]> git.saurik.com Git - apple/xnu.git/blobdiff - osfmk/mach/mach_traps.h
xnu-4570.41.2.tar.gz
[apple/xnu.git] / osfmk / mach / mach_traps.h
index 37ab3277fda194ceb75d0fecddd2bfd59861a323..462d7972f1b8301e90cbebe8ef47c1e16d924559 100644 (file)
@@ -87,6 +87,8 @@ __BEGIN_DECLS
 
 extern mach_port_name_t mach_reply_port(void);
 
+extern mach_port_name_t thread_get_special_reply_port(void);
+
 extern mach_port_name_t thread_self_trap(void);
 
 extern mach_port_name_t host_self_trap(void);
@@ -107,7 +109,7 @@ extern mach_msg_return_t mach_msg_overwrite_trap(
                                mach_msg_size_t rcv_size,
                                mach_port_name_t rcv_name,
                                mach_msg_timeout_t timeout,
-                               mach_port_name_t notify,
+                               mach_msg_priority_t override,
                                mach_msg_header_t *rcv_msg,
                                mach_msg_size_t rcv_limit);
 
@@ -139,6 +141,8 @@ extern kern_return_t semaphore_timedwait_signal_trap(
                                unsigned int sec,
                                clock_res_t nsec);
 
+#endif /* PRIVATE */
+
 extern kern_return_t clock_sleep_trap(
                                mach_port_name_t clock_name,
                                sleep_type_t sleep_type,
@@ -146,7 +150,122 @@ extern kern_return_t clock_sleep_trap(
                                int sleep_nsec,
                                mach_timespec_t *wakeup_time);
 
-#endif /* PRIVATE */
+extern kern_return_t _kernelrpc_mach_vm_allocate_trap(
+                               mach_port_name_t target,
+                               mach_vm_offset_t *addr,
+                               mach_vm_size_t size,
+                               int flags);
+
+extern kern_return_t _kernelrpc_mach_vm_deallocate_trap(
+                               mach_port_name_t target,
+                               mach_vm_address_t address,
+                               mach_vm_size_t size
+);
+
+extern kern_return_t _kernelrpc_mach_vm_protect_trap(
+                               mach_port_name_t target,
+                               mach_vm_address_t address,
+                               mach_vm_size_t size,
+                               boolean_t set_maximum,
+                               vm_prot_t new_protection
+);
+
+extern kern_return_t _kernelrpc_mach_vm_map_trap(
+                               mach_port_name_t target,
+                               mach_vm_offset_t *address,
+                               mach_vm_size_t size,
+                               mach_vm_offset_t mask,
+                               int flags,
+                               vm_prot_t cur_protection
+);
+
+extern kern_return_t _kernelrpc_mach_vm_purgable_control_trap(
+                               mach_port_name_t target,
+                               mach_vm_offset_t address,
+                               vm_purgable_t control,
+                               int *state);
+
+extern kern_return_t _kernelrpc_mach_port_allocate_trap(
+                               mach_port_name_t target,
+                               mach_port_right_t right,
+                               mach_port_name_t *name
+);
+
+
+extern kern_return_t _kernelrpc_mach_port_destroy_trap(
+                               mach_port_name_t target,
+                               mach_port_name_t name
+);
+
+extern kern_return_t _kernelrpc_mach_port_deallocate_trap(
+                               mach_port_name_t target,
+                               mach_port_name_t name
+);
+
+extern kern_return_t _kernelrpc_mach_port_mod_refs_trap(
+                               mach_port_name_t target,
+                               mach_port_name_t name,
+                               mach_port_right_t right,
+                               mach_port_delta_t delta
+);
+
+extern kern_return_t _kernelrpc_mach_port_move_member_trap(
+                               mach_port_name_t target,
+                               mach_port_name_t member,
+                               mach_port_name_t after
+);
+
+extern kern_return_t _kernelrpc_mach_port_insert_right_trap(
+                               mach_port_name_t target,
+                               mach_port_name_t name,
+                               mach_port_name_t poly,
+                               mach_msg_type_name_t polyPoly
+);
+
+extern kern_return_t _kernelrpc_mach_port_insert_member_trap(
+                               mach_port_name_t target,
+                               mach_port_name_t name,
+                               mach_port_name_t pset
+);
+
+extern kern_return_t _kernelrpc_mach_port_extract_member_trap(
+                               mach_port_name_t target,
+                               mach_port_name_t name,
+                               mach_port_name_t pset
+);
+
+extern kern_return_t _kernelrpc_mach_port_construct_trap(
+                               mach_port_name_t target,
+                               mach_port_options_t *options,
+                               uint64_t context,
+                               mach_port_name_t *name
+);
+
+extern kern_return_t _kernelrpc_mach_port_destruct_trap(
+                               mach_port_name_t target,
+                               mach_port_name_t name,
+                               mach_port_delta_t srdelta,
+                               uint64_t guard
+);
+
+extern kern_return_t _kernelrpc_mach_port_guard_trap(
+                               mach_port_name_t target,
+                               mach_port_name_t name,
+                               uint64_t guard,
+                               boolean_t strict
+);
+
+extern kern_return_t _kernelrpc_mach_port_unguard_trap(
+                               mach_port_name_t target,
+                               mach_port_name_t name,
+                               uint64_t guard
+);
+
+extern kern_return_t mach_generate_activity_id(
+                               mach_port_name_t target,
+                               int count,
+                               uint64_t *activity_id
+);
 
 extern kern_return_t macx_swapon(
                                uint64_t filename,
@@ -181,6 +300,18 @@ extern kern_return_t thread_switch(
 
 extern mach_port_name_t task_self_trap(void);
 
+extern kern_return_t host_create_mach_voucher_trap(
+                               mach_port_name_t host,
+                               mach_voucher_attr_raw_recipe_array_t recipes,
+                               int recipes_size,
+                               mach_port_name_t *voucher);
+
+extern kern_return_t mach_voucher_extract_attr_recipe_trap(
+                               mach_port_name_t voucher_name,
+                               mach_voucher_attr_key_t key,
+                               mach_voucher_attr_raw_recipe_t recipe,
+                               mach_msg_type_number_t *recipe_size);
+
 /*
  *     Obsolete interfaces.
  */
@@ -199,18 +330,6 @@ extern kern_return_t pid_for_task(
                                mach_port_name_t t,
                                int *x);
 
-#if            !defined(__LP64__) && !defined(__arm__)
-/* these should go away altogether - so no 64 legacy please */
-
-extern kern_return_t map_fd(
-                               int fd,
-                               vm_offset_t offset,
-                               vm_offset_t *va,
-                               boolean_t findspace,
-                               vm_size_t size);
-
-#endif /* !defined(__LP64__) && !defined(__arm__) */
-
 #else  /* KERNEL */
 
 #ifdef XNU_KERNEL_PRIVATE
@@ -220,9 +339,19 @@ extern kern_return_t map_fd(
  * The kernel may support multiple userspace ABIs, and must use
  * argument structures with elements large enough for any of them.
  */
+#if CONFIG_REQUIRES_U32_MUNGING
 #define        PAD_(t) (sizeof(uint64_t) <= sizeof(t) \
                ? 0 : sizeof(uint64_t) - sizeof(t))
 #define PAD_ARG_8
+#else
+#define        PAD_(t) (sizeof(uint32_t) <= sizeof(t) \
+               ? 0 : sizeof(uint32_t) - sizeof(t))
+#if __arm__ && (__BIGGEST_ALIGNMENT__ > 4)
+#define PAD_ARG_8
+#else
+#define PAD_ARG_8 char arg8_pad_[sizeof(uint32_t)];
+#endif
+#endif
 
 #if BYTE_ORDER == LITTLE_ENDIAN
 #define        PADL_(t)        0
@@ -242,33 +371,6 @@ extern kern_return_t map_fd(
  * traps, without calling out to the BSD system call mungers.
  */
 
-#if 0 /* no active architectures use this */
-void munge_w(const void *, void *);  
-void munge_ww(const void *, void *);  
-void munge_www(const void *, void *);  
-void munge_wwww(const void *, void *);  
-void munge_wwwww(const void *, void *);  
-void munge_wwwwww(const void *, void *);  
-void munge_wwwwwww(const void *, void *);  
-void munge_wwwwwwww(const void *, void *);  
-void munge_d(const void *, void *);  
-void munge_dd(const void *, void *);  
-void munge_ddd(const void *, void *);  
-void munge_dddd(const void *, void *);  
-void munge_ddddd(const void *, void *);  
-void munge_dddddd(const void *, void *);  
-void munge_ddddddd(const void *, void *);  
-void munge_dddddddd(const void *, void *);
-void munge_l(const void *, void *);
-void munge_lw(const void *, void *);
-void munge_lwww(const void *, void *);
-void munge_wl(const void *, void *);  
-void munge_wlw(const void *, void *);  
-void munge_wwwl(const void *, void *);  
-void munge_wwwwl(const void *, void *);  
-void munge_wwwwwl(const void *, void *);  
-#endif /* 0 */
-
 struct kern_invalid_args {
        int32_t dummy;
 };
@@ -281,6 +383,12 @@ struct mach_reply_port_args {
 extern mach_port_name_t mach_reply_port(
                                struct mach_reply_port_args *args);
 
+struct thread_get_special_reply_port_args {
+       int32_t dummy;
+};
+extern mach_port_name_t thread_get_special_reply_port(
+                               struct thread_get_special_reply_port_args *args);
+
 struct thread_self_trap_args {
        int32_t dummy;
 };
@@ -300,15 +408,15 @@ extern mach_port_name_t host_self_trap(
                                struct host_self_trap_args *args);
 
 struct mach_msg_overwrite_trap_args {
-       PAD_ARG_(mach_vm_address_t, msg);
+       PAD_ARG_(user_addr_t, msg);
        PAD_ARG_(mach_msg_option_t, option);
        PAD_ARG_(mach_msg_size_t, send_size);
        PAD_ARG_(mach_msg_size_t, rcv_size);
        PAD_ARG_(mach_port_name_t, rcv_name);
        PAD_ARG_(mach_msg_timeout_t, timeout);
-       PAD_ARG_(mach_port_name_t, notify);
+       PAD_ARG_(mach_msg_priority_t, override);
        PAD_ARG_8
-       PAD_ARG_(mach_vm_address_t, rcv_msg);  /* Unused on mach_msg_trap */
+       PAD_ARG_(user_addr_t, rcv_msg);  /* Unused on mach_msg_trap */
 };
 extern mach_msg_return_t mach_msg_trap(
                                struct mach_msg_overwrite_trap_args *args);
@@ -364,18 +472,6 @@ struct semaphore_timedwait_signal_trap_args {
 extern kern_return_t semaphore_timedwait_signal_trap(
                                struct semaphore_timedwait_signal_trap_args *args);
 
-#if            !defined(CONFIG_EMBEDDED)
-struct map_fd_args {
-       PAD_ARG_(int, fd);
-       PAD_ARG_(vm_offset_t, offset);
-       PAD_ARG_(vm_offset_t *, va);
-       PAD_ARG_(boolean_t, findspace);
-       PAD_ARG_(vm_size_t, size);
-};
-extern kern_return_t map_fd(
-                               struct map_fd_args *args);
-#endif /* !defined(CONFIG_EMBEDDED) */
-
 struct task_for_pid_args {
        PAD_ARG_(mach_port_name_t, target_tport);
        PAD_ARG_(int, pid);
@@ -459,7 +555,7 @@ struct clock_sleep_trap_args{
        PAD_ARG_(sleep_type_t, sleep_type);
        PAD_ARG_(int, sleep_sec);
        PAD_ARG_(int, sleep_nsec);
-       PAD_ARG_(mach_vm_address_t, wakeup_time);
+       PAD_ARG_(user_addr_t, wakeup_time);
 };
 extern kern_return_t clock_sleep_trap(
                                struct clock_sleep_trap_args *args);
@@ -473,7 +569,7 @@ extern kern_return_t thread_switch(
                                struct thread_switch_args *args);
 
 struct mach_timebase_info_trap_args {
-       PAD_ARG_(mach_vm_address_t, info);
+       PAD_ARG_(user_addr_t, info);
 };
 extern kern_return_t mach_timebase_info_trap(
                                struct mach_timebase_info_trap_args *args);
@@ -503,13 +599,204 @@ struct mk_timer_arm_trap_args {
 extern kern_return_t mk_timer_arm_trap(
                                struct mk_timer_arm_trap_args *args);
 
+struct mk_timer_arm_leeway_trap_args {
+       PAD_ARG_(mach_port_name_t, name);
+       PAD_ARG_(uint64_t, mk_timer_flags);
+       PAD_ARG_(uint64_t, expire_time);
+       PAD_ARG_(uint64_t, mk_leeway);
+};
+extern kern_return_t mk_timer_arm_leeway_trap(
+                               struct mk_timer_arm_leeway_trap_args *args);
+
 struct mk_timer_cancel_trap_args {
     PAD_ARG_(mach_port_name_t, name);
-    PAD_ARG_(mach_vm_address_t, result_time);
+    PAD_ARG_(user_addr_t, result_time);
 };
 extern kern_return_t mk_timer_cancel_trap(
                                struct mk_timer_cancel_trap_args *args);
 
+struct _kernelrpc_mach_vm_allocate_trap_args {
+       PAD_ARG_(mach_port_name_t, target);     /* 1 word */
+       PAD_ARG_(user_addr_t, addr);            /* 1 word */
+       PAD_ARG_(mach_vm_size_t, size);         /* 2 words */
+       PAD_ARG_(int, flags);                   /* 1 word */
+};                                             /* Total: 5 */
+
+extern kern_return_t _kernelrpc_mach_vm_allocate_trap(
+                               struct _kernelrpc_mach_vm_allocate_trap_args *args);
+
+struct _kernelrpc_mach_vm_deallocate_args {
+       PAD_ARG_(mach_port_name_t, target);     /* 1 word */
+       PAD_ARG_(mach_vm_address_t, address);   /* 2 words */
+       PAD_ARG_(mach_vm_size_t, size);         /* 2 words */
+};                                             /* Total: 5 */
+extern kern_return_t _kernelrpc_mach_vm_deallocate_trap(
+                               struct _kernelrpc_mach_vm_deallocate_args *args);
+
+struct _kernelrpc_mach_vm_protect_args {
+       PAD_ARG_(mach_port_name_t, target);     /* 1 word */
+       PAD_ARG_(mach_vm_address_t, address);   /* 2 words */
+       PAD_ARG_(mach_vm_size_t, size);         /* 2 words */
+       PAD_ARG_(boolean_t, set_maximum);       /* 1 word */
+       PAD_ARG_(vm_prot_t, new_protection);    /* 1 word */
+};                                             /* Total: 7 */
+extern kern_return_t _kernelrpc_mach_vm_protect_trap(
+                               struct _kernelrpc_mach_vm_protect_args *args);
+
+struct _kernelrpc_mach_vm_map_trap_args {
+       PAD_ARG_(mach_port_name_t, target);
+       PAD_ARG_(user_addr_t, addr);
+       PAD_ARG_(mach_vm_size_t, size);
+       PAD_ARG_(mach_vm_offset_t, mask);
+       PAD_ARG_(int, flags);
+       PAD_ARG_8
+       PAD_ARG_(vm_prot_t, cur_protection);
+};
+extern kern_return_t _kernelrpc_mach_vm_map_trap(
+                               struct _kernelrpc_mach_vm_map_trap_args *args);
+
+struct _kernelrpc_mach_vm_purgable_control_trap_args {
+       PAD_ARG_(mach_port_name_t, target);     /* 1 word */
+       PAD_ARG_(mach_vm_offset_t, address);    /* 2 words */
+       PAD_ARG_(vm_purgable_t, control);       /* 1 word */
+       PAD_ARG_(user_addr_t, state);           /* 1 word */
+};                                             /* Total: 5 */
+
+extern kern_return_t _kernelrpc_mach_vm_purgable_control_trap(
+       struct _kernelrpc_mach_vm_purgable_control_trap_args *args);
+
+struct _kernelrpc_mach_port_allocate_args {
+       PAD_ARG_(mach_port_name_t, target);
+       PAD_ARG_(mach_port_right_t, right);
+       PAD_ARG_(user_addr_t, name);
+};
+extern kern_return_t _kernelrpc_mach_port_allocate_trap(
+                               struct _kernelrpc_mach_port_allocate_args *args);
+
+
+struct _kernelrpc_mach_port_destroy_args {
+       PAD_ARG_(mach_port_name_t, target);
+       PAD_ARG_(mach_port_name_t, name);
+};
+extern kern_return_t _kernelrpc_mach_port_destroy_trap(
+                               struct _kernelrpc_mach_port_destroy_args *args);
+
+struct _kernelrpc_mach_port_deallocate_args {
+       PAD_ARG_(mach_port_name_t, target);
+       PAD_ARG_(mach_port_name_t, name);
+};
+extern kern_return_t _kernelrpc_mach_port_deallocate_trap(
+                               struct _kernelrpc_mach_port_deallocate_args *args);
+
+struct _kernelrpc_mach_port_mod_refs_args {
+       PAD_ARG_(mach_port_name_t, target);
+       PAD_ARG_(mach_port_name_t, name);
+       PAD_ARG_(mach_port_right_t, right);
+       PAD_ARG_(mach_port_delta_t, delta);
+};
+extern kern_return_t _kernelrpc_mach_port_mod_refs_trap(
+                               struct _kernelrpc_mach_port_mod_refs_args *args);
+
+struct _kernelrpc_mach_port_move_member_args {
+       PAD_ARG_(mach_port_name_t, target);
+       PAD_ARG_(mach_port_name_t, member);
+       PAD_ARG_(mach_port_name_t, after);
+};
+extern kern_return_t _kernelrpc_mach_port_move_member_trap(
+                               struct _kernelrpc_mach_port_move_member_args *args);
+
+struct _kernelrpc_mach_port_insert_right_args {
+       PAD_ARG_(mach_port_name_t, target);
+       PAD_ARG_(mach_port_name_t, name);
+       PAD_ARG_(mach_port_name_t, poly);
+       PAD_ARG_(mach_msg_type_name_t, polyPoly);
+};
+extern kern_return_t _kernelrpc_mach_port_insert_right_trap(
+                               struct _kernelrpc_mach_port_insert_right_args *args);
+
+struct _kernelrpc_mach_port_insert_member_args {
+       PAD_ARG_(mach_port_name_t, target);
+       PAD_ARG_(mach_port_name_t, name);
+       PAD_ARG_(mach_port_name_t, pset);
+};
+extern kern_return_t _kernelrpc_mach_port_insert_member_trap(
+                               struct _kernelrpc_mach_port_insert_member_args *args);
+
+struct _kernelrpc_mach_port_extract_member_args {
+       PAD_ARG_(mach_port_name_t, target);
+       PAD_ARG_(mach_port_name_t, name);
+       PAD_ARG_(mach_port_name_t, pset);
+};
+extern kern_return_t _kernelrpc_mach_port_extract_member_trap(
+                               struct _kernelrpc_mach_port_extract_member_args *args);
+
+struct _kernelrpc_mach_port_construct_args {
+       PAD_ARG_(mach_port_name_t, target);
+       PAD_ARG_(user_addr_t, options);
+       PAD_ARG_(uint64_t, context);
+       PAD_ARG_(user_addr_t, name);
+};
+extern kern_return_t _kernelrpc_mach_port_construct_trap(
+                               struct _kernelrpc_mach_port_construct_args *args);
+
+struct _kernelrpc_mach_port_destruct_args {
+       PAD_ARG_(mach_port_name_t, target);
+       PAD_ARG_(mach_port_name_t, name);
+       PAD_ARG_(mach_port_delta_t, srdelta);
+       PAD_ARG_(uint64_t, guard);
+};
+extern kern_return_t _kernelrpc_mach_port_destruct_trap(
+                               struct _kernelrpc_mach_port_destruct_args *args);
+
+struct _kernelrpc_mach_port_guard_args {
+       PAD_ARG_(mach_port_name_t, target);
+       PAD_ARG_(mach_port_name_t, name);
+       PAD_ARG_(uint64_t, guard);
+       PAD_ARG_(boolean_t, strict);
+};
+extern kern_return_t _kernelrpc_mach_port_guard_trap(
+                               struct _kernelrpc_mach_port_guard_args *args);
+
+struct _kernelrpc_mach_port_unguard_args {
+       PAD_ARG_(mach_port_name_t, target);
+       PAD_ARG_(mach_port_name_t, name);
+       PAD_ARG_(uint64_t, guard);
+};
+extern kern_return_t _kernelrpc_mach_port_unguard_trap(
+                               struct _kernelrpc_mach_port_unguard_args *args);
+
+struct mach_generate_activity_id_args {
+       PAD_ARG_(mach_port_name_t, target);
+       PAD_ARG_(int, count);
+       PAD_ARG_(user_addr_t, activity_id);
+};
+extern kern_return_t mach_generate_activity_id(
+                               struct mach_generate_activity_id_args *args);
+
+/*
+ * Voucher trap interfaces
+ */
+
+struct host_create_mach_voucher_args {
+       PAD_ARG_(mach_port_name_t, host);
+       PAD_ARG_(mach_voucher_attr_raw_recipe_array_t, recipes);
+       PAD_ARG_(int, recipes_size);
+       PAD_ARG_(user_addr_t, voucher);
+};
+extern kern_return_t host_create_mach_voucher_trap(
+                               struct host_create_mach_voucher_args *args);
+
+struct mach_voucher_extract_attr_recipe_args {
+       PAD_ARG_(mach_port_name_t, voucher_name);
+       PAD_ARG_(mach_voucher_attr_key_t, key);
+       PAD_ARG_(mach_voucher_attr_raw_recipe_t, recipe);
+       PAD_ARG_(user_addr_t, recipe_size);
+};
+
+extern kern_return_t mach_voucher_extract_attr_recipe_trap(
+                               struct mach_voucher_extract_attr_recipe_args *args);
+
+
 /* not published to LP64 clients yet */
 struct iokit_user_client_trap_args {
        PAD_ARG_(void *, userClientRef);