* Copyright (c) 1998-2011 Apple Inc. All rights reserved.
*
* @APPLE_OSREFERENCE_LICENSE_HEADER_START@
- *
+ *
* This file contains Original Code and/or Modifications of Original Code
* as defined in and that are subject to the Apple Public Source License
* Version 2.0 (the 'License'). You may not use this file except in
* unlawful or unlicensed copies of an Apple operating system, or to
* circumvent, violate, or enable the circumvention or violation of, any
* terms of an Apple operating system software license agreement.
- *
+ *
* Please obtain a copy of the License at
* http://www.opensource.apple.com/apsl/ and read it before using this file.
- *
+ *
* The Original Code and all software distributed under the License are
* distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
* EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
* FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
* Please see the License for the specific language governing rights and
* limitations under the License.
- *
+ *
* @APPLE_OSREFERENCE_LICENSE_HEADER_END@
*/
#include <IOKit/IOBSD.h>
#include <IOKit/IOCatalogue.h>
#include <IOKit/IODeviceTreeSupport.h>
#include <IOKit/IOKitKeys.h>
+#include <IOKit/IONVRAM.h>
#include <IOKit/IOPlatformExpert.h>
+#include <IOKit/IOUserClient.h>
extern "C" {
-
#include <pexpert/pexpert.h>
#include <kern/clock.h>
+#include <mach/machine.h>
#include <uuid/uuid.h>
+#include <sys/vnode_internal.h>
+#include <sys/mount.h>
// how long to wait for matching root device, secs
#if DEBUG
extern dev_t mdevadd(int devid, uint64_t base, unsigned int size, int phys);
extern dev_t mdevlookup(int devid);
extern void mdevremoveall(void);
+extern int mdevgetrange(int devid, uint64_t *base, uint64_t *size);
extern void di_root_ramfile(IORegistryEntry * entry);
+#define ROUNDUP(a, b) (((a) + ((b) - 1)) & (~((b) - 1)))
+
+#define IOPOLLED_COREFILE (CONFIG_KDP_INTERACTIVE_DEBUGGING)
+
+#if defined(XNU_TARGET_OS_BRIDGE)
+#define kIOCoreDumpPath "/private/var/internal/kernelcore"
+#elif defined(XNU_TARGET_OS_OSX)
+#define kIOCoreDumpPath "/System/Volumes/VM/kernelcore"
+#else
+#define kIOCoreDumpPath "/private/var/vm/kernelcore"
+#endif
+
+#define SYSTEM_NVRAM_PREFIX "40A0DDD2-77F8-4392-B4A3-1E7304206516:"
+
+#if CONFIG_KDP_INTERACTIVE_DEBUGGING
+/*
+ * Touched by IOFindBSDRoot() if a RAMDisk is used for the root device.
+ */
+extern uint64_t kdp_core_ramdisk_addr;
+extern uint64_t kdp_core_ramdisk_size;
+#endif
+
+#if IOPOLLED_COREFILE
+static void IOOpenPolledCoreFile(thread_call_param_t __unused, thread_call_param_t corefilename);
+
+thread_call_t corefile_open_call = NULL;
+#endif
+
kern_return_t
IOKitBSDInit( void )
{
- IOService::publishResource("IOBSD");
+ IOService::publishResource("IOBSD");
- return( kIOReturnSuccess );
+#if IOPOLLED_COREFILE
+ corefile_open_call = thread_call_allocate_with_options(IOOpenPolledCoreFile, NULL, THREAD_CALL_PRIORITY_KERNEL, THREAD_CALL_OPTIONS_ONCE);
+#endif
+
+ return kIOReturnSuccess;
}
void
IOServicePublishResource( const char * property, boolean_t value )
{
- if ( value)
- IOService::publishResource( property, kOSBooleanTrue );
- else
- IOService::getResourceService()->removeProperty( property );
+ if (value) {
+ IOService::publishResource( property, kOSBooleanTrue );
+ } else {
+ IOService::getResourceService()->removeProperty( property );
+ }
}
boolean_t
IOServiceWaitForMatchingResource( const char * property, uint64_t timeout )
{
- OSDictionary * dict = 0;
- IOService * match = 0;
- boolean_t found = false;
-
- do {
-
- dict = IOService::resourceMatching( property );
- if( !dict)
- continue;
- match = IOService::waitForMatchingService( dict, timeout );
- if ( match)
- found = true;
-
- } while( false );
-
- if( dict)
- dict->release();
- if( match)
- match->release();
-
- return( found );
+ OSDictionary * dict = NULL;
+ IOService * match = NULL;
+ boolean_t found = false;
+
+ do {
+ dict = IOService::resourceMatching( property );
+ if (!dict) {
+ continue;
+ }
+ match = IOService::waitForMatchingService( dict, timeout );
+ if (match) {
+ found = true;
+ }
+ } while (false);
+
+ if (dict) {
+ dict->release();
+ }
+ if (match) {
+ match->release();
+ }
+
+ return found;
}
boolean_t
IOCatalogueMatchingDriversPresent( const char * property )
{
- OSDictionary * dict = 0;
- OSOrderedSet * set = 0;
- SInt32 generationCount = 0;
- boolean_t found = false;
-
- do {
-
- dict = OSDictionary::withCapacity(1);
- if( !dict)
- continue;
- dict->setObject( property, kOSBooleanTrue );
- set = gIOCatalogue->findDrivers( dict, &generationCount );
- if ( set && (set->getCount() > 0))
- found = true;
-
- } while( false );
-
- if( dict)
- dict->release();
- if( set)
- set->release();
-
- return( found );
-}
+ OSDictionary * dict = NULL;
+ OSOrderedSet * set = NULL;
+ SInt32 generationCount = 0;
+ boolean_t found = false;
+
+ do {
+ dict = OSDictionary::withCapacity(1);
+ if (!dict) {
+ continue;
+ }
+ dict->setObject( property, kOSBooleanTrue );
+ set = gIOCatalogue->findDrivers( dict, &generationCount );
+ if (set && (set->getCount() > 0)) {
+ found = true;
+ }
+ } while (false);
-OSDictionary * IOBSDNameMatching( const char * name )
-{
- OSDictionary * dict;
- const OSSymbol * str = 0;
+ if (dict) {
+ dict->release();
+ }
+ if (set) {
+ set->release();
+ }
- do {
+ return found;
+}
- dict = IOService::serviceMatching( gIOServiceKey );
- if( !dict)
- continue;
- str = OSSymbol::withCString( name );
- if( !str)
- continue;
- dict->setObject( kIOBSDNameKey, (OSObject *) str );
- str->release();
+OSDictionary *
+IOBSDNameMatching( const char * name )
+{
+ OSDictionary * dict;
+ const OSSymbol * str = NULL;
- return( dict );
+ do {
+ dict = IOService::serviceMatching( gIOServiceKey );
+ if (!dict) {
+ continue;
+ }
+ str = OSSymbol::withCString( name );
+ if (!str) {
+ continue;
+ }
+ dict->setObject( kIOBSDNameKey, (OSObject *) str );
+ str->release();
- } while( false );
+ return dict;
+ } while (false);
- if( dict)
- dict->release();
- if( str)
- str->release();
+ if (dict) {
+ dict->release();
+ }
+ if (str) {
+ str->release();
+ }
- return( 0 );
+ return NULL;
}
-OSDictionary * IOUUIDMatching( void )
+OSDictionary *
+IOUUIDMatching( void )
{
- return IOService::resourceMatching( "boot-uuid-media" );
+ return IOService::resourceMatching( "boot-uuid-media" );
}
-OSDictionary * IONetworkNamePrefixMatching( const char * prefix )
+OSDictionary *
+IONetworkNamePrefixMatching( const char * prefix )
{
- OSDictionary * matching;
- OSDictionary * propDict = 0;
- const OSSymbol * str = 0;
+ OSDictionary * matching;
+ OSDictionary * propDict = NULL;
+ const OSSymbol * str = NULL;
char networkType[128];
-
- do {
- matching = IOService::serviceMatching( "IONetworkInterface" );
- if ( matching == 0 )
- continue;
- propDict = OSDictionary::withCapacity(1);
- if ( propDict == 0 )
- continue;
+ do {
+ matching = IOService::serviceMatching( "IONetworkInterface" );
+ if (matching == NULL) {
+ continue;
+ }
- str = OSSymbol::withCString( prefix );
- if ( str == 0 )
- continue;
+ propDict = OSDictionary::withCapacity(1);
+ if (propDict == NULL) {
+ continue;
+ }
+
+ str = OSSymbol::withCString( prefix );
+ if (str == NULL) {
+ continue;
+ }
- propDict->setObject( "IOInterfaceNamePrefix", (OSObject *) str );
- str->release();
- str = 0;
+ propDict->setObject( "IOInterfaceNamePrefix", (OSObject *) str );
+ str->release();
+ str = NULL;
// see if we're contrained to netroot off of specific network type
- if(PE_parse_boot_argn( "network-type", networkType, 128 ))
- {
+ if (PE_parse_boot_argn( "network-type", networkType, 128 )) {
str = OSSymbol::withCString( networkType );
- if(str)
- {
+ if (str) {
propDict->setObject( "IONetworkRootType", str);
str->release();
- str = 0;
+ str = NULL;
}
}
- if ( matching->setObject( gIOPropertyMatchKey,
- (OSObject *) propDict ) != true )
- continue;
-
- propDict->release();
- propDict = 0;
+ if (matching->setObject( gIOPropertyMatchKey,
+ (OSObject *) propDict ) != true) {
+ continue;
+ }
- return( matching );
+ propDict->release();
+ propDict = NULL;
- } while ( false );
+ return matching;
+ } while (false);
- if ( matching ) matching->release();
- if ( propDict ) propDict->release();
- if ( str ) str->release();
+ if (matching) {
+ matching->release();
+ }
+ if (propDict) {
+ propDict->release();
+ }
+ if (str) {
+ str->release();
+ }
- return( 0 );
+ return NULL;
}
-static bool IORegisterNetworkInterface( IOService * netif )
+static bool
+IORegisterNetworkInterface( IOService * netif )
{
- // A network interface is typically named and registered
- // with BSD after receiving a request from a user space
- // "namer". However, for cases when the system needs to
- // root from the network, this registration task must be
- // done inside the kernel and completed before the root
- // device is handed to BSD.
-
- IOService * stack;
- OSNumber * zero = 0;
- OSString * path = 0;
- OSDictionary * dict = 0;
- char * pathBuf = 0;
- int len;
- enum { kMaxPathLen = 512 };
-
- do {
- stack = IOService::waitForService(
- IOService::serviceMatching("IONetworkStack") );
- if ( stack == 0 ) break;
-
- dict = OSDictionary::withCapacity(3);
- if ( dict == 0 ) break;
-
- zero = OSNumber::withNumber((UInt64) 0, 32);
- if ( zero == 0 ) break;
-
- pathBuf = (char *) IOMalloc( kMaxPathLen );
- if ( pathBuf == 0 ) break;
-
- len = kMaxPathLen;
- if ( netif->getPath( pathBuf, &len, gIOServicePlane )
- == false ) break;
-
- path = OSString::withCStringNoCopy( pathBuf );
- if ( path == 0 ) break;
-
- dict->setObject( "IOInterfaceUnit", zero );
- dict->setObject( kIOPathMatchKey, path );
-
- stack->setProperties( dict );
- }
- while ( false );
-
- if ( zero ) zero->release();
- if ( path ) path->release();
- if ( dict ) dict->release();
- if ( pathBuf ) IOFree(pathBuf, kMaxPathLen);
-
- return ( netif->getProperty( kIOBSDNameKey ) != 0 );
+ // A network interface is typically named and registered
+ // with BSD after receiving a request from a user space
+ // "namer". However, for cases when the system needs to
+ // root from the network, this registration task must be
+ // done inside the kernel and completed before the root
+ // device is handed to BSD.
+
+ IOService * stack;
+ OSNumber * zero = NULL;
+ OSString * path = NULL;
+ OSDictionary * dict = NULL;
+ char * pathBuf = NULL;
+ int len;
+ enum { kMaxPathLen = 512 };
+
+ do {
+ stack = IOService::waitForService(
+ IOService::serviceMatching("IONetworkStack"));
+ if (stack == NULL) {
+ break;
+ }
+
+ dict = OSDictionary::withCapacity(3);
+ if (dict == NULL) {
+ break;
+ }
+
+ zero = OSNumber::withNumber((UInt64) 0, 32);
+ if (zero == NULL) {
+ break;
+ }
+
+ pathBuf = (char *) IOMalloc( kMaxPathLen );
+ if (pathBuf == NULL) {
+ break;
+ }
+
+ len = kMaxPathLen;
+ if (netif->getPath( pathBuf, &len, gIOServicePlane )
+ == false) {
+ break;
+ }
+
+ path = OSString::withCStringNoCopy( pathBuf );
+ if (path == NULL) {
+ break;
+ }
+
+ dict->setObject( "IOInterfaceUnit", zero );
+ dict->setObject( kIOPathMatchKey, path );
+
+ stack->setProperties( dict );
+ }while (false);
+
+ if (zero) {
+ zero->release();
+ }
+ if (path) {
+ path->release();
+ }
+ if (dict) {
+ dict->release();
+ }
+ if (pathBuf) {
+ IOFree(pathBuf, kMaxPathLen);
+ }
+
+ return netif->getProperty( kIOBSDNameKey ) != NULL;
}
-OSDictionary * IOOFPathMatching( const char * path, char * buf, int maxLen )
+OSDictionary *
+IOOFPathMatching( const char * path, char * buf, int maxLen )
{
- OSDictionary * matching;
- OSString * str;
- char * comp;
- int len;
+ OSDictionary * matching = NULL;
+ OSString * str;
+ char * comp;
+ int len;
+
+ do {
+ len = ((int) strlen( kIODeviceTreePlane ":" ));
+ maxLen -= len;
+ if (maxLen <= 0) {
+ continue;
+ }
- do {
+ strlcpy( buf, kIODeviceTreePlane ":", len + 1 );
+ comp = buf + len;
- len = strlen( kIODeviceTreePlane ":" );
- maxLen -= len;
- if( maxLen <= 0)
- continue;
+ len = ((int) strnlen( path, INT_MAX ));
+ maxLen -= len;
+ if (maxLen <= 0) {
+ continue;
+ }
+ strlcpy( comp, path, len + 1 );
- strlcpy( buf, kIODeviceTreePlane ":", len + 1 );
- comp = buf + len;
+ matching = OSDictionary::withCapacity( 1 );
+ if (!matching) {
+ continue;
+ }
- len = strlen( path );
- maxLen -= len;
- if( maxLen <= 0)
- continue;
- strlcpy( comp, path, len + 1 );
+ str = OSString::withCString( buf );
+ if (!str) {
+ continue;
+ }
+ matching->setObject( kIOPathMatchKey, str );
+ str->release();
- matching = OSDictionary::withCapacity( 1 );
- if( !matching)
- continue;
+ return matching;
+ } while (false);
- str = OSString::withCString( buf );
- if( !str)
- continue;
- matching->setObject( kIOPathMatchKey, str );
- str->release();
+ if (matching) {
+ matching->release();
+ }
- return( matching );
+ return NULL;
+}
- } while( false );
+static int didRam = 0;
+enum { kMaxPathBuf = 512, kMaxBootVar = 128 };
- if( matching)
- matching->release();
+const char*
+IOGetBootUUID(void)
+{
+ IORegistryEntry *entry;
- return( 0 );
+ if ((entry = IORegistryEntry::fromPath("/chosen", gIODTPlane))) {
+ OSData *uuid_data = (OSData *)entry->getProperty("boot-uuid");
+ if (uuid_data) {
+ return (const char*)uuid_data->getBytesNoCopy();
+ }
+ }
+
+ return NULL;
}
-static int didRam = 0;
+const char *
+IOGetApfsPrebootUUID(void)
+{
+ IORegistryEntry *entry;
+
+ if ((entry = IORegistryEntry::fromPath("/chosen", gIODTPlane))) {
+ OSData *uuid_data = (OSData *)entry->getProperty("apfs-preboot-uuid");
+ if (uuid_data) {
+ return (const char*)uuid_data->getBytesNoCopy();
+ }
+ }
+
+ return NULL;
+}
+
+const char *
+IOGetAssociatedApfsVolgroupUUID(void)
+{
+ IORegistryEntry *entry;
+
+ if ((entry = IORegistryEntry::fromPath("/chosen", gIODTPlane))) {
+ OSData *uuid_data = (OSData *)entry->getProperty("associated-volume-group");
+ if (uuid_data) {
+ return (const char*)uuid_data->getBytesNoCopy();
+ }
+ }
+
+ return NULL;
+}
+
+const char *
+IOGetBootObjectsPath(void)
+{
+ IORegistryEntry *entry;
+
+ if ((entry = IORegistryEntry::fromPath("/chosen", gIODTPlane))) {
+ OSData *path_prefix_data = (OSData *)entry->getProperty("boot-objects-path");
+ if (path_prefix_data) {
+ return (const char *)path_prefix_data->getBytesNoCopy();
+ }
+ }
+
+ return NULL;
+}
-kern_return_t IOFindBSDRoot( char * rootName, unsigned int rootNameSize,
- dev_t * root, u_int32_t * oflags )
+/*
+ * Set NVRAM to boot into the right flavor of Recovery,
+ * optionally passing a UUID of a volume that failed to boot.
+ * If `reboot` is true, reboot immediately.
+ *
+ * Returns true if `mode` was understood, false otherwise.
+ * (Does not return if `reboot` is true.)
+ */
+boolean_t
+IOSetRecoveryBoot(bsd_bootfail_mode_t mode, uuid_t volume_uuid, boolean_t reboot)
{
- mach_timespec_t t;
- IOService * service;
- IORegistryEntry * regEntry;
- OSDictionary * matching = 0;
- OSString * iostr;
- OSNumber * off;
- OSData * data = 0;
-
- UInt32 flags = 0;
- int mnr, mjr;
- const char * mediaProperty = 0;
- char * rdBootVar;
- enum { kMaxPathBuf = 512, kMaxBootVar = 128 };
- char * str;
- const char * look = 0;
- int len;
- bool debugInfoPrintedOnce = false;
- const char * uuidStr = NULL;
-
- static int mountAttempts = 0;
-
- int xchar, dchar;
-
-
- if( mountAttempts++)
- IOSleep( 5 * 1000 );
-
- str = (char *) IOMalloc( kMaxPathBuf + kMaxBootVar );
- if( !str)
- return( kIOReturnNoMemory );
- rdBootVar = str + kMaxPathBuf;
-
- if (!PE_parse_boot_argn("rd", rdBootVar, kMaxBootVar )
- && !PE_parse_boot_argn("rootdev", rdBootVar, kMaxBootVar ))
- rdBootVar[0] = 0;
-
- do {
- if( (regEntry = IORegistryEntry::fromPath( "/chosen", gIODTPlane ))) {
- di_root_ramfile(regEntry);
- data = OSDynamicCast(OSData, regEntry->getProperty( "root-matching" ));
- if (data) {
- matching = OSDynamicCast(OSDictionary, OSUnserializeXML((char *)data->getBytesNoCopy()));
- if (matching) {
- continue;
- }
- }
-
- data = (OSData *) regEntry->getProperty( "boot-uuid" );
- if( data) {
- uuidStr = (const char*)data->getBytesNoCopy();
- OSString *uuidString = OSString::withCString( uuidStr );
-
- // match the boot-args boot-uuid processing below
- if( uuidString) {
- IOLog("rooting via boot-uuid from /chosen: %s\n", uuidStr);
- IOService::publishResource( "boot-uuid", uuidString );
- uuidString->release();
- matching = IOUUIDMatching();
- mediaProperty = "boot-uuid-media";
- regEntry->release();
- continue;
+ IODTNVRAM *nvram = NULL;
+ const OSSymbol *boot_command_sym = NULL;
+ OSString *boot_command_recover = NULL;
+
+ if (mode == BSD_BOOTFAIL_SEAL_BROKEN) {
+ const char *boot_mode = "ssv-seal-broken";
+ uuid_string_t volume_uuid_str;
+
+ // Set `recovery-broken-seal-uuid = <volume_uuid>`.
+ if (volume_uuid) {
+ uuid_unparse_upper(volume_uuid, volume_uuid_str);
+
+ if (!PEWriteNVRAMProperty(SYSTEM_NVRAM_PREFIX "recovery-broken-seal-uuid",
+ volume_uuid_str, sizeof(uuid_string_t))) {
+ IOLog("Failed to write recovery-broken-seal-uuid to NVRAM.\n");
+ }
+ }
+
+ // Set `recovery-boot-mode = ssv-seal-broken`.
+ if (!PEWriteNVRAMProperty(SYSTEM_NVRAM_PREFIX "recovery-boot-mode", boot_mode,
+ (const unsigned int) strlen(boot_mode))) {
+ IOLog("Failed to write recovery-boot-mode to NVRAM.\n");
+ }
+ } else if (mode == BSD_BOOTFAIL_MEDIA_MISSING) {
+ const char *boot_picker_reason = "missing-boot-media";
+
+ // Set `boot-picker-bringup-reason = missing-boot-media`.
+ if (!PEWriteNVRAMProperty(SYSTEM_NVRAM_PREFIX "boot-picker-bringup-reason",
+ boot_picker_reason, (const unsigned int) strlen(boot_picker_reason))) {
+ IOLog("Failed to write boot-picker-bringup-reason to NVRAM.\n");
+ }
+
+ // Set `boot-command = recover`.
+
+ // Construct an OSSymbol and an OSString to be the (key, value) pair
+ // we write to NVRAM. Unfortunately, since our value must be an OSString
+ // instead of an OSData, we cannot use PEWriteNVRAMProperty() here.
+ boot_command_sym = OSSymbol::withCStringNoCopy(SYSTEM_NVRAM_PREFIX "boot-command");
+ boot_command_recover = OSString::withCStringNoCopy("recover");
+ if (boot_command_sym == NULL || boot_command_recover == NULL) {
+ IOLog("Failed to create boot-command strings.\n");
+ goto do_reboot;
+ }
+
+ // Wait for NVRAM to be readable...
+ nvram = OSDynamicCast(IODTNVRAM, IOService::waitForService(
+ IOService::serviceMatching("IODTNVRAM")));
+ if (nvram == NULL) {
+ IOLog("Failed to acquire IODTNVRAM object.\n");
+ goto do_reboot;
+ }
+
+ // Wait for NVRAM to be writable...
+ if (!IOServiceWaitForMatchingResource("IONVRAM", UINT64_MAX)) {
+ IOLog("Failed to wait for IONVRAM service.\n");
+ // attempt the work anyway...
+ }
+
+ // Write the new boot-command to NVRAM, and sync if successful.
+ if (!nvram->setProperty(boot_command_sym, boot_command_recover)) {
+ IOLog("Failed to save new boot-command to NVRAM.\n");
} else {
- uuidStr = NULL;
+ nvram->sync();
}
- }
- regEntry->release();
+ } else {
+ IOLog("Unknown mode: %d\n", mode);
+ return false;
+ }
+
+ // Clean up and reboot!
+do_reboot:
+ if (nvram != NULL) {
+ nvram->release();
+ }
+
+ if (boot_command_recover != NULL) {
+ boot_command_recover->release();
+ }
+
+ if (boot_command_sym != NULL) {
+ boot_command_sym->release();
+ }
+
+ if (reboot) {
+ IOLog("\nAbout to reboot into Recovery!\n");
+ (void)PEHaltRestart(kPERestartCPU);
+ }
+
+ return true;
+}
+
+kern_return_t
+IOFindBSDRoot( char * rootName, unsigned int rootNameSize,
+ dev_t * root, u_int32_t * oflags )
+{
+ mach_timespec_t t;
+ IOService * service;
+ IORegistryEntry * regEntry;
+ OSDictionary * matching = NULL;
+ OSString * iostr;
+ OSNumber * off;
+ OSData * data = NULL;
+
+ UInt32 flags = 0;
+ int mnr, mjr;
+ const char * mediaProperty = NULL;
+ char * rdBootVar;
+ char * str;
+ const char * look = NULL;
+ int len;
+ bool debugInfoPrintedOnce = false;
+ bool needNetworkKexts = false;
+ const char * uuidStr = NULL;
+
+ static int mountAttempts = 0;
+
+ int xchar, dchar;
+
+ // stall here for anyone matching on the IOBSD resource to finish (filesystems)
+ matching = IOService::serviceMatching(gIOResourcesKey);
+ assert(matching);
+ matching->setObject(gIOResourceMatchedKey, gIOBSDKey);
+
+ if ((service = IOService::waitForMatchingService(matching, 30ULL * kSecondScale))) {
+ service->release();
+ } else {
+ IOLog("!BSD\n");
+ }
+ matching->release();
+ matching = NULL;
+
+ if (mountAttempts++) {
+ IOLog("mount(%d) failed\n", mountAttempts);
+ IOSleep( 5 * 1000 );
+ }
+
+ str = (char *) IOMalloc( kMaxPathBuf + kMaxBootVar );
+ if (!str) {
+ return kIOReturnNoMemory;
+ }
+ rdBootVar = str + kMaxPathBuf;
+
+ if (!PE_parse_boot_argn("rd", rdBootVar, kMaxBootVar )
+ && !PE_parse_boot_argn("rootdev", rdBootVar, kMaxBootVar )) {
+ rdBootVar[0] = 0;
}
- } while( false );
+
+ do {
+ if ((regEntry = IORegistryEntry::fromPath( "/chosen", gIODTPlane ))) {
+ di_root_ramfile(regEntry);
+ data = OSDynamicCast(OSData, regEntry->getProperty( "root-matching" ));
+ if (data) {
+ matching = OSDynamicCast(OSDictionary, OSUnserializeXML((char *)data->getBytesNoCopy()));
+ if (matching) {
+ continue;
+ }
+ }
+
+ data = (OSData *) regEntry->getProperty( "boot-uuid" );
+ if (data) {
+ uuidStr = (const char*)data->getBytesNoCopy();
+ OSString *uuidString = OSString::withCString( uuidStr );
+
+ // match the boot-args boot-uuid processing below
+ if (uuidString) {
+ IOLog("rooting via boot-uuid from /chosen: %s\n", uuidStr);
+ IOService::publishResource( "boot-uuid", uuidString );
+ uuidString->release();
+ matching = IOUUIDMatching();
+ mediaProperty = "boot-uuid-media";
+ regEntry->release();
+ continue;
+ } else {
+ uuidStr = NULL;
+ }
+ }
+ regEntry->release();
+ }
+ } while (false);
//
// See if we have a RAMDisk property in /chosen/memory-map. If so, make it into a device.
-// It will become /dev/mdx, where x is 0-f.
+// It will become /dev/mdx, where x is 0-f.
//
- if(!didRam) { /* Have we already build this ram disk? */
- didRam = 1; /* Remember we did this */
- if((regEntry = IORegistryEntry::fromPath( "/chosen/memory-map", gIODTPlane ))) { /* Find the map node */
- data = (OSData *)regEntry->getProperty("RAMDisk"); /* Find the ram disk, if there */
- if(data) { /* We found one */
- UInt32 *ramdParms = 0;
- ramdParms = (UInt32 *)data->getBytesNoCopy(); /* Point to the ram disk base and size */
- (void)mdevadd(-1, ml_static_ptovirt(ramdParms[0]) >> 12, ramdParms[1] >> 12, 0); /* Initialize it and pass back the device number */
+ if (!didRam) { /* Have we already build this ram disk? */
+ didRam = 1; /* Remember we did this */
+ if ((regEntry = IORegistryEntry::fromPath( "/chosen/memory-map", gIODTPlane ))) { /* Find the map node */
+ data = (OSData *)regEntry->getProperty("RAMDisk"); /* Find the ram disk, if there */
+ if (data) { /* We found one */
+ uintptr_t *ramdParms;
+ ramdParms = (uintptr_t *)data->getBytesNoCopy(); /* Point to the ram disk base and size */
+#if __LP64__
+#define MAX_PHYS_RAM (((uint64_t)UINT_MAX) << 12)
+ if (ramdParms[1] > MAX_PHYS_RAM) {
+ panic("ramdisk params");
+ }
+#endif /* __LP64__ */
+ (void)mdevadd(-1, ml_static_ptovirt(ramdParms[0]) >> 12, (unsigned int) (ramdParms[1] >> 12), 0); /* Initialize it and pass back the device number */
}
- regEntry->release(); /* Toss the entry */
+ regEntry->release(); /* Toss the entry */
}
}
-
+
//
// Now check if we are trying to root on a memory device
//
- if((rdBootVar[0] == 'm') && (rdBootVar[1] == 'd') && (rdBootVar[3] == 0)) {
- dchar = xchar = rdBootVar[2]; /* Get the actual device */
- if((xchar >= '0') && (xchar <= '9')) xchar = xchar - '0'; /* If digit, convert */
- else {
- xchar = xchar & ~' '; /* Fold to upper case */
- if((xchar >= 'A') && (xchar <= 'F')) { /* Is this a valid digit? */
- xchar = (xchar & 0xF) + 9; /* Convert the hex digit */
- dchar = dchar | ' '; /* Fold to lower case */
+ if ((rdBootVar[0] == 'm') && (rdBootVar[1] == 'd') && (rdBootVar[3] == 0)) {
+ dchar = xchar = rdBootVar[2]; /* Get the actual device */
+ if ((xchar >= '0') && (xchar <= '9')) {
+ xchar = xchar - '0'; /* If digit, convert */
+ } else {
+ xchar = xchar & ~' '; /* Fold to upper case */
+ if ((xchar >= 'A') && (xchar <= 'F')) { /* Is this a valid digit? */
+ xchar = (xchar & 0xF) + 9; /* Convert the hex digit */
+ dchar = dchar | ' '; /* Fold to lower case */
+ } else {
+ xchar = -1; /* Show bogus */
}
- else xchar = -1; /* Show bogus */
}
- if(xchar >= 0) { /* Do we have a valid memory device name? */
- *root = mdevlookup(xchar); /* Find the device number */
- if(*root >= 0) { /* Did we find one? */
-
- rootName[0] = 'm'; /* Build root name */
- rootName[1] = 'd'; /* Build root name */
- rootName[2] = dchar; /* Build root name */
- rootName[3] = 0; /* Build root name */
+ if (xchar >= 0) { /* Do we have a valid memory device name? */
+ *root = mdevlookup(xchar); /* Find the device number */
+ if (*root >= 0) { /* Did we find one? */
+ rootName[0] = 'm'; /* Build root name */
+ rootName[1] = 'd'; /* Build root name */
+ rootName[2] = (char) dchar; /* Build root name */
+ rootName[3] = 0; /* Build root name */
IOLog("BSD root: %s, major %d, minor %d\n", rootName, major(*root), minor(*root));
- *oflags = 0; /* Show that this is not network */
- goto iofrootx; /* Join common exit... */
+ *oflags = 0; /* Show that this is not network */
+
+#if CONFIG_KDP_INTERACTIVE_DEBUGGING
+ /* retrieve final ramdisk range and initialize KDP variables */
+ if (mdevgetrange(xchar, &kdp_core_ramdisk_addr, &kdp_core_ramdisk_size) != 0) {
+ IOLog("Unable to retrieve range for root memory device %d\n", xchar);
+ kdp_core_ramdisk_addr = 0;
+ kdp_core_ramdisk_size = 0;
+ }
+#endif
+
+ goto iofrootx; /* Join common exit... */
+ }
+ panic("IOFindBSDRoot: specified root memory device, %s, has not been configured\n", rdBootVar); /* Not there */
+ }
+ }
+
+ if ((!matching) && rdBootVar[0]) {
+ // by BSD name
+ look = rdBootVar;
+ if (look[0] == '*') {
+ look++;
+ }
+
+ if (strncmp( look, "en", strlen( "en" )) == 0) {
+ matching = IONetworkNamePrefixMatching( "en" );
+ needNetworkKexts = true;
+ } else if (strncmp( look, "uuid", strlen( "uuid" )) == 0) {
+ char *uuid;
+ OSString *uuidString;
+
+ uuid = (char *)IOMalloc( kMaxBootVar );
+
+ if (uuid) {
+ if (!PE_parse_boot_argn( "boot-uuid", uuid, kMaxBootVar )) {
+ panic( "rd=uuid but no boot-uuid=<value> specified" );
+ }
+ uuidString = OSString::withCString( uuid );
+ if (uuidString) {
+ IOService::publishResource( "boot-uuid", uuidString );
+ uuidString->release();
+ IOLog( "\nWaiting for boot volume with UUID %s\n", uuid );
+ matching = IOUUIDMatching();
+ mediaProperty = "boot-uuid-media";
+ }
+ IOFree( uuid, kMaxBootVar );
+ }
+ } else {
+ matching = IOBSDNameMatching( look );
+ }
+ }
+
+ if (!matching) {
+ OSString * astring;
+ // Match any HFS media
+
+ matching = IOService::serviceMatching( "IOMedia" );
+ astring = OSString::withCStringNoCopy("Apple_HFS");
+ if (astring) {
+ matching->setObject("Content", astring);
+ astring->release();
+ }
+ }
+
+ if (gIOKitDebug & kIOWaitQuietBeforeRoot) {
+ IOLog( "Waiting for matching to complete\n" );
+ IOService::getPlatform()->waitQuiet();
+ }
+
+ if (true && matching) {
+ OSSerialize * s = OSSerialize::withCapacity( 5 );
+
+ if (matching->serialize( s )) {
+ IOLog( "Waiting on %s\n", s->text());
+ s->release();
+ }
+ }
+
+ char namep[8];
+ if (needNetworkKexts
+ || PE_parse_boot_argn("-s", namep, sizeof(namep))) {
+ IOService::startDeferredMatches();
+ }
+
+ do {
+ t.tv_sec = ROOTDEVICETIMEOUT;
+ t.tv_nsec = 0;
+ matching->retain();
+ service = IOService::waitForService( matching, &t );
+ if ((!service) || (mountAttempts == 10)) {
+#if !XNU_TARGET_OS_OSX || !defined(__arm64__)
+ PE_display_icon( 0, "noroot");
+ IOLog( "Still waiting for root device\n" );
+#endif
+
+ if (!debugInfoPrintedOnce) {
+ debugInfoPrintedOnce = true;
+ if (gIOKitDebug & kIOLogDTree) {
+ IOLog("\nDT plane:\n");
+ IOPrintPlane( gIODTPlane );
+ }
+ if (gIOKitDebug & kIOLogServiceTree) {
+ IOLog("\nService plane:\n");
+ IOPrintPlane( gIOServicePlane );
+ }
+ if (gIOKitDebug & kIOLogMemory) {
+ IOPrintMemory();
+ }
}
- panic("IOFindBSDRoot: specified root memory device, %s, has not been configured\n", rdBootVar); /* Not there */
- }
- }
-
- if( (!matching) && rdBootVar[0] ) {
- // by BSD name
- look = rdBootVar;
- if( look[0] == '*')
- look++;
-
- if ( strncmp( look, "en", strlen( "en" )) == 0 ) {
- matching = IONetworkNamePrefixMatching( "en" );
- } else if ( strncmp( look, "uuid", strlen( "uuid" )) == 0 ) {
- char *uuid;
- OSString *uuidString;
-
- uuid = (char *)IOMalloc( kMaxBootVar );
-
- if ( uuid ) {
- if (!PE_parse_boot_argn( "boot-uuid", uuid, kMaxBootVar )) {
- panic( "rd=uuid but no boot-uuid=<value> specified" );
- }
- uuidString = OSString::withCString( uuid );
- if ( uuidString ) {
- IOService::publishResource( "boot-uuid", uuidString );
- uuidString->release();
- IOLog( "\nWaiting for boot volume with UUID %s\n", uuid );
- matching = IOUUIDMatching();
- mediaProperty = "boot-uuid-media";
- }
- IOFree( uuid, kMaxBootVar );
- }
+
+#if XNU_TARGET_OS_OSX && defined(__arm64__)
+ // The disk isn't found - have the user pick from recoveryOS+.
+ (void)IOSetRecoveryBoot(BSD_BOOTFAIL_MEDIA_MISSING, NULL, true);
+#endif
+ }
+ } while (!service);
+ matching->release();
+
+ if (service && mediaProperty) {
+ service = (IOService *)service->getProperty(mediaProperty);
+ }
+
+ mjr = 0;
+ mnr = 0;
+
+ // If the IOService we matched to is a subclass of IONetworkInterface,
+ // then make sure it has been registered with BSD and has a BSD name
+ // assigned.
+
+ if (service
+ && service->metaCast( "IONetworkInterface" )
+ && !IORegisterNetworkInterface( service )) {
+ service = NULL;
+ }
+
+ if (service) {
+ len = kMaxPathBuf;
+ service->getPath( str, &len, gIOServicePlane );
+ IOLog( "Got boot device = %s\n", str );
+
+ iostr = (OSString *) service->getProperty( kIOBSDNameKey );
+ if (iostr) {
+ strlcpy( rootName, iostr->getCStringNoCopy(), rootNameSize );
+ }
+ off = (OSNumber *) service->getProperty( kIOBSDMajorKey );
+ if (off) {
+ mjr = off->unsigned32BitValue();
+ }
+ off = (OSNumber *) service->getProperty( kIOBSDMinorKey );
+ if (off) {
+ mnr = off->unsigned32BitValue();
+ }
+
+ if (service->metaCast( "IONetworkInterface" )) {
+ flags |= 1;
+ }
+ } else {
+ IOLog( "Wait for root failed\n" );
+ strlcpy( rootName, "en0", rootNameSize );
+ flags |= 1;
+ }
+
+ IOLog( "BSD root: %s", rootName );
+ if (mjr) {
+ IOLog(", major %d, minor %d\n", mjr, mnr );
} else {
- matching = IOBSDNameMatching( look );
- }
- }
-
- if( !matching) {
- OSString * astring;
- // Match any HFS media
-
- matching = IOService::serviceMatching( "IOMedia" );
- astring = OSString::withCStringNoCopy("Apple_HFS");
- if ( astring ) {
- matching->setObject("Content", astring);
- astring->release();
- }
- }
-
- if( true && matching) {
- OSSerialize * s = OSSerialize::withCapacity( 5 );
-
- if( matching->serialize( s )) {
- IOLog( "Waiting on %s\n", s->text() );
- s->release();
- }
- }
-
- do {
- t.tv_sec = ROOTDEVICETIMEOUT;
- t.tv_nsec = 0;
- matching->retain();
- service = IOService::waitForService( matching, &t );
- if( (!service) || (mountAttempts == 10)) {
- PE_display_icon( 0, "noroot");
- IOLog( "Still waiting for root device\n" );
-
- if( !debugInfoPrintedOnce) {
- debugInfoPrintedOnce = true;
- if( gIOKitDebug & kIOLogDTree) {
- IOLog("\nDT plane:\n");
- IOPrintPlane( gIODTPlane );
- }
- if( gIOKitDebug & kIOLogServiceTree) {
- IOLog("\nService plane:\n");
- IOPrintPlane( gIOServicePlane );
- }
- if( gIOKitDebug & kIOLogMemory)
- IOPrintMemory();
- }
- }
- } while( !service);
- matching->release();
-
- if ( service && mediaProperty ) {
- service = (IOService *)service->getProperty(mediaProperty);
- }
-
- mjr = 0;
- mnr = 0;
-
- // If the IOService we matched to is a subclass of IONetworkInterface,
- // then make sure it has been registered with BSD and has a BSD name
- // assigned.
-
- if ( service
- && service->metaCast( "IONetworkInterface" )
- && !IORegisterNetworkInterface( service ) )
- {
- service = 0;
- }
-
- if( service) {
-
- len = kMaxPathBuf;
- service->getPath( str, &len, gIOServicePlane );
- IOLog( "Got boot device = %s\n", str );
-
- iostr = (OSString *) service->getProperty( kIOBSDNameKey );
- if( iostr)
- strlcpy( rootName, iostr->getCStringNoCopy(), rootNameSize );
- off = (OSNumber *) service->getProperty( kIOBSDMajorKey );
- if( off)
- mjr = off->unsigned32BitValue();
- off = (OSNumber *) service->getProperty( kIOBSDMinorKey );
- if( off)
- mnr = off->unsigned32BitValue();
-
- if( service->metaCast( "IONetworkInterface" ))
- flags |= 1;
-
- } else {
-
- IOLog( "Wait for root failed\n" );
- strlcpy( rootName, "en0", rootNameSize );
- flags |= 1;
- }
-
- IOLog( "BSD root: %s", rootName );
- if( mjr)
- IOLog(", major %d, minor %d\n", mjr, mnr );
- else
- IOLog("\n");
-
- *root = makedev( mjr, mnr );
- *oflags = flags;
-
- IOFree( str, kMaxPathBuf + kMaxBootVar );
+ IOLog("\n");
+ }
+
+ *root = makedev( mjr, mnr );
+ *oflags = flags;
+
+ IOFree( str, kMaxPathBuf + kMaxBootVar );
iofrootx:
- if( (gIOKitDebug & (kIOLogDTree | kIOLogServiceTree | kIOLogMemory)) && !debugInfoPrintedOnce) {
-
- IOService::getPlatform()->waitQuiet();
- if( gIOKitDebug & kIOLogDTree) {
- IOLog("\nDT plane:\n");
- IOPrintPlane( gIODTPlane );
- }
- if( gIOKitDebug & kIOLogServiceTree) {
- IOLog("\nService plane:\n");
- IOPrintPlane( gIOServicePlane );
- }
- if( gIOKitDebug & kIOLogMemory)
- IOPrintMemory();
- }
-
- return( kIOReturnSuccess );
+ if ((gIOKitDebug & (kIOLogDTree | kIOLogServiceTree | kIOLogMemory)) && !debugInfoPrintedOnce) {
+ IOService::getPlatform()->waitQuiet();
+ if (gIOKitDebug & kIOLogDTree) {
+ IOLog("\nDT plane:\n");
+ IOPrintPlane( gIODTPlane );
+ }
+ if (gIOKitDebug & kIOLogServiceTree) {
+ IOLog("\nService plane:\n");
+ IOPrintPlane( gIOServicePlane );
+ }
+ if (gIOKitDebug & kIOLogMemory) {
+ IOPrintMemory();
+ }
+ }
+
+ return kIOReturnSuccess;
}
-void IOSecureBSDRoot(const char * rootName)
+bool
+IORamDiskBSDRoot(void)
{
-#if CONFIG_EMBEDDED
- IOReturn result;
- IOPlatformExpert *pe;
- const OSSymbol *functionName = OSSymbol::withCStringNoCopy("SecureRootName");
-
- while ((pe = IOService::getPlatform()) == 0) IOSleep(1 * 1000);
-
- // Returns kIOReturnNotPrivileged is the root device is not secure.
- // Returns kIOReturnUnsupported if "SecureRootName" is not implemented.
- result = pe->callPlatformFunction(functionName, false, (void *)rootName, (void *)0, (void *)0, (void *)0);
-
- functionName->release();
-
- if (result == kIOReturnNotPrivileged) mdevremoveall();
-#endif
+ char rdBootVar[kMaxBootVar];
+ if (PE_parse_boot_argn("rd", rdBootVar, kMaxBootVar )
+ || PE_parse_boot_argn("rootdev", rdBootVar, kMaxBootVar )) {
+ if ((rdBootVar[0] == 'm') && (rdBootVar[1] == 'd') && (rdBootVar[3] == 0)) {
+ return true;
+ }
+ }
+ return false;
+}
+
+void
+IOSecureBSDRoot(const char * rootName)
+{
+#if CONFIG_SECURE_BSD_ROOT
+ IOReturn result;
+ IOPlatformExpert *pe;
+ OSDictionary *matching;
+ const OSSymbol *functionName = OSSymbol::withCStringNoCopy("SecureRootName");
+
+ matching = IOService::serviceMatching("IOPlatformExpert");
+ assert(matching);
+ pe = (IOPlatformExpert *) IOService::waitForMatchingService(matching, 30ULL * kSecondScale);
+ matching->release();
+ assert(pe);
+ // Returns kIOReturnNotPrivileged is the root device is not secure.
+ // Returns kIOReturnUnsupported if "SecureRootName" is not implemented.
+ result = pe->callPlatformFunction(functionName, false, (void *)rootName, (void *)NULL, (void *)NULL, (void *)NULL);
+ functionName->release();
+ OSSafeReleaseNULL(pe);
+
+ if (result == kIOReturnNotPrivileged) {
+ mdevremoveall();
+ }
+
+#endif // CONFIG_SECURE_BSD_ROOT
}
void *
IOBSDRegistryEntryForDeviceTree(char * path)
{
- return (IORegistryEntry::fromPath(path, gIODTPlane));
+ return IORegistryEntry::fromPath(path, gIODTPlane);
}
void
IOBSDRegistryEntryRelease(void * entry)
{
- IORegistryEntry * regEntry = (IORegistryEntry *)entry;
+ IORegistryEntry * regEntry = (IORegistryEntry *)entry;
- if (regEntry)
- regEntry->release();
- return;
+ if (regEntry) {
+ regEntry->release();
+ }
+ return;
}
const void *
-IOBSDRegistryEntryGetData(void * entry, char * property_name,
- int * packet_length)
+IOBSDRegistryEntryGetData(void * entry, char * property_name,
+ int * packet_length)
{
- OSData * data;
- IORegistryEntry * regEntry = (IORegistryEntry *)entry;
-
- data = (OSData *) regEntry->getProperty(property_name);
- if (data) {
- *packet_length = data->getLength();
- return (data->getBytesNoCopy());
- }
- return (NULL);
+ OSData * data;
+ IORegistryEntry * regEntry = (IORegistryEntry *)entry;
+
+ data = (OSData *) regEntry->getProperty(property_name);
+ if (data) {
+ *packet_length = data->getLength();
+ return data->getBytesNoCopy();
+ }
+ return NULL;
}
-kern_return_t IOBSDGetPlatformUUID( uuid_t uuid, mach_timespec_t timeout )
+kern_return_t
+IOBSDGetPlatformUUID( uuid_t uuid, mach_timespec_t timeout )
{
- IOService * resources;
- OSString * string;
+ IOService * resources;
+ OSString * string;
- resources = IOService::waitForService( IOService::resourceMatching( kIOPlatformUUIDKey ), ( timeout.tv_sec || timeout.tv_nsec ) ? &timeout : 0 );
- if ( resources == 0 ) return KERN_OPERATION_TIMED_OUT;
+ resources = IOService::waitForService( IOService::resourceMatching( kIOPlatformUUIDKey ), (timeout.tv_sec || timeout.tv_nsec) ? &timeout : NULL );
+ if (resources == NULL) {
+ return KERN_OPERATION_TIMED_OUT;
+ }
- string = ( OSString * ) IOService::getPlatform( )->getProvider( )->getProperty( kIOPlatformUUIDKey );
- if ( string == 0 ) return KERN_NOT_SUPPORTED;
+ string = (OSString *) IOService::getPlatform()->getProvider()->getProperty( kIOPlatformUUIDKey );
+ if (string == NULL) {
+ return KERN_NOT_SUPPORTED;
+ }
- uuid_parse( string->getCStringNoCopy( ), uuid );
+ uuid_parse( string->getCStringNoCopy(), uuid );
- return KERN_SUCCESS;
+ return KERN_SUCCESS;
}
+} /* extern "C" */
+
+/* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
+
+#include <sys/conf.h>
+#include <sys/vnode.h>
+#include <sys/vnode_internal.h>
+#include <sys/fcntl.h>
+#include <IOKit/IOPolledInterface.h>
+#include <IOKit/IOBufferMemoryDescriptor.h>
+
+IOPolledFileIOVars * gIOPolledCoreFileVars;
+kern_return_t gIOPolledCoreFileOpenRet = kIOReturnNotReady;
+IOPolledCoreFileMode_t gIOPolledCoreFileMode = kIOPolledCoreFileModeNotInitialized;
+
+#if IOPOLLED_COREFILE
+
+#if defined(XNU_TARGET_OS_BRIDGE)
+// On bridgeOS allocate a 150MB corefile and leave 150MB free
+#define kIOCoreDumpSize 150ULL*1024ULL*1024ULL
+#define kIOCoreDumpFreeSize 150ULL*1024ULL*1024ULL
+
+#elif !defined(XNU_TARGET_OS_OSX) /* defined(XNU_TARGET_OS_BRIDGE) */
+// On embedded devices with >3GB DRAM we allocate a 500MB corefile
+// otherwise allocate a 350MB corefile. Leave 350 MB free
+
+#define kIOCoreDumpMinSize 350ULL*1024ULL*1024ULL
+#define kIOCoreDumpLargeSize 500ULL*1024ULL*1024ULL
+
+#define kIOCoreDumpFreeSize 350ULL*1024ULL*1024ULL
+
+#else /* defined(XNU_TARGET_OS_BRIDGE) */
+// on macOS devices allocate a corefile sized at 1GB / 32GB of DRAM,
+// fallback to a 1GB corefile and leave at least 1GB free
+#define kIOCoreDumpMinSize 1024ULL*1024ULL*1024ULL
+#define kIOCoreDumpIncrementalSize 1024ULL*1024ULL*1024ULL
+
+#define kIOCoreDumpFreeSize 1024ULL*1024ULL*1024ULL
+
+// on older macOS devices we allocate a 1MB file at boot
+// to store a panic time stackshot
+#define kIOStackshotFileSize 1024ULL*1024ULL
+
+#endif /* defined(XNU_TARGET_OS_BRIDGE) */
-kern_return_t IOBSDGetPlatformSerialNumber( char *serial_number_str, u_int32_t len )
+static IOPolledCoreFileMode_t
+GetCoreFileMode()
{
- OSDictionary * platform_dict;
- IOService *platform;
- OSString * string;
-
- if (len < 1) {
- return 0;
- }
- serial_number_str[0] = '\0';
-
- platform_dict = IOService::serviceMatching( "IOPlatformExpertDevice" );
- if (platform_dict == NULL) {
- return KERN_NOT_SUPPORTED;
- }
-
- platform = IOService::waitForService( platform_dict );
- if (platform) {
- string = ( OSString * ) platform->getProperty( kIOPlatformSerialNumberKey );
- if ( string == 0 ) {
- return KERN_NOT_SUPPORTED;
- } else {
- strlcpy( serial_number_str, string->getCStringNoCopy( ), len );
- }
- }
-
- return KERN_SUCCESS;
+ if (on_device_corefile_enabled()) {
+ return kIOPolledCoreFileModeCoredump;
+ } else if (panic_stackshot_to_disk_enabled()) {
+ return kIOPolledCoreFileModeStackshot;
+ } else {
+ return kIOPolledCoreFileModeDisabled;
+ }
}
-dev_t IOBSDGetMediaWithUUID( const char *uuid_cstring, char *bsd_name, int bsd_name_len, int timeout)
+static void
+IOCoreFileGetSize(uint64_t *ideal_size, uint64_t *fallback_size, uint64_t *free_space_to_leave, IOPolledCoreFileMode_t mode)
{
- dev_t dev = 0;
- OSDictionary *dictionary;
- OSString *uuid_string;
-
- if (bsd_name_len < 1) {
- return 0;
- }
- bsd_name[0] = '\0';
-
- dictionary = IOService::serviceMatching( "IOMedia" );
- if( dictionary ) {
- uuid_string = OSString::withCString( uuid_cstring );
- if( uuid_string ) {
- IOService *service;
- mach_timespec_t tv = { timeout, 0 }; // wait up to "timeout" seconds for the device
-
- dictionary->setObject( "UUID", uuid_string );
- dictionary->retain();
- service = IOService::waitForService( dictionary, &tv );
- if( service ) {
- OSNumber *dev_major = (OSNumber *) service->getProperty( kIOBSDMajorKey );
- OSNumber *dev_minor = (OSNumber *) service->getProperty( kIOBSDMinorKey );
- OSString *iostr = (OSString *) service->getProperty( kIOBSDNameKey );
-
- if( iostr)
- strlcpy( bsd_name, iostr->getCStringNoCopy(), bsd_name_len );
-
- if ( dev_major && dev_minor )
- dev = makedev( dev_major->unsigned32BitValue(), dev_minor->unsigned32BitValue() );
- }
- uuid_string->release();
- }
- dictionary->release();
- }
-
- return dev;
+ unsigned int requested_corefile_size = 0;
+
+ *ideal_size = *fallback_size = *free_space_to_leave = 0;
+
+#if defined(XNU_TARGET_OS_BRIDGE)
+#pragma unused(mode)
+ *ideal_size = *fallback_size = kIOCoreDumpSize;
+ *free_space_to_leave = kIOCoreDumpFreeSize;
+#elif !defined(XNU_TARGET_OS_OSX) /* defined(XNU_TARGET_OS_BRIDGE) */
+#pragma unused(mode)
+ *ideal_size = *fallback_size = kIOCoreDumpMinSize;
+
+ if (max_mem > (3 * 1024ULL * 1024ULL * 1024ULL)) {
+ *ideal_size = kIOCoreDumpLargeSize;
+ }
+
+ *free_space_to_leave = kIOCoreDumpFreeSize;
+#else /* defined(XNU_TARGET_OS_BRIDGE) */
+ if (mode == kIOPolledCoreFileModeCoredump) {
+ *ideal_size = *fallback_size = kIOCoreDumpMinSize;
+ if (kIOCoreDumpIncrementalSize != 0 && max_mem > (32 * 1024ULL * 1024ULL * 1024ULL)) {
+ *ideal_size = ((ROUNDUP(max_mem, (32 * 1024ULL * 1024ULL * 1024ULL)) / (32 * 1024ULL * 1024ULL * 1024ULL)) * kIOCoreDumpIncrementalSize);
+ }
+ *free_space_to_leave = kIOCoreDumpFreeSize;
+ } else if (mode == kIOPolledCoreFileModeStackshot) {
+ *ideal_size = *fallback_size = *free_space_to_leave = kIOStackshotFileSize;
+ }
+#endif /* defined(XNU_TARGET_OS_BRIDGE) */
+ // If a custom size was requested, override the ideal and requested sizes
+ if (PE_parse_boot_argn("corefile_size_mb", &requested_corefile_size, sizeof(requested_corefile_size))) {
+ IOLog("Boot-args specify %d MB kernel corefile\n", requested_corefile_size);
+
+ *ideal_size = *fallback_size = (requested_corefile_size * 1024ULL * 1024ULL);
+ }
+
+ return;
}
+static void
+IOOpenPolledCoreFile(thread_call_param_t __unused, thread_call_param_t corefilename)
+{
+ assert(corefilename != NULL);
+
+ IOReturn err;
+ char *filename = (char *) corefilename;
+ uint64_t corefile_size_bytes = 0, corefile_fallback_size_bytes = 0, free_space_to_leave_bytes = 0;
+ IOPolledCoreFileMode_t mode_to_init = GetCoreFileMode();
-void IOBSDIterateMediaWithContent(const char *content_uuid_cstring, int (*func)(const char *bsd_dev_name, const char *uuid_str, void *arg), void *arg)
+ if (gIOPolledCoreFileVars) {
+ return;
+ }
+ if (!IOPolledInterface::gMetaClass.getInstanceCount()) {
+ return;
+ }
+
+ if (mode_to_init == kIOPolledCoreFileModeDisabled) {
+ gIOPolledCoreFileMode = kIOPolledCoreFileModeDisabled;
+ return;
+ }
+
+ // We'll overwrite this once we open the file, we update this to mark that we have made
+ // it past initialization
+ gIOPolledCoreFileMode = kIOPolledCoreFileModeClosed;
+
+ IOCoreFileGetSize(&corefile_size_bytes, &corefile_fallback_size_bytes, &free_space_to_leave_bytes, mode_to_init);
+
+ do {
+ err = IOPolledFileOpen(filename, kIOPolledFileCreate, corefile_size_bytes, free_space_to_leave_bytes,
+ NULL, 0, &gIOPolledCoreFileVars, NULL, NULL, NULL);
+ if (kIOReturnSuccess == err) {
+ break;
+ } else if (kIOReturnNoSpace == err) {
+ IOLog("Failed to open corefile of size %llu MB (low disk space)",
+ (corefile_size_bytes / (1024ULL * 1024ULL)));
+ if (corefile_size_bytes == corefile_fallback_size_bytes) {
+ gIOPolledCoreFileOpenRet = err;
+ return;
+ }
+ } else {
+ IOLog("Failed to open corefile of size %llu MB (returned error 0x%x)\n",
+ (corefile_size_bytes / (1024ULL * 1024ULL)), err);
+ gIOPolledCoreFileOpenRet = err;
+ return;
+ }
+
+ err = IOPolledFileOpen(filename, kIOPolledFileCreate, corefile_fallback_size_bytes, free_space_to_leave_bytes,
+ NULL, 0, &gIOPolledCoreFileVars, NULL, NULL, NULL);
+ if (kIOReturnSuccess != err) {
+ IOLog("Failed to open corefile of size %llu MB (returned error 0x%x)\n",
+ (corefile_fallback_size_bytes / (1024ULL * 1024ULL)), err);
+ gIOPolledCoreFileOpenRet = err;
+ return;
+ }
+ } while (false);
+
+ gIOPolledCoreFileOpenRet = IOPolledFilePollersSetup(gIOPolledCoreFileVars, kIOPolledPreflightCoreDumpState);
+ if (kIOReturnSuccess != gIOPolledCoreFileOpenRet) {
+ IOPolledFileClose(&gIOPolledCoreFileVars, 0, NULL, 0, 0, 0);
+ IOLog("IOPolledFilePollersSetup for corefile failed with error: 0x%x\n", err);
+ } else {
+ IOLog("Opened corefile of size %llu MB\n", (corefile_size_bytes / (1024ULL * 1024ULL)));
+ gIOPolledCoreFileMode = mode_to_init;
+ }
+
+ return;
+}
+
+static void
+IOClosePolledCoreFile(void)
{
- OSDictionary *dictionary;
- OSString *content_uuid_string;
-
- dictionary = IOService::serviceMatching( "IOMedia" );
- if( dictionary ) {
- content_uuid_string = OSString::withCString( content_uuid_cstring );
- if( content_uuid_string ) {
- IOService *service;
- OSIterator *iter;
-
- dictionary->setObject( "Content", content_uuid_string );
- dictionary->retain();
-
- iter = IOService::getMatchingServices(dictionary);
- while (iter && (service = (IOService *)iter->getNextObject())) {
- if( service ) {
- OSString *iostr = (OSString *) service->getProperty( kIOBSDNameKey );
- OSString *uuidstr = (OSString *) service->getProperty( "UUID" );
- const char *uuid;
-
- if( iostr) {
- if (uuidstr) {
- uuid = uuidstr->getCStringNoCopy();
- } else {
- uuid = "00000000-0000-0000-0000-000000000000";
- }
-
- // call the callback
- if (func && func(iostr->getCStringNoCopy(), uuid, arg) == 0) {
- break;
- }
- }
- }
- }
- if (iter)
- iter->release();
-
- content_uuid_string->release();
- }
- dictionary->release();
- }
+ gIOPolledCoreFileOpenRet = kIOReturnNotOpen;
+ gIOPolledCoreFileMode = kIOPolledCoreFileModeClosed;
+ IOPolledFilePollersClose(gIOPolledCoreFileVars, kIOPolledPostflightCoreDumpState);
+ IOPolledFileClose(&gIOPolledCoreFileVars, 0, NULL, 0, 0, 0);
}
+#endif /* IOPOLLED_COREFILE */
-int IOBSDIsMediaEjectable( const char *cdev_name )
+extern "C" void
+IOBSDMountChange(struct mount * mp, uint32_t op)
{
- int ret = 0;
- OSDictionary *dictionary;
- OSString *dev_name;
-
- if (strncmp(cdev_name, "/dev/", 5) == 0) {
- cdev_name += 5;
- }
+#if IOPOLLED_COREFILE
+ uint64_t flags;
+ char path[128];
+ int pathLen;
+ vnode_t vn;
+ int result;
+
+ switch (op) {
+ case kIOMountChangeMount:
+ case kIOMountChangeDidResize:
+
+ if (gIOPolledCoreFileVars) {
+ break;
+ }
+ flags = vfs_flags(mp);
+ if (MNT_RDONLY & flags) {
+ break;
+ }
+ if (!(MNT_LOCAL & flags)) {
+ break;
+ }
- dictionary = IOService::serviceMatching( "IOMedia" );
- if( dictionary ) {
- dev_name = OSString::withCString( cdev_name );
- if( dev_name ) {
- IOService *service;
- mach_timespec_t tv = { 5, 0 }; // wait up to "timeout" seconds for the device
+ vn = vfs_vnodecovered(mp);
+ if (!vn) {
+ break;
+ }
+ pathLen = sizeof(path);
+ result = vn_getpath(vn, &path[0], &pathLen);
+ vnode_put(vn);
+ if (0 != result) {
+ break;
+ }
+ if (!pathLen) {
+ break;
+ }
+#if defined(XNU_TARGET_OS_BRIDGE)
+ // on bridgeOS systems we put the core in /private/var/internal. We don't
+ // want to match with /private/var because /private/var/internal is often mounted
+ // over /private/var
+ if ((pathLen - 1) < (int) strlen("/private/var/internal")) {
+ break;
+ }
+#endif
+ if (0 != strncmp(path, kIOCoreDumpPath, pathLen - 1)) {
+ break;
+ }
- dictionary->setObject( kIOBSDNameKey, dev_name );
- dictionary->retain();
- service = IOService::waitForService( dictionary, &tv );
- if( service ) {
- OSBoolean *ejectable = (OSBoolean *) service->getProperty( "Ejectable" );
+ thread_call_enter1(corefile_open_call, (void *) kIOCoreDumpPath);
+ break;
- if( ejectable ) {
- ret = (int)ejectable->getValue();
+ case kIOMountChangeUnmount:
+ case kIOMountChangeWillResize:
+ if (gIOPolledCoreFileVars && (mp == kern_file_mount(gIOPolledCoreFileVars->fileRef))) {
+ thread_call_cancel_wait(corefile_open_call);
+ IOClosePolledCoreFile();
}
+ break;
+ }
+#endif /* IOPOLLED_COREFILE */
+}
+
+/* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
- }
- dev_name->release();
+extern "C" boolean_t
+IOTaskHasEntitlement(task_t task, const char * entitlement)
+{
+ OSObject * obj;
+ obj = IOUserClient::copyClientEntitlement(task, entitlement);
+ if (!obj) {
+ return false;
}
- dictionary->release();
- }
+ obj->release();
+ return obj != kOSBooleanFalse;
+}
- return ret;
+extern "C" boolean_t
+IOVnodeHasEntitlement(vnode_t vnode, int64_t off, const char *entitlement)
+{
+ OSObject * obj;
+ off_t offset = (off_t)off;
+
+ obj = IOUserClient::copyClientEntitlementVnode(vnode, offset, entitlement);
+ if (!obj) {
+ return false;
+ }
+ obj->release();
+ return obj != kOSBooleanFalse;
}
-} /* extern "C" */
+extern "C" char *
+IOVnodeGetEntitlement(vnode_t vnode, int64_t off, const char *entitlement)
+{
+ OSObject *obj = NULL;
+ OSString *str = NULL;
+ size_t len;
+ char *value = NULL;
+ off_t offset = (off_t)off;
+
+ obj = IOUserClient::copyClientEntitlementVnode(vnode, offset, entitlement);
+ if (obj != NULL) {
+ str = OSDynamicCast(OSString, obj);
+ if (str != NULL) {
+ len = str->getLength() + 1;
+ value = (char *)kheap_alloc(KHEAP_DATA_BUFFERS, len, Z_WAITOK);
+ strlcpy(value, str->getCStringNoCopy(), len);
+ }
+ obj->release();
+ }
+ return value;
+}