memspy/Driver/Kernel/Source/SubChannels/MemSpyDriverLogChanMisc.cpp
changeset 0 a03f92240627
child 30 86a2e675b80a
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/memspy/Driver/Kernel/Source/SubChannels/MemSpyDriverLogChanMisc.cpp	Tue Feb 02 01:57:15 2010 +0200
@@ -0,0 +1,226 @@
+/*
+* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies). 
+* All rights reserved.
+* This component and the accompanying materials are made available
+* under the terms of "Eclipse Public License v1.0"
+* which accompanies this distribution, and is available
+* at the URL "http://www.eclipse.org/legal/epl-v10.html".
+*
+* Initial Contributors:
+* Nokia Corporation - initial contribution.
+*
+* Contributors:
+*
+* Description:
+*
+*/
+
+#include "MemSpyDriverLogChanMisc.h"
+
+// System includes
+#include <memspy/driver/memspydriverconstants.h>
+#include <memspy/driver/memspydriverconstants.h>
+#include <memspy/driver/memspydriverobjectsshared.h>
+
+// Shared includes
+#include "MemSpyDriverOpCodes.h"
+#include "MemSpyDriverObjectsInternal.h"
+
+// User includes
+#include "MemSpyDriverHeap.h"
+#include "MemSpyDriverUtils.h"
+#include "MemSpyDriverDevice.h"
+#include "MemSpyDriverOSAdaption.h"
+
+
+
+DMemSpyDriverLogChanMisc::DMemSpyDriverLogChanMisc( DMemSpyDriverDevice& aDevice, DThread& aThread )
+:   DMemSpyDriverLogChanBase( aDevice, aThread )
+    {
+    TRACE( Kern::Printf("DMemSpyDriverLogChanMisc::DMemSpyDriverLogChanMisc() - START - this: 0x%08x", this ));
+
+    DProcess* process = OSAdaption().DThread().GetOwningProcess( aThread );
+    if  ( process )
+        {
+        DMemSpyDriverOSAdaptionDProcess& processAdaption = OSAdaption().DProcess();
+        //
+        iSID = processAdaption.GetSID( *process );
+        iSecurityZone = processAdaption.GetSecurityZone( *process );
+        //
+        iClientIsMemSpy = ( iSID == KMemSpyUiSID || iSID == KMemSpyConsoleUiSID );
+        }
+    TRACE( Kern::Printf("DMemSpyDriverLogChanMisc::DMemSpyDriverLogChanMisc() - END - sid: 0x%08x, sz: 0x%08x, isMemSpy: %d", iSID, iSecurityZone, iClientIsMemSpy ));
+    }
+
+
+DMemSpyDriverLogChanMisc::~DMemSpyDriverLogChanMisc()
+	{
+	TRACE( Kern::Printf("DMemSpyDriverLogChanMisc::~DMemSpyDriverLogChanMisc() - START - this: 0x%08x", this ));
+
+	TRACE( Kern::Printf("DMemSpyDriverLogChanMisc::~DMemSpyDriverLogChanMisc() - END - this: 0x%08x", this ));
+	}
+
+
+
+TInt DMemSpyDriverLogChanMisc::Request( TInt aFunction, TAny* a1, TAny* a2 )
+	{
+	TInt r = DMemSpyDriverLogChanBase::Request( aFunction, a1, a2 );
+    if  ( r == KErrNone )
+        {
+	    switch( aFunction )
+		    {
+        case EMemSpyDriverOpCodeMiscSetRHeapVTable:
+            r = SetRHeapVTable( a1 );
+            break;
+        case EMemSpyDriverOpCodeMiscGetMemoryModelType:
+            r = GetMemoryModelType();
+            break;
+        case EMemSpyDriverOpCodeMiscGetRoundToPageSize:
+            r = GetRoundToPageSize( (TUint32*) a1 );
+            break;
+        case EMemSpyDriverOpCodeMiscImpersonate:
+            r = Impersonate( (TUint32) a1 );
+            break;
+
+        default:
+            r = KErrNotSupported;
+		    break;
+		    }
+        }
+    //
+    return r;
+	}
+
+
+TBool DMemSpyDriverLogChanMisc::IsHandler( TInt aFunction ) const
+    {
+    return ( aFunction > EMemSpyDriverOpCodeMiscBase && aFunction < EMemSpyDriverOpCodeMiscEnd );
+    }
+
+
+
+
+
+
+
+TInt DMemSpyDriverLogChanMisc::SetRHeapVTable( TAny* aRHeapVTable )
+    {
+    const TUint32 vTable = (TUint32) aRHeapVTable;
+    MemSpyDevice().SetRHeapVTable( vTable );
+    return KErrNone;
+    }
+
+
+
+
+
+TInt DMemSpyDriverLogChanMisc::GetMemoryModelType()
+    {
+    TInt ret = EMemSpyMemoryModelTypeUnknown;
+    //
+  	const TUint32 memModelAttrib = (TUint32) Kern::HalFunction( EHalGroupKernel, EKernelHalMemModelInfo, NULL, NULL );	
+    TRACE( Kern::Printf("DMemSpyDriverLogChanMisc::GetMemoryModelType() - memModelAttrib: 0x%08x", memModelAttrib));
+    //
+    if  ( (memModelAttrib & EMemModelTypeMask ) == EMemModelTypeMultiple )
+        {
+        ret = EMemSpyMemoryModelTypeMultiple;
+        }
+    else if ( (memModelAttrib & EMemModelTypeMask ) == EMemModelTypeMoving )
+        {
+        ret = EMemSpyMemoryModelTypeMoving;
+        }
+    else if ( (memModelAttrib & EMemModelTypeMask ) == EMemModelTypeEmul )
+        {
+        ret = EMemSpyMemoryModelTypeEmulator;
+        }
+    //
+    return ret;
+    }
+
+
+TInt DMemSpyDriverLogChanMisc::GetRoundToPageSize( TUint32* aValue )
+    {
+    // We should probably do this user side... I think the HAL contains the page size.
+    TUint32 value = 0;
+    TInt r = Kern::ThreadRawRead( &ClientThread(), aValue, &value, sizeof(TUint32) );
+    //
+    if  ( r == KErrNone )
+        {
+        value = Kern::RoundToPageSize( value );
+        r = Kern::ThreadRawWrite( &ClientThread(), aValue, &value, sizeof(TUint32) );
+        }
+    //
+    return r;
+    }
+
+
+TInt DMemSpyDriverLogChanMisc::Impersonate( TUint32 aValue )
+    {
+    DMemSpyDriverOSAdaptionDThread& threadAdaption = OSAdaption().DThread();
+    DMemSpyDriverOSAdaptionDProcess& processAdaption = OSAdaption().DProcess();
+    //
+    TInt r = KErrNotFound;
+    //
+    TUint32 sid = iSID;
+    TUint32 sz = iSecurityZone;
+    //
+    if  ( aValue != 0 )
+        {
+        // Must impersonate a SID:
+	    NKern::ThreadEnterCS();
+
+        DObjectCon* container = Kern::Containers()[ EProcess ];
+        container->Wait();
+        NKern::LockSystem();
+
+        const TInt count = container->Count();
+        for(TInt i=0; i<count; i++)
+            {
+            DObject* object = (*container)[ i ];
+            if  ( object != NULL )
+                {
+                DProcess* proc = (DProcess*) object;
+
+                const TUint32 processSID = processAdaption.GetSID( *proc );
+                if  ( processSID == aValue )
+                    {
+                    sid = processSID;
+                    sz = processAdaption.GetSecurityZone( *proc );
+                    TRACE( Kern::Printf("DMemSpyDriverLogChanMisc::Impersonate() - MemSpy impersonates - pid: %d, sid: 0x%08x, sz: %d", proc->iId, sid, sz ));
+                    break;
+                    }
+
+                }
+            }
+
+        NKern::UnlockSystem();
+        container->Signal();
+
+    	NKern::ThreadLeaveCS();
+        }
+
+    DThread& thread = ClientThread();
+    DProcess* myOwningProcess = threadAdaption.GetOwningProcess( thread );
+    //
+    if  ( myOwningProcess )
+        {
+        if  ( iClientIsMemSpy )
+            {
+            processAdaption.SetSID( *myOwningProcess, sid );
+            processAdaption.SetSecurityZone( *myOwningProcess, sz);
+            //
+            r = KErrNone;
+            }
+        else
+            {
+            r = KErrAccessDenied;
+            }
+        }
+    //
+    TRACE( Kern::Printf("DMemSpyDriverLogChanMisc::Impersonate() - MemSpy is now: 0x%08x", sid ));
+    return r;
+    }
+
+
+
+