2020-07-17 05:19:07 +01:00
|
|
|
|
using Ryujinx.Common;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
using Ryujinx.Common.Logging;
|
|
|
|
|
using Ryujinx.Cpu;
|
|
|
|
|
using Ryujinx.HLE.Exceptions;
|
|
|
|
|
using Ryujinx.HLE.HOS.Kernel.Common;
|
|
|
|
|
using Ryujinx.HLE.HOS.Kernel.Ipc;
|
|
|
|
|
using Ryujinx.HLE.HOS.Kernel.Memory;
|
|
|
|
|
using Ryujinx.HLE.HOS.Kernel.Process;
|
|
|
|
|
using Ryujinx.HLE.HOS.Kernel.Threading;
|
2020-07-17 05:22:13 +01:00
|
|
|
|
using System;
|
2020-12-01 23:23:43 +00:00
|
|
|
|
using System.Threading;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
namespace Ryujinx.HLE.HOS.Kernel.SupervisorCall
|
|
|
|
|
{
|
|
|
|
|
class Syscall
|
|
|
|
|
{
|
|
|
|
|
private readonly KernelContext _context;
|
|
|
|
|
|
2020-12-01 23:23:43 +00:00
|
|
|
|
public Syscall(KernelContext context)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
_context = context;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-01 23:23:43 +00:00
|
|
|
|
// Process
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2022-02-09 20:18:07 +00:00
|
|
|
|
public KernelResult GetProcessId(out ulong pid, int handle)
|
2020-12-01 23:23:43 +00:00
|
|
|
|
{
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
2020-12-01 23:23:43 +00:00
|
|
|
|
|
|
|
|
|
KProcess process = currentProcess.HandleTable.GetKProcess(handle);
|
|
|
|
|
|
|
|
|
|
if (process == null)
|
|
|
|
|
{
|
|
|
|
|
KThread thread = currentProcess.HandleTable.GetKThread(handle);
|
|
|
|
|
|
|
|
|
|
if (thread != null)
|
|
|
|
|
{
|
|
|
|
|
process = thread.Owner;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// TODO: KDebugEvent.
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pid = process?.Pid ?? 0;
|
|
|
|
|
|
|
|
|
|
return process != null
|
|
|
|
|
? KernelResult.Success
|
|
|
|
|
: KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public KernelResult CreateProcess(
|
2022-01-29 21:18:03 +00:00
|
|
|
|
out int handle,
|
2020-12-01 23:23:43 +00:00
|
|
|
|
ProcessCreationInfo info,
|
|
|
|
|
ReadOnlySpan<int> capabilities,
|
|
|
|
|
IProcessContextFactory contextFactory,
|
|
|
|
|
ThreadStart customThreadStart = null)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
handle = 0;
|
|
|
|
|
|
2020-12-01 23:23:43 +00:00
|
|
|
|
if ((info.Flags & ~ProcessCreationFlags.All) != 0)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
2020-12-01 23:23:43 +00:00
|
|
|
|
return KernelResult.InvalidEnumValue;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
2020-12-01 23:23:43 +00:00
|
|
|
|
// TODO: Address space check.
|
|
|
|
|
|
|
|
|
|
if ((info.Flags & ProcessCreationFlags.PoolPartitionMask) > ProcessCreationFlags.PoolPartitionSystemNonSecure)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
2020-12-01 23:23:43 +00:00
|
|
|
|
return KernelResult.InvalidEnumValue;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
2020-12-01 23:23:43 +00:00
|
|
|
|
if ((info.CodeAddress & 0x1fffff) != 0)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidAddress;
|
|
|
|
|
}
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2020-12-01 23:23:43 +00:00
|
|
|
|
if (info.CodePagesCount < 0 || info.SystemResourcePagesCount < 0)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
2020-12-01 23:23:43 +00:00
|
|
|
|
return KernelResult.InvalidSize;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
2020-12-01 23:23:43 +00:00
|
|
|
|
if (info.Flags.HasFlag(ProcessCreationFlags.OptimizeMemoryAllocation) &&
|
|
|
|
|
!info.Flags.HasFlag(ProcessCreationFlags.IsApplication))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidThread;
|
|
|
|
|
}
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KHandleTable handleTable = KernelStatic.GetCurrentProcess().HandleTable;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2020-12-01 23:23:43 +00:00
|
|
|
|
KProcess process = new KProcess(_context);
|
|
|
|
|
|
|
|
|
|
using var _ = new OnScopeExit(process.DecrementReferenceCount);
|
|
|
|
|
|
|
|
|
|
KResourceLimit resourceLimit;
|
|
|
|
|
|
|
|
|
|
if (info.ResourceLimitHandle != 0)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
2020-12-01 23:23:43 +00:00
|
|
|
|
resourceLimit = handleTable.GetObject<KResourceLimit>(info.ResourceLimitHandle);
|
|
|
|
|
|
|
|
|
|
if (resourceLimit == null)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
resourceLimit = _context.ResourceLimit;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
2020-12-01 23:23:43 +00:00
|
|
|
|
MemoryRegion memRegion = (info.Flags & ProcessCreationFlags.PoolPartitionMask) switch
|
|
|
|
|
{
|
|
|
|
|
ProcessCreationFlags.PoolPartitionApplication => MemoryRegion.Application,
|
|
|
|
|
ProcessCreationFlags.PoolPartitionApplet => MemoryRegion.Applet,
|
|
|
|
|
ProcessCreationFlags.PoolPartitionSystem => MemoryRegion.Service,
|
|
|
|
|
ProcessCreationFlags.PoolPartitionSystemNonSecure => MemoryRegion.NvServices,
|
|
|
|
|
_ => MemoryRegion.NvServices
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
KernelResult result = process.Initialize(
|
|
|
|
|
info,
|
|
|
|
|
capabilities,
|
|
|
|
|
resourceLimit,
|
|
|
|
|
memRegion,
|
|
|
|
|
contextFactory,
|
|
|
|
|
customThreadStart);
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
if (result != KernelResult.Success)
|
|
|
|
|
{
|
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-01 23:23:43 +00:00
|
|
|
|
_context.Processes.TryAdd(process.Pid, process);
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2020-12-01 23:23:43 +00:00
|
|
|
|
return handleTable.GenerateHandle(process, out handle);
|
2020-05-04 04:41:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
2020-12-01 23:23:43 +00:00
|
|
|
|
public KernelResult StartProcess(int handle, int priority, int cpuCore, ulong mainThreadStackSize)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess process = KernelStatic.GetCurrentProcess().HandleTable.GetObject<KProcess>(handle);
|
2020-07-17 05:19:07 +01:00
|
|
|
|
|
2020-12-01 23:23:43 +00:00
|
|
|
|
if (process == null)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidHandle;
|
|
|
|
|
}
|
2020-07-17 05:19:07 +01:00
|
|
|
|
|
2020-12-01 23:23:43 +00:00
|
|
|
|
if ((uint)cpuCore >= KScheduler.CpuCoresCount || !process.IsCpuCoreAllowed(cpuCore))
|
2020-07-17 05:19:07 +01:00
|
|
|
|
{
|
2020-12-01 23:23:43 +00:00
|
|
|
|
return KernelResult.InvalidCpuCore;
|
2020-07-17 05:19:07 +01:00
|
|
|
|
}
|
|
|
|
|
|
2020-12-01 23:23:43 +00:00
|
|
|
|
if ((uint)priority >= KScheduler.PrioritiesCount || !process.IsPriorityAllowed(priority))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidPriority;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
process.DefaultCpuCore = cpuCore;
|
|
|
|
|
|
|
|
|
|
KernelResult result = process.Start(priority, mainThreadStackSize);
|
|
|
|
|
|
|
|
|
|
if (result != KernelResult.Success)
|
|
|
|
|
{
|
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
process.IncrementReferenceCount();
|
|
|
|
|
|
|
|
|
|
return KernelResult.Success;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
2020-12-01 23:23:43 +00:00
|
|
|
|
// IPC
|
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
public KernelResult ConnectToNamedPort(out int handle, ulong namePtr)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
2020-12-01 23:23:43 +00:00
|
|
|
|
handle = 0;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
if (!KernelTransfer.UserToKernelString(out string name, namePtr, 12))
|
2020-12-01 23:23:43 +00:00
|
|
|
|
{
|
|
|
|
|
return KernelResult.UserCopyFailed;
|
|
|
|
|
}
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
return ConnectToNamedPort(out handle, name);
|
2020-12-01 23:23:43 +00:00
|
|
|
|
}
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
public KernelResult ConnectToNamedPort(out int handle, string name)
|
2020-12-01 23:23:43 +00:00
|
|
|
|
{
|
|
|
|
|
handle = 0;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2020-12-01 23:23:43 +00:00
|
|
|
|
if (name.Length > 11)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
2020-12-01 23:23:43 +00:00
|
|
|
|
return KernelResult.MaximumExceeded;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
2020-12-01 23:23:43 +00:00
|
|
|
|
KAutoObject autoObj = KAutoObject.FindNamedObject(_context, name);
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
if (autoObj is not KClientPort clientPort)
|
2020-12-01 23:23:43 +00:00
|
|
|
|
{
|
|
|
|
|
return KernelResult.NotFound;
|
|
|
|
|
}
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2020-12-01 23:23:43 +00:00
|
|
|
|
KernelResult result = currentProcess.HandleTable.ReserveHandle(out handle);
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2020-12-01 23:23:43 +00:00
|
|
|
|
if (result != KernelResult.Success)
|
|
|
|
|
{
|
|
|
|
|
return result;
|
|
|
|
|
}
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2020-12-01 23:23:43 +00:00
|
|
|
|
result = clientPort.Connect(out KClientSession clientSession);
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2020-12-01 23:23:43 +00:00
|
|
|
|
if (result != KernelResult.Success)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
2020-12-01 23:23:43 +00:00
|
|
|
|
currentProcess.HandleTable.CancelHandleReservation(handle);
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2020-12-01 23:23:43 +00:00
|
|
|
|
return result;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
}
|
2020-12-01 23:23:43 +00:00
|
|
|
|
|
|
|
|
|
currentProcess.HandleTable.SetReservedHandleObj(handle, clientSession);
|
|
|
|
|
|
|
|
|
|
clientSession.DecrementReferenceCount();
|
|
|
|
|
|
|
|
|
|
return result;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
2020-12-01 23:23:43 +00:00
|
|
|
|
public KernelResult SendSyncRequest(int handle)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
KClientSession session = currentProcess.HandleTable.GetObject<KClientSession>(handle);
|
|
|
|
|
|
|
|
|
|
if (session == null)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return session.SendSyncRequest();
|
|
|
|
|
}
|
|
|
|
|
|
2020-07-17 05:19:07 +01:00
|
|
|
|
public KernelResult SendSyncRequestWithUserBuffer(ulong messagePtr, ulong messageSize, int handle)
|
|
|
|
|
{
|
|
|
|
|
if (!PageAligned(messagePtr))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidAddress;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!PageAligned(messageSize) || messageSize == 0)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidSize;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (messagePtr + messageSize <= messagePtr)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemState;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
2020-07-17 05:19:07 +01:00
|
|
|
|
|
|
|
|
|
KernelResult result = currentProcess.MemoryManager.BorrowIpcBuffer(messagePtr, messageSize);
|
|
|
|
|
|
|
|
|
|
if (result != KernelResult.Success)
|
|
|
|
|
{
|
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
KClientSession session = currentProcess.HandleTable.GetObject<KClientSession>(handle);
|
|
|
|
|
|
|
|
|
|
if (session == null)
|
|
|
|
|
{
|
|
|
|
|
result = KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
result = session.SendSyncRequest(messagePtr, messageSize);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
KernelResult result2 = currentProcess.MemoryManager.UnborrowIpcBuffer(messagePtr, messageSize);
|
|
|
|
|
|
|
|
|
|
if (result == KernelResult.Success)
|
|
|
|
|
{
|
|
|
|
|
result = result2;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
public KernelResult SendAsyncRequestWithUserBuffer(out int doneEventHandle, ulong messagePtr, ulong messageSize, int handle)
|
2020-07-17 05:19:07 +01:00
|
|
|
|
{
|
|
|
|
|
doneEventHandle = 0;
|
|
|
|
|
|
|
|
|
|
if (!PageAligned(messagePtr))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidAddress;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!PageAligned(messageSize) || messageSize == 0)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidSize;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (messagePtr + messageSize <= messagePtr)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemState;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
2020-07-17 05:19:07 +01:00
|
|
|
|
|
|
|
|
|
KernelResult result = currentProcess.MemoryManager.BorrowIpcBuffer(messagePtr, messageSize);
|
|
|
|
|
|
|
|
|
|
if (result != KernelResult.Success)
|
|
|
|
|
{
|
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
KResourceLimit resourceLimit = currentProcess.ResourceLimit;
|
|
|
|
|
|
|
|
|
|
if (resourceLimit != null && !resourceLimit.Reserve(LimitableResource.Event, 1))
|
|
|
|
|
{
|
|
|
|
|
currentProcess.MemoryManager.UnborrowIpcBuffer(messagePtr, messageSize);
|
|
|
|
|
|
|
|
|
|
return KernelResult.ResLimitExceeded;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
KClientSession session = currentProcess.HandleTable.GetObject<KClientSession>(handle);
|
|
|
|
|
|
|
|
|
|
if (session == null)
|
|
|
|
|
{
|
|
|
|
|
result = KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
KEvent doneEvent = new KEvent(_context);
|
|
|
|
|
|
|
|
|
|
result = currentProcess.HandleTable.GenerateHandle(doneEvent.ReadableEvent, out doneEventHandle);
|
|
|
|
|
|
|
|
|
|
if (result == KernelResult.Success)
|
|
|
|
|
{
|
|
|
|
|
result = session.SendAsyncRequest(doneEvent.WritableEvent, messagePtr, messageSize);
|
|
|
|
|
|
|
|
|
|
if (result != KernelResult.Success)
|
|
|
|
|
{
|
|
|
|
|
currentProcess.HandleTable.CloseHandle(doneEventHandle);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (result != KernelResult.Success)
|
|
|
|
|
{
|
|
|
|
|
resourceLimit?.Release(LimitableResource.Event, 1);
|
|
|
|
|
|
|
|
|
|
currentProcess.MemoryManager.UnborrowIpcBuffer(messagePtr, messageSize);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
|
2020-05-04 04:41:29 +01:00
|
|
|
|
public KernelResult CreateSession(
|
|
|
|
|
out int serverSessionHandle,
|
2022-01-29 21:18:03 +00:00
|
|
|
|
out int clientSessionHandle,
|
|
|
|
|
bool isLight,
|
|
|
|
|
ulong namePtr)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
serverSessionHandle = 0;
|
|
|
|
|
clientSessionHandle = 0;
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
KResourceLimit resourceLimit = currentProcess.ResourceLimit;
|
|
|
|
|
|
|
|
|
|
if (resourceLimit != null && !resourceLimit.Reserve(LimitableResource.Session, 1))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.ResLimitExceeded;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
KernelResult result;
|
|
|
|
|
|
|
|
|
|
if (isLight)
|
|
|
|
|
{
|
|
|
|
|
KLightSession session = new KLightSession(_context);
|
|
|
|
|
|
|
|
|
|
result = currentProcess.HandleTable.GenerateHandle(session.ServerSession, out serverSessionHandle);
|
|
|
|
|
|
|
|
|
|
if (result == KernelResult.Success)
|
|
|
|
|
{
|
|
|
|
|
result = currentProcess.HandleTable.GenerateHandle(session.ClientSession, out clientSessionHandle);
|
|
|
|
|
|
|
|
|
|
if (result != KernelResult.Success)
|
|
|
|
|
{
|
|
|
|
|
currentProcess.HandleTable.CloseHandle(serverSessionHandle);
|
|
|
|
|
|
|
|
|
|
serverSessionHandle = 0;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
session.ServerSession.DecrementReferenceCount();
|
|
|
|
|
session.ClientSession.DecrementReferenceCount();
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
KSession session = new KSession(_context);
|
|
|
|
|
|
|
|
|
|
result = currentProcess.HandleTable.GenerateHandle(session.ServerSession, out serverSessionHandle);
|
|
|
|
|
|
|
|
|
|
if (result == KernelResult.Success)
|
|
|
|
|
{
|
|
|
|
|
result = currentProcess.HandleTable.GenerateHandle(session.ClientSession, out clientSessionHandle);
|
|
|
|
|
|
|
|
|
|
if (result != KernelResult.Success)
|
|
|
|
|
{
|
|
|
|
|
currentProcess.HandleTable.CloseHandle(serverSessionHandle);
|
|
|
|
|
|
|
|
|
|
serverSessionHandle = 0;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
session.ServerSession.DecrementReferenceCount();
|
|
|
|
|
session.ClientSession.DecrementReferenceCount();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
public KernelResult AcceptSession(out int sessionHandle, int portHandle)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
sessionHandle = 0;
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
KServerPort serverPort = currentProcess.HandleTable.GetObject<KServerPort>(portHandle);
|
|
|
|
|
|
|
|
|
|
if (serverPort == null)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
KernelResult result = currentProcess.HandleTable.ReserveHandle(out int handle);
|
|
|
|
|
|
|
|
|
|
if (result != KernelResult.Success)
|
|
|
|
|
{
|
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
KAutoObject session;
|
|
|
|
|
|
|
|
|
|
if (serverPort.IsLight)
|
|
|
|
|
{
|
|
|
|
|
session = serverPort.AcceptIncomingLightConnection();
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
session = serverPort.AcceptIncomingConnection();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (session != null)
|
|
|
|
|
{
|
|
|
|
|
currentProcess.HandleTable.SetReservedHandleObj(handle, session);
|
|
|
|
|
|
|
|
|
|
session.DecrementReferenceCount();
|
|
|
|
|
|
|
|
|
|
sessionHandle = handle;
|
|
|
|
|
|
|
|
|
|
result = KernelResult.Success;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
currentProcess.HandleTable.CancelHandleReservation(handle);
|
|
|
|
|
|
|
|
|
|
result = KernelResult.NotFound;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public KernelResult ReplyAndReceive(
|
2022-01-29 21:18:03 +00:00
|
|
|
|
out int handleIndex,
|
2020-05-04 04:41:29 +01:00
|
|
|
|
ulong handlesPtr,
|
|
|
|
|
int handlesCount,
|
|
|
|
|
int replyTargetHandle,
|
2022-01-29 21:18:03 +00:00
|
|
|
|
long timeout)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
handleIndex = 0;
|
|
|
|
|
|
|
|
|
|
if ((uint)handlesCount > 0x40)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.MaximumExceeded;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
ulong copySize = (ulong)((long)handlesCount * 4);
|
|
|
|
|
|
|
|
|
|
if (!currentProcess.MemoryManager.InsideAddrSpace(handlesPtr, copySize))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.UserCopyFailed;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (handlesPtr + copySize < handlesPtr)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.UserCopyFailed;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int[] handles = new int[handlesCount];
|
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
if (!KernelTransfer.UserToKernelArray<int>(handlesPtr, handles))
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
return KernelResult.UserCopyFailed;
|
|
|
|
|
}
|
|
|
|
|
|
2021-11-28 12:15:26 +00:00
|
|
|
|
if (timeout > 0)
|
|
|
|
|
{
|
|
|
|
|
timeout += KTimeManager.DefaultTimeIncrementNanoseconds;
|
|
|
|
|
}
|
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
return ReplyAndReceive(out handleIndex, handles, replyTargetHandle, timeout);
|
2020-12-01 23:23:43 +00:00
|
|
|
|
}
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
public KernelResult ReplyAndReceive(out int handleIndex, ReadOnlySpan<int> handles, int replyTargetHandle, long timeout)
|
2020-12-01 23:23:43 +00:00
|
|
|
|
{
|
|
|
|
|
handleIndex = 0;
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
2020-12-01 23:23:43 +00:00
|
|
|
|
|
|
|
|
|
KSynchronizationObject[] syncObjs = new KSynchronizationObject[handles.Length];
|
|
|
|
|
|
|
|
|
|
for (int index = 0; index < handles.Length; index++)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
KSynchronizationObject obj = currentProcess.HandleTable.GetObject<KSynchronizationObject>(handles[index]);
|
|
|
|
|
|
|
|
|
|
if (obj == null)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
syncObjs[index] = obj;
|
|
|
|
|
}
|
|
|
|
|
|
2020-07-17 05:19:07 +01:00
|
|
|
|
KernelResult result = KernelResult.Success;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
if (replyTargetHandle != 0)
|
|
|
|
|
{
|
|
|
|
|
KServerSession replyTarget = currentProcess.HandleTable.GetObject<KServerSession>(replyTargetHandle);
|
|
|
|
|
|
|
|
|
|
if (replyTarget == null)
|
|
|
|
|
{
|
2020-07-17 05:19:07 +01:00
|
|
|
|
result = KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
result = replyTarget.Reply();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
}
|
2020-07-17 05:19:07 +01:00
|
|
|
|
}
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2020-07-17 05:19:07 +01:00
|
|
|
|
if (result == KernelResult.Success)
|
|
|
|
|
{
|
2021-11-28 12:15:26 +00:00
|
|
|
|
if (timeout > 0)
|
|
|
|
|
{
|
|
|
|
|
timeout += KTimeManager.DefaultTimeIncrementNanoseconds;
|
|
|
|
|
}
|
|
|
|
|
|
2020-07-17 05:19:07 +01:00
|
|
|
|
while ((result = _context.Synchronization.WaitFor(syncObjs, timeout, out handleIndex)) == KernelResult.Success)
|
|
|
|
|
{
|
|
|
|
|
KServerSession session = currentProcess.HandleTable.GetObject<KServerSession>(handles[handleIndex]);
|
|
|
|
|
|
|
|
|
|
if (session == null)
|
|
|
|
|
{
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if ((result = session.Receive()) != KernelResult.NotFound)
|
|
|
|
|
{
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public KernelResult ReplyAndReceiveWithUserBuffer(
|
2022-01-29 21:18:03 +00:00
|
|
|
|
out int handleIndex,
|
2020-07-17 05:19:07 +01:00
|
|
|
|
ulong handlesPtr,
|
|
|
|
|
ulong messagePtr,
|
|
|
|
|
ulong messageSize,
|
|
|
|
|
int handlesCount,
|
|
|
|
|
int replyTargetHandle,
|
2022-01-29 21:18:03 +00:00
|
|
|
|
long timeout)
|
2020-07-17 05:19:07 +01:00
|
|
|
|
{
|
|
|
|
|
handleIndex = 0;
|
|
|
|
|
|
|
|
|
|
if ((uint)handlesCount > 0x40)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.MaximumExceeded;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
2020-07-17 05:19:07 +01:00
|
|
|
|
|
|
|
|
|
ulong copySize = (ulong)((long)handlesCount * 4);
|
|
|
|
|
|
|
|
|
|
if (!currentProcess.MemoryManager.InsideAddrSpace(handlesPtr, copySize))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.UserCopyFailed;
|
|
|
|
|
}
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2020-07-17 05:19:07 +01:00
|
|
|
|
if (handlesPtr + copySize < handlesPtr)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.UserCopyFailed;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
KernelResult result = currentProcess.MemoryManager.BorrowIpcBuffer(messagePtr, messageSize);
|
|
|
|
|
|
|
|
|
|
if (result != KernelResult.Success)
|
|
|
|
|
{
|
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int[] handles = new int[handlesCount];
|
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
if (!KernelTransfer.UserToKernelArray<int>(handlesPtr, handles))
|
2020-07-17 05:19:07 +01:00
|
|
|
|
{
|
|
|
|
|
currentProcess.MemoryManager.UnborrowIpcBuffer(messagePtr, messageSize);
|
|
|
|
|
|
|
|
|
|
return KernelResult.UserCopyFailed;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
KSynchronizationObject[] syncObjs = new KSynchronizationObject[handlesCount];
|
|
|
|
|
|
|
|
|
|
for (int index = 0; index < handlesCount; index++)
|
|
|
|
|
{
|
|
|
|
|
KSynchronizationObject obj = currentProcess.HandleTable.GetObject<KSynchronizationObject>(handles[index]);
|
|
|
|
|
|
|
|
|
|
if (obj == null)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
2020-07-17 05:19:07 +01:00
|
|
|
|
currentProcess.MemoryManager.UnborrowIpcBuffer(messagePtr, messageSize);
|
|
|
|
|
|
|
|
|
|
return KernelResult.InvalidHandle;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
}
|
2020-07-17 05:19:07 +01:00
|
|
|
|
|
|
|
|
|
syncObjs[index] = obj;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
2020-07-17 05:19:07 +01:00
|
|
|
|
if (replyTargetHandle != 0)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
2020-07-17 05:19:07 +01:00
|
|
|
|
KServerSession replyTarget = currentProcess.HandleTable.GetObject<KServerSession>(replyTargetHandle);
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2020-07-17 05:19:07 +01:00
|
|
|
|
if (replyTarget == null)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
2020-07-17 05:19:07 +01:00
|
|
|
|
result = KernelResult.InvalidHandle;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
}
|
2020-07-17 05:19:07 +01:00
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
result = replyTarget.Reply(messagePtr, messageSize);
|
|
|
|
|
}
|
|
|
|
|
}
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2020-07-17 05:19:07 +01:00
|
|
|
|
if (result == KernelResult.Success)
|
|
|
|
|
{
|
2021-11-28 12:15:26 +00:00
|
|
|
|
if (timeout > 0)
|
|
|
|
|
{
|
|
|
|
|
timeout += KTimeManager.DefaultTimeIncrementNanoseconds;
|
|
|
|
|
}
|
|
|
|
|
|
2020-07-17 05:19:07 +01:00
|
|
|
|
while ((result = _context.Synchronization.WaitFor(syncObjs, timeout, out handleIndex)) == KernelResult.Success)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
2020-07-17 05:19:07 +01:00
|
|
|
|
KServerSession session = currentProcess.HandleTable.GetObject<KServerSession>(handles[handleIndex]);
|
|
|
|
|
|
|
|
|
|
if (session == null)
|
|
|
|
|
{
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if ((result = session.Receive(messagePtr, messageSize)) != KernelResult.NotFound)
|
|
|
|
|
{
|
|
|
|
|
break;
|
|
|
|
|
}
|
2020-05-04 04:41:29 +01:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2020-07-17 05:19:07 +01:00
|
|
|
|
currentProcess.MemoryManager.UnborrowIpcBuffer(messagePtr, messageSize);
|
|
|
|
|
|
2020-05-04 04:41:29 +01:00
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public KernelResult CreatePort(
|
2022-01-29 21:18:03 +00:00
|
|
|
|
out int serverPortHandle,
|
|
|
|
|
out int clientPortHandle,
|
2020-05-04 04:41:29 +01:00
|
|
|
|
int maxSessions,
|
|
|
|
|
bool isLight,
|
2022-01-29 21:18:03 +00:00
|
|
|
|
ulong namePtr)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
serverPortHandle = clientPortHandle = 0;
|
|
|
|
|
|
|
|
|
|
if (maxSessions < 1)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.MaximumExceeded;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
KPort port = new KPort(_context, maxSessions, isLight, (long)namePtr);
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
KernelResult result = currentProcess.HandleTable.GenerateHandle(port.ClientPort, out clientPortHandle);
|
|
|
|
|
|
|
|
|
|
if (result != KernelResult.Success)
|
|
|
|
|
{
|
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
result = currentProcess.HandleTable.GenerateHandle(port.ServerPort, out serverPortHandle);
|
|
|
|
|
|
|
|
|
|
if (result != KernelResult.Success)
|
|
|
|
|
{
|
|
|
|
|
currentProcess.HandleTable.CloseHandle(clientPortHandle);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
public KernelResult ManageNamedPort(out int handle, ulong namePtr, int maxSessions)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
handle = 0;
|
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
if (!KernelTransfer.UserToKernelString(out string name, namePtr, 12))
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
return KernelResult.UserCopyFailed;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-01 23:23:43 +00:00
|
|
|
|
if (name.Length > 11)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.MaximumExceeded;
|
|
|
|
|
}
|
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
return ManageNamedPort(out handle, name, maxSessions);
|
2020-12-01 23:23:43 +00:00
|
|
|
|
}
|
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
public KernelResult ManageNamedPort(out int handle, string name, int maxSessions)
|
2020-12-01 23:23:43 +00:00
|
|
|
|
{
|
|
|
|
|
handle = 0;
|
|
|
|
|
|
|
|
|
|
if (maxSessions < 0)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
return KernelResult.MaximumExceeded;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (maxSessions == 0)
|
|
|
|
|
{
|
|
|
|
|
return KAutoObject.RemoveName(_context, name);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
KPort port = new KPort(_context, maxSessions, false, 0);
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
KernelResult result = currentProcess.HandleTable.GenerateHandle(port.ServerPort, out handle);
|
|
|
|
|
|
|
|
|
|
if (result != KernelResult.Success)
|
|
|
|
|
{
|
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
result = port.ClientPort.SetName(name);
|
|
|
|
|
|
|
|
|
|
if (result != KernelResult.Success)
|
|
|
|
|
{
|
|
|
|
|
currentProcess.HandleTable.CloseHandle(handle);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
public KernelResult ConnectToPort(out int clientSessionHandle, int clientPortHandle)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
clientSessionHandle = 0;
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
KClientPort clientPort = currentProcess.HandleTable.GetObject<KClientPort>(clientPortHandle);
|
|
|
|
|
|
|
|
|
|
if (clientPort == null)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
KernelResult result = currentProcess.HandleTable.ReserveHandle(out int handle);
|
|
|
|
|
|
|
|
|
|
if (result != KernelResult.Success)
|
|
|
|
|
{
|
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
KAutoObject session;
|
|
|
|
|
|
|
|
|
|
if (clientPort.IsLight)
|
|
|
|
|
{
|
|
|
|
|
result = clientPort.ConnectLight(out KLightClientSession clientSession);
|
|
|
|
|
|
|
|
|
|
session = clientSession;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
result = clientPort.Connect(out KClientSession clientSession);
|
|
|
|
|
|
|
|
|
|
session = clientSession;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (result != KernelResult.Success)
|
|
|
|
|
{
|
|
|
|
|
currentProcess.HandleTable.CancelHandleReservation(handle);
|
|
|
|
|
|
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
currentProcess.HandleTable.SetReservedHandleObj(handle, session);
|
|
|
|
|
|
|
|
|
|
session.DecrementReferenceCount();
|
|
|
|
|
|
|
|
|
|
clientSessionHandle = handle;
|
|
|
|
|
|
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Memory
|
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
public KernelResult SetHeapSize(out ulong address, ulong size)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
if ((size & 0xfffffffe001fffff) != 0)
|
|
|
|
|
{
|
2022-01-29 21:18:03 +00:00
|
|
|
|
address = 0;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
return KernelResult.InvalidSize;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess process = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
return process.MemoryManager.SetHeapSize(size, out address);
|
2020-05-04 04:41:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
2021-10-24 00:24:49 +01:00
|
|
|
|
public KernelResult SetMemoryPermission(ulong address, ulong size, KMemoryPermission permission)
|
|
|
|
|
{
|
|
|
|
|
if (!PageAligned(address))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidAddress;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!PageAligned(size) || size == 0)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidSize;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (address + size <= address)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemState;
|
|
|
|
|
}
|
|
|
|
|
|
2021-10-25 00:00:31 +01:00
|
|
|
|
if (permission != KMemoryPermission.None && (permission | KMemoryPermission.Write) != KMemoryPermission.ReadAndWrite)
|
2021-10-24 00:24:49 +01:00
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidPermission;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
|
|
|
|
|
|
|
|
|
if (!currentProcess.MemoryManager.InsideAddrSpace(address, size))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemState;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return currentProcess.MemoryManager.SetMemoryPermission(address, size, permission);
|
|
|
|
|
}
|
|
|
|
|
|
2020-05-04 04:41:29 +01:00
|
|
|
|
public KernelResult SetMemoryAttribute(
|
2022-01-29 21:18:03 +00:00
|
|
|
|
ulong address,
|
2020-05-04 04:41:29 +01:00
|
|
|
|
ulong size,
|
|
|
|
|
MemoryAttribute attributeMask,
|
|
|
|
|
MemoryAttribute attributeValue)
|
|
|
|
|
{
|
2022-01-29 21:18:03 +00:00
|
|
|
|
if (!PageAligned(address))
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidAddress;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!PageAligned(size) || size == 0)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidSize;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
MemoryAttribute attributes = attributeMask | attributeValue;
|
|
|
|
|
|
|
|
|
|
if (attributes != attributeMask ||
|
|
|
|
|
(attributes | MemoryAttribute.Uncached) != MemoryAttribute.Uncached)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidCombination;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess process = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
if (!process.MemoryManager.InsideAddrSpace(address, size))
|
2021-10-24 00:07:41 +01:00
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemState;
|
|
|
|
|
}
|
|
|
|
|
|
2020-05-04 04:41:29 +01:00
|
|
|
|
KernelResult result = process.MemoryManager.SetMemoryAttribute(
|
2022-01-29 21:18:03 +00:00
|
|
|
|
address,
|
2020-05-04 04:41:29 +01:00
|
|
|
|
size,
|
|
|
|
|
attributeMask,
|
|
|
|
|
attributeValue);
|
|
|
|
|
|
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public KernelResult MapMemory(ulong dst, ulong src, ulong size)
|
|
|
|
|
{
|
|
|
|
|
if (!PageAligned(src | dst))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidAddress;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!PageAligned(size) || size == 0)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidSize;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (src + size <= src || dst + size <= dst)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemState;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
if (!currentProcess.MemoryManager.InsideAddrSpace(src, size))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemState;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (currentProcess.MemoryManager.OutsideStackRegion(dst, size) ||
|
|
|
|
|
currentProcess.MemoryManager.InsideHeapRegion(dst, size) ||
|
|
|
|
|
currentProcess.MemoryManager.InsideAliasRegion(dst, size))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemRange;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess process = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
return process.MemoryManager.Map(dst, src, size);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public KernelResult UnmapMemory(ulong dst, ulong src, ulong size)
|
|
|
|
|
{
|
|
|
|
|
if (!PageAligned(src | dst))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidAddress;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!PageAligned(size) || size == 0)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidSize;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (src + size <= src || dst + size <= dst)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemState;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
if (!currentProcess.MemoryManager.InsideAddrSpace(src, size))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemState;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (currentProcess.MemoryManager.OutsideStackRegion(dst, size) ||
|
|
|
|
|
currentProcess.MemoryManager.InsideHeapRegion(dst, size) ||
|
|
|
|
|
currentProcess.MemoryManager.InsideAliasRegion(dst, size))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemRange;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess process = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
return process.MemoryManager.Unmap(dst, src, size);
|
|
|
|
|
}
|
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
public KernelResult QueryMemory(ulong infoPtr, out ulong pageInfo, ulong address)
|
|
|
|
|
{
|
|
|
|
|
KernelResult result = QueryMemory(out MemoryInfo info, out pageInfo, address);
|
|
|
|
|
|
|
|
|
|
if (result == KernelResult.Success)
|
|
|
|
|
{
|
|
|
|
|
return KernelTransfer.KernelToUser(infoPtr, info)
|
|
|
|
|
? KernelResult.Success
|
|
|
|
|
: KernelResult.InvalidMemState;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public KernelResult QueryMemory(out MemoryInfo info, out ulong pageInfo, ulong address)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess process = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
KMemoryInfo blockInfo = process.MemoryManager.QueryMemory(address);
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
info = new MemoryInfo(
|
|
|
|
|
blockInfo.Address,
|
|
|
|
|
blockInfo.Size,
|
|
|
|
|
blockInfo.State & MemoryState.UserMask,
|
|
|
|
|
blockInfo.Attribute,
|
|
|
|
|
blockInfo.Permission & KMemoryPermission.UserMask,
|
|
|
|
|
blockInfo.IpcRefCount,
|
|
|
|
|
blockInfo.DeviceRefCount);
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
pageInfo = 0;
|
|
|
|
|
|
|
|
|
|
return KernelResult.Success;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-01 23:23:43 +00:00
|
|
|
|
public KernelResult MapSharedMemory(int handle, ulong address, ulong size, KMemoryPermission permission)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
if (!PageAligned(address))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidAddress;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!PageAligned(size) || size == 0)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidSize;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (address + size <= address)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemState;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-01 23:23:43 +00:00
|
|
|
|
if ((permission | KMemoryPermission.Write) != KMemoryPermission.ReadAndWrite)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidPermission;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
KSharedMemory sharedMemory = currentProcess.HandleTable.GetObject<KSharedMemory>(handle);
|
|
|
|
|
|
|
|
|
|
if (sharedMemory == null)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (currentProcess.MemoryManager.IsInvalidRegion(address, size) ||
|
|
|
|
|
currentProcess.MemoryManager.InsideHeapRegion(address, size) ||
|
|
|
|
|
currentProcess.MemoryManager.InsideAliasRegion(address, size))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemRange;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return sharedMemory.MapIntoProcess(
|
|
|
|
|
currentProcess.MemoryManager,
|
|
|
|
|
address,
|
|
|
|
|
size,
|
|
|
|
|
currentProcess,
|
|
|
|
|
permission);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public KernelResult UnmapSharedMemory(int handle, ulong address, ulong size)
|
|
|
|
|
{
|
|
|
|
|
if (!PageAligned(address))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidAddress;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!PageAligned(size) || size == 0)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidSize;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (address + size <= address)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemState;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
KSharedMemory sharedMemory = currentProcess.HandleTable.GetObject<KSharedMemory>(handle);
|
|
|
|
|
|
|
|
|
|
if (sharedMemory == null)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (currentProcess.MemoryManager.IsInvalidRegion(address, size) ||
|
|
|
|
|
currentProcess.MemoryManager.InsideHeapRegion(address, size) ||
|
|
|
|
|
currentProcess.MemoryManager.InsideAliasRegion(address, size))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemRange;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return sharedMemory.UnmapFromProcess(
|
|
|
|
|
currentProcess.MemoryManager,
|
|
|
|
|
address,
|
|
|
|
|
size,
|
|
|
|
|
currentProcess);
|
|
|
|
|
}
|
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
public KernelResult CreateTransferMemory(out int handle, ulong address, ulong size, KMemoryPermission permission)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
handle = 0;
|
|
|
|
|
|
|
|
|
|
if (!PageAligned(address))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidAddress;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!PageAligned(size) || size == 0)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidSize;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (address + size <= address)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemState;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-01 23:23:43 +00:00
|
|
|
|
if (permission > KMemoryPermission.ReadAndWrite || permission == KMemoryPermission.Write)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidPermission;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess process = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2020-07-19 19:24:18 +01:00
|
|
|
|
KResourceLimit resourceLimit = process.ResourceLimit;
|
|
|
|
|
|
|
|
|
|
if (resourceLimit != null && !resourceLimit.Reserve(LimitableResource.TransferMemory, 1))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.ResLimitExceeded;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void CleanUpForError()
|
|
|
|
|
{
|
|
|
|
|
resourceLimit?.Release(LimitableResource.TransferMemory, 1);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!process.MemoryManager.InsideAddrSpace(address, size))
|
|
|
|
|
{
|
|
|
|
|
CleanUpForError();
|
|
|
|
|
|
|
|
|
|
return KernelResult.InvalidMemState;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
KTransferMemory transferMemory = new KTransferMemory(_context);
|
|
|
|
|
|
|
|
|
|
KernelResult result = transferMemory.Initialize(address, size, permission);
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
if (result != KernelResult.Success)
|
|
|
|
|
{
|
2020-07-19 19:24:18 +01:00
|
|
|
|
CleanUpForError();
|
|
|
|
|
|
2020-05-04 04:41:29 +01:00
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
|
2020-07-19 19:24:18 +01:00
|
|
|
|
result = process.HandleTable.GenerateHandle(transferMemory, out handle);
|
|
|
|
|
|
|
|
|
|
transferMemory.DecrementReferenceCount();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2020-07-19 19:24:18 +01:00
|
|
|
|
return result;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
2021-06-23 20:52:11 +01:00
|
|
|
|
public KernelResult MapTransferMemory(int handle, ulong address, ulong size, KMemoryPermission permission)
|
|
|
|
|
{
|
|
|
|
|
if (!PageAligned(address))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidAddress;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!PageAligned(size) || size == 0)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidSize;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (address + size <= address)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemState;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (permission > KMemoryPermission.ReadAndWrite || permission == KMemoryPermission.Write)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidPermission;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
|
|
|
|
|
|
|
|
|
KTransferMemory transferMemory = currentProcess.HandleTable.GetObject<KTransferMemory>(handle);
|
|
|
|
|
|
|
|
|
|
if (transferMemory == null)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (currentProcess.MemoryManager.IsInvalidRegion(address, size) ||
|
|
|
|
|
currentProcess.MemoryManager.InsideHeapRegion(address, size) ||
|
|
|
|
|
currentProcess.MemoryManager.InsideAliasRegion(address, size))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemRange;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return transferMemory.MapIntoProcess(
|
|
|
|
|
currentProcess.MemoryManager,
|
|
|
|
|
address,
|
|
|
|
|
size,
|
|
|
|
|
currentProcess,
|
|
|
|
|
permission);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public KernelResult UnmapTransferMemory(int handle, ulong address, ulong size)
|
|
|
|
|
{
|
|
|
|
|
if (!PageAligned(address))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidAddress;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!PageAligned(size) || size == 0)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidSize;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (address + size <= address)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemState;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
|
|
|
|
|
|
|
|
|
KTransferMemory transferMemory = currentProcess.HandleTable.GetObject<KTransferMemory>(handle);
|
|
|
|
|
|
|
|
|
|
if (transferMemory == null)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (currentProcess.MemoryManager.IsInvalidRegion(address, size) ||
|
|
|
|
|
currentProcess.MemoryManager.InsideHeapRegion(address, size) ||
|
|
|
|
|
currentProcess.MemoryManager.InsideAliasRegion(address, size))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemRange;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return transferMemory.UnmapFromProcess(
|
|
|
|
|
currentProcess.MemoryManager,
|
|
|
|
|
address,
|
|
|
|
|
size,
|
|
|
|
|
currentProcess);
|
|
|
|
|
}
|
|
|
|
|
|
2020-05-04 04:41:29 +01:00
|
|
|
|
public KernelResult MapPhysicalMemory(ulong address, ulong size)
|
|
|
|
|
{
|
|
|
|
|
if (!PageAligned(address))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidAddress;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!PageAligned(size) || size == 0)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidSize;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (address + size <= address)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemRange;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
if ((currentProcess.PersonalMmHeapPagesCount & 0xfffffffffffff) == 0)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidState;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!currentProcess.MemoryManager.InsideAddrSpace(address, size) ||
|
|
|
|
|
currentProcess.MemoryManager.OutsideAliasRegion(address, size))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemRange;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess process = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
return process.MemoryManager.MapPhysicalMemory(address, size);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public KernelResult UnmapPhysicalMemory(ulong address, ulong size)
|
|
|
|
|
{
|
|
|
|
|
if (!PageAligned(address))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidAddress;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!PageAligned(size) || size == 0)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidSize;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (address + size <= address)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemRange;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
if ((currentProcess.PersonalMmHeapPagesCount & 0xfffffffffffff) == 0)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidState;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!currentProcess.MemoryManager.InsideAddrSpace(address, size) ||
|
|
|
|
|
currentProcess.MemoryManager.OutsideAliasRegion(address, size))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemRange;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess process = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
return process.MemoryManager.UnmapPhysicalMemory(address, size);
|
|
|
|
|
}
|
|
|
|
|
|
2022-05-03 12:16:31 +01:00
|
|
|
|
public KernelResult CreateCodeMemory(ulong address, ulong size, out int handle)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
2022-05-03 12:16:31 +01:00
|
|
|
|
handle = 0;
|
|
|
|
|
|
|
|
|
|
if (!PageAligned(address))
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidAddress;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!PageAligned(size) || size == 0)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidSize;
|
|
|
|
|
}
|
|
|
|
|
|
2022-05-03 12:16:31 +01:00
|
|
|
|
if (size + address <= address)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemState;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
KCodeMemory codeMemory = new KCodeMemory(_context);
|
|
|
|
|
|
|
|
|
|
using var _ = new OnScopeExit(codeMemory.DecrementReferenceCount);
|
|
|
|
|
|
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
|
|
|
|
|
|
|
|
|
if (!currentProcess.MemoryManager.InsideAddrSpace(address, size))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemState;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
KernelResult result = codeMemory.Initialize(address, size);
|
|
|
|
|
|
|
|
|
|
if (result != KernelResult.Success)
|
|
|
|
|
{
|
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return currentProcess.HandleTable.GenerateHandle(codeMemory, out handle);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public KernelResult ControlCodeMemory(int handle, CodeMemoryOperation op, ulong address, ulong size, KMemoryPermission permission)
|
|
|
|
|
{
|
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
|
|
|
|
|
|
|
|
|
KCodeMemory codeMemory = currentProcess.HandleTable.GetObject<KCodeMemory>(handle);
|
|
|
|
|
|
2022-05-03 22:28:32 +01:00
|
|
|
|
// Newer versions of the kernel also returns an error here if the owner and process
|
2022-05-03 12:16:31 +01:00
|
|
|
|
// where the operation will happen are the same. We do not return an error here
|
2022-05-03 22:28:32 +01:00
|
|
|
|
// for homebrew because some of them requires this to be patched out to work (for JIT).
|
|
|
|
|
if (codeMemory == null || (!currentProcess.AllowCodeMemoryForJit && codeMemory.Owner == currentProcess))
|
2022-05-03 12:16:31 +01:00
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
switch (op)
|
|
|
|
|
{
|
|
|
|
|
case CodeMemoryOperation.Map:
|
|
|
|
|
if (!currentProcess.MemoryManager.CanContain(address, size, MemoryState.CodeWritable))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemRange;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (permission != KMemoryPermission.ReadAndWrite)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidPermission;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return codeMemory.Map(address, size, permission);
|
|
|
|
|
|
|
|
|
|
case CodeMemoryOperation.MapToOwner:
|
|
|
|
|
if (!currentProcess.MemoryManager.CanContain(address, size, MemoryState.CodeReadOnly))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemRange;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (permission != KMemoryPermission.Read && permission != KMemoryPermission.ReadAndExecute)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidPermission;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return codeMemory.MapToOwner(address, size, permission);
|
|
|
|
|
|
|
|
|
|
case CodeMemoryOperation.Unmap:
|
|
|
|
|
if (!currentProcess.MemoryManager.CanContain(address, size, MemoryState.CodeWritable))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemRange;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (permission != KMemoryPermission.None)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidPermission;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return codeMemory.Unmap(address, size);
|
|
|
|
|
|
|
|
|
|
case CodeMemoryOperation.UnmapFromOwner:
|
|
|
|
|
if (!currentProcess.MemoryManager.CanContain(address, size, MemoryState.CodeReadOnly))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemRange;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (permission != KMemoryPermission.None)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidPermission;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return codeMemory.UnmapFromOwner(address, size);
|
|
|
|
|
|
|
|
|
|
default: return KernelResult.InvalidEnumValue;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public KernelResult SetProcessMemoryPermission(int handle, ulong src, ulong size, KMemoryPermission permission)
|
|
|
|
|
{
|
|
|
|
|
if (!PageAligned(src))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidAddress;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!PageAligned(size) || size == 0)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidSize;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (permission != KMemoryPermission.None &&
|
|
|
|
|
permission != KMemoryPermission.Read &&
|
|
|
|
|
permission != KMemoryPermission.ReadAndWrite &&
|
|
|
|
|
permission != KMemoryPermission.ReadAndExecute)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidPermission;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
KProcess targetProcess = currentProcess.HandleTable.GetObject<KProcess>(handle);
|
|
|
|
|
|
|
|
|
|
if (targetProcess == null)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
|
2022-05-03 12:16:31 +01:00
|
|
|
|
if (targetProcess.MemoryManager.OutsideAddrSpace(src, size))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemState;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return targetProcess.MemoryManager.SetProcessMemoryPermission(src, size, permission);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public KernelResult MapProcessMemory(ulong dst, int handle, ulong src, ulong size)
|
|
|
|
|
{
|
|
|
|
|
if (!PageAligned(src) || !PageAligned(dst))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidAddress;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!PageAligned(size) || size == 0)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidSize;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (dst + size <= dst || src + size <= src)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemRange;
|
|
|
|
|
}
|
|
|
|
|
|
2022-05-03 12:16:31 +01:00
|
|
|
|
KProcess dstProcess = KernelStatic.GetCurrentProcess();
|
|
|
|
|
KProcess srcProcess = dstProcess.HandleTable.GetObject<KProcess>(handle);
|
|
|
|
|
|
|
|
|
|
if (srcProcess == null)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
2022-05-03 12:16:31 +01:00
|
|
|
|
return KernelResult.InvalidHandle;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
2022-05-03 12:16:31 +01:00
|
|
|
|
if (!srcProcess.MemoryManager.InsideAddrSpace(src, size) ||
|
|
|
|
|
!dstProcess.MemoryManager.CanContain(dst, size, MemoryState.ProcessMemory))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemRange;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
KPageList pageList = new KPageList();
|
|
|
|
|
|
|
|
|
|
KernelResult result = srcProcess.MemoryManager.GetPagesIfStateEquals(
|
|
|
|
|
src,
|
|
|
|
|
size,
|
|
|
|
|
MemoryState.MapProcessAllowed,
|
|
|
|
|
MemoryState.MapProcessAllowed,
|
|
|
|
|
KMemoryPermission.None,
|
|
|
|
|
KMemoryPermission.None,
|
|
|
|
|
MemoryAttribute.Mask,
|
|
|
|
|
MemoryAttribute.None,
|
|
|
|
|
pageList);
|
|
|
|
|
|
|
|
|
|
if (result != KernelResult.Success)
|
|
|
|
|
{
|
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return dstProcess.MemoryManager.MapPages(dst, pageList, MemoryState.ProcessMemory, KMemoryPermission.ReadAndWrite);
|
2020-05-04 04:41:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
2022-05-03 12:16:31 +01:00
|
|
|
|
public KernelResult UnmapProcessMemory(ulong dst, int handle, ulong src, ulong size)
|
|
|
|
|
{
|
|
|
|
|
if (!PageAligned(src) || !PageAligned(dst))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidAddress;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!PageAligned(size) || size == 0)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidSize;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (dst + size <= dst || src + size <= src)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemRange;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
KProcess dstProcess = KernelStatic.GetCurrentProcess();
|
|
|
|
|
KProcess srcProcess = dstProcess.HandleTable.GetObject<KProcess>(handle);
|
|
|
|
|
|
|
|
|
|
if (srcProcess == null)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!srcProcess.MemoryManager.InsideAddrSpace(src, size) ||
|
|
|
|
|
!dstProcess.MemoryManager.CanContain(dst, size, MemoryState.ProcessMemory))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemRange;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
KernelResult result = dstProcess.MemoryManager.UnmapProcessMemory(dst, size, srcProcess.MemoryManager, src);
|
|
|
|
|
|
|
|
|
|
if (result != KernelResult.Success)
|
|
|
|
|
{
|
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return KernelResult.Success;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public KernelResult MapProcessCodeMemory(int handle, ulong dst, ulong src, ulong size)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
if (!PageAligned(dst) || !PageAligned(src))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidAddress;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!PageAligned(size) || size == 0)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidSize;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
KProcess targetProcess = currentProcess.HandleTable.GetObject<KProcess>(handle);
|
|
|
|
|
|
|
|
|
|
if (targetProcess == null)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (targetProcess.MemoryManager.OutsideAddrSpace(dst, size) ||
|
|
|
|
|
targetProcess.MemoryManager.OutsideAddrSpace(src, size) ||
|
|
|
|
|
targetProcess.MemoryManager.InsideAliasRegion(dst, size) ||
|
|
|
|
|
targetProcess.MemoryManager.InsideHeapRegion(dst, size))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemRange;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (size + dst <= dst || size + src <= src)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemState;
|
|
|
|
|
}
|
|
|
|
|
|
2022-05-03 12:16:31 +01:00
|
|
|
|
return targetProcess.MemoryManager.MapProcessCodeMemory(dst, src, size);
|
2020-05-04 04:41:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
2022-05-03 12:16:31 +01:00
|
|
|
|
public KernelResult UnmapProcessCodeMemory(int handle, ulong dst, ulong src, ulong size)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
2022-05-03 12:16:31 +01:00
|
|
|
|
if (!PageAligned(dst) || !PageAligned(src))
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidAddress;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!PageAligned(size) || size == 0)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidSize;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
KProcess targetProcess = currentProcess.HandleTable.GetObject<KProcess>(handle);
|
|
|
|
|
|
|
|
|
|
if (targetProcess == null)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
|
2022-05-03 12:16:31 +01:00
|
|
|
|
if (targetProcess.MemoryManager.OutsideAddrSpace(dst, size) ||
|
|
|
|
|
targetProcess.MemoryManager.OutsideAddrSpace(src, size) ||
|
|
|
|
|
targetProcess.MemoryManager.InsideAliasRegion(dst, size) ||
|
|
|
|
|
targetProcess.MemoryManager.InsideHeapRegion(dst, size))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemRange;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (size + dst <= dst || size + src <= src)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemState;
|
|
|
|
|
}
|
|
|
|
|
|
2022-05-03 12:16:31 +01:00
|
|
|
|
return targetProcess.MemoryManager.UnmapProcessCodeMemory(dst, src, size);
|
2020-05-04 04:41:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
private static bool PageAligned(ulong address)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
2022-01-29 21:18:03 +00:00
|
|
|
|
return (address & (KPageTableBase.PageSize - 1)) == 0;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// System
|
|
|
|
|
|
|
|
|
|
public KernelResult TerminateProcess(int handle)
|
|
|
|
|
{
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess process = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
process = process.HandleTable.GetObject<KProcess>(handle);
|
|
|
|
|
|
|
|
|
|
KernelResult result;
|
|
|
|
|
|
|
|
|
|
if (process != null)
|
|
|
|
|
{
|
2020-12-09 22:20:05 +00:00
|
|
|
|
if (process == KernelStatic.GetCurrentProcess())
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
result = KernelResult.Success;
|
|
|
|
|
process.DecrementToZeroWhileTerminatingCurrent();
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
result = process.Terminate();
|
|
|
|
|
process.DecrementReferenceCount();
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
result = KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public void ExitProcess()
|
|
|
|
|
{
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KernelStatic.GetCurrentProcess().TerminateCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public KernelResult SignalEvent(int handle)
|
|
|
|
|
{
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess process = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
KWritableEvent writableEvent = process.HandleTable.GetObject<KWritableEvent>(handle);
|
|
|
|
|
|
|
|
|
|
KernelResult result;
|
|
|
|
|
|
|
|
|
|
if (writableEvent != null)
|
|
|
|
|
{
|
|
|
|
|
writableEvent.Signal();
|
|
|
|
|
|
|
|
|
|
result = KernelResult.Success;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
result = KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public KernelResult ClearEvent(int handle)
|
|
|
|
|
{
|
|
|
|
|
KernelResult result;
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess process = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
KWritableEvent writableEvent = process.HandleTable.GetObject<KWritableEvent>(handle);
|
|
|
|
|
|
|
|
|
|
if (writableEvent == null)
|
|
|
|
|
{
|
|
|
|
|
KReadableEvent readableEvent = process.HandleTable.GetObject<KReadableEvent>(handle);
|
|
|
|
|
|
|
|
|
|
result = readableEvent?.Clear() ?? KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
result = writableEvent.Clear();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public KernelResult CloseHandle(int handle)
|
|
|
|
|
{
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2020-07-19 19:24:18 +01:00
|
|
|
|
return currentProcess.HandleTable.CloseHandle(handle) ? KernelResult.Success : KernelResult.InvalidHandle;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public KernelResult ResetSignal(int handle)
|
|
|
|
|
{
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
KReadableEvent readableEvent = currentProcess.HandleTable.GetObject<KReadableEvent>(handle);
|
|
|
|
|
|
|
|
|
|
KernelResult result;
|
|
|
|
|
|
|
|
|
|
if (readableEvent != null)
|
|
|
|
|
{
|
|
|
|
|
result = readableEvent.ClearIfSignaled();
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
KProcess process = currentProcess.HandleTable.GetKProcess(handle);
|
|
|
|
|
|
|
|
|
|
if (process != null)
|
|
|
|
|
{
|
|
|
|
|
result = process.ClearIfNotExited();
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
result = KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public ulong GetSystemTick()
|
|
|
|
|
{
|
2020-12-09 22:20:05 +00:00
|
|
|
|
return KernelStatic.GetCurrentThread().Context.CntpctEl0;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public void Break(ulong reason)
|
|
|
|
|
{
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KThread currentThread = KernelStatic.GetCurrentThread();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
if ((reason & (1UL << 31)) == 0)
|
|
|
|
|
{
|
|
|
|
|
currentThread.PrintGuestStackTrace();
|
2021-05-21 00:27:16 +01:00
|
|
|
|
currentThread.PrintGuestRegisterPrintout();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
// As the process is exiting, this is probably caused by emulation termination.
|
|
|
|
|
if (currentThread.Owner.State == ProcessState.Exiting)
|
|
|
|
|
{
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// TODO: Debug events.
|
|
|
|
|
currentThread.Owner.TerminateCurrentProcess();
|
|
|
|
|
|
|
|
|
|
throw new GuestBrokeExecutionException();
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
2020-08-04 00:32:53 +01:00
|
|
|
|
Logger.Debug?.Print(LogClass.KernelSvc, "Debugger triggered.");
|
2020-05-04 04:41:29 +01:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public void OutputDebugString(ulong strPtr, ulong size)
|
|
|
|
|
{
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess process = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2021-04-24 11:16:01 +01:00
|
|
|
|
string str = MemoryHelper.ReadAsciiString(process.CpuMemory, strPtr, (long)size);
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2020-08-04 00:32:53 +01:00
|
|
|
|
Logger.Warning?.Print(LogClass.KernelSvc, str);
|
2020-05-04 04:41:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
public KernelResult GetInfo(out ulong value, InfoType id, int handle, long subId)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
value = 0;
|
|
|
|
|
|
|
|
|
|
switch (id)
|
|
|
|
|
{
|
2021-12-04 23:23:26 +00:00
|
|
|
|
case InfoType.CoreMask:
|
|
|
|
|
case InfoType.PriorityMask:
|
|
|
|
|
case InfoType.AliasRegionAddress:
|
|
|
|
|
case InfoType.AliasRegionSize:
|
|
|
|
|
case InfoType.HeapRegionAddress:
|
|
|
|
|
case InfoType.HeapRegionSize:
|
|
|
|
|
case InfoType.TotalMemorySize:
|
|
|
|
|
case InfoType.UsedMemorySize:
|
|
|
|
|
case InfoType.AslrRegionAddress:
|
|
|
|
|
case InfoType.AslrRegionSize:
|
|
|
|
|
case InfoType.StackRegionAddress:
|
|
|
|
|
case InfoType.StackRegionSize:
|
|
|
|
|
case InfoType.SystemResourceSizeTotal:
|
|
|
|
|
case InfoType.SystemResourceSizeUsed:
|
|
|
|
|
case InfoType.ProgramId:
|
|
|
|
|
case InfoType.UserExceptionContextAddress:
|
|
|
|
|
case InfoType.TotalNonSystemMemorySize:
|
|
|
|
|
case InfoType.UsedNonSystemMemorySize:
|
|
|
|
|
case InfoType.IsApplication:
|
|
|
|
|
case InfoType.FreeThreadCount:
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
if (subId != 0)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidCombination;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
KProcess process = currentProcess.HandleTable.GetKProcess(handle);
|
|
|
|
|
|
|
|
|
|
if (process == null)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
switch (id)
|
|
|
|
|
{
|
2021-12-04 23:23:26 +00:00
|
|
|
|
case InfoType.CoreMask: value = process.Capabilities.AllowedCpuCoresMask; break;
|
|
|
|
|
case InfoType.PriorityMask: value = process.Capabilities.AllowedThreadPriosMask; break;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
case InfoType.AliasRegionAddress: value = process.MemoryManager.AliasRegionStart; break;
|
2021-12-04 23:23:26 +00:00
|
|
|
|
case InfoType.AliasRegionSize:
|
2022-01-29 21:18:03 +00:00
|
|
|
|
value = (process.MemoryManager.AliasRegionEnd -
|
|
|
|
|
process.MemoryManager.AliasRegionStart); break;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
case InfoType.HeapRegionAddress: value = process.MemoryManager.HeapRegionStart; break;
|
2021-12-04 23:23:26 +00:00
|
|
|
|
case InfoType.HeapRegionSize:
|
2022-01-29 21:18:03 +00:00
|
|
|
|
value = (process.MemoryManager.HeapRegionEnd -
|
|
|
|
|
process.MemoryManager.HeapRegionStart); break;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
case InfoType.TotalMemorySize: value = process.GetMemoryCapacity(); break;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
case InfoType.UsedMemorySize: value = process.GetMemoryUsage(); break;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
case InfoType.AslrRegionAddress: value = process.MemoryManager.GetAddrSpaceBaseAddr(); break;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
case InfoType.AslrRegionSize: value = process.MemoryManager.GetAddrSpaceSize(); break;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
case InfoType.StackRegionAddress: value = process.MemoryManager.StackRegionStart; break;
|
2021-12-04 23:23:26 +00:00
|
|
|
|
case InfoType.StackRegionSize:
|
2022-01-29 21:18:03 +00:00
|
|
|
|
value = (process.MemoryManager.StackRegionEnd -
|
|
|
|
|
process.MemoryManager.StackRegionStart); break;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
case InfoType.SystemResourceSizeTotal: value = process.PersonalMmHeapPagesCount * KPageTableBase.PageSize; break;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2021-12-04 23:23:26 +00:00
|
|
|
|
case InfoType.SystemResourceSizeUsed:
|
2020-05-04 04:41:29 +01:00
|
|
|
|
if (process.PersonalMmHeapPagesCount != 0)
|
|
|
|
|
{
|
POWER - Performance Optimizations With Extensive Ramifications (#2286)
* Refactoring of KMemoryManager class
* Replace some trivial uses of DRAM address with VA
* Get rid of GetDramAddressFromVa
* Abstracting more operations on derived page table class
* Run auto-format on KPageTableBase
* Managed to make TryConvertVaToPa private, few uses remains now
* Implement guest physical pages ref counting, remove manual freeing
* Make DoMmuOperation private and call new abstract methods only from the base class
* Pass pages count rather than size on Map/UnmapMemory
* Change memory managers to take host pointers
* Fix a guest memory leak and simplify KPageTable
* Expose new methods for host range query and mapping
* Some refactoring of MapPagesFromClientProcess to allow proper page ref counting and mapping without KPageLists
* Remove more uses of AddVaRangeToPageList, now only one remains (shared memory page checking)
* Add a SharedMemoryStorage class, will be useful for host mapping
* Sayonara AddVaRangeToPageList, you served us well
* Start to implement host memory mapping (WIP)
* Support memory tracking through host exception handling
* Fix some access violations from HLE service guest memory access and CPU
* Fix memory tracking
* Fix mapping list bugs, including a race and a error adding mapping ranges
* Simple page table for memory tracking
* Simple "volatile" region handle mode
* Update UBOs directly (experimental, rough)
* Fix the overlap check
* Only set non-modified buffers as volatile
* Fix some memory tracking issues
* Fix possible race in MapBufferFromClientProcess (block list updates were not locked)
* Write uniform update to memory immediately, only defer the buffer set.
* Fix some memory tracking issues
* Pass correct pages count on shared memory unmap
* Armeilleure Signal Handler v1 + Unix changes
Unix currently behaves like windows, rather than remapping physical
* Actually check if the host platform is unix
* Fix decommit on linux.
* Implement windows 10 placeholder shared memory, fix a buffer issue.
* Make PTC version something that will never match with master
* Remove testing variable for block count
* Add reference count for memory manager, fix dispose
Can still deadlock with OpenAL
* Add address validation, use page table for mapped check, add docs
Might clean up the page table traversing routines.
* Implement batched mapping/tracking.
* Move documentation, fix tests.
* Cleanup uniform buffer update stuff.
* Remove unnecessary assignment.
* Add unsafe host mapped memory switch
On by default. Would be good to turn this off for untrusted code (homebrew, exefs mods) and give the user the option to turn it on manually, though that requires some UI work.
* Remove C# exception handlers
They have issues due to current .NET limitations, so the meilleure one fully replaces them for now.
* Fix MapPhysicalMemory on the software MemoryManager.
* Null check for GetHostAddress, docs
* Add configuration for setting memory manager mode (not in UI yet)
* Add config to UI
* Fix type mismatch on Unix signal handler code emit
* Fix 6GB DRAM mode.
The size can be greater than `uint.MaxValue` when the DRAM is >4GB.
* Address some feedback.
* More detailed error if backing memory cannot be mapped.
* SetLastError on all OS functions for consistency
* Force pages dirty with UBO update instead of setting them directly.
Seems to be much faster across a few games. Need retesting.
* Rebase, configuration rework, fix mem tracking regression
* Fix race in FreePages
* Set memory managers null after decrementing ref count
* Remove readonly keyword, as this is now modified.
* Use a local variable for the signal handler rather than a register.
* Fix bug with buffer resize, and index/uniform buffer binding.
Should fix flickering in games.
* Add InvalidAccessHandler to MemoryTracking
Doesn't do anything yet
* Call invalid access handler on unmapped read/write.
Same rules as the regular memory manager.
* Make unsafe mapped memory its own MemoryManagerType
* Move FlushUboDirty into UpdateState.
* Buffer dirty cache, rather than ubo cache
Much cleaner, may be reusable for Inline2Memory updates.
* This doesn't return anything anymore.
* Add sigaction remove methods, correct a few function signatures.
* Return empty list of physical regions for size 0.
* Also on AddressSpaceManager
Co-authored-by: gdkchan <gab.dark.100@gmail.com>
2021-05-24 21:52:44 +01:00
|
|
|
|
value = process.MemoryManager.GetMmUsedPages() * KPageTableBase.PageSize;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
break;
|
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
case InfoType.ProgramId: value = process.TitleId; break;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
case InfoType.UserExceptionContextAddress: value = process.UserExceptionContextAddress; break;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
case InfoType.TotalNonSystemMemorySize: value = process.GetMemoryCapacityWithoutPersonalMmHeap(); break;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
case InfoType.UsedNonSystemMemorySize: value = process.GetMemoryUsageWithoutPersonalMmHeap(); break;
|
2021-12-04 23:23:26 +00:00
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
case InfoType.IsApplication: value = process.IsApplication ? 1UL : 0UL; break;
|
2021-12-04 23:23:26 +00:00
|
|
|
|
|
|
|
|
|
case InfoType.FreeThreadCount:
|
|
|
|
|
if (process.ResourceLimit != null)
|
|
|
|
|
{
|
2022-01-29 21:18:03 +00:00
|
|
|
|
value = (ulong)(process.ResourceLimit.GetLimitValue(LimitableResource.Thread) -
|
|
|
|
|
process.ResourceLimit.GetCurrentValue(LimitableResource.Thread));
|
2021-12-04 23:23:26 +00:00
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
value = 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
break;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
2021-12-04 23:23:26 +00:00
|
|
|
|
case InfoType.DebuggerAttached:
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
if (handle != 0)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (subId != 0)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidCombination;
|
|
|
|
|
}
|
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
value = KernelStatic.GetCurrentProcess().Debug ? 1UL : 0UL;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
2021-12-04 23:23:26 +00:00
|
|
|
|
case InfoType.ResourceLimit:
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
if (handle != 0)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (subId != 0)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidCombination;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
if (currentProcess.ResourceLimit != null)
|
|
|
|
|
{
|
|
|
|
|
KHandleTable handleTable = currentProcess.HandleTable;
|
|
|
|
|
KResourceLimit resourceLimit = currentProcess.ResourceLimit;
|
|
|
|
|
|
|
|
|
|
KernelResult result = handleTable.GenerateHandle(resourceLimit, out int resLimHandle);
|
|
|
|
|
|
|
|
|
|
if (result != KernelResult.Success)
|
|
|
|
|
{
|
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
value = (uint)resLimHandle;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
2021-12-04 23:23:26 +00:00
|
|
|
|
case InfoType.IdleTickCount:
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
if (handle != 0)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
int currentCore = KernelStatic.GetCurrentThread().CurrentCore;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
if (subId != -1 && subId != currentCore)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidCombination;
|
|
|
|
|
}
|
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
value = (ulong)KTimeManager.ConvertHostTicksToTicks(_context.Schedulers[currentCore].TotalIdleTimeTicks);
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
2021-12-04 23:23:26 +00:00
|
|
|
|
case InfoType.RandomEntropy:
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
if (handle != 0)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if ((ulong)subId > 3)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidCombination;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
value = currentProcess.RandomEntropy[subId];
|
|
|
|
|
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
2021-12-04 23:23:26 +00:00
|
|
|
|
case InfoType.ThreadTickCount:
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
if (subId < -1 || subId > 3)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidCombination;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KThread thread = KernelStatic.GetCurrentProcess().HandleTable.GetKThread(handle);
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
if (thread == null)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KThread currentThread = KernelStatic.GetCurrentThread();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
int currentCore = currentThread.CurrentCore;
|
|
|
|
|
|
|
|
|
|
if (subId != -1 && subId != currentCore)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.Success;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KScheduler scheduler = _context.Schedulers[currentCore];
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
long timeDelta = PerformanceCounter.ElapsedTicks - scheduler.LastContextSwitchTime;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
if (subId != -1)
|
|
|
|
|
{
|
2022-01-29 21:18:03 +00:00
|
|
|
|
value = (ulong)KTimeManager.ConvertHostTicksToTicks(timeDelta);
|
2020-05-04 04:41:29 +01:00
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
long totalTimeRunning = thread.TotalTimeRunning;
|
|
|
|
|
|
|
|
|
|
if (thread == currentThread)
|
|
|
|
|
{
|
|
|
|
|
totalTimeRunning += timeDelta;
|
|
|
|
|
}
|
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
value = (ulong)KTimeManager.ConvertHostTicksToTicks(totalTimeRunning);
|
2020-05-04 04:41:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
default: return KernelResult.InvalidEnumValue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return KernelResult.Success;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public KernelResult CreateEvent(out int wEventHandle, out int rEventHandle)
|
|
|
|
|
{
|
|
|
|
|
KEvent Event = new KEvent(_context);
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess process = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
KernelResult result = process.HandleTable.GenerateHandle(Event.WritableEvent, out wEventHandle);
|
|
|
|
|
|
|
|
|
|
if (result == KernelResult.Success)
|
|
|
|
|
{
|
|
|
|
|
result = process.HandleTable.GenerateHandle(Event.ReadableEvent, out rEventHandle);
|
|
|
|
|
|
|
|
|
|
if (result != KernelResult.Success)
|
|
|
|
|
{
|
|
|
|
|
process.HandleTable.CloseHandle(wEventHandle);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
rEventHandle = 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
public KernelResult GetProcessList(out int count, ulong address, int maxCount)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
count = 0;
|
|
|
|
|
|
|
|
|
|
if ((maxCount >> 28) != 0)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.MaximumExceeded;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (maxCount != 0)
|
|
|
|
|
{
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
ulong copySize = (ulong)maxCount * 8;
|
|
|
|
|
|
|
|
|
|
if (address + copySize <= address)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemState;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (currentProcess.MemoryManager.OutsideAddrSpace(address, copySize))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemState;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int copyCount = 0;
|
|
|
|
|
|
|
|
|
|
lock (_context.Processes)
|
|
|
|
|
{
|
|
|
|
|
foreach (KProcess process in _context.Processes.Values)
|
|
|
|
|
{
|
|
|
|
|
if (copyCount < maxCount)
|
|
|
|
|
{
|
2022-01-29 21:18:03 +00:00
|
|
|
|
if (!KernelTransfer.KernelToUser(address + (ulong)copyCount * 8, process.Pid))
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
return KernelResult.UserCopyFailed;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
copyCount++;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
count = copyCount;
|
|
|
|
|
|
|
|
|
|
return KernelResult.Success;
|
|
|
|
|
}
|
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
public KernelResult GetSystemInfo(out long value, uint id, int handle, long subId)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
value = 0;
|
|
|
|
|
|
|
|
|
|
if (id > 2)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidEnumValue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (handle != 0)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (id < 2)
|
|
|
|
|
{
|
|
|
|
|
if ((ulong)subId > 3)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidCombination;
|
|
|
|
|
}
|
|
|
|
|
|
POWER - Performance Optimizations With Extensive Ramifications (#2286)
* Refactoring of KMemoryManager class
* Replace some trivial uses of DRAM address with VA
* Get rid of GetDramAddressFromVa
* Abstracting more operations on derived page table class
* Run auto-format on KPageTableBase
* Managed to make TryConvertVaToPa private, few uses remains now
* Implement guest physical pages ref counting, remove manual freeing
* Make DoMmuOperation private and call new abstract methods only from the base class
* Pass pages count rather than size on Map/UnmapMemory
* Change memory managers to take host pointers
* Fix a guest memory leak and simplify KPageTable
* Expose new methods for host range query and mapping
* Some refactoring of MapPagesFromClientProcess to allow proper page ref counting and mapping without KPageLists
* Remove more uses of AddVaRangeToPageList, now only one remains (shared memory page checking)
* Add a SharedMemoryStorage class, will be useful for host mapping
* Sayonara AddVaRangeToPageList, you served us well
* Start to implement host memory mapping (WIP)
* Support memory tracking through host exception handling
* Fix some access violations from HLE service guest memory access and CPU
* Fix memory tracking
* Fix mapping list bugs, including a race and a error adding mapping ranges
* Simple page table for memory tracking
* Simple "volatile" region handle mode
* Update UBOs directly (experimental, rough)
* Fix the overlap check
* Only set non-modified buffers as volatile
* Fix some memory tracking issues
* Fix possible race in MapBufferFromClientProcess (block list updates were not locked)
* Write uniform update to memory immediately, only defer the buffer set.
* Fix some memory tracking issues
* Pass correct pages count on shared memory unmap
* Armeilleure Signal Handler v1 + Unix changes
Unix currently behaves like windows, rather than remapping physical
* Actually check if the host platform is unix
* Fix decommit on linux.
* Implement windows 10 placeholder shared memory, fix a buffer issue.
* Make PTC version something that will never match with master
* Remove testing variable for block count
* Add reference count for memory manager, fix dispose
Can still deadlock with OpenAL
* Add address validation, use page table for mapped check, add docs
Might clean up the page table traversing routines.
* Implement batched mapping/tracking.
* Move documentation, fix tests.
* Cleanup uniform buffer update stuff.
* Remove unnecessary assignment.
* Add unsafe host mapped memory switch
On by default. Would be good to turn this off for untrusted code (homebrew, exefs mods) and give the user the option to turn it on manually, though that requires some UI work.
* Remove C# exception handlers
They have issues due to current .NET limitations, so the meilleure one fully replaces them for now.
* Fix MapPhysicalMemory on the software MemoryManager.
* Null check for GetHostAddress, docs
* Add configuration for setting memory manager mode (not in UI yet)
* Add config to UI
* Fix type mismatch on Unix signal handler code emit
* Fix 6GB DRAM mode.
The size can be greater than `uint.MaxValue` when the DRAM is >4GB.
* Address some feedback.
* More detailed error if backing memory cannot be mapped.
* SetLastError on all OS functions for consistency
* Force pages dirty with UBO update instead of setting them directly.
Seems to be much faster across a few games. Need retesting.
* Rebase, configuration rework, fix mem tracking regression
* Fix race in FreePages
* Set memory managers null after decrementing ref count
* Remove readonly keyword, as this is now modified.
* Use a local variable for the signal handler rather than a register.
* Fix bug with buffer resize, and index/uniform buffer binding.
Should fix flickering in games.
* Add InvalidAccessHandler to MemoryTracking
Doesn't do anything yet
* Call invalid access handler on unmapped read/write.
Same rules as the regular memory manager.
* Make unsafe mapped memory its own MemoryManagerType
* Move FlushUboDirty into UpdateState.
* Buffer dirty cache, rather than ubo cache
Much cleaner, may be reusable for Inline2Memory updates.
* This doesn't return anything anymore.
* Add sigaction remove methods, correct a few function signatures.
* Return empty list of physical regions for size 0.
* Also on AddressSpaceManager
Co-authored-by: gdkchan <gab.dark.100@gmail.com>
2021-05-24 21:52:44 +01:00
|
|
|
|
KMemoryRegionManager region = _context.MemoryManager.MemoryRegions[subId];
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
switch (id)
|
|
|
|
|
{
|
|
|
|
|
// Memory region capacity.
|
|
|
|
|
case 0: value = (long)region.Size; break;
|
|
|
|
|
|
|
|
|
|
// Memory region free space.
|
|
|
|
|
case 1:
|
|
|
|
|
{
|
|
|
|
|
ulong freePagesCount = region.GetFreePages();
|
|
|
|
|
|
POWER - Performance Optimizations With Extensive Ramifications (#2286)
* Refactoring of KMemoryManager class
* Replace some trivial uses of DRAM address with VA
* Get rid of GetDramAddressFromVa
* Abstracting more operations on derived page table class
* Run auto-format on KPageTableBase
* Managed to make TryConvertVaToPa private, few uses remains now
* Implement guest physical pages ref counting, remove manual freeing
* Make DoMmuOperation private and call new abstract methods only from the base class
* Pass pages count rather than size on Map/UnmapMemory
* Change memory managers to take host pointers
* Fix a guest memory leak and simplify KPageTable
* Expose new methods for host range query and mapping
* Some refactoring of MapPagesFromClientProcess to allow proper page ref counting and mapping without KPageLists
* Remove more uses of AddVaRangeToPageList, now only one remains (shared memory page checking)
* Add a SharedMemoryStorage class, will be useful for host mapping
* Sayonara AddVaRangeToPageList, you served us well
* Start to implement host memory mapping (WIP)
* Support memory tracking through host exception handling
* Fix some access violations from HLE service guest memory access and CPU
* Fix memory tracking
* Fix mapping list bugs, including a race and a error adding mapping ranges
* Simple page table for memory tracking
* Simple "volatile" region handle mode
* Update UBOs directly (experimental, rough)
* Fix the overlap check
* Only set non-modified buffers as volatile
* Fix some memory tracking issues
* Fix possible race in MapBufferFromClientProcess (block list updates were not locked)
* Write uniform update to memory immediately, only defer the buffer set.
* Fix some memory tracking issues
* Pass correct pages count on shared memory unmap
* Armeilleure Signal Handler v1 + Unix changes
Unix currently behaves like windows, rather than remapping physical
* Actually check if the host platform is unix
* Fix decommit on linux.
* Implement windows 10 placeholder shared memory, fix a buffer issue.
* Make PTC version something that will never match with master
* Remove testing variable for block count
* Add reference count for memory manager, fix dispose
Can still deadlock with OpenAL
* Add address validation, use page table for mapped check, add docs
Might clean up the page table traversing routines.
* Implement batched mapping/tracking.
* Move documentation, fix tests.
* Cleanup uniform buffer update stuff.
* Remove unnecessary assignment.
* Add unsafe host mapped memory switch
On by default. Would be good to turn this off for untrusted code (homebrew, exefs mods) and give the user the option to turn it on manually, though that requires some UI work.
* Remove C# exception handlers
They have issues due to current .NET limitations, so the meilleure one fully replaces them for now.
* Fix MapPhysicalMemory on the software MemoryManager.
* Null check for GetHostAddress, docs
* Add configuration for setting memory manager mode (not in UI yet)
* Add config to UI
* Fix type mismatch on Unix signal handler code emit
* Fix 6GB DRAM mode.
The size can be greater than `uint.MaxValue` when the DRAM is >4GB.
* Address some feedback.
* More detailed error if backing memory cannot be mapped.
* SetLastError on all OS functions for consistency
* Force pages dirty with UBO update instead of setting them directly.
Seems to be much faster across a few games. Need retesting.
* Rebase, configuration rework, fix mem tracking regression
* Fix race in FreePages
* Set memory managers null after decrementing ref count
* Remove readonly keyword, as this is now modified.
* Use a local variable for the signal handler rather than a register.
* Fix bug with buffer resize, and index/uniform buffer binding.
Should fix flickering in games.
* Add InvalidAccessHandler to MemoryTracking
Doesn't do anything yet
* Call invalid access handler on unmapped read/write.
Same rules as the regular memory manager.
* Make unsafe mapped memory its own MemoryManagerType
* Move FlushUboDirty into UpdateState.
* Buffer dirty cache, rather than ubo cache
Much cleaner, may be reusable for Inline2Memory updates.
* This doesn't return anything anymore.
* Add sigaction remove methods, correct a few function signatures.
* Return empty list of physical regions for size 0.
* Also on AddressSpaceManager
Co-authored-by: gdkchan <gab.dark.100@gmail.com>
2021-05-24 21:52:44 +01:00
|
|
|
|
value = (long)(freePagesCount * KPageTableBase.PageSize);
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
else /* if (Id == 2) */
|
|
|
|
|
{
|
|
|
|
|
if ((ulong)subId > 1)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidCombination;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
switch (subId)
|
|
|
|
|
{
|
|
|
|
|
case 0: value = _context.PrivilegedProcessLowestId; break;
|
|
|
|
|
case 1: value = _context.PrivilegedProcessHighestId; break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return KernelResult.Success;
|
|
|
|
|
}
|
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
public KernelResult GetResourceLimitLimitValue(out long limitValue, int handle, LimitableResource resource)
|
2021-10-24 00:40:13 +01:00
|
|
|
|
{
|
|
|
|
|
limitValue = 0;
|
|
|
|
|
|
|
|
|
|
if (resource >= LimitableResource.Count)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidEnumValue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
KResourceLimit resourceLimit = KernelStatic.GetCurrentProcess().HandleTable.GetObject<KResourceLimit>(handle);
|
|
|
|
|
|
|
|
|
|
if (resourceLimit == null)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
limitValue = resourceLimit.GetLimitValue(resource);
|
|
|
|
|
|
|
|
|
|
return KernelResult.Success;
|
|
|
|
|
}
|
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
public KernelResult GetResourceLimitCurrentValue(out long limitValue, int handle, LimitableResource resource)
|
2021-10-24 00:40:13 +01:00
|
|
|
|
{
|
|
|
|
|
limitValue = 0;
|
|
|
|
|
|
|
|
|
|
if (resource >= LimitableResource.Count)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidEnumValue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
KResourceLimit resourceLimit = KernelStatic.GetCurrentProcess().HandleTable.GetObject<KResourceLimit>(handle);
|
|
|
|
|
|
|
|
|
|
if (resourceLimit == null)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
limitValue = resourceLimit.GetCurrentValue(resource);
|
|
|
|
|
|
|
|
|
|
return KernelResult.Success;
|
|
|
|
|
}
|
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
public KernelResult GetResourceLimitPeakValue(out long peak, int handle, LimitableResource resource)
|
2021-10-24 00:40:13 +01:00
|
|
|
|
{
|
|
|
|
|
peak = 0;
|
|
|
|
|
|
|
|
|
|
if (resource >= LimitableResource.Count)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidEnumValue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
KResourceLimit resourceLimit = KernelStatic.GetCurrentProcess().HandleTable.GetObject<KResourceLimit>(handle);
|
|
|
|
|
|
|
|
|
|
if (resourceLimit == null)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
peak = resourceLimit.GetPeakValue(resource);
|
|
|
|
|
|
|
|
|
|
return KernelResult.Success;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public KernelResult CreateResourceLimit(out int handle)
|
|
|
|
|
{
|
|
|
|
|
KResourceLimit limit = new KResourceLimit(_context);
|
|
|
|
|
|
|
|
|
|
KProcess process = KernelStatic.GetCurrentProcess();
|
|
|
|
|
|
|
|
|
|
return process.HandleTable.GenerateHandle(limit, out handle);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public KernelResult SetResourceLimitLimitValue(int handle, LimitableResource resource, long limitValue)
|
|
|
|
|
{
|
|
|
|
|
if (resource >= LimitableResource.Count)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidEnumValue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
KResourceLimit resourceLimit = KernelStatic.GetCurrentProcess().HandleTable.GetObject<KResourceLimit>(handle);
|
|
|
|
|
|
|
|
|
|
if (resourceLimit == null)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return resourceLimit.SetLimitValue(resource, limitValue);
|
|
|
|
|
}
|
|
|
|
|
|
2020-05-04 04:41:29 +01:00
|
|
|
|
// Thread
|
|
|
|
|
|
|
|
|
|
public KernelResult CreateThread(
|
2022-01-29 21:18:03 +00:00
|
|
|
|
out int handle,
|
2020-05-04 04:41:29 +01:00
|
|
|
|
ulong entrypoint,
|
|
|
|
|
ulong argsPtr,
|
|
|
|
|
ulong stackTop,
|
|
|
|
|
int priority,
|
2022-01-29 21:18:03 +00:00
|
|
|
|
int cpuCore)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
handle = 0;
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
if (cpuCore == -2)
|
|
|
|
|
{
|
|
|
|
|
cpuCore = currentProcess.DefaultCpuCore;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if ((uint)cpuCore >= KScheduler.CpuCoresCount || !currentProcess.IsCpuCoreAllowed(cpuCore))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidCpuCore;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if ((uint)priority >= KScheduler.PrioritiesCount || !currentProcess.IsPriorityAllowed(priority))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidPriority;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
long timeout = KTimeManager.ConvertMillisecondsToNanoseconds(100);
|
|
|
|
|
|
|
|
|
|
if (currentProcess.ResourceLimit != null &&
|
|
|
|
|
!currentProcess.ResourceLimit.Reserve(LimitableResource.Thread, 1, timeout))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.ResLimitExceeded;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
KThread thread = new KThread(_context);
|
|
|
|
|
|
|
|
|
|
KernelResult result = currentProcess.InitializeThread(
|
|
|
|
|
thread,
|
|
|
|
|
entrypoint,
|
|
|
|
|
argsPtr,
|
|
|
|
|
stackTop,
|
|
|
|
|
priority,
|
|
|
|
|
cpuCore);
|
|
|
|
|
|
|
|
|
|
if (result == KernelResult.Success)
|
|
|
|
|
{
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess process = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
result = process.HandleTable.GenerateHandle(thread, out handle);
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
currentProcess.ResourceLimit?.Release(LimitableResource.Thread, 1);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
thread.DecrementReferenceCount();
|
|
|
|
|
|
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public KernelResult StartThread(int handle)
|
|
|
|
|
{
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess process = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
KThread thread = process.HandleTable.GetKThread(handle);
|
|
|
|
|
|
|
|
|
|
if (thread != null)
|
|
|
|
|
{
|
|
|
|
|
thread.IncrementReferenceCount();
|
|
|
|
|
|
|
|
|
|
KernelResult result = thread.Start();
|
|
|
|
|
|
|
|
|
|
if (result == KernelResult.Success)
|
|
|
|
|
{
|
|
|
|
|
thread.IncrementReferenceCount();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
thread.DecrementReferenceCount();
|
|
|
|
|
|
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public void ExitThread()
|
|
|
|
|
{
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KThread currentThread = KernelStatic.GetCurrentThread();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
currentThread.Exit();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public void SleepThread(long timeout)
|
|
|
|
|
{
|
|
|
|
|
if (timeout < 1)
|
|
|
|
|
{
|
|
|
|
|
switch (timeout)
|
|
|
|
|
{
|
2020-12-09 22:20:05 +00:00
|
|
|
|
case 0: KScheduler.Yield(_context); break;
|
|
|
|
|
case -1: KScheduler.YieldWithLoadBalancing(_context); break;
|
|
|
|
|
case -2: KScheduler.YieldToAnyThread(_context); break;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
2021-11-28 12:15:26 +00:00
|
|
|
|
KernelStatic.GetCurrentThread().Sleep(timeout + KTimeManager.DefaultTimeIncrementNanoseconds);
|
2020-05-04 04:41:29 +01:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
public KernelResult GetThreadPriority(out int priority, int handle)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess process = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
KThread thread = process.HandleTable.GetKThread(handle);
|
|
|
|
|
|
|
|
|
|
if (thread != null)
|
|
|
|
|
{
|
|
|
|
|
priority = thread.DynamicPriority;
|
|
|
|
|
|
|
|
|
|
return KernelResult.Success;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
priority = 0;
|
|
|
|
|
|
|
|
|
|
return KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public KernelResult SetThreadPriority(int handle, int priority)
|
|
|
|
|
{
|
|
|
|
|
// TODO: NPDM check.
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess process = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
KThread thread = process.HandleTable.GetKThread(handle);
|
|
|
|
|
|
|
|
|
|
if (thread == null)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
thread.SetPriority(priority);
|
|
|
|
|
|
|
|
|
|
return KernelResult.Success;
|
|
|
|
|
}
|
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
public KernelResult GetThreadCoreMask(out int preferredCore, out ulong affinityMask, int handle)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess process = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
KThread thread = process.HandleTable.GetKThread(handle);
|
|
|
|
|
|
|
|
|
|
if (thread != null)
|
|
|
|
|
{
|
|
|
|
|
preferredCore = thread.PreferredCore;
|
|
|
|
|
affinityMask = thread.AffinityMask;
|
|
|
|
|
|
|
|
|
|
return KernelResult.Success;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
preferredCore = 0;
|
|
|
|
|
affinityMask = 0;
|
|
|
|
|
|
|
|
|
|
return KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
public KernelResult SetThreadCoreMask(int handle, int preferredCore, ulong affinityMask)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
if (preferredCore == -2)
|
|
|
|
|
{
|
|
|
|
|
preferredCore = currentProcess.DefaultCpuCore;
|
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
affinityMask = 1UL << preferredCore;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
if ((currentProcess.Capabilities.AllowedCpuCoresMask | affinityMask) !=
|
|
|
|
|
currentProcess.Capabilities.AllowedCpuCoresMask)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidCpuCore;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (affinityMask == 0)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidCombination;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if ((uint)preferredCore > 3)
|
|
|
|
|
{
|
|
|
|
|
if ((preferredCore | 2) != -1)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidCpuCore;
|
|
|
|
|
}
|
|
|
|
|
}
|
2022-01-29 21:18:03 +00:00
|
|
|
|
else if ((affinityMask & (1UL << preferredCore)) == 0)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidCombination;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess process = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
KThread thread = process.HandleTable.GetKThread(handle);
|
|
|
|
|
|
|
|
|
|
if (thread == null)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return thread.SetCoreAndAffinityMask(preferredCore, affinityMask);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public int GetCurrentProcessorNumber()
|
|
|
|
|
{
|
2020-12-09 22:20:05 +00:00
|
|
|
|
return KernelStatic.GetCurrentThread().CurrentCore;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
2022-02-09 20:18:07 +00:00
|
|
|
|
public KernelResult GetThreadId(out ulong threadUid, int handle)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess process = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
KThread thread = process.HandleTable.GetKThread(handle);
|
|
|
|
|
|
|
|
|
|
if (thread != null)
|
|
|
|
|
{
|
|
|
|
|
threadUid = thread.ThreadUid;
|
|
|
|
|
|
|
|
|
|
return KernelResult.Success;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
threadUid = 0;
|
|
|
|
|
|
|
|
|
|
return KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public KernelResult SetThreadActivity(int handle, bool pause)
|
|
|
|
|
{
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess process = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
KThread thread = process.HandleTable.GetObject<KThread>(handle);
|
|
|
|
|
|
|
|
|
|
if (thread == null)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (thread.Owner != process)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
if (thread == KernelStatic.GetCurrentThread())
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidThread;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return thread.SetActivity(pause);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public KernelResult GetThreadContext3(ulong address, int handle)
|
|
|
|
|
{
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
|
|
|
|
KThread currentThread = KernelStatic.GetCurrentThread();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
KThread thread = currentProcess.HandleTable.GetObject<KThread>(handle);
|
|
|
|
|
|
|
|
|
|
if (thread == null)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (thread.Owner != currentProcess)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (currentThread == thread)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidThread;
|
|
|
|
|
}
|
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
KernelResult result = thread.GetThreadContext3(out ThreadContext context);
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
if (result == KernelResult.Success)
|
|
|
|
|
{
|
|
|
|
|
return KernelTransfer.KernelToUser(address, context)
|
|
|
|
|
? KernelResult.Success
|
|
|
|
|
: KernelResult.InvalidMemState;
|
|
|
|
|
}
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
return result;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Thread synchronization
|
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
public KernelResult WaitSynchronization(out int handleIndex, ulong handlesPtr, int handlesCount, long timeout)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
handleIndex = 0;
|
|
|
|
|
|
2020-07-17 05:22:13 +01:00
|
|
|
|
if ((uint)handlesCount > KThread.MaxWaitSyncObjects)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
|
|
|
|
return KernelResult.MaximumExceeded;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KThread currentThread = KernelStatic.GetCurrentThread();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2020-07-17 05:22:13 +01:00
|
|
|
|
var syncObjs = new Span<KSynchronizationObject>(currentThread.WaitSyncObjects).Slice(0, handlesCount);
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2020-07-17 05:22:13 +01:00
|
|
|
|
if (handlesCount != 0)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2020-07-17 05:22:13 +01:00
|
|
|
|
if (currentProcess.MemoryManager.AddrSpaceStart > handlesPtr)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.UserCopyFailed;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
long handlesSize = handlesCount * 4;
|
|
|
|
|
|
|
|
|
|
if (handlesPtr + (ulong)handlesSize <= handlesPtr)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.UserCopyFailed;
|
|
|
|
|
}
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2020-07-17 05:22:13 +01:00
|
|
|
|
if (handlesPtr + (ulong)handlesSize - 1 > currentProcess.MemoryManager.AddrSpaceEnd - 1)
|
2020-05-04 04:41:29 +01:00
|
|
|
|
{
|
2020-07-17 05:22:13 +01:00
|
|
|
|
return KernelResult.UserCopyFailed;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
2020-07-17 05:22:13 +01:00
|
|
|
|
Span<int> handles = new Span<int>(currentThread.WaitSyncHandles).Slice(0, handlesCount);
|
|
|
|
|
|
2022-01-29 21:18:03 +00:00
|
|
|
|
if (!KernelTransfer.UserToKernelArray(handlesPtr, handles))
|
2020-07-17 05:22:13 +01:00
|
|
|
|
{
|
|
|
|
|
return KernelResult.UserCopyFailed;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int processedHandles = 0;
|
|
|
|
|
|
|
|
|
|
for (; processedHandles < handlesCount; processedHandles++)
|
|
|
|
|
{
|
|
|
|
|
KSynchronizationObject syncObj = currentProcess.HandleTable.GetObject<KSynchronizationObject>(handles[processedHandles]);
|
|
|
|
|
|
|
|
|
|
if (syncObj == null)
|
|
|
|
|
{
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
syncObjs[processedHandles] = syncObj;
|
|
|
|
|
|
|
|
|
|
syncObj.IncrementReferenceCount();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (processedHandles != handlesCount)
|
|
|
|
|
{
|
|
|
|
|
// One or more handles are invalid.
|
|
|
|
|
for (int index = 0; index < processedHandles; index++)
|
|
|
|
|
{
|
|
|
|
|
currentThread.WaitSyncObjects[index].DecrementReferenceCount();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return KernelResult.InvalidHandle;
|
|
|
|
|
}
|
2020-05-04 04:41:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
2021-11-28 12:15:26 +00:00
|
|
|
|
if (timeout > 0)
|
|
|
|
|
{
|
|
|
|
|
timeout += KTimeManager.DefaultTimeIncrementNanoseconds;
|
|
|
|
|
}
|
|
|
|
|
|
2020-07-17 05:22:13 +01:00
|
|
|
|
KernelResult result = _context.Synchronization.WaitFor(syncObjs, timeout, out handleIndex);
|
|
|
|
|
|
|
|
|
|
if (result == KernelResult.PortRemoteClosed)
|
|
|
|
|
{
|
|
|
|
|
result = KernelResult.Success;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for (int index = 0; index < handlesCount; index++)
|
|
|
|
|
{
|
|
|
|
|
currentThread.WaitSyncObjects[index].DecrementReferenceCount();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return result;
|
2020-05-04 04:41:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public KernelResult CancelSynchronization(int handle)
|
|
|
|
|
{
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess process = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
KThread thread = process.HandleTable.GetKThread(handle);
|
|
|
|
|
|
|
|
|
|
if (thread == null)
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidHandle;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
thread.CancelSynchronization();
|
|
|
|
|
|
|
|
|
|
return KernelResult.Success;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public KernelResult ArbitrateLock(int ownerHandle, ulong mutexAddress, int requesterHandle)
|
|
|
|
|
{
|
|
|
|
|
if (IsPointingInsideKernel(mutexAddress))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemState;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (IsAddressNotWordAligned(mutexAddress))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidAddress;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
return currentProcess.AddressArbiter.ArbitrateLock(ownerHandle, mutexAddress, requesterHandle);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public KernelResult ArbitrateUnlock(ulong mutexAddress)
|
|
|
|
|
{
|
|
|
|
|
if (IsPointingInsideKernel(mutexAddress))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemState;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (IsAddressNotWordAligned(mutexAddress))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidAddress;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
return currentProcess.AddressArbiter.ArbitrateUnlock(mutexAddress);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public KernelResult WaitProcessWideKeyAtomic(
|
|
|
|
|
ulong mutexAddress,
|
|
|
|
|
ulong condVarAddress,
|
|
|
|
|
int handle,
|
|
|
|
|
long timeout)
|
|
|
|
|
{
|
|
|
|
|
if (IsPointingInsideKernel(mutexAddress))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemState;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (IsAddressNotWordAligned(mutexAddress))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidAddress;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2021-11-28 12:15:26 +00:00
|
|
|
|
if (timeout > 0)
|
|
|
|
|
{
|
|
|
|
|
timeout += KTimeManager.DefaultTimeIncrementNanoseconds;
|
|
|
|
|
}
|
|
|
|
|
|
2020-05-04 04:41:29 +01:00
|
|
|
|
return currentProcess.AddressArbiter.WaitProcessWideKeyAtomic(
|
|
|
|
|
mutexAddress,
|
|
|
|
|
condVarAddress,
|
|
|
|
|
handle,
|
|
|
|
|
timeout);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public KernelResult SignalProcessWideKey(ulong address, int count)
|
|
|
|
|
{
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
currentProcess.AddressArbiter.SignalProcessWideKey(address, count);
|
|
|
|
|
|
|
|
|
|
return KernelResult.Success;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public KernelResult WaitForAddress(ulong address, ArbitrationType type, int value, long timeout)
|
|
|
|
|
{
|
|
|
|
|
if (IsPointingInsideKernel(address))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemState;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (IsAddressNotWordAligned(address))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidAddress;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
2021-11-28 12:15:26 +00:00
|
|
|
|
if (timeout > 0)
|
|
|
|
|
{
|
|
|
|
|
timeout += KTimeManager.DefaultTimeIncrementNanoseconds;
|
|
|
|
|
}
|
|
|
|
|
|
2020-05-04 04:41:29 +01:00
|
|
|
|
return type switch
|
|
|
|
|
{
|
|
|
|
|
ArbitrationType.WaitIfLessThan
|
|
|
|
|
=> currentProcess.AddressArbiter.WaitForAddressIfLessThan(address, value, false, timeout),
|
|
|
|
|
ArbitrationType.DecrementAndWaitIfLessThan
|
|
|
|
|
=> currentProcess.AddressArbiter.WaitForAddressIfLessThan(address, value, true, timeout),
|
|
|
|
|
ArbitrationType.WaitIfEqual
|
|
|
|
|
=> currentProcess.AddressArbiter.WaitForAddressIfEqual(address, value, timeout),
|
|
|
|
|
_ => KernelResult.InvalidEnumValue,
|
|
|
|
|
};
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public KernelResult SignalToAddress(ulong address, SignalType type, int value, int count)
|
|
|
|
|
{
|
|
|
|
|
if (IsPointingInsideKernel(address))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidMemState;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (IsAddressNotWordAligned(address))
|
|
|
|
|
{
|
|
|
|
|
return KernelResult.InvalidAddress;
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-09 22:20:05 +00:00
|
|
|
|
KProcess currentProcess = KernelStatic.GetCurrentProcess();
|
2020-05-04 04:41:29 +01:00
|
|
|
|
|
|
|
|
|
return type switch
|
|
|
|
|
{
|
|
|
|
|
SignalType.Signal
|
|
|
|
|
=> currentProcess.AddressArbiter.Signal(address, count),
|
|
|
|
|
SignalType.SignalAndIncrementIfEqual
|
|
|
|
|
=> currentProcess.AddressArbiter.SignalAndIncrementIfEqual(address, value, count),
|
|
|
|
|
SignalType.SignalAndModifyIfEqual
|
|
|
|
|
=> currentProcess.AddressArbiter.SignalAndModifyIfEqual(address, value, count),
|
|
|
|
|
_ => KernelResult.InvalidEnumValue
|
|
|
|
|
};
|
|
|
|
|
}
|
|
|
|
|
|
2021-12-30 09:55:06 +00:00
|
|
|
|
public KernelResult SynchronizePreemptionState()
|
|
|
|
|
{
|
|
|
|
|
KernelStatic.GetCurrentThread().SynchronizePreemptionState();
|
|
|
|
|
|
|
|
|
|
return KernelResult.Success;
|
|
|
|
|
}
|
|
|
|
|
|
2020-05-04 04:41:29 +01:00
|
|
|
|
private bool IsPointingInsideKernel(ulong address)
|
|
|
|
|
{
|
|
|
|
|
return (address + 0x1000000000) < 0xffffff000;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
private bool IsAddressNotWordAligned(ulong address)
|
|
|
|
|
{
|
|
|
|
|
return (address & 3) != 0;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|