os/kernelhwsrv/kernel/eka/include/u32std.h
author sl
Tue, 10 Jun 2014 14:32:02 +0200
changeset 1 260cb5ec6c19
permissions -rw-r--r--
Update contrib.
sl@0
     1
// Copyright (c) 1995-2009 Nokia Corporation and/or its subsidiary(-ies).
sl@0
     2
// All rights reserved.
sl@0
     3
// This component and the accompanying materials are made available
sl@0
     4
// under the terms of the License "Eclipse Public License v1.0"
sl@0
     5
// which accompanies this distribution, and is available
sl@0
     6
// at the URL "http://www.eclipse.org/legal/epl-v10.html".
sl@0
     7
//
sl@0
     8
// Initial Contributors:
sl@0
     9
// Nokia Corporation - initial contribution.
sl@0
    10
//
sl@0
    11
// Contributors:
sl@0
    12
//
sl@0
    13
// Description:
sl@0
    14
// e32\include\u32std.h
sl@0
    15
//
sl@0
    16
//
sl@0
    17
sl@0
    18
/**
sl@0
    19
 @file
sl@0
    20
 @internalComponent
sl@0
    21
 @released
sl@0
    22
*/
sl@0
    23
sl@0
    24
#ifndef __U32STD_H__
sl@0
    25
#define __U32STD_H__
sl@0
    26
#include <e32cmn.h>
sl@0
    27
#ifndef SYMBIAN_ENABLE_SPLIT_HEADERS
sl@0
    28
#include <e32cmn_private.h>
sl@0
    29
#endif
sl@0
    30
#include <e32hal.h>
sl@0
    31
#include <e32lmsg.h>
sl@0
    32
#include <e32event.h>
sl@0
    33
#include <e32ldr.h>
sl@0
    34
#include <e32ldr_private.h>
sl@0
    35
#include <e32power.h>
sl@0
    36
#include <e32shbufcmn.h>
sl@0
    37
#include <e32property.h>
sl@0
    38
#include <u32property.h>
sl@0
    39
#include <u32hal.h>
sl@0
    40
sl@0
    41
#include <cpudefs.h>
sl@0
    42
sl@0
    43
#ifdef __MARM__
sl@0
    44
#define	EKA2_ENTRY_POINT_VERSION_IDENTIFIER	\
sl@0
    45
	asm("tst pc, #%a0" : : "i" ((TInt)0) )
sl@0
    46
#endif
sl@0
    47
sl@0
    48
struct TUnicodeDataSet;                 // forward declaration
sl@0
    49
struct TCollationDataSet;               // forward declaration
sl@0
    50
sl@0
    51
/*
sl@0
    52
The LCharSet structure is used in Unicode builds to supply locale-specific
sl@0
    53
character attribute and collation data.
sl@0
    54
sl@0
    55
The structure is defined in both builds to avoid having to have a dummy ExecHandler::GetLocaleCharSet function
sl@0
    56
with a different signature in the 8-bit build.
sl@0
    57
*/
sl@0
    58
struct LCharSet
sl@0
    59
	{
sl@0
    60
	const TUnicodeDataSet* iCharDataSet;			// if non-null, character data overriding standard Unicode data
sl@0
    61
	const TCollationDataSet* iCollationDataSet;		// if non-null, locale-specific collation data
sl@0
    62
	};
sl@0
    63
sl@0
    64
extern const LCharSet* GetLocaleCharSet();
sl@0
    65
sl@0
    66
/** @internalTechnology */
sl@0
    67
const TInt KNumLocaleExports = 22;
sl@0
    68
sl@0
    69
//
sl@0
    70
// The bits in the type table (non-Unicode build only)
sl@0
    71
//
sl@0
    72
#ifndef _UNICODE
sl@0
    73
sl@0
    74
/** @internalTechnology */
sl@0
    75
const TUint __U=0x01; // Uppercase letter
sl@0
    76
sl@0
    77
/** @internalTechnology */
sl@0
    78
const TUint __L=0x02; // Lowercase letter
sl@0
    79
sl@0
    80
/** @internalTechnology */
sl@0
    81
const TUint __D=0x04; // Decimal digit
sl@0
    82
sl@0
    83
/** @internalTechnology */
sl@0
    84
const TUint __S=0x08; // Space
sl@0
    85
sl@0
    86
/** @internalTechnology */
sl@0
    87
const TUint __P=0x10; // Punctuation
sl@0
    88
sl@0
    89
/** @internalTechnology */
sl@0
    90
const TUint __C=0x20; // Control character
sl@0
    91
sl@0
    92
/** @internalTechnology */
sl@0
    93
const TUint __X=0x40; // Hex digit
sl@0
    94
sl@0
    95
/** @internalTechnology */
sl@0
    96
const TUint __B=0x80; // A blank character
sl@0
    97
sl@0
    98
#endif
sl@0
    99
sl@0
   100
//
sl@0
   101
// Time set mode parameters for setting system time and offset
sl@0
   102
//
sl@0
   103
enum TTimeSetMode
sl@0
   104
	{
sl@0
   105
	ETimeSetTime = 1,    // set the time to the value given, else leave it unchanged
sl@0
   106
	ETimeSetOffset = 2,  // set the offset to the value given, else leave it unchanged
sl@0
   107
	ETimeSetAllowTimeReversal = 4,  // allow time to go backwards
sl@0
   108
	ETimeSetNoTimeUpdate = 8,       // Don't restart second queue or notify changes - not valid with ESetTime, used early in boot only
sl@0
   109
	ETimeSetLocalTime = 16,			// Set time in local time, instead of UTC
sl@0
   110
	ETimeSetSecure = 32,  // use when setting the secure hardware clock
sl@0
   111
	};
sl@0
   112
sl@0
   113
//
sl@0
   114
enum TMatchType {EMatchNormal,EMatchFolded,EMatchCollated};
sl@0
   115
sl@0
   116
//
sl@0
   117
// Constants for descriptor implementation code
sl@0
   118
//
sl@0
   119
enum TDesType {EBufC,EPtrC,EPtr,EBuf,EBufCPtr};
sl@0
   120
const TUint KMaskDesLength=0xfffffff;
sl@0
   121
const TInt KShiftDesType=28;
sl@0
   122
sl@0
   123
//
sl@0
   124
// Constants for iFlags in DProcess and DThread
sl@0
   125
//
sl@0
   126
const TUint KThreadFlagProcessCritical		= 0x00000001;	// thread panic panics process
sl@0
   127
const TUint KThreadFlagProcessPermanent		= 0x00000002;	// thread exit of any kind causes process to exit (=main)
sl@0
   128
const TUint KThreadFlagSystemCritical		= 0x00000004;	// thread panic reboots entire system
sl@0
   129
const TUint KThreadFlagSystemPermanent		= 0x00000008;	// thread exit of any kind reboots entire system
sl@0
   130
const TUint KThreadFlagOriginal				= 0x00000010;
sl@0
   131
const TUint KThreadFlagLastChance			= 0x00000020;
sl@0
   132
const TUint KThreadFlagRealtime				= 0x00000040;	// thread will be panicked when using some non-realtime functions
sl@0
   133
const TUint KThreadFlagRealtimeTest			= 0x00000080;	// non-realtime functions only warn rather than panic
sl@0
   134
const TUint KThreadFlagLocalThreadDataValid	= 0x00000100;	// thread has valid local thread data
sl@0
   135
const TUint KProcessFlagPriorityControl		= 0x40000000;
sl@0
   136
const TUint KProcessFlagJustInTime			= 0x80000000;
sl@0
   137
const TUint KProcessFlagSystemCritical		= KThreadFlagSystemCritical;	// process panic reboots entire system
sl@0
   138
const TUint KProcessFlagSystemPermanent		= KThreadFlagSystemPermanent;	// process exit of any kind reboots entire system
sl@0
   139
//
sl@0
   140
const TUint KThreadHandle=0x40000000;
sl@0
   141
//
sl@0
   142
struct SPtrC8 {TInt length;const TUint8 *ptr;};
sl@0
   143
struct SBufC8 {TInt length;TUint8 buf[1];};
sl@0
   144
struct SPtr8 {TInt length;TInt maxLength;TUint8 *ptr;};
sl@0
   145
struct SBuf8 {TInt length;TInt maxLength;TUint8 buf[1];};
sl@0
   146
struct SBufCPtr8 {TInt length;TInt maxLength;SBufC8 *ptr;};
sl@0
   147
sl@0
   148
struct SPtrC16 {TInt length;const TUint16 *ptr;};
sl@0
   149
struct SBufC16 {TInt length;TUint16 buf[1];};
sl@0
   150
struct SPtr16 {TInt length;TInt maxLength;TUint16 *ptr;};
sl@0
   151
struct SBuf16 {TInt length;TInt maxLength;TUint16 buf[1];};
sl@0
   152
struct SBufCPtr16 {TInt length;TInt maxLength;SBufC16 *ptr;};
sl@0
   153
sl@0
   154
//
sl@0
   155
// Flags used for IPC copy functions
sl@0
   156
//
sl@0
   157
const TInt KChunkShiftBy0=0;
sl@0
   158
const TInt KChunkShiftBy1=KMinTInt;
sl@0
   159
const TInt KIpcDirRead=0;
sl@0
   160
const TInt KIpcDirWrite=0x10000000;
sl@0
   161
sl@0
   162
class TChunkCreate
sl@0
   163
	{
sl@0
   164
public:
sl@0
   165
	// Attributes for chunk creation that are used by both euser and the kernel
sl@0
   166
	// by classes TChunkCreateInfo and SChunkCreateInfo, respectively.
sl@0
   167
	enum TChunkCreateAtt
sl@0
   168
		{
sl@0
   169
		ENormal				= 0x00000000,
sl@0
   170
		EDoubleEnded		= 0x00000001,
sl@0
   171
		EDisconnected		= 0x00000002,
sl@0
   172
		ECache				= 0x00000003,
sl@0
   173
		EMappingMask		= 0x0000000f,
sl@0
   174
		ELocal				= 0x00000000,
sl@0
   175
		EGlobal				= 0x00000010,
sl@0
   176
		EData				= 0x00000000,
sl@0
   177
		ECode				= 0x00000020,
sl@0
   178
		EMemoryNotOwned		= 0x00000040,
sl@0
   179
sl@0
   180
		// Force local chunk to be named.  Only required for thread heap
sl@0
   181
		// chunks, all other local chunks should be nameless.
sl@0
   182
		ELocalNamed 		= 0x000000080,
sl@0
   183
sl@0
   184
		// Make global chunk read only to all processes but the controlling owner
sl@0
   185
		EReadOnly			= 0x000000100,
sl@0
   186
sl@0
   187
		// Paging attributes for chunks.
sl@0
   188
		EPagingUnspec		= 0x00000000,
sl@0
   189
		EPaged				= 0x80000000,
sl@0
   190
		EUnpaged			= 0x40000000,
sl@0
   191
		EPagingMask 		= EPaged | EUnpaged,
sl@0
   192
sl@0
   193
		EChunkCreateAttMask =	EMappingMask | EGlobal | ECode |
sl@0
   194
								ELocalNamed | EReadOnly | EPagingMask,
sl@0
   195
		};
sl@0
   196
public:
sl@0
   197
	TUint iAtt;
sl@0
   198
	TBool iForceFixed;
sl@0
   199
	TInt iInitialBottom;
sl@0
   200
	TInt iInitialTop;
sl@0
   201
	TInt iMaxSize;
sl@0
   202
	TUint8 iClearByte;
sl@0
   203
	};
sl@0
   204
sl@0
   205
enum TChunkRestrictions
sl@0
   206
	{
sl@0
   207
	// Keep this in sync with definitions in RChunk
sl@0
   208
	EChunkPreventAdjust = 0x01,  // Disallow Adjust, Commit, Allocate and Decommit
sl@0
   209
	};
sl@0
   210
sl@0
   211
class TChannelDoCreate
sl@0
   212
	{
sl@0
   213
public:
sl@0
   214
	TVersion iVer;
sl@0
   215
	const TDesC *iName;
sl@0
   216
	const TDesC *iPhysicalDevice;
sl@0
   217
	const TDesC8 *iInfo;
sl@0
   218
	};
sl@0
   219
sl@0
   220
class TCreateSession
sl@0
   221
	{
sl@0
   222
public:
sl@0
   223
	TVersion iVer;
sl@0
   224
	TInt iMessageSlots;
sl@0
   225
	};
sl@0
   226
sl@0
   227
enum TObjectType
sl@0
   228
	{
sl@0
   229
	EThread=0,
sl@0
   230
	EProcess,
sl@0
   231
	EChunk,
sl@0
   232
	ELibrary,
sl@0
   233
	ESemaphore,
sl@0
   234
	EMutex,
sl@0
   235
	ETimer,
sl@0
   236
	EServer,
sl@0
   237
	ESession,
sl@0
   238
	ELogicalDevice,
sl@0
   239
	EPhysicalDevice,
sl@0
   240
	ELogicalChannel,
sl@0
   241
	EChangeNotifier,
sl@0
   242
	EUndertaker,
sl@0
   243
	EMsgQueue,
sl@0
   244
	EPropertyRef,
sl@0
   245
	ECondVar,
sl@0
   246
	EShPool,
sl@0
   247
	EShBuf,
sl@0
   248
	ENumObjectTypes,	// number of DObject-derived types
sl@0
   249
	EObjectTypeAny=-1,
sl@0
   250
sl@0
   251
	EIpcMessageD=0x20,	// lookup IPC message handle, allow disconnect
sl@0
   252
	EIpcMessage=0x21,	// lookup IPC message handle, don't allow disconnect
sl@0
   253
	EIpcClient=0x22,	// lookup IPC message client, don't allow disconnect
sl@0
   254
	};
sl@0
   255
sl@0
   256
class TObjectOpenInfo
sl@0
   257
	{
sl@0
   258
public:
sl@0
   259
	TObjectType iObjType;
sl@0
   260
	TBool isReadOnly;
sl@0
   261
	};
sl@0
   262
sl@0
   263
class TChannelCreateInfo
sl@0
   264
	{
sl@0
   265
public:
sl@0
   266
	TVersion iVersion;
sl@0
   267
	TInt iUnit;
sl@0
   268
	const TDesC* iPhysicalDevice;
sl@0
   269
	const TDesC8* iInfo;
sl@0
   270
	};
sl@0
   271
sl@0
   272
#if defined(_UNICODE) && !defined(__KERNEL_MODE__)
sl@0
   273
class TChannelCreateInfo8
sl@0
   274
	{
sl@0
   275
public:
sl@0
   276
	TVersion iVersion;
sl@0
   277
	TInt iUnit;
sl@0
   278
	const TDesC8* iPhysicalDevice;
sl@0
   279
	const TDesC8* iInfo;
sl@0
   280
	};
sl@0
   281
#else
sl@0
   282
typedef TChannelCreateInfo TChannelCreateInfo8;
sl@0
   283
#endif
sl@0
   284
sl@0
   285
const TInt KMaxThreadCreateInfo = 256;
sl@0
   286
struct SThreadCreateInfo
sl@0
   287
	{
sl@0
   288
	TAny* iHandle;
sl@0
   289
	TInt iType;
sl@0
   290
	TThreadFunction iFunction;
sl@0
   291
	TAny* iPtr;
sl@0
   292
	TAny* iSupervisorStack;
sl@0
   293
	TInt iSupervisorStackSize;
sl@0
   294
	TAny* iUserStack;
sl@0
   295
	TInt iUserStackSize;
sl@0
   296
	TInt iInitialThreadPriority;
sl@0
   297
	TPtrC iName;
sl@0
   298
	TInt iTotalSize;	// Size including any extras (must be a multiple of 8 bytes)
sl@0
   299
	};
sl@0
   300
sl@0
   301
enum TThreadCreationFlags
sl@0
   302
	{
sl@0
   303
	ETraceHeapAllocs 				= 0x00000001,
sl@0
   304
	EMonitorHeapMemory				= 0x00000002,
sl@0
   305
sl@0
   306
	EThreadCreateFlagPaged			= 0x00000004,
sl@0
   307
	EThreadCreateFlagUnpaged		= 0x00000008,
sl@0
   308
	EThreadCreateFlagPagingUnspec	= 0x00000000,
sl@0
   309
	EThreadCreateFlagPagingMask	= EThreadCreateFlagPaged | EThreadCreateFlagUnpaged,
sl@0
   310
sl@0
   311
	EThreadCreateFlagMask = ETraceHeapAllocs | EMonitorHeapMemory | EThreadCreateFlagPagingMask,
sl@0
   312
	};
sl@0
   313
sl@0
   314
struct SStdEpocThreadCreateInfo : public SThreadCreateInfo
sl@0
   315
	{
sl@0
   316
	SStdEpocThreadCreateInfo()
sl@0
   317
		: iFlags(0)	// Must be clear on creation.
sl@0
   318
		{
sl@0
   319
		};
sl@0
   320
	RAllocator* iAllocator;
sl@0
   321
	TInt iHeapInitialSize;
sl@0
   322
	TInt iHeapMaxSize;
sl@0
   323
	TUint iFlags;
sl@0
   324
	};
sl@0
   325
sl@0
   326
#if defined(_UNICODE) && !defined(__KERNEL_MODE__)
sl@0
   327
struct SThreadCreateInfo8
sl@0
   328
	{
sl@0
   329
	TAny* iHandle;
sl@0
   330
	TInt iType;
sl@0
   331
	TThreadFunction iFunction;
sl@0
   332
	TAny* iPtr;
sl@0
   333
	TAny* iSupervisorStack;
sl@0
   334
	TInt iSupervisorStackSize;
sl@0
   335
	TAny* iUserStack;
sl@0
   336
	TInt iUserStackSize;
sl@0
   337
	TInt iInitialThreadPriority;
sl@0
   338
	TPtrC8 iName;
sl@0
   339
	TInt iTotalSize;	// size including any extras
sl@0
   340
	};
sl@0
   341
sl@0
   342
struct SStdEpocThreadCreateInfo8 : public SThreadCreateInfo8
sl@0
   343
	{
sl@0
   344
	SStdEpocThreadCreateInfo8()
sl@0
   345
		: iFlags(0) // Must be clear on creation.
sl@0
   346
		{
sl@0
   347
		};
sl@0
   348
	RAllocator* iAllocator;
sl@0
   349
	TInt iHeapInitialSize;
sl@0
   350
	TInt iHeapMaxSize;
sl@0
   351
	TUint iFlags;
sl@0
   352
	};
sl@0
   353
#else
sl@0
   354
typedef SThreadCreateInfo SThreadCreateInfo8;
sl@0
   355
typedef SStdEpocThreadCreateInfo SStdEpocThreadCreateInfo8;
sl@0
   356
#endif
sl@0
   357
sl@0
   358
struct SIpcCopyInfo
sl@0
   359
	{
sl@0
   360
	TUint8* iLocalPtr;
sl@0
   361
	TInt iLocalLen;
sl@0
   362
	TInt iFlags;
sl@0
   363
	};
sl@0
   364
sl@0
   365
enum TChunkAdjust
sl@0
   366
	{
sl@0
   367
	EChunkAdjust=0,
sl@0
   368
	EChunkAdjustDoubleEnded=1,
sl@0
   369
	EChunkCommit=2,
sl@0
   370
	EChunkDecommit=3,
sl@0
   371
	EChunkAllocate=4,
sl@0
   372
	EChunkUnlock=5,
sl@0
   373
	EChunkLock=6
sl@0
   374
	};
sl@0
   375
sl@0
   376
enum TMemModelAttributes
sl@0
   377
	{
sl@0
   378
	EMemModelTypeMask=0xf,					// bottom 4 bits give type of memory model
sl@0
   379
	EMemModelTypeDirect=0,					// direct memory model on hardware
sl@0
   380
	EMemModelTypeMoving=1,					// moving memory model on hardware
sl@0
   381
	EMemModelTypeMultiple=2,				// multiple memory model on hardware
sl@0
   382
	EMemModelTypeEmul=3,					// emulation using single host process
sl@0
   383
	EMemModelTypeFlexible=4,				// flexible memory model on hardware
sl@0
   384
sl@0
   385
	EMemModelAttrRomPaging=0x10,			// Demand paging of XIP ROM
sl@0
   386
	EMemModelAttrCodePaging=0x20,			// Demand paging of RAM loaded code
sl@0
   387
	EMemModelAttrDataPaging=0x40,			// Demand paging of all RAM
sl@0
   388
	EMemModelAttrPagingMask=0xf0,			// Mask for demand paging attributes
sl@0
   389
sl@0
   390
	EMemModelAttrNonExProt=(TInt)0x80000000,// accesses to nonexistent addresses are trapped
sl@0
   391
	EMemModelAttrKernProt=0x40000000,		// accesses to kernel memory from user mode are trapped
sl@0
   392
	EMemModelAttrWriteProt=0x20000000,		// addresses can be marked as read-only; writes to these are trapped
sl@0
   393
	EMemModelAttrVA=0x10000000,				// system supports virtual addresses
sl@0
   394
	EMemModelAttrProcessProt=0x08000000,	// accesses to other processes' memory are trapped
sl@0
   395
	EMemModelAttrSameVA=0x04000000,			// different processes map the same virtual address to different physical addresses
sl@0
   396
	EMemModelAttrSupportFixed=0x02000000,	// 'fixed' processes are supported
sl@0
   397
	EMemModelAttrSvKernProt=0x01000000,		// unexpected accesses to kernel memory within an executive call are trapped
sl@0
   398
	EMemModelAttrIPCKernProt=0x00800000,	// accesses to kernel memory via IPC are trapped
sl@0
   399
	EMemModelAttrIPCFullProt=0x00400000,	// accesses via IPC have same protection as user mode
sl@0
   400
	EMemModelAttrRamCodeProt=0x00200000,	// RAM-loaded code is only visible to processes which have loaded it
sl@0
   401
	};
sl@0
   402
sl@0
   403
/** @test */
sl@0
   404
enum TKernelHeapDebugFunction {EDbgMarkStart,EDbgMarkCheck,EDbgMarkEnd,EDbgSetAllocFail,EDbgSetBurstAllocFail,EDbgCheckFailure};
sl@0
   405
sl@0
   406
/** @test */
sl@0
   407
class TKernelHeapMarkCheckInfo
sl@0
   408
	{
sl@0
   409
public:
sl@0
   410
	TBool iCountAll;
sl@0
   411
	const TDesC8* iFileName;
sl@0
   412
	TInt iLineNum;
sl@0
   413
	};
sl@0
   414
//
sl@0
   415
class TTrapHandler;
sl@0
   416
class CActiveScheduler;
sl@0
   417
class TLocale;
sl@0
   418
sl@0
   419
//
sl@0
   420
//
sl@0
   421
//
sl@0
   422
// Handler below is used by test prints to trucate rather than panic the caller.
sl@0
   423
//
sl@0
   424
#if defined(_UNICODE) && !defined(__KERNEL_MODE__)
sl@0
   425
NONSHARABLE_CLASS(TestOverflowTruncate) : public TDes16Overflow
sl@0
   426
	{
sl@0
   427
public:
sl@0
   428
	virtual void Overflow(TDes16 &aDes);
sl@0
   429
	};
sl@0
   430
#else
sl@0
   431
NONSHARABLE_CLASS(TestOverflowTruncate) : public TDes8Overflow
sl@0
   432
	{
sl@0
   433
public:
sl@0
   434
	virtual void Overflow(TDes8 &aDes);
sl@0
   435
	};
sl@0
   436
#endif
sl@0
   437
//
sl@0
   438
sl@0
   439
/********************************************
sl@0
   440
 * Thread local storage entry
sl@0
   441
 ********************************************/
sl@0
   442
struct STls
sl@0
   443
	{
sl@0
   444
	TInt	iHandle;
sl@0
   445
	TInt	iDllUid;
sl@0
   446
	TAny*	iPtr;
sl@0
   447
	};
sl@0
   448
sl@0
   449
const TInt KDllUid_Default = 0;		// for ROM DLLs and direct calls to UserSvr::DllTls
sl@0
   450
const TInt KDllUid_Special = -1;	// used on emulator to instruct the kernel to get the DLL UID from the module handle
sl@0
   451
sl@0
   452
/********************************************
sl@0
   453
 * Entry point call values
sl@0
   454
 ********************************************/
sl@0
   455
const TInt	KModuleEntryReasonProcessInit		=0;		// Process start
sl@0
   456
const TInt	KModuleEntryReasonThreadInit		=1;		// Start new thread
sl@0
   457
const TInt	KModuleEntryReasonProcessAttach		=2;		// Process attach (init static data)
sl@0
   458
const TInt	KModuleEntryReasonProcessDetach		=3;		// Process detach (destroy static data)
sl@0
   459
const TInt	KModuleEntryReasonException			=4;		// Handle exception
sl@0
   460
const TInt	KModuleEntryReasonVariantInit0		=-3;	// Call variant static constructors
sl@0
   461
sl@0
   462
/** @publishedPartner
sl@0
   463
	@released
sl@0
   464
*/
sl@0
   465
const TInt	KModuleEntryReasonExtensionInit0	=-2;	// Extension early initialisation check
sl@0
   466
sl@0
   467
/** @publishedPartner
sl@0
   468
	@released
sl@0
   469
*/
sl@0
   470
const TInt	KModuleEntryReasonExtensionInit1	=-1;	// Extension initialisation
sl@0
   471
sl@0
   472
/**
sl@0
   473
	Flags returned by Exec::KernelConfigFlags()
sl@0
   474
*/
sl@0
   475
enum TKernelConfigFlags
sl@0
   476
	{
sl@0
   477
	EKernelConfigIpcV1Available = 1<<0,
sl@0
   478
	EKernelConfigPlatSecEnforcement = 1<<1,
sl@0
   479
	EKernelConfigPlatSecDiagnostics = 1<<2,
sl@0
   480
	EKernelConfigPlatSecProcessIsolation = 1<<3,
sl@0
   481
	EKernelConfigPlatSecEnforceSysBin = 1<<4,
sl@0
   482
sl@0
   483
	// paging policy values use by 2-bit code and data paging policy enums...
sl@0
   484
	EKernelConfigPagingPolicyNoPaging = 0,
sl@0
   485
	EKernelConfigPagingPolicyAlwaysPage = 1,
sl@0
   486
	EKernelConfigPagingPolicyDefaultUnpaged = 2,
sl@0
   487
	EKernelConfigPagingPolicyDefaultPaged = 3,
sl@0
   488
sl@0
   489
	EKernelConfigCodePagingPolicyShift			= 5,
sl@0
   490
	EKernelConfigCodePagingPolicyMask			= 3<<5,
sl@0
   491
	EKernelConfigCodePagingPolicyNoPaging		= EKernelConfigPagingPolicyNoPaging<<5,
sl@0
   492
	EKernelConfigCodePagingPolicyAlwaysPage		= EKernelConfigPagingPolicyAlwaysPage<<5,
sl@0
   493
	EKernelConfigCodePagingPolicyDefaultUnpaged	= EKernelConfigPagingPolicyDefaultUnpaged<<5,
sl@0
   494
	EKernelConfigCodePagingPolicyDefaultPaged	= EKernelConfigPagingPolicyDefaultPaged<<5,
sl@0
   495
sl@0
   496
	EKernelConfigPlatSecLocked = 1<<7,					// Primarily used by __PLATSEC_UNLOCKED__ (q.v.) test code
sl@0
   497
sl@0
   498
	EKernelConfigCrazyScheduling = 1<<8,				// Enables thread priority/timeslice craziness
sl@0
   499
sl@0
   500
	EKernelConfigDataPagingPolicyShift			= 9,
sl@0
   501
	EKernelConfigDataPagingPolicyMask			= 3<<9,
sl@0
   502
	EKernelConfigDataPagingPolicyNoPaging		= EKernelConfigPagingPolicyNoPaging<<9,
sl@0
   503
	EKernelConfigDataPagingPolicyAlwaysPage		= EKernelConfigPagingPolicyAlwaysPage<<9,
sl@0
   504
	EKernelConfigDataPagingPolicyDefaultUnpaged	= EKernelConfigPagingPolicyDefaultUnpaged<<9,
sl@0
   505
	EKernelConfigDataPagingPolicyDefaultPaged	= EKernelConfigPagingPolicyDefaultPaged<<9,
sl@0
   506
sl@0
   507
	EKernelConfigSMPUnsafeCompat = 1<<12,				// Enables compatibility mode for SMP-unsafe processes
sl@0
   508
	EKernelConfigSMPUnsafeCPU0   = 1<<13,				// Slow compatibility mode: all SMP-unsafe processes run on CPU 0 only
sl@0
   509
	EKernelConfigSMPCrazyInterrupts = 1<<14,			// Enables CPU target rotation for HW Interrupts.
sl@0
   510
sl@0
   511
	EKernelConfigDisableAPs = 1u<<30,
sl@0
   512
sl@0
   513
	EKernelConfigTest = 1u<<31,							// Only used by test code for __PLATSEC_UNLOCKED__
sl@0
   514
	};
sl@0
   515
sl@0
   516
/**
sl@0
   517
	If __PLATSEC_UNLOCKED__ is not defined, these flags must always
sl@0
   518
	be considered to be set.  See KernelConfigFlags() in kern_priv.h.
sl@0
   519
sl@0
   520
	@see KernelConfigFlags()
sl@0
   521
sl@0
   522
	@internalTechnology
sl@0
   523
*/
sl@0
   524
#ifdef __PLATSEC_UNLOCKED__
sl@0
   525
#define __PLATSEC_FORCED_FLAGS__	 0
sl@0
   526
#else
sl@0
   527
#define __PLATSEC_FORCED_FLAGS__	(EKernelConfigPlatSecEnforcement|EKernelConfigPlatSecProcessIsolation|EKernelConfigPlatSecEnforceSysBin)
sl@0
   528
#endif
sl@0
   529
sl@0
   530
/**
sl@0
   531
@internalTechnology
sl@0
   532
*/
sl@0
   533
enum TGlobalUserData
sl@0
   534
	{
sl@0
   535
	ELocaleDefaultCharSet,
sl@0
   536
	ELocalePreferredCharSet,
sl@0
   537
	EMaxGlobalUserData
sl@0
   538
	};
sl@0
   539
sl@0
   540
typedef void (*TGlobalDestructorFunc)(void);
sl@0
   541
sl@0
   542
// This must not conflict with any possible valid TLS keys
sl@0
   543
const TInt KGlobalDestructorTlsKey = -1;
sl@0
   544
sl@0
   545
GLREF_C void ExitCurrentThread(TExitType, TInt, const TDesC8*);
sl@0
   546
sl@0
   547
#ifndef __REMOVE_PLATSEC_DIAGNOSTICS__
sl@0
   548
/**
sl@0
   549
@internalTechnology
sl@0
   550
*/
sl@0
   551
class TPlatSecDiagnostic
sl@0
   552
	{
sl@0
   553
public:
sl@0
   554
	enum TType
sl@0
   555
		{
sl@0
   556
		ELoaderCapabilityViolation1,
sl@0
   557
		ELoaderCapabilityViolation2,
sl@0
   558
		EThreadCapabilityCheckFail,
sl@0
   559
		EProcessCapabilityCheckFail,
sl@0
   560
		EKernelSecureIdCheckFail,
sl@0
   561
		EKernelObjectPolicyCheckFail,
sl@0
   562
		EHandleCapabilityCheckFail,
sl@0
   563
		ECreatorCapabilityCheckFail,
sl@0
   564
		EMessageCapabilityCheckFail,
sl@0
   565
		EKernelProcessIsolationFail,
sl@0
   566
		EKernelProcessIsolationIPCFail,
sl@0
   567
		ECreatorPolicyCheckFail,
sl@0
   568
		};
sl@0
   569
public:
sl@0
   570
	inline TPlatSecDiagnostic();
sl@0
   571
	inline TPlatSecDiagnostic(TType aType);
sl@0
   572
	inline TPlatSecDiagnostic(TType aType, TInt aInt1, TInt aInt2, const SCapabilitySet& aCaps);
sl@0
   573
	inline TPlatSecDiagnostic(TType aType, TInt aInt1, const SSecurityInfo& aCaps);
sl@0
   574
	inline TPlatSecDiagnostic(TType aType, TInt aInt, const TDesC8& aString, const SCapabilitySet& aCaps);
sl@0
   575
	inline TPlatSecDiagnostic(TType aType, const TDesC8& aString1, const TDesC8& aString2, const SCapabilitySet& aCaps);
sl@0
   576
	inline TPlatSecDiagnostic(TType aType, TInt aInt1, TInt aInt2);
sl@0
   577
	inline TPlatSecDiagnostic(TType aType, TInt aInt1);
sl@0
   578
	inline const TDesC8* String1();
sl@0
   579
	inline const TDesC8* String2();
sl@0
   580
public:
sl@0
   581
	TType iType;
sl@0
   582
	TInt iArg1;
sl@0
   583
	TInt iArg2;
sl@0
   584
	const char* iContextText;
sl@0
   585
	TInt iContextTextLength;
sl@0
   586
	SSecurityInfo iSecurityInfo;
sl@0
   587
	};
sl@0
   588
sl@0
   589
inline TPlatSecDiagnostic::TPlatSecDiagnostic()
sl@0
   590
	{}
sl@0
   591
sl@0
   592
inline TPlatSecDiagnostic::TPlatSecDiagnostic(TType aType)
sl@0
   593
	: iType(aType)
sl@0
   594
	{}
sl@0
   595
sl@0
   596
inline TPlatSecDiagnostic::TPlatSecDiagnostic(TType aType,TInt aInt1)
sl@0
   597
	: iType(aType), iArg1(aInt1)
sl@0
   598
	{}
sl@0
   599
sl@0
   600
inline TPlatSecDiagnostic::TPlatSecDiagnostic(TType aType, TInt aInt1, TInt aInt2, const SCapabilitySet& aCaps)
sl@0
   601
	: iType(aType), iArg1(aInt1), iArg2(aInt2), iContextText(0)
sl@0
   602
	{
sl@0
   603
	iSecurityInfo.iSecureId = 0;
sl@0
   604
	iSecurityInfo.iVendorId = 0;
sl@0
   605
	iSecurityInfo.iCaps = aCaps;
sl@0
   606
	};
sl@0
   607
inline TPlatSecDiagnostic::TPlatSecDiagnostic(TType aType, TInt aInt1, const SSecurityInfo& aInfo)
sl@0
   608
	: iType(aType), iArg1(aInt1), iArg2(ECapability_None), iContextText(0), iSecurityInfo(aInfo)
sl@0
   609
	{
sl@0
   610
	};
sl@0
   611
sl@0
   612
inline TPlatSecDiagnostic::TPlatSecDiagnostic(TType aType, TInt aInt, const TDesC8& aString, const SCapabilitySet& aCaps)
sl@0
   613
	: iType(aType), iArg1(aInt), iArg2((TInt)&aString), iContextText(0)
sl@0
   614
	{
sl@0
   615
	iSecurityInfo.iSecureId = 0;
sl@0
   616
	iSecurityInfo.iVendorId = 0;
sl@0
   617
	iSecurityInfo.iCaps = aCaps;
sl@0
   618
	};
sl@0
   619
sl@0
   620
inline TPlatSecDiagnostic::TPlatSecDiagnostic(TType aType, const TDesC8& aString1, const TDesC8& aString2, const SCapabilitySet& aCaps)
sl@0
   621
	: iType(aType), iArg1((TInt)&aString1), iArg2((TInt)&aString2), iContextText(0)
sl@0
   622
	{
sl@0
   623
	iSecurityInfo.iSecureId = 0;
sl@0
   624
	iSecurityInfo.iVendorId = 0;
sl@0
   625
	iSecurityInfo.iCaps = aCaps;
sl@0
   626
	};
sl@0
   627
sl@0
   628
inline TPlatSecDiagnostic::TPlatSecDiagnostic(TType aType, TInt aInt1, TInt aInt2)
sl@0
   629
	: iType(aType), iArg1(aInt1), iArg2(aInt2)
sl@0
   630
	{
sl@0
   631
	iSecurityInfo.iSecureId = 0;
sl@0
   632
	iSecurityInfo.iVendorId = 0;
sl@0
   633
	iSecurityInfo.iCaps[0] = 0;
sl@0
   634
	iSecurityInfo.iCaps[1] = 0;
sl@0
   635
	};
sl@0
   636
sl@0
   637
inline const TDesC8* TPlatSecDiagnostic::String1()
sl@0
   638
	{ return (const TDesC8*)iArg1; }
sl@0
   639
sl@0
   640
inline const TDesC8* TPlatSecDiagnostic::String2()
sl@0
   641
	{ return (const TDesC8*)iArg2; }
sl@0
   642
sl@0
   643
inline TInt PlatSec::LoaderCapabilityViolation(const TDesC8& aImporterName, const TDesC8& aFileName, const SCapabilitySet& aMissingCaps)
sl@0
   644
	{
sl@0
   645
	TPlatSecDiagnostic d(TPlatSecDiagnostic::ELoaderCapabilityViolation2,aImporterName,aFileName,aMissingCaps);
sl@0
   646
	return EmitDiagnostic(d, NULL);
sl@0
   647
	}
sl@0
   648
sl@0
   649
#ifdef __KERNEL_MODE__
sl@0
   650
sl@0
   651
inline TInt PlatSec::CapabilityCheckFail(const DProcess* aViolatingProcess, TCapability aCapability, const char* aContextText)
sl@0
   652
	{
sl@0
   653
	TPlatSecDiagnostic d(TPlatSecDiagnostic::EProcessCapabilityCheckFail,(TInt)aViolatingProcess,(TInt)aCapability);
sl@0
   654
	return EmitDiagnostic(d,aContextText);
sl@0
   655
	}
sl@0
   656
sl@0
   657
inline TInt PlatSec::CapabilityCheckFail(const DThread* aViolatingThread, TCapability aCapability, const char* aContextText)
sl@0
   658
	{
sl@0
   659
	TPlatSecDiagnostic d(TPlatSecDiagnostic::EThreadCapabilityCheckFail,(TInt)aViolatingThread,(TInt)aCapability);
sl@0
   660
	return EmitDiagnostic(d,aContextText);
sl@0
   661
	}
sl@0
   662
sl@0
   663
inline TInt PlatSec::SecureIdCheckFail(const DProcess* aViolatingProcess, TSecureId aSid, const char* aContextText)
sl@0
   664
	{
sl@0
   665
	TPlatSecDiagnostic d(TPlatSecDiagnostic::EKernelSecureIdCheckFail,(TInt)aViolatingProcess,(TInt)aSid);
sl@0
   666
	return EmitDiagnostic(d,aContextText);
sl@0
   667
	}
sl@0
   668
sl@0
   669
inline TInt PlatSec::PolicyCheckFail(const DProcess* aProcess, const SSecurityInfo& aMissingSecurityInfo, const char* aContextText)
sl@0
   670
	{
sl@0
   671
	TPlatSecDiagnostic d(TPlatSecDiagnostic::EKernelObjectPolicyCheckFail,(TInt)aProcess,(const SSecurityInfo&)aMissingSecurityInfo);
sl@0
   672
	return EmitDiagnostic(d,aContextText);
sl@0
   673
	}
sl@0
   674
sl@0
   675
inline TInt PlatSec::PolicyCheckFail(const DThread* aThread, const SSecurityInfo& aMissingSecurityInfo, const char* aContextText)
sl@0
   676
	{
sl@0
   677
	TPlatSecDiagnostic d(TPlatSecDiagnostic::EKernelObjectPolicyCheckFail,(TInt)aThread,(const SSecurityInfo&)aMissingSecurityInfo);
sl@0
   678
	return EmitDiagnostic(d,aContextText);
sl@0
   679
	}
sl@0
   680
sl@0
   681
inline TInt PlatSec::ProcessIsolationFail(const char* aContextText)
sl@0
   682
	{
sl@0
   683
	TPlatSecDiagnostic d(TPlatSecDiagnostic::EKernelProcessIsolationFail);
sl@0
   684
	return EmitDiagnostic(d,aContextText);
sl@0
   685
	}
sl@0
   686
sl@0
   687
inline TInt PlatSec::ProcessIsolationIPCFail(RMessageK* aMessage, const char* aContextText)
sl@0
   688
	{
sl@0
   689
	TPlatSecDiagnostic d(TPlatSecDiagnostic::EKernelProcessIsolationIPCFail,(TInt)aMessage);
sl@0
   690
	return EmitDiagnostic(d,aContextText);
sl@0
   691
	}
sl@0
   692
sl@0
   693
#else // !__KERNEL_MODE__
sl@0
   694
sl@0
   695
inline TInt PlatSec::LoaderCapabilityViolation(RProcess aLoadingProcess, const TDesC8& aFileName, const SCapabilitySet& aMissingCaps)
sl@0
   696
	{
sl@0
   697
	TPlatSecDiagnostic d(TPlatSecDiagnostic::ELoaderCapabilityViolation1,aLoadingProcess.Handle(),aFileName,aMissingCaps);
sl@0
   698
	return EmitDiagnostic(d, NULL);
sl@0
   699
	}
sl@0
   700
sl@0
   701
inline TInt PlatSec::CreatorCapabilityCheckFail(TCapability aCapability, const char* aContextText)
sl@0
   702
	{
sl@0
   703
	TPlatSecDiagnostic d(TPlatSecDiagnostic::ECreatorCapabilityCheckFail,(TInt)0,aCapability);
sl@0
   704
	return EmitDiagnostic(d,aContextText);
sl@0
   705
	}
sl@0
   706
sl@0
   707
inline TInt PlatSec::CreatorCapabilityCheckFail(const TCapabilitySet& aMissingCaps, const char* aContextText)
sl@0
   708
	{
sl@0
   709
	TPlatSecDiagnostic d(TPlatSecDiagnostic::ECreatorCapabilityCheckFail,(TInt)0,ECapability_None,(const SCapabilitySet&)aMissingCaps);
sl@0
   710
	return EmitDiagnostic(d,aContextText);
sl@0
   711
	}
sl@0
   712
sl@0
   713
inline TInt PlatSec::CapabilityCheckFail(TInt aHandle, TCapability aCapability, const char* aContextText)
sl@0
   714
	{
sl@0
   715
	TPlatSecDiagnostic d(TPlatSecDiagnostic::EHandleCapabilityCheckFail,aHandle,aCapability);
sl@0
   716
	return EmitDiagnostic(d,aContextText);
sl@0
   717
	}
sl@0
   718
sl@0
   719
inline TInt PlatSec::CapabilityCheckFail(TInt aHandle, const TCapabilitySet& aMissingCaps, const char* aContextText)
sl@0
   720
	{
sl@0
   721
	TPlatSecDiagnostic d(TPlatSecDiagnostic::EHandleCapabilityCheckFail,aHandle,ECapability_None,(const SCapabilitySet&)aMissingCaps);
sl@0
   722
	return EmitDiagnostic(d,aContextText);
sl@0
   723
	}
sl@0
   724
sl@0
   725
inline TInt PlatSec::PolicyCheckFail(TInt aHandle, const SSecurityInfo& aMissingSecurityInfo, const char* aContextText)
sl@0
   726
	{
sl@0
   727
	TPlatSecDiagnostic d(TPlatSecDiagnostic::EHandleCapabilityCheckFail,aHandle,(const SSecurityInfo&)aMissingSecurityInfo);
sl@0
   728
	return EmitDiagnostic(d,aContextText);
sl@0
   729
	}
sl@0
   730
sl@0
   731
inline TInt PlatSec::CapabilityCheckFail(RMessagePtr2 aMessage, TCapability aCapability, const char* aContextText)
sl@0
   732
	{
sl@0
   733
	TPlatSecDiagnostic d(TPlatSecDiagnostic::EMessageCapabilityCheckFail,(TInt)aMessage.Handle(),aCapability);
sl@0
   734
	return EmitDiagnostic(d,aContextText);
sl@0
   735
	}
sl@0
   736
sl@0
   737
inline TInt PlatSec::CapabilityCheckFail(RMessagePtr2 aMessage, const TCapabilitySet& aMissingCaps, const char* aContextText)
sl@0
   738
	{
sl@0
   739
	TPlatSecDiagnostic d(TPlatSecDiagnostic::EMessageCapabilityCheckFail,(TInt)aMessage.Handle(),ECapability_None,(const SCapabilitySet&)aMissingCaps);
sl@0
   740
	return EmitDiagnostic(d,aContextText);
sl@0
   741
	}
sl@0
   742
sl@0
   743
inline TInt PlatSec::PolicyCheckFail(RMessagePtr2 aMessage, const SSecurityInfo& aMissing, const char* aContextText)
sl@0
   744
	{
sl@0
   745
	TPlatSecDiagnostic d(TPlatSecDiagnostic::EMessageCapabilityCheckFail,(TInt)aMessage.Handle(),(const SSecurityInfo&)aMissing);
sl@0
   746
	return EmitDiagnostic(d,aContextText);
sl@0
   747
	}
sl@0
   748
sl@0
   749
inline TInt PlatSec::CreatorPolicyCheckFail(const SSecurityInfo& aMissing, const char* aContextText)
sl@0
   750
	{
sl@0
   751
	TPlatSecDiagnostic d(TPlatSecDiagnostic::ECreatorPolicyCheckFail,(TInt)0,(const SSecurityInfo&)aMissing);
sl@0
   752
	return EmitDiagnostic(d,aContextText);
sl@0
   753
	}
sl@0
   754
sl@0
   755
#endif //__KERNEL_MODE__
sl@0
   756
#endif // !__REMOVE_PLATSEC_DIAGNOSTICS__
sl@0
   757
sl@0
   758
const TInt KTlsArrayGranularity=2;
sl@0
   759
sl@0
   760
#ifdef __CPU_HAS_CP15_THREAD_ID_REG
sl@0
   761
sl@0
   762
#define __USERSIDE_THREAD_DATA__
sl@0
   763
sl@0
   764
class TLocalThreadData
sl@0
   765
	{
sl@0
   766
public:
sl@0
   767
	void Close();
sl@0
   768
#ifndef __KERNEL_MODE__
sl@0
   769
	TAny* DllTls(TInt aHandle, TInt aDllUid);
sl@0
   770
	TInt DllSetTls(TInt aHandle, TInt aDllUid, TAny* aPtr);
sl@0
   771
	void DllFreeTls(TInt aHandle);
sl@0
   772
#endif
sl@0
   773
public:
sl@0
   774
	RAllocator* iHeap;				///< The thread's current heap
sl@0
   775
	CActiveScheduler* iScheduler;	///< The thread's current active scheduler
sl@0
   776
	TTrapHandler* iTrapHandler;		///< The thread's current trap handler
sl@0
   777
private:
sl@0
   778
	RAllocator* iTlsHeap; 			///< The heap that the DLL TLS data is stored on
sl@0
   779
	RArray<STls> iTls; 				///< DLL TLS data
sl@0
   780
	};
sl@0
   781
sl@0
   782
const TInt KLocalThreadDataSize = _ALIGN_UP(sizeof(TLocalThreadData), 8);
sl@0
   783
sl@0
   784
#endif
sl@0
   785
sl@0
   786
#ifdef __WINS__
sl@0
   787
sl@0
   788
enum TWin32RuntimeReason
sl@0
   789
	{
sl@0
   790
	// Same values as passed to DllMain
sl@0
   791
	EWin32RuntimeProcessAttach = 1,
sl@0
   792
	EWin32RuntimeThreadAttach = 2,
sl@0
   793
	EWin32RuntimeThreadDetach = 3,
sl@0
   794
	EWin32RuntimeProcessDetach = 4,
sl@0
   795
	};
sl@0
   796
sl@0
   797
typedef TBool (*TWin32RuntimeHook)(TWin32RuntimeReason);
sl@0
   798
sl@0
   799
#endif
sl@0
   800
sl@0
   801
struct SAtomicOpInfo64
sl@0
   802
	{
sl@0
   803
	TAny*		iA;
sl@0
   804
	TAny*		iQ;
sl@0
   805
	TUint64		i1;
sl@0
   806
	TUint64		i2;
sl@0
   807
	TUint64		i3;
sl@0
   808
	};
sl@0
   809
sl@0
   810
struct SAtomicOpInfo32
sl@0
   811
	{
sl@0
   812
	TAny*		iA;
sl@0
   813
	union
sl@0
   814
		{
sl@0
   815
		TAny*	iQ;
sl@0
   816
		TUint32	i0;
sl@0
   817
		};
sl@0
   818
	TUint32		i1;
sl@0
   819
	TUint32		i2;
sl@0
   820
	};
sl@0
   821
sl@0
   822
#endif //__U32STD_H__