mirror of
https://github.com/RPCSX/rpcsx.git
synced 2026-01-01 22:30:08 +01:00
Replaces `std::shared_pointer` with `stx::atomic_ptr` and `stx::shared_ptr`. Notes to programmers: * This pr kills the use of `dynamic_cast`, `std::dynamic_pointer_cast` and `std::weak_ptr` on IDM objects, possible replacement is to save the object ID on the base object, then use idm::check/get_unlocked to the destination type via the saved ID which may be null. Null pointer check is how you can tell type mismatch (as dynamic cast) or object destruction (as weak_ptr locking). * Double-inheritance on IDM objects should be used with care, `stx::shared_ptr` does not support constant-evaluated pointer offsetting to parent/child type. * `idm::check/get_unlocked` can now be used anywhere. Misc fixes: * Fixes some segfaults with RPCN with interaction with IDM. * Fix deadlocks in access violation handler due locking recursion. * Fixes race condition in process exit-spawn on memory containers read. * Fix bug that theoretically can prevent RPCS3 from booting - fix `id_manager::typeinfo` comparison to compare members instead of `memcmp` which can fail spuriously on padding bytes. * Ensure all IDM inherited types of base, either has `id_base` or `id_type` defined locally, this allows to make getters such as `idm::get_unlocked<lv2_socket, lv2_socket_raw>()` which were broken before. (requires save-states invalidation) * Removes broken operator[] overload of `stx::shared_ptr` and `stx::single_ptr` for non-array types.
205 lines
4.9 KiB
C++
205 lines
4.9 KiB
C++
#include "stdafx.h"
|
|
|
|
#include "Emu/Cell/ErrorCodes.h"
|
|
#include "Emu/Memory/vm_ptr.h"
|
|
#include "Emu/VFS.h"
|
|
#include "Emu/IdManager.h"
|
|
#include "Emu/system_config.h"
|
|
#include "Crypto/unself.h"
|
|
#include "Crypto/unedat.h"
|
|
#include "Loader/ELF.h"
|
|
|
|
#include "sys_process.h"
|
|
#include "sys_overlay.h"
|
|
#include "sys_fs.h"
|
|
|
|
extern std::pair<shared_ptr<lv2_overlay>, CellError> ppu_load_overlay(const ppu_exec_object&, bool virtual_load, const std::string& path, s64 file_offset, utils::serial* ar = nullptr);
|
|
|
|
extern bool ppu_initialize(const ppu_module<lv2_obj>&, bool check_only = false, u64 file_size = 0);
|
|
extern void ppu_finalize(const ppu_module<lv2_obj>& info, bool force_mem_release = false);
|
|
|
|
LOG_CHANNEL(sys_overlay);
|
|
|
|
static error_code overlay_load_module(vm::ptr<u32> ovlmid, const std::string& vpath, u64 /*flags*/, vm::ptr<u32> entry, fs::file src = {}, s64 file_offset = 0)
|
|
{
|
|
if (!src)
|
|
{
|
|
auto [fs_error, ppath, path, lv2_file, type] = lv2_file::open(vpath, 0, 0);
|
|
|
|
if (fs_error)
|
|
{
|
|
return {fs_error, vpath};
|
|
}
|
|
|
|
src = std::move(lv2_file);
|
|
}
|
|
|
|
u128 klic = g_fxo->get<loaded_npdrm_keys>().last_key();
|
|
|
|
src = decrypt_self(std::move(src), reinterpret_cast<u8*>(&klic), nullptr, true);
|
|
|
|
if (!src)
|
|
{
|
|
return {CELL_ENOEXEC, +"Failed to decrypt file"};
|
|
}
|
|
|
|
ppu_exec_object obj = std::move(src);
|
|
src.close();
|
|
|
|
if (obj != elf_error::ok)
|
|
{
|
|
return {CELL_ENOEXEC, obj.operator elf_error()};
|
|
}
|
|
|
|
const auto [ovlm, error] = ppu_load_overlay(obj, false, vfs::get(vpath), file_offset);
|
|
|
|
obj.clear();
|
|
|
|
if (error)
|
|
{
|
|
if (error == CELL_CANCEL + 0u)
|
|
{
|
|
// Emulation stopped
|
|
return {};
|
|
}
|
|
|
|
return error;
|
|
}
|
|
|
|
ppu_initialize(*ovlm);
|
|
|
|
sys_overlay.success("Loaded overlay: \"%s\" (id=0x%x)", vpath, idm::last_id());
|
|
|
|
*ovlmid = idm::last_id();
|
|
*entry = ovlm->entry;
|
|
|
|
return CELL_OK;
|
|
}
|
|
|
|
fs::file make_file_view(fs::file&& file, u64 offset, u64 size);
|
|
|
|
std::function<void(void*)> lv2_overlay::load(utils::serial& ar)
|
|
{
|
|
const std::string vpath = ar.pop<std::string>();
|
|
const std::string path = vfs::get(vpath);
|
|
const s64 offset = ar.pop<s64>();
|
|
|
|
sys_overlay.success("lv2_overlay::load(): vpath='%s', path='%s', offset=0x%x", vpath, path, offset);
|
|
|
|
shared_ptr<lv2_overlay> ovlm;
|
|
|
|
fs::file file{path.substr(0, path.size() - (offset ? fmt::format("_x%x", offset).size() : 0))};
|
|
|
|
if (file)
|
|
{
|
|
u128 klic = g_fxo->get<loaded_npdrm_keys>().last_key();
|
|
file = make_file_view(std::move(file), offset, umax);
|
|
ovlm = ppu_load_overlay(ppu_exec_object{ decrypt_self(std::move(file), reinterpret_cast<u8*>(&klic)) }, false, path, 0, &ar).first;
|
|
|
|
if (!ovlm)
|
|
{
|
|
fmt::throw_exception("lv2_overlay::load(): ppu_load_overlay() failed. (vpath='%s', offset=0x%x)", vpath, offset);
|
|
}
|
|
}
|
|
else if (!g_cfg.savestate.state_inspection_mode.get())
|
|
{
|
|
fmt::throw_exception("lv2_overlay::load(): Failed to find file. (vpath='%s', offset=0x%x)", vpath, offset);
|
|
}
|
|
else
|
|
{
|
|
sys_overlay.error("lv2_overlay::load(): Failed to find file. (vpath='%s', offset=0x%x)", vpath, offset);
|
|
}
|
|
|
|
return [ovlm](void* storage)
|
|
{
|
|
*static_cast<shared_ptr<lv2_obj>*>(storage) = ovlm;
|
|
};
|
|
}
|
|
|
|
void lv2_overlay::save(utils::serial& ar)
|
|
{
|
|
USING_SERIALIZATION_VERSION(lv2_prx_overlay);
|
|
|
|
const std::string vpath = vfs::retrieve(path);
|
|
(vpath.empty() ? sys_overlay.error : sys_overlay.success)("lv2_overlay::save(): vpath='%s', offset=0x%x", vpath, offset);
|
|
|
|
ar(vpath, offset);
|
|
}
|
|
|
|
error_code sys_overlay_load_module(vm::ptr<u32> ovlmid, vm::cptr<char> path, u64 flags, vm::ptr<u32> entry)
|
|
{
|
|
sys_overlay.warning("sys_overlay_load_module(ovlmid=*0x%x, path=%s, flags=0x%x, entry=*0x%x)", ovlmid, path, flags, entry);
|
|
|
|
if (!g_ps3_process_info.ppc_seg)
|
|
{
|
|
// Process not permitted
|
|
return CELL_ENOSYS;
|
|
}
|
|
|
|
if (!path)
|
|
{
|
|
return CELL_EFAULT;
|
|
}
|
|
|
|
return overlay_load_module(ovlmid, path.get_ptr(), flags, entry);
|
|
}
|
|
|
|
error_code sys_overlay_load_module_by_fd(vm::ptr<u32> ovlmid, u32 fd, u64 offset, u64 flags, vm::ptr<u32> entry)
|
|
{
|
|
sys_overlay.warning("sys_overlay_load_module_by_fd(ovlmid=*0x%x, fd=%d, offset=0x%llx, flags=0x%x, entry=*0x%x)", ovlmid, fd, offset, flags, entry);
|
|
|
|
if (!g_ps3_process_info.ppc_seg)
|
|
{
|
|
// Process not permitted
|
|
return CELL_ENOSYS;
|
|
}
|
|
|
|
if (static_cast<s64>(offset) < 0)
|
|
{
|
|
return CELL_EINVAL;
|
|
}
|
|
|
|
const auto file = idm::get_unlocked<lv2_fs_object, lv2_file>(fd);
|
|
|
|
if (!file)
|
|
{
|
|
return CELL_EBADF;
|
|
}
|
|
|
|
std::lock_guard lock(file->mp->mutex);
|
|
|
|
if (!file->file)
|
|
{
|
|
return CELL_EBADF;
|
|
}
|
|
|
|
return overlay_load_module(ovlmid, offset ? fmt::format("%s_x%x", file->name.data(), offset) : file->name.data(), flags, entry, lv2_file::make_view(file, offset), offset);
|
|
}
|
|
|
|
error_code sys_overlay_unload_module(u32 ovlmid)
|
|
{
|
|
sys_overlay.warning("sys_overlay_unload_module(ovlmid=0x%x)", ovlmid);
|
|
|
|
if (!g_ps3_process_info.ppc_seg)
|
|
{
|
|
// Process not permitted
|
|
return CELL_ENOSYS;
|
|
}
|
|
|
|
const auto _main = idm::withdraw<lv2_obj, lv2_overlay>(ovlmid);
|
|
|
|
if (!_main)
|
|
{
|
|
return CELL_ESRCH;
|
|
}
|
|
|
|
for (auto& seg : _main->segs)
|
|
{
|
|
vm::dealloc(seg.addr);
|
|
}
|
|
|
|
ppu_finalize(*_main);
|
|
|
|
return CELL_OK;
|
|
}
|