/*
* Copyright (c) 1998-2000 Apple Computer, Inc. All rights reserved.
*
- * @APPLE_LICENSE_HEADER_START@
+ * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
*
- * The contents of this file constitute Original Code as defined in and
- * are subject to the Apple Public Source License Version 1.1 (the
- * "License"). You may not use this file except in compliance with the
- * License. Please obtain a copy of the License at
- * http://www.apple.com/publicsource and read it before using this file.
+ * This file contains Original Code and/or Modifications of Original Code
+ * as defined in and that are subject to the Apple Public Source License
+ * Version 2.0 (the 'License'). You may not use this file except in
+ * compliance with the License. The rights granted to you under the License
+ * may not be used to create, or enable the creation or redistribution of,
+ * unlawful or unlicensed copies of an Apple operating system, or to
+ * circumvent, violate, or enable the circumvention or violation of, any
+ * terms of an Apple operating system software license agreement.
*
- * This Original Code and all software distributed under the License are
- * distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY KIND, EITHER
+ * Please obtain a copy of the License at
+ * http://www.opensource.apple.com/apsl/ and read it before using this file.
+ *
+ * The Original Code and all software distributed under the License are
+ * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
* EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
* INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
- * FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT. Please see the
- * License for the specific language governing rights and limitations
- * under the License.
+ * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
+ * Please see the License for the specific language governing rights and
+ * limitations under the License.
*
- * @APPLE_LICENSE_HEADER_END@
+ * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
*/
#include <IOKit/IOBSD.h>
#include <IOKit/IOLib.h>
#include <IOKit/IOKitKeys.h>
#include <IOKit/IOPlatformExpert.h>
-#include <sys/disklabel.h>
-
extern "C" {
#include <pexpert/pexpert.h>
#include <kern/clock.h>
+#include <uuid/uuid.h>
// how long to wait for matching root device, secs
#define ROOTDEVICETIMEOUT 60
extern dev_t mdevadd(int devid, ppnum_t base, unsigned int size, int phys);
extern dev_t mdevlookup(int devid);
+extern void mdevremoveall(void);
kern_return_t
IOKitBSDInit( void )
return( 0 );
}
+OSDictionary * IOUUIDMatching( void )
+{
+ return IOService::resourceMatching( "boot-uuid-media" );
+}
+
+
OSDictionary * IOCDMatching( void )
{
OSDictionary * dict;
len = strlen( kIODeviceTreePlane ":" );
maxLen -= len;
- if( maxLen < 0)
+ if( maxLen <= 0)
continue;
- strcpy( buf, kIODeviceTreePlane ":" );
+ strlcpy( buf, kIODeviceTreePlane ":", len + 1 );
comp = buf + len;
// remove parameters following ':' from the path
len = skip - path;
maxLen -= len;
- if( maxLen < 0)
+ if( maxLen <= 0)
continue;
- strncpy( comp, path, len );
- comp[ len ] = 0;
+ strlcpy( comp, path, len + 1 );
matching = IOService::serviceMatching( "IONetworkInterface" );
if( !matching)
OSDictionary * matching;
OSDictionary * propDict = 0;
const OSSymbol * str = 0;
-
+ char networkType[128];
+
do {
matching = IOService::serviceMatching( "IONetworkInterface" );
if ( matching == 0 )
str->release();
str = 0;
+ // see if we're contrained to netroot off of specific network type
+ if(PE_parse_boot_argn( "network-type", networkType, 128 ))
+ {
+ str = OSSymbol::withCString( networkType );
+ if(str)
+ {
+ propDict->setObject( "IONetworkRootType", str);
+ str->release();
+ str = 0;
+ }
+ }
+
if ( matching->setObject( gIOPropertyMatchKey,
(OSObject *) propDict ) != true )
continue;
long partition = -1;
long lun = -1;
char c;
- const char * partitionSep = NULL;
+ int len;
// scan the tail of the path for "@unit:partition"
do {
if( *(--look) == c) {
if( c == ':') {
partition = strtol( look + 1, 0, 0 );
- partitionSep = look;
c = '@';
} else if( c == '@') {
- int diff = -1;
-
- unit = strtol( look + 1, 0, 16 );
-
- diff = (int)partitionSep - (int)look;
- if ( diff > 0 ) {
-
- for ( ; diff > 0; diff-- )
- {
- if( look[diff] == ',' )
- {
- lun = strtol ( &look[diff + 1], 0, 16 );
- break;
- }
- }
+ unit = strtol( look + 1, &comp, 16 );
+
+ if( *comp == ',') {
+ lun = strtol( comp + 1, 0, 16 );
}
c = '/';
if( c || unit == -1 || partition == -1)
continue;
- maxLen -= strlen( "{" kIOPathMatchKey "='" kIODeviceTreePlane ":" );
- maxLen -= ( alias ? strlen( alias ) : 0 ) + (look - path);
- maxLen -= strlen( "/@hhhhhhhh,hhhhhhhh:dddddddddd';}" );
+ len = strlen( "{" kIOPathMatchKey "='" kIODeviceTreePlane ":" );
+ maxLen -= len;
+ if( maxLen <= 0)
+ continue;
- if( maxLen > 0) {
- sprintf( buf, "{" kIOPathMatchKey "='" kIODeviceTreePlane ":" );
- comp = buf + strlen( buf );
-
- if( alias) {
- strcpy( comp, alias );
- comp += strlen( alias );
- }
-
- if ( (look - path)) {
- strncpy( comp, path, look - path);
- comp += look - path;
- }
+ snprintf( buf, len + 1, "{" kIOPathMatchKey "='" kIODeviceTreePlane ":" );
+ comp = buf + len;
+
+ if( alias) {
+ len = strlen( alias );
+ maxLen -= len;
+ if( maxLen <= 0)
+ continue;
+
+ strlcpy( comp, alias, len + 1 );
+ comp += len;
+ }
+
+ if ( (look - path)) {
+ len = (look - path);
+ maxLen -= len;
+ if( maxLen <= 0)
+ continue;
+
+ strlcpy( comp, path, len + 1 );
+ comp += len;
+ }
- if ( lun != -1 )
- {
- sprintf ( comp, "/@%lx,%lx:%ld';}", unit, lun, partition );
- }
- else
- {
- sprintf( comp, "/@%lx:%ld';}", unit, partition );
- }
- } else
- continue;
+ if ( lun != -1 )
+ {
+ len = strlen( "/@hhhhhhhh,hhhhhhhh:dddddddddd';}" );
+ maxLen -= len;
+ if( maxLen <= 0)
+ continue;
+
+ snprintf( comp, len + 1, "/@%lx,%lx:%ld';}", unit, lun, partition );
+ }
+ else
+ {
+ len = strlen( "/@hhhhhhhh:dddddddddd';}" );
+ maxLen -= len;
+ if( maxLen <= 0)
+ continue;
+
+ snprintf( comp, len + 1, "/@%lx:%ld';}", unit, partition );
+ }
return( OSDynamicCast(OSDictionary, OSUnserialize( buf, 0 )) );
OSDictionary * IOOFPathMatching( const char * path, char * buf, int maxLen )
{
+ OSDictionary * matching;
+ OSString * str;
+ char * comp;
+ int len;
+
/* need to look up path, get device type,
call matching help based on device type */
- return( IODiskMatching( path, buf, maxLen ));
+ matching = IODiskMatching( path, buf, maxLen );
+ if( matching)
+ return( matching );
+
+ do {
+
+ len = strlen( kIODeviceTreePlane ":" );
+ maxLen -= len;
+ if( maxLen <= 0)
+ continue;
+
+ strlcpy( buf, kIODeviceTreePlane ":", len + 1 );
+ comp = buf + len;
+
+ len = strlen( path );
+ maxLen -= len;
+ if( maxLen <= 0)
+ continue;
+ strlcpy( comp, path, len + 1 );
+
+ matching = OSDictionary::withCapacity( 1 );
+ if( !matching)
+ continue;
+
+ str = OSString::withCString( buf );
+ if( !str)
+ continue;
+ matching->setObject( kIOPathMatchKey, str );
+ str->release();
+ return( matching );
+
+ } while( false );
+
+ if( matching)
+ matching->release();
+
+ return( 0 );
}
IOService * IOFindMatchingChild( IOService * service )
static int didRam = 0;
-kern_return_t IOFindBSDRoot( char * rootName,
+kern_return_t IOFindBSDRoot( char * rootName, unsigned int rootNameSize,
dev_t * root, u_int32_t * oflags )
{
mach_timespec_t t;
UInt32 *ramdParms = 0;
UInt32 flags = 0;
- int minor, major;
+ int mnr, mjr;
bool findHFSChild = false;
+ char * mediaProperty = 0;
char * rdBootVar;
enum { kMaxPathBuf = 512, kMaxBootVar = 128 };
char * str;
int len;
bool forceNet = false;
bool debugInfoPrintedOnce = false;
+ const char * uuidStr = NULL;
static int mountAttempts = 0;
- int xchar, dchar;
+ int xchar, dchar;
if( mountAttempts++)
return( kIOReturnNoMemory );
rdBootVar = str + kMaxPathBuf;
- if (!PE_parse_boot_arg("rd", rdBootVar )
- && !PE_parse_boot_arg("rootdev", rdBootVar ))
+ if (!PE_parse_boot_argn("rd", rdBootVar, kMaxBootVar )
+ && !PE_parse_boot_argn("rootdev", rdBootVar, kMaxBootVar ))
rdBootVar[0] = 0;
do {
- if( (regEntry = IORegistryEntry::fromPath( "/chosen", gIODTPlane ))) {
- data = (OSData *) regEntry->getProperty( "rootpath" );
- regEntry->release();
- if( data) continue;
+ if( (regEntry = IORegistryEntry::fromPath( "/chosen", gIODTPlane ))) {
+ data = OSDynamicCast(OSData, regEntry->getProperty( "root-matching" ));
+ if (data) {
+ matching = OSDynamicCast(OSDictionary, OSUnserializeXML((char *)data->getBytesNoCopy()));
+ if (matching) {
+ continue;
+ }
+ }
+
+ data = (OSData *) regEntry->getProperty( "boot-uuid" );
+ if( data) {
+ uuidStr = (const char*)data->getBytesNoCopy();
+ OSString *uuidString = OSString::withCString( uuidStr );
+
+ // match the boot-args boot-uuid processing below
+ if( uuidString) {
+ IOLog("rooting via boot-uuid from /chosen: %s\n", uuidStr);
+ IOService::publishResource( "boot-uuid", uuidString );
+ uuidString->release();
+ matching = IOUUIDMatching();
+ mediaProperty = "boot-uuid-media";
+ regEntry->release();
+ continue;
+ } else {
+ uuidStr = NULL;
}
+ }
+
+ // else try for an OF Path
+ data = (OSData *) regEntry->getProperty( "rootpath" );
+ regEntry->release();
+ if( data) continue;
+ }
if( (regEntry = IORegistryEntry::fromPath( "/options", gIODTPlane ))) {
- data = (OSData *) regEntry->getProperty( "boot-file" );
- regEntry->release();
- if( data) continue;
- }
+ data = (OSData *) regEntry->getProperty( "boot-file" );
+ regEntry->release();
+ if( data) continue;
+ }
} while( false );
- if( data)
+ if( data && !uuidStr)
look = (const char *) data->getBytesNoCopy();
if( rdBootVar[0] == '*') {
// from OpenFirmware path
IOLog("From path: \"%s\", ", look);
- if( forceNet || (0 == strncmp( look, "enet", strlen( "enet" ))) ) {
- matching = IONetworkMatching( look, str, kMaxPathBuf );
- } else {
- matching = IODiskMatching( look, str, kMaxPathBuf );
+ if (!matching) {
+ if( forceNet || (0 == strncmp( look, "enet", strlen( "enet" ))) ) {
+ matching = IONetworkMatching( look, str, kMaxPathBuf );
+ } else {
+ matching = IODiskMatching( look, str, kMaxPathBuf );
+ }
}
}
} else if ( strncmp( look, "cdrom", strlen( "cdrom" )) == 0 ) {
matching = IOCDMatching();
findHFSChild = true;
+ } else if ( strncmp( look, "uuid", strlen( "uuid" )) == 0 ) {
+ char *uuid;
+ OSString *uuidString;
+
+ uuid = (char *)IOMalloc( kMaxBootVar );
+
+ if ( uuid ) {
+ if (!PE_parse_boot_argn( "boot-uuid", uuid, kMaxBootVar )) {
+ panic( "rd=uuid but no boot-uuid=<value> specified" );
+ }
+ uuidString = OSString::withCString( uuid );
+ if ( uuidString ) {
+ IOService::publishResource( "boot-uuid", uuidString );
+ uuidString->release();
+ IOLog( "\nWaiting for boot volume with UUID %s\n", uuid );
+ matching = IOUUIDMatching();
+ mediaProperty = "boot-uuid-media";
+ }
+ IOFree( uuid, kMaxBootVar );
+ }
} else {
matching = IOBSDNameMatching( look );
}
}
if( !matching) {
- OSString * astring;
- // any HFS
+ OSString * astring;
+ // Match any HFS media
+
matching = IOService::serviceMatching( "IOMedia" );
astring = OSString::withCStringNoCopy("Apple_HFS");
if ( astring ) {
// look for a subservice with an Apple_HFS child
IOService * subservice = IOFindMatchingChild( service );
if ( subservice ) service = subservice;
+ } else if ( service && mediaProperty ) {
+ service = (IOService *)service->getProperty(mediaProperty);
}
- major = 0;
- minor = 0;
+ mjr = 0;
+ mnr = 0;
// If the IOService we matched to is a subclass of IONetworkInterface,
// then make sure it has been registered with BSD and has a BSD name
iostr = (OSString *) service->getProperty( kIOBSDNameKey );
if( iostr)
- strcpy( rootName, iostr->getCStringNoCopy() );
+ strlcpy( rootName, iostr->getCStringNoCopy(), rootNameSize );
off = (OSNumber *) service->getProperty( kIOBSDMajorKey );
if( off)
- major = off->unsigned32BitValue();
+ mjr = off->unsigned32BitValue();
off = (OSNumber *) service->getProperty( kIOBSDMinorKey );
if( off)
- minor = off->unsigned32BitValue();
+ mnr = off->unsigned32BitValue();
if( service->metaCast( "IONetworkInterface" ))
flags |= 1;
} else {
IOLog( "Wait for root failed\n" );
- strcpy( rootName, "en0");
+ strlcpy( rootName, "en0", rootNameSize );
flags |= 1;
}
IOLog( "BSD root: %s", rootName );
- if( major)
- IOLog(", major %d, minor %d\n", major, minor );
+ if( mjr)
+ IOLog(", major %d, minor %d\n", mjr, mnr );
else
IOLog("\n");
- *root = makedev( major, minor );
+ *root = makedev( mjr, mnr );
*oflags = flags;
IOFree( str, kMaxPathBuf + kMaxBootVar );
return( kIOReturnSuccess );
}
+void IOSecureBSDRoot(const char * rootName)
+{
+#if CONFIG_EMBEDDED
+ IOReturn result;
+ IOPlatformExpert *pe;
+ const OSSymbol *functionName = OSSymbol::withCStringNoCopy("SecureRootName");
+
+ while ((pe = IOService::getPlatform()) == 0) IOSleep(1 * 1000);
+
+ // Returns kIOReturnNotPrivileged is the root device is not secure.
+ // Returns kIOReturnUnsupported if "SecureRootName" is not implemented.
+ result = pe->callPlatformFunction(functionName, false, (void *)rootName, (void *)0, (void *)0, (void *)0);
+
+ functionName->release();
+
+ if (result == kIOReturnNotPrivileged) mdevremoveall();
+#endif
+}
+
void *
IOBSDRegistryEntryForDeviceTree(char * path)
{
return (NULL);
}
+kern_return_t IOBSDGetPlatformUUID( uuid_t uuid, mach_timespec_t timeout )
+{
+ IOService * resources;
+ OSString * string;
+
+ resources = IOService::waitForService( IOService::resourceMatching( kIOPlatformUUIDKey ), &timeout );
+ if ( resources == 0 ) return KERN_OPERATION_TIMED_OUT;
+
+ string = ( OSString * ) IOService::getPlatform( )->getProvider( )->getProperty( kIOPlatformUUIDKey );
+ if ( string == 0 ) return KERN_NOT_SUPPORTED;
+
+ uuid_parse( string->getCStringNoCopy( ), uuid );
+
+ return KERN_SUCCESS;
+}
+
} /* extern "C" */