Fix resource leak
[platform/core/appfw/pkgmgr-server.git] / src / pkgmgr-server.c
index 0f349fe..38fdaa2 100644 (file)
@@ -33,7 +33,9 @@
 #include <sys/signalfd.h>
 #include <signal.h>
 #include <grp.h>
+#include <dlfcn.h>
 #include <fcntl.h>
+#include <fnmatch.h>
 
 #include <glib.h>
 #include <gio/gio.h>
 #include <pkgmgr-info.h>
 #include <pkgmgr/pkgmgr_parser_db.h>
 #include <tzplatform_config.h>
-#include <drm-tizen-apps.h>
-#include <dd-display.h>
-#ifdef TIZEN_FEATURE_CSR
-#include <csr-content-screening.h>
-#endif
 
 #include "pkgmgr_installer.h"
 #include "pkgmgr-server.h"
 #include "queue.h"
 #include "package-manager.h"
 
+#define USRLIB "/usr/lib"
+
+#define PATH_LIBDRM_SVC_CORE \
+               "/usr/lib/libdrm-service-core-tizen.so.0"
+#define PATH_LIBCSR_CLIENT \
+               "/usr/lib/libcsr-client.so.2"
 #define OWNER_ROOT 0
 #define GLOBAL_USER tzplatform_getuid(TZ_SYS_GLOBALAPP_USER)
 #define APPFW_UID 301
@@ -90,6 +93,18 @@ static GIOChannel *sio;
 static guint swid;
 static GHashTable *backend_info_table;
 static GMainLoop *mainloop;
+static GDBusConnection *system_conn;
+
+static int (*_drm_tizen_register_license)
+               (const char *pRespBuf, unsigned int respBufLen);
+static int (*_drm_tizen_decrypt_package)(const char *pTADCFilepath,
+               int tadcFileLen, const char *pDecryptedFile,
+               int decryptedFileLen);
+static int (*_drm_tizen_generate_license_request)(const char *pRespBuf,
+               unsigned int respBufLen, char *pReqBuf,
+               unsigned int *pReqBufLen, char *pLicenseUrl,
+               unsigned int *pLicenseUrlLen);
+static void *drm_lib_handle;
 
 static int __check_backend_status_for_exit(void);
 static int __check_queue_status_for_exit(void);
@@ -115,22 +130,105 @@ static void __set_backend_free(int position)
        backend_busy = backend_busy & ~(1 << position);
 }
 
+static GDBusConnection *_get_system_conn(void)
+{
+       GError *err = NULL;
+
+       if (system_conn)
+               return system_conn;
+
+       system_conn = g_bus_get_sync(G_BUS_TYPE_SYSTEM, NULL, &err);
+       if (system_conn == NULL) {
+               ERR("Failed to get system bus: %s", err->message);
+               g_error_free(err);
+               return NULL;
+       }
+
+       return system_conn;
+}
+
+#define DEVICED_DBUS_PATH "org.tizen.system.deviced"
+#define DEVICED_DBUS_OBJECT_PATH "/Org/Tizen/System/DeviceD/Display"
+#define DEVICED_DBUS_INTERFACE_NAME "org.tizen.system.deviced.display"
+
 static void __set_power_lock(void)
 {
+       GDBusConnection *conn;
+       GDBusMessage *msg;
+       GError *err = NULL;
+       int ret = 0;
+
        if (is_lock_set)
                return;
 
-       if (display_lock_state(LCD_OFF, STAY_CUR_STATE, 0) == 0)
+       conn = _get_system_conn();
+       if (conn == NULL)
+               return;
+
+       msg = g_dbus_message_new_method_call(DEVICED_DBUS_PATH,
+                       DEVICED_DBUS_OBJECT_PATH,
+                       DEVICED_DBUS_INTERFACE_NAME,
+                       "lockstate");
+       if (msg == NULL) {
+               ERR("g_dbus_message_new_method_call() has failed");
+               return;
+       }
+
+       g_dbus_message_set_body(msg, g_variant_new("(sssi)", "lcdoff",
+                       "staycurstate", "NULL", 0));
+       if (!g_dbus_connection_send_message(conn, msg,
+                               G_DBUS_SEND_MESSAGE_FLAGS_NONE, NULL, &err)) {
+               ERR("Unable to send dbus message for acquring lock as  %s",
+                               err->message);
+               ret = -1;
+       }
+
+       if (ret == 0)
                is_lock_set = true;
+       g_object_unref(msg);
+       g_dbus_connection_flush_sync(conn, NULL, NULL);
+       g_clear_error(&err);
 }
 
 static void __release_power_lock(void)
 {
+       GError *err = NULL;
+       GDBusConnection *conn;
+       GDBusMessage *msg;
+       int ret = 0;
+
        if (!is_lock_set)
                return;
 
-       if (display_unlock_state(LCD_OFF, PM_SLEEP_MARGIN) == 0)
+       conn = _get_system_conn();
+       if (conn == NULL)
+               return;
+
+       msg = g_dbus_message_new_method_call(DEVICED_DBUS_PATH,
+                       DEVICED_DBUS_OBJECT_PATH,
+                       DEVICED_DBUS_INTERFACE_NAME,
+                       "unlockstate");
+       if (msg == NULL) {
+               ERR("g_dbus_message_new_method_call() is failed");
+               return;
+       }
+
+       g_dbus_message_set_body(msg, g_variant_new("(ss)", "lcdoff",
+                       "sleepmargin"));
+       if (!g_dbus_connection_send_message(conn, msg,
+                               G_DBUS_SEND_MESSAGE_FLAGS_NONE, NULL, &err)) {
+               ERR("Unable to send dbus message for releasing lock as  %s",
+                       err->message);
+               ret = -1;
+       }
+
+       if (ret == 0)
                is_lock_set = false;
+       g_object_unref(msg);
+       g_dbus_connection_flush_sync(conn, NULL, NULL);
+       g_clear_error(&err);
+
+       return;
 }
 
 static gboolean getsize_io_handler(GIOChannel *io, GIOCondition cond,
@@ -335,33 +433,65 @@ gboolean exit_server(void *data)
        return TRUE;
 }
 
-#ifdef TIZEN_FEATURE_CSR
 static int __check_csr(const char *path)
 {
-       csr_cs_context_h context = NULL;
-       csr_cs_malware_h detected = NULL;
-       int ret = -1;
+       int ret;
+       void *context;
+       void *malware;
+       void *lib_handle;
+       int (*_csr_cs_context_create)(void **handle);
+       int (*_csr_cs_scan_file)(void *handle, const char *file_path, void **malware);
+       int (*_csr_cs_context_destroy)(void *handle);
+
+       lib_handle = dlopen(PATH_LIBCSR_CLIENT, RTLD_LAZY);
+       if (!lib_handle) {
+               DBG("Unable to open %s", PATH_LIBCSR_CLIENT);
+               return 0;
+       }
 
-       ret = csr_cs_context_create(&context);
-       if (ret != CSR_ERROR_NONE) {
-               ERR("Failed to create csr context");
-               return -1;
+       _csr_cs_context_create = dlsym(lib_handle, "csr_cs_context_create");
+       _csr_cs_scan_file = dlsym(lib_handle, "csr_cs_scan_file");
+       _csr_cs_context_destroy = dlsym(lib_handle, "csr_cs_context_destroy");
+
+       if (!_csr_cs_context_create || !_csr_cs_scan_file ||
+                       !_csr_cs_context_destroy) {
+               ERR("Failed to load CSR symbols");
+               ret = -1;
+               goto catch;
+       }
+
+       ret = _csr_cs_context_create(&context);
+       if (ret != 0) {
+               ERR("Failed to create context");
+               ret = -1;
+               goto catch;
        }
 
-       if (context) {
-               ret = csr_cs_scan_file(context, path, &detected);
+       ret = _csr_cs_scan_file(context, path, &malware);
+       if (ret != 0) {
                DBG("CSR result[%d]", ret);
+               ret = 0;
+               goto catch;
+       }
 
-               csr_cs_context_destroy(context);
-               if (detected != NULL) {
-                       ERR("CSR Denied[%s] Installation", path);
-                       return -1;
-               }
+       ret = _csr_cs_context_destroy(context);
+       if (ret != 0) {
+               ERR("Failed to destroy context");
+               ret = -1;
+               goto catch;
        }
 
-       return 0;
+       if (malware != NULL) {
+               ERR("CSR detected malware from [%s]", path);
+               ret = -1;
+       }
+
+catch:
+       if (lib_handle)
+               dlclose(lib_handle);
+
+       return ret;
 }
-#endif
 
 static int __kill_app(char *appid, uid_t uid)
 {
@@ -380,7 +510,7 @@ static int __kill_app(char *appid, uid_t uid)
 
        ret = aul_terminate_pid_for_uid(pid, uid);
        if (ret != AUL_R_OK) {
-               ERR("failed to terminate app(%d)", appid);
+               ERR("failed to terminate app(%s)", appid);
                return -1;
        }
 
@@ -711,9 +841,13 @@ static int __process_install(struct backend_job *job)
                return -1;
 
        req_id = g_shell_quote(job->req_id);
+       if (!req_id)
+               return -1;
        pkgid = g_shell_quote(job->pkgid);
-       if (!req_id || !pkgid)
+       if (!pkgid) {
+               g_free(req_id);
                return -1;
+       }
 
        snprintf(args, sizeof(args), "%s -k %s -i %s -u %d %s", backend_cmd,
                        req_id, pkgid, (int)job->target_uid, job->args);
@@ -742,10 +876,13 @@ static int __process_mount_install(struct backend_job *job)
                return -1;
 
        req_id = g_shell_quote(job->req_id);
+       if (!req_id)
+               return -1;
        pkgid = g_shell_quote(job->pkgid);
-       if (!req_id || !pkgid)
+       if (!pkgid) {
+               g_free(req_id);
                return -1;
-
+       }
        snprintf(args, sizeof(args), "%s -k %s -w %s -u %d %s", backend_cmd,
                        req_id, pkgid, (int)job->target_uid, job->args);
 
@@ -773,9 +910,13 @@ static int __process_reinstall(struct backend_job *job)
                return -1;
 
        req_id = g_shell_quote(job->req_id);
+       if (!req_id)
+               return -1;
        pkgid = g_shell_quote(job->pkgid);
-       if (!req_id || !pkgid)
+       if (!pkgid) {
+               g_free(req_id);
                return -1;
+       }
 
        snprintf(args, sizeof(args), "%s -k %s -r %s -u %d", backend_cmd,
                        req_id, pkgid, (int)job->target_uid);
@@ -1224,6 +1365,7 @@ static int __process_getsize_sync(struct backend_job *job)
                goto error;
        }
 
+       job->extra_data = extra_getsize_info;
        extra_getsize_info->getsize_fifo = strdup(fifo_path);
        if (!extra_getsize_info->getsize_fifo) {
                ERR("out of memory");
@@ -1234,7 +1376,6 @@ static int __process_getsize_sync(struct backend_job *job)
                ERR("failed to mkfifo");
                goto error;
        }
-       job->extra_data = extra_getsize_info;
 
        snprintf(args, sizeof(args), "%s %s %s %d -k %s -u %d --sync",
                        backend_cmd, job->pkgid, job->args, job->caller_uid,
@@ -1395,56 +1536,120 @@ static int __process_check(struct backend_job *job)
        return 0;
 }
 
+static int __load_drm_library(void)
+{
+       if (drm_lib_handle)
+               return 0;
+
+       drm_lib_handle = dlopen(PATH_LIBDRM_SVC_CORE, RTLD_LAZY);
+       if (!drm_lib_handle) {
+               DBG("Unable to open %s", PATH_LIBDRM_SVC_CORE);
+               return -1;
+       }
+
+       _drm_tizen_generate_license_request =
+                       dlsym(drm_lib_handle, "drm_tizen_generate_license_request");
+       if (_drm_tizen_generate_license_request == NULL) {
+               ERR("_drm_tizen_generate_license_request() failed");
+               goto catch;
+       }
+
+       _drm_tizen_register_license =
+                               dlsym(drm_lib_handle, "drm_tizen_register_license");
+       if (_drm_tizen_register_license == NULL) {
+               ERR("_register_license() failed");
+               goto catch;
+       }
+
+       _drm_tizen_decrypt_package =
+                       dlsym(drm_lib_handle, "drm_tizen_decrypt_package");
+       if (_drm_tizen_decrypt_package == NULL) {
+               ERR("_drm_tizen_decrypt_package() failed");
+               goto catch;
+       }
+
+       return 0;
+catch:
+       if (drm_lib_handle) {
+               dlclose(drm_lib_handle);
+               drm_lib_handle = NULL;
+       }
+       return -1;
+}
+
+static void __unload_drm_library(void)
+{
+       if (drm_lib_handle) {
+               dlclose(drm_lib_handle);
+               drm_lib_handle = NULL;
+       }
+}
+
 static int __process_generate_license_request(struct backend_job *job)
 {
-       int ret;
        char *resp_data;
        char req_data[MAX_PKG_ARGS_LEN];
        unsigned int req_data_len;
        char license_url[MAX_PKG_ARGS_LEN];
        unsigned int license_url_len;
+       int ret;
 
        resp_data = job->args;
        req_data_len = sizeof(req_data);
        license_url_len = sizeof(license_url);
 
-       ret = drm_tizen_generate_license_request(resp_data, strlen(resp_data),
-                       req_data, &req_data_len, license_url, &license_url_len);
-       if (ret != TADC_SUCCESS) {
-               ERR("drm_tizen_generate_license_request failed: %d", ret);
-               _return_value_to_caller(job->req_id, g_variant_new("(iss)",
-                                       PKGMGR_R_ESYSTEM, "", ""));
-               is_drm_busy = false;
-               return -1;
+       if (__load_drm_library() != 0) {
+               ERR("Failed to load library");
+               goto catch;
        }
 
+       ret = _drm_tizen_generate_license_request(resp_data, strlen(resp_data),
+                       req_data, &req_data_len,
+                       license_url, &license_url_len);
+       if (ret != 1) {
+               ERR("drm_tizen_generate_license_request failed");
+               goto catch;
+       }
        _return_value_to_caller(job->req_id,
                        g_variant_new("(iss)", PKGMGR_R_OK, req_data,
                                license_url));
        is_drm_busy = true;
        return 0;
+
+catch:
+       _return_value_to_caller(job->req_id, g_variant_new("(iss)",
+                               PKGMGR_R_ESYSTEM, "", ""));
+       is_drm_busy = false;
+       __unload_drm_library();
+       return -1;
 }
 
 static int __process_register_license(struct backend_job *job)
 {
-       int ret;
        char *resp_data;
+       int ret;
 
        resp_data = job->args;
-
-       ret = drm_tizen_register_license(resp_data, strlen(resp_data));
-       if (ret != TADC_SUCCESS) {
+       if (!_drm_tizen_register_license) {
+               ERR("_drm_tizen_register_license is not loaded");
+               goto catch;
+       }
+       ret = _drm_tizen_register_license(resp_data, strlen(resp_data));
+       if (ret != 1) {
                ERR("drm_tizen_register_license failed: %d", ret);
-               _return_value_to_caller(job->req_id,
-                               g_variant_new("(i)", PKGMGR_R_ESYSTEM));
-               is_drm_busy = false;
-               return -1;
+               goto catch;
        }
-
        _return_value_to_caller(job->req_id,
                        g_variant_new("(i)", PKGMGR_R_OK));
-
        return 0;
+
+catch:
+       _return_value_to_caller(job->req_id,
+                       g_variant_new("(i)", PKGMGR_R_ESYSTEM));
+       is_drm_busy = false;
+       __unload_drm_library();
+
+       return -1;
 }
 
 static int __process_decrypt_package(struct backend_job *job)
@@ -1457,21 +1662,28 @@ static int __process_decrypt_package(struct backend_job *job)
        decrypted_file_path = job->args;
 
        /* TODO: check ownership of decrypted file */
-       ret = drm_tizen_decrypt_package(drm_file_path, strlen(drm_file_path),
+       if (!_drm_tizen_decrypt_package) {
+               ERR("drm_tizen_decrypt_package is not loaded");
+
+               goto catch;
+       }
+       ret = _drm_tizen_decrypt_package(drm_file_path, strlen(drm_file_path),
                        decrypted_file_path, strlen(decrypted_file_path));
-       if (ret != TADC_SUCCESS) {
-               ERR("drm_tizen_register_license failed: %d", ret);
-               _return_value_to_caller(job->req_id,
-                               g_variant_new("(i)", PKGMGR_R_ESYSTEM));
-               is_drm_busy = false;
-               return -1;
+       if (ret != 1) {
+               ERR("drm_tizen_decrypt_package failed: %d", ret);
+               goto catch;
        }
-
        _return_value_to_caller(job->req_id,
                        g_variant_new("(i)", PKGMGR_R_OK));
+       return 0;
+
+catch:
+       _return_value_to_caller(job->req_id,
+               g_variant_new("(i)", PKGMGR_R_ESYSTEM));
        is_drm_busy = false;
+       __unload_drm_library();
 
-       return 0;
+       return -1;
 }
 
 static int __process_update_app_splash_screen(struct backend_job *job, int flag)
@@ -1560,6 +1772,17 @@ static int __process_set_app_label(struct backend_job *job)
        return ret;
 }
 
+static int __process_set_app_icon(struct backend_job *job)
+{
+       int ret;
+
+       ret = pkgmgr_parser_update_app_icon_info_in_usr_db(job->pkgid,
+                       job->target_uid, job->args);
+       _return_value_to_caller(job->req_id, g_variant_new("(i)", ret));
+
+       return ret;
+}
+
 static int __process_migrate_external_image(struct backend_job *job)
 {
        char *backend_cmd;
@@ -1620,7 +1843,6 @@ gboolean queue_job(void *data)
        /* set current backend job */
        DBG("handle request type [%d]", job->req_type);
 
-#ifdef TIZEN_FEATURE_CSR
        if (job->req_type == REQUEST_TYPE_INSTALL ||
                        job->req_type == REQUEST_TYPE_MOUNT_INSTALL ||
                        job->req_type == REQUEST_TYPE_REINSTALL) {
@@ -1632,7 +1854,6 @@ gboolean queue_job(void *data)
                        return TRUE;
                }
        }
-#endif
 
        switch (job->req_type) {
        case REQUEST_TYPE_INSTALL:
@@ -1778,6 +1999,10 @@ gboolean queue_job(void *data)
                ret = __process_set_app_label(job);
                _free_backend_job(job);
                break;
+       case REQUEST_TYPE_SET_APP_ICON:
+               ret = __process_set_app_icon(job);
+               _free_backend_job(job);
+               break;
        case REQUEST_TYPE_MIGRATE_EXTERNAL_IMAGE:
                __set_backend_busy(x);
                __set_power_lock();