ProgramLoader.cs 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366
  1. using ARMeilleure.Translation.PTC;
  2. using LibHac.Loader;
  3. using LibHac.Ncm;
  4. using LibHac.Util;
  5. using Ryujinx.Common;
  6. using Ryujinx.Common.Logging;
  7. using Ryujinx.HLE.HOS.Kernel;
  8. using Ryujinx.HLE.HOS.Kernel.Common;
  9. using Ryujinx.HLE.HOS.Kernel.Memory;
  10. using Ryujinx.HLE.HOS.Kernel.Process;
  11. using Ryujinx.HLE.Loaders.Executables;
  12. using System;
  13. using System.Linq;
  14. using System.Runtime.InteropServices;
  15. using Npdm = LibHac.Loader.Npdm;
  16. namespace Ryujinx.HLE.HOS
  17. {
  18. struct ProgramInfo
  19. {
  20. public string Name;
  21. public ulong ProgramId;
  22. public ProgramInfo(in Npdm npdm)
  23. {
  24. Name = StringUtils.Utf8ZToString(npdm.Meta.Value.ProgramName);
  25. ProgramId = npdm.Aci.Value.ProgramId.Value;
  26. }
  27. }
  28. static class ProgramLoader
  29. {
  30. private const bool AslrEnabled = true;
  31. private const int ArgsHeaderSize = 8;
  32. private const int ArgsDataSize = 0x9000;
  33. private const int ArgsTotalSize = ArgsHeaderSize + ArgsDataSize;
  34. public static bool LoadKip(KernelContext context, KipExecutable kip)
  35. {
  36. uint endOffset = kip.DataOffset + (uint)kip.Data.Length;
  37. if (kip.BssSize != 0)
  38. {
  39. endOffset = kip.BssOffset + kip.BssSize;
  40. }
  41. uint codeSize = BitUtils.AlignUp(kip.TextOffset + endOffset, KPageTableBase.PageSize);
  42. int codePagesCount = (int)(codeSize / KPageTableBase.PageSize);
  43. ulong codeBaseAddress = kip.Is64BitAddressSpace ? 0x8000000UL : 0x200000UL;
  44. ulong codeAddress = codeBaseAddress + (ulong)kip.TextOffset;
  45. ProcessCreationFlags flags = 0;
  46. if (AslrEnabled)
  47. {
  48. // TODO: Randomization.
  49. flags |= ProcessCreationFlags.EnableAslr;
  50. }
  51. if (kip.Is64BitAddressSpace)
  52. {
  53. flags |= ProcessCreationFlags.AddressSpace64Bit;
  54. }
  55. if (kip.Is64Bit)
  56. {
  57. flags |= ProcessCreationFlags.Is64Bit;
  58. }
  59. ProcessCreationInfo creationInfo = new ProcessCreationInfo(
  60. kip.Name,
  61. kip.Version,
  62. kip.ProgramId,
  63. codeAddress,
  64. codePagesCount,
  65. flags,
  66. 0,
  67. 0);
  68. MemoryRegion memoryRegion = kip.UsesSecureMemory
  69. ? MemoryRegion.Service
  70. : MemoryRegion.Application;
  71. KMemoryRegionManager region = context.MemoryManager.MemoryRegions[(int)memoryRegion];
  72. KernelResult result = region.AllocatePages((ulong)codePagesCount, false, out KPageList pageList);
  73. if (result != KernelResult.Success)
  74. {
  75. Logger.Error?.Print(LogClass.Loader, $"Process initialization returned error \"{result}\".");
  76. return false;
  77. }
  78. KProcess process = new KProcess(context);
  79. var processContextFactory = new ArmProcessContextFactory(context.Device.Gpu);
  80. result = process.InitializeKip(
  81. creationInfo,
  82. kip.Capabilities,
  83. pageList,
  84. context.ResourceLimit,
  85. memoryRegion,
  86. processContextFactory);
  87. if (result != KernelResult.Success)
  88. {
  89. Logger.Error?.Print(LogClass.Loader, $"Process initialization returned error \"{result}\".");
  90. return false;
  91. }
  92. result = LoadIntoMemory(process, kip, codeBaseAddress);
  93. if (result != KernelResult.Success)
  94. {
  95. Logger.Error?.Print(LogClass.Loader, $"Process initialization returned error \"{result}\".");
  96. return false;
  97. }
  98. process.DefaultCpuCore = kip.IdealCoreId;
  99. result = process.Start(kip.Priority, (ulong)kip.StackSize);
  100. if (result != KernelResult.Success)
  101. {
  102. Logger.Error?.Print(LogClass.Loader, $"Process start returned error \"{result}\".");
  103. return false;
  104. }
  105. context.Processes.TryAdd(process.Pid, process);
  106. return true;
  107. }
  108. public static bool LoadNsos(KernelContext context, out ProcessTamperInfo tamperInfo, MetaLoader metaData, ProgramInfo programInfo, byte[] arguments = null, params IExecutable[] executables)
  109. {
  110. LibHac.Result rc = metaData.GetNpdm(out var npdm);
  111. if (rc.IsFailure())
  112. {
  113. tamperInfo = null;
  114. return false;
  115. }
  116. ref readonly var meta = ref npdm.Meta.Value;
  117. ulong argsStart = 0;
  118. uint argsSize = 0;
  119. ulong codeStart = (meta.Flags & 1) != 0 ? 0x8000000UL : 0x200000UL;
  120. uint codeSize = 0;
  121. var buildIds = executables.Select(e => (e switch
  122. {
  123. NsoExecutable nso => BitConverter.ToString(nso.BuildId.Bytes.ToArray()),
  124. NroExecutable nro => BitConverter.ToString(nro.Header.BuildId),
  125. _ => ""
  126. }).Replace("-", "").ToUpper());
  127. ulong[] nsoBase = new ulong[executables.Length];
  128. for (int index = 0; index < executables.Length; index++)
  129. {
  130. IExecutable nso = executables[index];
  131. uint textEnd = nso.TextOffset + (uint)nso.Text.Length;
  132. uint roEnd = nso.RoOffset + (uint)nso.Ro.Length;
  133. uint dataEnd = nso.DataOffset + (uint)nso.Data.Length + nso.BssSize;
  134. uint nsoSize = textEnd;
  135. if (nsoSize < roEnd)
  136. {
  137. nsoSize = roEnd;
  138. }
  139. if (nsoSize < dataEnd)
  140. {
  141. nsoSize = dataEnd;
  142. }
  143. nsoSize = BitUtils.AlignUp(nsoSize, KPageTableBase.PageSize);
  144. nsoBase[index] = codeStart + (ulong)codeSize;
  145. codeSize += nsoSize;
  146. if (arguments != null && argsSize == 0)
  147. {
  148. argsStart = (ulong)codeSize;
  149. argsSize = (uint)BitUtils.AlignDown(arguments.Length * 2 + ArgsTotalSize - 1, KPageTableBase.PageSize);
  150. codeSize += argsSize;
  151. }
  152. }
  153. PtcProfiler.StaticCodeStart = codeStart;
  154. PtcProfiler.StaticCodeSize = (ulong)codeSize;
  155. int codePagesCount = (int)(codeSize / KPageTableBase.PageSize);
  156. int personalMmHeapPagesCount = (int)(meta.SystemResourceSize / KPageTableBase.PageSize);
  157. ProcessCreationInfo creationInfo = new ProcessCreationInfo(
  158. programInfo.Name,
  159. (int)meta.Version,
  160. programInfo.ProgramId,
  161. codeStart,
  162. codePagesCount,
  163. (ProcessCreationFlags)meta.Flags | ProcessCreationFlags.IsApplication,
  164. 0,
  165. personalMmHeapPagesCount);
  166. context.Device.System.LibHacHorizonManager.InitializeApplicationClient(new ProgramId(programInfo.ProgramId), in npdm);
  167. KernelResult result;
  168. KResourceLimit resourceLimit = new KResourceLimit(context);
  169. long applicationRgSize = (long)context.MemoryManager.MemoryRegions[(int)MemoryRegion.Application].Size;
  170. result = resourceLimit.SetLimitValue(LimitableResource.Memory, applicationRgSize);
  171. result |= resourceLimit.SetLimitValue(LimitableResource.Thread, 608);
  172. result |= resourceLimit.SetLimitValue(LimitableResource.Event, 700);
  173. result |= resourceLimit.SetLimitValue(LimitableResource.TransferMemory, 128);
  174. result |= resourceLimit.SetLimitValue(LimitableResource.Session, 894);
  175. if (result != KernelResult.Success)
  176. {
  177. Logger.Error?.Print(LogClass.Loader, $"Process initialization failed setting resource limit values.");
  178. tamperInfo = null;
  179. return false;
  180. }
  181. KProcess process = new KProcess(context);
  182. MemoryRegion memoryRegion = (MemoryRegion)((npdm.Acid.Value.Flags >> 2) & 0xf);
  183. if (memoryRegion > MemoryRegion.NvServices)
  184. {
  185. Logger.Error?.Print(LogClass.Loader, $"Process initialization failed due to invalid ACID flags.");
  186. tamperInfo = null;
  187. return false;
  188. }
  189. var processContextFactory = new ArmProcessContextFactory(context.Device.Gpu);
  190. result = process.Initialize(
  191. creationInfo,
  192. MemoryMarshal.Cast<byte, int>(npdm.KernelCapabilityData).ToArray(),
  193. resourceLimit,
  194. memoryRegion,
  195. processContextFactory);
  196. if (result != KernelResult.Success)
  197. {
  198. Logger.Error?.Print(LogClass.Loader, $"Process initialization returned error \"{result}\".");
  199. tamperInfo = null;
  200. return false;
  201. }
  202. for (int index = 0; index < executables.Length; index++)
  203. {
  204. Logger.Info?.Print(LogClass.Loader, $"Loading image {index} at 0x{nsoBase[index]:x16}...");
  205. result = LoadIntoMemory(process, executables[index], nsoBase[index]);
  206. if (result != KernelResult.Success)
  207. {
  208. Logger.Error?.Print(LogClass.Loader, $"Process initialization returned error \"{result}\".");
  209. tamperInfo = null;
  210. return false;
  211. }
  212. }
  213. process.DefaultCpuCore = meta.DefaultCpuId;
  214. result = process.Start(meta.MainThreadPriority, meta.MainThreadStackSize);
  215. if (result != KernelResult.Success)
  216. {
  217. Logger.Error?.Print(LogClass.Loader, $"Process start returned error \"{result}\".");
  218. tamperInfo = null;
  219. return false;
  220. }
  221. context.Processes.TryAdd(process.Pid, process);
  222. // Keep the build ids because the tamper machine uses them to know which process to associate a
  223. // tamper to and also keep the starting address of each executable inside a process because some
  224. // memory modifications are relative to this address.
  225. tamperInfo = new ProcessTamperInfo(process, buildIds, nsoBase, process.MemoryManager.HeapRegionStart,
  226. process.MemoryManager.AliasRegionStart, process.MemoryManager.CodeRegionStart);
  227. return true;
  228. }
  229. private static KernelResult LoadIntoMemory(KProcess process, IExecutable image, ulong baseAddress)
  230. {
  231. ulong textStart = baseAddress + (ulong)image.TextOffset;
  232. ulong roStart = baseAddress + (ulong)image.RoOffset;
  233. ulong dataStart = baseAddress + (ulong)image.DataOffset;
  234. ulong bssStart = baseAddress + (ulong)image.BssOffset;
  235. ulong end = dataStart + (ulong)image.Data.Length;
  236. if (image.BssSize != 0)
  237. {
  238. end = bssStart + (ulong)image.BssSize;
  239. }
  240. process.CpuMemory.Write(textStart, image.Text);
  241. process.CpuMemory.Write(roStart, image.Ro);
  242. process.CpuMemory.Write(dataStart, image.Data);
  243. process.CpuMemory.Fill(bssStart, image.BssSize, 0);
  244. KernelResult SetProcessMemoryPermission(ulong address, ulong size, KMemoryPermission permission)
  245. {
  246. if (size == 0)
  247. {
  248. return KernelResult.Success;
  249. }
  250. size = BitUtils.AlignUp(size, KPageTableBase.PageSize);
  251. return process.MemoryManager.SetProcessMemoryPermission(address, size, permission);
  252. }
  253. KernelResult result = SetProcessMemoryPermission(textStart, (ulong)image.Text.Length, KMemoryPermission.ReadAndExecute);
  254. if (result != KernelResult.Success)
  255. {
  256. return result;
  257. }
  258. result = SetProcessMemoryPermission(roStart, (ulong)image.Ro.Length, KMemoryPermission.Read);
  259. if (result != KernelResult.Success)
  260. {
  261. return result;
  262. }
  263. return SetProcessMemoryPermission(dataStart, end - dataStart, KMemoryPermission.ReadAndWrite);
  264. }
  265. }
  266. }