First public contribution.
1 // Copyright (c) 1995-2009 Nokia Corporation and/or its subsidiary(-ies).
2 // All rights reserved.
3 // This component and the accompanying materials are made available
4 // under the terms of the License "Eclipse Public License v1.0"
5 // which accompanies this distribution, and is available
6 // at the URL "http://www.eclipse.org/legal/epl-v10.html".
8 // Initial Contributors:
9 // Nokia Corporation - initial contribution.
14 // e32\include\u32std.h
27 #ifndef SYMBIAN_ENABLE_SPLIT_HEADERS
28 #include <e32cmn_private.h>
34 #include <e32ldr_private.h>
36 #include <e32shbufcmn.h>
37 #include <e32property.h>
38 #include <u32property.h>
44 #define EKA2_ENTRY_POINT_VERSION_IDENTIFIER \
45 asm("tst pc, #%a0" : : "i" ((TInt)0) )
48 struct TUnicodeDataSet; // forward declaration
49 struct TCollationDataSet; // forward declaration
52 The LCharSet structure is used in Unicode builds to supply locale-specific
53 character attribute and collation data.
55 The structure is defined in both builds to avoid having to have a dummy ExecHandler::GetLocaleCharSet function
56 with a different signature in the 8-bit build.
60 const TUnicodeDataSet* iCharDataSet; // if non-null, character data overriding standard Unicode data
61 const TCollationDataSet* iCollationDataSet; // if non-null, locale-specific collation data
64 extern const LCharSet* GetLocaleCharSet();
66 /** @internalTechnology */
67 const TInt KNumLocaleExports = 22;
70 // The bits in the type table (non-Unicode build only)
74 /** @internalTechnology */
75 const TUint __U=0x01; // Uppercase letter
77 /** @internalTechnology */
78 const TUint __L=0x02; // Lowercase letter
80 /** @internalTechnology */
81 const TUint __D=0x04; // Decimal digit
83 /** @internalTechnology */
84 const TUint __S=0x08; // Space
86 /** @internalTechnology */
87 const TUint __P=0x10; // Punctuation
89 /** @internalTechnology */
90 const TUint __C=0x20; // Control character
92 /** @internalTechnology */
93 const TUint __X=0x40; // Hex digit
95 /** @internalTechnology */
96 const TUint __B=0x80; // A blank character
101 // Time set mode parameters for setting system time and offset
105 ETimeSetTime = 1, // set the time to the value given, else leave it unchanged
106 ETimeSetOffset = 2, // set the offset to the value given, else leave it unchanged
107 ETimeSetAllowTimeReversal = 4, // allow time to go backwards
108 ETimeSetNoTimeUpdate = 8, // Don't restart second queue or notify changes - not valid with ESetTime, used early in boot only
109 ETimeSetLocalTime = 16, // Set time in local time, instead of UTC
110 ETimeSetSecure = 32, // use when setting the secure hardware clock
114 enum TMatchType {EMatchNormal,EMatchFolded,EMatchCollated};
117 // Constants for descriptor implementation code
119 enum TDesType {EBufC,EPtrC,EPtr,EBuf,EBufCPtr};
120 const TUint KMaskDesLength=0xfffffff;
121 const TInt KShiftDesType=28;
124 // Constants for iFlags in DProcess and DThread
126 const TUint KThreadFlagProcessCritical = 0x00000001; // thread panic panics process
127 const TUint KThreadFlagProcessPermanent = 0x00000002; // thread exit of any kind causes process to exit (=main)
128 const TUint KThreadFlagSystemCritical = 0x00000004; // thread panic reboots entire system
129 const TUint KThreadFlagSystemPermanent = 0x00000008; // thread exit of any kind reboots entire system
130 const TUint KThreadFlagOriginal = 0x00000010;
131 const TUint KThreadFlagLastChance = 0x00000020;
132 const TUint KThreadFlagRealtime = 0x00000040; // thread will be panicked when using some non-realtime functions
133 const TUint KThreadFlagRealtimeTest = 0x00000080; // non-realtime functions only warn rather than panic
134 const TUint KThreadFlagLocalThreadDataValid = 0x00000100; // thread has valid local thread data
135 const TUint KProcessFlagPriorityControl = 0x40000000;
136 const TUint KProcessFlagJustInTime = 0x80000000;
137 const TUint KProcessFlagSystemCritical = KThreadFlagSystemCritical; // process panic reboots entire system
138 const TUint KProcessFlagSystemPermanent = KThreadFlagSystemPermanent; // process exit of any kind reboots entire system
140 const TUint KThreadHandle=0x40000000;
142 struct SPtrC8 {TInt length;const TUint8 *ptr;};
143 struct SBufC8 {TInt length;TUint8 buf[1];};
144 struct SPtr8 {TInt length;TInt maxLength;TUint8 *ptr;};
145 struct SBuf8 {TInt length;TInt maxLength;TUint8 buf[1];};
146 struct SBufCPtr8 {TInt length;TInt maxLength;SBufC8 *ptr;};
148 struct SPtrC16 {TInt length;const TUint16 *ptr;};
149 struct SBufC16 {TInt length;TUint16 buf[1];};
150 struct SPtr16 {TInt length;TInt maxLength;TUint16 *ptr;};
151 struct SBuf16 {TInt length;TInt maxLength;TUint16 buf[1];};
152 struct SBufCPtr16 {TInt length;TInt maxLength;SBufC16 *ptr;};
155 // Flags used for IPC copy functions
157 const TInt KChunkShiftBy0=0;
158 const TInt KChunkShiftBy1=KMinTInt;
159 const TInt KIpcDirRead=0;
160 const TInt KIpcDirWrite=0x10000000;
165 // Attributes for chunk creation that are used by both euser and the kernel
166 // by classes TChunkCreateInfo and SChunkCreateInfo, respectively.
169 ENormal = 0x00000000,
170 EDoubleEnded = 0x00000001,
171 EDisconnected = 0x00000002,
173 EMappingMask = 0x0000000f,
175 EGlobal = 0x00000010,
178 EMemoryNotOwned = 0x00000040,
180 // Force local chunk to be named. Only required for thread heap
181 // chunks, all other local chunks should be nameless.
182 ELocalNamed = 0x000000080,
184 // Make global chunk read only to all processes but the controlling owner
185 EReadOnly = 0x000000100,
187 // Paging attributes for chunks.
188 EPagingUnspec = 0x00000000,
190 EUnpaged = 0x40000000,
191 EPagingMask = EPaged | EUnpaged,
193 EChunkCreateAttMask = EMappingMask | EGlobal | ECode |
194 ELocalNamed | EReadOnly | EPagingMask,
205 enum TChunkRestrictions
207 // Keep this in sync with definitions in RChunk
208 EChunkPreventAdjust = 0x01, // Disallow Adjust, Commit, Allocate and Decommit
211 class TChannelDoCreate
216 const TDesC *iPhysicalDevice;
248 ENumObjectTypes, // number of DObject-derived types
251 EIpcMessageD=0x20, // lookup IPC message handle, allow disconnect
252 EIpcMessage=0x21, // lookup IPC message handle, don't allow disconnect
253 EIpcClient=0x22, // lookup IPC message client, don't allow disconnect
256 class TObjectOpenInfo
259 TObjectType iObjType;
263 class TChannelCreateInfo
268 const TDesC* iPhysicalDevice;
272 #if defined(_UNICODE) && !defined(__KERNEL_MODE__)
273 class TChannelCreateInfo8
278 const TDesC8* iPhysicalDevice;
282 typedef TChannelCreateInfo TChannelCreateInfo8;
285 const TInt KMaxThreadCreateInfo = 256;
286 struct SThreadCreateInfo
290 TThreadFunction iFunction;
292 TAny* iSupervisorStack;
293 TInt iSupervisorStackSize;
296 TInt iInitialThreadPriority;
298 TInt iTotalSize; // Size including any extras (must be a multiple of 8 bytes)
301 enum TThreadCreationFlags
303 ETraceHeapAllocs = 0x00000001,
304 EMonitorHeapMemory = 0x00000002,
306 EThreadCreateFlagPaged = 0x00000004,
307 EThreadCreateFlagUnpaged = 0x00000008,
308 EThreadCreateFlagPagingUnspec = 0x00000000,
309 EThreadCreateFlagPagingMask = EThreadCreateFlagPaged | EThreadCreateFlagUnpaged,
311 EThreadCreateFlagMask = ETraceHeapAllocs | EMonitorHeapMemory | EThreadCreateFlagPagingMask,
314 struct SStdEpocThreadCreateInfo : public SThreadCreateInfo
316 SStdEpocThreadCreateInfo()
317 : iFlags(0) // Must be clear on creation.
320 RAllocator* iAllocator;
321 TInt iHeapInitialSize;
326 #if defined(_UNICODE) && !defined(__KERNEL_MODE__)
327 struct SThreadCreateInfo8
331 TThreadFunction iFunction;
333 TAny* iSupervisorStack;
334 TInt iSupervisorStackSize;
337 TInt iInitialThreadPriority;
339 TInt iTotalSize; // size including any extras
342 struct SStdEpocThreadCreateInfo8 : public SThreadCreateInfo8
344 SStdEpocThreadCreateInfo8()
345 : iFlags(0) // Must be clear on creation.
348 RAllocator* iAllocator;
349 TInt iHeapInitialSize;
354 typedef SThreadCreateInfo SThreadCreateInfo8;
355 typedef SStdEpocThreadCreateInfo SStdEpocThreadCreateInfo8;
368 EChunkAdjustDoubleEnded=1,
376 enum TMemModelAttributes
378 EMemModelTypeMask=0xf, // bottom 4 bits give type of memory model
379 EMemModelTypeDirect=0, // direct memory model on hardware
380 EMemModelTypeMoving=1, // moving memory model on hardware
381 EMemModelTypeMultiple=2, // multiple memory model on hardware
382 EMemModelTypeEmul=3, // emulation using single host process
383 EMemModelTypeFlexible=4, // flexible memory model on hardware
385 EMemModelAttrRomPaging=0x10, // Demand paging of XIP ROM
386 EMemModelAttrCodePaging=0x20, // Demand paging of RAM loaded code
387 EMemModelAttrDataPaging=0x40, // Demand paging of all RAM
388 EMemModelAttrPagingMask=0xf0, // Mask for demand paging attributes
390 EMemModelAttrNonExProt=(TInt)0x80000000,// accesses to nonexistent addresses are trapped
391 EMemModelAttrKernProt=0x40000000, // accesses to kernel memory from user mode are trapped
392 EMemModelAttrWriteProt=0x20000000, // addresses can be marked as read-only; writes to these are trapped
393 EMemModelAttrVA=0x10000000, // system supports virtual addresses
394 EMemModelAttrProcessProt=0x08000000, // accesses to other processes' memory are trapped
395 EMemModelAttrSameVA=0x04000000, // different processes map the same virtual address to different physical addresses
396 EMemModelAttrSupportFixed=0x02000000, // 'fixed' processes are supported
397 EMemModelAttrSvKernProt=0x01000000, // unexpected accesses to kernel memory within an executive call are trapped
398 EMemModelAttrIPCKernProt=0x00800000, // accesses to kernel memory via IPC are trapped
399 EMemModelAttrIPCFullProt=0x00400000, // accesses via IPC have same protection as user mode
400 EMemModelAttrRamCodeProt=0x00200000, // RAM-loaded code is only visible to processes which have loaded it
404 enum TKernelHeapDebugFunction {EDbgMarkStart,EDbgMarkCheck,EDbgMarkEnd,EDbgSetAllocFail,EDbgSetBurstAllocFail,EDbgCheckFailure};
407 class TKernelHeapMarkCheckInfo
411 const TDesC8* iFileName;
416 class CActiveScheduler;
422 // Handler below is used by test prints to trucate rather than panic the caller.
424 #if defined(_UNICODE) && !defined(__KERNEL_MODE__)
425 NONSHARABLE_CLASS(TestOverflowTruncate) : public TDes16Overflow
428 virtual void Overflow(TDes16 &aDes);
431 NONSHARABLE_CLASS(TestOverflowTruncate) : public TDes8Overflow
434 virtual void Overflow(TDes8 &aDes);
439 /********************************************
440 * Thread local storage entry
441 ********************************************/
449 const TInt KDllUid_Default = 0; // for ROM DLLs and direct calls to UserSvr::DllTls
450 const TInt KDllUid_Special = -1; // used on emulator to instruct the kernel to get the DLL UID from the module handle
452 /********************************************
453 * Entry point call values
454 ********************************************/
455 const TInt KModuleEntryReasonProcessInit =0; // Process start
456 const TInt KModuleEntryReasonThreadInit =1; // Start new thread
457 const TInt KModuleEntryReasonProcessAttach =2; // Process attach (init static data)
458 const TInt KModuleEntryReasonProcessDetach =3; // Process detach (destroy static data)
459 const TInt KModuleEntryReasonException =4; // Handle exception
460 const TInt KModuleEntryReasonVariantInit0 =-3; // Call variant static constructors
462 /** @publishedPartner
465 const TInt KModuleEntryReasonExtensionInit0 =-2; // Extension early initialisation check
467 /** @publishedPartner
470 const TInt KModuleEntryReasonExtensionInit1 =-1; // Extension initialisation
473 Flags returned by Exec::KernelConfigFlags()
475 enum TKernelConfigFlags
477 EKernelConfigIpcV1Available = 1<<0,
478 EKernelConfigPlatSecEnforcement = 1<<1,
479 EKernelConfigPlatSecDiagnostics = 1<<2,
480 EKernelConfigPlatSecProcessIsolation = 1<<3,
481 EKernelConfigPlatSecEnforceSysBin = 1<<4,
483 // paging policy values use by 2-bit code and data paging policy enums...
484 EKernelConfigPagingPolicyNoPaging = 0,
485 EKernelConfigPagingPolicyAlwaysPage = 1,
486 EKernelConfigPagingPolicyDefaultUnpaged = 2,
487 EKernelConfigPagingPolicyDefaultPaged = 3,
489 EKernelConfigCodePagingPolicyShift = 5,
490 EKernelConfigCodePagingPolicyMask = 3<<5,
491 EKernelConfigCodePagingPolicyNoPaging = EKernelConfigPagingPolicyNoPaging<<5,
492 EKernelConfigCodePagingPolicyAlwaysPage = EKernelConfigPagingPolicyAlwaysPage<<5,
493 EKernelConfigCodePagingPolicyDefaultUnpaged = EKernelConfigPagingPolicyDefaultUnpaged<<5,
494 EKernelConfigCodePagingPolicyDefaultPaged = EKernelConfigPagingPolicyDefaultPaged<<5,
496 EKernelConfigPlatSecLocked = 1<<7, // Primarily used by __PLATSEC_UNLOCKED__ (q.v.) test code
498 EKernelConfigCrazyScheduling = 1<<8, // Enables thread priority/timeslice craziness
500 EKernelConfigDataPagingPolicyShift = 9,
501 EKernelConfigDataPagingPolicyMask = 3<<9,
502 EKernelConfigDataPagingPolicyNoPaging = EKernelConfigPagingPolicyNoPaging<<9,
503 EKernelConfigDataPagingPolicyAlwaysPage = EKernelConfigPagingPolicyAlwaysPage<<9,
504 EKernelConfigDataPagingPolicyDefaultUnpaged = EKernelConfigPagingPolicyDefaultUnpaged<<9,
505 EKernelConfigDataPagingPolicyDefaultPaged = EKernelConfigPagingPolicyDefaultPaged<<9,
507 EKernelConfigSMPUnsafeCompat = 1<<12, // Enables compatibility mode for SMP-unsafe processes
508 EKernelConfigSMPUnsafeCPU0 = 1<<13, // Slow compatibility mode: all SMP-unsafe processes run on CPU 0 only
509 EKernelConfigSMPCrazyInterrupts = 1<<14, // Enables CPU target rotation for HW Interrupts.
511 EKernelConfigDisableAPs = 1u<<30,
513 EKernelConfigTest = 1u<<31, // Only used by test code for __PLATSEC_UNLOCKED__
517 If __PLATSEC_UNLOCKED__ is not defined, these flags must always
518 be considered to be set. See KernelConfigFlags() in kern_priv.h.
520 @see KernelConfigFlags()
524 #ifdef __PLATSEC_UNLOCKED__
525 #define __PLATSEC_FORCED_FLAGS__ 0
527 #define __PLATSEC_FORCED_FLAGS__ (EKernelConfigPlatSecEnforcement|EKernelConfigPlatSecProcessIsolation|EKernelConfigPlatSecEnforceSysBin)
535 ELocaleDefaultCharSet,
536 ELocalePreferredCharSet,
540 typedef void (*TGlobalDestructorFunc)(void);
542 // This must not conflict with any possible valid TLS keys
543 const TInt KGlobalDestructorTlsKey = -1;
545 GLREF_C void ExitCurrentThread(TExitType, TInt, const TDesC8*);
547 #ifndef __REMOVE_PLATSEC_DIAGNOSTICS__
551 class TPlatSecDiagnostic
556 ELoaderCapabilityViolation1,
557 ELoaderCapabilityViolation2,
558 EThreadCapabilityCheckFail,
559 EProcessCapabilityCheckFail,
560 EKernelSecureIdCheckFail,
561 EKernelObjectPolicyCheckFail,
562 EHandleCapabilityCheckFail,
563 ECreatorCapabilityCheckFail,
564 EMessageCapabilityCheckFail,
565 EKernelProcessIsolationFail,
566 EKernelProcessIsolationIPCFail,
567 ECreatorPolicyCheckFail,
570 inline TPlatSecDiagnostic();
571 inline TPlatSecDiagnostic(TType aType);
572 inline TPlatSecDiagnostic(TType aType, TInt aInt1, TInt aInt2, const SCapabilitySet& aCaps);
573 inline TPlatSecDiagnostic(TType aType, TInt aInt1, const SSecurityInfo& aCaps);
574 inline TPlatSecDiagnostic(TType aType, TInt aInt, const TDesC8& aString, const SCapabilitySet& aCaps);
575 inline TPlatSecDiagnostic(TType aType, const TDesC8& aString1, const TDesC8& aString2, const SCapabilitySet& aCaps);
576 inline TPlatSecDiagnostic(TType aType, TInt aInt1, TInt aInt2);
577 inline TPlatSecDiagnostic(TType aType, TInt aInt1);
578 inline const TDesC8* String1();
579 inline const TDesC8* String2();
584 const char* iContextText;
585 TInt iContextTextLength;
586 SSecurityInfo iSecurityInfo;
589 inline TPlatSecDiagnostic::TPlatSecDiagnostic()
592 inline TPlatSecDiagnostic::TPlatSecDiagnostic(TType aType)
596 inline TPlatSecDiagnostic::TPlatSecDiagnostic(TType aType,TInt aInt1)
597 : iType(aType), iArg1(aInt1)
600 inline TPlatSecDiagnostic::TPlatSecDiagnostic(TType aType, TInt aInt1, TInt aInt2, const SCapabilitySet& aCaps)
601 : iType(aType), iArg1(aInt1), iArg2(aInt2), iContextText(0)
603 iSecurityInfo.iSecureId = 0;
604 iSecurityInfo.iVendorId = 0;
605 iSecurityInfo.iCaps = aCaps;
607 inline TPlatSecDiagnostic::TPlatSecDiagnostic(TType aType, TInt aInt1, const SSecurityInfo& aInfo)
608 : iType(aType), iArg1(aInt1), iArg2(ECapability_None), iContextText(0), iSecurityInfo(aInfo)
612 inline TPlatSecDiagnostic::TPlatSecDiagnostic(TType aType, TInt aInt, const TDesC8& aString, const SCapabilitySet& aCaps)
613 : iType(aType), iArg1(aInt), iArg2((TInt)&aString), iContextText(0)
615 iSecurityInfo.iSecureId = 0;
616 iSecurityInfo.iVendorId = 0;
617 iSecurityInfo.iCaps = aCaps;
620 inline TPlatSecDiagnostic::TPlatSecDiagnostic(TType aType, const TDesC8& aString1, const TDesC8& aString2, const SCapabilitySet& aCaps)
621 : iType(aType), iArg1((TInt)&aString1), iArg2((TInt)&aString2), iContextText(0)
623 iSecurityInfo.iSecureId = 0;
624 iSecurityInfo.iVendorId = 0;
625 iSecurityInfo.iCaps = aCaps;
628 inline TPlatSecDiagnostic::TPlatSecDiagnostic(TType aType, TInt aInt1, TInt aInt2)
629 : iType(aType), iArg1(aInt1), iArg2(aInt2)
631 iSecurityInfo.iSecureId = 0;
632 iSecurityInfo.iVendorId = 0;
633 iSecurityInfo.iCaps[0] = 0;
634 iSecurityInfo.iCaps[1] = 0;
637 inline const TDesC8* TPlatSecDiagnostic::String1()
638 { return (const TDesC8*)iArg1; }
640 inline const TDesC8* TPlatSecDiagnostic::String2()
641 { return (const TDesC8*)iArg2; }
643 inline TInt PlatSec::LoaderCapabilityViolation(const TDesC8& aImporterName, const TDesC8& aFileName, const SCapabilitySet& aMissingCaps)
645 TPlatSecDiagnostic d(TPlatSecDiagnostic::ELoaderCapabilityViolation2,aImporterName,aFileName,aMissingCaps);
646 return EmitDiagnostic(d, NULL);
649 #ifdef __KERNEL_MODE__
651 inline TInt PlatSec::CapabilityCheckFail(const DProcess* aViolatingProcess, TCapability aCapability, const char* aContextText)
653 TPlatSecDiagnostic d(TPlatSecDiagnostic::EProcessCapabilityCheckFail,(TInt)aViolatingProcess,(TInt)aCapability);
654 return EmitDiagnostic(d,aContextText);
657 inline TInt PlatSec::CapabilityCheckFail(const DThread* aViolatingThread, TCapability aCapability, const char* aContextText)
659 TPlatSecDiagnostic d(TPlatSecDiagnostic::EThreadCapabilityCheckFail,(TInt)aViolatingThread,(TInt)aCapability);
660 return EmitDiagnostic(d,aContextText);
663 inline TInt PlatSec::SecureIdCheckFail(const DProcess* aViolatingProcess, TSecureId aSid, const char* aContextText)
665 TPlatSecDiagnostic d(TPlatSecDiagnostic::EKernelSecureIdCheckFail,(TInt)aViolatingProcess,(TInt)aSid);
666 return EmitDiagnostic(d,aContextText);
669 inline TInt PlatSec::PolicyCheckFail(const DProcess* aProcess, const SSecurityInfo& aMissingSecurityInfo, const char* aContextText)
671 TPlatSecDiagnostic d(TPlatSecDiagnostic::EKernelObjectPolicyCheckFail,(TInt)aProcess,(const SSecurityInfo&)aMissingSecurityInfo);
672 return EmitDiagnostic(d,aContextText);
675 inline TInt PlatSec::PolicyCheckFail(const DThread* aThread, const SSecurityInfo& aMissingSecurityInfo, const char* aContextText)
677 TPlatSecDiagnostic d(TPlatSecDiagnostic::EKernelObjectPolicyCheckFail,(TInt)aThread,(const SSecurityInfo&)aMissingSecurityInfo);
678 return EmitDiagnostic(d,aContextText);
681 inline TInt PlatSec::ProcessIsolationFail(const char* aContextText)
683 TPlatSecDiagnostic d(TPlatSecDiagnostic::EKernelProcessIsolationFail);
684 return EmitDiagnostic(d,aContextText);
687 inline TInt PlatSec::ProcessIsolationIPCFail(RMessageK* aMessage, const char* aContextText)
689 TPlatSecDiagnostic d(TPlatSecDiagnostic::EKernelProcessIsolationIPCFail,(TInt)aMessage);
690 return EmitDiagnostic(d,aContextText);
693 #else // !__KERNEL_MODE__
695 inline TInt PlatSec::LoaderCapabilityViolation(RProcess aLoadingProcess, const TDesC8& aFileName, const SCapabilitySet& aMissingCaps)
697 TPlatSecDiagnostic d(TPlatSecDiagnostic::ELoaderCapabilityViolation1,aLoadingProcess.Handle(),aFileName,aMissingCaps);
698 return EmitDiagnostic(d, NULL);
701 inline TInt PlatSec::CreatorCapabilityCheckFail(TCapability aCapability, const char* aContextText)
703 TPlatSecDiagnostic d(TPlatSecDiagnostic::ECreatorCapabilityCheckFail,(TInt)0,aCapability);
704 return EmitDiagnostic(d,aContextText);
707 inline TInt PlatSec::CreatorCapabilityCheckFail(const TCapabilitySet& aMissingCaps, const char* aContextText)
709 TPlatSecDiagnostic d(TPlatSecDiagnostic::ECreatorCapabilityCheckFail,(TInt)0,ECapability_None,(const SCapabilitySet&)aMissingCaps);
710 return EmitDiagnostic(d,aContextText);
713 inline TInt PlatSec::CapabilityCheckFail(TInt aHandle, TCapability aCapability, const char* aContextText)
715 TPlatSecDiagnostic d(TPlatSecDiagnostic::EHandleCapabilityCheckFail,aHandle,aCapability);
716 return EmitDiagnostic(d,aContextText);
719 inline TInt PlatSec::CapabilityCheckFail(TInt aHandle, const TCapabilitySet& aMissingCaps, const char* aContextText)
721 TPlatSecDiagnostic d(TPlatSecDiagnostic::EHandleCapabilityCheckFail,aHandle,ECapability_None,(const SCapabilitySet&)aMissingCaps);
722 return EmitDiagnostic(d,aContextText);
725 inline TInt PlatSec::PolicyCheckFail(TInt aHandle, const SSecurityInfo& aMissingSecurityInfo, const char* aContextText)
727 TPlatSecDiagnostic d(TPlatSecDiagnostic::EHandleCapabilityCheckFail,aHandle,(const SSecurityInfo&)aMissingSecurityInfo);
728 return EmitDiagnostic(d,aContextText);
731 inline TInt PlatSec::CapabilityCheckFail(RMessagePtr2 aMessage, TCapability aCapability, const char* aContextText)
733 TPlatSecDiagnostic d(TPlatSecDiagnostic::EMessageCapabilityCheckFail,(TInt)aMessage.Handle(),aCapability);
734 return EmitDiagnostic(d,aContextText);
737 inline TInt PlatSec::CapabilityCheckFail(RMessagePtr2 aMessage, const TCapabilitySet& aMissingCaps, const char* aContextText)
739 TPlatSecDiagnostic d(TPlatSecDiagnostic::EMessageCapabilityCheckFail,(TInt)aMessage.Handle(),ECapability_None,(const SCapabilitySet&)aMissingCaps);
740 return EmitDiagnostic(d,aContextText);
743 inline TInt PlatSec::PolicyCheckFail(RMessagePtr2 aMessage, const SSecurityInfo& aMissing, const char* aContextText)
745 TPlatSecDiagnostic d(TPlatSecDiagnostic::EMessageCapabilityCheckFail,(TInt)aMessage.Handle(),(const SSecurityInfo&)aMissing);
746 return EmitDiagnostic(d,aContextText);
749 inline TInt PlatSec::CreatorPolicyCheckFail(const SSecurityInfo& aMissing, const char* aContextText)
751 TPlatSecDiagnostic d(TPlatSecDiagnostic::ECreatorPolicyCheckFail,(TInt)0,(const SSecurityInfo&)aMissing);
752 return EmitDiagnostic(d,aContextText);
755 #endif //__KERNEL_MODE__
756 #endif // !__REMOVE_PLATSEC_DIAGNOSTICS__
758 const TInt KTlsArrayGranularity=2;
760 #ifdef __CPU_HAS_CP15_THREAD_ID_REG
762 #define __USERSIDE_THREAD_DATA__
764 class TLocalThreadData
768 #ifndef __KERNEL_MODE__
769 TAny* DllTls(TInt aHandle, TInt aDllUid);
770 TInt DllSetTls(TInt aHandle, TInt aDllUid, TAny* aPtr);
771 void DllFreeTls(TInt aHandle);
774 RAllocator* iHeap; ///< The thread's current heap
775 CActiveScheduler* iScheduler; ///< The thread's current active scheduler
776 TTrapHandler* iTrapHandler; ///< The thread's current trap handler
778 RAllocator* iTlsHeap; ///< The heap that the DLL TLS data is stored on
779 RArray<STls> iTls; ///< DLL TLS data
782 const TInt KLocalThreadDataSize = _ALIGN_UP(sizeof(TLocalThreadData), 8);
788 enum TWin32RuntimeReason
790 // Same values as passed to DllMain
791 EWin32RuntimeProcessAttach = 1,
792 EWin32RuntimeThreadAttach = 2,
793 EWin32RuntimeThreadDetach = 3,
794 EWin32RuntimeProcessDetach = 4,
797 typedef TBool (*TWin32RuntimeHook)(TWin32RuntimeReason);
801 struct SAtomicOpInfo64
810 struct SAtomicOpInfo32
822 #endif //__U32STD_H__