2019-06-24 11:05:51 +02:00
|
|
|
/*
|
2021-10-04 21:59:10 +02:00
|
|
|
* Copyright (c) Atmosphère-NX
|
2019-06-24 11:05:51 +02:00
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify it
|
|
|
|
* under the terms and conditions of the GNU General Public License,
|
|
|
|
* version 2, as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope it will be useful, but WITHOUT
|
|
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
|
|
|
|
* more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
2020-05-12 00:02:10 +02:00
|
|
|
#include <stratosphere.hpp>
|
2021-10-05 21:22:34 +02:00
|
|
|
#include "ro_map_utils.hpp"
|
2019-06-24 11:05:51 +02:00
|
|
|
#include "ro_nrr_utils.hpp"
|
|
|
|
#include "ro_nro_utils.hpp"
|
|
|
|
#include "ro_patcher.hpp"
|
|
|
|
#include "ro_service_impl.hpp"
|
|
|
|
|
2019-10-24 11:30:10 +02:00
|
|
|
namespace ams::ro::impl {
|
2019-06-24 11:05:51 +02:00
|
|
|
|
|
|
|
namespace {
|
|
|
|
|
|
|
|
/* Convenience definitions. */
|
2020-02-25 03:02:01 +01:00
|
|
|
constexpr size_t MaxSessions = 0x3; /* 2 official sessions (applet + application, 1 homebrew session). */
|
2019-06-24 11:05:51 +02:00
|
|
|
constexpr size_t MaxNrrInfos = 0x40;
|
|
|
|
constexpr size_t MaxNroInfos = 0x40;
|
|
|
|
|
|
|
|
/* Types. */
|
|
|
|
struct Sha256Hash {
|
2020-02-25 03:02:01 +01:00
|
|
|
u8 hash[crypto::Sha256Generator::HashSize];
|
2019-06-24 11:05:51 +02:00
|
|
|
|
|
|
|
bool operator==(const Sha256Hash &o) const {
|
2020-02-25 03:02:01 +01:00
|
|
|
return std::memcmp(this, std::addressof(o), sizeof(*this)) == 0;
|
2019-06-24 11:05:51 +02:00
|
|
|
}
|
|
|
|
bool operator!=(const Sha256Hash &o) const {
|
2020-02-25 03:02:01 +01:00
|
|
|
return std::memcmp(this, std::addressof(o), sizeof(*this)) != 0;
|
2019-06-24 11:05:51 +02:00
|
|
|
}
|
|
|
|
bool operator<(const Sha256Hash &o) const {
|
2020-02-25 03:02:01 +01:00
|
|
|
return std::memcmp(this, std::addressof(o), sizeof(*this)) < 0;
|
2019-06-24 11:05:51 +02:00
|
|
|
}
|
|
|
|
bool operator>(const Sha256Hash &o) const {
|
2020-02-25 03:02:01 +01:00
|
|
|
return std::memcmp(this, std::addressof(o), sizeof(*this)) > 0;
|
2019-06-24 11:05:51 +02:00
|
|
|
}
|
|
|
|
};
|
2020-02-25 03:02:01 +01:00
|
|
|
static_assert(sizeof(Sha256Hash) == sizeof(Sha256Hash::hash));
|
2019-06-24 11:05:51 +02:00
|
|
|
|
|
|
|
struct NroInfo {
|
|
|
|
u64 base_address;
|
|
|
|
u64 nro_heap_address;
|
|
|
|
u64 nro_heap_size;
|
|
|
|
u64 bss_heap_address;
|
|
|
|
u64 bss_heap_size;
|
|
|
|
u64 code_size;
|
|
|
|
u64 rw_size;
|
|
|
|
ModuleId module_id;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct NrrInfo {
|
2020-02-25 03:02:01 +01:00
|
|
|
const NrrHeader *mapped_header;
|
2019-06-24 11:05:51 +02:00
|
|
|
u64 nrr_heap_address;
|
|
|
|
u64 nrr_heap_size;
|
|
|
|
u64 mapped_code_address;
|
2020-02-25 03:17:33 +01:00
|
|
|
|
|
|
|
/* Verification. */
|
|
|
|
u32 cached_signed_area_size;
|
|
|
|
u32 cached_hashes_offset;
|
|
|
|
u32 cached_num_hashes;
|
|
|
|
u8 cached_signed_area[sizeof(NrrHeader) - NrrHeader::GetSignedAreaOffset()];
|
2020-02-25 03:02:01 +01:00
|
|
|
Sha256Hash signed_area_hash;
|
2019-06-24 11:05:51 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
struct ProcessContext {
|
2021-10-10 09:14:06 +02:00
|
|
|
private:
|
|
|
|
bool m_nro_in_use[MaxNroInfos]{};
|
|
|
|
bool m_nrr_in_use[MaxNrrInfos]{};
|
|
|
|
NroInfo m_nro_infos[MaxNroInfos]{};
|
|
|
|
NrrInfo m_nrr_infos[MaxNrrInfos]{};
|
|
|
|
os::NativeHandle m_process_handle = os::InvalidNativeHandle;
|
|
|
|
os::ProcessId m_process_id = os::InvalidProcessId;
|
|
|
|
bool m_in_use{};
|
|
|
|
public:
|
|
|
|
constexpr ProcessContext() = default;
|
|
|
|
|
|
|
|
void Initialize(os::NativeHandle process_handle, os::ProcessId process_id) {
|
|
|
|
AMS_ABORT_UNLESS(!m_in_use);
|
|
|
|
|
|
|
|
std::memset(m_nro_in_use, 0, sizeof(m_nro_in_use));
|
|
|
|
std::memset(m_nrr_in_use, 0, sizeof(m_nrr_in_use));
|
|
|
|
std::memset(m_nro_infos, 0, sizeof(m_nro_infos));
|
|
|
|
std::memset(m_nrr_infos, 0, sizeof(m_nrr_infos));
|
|
|
|
|
|
|
|
m_process_handle = process_handle;
|
|
|
|
m_process_id = process_id;
|
|
|
|
m_in_use = true;
|
2019-06-24 11:05:51 +02:00
|
|
|
}
|
|
|
|
|
2021-10-10 09:14:06 +02:00
|
|
|
void Finalize() {
|
|
|
|
AMS_ABORT_UNLESS(m_in_use);
|
|
|
|
|
|
|
|
if (m_process_handle != os::InvalidNativeHandle) {
|
|
|
|
for (size_t i = 0; i < MaxNrrInfos; i++) {
|
|
|
|
if (m_nrr_in_use[i]) {
|
|
|
|
UnmapNrr(m_process_handle, m_nrr_infos[i].mapped_header, m_nrr_infos[i].nrr_heap_address, m_nrr_infos[i].nrr_heap_size, m_nrr_infos[i].mapped_code_address);
|
|
|
|
}
|
2019-06-24 11:05:51 +02:00
|
|
|
}
|
2021-10-10 09:14:06 +02:00
|
|
|
os::CloseNativeHandle(m_process_handle);
|
2019-06-24 11:05:51 +02:00
|
|
|
}
|
2021-10-10 09:14:06 +02:00
|
|
|
|
|
|
|
std::memset(m_nro_in_use, 0, sizeof(m_nro_in_use));
|
|
|
|
std::memset(m_nrr_in_use, 0, sizeof(m_nrr_in_use));
|
|
|
|
std::memset(m_nro_infos, 0, sizeof(m_nro_infos));
|
|
|
|
std::memset(m_nrr_infos, 0, sizeof(m_nrr_infos));
|
|
|
|
|
|
|
|
m_process_handle = os::InvalidNativeHandle;
|
|
|
|
m_process_id = os::InvalidProcessId;
|
|
|
|
|
|
|
|
m_in_use = false;
|
2019-06-24 11:05:51 +02:00
|
|
|
}
|
|
|
|
|
2021-10-10 09:14:06 +02:00
|
|
|
os::NativeHandle GetProcessHandle() const {
|
|
|
|
return m_process_handle;
|
|
|
|
}
|
|
|
|
|
|
|
|
os::ProcessId GetProcessId() const {
|
|
|
|
return m_process_id;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool IsFree() const {
|
|
|
|
return !m_in_use;
|
|
|
|
}
|
|
|
|
|
|
|
|
ncm::ProgramId GetProgramId(os::NativeHandle other_process_h) const {
|
|
|
|
/* Automatically select a handle, allowing for override. */
|
|
|
|
if (other_process_h != os::InvalidNativeHandle) {
|
|
|
|
return os::GetProgramId(other_process_h);
|
|
|
|
} else {
|
|
|
|
return os::GetProgramId(m_process_handle);
|
2019-06-24 11:05:51 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-10-10 09:14:06 +02:00
|
|
|
Result GetNrrInfoByAddress(NrrInfo **out, u64 nrr_heap_address) {
|
|
|
|
for (size_t i = 0; i < MaxNrrInfos; i++) {
|
|
|
|
if (m_nrr_in_use[i] && m_nrr_infos[i].nrr_heap_address == nrr_heap_address) {
|
|
|
|
if (out != nullptr) {
|
|
|
|
*out = m_nrr_infos + i;
|
|
|
|
}
|
|
|
|
return ResultSuccess();
|
2019-06-24 11:05:51 +02:00
|
|
|
}
|
|
|
|
}
|
2021-10-10 09:14:06 +02:00
|
|
|
return ro::ResultNotRegistered();
|
2019-06-24 11:05:51 +02:00
|
|
|
}
|
|
|
|
|
2021-10-10 09:14:06 +02:00
|
|
|
Result GetFreeNrrInfo(NrrInfo **out) {
|
|
|
|
for (size_t i = 0; i < MaxNrrInfos; i++) {
|
|
|
|
if (!m_nrr_in_use[i]) {
|
|
|
|
if (out != nullptr) {
|
|
|
|
*out = m_nrr_infos + i;
|
|
|
|
}
|
|
|
|
return ResultSuccess();
|
2019-06-24 11:05:51 +02:00
|
|
|
}
|
|
|
|
}
|
2021-10-10 09:14:06 +02:00
|
|
|
return ro::ResultTooManyNrr();
|
2019-06-24 11:05:51 +02:00
|
|
|
}
|
|
|
|
|
2021-10-10 09:14:06 +02:00
|
|
|
Result GetNroInfoByAddress(NroInfo **out, u64 nro_address) {
|
|
|
|
for (size_t i = 0; i < MaxNroInfos; i++) {
|
|
|
|
if (m_nro_in_use[i] && m_nro_infos[i].base_address == nro_address) {
|
|
|
|
if (out != nullptr) {
|
|
|
|
*out = m_nro_infos + i;
|
|
|
|
}
|
|
|
|
return ResultSuccess();
|
2019-06-24 11:05:51 +02:00
|
|
|
}
|
|
|
|
}
|
2021-10-10 09:14:06 +02:00
|
|
|
return ro::ResultNotLoaded();
|
2019-06-24 11:05:51 +02:00
|
|
|
}
|
|
|
|
|
2021-10-10 09:14:06 +02:00
|
|
|
Result GetNroInfoByModuleId(NroInfo **out, const ModuleId *module_id) {
|
|
|
|
for (size_t i = 0; i < MaxNroInfos; i++) {
|
|
|
|
if (m_nro_in_use[i] && std::memcmp(std::addressof(m_nro_infos[i].module_id), module_id, sizeof(*module_id)) == 0) {
|
|
|
|
if (out != nullptr) {
|
|
|
|
*out = m_nro_infos + i;
|
|
|
|
}
|
|
|
|
return ResultSuccess();
|
|
|
|
}
|
2020-02-25 03:02:01 +01:00
|
|
|
}
|
2021-10-10 09:14:06 +02:00
|
|
|
return ro::ResultNotLoaded();
|
|
|
|
}
|
2020-02-25 03:02:01 +01:00
|
|
|
|
2021-10-10 09:14:06 +02:00
|
|
|
Result GetFreeNroInfo(NroInfo **out) {
|
|
|
|
for (size_t i = 0; i < MaxNroInfos; i++) {
|
|
|
|
if (!m_nro_in_use[i]) {
|
|
|
|
if (out != nullptr) {
|
|
|
|
*out = m_nro_infos + i;
|
|
|
|
}
|
|
|
|
return ResultSuccess();
|
|
|
|
}
|
2020-02-25 03:02:01 +01:00
|
|
|
}
|
2021-10-10 09:14:06 +02:00
|
|
|
return ro::ResultTooManyNro();
|
|
|
|
}
|
2020-02-25 03:02:01 +01:00
|
|
|
|
2021-10-10 09:14:06 +02:00
|
|
|
Result ValidateHasNroHash(const NroHeader *nro_header) const {
|
|
|
|
/* Calculate hash. */
|
|
|
|
Sha256Hash hash;
|
|
|
|
crypto::GenerateSha256Hash(std::addressof(hash), sizeof(hash), nro_header, nro_header->GetSize());
|
2020-02-25 03:02:01 +01:00
|
|
|
|
2021-10-10 09:14:06 +02:00
|
|
|
for (size_t i = 0; i < MaxNrrInfos; i++) {
|
|
|
|
/* Ensure we only check NRRs that are used. */
|
|
|
|
if (!m_nrr_in_use[i]) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Get the mapped header, ensure that it has hashes. */
|
|
|
|
const NrrHeader *mapped_nrr_header = m_nrr_infos[i].mapped_header;
|
|
|
|
const size_t mapped_num_hashes = mapped_nrr_header->GetNumHashes();
|
|
|
|
if (mapped_num_hashes == 0) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Locate the hash within the mapped array. */
|
|
|
|
const Sha256Hash *mapped_nro_hashes_start = reinterpret_cast<const Sha256Hash *>(mapped_nrr_header->GetHashes());
|
|
|
|
const Sha256Hash *mapped_nro_hashes_end = mapped_nro_hashes_start + mapped_nrr_header->GetNumHashes();
|
|
|
|
|
|
|
|
const Sha256Hash *mapped_lower_bound = std::lower_bound(mapped_nro_hashes_start, mapped_nro_hashes_end, hash);
|
|
|
|
if (mapped_lower_bound == mapped_nro_hashes_end || (*mapped_lower_bound != hash)) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check that the hash entry is valid, since our heuristic passed. */
|
|
|
|
const void *nrr_hash = std::addressof(m_nrr_infos[i].signed_area_hash);
|
|
|
|
const void *signed_area = m_nrr_infos[i].cached_signed_area;
|
|
|
|
const size_t signed_area_size = m_nrr_infos[i].cached_signed_area_size;
|
|
|
|
const size_t hashes_offset = m_nrr_infos[i].cached_hashes_offset;
|
|
|
|
const size_t num_hashes = m_nrr_infos[i].cached_num_hashes;
|
|
|
|
const u8 *hash_table = reinterpret_cast<const u8 *>(mapped_nro_hashes_start);
|
|
|
|
if (!ValidateNrrHashTableEntry(signed_area, signed_area_size, hashes_offset, num_hashes, nrr_hash, hash_table, std::addressof(hash))) {
|
|
|
|
continue;
|
|
|
|
}
|
2020-02-25 03:02:01 +01:00
|
|
|
|
2021-10-10 09:14:06 +02:00
|
|
|
/* The hash is valid! */
|
|
|
|
return ResultSuccess();
|
2019-06-24 11:05:51 +02:00
|
|
|
}
|
2020-02-25 03:02:01 +01:00
|
|
|
|
2021-10-10 09:14:06 +02:00
|
|
|
return ro::ResultNotAuthorized();
|
|
|
|
}
|
|
|
|
|
|
|
|
Result ValidateNro(ModuleId *out_module_id, u64 *out_rx_size, u64 *out_ro_size, u64 *out_rw_size, u64 base_address, u64 expected_nro_size, u64 expected_bss_size) {
|
|
|
|
/* Find space to map the NRO. */
|
|
|
|
uintptr_t map_address;
|
|
|
|
R_UNLESS(R_SUCCEEDED(SearchFreeRegion(std::addressof(map_address), expected_nro_size)), ro::ResultOutOfAddressSpace());
|
|
|
|
|
|
|
|
/* Actually map the NRO. */
|
|
|
|
AutoCloseMap nro_map(map_address, m_process_handle, base_address, expected_nro_size);
|
|
|
|
R_TRY(nro_map.GetResult());
|
|
|
|
|
|
|
|
/* Validate header. */
|
|
|
|
const NroHeader *header = reinterpret_cast<const NroHeader *>(map_address);
|
|
|
|
R_UNLESS(header->IsMagicValid(), ro::ResultInvalidNro());
|
|
|
|
|
|
|
|
/* Read sizes from header. */
|
|
|
|
const u64 nro_size = header->GetSize();
|
|
|
|
const u64 text_ofs = header->GetTextOffset();
|
|
|
|
const u64 text_size = header->GetTextSize();
|
|
|
|
const u64 ro_ofs = header->GetRoOffset();
|
|
|
|
const u64 ro_size = header->GetRoSize();
|
|
|
|
const u64 rw_ofs = header->GetRwOffset();
|
|
|
|
const u64 rw_size = header->GetRwSize();
|
|
|
|
const u64 bss_size = header->GetBssSize();
|
|
|
|
|
|
|
|
/* Validate sizes meet expected. */
|
|
|
|
R_UNLESS(nro_size == expected_nro_size, ro::ResultInvalidNro());
|
|
|
|
R_UNLESS(bss_size == expected_bss_size, ro::ResultInvalidNro());
|
|
|
|
|
|
|
|
/* Validate all sizes are aligned. */
|
|
|
|
R_UNLESS(util::IsAligned(text_size, os::MemoryPageSize), ro::ResultInvalidNro());
|
|
|
|
R_UNLESS(util::IsAligned(ro_size, os::MemoryPageSize), ro::ResultInvalidNro());
|
|
|
|
R_UNLESS(util::IsAligned(rw_size, os::MemoryPageSize), ro::ResultInvalidNro());
|
|
|
|
R_UNLESS(util::IsAligned(bss_size, os::MemoryPageSize), ro::ResultInvalidNro());
|
|
|
|
|
|
|
|
/* Validate sections are in order. */
|
|
|
|
R_UNLESS(text_ofs <= ro_ofs, ro::ResultInvalidNro());
|
|
|
|
R_UNLESS(ro_ofs <= rw_ofs, ro::ResultInvalidNro());
|
|
|
|
|
|
|
|
/* Validate sections are sequential and contiguous. */
|
|
|
|
R_UNLESS(text_ofs == 0, ro::ResultInvalidNro());
|
|
|
|
R_UNLESS(text_ofs + text_size == ro_ofs, ro::ResultInvalidNro());
|
|
|
|
R_UNLESS(ro_ofs + ro_size == rw_ofs, ro::ResultInvalidNro());
|
|
|
|
R_UNLESS(rw_ofs + rw_size == nro_size, ro::ResultInvalidNro());
|
|
|
|
|
|
|
|
/* Verify NRO hash. */
|
|
|
|
R_TRY(this->ValidateHasNroHash(header));
|
|
|
|
|
|
|
|
/* Check if NRO has already been loaded. */
|
|
|
|
const ModuleId *module_id = header->GetModuleId();
|
|
|
|
R_UNLESS(R_FAILED(this->GetNroInfoByModuleId(nullptr, module_id)), ro::ResultAlreadyLoaded());
|
|
|
|
|
|
|
|
/* Apply patches to NRO. */
|
|
|
|
LocateAndApplyIpsPatchesToModule(module_id, reinterpret_cast<u8 *>(map_address), nro_size);
|
|
|
|
|
|
|
|
/* Copy to output. */
|
|
|
|
*out_module_id = *module_id;
|
|
|
|
*out_rx_size = text_size;
|
|
|
|
*out_ro_size = ro_size;
|
|
|
|
*out_rw_size = rw_size;
|
2020-02-25 03:02:01 +01:00
|
|
|
return ResultSuccess();
|
2019-06-24 11:05:51 +02:00
|
|
|
}
|
|
|
|
|
2021-10-10 09:14:06 +02:00
|
|
|
void SetNrrInfoInUse(const NrrInfo *info, bool in_use) {
|
|
|
|
AMS_ASSERT(std::addressof(m_nrr_infos[0]) <= info && info <= std::addressof(m_nrr_infos[MaxNrrInfos - 1]));
|
|
|
|
const size_t index = info - std::addressof(m_nrr_infos[0]);
|
|
|
|
m_nrr_in_use[index] = in_use;
|
|
|
|
}
|
2019-06-24 11:05:51 +02:00
|
|
|
|
2021-10-10 09:14:06 +02:00
|
|
|
void SetNroInfoInUse(const NroInfo *info, bool in_use) {
|
|
|
|
AMS_ASSERT(std::addressof(m_nro_infos[0]) <= info && info <= std::addressof(m_nro_infos[MaxNroInfos - 1]));
|
|
|
|
const size_t index = info - std::addressof(m_nro_infos[0]);
|
|
|
|
m_nro_in_use[index] = in_use;
|
|
|
|
}
|
2020-02-25 01:47:07 +01:00
|
|
|
|
2021-10-10 09:14:06 +02:00
|
|
|
void GetProcessModuleInfo(u32 *out_count, LoaderModuleInfo *out_infos, size_t max_out_count) const {
|
|
|
|
size_t count = 0;
|
2020-02-25 01:47:07 +01:00
|
|
|
|
2021-10-10 09:14:06 +02:00
|
|
|
for (size_t i = 0; i < MaxNroInfos && count < max_out_count; i++) {
|
|
|
|
if (!m_nro_in_use[i]) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
const NroInfo *nro_info = m_nro_infos + i;
|
|
|
|
|
|
|
|
/* Just copy out the info. */
|
|
|
|
LoaderModuleInfo *out_info = std::addressof(out_infos[count++]);
|
|
|
|
memcpy(out_info->build_id, std::addressof(nro_info->module_id), sizeof(nro_info->module_id));
|
|
|
|
out_info->base_address = nro_info->base_address;
|
|
|
|
out_info->size = nro_info->nro_heap_size + nro_info->bss_heap_size;
|
|
|
|
}
|
|
|
|
|
|
|
|
*out_count = static_cast<u32>(count);
|
|
|
|
}
|
2019-06-24 11:05:51 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
/* Globals. */
|
2021-10-10 09:14:06 +02:00
|
|
|
constinit ProcessContext g_process_contexts[MaxSessions] = {};
|
|
|
|
constinit bool g_is_development_hardware = false;
|
|
|
|
constinit bool g_is_development_function_enabled = false;
|
2019-06-24 11:05:51 +02:00
|
|
|
|
|
|
|
/* Context Helpers. */
|
|
|
|
ProcessContext *GetContextById(size_t context_id) {
|
|
|
|
if (context_id == InvalidContextId) {
|
|
|
|
return nullptr;
|
|
|
|
}
|
2019-09-28 03:04:58 +02:00
|
|
|
|
2020-02-23 08:05:14 +01:00
|
|
|
AMS_ABORT_UNLESS(context_id < MaxSessions);
|
2021-10-09 21:45:31 +02:00
|
|
|
return g_process_contexts + context_id;
|
2019-06-24 11:05:51 +02:00
|
|
|
}
|
|
|
|
|
2019-10-11 08:49:28 +02:00
|
|
|
ProcessContext *GetContextByProcessId(os::ProcessId process_id) {
|
2019-06-24 11:05:51 +02:00
|
|
|
for (size_t i = 0; i < MaxSessions; i++) {
|
2021-10-10 09:14:06 +02:00
|
|
|
if (g_process_contexts[i].GetProcessId() == process_id) {
|
2021-10-09 21:45:31 +02:00
|
|
|
return g_process_contexts + i;
|
2019-06-24 11:05:51 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
2021-10-04 21:33:09 +02:00
|
|
|
size_t AllocateContext(os::NativeHandle process_handle, os::ProcessId process_id) {
|
2019-06-24 11:05:51 +02:00
|
|
|
/* Find a free process context. */
|
|
|
|
for (size_t i = 0; i < MaxSessions; i++) {
|
2021-10-09 21:45:31 +02:00
|
|
|
ProcessContext *context = g_process_contexts + i;
|
2019-09-28 03:04:58 +02:00
|
|
|
|
2021-10-10 09:14:06 +02:00
|
|
|
if (context->IsFree()) {
|
|
|
|
context->Initialize(process_handle, process_id);
|
2019-06-24 11:05:51 +02:00
|
|
|
return i;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* Failure to find a free context is actually an abort condition. */
|
2020-02-23 08:05:14 +01:00
|
|
|
AMS_ABORT_UNLESS(false);
|
2019-06-24 11:05:51 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
void FreeContext(size_t context_id) {
|
2021-10-10 09:14:06 +02:00
|
|
|
if (ProcessContext *context = GetContextById(context_id); context != nullptr) {
|
|
|
|
context->Finalize();
|
2019-06-24 11:05:51 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-12-08 03:13:16 +01:00
|
|
|
constexpr inline Result ValidateAddressAndNonZeroSize(u64 address, u64 size) {
|
2021-10-05 21:22:34 +02:00
|
|
|
R_UNLESS(util::IsAligned(address, os::MemoryPageSize), ro::ResultInvalidAddress());
|
|
|
|
R_UNLESS(size != 0, ro::ResultInvalidSize());
|
|
|
|
R_UNLESS(util::IsAligned(size, os::MemoryPageSize), ro::ResultInvalidSize());
|
|
|
|
R_UNLESS(address < address + size, ro::ResultInvalidSize());
|
2019-10-24 10:40:44 +02:00
|
|
|
return ResultSuccess();
|
|
|
|
}
|
|
|
|
|
2019-12-08 03:13:16 +01:00
|
|
|
constexpr inline Result ValidateAddressAndSize(u64 address, u64 size) {
|
2021-10-05 21:22:34 +02:00
|
|
|
R_UNLESS(util::IsAligned(address, os::MemoryPageSize), ro::ResultInvalidAddress());
|
|
|
|
R_UNLESS(util::IsAligned(size, os::MemoryPageSize), ro::ResultInvalidSize());
|
|
|
|
R_UNLESS(size == 0 || address < address + size, ro::ResultInvalidSize());
|
2019-12-08 03:13:16 +01:00
|
|
|
return ResultSuccess();
|
|
|
|
}
|
|
|
|
|
2019-06-24 11:05:51 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Access utilities. */
|
|
|
|
void SetDevelopmentHardware(bool is_development_hardware) {
|
|
|
|
g_is_development_hardware = is_development_hardware;
|
|
|
|
}
|
|
|
|
|
|
|
|
void SetDevelopmentFunctionEnabled(bool is_development_function_enabled) {
|
|
|
|
g_is_development_function_enabled = is_development_function_enabled;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool IsDevelopmentHardware() {
|
|
|
|
return g_is_development_hardware;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool IsDevelopmentFunctionEnabled() {
|
|
|
|
return g_is_development_function_enabled;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool ShouldEaseNroRestriction() {
|
|
|
|
/* Retrieve whether we should ease restrictions from set:sys. */
|
2019-11-27 05:58:39 +01:00
|
|
|
u8 should_ease = 0;
|
2021-10-09 23:49:53 +02:00
|
|
|
if (settings::fwdbg::GetSettingsItemValue(std::addressof(should_ease), sizeof(should_ease), "ro", "ease_nro_restriction") != sizeof(should_ease)) {
|
2019-06-24 11:05:51 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Nintendo only allows easing restriction on dev, we will allow on production, as well. */
|
|
|
|
/* should_ease &= IsDevelopmentFunctionEnabled(); */
|
2019-11-27 05:58:39 +01:00
|
|
|
return should_ease != 0;
|
2019-06-24 11:05:51 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Context utilities. */
|
2021-10-05 09:11:36 +02:00
|
|
|
Result RegisterProcess(size_t *out_context_id, sf::NativeHandle &&process_handle, os::ProcessId process_id) {
|
2019-06-24 11:05:51 +02:00
|
|
|
/* Validate process handle. */
|
|
|
|
{
|
|
|
|
/* Validate handle is a valid process handle. */
|
2021-10-05 09:11:36 +02:00
|
|
|
os::ProcessId handle_pid;
|
2021-10-09 23:49:53 +02:00
|
|
|
R_UNLESS(R_SUCCEEDED(os::GetProcessId(std::addressof(handle_pid), process_handle.GetOsHandle())), ro::ResultInvalidProcess());
|
2019-06-24 11:05:51 +02:00
|
|
|
|
|
|
|
/* Validate process id. */
|
2021-10-05 21:22:34 +02:00
|
|
|
R_UNLESS(handle_pid == process_id, ro::ResultInvalidProcess());
|
2019-06-24 11:05:51 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Check if a process context already exists. */
|
2021-10-05 21:22:34 +02:00
|
|
|
R_UNLESS(GetContextByProcessId(process_id) == nullptr, ro::ResultInvalidSession());
|
2019-06-24 11:05:51 +02:00
|
|
|
|
2021-10-04 21:33:09 +02:00
|
|
|
/* Allocate a context to manage the process handle. */
|
2021-10-05 09:11:36 +02:00
|
|
|
*out_context_id = AllocateContext(process_handle.GetOsHandle(), process_id);
|
|
|
|
process_handle.Detach();
|
2021-10-04 21:33:09 +02:00
|
|
|
|
2019-10-24 10:40:44 +02:00
|
|
|
return ResultSuccess();
|
2019-06-24 11:05:51 +02:00
|
|
|
}
|
|
|
|
|
2019-10-11 08:49:28 +02:00
|
|
|
Result ValidateProcess(size_t context_id, os::ProcessId process_id) {
|
2019-06-24 11:05:51 +02:00
|
|
|
const ProcessContext *ctx = GetContextById(context_id);
|
2021-10-10 09:14:06 +02:00
|
|
|
R_UNLESS(ctx != nullptr, ro::ResultInvalidProcess());
|
|
|
|
R_UNLESS(ctx->GetProcessId() == process_id, ro::ResultInvalidProcess());
|
2019-10-24 10:40:44 +02:00
|
|
|
return ResultSuccess();
|
2019-06-24 11:05:51 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
void UnregisterProcess(size_t context_id) {
|
|
|
|
FreeContext(context_id);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Service implementations. */
|
2021-10-04 21:33:09 +02:00
|
|
|
Result RegisterModuleInfo(size_t context_id, os::NativeHandle process_handle, u64 nrr_address, u64 nrr_size, NrrKind nrr_kind, bool enforce_nrr_kind) {
|
2019-06-24 11:05:51 +02:00
|
|
|
/* Get context. */
|
|
|
|
ProcessContext *context = GetContextById(context_id);
|
2020-02-23 08:05:14 +01:00
|
|
|
AMS_ABORT_UNLESS(context != nullptr);
|
2019-06-24 11:05:51 +02:00
|
|
|
|
2019-10-28 05:43:01 +01:00
|
|
|
/* Get program id. */
|
2021-10-04 21:33:09 +02:00
|
|
|
const ncm::ProgramId program_id = context->GetProgramId(process_handle);
|
2019-06-24 11:05:51 +02:00
|
|
|
|
|
|
|
/* Validate address/size. */
|
2019-12-08 03:13:16 +01:00
|
|
|
R_TRY(ValidateAddressAndNonZeroSize(nrr_address, nrr_size));
|
2019-06-24 11:05:51 +02:00
|
|
|
|
|
|
|
/* Check we have space for a new NRR. */
|
|
|
|
NrrInfo *nrr_info = nullptr;
|
2021-10-09 23:49:53 +02:00
|
|
|
R_TRY(context->GetFreeNrrInfo(std::addressof(nrr_info)));
|
2019-06-24 11:05:51 +02:00
|
|
|
|
2020-02-25 03:02:01 +01:00
|
|
|
/* Prepare to cache the NRR's signature hash. */
|
|
|
|
Sha256Hash signed_area_hash;
|
|
|
|
ON_SCOPE_EXIT { crypto::ClearMemory(std::addressof(signed_area_hash), sizeof(signed_area_hash)); };
|
|
|
|
|
2019-06-24 11:05:51 +02:00
|
|
|
/* Map. */
|
|
|
|
NrrHeader *header = nullptr;
|
|
|
|
u64 mapped_code_address = 0;
|
2021-10-10 09:14:06 +02:00
|
|
|
R_TRY(MapAndValidateNrr(std::addressof(header), std::addressof(mapped_code_address), std::addressof(signed_area_hash), sizeof(signed_area_hash), context->GetProcessHandle(), program_id, nrr_address, nrr_size, nrr_kind, enforce_nrr_kind));
|
2019-06-24 11:05:51 +02:00
|
|
|
|
|
|
|
/* Set NRR info. */
|
2020-02-25 01:47:07 +01:00
|
|
|
context->SetNrrInfoInUse(nrr_info, true);
|
2020-02-25 03:02:01 +01:00
|
|
|
nrr_info->mapped_header = header;
|
2019-06-24 11:05:51 +02:00
|
|
|
nrr_info->nrr_heap_address = nrr_address;
|
|
|
|
nrr_info->nrr_heap_size = nrr_size;
|
|
|
|
nrr_info->mapped_code_address = mapped_code_address;
|
2020-02-25 03:17:33 +01:00
|
|
|
|
|
|
|
nrr_info->cached_signed_area_size = header->GetSignedAreaSize();
|
|
|
|
nrr_info->cached_hashes_offset = header->GetHashesOffset();
|
|
|
|
nrr_info->cached_num_hashes = header->GetNumHashes();
|
|
|
|
|
|
|
|
std::memcpy(nrr_info->cached_signed_area, header->GetSignedArea(), std::min(sizeof(nrr_info->cached_signed_area), header->GetHashesOffset() - header->GetSignedAreaOffset()));
|
2020-02-25 03:02:01 +01:00
|
|
|
std::memcpy(std::addressof(nrr_info->signed_area_hash), std::addressof(signed_area_hash), sizeof(signed_area_hash));
|
2019-06-24 11:05:51 +02:00
|
|
|
|
2019-10-24 10:40:44 +02:00
|
|
|
return ResultSuccess();
|
2019-06-24 11:05:51 +02:00
|
|
|
}
|
|
|
|
|
2020-07-08 02:07:23 +02:00
|
|
|
Result UnregisterModuleInfo(size_t context_id, u64 nrr_address) {
|
2019-06-24 11:05:51 +02:00
|
|
|
/* Get context. */
|
|
|
|
ProcessContext *context = GetContextById(context_id);
|
2020-02-23 08:05:14 +01:00
|
|
|
AMS_ABORT_UNLESS(context != nullptr);
|
2019-06-24 11:05:51 +02:00
|
|
|
|
|
|
|
/* Validate address. */
|
2021-10-05 21:22:34 +02:00
|
|
|
R_UNLESS(util::IsAligned(nrr_address, os::MemoryPageSize), ro::ResultInvalidAddress());
|
2019-06-24 11:05:51 +02:00
|
|
|
|
|
|
|
/* Check the NRR is loaded. */
|
|
|
|
NrrInfo *nrr_info = nullptr;
|
2021-10-09 23:49:53 +02:00
|
|
|
R_TRY(context->GetNrrInfoByAddress(std::addressof(nrr_info), nrr_address));
|
2019-06-24 11:05:51 +02:00
|
|
|
|
|
|
|
/* Unmap. */
|
|
|
|
const NrrInfo nrr_backup = *nrr_info;
|
|
|
|
{
|
|
|
|
/* Nintendo does this unconditionally, whether or not the actual unmap succeeds. */
|
2020-02-25 01:47:07 +01:00
|
|
|
context->SetNrrInfoInUse(nrr_info, false);
|
2019-06-24 11:05:51 +02:00
|
|
|
std::memset(nrr_info, 0, sizeof(*nrr_info));
|
|
|
|
}
|
2021-10-10 09:14:06 +02:00
|
|
|
return UnmapNrr(context->GetProcessHandle(), nrr_backup.mapped_header, nrr_backup.nrr_heap_address, nrr_backup.nrr_heap_size, nrr_backup.mapped_code_address);
|
2019-06-24 11:05:51 +02:00
|
|
|
}
|
|
|
|
|
2020-07-08 02:07:23 +02:00
|
|
|
Result MapManualLoadModuleMemory(u64 *out_address, size_t context_id, u64 nro_address, u64 nro_size, u64 bss_address, u64 bss_size) {
|
2019-06-24 11:05:51 +02:00
|
|
|
/* Get context. */
|
|
|
|
ProcessContext *context = GetContextById(context_id);
|
2020-02-23 08:05:14 +01:00
|
|
|
AMS_ABORT_UNLESS(context != nullptr);
|
2019-06-24 11:05:51 +02:00
|
|
|
|
|
|
|
/* Validate address/size. */
|
2019-12-08 03:13:16 +01:00
|
|
|
R_TRY(ValidateAddressAndNonZeroSize(nro_address, nro_size));
|
2019-10-24 10:40:44 +02:00
|
|
|
R_TRY(ValidateAddressAndSize(bss_address, bss_size));
|
2019-06-24 11:05:51 +02:00
|
|
|
|
|
|
|
const u64 total_size = nro_size + bss_size;
|
2021-10-05 21:22:34 +02:00
|
|
|
R_UNLESS(total_size >= nro_size, ro::ResultInvalidSize());
|
|
|
|
R_UNLESS(total_size >= bss_size, ro::ResultInvalidSize());
|
2019-06-24 11:05:51 +02:00
|
|
|
|
|
|
|
/* Check we have space for a new NRO. */
|
|
|
|
NroInfo *nro_info = nullptr;
|
2021-10-09 23:49:53 +02:00
|
|
|
R_TRY(context->GetFreeNroInfo(std::addressof(nro_info)));
|
2019-06-24 11:05:51 +02:00
|
|
|
nro_info->nro_heap_address = nro_address;
|
|
|
|
nro_info->nro_heap_size = nro_size;
|
|
|
|
nro_info->bss_heap_address = bss_address;
|
|
|
|
nro_info->bss_heap_size = bss_size;
|
|
|
|
|
|
|
|
/* Map the NRO. */
|
2021-10-10 09:14:06 +02:00
|
|
|
R_TRY(MapNro(std::addressof(nro_info->base_address), context->GetProcessHandle(), nro_address, nro_size, bss_address, bss_size));
|
2019-06-24 11:05:51 +02:00
|
|
|
|
|
|
|
/* Validate the NRO (parsing region extents). */
|
2019-10-11 08:49:28 +02:00
|
|
|
u64 rx_size = 0, ro_size = 0, rw_size = 0;
|
2019-10-24 10:40:44 +02:00
|
|
|
{
|
2021-10-10 09:14:06 +02:00
|
|
|
auto unmap_guard = SCOPE_GUARD { UnmapNro(context->GetProcessHandle(), nro_info->base_address, nro_address, bss_address, bss_size, nro_size, 0); };
|
2021-10-09 23:49:53 +02:00
|
|
|
R_TRY(context->ValidateNro(std::addressof(nro_info->module_id), std::addressof(rx_size), std::addressof(ro_size), std::addressof(rw_size), nro_info->base_address, nro_size, bss_size));
|
2019-10-24 10:40:44 +02:00
|
|
|
unmap_guard.Cancel();
|
|
|
|
}
|
2019-06-24 11:05:51 +02:00
|
|
|
|
|
|
|
/* Set NRO perms. */
|
2019-10-24 10:40:44 +02:00
|
|
|
{
|
2021-10-10 09:14:06 +02:00
|
|
|
auto unmap_guard = SCOPE_GUARD { UnmapNro(context->GetProcessHandle(), nro_info->base_address, nro_address, bss_address, bss_size, rx_size + ro_size, rw_size); };
|
|
|
|
R_TRY(SetNroPerms(context->GetProcessHandle(), nro_info->base_address, rx_size, ro_size, rw_size + bss_size));
|
2019-10-24 10:40:44 +02:00
|
|
|
unmap_guard.Cancel();
|
|
|
|
}
|
2019-06-24 11:05:51 +02:00
|
|
|
|
2020-02-25 01:47:07 +01:00
|
|
|
context->SetNroInfoInUse(nro_info, true);
|
2019-06-24 11:05:51 +02:00
|
|
|
nro_info->code_size = rx_size + ro_size;
|
|
|
|
nro_info->rw_size = rw_size;
|
|
|
|
*out_address = nro_info->base_address;
|
2019-10-24 10:40:44 +02:00
|
|
|
return ResultSuccess();
|
2019-06-24 11:05:51 +02:00
|
|
|
}
|
|
|
|
|
2020-07-08 02:07:23 +02:00
|
|
|
Result UnmapManualLoadModuleMemory(size_t context_id, u64 nro_address) {
|
2019-06-24 11:05:51 +02:00
|
|
|
/* Get context. */
|
|
|
|
ProcessContext *context = GetContextById(context_id);
|
2020-02-23 08:05:14 +01:00
|
|
|
AMS_ABORT_UNLESS(context != nullptr);
|
2019-06-24 11:05:51 +02:00
|
|
|
|
|
|
|
/* Validate address. */
|
2021-10-05 21:22:34 +02:00
|
|
|
R_UNLESS(util::IsAligned(nro_address, os::MemoryPageSize), ro::ResultInvalidAddress());
|
2019-06-24 11:05:51 +02:00
|
|
|
|
|
|
|
/* Check the NRO is loaded. */
|
|
|
|
NroInfo *nro_info = nullptr;
|
2021-10-09 23:49:53 +02:00
|
|
|
R_TRY(context->GetNroInfoByAddress(std::addressof(nro_info), nro_address));
|
2019-06-24 11:05:51 +02:00
|
|
|
|
|
|
|
/* Unmap. */
|
|
|
|
const NroInfo nro_backup = *nro_info;
|
|
|
|
{
|
|
|
|
/* Nintendo does this unconditionally, whether or not the actual unmap succeeds. */
|
2020-02-25 01:47:07 +01:00
|
|
|
context->SetNroInfoInUse(nro_info, false);
|
2019-06-24 11:05:51 +02:00
|
|
|
std::memset(nro_info, 0, sizeof(*nro_info));
|
|
|
|
}
|
2021-10-10 09:14:06 +02:00
|
|
|
return UnmapNro(context->GetProcessHandle(), nro_backup.base_address, nro_backup.nro_heap_address, nro_backup.bss_heap_address, nro_backup.bss_heap_size, nro_backup.code_size, nro_backup.rw_size);
|
2019-06-24 11:05:51 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Debug service implementations. */
|
2019-10-11 08:49:28 +02:00
|
|
|
Result GetProcessModuleInfo(u32 *out_count, LoaderModuleInfo *out_infos, size_t max_out_count, os::ProcessId process_id) {
|
2021-10-10 09:14:06 +02:00
|
|
|
if (const ProcessContext *context = GetContextByProcessId(process_id); context != nullptr) {
|
|
|
|
context->GetProcessModuleInfo(out_count, out_infos, max_out_count);
|
2019-06-24 11:05:51 +02:00
|
|
|
}
|
|
|
|
|
2019-10-24 10:40:44 +02:00
|
|
|
return ResultSuccess();
|
2019-06-24 11:05:51 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
}
|