/* * Copyright (c) 2018-2019 Atmosphère-NX * * This program is free software; you can redistribute it and/or modify it * under the terms and conditions of the GNU General Public License, * version 2, as published by the Free Software Foundation. * * This program is distributed in the hope it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for * more details. * * You should have received a copy of the GNU General Public License * along with this program. If not, see . */ #include #include #include #include #include #include #include #include #include "pm_boot_mode_service.hpp" #include "pm_debug_monitor_service.hpp" #include "pm_info_service.hpp" #include "pm_shell_service.hpp" #include "impl/pm_process_manager.hpp" extern "C" { extern u32 __start__; u32 __nx_applet_type = AppletType_None; u32 __nx_fs_num_sessions = 1; u32 __nx_fsdev_direntry_cache_size = 1; #define INNER_HEAP_SIZE 0x4000 size_t nx_inner_heap_size = INNER_HEAP_SIZE; char nx_inner_heap[INNER_HEAP_SIZE]; void __libnx_initheap(void); void __appInit(void); void __appExit(void); /* Exception handling. */ alignas(16) u8 __nx_exception_stack[0x1000]; u64 __nx_exception_stack_size = sizeof(__nx_exception_stack); void __libnx_exception_handler(ThreadExceptionDump *ctx); void __libstratosphere_exception_handler(AtmosphereFatalErrorContext *ctx); } sts::ncm::TitleId __stratosphere_title_id = sts::ncm::TitleId::Pm; void __libnx_exception_handler(ThreadExceptionDump *ctx) { StratosphereCrashHandler(ctx); } void __libnx_initheap(void) { void* addr = nx_inner_heap; size_t size = nx_inner_heap_size; /* Newlib */ extern char* fake_heap_start; extern char* fake_heap_end; fake_heap_start = (char*)addr; fake_heap_end = (char*)addr + size; } using namespace sts; namespace { constexpr u32 PrivilegedFileAccessHeader[0x1C / sizeof(u32)] = {0x00000001, 0x00000000, 0x80000000, 0x0000001C, 0x00000000, 0x0000001C, 0x00000000}; constexpr u32 PrivilegedFileAccessControl[0x2C / sizeof(u32)] = {0x00000001, 0x00000000, 0x80000000, 0x00000000, 0x00000000, 0xFFFFFFFF, 0xFFFFFFFF, 0x00000000, 0x00000000, 0xFFFFFFFF, 0xFFFFFFFF}; constexpr u8 PrivilegedServiceAccessControl[] = {0x80, '*', 0x00, '*'}; constexpr size_t ProcessCountMax = 0x40; /* This uses debugging SVCs to retrieve a process's title id. */ ncm::TitleId GetProcessTitleId(os::ProcessId process_id) { /* Check if we should return our title id. */ /* Doing this here works around a bug fixed in 6.0.0. */ /* Not doing so will cause svcDebugActiveProcess to deadlock on lower firmwares if called for it's own process. */ os::ProcessId current_process_id = os::InvalidProcessId; R_ASSERT(svcGetProcessId(¤t_process_id.value, CUR_PROCESS_HANDLE)); if (current_process_id == process_id) { return __stratosphere_title_id; } /* Get a debug handle. */ os::ManagedHandle debug_handle; R_ASSERT(svcDebugActiveProcess(debug_handle.GetPointer(), static_cast(process_id))); /* Loop until we get the event that tells us about the process. */ svc::DebugEventInfo d; while (true) { R_ASSERT(svcGetDebugEvent(reinterpret_cast(&d), debug_handle.Get())); if (d.type == sts::svc::DebugEventType::AttachProcess) { return sts::ncm::TitleId{d.info.attach_process.title_id}; } } } /* This works around a bug fixed by FS in 4.0.0. */ /* Not doing so will cause KIPs with higher process IDs than 7 to be unable to use filesystem services. */ /* It also registers privileged processes with SM, so that their title IDs can be known. */ void RegisterPrivilegedProcess(os::ProcessId process_id) { fsprUnregisterProgram(static_cast(process_id)); fsprRegisterProgram(static_cast(process_id), static_cast(process_id), FsStorageId_NandSystem, PrivilegedFileAccessHeader, sizeof(PrivilegedFileAccessHeader), PrivilegedFileAccessControl, sizeof(PrivilegedFileAccessControl)); sts::sm::manager::UnregisterProcess(process_id); sts::sm::manager::RegisterProcess(process_id, GetProcessTitleId(process_id), PrivilegedServiceAccessControl, sizeof(PrivilegedServiceAccessControl), PrivilegedServiceAccessControl, sizeof(PrivilegedServiceAccessControl)); } void RegisterPrivilegedProcesses() { /* Get privileged process range. */ os::ProcessId min_priv_process_id = os::InvalidProcessId, max_priv_process_id = os::InvalidProcessId; sts::cfg::GetInitialProcessRange(&min_priv_process_id, &max_priv_process_id); /* Get list of processes, register all privileged ones. */ u32 num_pids; os::ProcessId pids[ProcessCountMax]; R_ASSERT(svcGetProcessList(&num_pids, reinterpret_cast(pids), ProcessCountMax)); for (size_t i = 0; i < num_pids; i++) { if (min_priv_process_id <= pids[i] && pids[i] <= max_priv_process_id) { RegisterPrivilegedProcess(pids[i]); } } } } void __appInit(void) { hos::SetVersionForLibnx(); DoWithSmSession([&]() { R_ASSERT(fsprInitialize()); R_ASSERT(smManagerInitialize()); /* This works around a bug with process permissions on < 4.0.0. */ /* It also informs SM of privileged process information. */ RegisterPrivilegedProcesses(); /* Use AMS manager extension to tell SM that FS has been worked around. */ R_ASSERT(sts::sm::manager::EndInitialDefers()); R_ASSERT(lrInitialize()); R_ASSERT(ldrPmInitialize()); R_ASSERT(splInitialize()); R_ASSERT(fsInitialize()); }); CheckAtmosphereVersion(CURRENT_ATMOSPHERE_VERSION); } void __appExit(void) { /* Cleanup services. */ fsdevUnmountAll(); fsExit(); splExit(); ldrPmExit(); lrExit(); smManagerExit(); fsprExit(); } namespace { using ServerOptions = sf::hipc::DefaultServerManagerOptions; constexpr sm::ServiceName ShellServiceName = sm::ServiceName::Encode("pm:shell"); constexpr size_t ShellMaxSessions = 3; constexpr sm::ServiceName DebugMonitorServiceName = sm::ServiceName::Encode("pm:dmnt"); constexpr size_t DebugMonitorMaxSessions = 3; constexpr sm::ServiceName BootModeServiceName = sm::ServiceName::Encode("pm:bm"); constexpr size_t BootModeMaxSessions = 6; constexpr sm::ServiceName InformationServiceName = sm::ServiceName::Encode("pm:info"); constexpr size_t InformationMaxSessions = 32 - (ShellMaxSessions + DebugMonitorMaxSessions + BootModeMaxSessions); static_assert(InformationMaxSessions >= 16, "InformationMaxSessions"); /* pm:shell, pm:dmnt, pm:bm, pm:info. */ constexpr size_t NumServers = 4; constexpr size_t MaxSessions = ShellMaxSessions + DebugMonitorMaxSessions + BootModeMaxSessions + InformationMaxSessions; static_assert(MaxSessions == 32, "MaxSessions"); sf::hipc::ServerManager g_server_manager; } int main(int argc, char **argv) { /* Initialize process manager implementation. */ R_ASSERT(sts::pm::impl::InitializeProcessManager()); /* Create Services. */ /* NOTE: Extra sessions have been added to pm:bm and pm:info to facilitate access by the rest of stratosphere. */ /* Also Note: PM was rewritten in 5.0.0, so the shell and dmnt services are different before/after. */ if (hos::GetVersion() >= hos::Version_500) { R_ASSERT((g_server_manager.RegisterServer(ShellServiceName, ShellMaxSessions))); R_ASSERT((g_server_manager.RegisterServer(DebugMonitorServiceName, DebugMonitorMaxSessions))); } else { R_ASSERT((g_server_manager.RegisterServer(ShellServiceName, ShellMaxSessions))); R_ASSERT((g_server_manager.RegisterServer(DebugMonitorServiceName, DebugMonitorMaxSessions))); } R_ASSERT((g_server_manager.RegisterServer(BootModeServiceName, BootModeMaxSessions))); R_ASSERT((g_server_manager.RegisterServer(InformationServiceName, InformationMaxSessions))); /* Loop forever, servicing our services. */ g_server_manager.LoopProcess(); return 0; }