/*
* Copyright (c) 1998-2000 Apple Computer, Inc. All rights reserved.
*
- * @APPLE_LICENSE_HEADER_START@
+ * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
*
- * The contents of this file constitute Original Code as defined in and
- * are subject to the Apple Public Source License Version 1.1 (the
- * "License"). You may not use this file except in compliance with the
- * License. Please obtain a copy of the License at
- * http://www.apple.com/publicsource and read it before using this file.
+ * This file contains Original Code and/or Modifications of Original Code
+ * as defined in and that are subject to the Apple Public Source License
+ * Version 2.0 (the 'License'). You may not use this file except in
+ * compliance with the License. The rights granted to you under the License
+ * may not be used to create, or enable the creation or redistribution of,
+ * unlawful or unlicensed copies of an Apple operating system, or to
+ * circumvent, violate, or enable the circumvention or violation of, any
+ * terms of an Apple operating system software license agreement.
*
- * This Original Code and all software distributed under the License are
- * distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY KIND, EITHER
+ * Please obtain a copy of the License at
+ * http://www.opensource.apple.com/apsl/ and read it before using this file.
+ *
+ * The Original Code and all software distributed under the License are
+ * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
* EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
* INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
- * FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT. Please see the
- * License for the specific language governing rights and limitations
- * under the License.
+ * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
+ * Please see the License for the specific language governing rights and
+ * limitations under the License.
*
- * @APPLE_LICENSE_HEADER_END@
+ * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
*/
#include <IOKit/IOBSD.h>
#include <IOKit/IOLib.h>
#include <IOKit/IOKitKeys.h>
#include <IOKit/IOPlatformExpert.h>
-#include <sys/disklabel.h>
-
extern "C" {
#include <pexpert/pexpert.h>
#include <kern/clock.h>
+#include <uuid/uuid.h>
// how long to wait for matching root device, secs
#define ROOTDEVICETIMEOUT 60
+extern dev_t mdevadd(int devid, ppnum_t base, unsigned int size, int phys);
+extern dev_t mdevlookup(int devid);
+extern void mdevremoveall(void);
kern_return_t
IOKitBSDInit( void )
{
- IOLog("IOKitBSDInit\n");
-
IOService::publishResource("IOBSD");
return( kIOReturnSuccess );
return( 0 );
}
-OSDictionary * IOCDMatching( const char * name )
+OSDictionary * IOUUIDMatching( void )
{
- OSDictionary * dict;
- const OSSymbol * str;
-
- dict = IOService::serviceMatching( "IOMedia" );
- if( dict == 0 ) {
- IOLog("Unable to find IOMedia\n");
- return 0;
- }
+ return IOService::resourceMatching( "boot-uuid-media" );
+}
- str = OSSymbol::withCString( "CD_ROM_Mode_1" );
- if( str == 0 ) {
- dict->release();
- return 0;
- }
- dict->setObject( "Content", (OSObject *)str );
- str->release();
- return( dict );
+OSDictionary * IOCDMatching( void )
+{
+ OSDictionary * dict;
+ const OSSymbol * str;
+
+ dict = IOService::serviceMatching( "IOMedia" );
+ if( dict == 0 ) {
+ IOLog("Unable to find IOMedia\n");
+ return 0;
+ }
+
+ str = OSSymbol::withCString( "CD_ROM_Mode_1" );
+ if( str == 0 ) {
+ dict->release();
+ return 0;
+ }
+
+ dict->setObject( "Content Hint", (OSObject *)str );
+ str->release();
+ return( dict );
}
OSDictionary * IONetworkMatching( const char * path,
len = strlen( kIODeviceTreePlane ":" );
maxLen -= len;
- if( maxLen < 0)
+ if( maxLen <= 0)
continue;
- strcpy( buf, kIODeviceTreePlane ":" );
+ strlcpy( buf, kIODeviceTreePlane ":", len + 1 );
comp = buf + len;
// remove parameters following ':' from the path
len = skip - path;
maxLen -= len;
- if( maxLen < 0)
+ if( maxLen <= 0)
continue;
- strncpy( comp, path, len );
- comp[ len ] = 0;
+ strlcpy( comp, path, len + 1 );
matching = IOService::serviceMatching( "IONetworkInterface" );
if( !matching)
OSDictionary * matching;
OSDictionary * propDict = 0;
const OSSymbol * str = 0;
-
+ char networkType[128];
+
do {
matching = IOService::serviceMatching( "IONetworkInterface" );
if ( matching == 0 )
str->release();
str = 0;
+ // see if we're contrained to netroot off of specific network type
+ if(PE_parse_boot_argn( "network-type", networkType, 128 ))
+ {
+ str = OSSymbol::withCString( networkType );
+ if(str)
+ {
+ propDict->setObject( "IONetworkRootType", str);
+ str->release();
+ str = 0;
+ }
+ }
+
if ( matching->setObject( gIOPropertyMatchKey,
(OSObject *) propDict ) != true )
continue;
char * comp;
long unit = -1;
long partition = -1;
+ long lun = -1;
char c;
+ int len;
// scan the tail of the path for "@unit:partition"
do {
// Have to get the full path to the controller - an alias may
// tell us next to nothing, like "hd:8"
alias = IORegistryEntry::dealiasPath( &path, gIODTPlane );
-
+
look = path + strlen( path);
c = ':';
while( look != path) {
partition = strtol( look + 1, 0, 0 );
c = '@';
} else if( c == '@') {
- unit = strtol( look + 1, 0, 16 );
+ unit = strtol( look + 1, &comp, 16 );
+
+ if( *comp == ',') {
+ lun = strtol( comp + 1, 0, 16 );
+ }
+
c = '/';
} else if( c == '/') {
c = 0;
}
if( c || unit == -1 || partition == -1)
continue;
+
+ len = strlen( "{" kIOPathMatchKey "='" kIODeviceTreePlane ":" );
+ maxLen -= len;
+ if( maxLen <= 0)
+ continue;
- maxLen -= strlen( "{" kIOPathMatchKey "='" kIODeviceTreePlane ":" );
- maxLen -= ( alias ? strlen( alias ) : 0 ) + (look - path);
- maxLen -= strlen( "/@hhhhhhhh:dddddddddd';}" );
+ snprintf( buf, len + 1, "{" kIOPathMatchKey "='" kIODeviceTreePlane ":" );
+ comp = buf + len;
- if( maxLen > 0) {
- sprintf( buf, "{" kIOPathMatchKey "='" kIODeviceTreePlane ":" );
- comp = buf + strlen( buf );
+ if( alias) {
+ len = strlen( alias );
+ maxLen -= len;
+ if( maxLen <= 0)
+ continue;
- if( alias) {
- strcpy( comp, alias );
- comp += strlen( alias );
- }
-
- if ( (look - path)) {
- strncpy( comp, path, look - path);
- comp += look - path;
- }
+ strlcpy( comp, alias, len + 1 );
+ comp += len;
+ }
- sprintf( comp, "/@%lx:%ld';}", unit, partition );
- } else
- continue;
+ if ( (look - path)) {
+ len = (look - path);
+ maxLen -= len;
+ if( maxLen <= 0)
+ continue;
+ strlcpy( comp, path, len + 1 );
+ comp += len;
+ }
+
+ if ( lun != -1 )
+ {
+ len = strlen( "/@hhhhhhhh,hhhhhhhh:dddddddddd';}" );
+ maxLen -= len;
+ if( maxLen <= 0)
+ continue;
+
+ snprintf( comp, len + 1, "/@%lx,%lx:%ld';}", unit, lun, partition );
+ }
+ else
+ {
+ len = strlen( "/@hhhhhhhh:dddddddddd';}" );
+ maxLen -= len;
+ if( maxLen <= 0)
+ continue;
+
+ snprintf( comp, len + 1, "/@%lx:%ld';}", unit, partition );
+ }
+
return( OSDynamicCast(OSDictionary, OSUnserialize( buf, 0 )) );
} while( false );
OSDictionary * IOOFPathMatching( const char * path, char * buf, int maxLen )
{
+ OSDictionary * matching;
+ OSString * str;
+ char * comp;
+ int len;
+
/* need to look up path, get device type,
call matching help based on device type */
- return( IODiskMatching( path, buf, maxLen ));
+ matching = IODiskMatching( path, buf, maxLen );
+ if( matching)
+ return( matching );
+
+ do {
+
+ len = strlen( kIODeviceTreePlane ":" );
+ maxLen -= len;
+ if( maxLen <= 0)
+ continue;
+
+ strlcpy( buf, kIODeviceTreePlane ":", len + 1 );
+ comp = buf + len;
+ len = strlen( path );
+ maxLen -= len;
+ if( maxLen <= 0)
+ continue;
+ strlcpy( comp, path, len + 1 );
+
+ matching = OSDictionary::withCapacity( 1 );
+ if( !matching)
+ continue;
+
+ str = OSString::withCString( buf );
+ if( !str)
+ continue;
+ matching->setObject( kIOPathMatchKey, str );
+ str->release();
+
+ return( matching );
+
+ } while( false );
+
+ if( matching)
+ matching->release();
+
+ return( 0 );
+}
+
+IOService * IOFindMatchingChild( IOService * service )
+{
+ // find a matching child service
+ IOService * child = 0;
+ OSIterator * iter = service->getClientIterator();
+ if ( iter ) {
+ while( ( child = (IOService *) iter->getNextObject() ) ) {
+ OSDictionary * dict = OSDictionary::withCapacity( 1 );
+ if( dict == 0 ) {
+ iter->release();
+ return 0;
+ }
+ const OSSymbol * str = OSSymbol::withCString( "Apple_HFS" );
+ if( str == 0 ) {
+ dict->release();
+ iter->release();
+ return 0;
+ }
+ dict->setObject( "Content", (OSObject *)str );
+ str->release();
+ if ( child->compareProperty( dict, "Content" ) ) {
+ dict->release();
+ break;
+ }
+ dict->release();
+ IOService * subchild = IOFindMatchingChild( child );
+ if ( subchild ) {
+ child = subchild;
+ break;
+ }
+ }
+ iter->release();
+ }
+ return child;
}
-kern_return_t IOFindBSDRoot( char * rootName,
+static int didRam = 0;
+
+kern_return_t IOFindBSDRoot( char * rootName, unsigned int rootNameSize,
dev_t * root, u_int32_t * oflags )
{
mach_timespec_t t;
OSString * iostr;
OSNumber * off;
OSData * data = 0;
+ UInt32 *ramdParms = 0;
UInt32 flags = 0;
- int minor, major;
+ int mnr, mjr;
+ bool findHFSChild = false;
+ char * mediaProperty = 0;
char * rdBootVar;
enum { kMaxPathBuf = 512, kMaxBootVar = 128 };
char * str;
int len;
bool forceNet = false;
bool debugInfoPrintedOnce = false;
+ const char * uuidStr = NULL;
static int mountAttempts = 0;
+
+ int xchar, dchar;
+
if( mountAttempts++)
IOSleep( 5 * 1000 );
return( kIOReturnNoMemory );
rdBootVar = str + kMaxPathBuf;
- if (!PE_parse_boot_arg("rd", rdBootVar )
- && !PE_parse_boot_arg("rootdev", rdBootVar ))
+ if (!PE_parse_boot_argn("rd", rdBootVar, kMaxBootVar )
+ && !PE_parse_boot_argn("rootdev", rdBootVar, kMaxBootVar ))
rdBootVar[0] = 0;
do {
- if( (regEntry = IORegistryEntry::fromPath( "/chosen", gIODTPlane ))) {
+ if( (regEntry = IORegistryEntry::fromPath( "/chosen", gIODTPlane ))) {
+ data = OSDynamicCast(OSData, regEntry->getProperty( "root-matching" ));
+ if (data) {
+ matching = OSDynamicCast(OSDictionary, OSUnserializeXML((char *)data->getBytesNoCopy()));
+ if (matching) {
+ continue;
+ }
+ }
+
+ data = (OSData *) regEntry->getProperty( "boot-uuid" );
+ if( data) {
+ uuidStr = (const char*)data->getBytesNoCopy();
+ OSString *uuidString = OSString::withCString( uuidStr );
+
+ // match the boot-args boot-uuid processing below
+ if( uuidString) {
+ IOLog("rooting via boot-uuid from /chosen: %s\n", uuidStr);
+ IOService::publishResource( "boot-uuid", uuidString );
+ uuidString->release();
+ matching = IOUUIDMatching();
+ mediaProperty = "boot-uuid-media";
+ regEntry->release();
+ continue;
+ } else {
+ uuidStr = NULL;
+ }
+ }
+
+ // else try for an OF Path
data = (OSData *) regEntry->getProperty( "rootpath" );
regEntry->release();
- if( data)
- continue;
+ if( data) continue;
}
if( (regEntry = IORegistryEntry::fromPath( "/options", gIODTPlane ))) {
data = (OSData *) regEntry->getProperty( "boot-file" );
regEntry->release();
- if( data)
- continue;
+ if( data) continue;
}
} while( false );
- if( data)
+ if( data && !uuidStr)
look = (const char *) data->getBytesNoCopy();
if( rdBootVar[0] == '*') {
look = rdBootVar + 1;
- forceNet = false;
+ forceNet = false;
} else {
if( (regEntry = IORegistryEntry::fromPath( "/", gIODTPlane ))) {
forceNet = (0 != regEntry->getProperty( "net-boot" ));
- regEntry->release();
- }
+ regEntry->release();
+ }
}
+
+
+//
+// See if we have a RAMDisk property in /chosen/memory-map. If so, make it into a device.
+// It will become /dev/mdx, where x is 0-f.
+//
+
+ if(!didRam) { /* Have we already build this ram disk? */
+ didRam = 1; /* Remember we did this */
+ if((regEntry = IORegistryEntry::fromPath( "/chosen/memory-map", gIODTPlane ))) { /* Find the map node */
+ data = (OSData *)regEntry->getProperty("RAMDisk"); /* Find the ram disk, if there */
+ if(data) { /* We found one */
+
+ ramdParms = (UInt32 *)data->getBytesNoCopy(); /* Point to the ram disk base and size */
+ (void)mdevadd(-1, ramdParms[0] >> 12, ramdParms[1] >> 12, 0); /* Initialize it and pass back the device number */
+ }
+ regEntry->release(); /* Toss the entry */
+ }
+ }
+
+//
+// Now check if we are trying to root on a memory device
+//
+
+ if((rdBootVar[0] == 'm') && (rdBootVar[1] == 'd') && (rdBootVar[3] == 0)) {
+ dchar = xchar = rdBootVar[2]; /* Get the actual device */
+ if((xchar >= '0') && (xchar <= '9')) xchar = xchar - '0'; /* If digit, convert */
+ else {
+ xchar = xchar & ~' '; /* Fold to upper case */
+ if((xchar >= 'A') && (xchar <= 'F')) { /* Is this a valid digit? */
+ xchar = (xchar & 0xF) + 9; /* Convert the hex digit */
+ dchar = dchar | ' '; /* Fold to lower case */
+ }
+ else xchar = -1; /* Show bogus */
+ }
+ if(xchar >= 0) { /* Do we have a valid memory device name? */
+ *root = mdevlookup(xchar); /* Find the device number */
+ if(*root >= 0) { /* Did we find one? */
+
+ rootName[0] = 'm'; /* Build root name */
+ rootName[1] = 'd'; /* Build root name */
+ rootName[2] = dchar; /* Build root name */
+ rootName[3] = 0; /* Build root name */
+ IOLog("BSD root: %s, major %d, minor %d\n", rootName, major(*root), minor(*root));
+ *oflags = 0; /* Show that this is not network */
+ goto iofrootx; /* Join common exit... */
+ }
+ panic("IOFindBSDRoot: specified root memory device, %s, has not been configured\n", rdBootVar); /* Not there */
+ }
+ }
+
if( look) {
// from OpenFirmware path
IOLog("From path: \"%s\", ", look);
- if( forceNet || (0 == strncmp( look, "enet", strlen( "enet" ))) ) {
- matching = IONetworkMatching( look, str, kMaxPathBuf );
- } else {
- matching = IODiskMatching( look, str, kMaxPathBuf );
+ if (!matching) {
+ if( forceNet || (0 == strncmp( look, "enet", strlen( "enet" ))) ) {
+ matching = IONetworkMatching( look, str, kMaxPathBuf );
+ } else {
+ matching = IODiskMatching( look, str, kMaxPathBuf );
+ }
}
}
-
- if( (!matching) && rdBootVar[0] ) {
+
+ if( (!matching) && rdBootVar[0] ) {
// by BSD name
look = rdBootVar;
if( look[0] == '*')
if ( strncmp( look, "en", strlen( "en" )) == 0 ) {
matching = IONetworkNamePrefixMatching( "en" );
- } else if ( strncmp( look, "cdrom", strlen( "cdrom" )) == 0 ) {
- matching = IOCDMatching( look );
+ } else if ( strncmp( look, "cdrom", strlen( "cdrom" )) == 0 ) {
+ matching = IOCDMatching();
+ findHFSChild = true;
+ } else if ( strncmp( look, "uuid", strlen( "uuid" )) == 0 ) {
+ char *uuid;
+ OSString *uuidString;
+
+ uuid = (char *)IOMalloc( kMaxBootVar );
+
+ if ( uuid ) {
+ if (!PE_parse_boot_argn( "boot-uuid", uuid, kMaxBootVar )) {
+ panic( "rd=uuid but no boot-uuid=<value> specified" );
+ }
+ uuidString = OSString::withCString( uuid );
+ if ( uuidString ) {
+ IOService::publishResource( "boot-uuid", uuidString );
+ uuidString->release();
+ IOLog( "\nWaiting for boot volume with UUID %s\n", uuid );
+ matching = IOUUIDMatching();
+ mediaProperty = "boot-uuid-media";
+ }
+ IOFree( uuid, kMaxBootVar );
+ }
} else {
matching = IOBSDNameMatching( look );
}
}
if( !matching) {
- OSString * astring;
- // any UFS
+ OSString * astring;
+ // Match any HFS media
+
matching = IOService::serviceMatching( "IOMedia" );
- astring = OSString::withCStringNoCopy("Apple_UFS");
+ astring = OSString::withCStringNoCopy("Apple_HFS");
if ( astring ) {
matching->setObject("Content", astring);
astring->release();
} while( !service);
matching->release();
- major = 0;
- minor = 0;
+ if ( service && findHFSChild ) {
+ bool waiting = true;
+ // wait for children services to finish registering
+ while ( waiting ) {
+ t.tv_sec = ROOTDEVICETIMEOUT;
+ t.tv_nsec = 0;
+ if ( service->waitQuiet( &t ) == kIOReturnSuccess ) {
+ waiting = false;
+ } else {
+ IOLog( "Waiting for child registration\n" );
+ }
+ }
+ // look for a subservice with an Apple_HFS child
+ IOService * subservice = IOFindMatchingChild( service );
+ if ( subservice ) service = subservice;
+ } else if ( service && mediaProperty ) {
+ service = (IOService *)service->getProperty(mediaProperty);
+ }
+
+ mjr = 0;
+ mnr = 0;
// If the IOService we matched to is a subclass of IONetworkInterface,
// then make sure it has been registered with BSD and has a BSD name
iostr = (OSString *) service->getProperty( kIOBSDNameKey );
if( iostr)
- strcpy( rootName, iostr->getCStringNoCopy() );
+ strlcpy( rootName, iostr->getCStringNoCopy(), rootNameSize );
off = (OSNumber *) service->getProperty( kIOBSDMajorKey );
if( off)
- major = off->unsigned32BitValue();
+ mjr = off->unsigned32BitValue();
off = (OSNumber *) service->getProperty( kIOBSDMinorKey );
if( off)
- minor = off->unsigned32BitValue();
+ mnr = off->unsigned32BitValue();
if( service->metaCast( "IONetworkInterface" ))
flags |= 1;
} else {
IOLog( "Wait for root failed\n" );
- strcpy( rootName, "en0");
+ strlcpy( rootName, "en0", rootNameSize );
flags |= 1;
}
IOLog( "BSD root: %s", rootName );
- if( major)
- IOLog(", major %d, minor %d\n", major, minor );
+ if( mjr)
+ IOLog(", major %d, minor %d\n", mjr, mnr );
else
IOLog("\n");
- *root = makedev( major, minor );
+ *root = makedev( mjr, mnr );
*oflags = flags;
IOFree( str, kMaxPathBuf + kMaxBootVar );
+iofrootx:
if( (gIOKitDebug & (kIOLogDTree | kIOLogServiceTree | kIOLogMemory)) && !debugInfoPrintedOnce) {
IOService::getPlatform()->waitQuiet();
return( kIOReturnSuccess );
}
+void IOSecureBSDRoot(const char * rootName)
+{
+#if CONFIG_EMBEDDED
+ IOReturn result;
+ IOPlatformExpert *pe;
+ const OSSymbol *functionName = OSSymbol::withCStringNoCopy("SecureRootName");
+
+ while ((pe = IOService::getPlatform()) == 0) IOSleep(1 * 1000);
+
+ // Returns kIOReturnNotPrivileged is the root device is not secure.
+ // Returns kIOReturnUnsupported if "SecureRootName" is not implemented.
+ result = pe->callPlatformFunction(functionName, false, (void *)rootName, (void *)0, (void *)0, (void *)0);
+
+ functionName->release();
+
+ if (result == kIOReturnNotPrivileged) mdevremoveall();
+#endif
+}
+
+void *
+IOBSDRegistryEntryForDeviceTree(char * path)
+{
+ return (IORegistryEntry::fromPath(path, gIODTPlane));
+}
+
+void
+IOBSDRegistryEntryRelease(void * entry)
+{
+ IORegistryEntry * regEntry = (IORegistryEntry *)entry;
+
+ if (regEntry)
+ regEntry->release();
+ return;
+}
+
+const void *
+IOBSDRegistryEntryGetData(void * entry, char * property_name,
+ int * packet_length)
+{
+ OSData * data;
+ IORegistryEntry * regEntry = (IORegistryEntry *)entry;
+
+ data = (OSData *) regEntry->getProperty(property_name);
+ if (data) {
+ *packet_length = data->getLength();
+ return (data->getBytesNoCopy());
+ }
+ return (NULL);
+}
+
+kern_return_t IOBSDGetPlatformUUID( uuid_t uuid, mach_timespec_t timeout )
+{
+ IOService * resources;
+ OSString * string;
+
+ resources = IOService::waitForService( IOService::resourceMatching( kIOPlatformUUIDKey ), &timeout );
+ if ( resources == 0 ) return KERN_OPERATION_TIMED_OUT;
+
+ string = ( OSString * ) IOService::getPlatform( )->getProvider( )->getProperty( kIOPlatformUUIDKey );
+ if ( string == 0 ) return KERN_NOT_SUPPORTED;
+
+ uuid_parse( string->getCStringNoCopy( ), uuid );
+
+ return KERN_SUCCESS;
+}
+
} /* extern "C" */