Merge "vpn: allow IPSec traffic through Always-on VPN" into oc-mr1-dev
This commit is contained in:
committed by
Android (Google) Code Review
commit
1e5152b539
@@ -94,8 +94,6 @@ import com.android.server.DeviceIdleController;
|
||||
import com.android.server.LocalServices;
|
||||
import com.android.server.net.BaseNetworkObserver;
|
||||
|
||||
import libcore.io.IoUtils;
|
||||
|
||||
import java.io.File;
|
||||
import java.io.IOException;
|
||||
import java.io.InputStream;
|
||||
@@ -114,6 +112,8 @@ import java.util.SortedSet;
|
||||
import java.util.TreeSet;
|
||||
import java.util.concurrent.atomic.AtomicInteger;
|
||||
|
||||
import libcore.io.IoUtils;
|
||||
|
||||
/**
|
||||
* @hide
|
||||
*/
|
||||
@@ -1184,6 +1184,18 @@ public class Vpn {
|
||||
/* allowedApplications */ null,
|
||||
/* disallowedApplications */ exemptedPackages);
|
||||
|
||||
// The UID range of the first user (0-99999) would block the IPSec traffic, which comes
|
||||
// directly from the kernel and is marked as uid=0. So we adjust the range to allow
|
||||
// it through (b/69873852).
|
||||
for (UidRange range : addedRanges) {
|
||||
if (range.start == 0) {
|
||||
addedRanges.remove(range);
|
||||
if (range.stop != 0) {
|
||||
addedRanges.add(new UidRange(1, range.stop));
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
removedRanges.removeAll(addedRanges);
|
||||
addedRanges.removeAll(mBlockedUsers);
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user