- 22 Nov, 2013 1 commit
-
-
The Android Open Source Project authored
Change-Id: If9a70bdfa24a37bab6980194af6fa4f73d9f4bd1
-
- 20 Nov, 2013 10 commits
-
-
Lorenzo Colitti authored
-
Lorenzo Colitti authored
-
Lorenzo Colitti authored
-
Lorenzo Colitti authored
-
Lorenzo Colitti authored
-
Lorenzo Colitti authored
[Cherry-pick of 12acae8d] Bug: 9180552 Change-Id: Id2485b35c2299cfc455dd2b3b725136e5eb2a7e4
-
Lorenzo Colitti authored
1. Factor most of the notification code out to a common function. 2. Use vasprintf instead of snprintf so we don't have to worry about clipping notifications due to fixed-size message buffers. [Cherry-pick of 0b454ea4] Bug: 9180552 Change-Id: Idde16ee6dd56d38dab866f0ea678b04d98b3048d
-
Lorenzo Colitti authored
When opening the netlink socket, NetlinkManager specifies it's interested in ND_USEROPT messages, but we since we don't have code to parse them yet, we end up logging an error message for packets that contain them. Get rid of the logspam by not asking the kernel to receive them. [Cherry-pick of a95f8a34] Bug: 10718651 Change-Id: Ib1b7748448a983cfa7bb7725e48e238d85152ea2
-
Lorenzo Colitti authored
The change to enable address tracking via netlink incorrectly changed the subsystem of rtnetlink events from "net" to "interface". This broke interface add/delete notifications, which come from the kernel with subsystem "net". Switch back to "net" and deal with address tracking via new action codes instead of a new subsystem. [Cherry-pick of 4da12db2] Bug: 10433320 Change-Id: I59a50e9c7cb49f46e680c7d84ac8e196a861ca4b
-
Lorenzo Colitti authored
Subscribe netd's netlink socket to listen to IPv4 and IPv6 address changes (and ND opts, which we'll need for IPv6 DNS later), and make NetlinkHandler notify the system of address changes. [Cherry-pick of 9b3cd763] Bug: 10232006 Change-Id: Ib9dfd58635dce389980d8ee9529a17661a02320a
-
- 08 Oct, 2013 1 commit
-
-
Ed Heyl authored
-
- 24 Sep, 2013 1 commit
-
-
Robert Greenwalt authored
A split-tunnel vpn shouldn't snarf all dns queries if it's not going to provide dns servers to service them. bug:10115444 Change-Id: I4f8de66b75a04ca0e274edb92ace7acee762bca2
-
- 16 Sep, 2013 1 commit
-
-
The Android Automerger authored
-
- 12 Sep, 2013 1 commit
-
-
Lorenzo Colitti authored
When opening the netlink socket, NetlinkManager specifies it's interested in ND_USEROPT messages, but we since we don't have code to parse them yet, we end up logging an error message for packets that contain them. Get rid of the logspam by not asking the kernel to receive them. Bug: 10718651 Change-Id: Ib1b7748448a983cfa7bb7725e48e238d85152ea2
-
- 11 Sep, 2013 1 commit
-
-
Jeff Sharkey authored
When a device first boots, there won't be any tethering stats, which isn't an error. Continue checking for partial results. Bug: 5868832 Change-Id: Ic432f5f159320da9886d85c2525fa2cde8c67750
-
- 02 Sep, 2013 1 commit
-
-
Lorenzo Colitti authored
The change to enable address tracking via netlink incorrectly changed the subsystem of rtnetlink events from "net" to "interface". This broke interface add/delete notifications, which come from the kernel with subsystem "net". Switch back to "net" and deal with address tracking via new action codes instead of a new subsystem. Bug: 10433320 Change-Id: I59a50e9c7cb49f46e680c7d84ac8e196a861ca4b
-
- 26 Aug, 2013 1 commit
-
-
JP Abgrall authored
Some of the bw_costly_<iface> rules would not get correctly flushed and cleared on netd re-start, which would cause a failure when trying to setup the bw_penalty_box as bw_costly_<iface> would reference it. The resulting symptom would be that bandwidth could not be re-enabled. Bug: 10183445 Change-Id: I79a8a73ae52e18b3bff8a58e47ac1aea2454ae63
-
- 09 Aug, 2013 1 commit
-
-
Lorenzo Colitti authored
Subscribe netd's netlink socket to listen to IPv4 and IPv6 address changes (and ND opts, which we'll need for IPv6 DNS later), and make NetlinkHandler notify the system of address changes. Bug: 10232006 Change-Id: Ib9dfd58635dce389980d8ee9529a17661a02320a
-
- 01 Aug, 2013 2 commits
-
-
Robert Greenwalt authored
* commit 'bca84afd': Incorrect memset parameters
-
Robert Greenwalt authored
-
- 31 Jul, 2013 1 commit
-
-
Edward Savage-Jones authored
Memset parameters swapped Change-Id: I528c1f6de344447d3c43d89c1dd4cd87e1c5c5a7
-
- 23 Jul, 2013 1 commit
-
-
Geremy Condra authored
-
- 22 Jul, 2013 1 commit
-
-
Chad Brubaker authored
Host exemption now properly handles routing for sockets that were already marked Change-Id: I55d5c00754036a5ef49379170c37607d3e71a1e8
-
- 18 Jul, 2013 4 commits
-
-
Robert Greenwalt authored
* commit '8ab6df2e': Fix memset call
-
Robert Greenwalt authored
* commit '08ff0e40': Fix memset call
-
Robert Greenwalt authored
-
Wang Liyong authored
Parameters was passed in the wrong order. Change-Id: I1d4d68f1ba729bf54da84cbcb5f631938ac697f2
-
- 12 Jul, 2013 1 commit
-
-
Geremy Condra authored
-
- 11 Jul, 2013 6 commits
-
-
Geremy Condra authored
-
Geremy Condra authored
-
Chad Brubaker authored
Add commands for fetching the mark associated with routing a uid and for fetching the mark associated with avoiding the fwmark routing rules Change-Id: I4accd1a9aecd91f6f0630eb1a5466a81e309eeac
-
Geremy Condra authored
-
Chad Brubaker authored
requestRouteToHost requires the ability to punch holes in the VPN for certain addresses, this adds support for this under mark based VPNs. Change-Id: I9d890829048624d43c0f1efaec54563a860e850f
-
Chad Brubaker authored
Packets are now only marked for fwmark if their destination is in one of the routes for the target interface. Change-Id: Ided4ad992c4cf957d77ae11fa62ac4843a8592c7
-
- 03 Jul, 2013 4 commits
-
-
JP Abgrall authored
Just a cleanup. Change-Id: Ic5afd7bd194fdcad604d533ba95e4c23b10b3e24
-
JP Abgrall authored
The happy box needs to be able to let UID 0 (dhcp, ...) pass through. Bug: 6212480 Change-Id: I9867b7db4e5ad71cfb1170659d2d6a14ca9590be
-
JP Abgrall authored
* ndc bandwidth happybox (enable | disable) - enable . creates a an empty happy_box chain which rejects all traffic from all UIDs by default. . Uses the penalty_box as a hook. Any costly_interface automatically gets the happy_box as it has a penalty_box. . any app UID not in the happy_box will be treated as if it was in the penalty_box (i.e. addnaughtyapps) . penalty_box (addnaughtyapps) still applies. - disable . removes the happy box. * ndc bandwidth addniceapps <appUid> ... - similar to addnaughtyapps, but for the happy_box * ndc bandwidth removeniceapps <appUid> ... - similar to removenaughtyapps, but for the happy_box Bug: 6212480 Change-Id: I1f10e8c6fa1b230c7b3bb070d88508e437589705
-
JP Abgrall authored
Rename some stuff in preparation for nice apps and the "happy box". Bug: 6212480 Change-Id: I637c4283695ac619533999beab4f88968580d2e4
-
- 29 Jun, 2013 1 commit
-
-
JP Abgrall authored
Currently the bandwidth controller will cut off traffic via an ICMP destination unreachable message with code "administratively prohibited". TCP's RFC1122 does not explicitly say what to do with it, but it does say to abort the transmission when "port-unreachable" is seen. Some servers keep on retrying with the "prohibited" ICMP message which keeps the radio longer awake as more packets come in. Bug: 9150002 Change-Id: I6eb1c3ae41c3890f26581a4b7464821b7ffb85f4
-