1. 16 Mar, 2015 5 commits
  2. 15 Mar, 2015 1 commit
  3. 14 Mar, 2015 2 commits
  4. 13 Mar, 2015 1 commit
  5. 10 Mar, 2015 3 commits
  6. 05 Mar, 2015 1 commit
  7. 27 Feb, 2015 3 commits
    • Lorenzo Colitti's avatar
      Add oif rules that allow UID 0 to bypass the VPN. · 57947f02
      Lorenzo Colitti authored
      This is needed for wifi calling so that the kernel (which does
      not set marks) can tee packets towards the modem. It also fixes
      things like not being able to reply to DHCP requests from
      tethered clients when a VPN is up.
      
      System apps can already bypass the VPN using explicit marks, so
      allowing UID 0 to do so does not create additional bypass VPN
      issues.
      
      Bug: 19500693
      Change-Id: Ie324026893637e9bd8e7aa65a37579569390e7b7
      57947f02
    • Lorenzo Colitti's avatar
      Separate NAT from forwarding. · 32d76879
      Lorenzo Colitti authored
      Bug: 19500693
      
      Change-Id: Ib3871106ea3c0d68327611e7568c0710210e4ff2
      32d76879
    • Lorenzo Colitti's avatar
      Make the VPN rule only to originated, not forwarded, traffic. · 5ad4e98f
      Lorenzo Colitti authored
      Currently the VPN rule for the primary user will match every
      forwarded packet on the system, because it specifies a UID range
      that includes 0, and forwarded packets have UID 0.
      
      Use "iif lo" to limit the rule match to locally-originated
      traffic. This requires a kernel that sets the loopback ifindex.
      when originating packets. Anything based on 3.10 is fine, but
      devices using 3.4 will need a one-line change for IPv6.
      
      Bug: 19500693
      Change-Id: Iaab88bed62716dc1cea33b45c4e258f6b3bfc9d0
      5ad4e98f
  8. 25 Feb, 2015 2 commits
  9. 12 Feb, 2015 3 commits
  10. 11 Feb, 2015 1 commit
  11. 04 Feb, 2015 3 commits
  12. 03 Feb, 2015 10 commits
  13. 02 Feb, 2015 1 commit
    • Alex Klyubin's avatar
      Store MARK/CONNMARK flags in a central location. · fe909983
      Alex Klyubin authored
      MARK/CONNMARK values/tags are shared accross all controllers because
      of the way the firewall works. To avoid accidental clashes, it's best
      to store the values used in a central place.
      
      Change-Id: I76aaba38cba6554704a5635b1e7297a144e6e2ff
      fe909983
  14. 31 Jan, 2015 2 commits
    • Nick Kralevich's avatar
      Merge "Avoid leaking file descriptors" · 6c08cd6a
      Nick Kralevich authored
      6c08cd6a
    • Nick Kralevich's avatar
      Avoid leaking file descriptors · 53ea9cad
      Nick Kralevich authored
      Add O_CLOEXEC on open() calls, and SOCK_CLOEXEC on socket calls.
      This avoids leaking file descriptors across execs.
      
      Addresses the following SELinux denial:
      
        audit(1422740213.283:8): avc: denied { read write } for pid=2597 comm="clatd" path="socket:[6709]" dev="sockfs" ino=6709 scontext=u:r:clatd:s0 tcontext=u:r:netd:s0 tclass=netlink_socket
      
      and allows the removal of some other SELinux rules which were
      inappropriately added because of leaking file descriptors.
      
      Change-Id: I9c180488ea1969d610e488f967a7276a672bb477
      53ea9cad
  15. 29 Jan, 2015 2 commits