Consider globalapp uid when checking dpm prevent policy 70/173370/1 accepted/tizen/unified/20180323.134352 submit/tizen/20180322.071934 submit/tizen/20180323.044745
authorYunjin Lee <yunjin-.lee@samsung.com>
Wed, 21 Mar 2018 04:28:37 +0000 (13:28 +0900)
committerYunjin Lee <yunjin-.lee@samsung.com>
Wed, 21 Mar 2018 04:28:37 +0000 (13:28 +0900)
Change-Id: I715380f552ab48e4d1510cb2d6f77277c50ab91f
Signed-off-by: Yunjin Lee <yunjin-.lee@samsung.com>
capi/src/privilege_db_manager.c

index 8f5e2f7..90b5ee7 100755 (executable)
@@ -201,7 +201,7 @@ int privilege_db_manager_check_black_list(uid_t uid, privilege_manager_package_t
 
        char *privilege_list_str = NULL;
        ret = __make_privilege_list_str(privilege_list, &privilege_list_str);
-       char *sql = sqlite3_mprintf("select distinct privilege_name from prevent_list where privilege_name in(%s)and uid=%d and package_type=%d", privilege_list_str, uid, package_type);
+       char *sql = sqlite3_mprintf("select distinct privilege_name from prevent_list where privilege_name in(%s)and (uid=%d or uid=%d) and package_type=%d", privilege_list_str, uid, GLOBAL_USER, package_type);
        sqlite3_free(privilege_list_str);
        TryReturn(sql != NULL, __finalize_db(db, stmt, sql), PRIVILEGE_DB_MANAGER_ERR_INVALID_QUERY, "[DB_FAIL] sqlite3_mprintf failed");