--- /dev/null
+/*
+ * Copyright (c) 2006, 2010 Apple Inc. All rights reserved.
+ *
+ * @APPLE_LICENSE_HEADER_START@
+ *
+ * This file contains Original Code and/or Modifications of Original Code
+ * as defined in and that are subject to the Apple Public Source License
+ * Version 2.0 (the 'License'). You may not use this file except in
+ * compliance with the License. Please obtain a copy of the License at
+ * http://www.opensource.apple.com/apsl/ and read it before using this
+ * file.
+ *
+ * The Original Code and all software distributed under the License are
+ * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
+ * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
+ * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
+ * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
+ * Please see the License for the specific language governing rights and
+ * limitations under the License.
+ *
+ * @APPLE_LICENSE_HEADER_END@
+ */
+
+#include <sys/cdefs.h>
+#include <unistd.h>
+#include <errno.h>
+#include <string.h>
+#include <strings.h>
+#include <sys/errno.h>
+#include <sys/msgbuf.h>
+#include <sys/resource.h>
+#define BUILD_LIBSYSCALL 1
+#include <sys/process_policy.h>
+#include <mach/message.h>
+
+#include "libproc_internal.h"
+
+int __proc_info(int callnum, int pid, int flavor, uint64_t arg, void * buffer, int buffersize);
+__private_extern__ int proc_setthreadname(void * buffer, int buffersize);
+int __process_policy(int scope, int action, int policy, int policy_subtype, proc_policy_attribute_t * attrp, pid_t target_pid, uint64_t target_threadid);
+int proc_rlimit_control(pid_t pid, int flavor, void *arg);
+
+int
+proc_listpids(uint32_t type, uint32_t typeinfo, void *buffer, int buffersize)
+{
+ int retval;
+
+ if ((type >= PROC_ALL_PIDS) || (type <= PROC_PPID_ONLY)) {
+ if ((retval = __proc_info(PROC_INFO_CALL_LISTPIDS, type, typeinfo,(uint64_t)0, buffer, buffersize)) == -1)
+ return(0);
+ } else {
+ errno = EINVAL;
+ retval = 0;
+ }
+ return(retval);
+}
+
+
+int
+proc_listallpids(void * buffer, int buffersize)
+{
+ int numpids;
+ numpids = proc_listpids(PROC_ALL_PIDS, (uint32_t)0, buffer, buffersize);
+
+ if (numpids == -1)
+ return(-1);
+ else
+ return(numpids/sizeof(int));
+}
+
+int
+proc_listpgrppids(pid_t pgrpid, void * buffer, int buffersize)
+{
+ int numpids;
+ numpids = proc_listpids(PROC_PGRP_ONLY, (uint32_t)pgrpid, buffer, buffersize);
+ if (numpids == -1)
+ return(-1);
+ else
+ return(numpids/sizeof(int));
+}
+
+int
+proc_listchildpids(pid_t ppid, void * buffer, int buffersize)
+{
+ int numpids;
+ numpids = proc_listpids(PROC_PPID_ONLY, (uint32_t)ppid, buffer, buffersize);
+ if (numpids == -1)
+ return(-1);
+ else
+ return(numpids/sizeof(int));
+}
+
+
+int
+proc_pidinfo(int pid, int flavor, uint64_t arg, void *buffer, int buffersize)
+{
+ int retval;
+
+ if ((retval = __proc_info(PROC_INFO_CALL_PIDINFO, pid, flavor, arg, buffer, buffersize)) == -1)
+ return(0);
+
+ return(retval);
+}
+
+int
+proc_pid_rusage(int pid, int flavor, rusage_info_t *buffer)
+{
+ return (__proc_info(PROC_INFO_CALL_PIDRUSAGE, pid, flavor, 0, buffer, 0));
+}
+
+int
+proc_pidfdinfo(int pid, int fd, int flavor, void * buffer, int buffersize)
+{
+ int retval;
+
+ if ((retval = __proc_info(PROC_INFO_CALL_PIDFDINFO, pid, flavor, (uint64_t)fd, buffer, buffersize)) == -1)
+ return(0);
+
+ return (retval);
+}
+
+
+int
+proc_pidfileportinfo(int pid, uint32_t fileport, int flavor, void *buffer, int buffersize)
+{
+ int retval;
+
+ if ((retval = __proc_info(PROC_INFO_CALL_PIDFILEPORTINFO, pid, flavor, (uint64_t)fileport, buffer, buffersize)) == -1)
+ return (0);
+ return (retval);
+}
+
+
+int
+proc_name(int pid, void * buffer, uint32_t buffersize)
+{
+ int retval = 0, len;
+ struct proc_bsdinfo pbsd;
+
+
+ if (buffersize < sizeof(pbsd.pbi_name)) {
+ errno = ENOMEM;
+ return(0);
+ }
+
+ retval = proc_pidinfo(pid, PROC_PIDTBSDINFO, (uint64_t)0, &pbsd, sizeof(struct proc_bsdinfo));
+ if (retval != 0) {
+ if (pbsd.pbi_name[0]) {
+ bcopy(&pbsd.pbi_name, buffer, sizeof(pbsd.pbi_name));
+ } else {
+ bcopy(&pbsd.pbi_comm, buffer, sizeof(pbsd.pbi_comm));
+ }
+ len = strlen(buffer);
+ return(len);
+ }
+ return(0);
+}
+
+int
+proc_regionfilename(int pid, uint64_t address, void * buffer, uint32_t buffersize)
+{
+ int retval = 0, len;
+ struct proc_regionwithpathinfo reginfo;
+
+ if (buffersize < MAXPATHLEN) {
+ errno = ENOMEM;
+ return(0);
+ }
+
+ retval = proc_pidinfo(pid, PROC_PIDREGIONPATHINFO, (uint64_t)address, ®info, sizeof(struct proc_regionwithpathinfo));
+ if (retval != -1) {
+ len = strlen(®info.prp_vip.vip_path[0]);
+ if (len != 0) {
+ if (len > MAXPATHLEN)
+ len = MAXPATHLEN;
+ bcopy(®info.prp_vip.vip_path[0], buffer, len);
+ return(len);
+ }
+ return(0);
+ }
+ return(0);
+
+}
+
+int
+proc_kmsgbuf(void * buffer, uint32_t buffersize)
+{
+ int retval;
+
+ if ((retval = __proc_info(PROC_INFO_CALL_KERNMSGBUF, 0, 0, (uint64_t)0, buffer, buffersize)) == -1)
+ return(0);
+ return (retval);
+}
+
+int
+proc_pidpath(int pid, void * buffer, uint32_t buffersize)
+{
+ int retval, len;
+
+ if (buffersize < PROC_PIDPATHINFO_SIZE) {
+ errno = ENOMEM;
+ return(0);
+ }
+ if (buffersize > PROC_PIDPATHINFO_MAXSIZE) {
+ errno = EOVERFLOW;
+ return(0);
+ }
+
+ retval = __proc_info(PROC_INFO_CALL_PIDINFO, pid, PROC_PIDPATHINFO, (uint64_t)0, buffer, buffersize);
+ if (retval != -1) {
+ len = strlen(buffer);
+ return(len);
+ }
+ return (0);
+}
+
+
+int
+proc_libversion(int *major, int * minor)
+{
+
+ if (major != NULL)
+ *major = 1;
+ if (minor != NULL)
+ *minor = 1;
+ return(0);
+}
+
+int
+proc_setpcontrol(const int control)
+{
+ int retval ;
+
+ if (control < PROC_SETPC_NONE || control > PROC_SETPC_TERMINATE)
+ return(EINVAL);
+
+ if ((retval = __proc_info(PROC_INFO_CALL_SETCONTROL, getpid(), PROC_SELFSET_PCONTROL, (uint64_t)control, NULL, 0)) == -1)
+ return(errno);
+
+ return(0);
+}
+
+
+__private_extern__ int
+proc_setthreadname(void * buffer, int buffersize)
+{
+ int retval;
+
+ retval = __proc_info(PROC_INFO_CALL_SETCONTROL, getpid(), PROC_SELFSET_THREADNAME, (uint64_t)0, buffer, buffersize);
+
+ if (retval == -1)
+ return(errno);
+ else
+ return(0);
+}
+
+int
+proc_track_dirty(pid_t pid, uint32_t flags)
+{
+ if (__proc_info(PROC_INFO_CALL_DIRTYCONTROL, pid, PROC_DIRTYCONTROL_TRACK, flags, NULL, 0) == -1) {
+ return errno;
+ }
+
+ return 0;
+}
+
+int
+proc_set_dirty(pid_t pid, bool dirty)
+{
+ if (__proc_info(PROC_INFO_CALL_DIRTYCONTROL, pid, PROC_DIRTYCONTROL_SET, dirty, NULL, 0) == -1) {
+ return errno;
+ }
+
+ return 0;
+}
+
+int
+proc_get_dirty(pid_t pid, uint32_t *flags)
+{
+ int retval;
+
+ if (!flags) {
+ return EINVAL;
+ }
+
+ retval = __proc_info(PROC_INFO_CALL_DIRTYCONTROL, pid, PROC_DIRTYCONTROL_GET, 0, NULL, 0);
+ if (retval == -1) {
+ return errno;
+ }
+
+ *flags = retval;
+
+ return 0;
+}
+
+int
+proc_terminate(pid_t pid, int *sig)
+{
+ int retval;
+
+ if (!sig) {
+ return EINVAL;
+ }
+
+ retval = __proc_info(PROC_INFO_CALL_TERMINATE, pid, 0, 0, NULL, 0);
+ if (retval == -1) {
+ return errno;
+ }
+
+ *sig = retval;
+
+ return 0;
+}
+
+int
+proc_set_cpumon_params(pid_t pid, int percentage, int interval)
+{
+ proc_policy_cpuusage_attr_t attr;
+
+ attr.ppattr_cpu_attr = PROC_POLICY_RSRCACT_NOTIFY_EXC;
+ attr.ppattr_cpu_percentage = percentage;
+ attr.ppattr_cpu_attr_interval = (uint64_t)interval;
+ attr.ppattr_cpu_attr_deadline = 0;
+
+ return(__process_policy(PROC_POLICY_SCOPE_PROCESS, PROC_POLICY_ACTION_SET, PROC_POLICY_RESOURCE_USAGE,
+ PROC_POLICY_RUSAGE_CPU, (proc_policy_attribute_t*)&attr, pid, 0));
+}
+
+int
+proc_get_cpumon_params(pid_t pid, int *percentage, int *interval)
+{
+ proc_policy_cpuusage_attr_t attr;
+ int ret;
+
+ ret = __process_policy(PROC_POLICY_SCOPE_PROCESS, PROC_POLICY_ACTION_GET, PROC_POLICY_RESOURCE_USAGE,
+ PROC_POLICY_RUSAGE_CPU, (proc_policy_attribute_t*)&attr, pid, 0);
+
+ if ((ret == 0) && (attr.ppattr_cpu_attr == PROC_POLICY_RSRCACT_NOTIFY_EXC)) {
+ *percentage = attr.ppattr_cpu_percentage;
+ *interval = attr.ppattr_cpu_attr_interval;
+ } else {
+ *percentage = 0;
+ *interval = 0;
+ }
+
+ return (ret);
+}
+
+int
+proc_set_cpumon_defaults(pid_t pid)
+{
+ proc_policy_cpuusage_attr_t attr;
+
+ attr.ppattr_cpu_attr = PROC_POLICY_RSRCACT_NOTIFY_EXC;
+ attr.ppattr_cpu_percentage = PROC_POLICY_CPUMON_DEFAULTS;
+ attr.ppattr_cpu_attr_interval = 0;
+ attr.ppattr_cpu_attr_deadline = 0;
+
+ return(__process_policy(PROC_POLICY_SCOPE_PROCESS, PROC_POLICY_ACTION_SET, PROC_POLICY_RESOURCE_USAGE,
+ PROC_POLICY_RUSAGE_CPU, (proc_policy_attribute_t*)&attr, pid, 0));
+}
+
+int
+proc_disable_cpumon(pid_t pid)
+{
+ proc_policy_cpuusage_attr_t attr;
+
+ attr.ppattr_cpu_attr = PROC_POLICY_RSRCACT_NOTIFY_EXC;
+ attr.ppattr_cpu_percentage = PROC_POLICY_CPUMON_DISABLE;
+ attr.ppattr_cpu_attr_interval = 0;
+ attr.ppattr_cpu_attr_deadline = 0;
+
+ return(__process_policy(PROC_POLICY_SCOPE_PROCESS, PROC_POLICY_ACTION_SET, PROC_POLICY_RESOURCE_USAGE,
+ PROC_POLICY_RUSAGE_CPU, (proc_policy_attribute_t*)&attr, pid, 0));
+}
+
+int
+proc_set_wakemon_params(pid_t pid, int rate_hz, int flags __unused)
+{
+ struct proc_rlimit_control_wakeupmon params;
+
+ params.wm_flags = WAKEMON_ENABLE;
+ params.wm_rate = rate_hz;
+
+ return (proc_rlimit_control(pid, RLIMIT_WAKEUPS_MONITOR, ¶ms));
+}
+
+#ifndef WAKEMON_GET_PARAMS
+#define WAKEMON_GET_PARAMS 0x4
+#define WAKEMON_SET_DEFAULTS 0x8
+#endif
+
+int
+proc_get_wakemon_params(pid_t pid, int *rate_hz, int *flags)
+{
+ struct proc_rlimit_control_wakeupmon params;
+ int error;
+
+ params.wm_flags = WAKEMON_GET_PARAMS;
+
+ if ((error = proc_rlimit_control(pid, RLIMIT_WAKEUPS_MONITOR, ¶ms)) != 0) {
+ return (error);
+ }
+
+ *rate_hz = params.wm_rate;
+ *flags = params.wm_flags;
+
+ return (0);
+}
+
+int
+proc_set_wakemon_defaults(pid_t pid)
+{
+ struct proc_rlimit_control_wakeupmon params;
+
+ params.wm_flags = WAKEMON_ENABLE | WAKEMON_SET_DEFAULTS;
+ params.wm_rate = -1;
+
+ return (proc_rlimit_control(pid, RLIMIT_WAKEUPS_MONITOR, ¶ms));
+}
+
+int
+proc_disable_wakemon(pid_t pid)
+{
+ struct proc_rlimit_control_wakeupmon params;
+
+ params.wm_flags = WAKEMON_DISABLE;
+ params.wm_rate = -1;
+
+ return (proc_rlimit_control(pid, RLIMIT_WAKEUPS_MONITOR, ¶ms));
+}
+
+
+#if TARGET_OS_EMBEDDED
+
+int
+proc_setcpu_percentage(pid_t pid, int action, int percentage)
+{
+ proc_policy_cpuusage_attr_t attr;
+
+ bzero(&attr, sizeof(proc_policy_cpuusage_attr_t));
+ attr.ppattr_cpu_attr = action;
+ attr.ppattr_cpu_percentage = percentage;
+ if (__process_policy(PROC_POLICY_SCOPE_PROCESS, PROC_POLICY_ACTION_APPLY, PROC_POLICY_RESOURCE_USAGE, PROC_POLICY_RUSAGE_CPU, (proc_policy_attribute_t*)&attr, pid, (uint64_t)0) != -1)
+ return(0);
+ else
+ return(errno);
+}
+
+int
+proc_setcpu_deadline(pid_t pid, int action, uint64_t deadline)
+{
+ proc_policy_cpuusage_attr_t attr;
+
+ bzero(&attr, sizeof(proc_policy_cpuusage_attr_t));
+ attr.ppattr_cpu_attr = action;
+ attr.ppattr_cpu_attr_deadline = deadline;
+ if (__process_policy(PROC_POLICY_SCOPE_PROCESS, PROC_POLICY_ACTION_APPLY, PROC_POLICY_RESOURCE_USAGE, PROC_POLICY_RUSAGE_CPU, (proc_policy_attribute_t*)&attr, pid, (uint64_t)0) != -1)
+ return(0);
+ else
+ return(errno);
+
+}
+
+
+int
+proc_setcpu_percentage_withdeadline(pid_t pid, int action, int percentage, uint64_t deadline)
+{
+ proc_policy_cpuusage_attr_t attr;
+
+ bzero(&attr, sizeof(proc_policy_cpuusage_attr_t));
+ attr.ppattr_cpu_attr = action;
+ attr.ppattr_cpu_percentage = percentage;
+ attr.ppattr_cpu_attr_deadline = deadline;
+ if (__process_policy(PROC_POLICY_SCOPE_PROCESS, PROC_POLICY_ACTION_APPLY, PROC_POLICY_RESOURCE_USAGE, PROC_POLICY_RUSAGE_CPU, (proc_policy_attribute_t*)&attr, pid, (uint64_t)0) != -1)
+ return(0);
+ else
+ return(errno);
+}
+
+int
+proc_clear_cpulimits(pid_t pid)
+{
+ if (__process_policy(PROC_POLICY_SCOPE_PROCESS, PROC_POLICY_ACTION_RESTORE, PROC_POLICY_RESOURCE_USAGE, PROC_POLICY_RUSAGE_CPU, NULL, pid, (uint64_t)0) != -1)
+ return(0);
+ else
+ return(errno);
+
+
+}
+
+int
+proc_appstate(int pid, int * appstatep)
+{
+ int state;
+
+ if (__process_policy(PROC_POLICY_SCOPE_PROCESS, PROC_POLICY_ACTION_GET, PROC_POLICY_APP_LIFECYCLE, PROC_POLICY_APPLIFE_STATE, (proc_policy_attribute_t*)&state, pid, (uint64_t)0) != -1) {
+ if (appstatep != NULL)
+ *appstatep = state;
+ return(0);
+ } else
+ return(errno);
+
+}
+
+
+int
+proc_setappstate(int pid, int appstate)
+{
+ int state = appstate;
+
+ switch (state) {
+ case PROC_APPSTATE_NONE:
+ case PROC_APPSTATE_ACTIVE:
+ case PROC_APPSTATE_INACTIVE:
+ case PROC_APPSTATE_BACKGROUND:
+ case PROC_APPSTATE_NONUI:
+ break;
+ default:
+ return(EINVAL);
+ }
+ if (__process_policy(PROC_POLICY_SCOPE_PROCESS, PROC_POLICY_ACTION_APPLY, PROC_POLICY_APP_LIFECYCLE, PROC_POLICY_APPLIFE_STATE, (proc_policy_attribute_t*)&state, pid, (uint64_t)0) != -1)
+ return(0);
+ else
+ return(errno);
+}
+
+int
+proc_devstatusnotify(int devicestatus)
+{
+ int state = devicestatus;
+
+ switch (devicestatus) {
+ case PROC_DEVSTATUS_SHORTTERM:
+ case PROC_DEVSTATUS_LONGTERM:
+ break;
+ default:
+ return(EINVAL);
+ }
+
+ if (__process_policy(PROC_POLICY_SCOPE_PROCESS, PROC_POLICY_ACTION_APPLY, PROC_POLICY_APP_LIFECYCLE, PROC_POLICY_APPLIFE_DEVSTATUS, (proc_policy_attribute_t*)&state, getpid(), (uint64_t)0) != -1) {
+ return(0);
+ } else
+ return(errno);
+
+}
+
+int
+proc_pidbind(int pid, uint64_t threadid, int bind)
+{
+ int state = bind;
+ pid_t passpid = pid;
+
+ switch (bind) {
+ case PROC_PIDBIND_CLEAR:
+ passpid = getpid(); /* ignore pid on clear */
+ break;
+ case PROC_PIDBIND_SET:
+ break;
+ default:
+ return(EINVAL);
+ }
+ if (__process_policy(PROC_POLICY_SCOPE_PROCESS, PROC_POLICY_ACTION_APPLY, PROC_POLICY_APP_LIFECYCLE, PROC_POLICY_APPLIFE_PIDBIND, (proc_policy_attribute_t*)&state, passpid, threadid) != -1)
+ return(0);
+ else
+ return(errno);
+}
+#endif /* TARGET_OS_EMBEDDED */
+
+
+/* Donate importance to adaptive processes from this process */
+int
+proc_donate_importance_boost()
+{
+ int rval;
+
+#if TARGET_OS_EMBEDDED
+ rval = __process_policy(PROC_POLICY_SCOPE_PROCESS,
+ PROC_POLICY_ACTION_ENABLE,
+ PROC_POLICY_APPTYPE,
+ PROC_POLICY_IOS_DONATEIMP,
+ NULL, getpid(), (uint64_t)0);
+#else /* TARGET_OS_EMBEDDED */
+ rval = __process_policy(PROC_POLICY_SCOPE_PROCESS,
+ PROC_POLICY_ACTION_SET,
+ PROC_POLICY_BOOST,
+ PROC_POLICY_IMP_DONATION,
+ NULL, getpid(), 0);
+#endif /* TARGET_OS_EMBEDDED */
+
+ if (rval == 0)
+ return (0);
+ else
+ return (errno);
+}
+
+static __attribute__((noinline)) void
+proc_importance_bad_assertion(char *reason) {
+ (void)reason;
+}
+
+/*
+ * Use the address of these variables as the token. This way, they can be
+ * printed in the debugger as useful names.
+ */
+uint64_t important_boost_assertion_token = 0xfafafafafafafafa;
+uint64_t normal_boost_assertion_token = 0xfbfbfbfbfbfbfbfb;
+uint64_t non_boost_assertion_token = 0xfcfcfcfcfcfcfcfc;
+
+/*
+ * Accept the boost on a message, or request another boost assertion
+ * if we have already accepted the implicit boost for this message.
+ *
+ * Returns EOVERFLOW if an attempt is made to take an extra assertion when not boosted.
+ *
+ * Returns EIO if the message was not a boosting message.
+ * TODO: Return a 'non-boost' token instead.
+ */
+int
+proc_importance_assertion_begin_with_msg(mach_msg_header_t *msg,
+ __unused mach_msg_trailer_t *trailer,
+ uint64_t *assertion_token)
+{
+ int rval = 0;
+
+ if (assertion_token == NULL)
+ return (EINVAL);
+
+ /* Is this a boosting message? */
+ if ((msg->msgh_bits & MACH_MSGH_BITS_RAISEIMP) != 0) {
+
+ /*
+ * Have we accepted the implicit boost for this message yet?
+ * If we haven't accepted it yet, no need to call into kernel.
+ */
+ if ((msg->msgh_bits & MACH_MSGH_BITS_IMPHOLDASRT) == 0) {
+ msg->msgh_bits |= MACH_MSGH_BITS_IMPHOLDASRT;
+ *assertion_token = (uint64_t) &important_boost_assertion_token;
+ return (0);
+ }
+
+ /* Request an additional boost count */
+
+#if TARGET_OS_EMBEDDED
+ rval = __process_policy(PROC_POLICY_SCOPE_PROCESS,
+ PROC_POLICY_ACTION_ENABLE,
+ PROC_POLICY_APPTYPE,
+ PROC_POLICY_IOS_HOLDIMP,
+ NULL, getpid(), 0);
+#else /* TARGET_OS_EMBEDDED */
+ rval = __process_policy(PROC_POLICY_SCOPE_PROCESS,
+ PROC_POLICY_ACTION_HOLD,
+ PROC_POLICY_BOOST,
+ PROC_POLICY_IMP_IMPORTANT,
+ NULL, getpid(), 0);
+#endif /* TARGET_OS_EMBEDDED */
+
+ if (rval == 0) {
+ *assertion_token = (uint64_t) &important_boost_assertion_token;
+ return (0);
+ } else if (errno == EOVERFLOW) {
+ proc_importance_bad_assertion("Attempted to take assertion while not boosted");
+ return (errno);
+ } else {
+ return (errno);
+ }
+ }
+
+ return (EIO);
+}
+
+
+/*
+ * Drop a boost assertion.
+ * Returns EOVERFLOW on boost assertion underflow.
+ */
+int
+proc_importance_assertion_complete(uint64_t assertion_token)
+{
+ int rval = 0;
+
+ if (assertion_token == 0)
+ return (0);
+
+ if (assertion_token == (uint64_t) &important_boost_assertion_token) {
+
+#if TARGET_OS_EMBEDDED
+ rval = __process_policy(PROC_POLICY_SCOPE_PROCESS,
+ PROC_POLICY_ACTION_ENABLE,
+ PROC_POLICY_APPTYPE,
+ PROC_POLICY_IOS_DROPIMP,
+ NULL, getpid(), 0);
+#else /* TARGET_OS_EMBEDDED */
+ rval = __process_policy(PROC_POLICY_SCOPE_PROCESS,
+ PROC_POLICY_ACTION_DROP,
+ PROC_POLICY_BOOST,
+ PROC_POLICY_IMP_IMPORTANT,
+ NULL, getpid(), 0);
+#endif /* TARGET_OS_EMBEDDED */
+
+ if (rval == 0) {
+ return (0);
+ } else if (errno == EOVERFLOW) {
+ proc_importance_bad_assertion("Attempted to drop too many assertions");
+ return (errno);
+ } else {
+ return (errno);
+ }
+ } else {
+ proc_importance_bad_assertion("Attempted to drop assertion with invalid token");
+ return (EIO);
+ }
+}
+
+#if !TARGET_OS_EMBEDDED
+
+int
+proc_clear_vmpressure(pid_t pid)
+{
+ if (__process_policy(PROC_POLICY_SCOPE_PROCESS, PROC_POLICY_ACTION_RESTORE, PROC_POLICY_RESOURCE_STARVATION, PROC_POLICY_RS_VIRTUALMEM, NULL, pid, (uint64_t)0) != -1)
+ return(0);
+ else
+ return(errno);
+}
+
+/* set the current process as one who can resume suspended processes due to low virtual memory. Need to be root */
+int
+proc_set_owner_vmpressure(void)
+{
+ int retval;
+
+ if ((retval = __proc_info(PROC_INFO_CALL_SETCONTROL, getpid(), PROC_SELFSET_VMRSRCOWNER, (uint64_t)0, NULL, 0)) == -1)
+ return(errno);
+
+ return(0);
+}
+
+/* mark yourself to delay idle sleep on disk IO */
+int
+proc_set_delayidlesleep(void)
+{
+ int retval;
+
+ if ((retval = __proc_info(PROC_INFO_CALL_SETCONTROL, getpid(), PROC_SELFSET_DELAYIDLESLEEP, (uint64_t)1, NULL, 0)) == -1)
+ return(errno);
+
+ return(0);
+}
+
+/* Reset yourself to delay idle sleep on disk IO, if already set */
+int
+proc_clear_delayidlesleep(void)
+{
+ int retval;
+
+ if ((retval = __proc_info(PROC_INFO_CALL_SETCONTROL, getpid(), PROC_SELFSET_DELAYIDLESLEEP, (uint64_t)0, NULL, 0)) == -1)
+ return(errno);
+
+ return(0);
+}
+
+/* disable the launch time backgroudn policy and restore the process to default group */
+int
+proc_disable_apptype(pid_t pid, int apptype)
+{
+ switch (apptype) {
+ case PROC_POLICY_OSX_APPTYPE_TAL:
+ case PROC_POLICY_OSX_APPTYPE_DASHCLIENT:
+ break;
+ default:
+ return(EINVAL);
+ }
+
+ if (__process_policy(PROC_POLICY_SCOPE_PROCESS, PROC_POLICY_ACTION_DISABLE, PROC_POLICY_APPTYPE, apptype, NULL, pid, (uint64_t)0) != -1)
+ return(0);
+ else
+ return(errno);
+
+}
+
+/* re-enable the launch time background policy if it had been disabled. */
+int
+proc_enable_apptype(pid_t pid, int apptype)
+{
+ switch (apptype) {
+ case PROC_POLICY_OSX_APPTYPE_TAL:
+ case PROC_POLICY_OSX_APPTYPE_DASHCLIENT:
+ break;
+ default:
+ return(EINVAL);
+
+ }
+
+ if (__process_policy(PROC_POLICY_SCOPE_PROCESS, PROC_POLICY_ACTION_ENABLE, PROC_POLICY_APPTYPE, apptype, NULL, pid, (uint64_t)0) != -1)
+ return(0);
+ else
+ return(errno);
+
+}
+
+#if !TARGET_IPHONE_SIMULATOR
+
+int
+proc_suppress(__unused pid_t pid, __unused uint64_t *generation)
+{
+ return 0;
+}
+
+#endif /* !TARGET_IPHONE_SIMULATOR */
+
+#endif /* !TARGET_OS_EMBEDDED */
+
+
+