2018-09-07 16:00:13 +01:00
|
|
|
/*
|
|
|
|
* Copyright (c) 2018 Atmosphère-NX
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify it
|
|
|
|
* under the terms and conditions of the GNU General Public License,
|
|
|
|
* version 2, as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope it will be useful, but WITHOUT
|
|
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
|
|
|
|
* more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
2018-11-04 21:56:07 +00:00
|
|
|
#include <map>
|
|
|
|
#include <memory>
|
|
|
|
#include <mutex>
|
|
|
|
|
2018-06-10 02:33:22 +01:00
|
|
|
#include <switch.h>
|
2018-11-04 21:56:07 +00:00
|
|
|
#include <stratosphere.hpp>
|
2018-06-10 02:33:22 +01:00
|
|
|
#include "fsmitm_service.hpp"
|
2018-06-10 18:11:05 +01:00
|
|
|
#include "fs_shim.h"
|
|
|
|
|
2019-01-29 10:29:29 +00:00
|
|
|
#include "../utils.hpp"
|
2018-11-15 03:40:46 +00:00
|
|
|
#include "fsmitm_boot0storage.hpp"
|
2018-06-10 18:11:05 +01:00
|
|
|
#include "fsmitm_romstorage.hpp"
|
2018-06-15 00:50:01 +01:00
|
|
|
#include "fsmitm_layeredrom.hpp"
|
2018-06-10 18:11:05 +01:00
|
|
|
|
2019-03-22 18:28:09 +00:00
|
|
|
#include "fs_subdirectory_filesystem.hpp"
|
2019-03-22 15:49:10 +00:00
|
|
|
|
2019-01-29 10:29:29 +00:00
|
|
|
#include "../debug.hpp"
|
2018-06-10 02:33:22 +01:00
|
|
|
|
2018-11-04 21:56:07 +00:00
|
|
|
static HosMutex g_StorageCacheLock;
|
|
|
|
static std::unordered_map<u64, std::weak_ptr<IStorageInterface>> g_StorageCache;
|
|
|
|
|
|
|
|
static bool StorageCacheGetEntry(u64 title_id, std::shared_ptr<IStorageInterface> *out) {
|
|
|
|
std::scoped_lock<HosMutex> lock(g_StorageCacheLock);
|
|
|
|
if (g_StorageCache.find(title_id) == g_StorageCache.end()) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
auto intf = g_StorageCache[title_id].lock();
|
|
|
|
if (intf != nullptr) {
|
|
|
|
*out = intf;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void StorageCacheSetEntry(u64 title_id, std::shared_ptr<IStorageInterface> *ptr) {
|
|
|
|
std::scoped_lock<HosMutex> lock(g_StorageCacheLock);
|
|
|
|
|
|
|
|
/* Ensure we always use the cached copy if present. */
|
|
|
|
if (g_StorageCache.find(title_id) != g_StorageCache.end()) {
|
|
|
|
auto intf = g_StorageCache[title_id].lock();
|
|
|
|
if (intf != nullptr) {
|
|
|
|
*ptr = intf;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
g_StorageCache[title_id] = *ptr;
|
|
|
|
}
|
|
|
|
|
2018-10-30 00:30:39 +00:00
|
|
|
void FsMitmService::PostProcess(IMitmServiceObject *obj, IpcResponseContext *ctx) {
|
|
|
|
auto this_ptr = static_cast<FsMitmService *>(obj);
|
|
|
|
switch ((FspSrvCmd)ctx->cmd_id) {
|
|
|
|
case FspSrvCmd_SetCurrentProcess:
|
|
|
|
if (R_SUCCEEDED(ctx->rc)) {
|
|
|
|
this_ptr->has_initialized = true;
|
|
|
|
this_ptr->process_id = ctx->request.Pid;
|
|
|
|
this_ptr->title_id = this_ptr->process_id;
|
|
|
|
if (R_FAILED(MitmQueryUtils::GetAssociatedTidForPid(this_ptr->process_id, &this_ptr->title_id))) {
|
|
|
|
/* Log here, if desired. */
|
|
|
|
}
|
2018-06-15 00:50:01 +01:00
|
|
|
break;
|
2018-06-10 10:06:50 +01:00
|
|
|
}
|
2018-06-19 19:07:31 +01:00
|
|
|
break;
|
|
|
|
default:
|
2018-06-10 10:06:50 +01:00
|
|
|
break;
|
|
|
|
}
|
2018-06-10 18:11:05 +01:00
|
|
|
}
|
|
|
|
|
2019-03-22 19:38:23 +00:00
|
|
|
Result FsMitmService::OpenHblWebContentFileSystem(Out<std::shared_ptr<IFileSystemInterface>> &out_fs) {
|
|
|
|
std::shared_ptr<IFileSystemInterface> fs = nullptr;
|
|
|
|
u32 out_domain_id = 0;
|
|
|
|
Result rc = 0;
|
|
|
|
|
|
|
|
ON_SCOPE_EXIT {
|
|
|
|
if (R_SUCCEEDED(rc)) {
|
|
|
|
out_fs.SetValue(std::move(fs));
|
|
|
|
if (out_fs.IsDomain()) {
|
|
|
|
out_fs.ChangeObjectId(out_domain_id);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
/* Mount the SD card using fs.mitm's session. */
|
|
|
|
FsFileSystem sd_fs;
|
|
|
|
rc = fsMountSdcard(&sd_fs);
|
|
|
|
if (R_SUCCEEDED(rc)) {
|
|
|
|
fs = std::make_shared<IFileSystemInterface>(std::make_unique<SubDirectoryFileSystem>(std::make_shared<ProxyFileSystem>(sd_fs), AtmosphereHblWebContentDir));
|
|
|
|
if (out_fs.IsDomain()) {
|
|
|
|
out_domain_id = sd_fs.s.object_id;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
Result FsMitmService::OpenFileSystemWithPatch(Out<std::shared_ptr<IFileSystemInterface>> out_fs, u64 title_id, u32 filesystem_type) {
|
2019-03-26 18:53:30 +00:00
|
|
|
/* Check for eligibility. */
|
|
|
|
{
|
|
|
|
FsDir d;
|
|
|
|
if (!Utils::IsWebAppletTid(this->title_id) || filesystem_type != FsFileSystemType_ContentManual || !Utils::IsHblTid(title_id) ||
|
|
|
|
R_FAILED(Utils::OpenSdDir(AtmosphereHblWebContentDir, &d))) {
|
|
|
|
return RESULT_FORWARD_TO_SESSION;
|
|
|
|
}
|
|
|
|
fsDirClose(&d);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* If there's an existing filesystem, don't override. */
|
|
|
|
/* TODO: Multiplex, overriding existing content with HBL content. */
|
|
|
|
{
|
|
|
|
FsFileSystem fs;
|
|
|
|
if (R_SUCCEEDED(fsOpenFileSystemWithPatchFwd(this->forward_service.get(), &fs, title_id, static_cast<FsFileSystemType>(filesystem_type)))) {
|
|
|
|
fsFsClose(&fs);
|
|
|
|
return RESULT_FORWARD_TO_SESSION;
|
|
|
|
}
|
2019-03-22 19:38:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return this->OpenHblWebContentFileSystem(out_fs);
|
|
|
|
}
|
|
|
|
|
|
|
|
Result FsMitmService::OpenFileSystemWithId(Out<std::shared_ptr<IFileSystemInterface>> out_fs, InPointer<char> path, u64 title_id, u32 filesystem_type) {
|
2019-03-26 18:53:30 +00:00
|
|
|
/* Check for eligibility. */
|
|
|
|
{
|
|
|
|
FsDir d;
|
|
|
|
if (!Utils::IsWebAppletTid(this->title_id) || filesystem_type != FsFileSystemType_ContentManual || !Utils::IsHblTid(title_id) ||
|
|
|
|
R_FAILED(Utils::OpenSdDir(AtmosphereHblWebContentDir, &d))) {
|
|
|
|
return RESULT_FORWARD_TO_SESSION;
|
|
|
|
}
|
|
|
|
fsDirClose(&d);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* If there's an existing filesystem, don't override. */
|
|
|
|
/* TODO: Multiplex, overriding existing content with HBL content. */
|
|
|
|
{
|
|
|
|
FsFileSystem fs;
|
|
|
|
if (R_SUCCEEDED(fsOpenFileSystemWithIdFwd(this->forward_service.get(), &fs, title_id, static_cast<FsFileSystemType>(filesystem_type), path.pointer))) {
|
|
|
|
fsFsClose(&fs);
|
|
|
|
return RESULT_FORWARD_TO_SESSION;
|
|
|
|
}
|
2019-03-22 19:38:23 +00:00
|
|
|
}
|
2019-03-26 16:05:19 +00:00
|
|
|
|
2019-03-22 19:38:23 +00:00
|
|
|
return this->OpenHblWebContentFileSystem(out_fs);
|
|
|
|
}
|
|
|
|
|
2018-11-15 02:39:48 +00:00
|
|
|
/* Gate access to the BIS partitions. */
|
|
|
|
Result FsMitmService::OpenBisStorage(Out<std::shared_ptr<IStorageInterface>> out_storage, u32 bis_partition_id) {
|
|
|
|
std::shared_ptr<IStorageInterface> storage = nullptr;
|
|
|
|
u32 out_domain_id = 0;
|
|
|
|
Result rc = 0;
|
|
|
|
|
|
|
|
ON_SCOPE_EXIT {
|
|
|
|
if (R_SUCCEEDED(rc)) {
|
|
|
|
out_storage.SetValue(std::move(storage));
|
|
|
|
if (out_storage.IsDomain()) {
|
|
|
|
out_storage.ChangeObjectId(out_domain_id);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
{
|
|
|
|
FsStorage bis_storage;
|
|
|
|
rc = fsOpenBisStorageFwd(this->forward_service.get(), &bis_storage, bis_partition_id);
|
|
|
|
if (R_SUCCEEDED(rc)) {
|
2019-03-08 03:53:21 +00:00
|
|
|
const bool is_sysmodule = this->title_id < 0x0100000000001000ul;
|
2018-11-29 20:30:32 +00:00
|
|
|
const bool has_bis_write_flag = Utils::HasFlag(this->title_id, "bis_write");
|
|
|
|
const bool has_cal0_read_flag = Utils::HasFlag(this->title_id, "cal_read");
|
2018-11-15 03:40:46 +00:00
|
|
|
if (bis_partition_id == BisStorageId_Boot0) {
|
2018-11-15 11:57:55 +00:00
|
|
|
storage = std::make_shared<IStorageInterface>(new Boot0Storage(bis_storage, this->title_id));
|
2018-11-15 14:23:44 +00:00
|
|
|
} else if (bis_partition_id == BisStorageId_Prodinfo) {
|
|
|
|
/* PRODINFO should *never* be writable. */
|
2018-11-29 20:30:32 +00:00
|
|
|
if (is_sysmodule || has_cal0_read_flag) {
|
2018-11-15 23:29:02 +00:00
|
|
|
storage = std::make_shared<IStorageInterface>(new ROProxyStorage(bis_storage));
|
|
|
|
} else {
|
|
|
|
/* Do not allow non-sysmodules to read *or* write CAL0. */
|
|
|
|
fsStorageClose(&bis_storage);
|
|
|
|
return 0x320002;
|
|
|
|
}
|
2018-11-15 02:39:48 +00:00
|
|
|
} else {
|
2018-11-29 20:30:32 +00:00
|
|
|
if (is_sysmodule || has_bis_write_flag) {
|
2018-11-15 03:40:46 +00:00
|
|
|
/* Sysmodules should still be allowed to read and write. */
|
|
|
|
storage = std::make_shared<IStorageInterface>(new ProxyStorage(bis_storage));
|
2019-03-23 23:33:49 +00:00
|
|
|
} else if (Utils::IsHblTid(this->title_id) &&
|
|
|
|
((BisStorageId_BcPkg2_1 <= bis_partition_id && bis_partition_id <= BisStorageId_BcPkg2_6) || bis_partition_id == BisStorageId_Boot1)) {
|
|
|
|
/* Allow HBL to write to boot1 (safe firm) + package2. */
|
|
|
|
/* This is needed to not break compatibility with ChoiDujourNX, which does not check for write access before beginning an update. */
|
2019-03-22 19:38:23 +00:00
|
|
|
/* TODO: get fixed so that this can be turned off without causing bricks :/ */
|
|
|
|
storage = std::make_shared<IStorageInterface>(new ProxyStorage(bis_storage));
|
2018-11-29 20:30:32 +00:00
|
|
|
} else {
|
|
|
|
/* Non-sysmodules should be allowed to read. */
|
|
|
|
storage = std::make_shared<IStorageInterface>(new ROProxyStorage(bis_storage));
|
2018-11-15 03:40:46 +00:00
|
|
|
}
|
2018-11-15 02:39:48 +00:00
|
|
|
}
|
|
|
|
if (out_storage.IsDomain()) {
|
|
|
|
out_domain_id = bis_storage.s.object_id;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2018-06-15 00:50:01 +01:00
|
|
|
/* Add redirection for RomFS to the SD card. */
|
2018-10-30 00:30:39 +00:00
|
|
|
Result FsMitmService::OpenDataStorageByCurrentProcess(Out<std::shared_ptr<IStorageInterface>> out_storage) {
|
|
|
|
std::shared_ptr<IStorageInterface> storage = nullptr;
|
2018-06-15 00:50:01 +01:00
|
|
|
u32 out_domain_id = 0;
|
2018-10-30 00:30:39 +00:00
|
|
|
Result rc = 0;
|
2018-10-30 05:14:34 +00:00
|
|
|
|
2018-11-15 22:59:47 +00:00
|
|
|
if (!this->should_override_contents) {
|
|
|
|
return RESULT_FORWARD_TO_SESSION;
|
|
|
|
}
|
|
|
|
|
2018-11-04 21:56:07 +00:00
|
|
|
bool has_cache = StorageCacheGetEntry(this->title_id, &storage);
|
|
|
|
|
2018-10-30 05:14:34 +00:00
|
|
|
ON_SCOPE_EXIT {
|
|
|
|
if (R_SUCCEEDED(rc)) {
|
2018-11-04 21:56:07 +00:00
|
|
|
if (!has_cache) {
|
|
|
|
StorageCacheSetEntry(this->title_id, &storage);
|
|
|
|
}
|
|
|
|
|
2018-10-30 05:14:34 +00:00
|
|
|
out_storage.SetValue(std::move(storage));
|
|
|
|
if (out_storage.IsDomain()) {
|
|
|
|
out_storage.ChangeObjectId(out_domain_id);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
2018-11-04 21:56:07 +00:00
|
|
|
|
|
|
|
|
|
|
|
if (has_cache) {
|
2018-10-30 00:30:39 +00:00
|
|
|
if (out_storage.IsDomain()) {
|
2018-10-16 21:33:45 +01:00
|
|
|
FsStorage s = {0};
|
2018-10-30 00:30:39 +00:00
|
|
|
rc = fsOpenDataStorageByCurrentProcessFwd(this->forward_service.get(), &s);
|
2018-10-16 21:33:45 +01:00
|
|
|
if (R_SUCCEEDED(rc)) {
|
|
|
|
out_domain_id = s.s.object_id;
|
|
|
|
}
|
2018-06-28 06:02:06 +01:00
|
|
|
} else {
|
|
|
|
rc = 0;
|
|
|
|
}
|
2018-11-04 21:56:07 +00:00
|
|
|
if (R_FAILED(rc)) {
|
|
|
|
storage.reset();
|
2018-06-15 00:50:01 +01:00
|
|
|
}
|
2018-06-28 06:02:06 +01:00
|
|
|
} else {
|
|
|
|
FsStorage data_storage;
|
|
|
|
FsFile data_file;
|
2018-10-16 21:33:45 +01:00
|
|
|
|
2018-10-30 00:30:39 +00:00
|
|
|
rc = fsOpenDataStorageByCurrentProcessFwd(this->forward_service.get(), &data_storage);
|
2018-06-28 06:02:06 +01:00
|
|
|
|
|
|
|
Log(armGetTls(), 0x100);
|
|
|
|
if (R_SUCCEEDED(rc)) {
|
2018-11-04 20:45:29 +00:00
|
|
|
if (Utils::HasSdRomfsContent(this->title_id)) {
|
|
|
|
/* TODO: Is there a sensible path that ends in ".romfs" we can use?" */
|
|
|
|
if (R_SUCCEEDED(Utils::OpenSdFileForAtmosphere(this->title_id, "romfs.bin", FS_OPEN_READ, &data_file))) {
|
|
|
|
storage = std::make_shared<IStorageInterface>(new LayeredRomFS(std::make_shared<RomInterfaceStorage>(data_storage), std::make_shared<RomFileStorage>(data_file), this->title_id));
|
|
|
|
} else {
|
|
|
|
storage = std::make_shared<IStorageInterface>(new LayeredRomFS(std::make_shared<RomInterfaceStorage>(data_storage), nullptr, this->title_id));
|
|
|
|
}
|
|
|
|
if (out_storage.IsDomain()) {
|
|
|
|
out_domain_id = data_storage.s.object_id;
|
|
|
|
}
|
2018-06-28 06:02:06 +01:00
|
|
|
} else {
|
2018-11-04 20:45:29 +00:00
|
|
|
/* If we don't have anything to modify, there's no sense in maintaining a copy of the metadata tables. */
|
|
|
|
fsStorageClose(&data_storage);
|
|
|
|
rc = RESULT_FORWARD_TO_SESSION;
|
2018-06-28 06:02:06 +01:00
|
|
|
}
|
2018-06-15 00:50:01 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-10-30 00:30:39 +00:00
|
|
|
return rc;
|
2018-06-15 00:50:01 +01:00
|
|
|
}
|
|
|
|
|
2018-06-10 18:11:05 +01:00
|
|
|
/* Add redirection for System Data Archives to the SD card. */
|
2018-10-30 13:29:30 +00:00
|
|
|
Result FsMitmService::OpenDataStorageByDataId(Out<std::shared_ptr<IStorageInterface>> out_storage, u64 data_id, u8 sid) {
|
2018-06-12 23:00:09 +01:00
|
|
|
FsStorageId storage_id = (FsStorageId)sid;
|
2018-06-10 18:11:05 +01:00
|
|
|
FsStorage data_storage;
|
|
|
|
FsFile data_file;
|
2018-11-15 22:59:47 +00:00
|
|
|
|
|
|
|
if (!this->should_override_contents) {
|
|
|
|
return RESULT_FORWARD_TO_SESSION;
|
|
|
|
}
|
2018-11-04 21:56:07 +00:00
|
|
|
|
2018-10-30 00:30:39 +00:00
|
|
|
std::shared_ptr<IStorageInterface> storage = nullptr;
|
2018-06-15 00:50:01 +01:00
|
|
|
u32 out_domain_id = 0;
|
2018-10-30 00:30:39 +00:00
|
|
|
Result rc = 0;
|
2018-10-16 21:33:45 +01:00
|
|
|
|
2018-11-04 21:56:07 +00:00
|
|
|
bool has_cache = StorageCacheGetEntry(data_id, &storage);
|
|
|
|
|
2018-10-30 00:30:39 +00:00
|
|
|
ON_SCOPE_EXIT {
|
|
|
|
if (R_SUCCEEDED(rc)) {
|
2018-11-04 21:56:07 +00:00
|
|
|
if (!has_cache) {
|
|
|
|
StorageCacheSetEntry(data_id, &storage);
|
|
|
|
}
|
|
|
|
|
2018-10-30 00:30:39 +00:00
|
|
|
out_storage.SetValue(std::move(storage));
|
|
|
|
if (out_storage.IsDomain()) {
|
|
|
|
out_storage.ChangeObjectId(out_domain_id);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2018-11-04 21:56:07 +00:00
|
|
|
if (has_cache) {
|
|
|
|
if (out_storage.IsDomain()) {
|
|
|
|
FsStorage s = {0};
|
|
|
|
rc = fsOpenDataStorageByDataIdFwd(this->forward_service.get(), storage_id, data_id, &s);
|
|
|
|
if (R_SUCCEEDED(rc)) {
|
|
|
|
out_domain_id = s.s.object_id;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
rc = 0;
|
|
|
|
}
|
|
|
|
if (R_FAILED(rc)) {
|
|
|
|
storage.reset();
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
rc = fsOpenDataStorageByDataIdFwd(this->forward_service.get(), storage_id, data_id, &data_storage);
|
2018-10-16 21:33:45 +01:00
|
|
|
|
2018-11-04 21:56:07 +00:00
|
|
|
if (R_SUCCEEDED(rc)) {
|
|
|
|
if (Utils::HasSdRomfsContent(data_id)) {
|
|
|
|
/* TODO: Is there a sensible path that ends in ".romfs" we can use?" */
|
|
|
|
if (R_SUCCEEDED(Utils::OpenSdFileForAtmosphere(data_id, "romfs.bin", FS_OPEN_READ, &data_file))) {
|
|
|
|
storage = std::make_shared<IStorageInterface>(new LayeredRomFS(std::make_shared<RomInterfaceStorage>(data_storage), std::make_shared<RomFileStorage>(data_file), data_id));
|
|
|
|
} else {
|
|
|
|
storage = std::make_shared<IStorageInterface>(new LayeredRomFS(std::make_shared<RomInterfaceStorage>(data_storage), nullptr, data_id));
|
|
|
|
}
|
|
|
|
if (out_storage.IsDomain()) {
|
|
|
|
out_domain_id = data_storage.s.object_id;
|
|
|
|
}
|
2018-11-04 20:45:29 +00:00
|
|
|
} else {
|
2018-11-04 21:56:07 +00:00
|
|
|
/* If we don't have anything to modify, there's no sense in maintaining a copy of the metadata tables. */
|
|
|
|
fsStorageClose(&data_storage);
|
|
|
|
rc = RESULT_FORWARD_TO_SESSION;
|
2018-11-04 20:45:29 +00:00
|
|
|
}
|
2018-06-12 23:00:09 +01:00
|
|
|
}
|
2018-06-10 18:11:05 +01:00
|
|
|
}
|
2018-06-12 23:00:09 +01:00
|
|
|
|
2018-10-30 00:30:39 +00:00
|
|
|
return rc;
|
2018-06-10 02:33:22 +01:00
|
|
|
}
|