2022-04-23 08:59:50 +00:00
|
|
|
// SPDX-FileCopyrightText: Copyright 2018 yuzu Emulator Project
|
|
|
|
// SPDX-License-Identifier: GPL-2.0-or-later
|
2018-07-26 02:57:08 +00:00
|
|
|
|
|
|
|
#include <memory>
|
2018-10-23 22:52:01 +00:00
|
|
|
#include <fmt/format.h>
|
2018-10-30 02:03:59 +00:00
|
|
|
#include <mbedtls/sha256.h>
|
2018-07-26 02:57:08 +00:00
|
|
|
|
2018-10-30 13:10:55 +00:00
|
|
|
#include "common/alignment.h"
|
2018-10-30 02:03:59 +00:00
|
|
|
#include "common/hex_util.h"
|
2020-04-09 17:50:55 +00:00
|
|
|
#include "common/scope_exit.h"
|
2020-11-08 20:49:45 +00:00
|
|
|
#include "core/core.h"
|
2021-02-13 01:58:31 +00:00
|
|
|
#include "core/hle/kernel/k_page_table.h"
|
2021-02-12 23:43:01 +00:00
|
|
|
#include "core/hle/kernel/svc_results.h"
|
2022-01-09 10:17:17 +00:00
|
|
|
#include "core/hle/kernel/svc_types.h"
|
2023-02-19 19:42:12 +00:00
|
|
|
#include "core/hle/service/ipc_helpers.h"
|
2018-07-26 02:57:08 +00:00
|
|
|
#include "core/hle/service/ldr/ldr.h"
|
2023-02-18 21:26:48 +00:00
|
|
|
#include "core/hle/service/server_manager.h"
|
2018-07-26 02:57:08 +00:00
|
|
|
#include "core/hle/service/service.h"
|
2018-10-23 22:52:01 +00:00
|
|
|
#include "core/loader/nro.h"
|
2020-04-09 17:50:55 +00:00
|
|
|
#include "core/memory.h"
|
2018-07-26 02:57:08 +00:00
|
|
|
|
|
|
|
namespace Service::LDR {
|
|
|
|
|
2022-06-26 03:44:19 +00:00
|
|
|
constexpr Result ERROR_INSUFFICIENT_ADDRESS_SPACE{ErrorModule::RO, 2};
|
|
|
|
|
|
|
|
[[maybe_unused]] constexpr Result ERROR_INVALID_MEMORY_STATE{ErrorModule::Loader, 51};
|
|
|
|
constexpr Result ERROR_INVALID_NRO{ErrorModule::Loader, 52};
|
|
|
|
constexpr Result ERROR_INVALID_NRR{ErrorModule::Loader, 53};
|
|
|
|
constexpr Result ERROR_MISSING_NRR_HASH{ErrorModule::Loader, 54};
|
|
|
|
constexpr Result ERROR_MAXIMUM_NRO{ErrorModule::Loader, 55};
|
|
|
|
constexpr Result ERROR_MAXIMUM_NRR{ErrorModule::Loader, 56};
|
|
|
|
constexpr Result ERROR_ALREADY_LOADED{ErrorModule::Loader, 57};
|
|
|
|
constexpr Result ERROR_INVALID_ALIGNMENT{ErrorModule::Loader, 81};
|
|
|
|
constexpr Result ERROR_INVALID_SIZE{ErrorModule::Loader, 82};
|
|
|
|
constexpr Result ERROR_INVALID_NRO_ADDRESS{ErrorModule::Loader, 84};
|
|
|
|
[[maybe_unused]] constexpr Result ERROR_INVALID_NRR_ADDRESS{ErrorModule::Loader, 85};
|
|
|
|
constexpr Result ERROR_NOT_INITIALIZED{ErrorModule::Loader, 87};
|
2018-10-30 01:58:11 +00:00
|
|
|
|
2020-04-09 17:50:55 +00:00
|
|
|
constexpr std::size_t MAXIMUM_LOADED_RO{0x40};
|
|
|
|
constexpr std::size_t MAXIMUM_MAP_RETRIES{0x200};
|
|
|
|
|
2020-06-14 17:28:39 +00:00
|
|
|
constexpr std::size_t TEXT_INDEX{0};
|
|
|
|
constexpr std::size_t RO_INDEX{1};
|
|
|
|
constexpr std::size_t DATA_INDEX{2};
|
|
|
|
|
|
|
|
struct NRRCertification {
|
2020-05-31 16:49:51 +00:00
|
|
|
u64_le application_id_mask;
|
|
|
|
u64_le application_id_pattern;
|
2020-06-28 10:54:37 +00:00
|
|
|
INSERT_PADDING_BYTES(0x10);
|
2020-05-31 16:49:51 +00:00
|
|
|
std::array<u8, 0x100> public_key; // Also known as modulus
|
|
|
|
std::array<u8, 0x100> signature;
|
|
|
|
};
|
2020-06-16 13:57:02 +00:00
|
|
|
static_assert(sizeof(NRRCertification) == 0x220, "NRRCertification has invalid size.");
|
2020-05-31 16:49:51 +00:00
|
|
|
|
2020-04-09 17:50:55 +00:00
|
|
|
struct NRRHeader {
|
|
|
|
u32_le magic;
|
2020-05-31 16:49:51 +00:00
|
|
|
u32_le certification_signature_key_generation; // 9.0.0+
|
2020-06-28 10:54:37 +00:00
|
|
|
INSERT_PADDING_WORDS(2);
|
2020-06-14 17:28:39 +00:00
|
|
|
NRRCertification certification;
|
2020-05-31 16:49:51 +00:00
|
|
|
std::array<u8, 0x100> signature;
|
|
|
|
u64_le application_id;
|
2020-04-09 17:50:55 +00:00
|
|
|
u32_le size;
|
2020-05-31 17:12:09 +00:00
|
|
|
u8 nrr_kind; // 7.0.0+
|
2020-06-28 10:54:37 +00:00
|
|
|
INSERT_PADDING_BYTES(3);
|
2020-04-09 17:50:55 +00:00
|
|
|
u32_le hash_offset;
|
|
|
|
u32_le hash_count;
|
2020-06-28 10:54:37 +00:00
|
|
|
INSERT_PADDING_WORDS(2);
|
2020-04-09 17:50:55 +00:00
|
|
|
};
|
2020-06-14 17:30:08 +00:00
|
|
|
static_assert(sizeof(NRRHeader) == 0x350, "NRRHeader has invalid size.");
|
2020-05-31 16:49:51 +00:00
|
|
|
|
|
|
|
struct SegmentHeader {
|
|
|
|
u32_le memory_offset;
|
|
|
|
u32_le memory_size;
|
|
|
|
};
|
2020-06-14 17:30:08 +00:00
|
|
|
static_assert(sizeof(SegmentHeader) == 0x8, "SegmentHeader has invalid size.");
|
2020-04-09 17:50:55 +00:00
|
|
|
|
|
|
|
struct NROHeader {
|
2020-05-31 16:49:51 +00:00
|
|
|
// Switchbrew calls this "Start" (0x10)
|
2020-06-28 10:54:37 +00:00
|
|
|
INSERT_PADDING_WORDS(1);
|
2020-04-09 17:50:55 +00:00
|
|
|
u32_le mod_offset;
|
2020-06-28 10:54:37 +00:00
|
|
|
INSERT_PADDING_WORDS(2);
|
2020-05-31 16:49:51 +00:00
|
|
|
|
|
|
|
// Switchbrew calls this "Header" (0x70)
|
2020-04-09 17:50:55 +00:00
|
|
|
u32_le magic;
|
|
|
|
u32_le version;
|
|
|
|
u32_le nro_size;
|
|
|
|
u32_le flags;
|
2020-06-02 15:54:10 +00:00
|
|
|
// .text, .ro, .data
|
|
|
|
std::array<SegmentHeader, 3> segment_headers;
|
2020-04-09 17:50:55 +00:00
|
|
|
u32_le bss_size;
|
2020-06-28 10:54:37 +00:00
|
|
|
INSERT_PADDING_WORDS(1);
|
2020-04-09 17:50:55 +00:00
|
|
|
std::array<u8, 0x20> build_id;
|
2020-05-31 16:49:51 +00:00
|
|
|
u32_le dso_handle_offset;
|
2020-06-28 10:54:37 +00:00
|
|
|
INSERT_PADDING_WORDS(1);
|
2020-05-31 16:49:51 +00:00
|
|
|
// .apiInfo, .dynstr, .dynsym
|
2020-06-02 15:54:10 +00:00
|
|
|
std::array<SegmentHeader, 3> segment_headers_2;
|
2020-04-09 17:50:55 +00:00
|
|
|
};
|
|
|
|
static_assert(sizeof(NROHeader) == 0x80, "NROHeader has invalid size.");
|
|
|
|
|
2020-06-18 13:45:47 +00:00
|
|
|
using SHA256Hash = std::array<u8, 0x20>;
|
|
|
|
|
2020-04-09 17:50:55 +00:00
|
|
|
struct NROInfo {
|
|
|
|
SHA256Hash hash{};
|
|
|
|
VAddr nro_address{};
|
|
|
|
std::size_t nro_size{};
|
|
|
|
VAddr bss_address{};
|
|
|
|
std::size_t bss_size{};
|
|
|
|
std::size_t text_size{};
|
|
|
|
std::size_t ro_size{};
|
|
|
|
std::size_t data_size{};
|
|
|
|
VAddr src_addr{};
|
|
|
|
};
|
2020-06-14 17:28:39 +00:00
|
|
|
static_assert(sizeof(NROInfo) == 0x60, "NROInfo has invalid size.");
|
2018-10-30 01:58:11 +00:00
|
|
|
|
2018-07-26 02:57:08 +00:00
|
|
|
class DebugMonitor final : public ServiceFramework<DebugMonitor> {
|
|
|
|
public:
|
2020-11-26 20:19:08 +00:00
|
|
|
explicit DebugMonitor(Core::System& system_) : ServiceFramework{system_, "ldr:dmnt"} {
|
2018-07-26 02:57:08 +00:00
|
|
|
// clang-format off
|
|
|
|
static const FunctionInfo functions[] = {
|
2021-04-08 19:12:42 +00:00
|
|
|
{0, nullptr, "SetProgramArgument"},
|
|
|
|
{1, nullptr, "FlushArguments"},
|
|
|
|
{2, nullptr, "GetProcessModuleInfo"},
|
2018-07-26 02:57:08 +00:00
|
|
|
};
|
|
|
|
// clang-format on
|
|
|
|
|
|
|
|
RegisterHandlers(functions);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
class ProcessManager final : public ServiceFramework<ProcessManager> {
|
|
|
|
public:
|
2020-11-26 20:19:08 +00:00
|
|
|
explicit ProcessManager(Core::System& system_) : ServiceFramework{system_, "ldr:pm"} {
|
2018-07-26 02:57:08 +00:00
|
|
|
// clang-format off
|
|
|
|
static const FunctionInfo functions[] = {
|
|
|
|
{0, nullptr, "CreateProcess"},
|
|
|
|
{1, nullptr, "GetProgramInfo"},
|
2021-04-08 19:12:42 +00:00
|
|
|
{2, nullptr, "PinProgram"},
|
|
|
|
{3, nullptr, "UnpinProgram"},
|
2020-04-20 19:18:23 +00:00
|
|
|
{4, nullptr, "SetEnabledProgramVerification"},
|
2018-07-26 02:57:08 +00:00
|
|
|
};
|
|
|
|
// clang-format on
|
|
|
|
|
|
|
|
RegisterHandlers(functions);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
class Shell final : public ServiceFramework<Shell> {
|
|
|
|
public:
|
2020-11-26 20:19:08 +00:00
|
|
|
explicit Shell(Core::System& system_) : ServiceFramework{system_, "ldr:shel"} {
|
2018-07-26 02:57:08 +00:00
|
|
|
// clang-format off
|
|
|
|
static const FunctionInfo functions[] = {
|
2021-04-08 19:12:42 +00:00
|
|
|
{0, nullptr, "SetProgramArgument"},
|
|
|
|
{1, nullptr, "FlushArguments"},
|
2018-07-26 02:57:08 +00:00
|
|
|
};
|
|
|
|
// clang-format on
|
|
|
|
|
|
|
|
RegisterHandlers(functions);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
class RelocatableObject final : public ServiceFramework<RelocatableObject> {
|
|
|
|
public:
|
2023-02-18 21:26:48 +00:00
|
|
|
explicit RelocatableObject(Core::System& system_) : ServiceFramework{system_, "ldr:ro"} {
|
2018-07-26 02:57:08 +00:00
|
|
|
// clang-format off
|
|
|
|
static const FunctionInfo functions[] = {
|
2021-04-08 19:12:42 +00:00
|
|
|
{0, &RelocatableObject::LoadModule, "LoadModule"},
|
|
|
|
{1, &RelocatableObject::UnloadModule, "UnloadModule"},
|
|
|
|
{2, &RelocatableObject::RegisterModuleInfo, "RegisterModuleInfo"},
|
|
|
|
{3, &RelocatableObject::UnregisterModuleInfo, "UnregisterModuleInfo"},
|
2018-10-23 22:52:01 +00:00
|
|
|
{4, &RelocatableObject::Initialize, "Initialize"},
|
2021-04-08 19:12:42 +00:00
|
|
|
{10, nullptr, "RegisterModuleInfo2"},
|
2018-07-26 02:57:08 +00:00
|
|
|
};
|
|
|
|
// clang-format on
|
|
|
|
|
|
|
|
RegisterHandlers(functions);
|
|
|
|
}
|
2018-10-23 22:52:01 +00:00
|
|
|
|
2023-02-19 19:42:12 +00:00
|
|
|
void RegisterModuleInfo(HLERequestContext& ctx) {
|
2019-04-10 06:37:34 +00:00
|
|
|
struct Parameters {
|
|
|
|
u64_le process_id;
|
|
|
|
u64_le nrr_address;
|
|
|
|
u64_le nrr_size;
|
|
|
|
};
|
|
|
|
|
2018-10-30 01:58:11 +00:00
|
|
|
IPC::RequestParser rp{ctx};
|
2019-04-10 06:37:34 +00:00
|
|
|
const auto [process_id, nrr_address, nrr_size] = rp.PopRaw<Parameters>();
|
|
|
|
|
|
|
|
LOG_DEBUG(Service_LDR,
|
|
|
|
"called with process_id={:016X}, nrr_address={:016X}, nrr_size={:016X}",
|
|
|
|
process_id, nrr_address, nrr_size);
|
2018-10-30 01:58:11 +00:00
|
|
|
|
|
|
|
if (!initialized) {
|
|
|
|
LOG_ERROR(Service_LDR, "LDR:RO not initialized before use!");
|
|
|
|
IPC::ResponseBuilder rb{ctx, 2};
|
|
|
|
rb.Push(ERROR_NOT_INITIALIZED);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2018-11-18 02:40:17 +00:00
|
|
|
if (nrr.size() >= MAXIMUM_LOADED_RO) {
|
2018-10-30 01:58:11 +00:00
|
|
|
LOG_ERROR(Service_LDR, "Loading new NRR would exceed the maximum number of loaded NRRs "
|
|
|
|
"(0x40)! Failing...");
|
|
|
|
IPC::ResponseBuilder rb{ctx, 2};
|
|
|
|
rb.Push(ERROR_MAXIMUM_NRR);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// NRR Address does not fall on 0x1000 byte boundary
|
2019-04-10 06:37:34 +00:00
|
|
|
if (!Common::Is4KBAligned(nrr_address)) {
|
|
|
|
LOG_ERROR(Service_LDR, "NRR Address has invalid alignment (actual {:016X})!",
|
|
|
|
nrr_address);
|
2018-10-30 01:58:11 +00:00
|
|
|
IPC::ResponseBuilder rb{ctx, 2};
|
|
|
|
rb.Push(ERROR_INVALID_ALIGNMENT);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// NRR Size is zero or causes overflow
|
2019-04-10 06:37:34 +00:00
|
|
|
if (nrr_address + nrr_size <= nrr_address || nrr_size == 0 ||
|
|
|
|
!Common::Is4KBAligned(nrr_size)) {
|
2018-10-30 01:58:11 +00:00
|
|
|
LOG_ERROR(Service_LDR, "NRR Size is invalid! (nrr_address={:016X}, nrr_size={:016X})",
|
2019-04-10 06:37:34 +00:00
|
|
|
nrr_address, nrr_size);
|
2018-10-30 01:58:11 +00:00
|
|
|
IPC::ResponseBuilder rb{ctx, 2};
|
|
|
|
rb.Push(ERROR_INVALID_SIZE);
|
|
|
|
return;
|
|
|
|
}
|
2019-11-26 21:29:34 +00:00
|
|
|
|
2018-10-30 01:58:11 +00:00
|
|
|
// Read NRR data from memory
|
|
|
|
std::vector<u8> nrr_data(nrr_size);
|
2023-03-23 23:58:48 +00:00
|
|
|
system.ApplicationMemory().ReadBlock(nrr_address, nrr_data.data(), nrr_size);
|
2018-10-30 01:58:11 +00:00
|
|
|
NRRHeader header;
|
|
|
|
std::memcpy(&header, nrr_data.data(), sizeof(NRRHeader));
|
|
|
|
|
|
|
|
if (header.magic != Common::MakeMagic('N', 'R', 'R', '0')) {
|
|
|
|
LOG_ERROR(Service_LDR, "NRR did not have magic 'NRR0' (actual {:08X})!", header.magic);
|
|
|
|
IPC::ResponseBuilder rb{ctx, 2};
|
|
|
|
rb.Push(ERROR_INVALID_NRR);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (header.size != nrr_size) {
|
|
|
|
LOG_ERROR(Service_LDR,
|
|
|
|
"NRR header reported size did not match LoadNrr parameter size! "
|
|
|
|
"(header_size={:016X}, loadnrr_size={:016X})",
|
|
|
|
header.size, nrr_size);
|
|
|
|
IPC::ResponseBuilder rb{ctx, 2};
|
|
|
|
rb.Push(ERROR_INVALID_SIZE);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2023-02-13 16:21:43 +00:00
|
|
|
if (system.GetApplicationProcessProgramID() != header.application_id) {
|
2018-10-30 01:58:11 +00:00
|
|
|
LOG_ERROR(Service_LDR,
|
|
|
|
"Attempting to load NRR with title ID other than current process. (actual "
|
|
|
|
"{:016X})!",
|
2020-05-31 16:49:51 +00:00
|
|
|
header.application_id);
|
2018-10-30 01:58:11 +00:00
|
|
|
IPC::ResponseBuilder rb{ctx, 2};
|
|
|
|
rb.Push(ERROR_INVALID_NRR);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
std::vector<SHA256Hash> hashes;
|
2018-11-18 02:40:17 +00:00
|
|
|
|
|
|
|
// Copy all hashes in the NRR (specified by hash count/hash offset) into vector.
|
2018-10-30 01:58:11 +00:00
|
|
|
for (std::size_t i = header.hash_offset;
|
2018-11-18 02:40:17 +00:00
|
|
|
i < (header.hash_offset + (header.hash_count * sizeof(SHA256Hash))); i += 8) {
|
|
|
|
SHA256Hash hash;
|
|
|
|
std::memcpy(hash.data(), nrr_data.data() + i, sizeof(SHA256Hash));
|
|
|
|
hashes.emplace_back(hash);
|
2018-10-30 01:58:11 +00:00
|
|
|
}
|
|
|
|
|
2019-04-10 06:37:34 +00:00
|
|
|
nrr.insert_or_assign(nrr_address, std::move(hashes));
|
2018-10-30 01:58:11 +00:00
|
|
|
|
|
|
|
IPC::ResponseBuilder rb{ctx, 2};
|
2021-05-21 05:05:04 +00:00
|
|
|
rb.Push(ResultSuccess);
|
2018-10-30 01:58:11 +00:00
|
|
|
}
|
|
|
|
|
2023-02-19 19:42:12 +00:00
|
|
|
void UnregisterModuleInfo(HLERequestContext& ctx) {
|
2020-10-31 08:22:53 +00:00
|
|
|
IPC::RequestParser rp{ctx};
|
|
|
|
const auto pid = rp.Pop<u64>();
|
|
|
|
const auto nrr_address = rp.Pop<VAddr>();
|
|
|
|
|
|
|
|
LOG_DEBUG(Service_LDR, "called with pid={}, nrr_address={:016X}", pid, nrr_address);
|
|
|
|
|
|
|
|
nrr.erase(nrr_address);
|
|
|
|
|
|
|
|
IPC::ResponseBuilder rb{ctx, 2};
|
|
|
|
|
2021-05-21 05:05:04 +00:00
|
|
|
rb.Push(ResultSuccess);
|
2020-10-31 08:22:53 +00:00
|
|
|
}
|
|
|
|
|
2021-02-13 01:58:31 +00:00
|
|
|
bool ValidateRegionForMap(Kernel::KPageTable& page_table, VAddr start, std::size_t size) const {
|
2022-03-03 02:06:26 +00:00
|
|
|
const std::size_t padding_size{page_table.GetNumGuardPages() * Kernel::PageSize};
|
2020-04-09 17:50:55 +00:00
|
|
|
const auto start_info{page_table.QueryInfo(start - 1)};
|
|
|
|
|
2022-09-10 04:17:52 +00:00
|
|
|
if (start_info.GetState() != Kernel::KMemoryState::Free) {
|
2020-04-09 17:50:55 +00:00
|
|
|
return {};
|
2018-10-30 02:03:59 +00:00
|
|
|
}
|
|
|
|
|
2020-04-09 17:50:55 +00:00
|
|
|
if (start_info.GetAddress() > (start - padding_size)) {
|
|
|
|
return {};
|
|
|
|
}
|
2019-04-10 06:37:34 +00:00
|
|
|
|
2020-04-09 17:50:55 +00:00
|
|
|
const auto end_info{page_table.QueryInfo(start + size)};
|
2019-04-10 06:37:34 +00:00
|
|
|
|
2022-09-10 04:17:52 +00:00
|
|
|
if (end_info.GetState() != Kernel::KMemoryState::Free) {
|
2020-04-09 17:50:55 +00:00
|
|
|
return {};
|
|
|
|
}
|
2018-10-30 02:03:59 +00:00
|
|
|
|
2020-04-09 17:50:55 +00:00
|
|
|
return (start + size + padding_size) <= (end_info.GetAddress() + end_info.GetSize());
|
|
|
|
}
|
|
|
|
|
2022-06-26 03:44:19 +00:00
|
|
|
Result GetAvailableMapRegion(Kernel::KPageTable& page_table, u64 size, VAddr& out_addr) {
|
2022-03-03 02:06:26 +00:00
|
|
|
size = Common::AlignUp(size, Kernel::PageSize);
|
|
|
|
size += page_table.GetNumGuardPages() * Kernel::PageSize * 4;
|
|
|
|
|
|
|
|
const auto is_region_available = [&](VAddr addr) {
|
|
|
|
const auto end_addr = addr + size;
|
|
|
|
while (addr < end_addr) {
|
2023-03-23 23:58:48 +00:00
|
|
|
if (system.ApplicationMemory().IsValidVirtualAddress(addr)) {
|
2022-03-03 02:06:26 +00:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2023-07-15 01:58:20 +00:00
|
|
|
if (!page_table.Contains(out_addr, size)) {
|
2022-03-03 02:06:26 +00:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2023-07-15 01:58:20 +00:00
|
|
|
if (page_table.IsInHeapRegion(out_addr, size)) {
|
2022-03-03 02:06:26 +00:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2023-07-15 01:58:20 +00:00
|
|
|
if (page_table.IsInAliasRegion(out_addr, size)) {
|
2022-03-03 02:06:26 +00:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
addr += Kernel::PageSize;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
};
|
|
|
|
|
|
|
|
bool succeeded = false;
|
|
|
|
const auto map_region_end =
|
2023-03-18 01:26:04 +00:00
|
|
|
GetInteger(page_table.GetAliasCodeRegionStart()) + page_table.GetAliasCodeRegionSize();
|
2022-03-03 02:06:26 +00:00
|
|
|
while (current_map_addr < map_region_end) {
|
|
|
|
if (is_region_available(current_map_addr)) {
|
|
|
|
succeeded = true;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
current_map_addr += 0x100000;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!succeeded) {
|
2022-06-07 21:02:29 +00:00
|
|
|
ASSERT_MSG(false, "Out of address space!");
|
2022-03-03 02:06:26 +00:00
|
|
|
return Kernel::ResultOutOfMemory;
|
|
|
|
}
|
|
|
|
|
|
|
|
out_addr = current_map_addr;
|
|
|
|
current_map_addr += size;
|
|
|
|
|
|
|
|
return ResultSuccess;
|
2020-04-09 17:50:55 +00:00
|
|
|
}
|
|
|
|
|
2023-07-15 00:16:39 +00:00
|
|
|
Result MapProcessCodeMemory(VAddr* out_map_location, Kernel::KProcess* process, VAddr base_addr,
|
|
|
|
u64 size) {
|
2023-07-15 01:43:15 +00:00
|
|
|
auto& page_table{process->GetPageTable()};
|
2022-03-03 02:06:26 +00:00
|
|
|
VAddr addr{};
|
|
|
|
|
2020-08-03 15:48:14 +00:00
|
|
|
for (std::size_t retry = 0; retry < MAXIMUM_MAP_RETRIES; retry++) {
|
2022-03-03 02:06:26 +00:00
|
|
|
R_TRY(GetAvailableMapRegion(page_table, size, addr));
|
2020-04-09 17:50:55 +00:00
|
|
|
|
2022-06-26 03:44:19 +00:00
|
|
|
const Result result{page_table.MapCodeMemory(addr, base_addr, size)};
|
2021-02-12 23:43:01 +00:00
|
|
|
if (result == Kernel::ResultInvalidCurrentMemory) {
|
2020-04-09 17:50:55 +00:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2022-03-03 02:06:26 +00:00
|
|
|
R_TRY(result);
|
2020-04-09 17:50:55 +00:00
|
|
|
|
|
|
|
if (ValidateRegionForMap(page_table, addr, size)) {
|
2023-07-15 00:16:39 +00:00
|
|
|
*out_map_location = addr;
|
|
|
|
return ResultSuccess;
|
2020-04-09 17:50:55 +00:00
|
|
|
}
|
2018-10-30 02:03:59 +00:00
|
|
|
}
|
|
|
|
|
2020-04-09 17:50:55 +00:00
|
|
|
return ERROR_INSUFFICIENT_ADDRESS_SPACE;
|
|
|
|
}
|
|
|
|
|
2023-07-15 00:16:39 +00:00
|
|
|
Result MapNro(VAddr* out_map_location, Kernel::KProcess* process, VAddr nro_addr,
|
|
|
|
std::size_t nro_size, VAddr bss_addr, std::size_t bss_size, std::size_t size) {
|
2020-08-03 15:48:14 +00:00
|
|
|
for (std::size_t retry = 0; retry < MAXIMUM_MAP_RETRIES; retry++) {
|
2023-07-15 01:43:15 +00:00
|
|
|
auto& page_table{process->GetPageTable()};
|
2020-04-09 17:50:55 +00:00
|
|
|
VAddr addr{};
|
|
|
|
|
2023-07-15 00:16:39 +00:00
|
|
|
R_TRY(MapProcessCodeMemory(&addr, process, nro_addr, nro_size));
|
2020-04-09 17:50:55 +00:00
|
|
|
|
|
|
|
if (bss_size) {
|
|
|
|
auto block_guard = detail::ScopeExit([&] {
|
2022-04-08 19:31:56 +00:00
|
|
|
page_table.UnmapCodeMemory(
|
|
|
|
addr + nro_size, bss_addr, bss_size,
|
|
|
|
Kernel::KPageTable::ICacheInvalidationStrategy::InvalidateRange);
|
|
|
|
page_table.UnmapCodeMemory(
|
|
|
|
addr, nro_addr, nro_size,
|
|
|
|
Kernel::KPageTable::ICacheInvalidationStrategy::InvalidateRange);
|
2020-04-09 17:50:55 +00:00
|
|
|
});
|
|
|
|
|
2022-06-26 03:44:19 +00:00
|
|
|
const Result result{page_table.MapCodeMemory(addr + nro_size, bss_addr, bss_size)};
|
2020-04-09 17:50:55 +00:00
|
|
|
|
2021-02-12 23:43:01 +00:00
|
|
|
if (result == Kernel::ResultInvalidCurrentMemory) {
|
2020-04-09 17:50:55 +00:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (result.IsError()) {
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
block_guard.Cancel();
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ValidateRegionForMap(page_table, addr, size)) {
|
2023-07-15 00:16:39 +00:00
|
|
|
*out_map_location = addr;
|
|
|
|
return ResultSuccess;
|
2020-04-09 17:50:55 +00:00
|
|
|
}
|
2018-10-30 02:03:59 +00:00
|
|
|
}
|
|
|
|
|
2020-04-09 17:50:55 +00:00
|
|
|
return ERROR_INSUFFICIENT_ADDRESS_SPACE;
|
|
|
|
}
|
|
|
|
|
2022-06-26 03:44:19 +00:00
|
|
|
Result LoadNro(Kernel::KProcess* process, const NROHeader& nro_header, VAddr nro_addr,
|
|
|
|
VAddr start) const {
|
2020-06-14 17:28:39 +00:00
|
|
|
const VAddr text_start{start + nro_header.segment_headers[TEXT_INDEX].memory_offset};
|
|
|
|
const VAddr ro_start{start + nro_header.segment_headers[RO_INDEX].memory_offset};
|
|
|
|
const VAddr data_start{start + nro_header.segment_headers[DATA_INDEX].memory_offset};
|
|
|
|
const VAddr bss_start{data_start + nro_header.segment_headers[DATA_INDEX].memory_size};
|
2020-04-09 17:50:55 +00:00
|
|
|
const VAddr bss_end_addr{
|
2021-02-13 01:02:51 +00:00
|
|
|
Common::AlignUp(bss_start + nro_header.bss_size, Kernel::PageSize)};
|
2020-04-09 17:50:55 +00:00
|
|
|
|
2023-03-23 23:58:48 +00:00
|
|
|
const auto CopyCode = [this](VAddr src_addr, VAddr dst_addr, u64 size) {
|
|
|
|
system.ApplicationMemory().CopyBlock(dst_addr, src_addr, size);
|
2021-05-06 23:18:11 +00:00
|
|
|
};
|
2020-06-14 17:28:39 +00:00
|
|
|
CopyCode(nro_addr + nro_header.segment_headers[TEXT_INDEX].memory_offset, text_start,
|
|
|
|
nro_header.segment_headers[TEXT_INDEX].memory_size);
|
|
|
|
CopyCode(nro_addr + nro_header.segment_headers[RO_INDEX].memory_offset, ro_start,
|
|
|
|
nro_header.segment_headers[RO_INDEX].memory_size);
|
|
|
|
CopyCode(nro_addr + nro_header.segment_headers[DATA_INDEX].memory_offset, data_start,
|
|
|
|
nro_header.segment_headers[DATA_INDEX].memory_size);
|
2020-04-09 17:50:55 +00:00
|
|
|
|
2023-07-15 00:16:39 +00:00
|
|
|
R_TRY(process->GetPageTable().SetProcessMemoryPermission(
|
2022-01-09 10:17:17 +00:00
|
|
|
text_start, ro_start - text_start, Kernel::Svc::MemoryPermission::ReadExecute));
|
2023-07-15 00:16:39 +00:00
|
|
|
R_TRY(process->GetPageTable().SetProcessMemoryPermission(
|
2022-01-09 10:17:17 +00:00
|
|
|
ro_start, data_start - ro_start, Kernel::Svc::MemoryPermission::Read));
|
2020-04-09 17:50:55 +00:00
|
|
|
|
2023-07-15 01:43:15 +00:00
|
|
|
return process->GetPageTable().SetProcessMemoryPermission(
|
2022-01-09 10:17:17 +00:00
|
|
|
data_start, bss_end_addr - data_start, Kernel::Svc::MemoryPermission::ReadWrite);
|
2018-10-23 22:52:01 +00:00
|
|
|
}
|
|
|
|
|
2023-02-19 19:42:12 +00:00
|
|
|
void LoadModule(HLERequestContext& ctx) {
|
2019-04-10 06:37:34 +00:00
|
|
|
struct Parameters {
|
|
|
|
u64_le process_id;
|
|
|
|
u64_le image_address;
|
|
|
|
u64_le image_size;
|
|
|
|
u64_le bss_address;
|
|
|
|
u64_le bss_size;
|
|
|
|
};
|
|
|
|
|
2018-10-23 22:52:01 +00:00
|
|
|
IPC::RequestParser rp{ctx};
|
2019-04-10 06:37:34 +00:00
|
|
|
const auto [process_id, nro_address, nro_size, bss_address, bss_size] =
|
|
|
|
rp.PopRaw<Parameters>();
|
|
|
|
|
|
|
|
LOG_DEBUG(Service_LDR,
|
|
|
|
"called with pid={:016X}, nro_addr={:016X}, nro_size={:016X}, bss_addr={:016X}, "
|
|
|
|
"bss_size={:016X}",
|
|
|
|
process_id, nro_address, nro_size, bss_address, bss_size);
|
2018-10-23 22:52:01 +00:00
|
|
|
|
2018-10-30 02:12:05 +00:00
|
|
|
if (!initialized) {
|
|
|
|
LOG_ERROR(Service_LDR, "LDR:RO not initialized before use!");
|
|
|
|
IPC::ResponseBuilder rb{ctx, 2};
|
|
|
|
rb.Push(ERROR_NOT_INITIALIZED);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (nro.size() >= MAXIMUM_LOADED_RO) {
|
|
|
|
LOG_ERROR(Service_LDR, "Loading new NRO would exceed the maximum number of loaded NROs "
|
|
|
|
"(0x40)! Failing...");
|
|
|
|
IPC::ResponseBuilder rb{ctx, 2};
|
|
|
|
rb.Push(ERROR_MAXIMUM_NRO);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// NRO Address does not fall on 0x1000 byte boundary
|
2019-04-10 06:37:34 +00:00
|
|
|
if (!Common::Is4KBAligned(nro_address)) {
|
|
|
|
LOG_ERROR(Service_LDR, "NRO Address has invalid alignment (actual {:016X})!",
|
|
|
|
nro_address);
|
2018-10-30 02:12:05 +00:00
|
|
|
IPC::ResponseBuilder rb{ctx, 2};
|
|
|
|
rb.Push(ERROR_INVALID_ALIGNMENT);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// NRO Size or BSS Size is zero or causes overflow
|
2018-10-30 13:10:55 +00:00
|
|
|
const auto nro_size_valid =
|
2019-04-10 06:37:34 +00:00
|
|
|
nro_size != 0 && nro_address + nro_size > nro_address && Common::Is4KBAligned(nro_size);
|
|
|
|
const auto bss_size_valid = nro_size + bss_size >= nro_size &&
|
|
|
|
(bss_size == 0 || bss_address + bss_size > bss_address);
|
2018-10-30 13:10:55 +00:00
|
|
|
|
|
|
|
if (!nro_size_valid || !bss_size_valid) {
|
2018-10-30 02:12:05 +00:00
|
|
|
LOG_ERROR(Service_LDR,
|
|
|
|
"NRO Size or BSS Size is invalid! (nro_address={:016X}, nro_size={:016X}, "
|
|
|
|
"bss_address={:016X}, bss_size={:016X})",
|
2019-04-10 06:37:34 +00:00
|
|
|
nro_address, nro_size, bss_address, bss_size);
|
2018-10-30 02:12:05 +00:00
|
|
|
IPC::ResponseBuilder rb{ctx, 2};
|
|
|
|
rb.Push(ERROR_INVALID_SIZE);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2018-10-23 22:52:01 +00:00
|
|
|
// Read NRO data from memory
|
|
|
|
std::vector<u8> nro_data(nro_size);
|
2023-03-23 23:58:48 +00:00
|
|
|
system.ApplicationMemory().ReadBlock(nro_address, nro_data.data(), nro_size);
|
2018-10-23 22:52:01 +00:00
|
|
|
|
2018-10-30 02:12:05 +00:00
|
|
|
SHA256Hash hash{};
|
2019-11-12 13:37:58 +00:00
|
|
|
mbedtls_sha256_ret(nro_data.data(), nro_data.size(), hash.data(), 0);
|
2018-10-30 02:12:05 +00:00
|
|
|
|
|
|
|
// NRO Hash is already loaded
|
2018-10-30 13:10:55 +00:00
|
|
|
if (std::any_of(nro.begin(), nro.end(), [&hash](const std::pair<VAddr, NROInfo>& info) {
|
2018-10-30 02:12:05 +00:00
|
|
|
return info.second.hash == hash;
|
2018-10-30 13:10:55 +00:00
|
|
|
})) {
|
2018-10-30 02:12:05 +00:00
|
|
|
LOG_ERROR(Service_LDR, "NRO is already loaded!");
|
|
|
|
IPC::ResponseBuilder rb{ctx, 2};
|
|
|
|
rb.Push(ERROR_ALREADY_LOADED);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// NRO Hash is not in any loaded NRR
|
2018-10-30 13:10:55 +00:00
|
|
|
if (!IsValidNROHash(hash)) {
|
2018-10-30 02:12:05 +00:00
|
|
|
LOG_ERROR(Service_LDR,
|
|
|
|
"NRO hash is not present in any currently loaded NRRs (hash={})!",
|
2019-06-12 21:27:06 +00:00
|
|
|
Common::HexToString(hash));
|
2018-10-30 02:12:05 +00:00
|
|
|
IPC::ResponseBuilder rb{ctx, 2};
|
|
|
|
rb.Push(ERROR_MISSING_NRR_HASH);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-04-09 17:50:55 +00:00
|
|
|
// Load and validate the NRO header
|
|
|
|
NROHeader header{};
|
2018-10-30 02:12:05 +00:00
|
|
|
std::memcpy(&header, nro_data.data(), sizeof(NROHeader));
|
2018-10-30 13:10:55 +00:00
|
|
|
if (!IsValidNRO(header, nro_size, bss_size)) {
|
2018-10-30 02:12:05 +00:00
|
|
|
LOG_ERROR(Service_LDR, "NRO was invalid!");
|
|
|
|
IPC::ResponseBuilder rb{ctx, 2};
|
|
|
|
rb.Push(ERROR_INVALID_NRO);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-04-09 17:50:55 +00:00
|
|
|
// Map memory for the NRO
|
2023-07-30 00:43:34 +00:00
|
|
|
VAddr map_location{};
|
2023-07-15 00:16:39 +00:00
|
|
|
const auto map_result{MapNro(&map_location, system.ApplicationProcess(), nro_address,
|
|
|
|
nro_size, bss_address, bss_size, nro_size + bss_size)};
|
|
|
|
if (map_result != ResultSuccess) {
|
2018-11-18 02:40:17 +00:00
|
|
|
IPC::ResponseBuilder rb{ctx, 2};
|
2023-07-15 00:16:39 +00:00
|
|
|
rb.Push(map_result);
|
2018-11-18 02:40:17 +00:00
|
|
|
}
|
2018-10-30 02:12:05 +00:00
|
|
|
|
2020-04-09 17:50:55 +00:00
|
|
|
// Load the NRO into the mapped memory
|
2023-02-13 16:21:43 +00:00
|
|
|
if (const auto result{
|
2023-07-15 00:16:39 +00:00
|
|
|
LoadNro(system.ApplicationProcess(), header, nro_address, map_location)};
|
2020-04-09 17:50:55 +00:00
|
|
|
result.IsError()) {
|
|
|
|
IPC::ResponseBuilder rb{ctx, 2};
|
2023-07-15 00:16:39 +00:00
|
|
|
rb.Push(result);
|
2018-10-30 02:12:05 +00:00
|
|
|
}
|
|
|
|
|
2020-04-09 17:50:55 +00:00
|
|
|
// Track the loaded NRO
|
2023-07-15 00:16:39 +00:00
|
|
|
nro.insert_or_assign(map_location,
|
|
|
|
NROInfo{hash, map_location, nro_size, bss_address, bss_size,
|
2020-06-14 17:28:39 +00:00
|
|
|
header.segment_headers[TEXT_INDEX].memory_size,
|
|
|
|
header.segment_headers[RO_INDEX].memory_size,
|
|
|
|
header.segment_headers[DATA_INDEX].memory_size, nro_address});
|
2018-10-30 02:12:05 +00:00
|
|
|
|
2018-10-23 22:52:01 +00:00
|
|
|
IPC::ResponseBuilder rb{ctx, 4};
|
2021-05-21 05:05:04 +00:00
|
|
|
rb.Push(ResultSuccess);
|
2023-07-15 00:16:39 +00:00
|
|
|
rb.Push(map_location);
|
2020-04-09 17:50:55 +00:00
|
|
|
}
|
|
|
|
|
2022-06-26 03:44:19 +00:00
|
|
|
Result UnmapNro(const NROInfo& info) {
|
2020-04-09 17:50:55 +00:00
|
|
|
// Each region must be unmapped separately to validate memory state
|
2023-07-15 01:43:15 +00:00
|
|
|
auto& page_table{system.ApplicationProcess()->GetPageTable()};
|
2022-01-09 07:23:43 +00:00
|
|
|
|
|
|
|
if (info.bss_size != 0) {
|
2023-07-15 00:16:39 +00:00
|
|
|
R_TRY(page_table.UnmapCodeMemory(
|
2022-04-08 19:31:56 +00:00
|
|
|
info.nro_address + info.text_size + info.ro_size + info.data_size, info.bss_address,
|
|
|
|
info.bss_size, Kernel::KPageTable::ICacheInvalidationStrategy::InvalidateRange));
|
2022-01-09 07:23:43 +00:00
|
|
|
}
|
|
|
|
|
2023-07-15 00:16:39 +00:00
|
|
|
R_TRY(page_table.UnmapCodeMemory(
|
2022-04-08 19:31:56 +00:00
|
|
|
info.nro_address + info.text_size + info.ro_size,
|
|
|
|
info.src_addr + info.text_size + info.ro_size, info.data_size,
|
|
|
|
Kernel::KPageTable::ICacheInvalidationStrategy::InvalidateRange));
|
2023-07-15 00:16:39 +00:00
|
|
|
R_TRY(page_table.UnmapCodeMemory(
|
2022-04-08 19:31:56 +00:00
|
|
|
info.nro_address + info.text_size, info.src_addr + info.text_size, info.ro_size,
|
|
|
|
Kernel::KPageTable::ICacheInvalidationStrategy::InvalidateRange));
|
2023-07-15 00:16:39 +00:00
|
|
|
R_TRY(page_table.UnmapCodeMemory(
|
2022-04-08 19:31:56 +00:00
|
|
|
info.nro_address, info.src_addr, info.text_size,
|
|
|
|
Kernel::KPageTable::ICacheInvalidationStrategy::InvalidateRange));
|
2021-05-21 05:05:04 +00:00
|
|
|
return ResultSuccess;
|
2018-10-30 02:12:05 +00:00
|
|
|
}
|
2018-10-30 13:10:55 +00:00
|
|
|
|
2023-02-19 19:42:12 +00:00
|
|
|
void UnloadModule(HLERequestContext& ctx) {
|
2018-10-30 13:10:55 +00:00
|
|
|
if (!initialized) {
|
|
|
|
LOG_ERROR(Service_LDR, "LDR:RO not initialized before use!");
|
|
|
|
IPC::ResponseBuilder rb{ctx, 2};
|
|
|
|
rb.Push(ERROR_NOT_INITIALIZED);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-04-10 06:37:34 +00:00
|
|
|
struct Parameters {
|
|
|
|
u64_le process_id;
|
|
|
|
u64_le nro_address;
|
|
|
|
};
|
|
|
|
|
|
|
|
IPC::RequestParser rp{ctx};
|
|
|
|
const auto [process_id, nro_address] = rp.PopRaw<Parameters>();
|
|
|
|
LOG_DEBUG(Service_LDR, "called with process_id={:016X}, nro_address=0x{:016X}", process_id,
|
|
|
|
nro_address);
|
|
|
|
|
|
|
|
if (!Common::Is4KBAligned(nro_address)) {
|
|
|
|
LOG_ERROR(Service_LDR, "NRO address has invalid alignment (nro_address=0x{:016X})",
|
|
|
|
nro_address);
|
2018-10-30 13:10:55 +00:00
|
|
|
IPC::ResponseBuilder rb{ctx, 2};
|
|
|
|
rb.Push(ERROR_INVALID_ALIGNMENT);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-04-10 06:37:34 +00:00
|
|
|
const auto iter = nro.find(nro_address);
|
2018-10-30 13:10:55 +00:00
|
|
|
if (iter == nro.end()) {
|
|
|
|
LOG_ERROR(Service_LDR,
|
2019-04-10 06:37:34 +00:00
|
|
|
"The NRO attempting to be unmapped was not mapped or has an invalid address "
|
|
|
|
"(nro_address=0x{:016X})!",
|
|
|
|
nro_address);
|
2018-10-30 13:10:55 +00:00
|
|
|
IPC::ResponseBuilder rb{ctx, 2};
|
|
|
|
rb.Push(ERROR_INVALID_NRO_ADDRESS);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-04-17 04:59:08 +00:00
|
|
|
const auto result{UnmapNro(iter->second)};
|
2018-10-30 13:10:55 +00:00
|
|
|
|
|
|
|
nro.erase(iter);
|
2020-04-09 17:50:55 +00:00
|
|
|
|
2018-10-30 13:10:55 +00:00
|
|
|
IPC::ResponseBuilder rb{ctx, 2};
|
2020-04-09 17:50:55 +00:00
|
|
|
|
|
|
|
rb.Push(result);
|
2018-10-23 22:52:01 +00:00
|
|
|
}
|
|
|
|
|
2023-02-19 19:42:12 +00:00
|
|
|
void Initialize(HLERequestContext& ctx) {
|
2018-11-26 06:06:13 +00:00
|
|
|
LOG_WARNING(Service_LDR, "(STUBBED) called");
|
|
|
|
|
2018-10-30 02:12:05 +00:00
|
|
|
initialized = true;
|
2023-03-18 01:26:04 +00:00
|
|
|
current_map_addr =
|
2023-07-15 01:43:15 +00:00
|
|
|
GetInteger(system.ApplicationProcess()->GetPageTable().GetAliasCodeRegionStart());
|
2018-10-30 02:12:05 +00:00
|
|
|
|
2018-10-23 22:52:01 +00:00
|
|
|
IPC::ResponseBuilder rb{ctx, 2};
|
2021-05-21 05:05:04 +00:00
|
|
|
rb.Push(ResultSuccess);
|
2018-10-23 22:52:01 +00:00
|
|
|
}
|
2018-10-30 02:03:59 +00:00
|
|
|
|
|
|
|
private:
|
2020-04-09 17:50:55 +00:00
|
|
|
bool initialized{};
|
2018-10-30 02:03:59 +00:00
|
|
|
|
|
|
|
std::map<VAddr, NROInfo> nro;
|
|
|
|
std::map<VAddr, std::vector<SHA256Hash>> nrr;
|
2022-03-03 02:06:26 +00:00
|
|
|
VAddr current_map_addr{};
|
2018-10-30 13:10:55 +00:00
|
|
|
|
2019-04-10 07:02:39 +00:00
|
|
|
bool IsValidNROHash(const SHA256Hash& hash) const {
|
|
|
|
return std::any_of(nrr.begin(), nrr.end(), [&hash](const auto& p) {
|
|
|
|
return std::find(p.second.begin(), p.second.end(), hash) != p.second.end();
|
|
|
|
});
|
2018-10-30 13:10:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static bool IsValidNRO(const NROHeader& header, u64 nro_size, u64 bss_size) {
|
2020-06-16 18:24:58 +00:00
|
|
|
return header.magic == Common::MakeMagic('N', 'R', 'O', '0') &&
|
|
|
|
header.nro_size == nro_size && header.bss_size == bss_size &&
|
2020-06-14 17:28:39 +00:00
|
|
|
|
2020-06-16 18:24:58 +00:00
|
|
|
header.segment_headers[RO_INDEX].memory_offset ==
|
|
|
|
header.segment_headers[TEXT_INDEX].memory_offset +
|
|
|
|
header.segment_headers[TEXT_INDEX].memory_size &&
|
2020-06-14 17:28:39 +00:00
|
|
|
|
2020-06-16 18:24:58 +00:00
|
|
|
header.segment_headers[DATA_INDEX].memory_offset ==
|
|
|
|
header.segment_headers[RO_INDEX].memory_offset +
|
|
|
|
header.segment_headers[RO_INDEX].memory_size &&
|
2020-06-14 17:28:39 +00:00
|
|
|
|
2020-06-16 18:24:58 +00:00
|
|
|
nro_size == header.segment_headers[DATA_INDEX].memory_offset +
|
|
|
|
header.segment_headers[DATA_INDEX].memory_size &&
|
2020-06-14 17:28:39 +00:00
|
|
|
|
2020-06-16 18:24:58 +00:00
|
|
|
Common::Is4KBAligned(header.segment_headers[TEXT_INDEX].memory_size) &&
|
|
|
|
Common::Is4KBAligned(header.segment_headers[RO_INDEX].memory_size) &&
|
|
|
|
Common::Is4KBAligned(header.segment_headers[DATA_INDEX].memory_size);
|
2018-10-30 13:10:55 +00:00
|
|
|
}
|
2018-07-26 02:57:08 +00:00
|
|
|
};
|
|
|
|
|
2023-02-18 21:26:48 +00:00
|
|
|
void LoopProcess(Core::System& system) {
|
|
|
|
auto server_manager = std::make_unique<ServerManager>(system);
|
|
|
|
|
|
|
|
server_manager->RegisterNamedService("ldr:dmnt", std::make_shared<DebugMonitor>(system));
|
|
|
|
server_manager->RegisterNamedService("ldr:pm", std::make_shared<ProcessManager>(system));
|
|
|
|
server_manager->RegisterNamedService("ldr:shel", std::make_shared<Shell>(system));
|
|
|
|
server_manager->RegisterNamedService("ldr:ro", std::make_shared<RelocatableObject>(system));
|
|
|
|
|
|
|
|
ServerManager::RunServer(std::move(server_manager));
|
2018-07-26 02:57:08 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
} // namespace Service::LDR
|