Skip to content
Snippets Groups Projects
Commit 8b1d4520 authored by Jeff Sharkey's avatar Jeff Sharkey
Browse files

installd has moved on to Binder; goodbye socket!

After a series of recent commits, installd has fully migrated over
to Binder, and all socket-based communication has been removed.

Test: builds, boots, apps install fine, pre-OTA dexopt works
Bug: 13758960, 30944031
Change-Id: Ia67b6260de58240d057c99b1bbd782b44376dfb5
parent 3e8dbf01
No related branches found
No related tags found
No related merge requests found
...@@ -106,7 +106,6 @@ ...@@ -106,7 +106,6 @@
/dev/socket/dnsproxyd u:object_r:dnsproxyd_socket:s0 /dev/socket/dnsproxyd u:object_r:dnsproxyd_socket:s0
/dev/socket/dumpstate u:object_r:dumpstate_socket:s0 /dev/socket/dumpstate u:object_r:dumpstate_socket:s0
/dev/socket/fwmarkd u:object_r:fwmarkd_socket:s0 /dev/socket/fwmarkd u:object_r:fwmarkd_socket:s0
/dev/socket/installd u:object_r:installd_socket:s0
/dev/socket/lmkd u:object_r:lmkd_socket:s0 /dev/socket/lmkd u:object_r:lmkd_socket:s0
/dev/socket/logd u:object_r:logd_socket:s0 /dev/socket/logd u:object_r:logd_socket:s0
/dev/socket/logdr u:object_r:logdr_socket:s0 /dev/socket/logdr u:object_r:logdr_socket:s0
......
...@@ -334,7 +334,6 @@ neverallow appdomain socket_device:sock_file write; ...@@ -334,7 +334,6 @@ neverallow appdomain socket_device:sock_file write;
# Unix domain sockets. # Unix domain sockets.
neverallow appdomain adbd_socket:sock_file write; neverallow appdomain adbd_socket:sock_file write;
neverallow appdomain installd_socket:sock_file write;
neverallow { appdomain -radio } rild_socket:sock_file write; neverallow { appdomain -radio } rild_socket:sock_file write;
neverallow appdomain vold_socket:sock_file write; neverallow appdomain vold_socket:sock_file write;
neverallow appdomain zygote_socket:sock_file write; neverallow appdomain zygote_socket:sock_file write;
......
...@@ -217,7 +217,6 @@ type bluetooth_socket, file_type; ...@@ -217,7 +217,6 @@ type bluetooth_socket, file_type;
type dnsproxyd_socket, file_type, mlstrustedobject; type dnsproxyd_socket, file_type, mlstrustedobject;
type dumpstate_socket, file_type; type dumpstate_socket, file_type;
type fwmarkd_socket, file_type, mlstrustedobject; type fwmarkd_socket, file_type, mlstrustedobject;
type installd_socket, file_type;
type lmkd_socket, file_type; type lmkd_socket, file_type;
type logd_socket, file_type, mlstrustedobject; type logd_socket, file_type, mlstrustedobject;
type logdr_socket, file_type, mlstrustedobject; type logdr_socket, file_type, mlstrustedobject;
......
...@@ -131,7 +131,6 @@ allow system_server node:rawip_socket node_bind; ...@@ -131,7 +131,6 @@ allow system_server node:rawip_socket node_bind;
allow system_server self:tun_socket create_socket_perms_no_ioctl; allow system_server self:tun_socket create_socket_perms_no_ioctl;
# Talk to init and various daemons via sockets. # Talk to init and various daemons via sockets.
unix_socket_connect(system_server, installd, installd)
unix_socket_connect(system_server, lmkd, lmkd) unix_socket_connect(system_server, lmkd, lmkd)
unix_socket_connect(system_server, mtpd, mtp) unix_socket_connect(system_server, mtpd, mtp)
unix_socket_connect(system_server, netd, netd) unix_socket_connect(system_server, netd, netd)
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment