return err;
}
-#ifndef LOCALTEST
-static void target_setup_smack_attributes(int target_index)
-{
- fsetxattr(manager.target[target_index].socket,
- "security.SMACK64IPIN", "*", 1, 0);
- fsetxattr(manager.target[target_index].socket,
- "security.SMACK64IPOUT", "*", 1, 0);
-}
-#else
-static void target_setup_smack_attributes(int unused)
-{
-}
-#endif
-
-// return 0 if normal case
-// return plus value if non critical error occur
-// return minus value if critical error occur
+/**
+ * return 0 if normal case
+ * return plus value if non critical error occur
+ * return minus value if critical error occur
+ */
static int targetServerHandler(int efd)
{
msg_target_t log;
accept(manager.target_server_socket, NULL, NULL);
if (manager.target[index].socket >= 0) {
- // accept succeed
- target_setup_smack_attributes(index);
+ /* accept succeed */
+ fd_setup_smack_attributes(manager.target[index].socket);
- // send config message to target process
+ /* send config message to target process */
log.type = MSG_OPTION;
log.length = sprintf(log.data, "%lu",
(unsigned long int)prof_session.conf.use_features0);
return -1;
}
-#ifndef LOCALTEST
- // set smack attribute for certification
- fsetxattr(manager.target_server_socket, "security.SMACK64IPIN", "*", 1, 0);
- fsetxattr(manager.target_server_socket, "security.SMACK64IPOUT", "*", 1, 0);
-#endif /* LOCALTEST */
+ fd_setup_smack_attributes(manager.target_server_socket);
- bzero(&serverAddrUn, sizeof(serverAddrUn));
+ memset(&serverAddrUn, '\0', sizeof(serverAddrUn));
serverAddrUn.sun_family = AF_UNIX;
sprintf(serverAddrUn.sun_path, "%s", UDS_NAME);
return res;
}
+
+void fd_setup_smack_attributes(int fd)
+{
+ fsetxattr(fd, "security.SMACK64IPIN", "*", 1, 0);
+ fsetxattr(fd, "security.SMACK64IPOUT", "*", 1, 0);
+}
int exec_app_tizen(const char *app_id, const char *exec_path);
int exec_app_common(const char* exec_path);
char *dereference_tizen_exe_path(const char *path, char *resolved);
+void fd_setup_smack_attributes(int fd);
#ifdef __cplusplus
}
#endif