master
1/*
2 * Copyright (c) 2000-2021 Apple Computer, Inc. All rights reserved.
3 *
4 * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
5 *
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. The rights granted to you under the License
10 * may not be used to create, or enable the creation or redistribution of,
11 * unlawful or unlicensed copies of an Apple operating system, or to
12 * circumvent, violate, or enable the circumvention or violation of, any
13 * terms of an Apple operating system software license agreement.
14 *
15 * Please obtain a copy of the License at
16 * http://www.opensource.apple.com/apsl/ and read it before using this file.
17 *
18 * The Original Code and all software distributed under the License are
19 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
20 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
21 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
22 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
23 * Please see the License for the specific language governing rights and
24 * limitations under the License.
25 *
26 * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
27 */
28/*
29 * @OSF_COPYRIGHT@
30 */
31/*
32 * Mach Operating System
33 * Copyright (c) 1991,1990,1989,1988,1987 Carnegie Mellon University
34 * All Rights Reserved.
35 *
36 * Permission to use, copy, modify and distribute this software and its
37 * documentation is hereby granted, provided that both the copyright
38 * notice and this permission notice appear in all copies of the
39 * software, derivative works or modified versions, and any portions
40 * thereof, and that both notices appear in supporting documentation.
41 *
42 * CARNEGIE MELLON ALLOWS FREE USE OF THIS SOFTWARE IN ITS "AS IS"
43 * CONDITION. CARNEGIE MELLON DISCLAIMS ANY LIABILITY OF ANY KIND FOR
44 * ANY DAMAGES WHATSOEVER RESULTING FROM THE USE OF THIS SOFTWARE.
45 *
46 * Carnegie Mellon requests users of this software to return to
47 *
48 * Software Distribution Coordinator or Software.Distribution@CS.CMU.EDU
49 * School of Computer Science
50 * Carnegie Mellon University
51 * Pittsburgh PA 15213-3890
52 *
53 * any improvements or extensions that they make and grant Carnegie Mellon
54 * the rights to redistribute these changes.
55 */
56/*
57 */
58/*
59 * File: mach/vm_prot.h
60 * Author: Avadis Tevanian, Jr., Michael Wayne Young
61 *
62 * Virtual memory protection definitions.
63 *
64 */
65
66#ifndef _MACH_VM_PROT_H_
67#define _MACH_VM_PROT_H_
68
69/*
70 * Types defined:
71 *
72 * vm_prot_t VM protection values.
73 */
74
75typedef int vm_prot_t;
76
77/*
78 * Protection values, defined as bits within the vm_prot_t type
79 *
80 * When making a new VM_PROT_*, update tests vm_parameter_validation_[user|kern]
81 * and their expected results; they deliberately call VM functions with invalid
82 * vm_prot values and you may be turning one of those invalid protections valid.
83 */
84
85#define VM_PROT_NONE ((vm_prot_t) 0x00)
86
87#define VM_PROT_READ ((vm_prot_t) 0x01) /* read permission */
88#define VM_PROT_WRITE ((vm_prot_t) 0x02) /* write permission */
89#define VM_PROT_EXECUTE ((vm_prot_t) 0x04) /* execute permission */
90
91/*
92 * The default protection for newly-created virtual memory
93 */
94
95#define VM_PROT_DEFAULT (VM_PROT_READ|VM_PROT_WRITE)
96
97/*
98 * The maximum privileges possible, for parameter checking.
99 */
100
101#define VM_PROT_ALL (VM_PROT_READ|VM_PROT_WRITE|VM_PROT_EXECUTE)
102
103/*
104 * An invalid protection value.
105 * Used only by memory_object_lock_request to indicate no change
106 * to page locks. Using -1 here is a bad idea because it
107 * looks like VM_PROT_ALL and then some.
108 */
109
110#define VM_PROT_NO_CHANGE_LEGACY ((vm_prot_t) 0x08)
111#define VM_PROT_NO_CHANGE ((vm_prot_t) 0x01000000)
112
113/*
114 * When a caller finds that he cannot obtain write permission on a
115 * mapped entry, the following flag can be used. The entry will
116 * be made "needs copy" effectively copying the object (using COW),
117 * and write permission will be added to the maximum protections
118 * for the associated entry.
119 */
120
121#define VM_PROT_COPY ((vm_prot_t) 0x10)
122
123
124/*
125 * Another invalid protection value.
126 * Used only by memory_object_data_request upon an object
127 * which has specified a copy_call copy strategy. It is used
128 * when the kernel wants a page belonging to a copy of the
129 * object, and is only asking the object as a result of
130 * following a shadow chain. This solves the race between pages
131 * being pushed up by the memory manager and the kernel
132 * walking down the shadow chain.
133 */
134
135#define VM_PROT_WANTS_COPY ((vm_prot_t) 0x10)
136
137
138/*
139 * Another invalid protection value.
140 * Indicates that the other protection bits are to be applied as a mask
141 * against the actual protection bits of the map entry.
142 */
143#define VM_PROT_IS_MASK ((vm_prot_t) 0x40)
144
145/*
146 * Another invalid protection value to support execute-only protection.
147 * VM_PROT_STRIP_READ is a special marker that tells mprotect to not
148 * set VM_PROT_READ. We have to do it this way because existing code
149 * expects the system to set VM_PROT_READ if VM_PROT_EXECUTE is set.
150 * VM_PROT_EXECUTE_ONLY is just a convenience value to indicate that
151 * the memory should be executable and explicitly not readable. It will
152 * be ignored on platforms that do not support this type of protection.
153 */
154#define VM_PROT_STRIP_READ ((vm_prot_t) 0x80)
155#define VM_PROT_EXECUTE_ONLY (VM_PROT_EXECUTE|VM_PROT_STRIP_READ)
156
157
158/*
159 * Another invalid protection value to support pager TPRO protection.
160 * VM_PROT_TPRO is a special marker that tells the a pager to
161 * set TPRO flags on a given entry. We do it this way to prevent
162 * bloating the pager structures and it allows dyld to pass through
163 * this flag in lieue of specifying explicit VM flags, allowing us to handle
164 * the final permissions internally.
165 */
166#define VM_PROT_TPRO ((vm_prot_t) 0x200)
167
168#if defined(__x86_64__)
169/*
170 * Another invalid protection value to support specifying different
171 * execute permissions for user- and supervisor- modes. When
172 * MBE is enabled in a VM, VM_PROT_EXECUTE is used to indicate
173 * supervisor-mode execute permission, and VM_PROT_UEXEC specifies
174 * user-mode execute permission. Currently only used by the
175 * x86 Hypervisor kext.
176 */
177#define VM_PROT_UEXEC ((vm_prot_t) 0x8) /* User-mode Execute Permission */
178
179#define VM_PROT_ALLEXEC (VM_PROT_EXECUTE | VM_PROT_UEXEC)
180#else
181#define VM_PROT_ALLEXEC (VM_PROT_EXECUTE)
182#endif /* defined(__x86_64__) */
183
184
185#endif /* _MACH_VM_PROT_H_ */