4 * Copyright (c) 2000 - 2013 Samsung Electronics Co., Ltd. All rights reserved.
8 * Jaewon Lim <jaewon81.lim@samsung.com>
9 * Woojin Jung <woojin2.jung@samsung.com>
10 * Juyoung Kim <j0.kim@samsung.com>
11 * Cherepanov Vitaliy <v.cherepanov@samsung.com>
12 * Nikita Kalyazin <n.kalyazin@samsung.com>
14 * Licensed under the Apache License, Version 2.0 (the "License");
15 * you may not use this file except in compliance with the License.
16 * You may obtain a copy of the License at
18 * http://www.apache.org/licenses/LICENSE-2.0
20 * Unless required by applicable law or agreed to in writing, software
21 * distributed under the License is distributed on an "AS IS" BASIS,
22 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
23 * See the License for the specific language governing permissions and
24 * limitations under the License.
28 * - Samsung RnD Institute Russia
32 #include <stdio.h> // for fopen, fprintf
33 #include <stdlib.h> // for atexit
34 #include <sys/types.h> // for open
36 #include <sys/stat.h> // for open
37 #include <sys/socket.h> // for socket
38 #include <sys/un.h> // for sockaddr_un
39 #include <arpa/inet.h> // for sockaddr_in, socklen_t
41 #include <signal.h> // for signal
42 #include <unistd.h> // for unlink
43 #include <fcntl.h> // for open, fcntl
46 #include <attr/xattr.h> // for fsetxattr
49 #include "da_protocol.h"
54 #define SINGLETON_LOCKFILE "/tmp/da_manager.lock"
55 #define PORTFILE "/tmp/port.da"
56 #define UDS_NAME "/tmp/da.socket"
58 #define INIT_PORT 8001
59 #define LIMIT_PORT 8100
62 // initialize global variable
63 __da_manager manager =
66 .host_server_socket = -1,
67 .target_server_socket = -1,
70 .app_launch_timerfd = -1,
71 .sampling_thread = -1,
73 .transfer_thread = -1,
80 .data_socket_mutex = PTHREAD_MUTEX_INITIALIZER
90 // =============================================================================
92 // =============================================================================
94 static void writeToPortfile(int code)
96 if(unlikely(manager.portfile == 0))
99 fprintf(manager.portfile, "%d", code);
102 // =============================================================================
104 // =============================================================================
106 void _close_server_socket(void)
108 LOGI("close_server_socket\n");
109 // close server socket
110 if(manager.host_server_socket != -1)
111 close(manager.host_server_socket);
112 if(manager.target_server_socket != -1)
113 close(manager.target_server_socket);
116 static void _unlink_file(void)
118 LOGI("unlink files start\n");
120 unlink(SINGLETON_LOCKFILE);
121 LOGI("unlink files done\n");
124 void unlink_portfile(void)
129 // =============================================================================
131 // =============================================================================
133 // return 0 for normal case
134 static int makeTargetServerSocket()
136 struct sockaddr_un serverAddrUn;
138 if(manager.target_server_socket != -1)
139 return -1; // should be never happend
141 // remove existed unix domain socket file
144 if ((manager.target_server_socket = socket(AF_UNIX, SOCK_STREAM, 0)) < 0)
146 LOGE("Target server socket creation failed\n");
151 // set smack attribute for certification
152 fsetxattr(manager.target_server_socket, "security.SMACK64IPIN", "*", 1, 0);
153 fsetxattr(manager.target_server_socket, "security.SMACK64IPOUT", "*", 1, 0);
154 #endif /* LOCALTEST */
156 bzero(&serverAddrUn, sizeof(serverAddrUn));
157 serverAddrUn.sun_family = AF_UNIX;
158 sprintf(serverAddrUn.sun_path, "%s", UDS_NAME);
160 if (-1 == bind(manager.target_server_socket, (struct sockaddr*) &serverAddrUn,
161 sizeof(serverAddrUn)))
163 LOGE("Target server socket binding failed\n");
167 chmod(serverAddrUn.sun_path, 0777);
169 if (-1 == listen(manager.target_server_socket, 5))
171 LOGE("Target server socket listening failed\n");
175 LOGI("Created TargetSock %d\n", manager.target_server_socket);
179 // return port number for normal case
180 // return negative value for error case
181 static int makeHostServerSocket()
183 struct sockaddr_in serverAddrIn;
187 if(manager.host_server_socket != -1)
188 return -1; // should be never happened
190 if ((manager.host_server_socket = socket(PF_INET, SOCK_STREAM, IPPROTO_TCP)) < 0)
192 LOGE("Host server socket creation failed\n");
196 setsockopt(manager.host_server_socket, SOL_SOCKET, SO_REUSEADDR, &opt, sizeof(opt));
197 memset(&serverAddrIn, 0, sizeof(serverAddrIn));
198 serverAddrIn.sin_family = AF_INET;
199 serverAddrIn.sin_addr.s_addr = htonl(INADDR_ANY);
201 // bind address to server socket
202 for(port = INIT_PORT; port < LIMIT_PORT; port++)
204 serverAddrIn.sin_port = htons(port);
205 if (0 == bind(manager.host_server_socket,
206 (struct sockaddr*) &serverAddrIn, sizeof(serverAddrIn)))
210 if(port == LIMIT_PORT)
212 LOGE("Host server socket binding failed\n");
216 // enter listen state from client
217 if (-1 == listen(manager.host_server_socket, 5))
219 LOGE("Host server socket listening failed\n");
223 LOGI("Created HostSock %d\n", manager.host_server_socket);
227 // =============================================================================
228 // initializing / finalizing functions
229 // =============================================================================
231 static bool ensure_singleton(const char *lockfile)
233 if (access(lockfile, F_OK) == 0) /* File exists */
236 int lockfd = open(lockfile, O_WRONLY | O_CREAT, 0600);
238 writeToPortfile(ERR_LOCKFILE_CREATE_FAILED);
239 LOGE("singleton lock file creation failed");
242 /* To prevent race condition, also check for lock availiability. */
243 bool locked = flock(lockfd, LOCK_EX | LOCK_NB) == 0;
246 writeToPortfile(ERR_ALREADY_RUNNING);
247 LOGE("another instance of daemon is already running");
252 static void inititialize_manager_targets(__da_manager * mng)
255 __da_target_info target_init_value = {
265 for (index = 0; index < MAX_TARGET_COUNT; index++)
266 mng->target[index] = target_init_value;
268 manager.target_count = 0;
271 static bool initialize_pthread_sigmask()
275 sigemptyset(&newsigmask);
276 sigaddset(&newsigmask, SIGALRM);
277 sigaddset(&newsigmask, SIGUSR1);
278 if (pthread_sigmask(SIG_BLOCK, &newsigmask, NULL) != 0) {
279 writeToPortfile(ERR_SIGNAL_MASK_SETTING_FAILED);
285 static bool initialize_host_server_socket()
287 int port = makeHostServerSocket();
290 writeToPortfile(ERR_HOST_SERVER_SOCKET_CREATE_FAILED);
293 writeToPortfile(port);
297 // return 0 for normal case
298 static int initializeManager()
300 if (init_buf() != 0) {
301 LOGE("Cannot init buffer\n");
305 atexit(_close_server_socket);
306 if(initialize_system_info() < 0)
308 writeToPortfile(ERR_INITIALIZE_SYSTEM_INFO_FAILED);
312 // make server socket
313 if(makeTargetServerSocket() != 0)
315 writeToPortfile(ERR_TARGET_SERVER_SOCKET_CREATE_FAILED);
319 if (!initialize_host_server_socket())
322 LOGI("SUCCESS to write port\n");
324 inititialize_manager_targets(&manager);
325 if (!initialize_pthread_sigmask())
327 // initialize sendMutex
328 pthread_mutex_init(&(manager.host.data_socket_mutex), NULL);
333 static int finalizeManager()
335 LOGI("Finalize daemon\n");
337 LOGI("finalize system info\n");
338 finalize_system_info();
341 // close host client socket
342 if(manager.host.control_socket != -1){
343 LOGI("close host control socket (%d)\n", manager.host.control_socket);
344 close(manager.host.control_socket);
346 if(manager.host.data_socket != -1){
347 LOGI("close host data socket (%d)\n", manager.host.data_socket);
348 close(manager.host.data_socket);
362 if (!ensure_singleton(SINGLETON_LOCKFILE))
367 LOGI("da_started\n");
368 atexit(_unlink_file);
370 manager.portfile = fopen(PORTFILE, "w");
371 if (manager.portfile == NULL) {
372 LOGE("cannot create portfile");
376 signal(SIGHUP, SIG_IGN);
382 // initialize manager
383 result = initializeManager();
384 fclose(manager.portfile);
388 //FIX ME remove samplingThread it is only for debug
389 //samplingThread(NULL);
391 LOGI("daemon loop finished\n");
394 LOGI("main finished\n");