2020-12-28 16:15:37 +01:00
|
|
|
// Copyright 2018 yuzu emulator team
|
|
|
|
// Licensed under GPLv2 or any later version
|
|
|
|
// Refer to the license.txt file included.
|
|
|
|
|
|
|
|
#include <algorithm>
|
|
|
|
#include <cinttypes>
|
|
|
|
#include <iterator>
|
|
|
|
#include <mutex>
|
|
|
|
#include <vector>
|
|
|
|
|
|
|
|
#include "common/alignment.h"
|
|
|
|
#include "common/assert.h"
|
2020-12-31 11:03:11 +01:00
|
|
|
#include "common/common_funcs.h"
|
2020-12-28 16:15:37 +01:00
|
|
|
#include "common/fiber.h"
|
|
|
|
#include "common/logging/log.h"
|
|
|
|
#include "common/microprofile.h"
|
2021-02-04 00:41:27 +01:00
|
|
|
#include "common/scope_exit.h"
|
2020-12-28 16:15:37 +01:00
|
|
|
#include "common/string_util.h"
|
|
|
|
#include "core/arm/exclusive_monitor.h"
|
|
|
|
#include "core/core.h"
|
|
|
|
#include "core/core_timing.h"
|
|
|
|
#include "core/core_timing_util.h"
|
|
|
|
#include "core/cpu_manager.h"
|
2020-12-31 11:03:11 +01:00
|
|
|
#include "core/hle/kernel/k_address_arbiter.h"
|
2021-05-06 04:45:54 +02:00
|
|
|
#include "core/hle/kernel/k_client_port.h"
|
|
|
|
#include "core/hle/kernel/k_client_session.h"
|
2020-12-31 11:03:11 +01:00
|
|
|
#include "core/hle/kernel/k_condition_variable.h"
|
2021-02-04 00:41:27 +01:00
|
|
|
#include "core/hle/kernel/k_event.h"
|
2021-05-06 04:45:54 +02:00
|
|
|
#include "core/hle/kernel/k_handle_table.h"
|
2021-02-19 02:26:25 +01:00
|
|
|
#include "core/hle/kernel/k_memory_block.h"
|
|
|
|
#include "core/hle/kernel/k_memory_layout.h"
|
|
|
|
#include "core/hle/kernel/k_page_table.h"
|
2021-05-06 04:45:54 +02:00
|
|
|
#include "core/hle/kernel/k_process.h"
|
2021-02-04 00:41:27 +01:00
|
|
|
#include "core/hle/kernel/k_readable_event.h"
|
2021-01-31 07:17:28 +01:00
|
|
|
#include "core/hle/kernel/k_resource_limit.h"
|
2020-12-28 16:15:37 +01:00
|
|
|
#include "core/hle/kernel/k_scheduler.h"
|
2021-02-06 23:05:49 +01:00
|
|
|
#include "core/hle/kernel/k_scoped_resource_reservation.h"
|
2020-12-28 16:15:37 +01:00
|
|
|
#include "core/hle/kernel/k_scoped_scheduler_lock_and_sleep.h"
|
2021-02-19 02:26:25 +01:00
|
|
|
#include "core/hle/kernel/k_shared_memory.h"
|
2020-12-31 11:03:11 +01:00
|
|
|
#include "core/hle/kernel/k_synchronization_object.h"
|
2021-01-22 01:15:25 +01:00
|
|
|
#include "core/hle/kernel/k_thread.h"
|
2021-05-06 04:45:54 +02:00
|
|
|
#include "core/hle/kernel/k_transfer_memory.h"
|
2021-02-04 00:41:27 +01:00
|
|
|
#include "core/hle/kernel/k_writable_event.h"
|
2020-12-28 16:15:37 +01:00
|
|
|
#include "core/hle/kernel/kernel.h"
|
|
|
|
#include "core/hle/kernel/physical_core.h"
|
|
|
|
#include "core/hle/kernel/svc.h"
|
2020-12-31 11:03:11 +01:00
|
|
|
#include "core/hle/kernel/svc_results.h"
|
2020-12-28 16:15:37 +01:00
|
|
|
#include "core/hle/kernel/svc_types.h"
|
|
|
|
#include "core/hle/kernel/svc_wrap.h"
|
|
|
|
#include "core/hle/kernel/time_manager.h"
|
|
|
|
#include "core/hle/lock.h"
|
|
|
|
#include "core/hle/result.h"
|
|
|
|
#include "core/hle/service/service.h"
|
|
|
|
#include "core/memory.h"
|
|
|
|
#include "core/reporter.h"
|
|
|
|
|
|
|
|
namespace Kernel::Svc {
|
|
|
|
namespace {
|
|
|
|
|
|
|
|
// Checks if address + size is greater than the given address
|
|
|
|
// This can return false if the size causes an overflow of a 64-bit type
|
|
|
|
// or if the given size is zero.
|
|
|
|
constexpr bool IsValidAddressRange(VAddr address, u64 size) {
|
|
|
|
return address + size > address;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Helper function that performs the common sanity checks for svcMapMemory
|
|
|
|
// and svcUnmapMemory. This is doable, as both functions perform their sanitizing
|
|
|
|
// in the same order.
|
2021-02-19 02:26:25 +01:00
|
|
|
ResultCode MapUnmapMemorySanityChecks(const KPageTable& manager, VAddr dst_addr, VAddr src_addr,
|
|
|
|
u64 size) {
|
2020-12-28 16:15:37 +01:00
|
|
|
if (!Common::Is4KBAligned(dst_addr)) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Destination address is not aligned to 4KB, 0x{:016X}", dst_addr);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidAddress;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!Common::Is4KBAligned(src_addr)) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Source address is not aligned to 4KB, 0x{:016X}", src_addr);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidSize;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (size == 0) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Size is 0");
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidSize;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!Common::Is4KBAligned(size)) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Size is not aligned to 4KB, 0x{:016X}", size);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidSize;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!IsValidAddressRange(dst_addr, size)) {
|
|
|
|
LOG_ERROR(Kernel_SVC,
|
|
|
|
"Destination is not a valid address range, addr=0x{:016X}, size=0x{:016X}",
|
|
|
|
dst_addr, size);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidCurrentMemory;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!IsValidAddressRange(src_addr, size)) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Source is not a valid address range, addr=0x{:016X}, size=0x{:016X}",
|
|
|
|
src_addr, size);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidCurrentMemory;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!manager.IsInsideAddressSpace(src_addr, size)) {
|
|
|
|
LOG_ERROR(Kernel_SVC,
|
|
|
|
"Source is not within the address space, addr=0x{:016X}, size=0x{:016X}",
|
|
|
|
src_addr, size);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidCurrentMemory;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (manager.IsOutsideStackRegion(dst_addr, size)) {
|
|
|
|
LOG_ERROR(Kernel_SVC,
|
|
|
|
"Destination is not within the stack region, addr=0x{:016X}, size=0x{:016X}",
|
|
|
|
dst_addr, size);
|
2021-05-06 04:45:54 +02:00
|
|
|
return ResultInvalidMemoryRegion;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (manager.IsInsideHeapRegion(dst_addr, size)) {
|
|
|
|
LOG_ERROR(Kernel_SVC,
|
|
|
|
"Destination does not fit within the heap region, addr=0x{:016X}, "
|
|
|
|
"size=0x{:016X}",
|
|
|
|
dst_addr, size);
|
2021-05-06 04:45:54 +02:00
|
|
|
return ResultInvalidMemoryRegion;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (manager.IsInsideAliasRegion(dst_addr, size)) {
|
|
|
|
LOG_ERROR(Kernel_SVC,
|
|
|
|
"Destination does not fit within the map region, addr=0x{:016X}, "
|
|
|
|
"size=0x{:016X}",
|
|
|
|
dst_addr, size);
|
2021-05-06 04:45:54 +02:00
|
|
|
return ResultInvalidMemoryRegion;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
enum class ResourceLimitValueType {
|
|
|
|
CurrentValue,
|
|
|
|
LimitValue,
|
2021-02-06 23:05:49 +01:00
|
|
|
PeakValue,
|
2020-12-28 16:15:37 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
} // Anonymous namespace
|
|
|
|
|
|
|
|
/// Set the process heap to a given Size. It can both extend and shrink the heap.
|
|
|
|
static ResultCode SetHeapSize(Core::System& system, VAddr* heap_addr, u64 heap_size) {
|
|
|
|
std::lock_guard lock{HLE::g_hle_lock};
|
|
|
|
LOG_TRACE(Kernel_SVC, "called, heap_size=0x{:X}", heap_size);
|
|
|
|
|
|
|
|
// Size must be a multiple of 0x200000 (2MB) and be equal to or less than 8GB.
|
|
|
|
if ((heap_size % 0x200000) != 0) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "The heap size is not a multiple of 2MB, heap_size=0x{:016X}",
|
|
|
|
heap_size);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidSize;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (heap_size >= 0x200000000) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "The heap size is not less than 8GB, heap_size=0x{:016X}", heap_size);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidSize;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
auto& page_table{system.Kernel().CurrentProcess()->PageTable()};
|
|
|
|
|
|
|
|
CASCADE_RESULT(*heap_addr, page_table.SetHeapSize(heap_size));
|
|
|
|
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static ResultCode SetHeapSize32(Core::System& system, u32* heap_addr, u32 heap_size) {
|
|
|
|
VAddr temp_heap_addr{};
|
|
|
|
const ResultCode result{SetHeapSize(system, &temp_heap_addr, heap_size)};
|
|
|
|
*heap_addr = static_cast<u32>(temp_heap_addr);
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
static ResultCode SetMemoryAttribute(Core::System& system, VAddr address, u64 size, u32 mask,
|
|
|
|
u32 attribute) {
|
|
|
|
std::lock_guard lock{HLE::g_hle_lock};
|
|
|
|
LOG_DEBUG(Kernel_SVC,
|
|
|
|
"called, address=0x{:016X}, size=0x{:X}, mask=0x{:08X}, attribute=0x{:08X}", address,
|
|
|
|
size, mask, attribute);
|
|
|
|
|
|
|
|
if (!Common::Is4KBAligned(address)) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Address not page aligned (0x{:016X})", address);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidAddress;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (size == 0 || !Common::Is4KBAligned(size)) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Invalid size (0x{:X}). Size must be non-zero and page aligned.",
|
|
|
|
size);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidAddress;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!IsValidAddressRange(address, size)) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Address range overflowed (Address: 0x{:016X}, Size: 0x{:016X})",
|
|
|
|
address, size);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidCurrentMemory;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2021-02-19 02:26:25 +01:00
|
|
|
const auto attributes{static_cast<MemoryAttribute>(mask | attribute)};
|
|
|
|
if (attributes != static_cast<MemoryAttribute>(mask) ||
|
|
|
|
(attributes | MemoryAttribute::Uncached) != MemoryAttribute::Uncached) {
|
2020-12-28 16:15:37 +01:00
|
|
|
LOG_ERROR(Kernel_SVC,
|
|
|
|
"Memory attribute doesn't match the given mask (Attribute: 0x{:X}, Mask: {:X}",
|
|
|
|
attribute, mask);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidCombination;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
auto& page_table{system.Kernel().CurrentProcess()->PageTable()};
|
|
|
|
|
2021-02-19 02:26:25 +01:00
|
|
|
return page_table.SetMemoryAttribute(address, size, static_cast<KMemoryAttribute>(mask),
|
|
|
|
static_cast<KMemoryAttribute>(attribute));
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static ResultCode SetMemoryAttribute32(Core::System& system, u32 address, u32 size, u32 mask,
|
|
|
|
u32 attribute) {
|
|
|
|
return SetMemoryAttribute(system, address, size, mask, attribute);
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Maps a memory range into a different range.
|
|
|
|
static ResultCode MapMemory(Core::System& system, VAddr dst_addr, VAddr src_addr, u64 size) {
|
|
|
|
std::lock_guard lock{HLE::g_hle_lock};
|
|
|
|
LOG_TRACE(Kernel_SVC, "called, dst_addr=0x{:X}, src_addr=0x{:X}, size=0x{:X}", dst_addr,
|
|
|
|
src_addr, size);
|
|
|
|
|
|
|
|
auto& page_table{system.Kernel().CurrentProcess()->PageTable()};
|
|
|
|
|
|
|
|
if (const ResultCode result{MapUnmapMemorySanityChecks(page_table, dst_addr, src_addr, size)};
|
|
|
|
result.IsError()) {
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
return page_table.Map(dst_addr, src_addr, size);
|
|
|
|
}
|
|
|
|
|
|
|
|
static ResultCode MapMemory32(Core::System& system, u32 dst_addr, u32 src_addr, u32 size) {
|
|
|
|
return MapMemory(system, dst_addr, src_addr, size);
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Unmaps a region that was previously mapped with svcMapMemory
|
|
|
|
static ResultCode UnmapMemory(Core::System& system, VAddr dst_addr, VAddr src_addr, u64 size) {
|
|
|
|
std::lock_guard lock{HLE::g_hle_lock};
|
|
|
|
LOG_TRACE(Kernel_SVC, "called, dst_addr=0x{:X}, src_addr=0x{:X}, size=0x{:X}", dst_addr,
|
|
|
|
src_addr, size);
|
|
|
|
|
|
|
|
auto& page_table{system.Kernel().CurrentProcess()->PageTable()};
|
|
|
|
|
|
|
|
if (const ResultCode result{MapUnmapMemorySanityChecks(page_table, dst_addr, src_addr, size)};
|
|
|
|
result.IsError()) {
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
return page_table.Unmap(dst_addr, src_addr, size);
|
|
|
|
}
|
|
|
|
|
|
|
|
static ResultCode UnmapMemory32(Core::System& system, u32 dst_addr, u32 src_addr, u32 size) {
|
|
|
|
return UnmapMemory(system, dst_addr, src_addr, size);
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Connect to an OS service given the port name, returns the handle to the port to out
|
2021-05-06 04:45:54 +02:00
|
|
|
static ResultCode ConnectToNamedPort(Core::System& system, Handle* out, VAddr port_name_address) {
|
2020-12-28 16:15:37 +01:00
|
|
|
auto& memory = system.Memory();
|
|
|
|
if (!memory.IsValidVirtualAddress(port_name_address)) {
|
|
|
|
LOG_ERROR(Kernel_SVC,
|
|
|
|
"Port Name Address is not a valid virtual address, port_name_address=0x{:016X}",
|
|
|
|
port_name_address);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultNotFound;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static constexpr std::size_t PortNameMaxLength = 11;
|
|
|
|
// Read 1 char beyond the max allowed port name to detect names that are too long.
|
|
|
|
const std::string port_name = memory.ReadCString(port_name_address, PortNameMaxLength + 1);
|
|
|
|
if (port_name.size() > PortNameMaxLength) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Port name is too long, expected {} but got {}", PortNameMaxLength,
|
|
|
|
port_name.size());
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultOutOfRange;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
LOG_TRACE(Kernel_SVC, "called port_name={}", port_name);
|
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// Get the current handle table.
|
2020-12-28 16:15:37 +01:00
|
|
|
auto& kernel = system.Kernel();
|
2021-05-06 04:45:54 +02:00
|
|
|
auto& handle_table = kernel.CurrentProcess()->GetHandleTable();
|
|
|
|
|
|
|
|
// Find the client port.
|
2021-05-11 02:22:43 +02:00
|
|
|
auto port = kernel.CreateNamedServicePort(port_name);
|
|
|
|
if (!port) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "tried to connect to unknown port: {}", port_name);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultNotFound;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// Reserve a handle for the port.
|
|
|
|
// NOTE: Nintendo really does write directly to the output handle here.
|
|
|
|
R_TRY(handle_table.Reserve(out));
|
|
|
|
auto handle_guard = SCOPE_GUARD({ handle_table.Unreserve(*out); });
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// Create a session.
|
|
|
|
KClientSession* session{};
|
|
|
|
R_TRY(port->CreateSession(std::addressof(session)));
|
2021-07-03 11:00:06 +02:00
|
|
|
port->Close();
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// Register the session in the table, close the extra reference.
|
|
|
|
handle_table.Register(*out, session);
|
|
|
|
session->Close();
|
|
|
|
|
|
|
|
// We succeeded.
|
|
|
|
handle_guard.Cancel();
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static ResultCode ConnectToNamedPort32(Core::System& system, Handle* out_handle,
|
|
|
|
u32 port_name_address) {
|
|
|
|
|
|
|
|
return ConnectToNamedPort(system, out_handle, port_name_address);
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Makes a blocking IPC call to an OS service.
|
|
|
|
static ResultCode SendSyncRequest(Core::System& system, Handle handle) {
|
2021-05-06 04:45:54 +02:00
|
|
|
|
2020-12-28 16:15:37 +01:00
|
|
|
auto& kernel = system.Kernel();
|
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
KScopedAutoObject session =
|
|
|
|
kernel.CurrentProcess()->GetHandleTable().GetObject<KClientSession>(handle);
|
|
|
|
R_UNLESS(session.IsNotNull(), ResultInvalidHandle);
|
2020-12-28 16:15:37 +01:00
|
|
|
LOG_TRACE(Kernel_SVC, "called handle=0x{:08X}({})", handle, session->GetName());
|
|
|
|
|
|
|
|
auto thread = kernel.CurrentScheduler()->GetCurrentThread();
|
|
|
|
{
|
|
|
|
KScopedSchedulerLock lock(kernel);
|
2020-12-31 11:03:11 +01:00
|
|
|
thread->SetState(ThreadState::Waiting);
|
2021-01-12 10:22:33 +01:00
|
|
|
thread->SetWaitReasonForDebugging(ThreadWaitReasonForDebugging::IPC);
|
2021-05-06 04:45:54 +02:00
|
|
|
session->SendSyncRequest(thread, system.Memory(), system.CoreTiming());
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2021-01-22 01:15:25 +01:00
|
|
|
KSynchronizationObject* dummy{};
|
|
|
|
return thread->GetWaitResult(std::addressof(dummy));
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static ResultCode SendSyncRequest32(Core::System& system, Handle handle) {
|
|
|
|
return SendSyncRequest(system, handle);
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Get the ID for the specified thread.
|
2021-01-22 01:15:25 +01:00
|
|
|
static ResultCode GetThreadId(Core::System& system, u64* out_thread_id, Handle thread_handle) {
|
|
|
|
// Get the thread from its handle.
|
2021-05-06 04:45:54 +02:00
|
|
|
KScopedAutoObject thread =
|
|
|
|
system.Kernel().CurrentProcess()->GetHandleTable().GetObject<KThread>(thread_handle);
|
|
|
|
R_UNLESS(thread.IsNotNull(), ResultInvalidHandle);
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-01-22 01:15:25 +01:00
|
|
|
// Get the thread's id.
|
2021-05-06 04:45:54 +02:00
|
|
|
*out_thread_id = thread->GetId();
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2021-01-22 01:15:25 +01:00
|
|
|
static ResultCode GetThreadId32(Core::System& system, u32* out_thread_id_low,
|
|
|
|
u32* out_thread_id_high, Handle thread_handle) {
|
|
|
|
u64 out_thread_id{};
|
|
|
|
const ResultCode result{GetThreadId(system, &out_thread_id, thread_handle)};
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-01-22 01:15:25 +01:00
|
|
|
*out_thread_id_low = static_cast<u32>(out_thread_id >> 32);
|
|
|
|
*out_thread_id_high = static_cast<u32>(out_thread_id & std::numeric_limits<u32>::max());
|
2020-12-28 16:15:37 +01:00
|
|
|
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Gets the ID of the specified process or a specified thread's owning process.
|
2021-05-06 04:45:54 +02:00
|
|
|
static ResultCode GetProcessId(Core::System& system, u64* out_process_id, Handle handle) {
|
2020-12-28 16:15:37 +01:00
|
|
|
LOG_DEBUG(Kernel_SVC, "called handle=0x{:08X}", handle);
|
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// Get the object from the handle table.
|
|
|
|
KScopedAutoObject obj =
|
|
|
|
system.Kernel().CurrentProcess()->GetHandleTable().GetObject<KAutoObject>(
|
|
|
|
static_cast<Handle>(handle));
|
|
|
|
R_UNLESS(obj.IsNotNull(), ResultInvalidHandle);
|
|
|
|
|
|
|
|
// Get the process from the object.
|
|
|
|
KProcess* process = nullptr;
|
|
|
|
if (KProcess* p = obj->DynamicCast<KProcess*>(); p != nullptr) {
|
|
|
|
// The object is a process, so we can use it directly.
|
|
|
|
process = p;
|
|
|
|
} else if (KThread* t = obj->DynamicCast<KThread*>(); t != nullptr) {
|
|
|
|
// The object is a thread, so we want to use its parent.
|
|
|
|
process = reinterpret_cast<KThread*>(obj.GetPointerUnsafe())->GetOwnerProcess();
|
|
|
|
} else {
|
|
|
|
// TODO(bunnei): This should also handle debug objects before returning.
|
|
|
|
UNIMPLEMENTED_MSG("Debug objects not implemented");
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// Make sure the target process exists.
|
|
|
|
R_UNLESS(process != nullptr, ResultInvalidHandle);
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// Get the process id.
|
|
|
|
*out_process_id = process->GetId();
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidHandle;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
static ResultCode GetProcessId32(Core::System& system, u32* out_process_id_low,
|
|
|
|
u32* out_process_id_high, Handle handle) {
|
|
|
|
u64 out_process_id{};
|
|
|
|
const auto result = GetProcessId(system, &out_process_id, handle);
|
|
|
|
*out_process_id_low = static_cast<u32>(out_process_id);
|
|
|
|
*out_process_id_high = static_cast<u32>(out_process_id >> 32);
|
2020-12-28 16:15:37 +01:00
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Wait for the given handles to synchronize, timeout after the specified nanoseconds
|
2020-12-31 11:03:11 +01:00
|
|
|
static ResultCode WaitSynchronization(Core::System& system, s32* index, VAddr handles_address,
|
2021-05-06 04:45:54 +02:00
|
|
|
u64 num_handles, s64 nano_seconds) {
|
|
|
|
LOG_TRACE(Kernel_SVC, "called handles_address=0x{:X}, num_handles={}, nano_seconds={}",
|
|
|
|
handles_address, num_handles, nano_seconds);
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// Ensure number of handles is valid.
|
|
|
|
R_UNLESS(0 <= num_handles && num_handles <= ArgumentHandleCountMax, ResultOutOfRange);
|
2020-12-28 16:15:37 +01:00
|
|
|
|
|
|
|
auto& kernel = system.Kernel();
|
2021-05-06 04:45:54 +02:00
|
|
|
std::vector<KSynchronizationObject*> objs(num_handles);
|
2020-12-28 16:15:37 +01:00
|
|
|
const auto& handle_table = kernel.CurrentProcess()->GetHandleTable();
|
2021-05-06 04:45:54 +02:00
|
|
|
Handle* handles = system.Memory().GetPointer<Handle>(handles_address);
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// Copy user handles.
|
|
|
|
if (num_handles > 0) {
|
|
|
|
// Convert the handles to objects.
|
|
|
|
R_UNLESS(handle_table.GetMultipleObjects<KSynchronizationObject>(objs.data(), handles,
|
|
|
|
num_handles),
|
|
|
|
ResultInvalidHandle);
|
|
|
|
}
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// Ensure handles are closed when we're done.
|
|
|
|
SCOPE_EXIT({
|
|
|
|
for (u64 i = 0; i < num_handles; ++i) {
|
|
|
|
objs[i]->Close();
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
2021-05-06 04:45:54 +02:00
|
|
|
});
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
return KSynchronizationObject::Wait(kernel, index, objs.data(), static_cast<s32>(objs.size()),
|
|
|
|
nano_seconds);
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static ResultCode WaitSynchronization32(Core::System& system, u32 timeout_low, u32 handles_address,
|
2021-05-06 04:45:54 +02:00
|
|
|
s32 num_handles, u32 timeout_high, s32* index) {
|
2020-12-28 16:15:37 +01:00
|
|
|
const s64 nano_seconds{(static_cast<s64>(timeout_high) << 32) | static_cast<s64>(timeout_low)};
|
2021-05-06 04:45:54 +02:00
|
|
|
return WaitSynchronization(system, index, handles_address, num_handles, nano_seconds);
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Resumes a thread waiting on WaitSynchronization
|
2021-05-06 04:45:54 +02:00
|
|
|
static ResultCode CancelSynchronization(Core::System& system, Handle handle) {
|
|
|
|
LOG_TRACE(Kernel_SVC, "called handle=0x{:X}", handle);
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-01-22 01:15:25 +01:00
|
|
|
// Get the thread from its handle.
|
2021-05-06 04:45:54 +02:00
|
|
|
KScopedAutoObject thread =
|
2021-06-10 02:25:31 +02:00
|
|
|
system.Kernel().CurrentProcess()->GetHandleTable().GetObject<KThread>(handle);
|
|
|
|
R_UNLESS(thread.IsNotNull(), ResultInvalidHandle);
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-01-22 01:15:25 +01:00
|
|
|
// Cancel the thread's wait.
|
|
|
|
thread->WaitCancel();
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
static ResultCode CancelSynchronization32(Core::System& system, Handle handle) {
|
|
|
|
return CancelSynchronization(system, handle);
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2020-12-31 11:03:11 +01:00
|
|
|
/// Attempts to locks a mutex
|
|
|
|
static ResultCode ArbitrateLock(Core::System& system, Handle thread_handle, VAddr address,
|
|
|
|
u32 tag) {
|
|
|
|
LOG_TRACE(Kernel_SVC, "called thread_handle=0x{:08X}, address=0x{:X}, tag=0x{:08X}",
|
|
|
|
thread_handle, address, tag);
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2020-12-31 11:03:11 +01:00
|
|
|
// Validate the input address.
|
2021-02-19 02:26:25 +01:00
|
|
|
if (IsKernelAddress(address)) {
|
2021-02-08 06:07:34 +01:00
|
|
|
LOG_ERROR(Kernel_SVC, "Attempting to arbitrate a lock on a kernel address (address={:08X})",
|
|
|
|
address);
|
|
|
|
return ResultInvalidCurrentMemory;
|
|
|
|
}
|
|
|
|
if (!Common::IsAligned(address, sizeof(u32))) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Input address must be 4 byte aligned (address: {:08X})", address);
|
|
|
|
return ResultInvalidAddress;
|
|
|
|
}
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2020-12-31 11:03:11 +01:00
|
|
|
return system.Kernel().CurrentProcess()->WaitForAddress(thread_handle, address, tag);
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2020-12-31 11:03:11 +01:00
|
|
|
static ResultCode ArbitrateLock32(Core::System& system, Handle thread_handle, u32 address,
|
|
|
|
u32 tag) {
|
|
|
|
return ArbitrateLock(system, thread_handle, address, tag);
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Unlock a mutex
|
2020-12-31 11:03:11 +01:00
|
|
|
static ResultCode ArbitrateUnlock(Core::System& system, VAddr address) {
|
|
|
|
LOG_TRACE(Kernel_SVC, "called address=0x{:X}", address);
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2020-12-31 11:03:11 +01:00
|
|
|
// Validate the input address.
|
2021-02-19 02:26:25 +01:00
|
|
|
if (IsKernelAddress(address)) {
|
2021-02-08 06:07:34 +01:00
|
|
|
LOG_ERROR(Kernel_SVC,
|
|
|
|
"Attempting to arbitrate an unlock on a kernel address (address={:08X})",
|
|
|
|
address);
|
|
|
|
return ResultInvalidCurrentMemory;
|
|
|
|
}
|
|
|
|
if (!Common::IsAligned(address, sizeof(u32))) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Input address must be 4 byte aligned (address: {:08X})", address);
|
|
|
|
return ResultInvalidAddress;
|
|
|
|
}
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2020-12-31 11:03:11 +01:00
|
|
|
return system.Kernel().CurrentProcess()->SignalToAddress(address);
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2020-12-31 11:03:11 +01:00
|
|
|
static ResultCode ArbitrateUnlock32(Core::System& system, u32 address) {
|
|
|
|
return ArbitrateUnlock(system, address);
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
enum class BreakType : u32 {
|
|
|
|
Panic = 0,
|
|
|
|
AssertionFailed = 1,
|
|
|
|
PreNROLoad = 3,
|
|
|
|
PostNROLoad = 4,
|
|
|
|
PreNROUnload = 5,
|
|
|
|
PostNROUnload = 6,
|
|
|
|
CppException = 7,
|
|
|
|
};
|
|
|
|
|
|
|
|
struct BreakReason {
|
|
|
|
union {
|
|
|
|
u32 raw;
|
|
|
|
BitField<0, 30, BreakType> break_type;
|
|
|
|
BitField<31, 1, u32> signal_debugger;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
/// Break program execution
|
|
|
|
static void Break(Core::System& system, u32 reason, u64 info1, u64 info2) {
|
|
|
|
BreakReason break_reason{reason};
|
|
|
|
bool has_dumped_buffer{};
|
|
|
|
std::vector<u8> debug_buffer;
|
|
|
|
|
|
|
|
const auto handle_debug_buffer = [&](VAddr addr, u64 sz) {
|
|
|
|
if (sz == 0 || addr == 0 || has_dumped_buffer) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
auto& memory = system.Memory();
|
|
|
|
|
|
|
|
// This typically is an error code so we're going to assume this is the case
|
|
|
|
if (sz == sizeof(u32)) {
|
|
|
|
LOG_CRITICAL(Debug_Emulated, "debug_buffer_err_code={:X}", memory.Read32(addr));
|
|
|
|
} else {
|
|
|
|
// We don't know what's in here so we'll hexdump it
|
|
|
|
debug_buffer.resize(sz);
|
|
|
|
memory.ReadBlock(addr, debug_buffer.data(), sz);
|
|
|
|
std::string hexdump;
|
|
|
|
for (std::size_t i = 0; i < debug_buffer.size(); i++) {
|
|
|
|
hexdump += fmt::format("{:02X} ", debug_buffer[i]);
|
|
|
|
if (i != 0 && i % 16 == 0) {
|
|
|
|
hexdump += '\n';
|
|
|
|
}
|
|
|
|
}
|
|
|
|
LOG_CRITICAL(Debug_Emulated, "debug_buffer=\n{}", hexdump);
|
|
|
|
}
|
|
|
|
has_dumped_buffer = true;
|
|
|
|
};
|
|
|
|
switch (break_reason.break_type) {
|
|
|
|
case BreakType::Panic:
|
|
|
|
LOG_CRITICAL(Debug_Emulated, "Signalling debugger, PANIC! info1=0x{:016X}, info2=0x{:016X}",
|
|
|
|
info1, info2);
|
|
|
|
handle_debug_buffer(info1, info2);
|
|
|
|
break;
|
|
|
|
case BreakType::AssertionFailed:
|
|
|
|
LOG_CRITICAL(Debug_Emulated,
|
|
|
|
"Signalling debugger, Assertion failed! info1=0x{:016X}, info2=0x{:016X}",
|
|
|
|
info1, info2);
|
|
|
|
handle_debug_buffer(info1, info2);
|
|
|
|
break;
|
|
|
|
case BreakType::PreNROLoad:
|
|
|
|
LOG_WARNING(
|
|
|
|
Debug_Emulated,
|
|
|
|
"Signalling debugger, Attempting to load an NRO at 0x{:016X} with size 0x{:016X}",
|
|
|
|
info1, info2);
|
|
|
|
break;
|
|
|
|
case BreakType::PostNROLoad:
|
|
|
|
LOG_WARNING(Debug_Emulated,
|
|
|
|
"Signalling debugger, Loaded an NRO at 0x{:016X} with size 0x{:016X}", info1,
|
|
|
|
info2);
|
|
|
|
break;
|
|
|
|
case BreakType::PreNROUnload:
|
|
|
|
LOG_WARNING(
|
|
|
|
Debug_Emulated,
|
|
|
|
"Signalling debugger, Attempting to unload an NRO at 0x{:016X} with size 0x{:016X}",
|
|
|
|
info1, info2);
|
|
|
|
break;
|
|
|
|
case BreakType::PostNROUnload:
|
|
|
|
LOG_WARNING(Debug_Emulated,
|
|
|
|
"Signalling debugger, Unloaded an NRO at 0x{:016X} with size 0x{:016X}", info1,
|
|
|
|
info2);
|
|
|
|
break;
|
|
|
|
case BreakType::CppException:
|
|
|
|
LOG_CRITICAL(Debug_Emulated, "Signalling debugger. Uncaught C++ exception encountered.");
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
LOG_WARNING(
|
|
|
|
Debug_Emulated,
|
|
|
|
"Signalling debugger, Unknown break reason {}, info1=0x{:016X}, info2=0x{:016X}",
|
|
|
|
static_cast<u32>(break_reason.break_type.Value()), info1, info2);
|
|
|
|
handle_debug_buffer(info1, info2);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
system.GetReporter().SaveSvcBreakReport(
|
|
|
|
static_cast<u32>(break_reason.break_type.Value()), break_reason.signal_debugger, info1,
|
|
|
|
info2, has_dumped_buffer ? std::make_optional(debug_buffer) : std::nullopt);
|
|
|
|
|
|
|
|
if (!break_reason.signal_debugger) {
|
|
|
|
LOG_CRITICAL(
|
|
|
|
Debug_Emulated,
|
|
|
|
"Emulated program broke execution! reason=0x{:016X}, info1=0x{:016X}, info2=0x{:016X}",
|
|
|
|
reason, info1, info2);
|
|
|
|
|
|
|
|
handle_debug_buffer(info1, info2);
|
|
|
|
|
|
|
|
auto* const current_thread = system.Kernel().CurrentScheduler()->GetCurrentThread();
|
2021-01-22 01:15:25 +01:00
|
|
|
const auto thread_processor_id = current_thread->GetActiveCore();
|
2020-12-28 16:15:37 +01:00
|
|
|
system.ArmInterface(static_cast<std::size_t>(thread_processor_id)).LogBacktrace();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void Break32(Core::System& system, u32 reason, u32 info1, u32 info2) {
|
|
|
|
Break(system, reason, info1, info2);
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Used to output a message on a debug hardware unit - does nothing on a retail unit
|
|
|
|
static void OutputDebugString(Core::System& system, VAddr address, u64 len) {
|
|
|
|
if (len == 0) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string str(len, '\0');
|
|
|
|
system.Memory().ReadBlock(address, str.data(), str.size());
|
|
|
|
LOG_DEBUG(Debug_Emulated, "{}", str);
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Gets system/memory information for the current process
|
2021-05-06 04:45:54 +02:00
|
|
|
static ResultCode GetInfo(Core::System& system, u64* result, u64 info_id, Handle handle,
|
2020-12-28 16:15:37 +01:00
|
|
|
u64 info_sub_id) {
|
|
|
|
std::lock_guard lock{HLE::g_hle_lock};
|
|
|
|
LOG_TRACE(Kernel_SVC, "called info_id=0x{:X}, info_sub_id=0x{:X}, handle=0x{:08X}", info_id,
|
|
|
|
info_sub_id, handle);
|
|
|
|
|
|
|
|
enum class GetInfoType : u64 {
|
|
|
|
// 1.0.0+
|
|
|
|
AllowedCPUCoreMask = 0,
|
|
|
|
AllowedThreadPriorityMask = 1,
|
|
|
|
MapRegionBaseAddr = 2,
|
|
|
|
MapRegionSize = 3,
|
|
|
|
HeapRegionBaseAddr = 4,
|
|
|
|
HeapRegionSize = 5,
|
|
|
|
TotalPhysicalMemoryAvailable = 6,
|
|
|
|
TotalPhysicalMemoryUsed = 7,
|
|
|
|
IsCurrentProcessBeingDebugged = 8,
|
|
|
|
RegisterResourceLimit = 9,
|
|
|
|
IdleTickCount = 10,
|
|
|
|
RandomEntropy = 11,
|
|
|
|
ThreadTickCount = 0xF0000002,
|
|
|
|
// 2.0.0+
|
|
|
|
ASLRRegionBaseAddr = 12,
|
|
|
|
ASLRRegionSize = 13,
|
|
|
|
StackRegionBaseAddr = 14,
|
|
|
|
StackRegionSize = 15,
|
|
|
|
// 3.0.0+
|
|
|
|
SystemResourceSize = 16,
|
|
|
|
SystemResourceUsage = 17,
|
|
|
|
TitleId = 18,
|
|
|
|
// 4.0.0+
|
|
|
|
PrivilegedProcessId = 19,
|
|
|
|
// 5.0.0+
|
|
|
|
UserExceptionContextAddr = 20,
|
|
|
|
// 6.0.0+
|
|
|
|
TotalPhysicalMemoryAvailableWithoutSystemResource = 21,
|
|
|
|
TotalPhysicalMemoryUsedWithoutSystemResource = 22,
|
|
|
|
};
|
|
|
|
|
|
|
|
const auto info_id_type = static_cast<GetInfoType>(info_id);
|
|
|
|
|
|
|
|
switch (info_id_type) {
|
|
|
|
case GetInfoType::AllowedCPUCoreMask:
|
|
|
|
case GetInfoType::AllowedThreadPriorityMask:
|
|
|
|
case GetInfoType::MapRegionBaseAddr:
|
|
|
|
case GetInfoType::MapRegionSize:
|
|
|
|
case GetInfoType::HeapRegionBaseAddr:
|
|
|
|
case GetInfoType::HeapRegionSize:
|
|
|
|
case GetInfoType::ASLRRegionBaseAddr:
|
|
|
|
case GetInfoType::ASLRRegionSize:
|
|
|
|
case GetInfoType::StackRegionBaseAddr:
|
|
|
|
case GetInfoType::StackRegionSize:
|
|
|
|
case GetInfoType::TotalPhysicalMemoryAvailable:
|
|
|
|
case GetInfoType::TotalPhysicalMemoryUsed:
|
|
|
|
case GetInfoType::SystemResourceSize:
|
|
|
|
case GetInfoType::SystemResourceUsage:
|
|
|
|
case GetInfoType::TitleId:
|
|
|
|
case GetInfoType::UserExceptionContextAddr:
|
|
|
|
case GetInfoType::TotalPhysicalMemoryAvailableWithoutSystemResource:
|
|
|
|
case GetInfoType::TotalPhysicalMemoryUsedWithoutSystemResource: {
|
|
|
|
if (info_sub_id != 0) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Info sub id is non zero! info_id={}, info_sub_id={}", info_id,
|
|
|
|
info_sub_id);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidEnumValue;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
const auto& handle_table = system.Kernel().CurrentProcess()->GetHandleTable();
|
|
|
|
KScopedAutoObject process = handle_table.GetObject<KProcess>(handle);
|
|
|
|
if (process.IsNull()) {
|
2020-12-28 16:15:37 +01:00
|
|
|
LOG_ERROR(Kernel_SVC, "Process is not valid! info_id={}, info_sub_id={}, handle={:08X}",
|
|
|
|
info_id, info_sub_id, handle);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidHandle;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
switch (info_id_type) {
|
|
|
|
case GetInfoType::AllowedCPUCoreMask:
|
|
|
|
*result = process->GetCoreMask();
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
|
|
|
|
case GetInfoType::AllowedThreadPriorityMask:
|
|
|
|
*result = process->GetPriorityMask();
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
|
|
|
|
case GetInfoType::MapRegionBaseAddr:
|
|
|
|
*result = process->PageTable().GetAliasRegionStart();
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
|
|
|
|
case GetInfoType::MapRegionSize:
|
|
|
|
*result = process->PageTable().GetAliasRegionSize();
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
|
|
|
|
case GetInfoType::HeapRegionBaseAddr:
|
|
|
|
*result = process->PageTable().GetHeapRegionStart();
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
|
|
|
|
case GetInfoType::HeapRegionSize:
|
|
|
|
*result = process->PageTable().GetHeapRegionSize();
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
|
|
|
|
case GetInfoType::ASLRRegionBaseAddr:
|
|
|
|
*result = process->PageTable().GetAliasCodeRegionStart();
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
|
|
|
|
case GetInfoType::ASLRRegionSize:
|
|
|
|
*result = process->PageTable().GetAliasCodeRegionSize();
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
|
|
|
|
case GetInfoType::StackRegionBaseAddr:
|
|
|
|
*result = process->PageTable().GetStackRegionStart();
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
|
|
|
|
case GetInfoType::StackRegionSize:
|
|
|
|
*result = process->PageTable().GetStackRegionSize();
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
|
|
|
|
case GetInfoType::TotalPhysicalMemoryAvailable:
|
|
|
|
*result = process->GetTotalPhysicalMemoryAvailable();
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
|
|
|
|
case GetInfoType::TotalPhysicalMemoryUsed:
|
|
|
|
*result = process->GetTotalPhysicalMemoryUsed();
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
|
|
|
|
case GetInfoType::SystemResourceSize:
|
|
|
|
*result = process->GetSystemResourceSize();
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
|
|
|
|
case GetInfoType::SystemResourceUsage:
|
|
|
|
LOG_WARNING(Kernel_SVC, "(STUBBED) Attempted to query system resource usage");
|
|
|
|
*result = process->GetSystemResourceUsage();
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
|
|
|
|
case GetInfoType::TitleId:
|
|
|
|
*result = process->GetTitleID();
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
|
|
|
|
case GetInfoType::UserExceptionContextAddr:
|
|
|
|
*result = process->GetTLSRegionAddress();
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
|
|
|
|
case GetInfoType::TotalPhysicalMemoryAvailableWithoutSystemResource:
|
|
|
|
*result = process->GetTotalPhysicalMemoryAvailableWithoutSystemResource();
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
|
|
|
|
case GetInfoType::TotalPhysicalMemoryUsedWithoutSystemResource:
|
|
|
|
*result = process->GetTotalPhysicalMemoryUsedWithoutSystemResource();
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
LOG_ERROR(Kernel_SVC, "Unimplemented svcGetInfo id=0x{:016X}", info_id);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidEnumValue;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
case GetInfoType::IsCurrentProcessBeingDebugged:
|
|
|
|
*result = 0;
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
|
|
|
|
case GetInfoType::RegisterResourceLimit: {
|
|
|
|
if (handle != 0) {
|
|
|
|
LOG_ERROR(Kernel, "Handle is non zero! handle={:08X}", handle);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidHandle;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (info_sub_id != 0) {
|
|
|
|
LOG_ERROR(Kernel, "Info sub id is non zero! info_id={}, info_sub_id={}", info_id,
|
|
|
|
info_sub_id);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidCombination;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
KProcess* const current_process = system.Kernel().CurrentProcess();
|
|
|
|
KHandleTable& handle_table = current_process->GetHandleTable();
|
2020-12-28 16:15:37 +01:00
|
|
|
const auto resource_limit = current_process->GetResourceLimit();
|
|
|
|
if (!resource_limit) {
|
2021-05-06 04:45:54 +02:00
|
|
|
*result = Svc::InvalidHandle;
|
2020-12-28 16:15:37 +01:00
|
|
|
// Yes, the kernel considers this a successful operation.
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2021-05-16 11:38:19 +02:00
|
|
|
Handle resource_handle{};
|
|
|
|
R_TRY(handle_table.Add(&resource_handle, resource_limit));
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-05-16 11:38:19 +02:00
|
|
|
*result = resource_handle;
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
case GetInfoType::RandomEntropy:
|
|
|
|
if (handle != 0) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Process Handle is non zero, expected 0 result but got {:016X}",
|
|
|
|
handle);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidHandle;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
if (info_sub_id >= KProcess::RANDOM_ENTROPY_SIZE) {
|
2020-12-28 16:15:37 +01:00
|
|
|
LOG_ERROR(Kernel_SVC, "Entropy size is out of range, expected {} but got {}",
|
2021-05-06 04:45:54 +02:00
|
|
|
KProcess::RANDOM_ENTROPY_SIZE, info_sub_id);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidCombination;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
*result = system.Kernel().CurrentProcess()->GetRandomEntropy(info_sub_id);
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
|
|
|
|
case GetInfoType::PrivilegedProcessId:
|
|
|
|
LOG_WARNING(Kernel_SVC,
|
|
|
|
"(STUBBED) Attempted to query privileged process id bounds, returned 0");
|
|
|
|
*result = 0;
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
|
|
|
|
case GetInfoType::ThreadTickCount: {
|
|
|
|
constexpr u64 num_cpus = 4;
|
|
|
|
if (info_sub_id != 0xFFFFFFFFFFFFFFFF && info_sub_id >= num_cpus) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Core count is out of range, expected {} but got {}", num_cpus,
|
|
|
|
info_sub_id);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidCombination;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
KScopedAutoObject thread =
|
|
|
|
system.Kernel().CurrentProcess()->GetHandleTable().GetObject<KThread>(
|
|
|
|
static_cast<Handle>(handle));
|
|
|
|
if (thread.IsNull()) {
|
2020-12-28 16:15:37 +01:00
|
|
|
LOG_ERROR(Kernel_SVC, "Thread handle does not exist, handle=0x{:08X}",
|
|
|
|
static_cast<Handle>(handle));
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidHandle;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
const auto& core_timing = system.CoreTiming();
|
|
|
|
const auto& scheduler = *system.Kernel().CurrentScheduler();
|
|
|
|
const auto* const current_thread = scheduler.GetCurrentThread();
|
2021-05-06 04:45:54 +02:00
|
|
|
const bool same_thread = current_thread == thread.GetPointerUnsafe();
|
2020-12-28 16:15:37 +01:00
|
|
|
|
|
|
|
const u64 prev_ctx_ticks = scheduler.GetLastContextSwitchTicks();
|
|
|
|
u64 out_ticks = 0;
|
|
|
|
if (same_thread && info_sub_id == 0xFFFFFFFFFFFFFFFF) {
|
2021-01-22 01:15:25 +01:00
|
|
|
const u64 thread_ticks = current_thread->GetCpuTime();
|
2020-12-28 16:15:37 +01:00
|
|
|
|
|
|
|
out_ticks = thread_ticks + (core_timing.GetCPUTicks() - prev_ctx_ticks);
|
2021-08-07 16:05:45 +02:00
|
|
|
} else if (same_thread && info_sub_id == system.CurrentCoreIndex()) {
|
2020-12-28 16:15:37 +01:00
|
|
|
out_ticks = core_timing.GetCPUTicks() - prev_ctx_ticks;
|
|
|
|
}
|
|
|
|
|
|
|
|
*result = out_ticks;
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
default:
|
|
|
|
LOG_ERROR(Kernel_SVC, "Unimplemented svcGetInfo id=0x{:016X}", info_id);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidEnumValue;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static ResultCode GetInfo32(Core::System& system, u32* result_low, u32* result_high, u32 sub_id_low,
|
|
|
|
u32 info_id, u32 handle, u32 sub_id_high) {
|
|
|
|
const u64 sub_id{u64{sub_id_low} | (u64{sub_id_high} << 32)};
|
|
|
|
u64 res_value{};
|
|
|
|
|
|
|
|
const ResultCode result{GetInfo(system, &res_value, info_id, handle, sub_id)};
|
|
|
|
*result_high = static_cast<u32>(res_value >> 32);
|
|
|
|
*result_low = static_cast<u32>(res_value & std::numeric_limits<u32>::max());
|
|
|
|
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Maps memory at a desired address
|
|
|
|
static ResultCode MapPhysicalMemory(Core::System& system, VAddr addr, u64 size) {
|
|
|
|
std::lock_guard lock{HLE::g_hle_lock};
|
|
|
|
LOG_DEBUG(Kernel_SVC, "called, addr=0x{:016X}, size=0x{:X}", addr, size);
|
|
|
|
|
|
|
|
if (!Common::Is4KBAligned(addr)) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Address is not aligned to 4KB, 0x{:016X}", addr);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidAddress;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!Common::Is4KBAligned(size)) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Size is not aligned to 4KB, 0x{:X}", size);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidSize;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (size == 0) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Size is zero");
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidSize;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!(addr < addr + size)) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Size causes 64-bit overflow of address");
|
2021-05-06 04:45:54 +02:00
|
|
|
return ResultInvalidMemoryRegion;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
KProcess* const current_process{system.Kernel().CurrentProcess()};
|
2020-12-28 16:15:37 +01:00
|
|
|
auto& page_table{current_process->PageTable()};
|
|
|
|
|
|
|
|
if (current_process->GetSystemResourceSize() == 0) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "System Resource Size is zero");
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidState;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!page_table.IsInsideAddressSpace(addr, size)) {
|
|
|
|
LOG_ERROR(Kernel_SVC,
|
|
|
|
"Address is not within the address space, addr=0x{:016X}, size=0x{:016X}", addr,
|
|
|
|
size);
|
2021-05-06 04:45:54 +02:00
|
|
|
return ResultInvalidMemoryRegion;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (page_table.IsOutsideAliasRegion(addr, size)) {
|
|
|
|
LOG_ERROR(Kernel_SVC,
|
|
|
|
"Address is not within the alias region, addr=0x{:016X}, size=0x{:016X}", addr,
|
|
|
|
size);
|
2021-05-06 04:45:54 +02:00
|
|
|
return ResultInvalidMemoryRegion;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return page_table.MapPhysicalMemory(addr, size);
|
|
|
|
}
|
|
|
|
|
|
|
|
static ResultCode MapPhysicalMemory32(Core::System& system, u32 addr, u32 size) {
|
|
|
|
return MapPhysicalMemory(system, addr, size);
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Unmaps memory previously mapped via MapPhysicalMemory
|
|
|
|
static ResultCode UnmapPhysicalMemory(Core::System& system, VAddr addr, u64 size) {
|
|
|
|
std::lock_guard lock{HLE::g_hle_lock};
|
|
|
|
LOG_DEBUG(Kernel_SVC, "called, addr=0x{:016X}, size=0x{:X}", addr, size);
|
|
|
|
|
|
|
|
if (!Common::Is4KBAligned(addr)) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Address is not aligned to 4KB, 0x{:016X}", addr);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidAddress;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!Common::Is4KBAligned(size)) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Size is not aligned to 4KB, 0x{:X}", size);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidSize;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (size == 0) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Size is zero");
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidSize;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!(addr < addr + size)) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Size causes 64-bit overflow of address");
|
2021-05-06 04:45:54 +02:00
|
|
|
return ResultInvalidMemoryRegion;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
KProcess* const current_process{system.Kernel().CurrentProcess()};
|
2020-12-28 16:15:37 +01:00
|
|
|
auto& page_table{current_process->PageTable()};
|
|
|
|
|
|
|
|
if (current_process->GetSystemResourceSize() == 0) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "System Resource Size is zero");
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidState;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!page_table.IsInsideAddressSpace(addr, size)) {
|
|
|
|
LOG_ERROR(Kernel_SVC,
|
|
|
|
"Address is not within the address space, addr=0x{:016X}, size=0x{:016X}", addr,
|
|
|
|
size);
|
2021-05-06 04:45:54 +02:00
|
|
|
return ResultInvalidMemoryRegion;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (page_table.IsOutsideAliasRegion(addr, size)) {
|
|
|
|
LOG_ERROR(Kernel_SVC,
|
|
|
|
"Address is not within the alias region, addr=0x{:016X}, size=0x{:016X}", addr,
|
|
|
|
size);
|
2021-05-06 04:45:54 +02:00
|
|
|
return ResultInvalidMemoryRegion;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return page_table.UnmapPhysicalMemory(addr, size);
|
|
|
|
}
|
|
|
|
|
|
|
|
static ResultCode UnmapPhysicalMemory32(Core::System& system, u32 addr, u32 size) {
|
|
|
|
return UnmapPhysicalMemory(system, addr, size);
|
|
|
|
}
|
|
|
|
|
2021-01-22 01:15:25 +01:00
|
|
|
/// Sets the thread activity
|
|
|
|
static ResultCode SetThreadActivity(Core::System& system, Handle thread_handle,
|
2021-02-08 06:07:34 +01:00
|
|
|
ThreadActivity thread_activity) {
|
2021-01-22 01:15:25 +01:00
|
|
|
LOG_DEBUG(Kernel_SVC, "called, handle=0x{:08X}, activity=0x{:08X}", thread_handle,
|
|
|
|
thread_activity);
|
2021-01-21 02:42:22 +01:00
|
|
|
|
2021-01-22 01:15:25 +01:00
|
|
|
// Validate the activity.
|
2021-02-08 06:07:34 +01:00
|
|
|
constexpr auto IsValidThreadActivity = [](ThreadActivity activity) {
|
|
|
|
return activity == ThreadActivity::Runnable || activity == ThreadActivity::Paused;
|
|
|
|
};
|
2021-05-06 04:45:54 +02:00
|
|
|
R_UNLESS(IsValidThreadActivity(thread_activity), ResultInvalidEnumValue);
|
2021-01-21 02:42:22 +01:00
|
|
|
|
2021-01-22 01:15:25 +01:00
|
|
|
// Get the thread from its handle.
|
2021-05-06 04:45:54 +02:00
|
|
|
KScopedAutoObject thread =
|
|
|
|
system.Kernel().CurrentProcess()->GetHandleTable().GetObject<KThread>(thread_handle);
|
|
|
|
R_UNLESS(thread.IsNotNull(), ResultInvalidHandle);
|
2021-01-22 01:15:25 +01:00
|
|
|
|
|
|
|
// Check that the activity is being set on a non-current thread for the current process.
|
2021-05-06 04:45:54 +02:00
|
|
|
R_UNLESS(thread->GetOwnerProcess() == system.Kernel().CurrentProcess(), ResultInvalidHandle);
|
|
|
|
R_UNLESS(thread.GetPointerUnsafe() != GetCurrentThreadPointer(system.Kernel()), ResultBusy);
|
2021-01-22 01:15:25 +01:00
|
|
|
|
|
|
|
// Set the activity.
|
2021-05-06 04:45:54 +02:00
|
|
|
R_TRY(thread->SetActivity(thread_activity));
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2021-01-22 01:15:25 +01:00
|
|
|
static ResultCode SetThreadActivity32(Core::System& system, Handle thread_handle,
|
|
|
|
Svc::ThreadActivity thread_activity) {
|
|
|
|
return SetThreadActivity(system, thread_handle, thread_activity);
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Gets the thread context
|
2021-01-22 01:15:25 +01:00
|
|
|
static ResultCode GetThreadContext(Core::System& system, VAddr out_context, Handle thread_handle) {
|
|
|
|
LOG_DEBUG(Kernel_SVC, "called, out_context=0x{:08X}, thread_handle=0x{:X}", out_context,
|
|
|
|
thread_handle);
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
auto& kernel = system.Kernel();
|
|
|
|
|
2021-01-22 01:15:25 +01:00
|
|
|
// Get the thread from its handle.
|
2021-05-06 04:45:54 +02:00
|
|
|
KScopedAutoObject thread =
|
|
|
|
kernel.CurrentProcess()->GetHandleTable().GetObject<KThread>(thread_handle);
|
|
|
|
R_UNLESS(thread.IsNotNull(), ResultInvalidHandle);
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-01-22 01:15:25 +01:00
|
|
|
// Require the handle be to a non-current thread in the current process.
|
2021-05-06 04:45:54 +02:00
|
|
|
const auto* current_process = kernel.CurrentProcess();
|
|
|
|
R_UNLESS(current_process == thread->GetOwnerProcess(), ResultInvalidId);
|
2021-05-02 08:03:43 +02:00
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// Verify that the thread isn't terminated.
|
|
|
|
R_UNLESS(thread->GetState() != ThreadState::Terminated, ResultTerminationRequested);
|
|
|
|
|
|
|
|
/// Check that the thread is not the current one.
|
|
|
|
/// NOTE: Nintendo does not check this, and thus the following loop will deadlock.
|
|
|
|
R_UNLESS(thread.GetPointerUnsafe() != GetCurrentThreadPointer(kernel), ResultInvalidId);
|
|
|
|
|
|
|
|
// Try to get the thread context until the thread isn't current on any core.
|
|
|
|
while (true) {
|
|
|
|
KScopedSchedulerLock sl{kernel};
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// TODO(bunnei): Enforce that thread is suspended for debug here.
|
|
|
|
|
|
|
|
// If the thread's raw state isn't runnable, check if it's current on some core.
|
|
|
|
if (thread->GetRawState() != ThreadState::Runnable) {
|
|
|
|
bool current = false;
|
|
|
|
for (auto i = 0; i < static_cast<s32>(Core::Hardware::NUM_CPU_CORES); ++i) {
|
|
|
|
if (thread.GetPointerUnsafe() == kernel.Scheduler(i).GetCurrentThread()) {
|
|
|
|
current = true;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
// If the thread is current, retry until it isn't.
|
|
|
|
if (current) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get the thread context.
|
|
|
|
std::vector<u8> context;
|
|
|
|
R_TRY(thread->GetThreadContext3(context));
|
|
|
|
|
|
|
|
// Copy the thread context to user space.
|
|
|
|
system.Memory().WriteBlock(out_context, context.data(), context.size());
|
|
|
|
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2021-05-06 04:45:54 +02:00
|
|
|
}
|
2021-05-06 03:20:08 +02:00
|
|
|
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2021-01-22 01:15:25 +01:00
|
|
|
static ResultCode GetThreadContext32(Core::System& system, u32 out_context, Handle thread_handle) {
|
|
|
|
return GetThreadContext(system, out_context, thread_handle);
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Gets the priority for the specified thread
|
2021-01-22 01:15:25 +01:00
|
|
|
static ResultCode GetThreadPriority(Core::System& system, u32* out_priority, Handle handle) {
|
2020-12-28 16:15:37 +01:00
|
|
|
LOG_TRACE(Kernel_SVC, "called");
|
|
|
|
|
2021-01-22 01:15:25 +01:00
|
|
|
// Get the thread from its handle.
|
2021-05-06 04:45:54 +02:00
|
|
|
KScopedAutoObject thread =
|
|
|
|
system.Kernel().CurrentProcess()->GetHandleTable().GetObject<KThread>(handle);
|
|
|
|
R_UNLESS(thread.IsNotNull(), ResultInvalidHandle);
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-01-22 01:15:25 +01:00
|
|
|
// Get the thread's priority.
|
|
|
|
*out_priority = thread->GetPriority();
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2021-01-22 01:15:25 +01:00
|
|
|
static ResultCode GetThreadPriority32(Core::System& system, u32* out_priority, Handle handle) {
|
|
|
|
return GetThreadPriority(system, out_priority, handle);
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Sets the priority for the specified thread
|
2021-05-06 04:45:54 +02:00
|
|
|
static ResultCode SetThreadPriority(Core::System& system, Handle thread_handle, u32 priority) {
|
|
|
|
// Get the current process.
|
|
|
|
KProcess& process = *system.Kernel().CurrentProcess();
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-01-22 01:15:25 +01:00
|
|
|
// Validate the priority.
|
2021-05-06 04:45:54 +02:00
|
|
|
R_UNLESS(HighestThreadPriority <= priority && priority <= LowestThreadPriority,
|
|
|
|
ResultInvalidPriority);
|
|
|
|
R_UNLESS(process.CheckThreadPriority(priority), ResultInvalidPriority);
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-01-22 01:15:25 +01:00
|
|
|
// Get the thread from its handle.
|
2021-05-06 04:45:54 +02:00
|
|
|
KScopedAutoObject thread = process.GetHandleTable().GetObject<KThread>(thread_handle);
|
|
|
|
R_UNLESS(thread.IsNotNull(), ResultInvalidHandle);
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-01-22 01:15:25 +01:00
|
|
|
// Set the thread priority.
|
2020-12-31 11:03:11 +01:00
|
|
|
thread->SetBasePriority(priority);
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
static ResultCode SetThreadPriority32(Core::System& system, Handle thread_handle, u32 priority) {
|
|
|
|
return SetThreadPriority(system, thread_handle, priority);
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Get which CPU core is executing the current thread
|
|
|
|
static u32 GetCurrentProcessorNumber(Core::System& system) {
|
|
|
|
LOG_TRACE(Kernel_SVC, "called");
|
|
|
|
return static_cast<u32>(system.CurrentPhysicalCore().CoreIndex());
|
|
|
|
}
|
|
|
|
|
|
|
|
static u32 GetCurrentProcessorNumber32(Core::System& system) {
|
|
|
|
return GetCurrentProcessorNumber(system);
|
|
|
|
}
|
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
constexpr bool IsValidSharedMemoryPermission(Svc::MemoryPermission perm) {
|
|
|
|
switch (perm) {
|
|
|
|
case Svc::MemoryPermission::Read:
|
|
|
|
case Svc::MemoryPermission::ReadWrite:
|
|
|
|
return true;
|
|
|
|
default:
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
constexpr bool IsValidRemoteSharedMemoryPermission(Svc::MemoryPermission perm) {
|
|
|
|
return IsValidSharedMemoryPermission(perm) || perm == Svc::MemoryPermission::DontCare;
|
|
|
|
}
|
|
|
|
|
|
|
|
static ResultCode MapSharedMemory(Core::System& system, Handle shmem_handle, VAddr address,
|
|
|
|
u64 size, Svc::MemoryPermission map_perm) {
|
2020-12-28 16:15:37 +01:00
|
|
|
LOG_TRACE(Kernel_SVC,
|
|
|
|
"called, shared_memory_handle=0x{:X}, addr=0x{:X}, size=0x{:X}, permissions=0x{:08X}",
|
2021-05-06 04:45:54 +02:00
|
|
|
shmem_handle, address, size, map_perm);
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// Validate the address/size.
|
|
|
|
R_UNLESS(Common::IsAligned(address, PageSize), ResultInvalidAddress);
|
|
|
|
R_UNLESS(Common::IsAligned(size, PageSize), ResultInvalidSize);
|
|
|
|
R_UNLESS(size > 0, ResultInvalidSize);
|
|
|
|
R_UNLESS((address < address + size), ResultInvalidCurrentMemory);
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// Validate the permission.
|
|
|
|
R_UNLESS(IsValidSharedMemoryPermission(map_perm), ResultInvalidNewMemoryPermission);
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// Get the current process.
|
|
|
|
auto& process = *system.Kernel().CurrentProcess();
|
|
|
|
auto& page_table = process.PageTable();
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// Get the shared memory.
|
|
|
|
KScopedAutoObject shmem = process.GetHandleTable().GetObject<KSharedMemory>(shmem_handle);
|
|
|
|
R_UNLESS(shmem.IsNotNull(), ResultInvalidHandle);
|
2021-05-02 08:03:43 +02:00
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// Verify that the mapping is in range.
|
|
|
|
R_UNLESS(page_table.CanContain(address, size, KMemoryState::Shared), ResultInvalidMemoryRegion);
|
2021-05-02 08:03:43 +02:00
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// Add the shared memory to the process.
|
|
|
|
R_TRY(process.AddSharedMemory(shmem.GetPointerUnsafe(), address, size));
|
2021-05-02 08:03:43 +02:00
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// Ensure that we clean up the shared memory if we fail to map it.
|
|
|
|
auto guard =
|
|
|
|
SCOPE_GUARD({ process.RemoveSharedMemory(shmem.GetPointerUnsafe(), address, size); });
|
2021-05-02 08:03:43 +02:00
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// Map the shared memory.
|
|
|
|
R_TRY(shmem->Map(process, address, size, map_perm));
|
2021-05-02 08:03:43 +02:00
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// We succeeded.
|
|
|
|
guard.Cancel();
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2021-05-06 04:45:54 +02:00
|
|
|
}
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
static ResultCode MapSharedMemory32(Core::System& system, Handle shmem_handle, u32 address,
|
|
|
|
u32 size, Svc::MemoryPermission map_perm) {
|
|
|
|
return MapSharedMemory(system, shmem_handle, address, size, map_perm);
|
|
|
|
}
|
|
|
|
|
|
|
|
static ResultCode UnmapSharedMemory(Core::System& system, Handle shmem_handle, VAddr address,
|
|
|
|
u64 size) {
|
|
|
|
// Validate the address/size.
|
|
|
|
R_UNLESS(Common::IsAligned(address, PageSize), ResultInvalidAddress);
|
|
|
|
R_UNLESS(Common::IsAligned(size, PageSize), ResultInvalidSize);
|
|
|
|
R_UNLESS(size > 0, ResultInvalidSize);
|
|
|
|
R_UNLESS((address < address + size), ResultInvalidCurrentMemory);
|
|
|
|
|
|
|
|
// Get the current process.
|
|
|
|
auto& process = *system.Kernel().CurrentProcess();
|
|
|
|
auto& page_table = process.PageTable();
|
|
|
|
|
|
|
|
// Get the shared memory.
|
|
|
|
KScopedAutoObject shmem = process.GetHandleTable().GetObject<KSharedMemory>(shmem_handle);
|
|
|
|
R_UNLESS(shmem.IsNotNull(), ResultInvalidHandle);
|
2021-05-02 08:03:43 +02:00
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// Verify that the mapping is in range.
|
|
|
|
R_UNLESS(page_table.CanContain(address, size, KMemoryState::Shared), ResultInvalidMemoryRegion);
|
|
|
|
|
|
|
|
// Unmap the shared memory.
|
|
|
|
R_TRY(shmem->Unmap(process, address, size));
|
|
|
|
|
|
|
|
// Remove the shared memory from the process.
|
|
|
|
process.RemoveSharedMemory(shmem.GetPointerUnsafe(), address, size);
|
|
|
|
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
static ResultCode UnmapSharedMemory32(Core::System& system, Handle shmem_handle, u32 address,
|
|
|
|
u32 size) {
|
|
|
|
return UnmapSharedMemory(system, shmem_handle, address, size);
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static ResultCode QueryProcessMemory(Core::System& system, VAddr memory_info_address,
|
|
|
|
VAddr page_info_address, Handle process_handle,
|
|
|
|
VAddr address) {
|
|
|
|
std::lock_guard lock{HLE::g_hle_lock};
|
|
|
|
LOG_TRACE(Kernel_SVC, "called process=0x{:08X} address={:X}", process_handle, address);
|
|
|
|
const auto& handle_table = system.Kernel().CurrentProcess()->GetHandleTable();
|
2021-05-06 04:45:54 +02:00
|
|
|
KScopedAutoObject process = handle_table.GetObject<KProcess>(process_handle);
|
|
|
|
if (process.IsNull()) {
|
2020-12-28 16:15:37 +01:00
|
|
|
LOG_ERROR(Kernel_SVC, "Process handle does not exist, process_handle=0x{:08X}",
|
|
|
|
process_handle);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidHandle;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
auto& memory{system.Memory()};
|
|
|
|
const auto memory_info{process->PageTable().QueryInfo(address).GetSvcMemoryInfo()};
|
|
|
|
|
|
|
|
memory.Write64(memory_info_address + 0x00, memory_info.addr);
|
|
|
|
memory.Write64(memory_info_address + 0x08, memory_info.size);
|
|
|
|
memory.Write32(memory_info_address + 0x10, static_cast<u32>(memory_info.state) & 0xff);
|
|
|
|
memory.Write32(memory_info_address + 0x14, static_cast<u32>(memory_info.attr));
|
|
|
|
memory.Write32(memory_info_address + 0x18, static_cast<u32>(memory_info.perm));
|
|
|
|
memory.Write32(memory_info_address + 0x1c, memory_info.ipc_refcount);
|
|
|
|
memory.Write32(memory_info_address + 0x20, memory_info.device_refcount);
|
|
|
|
memory.Write32(memory_info_address + 0x24, 0);
|
|
|
|
|
|
|
|
// Page info appears to be currently unused by the kernel and is always set to zero.
|
|
|
|
memory.Write32(page_info_address, 0);
|
|
|
|
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static ResultCode QueryMemory(Core::System& system, VAddr memory_info_address,
|
|
|
|
VAddr page_info_address, VAddr query_address) {
|
|
|
|
LOG_TRACE(Kernel_SVC,
|
|
|
|
"called, memory_info_address=0x{:016X}, page_info_address=0x{:016X}, "
|
|
|
|
"query_address=0x{:016X}",
|
|
|
|
memory_info_address, page_info_address, query_address);
|
|
|
|
|
|
|
|
return QueryProcessMemory(system, memory_info_address, page_info_address, CurrentProcess,
|
|
|
|
query_address);
|
|
|
|
}
|
|
|
|
|
|
|
|
static ResultCode QueryMemory32(Core::System& system, u32 memory_info_address,
|
|
|
|
u32 page_info_address, u32 query_address) {
|
|
|
|
return QueryMemory(system, memory_info_address, page_info_address, query_address);
|
|
|
|
}
|
|
|
|
|
|
|
|
static ResultCode MapProcessCodeMemory(Core::System& system, Handle process_handle, u64 dst_address,
|
|
|
|
u64 src_address, u64 size) {
|
|
|
|
LOG_DEBUG(Kernel_SVC,
|
|
|
|
"called. process_handle=0x{:08X}, dst_address=0x{:016X}, "
|
|
|
|
"src_address=0x{:016X}, size=0x{:016X}",
|
|
|
|
process_handle, dst_address, src_address, size);
|
|
|
|
|
|
|
|
if (!Common::Is4KBAligned(src_address)) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "src_address is not page-aligned (src_address=0x{:016X}).",
|
|
|
|
src_address);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidAddress;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!Common::Is4KBAligned(dst_address)) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "dst_address is not page-aligned (dst_address=0x{:016X}).",
|
|
|
|
dst_address);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidAddress;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (size == 0 || !Common::Is4KBAligned(size)) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Size is zero or not page-aligned (size=0x{:016X})", size);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidSize;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!IsValidAddressRange(dst_address, size)) {
|
|
|
|
LOG_ERROR(Kernel_SVC,
|
|
|
|
"Destination address range overflows the address space (dst_address=0x{:016X}, "
|
|
|
|
"size=0x{:016X}).",
|
|
|
|
dst_address, size);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidCurrentMemory;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!IsValidAddressRange(src_address, size)) {
|
|
|
|
LOG_ERROR(Kernel_SVC,
|
|
|
|
"Source address range overflows the address space (src_address=0x{:016X}, "
|
|
|
|
"size=0x{:016X}).",
|
|
|
|
src_address, size);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidCurrentMemory;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
const auto& handle_table = system.Kernel().CurrentProcess()->GetHandleTable();
|
2021-05-06 04:45:54 +02:00
|
|
|
KScopedAutoObject process = handle_table.GetObject<KProcess>(process_handle);
|
|
|
|
if (process.IsNull()) {
|
2020-12-28 16:15:37 +01:00
|
|
|
LOG_ERROR(Kernel_SVC, "Invalid process handle specified (handle=0x{:08X}).",
|
|
|
|
process_handle);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidHandle;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
auto& page_table = process->PageTable();
|
|
|
|
if (!page_table.IsInsideAddressSpace(src_address, size)) {
|
|
|
|
LOG_ERROR(Kernel_SVC,
|
|
|
|
"Source address range is not within the address space (src_address=0x{:016X}, "
|
|
|
|
"size=0x{:016X}).",
|
|
|
|
src_address, size);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidCurrentMemory;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!page_table.IsInsideASLRRegion(dst_address, size)) {
|
|
|
|
LOG_ERROR(Kernel_SVC,
|
|
|
|
"Destination address range is not within the ASLR region (dst_address=0x{:016X}, "
|
|
|
|
"size=0x{:016X}).",
|
|
|
|
dst_address, size);
|
2021-05-06 04:45:54 +02:00
|
|
|
return ResultInvalidMemoryRegion;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return page_table.MapProcessCodeMemory(dst_address, src_address, size);
|
|
|
|
}
|
|
|
|
|
|
|
|
static ResultCode UnmapProcessCodeMemory(Core::System& system, Handle process_handle,
|
|
|
|
u64 dst_address, u64 src_address, u64 size) {
|
|
|
|
LOG_DEBUG(Kernel_SVC,
|
|
|
|
"called. process_handle=0x{:08X}, dst_address=0x{:016X}, src_address=0x{:016X}, "
|
|
|
|
"size=0x{:016X}",
|
|
|
|
process_handle, dst_address, src_address, size);
|
|
|
|
|
|
|
|
if (!Common::Is4KBAligned(dst_address)) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "dst_address is not page-aligned (dst_address=0x{:016X}).",
|
|
|
|
dst_address);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidAddress;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!Common::Is4KBAligned(src_address)) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "src_address is not page-aligned (src_address=0x{:016X}).",
|
|
|
|
src_address);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidAddress;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (size == 0 || Common::Is4KBAligned(size)) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Size is zero or not page-aligned (size=0x{:016X}).", size);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidSize;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!IsValidAddressRange(dst_address, size)) {
|
|
|
|
LOG_ERROR(Kernel_SVC,
|
|
|
|
"Destination address range overflows the address space (dst_address=0x{:016X}, "
|
|
|
|
"size=0x{:016X}).",
|
|
|
|
dst_address, size);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidCurrentMemory;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!IsValidAddressRange(src_address, size)) {
|
|
|
|
LOG_ERROR(Kernel_SVC,
|
|
|
|
"Source address range overflows the address space (src_address=0x{:016X}, "
|
|
|
|
"size=0x{:016X}).",
|
|
|
|
src_address, size);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidCurrentMemory;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
const auto& handle_table = system.Kernel().CurrentProcess()->GetHandleTable();
|
2021-05-06 04:45:54 +02:00
|
|
|
KScopedAutoObject process = handle_table.GetObject<KProcess>(process_handle);
|
|
|
|
if (process.IsNull()) {
|
2020-12-28 16:15:37 +01:00
|
|
|
LOG_ERROR(Kernel_SVC, "Invalid process handle specified (handle=0x{:08X}).",
|
|
|
|
process_handle);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidHandle;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
auto& page_table = process->PageTable();
|
|
|
|
if (!page_table.IsInsideAddressSpace(src_address, size)) {
|
|
|
|
LOG_ERROR(Kernel_SVC,
|
|
|
|
"Source address range is not within the address space (src_address=0x{:016X}, "
|
|
|
|
"size=0x{:016X}).",
|
|
|
|
src_address, size);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidCurrentMemory;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!page_table.IsInsideASLRRegion(dst_address, size)) {
|
|
|
|
LOG_ERROR(Kernel_SVC,
|
|
|
|
"Destination address range is not within the ASLR region (dst_address=0x{:016X}, "
|
|
|
|
"size=0x{:016X}).",
|
|
|
|
dst_address, size);
|
2021-05-06 04:45:54 +02:00
|
|
|
return ResultInvalidMemoryRegion;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return page_table.UnmapProcessCodeMemory(dst_address, src_address, size);
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Exits the current process
|
|
|
|
static void ExitProcess(Core::System& system) {
|
|
|
|
auto* current_process = system.Kernel().CurrentProcess();
|
|
|
|
UNIMPLEMENTED();
|
|
|
|
|
|
|
|
LOG_INFO(Kernel_SVC, "Process {} exiting", current_process->GetProcessID());
|
|
|
|
ASSERT_MSG(current_process->GetStatus() == ProcessStatus::Running,
|
|
|
|
"Process has already exited");
|
|
|
|
}
|
|
|
|
|
|
|
|
static void ExitProcess32(Core::System& system) {
|
|
|
|
ExitProcess(system);
|
|
|
|
}
|
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
static constexpr bool IsValidVirtualCoreId(int32_t core_id) {
|
2021-01-22 01:15:25 +01:00
|
|
|
return (0 <= core_id && core_id < static_cast<int32_t>(Core::Hardware::NUM_CPU_CORES));
|
|
|
|
}
|
|
|
|
|
2020-12-28 16:15:37 +01:00
|
|
|
/// Creates a new thread
|
|
|
|
static ResultCode CreateThread(Core::System& system, Handle* out_handle, VAddr entry_point, u64 arg,
|
2021-01-22 01:15:25 +01:00
|
|
|
VAddr stack_bottom, u32 priority, s32 core_id) {
|
2020-12-28 16:15:37 +01:00
|
|
|
LOG_DEBUG(Kernel_SVC,
|
2021-01-22 01:15:25 +01:00
|
|
|
"called entry_point=0x{:08X}, arg=0x{:08X}, stack_bottom=0x{:08X}, "
|
|
|
|
"priority=0x{:08X}, core_id=0x{:08X}",
|
|
|
|
entry_point, arg, stack_bottom, priority, core_id);
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-01-22 01:15:25 +01:00
|
|
|
// Adjust core id, if it's the default magic.
|
|
|
|
auto& kernel = system.Kernel();
|
|
|
|
auto& process = *kernel.CurrentProcess();
|
2021-02-08 06:07:34 +01:00
|
|
|
if (core_id == IdealCoreUseProcessValue) {
|
2021-01-22 01:15:25 +01:00
|
|
|
core_id = process.GetIdealCoreId();
|
2021-01-21 07:23:23 +01:00
|
|
|
}
|
|
|
|
|
2021-01-22 01:15:25 +01:00
|
|
|
// Validate arguments.
|
2021-05-06 04:45:54 +02:00
|
|
|
if (!IsValidVirtualCoreId(core_id)) {
|
2021-02-08 06:07:34 +01:00
|
|
|
LOG_ERROR(Kernel_SVC, "Invalid Core ID specified (id={})", core_id);
|
|
|
|
return ResultInvalidCoreId;
|
|
|
|
}
|
|
|
|
if (((1ULL << core_id) & process.GetCoreMask()) == 0) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Core ID doesn't fall within allowable cores (id={})", core_id);
|
|
|
|
return ResultInvalidCoreId;
|
|
|
|
}
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-02-08 06:07:34 +01:00
|
|
|
if (HighestThreadPriority > priority || priority > LowestThreadPriority) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Invalid priority specified (priority={})", priority);
|
|
|
|
return ResultInvalidPriority;
|
|
|
|
}
|
|
|
|
if (!process.CheckThreadPriority(priority)) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Invalid allowable thread priority (priority={})", priority);
|
|
|
|
return ResultInvalidPriority;
|
|
|
|
}
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// Reserve a new thread from the process resource limit (waiting up to 100ms).
|
2021-02-06 23:05:49 +01:00
|
|
|
KScopedResourceReservation thread_reservation(
|
|
|
|
kernel.CurrentProcess(), LimitableResource::Threads, 1,
|
|
|
|
system.CoreTiming().GetGlobalTimeNs().count() + 100000000);
|
|
|
|
if (!thread_reservation.Succeeded()) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Could not reserve a new thread");
|
2021-05-06 04:45:54 +02:00
|
|
|
return ResultLimitReached;
|
2021-01-25 08:57:26 +01:00
|
|
|
}
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// Create the thread.
|
|
|
|
KThread* thread = KThread::Create(kernel);
|
|
|
|
if (!thread) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Unable to create new threads. Thread creation limit reached.");
|
|
|
|
return ResultOutOfResource;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
2021-05-06 04:45:54 +02:00
|
|
|
SCOPE_EXIT({ thread->Close(); });
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// Initialize the thread.
|
|
|
|
{
|
|
|
|
KScopedLightLock lk{process.GetStateLock()};
|
|
|
|
R_TRY(KThread::InitializeUserThread(system, thread, entry_point, arg, stack_bottom,
|
|
|
|
priority, core_id, &process));
|
2021-05-06 03:20:08 +02:00
|
|
|
}
|
2021-05-02 08:03:43 +02:00
|
|
|
|
2021-05-06 03:20:08 +02:00
|
|
|
// Set the thread name for debugging purposes.
|
2021-05-06 04:45:54 +02:00
|
|
|
thread->SetName(fmt::format("thread[entry_point={:X}, handle={:X}]", entry_point, *out_handle));
|
|
|
|
|
|
|
|
// Commit the thread reservation.
|
2021-02-06 23:05:49 +01:00
|
|
|
thread_reservation.Commit();
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// Register the new thread.
|
|
|
|
KThread::Register(kernel, thread);
|
|
|
|
|
|
|
|
// Add the thread to the handle table.
|
|
|
|
R_TRY(process.GetHandleTable().Add(out_handle, thread));
|
|
|
|
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static ResultCode CreateThread32(Core::System& system, Handle* out_handle, u32 priority,
|
|
|
|
u32 entry_point, u32 arg, u32 stack_top, s32 processor_id) {
|
|
|
|
return CreateThread(system, out_handle, entry_point, arg, stack_top, priority, processor_id);
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Starts the thread for the provided handle
|
|
|
|
static ResultCode StartThread(Core::System& system, Handle thread_handle) {
|
|
|
|
LOG_DEBUG(Kernel_SVC, "called thread=0x{:08X}", thread_handle);
|
|
|
|
|
2021-01-22 01:15:25 +01:00
|
|
|
// Get the thread from its handle.
|
2021-05-06 04:45:54 +02:00
|
|
|
KScopedAutoObject thread =
|
|
|
|
system.Kernel().CurrentProcess()->GetHandleTable().GetObject<KThread>(thread_handle);
|
|
|
|
R_UNLESS(thread.IsNotNull(), ResultInvalidHandle);
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-01-22 01:15:25 +01:00
|
|
|
// Try to start the thread.
|
2021-05-06 04:45:54 +02:00
|
|
|
R_TRY(thread->Run());
|
|
|
|
|
|
|
|
// If we succeeded, persist a reference to the thread.
|
|
|
|
thread->Open();
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static ResultCode StartThread32(Core::System& system, Handle thread_handle) {
|
|
|
|
return StartThread(system, thread_handle);
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Called when a thread exits
|
|
|
|
static void ExitThread(Core::System& system) {
|
|
|
|
LOG_DEBUG(Kernel_SVC, "called, pc=0x{:08X}", system.CurrentArmInterface().GetPC());
|
|
|
|
|
|
|
|
auto* const current_thread = system.Kernel().CurrentScheduler()->GetCurrentThread();
|
2021-05-06 04:45:54 +02:00
|
|
|
system.GlobalSchedulerContext().RemoveThread(current_thread);
|
2021-01-22 01:15:25 +01:00
|
|
|
current_thread->Exit();
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static void ExitThread32(Core::System& system) {
|
|
|
|
ExitThread(system);
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Sleep the current thread
|
|
|
|
static void SleepThread(Core::System& system, s64 nanoseconds) {
|
2021-01-22 01:15:25 +01:00
|
|
|
auto& kernel = system.Kernel();
|
|
|
|
const auto yield_type = static_cast<Svc::YieldType>(nanoseconds);
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-01-22 01:15:25 +01:00
|
|
|
LOG_TRACE(Kernel_SVC, "called nanoseconds={}", nanoseconds);
|
2021-01-21 07:23:23 +01:00
|
|
|
|
2021-01-22 01:15:25 +01:00
|
|
|
// When the input tick is positive, sleep.
|
|
|
|
if (nanoseconds > 0) {
|
|
|
|
// Convert the timeout from nanoseconds to ticks.
|
|
|
|
// NOTE: Nintendo does not use this conversion logic in WaitSynchronization...
|
|
|
|
|
|
|
|
// Sleep.
|
|
|
|
// NOTE: Nintendo does not check the result of this sleep.
|
|
|
|
static_cast<void>(GetCurrentThread(kernel).Sleep(nanoseconds));
|
|
|
|
} else if (yield_type == Svc::YieldType::WithoutCoreMigration) {
|
|
|
|
KScheduler::YieldWithoutCoreMigration(kernel);
|
|
|
|
} else if (yield_type == Svc::YieldType::WithCoreMigration) {
|
|
|
|
KScheduler::YieldWithCoreMigration(kernel);
|
|
|
|
} else if (yield_type == Svc::YieldType::ToAnyThread) {
|
|
|
|
KScheduler::YieldToAnyThread(kernel);
|
2020-12-28 16:15:37 +01:00
|
|
|
} else {
|
2021-01-22 01:15:25 +01:00
|
|
|
// Nintendo does nothing at all if an otherwise invalid value is passed.
|
|
|
|
UNREACHABLE_MSG("Unimplemented sleep yield type '{:016X}'!", nanoseconds);
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void SleepThread32(Core::System& system, u32 nanoseconds_low, u32 nanoseconds_high) {
|
|
|
|
const auto nanoseconds = static_cast<s64>(u64{nanoseconds_low} | (u64{nanoseconds_high} << 32));
|
|
|
|
SleepThread(system, nanoseconds);
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Wait process wide key atomic
|
2020-12-31 11:03:11 +01:00
|
|
|
static ResultCode WaitProcessWideKeyAtomic(Core::System& system, VAddr address, VAddr cv_key,
|
|
|
|
u32 tag, s64 timeout_ns) {
|
|
|
|
LOG_TRACE(Kernel_SVC, "called address={:X}, cv_key={:X}, tag=0x{:08X}, timeout_ns={}", address,
|
|
|
|
cv_key, tag, timeout_ns);
|
|
|
|
|
|
|
|
// Validate input.
|
2021-02-19 02:26:25 +01:00
|
|
|
if (IsKernelAddress(address)) {
|
2021-02-08 06:07:34 +01:00
|
|
|
LOG_ERROR(Kernel_SVC, "Attempted to wait on kernel address (address={:08X})", address);
|
|
|
|
return ResultInvalidCurrentMemory;
|
|
|
|
}
|
|
|
|
if (!Common::IsAligned(address, sizeof(s32))) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Address must be 4 byte aligned (address={:08X})", address);
|
|
|
|
return ResultInvalidAddress;
|
|
|
|
}
|
2020-12-31 11:03:11 +01:00
|
|
|
|
|
|
|
// Convert timeout from nanoseconds to ticks.
|
|
|
|
s64 timeout{};
|
|
|
|
if (timeout_ns > 0) {
|
|
|
|
const s64 offset_tick(timeout_ns);
|
|
|
|
if (offset_tick > 0) {
|
|
|
|
timeout = offset_tick + 2;
|
|
|
|
if (timeout <= 0) {
|
|
|
|
timeout = std::numeric_limits<s64>::max();
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
timeout = std::numeric_limits<s64>::max();
|
2020-12-31 11:02:49 +01:00
|
|
|
}
|
2020-12-31 11:03:11 +01:00
|
|
|
} else {
|
|
|
|
timeout = timeout_ns;
|
2020-12-31 11:02:49 +01:00
|
|
|
}
|
|
|
|
|
2020-12-31 11:03:11 +01:00
|
|
|
// Wait on the condition variable.
|
|
|
|
return system.Kernel().CurrentProcess()->WaitConditionVariable(
|
|
|
|
address, Common::AlignDown(cv_key, sizeof(u32)), tag, timeout);
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2020-12-31 11:03:11 +01:00
|
|
|
static ResultCode WaitProcessWideKeyAtomic32(Core::System& system, u32 address, u32 cv_key, u32 tag,
|
|
|
|
u32 timeout_ns_low, u32 timeout_ns_high) {
|
|
|
|
const auto timeout_ns = static_cast<s64>(timeout_ns_low | (u64{timeout_ns_high} << 32));
|
|
|
|
return WaitProcessWideKeyAtomic(system, address, cv_key, tag, timeout_ns);
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Signal process wide key
|
2020-12-31 11:03:11 +01:00
|
|
|
static void SignalProcessWideKey(Core::System& system, VAddr cv_key, s32 count) {
|
|
|
|
LOG_TRACE(Kernel_SVC, "called, cv_key=0x{:X}, count=0x{:08X}", cv_key, count);
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2020-12-31 11:03:11 +01:00
|
|
|
// Signal the condition variable.
|
|
|
|
return system.Kernel().CurrentProcess()->SignalConditionVariable(
|
|
|
|
Common::AlignDown(cv_key, sizeof(u32)), count);
|
|
|
|
}
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2020-12-31 11:03:11 +01:00
|
|
|
static void SignalProcessWideKey32(Core::System& system, u32 cv_key, s32 count) {
|
|
|
|
SignalProcessWideKey(system, cv_key, count);
|
|
|
|
}
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2020-12-31 11:03:11 +01:00
|
|
|
namespace {
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2020-12-31 11:03:11 +01:00
|
|
|
constexpr bool IsValidSignalType(Svc::SignalType type) {
|
|
|
|
switch (type) {
|
|
|
|
case Svc::SignalType::Signal:
|
|
|
|
case Svc::SignalType::SignalAndIncrementIfEqual:
|
|
|
|
case Svc::SignalType::SignalAndModifyByWaitingCountIfEqual:
|
|
|
|
return true;
|
|
|
|
default:
|
|
|
|
return false;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-12-31 11:03:11 +01:00
|
|
|
constexpr bool IsValidArbitrationType(Svc::ArbitrationType type) {
|
|
|
|
switch (type) {
|
|
|
|
case Svc::ArbitrationType::WaitIfLessThan:
|
|
|
|
case Svc::ArbitrationType::DecrementAndWaitIfLessThan:
|
|
|
|
case Svc::ArbitrationType::WaitIfEqual:
|
|
|
|
return true;
|
|
|
|
default:
|
|
|
|
return false;
|
|
|
|
}
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2020-12-31 11:03:11 +01:00
|
|
|
} // namespace
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2020-12-31 11:03:11 +01:00
|
|
|
// Wait for an address (via Address Arbiter)
|
|
|
|
static ResultCode WaitForAddress(Core::System& system, VAddr address, Svc::ArbitrationType arb_type,
|
|
|
|
s32 value, s64 timeout_ns) {
|
|
|
|
LOG_TRACE(Kernel_SVC, "called, address=0x{:X}, arb_type=0x{:X}, value=0x{:X}, timeout_ns={}",
|
|
|
|
address, arb_type, value, timeout_ns);
|
|
|
|
|
|
|
|
// Validate input.
|
2021-02-19 02:26:25 +01:00
|
|
|
if (IsKernelAddress(address)) {
|
2021-02-08 06:07:34 +01:00
|
|
|
LOG_ERROR(Kernel_SVC, "Attempting to wait on kernel address (address={:08X})", address);
|
|
|
|
return ResultInvalidCurrentMemory;
|
|
|
|
}
|
|
|
|
if (!Common::IsAligned(address, sizeof(s32))) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Wait address must be 4 byte aligned (address={:08X})", address);
|
|
|
|
return ResultInvalidAddress;
|
|
|
|
}
|
|
|
|
if (!IsValidArbitrationType(arb_type)) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Invalid arbitration type specified (type={})", arb_type);
|
|
|
|
return ResultInvalidEnumValue;
|
|
|
|
}
|
2020-12-31 11:03:11 +01:00
|
|
|
|
|
|
|
// Convert timeout from nanoseconds to ticks.
|
|
|
|
s64 timeout{};
|
|
|
|
if (timeout_ns > 0) {
|
|
|
|
const s64 offset_tick(timeout_ns);
|
|
|
|
if (offset_tick > 0) {
|
|
|
|
timeout = offset_tick + 2;
|
|
|
|
if (timeout <= 0) {
|
|
|
|
timeout = std::numeric_limits<s64>::max();
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
timeout = std::numeric_limits<s64>::max();
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
timeout = timeout_ns;
|
2020-12-31 11:02:49 +01:00
|
|
|
}
|
|
|
|
|
2020-12-31 11:03:11 +01:00
|
|
|
return system.Kernel().CurrentProcess()->WaitAddressArbiter(address, arb_type, value, timeout);
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2020-12-31 11:03:11 +01:00
|
|
|
static ResultCode WaitForAddress32(Core::System& system, u32 address, Svc::ArbitrationType arb_type,
|
|
|
|
s32 value, u32 timeout_ns_low, u32 timeout_ns_high) {
|
|
|
|
const auto timeout = static_cast<s64>(timeout_ns_low | (u64{timeout_ns_high} << 32));
|
|
|
|
return WaitForAddress(system, address, arb_type, value, timeout);
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// Signals to an address (via Address Arbiter)
|
2020-12-31 11:03:11 +01:00
|
|
|
static ResultCode SignalToAddress(Core::System& system, VAddr address, Svc::SignalType signal_type,
|
|
|
|
s32 value, s32 count) {
|
|
|
|
LOG_TRACE(Kernel_SVC, "called, address=0x{:X}, signal_type=0x{:X}, value=0x{:X}, count=0x{:X}",
|
|
|
|
address, signal_type, value, count);
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2020-12-31 11:03:11 +01:00
|
|
|
// Validate input.
|
2021-02-19 02:26:25 +01:00
|
|
|
if (IsKernelAddress(address)) {
|
2021-02-08 06:07:34 +01:00
|
|
|
LOG_ERROR(Kernel_SVC, "Attempting to signal to a kernel address (address={:08X})", address);
|
|
|
|
return ResultInvalidCurrentMemory;
|
|
|
|
}
|
|
|
|
if (!Common::IsAligned(address, sizeof(s32))) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Signaled address must be 4 byte aligned (address={:08X})", address);
|
|
|
|
return ResultInvalidAddress;
|
|
|
|
}
|
|
|
|
if (!IsValidSignalType(signal_type)) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Invalid signal type specified (type={})", signal_type);
|
|
|
|
return ResultInvalidEnumValue;
|
|
|
|
}
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2020-12-31 11:03:11 +01:00
|
|
|
return system.Kernel().CurrentProcess()->SignalAddressArbiter(address, signal_type, value,
|
|
|
|
count);
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2020-12-31 11:03:11 +01:00
|
|
|
static ResultCode SignalToAddress32(Core::System& system, u32 address, Svc::SignalType signal_type,
|
|
|
|
s32 value, s32 count) {
|
|
|
|
return SignalToAddress(system, address, signal_type, value, count);
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static void KernelDebug([[maybe_unused]] Core::System& system,
|
|
|
|
[[maybe_unused]] u32 kernel_debug_type, [[maybe_unused]] u64 param1,
|
|
|
|
[[maybe_unused]] u64 param2, [[maybe_unused]] u64 param3) {
|
|
|
|
// Intentionally do nothing, as this does nothing in released kernel binaries.
|
|
|
|
}
|
|
|
|
|
|
|
|
static void ChangeKernelTraceState([[maybe_unused]] Core::System& system,
|
|
|
|
[[maybe_unused]] u32 trace_state) {
|
|
|
|
// Intentionally do nothing, as this does nothing in released kernel binaries.
|
|
|
|
}
|
|
|
|
|
|
|
|
/// This returns the total CPU ticks elapsed since the CPU was powered-on
|
|
|
|
static u64 GetSystemTick(Core::System& system) {
|
|
|
|
LOG_TRACE(Kernel_SVC, "called");
|
|
|
|
|
|
|
|
auto& core_timing = system.CoreTiming();
|
|
|
|
|
|
|
|
// Returns the value of cntpct_el0 (https://switchbrew.org/wiki/SVC#svcGetSystemTick)
|
|
|
|
const u64 result{system.CoreTiming().GetClockTicks()};
|
|
|
|
|
|
|
|
if (!system.Kernel().IsMulticore()) {
|
|
|
|
core_timing.AddTicks(400U);
|
|
|
|
}
|
|
|
|
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void GetSystemTick32(Core::System& system, u32* time_low, u32* time_high) {
|
|
|
|
const auto time = GetSystemTick(system);
|
|
|
|
*time_low = static_cast<u32>(time);
|
|
|
|
*time_high = static_cast<u32>(time >> 32);
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Close a handle
|
|
|
|
static ResultCode CloseHandle(Core::System& system, Handle handle) {
|
|
|
|
LOG_TRACE(Kernel_SVC, "Closing handle 0x{:08X}", handle);
|
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// Remove the handle.
|
|
|
|
R_UNLESS(system.Kernel().CurrentProcess()->GetHandleTable().Remove(handle),
|
|
|
|
ResultInvalidHandle);
|
|
|
|
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static ResultCode CloseHandle32(Core::System& system, Handle handle) {
|
|
|
|
return CloseHandle(system, handle);
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Clears the signaled state of an event or process.
|
|
|
|
static ResultCode ResetSignal(Core::System& system, Handle handle) {
|
|
|
|
LOG_DEBUG(Kernel_SVC, "called handle 0x{:08X}", handle);
|
|
|
|
|
2021-02-04 00:41:27 +01:00
|
|
|
// Get the current handle table.
|
2020-12-28 16:15:37 +01:00
|
|
|
const auto& handle_table = system.Kernel().CurrentProcess()->GetHandleTable();
|
|
|
|
|
2021-02-04 00:41:27 +01:00
|
|
|
// Try to reset as readable event.
|
|
|
|
{
|
2021-05-06 04:45:54 +02:00
|
|
|
KScopedAutoObject readable_event = handle_table.GetObject<KReadableEvent>(handle);
|
|
|
|
if (readable_event.IsNotNull()) {
|
2021-02-04 00:41:27 +01:00
|
|
|
return readable_event->Reset();
|
|
|
|
}
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2021-02-04 00:41:27 +01:00
|
|
|
// Try to reset as process.
|
|
|
|
{
|
2021-05-06 04:45:54 +02:00
|
|
|
KScopedAutoObject process = handle_table.GetObject<KProcess>(handle);
|
|
|
|
if (process.IsNotNull()) {
|
2021-02-04 00:41:27 +01:00
|
|
|
return process->Reset();
|
|
|
|
}
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2021-02-04 00:41:27 +01:00
|
|
|
LOG_ERROR(Kernel_SVC, "invalid handle (0x{:08X})", handle);
|
|
|
|
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidHandle;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static ResultCode ResetSignal32(Core::System& system, Handle handle) {
|
|
|
|
return ResetSignal(system, handle);
|
|
|
|
}
|
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
static constexpr bool IsValidTransferMemoryPermission(MemoryPermission perm) {
|
|
|
|
switch (perm) {
|
|
|
|
case MemoryPermission::None:
|
|
|
|
case MemoryPermission::Read:
|
|
|
|
case MemoryPermission::ReadWrite:
|
|
|
|
return true;
|
|
|
|
default:
|
|
|
|
return false;
|
2021-05-06 03:20:08 +02:00
|
|
|
}
|
2021-05-06 04:45:54 +02:00
|
|
|
}
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
/// Creates a TransferMemory object
|
|
|
|
static ResultCode CreateTransferMemory(Core::System& system, Handle* out, VAddr address, u64 size,
|
|
|
|
MemoryPermission map_perm) {
|
|
|
|
auto& kernel = system.Kernel();
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// Validate the size.
|
|
|
|
R_UNLESS(Common::IsAligned(address, PageSize), ResultInvalidAddress);
|
|
|
|
R_UNLESS(Common::IsAligned(size, PageSize), ResultInvalidSize);
|
|
|
|
R_UNLESS(size > 0, ResultInvalidSize);
|
|
|
|
R_UNLESS((address < address + size), ResultInvalidCurrentMemory);
|
2021-05-02 08:03:43 +02:00
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// Validate the permissions.
|
|
|
|
R_UNLESS(IsValidTransferMemoryPermission(map_perm), ResultInvalidNewMemoryPermission);
|
|
|
|
|
|
|
|
// Get the current process and handle table.
|
|
|
|
auto& process = *kernel.CurrentProcess();
|
|
|
|
auto& handle_table = process.GetHandleTable();
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-02-06 23:05:49 +01:00
|
|
|
// Reserve a new transfer memory from the process resource limit.
|
|
|
|
KScopedResourceReservation trmem_reservation(kernel.CurrentProcess(),
|
|
|
|
LimitableResource::TransferMemory);
|
2021-05-06 04:45:54 +02:00
|
|
|
R_UNLESS(trmem_reservation.Succeeded(), ResultLimitReached);
|
2021-05-02 08:03:43 +02:00
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// Create the transfer memory.
|
|
|
|
KTransferMemory* trmem = KTransferMemory::Create(kernel);
|
|
|
|
R_UNLESS(trmem != nullptr, ResultOutOfResource);
|
2021-05-02 08:03:43 +02:00
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// Ensure the only reference is in the handle table when we're done.
|
|
|
|
SCOPE_EXIT({ trmem->Close(); });
|
|
|
|
|
|
|
|
// Ensure that the region is in range.
|
|
|
|
R_UNLESS(process.PageTable().Contains(address, size), ResultInvalidCurrentMemory);
|
|
|
|
|
|
|
|
// Initialize the transfer memory.
|
|
|
|
R_TRY(trmem->Initialize(address, size, map_perm));
|
|
|
|
|
|
|
|
// Commit the reservation.
|
2021-02-06 23:05:49 +01:00
|
|
|
trmem_reservation.Commit();
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// Register the transfer memory.
|
|
|
|
KTransferMemory::Register(kernel, trmem);
|
|
|
|
|
|
|
|
// Add the transfer memory to the handle table.
|
|
|
|
R_TRY(handle_table.Add(out, trmem));
|
|
|
|
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
static ResultCode CreateTransferMemory32(Core::System& system, Handle* out, u32 address, u32 size,
|
|
|
|
MemoryPermission map_perm) {
|
|
|
|
return CreateTransferMemory(system, out, address, size, map_perm);
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2021-01-22 01:15:25 +01:00
|
|
|
static ResultCode GetThreadCoreMask(Core::System& system, Handle thread_handle, s32* out_core_id,
|
|
|
|
u64* out_affinity_mask) {
|
2020-12-28 16:15:37 +01:00
|
|
|
LOG_TRACE(Kernel_SVC, "called, handle=0x{:08X}", thread_handle);
|
|
|
|
|
2021-01-22 01:15:25 +01:00
|
|
|
// Get the thread from its handle.
|
2021-05-06 04:45:54 +02:00
|
|
|
KScopedAutoObject thread =
|
|
|
|
system.Kernel().CurrentProcess()->GetHandleTable().GetObject<KThread>(thread_handle);
|
|
|
|
R_UNLESS(thread.IsNotNull(), ResultInvalidHandle);
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-01-22 01:15:25 +01:00
|
|
|
// Get the core mask.
|
2021-05-06 04:45:54 +02:00
|
|
|
R_TRY(thread->GetCoreMask(out_core_id, out_affinity_mask));
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2021-01-22 01:15:25 +01:00
|
|
|
static ResultCode GetThreadCoreMask32(Core::System& system, Handle thread_handle, s32* out_core_id,
|
|
|
|
u32* out_affinity_mask_low, u32* out_affinity_mask_high) {
|
|
|
|
u64 out_affinity_mask{};
|
|
|
|
const auto result = GetThreadCoreMask(system, thread_handle, out_core_id, &out_affinity_mask);
|
|
|
|
*out_affinity_mask_high = static_cast<u32>(out_affinity_mask >> 32);
|
|
|
|
*out_affinity_mask_low = static_cast<u32>(out_affinity_mask);
|
2020-12-28 16:15:37 +01:00
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2021-01-22 01:15:25 +01:00
|
|
|
static ResultCode SetThreadCoreMask(Core::System& system, Handle thread_handle, s32 core_id,
|
2020-12-28 16:15:37 +01:00
|
|
|
u64 affinity_mask) {
|
2021-01-22 01:15:25 +01:00
|
|
|
// Determine the core id/affinity mask.
|
2021-05-06 04:45:54 +02:00
|
|
|
if (core_id == IdealCoreUseProcessValue) {
|
|
|
|
core_id = system.Kernel().CurrentProcess()->GetIdealCoreId();
|
2021-01-22 01:15:25 +01:00
|
|
|
affinity_mask = (1ULL << core_id);
|
2020-12-28 16:15:37 +01:00
|
|
|
} else {
|
2021-01-22 01:15:25 +01:00
|
|
|
// Validate the affinity mask.
|
2021-05-06 04:45:54 +02:00
|
|
|
const u64 process_core_mask = system.Kernel().CurrentProcess()->GetCoreMask();
|
|
|
|
R_UNLESS((affinity_mask | process_core_mask) == process_core_mask, ResultInvalidCoreId);
|
|
|
|
R_UNLESS(affinity_mask != 0, ResultInvalidCombination);
|
2021-01-22 01:15:25 +01:00
|
|
|
|
|
|
|
// Validate the core id.
|
2021-05-06 04:45:54 +02:00
|
|
|
if (IsValidVirtualCoreId(core_id)) {
|
|
|
|
R_UNLESS(((1ULL << core_id) & affinity_mask) != 0, ResultInvalidCombination);
|
2021-01-22 01:15:25 +01:00
|
|
|
} else {
|
2021-05-06 04:45:54 +02:00
|
|
|
R_UNLESS(core_id == IdealCoreNoUpdate || core_id == IdealCoreDontCare,
|
|
|
|
ResultInvalidCoreId);
|
2021-01-21 07:23:23 +01:00
|
|
|
}
|
|
|
|
}
|
2021-01-21 02:42:22 +01:00
|
|
|
|
2021-01-22 01:15:25 +01:00
|
|
|
// Get the thread from its handle.
|
2021-05-06 04:45:54 +02:00
|
|
|
KScopedAutoObject thread =
|
|
|
|
system.Kernel().CurrentProcess()->GetHandleTable().GetObject<KThread>(thread_handle);
|
|
|
|
R_UNLESS(thread.IsNotNull(), ResultInvalidHandle);
|
2021-01-21 07:23:23 +01:00
|
|
|
|
2021-01-22 01:15:25 +01:00
|
|
|
// Set the core mask.
|
2021-05-06 04:45:54 +02:00
|
|
|
R_TRY(thread->SetCoreMask(core_id, affinity_mask));
|
|
|
|
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2021-01-22 01:15:25 +01:00
|
|
|
static ResultCode SetThreadCoreMask32(Core::System& system, Handle thread_handle, s32 core_id,
|
2020-12-28 16:15:37 +01:00
|
|
|
u32 affinity_mask_low, u32 affinity_mask_high) {
|
|
|
|
const auto affinity_mask = u64{affinity_mask_low} | (u64{affinity_mask_high} << 32);
|
2021-01-22 01:15:25 +01:00
|
|
|
return SetThreadCoreMask(system, thread_handle, core_id, affinity_mask);
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2021-02-04 00:41:27 +01:00
|
|
|
static ResultCode SignalEvent(Core::System& system, Handle event_handle) {
|
|
|
|
LOG_DEBUG(Kernel_SVC, "called, event_handle=0x{:08X}", event_handle);
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-02-04 00:41:27 +01:00
|
|
|
// Get the current handle table.
|
2021-05-06 04:45:54 +02:00
|
|
|
const KHandleTable& handle_table = system.Kernel().CurrentProcess()->GetHandleTable();
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-02-04 00:41:27 +01:00
|
|
|
// Get the writable event.
|
2021-05-06 04:45:54 +02:00
|
|
|
KScopedAutoObject writable_event = handle_table.GetObject<KWritableEvent>(event_handle);
|
|
|
|
R_UNLESS(writable_event.IsNotNull(), ResultInvalidHandle);
|
2021-02-06 23:05:49 +01:00
|
|
|
|
2021-02-04 00:41:27 +01:00
|
|
|
return writable_event->Signal();
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2021-02-04 00:41:27 +01:00
|
|
|
static ResultCode SignalEvent32(Core::System& system, Handle event_handle) {
|
|
|
|
return SignalEvent(system, event_handle);
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2021-02-04 00:41:27 +01:00
|
|
|
static ResultCode ClearEvent(Core::System& system, Handle event_handle) {
|
|
|
|
LOG_TRACE(Kernel_SVC, "called, event_handle=0x{:08X}", event_handle);
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-02-04 00:41:27 +01:00
|
|
|
// Get the current handle table.
|
2020-12-28 16:15:37 +01:00
|
|
|
const auto& handle_table = system.Kernel().CurrentProcess()->GetHandleTable();
|
|
|
|
|
2021-02-04 00:41:27 +01:00
|
|
|
// Try to clear the writable event.
|
|
|
|
{
|
2021-05-06 04:45:54 +02:00
|
|
|
KScopedAutoObject writable_event = handle_table.GetObject<KWritableEvent>(event_handle);
|
|
|
|
if (writable_event.IsNotNull()) {
|
2021-02-04 00:41:27 +01:00
|
|
|
return writable_event->Clear();
|
|
|
|
}
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2021-02-04 00:41:27 +01:00
|
|
|
// Try to clear the readable event.
|
|
|
|
{
|
2021-05-06 04:45:54 +02:00
|
|
|
KScopedAutoObject readable_event = handle_table.GetObject<KReadableEvent>(event_handle);
|
|
|
|
if (readable_event.IsNotNull()) {
|
2021-02-04 00:41:27 +01:00
|
|
|
return readable_event->Clear();
|
|
|
|
}
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2021-02-04 00:41:27 +01:00
|
|
|
LOG_ERROR(Kernel_SVC, "Event handle does not exist, event_handle=0x{:08X}", event_handle);
|
|
|
|
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidHandle;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2021-02-04 00:41:27 +01:00
|
|
|
static ResultCode ClearEvent32(Core::System& system, Handle event_handle) {
|
|
|
|
return ClearEvent(system, event_handle);
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2021-02-04 00:41:27 +01:00
|
|
|
static ResultCode CreateEvent(Core::System& system, Handle* out_write, Handle* out_read) {
|
|
|
|
LOG_DEBUG(Kernel_SVC, "called");
|
|
|
|
|
|
|
|
// Get the kernel reference and handle table.
|
|
|
|
auto& kernel = system.Kernel();
|
2021-05-06 04:45:54 +02:00
|
|
|
auto& handle_table = kernel.CurrentProcess()->GetHandleTable();
|
|
|
|
|
|
|
|
// Reserve a new event from the process resource limit
|
|
|
|
KScopedResourceReservation event_reservation(kernel.CurrentProcess(),
|
|
|
|
LimitableResource::Events);
|
|
|
|
R_UNLESS(event_reservation.Succeeded(), ResultLimitReached);
|
2021-02-04 00:41:27 +01:00
|
|
|
|
|
|
|
// Create a new event.
|
2021-05-06 04:45:54 +02:00
|
|
|
KEvent* event = KEvent::Create(kernel);
|
|
|
|
R_UNLESS(event != nullptr, ResultOutOfResource);
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-02-04 00:41:27 +01:00
|
|
|
// Initialize the event.
|
2021-05-06 04:45:54 +02:00
|
|
|
event->Initialize("CreateEvent");
|
|
|
|
|
|
|
|
// Commit the thread reservation.
|
|
|
|
event_reservation.Commit();
|
|
|
|
|
|
|
|
// Ensure that we clean up the event (and its only references are handle table) on function end.
|
|
|
|
SCOPE_EXIT({
|
|
|
|
event->GetWritableEvent().Close();
|
|
|
|
event->GetReadableEvent().Close();
|
|
|
|
});
|
|
|
|
|
|
|
|
// Register the event.
|
|
|
|
KEvent::Register(kernel, event);
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-02-04 00:41:27 +01:00
|
|
|
// Add the writable event to the handle table.
|
2021-05-06 04:45:54 +02:00
|
|
|
R_TRY(handle_table.Add(out_write, std::addressof(event->GetWritableEvent())));
|
2021-02-04 00:41:27 +01:00
|
|
|
|
|
|
|
// Add the writable event to the handle table.
|
2021-05-06 04:45:54 +02:00
|
|
|
auto handle_guard = SCOPE_GUARD({ handle_table.Remove(*out_write); });
|
2021-02-04 00:41:27 +01:00
|
|
|
|
|
|
|
// Add the readable event to the handle table.
|
2021-05-06 04:45:54 +02:00
|
|
|
R_TRY(handle_table.Add(out_read, std::addressof(event->GetReadableEvent())));
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-02-04 00:41:27 +01:00
|
|
|
// We succeeded.
|
|
|
|
handle_guard.Cancel();
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2021-02-04 00:41:27 +01:00
|
|
|
static ResultCode CreateEvent32(Core::System& system, Handle* out_write, Handle* out_read) {
|
|
|
|
return CreateEvent(system, out_write, out_read);
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static ResultCode GetProcessInfo(Core::System& system, u64* out, Handle process_handle, u32 type) {
|
|
|
|
LOG_DEBUG(Kernel_SVC, "called, handle=0x{:08X}, type=0x{:X}", process_handle, type);
|
|
|
|
|
|
|
|
// This function currently only allows retrieving a process' status.
|
|
|
|
enum class InfoType {
|
|
|
|
Status,
|
|
|
|
};
|
|
|
|
|
|
|
|
const auto& handle_table = system.Kernel().CurrentProcess()->GetHandleTable();
|
2021-05-06 04:45:54 +02:00
|
|
|
KScopedAutoObject process = handle_table.GetObject<KProcess>(process_handle);
|
|
|
|
if (process.IsNull()) {
|
2020-12-28 16:15:37 +01:00
|
|
|
LOG_ERROR(Kernel_SVC, "Process handle does not exist, process_handle=0x{:08X}",
|
|
|
|
process_handle);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidHandle;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
const auto info_type = static_cast<InfoType>(type);
|
|
|
|
if (info_type != InfoType::Status) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Expected info_type to be Status but got {} instead", type);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidEnumValue;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
*out = static_cast<u64>(process->GetStatus());
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static ResultCode CreateResourceLimit(Core::System& system, Handle* out_handle) {
|
|
|
|
LOG_DEBUG(Kernel_SVC, "called");
|
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// Create a new resource limit.
|
2020-12-28 16:15:37 +01:00
|
|
|
auto& kernel = system.Kernel();
|
2021-05-06 04:45:54 +02:00
|
|
|
KResourceLimit* resource_limit = KResourceLimit::Create(kernel);
|
|
|
|
R_UNLESS(resource_limit != nullptr, ResultOutOfResource);
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// Ensure we don't leak a reference to the limit.
|
|
|
|
SCOPE_EXIT({ resource_limit->Close(); });
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// Initialize the resource limit.
|
|
|
|
resource_limit->Initialize(&system.CoreTiming());
|
|
|
|
|
|
|
|
// Register the limit.
|
|
|
|
KResourceLimit::Register(kernel, resource_limit);
|
|
|
|
|
|
|
|
// Add the limit to the handle table.
|
|
|
|
R_TRY(kernel.CurrentProcess()->GetHandleTable().Add(out_handle, resource_limit));
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
static ResultCode GetResourceLimitLimitValue(Core::System& system, u64* out_limit_value,
|
|
|
|
Handle resource_limit_handle,
|
|
|
|
LimitableResource which) {
|
|
|
|
LOG_DEBUG(Kernel_SVC, "called, resource_limit_handle={:08X}, which={}", resource_limit_handle,
|
|
|
|
which);
|
2021-05-02 08:03:43 +02:00
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// Validate the resource.
|
|
|
|
R_UNLESS(IsValidResourceType(which), ResultInvalidEnumValue);
|
|
|
|
|
|
|
|
// Get the resource limit.
|
|
|
|
auto& kernel = system.Kernel();
|
|
|
|
KScopedAutoObject resource_limit =
|
|
|
|
kernel.CurrentProcess()->GetHandleTable().GetObject<KResourceLimit>(resource_limit_handle);
|
|
|
|
R_UNLESS(resource_limit.IsNotNull(), ResultInvalidHandle);
|
|
|
|
|
|
|
|
// Get the limit value.
|
|
|
|
*out_limit_value = resource_limit->GetLimitValue(which);
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
static ResultCode GetResourceLimitCurrentValue(Core::System& system, u64* out_current_value,
|
|
|
|
Handle resource_limit_handle,
|
|
|
|
LimitableResource which) {
|
|
|
|
LOG_DEBUG(Kernel_SVC, "called, resource_limit_handle={:08X}, which={}", resource_limit_handle,
|
|
|
|
which);
|
2021-05-02 08:03:43 +02:00
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// Validate the resource.
|
|
|
|
R_UNLESS(IsValidResourceType(which), ResultInvalidEnumValue);
|
|
|
|
|
|
|
|
// Get the resource limit.
|
|
|
|
auto& kernel = system.Kernel();
|
|
|
|
KScopedAutoObject resource_limit =
|
|
|
|
kernel.CurrentProcess()->GetHandleTable().GetObject<KResourceLimit>(resource_limit_handle);
|
|
|
|
R_UNLESS(resource_limit.IsNotNull(), ResultInvalidHandle);
|
|
|
|
|
|
|
|
// Get the current value.
|
|
|
|
*out_current_value = resource_limit->GetCurrentValue(which);
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
static ResultCode SetResourceLimitLimitValue(Core::System& system, Handle resource_limit_handle,
|
|
|
|
LimitableResource which, u64 limit_value) {
|
|
|
|
LOG_DEBUG(Kernel_SVC, "called, resource_limit_handle={:08X}, which={}, limit_value={}",
|
|
|
|
resource_limit_handle, which, limit_value);
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// Validate the resource.
|
|
|
|
R_UNLESS(IsValidResourceType(which), ResultInvalidEnumValue);
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// Get the resource limit.
|
|
|
|
auto& kernel = system.Kernel();
|
|
|
|
KScopedAutoObject resource_limit =
|
|
|
|
kernel.CurrentProcess()->GetHandleTable().GetObject<KResourceLimit>(resource_limit_handle);
|
|
|
|
R_UNLESS(resource_limit.IsNotNull(), ResultInvalidHandle);
|
2021-05-06 03:20:08 +02:00
|
|
|
|
2021-05-06 04:45:54 +02:00
|
|
|
// Set the limit value.
|
|
|
|
R_TRY(resource_limit->SetLimitValue(which, limit_value));
|
2020-12-28 16:15:37 +01:00
|
|
|
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static ResultCode GetProcessList(Core::System& system, u32* out_num_processes,
|
|
|
|
VAddr out_process_ids, u32 out_process_ids_size) {
|
|
|
|
LOG_DEBUG(Kernel_SVC, "called. out_process_ids=0x{:016X}, out_process_ids_size={}",
|
|
|
|
out_process_ids, out_process_ids_size);
|
|
|
|
|
|
|
|
// If the supplied size is negative or greater than INT32_MAX / sizeof(u64), bail.
|
|
|
|
if ((out_process_ids_size & 0xF0000000) != 0) {
|
|
|
|
LOG_ERROR(Kernel_SVC,
|
|
|
|
"Supplied size outside [0, 0x0FFFFFFF] range. out_process_ids_size={}",
|
|
|
|
out_process_ids_size);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultOutOfRange;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
const auto& kernel = system.Kernel();
|
|
|
|
const auto total_copy_size = out_process_ids_size * sizeof(u64);
|
|
|
|
|
|
|
|
if (out_process_ids_size > 0 && !kernel.CurrentProcess()->PageTable().IsInsideAddressSpace(
|
|
|
|
out_process_ids, total_copy_size)) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Address range outside address space. begin=0x{:016X}, end=0x{:016X}",
|
|
|
|
out_process_ids, out_process_ids + total_copy_size);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidCurrentMemory;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
auto& memory = system.Memory();
|
|
|
|
const auto& process_list = kernel.GetProcessList();
|
|
|
|
const auto num_processes = process_list.size();
|
|
|
|
const auto copy_amount = std::min(std::size_t{out_process_ids_size}, num_processes);
|
|
|
|
|
|
|
|
for (std::size_t i = 0; i < copy_amount; ++i) {
|
|
|
|
memory.Write64(out_process_ids, process_list[i]->GetProcessID());
|
|
|
|
out_process_ids += sizeof(u64);
|
|
|
|
}
|
|
|
|
|
|
|
|
*out_num_processes = static_cast<u32>(num_processes);
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static ResultCode GetThreadList(Core::System& system, u32* out_num_threads, VAddr out_thread_ids,
|
|
|
|
u32 out_thread_ids_size, Handle debug_handle) {
|
|
|
|
// TODO: Handle this case when debug events are supported.
|
|
|
|
UNIMPLEMENTED_IF(debug_handle != InvalidHandle);
|
|
|
|
|
|
|
|
LOG_DEBUG(Kernel_SVC, "called. out_thread_ids=0x{:016X}, out_thread_ids_size={}",
|
|
|
|
out_thread_ids, out_thread_ids_size);
|
|
|
|
|
|
|
|
// If the size is negative or larger than INT32_MAX / sizeof(u64)
|
|
|
|
if ((out_thread_ids_size & 0xF0000000) != 0) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Supplied size outside [0, 0x0FFFFFFF] range. size={}",
|
|
|
|
out_thread_ids_size);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultOutOfRange;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
const auto* const current_process = system.Kernel().CurrentProcess();
|
|
|
|
const auto total_copy_size = out_thread_ids_size * sizeof(u64);
|
|
|
|
|
|
|
|
if (out_thread_ids_size > 0 &&
|
|
|
|
!current_process->PageTable().IsInsideAddressSpace(out_thread_ids, total_copy_size)) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Address range outside address space. begin=0x{:016X}, end=0x{:016X}",
|
|
|
|
out_thread_ids, out_thread_ids + total_copy_size);
|
2021-02-13 20:52:45 +01:00
|
|
|
return ResultInvalidCurrentMemory;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
auto& memory = system.Memory();
|
|
|
|
const auto& thread_list = current_process->GetThreadList();
|
|
|
|
const auto num_threads = thread_list.size();
|
|
|
|
const auto copy_amount = std::min(std::size_t{out_thread_ids_size}, num_threads);
|
|
|
|
|
|
|
|
auto list_iter = thread_list.cbegin();
|
|
|
|
for (std::size_t i = 0; i < copy_amount; ++i, ++list_iter) {
|
|
|
|
memory.Write64(out_thread_ids, (*list_iter)->GetThreadID());
|
|
|
|
out_thread_ids += sizeof(u64);
|
|
|
|
}
|
|
|
|
|
|
|
|
*out_num_threads = static_cast<u32>(num_threads);
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static ResultCode FlushProcessDataCache32([[maybe_unused]] Core::System& system,
|
|
|
|
[[maybe_unused]] Handle handle,
|
|
|
|
[[maybe_unused]] u32 address, [[maybe_unused]] u32 size) {
|
|
|
|
// Note(Blinkhawk): For emulation purposes of the data cache this is mostly a no-op,
|
|
|
|
// as all emulation is done in the same cache level in host architecture, thus data cache
|
|
|
|
// does not need flushing.
|
|
|
|
LOG_DEBUG(Kernel_SVC, "called");
|
2021-06-03 02:36:17 +02:00
|
|
|
return ResultSuccess;
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
namespace {
|
|
|
|
struct FunctionDef {
|
|
|
|
using Func = void(Core::System&);
|
|
|
|
|
|
|
|
u32 id;
|
|
|
|
Func* func;
|
|
|
|
const char* name;
|
|
|
|
};
|
|
|
|
} // namespace
|
|
|
|
|
|
|
|
static const FunctionDef SVC_Table_32[] = {
|
|
|
|
{0x00, nullptr, "Unknown"},
|
|
|
|
{0x01, SvcWrap32<SetHeapSize32>, "SetHeapSize32"},
|
|
|
|
{0x02, nullptr, "Unknown"},
|
|
|
|
{0x03, SvcWrap32<SetMemoryAttribute32>, "SetMemoryAttribute32"},
|
|
|
|
{0x04, SvcWrap32<MapMemory32>, "MapMemory32"},
|
|
|
|
{0x05, SvcWrap32<UnmapMemory32>, "UnmapMemory32"},
|
|
|
|
{0x06, SvcWrap32<QueryMemory32>, "QueryMemory32"},
|
|
|
|
{0x07, SvcWrap32<ExitProcess32>, "ExitProcess32"},
|
|
|
|
{0x08, SvcWrap32<CreateThread32>, "CreateThread32"},
|
|
|
|
{0x09, SvcWrap32<StartThread32>, "StartThread32"},
|
|
|
|
{0x0a, SvcWrap32<ExitThread32>, "ExitThread32"},
|
|
|
|
{0x0b, SvcWrap32<SleepThread32>, "SleepThread32"},
|
|
|
|
{0x0c, SvcWrap32<GetThreadPriority32>, "GetThreadPriority32"},
|
|
|
|
{0x0d, SvcWrap32<SetThreadPriority32>, "SetThreadPriority32"},
|
|
|
|
{0x0e, SvcWrap32<GetThreadCoreMask32>, "GetThreadCoreMask32"},
|
|
|
|
{0x0f, SvcWrap32<SetThreadCoreMask32>, "SetThreadCoreMask32"},
|
|
|
|
{0x10, SvcWrap32<GetCurrentProcessorNumber32>, "GetCurrentProcessorNumber32"},
|
|
|
|
{0x11, SvcWrap32<SignalEvent32>, "SignalEvent32"},
|
|
|
|
{0x12, SvcWrap32<ClearEvent32>, "ClearEvent32"},
|
|
|
|
{0x13, SvcWrap32<MapSharedMemory32>, "MapSharedMemory32"},
|
2021-05-06 04:45:54 +02:00
|
|
|
{0x14, SvcWrap32<UnmapSharedMemory32>, "UnmapSharedMemory32"},
|
2020-12-28 16:15:37 +01:00
|
|
|
{0x15, SvcWrap32<CreateTransferMemory32>, "CreateTransferMemory32"},
|
|
|
|
{0x16, SvcWrap32<CloseHandle32>, "CloseHandle32"},
|
|
|
|
{0x17, SvcWrap32<ResetSignal32>, "ResetSignal32"},
|
|
|
|
{0x18, SvcWrap32<WaitSynchronization32>, "WaitSynchronization32"},
|
|
|
|
{0x19, SvcWrap32<CancelSynchronization32>, "CancelSynchronization32"},
|
|
|
|
{0x1a, SvcWrap32<ArbitrateLock32>, "ArbitrateLock32"},
|
|
|
|
{0x1b, SvcWrap32<ArbitrateUnlock32>, "ArbitrateUnlock32"},
|
|
|
|
{0x1c, SvcWrap32<WaitProcessWideKeyAtomic32>, "WaitProcessWideKeyAtomic32"},
|
|
|
|
{0x1d, SvcWrap32<SignalProcessWideKey32>, "SignalProcessWideKey32"},
|
|
|
|
{0x1e, SvcWrap32<GetSystemTick32>, "GetSystemTick32"},
|
|
|
|
{0x1f, SvcWrap32<ConnectToNamedPort32>, "ConnectToNamedPort32"},
|
|
|
|
{0x20, nullptr, "Unknown"},
|
|
|
|
{0x21, SvcWrap32<SendSyncRequest32>, "SendSyncRequest32"},
|
|
|
|
{0x22, nullptr, "SendSyncRequestWithUserBuffer32"},
|
|
|
|
{0x23, nullptr, "Unknown"},
|
|
|
|
{0x24, SvcWrap32<GetProcessId32>, "GetProcessId32"},
|
|
|
|
{0x25, SvcWrap32<GetThreadId32>, "GetThreadId32"},
|
|
|
|
{0x26, SvcWrap32<Break32>, "Break32"},
|
|
|
|
{0x27, nullptr, "OutputDebugString32"},
|
|
|
|
{0x28, nullptr, "Unknown"},
|
|
|
|
{0x29, SvcWrap32<GetInfo32>, "GetInfo32"},
|
|
|
|
{0x2a, nullptr, "Unknown"},
|
|
|
|
{0x2b, nullptr, "Unknown"},
|
|
|
|
{0x2c, SvcWrap32<MapPhysicalMemory32>, "MapPhysicalMemory32"},
|
|
|
|
{0x2d, SvcWrap32<UnmapPhysicalMemory32>, "UnmapPhysicalMemory32"},
|
|
|
|
{0x2e, nullptr, "Unknown"},
|
|
|
|
{0x2f, nullptr, "Unknown"},
|
|
|
|
{0x30, nullptr, "Unknown"},
|
|
|
|
{0x31, nullptr, "Unknown"},
|
|
|
|
{0x32, SvcWrap32<SetThreadActivity32>, "SetThreadActivity32"},
|
|
|
|
{0x33, SvcWrap32<GetThreadContext32>, "GetThreadContext32"},
|
|
|
|
{0x34, SvcWrap32<WaitForAddress32>, "WaitForAddress32"},
|
|
|
|
{0x35, SvcWrap32<SignalToAddress32>, "SignalToAddress32"},
|
|
|
|
{0x36, nullptr, "Unknown"},
|
|
|
|
{0x37, nullptr, "Unknown"},
|
|
|
|
{0x38, nullptr, "Unknown"},
|
|
|
|
{0x39, nullptr, "Unknown"},
|
|
|
|
{0x3a, nullptr, "Unknown"},
|
|
|
|
{0x3b, nullptr, "Unknown"},
|
|
|
|
{0x3c, nullptr, "Unknown"},
|
|
|
|
{0x3d, nullptr, "Unknown"},
|
|
|
|
{0x3e, nullptr, "Unknown"},
|
|
|
|
{0x3f, nullptr, "Unknown"},
|
|
|
|
{0x40, nullptr, "CreateSession32"},
|
|
|
|
{0x41, nullptr, "AcceptSession32"},
|
|
|
|
{0x42, nullptr, "Unknown"},
|
|
|
|
{0x43, nullptr, "ReplyAndReceive32"},
|
|
|
|
{0x44, nullptr, "Unknown"},
|
|
|
|
{0x45, SvcWrap32<CreateEvent32>, "CreateEvent32"},
|
|
|
|
{0x46, nullptr, "Unknown"},
|
|
|
|
{0x47, nullptr, "Unknown"},
|
|
|
|
{0x48, nullptr, "Unknown"},
|
|
|
|
{0x49, nullptr, "Unknown"},
|
|
|
|
{0x4a, nullptr, "Unknown"},
|
|
|
|
{0x4b, nullptr, "Unknown"},
|
|
|
|
{0x4c, nullptr, "Unknown"},
|
|
|
|
{0x4d, nullptr, "Unknown"},
|
|
|
|
{0x4e, nullptr, "Unknown"},
|
|
|
|
{0x4f, nullptr, "Unknown"},
|
|
|
|
{0x50, nullptr, "Unknown"},
|
|
|
|
{0x51, nullptr, "Unknown"},
|
|
|
|
{0x52, nullptr, "Unknown"},
|
|
|
|
{0x53, nullptr, "Unknown"},
|
|
|
|
{0x54, nullptr, "Unknown"},
|
|
|
|
{0x55, nullptr, "Unknown"},
|
|
|
|
{0x56, nullptr, "Unknown"},
|
|
|
|
{0x57, nullptr, "Unknown"},
|
|
|
|
{0x58, nullptr, "Unknown"},
|
|
|
|
{0x59, nullptr, "Unknown"},
|
|
|
|
{0x5a, nullptr, "Unknown"},
|
|
|
|
{0x5b, nullptr, "Unknown"},
|
|
|
|
{0x5c, nullptr, "Unknown"},
|
|
|
|
{0x5d, nullptr, "Unknown"},
|
|
|
|
{0x5e, nullptr, "Unknown"},
|
|
|
|
{0x5F, SvcWrap32<FlushProcessDataCache32>, "FlushProcessDataCache32"},
|
|
|
|
{0x60, nullptr, "Unknown"},
|
|
|
|
{0x61, nullptr, "Unknown"},
|
|
|
|
{0x62, nullptr, "Unknown"},
|
|
|
|
{0x63, nullptr, "Unknown"},
|
|
|
|
{0x64, nullptr, "Unknown"},
|
|
|
|
{0x65, nullptr, "GetProcessList32"},
|
|
|
|
{0x66, nullptr, "Unknown"},
|
|
|
|
{0x67, nullptr, "Unknown"},
|
|
|
|
{0x68, nullptr, "Unknown"},
|
|
|
|
{0x69, nullptr, "Unknown"},
|
|
|
|
{0x6A, nullptr, "Unknown"},
|
|
|
|
{0x6B, nullptr, "Unknown"},
|
|
|
|
{0x6C, nullptr, "Unknown"},
|
|
|
|
{0x6D, nullptr, "Unknown"},
|
|
|
|
{0x6E, nullptr, "Unknown"},
|
|
|
|
{0x6f, nullptr, "GetSystemInfo32"},
|
|
|
|
{0x70, nullptr, "CreatePort32"},
|
|
|
|
{0x71, nullptr, "ManageNamedPort32"},
|
|
|
|
{0x72, nullptr, "ConnectToPort32"},
|
|
|
|
{0x73, nullptr, "SetProcessMemoryPermission32"},
|
|
|
|
{0x74, nullptr, "Unknown"},
|
|
|
|
{0x75, nullptr, "Unknown"},
|
|
|
|
{0x76, nullptr, "Unknown"},
|
|
|
|
{0x77, nullptr, "MapProcessCodeMemory32"},
|
|
|
|
{0x78, nullptr, "UnmapProcessCodeMemory32"},
|
|
|
|
{0x79, nullptr, "Unknown"},
|
|
|
|
{0x7A, nullptr, "Unknown"},
|
|
|
|
{0x7B, nullptr, "TerminateProcess32"},
|
2021-04-08 19:15:06 +02:00
|
|
|
{0x7C, nullptr, "GetProcessInfo32"},
|
|
|
|
{0x7D, nullptr, "CreateResourceLimit32"},
|
|
|
|
{0x7E, nullptr, "SetResourceLimitLimitValue32"},
|
|
|
|
{0x7F, nullptr, "CallSecureMonitor32"},
|
|
|
|
{0x80, nullptr, "Unknown"},
|
|
|
|
{0x81, nullptr, "Unknown"},
|
|
|
|
{0x82, nullptr, "Unknown"},
|
|
|
|
{0x83, nullptr, "Unknown"},
|
|
|
|
{0x84, nullptr, "Unknown"},
|
|
|
|
{0x85, nullptr, "Unknown"},
|
|
|
|
{0x86, nullptr, "Unknown"},
|
|
|
|
{0x87, nullptr, "Unknown"},
|
|
|
|
{0x88, nullptr, "Unknown"},
|
|
|
|
{0x89, nullptr, "Unknown"},
|
|
|
|
{0x8A, nullptr, "Unknown"},
|
|
|
|
{0x8B, nullptr, "Unknown"},
|
|
|
|
{0x8C, nullptr, "Unknown"},
|
|
|
|
{0x8D, nullptr, "Unknown"},
|
|
|
|
{0x8E, nullptr, "Unknown"},
|
|
|
|
{0x8F, nullptr, "Unknown"},
|
|
|
|
{0x90, nullptr, "Unknown"},
|
|
|
|
{0x91, nullptr, "Unknown"},
|
|
|
|
{0x92, nullptr, "Unknown"},
|
|
|
|
{0x93, nullptr, "Unknown"},
|
|
|
|
{0x94, nullptr, "Unknown"},
|
|
|
|
{0x95, nullptr, "Unknown"},
|
|
|
|
{0x96, nullptr, "Unknown"},
|
|
|
|
{0x97, nullptr, "Unknown"},
|
|
|
|
{0x98, nullptr, "Unknown"},
|
|
|
|
{0x99, nullptr, "Unknown"},
|
|
|
|
{0x9A, nullptr, "Unknown"},
|
|
|
|
{0x9B, nullptr, "Unknown"},
|
|
|
|
{0x9C, nullptr, "Unknown"},
|
|
|
|
{0x9D, nullptr, "Unknown"},
|
|
|
|
{0x9E, nullptr, "Unknown"},
|
|
|
|
{0x9F, nullptr, "Unknown"},
|
|
|
|
{0xA0, nullptr, "Unknown"},
|
|
|
|
{0xA1, nullptr, "Unknown"},
|
|
|
|
{0xA2, nullptr, "Unknown"},
|
|
|
|
{0xA3, nullptr, "Unknown"},
|
|
|
|
{0xA4, nullptr, "Unknown"},
|
|
|
|
{0xA5, nullptr, "Unknown"},
|
|
|
|
{0xA6, nullptr, "Unknown"},
|
|
|
|
{0xA7, nullptr, "Unknown"},
|
|
|
|
{0xA8, nullptr, "Unknown"},
|
|
|
|
{0xA9, nullptr, "Unknown"},
|
|
|
|
{0xAA, nullptr, "Unknown"},
|
|
|
|
{0xAB, nullptr, "Unknown"},
|
|
|
|
{0xAC, nullptr, "Unknown"},
|
|
|
|
{0xAD, nullptr, "Unknown"},
|
|
|
|
{0xAE, nullptr, "Unknown"},
|
|
|
|
{0xAF, nullptr, "Unknown"},
|
|
|
|
{0xB0, nullptr, "Unknown"},
|
|
|
|
{0xB1, nullptr, "Unknown"},
|
|
|
|
{0xB2, nullptr, "Unknown"},
|
|
|
|
{0xB3, nullptr, "Unknown"},
|
|
|
|
{0xB4, nullptr, "Unknown"},
|
|
|
|
{0xB5, nullptr, "Unknown"},
|
|
|
|
{0xB6, nullptr, "Unknown"},
|
|
|
|
{0xB7, nullptr, "Unknown"},
|
|
|
|
{0xB8, nullptr, "Unknown"},
|
|
|
|
{0xB9, nullptr, "Unknown"},
|
|
|
|
{0xBA, nullptr, "Unknown"},
|
|
|
|
{0xBB, nullptr, "Unknown"},
|
|
|
|
{0xBC, nullptr, "Unknown"},
|
|
|
|
{0xBD, nullptr, "Unknown"},
|
|
|
|
{0xBE, nullptr, "Unknown"},
|
|
|
|
{0xBF, nullptr, "Unknown"},
|
2020-12-28 16:15:37 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
static const FunctionDef SVC_Table_64[] = {
|
|
|
|
{0x00, nullptr, "Unknown"},
|
|
|
|
{0x01, SvcWrap64<SetHeapSize>, "SetHeapSize"},
|
|
|
|
{0x02, nullptr, "SetMemoryPermission"},
|
|
|
|
{0x03, SvcWrap64<SetMemoryAttribute>, "SetMemoryAttribute"},
|
|
|
|
{0x04, SvcWrap64<MapMemory>, "MapMemory"},
|
|
|
|
{0x05, SvcWrap64<UnmapMemory>, "UnmapMemory"},
|
|
|
|
{0x06, SvcWrap64<QueryMemory>, "QueryMemory"},
|
|
|
|
{0x07, SvcWrap64<ExitProcess>, "ExitProcess"},
|
|
|
|
{0x08, SvcWrap64<CreateThread>, "CreateThread"},
|
|
|
|
{0x09, SvcWrap64<StartThread>, "StartThread"},
|
|
|
|
{0x0A, SvcWrap64<ExitThread>, "ExitThread"},
|
|
|
|
{0x0B, SvcWrap64<SleepThread>, "SleepThread"},
|
|
|
|
{0x0C, SvcWrap64<GetThreadPriority>, "GetThreadPriority"},
|
|
|
|
{0x0D, SvcWrap64<SetThreadPriority>, "SetThreadPriority"},
|
|
|
|
{0x0E, SvcWrap64<GetThreadCoreMask>, "GetThreadCoreMask"},
|
|
|
|
{0x0F, SvcWrap64<SetThreadCoreMask>, "SetThreadCoreMask"},
|
|
|
|
{0x10, SvcWrap64<GetCurrentProcessorNumber>, "GetCurrentProcessorNumber"},
|
|
|
|
{0x11, SvcWrap64<SignalEvent>, "SignalEvent"},
|
|
|
|
{0x12, SvcWrap64<ClearEvent>, "ClearEvent"},
|
|
|
|
{0x13, SvcWrap64<MapSharedMemory>, "MapSharedMemory"},
|
2021-05-06 04:45:54 +02:00
|
|
|
{0x14, SvcWrap64<UnmapSharedMemory>, "UnmapSharedMemory"},
|
2020-12-28 16:15:37 +01:00
|
|
|
{0x15, SvcWrap64<CreateTransferMemory>, "CreateTransferMemory"},
|
|
|
|
{0x16, SvcWrap64<CloseHandle>, "CloseHandle"},
|
|
|
|
{0x17, SvcWrap64<ResetSignal>, "ResetSignal"},
|
|
|
|
{0x18, SvcWrap64<WaitSynchronization>, "WaitSynchronization"},
|
|
|
|
{0x19, SvcWrap64<CancelSynchronization>, "CancelSynchronization"},
|
|
|
|
{0x1A, SvcWrap64<ArbitrateLock>, "ArbitrateLock"},
|
|
|
|
{0x1B, SvcWrap64<ArbitrateUnlock>, "ArbitrateUnlock"},
|
|
|
|
{0x1C, SvcWrap64<WaitProcessWideKeyAtomic>, "WaitProcessWideKeyAtomic"},
|
|
|
|
{0x1D, SvcWrap64<SignalProcessWideKey>, "SignalProcessWideKey"},
|
|
|
|
{0x1E, SvcWrap64<GetSystemTick>, "GetSystemTick"},
|
|
|
|
{0x1F, SvcWrap64<ConnectToNamedPort>, "ConnectToNamedPort"},
|
|
|
|
{0x20, nullptr, "SendSyncRequestLight"},
|
|
|
|
{0x21, SvcWrap64<SendSyncRequest>, "SendSyncRequest"},
|
|
|
|
{0x22, nullptr, "SendSyncRequestWithUserBuffer"},
|
|
|
|
{0x23, nullptr, "SendAsyncRequestWithUserBuffer"},
|
|
|
|
{0x24, SvcWrap64<GetProcessId>, "GetProcessId"},
|
|
|
|
{0x25, SvcWrap64<GetThreadId>, "GetThreadId"},
|
|
|
|
{0x26, SvcWrap64<Break>, "Break"},
|
|
|
|
{0x27, SvcWrap64<OutputDebugString>, "OutputDebugString"},
|
|
|
|
{0x28, nullptr, "ReturnFromException"},
|
|
|
|
{0x29, SvcWrap64<GetInfo>, "GetInfo"},
|
|
|
|
{0x2A, nullptr, "FlushEntireDataCache"},
|
|
|
|
{0x2B, nullptr, "FlushDataCache"},
|
|
|
|
{0x2C, SvcWrap64<MapPhysicalMemory>, "MapPhysicalMemory"},
|
|
|
|
{0x2D, SvcWrap64<UnmapPhysicalMemory>, "UnmapPhysicalMemory"},
|
|
|
|
{0x2E, nullptr, "GetFutureThreadInfo"},
|
|
|
|
{0x2F, nullptr, "GetLastThreadInfo"},
|
|
|
|
{0x30, SvcWrap64<GetResourceLimitLimitValue>, "GetResourceLimitLimitValue"},
|
|
|
|
{0x31, SvcWrap64<GetResourceLimitCurrentValue>, "GetResourceLimitCurrentValue"},
|
|
|
|
{0x32, SvcWrap64<SetThreadActivity>, "SetThreadActivity"},
|
|
|
|
{0x33, SvcWrap64<GetThreadContext>, "GetThreadContext"},
|
|
|
|
{0x34, SvcWrap64<WaitForAddress>, "WaitForAddress"},
|
|
|
|
{0x35, SvcWrap64<SignalToAddress>, "SignalToAddress"},
|
|
|
|
{0x36, nullptr, "SynchronizePreemptionState"},
|
|
|
|
{0x37, nullptr, "Unknown"},
|
|
|
|
{0x38, nullptr, "Unknown"},
|
|
|
|
{0x39, nullptr, "Unknown"},
|
|
|
|
{0x3A, nullptr, "Unknown"},
|
|
|
|
{0x3B, nullptr, "Unknown"},
|
|
|
|
{0x3C, SvcWrap64<KernelDebug>, "KernelDebug"},
|
|
|
|
{0x3D, SvcWrap64<ChangeKernelTraceState>, "ChangeKernelTraceState"},
|
|
|
|
{0x3E, nullptr, "Unknown"},
|
|
|
|
{0x3F, nullptr, "Unknown"},
|
|
|
|
{0x40, nullptr, "CreateSession"},
|
|
|
|
{0x41, nullptr, "AcceptSession"},
|
|
|
|
{0x42, nullptr, "ReplyAndReceiveLight"},
|
|
|
|
{0x43, nullptr, "ReplyAndReceive"},
|
|
|
|
{0x44, nullptr, "ReplyAndReceiveWithUserBuffer"},
|
|
|
|
{0x45, SvcWrap64<CreateEvent>, "CreateEvent"},
|
|
|
|
{0x46, nullptr, "Unknown"},
|
|
|
|
{0x47, nullptr, "Unknown"},
|
|
|
|
{0x48, nullptr, "MapPhysicalMemoryUnsafe"},
|
|
|
|
{0x49, nullptr, "UnmapPhysicalMemoryUnsafe"},
|
|
|
|
{0x4A, nullptr, "SetUnsafeLimit"},
|
|
|
|
{0x4B, nullptr, "CreateCodeMemory"},
|
|
|
|
{0x4C, nullptr, "ControlCodeMemory"},
|
|
|
|
{0x4D, nullptr, "SleepSystem"},
|
|
|
|
{0x4E, nullptr, "ReadWriteRegister"},
|
|
|
|
{0x4F, nullptr, "SetProcessActivity"},
|
|
|
|
{0x50, nullptr, "CreateSharedMemory"},
|
|
|
|
{0x51, nullptr, "MapTransferMemory"},
|
|
|
|
{0x52, nullptr, "UnmapTransferMemory"},
|
|
|
|
{0x53, nullptr, "CreateInterruptEvent"},
|
|
|
|
{0x54, nullptr, "QueryPhysicalAddress"},
|
|
|
|
{0x55, nullptr, "QueryIoMapping"},
|
|
|
|
{0x56, nullptr, "CreateDeviceAddressSpace"},
|
|
|
|
{0x57, nullptr, "AttachDeviceAddressSpace"},
|
|
|
|
{0x58, nullptr, "DetachDeviceAddressSpace"},
|
|
|
|
{0x59, nullptr, "MapDeviceAddressSpaceByForce"},
|
|
|
|
{0x5A, nullptr, "MapDeviceAddressSpaceAligned"},
|
|
|
|
{0x5B, nullptr, "MapDeviceAddressSpace"},
|
|
|
|
{0x5C, nullptr, "UnmapDeviceAddressSpace"},
|
|
|
|
{0x5D, nullptr, "InvalidateProcessDataCache"},
|
|
|
|
{0x5E, nullptr, "StoreProcessDataCache"},
|
|
|
|
{0x5F, nullptr, "FlushProcessDataCache"},
|
|
|
|
{0x60, nullptr, "DebugActiveProcess"},
|
|
|
|
{0x61, nullptr, "BreakDebugProcess"},
|
|
|
|
{0x62, nullptr, "TerminateDebugProcess"},
|
|
|
|
{0x63, nullptr, "GetDebugEvent"},
|
|
|
|
{0x64, nullptr, "ContinueDebugEvent"},
|
|
|
|
{0x65, SvcWrap64<GetProcessList>, "GetProcessList"},
|
|
|
|
{0x66, SvcWrap64<GetThreadList>, "GetThreadList"},
|
|
|
|
{0x67, nullptr, "GetDebugThreadContext"},
|
|
|
|
{0x68, nullptr, "SetDebugThreadContext"},
|
|
|
|
{0x69, nullptr, "QueryDebugProcessMemory"},
|
|
|
|
{0x6A, nullptr, "ReadDebugProcessMemory"},
|
|
|
|
{0x6B, nullptr, "WriteDebugProcessMemory"},
|
|
|
|
{0x6C, nullptr, "SetHardwareBreakPoint"},
|
|
|
|
{0x6D, nullptr, "GetDebugThreadParam"},
|
|
|
|
{0x6E, nullptr, "Unknown"},
|
|
|
|
{0x6F, nullptr, "GetSystemInfo"},
|
|
|
|
{0x70, nullptr, "CreatePort"},
|
|
|
|
{0x71, nullptr, "ManageNamedPort"},
|
|
|
|
{0x72, nullptr, "ConnectToPort"},
|
|
|
|
{0x73, nullptr, "SetProcessMemoryPermission"},
|
|
|
|
{0x74, nullptr, "MapProcessMemory"},
|
|
|
|
{0x75, nullptr, "UnmapProcessMemory"},
|
|
|
|
{0x76, SvcWrap64<QueryProcessMemory>, "QueryProcessMemory"},
|
|
|
|
{0x77, SvcWrap64<MapProcessCodeMemory>, "MapProcessCodeMemory"},
|
|
|
|
{0x78, SvcWrap64<UnmapProcessCodeMemory>, "UnmapProcessCodeMemory"},
|
|
|
|
{0x79, nullptr, "CreateProcess"},
|
|
|
|
{0x7A, nullptr, "StartProcess"},
|
|
|
|
{0x7B, nullptr, "TerminateProcess"},
|
|
|
|
{0x7C, SvcWrap64<GetProcessInfo>, "GetProcessInfo"},
|
|
|
|
{0x7D, SvcWrap64<CreateResourceLimit>, "CreateResourceLimit"},
|
|
|
|
{0x7E, SvcWrap64<SetResourceLimitLimitValue>, "SetResourceLimitLimitValue"},
|
|
|
|
{0x7F, nullptr, "CallSecureMonitor"},
|
2021-04-08 19:15:06 +02:00
|
|
|
{0x80, nullptr, "Unknown"},
|
|
|
|
{0x81, nullptr, "Unknown"},
|
|
|
|
{0x82, nullptr, "Unknown"},
|
|
|
|
{0x83, nullptr, "Unknown"},
|
|
|
|
{0x84, nullptr, "Unknown"},
|
|
|
|
{0x85, nullptr, "Unknown"},
|
|
|
|
{0x86, nullptr, "Unknown"},
|
|
|
|
{0x87, nullptr, "Unknown"},
|
|
|
|
{0x88, nullptr, "Unknown"},
|
|
|
|
{0x89, nullptr, "Unknown"},
|
|
|
|
{0x8A, nullptr, "Unknown"},
|
|
|
|
{0x8B, nullptr, "Unknown"},
|
|
|
|
{0x8C, nullptr, "Unknown"},
|
|
|
|
{0x8D, nullptr, "Unknown"},
|
|
|
|
{0x8E, nullptr, "Unknown"},
|
|
|
|
{0x8F, nullptr, "Unknown"},
|
|
|
|
{0x90, nullptr, "Unknown"},
|
|
|
|
{0x91, nullptr, "Unknown"},
|
|
|
|
{0x92, nullptr, "Unknown"},
|
|
|
|
{0x93, nullptr, "Unknown"},
|
|
|
|
{0x94, nullptr, "Unknown"},
|
|
|
|
{0x95, nullptr, "Unknown"},
|
|
|
|
{0x96, nullptr, "Unknown"},
|
|
|
|
{0x97, nullptr, "Unknown"},
|
|
|
|
{0x98, nullptr, "Unknown"},
|
|
|
|
{0x99, nullptr, "Unknown"},
|
|
|
|
{0x9A, nullptr, "Unknown"},
|
|
|
|
{0x9B, nullptr, "Unknown"},
|
|
|
|
{0x9C, nullptr, "Unknown"},
|
|
|
|
{0x9D, nullptr, "Unknown"},
|
|
|
|
{0x9E, nullptr, "Unknown"},
|
|
|
|
{0x9F, nullptr, "Unknown"},
|
|
|
|
{0xA0, nullptr, "Unknown"},
|
|
|
|
{0xA1, nullptr, "Unknown"},
|
|
|
|
{0xA2, nullptr, "Unknown"},
|
|
|
|
{0xA3, nullptr, "Unknown"},
|
|
|
|
{0xA4, nullptr, "Unknown"},
|
|
|
|
{0xA5, nullptr, "Unknown"},
|
|
|
|
{0xA6, nullptr, "Unknown"},
|
|
|
|
{0xA7, nullptr, "Unknown"},
|
|
|
|
{0xA8, nullptr, "Unknown"},
|
|
|
|
{0xA9, nullptr, "Unknown"},
|
|
|
|
{0xAA, nullptr, "Unknown"},
|
|
|
|
{0xAB, nullptr, "Unknown"},
|
|
|
|
{0xAC, nullptr, "Unknown"},
|
|
|
|
{0xAD, nullptr, "Unknown"},
|
|
|
|
{0xAE, nullptr, "Unknown"},
|
|
|
|
{0xAF, nullptr, "Unknown"},
|
|
|
|
{0xB0, nullptr, "Unknown"},
|
|
|
|
{0xB1, nullptr, "Unknown"},
|
|
|
|
{0xB2, nullptr, "Unknown"},
|
|
|
|
{0xB3, nullptr, "Unknown"},
|
|
|
|
{0xB4, nullptr, "Unknown"},
|
|
|
|
{0xB5, nullptr, "Unknown"},
|
|
|
|
{0xB6, nullptr, "Unknown"},
|
|
|
|
{0xB7, nullptr, "Unknown"},
|
|
|
|
{0xB8, nullptr, "Unknown"},
|
|
|
|
{0xB9, nullptr, "Unknown"},
|
|
|
|
{0xBA, nullptr, "Unknown"},
|
|
|
|
{0xBB, nullptr, "Unknown"},
|
|
|
|
{0xBC, nullptr, "Unknown"},
|
|
|
|
{0xBD, nullptr, "Unknown"},
|
|
|
|
{0xBE, nullptr, "Unknown"},
|
|
|
|
{0xBF, nullptr, "Unknown"},
|
2020-12-28 16:15:37 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
static const FunctionDef* GetSVCInfo32(u32 func_num) {
|
|
|
|
if (func_num >= std::size(SVC_Table_32)) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Unknown svc=0x{:02X}", func_num);
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
return &SVC_Table_32[func_num];
|
|
|
|
}
|
|
|
|
|
|
|
|
static const FunctionDef* GetSVCInfo64(u32 func_num) {
|
|
|
|
if (func_num >= std::size(SVC_Table_64)) {
|
|
|
|
LOG_ERROR(Kernel_SVC, "Unknown svc=0x{:02X}", func_num);
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
return &SVC_Table_64[func_num];
|
|
|
|
}
|
|
|
|
|
|
|
|
void Call(Core::System& system, u32 immediate) {
|
|
|
|
system.ExitDynarmicProfile();
|
|
|
|
auto& kernel = system.Kernel();
|
|
|
|
kernel.EnterSVCProfile();
|
|
|
|
|
|
|
|
auto* thread = kernel.CurrentScheduler()->GetCurrentThread();
|
2021-01-22 01:15:25 +01:00
|
|
|
thread->SetIsCallingSvc();
|
2020-12-28 16:15:37 +01:00
|
|
|
|
|
|
|
const FunctionDef* info = system.CurrentProcess()->Is64BitProcess() ? GetSVCInfo64(immediate)
|
|
|
|
: GetSVCInfo32(immediate);
|
|
|
|
if (info) {
|
|
|
|
if (info->func) {
|
|
|
|
info->func(system);
|
|
|
|
} else {
|
|
|
|
LOG_CRITICAL(Kernel_SVC, "Unimplemented SVC function {}(..)", info->name);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
LOG_CRITICAL(Kernel_SVC, "Unknown SVC function 0x{:X}", immediate);
|
|
|
|
}
|
|
|
|
|
|
|
|
kernel.ExitSVCProfile();
|
|
|
|
|
2021-01-22 01:15:25 +01:00
|
|
|
if (!thread->IsCallingSvc()) {
|
2021-03-06 02:58:44 +01:00
|
|
|
auto* host_context = thread->GetHostContext().get();
|
|
|
|
host_context->Rewind();
|
2020-12-28 16:15:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
system.EnterDynarmicProfile();
|
|
|
|
}
|
|
|
|
|
|
|
|
} // namespace Kernel::Svc
|