2 * Copyright (c) 1998-2012 Apple Computer, Inc. All rights reserved.
4 * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. The rights granted to you under the License
10 * may not be used to create, or enable the creation or redistribution of,
11 * unlawful or unlicensed copies of an Apple operating system, or to
12 * circumvent, violate, or enable the circumvention or violation of, any
13 * terms of an Apple operating system software license agreement.
15 * Please obtain a copy of the License at
16 * http://www.opensource.apple.com/apsl/ and read it before using this file.
18 * The Original Code and all software distributed under the License are
19 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
20 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
21 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
22 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
23 * Please see the License for the specific language governing rights and
24 * limitations under the License.
26 * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
29 * Copyright (c) 1999 Apple Computer, Inc. All rights reserved.
33 #include <IOKit/assert.h>
34 #include <IOKit/IOLib.h>
35 #include <IOKit/IOKitKeys.h>
36 #include <IOKit/IOBufferMemoryDescriptor.h>
37 #include "RootDomainUserClient.h"
38 #include <IOKit/pwr_mgt/IOPMLibDefs.h>
39 #include <IOKit/pwr_mgt/IOPMPrivate.h>
42 #define super IOUserClient
44 /* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
46 OSDefineMetaClassAndStructors(RootDomainUserClient
, IOUserClient
)
48 /* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
50 bool RootDomainUserClient::initWithTask(task_t owningTask
, void *security_id
,
51 UInt32 type
, OSDictionary
* properties
)
54 properties
->setObject(kIOUserClientCrossEndianCompatibleKey
, kOSBooleanTrue
);
56 if (!super::initWithTask(owningTask
, security_id
, type
, properties
))
59 fOwningTask
= owningTask
;
60 task_reference (fOwningTask
);
65 bool RootDomainUserClient::start( IOService
* provider
)
67 assert(OSDynamicCast(IOPMrootDomain
, provider
));
68 if(!super::start(provider
))
70 fOwner
= (IOPMrootDomain
*)provider
;
76 IOReturn
RootDomainUserClient::secureSleepSystem( uint32_t *return_code
)
78 return secureSleepSystemOptions(NULL
, 0, return_code
);
81 IOReturn
RootDomainUserClient::secureSleepSystemOptions(
82 const void *inOptions
,
83 IOByteCount inOptionsSize
,
89 IOReturn ret
= kIOReturnNotPrivileged
;
90 OSDictionary
*unserializedOptions
= NULL
;
91 OSString
*unserializeErrorString
= NULL
;
93 ret
= clientHasPrivilege(fOwningTask
, kIOClientPrivilegeLocalUser
);
94 local_priv
= (kIOReturnSuccess
== ret
);
96 ret
= clientHasPrivilege(fOwningTask
, kIOClientPrivilegeAdministrator
);
97 admin_priv
= (kIOReturnSuccess
== ret
);
102 unserializedOptions
= OSDynamicCast( OSDictionary
,
103 OSUnserializeXML((const char *)inOptions
, inOptionsSize
, &unserializeErrorString
));
105 if (!unserializedOptions
) {
106 IOLog("IOPMRootDomain SleepSystem unserialization failure: %s\n",
107 unserializeErrorString
? unserializeErrorString
->getCStringNoCopy() : "Unknown");
111 if ( (local_priv
|| admin_priv
) && fOwner
)
114 p
= (proc_t
)get_bsdtask_info(fOwningTask
);
116 fOwner
->setProperty("SleepRequestedByPID", proc_pid(p
), 32);
119 if (unserializedOptions
)
121 // Publish Sleep Options in registry under root_domain
122 fOwner
->setProperty( kRootDomainSleepOptionsKey
, unserializedOptions
);
124 *returnCode
= fOwner
->sleepSystemOptions( unserializedOptions
);
126 unserializedOptions
->release();
129 // Clear any pre-existing options
130 fOwner
->removeProperty( kRootDomainSleepOptionsKey
);
132 *returnCode
= fOwner
->sleepSystemOptions( NULL
);
136 *returnCode
= kIOReturnNotPrivileged
;
139 return kIOReturnSuccess
;
142 IOReturn
RootDomainUserClient::secureSetAggressiveness(
144 unsigned long newLevel
,
149 IOReturn ret
= kIOReturnNotPrivileged
;
151 ret
= clientHasPrivilege(fOwningTask
, kIOClientPrivilegeLocalUser
);
152 local_priv
= (kIOReturnSuccess
== ret
);
154 ret
= clientHasPrivilege(fOwningTask
, kIOClientPrivilegeAdministrator
);
155 admin_priv
= (kIOReturnSuccess
== ret
);
157 if((local_priv
|| admin_priv
) && fOwner
) {
158 *return_code
= fOwner
->setAggressiveness(type
, newLevel
);
160 *return_code
= kIOReturnNotPrivileged
;
162 return kIOReturnSuccess
;
165 IOReturn
RootDomainUserClient::secureSetMaintenanceWakeCalendar(
166 IOPMCalendarStruct
*inCalendar
,
167 uint32_t *returnCode
)
170 IOReturn ret
= kIOReturnNotPrivileged
;
172 ret
= clientHasPrivilege(fOwningTask
, kIOClientPrivilegeAdministrator
);
173 admin_priv
= (kIOReturnSuccess
== ret
);
175 if (admin_priv
&& fOwner
) {
176 *returnCode
= fOwner
->setMaintenanceWakeCalendar(inCalendar
);
178 *returnCode
= kIOReturnNotPrivileged
;
180 return kIOReturnSuccess
;
183 IOReturn
RootDomainUserClient::secureSetUserAssertionLevels(
184 uint32_t assertionBitfield
)
187 IOReturn ret
= kIOReturnNotPrivileged
;
189 ret
= clientHasPrivilege(fOwningTask
, kIOClientPrivilegeAdministrator
);
190 admin_priv
= (kIOReturnSuccess
== ret
);
192 if (admin_priv
&& fOwner
) {
193 ret
= fOwner
->setPMAssertionUserLevels(assertionBitfield
);
195 ret
= kIOReturnNotPrivileged
;
197 return kIOReturnSuccess
;
200 IOReturn
RootDomainUserClient::secureGetSystemSleepType(
201 uint32_t *outSleepType
)
206 ret
= clientHasPrivilege(fOwningTask
, kIOClientPrivilegeAdministrator
);
207 admin_priv
= (kIOReturnSuccess
== ret
);
209 if (admin_priv
&& fOwner
) {
210 ret
= fOwner
->getSystemSleepType(outSleepType
);
212 ret
= kIOReturnNotPrivileged
;
217 IOReturn
RootDomainUserClient::clientClose( void )
222 task_deallocate(fOwningTask
);
226 return kIOReturnSuccess
;
229 IOReturn
RootDomainUserClient::clientMemoryForType(
231 IOOptionBits
*options
,
232 IOMemoryDescriptor
** memory
)
235 return kIOReturnNotReady
;
237 if (kPMRootDomainMapTraceBuffer
== type
)
239 *memory
= fOwner
->getPMTraceMemoryDescriptor();
243 return kIOReturnSuccess
;
245 return kIOReturnNotFound
;
249 return kIOReturnUnsupported
;
252 IOReturn
RootDomainUserClient::externalMethod(
254 IOExternalMethodArguments
* arguments
,
255 IOExternalMethodDispatch
* dispatch __unused
,
256 OSObject
* target __unused
,
257 void * reference __unused
)
259 IOReturn ret
= kIOReturnBadArgument
;
263 case kPMSetAggressiveness
:
264 if ((2 == arguments
->scalarInputCount
)
265 && (1 == arguments
->scalarOutputCount
))
267 ret
= this->secureSetAggressiveness(
268 (unsigned long)arguments
->scalarInput
[0],
269 (unsigned long)arguments
->scalarInput
[1],
270 (int *)&arguments
->scalarOutput
[0]);
274 case kPMGetAggressiveness
:
275 if ((1 == arguments
->scalarInputCount
)
276 && (1 == arguments
->scalarOutputCount
))
278 ret
= fOwner
->getAggressiveness(
279 (unsigned long)arguments
->scalarInput
[0],
280 (unsigned long *)&arguments
->scalarOutput
[0]);
285 if (1 == arguments
->scalarOutputCount
)
287 ret
= this->secureSleepSystem(
288 (uint32_t *)&arguments
->scalarOutput
[0]);
292 case kPMAllowPowerChange
:
293 if (1 == arguments
->scalarInputCount
)
295 ret
= fOwner
->allowPowerChange(
296 arguments
->scalarInput
[0]);
300 case kPMCancelPowerChange
:
301 if (1 == arguments
->scalarInputCount
)
303 ret
= fOwner
->cancelPowerChange(
304 arguments
->scalarInput
[0]);
308 case kPMShutdownSystem
:
309 // deperecated interface
310 ret
= kIOReturnUnsupported
;
313 case kPMRestartSystem
:
314 // deperecated interface
315 ret
= kIOReturnUnsupported
;
318 case kPMSleepSystemOptions
:
319 ret
= this->secureSleepSystemOptions(
320 arguments
->structureInput
,
321 arguments
->structureInputSize
,
322 (uint32_t *)&arguments
->scalarOutput
[0]);
324 case kPMSetMaintenanceWakeCalendar
:
325 ret
= this->secureSetMaintenanceWakeCalendar(
326 (IOPMCalendarStruct
*)arguments
->structureInput
,
327 (uint32_t *)&arguments
->structureOutput
);
328 arguments
->structureOutputSize
= sizeof(uint32_t);
331 case kPMSetUserAssertionLevels
:
332 ret
= this->secureSetUserAssertionLevels(
333 (uint32_t)arguments
->scalarInput
[0]);
336 case kPMActivityTickle
:
337 if ( fOwner
->checkSystemCanSustainFullWake() )
339 fOwner
->reportUserInput( );
340 fOwner
->setProperty(kIOPMRootDomainWakeTypeKey
, "UserActivity Assertion");
342 ret
= kIOReturnSuccess
;
345 case kPMSetClamshellSleepState
:
346 fOwner
->setDisableClamShellSleep(arguments
->scalarInput
[0] ? true : false);
347 ret
= kIOReturnSuccess
;
350 case kPMGetSystemSleepType
:
351 if (1 == arguments
->scalarOutputCount
)
353 ret
= this->secureGetSystemSleepType(
354 (uint32_t *) &arguments
->scalarOutput
[0]);
358 case kPMSleepWakeWatchdogEnable
:
359 ret
= clientHasPrivilege(fOwningTask
, kIOClientPrivilegeAdministrator
);
360 if (ret
== kIOReturnSuccess
)
361 fOwner
->sleepWakeDebugEnableWdog();
365 case kPMSleepWakeDebugTrig
:
366 ret
= clientHasPrivilege(fOwningTask
, kIOClientPrivilegeAdministrator
);
367 if (ret
== kIOReturnSuccess
)
368 fOwner
->sleepWakeDebugTrig(false);
371 case kPMSetDisplayPowerOn
:
372 if (1 == arguments
->scalarInputCount
)
374 ret
= clientHasPrivilege(fOwningTask
, kIOClientPrivilegeAdministrator
);
375 if (ret
== kIOReturnSuccess
)
376 fOwner
->setDisplayPowerOn((uint32_t)arguments
->scalarInput
[0]);
380 case kPMMethodCopySystemTimeline:
381 // intentional fallthrough
382 case kPMMethodCopyDetailedTimeline:
384 if (!arguments->structureOutputDescriptor)
386 // TODO: Force IOKit.framework to always send this data out
387 // of line; so I don't have to create a MemoryDescriptor here.
388 mem_size = arguments->structureOutputSize;
389 mem = IOMemoryDescriptor::withAddressRange(
390 (mach_vm_address_t)arguments->structureOutput,
391 (mach_vm_size_t)mem_size,
392 kIODirectionIn, current_task());
394 mem_size = arguments->structureOutputDescriptorSize;
395 if (( mem = arguments->structureOutputDescriptor ))
401 mem->prepare(kIODirectionNone);
403 if (kPMMethodCopySystemTimeline == selector) {
404 arguments->scalarOutput[0] = fOwner->copySystemTimeline(
408 if (kPMMethodCopyDetailedTimeline == selector) {
409 arguments->scalarOutput[0] = fOwner->copyDetailedTimeline(
413 if (arguments->structureOutputDescriptor) {
414 arguments->structureOutputDescriptorSize = mem_size;
416 arguments->structureOutputSize = mem_size;
421 ret = kIOReturnSuccess;
423 ret = kIOReturnCannotWire;
430 return kIOReturnBadArgument
;
436 /* getTargetAndMethodForIndex
437 * Not used. We prefer to use externalMethod() for user client invocations.
438 * We maintain getTargetAndExternalMethod since it's an exported symbol,
439 * and only for that reason.
441 IOExternalMethod
* RootDomainUserClient::getTargetAndMethodForIndex(
442 IOService
** targetP
, UInt32 index
)
445 return super::getTargetAndMethodForIndex(targetP
, index
);
449 * Does nothing. Exists only for exported symbol compatibility.
452 RootDomainUserClient::setPreventative(UInt32 on_off
, UInt32 types_of_sleep
)
453 { return; } // DO NOT EDIT