0831f66f1949307bae54ccf01d70283005467085 |
|
10-Feb-2015 |
Lorenzo Colitti <lorenzo@google.com> |
Make reportInetCondition revalidate if the report differs from our state 1. If reportInetCondition says the network is not working, and the network is already marked not validated, don't revalidate it. This was superfluous and should save battery. 2. If reportInetCondition says the network is working, and the network is not marked as validated, revalidated. This will allow us to get out of a validated state quickly based on app input (e.g., allowing GCM's exponential backoff timer to drive revalidation instead of our 10-minute timer). Bug: 19258761 Bug: 19209043 Change-Id: Iaa4bac82d117ed1f4088dab106e6f6ce46b34bc3
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
d6a7980dd9a52f082091cf000095b77a9d44565d |
|
05-Feb-2015 |
Lorenzo Colitti <lorenzo@google.com> |
Make getNetworkInfo() take into account VPN underlying networks. If a user is subject to a VPN, getActiveNetworkInfo() will return the VPN's underlying network (e.g., TYPE_WIFI), so that apps that call getActiveNetworkInfo to answer questions like "is the device connected to wifi?" will continue to work. Make getNetworkInfo do this as well: if the query is for a network type that is underlying the current user's VPN, then return that network. Bug: 19196545 Change-Id: Ic5a651735b927c758594a26d26a03fbd704b52e6
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
147cf4b8c4345f2d086251313583888356317d2d |
|
22-Jan-2015 |
Erik Kline <ek@google.com> |
Merge "Log interface name and uid when filtering a blocked network." into lmp-mr1-dev
|
338317edd553ff9e5c0e7bdb61fce478d89ecdd4 |
|
19-Jan-2015 |
Erik Kline <ek@google.com> |
Log interface name and uid when filtering a blocked network. Bug: 18707263 Change-Id: Ide9a1670a97eae787b785933de0c80750c2b5601
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
51481857ea48abe1ff3346ca1034dd5fcb68eb72 |
|
08-Jan-2015 |
Robert Greenwalt <rgreenwalt@google.com> |
Fix legacy request removal. Don't say we're disconnected from a legacy type until there are no outstanding requests for it. bug:18946574 Change-Id: I8e45c4a7558f7ced0840b71c50081989ba13c1c7
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
9f0e9ad40633f0480c8b6209e52d61c5aac52d1d |
|
14-Jan-2015 |
Paul Jensen <pauljensen@google.com> |
Merge "Don't blindly teardown unvalidated networks when releasing NetworkRequests." into lmp-mr1-dev
|
9936484667620ff20905ea8524265b4add39cd63 |
|
09-Dec-2014 |
Paul Jensen <pauljensen@google.com> |
Don't blindly teardown unvalidated networks when releasing NetworkRequests. These networks may be on their way to becoming validated at which point they could satisfy the default NetworkRequest. This change unifies the is-this-network-needed code into a single function. bug:18652378 Change-Id: Ia511d5c66be79b47dd7c9348ec02784ab30b960c
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
573a0354c5752769366b3365eb1be4adc569d096 |
|
08-Jan-2015 |
Paul Jensen <pauljensen@google.com> |
Remember to cancel lingering when a network again satsifies a NetworkRequest. When WiFi's score drops and then comes back up we would previously linger WiFi but forget to cancel the linger timeout, so 30s later WiFi would unexpectedly tear down. This was not completely fixed in 0cc1732. bug:18826162 Change-Id: I7bb4b99ec969099e9815f46d4c09253be71a29be
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
152ed37a3ecbd044cc039370e0299d6a0bbc9bc9 |
|
18-Dec-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Fix timing between bcast and net setup. A legacy network type request would generate a bcast before the network notification was sent - the legacy startUsingNetworkFeature API requires the notification so it can bind your dns queries to the new network. Fast-moving clients could try to use the network before it was ready. bug:18792871 Change-Id: I24c46ef15c249c50bfc321f62756d1f66dc3a6a9
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
7b42f399430d5d4ace4efbee225bbd3ecd2d4146 |
|
17-Dec-2014 |
Lorenzo Colitti <lorenzo@google.com> |
Add a lastValidated bit and use it when reporting capabilities. When we switched the way the status bar determines if a connection is validated from using INET_CONDITION_ACTION broadcasts to calling getDefaultNetworkCapabilitiesForUser(), the statusbar stopped displaying ! when a network stopped having working Internet connectivity. This is because the validated bit is never set to false once a network is validated. Fix this, hopefully temporarily, by introducing a new validated bit that does go back to being false when a network no longer has working connectivity, and use that bit in getDefaultNetworkCapabilitiesForUser(). Bug: 18777225 Change-Id: I991c068be50252391d0e64c647fcf2e053dc82f9
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
d3b8a3e77696ecd90ce59a869aaadf1e7804a9c8 |
|
17-Dec-2014 |
Lorenzo Colitti <lorenzo@google.com> |
Rename validated to everValidated. This is a straight rename and thus a complete no-op from a functionality perspective. Bug: 18777225 Change-Id: I140d7640f1460c869a311294873772819a7a7059
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
f4ffaa4f57a8af4452f27e47ca65ee85fa0a60dc |
|
15-Dec-2014 |
Paul Jensen <pauljensen@google.com> |
Fix race between CONNECTIVITY_ACTION and setting default network. Now that the delay between connectivity changes and CONNECTIVITY_ACTION has been removed (ag/599650) races between CONNECTIVITY_ACTION and the setting of the default network become more evident. In http://crbug.com/441818 Chrome is calling getaddrinfo() immediately after a device goes from no connectivity to cellular connectivity, and Chrome is erroneously getting back EAI_NODATA because netd hasn't yet set the default network for DNS resolutions. bug:18757162 Change-Id: Ib607dcb3697403272a8c838713a9cb602e9c6820
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
2122e14cca3edc5099b90d8768b34d7a0e9fe148 |
|
11-Dec-2014 |
Paul Jensen <pauljensen@google.com> |
Merge "Fix several HTTP proxy issues with multinetworking." into lmp-mr1-dev
|
e0bef71662d81caaaa0d7214fb0bef5d39996a69 |
|
10-Dec-2014 |
Paul Jensen <pauljensen@google.com> |
Fix several HTTP proxy issues with multinetworking. 1. Send PROXY_CHANGE_ACTION broadcast when any network's proxy changes, not just the default network. 2. When a process is bound to a particular Network, update the proxy system properties to those for the bound Network, and keep them updated when PROXY_CHANGE_ACTION broadcasts are received. 3. Make Network.openConnection() use the proxy for the Network. bug:17905627 bug:17420465 bug:18144582 (cherry-pick of https://android-review.googlesource.com/#/c/115170) Change-Id: Ia2819985e6108a8c121e74c683a5646becfd0a97
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
33cd463bbbbe47010ed44815fbfd0ab5e8fbf825 |
|
10-Dec-2014 |
Erik Kline <ek@google.com> |
Merge "Re-remove CONNECTIVITY_CHANGE_DELAY and supporting functions." into lmp-mr1-dev
|
6973634ce61ab7d4c1d51c70be6d51725b89e7b9 |
|
08-Dec-2014 |
Jeff Sharkey <jsharkey@android.com> |
Direct notification of network interface changes. Connectivity broadcasts recently changed and are no longer sent for certain types of network changes. For example, when stacked network interfaces change for a mobile network. To ensure that we pick up all these details, directly wire the two services together. Also remove some unused code for split network types. Bug: 18666753 Change-Id: I0467bd5b330c0e0cb51af2306d821b41ad16337a
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
3256601f5e4d94713f59e97b9d4912875c1bdcaf |
|
03-Dec-2014 |
Jeff Sharkey <jsharkey@android.com> |
Offer to "merge" subscribers for data usage. There are some cases where multiple subscriber identities (IMSI) should be treated as "merged together" from a data usage perspective. This is done by extending the template used for matching purposes to support multiple subscribers. Then, when we query historical usage or set network policies, we normalize the matching template to merge to any other identities that should be included. When normalizing, the "lowest" identity is always used for equality and storage purposes, which allows identities to come and go over time. This change also fixes data usage recording for multi-SIM devices by passing along the concrete subscriber identity for each network interface. Also correctly create default policies for multi-SIM devices. This change also drops setPolicyDataEnable() until it can be wired up to the right underlying NetworkAgent. (This means we still bring up the network, and then rely on iptables rules to block traffic when over the limit, instead of proactively disabling the connection.) Bug: 18012787 Change-Id: If6acf32009fdfea2b836f5aff8e2f3e5e0248b4a
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
8f29dcfb53350cf687112ac79a806e4d34dfa22b |
|
08-Dec-2014 |
Erik Kline <ek@google.com> |
Re-remove CONNECTIVITY_CHANGE_DELAY and supporting functions. Since optimistic addresses are useable upon kernel notification there is no need for this extra connectivity delay. --- This functionality was originally submitted in ag/572619. Owing to issues with bind()ing to optimistic addresses (see b/18609055) this was reverted in ag/598673. This reverts the revert. :-) Bug: 17769720 Change-Id: Ibee490b2af72050693b6bd748193f51e312ca527
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
1edc73aa5dc24db39ec685f1950c5110699e301e |
|
06-Dec-2014 |
Jeremy Joslin <jjoslin@google.com> |
Merge "Don't send the same PendingIntent more than once." into lmp-mr1-dev
|
891dd5743af17e3376b0b0438b149c565cf871c8 |
|
06-Dec-2014 |
Paul Jensen <pauljensen@google.com> |
Merge "Reap unvalidated networks that have no chance of becoming highest scoring." into lmp-mr1-dev
|
7929484dbf0f6eda75641f8b965d3ed5fa1fed52 |
|
04-Dec-2014 |
Jeremy Joslin <jjoslin@google.com> |
Don't send the same PendingIntent more than once. Fixing a bug where a NetworkRequest's PendingIntent can be sent more than once when networks are rematched before the intent completes. Added a small delay before removing the request to give the receiving client an opportunity to put in its own request. The delay value is configurable via Settings.Secure. Bug: 18614074 Change-Id: Iac7c5e5a04f42f2b6794e9e22349cc631bebeab7
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
0029f0ac36c28b60d59d3d70d148ba3136971b95 |
|
05-Dec-2014 |
Dianne Hackborn <hackbod@google.com> |
Merge "Fix issue #17323751: Additional items in aggregated battery stats" into lmp-mr1-dev
|
1e01d16982e6b22ec4c0e2d6dc1e261eb6f92c8e |
|
05-Dec-2014 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #17323751: Additional items in aggregated battery stats - Now aggregate number of times each process has crashed and ANRed. - Now aggregate total number of connectivity changes. - Now record connectivity changes in the history. Crash and ANR counts are new entries at the end of "pr" in checkin. Connectivity change counts is a new entry at the end of "m" in checkin. Connectivity changes in the history checkin are Ecn and include the type of connection and its state. Change-Id: I0c01186446034cf6c3fb97d45f5e3b5c69a0438a
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
e660e27603e93579b645544ceb9606ded81cea82 |
|
05-Dec-2014 |
Erik Kline <ek@google.com> |
Revert "Merge "Remove CONNECTIVITY_CHANGE_DELAY and friends." into lmp-mr1-dev" This is the revert of ag/572619. This reverts commit 9261d9d64548f0221de50eb99f3675488a4176a4, reversing changes made to 32b61ab28f54e5b00f472b2166f9b1100375e4ff. Bug: 18609055 Bug: 17769720 Change-Id: I122eba200f2071d4e5777ec34c1d04fb567345a8
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
efb81b9e965c4ba782151b6767e7e3df4f2cdfd2 |
|
04-Dec-2014 |
Paul Jensen <pauljensen@google.com> |
Merge "Remember to cancel lingering when a network again satsifies a NetworkRequest." into lmp-mr1-dev
|
b10e37fd1c3a95f7e621eed234c2491eb71241e2 |
|
25-Nov-2014 |
Paul Jensen <pauljensen@google.com> |
Reap unvalidated networks that have no chance of becoming highest scoring. These networks are unneeded and waste battery. We won't bring up these networks in the first place if they have no chance of becoming highest scoring. This change handles the case where these networks are already up and transition to a state where they have no chance of becoming highest scoring. This happens when another network validates with a score higher than this network can ever hope to attain. bug:18489123 Change-Id: I77a96a72e250e25e44e0c50e7a928af8b35bb6ab
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
9261d9d64548f0221de50eb99f3675488a4176a4 |
|
04-Dec-2014 |
Erik Kline <ek@google.com> |
Merge "Remove CONNECTIVITY_CHANGE_DELAY and friends." into lmp-mr1-dev
|
403aa2684e0e93b4792aabc0bbe1f32ac5e417af |
|
28-Nov-2014 |
Lorenzo Colitti <lorenzo@google.com> |
Make StatusBar display all default networks. The basic principle is: if an app's traffic could possibly go over a network without the app using the multinetwork APIs (hence "by default"), then the status bar should show that network's connectivity. In the normal case, app traffic only goes over the system's default network connection, so that's the only network returned. With a VPN in force, some app traffic may go into the VPN, and thus over whatever underlying networks the VPN specifies, while other app traffic may go over the system default network (e.g.: a split-tunnel VPN, or an app disallowed by the VPN), so the set of networks returned includes the VPN's underlying networks and the system default. Specifically: 1. Add a NETWORK_CAPABILITY_VALIDATED bit to NetworkCapabilities. 2. Add a hidden API to retrieve the NetworkCapabilities of all default networks for a given macro-user. 3. Modify the status bar code that used getActiveNetworkInfo to determine which network was active, and make it consider all validated networks instead. 4. Because the set of active networks depends on which VPN app the user is running, make the status bar re-evaluate the networking situation when the active user changes. Bug: 17460017 Change-Id: Ie4965f35fb5936b088e6060ee06e362c22297ab2
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
0cc1732cfb9d68779449b4c12661b4df6bfc720b |
|
25-Nov-2014 |
Paul Jensen <pauljensen@google.com> |
Remember to cancel lingering when a network again satsifies a NetworkRequest. When WiFi's score drops and then comes back up we would previously linger WiFi but forget to cancel the linger timeout, so 30s later WiFi would unexpectedly tear down. Also, make sure this is only done for created Networks as "created" is the signal to initialy match Networks and requests. bug:18169560 Change-Id: Ia69b110f6473371e556c60b950253758e023b7aa
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
32f3518dccf5c599c21b54095abe561f48277898 |
|
02-Dec-2014 |
Lorenzo Colitti <lorenzo@google.com> |
Merge "Only use mDefaultDns if the network claims to offer Internet" into lmp-mr1-dev
|
829dfa7cd80faa61b3f63c455f81411571144f82 |
|
28-Nov-2014 |
Lorenzo Colitti <lorenzo@google.com> |
Only use mDefaultDns if the network claims to offer Internet Currently, if a network does not specify DNS servers, we default it to using 8.8.8.8. This was done because the emulator did not specify DNS servers. However, it causes queries to fail slowly, instead of failing fast, on networks that do not have connectivity to 8.8.8.8. Bug: 18327075 Change-Id: I0df13ff4a17ee65e640be96695a3af31b020963a
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
a68e7d730cf303b33d6aec9420c4bb4a92275baa |
|
26-Nov-2014 |
Jeremy Joslin <jjoslin@google.com> |
Fix the ordering of extra values in the PI. Bug: 18539720 Change-Id: I6bb69394b05923ca25bc1b4902bc2540a13812bd
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
6ea4e11d9817d85eb5c0ff445154985e4eb0c534 |
|
24-Nov-2014 |
Jeff Davidson <jpd@google.com> |
Merge "Don't enforce control permission when preparing consented VPN." into lmp-mr1-dev
|
e57064a289082758fcb9bb71f987dde84931e3e6 |
|
24-Nov-2014 |
Paul Jensen <pauljensen@google.com> |
Merge "Don't bother validating networks that don't satisfy the default request." into lmp-mr1-dev
|
6d0e8711d0612cfc9d9db2def57541076c0f7a40 |
|
24-Nov-2014 |
Sreeram Ramachandran <sreeram@google.com> |
Merge "Delete unused/non-working code." into lmp-mr1-dev
|
11008a78b8e30910cedd8b8431980c7738183292 |
|
20-Nov-2014 |
Jeff Davidson <jpd@google.com> |
Don't enforce control permission when preparing consented VPN. If a VPN app requests to be prepared and has already obtained user consent, there is no need to additionally enforce the control permission. We only need to enforce the control permission when a VPN is first being prepared, where such a preparation would bypass user consent. Also ensure that in this case, the VPN being prepared matches the calling app. Otherwise an app could prepare another pre-consented VPN, which is not particularly dangerous but is likely unexpected. Finally, remove misleading comment in ConnectivityService#prepareVpn. This method IS called from VpnService.prepare(), not only from system-privileged apps. Bug: 18442887 Change-Id: Ic3227c6c1c74312697f0576d3811b06692a4edff
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
c2c0beab79a907f63e109eefe2a5aabcf2e3fd8f |
|
12-Nov-2014 |
Sreeram Ramachandran <sreeram@google.com> |
Allow VPNs to specify their underlying networks. These are used when responding to getActiveNetworkInfo() (and cousins) when an app is subject to the VPN. Bug: 17460017 Change-Id: Ief7a840c760777a41d3358aa6b8e4cdd99c29f24
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
75f018e6a7c2280c62e686440000a1dcdf5179cf |
|
19-Nov-2014 |
Sreeram Ramachandran <sreeram@google.com> |
Delete unused/non-working code. Change-Id: I2cba9ffdb4ed547cb922d0ac08abf81e49ffa66b
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
21b5ee3f0e39be4a79bcfb2b79b0529f75f5cb58 |
|
13-Nov-2014 |
Sreeram Ramachandran <sreeram@google.com> |
Eliminate race conditions in UID-based network filtering. The previous code retrieved information from the legacy tracker multiple times for each user query, leading to race conditions where the info could've changed between the calls. Refactors the handling of legacy data types in ConnectivityService and unifies call paths so that APIs that deal with legacy data types (NetworkInfo and int/networkType) and newer types (such as Network) go through common code paths, using NetworkState to hold all the necessary data pieces. This enables follow-on bug fixes to getActiveNetworkInfo(). The changes are limited to public "query" APIs (those that retrieve some network information or the other). More details about the specific changes and their rationale can be found in the code review thread. Bug: 17460017 Change-Id: I656ee7eddf2b8cace5627036452bb5748043406c
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
0653f508b58eab994089ae2da783852a5c1b4a8a |
|
21-Nov-2014 |
Paul Jensen <pauljensen@google.com> |
Merge "Don't allow an uncreated Network to satsify requests." into lmp-mr1-dev
|
e548c3a3786a252d42b3c0ae0823f4718fcb9718 |
|
21-Nov-2014 |
Geoffrey Borggaard <geoffreyb@google.com> |
am c3f5d718: Merge "Fix null handling in proxies." into lmp-dev automerge: 90ed95f * commit '90ed95faeddf7ebe71320e3e0e80eb17d374e49c': Fix null handling in proxies.
|
2c311d61eaf331818e601f97485f88c4cf26384d |
|
17-Nov-2014 |
Paul Jensen <pauljensen@google.com> |
Don't bother validating networks that don't satisfy the default request. The only immediate change in behavior is not validating untrusted networks. bug:18299572 bug:18394654 Change-Id: I8d626baf37db0bd0f55ddf3af8a0abf094a12369
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
79adc958e5cd8daf7231ec042dfa367010d415f4 |
|
20-Nov-2014 |
Geoffrey Borggaard <geoffreyb@google.com> |
Fix null handling in proxies. ProxyInfo.getPacFileUrl() can not be null. It will be equal to Uri.EMPTY. Checking for null was causing global proxies to never be disabled. Or more accurately, global proxies would be disabled, but would reappear after a reboot. ProxyInfo.getExclusionListByString() can be null. If no exclusion list was specified, the proxy settings would not be successfully saved, they would disappear after reboot. Bug: 18453223 Change-Id: I1c27e5dca5b9664bb7468ea909bff489fa110a07
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
90e9307e8fa713081aeccd8f5f212c0f1255bd07 |
|
18-Nov-2014 |
Erik Kline <ek@google.com> |
Rename EXTRA_NETWORK ConnectivityManager constants. Per b/18414703: s/\<EXTRA_NETWORK_REQUEST_NETWORK\>/EXTRA_NETWORK/g s/\<EXTRA_NETWORK_REQUEST_NETWORK_REQUEST\>/EXTRA_NETWORK_REQUEST/g Additionally, associated string values updated to: android.net.extra.NETWORK android.net.extra.NETWORK_REQUEST Bug: 18414703 Change-Id: I7aeed2161829742affc666e835a97ce2c28356fe
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
57a767ff22cc141c90627b480b48cbda7c89d62b |
|
19-Nov-2014 |
Paul Jensen <pauljensen@google.com> |
Don't allow an uncreated Network to satsify requests. This could happen when another Network changes its capabilities and updateCapabilities() calls rematchAllNetworksAndRequests() which calls rematchNetworkAndRequests() on all Networks, even those that are uncreated. Allowing uncreated Networks to satisfy requests can lead to bugs where ConnectivityService instructs netd to perform actions (e.g. set default Network) on uncreated Networks which netd doesn't know about yet. bug:18446301 Change-Id: I857262ac66d1d3af4c264ce128f0a4bee95655de
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
a8e6d6fd993c449b442be8c19f6c2688b75c018d |
|
17-Nov-2014 |
xinhe <xinhe@google.com> |
Merge "air plane mode only send to the owner through the quick setting" into lmp-mr1-dev
|
9a1da68bf7980449a5ee5d6fa9d9686b04d667ff |
|
11-Nov-2014 |
Jeff Davidson <jpd@google.com> |
Expose a SystemApi method to prepare a VPN without consent. This is NOT designed to be called normally. Most apps (even system-privileged ones) should request user consent before launching a VPN. However, it is needed to support flows where consent can be obtained through other means external to the VPN flow itself. The API requires a system-privileged permission, CONTROL_VPN. Bug: 18327583 Change-Id: I1bcdcf0fb5707faeb861ec4535e7ccffea369ae7
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
98e25fc3771b8c51630ae05752e0b91ac01a97af |
|
17-Nov-2014 |
xinhe <xinhe@google.com> |
air plane mode only send to the owner through the quick setting It should send to all the uesers as it behaves in setting Bug:18353278 Change-Id: Ib46a97e30bfba73dd78fab0c8139d6ccb7ad210f
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
0cb1bc488c6578fde1503c53405715c564f0f7a0 |
|
06-Nov-2014 |
Sreeram Ramachandran <sreeram@google.com> |
Merge "Send broadcasts when VPNs come and go." into lmp-mr1-dev
|
46e3ac8bbca54b56af1947f64294e2a4c35cfa3c |
|
05-Nov-2014 |
Jeremy Joslin <jjoslin@google.com> |
Implemented requestNetwork with a PendingIntent. ConnectivityManager.requestNetwork(NetworkRequest, PendingIntent) was unhidden and implemented. Added ConnectivityManager.removePendingIntentRequest(PendingIntent) as the companion method. Bug: 17356414 Change-Id: I656a1e149cc1292c443ebfe9e61ee3eb5a80f143
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
9634abe86b02b6ea9b6ea6f03d9f78395b696a89 |
|
05-Nov-2014 |
Jeff Davidson <jpd@google.com> |
Update network selections on capability change. Among other reasons, this is needed when a Wi-Fi connection is upgraded from untrusted to trusted, so that the default route can be updated to point to the Wi-Fi network instead. Bug: 18206275 Change-Id: I53f7a6f00f66a23ae4873fa2334cd8a621f39d4f
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
60c0c0da0a122702c8425808cdc2c7a79738295c |
|
30-Oct-2014 |
Sreeram Ramachandran <sreeram@google.com> |
Send broadcasts when VPNs come and go. This is achieved by adding TYPE_VPN as a supported legacy type. Note that this is added in code, and not in a config.xml file, so there's no way to remove TYPE_VPN (i.e., make it unsupported). Bug: 17426546 Change-Id: I02eb5f22737720095f646f8db5c87fd66da129d6
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
8e3f4fbdf6e562f4f5731b98e327e8af33b75c4c |
|
22-Oct-2014 |
Erik Kline <ek@google.com> |
Remove CONNECTIVITY_CHANGE_DELAY and friends. Once optimistic addresses become useable upon kernel notification there will be no need for a connectivity delay. This change requires kernel changes like: https://android-review.googlesource.com/#/c/109934 Bug: 17769720 Change-Id: I8510c540aa655aad6a82ee322d591331357ee272
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
954394653dad05838235f48244a4320893e0f0cf |
|
09-Oct-2014 |
Lorenzo Colitti <lorenzo@google.com> |
Support more than one clatd at a time. 1. Make Nat464Xlat a per-network object, one for every network requiring clat, instead of a ConnectivityService singleton. 2. Make the NetworkManagementService clatd commands take an interface. 3. When we attempt to start clatd on a network, store its Nat464Xlat object in the NetworkAgentInfo, so we have an authoritative way of knowing whether clat is running on a given network. 4. Rework Nat464Xlat, hopefully simplifying it. Bug: 12111730 Change-Id: I1fa5508ef020cd1c3d1c7a1f7b06370ac5fc2ae2
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
0cb7903ddedbbb8a8171926e4460b74af589369d |
|
15-Oct-2014 |
Lorenzo Colitti <lorenzo@google.com> |
Propagate network state changes to the LockdownVpnTracker. Bug: 17695048 Change-Id: I10378df0ab545729a6a315fd1bc8870cd98f47b3
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
483d1fb3a6b55c1309cbc2948b261fae936965e0 |
|
04-Oct-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Switch the NetworkInfo.mIsAvailable default The placeholder for disconnected networks was setting it to false, but this technically means that we know an attempt to connect to that network will fail (which we don't really now). Some applications use this an decide not to bother trying - an MMS app for example would never send an MMS because it thinks the network is never available. This is a L regression. bug:17669247 Change-Id: Id6041f226da069c267c56418d42c55978c36c66f
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
24861eabe641d5a147f127c8e7f98fab949224ab |
|
03-Oct-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Merge "Send callbacks for Net property changes" into lmp-dev
|
a848c1cc0a7b72b192aef9de2d448b3e1d17619c |
|
01-Oct-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Send callbacks for Net property changes LinkProperties and NetworkCapabilities changes were not calling app callbacks. bug:17681483 Change-Id: I67dac3c4dc1284f5c4bfb24de239da4ec776336f
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
a11b5e34f50899a48531bb84ba3f6d796a64985e |
|
03-Oct-2014 |
Paul Jensen <pauljensen@google.com> |
Merge "Send updated NetworkAgent score to NetworkFactories when validated." into lmp-dev
|
6eead851d2ea56c3e7319587d4066b1828d54699 |
|
03-Oct-2014 |
Paul Jensen <pauljensen@google.com> |
Merge "Allow any unvalidated Network to satisfy NetworkRequests." into lmp-dev
|
cf0f97a3aa754f5e75bf1dc5d4e78ca46aa17513 |
|
02-Oct-2014 |
Jason Monk <jmonk@google.com> |
Synchronize on all sendProxyBroadcast calls To avoid race conditions. Also make mDefaultProxy volatile for safety. Bug: 17697364 Change-Id: I8f0abb1a6e1c816f3addc11a69ff794ad767f2cf
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
c8b9a7428d12a782deda1b807164f0ec74d1ad12 |
|
30-Sep-2014 |
Paul Jensen <pauljensen@google.com> |
Send updated NetworkAgent score to NetworkFactories when validated. Previously the score was not sent out causing other NetworkFactories to have the lower unvalidated score and to repeatedly try to bring up a new Network only to have it torn down. Also, avoid logging an error when tearing down a network with only listening requests. bug:17726566 Change-Id: I82ff7c9bd5ec962f62a50ad0042c278622953969
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
4b9b2be8945a4f22676ea948ae260108159e26a3 |
|
26-Sep-2014 |
Paul Jensen <pauljensen@google.com> |
Allow any unvalidated Network to satisfy NetworkRequests. Explicitly selected Networks may never be validated (e.g. Chromecast) but are still given a high score so they can explicitly become the default Network. Without this fix they do not become the default Network if another Network is present. This was an artifact of how unvalidated Networks were handled, but now that unvalidated Networks are properly handled, ala 50807d, we can freely rematch even unvalidated Networks and NetworkRequests. Also, never linger and teardown unvalidated Networks as the user might be in the process of signing in. This better matches prior behavior when unvalidated networks didn't match NetworkRequests, and thus were never lingered. Also, don't disconnect networks that may be lingering. The disconnect logic in rematchNetworkAndReqeuests() is adjusted to only fire when a network is newly validated. It is incorrect to consider rematching uncreated Networks and explicitly selecting created Networks, so this change logs error messages in those cases. bug:17647968 bug:17396616 Change-Id: Id6b8a350b8200f484d5bfd14ca0a8f64f08846a0
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
e4a05afe85f15472325db9c535ef81f409fb6070 |
|
24-Sep-2014 |
Sreeram Ramachandran <sreeram@google.com> |
Send app permissions to netd. Based largely off Robert's http://ag/546170 (thanks!) Bug: 15413737 Change-Id: I8a1f0a184923c4c0a4935e6b88895bcc05e39f02
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
d8f7e048281559462f9c590f9d7d48fb7fe065ce |
|
30-Sep-2014 |
Lorenzo Colitti <lorenzo@google.com> |
Merge "Update LegacyTypeTracker state before sending connect broadcasts." into lmp-dev
|
89e0f0937a70d73b5ed188c9337b4d33860e5573 |
|
15-Sep-2014 |
Paul Jensen <pauljensen@google.com> |
Move mobile provisioning APN support into telephony. Most of this logic is simply removed from ConnectivityService. The captive portal detection is now done by the NetworkMonitor. The notification logic is still left in ConnectivityService as it's used by both the NetworkMonitor and telephony's mobile provisioning logic. bug:17324098 Change-Id: Ibd1c42b1a75795f90a6483d3d0a5a14f88b193d8
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
061f4159dca9b68f0315d725a945af9736dde62f |
|
28-Sep-2014 |
Lorenzo Colitti <lorenzo@google.com> |
Update LegacyTypeTracker state before sending connect broadcasts. Currently, LegacyTypeTracker sends out connected broadcasts before updating its internal lists of networks. This creates a race condition where an app can query LegacyTypeTracker state (e.g., via getActiveNetworkInfo) as soon as it gets the broadcast, and get information that has not been updated. Bug: 17540101 Change-Id: Iefd6d5e9fd0b427c5872166208831f70fcef8b6f
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
75b8966cad24354272759a1579376f7e64e40050 |
|
24-Sep-2014 |
Lorenzo Colitti <lorenzo@google.com> |
Merge "Only stop/start clatd if necessary." into lmp-dev
|
e034716628de94399717a744f14bdfd534d8f87a |
|
24-Sep-2014 |
Lorenzo Colitti <lorenzo@google.com> |
Merge "Block address families with routes, not NetworkAgent side channel" into lmp-dev
|
1df5fa55c5a5c1ba054b783ea639c99d57c357cf |
|
20-Sep-2014 |
Lorenzo Colitti <lorenzo@google.com> |
Only stop/start clatd if necessary. Previously we would restart clatd on every LinkProperties change, which now happens every time we switch radio technology (e.g., LTE to HSPA). We also would not stop it if the link got an IPv4 address. Bug: 15024258 Bug: 17186694 Bug: 17569702 Change-Id: I65cfcd5e7acec8ea1a12392a59dabd668c58490f
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
74971c75dcdfacdf49f110c2104f20e704bffdcb |
|
23-Sep-2014 |
Paul Jensen <pauljensen@google.com> |
Merge "Remove needless locking of mRulesLock that caused deadlocks." into lmp-dev
|
60446165d8bd44f72cec8d0c5583a688369fa660 |
|
19-Sep-2014 |
Lorenzo Colitti <lorenzo@google.com> |
Block address families with routes, not NetworkAgent side channel Now that we support unreachable routes, use those to block address families on VPNs. This is a much more elegant solution. Also update LinkProperties when IP addresses are added and removed, fixing a TODO. Bug: 17462989 Change-Id: Ib749d84710dca70d672350b9f129bb91419ec77e
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
f9ee0e50545ba5e592147037f67155a29b3130ca |
|
19-Sep-2014 |
Paul Jensen <pauljensen@google.com> |
Remove needless locking of mRulesLock that caused deadlocks. The locks were added in c006f1 when underlying functions weren't performing locking. In d2a4587 the underlying functions were changed to perform locking but the higher level locking wasn't removed. The higher level locking can now cause deadlocks with the new NetworkAgentInfo locking. This change removes the needless higher level locking. Now all mRulesLock locking only guards simple accesses to the appropriate two data strucures so there is no chance of a deadlock. I verified that all accesses to the appropriate two data structures are guarded by mRulesLock locking. bug:17569997 Change-Id: Id9f4e3d19d6895876925ae32f12460db30359368
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
f3b47e95b14d040c4239b9188a10a4befb607459 |
|
18-Sep-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Merge "Use unified Tethering Permission Check" into lmp-dev
|
edb47668f072ba82ca389a1b78b1a2024ac31663 |
|
17-Sep-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Use unified Tethering Permission Check The BT and Wifi mechanisms for enabling Tethering did their own permission checks. This set of changes unifies the check into a ConnectivityManager function so they can be kept in sync. bug:17435527 Change-Id: I8c157a5acf56ffbddd349cb6a45160ae7be8541b
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
e73cc4646bed3926024c9f54ca59e3a82a97b56c |
|
08-Sep-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Add NetworkAgent event for ExplicitlySelected Lets Wifi tell us when the user selected this AP vs auto-connected. bug:17396168 Change-Id: I6e067ab62ed49040629aa31fe07ff880d3d542f0
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
49f63fbed4cd84f5da182c85e8b999037dc64f3b |
|
13-Sep-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Report Network status to NetworkAgent. Currently just valid/invalid based on NetworkMonitor findings. Changed NetworkMonitor to start out in default state since starting in Offline causes a spurious invalid report at creation time. Added some logging. bug:17395269 Change-Id: I9ae650b561834d8f8979033744d97df852e76df9
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
ad50a1fed01e7c24531ad26d9de70c7b0127ea76 |
|
05-Sep-2014 |
Paul Jensen <pauljensen@google.com> |
Update Inet state when NetworkMonitor re-evaluates a network. Previously the Inet state (the little exclamation mark beside the WiFi and Cellular bars) only transitioned from bad to good once. With this change it can transition back to bad (and later to good again) if a network re-evaluation is triggered, say by ConnectivityManager.reportBadNetwork. Also, avoid triggering re-evaluation in two unwanted cases. bug:16214361 Change-Id: I7856724249ffcbb0945276dcf45019876231fdaf
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
2161a8ea123134ee3f9a10c0f8f56aabd8289f69 |
|
11-Sep-2014 |
Paul Jensen <pauljensen@google.com> |
Better handling of unvalidated networks. Give unvalidated networks penalized scores and allow them to satisfy requests. Previously unvalidated networks were never allowed to satisfy NetworkRequests and so never caused CONNECTIVITY_ACTION broadcasts. Previously if there were no other networks present an unvalidated network would still be made the default. This change formalizes this behavior using our existing network score logic by assigning unvalidated networks a highly penalized score. bug:16358003 bug:17364306 Change-Id: I28fcd6f5ac4b52a4d1c234c472cfa8ba998bcc6f
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
8c9e975c44d35c111176e4b8c38555121495e7ae |
|
10-Sep-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Merge "Don't accept score below 0." into lmp-dev
|
35f7a94c846cfdaa75ed6bc58ec37bdef7a09be8 |
|
09-Sep-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Don't accept score below 0. Network Factories are allowed to go below, but networks need to be constrained. Allowing the network to go below 0 meant that -1 could sometimes leak through and foul the logic. The core of 17361330 will be fixed when we stop sending scores for listens to NetworkFactories, but it exposed this issue too. Summary: 1 - add a network listener. This isn't a request so it's not sent to networks. 2 - alter your score (ethernet sets score to -1 when the link goes down) (16:07:39.782) 3 - a bug in ConnectivityService causes score changes to get sent for all network requests and network listeners causing NetworkFactories to no see 2 entities. This bug will be fixed by a pending change (https://googleplex-android-review.googlesource.com/#/c/540840/). This causes the ethernet NetworkFactory to see two entities, both served by networks of score -1. (16:07:39.989) 4 - disconnect Ethernet - this only sends 0 scores for known requests, not network listeners. Had it been sent for both entities they both would have evaluated that the networkfactory score (-1) was lower than the request score (0) and both released their refcount. (16:08:03.147) 5 - this means the listener is tracked by the EthernetNetworkFactory with a score of -1 while the factory itself has a score of -1 so the network release isn't called. bug:17361330 Change-Id: Ife34ca0f9c233dd3c3df80f6fea580af43afcdeb
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
eea87a3a44b27d849c594f1fcea57013f7c4d2fb |
|
09-Sep-2014 |
Paul Jensen <pauljensen@google.com> |
Merge "Stop logging false error when lingering completes." into lmp-dev
|
fc2c5c919973c1b3c571eadca4bdf0d99167b2d1 |
|
09-Sep-2014 |
Paul Jensen <pauljensen@google.com> |
Merge "Don't send listening NetworkRequests to NetworkFactories." into lmp-dev
|
f9b42de2ab33de2eddf0bf25d88e3f4512aaf932 |
|
09-Sep-2014 |
Paul Jensen <pauljensen@google.com> |
Merge "Implement ConnectivityManager.reportBadNetwork() to trigger network validation." into lmp-dev
|
b31c0636344d8b0888e9ccf726d3f3cf6fc6f9aa |
|
05-Sep-2014 |
Paul Jensen <pauljensen@google.com> |
Stop logging false error when lingering completes. When lingering completes ConnectivityService would log an error message saying the Network still had NetworkRequests. Fixed by ignoring listening NetworkRequests which aren't a problem. Change-Id: Ie78a1f91c47b012eae28a377dd77bee2cfcbde3b
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
d7063e66ab03f68a85ec96df2e83e2af551bef77 |
|
05-Sep-2014 |
Paul Jensen <pauljensen@google.com> |
Don't send listening NetworkRequests to NetworkFactories. We were doing this when a NetworkAgent updated its score. bug:17393458 Change-Id: Id19ffc36b942b7112da70dfadd6abd57fcd128bd
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
8f4d42ce00609e95ef1e842953c6d05fc60e991d |
|
06-Sep-2014 |
Sreeram Ramachandran <sreeram@google.com> |
Reserve NetIds 1..50 for OEM use. Also reserve 51..100 for our use. Bug: 17303534 Change-Id: Id082368b493dc3c5b5c479e51d273458d80ec6aa
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
7ccd3dfd53d8d45c447398ff137f052865dfd3b3 |
|
29-Aug-2014 |
Paul Jensen <pauljensen@google.com> |
Implement ConnectivityManager.reportBadNetwork() to trigger network validation. Network traffic used to perform the network validation is billed to the UID of the caller of reportBadNetwork. This change does not change the actions taken upon validation failing or succeeding: NetworkMonitor will show the sign-in notification if a captive portal is found. NetworkMonitor will inform ConnectivityService if a network tests functional. NetworkMonitor will not take action if a network lacks any connectivity. Also, remove an unused Thread that was confusing bandwidth billing. bug:17326268 Change-Id: I7fea23480af54211004a0a1c535a71c2793f21bb
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
17e7e9757d9fe304351dc566fd12b8c03196cee2 |
|
30-Aug-2014 |
Lorenzo Colitti <lorenzo@google.com> |
Kill the NetworkInfo(int type) constructor. IT'S A TRAP! This constructor does nothing, including doing nothing with its only argument. This causes it to return a NetworkInfo for TYPE_MOBILE no matter what was passed in. Bug: 16610051 Change-Id: I4ccd5ec050f7824fb06496c00fcd7901defeb7bd
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
b57edc5ae999abd9c7310833f4f10bbacbc469d7 |
|
23-Aug-2014 |
Lorenzo Colitti <lorenzo@google.com> |
Pass the socket mark for DNS queries to dnsmasq. This makes tethered clients use the correct DNS servers when tethering to non-default networks like the DUN APN. Bug: 16357676 Change-Id: I8933b6de198a92c2aaf0291931ace8966ddba275
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
3892fc0349a91097f53152eaf2801dfebb2066ca |
|
28-Aug-2014 |
Diego Pontoriero <diegs@google.com> |
Change TelephonyManager method name to accurately reflect functionality. Bug: 17163860 Change-Id: I4390d79c49831454146a42b89520a16984c5f260
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
2836dbb9536263a8d4e33a751fb41efc5a58186e |
|
28-Aug-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Merge "Clean up Connectivity Logging." into lmp-dev
|
fc0c6890c675494b15cd847b20c5a5ede491fc3c |
|
27-Aug-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Clean up Connectivity Logging. bug:17285109 Change-Id: I61b98aa636996f8d4915fd954d49a22c20cfe9ab
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
e30735c7dc574ac6b40d871d2bee99eb8ecd3000 |
|
27-Aug-2014 |
Paul Jensen <pauljensen@google.com> |
Merge "Fix to allow removing sign-in notification when network removed." into lmp-dev
|
5df4bec50495914b47b6a2f73f20d2bd24a9f9ea |
|
26-Aug-2014 |
Paul Jensen <pauljensen@google.com> |
Fix to allow removing sign-in notification when network removed. When the NetworkMonitor is told a network disconnected and a sign-in notification has been shown to the user, the NetworkMonitor requests the notification be removed. This request goes to the ConnectivityService who may have already removed the NetworkAgentInfo from mNetworkForNetId so we cannot look up the NetID in there. There is no harm in allowing notification hiding for networks that are disconnected as the notification logic does not effect the Network state (like the validation message that caused the addition of the Network liveness check). bug:17261757 Change-Id: Id0a299e230ae37e641ac2faeebc45550e27c1fa4
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
739d6dbf9bb11a84652d5a5b7127192c1f9a6806 |
|
26-Aug-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Merge "Remove listen requests properly." into lmp-dev
|
4456cf3ff0aa5fbd4a9a08c0987360b61fd38fa8 |
|
25-Aug-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Remove listen requests properly. https://googleplex-android-review.googlesource.com/#/c/527772/ correctly stopped adding listen requests to the mNetworkForRequestId sparse array, but when we remove requests, if it's not getting serviced by a network, we don't remove it from the network. That means that when we go to send a notification for that network we have a request affiliated with the network, but don't have data for the request and hit this NPE. If it's not a request, don't do the optimization and remove it only from the network servicing the request, but instead scan all networks and remove it from each, if found. bug:17239054 Change-Id: I49165ed08c224ef20f703469f9ce39df5f21b163
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
b98c59896cf93f019155ba95ceb2a301cea7513f |
|
23-Aug-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Update the http proxy on LinkProperty change. bug:16308315 Change-Id: Ie44634a9223f289903c09653f77a998d3a344654
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
6f91390f1a1ebef4e45ebaa78259f866cebc976f |
|
22-Aug-2014 |
Jeff Davidson <jpd@google.com> |
Allow NetworkRequest release from the system process. Otherwise attempts to release that are triggered by the binder death receipient will be rejected. Bug: 17187437 Change-Id: If3924d82dba69c572708e04c11d17ed25ae6870d
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
56a9ed858c73a8483c34c56dd77665b13e100a74 |
|
21-Aug-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Merge "Change the NetworkInfo for disconnected types." into lmp-dev
|
bdb1bdf57b8c4348a02fc085b05b7b0f57abe7b5 |
|
21-Aug-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Change the NetworkInfo for disconnected types. Don't send out NetworkInfos with UNKNOWN state for disconnected networks - use DISCONNECTED. bug:17095670 Change-Id: I863bebadc1f9a666572958b49d5e62809f485e5d
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
a945c352730b2e43d0d6ea3af4c14994a340b3e8 |
|
21-Aug-2014 |
Lorenzo Colitti <lorenzo@google.com> |
Merge "Fix findConnectionTypeForIface." into lmp-dev
|
1c3a35bcff2deeef8aa064a3e44bdd68aa18994e |
|
20-Aug-2014 |
Lorenzo Colitti <lorenzo@google.com> |
Fix findConnectionTypeForIface. This is used by the VPN to notice when its underlying connection has gone away. I'm fixing this using network types and not NetworkCapabilities because 1. I don't know of a way to use the new API to get callbacks for a specific network. You can get them based on capabilities, but it's not clear how to construct a NetworkCapabilities object that will only match a specific network, or only match the default network. 2. It's a smaller change. Bug: 15070628 Change-Id: Id6a6a183da83636c0859db4c954093bd684c01ea
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
35228d72e12ce7bdf39c4f6b09600cc4e1c3e0c1 |
|
21-Aug-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Merge "Avoid reusing a currently active NetID." into lmp-dev
|
1bbcaa0fc4e514baf8242b147f5ad40782d9f801 |
|
21-Aug-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Merge "Fix listening NetworkRequests to listen for all networks." into lmp-dev
|
0d39e6722b77a6ee7872c377fea8453f0102f2bf |
|
21-Aug-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Merge "Fix CS/NetworkMonitor race." into lmp-dev
|
60061a6ebf4ef758c4a47d210de0e5be2484be5b |
|
05-Aug-2014 |
Paul Jensen <pauljensen@google.com> |
Avoid reusing a currently active NetID. There are only a limited number (65526) of NetIDs so the chance for reusing one exists. Reusing a currently active NetID will cause problems like netd failures and overwriting entries in mNetworkForNetId. bug:16815182 Change-Id: Ib75302beae3179c3f3b90c345cf4d2cf5f4ad2be
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
73ed9d8dee5ef7139b84c8e1713fec7ff5ccce5d |
|
20-Aug-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Fix CS/NetworkMonitor race. If we have a message in flight about a NetworkAgentInfo when it gets disconnected we are left with a zombie network. Fixes this by verifing the network is still live before we process the msg. bug:17142206 Change-Id: I2c94a39b3ea97c1562066571b277280c1f69f71c
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
0311b2b31a9577a89fc0a2ed82ba761aa97df06b |
|
19-Aug-2014 |
Paul Jensen <pauljensen@google.com> |
Fix listening NetworkRequests to listen for all networks. This is a small change but should fix a number of functional problems: 1. When registering a listening NetworkRequest and when a Network is validated, we should always add the listening NetworkRequest to the Network's list of NetworkRequests if the Network satisfies the NetworkRequest. Previously in both cases this was only done for the highest scoring network. This enables the listening NetworkRequest to listen for all networks, not just the highest scoring network. 2. No longer add listening NetworkRequests to mNetworkForRequestId as it doesn't make sense as it's a 1:1 mapping but listening NetworkRequests to Networks is a many:many mapping. 3. Don't "keep" a Network that's finished validating when only a listening NetworkRequest requests it. 4. Don't send updated scores to NetworkFactories from listening NetworkRequests. NetworkFactories and NetworkAgents shouldn't concern themselves with listening NetworkRequests. bug:16680764 Change-Id: Iaba14263227771e4bd84ee4bce488beaef20a8a3
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
c8f0ffa297d1d5d51c6fa60e7d7cd56a8bc91d1d |
|
21-Aug-2014 |
Jeff Davidson <jpd@google.com> |
Merge "Less intrusive VPN dialog and other UX tweaks." into lmp-dev
|
05542603dd4f1e0ea47a3dca01de3999a9a329a9 |
|
11-Aug-2014 |
Jeff Davidson <jpd@google.com> |
Less intrusive VPN dialog and other UX tweaks. -The ability to launch VPNs is now sticky; once approved by the user, further approvals are not needed UNLESS the connection is revoked in Quick Settings. -The old persistent notification has been removed in favor of the new Quick Settings UI. -The name of the VPN app is now pulled from the label of the VPN service rather than the app itself, if one is set. Bug: 12878887 Bug: 16578022 Change-Id: I102a14c05db26ee3aef030cda971e5165f078a91
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
3f38f72a1b629f8887787415129615c506f89621 |
|
21-Aug-2014 |
Diego Pontoriero <diegs@google.com> |
Merge "Change CARRIER_SETUP hook in ConnectivityService to use Aeroshell API for determining carrier app instead of MCC/MNC." into lmp-dev
|
255dd04271088590fedc46c8e22b2fd4ab142d39 |
|
19-Aug-2014 |
Selim Cinek <cinek@google.com> |
Added notification color to all system notifications Bug: 17128331 Change-Id: I81a94510ef51b99916f314c0dd65852426a1fbeb
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
3f05bf4d7838cb719e78f9d93b22d7ce777392c5 |
|
06-Aug-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Add tcp buffer size conduit to NetworkAgent. bug: 16549611 Change-Id: I7d97dedea2c7c1aed2eccb185645889424508591
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
43074032d6ee3576416c86342da3a7a3291049a7 |
|
16-Aug-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Fix a logic error so mtu works. bug:17046179 Change-Id: I744a2fd425627da16d9779df3a96541506e0b6b3
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
15afd8115869bf22534a1f26fe6e389c9e5ef413 |
|
06-Aug-2014 |
w19976 <w19976@motorola.com> |
Configure MTU based on network MTU parameter Add logic to obtain the mtu from the network PCO parameter and set it to kernel when the mobile data connection is established. When there is no PCO mtu configured from the network, the mtu size defined in the corresponding APN will be used. In case no mtu size is defined for an APN used for data connection, the MCC/MNC based MTU defined in the framework overaly will be applied. bug:17046179 Change-Id: I6465d4b8f2076aaa380ae3617fb3f24adbe136d4
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
fb68f8fbe0213841f393f8bdb5313e4e44f4f116 |
|
13-Aug-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Don't send NetworkMonitor bcast until systemReady bug:16913951 Change-Id: I26c5c3353c2d8821452f81765875958d5b9d385b
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
d45afac287f54f610b795dcd9513bcd032695363 |
|
12-Aug-2014 |
Diego Pontoriero <diegs@google.com> |
Change CARRIER_SETUP hook in ConnectivityService to use Aeroshell API for determining carrier app instead of MCC/MNC. Related ConnectivityService change: http://ag/374479 Related Aeroshell change to SetupWizard: http://ag/520857 Bug: 16457806 Change-Id: I78eb2a25d578400c2de6bae4af3d6e8e1ee4d0c7
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
70236bf4f10b485c20fd7aab80c9309a8b8f5cbf |
|
08-Aug-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Remove extraneous clearing of inet condition This was old code I missed in previous inet condition refactor and caused us to show "not connect" icon any time we connected to a secondary network (mms/supl/etc). bug:16896743 Change-Id: I0fa62e09bb0b7c0ee0864bb1f95967eac5f60d3e
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
eb2c2c790c4b86c9c09245e0b87a38972713434a |
|
12-Aug-2014 |
Jeff Sharkey <jsharkey@android.com> |
Hack and ship: NetworkStats edition. Some devices use clatd for catching raw IPv4 traffic when running on a pure-IPv6 carrier network. In those situations, the per-UID stats are accounted against the clat iface, so framework users need to combine both the "base" and "stacked" iface usage together. This also means that policy rules (like restricting background data or battery saver) need to apply to the stacked ifaces. Finally, we need to massage stats data slightly: -- Currently xt_qtaguid double-counts the clatd traffic *leaving* the device; both against the original UID on the clat iface, and against UID 0 on the final egress interface. -- All clatd traffic *arriving* at the device is missing the extra IPv6 packet header overhead when accounted against the final UID. Bug: 12249687, 15459248, 16296564 Change-Id: I0ee59d96831f52782de7a980e4cce9b061902fff
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
bf4eed772a35a8ae6ddac1b8f6dc0744756c7c75 |
|
07-Aug-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
First pass of changing statusbar connectedness Switching from GCM-only inet condition reports to using our network validation (captive portal check). Note that currently the GCM signal is disconnected. Next step is to make the bad-network report API trigger a re-evaluation of the network and get negative reports from the NetworkMonitor. Change-Id: Ie2ebab1e5c04775e3c4d6738f656a6c8157dba76
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
eec75412a971a5ccb769364120c769c331946eb3 |
|
04-Aug-2014 |
Paul Jensen <pauljensen@google.com> |
Stop ConnectivityService from talking to netd about uncreated networks. This avoids logged netd errors that are red-herrings. bug:16667349 Change-Id: I5d6f1681f1d38dab0af4c535573a0c45c0216603
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
8043df68bff0b6e1240b571cffa7f9d9155e2281 |
|
07-Aug-2014 |
Paul Jensen <pauljensen@google.com> |
Merge "Flush DNS cache when routes change." into lmp-dev
|
5fb2c6ffe75d4089ec57ae42f2e5c7423c648dec |
|
06-Aug-2014 |
Paul Jensen <pauljensen@google.com> |
Flush DNS cache when routes change. We used to do this but the change got lost in the NetworkAgent upgrade. This brings it back. ConnectivityService has netd do the actual flushing. bug:16549455 Change-Id: I11ddd55fcb9d1ed1d2c6a9be7eb8c57e41bdbdb8
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
ab14df37ab9fcc63affb877833ee7869e1450bb2 |
|
04-Aug-2014 |
Paul Jensen <pauljensen@google.com> |
Remove dead CaptivePortalTracker. Captive portals are now detected by the NetworkMonitor. Change-Id: Ibfb04bf83b1028231397a577468f110d7ab1dc06
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
83f0f755b04075f6f342d2ae1eeef192ebecdcb3 |
|
02-Aug-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Add Logging around getNetworkInfo. bug:16610051 Change-Id: I04f19efc99bce6d990364291b6cd8105f08ab263
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
a793a671976eab3f7199e00e2fa0affb2cf5bc56 |
|
31-Jul-2014 |
Lorenzo Colitti <lorenzo@google.com> |
Improve LegacyTypeTracker. Keep track of requests as well as of networks that come and go. This is necessary, for example, to ensure that we pretend that HIPRI has gone down when the HIPRI request goes away, even though the underlying cell network is actually completely unaffected. Also, ensure that when switching default networks we send disconnect broadcasts (and do so *before* connect broadcasts, to maintain the illusion). Bug: 16610051 Change-Id: Ib3c831387124940156df05b312cc36bc0724373e
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
d49ac33b5e1c0bd0370255d8e3da64ed634e2b41 |
|
31-Jul-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Add logging of Legacy Type info. There are some bugs where getActiveNetworkInfo gives bad data (seemingly) and this will give the backing data in logs. bug:16610051 Change-Id: Iad867485ad78daeb3e88665dcd0fdb0af756a3bf
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
5c1c832a8f87850f55755202f1f7caa510449d87 |
|
29-Jul-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Remove dead code 4. Removing: handleDnsConfigurationChange updateDnsLocked updateRoutes handleConnectivityChange handleConnect handleDisconnect Adding a missing flushVmDnsCache and setting of mActiveDefaultNetwork Change-Id: I681fc72c317833ea1deb42db0b43d2adb21baeff
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
1ea93a3b4f0454a693fd1b276b47c3944c1a8bb6 |
|
27-Jul-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Remove dead code 3. Removing mNetRequestersPids and mPriorityList. Change-Id: I8295040436b62f7f6495ece7154246fb719288a4
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
f4e0c0cb8ef22fdb20ae74b444c9f4b7d15ded8b |
|
27-Jul-2014 |
Sreeram Ramachandran <sreeram@google.com> |
Allow VPNs to add/remove link addresses dynamically. Bug: 15409819 Change-Id: If91fc6891d7ce04060362c6cde8c57462394c4e8
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
6831f1d80f9a5ad2400bd186fb6179e0e511be05 |
|
27-Jul-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Remove dead code 2. Removing ConnectivityService.NetworkFactory. This requires disabling the ConnectivityServiceTest, but that's been broken since we stopped using NetworkStateTrackers anyway. Change-Id: I9b86bd37eb9d018c40f60dca5b00d62c36d4e3ad
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
39ca3f5f698c4213bff5b1982463f6d2ddbc9653 |
|
28-Jul-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Merge "Remove dead code 1." into lmp-dev
|
42065ac64cba166dc0fe602957ea8fe80bf406e2 |
|
27-Jul-2014 |
Sreeram Ramachandran <sreeram@google.com> |
Prohibit address families by default unless a VPN explicitly allows them. Bug: 15972465 Change-Id: I3278d94536fefacc86390c1ba4231680f7be8589
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
39fa65a3be4932ddadb5104fd0de9ef2121b3bc7 |
|
27-Jul-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Remove dead code 1. Starting with startUsingNetworkFeature and stop. Figure it's easier to code review incremental changes. Change-Id: I19aee65e740858c3a9a2a1a785663f6fee094334
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
f9b5c26309c9d6c2e5ad5116d8e0e055bc5818a2 |
|
27-Jul-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Move Alarm setup to systemReady. Don't register alarms before the system is ready. bug:16484913 Change-Id: Iae5c75ff8d40d4d39dbb23ff65a600b4a00cd1f0
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
8cd33ed84e94036a5e1201485af7603dc6fb0d9b |
|
24-Jul-2014 |
Sreeram Ramachandran <sreeram@google.com> |
Implement support for bypassable VPNs. Bypassable VPNs grab all traffic by default (just like secure VPNs), but: + They allow all apps to choose other networks using the multinetwork APIs. If these other networks are insecure ("untrusted"), they will enforce that the app holds the necessary permissions, such as CHANGE_NETWORK_STATE. + They support consistent routing. If an app has an existing connection over some other network when the bypassable VPN comes up, it's not interrupted. Bug: 15347374 Change-Id: Iaee9c6f6fa8103215738570d2b65d3fcf10343f3
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
fab50167a88941b1088130b6b62b1200088764cc |
|
23-Jul-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Fix DUN-based tethering. It was calling into dead ConnectivityService code rather than using the new ConnectivityManager shim code. bug:15221541 Change-Id: I1e3eea8a658a162ce36673ed1cf7b1e7e4372c42
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
a7d31bf3076a8c3ed5e9decbdf913534fd15ff66 |
|
23-Jul-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Reenable logging. ConnectivityService has been rewritten for L and is in a stabilizing period. We need the logging to track down bugs people report. Restoring to Pre-L conditions. If there's excess logging please report it - it probably indicates a bug. Change-Id: I7baf891e3bf12e1545afeb92b8d5af0b01e12a7b
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
03666c705ddabe0e7c5869ab69c2ca8b964164e9 |
|
20-Jul-2014 |
Sreeram Ramachandran <sreeram@google.com> |
Cleanup: Delete dead code. Bug: 15413389 Change-Id: I315468832ef18ffc84174e54774ab63b86d284dc
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
17d47989ee53c9e54f250d29a343ba949edf0ff9 |
|
17-Jul-2014 |
Yao Chen <yaochen@google.com> |
Updated media browsing API & tests. Change-Id: I3a1e3eead99a98b1890e05843dd90203cee517b7
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
27b02b7aba848167e263e5fec9c1c7102b334731 |
|
14-Jul-2014 |
Paul Jensen <pauljensen@google.com> |
Make a network the default when it connects if we have no default. When a network comes online, is a candidate for being the default network (i.e. satisfies default NetworkRequest), and the device has no default network, then make the new network the default network for the purposes of routing network traffic. This does not affect NetworkRequests or NetworkCallbacks. This ignores but does not affect network validation. Benefits: 1. Offers a fail-safe in case network validation returns a false negative. For example: It would be nice if every Android device didn't fail when clients3.google.com/generate_204 went down. 2. Offers a method to debug connectivity issues. For example: If WiFi is failing, disabling Cellular would rule out interference from WiFi network validation. 3. Reduces delay between no connectivity and any connectivity. 4. Offers a fail-safe in cases of unreliable networks. For example: You need rescuing from a remote location with a weak signal offering 90% packet loss. You just want your distress call to go out but are infuriated to find network validation blocks connectivity. Change-Id: I78621a1fe8ed2a336591f65bf7b07a6cbcc7ba5e
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
fdc4e4af7305514359e041dbec742f4b6561e393 |
|
15-Jul-2014 |
Paul Jensen <pauljensen@google.com> |
Fix hiding of sign-in to network notification. Don't rely on the NetworkAgent still being connected when we go to hide the notification. The notification is hidden when the NetworkAgent is disconnected so that wasn't a safe assumption. By using the NetID as the notification identifier we also fix the issue of multiple notifications of the same network type inadvertently hiding the incorrect notification with the same network type. bug:16317917 Change-Id: I01fdc466a0f430af9fc378445586ec7b83b3ac83
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
06b6cdaed5c68816faac9d2354c6caf61e65e19d |
|
12-Jul-2014 |
Sreeram Ramachandran <sreeram@google.com> |
Remove unnecessary code and APIs. This stuff has been replaced by setNetworkForUser() in NetdClient. Change-Id: If525ee259b74314191d1913f7c2a3e828e05c38f
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
9cd6e647c63be7ba726687943e139a04ed1846f7 |
|
11-Jul-2014 |
Aaron Whyte <awhyte@google.com> |
resolved conflicts for merge of d2b5f7da to master Change-Id: I8ec28728c12d7cc3ce2c4f3d09d9ce6162504618
|
f5e6747440cc0d29c663a792e32d9618f842ecf2 |
|
10-Jul-2014 |
Aaron Whyte <awhyte@google.com> |
Allow overlays to configure ConnectivityService's network sampling to not wake the device. This can increase clockwork device battery life. Bug:15455204 Change-Id: Ifc551e6a522627dc8e5cfdfb8f56d4e3cbeea936
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
bcc76d345cdad2eff0f64d1dca9f92f94c8b9f07 |
|
11-Jul-2014 |
Paul Jensen <pauljensen@google.com> |
Define NETID_UNSET in ConnectivityManager. This allows some cleanup and removal of dead code. bug:15489928 Change-Id: Iaf0507bc2e8ec6dcc253f01f61c5b221d46581f9
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
6bc2c2c34f2b23eae79ad733c97a691734055c4f |
|
07-May-2014 |
Paul Jensen <pauljensen@google.com> |
Convert Vpn from NetworkStateTracker to NetworkAgent. This eliminates the need for the ConnectivityService.VpnCallback class. This requires shifting VPNs to the new "network" netd API. VpnService.protect() is modified to no longer go through ConnectivityService. NetworkCapabilities is extended to add a transport type for VPNs and a capability requiring a non-VPN (so the default NetworkRequest isn't satisfied by a VPN). bug:15409918 Change-Id: Ic4498f1961582208add6f375ad16ce376ee9eb95
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
7237965c0d6f86a5f6e71d23645c37022edc4175 |
|
10-Jul-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Merge "Refactor wifi p2p's startDhcpServer function"
|
9c7e2c2cb491268db0322ad78856faf0582e61d1 |
|
23-Jun-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Refactor wifi p2p's startDhcpServer function Add getTetheredDhcpRanges() interface and call it before calling mNwService.startTethering to update dhcp ranges. This will allow p2p apps to run well concurently with other tethering apps. Manual import of AOSP change 81546 by jianzheng.zhou@freescale.com Change-Id: Iebc62f95bdcedde80e2c1d3e9580d3f625c3b50b
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
ff6ecccdc8c32129eed036793fef4a05becfe447 |
|
10-Jul-2014 |
Paul Jensen <pauljensen@google.com> |
Merge "Enable network validations and add app to handle captive portal login."
|
869868be653cb8eedd338e8347dfee1520d38cec |
|
15-May-2014 |
Paul Jensen <pauljensen@google.com> |
Enable network validations and add app to handle captive portal login. Network validation prevents networks claiming to provide internet connectivity from becoming the default network in cases where internet connectivity is not found to actually exist. If a captive portal is encountered the appropriate broadcasts and notifications are surfaced to allow apps to handle signing in. If no app handles signing in, my system app will handle it. Bug:15409233 Bug:15409354 Change-Id: Ie240d7eac4bdbab8cc7578782bd72d8b26de7951
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
73b6cbae0cf6ca71453c526895a735130e72c9c0 |
|
23-Jun-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Add Network inspection API. Adds getNetworksNetworkInfo. Adds getAllNetworks. Cleans up some synchronization issues. Change-Id: I82c7a4b554e3c6c1adfe6027cc54b028ed6dbac9
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
4bb015d90ae2aa3ce30778f3f584e0b7124f7505 |
|
05-Jul-2014 |
Joe LaPenna <jlapenna@google.com> |
CW on Master: Disable CaptivePortalTracker, EthernetService BUG: 15143878 Change-Id: I6c534a28c1fcd475982ae70e7f3af69f3a219e24
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
8283f8802d7e4d78c7eb031ddac07a4cfdc30771 |
|
08-Jul-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Remove dead code. Also adds a TYPE_VPN so the VPN can be strongly typed. Change-Id: Ibf39450c480f16ce5ab4c25b47965691b844fb92
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
620a5466ce5f401aafa6a438383016640ec51d1a |
|
07-Jul-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Merge "Remove unused api."
|
e585bfe80c1a4c49a17f19006129f1c45af174e2 |
|
02-Jul-2014 |
Paul Jensen <pauljensen@google.com> |
When adding a NetworkRequest, cancel linger for satisfying Network. This fixes a problem where a requested network can later suddenly disappear if it was lingering when the request arrived and later the linger timeout expired. bug:15927234 Change-Id: Ib3fae45820ce4421e3bc5b623937a16d5f1efa0f
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
17c3e0fbfcd404fb253288b386d7b39368d5852a |
|
02-Jul-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Remove unused api. bug:15595155 Change-Id: Ifd79365bd45f20f531782244f471a4cfc32a4135
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
fc6b2a0be3524e09c6e12eeaf0222a2ecf2a3007 |
|
24-Jun-2014 |
Julia Reynolds <juliacr@google.com> |
Apply the tethering user restriction to connectivity service. Bug: 15852213 Change-Id: Ib2df696189981ed1b31955257047fac3ee403965
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
2771181c9b82b6b41da7ebd47fbe1baf8791c8ac |
|
26-Jun-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Simplify the network transition wakelock. Make it all internal to ConnectivityService - we know when a network is lost, so grab a wakelock then. Moves the call out of WifiStateMachine which was grabbing at bad times like every dhcp renewal or corp-network roam. These would always go the full 1 minute and chew up battery. bug:15595155 Change-Id: I80157a818cc149072cc7706d78c1e79c6e679ab3
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
3e0e3bc617c4fd0e03b88ae04a618381b20a383c |
|
26-Jun-2014 |
Ram <ram.pl@samsung.com> |
MS: Adding Support for Emergency APN in Telephony Framework (base/telephony) Replacement for https://partner-android-review.googlesource.com/#/c/171175/ Change-Id: I16fc37f5c00ed79f2370bc46554fc7a24c52c4cb Conflicts: core/java/android/net/ConnectivityManager.java
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
7ecb42fb65ac46bf1f3c9348557fcdc54bfe9416 |
|
16-May-2014 |
Paul Jensen <pauljensen@google.com> |
Enforce ConnectivityManager.releaseNetworkRequest callers own the NetworkRequest Enforce that callers of ConnectivityManager.releaseNetworkRequest() are the creators of the NetworkRequest being released by matching UIDs. Change-Id: I439468c054bacc035e2db2c4967b24d183e78e9c
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
81c884ee525408d07ddf737f0c303d3475a7c44f |
|
20-May-2014 |
Paul Jensen <pauljensen@google.com> |
Convert BluetoothTetheringDataTracker into a NetworkFactory. bug:15407087 Change-Id: I0437ca52dedf73e8ec69ac82e46353f6fafc4a42
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
76ea6c68d3222441970ef98079ba30710ac8c595 |
|
23-Jun-2014 |
Lorenzo Colitti <lorenzo@google.com> |
Teach LinkProperties whether it's provisioned or not. In IPv4, a link is provisioned when DHCP succeeds. In IPv6, a there is no such signal, because addresses and DNS servers can be notified by the kernel at different times. Add an isProvisioned method that returns true if we believe that enough information has configured to use a network. For IPv6, this requires an IP address, default route, and DNS server. For IPv4, this requires only an IPv4 address, because we support static configuration that doesn't have a default route or DNS server. To do this we use the existing hasIPv4Address method, rename the all-but unused hasIPv6Address method to hasGlobalIPv6Address (which is what we want anyway) and add new hasIPv[46]DefaultRoute and hasIPv[46]DnsServer methods. Bug: 9180552 Change-Id: Ib2f5ff8af920f7b6f1edf0e2afaaa0edce9bc72d
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
52a327263d1cdbab53f9d9087b67bcfea087407e |
|
13-Jun-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
am 2d0ab42b: Merge "Apply API Council comments to ConnectivityManager" into lmp-preview-dev * commit '2d0ab42b1420db884d26fd2ef22710b5a887e9a6': Apply API Council comments to ConnectivityManager
|
6078b50b017fbcf8d6cbf9f83226ed5667d5729e |
|
12-Jun-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Apply API Council comments to ConnectivityManager rename isNetworkActive -> isDefaultNetworkActive rename registerNetworkActiveListener -> registerDefaultNetworkActiveListener make listenForNetwork/requestNetwork take a NetworkRequest rename NetworkCallbackListener -> NetworkCallback rename listenForNetwork -> registerNetworkCallback rename releaseNetworkRequest -> unregisterNetworkCallback remove NetworkRequest param from NetworkCallback functions rename onNetworkCapabilitiesChagned to onCapabilitiesChanged remove onReleased change time units in onLosing from Sec -> ms bug: 15142362 Change-Id: Ibc96e3f461706efe1eafa0d85605249cfd6e9fdd
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
7c9f5529ea07fda43a68f9b5de204cf2b90d1b61 |
|
12-Jun-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
am 558aeb90: Merge "Make NetworkCapabilities publicly immutable." into lmp-preview-dev * commit '558aeb901144fac460575402e38fc8baa2da83eb': Make NetworkCapabilities publicly immutable.
|
7569f1811f6061b2a6605c69bca1bb7af72ae1a0 |
|
09-Jun-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Make NetworkCapabilities publicly immutable. Applying API council comments. bug: 15142362 (cherry picked from commit Ie0bde68b72656a676d90c0343b9756fe9268d8d6) Change-Id: Ie0bde68b72656a676d90c0343b9756fe9268d8d6
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
594b456b6e2aa4142fa31394cdd39bd4cc7a1d3a |
|
12-Jun-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Merge "Minor changes to the LinkAddress API docs." into lmp-preview-dev
|
55213c80229cc9cbec328f0ec9a842f5d66c35c2 |
|
12-Jun-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Merge "Add a new IpPrefix class and use it in RouteInfo." into lmp-preview-dev
|
6307b35e1d3a8d577877be0b4c9cea1a909b6329 |
|
04-Jun-2014 |
Sreeram Ramachandran <sreeram@google.com> |
Add a new IpPrefix class and use it in RouteInfo. This change uses IpPrefix only in the public API and continues to use LinkAddress for everything else. It does not change the callers to use the new APIs, with the exception of changing all current uses of getDestination to getDestinationLinkAddress to make room for the new getDestination method that returns an IpPrefix. Based on Sreeram's earlier change: https://googleplex-android-review.git.corp.google.com/#/c/477874/ but a bit simplified and with a bit more documentation. Bug: 15142362 Bug: 13885501 Change-Id: Ib4cd96b22cbff4ea31bb26a7853989f50da8de4e (cherry picked from commit 7d3b4b9a3d4de9673119632da0ebd583e50126f7)
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
00a0fd650b7a31dffb88c229242bb04fa0b487a4 |
|
09-Jun-2014 |
Lorenzo Colitti <lorenzo@google.com> |
Minor changes to the LinkAddress API docs. 1. Rename getNetworkPrefixLength to getPrefixLength. Update all callers in frameworks/base and add a shim method and a TODO for the rest. 2. @hide isSameAddressAs. It doesn't add much, and it's just one-liner that callers can implement if they want. 3. Fix the alignment of the initial paragraph (<ul> should have been </ul>). 4. Remove the documentation that talks about creating LinkAddresses, since there's no public API for creating them. With these changes I think LinkAddress is fine as a public API. Bug: 15142362 Change-Id: Iaf3b1db577745bb68a9e1dd7f96d666dd3f3ec7c (cherry picked from commit 9ab53650cfcd91a2a151b44b3fd1381841f76269)
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
25702b39675c51dd4963eb71b66b20126a55cc05 |
|
06-Jun-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Fix public API of LinkProperties. bug:15142362 (cherry picked from commit 51d898fd0223a4b7c728980ab987dd985c02df5f) Change-Id: I1457111da7d3bd09998f7e010febb8bb4c45c8bc
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
7dc78cf3af9fd11a4f1e2e981ce584a23755ea9e |
|
09-Jun-2014 |
Lorenzo Colitti <lorenzo@google.com> |
Minor changes to the LinkAddress API docs. 1. Rename getNetworkPrefixLength to getPrefixLength. Update all callers in frameworks/base and add a shim method and a TODO for the rest. 2. @hide isSameAddressAs. It doesn't add much, and it's just one-liner that callers can implement if they want. 3. Fix the alignment of the initial paragraph (<ul> should have been </ul>). 4. Remove the documentation that talks about creating LinkAddresses, since there's no public API for creating them. With these changes I think LinkAddress is fine as a public API. Bug: 15142362 Change-Id: Iaf3b1db577745bb68a9e1dd7f96d666dd3f3ec7c
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
cc91c7b804a079f7b20404827277c61dd403805f |
|
04-Jun-2014 |
Sreeram Ramachandran <sreeram@google.com> |
Add a new IpPrefix class and use it in RouteInfo. This change uses IpPrefix only in the public API and continues to use LinkAddress for everything else. It does not change the callers to use the new APIs, with the exception of changing all current uses of getDestination to getDestinationLinkAddress to make room for the new getDestination method that returns an IpPrefix. Based on Sreeram's earlier change: https://googleplex-android-review.git.corp.google.com/#/c/477874/ but a bit simplified and with a bit more documentation. Bug: 15142362 Bug: 13885501 Change-Id: Ib4cd96b22cbff4ea31bb26a7853989f50da8de4e
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
0409e9f0af69e1941b025c6c5cb788036a9dc7b6 |
|
10-Jun-2014 |
Amit Mahajan <amitmahajan@google.com> |
resolved conflicts for merge of 437a77d4 to master Change-Id: I65585939a57c561064d370be131c0197de0f08c3
|
3f175a3587f5f7c7d6189c0fd09468bae4e81325 |
|
09-Jun-2014 |
Amit Mahajan <amitmahajan@google.com> |
am e5a28d34: am 20c5ce50: Handle provisioning APN by turning off/on radio. * commit 'e5a28d34f662c469f85590dda28fc02eca12204b': Handle provisioning APN by turning off/on radio.
|
df2b878ff4e7b4a258588d3a93574c399db78a07 |
|
06-Jun-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Fix public API of LinkProperties. bug:15142362 Change-Id: I1457111da7d3bd09998f7e010febb8bb4c45c8bc
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
8ae980dcef1265f69fe41338f17266c2a8ec8d20 |
|
04-Jun-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
DO NOT MERGE Report new network scores back to factories. This is a first order approx of what we want - should probably be good enough in most cases. bug:15277751 Change-Id: I10e3b25f6ad5c7e022ba966ed514d4e6a999180d (cherry picked from commit 94a5c61cb82401dd777d0a7ac43183d92d955323)
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
a995aba36fff573e30859e29a736e151e56fb50a |
|
04-Jun-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Merge "Report new network scores back to factories."
|
ac96c52350a16706570f97491034fa8565c42a5e |
|
04-Jun-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Report new network scores back to factories. This is a first order approx of what we want - should probably be good enough in most cases. bug:15277751 Change-Id: I10e3b25f6ad5c7e022ba966ed514d4e6a999180d
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
2d37070ec13df5650093f8967655938298290ee7 |
|
04-Jun-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Fix legacy APIs. Two fixes. First make sure we mark the request as handled by the network handling it. Second, convert ensureRouteToHostForAddress to use the new legacyNetworkForType. bug:14993207 Change-Id: I230968938ca0ed91f834b36a2af60caff2eab682
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
32aa65a11207e1fb7d346a68fdf3299f87a20db4 |
|
03-Jun-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Fix Legacy NetworkInfo API Make the connectivity changed broadcasts send correct NetworkInfos. Also update the results of getNetwork. bug:15290306 bug:15191336 bug:14993207 Change-Id: Ie99ad25f3ebb90d18348e7013761b139e7481866 (cherry picked from commit 16fe1c18289de200d2249e51db8c0986619f487b)
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
b90b20b5d57809da5c91bac9ff45c2ac323d9637 |
|
03-Jun-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Fix Legacy NetworkInfo API Make the connectivity changed broadcasts send correct NetworkInfos. Also update the results of getNetwork. bug:15290306 bug:15191336 bug:14993207 Change-Id: Ie99ad25f3ebb90d18348e7013761b139e7481866
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
55691b8cc725297e0d36799e234cba3c8c3410f6 |
|
27-May-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Refactor NetworkFactory. Make NetworkFactory a concrete class and divide responsibilites between it and NetworkAgent. Factory will track requests and by default give a single connect/disconnect api for ease of use. Then NetworkAgent is created and destroyed as needed with very simple logic. Change-Id: I401c14a6e5466f2fc63b04219b97ff85bb9af291 (cherry picked from commit 9a17b9c5a256cb4bb14821c5ee89b03b99c045e8)
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
562cc54536f1e75d80855de4d1eccaeefd689a32 |
|
16-May-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Rewrite startUsingNetworkFeature for new API bug:14993207 Change-Id: I041a80faa07bf3094af13a6c606f3b15aa03f789 (cherry picked from commit 09fe5e618b09965183cf53fba87c39025a19e8d1)
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
3192dec32180f56733e631c2d9ec62fa1359283d |
|
27-May-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Refactor NetworkFactory. Make NetworkFactory a concrete class and divide responsibilites between it and NetworkAgent. Factory will track requests and by default give a single connect/disconnect api for ease of use. Then NetworkAgent is created and destroyed as needed with very simple logic. Change-Id: I401c14a6e5466f2fc63b04219b97ff85bb9af291
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
8f3799867d2c3322a7191803b2dda54583305ea0 |
|
03-Jun-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Merge "Rewrite startUsingNetworkFeature for new API"
|
515350a5e2b3fcac79f4ecfbd3d4d7485c04eff5 |
|
23-May-2014 |
Sreeram Ramachandran <sreeram@google.com> |
Support legacy routes added by apps via ensureRouteToHost(). Change-Id: I0ee1ca89fdc859d75a89021ca8c1902811b1e4a9 (cherry picked from commit fb17b32550de624b7f476b70b7a2fc77f31dde7d)
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
1fbcb2719828f16aec8b2d742a20b98e4a2cf17c |
|
23-May-2014 |
Sreeram Ramachandran <sreeram@google.com> |
Support legacy routes added by apps via ensureRouteToHost(). Change-Id: I0ee1ca89fdc859d75a89021ca8c1902811b1e4a9
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
bce0106c417db7dd04daec9dc4cef9e7cf30446d |
|
29-May-2014 |
Lorenzo Colitti <lorenzo@google.com> |
Don't break things if a network goes back to CONNECTED. Currently, if a network goes from CONNECTED to some other "live" state (e.g., CONNECTING, because it's VERIFYING_POOR_LINK) and back, ConnectivityService treats it as if a new network had connected. This causes it to attempt to create the network (which fails, since a network with that netid already exists), to trigger verification, and if the verification succeeds, to tear down the network because the request it's satisfying is already satisfied by the network itself. Instead, if creating the network fails, assume it's because the network had already been created, and bail out. Also, when validation completes, ignore NetworkRequests that were being served by the same NetworkAgent as before. Bug: 15244052 (cherry picked from commit cfff026ec47afc7e31f60f80e3deea7f4e2f9be5) Change-Id: I52c2220e8f1d98fca765880be3040593e92722ed
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
51ed158a946f3a908b691389296dbb0136bc1c9c |
|
29-May-2014 |
Lorenzo Colitti <lorenzo@google.com> |
Don't break things if a network goes back to CONNECTED. Currently, if a network goes from CONNECTED to some other "live" state (e.g., CONNECTING, because it's VERIFYING_POOR_LINK) and back, ConnectivityService treats it as if a new network had connected. This causes it to attempt to create the network (which fails, since a network with that netid already exists), to trigger verification, and if the verification succeeds, to tear down the network because the request it's satisfying is already satisfied by the network itself. Instead, if creating the network fails, assume it's because the network had already been created, and bail out. Also, when validation completes, ignore NetworkRequests that were being served by the same NetworkAgent as before. Bug: 15244052 Change-Id: Ifd73558e5be452d9ef88c64cca429d5f302bf354
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
afa05c0b43cbc065181d5c2d6ee368a08bb00c3b |
|
22-May-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Move dis/enable of mobile data to Telephony ConnectivityService doesn't do this anymore. bug:15077247 Change-Id: I3208c91b2c0369b594987f39ca29da7478435513 (cherry picked from commit 53013c87496980b534e447e717a32698fbd4bca0)
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
71bf33a02f49444fbfa35b267c70592f3b07a07d |
|
16-May-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Rewrite startUsingNetworkFeature for new API bug:14993207 Change-Id: I041a80faa07bf3094af13a6c606f3b15aa03f789
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
293251318168ad2dbfeb3d18176936fe2cc16325 |
|
22-May-2014 |
Dianne Hackborn <hackbod@google.com> |
(DO NOT MERGE) Battery monitoring fixes: - Improve monitoring of level changes to not be confused when it goes up while draining or down while charging. - Put back in connectivity service code to tell battery stats about the interfaces. - Turn back on reporting of mobile radio active state from the RIL. - Fix bug in marshalling/unmarshalling that would cause the UI to show bad data. Change-Id: I733ef52702894cca81a0813eccdfc1023e546fce
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
02a217fad03a695522b2c4d4872f69e3e083059e |
|
22-May-2014 |
Dianne Hackborn <hackbod@google.com> |
Merge "Battery monitoring fixes:"
|
2d4b4ed681efcfb64c4d2b4d2a2d236aae1dc7ee |
|
22-May-2014 |
Dianne Hackborn <hackbod@google.com> |
Battery monitoring fixes: - Improve monitoring of level changes to not be confused when it goes up while draining or down while charging. - Put back in connectivity service code to tell battery stats about the interfaces. - Turn back on reporting of mobile radio active state from the RIL. - Fix bug in marshalling/unmarshalling that would cause the UI to show bad data. Change-Id: I733ef52702894cca81a0813eccdfc1023e546fce
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
47eecf03307acfb1bc7d4ad51311beb4eeb99366 |
|
22-May-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Move dis/enable of mobile data to Telephony ConnectivityService doesn't do this anymore. bug:15077247 Change-Id: I3208c91b2c0369b594987f39ca29da7478435513
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
3c44c99af500601fbb8ba6b8f71e5d930ca5e269 |
|
22-May-2014 |
Lorenzo Colitti <lorenzo@google.com> |
Delete the EthernetDataTracker. Code search says these are the only two files that use it. The tracker will be resurrected in a slightly different form in frameworks/opt/net/ethernet. Bug: 14993642 Bug: 14981801 Change-Id: I2477668ca78dfe46661dda1d97c7f786fd7eba35
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
a67be03f9e2734c0a6c03af20e17f963daaed257 |
|
17-May-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Add NetworkFactory names and unregistration. Some Factories come and go (Telephony) and so they need to be able to unregister. Also, debugging is tough when the factories are anonymous, so add names for logging. Lastly, only send single set of NetworkRequests to a newly registered NetworkFactory and only send the requests. Change-Id: I717d63363f25c446f8ecf38d933b1a35d744af6e
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
5d2e896457b3a803309f7babeb984a7d1a3b4f5f |
|
19-May-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Fix the build Change-Id: I18f78f6055f6f9c14571058d6834c8dec01aa732
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
34524f06fb77607884c69f891471725f4ac0889a |
|
19-May-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Add javadoc for NetworkRequest. Also moved the requestId serial number out of this public class into CS. Had to leave NetworkRequest hidden for now because the docs refer to things still hidden in ConnectivityManager. Change-Id: I14d1fe52d992adf5e4dc197b8f5433e40b0adfe6
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
311060571ccf5c9bd6ece57c109a22494d1c1db1 |
|
17-May-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Decouple network_sampling frequency from VDBG Add a special debug flag for testing network sampling. Change-Id: Ibe572c3b5648ca25f1e5be2c61e5c5ad2979b2cb
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
fcfef283d8707f8e695645fe10dba531b7673c14 |
|
16-May-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Merge "Clean up when we switch networks."
|
4064af844ca6e58dc2908525634c13c4be277eac |
|
16-May-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Clean up when we switch networks. Need to unhitch mNetworkForRequestId when a network is no longer satisfying a request. Change-Id: I3b3cde7dd92ec87a76ae7a0825ad22e892fa8fd5
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
d5648dcf6a477a350c281c769bae07b8cbe982a3 |
|
16-May-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Add net.dns system properties Some apps rely on them. bug: 14992618 Change-Id: I5766f26b77004e9cfcc90fac657817eab67f9ac7
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
54b6fd0cbe48fc0980da0617352785c973c60c86 |
|
14-May-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Merge "Add networks and requests to CS.dump"
|
c9c90c771c9cd1381a49b714df9a2bc392959fcc |
|
14-May-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Add networks and requests to CS.dump Adds debugging. Change-Id: I352dfe970c990fd210f3d1598519e321bbdd6ed5 (cherry picked from commit 9bdf6bd99db56c652ba9a62d91f258d11d19ca9f)
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
9258c64bef1a01fe89bc7c1fa402c44c0e6a1255 |
|
27-Mar-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Add Multinetwork API Change-Id: I3a9cef0d416db96d05098dd989ee3fef3b1e9274 (cherry picked from commit cc5e6afa1ba0bef099bcb21a64a36bc2bf7951db)
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
12e6735f77a6f8cbf71edde4f156f40668d2d25b |
|
14-May-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Handle legacy synchronous inspectors getNetworkInfo, getActiveNetworkInfo, etc Conflicts: services/core/java/com/android/server/ConnectivityService.java Change-Id: I4611d6481b1a76fe4a4ce22232a2a329de2a6e0c
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
3b75982e39ed9370153ae7f238f1d6041b9506ed |
|
13-May-2014 |
Paul Jensen <pauljensen@google.com> |
Get clatd/Nat464Xlat working with new NetworkAgents. Change-Id: I65dfb59ce519a42bdb872940d229039b5403fd92
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
7ef92576016aaa43e3488b6ddc213b7c1e52b118 |
|
14-May-2014 |
Lorenzo Colitti <lorenzo@google.com> |
Fix compile errors after merge. These are due to changes to ConnectivityService that were made after master-multinetwork-dev branched off. They mostly didn't cause merge conflicts because they were in different parts of the file from the multinetwork changes, but they cause compile errors now. These particular changes should be fine - they are all in dead code anyway, and their functionality had already been re-implemented in the new code. Change-Id: I0ac9e39c3c975c8e8dc04ad11b6b85366693865c
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
b6bb6c61dd77c1b3007f0b0bbb89ee693e63d0b6 |
|
12-May-2014 |
Paul Jensen <pauljensen@google.com> |
Disable calls to MobileDataStateTracker.isProvisioning() as there is no more MobileDataStateTracker so these just crash. Change-Id: Ib45a85db505c0a99fb65d9a6d0c39b860f9d019d
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
ca8f16ad14819ba17f5ff3d2e2bf6fbc9bbaa9f7 |
|
09-May-2014 |
Paul Jensen <pauljensen@google.com> |
Add NetworkMonitor. At present the network evaluation / captive portal detection is disabled pending addition of API to bind socket to network. Change-Id: I5d1f5dc86d4dd9481d52dd45d6da0732054c8315
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
992f25257938ecc0378514f21c6e6e6375272976 |
|
28-Apr-2014 |
Paul Jensen <pauljensen@google.com> |
Separate network and interface addition/removal netd APIs. This should facilitate stacked interfaces (i.e. clatd). Change-Id: Ib3e7a4d3847ef6ec4449451f6da42e75959baa4f
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
7b81602f3c18df8a4ca0342c514af8f7e394c0d7 |
|
19-Apr-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Enabling internal msg apis NetworkFactory and NetworkAgent. First trying with wifi and getting rid of WifiStateTracker. Conflicts: api/current.txt services/core/java/com/android/server/ConnectivityService.java Change-Id: I7f0ec13d7d8988b32f3c6dc71f72012f3349fe02
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
b2829fa165124264c7ec06a6e23b08a1d97b99e5 |
|
16-Apr-2014 |
Sreeram Ramachandran <sreeram@google.com> |
Specify netId when adding/removing routes. Change-Id: I07fd950aee726e9721153f75c3e4c10d8e19d8e9
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
79a10584802f327bcfca11c5000658b3be74819d |
|
16-Apr-2014 |
Sreeram Ramachandran <sreeram@google.com> |
Set and clear the default network. Change-Id: I305951e0c4735d708804baa597cc2d9b10f501c0
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
13e817df516a803fbedeacca2c802a9fc1c1370f |
|
10-Apr-2014 |
Paul Jensen <pauljensen@google.com> |
Use NetId instead of interface name when communicating DNS changes to netd. Change-Id: Ic82b73de6f50d39d56c5e1a32f5b1f3ebb80bb7d
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
89fb3eb718f890ace30e63bd4ab4ad5409d8600d |
|
31-Mar-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Stop adding host routes for dns bug:13550136 Change-Id: I748e13b96dab111f8f6a4b11d9beaf2a72d0742b
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
e049c23980409be6576da3d30538a6cdc43854dd |
|
12-Apr-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Add NetworkFactory support. This is a protocol allowing transports to dynamically register with CS for Handler to Handler communications. bug:13885501 Change-Id: Ic7275e3724a15efc7e5f80981560c4cb3106007b
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
9876e6334d1d3649ecd1e99e597834e70c531d57 |
|
13-May-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Comment out some new netd calls to fix networking. bug:14869053 Change-Id: Ifc44f3cbadd0402c7b06e01962695e6b65dc48b3
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
f9cb86aebe9647e0fe0137fc198ba16c017445c6 |
|
09-Apr-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Replace LinkCapabilities with NetworkCapabilities Also remove unused LinkSocket and LinkSocketNotifier. bug:13885501 Change-Id: Id426e31b201fa4f29109b5fea485d8efb34519d3
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
9ba9c58e4a249456794fbfb9989f27bd846d067e |
|
20-Mar-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
First pass on multinetwork framework Starting to switch netd to use NetId. Adding the Network identifying class bug:13550136 Change-Id: Ie0db4fb17c9300bfafb63329adfa02339911b33d
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
56cf1ab4105cffd5afb3abd1411fd38d98002853 |
|
28-Apr-2014 |
Jason Monk <jmonk@google.com> |
Fix Global Proxy when used with PAC Since PAC needs to relay the local proxy port back to the ConnectivityService it ends up calling handleApplyDefaultProxy... This works fine for PAC on WiFi, but when tested on global proxy (not currently used anywhere), it sets the mDefaultProxy. This mDefaultProxy does not get cleared when the global proxy is cleared and requires a reboot to get things cleared out. This CL adds a check to overwrite mGlobalProxy rather than mDefaultProxy in this use case. Change-Id: I92782d11e213b91f8ddda2faaf996a7252273fc3
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
207900c23b26d0df9ab28c709db4a1007d7d7904 |
|
25-Apr-2014 |
Jason Monk <jmonk@google.com> |
Make proxy API public Also exposed proxy-related functions that were on the ConnectivityManager. Change-Id: I9fb5f1bcc257a6198679ea1d56e18da2ec5a3b33
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
ff3bb2fe95a7d0158f5a456368eb7fa91069bc23 |
|
24-Mar-2014 |
Chad Brubaker <cbrubaker@google.com> |
am 7f623d6b: am 9506e84b: am c7726147: am 1fce89d9: am de4e7b49: Merge "Include the interface for clearDnsInterfaceForUidRange" into klp-dev * commit '7f623d6b9459bc982c49f0a74aa2c9911f8e1dd8': Include the interface for clearDnsInterfaceForUidRange
|
c77261471432e1577586395dd0a6a481ef7431b5 |
|
21-Mar-2014 |
Chad Brubaker <cbrubaker@google.com> |
am 1fce89d9: am de4e7b49: Merge "Include the interface for clearDnsInterfaceForUidRange" into klp-dev * commit '1fce89d946760a1bcf3a733f55494f963eab00c2': Include the interface for clearDnsInterfaceForUidRange
|
4a6f0879502bea0258876497926aa31e7e837032 |
|
19-Mar-2014 |
Etan Cohen <etancohen@google.com> |
Merge "Catch Netd exceptions to avoid runtime restart"
|
d9cb2f3d062d409f5300a131cd920313fb92580e |
|
19-Mar-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Catch Netd exceptions to avoid runtime restart bug:13475636 Change-Id: If36a0051a957fc066711fe8225f8981bc07add04
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
1b98e90db063da97c6bb9d47aa9798c8c32a58b5 |
|
19-Mar-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
resolved conflicts for merge of 0bff77d6 to master Change-Id: Ia4c86126079740978658a05579b56d59d41a7b01
|
42b746e4d8baa6141598ddaae7148baea2ddf366 |
|
19-Mar-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
am bd84f01c: am 5d3d4ee3: Merge "Handle provisioning APN by turning off/on data." into klp-dev * commit 'bd84f01c6ce122ab58fc7c5b687dc8bfb0fb03e6': Handle provisioning APN by turning off/on data.
|
0535a9f7aa5d0f875b06845e9af5f6dbfc5c8a19 |
|
13-Mar-2014 |
Ashish Sharma <ashishsharma@google.com> |
Include elapsed realtime (nanos) of the event in the radio state change notifications. Bug: 13247811 Change-Id: I3454aa159a68b9087b4762df947b41965b5a3941
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
4f26139661b0039cff5e570975e6bf9b0bbce1af |
|
14-Mar-2014 |
JP Abgrall <jpa@google.com> |
am 4ecd833e: am 7baa7c80: Merge "ConnectivityService: add support to set TCP initial rwnd" into klp-dev * commit '4ecd833ee35d1120f8c1ae52367947cacfc263a4': ConnectivityService: add support to set TCP initial rwnd
|
7c2b1625d66d3c80c313160f78c8bccd9499539e |
|
14-Mar-2014 |
Chad Brubaker <cbrubaker@google.com> |
am 78f204ae: am 8e240af5: Merge "Remove SO_BINDTODEVICE from VPN protect" into klp-dev * commit '78f204aed8c0f3c8174616801d66f96a9a00a5fd': Remove SO_BINDTODEVICE from VPN protect
|
74f99a4e904af56a62f86b81831c23c763b6001e |
|
13-Mar-2014 |
Chad Brubaker <cbrubaker@google.com> |
am 7fb07438: am 674f85af: Merge "Only allow System apps to make VPN exempt routes" into klp-dev * commit '7fb074389370ac93afc5830189371dc3ec26265c': Only allow System apps to make VPN exempt routes
|
f5729a6a1573ba27f69a5c5dc144be3f8f60b026 |
|
13-Mar-2014 |
Chad Brubaker <cbrubaker@google.com> |
am 1011960c: am decfd707: Merge "Add the calling package name to requestRouteToHost" into klp-dev * commit '1011960c44a4f84d53d05199fe1ca09be9473822': Add the calling package name to requestRouteToHost
|
bf9eec4c3bbbacd0954d819c18709962a81338bf |
|
05-Mar-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
am 1c8ba7e5: am bad3a9e6: am 2d1e8c49: Merge "Only apply tcp buffer sizes for default net" into klp-dev * commit '1c8ba7e551274782f3f61b90807711a056cc9730': Only apply tcp buffer sizes for default net
|
0f3237476904a59e351ef1d451cb7453b63b1d58 |
|
04-Mar-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Merge "Only apply tcp buffer sizes for default net"
|
d49f64c6054dc864f651fc57a174cc3991571548 |
|
01-Mar-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Only apply tcp buffer sizes for default net This may mean that secondary networks have bad network settings, but currently default settings are overriden by secondary nets which seems worse. bug:13211589 Change-Id: I3ef1a17ccde05306d786729c4369a31f78b2ebcf
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
77b987f1a1bb6028a871de01065b94c4cfff0b5c |
|
27-Feb-2014 |
Dianne Hackborn <hackbod@google.com> |
Hold a wake lock while dispatching network activity events. Also add new API for determining whether the current data network is active, and thus better scheduling network operations. This API is designed to not be tied to a mobile network -- regardless of the network, apps can use it to determine whether they should initiate activity or wait. On non-mobile networks, it simply always reports as the network being active. This changed involved reworking how the idle timers are done so that we only register an idle timer with the current default network. This way, we can know whether we currently expect to get callbacks about the network being active, or should just always report that it is active. (Ultimately we need to be getting this radio active data from the radio itself.) Change-Id: Iaf6cc91a960d7542a70b72f87a7db26d12c4ea8e
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
f87b2248497223a18ee0e5403967a5de55d8cbb5 |
|
28-Feb-2014 |
Chad Brubaker <cbrubaker@google.com> |
Merge "Remove SO_BINDTODEVICE from VPN protect"
|
786e71ab11f2d89afffc9db7473f16206395c813 |
|
06-Feb-2014 |
Jake Hamby <jhamby@google.com> |
Remove unneeded new RIL command. Remove the recently added RIL_REQUEST_SET_RADIO_MODE command and update the definition of the RIL_REQUEST_NV_RESET_CONFIG parameter. Also remove some accidentally added debug log lines. Bug: 12864208 Change-Id: I6f035d6900c9fcb1427bad62057d7b4a1d3cd99c
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
9862a48574bc088eed97ce8a23b51797e623f863 |
|
24-Feb-2014 |
Chad Brubaker <cbrubaker@google.com> |
Merge "Only allow System apps to make VPN exempt routes"
|
4845037a48aa4463028fbea912dcb982a56daaa2 |
|
24-Feb-2014 |
Chad Brubaker <cbrubaker@google.com> |
Merge "Add the calling package name to requestRouteToHost"
|
c023453a2b79b338aea36b48fd610a099379d34c |
|
14-Feb-2014 |
Chad Brubaker <cbrubaker@google.com> |
Only allow System apps to make VPN exempt routes requestRouteToHost will only allow system applications to make routes exempt from the VPN's routing rules. If a VPN is currently running and a non-system app requests a route it will only succeed if that host is currently covered by a VPN exempt routing rule. Otherwise it will fail. For example, if a VPN is running and the MMS network is brought online those routes will be added as VPN exempt. If an application then tries to request a route to a MMS endpoint it will succeed because the routes already exist. If an application tries to request a route to a host covered by the VPN the call will fail. Bug: 12937545 Change-Id: If7bcec91bbb96c62c8fb69748c975847e6c00b6f
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
32d1ac4d45c25180cb841664986398c7e23995e4 |
|
21-Feb-2014 |
JP Abgrall <jpa@google.com> |
ConnectivityService: add support to set TCP initial rwnd The value for the TCP initial receive window comes from, in order, kernel /proc/sys/net/ipv4/tcp_default_init_rwnd init.rc (via properties) net.tcp.default_init_rwnd properties net.tcp.default_init_rwnd gservices Settings.Global.TCP_DEFAULT_INIT_RWND Bug: 12020135 Change-Id: I0e271be19472900fa9f3bab037d53383ec014a9e
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
a45610fc1f767d014c0773a910e3e6a1a280db5d |
|
19-Feb-2014 |
Patrick Tjin <pattjin@google.com> |
Modify unexpected mtu debug message to print mtu Change-Id: Iacc78582c5e3d6b156e8e2eda25e89e0e5be6eda
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
f81daa986e3a2d75c6f2398a59b965790484e0a2 |
|
14-Feb-2014 |
Chad Brubaker <cbrubaker@google.com> |
Add the calling package name to requestRouteToHost The calling package name will be used to check if an application is a system application when deciding if a route should be exempt from VPN routing rules. Bug: 12937545 Change-Id: I2c09c875fe9bb9685871a0a801ddcbb32fc17405
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
bcf12b302cd2715de54493808b2503de05c53757 |
|
11-Feb-2014 |
Chad Brubaker <cbrubaker@google.com> |
Remove SO_BINDTODEVICE from VPN protect SO_BINDTODEVICE is not needed with policy routing. SO_BINDTODEVICE was also used on the default iface which causes problems when the default iface is IPv6 only and the socket tries to connect to a IPv4 address. Bug: 12940882 Change-Id: I5b2bde0ac5459433fc5749f509072a548532f730
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
e13c4c0b664dabdc069ca8f9601d96a337eb02f9 |
|
12-Feb-2014 |
Dianne Hackborn <hackbod@google.com> |
Start tracking radio up time. We now always turn on network state tracking for mobile, and push this information down to battery stats. In battery stats we use this to both log the changes in the history and keep track of the total time the mobile radio was active. Power computation is switched over to using this information to help determine power use, which will hopefully make it more accurate (not counting inaccuracies in knowing when it actually goes down). Note yet done is aggregating this data per-uid, to better emphasize which apps are causing the radio to be up. Right now we just spread the total time across all uids weighted by the total number of packets they have sent and received. Also put in the battery stats infrastructure for bluetooth to address issue #12973036: Improve power_profile.xml Change-Id: I39d11b7ff6ae4f336f253d1cba308d8569de7e0d
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
8f9b33e77686de8e917ba61c5e2f2e31a1e0e49b |
|
15-Jan-2014 |
Jake Hamby <jhamby@google.com> |
Add new RIL commands to read/write NV items and reset NV config. Add new RIL commands and generic code cleanups. The only changes required for OMA DM support are the addition of five new methods in ITelephony.aidl for reading/writing NV items and performing NV config and radio resets (requires MODIFY_PHONE_STATE), along with the new RIL request IDs in RILConstants.java. Bug: 12864208 Change-Id: I958d2571580d98a49936ef2e6822e5ac086acbe2
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
945d69d7b843ed319ec98986b033ea7b86383e69 |
|
31-Jan-2014 |
Hui Lu <huilu@google.com> |
am 3cab7fc1: Merge "Add proxy as another network." into klp-modular-dev * commit '3cab7fc1b8f06166df3a58cf10d4a0db36bde788': Add proxy as another network.
|
1c5624a0128397fa6fd6484e6a473bad10547a34 |
|
15-Jan-2014 |
Hui Lu <huilu@google.com> |
Add proxy as another network. Change-Id: I70cb6ac5604c4f0d6a752a291c40de2445ae98bb
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
d01f8422dad3a8933111b334a8f9c2469bd0e4a6 |
|
24-Jan-2014 |
Robert Greenwalt <rgreenwalt@google.com> |
Clean up dhcp no-op logging bug:10553167 Change-Id: I1f6feb9a44e17d45ffc9f28b37bf5690230a3ade
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|
49782e46c0eb85a25ae2abcf80880c48dbab5aea |
|
20-Dec-2013 |
Amith Yamasani <yamasani@google.com> |
am 9158825f: Move some system services to separate directories * commit '9158825f9c41869689d6b1786d7c7aa8bdd524ce': Move some system services to separate directories
|
9158825f9c41869689d6b1786d7c7aa8bdd524ce |
|
22-Nov-2013 |
Amith Yamasani <yamasani@google.com> |
Move some system services to separate directories Refactored the directory structure so that services can be optionally excluded. This is step 1. Will be followed by another change that makes it possible to remove services from the build. Change-Id: Ideacedfd34b5e213217ad3ff4ebb21c4a8e73f85
/frameworks/base/services/core/java/com/android/server/ConnectivityService.java
|