blob: 04ad43f6e2d8d2ccfdae7e16481b5d0021febbd1 [file] [log] [blame]
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -08001/*
2 * Copyright (C) 2010 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
markchien503be612020-04-12 21:41:29 +080017package com.android.networkstack.tethering;
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -080018
Chiachang Wang96ca8e92020-02-21 17:50:18 +080019import static android.Manifest.permission.NETWORK_SETTINGS;
20import static android.Manifest.permission.NETWORK_STACK;
markchienae8aa642019-12-16 20:15:20 +080021import static android.content.pm.PackageManager.PERMISSION_GRANTED;
Erik Klinec438e302017-07-04 22:02:49 +090022import static android.hardware.usb.UsbManager.USB_CONFIGURED;
Erik Kline2e88b5e2017-01-18 11:57:45 +090023import static android.hardware.usb.UsbManager.USB_CONNECTED;
Milim Lee31ef4c02019-10-17 05:02:33 +090024import static android.hardware.usb.UsbManager.USB_FUNCTION_NCM;
Erik Kline2e88b5e2017-01-18 11:57:45 +090025import static android.hardware.usb.UsbManager.USB_FUNCTION_RNDIS;
markchien3fe660b2019-12-05 12:04:59 +080026import static android.net.ConnectivityManager.ACTION_RESTRICT_BACKGROUND_CHANGED;
Erik Kline7a26ba32018-03-09 14:18:02 +090027import static android.net.ConnectivityManager.CONNECTIVITY_ACTION;
Erik Kline7a26ba32018-03-09 14:18:02 +090028import static android.net.ConnectivityManager.EXTRA_NETWORK_INFO;
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +090029import static android.net.NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK;
markchien9e44cde2019-12-25 19:40:32 +080030import static android.net.TetheringManager.ACTION_TETHER_STATE_CHANGED;
31import static android.net.TetheringManager.EXTRA_ACTIVE_LOCAL_ONLY;
32import static android.net.TetheringManager.EXTRA_ACTIVE_TETHER;
33import static android.net.TetheringManager.EXTRA_AVAILABLE_TETHER;
34import static android.net.TetheringManager.EXTRA_ERRORED_TETHER;
35import static android.net.TetheringManager.TETHERING_BLUETOOTH;
Remi NGUYEN VAN84229e02020-01-24 22:57:09 +090036import static android.net.TetheringManager.TETHERING_ETHERNET;
markchien9e44cde2019-12-25 19:40:32 +080037import static android.net.TetheringManager.TETHERING_INVALID;
Milim Lee31ef4c02019-10-17 05:02:33 +090038import static android.net.TetheringManager.TETHERING_NCM;
markchien9e44cde2019-12-25 19:40:32 +080039import static android.net.TetheringManager.TETHERING_USB;
40import static android.net.TetheringManager.TETHERING_WIFI;
41import static android.net.TetheringManager.TETHERING_WIFI_P2P;
markchien62a625d2020-03-19 13:37:43 +080042import static android.net.TetheringManager.TETHER_ERROR_INTERNAL_ERROR;
markchien9e44cde2019-12-25 19:40:32 +080043import static android.net.TetheringManager.TETHER_ERROR_NO_ERROR;
44import static android.net.TetheringManager.TETHER_ERROR_SERVICE_UNAVAIL;
45import static android.net.TetheringManager.TETHER_ERROR_UNAVAIL_IFACE;
46import static android.net.TetheringManager.TETHER_ERROR_UNKNOWN_IFACE;
markchien62a625d2020-03-19 13:37:43 +080047import static android.net.TetheringManager.TETHER_ERROR_UNKNOWN_TYPE;
Automerger Merge Workerc22ab7b2020-03-09 04:07:07 +000048import static android.net.TetheringManager.TETHER_HARDWARE_OFFLOAD_FAILED;
49import static android.net.TetheringManager.TETHER_HARDWARE_OFFLOAD_STARTED;
50import static android.net.TetheringManager.TETHER_HARDWARE_OFFLOAD_STOPPED;
markchien986750b2019-12-06 15:24:53 +080051import static android.net.util.TetheringMessageBase.BASE_MASTER;
Erik Kline2efb8272017-05-31 15:53:53 +090052import static android.net.wifi.WifiManager.EXTRA_WIFI_AP_INTERFACE_NAME;
53import static android.net.wifi.WifiManager.EXTRA_WIFI_AP_MODE;
Erik Kline2e88b5e2017-01-18 11:57:45 +090054import static android.net.wifi.WifiManager.EXTRA_WIFI_AP_STATE;
Erik Kline2efb8272017-05-31 15:53:53 +090055import static android.net.wifi.WifiManager.IFACE_IP_MODE_CONFIGURATION_ERROR;
56import static android.net.wifi.WifiManager.IFACE_IP_MODE_LOCAL_ONLY;
57import static android.net.wifi.WifiManager.IFACE_IP_MODE_TETHERED;
58import static android.net.wifi.WifiManager.IFACE_IP_MODE_UNSPECIFIED;
Erik Kline2e88b5e2017-01-18 11:57:45 +090059import static android.net.wifi.WifiManager.WIFI_AP_STATE_DISABLED;
Erik Klinede637722017-10-12 22:16:01 +090060import static android.telephony.CarrierConfigManager.ACTION_CARRIER_CONFIG_CHANGED;
markchien04bdf872019-06-17 21:05:34 +080061import static android.telephony.SubscriptionManager.INVALID_SUBSCRIPTION_ID;
markchienb6eb2c22018-07-18 14:29:20 +080062
markchien503be612020-04-12 21:41:29 +080063import static com.android.networkstack.tethering.TetheringNotificationUpdater.DOWNSTREAM_NONE;
Automerger Merge Worker2d7bacc2020-03-09 08:54:00 +000064
Jeremy Klein36c7aa02016-01-22 14:11:45 -080065import android.bluetooth.BluetoothAdapter;
66import android.bluetooth.BluetoothPan;
67import android.bluetooth.BluetoothProfile;
68import android.bluetooth.BluetoothProfile.ServiceListener;
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -080069import android.content.BroadcastReceiver;
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -080070import android.content.Context;
71import android.content.Intent;
72import android.content.IntentFilter;
Mike Lockwoodc4308f02011-03-01 08:04:54 -080073import android.hardware.usb.UsbManager;
markchien3fe660b2019-12-05 12:04:59 +080074import android.net.ConnectivityManager;
Remi NGUYEN VAN84229e02020-01-24 22:57:09 +090075import android.net.EthernetManager;
markchiene8b9d752020-01-20 19:31:56 +080076import android.net.IIntResultListener;
markchien0f63ca62019-09-30 14:40:57 +080077import android.net.INetd;
markchienae8aa642019-12-16 20:15:20 +080078import android.net.ITetheringEventCallback;
Erik Kline3a5278f2017-06-24 19:29:10 +090079import android.net.IpPrefix;
Erik Klineed962a82017-07-06 19:49:35 +090080import android.net.LinkAddress;
Robert Greenwalt05d89362011-01-23 16:04:05 -080081import android.net.LinkProperties;
Lorenzo Colittib57edc52014-08-22 17:10:50 -070082import android.net.Network;
Chalard Jeanc0fc2762020-04-17 17:12:44 +000083import android.net.NetworkCapabilities;
Robert Greenwalt2a091d72010-02-11 18:18:40 -080084import android.net.NetworkInfo;
markchien0f63ca62019-09-30 14:40:57 +080085import android.net.TetherStatesParcel;
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +090086import android.net.TetheredClient;
markchien40898ca2020-01-21 13:11:06 +080087import android.net.TetheringCallbackStartedParcel;
markchien0f63ca62019-09-30 14:40:57 +080088import android.net.TetheringConfigurationParcel;
markchiene8b9d752020-01-20 19:31:56 +080089import android.net.TetheringRequestParcel;
markchienb6eb2c22018-07-18 14:29:20 +080090import android.net.ip.IpServer;
markchiena9d9ef82020-01-07 14:43:17 +080091import android.net.shared.NetdUtils;
markchien0f63ca62019-09-30 14:40:57 +080092import android.net.util.BaseNetdUnsolicitedEventListener;
Remi NGUYEN VAN6c02f992018-03-09 14:07:18 +090093import android.net.util.InterfaceSet;
Erik Kline32179ff2017-07-04 18:28:11 +090094import android.net.util.PrefixUtils;
Erik Kline7747fd42017-05-12 16:52:48 +090095import android.net.util.SharedLog;
Automerger Merge Worker37a22752020-03-17 16:59:57 +000096import android.net.util.TetheringUtils;
Erik Klinede637722017-10-12 22:16:01 +090097import android.net.util.VersionedBroadcastListener;
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +090098import android.net.wifi.WifiClient;
Jeremy Klein36c7aa02016-01-22 14:11:45 -080099import android.net.wifi.WifiManager;
Jimmy Chenbcd86d02019-07-15 18:03:23 +0800100import android.net.wifi.p2p.WifiP2pGroup;
101import android.net.wifi.p2p.WifiP2pInfo;
102import android.net.wifi.p2p.WifiP2pManager;
Robert Greenwalt2a091d72010-02-11 18:18:40 -0800103import android.os.Binder;
Jeremy Klein36c7aa02016-01-22 14:11:45 -0800104import android.os.Bundle;
Erik Klinef4b6e342017-04-25 19:19:59 +0900105import android.os.Handler;
Robert Greenwaltdfadaea2010-03-11 15:03:08 -0800106import android.os.Looper;
Robert Greenwalt2a091d72010-02-11 18:18:40 -0800107import android.os.Message;
markchienae8aa642019-12-16 20:15:20 +0800108import android.os.RemoteCallbackList;
Christopher Wileydeebfec2016-09-16 11:14:36 -0700109import android.os.RemoteException;
Jeremy Klein36c7aa02016-01-22 14:11:45 -0800110import android.os.ResultReceiver;
markchiena9d9ef82020-01-07 14:43:17 +0800111import android.os.ServiceSpecificException;
markchiencb8860c2020-05-12 00:08:27 +0800112import android.os.SystemProperties;
Dianne Hackborn5ac72a22012-08-29 18:32:08 -0700113import android.os.UserHandle;
Alexandru-Andrei Rotarufa6d5c52017-07-18 16:49:22 +0100114import android.os.UserManager;
markchiencb8860c2020-05-12 00:08:27 +0800115import android.provider.Settings;
markchien04bdf872019-06-17 21:05:34 +0800116import android.telephony.PhoneStateListener;
117import android.telephony.TelephonyManager;
Lorenzo Colitticd63d242016-04-10 15:39:53 +0900118import android.text.TextUtils;
Christopher Wileye9490392016-05-26 15:57:29 -0700119import android.util.ArrayMap;
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -0800120import android.util.Log;
Lorenzo Colitticd63d242016-04-10 15:39:53 +0900121import android.util.SparseArray;
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -0800122
markchiena9d9ef82020-01-07 14:43:17 +0800123import androidx.annotation.NonNull;
124import androidx.annotation.Nullable;
125
Remi NGUYEN VAN84229e02020-01-24 22:57:09 +0900126import com.android.internal.annotations.GuardedBy;
Christopher Wiley497c1472016-10-11 13:26:03 -0700127import com.android.internal.annotations.VisibleForTesting;
Jeremy Klein36c7aa02016-01-22 14:11:45 -0800128import com.android.internal.util.IndentingPrintWriter;
Lorenzo Colitticd63d242016-04-10 15:39:53 +0900129import com.android.internal.util.MessageUtils;
Wink Saville64c42ca2011-04-18 14:55:10 -0700130import com.android.internal.util.State;
131import com.android.internal.util.StateMachine;
Robert Greenwalt2a091d72010-02-11 18:18:40 -0800132
133import java.io.FileDescriptor;
134import java.io.PrintWriter;
Jeremy Klein36c7aa02016-01-22 14:11:45 -0800135import java.net.InetAddress;
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -0800136import java.util.ArrayList;
Lorenzo Colittib57edc52014-08-22 17:10:50 -0700137import java.util.Arrays;
Robert Greenwaltccf83af12011-06-02 17:30:47 -0700138import java.util.Collection;
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +0900139import java.util.Collections;
markchien0f63ca62019-09-30 14:40:57 +0800140import java.util.Iterator;
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +0900141import java.util.LinkedHashSet;
142import java.util.List;
Erik Kline3a5278f2017-06-24 19:29:10 +0900143import java.util.Set;
markchien986750b2019-12-06 15:24:53 +0800144import java.util.concurrent.Executor;
145import java.util.concurrent.RejectedExecutionException;
Robert Greenwalt2ffe4122014-12-12 12:22:31 -0800146
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -0800147/**
Robert Greenwalt2a091d72010-02-11 18:18:40 -0800148 *
Christopher Wiley3b1d9222016-05-20 16:44:04 -0700149 * This class holds much of the business logic to allow Android devices
150 * to act as IP gateways via USB, BT, and WiFi interfaces.
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -0800151 */
markchien0f63ca62019-09-30 14:40:57 +0800152public class Tethering {
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -0800153
markchien0f63ca62019-09-30 14:40:57 +0800154 private static final String TAG = Tethering.class.getSimpleName();
155 private static final boolean DBG = false;
156 private static final boolean VDBG = false;
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -0800157
markchien0f63ca62019-09-30 14:40:57 +0800158 private static final Class[] sMessageClasses = {
Erik Kline7a4ccc62018-08-27 17:26:47 +0900159 Tethering.class, TetherMasterSM.class, IpServer.class
Lorenzo Colitticd63d242016-04-10 15:39:53 +0900160 };
161 private static final SparseArray<String> sMagicDecoderRing =
markchien0f63ca62019-09-30 14:40:57 +0800162 MessageUtils.findMessageNames(sMessageClasses);
markchiena9d9ef82020-01-07 14:43:17 +0800163 // Keep in sync with NETID_UNSET in system/netd/include/netid_client.h
164 private static final int NETID_UNSET = 0;
Lorenzo Colitticd63d242016-04-10 15:39:53 +0900165
Hugo Benichib55fb222017-03-10 14:20:57 +0900166 private static class TetherState {
Erik Kline7a4ccc62018-08-27 17:26:47 +0900167 public final IpServer ipServer;
Hugo Benichib55fb222017-03-10 14:20:57 +0900168 public int lastState;
169 public int lastError;
Erik Klineea9cc482017-03-10 19:35:34 +0900170
markchien0f63ca62019-09-30 14:40:57 +0800171 TetherState(IpServer ipServer) {
Erik Kline7a4ccc62018-08-27 17:26:47 +0900172 this.ipServer = ipServer;
Hugo Benichib55fb222017-03-10 14:20:57 +0900173 // Assume all state machines start out available and with no errors.
Erik Kline7a4ccc62018-08-27 17:26:47 +0900174 lastState = IpServer.STATE_AVAILABLE;
Erik Kline7a26ba32018-03-09 14:18:02 +0900175 lastError = TETHER_ERROR_NO_ERROR;
Hugo Benichib55fb222017-03-10 14:20:57 +0900176 }
Erik Klineea9cc482017-03-10 19:35:34 +0900177
178 public boolean isCurrentlyServing() {
179 switch (lastState) {
Erik Kline7a4ccc62018-08-27 17:26:47 +0900180 case IpServer.STATE_TETHERED:
181 case IpServer.STATE_LOCAL_ONLY:
Erik Klineea9cc482017-03-10 19:35:34 +0900182 return true;
183 default:
184 return false;
185 }
186 }
Hugo Benichib55fb222017-03-10 14:20:57 +0900187 }
Robert Greenwaltccf83af12011-06-02 17:30:47 -0700188
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +0900189 /**
190 * Cookie added when registering {@link android.net.TetheringManager.TetheringEventCallback}.
191 */
192 private static class CallbackCookie {
193 public final boolean hasListClientsPermission;
194
195 private CallbackCookie(boolean hasListClientsPermission) {
196 this.hasListClientsPermission = hasListClientsPermission;
197 }
198 }
199
Erik Kline7747fd42017-05-12 16:52:48 +0900200 private final SharedLog mLog = new SharedLog(TAG);
markchienae8aa642019-12-16 20:15:20 +0800201 private final RemoteCallbackList<ITetheringEventCallback> mTetheringEventCallbacks =
202 new RemoteCallbackList<>();
Automerger Merge Worker37a22752020-03-17 16:59:57 +0000203 // Currently active tethering requests per tethering type. Only one of each type can be
204 // requested at a time. After a tethering type is requested, the map keeps tethering parameters
205 // to be used after the interface comes up asynchronously.
206 private final SparseArray<TetheringRequestParcel> mActiveTetheringRequests =
207 new SparseArray<>();
Erik Kline1fdc2e22017-05-08 17:56:35 +0900208
Robert Greenwaltb4453622011-11-03 16:01:40 -0700209 // used to synchronize public access to members
Erik Kline6ff17f72015-12-10 20:42:12 +0900210 private final Object mPublicSync;
Hugo Benichib55fb222017-03-10 14:20:57 +0900211 private final Context mContext;
212 private final ArrayMap<String, TetherState> mTetherStates;
213 private final BroadcastReceiver mStateReceiver;
Erik Kline6ff17f72015-12-10 20:42:12 +0900214 private final Looper mLooper;
Erik Kline6ff17f72015-12-10 20:42:12 +0900215 private final StateMachine mTetherMasterSM;
Erik Klinee0cce212017-03-06 14:05:23 +0900216 private final OffloadController mOffloadController;
Erik Kline6ff17f72015-12-10 20:42:12 +0900217 private final UpstreamNetworkMonitor mUpstreamNetworkMonitor;
Erik Kline6e9a1012017-06-06 19:24:21 +0900218 // TODO: Figure out how to merge this and other downstream-tracking objects
219 // into a single coherent structure.
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +0900220 // Use LinkedHashSet for predictable ordering order for ConnectedClientsTracker.
221 private final LinkedHashSet<IpServer> mForwardedDownstreams;
Erik Klinede637722017-10-12 22:16:01 +0900222 private final VersionedBroadcastListener mCarrierConfigChange;
Remi NGUYEN VAN5d0dc452018-03-15 11:57:14 +0900223 private final TetheringDependencies mDeps;
markchienb6eb2c22018-07-18 14:29:20 +0800224 private final EntitlementManager mEntitlementMgr;
markchien26299ed2019-02-27 14:56:11 +0800225 private final Handler mHandler;
markchien0f63ca62019-09-30 14:40:57 +0800226 private final INetd mNetd;
227 private final NetdCallback mNetdCallback;
markchien1ddfba42019-11-27 21:20:33 +0800228 private final UserRestrictionActionListener mTetheringRestriction;
markchien986750b2019-12-06 15:24:53 +0800229 private final ActiveDataSubIdListener mActiveDataSubIdListener;
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +0900230 private final ConnectedClientsTracker mConnectedClientsTracker;
Automerger Merge Worker06fe92d2020-02-28 03:42:44 +0000231 private final TetheringThreadExecutor mExecutor;
Automerger Merge Worker2d7bacc2020-03-09 08:54:00 +0000232 private final TetheringNotificationUpdater mNotificationUpdater;
markchiencb8860c2020-05-12 00:08:27 +0800233 private final UserManager mUserManager;
markchien04bdf872019-06-17 21:05:34 +0800234 private int mActiveDataSubId = INVALID_SUBSCRIPTION_ID;
markchienae8aa642019-12-16 20:15:20 +0800235 // All the usage of mTetheringEventCallback should run in the same thread.
236 private ITetheringEventCallback mTetheringEventCallback = null;
Robert Greenwalta599fe7c2010-03-08 18:30:14 -0800237
Hugo Benichib55fb222017-03-10 14:20:57 +0900238 private volatile TetheringConfiguration mConfig;
Remi NGUYEN VAN6c02f992018-03-09 14:07:18 +0900239 private InterfaceSet mCurrentUpstreamIfaceSet;
Erik Klineea9cc482017-03-10 19:35:34 +0900240
Mike Lockwood6c2260b2011-07-19 13:04:47 -0700241 private boolean mRndisEnabled; // track the RNDIS function enabled state
Erik Kline6e9a1012017-06-06 19:24:21 +0900242 // True iff. WiFi tethering should be started when soft AP is ready.
Christopher Wiley5c0b10a2016-05-31 14:43:08 -0700243 private boolean mWifiTetherRequested;
markchien26299ed2019-02-27 14:56:11 +0800244 private Network mTetherUpstream;
markchien0f63ca62019-09-30 14:40:57 +0800245 private TetherStatesParcel mTetherStatesParcel;
markchien3fe660b2019-12-05 12:04:59 +0800246 private boolean mDataSaverEnabled = false;
Jimmy Chen151384d2019-12-03 11:37:09 +0800247 private String mWifiP2pTetherInterface = null;
Automerger Merge Workerc22ab7b2020-03-09 04:07:07 +0000248 private int mOffloadStatus = TETHER_HARDWARE_OFFLOAD_STOPPED;
Christopher Wiley5c0b10a2016-05-31 14:43:08 -0700249
Remi NGUYEN VAN84229e02020-01-24 22:57:09 +0900250 @GuardedBy("mPublicSync")
251 private EthernetManager.TetheredInterfaceRequest mEthernetIfaceRequest;
252 @GuardedBy("mPublicSync")
253 private String mConfiguredEthernetIface;
254 @GuardedBy("mPublicSync")
255 private EthernetCallback mEthernetCallback;
256
markchien0f63ca62019-09-30 14:40:57 +0800257 public Tethering(TetheringDependencies deps) {
258 mLog.mark("Tethering.constructed");
Remi NGUYEN VAN5d0dc452018-03-15 11:57:14 +0900259 mDeps = deps;
markchien0f63ca62019-09-30 14:40:57 +0800260 mContext = mDeps.getContext();
markchien0f63ca62019-09-30 14:40:57 +0800261 mNetd = mDeps.getINetd(mContext);
262 mLooper = mDeps.getTetheringLooper();
Paul Hu77fa8d62020-04-16 02:54:37 +0000263 mNotificationUpdater = mDeps.getNotificationUpdater(mContext, mLooper);
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -0800264
Robert Greenwaltb4453622011-11-03 16:01:40 -0700265 mPublicSync = new Object();
266
Christopher Wileyd985dde2016-05-31 10:44:35 -0700267 mTetherStates = new ArrayMap<>();
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +0900268 mConnectedClientsTracker = new ConnectedClientsTracker();
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -0800269
Remi NGUYEN VAN5d0dc452018-03-15 11:57:14 +0900270 mTetherMasterSM = new TetherMasterSM("TetherMaster", mLooper, deps);
Robert Greenwalt2a091d72010-02-11 18:18:40 -0800271 mTetherMasterSM.start();
272
markchien26299ed2019-02-27 14:56:11 +0800273 mHandler = mTetherMasterSM.getHandler();
Mark Chien66b9a4a2020-05-07 03:49:42 +0000274 mOffloadController = mDeps.getOffloadController(mHandler, mLog,
275 new OffloadController.Dependencies() {
Junyu Lai833f4f62020-05-05 10:45:38 +0000276
277 @Override
278 public TetheringConfiguration getTetherConfig() {
279 return mConfig;
280 }
281 });
markchiena9d9ef82020-01-07 14:43:17 +0800282 mUpstreamNetworkMonitor = mDeps.getUpstreamNetworkMonitor(mContext, mTetherMasterSM, mLog,
Remi NGUYEN VAN5d0dc452018-03-15 11:57:14 +0900283 TetherMasterSM.EVENT_UPSTREAM_CALLBACK);
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +0900284 mForwardedDownstreams = new LinkedHashSet<>();
Erik Klinede637722017-10-12 22:16:01 +0900285
286 IntentFilter filter = new IntentFilter();
287 filter.addAction(ACTION_CARRIER_CONFIG_CHANGED);
markchien3b519632018-09-07 16:19:12 +0800288 // EntitlementManager will send EVENT_UPSTREAM_PERMISSION_CHANGED when cellular upstream
289 // permission is changed according to entitlement check result.
Mark Chien47430c02020-05-08 11:00:42 +0000290 mEntitlementMgr = mDeps.getEntitlementManager(mContext, mHandler, mLog,
291 () -> mTetherMasterSM.sendMessage(
292 TetherMasterSM.EVENT_UPSTREAM_PERMISSION_CHANGED));
markchien29b70142019-03-26 21:41:59 +0800293 mEntitlementMgr.setOnUiEntitlementFailedListener((int downstream) -> {
294 mLog.log("OBSERVED UiEnitlementFailed");
295 stopTethering(downstream);
296 });
markchien3394e142019-04-09 15:53:24 +0800297 mEntitlementMgr.setTetheringConfigurationFetcher(() -> {
markchien3394e142019-04-09 15:53:24 +0800298 return mConfig;
299 });
markchien3b519632018-09-07 16:19:12 +0800300
Erik Klinede637722017-10-12 22:16:01 +0900301 mCarrierConfigChange = new VersionedBroadcastListener(
markchien26299ed2019-02-27 14:56:11 +0800302 "CarrierConfigChangeListener", mContext, mHandler, filter,
Erik Klinede637722017-10-12 22:16:01 +0900303 (Intent ignored) -> {
304 mLog.log("OBSERVED carrier config change");
Erik Kline80b7a9f2018-02-28 15:01:35 +0900305 updateConfiguration();
markchien3394e142019-04-09 15:53:24 +0800306 mEntitlementMgr.reevaluateSimCardProvisioning(mConfig);
Erik Klinede637722017-10-12 22:16:01 +0900307 });
Erik Kline6ff17f72015-12-10 20:42:12 +0900308
Robert Greenwaltbb51d9f2010-03-12 10:23:35 -0800309 mStateReceiver = new StateReceiver();
Erik Kline80b7a9f2018-02-28 15:01:35 +0900310
markchiencb8860c2020-05-12 00:08:27 +0800311 mUserManager = (UserManager) mContext.getSystemService(Context.USER_SERVICE);
Paul Huf950dc92020-03-25 12:39:13 +0000312 mTetheringRestriction = new UserRestrictionActionListener(
markchiencb8860c2020-05-12 00:08:27 +0800313 mUserManager, this, mNotificationUpdater);
Automerger Merge Worker06fe92d2020-02-28 03:42:44 +0000314 mExecutor = new TetheringThreadExecutor(mHandler);
315 mActiveDataSubIdListener = new ActiveDataSubIdListener(mExecutor);
Mark Chien674a0122020-03-27 09:37:01 +0000316 mNetdCallback = new NetdCallback();
markchien1ddfba42019-11-27 21:20:33 +0800317
Erik Kline80b7a9f2018-02-28 15:01:35 +0900318 // Load tethering configuration.
319 updateConfiguration();
markchiencb8860c2020-05-12 00:08:27 +0800320
321 startStateMachineUpdaters();
Mark Chien674a0122020-03-27 09:37:01 +0000322 }
323
324 /**
325 * Start to register callbacks.
326 * Call this function when tethering is ready to handle callback events.
327 */
markchiencb8860c2020-05-12 00:08:27 +0800328 private void startStateMachineUpdaters() {
markchiene67c5642020-02-06 15:25:47 +0800329 try {
330 mNetd.registerUnsolicitedEventListener(mNetdCallback);
331 } catch (RemoteException e) {
332 mLog.e("Unable to register netd UnsolicitedEventListener");
333 }
Erik Kline80b7a9f2018-02-28 15:01:35 +0900334 mCarrierConfigChange.startListening();
markchien986750b2019-12-06 15:24:53 +0800335 mContext.getSystemService(TelephonyManager.class).listen(mActiveDataSubIdListener,
336 PhoneStateListener.LISTEN_ACTIVE_DATA_SUBSCRIPTION_ID_CHANGE);
Erik Kline80b7a9f2018-02-28 15:01:35 +0900337
Erik Kline80b7a9f2018-02-28 15:01:35 +0900338 IntentFilter filter = new IntentFilter();
Mike Lockwood770126a2010-12-09 22:30:37 -0800339 filter.addAction(UsbManager.ACTION_USB_STATE);
Erik Kline7a26ba32018-03-09 14:18:02 +0900340 filter.addAction(CONNECTIVITY_ACTION);
Christopher Wiley5c0b10a2016-05-31 14:43:08 -0700341 filter.addAction(WifiManager.WIFI_AP_STATE_CHANGED_ACTION);
Robert Greenwaltc13368b2013-07-18 14:24:42 -0700342 filter.addAction(Intent.ACTION_CONFIGURATION_CHANGED);
Jimmy Chenbcd86d02019-07-15 18:03:23 +0800343 filter.addAction(WifiP2pManager.WIFI_P2P_CONNECTION_CHANGED_ACTION);
markchien1ddfba42019-11-27 21:20:33 +0800344 filter.addAction(UserManager.ACTION_USER_RESTRICTIONS_CHANGED);
markchien3fe660b2019-12-05 12:04:59 +0800345 filter.addAction(ACTION_RESTRICT_BACKGROUND_CHANGED);
Mark Chien674a0122020-03-27 09:37:01 +0000346 mContext.registerReceiver(mStateReceiver, filter, null, mHandler);
347
Paul Hu77fa8d62020-04-16 02:54:37 +0000348 final IntentFilter noUpstreamFilter = new IntentFilter();
349 noUpstreamFilter.addAction(TetheringNotificationUpdater.ACTION_DISABLE_TETHERING);
350 mContext.registerReceiver(
351 mStateReceiver, noUpstreamFilter, PERMISSION_MAINLINE_NETWORK_STACK, mHandler);
352
Mark Chien674a0122020-03-27 09:37:01 +0000353 final WifiManager wifiManager = getWifiManager();
354 if (wifiManager != null) {
355 wifiManager.registerSoftApCallback(mExecutor, new TetheringSoftApCallback());
356 }
357
358 startTrackDefaultNetwork();
Robert Greenwalt49348e72011-10-21 16:54:26 -0700359 }
360
markchien986750b2019-12-06 15:24:53 +0800361 private class TetheringThreadExecutor implements Executor {
362 private final Handler mTetherHandler;
363 TetheringThreadExecutor(Handler handler) {
364 mTetherHandler = handler;
365 }
366 @Override
367 public void execute(Runnable command) {
368 if (!mTetherHandler.post(command)) {
369 throw new RejectedExecutionException(mTetherHandler + " is shutting down");
370 }
371 }
372 }
373
374 private class ActiveDataSubIdListener extends PhoneStateListener {
375 ActiveDataSubIdListener(Executor executor) {
376 super(executor);
377 }
378
379 @Override
380 public void onActiveDataSubscriptionIdChanged(int subId) {
381 mLog.log("OBSERVED active data subscription change, from " + mActiveDataSubId
382 + " to " + subId);
383 if (subId == mActiveDataSubId) return;
384
385 mActiveDataSubId = subId;
386 updateConfiguration();
Paul Hu274cc1c2020-03-25 06:22:43 +0000387 mNotificationUpdater.onActiveDataSubscriptionIdChanged(subId);
markchien986750b2019-12-06 15:24:53 +0800388 // To avoid launching unexpected provisioning checks, ignore re-provisioning
389 // when no CarrierConfig loaded yet. Assume reevaluateSimCardProvisioning()
Paul Hu274cc1c2020-03-25 06:22:43 +0000390 // will be triggered again when CarrierConfig is loaded.
markchien986750b2019-12-06 15:24:53 +0800391 if (mEntitlementMgr.getCarrierConfig(mConfig) != null) {
392 mEntitlementMgr.reevaluateSimCardProvisioning(mConfig);
393 } else {
394 mLog.log("IGNORED reevaluate provisioning, no carrier config loaded");
395 }
396 }
397 }
398
Erik Kline216af6d2017-04-27 20:57:23 +0900399 private WifiManager getWifiManager() {
400 return (WifiManager) mContext.getSystemService(Context.WIFI_SERVICE);
401 }
402
Erik Kline93c4afa2017-06-04 11:36:01 +0900403 // NOTE: This is always invoked on the mLooper thread.
Erik Klined781fba2017-01-23 13:01:58 +0900404 private void updateConfiguration() {
markchien04bdf872019-06-17 21:05:34 +0800405 mConfig = mDeps.generateTetheringConfiguration(mContext, mLog, mActiveDataSubId);
markchien3394e142019-04-09 15:53:24 +0800406 mUpstreamNetworkMonitor.updateMobileRequiresDun(mConfig.isDunRequired);
markchien0f63ca62019-09-30 14:40:57 +0800407 reportConfigurationChanged(mConfig.toStableParcelable());
markchien3394e142019-04-09 15:53:24 +0800408 }
409
410 private void maybeDunSettingChanged() {
markchien986750b2019-12-06 15:24:53 +0800411 final boolean isDunRequired = TetheringConfiguration.checkDunRequired(mContext);
markchiendb3a2362018-10-05 12:36:08 +0800412 if (isDunRequired == mConfig.isDunRequired) return;
Erik Kline6ee73da2017-07-08 20:36:37 +0900413 updateConfiguration();
414 }
415
markchien0f63ca62019-09-30 14:40:57 +0800416 private class NetdCallback extends BaseNetdUnsolicitedEventListener {
417 @Override
418 public void onInterfaceChanged(String ifName, boolean up) {
419 mHandler.post(() -> interfaceStatusChanged(ifName, up));
420 }
421
422 @Override
423 public void onInterfaceLinkStateChanged(String ifName, boolean up) {
424 mHandler.post(() -> interfaceLinkStateChanged(ifName, up));
425 }
426
427 @Override
428 public void onInterfaceAdded(String ifName) {
429 mHandler.post(() -> interfaceAdded(ifName));
430 }
431
432 @Override
433 public void onInterfaceRemoved(String ifName) {
434 mHandler.post(() -> interfaceRemoved(ifName));
435 }
436 }
437
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +0900438 private class TetheringSoftApCallback implements WifiManager.SoftApCallback {
439 // TODO: Remove onStateChanged override when this method has default on
440 // WifiManager#SoftApCallback interface.
441 // Wifi listener for state change of the soft AP
442 @Override
443 public void onStateChanged(final int state, final int failureReason) {
444 // Nothing
445 }
446
447 // Called by wifi when the number of soft AP clients changed.
448 @Override
449 public void onConnectedClientsChanged(final List<WifiClient> clients) {
Treehugger Robot25067812020-03-25 15:32:41 +0000450 updateConnectedClients(clients);
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +0900451 }
452 }
453
markchien0f63ca62019-09-30 14:40:57 +0800454 void interfaceStatusChanged(String iface, boolean up) {
Lorenzo Colitticd63d242016-04-10 15:39:53 +0900455 // Never called directly: only called from interfaceLinkStateChanged.
markchien0f63ca62019-09-30 14:40:57 +0800456 // See NetlinkHandler.cpp: notifyInterfaceChanged.
Wink Savillec9acde92011-09-21 11:05:43 -0700457 if (VDBG) Log.d(TAG, "interfaceStatusChanged " + iface + ", " + up);
Robert Greenwaltb4453622011-11-03 16:01:40 -0700458 synchronized (mPublicSync) {
Mike J. Chen6143f5f2011-06-23 15:17:51 -0700459 if (up) {
Erik Kline4dd9bb82017-04-26 11:11:07 +0900460 maybeTrackNewInterfaceLocked(iface);
Robert Greenwalt2a091d72010-02-11 18:18:40 -0800461 } else {
Erik Kline7a26ba32018-03-09 14:18:02 +0900462 if (ifaceNameToType(iface) == TETHERING_BLUETOOTH) {
Erik Kline4dd9bb82017-04-26 11:11:07 +0900463 stopTrackingInterfaceLocked(iface);
Christopher Wileyd30aaeb2016-07-08 09:33:50 -0700464 } else {
465 // Ignore usb0 down after enabling RNDIS.
466 // We will handle disconnect in interfaceRemoved.
467 // Similarly, ignore interface down for WiFi. We monitor WiFi AP status
468 // through the WifiManager.WIFI_AP_STATE_CHANGED_ACTION intent.
469 if (VDBG) Log.d(TAG, "ignore interface down for " + iface);
Robert Greenwalt2a091d72010-02-11 18:18:40 -0800470 }
471 }
472 }
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -0800473 }
474
markchien0f63ca62019-09-30 14:40:57 +0800475 void interfaceLinkStateChanged(String iface, boolean up) {
Irfan Sheriff23eb2972011-07-22 15:21:10 -0700476 interfaceStatusChanged(iface, up);
Mike J. Chenf59c7d02011-06-23 15:33:15 -0700477 }
478
Christopher Wiley5c0b10a2016-05-31 14:43:08 -0700479 private int ifaceNameToType(String iface) {
Erik Kline3e756652017-01-17 13:42:19 +0900480 final TetheringConfiguration cfg = mConfig;
481
482 if (cfg.isWifi(iface)) {
Erik Kline7a26ba32018-03-09 14:18:02 +0900483 return TETHERING_WIFI;
Jimmy Chenbcd86d02019-07-15 18:03:23 +0800484 } else if (cfg.isWifiP2p(iface)) {
485 return TETHERING_WIFI_P2P;
Erik Kline3e756652017-01-17 13:42:19 +0900486 } else if (cfg.isUsb(iface)) {
Erik Kline7a26ba32018-03-09 14:18:02 +0900487 return TETHERING_USB;
Erik Kline3e756652017-01-17 13:42:19 +0900488 } else if (cfg.isBluetooth(iface)) {
Erik Kline7a26ba32018-03-09 14:18:02 +0900489 return TETHERING_BLUETOOTH;
Milim Lee31ef4c02019-10-17 05:02:33 +0900490 } else if (cfg.isNcm(iface)) {
491 return TETHERING_NCM;
Christopher Wiley5c0b10a2016-05-31 14:43:08 -0700492 }
Erik Kline7a26ba32018-03-09 14:18:02 +0900493 return TETHERING_INVALID;
Christopher Wiley5c0b10a2016-05-31 14:43:08 -0700494 }
495
markchien0f63ca62019-09-30 14:40:57 +0800496 void interfaceAdded(String iface) {
Wink Savillec9acde92011-09-21 11:05:43 -0700497 if (VDBG) Log.d(TAG, "interfaceAdded " + iface);
Robert Greenwaltb4453622011-11-03 16:01:40 -0700498 synchronized (mPublicSync) {
Erik Kline4dd9bb82017-04-26 11:11:07 +0900499 maybeTrackNewInterfaceLocked(iface);
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -0800500 }
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -0800501 }
502
markchien0f63ca62019-09-30 14:40:57 +0800503 void interfaceRemoved(String iface) {
Wink Savillec9acde92011-09-21 11:05:43 -0700504 if (VDBG) Log.d(TAG, "interfaceRemoved " + iface);
Robert Greenwaltb4453622011-11-03 16:01:40 -0700505 synchronized (mPublicSync) {
Erik Kline4dd9bb82017-04-26 11:11:07 +0900506 stopTrackingInterfaceLocked(iface);
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -0800507 }
508 }
509
markchiene8b9d752020-01-20 19:31:56 +0800510 void startTethering(final TetheringRequestParcel request, final IIntResultListener listener) {
Automerger Merge Worker37a22752020-03-17 16:59:57 +0000511 mHandler.post(() -> {
512 final TetheringRequestParcel unfinishedRequest = mActiveTetheringRequests.get(
513 request.tetheringType);
514 // If tethering is already enabled with a different request,
515 // disable before re-enabling.
516 if (unfinishedRequest != null
517 && !TetheringUtils.isTetheringRequestEquals(unfinishedRequest, request)) {
518 enableTetheringInternal(request.tetheringType, false /* disabled */, null);
519 mEntitlementMgr.stopProvisioningIfNeeded(request.tetheringType);
520 }
521 mActiveTetheringRequests.put(request.tetheringType, request);
522
markchien5788f2a2020-05-08 18:55:26 +0800523 if (request.exemptFromEntitlementCheck) {
524 mEntitlementMgr.setExemptedDownstreamType(request.tetheringType);
525 } else {
526 mEntitlementMgr.startProvisioningIfNeeded(request.tetheringType,
527 request.showProvisioningUi);
528 }
Automerger Merge Worker37a22752020-03-17 16:59:57 +0000529 enableTetheringInternal(request.tetheringType, true /* enabled */, listener);
530 });
Jeremy Klein36c7aa02016-01-22 14:11:45 -0800531 }
532
markchien0f63ca62019-09-30 14:40:57 +0800533 void stopTethering(int type) {
Automerger Merge Worker37a22752020-03-17 16:59:57 +0000534 mHandler.post(() -> {
535 mActiveTetheringRequests.remove(type);
536
537 enableTetheringInternal(type, false /* disabled */, null);
538 mEntitlementMgr.stopProvisioningIfNeeded(type);
539 });
Jeremy Klein36c7aa02016-01-22 14:11:45 -0800540 }
541
542 /**
markchien3b519632018-09-07 16:19:12 +0800543 * Enables or disables tethering for the given type. If provisioning is required, it will
544 * schedule provisioning rechecks for the specified interface.
Jeremy Klein36c7aa02016-01-22 14:11:45 -0800545 */
markchiene8b9d752020-01-20 19:31:56 +0800546 private void enableTetheringInternal(int type, boolean enable,
547 final IIntResultListener listener) {
Automerger Merge Worker37a22752020-03-17 16:59:57 +0000548 int result = TETHER_ERROR_NO_ERROR;
Jeremy Klein36c7aa02016-01-22 14:11:45 -0800549 switch (type) {
Erik Kline7a26ba32018-03-09 14:18:02 +0900550 case TETHERING_WIFI:
Christopher Wiley5c0b10a2016-05-31 14:43:08 -0700551 result = setWifiTethering(enable);
Jeremy Klein36c7aa02016-01-22 14:11:45 -0800552 break;
Erik Kline7a26ba32018-03-09 14:18:02 +0900553 case TETHERING_USB:
Christopher Wiley5c0b10a2016-05-31 14:43:08 -0700554 result = setUsbTethering(enable);
Jeremy Klein36c7aa02016-01-22 14:11:45 -0800555 break;
Erik Kline7a26ba32018-03-09 14:18:02 +0900556 case TETHERING_BLUETOOTH:
markchiene8b9d752020-01-20 19:31:56 +0800557 setBluetoothTethering(enable, listener);
Jeremy Klein36c7aa02016-01-22 14:11:45 -0800558 break;
Milim Lee31ef4c02019-10-17 05:02:33 +0900559 case TETHERING_NCM:
560 result = setNcmTethering(enable);
Milim Lee31ef4c02019-10-17 05:02:33 +0900561 break;
Remi NGUYEN VAN84229e02020-01-24 22:57:09 +0900562 case TETHERING_ETHERNET:
563 result = setEthernetTethering(enable);
Remi NGUYEN VAN84229e02020-01-24 22:57:09 +0900564 break;
Jeremy Klein36c7aa02016-01-22 14:11:45 -0800565 default:
566 Log.w(TAG, "Invalid tether type.");
markchien62a625d2020-03-19 13:37:43 +0800567 result = TETHER_ERROR_UNKNOWN_TYPE;
Automerger Merge Worker37a22752020-03-17 16:59:57 +0000568 }
569
570 // The result of Bluetooth tethering will be sent by #setBluetoothTethering.
571 if (type != TETHERING_BLUETOOTH) {
572 sendTetherResult(listener, result, type);
Jeremy Klein36c7aa02016-01-22 14:11:45 -0800573 }
574 }
575
Automerger Merge Worker37a22752020-03-17 16:59:57 +0000576 private void sendTetherResult(final IIntResultListener listener, final int result,
577 final int type) {
markchiene8b9d752020-01-20 19:31:56 +0800578 if (listener != null) {
579 try {
580 listener.onResult(result);
581 } catch (RemoteException e) { }
Jeremy Klein36c7aa02016-01-22 14:11:45 -0800582 }
Automerger Merge Worker37a22752020-03-17 16:59:57 +0000583
584 // If changing tethering fail, remove corresponding request
585 // no matter who trigger the start/stop.
586 if (result != TETHER_ERROR_NO_ERROR) mActiveTetheringRequests.remove(type);
Jeremy Klein36c7aa02016-01-22 14:11:45 -0800587 }
588
Christopher Wiley5c0b10a2016-05-31 14:43:08 -0700589 private int setWifiTethering(final boolean enable) {
Erik Kline256be782017-04-29 13:20:04 +0900590 final long ident = Binder.clearCallingIdentity();
591 try {
592 synchronized (mPublicSync) {
Erik Kline256be782017-04-29 13:20:04 +0900593 final WifiManager mgr = getWifiManager();
Ye Jiao21f96252019-01-28 12:54:22 +0800594 if (mgr == null) {
595 mLog.e("setWifiTethering: failed to get WifiManager!");
596 return TETHER_ERROR_SERVICE_UNAVAIL;
597 }
lesl6b7551a2019-12-13 10:56:35 +0800598 if ((enable && mgr.startTetheredHotspot(null /* use existing softap config */))
markchien0f63ca62019-09-30 14:40:57 +0800599 || (!enable && mgr.stopSoftAp())) {
Ye Jiao21f96252019-01-28 12:54:22 +0800600 mWifiTetherRequested = enable;
601 return TETHER_ERROR_NO_ERROR;
Erik Kline256be782017-04-29 13:20:04 +0900602 }
Christopher Wiley5c0b10a2016-05-31 14:43:08 -0700603 }
Erik Kline256be782017-04-29 13:20:04 +0900604 } finally {
605 Binder.restoreCallingIdentity(ident);
Christopher Wiley5c0b10a2016-05-31 14:43:08 -0700606 }
Ye Jiao21f96252019-01-28 12:54:22 +0800607
markchien62a625d2020-03-19 13:37:43 +0800608 return TETHER_ERROR_INTERNAL_ERROR;
Christopher Wiley5c0b10a2016-05-31 14:43:08 -0700609 }
610
markchiene8b9d752020-01-20 19:31:56 +0800611 private void setBluetoothTethering(final boolean enable, final IIntResultListener listener) {
markchien3fe660b2019-12-05 12:04:59 +0800612 final BluetoothAdapter adapter = mDeps.getBluetoothAdapter();
Jeremy Klein36c7aa02016-01-22 14:11:45 -0800613 if (adapter == null || !adapter.isEnabled()) {
markchien0f63ca62019-09-30 14:40:57 +0800614 Log.w(TAG, "Tried to enable bluetooth tethering with null or disabled adapter. null: "
615 + (adapter == null));
Automerger Merge Worker37a22752020-03-17 16:59:57 +0000616 sendTetherResult(listener, TETHER_ERROR_SERVICE_UNAVAIL, TETHERING_BLUETOOTH);
Jeremy Klein36c7aa02016-01-22 14:11:45 -0800617 return;
618 }
619
620 adapter.getProfileProxy(mContext, new ServiceListener() {
621 @Override
622 public void onServiceDisconnected(int profile) { }
623
624 @Override
625 public void onServiceConnected(int profile, BluetoothProfile proxy) {
markchien560c3ac2019-08-16 15:33:28 +0800626 // Clear identify is fine because caller already pass tethering permission at
627 // ConnectivityService#startTethering()(or stopTethering) before the control comes
628 // here. Bluetooth will check tethering permission again that there is
629 // Context#getOpPackageName() under BluetoothPan#setBluetoothTethering() to get
630 // caller's package name for permission check.
631 // Calling BluetoothPan#setBluetoothTethering() here means the package name always
632 // be system server. If calling identity is not cleared, that package's uid might
633 // not match calling uid and end up in permission denied.
634 final long identityToken = Binder.clearCallingIdentity();
635 try {
636 ((BluetoothPan) proxy).setBluetoothTethering(enable);
637 } finally {
638 Binder.restoreCallingIdentity(identityToken);
639 }
Jeremy Klein36c7aa02016-01-22 14:11:45 -0800640 // TODO: Enabling bluetooth tethering can fail asynchronously here.
641 // We should figure out a way to bubble up that failure instead of sending success.
Erik Kline7a26ba32018-03-09 14:18:02 +0900642 final int result = (((BluetoothPan) proxy).isTetheringOn() == enable)
643 ? TETHER_ERROR_NO_ERROR
markchien62a625d2020-03-19 13:37:43 +0800644 : TETHER_ERROR_INTERNAL_ERROR;
Automerger Merge Worker37a22752020-03-17 16:59:57 +0000645 sendTetherResult(listener, result, TETHERING_BLUETOOTH);
Jeremy Klein36c7aa02016-01-22 14:11:45 -0800646 adapter.closeProfileProxy(BluetoothProfile.PAN, proxy);
647 }
648 }, BluetoothProfile.PAN);
649 }
650
Remi NGUYEN VAN84229e02020-01-24 22:57:09 +0900651 private int setEthernetTethering(final boolean enable) {
652 final EthernetManager em = (EthernetManager) mContext.getSystemService(
653 Context.ETHERNET_SERVICE);
654 synchronized (mPublicSync) {
655 if (enable) {
Treehugger Robot191a03c2020-03-24 15:23:51 +0000656 if (mEthernetCallback != null) {
657 Log.d(TAG, "Ethernet tethering already started");
658 return TETHER_ERROR_NO_ERROR;
659 }
Automerger Merge Worker06fe92d2020-02-28 03:42:44 +0000660
Remi NGUYEN VAN84229e02020-01-24 22:57:09 +0900661 mEthernetCallback = new EthernetCallback();
Automerger Merge Worker06fe92d2020-02-28 03:42:44 +0000662 mEthernetIfaceRequest = em.requestTetheredInterface(mExecutor, mEthernetCallback);
Remi NGUYEN VAN84229e02020-01-24 22:57:09 +0900663 } else {
Automerger Merge Worker06fe92d2020-02-28 03:42:44 +0000664 stopEthernetTetheringLocked();
Remi NGUYEN VAN84229e02020-01-24 22:57:09 +0900665 }
666 }
667 return TETHER_ERROR_NO_ERROR;
668 }
669
670 private void stopEthernetTetheringLocked() {
Treehugger Robot41c81242020-03-19 15:23:45 +0000671 if (mConfiguredEthernetIface != null) {
672 stopTrackingInterfaceLocked(mConfiguredEthernetIface);
673 mConfiguredEthernetIface = null;
674 }
675 if (mEthernetCallback != null) {
676 mEthernetIfaceRequest.release();
677 mEthernetCallback = null;
678 mEthernetIfaceRequest = null;
679 }
Remi NGUYEN VAN84229e02020-01-24 22:57:09 +0900680 }
681
682 private class EthernetCallback implements EthernetManager.TetheredInterfaceCallback {
683 @Override
684 public void onAvailable(String iface) {
685 synchronized (mPublicSync) {
686 if (this != mEthernetCallback) {
687 // Ethernet callback arrived after Ethernet tethering stopped. Ignore.
688 return;
689 }
690 maybeTrackNewInterfaceLocked(iface, TETHERING_ETHERNET);
691 changeInterfaceState(iface, IpServer.STATE_TETHERED);
692 mConfiguredEthernetIface = iface;
693 }
694 }
695
696 @Override
697 public void onUnavailable() {
698 synchronized (mPublicSync) {
699 if (this != mEthernetCallback) {
700 // onAvailable called after stopping Ethernet tethering.
701 return;
702 }
703 stopEthernetTetheringLocked();
704 }
705 }
706 }
707
markchien0f63ca62019-09-30 14:40:57 +0800708 int tether(String iface) {
Erik Kline7a4ccc62018-08-27 17:26:47 +0900709 return tether(iface, IpServer.STATE_TETHERED);
Erik Klineea9cc482017-03-10 19:35:34 +0900710 }
711
712 private int tether(String iface, int requestedState) {
Wink Savillec9acde92011-09-21 11:05:43 -0700713 if (DBG) Log.d(TAG, "Tethering " + iface);
Robert Greenwaltb4453622011-11-03 16:01:40 -0700714 synchronized (mPublicSync) {
Christopher Wileyd985dde2016-05-31 10:44:35 -0700715 TetherState tetherState = mTetherStates.get(iface);
716 if (tetherState == null) {
Erik Kline00019f42016-06-30 19:31:46 +0900717 Log.e(TAG, "Tried to Tether an unknown iface: " + iface + ", ignoring");
Erik Kline7a26ba32018-03-09 14:18:02 +0900718 return TETHER_ERROR_UNKNOWN_IFACE;
Christopher Wiley4312a4c2016-05-23 13:58:00 -0700719 }
720 // Ignore the error status of the interface. If the interface is available,
721 // the errors are referring to past tethering attempts anyway.
Erik Kline7a4ccc62018-08-27 17:26:47 +0900722 if (tetherState.lastState != IpServer.STATE_AVAILABLE) {
Erik Kline00019f42016-06-30 19:31:46 +0900723 Log.e(TAG, "Tried to Tether an unavailable iface: " + iface + ", ignoring");
Erik Kline7a26ba32018-03-09 14:18:02 +0900724 return TETHER_ERROR_UNAVAIL_IFACE;
Christopher Wiley4312a4c2016-05-23 13:58:00 -0700725 }
Automerger Merge Worker37a22752020-03-17 16:59:57 +0000726 // NOTE: If a CMD_TETHER_REQUESTED message is already in the TISM's queue but not yet
727 // processed, this will be a no-op and it will not return an error.
Erik Klineea9cc482017-03-10 19:35:34 +0900728 //
Automerger Merge Worker37a22752020-03-17 16:59:57 +0000729 // This code cannot race with untether() because they both synchronize on mPublicSync.
730 // TODO: reexamine the threading and messaging model to totally remove mPublicSync.
731 final int type = tetherState.ipServer.interfaceType();
732 final TetheringRequestParcel request = mActiveTetheringRequests.get(type, null);
733 if (request != null) {
734 mActiveTetheringRequests.delete(type);
735 }
736 tetherState.ipServer.sendMessage(IpServer.CMD_TETHER_REQUESTED, requestedState, 0,
737 request);
Erik Kline7a26ba32018-03-09 14:18:02 +0900738 return TETHER_ERROR_NO_ERROR;
Robert Greenwalt2a091d72010-02-11 18:18:40 -0800739 }
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -0800740 }
741
markchien0f63ca62019-09-30 14:40:57 +0800742 int untether(String iface) {
Wink Savillec9acde92011-09-21 11:05:43 -0700743 if (DBG) Log.d(TAG, "Untethering " + iface);
Robert Greenwaltb4453622011-11-03 16:01:40 -0700744 synchronized (mPublicSync) {
Christopher Wileyd985dde2016-05-31 10:44:35 -0700745 TetherState tetherState = mTetherStates.get(iface);
746 if (tetherState == null) {
Christopher Wiley4312a4c2016-05-23 13:58:00 -0700747 Log.e(TAG, "Tried to Untether an unknown iface :" + iface + ", ignoring");
Erik Kline7a26ba32018-03-09 14:18:02 +0900748 return TETHER_ERROR_UNKNOWN_IFACE;
Christopher Wiley4312a4c2016-05-23 13:58:00 -0700749 }
Erik Klineea9cc482017-03-10 19:35:34 +0900750 if (!tetherState.isCurrentlyServing()) {
751 Log.e(TAG, "Tried to untether an inactive iface :" + iface + ", ignoring");
Erik Kline7a26ba32018-03-09 14:18:02 +0900752 return TETHER_ERROR_UNAVAIL_IFACE;
Christopher Wiley4312a4c2016-05-23 13:58:00 -0700753 }
Erik Kline7a4ccc62018-08-27 17:26:47 +0900754 tetherState.ipServer.sendMessage(IpServer.CMD_TETHER_UNREQUESTED);
Erik Kline7a26ba32018-03-09 14:18:02 +0900755 return TETHER_ERROR_NO_ERROR;
Robert Greenwalt2a091d72010-02-11 18:18:40 -0800756 }
Robert Greenwalt5a735062010-03-02 17:25:02 -0800757 }
758
markchien0f63ca62019-09-30 14:40:57 +0800759 void untetherAll() {
Erik Kline7a26ba32018-03-09 14:18:02 +0900760 stopTethering(TETHERING_WIFI);
Jimmy Chenbcd86d02019-07-15 18:03:23 +0800761 stopTethering(TETHERING_WIFI_P2P);
Erik Kline7a26ba32018-03-09 14:18:02 +0900762 stopTethering(TETHERING_USB);
763 stopTethering(TETHERING_BLUETOOTH);
Remi NGUYEN VAN84229e02020-01-24 22:57:09 +0900764 stopTethering(TETHERING_ETHERNET);
Felipe Leme70c8b9b2016-04-25 14:41:31 -0700765 }
766
markchien0f63ca62019-09-30 14:40:57 +0800767 int getLastTetherError(String iface) {
Robert Greenwaltb4453622011-11-03 16:01:40 -0700768 synchronized (mPublicSync) {
Christopher Wileyd985dde2016-05-31 10:44:35 -0700769 TetherState tetherState = mTetherStates.get(iface);
770 if (tetherState == null) {
markchien0f63ca62019-09-30 14:40:57 +0800771 Log.e(TAG, "Tried to getLastTetherError on an unknown iface :" + iface
772 + ", ignoring");
Erik Kline7a26ba32018-03-09 14:18:02 +0900773 return TETHER_ERROR_UNKNOWN_IFACE;
Robert Greenwaltb4453622011-11-03 16:01:40 -0700774 }
Hugo Benichib55fb222017-03-10 14:20:57 +0900775 return tetherState.lastError;
Robert Greenwalt5a735062010-03-02 17:25:02 -0800776 }
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -0800777 }
778
markchienae8aa642019-12-16 20:15:20 +0800779 boolean isTetherProvisioningRequired() {
780 final TetheringConfiguration cfg = mConfig;
781 return mEntitlementMgr.isTetherProvisioningRequired(cfg);
782 }
783
Erik Klineea9cc482017-03-10 19:35:34 +0900784 // TODO: Figure out how to update for local hotspot mode interfaces.
Christopher Wileyd985dde2016-05-31 10:44:35 -0700785 private void sendTetherStateChangedBroadcast() {
markchiencb8860c2020-05-12 00:08:27 +0800786 if (!isTetheringSupported()) return;
Robert Greenwalt2a091d72010-02-11 18:18:40 -0800787
Erik Kline8351faa2017-04-17 16:47:23 +0900788 final ArrayList<String> availableList = new ArrayList<>();
789 final ArrayList<String> tetherList = new ArrayList<>();
790 final ArrayList<String> localOnlyList = new ArrayList<>();
791 final ArrayList<String> erroredList = new ArrayList<>();
markchien0f63ca62019-09-30 14:40:57 +0800792 final ArrayList<Integer> lastErrorList = new ArrayList<>();
Robert Greenwalt2a091d72010-02-11 18:18:40 -0800793
Erik Kline3e756652017-01-17 13:42:19 +0900794 final TetheringConfiguration cfg = mConfig;
markchienae8aa642019-12-16 20:15:20 +0800795 mTetherStatesParcel = new TetherStatesParcel();
Erik Kline3e756652017-01-17 13:42:19 +0900796
Automerger Merge Worker2d7bacc2020-03-09 08:54:00 +0000797 int downstreamTypesMask = DOWNSTREAM_NONE;
Robert Greenwaltb4453622011-11-03 16:01:40 -0700798 synchronized (mPublicSync) {
Christopher Wileyd985dde2016-05-31 10:44:35 -0700799 for (int i = 0; i < mTetherStates.size(); i++) {
800 TetherState tetherState = mTetherStates.valueAt(i);
801 String iface = mTetherStates.keyAt(i);
Erik Kline7a26ba32018-03-09 14:18:02 +0900802 if (tetherState.lastError != TETHER_ERROR_NO_ERROR) {
Christopher Wileyd985dde2016-05-31 10:44:35 -0700803 erroredList.add(iface);
markchien0f63ca62019-09-30 14:40:57 +0800804 lastErrorList.add(tetherState.lastError);
Erik Kline7a4ccc62018-08-27 17:26:47 +0900805 } else if (tetherState.lastState == IpServer.STATE_AVAILABLE) {
Christopher Wileyd985dde2016-05-31 10:44:35 -0700806 availableList.add(iface);
Erik Kline7a4ccc62018-08-27 17:26:47 +0900807 } else if (tetherState.lastState == IpServer.STATE_LOCAL_ONLY) {
Erik Kline8351faa2017-04-17 16:47:23 +0900808 localOnlyList.add(iface);
Erik Kline7a4ccc62018-08-27 17:26:47 +0900809 } else if (tetherState.lastState == IpServer.STATE_TETHERED) {
Erik Kline3e756652017-01-17 13:42:19 +0900810 if (cfg.isUsb(iface)) {
Automerger Merge Worker2d7bacc2020-03-09 08:54:00 +0000811 downstreamTypesMask |= (1 << TETHERING_USB);
Erik Kline3e756652017-01-17 13:42:19 +0900812 } else if (cfg.isWifi(iface)) {
Automerger Merge Worker2d7bacc2020-03-09 08:54:00 +0000813 downstreamTypesMask |= (1 << TETHERING_WIFI);
Erik Kline3e756652017-01-17 13:42:19 +0900814 } else if (cfg.isBluetooth(iface)) {
Automerger Merge Worker2d7bacc2020-03-09 08:54:00 +0000815 downstreamTypesMask |= (1 << TETHERING_BLUETOOTH);
Robert Greenwalt2a091d72010-02-11 18:18:40 -0800816 }
Erik Kline8351faa2017-04-17 16:47:23 +0900817 tetherList.add(iface);
Robert Greenwalt2a091d72010-02-11 18:18:40 -0800818 }
819 }
820 }
markchien0f63ca62019-09-30 14:40:57 +0800821
822 mTetherStatesParcel.availableList = availableList.toArray(new String[0]);
823 mTetherStatesParcel.tetheredList = tetherList.toArray(new String[0]);
824 mTetherStatesParcel.localOnlyList = localOnlyList.toArray(new String[0]);
825 mTetherStatesParcel.erroredIfaceList = erroredList.toArray(new String[0]);
826 mTetherStatesParcel.lastErrorList = new int[lastErrorList.size()];
827 Iterator<Integer> iterator = lastErrorList.iterator();
828 for (int i = 0; i < lastErrorList.size(); i++) {
829 mTetherStatesParcel.lastErrorList[i] = iterator.next().intValue();
830 }
831 reportTetherStateChanged(mTetherStatesParcel);
832
Erik Kline7a26ba32018-03-09 14:18:02 +0900833 final Intent bcast = new Intent(ACTION_TETHER_STATE_CHANGED);
markchien4cbc1a92020-01-06 21:08:19 +0800834 bcast.addFlags(Intent.FLAG_RECEIVER_REPLACE_PENDING);
Erik Kline7a26ba32018-03-09 14:18:02 +0900835 bcast.putStringArrayListExtra(EXTRA_AVAILABLE_TETHER, availableList);
836 bcast.putStringArrayListExtra(EXTRA_ACTIVE_LOCAL_ONLY, localOnlyList);
837 bcast.putStringArrayListExtra(EXTRA_ACTIVE_TETHER, tetherList);
838 bcast.putStringArrayListExtra(EXTRA_ERRORED_TETHER, erroredList);
Erik Kline8351faa2017-04-17 16:47:23 +0900839 mContext.sendStickyBroadcastAsUser(bcast, UserHandle.ALL);
Robert Greenwaltfd1be2b2011-11-11 12:30:19 -0800840 if (DBG) {
Lorenzo Colitticd63d242016-04-10 15:39:53 +0900841 Log.d(TAG, String.format(
Erik Kline8351faa2017-04-17 16:47:23 +0900842 "sendTetherStateChangedBroadcast %s=[%s] %s=[%s] %s=[%s] %s=[%s]",
843 "avail", TextUtils.join(",", availableList),
844 "local_only", TextUtils.join(",", localOnlyList),
845 "tether", TextUtils.join(",", tetherList),
846 "error", TextUtils.join(",", erroredList)));
Robert Greenwalt924cc942010-06-28 10:26:19 -0700847 }
Robert Greenwalta599fe7c2010-03-08 18:30:14 -0800848
Automerger Merge Worker2d7bacc2020-03-09 08:54:00 +0000849 mNotificationUpdater.onDownstreamChanged(downstreamTypesMask);
Robert Greenwalt5a735062010-03-02 17:25:02 -0800850 }
851
Robert Greenwalt2a091d72010-02-11 18:18:40 -0800852 private class StateReceiver extends BroadcastReceiver {
Nick Kralevich70c117a2014-05-27 15:30:02 -0700853 @Override
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -0800854 public void onReceive(Context content, Intent intent) {
Erik Kline2e88b5e2017-01-18 11:57:45 +0900855 final String action = intent.getAction();
856 if (action == null) return;
857
Mike Lockwood770126a2010-12-09 22:30:37 -0800858 if (action.equals(UsbManager.ACTION_USB_STATE)) {
Erik Kline2e88b5e2017-01-18 11:57:45 +0900859 handleUsbAction(intent);
Erik Kline7a26ba32018-03-09 14:18:02 +0900860 } else if (action.equals(CONNECTIVITY_ACTION)) {
Erik Kline2e88b5e2017-01-18 11:57:45 +0900861 handleConnectivityAction(intent);
Christopher Wiley5c0b10a2016-05-31 14:43:08 -0700862 } else if (action.equals(WifiManager.WIFI_AP_STATE_CHANGED_ACTION)) {
Erik Kline2e88b5e2017-01-18 11:57:45 +0900863 handleWifiApAction(intent);
Jimmy Chenbcd86d02019-07-15 18:03:23 +0800864 } else if (action.equals(WifiP2pManager.WIFI_P2P_CONNECTION_CHANGED_ACTION)) {
865 handleWifiP2pAction(intent);
Robert Greenwaltc13368b2013-07-18 14:24:42 -0700866 } else if (action.equals(Intent.ACTION_CONFIGURATION_CHANGED)) {
Erik Klinede637722017-10-12 22:16:01 +0900867 mLog.log("OBSERVED configuration changed");
Robert Greenwaltc13368b2013-07-18 14:24:42 -0700868 updateConfiguration();
markchien1ddfba42019-11-27 21:20:33 +0800869 } else if (action.equals(UserManager.ACTION_USER_RESTRICTIONS_CHANGED)) {
870 mLog.log("OBSERVED user restrictions changed");
871 handleUserRestrictionAction();
markchien3fe660b2019-12-05 12:04:59 +0800872 } else if (action.equals(ACTION_RESTRICT_BACKGROUND_CHANGED)) {
873 mLog.log("OBSERVED data saver changed");
874 handleDataSaverChanged();
Paul Hu77fa8d62020-04-16 02:54:37 +0000875 } else if (action.equals(TetheringNotificationUpdater.ACTION_DISABLE_TETHERING)) {
876 untetherAll();
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -0800877 }
878 }
Erik Kline2e88b5e2017-01-18 11:57:45 +0900879
880 private void handleConnectivityAction(Intent intent) {
Erik Kline7a26ba32018-03-09 14:18:02 +0900881 final NetworkInfo networkInfo =
882 (NetworkInfo) intent.getParcelableExtra(EXTRA_NETWORK_INFO);
markchien0f63ca62019-09-30 14:40:57 +0800883 if (networkInfo == null
884 || networkInfo.getDetailedState() == NetworkInfo.DetailedState.FAILED) {
Erik Kline2e88b5e2017-01-18 11:57:45 +0900885 return;
886 }
887
888 if (VDBG) Log.d(TAG, "Tethering got CONNECTIVITY_ACTION: " + networkInfo.toString());
889 mTetherMasterSM.sendMessage(TetherMasterSM.CMD_UPSTREAM_CHANGED);
890 }
891
892 private void handleUsbAction(Intent intent) {
893 final boolean usbConnected = intent.getBooleanExtra(USB_CONNECTED, false);
Erik Klinec438e302017-07-04 22:02:49 +0900894 final boolean usbConfigured = intent.getBooleanExtra(USB_CONFIGURED, false);
Erik Kline2e88b5e2017-01-18 11:57:45 +0900895 final boolean rndisEnabled = intent.getBooleanExtra(USB_FUNCTION_RNDIS, false);
Milim Lee31ef4c02019-10-17 05:02:33 +0900896 final boolean ncmEnabled = intent.getBooleanExtra(USB_FUNCTION_NCM, false);
Erik Klinec438e302017-07-04 22:02:49 +0900897
898 mLog.log(String.format("USB bcast connected:%s configured:%s rndis:%s",
899 usbConnected, usbConfigured, rndisEnabled));
900
901 // There are three types of ACTION_USB_STATE:
902 //
903 // - DISCONNECTED (USB_CONNECTED and USB_CONFIGURED are 0)
904 // Meaning: USB connection has ended either because of
905 // software reset or hard unplug.
906 //
907 // - CONNECTED (USB_CONNECTED is 1, USB_CONFIGURED is 0)
908 // Meaning: the first stage of USB protocol handshake has
909 // occurred but it is not complete.
910 //
911 // - CONFIGURED (USB_CONNECTED and USB_CONFIGURED are 1)
912 // Meaning: the USB handshake is completely done and all the
913 // functions are ready to use.
914 //
915 // For more explanation, see b/62552150 .
Erik Kline2e88b5e2017-01-18 11:57:45 +0900916 synchronized (Tethering.this.mPublicSync) {
Jerry Zhang656a7bc2017-12-20 14:26:39 -0800917 if (!usbConnected && mRndisEnabled) {
918 // Turn off tethering if it was enabled and there is a disconnect.
Erik Kline7a4ccc62018-08-27 17:26:47 +0900919 tetherMatchingInterfaces(IpServer.STATE_AVAILABLE, TETHERING_USB);
markchien3b519632018-09-07 16:19:12 +0800920 mEntitlementMgr.stopProvisioningIfNeeded(TETHERING_USB);
Jerry Zhang656a7bc2017-12-20 14:26:39 -0800921 } else if (usbConfigured && rndisEnabled) {
922 // Tether if rndis is enabled and usb is configured.
Erik Kline7a4ccc62018-08-27 17:26:47 +0900923 tetherMatchingInterfaces(IpServer.STATE_TETHERED, TETHERING_USB);
Milim Lee31ef4c02019-10-17 05:02:33 +0900924 } else if (usbConnected && ncmEnabled) {
925 tetherMatchingInterfaces(IpServer.STATE_LOCAL_ONLY, TETHERING_NCM);
Erik Kline2e88b5e2017-01-18 11:57:45 +0900926 }
Jerry Zhang656a7bc2017-12-20 14:26:39 -0800927 mRndisEnabled = usbConfigured && rndisEnabled;
Erik Kline2e88b5e2017-01-18 11:57:45 +0900928 }
929 }
930
931 private void handleWifiApAction(Intent intent) {
Erik Kline2efb8272017-05-31 15:53:53 +0900932 final int curState = intent.getIntExtra(EXTRA_WIFI_AP_STATE, WIFI_AP_STATE_DISABLED);
933 final String ifname = intent.getStringExtra(EXTRA_WIFI_AP_INTERFACE_NAME);
934 final int ipmode = intent.getIntExtra(EXTRA_WIFI_AP_MODE, IFACE_IP_MODE_UNSPECIFIED);
935
Erik Kline2e88b5e2017-01-18 11:57:45 +0900936 synchronized (Tethering.this.mPublicSync) {
937 switch (curState) {
938 case WifiManager.WIFI_AP_STATE_ENABLING:
939 // We can see this state on the way to both enabled and failure states.
940 break;
941 case WifiManager.WIFI_AP_STATE_ENABLED:
Erik Kline2efb8272017-05-31 15:53:53 +0900942 enableWifiIpServingLocked(ifname, ipmode);
Erik Kline2e88b5e2017-01-18 11:57:45 +0900943 break;
Erik Kline2e88b5e2017-01-18 11:57:45 +0900944 case WifiManager.WIFI_AP_STATE_DISABLING:
Mark Chien19487bf2020-04-15 17:28:27 +0000945 // We can see this state on the way to disabled.
946 break;
947 case WifiManager.WIFI_AP_STATE_DISABLED:
Erik Kline2e88b5e2017-01-18 11:57:45 +0900948 case WifiManager.WIFI_AP_STATE_FAILED:
949 default:
Erik Kline562e0c12017-06-09 16:36:29 +0900950 disableWifiIpServingLocked(ifname, curState);
Erik Kline2efb8272017-05-31 15:53:53 +0900951 break;
Erik Kline2e88b5e2017-01-18 11:57:45 +0900952 }
953 }
954 }
Jimmy Chenbcd86d02019-07-15 18:03:23 +0800955
Jimmy Chen151384d2019-12-03 11:37:09 +0800956 private boolean isGroupOwner(WifiP2pGroup group) {
957 return group != null && group.isGroupOwner()
958 && !TextUtils.isEmpty(group.getInterface());
959 }
960
Jimmy Chenbcd86d02019-07-15 18:03:23 +0800961 private void handleWifiP2pAction(Intent intent) {
962 if (mConfig.isWifiP2pLegacyTetheringMode()) return;
963
964 final WifiP2pInfo p2pInfo =
965 (WifiP2pInfo) intent.getParcelableExtra(WifiP2pManager.EXTRA_WIFI_P2P_INFO);
966 final WifiP2pGroup group =
967 (WifiP2pGroup) intent.getParcelableExtra(WifiP2pManager.EXTRA_WIFI_P2P_GROUP);
968
969 if (VDBG) {
970 Log.d(TAG, "WifiP2pAction: P2pInfo: " + p2pInfo + " Group: " + group);
971 }
972
Jimmy Chenbcd86d02019-07-15 18:03:23 +0800973 synchronized (Tethering.this.mPublicSync) {
Jimmy Chen151384d2019-12-03 11:37:09 +0800974 // if no group is formed, bring it down if needed.
975 if (p2pInfo == null || !p2pInfo.groupFormed) {
976 disableWifiP2pIpServingLockedIfNeeded(mWifiP2pTetherInterface);
977 mWifiP2pTetherInterface = null;
978 return;
Jimmy Chenbcd86d02019-07-15 18:03:23 +0800979 }
Jimmy Chen151384d2019-12-03 11:37:09 +0800980
981 // If there is a group but the device is not the owner, bail out.
982 if (!isGroupOwner(group)) return;
983
984 // If already serving from the correct interface, nothing to do.
985 if (group.getInterface().equals(mWifiP2pTetherInterface)) return;
986
987 // If already serving from another interface, turn it down first.
988 if (!TextUtils.isEmpty(mWifiP2pTetherInterface)) {
989 mLog.w("P2P tethered interface " + mWifiP2pTetherInterface
990 + "is different from current interface "
991 + group.getInterface() + ", re-tether it");
992 disableWifiP2pIpServingLockedIfNeeded(mWifiP2pTetherInterface);
993 }
994
995 // Finally bring up serving on the new interface
996 mWifiP2pTetherInterface = group.getInterface();
997 enableWifiIpServingLocked(mWifiP2pTetherInterface, IFACE_IP_MODE_LOCAL_ONLY);
Jimmy Chenbcd86d02019-07-15 18:03:23 +0800998 }
999 }
markchien1ddfba42019-11-27 21:20:33 +08001000
1001 private void handleUserRestrictionAction() {
1002 mTetheringRestriction.onUserRestrictionsChanged();
1003 }
markchien3fe660b2019-12-05 12:04:59 +08001004
1005 private void handleDataSaverChanged() {
1006 final ConnectivityManager connMgr = (ConnectivityManager) mContext.getSystemService(
1007 Context.CONNECTIVITY_SERVICE);
1008 final boolean isDataSaverEnabled = connMgr.getRestrictBackgroundStatus()
1009 != ConnectivityManager.RESTRICT_BACKGROUND_STATUS_DISABLED;
1010
1011 if (mDataSaverEnabled == isDataSaverEnabled) return;
1012
1013 mDataSaverEnabled = isDataSaverEnabled;
1014 if (mDataSaverEnabled) {
1015 untetherAll();
1016 }
1017 }
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -08001018 }
1019
Alexandru-Andrei Rotarufa6d5c52017-07-18 16:49:22 +01001020 @VisibleForTesting
Paul Hu4089bb12020-04-23 09:07:00 +00001021 boolean isTetheringActive() {
1022 return mActiveTetheringRequests.size() > 0;
1023 }
1024
1025 @VisibleForTesting
markchien1ddfba42019-11-27 21:20:33 +08001026 protected static class UserRestrictionActionListener {
markchiencb8860c2020-05-12 00:08:27 +08001027 private final UserManager mUserMgr;
Alexandru-Andrei Rotarufa6d5c52017-07-18 16:49:22 +01001028 private final Tethering mWrapper;
Paul Huf950dc92020-03-25 12:39:13 +00001029 private final TetheringNotificationUpdater mNotificationUpdater;
markchien1ddfba42019-11-27 21:20:33 +08001030 public boolean mDisallowTethering;
Alexandru-Andrei Rotarufa6d5c52017-07-18 16:49:22 +01001031
Paul Huf950dc92020-03-25 12:39:13 +00001032 public UserRestrictionActionListener(@NonNull UserManager um, @NonNull Tethering wrapper,
1033 @NonNull TetheringNotificationUpdater updater) {
markchiencb8860c2020-05-12 00:08:27 +08001034 mUserMgr = um;
Alexandru-Andrei Rotarufa6d5c52017-07-18 16:49:22 +01001035 mWrapper = wrapper;
Paul Huf950dc92020-03-25 12:39:13 +00001036 mNotificationUpdater = updater;
markchien1ddfba42019-11-27 21:20:33 +08001037 mDisallowTethering = false;
Alexandru-Andrei Rotarufa6d5c52017-07-18 16:49:22 +01001038 }
1039
markchien1ddfba42019-11-27 21:20:33 +08001040 public void onUserRestrictionsChanged() {
1041 // getUserRestrictions gets restriction for this process' user, which is the primary
1042 // user. This is fine because DISALLOW_CONFIG_TETHERING can only be set on the primary
1043 // user. See UserManager.DISALLOW_CONFIG_TETHERING.
markchiencb8860c2020-05-12 00:08:27 +08001044 final Bundle restrictions = mUserMgr.getUserRestrictions();
Alexandru-Andrei Rotarufa6d5c52017-07-18 16:49:22 +01001045 final boolean newlyDisallowed =
markchien1ddfba42019-11-27 21:20:33 +08001046 restrictions.getBoolean(UserManager.DISALLOW_CONFIG_TETHERING);
1047 final boolean prevDisallowed = mDisallowTethering;
1048 mDisallowTethering = newlyDisallowed;
Alexandru-Andrei Rotarufa6d5c52017-07-18 16:49:22 +01001049
markchien1ddfba42019-11-27 21:20:33 +08001050 final boolean tetheringDisallowedChanged = (newlyDisallowed != prevDisallowed);
Alexandru-Andrei Rotarufa6d5c52017-07-18 16:49:22 +01001051 if (!tetheringDisallowedChanged) {
1052 return;
1053 }
1054
Paul Huf950dc92020-03-25 12:39:13 +00001055 if (!newlyDisallowed) {
1056 // Clear the restricted notification when user is allowed to have tethering
1057 // function.
1058 mNotificationUpdater.tetheringRestrictionLifted();
1059 return;
Alexandru-Andrei Rotarufa6d5c52017-07-18 16:49:22 +01001060 }
Paul Huf950dc92020-03-25 12:39:13 +00001061
Paul Hu4089bb12020-04-23 09:07:00 +00001062 if (mWrapper.isTetheringActive()) {
1063 // Restricted notification is shown when tethering function is disallowed on
1064 // user's device.
1065 mNotificationUpdater.notifyTetheringDisabledByRestriction();
Paul Huf950dc92020-03-25 12:39:13 +00001066
Paul Hu4089bb12020-04-23 09:07:00 +00001067 // Untether from all downstreams since tethering is disallowed.
1068 mWrapper.untetherAll();
1069 }
Paul Huf950dc92020-03-25 12:39:13 +00001070 // TODO(b/148139325): send tetheringSupported on restriction change
Alexandru-Andrei Rotarufa6d5c52017-07-18 16:49:22 +01001071 }
1072 }
1073
Jimmy Chenbcd86d02019-07-15 18:03:23 +08001074 private void disableWifiIpServingLockedCommon(int tetheringType, String ifname, int apState) {
1075 mLog.log("Canceling WiFi tethering request -"
1076 + " type=" + tetheringType
1077 + " interface=" + ifname
1078 + " state=" + apState);
Erik Kline562e0c12017-06-09 16:36:29 +09001079
1080 if (!TextUtils.isEmpty(ifname)) {
1081 final TetherState ts = mTetherStates.get(ifname);
1082 if (ts != null) {
Erik Kline7a4ccc62018-08-27 17:26:47 +09001083 ts.ipServer.unwanted();
Erik Kline562e0c12017-06-09 16:36:29 +09001084 return;
1085 }
1086 }
1087
Erik Kline2efb8272017-05-31 15:53:53 +09001088 for (int i = 0; i < mTetherStates.size(); i++) {
Erik Kline7a4ccc62018-08-27 17:26:47 +09001089 final IpServer ipServer = mTetherStates.valueAt(i).ipServer;
Jimmy Chenbcd86d02019-07-15 18:03:23 +08001090 if (ipServer.interfaceType() == tetheringType) {
Erik Kline7a4ccc62018-08-27 17:26:47 +09001091 ipServer.unwanted();
Erik Kline562e0c12017-06-09 16:36:29 +09001092 return;
Erik Kline2efb8272017-05-31 15:53:53 +09001093 }
1094 }
Erik Kline562e0c12017-06-09 16:36:29 +09001095
markchien0f63ca62019-09-30 14:40:57 +08001096 mLog.log("Error disabling Wi-Fi IP serving; "
1097 + (TextUtils.isEmpty(ifname) ? "no interface name specified"
Erik Kline562e0c12017-06-09 16:36:29 +09001098 : "specified interface: " + ifname));
Erik Kline2efb8272017-05-31 15:53:53 +09001099 }
1100
Jimmy Chenbcd86d02019-07-15 18:03:23 +08001101 private void disableWifiIpServingLocked(String ifname, int apState) {
1102 // Regardless of whether we requested this transition, the AP has gone
1103 // down. Don't try to tether again unless we're requested to do so.
1104 // TODO: Remove this altogether, once Wi-Fi reliably gives us an
1105 // interface name with every broadcast.
1106 mWifiTetherRequested = false;
1107
1108 disableWifiIpServingLockedCommon(TETHERING_WIFI, ifname, apState);
1109 }
1110
Jimmy Chen151384d2019-12-03 11:37:09 +08001111 private void disableWifiP2pIpServingLockedIfNeeded(String ifname) {
1112 if (TextUtils.isEmpty(ifname)) return;
1113
Jimmy Chenbcd86d02019-07-15 18:03:23 +08001114 disableWifiIpServingLockedCommon(TETHERING_WIFI_P2P, ifname, /* dummy */ 0);
1115 }
1116
Erik Kline2efb8272017-05-31 15:53:53 +09001117 private void enableWifiIpServingLocked(String ifname, int wifiIpMode) {
Erik Kline7a4ccc62018-08-27 17:26:47 +09001118 // Map wifiIpMode values to IpServer.Callback serving states, inferring
Erik Kline2efb8272017-05-31 15:53:53 +09001119 // from mWifiTetherRequested as a final "best guess".
1120 final int ipServingMode;
1121 switch (wifiIpMode) {
1122 case IFACE_IP_MODE_TETHERED:
Erik Kline7a4ccc62018-08-27 17:26:47 +09001123 ipServingMode = IpServer.STATE_TETHERED;
Erik Kline2efb8272017-05-31 15:53:53 +09001124 break;
1125 case IFACE_IP_MODE_LOCAL_ONLY:
Erik Kline7a4ccc62018-08-27 17:26:47 +09001126 ipServingMode = IpServer.STATE_LOCAL_ONLY;
Erik Kline2efb8272017-05-31 15:53:53 +09001127 break;
1128 default:
Erik Kline9e225542017-06-08 17:48:48 +09001129 mLog.e("Cannot enable IP serving in unknown WiFi mode: " + wifiIpMode);
1130 return;
Erik Kline2efb8272017-05-31 15:53:53 +09001131 }
1132
1133 if (!TextUtils.isEmpty(ifname)) {
Jimmy Chenbcd86d02019-07-15 18:03:23 +08001134 maybeTrackNewInterfaceLocked(ifname);
Erik Kline2efb8272017-05-31 15:53:53 +09001135 changeInterfaceState(ifname, ipServingMode);
1136 } else {
Erik Kline9e225542017-06-08 17:48:48 +09001137 mLog.e(String.format(
markchien0f63ca62019-09-30 14:40:57 +08001138 "Cannot enable IP serving in mode %s on missing interface name",
1139 ipServingMode));
Erik Kline2efb8272017-05-31 15:53:53 +09001140 }
1141 }
1142
Erik Klineea9cc482017-03-10 19:35:34 +09001143 // TODO: Consider renaming to something more accurate in its description.
1144 // This method:
1145 // - allows requesting either tethering or local hotspot serving states
1146 // - handles both enabling and disabling serving states
1147 // - only tethers the first matching interface in listInterfaces()
1148 // order of a given type
1149 private void tetherMatchingInterfaces(int requestedState, int interfaceType) {
1150 if (VDBG) {
1151 Log.d(TAG, "tetherMatchingInterfaces(" + requestedState + ", " + interfaceType + ")");
1152 }
Mike Lockwood3c2a2f62011-06-08 15:10:26 -07001153
Christopher Wiley5c0b10a2016-05-31 14:43:08 -07001154 String[] ifaces = null;
Robert Greenwalt65ae29b2010-02-18 11:25:54 -08001155 try {
markchiena9d9ef82020-01-07 14:43:17 +08001156 ifaces = mNetd.interfaceGetList();
1157 } catch (RemoteException | ServiceSpecificException e) {
Mike Lockwood3c2a2f62011-06-08 15:10:26 -07001158 Log.e(TAG, "Error listing Interfaces", e);
Robert Greenwalt65ae29b2010-02-18 11:25:54 -08001159 return;
1160 }
Christopher Wiley5c0b10a2016-05-31 14:43:08 -07001161 String chosenIface = null;
1162 if (ifaces != null) {
1163 for (String iface : ifaces) {
1164 if (ifaceNameToType(iface) == interfaceType) {
1165 chosenIface = iface;
1166 break;
Robert Greenwalt65ae29b2010-02-18 11:25:54 -08001167 }
1168 }
1169 }
Christopher Wiley5c0b10a2016-05-31 14:43:08 -07001170 if (chosenIface == null) {
1171 Log.e(TAG, "could not find iface of type " + interfaceType);
1172 return;
1173 }
1174
Erik Kline2efb8272017-05-31 15:53:53 +09001175 changeInterfaceState(chosenIface, requestedState);
1176 }
1177
1178 private void changeInterfaceState(String ifname, int requestedState) {
Erik Klineea9cc482017-03-10 19:35:34 +09001179 final int result;
1180 switch (requestedState) {
Erik Kline7a4ccc62018-08-27 17:26:47 +09001181 case IpServer.STATE_UNAVAILABLE:
1182 case IpServer.STATE_AVAILABLE:
Erik Kline2efb8272017-05-31 15:53:53 +09001183 result = untether(ifname);
Erik Klineea9cc482017-03-10 19:35:34 +09001184 break;
Erik Kline7a4ccc62018-08-27 17:26:47 +09001185 case IpServer.STATE_TETHERED:
1186 case IpServer.STATE_LOCAL_ONLY:
Erik Kline2efb8272017-05-31 15:53:53 +09001187 result = tether(ifname, requestedState);
Erik Klineea9cc482017-03-10 19:35:34 +09001188 break;
1189 default:
1190 Log.wtf(TAG, "Unknown interface state: " + requestedState);
1191 return;
1192 }
Erik Kline7a26ba32018-03-09 14:18:02 +09001193 if (result != TETHER_ERROR_NO_ERROR) {
Erik Kline2efb8272017-05-31 15:53:53 +09001194 Log.e(TAG, "unable start or stop tethering on iface " + ifname);
Christopher Wiley5c0b10a2016-05-31 14:43:08 -07001195 return;
1196 }
Robert Greenwalt65ae29b2010-02-18 11:25:54 -08001197 }
1198
markchien0f63ca62019-09-30 14:40:57 +08001199 TetheringConfiguration getTetheringConfiguration() {
Erik Kline3e756652017-01-17 13:42:19 +09001200 return mConfig;
1201 }
1202
markchien0f63ca62019-09-30 14:40:57 +08001203 boolean hasTetherableConfiguration() {
Erik Klined781fba2017-01-23 13:01:58 +09001204 final TetheringConfiguration cfg = mConfig;
1205 final boolean hasDownstreamConfiguration =
markchien1be8d8f2018-12-05 21:20:01 +08001206 (cfg.tetherableUsbRegexs.length != 0)
1207 || (cfg.tetherableWifiRegexs.length != 0)
1208 || (cfg.tetherableBluetoothRegexs.length != 0);
1209 final boolean hasUpstreamConfiguration = !cfg.preferredUpstreamIfaceTypes.isEmpty()
1210 || cfg.chooseUpstreamAutomatically;
Erik Klined781fba2017-01-23 13:01:58 +09001211
1212 return hasDownstreamConfiguration && hasUpstreamConfiguration;
1213 }
1214
Erik Kline3e756652017-01-17 13:42:19 +09001215 // TODO - update callers to use getTetheringConfiguration(),
1216 // which has only final members.
markchien0f63ca62019-09-30 14:40:57 +08001217 String[] getTetherableUsbRegexs() {
Erik Kline3e756652017-01-17 13:42:19 +09001218 return copy(mConfig.tetherableUsbRegexs);
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -08001219 }
1220
markchien0f63ca62019-09-30 14:40:57 +08001221 String[] getTetherableWifiRegexs() {
Erik Kline3e756652017-01-17 13:42:19 +09001222 return copy(mConfig.tetherableWifiRegexs);
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001223 }
1224
markchien0f63ca62019-09-30 14:40:57 +08001225 String[] getTetherableBluetoothRegexs() {
Erik Kline3e756652017-01-17 13:42:19 +09001226 return copy(mConfig.tetherableBluetoothRegexs);
Danica Chang6fdd0c62010-08-11 14:54:43 -07001227 }
1228
markchien0f63ca62019-09-30 14:40:57 +08001229 int setUsbTethering(boolean enable) {
Wink Savillec9acde92011-09-21 11:05:43 -07001230 if (VDBG) Log.d(TAG, "setUsbTethering(" + enable + ")");
Erik Klinec438e302017-07-04 22:02:49 +09001231 UsbManager usbManager = (UsbManager) mContext.getSystemService(Context.USB_SERVICE);
Ye Jiao21f96252019-01-28 12:54:22 +08001232 if (usbManager == null) {
1233 mLog.e("setUsbTethering: failed to get UsbManager!");
1234 return TETHER_ERROR_SERVICE_UNAVAIL;
1235 }
1236
Robert Greenwaltb4453622011-11-03 16:01:40 -07001237 synchronized (mPublicSync) {
Jerry Zhang327b8092018-01-09 17:53:04 -08001238 usbManager.setCurrentFunctions(enable ? UsbManager.FUNCTION_RNDIS
1239 : UsbManager.FUNCTION_NONE);
Mike Lockwood6c2260b2011-07-19 13:04:47 -07001240 }
Erik Kline7a26ba32018-03-09 14:18:02 +09001241 return TETHER_ERROR_NO_ERROR;
Mike Lockwood6c2260b2011-07-19 13:04:47 -07001242 }
1243
Milim Lee31ef4c02019-10-17 05:02:33 +09001244 private int setNcmTethering(boolean enable) {
1245 if (VDBG) Log.d(TAG, "setNcmTethering(" + enable + ")");
1246 UsbManager usbManager = (UsbManager) mContext.getSystemService(Context.USB_SERVICE);
1247 synchronized (mPublicSync) {
1248 usbManager.setCurrentFunctions(enable ? UsbManager.FUNCTION_NCM
1249 : UsbManager.FUNCTION_NONE);
1250 }
1251 return TETHER_ERROR_NO_ERROR;
1252 }
1253
Erik Kline1fdc2e22017-05-08 17:56:35 +09001254 // TODO review API - figure out how to delete these entirely.
markchien0f63ca62019-09-30 14:40:57 +08001255 String[] getTetheredIfaces() {
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001256 ArrayList<String> list = new ArrayList<String>();
Robert Greenwaltb4453622011-11-03 16:01:40 -07001257 synchronized (mPublicSync) {
Christopher Wileyd985dde2016-05-31 10:44:35 -07001258 for (int i = 0; i < mTetherStates.size(); i++) {
1259 TetherState tetherState = mTetherStates.valueAt(i);
Erik Kline7a4ccc62018-08-27 17:26:47 +09001260 if (tetherState.lastState == IpServer.STATE_TETHERED) {
Christopher Wileyd985dde2016-05-31 10:44:35 -07001261 list.add(mTetherStates.keyAt(i));
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001262 }
1263 }
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -08001264 }
Christopher Wileyd985dde2016-05-31 10:44:35 -07001265 return list.toArray(new String[list.size()]);
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001266 }
1267
markchien0f63ca62019-09-30 14:40:57 +08001268 String[] getTetherableIfaces() {
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001269 ArrayList<String> list = new ArrayList<String>();
Robert Greenwaltb4453622011-11-03 16:01:40 -07001270 synchronized (mPublicSync) {
Christopher Wileyd985dde2016-05-31 10:44:35 -07001271 for (int i = 0; i < mTetherStates.size(); i++) {
1272 TetherState tetherState = mTetherStates.valueAt(i);
Erik Kline7a4ccc62018-08-27 17:26:47 +09001273 if (tetherState.lastState == IpServer.STATE_AVAILABLE) {
Christopher Wileyd985dde2016-05-31 10:44:35 -07001274 list.add(mTetherStates.keyAt(i));
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001275 }
1276 }
1277 }
Christopher Wileyd985dde2016-05-31 10:44:35 -07001278 return list.toArray(new String[list.size()]);
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001279 }
1280
markchien0f63ca62019-09-30 14:40:57 +08001281 String[] getTetheredDhcpRanges() {
Remi NGUYEN VANe3bb5c52018-06-12 15:57:04 +09001282 // TODO: this is only valid for the old DHCP server. Latest search suggests it is only used
1283 // by WifiP2pServiceImpl to start dnsmasq: remove/deprecate after migrating callers.
1284 return mConfig.legacyDhcpRanges;
Robert Greenwalt9c7e2c22014-06-23 14:53:42 -07001285 }
1286
markchien0f63ca62019-09-30 14:40:57 +08001287 String[] getErroredIfaces() {
Robert Greenwalt5a735062010-03-02 17:25:02 -08001288 ArrayList<String> list = new ArrayList<String>();
Robert Greenwaltb4453622011-11-03 16:01:40 -07001289 synchronized (mPublicSync) {
Christopher Wileyd985dde2016-05-31 10:44:35 -07001290 for (int i = 0; i < mTetherStates.size(); i++) {
1291 TetherState tetherState = mTetherStates.valueAt(i);
Erik Kline7a26ba32018-03-09 14:18:02 +09001292 if (tetherState.lastError != TETHER_ERROR_NO_ERROR) {
Christopher Wileyd985dde2016-05-31 10:44:35 -07001293 list.add(mTetherStates.keyAt(i));
Robert Greenwalt5a735062010-03-02 17:25:02 -08001294 }
1295 }
1296 }
Christopher Wileyd985dde2016-05-31 10:44:35 -07001297 return list.toArray(new String[list.size()]);
Robert Greenwalt5a735062010-03-02 17:25:02 -08001298 }
1299
Erik Kline22108902017-07-06 16:40:06 +09001300 private void logMessage(State state, int what) {
1301 mLog.log(state.getName() + " got " + sMagicDecoderRing.get(what, Integer.toString(what)));
Lorenzo Colitticd63d242016-04-10 15:39:53 +09001302 }
1303
Erik Klineea9cc482017-03-10 19:35:34 +09001304 private boolean upstreamWanted() {
1305 if (!mForwardedDownstreams.isEmpty()) return true;
1306
1307 synchronized (mPublicSync) {
Jerry Zhang656a7bc2017-12-20 14:26:39 -08001308 return mWifiTetherRequested;
Erik Klineea9cc482017-03-10 19:35:34 +09001309 }
1310 }
1311
Erik Kline00019f42016-06-30 19:31:46 +09001312 // Needed because the canonical source of upstream truth is just the
Remi NGUYEN VAN6c02f992018-03-09 14:07:18 +09001313 // upstream interface set, |mCurrentUpstreamIfaceSet|.
markchienb0aca962019-12-05 16:21:17 +08001314 private boolean pertainsToCurrentUpstream(UpstreamNetworkState ns) {
Remi NGUYEN VAN6c02f992018-03-09 14:07:18 +09001315 if (ns != null && ns.linkProperties != null && mCurrentUpstreamIfaceSet != null) {
Erik Kline00019f42016-06-30 19:31:46 +09001316 for (String ifname : ns.linkProperties.getAllInterfaceNames()) {
Remi NGUYEN VAN6c02f992018-03-09 14:07:18 +09001317 if (mCurrentUpstreamIfaceSet.ifnames.contains(ifname)) {
Erik Kline00019f42016-06-30 19:31:46 +09001318 return true;
Erik Kline6ff17f72015-12-10 20:42:12 +09001319 }
1320 }
Erik Kline6ff17f72015-12-10 20:42:12 +09001321 }
Erik Kline00019f42016-06-30 19:31:46 +09001322 return false;
Erik Kline6ff17f72015-12-10 20:42:12 +09001323 }
1324
Wink Saville64c42ca2011-04-18 14:55:10 -07001325 class TetherMasterSM extends StateMachine {
Erik Klineea9cc482017-03-10 19:35:34 +09001326 // an interface SM has requested Tethering/Local Hotspot
1327 static final int EVENT_IFACE_SERVING_STATE_ACTIVE = BASE_MASTER + 1;
1328 // an interface SM has unrequested Tethering/Local Hotspot
1329 static final int EVENT_IFACE_SERVING_STATE_INACTIVE = BASE_MASTER + 2;
Robert Greenwalt6a1967c2010-03-17 11:19:57 -07001330 // upstream connection change - do the right thing
Lorenzo Colitticd63d242016-04-10 15:39:53 +09001331 static final int CMD_UPSTREAM_CHANGED = BASE_MASTER + 3;
Robert Greenwalt6a1967c2010-03-17 11:19:57 -07001332 // we don't have a valid upstream conn, check again after a delay
Lorenzo Colitticd63d242016-04-10 15:39:53 +09001333 static final int CMD_RETRY_UPSTREAM = BASE_MASTER + 4;
Erik Kline6ff17f72015-12-10 20:42:12 +09001334 // Events from NetworkCallbacks that we process on the master state
1335 // machine thread on behalf of the UpstreamNetworkMonitor.
Erik Kline00019f42016-06-30 19:31:46 +09001336 static final int EVENT_UPSTREAM_CALLBACK = BASE_MASTER + 5;
Yohei, Oshima977aad52016-12-08 13:39:20 +09001337 // we treated the error and want now to clear it
1338 static final int CMD_CLEAR_ERROR = BASE_MASTER + 6;
Erik Kline6e9a1012017-06-06 19:24:21 +09001339 static final int EVENT_IFACE_UPDATE_LINKPROPERTIES = BASE_MASTER + 7;
markchien3b519632018-09-07 16:19:12 +08001340 // Events from EntitlementManager to choose upstream again.
1341 static final int EVENT_UPSTREAM_PERMISSION_CHANGED = BASE_MASTER + 8;
Erik Kline32179ff2017-07-04 18:28:11 +09001342 private final State mInitialState;
1343 private final State mTetherModeAliveState;
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001344
Erik Kline32179ff2017-07-04 18:28:11 +09001345 private final State mSetIpForwardingEnabledErrorState;
1346 private final State mSetIpForwardingDisabledErrorState;
1347 private final State mStartTetheringErrorState;
1348 private final State mStopTetheringErrorState;
1349 private final State mSetDnsForwardersErrorState;
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001350
Christopher Wileyd985dde2016-05-31 10:44:35 -07001351 // This list is a little subtle. It contains all the interfaces that currently are
1352 // requesting tethering, regardless of whether these interfaces are still members of
1353 // mTetherStates. This allows us to maintain the following predicates:
1354 //
1355 // 1) mTetherStates contains the set of all currently existing, tetherable, link state up
1356 // interfaces.
1357 // 2) mNotifyList contains all state machines that may have outstanding tethering state
1358 // that needs to be torn down.
1359 //
1360 // Because we excise interfaces immediately from mTetherStates, we must maintain mNotifyList
1361 // so that the garbage collector does not clean up the state machine before it has a chance
1362 // to tear itself down.
Erik Kline7a4ccc62018-08-27 17:26:47 +09001363 private final ArrayList<IpServer> mNotifyList;
Erik Kline1eb8c692016-07-08 17:21:26 +09001364 private final IPv6TetheringCoordinator mIPv6TetheringCoordinator;
Erik Klineed962a82017-07-06 19:49:35 +09001365 private final OffloadWrapper mOffload;
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001366
Robert Greenwalt6a1967c2010-03-17 11:19:57 -07001367 private static final int UPSTREAM_SETTLE_TIME_MS = 10000;
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001368
Remi NGUYEN VAN5d0dc452018-03-15 11:57:14 +09001369 TetherMasterSM(String name, Looper looper, TetheringDependencies deps) {
Robert Greenwaltdfadaea2010-03-11 15:03:08 -08001370 super(name, looper);
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001371
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001372 mInitialState = new InitialState();
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001373 mTetherModeAliveState = new TetherModeAliveState();
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001374 mSetIpForwardingEnabledErrorState = new SetIpForwardingEnabledErrorState();
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001375 mSetIpForwardingDisabledErrorState = new SetIpForwardingDisabledErrorState();
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001376 mStartTetheringErrorState = new StartTetheringErrorState();
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001377 mStopTetheringErrorState = new StopTetheringErrorState();
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001378 mSetDnsForwardersErrorState = new SetDnsForwardersErrorState();
Erik Kline1fdc2e22017-05-08 17:56:35 +09001379
1380 addState(mInitialState);
1381 addState(mTetherModeAliveState);
1382 addState(mSetIpForwardingEnabledErrorState);
1383 addState(mSetIpForwardingDisabledErrorState);
1384 addState(mStartTetheringErrorState);
1385 addState(mStopTetheringErrorState);
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001386 addState(mSetDnsForwardersErrorState);
1387
Mitchell Wills7040b4e2016-05-23 16:40:10 -07001388 mNotifyList = new ArrayList<>();
Remi NGUYEN VAN5d0dc452018-03-15 11:57:14 +09001389 mIPv6TetheringCoordinator = deps.getIPv6TetheringCoordinator(mNotifyList, mLog);
Erik Klineed962a82017-07-06 19:49:35 +09001390 mOffload = new OffloadWrapper();
Erik Kline32179ff2017-07-04 18:28:11 +09001391
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001392 setInitialState(mInitialState);
1393 }
1394
Erik Kline1fdc2e22017-05-08 17:56:35 +09001395 class InitialState extends State {
1396 @Override
1397 public boolean processMessage(Message message) {
Erik Kline22108902017-07-06 16:40:06 +09001398 logMessage(this, message.what);
Erik Kline1fdc2e22017-05-08 17:56:35 +09001399 switch (message.what) {
Erik Kline7a4ccc62018-08-27 17:26:47 +09001400 case EVENT_IFACE_SERVING_STATE_ACTIVE: {
1401 final IpServer who = (IpServer) message.obj;
Erik Kline1fdc2e22017-05-08 17:56:35 +09001402 if (VDBG) Log.d(TAG, "Tether Mode requested by " + who);
1403 handleInterfaceServingStateActive(message.arg1, who);
1404 transitionTo(mTetherModeAliveState);
1405 break;
Erik Kline7a4ccc62018-08-27 17:26:47 +09001406 }
1407 case EVENT_IFACE_SERVING_STATE_INACTIVE: {
1408 final IpServer who = (IpServer) message.obj;
Erik Kline1fdc2e22017-05-08 17:56:35 +09001409 if (VDBG) Log.d(TAG, "Tether Mode unrequested by " + who);
1410 handleInterfaceServingStateInactive(who);
1411 break;
Erik Kline7a4ccc62018-08-27 17:26:47 +09001412 }
Erik Kline6e9a1012017-06-06 19:24:21 +09001413 case EVENT_IFACE_UPDATE_LINKPROPERTIES:
1414 // Silently ignore these for now.
1415 break;
Erik Kline1fdc2e22017-05-08 17:56:35 +09001416 default:
1417 return NOT_HANDLED;
1418 }
1419 return HANDLED;
1420 }
1421 }
1422
Erik Kline3a5278f2017-06-24 19:29:10 +09001423 protected boolean turnOnMasterTetherSettings() {
1424 final TetheringConfiguration cfg = mConfig;
1425 try {
markchiena9d9ef82020-01-07 14:43:17 +08001426 mNetd.ipfwdEnableForwarding(TAG);
1427 } catch (RemoteException | ServiceSpecificException e) {
Erik Kline3a5278f2017-06-24 19:29:10 +09001428 mLog.e(e);
1429 transitionTo(mSetIpForwardingEnabledErrorState);
Robert Greenwaltd70a3d42010-02-23 18:15:29 -08001430 return false;
1431 }
markchiena9d9ef82020-01-07 14:43:17 +08001432
Erik Kline3a5278f2017-06-24 19:29:10 +09001433 // TODO: Randomize DHCPv4 ranges, especially in hotspot mode.
Remi NGUYEN VANe3bb5c52018-06-12 15:57:04 +09001434 // Legacy DHCP server is disabled if passed an empty ranges array
1435 final String[] dhcpRanges = cfg.enableLegacyDhcpServer
markchiena9d9ef82020-01-07 14:43:17 +08001436 ? cfg.legacyDhcpRanges : new String[0];
Erik Kline3a5278f2017-06-24 19:29:10 +09001437 try {
markchiena9d9ef82020-01-07 14:43:17 +08001438 NetdUtils.tetherStart(mNetd, true /** usingLegacyDnsProxy */, dhcpRanges);
1439 } catch (RemoteException | ServiceSpecificException e) {
Robert Greenwaltd70a3d42010-02-23 18:15:29 -08001440 try {
markchiena9d9ef82020-01-07 14:43:17 +08001441 // Stop and retry.
1442 mNetd.tetherStop();
1443 NetdUtils.tetherStart(mNetd, true /** usingLegacyDnsProxy */, dhcpRanges);
1444 } catch (RemoteException | ServiceSpecificException ee) {
Erik Kline3a5278f2017-06-24 19:29:10 +09001445 mLog.e(ee);
1446 transitionTo(mStartTetheringErrorState);
Robert Greenwaltd70a3d42010-02-23 18:15:29 -08001447 return false;
1448 }
Robert Greenwaltd70a3d42010-02-23 18:15:29 -08001449 }
Erik Kline3a5278f2017-06-24 19:29:10 +09001450 mLog.log("SET master tether settings: ON");
1451 return true;
1452 }
Robert Greenwalt10398722010-12-17 15:20:36 -08001453
Erik Kline3a5278f2017-06-24 19:29:10 +09001454 protected boolean turnOffMasterTetherSettings() {
1455 try {
markchiena9d9ef82020-01-07 14:43:17 +08001456 mNetd.tetherStop();
1457 } catch (RemoteException | ServiceSpecificException e) {
Erik Kline3a5278f2017-06-24 19:29:10 +09001458 mLog.e(e);
1459 transitionTo(mStopTetheringErrorState);
1460 return false;
Erik Kline14f7faf2017-02-14 19:03:09 +09001461 }
Erik Kline3a5278f2017-06-24 19:29:10 +09001462 try {
markchiena9d9ef82020-01-07 14:43:17 +08001463 mNetd.ipfwdDisableForwarding(TAG);
1464 } catch (RemoteException | ServiceSpecificException e) {
Erik Kline3a5278f2017-06-24 19:29:10 +09001465 mLog.e(e);
1466 transitionTo(mSetIpForwardingDisabledErrorState);
1467 return false;
1468 }
1469 transitionTo(mInitialState);
1470 mLog.log("SET master tether settings: OFF");
1471 return true;
1472 }
Erik Kline14f7faf2017-02-14 19:03:09 +09001473
Erik Kline3a5278f2017-06-24 19:29:10 +09001474 protected void chooseUpstreamType(boolean tryCell) {
Erik Kline6ee73da2017-07-08 20:36:37 +09001475 // We rebuild configuration on ACTION_CONFIGURATION_CHANGED, but we
1476 // do not currently know how to watch for changes in DUN settings.
markchien3394e142019-04-09 15:53:24 +08001477 maybeDunSettingChanged();
Erik Kline1e2897d2017-06-09 17:08:52 +09001478
Erik Kline72302902018-06-14 17:36:40 +09001479 final TetheringConfiguration config = mConfig;
markchienb0aca962019-12-05 16:21:17 +08001480 final UpstreamNetworkState ns = (config.chooseUpstreamAutomatically)
Erik Kline72302902018-06-14 17:36:40 +09001481 ? mUpstreamNetworkMonitor.getCurrentPreferredUpstream()
1482 : mUpstreamNetworkMonitor.selectPreferredUpstreamType(
1483 config.preferredUpstreamIfaceTypes);
Erik Kline3a5278f2017-06-24 19:29:10 +09001484 if (ns == null) {
1485 if (tryCell) {
1486 mUpstreamNetworkMonitor.registerMobileNetworkRequest();
1487 // We think mobile should be coming up; don't set a retry.
1488 } else {
1489 sendMessageDelayed(CMD_RETRY_UPSTREAM, UPSTREAM_SETTLE_TIME_MS);
Erik Kline1e2897d2017-06-09 17:08:52 +09001490 }
Erik Kline3a5278f2017-06-24 19:29:10 +09001491 }
1492 setUpstreamNetwork(ns);
markchien26299ed2019-02-27 14:56:11 +08001493 final Network newUpstream = (ns != null) ? ns.network : null;
1494 if (mTetherUpstream != newUpstream) {
1495 mTetherUpstream = newUpstream;
1496 mUpstreamNetworkMonitor.setCurrentUpstream(mTetherUpstream);
Chalard Jeanc0fc2762020-04-17 17:12:44 +00001497 reportUpstreamChanged(ns);
markchien26299ed2019-02-27 14:56:11 +08001498 }
Erik Kline3a5278f2017-06-24 19:29:10 +09001499 }
1500
markchienb0aca962019-12-05 16:21:17 +08001501 protected void setUpstreamNetwork(UpstreamNetworkState ns) {
Remi NGUYEN VAN6c02f992018-03-09 14:07:18 +09001502 InterfaceSet ifaces = null;
Erik Klinee8bdb402018-02-23 14:16:06 -08001503 if (ns != null) {
Erik Kline3a5278f2017-06-24 19:29:10 +09001504 // Find the interface with the default IPv4 route. It may be the
1505 // interface described by linkProperties, or one of the interfaces
1506 // stacked on top of it.
Erik Klinee8bdb402018-02-23 14:16:06 -08001507 mLog.i("Looking for default routes on: " + ns.linkProperties);
Remi NGUYEN VAN6c02f992018-03-09 14:07:18 +09001508 ifaces = TetheringInterfaceUtils.getTetheringInterfaces(ns);
1509 mLog.i("Found upstream interface(s): " + ifaces);
Robert Greenwalt6a1967c2010-03-17 11:19:57 -07001510 }
Robert Greenwaltccf83af12011-06-02 17:30:47 -07001511
Remi NGUYEN VAN6c02f992018-03-09 14:07:18 +09001512 if (ifaces != null) {
Erik Kline3a5278f2017-06-24 19:29:10 +09001513 setDnsForwarders(ns.network, ns.linkProperties);
Erik Kline6ff17f72015-12-10 20:42:12 +09001514 }
Remi NGUYEN VAN6c02f992018-03-09 14:07:18 +09001515 notifyDownstreamsOfNewUpstreamIface(ifaces);
Erik Kline3a5278f2017-06-24 19:29:10 +09001516 if (ns != null && pertainsToCurrentUpstream(ns)) {
markchienb0aca962019-12-05 16:21:17 +08001517 // If we already have UpstreamNetworkState for this network update it immediately.
Erik Kline3a5278f2017-06-24 19:29:10 +09001518 handleNewUpstreamNetworkState(ns);
Remi NGUYEN VAN6c02f992018-03-09 14:07:18 +09001519 } else if (mCurrentUpstreamIfaceSet == null) {
1520 // There are no available upstream networks.
Erik Kline3a5278f2017-06-24 19:29:10 +09001521 handleNewUpstreamNetworkState(null);
1522 }
1523 }
Erik Kline6ff17f72015-12-10 20:42:12 +09001524
Erik Kline3a5278f2017-06-24 19:29:10 +09001525 protected void setDnsForwarders(final Network network, final LinkProperties lp) {
1526 // TODO: Set v4 and/or v6 DNS per available connectivity.
Erik Kline3a5278f2017-06-24 19:29:10 +09001527 final Collection<InetAddress> dnses = lp.getDnsServers();
1528 // TODO: Properly support the absence of DNS servers.
markchien87d3f7d2020-01-08 20:58:23 +08001529 final String[] dnsServers;
Erik Kline3a5278f2017-06-24 19:29:10 +09001530 if (dnses != null && !dnses.isEmpty()) {
markchien87d3f7d2020-01-08 20:58:23 +08001531 dnsServers = new String[dnses.size()];
1532 int i = 0;
1533 for (InetAddress dns : dnses) {
1534 dnsServers[i++] = dns.getHostAddress();
1535 }
1536 } else {
1537 dnsServers = mConfig.defaultIPv4DNS;
Robert Greenwalt6a1967c2010-03-17 11:19:57 -07001538 }
markchien587ecb32020-03-18 08:43:07 +08001539 final int netId = (network != null) ? network.getNetId() : NETID_UNSET;
Erik Kline3a5278f2017-06-24 19:29:10 +09001540 try {
markchiena9d9ef82020-01-07 14:43:17 +08001541 mNetd.tetherDnsSet(netId, dnsServers);
Erik Kline3a5278f2017-06-24 19:29:10 +09001542 mLog.log(String.format(
1543 "SET DNS forwarders: network=%s dnsServers=%s",
1544 network, Arrays.toString(dnsServers)));
markchiena9d9ef82020-01-07 14:43:17 +08001545 } catch (RemoteException | ServiceSpecificException e) {
Erik Kline3a5278f2017-06-24 19:29:10 +09001546 // TODO: Investigate how this can fail and what exactly
1547 // happens if/when such failures occur.
1548 mLog.e("setting DNS forwarders failed, " + e);
1549 transitionTo(mSetDnsForwardersErrorState);
1550 }
1551 }
Erik Kline00019f42016-06-30 19:31:46 +09001552
Remi NGUYEN VAN6c02f992018-03-09 14:07:18 +09001553 protected void notifyDownstreamsOfNewUpstreamIface(InterfaceSet ifaces) {
1554 mCurrentUpstreamIfaceSet = ifaces;
Erik Kline7a4ccc62018-08-27 17:26:47 +09001555 for (IpServer ipServer : mNotifyList) {
1556 ipServer.sendMessage(IpServer.CMD_TETHER_CONNECTION_CHANGED, ifaces);
Erik Kline00019f42016-06-30 19:31:46 +09001557 }
Robert Greenwaltd70a3d42010-02-23 18:15:29 -08001558 }
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001559
markchienb0aca962019-12-05 16:21:17 +08001560 protected void handleNewUpstreamNetworkState(UpstreamNetworkState ns) {
Erik Kline3a5278f2017-06-24 19:29:10 +09001561 mIPv6TetheringCoordinator.updateUpstreamNetworkState(ns);
Erik Klineed962a82017-07-06 19:49:35 +09001562 mOffload.updateUpstreamNetworkState(ns);
Erik Kline3a5278f2017-06-24 19:29:10 +09001563 }
1564
Erik Kline7a4ccc62018-08-27 17:26:47 +09001565 private void handleInterfaceServingStateActive(int mode, IpServer who) {
Erik Klineea9cc482017-03-10 19:35:34 +09001566 if (mNotifyList.indexOf(who) < 0) {
1567 mNotifyList.add(who);
1568 mIPv6TetheringCoordinator.addActiveDownstream(who, mode);
1569 }
1570
Erik Kline7a4ccc62018-08-27 17:26:47 +09001571 if (mode == IpServer.STATE_TETHERED) {
Erik Klineed962a82017-07-06 19:49:35 +09001572 // No need to notify OffloadController just yet as there are no
1573 // "offload-able" prefixes to pass along. This will handled
1574 // when the TISM informs Tethering of its LinkProperties.
Erik Klineea9cc482017-03-10 19:35:34 +09001575 mForwardedDownstreams.add(who);
1576 } else {
Erik Klineed962a82017-07-06 19:49:35 +09001577 mOffload.excludeDownstreamInterface(who.interfaceName());
Erik Klineea9cc482017-03-10 19:35:34 +09001578 mForwardedDownstreams.remove(who);
1579 }
Erik Kline216af6d2017-04-27 20:57:23 +09001580
1581 // If this is a Wi-Fi interface, notify WifiManager of the active serving state.
Erik Kline7a26ba32018-03-09 14:18:02 +09001582 if (who.interfaceType() == TETHERING_WIFI) {
Erik Kline216af6d2017-04-27 20:57:23 +09001583 final WifiManager mgr = getWifiManager();
1584 final String iface = who.interfaceName();
1585 switch (mode) {
Erik Kline7a4ccc62018-08-27 17:26:47 +09001586 case IpServer.STATE_TETHERED:
Erik Kline2efb8272017-05-31 15:53:53 +09001587 mgr.updateInterfaceIpState(iface, IFACE_IP_MODE_TETHERED);
Erik Kline216af6d2017-04-27 20:57:23 +09001588 break;
Erik Kline7a4ccc62018-08-27 17:26:47 +09001589 case IpServer.STATE_LOCAL_ONLY:
Erik Kline2efb8272017-05-31 15:53:53 +09001590 mgr.updateInterfaceIpState(iface, IFACE_IP_MODE_LOCAL_ONLY);
Erik Kline216af6d2017-04-27 20:57:23 +09001591 break;
1592 default:
1593 Log.wtf(TAG, "Unknown active serving mode: " + mode);
1594 break;
1595 }
1596 }
Erik Klineea9cc482017-03-10 19:35:34 +09001597 }
1598
Erik Kline7a4ccc62018-08-27 17:26:47 +09001599 private void handleInterfaceServingStateInactive(IpServer who) {
Erik Klineea9cc482017-03-10 19:35:34 +09001600 mNotifyList.remove(who);
1601 mIPv6TetheringCoordinator.removeActiveDownstream(who);
Erik Klineed962a82017-07-06 19:49:35 +09001602 mOffload.excludeDownstreamInterface(who.interfaceName());
Erik Klineea9cc482017-03-10 19:35:34 +09001603 mForwardedDownstreams.remove(who);
Treehugger Robot25067812020-03-25 15:32:41 +00001604 updateConnectedClients(null /* wifiClients */);
Erik Kline216af6d2017-04-27 20:57:23 +09001605
Jianpeng Lia70feec2019-05-24 17:40:15 +09001606 // If this is a Wi-Fi interface, tell WifiManager of any errors
1607 // or the inactive serving state.
Erik Kline7a26ba32018-03-09 14:18:02 +09001608 if (who.interfaceType() == TETHERING_WIFI) {
1609 if (who.lastError() != TETHER_ERROR_NO_ERROR) {
Erik Kline216af6d2017-04-27 20:57:23 +09001610 getWifiManager().updateInterfaceIpState(
Erik Kline2efb8272017-05-31 15:53:53 +09001611 who.interfaceName(), IFACE_IP_MODE_CONFIGURATION_ERROR);
Jianpeng Lia70feec2019-05-24 17:40:15 +09001612 } else {
1613 getWifiManager().updateInterfaceIpState(
1614 who.interfaceName(), IFACE_IP_MODE_UNSPECIFIED);
Erik Kline216af6d2017-04-27 20:57:23 +09001615 }
1616 }
Erik Klineea9cc482017-03-10 19:35:34 +09001617 }
1618
Chalard Jeanc0fc2762020-04-17 17:12:44 +00001619 @VisibleForTesting
1620 void handleUpstreamNetworkMonitorCallback(int arg1, Object o) {
Erik Kline32179ff2017-07-04 18:28:11 +09001621 if (arg1 == UpstreamNetworkMonitor.NOTIFY_LOCAL_PREFIXES) {
Erik Klineed962a82017-07-06 19:49:35 +09001622 mOffload.sendOffloadExemptPrefixes((Set<IpPrefix>) o);
Erik Kline3a5278f2017-06-24 19:29:10 +09001623 return;
1624 }
1625
markchienb0aca962019-12-05 16:21:17 +08001626 final UpstreamNetworkState ns = (UpstreamNetworkState) o;
Erik Kline3a5278f2017-06-24 19:29:10 +09001627
1628 if (ns == null || !pertainsToCurrentUpstream(ns)) {
1629 // TODO: In future, this is where upstream evaluation and selection
1630 // could be handled for notifications which include sufficient data.
1631 // For example, after CONNECTIVITY_ACTION listening is removed, here
1632 // is where we could observe a Wi-Fi network becoming available and
1633 // passing validation.
Remi NGUYEN VAN6c02f992018-03-09 14:07:18 +09001634 if (mCurrentUpstreamIfaceSet == null) {
Erik Kline3a5278f2017-06-24 19:29:10 +09001635 // If we have no upstream interface, try to run through upstream
1636 // selection again. If, for example, IPv4 connectivity has shown up
1637 // after IPv6 (e.g., 464xlat became available) we want the chance to
1638 // notice and act accordingly.
1639 chooseUpstreamType(false);
1640 }
1641 return;
1642 }
1643
1644 switch (arg1) {
Erik Kline3a5278f2017-06-24 19:29:10 +09001645 case UpstreamNetworkMonitor.EVENT_ON_CAPABILITIES:
Chalard Jeanc0fc2762020-04-17 17:12:44 +00001646 if (ns.network.equals(mTetherUpstream)) {
1647 mNotificationUpdater.onUpstreamCapabilitiesChanged(ns.networkCapabilities);
1648 }
Erik Kline3a5278f2017-06-24 19:29:10 +09001649 handleNewUpstreamNetworkState(ns);
1650 break;
1651 case UpstreamNetworkMonitor.EVENT_ON_LINKPROPERTIES:
Remi NGUYEN VAN6c02f992018-03-09 14:07:18 +09001652 chooseUpstreamType(false);
Erik Kline3a5278f2017-06-24 19:29:10 +09001653 break;
1654 case UpstreamNetworkMonitor.EVENT_ON_LOST:
1655 // TODO: Re-evaluate possible upstreams. Currently upstream
1656 // reevaluation is triggered via received CONNECTIVITY_ACTION
1657 // broadcasts that result in being passed a
1658 // TetherMasterSM.CMD_UPSTREAM_CHANGED.
1659 handleNewUpstreamNetworkState(null);
1660 break;
1661 default:
1662 mLog.e("Unknown arg1 value: " + arg1);
1663 break;
1664 }
1665 }
1666
1667 class TetherModeAliveState extends State {
Erik Klineea9cc482017-03-10 19:35:34 +09001668 boolean mUpstreamWanted = false;
Erik Kline6ff17f72015-12-10 20:42:12 +09001669 boolean mTryCell = true;
Erik Klinee0cce212017-03-06 14:05:23 +09001670
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001671 @Override
1672 public void enter() {
Erik Kline1fdc2e22017-05-08 17:56:35 +09001673 // If turning on master tether settings fails, we have already
1674 // transitioned to an error state; exit early.
1675 if (!turnOnMasterTetherSettings()) {
1676 return;
1677 }
1678
markchiena6c72872018-11-13 18:34:56 +09001679 mUpstreamNetworkMonitor.startObserveAllNetworks();
Robert Greenwalt4f74d552011-12-19 16:59:31 -08001680
Erik Klinef4b6e342017-04-25 19:19:59 +09001681 // TODO: De-duplicate with updateUpstreamWanted() below.
Erik Klineea9cc482017-03-10 19:35:34 +09001682 if (upstreamWanted()) {
1683 mUpstreamWanted = true;
Erik Klineed962a82017-07-06 19:49:35 +09001684 mOffload.start();
Erik Klineea9cc482017-03-10 19:35:34 +09001685 chooseUpstreamType(true);
1686 mTryCell = false;
1687 }
Robert Greenwalt6a1967c2010-03-17 11:19:57 -07001688 }
Erik Klinefa37b2f2016-08-02 18:27:03 +09001689
Robert Greenwalt6a1967c2010-03-17 11:19:57 -07001690 @Override
1691 public void exit() {
Erik Klineed962a82017-07-06 19:49:35 +09001692 mOffload.stop();
Erik Kline6ff17f72015-12-10 20:42:12 +09001693 mUpstreamNetworkMonitor.stop();
Erik Kline22108902017-07-06 16:40:06 +09001694 notifyDownstreamsOfNewUpstreamIface(null);
Erik Klinefa37b2f2016-08-02 18:27:03 +09001695 handleNewUpstreamNetworkState(null);
markchien26299ed2019-02-27 14:56:11 +08001696 if (mTetherUpstream != null) {
1697 mTetherUpstream = null;
1698 reportUpstreamChanged(null);
1699 }
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001700 }
Erik Klinefa37b2f2016-08-02 18:27:03 +09001701
Erik Klineea9cc482017-03-10 19:35:34 +09001702 private boolean updateUpstreamWanted() {
1703 final boolean previousUpstreamWanted = mUpstreamWanted;
1704 mUpstreamWanted = upstreamWanted();
Erik Klinef4b6e342017-04-25 19:19:59 +09001705 if (mUpstreamWanted != previousUpstreamWanted) {
1706 if (mUpstreamWanted) {
Erik Klineed962a82017-07-06 19:49:35 +09001707 mOffload.start();
Erik Klinef4b6e342017-04-25 19:19:59 +09001708 } else {
Erik Klineed962a82017-07-06 19:49:35 +09001709 mOffload.stop();
Erik Klinef4b6e342017-04-25 19:19:59 +09001710 }
1711 }
Erik Klineea9cc482017-03-10 19:35:34 +09001712 return previousUpstreamWanted;
1713 }
1714
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001715 @Override
1716 public boolean processMessage(Message message) {
Erik Kline22108902017-07-06 16:40:06 +09001717 logMessage(this, message.what);
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001718 boolean retValue = true;
1719 switch (message.what) {
Erik Klineea9cc482017-03-10 19:35:34 +09001720 case EVENT_IFACE_SERVING_STATE_ACTIVE: {
Erik Kline7a4ccc62018-08-27 17:26:47 +09001721 IpServer who = (IpServer) message.obj;
Robert Greenwalt68ea9b02012-05-10 16:58:16 -07001722 if (VDBG) Log.d(TAG, "Tether Mode requested by " + who);
Erik Klineea9cc482017-03-10 19:35:34 +09001723 handleInterfaceServingStateActive(message.arg1, who);
Erik Kline7a4ccc62018-08-27 17:26:47 +09001724 who.sendMessage(IpServer.CMD_TETHER_CONNECTION_CHANGED,
Remi NGUYEN VAN6c02f992018-03-09 14:07:18 +09001725 mCurrentUpstreamIfaceSet);
Erik Klineea9cc482017-03-10 19:35:34 +09001726 // If there has been a change and an upstream is now
1727 // desired, kick off the selection process.
1728 final boolean previousUpstreamWanted = updateUpstreamWanted();
1729 if (!previousUpstreamWanted && mUpstreamWanted) {
1730 chooseUpstreamType(true);
1731 }
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001732 break;
Erik Kline6e29bf02016-08-15 16:16:18 +09001733 }
Erik Klineea9cc482017-03-10 19:35:34 +09001734 case EVENT_IFACE_SERVING_STATE_INACTIVE: {
Erik Kline7a4ccc62018-08-27 17:26:47 +09001735 IpServer who = (IpServer) message.obj;
Robert Greenwalt68ea9b02012-05-10 16:58:16 -07001736 if (VDBG) Log.d(TAG, "Tether Mode unrequested by " + who);
Erik Klineea9cc482017-03-10 19:35:34 +09001737 handleInterfaceServingStateInactive(who);
1738
1739 if (mNotifyList.isEmpty()) {
Erik Kline47222fc2017-04-30 19:36:15 +09001740 // This transitions us out of TetherModeAliveState,
1741 // either to InitialState or an error state.
Erik Kline1fdc2e22017-05-08 17:56:35 +09001742 turnOffMasterTetherSettings();
1743 break;
1744 }
1745
1746 if (DBG) {
markchien0f63ca62019-09-30 14:40:57 +08001747 Log.d(TAG, "TetherModeAlive still has " + mNotifyList.size()
1748 + " live requests:");
Erik Kline7a4ccc62018-08-27 17:26:47 +09001749 for (IpServer o : mNotifyList) {
Erik Kline1fdc2e22017-05-08 17:56:35 +09001750 Log.d(TAG, " " + o);
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001751 }
1752 }
Erik Klineea9cc482017-03-10 19:35:34 +09001753 // If there has been a change and an upstream is no
1754 // longer desired, release any mobile requests.
1755 final boolean previousUpstreamWanted = updateUpstreamWanted();
1756 if (previousUpstreamWanted && !mUpstreamWanted) {
1757 mUpstreamNetworkMonitor.releaseMobileNetworkRequest();
1758 }
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001759 break;
Erik Kline6e29bf02016-08-15 16:16:18 +09001760 }
Erik Kline6e9a1012017-06-06 19:24:21 +09001761 case EVENT_IFACE_UPDATE_LINKPROPERTIES: {
1762 final LinkProperties newLp = (LinkProperties) message.obj;
Erik Kline7a4ccc62018-08-27 17:26:47 +09001763 if (message.arg1 == IpServer.STATE_TETHERED) {
Erik Klineed962a82017-07-06 19:49:35 +09001764 mOffload.updateDownstreamLinkProperties(newLp);
Erik Kline6e9a1012017-06-06 19:24:21 +09001765 } else {
Erik Klineed962a82017-07-06 19:49:35 +09001766 mOffload.excludeDownstreamInterface(newLp.getInterfaceName());
Erik Kline6e9a1012017-06-06 19:24:21 +09001767 }
1768 break;
1769 }
markchien3b519632018-09-07 16:19:12 +08001770 case EVENT_UPSTREAM_PERMISSION_CHANGED:
Robert Greenwalt6a1967c2010-03-17 11:19:57 -07001771 case CMD_UPSTREAM_CHANGED:
Erik Klineea9cc482017-03-10 19:35:34 +09001772 updateUpstreamWanted();
1773 if (!mUpstreamWanted) break;
1774
Erik Klinefb413432017-02-14 18:26:04 +09001775 // Need to try DUN immediately if Wi-Fi goes down.
1776 chooseUpstreamType(true);
1777 mTryCell = false;
Robert Greenwalt6a1967c2010-03-17 11:19:57 -07001778 break;
Kazuhiro Ondo01758e82011-04-30 20:10:57 -05001779 case CMD_RETRY_UPSTREAM:
Erik Klineea9cc482017-03-10 19:35:34 +09001780 updateUpstreamWanted();
1781 if (!mUpstreamWanted) break;
1782
Kazuhiro Ondo01758e82011-04-30 20:10:57 -05001783 chooseUpstreamType(mTryCell);
1784 mTryCell = !mTryCell;
1785 break;
Erik Kline00019f42016-06-30 19:31:46 +09001786 case EVENT_UPSTREAM_CALLBACK: {
Erik Klineea9cc482017-03-10 19:35:34 +09001787 updateUpstreamWanted();
Erik Kline3a5278f2017-06-24 19:29:10 +09001788 if (mUpstreamWanted) {
1789 handleUpstreamNetworkMonitorCallback(message.arg1, message.obj);
Erik Kline6ff17f72015-12-10 20:42:12 +09001790 }
1791 break;
Erik Kline00019f42016-06-30 19:31:46 +09001792 }
Kazuhiro Ondo01758e82011-04-30 20:10:57 -05001793 default:
1794 retValue = false;
1795 break;
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001796 }
1797 return retValue;
1798 }
1799 }
1800
Wink Saville64c42ca2011-04-18 14:55:10 -07001801 class ErrorState extends State {
Erik Kline8351faa2017-04-17 16:47:23 +09001802 private int mErrorNotification;
1803
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001804 @Override
1805 public boolean processMessage(Message message) {
1806 boolean retValue = true;
1807 switch (message.what) {
Erik Klineea9cc482017-03-10 19:35:34 +09001808 case EVENT_IFACE_SERVING_STATE_ACTIVE:
Erik Kline7a4ccc62018-08-27 17:26:47 +09001809 IpServer who = (IpServer) message.obj;
Robert Greenwalt6a1967c2010-03-17 11:19:57 -07001810 who.sendMessage(mErrorNotification);
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001811 break;
Yohei, Oshima977aad52016-12-08 13:39:20 +09001812 case CMD_CLEAR_ERROR:
Erik Kline7a26ba32018-03-09 14:18:02 +09001813 mErrorNotification = TETHER_ERROR_NO_ERROR;
Yohei, Oshima977aad52016-12-08 13:39:20 +09001814 transitionTo(mInitialState);
1815 break;
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001816 default:
markchien0f63ca62019-09-30 14:40:57 +08001817 retValue = false;
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001818 }
1819 return retValue;
1820 }
Erik Kline8351faa2017-04-17 16:47:23 +09001821
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001822 void notify(int msgType) {
1823 mErrorNotification = msgType;
Erik Kline7a4ccc62018-08-27 17:26:47 +09001824 for (IpServer ipServer : mNotifyList) {
1825 ipServer.sendMessage(msgType);
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001826 }
1827 }
1828
1829 }
Erik Kline8351faa2017-04-17 16:47:23 +09001830
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001831 class SetIpForwardingEnabledErrorState extends ErrorState {
1832 @Override
1833 public void enter() {
1834 Log.e(TAG, "Error in setIpForwardingEnabled");
Erik Kline7a4ccc62018-08-27 17:26:47 +09001835 notify(IpServer.CMD_IP_FORWARDING_ENABLE_ERROR);
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001836 }
1837 }
1838
1839 class SetIpForwardingDisabledErrorState extends ErrorState {
1840 @Override
1841 public void enter() {
1842 Log.e(TAG, "Error in setIpForwardingDisabled");
Erik Kline7a4ccc62018-08-27 17:26:47 +09001843 notify(IpServer.CMD_IP_FORWARDING_DISABLE_ERROR);
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001844 }
1845 }
1846
1847 class StartTetheringErrorState extends ErrorState {
1848 @Override
1849 public void enter() {
1850 Log.e(TAG, "Error in startTethering");
Erik Kline7a4ccc62018-08-27 17:26:47 +09001851 notify(IpServer.CMD_START_TETHERING_ERROR);
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001852 try {
markchiena9d9ef82020-01-07 14:43:17 +08001853 mNetd.ipfwdDisableForwarding(TAG);
1854 } catch (RemoteException | ServiceSpecificException e) { }
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001855 }
1856 }
1857
1858 class StopTetheringErrorState extends ErrorState {
1859 @Override
1860 public void enter() {
1861 Log.e(TAG, "Error in stopTethering");
Erik Kline7a4ccc62018-08-27 17:26:47 +09001862 notify(IpServer.CMD_STOP_TETHERING_ERROR);
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001863 try {
markchiena9d9ef82020-01-07 14:43:17 +08001864 mNetd.ipfwdDisableForwarding(TAG);
1865 } catch (RemoteException | ServiceSpecificException e) { }
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001866 }
1867 }
1868
1869 class SetDnsForwardersErrorState extends ErrorState {
1870 @Override
1871 public void enter() {
1872 Log.e(TAG, "Error in setDnsForwarders");
Erik Kline7a4ccc62018-08-27 17:26:47 +09001873 notify(IpServer.CMD_SET_DNS_FORWARDERS_ERROR);
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001874 try {
markchiena9d9ef82020-01-07 14:43:17 +08001875 mNetd.tetherStop();
1876 } catch (RemoteException | ServiceSpecificException e) { }
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001877 try {
markchiena9d9ef82020-01-07 14:43:17 +08001878 mNetd.ipfwdDisableForwarding(TAG);
1879 } catch (RemoteException | ServiceSpecificException e) { }
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001880 }
1881 }
Erik Klineed962a82017-07-06 19:49:35 +09001882
1883 // A wrapper class to handle multiple situations where several calls to
1884 // the OffloadController need to happen together.
1885 //
1886 // TODO: This suggests that the interface between OffloadController and
1887 // Tethering is in need of improvement. Refactor these calls into the
1888 // OffloadController implementation.
1889 class OffloadWrapper {
1890 public void start() {
Automerger Merge Workerc22ab7b2020-03-09 04:07:07 +00001891 final int status = mOffloadController.start() ? TETHER_HARDWARE_OFFLOAD_STARTED
1892 : TETHER_HARDWARE_OFFLOAD_FAILED;
1893 updateOffloadStatus(status);
Erik Klineed962a82017-07-06 19:49:35 +09001894 sendOffloadExemptPrefixes();
1895 }
1896
1897 public void stop() {
1898 mOffloadController.stop();
Automerger Merge Workerc22ab7b2020-03-09 04:07:07 +00001899 updateOffloadStatus(TETHER_HARDWARE_OFFLOAD_STOPPED);
Erik Klineed962a82017-07-06 19:49:35 +09001900 }
1901
markchienb0aca962019-12-05 16:21:17 +08001902 public void updateUpstreamNetworkState(UpstreamNetworkState ns) {
Erik Klineed962a82017-07-06 19:49:35 +09001903 mOffloadController.setUpstreamLinkProperties(
1904 (ns != null) ? ns.linkProperties : null);
1905 }
1906
1907 public void updateDownstreamLinkProperties(LinkProperties newLp) {
1908 // Update the list of offload-exempt prefixes before adding
1909 // new prefixes on downstream interfaces to the offload HAL.
1910 sendOffloadExemptPrefixes();
1911 mOffloadController.notifyDownstreamLinkProperties(newLp);
1912 }
1913
1914 public void excludeDownstreamInterface(String ifname) {
1915 // This and other interfaces may be in local-only hotspot mode;
1916 // resend all local prefixes to the OffloadController.
1917 sendOffloadExemptPrefixes();
1918 mOffloadController.removeDownstreamInterface(ifname);
1919 }
1920
1921 public void sendOffloadExemptPrefixes() {
1922 sendOffloadExemptPrefixes(mUpstreamNetworkMonitor.getLocalPrefixes());
1923 }
1924
1925 public void sendOffloadExemptPrefixes(final Set<IpPrefix> localPrefixes) {
1926 // Add in well-known minimum set.
1927 PrefixUtils.addNonForwardablePrefixes(localPrefixes);
1928 // Add tragically hardcoded prefixes.
1929 localPrefixes.add(PrefixUtils.DEFAULT_WIFI_P2P_PREFIX);
1930
1931 // Maybe add prefixes or addresses for downstreams, depending on
1932 // the IP serving mode of each.
Erik Kline7a4ccc62018-08-27 17:26:47 +09001933 for (IpServer ipServer : mNotifyList) {
1934 final LinkProperties lp = ipServer.linkProperties();
Erik Klineed962a82017-07-06 19:49:35 +09001935
Erik Kline7a4ccc62018-08-27 17:26:47 +09001936 switch (ipServer.servingMode()) {
1937 case IpServer.STATE_UNAVAILABLE:
1938 case IpServer.STATE_AVAILABLE:
Erik Klineed962a82017-07-06 19:49:35 +09001939 // No usable LinkProperties in these states.
1940 continue;
Erik Kline7a4ccc62018-08-27 17:26:47 +09001941 case IpServer.STATE_TETHERED:
Erik Klineed962a82017-07-06 19:49:35 +09001942 // Only add IPv4 /32 and IPv6 /128 prefixes. The
1943 // directly-connected prefixes will be sent as
1944 // downstream "offload-able" prefixes.
1945 for (LinkAddress addr : lp.getAllLinkAddresses()) {
1946 final InetAddress ip = addr.getAddress();
1947 if (ip.isLinkLocalAddress()) continue;
1948 localPrefixes.add(PrefixUtils.ipAddressAsPrefix(ip));
1949 }
1950 break;
Erik Kline7a4ccc62018-08-27 17:26:47 +09001951 case IpServer.STATE_LOCAL_ONLY:
Erik Klineed962a82017-07-06 19:49:35 +09001952 // Add prefixes covering all local IPs.
1953 localPrefixes.addAll(PrefixUtils.localPrefixesFrom(lp));
1954 break;
1955 }
1956 }
1957
1958 mOffloadController.setLocalPrefixes(localPrefixes);
1959 }
Automerger Merge Workerc22ab7b2020-03-09 04:07:07 +00001960
1961 private void updateOffloadStatus(final int newStatus) {
1962 if (newStatus == mOffloadStatus) return;
1963
1964 mOffloadStatus = newStatus;
1965 reportOffloadStatusChanged(mOffloadStatus);
1966 }
Erik Klineed962a82017-07-06 19:49:35 +09001967 }
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001968 }
1969
markchien0f63ca62019-09-30 14:40:57 +08001970 private void startTrackDefaultNetwork() {
markchien3b519632018-09-07 16:19:12 +08001971 mUpstreamNetworkMonitor.startTrackDefaultNetwork(mDeps.getDefaultNetworkRequest(),
1972 mEntitlementMgr);
markchiena6c72872018-11-13 18:34:56 +09001973 }
1974
markchienf2731272019-01-16 17:44:13 +08001975 /** Get the latest value of the tethering entitlement check. */
markchien0f63ca62019-09-30 14:40:57 +08001976 void requestLatestTetheringEntitlementResult(int type, ResultReceiver receiver,
markchienf2731272019-01-16 17:44:13 +08001977 boolean showEntitlementUi) {
Mark Chien3075fbb2020-04-16 02:47:22 +00001978 if (receiver == null) return;
1979
1980 mHandler.post(() -> {
markchien0f63ca62019-09-30 14:40:57 +08001981 mEntitlementMgr.requestLatestTetheringEntitlementResult(type, receiver,
1982 showEntitlementUi);
Mark Chien3075fbb2020-04-16 02:47:22 +00001983 });
markchienf2731272019-01-16 17:44:13 +08001984 }
1985
markchien26299ed2019-02-27 14:56:11 +08001986 /** Register tethering event callback */
markchienae8aa642019-12-16 20:15:20 +08001987 void registerTetheringEventCallback(ITetheringEventCallback callback) {
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +09001988 final boolean hasListPermission =
Chiachang Wang96ca8e92020-02-21 17:50:18 +08001989 hasCallingPermission(NETWORK_SETTINGS)
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +09001990 || hasCallingPermission(PERMISSION_MAINLINE_NETWORK_STACK)
Chiachang Wang96ca8e92020-02-21 17:50:18 +08001991 || hasCallingPermission(NETWORK_STACK);
markchien26299ed2019-02-27 14:56:11 +08001992 mHandler.post(() -> {
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +09001993 mTetheringEventCallbacks.register(callback, new CallbackCookie(hasListPermission));
markchien40898ca2020-01-21 13:11:06 +08001994 final TetheringCallbackStartedParcel parcel = new TetheringCallbackStartedParcel();
markchiencb8860c2020-05-12 00:08:27 +08001995 parcel.tetheringSupported = isTetheringSupported();
markchien40898ca2020-01-21 13:11:06 +08001996 parcel.upstreamNetwork = mTetherUpstream;
1997 parcel.config = mConfig.toStableParcelable();
markchienfaa37282020-02-06 14:34:08 +08001998 parcel.states =
1999 mTetherStatesParcel != null ? mTetherStatesParcel : emptyTetherStatesParcel();
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +09002000 parcel.tetheredClients = hasListPermission
2001 ? mConnectedClientsTracker.getLastTetheredClients()
2002 : Collections.emptyList();
Automerger Merge Workerc22ab7b2020-03-09 04:07:07 +00002003 parcel.offloadStatus = mOffloadStatus;
markchien26299ed2019-02-27 14:56:11 +08002004 try {
markchien40898ca2020-01-21 13:11:06 +08002005 callback.onCallbackStarted(parcel);
markchien26299ed2019-02-27 14:56:11 +08002006 } catch (RemoteException e) {
2007 // Not really very much to do here.
2008 }
markchien26299ed2019-02-27 14:56:11 +08002009 });
2010 }
2011
markchienfaa37282020-02-06 14:34:08 +08002012 private TetherStatesParcel emptyTetherStatesParcel() {
2013 final TetherStatesParcel parcel = new TetherStatesParcel();
2014 parcel.availableList = new String[0];
2015 parcel.tetheredList = new String[0];
2016 parcel.localOnlyList = new String[0];
2017 parcel.erroredIfaceList = new String[0];
2018 parcel.lastErrorList = new int[0];
2019
2020 return parcel;
2021 }
2022
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +09002023 private boolean hasCallingPermission(@NonNull String permission) {
2024 return mContext.checkCallingPermission(permission) == PERMISSION_GRANTED;
2025 }
2026
markchienae8aa642019-12-16 20:15:20 +08002027 /** Unregister tethering event callback */
2028 void unregisterTetheringEventCallback(ITetheringEventCallback callback) {
2029 mHandler.post(() -> {
2030 mTetheringEventCallbacks.unregister(callback);
2031 });
2032 }
markchien0f63ca62019-09-30 14:40:57 +08002033
Chalard Jeanc0fc2762020-04-17 17:12:44 +00002034 private void reportUpstreamChanged(UpstreamNetworkState ns) {
markchienae8aa642019-12-16 20:15:20 +08002035 final int length = mTetheringEventCallbacks.beginBroadcast();
Chalard Jeanc0fc2762020-04-17 17:12:44 +00002036 final Network network = (ns != null) ? ns.network : null;
2037 final NetworkCapabilities capabilities = (ns != null) ? ns.networkCapabilities : null;
markchien26299ed2019-02-27 14:56:11 +08002038 try {
markchienae8aa642019-12-16 20:15:20 +08002039 for (int i = 0; i < length; i++) {
2040 try {
2041 mTetheringEventCallbacks.getBroadcastItem(i).onUpstreamChanged(network);
2042 } catch (RemoteException e) {
2043 // Not really very much to do here.
2044 }
2045 }
2046 } finally {
2047 mTetheringEventCallbacks.finishBroadcast();
markchien26299ed2019-02-27 14:56:11 +08002048 }
Chalard Jeanc0fc2762020-04-17 17:12:44 +00002049 // Need to notify capabilities change after upstream network changed because new network's
2050 // capabilities should be checked every time.
2051 mNotificationUpdater.onUpstreamCapabilitiesChanged(capabilities);
markchien26299ed2019-02-27 14:56:11 +08002052 }
2053
markchien0f63ca62019-09-30 14:40:57 +08002054 private void reportConfigurationChanged(TetheringConfigurationParcel config) {
markchienae8aa642019-12-16 20:15:20 +08002055 final int length = mTetheringEventCallbacks.beginBroadcast();
markchien0f63ca62019-09-30 14:40:57 +08002056 try {
markchienae8aa642019-12-16 20:15:20 +08002057 for (int i = 0; i < length; i++) {
2058 try {
2059 mTetheringEventCallbacks.getBroadcastItem(i).onConfigurationChanged(config);
markchien40898ca2020-01-21 13:11:06 +08002060 // TODO(b/148139325): send tetheringSupported on configuration change
markchienae8aa642019-12-16 20:15:20 +08002061 } catch (RemoteException e) {
2062 // Not really very much to do here.
2063 }
2064 }
2065 } finally {
2066 mTetheringEventCallbacks.finishBroadcast();
markchien0f63ca62019-09-30 14:40:57 +08002067 }
2068 }
2069
2070 private void reportTetherStateChanged(TetherStatesParcel states) {
markchienae8aa642019-12-16 20:15:20 +08002071 final int length = mTetheringEventCallbacks.beginBroadcast();
markchien0f63ca62019-09-30 14:40:57 +08002072 try {
markchienae8aa642019-12-16 20:15:20 +08002073 for (int i = 0; i < length; i++) {
2074 try {
2075 mTetheringEventCallbacks.getBroadcastItem(i).onTetherStatesChanged(states);
2076 } catch (RemoteException e) {
2077 // Not really very much to do here.
2078 }
2079 }
2080 } finally {
2081 mTetheringEventCallbacks.finishBroadcast();
markchien0f63ca62019-09-30 14:40:57 +08002082 }
2083 }
2084
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +09002085 private void reportTetherClientsChanged(List<TetheredClient> clients) {
2086 final int length = mTetheringEventCallbacks.beginBroadcast();
2087 try {
2088 for (int i = 0; i < length; i++) {
2089 try {
2090 final CallbackCookie cookie =
2091 (CallbackCookie) mTetheringEventCallbacks.getBroadcastCookie(i);
2092 if (!cookie.hasListClientsPermission) continue;
2093 mTetheringEventCallbacks.getBroadcastItem(i).onTetherClientsChanged(clients);
2094 } catch (RemoteException e) {
2095 // Not really very much to do here.
2096 }
2097 }
2098 } finally {
2099 mTetheringEventCallbacks.finishBroadcast();
2100 }
2101 }
2102
Automerger Merge Workerc22ab7b2020-03-09 04:07:07 +00002103 private void reportOffloadStatusChanged(final int status) {
2104 final int length = mTetheringEventCallbacks.beginBroadcast();
2105 try {
2106 for (int i = 0; i < length; i++) {
2107 try {
2108 mTetheringEventCallbacks.getBroadcastItem(i).onOffloadStatusChanged(status);
2109 } catch (RemoteException e) {
2110 // Not really very much to do here.
2111 }
2112 }
2113 } finally {
2114 mTetheringEventCallbacks.finishBroadcast();
2115 }
2116 }
2117
markchiencb8860c2020-05-12 00:08:27 +08002118 // if ro.tether.denied = true we default to no tethering
2119 // gservices could set the secure setting to 1 though to enable it on a build where it
2120 // had previously been turned off.
2121 boolean isTetheringSupported() {
2122 final int defaultVal =
2123 SystemProperties.get("ro.tether.denied").equals("true") ? 0 : 1;
2124 final boolean tetherSupported = Settings.Global.getInt(mContext.getContentResolver(),
2125 Settings.Global.TETHER_SUPPORTED, defaultVal) != 0;
2126 final boolean tetherEnabledInSettings = tetherSupported
2127 && !mUserManager.hasUserRestriction(UserManager.DISALLOW_CONFIG_TETHERING);
2128
2129 return tetherEnabledInSettings && hasTetherableConfiguration();
2130 }
2131
markchiena9d9ef82020-01-07 14:43:17 +08002132 void dump(@NonNull FileDescriptor fd, @NonNull PrintWriter writer, @Nullable String[] args) {
Christopher Wiley499a57a2016-05-16 16:19:07 -07002133 // Binder.java closes the resource for us.
2134 @SuppressWarnings("resource")
Lorenzo Colittie3805462015-06-03 11:18:24 +09002135 final IndentingPrintWriter pw = new IndentingPrintWriter(writer, " ");
markchienae8aa642019-12-16 20:15:20 +08002136 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
2137 != PERMISSION_GRANTED) {
2138 pw.println("Permission Denial: can't dump.");
2139 return;
2140 }
Robert Greenwalt2a091d72010-02-11 18:18:40 -08002141
Lorenzo Colittie3805462015-06-03 11:18:24 +09002142 pw.println("Tethering:");
2143 pw.increaseIndent();
Lorenzo Colittie3805462015-06-03 11:18:24 +09002144
Erik Kline9db1b542017-03-16 14:10:27 +09002145 pw.println("Configuration:");
2146 pw.increaseIndent();
2147 final TetheringConfiguration cfg = mConfig;
2148 cfg.dump(pw);
2149 pw.decreaseIndent();
2150
markchien3b519632018-09-07 16:19:12 +08002151 pw.println("Entitlement:");
2152 pw.increaseIndent();
2153 mEntitlementMgr.dump(pw);
2154 pw.decreaseIndent();
2155
Erik Kline9db1b542017-03-16 14:10:27 +09002156 synchronized (mPublicSync) {
Robert Greenwaltb4453622011-11-03 16:01:40 -07002157 pw.println("Tether state:");
Lorenzo Colittie3805462015-06-03 11:18:24 +09002158 pw.increaseIndent();
Christopher Wileyd985dde2016-05-31 10:44:35 -07002159 for (int i = 0; i < mTetherStates.size(); i++) {
2160 final String iface = mTetherStates.keyAt(i);
2161 final TetherState tetherState = mTetherStates.valueAt(i);
2162 pw.print(iface + " - ");
2163
Hugo Benichib55fb222017-03-10 14:20:57 +09002164 switch (tetherState.lastState) {
Erik Kline7a4ccc62018-08-27 17:26:47 +09002165 case IpServer.STATE_UNAVAILABLE:
Christopher Wileyd985dde2016-05-31 10:44:35 -07002166 pw.print("UnavailableState");
2167 break;
Erik Kline7a4ccc62018-08-27 17:26:47 +09002168 case IpServer.STATE_AVAILABLE:
Christopher Wileyd985dde2016-05-31 10:44:35 -07002169 pw.print("AvailableState");
2170 break;
Erik Kline7a4ccc62018-08-27 17:26:47 +09002171 case IpServer.STATE_TETHERED:
Christopher Wileyd985dde2016-05-31 10:44:35 -07002172 pw.print("TetheredState");
2173 break;
Erik Kline7a4ccc62018-08-27 17:26:47 +09002174 case IpServer.STATE_LOCAL_ONLY:
Erik Klineea9cc482017-03-10 19:35:34 +09002175 pw.print("LocalHotspotState");
2176 break;
Christopher Wileyd985dde2016-05-31 10:44:35 -07002177 default:
2178 pw.print("UnknownState");
2179 break;
2180 }
Hugo Benichib55fb222017-03-10 14:20:57 +09002181 pw.println(" - lastError = " + tetherState.lastError);
Robert Greenwalt2a091d72010-02-11 18:18:40 -08002182 }
Erik Klineea9cc482017-03-10 19:35:34 +09002183 pw.println("Upstream wanted: " + upstreamWanted());
Remi NGUYEN VAN6c02f992018-03-09 14:07:18 +09002184 pw.println("Current upstream interface(s): " + mCurrentUpstreamIfaceSet);
Lorenzo Colittie3805462015-06-03 11:18:24 +09002185 pw.decreaseIndent();
Robert Greenwalt2a091d72010-02-11 18:18:40 -08002186 }
Erik Kline1fdc2e22017-05-08 17:56:35 +09002187
Lorenzo Colittic2519c52017-07-13 01:48:26 +09002188 pw.println("Hardware offload:");
2189 pw.increaseIndent();
2190 mOffloadController.dump(pw);
2191 pw.decreaseIndent();
2192
Erik Kline1fdc2e22017-05-08 17:56:35 +09002193 pw.println("Log:");
2194 pw.increaseIndent();
markchien0f63ca62019-09-30 14:40:57 +08002195 if (argsContain(args, "--short")) {
Erik Kline7747fd42017-05-12 16:52:48 +09002196 pw.println("<log removed for brevity>");
2197 } else {
2198 mLog.dump(fd, pw, args);
2199 }
Erik Kline1fdc2e22017-05-08 17:56:35 +09002200 pw.decreaseIndent();
2201
Lorenzo Colittie3805462015-06-03 11:18:24 +09002202 pw.decreaseIndent();
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -08002203 }
Christopher Wileye03fb442016-05-18 13:45:20 -07002204
Erik Kline7747fd42017-05-12 16:52:48 +09002205 private static boolean argsContain(String[] args, String target) {
2206 for (String arg : args) {
Erik Klineee363c42017-05-29 09:11:03 +09002207 if (target.equals(arg)) return true;
Erik Kline7747fd42017-05-12 16:52:48 +09002208 }
2209 return false;
2210 }
2211
Treehugger Robot25067812020-03-25 15:32:41 +00002212 private void updateConnectedClients(final List<WifiClient> wifiClients) {
2213 if (mConnectedClientsTracker.updateConnectedClients(mForwardedDownstreams, wifiClients)) {
2214 reportTetherClientsChanged(mConnectedClientsTracker.getLastTetheredClients());
2215 }
2216 }
2217
Erik Kline7a4ccc62018-08-27 17:26:47 +09002218 private IpServer.Callback makeControlCallback() {
2219 return new IpServer.Callback() {
Erik Kline6e9a1012017-06-06 19:24:21 +09002220 @Override
Erik Kline7a4ccc62018-08-27 17:26:47 +09002221 public void updateInterfaceState(IpServer who, int state, int lastError) {
2222 notifyInterfaceStateChange(who, state, lastError);
Erik Kline6e9a1012017-06-06 19:24:21 +09002223 }
2224
2225 @Override
Erik Kline7a4ccc62018-08-27 17:26:47 +09002226 public void updateLinkProperties(IpServer who, LinkProperties newLp) {
2227 notifyLinkPropertiesChanged(who, newLp);
Erik Kline6e9a1012017-06-06 19:24:21 +09002228 }
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +09002229
2230 @Override
2231 public void dhcpLeasesChanged() {
Treehugger Robot25067812020-03-25 15:32:41 +00002232 updateConnectedClients(null /* wifiClients */);
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +09002233 }
Erik Kline6e9a1012017-06-06 19:24:21 +09002234 };
2235 }
2236
2237 // TODO: Move into TetherMasterSM.
Erik Kline7a4ccc62018-08-27 17:26:47 +09002238 private void notifyInterfaceStateChange(IpServer who, int state, int error) {
2239 final String iface = who.interfaceName();
Christopher Wileyd985dde2016-05-31 10:44:35 -07002240 synchronized (mPublicSync) {
Erik Kline216af6d2017-04-27 20:57:23 +09002241 final TetherState tetherState = mTetherStates.get(iface);
Erik Kline7a4ccc62018-08-27 17:26:47 +09002242 if (tetherState != null && tetherState.ipServer.equals(who)) {
Hugo Benichib55fb222017-03-10 14:20:57 +09002243 tetherState.lastState = state;
2244 tetherState.lastError = error;
Christopher Wileyd985dde2016-05-31 10:44:35 -07002245 } else {
2246 if (DBG) Log.d(TAG, "got notification from stale iface " + iface);
2247 }
2248 }
2249
Erik Kline7747fd42017-05-12 16:52:48 +09002250 mLog.log(String.format("OBSERVED iface=%s state=%s error=%s", iface, state, error));
Christopher Wileyd985dde2016-05-31 10:44:35 -07002251
Yohei, Oshima977aad52016-12-08 13:39:20 +09002252 // If TetherMasterSM is in ErrorState, TetherMasterSM stays there.
2253 // Thus we give a chance for TetherMasterSM to recover to InitialState
2254 // by sending CMD_CLEAR_ERROR
markchien62a625d2020-03-19 13:37:43 +08002255 if (error == TETHER_ERROR_INTERNAL_ERROR) {
Yohei, Oshima977aad52016-12-08 13:39:20 +09002256 mTetherMasterSM.sendMessage(TetherMasterSM.CMD_CLEAR_ERROR, who);
2257 }
Erik Klineea9cc482017-03-10 19:35:34 +09002258 int which;
Christopher Wileyd985dde2016-05-31 10:44:35 -07002259 switch (state) {
Erik Kline7a4ccc62018-08-27 17:26:47 +09002260 case IpServer.STATE_UNAVAILABLE:
2261 case IpServer.STATE_AVAILABLE:
Erik Klineea9cc482017-03-10 19:35:34 +09002262 which = TetherMasterSM.EVENT_IFACE_SERVING_STATE_INACTIVE;
Christopher Wileyd985dde2016-05-31 10:44:35 -07002263 break;
Erik Kline7a4ccc62018-08-27 17:26:47 +09002264 case IpServer.STATE_TETHERED:
2265 case IpServer.STATE_LOCAL_ONLY:
Erik Klineea9cc482017-03-10 19:35:34 +09002266 which = TetherMasterSM.EVENT_IFACE_SERVING_STATE_ACTIVE;
Christopher Wileyd985dde2016-05-31 10:44:35 -07002267 break;
Erik Klineea9cc482017-03-10 19:35:34 +09002268 default:
2269 Log.wtf(TAG, "Unknown interface state: " + state);
2270 return;
Christopher Wileyd985dde2016-05-31 10:44:35 -07002271 }
Erik Klineea9cc482017-03-10 19:35:34 +09002272 mTetherMasterSM.sendMessage(which, state, 0, who);
Christopher Wileyd985dde2016-05-31 10:44:35 -07002273 sendTetherStateChangedBroadcast();
2274 }
2275
Erik Kline7a4ccc62018-08-27 17:26:47 +09002276 private void notifyLinkPropertiesChanged(IpServer who, LinkProperties newLp) {
2277 final String iface = who.interfaceName();
Erik Kline6e9a1012017-06-06 19:24:21 +09002278 final int state;
2279 synchronized (mPublicSync) {
2280 final TetherState tetherState = mTetherStates.get(iface);
Erik Kline7a4ccc62018-08-27 17:26:47 +09002281 if (tetherState != null && tetherState.ipServer.equals(who)) {
Erik Kline6e9a1012017-06-06 19:24:21 +09002282 state = tetherState.lastState;
2283 } else {
2284 mLog.log("got notification from stale iface " + iface);
2285 return;
2286 }
2287 }
2288
Erik Kline7fd696c2017-06-12 18:20:08 +09002289 mLog.log(String.format(
2290 "OBSERVED LinkProperties update iface=%s state=%s lp=%s",
Erik Kline7a4ccc62018-08-27 17:26:47 +09002291 iface, IpServer.getStateString(state), newLp));
Erik Kline6e9a1012017-06-06 19:24:21 +09002292 final int which = TetherMasterSM.EVENT_IFACE_UPDATE_LINKPROPERTIES;
2293 mTetherMasterSM.sendMessage(which, state, 0, newLp);
2294 }
2295
Erik Kline4dd9bb82017-04-26 11:11:07 +09002296 private void maybeTrackNewInterfaceLocked(final String iface) {
2297 // If we don't care about this type of interface, ignore.
2298 final int interfaceType = ifaceNameToType(iface);
Erik Kline7a26ba32018-03-09 14:18:02 +09002299 if (interfaceType == TETHERING_INVALID) {
Erik Kline4dd9bb82017-04-26 11:11:07 +09002300 mLog.log(iface + " is not a tetherable iface, ignoring");
2301 return;
2302 }
Erik Klinea9cde8b2017-06-20 21:18:31 +09002303 maybeTrackNewInterfaceLocked(iface, interfaceType);
2304 }
Erik Kline4dd9bb82017-04-26 11:11:07 +09002305
Erik Klinea9cde8b2017-06-20 21:18:31 +09002306 private void maybeTrackNewInterfaceLocked(final String iface, int interfaceType) {
Erik Kline4dd9bb82017-04-26 11:11:07 +09002307 // If we have already started a TISM for this interface, skip.
2308 if (mTetherStates.containsKey(iface)) {
2309 mLog.log("active iface (" + iface + ") reported as added, ignoring");
2310 return;
2311 }
2312
2313 mLog.log("adding TetheringInterfaceStateMachine for: " + iface);
2314 final TetherState tetherState = new TetherState(
junyulaie3f41432019-12-03 14:34:13 +08002315 new IpServer(iface, mLooper, interfaceType, mLog, mNetd,
Erik Kline7a4ccc62018-08-27 17:26:47 +09002316 makeControlCallback(), mConfig.enableLegacyDhcpServer,
Nucca Chen95e0bac2020-05-12 11:34:28 +00002317 mConfig.enableBpfOffload, mDeps.getIpServerDependencies()));
Christopher Wileyd985dde2016-05-31 10:44:35 -07002318 mTetherStates.put(iface, tetherState);
Erik Kline7a4ccc62018-08-27 17:26:47 +09002319 tetherState.ipServer.start();
Christopher Wileye03fb442016-05-18 13:45:20 -07002320 }
Erik Kline3e756652017-01-17 13:42:19 +09002321
Erik Kline4dd9bb82017-04-26 11:11:07 +09002322 private void stopTrackingInterfaceLocked(final String iface) {
2323 final TetherState tetherState = mTetherStates.get(iface);
2324 if (tetherState == null) {
2325 mLog.log("attempting to remove unknown iface (" + iface + "), ignoring");
2326 return;
2327 }
Erik Kline7a4ccc62018-08-27 17:26:47 +09002328 tetherState.ipServer.stop();
Erik Kline4dd9bb82017-04-26 11:11:07 +09002329 mLog.log("removing TetheringInterfaceStateMachine for: " + iface);
2330 mTetherStates.remove(iface);
2331 }
2332
Erik Kline3e756652017-01-17 13:42:19 +09002333 private static String[] copy(String[] strarray) {
2334 return Arrays.copyOf(strarray, strarray.length);
2335 }
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -08002336}