char *pkgid;
} appinfo_t;
-struct ucred;
-
int _create_server_sock(void);
app_pkt_t *_recv_pkt_raw(int fd, int *clifd, struct ucred *cr);
appinfo_t *_appinfo_create(bundle *kb);
if (argv[0])
free(argv[0]);
snprintf(buf, sizeof(buf), "%s.exe", app_path);
- /* this code is added because core app don't have '.exe' excutable */
+ /* this code is added */
+ /* because core app don't have '.exe' excutable */
/* if '.exe' not exist then use app_path */
if (access(buf, F_OK) != 0)
argv[0] = strdup(app_path);
appid, appinfo->pkg_type, app_path);
ret = security_manager_prepare_app(appid);
if (ret != SECURITY_MANAGER_SUCCESS) {
- _E("Failed to set privileges "
+ _E("Failed to set privileges " \
"- check your package's credential: %d", ret);
return -1;
}
_D("lock up test log(no error): prepare exec - first done");
if (__prepare_exec(appid, app_path, appinfo, kb) < 0) {
- _E("preparing work fail to launch "
+ _E("preparing work fail to launch " \
"- can not launch %s", appid);
exit(-1);
}