- 10 Apr, 2013 1 commit
-
-
Ying Wang authored
Bug: 8580410 Change-Id: Icc2632b33153b01c0d9a15245b3f7e8c89b816ec
-
- 28 Mar, 2013 1 commit
-
-
Robert Greenwalt authored
-
- 21 Mar, 2013 1 commit
-
-
Robert Greenwalt authored
Plumb it in through binder calls between the external BT stack and the BluetoothTetheringDataTracker. bug:8445208 Change-Id: Ice7dfb0b50c9481d359aed14a51372878185171c
-
- 18 Mar, 2013 1 commit
-
-
JP Abgrall authored
And "interface list" doesn't accept the extra args anymore. Bug: 5327568 Change-Id: I3d2cb5d790b74a013edfc10dfe7a544e9e39f0ff
-
- 16 Mar, 2013 1 commit
-
-
JP Abgrall authored
It still silently accepts the extra argument. Bug: 5327568 Change-Id: I4ac1bdb0e2d33133b3d5dbe11f6f94d503a28d11
-
- 15 Mar, 2013 2 commits
-
-
JP Abgrall authored
[Adaptation from https://android-review.googlesource.com/#/c/50223 ] For NAT table, only the first packet of data flow hits the rules in this table. If forward is enabled before postrouting in NAT, packet may be forwarded without hit rules in NAT table. Phone will not get responses for such packets because source IP address is not translated. How to reproduce: 1) Enable usb tethering; 2) Start ping test on PC; 3) Disable data on Phone; 4) NAT is disabled since data service is lost; 5) Enable data on Phone; 6) Ping can not recover on PC; 7) Capture tcpdump data on phone, source IP Address is not translated for ICMP packets. Test result: Run steps 1-5 in "How to reproduce", Ping session on PC can be recovered after data is enabled. CQ00027191 Change-Id: I1c3bcbb3d69eb7e2f61d720fa17086ee0da22fa0
-
JP Abgrall authored
This will help when adding/removing commands. Change-Id: I154fb3d7064acddc3e067d60f225ecab6ea57ddb
-
- 11 Mar, 2013 5 commits
-
-
Jean-Baptiste Queru authored
am 63790dce: am 42b4c508: (-s ours) am 11ff695d: (-s ours) Reconcile with jb-mr1-release - do not merge * commit '63790dce':
-
Jean-Baptiste Queru authored
* commit '42b4c508':
-
Jean-Baptiste Queru authored
* commit '11ff695d':
-
Jean-Baptiste Queru authored
- 05 Mar, 2013 2 commits
-
-
Lorenzo Colitti authored
The default value of accept_ra causes the kernel to accept Router Advertisements only if forwarding is off. This causes problems with clatd, which uses IPv6 forwarding on a tun interface, and it may cause problems with IPv6 tethering when we implement it. Fix this by setting accept_ra to 2, which accepts RAs regardless of whether forwarding is on. Bug: 8276725 Change-Id: Ifee0ceaa68ce438a845fa2d7f3b76c60857114a0
-
Lorenzo Colitti authored
Bug: 8276725 Change-Id: Ia04fb64d3660eb08d8b32209bf689c5c5e6dd9ac
-
- 23 Feb, 2013 1 commit
-
-
Sasha Levitskiy authored
Change-Id: I6b113294b46e5988ad606144c3eef3c846ac28d1
-
- 22 Feb, 2013 1 commit
-
-
Nick Kralevich authored
Don't assume the client is telling the truth about their PID. Always take their PID directly from the socket, which is guaranteed by the kernel to be accurate. Change-Id: Id3374306fd7043da22065921bd49aced60df32f5
-
- 14 Feb, 2013 2 commits
-
-
JP Abgrall authored
* Long time ago, setting an alert in a costly_<iface> chain required adding it just before the ACCEPT rule that was at the end. But since then the ACCEPT rule has been removed. This would cause the insert to pick the last position no matter what. Now we just append. * A naughty app in the penalty box could waste up quota on packets that would get dropped in the later penalty_box rule. Now we check the penalty_box before feeding it to the quota. Change-Id: Id4b6a7c020583f1cccc7dccde34c4b85d0fd9642
-
JP Abgrall authored
The return code from android_fork_execvp() needed to be massaged because a status ptr was passed in. Bug: 8185095 Change-Id: I205884f09b563dd729423a74f22fd5b8c2d59c64
-
- 08 Feb, 2013 1 commit
-
-
Rom Lemarchand authored
Replace the system_nosh call with the android_fork_execvp from liblogwrap. Change-Id: Idfbc6bcf0bef16d4ee90d6af6bd4b07bc79913bb
-
- 07 Feb, 2013 5 commits
-
-
Rom Lemarchand authored
Using the android_fork_exec call from liblogwrap rather than a custom fork_and_execve. Change-Id: If8f9a5442e5e3cfc887010268c360e55e733aef0
-
JP Abgrall authored
-
Robert Greenwalt authored
-
Mattias Falk authored
support for attach/detach a process (pid) to a dns cache. lookup associated dns cache based on the pid handle pid and interface argument for getaddrinfo and gethostbyaddress bug:5465296 Change-Id: I4832c792d22aceabb0481c548003a1fd879c12e4
-
JP Abgrall authored
In the past, loopback interfaces were of no use for bandwidth/datausage. We now don't treat loopback interfaces any differently. This will helps with CTS tests that checking the kernel's qtaguid functionality and the matching user-space handling. Change-Id: If307ceebc10f89269d1b051f666ec666e5e38d41
-
- 31 Jan, 2013 2 commits
-
-
Rom Lemarchand authored
-
Rom Lemarchand authored
Use liblogwrap to provide logwrapper functionality instead of using netd's own implementation. Change-Id: I10e69aa95989f77c63b5b36825ee7c77fba48c88
-
- 19 Jan, 2013 2 commits
-
-
Robert Greenwalt authored
-
Robert Greenwalt authored
This reverts commit 1c0a243b Change-Id: I63d563df01b4bdc69a11037b1d72fdb4de5437db
-
- 17 Jan, 2013 1 commit
-
-
Robert Greenwalt authored
-
- 15 Jan, 2013 1 commit
-
-
Sasha Levitskiy authored
Change-Id: I1a3c0e1a8690d0d5a8fb1411c49bc6db52ce5ccb
-
- 14 Jan, 2013 5 commits
-
-
Robert Greenwalt authored
* commit '3911886e': Fix a TOCTOU and symlink attack in netd.
-
Robert Greenwalt authored
* commit 'd67cc366': Fix a TOCTOU and symlink attack in netd.
-
Robert Greenwalt authored
Change-Id: I0cef2141487ffd2cb5694a10e4077c299d9d7df7
-
Robert Greenwalt authored
Change-Id: Id5b6598b20f34b5e8d2c90927d2acfae7237e69b
-
Robert Greenwalt authored
* commit '43682d94': Fix a TOCTOU and symlink attack in netd.
-
- 11 Jan, 2013 2 commits
-
-
Mattias Falk authored
support for attach/detach a process (pid) to a dns cache. lookup associated dns cache based on the pid handle pid and interface argument for getaddrinfo and gethostbyaddress Change-Id: I325788973ad76beb1ada8f5fa6f52f9a94c08dd1 bug:5465296
-
Sasha Levitskiy authored
- Added error code propagation - Added more elaborate error messages - Added stricter parameter checking in softap fwreload - Cleaned up class signatures - Removed a non-working default AP in setSoftap - Removed obsolete functions: - int addParam(int pos, const char *cmd, const char *arg); - int setCommand(char *iface, const char *fname, unsigned buflen=0); - Removed unused "softap clients" functionality - Removed unused hostapd communication socket Change-Id: Iad05069f6547f4b17481991018707d5f9db2500a Signed-off-by:
Alexander Levitskiy <sanek@google.com>
-
- 15 Dec, 2012 1 commit
-
-
Robert Greenwalt authored
This lets it filter the dns requests so we're not a public dns forwarder/spambot. bug:7530468 Change-Id: I102fad738aff717e6ac40d4ac5a8d39a6fe2d2ca
-
- 30 Nov, 2012 1 commit
-
-
Robert Greenwalt authored
Bug: 7530471 Change-Id: I3b0a38a203bdeba6c492a54fded056a16992e34e
-
- 29 Nov, 2012 1 commit
-
-
Robert Greenwalt authored
* commit '80436522': Fix a TOCTOU and symlink attack in netd.
-