2018-09-07 17:00:13 +02:00
|
|
|
/*
|
2021-10-04 21:59:10 +02:00
|
|
|
* Copyright (c) Atmosphère-NX
|
2018-09-07 17:00:13 +02:00
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify it
|
|
|
|
* under the terms and conditions of the GNU General Public License,
|
|
|
|
* version 2, as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope it will be useful, but WITHOUT
|
|
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
|
|
|
|
* more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
2021-09-12 04:32:14 +02:00
|
|
|
#include <stratosphere.hpp>
|
2021-10-05 21:22:34 +02:00
|
|
|
#include "ldr_auto_close.hpp"
|
2019-06-27 00:46:19 +02:00
|
|
|
#include "ldr_capabilities.hpp"
|
2018-04-22 03:52:49 +02:00
|
|
|
#include "ldr_content_management.hpp"
|
2020-04-14 11:45:28 +02:00
|
|
|
#include "ldr_development_manager.hpp"
|
2019-06-27 00:46:19 +02:00
|
|
|
#include "ldr_launch_record.hpp"
|
|
|
|
#include "ldr_meta.hpp"
|
|
|
|
#include "ldr_patcher.hpp"
|
|
|
|
#include "ldr_process_creation.hpp"
|
|
|
|
#include "ldr_ro_manager.hpp"
|
|
|
|
|
2019-10-24 11:30:10 +02:00
|
|
|
namespace ams::ldr {
|
2019-06-27 00:46:19 +02:00
|
|
|
|
|
|
|
namespace {
|
|
|
|
|
|
|
|
/* Convenience defines. */
|
|
|
|
constexpr size_t SystemResourceSizeMax = 0x1FE00000;
|
|
|
|
|
|
|
|
/* Types. */
|
|
|
|
enum NsoIndex {
|
|
|
|
Nso_Rtld = 0,
|
|
|
|
Nso_Main = 1,
|
|
|
|
Nso_SubSdk0 = 2,
|
|
|
|
Nso_SubSdk1 = 3,
|
|
|
|
Nso_SubSdk2 = 4,
|
|
|
|
Nso_SubSdk3 = 5,
|
|
|
|
Nso_SubSdk4 = 6,
|
|
|
|
Nso_SubSdk5 = 7,
|
|
|
|
Nso_SubSdk6 = 8,
|
|
|
|
Nso_SubSdk7 = 9,
|
|
|
|
Nso_SubSdk8 = 10,
|
|
|
|
Nso_SubSdk9 = 11,
|
|
|
|
Nso_Sdk = 12,
|
|
|
|
Nso_Count,
|
|
|
|
};
|
|
|
|
|
2020-03-09 11:10:12 +01:00
|
|
|
constexpr inline const char *NsoPaths[Nso_Count] = {
|
|
|
|
ENCODE_ATMOSPHERE_CODE_PATH("/rtld"),
|
|
|
|
ENCODE_ATMOSPHERE_CODE_PATH("/main"),
|
|
|
|
ENCODE_ATMOSPHERE_CODE_PATH("/subsdk0"),
|
|
|
|
ENCODE_ATMOSPHERE_CODE_PATH("/subsdk1"),
|
|
|
|
ENCODE_ATMOSPHERE_CODE_PATH("/subsdk2"),
|
|
|
|
ENCODE_ATMOSPHERE_CODE_PATH("/subsdk3"),
|
|
|
|
ENCODE_ATMOSPHERE_CODE_PATH("/subsdk4"),
|
|
|
|
ENCODE_ATMOSPHERE_CODE_PATH("/subsdk5"),
|
|
|
|
ENCODE_ATMOSPHERE_CODE_PATH("/subsdk6"),
|
|
|
|
ENCODE_ATMOSPHERE_CODE_PATH("/subsdk7"),
|
|
|
|
ENCODE_ATMOSPHERE_CODE_PATH("/subsdk8"),
|
|
|
|
ENCODE_ATMOSPHERE_CODE_PATH("/subsdk9"),
|
|
|
|
ENCODE_ATMOSPHERE_CODE_PATH("/sdk"),
|
|
|
|
};
|
2019-06-27 00:46:19 +02:00
|
|
|
|
2020-03-09 11:10:12 +01:00
|
|
|
constexpr const char *GetNsoPath(size_t idx) {
|
|
|
|
AMS_ABORT_UNLESS(idx < Nso_Count);
|
|
|
|
return NsoPaths[idx];
|
2019-06-27 00:46:19 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
struct ProcessInfo {
|
2021-10-04 21:33:09 +02:00
|
|
|
os::NativeHandle process_handle;
|
2019-06-27 00:46:19 +02:00
|
|
|
uintptr_t args_address;
|
|
|
|
size_t args_size;
|
|
|
|
uintptr_t nso_address[Nso_Count];
|
|
|
|
size_t nso_size[Nso_Count];
|
|
|
|
};
|
|
|
|
|
|
|
|
/* Global NSO header cache. */
|
|
|
|
bool g_has_nso[Nso_Count];
|
|
|
|
NsoHeader g_nso_headers[Nso_Count];
|
|
|
|
|
2019-09-12 10:18:58 +02:00
|
|
|
/* Anti-downgrade. */
|
2019-12-11 22:35:22 +01:00
|
|
|
#include "ldr_anti_downgrade_tables.inc"
|
2019-09-12 10:18:58 +02:00
|
|
|
|
2019-10-28 05:43:01 +01:00
|
|
|
Result ValidateProgramVersion(ncm::ProgramId program_id, u32 version) {
|
2020-03-08 09:06:23 +01:00
|
|
|
/* No version verification is done before 8.1.0. */
|
2020-04-14 07:19:44 +02:00
|
|
|
R_SUCCEED_IF(hos::GetVersion() < hos::Version_8_1_0);
|
2020-03-08 09:06:23 +01:00
|
|
|
|
2020-04-14 11:45:28 +02:00
|
|
|
/* No verification is done if development. */
|
|
|
|
R_SUCCEED_IF(IsDevelopmentForAntiDowngradeCheck());
|
|
|
|
|
2020-03-08 09:06:23 +01:00
|
|
|
/* Do version-dependent validation, if compiled to do so. */
|
2019-09-12 10:18:58 +02:00
|
|
|
#ifdef LDR_VALIDATE_PROCESS_VERSION
|
2019-10-28 05:43:01 +01:00
|
|
|
const MinimumProgramVersion *entries = nullptr;
|
2019-10-24 10:40:44 +02:00
|
|
|
size_t num_entries = 0;
|
2020-05-07 07:39:11 +02:00
|
|
|
|
|
|
|
const auto hos_version = hos::GetVersion();
|
2020-12-01 07:06:52 +01:00
|
|
|
if (hos_version >= hos::Version_11_0_0) {
|
|
|
|
entries = g_MinimumProgramVersions1100;
|
|
|
|
num_entries = g_MinimumProgramVersionsCount1100;
|
|
|
|
} else if (hos_version >= hos::Version_10_1_0) {
|
2020-07-14 02:34:48 +02:00
|
|
|
entries = g_MinimumProgramVersions1010;
|
|
|
|
num_entries = g_MinimumProgramVersionsCount1010;
|
2020-07-14 02:44:20 +02:00
|
|
|
} else if (hos_version >= hos::Version_10_0_0) {
|
2020-05-07 07:39:11 +02:00
|
|
|
entries = g_MinimumProgramVersions1000;
|
|
|
|
num_entries = g_MinimumProgramVersionsCount1000;
|
|
|
|
} else if (hos_version >= hos::Version_9_1_0) {
|
|
|
|
entries = g_MinimumProgramVersions910;
|
|
|
|
num_entries = g_MinimumProgramVersionsCount910;
|
|
|
|
} else if (hos_version >= hos::Version_9_0_0) {
|
|
|
|
entries = g_MinimumProgramVersions900;
|
|
|
|
num_entries = g_MinimumProgramVersionsCount900;
|
|
|
|
} else if (hos_version >= hos::Version_8_1_0) {
|
|
|
|
entries = g_MinimumProgramVersions810;
|
|
|
|
num_entries = g_MinimumProgramVersionsCount810;
|
2019-10-24 10:40:44 +02:00
|
|
|
}
|
2019-09-12 10:18:58 +02:00
|
|
|
|
2019-10-24 10:40:44 +02:00
|
|
|
for (size_t i = 0; i < num_entries; i++) {
|
2019-10-28 05:43:01 +01:00
|
|
|
if (entries[i].program_id == program_id) {
|
2019-10-24 10:40:44 +02:00
|
|
|
R_UNLESS(entries[i].version <= version, ResultInvalidVersion());
|
2019-09-12 10:18:58 +02:00
|
|
|
}
|
|
|
|
}
|
2019-10-24 10:40:44 +02:00
|
|
|
#endif
|
|
|
|
return ResultSuccess();
|
2019-09-12 10:18:58 +02:00
|
|
|
}
|
|
|
|
|
2019-06-27 00:46:19 +02:00
|
|
|
/* Helpers. */
|
|
|
|
Result GetProgramInfoFromMeta(ProgramInfo *out, const Meta *meta) {
|
|
|
|
/* Copy basic info. */
|
|
|
|
out->main_thread_priority = meta->npdm->main_thread_priority;
|
|
|
|
out->default_cpu_id = meta->npdm->default_cpu_id;
|
|
|
|
out->main_thread_stack_size = meta->npdm->main_thread_stack_size;
|
2019-10-28 05:43:01 +01:00
|
|
|
out->program_id = meta->aci->program_id;
|
2019-06-27 00:46:19 +02:00
|
|
|
|
|
|
|
/* Copy access controls. */
|
|
|
|
size_t offset = 0;
|
|
|
|
#define COPY_ACCESS_CONTROL(source, which) \
|
|
|
|
({ \
|
|
|
|
const size_t size = meta->source->which##_size; \
|
2019-10-24 10:40:44 +02:00
|
|
|
R_UNLESS(offset + size <= sizeof(out->ac_buffer), ResultInternalError()); \
|
2019-06-27 00:46:19 +02:00
|
|
|
out->source##_##which##_size = size; \
|
|
|
|
std::memcpy(out->ac_buffer + offset, meta->source##_##which, size); \
|
|
|
|
offset += size; \
|
|
|
|
})
|
|
|
|
|
|
|
|
/* Copy all access controls to buffer. */
|
|
|
|
COPY_ACCESS_CONTROL(acid, sac);
|
|
|
|
COPY_ACCESS_CONTROL(aci, sac);
|
|
|
|
COPY_ACCESS_CONTROL(acid, fac);
|
|
|
|
COPY_ACCESS_CONTROL(aci, fah);
|
|
|
|
#undef COPY_ACCESS_CONTROL
|
|
|
|
|
|
|
|
/* Copy flags. */
|
2019-06-28 02:37:33 +02:00
|
|
|
out->flags = caps::GetProgramInfoFlags(meta->acid_kac, meta->acid->kac_size);
|
2019-10-24 10:40:44 +02:00
|
|
|
return ResultSuccess();
|
2019-06-19 20:51:30 +02:00
|
|
|
}
|
|
|
|
|
2019-06-27 00:46:19 +02:00
|
|
|
bool IsApplet(const Meta *meta) {
|
2019-06-28 02:37:33 +02:00
|
|
|
return (caps::GetProgramInfoFlags(meta->aci_kac, meta->aci->kac_size) & ProgramInfoFlag_ApplicationTypeMask) == ProgramInfoFlag_Applet;
|
2019-06-27 00:46:19 +02:00
|
|
|
}
|
2019-06-18 01:29:09 +02:00
|
|
|
|
2019-06-27 00:46:19 +02:00
|
|
|
bool IsApplication(const Meta *meta) {
|
2019-06-28 02:37:33 +02:00
|
|
|
return (caps::GetProgramInfoFlags(meta->aci_kac, meta->aci->kac_size) & ProgramInfoFlag_ApplicationTypeMask) == ProgramInfoFlag_Application;
|
2019-06-27 00:46:19 +02:00
|
|
|
}
|
2019-06-18 01:29:09 +02:00
|
|
|
|
2019-06-27 00:46:19 +02:00
|
|
|
Npdm::AddressSpaceType GetAddressSpaceType(const Meta *meta) {
|
|
|
|
return static_cast<Npdm::AddressSpaceType>((meta->npdm->flags & Npdm::MetaFlag_AddressSpaceTypeMask) >> Npdm::MetaFlag_AddressSpaceTypeShift);
|
|
|
|
}
|
2019-06-18 01:29:09 +02:00
|
|
|
|
2019-06-27 00:46:19 +02:00
|
|
|
Acid::PoolPartition GetPoolPartition(const Meta *meta) {
|
|
|
|
return static_cast<Acid::PoolPartition>((meta->acid->flags & Acid::AcidFlag_PoolPartitionMask) >> Acid::AcidFlag_PoolPartitionShift);
|
|
|
|
}
|
2019-06-18 01:29:09 +02:00
|
|
|
|
2020-03-09 11:10:12 +01:00
|
|
|
Result LoadNsoHeaders(NsoHeader *nso_headers, bool *has_nso) {
|
2019-06-27 00:46:19 +02:00
|
|
|
/* Clear NSOs. */
|
|
|
|
std::memset(nso_headers, 0, sizeof(*nso_headers) * Nso_Count);
|
|
|
|
std::memset(has_nso, 0, sizeof(*has_nso) * Nso_Count);
|
|
|
|
|
|
|
|
for (size_t i = 0; i < Nso_Count; i++) {
|
2020-03-09 11:10:12 +01:00
|
|
|
fs::FileHandle file;
|
|
|
|
if (R_SUCCEEDED(fs::OpenFile(std::addressof(file), GetNsoPath(i), fs::OpenMode_Read))) {
|
|
|
|
ON_SCOPE_EXIT { fs::CloseFile(file); };
|
|
|
|
|
2019-06-27 00:46:19 +02:00
|
|
|
/* Read NSO header. */
|
2020-03-09 11:10:12 +01:00
|
|
|
size_t read_size;
|
|
|
|
R_TRY(fs::ReadFile(std::addressof(read_size), file, 0, nso_headers + i, sizeof(*nso_headers)));
|
|
|
|
R_UNLESS(read_size == sizeof(*nso_headers), ResultInvalidNso());
|
|
|
|
|
2019-06-27 00:46:19 +02:00
|
|
|
has_nso[i] = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-10-24 10:40:44 +02:00
|
|
|
return ResultSuccess();
|
2018-04-24 10:08:11 +02:00
|
|
|
}
|
2019-06-27 00:46:19 +02:00
|
|
|
|
|
|
|
Result ValidateNsoHeaders(const NsoHeader *nso_headers, const bool *has_nso) {
|
|
|
|
/* We must always have a main. */
|
2019-10-24 10:40:44 +02:00
|
|
|
R_UNLESS(has_nso[Nso_Main], ResultInvalidNso());
|
2019-06-27 00:46:19 +02:00
|
|
|
|
|
|
|
/* If we don't have an RTLD, we must only have a main. */
|
|
|
|
if (!has_nso[Nso_Rtld]) {
|
|
|
|
for (size_t i = Nso_Main + 1; i < Nso_Count; i++) {
|
2019-10-24 10:40:44 +02:00
|
|
|
R_UNLESS(!has_nso[i], ResultInvalidNso());
|
2019-06-27 00:46:19 +02:00
|
|
|
}
|
2018-04-24 10:08:11 +02:00
|
|
|
}
|
2019-06-27 00:46:19 +02:00
|
|
|
|
|
|
|
/* All NSOs must have zero text offset. */
|
|
|
|
for (size_t i = 0; i < Nso_Count; i++) {
|
2019-10-24 10:40:44 +02:00
|
|
|
R_UNLESS(nso_headers[i].text_dst_offset == 0, ResultInvalidNso());
|
2018-04-24 10:08:11 +02:00
|
|
|
}
|
2019-06-27 00:46:19 +02:00
|
|
|
|
2019-10-24 10:40:44 +02:00
|
|
|
return ResultSuccess();
|
2018-04-24 10:08:11 +02:00
|
|
|
}
|
2019-06-18 01:29:09 +02:00
|
|
|
|
2020-09-09 00:34:22 +02:00
|
|
|
Result ValidateMeta(const Meta *meta, const ncm::ProgramLocation &loc, const fs::CodeVerificationData &code_verification_data) {
|
2019-06-27 00:46:19 +02:00
|
|
|
/* Validate version. */
|
2019-10-28 05:43:01 +01:00
|
|
|
R_TRY(ValidateProgramVersion(loc.program_id, meta->npdm->version));
|
2019-06-27 00:46:19 +02:00
|
|
|
|
2019-10-28 05:43:01 +01:00
|
|
|
/* Validate program id. */
|
|
|
|
R_UNLESS(meta->aci->program_id >= meta->acid->program_id_min, ResultInvalidProgramId());
|
|
|
|
R_UNLESS(meta->aci->program_id <= meta->acid->program_id_max, ResultInvalidProgramId());
|
2019-06-27 00:46:19 +02:00
|
|
|
|
2019-06-28 02:37:33 +02:00
|
|
|
/* Validate the kernel capabilities. */
|
|
|
|
R_TRY(caps::ValidateCapabilities(meta->acid_kac, meta->acid->kac_size, meta->aci_kac, meta->aci->kac_size));
|
2019-06-27 00:46:19 +02:00
|
|
|
|
2020-04-14 11:45:28 +02:00
|
|
|
/* If we have data to validate, validate it. */
|
2020-09-09 00:34:22 +02:00
|
|
|
if (code_verification_data.has_data && meta->check_verification_data) {
|
|
|
|
const u8 *sig = code_verification_data.signature;
|
|
|
|
const size_t sig_size = sizeof(code_verification_data.signature);
|
2020-04-14 11:45:28 +02:00
|
|
|
const u8 *mod = static_cast<u8 *>(meta->modulus);
|
|
|
|
const size_t mod_size = crypto::Rsa2048PssSha256Verifier::ModulusSize;
|
2020-05-12 00:04:51 +02:00
|
|
|
const u8 *exp = fssystem::GetAcidSignatureKeyPublicExponent();
|
|
|
|
const size_t exp_size = fssystem::AcidSignatureKeyPublicExponentSize;
|
2020-09-09 00:34:22 +02:00
|
|
|
const u8 *hsh = code_verification_data.target_hash;
|
|
|
|
const size_t hsh_size = sizeof(code_verification_data.target_hash);
|
2020-04-14 11:45:28 +02:00
|
|
|
const bool is_signature_valid = crypto::VerifyRsa2048PssSha256WithHash(sig, sig_size, mod, mod_size, exp, exp_size, hsh, hsh_size);
|
|
|
|
|
|
|
|
R_UNLESS(is_signature_valid, ResultInvalidNcaSignature());
|
|
|
|
}
|
|
|
|
|
2019-06-27 00:46:19 +02:00
|
|
|
/* All good. */
|
2019-10-24 10:40:44 +02:00
|
|
|
return ResultSuccess();
|
2019-06-27 00:46:19 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
Result GetCreateProcessFlags(u32 *out, const Meta *meta, const u32 ldr_flags) {
|
|
|
|
const u8 meta_flags = meta->npdm->flags;
|
|
|
|
|
|
|
|
u32 flags = 0;
|
|
|
|
|
|
|
|
/* Set Is64Bit. */
|
|
|
|
if (meta_flags & Npdm::MetaFlag_Is64Bit) {
|
|
|
|
flags |= svc::CreateProcessFlag_Is64Bit;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Set AddressSpaceType. */
|
|
|
|
switch (GetAddressSpaceType(meta)) {
|
|
|
|
case Npdm::AddressSpaceType_32Bit:
|
|
|
|
flags |= svc::CreateProcessFlag_AddressSpace32Bit;
|
|
|
|
break;
|
|
|
|
case Npdm::AddressSpaceType_64BitDeprecated:
|
|
|
|
flags |= svc::CreateProcessFlag_AddressSpace64BitDeprecated;
|
|
|
|
break;
|
|
|
|
case Npdm::AddressSpaceType_32BitWithoutAlias:
|
|
|
|
flags |= svc::CreateProcessFlag_AddressSpace32BitWithoutAlias;
|
|
|
|
break;
|
|
|
|
case Npdm::AddressSpaceType_64Bit:
|
2021-09-05 19:08:30 +02:00
|
|
|
flags |= svc::CreateProcessFlag_AddressSpace64Bit;
|
2019-06-27 00:46:19 +02:00
|
|
|
break;
|
|
|
|
default:
|
2019-10-24 10:40:44 +02:00
|
|
|
return ResultInvalidMeta();
|
2019-06-27 00:46:19 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Set Enable Debug. */
|
|
|
|
if (ldr_flags & CreateProcessFlag_EnableDebug) {
|
|
|
|
flags |= svc::CreateProcessFlag_EnableDebug;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Set Enable ASLR. */
|
|
|
|
if (!(ldr_flags & CreateProcessFlag_DisableAslr)) {
|
|
|
|
flags |= svc::CreateProcessFlag_EnableAslr;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Set Is Application. */
|
|
|
|
if (IsApplication(meta)) {
|
|
|
|
flags |= svc::CreateProcessFlag_IsApplication;
|
|
|
|
|
|
|
|
/* 7.0.0+: Set OptimizeMemoryAllocation if relevant. */
|
2020-04-14 07:19:44 +02:00
|
|
|
if (hos::GetVersion() >= hos::Version_7_0_0) {
|
2019-06-27 00:46:19 +02:00
|
|
|
if (meta_flags & Npdm::MetaFlag_OptimizeMemoryAllocation) {
|
|
|
|
flags |= svc::CreateProcessFlag_OptimizeMemoryAllocation;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* 5.0.0+ Set Pool Partition. */
|
2020-04-14 07:19:44 +02:00
|
|
|
if (hos::GetVersion() >= hos::Version_5_0_0) {
|
2019-06-27 00:46:19 +02:00
|
|
|
switch (GetPoolPartition(meta)) {
|
|
|
|
case Acid::PoolPartition_Application:
|
|
|
|
if (IsApplet(meta)) {
|
|
|
|
flags |= svc::CreateProcessFlag_PoolPartitionApplet;
|
|
|
|
} else {
|
|
|
|
flags |= svc::CreateProcessFlag_PoolPartitionApplication;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case Acid::PoolPartition_Applet:
|
|
|
|
flags |= svc::CreateProcessFlag_PoolPartitionApplet;
|
|
|
|
break;
|
|
|
|
case Acid::PoolPartition_System:
|
|
|
|
flags |= svc::CreateProcessFlag_PoolPartitionSystem;
|
|
|
|
break;
|
|
|
|
case Acid::PoolPartition_SystemNonSecure:
|
|
|
|
flags |= svc::CreateProcessFlag_PoolPartitionSystemNonSecure;
|
|
|
|
break;
|
|
|
|
default:
|
2019-10-24 10:40:44 +02:00
|
|
|
return ResultInvalidMeta();
|
2018-04-24 10:08:11 +02:00
|
|
|
}
|
2020-04-14 07:19:44 +02:00
|
|
|
} else if (hos::GetVersion() >= hos::Version_4_0_0) {
|
2019-06-27 00:46:19 +02:00
|
|
|
/* On 4.0.0+, the corresponding bit was simply "UseSecureMemory". */
|
|
|
|
if (meta->acid->flags & Acid::AcidFlag_DeprecatedUseSecureMemory) {
|
|
|
|
flags |= svc::CreateProcessFlag_DeprecatedUseSecureMemory;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-09-05 19:08:30 +02:00
|
|
|
/* 11.0.0+/meso Set Disable DAS merge. */
|
|
|
|
if (meta_flags & Npdm::MetaFlag_DisableDeviceAddressSpaceMerge) {
|
|
|
|
flags |= svc::CreateProcessFlag_DisableDeviceAddressSpaceMerge;
|
2020-12-02 02:47:48 +01:00
|
|
|
}
|
|
|
|
|
2019-06-27 00:46:19 +02:00
|
|
|
*out = flags;
|
2019-10-24 10:40:44 +02:00
|
|
|
return ResultSuccess();
|
2018-04-24 10:08:11 +02:00
|
|
|
}
|
2019-06-18 01:29:09 +02:00
|
|
|
|
2021-10-04 23:54:13 +02:00
|
|
|
Result GetCreateProcessParameter(svc::CreateProcessParameter *out, const Meta *meta, u32 flags, os::NativeHandle reslimit_h) {
|
2019-06-27 00:46:19 +02:00
|
|
|
/* Clear output. */
|
|
|
|
std::memset(out, 0, sizeof(*out));
|
2018-04-24 10:08:11 +02:00
|
|
|
|
2019-10-28 05:43:01 +01:00
|
|
|
/* Set name, version, program id, resource limit handle. */
|
|
|
|
std::memcpy(out->name, meta->npdm->program_name, sizeof(out->name) - 1);
|
2019-06-27 00:46:19 +02:00
|
|
|
out->version = meta->npdm->version;
|
2020-01-18 05:11:03 +01:00
|
|
|
out->program_id = static_cast<u64>(meta->aci->program_id);
|
2019-06-27 00:46:19 +02:00
|
|
|
out->reslimit = reslimit_h;
|
|
|
|
|
|
|
|
/* Set flags. */
|
|
|
|
R_TRY(GetCreateProcessFlags(&out->flags, meta, flags));
|
|
|
|
|
|
|
|
/* 3.0.0+ System Resource Size. */
|
2020-04-14 07:19:44 +02:00
|
|
|
if (hos::GetVersion() >= hos::Version_3_0_0) {
|
2019-06-27 00:46:19 +02:00
|
|
|
/* Validate size is aligned. */
|
2019-12-06 08:41:33 +01:00
|
|
|
R_UNLESS(util::IsAligned(meta->npdm->system_resource_size, os::MemoryBlockUnitSize), ResultInvalidSize());
|
2019-10-24 10:40:44 +02:00
|
|
|
|
2019-06-27 00:46:19 +02:00
|
|
|
/* Validate system resource usage. */
|
|
|
|
if (meta->npdm->system_resource_size) {
|
|
|
|
/* Process must be 64-bit. */
|
2019-10-24 10:40:44 +02:00
|
|
|
R_UNLESS((out->flags & svc::CreateProcessFlag_AddressSpace64Bit), ResultInvalidMeta());
|
2019-06-27 00:46:19 +02:00
|
|
|
|
|
|
|
/* Process must be application or applet. */
|
2019-10-24 10:40:44 +02:00
|
|
|
R_UNLESS(IsApplication(meta) || IsApplet(meta), ResultInvalidMeta());
|
2019-06-27 00:46:19 +02:00
|
|
|
|
|
|
|
/* Size must be less than or equal to max. */
|
2019-10-24 10:40:44 +02:00
|
|
|
R_UNLESS(meta->npdm->system_resource_size <= SystemResourceSizeMax, ResultInvalidMeta());
|
2019-06-27 00:46:19 +02:00
|
|
|
}
|
|
|
|
out->system_resource_num_pages = meta->npdm->system_resource_size >> 12;
|
|
|
|
}
|
2019-06-18 01:29:09 +02:00
|
|
|
|
2019-10-24 10:40:44 +02:00
|
|
|
return ResultSuccess();
|
2018-07-30 01:35:43 +02:00
|
|
|
}
|
2019-06-27 00:46:19 +02:00
|
|
|
|
2021-10-05 21:22:34 +02:00
|
|
|
ALWAYS_INLINE u64 GetCurrentProcessInfo(svc::InfoType info_type) {
|
|
|
|
u64 value;
|
|
|
|
R_ABORT_UNLESS(svc::GetInfo(std::addressof(value), info_type, svc::PseudoHandle::CurrentProcess, 0));
|
|
|
|
return value;
|
|
|
|
}
|
|
|
|
|
|
|
|
Result SearchFreeRegion(uintptr_t *out, size_t mapping_size) {
|
|
|
|
/* Get address space extents. */
|
|
|
|
const uintptr_t heap_start = GetCurrentProcessInfo(svc::InfoType_HeapRegionAddress);
|
|
|
|
const size_t heap_size = GetCurrentProcessInfo(svc::InfoType_HeapRegionSize);
|
|
|
|
const uintptr_t alias_start = GetCurrentProcessInfo(svc::InfoType_AliasRegionAddress);
|
|
|
|
const size_t alias_size = GetCurrentProcessInfo(svc::InfoType_AliasRegionSize);
|
|
|
|
const uintptr_t aslr_start = GetCurrentProcessInfo(svc::InfoType_AslrRegionAddress);
|
|
|
|
const size_t aslr_size = GetCurrentProcessInfo(svc::InfoType_AslrRegionSize);
|
|
|
|
|
|
|
|
/* Iterate upwards to find a free region. */
|
|
|
|
uintptr_t address = aslr_start;
|
|
|
|
while (true) {
|
|
|
|
/* Declare variables for memory querying. */
|
|
|
|
svc::MemoryInfo mem_info;
|
|
|
|
svc::PageInfo page_info;
|
|
|
|
|
|
|
|
/* Check that we're still within bounds. */
|
|
|
|
R_UNLESS(address < address + mapping_size, svc::ResultOutOfMemory());
|
|
|
|
|
|
|
|
/* If we're within the heap region, skip to the end of the heap region. */
|
|
|
|
if (heap_size != 0 && !(address + mapping_size - 1 < heap_start || heap_start + heap_size - 1 < address)) {
|
|
|
|
R_UNLESS(address < heap_start + heap_size, svc::ResultOutOfMemory());
|
|
|
|
address = heap_start + heap_size;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* If we're within the alias region, skip to the end of the alias region. */
|
|
|
|
if (alias_size != 0 && !(address + mapping_size - 1 < alias_start || alias_start + alias_size - 1 < address)) {
|
|
|
|
R_UNLESS(address < alias_start + alias_size, svc::ResultOutOfMemory());
|
|
|
|
address = alias_start + alias_size;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Get the current memory range. */
|
|
|
|
R_ABORT_UNLESS(svc::QueryMemory(std::addressof(mem_info), std::addressof(page_info), address));
|
|
|
|
|
|
|
|
/* If the memory range is free and big enough, use it. */
|
2021-10-06 00:16:54 +02:00
|
|
|
if (mem_info.state == svc::MemoryState_Free && mapping_size <= ((mem_info.base_address + mem_info.size) - address)) {
|
2021-10-05 21:22:34 +02:00
|
|
|
*out = address;
|
|
|
|
return ResultSuccess();
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check that we can advance. */
|
2021-10-06 00:16:54 +02:00
|
|
|
R_UNLESS(address < mem_info.base_address + mem_info.size, svc::ResultOutOfMemory());
|
|
|
|
R_UNLESS(mem_info.base_address + mem_info.size - 1 < aslr_start + aslr_size - 1, svc::ResultOutOfMemory());
|
2021-10-05 21:22:34 +02:00
|
|
|
|
|
|
|
/* Advance. */
|
2021-10-06 00:16:54 +02:00
|
|
|
address = mem_info.base_address + mem_info.size;
|
2021-10-05 21:22:34 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-01-18 05:11:03 +01:00
|
|
|
Result DecideAddressSpaceLayout(ProcessInfo *out, svc::CreateProcessParameter *out_param, const NsoHeader *nso_headers, const bool *has_nso, const args::ArgumentInfo *arg_info) {
|
2019-06-27 00:46:19 +02:00
|
|
|
/* Clear output. */
|
|
|
|
out->args_address = 0;
|
|
|
|
out->args_size = 0;
|
|
|
|
std::memset(out->nso_address, 0, sizeof(out->nso_address));
|
|
|
|
std::memset(out->nso_size, 0, sizeof(out->nso_size));
|
|
|
|
|
|
|
|
size_t total_size = 0;
|
|
|
|
|
|
|
|
/* Calculate base offsets. */
|
|
|
|
for (size_t i = 0; i < Nso_Count; i++) {
|
|
|
|
if (has_nso[i]) {
|
|
|
|
out->nso_address[i] = total_size;
|
|
|
|
const size_t text_end = nso_headers[i].text_dst_offset + nso_headers[i].text_size;
|
|
|
|
const size_t ro_end = nso_headers[i].ro_dst_offset + nso_headers[i].ro_size;
|
|
|
|
const size_t rw_end = nso_headers[i].rw_dst_offset + nso_headers[i].rw_size + nso_headers[i].bss_size;
|
|
|
|
out->nso_size[i] = text_end;
|
|
|
|
out->nso_size[i] = std::max(out->nso_size[i], ro_end);
|
|
|
|
out->nso_size[i] = std::max(out->nso_size[i], rw_end);
|
|
|
|
out->nso_size[i] = (out->nso_size[i] + size_t(0xFFFul)) & ~size_t(0xFFFul);
|
|
|
|
|
|
|
|
total_size += out->nso_size[i];
|
|
|
|
|
|
|
|
if (arg_info != nullptr && arg_info->args_size && !out->args_size) {
|
|
|
|
out->args_address = total_size;
|
|
|
|
out->args_size = 2 * arg_info->args_size + args::ArgumentSizeMax + 2 * sizeof(u32);
|
|
|
|
out->args_size = (out->args_size + size_t(0xFFFul)) & ~size_t(0xFFFul);
|
|
|
|
total_size += out->args_size;
|
|
|
|
}
|
|
|
|
}
|
2019-06-18 01:29:09 +02:00
|
|
|
}
|
2019-06-27 00:46:19 +02:00
|
|
|
|
|
|
|
/* Calculate ASLR. */
|
|
|
|
uintptr_t aslr_start = 0;
|
2021-10-05 21:22:34 +02:00
|
|
|
size_t aslr_size = 0;
|
2020-04-14 07:19:44 +02:00
|
|
|
if (hos::GetVersion() >= hos::Version_2_0_0) {
|
2020-01-18 05:11:03 +01:00
|
|
|
switch (out_param->flags & svc::CreateProcessFlag_AddressSpaceMask) {
|
2019-06-27 00:46:19 +02:00
|
|
|
case svc::CreateProcessFlag_AddressSpace32Bit:
|
|
|
|
case svc::CreateProcessFlag_AddressSpace32BitWithoutAlias:
|
2021-10-05 21:22:34 +02:00
|
|
|
aslr_start = svc::AddressSmallMap32Start;
|
|
|
|
aslr_size = svc::AddressSmallMap32Size;
|
2019-06-27 00:46:19 +02:00
|
|
|
break;
|
|
|
|
case svc::CreateProcessFlag_AddressSpace64BitDeprecated:
|
2021-10-05 21:22:34 +02:00
|
|
|
aslr_start = svc::AddressSmallMap36Start;
|
|
|
|
aslr_size = svc::AddressSmallMap36Size;
|
2019-06-27 00:46:19 +02:00
|
|
|
break;
|
|
|
|
case svc::CreateProcessFlag_AddressSpace64Bit:
|
2021-10-05 21:22:34 +02:00
|
|
|
aslr_start = svc::AddressMap39Start;
|
|
|
|
aslr_size = svc::AddressMap39Size;
|
2019-06-27 00:46:19 +02:00
|
|
|
break;
|
2019-10-24 11:30:10 +02:00
|
|
|
AMS_UNREACHABLE_DEFAULT_CASE();
|
2019-06-27 00:46:19 +02:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
/* On 1.0.0, only 2 address space types existed. */
|
2020-01-18 05:11:03 +01:00
|
|
|
if (out_param->flags & svc::CreateProcessFlag_AddressSpace64BitDeprecated) {
|
2021-10-05 21:22:34 +02:00
|
|
|
aslr_start = svc::AddressSmallMap36Start;
|
|
|
|
aslr_size = svc::AddressSmallMap36Size;
|
2019-06-27 00:46:19 +02:00
|
|
|
} else {
|
2021-10-05 21:22:34 +02:00
|
|
|
aslr_start = svc::AddressSmallMap32Start;
|
|
|
|
aslr_size = svc::AddressSmallMap32Size;
|
2019-06-27 00:46:19 +02:00
|
|
|
}
|
|
|
|
}
|
2019-10-24 10:40:44 +02:00
|
|
|
R_UNLESS(total_size <= aslr_size, svc::ResultOutOfMemory());
|
2019-06-27 00:46:19 +02:00
|
|
|
|
|
|
|
/* Set Create Process output. */
|
|
|
|
uintptr_t aslr_slide = 0;
|
2021-10-05 21:22:34 +02:00
|
|
|
size_t free_size = (aslr_size - total_size);
|
2020-01-18 05:11:03 +01:00
|
|
|
if (out_param->flags & svc::CreateProcessFlag_EnableAslr) {
|
2019-12-10 08:50:47 +01:00
|
|
|
/* Nintendo uses MT19937 (not os::GenerateRandomBytes), but we'll just use TinyMT for now. */
|
|
|
|
aslr_slide = os::GenerateRandomU64(free_size / os::MemoryBlockUnitSize) * os::MemoryBlockUnitSize;
|
2019-06-27 00:46:19 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Set out. */
|
|
|
|
aslr_start += aslr_slide;
|
|
|
|
for (size_t i = 0; i < Nso_Count; i++) {
|
|
|
|
if (has_nso[i]) {
|
|
|
|
out->nso_address[i] += aslr_start;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (out->args_address) {
|
|
|
|
out->args_address += aslr_start;
|
|
|
|
}
|
|
|
|
|
2021-10-05 21:22:34 +02:00
|
|
|
out_param->code_address = aslr_start;
|
2020-01-18 05:11:03 +01:00
|
|
|
out_param->code_num_pages = total_size >> 12;
|
2019-06-27 00:46:19 +02:00
|
|
|
|
2019-10-24 10:40:44 +02:00
|
|
|
return ResultSuccess();
|
2019-06-18 01:29:09 +02:00
|
|
|
}
|
|
|
|
|
2021-10-04 23:54:13 +02:00
|
|
|
Result CreateProcessImpl(ProcessInfo *out, const Meta *meta, const NsoHeader *nso_headers, const bool *has_nso, const args::ArgumentInfo *arg_info, u32 flags, os::NativeHandle reslimit_h) {
|
2020-01-18 05:11:03 +01:00
|
|
|
/* Get CreateProcessParameter. */
|
|
|
|
svc::CreateProcessParameter param;
|
2020-12-07 06:20:42 +01:00
|
|
|
R_TRY(GetCreateProcessParameter(std::addressof(param), meta, flags, reslimit_h));
|
2019-06-18 01:29:09 +02:00
|
|
|
|
2019-06-27 00:46:19 +02:00
|
|
|
/* Decide on an NSO layout. */
|
2020-12-07 06:20:42 +01:00
|
|
|
R_TRY(DecideAddressSpaceLayout(out, std::addressof(param), nso_headers, has_nso, arg_info));
|
2019-06-19 20:51:30 +02:00
|
|
|
|
2020-12-07 06:20:42 +01:00
|
|
|
/* Actually create process. */
|
2021-10-04 21:33:09 +02:00
|
|
|
svc::Handle process_handle;
|
2020-12-07 06:20:42 +01:00
|
|
|
R_TRY(svc::CreateProcess(std::addressof(process_handle), std::addressof(param), static_cast<const u32 *>(meta->aci_kac), meta->aci->kac_size / sizeof(u32)));
|
|
|
|
|
|
|
|
/* Set the output handle. */
|
2021-10-04 21:33:09 +02:00
|
|
|
out->process_handle = process_handle;
|
|
|
|
|
2020-12-07 06:20:42 +01:00
|
|
|
return ResultSuccess();
|
2019-06-27 00:46:19 +02:00
|
|
|
}
|
2019-06-18 01:29:09 +02:00
|
|
|
|
2020-03-09 11:10:12 +01:00
|
|
|
Result LoadNsoSegment(fs::FileHandle file, const NsoHeader::SegmentInfo *segment, size_t file_size, const u8 *file_hash, bool is_compressed, bool check_hash, uintptr_t map_base, uintptr_t map_end) {
|
2019-06-27 00:46:19 +02:00
|
|
|
/* Select read size based on compression. */
|
|
|
|
if (!is_compressed) {
|
|
|
|
file_size = segment->size;
|
|
|
|
}
|
2019-06-18 01:29:09 +02:00
|
|
|
|
2019-06-27 00:46:19 +02:00
|
|
|
/* Validate size. */
|
2019-10-24 10:40:44 +02:00
|
|
|
R_UNLESS(file_size <= segment->size, ResultInvalidNso());
|
|
|
|
R_UNLESS(segment->size <= std::numeric_limits<s32>::max(), ResultInvalidNso());
|
2019-06-18 01:29:09 +02:00
|
|
|
|
2019-06-27 00:46:19 +02:00
|
|
|
/* Load data from file. */
|
|
|
|
uintptr_t load_address = is_compressed ? map_end - file_size : map_base;
|
2020-03-09 11:10:12 +01:00
|
|
|
size_t read_size;
|
|
|
|
R_TRY(fs::ReadFile(std::addressof(read_size), file, segment->file_offset, reinterpret_cast<void *>(load_address), file_size));
|
|
|
|
R_UNLESS(read_size == file_size, ResultInvalidNso());
|
2019-06-18 01:29:09 +02:00
|
|
|
|
2019-06-27 00:46:19 +02:00
|
|
|
/* Uncompress if necessary. */
|
|
|
|
if (is_compressed) {
|
2019-10-24 10:40:44 +02:00
|
|
|
bool decompressed = (util::DecompressLZ4(reinterpret_cast<void *>(map_base), segment->size, reinterpret_cast<const void *>(load_address), file_size) == static_cast<int>(segment->size));
|
|
|
|
R_UNLESS(decompressed, ResultInvalidNso());
|
2019-06-27 00:46:19 +02:00
|
|
|
}
|
2019-06-18 01:29:09 +02:00
|
|
|
|
2019-06-27 00:46:19 +02:00
|
|
|
/* Check hash if necessary. */
|
|
|
|
if (check_hash) {
|
2020-03-09 11:10:12 +01:00
|
|
|
u8 hash[crypto::Sha256Generator::HashSize];
|
|
|
|
crypto::GenerateSha256Hash(hash, sizeof(hash), reinterpret_cast<void *>(map_base), segment->size);
|
2019-06-18 01:29:09 +02:00
|
|
|
|
2019-10-24 10:40:44 +02:00
|
|
|
R_UNLESS(std::memcmp(hash, file_hash, sizeof(hash)) == 0, ResultInvalidNso());
|
2019-06-27 00:46:19 +02:00
|
|
|
}
|
2019-06-18 01:29:09 +02:00
|
|
|
|
2019-10-24 10:40:44 +02:00
|
|
|
return ResultSuccess();
|
2019-06-27 00:46:19 +02:00
|
|
|
}
|
2019-06-18 01:29:09 +02:00
|
|
|
|
2021-10-04 23:54:13 +02:00
|
|
|
Result LoadNsoIntoProcessMemory(os::NativeHandle process_handle, fs::FileHandle file, uintptr_t map_address, const NsoHeader *nso_header, uintptr_t nso_address, size_t nso_size) {
|
2019-06-27 00:46:19 +02:00
|
|
|
/* Map and read data from file. */
|
|
|
|
{
|
2021-10-05 21:22:34 +02:00
|
|
|
AutoCloseMap map(map_address, process_handle, nso_address, nso_size);
|
|
|
|
R_TRY(map.GetResult());
|
2019-06-27 00:46:19 +02:00
|
|
|
|
|
|
|
/* Load NSO segments. */
|
2020-03-09 11:10:12 +01:00
|
|
|
R_TRY(LoadNsoSegment(file, &nso_header->segments[NsoHeader::Segment_Text], nso_header->text_compressed_size, nso_header->text_hash, (nso_header->flags & NsoHeader::Flag_CompressedText) != 0,
|
|
|
|
(nso_header->flags & NsoHeader::Flag_CheckHashText) != 0, map_address + nso_header->text_dst_offset, map_address + nso_size));
|
|
|
|
R_TRY(LoadNsoSegment(file, &nso_header->segments[NsoHeader::Segment_Ro], nso_header->ro_compressed_size, nso_header->ro_hash, (nso_header->flags & NsoHeader::Flag_CompressedRo) != 0,
|
|
|
|
(nso_header->flags & NsoHeader::Flag_CheckHashRo) != 0, map_address + nso_header->ro_dst_offset, map_address + nso_size));
|
|
|
|
R_TRY(LoadNsoSegment(file, &nso_header->segments[NsoHeader::Segment_Rw], nso_header->rw_compressed_size, nso_header->rw_hash, (nso_header->flags & NsoHeader::Flag_CompressedRw) != 0,
|
|
|
|
(nso_header->flags & NsoHeader::Flag_CheckHashRw) != 0, map_address + nso_header->rw_dst_offset, map_address + nso_size));
|
2019-06-27 00:46:19 +02:00
|
|
|
|
|
|
|
/* Clear unused space to zero. */
|
|
|
|
const size_t text_end = nso_header->text_dst_offset + nso_header->text_size;
|
|
|
|
const size_t ro_end = nso_header->ro_dst_offset + nso_header->ro_size;
|
|
|
|
const size_t rw_end = nso_header->rw_dst_offset + nso_header->rw_size;
|
|
|
|
std::memset(reinterpret_cast<void *>(map_address), 0, nso_header->text_dst_offset);
|
|
|
|
std::memset(reinterpret_cast<void *>(map_address + text_end), 0, nso_header->ro_dst_offset - text_end);
|
|
|
|
std::memset(reinterpret_cast<void *>(map_address + ro_end), 0, nso_header->rw_dst_offset - ro_end);
|
|
|
|
std::memset(reinterpret_cast<void *>(map_address + rw_end), 0, nso_header->bss_size);
|
|
|
|
|
2021-03-01 23:18:27 +01:00
|
|
|
/* Apply embedded patches. */
|
|
|
|
ApplyEmbeddedPatchesToModule(nso_header->build_id, map_address, nso_size);
|
|
|
|
|
2019-06-27 00:46:19 +02:00
|
|
|
/* Apply IPS patches. */
|
|
|
|
LocateAndApplyIpsPatchesToModule(nso_header->build_id, map_address, nso_size);
|
|
|
|
}
|
2019-06-18 01:29:09 +02:00
|
|
|
|
2019-06-27 00:46:19 +02:00
|
|
|
/* Set permissions. */
|
|
|
|
const size_t text_size = (static_cast<size_t>(nso_header->text_size) + size_t(0xFFFul)) & ~size_t(0xFFFul);
|
|
|
|
const size_t ro_size = (static_cast<size_t>(nso_header->ro_size) + size_t(0xFFFul)) & ~size_t(0xFFFul);
|
|
|
|
const size_t rw_size = (static_cast<size_t>(nso_header->rw_size + nso_header->bss_size) + size_t(0xFFFul)) & ~size_t(0xFFFul);
|
|
|
|
if (text_size) {
|
2021-10-04 23:54:13 +02:00
|
|
|
R_TRY(svc::SetProcessMemoryPermission(process_handle, nso_address + nso_header->text_dst_offset, text_size, svc::MemoryPermission_ReadExecute));
|
2019-06-27 00:46:19 +02:00
|
|
|
}
|
|
|
|
if (ro_size) {
|
2021-10-04 23:54:13 +02:00
|
|
|
R_TRY(svc::SetProcessMemoryPermission(process_handle, nso_address + nso_header->ro_dst_offset, ro_size, svc::MemoryPermission_Read));
|
2019-06-27 00:46:19 +02:00
|
|
|
}
|
|
|
|
if (rw_size) {
|
2021-10-04 23:54:13 +02:00
|
|
|
R_TRY(svc::SetProcessMemoryPermission(process_handle, nso_address + nso_header->rw_dst_offset, rw_size, svc::MemoryPermission_ReadWrite));
|
2019-06-27 00:46:19 +02:00
|
|
|
}
|
|
|
|
|
2019-10-24 10:40:44 +02:00
|
|
|
return ResultSuccess();
|
2019-06-18 01:29:09 +02:00
|
|
|
}
|
|
|
|
|
2020-03-09 11:10:12 +01:00
|
|
|
Result LoadNsosIntoProcessMemory(const ProcessInfo *process_info, const NsoHeader *nso_headers, const bool *has_nso, const args::ArgumentInfo *arg_info) {
|
2019-06-27 00:46:19 +02:00
|
|
|
/* Load each NSO. */
|
|
|
|
for (size_t i = 0; i < Nso_Count; i++) {
|
|
|
|
if (has_nso[i]) {
|
2020-03-09 11:10:12 +01:00
|
|
|
fs::FileHandle file;
|
|
|
|
R_TRY(fs::OpenFile(std::addressof(file), GetNsoPath(i), fs::OpenMode_Read));
|
|
|
|
ON_SCOPE_EXIT { fs::CloseFile(file); };
|
2019-06-27 00:46:19 +02:00
|
|
|
|
2021-10-05 21:22:34 +02:00
|
|
|
uintptr_t map_address;
|
|
|
|
R_TRY(SearchFreeRegion(std::addressof(map_address), process_info->nso_size[i]));
|
2019-06-27 00:46:19 +02:00
|
|
|
|
2021-10-04 21:33:09 +02:00
|
|
|
R_TRY(LoadNsoIntoProcessMemory(process_info->process_handle, file, map_address, nso_headers + i, process_info->nso_address[i], process_info->nso_size[i]));
|
2019-06-27 00:46:19 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Load arguments, if present. */
|
|
|
|
if (arg_info != nullptr) {
|
|
|
|
/* Write argument data into memory. */
|
|
|
|
{
|
2021-10-05 21:22:34 +02:00
|
|
|
uintptr_t map_address;
|
|
|
|
R_TRY(SearchFreeRegion(std::addressof(map_address), process_info->args_size));
|
2019-06-27 00:46:19 +02:00
|
|
|
|
2021-10-05 21:22:34 +02:00
|
|
|
AutoCloseMap map(map_address, process_info->process_handle, process_info->args_address, process_info->args_size);
|
|
|
|
R_TRY(map.GetResult());
|
2019-06-27 00:46:19 +02:00
|
|
|
|
|
|
|
ProgramArguments *args = reinterpret_cast<ProgramArguments *>(map_address);
|
|
|
|
std::memset(args, 0, sizeof(*args));
|
|
|
|
args->allocated_size = process_info->args_size;
|
|
|
|
args->arguments_size = arg_info->args_size;
|
|
|
|
std::memcpy(args->arguments, arg_info->args, arg_info->args_size);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Set argument region permissions. */
|
2021-10-04 23:54:13 +02:00
|
|
|
R_TRY(svc::SetProcessMemoryPermission(process_info->process_handle, process_info->args_address, process_info->args_size, svc::MemoryPermission_ReadWrite));
|
2019-06-27 00:46:19 +02:00
|
|
|
}
|
|
|
|
|
2019-10-24 10:40:44 +02:00
|
|
|
return ResultSuccess();
|
2018-04-24 14:25:31 +02:00
|
|
|
}
|
2019-06-27 00:46:19 +02:00
|
|
|
|
2018-04-24 14:25:31 +02:00
|
|
|
}
|
2019-06-18 01:29:09 +02:00
|
|
|
|
2019-06-27 00:46:19 +02:00
|
|
|
/* Process Creation API. */
|
2021-10-04 23:54:13 +02:00
|
|
|
Result CreateProcess(os::NativeHandle *out, PinId pin_id, const ncm::ProgramLocation &loc, const cfg::OverrideStatus &override_status, const char *path, u32 flags, os::NativeHandle reslimit_h) {
|
2019-06-27 00:46:19 +02:00
|
|
|
/* Use global storage for NSOs. */
|
|
|
|
NsoHeader *nso_headers = g_nso_headers;
|
|
|
|
bool *has_nso = g_has_nso;
|
2019-10-28 05:43:01 +01:00
|
|
|
const auto arg_info = args::Get(loc.program_id);
|
2019-06-27 00:46:19 +02:00
|
|
|
|
|
|
|
{
|
|
|
|
/* Mount code. */
|
2019-11-21 13:03:19 +01:00
|
|
|
ScopedCodeMount mount(loc, override_status);
|
2019-06-28 02:37:33 +02:00
|
|
|
R_TRY(mount.GetResult());
|
2019-06-27 00:46:19 +02:00
|
|
|
|
|
|
|
/* Load meta, possibly from cache. */
|
|
|
|
Meta meta;
|
2020-04-14 11:45:28 +02:00
|
|
|
R_TRY(LoadMetaFromCache(&meta, loc, override_status));
|
2019-06-27 00:46:19 +02:00
|
|
|
|
|
|
|
/* Validate meta. */
|
2020-09-09 00:34:22 +02:00
|
|
|
R_TRY(ValidateMeta(&meta, loc, mount.GetCodeVerificationData()));
|
2019-06-27 00:46:19 +02:00
|
|
|
|
|
|
|
/* Load, validate NSOs. */
|
2020-03-09 11:10:12 +01:00
|
|
|
R_TRY(LoadNsoHeaders(nso_headers, has_nso));
|
2019-06-27 00:46:19 +02:00
|
|
|
R_TRY(ValidateNsoHeaders(nso_headers, has_nso));
|
|
|
|
|
|
|
|
/* Actually create process. */
|
|
|
|
ProcessInfo info;
|
|
|
|
R_TRY(CreateProcessImpl(&info, &meta, nso_headers, has_nso, arg_info, flags, reslimit_h));
|
|
|
|
|
2021-10-04 21:33:09 +02:00
|
|
|
/* Ensure we close the process handle, if we fail. */
|
|
|
|
ON_SCOPE_EXIT { os::CloseNativeHandle(info.process_handle); };
|
|
|
|
|
2019-06-27 00:46:19 +02:00
|
|
|
/* Load NSOs into process memory. */
|
2020-03-09 11:10:12 +01:00
|
|
|
R_TRY(LoadNsosIntoProcessMemory(&info, nso_headers, has_nso, arg_info));
|
2019-06-27 00:46:19 +02:00
|
|
|
|
|
|
|
/* Register NSOs with ro manager. */
|
|
|
|
{
|
2019-10-20 02:42:53 +02:00
|
|
|
/* Nintendo doesn't validate this get, but we do. */
|
2021-10-04 21:33:09 +02:00
|
|
|
os::ProcessId process_id = os::GetProcessId(info.process_handle);
|
2019-06-27 00:46:19 +02:00
|
|
|
|
|
|
|
/* Register new process. */
|
2019-10-28 05:43:01 +01:00
|
|
|
ldr::ro::RegisterProcess(pin_id, process_id, loc.program_id);
|
2019-06-27 00:46:19 +02:00
|
|
|
|
|
|
|
/* Register all NSOs. */
|
|
|
|
for (size_t i = 0; i < Nso_Count; i++) {
|
|
|
|
if (has_nso[i]) {
|
|
|
|
ldr::ro::RegisterModule(pin_id, nso_headers[i].build_id, info.nso_address[i], info.nso_size[i]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-06-28 05:51:57 +02:00
|
|
|
/* If we're overriding for HBL, perform HTML document redirection. */
|
2020-03-09 11:10:12 +01:00
|
|
|
if (override_status.IsHbl()) {
|
2019-06-28 05:51:57 +02:00
|
|
|
/* Don't validate result, failure is okay. */
|
|
|
|
RedirectHtmlDocumentPathForHbl(loc);
|
|
|
|
}
|
|
|
|
|
2020-03-09 11:10:12 +01:00
|
|
|
/* Clear the external code for the program. */
|
|
|
|
fssystem::DestroyExternalCode(loc.program_id);
|
2019-06-28 05:51:57 +02:00
|
|
|
|
2019-10-28 05:43:01 +01:00
|
|
|
/* Note that we've created the program. */
|
2021-01-18 15:18:14 +01:00
|
|
|
SetLaunchedBootProgram(loc.program_id);
|
2019-06-28 05:51:57 +02:00
|
|
|
|
2019-06-27 00:46:19 +02:00
|
|
|
/* Move the process handle to output. */
|
2021-10-04 21:33:09 +02:00
|
|
|
*out = info.process_handle;
|
|
|
|
info.process_handle = os::InvalidNativeHandle;
|
2019-06-27 00:46:19 +02:00
|
|
|
}
|
|
|
|
|
2019-10-24 10:40:44 +02:00
|
|
|
return ResultSuccess();
|
2019-03-20 15:53:56 +01:00
|
|
|
}
|
2019-01-07 01:30:05 +01:00
|
|
|
|
2019-11-21 13:03:19 +01:00
|
|
|
Result GetProgramInfo(ProgramInfo *out, cfg::OverrideStatus *out_status, const ncm::ProgramLocation &loc) {
|
2019-06-27 00:46:19 +02:00
|
|
|
Meta meta;
|
|
|
|
|
|
|
|
/* Load Meta. */
|
|
|
|
{
|
2019-06-28 02:37:33 +02:00
|
|
|
ScopedCodeMount mount(loc);
|
|
|
|
R_TRY(mount.GetResult());
|
2020-04-14 11:45:28 +02:00
|
|
|
R_TRY(LoadMeta(&meta, loc, mount.GetOverrideStatus()));
|
2019-11-21 13:03:19 +01:00
|
|
|
if (out_status != nullptr) {
|
|
|
|
*out_status = mount.GetOverrideStatus();
|
|
|
|
}
|
2019-06-27 00:46:19 +02:00
|
|
|
}
|
2019-03-20 15:53:56 +01:00
|
|
|
|
2019-06-27 00:46:19 +02:00
|
|
|
return GetProgramInfoFromMeta(out, &meta);
|
|
|
|
}
|
2019-03-24 02:27:53 +01:00
|
|
|
|
2018-04-22 03:52:49 +02:00
|
|
|
}
|