+/* Syscall data translations routines
+ *
+ * The kernel may support multiple userspace ABIs, and must use
+ * argument structures with elements large enough for any of them.
+ */
+#if CONFIG_REQUIRES_U32_MUNGING
+#define PAD_(t) (sizeof(uint64_t) <= sizeof(t) \
+ ? 0 : sizeof(uint64_t) - sizeof(t))
+#define PAD_ARG_8
+#else
+#define PAD_(t) (sizeof(uint32_t) <= sizeof(t) \
+ ? 0 : sizeof(uint32_t) - sizeof(t))
+#if __arm__ && (__BIGGEST_ALIGNMENT__ > 4)
+#define PAD_ARG_8
+#else
+#define PAD_ARG_8 char arg8_pad_[sizeof(uint32_t)];
+#endif
+#endif
+
+#if BYTE_ORDER == LITTLE_ENDIAN
+#define PADL_(t) 0
+#define PADR_(t) PAD_(t)
+#else
+#define PADL_(t) PAD_(t)
+#define PADR_(t) 0
+#endif
+
+#define PAD_ARG_(arg_type, arg_name) \
+ char arg_name##_l_[PADL_(arg_type)]; arg_type arg_name; char arg_name##_r_[PADR_(arg_type)]
+
+/*
+ * To support 32-bit clients as well as 64-bit clients, argument
+ * structures may need to be munged to repack the arguments. All
+ * active architectures do this inline in the code to dispatch Mach
+ * traps, without calling out to the BSD system call mungers.
+ */
+
+struct kern_invalid_args {
+ int32_t dummy;
+};
+extern kern_return_t kern_invalid(
+ struct kern_invalid_args *args);
+
+struct mach_reply_port_args {
+ int32_t dummy;
+};
+extern mach_port_name_t mach_reply_port(
+ struct mach_reply_port_args *args);
+
+struct thread_get_special_reply_port_args {
+ int32_t dummy;
+};
+extern mach_port_name_t thread_get_special_reply_port(
+ struct thread_get_special_reply_port_args *args);
+
+struct thread_self_trap_args {
+ int32_t dummy;
+};
+extern mach_port_name_t thread_self_trap(
+ struct thread_self_trap_args *args);
+
+struct task_self_trap_args {
+ int32_t dummy;
+};
+extern mach_port_name_t task_self_trap(
+ struct task_self_trap_args *args);
+
+struct host_self_trap_args {
+ int32_t dummy;
+};
+extern mach_port_name_t host_self_trap(
+ struct host_self_trap_args *args);
+
+struct mach_msg_overwrite_trap_args {
+ PAD_ARG_(user_addr_t, msg);
+ PAD_ARG_(mach_msg_option_t, option);
+ PAD_ARG_(mach_msg_size_t, send_size);
+ PAD_ARG_(mach_msg_size_t, rcv_size);
+ PAD_ARG_(mach_port_name_t, rcv_name);
+ PAD_ARG_(mach_msg_timeout_t, timeout);
+ PAD_ARG_(mach_msg_priority_t, priority);
+ PAD_ARG_8
+ PAD_ARG_(user_addr_t, rcv_msg); /* Unused on mach_msg_trap */
+};
+extern mach_msg_return_t mach_msg_trap(
+ struct mach_msg_overwrite_trap_args *args);
+extern mach_msg_return_t mach_msg_overwrite_trap(
+ struct mach_msg_overwrite_trap_args *args);
+
+struct semaphore_signal_trap_args {
+ PAD_ARG_(mach_port_name_t, signal_name);
+};
+extern kern_return_t semaphore_signal_trap(
+ struct semaphore_signal_trap_args *args);
+
+struct semaphore_signal_all_trap_args {
+ PAD_ARG_(mach_port_name_t, signal_name);
+};
+extern kern_return_t semaphore_signal_all_trap(
+ struct semaphore_signal_all_trap_args *args);
+
+struct semaphore_signal_thread_trap_args {
+ PAD_ARG_(mach_port_name_t, signal_name);
+ PAD_ARG_(mach_port_name_t, thread_name);
+};
+extern kern_return_t semaphore_signal_thread_trap(
+ struct semaphore_signal_thread_trap_args *args);
+
+struct semaphore_wait_trap_args {
+ PAD_ARG_(mach_port_name_t, wait_name);
+};
+extern kern_return_t semaphore_wait_trap(
+ struct semaphore_wait_trap_args *args);
+
+struct semaphore_wait_signal_trap_args {
+ PAD_ARG_(mach_port_name_t, wait_name);
+ PAD_ARG_(mach_port_name_t, signal_name);
+};
+extern kern_return_t semaphore_wait_signal_trap(
+ struct semaphore_wait_signal_trap_args *args);
+
+struct semaphore_timedwait_trap_args {
+ PAD_ARG_(mach_port_name_t, wait_name);
+ PAD_ARG_(unsigned int, sec);
+ PAD_ARG_(clock_res_t, nsec);
+};
+extern kern_return_t semaphore_timedwait_trap(
+ struct semaphore_timedwait_trap_args *args);
+
+struct semaphore_timedwait_signal_trap_args {
+ PAD_ARG_(mach_port_name_t, wait_name);
+ PAD_ARG_(mach_port_name_t, signal_name);
+ PAD_ARG_(unsigned int, sec);
+ PAD_ARG_(clock_res_t, nsec);
+};
+extern kern_return_t semaphore_timedwait_signal_trap(
+ struct semaphore_timedwait_signal_trap_args *args);
+
+struct task_for_pid_args {
+ PAD_ARG_(mach_port_name_t, target_tport);
+ PAD_ARG_(int, pid);
+ PAD_ARG_(user_addr_t, t);
+};
+extern kern_return_t task_for_pid(
+ struct task_for_pid_args *args);
+
+struct task_name_for_pid_args {
+ PAD_ARG_(mach_port_name_t, target_tport);
+ PAD_ARG_(int, pid);
+ PAD_ARG_(user_addr_t, t);
+};
+extern kern_return_t task_name_for_pid(
+ struct task_name_for_pid_args *args);
+
+struct pid_for_task_args {
+ PAD_ARG_(mach_port_name_t, t);
+ PAD_ARG_(user_addr_t, pid);
+};
+extern kern_return_t pid_for_task(
+ struct pid_for_task_args *args);
+
+struct debug_control_port_for_pid_args {
+ PAD_ARG_(mach_port_name_t, target_tport);
+ PAD_ARG_(int, pid);
+ PAD_ARG_(user_addr_t, t);
+};
+extern kern_return_t debug_control_port_for_pid(
+ struct debug_control_port_for_pid_args *args);
+
+struct macx_swapon_args {
+ PAD_ARG_(uint64_t, filename);
+ PAD_ARG_(int, flags);
+ PAD_ARG_(int, size);
+ PAD_ARG_(int, priority);
+};
+extern kern_return_t macx_swapon(
+ struct macx_swapon_args *args);
+
+struct macx_swapoff_args {
+ PAD_ARG_(uint64_t, filename);
+ PAD_ARG_(int, flags);
+};
+extern kern_return_t macx_swapoff(
+ struct macx_swapoff_args *args);
+
+struct macx_triggers_args {
+ PAD_ARG_(int, hi_water);
+ PAD_ARG_(int, low_water);
+ PAD_ARG_(int, flags);
+ PAD_ARG_(mach_port_t, alert_port);
+};
+extern kern_return_t macx_triggers(
+ struct macx_triggers_args *args);
+
+struct macx_backing_store_suspend_args {
+ PAD_ARG_(boolean_t, suspend);
+};
+extern kern_return_t macx_backing_store_suspend(
+ struct macx_backing_store_suspend_args *args);
+
+struct macx_backing_store_recovery_args {
+ PAD_ARG_(int, pid);
+};
+extern kern_return_t macx_backing_store_recovery(
+ struct macx_backing_store_recovery_args *args);
+
+struct swtch_pri_args {
+ PAD_ARG_(int, pri);
+};
+extern boolean_t swtch_pri(
+ struct swtch_pri_args *args);
+
+struct pfz_exit_args {
+ int32_t dummy;
+};
+extern kern_return_t pfz_exit(
+ struct pfz_exit_args *args);
+
+struct swtch_args {
+ int32_t dummy;
+};
+extern boolean_t swtch(
+ struct swtch_args *args);
+
+struct clock_sleep_trap_args {
+ PAD_ARG_(mach_port_name_t, clock_name);
+ PAD_ARG_(sleep_type_t, sleep_type);
+ PAD_ARG_(int, sleep_sec);
+ PAD_ARG_(int, sleep_nsec);
+ PAD_ARG_(user_addr_t, wakeup_time);
+};
+extern kern_return_t clock_sleep_trap(
+ struct clock_sleep_trap_args *args);
+
+struct thread_switch_args {
+ PAD_ARG_(mach_port_name_t, thread_name);
+ PAD_ARG_(int, option);
+ PAD_ARG_(mach_msg_timeout_t, option_time);
+};
+extern kern_return_t thread_switch(
+ struct thread_switch_args *args);
+
+struct mach_timebase_info_trap_args {
+ PAD_ARG_(user_addr_t, info);
+};
+extern kern_return_t mach_timebase_info_trap(
+ struct mach_timebase_info_trap_args *args);
+
+struct mach_wait_until_trap_args {
+ PAD_ARG_(uint64_t, deadline);
+};
+extern kern_return_t mach_wait_until_trap(
+ struct mach_wait_until_trap_args *args);
+
+struct mk_timer_create_trap_args {
+ int32_t dummy;
+};
+extern mach_port_name_t mk_timer_create_trap(
+ struct mk_timer_create_trap_args *args);
+
+struct mk_timer_destroy_trap_args {
+ PAD_ARG_(mach_port_name_t, name);
+};
+extern kern_return_t mk_timer_destroy_trap(
+ struct mk_timer_destroy_trap_args *args);
+
+struct mk_timer_arm_trap_args {
+ PAD_ARG_(mach_port_name_t, name);
+ PAD_ARG_(uint64_t, expire_time);
+};
+extern kern_return_t mk_timer_arm_trap(
+ struct mk_timer_arm_trap_args *args);
+
+struct mk_timer_arm_leeway_trap_args {
+ PAD_ARG_(mach_port_name_t, name);
+ PAD_ARG_(uint64_t, mk_timer_flags);
+ PAD_ARG_(uint64_t, expire_time);
+ PAD_ARG_(uint64_t, mk_leeway);
+};
+extern kern_return_t mk_timer_arm_leeway_trap(
+ struct mk_timer_arm_leeway_trap_args *args);
+
+struct mk_timer_cancel_trap_args {
+ PAD_ARG_(mach_port_name_t, name);
+ PAD_ARG_(user_addr_t, result_time);
+};
+extern kern_return_t mk_timer_cancel_trap(
+ struct mk_timer_cancel_trap_args *args);
+
+struct _kernelrpc_mach_vm_allocate_trap_args {
+ PAD_ARG_(mach_port_name_t, target); /* 1 word */
+ PAD_ARG_(user_addr_t, addr); /* 1 word */
+ PAD_ARG_(mach_vm_size_t, size); /* 2 words */
+ PAD_ARG_(int, flags); /* 1 word */
+}; /* Total: 5 */
+
+extern kern_return_t _kernelrpc_mach_vm_allocate_trap(
+ struct _kernelrpc_mach_vm_allocate_trap_args *args);
+
+struct _kernelrpc_mach_vm_deallocate_args {
+ PAD_ARG_(mach_port_name_t, target); /* 1 word */
+ PAD_ARG_(mach_vm_address_t, address); /* 2 words */
+ PAD_ARG_(mach_vm_size_t, size); /* 2 words */
+}; /* Total: 5 */
+extern kern_return_t _kernelrpc_mach_vm_deallocate_trap(
+ struct _kernelrpc_mach_vm_deallocate_args *args);
+
+struct _kernelrpc_mach_vm_protect_args {
+ PAD_ARG_(mach_port_name_t, target); /* 1 word */
+ PAD_ARG_(mach_vm_address_t, address); /* 2 words */
+ PAD_ARG_(mach_vm_size_t, size); /* 2 words */
+ PAD_ARG_(boolean_t, set_maximum); /* 1 word */
+ PAD_ARG_(vm_prot_t, new_protection); /* 1 word */
+}; /* Total: 7 */
+extern kern_return_t _kernelrpc_mach_vm_protect_trap(
+ struct _kernelrpc_mach_vm_protect_args *args);
+
+struct _kernelrpc_mach_vm_map_trap_args {
+ PAD_ARG_(mach_port_name_t, target);
+ PAD_ARG_(user_addr_t, addr);
+ PAD_ARG_(mach_vm_size_t, size);
+ PAD_ARG_(mach_vm_offset_t, mask);
+ PAD_ARG_(int, flags);
+ PAD_ARG_8
+ PAD_ARG_(vm_prot_t, cur_protection);
+};
+extern kern_return_t _kernelrpc_mach_vm_map_trap(
+ struct _kernelrpc_mach_vm_map_trap_args *args);
+
+struct _kernelrpc_mach_vm_purgable_control_trap_args {
+ PAD_ARG_(mach_port_name_t, target); /* 1 word */
+ PAD_ARG_(mach_vm_offset_t, address); /* 2 words */
+ PAD_ARG_(vm_purgable_t, control); /* 1 word */
+ PAD_ARG_(user_addr_t, state); /* 1 word */
+}; /* Total: 5 */
+
+extern kern_return_t _kernelrpc_mach_vm_purgable_control_trap(
+ struct _kernelrpc_mach_vm_purgable_control_trap_args *args);
+
+struct _kernelrpc_mach_port_allocate_args {
+ PAD_ARG_(mach_port_name_t, target);
+ PAD_ARG_(mach_port_right_t, right);
+ PAD_ARG_(user_addr_t, name);
+};
+extern kern_return_t _kernelrpc_mach_port_allocate_trap(
+ struct _kernelrpc_mach_port_allocate_args *args);
+
+struct _kernelrpc_mach_port_deallocate_args {
+ PAD_ARG_(mach_port_name_t, target);
+ PAD_ARG_(mach_port_name_t, name);
+};
+extern kern_return_t _kernelrpc_mach_port_deallocate_trap(
+ struct _kernelrpc_mach_port_deallocate_args *args);
+
+struct _kernelrpc_mach_port_mod_refs_args {
+ PAD_ARG_(mach_port_name_t, target);
+ PAD_ARG_(mach_port_name_t, name);
+ PAD_ARG_(mach_port_right_t, right);
+ PAD_ARG_(mach_port_delta_t, delta);
+};
+extern kern_return_t _kernelrpc_mach_port_mod_refs_trap(
+ struct _kernelrpc_mach_port_mod_refs_args *args);
+
+struct _kernelrpc_mach_port_move_member_args {
+ PAD_ARG_(mach_port_name_t, target);
+ PAD_ARG_(mach_port_name_t, member);
+ PAD_ARG_(mach_port_name_t, after);
+};
+extern kern_return_t _kernelrpc_mach_port_move_member_trap(
+ struct _kernelrpc_mach_port_move_member_args *args);
+
+struct _kernelrpc_mach_port_insert_right_args {
+ PAD_ARG_(mach_port_name_t, target);
+ PAD_ARG_(mach_port_name_t, name);
+ PAD_ARG_(mach_port_name_t, poly);
+ PAD_ARG_(mach_msg_type_name_t, polyPoly);
+};
+extern kern_return_t _kernelrpc_mach_port_insert_right_trap(
+ struct _kernelrpc_mach_port_insert_right_args *args);
+
+struct _kernelrpc_mach_port_get_attributes_args {
+ PAD_ARG_(mach_port_name_t, target);
+ PAD_ARG_(mach_port_name_t, name);
+ PAD_ARG_(mach_port_flavor_t, flavor);
+ PAD_ARG_(user_addr_t, info);
+ PAD_ARG_(user_addr_t, count);
+};
+extern kern_return_t _kernelrpc_mach_port_get_attributes_trap(
+ struct _kernelrpc_mach_port_get_attributes_args *args);
+
+struct _kernelrpc_mach_port_insert_member_args {
+ PAD_ARG_(mach_port_name_t, target);
+ PAD_ARG_(mach_port_name_t, name);
+ PAD_ARG_(mach_port_name_t, pset);
+};
+extern kern_return_t _kernelrpc_mach_port_insert_member_trap(
+ struct _kernelrpc_mach_port_insert_member_args *args);
+
+struct _kernelrpc_mach_port_extract_member_args {
+ PAD_ARG_(mach_port_name_t, target);
+ PAD_ARG_(mach_port_name_t, name);
+ PAD_ARG_(mach_port_name_t, pset);
+};
+extern kern_return_t _kernelrpc_mach_port_extract_member_trap(
+ struct _kernelrpc_mach_port_extract_member_args *args);
+
+struct _kernelrpc_mach_port_construct_args {
+ PAD_ARG_(mach_port_name_t, target);
+ PAD_ARG_(user_addr_t, options);
+ PAD_ARG_(uint64_t, context);
+ PAD_ARG_(user_addr_t, name);
+};
+extern kern_return_t _kernelrpc_mach_port_construct_trap(
+ struct _kernelrpc_mach_port_construct_args *args);
+
+struct _kernelrpc_mach_port_destruct_args {
+ PAD_ARG_(mach_port_name_t, target);
+ PAD_ARG_(mach_port_name_t, name);
+ PAD_ARG_(mach_port_delta_t, srdelta);
+ PAD_ARG_(uint64_t, guard);
+};
+extern kern_return_t _kernelrpc_mach_port_destruct_trap(
+ struct _kernelrpc_mach_port_destruct_args *args);
+
+struct _kernelrpc_mach_port_guard_args {
+ PAD_ARG_(mach_port_name_t, target);
+ PAD_ARG_(mach_port_name_t, name);
+ PAD_ARG_(uint64_t, guard);
+ PAD_ARG_(boolean_t, strict);
+};
+extern kern_return_t _kernelrpc_mach_port_guard_trap(
+ struct _kernelrpc_mach_port_guard_args *args);
+
+struct _kernelrpc_mach_port_unguard_args {
+ PAD_ARG_(mach_port_name_t, target);
+ PAD_ARG_(mach_port_name_t, name);
+ PAD_ARG_(uint64_t, guard);
+};
+extern kern_return_t _kernelrpc_mach_port_unguard_trap(
+ struct _kernelrpc_mach_port_unguard_args *args);
+
+struct mach_generate_activity_id_args {
+ PAD_ARG_(mach_port_name_t, target);
+ PAD_ARG_(int, count);
+ PAD_ARG_(user_addr_t, activity_id);
+};
+extern kern_return_t mach_generate_activity_id(
+ struct mach_generate_activity_id_args *args);
+
+/*
+ * Voucher trap interfaces
+ */