Atmosphere/stratosphere/pm/source/pm_main.cpp

221 lines
8.8 KiB
C++
Raw Normal View History

/*
2019-04-08 02:00:49 +00:00
* Copyright (c) 2018-2019 Atmosphère-NX
*
* This program is free software; you can redistribute it and/or modify it
* under the terms and conditions of the GNU General Public License,
* version 2, as published by the Free Software Foundation.
*
* This program is distributed in the hope it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
* more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
2018-05-03 04:18:05 +00:00
#include <cstdlib>
#include <cstdint>
#include <cstring>
#include <switch.h>
2018-11-08 09:24:40 +00:00
#include <atmosphere.h>
2018-05-03 04:18:05 +00:00
#include <stratosphere.hpp>
2019-06-29 09:20:36 +00:00
#include <stratosphere/cfg.hpp>
#include <stratosphere/sm/sm_manager_api.hpp>
2018-05-03 04:18:05 +00:00
2019-06-29 09:20:36 +00:00
#include "pm_boot_mode_service.hpp"
#include "pm_debug_monitor_service.hpp"
#include "pm_info_service.hpp"
#include "pm_shell_service.hpp"
#include "impl/pm_process_manager.hpp"
2018-05-03 04:18:05 +00:00
extern "C" {
extern u32 __start__;
u32 __nx_applet_type = AppletType_None;
2019-10-15 05:49:06 +00:00
u32 __nx_fs_num_sessions = 1;
2018-05-03 04:18:05 +00:00
/* TODO: Statically allocate PM resource thread stack, reduce this. */
/* TODO: Determine what the minimum consistent value for this is (dump heap at runtime). */
#define INNER_HEAP_SIZE 0xC000
2018-05-03 04:18:05 +00:00
size_t nx_inner_heap_size = INNER_HEAP_SIZE;
char nx_inner_heap[INNER_HEAP_SIZE];
2018-05-03 04:18:05 +00:00
void __libnx_initheap(void);
void __appInit(void);
void __appExit(void);
/* Exception handling. */
alignas(16) u8 __nx_exception_stack[0x1000];
u64 __nx_exception_stack_size = sizeof(__nx_exception_stack);
void __libnx_exception_handler(ThreadExceptionDump *ctx);
void __libstratosphere_exception_handler(AtmosphereFatalErrorContext *ctx);
}
2019-07-03 03:54:16 +00:00
sts::ncm::TitleId __stratosphere_title_id = sts::ncm::TitleId::Pm;
void __libnx_exception_handler(ThreadExceptionDump *ctx) {
StratosphereCrashHandler(ctx);
2018-05-03 04:18:05 +00:00
}
void __libnx_initheap(void) {
2018-09-09 06:47:15 +00:00
void* addr = nx_inner_heap;
size_t size = nx_inner_heap_size;
2018-05-03 04:18:05 +00:00
2018-09-09 06:47:15 +00:00
/* Newlib */
extern char* fake_heap_start;
extern char* fake_heap_end;
2018-05-03 04:18:05 +00:00
2018-09-09 06:47:15 +00:00
fake_heap_start = (char*)addr;
fake_heap_end = (char*)addr + size;
2018-05-03 04:18:05 +00:00
}
2019-10-15 05:49:06 +00:00
using namespace sts;
2019-06-29 09:20:36 +00:00
namespace {
2019-07-03 05:21:47 +00:00
constexpr u32 PrivilegedFileAccessHeader[0x1C / sizeof(u32)] = {0x00000001, 0x00000000, 0x80000000, 0x0000001C, 0x00000000, 0x0000001C, 0x00000000};
constexpr u32 PrivilegedFileAccessControl[0x2C / sizeof(u32)] = {0x00000001, 0x00000000, 0x80000000, 0x00000000, 0x00000000, 0xFFFFFFFF, 0xFFFFFFFF, 0x00000000, 0x00000000, 0xFFFFFFFF, 0xFFFFFFFF};
constexpr u8 PrivilegedServiceAccessControl[] = {0x80, '*', 0x00, '*'};
2019-07-03 05:21:47 +00:00
constexpr size_t ProcessCountMax = 0x40;
2019-06-29 09:20:36 +00:00
/* This uses debugging SVCs to retrieve a process's title id. */
2019-10-15 05:49:06 +00:00
ncm::TitleId GetProcessTitleId(os::ProcessId process_id) {
2019-07-23 18:38:14 +00:00
/* Check if we should return our title id. */
/* Doing this here works around a bug fixed in 6.0.0. */
/* Not doing so will cause svcDebugActiveProcess to deadlock on lower firmwares if called for it's own process. */
2019-10-15 05:49:06 +00:00
os::ProcessId current_process_id = os::InvalidProcessId;
R_ASSERT(svcGetProcessId(&current_process_id.value, CUR_PROCESS_HANDLE));
2019-07-23 18:38:14 +00:00
if (current_process_id == process_id) {
return __stratosphere_title_id;
}
2019-07-23 18:38:14 +00:00
/* Get a debug handle. */
2019-10-15 05:49:06 +00:00
os::ManagedHandle debug_handle;
R_ASSERT(svcDebugActiveProcess(debug_handle.GetPointer(), static_cast<u64>(process_id)));
/* Loop until we get the event that tells us about the process. */
2019-10-15 05:49:06 +00:00
svc::DebugEventInfo d;
while (true) {
R_ASSERT(svcGetDebugEvent(reinterpret_cast<u8 *>(&d), debug_handle.Get()));
if (d.type == sts::svc::DebugEventType::AttachProcess) {
return sts::ncm::TitleId{d.info.attach_process.title_id};
}
}
}
2019-06-29 09:20:36 +00:00
/* This works around a bug fixed by FS in 4.0.0. */
/* Not doing so will cause KIPs with higher process IDs than 7 to be unable to use filesystem services. */
/* It also registers privileged processes with SM, so that their title IDs can be known. */
2019-10-15 05:49:06 +00:00
void RegisterPrivilegedProcess(os::ProcessId process_id) {
fsprUnregisterProgram(static_cast<u64>(process_id));
fsprRegisterProgram(static_cast<u64>(process_id), static_cast<u64>(process_id), FsStorageId_NandSystem, PrivilegedFileAccessHeader, sizeof(PrivilegedFileAccessHeader), PrivilegedFileAccessControl, sizeof(PrivilegedFileAccessControl));
sts::sm::manager::UnregisterProcess(process_id);
sts::sm::manager::RegisterProcess(process_id, GetProcessTitleId(process_id), PrivilegedServiceAccessControl, sizeof(PrivilegedServiceAccessControl), PrivilegedServiceAccessControl, sizeof(PrivilegedServiceAccessControl));
2019-06-29 09:20:36 +00:00
}
void RegisterPrivilegedProcesses() {
2019-06-29 09:20:36 +00:00
/* Get privileged process range. */
2019-10-15 05:49:06 +00:00
os::ProcessId min_priv_process_id = os::InvalidProcessId, max_priv_process_id = os::InvalidProcessId;
2019-06-29 09:20:36 +00:00
sts::cfg::GetInitialProcessRange(&min_priv_process_id, &max_priv_process_id);
/* Get list of processes, register all privileged ones. */
u32 num_pids;
2019-10-15 05:49:06 +00:00
os::ProcessId pids[ProcessCountMax];
R_ASSERT(svcGetProcessList(&num_pids, reinterpret_cast<u64 *>(pids), ProcessCountMax));
2019-06-29 09:20:36 +00:00
for (size_t i = 0; i < num_pids; i++) {
if (min_priv_process_id <= pids[i] && pids[i] <= max_priv_process_id) {
RegisterPrivilegedProcess(pids[i]);
}
}
}
2019-06-29 09:20:36 +00:00
}
2018-05-03 04:18:05 +00:00
void __appInit(void) {
2019-10-15 05:49:06 +00:00
hos::SetVersionForLibnx();
2018-05-03 04:18:05 +00:00
DoWithSmSession([&]() {
2019-06-20 09:00:59 +00:00
R_ASSERT(fsprInitialize());
R_ASSERT(smManagerInitialize());
/* This works around a bug with process permissions on < 4.0.0. */
/* It also informs SM of privileged process information. */
RegisterPrivilegedProcesses();
2019-06-20 09:00:59 +00:00
/* Use AMS manager extension to tell SM that FS has been worked around. */
R_ASSERT(sts::sm::manager::EndInitialDefers());
2019-06-20 09:00:59 +00:00
R_ASSERT(lrInitialize());
R_ASSERT(ldrPmInitialize());
R_ASSERT(splInitialize());
R_ASSERT(fsInitialize());
});
2018-11-08 09:24:40 +00:00
CheckAtmosphereVersion(CURRENT_ATMOSPHERE_VERSION);
2018-05-03 04:18:05 +00:00
}
void __appExit(void) {
/* Cleanup services. */
fsdevUnmountAll();
2019-06-29 09:20:36 +00:00
fsExit();
2018-05-03 08:58:11 +00:00
splExit();
ldrPmExit();
2018-05-03 04:18:05 +00:00
lrExit();
2019-06-29 09:20:36 +00:00
smManagerExit();
fsprExit();
2018-05-03 04:18:05 +00:00
}
2019-10-15 05:49:06 +00:00
namespace {
using ServerOptions = sf::hipc::DefaultServerManagerOptions;
constexpr sm::ServiceName ShellServiceName = sm::ServiceName::Encode("pm:shell");
constexpr size_t ShellMaxSessions = 3;
constexpr sm::ServiceName DebugMonitorServiceName = sm::ServiceName::Encode("pm:dmnt");
constexpr size_t DebugMonitorMaxSessions = 3;
constexpr sm::ServiceName BootModeServiceName = sm::ServiceName::Encode("pm:bm");
constexpr size_t BootModeMaxSessions = 6;
constexpr sm::ServiceName InformationServiceName = sm::ServiceName::Encode("pm:info");
constexpr size_t InformationMaxSessions = 32 - (ShellMaxSessions + DebugMonitorMaxSessions + BootModeMaxSessions);
static_assert(InformationMaxSessions >= 16, "InformationMaxSessions");
/* pm:shell, pm:dmnt, pm:bm, pm:info. */
constexpr size_t NumServers = 4;
constexpr size_t MaxSessions = ShellMaxSessions + DebugMonitorMaxSessions + BootModeMaxSessions + InformationMaxSessions;
static_assert(MaxSessions == 32, "MaxSessions");
sf::hipc::ServerManager<NumServers, ServerOptions, MaxSessions> g_server_manager;
}
2018-05-03 04:18:05 +00:00
int main(int argc, char **argv)
{
2019-06-29 09:20:36 +00:00
/* Initialize process manager implementation. */
R_ASSERT(sts::pm::impl::InitializeProcessManager());
2019-06-29 09:20:36 +00:00
/* Create Services. */
/* NOTE: Extra sessions have been added to pm:bm and pm:info to facilitate access by the rest of stratosphere. */
/* Also Note: PM was rewritten in 5.0.0, so the shell and dmnt services are different before/after. */
2019-10-15 05:49:06 +00:00
if (hos::GetVersion() >= hos::Version_500) {
R_ASSERT((g_server_manager.RegisterServer<pm::shell::ShellService>(ShellServiceName, ShellMaxSessions)));
R_ASSERT((g_server_manager.RegisterServer<pm::dmnt::DebugMonitorService>(DebugMonitorServiceName, DebugMonitorMaxSessions)));
} else {
2019-10-15 05:49:06 +00:00
R_ASSERT((g_server_manager.RegisterServer<pm::shell::ShellServiceDeprecated>(ShellServiceName, ShellMaxSessions)));
R_ASSERT((g_server_manager.RegisterServer<pm::dmnt::DebugMonitorServiceDeprecated>(DebugMonitorServiceName, DebugMonitorMaxSessions)));
}
2019-10-15 05:49:06 +00:00
R_ASSERT((g_server_manager.RegisterServer<pm::bm::BootModeService>(BootModeServiceName, BootModeMaxSessions)));
R_ASSERT((g_server_manager.RegisterServer<pm::info::InformationService>(InformationServiceName, InformationMaxSessions)));
2019-06-17 22:27:29 +00:00
2018-05-03 04:18:05 +00:00
/* Loop forever, servicing our services. */
2019-10-15 05:49:06 +00:00
g_server_manager.LoopProcess();
2018-09-09 06:47:15 +00:00
return 0;
2018-05-03 04:18:05 +00:00
}