1. 03 Jul, 2013 3 commits
    • JP Abgrall's avatar
      BandwidthController: allow UID 0 as a "special uid" · af476f7b
      JP Abgrall authored
      The happy box needs to be able to let UID 0 (dhcp, ...) pass through.
      
      Bug: 6212480
      Change-Id: I9867b7db4e5ad71cfb1170659d2d6a14ca9590be
      af476f7b
    • JP Abgrall's avatar
      BandwidthController: add support for "nice apps" and the "happy box" · e4788739
      JP Abgrall authored
      * ndc bandwidth happybox (enable | disable)
       - enable
        . creates a an empty happy_box chain which rejects all traffic from all UIDs by default.
        . Uses the penalty_box as a hook. Any costly_interface automatically  gets the happy_box as it has a penalty_box.
        . any app UID not in the happy_box will be treated as if it was in the penalty_box (i.e. addnaughtyapps)
        . penalty_box (addnaughtyapps) still applies.
       - disable
        . removes the happy box.
      * ndc bandwidth addniceapps <appUid> ...
       - similar to addnaughtyapps, but for the happy_box
      * ndc bandwidth removeniceapps <appUid> ...
       - similar to removenaughtyapps, but for the happy_box
      
      Bug: 6212480
      Change-Id: I1f10e8c6fa1b230c7b3bb070d88508e437589705
      e4788739
    • JP Abgrall's avatar
      BandwidthController: switch to generic handling for naughty apps. · a9ba4cba
      JP Abgrall authored
      Rename some stuff in preparation for nice apps and the "happy box".
      
      Bug: 6212480
      Change-Id: I637c4283695ac619533999beab4f88968580d2e4
      a9ba4cba
  2. 29 Jun, 2013 1 commit
    • JP Abgrall's avatar
      BandwidthController: reject with port-unreachable to prevent TCP retries. · 340d5ccf
      JP Abgrall authored
      Currently the bandwidth controller will cut off traffic via an ICMP
      destination unreachable message with code "administratively prohibited".
      TCP's RFC1122 does not explicitly say what to do with it, but it does say
      to abort the transmission when "port-unreachable" is seen.
      
      Some servers keep on retrying with the "prohibited" ICMP message which
      keeps the radio longer awake as more packets come in.
      
      Bug: 9150002
      Change-Id: I6eb1c3ae41c3890f26581a4b7464821b7ffb85f4
      340d5ccf
  3. 25 Jun, 2013 1 commit
    • JP Abgrall's avatar
      netd: tethering stats: persistent + list-all support · baeccc45
      JP Abgrall authored
      * Persistent stats
      Previously we would parse the iptables counters out of the FORWARD
      rules used for tethering. Those rules could come an go before they
      were parsed, which would cause us to incorrectly count traffic.
      Now we have separate counting rules (and quota2 counters) which
      persist beyond tethering.
      
      * Rename the iface0/iface1
      Match NatControllers notions for tethering ifaces during enable.
      Detect weird call from userspace (until b/9565268 gets fixed),
      or else it leaves an ugly iptables state.
      
      * The commands affected:
       - ndc bandwidth gettetheringstats intIface extIface
        . no change from before: return a single stats line
       - ndc bandwidth gettetheringstats
        . return a list of results showing all tethered stats
       - ndc bandwidth gettetheringstats "" extIface
       - ndc bandwidth gettetheringstats intIface
         . return a list of results matching the tethering on
           the given interface.
      
      Bug: 9565268
      Bug: 5868832
      Change-Id: I8559d9a184abcffaf65998fb3cc8c9c50d46bf06
      baeccc45
  4. 20 Jun, 2013 9 commits
  5. 12 Jun, 2013 2 commits
  6. 11 Jun, 2013 2 commits
  7. 10 Jun, 2013 5 commits
  8. 07 Jun, 2013 3 commits
    • Chad Brubaker's avatar
      Add netd support for marked packet forwarding · 7a6ce4be
      Chad Brubaker authored
      Add binds in netd for setting up fwmark rules to be used with the per
      uid marking to do per uid routing.
      
      Change-Id: Id4f315dd1aec73f074e233c2e3f70eb24b4c537a
      7a6ce4be
    • Chad Brubaker's avatar
      Add netd binds for UID based routing · 9a50889a
      Chad Brubaker authored
      Add methods for add per uid mark rules to push all traffic from specific
      uids to specific interfaces.
      Allows for per uid routing for per uid VPNs.
      
      Change-Id: I8492c668e2c96010b0f74ea7e367f0b4471238ad
      9a50889a
    • Chad Brubaker's avatar
      Update DnsProxy to use resolv's uid->interface map · 3acdb064
      Chad Brubaker authored
      If a proccess does not have an interface associated with its pid it will
      check if there is one associated with its uid before falling back to
      using the default interface.
      
      Change-Id: Ife732aa5ae6c3f79ea9ec1e3a63ef8877ad3d494
      3acdb064
  9. 17 Apr, 2013 1 commit
  10. 16 Apr, 2013 1 commit
  11. 14 Apr, 2013 2 commits
    • Jeff Johnson's avatar
      am d5b19ca2: Enable 802.11g hardware mode in hostapd.conf · 30a74c24
      Jeff Johnson authored
      * commit 'd5b19ca2':
        Enable 802.11g hardware mode in hostapd.conf
      30a74c24
    • Jeff Johnson's avatar
      Enable 802.11g hardware mode in hostapd.conf · d5b19ca2
      Jeff Johnson authored
      The current hostapd.conf generated by SoftapController does not
      contain a hw_mode setting.  As a result hostapd defaults to 802.11b
      mode.  This mode is inconsistent with the setting "ieee80211n=1" and
      prevents hostapd from using 802.11g/n rates.  Add "hw_mode=g" to the
      generated hostapd.conf to allow 802.11g/n rates to be advertised and
      used.
      
      Change-Id: Ifd66da3f3ffdfffb7c28e751d20bc432e070b2c3
      d5b19ca2
  12. 12 Apr, 2013 2 commits
    • Lorenzo Colitti's avatar
      am 37f2e371: Set accept_ra to 2 on all interfaces · d673d5ab
      Lorenzo Colitti authored
      * commit '37f2e371':
        Set accept_ra to 2 on all interfaces
      d673d5ab
    • Lorenzo Colitti's avatar
      Set accept_ra to 2 on all interfaces · 37f2e371
      Lorenzo Colitti authored
      Currently, we set accept_ra to 2 (accept RAs even if forwarding
      is on) only on wifi and ethernet, but not on other interfaces
      like mobile.  This breaks IPv6 over mobile on Nexus 7 3G and
      all other devices where the IPv6 default route is configured via
      RA, because as soon as we start 464xlat (which enables
      forwarding) their default route goes away.
      
      Rather than require all manufacturers to update their RILs to
      set the flag themselves, set it ourselves at netd startup time.
      
      Bug: 8276725
      Change-Id: If066bb1aa3ff211da0a0bbe8d58d5a7f35298580
      37f2e371
  13. 10 Apr, 2013 2 commits
  14. 28 Mar, 2013 2 commits
  15. 21 Mar, 2013 1 commit
  16. 18 Mar, 2013 2 commits
  17. 17 Mar, 2013 1 commit