Reverse Engineering PCI Drivers: Difference between revisions
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
(UNDER CONSTRUCTION) | |||
by Vikram Ambrose -- [[User:Vambrose|Vambrose]] 01:44, 22 February 2010 (UTC) | by Vikram Ambrose -- [[User:Vambrose|Vambrose]] 01:44, 22 February 2010 (UTC) | ||
Revision as of 01:45, 22 February 2010
(UNDER CONSTRUCTION) by Vikram Ambrose -- Vambrose 01:44, 22 February 2010 (UTC)
This is a short guide demonstrating how I used the PCI Passthrough framework in KVM to reverse engineer atiflash.exe a video BIOS flashing tool for DOS.
atiflash.exe is a real dos application that flashes the video BIOS on ATi graphics cards. There are numerous ATi video BIOS flashing tools for Windows, but none for Linux as the code for doing this has not been made publicly available by AMD.
This technique allowed me to trace all PCI configuration space and memory mapped i/o (mmio) accesses to the PCI-E device from the closed source flashing tool.
Tools needed:
- CPU with virtualisation support (eg, AMD-V, Intel VT-x, an IOMMU is not necessary)
- Newer-the-better Linux kernel with KVM support
- Special KVM branch of QEMU (git://git.kernel.org/pub/scm/virt/kvm/qemu-kvm.git)
- Guest operating system (I used FreeDOS from UBCD - http://www.ultimatebootcd.com/)
- Secondary video card to boot Linux with while the Radeon is used in the virtual machine
Special thanks go out to Carl-Daniel Hailfinger, Twice#11 and the entire KVM and QEMU team for making this possible.