1. 16 Mar, 2015 4 commits
  2. 14 Mar, 2015 2 commits
  3. 12 Feb, 2015 1 commit
  4. 11 Feb, 2015 1 commit
  5. 04 Feb, 2015 3 commits
  6. 03 Feb, 2015 7 commits
  7. 02 Feb, 2015 1 commit
    • Alex Klyubin's avatar
      Store MARK/CONNMARK flags in a central location. · fe909983
      Alex Klyubin authored
      MARK/CONNMARK values/tags are shared accross all controllers because
      of the way the firewall works. To avoid accidental clashes, it's best
      to store the values used in a central place.
      
      Change-Id: I76aaba38cba6554704a5635b1e7297a144e6e2ff
      fe909983
  8. 31 Jan, 2015 2 commits
    • Nick Kralevich's avatar
      Merge "Avoid leaking file descriptors" · 6c08cd6a
      Nick Kralevich authored
      6c08cd6a
    • Nick Kralevich's avatar
      Avoid leaking file descriptors · 53ea9cad
      Nick Kralevich authored
      Add O_CLOEXEC on open() calls, and SOCK_CLOEXEC on socket calls.
      This avoids leaking file descriptors across execs.
      
      Addresses the following SELinux denial:
      
        audit(1422740213.283:8): avc: denied { read write } for pid=2597 comm="clatd" path="socket:[6709]" dev="sockfs" ino=6709 scontext=u:r:clatd:s0 tcontext=u:r:netd:s0 tclass=netlink_socket
      
      and allows the removal of some other SELinux rules which were
      inappropriately added because of leaking file descriptors.
      
      Change-Id: I9c180488ea1969d610e488f967a7276a672bb477
      53ea9cad
  9. 29 Jan, 2015 3 commits
  10. 28 Jan, 2015 6 commits
  11. 23 Jan, 2015 3 commits
  12. 16 Jan, 2015 2 commits
  13. 15 Jan, 2015 1 commit
    • Jeff Sharkey's avatar
      Offer to detect non-SSL/TLS network traffic. · fbe497fc
      Jeff Sharkey authored
      Introduces new module that provides network-related features for
      the StrictMode developer API.  The first feature offers to detect
      sockets sending data not wrapped inside a layer of SSL/TLS
      encryption.
      
      This carefully only adds overhead to UIDs that have requested
      detection, and it uses CONNMARK to quickly accept/reject packets
      from streams that have already been inspected.  Detection is done
      by looking for a well-known TLS handshake header; it's not future
      proof, but it's a good start.  Handles both IPv4 and IPv6.
      
      When requested, we also log the triggering packet through NFLOG and
      back up to the framework to aid investigation.
      
      Bug: 18335678
      Change-Id: Ie8fab785139dfb55a71b6dc7a0f3c75a8408224b
      fbe497fc
  14. 09 Jan, 2015 1 commit
  15. 07 Jan, 2015 1 commit
    • Lorenzo Colitti's avatar
      exit instead of returning when execv()ing clatd fails. · 32b2e795
      Lorenzo Colitti authored
      Returning instead of exiting when execv() fails causes mayhem, as
      it results in two netd processes running, and netd commands being
      processed by one of the two at random.
      
      Bug: 18893886
      Change-Id: I25afbabaef5955c9af7053b0333969b4e83549f1
      32b2e795
  16. 06 Jan, 2015 2 commits