Fix possible corruption
[platform/core/appfw/pkgmgr-server.git] / src / pkgmgr-server.c
index 7f6a2ae..7a024d9 100644 (file)
@@ -33,7 +33,9 @@
 #include <sys/signalfd.h>
 #include <signal.h>
 #include <grp.h>
+#include <dlfcn.h>
 #include <fcntl.h>
+#include <fnmatch.h>
 
 #include <glib.h>
 #include <gio/gio.h>
 #include <pkgmgr-info.h>
 #include <pkgmgr/pkgmgr_parser_db.h>
 #include <tzplatform_config.h>
-#include <drm-tizen-apps.h>
-#ifdef TIZEN_FEATURE_CSR
-#include <csr-content-screening.h>
-#endif
 
 #include "pkgmgr_installer.h"
 #include "pkgmgr-server.h"
 #include "queue.h"
 #include "package-manager.h"
 
+#define USRLIB "/usr/lib"
+
+#define PATH_LIBDRM_SVC_CORE \
+               "/usr/lib/libdrm-service-core-tizen.so.0"
+#define PATH_LIBCSR_CLIENT \
+               "/usr/lib/libcsr-client.so.2"
 #define OWNER_ROOT 0
 #define GLOBAL_USER tzplatform_getuid(TZ_SYS_GLOBALAPP_USER)
 #define APPFW_UID 301
@@ -83,11 +87,24 @@ is dynamically determined.
 static char backend_busy = 0;
 extern int num_of_backends;
 bool is_drm_busy = false;
+static bool is_lock_set = false;
 
 static GIOChannel *sio;
 static guint swid;
 static GHashTable *backend_info_table;
 static GMainLoop *mainloop;
+static GDBusConnection *system_conn;
+
+static int (*_drm_tizen_register_license)
+               (const char *pRespBuf, unsigned int respBufLen);
+static int (*_drm_tizen_decrypt_package)(const char *pTADCFilepath,
+               int tadcFileLen, const char *pDecryptedFile,
+               int decryptedFileLen);
+static int (*_drm_tizen_generate_license_request)(const char *pRespBuf,
+               unsigned int respBufLen, char *pReqBuf,
+               unsigned int *pReqBufLen, char *pLicenseUrl,
+               unsigned int *pLicenseUrlLen);
+static void *drm_lib_handle;
 
 static int __check_backend_status_for_exit(void);
 static int __check_queue_status_for_exit(void);
@@ -113,15 +130,118 @@ static void __set_backend_free(int position)
        backend_busy = backend_busy & ~(1 << position);
 }
 
+static GDBusConnection *_get_system_conn(void)
+{
+       GError *err = NULL;
+
+       if (system_conn)
+               return system_conn;
+
+       system_conn = g_bus_get_sync(G_BUS_TYPE_SYSTEM, NULL, &err);
+       if (system_conn == NULL) {
+               ERR("Failed to get system bus: %s", err->message);
+               g_error_free(err);
+               return NULL;
+       }
+
+       return system_conn;
+}
+
+#define DEVICED_DBUS_PATH "org.tizen.system.deviced"
+#define DEVICED_DBUS_OBJECT_PATH "/Org/Tizen/System/DeviceD/Display"
+#define DEVICED_DBUS_INTERFACE_NAME "org.tizen.system.deviced.display"
+
+static void __set_power_lock(void)
+{
+       GDBusConnection *conn;
+       GDBusMessage *msg;
+       GError *err = NULL;
+       int ret = 0;
+
+       if (is_lock_set)
+               return;
+
+       conn = _get_system_conn();
+       if (conn == NULL)
+               return;
+
+       msg = g_dbus_message_new_method_call(DEVICED_DBUS_PATH,
+                       DEVICED_DBUS_OBJECT_PATH,
+                       DEVICED_DBUS_INTERFACE_NAME,
+                       "lockstate");
+       if (msg == NULL) {
+               ERR("g_dbus_message_new_method_call() has failed");
+               return;
+       }
+
+       g_dbus_message_set_body(msg, g_variant_new("(sssi)", "lcdoff",
+                       "staycurstate", "NULL", 0));
+       if (!g_dbus_connection_send_message(conn, msg,
+                               G_DBUS_SEND_MESSAGE_FLAGS_NONE, NULL, &err)) {
+               ERR("Unable to send dbus message for acquring lock as  %s",
+                               err->message);
+               ret = -1;
+       }
+
+       if (ret == 0)
+               is_lock_set = true;
+       g_object_unref(msg);
+       g_dbus_connection_flush_sync(conn, NULL, NULL);
+       g_clear_error(&err);
+}
+
+static void __release_power_lock(void)
+{
+       GError *err = NULL;
+       GDBusConnection *conn;
+       GDBusMessage *msg;
+       int ret = 0;
+
+       if (!is_lock_set)
+               return;
+
+       conn = _get_system_conn();
+       if (conn == NULL)
+               return;
+
+       msg = g_dbus_message_new_method_call(DEVICED_DBUS_PATH,
+                       DEVICED_DBUS_OBJECT_PATH,
+                       DEVICED_DBUS_INTERFACE_NAME,
+                       "unlockstate");
+       if (msg == NULL) {
+               ERR("g_dbus_message_new_method_call() is failed");
+               return;
+       }
+
+       g_dbus_message_set_body(msg, g_variant_new("(ss)", "lcdoff",
+                       "sleepmargin"));
+       if (!g_dbus_connection_send_message(conn, msg,
+                               G_DBUS_SEND_MESSAGE_FLAGS_NONE, NULL, &err)) {
+               ERR("Unable to send dbus message for releasing lock as  %s",
+                       err->message);
+               ret = -1;
+       }
+
+       if (ret == 0)
+               is_lock_set = false;
+       g_object_unref(msg);
+       g_dbus_connection_flush_sync(conn, NULL, NULL);
+       g_clear_error(&err);
+
+       return;
+}
+
 static gboolean getsize_io_handler(GIOChannel *io, GIOCondition cond,
                gpointer data)
 {
        GError *err = NULL;
        GIOStatus s;
        gsize len;
-       char buf[MAX_LONGLONG_LENGTH];
+       char buf[MAX_LONGLONG_LENGTH] = {0};
        long long result = 0;
        struct backend_job *job = (struct backend_job *)data;
+       struct getsize_sync_extra_info *extra_getsize_info =
+                       (struct getsize_sync_extra_info *)job->extra_data;
 
        s = g_io_channel_read_chars(io, (gchar *)buf, sizeof(buf), &len, &err);
        if (s != G_IO_STATUS_NORMAL) {
@@ -140,9 +260,9 @@ static gboolean getsize_io_handler(GIOChannel *io, GIOCondition cond,
        _return_value_to_caller(job->req_id, g_variant_new("(ix)",
                (result < 0) ? PKGMGR_R_ERROR : PKGMGR_R_OK, result));
 
-       unlink(job->extra->getsize_fifo);
-       free(job->extra->getsize_fifo);
-       job->extra->getsize_fifo = NULL;
+       unlink(extra_getsize_info->getsize_fifo);
+       free(extra_getsize_info->getsize_fifo);
+       extra_getsize_info->getsize_fifo = NULL;
 
        return FALSE;
 }
@@ -150,22 +270,25 @@ static gboolean getsize_io_handler(GIOChannel *io, GIOCondition cond,
 static int __setup_size_info_io(struct backend_job *job)
 {
        guint getsize_wid;
+       struct getsize_sync_extra_info *extra_getsize_info =
+                       (struct getsize_sync_extra_info *)job->extra_data;
 
-       job->extra->getsize_fd = open(job->extra->getsize_fifo,
+       extra_getsize_info->getsize_fd = open(extra_getsize_info->getsize_fifo,
                O_RDONLY | O_NONBLOCK);
-       if (job->extra->getsize_fd < 0) {
+       if (extra_getsize_info->getsize_fd < 0) {
                ERR("failed to open the fifo(%s), errno(%d)",
-                       job->extra->getsize_fifo, errno);
+                               extra_getsize_info->getsize_fifo, errno);
                return -1;
        }
 
-       job->extra->getsize_io = g_io_channel_unix_new(job->extra->getsize_fd);
-       if (!job->extra->getsize_io)
+       extra_getsize_info->getsize_io =
+                       g_io_channel_unix_new(extra_getsize_info->getsize_fd);
+       if (!extra_getsize_info->getsize_io)
                return -1;
-       g_io_channel_set_encoding(job->extra->getsize_io, NULL, NULL);
-       g_io_channel_set_buffered(job->extra->getsize_io, FALSE);
-       getsize_wid = g_io_add_watch(job->extra->getsize_io,
-               G_IO_IN, getsize_io_handler, job);
+       g_io_channel_set_encoding(extra_getsize_info->getsize_io, NULL, NULL);
+       g_io_channel_set_buffered(extra_getsize_info->getsize_io, FALSE);
+       getsize_wid = g_io_add_watch_full(extra_getsize_info->getsize_io,
+               G_PRIORITY_HIGH, G_IO_IN, getsize_io_handler, job, NULL);
        if (!getsize_wid) {
                ERR("failed to add io watch");
                return -1;
@@ -182,6 +305,7 @@ static gboolean __signal_handler(GIOChannel *io, GIOCondition cond,
        gsize len;
        struct signalfd_siginfo fdsi;
        struct backend_job *job;
+       struct getsize_sync_extra_info *extra_getsize_info;
        pid_t pid;
        int status;
 
@@ -213,15 +337,17 @@ static gboolean __signal_handler(GIOChannel *io, GIOCondition cond,
                        INFO("backend[%s][%d] exit", job->backend_type, pid);
                }
 
-               if (job->extra) {
-                       if (job->extra->getsize_fifo) {
+               if (job->req_type == REQUEST_TYPE_GETSIZE_SYNC &&
+                               job->extra_data) {
+                       extra_getsize_info =
+                                       (struct getsize_sync_extra_info *)job->extra_data;
+                       if (extra_getsize_info->getsize_fifo) {
                                ERR("invalid backend close");
                                _return_value_to_caller(job->req_id,
-                                       g_variant_new("(ix)", PKGMGR_R_ERROR,
-                                       -1));
+                                       g_variant_new("(ix)",
+                                                       PKGMGR_R_ERROR, -1));
                        }
                }
-
                g_hash_table_remove(backend_info_table, (gconstpointer)pid);
        }
        g_idle_add(queue_job, NULL);
@@ -300,38 +426,65 @@ gboolean exit_server(void *data)
        if (__check_backend_status_for_exit() &&
                        __check_queue_status_for_exit() && !is_drm_busy) {
                g_main_loop_quit(mainloop);
+               if (is_lock_set)
+                       __release_power_lock();
                return FALSE;
        }
        return TRUE;
 }
 
-#ifdef TIZEN_FEATURE_CSR
 static int __check_csr(const char *path)
 {
-       csr_cs_context_h context = NULL;
-       csr_cs_malware_h detected = NULL;
-       int ret = -1;
+       int ret;
+       void *context;
+       void *malware = NULL;
+       void *lib_handle;
+       int (*_csr_cs_context_create)(void **handle);
+       int (*_csr_cs_scan_file)(void *handle, const char *file_path, void **malware);
+       int (*_csr_cs_context_destroy)(void *handle);
+
+       lib_handle = dlopen(PATH_LIBCSR_CLIENT, RTLD_LAZY);
+       if (!lib_handle) {
+               DBG("Unable to open %s", PATH_LIBCSR_CLIENT);
+               return 0;
+       }
 
-       ret = csr_cs_context_create(&context);
-       if (ret != CSR_ERROR_NONE) {
-               ERR("Failed to create csr context");
+       _csr_cs_context_create = dlsym(lib_handle, "csr_cs_context_create");
+       _csr_cs_scan_file = dlsym(lib_handle, "csr_cs_scan_file");
+       _csr_cs_context_destroy = dlsym(lib_handle, "csr_cs_context_destroy");
+
+       if (!_csr_cs_context_create || !_csr_cs_scan_file ||
+                       !_csr_cs_context_destroy) {
+               ERR("Failed to load CSR symbols");
+               dlclose(lib_handle);
+               return -1;
+       }
+
+       ret = _csr_cs_context_create(&context);
+       if (ret != 0) {
+               ERR("Failed to create context");
+               dlclose(lib_handle);
                return -1;
        }
 
-       if (context) {
-               ret = csr_cs_scan_file(context, path, &detected);
+       ret = _csr_cs_scan_file(context, path, &malware);
+       /* the csr engine may not exist */
+       if (ret != 0)
                DBG("CSR result[%d]", ret);
 
-               csr_cs_context_destroy(context);
-               if (detected != NULL) {
-                       ERR("CSR Denied[%s] Installation", path);
-                       return -1;
-               }
-       }
+       ret = _csr_cs_context_destroy(context);
+       if (ret != 0)
+               ERR("Failed to destroy context");
 
-       return 0;
+       dlclose(lib_handle);
+
+       if (malware != NULL) {
+               ERR("CSR detected malware from [%s]", path);
+               return -1;
+       } else {
+               return 0;
+       }
 }
-#endif
 
 static int __kill_app(char *appid, uid_t uid)
 {
@@ -350,7 +503,7 @@ static int __kill_app(char *appid, uid_t uid)
 
        ret = aul_terminate_pid_for_uid(pid, uid);
        if (ret != AUL_R_OK) {
-               ERR("failed to terminate app(%d)", appid);
+               ERR("failed to terminate app(%s)", appid);
                return -1;
        }
 
@@ -681,9 +834,13 @@ static int __process_install(struct backend_job *job)
                return -1;
 
        req_id = g_shell_quote(job->req_id);
+       if (!req_id)
+               return -1;
        pkgid = g_shell_quote(job->pkgid);
-       if (!req_id || !pkgid)
+       if (!pkgid) {
+               g_free(req_id);
                return -1;
+       }
 
        snprintf(args, sizeof(args), "%s -k %s -i %s -u %d %s", backend_cmd,
                        req_id, pkgid, (int)job->target_uid, job->args);
@@ -712,10 +869,13 @@ static int __process_mount_install(struct backend_job *job)
                return -1;
 
        req_id = g_shell_quote(job->req_id);
+       if (!req_id)
+               return -1;
        pkgid = g_shell_quote(job->pkgid);
-       if (!req_id || !pkgid)
+       if (!pkgid) {
+               g_free(req_id);
                return -1;
-
+       }
        snprintf(args, sizeof(args), "%s -k %s -w %s -u %d %s", backend_cmd,
                        req_id, pkgid, (int)job->target_uid, job->args);
 
@@ -743,9 +903,13 @@ static int __process_reinstall(struct backend_job *job)
                return -1;
 
        req_id = g_shell_quote(job->req_id);
+       if (!req_id)
+               return -1;
        pkgid = g_shell_quote(job->pkgid);
-       if (!req_id || !pkgid)
+       if (!pkgid) {
+               g_free(req_id);
                return -1;
+       }
 
        snprintf(args, sizeof(args), "%s -k %s -r %s -u %d", backend_cmd,
                        req_id, pkgid, (int)job->target_uid);
@@ -1182,24 +1346,26 @@ static int __process_getsize_sync(struct backend_job *job)
        char **argv;
        char args[MAX_PKG_ARGS_LEN];
        char fifo_path[PATH_MAX];
+       struct getsize_sync_extra_info *extra_getsize_info;
        int pid;
 
        snprintf(fifo_path, sizeof(fifo_path), "/tmp/pkgmgr/%s",
                        job->req_id);
 
-       job->extra = calloc(1, sizeof(struct job_extra_info));
-       if (!job->extra) {
+       extra_getsize_info = calloc(1, sizeof(struct getsize_sync_extra_info));
+       if (!extra_getsize_info) {
                ERR("memory alloc failed");
                goto error;
        }
 
-       job->extra->getsize_fifo = strdup(fifo_path);
-       if (!job->extra->getsize_fifo) {
+       job->extra_data = extra_getsize_info;
+       extra_getsize_info->getsize_fifo = strdup(fifo_path);
+       if (!extra_getsize_info->getsize_fifo) {
                ERR("out of memory");
                goto error;
        }
 
-       if (mkfifo(job->extra->getsize_fifo, 0600) < 0) {
+       if (mkfifo(extra_getsize_info->getsize_fifo, 0600) < 0) {
                ERR("failed to mkfifo");
                goto error;
        }
@@ -1363,56 +1529,120 @@ static int __process_check(struct backend_job *job)
        return 0;
 }
 
+static int __load_drm_library(void)
+{
+       if (drm_lib_handle)
+               return 0;
+
+       drm_lib_handle = dlopen(PATH_LIBDRM_SVC_CORE, RTLD_LAZY);
+       if (!drm_lib_handle) {
+               DBG("Unable to open %s", PATH_LIBDRM_SVC_CORE);
+               return -1;
+       }
+
+       _drm_tizen_generate_license_request =
+                       dlsym(drm_lib_handle, "drm_tizen_generate_license_request");
+       if (_drm_tizen_generate_license_request == NULL) {
+               ERR("_drm_tizen_generate_license_request() failed");
+               goto catch;
+       }
+
+       _drm_tizen_register_license =
+                               dlsym(drm_lib_handle, "drm_tizen_register_license");
+       if (_drm_tizen_register_license == NULL) {
+               ERR("_register_license() failed");
+               goto catch;
+       }
+
+       _drm_tizen_decrypt_package =
+                       dlsym(drm_lib_handle, "drm_tizen_decrypt_package");
+       if (_drm_tizen_decrypt_package == NULL) {
+               ERR("_drm_tizen_decrypt_package() failed");
+               goto catch;
+       }
+
+       return 0;
+catch:
+       if (drm_lib_handle) {
+               dlclose(drm_lib_handle);
+               drm_lib_handle = NULL;
+       }
+       return -1;
+}
+
+static void __unload_drm_library(void)
+{
+       if (drm_lib_handle) {
+               dlclose(drm_lib_handle);
+               drm_lib_handle = NULL;
+       }
+}
+
 static int __process_generate_license_request(struct backend_job *job)
 {
-       int ret;
        char *resp_data;
        char req_data[MAX_PKG_ARGS_LEN];
        unsigned int req_data_len;
        char license_url[MAX_PKG_ARGS_LEN];
        unsigned int license_url_len;
+       int ret;
 
        resp_data = job->args;
        req_data_len = sizeof(req_data);
        license_url_len = sizeof(license_url);
 
-       ret = drm_tizen_generate_license_request(resp_data, strlen(resp_data),
-                       req_data, &req_data_len, license_url, &license_url_len);
-       if (ret != TADC_SUCCESS) {
-               ERR("drm_tizen_generate_license_request failed: %d", ret);
-               _return_value_to_caller(job->req_id, g_variant_new("(iss)",
-                                       PKGMGR_R_ESYSTEM, "", ""));
-               is_drm_busy = false;
-               return -1;
+       if (__load_drm_library() != 0) {
+               ERR("Failed to load library");
+               goto catch;
        }
 
+       ret = _drm_tizen_generate_license_request(resp_data, strlen(resp_data),
+                       req_data, &req_data_len,
+                       license_url, &license_url_len);
+       if (ret != 1) {
+               ERR("drm_tizen_generate_license_request failed");
+               goto catch;
+       }
        _return_value_to_caller(job->req_id,
                        g_variant_new("(iss)", PKGMGR_R_OK, req_data,
                                license_url));
        is_drm_busy = true;
        return 0;
+
+catch:
+       _return_value_to_caller(job->req_id, g_variant_new("(iss)",
+                               PKGMGR_R_ESYSTEM, "", ""));
+       is_drm_busy = false;
+       __unload_drm_library();
+       return -1;
 }
 
 static int __process_register_license(struct backend_job *job)
 {
-       int ret;
        char *resp_data;
+       int ret;
 
        resp_data = job->args;
-
-       ret = drm_tizen_register_license(resp_data, strlen(resp_data));
-       if (ret != TADC_SUCCESS) {
+       if (!_drm_tizen_register_license) {
+               ERR("_drm_tizen_register_license is not loaded");
+               goto catch;
+       }
+       ret = _drm_tizen_register_license(resp_data, strlen(resp_data));
+       if (ret != 1) {
                ERR("drm_tizen_register_license failed: %d", ret);
-               _return_value_to_caller(job->req_id,
-                               g_variant_new("(i)", PKGMGR_R_ESYSTEM));
-               is_drm_busy = false;
-               return -1;
+               goto catch;
        }
-
        _return_value_to_caller(job->req_id,
                        g_variant_new("(i)", PKGMGR_R_OK));
-
        return 0;
+
+catch:
+       _return_value_to_caller(job->req_id,
+                       g_variant_new("(i)", PKGMGR_R_ESYSTEM));
+       is_drm_busy = false;
+       __unload_drm_library();
+
+       return -1;
 }
 
 static int __process_decrypt_package(struct backend_job *job)
@@ -1425,21 +1655,28 @@ static int __process_decrypt_package(struct backend_job *job)
        decrypted_file_path = job->args;
 
        /* TODO: check ownership of decrypted file */
-       ret = drm_tizen_decrypt_package(drm_file_path, strlen(drm_file_path),
+       if (!_drm_tizen_decrypt_package) {
+               ERR("drm_tizen_decrypt_package is not loaded");
+
+               goto catch;
+       }
+       ret = _drm_tizen_decrypt_package(drm_file_path, strlen(drm_file_path),
                        decrypted_file_path, strlen(decrypted_file_path));
-       if (ret != TADC_SUCCESS) {
-               ERR("drm_tizen_register_license failed: %d", ret);
-               _return_value_to_caller(job->req_id,
-                               g_variant_new("(i)", PKGMGR_R_ESYSTEM));
-               is_drm_busy = false;
-               return -1;
+       if (ret != 1) {
+               ERR("drm_tizen_decrypt_package failed: %d", ret);
+               goto catch;
        }
-
        _return_value_to_caller(job->req_id,
                        g_variant_new("(i)", PKGMGR_R_OK));
+       return 0;
+
+catch:
+       _return_value_to_caller(job->req_id,
+               g_variant_new("(i)", PKGMGR_R_ESYSTEM));
        is_drm_busy = false;
+       __unload_drm_library();
 
-       return 0;
+       return -1;
 }
 
 static int __process_update_app_splash_screen(struct backend_job *job, int flag)
@@ -1528,6 +1765,42 @@ static int __process_set_app_label(struct backend_job *job)
        return ret;
 }
 
+static int __process_set_app_icon(struct backend_job *job)
+{
+       int ret;
+       pkgmgrinfo_appinfo_h handle = NULL;
+       char *app_root_path = NULL;
+
+       ret = pkgmgrinfo_appinfo_get_usr_appinfo(job->pkgid, job->target_uid, &handle);
+       if (ret != PMINFO_R_OK) {
+               _return_value_to_caller(job->req_id, g_variant_new("(i)", ret));
+               return PKGMGR_R_ENOPKG;
+       }
+
+       ret = pkgmgrinfo_appinfo_get_root_path(handle, &app_root_path);
+       if (ret != PMINFO_R_OK || !app_root_path) {
+               _return_value_to_caller(job->req_id, g_variant_new("(i)", ret));
+               pkgmgrinfo_appinfo_destroy_appinfo(handle);
+               return PKGMGR_R_ESYSTEM;
+       }
+
+       if (strncasecmp(job->args, app_root_path, strlen(app_root_path)) != 0 ||
+                       strstr(job->args, "..") != NULL ||
+                       access(job->args, F_OK) != 0) {
+               ERR("invalid path[%s]", job->args);
+               _return_value_to_caller(job->req_id, g_variant_new("(i)", ret));
+               pkgmgrinfo_appinfo_destroy_appinfo(handle);
+               return PKGMGR_R_EINVAL;
+       }
+
+       pkgmgrinfo_appinfo_destroy_appinfo(handle);
+       ret = pkgmgr_parser_update_app_icon_info_in_usr_db(job->pkgid,
+                       job->target_uid, job->args);
+       _return_value_to_caller(job->req_id, g_variant_new("(i)", ret));
+
+       return ret;
+}
+
 static int __process_migrate_external_image(struct backend_job *job)
 {
        char *backend_cmd;
@@ -1588,7 +1861,6 @@ gboolean queue_job(void *data)
        /* set current backend job */
        DBG("handle request type [%d]", job->req_type);
 
-#ifdef TIZEN_FEATURE_CSR
        if (job->req_type == REQUEST_TYPE_INSTALL ||
                        job->req_type == REQUEST_TYPE_MOUNT_INSTALL ||
                        job->req_type == REQUEST_TYPE_REINSTALL) {
@@ -1600,36 +1872,41 @@ gboolean queue_job(void *data)
                        return TRUE;
                }
        }
-#endif
 
        switch (job->req_type) {
        case REQUEST_TYPE_INSTALL:
                __set_backend_busy(x);
+               __set_power_lock();
                ret = __process_install(job);
                __post_process(ret, x, job);
                break;
        case REQUEST_TYPE_MOUNT_INSTALL:
                __set_backend_busy(x);
+               __set_power_lock();
                ret = __process_mount_install(job);
                __post_process(ret, x, job);
                break;
        case REQUEST_TYPE_REINSTALL:
                __set_backend_busy(x);
+               __set_power_lock();
                ret = __process_reinstall(job);
                __post_process(ret, x, job);
                break;
        case REQUEST_TYPE_UNINSTALL:
                __set_backend_busy(x);
+               __set_power_lock();
                ret = __process_uninstall(job);
                __post_process(ret, x, job);
                break;
        case REQUEST_TYPE_MOVE:
                __set_backend_busy(x);
+               __set_power_lock();
                ret = __process_move(job);
                __post_process(ret, x, job);
                break;
        case REQUEST_TYPE_ENABLE_PKG:
                __set_backend_busy(x);
+               __set_power_lock();
                ret = __process_enable_pkg(job);
                if (ret < 0)
                        _send_fail_signal(job);
@@ -1637,6 +1914,7 @@ gboolean queue_job(void *data)
                break;
        case REQUEST_TYPE_DISABLE_PKG:
                __set_backend_busy(x);
+               __set_power_lock();
                ret = __process_disable_pkg(job);
                if (ret < 0)
                        _send_fail_signal(job);
@@ -1644,6 +1922,7 @@ gboolean queue_job(void *data)
                break;
        case REQUEST_TYPE_REGISTER_PKG_UPDATE_INFO:
                ret = __process_register_pkg_update_info(job);
+               __free_extra_info(job);
                _free_backend_job(job);
                break;
        case REQUEST_TYPE_UNREGISTER_PKG_UPDATE_INFO:
@@ -1676,11 +1955,13 @@ gboolean queue_job(void *data)
                break;
        case REQUEST_TYPE_CLEARDATA:
                __set_backend_busy(x);
+               __set_power_lock();
                ret = __process_cleardata(job);
                __post_process(ret, x, job);
                break;
        case REQUEST_TYPE_CLEARCACHE:
                __set_backend_busy(x);
+               __set_power_lock();
                ret = __process_clearcache(job);
                __post_process(ret, x, job);
                break;
@@ -1736,8 +2017,13 @@ gboolean queue_job(void *data)
                ret = __process_set_app_label(job);
                _free_backend_job(job);
                break;
+       case REQUEST_TYPE_SET_APP_ICON:
+               ret = __process_set_app_icon(job);
+               _free_backend_job(job);
+               break;
        case REQUEST_TYPE_MIGRATE_EXTERNAL_IMAGE:
                __set_backend_busy(x);
+               __set_power_lock();
                ret = __process_migrate_external_image(job);
                __post_process(ret, x, job);
                break;