// Copyright 2015 Citra Emulator Project // Licensed under GPLv2 or any later version // Refer to the license.txt file included. #include #include #include "common/archives.h" #include "common/common_paths.h" #include "common/file_util.h" #include "common/logging/log.h" #include "core/core.h" #include "core/file_sys/archive_ncch.h" #include "core/file_sys/file_backend.h" #include "core/hle/applets/applet.h" #include "core/hle/kernel/mutex.h" #include "core/hle/kernel/shared_memory.h" #include "core/hle/romfs.h" #include "core/hle/service/apt/applet_manager.h" #include "core/hle/service/apt/apt.h" #include "core/hle/service/apt/apt_a.h" #include "core/hle/service/apt/apt_s.h" #include "core/hle/service/apt/apt_u.h" #include "core/hle/service/apt/bcfnt/bcfnt.h" #include "core/hle/service/apt/ns_s.h" #include "core/hle/service/cfg/cfg.h" #include "core/hle/service/fs/archive.h" #include "core/hle/service/ptm/ptm.h" #include "core/hle/service/service.h" #include "core/hw/aes/ccm.h" #include "core/hw/aes/key.h" SERVICE_CONSTRUCT_IMPL(Service::APT::Module) namespace Service::APT { template void Module::serialize(Archive& ar, const unsigned int file_version) { ar& shared_font_mem; ar& shared_font_loaded; ar& shared_font_relocated; ar& lock; ar& cpu_percent; ar& unknown_ns_state_field; ar& screen_capture_buffer; ar& screen_capture_post_permission; ar& applet_manager; if (file_version > 0) { ar& wireless_reboot_info; } } SERIALIZE_IMPL(Module) Module::NSInterface::NSInterface(std::shared_ptr apt, const char* name, u32 max_session) : ServiceFramework(name, max_session), apt(std::move(apt)) {} Module::NSInterface::~NSInterface() = default; std::shared_ptr Module::NSInterface::GetModule() const { return apt; } void Module::NSInterface::SetWirelessRebootInfo(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x06, 1, 2); // 0x00060042 u32 size = rp.Pop(); auto buffer = rp.PopStaticBuffer(); apt->wireless_reboot_info = std::move(buffer); auto rb = rp.MakeBuilder(1, 0); rb.Push(RESULT_SUCCESS); LOG_WARNING(Service_APT, "called size={}", size); } void Module::APTInterface::Initialize(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x2, 2, 0); // 0x20080 AppletId app_id = rp.PopEnum(); u32 attributes = rp.Pop(); LOG_DEBUG(Service_APT, "called app_id={:#010X}, attributes={:#010X}", app_id, attributes); auto result = apt->applet_manager->Initialize(app_id, attributes); if (result.Failed()) { IPC::RequestBuilder rb = rp.MakeBuilder(1, 0); rb.Push(result.Code()); } else { auto events = std::move(result).Unwrap(); IPC::RequestBuilder rb = rp.MakeBuilder(1, 3); rb.Push(RESULT_SUCCESS); rb.PushCopyObjects(events.notification_event, events.parameter_event); } } static u32 DecompressLZ11(const u8* in, u8* out) { u32_le decompressed_size; memcpy(&decompressed_size, in, sizeof(u32)); in += 4; u8 type = decompressed_size & 0xFF; ASSERT(type == 0x11); decompressed_size >>= 8; u32 current_out_size = 0; u8 flags = 0, mask = 1; while (current_out_size < decompressed_size) { if (mask == 1) { flags = *(in++); mask = 0x80; } else { mask >>= 1; } if (flags & mask) { u8 byte1 = *(in++); u32 length = byte1 >> 4; u32 offset; if (length == 0) { u8 byte2 = *(in++); u8 byte3 = *(in++); length = (((byte1 & 0x0F) << 4) | (byte2 >> 4)) + 0x11; offset = (((byte2 & 0x0F) << 8) | byte3) + 0x1; } else if (length == 1) { u8 byte2 = *(in++); u8 byte3 = *(in++); u8 byte4 = *(in++); length = (((byte1 & 0x0F) << 12) | (byte2 << 4) | (byte3 >> 4)) + 0x111; offset = (((byte3 & 0x0F) << 8) | byte4) + 0x1; } else { u8 byte2 = *(in++); length = (byte1 >> 4) + 0x1; offset = (((byte1 & 0x0F) << 8) | byte2) + 0x1; } for (u32 i = 0; i < length; i++) { *out = *(out - offset); ++out; } current_out_size += length; } else { *(out++) = *(in++); current_out_size++; } } return decompressed_size; } bool Module::LoadSharedFont() { u8 font_region_code; auto cfg = Service::CFG::GetModule(system); ASSERT_MSG(cfg, "CFG Module missing!"); switch (cfg->GetRegionValue()) { case 4: // CHN font_region_code = 2; break; case 5: // KOR font_region_code = 3; break; case 6: // TWN font_region_code = 4; break; default: // JPN/EUR/USA font_region_code = 1; break; } const u64_le shared_font_archive_id_low = 0x0004009b00014002 | ((font_region_code - 1) << 8); FileSys::NCCHArchive archive(shared_font_archive_id_low, Service::FS::MediaType::NAND); // 20-byte all zero path for opening RomFS const FileSys::Path file_path(std::vector(20, 0)); FileSys::Mode open_mode = {}; open_mode.read_flag.Assign(1); auto file_result = archive.OpenFile(file_path, open_mode); if (file_result.Failed()) return false; auto romfs = std::move(file_result).Unwrap(); std::vector romfs_buffer(romfs->GetSize()); romfs->Read(0, romfs_buffer.size(), romfs_buffer.data()); romfs->Close(); const char16_t* file_name[4] = {u"cbf_std.bcfnt.lz", u"cbf_zh-Hans-CN.bcfnt.lz", u"cbf_ko-Hang-KR.bcfnt.lz", u"cbf_zh-Hant-TW.bcfnt.lz"}; const RomFS::RomFSFile font_file = RomFS::GetFile(romfs_buffer.data(), {file_name[font_region_code - 1]}); if (font_file.Data() == nullptr) return false; struct { u32_le status; u32_le region; u32_le decompressed_size; INSERT_PADDING_WORDS(0x1D); } shared_font_header{}; static_assert(sizeof(shared_font_header) == 0x80, "shared_font_header has incorrect size"); shared_font_header.status = 2; // successfully loaded shared_font_header.region = font_region_code; shared_font_header.decompressed_size = DecompressLZ11(font_file.Data(), shared_font_mem->GetPointer(0x80)); std::memcpy(shared_font_mem->GetPointer(), &shared_font_header, sizeof(shared_font_header)); *shared_font_mem->GetPointer(0x83) = 'U'; // Change the magic from "CFNT" to "CFNU" return true; } bool Module::LoadLegacySharedFont() { // This is the legacy method to load shared font. // The expected format is a decrypted, uncompressed BCFNT file with the 0x80 byte header // generated by the APT:U service. The best way to get is by dumping it from RAM. We've provided // a homebrew app to do this: https://github.com/citra-emu/3dsutils. Put the resulting file // "shared_font.bin" in the Citra "sysdata" directory. std::string filepath = FileUtil::GetUserPath(FileUtil::UserPath::SysDataDir) + SHARED_FONT; FileUtil::CreateFullPath(filepath); // Create path if not already created FileUtil::IOFile file(filepath, "rb"); if (file.IsOpen()) { file.ReadBytes(shared_font_mem->GetPointer(), file.GetSize()); return true; } return false; } void Module::APTInterface::GetSharedFont(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x44, 0, 0); // 0x00440000 IPC::RequestBuilder rb = rp.MakeBuilder(2, 2); // Log in telemetry if the game uses the shared font apt->system.TelemetrySession().AddField(Telemetry::FieldType::Session, "RequiresSharedFont", true); if (!apt->shared_font_loaded) { // On real 3DS, font loading happens on booting. However, we load it on demand to coordinate // with CFG region auto configuration, which happens later than APT initialization. if (apt->LoadSharedFont()) { apt->shared_font_loaded = true; } else if (apt->LoadLegacySharedFont()) { LOG_WARNING(Service_APT, "Loaded shared font by legacy method"); apt->shared_font_loaded = true; } else { LOG_ERROR(Service_APT, "shared font file missing - go dump it from your 3ds"); rb.Push(-1); // TODO: Find the right error code rb.Push(0); rb.PushCopyObjects(nullptr); apt->system.SetStatus(Core::System::ResultStatus::ErrorSystemFiles, "Shared fonts"); return; } } // The shared font has to be relocated to the new address before being passed to the // application. // Note: the target address is still in the old linear heap region even on new firmware // versions. This exception is made for shared font to resolve the following compatibility // issue: // The linear heap region changes depending on the kernel version marked in application's // exheader (not the actual version the application is running on). If an application with old // kernel version and an applet with new kernel version run at the same time, and they both use // shared font, different linear heap region would have required shared font to relocate // according to two different addresses at the same time, which is impossible. VAddr target_address = apt->shared_font_mem->GetLinearHeapPhysicalOffset() + Memory::LINEAR_HEAP_VADDR; if (!apt->shared_font_relocated) { BCFNT::RelocateSharedFont(apt->shared_font_mem, target_address); apt->shared_font_relocated = true; } rb.Push(RESULT_SUCCESS); // No error // Since the SharedMemory interface doesn't provide the address at which the memory was // allocated, the real APT service calculates this address by scanning the entire address space // (using svcQueryMemory) and searches for an allocation of the same size as the Shared Font. rb.Push(target_address); rb.PushCopyObjects(apt->shared_font_mem); } void Module::APTInterface::GetWirelessRebootInfo(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x45, 1, 0); // 0x00450040 u32 size = rp.Pop(); LOG_WARNING(Service_APT, "called size={:08X}", size); IPC::RequestBuilder rb = rp.MakeBuilder(1, 2); rb.Push(RESULT_SUCCESS); rb.PushStaticBuffer(apt->wireless_reboot_info, 0); } void Module::APTInterface::NotifyToWait(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x43, 1, 0); // 0x430040 u32 app_id = rp.Pop(); IPC::RequestBuilder rb = rp.MakeBuilder(1, 0); rb.Push(RESULT_SUCCESS); // No error LOG_WARNING(Service_APT, "(STUBBED) app_id={}", app_id); } void Module::APTInterface::GetLockHandle(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x1, 1, 0); // 0x10040 // Bits [0:2] are the applet type (System, Library, etc) // Bit 5 tells the application that there's a pending APT parameter, // this will cause the app to wait until parameter_event is signaled. u32 applet_attributes = rp.Pop(); IPC::RequestBuilder rb = rp.MakeBuilder(3, 2); rb.Push(RESULT_SUCCESS); // No error // TODO(Subv): The output attributes should have an AppletPos of either Library or System | // Library (depending on the type of the last launched applet) if the input attributes' // AppletPos has the Library bit set. rb.Push(applet_attributes); // Applet Attributes, this value is passed to Enable. rb.Push(0); // Least significant bit = power button state rb.PushCopyObjects(apt->lock); LOG_WARNING(Service_APT, "(STUBBED) called applet_attributes={:#010X}", applet_attributes); } void Module::APTInterface::Enable(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x3, 1, 0); // 0x30040 u32 attributes = rp.Pop(); LOG_DEBUG(Service_APT, "called attributes={:#010X}", attributes); IPC::RequestBuilder rb = rp.MakeBuilder(1, 0); rb.Push(apt->applet_manager->Enable(attributes)); } void Module::APTInterface::GetAppletManInfo(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x5, 1, 0); // 0x50040 u32 unk = rp.Pop(); IPC::RequestBuilder rb = rp.MakeBuilder(5, 0); rb.Push(RESULT_SUCCESS); // No error rb.Push(0); rb.Push(0); rb.Push(static_cast(AppletId::HomeMenu)); // Home menu AppID rb.Push(static_cast(AppletId::Application)); // TODO(purpasmart96): Do this correctly LOG_WARNING(Service_APT, "(STUBBED) called unk={:#010X}", unk); } void Module::APTInterface::IsRegistered(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x9, 1, 0); // 0x90040 AppletId app_id = rp.PopEnum(); IPC::RequestBuilder rb = rp.MakeBuilder(2, 0); rb.Push(RESULT_SUCCESS); // No error rb.Push(apt->applet_manager->IsRegistered(app_id)); LOG_DEBUG(Service_APT, "called app_id={:#010X}", app_id); } void Module::APTInterface::InquireNotification(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0xB, 1, 0); // 0xB0040 u32 app_id = rp.Pop(); IPC::RequestBuilder rb = rp.MakeBuilder(2, 0); rb.Push(RESULT_SUCCESS); // No error rb.Push(static_cast(SignalType::None)); // Signal type LOG_WARNING(Service_APT, "(STUBBED) called app_id={:#010X}", app_id); } void Module::APTInterface::SendParameter(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0xC, 4, 4); // 0xC0104 AppletId src_app_id = rp.PopEnum(); AppletId dst_app_id = rp.PopEnum(); SignalType signal_type = rp.PopEnum(); u32 buffer_size = rp.Pop(); std::shared_ptr object = rp.PopGenericObject(); std::vector buffer = rp.PopStaticBuffer(); LOG_DEBUG(Service_APT, "called src_app_id={:#010X}, dst_app_id={:#010X}, signal_type={:#010X}," "buffer_size={:#010X}", src_app_id, dst_app_id, signal_type, buffer_size); IPC::RequestBuilder rb = rp.MakeBuilder(1, 0); MessageParameter param; param.destination_id = dst_app_id; param.sender_id = src_app_id; param.object = std::move(object); param.signal = signal_type; param.buffer = std::move(buffer); rb.Push(apt->applet_manager->SendParameter(param)); } void Module::APTInterface::ReceiveParameter(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0xD, 2, 0); // 0xD0080 const auto app_id = rp.PopEnum(); const u32 buffer_size = rp.Pop(); LOG_DEBUG(Service_APT, "called app_id={:#010X}, buffer_size={:#010X}", app_id, buffer_size); auto next_parameter = apt->applet_manager->ReceiveParameter(app_id); if (next_parameter.Failed()) { IPC::RequestBuilder rb = rp.MakeBuilder(1, 0); rb.Push(next_parameter.Code()); return; } IPC::RequestBuilder rb = rp.MakeBuilder(4, 4); rb.Push(RESULT_SUCCESS); // No error rb.PushEnum(next_parameter->sender_id); rb.PushEnum(next_parameter->signal); // Signal type ASSERT_MSG(next_parameter->buffer.size() <= buffer_size, "Input static buffer is too small!"); rb.Push(static_cast(next_parameter->buffer.size())); // Parameter buffer size rb.PushMoveObjects(next_parameter->object); next_parameter->buffer.resize(buffer_size); // APT always push a buffer with the maximum size rb.PushStaticBuffer(std::move(next_parameter->buffer), 0); } void Module::APTInterface::GlanceParameter(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0xE, 2, 0); // 0xE0080 const auto app_id = rp.PopEnum(); const u32 buffer_size = rp.Pop(); LOG_DEBUG(Service_APT, "called app_id={:#010X}, buffer_size={:#010X}", app_id, buffer_size); auto next_parameter = apt->applet_manager->GlanceParameter(app_id); if (next_parameter.Failed()) { IPC::RequestBuilder rb = rp.MakeBuilder(1, 0); rb.Push(next_parameter.Code()); return; } IPC::RequestBuilder rb = rp.MakeBuilder(4, 4); rb.Push(RESULT_SUCCESS); // No error rb.PushEnum(next_parameter->sender_id); rb.PushEnum(next_parameter->signal); // Signal type ASSERT_MSG(next_parameter->buffer.size() <= buffer_size, "Input static buffer is too small!"); rb.Push(static_cast(next_parameter->buffer.size())); // Parameter buffer size rb.PushMoveObjects(next_parameter->object); next_parameter->buffer.resize(buffer_size); // APT always push a buffer with the maximum size rb.PushStaticBuffer(std::move(next_parameter->buffer), 0); } void Module::APTInterface::CancelParameter(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0xF, 4, 0); // 0xF0100 bool check_sender = rp.Pop(); AppletId sender_appid = rp.PopEnum(); bool check_receiver = rp.Pop(); AppletId receiver_appid = rp.PopEnum(); IPC::RequestBuilder rb = rp.MakeBuilder(2, 0); rb.Push(RESULT_SUCCESS); // No error rb.Push(apt->applet_manager->CancelParameter(check_sender, sender_appid, check_receiver, receiver_appid)); LOG_DEBUG(Service_APT, "called check_sender={}, sender_appid={:#010X}, " "check_receiver={}, receiver_appid={:#010X}", check_sender, sender_appid, check_receiver, receiver_appid); } void Module::APTInterface::PrepareToDoApplicationJump(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x31, 4, 0); // 0x00310100 auto flags = rp.PopEnum(); u64 title_id = rp.Pop(); u8 media_type = rp.Pop(); LOG_WARNING(Service_APT, "(STUBBED) called title_id={:016X}, media_type={:#01X}, flags={:#08X}", title_id, media_type, flags); ResultCode result = apt->applet_manager->PrepareToDoApplicationJump( title_id, static_cast(media_type), flags); IPC::RequestBuilder rb = rp.MakeBuilder(1, 0); rb.Push(result); } void Module::APTInterface::DoApplicationJump(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x32, 2, 4); // 0x00320084 auto param_size = rp.Pop(); auto hmac_size = rp.Pop(); constexpr u32 max_param_size{0x300}; constexpr u32 max_hmac_size{0x20}; if (param_size > max_param_size) { LOG_ERROR(Service_APT, "Param size is outside the valid range (capped to {:#010X}): param_size={:#010X}", max_param_size, param_size); param_size = max_param_size; } if (hmac_size > max_hmac_size) { LOG_ERROR(Service_APT, "HMAC size is outside the valid range (capped to {:#010X}): hmac_size={:#010X}", max_hmac_size, hmac_size); hmac_size = max_hmac_size; } auto param = rp.PopStaticBuffer(); auto hmac = rp.PopStaticBuffer(); LOG_INFO(Service_APT, "called param_size={:08X}, hmac_size={:08X}", param_size, hmac_size); IPC::RequestBuilder rb = rp.MakeBuilder(1, 0); rb.Push(apt->applet_manager->DoApplicationJump( AppletManager::DeliverArg{std::move(param), std::move(hmac)})); } void Module::APTInterface::GetProgramIdOnApplicationJump(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x33, 0, 0); // 0x00330000 LOG_DEBUG(Service_APT, "called"); auto parameters = apt->applet_manager->GetApplicationJumpParameters(); IPC::RequestBuilder rb = rp.MakeBuilder(7, 0); rb.Push(RESULT_SUCCESS); rb.Push(parameters.current_title_id); rb.Push(static_cast(parameters.current_media_type)); rb.Push(parameters.next_title_id); rb.Push(static_cast(parameters.next_media_type)); } void Module::APTInterface::ReceiveDeliverArg(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x35, 2, 4); // 0x00350080 const auto param_size = rp.Pop(); const auto hmac_size = rp.Pop(); LOG_DEBUG(Service_APT, "called param_size={:08X}, hmac_size={:08X}", param_size, hmac_size); auto arg = apt->applet_manager->ReceiveDeliverArg().value_or(AppletManager::DeliverArg{}); arg.param.resize(param_size); arg.hmac.resize(std::min(hmac_size, 0x20)); IPC::RequestBuilder rb = rp.MakeBuilder(4, 4); rb.Push(RESULT_SUCCESS); rb.Push(arg.source_program_id); rb.Push(1); rb.PushStaticBuffer(std::move(arg.param), 0); rb.PushStaticBuffer(std::move(arg.hmac), 1); } void Module::APTInterface::PrepareToStartApplication(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x15, 5, 0); // 0x00150140 u32 title_info1 = rp.Pop(); u32 title_info2 = rp.Pop(); u32 title_info3 = rp.Pop(); u32 title_info4 = rp.Pop(); u32 flags = rp.Pop(); if (flags & 0x00000100) { apt->unknown_ns_state_field = 1; } IPC::RequestBuilder rb = rp.MakeBuilder(1, 0); rb.Push(RESULT_SUCCESS); // No error LOG_WARNING(Service_APT, "(STUBBED) called title_info1={:#010X}, title_info2={:#010X}, title_info3={:#010X}," "title_info4={:#010X}, flags={:#010X}", title_info1, title_info2, title_info3, title_info4, flags); } void Module::APTInterface::StartApplication(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x1B, 3, 4); // 0x001B00C4 const auto buffer1_size = rp.Pop(); const auto buffer2_size = rp.Pop(); const auto flag = rp.Pop(); [[maybe_unused]] const std::vector buffer1 = rp.PopStaticBuffer(); [[maybe_unused]] const std::vector buffer2 = rp.PopStaticBuffer(); IPC::RequestBuilder rb = rp.MakeBuilder(1, 0); rb.Push(RESULT_SUCCESS); // No error LOG_WARNING(Service_APT, "(STUBBED) called buffer1_size={:#010X}, buffer2_size={:#010X}, flag={:#010X}", buffer1_size, buffer2_size, flag); } void Module::APTInterface::AppletUtility(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x4B, 3, 2); // 0x004B00C2 // These are from 3dbrew - I'm not really sure what they're used for. const auto utility_command = rp.Pop(); const auto input_size = rp.Pop(); const auto output_size = rp.Pop(); [[maybe_unused]] const std::vector input = rp.PopStaticBuffer(); IPC::RequestBuilder rb = rp.MakeBuilder(1, 0); rb.Push(RESULT_SUCCESS); // No error LOG_WARNING(Service_APT, "(STUBBED) called command={:#010X}, input_size={:#010X}, output_size={:#010X}", utility_command, input_size, output_size); } void Module::APTInterface::SetAppCpuTimeLimit(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x4F, 2, 0); // 0x4F0080 u32 value = rp.Pop(); apt->cpu_percent = rp.Pop(); if (value != 1) { LOG_ERROR(Service_APT, "This value should be one, but is actually {}!", value); } IPC::RequestBuilder rb = rp.MakeBuilder(1, 0); rb.Push(RESULT_SUCCESS); // No error LOG_WARNING(Service_APT, "(STUBBED) called, cpu_percent={}, value={}", apt->cpu_percent, value); } void Module::APTInterface::GetAppCpuTimeLimit(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x50, 1, 0); // 0x500040 u32 value = rp.Pop(); if (value != 1) { LOG_ERROR(Service_APT, "This value should be one, but is actually {}!", value); } IPC::RequestBuilder rb = rp.MakeBuilder(2, 0); rb.Push(RESULT_SUCCESS); // No error rb.Push(apt->cpu_percent); LOG_WARNING(Service_APT, "(STUBBED) called, value={}", value); } void Module::APTInterface::PrepareToStartLibraryApplet(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x18, 1, 0); // 0x180040 AppletId applet_id = rp.PopEnum(); LOG_DEBUG(Service_APT, "called, applet_id={:08X}", applet_id); IPC::RequestBuilder rb = rp.MakeBuilder(1, 0); rb.Push(apt->applet_manager->PrepareToStartLibraryApplet(applet_id)); } void Module::APTInterface::PrepareToStartNewestHomeMenu(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x1A, 0, 0); // 0x1A0000 IPC::RequestBuilder rb = rp.MakeBuilder(1, 0); // TODO(Subv): This command can only be called by a System Applet (return 0xC8A0CC04 otherwise). // This command must return an error when called, otherwise the Home Menu will try to reboot the // system. rb.Push(ResultCode(ErrorDescription::AlreadyExists, ErrorModule::Applet, ErrorSummary::InvalidState, ErrorLevel::Status)); LOG_DEBUG(Service_APT, "called"); } void Module::APTInterface::PreloadLibraryApplet(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x16, 1, 0); // 0x160040 AppletId applet_id = rp.PopEnum(); LOG_DEBUG(Service_APT, "called, applet_id={:08X}", applet_id); IPC::RequestBuilder rb = rp.MakeBuilder(1, 0); rb.Push(apt->applet_manager->PreloadLibraryApplet(applet_id)); } void Module::APTInterface::FinishPreloadingLibraryApplet(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x17, 1, 0); // 0x00170040 AppletId applet_id = rp.PopEnum(); IPC::RequestBuilder rb = rp.MakeBuilder(1, 0); rb.Push(apt->applet_manager->FinishPreloadingLibraryApplet(applet_id)); LOG_WARNING(Service_APT, "(STUBBED) called, applet_id={:#05X}", applet_id); } void Module::APTInterface::StartLibraryApplet(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x1E, 2, 4); // 0x1E0084 AppletId applet_id = rp.PopEnum(); [[maybe_unused]] const std::size_t buffer_size = rp.Pop(); std::shared_ptr object = rp.PopGenericObject(); const std::vector buffer = rp.PopStaticBuffer(); LOG_DEBUG(Service_APT, "called, applet_id={:08X}", applet_id); IPC::RequestBuilder rb = rp.MakeBuilder(1, 0); rb.Push(apt->applet_manager->StartLibraryApplet(applet_id, std::move(object), buffer)); } void Module::APTInterface::CloseApplication(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x27, 1, 4); [[maybe_unused]] const u32 parameters_size = rp.Pop(); [[maybe_unused]] const std::shared_ptr object = rp.PopGenericObject(); [[maybe_unused]] const std::vector buffer = rp.PopStaticBuffer(); LOG_DEBUG(Service_APT, "called"); apt->system.RequestShutdown(); IPC::RequestBuilder rb = rp.MakeBuilder(1, 0); rb.Push(RESULT_SUCCESS); } void Module::APTInterface::CancelLibraryApplet(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x3B, 1, 0); // 0x003B0040 bool exiting = rp.Pop(); IPC::RequestBuilder rb = rp.MakeBuilder(1, 0); rb.Push(1); // TODO: Find the return code meaning LOG_WARNING(Service_APT, "(STUBBED) called exiting={}", exiting); } void Module::APTInterface::PrepareToCloseLibraryApplet(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x25, 3, 0); // 0x002500C0 bool not_pause = rp.Pop(); bool exiting = rp.Pop(); bool jump_to_home = rp.Pop(); LOG_DEBUG(Service_APT, "called not_pause={} exiting={} jump_to_home={}", not_pause, exiting, jump_to_home); IPC::RequestBuilder rb = rp.MakeBuilder(1, 0); rb.Push(apt->applet_manager->PrepareToCloseLibraryApplet(not_pause, exiting, jump_to_home)); } void Module::APTInterface::CloseLibraryApplet(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x28, 1, 4); // 0x00280044 u32 parameter_size = rp.Pop(); auto object = rp.PopGenericObject(); std::vector buffer = rp.PopStaticBuffer(); LOG_DEBUG(Service_APT, "called size={}", parameter_size); IPC::RequestBuilder rb = rp.MakeBuilder(1, 0); rb.Push(apt->applet_manager->CloseLibraryApplet(std::move(object), std::move(buffer))); } void Module::APTInterface::LoadSysMenuArg(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x36, 1, 0); // 0x00360040 const auto size = std::min(std::size_t{rp.Pop()}, SysMenuArgSize); // This service function does not clear the buffer. std::vector buffer(size); std::copy_n(apt->sys_menu_arg_buffer.cbegin(), size, buffer.begin()); IPC::RequestBuilder rb = rp.MakeBuilder(1, 2); rb.Push(RESULT_SUCCESS); rb.PushStaticBuffer(std::move(buffer), 0); LOG_DEBUG(Service_APT, "called"); } void Module::APTInterface::StoreSysMenuArg(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x37, 1, 2); // 0x00370042 const auto size = std::min(std::size_t{rp.Pop()}, SysMenuArgSize); const auto& buffer = rp.PopStaticBuffer(); ASSERT_MSG(buffer.size() >= size, "Buffer too small to hold requested data"); std::copy_n(buffer.cbegin(), size, apt->sys_menu_arg_buffer.begin()); IPC::RequestBuilder rb = rp.MakeBuilder(1, 0); rb.Push(RESULT_SUCCESS); LOG_DEBUG(Service_APT, "called"); } void Module::APTInterface::SendCaptureBufferInfo(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x40, 1, 2); // 0x00400042 u32 size = rp.Pop(); ASSERT(size == 0x20); apt->screen_capture_buffer = rp.PopStaticBuffer(); IPC::RequestBuilder rb = rp.MakeBuilder(1, 0); rb.Push(RESULT_SUCCESS); } void Module::APTInterface::ReceiveCaptureBufferInfo(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x41, 1, 0); // 0x00410040 u32 size = rp.Pop(); ASSERT(size == 0x20); IPC::RequestBuilder rb = rp.MakeBuilder(2, 2); rb.Push(RESULT_SUCCESS); rb.Push(static_cast(apt->screen_capture_buffer.size())); rb.PushStaticBuffer(std::move(apt->screen_capture_buffer), 0); } void Module::APTInterface::GetCaptureInfo(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x4A, 1, 0); // 0x004A0040 const u32 size = rp.Pop(); ASSERT(size == 0x20); IPC::RequestBuilder rb = rp.MakeBuilder(2, 2); rb.Push(RESULT_SUCCESS); rb.Push(static_cast(apt->screen_capture_buffer.size())); // This service function does not clear the capture buffer. rb.PushStaticBuffer(apt->screen_capture_buffer, 0); } void Module::APTInterface::SetScreenCapPostPermission(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x55, 1, 0); // 0x00550040 apt->screen_capture_post_permission = static_cast(rp.Pop() & 0xF); IPC::RequestBuilder rb = rp.MakeBuilder(1, 0); rb.Push(RESULT_SUCCESS); // No error LOG_WARNING(Service_APT, "(STUBBED) called, screen_capture_post_permission={}", apt->screen_capture_post_permission); } void Module::APTInterface::GetScreenCapPostPermission(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x56, 0, 0); // 0x00560000 IPC::RequestBuilder rb = rp.MakeBuilder(2, 0); rb.Push(RESULT_SUCCESS); // No error rb.Push(static_cast(apt->screen_capture_post_permission)); LOG_WARNING(Service_APT, "(STUBBED) called, screen_capture_post_permission={}", apt->screen_capture_post_permission); } void Module::APTInterface::GetAppletInfo(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x6, 1, 0); // 0x60040 auto app_id = rp.PopEnum(); LOG_DEBUG(Service_APT, "called, app_id={}", app_id); auto info = apt->applet_manager->GetAppletInfo(app_id); if (info.Failed()) { IPC::RequestBuilder rb = rp.MakeBuilder(1, 0); rb.Push(info.Code()); } else { IPC::RequestBuilder rb = rp.MakeBuilder(7, 0); rb.Push(RESULT_SUCCESS); rb.Push(info->title_id); rb.Push(static_cast(info->media_type)); rb.Push(info->registered); rb.Push(info->loaded); rb.Push(info->attributes); } } void Module::APTInterface::GetStartupArgument(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x51, 2, 0); // 0x00510080 u32 parameter_size = rp.Pop(); constexpr u32 max_parameter_size{0x1000}; const auto startup_argument_type = static_cast(rp.Pop()); LOG_WARNING(Service_APT, "called, startup_argument_type={}, parameter_size={:#010X}", startup_argument_type, parameter_size); if (parameter_size > max_parameter_size) { LOG_ERROR(Service_APT, "Parameter size is outside the valid range (capped to {:#010X}): " "parameter_size={:#010X}", max_parameter_size, parameter_size); parameter_size = max_parameter_size; } std::vector param; bool exists = false; if (auto arg = apt->applet_manager->ReceiveDeliverArg()) { param = std::move(arg->param); // TODO: This is a complete guess based on observations. It is unknown how the OtherMedia // type is handled and how it interacts with the OtherApp type, and it is unknown if // this (checking the jump parameters) is indeed the way the 3DS checks the types. const auto& jump_parameters = apt->applet_manager->GetApplicationJumpParameters(); switch (startup_argument_type) { case StartupArgumentType::OtherApp: exists = jump_parameters.current_title_id != jump_parameters.next_title_id && jump_parameters.current_media_type == jump_parameters.next_media_type; break; case StartupArgumentType::Restart: exists = jump_parameters.current_title_id == jump_parameters.next_title_id; break; case StartupArgumentType::OtherMedia: exists = jump_parameters.current_media_type != jump_parameters.next_media_type; break; } } param.resize(parameter_size); IPC::RequestBuilder rb = rp.MakeBuilder(2, 2); rb.Push(RESULT_SUCCESS); rb.Push(exists); rb.PushStaticBuffer(std::move(param), 0); } void Module::APTInterface::Wrap(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x46, 4, 4); const u32 output_size = rp.Pop(); const u32 input_size = rp.Pop(); const u32 nonce_offset = rp.Pop(); u32 nonce_size = rp.Pop(); auto& input = rp.PopMappedBuffer(); ASSERT(input.GetSize() == input_size); auto& output = rp.PopMappedBuffer(); ASSERT(output.GetSize() == output_size); // Note: real 3DS still returns SUCCESS when the sizes don't match. It seems that it doesn't // check the buffer size and writes data with potential overflow. ASSERT_MSG(output_size == input_size + HW::AES::CCM_MAC_SIZE, "input_size ({}) doesn't match to output_size ({})", input_size, output_size); LOG_DEBUG(Service_APT, "called, output_size={}, input_size={}, nonce_offset={}, nonce_size={}", output_size, input_size, nonce_offset, nonce_size); // Note: This weird nonce size modification is verified against real 3DS nonce_size = std::min(nonce_size & ~3, HW::AES::CCM_NONCE_SIZE); // Reads nonce and concatenates the rest of the input as plaintext HW::AES::CCMNonce nonce{}; input.Read(nonce.data(), nonce_offset, nonce_size); u32 pdata_size = input_size - nonce_size; std::vector pdata(pdata_size); input.Read(pdata.data(), 0, nonce_offset); input.Read(pdata.data() + nonce_offset, nonce_offset + nonce_size, pdata_size - nonce_offset); // Encrypts the plaintext using AES-CCM auto cipher = HW::AES::EncryptSignCCM(pdata, nonce, HW::AES::KeySlotID::APTWrap); // Puts the nonce to the beginning of the output, with ciphertext followed output.Write(nonce.data(), 0, nonce_size); output.Write(cipher.data(), nonce_size, cipher.size()); IPC::RequestBuilder rb = rp.MakeBuilder(1, 4); rb.Push(RESULT_SUCCESS); // Unmap buffer rb.PushMappedBuffer(input); rb.PushMappedBuffer(output); } void Module::APTInterface::Unwrap(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x47, 4, 4); const u32 output_size = rp.Pop(); const u32 input_size = rp.Pop(); const u32 nonce_offset = rp.Pop(); u32 nonce_size = rp.Pop(); auto& input = rp.PopMappedBuffer(); ASSERT(input.GetSize() == input_size); auto& output = rp.PopMappedBuffer(); ASSERT(output.GetSize() == output_size); // Note: real 3DS still returns SUCCESS when the sizes don't match. It seems that it doesn't // check the buffer size and writes data with potential overflow. ASSERT_MSG(output_size == input_size - HW::AES::CCM_MAC_SIZE, "input_size ({}) doesn't match to output_size ({})", input_size, output_size); LOG_DEBUG(Service_APT, "called, output_size={}, input_size={}, nonce_offset={}, nonce_size={}", output_size, input_size, nonce_offset, nonce_size); // Note: This weird nonce size modification is verified against real 3DS nonce_size = std::min(nonce_size & ~3, HW::AES::CCM_NONCE_SIZE); // Reads nonce and cipher text HW::AES::CCMNonce nonce{}; input.Read(nonce.data(), 0, nonce_size); u32 cipher_size = input_size - nonce_size; std::vector cipher(cipher_size); input.Read(cipher.data(), nonce_size, cipher_size); // Decrypts the ciphertext using AES-CCM auto pdata = HW::AES::DecryptVerifyCCM(cipher, nonce, HW::AES::KeySlotID::APTWrap); IPC::RequestBuilder rb = rp.MakeBuilder(1, 4); if (!pdata.empty()) { // Splits the plaintext and put the nonce in between output.Write(pdata.data(), 0, nonce_offset); output.Write(nonce.data(), nonce_offset, nonce_size); output.Write(pdata.data() + nonce_offset, nonce_offset + nonce_size, pdata.size() - nonce_offset); rb.Push(RESULT_SUCCESS); } else { LOG_ERROR(Service_APT, "Failed to decrypt data"); rb.Push(ResultCode(static_cast(1), ErrorModule::PS, ErrorSummary::WrongArgument, ErrorLevel::Status)); } // Unmap buffer rb.PushMappedBuffer(input); rb.PushMappedBuffer(output); } void Module::APTInterface::CheckNew3DSApp(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x101, 0, 0); // 0x01010000 IPC::RequestBuilder rb = rp.MakeBuilder(2, 0); if (apt->unknown_ns_state_field) { rb.Push(RESULT_SUCCESS); rb.Push(0); } else { PTM::CheckNew3DS(rb); } LOG_WARNING(Service_APT, "(STUBBED) called"); } void Module::APTInterface::CheckNew3DS(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x102, 0, 0); // 0x01020000 IPC::RequestBuilder rb = rp.MakeBuilder(2, 0); PTM::CheckNew3DS(rb); LOG_WARNING(Service_APT, "(STUBBED) called"); } void Module::APTInterface::IsTitleAllowed(Kernel::HLERequestContext& ctx) { IPC::RequestParser rp(ctx, 0x105, 4, 0); // 0x01050100 const u64 program_id = rp.Pop(); const auto media_type = rp.PopEnum(); rp.Skip(1, false); // Padding // We allow all titles to be launched, so this function is a no-op IPC::RequestBuilder rb = rp.MakeBuilder(2, 0); rb.Push(RESULT_SUCCESS); rb.Push(true); LOG_DEBUG(Service_APT, "called, title_id={:016X} media_type={}", program_id, media_type); } Module::APTInterface::APTInterface(std::shared_ptr apt, const char* name, u32 max_session) : ServiceFramework(name, max_session), apt(std::move(apt)) {} Module::APTInterface::~APTInterface() = default; std::shared_ptr Module::APTInterface::GetModule() const { return apt; } Module::Module(Core::System& system) : system(system) { applet_manager = std::make_shared(system); using Kernel::MemoryPermission; shared_font_mem = system.Kernel() .CreateSharedMemory(nullptr, 0x332000, // 3272 KB MemoryPermission::ReadWrite, MemoryPermission::Read, 0, Kernel::MemoryRegion::SYSTEM, "APT:SharedFont") .Unwrap(); lock = system.Kernel().CreateMutex(false, "APT_U:Lock"); } Module::~Module() {} std::shared_ptr Module::GetAppletManager() const { return applet_manager; } std::shared_ptr GetModule(Core::System& system) { auto apt = system.ServiceManager().GetService("APT:A"); if (!apt) return nullptr; return apt->GetModule(); } void InstallInterfaces(Core::System& system) { auto& service_manager = system.ServiceManager(); auto apt = std::make_shared(system); std::make_shared(apt)->InstallAsService(service_manager); std::make_shared(apt)->InstallAsService(service_manager); std::make_shared(apt)->InstallAsService(service_manager); std::make_shared(apt)->InstallAsService(service_manager); } } // namespace Service::APT