mirror of
https://github.com/Ryujinx/Ryujinx.git
synced 2024-11-20 12:44:16 +00:00
0c1ea1212a
* Add initial implementation of the Tamper Machine * Implement Atmosphere opcodes 0, 4 and 9 * Add missing TamperCompilationException class * Implement Atmosphere conditional and loop opcodes 1, 2 and 3 * Inplement input conditional opcode 8 * Add register store opcode A * Implement extended pause/resume opcodes FF0 and FF1 * Implement extended log opcode FFF * Implement extended register conditional opcode C0 * Refactor TamperProgram to an interface * Moved Atmosphere classes to a separate subdirectory * Fix OpProcCtrl class not setting process * Implement extended register save/restore opcodes C1, C2 and C3 * Refactor code emitters to separate classes * Supress memory access errors from the Tamper Machine * Add debug information to tamper register and memory writes * Add block stack check to Atmosphere Cheat compiler * Add handheld input support to Tamper Machine * Fix code styling * Fix build id and cheat case mismatch * Fix invalid immediate size selection * Print build ids of the title * Prevent Tamper Machine from change code regions * Remove Atmosphere namespace * Remove empty cheats from the list * Prevent code modification without disabling the tampering * Fix missing addressing mode in LoadRegisterWithMemory * Fix wrong addressing in RegisterConditional * Add name to the tamper machine thread * Fix code styling
66 lines
No EOL
2.2 KiB
C#
66 lines
No EOL
2.2 KiB
C#
using Ryujinx.Common.Logging;
|
|
using Ryujinx.HLE.Exceptions;
|
|
using Ryujinx.HLE.HOS.Kernel.Process;
|
|
using System.Runtime.CompilerServices;
|
|
|
|
namespace Ryujinx.HLE.HOS.Tamper
|
|
{
|
|
class TamperedKProcess : ITamperedProcess
|
|
{
|
|
private KProcess _process;
|
|
|
|
public ProcessState State => _process.State;
|
|
|
|
public TamperedKProcess(KProcess process)
|
|
{
|
|
this._process = process;
|
|
}
|
|
|
|
private void AssertMemoryRegion<T>(ulong va, bool isWrite) where T : unmanaged
|
|
{
|
|
ulong size = (ulong)Unsafe.SizeOf<T>();
|
|
|
|
// TODO (Caian): This double check is workaround because CpuMemory.IsRangeMapped reports
|
|
// some addresses as mapped even though they are not, i. e. 4 bytes from 0xffffffffffffff70.
|
|
if (!_process.CpuMemory.IsMapped(va) || !_process.CpuMemory.IsRangeMapped(va, size))
|
|
{
|
|
throw new TamperExecutionException($"Unmapped memory access of {size} bytes at 0x{va:X16}");
|
|
}
|
|
|
|
if (!isWrite)
|
|
{
|
|
return;
|
|
}
|
|
|
|
// TODO (Caian): It is unknown how PPTC behaves if the tamper modifies memory regions
|
|
// belonging to code. So for now just prevent code tampering.
|
|
if ((va >= _process.MemoryManager.CodeRegionStart) && (va + size <= _process.MemoryManager.CodeRegionEnd))
|
|
{
|
|
throw new CodeRegionTamperedException($"Writing {size} bytes to address 0x{va:X16} alters code");
|
|
}
|
|
}
|
|
|
|
public T ReadMemory<T>(ulong va) where T : unmanaged
|
|
{
|
|
AssertMemoryRegion<T>(va, false);
|
|
|
|
return _process.CpuMemory.Read<T>(va);
|
|
}
|
|
|
|
public void WriteMemory<T>(ulong va, T value) where T : unmanaged
|
|
{
|
|
AssertMemoryRegion<T>(va, true);
|
|
_process.CpuMemory.Write(va, value);
|
|
}
|
|
|
|
public void PauseProcess()
|
|
{
|
|
Logger.Warning?.Print(LogClass.TamperMachine, "Process pausing is not supported!");
|
|
}
|
|
|
|
public void ResumeProcess()
|
|
{
|
|
Logger.Warning?.Print(LogClass.TamperMachine, "Process resuming is not supported!");
|
|
}
|
|
}
|
|
} |