mirror of
https://github.com/darlinghq/darling-xnu.git
synced 2024-11-27 06:20:34 +00:00
784 lines
25 KiB
C++
784 lines
25 KiB
C++
/*
|
|
* Copyright (c) 2000-2012 Apple Inc. All rights reserved.
|
|
*
|
|
* @APPLE_OSREFERENCE_LICENSE_HEADER_START@
|
|
*
|
|
* This file contains Original Code and/or Modifications of Original Code
|
|
* as defined in and that are subject to the Apple Public Source License
|
|
* Version 2.0 (the 'License'). You may not use this file except in
|
|
* compliance with the License. The rights granted to you under the License
|
|
* may not be used to create, or enable the creation or redistribution of,
|
|
* unlawful or unlicensed copies of an Apple operating system, or to
|
|
* circumvent, violate, or enable the circumvention or violation of, any
|
|
* terms of an Apple operating system software license agreement.
|
|
*
|
|
* Please obtain a copy of the License at
|
|
* http://www.opensource.apple.com/apsl/ and read it before using this file.
|
|
*
|
|
* The Original Code and all software distributed under the License are
|
|
* distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
|
|
* EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
|
|
* INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
|
|
* FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
|
|
* Please see the License for the specific language governing rights and
|
|
* limitations under the License.
|
|
*
|
|
* @APPLE_OSREFERENCE_LICENSE_HEADER_END@
|
|
*/
|
|
extern "C" {
|
|
#include <mach/kmod.h>
|
|
#include <libkern/kernel_mach_header.h>
|
|
#include <libkern/prelink.h>
|
|
#include <libkern/crypto/sha2.h>
|
|
}
|
|
|
|
#define IOKIT_ENABLE_SHARED_PTR
|
|
|
|
#include <libkern/version.h>
|
|
#include <libkern/c++/OSContainers.h>
|
|
#include <libkern/OSKextLibPrivate.h>
|
|
#include <libkern/c++/OSKext.h>
|
|
#include <IOKit/IOLib.h>
|
|
#include <IOKit/IOService.h>
|
|
#include <IOKit/IODeviceTreeSupport.h>
|
|
#include <IOKit/IOCatalogue.h>
|
|
|
|
#if __x86_64__
|
|
#define KASLR_KEXT_DEBUG 0
|
|
#endif
|
|
|
|
#if PRAGMA_MARK
|
|
#pragma mark Bootstrap Declarations
|
|
#endif
|
|
/*********************************************************************
|
|
* Bootstrap Declarations
|
|
*
|
|
* The ENTIRE point of the libsa/KLD segment is to isolate bootstrap
|
|
* code from other parts of the kernel, so function symbols are not
|
|
* exported; rather pointers to those functions are exported.
|
|
*
|
|
* xxx - need to think about locking for handling the 'weak' refs.
|
|
* xxx - do export a non-KLD function that says you've called a
|
|
* xxx - bootstrap function that has been removed.
|
|
*
|
|
* ALL call-ins to this segment of the kernel must be done through
|
|
* exported pointers. The symbols themselves are private and not to
|
|
* be linked against.
|
|
*********************************************************************/
|
|
extern "C" {
|
|
extern void (*record_startup_extensions_function)(void);
|
|
extern void (*load_security_extensions_function)(void);
|
|
};
|
|
|
|
static void bootstrapRecordStartupExtensions(void);
|
|
static void bootstrapLoadSecurityExtensions(void);
|
|
|
|
|
|
#if NO_KEXTD
|
|
extern "C" bool IORamDiskBSDRoot(void);
|
|
#endif
|
|
|
|
#if PRAGMA_MARK
|
|
#pragma mark Macros
|
|
#endif
|
|
/*********************************************************************
|
|
* Macros
|
|
*********************************************************************/
|
|
#define CONST_STRLEN(str) (sizeof(str) - 1)
|
|
|
|
#if PRAGMA_MARK
|
|
#pragma mark Kernel Component Kext Identifiers
|
|
#endif
|
|
/*********************************************************************
|
|
* Kernel Component Kext Identifiers
|
|
*
|
|
* We could have each kernel resource kext automatically "load" as
|
|
* it's created, but it's nicer to have them listed in kextstat in
|
|
* the order of this list. We'll walk through this after setting up
|
|
* all the boot kexts and have them load up.
|
|
*********************************************************************/
|
|
static const char * sKernelComponentNames[] = {
|
|
// The kexts for these IDs must have a version matching 'osrelease'.
|
|
"com.apple.kernel",
|
|
"com.apple.kpi.bsd",
|
|
"com.apple.kpi.dsep",
|
|
"com.apple.kpi.iokit",
|
|
"com.apple.kpi.kasan",
|
|
"com.apple.kpi.libkern",
|
|
"com.apple.kpi.mach",
|
|
"com.apple.kpi.private",
|
|
"com.apple.kpi.unsupported",
|
|
"com.apple.iokit.IONVRAMFamily",
|
|
"com.apple.driver.AppleNMI",
|
|
"com.apple.iokit.IOSystemManagementFamily",
|
|
"com.apple.iokit.ApplePlatformFamily",
|
|
NULL
|
|
};
|
|
|
|
#if PRAGMA_MARK
|
|
#pragma mark KLDBootstrap Class
|
|
#endif
|
|
/*********************************************************************
|
|
* KLDBootstrap Class
|
|
*
|
|
* We use a C++ class here so that it can be a friend of OSKext and
|
|
* get at private stuff. We can't hide the class itself, but we can
|
|
* hide the instance through which we invoke the functions.
|
|
*********************************************************************/
|
|
class KLDBootstrap {
|
|
friend void bootstrapRecordStartupExtensions(void);
|
|
friend void bootstrapLoadSecurityExtensions(void);
|
|
|
|
private:
|
|
void readStartupExtensions(void);
|
|
|
|
void readPrelinkedExtensions(kernel_mach_header_t *mh, kc_kind_t type);
|
|
void readBooterExtensions(void);
|
|
|
|
OSReturn loadKernelComponentKexts(void);
|
|
void loadKernelExternalComponents(void);
|
|
void readBuiltinPersonalities(void);
|
|
|
|
void loadSecurityExtensions(void);
|
|
|
|
public:
|
|
KLDBootstrap(void);
|
|
~KLDBootstrap(void);
|
|
};
|
|
|
|
LIBKERN_ALWAYS_DESTROY static KLDBootstrap sBootstrapObject;
|
|
|
|
/*********************************************************************
|
|
* Set the function pointers for the entry points into the bootstrap
|
|
* segment upon C++ static constructor invocation.
|
|
*********************************************************************/
|
|
KLDBootstrap::KLDBootstrap(void)
|
|
{
|
|
if (this != &sBootstrapObject) {
|
|
panic("Attempt to access bootstrap segment.");
|
|
}
|
|
record_startup_extensions_function = &bootstrapRecordStartupExtensions;
|
|
load_security_extensions_function = &bootstrapLoadSecurityExtensions;
|
|
}
|
|
|
|
/*********************************************************************
|
|
* Clear the function pointers for the entry points into the bootstrap
|
|
* segment upon C++ static destructor invocation.
|
|
*********************************************************************/
|
|
KLDBootstrap::~KLDBootstrap(void)
|
|
{
|
|
if (this != &sBootstrapObject) {
|
|
panic("Attempt to access bootstrap segment.");
|
|
}
|
|
|
|
|
|
record_startup_extensions_function = NULL;
|
|
load_security_extensions_function = NULL;
|
|
}
|
|
|
|
/*********************************************************************
|
|
*********************************************************************/
|
|
void
|
|
KLDBootstrap::readStartupExtensions(void)
|
|
{
|
|
kernel_section_t * prelinkInfoSect = NULL; // do not free
|
|
|
|
OSKextLog(/* kext */ NULL,
|
|
kOSKextLogProgressLevel |
|
|
kOSKextLogGeneralFlag | kOSKextLogDirectoryScanFlag |
|
|
kOSKextLogKextBookkeepingFlag,
|
|
"Reading startup extensions.");
|
|
|
|
kc_format_t kc_format;
|
|
kernel_mach_header_t *mh = &_mh_execute_header;
|
|
if (PE_get_primary_kc_format(&kc_format) && kc_format == KCFormatFileset) {
|
|
mh = (kernel_mach_header_t *)PE_get_kc_header(KCKindPrimary);
|
|
}
|
|
|
|
/* If the prelink info segment has a nonzero size, we are prelinked
|
|
* and won't have any individual kexts or mkexts to read.
|
|
* Otherwise, we need to read kexts or the mkext from what the booter
|
|
* has handed us.
|
|
*/
|
|
prelinkInfoSect = getsectbynamefromheader(mh, kPrelinkInfoSegment, kPrelinkInfoSection);
|
|
if (prelinkInfoSect->size) {
|
|
readPrelinkedExtensions(mh, KCKindPrimary);
|
|
} else {
|
|
readBooterExtensions();
|
|
}
|
|
|
|
kernel_mach_header_t *akc_mh;
|
|
akc_mh = (kernel_mach_header_t*)PE_get_kc_header(KCKindAuxiliary);
|
|
if (akc_mh) {
|
|
readPrelinkedExtensions(akc_mh, KCKindAuxiliary);
|
|
}
|
|
|
|
loadKernelComponentKexts();
|
|
loadKernelExternalComponents();
|
|
readBuiltinPersonalities();
|
|
OSKext::sendAllKextPersonalitiesToCatalog(true);
|
|
|
|
return;
|
|
}
|
|
|
|
/*********************************************************************
|
|
*********************************************************************/
|
|
void
|
|
KLDBootstrap::readPrelinkedExtensions(kernel_mach_header_t *mh, kc_kind_t type)
|
|
{
|
|
bool ret;
|
|
OSSharedPtr<OSData> loaded_kcUUID;
|
|
OSSharedPtr<OSString> errorString;
|
|
OSSharedPtr<OSObject> parsedXML;
|
|
kernel_section_t *infoPlistSection = NULL;
|
|
OSDictionary *infoDict = NULL; // do not release
|
|
|
|
OSKextLog(/* kext */ NULL,
|
|
kOSKextLogProgressLevel |
|
|
kOSKextLogDirectoryScanFlag | kOSKextLogArchiveFlag,
|
|
"Starting from prelinked kernel.");
|
|
|
|
/*
|
|
* The 'infoPlistSection' should contains an XML dictionary that
|
|
* contains some meta data about the KC, and also describes each kext
|
|
* included in the kext collection. Unserialize this dictionary and
|
|
* then iterate over each kext.
|
|
*/
|
|
infoPlistSection = getsectbynamefromheader(mh, kPrelinkInfoSegment, kPrelinkInfoSection);
|
|
parsedXML = OSUnserializeXML((const char *)infoPlistSection->addr, errorString);
|
|
if (parsedXML) {
|
|
infoDict = OSDynamicCast(OSDictionary, parsedXML.get());
|
|
}
|
|
|
|
if (!infoDict) {
|
|
const char *errorCString = "(unknown error)";
|
|
|
|
if (errorString && errorString->getCStringNoCopy()) {
|
|
errorCString = errorString->getCStringNoCopy();
|
|
} else if (parsedXML) {
|
|
errorCString = "not a dictionary";
|
|
}
|
|
OSKextLog(/* kext */ NULL, kOSKextLogErrorLevel | kOSKextLogArchiveFlag,
|
|
"Error unserializing kext info plist section: %s.", errorCString);
|
|
return;
|
|
}
|
|
|
|
/* Validate that the Kext Collection is prelinked to the loaded KC */
|
|
if (type == KCKindAuxiliary) {
|
|
if (OSKext::validateKCFileSetUUID(infoDict, KCKindAuxiliary) != 0) {
|
|
OSKextLog(/* kext */ NULL, kOSKextLogErrorLevel | kOSKextLogArchiveFlag,
|
|
"Early boot AuxKC doesn't appear to be linked against the loaded BootKC.");
|
|
return;
|
|
}
|
|
|
|
/*
|
|
* Defer further processing of the AuxKC, but keep the
|
|
* processed info dictionary around so we can ml_static_free
|
|
* the segment.
|
|
*/
|
|
if (!OSKext::registerDeferredKextCollection(mh, parsedXML, KCKindAuxiliary)) {
|
|
OSKextLog(/* kext */ NULL, kOSKextLogErrorLevel | kOSKextLogArchiveFlag,
|
|
"Error deferring AuxKC kext processing: Kexts in this collection will be unusable.");
|
|
}
|
|
goto skip_adding_kexts;
|
|
}
|
|
|
|
/*
|
|
* this function does all the heavy lifting of adding OSKext objects
|
|
* and potentially sliding them if necessary
|
|
*/
|
|
ret = OSKext::addKextsFromKextCollection(mh, infoDict,
|
|
kPrelinkTextSegment, loaded_kcUUID, (mh->filetype == MH_FILESET) ? type : KCKindUnknown);
|
|
|
|
if (!ret) {
|
|
OSKextLog(/* kext */ NULL, kOSKextLogErrorLevel | kOSKextLogArchiveFlag,
|
|
"Error loading kext info from prelinked primary KC");
|
|
return;
|
|
}
|
|
|
|
/* Copy in the kernelcache UUID */
|
|
if (!loaded_kcUUID) {
|
|
OSKextLog(/* kext */ NULL, kOSKextLogErrorLevel | kOSKextLogArchiveFlag,
|
|
"WARNING: did not find UUID in %s KC!", (type == KCKindAuxiliary) ? "Aux" : "Primary");
|
|
} else if (type != KCKindAuxiliary) {
|
|
kernelcache_uuid_valid = TRUE;
|
|
memcpy((void *)&kernelcache_uuid, (const void *)loaded_kcUUID->getBytesNoCopy(), loaded_kcUUID->getLength());
|
|
uuid_unparse_upper(kernelcache_uuid, kernelcache_uuid_string);
|
|
} else {
|
|
auxkc_uuid_valid = TRUE;
|
|
memcpy((void *)&auxkc_uuid, (const void *)loaded_kcUUID->getBytesNoCopy(), loaded_kcUUID->getLength());
|
|
uuid_unparse_upper(auxkc_uuid, auxkc_uuid_string);
|
|
}
|
|
|
|
skip_adding_kexts:
|
|
#if CONFIG_KEXT_BASEMENT
|
|
if (mh->filetype != MH_FILESET) {
|
|
/*
|
|
* On CONFIG_KEXT_BASEMENT systems which do _not_ boot the new
|
|
* MH_FILESET kext collection, kexts are copied to their own
|
|
* special VM region during OSKext init time, so we can free
|
|
* the whole segment now.
|
|
*/
|
|
kernel_segment_command_t *prelinkTextSegment = NULL;
|
|
prelinkTextSegment = getsegbyname(kPrelinkTextSegment);
|
|
if (!prelinkTextSegment) {
|
|
OSKextLog(/* kext */ NULL,
|
|
kOSKextLogErrorLevel | kOSKextLogArchiveFlag,
|
|
"Can't find prelinked kexts' text segment.");
|
|
return;
|
|
}
|
|
|
|
ml_static_mfree((vm_offset_t)prelinkTextSegment->vmaddr, prelinkTextSegment->vmsize);
|
|
}
|
|
#endif /* CONFIG_KEXT_BASEMENT */
|
|
|
|
/*
|
|
* Free the prelink info segment, we're done with it.
|
|
*/
|
|
kernel_segment_command_t *prelinkInfoSegment = NULL;
|
|
prelinkInfoSegment = getsegbyname(kPrelinkInfoSegment);
|
|
if (prelinkInfoSegment) {
|
|
ml_static_mfree((vm_offset_t)prelinkInfoSegment->vmaddr,
|
|
(vm_size_t)prelinkInfoSegment->vmsize);
|
|
}
|
|
|
|
return;
|
|
}
|
|
|
|
|
|
/*********************************************************************
|
|
*********************************************************************/
|
|
#define BOOTER_KEXT_PREFIX "Driver-"
|
|
|
|
typedef struct _DeviceTreeBuffer {
|
|
uint32_t paddr;
|
|
uint32_t length;
|
|
} _DeviceTreeBuffer;
|
|
|
|
void
|
|
KLDBootstrap::readBooterExtensions(void)
|
|
{
|
|
OSSharedPtr<IORegistryEntry> booterMemoryMap;
|
|
OSSharedPtr<OSDictionary> propertyDict;
|
|
OSSharedPtr<OSCollectionIterator> keyIterator;
|
|
OSString * deviceTreeName = NULL;// do not release
|
|
|
|
const _DeviceTreeBuffer * deviceTreeBuffer = NULL;// do not free
|
|
char * booterDataPtr = NULL;// do not free
|
|
OSSharedPtr<OSData> booterData;
|
|
OSSharedPtr<OSKext> aKext;
|
|
|
|
OSKextLog(/* kext */ NULL,
|
|
kOSKextLogProgressLevel |
|
|
kOSKextLogDirectoryScanFlag | kOSKextLogKextBookkeepingFlag,
|
|
"Reading startup extensions from booter memory.");
|
|
|
|
booterMemoryMap = IORegistryEntry::fromPath( "/chosen/memory-map", gIODTPlane);
|
|
|
|
if (!booterMemoryMap) {
|
|
OSKextLog(/* kext */ NULL,
|
|
kOSKextLogErrorLevel |
|
|
kOSKextLogGeneralFlag | kOSKextLogDirectoryScanFlag,
|
|
"Can't read booter memory map.");
|
|
goto finish;
|
|
}
|
|
|
|
propertyDict = booterMemoryMap->dictionaryWithProperties();
|
|
if (!propertyDict) {
|
|
OSKextLog(/* kext */ NULL,
|
|
kOSKextLogErrorLevel |
|
|
kOSKextLogDirectoryScanFlag,
|
|
"Can't get property dictionary from memory map.");
|
|
goto finish;
|
|
}
|
|
|
|
keyIterator = OSCollectionIterator::withCollection(propertyDict.get());
|
|
if (!keyIterator) {
|
|
OSKextLog(/* kext */ NULL,
|
|
kOSKextLogErrorLevel |
|
|
kOSKextLogGeneralFlag,
|
|
"Can't allocate iterator for driver images.");
|
|
goto finish;
|
|
}
|
|
|
|
/* Create dictionary of excluded kexts
|
|
*/
|
|
#ifndef CONFIG_EMBEDDED
|
|
OSKext::createExcludeListFromBooterData(propertyDict.get(), keyIterator.get());
|
|
#endif
|
|
// !! reset the iterator, not the pointer
|
|
keyIterator->reset();
|
|
|
|
while ((deviceTreeName =
|
|
OSDynamicCast(OSString, keyIterator->getNextObject()))) {
|
|
const char * devTreeNameCString = deviceTreeName->getCStringNoCopy();
|
|
OSData * deviceTreeEntry = OSDynamicCast(OSData,
|
|
propertyDict->getObject(deviceTreeName));
|
|
|
|
/* If there is no entry for the name, we can't do much with it. */
|
|
if (!deviceTreeEntry) {
|
|
continue;
|
|
}
|
|
|
|
/* Make sure it is a kext */
|
|
if (strncmp(devTreeNameCString,
|
|
BOOTER_KEXT_PREFIX,
|
|
CONST_STRLEN(BOOTER_KEXT_PREFIX))) {
|
|
continue;
|
|
}
|
|
|
|
deviceTreeBuffer = (const _DeviceTreeBuffer *)
|
|
deviceTreeEntry->getBytesNoCopy(0, sizeof(deviceTreeBuffer));
|
|
if (!deviceTreeBuffer) {
|
|
/* We can't get to the data, so we can't do anything,
|
|
* not even free it from physical memory (if it's there).
|
|
*/
|
|
OSKextLog(/* kext */ NULL,
|
|
kOSKextLogErrorLevel |
|
|
kOSKextLogDirectoryScanFlag,
|
|
"Device tree entry %s has NULL pointer.",
|
|
devTreeNameCString);
|
|
goto finish; // xxx - continue, panic?
|
|
}
|
|
|
|
booterDataPtr = (char *)ml_static_ptovirt(deviceTreeBuffer->paddr);
|
|
if (!booterDataPtr) {
|
|
OSKextLog(/* kext */ NULL,
|
|
kOSKextLogErrorLevel |
|
|
kOSKextLogDirectoryScanFlag,
|
|
"Can't get virtual address for device tree entry %s.",
|
|
devTreeNameCString);
|
|
goto finish;
|
|
}
|
|
|
|
/* Wrap the booter data buffer in an OSData and set a dealloc function
|
|
* so it will take care of the physical memory when freed. Kexts will
|
|
* retain the booterData for as long as they need it. Remove the entry
|
|
* from the booter memory map after this is done.
|
|
*/
|
|
booterData = OSData::withBytesNoCopy(booterDataPtr,
|
|
deviceTreeBuffer->length);
|
|
if (!booterData) {
|
|
OSKextLog(/* kext */ NULL,
|
|
kOSKextLogErrorLevel |
|
|
kOSKextLogGeneralFlag,
|
|
"Error - Can't allocate OSData wrapper for device tree entry %s.",
|
|
devTreeNameCString);
|
|
goto finish;
|
|
}
|
|
booterData->setDeallocFunction(osdata_phys_free);
|
|
|
|
/* Create the kext for the entry, then release it, because the
|
|
* kext system keeps them around until explicitly removed.
|
|
* Any creation/registration failures are already logged for us.
|
|
*/
|
|
OSSharedPtr<OSKext> newKext = OSKext::withBooterData(deviceTreeName, booterData.get());
|
|
|
|
booterMemoryMap->removeProperty(deviceTreeName);
|
|
} /* while ( (deviceTreeName = OSDynamicCast(OSString, ...) ) ) */
|
|
|
|
finish:
|
|
return;
|
|
}
|
|
|
|
/*********************************************************************
|
|
*********************************************************************/
|
|
#define COM_APPLE "com.apple."
|
|
|
|
void
|
|
KLDBootstrap::loadSecurityExtensions(void)
|
|
{
|
|
OSSharedPtr<OSDictionary> extensionsDict;
|
|
OSSharedPtr<OSCollectionIterator> keyIterator;
|
|
OSString * bundleID = NULL;// don't release
|
|
OSKext * theKext = NULL;// don't release
|
|
|
|
OSKextLog(/* kext */ NULL,
|
|
kOSKextLogStepLevel |
|
|
kOSKextLogLoadFlag,
|
|
"Loading security extensions.");
|
|
|
|
extensionsDict = OSKext::copyKexts();
|
|
if (!extensionsDict) {
|
|
return;
|
|
}
|
|
|
|
keyIterator = OSCollectionIterator::withCollection(extensionsDict.get());
|
|
if (!keyIterator) {
|
|
OSKextLog(/* kext */ NULL,
|
|
kOSKextLogErrorLevel |
|
|
kOSKextLogGeneralFlag,
|
|
"Failed to allocate iterator for security extensions.");
|
|
goto finish;
|
|
}
|
|
|
|
while ((bundleID = OSDynamicCast(OSString, keyIterator->getNextObject()))) {
|
|
const char * bundle_id = bundleID->getCStringNoCopy();
|
|
|
|
/* Skip extensions whose bundle IDs don't start with "com.apple.".
|
|
*/
|
|
if (!bundle_id ||
|
|
(strncmp(bundle_id, COM_APPLE, CONST_STRLEN(COM_APPLE)) != 0)) {
|
|
continue;
|
|
}
|
|
|
|
theKext = OSDynamicCast(OSKext, extensionsDict->getObject(bundleID));
|
|
if (!theKext) {
|
|
continue;
|
|
}
|
|
|
|
if (kOSBooleanTrue == theKext->getPropertyForHostArch(kAppleSecurityExtensionKey)) {
|
|
OSKextLog(/* kext */ NULL,
|
|
kOSKextLogStepLevel |
|
|
kOSKextLogLoadFlag,
|
|
"Loading security extension %s.", bundleID->getCStringNoCopy());
|
|
OSKext::loadKextWithIdentifier(bundleID->getCStringNoCopy(),
|
|
/* allowDefer */ false);
|
|
}
|
|
}
|
|
|
|
finish:
|
|
return;
|
|
}
|
|
|
|
/*********************************************************************
|
|
* We used to require that all listed kernel components load, but
|
|
* nowadays we can get them from userland so we only try to load the
|
|
* ones we have. If an error occurs later, such is life.
|
|
*
|
|
* Note that we look the kexts up first, so we can avoid spurious
|
|
* (in this context, anyhow) log messages about kexts not being found.
|
|
*
|
|
* xxx - do we even need to do this any more? Check if the kernel
|
|
* xxx - compoonents just load in the regular paths
|
|
*********************************************************************/
|
|
OSReturn
|
|
KLDBootstrap::loadKernelComponentKexts(void)
|
|
{
|
|
OSReturn result = kOSReturnSuccess;// optimistic
|
|
OSSharedPtr<OSKext> theKext;
|
|
const char ** kextIDPtr = NULL; // do not release
|
|
|
|
for (kextIDPtr = &sKernelComponentNames[0]; *kextIDPtr; kextIDPtr++) {
|
|
theKext = OSKext::lookupKextWithIdentifier(*kextIDPtr);
|
|
|
|
if (theKext) {
|
|
if (kOSReturnSuccess != OSKext::loadKextWithIdentifier(
|
|
*kextIDPtr, /* allowDefer */ false)) {
|
|
// xxx - check KextBookkeeping, might be redundant
|
|
OSKextLog(/* kext */ NULL,
|
|
kOSKextLogErrorLevel |
|
|
kOSKextLogDirectoryScanFlag | kOSKextLogKextBookkeepingFlag,
|
|
"Failed to initialize kernel component %s.", *kextIDPtr);
|
|
result = kOSReturnError;
|
|
}
|
|
}
|
|
}
|
|
|
|
return result;
|
|
}
|
|
|
|
/*********************************************************************
|
|
* Ensure that Kernel External Components are loaded early in boot,
|
|
* before other kext personalities get sent to the IOCatalogue. These
|
|
* kexts are treated specially because they may provide the implementation
|
|
* for kernel-vended KPI, so they must register themselves before
|
|
* general purpose IOKit probing begins.
|
|
*********************************************************************/
|
|
|
|
#define COM_APPLE_KEC "com.apple.kec."
|
|
|
|
void
|
|
KLDBootstrap::loadKernelExternalComponents(void)
|
|
{
|
|
OSSharedPtr<OSDictionary> extensionsDict;
|
|
OSSharedPtr<OSCollectionIterator> keyIterator;
|
|
OSString * bundleID = NULL;// don't release
|
|
OSKext * theKext = NULL;// don't release
|
|
OSBoolean * isKernelExternalComponent = NULL;// don't release
|
|
|
|
OSKextLog(/* kext */ NULL,
|
|
kOSKextLogStepLevel |
|
|
kOSKextLogLoadFlag,
|
|
"Loading Kernel External Components.");
|
|
|
|
extensionsDict = OSKext::copyKexts();
|
|
if (!extensionsDict) {
|
|
return;
|
|
}
|
|
|
|
keyIterator = OSCollectionIterator::withCollection(extensionsDict.get());
|
|
if (!keyIterator) {
|
|
OSKextLog(/* kext */ NULL,
|
|
kOSKextLogErrorLevel |
|
|
kOSKextLogGeneralFlag,
|
|
"Failed to allocate iterator for Kernel External Components.");
|
|
goto finish;
|
|
}
|
|
|
|
while ((bundleID = OSDynamicCast(OSString, keyIterator->getNextObject()))) {
|
|
const char * bundle_id = bundleID->getCStringNoCopy();
|
|
|
|
/* Skip extensions whose bundle IDs don't start with "com.apple.kec.".
|
|
*/
|
|
if (!bundle_id ||
|
|
(strncmp(bundle_id, COM_APPLE_KEC, CONST_STRLEN(COM_APPLE_KEC)) != 0)) {
|
|
continue;
|
|
}
|
|
|
|
theKext = OSDynamicCast(OSKext, extensionsDict->getObject(bundleID));
|
|
if (!theKext) {
|
|
continue;
|
|
}
|
|
|
|
isKernelExternalComponent = OSDynamicCast(OSBoolean,
|
|
theKext->getPropertyForHostArch(kAppleKernelExternalComponentKey));
|
|
if (isKernelExternalComponent && isKernelExternalComponent->isTrue()) {
|
|
OSKextLog(/* kext */ NULL,
|
|
kOSKextLogStepLevel |
|
|
kOSKextLogLoadFlag,
|
|
"Loading kernel external component %s.", bundleID->getCStringNoCopy());
|
|
OSKext::loadKextWithIdentifier(bundleID->getCStringNoCopy(),
|
|
/* allowDefer */ false);
|
|
}
|
|
}
|
|
|
|
finish:
|
|
return;
|
|
}
|
|
|
|
/*********************************************************************
|
|
*********************************************************************/
|
|
void
|
|
KLDBootstrap::readBuiltinPersonalities(void)
|
|
{
|
|
OSSharedPtr<OSObject> parsedXML;
|
|
OSArray * builtinExtensions = NULL;// do not release
|
|
OSSharedPtr<OSArray> allPersonalities;
|
|
OSSharedPtr<OSString> errorString;
|
|
kernel_section_t * infosect = NULL;// do not free
|
|
OSSharedPtr<OSCollectionIterator> personalitiesIterator;
|
|
unsigned int count, i;
|
|
|
|
OSKextLog(/* kext */ NULL,
|
|
kOSKextLogStepLevel |
|
|
kOSKextLogLoadFlag,
|
|
"Reading built-in kernel personalities for I/O Kit drivers.");
|
|
|
|
/* Look in the __BUILTIN __info segment for an array of Info.plist
|
|
* entries. For each one, extract the personalities dictionary, add
|
|
* it to our array, then push them all (without matching) to
|
|
* the IOCatalogue. This can be used to augment the personalities
|
|
* in gIOKernelConfigTables, especially when linking entire kexts into
|
|
* the mach_kernel image.
|
|
*/
|
|
infosect = getsectbyname("__BUILTIN", "__info");
|
|
if (!infosect) {
|
|
// this isn't fatal
|
|
goto finish;
|
|
}
|
|
|
|
parsedXML = OSUnserializeXML((const char *) (uintptr_t)infosect->addr,
|
|
errorString);
|
|
if (parsedXML) {
|
|
builtinExtensions = OSDynamicCast(OSArray, parsedXML.get());
|
|
}
|
|
if (!builtinExtensions) {
|
|
const char * errorCString = "(unknown error)";
|
|
|
|
if (errorString && errorString->getCStringNoCopy()) {
|
|
errorCString = errorString->getCStringNoCopy();
|
|
} else if (parsedXML) {
|
|
errorCString = "not an array";
|
|
}
|
|
OSKextLog(/* kext */ NULL,
|
|
kOSKextLogErrorLevel |
|
|
kOSKextLogLoadFlag,
|
|
"Error unserializing built-in personalities: %s.", errorCString);
|
|
goto finish;
|
|
}
|
|
|
|
// estimate 3 personalities per Info.plist/kext
|
|
count = builtinExtensions->getCount();
|
|
allPersonalities = OSArray::withCapacity(count * 3);
|
|
|
|
for (i = 0; i < count; i++) {
|
|
OSDictionary * infoDict = NULL;// do not release
|
|
OSString * moduleName = NULL;// do not release
|
|
OSDictionary * personalities;// do not release
|
|
OSString * personalityName;// do not release
|
|
|
|
infoDict = OSDynamicCast(OSDictionary,
|
|
builtinExtensions->getObject(i));
|
|
if (!infoDict) {
|
|
continue;
|
|
}
|
|
|
|
moduleName = OSDynamicCast(OSString,
|
|
infoDict->getObject(kCFBundleIdentifierKey));
|
|
if (!moduleName) {
|
|
continue;
|
|
}
|
|
|
|
OSKextLog(/* kext */ NULL,
|
|
kOSKextLogStepLevel |
|
|
kOSKextLogLoadFlag,
|
|
"Adding personalities for built-in driver %s:",
|
|
moduleName->getCStringNoCopy());
|
|
|
|
personalities = OSDynamicCast(OSDictionary,
|
|
infoDict->getObject("IOKitPersonalities"));
|
|
if (!personalities) {
|
|
continue;
|
|
}
|
|
|
|
personalitiesIterator = OSCollectionIterator::withCollection(personalities);
|
|
if (!personalitiesIterator) {
|
|
continue; // xxx - well really, what can we do? should we panic?
|
|
}
|
|
|
|
while ((personalityName = OSDynamicCast(OSString,
|
|
personalitiesIterator->getNextObject()))) {
|
|
OSDictionary * personality = OSDynamicCast(OSDictionary,
|
|
personalities->getObject(personalityName));
|
|
|
|
OSKextLog(/* kext */ NULL,
|
|
kOSKextLogDetailLevel |
|
|
kOSKextLogLoadFlag,
|
|
"Adding built-in driver personality %s.",
|
|
personalityName->getCStringNoCopy());
|
|
|
|
if (personality && !personality->getObject(kCFBundleIdentifierKey)) {
|
|
personality->setObject(kCFBundleIdentifierKey, moduleName);
|
|
}
|
|
allPersonalities->setObject(personality);
|
|
}
|
|
}
|
|
|
|
gIOCatalogue->addDrivers(allPersonalities.get(), false);
|
|
|
|
finish:
|
|
return;
|
|
}
|
|
|
|
#if PRAGMA_MARK
|
|
#pragma mark Bootstrap Functions
|
|
#endif
|
|
/*********************************************************************
|
|
* Bootstrap Functions
|
|
*********************************************************************/
|
|
static void
|
|
bootstrapRecordStartupExtensions(void)
|
|
{
|
|
sBootstrapObject.readStartupExtensions();
|
|
return;
|
|
}
|
|
|
|
static void
|
|
bootstrapLoadSecurityExtensions(void)
|
|
{
|
|
sBootstrapObject.loadSecurityExtensions();
|
|
return;
|
|
}
|
|
|