51
|
1 |
/*
|
|
2 |
* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
|
|
3 |
* All rights reserved.
|
|
4 |
* This component and the accompanying materials are made available
|
|
5 |
* under the terms of "Eclipse Public License v1.0"
|
|
6 |
* which accompanies this distribution, and is available
|
|
7 |
* at the URL "http://www.eclipse.org/legal/epl-v10.html".
|
|
8 |
*
|
|
9 |
* Initial Contributors:
|
|
10 |
* Nokia Corporation - initial contribution.
|
|
11 |
*
|
|
12 |
* Contributors:
|
|
13 |
*
|
|
14 |
* Description:
|
|
15 |
*
|
|
16 |
*/
|
|
17 |
|
|
18 |
#include "MemSpyDriverLogChanMisc.h"
|
|
19 |
|
|
20 |
// System includes
|
|
21 |
#include <memspy/driver/memspydriverconstants.h>
|
|
22 |
#include <memspy/driver/memspydriverconstants.h>
|
|
23 |
#include <memspy/driver/memspydriverobjectsshared.h>
|
|
24 |
|
|
25 |
// Shared includes
|
|
26 |
#include "MemSpyDriverOpCodes.h"
|
|
27 |
#include "MemSpyDriverObjectsInternal.h"
|
|
28 |
|
|
29 |
// User includes
|
|
30 |
#include "MemSpyDriverHeap.h"
|
|
31 |
#include "MemSpyDriverUtils.h"
|
|
32 |
#include "MemSpyDriverDevice.h"
|
|
33 |
#include "MemSpyDriverOSAdaption.h"
|
|
34 |
|
|
35 |
|
|
36 |
|
|
37 |
DMemSpyDriverLogChanMisc::DMemSpyDriverLogChanMisc( DMemSpyDriverDevice& aDevice, DThread& aThread )
|
|
38 |
: DMemSpyDriverLogChanBase( aDevice, aThread )
|
|
39 |
{
|
|
40 |
TRACE( Kern::Printf("DMemSpyDriverLogChanMisc::DMemSpyDriverLogChanMisc() - START - this: 0x%08x", this ));
|
|
41 |
|
|
42 |
DProcess* process = OSAdaption().DThread().GetOwningProcess( aThread );
|
|
43 |
if ( process )
|
|
44 |
{
|
|
45 |
DMemSpyDriverOSAdaptionDProcess& processAdaption = OSAdaption().DProcess();
|
|
46 |
//
|
|
47 |
iSID = processAdaption.GetSID( *process );
|
|
48 |
iSecurityZone = processAdaption.GetSecurityZone( *process );
|
|
49 |
//
|
|
50 |
iClientIsMemSpy = ( iSID == KMemSpyUiSID || iSID == KMemSpyConsoleUiSID );
|
|
51 |
}
|
|
52 |
TRACE( Kern::Printf("DMemSpyDriverLogChanMisc::DMemSpyDriverLogChanMisc() - END - sid: 0x%08x, sz: 0x%08x, isMemSpy: %d", iSID, iSecurityZone, iClientIsMemSpy ));
|
|
53 |
}
|
|
54 |
|
|
55 |
|
|
56 |
DMemSpyDriverLogChanMisc::~DMemSpyDriverLogChanMisc()
|
|
57 |
{
|
|
58 |
TRACE( Kern::Printf("DMemSpyDriverLogChanMisc::~DMemSpyDriverLogChanMisc() - START - this: 0x%08x", this ));
|
|
59 |
|
|
60 |
TRACE( Kern::Printf("DMemSpyDriverLogChanMisc::~DMemSpyDriverLogChanMisc() - END - this: 0x%08x", this ));
|
|
61 |
}
|
|
62 |
|
|
63 |
|
|
64 |
|
|
65 |
TInt DMemSpyDriverLogChanMisc::Request( TInt aFunction, TAny* a1, TAny* a2 )
|
|
66 |
{
|
|
67 |
TInt r = DMemSpyDriverLogChanBase::Request( aFunction, a1, a2 );
|
|
68 |
if ( r == KErrNone )
|
|
69 |
{
|
|
70 |
switch( aFunction )
|
|
71 |
{
|
|
72 |
case EMemSpyDriverOpCodeMiscSetRHeapVTable:
|
|
73 |
r = SetRHeapVTable( a1 );
|
|
74 |
break;
|
|
75 |
case EMemSpyDriverOpCodeMiscGetMemoryModelType:
|
|
76 |
r = GetMemoryModelType();
|
|
77 |
break;
|
|
78 |
case EMemSpyDriverOpCodeMiscGetRoundToPageSize:
|
|
79 |
r = GetRoundToPageSize( (TUint32*) a1 );
|
|
80 |
break;
|
|
81 |
case EMemSpyDriverOpCodeMiscImpersonate:
|
|
82 |
r = Impersonate( (TUint32) a1 );
|
|
83 |
break;
|
|
84 |
|
|
85 |
default:
|
|
86 |
r = KErrNotSupported;
|
|
87 |
break;
|
|
88 |
}
|
|
89 |
}
|
|
90 |
//
|
|
91 |
return r;
|
|
92 |
}
|
|
93 |
|
|
94 |
|
|
95 |
TBool DMemSpyDriverLogChanMisc::IsHandler( TInt aFunction ) const
|
|
96 |
{
|
|
97 |
return ( aFunction > EMemSpyDriverOpCodeMiscBase && aFunction < EMemSpyDriverOpCodeMiscEnd );
|
|
98 |
}
|
|
99 |
|
|
100 |
|
|
101 |
|
|
102 |
|
|
103 |
|
|
104 |
|
|
105 |
|
|
106 |
TInt DMemSpyDriverLogChanMisc::SetRHeapVTable( TAny* aRHeapVTable )
|
|
107 |
{
|
|
108 |
const TUint32 vTable = (TUint32) aRHeapVTable;
|
|
109 |
MemSpyDevice().SetRHeapVTable( vTable );
|
|
110 |
return KErrNone;
|
|
111 |
}
|
|
112 |
|
|
113 |
|
|
114 |
|
|
115 |
|
|
116 |
|
|
117 |
TInt DMemSpyDriverLogChanMisc::GetMemoryModelType()
|
|
118 |
{
|
|
119 |
TInt ret = EMemSpyMemoryModelTypeUnknown;
|
|
120 |
//
|
|
121 |
const TUint32 memModelAttrib = (TUint32) Kern::HalFunction( EHalGroupKernel, EKernelHalMemModelInfo, NULL, NULL );
|
|
122 |
TRACE( Kern::Printf("DMemSpyDriverLogChanMisc::GetMemoryModelType() - memModelAttrib: 0x%08x", memModelAttrib));
|
|
123 |
//
|
|
124 |
if ( (memModelAttrib & EMemModelTypeMask ) == EMemModelTypeMultiple )
|
|
125 |
{
|
|
126 |
ret = EMemSpyMemoryModelTypeMultiple;
|
|
127 |
}
|
|
128 |
else if ( (memModelAttrib & EMemModelTypeMask ) == EMemModelTypeMoving )
|
|
129 |
{
|
|
130 |
ret = EMemSpyMemoryModelTypeMoving;
|
|
131 |
}
|
|
132 |
else if ( (memModelAttrib & EMemModelTypeMask ) == EMemModelTypeEmul )
|
|
133 |
{
|
|
134 |
ret = EMemSpyMemoryModelTypeEmulator;
|
|
135 |
}
|
|
136 |
//
|
|
137 |
return ret;
|
|
138 |
}
|
|
139 |
|
|
140 |
|
|
141 |
TInt DMemSpyDriverLogChanMisc::GetRoundToPageSize( TUint32* aValue )
|
|
142 |
{
|
|
143 |
// We should probably do this user side... I think the HAL contains the page size.
|
|
144 |
TUint32 value = 0;
|
|
145 |
TInt r = Kern::ThreadRawRead( &ClientThread(), aValue, &value, sizeof(TUint32) );
|
|
146 |
//
|
|
147 |
if ( r == KErrNone )
|
|
148 |
{
|
|
149 |
value = Kern::RoundToPageSize( value );
|
|
150 |
r = Kern::ThreadRawWrite( &ClientThread(), aValue, &value, sizeof(TUint32) );
|
|
151 |
}
|
|
152 |
//
|
|
153 |
return r;
|
|
154 |
}
|
|
155 |
|
|
156 |
|
|
157 |
TInt DMemSpyDriverLogChanMisc::Impersonate( TUint32 aValue )
|
|
158 |
{
|
|
159 |
DMemSpyDriverOSAdaptionDThread& threadAdaption = OSAdaption().DThread();
|
|
160 |
DMemSpyDriverOSAdaptionDProcess& processAdaption = OSAdaption().DProcess();
|
|
161 |
//
|
|
162 |
TInt r = KErrNotFound;
|
|
163 |
//
|
|
164 |
TUint32 sid = iSID;
|
|
165 |
TUint32 sz = iSecurityZone;
|
|
166 |
//
|
|
167 |
if ( aValue != 0 )
|
|
168 |
{
|
|
169 |
// Must impersonate a SID:
|
|
170 |
NKern::ThreadEnterCS();
|
|
171 |
|
|
172 |
DObjectCon* container = Kern::Containers()[ EProcess ];
|
|
173 |
container->Wait();
|
|
174 |
|
|
175 |
const TInt count = container->Count();
|
|
176 |
for(TInt i=0; i<count; i++)
|
|
177 |
{
|
|
178 |
DObject* object = (*container)[ i ];
|
|
179 |
if ( object != NULL )
|
|
180 |
{
|
|
181 |
DProcess* proc = (DProcess*) object;
|
|
182 |
|
|
183 |
const TUint32 processSID = processAdaption.GetSID( *proc );
|
|
184 |
if ( processSID == aValue )
|
|
185 |
{
|
|
186 |
sid = processSID;
|
|
187 |
sz = processAdaption.GetSecurityZone( *proc );
|
|
188 |
TRACE( Kern::Printf("DMemSpyDriverLogChanMisc::Impersonate() - MemSpy impersonates - pid: %d, sid: 0x%08x, sz: %d", proc->iId, sid, sz ));
|
|
189 |
break;
|
|
190 |
}
|
|
191 |
|
|
192 |
}
|
|
193 |
}
|
|
194 |
|
|
195 |
container->Signal();
|
|
196 |
NKern::ThreadLeaveCS();
|
|
197 |
}
|
|
198 |
|
|
199 |
DThread& thread = ClientThread();
|
|
200 |
DProcess* myOwningProcess = threadAdaption.GetOwningProcess( thread );
|
|
201 |
//
|
|
202 |
if ( myOwningProcess )
|
|
203 |
{
|
|
204 |
if ( iClientIsMemSpy )
|
|
205 |
{
|
|
206 |
processAdaption.SetSID( *myOwningProcess, sid );
|
|
207 |
processAdaption.SetSecurityZone( *myOwningProcess, sz);
|
|
208 |
//
|
|
209 |
r = KErrNone;
|
|
210 |
}
|
|
211 |
else
|
|
212 |
{
|
|
213 |
r = KErrAccessDenied;
|
|
214 |
}
|
|
215 |
}
|
|
216 |
//
|
|
217 |
TRACE( Kern::Printf("DMemSpyDriverLogChanMisc::Impersonate() - MemSpy is now: 0x%08x", sid ));
|
|
218 |
return r;
|
|
219 |
}
|
|
220 |
|
|
221 |
|
|
222 |
|
|
223 |
|