]> git.saurik.com Git - apple/xnu.git/blob - iokit/bsddev/IOKitBSDInit.cpp
903cda7953957d639d46468eca227e0b2a603e51
[apple/xnu.git] / iokit / bsddev / IOKitBSDInit.cpp
1 /*
2 * Copyright (c) 1998-2011 Apple Inc. All rights reserved.
3 *
4 * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
5 *
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. The rights granted to you under the License
10 * may not be used to create, or enable the creation or redistribution of,
11 * unlawful or unlicensed copies of an Apple operating system, or to
12 * circumvent, violate, or enable the circumvention or violation of, any
13 * terms of an Apple operating system software license agreement.
14 *
15 * Please obtain a copy of the License at
16 * http://www.opensource.apple.com/apsl/ and read it before using this file.
17 *
18 * The Original Code and all software distributed under the License are
19 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
20 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
21 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
22 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
23 * Please see the License for the specific language governing rights and
24 * limitations under the License.
25 *
26 * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
27 */
28 #include <IOKit/IOBSD.h>
29 #include <IOKit/IOLib.h>
30 #include <IOKit/IOService.h>
31 #include <IOKit/IOCatalogue.h>
32 #include <IOKit/IODeviceTreeSupport.h>
33 #include <IOKit/IOKitKeys.h>
34 #include <IOKit/IONVRAM.h>
35 #include <IOKit/IOPlatformExpert.h>
36 #include <IOKit/IOUserClient.h>
37
38 extern "C" {
39 #include <pexpert/pexpert.h>
40 #include <kern/clock.h>
41 #include <mach/machine.h>
42 #include <uuid/uuid.h>
43 #include <sys/vnode_internal.h>
44 #include <sys/mount.h>
45
46 // how long to wait for matching root device, secs
47 #if DEBUG
48 #define ROOTDEVICETIMEOUT 120
49 #else
50 #define ROOTDEVICETIMEOUT 60
51 #endif
52
53 extern dev_t mdevadd(int devid, uint64_t base, unsigned int size, int phys);
54 extern dev_t mdevlookup(int devid);
55 extern void mdevremoveall(void);
56 extern int mdevgetrange(int devid, uint64_t *base, uint64_t *size);
57 extern void di_root_ramfile(IORegistryEntry * entry);
58
59 #define ROUNDUP(a, b) (((a) + ((b) - 1)) & (~((b) - 1)))
60
61 #define IOPOLLED_COREFILE (CONFIG_KDP_INTERACTIVE_DEBUGGING)
62
63 #if defined(XNU_TARGET_OS_BRIDGE)
64 #define kIOCoreDumpPath "/private/var/internal/kernelcore"
65 #elif defined(XNU_TARGET_OS_OSX)
66 #define kIOCoreDumpPath "/System/Volumes/VM/kernelcore"
67 #else
68 #define kIOCoreDumpPath "/private/var/vm/kernelcore"
69 #endif
70
71 #define SYSTEM_NVRAM_PREFIX "40A0DDD2-77F8-4392-B4A3-1E7304206516:"
72
73 #if CONFIG_KDP_INTERACTIVE_DEBUGGING
74 /*
75 * Touched by IOFindBSDRoot() if a RAMDisk is used for the root device.
76 */
77 extern uint64_t kdp_core_ramdisk_addr;
78 extern uint64_t kdp_core_ramdisk_size;
79 #endif
80
81 #if IOPOLLED_COREFILE
82 static void IOOpenPolledCoreFile(thread_call_param_t __unused, thread_call_param_t corefilename);
83
84 thread_call_t corefile_open_call = NULL;
85 #endif
86
87 kern_return_t
88 IOKitBSDInit( void )
89 {
90 IOService::publishResource("IOBSD");
91
92 #if IOPOLLED_COREFILE
93 corefile_open_call = thread_call_allocate_with_options(IOOpenPolledCoreFile, NULL, THREAD_CALL_PRIORITY_KERNEL, THREAD_CALL_OPTIONS_ONCE);
94 #endif
95
96 return kIOReturnSuccess;
97 }
98
99 void
100 IOServicePublishResource( const char * property, boolean_t value )
101 {
102 if (value) {
103 IOService::publishResource( property, kOSBooleanTrue );
104 } else {
105 IOService::getResourceService()->removeProperty( property );
106 }
107 }
108
109 boolean_t
110 IOServiceWaitForMatchingResource( const char * property, uint64_t timeout )
111 {
112 OSDictionary * dict = NULL;
113 IOService * match = NULL;
114 boolean_t found = false;
115
116 do {
117 dict = IOService::resourceMatching( property );
118 if (!dict) {
119 continue;
120 }
121 match = IOService::waitForMatchingService( dict, timeout );
122 if (match) {
123 found = true;
124 }
125 } while (false);
126
127 if (dict) {
128 dict->release();
129 }
130 if (match) {
131 match->release();
132 }
133
134 return found;
135 }
136
137 boolean_t
138 IOCatalogueMatchingDriversPresent( const char * property )
139 {
140 OSDictionary * dict = NULL;
141 OSOrderedSet * set = NULL;
142 SInt32 generationCount = 0;
143 boolean_t found = false;
144
145 do {
146 dict = OSDictionary::withCapacity(1);
147 if (!dict) {
148 continue;
149 }
150 dict->setObject( property, kOSBooleanTrue );
151 set = gIOCatalogue->findDrivers( dict, &generationCount );
152 if (set && (set->getCount() > 0)) {
153 found = true;
154 }
155 } while (false);
156
157 if (dict) {
158 dict->release();
159 }
160 if (set) {
161 set->release();
162 }
163
164 return found;
165 }
166
167 OSDictionary *
168 IOBSDNameMatching( const char * name )
169 {
170 OSDictionary * dict;
171 const OSSymbol * str = NULL;
172
173 do {
174 dict = IOService::serviceMatching( gIOServiceKey );
175 if (!dict) {
176 continue;
177 }
178 str = OSSymbol::withCString( name );
179 if (!str) {
180 continue;
181 }
182 dict->setObject( kIOBSDNameKey, (OSObject *) str );
183 str->release();
184
185 return dict;
186 } while (false);
187
188 if (dict) {
189 dict->release();
190 }
191 if (str) {
192 str->release();
193 }
194
195 return NULL;
196 }
197
198 OSDictionary *
199 IOUUIDMatching( void )
200 {
201 return IOService::resourceMatching( "boot-uuid-media" );
202 }
203
204 OSDictionary *
205 IONetworkNamePrefixMatching( const char * prefix )
206 {
207 OSDictionary * matching;
208 OSDictionary * propDict = NULL;
209 const OSSymbol * str = NULL;
210 char networkType[128];
211
212 do {
213 matching = IOService::serviceMatching( "IONetworkInterface" );
214 if (matching == NULL) {
215 continue;
216 }
217
218 propDict = OSDictionary::withCapacity(1);
219 if (propDict == NULL) {
220 continue;
221 }
222
223 str = OSSymbol::withCString( prefix );
224 if (str == NULL) {
225 continue;
226 }
227
228 propDict->setObject( "IOInterfaceNamePrefix", (OSObject *) str );
229 str->release();
230 str = NULL;
231
232 // see if we're contrained to netroot off of specific network type
233 if (PE_parse_boot_argn( "network-type", networkType, 128 )) {
234 str = OSSymbol::withCString( networkType );
235 if (str) {
236 propDict->setObject( "IONetworkRootType", str);
237 str->release();
238 str = NULL;
239 }
240 }
241
242 if (matching->setObject( gIOPropertyMatchKey,
243 (OSObject *) propDict ) != true) {
244 continue;
245 }
246
247 propDict->release();
248 propDict = NULL;
249
250 return matching;
251 } while (false);
252
253 if (matching) {
254 matching->release();
255 }
256 if (propDict) {
257 propDict->release();
258 }
259 if (str) {
260 str->release();
261 }
262
263 return NULL;
264 }
265
266 static bool
267 IORegisterNetworkInterface( IOService * netif )
268 {
269 // A network interface is typically named and registered
270 // with BSD after receiving a request from a user space
271 // "namer". However, for cases when the system needs to
272 // root from the network, this registration task must be
273 // done inside the kernel and completed before the root
274 // device is handed to BSD.
275
276 IOService * stack;
277 OSNumber * zero = NULL;
278 OSString * path = NULL;
279 OSDictionary * dict = NULL;
280 char * pathBuf = NULL;
281 int len;
282 enum { kMaxPathLen = 512 };
283
284 do {
285 stack = IOService::waitForService(
286 IOService::serviceMatching("IONetworkStack"));
287 if (stack == NULL) {
288 break;
289 }
290
291 dict = OSDictionary::withCapacity(3);
292 if (dict == NULL) {
293 break;
294 }
295
296 zero = OSNumber::withNumber((UInt64) 0, 32);
297 if (zero == NULL) {
298 break;
299 }
300
301 pathBuf = (char *) IOMalloc( kMaxPathLen );
302 if (pathBuf == NULL) {
303 break;
304 }
305
306 len = kMaxPathLen;
307 if (netif->getPath( pathBuf, &len, gIOServicePlane )
308 == false) {
309 break;
310 }
311
312 path = OSString::withCStringNoCopy( pathBuf );
313 if (path == NULL) {
314 break;
315 }
316
317 dict->setObject( "IOInterfaceUnit", zero );
318 dict->setObject( kIOPathMatchKey, path );
319
320 stack->setProperties( dict );
321 }while (false);
322
323 if (zero) {
324 zero->release();
325 }
326 if (path) {
327 path->release();
328 }
329 if (dict) {
330 dict->release();
331 }
332 if (pathBuf) {
333 IOFree(pathBuf, kMaxPathLen);
334 }
335
336 return netif->getProperty( kIOBSDNameKey ) != NULL;
337 }
338
339 OSDictionary *
340 IOOFPathMatching( const char * path, char * buf, int maxLen )
341 {
342 OSDictionary * matching = NULL;
343 OSString * str;
344 char * comp;
345 int len;
346
347 do {
348 len = ((int) strlen( kIODeviceTreePlane ":" ));
349 maxLen -= len;
350 if (maxLen <= 0) {
351 continue;
352 }
353
354 strlcpy( buf, kIODeviceTreePlane ":", len + 1 );
355 comp = buf + len;
356
357 len = ((int) strnlen( path, INT_MAX ));
358 maxLen -= len;
359 if (maxLen <= 0) {
360 continue;
361 }
362 strlcpy( comp, path, len + 1 );
363
364 matching = OSDictionary::withCapacity( 1 );
365 if (!matching) {
366 continue;
367 }
368
369 str = OSString::withCString( buf );
370 if (!str) {
371 continue;
372 }
373 matching->setObject( kIOPathMatchKey, str );
374 str->release();
375
376 return matching;
377 } while (false);
378
379 if (matching) {
380 matching->release();
381 }
382
383 return NULL;
384 }
385
386 static int didRam = 0;
387 enum { kMaxPathBuf = 512, kMaxBootVar = 128 };
388
389 const char*
390 IOGetBootUUID(void)
391 {
392 IORegistryEntry *entry;
393
394 if ((entry = IORegistryEntry::fromPath("/chosen", gIODTPlane))) {
395 OSData *uuid_data = (OSData *)entry->getProperty("boot-uuid");
396 if (uuid_data) {
397 return (const char*)uuid_data->getBytesNoCopy();
398 }
399 }
400
401 return NULL;
402 }
403
404 const char *
405 IOGetApfsPrebootUUID(void)
406 {
407 IORegistryEntry *entry;
408
409 if ((entry = IORegistryEntry::fromPath("/chosen", gIODTPlane))) {
410 OSData *uuid_data = (OSData *)entry->getProperty("apfs-preboot-uuid");
411 if (uuid_data) {
412 return (const char*)uuid_data->getBytesNoCopy();
413 }
414 }
415
416 return NULL;
417 }
418
419 const char *
420 IOGetAssociatedApfsVolgroupUUID(void)
421 {
422 IORegistryEntry *entry;
423
424 if ((entry = IORegistryEntry::fromPath("/chosen", gIODTPlane))) {
425 OSData *uuid_data = (OSData *)entry->getProperty("associated-volume-group");
426 if (uuid_data) {
427 return (const char*)uuid_data->getBytesNoCopy();
428 }
429 }
430
431 return NULL;
432 }
433
434 const char *
435 IOGetBootObjectsPath(void)
436 {
437 IORegistryEntry *entry;
438
439 if ((entry = IORegistryEntry::fromPath("/chosen", gIODTPlane))) {
440 OSData *path_prefix_data = (OSData *)entry->getProperty("boot-objects-path");
441 if (path_prefix_data) {
442 return (const char *)path_prefix_data->getBytesNoCopy();
443 }
444 }
445
446 return NULL;
447 }
448
449 /*
450 * Set NVRAM to boot into the right flavor of Recovery,
451 * optionally passing a UUID of a volume that failed to boot.
452 * If `reboot` is true, reboot immediately.
453 *
454 * Returns true if `mode` was understood, false otherwise.
455 * (Does not return if `reboot` is true.)
456 */
457 boolean_t
458 IOSetRecoveryBoot(bsd_bootfail_mode_t mode, uuid_t volume_uuid, boolean_t reboot)
459 {
460 IODTNVRAM *nvram = NULL;
461 const OSSymbol *boot_command_sym = NULL;
462 OSString *boot_command_recover = NULL;
463
464 if (mode == BSD_BOOTFAIL_SEAL_BROKEN) {
465 const char *boot_mode = "ssv-seal-broken";
466 uuid_string_t volume_uuid_str;
467
468 // Set `recovery-broken-seal-uuid = <volume_uuid>`.
469 if (volume_uuid) {
470 uuid_unparse_upper(volume_uuid, volume_uuid_str);
471
472 if (!PEWriteNVRAMProperty(SYSTEM_NVRAM_PREFIX "recovery-broken-seal-uuid",
473 volume_uuid_str, sizeof(uuid_string_t))) {
474 IOLog("Failed to write recovery-broken-seal-uuid to NVRAM.\n");
475 }
476 }
477
478 // Set `recovery-boot-mode = ssv-seal-broken`.
479 if (!PEWriteNVRAMProperty(SYSTEM_NVRAM_PREFIX "recovery-boot-mode", boot_mode,
480 (const unsigned int) strlen(boot_mode))) {
481 IOLog("Failed to write recovery-boot-mode to NVRAM.\n");
482 }
483 } else if (mode == BSD_BOOTFAIL_MEDIA_MISSING) {
484 const char *boot_picker_reason = "missing-boot-media";
485
486 // Set `boot-picker-bringup-reason = missing-boot-media`.
487 if (!PEWriteNVRAMProperty(SYSTEM_NVRAM_PREFIX "boot-picker-bringup-reason",
488 boot_picker_reason, (const unsigned int) strlen(boot_picker_reason))) {
489 IOLog("Failed to write boot-picker-bringup-reason to NVRAM.\n");
490 }
491
492 // Set `boot-command = recover`.
493
494 // Construct an OSSymbol and an OSString to be the (key, value) pair
495 // we write to NVRAM. Unfortunately, since our value must be an OSString
496 // instead of an OSData, we cannot use PEWriteNVRAMProperty() here.
497 boot_command_sym = OSSymbol::withCStringNoCopy(SYSTEM_NVRAM_PREFIX "boot-command");
498 boot_command_recover = OSString::withCStringNoCopy("recover");
499 if (boot_command_sym == NULL || boot_command_recover == NULL) {
500 IOLog("Failed to create boot-command strings.\n");
501 goto do_reboot;
502 }
503
504 // Wait for NVRAM to be readable...
505 nvram = OSDynamicCast(IODTNVRAM, IOService::waitForService(
506 IOService::serviceMatching("IODTNVRAM")));
507 if (nvram == NULL) {
508 IOLog("Failed to acquire IODTNVRAM object.\n");
509 goto do_reboot;
510 }
511
512 // Wait for NVRAM to be writable...
513 if (!IOServiceWaitForMatchingResource("IONVRAM", UINT64_MAX)) {
514 IOLog("Failed to wait for IONVRAM service.\n");
515 // attempt the work anyway...
516 }
517
518 // Write the new boot-command to NVRAM, and sync if successful.
519 if (!nvram->setProperty(boot_command_sym, boot_command_recover)) {
520 IOLog("Failed to save new boot-command to NVRAM.\n");
521 } else {
522 nvram->sync();
523 }
524 } else {
525 IOLog("Unknown mode: %d\n", mode);
526 return false;
527 }
528
529 // Clean up and reboot!
530 do_reboot:
531 if (nvram != NULL) {
532 nvram->release();
533 }
534
535 if (boot_command_recover != NULL) {
536 boot_command_recover->release();
537 }
538
539 if (boot_command_sym != NULL) {
540 boot_command_sym->release();
541 }
542
543 if (reboot) {
544 IOLog("\nAbout to reboot into Recovery!\n");
545 (void)PEHaltRestart(kPERestartCPU);
546 }
547
548 return true;
549 }
550
551 kern_return_t
552 IOFindBSDRoot( char * rootName, unsigned int rootNameSize,
553 dev_t * root, u_int32_t * oflags )
554 {
555 mach_timespec_t t;
556 IOService * service;
557 IORegistryEntry * regEntry;
558 OSDictionary * matching = NULL;
559 OSString * iostr;
560 OSNumber * off;
561 OSData * data = NULL;
562
563 UInt32 flags = 0;
564 int mnr, mjr;
565 const char * mediaProperty = NULL;
566 char * rdBootVar;
567 char * str;
568 const char * look = NULL;
569 int len;
570 bool debugInfoPrintedOnce = false;
571 bool needNetworkKexts = false;
572 const char * uuidStr = NULL;
573
574 static int mountAttempts = 0;
575
576 int xchar, dchar;
577
578 // stall here for anyone matching on the IOBSD resource to finish (filesystems)
579 matching = IOService::serviceMatching(gIOResourcesKey);
580 assert(matching);
581 matching->setObject(gIOResourceMatchedKey, gIOBSDKey);
582
583 if ((service = IOService::waitForMatchingService(matching, 30ULL * kSecondScale))) {
584 service->release();
585 } else {
586 IOLog("!BSD\n");
587 }
588 matching->release();
589 matching = NULL;
590
591 if (mountAttempts++) {
592 IOLog("mount(%d) failed\n", mountAttempts);
593 IOSleep( 5 * 1000 );
594 }
595
596 str = (char *) IOMalloc( kMaxPathBuf + kMaxBootVar );
597 if (!str) {
598 return kIOReturnNoMemory;
599 }
600 rdBootVar = str + kMaxPathBuf;
601
602 if (!PE_parse_boot_argn("rd", rdBootVar, kMaxBootVar )
603 && !PE_parse_boot_argn("rootdev", rdBootVar, kMaxBootVar )) {
604 rdBootVar[0] = 0;
605 }
606
607 do {
608 if ((regEntry = IORegistryEntry::fromPath( "/chosen", gIODTPlane ))) {
609 di_root_ramfile(regEntry);
610 data = OSDynamicCast(OSData, regEntry->getProperty( "root-matching" ));
611 if (data) {
612 matching = OSDynamicCast(OSDictionary, OSUnserializeXML((char *)data->getBytesNoCopy()));
613 if (matching) {
614 continue;
615 }
616 }
617
618 data = (OSData *) regEntry->getProperty( "boot-uuid" );
619 if (data) {
620 uuidStr = (const char*)data->getBytesNoCopy();
621 OSString *uuidString = OSString::withCString( uuidStr );
622
623 // match the boot-args boot-uuid processing below
624 if (uuidString) {
625 IOLog("rooting via boot-uuid from /chosen: %s\n", uuidStr);
626 IOService::publishResource( "boot-uuid", uuidString );
627 uuidString->release();
628 matching = IOUUIDMatching();
629 mediaProperty = "boot-uuid-media";
630 regEntry->release();
631 continue;
632 } else {
633 uuidStr = NULL;
634 }
635 }
636 regEntry->release();
637 }
638 } while (false);
639
640 //
641 // See if we have a RAMDisk property in /chosen/memory-map. If so, make it into a device.
642 // It will become /dev/mdx, where x is 0-f.
643 //
644
645 if (!didRam) { /* Have we already build this ram disk? */
646 didRam = 1; /* Remember we did this */
647 if ((regEntry = IORegistryEntry::fromPath( "/chosen/memory-map", gIODTPlane ))) { /* Find the map node */
648 data = (OSData *)regEntry->getProperty("RAMDisk"); /* Find the ram disk, if there */
649 if (data) { /* We found one */
650 uintptr_t *ramdParms;
651 ramdParms = (uintptr_t *)data->getBytesNoCopy(); /* Point to the ram disk base and size */
652 #if __LP64__
653 #define MAX_PHYS_RAM (((uint64_t)UINT_MAX) << 12)
654 if (ramdParms[1] > MAX_PHYS_RAM) {
655 panic("ramdisk params");
656 }
657 #endif /* __LP64__ */
658 (void)mdevadd(-1, ml_static_ptovirt(ramdParms[0]) >> 12, (unsigned int) (ramdParms[1] >> 12), 0); /* Initialize it and pass back the device number */
659 }
660 regEntry->release(); /* Toss the entry */
661 }
662 }
663
664 //
665 // Now check if we are trying to root on a memory device
666 //
667
668 if ((rdBootVar[0] == 'm') && (rdBootVar[1] == 'd') && (rdBootVar[3] == 0)) {
669 dchar = xchar = rdBootVar[2]; /* Get the actual device */
670 if ((xchar >= '0') && (xchar <= '9')) {
671 xchar = xchar - '0'; /* If digit, convert */
672 } else {
673 xchar = xchar & ~' '; /* Fold to upper case */
674 if ((xchar >= 'A') && (xchar <= 'F')) { /* Is this a valid digit? */
675 xchar = (xchar & 0xF) + 9; /* Convert the hex digit */
676 dchar = dchar | ' '; /* Fold to lower case */
677 } else {
678 xchar = -1; /* Show bogus */
679 }
680 }
681 if (xchar >= 0) { /* Do we have a valid memory device name? */
682 *root = mdevlookup(xchar); /* Find the device number */
683 if (*root >= 0) { /* Did we find one? */
684 rootName[0] = 'm'; /* Build root name */
685 rootName[1] = 'd'; /* Build root name */
686 rootName[2] = (char) dchar; /* Build root name */
687 rootName[3] = 0; /* Build root name */
688 IOLog("BSD root: %s, major %d, minor %d\n", rootName, major(*root), minor(*root));
689 *oflags = 0; /* Show that this is not network */
690
691 #if CONFIG_KDP_INTERACTIVE_DEBUGGING
692 /* retrieve final ramdisk range and initialize KDP variables */
693 if (mdevgetrange(xchar, &kdp_core_ramdisk_addr, &kdp_core_ramdisk_size) != 0) {
694 IOLog("Unable to retrieve range for root memory device %d\n", xchar);
695 kdp_core_ramdisk_addr = 0;
696 kdp_core_ramdisk_size = 0;
697 }
698 #endif
699
700 goto iofrootx; /* Join common exit... */
701 }
702 panic("IOFindBSDRoot: specified root memory device, %s, has not been configured\n", rdBootVar); /* Not there */
703 }
704 }
705
706 if ((!matching) && rdBootVar[0]) {
707 // by BSD name
708 look = rdBootVar;
709 if (look[0] == '*') {
710 look++;
711 }
712
713 if (strncmp( look, "en", strlen( "en" )) == 0) {
714 matching = IONetworkNamePrefixMatching( "en" );
715 needNetworkKexts = true;
716 } else if (strncmp( look, "uuid", strlen( "uuid" )) == 0) {
717 char *uuid;
718 OSString *uuidString;
719
720 uuid = (char *)IOMalloc( kMaxBootVar );
721
722 if (uuid) {
723 if (!PE_parse_boot_argn( "boot-uuid", uuid, kMaxBootVar )) {
724 panic( "rd=uuid but no boot-uuid=<value> specified" );
725 }
726 uuidString = OSString::withCString( uuid );
727 if (uuidString) {
728 IOService::publishResource( "boot-uuid", uuidString );
729 uuidString->release();
730 IOLog( "\nWaiting for boot volume with UUID %s\n", uuid );
731 matching = IOUUIDMatching();
732 mediaProperty = "boot-uuid-media";
733 }
734 IOFree( uuid, kMaxBootVar );
735 }
736 } else {
737 matching = IOBSDNameMatching( look );
738 }
739 }
740
741 if (!matching) {
742 OSString * astring;
743 // Match any HFS media
744
745 matching = IOService::serviceMatching( "IOMedia" );
746 astring = OSString::withCStringNoCopy("Apple_HFS");
747 if (astring) {
748 matching->setObject("Content", astring);
749 astring->release();
750 }
751 }
752
753 if (gIOKitDebug & kIOWaitQuietBeforeRoot) {
754 IOLog( "Waiting for matching to complete\n" );
755 IOService::getPlatform()->waitQuiet();
756 }
757
758 if (true && matching) {
759 OSSerialize * s = OSSerialize::withCapacity( 5 );
760
761 if (matching->serialize( s )) {
762 IOLog( "Waiting on %s\n", s->text());
763 s->release();
764 }
765 }
766
767 char namep[8];
768 if (needNetworkKexts
769 || PE_parse_boot_argn("-s", namep, sizeof(namep))) {
770 IOService::startDeferredMatches();
771 }
772
773 do {
774 t.tv_sec = ROOTDEVICETIMEOUT;
775 t.tv_nsec = 0;
776 matching->retain();
777 service = IOService::waitForService( matching, &t );
778 if ((!service) || (mountAttempts == 10)) {
779 #if !XNU_TARGET_OS_OSX || !defined(__arm64__)
780 PE_display_icon( 0, "noroot");
781 IOLog( "Still waiting for root device\n" );
782 #endif
783
784 if (!debugInfoPrintedOnce) {
785 debugInfoPrintedOnce = true;
786 if (gIOKitDebug & kIOLogDTree) {
787 IOLog("\nDT plane:\n");
788 IOPrintPlane( gIODTPlane );
789 }
790 if (gIOKitDebug & kIOLogServiceTree) {
791 IOLog("\nService plane:\n");
792 IOPrintPlane( gIOServicePlane );
793 }
794 if (gIOKitDebug & kIOLogMemory) {
795 IOPrintMemory();
796 }
797 }
798
799 #if XNU_TARGET_OS_OSX && defined(__arm64__)
800 // The disk isn't found - have the user pick from recoveryOS+.
801 (void)IOSetRecoveryBoot(BSD_BOOTFAIL_MEDIA_MISSING, NULL, true);
802 #endif
803 }
804 } while (!service);
805 matching->release();
806
807 if (service && mediaProperty) {
808 service = (IOService *)service->getProperty(mediaProperty);
809 }
810
811 mjr = 0;
812 mnr = 0;
813
814 // If the IOService we matched to is a subclass of IONetworkInterface,
815 // then make sure it has been registered with BSD and has a BSD name
816 // assigned.
817
818 if (service
819 && service->metaCast( "IONetworkInterface" )
820 && !IORegisterNetworkInterface( service )) {
821 service = NULL;
822 }
823
824 if (service) {
825 len = kMaxPathBuf;
826 service->getPath( str, &len, gIOServicePlane );
827 IOLog( "Got boot device = %s\n", str );
828
829 iostr = (OSString *) service->getProperty( kIOBSDNameKey );
830 if (iostr) {
831 strlcpy( rootName, iostr->getCStringNoCopy(), rootNameSize );
832 }
833 off = (OSNumber *) service->getProperty( kIOBSDMajorKey );
834 if (off) {
835 mjr = off->unsigned32BitValue();
836 }
837 off = (OSNumber *) service->getProperty( kIOBSDMinorKey );
838 if (off) {
839 mnr = off->unsigned32BitValue();
840 }
841
842 if (service->metaCast( "IONetworkInterface" )) {
843 flags |= 1;
844 }
845 } else {
846 IOLog( "Wait for root failed\n" );
847 strlcpy( rootName, "en0", rootNameSize );
848 flags |= 1;
849 }
850
851 IOLog( "BSD root: %s", rootName );
852 if (mjr) {
853 IOLog(", major %d, minor %d\n", mjr, mnr );
854 } else {
855 IOLog("\n");
856 }
857
858 *root = makedev( mjr, mnr );
859 *oflags = flags;
860
861 IOFree( str, kMaxPathBuf + kMaxBootVar );
862
863 iofrootx:
864 if ((gIOKitDebug & (kIOLogDTree | kIOLogServiceTree | kIOLogMemory)) && !debugInfoPrintedOnce) {
865 IOService::getPlatform()->waitQuiet();
866 if (gIOKitDebug & kIOLogDTree) {
867 IOLog("\nDT plane:\n");
868 IOPrintPlane( gIODTPlane );
869 }
870 if (gIOKitDebug & kIOLogServiceTree) {
871 IOLog("\nService plane:\n");
872 IOPrintPlane( gIOServicePlane );
873 }
874 if (gIOKitDebug & kIOLogMemory) {
875 IOPrintMemory();
876 }
877 }
878
879 return kIOReturnSuccess;
880 }
881
882 bool
883 IORamDiskBSDRoot(void)
884 {
885 char rdBootVar[kMaxBootVar];
886 if (PE_parse_boot_argn("rd", rdBootVar, kMaxBootVar )
887 || PE_parse_boot_argn("rootdev", rdBootVar, kMaxBootVar )) {
888 if ((rdBootVar[0] == 'm') && (rdBootVar[1] == 'd') && (rdBootVar[3] == 0)) {
889 return true;
890 }
891 }
892 return false;
893 }
894
895 void
896 IOSecureBSDRoot(const char * rootName)
897 {
898 #if CONFIG_SECURE_BSD_ROOT
899 IOReturn result;
900 IOPlatformExpert *pe;
901 OSDictionary *matching;
902 const OSSymbol *functionName = OSSymbol::withCStringNoCopy("SecureRootName");
903
904 matching = IOService::serviceMatching("IOPlatformExpert");
905 assert(matching);
906 pe = (IOPlatformExpert *) IOService::waitForMatchingService(matching, 30ULL * kSecondScale);
907 matching->release();
908 assert(pe);
909 // Returns kIOReturnNotPrivileged is the root device is not secure.
910 // Returns kIOReturnUnsupported if "SecureRootName" is not implemented.
911 result = pe->callPlatformFunction(functionName, false, (void *)rootName, (void *)NULL, (void *)NULL, (void *)NULL);
912 functionName->release();
913 OSSafeReleaseNULL(pe);
914
915 if (result == kIOReturnNotPrivileged) {
916 mdevremoveall();
917 }
918
919 #endif // CONFIG_SECURE_BSD_ROOT
920 }
921
922 void *
923 IOBSDRegistryEntryForDeviceTree(char * path)
924 {
925 return IORegistryEntry::fromPath(path, gIODTPlane);
926 }
927
928 void
929 IOBSDRegistryEntryRelease(void * entry)
930 {
931 IORegistryEntry * regEntry = (IORegistryEntry *)entry;
932
933 if (regEntry) {
934 regEntry->release();
935 }
936 return;
937 }
938
939 const void *
940 IOBSDRegistryEntryGetData(void * entry, char * property_name,
941 int * packet_length)
942 {
943 OSData * data;
944 IORegistryEntry * regEntry = (IORegistryEntry *)entry;
945
946 data = (OSData *) regEntry->getProperty(property_name);
947 if (data) {
948 *packet_length = data->getLength();
949 return data->getBytesNoCopy();
950 }
951 return NULL;
952 }
953
954 kern_return_t
955 IOBSDGetPlatformUUID( uuid_t uuid, mach_timespec_t timeout )
956 {
957 IOService * resources;
958 OSString * string;
959
960 resources = IOService::waitForService( IOService::resourceMatching( kIOPlatformUUIDKey ), (timeout.tv_sec || timeout.tv_nsec) ? &timeout : NULL );
961 if (resources == NULL) {
962 return KERN_OPERATION_TIMED_OUT;
963 }
964
965 string = (OSString *) IOService::getPlatform()->getProvider()->getProperty( kIOPlatformUUIDKey );
966 if (string == NULL) {
967 return KERN_NOT_SUPPORTED;
968 }
969
970 uuid_parse( string->getCStringNoCopy(), uuid );
971
972 return KERN_SUCCESS;
973 }
974 } /* extern "C" */
975
976 /* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
977
978 #include <sys/conf.h>
979 #include <sys/vnode.h>
980 #include <sys/vnode_internal.h>
981 #include <sys/fcntl.h>
982 #include <IOKit/IOPolledInterface.h>
983 #include <IOKit/IOBufferMemoryDescriptor.h>
984
985 IOPolledFileIOVars * gIOPolledCoreFileVars;
986 kern_return_t gIOPolledCoreFileOpenRet = kIOReturnNotReady;
987 IOPolledCoreFileMode_t gIOPolledCoreFileMode = kIOPolledCoreFileModeNotInitialized;
988
989 #if IOPOLLED_COREFILE
990
991 #if defined(XNU_TARGET_OS_BRIDGE)
992 // On bridgeOS allocate a 150MB corefile and leave 150MB free
993 #define kIOCoreDumpSize 150ULL*1024ULL*1024ULL
994 #define kIOCoreDumpFreeSize 150ULL*1024ULL*1024ULL
995
996 #elif !defined(XNU_TARGET_OS_OSX) /* defined(XNU_TARGET_OS_BRIDGE) */
997 // On embedded devices with >3GB DRAM we allocate a 500MB corefile
998 // otherwise allocate a 350MB corefile. Leave 350 MB free
999
1000 #define kIOCoreDumpMinSize 350ULL*1024ULL*1024ULL
1001 #define kIOCoreDumpLargeSize 500ULL*1024ULL*1024ULL
1002
1003 #define kIOCoreDumpFreeSize 350ULL*1024ULL*1024ULL
1004
1005 #else /* defined(XNU_TARGET_OS_BRIDGE) */
1006 // on macOS devices allocate a corefile sized at 1GB / 32GB of DRAM,
1007 // fallback to a 1GB corefile and leave at least 1GB free
1008 #define kIOCoreDumpMinSize 1024ULL*1024ULL*1024ULL
1009 #define kIOCoreDumpIncrementalSize 1024ULL*1024ULL*1024ULL
1010
1011 #define kIOCoreDumpFreeSize 1024ULL*1024ULL*1024ULL
1012
1013 // on older macOS devices we allocate a 1MB file at boot
1014 // to store a panic time stackshot
1015 #define kIOStackshotFileSize 1024ULL*1024ULL
1016
1017 #endif /* defined(XNU_TARGET_OS_BRIDGE) */
1018
1019 static IOPolledCoreFileMode_t
1020 GetCoreFileMode()
1021 {
1022 if (on_device_corefile_enabled()) {
1023 return kIOPolledCoreFileModeCoredump;
1024 } else if (panic_stackshot_to_disk_enabled()) {
1025 return kIOPolledCoreFileModeStackshot;
1026 } else {
1027 return kIOPolledCoreFileModeDisabled;
1028 }
1029 }
1030
1031 static void
1032 IOCoreFileGetSize(uint64_t *ideal_size, uint64_t *fallback_size, uint64_t *free_space_to_leave, IOPolledCoreFileMode_t mode)
1033 {
1034 unsigned int requested_corefile_size = 0;
1035
1036 *ideal_size = *fallback_size = *free_space_to_leave = 0;
1037
1038 #if defined(XNU_TARGET_OS_BRIDGE)
1039 #pragma unused(mode)
1040 *ideal_size = *fallback_size = kIOCoreDumpSize;
1041 *free_space_to_leave = kIOCoreDumpFreeSize;
1042 #elif !defined(XNU_TARGET_OS_OSX) /* defined(XNU_TARGET_OS_BRIDGE) */
1043 #pragma unused(mode)
1044 *ideal_size = *fallback_size = kIOCoreDumpMinSize;
1045
1046 if (max_mem > (3 * 1024ULL * 1024ULL * 1024ULL)) {
1047 *ideal_size = kIOCoreDumpLargeSize;
1048 }
1049
1050 *free_space_to_leave = kIOCoreDumpFreeSize;
1051 #else /* defined(XNU_TARGET_OS_BRIDGE) */
1052 if (mode == kIOPolledCoreFileModeCoredump) {
1053 *ideal_size = *fallback_size = kIOCoreDumpMinSize;
1054 if (kIOCoreDumpIncrementalSize != 0 && max_mem > (32 * 1024ULL * 1024ULL * 1024ULL)) {
1055 *ideal_size = ((ROUNDUP(max_mem, (32 * 1024ULL * 1024ULL * 1024ULL)) / (32 * 1024ULL * 1024ULL * 1024ULL)) * kIOCoreDumpIncrementalSize);
1056 }
1057 *free_space_to_leave = kIOCoreDumpFreeSize;
1058 } else if (mode == kIOPolledCoreFileModeStackshot) {
1059 *ideal_size = *fallback_size = *free_space_to_leave = kIOStackshotFileSize;
1060 }
1061 #endif /* defined(XNU_TARGET_OS_BRIDGE) */
1062 // If a custom size was requested, override the ideal and requested sizes
1063 if (PE_parse_boot_argn("corefile_size_mb", &requested_corefile_size, sizeof(requested_corefile_size))) {
1064 IOLog("Boot-args specify %d MB kernel corefile\n", requested_corefile_size);
1065
1066 *ideal_size = *fallback_size = (requested_corefile_size * 1024ULL * 1024ULL);
1067 }
1068
1069 return;
1070 }
1071
1072 static void
1073 IOOpenPolledCoreFile(thread_call_param_t __unused, thread_call_param_t corefilename)
1074 {
1075 assert(corefilename != NULL);
1076
1077 IOReturn err;
1078 char *filename = (char *) corefilename;
1079 uint64_t corefile_size_bytes = 0, corefile_fallback_size_bytes = 0, free_space_to_leave_bytes = 0;
1080 IOPolledCoreFileMode_t mode_to_init = GetCoreFileMode();
1081
1082 if (gIOPolledCoreFileVars) {
1083 return;
1084 }
1085 if (!IOPolledInterface::gMetaClass.getInstanceCount()) {
1086 return;
1087 }
1088
1089 if (mode_to_init == kIOPolledCoreFileModeDisabled) {
1090 gIOPolledCoreFileMode = kIOPolledCoreFileModeDisabled;
1091 return;
1092 }
1093
1094 // We'll overwrite this once we open the file, we update this to mark that we have made
1095 // it past initialization
1096 gIOPolledCoreFileMode = kIOPolledCoreFileModeClosed;
1097
1098 IOCoreFileGetSize(&corefile_size_bytes, &corefile_fallback_size_bytes, &free_space_to_leave_bytes, mode_to_init);
1099
1100 do {
1101 err = IOPolledFileOpen(filename, kIOPolledFileCreate, corefile_size_bytes, free_space_to_leave_bytes,
1102 NULL, 0, &gIOPolledCoreFileVars, NULL, NULL, NULL);
1103 if (kIOReturnSuccess == err) {
1104 break;
1105 } else if (kIOReturnNoSpace == err) {
1106 IOLog("Failed to open corefile of size %llu MB (low disk space)",
1107 (corefile_size_bytes / (1024ULL * 1024ULL)));
1108 if (corefile_size_bytes == corefile_fallback_size_bytes) {
1109 gIOPolledCoreFileOpenRet = err;
1110 return;
1111 }
1112 } else {
1113 IOLog("Failed to open corefile of size %llu MB (returned error 0x%x)\n",
1114 (corefile_size_bytes / (1024ULL * 1024ULL)), err);
1115 gIOPolledCoreFileOpenRet = err;
1116 return;
1117 }
1118
1119 err = IOPolledFileOpen(filename, kIOPolledFileCreate, corefile_fallback_size_bytes, free_space_to_leave_bytes,
1120 NULL, 0, &gIOPolledCoreFileVars, NULL, NULL, NULL);
1121 if (kIOReturnSuccess != err) {
1122 IOLog("Failed to open corefile of size %llu MB (returned error 0x%x)\n",
1123 (corefile_fallback_size_bytes / (1024ULL * 1024ULL)), err);
1124 gIOPolledCoreFileOpenRet = err;
1125 return;
1126 }
1127 } while (false);
1128
1129 gIOPolledCoreFileOpenRet = IOPolledFilePollersSetup(gIOPolledCoreFileVars, kIOPolledPreflightCoreDumpState);
1130 if (kIOReturnSuccess != gIOPolledCoreFileOpenRet) {
1131 IOPolledFileClose(&gIOPolledCoreFileVars, 0, NULL, 0, 0, 0);
1132 IOLog("IOPolledFilePollersSetup for corefile failed with error: 0x%x\n", err);
1133 } else {
1134 IOLog("Opened corefile of size %llu MB\n", (corefile_size_bytes / (1024ULL * 1024ULL)));
1135 gIOPolledCoreFileMode = mode_to_init;
1136 }
1137
1138 return;
1139 }
1140
1141 static void
1142 IOClosePolledCoreFile(void)
1143 {
1144 gIOPolledCoreFileOpenRet = kIOReturnNotOpen;
1145 gIOPolledCoreFileMode = kIOPolledCoreFileModeClosed;
1146 IOPolledFilePollersClose(gIOPolledCoreFileVars, kIOPolledPostflightCoreDumpState);
1147 IOPolledFileClose(&gIOPolledCoreFileVars, 0, NULL, 0, 0, 0);
1148 }
1149
1150 #endif /* IOPOLLED_COREFILE */
1151
1152 extern "C" void
1153 IOBSDMountChange(struct mount * mp, uint32_t op)
1154 {
1155 #if IOPOLLED_COREFILE
1156 uint64_t flags;
1157 char path[128];
1158 int pathLen;
1159 vnode_t vn;
1160 int result;
1161
1162 switch (op) {
1163 case kIOMountChangeMount:
1164 case kIOMountChangeDidResize:
1165
1166 if (gIOPolledCoreFileVars) {
1167 break;
1168 }
1169 flags = vfs_flags(mp);
1170 if (MNT_RDONLY & flags) {
1171 break;
1172 }
1173 if (!(MNT_LOCAL & flags)) {
1174 break;
1175 }
1176
1177 vn = vfs_vnodecovered(mp);
1178 if (!vn) {
1179 break;
1180 }
1181 pathLen = sizeof(path);
1182 result = vn_getpath(vn, &path[0], &pathLen);
1183 vnode_put(vn);
1184 if (0 != result) {
1185 break;
1186 }
1187 if (!pathLen) {
1188 break;
1189 }
1190 #if defined(XNU_TARGET_OS_BRIDGE)
1191 // on bridgeOS systems we put the core in /private/var/internal. We don't
1192 // want to match with /private/var because /private/var/internal is often mounted
1193 // over /private/var
1194 if ((pathLen - 1) < (int) strlen("/private/var/internal")) {
1195 break;
1196 }
1197 #endif
1198 if (0 != strncmp(path, kIOCoreDumpPath, pathLen - 1)) {
1199 break;
1200 }
1201
1202 thread_call_enter1(corefile_open_call, (void *) kIOCoreDumpPath);
1203 break;
1204
1205 case kIOMountChangeUnmount:
1206 case kIOMountChangeWillResize:
1207 if (gIOPolledCoreFileVars && (mp == kern_file_mount(gIOPolledCoreFileVars->fileRef))) {
1208 thread_call_cancel_wait(corefile_open_call);
1209 IOClosePolledCoreFile();
1210 }
1211 break;
1212 }
1213 #endif /* IOPOLLED_COREFILE */
1214 }
1215
1216 /* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1217
1218 extern "C" boolean_t
1219 IOTaskHasEntitlement(task_t task, const char * entitlement)
1220 {
1221 OSObject * obj;
1222 obj = IOUserClient::copyClientEntitlement(task, entitlement);
1223 if (!obj) {
1224 return false;
1225 }
1226 obj->release();
1227 return obj != kOSBooleanFalse;
1228 }
1229
1230 extern "C" boolean_t
1231 IOVnodeHasEntitlement(vnode_t vnode, int64_t off, const char *entitlement)
1232 {
1233 OSObject * obj;
1234 off_t offset = (off_t)off;
1235
1236 obj = IOUserClient::copyClientEntitlementVnode(vnode, offset, entitlement);
1237 if (!obj) {
1238 return false;
1239 }
1240 obj->release();
1241 return obj != kOSBooleanFalse;
1242 }
1243
1244 extern "C" char *
1245 IOVnodeGetEntitlement(vnode_t vnode, int64_t off, const char *entitlement)
1246 {
1247 OSObject *obj = NULL;
1248 OSString *str = NULL;
1249 size_t len;
1250 char *value = NULL;
1251 off_t offset = (off_t)off;
1252
1253 obj = IOUserClient::copyClientEntitlementVnode(vnode, offset, entitlement);
1254 if (obj != NULL) {
1255 str = OSDynamicCast(OSString, obj);
1256 if (str != NULL) {
1257 len = str->getLength() + 1;
1258 value = (char *)kheap_alloc(KHEAP_DATA_BUFFERS, len, Z_WAITOK);
1259 strlcpy(value, str->getCStringNoCopy(), len);
1260 }
1261 obj->release();
1262 }
1263 return value;
1264 }