4 * Copyright (c) 2000 - 2011 Samsung Electronics Co., Ltd. All rights reserved.
6 * Contact: Jayoun Lee <airjany@samsung.com>, Sewook Park <sewook7.park@samsung.com>, Jaeho Lee <jaeho81.lee@samsung.com>
8 * Licensed under the Apache License, Version 2.0 (the "License");
9 * you may not use this file except in compliance with the License.
10 * You may obtain a copy of the License at
12 * http://www.apache.org/licenses/LICENSE-2.0
14 * Unless required by applicable law or agreed to in writing, software
15 * distributed under the License is distributed on an "AS IS" BASIS,
16 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
17 * See the License for the specific language governing permissions and
18 * limitations under the License.
23 #include <sys/types.h>
28 #include <sys/smack.h>
33 #include "simple_util.h"
35 static int __connect_client_sock(int sockfd, const struct sockaddr *saptr, socklen_t salen,
39 static inline void __set_sock_option(int fd, int cli)
42 struct timeval tv = { 5, 200 * 1000 }; /* 5.2 sec */
44 size = AUL_SOCK_MAXBUFF;
45 setsockopt(fd, SOL_SOCKET, SO_SNDBUF, &size, sizeof(size));
46 setsockopt(fd, SOL_SOCKET, SO_RCVBUF, &size, sizeof(size));
48 setsockopt(fd, SOL_SOCKET, SO_RCVTIMEO, &tv, sizeof(tv));
51 int __create_server_sock(int pid)
53 struct sockaddr_un saddr;
54 struct sockaddr_un p_saddr;
58 /* Create basedir for our sockets */
60 (void) mkdir(AUL_SOCK_PREFIX, S_IRWXU | S_IRWXG | S_IRWXO | S_ISVTX);
63 fd = socket(AF_UNIX, SOCK_STREAM | SOCK_CLOEXEC, 0);
64 /* support above version 2.6.27*/
66 if (errno == EINVAL) {
67 fd = socket(AF_UNIX, SOCK_STREAM, 0);
69 _E("second chance - socket create error: %d", errno);
73 _E("socket error: %d", errno);
78 memset(&saddr, 0, sizeof(saddr));
79 saddr.sun_family = AF_UNIX;
80 snprintf(saddr.sun_path, UNIX_PATH_MAX, "%s/%d", AUL_SOCK_PREFIX, pid);
81 unlink(saddr.sun_path);
83 /* labeling to socket for SMACK */
84 if(getuid() == 0) { // this is meaningful iff current user is ROOT
85 if(smack_fsetlabel(fd, "@", SMACK_LABEL_IPOUT) != 0) {
86 /* in case of unsupported filesystem on 'socket' */
87 /* or permission error by using 'emulator', bypass*/
88 if((errno != EOPNOTSUPP) && (errno != EPERM)) {
89 _E("labeling to socket(IPOUT) error");
94 if(smack_fsetlabel(fd, "*", SMACK_LABEL_IPIN) != 0) {
95 /* in case of unsupported filesystem on 'socket' */
96 /* or permission error by using 'emulator', bypass*/
97 if((errno != EOPNOTSUPP) && (errno != EPERM)) {
98 _E("labeling to socket(IPIN) error");
105 if (bind(fd, (struct sockaddr *)&saddr, sizeof(saddr)) < 0) {
106 _E("bind error: %d", errno);
111 if (chmod(saddr.sun_path, (S_IRWXU | S_IRWXG | S_IRWXO)) < 0) {
112 /* Flawfinder: ignore*/
113 _E("failed to change the socket permission");
118 __set_sock_option(fd, 0);
120 if (listen(fd, 128) == -1) {
121 _E("listen error: %d", errno);
126 /* support app launched by shell script */
127 if (pid != LAUNCHPAD_PID) {
131 snprintf(p_saddr.sun_path, UNIX_PATH_MAX, "%s/%d",
132 AUL_SOCK_PREFIX, pgid);
133 if (link(saddr.sun_path, p_saddr.sun_path) < 0) {
135 _D("pg path - already exists");
137 _E("pg path - unknown create error");
145 int __create_client_sock(int pid)
148 struct sockaddr_un saddr = { 0, };
152 fd = socket(AF_UNIX, SOCK_STREAM | SOCK_CLOEXEC, 0);
153 /* support above version 2.6.27*/
155 if (errno == EINVAL) {
156 fd = socket(AF_UNIX, SOCK_STREAM, 0);
158 _E("second chance - socket create error: %d", errno);
162 _E("socket error: %d", errno);
167 saddr.sun_family = AF_UNIX;
168 snprintf(saddr.sun_path, UNIX_PATH_MAX, "%s/%d", AUL_SOCK_PREFIX, pid);
170 ret = __connect_client_sock(fd, (struct sockaddr *)&saddr, sizeof(saddr),
173 _E("cannot connect the client socket: %d", errno);
175 usleep((1+2*(2-retry))*100 * 1000);
185 __set_sock_option(fd, 1);
190 static int __connect_client_sock(int fd, const struct sockaddr *saptr, socklen_t salen,
199 struct timeval timeout;
201 flags = fcntl(fd, F_GETFL, 0);
202 fcntl(fd, F_SETFL, flags | O_NONBLOCK);
205 if ((ret = connect(fd, (struct sockaddr *)saptr, salen)) < 0) {
206 if (errno != EAGAIN && errno != EINPROGRESS) {
207 _E("connect error: %d", errno);
208 fcntl(fd, F_SETFL, flags);
213 /* Do whatever we want while the connect is taking place. */
215 goto done; /* connect completed immediately */
218 FD_SET(fd, &readfds);
221 timeout.tv_usec = nsec;
223 if ((ret = select(fd + 1, &readfds, &writefds, NULL,
224 nsec ? &timeout : NULL)) == 0) {
225 _E("select timeout");
226 close(fd); /* timeout */
231 if (FD_ISSET(fd, &readfds) || FD_ISSET(fd, &writefds)) {
233 if (getsockopt(fd, SOL_SOCKET, SO_ERROR, &error, &len) < 0)
234 return (-1); /* Solaris pending error */
236 return (-1); /* select error: sockfd not set*/
239 (void) fcntl(fd, F_SETFL, flags);
249 * @brief Send data (in raw) to the process with 'pid' via socket
251 int __app_send_raw(int pid, int cmd, unsigned char *kb_data, int datalen)
257 app_pkt_t *pkt = NULL;
259 if (kb_data == NULL || datalen > AUL_SOCK_MAXBUFF - 8) {
260 _E("keybundle error\n");
264 _D("pid(%d) : cmd(%d)", pid, cmd);
266 fd = __create_client_sock(pid);
268 _E("cannot create a client socket: %d", fd);
272 /* aul_app_is_running timeout : 25sec */
273 if(cmd == APP_IS_RUNNING) {
274 struct timeval tv = { 25, 0 };
275 ret = setsockopt(fd, SOL_SOCKET, SO_RCVTIMEO, &tv, sizeof(tv));
277 _E("setsockopt error");
281 pkt = (app_pkt_t *) malloc(sizeof(char) * AUL_SOCK_MAXBUFF);
283 _E("Malloc Failed!");
286 memset(pkt, 0, AUL_SOCK_MAXBUFF);
290 memcpy(pkt->data, kb_data, datalen);
292 if ((len = send(fd, pkt, datalen + 8, 0)) != datalen + 8) {
293 _E("sendto() failed - %d %d (errno %d)", len, datalen + 8, errno);
295 while (len != datalen + 8) {
296 ret = send(fd, &pkt->data[len-8], datalen + 8 - len, 0);
298 _E("second send() failed - %d %d (errno: %d)", ret, datalen + 8, errno);
299 if (errno == EPIPE) {
300 _E("pid:%d, fd:%d\n", pid, fd);
310 _D("send() len - %d %d", len, datalen + 8);
313 if (errno == EPIPE) {
314 _E("pid:%d, fd:%d\n", pid, fd);
322 _E("send() failed: %d %s", errno, strerror(errno));
332 len = recv(fd, &res, sizeof(int), 0);
334 if (errno == EAGAIN) {
335 _E("recv timeout : cmd(%d) %s", cmd, strerror(errno));
337 } else if (errno == EINTR) {
338 _D("recv : %s", strerror(errno));
341 _E("recv error : %s", strerror(errno));
350 int __app_send_raw_with_noreply(int pid, int cmd, unsigned char *kb_data, int datalen)
356 app_pkt_t *pkt = NULL;
358 if (kb_data == NULL || datalen > AUL_SOCK_MAXBUFF - 8) {
359 _E("keybundle error\n");
363 _D("pid(%d) : cmd(%d)", pid, cmd);
365 fd = __create_client_sock(pid);
369 pkt = (app_pkt_t *) malloc(sizeof(char) * AUL_SOCK_MAXBUFF);
371 _E("Malloc Failed!");
374 memset(pkt, 0, AUL_SOCK_MAXBUFF);
378 memcpy(pkt->data, kb_data, datalen);
380 if ((len = send(fd, pkt, datalen + 8, 0)) != datalen + 8) {
381 _E("sendto() failed - %d %d (errno %d)", len, datalen + 8, errno);
383 while (len != datalen + 8) {
384 ret = send(fd, &pkt->data[len-8], datalen + 8 - len, 0);
386 _E("second sendto() failed - %d %d (errno %d)", ret, datalen + 8, errno);
387 if (errno == EPIPE) {
388 _E("pid:%d, fd:%d\n", pid, fd);
398 _D("sendto() len - %d %d", len, datalen + 8);
401 if (errno == EPIPE) {
402 _E("pid:%d, fd:%d\n", pid, fd);
422 int __app_send_raw_with_delay_reply(int pid, int cmd, unsigned char *kb_data, int datalen)
427 app_pkt_t *pkt = NULL;
429 if (kb_data == NULL || datalen > AUL_SOCK_MAXBUFF - 8) {
430 _E("keybundle error\n");
434 _D("pid(%d) : cmd(%d)", pid, cmd);
436 fd = __create_client_sock(pid);
440 pkt = (app_pkt_t *) malloc(sizeof(char) * AUL_SOCK_MAXBUFF);
442 _E("Malloc Failed!");
445 memset(pkt, 0, AUL_SOCK_MAXBUFF);
449 memcpy(pkt->data, kb_data, datalen);
451 if ((len = send(fd, pkt, datalen + 8, 0)) != datalen + 8) {
452 _E("sendto() failed - %d %d (errno %d)", len, datalen + 8, errno);
454 while (len != datalen + 8) {
455 ret = send(fd, &pkt->data[len-8], datalen + 8 - len, 0);
457 _E("second sendto() failed - %d %d (errno %d)", ret, datalen + 8, errno);
458 if (errno == EPIPE) {
459 _E("pid:%d, fd:%d\n", pid, fd);
469 _D("sendto() len - %d %d", len, datalen + 8);
472 if (errno == EPIPE) {
473 _E("pid:%d, fd:%d\n", pid, fd);
491 app_pkt_t *__app_recv_raw(int fd, int *clifd, struct ucred *cr)
495 struct sockaddr_un aul_addr = { 0, };
497 app_pkt_t *pkt = NULL;
498 int cl = sizeof(struct ucred);
500 sun_size = sizeof(struct sockaddr_un);
502 if ((*clifd = accept(fd, (struct sockaddr *)&aul_addr,
503 (socklen_t *) &sun_size)) == -1) {
505 _E("accept error: %d", errno);
509 if (getsockopt(*clifd, SOL_SOCKET, SO_PEERCRED, cr,
510 (socklen_t *) &cl) < 0) {
511 _E("peer information error");
516 pkt = (app_pkt_t *) malloc(sizeof(char) * AUL_SOCK_MAXBUFF);
521 memset(pkt, 0, AUL_SOCK_MAXBUFF);
523 __set_sock_option(*clifd, 1);
526 /* receive single packet from socket */
527 len = recv(*clifd, pkt, AUL_SOCK_MAXBUFF, 0);
529 _E("recv error: %d", errno);
535 _E("recv error %d %d", len, pkt->len);
541 while( len < (pkt->len + 8) ) {
542 ret = recv(*clifd, &pkt->data[len-8], AUL_SOCK_MAXBUFF, 0);
544 _E("recv error: %d %d %d", errno, len, pkt->len);
550 _D("recv len %d %d", len, pkt->len);
556 app_pkt_t *__app_send_cmd_with_result(int pid, int cmd, unsigned char *kb_data, int datalen)
560 app_pkt_t *pkt = NULL;
562 fd = __create_client_sock(pid);
566 pkt = (app_pkt_t *) malloc(sizeof(char) * AUL_SOCK_MAXBUFF);
568 _E("Malloc Failed!");
571 memset(pkt, 0, AUL_SOCK_MAXBUFF);
576 memcpy(pkt->data, kb_data, datalen);
579 if ((len = send(fd, pkt, datalen + 8, 0)) != datalen + 8) {
580 _E("send() failed: %d len: %d", errno, len);
581 if (errno == EPIPE) {
582 _E("pid:%d, fd:%d\n", pid, fd);
591 /* receive single packet from socket */
592 len = recv(fd, pkt, AUL_SOCK_MAXBUFF, 0);
594 if (errno == EAGAIN) {
595 _E("recv timeout \n");
599 } else if (errno == EINTR) {
602 _E("recv error %d %s", errno, strerror(errno));
608 _D("recv result = %d", len);