |
866 | ␉␊ |
867 | ␉// 89 02 -> movl␉␉ %eax,(%edx)␊ |
868 | ␉bytes[patchLocation++] = 0x89;␊ |
869 | ␉bytes[patchLocation++] = 0x02;␊ |
870 | ␉␊ |
871 | ␉// 83 ea 10 -> subl␉␉ $0x10,edx␊ |
872 | ␉bytes[patchLocation++] = 0x83;␊ |
873 | ␉bytes[patchLocation++] = 0xEA;␊ |
874 | ␉bytes[patchLocation++] = 0x10;␊ |
875 | ␊ |
876 | ␉// a1 __ __ __ __ -> movl␉␉ _lapic_interrupt_base,%eax␊ |
877 | ␉bytes[patchLocation++] = 0xA1;␊ |
878 | ␉bytes[patchLocation++] = (lapicInterruptBase & 0x000000FF) >> 0;␊ |
879 | ␉bytes[patchLocation++] = (lapicInterruptBase & 0x0000FF00) >> 8;␊ |
880 | ␉bytes[patchLocation++] = (lapicInterruptBase & 0x00FF0000) >> 16;␊ |
881 | ␉bytes[patchLocation++] = (lapicInterruptBase & 0xFF000000) >> 24;␊ |
882 | ␉␊ |
883 | ␉// 83 c0 0c -> addl␉␉ $0x0c,%eax␊ |
884 | ␉bytes[patchLocation++] = 0x83;␊ |
885 | ␉bytes[patchLocation++] = 0xC0;␊ |
886 | ␉bytes[patchLocation++] = 0x0C;␊ |
887 | ␊ |
888 | ␉// 89 02 -> movl␉␉ %eax,(%edx)␊ |
889 | ␉bytes[patchLocation++] = 0x89;␊ |
890 | ␉bytes[patchLocation++] = 0x02;␊ |
891 | ␊ |
892 | ␉// Replace remaining with nops␊ |
893 | ␊ |
894 | ␉bytes[patchLocation++] = 0x90;␊ |
895 | ␉bytes[patchLocation++] = 0x90;␊ |
896 | ␉bytes[patchLocation++] = 0x90;␊ |
897 | ␉bytes[patchLocation++] = 0x90;␊ |
898 | ␉//␉bytes[patchLocation++] = 0x90; // double check the lenght of the patch...␊ |
899 | ␉//␉bytes[patchLocation++] = 0x90;␊ |
900 | }␊ |
901 | |