1
0
Fork 0
mirror of https://github.com/Atmosphere-NX/Atmosphere.git synced 2024-12-23 10:52:13 +00:00

Add files via upload

This commit is contained in:
Kronos2308 2019-05-17 08:29:38 +01:00 committed by GitHub
parent 674175e1c6
commit d0d7772f98
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23

View file

@ -1,438 +1,438 @@
/* /*
* Copyright (c) 2018-2019 Atmosphère-NX * Copyright (c) 2018-2019 Atmosphère-NX
* *
* This program is free software; you can redistribute it and/or modify it * This program is free software; you can redistribute it and/or modify it
* under the terms and conditions of the GNU General Public License, * under the terms and conditions of the GNU General Public License,
* version 2, as published by the Free Software Foundation. * version 2, as published by the Free Software Foundation.
* *
* This program is distributed in the hope it will be useful, but WITHOUT * This program is distributed in the hope it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
* more details. * more details.
* *
* You should have received a copy of the GNU General Public License * You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>. * along with this program. If not, see <http://www.gnu.org/licenses/>.
*/ */
#include <map> #include <map>
#include <memory> #include <memory>
#include <mutex> #include <mutex>
#include <switch.h> #include <switch.h>
#include <stratosphere.hpp> #include <stratosphere.hpp>
#include "fsmitm_service.hpp" #include "fsmitm_service.hpp"
#include "fs_shim.h" #include "fs_shim.h"
#include "../utils.hpp" #include "../utils.hpp"
#include "fsmitm_boot0storage.hpp" #include "fsmitm_boot0storage.hpp"
#include "fsmitm_romstorage.hpp" #include "fsmitm_romstorage.hpp"
#include "fsmitm_layeredrom.hpp" #include "fsmitm_layeredrom.hpp"
#include "fs_dir_utils.hpp" #include "fs_dir_utils.hpp"
#include "fs_save_utils.hpp" #include "fs_save_utils.hpp"
#include "fs_subdirectory_filesystem.hpp" #include "fs_subdirectory_filesystem.hpp"
#include "fs_directory_savedata_filesystem.hpp" #include "fs_directory_savedata_filesystem.hpp"
#include "../debug.hpp" #include "../debug.hpp"
static HosMutex g_StorageCacheLock; static HosMutex g_StorageCacheLock;
static std::unordered_map<u64, std::weak_ptr<IStorageInterface>> g_StorageCache; static std::unordered_map<u64, std::weak_ptr<IStorageInterface>> g_StorageCache;
static bool StorageCacheGetEntry(u64 title_id, std::shared_ptr<IStorageInterface> *out) { static bool StorageCacheGetEntry(u64 title_id, std::shared_ptr<IStorageInterface> *out) {
std::scoped_lock<HosMutex> lock(g_StorageCacheLock); std::scoped_lock<HosMutex> lock(g_StorageCacheLock);
if (g_StorageCache.find(title_id) == g_StorageCache.end()) { if (g_StorageCache.find(title_id) == g_StorageCache.end()) {
return false; return false;
} }
auto intf = g_StorageCache[title_id].lock(); auto intf = g_StorageCache[title_id].lock();
if (intf != nullptr) { if (intf != nullptr) {
*out = intf; *out = intf;
return true; return true;
} }
return false; return false;
} }
static void StorageCacheSetEntry(u64 title_id, std::shared_ptr<IStorageInterface> *ptr) { static void StorageCacheSetEntry(u64 title_id, std::shared_ptr<IStorageInterface> *ptr) {
std::scoped_lock<HosMutex> lock(g_StorageCacheLock); std::scoped_lock<HosMutex> lock(g_StorageCacheLock);
/* Ensure we always use the cached copy if present. */ /* Ensure we always use the cached copy if present. */
if (g_StorageCache.find(title_id) != g_StorageCache.end()) { if (g_StorageCache.find(title_id) != g_StorageCache.end()) {
auto intf = g_StorageCache[title_id].lock(); auto intf = g_StorageCache[title_id].lock();
if (intf != nullptr) { if (intf != nullptr) {
*ptr = intf; *ptr = intf;
} }
} }
g_StorageCache[title_id] = *ptr; g_StorageCache[title_id] = *ptr;
} }
void FsMitmService::PostProcess(IMitmServiceObject *obj, IpcResponseContext *ctx) { void FsMitmService::PostProcess(IMitmServiceObject *obj, IpcResponseContext *ctx) {
auto this_ptr = static_cast<FsMitmService *>(obj); auto this_ptr = static_cast<FsMitmService *>(obj);
switch ((FspSrvCmd)ctx->cmd_id) { switch ((FspSrvCmd)ctx->cmd_id) {
case FspSrvCmd_SetCurrentProcess: case FspSrvCmd_SetCurrentProcess:
if (R_SUCCEEDED(ctx->rc)) { if (R_SUCCEEDED(ctx->rc)) {
this_ptr->has_initialized = true; this_ptr->has_initialized = true;
this_ptr->process_id = ctx->request.Pid; this_ptr->process_id = ctx->request.Pid;
this_ptr->title_id = this_ptr->process_id; this_ptr->title_id = this_ptr->process_id;
if (R_FAILED(MitmQueryUtils::GetAssociatedTidForPid(this_ptr->process_id, &this_ptr->title_id))) { if (R_FAILED(MitmQueryUtils::GetAssociatedTidForPid(this_ptr->process_id, &this_ptr->title_id))) {
/* Log here, if desired. */ /* Log here, if desired. */
} }
break; break;
} }
break; break;
default: default:
break; break;
} }
} }
Result FsMitmService::OpenHblWebContentFileSystem(Out<std::shared_ptr<IFileSystemInterface>> &out_fs) { Result FsMitmService::OpenHblWebContentFileSystem(Out<std::shared_ptr<IFileSystemInterface>> &out_fs) {
std::shared_ptr<IFileSystemInterface> fs = nullptr; std::shared_ptr<IFileSystemInterface> fs = nullptr;
u32 out_domain_id = 0; u32 out_domain_id = 0;
Result rc = ResultSuccess; Result rc = ResultSuccess;
ON_SCOPE_EXIT { ON_SCOPE_EXIT {
if (R_SUCCEEDED(rc)) { if (R_SUCCEEDED(rc)) {
out_fs.SetValue(std::move(fs)); out_fs.SetValue(std::move(fs));
if (out_fs.IsDomain()) { if (out_fs.IsDomain()) {
out_fs.ChangeObjectId(out_domain_id); out_fs.ChangeObjectId(out_domain_id);
} }
} }
}; };
/* Mount the SD card using fs.mitm's session. */ /* Mount the SD card using fs.mitm's session. */
FsFileSystem sd_fs; FsFileSystem sd_fs;
rc = fsMountSdcard(&sd_fs); rc = fsMountSdcard(&sd_fs);
if (R_SUCCEEDED(rc)) { if (R_SUCCEEDED(rc)) {
std::unique_ptr<IFileSystem> web_ifs = std::make_unique<SubDirectoryFileSystem>(std::make_shared<ProxyFileSystem>(sd_fs), AtmosphereHblWebContentDir); std::unique_ptr<IFileSystem> web_ifs = std::make_unique<SubDirectoryFileSystem>(std::make_shared<ProxyFileSystem>(sd_fs), AtmosphereHblWebContentDir);
fs = std::make_shared<IFileSystemInterface>(std::move(web_ifs)); fs = std::make_shared<IFileSystemInterface>(std::move(web_ifs));
if (out_fs.IsDomain()) { if (out_fs.IsDomain()) {
out_domain_id = sd_fs.s.object_id; out_domain_id = sd_fs.s.object_id;
} }
} }
return rc; return rc;
} }
Result FsMitmService::OpenFileSystemWithPatch(Out<std::shared_ptr<IFileSystemInterface>> out_fs, u64 title_id, u32 filesystem_type) { Result FsMitmService::OpenFileSystemWithPatch(Out<std::shared_ptr<IFileSystemInterface>> out_fs, u64 title_id, u32 filesystem_type) {
/* Check for eligibility. */ /* Check for eligibility. */
{ {
FsDir d; FsDir d;
if (!Utils::IsWebAppletTid(this->title_id) || filesystem_type != FsFileSystemType_ContentManual || !Utils::IsHblTid(title_id) || if (!Utils::IsWebAppletTid(this->title_id) || filesystem_type != FsFileSystemType_ContentManual || !Utils::IsHblTid(title_id) ||
R_FAILED(Utils::OpenSdDir(AtmosphereHblWebContentDir, &d))) { R_FAILED(Utils::OpenSdDir(AtmosphereHblWebContentDir, &d))) {
return ResultAtmosphereMitmShouldForwardToSession; return ResultAtmosphereMitmShouldForwardToSession;
} }
fsDirClose(&d); fsDirClose(&d);
} }
/* If there's an existing filesystem, don't override. */ /* If there's an existing filesystem, don't override. */
/* TODO: Multiplex, overriding existing content with HBL content. */ /* TODO: Multiplex, overriding existing content with HBL content. */
{ {
FsFileSystem fs; FsFileSystem fs;
if (R_SUCCEEDED(fsOpenFileSystemWithPatchFwd(this->forward_service.get(), &fs, title_id, static_cast<FsFileSystemType>(filesystem_type)))) { if (R_SUCCEEDED(fsOpenFileSystemWithPatchFwd(this->forward_service.get(), &fs, title_id, static_cast<FsFileSystemType>(filesystem_type)))) {
fsFsClose(&fs); fsFsClose(&fs);
return ResultAtmosphereMitmShouldForwardToSession; return ResultAtmosphereMitmShouldForwardToSession;
} }
} }
return this->OpenHblWebContentFileSystem(out_fs); return this->OpenHblWebContentFileSystem(out_fs);
} }
Result FsMitmService::OpenFileSystemWithId(Out<std::shared_ptr<IFileSystemInterface>> out_fs, InPointer<char> path, u64 title_id, u32 filesystem_type) { Result FsMitmService::OpenFileSystemWithId(Out<std::shared_ptr<IFileSystemInterface>> out_fs, InPointer<char> path, u64 title_id, u32 filesystem_type) {
/* Check for eligibility. */ /* Check for eligibility. */
{ {
FsDir d; FsDir d;
if (!Utils::IsWebAppletTid(this->title_id) || filesystem_type != FsFileSystemType_ContentManual || !Utils::IsHblTid(title_id) || if (!Utils::IsWebAppletTid(this->title_id) || filesystem_type != FsFileSystemType_ContentManual || !Utils::IsHblTid(title_id) ||
R_FAILED(Utils::OpenSdDir(AtmosphereHblWebContentDir, &d))) { R_FAILED(Utils::OpenSdDir(AtmosphereHblWebContentDir, &d))) {
return ResultAtmosphereMitmShouldForwardToSession; return ResultAtmosphereMitmShouldForwardToSession;
} }
fsDirClose(&d); fsDirClose(&d);
} }
/* If there's an existing filesystem, don't override. */ /* If there's an existing filesystem, don't override. */
/* TODO: Multiplex, overriding existing content with HBL content. */ /* TODO: Multiplex, overriding existing content with HBL content. */
{ {
FsFileSystem fs; FsFileSystem fs;
if (R_SUCCEEDED(fsOpenFileSystemWithIdFwd(this->forward_service.get(), &fs, title_id, static_cast<FsFileSystemType>(filesystem_type), path.pointer))) { if (R_SUCCEEDED(fsOpenFileSystemWithIdFwd(this->forward_service.get(), &fs, title_id, static_cast<FsFileSystemType>(filesystem_type), path.pointer))) {
fsFsClose(&fs); fsFsClose(&fs);
return ResultAtmosphereMitmShouldForwardToSession; return ResultAtmosphereMitmShouldForwardToSession;
} }
} }
return this->OpenHblWebContentFileSystem(out_fs); return this->OpenHblWebContentFileSystem(out_fs);
} }
Result FsMitmService::OpenSaveDataFileSystem(Out<std::shared_ptr<IFileSystemInterface>> out_fs, u8 space_id, FsSave save_struct) { Result FsMitmService::OpenSaveDataFileSystem(Out<std::shared_ptr<IFileSystemInterface>> out_fs, u8 space_id, FsSave save_struct) {
const bool has_sd_save_flags = Utils::HasFlag(this->title_id, "sd_save"); const bool has_redirect_save_flags = Utils::HasFlag(this->title_id, "redirect_save");
bool should_redirect_saves = false; bool should_redirect_saves = false;
if (R_FAILED(Utils::GetSettingsItemBooleanValue("atmosphere", "fsmitm_redirect_saves_to_sd", &should_redirect_saves))) { if (R_FAILED(Utils::GetSettingsItemBooleanValue("atmosphere", "fsmitm_redirect_saves_to_sd", &should_redirect_saves))) {
return ResultAtmosphereMitmShouldForwardToSession; return ResultAtmosphereMitmShouldForwardToSession;
} }
//check if flag exist
if (!has_sd_save_flags) { if (!has_redirect_save_flags) {
should_redirect_saves = false; should_redirect_saves = false;
} }
/* For now, until we're sure this is robust, only intercept normal savedata. */ /* For now, until we're sure this is robust, only intercept normal savedata. */
if (!should_redirect_saves || save_struct.SaveDataType != FsSaveDataType_SaveData) { if (!should_redirect_saves || save_struct.SaveDataType != FsSaveDataType_SaveData) {
return ResultAtmosphereMitmShouldForwardToSession; return ResultAtmosphereMitmShouldForwardToSession;
} }
/* Verify we can open the save. */ /* Verify we can open the save. */
FsFileSystem save_fs; FsFileSystem save_fs;
if (R_FAILED(fsOpenSaveDataFileSystemFwd(this->forward_service.get(), &save_fs, space_id, &save_struct))) { if (R_FAILED(fsOpenSaveDataFileSystemFwd(this->forward_service.get(), &save_fs, space_id, &save_struct))) {
return ResultAtmosphereMitmShouldForwardToSession; return ResultAtmosphereMitmShouldForwardToSession;
} }
std::unique_ptr<IFileSystem> save_ifs = std::make_unique<ProxyFileSystem>(save_fs); std::unique_ptr<IFileSystem> save_ifs = std::make_unique<ProxyFileSystem>(save_fs);
{ {
std::shared_ptr<IFileSystemInterface> fs = nullptr; std::shared_ptr<IFileSystemInterface> fs = nullptr;
u32 out_domain_id = 0; u32 out_domain_id = 0;
Result rc = ResultSuccess; Result rc = ResultSuccess;
ON_SCOPE_EXIT { ON_SCOPE_EXIT {
if (R_SUCCEEDED(rc)) { if (R_SUCCEEDED(rc)) {
out_fs.SetValue(std::move(fs)); out_fs.SetValue(std::move(fs));
if (out_fs.IsDomain()) { if (out_fs.IsDomain()) {
out_fs.ChangeObjectId(out_domain_id); out_fs.ChangeObjectId(out_domain_id);
} }
} }
}; };
/* Mount the SD card using fs.mitm's session. */ /* Mount the SD card using fs.mitm's session. */
FsFileSystem sd_fs; FsFileSystem sd_fs;
if (R_FAILED((rc = fsMountSdcard(&sd_fs)))) { if (R_FAILED((rc = fsMountSdcard(&sd_fs)))) {
return rc; return rc;
} }
std::shared_ptr<IFileSystem> sd_ifs = std::make_shared<ProxyFileSystem>(sd_fs); std::shared_ptr<IFileSystem> sd_ifs = std::make_shared<ProxyFileSystem>(sd_fs);
/* Verify that we can open the save directory, and that it exists. */ /* Verify that we can open the save directory, and that it exists. */
const u64 target_tid = save_struct.titleID == 0 ? this->title_id : save_struct.titleID; const u64 target_tid = save_struct.titleID == 0 ? this->title_id : save_struct.titleID;
FsPath save_dir_path; FsPath save_dir_path;
if (R_FAILED((rc = FsSaveUtils::GetSaveDataDirectoryPath(save_dir_path, space_id, save_struct.SaveDataType, target_tid, save_struct.userID, save_struct.saveID)))) { if (R_FAILED((rc = FsSaveUtils::GetSaveDataDirectoryPath(save_dir_path, space_id, save_struct.SaveDataType, target_tid, save_struct.userID, save_struct.saveID)))) {
return rc; return rc;
} }
/* Check if this is the first time we're making the save. */ /* Check if this is the first time we're making the save. */
bool is_new_save = false; bool is_new_save = false;
{ {
DirectoryEntryType ent; DirectoryEntryType ent;
if (sd_ifs->GetEntryType(&ent, save_dir_path) == ResultFsPathNotFound) { if (sd_ifs->GetEntryType(&ent, save_dir_path) == ResultFsPathNotFound) {
is_new_save = true; is_new_save = true;
} }
} }
/* Ensure the directory exists. */ /* Ensure the directory exists. */
if (R_FAILED((rc = FsDirUtils::EnsureDirectoryExists(sd_ifs.get(), save_dir_path)))) { if (R_FAILED((rc = FsDirUtils::EnsureDirectoryExists(sd_ifs.get(), save_dir_path)))) {
return rc; return rc;
} }
std::shared_ptr<DirectorySaveDataFileSystem> dirsave_ifs = std::make_shared<DirectorySaveDataFileSystem>(new SubDirectoryFileSystem(sd_ifs, save_dir_path.str), std::move(save_ifs)); std::shared_ptr<DirectorySaveDataFileSystem> dirsave_ifs = std::make_shared<DirectorySaveDataFileSystem>(new SubDirectoryFileSystem(sd_ifs, save_dir_path.str), std::move(save_ifs));
/* If it's the first time we're making the save, copy existing savedata over. */ /* If it's the first time we're making the save, copy existing savedata over. */
if (is_new_save) { if (is_new_save) {
/* TODO: Check error? */ /* TODO: Check error? */
dirsave_ifs->CopySaveFromProxy(); dirsave_ifs->CopySaveFromProxy();
} }
fs = std::make_shared<IFileSystemInterface>(static_cast<std::shared_ptr<IFileSystem>>(dirsave_ifs)); fs = std::make_shared<IFileSystemInterface>(static_cast<std::shared_ptr<IFileSystem>>(dirsave_ifs));
if (out_fs.IsDomain()) { if (out_fs.IsDomain()) {
out_domain_id = sd_fs.s.object_id; out_domain_id = sd_fs.s.object_id;
} }
return rc; return rc;
} }
} }
/* Gate access to the BIS partitions. */ /* Gate access to the BIS partitions. */
Result FsMitmService::OpenBisStorage(Out<std::shared_ptr<IStorageInterface>> out_storage, u32 bis_partition_id) { Result FsMitmService::OpenBisStorage(Out<std::shared_ptr<IStorageInterface>> out_storage, u32 bis_partition_id) {
std::shared_ptr<IStorageInterface> storage = nullptr; std::shared_ptr<IStorageInterface> storage = nullptr;
u32 out_domain_id = 0; u32 out_domain_id = 0;
Result rc = ResultSuccess; Result rc = ResultSuccess;
ON_SCOPE_EXIT { ON_SCOPE_EXIT {
if (R_SUCCEEDED(rc)) { if (R_SUCCEEDED(rc)) {
out_storage.SetValue(std::move(storage)); out_storage.SetValue(std::move(storage));
if (out_storage.IsDomain()) { if (out_storage.IsDomain()) {
out_storage.ChangeObjectId(out_domain_id); out_storage.ChangeObjectId(out_domain_id);
} }
} }
}; };
{ {
FsStorage bis_storage; FsStorage bis_storage;
rc = fsOpenBisStorageFwd(this->forward_service.get(), &bis_storage, bis_partition_id); rc = fsOpenBisStorageFwd(this->forward_service.get(), &bis_storage, bis_partition_id);
if (R_SUCCEEDED(rc)) { if (R_SUCCEEDED(rc)) {
const bool is_sysmodule = TitleIdIsSystem(this->title_id); const bool is_sysmodule = TitleIdIsSystem(this->title_id);
const bool has_bis_write_flag = Utils::HasFlag(this->title_id, "bis_write"); const bool has_bis_write_flag = Utils::HasFlag(this->title_id, "bis_write");
const bool has_cal0_read_flag = Utils::HasFlag(this->title_id, "cal_read"); const bool has_cal0_read_flag = Utils::HasFlag(this->title_id, "cal_read");
if (bis_partition_id == BisStorageId_Boot0) { if (bis_partition_id == BisStorageId_Boot0) {
storage = std::make_shared<IStorageInterface>(new Boot0Storage(bis_storage, this->title_id)); storage = std::make_shared<IStorageInterface>(new Boot0Storage(bis_storage, this->title_id));
} else if (bis_partition_id == BisStorageId_Prodinfo) { } else if (bis_partition_id == BisStorageId_Prodinfo) {
/* PRODINFO should *never* be writable. */ /* PRODINFO should *never* be writable. */
if (is_sysmodule || has_cal0_read_flag) { if (is_sysmodule || has_cal0_read_flag) {
storage = std::make_shared<IStorageInterface>(new ROProxyStorage(bis_storage)); storage = std::make_shared<IStorageInterface>(new ROProxyStorage(bis_storage));
} else { } else {
/* Do not allow non-sysmodules to read *or* write CAL0. */ /* Do not allow non-sysmodules to read *or* write CAL0. */
fsStorageClose(&bis_storage); fsStorageClose(&bis_storage);
rc = ResultFsPermissionDenied; rc = ResultFsPermissionDenied;
return rc; return rc;
} }
} else { } else {
if (is_sysmodule || has_bis_write_flag) { if (is_sysmodule || has_bis_write_flag) {
/* Sysmodules should still be allowed to read and write. */ /* Sysmodules should still be allowed to read and write. */
storage = std::make_shared<IStorageInterface>(new ProxyStorage(bis_storage)); storage = std::make_shared<IStorageInterface>(new ProxyStorage(bis_storage));
} else if (Utils::IsHblTid(this->title_id) && } else if (Utils::IsHblTid(this->title_id) &&
((BisStorageId_BcPkg2_1 <= bis_partition_id && bis_partition_id <= BisStorageId_BcPkg2_6) || bis_partition_id == BisStorageId_Boot1)) { ((BisStorageId_BcPkg2_1 <= bis_partition_id && bis_partition_id <= BisStorageId_BcPkg2_6) || bis_partition_id == BisStorageId_Boot1)) {
/* Allow HBL to write to boot1 (safe firm) + package2. */ /* Allow HBL to write to boot1 (safe firm) + package2. */
/* This is needed to not break compatibility with ChoiDujourNX, which does not check for write access before beginning an update. */ /* This is needed to not break compatibility with ChoiDujourNX, which does not check for write access before beginning an update. */
/* TODO: get fixed so that this can be turned off without causing bricks :/ */ /* TODO: get fixed so that this can be turned off without causing bricks :/ */
storage = std::make_shared<IStorageInterface>(new ProxyStorage(bis_storage)); storage = std::make_shared<IStorageInterface>(new ProxyStorage(bis_storage));
} else { } else {
/* Non-sysmodules should be allowed to read. */ /* Non-sysmodules should be allowed to read. */
storage = std::make_shared<IStorageInterface>(new ROProxyStorage(bis_storage)); storage = std::make_shared<IStorageInterface>(new ROProxyStorage(bis_storage));
} }
} }
if (out_storage.IsDomain()) { if (out_storage.IsDomain()) {
out_domain_id = bis_storage.s.object_id; out_domain_id = bis_storage.s.object_id;
} }
} }
} }
return rc; return rc;
} }
/* Add redirection for RomFS to the SD card. */ /* Add redirection for RomFS to the SD card. */
Result FsMitmService::OpenDataStorageByCurrentProcess(Out<std::shared_ptr<IStorageInterface>> out_storage) { Result FsMitmService::OpenDataStorageByCurrentProcess(Out<std::shared_ptr<IStorageInterface>> out_storage) {
std::shared_ptr<IStorageInterface> storage = nullptr; std::shared_ptr<IStorageInterface> storage = nullptr;
u32 out_domain_id = 0; u32 out_domain_id = 0;
Result rc = ResultSuccess; Result rc = ResultSuccess;
if (!this->should_override_contents) { if (!this->should_override_contents) {
return ResultAtmosphereMitmShouldForwardToSession; return ResultAtmosphereMitmShouldForwardToSession;
} }
bool has_cache = StorageCacheGetEntry(this->title_id, &storage); bool has_cache = StorageCacheGetEntry(this->title_id, &storage);
ON_SCOPE_EXIT { ON_SCOPE_EXIT {
if (R_SUCCEEDED(rc)) { if (R_SUCCEEDED(rc)) {
if (!has_cache) { if (!has_cache) {
StorageCacheSetEntry(this->title_id, &storage); StorageCacheSetEntry(this->title_id, &storage);
} }
out_storage.SetValue(std::move(storage)); out_storage.SetValue(std::move(storage));
if (out_storage.IsDomain()) { if (out_storage.IsDomain()) {
out_storage.ChangeObjectId(out_domain_id); out_storage.ChangeObjectId(out_domain_id);
} }
} }
}; };
if (has_cache) { if (has_cache) {
if (out_storage.IsDomain()) { if (out_storage.IsDomain()) {
FsStorage s = {0}; FsStorage s = {0};
rc = fsOpenDataStorageByCurrentProcessFwd(this->forward_service.get(), &s); rc = fsOpenDataStorageByCurrentProcessFwd(this->forward_service.get(), &s);
if (R_SUCCEEDED(rc)) { if (R_SUCCEEDED(rc)) {
out_domain_id = s.s.object_id; out_domain_id = s.s.object_id;
} }
} else { } else {
rc = ResultSuccess; rc = ResultSuccess;
} }
if (R_FAILED(rc)) { if (R_FAILED(rc)) {
storage.reset(); storage.reset();
} }
} else { } else {
FsStorage data_storage; FsStorage data_storage;
FsFile data_file; FsFile data_file;
rc = fsOpenDataStorageByCurrentProcessFwd(this->forward_service.get(), &data_storage); rc = fsOpenDataStorageByCurrentProcessFwd(this->forward_service.get(), &data_storage);
Log(armGetTls(), 0x100); Log(armGetTls(), 0x100);
if (R_SUCCEEDED(rc)) { if (R_SUCCEEDED(rc)) {
if (Utils::HasSdRomfsContent(this->title_id)) { if (Utils::HasSdRomfsContent(this->title_id)) {
/* TODO: Is there a sensible path that ends in ".romfs" we can use?" */ /* TODO: Is there a sensible path that ends in ".romfs" we can use?" */
if (R_SUCCEEDED(Utils::OpenSdFileForAtmosphere(this->title_id, "romfs.bin", FS_OPEN_READ, &data_file))) { if (R_SUCCEEDED(Utils::OpenSdFileForAtmosphere(this->title_id, "romfs.bin", FS_OPEN_READ, &data_file))) {
storage = std::make_shared<IStorageInterface>(new LayeredRomFS(std::make_shared<RomInterfaceStorage>(data_storage), std::make_shared<RomFileStorage>(data_file), this->title_id)); storage = std::make_shared<IStorageInterface>(new LayeredRomFS(std::make_shared<RomInterfaceStorage>(data_storage), std::make_shared<RomFileStorage>(data_file), this->title_id));
} else { } else {
storage = std::make_shared<IStorageInterface>(new LayeredRomFS(std::make_shared<RomInterfaceStorage>(data_storage), nullptr, this->title_id)); storage = std::make_shared<IStorageInterface>(new LayeredRomFS(std::make_shared<RomInterfaceStorage>(data_storage), nullptr, this->title_id));
} }
if (out_storage.IsDomain()) { if (out_storage.IsDomain()) {
out_domain_id = data_storage.s.object_id; out_domain_id = data_storage.s.object_id;
} }
} else { } else {
/* If we don't have anything to modify, there's no sense in maintaining a copy of the metadata tables. */ /* If we don't have anything to modify, there's no sense in maintaining a copy of the metadata tables. */
fsStorageClose(&data_storage); fsStorageClose(&data_storage);
rc = ResultAtmosphereMitmShouldForwardToSession; rc = ResultAtmosphereMitmShouldForwardToSession;
} }
} }
} }
return rc; return rc;
} }
/* Add redirection for System Data Archives to the SD card. */ /* Add redirection for System Data Archives to the SD card. */
Result FsMitmService::OpenDataStorageByDataId(Out<std::shared_ptr<IStorageInterface>> out_storage, u64 data_id, u8 sid) { Result FsMitmService::OpenDataStorageByDataId(Out<std::shared_ptr<IStorageInterface>> out_storage, u64 data_id, u8 sid) {
FsStorageId storage_id = (FsStorageId)sid; FsStorageId storage_id = (FsStorageId)sid;
FsStorage data_storage; FsStorage data_storage;
FsFile data_file; FsFile data_file;
if (!this->should_override_contents) { if (!this->should_override_contents) {
return ResultAtmosphereMitmShouldForwardToSession; return ResultAtmosphereMitmShouldForwardToSession;
} }
std::shared_ptr<IStorageInterface> storage = nullptr; std::shared_ptr<IStorageInterface> storage = nullptr;
u32 out_domain_id = 0; u32 out_domain_id = 0;
Result rc = ResultSuccess; Result rc = ResultSuccess;
bool has_cache = StorageCacheGetEntry(data_id, &storage); bool has_cache = StorageCacheGetEntry(data_id, &storage);
ON_SCOPE_EXIT { ON_SCOPE_EXIT {
if (R_SUCCEEDED(rc)) { if (R_SUCCEEDED(rc)) {
if (!has_cache) { if (!has_cache) {
StorageCacheSetEntry(data_id, &storage); StorageCacheSetEntry(data_id, &storage);
} }
out_storage.SetValue(std::move(storage)); out_storage.SetValue(std::move(storage));
if (out_storage.IsDomain()) { if (out_storage.IsDomain()) {
out_storage.ChangeObjectId(out_domain_id); out_storage.ChangeObjectId(out_domain_id);
} }
} }
}; };
if (has_cache) { if (has_cache) {
if (out_storage.IsDomain()) { if (out_storage.IsDomain()) {
FsStorage s = {0}; FsStorage s = {0};
rc = fsOpenDataStorageByDataIdFwd(this->forward_service.get(), storage_id, data_id, &s); rc = fsOpenDataStorageByDataIdFwd(this->forward_service.get(), storage_id, data_id, &s);
if (R_SUCCEEDED(rc)) { if (R_SUCCEEDED(rc)) {
out_domain_id = s.s.object_id; out_domain_id = s.s.object_id;
} }
} else { } else {
rc = ResultSuccess; rc = ResultSuccess;
} }
if (R_FAILED(rc)) { if (R_FAILED(rc)) {
storage.reset(); storage.reset();
} }
} else { } else {
rc = fsOpenDataStorageByDataIdFwd(this->forward_service.get(), storage_id, data_id, &data_storage); rc = fsOpenDataStorageByDataIdFwd(this->forward_service.get(), storage_id, data_id, &data_storage);
if (R_SUCCEEDED(rc)) { if (R_SUCCEEDED(rc)) {
if (Utils::HasSdRomfsContent(data_id)) { if (Utils::HasSdRomfsContent(data_id)) {
/* TODO: Is there a sensible path that ends in ".romfs" we can use?" */ /* TODO: Is there a sensible path that ends in ".romfs" we can use?" */
if (R_SUCCEEDED(Utils::OpenSdFileForAtmosphere(data_id, "romfs.bin", FS_OPEN_READ, &data_file))) { if (R_SUCCEEDED(Utils::OpenSdFileForAtmosphere(data_id, "romfs.bin", FS_OPEN_READ, &data_file))) {
storage = std::make_shared<IStorageInterface>(new LayeredRomFS(std::make_shared<RomInterfaceStorage>(data_storage), std::make_shared<RomFileStorage>(data_file), data_id)); storage = std::make_shared<IStorageInterface>(new LayeredRomFS(std::make_shared<RomInterfaceStorage>(data_storage), std::make_shared<RomFileStorage>(data_file), data_id));
} else { } else {
storage = std::make_shared<IStorageInterface>(new LayeredRomFS(std::make_shared<RomInterfaceStorage>(data_storage), nullptr, data_id)); storage = std::make_shared<IStorageInterface>(new LayeredRomFS(std::make_shared<RomInterfaceStorage>(data_storage), nullptr, data_id));
} }
if (out_storage.IsDomain()) { if (out_storage.IsDomain()) {
out_domain_id = data_storage.s.object_id; out_domain_id = data_storage.s.object_id;
} }
} else { } else {
/* If we don't have anything to modify, there's no sense in maintaining a copy of the metadata tables. */ /* If we don't have anything to modify, there's no sense in maintaining a copy of the metadata tables. */
fsStorageClose(&data_storage); fsStorageClose(&data_storage);
rc = ResultAtmosphereMitmShouldForwardToSession; rc = ResultAtmosphereMitmShouldForwardToSession;
} }
} }
} }
return rc; return rc;
} }