Difference between revisions of "SceSblSsSmComm"

From Vita Development Wiki
Jump to navigation Jump to search
(7 intermediate revisions by 2 users not shown)
Line 5: Line 5:
 
{| class="wikitable"
 
{| class="wikitable"
 
|-
 
|-
! Version !! Name !! World !! Privilege
+
! Version !! World !! Privilege
 
|-
 
|-
| 0.931-3.60 || SceSblSsSmComm || Non-secure || Kernel
+
| 0.931-3.60 || Non-secure || Kernel
 
|}
 
|}
  
Line 26: Line 26:
  
 
<source lang = "C">
 
<source lang = "C">
/* example of caller_self_info
+
/* example of spawner_self_auth_info
 
char data[0x90] =
 
char data[0x90] =
 
{
 
{
 
   0x01,0x00,0x00,0x00, 0x00,0x00,0x08,0x28, // KBL program-authority-id
 
   0x01,0x00,0x00,0x00, 0x00,0x00,0x08,0x28, // KBL program-authority-id
 
   0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,
 
   0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,
   0x80,0x00,0x00,0x00, 0xC0,0x00,0xF0,0x00,
+
   0x80,0x00,0x00,0x00, 0xC0,0x00,0xF0,0x00, // KBL capability
 
   0x00,0x00,0x00,0x00, 0xFF,0xFF,0xFF,0xFF,
 
   0x00,0x00,0x00,0x00, 0xFF,0xFF,0xFF,0xFF,
 
   0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,
 
   0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,
 
   0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,
 
   0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,
   0x80,0x09,0x80,0x03, 0x00,0x00,0xC3,0x00,
+
   0x80,0x09,0x80,0x03, 0x00,0x00,0xC3,0x00, // KBL attribute
 
   0x00,0x00,0x80,0x09, 0x80,0x00,0x00,0x00,
 
   0x00,0x00,0x80,0x09, 0x80,0x00,0x00,0x00,
 
   0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,
 
   0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,
 
   0x00,0x00,0x00,0x00, 0xFF,0xFF,0xFF,0xFF,
 
   0x00,0x00,0x00,0x00, 0xFF,0xFF,0xFF,0xFF,
   0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,
+
   0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00, // KBL shared secret
 
   0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,
 
   0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,
 
   0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,
 
   0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,
Line 49: Line 49:
 
}; */
 
}; */
  
typedef struct SceSblSmCommContext130 { // size is 0x130 as its name indicates
+
// this struct is used in FW 0.931 secure_kernel.xxx
   uint32_t unk_0;
+
typedef struct unk_0x30 { // size is 0x30 on FW 0.931
   uint32_t self_type; // kernel = 0, user = 1, SM = 2
+
  SceSize size; // Size of this structure
   SceSelfAuthInfo caller_self_info; // can be obtained with sceKernelGetSelfAuthInfoForKernel
+
  SceUInt32 maybe_self_type_or_success; // always 1 in 0.931 secure_kernel.xxx
   SceSelfAuthInfo called_self_info; // set by SK in SceSblSmCommContext130 response
+
  SceUInt64 program_sceversion;
   uint32_t pathId; // can be obtained with sceSblACMgrGetMediaTypeForKernel or sceIoGetMediaTypeForDriver
+
  char digest[0x20]; // SHA256 of the ELF
   uint32_t unk_12C; // if (kbl_param->boot_type_indicator_1????? & 0x40) == true set unk_12C to 1, else set to 0xA
+
} unk_0x30;
 +
 
 +
typedef struct SceSharedSecret { // size is 0x40 on FWs 0.931-3.73
 +
  uint8_t shared_secret_0[0x10];
 +
  uint8_t klicensee[0x10];
 +
  uint8_t shared_secret_2[0x10];
 +
  uint32_t shared_secret_3_0; // ex: 0x10
 +
  uint32_t shared_secret_3_1;
 +
  uint32_t shared_secret_3_2;
 +
  uint32_t shared_secret_3_3;
 +
} SceSharedSecret;
 +
 
 +
typedef struct SceSelfAuthInfo { // size is 0x90 on FWs 0.931-3.73
 +
  SceUInt64 program_authority_id;
 +
  uint8_t padding[8];
 +
  uint8_t capability[0x20];
 +
  uint8_t attribute[0x20];
 +
  SceSharedSecret secret;
 +
} SceSelfAuthInfo;
 +
 
 +
typedef struct SceSblSmCommContext130 { // size is 0x130 on FWs 0.931-3.73 (as its name indicates)
 +
   SceUInt32 unk_0;
 +
   SceUInt32 self_type; // kernel = 0, user = 1, SM = 2, 0x10, 0x100, ?0x10001 main user process?
 +
   SceSelfAuthInfo spawner_self_auth_info; // can be obtained with sceKernelGetSelfAuthInfoForKernel
 +
   SceSelfAuthInfo spawned_self_auth_info; // set by SK in response SceSblSmCommContext130
 +
   SceUInt32 media_type; // can be obtained with sceSblACMgrGetMediaTypeForKernel or sceIoGetMediaTypeForDriver
 +
   SceUInt32 unk_12C; // if (kbl_param->boot_type_indicator_1????? & 0x40) == true set unk_12C to 1, else set to 0xA
 
} SceSblSmCommContext130;
 
} SceSblSmCommContext130;
 
</source>
 
</source>
Line 69: Line 95:
 
|}
 
|}
  
This function calls [[SceSblSsSmComm#sceSblSmCommCallFuncForKernel|sceSblSmCommCallFuncForKernel]] with <code>-1</code> as <code>command_id</code> and then calls [[SceSblSmschedProxy#sceSblSmSchedProxyWaitForKernel|sceSblSmSchedProxyWaitForKernel]].
+
This function calls [[SceSblSsSmComm#sceSblSmCommCallFuncForKernel|sceSblSmCommCallFuncForKernel]] with <code>-1 (0xFFFFFFFF)</code> as <code>func_id</code> and then calls [[SceSblSmschedProxy#sceSblSmSchedProxyWaitForKernel|sceSblSmSchedProxyWaitForKernel]].
  
 
<source lang="c">int sceSblSmCommStopSmForKernel(SceSmSchedRequestId req_id, status_handler *pStatusHandler);</source>
 
<source lang="c">int sceSblSmCommStopSmForKernel(SceSmSchedRequestId req_id, status_handler *pStatusHandler);</source>
Line 81: Line 107:
 
|}
 
|}
  
<source lang="c">int sceSblSmCommStartSmFromDataForKernel(SceBool priority, const char *sm_self, SceSize sm_self_size, int cmd_id, SceSblSmCommContext130 *ctx_130, SceSmSchedRequestId *req_id);</source>
+
<source lang="c">int sceSblSmCommStartSmFromDataForKernel(SceBool priority, const void *sm_self, SceSize sm_self_size, int cmd_id, SceSblSmCommContext130 *ctx_130, SceSmSchedRequestId *req_id);</source>
  
 
=== sceSblSmCommStartSmForKernel ===
 
=== sceSblSmCommStartSmForKernel ===
Line 93: Line 119:
 
Priority is binary: 1 = low, 0 = high. Running a high priority SM while a low priority one is currently running will [[F00D Processor|suspend]] the low one.
 
Priority is binary: 1 = low, 0 = high. Running a high priority SM while a low priority one is currently running will [[F00D Processor|suspend]] the low one.
  
<source lang="c">int sceSblSmCommStartSmForKernel(SceBool priority, void *sm_self, SceSize sm_self_size, SceSblSmCommContext130* ctx_130, SceSmSchedRequestId *req_id);</source>
+
The following conditions must be met in order for this function to be called successfully:
 +
- In kernel thread.
 +
- In kernel context.
 +
 
 +
Calling a function without satisfying the conditions freezes the system.
 +
 
 +
<source lang="c">int sceSblSmCommStartSmForKernel(SceBool priority, const char *sm_self_path, SceSblSmCommContext130* ctx_130, SceSmSchedRequestId *req_id);</source>
  
 
=== sceSblSmCommStartSm_ForKernel ===
 
=== sceSblSmCommStartSm_ForKernel ===

Revision as of 07:19, 25 May 2021

SceSblSsSmComm is a kernel module that is primarily responsible for calling SM functions.

Module

Version World Privilege
0.931-3.60 Non-secure Kernel

Libraries

Known NIDs

Version Name World Visibility NID
0.931-3.60 SceSblSmCommForKernel Non-secure Kernel 0xCD3C89B6
0.931-1.69 SceSblSsSmComm Non-secure User 0xD8DC7847

Types

/* example of spawner_self_auth_info
char data[0x90] =
{
   0x01,0x00,0x00,0x00, 0x00,0x00,0x08,0x28, // KBL program-authority-id
   0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,
   0x80,0x00,0x00,0x00, 0xC0,0x00,0xF0,0x00, // KBL capability
   0x00,0x00,0x00,0x00, 0xFF,0xFF,0xFF,0xFF,
   0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,
   0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,
   0x80,0x09,0x80,0x03, 0x00,0x00,0xC3,0x00, // KBL attribute
   0x00,0x00,0x80,0x09, 0x80,0x00,0x00,0x00,
   0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,
   0x00,0x00,0x00,0x00, 0xFF,0xFF,0xFF,0xFF,
   0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00, // KBL shared secret
   0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,
   0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,
   0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,
   0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,
   0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,
   0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,
   0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,
}; */

// this struct is used in FW 0.931 secure_kernel.xxx
typedef struct unk_0x30 { // size is 0x30 on FW 0.931
   SceSize size; // Size of this structure
   SceUInt32 maybe_self_type_or_success; // always 1 in 0.931 secure_kernel.xxx
   SceUInt64 program_sceversion;
   char digest[0x20]; // SHA256 of the ELF
} unk_0x30;

typedef struct SceSharedSecret { // size is 0x40 on FWs 0.931-3.73
   uint8_t shared_secret_0[0x10];
   uint8_t klicensee[0x10];
   uint8_t shared_secret_2[0x10];
   uint32_t shared_secret_3_0; // ex: 0x10
   uint32_t shared_secret_3_1;
   uint32_t shared_secret_3_2;
   uint32_t shared_secret_3_3;
} SceSharedSecret;

typedef struct SceSelfAuthInfo { // size is 0x90 on FWs 0.931-3.73
   SceUInt64 program_authority_id;
   uint8_t padding[8];
   uint8_t capability[0x20];
   uint8_t attribute[0x20];
   SceSharedSecret secret;
} SceSelfAuthInfo;

typedef struct SceSblSmCommContext130 { // size is 0x130 on FWs 0.931-3.73 (as its name indicates)
   SceUInt32 unk_0;
   SceUInt32 self_type; // kernel = 0, user = 1, SM = 2, 0x10, 0x100, ?0x10001 main user process?
   SceSelfAuthInfo spawner_self_auth_info; // can be obtained with sceKernelGetSelfAuthInfoForKernel
   SceSelfAuthInfo spawned_self_auth_info; // set by SK in response SceSblSmCommContext130
   SceUInt32 media_type; // can be obtained with sceSblACMgrGetMediaTypeForKernel or sceIoGetMediaTypeForDriver
   SceUInt32 unk_12C; // if (kbl_param->boot_type_indicator_1????? & 0x40) == true set unk_12C to 1, else set to 0xA
} SceSblSmCommContext130;

SceSblSmCommForKernel

sceSblSmCommStopSmForKernel

Version NID
0.931-3.60 0x0631F8ED

This function calls sceSblSmCommCallFuncForKernel with -1 (0xFFFFFFFF) as func_id and then calls sceSblSmSchedProxyWaitForKernel.

int sceSblSmCommStopSmForKernel(SceSmSchedRequestId req_id, status_handler *pStatusHandler);

sceSblSmCommStartSmFromDataForKernel

Version NID
3.60 0x039C73B1
int sceSblSmCommStartSmFromDataForKernel(SceBool priority, const void *sm_self, SceSize sm_self_size, int cmd_id, SceSblSmCommContext130 *ctx_130, SceSmSchedRequestId *req_id);

sceSblSmCommStartSmForKernel

Version NID
0.931-3.60 0x7863A0CC

Priority is binary: 1 = low, 0 = high. Running a high priority SM while a low priority one is currently running will suspend the low one.

The following conditions must be met in order for this function to be called successfully: - In kernel thread. - In kernel context.

Calling a function without satisfying the conditions freezes the system.

int sceSblSmCommStartSmForKernel(SceBool priority, const char *sm_self_path, SceSblSmCommContext130* ctx_130, SceSmSchedRequestId *req_id);

sceSblSmCommStartSm_ForKernel

Version NID
0.931-1.69 0x992BB9DB
int sceSblSmCommStartSm_ForKernel(SceBool priority, const char *path, SceBool some_bool, int unk_a4, int unk_a5, int unk_a6, SceSblSmCommContext130 *pCtx, SceSmSchedRequestId *pReqId);

sceSblSmCommCallFuncForKernel

Version NID
0.931-3.60 0xDB9FC204
int sceSblSmCommCallFuncForKernel(SceSmSchedRequestId req_id, SceUInt32 func_id, SceUInt32 *pResponse, void *pData, SceSize dataSize);

sceSblSmCommCallFunc_ForKernel

Version NID
0.931 0x4960DF9E
typedef struct sceSblSmCommCallFunc_Param {
    void *pData;
    SceSize dataSize;
} sceSblSmCommCallFunc_Param;

int sceSblSmCommCallFunc_ForKernel(SceSmSchedRequestId req_id, SceUInt32 func_id, SceUInt32 *pResponse, sceSblSmCommCallFunc_Param *pParam);

sceSblSmCommStopCommForKernel

Version NID
0.931 0xC35FB95A
int sceSblSmCommStopCommForKernel(SceSmSchedRequestId req_id);

SceSblSsSmComm

This library is present on 1.69 but is not present on 3.60.

sceSblSmCommStopSm

Version NID
0.931-1.69 0x0631F8ED

sceSblSmCommStartSm

Version NID
0.931 0x7863A0CC

sceSblSmCommStartSm_

Version NID
0.931-1.69 0x992BB9DB

sceSblSmCommCallFunc

Version NID
0.931 0xDB9FC204

sceSblSmCommCallFunc_

Version NID
0.931-1.69 0x4960DF9E

sceSblSmCommStopComm

Version NID
0.931 0xC35FB95A