/*
- * Copyright (c) 1998-2000 Apple Computer, Inc. All rights reserved.
+ * Copyright (c) 1998-2011 Apple Inc. All rights reserved.
*
- * @APPLE_LICENSE_HEADER_START@
- *
- * The contents of this file constitute Original Code as defined in and
- * are subject to the Apple Public Source License Version 1.1 (the
- * "License"). You may not use this file except in compliance with the
- * License. Please obtain a copy of the License at
- * http://www.apple.com/publicsource and read it before using this file.
- *
- * This Original Code and all software distributed under the License are
- * distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY KIND, EITHER
+ * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
+ *
+ * This file contains Original Code and/or Modifications of Original Code
+ * as defined in and that are subject to the Apple Public Source License
+ * Version 2.0 (the 'License'). You may not use this file except in
+ * compliance with the License. The rights granted to you under the License
+ * may not be used to create, or enable the creation or redistribution of,
+ * unlawful or unlicensed copies of an Apple operating system, or to
+ * circumvent, violate, or enable the circumvention or violation of, any
+ * terms of an Apple operating system software license agreement.
+ *
+ * Please obtain a copy of the License at
+ * http://www.opensource.apple.com/apsl/ and read it before using this file.
+ *
+ * The Original Code and all software distributed under the License are
+ * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
* EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
* INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
- * FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT. Please see the
- * License for the specific language governing rights and limitations
- * under the License.
- *
- * @APPLE_LICENSE_HEADER_END@
+ * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
+ * Please see the License for the specific language governing rights and
+ * limitations under the License.
+ *
+ * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
*/
#include <IOKit/IOBSD.h>
#include <IOKit/IOLib.h>
#include <IOKit/IOService.h>
+#include <IOKit/IOCatalogue.h>
#include <IOKit/IODeviceTreeSupport.h>
#include <IOKit/IOKitKeys.h>
+#include <IOKit/IONVRAM.h>
#include <IOKit/IOPlatformExpert.h>
-
-#include <sys/disklabel.h>
+#include <IOKit/IOUserClient.h>
extern "C" {
-
#include <pexpert/pexpert.h>
#include <kern/clock.h>
+#include <mach/machine.h>
+#include <uuid/uuid.h>
+#include <sys/vnode_internal.h>
+#include <sys/mount.h>
// how long to wait for matching root device, secs
-#define ROOTDEVICETIMEOUT 60
+#if DEBUG
+#define ROOTDEVICETIMEOUT 120
+#else
+#define ROOTDEVICETIMEOUT 60
+#endif
-extern dev_t mdevadd(int devid, ppnum_t base, unsigned int size, int phys);
+extern dev_t mdevadd(int devid, uint64_t base, unsigned int size, int phys);
extern dev_t mdevlookup(int devid);
+extern void mdevremoveall(void);
+extern int mdevgetrange(int devid, uint64_t *base, uint64_t *size);
+extern void di_root_ramfile(IORegistryEntry * entry);
+
+#define ROUNDUP(a, b) (((a) + ((b) - 1)) & (~((b) - 1)))
+
+#define IOPOLLED_COREFILE (CONFIG_KDP_INTERACTIVE_DEBUGGING)
+
+#if defined(XNU_TARGET_OS_BRIDGE)
+#define kIOCoreDumpPath "/private/var/internal/kernelcore"
+#elif defined(XNU_TARGET_OS_OSX)
+#define kIOCoreDumpPath "/System/Volumes/VM/kernelcore"
+#else
+#define kIOCoreDumpPath "/private/var/vm/kernelcore"
+#endif
+
+#define SYSTEM_NVRAM_PREFIX "40A0DDD2-77F8-4392-B4A3-1E7304206516:"
+
+#if CONFIG_KDP_INTERACTIVE_DEBUGGING
+/*
+ * Touched by IOFindBSDRoot() if a RAMDisk is used for the root device.
+ */
+extern uint64_t kdp_core_ramdisk_addr;
+extern uint64_t kdp_core_ramdisk_size;
+#endif
+
+#if IOPOLLED_COREFILE
+static void IOOpenPolledCoreFile(thread_call_param_t __unused, thread_call_param_t corefilename);
+
+thread_call_t corefile_open_call = NULL;
+#endif
kern_return_t
IOKitBSDInit( void )
{
- IOService::publishResource("IOBSD");
-
- return( kIOReturnSuccess );
+ IOService::publishResource("IOBSD");
+
+#if IOPOLLED_COREFILE
+ corefile_open_call = thread_call_allocate_with_options(IOOpenPolledCoreFile, NULL, THREAD_CALL_PRIORITY_KERNEL, THREAD_CALL_OPTIONS_ONCE);
+#endif
+
+ return kIOReturnSuccess;
}
-OSDictionary * IOBSDNameMatching( const char * name )
+void
+IOServicePublishResource( const char * property, boolean_t value )
{
- OSDictionary * dict;
- const OSSymbol * str = 0;
+ if (value) {
+ IOService::publishResource( property, kOSBooleanTrue );
+ } else {
+ IOService::getResourceService()->removeProperty( property );
+ }
+}
- do {
+boolean_t
+IOServiceWaitForMatchingResource( const char * property, uint64_t timeout )
+{
+ OSDictionary * dict = NULL;
+ IOService * match = NULL;
+ boolean_t found = false;
+
+ do {
+ dict = IOService::resourceMatching( property );
+ if (!dict) {
+ continue;
+ }
+ match = IOService::waitForMatchingService( dict, timeout );
+ if (match) {
+ found = true;
+ }
+ } while (false);
- dict = IOService::serviceMatching( gIOServiceKey );
- if( !dict)
- continue;
- str = OSSymbol::withCString( name );
- if( !str)
- continue;
- dict->setObject( kIOBSDNameKey, (OSObject *) str );
- str->release();
+ if (dict) {
+ dict->release();
+ }
+ if (match) {
+ match->release();
+ }
- return( dict );
+ return found;
+}
- } while( false );
+boolean_t
+IOCatalogueMatchingDriversPresent( const char * property )
+{
+ OSDictionary * dict = NULL;
+ OSOrderedSet * set = NULL;
+ SInt32 generationCount = 0;
+ boolean_t found = false;
+
+ do {
+ dict = OSDictionary::withCapacity(1);
+ if (!dict) {
+ continue;
+ }
+ dict->setObject( property, kOSBooleanTrue );
+ set = gIOCatalogue->findDrivers( dict, &generationCount );
+ if (set && (set->getCount() > 0)) {
+ found = true;
+ }
+ } while (false);
- if( dict)
- dict->release();
- if( str)
- str->release();
+ if (dict) {
+ dict->release();
+ }
+ if (set) {
+ set->release();
+ }
- return( 0 );
+ return found;
}
-OSDictionary * IOCDMatching( void )
+OSDictionary *
+IOBSDNameMatching( const char * name )
{
- OSDictionary * dict;
- const OSSymbol * str;
-
- dict = IOService::serviceMatching( "IOMedia" );
- if( dict == 0 ) {
- IOLog("Unable to find IOMedia\n");
- return 0;
- }
-
- str = OSSymbol::withCString( "CD_ROM_Mode_1" );
- if( str == 0 ) {
- dict->release();
- return 0;
- }
-
- dict->setObject( "Content Hint", (OSObject *)str );
- str->release();
- return( dict );
+ OSDictionary * dict;
+ const OSSymbol * str = NULL;
+
+ do {
+ dict = IOService::serviceMatching( gIOServiceKey );
+ if (!dict) {
+ continue;
+ }
+ str = OSSymbol::withCString( name );
+ if (!str) {
+ continue;
+ }
+ dict->setObject( kIOBSDNameKey, (OSObject *) str );
+ str->release();
+
+ return dict;
+ } while (false);
+
+ if (dict) {
+ dict->release();
+ }
+ if (str) {
+ str->release();
+ }
+
+ return NULL;
}
-OSDictionary * IONetworkMatching( const char * path,
- char * buf, int maxLen )
+OSDictionary *
+IOUUIDMatching( void )
{
- OSDictionary * matching = 0;
- OSDictionary * dict;
- OSString * str;
- char * comp;
- const char * skip;
- int len;
-
- do {
-
- len = strlen( kIODeviceTreePlane ":" );
- maxLen -= len;
- if( maxLen < 0)
- continue;
-
- strcpy( buf, kIODeviceTreePlane ":" );
- comp = buf + len;
-
- // remove parameters following ':' from the path
- skip = strchr( path, ':');
- if( !skip)
- continue;
-
- len = skip - path;
- maxLen -= len;
- if( maxLen < 0)
- continue;
- strncpy( comp, path, len );
- comp[ len ] = 0;
-
- matching = IOService::serviceMatching( "IONetworkInterface" );
- if( !matching)
- continue;
- dict = IOService::addLocation( matching );
- if( !dict)
- continue;
-
- str = OSString::withCString( buf );
- if( !str)
- continue;
- dict->setObject( kIOPathMatchKey, str );
- str->release();
-
- return( matching );
-
- } while( false );
-
- if( matching)
- matching->release();
-
- return( 0 );
+ return IOService::resourceMatching( "boot-uuid-media" );
}
-OSDictionary * IONetworkNamePrefixMatching( const char * prefix )
+OSDictionary *
+IONetworkNamePrefixMatching( const char * prefix )
{
- OSDictionary * matching;
- OSDictionary * propDict = 0;
- const OSSymbol * str = 0;
+ OSDictionary * matching;
+ OSDictionary * propDict = NULL;
+ const OSSymbol * str = NULL;
+ char networkType[128];
+
+ do {
+ matching = IOService::serviceMatching( "IONetworkInterface" );
+ if (matching == NULL) {
+ continue;
+ }
+
+ propDict = OSDictionary::withCapacity(1);
+ if (propDict == NULL) {
+ continue;
+ }
+
+ str = OSSymbol::withCString( prefix );
+ if (str == NULL) {
+ continue;
+ }
+
+ propDict->setObject( "IOInterfaceNamePrefix", (OSObject *) str );
+ str->release();
+ str = NULL;
+
+ // see if we're contrained to netroot off of specific network type
+ if (PE_parse_boot_argn( "network-type", networkType, 128 )) {
+ str = OSSymbol::withCString( networkType );
+ if (str) {
+ propDict->setObject( "IONetworkRootType", str);
+ str->release();
+ str = NULL;
+ }
+ }
+
+ if (matching->setObject( gIOPropertyMatchKey,
+ (OSObject *) propDict ) != true) {
+ continue;
+ }
+
+ propDict->release();
+ propDict = NULL;
+
+ return matching;
+ } while (false);
+
+ if (matching) {
+ matching->release();
+ }
+ if (propDict) {
+ propDict->release();
+ }
+ if (str) {
+ str->release();
+ }
+
+ return NULL;
+}
- do {
- matching = IOService::serviceMatching( "IONetworkInterface" );
- if ( matching == 0 )
- continue;
+static bool
+IORegisterNetworkInterface( IOService * netif )
+{
+ // A network interface is typically named and registered
+ // with BSD after receiving a request from a user space
+ // "namer". However, for cases when the system needs to
+ // root from the network, this registration task must be
+ // done inside the kernel and completed before the root
+ // device is handed to BSD.
+
+ IOService * stack;
+ OSNumber * zero = NULL;
+ OSString * path = NULL;
+ OSDictionary * dict = NULL;
+ char * pathBuf = NULL;
+ int len;
+ enum { kMaxPathLen = 512 };
+
+ do {
+ stack = IOService::waitForService(
+ IOService::serviceMatching("IONetworkStack"));
+ if (stack == NULL) {
+ break;
+ }
- propDict = OSDictionary::withCapacity(1);
- if ( propDict == 0 )
- continue;
+ dict = OSDictionary::withCapacity(3);
+ if (dict == NULL) {
+ break;
+ }
- str = OSSymbol::withCString( prefix );
- if ( str == 0 )
- continue;
+ zero = OSNumber::withNumber((UInt64) 0, 32);
+ if (zero == NULL) {
+ break;
+ }
- propDict->setObject( "IOInterfaceNamePrefix", (OSObject *) str );
- str->release();
- str = 0;
+ pathBuf = (char *) IOMalloc( kMaxPathLen );
+ if (pathBuf == NULL) {
+ break;
+ }
- if ( matching->setObject( gIOPropertyMatchKey,
- (OSObject *) propDict ) != true )
- continue;
+ len = kMaxPathLen;
+ if (netif->getPath( pathBuf, &len, gIOServicePlane )
+ == false) {
+ break;
+ }
- propDict->release();
- propDict = 0;
+ path = OSString::withCStringNoCopy( pathBuf );
+ if (path == NULL) {
+ break;
+ }
- return( matching );
+ dict->setObject( "IOInterfaceUnit", zero );
+ dict->setObject( kIOPathMatchKey, path );
- } while ( false );
+ stack->setProperties( dict );
+ }while (false);
- if ( matching ) matching->release();
- if ( propDict ) propDict->release();
- if ( str ) str->release();
+ if (zero) {
+ zero->release();
+ }
+ if (path) {
+ path->release();
+ }
+ if (dict) {
+ dict->release();
+ }
+ if (pathBuf) {
+ IOFree(pathBuf, kMaxPathLen);
+ }
- return( 0 );
+ return netif->getProperty( kIOBSDNameKey ) != NULL;
}
-static bool IORegisterNetworkInterface( IOService * netif )
+OSDictionary *
+IOOFPathMatching( const char * path, char * buf, int maxLen )
{
- // A network interface is typically named and registered
- // with BSD after receiving a request from a user space
- // "namer". However, for cases when the system needs to
- // root from the network, this registration task must be
- // done inside the kernel and completed before the root
- // device is handed to BSD.
-
- IOService * stack;
- OSNumber * zero = 0;
- OSString * path = 0;
- OSDictionary * dict = 0;
- char * pathBuf = 0;
- int len;
- enum { kMaxPathLen = 512 };
-
- do {
- stack = IOService::waitForService(
- IOService::serviceMatching("IONetworkStack") );
- if ( stack == 0 ) break;
-
- dict = OSDictionary::withCapacity(3);
- if ( dict == 0 ) break;
-
- zero = OSNumber::withNumber((UInt64) 0, 32);
- if ( zero == 0 ) break;
-
- pathBuf = (char *) IOMalloc( kMaxPathLen );
- if ( pathBuf == 0 ) break;
-
- len = kMaxPathLen;
- if ( netif->getPath( pathBuf, &len, gIOServicePlane )
- == false ) break;
-
- path = OSString::withCStringNoCopy( pathBuf );
- if ( path == 0 ) break;
-
- dict->setObject( "IOInterfaceUnit", zero );
- dict->setObject( kIOPathMatchKey, path );
-
- stack->setProperties( dict );
- }
- while ( false );
-
- if ( zero ) zero->release();
- if ( path ) path->release();
- if ( dict ) dict->release();
- if ( pathBuf ) IOFree(pathBuf, kMaxPathLen);
-
- return ( netif->getProperty( kIOBSDNameKey ) != 0 );
+ OSDictionary * matching = NULL;
+ OSString * str;
+ char * comp;
+ int len;
+
+ do {
+ len = ((int) strlen( kIODeviceTreePlane ":" ));
+ maxLen -= len;
+ if (maxLen <= 0) {
+ continue;
+ }
+
+ strlcpy( buf, kIODeviceTreePlane ":", len + 1 );
+ comp = buf + len;
+
+ len = ((int) strnlen( path, INT_MAX ));
+ maxLen -= len;
+ if (maxLen <= 0) {
+ continue;
+ }
+ strlcpy( comp, path, len + 1 );
+
+ matching = OSDictionary::withCapacity( 1 );
+ if (!matching) {
+ continue;
+ }
+
+ str = OSString::withCString( buf );
+ if (!str) {
+ continue;
+ }
+ matching->setObject( kIOPathMatchKey, str );
+ str->release();
+
+ return matching;
+ } while (false);
+
+ if (matching) {
+ matching->release();
+ }
+
+ return NULL;
}
-OSDictionary * IODiskMatching( const char * path, char * buf, int maxLen )
+static int didRam = 0;
+enum { kMaxPathBuf = 512, kMaxBootVar = 128 };
+
+const char*
+IOGetBootUUID(void)
{
- const char * look;
- const char * alias;
- char * comp;
- long unit = -1;
- long partition = -1;
- long lun = -1;
- char c;
- const char * partitionSep = NULL;
-
- // scan the tail of the path for "@unit:partition"
- do {
- // Have to get the full path to the controller - an alias may
- // tell us next to nothing, like "hd:8"
- alias = IORegistryEntry::dealiasPath( &path, gIODTPlane );
-
- look = path + strlen( path);
- c = ':';
- while( look != path) {
- if( *(--look) == c) {
- if( c == ':') {
- partition = strtol( look + 1, 0, 0 );
- partitionSep = look;
- c = '@';
- } else if( c == '@') {
- int diff = -1;
-
- unit = strtol( look + 1, 0, 16 );
-
- diff = (int)partitionSep - (int)look;
- if ( diff > 0 ) {
-
- for ( ; diff > 0; diff-- )
- {
- if( look[diff] == ',' )
- {
- lun = strtol ( &look[diff + 1], 0, 16 );
- break;
- }
- }
- }
-
- c = '/';
- } else if( c == '/') {
- c = 0;
- break;
- }
- }
-
- if( alias && (look == path)) {
- path = alias;
- look = path + strlen( path);
- alias = 0;
- }
- }
- if( c || unit == -1 || partition == -1)
- continue;
-
- maxLen -= strlen( "{" kIOPathMatchKey "='" kIODeviceTreePlane ":" );
- maxLen -= ( alias ? strlen( alias ) : 0 ) + (look - path);
- maxLen -= strlen( "/@hhhhhhhh,hhhhhhhh:dddddddddd';}" );
-
- if( maxLen > 0) {
- sprintf( buf, "{" kIOPathMatchKey "='" kIODeviceTreePlane ":" );
- comp = buf + strlen( buf );
-
- if( alias) {
- strcpy( comp, alias );
- comp += strlen( alias );
- }
-
- if ( (look - path)) {
- strncpy( comp, path, look - path);
- comp += look - path;
- }
-
- if ( lun != -1 )
- {
- sprintf ( comp, "/@%lx,%lx:%ld';}", unit, lun, partition );
- }
- else
- {
- sprintf( comp, "/@%lx:%ld';}", unit, partition );
- }
- } else
- continue;
-
- return( OSDynamicCast(OSDictionary, OSUnserialize( buf, 0 )) );
-
- } while( false );
-
- return( 0 );
+ IORegistryEntry *entry;
+
+ if ((entry = IORegistryEntry::fromPath("/chosen", gIODTPlane))) {
+ OSData *uuid_data = (OSData *)entry->getProperty("boot-uuid");
+ if (uuid_data) {
+ return (const char*)uuid_data->getBytesNoCopy();
+ }
+ }
+
+ return NULL;
}
-OSDictionary * IOOFPathMatching( const char * path, char * buf, int maxLen )
+const char *
+IOGetApfsPrebootUUID(void)
{
- /* need to look up path, get device type,
- call matching help based on device type */
+ IORegistryEntry *entry;
- return( IODiskMatching( path, buf, maxLen ));
+ if ((entry = IORegistryEntry::fromPath("/chosen", gIODTPlane))) {
+ OSData *uuid_data = (OSData *)entry->getProperty("apfs-preboot-uuid");
+ if (uuid_data) {
+ return (const char*)uuid_data->getBytesNoCopy();
+ }
+ }
+ return NULL;
}
-IOService * IOFindMatchingChild( IOService * service )
+const char *
+IOGetAssociatedApfsVolgroupUUID(void)
{
- // find a matching child service
- IOService * child = 0;
- OSIterator * iter = service->getClientIterator();
- if ( iter ) {
- while( ( child = (IOService *) iter->getNextObject() ) ) {
- OSDictionary * dict = OSDictionary::withCapacity( 1 );
- if( dict == 0 ) {
- iter->release();
- return 0;
- }
- const OSSymbol * str = OSSymbol::withCString( "Apple_HFS" );
- if( str == 0 ) {
- dict->release();
- iter->release();
- return 0;
- }
- dict->setObject( "Content", (OSObject *)str );
- str->release();
- if ( child->compareProperty( dict, "Content" ) ) {
- dict->release();
- break;
- }
- dict->release();
- IOService * subchild = IOFindMatchingChild( child );
- if ( subchild ) {
- child = subchild;
- break;
- }
- }
- iter->release();
- }
- return child;
+ IORegistryEntry *entry;
+
+ if ((entry = IORegistryEntry::fromPath("/chosen", gIODTPlane))) {
+ OSData *uuid_data = (OSData *)entry->getProperty("associated-volume-group");
+ if (uuid_data) {
+ return (const char*)uuid_data->getBytesNoCopy();
+ }
+ }
+
+ return NULL;
}
-static int didRam = 0;
+const char *
+IOGetBootObjectsPath(void)
+{
+ IORegistryEntry *entry;
+
+ if ((entry = IORegistryEntry::fromPath("/chosen", gIODTPlane))) {
+ OSData *path_prefix_data = (OSData *)entry->getProperty("boot-objects-path");
+ if (path_prefix_data) {
+ return (const char *)path_prefix_data->getBytesNoCopy();
+ }
+ }
+
+ return NULL;
+}
-kern_return_t IOFindBSDRoot( char * rootName,
- dev_t * root, u_int32_t * oflags )
+/*
+ * Set NVRAM to boot into the right flavor of Recovery,
+ * optionally passing a UUID of a volume that failed to boot.
+ * If `reboot` is true, reboot immediately.
+ *
+ * Returns true if `mode` was understood, false otherwise.
+ * (Does not return if `reboot` is true.)
+ */
+boolean_t
+IOSetRecoveryBoot(bsd_bootfail_mode_t mode, uuid_t volume_uuid, boolean_t reboot)
{
- mach_timespec_t t;
- IOService * service;
- IORegistryEntry * regEntry;
- OSDictionary * matching = 0;
- OSString * iostr;
- OSNumber * off;
- OSData * data = 0;
- UInt32 *ramdParms = 0;
-
- UInt32 flags = 0;
- int minor, major;
- bool findHFSChild = false;
- char * rdBootVar;
- enum { kMaxPathBuf = 512, kMaxBootVar = 128 };
- char * str;
- const char * look = 0;
- int len;
- bool forceNet = false;
- bool debugInfoPrintedOnce = false;
-
- static int mountAttempts = 0;
-
- int xchar, dchar;
-
+ IODTNVRAM *nvram = NULL;
+ const OSSymbol *boot_command_sym = NULL;
+ OSString *boot_command_recover = NULL;
- if( mountAttempts++)
- IOSleep( 5 * 1000 );
+ if (mode == BSD_BOOTFAIL_SEAL_BROKEN) {
+ const char *boot_mode = "ssv-seal-broken";
+ uuid_string_t volume_uuid_str;
- str = (char *) IOMalloc( kMaxPathBuf + kMaxBootVar );
- if( !str)
- return( kIOReturnNoMemory );
- rdBootVar = str + kMaxPathBuf;
+ // Set `recovery-broken-seal-uuid = <volume_uuid>`.
+ if (volume_uuid) {
+ uuid_unparse_upper(volume_uuid, volume_uuid_str);
- if (!PE_parse_boot_arg("rd", rdBootVar )
- && !PE_parse_boot_arg("rootdev", rdBootVar ))
- rdBootVar[0] = 0;
+ if (!PEWriteNVRAMProperty(SYSTEM_NVRAM_PREFIX "recovery-broken-seal-uuid",
+ volume_uuid_str, sizeof(uuid_string_t))) {
+ IOLog("Failed to write recovery-broken-seal-uuid to NVRAM.\n");
+ }
+ }
- do {
- if( (regEntry = IORegistryEntry::fromPath( "/chosen", gIODTPlane ))) {
- data = (OSData *) regEntry->getProperty( "rootpath" );
- regEntry->release();
- if( data) continue;
+ // Set `recovery-boot-mode = ssv-seal-broken`.
+ if (!PEWriteNVRAMProperty(SYSTEM_NVRAM_PREFIX "recovery-boot-mode", boot_mode,
+ (const unsigned int) strlen(boot_mode))) {
+ IOLog("Failed to write recovery-boot-mode to NVRAM.\n");
}
- if( (regEntry = IORegistryEntry::fromPath( "/options", gIODTPlane ))) {
- data = (OSData *) regEntry->getProperty( "boot-file" );
- regEntry->release();
- if( data) continue;
+ } else if (mode == BSD_BOOTFAIL_MEDIA_MISSING) {
+ const char *boot_picker_reason = "missing-boot-media";
+
+ // Set `boot-picker-bringup-reason = missing-boot-media`.
+ if (!PEWriteNVRAMProperty(SYSTEM_NVRAM_PREFIX "boot-picker-bringup-reason",
+ boot_picker_reason, (const unsigned int) strlen(boot_picker_reason))) {
+ IOLog("Failed to write boot-picker-bringup-reason to NVRAM.\n");
+ }
+
+ // Set `boot-command = recover`.
+
+ // Construct an OSSymbol and an OSString to be the (key, value) pair
+ // we write to NVRAM. Unfortunately, since our value must be an OSString
+ // instead of an OSData, we cannot use PEWriteNVRAMProperty() here.
+ boot_command_sym = OSSymbol::withCStringNoCopy(SYSTEM_NVRAM_PREFIX "boot-command");
+ boot_command_recover = OSString::withCStringNoCopy("recover");
+ if (boot_command_sym == NULL || boot_command_recover == NULL) {
+ IOLog("Failed to create boot-command strings.\n");
+ goto do_reboot;
+ }
+
+ // Wait for NVRAM to be readable...
+ nvram = OSDynamicCast(IODTNVRAM, IOService::waitForService(
+ IOService::serviceMatching("IODTNVRAM")));
+ if (nvram == NULL) {
+ IOLog("Failed to acquire IODTNVRAM object.\n");
+ goto do_reboot;
}
- } while( false );
- if( data)
- look = (const char *) data->getBytesNoCopy();
+ // Wait for NVRAM to be writable...
+ if (!IOServiceWaitForMatchingResource("IONVRAM", UINT64_MAX)) {
+ IOLog("Failed to wait for IONVRAM service.\n");
+ // attempt the work anyway...
+ }
- if( rdBootVar[0] == '*') {
- look = rdBootVar + 1;
- forceNet = false;
- } else {
- if( (regEntry = IORegistryEntry::fromPath( "/", gIODTPlane ))) {
- forceNet = (0 != regEntry->getProperty( "net-boot" ));
- regEntry->release();
+ // Write the new boot-command to NVRAM, and sync if successful.
+ if (!nvram->setProperty(boot_command_sym, boot_command_recover)) {
+ IOLog("Failed to save new boot-command to NVRAM.\n");
+ } else {
+ nvram->sync();
}
- }
+ } else {
+ IOLog("Unknown mode: %d\n", mode);
+ return false;
+ }
+
+ // Clean up and reboot!
+do_reboot:
+ if (nvram != NULL) {
+ nvram->release();
+ }
+
+ if (boot_command_recover != NULL) {
+ boot_command_recover->release();
+ }
+
+ if (boot_command_sym != NULL) {
+ boot_command_sym->release();
+ }
+
+ if (reboot) {
+ IOLog("\nAbout to reboot into Recovery!\n");
+ (void)PEHaltRestart(kPERestartCPU);
+ }
+
+ return true;
+}
+
+kern_return_t
+IOFindBSDRoot( char * rootName, unsigned int rootNameSize,
+ dev_t * root, u_int32_t * oflags )
+{
+ mach_timespec_t t;
+ IOService * service;
+ IORegistryEntry * regEntry;
+ OSDictionary * matching = NULL;
+ OSString * iostr;
+ OSNumber * off;
+ OSData * data = NULL;
+
+ UInt32 flags = 0;
+ int mnr, mjr;
+ const char * mediaProperty = NULL;
+ char * rdBootVar;
+ char * str;
+ const char * look = NULL;
+ int len;
+ bool debugInfoPrintedOnce = false;
+ bool needNetworkKexts = false;
+ const char * uuidStr = NULL;
+
+ static int mountAttempts = 0;
+
+ int xchar, dchar;
+ // stall here for anyone matching on the IOBSD resource to finish (filesystems)
+ matching = IOService::serviceMatching(gIOResourcesKey);
+ assert(matching);
+ matching->setObject(gIOResourceMatchedKey, gIOBSDKey);
+ if ((service = IOService::waitForMatchingService(matching, 30ULL * kSecondScale))) {
+ service->release();
+ } else {
+ IOLog("!BSD\n");
+ }
+ matching->release();
+ matching = NULL;
+
+ if (mountAttempts++) {
+ IOLog("mount(%d) failed\n", mountAttempts);
+ IOSleep( 5 * 1000 );
+ }
+
+ str = (char *) IOMalloc( kMaxPathBuf + kMaxBootVar );
+ if (!str) {
+ return kIOReturnNoMemory;
+ }
+ rdBootVar = str + kMaxPathBuf;
+
+ if (!PE_parse_boot_argn("rd", rdBootVar, kMaxBootVar )
+ && !PE_parse_boot_argn("rootdev", rdBootVar, kMaxBootVar )) {
+ rdBootVar[0] = 0;
+ }
+
+ do {
+ if ((regEntry = IORegistryEntry::fromPath( "/chosen", gIODTPlane ))) {
+ di_root_ramfile(regEntry);
+ data = OSDynamicCast(OSData, regEntry->getProperty( "root-matching" ));
+ if (data) {
+ matching = OSDynamicCast(OSDictionary, OSUnserializeXML((char *)data->getBytesNoCopy()));
+ if (matching) {
+ continue;
+ }
+ }
+
+ data = (OSData *) regEntry->getProperty( "boot-uuid" );
+ if (data) {
+ uuidStr = (const char*)data->getBytesNoCopy();
+ OSString *uuidString = OSString::withCString( uuidStr );
+
+ // match the boot-args boot-uuid processing below
+ if (uuidString) {
+ IOLog("rooting via boot-uuid from /chosen: %s\n", uuidStr);
+ IOService::publishResource( "boot-uuid", uuidString );
+ uuidString->release();
+ matching = IOUUIDMatching();
+ mediaProperty = "boot-uuid-media";
+ regEntry->release();
+ continue;
+ } else {
+ uuidStr = NULL;
+ }
+ }
+ regEntry->release();
+ }
+ } while (false);
//
// See if we have a RAMDisk property in /chosen/memory-map. If so, make it into a device.
-// It will become /dev/mdx, where x is 0-f.
+// It will become /dev/mdx, where x is 0-f.
//
- if(!didRam) { /* Have we already build this ram disk? */
- didRam = 1; /* Remember we did this */
- if((regEntry = IORegistryEntry::fromPath( "/chosen/memory-map", gIODTPlane ))) { /* Find the map node */
- data = (OSData *)regEntry->getProperty("RAMDisk"); /* Find the ram disk, if there */
- if(data) { /* We found one */
-
- ramdParms = (UInt32 *)data->getBytesNoCopy(); /* Point to the ram disk base and size */
- (void)mdevadd(-1, ramdParms[0] >> 12, ramdParms[1] >> 12, 0); /* Initialize it and pass back the device number */
+ if (!didRam) { /* Have we already build this ram disk? */
+ didRam = 1; /* Remember we did this */
+ if ((regEntry = IORegistryEntry::fromPath( "/chosen/memory-map", gIODTPlane ))) { /* Find the map node */
+ data = (OSData *)regEntry->getProperty("RAMDisk"); /* Find the ram disk, if there */
+ if (data) { /* We found one */
+ uintptr_t *ramdParms;
+ ramdParms = (uintptr_t *)data->getBytesNoCopy(); /* Point to the ram disk base and size */
+#if __LP64__
+#define MAX_PHYS_RAM (((uint64_t)UINT_MAX) << 12)
+ if (ramdParms[1] > MAX_PHYS_RAM) {
+ panic("ramdisk params");
+ }
+#endif /* __LP64__ */
+ (void)mdevadd(-1, ml_static_ptovirt(ramdParms[0]) >> 12, (unsigned int) (ramdParms[1] >> 12), 0); /* Initialize it and pass back the device number */
}
- regEntry->release(); /* Toss the entry */
+ regEntry->release(); /* Toss the entry */
}
}
-
+
//
// Now check if we are trying to root on a memory device
//
- if((rdBootVar[0] == 'm') && (rdBootVar[1] == 'd') && (rdBootVar[3] == 0)) {
- dchar = xchar = rdBootVar[2]; /* Get the actual device */
- if((xchar >= '0') && (xchar <= '9')) xchar = xchar - '0'; /* If digit, convert */
- else {
- xchar = xchar & ~' '; /* Fold to upper case */
- if((xchar >= 'A') && (xchar <= 'F')) { /* Is this a valid digit? */
- xchar = (xchar & 0xF) + 9; /* Convert the hex digit */
- dchar = dchar | ' '; /* Fold to lower case */
+ if ((rdBootVar[0] == 'm') && (rdBootVar[1] == 'd') && (rdBootVar[3] == 0)) {
+ dchar = xchar = rdBootVar[2]; /* Get the actual device */
+ if ((xchar >= '0') && (xchar <= '9')) {
+ xchar = xchar - '0'; /* If digit, convert */
+ } else {
+ xchar = xchar & ~' '; /* Fold to upper case */
+ if ((xchar >= 'A') && (xchar <= 'F')) { /* Is this a valid digit? */
+ xchar = (xchar & 0xF) + 9; /* Convert the hex digit */
+ dchar = dchar | ' '; /* Fold to lower case */
+ } else {
+ xchar = -1; /* Show bogus */
}
- else xchar = -1; /* Show bogus */
}
- if(xchar >= 0) { /* Do we have a valid memory device name? */
- *root = mdevlookup(xchar); /* Find the device number */
- if(*root >= 0) { /* Did we find one? */
-
- rootName[0] = 'm'; /* Build root name */
- rootName[1] = 'd'; /* Build root name */
- rootName[2] = dchar; /* Build root name */
- rootName[3] = 0; /* Build root name */
+ if (xchar >= 0) { /* Do we have a valid memory device name? */
+ *root = mdevlookup(xchar); /* Find the device number */
+ if (*root >= 0) { /* Did we find one? */
+ rootName[0] = 'm'; /* Build root name */
+ rootName[1] = 'd'; /* Build root name */
+ rootName[2] = (char) dchar; /* Build root name */
+ rootName[3] = 0; /* Build root name */
IOLog("BSD root: %s, major %d, minor %d\n", rootName, major(*root), minor(*root));
- *oflags = 0; /* Show that this is not network */
- goto iofrootx; /* Join common exit... */
+ *oflags = 0; /* Show that this is not network */
+
+#if CONFIG_KDP_INTERACTIVE_DEBUGGING
+ /* retrieve final ramdisk range and initialize KDP variables */
+ if (mdevgetrange(xchar, &kdp_core_ramdisk_addr, &kdp_core_ramdisk_size) != 0) {
+ IOLog("Unable to retrieve range for root memory device %d\n", xchar);
+ kdp_core_ramdisk_addr = 0;
+ kdp_core_ramdisk_size = 0;
+ }
+#endif
+
+ goto iofrootx; /* Join common exit... */
+ }
+ panic("IOFindBSDRoot: specified root memory device, %s, has not been configured\n", rdBootVar); /* Not there */
+ }
+ }
+
+ if ((!matching) && rdBootVar[0]) {
+ // by BSD name
+ look = rdBootVar;
+ if (look[0] == '*') {
+ look++;
+ }
+
+ if (strncmp( look, "en", strlen( "en" )) == 0) {
+ matching = IONetworkNamePrefixMatching( "en" );
+ needNetworkKexts = true;
+ } else if (strncmp( look, "uuid", strlen( "uuid" )) == 0) {
+ char *uuid;
+ OSString *uuidString;
+
+ uuid = (char *)IOMalloc( kMaxBootVar );
+
+ if (uuid) {
+ if (!PE_parse_boot_argn( "boot-uuid", uuid, kMaxBootVar )) {
+ panic( "rd=uuid but no boot-uuid=<value> specified" );
+ }
+ uuidString = OSString::withCString( uuid );
+ if (uuidString) {
+ IOService::publishResource( "boot-uuid", uuidString );
+ uuidString->release();
+ IOLog( "\nWaiting for boot volume with UUID %s\n", uuid );
+ matching = IOUUIDMatching();
+ mediaProperty = "boot-uuid-media";
+ }
+ IOFree( uuid, kMaxBootVar );
+ }
+ } else {
+ matching = IOBSDNameMatching( look );
+ }
+ }
+
+ if (!matching) {
+ OSString * astring;
+ // Match any HFS media
+
+ matching = IOService::serviceMatching( "IOMedia" );
+ astring = OSString::withCStringNoCopy("Apple_HFS");
+ if (astring) {
+ matching->setObject("Content", astring);
+ astring->release();
+ }
+ }
+
+ if (gIOKitDebug & kIOWaitQuietBeforeRoot) {
+ IOLog( "Waiting for matching to complete\n" );
+ IOService::getPlatform()->waitQuiet();
+ }
+
+ if (true && matching) {
+ OSSerialize * s = OSSerialize::withCapacity( 5 );
+
+ if (matching->serialize( s )) {
+ IOLog( "Waiting on %s\n", s->text());
+ s->release();
+ }
+ }
+
+ char namep[8];
+ if (needNetworkKexts
+ || PE_parse_boot_argn("-s", namep, sizeof(namep))) {
+ IOService::startDeferredMatches();
+ }
+
+ do {
+ t.tv_sec = ROOTDEVICETIMEOUT;
+ t.tv_nsec = 0;
+ matching->retain();
+ service = IOService::waitForService( matching, &t );
+ if ((!service) || (mountAttempts == 10)) {
+#if !XNU_TARGET_OS_OSX || !defined(__arm64__)
+ PE_display_icon( 0, "noroot");
+ IOLog( "Still waiting for root device\n" );
+#endif
+
+ if (!debugInfoPrintedOnce) {
+ debugInfoPrintedOnce = true;
+ if (gIOKitDebug & kIOLogDTree) {
+ IOLog("\nDT plane:\n");
+ IOPrintPlane( gIODTPlane );
+ }
+ if (gIOKitDebug & kIOLogServiceTree) {
+ IOLog("\nService plane:\n");
+ IOPrintPlane( gIOServicePlane );
+ }
+ if (gIOKitDebug & kIOLogMemory) {
+ IOPrintMemory();
+ }
}
- panic("IOFindBSDRoot: specified root memory device, %s, has not been configured\n", rdBootVar); /* Not there */
- }
- }
-
- if( look) {
- // from OpenFirmware path
- IOLog("From path: \"%s\", ", look);
-
- if( forceNet || (0 == strncmp( look, "enet", strlen( "enet" ))) ) {
- matching = IONetworkMatching( look, str, kMaxPathBuf );
- } else {
- matching = IODiskMatching( look, str, kMaxPathBuf );
- }
- }
-
- if( (!matching) && rdBootVar[0] ) {
- // by BSD name
- look = rdBootVar;
- if( look[0] == '*')
- look++;
-
- if ( strncmp( look, "en", strlen( "en" )) == 0 ) {
- matching = IONetworkNamePrefixMatching( "en" );
- } else if ( strncmp( look, "cdrom", strlen( "cdrom" )) == 0 ) {
- matching = IOCDMatching();
- findHFSChild = true;
+
+#if XNU_TARGET_OS_OSX && defined(__arm64__)
+ // The disk isn't found - have the user pick from recoveryOS+.
+ (void)IOSetRecoveryBoot(BSD_BOOTFAIL_MEDIA_MISSING, NULL, true);
+#endif
+ }
+ } while (!service);
+ matching->release();
+
+ if (service && mediaProperty) {
+ service = (IOService *)service->getProperty(mediaProperty);
+ }
+
+ mjr = 0;
+ mnr = 0;
+
+ // If the IOService we matched to is a subclass of IONetworkInterface,
+ // then make sure it has been registered with BSD and has a BSD name
+ // assigned.
+
+ if (service
+ && service->metaCast( "IONetworkInterface" )
+ && !IORegisterNetworkInterface( service )) {
+ service = NULL;
+ }
+
+ if (service) {
+ len = kMaxPathBuf;
+ service->getPath( str, &len, gIOServicePlane );
+ IOLog( "Got boot device = %s\n", str );
+
+ iostr = (OSString *) service->getProperty( kIOBSDNameKey );
+ if (iostr) {
+ strlcpy( rootName, iostr->getCStringNoCopy(), rootNameSize );
+ }
+ off = (OSNumber *) service->getProperty( kIOBSDMajorKey );
+ if (off) {
+ mjr = off->unsigned32BitValue();
+ }
+ off = (OSNumber *) service->getProperty( kIOBSDMinorKey );
+ if (off) {
+ mnr = off->unsigned32BitValue();
+ }
+
+ if (service->metaCast( "IONetworkInterface" )) {
+ flags |= 1;
+ }
+ } else {
+ IOLog( "Wait for root failed\n" );
+ strlcpy( rootName, "en0", rootNameSize );
+ flags |= 1;
+ }
+
+ IOLog( "BSD root: %s", rootName );
+ if (mjr) {
+ IOLog(", major %d, minor %d\n", mjr, mnr );
} else {
- matching = IOBSDNameMatching( look );
- }
- }
-
- if( !matching) {
- OSString * astring;
- // any HFS
- matching = IOService::serviceMatching( "IOMedia" );
- astring = OSString::withCStringNoCopy("Apple_HFS");
- if ( astring ) {
- matching->setObject("Content", astring);
- astring->release();
- }
- }
-
- if( true && matching) {
- OSSerialize * s = OSSerialize::withCapacity( 5 );
-
- if( matching->serialize( s )) {
- IOLog( "Waiting on %s\n", s->text() );
- s->release();
- }
- }
-
- do {
- t.tv_sec = ROOTDEVICETIMEOUT;
- t.tv_nsec = 0;
- matching->retain();
- service = IOService::waitForService( matching, &t );
- if( (!service) || (mountAttempts == 10)) {
- PE_display_icon( 0, "noroot");
- IOLog( "Still waiting for root device\n" );
-
- if( !debugInfoPrintedOnce) {
- debugInfoPrintedOnce = true;
- if( gIOKitDebug & kIOLogDTree) {
- IOLog("\nDT plane:\n");
- IOPrintPlane( gIODTPlane );
- }
- if( gIOKitDebug & kIOLogServiceTree) {
- IOLog("\nService plane:\n");
- IOPrintPlane( gIOServicePlane );
- }
- if( gIOKitDebug & kIOLogMemory)
- IOPrintMemory();
- }
- }
- } while( !service);
- matching->release();
-
- if ( service && findHFSChild ) {
- bool waiting = true;
- // wait for children services to finish registering
- while ( waiting ) {
- t.tv_sec = ROOTDEVICETIMEOUT;
- t.tv_nsec = 0;
- if ( service->waitQuiet( &t ) == kIOReturnSuccess ) {
- waiting = false;
- } else {
- IOLog( "Waiting for child registration\n" );
- }
- }
- // look for a subservice with an Apple_HFS child
- IOService * subservice = IOFindMatchingChild( service );
- if ( subservice ) service = subservice;
- }
-
- major = 0;
- minor = 0;
-
- // If the IOService we matched to is a subclass of IONetworkInterface,
- // then make sure it has been registered with BSD and has a BSD name
- // assigned.
-
- if ( service
- && service->metaCast( "IONetworkInterface" )
- && !IORegisterNetworkInterface( service ) )
- {
- service = 0;
- }
-
- if( service) {
-
- len = kMaxPathBuf;
- service->getPath( str, &len, gIOServicePlane );
- IOLog( "Got boot device = %s\n", str );
-
- iostr = (OSString *) service->getProperty( kIOBSDNameKey );
- if( iostr)
- strcpy( rootName, iostr->getCStringNoCopy() );
- off = (OSNumber *) service->getProperty( kIOBSDMajorKey );
- if( off)
- major = off->unsigned32BitValue();
- off = (OSNumber *) service->getProperty( kIOBSDMinorKey );
- if( off)
- minor = off->unsigned32BitValue();
-
- if( service->metaCast( "IONetworkInterface" ))
- flags |= 1;
-
- } else {
-
- IOLog( "Wait for root failed\n" );
- strcpy( rootName, "en0");
- flags |= 1;
- }
-
- IOLog( "BSD root: %s", rootName );
- if( major)
- IOLog(", major %d, minor %d\n", major, minor );
- else
- IOLog("\n");
-
- *root = makedev( major, minor );
- *oflags = flags;
-
- IOFree( str, kMaxPathBuf + kMaxBootVar );
+ IOLog("\n");
+ }
+
+ *root = makedev( mjr, mnr );
+ *oflags = flags;
+
+ IOFree( str, kMaxPathBuf + kMaxBootVar );
iofrootx:
- if( (gIOKitDebug & (kIOLogDTree | kIOLogServiceTree | kIOLogMemory)) && !debugInfoPrintedOnce) {
-
- IOService::getPlatform()->waitQuiet();
- if( gIOKitDebug & kIOLogDTree) {
- IOLog("\nDT plane:\n");
- IOPrintPlane( gIODTPlane );
- }
- if( gIOKitDebug & kIOLogServiceTree) {
- IOLog("\nService plane:\n");
- IOPrintPlane( gIOServicePlane );
- }
- if( gIOKitDebug & kIOLogMemory)
- IOPrintMemory();
- }
-
- return( kIOReturnSuccess );
+ if ((gIOKitDebug & (kIOLogDTree | kIOLogServiceTree | kIOLogMemory)) && !debugInfoPrintedOnce) {
+ IOService::getPlatform()->waitQuiet();
+ if (gIOKitDebug & kIOLogDTree) {
+ IOLog("\nDT plane:\n");
+ IOPrintPlane( gIODTPlane );
+ }
+ if (gIOKitDebug & kIOLogServiceTree) {
+ IOLog("\nService plane:\n");
+ IOPrintPlane( gIOServicePlane );
+ }
+ if (gIOKitDebug & kIOLogMemory) {
+ IOPrintMemory();
+ }
+ }
+
+ return kIOReturnSuccess;
+}
+
+bool
+IORamDiskBSDRoot(void)
+{
+ char rdBootVar[kMaxBootVar];
+ if (PE_parse_boot_argn("rd", rdBootVar, kMaxBootVar )
+ || PE_parse_boot_argn("rootdev", rdBootVar, kMaxBootVar )) {
+ if ((rdBootVar[0] == 'm') && (rdBootVar[1] == 'd') && (rdBootVar[3] == 0)) {
+ return true;
+ }
+ }
+ return false;
+}
+
+void
+IOSecureBSDRoot(const char * rootName)
+{
+#if CONFIG_SECURE_BSD_ROOT
+ IOReturn result;
+ IOPlatformExpert *pe;
+ OSDictionary *matching;
+ const OSSymbol *functionName = OSSymbol::withCStringNoCopy("SecureRootName");
+
+ matching = IOService::serviceMatching("IOPlatformExpert");
+ assert(matching);
+ pe = (IOPlatformExpert *) IOService::waitForMatchingService(matching, 30ULL * kSecondScale);
+ matching->release();
+ assert(pe);
+ // Returns kIOReturnNotPrivileged is the root device is not secure.
+ // Returns kIOReturnUnsupported if "SecureRootName" is not implemented.
+ result = pe->callPlatformFunction(functionName, false, (void *)rootName, (void *)NULL, (void *)NULL, (void *)NULL);
+ functionName->release();
+ OSSafeReleaseNULL(pe);
+
+ if (result == kIOReturnNotPrivileged) {
+ mdevremoveall();
+ }
+
+#endif // CONFIG_SECURE_BSD_ROOT
}
void *
IOBSDRegistryEntryForDeviceTree(char * path)
{
- return (IORegistryEntry::fromPath(path, gIODTPlane));
+ return IORegistryEntry::fromPath(path, gIODTPlane);
}
void
IOBSDRegistryEntryRelease(void * entry)
{
- IORegistryEntry * regEntry = (IORegistryEntry *)entry;
+ IORegistryEntry * regEntry = (IORegistryEntry *)entry;
- if (regEntry)
- regEntry->release();
- return;
+ if (regEntry) {
+ regEntry->release();
+ }
+ return;
}
const void *
-IOBSDRegistryEntryGetData(void * entry, char * property_name,
- int * packet_length)
+IOBSDRegistryEntryGetData(void * entry, char * property_name,
+ int * packet_length)
{
- OSData * data;
- IORegistryEntry * regEntry = (IORegistryEntry *)entry;
-
- data = (OSData *) regEntry->getProperty(property_name);
- if (data) {
- *packet_length = data->getLength();
- return (data->getBytesNoCopy());
- }
- return (NULL);
+ OSData * data;
+ IORegistryEntry * regEntry = (IORegistryEntry *)entry;
+
+ data = (OSData *) regEntry->getProperty(property_name);
+ if (data) {
+ *packet_length = data->getLength();
+ return data->getBytesNoCopy();
+ }
+ return NULL;
}
+kern_return_t
+IOBSDGetPlatformUUID( uuid_t uuid, mach_timespec_t timeout )
+{
+ IOService * resources;
+ OSString * string;
+
+ resources = IOService::waitForService( IOService::resourceMatching( kIOPlatformUUIDKey ), (timeout.tv_sec || timeout.tv_nsec) ? &timeout : NULL );
+ if (resources == NULL) {
+ return KERN_OPERATION_TIMED_OUT;
+ }
+
+ string = (OSString *) IOService::getPlatform()->getProvider()->getProperty( kIOPlatformUUIDKey );
+ if (string == NULL) {
+ return KERN_NOT_SUPPORTED;
+ }
+
+ uuid_parse( string->getCStringNoCopy(), uuid );
+
+ return KERN_SUCCESS;
+}
} /* extern "C" */
+
+/* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
+
+#include <sys/conf.h>
+#include <sys/vnode.h>
+#include <sys/vnode_internal.h>
+#include <sys/fcntl.h>
+#include <IOKit/IOPolledInterface.h>
+#include <IOKit/IOBufferMemoryDescriptor.h>
+
+IOPolledFileIOVars * gIOPolledCoreFileVars;
+kern_return_t gIOPolledCoreFileOpenRet = kIOReturnNotReady;
+IOPolledCoreFileMode_t gIOPolledCoreFileMode = kIOPolledCoreFileModeNotInitialized;
+
+#if IOPOLLED_COREFILE
+
+#if defined(XNU_TARGET_OS_BRIDGE)
+// On bridgeOS allocate a 150MB corefile and leave 150MB free
+#define kIOCoreDumpSize 150ULL*1024ULL*1024ULL
+#define kIOCoreDumpFreeSize 150ULL*1024ULL*1024ULL
+
+#elif !defined(XNU_TARGET_OS_OSX) /* defined(XNU_TARGET_OS_BRIDGE) */
+// On embedded devices with >3GB DRAM we allocate a 500MB corefile
+// otherwise allocate a 350MB corefile. Leave 350 MB free
+
+#define kIOCoreDumpMinSize 350ULL*1024ULL*1024ULL
+#define kIOCoreDumpLargeSize 500ULL*1024ULL*1024ULL
+
+#define kIOCoreDumpFreeSize 350ULL*1024ULL*1024ULL
+
+#else /* defined(XNU_TARGET_OS_BRIDGE) */
+// on macOS devices allocate a corefile sized at 1GB / 32GB of DRAM,
+// fallback to a 1GB corefile and leave at least 1GB free
+#define kIOCoreDumpMinSize 1024ULL*1024ULL*1024ULL
+#define kIOCoreDumpIncrementalSize 1024ULL*1024ULL*1024ULL
+
+#define kIOCoreDumpFreeSize 1024ULL*1024ULL*1024ULL
+
+// on older macOS devices we allocate a 1MB file at boot
+// to store a panic time stackshot
+#define kIOStackshotFileSize 1024ULL*1024ULL
+
+#endif /* defined(XNU_TARGET_OS_BRIDGE) */
+
+static IOPolledCoreFileMode_t
+GetCoreFileMode()
+{
+ if (on_device_corefile_enabled()) {
+ return kIOPolledCoreFileModeCoredump;
+ } else if (panic_stackshot_to_disk_enabled()) {
+ return kIOPolledCoreFileModeStackshot;
+ } else {
+ return kIOPolledCoreFileModeDisabled;
+ }
+}
+
+static void
+IOCoreFileGetSize(uint64_t *ideal_size, uint64_t *fallback_size, uint64_t *free_space_to_leave, IOPolledCoreFileMode_t mode)
+{
+ unsigned int requested_corefile_size = 0;
+
+ *ideal_size = *fallback_size = *free_space_to_leave = 0;
+
+#if defined(XNU_TARGET_OS_BRIDGE)
+#pragma unused(mode)
+ *ideal_size = *fallback_size = kIOCoreDumpSize;
+ *free_space_to_leave = kIOCoreDumpFreeSize;
+#elif !defined(XNU_TARGET_OS_OSX) /* defined(XNU_TARGET_OS_BRIDGE) */
+#pragma unused(mode)
+ *ideal_size = *fallback_size = kIOCoreDumpMinSize;
+
+ if (max_mem > (3 * 1024ULL * 1024ULL * 1024ULL)) {
+ *ideal_size = kIOCoreDumpLargeSize;
+ }
+
+ *free_space_to_leave = kIOCoreDumpFreeSize;
+#else /* defined(XNU_TARGET_OS_BRIDGE) */
+ if (mode == kIOPolledCoreFileModeCoredump) {
+ *ideal_size = *fallback_size = kIOCoreDumpMinSize;
+ if (kIOCoreDumpIncrementalSize != 0 && max_mem > (32 * 1024ULL * 1024ULL * 1024ULL)) {
+ *ideal_size = ((ROUNDUP(max_mem, (32 * 1024ULL * 1024ULL * 1024ULL)) / (32 * 1024ULL * 1024ULL * 1024ULL)) * kIOCoreDumpIncrementalSize);
+ }
+ *free_space_to_leave = kIOCoreDumpFreeSize;
+ } else if (mode == kIOPolledCoreFileModeStackshot) {
+ *ideal_size = *fallback_size = *free_space_to_leave = kIOStackshotFileSize;
+ }
+#endif /* defined(XNU_TARGET_OS_BRIDGE) */
+ // If a custom size was requested, override the ideal and requested sizes
+ if (PE_parse_boot_argn("corefile_size_mb", &requested_corefile_size, sizeof(requested_corefile_size))) {
+ IOLog("Boot-args specify %d MB kernel corefile\n", requested_corefile_size);
+
+ *ideal_size = *fallback_size = (requested_corefile_size * 1024ULL * 1024ULL);
+ }
+
+ return;
+}
+
+static void
+IOOpenPolledCoreFile(thread_call_param_t __unused, thread_call_param_t corefilename)
+{
+ assert(corefilename != NULL);
+
+ IOReturn err;
+ char *filename = (char *) corefilename;
+ uint64_t corefile_size_bytes = 0, corefile_fallback_size_bytes = 0, free_space_to_leave_bytes = 0;
+ IOPolledCoreFileMode_t mode_to_init = GetCoreFileMode();
+
+ if (gIOPolledCoreFileVars) {
+ return;
+ }
+ if (!IOPolledInterface::gMetaClass.getInstanceCount()) {
+ return;
+ }
+
+ if (mode_to_init == kIOPolledCoreFileModeDisabled) {
+ gIOPolledCoreFileMode = kIOPolledCoreFileModeDisabled;
+ return;
+ }
+
+ // We'll overwrite this once we open the file, we update this to mark that we have made
+ // it past initialization
+ gIOPolledCoreFileMode = kIOPolledCoreFileModeClosed;
+
+ IOCoreFileGetSize(&corefile_size_bytes, &corefile_fallback_size_bytes, &free_space_to_leave_bytes, mode_to_init);
+
+ do {
+ err = IOPolledFileOpen(filename, kIOPolledFileCreate, corefile_size_bytes, free_space_to_leave_bytes,
+ NULL, 0, &gIOPolledCoreFileVars, NULL, NULL, NULL);
+ if (kIOReturnSuccess == err) {
+ break;
+ } else if (kIOReturnNoSpace == err) {
+ IOLog("Failed to open corefile of size %llu MB (low disk space)",
+ (corefile_size_bytes / (1024ULL * 1024ULL)));
+ if (corefile_size_bytes == corefile_fallback_size_bytes) {
+ gIOPolledCoreFileOpenRet = err;
+ return;
+ }
+ } else {
+ IOLog("Failed to open corefile of size %llu MB (returned error 0x%x)\n",
+ (corefile_size_bytes / (1024ULL * 1024ULL)), err);
+ gIOPolledCoreFileOpenRet = err;
+ return;
+ }
+
+ err = IOPolledFileOpen(filename, kIOPolledFileCreate, corefile_fallback_size_bytes, free_space_to_leave_bytes,
+ NULL, 0, &gIOPolledCoreFileVars, NULL, NULL, NULL);
+ if (kIOReturnSuccess != err) {
+ IOLog("Failed to open corefile of size %llu MB (returned error 0x%x)\n",
+ (corefile_fallback_size_bytes / (1024ULL * 1024ULL)), err);
+ gIOPolledCoreFileOpenRet = err;
+ return;
+ }
+ } while (false);
+
+ gIOPolledCoreFileOpenRet = IOPolledFilePollersSetup(gIOPolledCoreFileVars, kIOPolledPreflightCoreDumpState);
+ if (kIOReturnSuccess != gIOPolledCoreFileOpenRet) {
+ IOPolledFileClose(&gIOPolledCoreFileVars, 0, NULL, 0, 0, 0);
+ IOLog("IOPolledFilePollersSetup for corefile failed with error: 0x%x\n", err);
+ } else {
+ IOLog("Opened corefile of size %llu MB\n", (corefile_size_bytes / (1024ULL * 1024ULL)));
+ gIOPolledCoreFileMode = mode_to_init;
+ }
+
+ return;
+}
+
+static void
+IOClosePolledCoreFile(void)
+{
+ gIOPolledCoreFileOpenRet = kIOReturnNotOpen;
+ gIOPolledCoreFileMode = kIOPolledCoreFileModeClosed;
+ IOPolledFilePollersClose(gIOPolledCoreFileVars, kIOPolledPostflightCoreDumpState);
+ IOPolledFileClose(&gIOPolledCoreFileVars, 0, NULL, 0, 0, 0);
+}
+
+#endif /* IOPOLLED_COREFILE */
+
+extern "C" void
+IOBSDMountChange(struct mount * mp, uint32_t op)
+{
+#if IOPOLLED_COREFILE
+ uint64_t flags;
+ char path[128];
+ int pathLen;
+ vnode_t vn;
+ int result;
+
+ switch (op) {
+ case kIOMountChangeMount:
+ case kIOMountChangeDidResize:
+
+ if (gIOPolledCoreFileVars) {
+ break;
+ }
+ flags = vfs_flags(mp);
+ if (MNT_RDONLY & flags) {
+ break;
+ }
+ if (!(MNT_LOCAL & flags)) {
+ break;
+ }
+
+ vn = vfs_vnodecovered(mp);
+ if (!vn) {
+ break;
+ }
+ pathLen = sizeof(path);
+ result = vn_getpath(vn, &path[0], &pathLen);
+ vnode_put(vn);
+ if (0 != result) {
+ break;
+ }
+ if (!pathLen) {
+ break;
+ }
+#if defined(XNU_TARGET_OS_BRIDGE)
+ // on bridgeOS systems we put the core in /private/var/internal. We don't
+ // want to match with /private/var because /private/var/internal is often mounted
+ // over /private/var
+ if ((pathLen - 1) < (int) strlen("/private/var/internal")) {
+ break;
+ }
+#endif
+ if (0 != strncmp(path, kIOCoreDumpPath, pathLen - 1)) {
+ break;
+ }
+
+ thread_call_enter1(corefile_open_call, (void *) kIOCoreDumpPath);
+ break;
+
+ case kIOMountChangeUnmount:
+ case kIOMountChangeWillResize:
+ if (gIOPolledCoreFileVars && (mp == kern_file_mount(gIOPolledCoreFileVars->fileRef))) {
+ thread_call_cancel_wait(corefile_open_call);
+ IOClosePolledCoreFile();
+ }
+ break;
+ }
+#endif /* IOPOLLED_COREFILE */
+}
+
+/* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
+
+extern "C" boolean_t
+IOTaskHasEntitlement(task_t task, const char * entitlement)
+{
+ OSObject * obj;
+ obj = IOUserClient::copyClientEntitlement(task, entitlement);
+ if (!obj) {
+ return false;
+ }
+ obj->release();
+ return obj != kOSBooleanFalse;
+}
+
+extern "C" boolean_t
+IOVnodeHasEntitlement(vnode_t vnode, int64_t off, const char *entitlement)
+{
+ OSObject * obj;
+ off_t offset = (off_t)off;
+
+ obj = IOUserClient::copyClientEntitlementVnode(vnode, offset, entitlement);
+ if (!obj) {
+ return false;
+ }
+ obj->release();
+ return obj != kOSBooleanFalse;
+}
+
+extern "C" char *
+IOVnodeGetEntitlement(vnode_t vnode, int64_t off, const char *entitlement)
+{
+ OSObject *obj = NULL;
+ OSString *str = NULL;
+ size_t len;
+ char *value = NULL;
+ off_t offset = (off_t)off;
+
+ obj = IOUserClient::copyClientEntitlementVnode(vnode, offset, entitlement);
+ if (obj != NULL) {
+ str = OSDynamicCast(OSString, obj);
+ if (str != NULL) {
+ len = str->getLength() + 1;
+ value = (char *)kheap_alloc(KHEAP_DATA_BUFFERS, len, Z_WAITOK);
+ strlcpy(value, str->getCStringNoCopy(), len);
+ }
+ obj->release();
+ }
+ return value;
+}