Fixed lots of issues with installing a low-caps version of fshell from SIS file.
* Fixed issue in CCommandFactory whereby some APIs like GetCommandInfoL could trigger allocations on the wrong heap or signals to the wrong thread. The symptoms were often seen as a crash in the which_00 thread when running ciftest.
* Lots of build fixes for when FSHELL_PROTECTED_UIDS isn't defined and when all capabilities aren't available.
* Added new platform.mmh macro FSHELL_OPEN_SIGNED.
* Open signing of fshell SIS files is now supported for production S60 handsets. Build fshell with the FSHELL_OPEN_SIGNED macro defined (and without defining FSHELL_CAP_ALL or FSHELL_PROTECTED_UIDS) in your platform.mmh and submit \epoc32\fshell\fshell.unsigned.sis to https://www.symbiansigned.com/app/page/public/openSignedOnline.do . The following commands are not available when using Open Signing due to Platform Security restrictions: fdb; kerninfo; chunkinfo; svrinfo; objinfo; sudo; fsck; localdrive; ramdefrag; readmem; reboot; setcritical; setpriority. Others such as chkdeps, e32header, ps, and fshell itself will run but in a restricted capacity (for example, fshell will no longer allow you to modify files in the \sys\bin directory).
* Removed commands objinfo, svrinfo, chunkinfo, readmem, fsck completely when memory access isn't present - previously they would still appear in the help but would give an error if you tried to run them.
// eventhandler.cpp
//
// Copyright (c) 2010 Accenture. All rights reserved.
// This component and the accompanying materials are made available
// under the terms of the "Eclipse Public License v1.0"
// which accompanies this distribution, and is available
// at the URL "http://www.eclipse.org/legal/epl-v10.html".
//
// Initial Contributors:
// Accenture - Initial contribution
//
#include "eventhandler.h"
#include <fshell/extrabtracek.h>
#include <kern_priv.h>
#include <fshell/btrace_parser_defs.h>
DExtraBtraceEventHandler::DExtraBtraceEventHandler(DObject* aParent)
: DKernelEventHandler(&Event, this), iParent(aParent)
{
// iParent has been opened on our behalf by the caller (or it is null)
}
DExtraBtraceEventHandler::~DExtraBtraceEventHandler()
{
if (iParent)
{
NKern::ThreadEnterCS();
iParent->AsyncClose();
NKern::ThreadLeaveCS();
}
}
TUint DExtraBtraceEventHandler::Event(TKernelEvent aEvent, TAny* a1, TAny* /*a2*/, TAny* /*aPrivateData*/)
{
switch (aEvent)
{
case EEventKillThread:
{
DObjectCon* threads=Kern::Containers()[EThread];
threads->Wait(); // hold mutex so so we can't interleave with priming data
DThread* thread = static_cast<DThread*>(a1);
switch (thread->iExitType)
{
case EExitKill:
BTrace8(KAmTraceCategory, EAmTraceSubCategoryThreadKilled, thread->iId, thread->iExitReason);
break;
case EExitTerminate:
BTrace8(KAmTraceCategory, EAmTraceSubCategoryThreadTerminated, thread->iId, thread->iExitReason);
break;
case EExitPanic:
{
BTraceN(KAmTraceCategory, EAmTraceSubCategoryThreadPanicked, thread->iId, thread->iExitReason, thread->iExitCategory.Ptr(), thread->iExitCategory.Size());
break;
}
default:
break;
}
threads->Signal();
break;
}
case EEventRemoveProcess:
{
DProcess* process = static_cast<DProcess*>(a1);
switch (process->iExitType)
{
case EExitKill:
BTrace8(KAmTraceCategory, EAmTraceSubCategoryProcessKilled, process->iId, process->iExitReason);
break;
case EExitTerminate:
BTrace8(KAmTraceCategory, EAmTraceSubCategoryProcessTerminated, process->iId, process->iExitReason);
break;
case EExitPanic:
{
BTraceN(KAmTraceCategory, EAmTraceSubCategoryProcessPanicked, process->iId, process->iExitReason, process->iExitCategory.Ptr(), process->iExitCategory.Size());
break;
}
default:
break;
}
break;
}
default:
break;
}
return ERunNext;
}