commands/setcritical/setcritical.cpp
author Tom Sutcliffe <thomas.sutcliffe@accenture.com>
Sun, 17 Oct 2010 18:43:12 +0100
changeset 86 849a0b46c767
parent 0 7f656887cf89
permissions -rw-r--r--
Fixed lots of issues with installing a low-caps version of fshell from SIS file. * Fixed issue in CCommandFactory whereby some APIs like GetCommandInfoL could trigger allocations on the wrong heap or signals to the wrong thread. The symptoms were often seen as a crash in the which_00 thread when running ciftest. * Lots of build fixes for when FSHELL_PROTECTED_UIDS isn't defined and when all capabilities aren't available. * Added new platform.mmh macro FSHELL_OPEN_SIGNED. * Open signing of fshell SIS files is now supported for production S60 handsets. Build fshell with the FSHELL_OPEN_SIGNED macro defined (and without defining FSHELL_CAP_ALL or FSHELL_PROTECTED_UIDS) in your platform.mmh and submit \epoc32\fshell\fshell.unsigned.sis to https://www.symbiansigned.com/app/page/public/openSignedOnline.do . The following commands are not available when using Open Signing due to Platform Security restrictions: fdb; kerninfo; chunkinfo; svrinfo; objinfo; sudo; fsck; localdrive; ramdefrag; readmem; reboot; setcritical; setpriority. Others such as chkdeps, e32header, ps, and fshell itself will run but in a restricted capacity (for example, fshell will no longer allow you to modify files in the \sys\bin directory). * Removed commands objinfo, svrinfo, chunkinfo, readmem, fsck completely when memory access isn't present - previously they would still appear in the help but would give an error if you tried to run them.

// setcritical.cpp
// 
// Copyright (c) 2008 - 2010 Accenture. All rights reserved.
// This component and the accompanying materials are made available
// under the terms of the "Eclipse Public License v1.0"
// which accompanies this distribution, and is available
// at the URL "http://www.eclipse.org/legal/epl-v10.html".
// 
// Initial Contributors:
// Accenture - Initial contribution
//

#include <fshell/memoryaccesscmd.h>

using namespace IoUtils;

class CCmdSetcritical : public CMemoryAccessCommandBase
	{
public:
	static CCommandBase* NewLC();
	~CCmdSetcritical();
private:
	CCmdSetcritical();
private: // From CCommandBase.
	virtual const TDesC& Name() const;
	virtual void DoRunL();
	virtual void ArgumentsL(RCommandArgumentList& aArguments);
	virtual void OptionsL(RCommandOptionList& aOptions);
private:
	RArray<TUint> iTids;
	TBool iSystem, iPermanent, iProcess, iCritical;
	};


CCommandBase* CCmdSetcritical::NewLC()
	{
	CCmdSetcritical* self = new(ELeave) CCmdSetcritical();
	CleanupStack::PushL(self);
	self->BaseConstructL();
	return self;
	}

CCmdSetcritical::~CCmdSetcritical()
	{
	iTids.Close();
	}

CCmdSetcritical::CCmdSetcritical()
	{
	}

const TDesC& CCmdSetcritical::Name() const
	{
	_LIT(KName, "setcritical");	
	return KName;
	}

void CCmdSetcritical::ArgumentsL(RCommandArgumentList& aArguments)
	{
	aArguments.AppendUintL(iTids, _L("threadid"));
	}

void CCmdSetcritical::OptionsL(RCommandOptionList& aOptions)
	{
	aOptions.AppendBoolL(iSystem, _L("system"));
	aOptions.AppendBoolL(iProcess, _L("process"));
	aOptions.AppendBoolL(iCritical, _L("critical"));
	aOptions.AppendBoolL(iPermanent, _L("permanent"));
	}

void CCmdSetcritical::DoRunL()
	{
	LoadMemoryAccessL();

	TUint set = 0;
	if (iSystem && iCritical)
		set = KThreadFlagSystemCritical;
	else if (iSystem && iPermanent)
		set = KThreadFlagSystemPermanent;
	else if (iProcess && iCritical)
		set = KThreadFlagProcessCritical;
	else if (iProcess && iPermanent)
		set = KThreadFlagProcessPermanent;
	else if (!iSystem && !iCritical && !iProcess && !iPermanent)
		set = 0;
	else
		{
		LeaveIfErr(KErrArgument, _L("Incompatible options specified. You must either give no options (to specify ENotCritical) or one of --system/--process and one of --critical/--permanent"));
		}

	for (TInt i = 0; i < iTids.Count(); i++)
		{
		TUint id = iTids[i];
		RThread thread;
		TInt err = iMemAccess.RThreadForceOpen(thread, id);
		if (!err) err = iMemAccess.SetThreadCriticalFlags(thread, set);
		if (err)
			{
			PrintError(err, _L("Couldn't set flags for thread %u."), id);
			}
		thread.Close();
		}
	}

EXE_BOILER_PLATE(CCmdSetcritical)