CloverBootloader/rEFIt_UEFI/Platform/kernel_patcher.h
SergeySlice 355e99d6bf new way kext allowing patch
Signed-off-by: SergeySlice <sergey.slice@gmail.com>
2020-05-02 06:38:38 +03:00

197 lines
7.4 KiB
C++

/*
* Copyright (c) 2009-2010 Frank peng. All rights reserved.
*
*/
#ifndef __LIBSAIO_KERNEL_PATCHER_H
#define __LIBSAIO_KERNEL_PATCHER_H
#include "boot.h"
#define DBG_RT( ...) if ((KernelAndKextPatches != NULL) && KernelAndKextPatches->KPDebug) { printf(__VA_ARGS__); }
#define CPUFAMILY_INTEL_6_13 0xaa33392b
#define CPUFAMILY_INTEL_YONAH 0x73d67300
#define CPUFAMILY_INTEL_MEROM 0x426f69ef
#define CPUFAMILY_INTEL_PENRYN 0x78ea4fbc
#define CPUFAMILY_INTEL_NEHALEM 0x6b5a4cd2
#define CPUFAMILY_INTEL_WESTMERE 0x573b5eec
#define CPUIDFAMILY_DEFAULT 6
#define MACH_GET_MAGIC(hdr) (((struct mach_header_64*)(hdr))->magic)
#define MACH_GET_NCMDS(hdr) (((struct mach_header_64*)(hdr))->ncmds)
#define MACH_GET_CPU(hdr) (((struct mach_header_64*)(hdr))->cputype)
#define MACH_GET_FLAGS(hdr) (((struct mach_header_64*)(hdr))->flags)
#define SC_GET_CMD(hdr) (((struct segment_command_64*)(hdr))->cmd)
const char kPrelinkTextSegment[] = "__PRELINK_TEXT";
const char kPrelinkTextSection[] = "__text";
const char kPrelinkLinkStateSegment[] = "__PRELINK_STATE";
const char kPrelinkKernelLinkStateSection[] = "__kernel";
const char kPrelinkKextsLinkStateSection[] = "__kexts";
const char kPrelinkInfoSegment[] = "__PRELINK_INFO";
const char kPrelinkInfoSection[] = "__info";
const char kLinkEditSegment[] = "__LINKEDIT";
const char kTextSegment[] = "__TEXT";
const char kDataSegment[] = "__DATA";
const char kDataConstSegment[] = "__DATA_CONST";
const char kKldSegment[] = "__KLD";
#define ID_SEG_TEXT 0x010f
#define ID_SEG_DATA 0x0f0f
#define ID_SEG_DATA_CONST 0x110f
#define ID_SEG_KLD 0x180f
#define ID_SEG_KLD2 0x1a0f
const char ctor_used[] = ".constructors_used";
const char kPrelinkBundlePathKey[] = "_PrelinkBundlePath";
const char kPrelinkExecutableRelativePathKey[] = "_PrelinkExecutableRelativePath";
const char kPrelinkExecutableLoadKey[] = "_PrelinkExecutableLoadAddr";
const char kPrelinkExecutableSourceKey[] = "_PrelinkExecutableSourceAddr";
const char kPrelinkExecutableSizeKey[] = "_PrelinkExecutableSize";
const char kPrelinkInfoDictionaryKey[] = "_PrelinkInfoDictionary";
const char kPrelinkInterfaceUUIDKey[] = "_PrelinkInterfaceUUID";
const char kPrelinkKmodInfoKey[] = "_PrelinkKmodInfo";
const char kPrelinkLinkStateKey[] = "_PrelinkLinkState";
const char kPrelinkLinkStateSizeKey[] = "_PrelinkLinkStateSize";
#define kPropCFBundleIdentifier ("CFBundleIdentifier")
#define kPropCFBundleExecutable ("CFBundleExecutable")
#define kPropOSBundleRequired ("OSBundleRequired")
#define kPropOSBundleLibraries ("OSBundleLibraries")
#define kPropIOKitPersonalities ("IOKitPersonalities")
#define kPropIONameMatch ("IONameMatch")
typedef struct _BooterKextFileInfo {
UINT32 infoDictPhysAddr;
UINT32 infoDictLength;
UINT32 executablePhysAddr;
UINT32 executableLength;
UINT32 bundlePathPhysAddr;
UINT32 bundlePathLength;
} _BooterKextFileInfo;
typedef struct _DeviceTreeBuffer {
uint32_t paddr;
uint32_t length;
} _DeviceTreeBuffer;
typedef struct VTABLE {
UINT32 NameOffset;
UINT32 Seg;
UINT64 ProcAddr;
} VTABLE;
typedef struct SEGMENT {
CHAR8 Name[16]; //0
UINT64 SegAddress; //16 0x10
UINT64 vmsize; //0x18 0x16FB60
UINT64 fileoff; //0x20 0xDDA000
UINT64 filesize; //0x28 0x16FB60
UINT32 maxprot; //0x30 01-Cat 07-Moj
UINT32 initprot; //0x34 01
UINT32 NumSects; //0x38 00
UINT32 Flags; //0x3C 00
UINT32 Cmd[2]; //0x40 02, 18
UINT32 AddrVtable; //0x48
UINT32 SizeVtable; //0x4C
UINT32 AddrNames; //0x50
} SEGMENT;
extern EFI_PHYSICAL_ADDRESS KernelRelocBase;
extern BootArgs1 *bootArgs1;
extern BootArgs2 *bootArgs2;
extern CHAR8 *dtRoot;
extern UINT32 *dtLength;
extern UINT8 *KernelData;
extern UINT32 KernelSlide;
extern BOOLEAN isKernelcache;
extern BOOLEAN is64BitKernel;
extern BOOLEAN gSNBEAICPUFixRequire; // SandyBridge-E AppleIntelCpuPowerManagement patch require or not
extern BOOLEAN gBDWEIOPCIFixRequire; // Broadwell-E IOPCIFamily fix require or not
// notes:
// - 64bit segCmd64->vmaddr is 0xffffff80xxxxxxxx and we are taking
// only lower 32bit part into PrelinkTextAddr
// - PrelinkTextAddr is segCmd64->vmaddr + KernelRelocBase
extern UINT32 PrelinkTextLoadCmdAddr;
extern UINT32 PrelinkTextAddr;
extern UINT32 PrelinkTextSize;
// notes:
// - 64bit sect->addr is 0xffffff80xxxxxxxx and we are taking
// only lower 32bit part into PrelinkInfoAddr
// - PrelinkInfoAddr is sect->addr + KernelRelocBase
extern UINT32 PrelinkInfoLoadCmdAddr;
extern UINT32 PrelinkInfoAddr;
extern UINT32 PrelinkInfoSize;
extern UINT32 DisplayVendor[];
//VOID findCPUfamily();
extern BOOLEAN SSSE3;
//UINT64 kernelsize;
VOID Patcher_SSE3_5(VOID* kernelData);
VOID Patcher_SSE3_6(VOID* kernelData);
VOID Patcher_SSE3_7(VOID* kernelData);
#include "../gui/menu_items/menu_items.h" // for LOADER_ENTRY
class LOADER_ENTRY;
//VOID KernelAndKextsPatcherStart(IN LOADER_ENTRY *Entry);
//VOID register_kernel_symbol(CONST CHAR8* name);
//UINT64 symbol_handler(CHAR8* symbolName, UINT64 addr);
//INTN locate_symbols(VOID* kernelData);
/////////////////////
//
// kext_patcher.c
//
//
// Called from SetFSInjection(), before boot.efi is started,
// to allow patchers to prepare FSInject to force load needed kexts.
//
//VOID KextPatcherRegisterKexts(FSINJECTION_PROTOCOL *FSInject, FSI_STRING_LIST *ForceLoadKexts, LOADER_ENTRY *Entry);
//
// Entry for all kext patches.
// Will iterate through kext in prelinked kernel (kernelcache)
// or DevTree (drivers boot) and do patches.
//
//VOID KextPatcherStart(LOADER_ENTRY *Entry);
//
// Searches Source for Search pattern of size SearchSize
// and returns the number of occurences.
//
UINTN SearchAndCount(UINT8 *Source, UINT64 SourceSize, UINT8 *Search, UINTN SearchSize);
BOOLEAN CompareMemMask(const UINT8 *Source, const UINT8 *Search, UINTN SearchSize, const UINT8 *Mask, UINTN MaskSize);
VOID CopyMemMask(UINT8 *Dest, const UINT8 *Replace, const UINT8 *Mask, UINTN SearchSize);
UINTN FindMemMask(const UINT8 *Source, UINTN SourceSize, const UINT8 *Search, UINTN SearchSize, const UINT8 *MaskSearch, UINTN MaskSize);
//
// Searches Source for Search pattern of size SearchSize
// and replaces it with Replace up to MaxReplaces times.
// If MaxReplaces <= 0, then there is no restriction on number of replaces.
// Replace should have the same size as Search.
// Returns number of replaces done.
//
UINTN SearchAndReplace(UINT8 *Source, UINT64 SourceSize, const UINT8 *Search, UINTN SearchSize, const UINT8 *Replace, INTN MaxReplaces);
UINTN SearchAndReplaceMask(UINT8 *Source, UINT64 SourceSize, const UINT8 *Search, const UINT8 *MaskSearch, UINTN SearchSize,
const UINT8 *Replace, const UINT8 *MaskReplace, INTN MaxReplaces);
//UINTN searchProc(LOADER_ENTRY *Entry, unsigned char * kernel, const char *procedure, UINTN *procLen);
#endif /* !__LIBSAIO_KERNEL_PATCHER_H */