mirror of
https://git.naxdy.org/Mirror/Ryujinx.git
synced 2024-11-16 01:55:27 +00:00
189c0c9c72
* Implement Modding Support * Executables: Rewrite to use contiguous mem and Spans * Reorder ExeFs, Npdm, ControlData and SaveData calls After discussion with gdkchan, it was decided it's best to call LoadExeFs after all other loads are done as it starts the guest process. * Build RomFs manually instead of Layering FS Layered FS approach has considerable latency when building the final romfs. So, we manually replace files in a single romfs instance. * Add RomFs modding via storage file * Fix and cleanup MemPatch * Add dynamically loaded NRO patching * Support exefs file replacement * Rewrite ModLoader to use mods-search architecture * Disable PPTC when exefs patches are detected Disable PPTC on exefs replacements too * Rewrite ModLoader, again * Increased maintainability and matches Atmosphere closely * Creates base mods structure if it doesn't exist * Add Exefs partition replacement * IPSwitch: Fix nsobid parsing * Move mod logs to new LogClass * Allow custom suffixes to title dirs again * Address nits * Add a per-App "Open Mods Directory" context menu item Creates the path if not present. * Normalize tooltips verbiage * Use LocalStorage and remove unused namespaces
312 lines
10 KiB
C#
312 lines
10 KiB
C#
using ARMeilleure.Translation.PTC;
|
|
using Ryujinx.Common;
|
|
using Ryujinx.Common.Logging;
|
|
using Ryujinx.Cpu;
|
|
using Ryujinx.HLE.HOS.Kernel;
|
|
using Ryujinx.HLE.HOS.Kernel.Common;
|
|
using Ryujinx.HLE.HOS.Kernel.Memory;
|
|
using Ryujinx.HLE.HOS.Kernel.Process;
|
|
using Ryujinx.HLE.Loaders.Executables;
|
|
using Ryujinx.HLE.Loaders.Npdm;
|
|
|
|
namespace Ryujinx.HLE.HOS
|
|
{
|
|
static class ProgramLoader
|
|
{
|
|
private const bool AslrEnabled = true;
|
|
|
|
private const int ArgsHeaderSize = 8;
|
|
private const int ArgsDataSize = 0x9000;
|
|
private const int ArgsTotalSize = ArgsHeaderSize + ArgsDataSize;
|
|
|
|
public static bool LoadKip(KernelContext context, KipExecutable kip)
|
|
{
|
|
int endOffset = kip.DataOffset + kip.Data.Length;
|
|
|
|
if (kip.BssSize != 0)
|
|
{
|
|
endOffset = kip.BssOffset + kip.BssSize;
|
|
}
|
|
|
|
int codeSize = BitUtils.AlignUp(kip.TextOffset + endOffset, KMemoryManager.PageSize);
|
|
|
|
int codePagesCount = codeSize / KMemoryManager.PageSize;
|
|
|
|
ulong codeBaseAddress = kip.Is64BitAddressSpace ? 0x8000000UL : 0x200000UL;
|
|
|
|
ulong codeAddress = codeBaseAddress + (ulong)kip.TextOffset;
|
|
|
|
int mmuFlags = 0;
|
|
|
|
if (AslrEnabled)
|
|
{
|
|
// TODO: Randomization.
|
|
|
|
mmuFlags |= 0x20;
|
|
}
|
|
|
|
if (kip.Is64BitAddressSpace)
|
|
{
|
|
mmuFlags |= (int)AddressSpaceType.Addr39Bits << 1;
|
|
}
|
|
|
|
if (kip.Is64Bit)
|
|
{
|
|
mmuFlags |= 1;
|
|
}
|
|
|
|
ProcessCreationInfo creationInfo = new ProcessCreationInfo(
|
|
kip.Name,
|
|
kip.Version,
|
|
kip.ProgramId,
|
|
codeAddress,
|
|
codePagesCount,
|
|
mmuFlags,
|
|
0,
|
|
0);
|
|
|
|
MemoryRegion memoryRegion = kip.UsesSecureMemory
|
|
? MemoryRegion.Service
|
|
: MemoryRegion.Application;
|
|
|
|
KMemoryRegionManager region = context.MemoryRegions[(int)memoryRegion];
|
|
|
|
KernelResult result = region.AllocatePages((ulong)codePagesCount, false, out KPageList pageList);
|
|
|
|
if (result != KernelResult.Success)
|
|
{
|
|
Logger.PrintError(LogClass.Loader, $"Process initialization returned error \"{result}\".");
|
|
|
|
return false;
|
|
}
|
|
|
|
KProcess process = new KProcess(context);
|
|
|
|
result = process.InitializeKip(
|
|
creationInfo,
|
|
kip.Capabilities,
|
|
pageList,
|
|
context.ResourceLimit,
|
|
memoryRegion);
|
|
|
|
if (result != KernelResult.Success)
|
|
{
|
|
Logger.PrintError(LogClass.Loader, $"Process initialization returned error \"{result}\".");
|
|
|
|
return false;
|
|
}
|
|
|
|
result = LoadIntoMemory(process, kip, codeBaseAddress);
|
|
|
|
if (result != KernelResult.Success)
|
|
{
|
|
Logger.PrintError(LogClass.Loader, $"Process initialization returned error \"{result}\".");
|
|
|
|
return false;
|
|
}
|
|
|
|
process.DefaultCpuCore = kip.IdealCoreId;
|
|
|
|
result = process.Start(kip.Priority, (ulong)kip.StackSize);
|
|
|
|
if (result != KernelResult.Success)
|
|
{
|
|
Logger.PrintError(LogClass.Loader, $"Process start returned error \"{result}\".");
|
|
|
|
return false;
|
|
}
|
|
|
|
context.Processes.TryAdd(process.Pid, process);
|
|
|
|
return true;
|
|
}
|
|
|
|
public static bool LoadNsos(
|
|
KernelContext context,
|
|
Npdm metaData,
|
|
byte[] arguments = null,
|
|
params IExecutable[] executables)
|
|
{
|
|
ulong argsStart = 0;
|
|
int argsSize = 0;
|
|
ulong codeStart = metaData.Is64Bit ? 0x8000000UL : 0x200000UL;
|
|
int codeSize = 0;
|
|
|
|
ulong[] nsoBase = new ulong[executables.Length];
|
|
|
|
for (int index = 0; index < executables.Length; index++)
|
|
{
|
|
IExecutable staticObject = executables[index];
|
|
|
|
int textEnd = staticObject.TextOffset + staticObject.Text.Length;
|
|
int roEnd = staticObject.RoOffset + staticObject.Ro.Length;
|
|
int dataEnd = staticObject.DataOffset + staticObject.Data.Length + staticObject.BssSize;
|
|
|
|
int nsoSize = textEnd;
|
|
|
|
if ((uint)nsoSize < (uint)roEnd)
|
|
{
|
|
nsoSize = roEnd;
|
|
}
|
|
|
|
if ((uint)nsoSize < (uint)dataEnd)
|
|
{
|
|
nsoSize = dataEnd;
|
|
}
|
|
|
|
nsoSize = BitUtils.AlignUp(nsoSize, KMemoryManager.PageSize);
|
|
|
|
nsoBase[index] = codeStart + (ulong)codeSize;
|
|
|
|
codeSize += nsoSize;
|
|
|
|
if (arguments != null && argsSize == 0)
|
|
{
|
|
argsStart = (ulong)codeSize;
|
|
|
|
argsSize = BitUtils.AlignDown(arguments.Length * 2 + ArgsTotalSize - 1, KMemoryManager.PageSize);
|
|
|
|
codeSize += argsSize;
|
|
}
|
|
}
|
|
|
|
PtcProfiler.StaticCodeStart = codeStart;
|
|
PtcProfiler.StaticCodeSize = codeSize;
|
|
|
|
int codePagesCount = codeSize / KMemoryManager.PageSize;
|
|
|
|
int personalMmHeapPagesCount = metaData.PersonalMmHeapSize / KMemoryManager.PageSize;
|
|
|
|
ProcessCreationInfo creationInfo = new ProcessCreationInfo(
|
|
metaData.TitleName,
|
|
metaData.Version,
|
|
metaData.Aci0.TitleId,
|
|
codeStart,
|
|
codePagesCount,
|
|
metaData.MmuFlags,
|
|
0,
|
|
personalMmHeapPagesCount);
|
|
|
|
KernelResult result;
|
|
|
|
KResourceLimit resourceLimit = new KResourceLimit(context);
|
|
|
|
long applicationRgSize = (long)context.MemoryRegions[(int)MemoryRegion.Application].Size;
|
|
|
|
result = resourceLimit.SetLimitValue(LimitableResource.Memory, applicationRgSize);
|
|
result |= resourceLimit.SetLimitValue(LimitableResource.Thread, 608);
|
|
result |= resourceLimit.SetLimitValue(LimitableResource.Event, 700);
|
|
result |= resourceLimit.SetLimitValue(LimitableResource.TransferMemory, 128);
|
|
result |= resourceLimit.SetLimitValue(LimitableResource.Session, 894);
|
|
|
|
if (result != KernelResult.Success)
|
|
{
|
|
Logger.PrintError(LogClass.Loader, $"Process initialization failed setting resource limit values.");
|
|
|
|
return false;
|
|
}
|
|
|
|
KProcess process = new KProcess(context);
|
|
|
|
MemoryRegion memoryRegion = (MemoryRegion)((metaData.Acid.Flags >> 2) & 0xf);
|
|
|
|
if (memoryRegion > MemoryRegion.NvServices)
|
|
{
|
|
Logger.PrintError(LogClass.Loader, $"Process initialization failed due to invalid ACID flags.");
|
|
|
|
return false;
|
|
}
|
|
|
|
result = process.Initialize(
|
|
creationInfo,
|
|
metaData.Aci0.KernelAccessControl.Capabilities,
|
|
resourceLimit,
|
|
memoryRegion);
|
|
|
|
if (result != KernelResult.Success)
|
|
{
|
|
Logger.PrintError(LogClass.Loader, $"Process initialization returned error \"{result}\".");
|
|
|
|
return false;
|
|
}
|
|
|
|
for (int index = 0; index < executables.Length; index++)
|
|
{
|
|
Logger.PrintInfo(LogClass.Loader, $"Loading image {index} at 0x{nsoBase[index]:x16}...");
|
|
|
|
result = LoadIntoMemory(process, executables[index], nsoBase[index]);
|
|
|
|
if (result != KernelResult.Success)
|
|
{
|
|
Logger.PrintError(LogClass.Loader, $"Process initialization returned error \"{result}\".");
|
|
|
|
return false;
|
|
}
|
|
}
|
|
|
|
process.DefaultCpuCore = metaData.DefaultCpuId;
|
|
|
|
result = process.Start(metaData.MainThreadPriority, (ulong)metaData.MainThreadStackSize);
|
|
|
|
if (result != KernelResult.Success)
|
|
{
|
|
Logger.PrintError(LogClass.Loader, $"Process start returned error \"{result}\".");
|
|
|
|
return false;
|
|
}
|
|
|
|
context.Processes.TryAdd(process.Pid, process);
|
|
|
|
return true;
|
|
}
|
|
|
|
private static KernelResult LoadIntoMemory(KProcess process, IExecutable image, ulong baseAddress)
|
|
{
|
|
ulong textStart = baseAddress + (ulong)image.TextOffset;
|
|
ulong roStart = baseAddress + (ulong)image.RoOffset;
|
|
ulong dataStart = baseAddress + (ulong)image.DataOffset;
|
|
ulong bssStart = baseAddress + (ulong)image.BssOffset;
|
|
|
|
ulong end = dataStart + (ulong)image.Data.Length;
|
|
|
|
if (image.BssSize != 0)
|
|
{
|
|
end = bssStart + (ulong)image.BssSize;
|
|
}
|
|
|
|
process.CpuMemory.Write(textStart, image.Text);
|
|
process.CpuMemory.Write(roStart, image.Ro);
|
|
process.CpuMemory.Write(dataStart, image.Data);
|
|
|
|
MemoryHelper.FillWithZeros(process.CpuMemory, (long)bssStart, image.BssSize);
|
|
|
|
KernelResult SetProcessMemoryPermission(ulong address, ulong size, MemoryPermission permission)
|
|
{
|
|
if (size == 0)
|
|
{
|
|
return KernelResult.Success;
|
|
}
|
|
|
|
size = BitUtils.AlignUp(size, KMemoryManager.PageSize);
|
|
|
|
return process.MemoryManager.SetProcessMemoryPermission(address, size, permission);
|
|
}
|
|
|
|
KernelResult result = SetProcessMemoryPermission(textStart, (ulong)image.Text.Length, MemoryPermission.ReadAndExecute);
|
|
|
|
if (result != KernelResult.Success)
|
|
{
|
|
return result;
|
|
}
|
|
|
|
result = SetProcessMemoryPermission(roStart, (ulong)image.Ro.Length, MemoryPermission.Read);
|
|
|
|
if (result != KernelResult.Success)
|
|
{
|
|
return result;
|
|
}
|
|
|
|
return SetProcessMemoryPermission(dataStart, end - dataStart, MemoryPermission.ReadAndWrite);
|
|
}
|
|
}
|
|
} |