mirror of
https://github.com/Atmosphere-NX/Atmosphere
synced 2024-11-10 07:06:34 +00:00
95 lines
3.6 KiB
C++
95 lines
3.6 KiB
C++
/*
|
|
* Copyright (c) 2018-2019 Atmosphère-NX
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify it
|
|
* under the terms and conditions of the GNU General Public License,
|
|
* version 2, as published by the Free Software Foundation.
|
|
*
|
|
* This program is distributed in the hope it will be useful, but WITHOUT
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
|
|
* more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include <switch.h>
|
|
#include <stratosphere.hpp>
|
|
#include <stratosphere/cfg.hpp>
|
|
|
|
namespace sts::cfg {
|
|
|
|
namespace {
|
|
|
|
/* Convenience definitions. */
|
|
constexpr u64 InitialProcessIdMinDeprecated = 0x00;
|
|
constexpr u64 InitialProcessIdMaxDeprecated = 0x50;
|
|
|
|
/* Privileged process globals. */
|
|
os::Mutex g_lock;
|
|
bool g_got_privileged_process_status = false;
|
|
u64 g_min_initial_process_id = 0, g_max_initial_process_id = 0;
|
|
u64 g_cur_process_id = 0;
|
|
|
|
/* SD card helpers. */
|
|
void GetPrivilegedProcessIdRange(u64 *out_min, u64 *out_max) {
|
|
u64 min = 0, max = 0;
|
|
if (GetRuntimeFirmwareVersion() >= FirmwareVersion_500) {
|
|
/* On 5.0.0+, we can get precise limits from svcGetSystemInfo. */
|
|
R_ASSERT(svcGetSystemInfo(&min, SystemInfoType_InitialProcessIdRange, INVALID_HANDLE, InitialProcessIdRangeInfo_Minimum));
|
|
R_ASSERT(svcGetSystemInfo(&max, SystemInfoType_InitialProcessIdRange, INVALID_HANDLE, InitialProcessIdRangeInfo_Maximum));
|
|
} else if (GetRuntimeFirmwareVersion() >= FirmwareVersion_400) {
|
|
/* On 4.0.0-4.1.0, we can get the precise limits from normal svcGetInfo. */
|
|
R_ASSERT(svcGetInfo(&min, InfoType_InitialProcessIdRange, INVALID_HANDLE, InitialProcessIdRangeInfo_Minimum));
|
|
R_ASSERT(svcGetInfo(&max, InfoType_InitialProcessIdRange, INVALID_HANDLE, InitialProcessIdRangeInfo_Maximum));
|
|
} else {
|
|
/* On < 4.0.0, we just use hardcoded extents. */
|
|
min = InitialProcessIdMinDeprecated;
|
|
max = InitialProcessIdMaxDeprecated;
|
|
}
|
|
|
|
*out_min = min;
|
|
*out_max = max;
|
|
}
|
|
|
|
u64 GetCurrentProcessId() {
|
|
u64 process_id = 0;
|
|
R_ASSERT(svcGetProcessId(&process_id, CUR_PROCESS_HANDLE));
|
|
return process_id;
|
|
}
|
|
|
|
void GetPrivilegedProcessStatus() {
|
|
GetPrivilegedProcessIdRange(&g_min_initial_process_id, &g_max_initial_process_id);
|
|
g_cur_process_id = GetCurrentProcessId();
|
|
g_got_privileged_process_status = true;
|
|
}
|
|
|
|
}
|
|
|
|
/* Privileged Process utilities. */
|
|
bool IsInitialProcess() {
|
|
std::scoped_lock lk(g_lock);
|
|
|
|
/* If we've not detected, do detection. */
|
|
if (!g_got_privileged_process_status) {
|
|
GetPrivilegedProcessStatus();
|
|
}
|
|
|
|
/* Determine if we're privileged, and return. */
|
|
return g_min_initial_process_id <= g_cur_process_id && g_cur_process_id <= g_max_initial_process_id;
|
|
}
|
|
|
|
void GetInitialProcessRange(u64 *out_min, u64 *out_max) {
|
|
std::scoped_lock lk(g_lock);
|
|
|
|
/* If we've not detected, do detection. */
|
|
if (!g_got_privileged_process_status) {
|
|
GetPrivilegedProcessStatus();
|
|
}
|
|
|
|
*out_min = g_min_initial_process_id;
|
|
*out_max = g_max_initial_process_id;
|
|
}
|
|
|
|
}
|