2019-04-21 11:09:08 +02:00
|
|
|
/*
|
|
|
|
* Copyright (c) 2018-2019 Atmosphère-NX
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify it
|
|
|
|
* under the terms and conditions of the GNU General Public License,
|
|
|
|
* version 2, as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope it will be useful, but WITHOUT
|
|
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
|
|
|
|
* more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
2019-04-21 16:28:07 +02:00
|
|
|
|
2019-04-21 11:09:08 +02:00
|
|
|
#include <switch.h>
|
|
|
|
#include <cstdio>
|
|
|
|
#include <algorithm>
|
|
|
|
#include <stratosphere.hpp>
|
|
|
|
|
|
|
|
#include "ro_registration.hpp"
|
2019-04-21 14:28:57 +02:00
|
|
|
#include "ro_map.hpp"
|
|
|
|
#include "ro_nrr.hpp"
|
2019-04-21 11:09:08 +02:00
|
|
|
|
2019-04-21 12:39:29 +02:00
|
|
|
/* Declare process contexts as global array. */
|
2019-04-21 11:09:08 +02:00
|
|
|
static Registration::RoProcessContext g_process_contexts[Registration::MaxSessions] = {};
|
|
|
|
|
2019-04-21 12:39:29 +02:00
|
|
|
static bool g_is_development_hardware, g_is_development_function_enabled;
|
|
|
|
|
|
|
|
void Registration::Initialize() {
|
|
|
|
if (R_FAILED(splInitialize())) {
|
|
|
|
std::abort();
|
|
|
|
}
|
|
|
|
ON_SCOPE_EXIT { splExit(); };
|
2019-04-21 16:28:07 +02:00
|
|
|
|
2019-04-21 12:39:29 +02:00
|
|
|
if (R_FAILED(splIsDevelopment(&g_is_development_hardware))) {
|
|
|
|
std::abort();
|
|
|
|
}
|
2019-04-21 16:28:07 +02:00
|
|
|
|
2019-04-21 12:39:29 +02:00
|
|
|
{
|
|
|
|
u64 out_val = 0;
|
|
|
|
if (R_FAILED(splGetConfig(SplConfigItem_IsDebugMode, &out_val))) {
|
|
|
|
std::abort();
|
|
|
|
}
|
|
|
|
g_is_development_function_enabled = out_val != 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-21 14:28:57 +02:00
|
|
|
bool Registration::ShouldEaseNroRestriction() {
|
|
|
|
bool should_ease = false;
|
2019-04-21 16:28:07 +02:00
|
|
|
|
2019-04-21 14:28:57 +02:00
|
|
|
if (R_FAILED(setsysGetSettingsItemValue("ro", "ease_nro_restriction", &should_ease, sizeof(should_ease)))) {
|
|
|
|
return false;
|
|
|
|
}
|
2019-04-21 16:28:07 +02:00
|
|
|
|
2019-04-21 14:28:57 +02:00
|
|
|
/* Nintendo only allows easing restriction on dev, we will allow on production, as well. */
|
|
|
|
/* should_ease &= g_is_development_function_enabled; */
|
|
|
|
return should_ease;
|
|
|
|
}
|
|
|
|
|
2019-04-21 11:09:08 +02:00
|
|
|
Result Registration::RegisterProcess(RoProcessContext **out_context, Handle process_handle, u64 process_id) {
|
|
|
|
/* Check if a process context already exists. */
|
|
|
|
for (size_t i = 0; i < Registration::MaxSessions; i++) {
|
|
|
|
if (g_process_contexts[i].process_id == process_id) {
|
|
|
|
return ResultRoInvalidSession;
|
|
|
|
}
|
|
|
|
}
|
2019-04-21 16:28:07 +02:00
|
|
|
|
2019-04-21 11:09:08 +02:00
|
|
|
/* Find a free process context. */
|
|
|
|
for (size_t i = 0; i < Registration::MaxSessions; i++) {
|
|
|
|
if (!g_process_contexts[i].in_use) {
|
2019-04-21 16:28:07 +02:00
|
|
|
std::memset(&g_process_contexts[i], 0, sizeof(g_process_contexts[i]));
|
2019-04-21 11:09:08 +02:00
|
|
|
g_process_contexts[i].process_id = process_id;
|
|
|
|
g_process_contexts[i].process_handle = process_handle;
|
|
|
|
g_process_contexts[i].in_use = true;
|
|
|
|
*out_context = &g_process_contexts[i];
|
|
|
|
return ResultSuccess;
|
|
|
|
}
|
|
|
|
}
|
2019-04-21 16:28:07 +02:00
|
|
|
|
2019-04-21 11:09:08 +02:00
|
|
|
/* Failure to find a free context is actually an abort condition. */
|
|
|
|
/* TODO: Should this return an unofficial error code? */
|
|
|
|
std::abort();
|
|
|
|
}
|
|
|
|
|
|
|
|
void Registration::UnregisterProcess(RoProcessContext *context) {
|
|
|
|
if (context->process_handle != INVALID_HANDLE) {
|
|
|
|
for (size_t i = 0; i < Registration::MaxNrrInfos; i++) {
|
|
|
|
if (context->nrr_in_use[i]) {
|
|
|
|
UnmapNrr(context->process_handle, context->nrr_infos[i].header, context->nrr_infos[i].nrr_heap_address, context->nrr_infos[i].nrr_heap_size, context->nrr_infos[i].mapped_code_address);
|
|
|
|
}
|
|
|
|
}
|
2019-04-21 16:28:07 +02:00
|
|
|
svcCloseHandle(context->process_handle);
|
2019-04-21 11:09:08 +02:00
|
|
|
}
|
2019-04-21 12:39:29 +02:00
|
|
|
std::memset(context, 0, sizeof(*context));
|
2019-04-21 11:09:08 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
Result Registration::GetProcessModuleInfo(u32 *out_count, LoaderModuleInfo *out_infos, size_t max_out_count, u64 process_id) {
|
|
|
|
size_t count = 0;
|
|
|
|
for (size_t sess = 0; sess < Registration::MaxSessions; sess++) {
|
|
|
|
if (g_process_contexts[sess].process_id == process_id) {
|
|
|
|
/* For convenience, helper. */
|
|
|
|
const RoProcessContext *context = &g_process_contexts[sess];
|
|
|
|
|
|
|
|
for (size_t i = 0; i < Registration::MaxNroInfos && count < max_out_count; i++) {
|
|
|
|
if (!context->nro_in_use[i]) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Just copy out the info. */
|
|
|
|
LoaderModuleInfo *out_info = &out_infos[count++];
|
|
|
|
memcpy(out_info->build_id, &context->nro_infos[i].module_id, sizeof(context->nro_infos[i].module_id));
|
|
|
|
out_info->base_address = context->nro_infos[i].base_address;
|
|
|
|
out_info->size = context->nro_infos[i].nro_heap_size + context->nro_infos[i].bss_heap_size;
|
|
|
|
}
|
|
|
|
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
*out_count = static_cast<u32>(count);
|
|
|
|
return ResultSuccess;
|
|
|
|
}
|
|
|
|
|
2019-04-21 12:39:29 +02:00
|
|
|
Result Registration::LoadNrr(RoProcessContext *context, u64 title_id, u64 nrr_address, u64 nrr_size, RoModuleType expected_type, bool enforce_type) {
|
|
|
|
/* Validate address/size. */
|
|
|
|
if (nrr_address & 0xFFF) {
|
|
|
|
return ResultRoInvalidAddress;
|
|
|
|
}
|
|
|
|
if (nrr_size == 0 || (nrr_size & 0xFFF) || !(nrr_address < nrr_address + nrr_size)) {
|
|
|
|
return ResultRoInvalidSize;
|
|
|
|
}
|
2019-04-21 16:28:07 +02:00
|
|
|
|
2019-04-21 12:39:29 +02:00
|
|
|
/* Check we have space for a new NRR. */
|
|
|
|
size_t slot = 0;
|
|
|
|
for (slot = 0; slot < Registration::MaxNrrInfos; slot++) {
|
|
|
|
if (!context->nrr_in_use[slot]) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (slot == Registration::MaxNrrInfos) {
|
|
|
|
return ResultRoTooManyNrr;
|
|
|
|
}
|
2019-04-21 16:28:07 +02:00
|
|
|
|
2019-04-21 12:39:29 +02:00
|
|
|
NrrInfo *nrr_info = &context->nrr_infos[slot];
|
2019-04-21 16:28:07 +02:00
|
|
|
|
2019-04-21 12:39:29 +02:00
|
|
|
/* Map. */
|
|
|
|
NrrHeader *header = nullptr;
|
|
|
|
u64 mapped_code_address = 0;
|
2019-04-21 14:28:57 +02:00
|
|
|
Result rc = MapAndValidateNrr(&header, &mapped_code_address, context->process_handle, title_id, nrr_address, nrr_size, expected_type, enforce_type);
|
2019-04-21 12:39:29 +02:00
|
|
|
if (R_FAILED(rc)) {
|
|
|
|
return rc;
|
|
|
|
}
|
2019-04-21 16:28:07 +02:00
|
|
|
|
2019-04-21 12:39:29 +02:00
|
|
|
/* Set NRR info. */
|
|
|
|
nrr_info->header = header;
|
|
|
|
nrr_info->nrr_heap_address = nrr_address;
|
|
|
|
nrr_info->nrr_heap_size = nrr_size;
|
|
|
|
nrr_info->mapped_code_address = mapped_code_address;
|
|
|
|
context->nrr_in_use[slot] = true;
|
2019-04-21 16:28:07 +02:00
|
|
|
|
2019-04-21 12:39:29 +02:00
|
|
|
/* TODO. */
|
|
|
|
return ResultSuccess;
|
|
|
|
}
|
|
|
|
|
|
|
|
Result Registration::UnloadNrr(RoProcessContext *context, u64 nrr_address) {
|
|
|
|
/* Validate address. */
|
|
|
|
if (nrr_address & 0xFFF) {
|
|
|
|
return ResultRoInvalidAddress;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check the NRR is loaded. */
|
|
|
|
size_t slot = 0;
|
|
|
|
for (slot = 0; slot < Registration::MaxNrrInfos; slot++) {
|
|
|
|
if (!context->nrr_in_use[slot]) {
|
|
|
|
continue;
|
|
|
|
}
|
2019-04-21 16:28:07 +02:00
|
|
|
|
2019-04-21 12:39:29 +02:00
|
|
|
if (context->nrr_infos[slot].nrr_heap_address == nrr_address) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (slot == Registration::MaxNrrInfos) {
|
|
|
|
return ResultRoNotRegistered;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Unmap. */
|
|
|
|
const NrrInfo nrr_info = context->nrr_infos[slot];
|
|
|
|
{
|
|
|
|
/* Nintendo does this unconditionally, whether or not the actual unmap succeeds. */
|
|
|
|
context->nrr_in_use[slot] = false;
|
|
|
|
std::memset(&context->nrr_infos[slot], 0, sizeof(context->nrr_infos[slot]));
|
|
|
|
}
|
|
|
|
return UnmapNrr(context->process_handle, nrr_info.header, nrr_info.nrr_heap_address, nrr_info.nrr_heap_size, nrr_info.mapped_code_address);
|
|
|
|
}
|
|
|
|
|
2019-04-21 16:28:07 +02:00
|
|
|
|
|
|
|
Result Registration::LoadNro(u64 *out_address, RoProcessContext *context, u64 nro_address, u64 nro_size, u64 bss_address, u64 bss_size) {
|
|
|
|
/* Validate address/size. */
|
|
|
|
if (nro_address & 0xFFF) {
|
|
|
|
return ResultRoInvalidAddress;
|
|
|
|
}
|
|
|
|
if (nro_size == 0 || (nro_size & 0xFFF) || !(nro_address < nro_address + nro_size)) {
|
|
|
|
return ResultRoInvalidSize;
|
|
|
|
}
|
|
|
|
if (bss_address & 0xFFF) {
|
|
|
|
return ResultRoInvalidAddress;
|
|
|
|
}
|
|
|
|
if ((bss_size & 0xFFF) || (bss_size > 0 && !(bss_address < bss_address + bss_size))) {
|
|
|
|
return ResultRoInvalidSize;
|
|
|
|
}
|
|
|
|
|
|
|
|
const u64 total_size = nro_size + bss_size;
|
|
|
|
if (total_size < nro_size || total_size < bss_size) {
|
|
|
|
return ResultRoInvalidSize;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check we have space for a new NRO. */
|
|
|
|
size_t slot = 0;
|
|
|
|
for (slot = 0; slot < Registration::MaxNroInfos; slot++) {
|
|
|
|
if (!context->nro_in_use[slot]) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (slot == Registration::MaxNroInfos) {
|
|
|
|
return ResultRoTooManyNro;
|
|
|
|
}
|
|
|
|
|
|
|
|
NroInfo *nro_info = &context->nro_infos[slot];
|
|
|
|
nro_info->nro_heap_address = nro_address;
|
|
|
|
nro_info->nro_heap_size = nro_size;
|
|
|
|
nro_info->bss_heap_address = bss_address;
|
|
|
|
nro_info->bss_heap_size = bss_size;
|
|
|
|
|
|
|
|
/* Map the NRO. */
|
|
|
|
Result rc = MapNro(&nro_info->base_address, context->process_handle, nro_address, nro_size, bss_address, bss_size);
|
|
|
|
if (R_FAILED(rc)) {
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Validate the NRO (parsing region extents). */
|
|
|
|
u64 rx_size, ro_size, rw_size;
|
|
|
|
if (R_FAILED((rc = ValidateNro(&nro_info->module_id, &rx_size, &ro_size, &rw_size, context, nro_info->base_address, nro_size, bss_size)))) {
|
|
|
|
UnmapNro(context->process_handle, nro_info->base_address, nro_address, bss_address, bss_size, nro_size, 0);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Set NRO perms. */
|
|
|
|
if (R_FAILED((rc = SetNroPerms(context->process_handle, nro_info->base_address, rx_size, ro_size, rw_size + bss_size)))) {
|
|
|
|
UnmapNro(context->process_handle, nro_info->base_address, nro_address, bss_address, bss_size, rx_size + ro_size, rw_size);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
nro_info->code_size = rx_size + ro_size;
|
|
|
|
nro_info->rw_size = rw_size;
|
|
|
|
context->nro_in_use[slot] = true;
|
|
|
|
*out_address = nro_info->base_address;
|
|
|
|
return ResultSuccess;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool Registration::IsNroHashPresent(RoProcessContext *context, const Sha256Hash *hash) {
|
|
|
|
for (size_t i = 0; i < Registration::MaxNrrInfos; i++) {
|
|
|
|
if (context->nrr_in_use[i]) {
|
|
|
|
const Sha256Hash *nro_hashes = reinterpret_cast<const Sha256Hash *>(reinterpret_cast<uintptr_t>(context->nrr_infos[i].header) + context->nrr_infos[i].header->hash_offset);
|
|
|
|
if (std::binary_search(nro_hashes, nro_hashes + context->nrr_infos[i].header->num_hashes, *hash)) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
Result Registration::ValidateNro(ModuleId *out_module_id, u64 *out_rx_size, u64 *out_ro_size, u64 *out_rw_size, RoProcessContext *context, u64 base_address, u64 nro_size, u64 bss_size) {
|
|
|
|
/* Find space to map the NRO. */
|
|
|
|
u64 map_address;
|
|
|
|
if (R_FAILED(MapUtils::LocateSpaceForMap(&map_address, nro_size))) {
|
|
|
|
return ResultRoInsufficientAddressSpace;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Actually map the NRO. */
|
|
|
|
AutoCloseMap nro_map(map_address, context->process_handle, base_address, nro_size);
|
|
|
|
if (!nro_map.IsSuccess()) {
|
|
|
|
return nro_map.GetResult();
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Validate header. */
|
|
|
|
const Registration::NroHeader *header = reinterpret_cast<const Registration::NroHeader *>(map_address);
|
|
|
|
if (header->magic != MagicNro0) {
|
|
|
|
return ResultRoInvalidNro;
|
|
|
|
}
|
|
|
|
if (header->nro_size != nro_size || header->bss_size != bss_size) {
|
|
|
|
return ResultRoInvalidNro;
|
|
|
|
}
|
|
|
|
if ((header->text_size & 0xFFF) || (header->ro_size & 0xFFF) || (header->rw_size & 0xFFF) || (header->bss_size & 0xFFF)) {
|
|
|
|
return ResultRoInvalidNro;
|
|
|
|
}
|
|
|
|
if (header->text_offset > header->ro_offset || header->ro_offset > header->rw_offset) {
|
|
|
|
return ResultRoInvalidNro;
|
|
|
|
}
|
|
|
|
if (header->text_offset != 0 || header->text_offset + header->text_size != header->ro_offset || header->ro_offset + header->ro_size != header->rw_offset || header->rw_offset + header->rw_size != header->nro_size) {
|
|
|
|
return ResultRoInvalidNro;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Verify NRO hash. */
|
|
|
|
{
|
|
|
|
Sha256Hash hash;
|
|
|
|
sha256CalculateHash(&hash, header, nro_size);
|
|
|
|
if (!IsNroHashPresent(context, &hash)) {
|
|
|
|
return ResultRoNotAuthorized;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
ModuleId module_id;
|
|
|
|
std::memcpy(&module_id, header->build_id, sizeof(module_id));
|
|
|
|
|
|
|
|
/* Check if NRO has already been loaded. */
|
|
|
|
for (size_t i = 0; i < Registration::MaxNroInfos; i++) {
|
|
|
|
if (context->nro_in_use[i]) {
|
|
|
|
if (std::memcmp(&context->nro_infos[i].module_id, &module_id, sizeof(module_id)) == 0) {
|
|
|
|
return ResultRoAlreadyLoaded;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
*out_module_id = module_id;
|
|
|
|
*out_rx_size = header->text_size;
|
|
|
|
*out_ro_size = header->ro_size;
|
|
|
|
*out_rw_size = header->rw_size;
|
|
|
|
return ResultSuccess;
|
|
|
|
}
|
|
|
|
|
|
|
|
Result Registration::SetNroPerms(Handle process_handle, u64 base_address, u64 rx_size, u64 ro_size, u64 rw_size) {
|
|
|
|
Result rc;
|
|
|
|
const u64 rx_offset = 0;
|
|
|
|
const u64 ro_offset = rx_offset + rx_size;
|
|
|
|
const u64 rw_offset = ro_offset + ro_size;
|
|
|
|
|
|
|
|
if (R_FAILED((rc = svcSetProcessMemoryPermission(process_handle, base_address + rx_offset, rx_size, 5)))) {
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
if (R_FAILED((rc = svcSetProcessMemoryPermission(process_handle, base_address + ro_offset, ro_size, 1)))) {
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
if (R_FAILED((rc = svcSetProcessMemoryPermission(process_handle, base_address + rw_offset, rw_size, 3)))) {
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ResultSuccess;
|
|
|
|
}
|
|
|
|
|
|
|
|
Result Registration::UnloadNro(RoProcessContext *context, u64 nro_address) {
|
|
|
|
/* Validate address. */
|
|
|
|
if (nro_address & 0xFFF) {
|
|
|
|
return ResultRoInvalidAddress;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check the NRO is loaded. */
|
|
|
|
size_t slot = 0;
|
|
|
|
for (slot = 0; slot < Registration::MaxNroInfos; slot++) {
|
|
|
|
if (!context->nro_in_use[slot]) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2019-04-22 09:31:17 +02:00
|
|
|
if (context->nro_infos[slot].base_address == nro_address) {
|
2019-04-21 16:28:07 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2019-04-22 09:31:17 +02:00
|
|
|
if (slot == Registration::MaxNroInfos) {
|
2019-04-21 16:28:07 +02:00
|
|
|
return ResultRoNotLoaded;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Unmap. */
|
|
|
|
const NroInfo nro_info = context->nro_infos[slot];
|
|
|
|
{
|
|
|
|
/* Nintendo does this unconditionally, whether or not the actual unmap succeeds. */
|
|
|
|
context->nro_in_use[slot] = false;
|
|
|
|
std::memset(&context->nro_infos[slot], 0, sizeof(context->nro_infos[slot]));
|
|
|
|
}
|
|
|
|
return UnmapNro(context->process_handle, nro_info.base_address, nro_info.nro_heap_address, nro_info.bss_heap_address, nro_info.bss_heap_size, nro_info.code_size, nro_info.rw_size);
|
|
|
|
}
|
|
|
|
|
2019-04-21 14:28:57 +02:00
|
|
|
Result Registration::MapAndValidateNrr(NrrHeader **out_header, u64 *out_mapped_code_address, Handle process_handle, u64 title_id, u64 nrr_heap_address, u64 nrr_heap_size, RoModuleType expected_type, bool enforce_type) {
|
|
|
|
Result rc;
|
|
|
|
MappedCodeMemory nrr_mcm;
|
2019-04-21 16:28:07 +02:00
|
|
|
|
2019-04-21 14:28:57 +02:00
|
|
|
/* First, map the NRR. */
|
|
|
|
if (R_FAILED((rc = MapUtils::MapCodeMemoryForProcess(nrr_mcm, process_handle, true, nrr_heap_address, nrr_heap_size)))) {
|
|
|
|
if (GetRuntimeFirmwareVersion() < FirmwareVersion_300) {
|
|
|
|
/* Try mapping as 32-bit, since we might have guessed wrong on < 3.0.0. */
|
|
|
|
rc = MapUtils::MapCodeMemoryForProcess(nrr_mcm, process_handle, false, nrr_heap_address, nrr_heap_size);
|
|
|
|
}
|
|
|
|
if (R_FAILED(rc)) {
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
}
|
2019-04-21 16:28:07 +02:00
|
|
|
|
2019-04-21 14:28:57 +02:00
|
|
|
const u64 code_address = nrr_mcm.GetDstAddress();
|
|
|
|
u64 map_address;
|
|
|
|
if (R_FAILED(MapUtils::LocateSpaceForMap(&map_address, nrr_heap_size))) {
|
|
|
|
return ResultRoInsufficientAddressSpace;
|
|
|
|
}
|
2019-04-21 16:28:07 +02:00
|
|
|
|
2019-04-21 14:28:57 +02:00
|
|
|
/* Nintendo...does not check the return value of this map. We will check, instead of aborting if it fails. */
|
|
|
|
AutoCloseMap nrr_map(map_address, process_handle, code_address, nrr_heap_size);
|
|
|
|
if (!nrr_map.IsSuccess()) {
|
|
|
|
return nrr_map.GetResult();
|
|
|
|
}
|
2019-04-21 16:28:07 +02:00
|
|
|
|
2019-04-21 14:28:57 +02:00
|
|
|
NrrHeader *nrr_header = reinterpret_cast<NrrHeader *>(map_address);
|
|
|
|
if (R_FAILED((rc = NrrUtils::ValidateNrr(nrr_header, nrr_heap_size, title_id, expected_type, enforce_type)))) {
|
|
|
|
return rc;
|
|
|
|
}
|
2019-04-21 16:28:07 +02:00
|
|
|
|
2019-04-21 14:28:57 +02:00
|
|
|
/* Invalidation here actually prevents them from unmapping at scope exit. */
|
|
|
|
nrr_map.Invalidate();
|
|
|
|
nrr_mcm.Invalidate();
|
2019-04-21 16:28:07 +02:00
|
|
|
|
2019-04-21 14:28:57 +02:00
|
|
|
*out_header = nrr_header;
|
|
|
|
*out_mapped_code_address = code_address;
|
|
|
|
return ResultSuccess;
|
2019-04-21 12:39:29 +02:00
|
|
|
}
|
|
|
|
|
2019-04-21 11:09:08 +02:00
|
|
|
Result Registration::UnmapNrr(Handle process_handle, const NrrHeader *header, u64 nrr_heap_address, u64 nrr_heap_size, u64 mapped_code_address) {
|
|
|
|
Result rc = svcUnmapProcessMemory((void *)header, process_handle, mapped_code_address, nrr_heap_size);
|
|
|
|
if (R_FAILED(rc)) {
|
|
|
|
return rc;
|
|
|
|
}
|
2019-04-21 16:28:07 +02:00
|
|
|
|
2019-04-21 11:09:08 +02:00
|
|
|
return svcUnmapProcessCodeMemory(process_handle, mapped_code_address, nrr_heap_address, nrr_heap_size);
|
|
|
|
}
|
2019-04-21 16:28:07 +02:00
|
|
|
|
|
|
|
Result Registration::MapNro(u64 *out_base_address, Handle process_handle, u64 nro_heap_address, u64 nro_heap_size, u64 bss_heap_address, u64 bss_heap_size) {
|
|
|
|
Result rc;
|
|
|
|
MappedCodeMemory nro_mcm;
|
|
|
|
MappedCodeMemory bss_mcm;
|
|
|
|
u64 base_address;
|
|
|
|
|
|
|
|
/* Map the NRO, and map the BSS immediately after it. */
|
|
|
|
size_t i = 0;
|
|
|
|
for (i = 0; i < MapUtils::LocateRetryCount; i++) {
|
|
|
|
MappedCodeMemory tmp_nro_mcm;
|
|
|
|
bool is_64_bit = true;
|
|
|
|
if (R_FAILED((rc = MapUtils::MapCodeMemoryForProcess(tmp_nro_mcm, process_handle, is_64_bit, nro_heap_address, nro_heap_size)))) {
|
|
|
|
if (GetRuntimeFirmwareVersion() < FirmwareVersion_300) {
|
|
|
|
/* Try mapping as 32-bit, since we might have guessed wrong on < 3.0.0. */
|
|
|
|
is_64_bit = false;
|
|
|
|
rc = MapUtils::MapCodeMemoryForProcess(tmp_nro_mcm, process_handle, is_64_bit, nro_heap_address, nro_heap_size);
|
|
|
|
}
|
|
|
|
if (R_FAILED(rc)) {
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
base_address = tmp_nro_mcm.GetDstAddress();
|
|
|
|
|
|
|
|
if (bss_heap_size > 0) {
|
|
|
|
MappedCodeMemory tmp_bss_mcm(process_handle, base_address + nro_heap_size, bss_heap_address, bss_heap_size);
|
|
|
|
rc = tmp_bss_mcm.GetResult();
|
|
|
|
if (rc == ResultKernelInvalidMemoryState) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (R_FAILED(rc)) {
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!MapUtils::CanAddGuardRegions(process_handle, base_address, nro_heap_size + bss_heap_size)) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
bss_mcm = std::move(tmp_bss_mcm);
|
|
|
|
} else {
|
|
|
|
if (!MapUtils::CanAddGuardRegions(process_handle, base_address, nro_heap_size)) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
nro_mcm = std::move(tmp_nro_mcm);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (i == MapUtils::LocateRetryCount) {
|
|
|
|
return ResultRoInsufficientAddressSpace;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Invalidation here actually prevents them from unmapping at scope exit. */
|
|
|
|
nro_mcm.Invalidate();
|
|
|
|
bss_mcm.Invalidate();
|
|
|
|
|
|
|
|
*out_base_address = base_address;
|
|
|
|
return ResultSuccess;
|
|
|
|
}
|
|
|
|
|
|
|
|
Result Registration::UnmapNro(Handle process_handle, u64 base_address, u64 nro_heap_address, u64 bss_heap_address, u64 bss_heap_size, u64 code_size, u64 rw_size) {
|
|
|
|
Result rc;
|
|
|
|
|
|
|
|
/* First, unmap bss. */
|
|
|
|
if (bss_heap_size > 0) {
|
|
|
|
if (R_FAILED((rc = svcUnmapProcessCodeMemory(process_handle, base_address + code_size + rw_size, bss_heap_address, bss_heap_size)))) {
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Next, unmap .rwdata */
|
|
|
|
if (rw_size > 0) {
|
|
|
|
if (R_FAILED((rc = svcUnmapProcessCodeMemory(process_handle, base_address + code_size, nro_heap_address + code_size, rw_size)))) {
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Finally, unmap .text + .rodata. */
|
|
|
|
if (R_FAILED((rc = svcUnmapProcessCodeMemory(process_handle, base_address, nro_heap_address, code_size)))) {
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ResultSuccess;
|
|
|
|
}
|