ProgramLoader.cs 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423
  1. using LibHac.Loader;
  2. using LibHac.Ncm;
  3. using LibHac.Util;
  4. using Ryujinx.Common;
  5. using Ryujinx.Common.Logging;
  6. using Ryujinx.Cpu;
  7. using Ryujinx.HLE.HOS.Kernel;
  8. using Ryujinx.HLE.HOS.Kernel.Common;
  9. using Ryujinx.HLE.HOS.Kernel.Memory;
  10. using Ryujinx.HLE.HOS.Kernel.Process;
  11. using Ryujinx.HLE.Loaders.Executables;
  12. using Ryujinx.Horizon.Common;
  13. using System;
  14. using System.Linq;
  15. using System.Runtime.InteropServices;
  16. using Npdm = LibHac.Loader.Npdm;
  17. namespace Ryujinx.HLE.HOS
  18. {
  19. struct ProgramInfo
  20. {
  21. public string Name;
  22. public ulong ProgramId;
  23. public readonly string TitleIdText;
  24. public readonly string DisplayVersion;
  25. public readonly bool DiskCacheEnabled;
  26. public readonly bool AllowCodeMemoryForJit;
  27. public ProgramInfo(in Npdm npdm, string displayVersion, bool diskCacheEnabled, bool allowCodeMemoryForJit)
  28. {
  29. ulong programId = npdm.Aci.Value.ProgramId.Value;
  30. Name = StringUtils.Utf8ZToString(npdm.Meta.Value.ProgramName);
  31. ProgramId = programId;
  32. TitleIdText = programId.ToString("x16");
  33. DisplayVersion = displayVersion;
  34. DiskCacheEnabled = diskCacheEnabled;
  35. AllowCodeMemoryForJit = allowCodeMemoryForJit;
  36. }
  37. }
  38. struct ProgramLoadResult
  39. {
  40. public static ProgramLoadResult Failed => new ProgramLoadResult(false, null, null, 0);
  41. public readonly bool Success;
  42. public readonly ProcessTamperInfo TamperInfo;
  43. public readonly IDiskCacheLoadState DiskCacheLoadState;
  44. public readonly ulong ProcessId;
  45. public ProgramLoadResult(bool success, ProcessTamperInfo tamperInfo, IDiskCacheLoadState diskCacheLoadState, ulong pid)
  46. {
  47. Success = success;
  48. TamperInfo = tamperInfo;
  49. DiskCacheLoadState = diskCacheLoadState;
  50. ProcessId = pid;
  51. }
  52. }
  53. static class ProgramLoader
  54. {
  55. private const bool AslrEnabled = true;
  56. private const int ArgsHeaderSize = 8;
  57. private const int ArgsDataSize = 0x9000;
  58. private const int ArgsTotalSize = ArgsHeaderSize + ArgsDataSize;
  59. public static bool LoadKip(KernelContext context, KipExecutable kip)
  60. {
  61. uint endOffset = kip.DataOffset + (uint)kip.Data.Length;
  62. if (kip.BssSize != 0)
  63. {
  64. endOffset = kip.BssOffset + kip.BssSize;
  65. }
  66. uint codeSize = BitUtils.AlignUp<uint>(kip.TextOffset + endOffset, KPageTableBase.PageSize);
  67. int codePagesCount = (int)(codeSize / KPageTableBase.PageSize);
  68. ulong codeBaseAddress = kip.Is64BitAddressSpace ? 0x8000000UL : 0x200000UL;
  69. ulong codeAddress = codeBaseAddress + (ulong)kip.TextOffset;
  70. ProcessCreationFlags flags = 0;
  71. if (AslrEnabled)
  72. {
  73. // TODO: Randomization.
  74. flags |= ProcessCreationFlags.EnableAslr;
  75. }
  76. if (kip.Is64BitAddressSpace)
  77. {
  78. flags |= ProcessCreationFlags.AddressSpace64Bit;
  79. }
  80. if (kip.Is64Bit)
  81. {
  82. flags |= ProcessCreationFlags.Is64Bit;
  83. }
  84. ProcessCreationInfo creationInfo = new ProcessCreationInfo(
  85. kip.Name,
  86. kip.Version,
  87. kip.ProgramId,
  88. codeAddress,
  89. codePagesCount,
  90. flags,
  91. 0,
  92. 0);
  93. MemoryRegion memoryRegion = kip.UsesSecureMemory
  94. ? MemoryRegion.Service
  95. : MemoryRegion.Application;
  96. KMemoryRegionManager region = context.MemoryManager.MemoryRegions[(int)memoryRegion];
  97. Result result = region.AllocatePages(out KPageList pageList, (ulong)codePagesCount);
  98. if (result != Result.Success)
  99. {
  100. Logger.Error?.Print(LogClass.Loader, $"Process initialization returned error \"{result}\".");
  101. return false;
  102. }
  103. KProcess process = new KProcess(context);
  104. var processContextFactory = new ArmProcessContextFactory(
  105. context.Device.System.CpuEngine,
  106. context.Device.Gpu,
  107. string.Empty,
  108. string.Empty,
  109. false,
  110. codeAddress,
  111. codeSize);
  112. result = process.InitializeKip(
  113. creationInfo,
  114. kip.Capabilities,
  115. pageList,
  116. context.ResourceLimit,
  117. memoryRegion,
  118. processContextFactory);
  119. if (result != Result.Success)
  120. {
  121. Logger.Error?.Print(LogClass.Loader, $"Process initialization returned error \"{result}\".");
  122. return false;
  123. }
  124. result = LoadIntoMemory(process, kip, codeBaseAddress);
  125. if (result != Result.Success)
  126. {
  127. Logger.Error?.Print(LogClass.Loader, $"Process initialization returned error \"{result}\".");
  128. return false;
  129. }
  130. process.DefaultCpuCore = kip.IdealCoreId;
  131. result = process.Start(kip.Priority, (ulong)kip.StackSize);
  132. if (result != Result.Success)
  133. {
  134. Logger.Error?.Print(LogClass.Loader, $"Process start returned error \"{result}\".");
  135. return false;
  136. }
  137. context.Processes.TryAdd(process.Pid, process);
  138. return true;
  139. }
  140. public static ProgramLoadResult LoadNsos(
  141. KernelContext context,
  142. MetaLoader metaData,
  143. ProgramInfo programInfo,
  144. byte[] arguments = null,
  145. params IExecutable[] executables)
  146. {
  147. context.Device.System.ServiceTable.WaitServicesReady();
  148. LibHac.Result rc = metaData.GetNpdm(out var npdm);
  149. if (rc.IsFailure())
  150. {
  151. return ProgramLoadResult.Failed;
  152. }
  153. ref readonly var meta = ref npdm.Meta.Value;
  154. ulong argsStart = 0;
  155. uint argsSize = 0;
  156. ulong codeStart = (meta.Flags & 1) != 0 ? 0x8000000UL : 0x200000UL;
  157. uint codeSize = 0;
  158. var buildIds = executables.Select(e => (e switch
  159. {
  160. NsoExecutable nso => BitConverter.ToString(nso.BuildId.ItemsRo.ToArray()),
  161. NroExecutable nro => BitConverter.ToString(nro.Header.BuildId),
  162. _ => ""
  163. }).Replace("-", "").ToUpper());
  164. ulong[] nsoBase = new ulong[executables.Length];
  165. for (int index = 0; index < executables.Length; index++)
  166. {
  167. IExecutable nso = executables[index];
  168. uint textEnd = nso.TextOffset + (uint)nso.Text.Length;
  169. uint roEnd = nso.RoOffset + (uint)nso.Ro.Length;
  170. uint dataEnd = nso.DataOffset + (uint)nso.Data.Length + nso.BssSize;
  171. uint nsoSize = textEnd;
  172. if (nsoSize < roEnd)
  173. {
  174. nsoSize = roEnd;
  175. }
  176. if (nsoSize < dataEnd)
  177. {
  178. nsoSize = dataEnd;
  179. }
  180. nsoSize = BitUtils.AlignUp<uint>(nsoSize, KPageTableBase.PageSize);
  181. nsoBase[index] = codeStart + (ulong)codeSize;
  182. codeSize += nsoSize;
  183. if (arguments != null && argsSize == 0)
  184. {
  185. argsStart = (ulong)codeSize;
  186. argsSize = (uint)BitUtils.AlignDown(arguments.Length * 2 + ArgsTotalSize - 1, KPageTableBase.PageSize);
  187. codeSize += argsSize;
  188. }
  189. }
  190. int codePagesCount = (int)(codeSize / KPageTableBase.PageSize);
  191. int personalMmHeapPagesCount = (int)(meta.SystemResourceSize / KPageTableBase.PageSize);
  192. ProcessCreationInfo creationInfo = new ProcessCreationInfo(
  193. programInfo.Name,
  194. (int)meta.Version,
  195. programInfo.ProgramId,
  196. codeStart,
  197. codePagesCount,
  198. (ProcessCreationFlags)meta.Flags | ProcessCreationFlags.IsApplication,
  199. 0,
  200. personalMmHeapPagesCount);
  201. context.Device.System.LibHacHorizonManager.InitializeApplicationClient(new ProgramId(programInfo.ProgramId), in npdm);
  202. Result result;
  203. KResourceLimit resourceLimit = new KResourceLimit(context);
  204. long applicationRgSize = (long)context.MemoryManager.MemoryRegions[(int)MemoryRegion.Application].Size;
  205. result = resourceLimit.SetLimitValue(LimitableResource.Memory, applicationRgSize);
  206. if (result.IsSuccess)
  207. {
  208. result = resourceLimit.SetLimitValue(LimitableResource.Thread, 608);
  209. }
  210. if (result.IsSuccess)
  211. {
  212. result = resourceLimit.SetLimitValue(LimitableResource.Event, 700);
  213. }
  214. if (result.IsSuccess)
  215. {
  216. result = resourceLimit.SetLimitValue(LimitableResource.TransferMemory, 128);
  217. }
  218. if (result.IsSuccess)
  219. {
  220. result = resourceLimit.SetLimitValue(LimitableResource.Session, 894);
  221. }
  222. if (result != Result.Success)
  223. {
  224. Logger.Error?.Print(LogClass.Loader, $"Process initialization failed setting resource limit values.");
  225. return ProgramLoadResult.Failed;
  226. }
  227. KProcess process = new KProcess(context, programInfo.AllowCodeMemoryForJit);
  228. MemoryRegion memoryRegion = (MemoryRegion)((npdm.Acid.Value.Flags >> 2) & 0xf);
  229. if (memoryRegion > MemoryRegion.NvServices)
  230. {
  231. Logger.Error?.Print(LogClass.Loader, $"Process initialization failed due to invalid ACID flags.");
  232. return ProgramLoadResult.Failed;
  233. }
  234. var processContextFactory = new ArmProcessContextFactory(
  235. context.Device.System.CpuEngine,
  236. context.Device.Gpu,
  237. programInfo.TitleIdText,
  238. programInfo.DisplayVersion,
  239. programInfo.DiskCacheEnabled,
  240. codeStart,
  241. codeSize);
  242. result = process.Initialize(
  243. creationInfo,
  244. MemoryMarshal.Cast<byte, int>(npdm.KernelCapabilityData).ToArray(),
  245. resourceLimit,
  246. memoryRegion,
  247. processContextFactory);
  248. if (result != Result.Success)
  249. {
  250. Logger.Error?.Print(LogClass.Loader, $"Process initialization returned error \"{result}\".");
  251. return ProgramLoadResult.Failed;
  252. }
  253. for (int index = 0; index < executables.Length; index++)
  254. {
  255. Logger.Info?.Print(LogClass.Loader, $"Loading image {index} at 0x{nsoBase[index]:x16}...");
  256. result = LoadIntoMemory(process, executables[index], nsoBase[index]);
  257. if (result != Result.Success)
  258. {
  259. Logger.Error?.Print(LogClass.Loader, $"Process initialization returned error \"{result}\".");
  260. return ProgramLoadResult.Failed;
  261. }
  262. }
  263. process.DefaultCpuCore = meta.DefaultCpuId;
  264. result = process.Start(meta.MainThreadPriority, meta.MainThreadStackSize);
  265. if (result != Result.Success)
  266. {
  267. Logger.Error?.Print(LogClass.Loader, $"Process start returned error \"{result}\".");
  268. return ProgramLoadResult.Failed;
  269. }
  270. context.Processes.TryAdd(process.Pid, process);
  271. // Keep the build ids because the tamper machine uses them to know which process to associate a
  272. // tamper to and also keep the starting address of each executable inside a process because some
  273. // memory modifications are relative to this address.
  274. ProcessTamperInfo tamperInfo = new ProcessTamperInfo(
  275. process,
  276. buildIds,
  277. nsoBase,
  278. process.MemoryManager.HeapRegionStart,
  279. process.MemoryManager.AliasRegionStart,
  280. process.MemoryManager.CodeRegionStart);
  281. return new ProgramLoadResult(true, tamperInfo, processContextFactory.DiskCacheLoadState, process.Pid);
  282. }
  283. private static Result LoadIntoMemory(KProcess process, IExecutable image, ulong baseAddress)
  284. {
  285. ulong textStart = baseAddress + image.TextOffset;
  286. ulong roStart = baseAddress + image.RoOffset;
  287. ulong dataStart = baseAddress + image.DataOffset;
  288. ulong bssStart = baseAddress + image.BssOffset;
  289. ulong end = dataStart + (ulong)image.Data.Length;
  290. if (image.BssSize != 0)
  291. {
  292. end = bssStart + image.BssSize;
  293. }
  294. process.CpuMemory.Write(textStart, image.Text);
  295. process.CpuMemory.Write(roStart, image.Ro);
  296. process.CpuMemory.Write(dataStart, image.Data);
  297. process.CpuMemory.Fill(bssStart, image.BssSize, 0);
  298. Result SetProcessMemoryPermission(ulong address, ulong size, KMemoryPermission permission)
  299. {
  300. if (size == 0)
  301. {
  302. return Result.Success;
  303. }
  304. size = BitUtils.AlignUp<ulong>(size, KPageTableBase.PageSize);
  305. return process.MemoryManager.SetProcessMemoryPermission(address, size, permission);
  306. }
  307. Result result = SetProcessMemoryPermission(textStart, (ulong)image.Text.Length, KMemoryPermission.ReadAndExecute);
  308. if (result != Result.Success)
  309. {
  310. return result;
  311. }
  312. result = SetProcessMemoryPermission(roStart, (ulong)image.Ro.Length, KMemoryPermission.Read);
  313. if (result != Result.Success)
  314. {
  315. return result;
  316. }
  317. return SetProcessMemoryPermission(dataStart, end - dataStart, KMemoryPermission.ReadAndWrite);
  318. }
  319. }
  320. }