mirror of
https://github.com/Lakr233/vphone-cli.git
synced 2026-04-05 13:09:06 +08:00
Batch-tested all 24 kernel JB patches individually: - 18 enabled: A1,A3,A4,B5,B7,B9-B20,C21,C22 - 3 PANIC: A2, B6 (proc_security_policy), B8 (convert_port_to_map), C23 (hook_cred_label_update_execve) - 1 NOT_BOOT: C24 (kcall10) Added research/kernel_patch_jb/ with per-patch analysis notes.
974 B
974 B
B19 patch_io_secure_bsd_root
How the patch works
- Source:
scripts/patchers/kernel_jb_patch_secure_root.py. - Locator strategy:
- Try symbol
_IOSecureBSDRoot. - Fallback string anchor
SecureRootName. - In target function, locate first forward conditional branch (
cbz/cbnz/tbz/tbnz).
- Try symbol
- Patch action:
- Replace conditional branch with unconditional
B target.
- Replace conditional branch with unconditional
Expected outcome
- Always take the forward branch and skip selected secure-root check path.
Target
- Security decision branch inside
_IOSecureBSDRootflow.
IDA MCP evidence
SecureRootNameoccurrences:0xfffffe00070a66a5-> xref0xfffffe000828f444-> function start0xfffffe000828f42c0xfffffe0007108f2d-> xref0xfffffe000836624c-> function start0xfffffe0008366008
- Patch script uses first successful function resolution in scan order.
Risk
- Secure-root checks are trust anchors; forcing the branch can weaken platform integrity assumptions.