2019-06-26 23:46:19 +01:00
|
|
|
/*
|
2020-01-24 10:10:40 +00:00
|
|
|
* Copyright (c) 2018-2020 Atmosphère-NX
|
2019-06-26 23:46:19 +01:00
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify it
|
|
|
|
* under the terms and conditions of the GNU General Public License,
|
|
|
|
* version 2, as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope it will be useful, but WITHOUT
|
|
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
|
|
|
|
* more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
2020-05-11 23:02:10 +01:00
|
|
|
#include <stratosphere.hpp>
|
2019-06-26 23:46:19 +01:00
|
|
|
#include "ldr_capabilities.hpp"
|
|
|
|
#include "ldr_content_management.hpp"
|
2020-04-14 10:45:28 +01:00
|
|
|
#include "ldr_development_manager.hpp"
|
2019-06-26 23:46:19 +01:00
|
|
|
#include "ldr_meta.hpp"
|
|
|
|
|
2019-10-24 10:30:10 +01:00
|
|
|
namespace ams::ldr {
|
2019-06-26 23:46:19 +01:00
|
|
|
|
|
|
|
namespace {
|
|
|
|
|
|
|
|
/* Convenience definitions. */
|
|
|
|
constexpr size_t MetaCacheBufferSize = 0x8000;
|
2020-03-09 10:10:12 +00:00
|
|
|
constexpr inline const char AtmosphereMetaPath[] = ENCODE_ATMOSPHERE_CODE_PATH("/main.npdm");
|
2020-04-14 10:45:28 +01:00
|
|
|
constexpr inline const char SdOrBaseMetaPath[] = ENCODE_SD_OR_CODE_PATH("/main.npdm");
|
2020-03-09 10:10:12 +00:00
|
|
|
constexpr inline const char BaseMetaPath[] = ENCODE_CODE_PATH("/main.npdm");
|
2019-06-26 23:46:19 +01:00
|
|
|
|
|
|
|
/* Types. */
|
|
|
|
struct MetaCache {
|
|
|
|
Meta meta;
|
|
|
|
u8 buffer[MetaCacheBufferSize];
|
|
|
|
};
|
|
|
|
|
|
|
|
/* Global storage. */
|
2019-10-28 04:43:01 +00:00
|
|
|
ncm::ProgramId g_cached_program_id;
|
2019-11-21 12:03:19 +00:00
|
|
|
cfg::OverrideStatus g_cached_override_status;
|
2019-06-26 23:46:19 +01:00
|
|
|
MetaCache g_meta_cache;
|
|
|
|
MetaCache g_original_meta_cache;
|
|
|
|
|
|
|
|
/* Helpers. */
|
|
|
|
Result ValidateSubregion(size_t allowed_start, size_t allowed_end, size_t start, size_t size, size_t min_size = 0) {
|
2019-10-24 09:40:44 +01:00
|
|
|
R_UNLESS(size >= min_size, ResultInvalidMeta());
|
|
|
|
R_UNLESS(allowed_start <= start, ResultInvalidMeta());
|
|
|
|
R_UNLESS(start <= allowed_end, ResultInvalidMeta());
|
|
|
|
R_UNLESS(start + size <= allowed_end, ResultInvalidMeta());
|
|
|
|
return ResultSuccess();
|
2019-06-26 23:46:19 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
Result ValidateNpdm(const Npdm *npdm, size_t size) {
|
|
|
|
/* Validate magic. */
|
2019-10-24 09:40:44 +01:00
|
|
|
R_UNLESS(npdm->magic == Npdm::Magic, ResultInvalidMeta());
|
2019-06-26 23:46:19 +01:00
|
|
|
|
|
|
|
/* Validate flags. */
|
2019-10-24 09:40:44 +01:00
|
|
|
u32 mask = ~0x1F;
|
2020-04-14 06:19:44 +01:00
|
|
|
if (hos::GetVersion() < hos::Version_7_0_0) {
|
2019-10-24 09:40:44 +01:00
|
|
|
/* 7.0.0 added 0x10 as a valid bit to NPDM flags, so before that we only check 0xF. */
|
|
|
|
mask = ~0xF;
|
2019-06-26 23:46:19 +01:00
|
|
|
}
|
2019-10-24 09:40:44 +01:00
|
|
|
R_UNLESS(!(npdm->flags & mask), ResultInvalidMeta());
|
2019-06-26 23:46:19 +01:00
|
|
|
|
|
|
|
/* Validate Acid extents. */
|
|
|
|
R_TRY(ValidateSubregion(sizeof(Npdm), size, npdm->acid_offset, npdm->acid_size, sizeof(Acid)));
|
|
|
|
|
|
|
|
/* Validate Aci extends. */
|
|
|
|
R_TRY(ValidateSubregion(sizeof(Npdm), size, npdm->aci_offset, npdm->aci_size, sizeof(Aci)));
|
|
|
|
|
2019-10-24 09:40:44 +01:00
|
|
|
return ResultSuccess();
|
2019-06-26 23:46:19 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
Result ValidateAcid(const Acid *acid, size_t size) {
|
|
|
|
/* Validate magic. */
|
2019-10-24 09:40:44 +01:00
|
|
|
R_UNLESS(acid->magic == Acid::Magic, ResultInvalidMeta());
|
2019-06-26 23:46:19 +01:00
|
|
|
|
2020-04-14 10:45:28 +01:00
|
|
|
/* Validate that the acid is for production if not development. */
|
|
|
|
if (!IsDevelopmentForAcidProductionCheck()) {
|
|
|
|
R_UNLESS((acid->flags & Acid::AcidFlag_Production) != 0, ResultInvalidMeta());
|
|
|
|
}
|
2019-06-26 23:46:19 +01:00
|
|
|
|
|
|
|
/* Validate Fac, Sac, Kac. */
|
|
|
|
R_TRY(ValidateSubregion(sizeof(Acid), size, acid->fac_offset, acid->fac_size));
|
|
|
|
R_TRY(ValidateSubregion(sizeof(Acid), size, acid->sac_offset, acid->sac_size));
|
|
|
|
R_TRY(ValidateSubregion(sizeof(Acid), size, acid->kac_offset, acid->kac_size));
|
|
|
|
|
2019-10-24 09:40:44 +01:00
|
|
|
return ResultSuccess();
|
2019-06-26 23:46:19 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
Result ValidateAci(const Aci *aci, size_t size) {
|
|
|
|
/* Validate magic. */
|
2019-10-24 09:40:44 +01:00
|
|
|
R_UNLESS(aci->magic == Aci::Magic, ResultInvalidMeta());
|
2019-06-26 23:46:19 +01:00
|
|
|
|
|
|
|
/* Validate Fah, Sac, Kac. */
|
|
|
|
R_TRY(ValidateSubregion(sizeof(Aci), size, aci->fah_offset, aci->fah_size));
|
|
|
|
R_TRY(ValidateSubregion(sizeof(Aci), size, aci->sac_offset, aci->sac_size));
|
|
|
|
R_TRY(ValidateSubregion(sizeof(Aci), size, aci->kac_offset, aci->kac_size));
|
|
|
|
|
2019-10-24 09:40:44 +01:00
|
|
|
return ResultSuccess();
|
2019-06-26 23:46:19 +01:00
|
|
|
}
|
|
|
|
|
2020-04-14 10:45:28 +01:00
|
|
|
const u8 *GetAcidSignatureModulus(u32 key_generation) {
|
2020-05-11 23:04:51 +01:00
|
|
|
return fssystem::GetAcidSignatureKeyModulus(!IsDevelopmentForAcidSignatureCheck(), key_generation);
|
2020-04-14 10:45:28 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
Result ValidateAcidSignature(Meta *meta) {
|
|
|
|
/* Loader did not check signatures prior to 10.0.0. */
|
|
|
|
if (hos::GetVersion() < hos::Version_10_0_0) {
|
2020-09-08 23:34:22 +01:00
|
|
|
meta->check_verification_data = false;
|
2020-04-14 10:45:28 +01:00
|
|
|
return ResultSuccess();
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Verify the signature. */
|
|
|
|
const u8 *sig = meta->acid->signature;
|
|
|
|
const size_t sig_size = sizeof(meta->acid->signature);
|
|
|
|
const u8 *mod = GetAcidSignatureModulus(meta->npdm->signature_key_generation);
|
|
|
|
const size_t mod_size = fssystem::AcidSignatureKeyModulusSize;
|
2020-05-11 23:04:51 +01:00
|
|
|
const u8 *exp = fssystem::GetAcidSignatureKeyPublicExponent();
|
|
|
|
const size_t exp_size = fssystem::AcidSignatureKeyPublicExponentSize;
|
2020-04-14 10:45:28 +01:00
|
|
|
const u8 *msg = meta->acid->modulus;
|
|
|
|
const size_t msg_size = meta->acid->size;
|
|
|
|
const bool is_signature_valid = crypto::VerifyRsa2048PssSha256(sig, sig_size, mod, mod_size, exp, exp_size, msg, msg_size);
|
|
|
|
R_UNLESS(is_signature_valid || !IsEnabledProgramVerification(), ResultInvalidAcidSignature());
|
|
|
|
|
2020-09-08 23:34:22 +01:00
|
|
|
meta->check_verification_data = is_signature_valid;
|
2020-04-14 10:45:28 +01:00
|
|
|
return ResultSuccess();
|
|
|
|
}
|
|
|
|
|
2020-03-09 10:10:12 +00:00
|
|
|
Result LoadMetaFromFile(fs::FileHandle file, MetaCache *cache) {
|
2019-06-26 23:46:19 +01:00
|
|
|
/* Reset cache. */
|
|
|
|
cache->meta = {};
|
|
|
|
|
|
|
|
/* Read from file. */
|
2020-03-09 10:10:12 +00:00
|
|
|
s64 npdm_size = 0;
|
2019-06-26 23:46:19 +01:00
|
|
|
{
|
|
|
|
/* Get file size. */
|
2020-03-09 10:10:12 +00:00
|
|
|
R_TRY(fs::GetFileSize(std::addressof(npdm_size), file));
|
2019-06-26 23:46:19 +01:00
|
|
|
|
|
|
|
/* Read data into cache buffer. */
|
2020-03-09 10:10:12 +00:00
|
|
|
R_UNLESS(npdm_size <= static_cast<s64>(MetaCacheBufferSize), ResultTooLargeMeta());
|
|
|
|
R_TRY(fs::ReadFile(file, 0, cache->buffer, npdm_size));
|
2019-06-26 23:46:19 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Ensure size is big enough. */
|
2020-03-09 10:10:12 +00:00
|
|
|
R_UNLESS(npdm_size >= static_cast<s64>(sizeof(Npdm)), ResultInvalidMeta());
|
2019-06-26 23:46:19 +01:00
|
|
|
|
|
|
|
/* Validate the meta. */
|
|
|
|
{
|
|
|
|
Meta *meta = &cache->meta;
|
|
|
|
|
|
|
|
Npdm *npdm = reinterpret_cast<Npdm *>(cache->buffer);
|
|
|
|
R_TRY(ValidateNpdm(npdm, npdm_size));
|
|
|
|
|
|
|
|
Acid *acid = reinterpret_cast<Acid *>(cache->buffer + npdm->acid_offset);
|
|
|
|
Aci *aci = reinterpret_cast<Aci *>(cache->buffer + npdm->aci_offset);
|
|
|
|
R_TRY(ValidateAcid(acid, npdm->acid_size));
|
|
|
|
R_TRY(ValidateAci(aci, npdm->aci_size));
|
|
|
|
|
|
|
|
/* Set Meta members. */
|
|
|
|
meta->npdm = npdm;
|
|
|
|
meta->acid = acid;
|
|
|
|
meta->aci = aci;
|
|
|
|
|
|
|
|
meta->acid_fac = reinterpret_cast<u8 *>(acid) + acid->fac_offset;
|
|
|
|
meta->acid_sac = reinterpret_cast<u8 *>(acid) + acid->sac_offset;
|
|
|
|
meta->acid_kac = reinterpret_cast<u8 *>(acid) + acid->kac_offset;
|
|
|
|
|
|
|
|
meta->aci_fah = reinterpret_cast<u8 *>(aci) + aci->fah_offset;
|
|
|
|
meta->aci_sac = reinterpret_cast<u8 *>(aci) + aci->sac_offset;
|
|
|
|
meta->aci_kac = reinterpret_cast<u8 *>(aci) + aci->kac_offset;
|
2020-04-14 10:45:28 +01:00
|
|
|
|
|
|
|
meta->modulus = acid->modulus;
|
2019-06-26 23:46:19 +01:00
|
|
|
}
|
|
|
|
|
2019-10-24 09:40:44 +01:00
|
|
|
return ResultSuccess();
|
2019-06-26 23:46:19 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
/* API. */
|
2020-04-14 10:45:28 +01:00
|
|
|
Result LoadMeta(Meta *out_meta, const ncm::ProgramLocation &loc, const cfg::OverrideStatus &status) {
|
2019-06-26 23:46:19 +01:00
|
|
|
/* Try to load meta from file. */
|
2020-03-09 10:10:12 +00:00
|
|
|
fs::FileHandle file;
|
|
|
|
R_TRY(fs::OpenFile(std::addressof(file), AtmosphereMetaPath, fs::OpenMode_Read));
|
2019-06-26 23:46:19 +01:00
|
|
|
{
|
2020-03-09 10:10:12 +00:00
|
|
|
ON_SCOPE_EXIT { fs::CloseFile(file); };
|
|
|
|
R_TRY(LoadMetaFromFile(file, &g_meta_cache));
|
2019-06-26 23:46:19 +01:00
|
|
|
}
|
|
|
|
|
2019-10-28 04:43:01 +00:00
|
|
|
/* Patch meta. Start by setting all program ids to the current program id. */
|
2019-06-26 23:46:19 +01:00
|
|
|
Meta *meta = &g_meta_cache.meta;
|
2020-04-14 10:45:28 +01:00
|
|
|
meta->acid->program_id_min = loc.program_id;
|
|
|
|
meta->acid->program_id_max = loc.program_id;
|
|
|
|
meta->aci->program_id = loc.program_id;
|
2019-06-26 23:46:19 +01:00
|
|
|
|
|
|
|
/* For HBL, we need to copy some information from the base meta. */
|
2019-11-21 12:03:19 +00:00
|
|
|
if (status.IsHbl()) {
|
2020-04-14 10:45:28 +01:00
|
|
|
if (R_SUCCEEDED(fs::OpenFile(std::addressof(file), SdOrBaseMetaPath, fs::OpenMode_Read))) {
|
2020-03-09 10:10:12 +00:00
|
|
|
ON_SCOPE_EXIT { fs::CloseFile(file); };
|
2020-09-22 20:01:28 +01:00
|
|
|
|
|
|
|
|
2020-03-09 10:10:12 +00:00
|
|
|
if (R_SUCCEEDED(LoadMetaFromFile(file, &g_original_meta_cache))) {
|
2019-06-26 23:46:19 +01:00
|
|
|
Meta *o_meta = &g_original_meta_cache.meta;
|
|
|
|
|
|
|
|
/* Fix pool partition. */
|
2020-04-14 06:19:44 +01:00
|
|
|
if (hos::GetVersion() >= hos::Version_5_0_0) {
|
2019-06-26 23:46:19 +01:00
|
|
|
meta->acid->flags = (meta->acid->flags & 0xFFFFFFC3) | (o_meta->acid->flags & 0x0000003C);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Fix flags. */
|
2019-06-28 01:37:33 +01:00
|
|
|
const u16 program_info_flags = caps::GetProgramInfoFlags(o_meta->aci_kac, o_meta->aci->kac_size);
|
|
|
|
caps::SetProgramInfoFlags(program_info_flags, meta->acid_kac, meta->acid->kac_size);
|
|
|
|
caps::SetProgramInfoFlags(program_info_flags, meta->aci_kac, meta->aci->kac_size);
|
2019-06-26 23:46:19 +01:00
|
|
|
}
|
|
|
|
}
|
2020-09-22 20:01:28 +01:00
|
|
|
|
|
|
|
/* When hbl is applet, adjust main thread priority. */
|
|
|
|
if ((caps::GetProgramInfoFlags(meta->aci_kac, meta->aci->kac_size) & ProgramInfoFlag_ApplicationTypeMask) == ProgramInfoFlag_Applet) {
|
|
|
|
constexpr auto HblMainThreadPriorityApplication = 44;
|
|
|
|
constexpr auto HblMainThreadPriorityApplet = 40;
|
|
|
|
if (meta->npdm->main_thread_priority == HblMainThreadPriorityApplication) {
|
|
|
|
meta->npdm->main_thread_priority = HblMainThreadPriorityApplet;
|
|
|
|
}
|
|
|
|
}
|
2020-04-14 10:45:28 +01:00
|
|
|
} else if (hos::GetVersion() >= hos::Version_10_0_0) {
|
|
|
|
/* If storage id is none, there is no base code filesystem, and thus it is impossible for us to validate. */
|
2020-04-14 11:20:23 +01:00
|
|
|
/* However, if we're an application, we are guaranteed a base code filesystem. */
|
|
|
|
if (static_cast<ncm::StorageId>(loc.storage_id) != ncm::StorageId::None || ncm::IsApplicationId(loc.program_id)) {
|
2020-04-14 10:45:28 +01:00
|
|
|
R_TRY(fs::OpenFile(std::addressof(file), BaseMetaPath, fs::OpenMode_Read));
|
|
|
|
ON_SCOPE_EXIT { fs::CloseFile(file); };
|
|
|
|
R_TRY(LoadMetaFromFile(file, &g_original_meta_cache));
|
|
|
|
R_TRY(ValidateAcidSignature(&g_original_meta_cache.meta));
|
2020-09-08 23:34:22 +01:00
|
|
|
meta->modulus = g_original_meta_cache.meta.modulus;
|
|
|
|
meta->check_verification_data = g_original_meta_cache.meta.check_verification_data;
|
2020-04-14 10:45:28 +01:00
|
|
|
}
|
2019-06-26 23:46:19 +01:00
|
|
|
}
|
|
|
|
|
2020-08-21 11:01:39 +01:00
|
|
|
/* Pre-process the capabilities. */
|
|
|
|
/* This is used to e.g. avoid passing memory region descriptor to older kernels. */
|
|
|
|
caps::ProcessCapabilities(meta->acid_kac, meta->acid->kac_size);
|
|
|
|
caps::ProcessCapabilities(meta->aci_kac, meta->aci->kac_size);
|
|
|
|
|
2019-06-26 23:46:19 +01:00
|
|
|
/* Set output. */
|
2020-04-14 10:45:28 +01:00
|
|
|
g_cached_program_id = loc.program_id;
|
2019-11-21 12:03:19 +00:00
|
|
|
g_cached_override_status = status;
|
2019-06-26 23:46:19 +01:00
|
|
|
*out_meta = *meta;
|
|
|
|
|
2019-10-24 09:40:44 +01:00
|
|
|
return ResultSuccess();
|
2019-06-26 23:46:19 +01:00
|
|
|
}
|
|
|
|
|
2020-04-14 10:45:28 +01:00
|
|
|
Result LoadMetaFromCache(Meta *out_meta, const ncm::ProgramLocation &loc, const cfg::OverrideStatus &status) {
|
|
|
|
if (g_cached_program_id != loc.program_id || g_cached_override_status != status) {
|
|
|
|
return LoadMeta(out_meta, loc, status);
|
2019-06-26 23:46:19 +01:00
|
|
|
}
|
|
|
|
*out_meta = g_meta_cache.meta;
|
2019-10-24 09:40:44 +01:00
|
|
|
return ResultSuccess();
|
2019-06-26 23:46:19 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
void InvalidateMetaCache() {
|
2019-10-28 04:43:01 +00:00
|
|
|
/* Set the cached program id back to zero. */
|
|
|
|
g_cached_program_id = {};
|
2019-06-26 23:46:19 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
}
|