- 02 Mar, 2016 1 commit
-
-
Lorenzo Colitti authored
Also add a binder_test that exercises binder RPCs to the real netd service running on the device Bug: 21725996 Bug: 27239233 Change-Id: Ic83d81605021a0578d6cd32f889290be61d76125
-
- 26 Feb, 2016 1 commit
-
-
Lorenzo Colitti authored
FirewallController is stateless and FirewallCmd does not access any other controllers, so it is safe not to take the big netd lock. Bug: 27239233 Change-Id: I246696c4b17fa005c7d6b38ecd627747aa608831
-
- 25 Feb, 2016 3 commits
-
-
Lorenzo Colitti authored
Change-Id: Ibdda590b828c61caa488e959f3e596dc981a2c65
-
Pierre Imai authored
Change-Id: Icd89045c7099949ea66bd88b2ce5551301366640
-
Pierre Imai authored
Change-Id: Icb76b43e89c5a9e5806b95002d3653dd99912494
-
- 23 Feb, 2016 2 commits
-
-
Lorenzo Colitti authored
Bug: 27239233 Change-Id: I34a5554604e6d8b8a50838c6911c28503cbf4540
-
Lorenzo Colitti authored
In this change: 1. AIDL files for a new, android.net.INetd service, and corresponding implementation using generated code. For now the interface is just a prototype: it only has one trivial method. 2. Permission checking code to check for CONNECTIVITY_INTERNAL. 3. Add a Big Netd Lock and provide a wrapper that makes it easy to ensure that it is taken by every CommandListener command. Bug: 27239233 Change-Id: I448d0ac233edd0e351a7fe7f13901fb6871683a2
-
- 18 Feb, 2016 1 commit
-
-
Pierre Imai authored
Change-Id: I92466868ae32ee67fb5d17c7758a7841f614e827
-
- 17 Feb, 2016 2 commits
-
-
Lorenzo Colitti authored
-
Lorenzo Colitti authored
Bug: 26976388 Change-Id: I1965ece8ae65d78323b5a49eeebefe29677be63f
-
- 16 Feb, 2016 2 commits
-
-
Erik Kline authored
am: 397fbc05 * commit '397fbc05': Switch to ifc_add_address() for setcfg
-
Erik Kline authored
This avoids the issue where, for example, 10.0.0.1/8 is added first, then 10.0.0.1/8 is deleted, and 10.0.0.1/24 is added. Netlink changes observed at the wrong time would make it seem as though IPv4 had been lost when in fact everthing was fine. Bug: 26991160 (cherry picked from commit 397fbc05) Change-Id: Ia5a5fcdd01e0950ac099c2054d74f0c52aa20b9c
-
- 15 Feb, 2016 1 commit
-
-
Lorenzo Colitti authored
This gives netd the ability to close sockets on a particular source IP address using SOCK_DESTROY. It does not yet enable this behaviour. The microbenchmark is able to close 500 IPv6 sockets in ~30ms on my angler. Specifically: - Scanning 500 socketpairs: ~5ms - Scanning 500 socketpairs and killing one half of each: ~30ms - Scanning 500 socketpairs and killing both halves of each: ~40ms This is about ~2.5x-3.5x slower than SIOCKILLADDR: - For 500 sockets, it's 9.5ms vs. 22.9ms. - For 4000 sockets, it's ~40ms vs ~135ms. A large part of that is due to sending RST packets, which SIOCKILLADDR does not do. If the kernel is modified so that SOCK_DESTROY does not send RSTs, the time taken to kill 4000 sockets goes down to ~70ms Batching the destroy operations does not help much. It saves 5-10%, but it complicates error handling. Bug: 26976388 Change-Id: I2e1ac30af5dbcdb98dbb7c6e4d4d67c55b9fd00f
-
- 10 Feb, 2016 1 commit
-
-
Erik Kline authored
This avoids the issue where, for example, 10.0.0.1/8 is added first, then 10.0.0.1/8 is deleted, and 10.0.0.1/24 is added. Netlink changes observed at the wrong time would make it seem as though IPv4 had been lost when in fact everthing was fine. Bug: 26991160 Change-Id: If0dad2993f818686ef8a99618e779813e9c7af90
-
- 05 Jan, 2016 2 commits
-
-
Erik Kline authored
-
Erik Kline authored
This reverts commit f1dfabed. The 3.4 kernel does not have SO_REUSEPORT functionality but the headers #define it, so dnsmasq tries to use it and setsockopt duly fails. This is not a problem on 3.10 and later kernels, but reverting anyway. Bug: 9580643 Bug: 26301652 Change-Id: I2322a80caa76ee4b7bb290f1665081b17d86fd43
-
- 24 Dec, 2015 1 commit
-
- 17 Dec, 2015 1 commit
-
-
Erik Kline authored
-
- 05 Dec, 2015 1 commit
-
-
Elliott Hughes authored
am: 569ec058 * commit '569ec058': Track rename from base/ to android-base/.
-
- 04 Dec, 2015 3 commits
-
-
Elliott Hughes authored
am: c4f60ec9 * commit 'c4f60ec9': Track rename from base/ to android-base/.
-
Elliott Hughes authored
-
Elliott Hughes authored
Change-Id: Ice6d43c0f9b16b8fb441158a0f7344dfbf969dea
-
- 25 Nov, 2015 1 commit
-
-
Lorenzo Colitti authored
Bug: 9580643 Change-Id: Id086ff9194097fc1e0ab8e2e58e6ff843303f051
-
- 20 Nov, 2015 2 commits
-
- 19 Nov, 2015 4 commits
-
-
Sreeram Ramachandran authored
am: a8c46019 * commit 'a8c46019': Don't use framework permission strings for netd permissions.
-
Sreeram Ramachandran authored
am: 3b61825a * commit '3b61825a': Don't use framework permission strings for netd permissions.
-
Sreeram Ramachandran authored
am: 5c8c42e9 * commit '5c8c42e9': Don't use framework permission strings for netd permissions.
- 18 Nov, 2015 1 commit
-
-
Sreeram Ramachandran authored
These framework permission strings were being used as arbitrary labels that mapped to netd permissions that have completely different meaning. This leads to confusion, so use different strings. This is being cherry picked from lmp-mr1-dev to lmp-dev to fix failures when creating restricted networks due to prior back-port a120442. Bug: 21900139 Bug: 18194858 Change-Id: Ib3ec377ab26ce904d3d4678f04edec6cb1260517 (cherry picked from commit 584dbee5)
-
- 13 Nov, 2015 3 commits
-
-
Erik Kline authored
Bug: 9580643 Change-Id: I8c95c15970d6ed72dc44cec42c4eb78e18ed46ba
-
Erik Kline authored
Additionally, store and return a list of strings for DNS forwarders, since that's what is most useful. These strings are guaranteed to be valid IP string literals by virtue of validation on input. Bug: 9580643 Change-Id: I4fbaf19835055b12e38d585c0bfba0d2b18b9717
-
Erik Kline authored
Heretofore netd issued commands to dnsmasq over a stdin channel using ":" as an argument separator. This make it very complicated to issue commands that involve IPv6 addresses. This changes the separator from ":" to "|". Additionally: - Pass DHCP range string literals through to startTethering(), still performing string literal to IPv4 address validation. Bug: 9580643 Change-Id: I210daf311a4c3d84dae3ed054b92c9fa399a791f
-
- 05 Nov, 2015 3 commits
-
-
Kenny Root authored
am: b407c9b3 * commit 'b407c9b3': system/netd: check return value of PKCS5_PBKDF2_HMAC_SHA1.
-
Kenny Root authored
-
Adam Langley authored
The function PKCS5_PBKDF2_HMAC_SHA1 can fail for a number of reasons and thus its return value should be checked and handled. Change-Id: I63bd1378e78926372309072c3fa821666cac1b01
-
- 02 Nov, 2015 4 commits
-
-
Gaurav Shah authored
am: 8a55a1b0 * commit '8a55a1b0': netd: Add NOTICE and MODULE_LICENSE_* files
-
Gaurav Shah authored
am: 04c820c5 * commit '04c820c5': netd: Add NOTICE and MODULE_LICENSE_* files
-
Gaurav Shah authored
-
Gaurav Shah authored
BUG: 24605215 Change-Id: Ice2df1dcaca7af089e6228c4bbf5b5b285b51622
-