pid_t pid = fork();
RUNNER_ASSERT_ERRNO_MSG(pid >= 0, "Fork failed");
if (pid == 0) {
- synchPipe.claimParentEp();
+ synchPipe.claimChildEp();
RUNNER_ASSERT_ERRNO_MSG(setLauncherSecurityAttributes(tmpUser) == 0, "launcher failed");
Api::prepareAppCandidate();
Api::prepareApp(app.getAppId());
exit(0);
} else {
- synchPipe.claimChildEp();
+ synchPipe.claimParentEp();
synchPipe.wait();
std::string appBindPath = std::string("/var/run/user/") + tmpUser.getUidString()
pid_t pid = fork();
RUNNER_ASSERT_ERRNO_MSG(pid >= 0, "Fork failed");
if (pid == 0) {
- synchPipe.claimParentEp();
+ synchPipe.claimChildEp();
RUNNER_ASSERT_ERRNO_MSG(setLauncherSecurityAttributes(tmpUser) == 0, "launcher failed");
Api::prepareAppCandidate();
Api::prepareApp(app.getAppId());
exit(0);
} else {
- synchPipe.claimChildEp();
+ synchPipe.claimParentEp();
synchPipe.wait();
bool result = isPathBound(ACCESS_DENIED_DIR_PATH, EXTERNAL_STORAGE_DIR_PATH, pid);
pid_t pid = fork();
RUNNER_ASSERT_ERRNO_MSG(pid >= 0, "Fork failed");
if (pid == 0) {
- synchPipe.claimParentEp();
+ synchPipe.claimChildEp();
RUNNER_ASSERT_ERRNO_MSG(setLauncherSecurityAttributes(tmpUser) == 0, "launcher failed");
Api::prepareAppCandidate();
Api::prepareApp(app.getAppId());
exit(0);
} else {
- synchPipe.claimChildEp();
+ synchPipe.claimParentEp();
synchPipe.wait();
bool result = isPathBound(ACCESS_DENIED_DIR_PATH, EXTERNAL_STORAGE_DIR_PATH, pid);
pid_t pid = fork();
RUNNER_ASSERT_ERRNO_MSG(pid >= 0, "Fork failed");
if (pid == 0) {
- synchPipe.claimParentEp();
+ synchPipe.claimChildEp();
try {
RUNNER_ASSERT_ERRNO_MSG(setLauncherSecurityAttributes(tmpUser) == 0, "launcher failed");
Api::prepareAppCandidate();
synchPipe.post();
exit(0);
} else {
- synchPipe.claimChildEp();
+ synchPipe.claimParentEp();
synchPipe.wait();
PolicyRequest policyRequest;