Age | Commit message (Collapse) | Author | Files | Lines |
|
|
|
The connman prints an unknown type when sending a request RTM_GETADDR
|
|
In __connman_private_network_request, pn->fd is used as the index value
and passed to __connman_ippool_create, which is not correct.
It result in the private network is block used externally.
|
|
|
|
|
|
|
|
|
|
If there's a signal watch that's also watching for name
(data->name_watch) currently we are trying to remove the message_filter
twice since we may have the following call chain:
filter_data_remove_callback()
filter_data_free()
g_dbus_remove_watch()
filter_data_remove_callback()
filter_data_free()
dbus_connection_remove_filter()
dbus_connection_remove_filter()
Because of this we can't currently watch for signals passing the bus
name. After this patch we don't have this issue anymore.
We fix it by removing the filter before calling filter_data_free() if we
are the last filter_data and thus avoid calling
dbus_connection_remove_filter() twice.
|
|
If a dummy context is created, it might happen
that its index is equal to -1. In this particular case
the IP address has not been copied to context->address
during ipv4 extraction.
If we force from oFono a context activation, it will
make ConnMan crashing on set_connected().
|
|
Fixes BMC#25304
|
|
Always check what connman_device_get_data() returns and act
accordingly.
|
|
The default configuration arrays default_auto_connect and
default_blacklist must be static-qualified. Otherwise, their
stack-allocated storage will go out of scope after parse_config
is finished and empty or commented-out DefaultAutoConnectTechnologies
or NetworkInterfaceBlacklist config entries will refer to
random stack data.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
This commit fixes a bug when using manual ipv4 addressing.
The first time it works, but once the service is reconnected it uses
an invalid netmask: 255.255.255.255.
|
|
The wifi pointer in device might be NULL if wpa_supplicant dies
between autoscans.
|
|
Return AlreadyDisabled to the caller instead of InProgress if we
are already disabled.
|
|
We do not call the generic error message function because
it maps EALREADY to EINPROGRESS. So instead we call correct
error return function which returns AlreadyEnabled to the
caller.
Fixes BMC#25306
|
|
|
|
|
|
Instead of hard-coding some selected devices to be ignored, the
blacklist check now uses the connman_device_isfiltered list.
|
|
Interfaces blacklisted in main.conf are now also taken into account
by connman_device_isfiltered. This is done in addition to what gets
passed with -i or -I on the command line.
|
|
This adds a settings variable and a function for fetching that list
|
|
|
|
It is not necessary to create TCP sockets to server if we have
the answer already in the cache.
|
|
We should use the DNS header struct when checking DNS
protocol values instead of using pointer so that the
TCP offset is properly taken care of.
|
|
|
|
The DNS packet starts from offset 2 in TCP payload.
|
|
Handle the TCP offset properly.
|
|
The cached DNS packet will always contain two prefix bytes.
For UDP we do not send these two extra bytes. This way we do
not need to know if the cached message is from UDP or TCP query.
|
|
Instead of generating SIGPIPE, just return EPIPE error
if TCP stream is broken. This way we cannot get aborted
if we receive SIGPIPE (seen this happening).
|
|
While trying to establish a DUN connection with oFono,
an endless loop was found when requesting an IP block.
The problem was on data connection activation its address
with 32 length prefix was notified through ConnMann using
__connman_ippool_newaddr() but mask address shifting with
32 bits was obsolete. So IP pool was considerating block
0.0.0.0 to 255.255.255.255 was in use.
|
|
|
|
|
|
The domain list is created in the tcp_server_event function
at connection time (G_IO_OUT event), so it is not necessary
to create it here too.
|
|
|
|
|
|
This copy will be made after scanning the list of nameservers and
only if at least one TCP server is created.
Otherwise, it will be sent an error response to the request.
|
|
|
|
|
|
Rename the callback function since it's not used only for
autoscan.
|
|
The functionality of the callbacks are the same, thus start using
scan_callback() only. As a result move code around.
|
|
The WiFi plugin will call connman_device_set_scanning() immediately
after connman_device_reset_scanning().
|
|
Check whether a scan callback is set for the interface when
an interface removed signal is received from wpa_supplicant.
wpa_supplicant seems not to reply to any outstanding scan method
calls after a wpa_supplicant 'RemoveInterface' has been received.
|
|
Setting device scanning to false will clean up all networks not
seen so far. If a user scan happens to be requested while the
emulated background scan is running, the background scan will
be cancelled and the non-discovered networks cleared. This causes
unnecessary clearing and re-discovery of WiFi networks when the
user scan is completed.
Create a reset autoscan function that will only reset the autoscan
parameters and not set device scanning to false. Call this function
when starting a scan.
|
|
Reply via D-Bus to the caller and send the technology 'Powered'
property set to FALSE only after the last device has been powered
off. Update code but not behavior in __connman_technology_enabled()
so that the logic looks the same as in
__connman_technology_disabled().
|