2020-07-13 07:36:17 +01:00
|
|
|
/*
|
|
|
|
* mem.c
|
|
|
|
*
|
|
|
|
* Copyright (c) 2019, shchmue.
|
2022-03-17 12:58:40 +00:00
|
|
|
* Copyright (c) 2020-2022, DarkMatterCore <pabloacurielz@gmail.com>.
|
2020-07-13 07:36:17 +01:00
|
|
|
*
|
|
|
|
* This file is part of nxdumptool (https://github.com/DarkMatterCore/nxdumptool).
|
|
|
|
*
|
2021-03-25 19:26:58 +00:00
|
|
|
* nxdumptool is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
|
|
* (at your option) any later version.
|
2020-07-13 07:36:17 +01:00
|
|
|
*
|
2021-03-25 19:26:58 +00:00
|
|
|
* nxdumptool is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
2020-07-13 07:36:17 +01:00
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
2021-03-25 19:26:58 +00:00
|
|
|
* along with this program. If not, see <https://www.gnu.org/licenses/>.
|
2020-07-13 07:36:17 +01:00
|
|
|
*/
|
|
|
|
|
2021-03-26 04:35:14 +00:00
|
|
|
#include "nxdt_utils.h"
|
2020-07-13 07:36:17 +01:00
|
|
|
#include "mem.h"
|
|
|
|
|
2021-03-07 23:22:49 +00:00
|
|
|
#define MEMLOG(fmt, ...) LOG_MSG_BUF(&g_memLogBuf, &g_memLogBufSize, fmt, ##__VA_ARGS__)
|
2020-07-13 07:36:17 +01:00
|
|
|
|
|
|
|
/* Global variables. */
|
|
|
|
|
2021-03-07 23:22:49 +00:00
|
|
|
static Mutex g_memMutex = 0;
|
|
|
|
|
2020-10-02 10:53:58 +01:00
|
|
|
static char *g_memLogBuf = NULL;
|
|
|
|
static size_t g_memLogBufSize = 0;
|
2020-07-13 07:36:17 +01:00
|
|
|
|
|
|
|
/* Function prototypes. */
|
|
|
|
|
|
|
|
static bool memRetrieveProgramMemory(MemoryLocation *location, bool is_segment);
|
|
|
|
static bool memRetrieveDebugHandleFromProgramById(Handle *out, u64 program_id);
|
|
|
|
|
|
|
|
bool memRetrieveProgramMemorySegment(MemoryLocation *location)
|
|
|
|
{
|
|
|
|
if (!location || !location->program_id || !location->mask || location->mask >= BIT(3))
|
|
|
|
{
|
2021-03-07 23:22:49 +00:00
|
|
|
LOG_MSG("Invalid parameters!");
|
2020-07-13 07:36:17 +01:00
|
|
|
return false;
|
|
|
|
}
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2021-05-18 13:32:43 +01:00
|
|
|
bool ret = false;
|
|
|
|
SCOPED_LOCK(&g_memMutex) ret = memRetrieveProgramMemory(location, true);
|
2020-07-13 07:36:17 +01:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool memRetrieveFullProgramMemory(MemoryLocation *location)
|
|
|
|
{
|
|
|
|
if (!location || !location->program_id)
|
|
|
|
{
|
2021-03-07 23:22:49 +00:00
|
|
|
LOG_MSG("Invalid parameters!");
|
2020-07-13 07:36:17 +01:00
|
|
|
return false;
|
|
|
|
}
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2021-05-18 13:32:43 +01:00
|
|
|
bool ret = false;
|
|
|
|
SCOPED_LOCK(&g_memMutex) ret = memRetrieveProgramMemory(location, false);
|
2020-07-13 07:36:17 +01:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool memRetrieveProgramMemory(MemoryLocation *location, bool is_segment)
|
|
|
|
{
|
|
|
|
Result rc = 0;
|
|
|
|
Handle debug_handle = INVALID_HANDLE;
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2020-07-13 07:36:17 +01:00
|
|
|
MemoryInfo mem_info = {0};
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2020-07-13 07:36:17 +01:00
|
|
|
u32 page_info = 0;
|
|
|
|
u64 addr = 0, last_text_addr = 0;
|
|
|
|
u8 segment = 1, mem_type = 0;
|
|
|
|
u8 *tmp = NULL;
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2020-07-13 07:36:17 +01:00
|
|
|
bool success = true;
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2021-05-11 07:00:33 +01:00
|
|
|
/* Make sure we have access to debug SVC calls. */
|
|
|
|
if (!(envIsSyscallHinted(0x60) && /* svcDebugActiveProcess. */
|
|
|
|
envIsSyscallHinted(0x63) && /* svcGetDebugEvent. */
|
|
|
|
envIsSyscallHinted(0x65) && /* svcGetProcessList. */
|
|
|
|
envIsSyscallHinted(0x69) && /* svcQueryDebugProcessMemory. */
|
|
|
|
envIsSyscallHinted(0x6A))) /* svcReadDebugProcessMemory. */
|
|
|
|
{
|
|
|
|
LOG_MSG("Debug SVC permissions not available!");
|
|
|
|
return false;
|
|
|
|
}
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2020-07-13 07:36:17 +01:00
|
|
|
/* Clear output MemoryLocation element. */
|
|
|
|
memFreeMemoryLocation(location);
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2021-03-07 23:22:49 +00:00
|
|
|
/* LOG_MSG() will be useless if the target program is the FS sysmodule. */
|
2020-07-13 07:36:17 +01:00
|
|
|
/* This is because any FS I/O operation *will* lock up the console while FS itself is being debugged. */
|
2021-03-07 23:22:49 +00:00
|
|
|
/* So we'll just temporarily log data to a char array using LOG_MSG_BUF(), then write it all out after calling svcCloseHandle(). */
|
2020-07-13 07:36:17 +01:00
|
|
|
/* However, we must prevent other threads from logging data as well in order to avoid a lock up, so we'll temporarily lock the logfile mutex. */
|
2021-03-07 23:22:49 +00:00
|
|
|
logControlMutex(true);
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2020-07-13 07:36:17 +01:00
|
|
|
/* Retrieve debug handle by program ID. */
|
|
|
|
if (!memRetrieveDebugHandleFromProgramById(&debug_handle, location->program_id))
|
|
|
|
{
|
|
|
|
MEMLOG("Unable to retrieve debug handle for program %016lX!", location->program_id);
|
|
|
|
goto end;
|
|
|
|
}
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2020-07-13 07:36:17 +01:00
|
|
|
if (is_segment && location->program_id == FS_SYSMODULE_TID)
|
|
|
|
{
|
2021-02-25 03:36:53 +00:00
|
|
|
/* If dealing with FS, locate the "real" .text segment, since Atmosphère emuMMC has two. */
|
2020-07-13 07:36:17 +01:00
|
|
|
do {
|
|
|
|
rc = svcQueryDebugProcessMemory(&mem_info, &page_info, debug_handle, addr);
|
|
|
|
if (R_FAILED(rc))
|
|
|
|
{
|
|
|
|
MEMLOG("svcQueryDebugProcessMemory failed for program %016lX! (0x%08X).", location->program_id, rc);
|
|
|
|
success = false;
|
|
|
|
goto end;
|
|
|
|
}
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2020-07-13 07:36:17 +01:00
|
|
|
mem_type = (u8)(mem_info.type & 0xFF);
|
|
|
|
if ((mem_info.perm & Perm_X) && (mem_type == MemType_CodeStatic || mem_type == MemType_CodeMutable)) last_text_addr = mem_info.addr;
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2020-07-13 07:36:17 +01:00
|
|
|
addr = (mem_info.addr + mem_info.size);
|
|
|
|
} while(addr != 0);
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2020-07-13 07:36:17 +01:00
|
|
|
addr = last_text_addr;
|
|
|
|
}
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2020-07-13 07:36:17 +01:00
|
|
|
do {
|
|
|
|
rc = svcQueryDebugProcessMemory(&mem_info, &page_info, debug_handle, addr);
|
|
|
|
if (R_FAILED(rc))
|
|
|
|
{
|
|
|
|
MEMLOG("svcQueryDebugProcessMemory failed for program %016lX! (0x%08X).", location->program_id, rc);
|
|
|
|
success = false;
|
|
|
|
break;
|
|
|
|
}
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2020-07-13 07:36:17 +01:00
|
|
|
mem_type = (u8)(mem_info.type & 0xFF);
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2020-07-13 07:36:17 +01:00
|
|
|
/* Code to allow for bitmasking segments. */
|
2020-10-21 05:27:48 +01:00
|
|
|
if ((mem_info.perm & Perm_R) && ((!is_segment && !mem_info.attr && (location->program_id != FS_SYSMODULE_TID || (location->program_id == FS_SYSMODULE_TID && mem_type != MemType_Unmapped && \
|
|
|
|
mem_type != MemType_Io && mem_type != MemType_ThreadLocal && mem_type != MemType_Reserved))) || (is_segment && (mem_type == MemType_CodeStatic || mem_type == MemType_CodeMutable) && \
|
|
|
|
(((segment <<= 1) >> 1) & location->mask))))
|
2020-07-13 07:36:17 +01:00
|
|
|
{
|
2021-03-10 01:12:01 +00:00
|
|
|
/* Reallocate data buffer. */
|
2020-07-13 07:36:17 +01:00
|
|
|
tmp = realloc(location->data, location->data_size + mem_info.size);
|
|
|
|
if (!tmp)
|
|
|
|
{
|
|
|
|
MEMLOG("Failed to resize segment data buffer to 0x%lX bytes for program %016lX!", location->data_size + mem_info.size, location->program_id);
|
|
|
|
success = false;
|
|
|
|
break;
|
|
|
|
}
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2020-07-13 07:36:17 +01:00
|
|
|
location->data = tmp;
|
|
|
|
tmp = NULL;
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2020-07-13 07:36:17 +01:00
|
|
|
rc = svcReadDebugProcessMemory(location->data + location->data_size, debug_handle, mem_info.addr, mem_info.size);
|
|
|
|
if (R_FAILED(rc))
|
|
|
|
{
|
|
|
|
MEMLOG("svcReadDebugProcessMemory failed for program %016lX! (0x%08X).", location->program_id, rc);
|
|
|
|
success = false;
|
|
|
|
break;
|
|
|
|
}
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2020-07-13 07:36:17 +01:00
|
|
|
location->data_size += mem_info.size;
|
|
|
|
}
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2020-07-13 07:36:17 +01:00
|
|
|
addr = (mem_info.addr + mem_info.size);
|
|
|
|
} while(addr != 0 && segment < BIT(3));
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2020-07-13 07:36:17 +01:00
|
|
|
end:
|
|
|
|
/* Close debug handle. */
|
|
|
|
if (debug_handle != INVALID_HANDLE) svcCloseHandle(debug_handle);
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2020-07-13 07:36:17 +01:00
|
|
|
/* Unlock logfile mutex. */
|
2021-03-07 23:22:49 +00:00
|
|
|
logControlMutex(false);
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2020-07-13 07:36:17 +01:00
|
|
|
if (success && (!location->data || !location->data_size))
|
|
|
|
{
|
2020-10-02 10:53:58 +01:00
|
|
|
MEMLOG("Unable to locate readable program memory pages for %016lX that match the required criteria!", location->program_id);
|
2020-07-13 07:36:17 +01:00
|
|
|
success = false;
|
|
|
|
}
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2020-07-13 07:36:17 +01:00
|
|
|
if (!success) memFreeMemoryLocation(location);
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2020-07-13 07:36:17 +01:00
|
|
|
/* Write log buffer data. This will do nothing if the log buffer length is zero. */
|
2021-03-07 23:22:49 +00:00
|
|
|
logWriteStringToLogFile(g_memLogBuf);
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2020-10-02 10:53:58 +01:00
|
|
|
/* Free memory log buffer. */
|
|
|
|
if (g_memLogBuf)
|
|
|
|
{
|
|
|
|
free(g_memLogBuf);
|
|
|
|
g_memLogBuf = NULL;
|
|
|
|
}
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2020-10-02 10:53:58 +01:00
|
|
|
g_memLogBufSize = 0;
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2020-07-13 07:36:17 +01:00
|
|
|
return success;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool memRetrieveDebugHandleFromProgramById(Handle *out, u64 program_id)
|
|
|
|
{
|
|
|
|
if (!out || !program_id)
|
|
|
|
{
|
|
|
|
MEMLOG("Invalid parameters!");
|
|
|
|
return false;
|
|
|
|
}
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2020-07-13 07:36:17 +01:00
|
|
|
Result rc = 0;
|
|
|
|
u64 pid = 0, d[8] = {0};
|
|
|
|
Handle debug_handle = INVALID_HANDLE;
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2020-07-13 07:36:17 +01:00
|
|
|
u32 i = 0, num_processes = 0;
|
|
|
|
u64 *pids = NULL;
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2020-07-13 07:36:17 +01:00
|
|
|
if (program_id > BOOT_SYSMODULE_TID && program_id != SPL_SYSMODULE_TID)
|
|
|
|
{
|
|
|
|
/* If not a kernel process, get PID from pm:dmnt. */
|
|
|
|
rc = pmdmntGetProcessId(&pid, program_id);
|
|
|
|
if (R_FAILED(rc))
|
|
|
|
{
|
|
|
|
MEMLOG("pmdmntGetProcessId failed for program %016lX! (0x%08X).", program_id, rc);
|
|
|
|
return false;
|
|
|
|
}
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2020-07-13 07:36:17 +01:00
|
|
|
/* Retrieve debug handle right away. */
|
|
|
|
rc = svcDebugActiveProcess(&debug_handle, pid);
|
|
|
|
if (R_FAILED(rc))
|
|
|
|
{
|
|
|
|
MEMLOG("svcDebugActiveProcess failed for program %016lX! (0x%08X).", program_id, rc);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
/* Otherwise, query svc for the process list. */
|
|
|
|
pids = calloc(300, sizeof(u64));
|
|
|
|
if (!pids)
|
|
|
|
{
|
|
|
|
MEMLOG("Failed to allocate memory for PID list!");
|
|
|
|
return false;
|
|
|
|
}
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2020-07-13 07:36:17 +01:00
|
|
|
rc = svcGetProcessList((s32*)&num_processes, pids, 300);
|
|
|
|
if (R_FAILED(rc))
|
|
|
|
{
|
|
|
|
MEMLOG("svcGetProcessList failed! (0x%08X).", rc);
|
|
|
|
free(pids);
|
|
|
|
return false;
|
|
|
|
}
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2020-07-13 07:36:17 +01:00
|
|
|
/* Perform a lookup using the retrieved process list. */
|
|
|
|
for(i = 0; i < num_processes; i++)
|
|
|
|
{
|
|
|
|
/* Retrieve debug handle for the current PID. */
|
|
|
|
rc = svcDebugActiveProcess(&debug_handle, pids[i]);
|
|
|
|
if (R_FAILED(rc)) continue;
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2020-07-13 07:36:17 +01:00
|
|
|
/* Get debug event using the debug handle. */
|
|
|
|
/* This will let us know the program ID from the current PID. */
|
|
|
|
rc = svcGetDebugEvent((u8*)&d, debug_handle);
|
|
|
|
if (R_SUCCEEDED(rc) && d[2] == program_id) break;
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2020-07-13 07:36:17 +01:00
|
|
|
/* No match. Close debug handle and keep looking for our program. */
|
|
|
|
svcCloseHandle(debug_handle);
|
|
|
|
debug_handle = INVALID_HANDLE;
|
|
|
|
}
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2020-07-13 07:36:17 +01:00
|
|
|
free(pids);
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2020-07-13 07:36:17 +01:00
|
|
|
if (i == num_processes)
|
|
|
|
{
|
|
|
|
MEMLOG("Unable to find program %016lX in kernel process list! (0x%08X).", program_id, rc);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2020-07-13 07:36:17 +01:00
|
|
|
/* Set output debug handle. */
|
|
|
|
*out = debug_handle;
|
2022-07-05 02:04:28 +01:00
|
|
|
|
2020-07-13 07:36:17 +01:00
|
|
|
return true;
|
|
|
|
}
|