Fixed lots of issues with installing a low-caps version of fshell from SIS file.
* Fixed issue in CCommandFactory whereby some APIs like GetCommandInfoL could trigger allocations on the wrong heap or signals to the wrong thread. The symptoms were often seen as a crash in the which_00 thread when running ciftest.
* Lots of build fixes for when FSHELL_PROTECTED_UIDS isn't defined and when all capabilities aren't available.
* Added new platform.mmh macro FSHELL_OPEN_SIGNED.
* Open signing of fshell SIS files is now supported for production S60 handsets. Build fshell with the FSHELL_OPEN_SIGNED macro defined (and without defining FSHELL_CAP_ALL or FSHELL_PROTECTED_UIDS) in your platform.mmh and submit \epoc32\fshell\fshell.unsigned.sis to https://www.symbiansigned.com/app/page/public/openSignedOnline.do . The following commands are not available when using Open Signing due to Platform Security restrictions: fdb; kerninfo; chunkinfo; svrinfo; objinfo; sudo; fsck; localdrive; ramdefrag; readmem; reboot; setcritical; setpriority. Others such as chkdeps, e32header, ps, and fshell itself will run but in a restricted capacity (for example, fshell will no longer allow you to modify files in the \sys\bin directory).
* Removed commands objinfo, svrinfo, chunkinfo, readmem, fsck completely when memory access isn't present - previously they would still appear in the help but would give an error if you tried to run them.
// setcritical.cpp
//
// Copyright (c) 2008 - 2010 Accenture. All rights reserved.
// This component and the accompanying materials are made available
// under the terms of the "Eclipse Public License v1.0"
// which accompanies this distribution, and is available
// at the URL "http://www.eclipse.org/legal/epl-v10.html".
//
// Initial Contributors:
// Accenture - Initial contribution
//
#include <fshell/memoryaccesscmd.h>
using namespace IoUtils;
class CCmdSetcritical : public CMemoryAccessCommandBase
{
public:
static CCommandBase* NewLC();
~CCmdSetcritical();
private:
CCmdSetcritical();
private: // From CCommandBase.
virtual const TDesC& Name() const;
virtual void DoRunL();
virtual void ArgumentsL(RCommandArgumentList& aArguments);
virtual void OptionsL(RCommandOptionList& aOptions);
private:
RArray<TUint> iTids;
TBool iSystem, iPermanent, iProcess, iCritical;
};
CCommandBase* CCmdSetcritical::NewLC()
{
CCmdSetcritical* self = new(ELeave) CCmdSetcritical();
CleanupStack::PushL(self);
self->BaseConstructL();
return self;
}
CCmdSetcritical::~CCmdSetcritical()
{
iTids.Close();
}
CCmdSetcritical::CCmdSetcritical()
{
}
const TDesC& CCmdSetcritical::Name() const
{
_LIT(KName, "setcritical");
return KName;
}
void CCmdSetcritical::ArgumentsL(RCommandArgumentList& aArguments)
{
aArguments.AppendUintL(iTids, _L("threadid"));
}
void CCmdSetcritical::OptionsL(RCommandOptionList& aOptions)
{
aOptions.AppendBoolL(iSystem, _L("system"));
aOptions.AppendBoolL(iProcess, _L("process"));
aOptions.AppendBoolL(iCritical, _L("critical"));
aOptions.AppendBoolL(iPermanent, _L("permanent"));
}
void CCmdSetcritical::DoRunL()
{
LoadMemoryAccessL();
TUint set = 0;
if (iSystem && iCritical)
set = KThreadFlagSystemCritical;
else if (iSystem && iPermanent)
set = KThreadFlagSystemPermanent;
else if (iProcess && iCritical)
set = KThreadFlagProcessCritical;
else if (iProcess && iPermanent)
set = KThreadFlagProcessPermanent;
else if (!iSystem && !iCritical && !iProcess && !iPermanent)
set = 0;
else
{
LeaveIfErr(KErrArgument, _L("Incompatible options specified. You must either give no options (to specify ENotCritical) or one of --system/--process and one of --critical/--permanent"));
}
for (TInt i = 0; i < iTids.Count(); i++)
{
TUint id = iTids[i];
RThread thread;
TInt err = iMemAccess.RThreadForceOpen(thread, id);
if (!err) err = iMemAccess.SetThreadCriticalFlags(thread, set);
if (err)
{
PrintError(err, _L("Couldn't set flags for thread %u."), id);
}
thread.Close();
}
}
EXE_BOILER_PLATE(CCmdSetcritical)