Compare commits
	
		
			2 Commits
		
	
	
		
			layout-fix
			...
			lle-cro
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
|  | aec99b8729 | ||
|  | 0e9d5cbd57 | 
| @@ -6,7 +6,6 @@ | ||||
| #include "common/archives.h" | ||||
| #include "common/common_types.h" | ||||
| #include "common/logging/log.h" | ||||
| #include "core/global.h" | ||||
| #include "core/hle/kernel/address_arbiter.h" | ||||
| #include "core/hle/kernel/errors.h" | ||||
| #include "core/hle/kernel/kernel.h" | ||||
| @@ -21,7 +20,7 @@ void AddressArbiter::WaitThread(std::shared_ptr<Thread> thread, VAddr wait_addre | ||||
|     waiting_threads.emplace_back(std::move(thread)); | ||||
| } | ||||
|  | ||||
| void AddressArbiter::ResumeAllThreads(VAddr address) { | ||||
| u64 AddressArbiter::ResumeAllThreads(VAddr address) { | ||||
|     // Determine which threads are waiting on this address, those should be woken up. | ||||
|     auto itr = std::stable_partition(waiting_threads.begin(), waiting_threads.end(), | ||||
|                                      [address](const auto& thread) { | ||||
| @@ -31,13 +30,15 @@ void AddressArbiter::ResumeAllThreads(VAddr address) { | ||||
|                                      }); | ||||
|  | ||||
|     // Wake up all the found threads | ||||
|     const u64 num_threads = std::distance(itr, waiting_threads.end()); | ||||
|     std::for_each(itr, waiting_threads.end(), [](auto& thread) { thread->ResumeFromWait(); }); | ||||
|  | ||||
|     // Remove the woken up threads from the wait list. | ||||
|     waiting_threads.erase(itr, waiting_threads.end()); | ||||
|     return num_threads; | ||||
| } | ||||
|  | ||||
| std::shared_ptr<Thread> AddressArbiter::ResumeHighestPriorityThread(VAddr address) { | ||||
| bool AddressArbiter::ResumeHighestPriorityThread(VAddr address) { | ||||
|     // Determine which threads are waiting on this address, those should be considered for wakeup. | ||||
|     auto matches_start = std::stable_partition( | ||||
|         waiting_threads.begin(), waiting_threads.end(), [address](const auto& thread) { | ||||
| @@ -54,14 +55,15 @@ std::shared_ptr<Thread> AddressArbiter::ResumeHighestPriorityThread(VAddr addres | ||||
|                                     return lhs->current_priority < rhs->current_priority; | ||||
|                                 }); | ||||
|  | ||||
|     if (itr == waiting_threads.end()) | ||||
|         return nullptr; | ||||
|     if (itr == waiting_threads.end()) { | ||||
|         return false; | ||||
|     } | ||||
|  | ||||
|     auto thread = *itr; | ||||
|     thread->ResumeFromWait(); | ||||
|  | ||||
|     waiting_threads.erase(itr); | ||||
|     return thread; | ||||
|  | ||||
|     return true; | ||||
| } | ||||
|  | ||||
| AddressArbiter::AddressArbiter(KernelSystem& kernel) | ||||
| @@ -107,17 +109,28 @@ ResultCode AddressArbiter::ArbitrateAddress(std::shared_ptr<Thread> thread, Arbi | ||||
|     switch (type) { | ||||
|  | ||||
|     // Signal thread(s) waiting for arbitrate address... | ||||
|     case ArbitrationType::Signal: | ||||
|     case ArbitrationType::Signal: { | ||||
|         u64 num_threads{}; | ||||
|  | ||||
|         // Negative value means resume all threads | ||||
|         if (value < 0) { | ||||
|             ResumeAllThreads(address); | ||||
|             num_threads = ResumeAllThreads(address); | ||||
|         } else { | ||||
|             // Resume first N threads | ||||
|             for (int i = 0; i < value; i++) | ||||
|                 ResumeHighestPriorityThread(address); | ||||
|             for (s32 i = 0; i < value; i++) { | ||||
|                 num_threads += ResumeHighestPriorityThread(address); | ||||
|             } | ||||
|         } | ||||
|  | ||||
|         // Prevents lag from low priority threads that spam svcArbitrateAddress and wake no threads | ||||
|         // The tick count is taken directly from official HOS kernel. The priority value is one less | ||||
|         // than official kernel as the affected FMV threads dont meet the priority threshold of 50. | ||||
|         // TODO: Revisit this when scheduler is rewritten and adjust if there isn't a problem there. | ||||
|         if (num_threads == 0 && thread->current_priority >= 49) { | ||||
|             kernel.current_cpu->GetTimer().AddTicks(1614u); | ||||
|         } | ||||
|         break; | ||||
|  | ||||
|     } | ||||
|     // Wait current thread (acquire the arbiter)... | ||||
|     case ArbitrationType::WaitIfLessThan: | ||||
|         if ((s32)kernel.memory.Read32(address) < value) { | ||||
|   | ||||
| @@ -65,11 +65,11 @@ private: | ||||
|     void WaitThread(std::shared_ptr<Thread> thread, VAddr wait_address); | ||||
|  | ||||
|     /// Resume all threads found to be waiting on the address under this address arbiter | ||||
|     void ResumeAllThreads(VAddr address); | ||||
|     u64 ResumeAllThreads(VAddr address); | ||||
|  | ||||
|     /// Resume one thread found to be waiting on the address under this address arbiter and return | ||||
|     /// the resumed thread. | ||||
|     std::shared_ptr<Thread> ResumeHighestPriorityThread(VAddr address); | ||||
|     bool ResumeHighestPriorityThread(VAddr address); | ||||
|  | ||||
|     /// Threads waiting for the address arbiter to be signaled. | ||||
|     std::vector<std::shared_ptr<Thread>> waiting_threads; | ||||
|   | ||||
| @@ -1,7 +1,7 @@ | ||||
| // Copyright 2015 Citra Emulator Project | ||||
| // Licensed under GPLv2 or any later version | ||||
| // Refer to the license.txt file included. | ||||
|  | ||||
| #include "core/hle/result.h" | ||||
| #include <algorithm> | ||||
| #include <memory> | ||||
| #include <boost/serialization/array.hpp> | ||||
| @@ -459,8 +459,7 @@ ResultVal<VAddr> Process::AllocateThreadLocalStorage() { | ||||
|     return tls_address; | ||||
| } | ||||
|  | ||||
| ResultCode Process::Map(VAddr target, VAddr source, u32 size, VMAPermission perms, | ||||
|                         bool privileged) { | ||||
| ResultCode Process::Map(VAddr target, VAddr source, u32 size, VMAPermission perms, bool privileged) { | ||||
|     LOG_DEBUG(Kernel, "Map memory target={:08X}, source={:08X}, size={:08X}, perms={:08X}", target, | ||||
|               source, size, perms); | ||||
|     if (!privileged && (source < Memory::HEAP_VADDR || source + size > Memory::HEAP_VADDR_END || | ||||
| @@ -502,8 +501,10 @@ ResultCode Process::Map(VAddr target, VAddr source, u32 size, VMAPermission perm | ||||
|     CASCADE_CODE(vm_manager.ChangeMemoryState(source, size, MemoryState::Private, | ||||
|                                               VMAPermission::ReadWrite, source_state, source_perm)); | ||||
|  | ||||
|     // Retrieve backing blocks from the source address space | ||||
|     CASCADE_RESULT(auto backing_blocks, vm_manager.GetBackingBlocksForRange(source, size)); | ||||
|     VAddr interval_target = target; | ||||
|  | ||||
|     for (const auto& backing_block : backing_blocks) { | ||||
|         auto backing_memory = kernel.memory.GetFCRAMRef(backing_block.lower()); | ||||
|         auto block_size = backing_block.upper() - backing_block.lower(); | ||||
| @@ -516,6 +517,36 @@ ResultCode Process::Map(VAddr target, VAddr source, u32 size, VMAPermission perm | ||||
|  | ||||
|     return RESULT_SUCCESS; | ||||
| } | ||||
|  | ||||
| ResultCode Process::MapInterprocess(Process& src, VAddr target, VAddr source, u32 size, VMAPermission perms) { | ||||
|     u32 cursor = 0; | ||||
|     while (true) { | ||||
|         const auto source_iter = src.vm_manager.FindVMA(source + cursor); | ||||
|         auto& source_vma = source_iter->second; | ||||
|  | ||||
|         // Skip non-allocated blocks | ||||
|         if (source_vma.type == VMAType::Free) { | ||||
|             cursor += source_vma.size; | ||||
|             continue; | ||||
|         } | ||||
|  | ||||
|         ASSERT(source_vma.type == VMAType::BackingMemory); | ||||
|         ASSERT(source_vma.backing_memory); | ||||
|         ASSERT(source_vma.base == source + cursor); | ||||
|  | ||||
|         if (source_vma.size + cursor > size) { | ||||
|             break; | ||||
|         } | ||||
|  | ||||
|         const auto target_vma = vm_manager.MapBackingMemory(target + cursor, source_vma.backing_memory, | ||||
|                                                             source_vma.size, MemoryState::Shared); | ||||
|         ASSERT(target_vma.Succeeded()); | ||||
|         cursor += source_vma.size; | ||||
|     } | ||||
|  | ||||
|     return RESULT_SUCCESS; | ||||
| } | ||||
|  | ||||
| ResultCode Process::Unmap(VAddr target, VAddr source, u32 size, VMAPermission perms, | ||||
|                           bool privileged) { | ||||
|     LOG_DEBUG(Kernel, "Unmap memory target={:08X}, source={:08X}, size={:08X}, perms={:08X}", | ||||
|   | ||||
| @@ -209,9 +209,6 @@ public: | ||||
|      */ | ||||
|     void Exit(); | ||||
|  | ||||
|     /////////////////////////////////////////////////////////////////////////////////////////////// | ||||
|     // Memory Management | ||||
|  | ||||
|     VMManager vm_manager; | ||||
|  | ||||
|     u32 memory_used = 0; | ||||
| @@ -243,6 +240,8 @@ public: | ||||
|  | ||||
|     ResultCode Map(VAddr target, VAddr source, u32 size, VMAPermission perms, | ||||
|                    bool privileged = false); | ||||
|     ResultCode MapInterprocess(Process& src, VAddr target, VAddr source, | ||||
|                                u32 size, VMAPermission perms); | ||||
|     ResultCode Unmap(VAddr target, VAddr source, u32 size, VMAPermission perms, | ||||
|                      bool privileged = false); | ||||
|  | ||||
|   | ||||
| @@ -1,14 +1,16 @@ | ||||
| // Copyright 2014 Citra Emulator Project | ||||
| // Licensed under GPLv2 or any later version | ||||
| // Refer to the license.txt file included. | ||||
|  | ||||
| #pragma optimize("", off) | ||||
| #include <algorithm> | ||||
| #include <array> | ||||
| #include <fmt/format.h> | ||||
| #include "common/alignment.h" | ||||
| #include "common/archives.h" | ||||
| #include "common/logging/log.h" | ||||
| #include "common/microprofile.h" | ||||
| #include "common/scm_rev.h" | ||||
| #include "common/scope_exit.h" | ||||
| #include "core/arm/arm_interface.h" | ||||
| #include "core/core.h" | ||||
| #include "core/core_timing.h" | ||||
| @@ -438,6 +440,10 @@ private: | ||||
|     ResultCode UnmapProcessMemoryEx(Handle process, u32 dst_address, u32 size); | ||||
|     ResultCode ControlProcess(Handle process_handle, u32 process_OP, u32 varg2, u32 varg3); | ||||
|  | ||||
|     ResultCode ControlProcessMemory(Handle process, u32 addr0, u32 addr1, u32 size, u32 type, u32 perm); | ||||
|     ResultCode MapProcessMemory(Handle process, u32 dest_address, u32 size); | ||||
|     ResultCode UnmapProcessMemory(Handle process, u32 start_address, u32 size); | ||||
|  | ||||
|     struct FunctionDef { | ||||
|         using Func = void (SVC::*)(); | ||||
|  | ||||
| @@ -2103,6 +2109,283 @@ ResultCode SVC::ControlProcess(Handle process_handle, u32 process_OP, u32 varg2, | ||||
|     } | ||||
| } | ||||
|  | ||||
| ResultCode SVC::ControlProcessMemory(Handle process, u32 addr0, u32 addr1, u32 size, u32 operation, u32 permissions) { | ||||
|     LOG_DEBUG(Kernel_SVC, | ||||
|               "called operation=0x{:08X}, addr0=0x{:08X}, addr1=0x{:08X}, " | ||||
|               "size=0x{:X}, permissions=0x{:08X}", | ||||
|               operation, addr0, addr1, size, permissions); | ||||
|  | ||||
|     if (!addr0) { | ||||
|         return ResultCode{0xD8E007F6}; | ||||
|     } | ||||
|  | ||||
|     if ((addr0 & Memory::CITRA_PAGE_MASK) != 0 || (addr1 & Memory::CITRA_PAGE_MASK) != 0) { | ||||
|         return ERR_MISALIGNED_ADDRESS; | ||||
|     } | ||||
|     if ((size & Memory::CITRA_PAGE_MASK) != 0) { | ||||
|         return ERR_MISALIGNED_SIZE; | ||||
|     } | ||||
|  | ||||
|     u32 region = operation & MEMOP_REGION_MASK; | ||||
|     operation &= ~MEMOP_REGION_MASK; | ||||
|  | ||||
|     if (region != 0) { | ||||
|         LOG_WARNING(Kernel_SVC, "ControlMemory with specified region not supported, region={:X}", | ||||
|                     region); | ||||
|     } | ||||
|  | ||||
|     VMAPermission vma_permissions = (VMAPermission)permissions; | ||||
|  | ||||
|     const auto dst_process = kernel.GetCurrentProcess()->handle_table.Get<Process>(process); | ||||
|  | ||||
|     SCOPE_EXIT({ system.GetRunningCore().ClearInstructionCache(); }); | ||||
|  | ||||
|     switch (operation & MEMOP_OPERATION_MASK) { | ||||
|     case MEMOP_MAP: { | ||||
|         CASCADE_CODE(dst_process->Map(addr0, addr1, size, vma_permissions, true)); | ||||
|         break; | ||||
|     } | ||||
|     case MEMOP_UNMAP: { | ||||
|         CASCADE_CODE(dst_process->Unmap(addr0, addr1, size, vma_permissions, true)); | ||||
|         break; | ||||
|     } | ||||
|     case MEMOP_PROTECT: { | ||||
|         CASCADE_CODE(dst_process->vm_manager.ReprotectRange(addr0, size, vma_permissions)); | ||||
|         break; | ||||
|     } | ||||
|     default: | ||||
|         LOG_ERROR(Kernel_SVC, "unknown operation=0x%08X", operation); | ||||
|         return ResultCode(ErrorDescription::NotImplemented, ErrorModule::Kernel, | ||||
|                           ErrorSummary::NotSupported, ErrorLevel::Fatal); | ||||
|     } | ||||
|  | ||||
|     return RESULT_SUCCESS; | ||||
| } | ||||
|  | ||||
| ResultCode SVC::MapProcessMemory(Handle process, u32 start_addr, u32 size) { | ||||
|     const auto dst_process = kernel.GetCurrentProcess(); | ||||
|     const auto src_process = kernel.GetCurrentProcess()->handle_table.Get<Process>(process); | ||||
|     if (!dst_process) { | ||||
|         return ERR_INVALID_HANDLE; | ||||
|     } | ||||
|  | ||||
|            // Map up to 0x3F00000 bytes starting from 0x100000 from the source process into the current | ||||
|            // process' address space at the specified address. Note: Non-page aligned sizes do not return | ||||
|            // an error, the lower bits are just discarded. | ||||
|     const u32 code_size = | ||||
|         Common::AlignDown(std::min<u32>(size, Memory::PROCESS_IMAGE_MAX_SIZE), Memory::CITRA_PAGE_SIZE); | ||||
|     ResultCode result = dst_process->MapInterprocess(*src_process, start_addr, Memory::PROCESS_IMAGE_VADDR, | ||||
|                                                      code_size, VMAPermission::ReadWrite); | ||||
|     ASSERT(result.IsSuccess()); | ||||
|  | ||||
|     static constexpr u32 MaxHeapSize = 0x6000000; | ||||
|     static constexpr u32 HeapOffset = 0x7F00000; | ||||
|  | ||||
|            // Now map up to 0x6000000 bytes starting from 0x8000000 from the source process into the | ||||
|            // current process' address space at the specified address + 0x7F00000. | ||||
|     const u32 heap_size = | ||||
|         Common::AlignDown(std::min<u32>(size - HeapOffset, MaxHeapSize), Memory::CITRA_PAGE_SIZE); | ||||
|     if (heap_size > 0) { | ||||
|         result = dst_process->MapInterprocess(*src_process, start_addr + HeapOffset, Memory::HEAP_VADDR, | ||||
|                                               heap_size, VMAPermission::ReadWrite); | ||||
|         ASSERT(result.IsSuccess()); | ||||
|     } | ||||
|  | ||||
|     return RESULT_SUCCESS; | ||||
| } | ||||
|  | ||||
| ResultCode SVC::UnmapProcessMemory(Handle process, VAddr start_addr, u32 size) { | ||||
|     const u32 code_size = | ||||
|         Common::AlignDown(std::min<u32>(size, Memory::PROCESS_IMAGE_MAX_SIZE), Memory::CITRA_PAGE_SIZE); | ||||
|  | ||||
|     ResultCode result = kernel.GetCurrentProcess()->vm_manager.UnmapRange(start_addr, code_size); | ||||
|     ASSERT(result.IsSuccess()); | ||||
|  | ||||
|     static constexpr u32 MaxHeapSize = 0x6000000; | ||||
|     static constexpr u32 HeapOffset = 0x7F00000; | ||||
|  | ||||
|     const u32 heap_size = | ||||
|         Common::AlignDown(std::min<u32>(size - HeapOffset, MaxHeapSize), Memory::CITRA_PAGE_SIZE); | ||||
|     result = kernel.GetCurrentProcess()->vm_manager.UnmapRange(start_addr + HeapOffset, heap_size); | ||||
|     ASSERT(result.IsSuccess()); | ||||
|  | ||||
|     system.GetRunningCore().ClearInstructionCache(); | ||||
|     return RESULT_SUCCESS; | ||||
| } | ||||
|  | ||||
| /*ResultCode SVC::ControlProcessMemory(Handle process, u32 addr0, u32 addr1, u32 size, u32 operation, u32 permissions) { | ||||
|     LOG_DEBUG(Kernel_SVC, | ||||
|               "called operation=0x{:08X}, addr0=0x{:08X}, addr1=0x{:08X}, " | ||||
|               "size=0x{:X}, permissions=0x{:08X}", | ||||
|               operation, addr0, addr1, size, permissions); | ||||
|  | ||||
|     if (!addr0) { | ||||
|         return ResultCode{0xD8E007F6}; | ||||
|     } | ||||
|  | ||||
|     if ((addr0 & Memory::CITRA_PAGE_MASK) != 0 || (addr1 & Memory::CITRA_PAGE_MASK) != 0) { | ||||
|         return ERR_MISALIGNED_ADDRESS; | ||||
|     } | ||||
|     if ((size & Memory::CITRA_PAGE_MASK) != 0) { | ||||
|         return ERR_MISALIGNED_SIZE; | ||||
|     } | ||||
|  | ||||
|     u32 region = operation & MEMOP_REGION_MASK; | ||||
|     operation &= ~MEMOP_REGION_MASK; | ||||
|  | ||||
|     if (region != 0) { | ||||
|         LOG_WARNING(Kernel_SVC, "ControlMemory with specified region not supported, region={:X}", | ||||
|                     region); | ||||
|     } | ||||
|  | ||||
|     VMAPermission vma_permissions = (VMAPermission)permissions; | ||||
|  | ||||
|     const auto dst_process = kernel.GetCurrentProcess()->handle_table.Get<Process>(process); | ||||
|  | ||||
|     SCOPE_EXIT({ system.GetRunningCore().ClearInstructionCache(); }); | ||||
|  | ||||
|     switch (operation) { | ||||
|     case MEMOP_MAP: { | ||||
|  | ||||
|         if (addr0 != addr1) { | ||||
|             // TODO(Subv): Check if the addresses are valid. | ||||
|             auto addr1_vma = dst_process->vm_manager.FindVMA(addr1); | ||||
|             ASSERT(addr1_vma->second.meminfo_state == MemoryState::Private); | ||||
|             ASSERT(addr1 + size <= addr1_vma->second.base + addr1_vma->second.size); | ||||
|             ASSERT((static_cast<u32>(addr1_vma->second.permissions) & | ||||
|                     static_cast<u32>(VMAPermission::ReadWrite)) == | ||||
|                    static_cast<u32>(VMAPermission::ReadWrite)); | ||||
|  | ||||
|             auto addr0_vma = dst_process->vm_manager.FindVMA(addr0); | ||||
|             ASSERT(addr0_vma->second.meminfo_state == MemoryState::Free); | ||||
|             ASSERT(addr0 + size <= addr0_vma->second.base + addr0_vma->second.size); | ||||
|  | ||||
|             // Note: The real kernel will crash if this fails and the addresses are valid. | ||||
|             auto result = dst_process->vm_manager.AliasMemory( | ||||
|                 addr0, addr1, size, MemoryState::AliasCode, MemoryState::Locked); | ||||
|             ASSERT(result.Succeeded()); | ||||
|             ASSERT(dst_process->vm_manager.ReprotectRange(addr0, size, vma_permissions).IsSuccess()); | ||||
|             ASSERT( | ||||
|                 dst_process->vm_manager.ReprotectRange(addr1, size, VMAPermission::None).IsSuccess()); | ||||
|         } else { | ||||
|             // This code path acts like PROTECT but also changes the memory state. | ||||
|             CASCADE_CODE(dst_process->vm_manager.ChangeMemoryState( | ||||
|                 addr0, size, MemoryState::Private, VMAPermission::ReadWrite, MemoryState::AliasCode, | ||||
|                 vma_permissions)); | ||||
|         } | ||||
|         break; | ||||
|     } | ||||
|  | ||||
|     case MEMOP_UNMAP: { | ||||
|         if (addr0 != addr1) { | ||||
|             // TODO(Subv): Check if the addresses are valid. | ||||
|             auto addr1_vma = dst_process->vm_manager.FindVMA(addr1); | ||||
|             if (addr1_vma->second.meminfo_state != MemoryState::Locked) { | ||||
|                 return ResultCode(0xE0A01BF5); | ||||
|             } | ||||
|             ASSERT(addr1 + size <= addr1_vma->second.base + addr1_vma->second.size); | ||||
|  | ||||
|             auto addr0_vma = dst_process->vm_manager.FindVMA(addr0); | ||||
|             ASSERT(addr0_vma->second.meminfo_state == MemoryState::AliasCode); | ||||
|             ASSERT(addr0 + size <= addr0_vma->second.base + addr0_vma->second.size); | ||||
|  | ||||
|             ResultCode result = dst_process->vm_manager.UnmapRange(addr0, size); | ||||
|             ASSERT(result.IsSuccess()); | ||||
|  | ||||
|             result = dst_process->vm_manager.ChangeMemoryState(addr1, size, MemoryState::Locked, | ||||
|                                                            VMAPermission::None, | ||||
|                                                            MemoryState::Private, vma_permissions); | ||||
|             ASSERT(result.IsSuccess()); | ||||
|             return result; | ||||
|         } else { | ||||
|             // This code path acts like PROTECT but also changes the memory state. | ||||
|             CASCADE_CODE(dst_process->vm_manager.ChangeMemoryState( | ||||
|                 addr0, size, MemoryState::AliasCode, VMAPermission::None, MemoryState::Private, | ||||
|                 vma_permissions)); | ||||
|         } | ||||
|         break; | ||||
|     } | ||||
|  | ||||
|     case MEMOP_PROTECT: { | ||||
|         ResultCode result = dst_process->vm_manager.ReprotectRange(addr0, size, vma_permissions); | ||||
|         if (result.IsError()) | ||||
|             return result; | ||||
|         break; | ||||
|     } | ||||
|  | ||||
|     default: | ||||
|         LOG_ERROR(Kernel_SVC, "unknown operation=0x%08X", operation); | ||||
|         return ResultCode(ErrorDescription::NotImplemented, ErrorModule::Kernel, | ||||
|                           ErrorSummary::NotSupported, ErrorLevel::Fatal); | ||||
|     } | ||||
|  | ||||
|     return RESULT_SUCCESS; | ||||
| } | ||||
|  | ||||
| ResultCode SVC::MapProcessMemory(Handle process, u32 start_addr, u32 size) { | ||||
|     const auto dst_process = kernel.GetCurrentProcess(); | ||||
|     const auto src_process = kernel.GetCurrentProcess()->handle_table.Get<Process>(process); | ||||
|     if (!dst_process) { | ||||
|         return ERR_INVALID_HANDLE; | ||||
|     } | ||||
|  | ||||
|     SCOPE_EXIT({ system.GetRunningCore().ClearInstructionCache(); }); | ||||
|  | ||||
|     // Map up to 0x3F00000 bytes starting from 0x100000 from the source process into the current | ||||
|     // process' address space at the specified address. Note: Non-page aligned sizes do not return | ||||
|     // an error, the lower bits are just discarded. | ||||
|     u32 code_size = | ||||
|         Common::AlignDown(std::min<u32>(size, Memory::PROCESS_IMAGE_MAX_SIZE), Memory::CITRA_PAGE_SIZE); | ||||
|  | ||||
|     auto vma_handle = dst_process->vm_manager.FindVMA(start_addr); | ||||
|     if (vma_handle->second.type != Kernel::VMAType::Free) { | ||||
|         return ResultCode(ErrorDescription::InvalidAddress, ErrorModule::OS, | ||||
|                           ErrorSummary::InvalidState, ErrorLevel::Usage); | ||||
|     } | ||||
|  | ||||
|     auto result = dst_process->vm_manager.AliasMemory( | ||||
|         start_addr, Memory::PROCESS_IMAGE_VADDR, code_size, Kernel::MemoryState::Shared, | ||||
|         Kernel::VMAPermission::ReadWrite, src_process->vm_manager); | ||||
|     // TODO(Subv): Handle error cases. | ||||
|     ASSERT(result.IsSuccess()); | ||||
|  | ||||
|    // Now map up to 0x6000000 bytes starting from 0x8000000 from the source process into the | ||||
|    // current process' address space at the specified address + 0x7F00000. | ||||
|     static constexpr u32 MaxHeapSize = 0x6000000; | ||||
|     static constexpr u32 HeapOffset = 0x7F00000; | ||||
|     u32 heap_size = | ||||
|         Common::AlignDown(std::min<u32>(size - HeapOffset, MaxHeapSize), Memory::CITRA_PAGE_SIZE); | ||||
|     if (heap_size > 0) { | ||||
|         result = dst_process->vm_manager.AliasMemory( | ||||
|             start_addr + HeapOffset, Memory::HEAP_VADDR, heap_size, Kernel::MemoryState::Shared, | ||||
|             Kernel::VMAPermission::ReadWrite, src_process->vm_manager); | ||||
|         // TODO(Subv): Handle error cases. | ||||
|         ASSERT(result.IsSuccess()); | ||||
|     } | ||||
|     return RESULT_SUCCESS; | ||||
| } | ||||
|  | ||||
| ResultCode SVC::UnmapProcessMemory(Handle process, VAddr start_addr, u32 size) { | ||||
|     const u32 code_size = | ||||
|         Common::AlignDown(std::min<u32>(size, Memory::PROCESS_IMAGE_MAX_SIZE), Memory::CITRA_PAGE_SIZE); | ||||
|  | ||||
|     SCOPE_EXIT({ system.GetRunningCore().ClearInstructionCache(); }); | ||||
|  | ||||
|     ResultCode result = kernel.GetCurrentProcess()->vm_manager.UnmapRange(start_addr, code_size); | ||||
|     ASSERT(result.IsSuccess()); | ||||
|  | ||||
|     static constexpr u32 MaxHeapSize = 0x6000000; | ||||
|     static constexpr u32 HeapOffset = 0x7F00000; | ||||
|  | ||||
|     const u32 heap_size = | ||||
|         Common::AlignDown(std::min<u32>(size - HeapOffset, MaxHeapSize), Memory::CITRA_PAGE_SIZE); | ||||
|     result = kernel.GetCurrentProcess()->vm_manager.UnmapRange(start_addr + HeapOffset, heap_size); | ||||
|     ASSERT(result.IsSuccess()); | ||||
|  | ||||
|     system.GetRunningCore().ClearInstructionCache(); | ||||
|     return RESULT_SUCCESS; | ||||
| }*/ | ||||
|  | ||||
| const std::array<SVC::FunctionDef, 180> SVC::SVC_Table{{ | ||||
|     {0x00, nullptr, "Unknown"}, | ||||
|     {0x01, &SVC::Wrap<&SVC::ControlMemory>, "ControlMemory"}, | ||||
| @@ -2216,9 +2499,9 @@ const std::array<SVC::FunctionDef, 180> SVC::SVC_Table{{ | ||||
|     {0x6D, nullptr, "GetDebugThreadParam"}, | ||||
|     {0x6E, nullptr, "Unknown"}, | ||||
|     {0x6F, nullptr, "Unknown"}, | ||||
|     {0x70, nullptr, "ControlProcessMemory"}, | ||||
|     {0x71, nullptr, "MapProcessMemory"}, | ||||
|     {0x72, nullptr, "UnmapProcessMemory"}, | ||||
|     {0x70, &SVC::Wrap<&SVC::ControlProcessMemory>, "ControlProcessMemory"}, | ||||
|     {0x71, &SVC::Wrap<&SVC::MapProcessMemory>, "MapProcessMemory"}, | ||||
|     {0x72, &SVC::Wrap<&SVC::UnmapProcessMemory>, "UnmapProcessMemory"}, | ||||
|     {0x73, nullptr, "CreateCodeSet"}, | ||||
|     {0x74, nullptr, "RandomStub"}, | ||||
|     {0x75, nullptr, "CreateProcess"}, | ||||
|   | ||||
| @@ -1,7 +1,6 @@ | ||||
| // Copyright 2015 Citra Emulator Project | ||||
| // Licensed under GPLv2 or any later version | ||||
| // Refer to the license.txt file included. | ||||
|  | ||||
| #include <algorithm> | ||||
| #include <iterator> | ||||
| #include "common/assert.h" | ||||
| @@ -307,11 +306,11 @@ ResultVal<VMManager::VMAIter> VMManager::CarveVMARange(VAddr target, u32 size) { | ||||
|     ASSERT(size > 0); | ||||
|  | ||||
|     VMAIter begin_vma = StripIterConstness(FindVMA(target)); | ||||
|     const VMAIter i_end = vma_map.lower_bound(target_end); | ||||
|     if (std::any_of(begin_vma, i_end, | ||||
|                     [](const auto& entry) { return entry.second.type == VMAType::Free; })) { | ||||
|         return ERR_INVALID_ADDRESS_STATE; | ||||
|     } | ||||
|     //const VMAIter i_end = vma_map.lower_bound(target_end); | ||||
|     //if (std::any_of(begin_vma, i_end, | ||||
|     //                [](const auto& entry) { return entry.second.type == VMAType::Free; })) { | ||||
|     //    return ERR_INVALID_ADDRESS_STATE; | ||||
|     //} | ||||
|  | ||||
|     if (target != begin_vma->second.base) { | ||||
|         begin_vma = SplitVMA(begin_vma, target - begin_vma->second.base); | ||||
| @@ -342,6 +341,7 @@ VMManager::VMAIter VMManager::SplitVMA(VMAIter vma_handle, u32 offset_in_vma) { | ||||
|     case VMAType::Free: | ||||
|         break; | ||||
|     case VMAType::BackingMemory: | ||||
|     case VMAType::MemoryAlias: | ||||
|         new_vma.backing_memory += offset_in_vma; | ||||
|         break; | ||||
|     case VMAType::MMIO: | ||||
| @@ -379,6 +379,7 @@ void VMManager::UpdatePageTableForVMA(const VirtualMemoryArea& vma) { | ||||
|         memory.UnmapRegion(*page_table, vma.base, vma.size); | ||||
|         break; | ||||
|     case VMAType::BackingMemory: | ||||
|     case VMAType::MemoryAlias: | ||||
|         memory.MapMemoryRegion(*page_table, vma.base, vma.size, vma.backing_memory); | ||||
|         break; | ||||
|     case VMAType::MMIO: | ||||
| @@ -396,21 +397,97 @@ ResultVal<MemoryRegionInfo::IntervalSet> VMManager::GetBackingBlocksForRange(VAd | ||||
|     MemoryRegionInfo::IntervalSet backing_blocks; | ||||
|     VAddr interval_target = address; | ||||
|     while (interval_target != address + size) { | ||||
|         auto vma = FindVMA(interval_target); | ||||
|         if (vma->second.type != VMAType::BackingMemory) { | ||||
|         const auto it = FindVMA(interval_target); | ||||
|         if (it == vma_map.end() || (it->second.type != VMAType::BackingMemory && it->second.type != VMAType::Free)) { | ||||
|             LOG_ERROR(Kernel, "Trying to use already freed memory"); | ||||
|             return ERR_INVALID_ADDRESS_STATE; | ||||
|         } | ||||
|  | ||||
|         VAddr interval_end = std::min(address + size, vma->second.base + vma->second.size); | ||||
|         u32 interval_size = interval_end - interval_target; | ||||
|         auto backing_memory = memory.GetFCRAMOffset(vma->second.backing_memory + | ||||
|                                                     (interval_target - vma->second.base)); | ||||
|         backing_blocks += | ||||
|             MemoryRegionInfo::Interval(backing_memory, backing_memory + interval_size); | ||||
|         const auto vma = it->second; | ||||
|         const VAddr interval_end = std::min(address + size, vma.base + vma.size); | ||||
|         const u32 interval_size = interval_end - interval_target; | ||||
|         if (vma.type != VMAType::Free) { | ||||
|             const auto backing_memory = memory.GetFCRAMOffset(vma.backing_memory + (interval_target - vma.base)); | ||||
|             backing_blocks += | ||||
|                 MemoryRegionInfo::Interval(backing_memory, backing_memory + interval_size); | ||||
|         } | ||||
|  | ||||
|         interval_target += interval_size; | ||||
|     } | ||||
|     return backing_blocks; | ||||
| } | ||||
|  | ||||
| ResultVal<VMManager::VMAHandle> VMManager::AliasMemory(VAddr target, VAddr source, u32 size, | ||||
|                                                        MemoryState alias_state, | ||||
|                                                        MemoryState aliased_state) { | ||||
|     VMAIter source_iter = StripIterConstness(FindVMA(source)); | ||||
|     ASSERT(source_iter != vma_map.end()); | ||||
|  | ||||
|     auto& source_vma = source_iter->second; | ||||
|     ASSERT(source_vma.type == VMAType::BackingMemory); | ||||
|     ASSERT(source_vma.backing_memory != nullptr); | ||||
|     ASSERT(source + size <= source_vma.base + source_vma.size); | ||||
|  | ||||
|     CASCADE_RESULT(VMAIter vma_handle, CarveVMA(target, size)); | ||||
|     VirtualMemoryArea& final_vma = vma_handle->second; | ||||
|     ASSERT(final_vma.size == size); | ||||
|  | ||||
|     final_vma.type = VMAType::MemoryAlias; | ||||
|     final_vma.permissions = VMAPermission::None; | ||||
|     final_vma.meminfo_state = alias_state; | ||||
|     final_vma.backing_memory = source_vma.backing_memory + (source - source_vma.base); | ||||
|     UpdatePageTableForVMA(final_vma); | ||||
|  | ||||
|     // Update the source VMA state with the new value | ||||
|     CASCADE_RESULT(auto new_vma, CarveVMARange(source, size)); | ||||
|     new_vma->second.meminfo_state = aliased_state; | ||||
|     UpdatePageTableForVMA(new_vma->second); | ||||
|  | ||||
|     return MergeAdjacent(vma_handle); | ||||
| } | ||||
|  | ||||
| ResultCode VMManager::AliasMemory(VAddr target, VAddr source, u32 size, MemoryState alias_state, | ||||
|                                   VMAPermission alias_permissions, | ||||
|                                   const VMManager& source_address_space) { | ||||
|  | ||||
|     u32 cursor = 0; | ||||
|  | ||||
|     while (true) { | ||||
|         VMAHandle source_iter = source_address_space.FindVMA(source + cursor); | ||||
|         ASSERT(source_iter != vma_map.end()); | ||||
|  | ||||
|         auto& source_vma = source_iter->second; | ||||
|         // Skip non-allocated blocks | ||||
|         if (source_vma.type == VMAType::Free) { | ||||
|             cursor += source_vma.size; | ||||
|             continue; | ||||
|         } | ||||
|  | ||||
|         ASSERT(source_vma.type == VMAType::BackingMemory || | ||||
|                source_vma.type == VMAType::MemoryAlias); | ||||
|         ASSERT(source_vma.backing_memory != nullptr); | ||||
|         ASSERT(source_vma.base == source + cursor); | ||||
|  | ||||
|         if (source_vma.size + cursor > size) { | ||||
|             break; | ||||
|         } | ||||
|  | ||||
|         CASCADE_RESULT(VMAIter vma_handle, CarveVMA(target + cursor, source_vma.size)); | ||||
|         VirtualMemoryArea& final_vma = vma_handle->second; | ||||
|         ASSERT(final_vma.size == source_vma.size); | ||||
|  | ||||
|         final_vma.type = VMAType::MemoryAlias; | ||||
|         final_vma.meminfo_state = alias_state; | ||||
|         final_vma.permissions = alias_permissions; | ||||
|         final_vma.backing_memory = source_vma.backing_memory; | ||||
|         UpdatePageTableForVMA(final_vma); | ||||
|  | ||||
|         MergeAdjacent(vma_handle); | ||||
|  | ||||
|         cursor += source_vma.size; | ||||
|     } | ||||
|  | ||||
|     return RESULT_SUCCESS; | ||||
| } | ||||
|  | ||||
| } // namespace Kernel | ||||
|   | ||||
| @@ -27,6 +27,8 @@ enum class VMAType : u8 { | ||||
|     BackingMemory, | ||||
|     /// VMA is mapped to MMIO registers at a fixed PAddr. | ||||
|     MMIO, | ||||
|     /// VMA is an alias of another VMA. | ||||
|     MemoryAlias, | ||||
| }; | ||||
|  | ||||
| /// Permissions for mapped memory blocks | ||||
| @@ -178,6 +180,12 @@ public: | ||||
|     ResultVal<VMAHandle> MapMMIO(VAddr target, PAddr paddr, u32 size, MemoryState state, | ||||
|                                  Memory::MMIORegionPointer mmio_handler); | ||||
|  | ||||
|     ResultVal<VMAHandle> AliasMemory(VAddr target, VAddr source, u32 size, MemoryState alias_state, | ||||
|                                      MemoryState aliased_state); | ||||
|  | ||||
|     ResultCode AliasMemory(VAddr target, VAddr source, u32 size, MemoryState alias_state, | ||||
|                            VMAPermission alias_permissions, const VMManager& source_address_space); | ||||
|  | ||||
|     /** | ||||
|      * Updates the memory state and permissions of the specified range. The range's original memory | ||||
|      * state and permissions must match the `expected` parameters. | ||||
|   | ||||
| @@ -1,7 +1,8 @@ | ||||
| // Copyright 2014 Citra Emulator Project | ||||
| // Licensed under GPLv2 or any later version | ||||
| // Refer to the license.txt file included. | ||||
|  | ||||
| #pragma optimize("", off) | ||||
| #include <cryptopp/sha.h> | ||||
| #include "common/archives.h" | ||||
| #include "common/assert.h" | ||||
| #include "common/common_types.h" | ||||
| @@ -878,6 +879,24 @@ ResultVal<u16> FS_USER::GetSpecialContentIndexFromTMD(MediaType media_type, u64 | ||||
|     return ResultCode(-1); | ||||
| } | ||||
|  | ||||
| void FS_USER::UpdateSha256Context(Kernel::HLERequestContext& ctx) { | ||||
|     IPC::RequestParser rp(ctx); | ||||
|     rp.Skip(8, false); | ||||
|     [[maybe_unused]] const u32 size = rp.Pop<u32>(); | ||||
|     rp.Skip(4, false); | ||||
|     auto input = rp.PopMappedBuffer(); | ||||
|  | ||||
|     std::array<u8, CryptoPP::SHA256::DIGESTSIZE> hash; | ||||
|     std::vector<u8> data(size); | ||||
|     input.Read(data.data(), 0, data.size()); | ||||
|  | ||||
|     CryptoPP::SHA256().CalculateDigest(hash.data(), data.data(), size); | ||||
|  | ||||
|     IPC::RequestBuilder rb = rp.MakeBuilder(9, 0); | ||||
|     rb.Push(RESULT_SUCCESS); | ||||
|     rb.PushRaw(hash); | ||||
| } | ||||
|  | ||||
| FS_USER::FS_USER(Core::System& system) | ||||
|     : ServiceFramework("fs:USER", 30), system(system), archives(system.ArchiveManager()) { | ||||
|     static const FunctionInfo functions[] = { | ||||
| @@ -961,7 +980,7 @@ FS_USER::FS_USER(Core::System& system) | ||||
|         {0x084B, nullptr, "ImportIntegrityVerificationSeed"}, | ||||
|         {0x084C, &FS_USER::FormatSaveData, "FormatSaveData"}, | ||||
|         {0x084D, nullptr, "GetLegacySubBannerData"}, | ||||
|         {0x084E, nullptr, "UpdateSha256Context"}, | ||||
|         {0x084E, &FS_USER::UpdateSha256Context, "UpdateSha256Context"}, | ||||
|         {0x084F, nullptr, "ReadSpecialFile"}, | ||||
|         {0x0850, nullptr, "GetSpecialFileSize"}, | ||||
|         {0x0851, &FS_USER::CreateExtSaveData, "CreateExtSaveData"}, | ||||
|   | ||||
| @@ -8,6 +8,7 @@ | ||||
| #include <boost/serialization/base_object.hpp> | ||||
| #include "common/common_types.h" | ||||
| #include "core/file_sys/errors.h" | ||||
| #include "core/hle/service/fs/archive.h" | ||||
| #include "core/hle/service/service.h" | ||||
|  | ||||
| namespace Core { | ||||
| @@ -106,7 +107,7 @@ private: | ||||
|      */ | ||||
|     void OpenFileDirectly(Kernel::HLERequestContext& ctx); | ||||
|  | ||||
|     /* | ||||
|     /** | ||||
|      * FS_User::DeleteFile service function | ||||
|      *  Inputs: | ||||
|      *      1 : Transaction | ||||
| @@ -120,7 +121,7 @@ private: | ||||
|      */ | ||||
|     void DeleteFile(Kernel::HLERequestContext& ctx); | ||||
|  | ||||
|     /* | ||||
|     /** | ||||
|      * FS_User::RenameFile service function | ||||
|      *  Inputs: | ||||
|      *      1 : Transaction | ||||
| @@ -139,7 +140,7 @@ private: | ||||
|      */ | ||||
|     void RenameFile(Kernel::HLERequestContext& ctx); | ||||
|  | ||||
|     /* | ||||
|     /** | ||||
|      * FS_User::DeleteDirectory service function | ||||
|      *  Inputs: | ||||
|      *      1 : Transaction | ||||
| @@ -153,7 +154,7 @@ private: | ||||
|      */ | ||||
|     void DeleteDirectory(Kernel::HLERequestContext& ctx); | ||||
|  | ||||
|     /* | ||||
|     /** | ||||
|      * FS_User::DeleteDirectoryRecursively service function | ||||
|      *  Inputs: | ||||
|      *      0 : Command header 0x08070142 | ||||
| @@ -168,7 +169,7 @@ private: | ||||
|      */ | ||||
|     void DeleteDirectoryRecursively(Kernel::HLERequestContext& ctx); | ||||
|  | ||||
|     /* | ||||
|     /** | ||||
|      * FS_User::CreateFile service function | ||||
|      *  Inputs: | ||||
|      *      0 : Command header 0x08080202 | ||||
| @@ -185,7 +186,7 @@ private: | ||||
|      */ | ||||
|     void CreateFile(Kernel::HLERequestContext& ctx); | ||||
|  | ||||
|     /* | ||||
|     /** | ||||
|      * FS_User::CreateDirectory service function | ||||
|      *  Inputs: | ||||
|      *      1 : Transaction | ||||
| @@ -200,7 +201,7 @@ private: | ||||
|      */ | ||||
|     void CreateDirectory(Kernel::HLERequestContext& ctx); | ||||
|  | ||||
|     /* | ||||
|     /** | ||||
|      * FS_User::RenameDirectory service function | ||||
|      *  Inputs: | ||||
|      *      1 : Transaction | ||||
| @@ -617,6 +618,23 @@ private: | ||||
|      */ | ||||
|     void GetSaveDataSecureValue(Kernel::HLERequestContext& ctx); | ||||
|  | ||||
|     /** | ||||
|      * FS_User::UpdateSha256Context service function. | ||||
|      *  Inputs: | ||||
|      *      0 : 0x084E0342 | ||||
|      *      1-8 : Input Hash | ||||
|      *      9 : Input Data Size | ||||
|      *      10-12 : Flag, must be zero | ||||
|      *      13 : Flag, must be non-zero | ||||
|      *      14 : (Size << 4) | 0xA | ||||
|      *      15 : Input Data Pointer | ||||
|      *  Outputs: | ||||
|      *      0 : 0x084E0342 | ||||
|      *      1 : Result of function, 0 on success, otherwise error code | ||||
|      *      2-9 : Output SHA-256 Hash | ||||
|      */ | ||||
|     void UpdateSha256Context(Kernel::HLERequestContext& ctx); | ||||
|  | ||||
|     static ResultVal<u16> GetSpecialContentIndexFromGameCard(u64 title_id, SpecialContentType type); | ||||
|     static ResultVal<u16> GetSpecialContentIndexFromTMD(MediaType media_type, u64 title_id, | ||||
|                                                         SpecialContentType type); | ||||
|   | ||||
| @@ -1,9 +1,10 @@ | ||||
| // Copyright 2018 Citra Emulator Project | ||||
| // Licensed under GPLv2 or any later version | ||||
| // Refer to the license.txt file included. | ||||
|  | ||||
| #pragma optimize("", off) | ||||
| #include <cryptopp/aes.h> | ||||
| #include <cryptopp/modes.h> | ||||
| #include <cryptopp/rsa.h> | ||||
| #include "common/archives.h" | ||||
| #include "common/logging/log.h" | ||||
| #include "core/core.h" | ||||
| @@ -13,6 +14,7 @@ | ||||
| #include "core/hw/aes/key.h" | ||||
|  | ||||
| SERIALIZE_EXPORT_IMPL(Service::PS::PS_PS) | ||||
| SERVICE_CONSTRUCT_IMPL(Service::PS::PS_PS) | ||||
|  | ||||
| namespace Service::PS { | ||||
|  | ||||
| @@ -146,11 +148,50 @@ void PS_PS::EncryptDecryptAes(Kernel::HLERequestContext& ctx) { | ||||
|     rb.PushMappedBuffer(destination); | ||||
| } | ||||
|  | ||||
| PS_PS::PS_PS() : ServiceFramework("ps:ps", DefaultMaxSessions) { | ||||
| void PS_PS::VerifyRsaSha256(Kernel::HLERequestContext& ctx) { | ||||
|     IPC::RequestParser rp(ctx); | ||||
|     std::array<u8, 32> sha; | ||||
|     rp.PopRaw(sha); | ||||
|     rp.Pop<u32>(); | ||||
|     const auto rsa_ctx_buf = rp.PopStaticBuffer(); | ||||
|     auto sig_buf = rp.PopMappedBuffer(); | ||||
|  | ||||
|     struct RsaContext { | ||||
|         std::array<u8, 0x100> modulo; | ||||
|         std::array<u8, 0x100> exponent; | ||||
|         u32 rsa_bit_size; | ||||
|         bool is_long_exponent; | ||||
|     }; | ||||
|     static_assert(sizeof(RsaContext) == 520); | ||||
|  | ||||
|     RsaContext rsa_ctx; | ||||
|     std::memcpy(&rsa_ctx, rsa_ctx_buf.data(), rsa_ctx_buf.size()); | ||||
|  | ||||
|     std::vector<u8> signature_buffer(sig_buf.GetSize()); | ||||
|     sig_buf.Read(signature_buffer.data(), 0, sig_buf.GetSize()); | ||||
|  | ||||
|     ASSERT(!rsa_ctx.is_long_exponent); | ||||
|  | ||||
|     u32 exponent; | ||||
|     std::memcpy(&exponent, rsa_ctx.exponent.data(), sizeof(exponent)); | ||||
|  | ||||
|     using Verifier = CryptoPP::RSASS<CryptoPP::PKCS1v15, CryptoPP::SHA256>::Verifier; | ||||
|  | ||||
|     const auto modulus = CryptoPP::Integer(rsa_ctx.modulo.data(), rsa_ctx.modulo.size()); | ||||
|     const auto verifier = Verifier(modulus, CryptoPP::Integer(exponent)); | ||||
|     const bool valid = verifier.VerifyMessage(sha.data(), sha.size(), signature_buffer.data(), signature_buffer.size()); | ||||
|     ASSERT(!valid); | ||||
|  | ||||
|     IPC::RequestBuilder rb = rp.MakeBuilder(1, 2); | ||||
|     rb.Push(RESULT_SUCCESS); | ||||
|     rb.PushMappedBuffer(sig_buf); | ||||
| } | ||||
|  | ||||
| PS_PS::PS_PS(Core::System& system) : ServiceFramework("ps:ps", DefaultMaxSessions), memory{system.Memory()} { | ||||
|     static const FunctionInfo functions[] = { | ||||
|         // clang-format off | ||||
|         {0x0001, nullptr, "SignRsaSha256"}, | ||||
|         {0x0002, nullptr, "VerifyRsaSha256"}, | ||||
|         {0x0002, &PS_PS::VerifyRsaSha256, "VerifyRsaSha256"}, | ||||
|         {0x0004, &PS_PS::EncryptDecryptAes, "EncryptDecryptAes"}, | ||||
|         {0x0005, nullptr, "EncryptSignDecryptVerifyAesCcm"}, | ||||
|         {0x0006, nullptr, "GetRomId"}, | ||||
| @@ -173,7 +214,7 @@ PS_PS::PS_PS() : ServiceFramework("ps:ps", DefaultMaxSessions) { | ||||
|  | ||||
| void InstallInterfaces(Core::System& system) { | ||||
|     auto& service_manager = system.ServiceManager(); | ||||
|     std::make_shared<PS_PS>()->InstallAsService(service_manager); | ||||
|     std::make_shared<PS_PS>(system)->InstallAsService(service_manager); | ||||
| } | ||||
|  | ||||
| } // namespace Service::PS | ||||
|   | ||||
| @@ -14,11 +14,10 @@ namespace Service::PS { | ||||
|  | ||||
| class PS_PS final : public ServiceFramework<PS_PS> { | ||||
| public: | ||||
|     PS_PS(); | ||||
|     PS_PS(Core::System& system); | ||||
|     ~PS_PS() = default; | ||||
|  | ||||
| private: | ||||
|     SERVICE_SERIALIZATION_SIMPLE | ||||
|  | ||||
|     /** | ||||
|      * PS_PS::SignRsaSha256 service function | ||||
| @@ -227,6 +226,9 @@ private: | ||||
|      *      2 : | ||||
|      */ | ||||
|     void InterfaceForPXI_0x04040044(Kernel::HLERequestContext& ctx); | ||||
|  | ||||
| private: | ||||
|     Memory::MemorySystem& memory; | ||||
| }; | ||||
|  | ||||
| /// Initializes the PS_PS Service | ||||
| @@ -235,3 +237,4 @@ void InstallInterfaces(Core::System& system); | ||||
| } // namespace Service::PS | ||||
|  | ||||
| BOOST_CLASS_EXPORT_KEY(Service::PS::PS_PS) | ||||
| SERVICE_CONSTRUCT(Service::PS::PS_PS) | ||||
|   | ||||
| @@ -58,7 +58,8 @@ | ||||
| namespace Service { | ||||
|  | ||||
| const std::array<ServiceModuleInfo, 41> service_module_map{ | ||||
|     {{"FS", 0x00040130'00001102, FS::InstallInterfaces}, | ||||
|     {{"CFG", 0x00040130'00001702, CFG::InstallInterfaces}, | ||||
|      {"FS", 0x00040130'00001102, FS::InstallInterfaces}, | ||||
|      {"PM", 0x00040130'00001202, PM::InstallInterfaces}, | ||||
|      {"LDR", 0x00040130'00003702, LDR::InstallInterfaces}, | ||||
|      {"PXI", 0x00040130'00001402, PXI::InstallInterfaces}, | ||||
| @@ -74,7 +75,6 @@ const std::array<ServiceModuleInfo, 41> service_module_map{ | ||||
|           Y2R::InstallInterfaces(system); | ||||
|       }}, | ||||
|      {"CECD", 0x00040130'00002602, CECD::InstallInterfaces}, | ||||
|      {"CFG", 0x00040130'00001702, CFG::InstallInterfaces}, | ||||
|      {"DLP", 0x00040130'00002802, DLP::InstallInterfaces}, | ||||
|      {"DSP", 0x00040130'00001A02, DSP::InstallInterfaces}, | ||||
|      {"FRD", 0x00040130'00003202, FRD::InstallInterfaces}, | ||||
|   | ||||
| @@ -1,7 +1,7 @@ | ||||
| // Copyright 2015 Citra Emulator Project | ||||
| // Licensed under GPLv2 or any later version | ||||
| // Refer to the license.txt file included. | ||||
|  | ||||
| #pragma optimize("", off) | ||||
| #include <array> | ||||
| #include <cstring> | ||||
| #include <boost/serialization/array.hpp> | ||||
| @@ -156,6 +156,10 @@ public: | ||||
|         return system.GetRunningCore().GetPC(); | ||||
|     } | ||||
|  | ||||
|     u32 GetLR() const noexcept { | ||||
|         return system.GetRunningCore().GetReg(14); | ||||
|     } | ||||
|  | ||||
|     /** | ||||
|      * This function should only be called for virtual addreses with attribute `PageType::Special`. | ||||
|      */ | ||||
| @@ -469,8 +473,8 @@ T MemorySystem::Read(const VAddr vaddr) { | ||||
|     PageType type = impl->current_page_table->attributes[vaddr >> CITRA_PAGE_BITS]; | ||||
|     switch (type) { | ||||
|     case PageType::Unmapped: | ||||
|         LOG_ERROR(HW_Memory, "unmapped Read{} @ 0x{:08X} at PC 0x{:08X}", sizeof(T) * 8, vaddr, | ||||
|                   impl->GetPC()); | ||||
|         LOG_ERROR(HW_Memory, "unmapped Read{} @ 0x{:08X} at PC 0x{:08X} with LR {:#08X}", sizeof(T) * 8, vaddr, | ||||
|                   impl->GetPC(), impl->GetLR()); | ||||
|         return 0; | ||||
|     case PageType::Memory: | ||||
|         ASSERT_MSG(false, "Mapped memory page without a pointer @ {:08X}", vaddr); | ||||
|   | ||||
		Reference in New Issue
	
	Block a user