- 16 Mar, 2015 5 commits
-
-
Nicolas Geoffray authored
Change-Id: Ieb26ec5fc333743b86d414ee558c978334647853
-
Nicolas Geoffray authored
Change-Id: I2aa9721365e96c363648dd8e9e15718ed50e3c12
-
Nicolas Geoffray authored
-
Nicolas Geoffray authored
Breaks internal master. This reverts commit b67219a7. Change-Id: I43145f0724ad2d669b65d20b6fd6ccc44b8f0a4f
-
Vinit Deshpande authored
Change-Id: I51337014e2851f47dd5e183c4bfdf39bafa59942
-
- 15 Mar, 2015 1 commit
-
-
Dan Albert authored
* commit 'e3734499': Update for libbase.
-
- 14 Mar, 2015 2 commits
-
-
Dan Albert authored
-
Dan Albert authored
StringPrintf and the string based file I/O are being moved to libbase. Change-Id: I765d9e53f65a76d318d9d0d9503403fc092254d5
-
- 13 Mar, 2015 1 commit
-
-
Jeff Sharkey authored
Change-Id: Ibb6101c8741f862f4732fb200f646dfd329f4782
-
- 10 Mar, 2015 3 commits
-
-
Vinit Deshpande authored
merged from partner/m-wireless-wifi-dev 6c65afdd Parse all netids with stringToNetId.
-
Vinit Deshpande authored
merged from partner/m-wireless-wifi-dev 2f8e725e server: softap: Set hw_mode according to selected channel [DO NOT MERGE]
-
Vinit Deshpande authored
merged from partner/m-wireless-wifi-dev 1ecc6c93 set softAP on a specified band, including both 2.4 and 5 GHz band
-
- 05 Mar, 2015 1 commit
-
-
Lorenzo Colitti authored
Bug: 19500693 Change-Id: I25b7942784ec026d30c60273c9e13e34d082d25a
-
- 27 Feb, 2015 3 commits
-
-
Lorenzo Colitti authored
This is needed for wifi calling so that the kernel (which does not set marks) can tee packets towards the modem. It also fixes things like not being able to reply to DHCP requests from tethered clients when a VPN is up. System apps can already bypass the VPN using explicit marks, so allowing UID 0 to do so does not create additional bypass VPN issues. Bug: 19500693 Change-Id: Ie324026893637e9bd8e7aa65a37579569390e7b7
-
Lorenzo Colitti authored
Bug: 19500693 Change-Id: Ib3871106ea3c0d68327611e7568c0710210e4ff2
-
Lorenzo Colitti authored
Currently the VPN rule for the primary user will match every forwarded packet on the system, because it specifies a UID range that includes 0, and forwarded packets have UID 0. Use "iif lo" to limit the rule match to locally-originated traffic. This requires a kernel that sets the loopback ifindex. when originating packets. Anything based on 3.10 is fine, but devices using 3.4 will need a one-line change for IPv6. Bug: 19500693 Change-Id: Iaab88bed62716dc1cea33b45c4e258f6b3bfc9d0
-
- 25 Feb, 2015 2 commits
-
-
Lorenzo Colitti authored
Bug: 19500693 Change-Id: Ic25f2d8c481f1528e887e43ca3fa868189582110
-
Lorenzo Colitti authored
1. Support multiple forwarding requests. Keep track of all requests inside TetherController, and enable system forwarding any time there is more than one active request. 2. Enable both IPv4 and IPv6 forwarding. Bug: 19500693 Change-Id: Ic81bae7b399bc6ebf6a63de4bcd341885638dfa4
-
- 12 Feb, 2015 3 commits
-
-
Alex Klyubin authored
* commit '909757cf': Store MARK/CONNMARK flags in a central location.
-
Elliott Hughes authored
Change-Id: Ie6348e38e90e48ffe115e63e5fde16640e2c3d92
-
Alex Klyubin authored
* commit '7a269cb3': Store MARK/CONNMARK flags in a central location.
-
- 11 Feb, 2015 1 commit
-
-
Alex Klyubin authored
-
- 04 Feb, 2015 3 commits
-
-
Elliott Hughes authored
* commit 'f48d6abf': Switch writing to <utils/file.h>.
-
Elliott Hughes authored
-
Elliott Hughes authored
Change-Id: Idb2de24414f4dd8e926e625b62e4d12152dc4527
-
- 03 Feb, 2015 10 commits
-
-
Elliott Hughes authored
* commit 'a0b6b3a6': Use StringPrintf.
-
Elliott Hughes authored
* commit '50c6639a': Use StringPrintf.
-
Elliott Hughes authored
-
Elliott Hughes authored
This doesn't replace every asprintf in netd, but it replaces the ones in code I touched. Change-Id: I2de5c7772523372bb36145e66e885aa8132ad58e
-
Elliott Hughes authored
* commit '561ad8c1': Switch netd over to <utils/file.h>.
-
Nick Kralevich authored
* commit '69766c22': Avoid leaking file descriptors
-
Elliott Hughes authored
Change-Id: I8f4c9ae0d13d30e69b7a197eafdfcb9b2b9050c0
-
Nick Kralevich authored
* commit '6c08cd6a': Avoid leaking file descriptors
-
Elliott Hughes authored
-
Elliott Hughes authored
Change-Id: Id79961cc4feee1c307dad06d64e3f4ffe060c4da
-
- 02 Feb, 2015 1 commit
-
-
Alex Klyubin authored
MARK/CONNMARK values/tags are shared accross all controllers because of the way the firewall works. To avoid accidental clashes, it's best to store the values used in a central place. Change-Id: I76aaba38cba6554704a5635b1e7297a144e6e2ff
-
- 31 Jan, 2015 2 commits
-
-
Nick Kralevich authored
-
Nick Kralevich authored
Add O_CLOEXEC on open() calls, and SOCK_CLOEXEC on socket calls. This avoids leaking file descriptors across execs. Addresses the following SELinux denial: audit(1422740213.283:8): avc: denied { read write } for pid=2597 comm="clatd" path="socket:[6709]" dev="sockfs" ino=6709 scontext=u:r:clatd:s0 tcontext=u:r:netd:s0 tclass=netlink_socket and allows the removal of some other SELinux rules which were inappropriately added because of leaking file descriptors. Change-Id: I9c180488ea1969d610e488f967a7276a672bb477
-
- 29 Jan, 2015 2 commits
-
-
Lorenzo Colitti authored
* commit '623e69e6': Don't fail when trying to add routes that already exist.
-
Lorenzo Colitti authored
* commit 'aea68fdd': Don't fail when trying to add routes that already exist.
-