| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
| |
This is now handled by the function
fixup_possible_existing_listener
Change-Id: Iedde8317b619830a494f7d1d82b3da7a6c6ac9e5
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
- When an instantaneous tether and untether command are issued,
the dnsmasq operation of tether happens after the interface
has been brought down by the untether command and hence
tethering goes into bad state. The fix is to leave dnsmasq
running so that it can be killed later by the untether command.
- dnsmasq does not update its list of listeners with the new
interface object whenver an interface goes up/down and hence
when we free the old interface objects, the interface info in
dnsmasq listeners is lost. This fix makes sure the listeners
are updated with the new interface object
CRs-fixed: 665103
Change-Id: I0322619edc12146c67fa7a308769e3b9f0779654
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This fixes a difficult to diagnose bug in which when closing old
listeners and creating new listeners, any listeners which stick
around are regrettably left with their iface pointer pointing to
a struct irec that is free()d at the end of the set_interfaces()
call.
This results in a situation where subsequent malloc()s can reuse
this memory which, when written to, corrupts the listener's concept
of its listening address (by overwriting iface.addr).
This mean that when this listener is later closed because, say,
tethering on its interface has been removed, the close logic is
comparing IPv4 socket addresses with possible garbage, resulting
in the socket not being closed because no matching listening
address is found.
Because the socket is never closed, if the interface is later
re-added the bind() to the interface address fails with
EADDRINUSE.
Also: fix a bogus memset() invocation.
Bug: 17475756
Change-Id: I369dcd50b1d03db279fdb2c1d7f0e048df21be65
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This allows dnsmasq to send DNS queries on a non-default network
(e.g., the DUN APN). We add support for a mark instead of using
existing code to bind DNS servers to interfaces because:
1. Marks are more flexible, and we use them elsewhere.
2. The existing code to bind DNS servers to interfaces causes
the DNS socket to be bound to a constant port, which exposes
us to a Kaminsky attack.
Bug: 16357676
Change-Id: I8933b6de198a92c2aaf0291931ace8966ddba275
|
|\
| |
| |
| |
| | |
* commit 'ef815e0c09f9b45868ee73a09cf7186b23b899d3':
Fix dnsmasq '_PATH_LOG' undeclared build error.
|
| |
| |
| |
| |
| |
| |
| |
| | |
This change came from upstream, presumably so they can build against the NDK.
(cherry picked from commit 70eeec149a396b7c457d05de9e38d270a861b9fa)
Change-Id: Ic8df0bcf2c1a0619005e6a87ee467e1242da22fe
|
|/
|
|
|
|
|
|
| |
This change came from upstream, presumably so they can build against the NDK.
(cherry picked from commit 70eeec149a396b7c457d05de9e38d270a861b9fa)
Change-Id: Idca02fba6fd31e60fdd5710973c98e07ac71a7bc
|
|
|
|
|
| |
Bug: 8580410
Change-Id: I0e478ef39bfdc83adaa8cbbd9c1b5a6b0d28bb39
|
|
|
|
|
|
|
| |
Stop being a public dns forwarder on our external interfaces.
bug:7530468
Change-Id: Ic94cd66e66371de4fcc54f53b9f267f6611804b8
|
|\
| |
| |
| |
| | |
* commit 'ad7502a6aeff431e9759e57734474576d4b085e7':
Ensure all commands read on dnsmasq's stdin are processed
|
| |\ |
|
| |/
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
As described in issue 30016, android dnsmasq daemon is misconfigured after initializing tethering.
The reason is that two commands are present on dnsmasq stdin when check_android_listeners is called:
update_dns:8.8.8.8:8.8.4.4\0update_dns:192.x.y.z (notice the \0 between the 2 commands).
check_android_listeners assumes there is a single NUL terminated string and skip the second one.
This patch ensure that every commands are processed by checking wether or not all the characters on stdin have been consumed and loop if needed.
Also fixes style issues.
Change-Id: I6d98233964559b8dcc1253aec105a240e1065c94
Signed-off-by: Pierre Crépieux <pierre.crepieux@orange.com>
|
|/
|
|
| |
Change-Id: I95e6f923a13322003096e67aeaaf5199624ab980
|
|
|
|
|
|
| |
Bug: 5010576
Change-Id: Ie5fcad1808bcced3198dc650816373e2f7567e54
|
|
|
|
|
|
|
| |
Copy NOTICE file from location in root into subdirectories where it will
be picked up by the build system.
Change-Id: Ie648543f307686d44b2010133c1027e8d5c7d34a
|
|
|
|
| |
Change-Id: I84244ea72c1a603cc4342da13f67831dcd8eaf34
|
|
|
|
| |
Change-Id: I9baee49df0139f5131d5a83f6d03fb2aa7a30f46
|
|
|
|
| |
Used by tethering, this would get very noisy if you had wifi active.
|
|
|
|
| |
Signed-off-by: San Mehat <san@google.com>
|
|
|
|
| |
Signed-off-by: San Mehat <san@google.com>
|
|
|
|
| |
Signed-off-by: San Mehat <san@google.com>
|
|
|
|
| |
Signed-off-by: San Mehat <san@google.com>
|
|
|
|
| |
Signed-off-by: San Mehat <san@google.com>
|
|
|