2018-09-07 16:00:13 +01:00
|
|
|
/*
|
2019-04-08 03:00:49 +01:00
|
|
|
* Copyright (c) 2018-2019 Atmosphère-NX
|
2018-09-07 16:00:13 +01:00
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify it
|
|
|
|
* under the terms and conditions of the GNU General Public License,
|
|
|
|
* version 2, as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope it will be useful, but WITHOUT
|
|
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
|
|
|
|
* more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
2019-04-22 20:40:53 +01:00
|
|
|
|
2018-05-03 05:18:05 +01:00
|
|
|
#include <cstdlib>
|
|
|
|
#include <cstdint>
|
|
|
|
#include <cstring>
|
|
|
|
#include <malloc.h>
|
|
|
|
|
|
|
|
#include <switch.h>
|
2018-11-08 09:24:40 +00:00
|
|
|
#include <atmosphere.h>
|
2018-05-03 05:18:05 +01:00
|
|
|
#include <stratosphere.hpp>
|
2019-06-25 01:57:49 +01:00
|
|
|
#include <stratosphere/sm/sm_manager_api.hpp>
|
2018-05-03 05:18:05 +01:00
|
|
|
|
2018-05-03 11:10:05 +01:00
|
|
|
#include "pm_boot_mode.hpp"
|
2018-05-05 03:16:40 +01:00
|
|
|
#include "pm_info.hpp"
|
|
|
|
#include "pm_shell.hpp"
|
2018-05-03 11:10:05 +01:00
|
|
|
#include "pm_process_track.hpp"
|
2018-05-04 06:58:25 +01:00
|
|
|
#include "pm_registration.hpp"
|
2018-05-07 11:45:44 +01:00
|
|
|
#include "pm_debug_monitor.hpp"
|
2018-05-03 11:10:05 +01:00
|
|
|
|
2018-05-03 05:18:05 +01:00
|
|
|
extern "C" {
|
|
|
|
extern u32 __start__;
|
|
|
|
|
|
|
|
u32 __nx_applet_type = AppletType_None;
|
|
|
|
|
2019-06-26 23:46:19 +01:00
|
|
|
#define INNER_HEAP_SIZE 0x40000
|
2018-05-03 05:18:05 +01:00
|
|
|
size_t nx_inner_heap_size = INNER_HEAP_SIZE;
|
|
|
|
char nx_inner_heap[INNER_HEAP_SIZE];
|
2019-04-22 20:40:53 +01:00
|
|
|
|
2018-05-03 05:18:05 +01:00
|
|
|
void __libnx_initheap(void);
|
|
|
|
void __appInit(void);
|
|
|
|
void __appExit(void);
|
2019-04-12 23:28:46 +01:00
|
|
|
|
|
|
|
/* Exception handling. */
|
|
|
|
alignas(16) u8 __nx_exception_stack[0x1000];
|
|
|
|
u64 __nx_exception_stack_size = sizeof(__nx_exception_stack);
|
|
|
|
void __libnx_exception_handler(ThreadExceptionDump *ctx);
|
|
|
|
u64 __stratosphere_title_id = TitleId_Pm;
|
|
|
|
void __libstratosphere_exception_handler(AtmosphereFatalErrorContext *ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
void __libnx_exception_handler(ThreadExceptionDump *ctx) {
|
|
|
|
StratosphereCrashHandler(ctx);
|
2018-05-03 05:18:05 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void __libnx_initheap(void) {
|
2018-09-09 07:47:15 +01:00
|
|
|
void* addr = nx_inner_heap;
|
|
|
|
size_t size = nx_inner_heap_size;
|
2018-05-03 05:18:05 +01:00
|
|
|
|
2018-09-09 07:47:15 +01:00
|
|
|
/* Newlib */
|
|
|
|
extern char* fake_heap_start;
|
|
|
|
extern char* fake_heap_end;
|
2018-05-03 05:18:05 +01:00
|
|
|
|
2018-09-09 07:47:15 +01:00
|
|
|
fake_heap_start = (char*)addr;
|
|
|
|
fake_heap_end = (char*)addr + size;
|
2018-05-03 05:18:05 +01:00
|
|
|
}
|
|
|
|
|
2018-10-18 00:26:36 +01:00
|
|
|
void RegisterPrivilegedProcessesWithFs() {
|
|
|
|
/* Ensures that all privileged processes are registered with full FS permissions. */
|
|
|
|
constexpr u64 PRIVILEGED_PROCESS_MIN = 0;
|
|
|
|
constexpr u64 PRIVILEGED_PROCESS_MAX = 0x4F;
|
2019-04-22 20:40:53 +01:00
|
|
|
|
2018-10-18 00:26:36 +01:00
|
|
|
const u32 PRIVILEGED_FAH[0x1C/sizeof(u32)] = {0x00000001, 0x00000000, 0x80000000, 0x0000001C, 0x00000000, 0x0000001C, 0x00000000};
|
|
|
|
const u32 PRIVILEGED_FAC[0x2C/sizeof(u32)] = {0x00000001, 0x00000000, 0x80000000, 0x00000000, 0x00000000, 0xFFFFFFFF, 0xFFFFFFFF, 0x00000000, 0x00000000, 0xFFFFFFFF, 0xFFFFFFFF};
|
2019-04-22 20:40:53 +01:00
|
|
|
|
2018-11-08 13:28:52 +00:00
|
|
|
u32 num_pids;
|
|
|
|
u64 pids[PRIVILEGED_PROCESS_MAX+1];
|
|
|
|
if (R_SUCCEEDED(svcGetProcessList(&num_pids, pids, sizeof(pids)/sizeof(pids[0])))) {
|
|
|
|
for (u32 i = 0; i < num_pids; i++) {
|
|
|
|
const u64 pid = pids[i];
|
|
|
|
if (PRIVILEGED_PROCESS_MIN <= pid && pid <= PRIVILEGED_PROCESS_MAX) {
|
|
|
|
fsprUnregisterProgram(pid);
|
|
|
|
fsprRegisterProgram(pid, pid, FsStorageId_NandSystem, PRIVILEGED_FAH, sizeof(PRIVILEGED_FAH), PRIVILEGED_FAC, sizeof(PRIVILEGED_FAC));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
for (u64 pid = PRIVILEGED_PROCESS_MIN; pid <= PRIVILEGED_PROCESS_MAX; pid++) {
|
|
|
|
fsprUnregisterProgram(pid);
|
|
|
|
fsprRegisterProgram(pid, pid, FsStorageId_NandSystem, PRIVILEGED_FAH, sizeof(PRIVILEGED_FAH), PRIVILEGED_FAC, sizeof(PRIVILEGED_FAC));
|
|
|
|
}
|
2018-10-18 00:26:36 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-05-03 05:18:05 +01:00
|
|
|
void __appInit(void) {
|
2019-02-20 22:17:51 +00:00
|
|
|
SetFirmwareVersionForLibnx();
|
2018-05-03 05:18:05 +01:00
|
|
|
|
2019-04-22 20:40:53 +01:00
|
|
|
DoWithSmSession([&]() {
|
2019-06-20 10:00:59 +01:00
|
|
|
R_ASSERT(fsprInitialize());
|
2019-04-22 20:40:53 +01:00
|
|
|
|
|
|
|
/* This works around a bug with process permissions on < 4.0.0. */
|
|
|
|
RegisterPrivilegedProcessesWithFs();
|
|
|
|
|
2019-06-20 10:00:59 +01:00
|
|
|
/* Use AMS manager extension to tell SM that FS has been worked around. */
|
2019-06-26 23:46:19 +01:00
|
|
|
R_ASSERT(smManagerInitialize());
|
2019-06-25 01:57:49 +01:00
|
|
|
R_ASSERT(sts::sm::manager::EndInitialDefers());
|
2019-04-22 20:40:53 +01:00
|
|
|
|
2019-06-20 10:00:59 +01:00
|
|
|
R_ASSERT(lrInitialize());
|
|
|
|
R_ASSERT(ldrPmInitialize());
|
|
|
|
R_ASSERT(splInitialize());
|
|
|
|
R_ASSERT(fsInitialize());
|
2019-04-22 20:40:53 +01:00
|
|
|
});
|
|
|
|
|
2018-11-08 09:24:40 +00:00
|
|
|
CheckAtmosphereVersion(CURRENT_ATMOSPHERE_VERSION);
|
2018-05-03 05:18:05 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
void __appExit(void) {
|
|
|
|
/* Cleanup services. */
|
|
|
|
fsdevUnmountAll();
|
2018-05-03 09:58:11 +01:00
|
|
|
splExit();
|
2018-05-04 06:58:25 +01:00
|
|
|
smManagerExit();
|
|
|
|
ldrPmExit();
|
2018-05-03 05:18:05 +01:00
|
|
|
fsprExit();
|
|
|
|
lrExit();
|
|
|
|
fsExit();
|
|
|
|
}
|
|
|
|
|
|
|
|
int main(int argc, char **argv)
|
|
|
|
{
|
2019-01-21 06:21:49 +00:00
|
|
|
HosThread process_track_thread;
|
2018-05-03 05:18:05 +01:00
|
|
|
consoleDebugInit(debugDevice_SVC);
|
2019-04-22 20:40:53 +01:00
|
|
|
|
2018-05-03 11:10:05 +01:00
|
|
|
/* Initialize and spawn the Process Tracking thread. */
|
2018-05-04 06:58:25 +01:00
|
|
|
Registration::InitializeSystemResources();
|
2019-06-20 10:00:59 +01:00
|
|
|
R_ASSERT(process_track_thread.Initialize(&ProcessTracking::MainLoop, NULL, 0x4000, 0x15));
|
|
|
|
R_ASSERT(process_track_thread.Start());
|
2019-04-22 20:40:53 +01:00
|
|
|
|
2019-04-22 21:07:11 +01:00
|
|
|
/* Create Server Manager. */
|
|
|
|
static auto s_server_manager = WaitableManager(1);
|
2019-04-22 20:40:53 +01:00
|
|
|
|
2018-05-03 05:18:05 +01:00
|
|
|
/* TODO: Create services. */
|
2019-06-28 07:34:26 +01:00
|
|
|
if (GetRuntimeFirmwareVersion() <= FirmwareVersion_400) {
|
|
|
|
s_server_manager.AddWaitable(new ServiceServer<ShellServiceDeprecated>("pm:shell", 3));
|
|
|
|
s_server_manager.AddWaitable(new ServiceServer<DebugMonitorServiceDeprecated>("pm:dmnt", 3));
|
|
|
|
} else {
|
|
|
|
s_server_manager.AddWaitable(new ServiceServer<ShellService>("pm:shell", 3));
|
|
|
|
s_server_manager.AddWaitable(new ServiceServer<DebugMonitorService>("pm:dmnt", 3));
|
|
|
|
}
|
2019-04-22 21:07:11 +01:00
|
|
|
s_server_manager.AddWaitable(new ServiceServer<BootModeService>("pm:bm", 6));
|
2019-06-26 23:46:19 +01:00
|
|
|
s_server_manager.AddWaitable(new ServiceServer<InformationService>("pm:info", 19));
|
2019-06-17 23:27:29 +01:00
|
|
|
|
2018-05-03 05:18:05 +01:00
|
|
|
/* Loop forever, servicing our services. */
|
2019-04-22 21:10:29 +01:00
|
|
|
s_server_manager.Process();
|
2019-04-22 20:40:53 +01:00
|
|
|
|
2018-09-09 07:47:15 +01:00
|
|
|
return 0;
|
2018-05-03 05:18:05 +01:00
|
|
|
}
|
|
|
|
|