diff options
| author | 2018-10-14 21:41:58 -0400 | |
|---|---|---|
| committer | 2018-10-15 17:02:11 -0400 | |
| commit | bed872ed38e19d34c6c2e3d1a3d35a9f72e46970 (patch) | |
| tree | 6533551afe9c5432fa8789a1517a97111d0041c6 /src/core/loader/nso.cpp | |
| parent | nso: Make LoadModule take a VfsFile by const reference (diff) | |
| download | yuzu-bed872ed38e19d34c6c2e3d1a3d35a9f72e46970.tar.gz yuzu-bed872ed38e19d34c6c2e3d1a3d35a9f72e46970.tar.xz yuzu-bed872ed38e19d34c6c2e3d1a3d35a9f72e46970.zip | |
nso: Return an optional address from LoadModule
If a malformed NSO is attempted to be loaded, we shouldn't continue
onwards. We should be reporting an error and bailing out.
Diffstat (limited to 'src/core/loader/nso.cpp')
| -rw-r--r-- | src/core/loader/nso.cpp | 12 |
1 files changed, 7 insertions, 5 deletions
diff --git a/src/core/loader/nso.cpp b/src/core/loader/nso.cpp index d26fa482c..68efca5c0 100644 --- a/src/core/loader/nso.cpp +++ b/src/core/loader/nso.cpp | |||
| @@ -93,9 +93,9 @@ static constexpr u32 PageAlignSize(u32 size) { | |||
| 93 | return (size + Memory::PAGE_MASK) & ~Memory::PAGE_MASK; | 93 | return (size + Memory::PAGE_MASK) & ~Memory::PAGE_MASK; |
| 94 | } | 94 | } |
| 95 | 95 | ||
| 96 | VAddr AppLoader_NSO::LoadModule(const FileSys::VfsFile& file, VAddr load_base, | 96 | std::optional<VAddr> AppLoader_NSO::LoadModule(const FileSys::VfsFile& file, VAddr load_base, |
| 97 | bool should_pass_arguments, | 97 | bool should_pass_arguments, |
| 98 | boost::optional<FileSys::PatchManager> pm) { | 98 | std::optional<FileSys::PatchManager> pm) { |
| 99 | if (file.GetSize() < sizeof(NsoHeader)) | 99 | if (file.GetSize() < sizeof(NsoHeader)) |
| 100 | return {}; | 100 | return {}; |
| 101 | 101 | ||
| @@ -154,7 +154,7 @@ VAddr AppLoader_NSO::LoadModule(const FileSys::VfsFile& file, VAddr load_base, | |||
| 154 | program_image.resize(image_size); | 154 | program_image.resize(image_size); |
| 155 | 155 | ||
| 156 | // Apply patches if necessary | 156 | // Apply patches if necessary |
| 157 | if (pm != boost::none && pm->HasNSOPatch(nso_header.build_id)) { | 157 | if (pm && pm->HasNSOPatch(nso_header.build_id)) { |
| 158 | std::vector<u8> pi_header(program_image.size() + 0x100); | 158 | std::vector<u8> pi_header(program_image.size() + 0x100); |
| 159 | std::memcpy(pi_header.data(), &nso_header, sizeof(NsoHeader)); | 159 | std::memcpy(pi_header.data(), &nso_header, sizeof(NsoHeader)); |
| 160 | std::memcpy(pi_header.data() + 0x100, program_image.data(), program_image.size()); | 160 | std::memcpy(pi_header.data() + 0x100, program_image.data(), program_image.size()); |
| @@ -181,7 +181,9 @@ ResultStatus AppLoader_NSO::Load(Kernel::Process& process) { | |||
| 181 | 181 | ||
| 182 | // Load module | 182 | // Load module |
| 183 | const VAddr base_address = process.VMManager().GetCodeRegionBaseAddress(); | 183 | const VAddr base_address = process.VMManager().GetCodeRegionBaseAddress(); |
| 184 | LoadModule(*file, base_address, true); | 184 | if (!LoadModule(*file, base_address, true)) { |
| 185 | return ResultStatus::ErrorLoadingNSO; | ||
| 186 | } | ||
| 185 | LOG_DEBUG(Loader, "loaded module {} @ 0x{:X}", file->GetName(), base_address); | 187 | LOG_DEBUG(Loader, "loaded module {} @ 0x{:X}", file->GetName(), base_address); |
| 186 | 188 | ||
| 187 | process.Run(base_address, Kernel::THREADPRIO_DEFAULT, Memory::DEFAULT_STACK_SIZE); | 189 | process.Run(base_address, Kernel::THREADPRIO_DEFAULT, Memory::DEFAULT_STACK_SIZE); |