Skip to content

Instantly share code, notes, and snippets.

View morimolymoly's full-sized avatar

mmmly morimolymoly

View GitHub Profile
m
1. HiZ
2. 1-WIRE
3. UART
4. I2C
5. SPI
6. 2WIRE
7. 3WIRE
8. LCD
9. DIO
RT3052 # printenv
bootcmd=tftp
bootdelay=5
baudrate=57600
ethaddr="00:AA:BB:CC:DD:10"
preboot=echo;echo
ramargs=setenv bootargs root=/dev/ram rw
addip=setenv bootargs $(bootargs) ip=$(ipaddr):$(serverip):$(gatewayip):$(netmask):$(hostname):$(netdev):off
addmisc=setenv bootargs $(bootargs) console=ttyS0,$(baudrate) ethaddr=$(ethaddr) panic=1
flash_self=run ramargs addip addmisc;bootm $(kernel_addr) $(ramdisk_addr)
<domain type='xen'>
<name>chiaki</name>
<uuid>dd79a623-d6f5-4c61-8c4c-7c8ce856d811</uuid>
<memory unit='KiB'>524288</memory>
<currentMemory unit='KiB'>524288</currentMemory>
<vcpu placement='static'>1</vcpu>
<os>
<type arch='x86_64' machine='xenfv'>hvm</type>
<loader type='rom'>/usr/local/lib/xen/boot/hvmloader</loader>
<boot dev='hd'/>
Compiled https://github.com/Tr4pMafia/bar0 with https://github.com/Tr4pMafia/hypervisor/tree/moly-bar and make quick.
Patch is below.
diff --git a/bfvmm/include/hve/arch/intel_x64/exit_handler.h b/bfvmm/include/hve/arch/intel_x64/exit_handler.h
index 275c5633..287b7a83 100755
--- a/bfvmm/include/hve/arch/intel_x64/exit_handler.h
+++ b/bfvmm/include/hve/arch/intel_x64/exit_handler.h
@@ -54,6 +54,16 @@
#pragma warning(disable : 4251)
#endif
[0] DEBUG: setup cr3 0x000000044758f000
[0] DEBUG: UMP
[0] DEBUG: cr3 0x000000044758f000
[0] DEBUG: AUDIO weooororroe
[0] DEBUG: AUDIO 4K erererjo 0x0000000000200000
[0] DEBUG: mmap pdpt
[0] DEBUG: mmap allocate 0xffffa52160b1c000
[0] DEBUG: mmap pd
[0] DEBUG: mmap allocate 0xffffa52160b1d000
[0] DEBUG: mmap pt
physical address = 30b0360
Handle NMI by 9
Handle NMI by 8
Handle NMI by 2
Handle NMI by 6
Handle NMI by 5
Handle NMI by 3
Handle NMI by 4
Handle NMI by 0
Handle NMI by 7
@morimolymoly
morimolymoly / DmaHvBackdoor.c
Created January 3, 2019 11:28 — forked from Cr4sh/DmaHvBackdoor.c
Hyper-V backdoor for UEFI
/*
*********************************************************************
Part of UEFI DXE driver code that injects Hyper-V VM exit handler
backdoor into the Device Guard enabled Windows 10 Enterprise.
Execution starts from new_ExitBootServices() -- a hook handler
for EFI_BOOT_SERVICES.ExitBootServices() which being called by
winload!OslFwpKernelSetupPhase1(). After DXE phase exit winload.efi
transfers exeution to previously loaded Hyper-V kernel (hvix64.sys)
package main
import (
"fmt"
)
type helloObject struct {
Otakebi string
Name string
}
adab2c77653a2ee0cbef752f72ffa0e7a10985f3

現在のパーティション

root@yayoi:/home/moly# pvdisplay
  --- Physical volume ---
  PV Name               /dev/sda3
  VG Name               ubuntu-vg
  PV Size               <9.00 GiB / not usable 0
  Allocatable           yes
  PE Size               4.00 MiB
  Total PE              2303