KProcessCapabilities.cs 9.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319
  1. using Ryujinx.Common;
  2. using Ryujinx.HLE.HOS.Kernel.Common;
  3. using Ryujinx.HLE.HOS.Kernel.Memory;
  4. using Ryujinx.HLE.HOS.Kernel.Threading;
  5. namespace Ryujinx.HLE.HOS.Kernel.Process
  6. {
  7. class KProcessCapabilities
  8. {
  9. public byte[] SvcAccessMask { get; private set; }
  10. public byte[] IrqAccessMask { get; private set; }
  11. public long AllowedCpuCoresMask { get; private set; }
  12. public long AllowedThreadPriosMask { get; private set; }
  13. public int DebuggingFlags { get; private set; }
  14. public int HandleTableSize { get; private set; }
  15. public int KernelReleaseVersion { get; private set; }
  16. public int ApplicationType { get; private set; }
  17. public KProcessCapabilities()
  18. {
  19. SvcAccessMask = new byte[0x10];
  20. IrqAccessMask = new byte[0x80];
  21. }
  22. public KernelResult InitializeForKernel(int[] caps, KMemoryManager memoryManager)
  23. {
  24. AllowedCpuCoresMask = 0xf;
  25. AllowedThreadPriosMask = -1;
  26. DebuggingFlags &= ~3;
  27. KernelReleaseVersion = KProcess.KernelVersionPacked;
  28. return Parse(caps, memoryManager);
  29. }
  30. public KernelResult InitializeForUser(int[] caps, KMemoryManager memoryManager)
  31. {
  32. return Parse(caps, memoryManager);
  33. }
  34. private KernelResult Parse(int[] caps, KMemoryManager memoryManager)
  35. {
  36. int mask0 = 0;
  37. int mask1 = 0;
  38. for (int index = 0; index < caps.Length; index++)
  39. {
  40. int cap = caps[index];
  41. if (((cap + 1) & ~cap) != 0x40)
  42. {
  43. KernelResult result = ParseCapability(cap, ref mask0, ref mask1, memoryManager);
  44. if (result != KernelResult.Success)
  45. {
  46. return result;
  47. }
  48. }
  49. else
  50. {
  51. if ((uint)index + 1 >= caps.Length)
  52. {
  53. return KernelResult.InvalidCombination;
  54. }
  55. int prevCap = cap;
  56. cap = caps[++index];
  57. if (((cap + 1) & ~cap) != 0x40)
  58. {
  59. return KernelResult.InvalidCombination;
  60. }
  61. if ((cap & 0x78000000) != 0)
  62. {
  63. return KernelResult.MaximumExceeded;
  64. }
  65. if ((cap & 0x7ffff80) == 0)
  66. {
  67. return KernelResult.InvalidSize;
  68. }
  69. long address = ((long)(uint)prevCap << 5) & 0xffffff000;
  70. long size = ((long)(uint)cap << 5) & 0xfffff000;
  71. if (((ulong)(address + size - 1) >> 36) != 0)
  72. {
  73. return KernelResult.InvalidAddress;
  74. }
  75. MemoryPermission perm = (prevCap >> 31) != 0
  76. ? MemoryPermission.Read
  77. : MemoryPermission.ReadAndWrite;
  78. KernelResult result;
  79. if ((cap >> 31) != 0)
  80. {
  81. result = memoryManager.MapNormalMemory(address, size, perm);
  82. }
  83. else
  84. {
  85. result = memoryManager.MapIoMemory(address, size, perm);
  86. }
  87. if (result != KernelResult.Success)
  88. {
  89. return result;
  90. }
  91. }
  92. }
  93. return KernelResult.Success;
  94. }
  95. private KernelResult ParseCapability(int cap, ref int mask0, ref int mask1, KMemoryManager memoryManager)
  96. {
  97. int code = (cap + 1) & ~cap;
  98. if (code == 1)
  99. {
  100. return KernelResult.InvalidCapability;
  101. }
  102. else if (code == 0)
  103. {
  104. return KernelResult.Success;
  105. }
  106. int codeMask = 1 << (32 - BitUtils.CountLeadingZeros32(code + 1));
  107. // Check if the property was already set.
  108. if (((mask0 & codeMask) & 0x1e008) != 0)
  109. {
  110. return KernelResult.InvalidCombination;
  111. }
  112. mask0 |= codeMask;
  113. switch (code)
  114. {
  115. case 8:
  116. {
  117. if (AllowedCpuCoresMask != 0 || AllowedThreadPriosMask != 0)
  118. {
  119. return KernelResult.InvalidCapability;
  120. }
  121. int lowestCpuCore = (cap >> 16) & 0xff;
  122. int highestCpuCore = (cap >> 24) & 0xff;
  123. if (lowestCpuCore > highestCpuCore)
  124. {
  125. return KernelResult.InvalidCombination;
  126. }
  127. int highestThreadPrio = (cap >> 4) & 0x3f;
  128. int lowestThreadPrio = (cap >> 10) & 0x3f;
  129. if (lowestThreadPrio > highestThreadPrio)
  130. {
  131. return KernelResult.InvalidCombination;
  132. }
  133. if (highestCpuCore >= KScheduler.CpuCoresCount)
  134. {
  135. return KernelResult.InvalidCpuCore;
  136. }
  137. AllowedCpuCoresMask = GetMaskFromMinMax(lowestCpuCore, highestCpuCore);
  138. AllowedThreadPriosMask = GetMaskFromMinMax(lowestThreadPrio, highestThreadPrio);
  139. break;
  140. }
  141. case 0x10:
  142. {
  143. int slot = (cap >> 29) & 7;
  144. int svcSlotMask = 1 << slot;
  145. if ((mask1 & svcSlotMask) != 0)
  146. {
  147. return KernelResult.InvalidCombination;
  148. }
  149. mask1 |= svcSlotMask;
  150. int svcMask = (cap >> 5) & 0xffffff;
  151. int baseSvc = slot * 24;
  152. for (int index = 0; index < 24; index++)
  153. {
  154. if (((svcMask >> index) & 1) == 0)
  155. {
  156. continue;
  157. }
  158. int svcId = baseSvc + index;
  159. if (svcId > 0x7f)
  160. {
  161. return KernelResult.MaximumExceeded;
  162. }
  163. SvcAccessMask[svcId / 8] |= (byte)(1 << (svcId & 7));
  164. }
  165. break;
  166. }
  167. case 0x80:
  168. {
  169. long address = ((long)(uint)cap << 4) & 0xffffff000;
  170. memoryManager.MapIoMemory(address, KMemoryManager.PageSize, MemoryPermission.ReadAndWrite);
  171. break;
  172. }
  173. case 0x800:
  174. {
  175. // TODO: GIC distributor check.
  176. int irq0 = (cap >> 12) & 0x3ff;
  177. int irq1 = (cap >> 22) & 0x3ff;
  178. if (irq0 != 0x3ff)
  179. {
  180. IrqAccessMask[irq0 / 8] |= (byte)(1 << (irq0 & 7));
  181. }
  182. if (irq1 != 0x3ff)
  183. {
  184. IrqAccessMask[irq1 / 8] |= (byte)(1 << (irq1 & 7));
  185. }
  186. break;
  187. }
  188. case 0x2000:
  189. {
  190. int applicationType = cap >> 14;
  191. if ((uint)applicationType > 7)
  192. {
  193. return KernelResult.ReservedValue;
  194. }
  195. ApplicationType = applicationType;
  196. break;
  197. }
  198. case 0x4000:
  199. {
  200. // Note: This check is bugged on kernel too, we are just replicating the bug here.
  201. if ((KernelReleaseVersion >> 17) != 0 || cap < 0x80000)
  202. {
  203. return KernelResult.ReservedValue;
  204. }
  205. KernelReleaseVersion = cap;
  206. break;
  207. }
  208. case 0x8000:
  209. {
  210. int handleTableSize = cap >> 26;
  211. if ((uint)handleTableSize > 0x3ff)
  212. {
  213. return KernelResult.ReservedValue;
  214. }
  215. HandleTableSize = handleTableSize;
  216. break;
  217. }
  218. case 0x10000:
  219. {
  220. int debuggingFlags = cap >> 19;
  221. if ((uint)debuggingFlags > 3)
  222. {
  223. return KernelResult.ReservedValue;
  224. }
  225. DebuggingFlags &= ~3;
  226. DebuggingFlags |= debuggingFlags;
  227. break;
  228. }
  229. default: return KernelResult.InvalidCapability;
  230. }
  231. return KernelResult.Success;
  232. }
  233. private static long GetMaskFromMinMax(int min, int max)
  234. {
  235. int range = max - min + 1;
  236. if (range == 64)
  237. {
  238. return -1L;
  239. }
  240. long mask = (1L << range) - 1;
  241. return mask << min;
  242. }
  243. }
  244. }