Add the TamperMachine module for runtime mods and cheats (#1928)
* Add initial implementation of the Tamper Machine * Implement Atmosphere opcodes 0, 4 and 9 * Add missing TamperCompilationException class * Implement Atmosphere conditional and loop opcodes 1, 2 and 3 * Inplement input conditional opcode 8 * Add register store opcode A * Implement extended pause/resume opcodes FF0 and FF1 * Implement extended log opcode FFF * Implement extended register conditional opcode C0 * Refactor TamperProgram to an interface * Moved Atmosphere classes to a separate subdirectory * Fix OpProcCtrl class not setting process * Implement extended register save/restore opcodes C1, C2 and C3 * Refactor code emitters to separate classes * Supress memory access errors from the Tamper Machine * Add debug information to tamper register and memory writes * Add block stack check to Atmosphere Cheat compiler * Add handheld input support to Tamper Machine * Fix code styling * Fix build id and cheat case mismatch * Fix invalid immediate size selection * Print build ids of the title * Prevent Tamper Machine from change code regions * Remove Atmosphere namespace * Remove empty cheats from the list * Prevent code modification without disabling the tampering * Fix missing addressing mode in LoadRegisterWithMemory * Fix wrong addressing in RegisterConditional * Add name to the tamper machine thread * Fix code styling
This commit is contained in:
parent
a5d5ca0635
commit
0c1ea1212a
71 changed files with 2793 additions and 5 deletions
66
Ryujinx.HLE/HOS/Tamper/TamperedKProcess.cs
Normal file
66
Ryujinx.HLE/HOS/Tamper/TamperedKProcess.cs
Normal file
|
@ -0,0 +1,66 @@
|
|||
using Ryujinx.Common.Logging;
|
||||
using Ryujinx.HLE.Exceptions;
|
||||
using Ryujinx.HLE.HOS.Kernel.Process;
|
||||
using System.Runtime.CompilerServices;
|
||||
|
||||
namespace Ryujinx.HLE.HOS.Tamper
|
||||
{
|
||||
class TamperedKProcess : ITamperedProcess
|
||||
{
|
||||
private KProcess _process;
|
||||
|
||||
public ProcessState State => _process.State;
|
||||
|
||||
public TamperedKProcess(KProcess process)
|
||||
{
|
||||
this._process = process;
|
||||
}
|
||||
|
||||
private void AssertMemoryRegion<T>(ulong va, bool isWrite) where T : unmanaged
|
||||
{
|
||||
ulong size = (ulong)Unsafe.SizeOf<T>();
|
||||
|
||||
// TODO (Caian): This double check is workaround because CpuMemory.IsRangeMapped reports
|
||||
// some addresses as mapped even though they are not, i. e. 4 bytes from 0xffffffffffffff70.
|
||||
if (!_process.CpuMemory.IsMapped(va) || !_process.CpuMemory.IsRangeMapped(va, size))
|
||||
{
|
||||
throw new TamperExecutionException($"Unmapped memory access of {size} bytes at 0x{va:X16}");
|
||||
}
|
||||
|
||||
if (!isWrite)
|
||||
{
|
||||
return;
|
||||
}
|
||||
|
||||
// TODO (Caian): It is unknown how PPTC behaves if the tamper modifies memory regions
|
||||
// belonging to code. So for now just prevent code tampering.
|
||||
if ((va >= _process.MemoryManager.CodeRegionStart) && (va + size <= _process.MemoryManager.CodeRegionEnd))
|
||||
{
|
||||
throw new CodeRegionTamperedException($"Writing {size} bytes to address 0x{va:X16} alters code");
|
||||
}
|
||||
}
|
||||
|
||||
public T ReadMemory<T>(ulong va) where T : unmanaged
|
||||
{
|
||||
AssertMemoryRegion<T>(va, false);
|
||||
|
||||
return _process.CpuMemory.Read<T>(va);
|
||||
}
|
||||
|
||||
public void WriteMemory<T>(ulong va, T value) where T : unmanaged
|
||||
{
|
||||
AssertMemoryRegion<T>(va, true);
|
||||
_process.CpuMemory.Write(va, value);
|
||||
}
|
||||
|
||||
public void PauseProcess()
|
||||
{
|
||||
Logger.Warning?.Print(LogClass.TamperMachine, "Process pausing is not supported!");
|
||||
}
|
||||
|
||||
public void ResumeProcess()
|
||||
{
|
||||
Logger.Warning?.Print(LogClass.TamperMachine, "Process resuming is not supported!");
|
||||
}
|
||||
}
|
||||
}
|
Loading…
Add table
Add a link
Reference in a new issue