]> git.saurik.com Git - apple/xnu.git/blame - bsd/sys/systm.h
xnu-6153.41.3.tar.gz
[apple/xnu.git] / bsd / sys / systm.h
CommitLineData
1c79356b 1/*
2d21ac55 2 * Copyright (c) 2000-2007 Apple Inc. All rights reserved.
5d5c5d0d 3 *
2d21ac55 4 * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
0a7de745 5 *
2d21ac55
A
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. The rights granted to you under the License
10 * may not be used to create, or enable the creation or redistribution of,
11 * unlawful or unlicensed copies of an Apple operating system, or to
12 * circumvent, violate, or enable the circumvention or violation of, any
13 * terms of an Apple operating system software license agreement.
0a7de745 14 *
2d21ac55
A
15 * Please obtain a copy of the License at
16 * http://www.opensource.apple.com/apsl/ and read it before using this file.
0a7de745 17 *
2d21ac55
A
18 * The Original Code and all software distributed under the License are
19 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
8f6c56a5
A
20 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
21 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
2d21ac55
A
22 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
23 * Please see the License for the specific language governing rights and
24 * limitations under the License.
0a7de745 25 *
2d21ac55 26 * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
1c79356b
A
27 */
28/* Copyright (c) 1995 NeXT Computer, Inc. All Rights Reserved */
29/*-
30 * Copyright (c) 1982, 1988, 1991, 1993
31 * The Regents of the University of California. All rights reserved.
32 * (c) UNIX System Laboratories, Inc.
33 * All or some portions of this file are derived from material licensed
34 * to the University of California by American Telephone and Telegraph
35 * Co. or Unix System Laboratories, Inc. and are reproduced herein with
36 * the permission of UNIX System Laboratories, Inc.
37 *
38 * Redistribution and use in source and binary forms, with or without
39 * modification, are permitted provided that the following conditions
40 * are met:
41 * 1. Redistributions of source code must retain the above copyright
42 * notice, this list of conditions and the following disclaimer.
43 * 2. Redistributions in binary form must reproduce the above copyright
44 * notice, this list of conditions and the following disclaimer in the
45 * documentation and/or other materials provided with the distribution.
46 * 3. All advertising materials mentioning features or use of this software
47 * must display the following acknowledgement:
48 * This product includes software developed by the University of
49 * California, Berkeley and its contributors.
50 * 4. Neither the name of the University nor the names of its contributors
51 * may be used to endorse or promote products derived from this software
52 * without specific prior written permission.
53 *
54 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
55 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
56 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
57 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
58 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
59 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
60 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
61 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
62 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
63 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
64 * SUCH DAMAGE.
65 *
66 * @(#)systm.h 8.7 (Berkeley) 3/29/95
67 */
0a7de745 68
1c79356b
A
69/*
70 * The `securelevel' variable controls the security level of the system.
71 * It can only be decreased by process 1 (/sbin/init).
72 *
73 * Security levels are as follows:
74 * -1 permannently insecure mode - always run system in level 0 mode.
75 * 0 insecure mode - immutable and append-only flags make be turned off.
76 * All devices may be read or written subject to permission modes.
77 * 1 secure mode - immutable and append-only flags may not be changed;
78 * raw disks of mounted filesystems, /dev/mem, and /dev/kmem are
79 * read-only.
80 * 2 highly secure mode - same as (1) plus raw disks are always
0a7de745 81 * read-only whether mounted or not. This level precludes tampering
1c79356b
A
82 * with filesystems by unmounting them, but also inhibits running
83 * newfs while the system is secured.
84 *
85 * In normal operation, the system runs in level 0 mode while single user
86 * and in level 1 mode while multiuser. If level 2 mode is desired while
87 * running multiuser, it can be set in the multiuser startup script
88 * (/etc/rc.local) using sysctl(1). If it is desired to run the system
89 * in level 0 mode while multiuser, initialize the variable securelevel
90 * in /sys/kern/kern_sysctl.c to -1. Note that it is NOT initialized to
91 * zero as that would allow the vmunix binary to be patched to -1.
92 * Without initialization, securelevel loads in the BSS area which only
93 * comes into existence when the kernel is loaded and hence cannot be
94 * patched by a stalking hacker.
95 */
96
97#ifndef _SYS_SYSTM_H_
0a7de745 98#define _SYS_SYSTM_H_
1c79356b 99
9bccf70c 100#include <sys/appleapiopts.h>
1c79356b 101#include <sys/cdefs.h>
1c79356b
A
102#include <sys/types.h>
103#include <sys/time.h>
91447636
A
104#include <sys/ioctl.h>
105#include <sys/malloc.h>
106#ifdef BSD_KERNEL_PRIVATE
1c79356b
A
107#include <sys/tty.h>
108#include <sys/vm.h>
91447636
A
109#endif
110#include <sys/proc.h>
1c79356b 111__BEGIN_DECLS
91447636
A
112#ifdef KERNEL
113#include <libkern/libkern.h>
114#endif
1c79356b 115#include <kern/thread.h>
91447636 116#include <kern/debug.h>
1c79356b
A
117__END_DECLS
118
91447636 119#ifdef BSD_KERNEL_PRIVATE
0a7de745
A
120extern char version[]; /* system version */
121extern const char copyright[]; /* system copyright */
1c79356b 122
1c79356b 123
0a7de745
A
124extern int boothowto; /* reboot flags, from console subsystem */
125extern int show_space;
126extern int minimalboot;
5ba3f43e 127#if CONFIG_EMBEDDED
0a7de745 128extern int darkboot;
5ba3f43e 129#endif
1c79356b 130
39037602
A
131extern const int nblkdev; /* number of entries in bdevsw */
132extern const int nchrdev; /* number of entries in cdevsw */
91447636 133#endif /* BSD_KERNEL_PRIVATE */
9bccf70c 134
91447636 135#ifdef KERNEL_PRIVATE
9bccf70c 136
0a7de745
A
137extern int securelevel; /* system security level */
138extern dev_t rootdev; /* root device */
139extern struct vnode *rootvp; /* vnode equivalent to above */
b0d623f7 140
91447636 141#endif /* KERNEL_PRIVATE */
1c79356b 142
0a7de745
A
143#define SYSINIT(a, b, c, d, e)
144#define MALLOC_DEFINE(a, b, c)
1c79356b 145
0a7de745
A
146#define getenv_int(a, b) (*b = 0)
147#define KASSERT(exp, msg)
1c79356b
A
148/*
149 * General function declarations.
150 */
151__BEGIN_DECLS
91447636
A
152
153#ifdef BSD_KERNEL_PRIVATE
0a7de745
A
154int einval(void);
155void nullsys(void);
156int errsys(void);
157int seltrue(dev_t dev, int which, struct proc *p);
158void ttyprintf(struct tty *, const char *, ...) __printflike(2, 3);
159void realitexpire(struct proc *);
160int hzto(struct timeval *tv);
161void tablefull(const char *);
162int kvprintf(char const *, void (*)(int, void*), void *, int,
163 __darwin_va_list) __printflike(1, 0);
164void uprintf(const char *, ...) __printflike(1, 2);
165int copywithin(void *saddr, void *daddr, size_t len);
166int64_t fulong(user_addr_t addr);
167int sulong(user_addr_t addr, int64_t longword);
91447636 168uint64_t fuulong(user_addr_t addr);
0a7de745
A
169int suulong(user_addr_t addr, uint64_t ulongword);
170int clone_system_shared_regions(int shared_regions_active,
171 int chain_regions,
172 int base_vnode);
2d21ac55 173extern kern_return_t bsd_exception(int, mach_exception_data_t codes, int);
0a7de745 174extern void bsdinit_task(void);
2d21ac55 175extern void unix_syscall_return(int) __dead2;
0a7de745
A
176void initclocks(void);
177void startprofclock(struct proc *);
178void stopprofclock(struct proc *);
179void setstatclockrate(int hzrate);
91447636 180struct time_value;
0a7de745
A
181void get_procrustime(struct time_value *tv);
182void load_init_program(struct proc *p);
2d21ac55 183void __pthread_testcancel(int presyscall);
e2fac8b1
A
184void throttle_info_get_last_io_time(mount_t mp, struct timeval *tv);
185void update_last_io_time(mount_t mp);
39037602 186void throttle_info_end_io(buf_t bp);
91447636 187#endif /* BSD_KERNEL_PRIVATE */
1c79356b 188
b0d623f7 189#ifdef KERNEL_PRIVATE
0a7de745
A
190void timeout(void (*)(void *), void *arg, int ticks);
191void timeout_with_leeway(void (*)(void *), void *arg, int ticks, int leeway_ticks);
192void untimeout(void (*)(void *), void *arg);
193int bsd_hostname(char *, int, int*);
194int vslock(user_addr_t addr, user_size_t len);
195int vsunlock(user_addr_t addr, user_size_t len, int dirtied);
b0d623f7 196#endif /* KERNEL_PRIVATE */
1c79356b 197
0a7de745
A
198int nullop(void);
199int nulldev(void);
200int enoioctl(void);
201int enosys(void);
202int enxio(void);
203int eopnotsupp(void);
204void *hashinit(int count, int type, u_long *hashmask);
205void ovbcopy(const void *from, void *to, size_t len);
206int fubyte(user_addr_t addr);
207int fuibyte(user_addr_t addr);
208int subyte(user_addr_t addr, int byte);
209int suibyte(user_addr_t addr, int byte);
b0d623f7
A
210long fuword(user_addr_t addr);
211long fuiword(user_addr_t addr);
212int suword(user_addr_t addr, long word);
213int suiword(user_addr_t addr, long word);
0a7de745
A
214#define fusize(_a) ((user_size_t)fulong(_a))
215#define susize(_a, _s) sulong((_a), (_s))
216#define fuptr(a) ((user_addr_t)fulong(_a)
217#define suptr(_a, _p) sulong((_a), (_p))
218int useracc(user_addr_t addr, user_size_t len, int prot);
b0d623f7 219typedef void (*timeout_fcn_t)(void *);
0a7de745
A
220void bsd_timeout(void (*)(void *), void *arg, struct timespec * ts);
221void bsd_untimeout(void (*)(void *), void *arg);
222void set_fsblocksize(struct vnode *);
b0d623f7 223uint64_t tvtoabstime(struct timeval *);
4bd07ac2 224uint64_t tstoabstime(struct timespec *);
0a7de745
A
225void *throttle_info_create(void);
226void throttle_info_mount_ref(mount_t mp, void * throttle_info);
227void throttle_info_mount_rel(mount_t mp);
228void throttle_info_release(void *throttle_info);
229void throttle_info_update(void *throttle_info, int flags);
6d2010ae 230uint32_t throttle_lowpri_io(int sleep_amount);
cb323159
A
231/* returns TRUE if the throttle_lowpri_io called with the same sleep_amount would've slept */
232int throttle_lowpri_io_will_be_throttled(int sleep_amount);
0a7de745
A
233void throttle_set_thread_io_policy(int policy);
234int throttle_get_thread_effective_io_policy(void);
316670eb 235
6d2010ae 236typedef struct __throttle_info_handle *throttle_info_handle_t;
0a7de745
A
237int throttle_info_ref_by_mask(uint64_t throttle_mask, throttle_info_handle_t *throttle_info_handle);
238void throttle_info_rel_by_mask(throttle_info_handle_t throttle_info_handle);
239void throttle_info_update_by_mask(void *throttle_info_handle, int flags);
240void throttle_info_disable_throttle(int devno, boolean_t isfusion);
316670eb
A
241/*
242 * 'throttle_info_handle' acquired via 'throttle_info_ref_by_mask'
243 * 'policy' should be specified as either IOPOL_UTILITY or IPOL_THROTTLE,
244 * all other values will be treated as IOPOL_NORMAL (i.e. no throttling)
245 */
0a7de745 246int throttle_info_io_will_be_throttled(void *throttle_info_handle, int policy);
316670eb 247
39037602
A
248#ifdef KERNEL_PRIVATE
249
250/* returned by throttle_io_will_be_throttled */
0a7de745
A
251#define THROTTLE_DISENGAGED 0
252#define THROTTLE_ENGAGED 1
253#define THROTTLE_NOW 2
39037602
A
254
255int throttle_io_will_be_throttled(int lowpri_window_msecs, mount_t mp);
256int throttle_lowpri_window(void) __attribute__((pure));
257struct uthread;
258void throttle_info_reset_window(struct uthread *ut);
259
260#endif
261
39236c6e
A
262#ifdef XNU_KERNEL_PRIVATE
263void *exec_spawnattr_getmacpolicyinfo(const void *macextensions, const char *policyname, size_t *lenp);
264#endif
265
266#ifdef BSD_KERNEL_PRIVATE
267
d9a64523 268void sys_override_io_throttle(boolean_t enable_override);
39236c6e
A
269
270#endif /* BSD_KERNEL_PRIVATE */
271
1c79356b
A
272__END_DECLS
273
274#endif /* !_SYS_SYSTM_H_ */