blob: ae6119f24feec5552ff9d970bb0dfade2edce795 [file] [log] [blame]
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -08001/*
2 * Copyright (C) 2010 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
markchien503be612020-04-12 21:41:29 +080017package com.android.networkstack.tethering;
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -080018
Chiachang Wang96ca8e92020-02-21 17:50:18 +080019import static android.Manifest.permission.NETWORK_SETTINGS;
20import static android.Manifest.permission.NETWORK_STACK;
markchienae8aa642019-12-16 20:15:20 +080021import static android.content.pm.PackageManager.PERMISSION_GRANTED;
Erik Klinec438e302017-07-04 22:02:49 +090022import static android.hardware.usb.UsbManager.USB_CONFIGURED;
Erik Kline2e88b5e2017-01-18 11:57:45 +090023import static android.hardware.usb.UsbManager.USB_CONNECTED;
Milim Lee31ef4c02019-10-17 05:02:33 +090024import static android.hardware.usb.UsbManager.USB_FUNCTION_NCM;
Erik Kline2e88b5e2017-01-18 11:57:45 +090025import static android.hardware.usb.UsbManager.USB_FUNCTION_RNDIS;
markchien3fe660b2019-12-05 12:04:59 +080026import static android.net.ConnectivityManager.ACTION_RESTRICT_BACKGROUND_CHANGED;
Erik Kline7a26ba32018-03-09 14:18:02 +090027import static android.net.ConnectivityManager.CONNECTIVITY_ACTION;
Erik Kline7a26ba32018-03-09 14:18:02 +090028import static android.net.ConnectivityManager.EXTRA_NETWORK_INFO;
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +090029import static android.net.NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK;
markchien9e44cde2019-12-25 19:40:32 +080030import static android.net.TetheringManager.ACTION_TETHER_STATE_CHANGED;
31import static android.net.TetheringManager.EXTRA_ACTIVE_LOCAL_ONLY;
32import static android.net.TetheringManager.EXTRA_ACTIVE_TETHER;
33import static android.net.TetheringManager.EXTRA_AVAILABLE_TETHER;
34import static android.net.TetheringManager.EXTRA_ERRORED_TETHER;
35import static android.net.TetheringManager.TETHERING_BLUETOOTH;
Remi NGUYEN VAN84229e02020-01-24 22:57:09 +090036import static android.net.TetheringManager.TETHERING_ETHERNET;
markchien9e44cde2019-12-25 19:40:32 +080037import static android.net.TetheringManager.TETHERING_INVALID;
Milim Lee31ef4c02019-10-17 05:02:33 +090038import static android.net.TetheringManager.TETHERING_NCM;
markchien9e44cde2019-12-25 19:40:32 +080039import static android.net.TetheringManager.TETHERING_USB;
40import static android.net.TetheringManager.TETHERING_WIFI;
41import static android.net.TetheringManager.TETHERING_WIFI_P2P;
markchien62a625d2020-03-19 13:37:43 +080042import static android.net.TetheringManager.TETHER_ERROR_INTERNAL_ERROR;
markchien9e44cde2019-12-25 19:40:32 +080043import static android.net.TetheringManager.TETHER_ERROR_NO_ERROR;
44import static android.net.TetheringManager.TETHER_ERROR_SERVICE_UNAVAIL;
45import static android.net.TetheringManager.TETHER_ERROR_UNAVAIL_IFACE;
46import static android.net.TetheringManager.TETHER_ERROR_UNKNOWN_IFACE;
markchien62a625d2020-03-19 13:37:43 +080047import static android.net.TetheringManager.TETHER_ERROR_UNKNOWN_TYPE;
Automerger Merge Workerc22ab7b2020-03-09 04:07:07 +000048import static android.net.TetheringManager.TETHER_HARDWARE_OFFLOAD_FAILED;
49import static android.net.TetheringManager.TETHER_HARDWARE_OFFLOAD_STARTED;
50import static android.net.TetheringManager.TETHER_HARDWARE_OFFLOAD_STOPPED;
markchien986750b2019-12-06 15:24:53 +080051import static android.net.util.TetheringMessageBase.BASE_MASTER;
Erik Kline2efb8272017-05-31 15:53:53 +090052import static android.net.wifi.WifiManager.EXTRA_WIFI_AP_INTERFACE_NAME;
53import static android.net.wifi.WifiManager.EXTRA_WIFI_AP_MODE;
Erik Kline2e88b5e2017-01-18 11:57:45 +090054import static android.net.wifi.WifiManager.EXTRA_WIFI_AP_STATE;
Erik Kline2efb8272017-05-31 15:53:53 +090055import static android.net.wifi.WifiManager.IFACE_IP_MODE_CONFIGURATION_ERROR;
56import static android.net.wifi.WifiManager.IFACE_IP_MODE_LOCAL_ONLY;
57import static android.net.wifi.WifiManager.IFACE_IP_MODE_TETHERED;
58import static android.net.wifi.WifiManager.IFACE_IP_MODE_UNSPECIFIED;
Erik Kline2e88b5e2017-01-18 11:57:45 +090059import static android.net.wifi.WifiManager.WIFI_AP_STATE_DISABLED;
Erik Klinede637722017-10-12 22:16:01 +090060import static android.telephony.CarrierConfigManager.ACTION_CARRIER_CONFIG_CHANGED;
markchien04bdf872019-06-17 21:05:34 +080061import static android.telephony.SubscriptionManager.INVALID_SUBSCRIPTION_ID;
markchienb6eb2c22018-07-18 14:29:20 +080062
markchien503be612020-04-12 21:41:29 +080063import static com.android.networkstack.tethering.TetheringNotificationUpdater.DOWNSTREAM_NONE;
Automerger Merge Worker2d7bacc2020-03-09 08:54:00 +000064
Jeremy Klein36c7aa02016-01-22 14:11:45 -080065import android.bluetooth.BluetoothAdapter;
66import android.bluetooth.BluetoothPan;
67import android.bluetooth.BluetoothProfile;
68import android.bluetooth.BluetoothProfile.ServiceListener;
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -080069import android.content.BroadcastReceiver;
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -080070import android.content.Context;
71import android.content.Intent;
72import android.content.IntentFilter;
Mike Lockwoodc4308f02011-03-01 08:04:54 -080073import android.hardware.usb.UsbManager;
markchien3fe660b2019-12-05 12:04:59 +080074import android.net.ConnectivityManager;
Remi NGUYEN VAN84229e02020-01-24 22:57:09 +090075import android.net.EthernetManager;
markchiene8b9d752020-01-20 19:31:56 +080076import android.net.IIntResultListener;
markchien0f63ca62019-09-30 14:40:57 +080077import android.net.INetd;
markchienae8aa642019-12-16 20:15:20 +080078import android.net.ITetheringEventCallback;
Erik Kline3a5278f2017-06-24 19:29:10 +090079import android.net.IpPrefix;
Erik Klineed962a82017-07-06 19:49:35 +090080import android.net.LinkAddress;
Robert Greenwalt05d89362011-01-23 16:04:05 -080081import android.net.LinkProperties;
Lorenzo Colittib57edc52014-08-22 17:10:50 -070082import android.net.Network;
Chalard Jeanc0fc2762020-04-17 17:12:44 +000083import android.net.NetworkCapabilities;
Robert Greenwalt2a091d72010-02-11 18:18:40 -080084import android.net.NetworkInfo;
markchien0f63ca62019-09-30 14:40:57 +080085import android.net.TetherStatesParcel;
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +090086import android.net.TetheredClient;
markchien40898ca2020-01-21 13:11:06 +080087import android.net.TetheringCallbackStartedParcel;
markchien0f63ca62019-09-30 14:40:57 +080088import android.net.TetheringConfigurationParcel;
markchiene8b9d752020-01-20 19:31:56 +080089import android.net.TetheringRequestParcel;
markchienb6eb2c22018-07-18 14:29:20 +080090import android.net.ip.IpServer;
markchiena9d9ef82020-01-07 14:43:17 +080091import android.net.shared.NetdUtils;
markchien0f63ca62019-09-30 14:40:57 +080092import android.net.util.BaseNetdUnsolicitedEventListener;
Remi NGUYEN VAN6c02f992018-03-09 14:07:18 +090093import android.net.util.InterfaceSet;
Erik Kline32179ff2017-07-04 18:28:11 +090094import android.net.util.PrefixUtils;
Erik Kline7747fd42017-05-12 16:52:48 +090095import android.net.util.SharedLog;
Automerger Merge Worker37a22752020-03-17 16:59:57 +000096import android.net.util.TetheringUtils;
Erik Klinede637722017-10-12 22:16:01 +090097import android.net.util.VersionedBroadcastListener;
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +090098import android.net.wifi.WifiClient;
Jeremy Klein36c7aa02016-01-22 14:11:45 -080099import android.net.wifi.WifiManager;
Jimmy Chenbcd86d02019-07-15 18:03:23 +0800100import android.net.wifi.p2p.WifiP2pGroup;
101import android.net.wifi.p2p.WifiP2pInfo;
102import android.net.wifi.p2p.WifiP2pManager;
Robert Greenwalt2a091d72010-02-11 18:18:40 -0800103import android.os.Binder;
Jeremy Klein36c7aa02016-01-22 14:11:45 -0800104import android.os.Bundle;
Erik Klinef4b6e342017-04-25 19:19:59 +0900105import android.os.Handler;
Robert Greenwaltdfadaea2010-03-11 15:03:08 -0800106import android.os.Looper;
Robert Greenwalt2a091d72010-02-11 18:18:40 -0800107import android.os.Message;
markchienae8aa642019-12-16 20:15:20 +0800108import android.os.RemoteCallbackList;
Christopher Wileydeebfec2016-09-16 11:14:36 -0700109import android.os.RemoteException;
Jeremy Klein36c7aa02016-01-22 14:11:45 -0800110import android.os.ResultReceiver;
markchiena9d9ef82020-01-07 14:43:17 +0800111import android.os.ServiceSpecificException;
Dianne Hackborn5ac72a22012-08-29 18:32:08 -0700112import android.os.UserHandle;
Alexandru-Andrei Rotarufa6d5c52017-07-18 16:49:22 +0100113import android.os.UserManager;
markchien04bdf872019-06-17 21:05:34 +0800114import android.telephony.PhoneStateListener;
115import android.telephony.TelephonyManager;
Lorenzo Colitticd63d242016-04-10 15:39:53 +0900116import android.text.TextUtils;
Christopher Wileye9490392016-05-26 15:57:29 -0700117import android.util.ArrayMap;
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -0800118import android.util.Log;
Lorenzo Colitticd63d242016-04-10 15:39:53 +0900119import android.util.SparseArray;
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -0800120
markchiena9d9ef82020-01-07 14:43:17 +0800121import androidx.annotation.NonNull;
122import androidx.annotation.Nullable;
123
Remi NGUYEN VAN84229e02020-01-24 22:57:09 +0900124import com.android.internal.annotations.GuardedBy;
Christopher Wiley497c1472016-10-11 13:26:03 -0700125import com.android.internal.annotations.VisibleForTesting;
Jeremy Klein36c7aa02016-01-22 14:11:45 -0800126import com.android.internal.util.IndentingPrintWriter;
Lorenzo Colitticd63d242016-04-10 15:39:53 +0900127import com.android.internal.util.MessageUtils;
Wink Saville64c42ca2011-04-18 14:55:10 -0700128import com.android.internal.util.State;
129import com.android.internal.util.StateMachine;
Robert Greenwalt2a091d72010-02-11 18:18:40 -0800130
131import java.io.FileDescriptor;
132import java.io.PrintWriter;
Jeremy Klein36c7aa02016-01-22 14:11:45 -0800133import java.net.InetAddress;
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -0800134import java.util.ArrayList;
Lorenzo Colittib57edc52014-08-22 17:10:50 -0700135import java.util.Arrays;
Robert Greenwaltccf83af12011-06-02 17:30:47 -0700136import java.util.Collection;
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +0900137import java.util.Collections;
markchien0f63ca62019-09-30 14:40:57 +0800138import java.util.Iterator;
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +0900139import java.util.LinkedHashSet;
140import java.util.List;
Erik Kline3a5278f2017-06-24 19:29:10 +0900141import java.util.Set;
markchien986750b2019-12-06 15:24:53 +0800142import java.util.concurrent.Executor;
143import java.util.concurrent.RejectedExecutionException;
Robert Greenwalt2ffe4122014-12-12 12:22:31 -0800144
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -0800145/**
Robert Greenwalt2a091d72010-02-11 18:18:40 -0800146 *
Christopher Wiley3b1d9222016-05-20 16:44:04 -0700147 * This class holds much of the business logic to allow Android devices
148 * to act as IP gateways via USB, BT, and WiFi interfaces.
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -0800149 */
markchien0f63ca62019-09-30 14:40:57 +0800150public class Tethering {
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -0800151
markchien0f63ca62019-09-30 14:40:57 +0800152 private static final String TAG = Tethering.class.getSimpleName();
153 private static final boolean DBG = false;
154 private static final boolean VDBG = false;
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -0800155
markchien0f63ca62019-09-30 14:40:57 +0800156 private static final Class[] sMessageClasses = {
Erik Kline7a4ccc62018-08-27 17:26:47 +0900157 Tethering.class, TetherMasterSM.class, IpServer.class
Lorenzo Colitticd63d242016-04-10 15:39:53 +0900158 };
159 private static final SparseArray<String> sMagicDecoderRing =
markchien0f63ca62019-09-30 14:40:57 +0800160 MessageUtils.findMessageNames(sMessageClasses);
markchiena9d9ef82020-01-07 14:43:17 +0800161 // Keep in sync with NETID_UNSET in system/netd/include/netid_client.h
162 private static final int NETID_UNSET = 0;
Lorenzo Colitticd63d242016-04-10 15:39:53 +0900163
Hugo Benichib55fb222017-03-10 14:20:57 +0900164 private static class TetherState {
Erik Kline7a4ccc62018-08-27 17:26:47 +0900165 public final IpServer ipServer;
Hugo Benichib55fb222017-03-10 14:20:57 +0900166 public int lastState;
167 public int lastError;
Erik Klineea9cc482017-03-10 19:35:34 +0900168
markchien0f63ca62019-09-30 14:40:57 +0800169 TetherState(IpServer ipServer) {
Erik Kline7a4ccc62018-08-27 17:26:47 +0900170 this.ipServer = ipServer;
Hugo Benichib55fb222017-03-10 14:20:57 +0900171 // Assume all state machines start out available and with no errors.
Erik Kline7a4ccc62018-08-27 17:26:47 +0900172 lastState = IpServer.STATE_AVAILABLE;
Erik Kline7a26ba32018-03-09 14:18:02 +0900173 lastError = TETHER_ERROR_NO_ERROR;
Hugo Benichib55fb222017-03-10 14:20:57 +0900174 }
Erik Klineea9cc482017-03-10 19:35:34 +0900175
176 public boolean isCurrentlyServing() {
177 switch (lastState) {
Erik Kline7a4ccc62018-08-27 17:26:47 +0900178 case IpServer.STATE_TETHERED:
179 case IpServer.STATE_LOCAL_ONLY:
Erik Klineea9cc482017-03-10 19:35:34 +0900180 return true;
181 default:
182 return false;
183 }
184 }
Hugo Benichib55fb222017-03-10 14:20:57 +0900185 }
Robert Greenwaltccf83af12011-06-02 17:30:47 -0700186
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +0900187 /**
188 * Cookie added when registering {@link android.net.TetheringManager.TetheringEventCallback}.
189 */
190 private static class CallbackCookie {
191 public final boolean hasListClientsPermission;
192
193 private CallbackCookie(boolean hasListClientsPermission) {
194 this.hasListClientsPermission = hasListClientsPermission;
195 }
196 }
197
Erik Kline7747fd42017-05-12 16:52:48 +0900198 private final SharedLog mLog = new SharedLog(TAG);
markchienae8aa642019-12-16 20:15:20 +0800199 private final RemoteCallbackList<ITetheringEventCallback> mTetheringEventCallbacks =
200 new RemoteCallbackList<>();
Automerger Merge Worker37a22752020-03-17 16:59:57 +0000201 // Currently active tethering requests per tethering type. Only one of each type can be
202 // requested at a time. After a tethering type is requested, the map keeps tethering parameters
203 // to be used after the interface comes up asynchronously.
204 private final SparseArray<TetheringRequestParcel> mActiveTetheringRequests =
205 new SparseArray<>();
Erik Kline1fdc2e22017-05-08 17:56:35 +0900206
Robert Greenwaltb4453622011-11-03 16:01:40 -0700207 // used to synchronize public access to members
Erik Kline6ff17f72015-12-10 20:42:12 +0900208 private final Object mPublicSync;
Hugo Benichib55fb222017-03-10 14:20:57 +0900209 private final Context mContext;
210 private final ArrayMap<String, TetherState> mTetherStates;
211 private final BroadcastReceiver mStateReceiver;
Erik Kline6ff17f72015-12-10 20:42:12 +0900212 private final Looper mLooper;
Erik Kline6ff17f72015-12-10 20:42:12 +0900213 private final StateMachine mTetherMasterSM;
Erik Klinee0cce212017-03-06 14:05:23 +0900214 private final OffloadController mOffloadController;
Erik Kline6ff17f72015-12-10 20:42:12 +0900215 private final UpstreamNetworkMonitor mUpstreamNetworkMonitor;
Erik Kline6e9a1012017-06-06 19:24:21 +0900216 // TODO: Figure out how to merge this and other downstream-tracking objects
217 // into a single coherent structure.
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +0900218 // Use LinkedHashSet for predictable ordering order for ConnectedClientsTracker.
219 private final LinkedHashSet<IpServer> mForwardedDownstreams;
Erik Klinede637722017-10-12 22:16:01 +0900220 private final VersionedBroadcastListener mCarrierConfigChange;
Remi NGUYEN VAN5d0dc452018-03-15 11:57:14 +0900221 private final TetheringDependencies mDeps;
markchienb6eb2c22018-07-18 14:29:20 +0800222 private final EntitlementManager mEntitlementMgr;
markchien26299ed2019-02-27 14:56:11 +0800223 private final Handler mHandler;
markchien0f63ca62019-09-30 14:40:57 +0800224 private final INetd mNetd;
225 private final NetdCallback mNetdCallback;
markchien1ddfba42019-11-27 21:20:33 +0800226 private final UserRestrictionActionListener mTetheringRestriction;
markchien986750b2019-12-06 15:24:53 +0800227 private final ActiveDataSubIdListener mActiveDataSubIdListener;
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +0900228 private final ConnectedClientsTracker mConnectedClientsTracker;
Automerger Merge Worker06fe92d2020-02-28 03:42:44 +0000229 private final TetheringThreadExecutor mExecutor;
Automerger Merge Worker2d7bacc2020-03-09 08:54:00 +0000230 private final TetheringNotificationUpdater mNotificationUpdater;
markchien04bdf872019-06-17 21:05:34 +0800231 private int mActiveDataSubId = INVALID_SUBSCRIPTION_ID;
markchienae8aa642019-12-16 20:15:20 +0800232 // All the usage of mTetheringEventCallback should run in the same thread.
233 private ITetheringEventCallback mTetheringEventCallback = null;
Robert Greenwalta599fe7c2010-03-08 18:30:14 -0800234
Hugo Benichib55fb222017-03-10 14:20:57 +0900235 private volatile TetheringConfiguration mConfig;
Remi NGUYEN VAN6c02f992018-03-09 14:07:18 +0900236 private InterfaceSet mCurrentUpstreamIfaceSet;
Erik Klineea9cc482017-03-10 19:35:34 +0900237
Mike Lockwood6c2260b2011-07-19 13:04:47 -0700238 private boolean mRndisEnabled; // track the RNDIS function enabled state
Erik Kline6e9a1012017-06-06 19:24:21 +0900239 // True iff. WiFi tethering should be started when soft AP is ready.
Christopher Wiley5c0b10a2016-05-31 14:43:08 -0700240 private boolean mWifiTetherRequested;
markchien26299ed2019-02-27 14:56:11 +0800241 private Network mTetherUpstream;
markchien0f63ca62019-09-30 14:40:57 +0800242 private TetherStatesParcel mTetherStatesParcel;
markchien3fe660b2019-12-05 12:04:59 +0800243 private boolean mDataSaverEnabled = false;
Jimmy Chen151384d2019-12-03 11:37:09 +0800244 private String mWifiP2pTetherInterface = null;
Automerger Merge Workerc22ab7b2020-03-09 04:07:07 +0000245 private int mOffloadStatus = TETHER_HARDWARE_OFFLOAD_STOPPED;
Christopher Wiley5c0b10a2016-05-31 14:43:08 -0700246
Remi NGUYEN VAN84229e02020-01-24 22:57:09 +0900247 @GuardedBy("mPublicSync")
248 private EthernetManager.TetheredInterfaceRequest mEthernetIfaceRequest;
249 @GuardedBy("mPublicSync")
250 private String mConfiguredEthernetIface;
251 @GuardedBy("mPublicSync")
252 private EthernetCallback mEthernetCallback;
253
markchien0f63ca62019-09-30 14:40:57 +0800254 public Tethering(TetheringDependencies deps) {
255 mLog.mark("Tethering.constructed");
Remi NGUYEN VAN5d0dc452018-03-15 11:57:14 +0900256 mDeps = deps;
markchien0f63ca62019-09-30 14:40:57 +0800257 mContext = mDeps.getContext();
markchien0f63ca62019-09-30 14:40:57 +0800258 mNetd = mDeps.getINetd(mContext);
259 mLooper = mDeps.getTetheringLooper();
Paul Hu77fa8d62020-04-16 02:54:37 +0000260 mNotificationUpdater = mDeps.getNotificationUpdater(mContext, mLooper);
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -0800261
Robert Greenwaltb4453622011-11-03 16:01:40 -0700262 mPublicSync = new Object();
263
Christopher Wileyd985dde2016-05-31 10:44:35 -0700264 mTetherStates = new ArrayMap<>();
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +0900265 mConnectedClientsTracker = new ConnectedClientsTracker();
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -0800266
Remi NGUYEN VAN5d0dc452018-03-15 11:57:14 +0900267 mTetherMasterSM = new TetherMasterSM("TetherMaster", mLooper, deps);
Robert Greenwalt2a091d72010-02-11 18:18:40 -0800268 mTetherMasterSM.start();
269
markchien26299ed2019-02-27 14:56:11 +0800270 mHandler = mTetherMasterSM.getHandler();
Mark Chien66b9a4a2020-05-07 03:49:42 +0000271 mOffloadController = mDeps.getOffloadController(mHandler, mLog,
272 new OffloadController.Dependencies() {
Junyu Lai833f4f62020-05-05 10:45:38 +0000273
274 @Override
275 public TetheringConfiguration getTetherConfig() {
276 return mConfig;
277 }
278 });
markchiena9d9ef82020-01-07 14:43:17 +0800279 mUpstreamNetworkMonitor = mDeps.getUpstreamNetworkMonitor(mContext, mTetherMasterSM, mLog,
Remi NGUYEN VAN5d0dc452018-03-15 11:57:14 +0900280 TetherMasterSM.EVENT_UPSTREAM_CALLBACK);
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +0900281 mForwardedDownstreams = new LinkedHashSet<>();
Erik Klinede637722017-10-12 22:16:01 +0900282
283 IntentFilter filter = new IntentFilter();
284 filter.addAction(ACTION_CARRIER_CONFIG_CHANGED);
markchien3b519632018-09-07 16:19:12 +0800285 // EntitlementManager will send EVENT_UPSTREAM_PERMISSION_CHANGED when cellular upstream
286 // permission is changed according to entitlement check result.
Mark Chien47430c02020-05-08 11:00:42 +0000287 mEntitlementMgr = mDeps.getEntitlementManager(mContext, mHandler, mLog,
288 () -> mTetherMasterSM.sendMessage(
289 TetherMasterSM.EVENT_UPSTREAM_PERMISSION_CHANGED));
markchien29b70142019-03-26 21:41:59 +0800290 mEntitlementMgr.setOnUiEntitlementFailedListener((int downstream) -> {
291 mLog.log("OBSERVED UiEnitlementFailed");
292 stopTethering(downstream);
293 });
markchien3394e142019-04-09 15:53:24 +0800294 mEntitlementMgr.setTetheringConfigurationFetcher(() -> {
markchien3394e142019-04-09 15:53:24 +0800295 return mConfig;
296 });
markchien3b519632018-09-07 16:19:12 +0800297
Erik Klinede637722017-10-12 22:16:01 +0900298 mCarrierConfigChange = new VersionedBroadcastListener(
markchien26299ed2019-02-27 14:56:11 +0800299 "CarrierConfigChangeListener", mContext, mHandler, filter,
Erik Klinede637722017-10-12 22:16:01 +0900300 (Intent ignored) -> {
301 mLog.log("OBSERVED carrier config change");
Erik Kline80b7a9f2018-02-28 15:01:35 +0900302 updateConfiguration();
markchien3394e142019-04-09 15:53:24 +0800303 mEntitlementMgr.reevaluateSimCardProvisioning(mConfig);
Erik Klinede637722017-10-12 22:16:01 +0900304 });
Erik Kline6ff17f72015-12-10 20:42:12 +0900305
Robert Greenwaltbb51d9f2010-03-12 10:23:35 -0800306 mStateReceiver = new StateReceiver();
Erik Kline80b7a9f2018-02-28 15:01:35 +0900307
markchien1ddfba42019-11-27 21:20:33 +0800308 final UserManager userManager = (UserManager) mContext.getSystemService(
junyulaifb7fb592020-01-09 18:56:08 +0800309 Context.USER_SERVICE);
Paul Huf950dc92020-03-25 12:39:13 +0000310 mTetheringRestriction = new UserRestrictionActionListener(
311 userManager, this, mNotificationUpdater);
Automerger Merge Worker06fe92d2020-02-28 03:42:44 +0000312 mExecutor = new TetheringThreadExecutor(mHandler);
313 mActiveDataSubIdListener = new ActiveDataSubIdListener(mExecutor);
Mark Chien674a0122020-03-27 09:37:01 +0000314 mNetdCallback = new NetdCallback();
markchien1ddfba42019-11-27 21:20:33 +0800315
Erik Kline80b7a9f2018-02-28 15:01:35 +0900316 // Load tethering configuration.
317 updateConfiguration();
Mark Chien674a0122020-03-27 09:37:01 +0000318 }
319
320 /**
321 * Start to register callbacks.
322 * Call this function when tethering is ready to handle callback events.
323 */
324 public void startStateMachineUpdaters() {
markchiene67c5642020-02-06 15:25:47 +0800325 try {
326 mNetd.registerUnsolicitedEventListener(mNetdCallback);
327 } catch (RemoteException e) {
328 mLog.e("Unable to register netd UnsolicitedEventListener");
329 }
Erik Kline80b7a9f2018-02-28 15:01:35 +0900330 mCarrierConfigChange.startListening();
markchien986750b2019-12-06 15:24:53 +0800331 mContext.getSystemService(TelephonyManager.class).listen(mActiveDataSubIdListener,
332 PhoneStateListener.LISTEN_ACTIVE_DATA_SUBSCRIPTION_ID_CHANGE);
Erik Kline80b7a9f2018-02-28 15:01:35 +0900333
Erik Kline80b7a9f2018-02-28 15:01:35 +0900334 IntentFilter filter = new IntentFilter();
Mike Lockwood770126a2010-12-09 22:30:37 -0800335 filter.addAction(UsbManager.ACTION_USB_STATE);
Erik Kline7a26ba32018-03-09 14:18:02 +0900336 filter.addAction(CONNECTIVITY_ACTION);
Christopher Wiley5c0b10a2016-05-31 14:43:08 -0700337 filter.addAction(WifiManager.WIFI_AP_STATE_CHANGED_ACTION);
Robert Greenwaltc13368b2013-07-18 14:24:42 -0700338 filter.addAction(Intent.ACTION_CONFIGURATION_CHANGED);
Jimmy Chenbcd86d02019-07-15 18:03:23 +0800339 filter.addAction(WifiP2pManager.WIFI_P2P_CONNECTION_CHANGED_ACTION);
markchien1ddfba42019-11-27 21:20:33 +0800340 filter.addAction(UserManager.ACTION_USER_RESTRICTIONS_CHANGED);
markchien3fe660b2019-12-05 12:04:59 +0800341 filter.addAction(ACTION_RESTRICT_BACKGROUND_CHANGED);
Mark Chien674a0122020-03-27 09:37:01 +0000342 mContext.registerReceiver(mStateReceiver, filter, null, mHandler);
343
Paul Hu77fa8d62020-04-16 02:54:37 +0000344 final IntentFilter noUpstreamFilter = new IntentFilter();
345 noUpstreamFilter.addAction(TetheringNotificationUpdater.ACTION_DISABLE_TETHERING);
346 mContext.registerReceiver(
347 mStateReceiver, noUpstreamFilter, PERMISSION_MAINLINE_NETWORK_STACK, mHandler);
348
Mark Chien674a0122020-03-27 09:37:01 +0000349 final WifiManager wifiManager = getWifiManager();
350 if (wifiManager != null) {
351 wifiManager.registerSoftApCallback(mExecutor, new TetheringSoftApCallback());
352 }
353
354 startTrackDefaultNetwork();
Robert Greenwalt49348e72011-10-21 16:54:26 -0700355 }
356
markchien986750b2019-12-06 15:24:53 +0800357 private class TetheringThreadExecutor implements Executor {
358 private final Handler mTetherHandler;
359 TetheringThreadExecutor(Handler handler) {
360 mTetherHandler = handler;
361 }
362 @Override
363 public void execute(Runnable command) {
364 if (!mTetherHandler.post(command)) {
365 throw new RejectedExecutionException(mTetherHandler + " is shutting down");
366 }
367 }
368 }
369
370 private class ActiveDataSubIdListener extends PhoneStateListener {
371 ActiveDataSubIdListener(Executor executor) {
372 super(executor);
373 }
374
375 @Override
376 public void onActiveDataSubscriptionIdChanged(int subId) {
377 mLog.log("OBSERVED active data subscription change, from " + mActiveDataSubId
378 + " to " + subId);
379 if (subId == mActiveDataSubId) return;
380
381 mActiveDataSubId = subId;
382 updateConfiguration();
Paul Hu274cc1c2020-03-25 06:22:43 +0000383 mNotificationUpdater.onActiveDataSubscriptionIdChanged(subId);
markchien986750b2019-12-06 15:24:53 +0800384 // To avoid launching unexpected provisioning checks, ignore re-provisioning
385 // when no CarrierConfig loaded yet. Assume reevaluateSimCardProvisioning()
Paul Hu274cc1c2020-03-25 06:22:43 +0000386 // will be triggered again when CarrierConfig is loaded.
markchien986750b2019-12-06 15:24:53 +0800387 if (mEntitlementMgr.getCarrierConfig(mConfig) != null) {
388 mEntitlementMgr.reevaluateSimCardProvisioning(mConfig);
389 } else {
390 mLog.log("IGNORED reevaluate provisioning, no carrier config loaded");
391 }
392 }
393 }
394
Erik Kline216af6d2017-04-27 20:57:23 +0900395 private WifiManager getWifiManager() {
396 return (WifiManager) mContext.getSystemService(Context.WIFI_SERVICE);
397 }
398
Erik Kline93c4afa2017-06-04 11:36:01 +0900399 // NOTE: This is always invoked on the mLooper thread.
Erik Klined781fba2017-01-23 13:01:58 +0900400 private void updateConfiguration() {
markchien04bdf872019-06-17 21:05:34 +0800401 mConfig = mDeps.generateTetheringConfiguration(mContext, mLog, mActiveDataSubId);
markchien3394e142019-04-09 15:53:24 +0800402 mUpstreamNetworkMonitor.updateMobileRequiresDun(mConfig.isDunRequired);
markchien0f63ca62019-09-30 14:40:57 +0800403 reportConfigurationChanged(mConfig.toStableParcelable());
markchien3394e142019-04-09 15:53:24 +0800404 }
405
406 private void maybeDunSettingChanged() {
markchien986750b2019-12-06 15:24:53 +0800407 final boolean isDunRequired = TetheringConfiguration.checkDunRequired(mContext);
markchiendb3a2362018-10-05 12:36:08 +0800408 if (isDunRequired == mConfig.isDunRequired) return;
Erik Kline6ee73da2017-07-08 20:36:37 +0900409 updateConfiguration();
410 }
411
markchien0f63ca62019-09-30 14:40:57 +0800412 private class NetdCallback extends BaseNetdUnsolicitedEventListener {
413 @Override
414 public void onInterfaceChanged(String ifName, boolean up) {
415 mHandler.post(() -> interfaceStatusChanged(ifName, up));
416 }
417
418 @Override
419 public void onInterfaceLinkStateChanged(String ifName, boolean up) {
420 mHandler.post(() -> interfaceLinkStateChanged(ifName, up));
421 }
422
423 @Override
424 public void onInterfaceAdded(String ifName) {
425 mHandler.post(() -> interfaceAdded(ifName));
426 }
427
428 @Override
429 public void onInterfaceRemoved(String ifName) {
430 mHandler.post(() -> interfaceRemoved(ifName));
431 }
432 }
433
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +0900434 private class TetheringSoftApCallback implements WifiManager.SoftApCallback {
435 // TODO: Remove onStateChanged override when this method has default on
436 // WifiManager#SoftApCallback interface.
437 // Wifi listener for state change of the soft AP
438 @Override
439 public void onStateChanged(final int state, final int failureReason) {
440 // Nothing
441 }
442
443 // Called by wifi when the number of soft AP clients changed.
444 @Override
445 public void onConnectedClientsChanged(final List<WifiClient> clients) {
Treehugger Robot25067812020-03-25 15:32:41 +0000446 updateConnectedClients(clients);
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +0900447 }
448 }
449
markchien0f63ca62019-09-30 14:40:57 +0800450 void interfaceStatusChanged(String iface, boolean up) {
Lorenzo Colitticd63d242016-04-10 15:39:53 +0900451 // Never called directly: only called from interfaceLinkStateChanged.
markchien0f63ca62019-09-30 14:40:57 +0800452 // See NetlinkHandler.cpp: notifyInterfaceChanged.
Wink Savillec9acde92011-09-21 11:05:43 -0700453 if (VDBG) Log.d(TAG, "interfaceStatusChanged " + iface + ", " + up);
Robert Greenwaltb4453622011-11-03 16:01:40 -0700454 synchronized (mPublicSync) {
Mike J. Chen6143f5f2011-06-23 15:17:51 -0700455 if (up) {
Erik Kline4dd9bb82017-04-26 11:11:07 +0900456 maybeTrackNewInterfaceLocked(iface);
Robert Greenwalt2a091d72010-02-11 18:18:40 -0800457 } else {
Erik Kline7a26ba32018-03-09 14:18:02 +0900458 if (ifaceNameToType(iface) == TETHERING_BLUETOOTH) {
Erik Kline4dd9bb82017-04-26 11:11:07 +0900459 stopTrackingInterfaceLocked(iface);
Christopher Wileyd30aaeb2016-07-08 09:33:50 -0700460 } else {
461 // Ignore usb0 down after enabling RNDIS.
462 // We will handle disconnect in interfaceRemoved.
463 // Similarly, ignore interface down for WiFi. We monitor WiFi AP status
464 // through the WifiManager.WIFI_AP_STATE_CHANGED_ACTION intent.
465 if (VDBG) Log.d(TAG, "ignore interface down for " + iface);
Robert Greenwalt2a091d72010-02-11 18:18:40 -0800466 }
467 }
468 }
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -0800469 }
470
markchien0f63ca62019-09-30 14:40:57 +0800471 void interfaceLinkStateChanged(String iface, boolean up) {
Irfan Sheriff23eb2972011-07-22 15:21:10 -0700472 interfaceStatusChanged(iface, up);
Mike J. Chenf59c7d02011-06-23 15:33:15 -0700473 }
474
Christopher Wiley5c0b10a2016-05-31 14:43:08 -0700475 private int ifaceNameToType(String iface) {
Erik Kline3e756652017-01-17 13:42:19 +0900476 final TetheringConfiguration cfg = mConfig;
477
478 if (cfg.isWifi(iface)) {
Erik Kline7a26ba32018-03-09 14:18:02 +0900479 return TETHERING_WIFI;
Jimmy Chenbcd86d02019-07-15 18:03:23 +0800480 } else if (cfg.isWifiP2p(iface)) {
481 return TETHERING_WIFI_P2P;
Erik Kline3e756652017-01-17 13:42:19 +0900482 } else if (cfg.isUsb(iface)) {
Erik Kline7a26ba32018-03-09 14:18:02 +0900483 return TETHERING_USB;
Erik Kline3e756652017-01-17 13:42:19 +0900484 } else if (cfg.isBluetooth(iface)) {
Erik Kline7a26ba32018-03-09 14:18:02 +0900485 return TETHERING_BLUETOOTH;
Milim Lee31ef4c02019-10-17 05:02:33 +0900486 } else if (cfg.isNcm(iface)) {
487 return TETHERING_NCM;
Christopher Wiley5c0b10a2016-05-31 14:43:08 -0700488 }
Erik Kline7a26ba32018-03-09 14:18:02 +0900489 return TETHERING_INVALID;
Christopher Wiley5c0b10a2016-05-31 14:43:08 -0700490 }
491
markchien0f63ca62019-09-30 14:40:57 +0800492 void interfaceAdded(String iface) {
Wink Savillec9acde92011-09-21 11:05:43 -0700493 if (VDBG) Log.d(TAG, "interfaceAdded " + iface);
Robert Greenwaltb4453622011-11-03 16:01:40 -0700494 synchronized (mPublicSync) {
Erik Kline4dd9bb82017-04-26 11:11:07 +0900495 maybeTrackNewInterfaceLocked(iface);
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -0800496 }
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -0800497 }
498
markchien0f63ca62019-09-30 14:40:57 +0800499 void interfaceRemoved(String iface) {
Wink Savillec9acde92011-09-21 11:05:43 -0700500 if (VDBG) Log.d(TAG, "interfaceRemoved " + iface);
Robert Greenwaltb4453622011-11-03 16:01:40 -0700501 synchronized (mPublicSync) {
Erik Kline4dd9bb82017-04-26 11:11:07 +0900502 stopTrackingInterfaceLocked(iface);
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -0800503 }
504 }
505
markchiene8b9d752020-01-20 19:31:56 +0800506 void startTethering(final TetheringRequestParcel request, final IIntResultListener listener) {
Automerger Merge Worker37a22752020-03-17 16:59:57 +0000507 mHandler.post(() -> {
508 final TetheringRequestParcel unfinishedRequest = mActiveTetheringRequests.get(
509 request.tetheringType);
510 // If tethering is already enabled with a different request,
511 // disable before re-enabling.
512 if (unfinishedRequest != null
513 && !TetheringUtils.isTetheringRequestEquals(unfinishedRequest, request)) {
514 enableTetheringInternal(request.tetheringType, false /* disabled */, null);
515 mEntitlementMgr.stopProvisioningIfNeeded(request.tetheringType);
516 }
517 mActiveTetheringRequests.put(request.tetheringType, request);
518
markchien5788f2a2020-05-08 18:55:26 +0800519 if (request.exemptFromEntitlementCheck) {
520 mEntitlementMgr.setExemptedDownstreamType(request.tetheringType);
521 } else {
522 mEntitlementMgr.startProvisioningIfNeeded(request.tetheringType,
523 request.showProvisioningUi);
524 }
Automerger Merge Worker37a22752020-03-17 16:59:57 +0000525 enableTetheringInternal(request.tetheringType, true /* enabled */, listener);
526 });
Jeremy Klein36c7aa02016-01-22 14:11:45 -0800527 }
528
markchien0f63ca62019-09-30 14:40:57 +0800529 void stopTethering(int type) {
Automerger Merge Worker37a22752020-03-17 16:59:57 +0000530 mHandler.post(() -> {
531 mActiveTetheringRequests.remove(type);
532
533 enableTetheringInternal(type, false /* disabled */, null);
534 mEntitlementMgr.stopProvisioningIfNeeded(type);
535 });
Jeremy Klein36c7aa02016-01-22 14:11:45 -0800536 }
537
538 /**
markchien3b519632018-09-07 16:19:12 +0800539 * Enables or disables tethering for the given type. If provisioning is required, it will
540 * schedule provisioning rechecks for the specified interface.
Jeremy Klein36c7aa02016-01-22 14:11:45 -0800541 */
markchiene8b9d752020-01-20 19:31:56 +0800542 private void enableTetheringInternal(int type, boolean enable,
543 final IIntResultListener listener) {
Automerger Merge Worker37a22752020-03-17 16:59:57 +0000544 int result = TETHER_ERROR_NO_ERROR;
Jeremy Klein36c7aa02016-01-22 14:11:45 -0800545 switch (type) {
Erik Kline7a26ba32018-03-09 14:18:02 +0900546 case TETHERING_WIFI:
Christopher Wiley5c0b10a2016-05-31 14:43:08 -0700547 result = setWifiTethering(enable);
Jeremy Klein36c7aa02016-01-22 14:11:45 -0800548 break;
Erik Kline7a26ba32018-03-09 14:18:02 +0900549 case TETHERING_USB:
Christopher Wiley5c0b10a2016-05-31 14:43:08 -0700550 result = setUsbTethering(enable);
Jeremy Klein36c7aa02016-01-22 14:11:45 -0800551 break;
Erik Kline7a26ba32018-03-09 14:18:02 +0900552 case TETHERING_BLUETOOTH:
markchiene8b9d752020-01-20 19:31:56 +0800553 setBluetoothTethering(enable, listener);
Jeremy Klein36c7aa02016-01-22 14:11:45 -0800554 break;
Milim Lee31ef4c02019-10-17 05:02:33 +0900555 case TETHERING_NCM:
556 result = setNcmTethering(enable);
Milim Lee31ef4c02019-10-17 05:02:33 +0900557 break;
Remi NGUYEN VAN84229e02020-01-24 22:57:09 +0900558 case TETHERING_ETHERNET:
559 result = setEthernetTethering(enable);
Remi NGUYEN VAN84229e02020-01-24 22:57:09 +0900560 break;
Jeremy Klein36c7aa02016-01-22 14:11:45 -0800561 default:
562 Log.w(TAG, "Invalid tether type.");
markchien62a625d2020-03-19 13:37:43 +0800563 result = TETHER_ERROR_UNKNOWN_TYPE;
Automerger Merge Worker37a22752020-03-17 16:59:57 +0000564 }
565
566 // The result of Bluetooth tethering will be sent by #setBluetoothTethering.
567 if (type != TETHERING_BLUETOOTH) {
568 sendTetherResult(listener, result, type);
Jeremy Klein36c7aa02016-01-22 14:11:45 -0800569 }
570 }
571
Automerger Merge Worker37a22752020-03-17 16:59:57 +0000572 private void sendTetherResult(final IIntResultListener listener, final int result,
573 final int type) {
markchiene8b9d752020-01-20 19:31:56 +0800574 if (listener != null) {
575 try {
576 listener.onResult(result);
577 } catch (RemoteException e) { }
Jeremy Klein36c7aa02016-01-22 14:11:45 -0800578 }
Automerger Merge Worker37a22752020-03-17 16:59:57 +0000579
580 // If changing tethering fail, remove corresponding request
581 // no matter who trigger the start/stop.
582 if (result != TETHER_ERROR_NO_ERROR) mActiveTetheringRequests.remove(type);
Jeremy Klein36c7aa02016-01-22 14:11:45 -0800583 }
584
Christopher Wiley5c0b10a2016-05-31 14:43:08 -0700585 private int setWifiTethering(final boolean enable) {
Erik Kline256be782017-04-29 13:20:04 +0900586 final long ident = Binder.clearCallingIdentity();
587 try {
588 synchronized (mPublicSync) {
Erik Kline256be782017-04-29 13:20:04 +0900589 final WifiManager mgr = getWifiManager();
Ye Jiao21f96252019-01-28 12:54:22 +0800590 if (mgr == null) {
591 mLog.e("setWifiTethering: failed to get WifiManager!");
592 return TETHER_ERROR_SERVICE_UNAVAIL;
593 }
lesl6b7551a2019-12-13 10:56:35 +0800594 if ((enable && mgr.startTetheredHotspot(null /* use existing softap config */))
markchien0f63ca62019-09-30 14:40:57 +0800595 || (!enable && mgr.stopSoftAp())) {
Ye Jiao21f96252019-01-28 12:54:22 +0800596 mWifiTetherRequested = enable;
597 return TETHER_ERROR_NO_ERROR;
Erik Kline256be782017-04-29 13:20:04 +0900598 }
Christopher Wiley5c0b10a2016-05-31 14:43:08 -0700599 }
Erik Kline256be782017-04-29 13:20:04 +0900600 } finally {
601 Binder.restoreCallingIdentity(ident);
Christopher Wiley5c0b10a2016-05-31 14:43:08 -0700602 }
Ye Jiao21f96252019-01-28 12:54:22 +0800603
markchien62a625d2020-03-19 13:37:43 +0800604 return TETHER_ERROR_INTERNAL_ERROR;
Christopher Wiley5c0b10a2016-05-31 14:43:08 -0700605 }
606
markchiene8b9d752020-01-20 19:31:56 +0800607 private void setBluetoothTethering(final boolean enable, final IIntResultListener listener) {
markchien3fe660b2019-12-05 12:04:59 +0800608 final BluetoothAdapter adapter = mDeps.getBluetoothAdapter();
Jeremy Klein36c7aa02016-01-22 14:11:45 -0800609 if (adapter == null || !adapter.isEnabled()) {
markchien0f63ca62019-09-30 14:40:57 +0800610 Log.w(TAG, "Tried to enable bluetooth tethering with null or disabled adapter. null: "
611 + (adapter == null));
Automerger Merge Worker37a22752020-03-17 16:59:57 +0000612 sendTetherResult(listener, TETHER_ERROR_SERVICE_UNAVAIL, TETHERING_BLUETOOTH);
Jeremy Klein36c7aa02016-01-22 14:11:45 -0800613 return;
614 }
615
616 adapter.getProfileProxy(mContext, new ServiceListener() {
617 @Override
618 public void onServiceDisconnected(int profile) { }
619
620 @Override
621 public void onServiceConnected(int profile, BluetoothProfile proxy) {
markchien560c3ac2019-08-16 15:33:28 +0800622 // Clear identify is fine because caller already pass tethering permission at
623 // ConnectivityService#startTethering()(or stopTethering) before the control comes
624 // here. Bluetooth will check tethering permission again that there is
625 // Context#getOpPackageName() under BluetoothPan#setBluetoothTethering() to get
626 // caller's package name for permission check.
627 // Calling BluetoothPan#setBluetoothTethering() here means the package name always
628 // be system server. If calling identity is not cleared, that package's uid might
629 // not match calling uid and end up in permission denied.
630 final long identityToken = Binder.clearCallingIdentity();
631 try {
632 ((BluetoothPan) proxy).setBluetoothTethering(enable);
633 } finally {
634 Binder.restoreCallingIdentity(identityToken);
635 }
Jeremy Klein36c7aa02016-01-22 14:11:45 -0800636 // TODO: Enabling bluetooth tethering can fail asynchronously here.
637 // We should figure out a way to bubble up that failure instead of sending success.
Erik Kline7a26ba32018-03-09 14:18:02 +0900638 final int result = (((BluetoothPan) proxy).isTetheringOn() == enable)
639 ? TETHER_ERROR_NO_ERROR
markchien62a625d2020-03-19 13:37:43 +0800640 : TETHER_ERROR_INTERNAL_ERROR;
Automerger Merge Worker37a22752020-03-17 16:59:57 +0000641 sendTetherResult(listener, result, TETHERING_BLUETOOTH);
Jeremy Klein36c7aa02016-01-22 14:11:45 -0800642 adapter.closeProfileProxy(BluetoothProfile.PAN, proxy);
643 }
644 }, BluetoothProfile.PAN);
645 }
646
Remi NGUYEN VAN84229e02020-01-24 22:57:09 +0900647 private int setEthernetTethering(final boolean enable) {
648 final EthernetManager em = (EthernetManager) mContext.getSystemService(
649 Context.ETHERNET_SERVICE);
650 synchronized (mPublicSync) {
651 if (enable) {
Treehugger Robot191a03c2020-03-24 15:23:51 +0000652 if (mEthernetCallback != null) {
653 Log.d(TAG, "Ethernet tethering already started");
654 return TETHER_ERROR_NO_ERROR;
655 }
Automerger Merge Worker06fe92d2020-02-28 03:42:44 +0000656
Remi NGUYEN VAN84229e02020-01-24 22:57:09 +0900657 mEthernetCallback = new EthernetCallback();
Automerger Merge Worker06fe92d2020-02-28 03:42:44 +0000658 mEthernetIfaceRequest = em.requestTetheredInterface(mExecutor, mEthernetCallback);
Remi NGUYEN VAN84229e02020-01-24 22:57:09 +0900659 } else {
Automerger Merge Worker06fe92d2020-02-28 03:42:44 +0000660 stopEthernetTetheringLocked();
Remi NGUYEN VAN84229e02020-01-24 22:57:09 +0900661 }
662 }
663 return TETHER_ERROR_NO_ERROR;
664 }
665
666 private void stopEthernetTetheringLocked() {
Treehugger Robot41c81242020-03-19 15:23:45 +0000667 if (mConfiguredEthernetIface != null) {
668 stopTrackingInterfaceLocked(mConfiguredEthernetIface);
669 mConfiguredEthernetIface = null;
670 }
671 if (mEthernetCallback != null) {
672 mEthernetIfaceRequest.release();
673 mEthernetCallback = null;
674 mEthernetIfaceRequest = null;
675 }
Remi NGUYEN VAN84229e02020-01-24 22:57:09 +0900676 }
677
678 private class EthernetCallback implements EthernetManager.TetheredInterfaceCallback {
679 @Override
680 public void onAvailable(String iface) {
681 synchronized (mPublicSync) {
682 if (this != mEthernetCallback) {
683 // Ethernet callback arrived after Ethernet tethering stopped. Ignore.
684 return;
685 }
686 maybeTrackNewInterfaceLocked(iface, TETHERING_ETHERNET);
687 changeInterfaceState(iface, IpServer.STATE_TETHERED);
688 mConfiguredEthernetIface = iface;
689 }
690 }
691
692 @Override
693 public void onUnavailable() {
694 synchronized (mPublicSync) {
695 if (this != mEthernetCallback) {
696 // onAvailable called after stopping Ethernet tethering.
697 return;
698 }
699 stopEthernetTetheringLocked();
700 }
701 }
702 }
703
markchien0f63ca62019-09-30 14:40:57 +0800704 int tether(String iface) {
Erik Kline7a4ccc62018-08-27 17:26:47 +0900705 return tether(iface, IpServer.STATE_TETHERED);
Erik Klineea9cc482017-03-10 19:35:34 +0900706 }
707
708 private int tether(String iface, int requestedState) {
Wink Savillec9acde92011-09-21 11:05:43 -0700709 if (DBG) Log.d(TAG, "Tethering " + iface);
Robert Greenwaltb4453622011-11-03 16:01:40 -0700710 synchronized (mPublicSync) {
Christopher Wileyd985dde2016-05-31 10:44:35 -0700711 TetherState tetherState = mTetherStates.get(iface);
712 if (tetherState == null) {
Erik Kline00019f42016-06-30 19:31:46 +0900713 Log.e(TAG, "Tried to Tether an unknown iface: " + iface + ", ignoring");
Erik Kline7a26ba32018-03-09 14:18:02 +0900714 return TETHER_ERROR_UNKNOWN_IFACE;
Christopher Wiley4312a4c2016-05-23 13:58:00 -0700715 }
716 // Ignore the error status of the interface. If the interface is available,
717 // the errors are referring to past tethering attempts anyway.
Erik Kline7a4ccc62018-08-27 17:26:47 +0900718 if (tetherState.lastState != IpServer.STATE_AVAILABLE) {
Erik Kline00019f42016-06-30 19:31:46 +0900719 Log.e(TAG, "Tried to Tether an unavailable iface: " + iface + ", ignoring");
Erik Kline7a26ba32018-03-09 14:18:02 +0900720 return TETHER_ERROR_UNAVAIL_IFACE;
Christopher Wiley4312a4c2016-05-23 13:58:00 -0700721 }
Automerger Merge Worker37a22752020-03-17 16:59:57 +0000722 // NOTE: If a CMD_TETHER_REQUESTED message is already in the TISM's queue but not yet
723 // processed, this will be a no-op and it will not return an error.
Erik Klineea9cc482017-03-10 19:35:34 +0900724 //
Automerger Merge Worker37a22752020-03-17 16:59:57 +0000725 // This code cannot race with untether() because they both synchronize on mPublicSync.
726 // TODO: reexamine the threading and messaging model to totally remove mPublicSync.
727 final int type = tetherState.ipServer.interfaceType();
728 final TetheringRequestParcel request = mActiveTetheringRequests.get(type, null);
729 if (request != null) {
730 mActiveTetheringRequests.delete(type);
731 }
732 tetherState.ipServer.sendMessage(IpServer.CMD_TETHER_REQUESTED, requestedState, 0,
733 request);
Erik Kline7a26ba32018-03-09 14:18:02 +0900734 return TETHER_ERROR_NO_ERROR;
Robert Greenwalt2a091d72010-02-11 18:18:40 -0800735 }
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -0800736 }
737
markchien0f63ca62019-09-30 14:40:57 +0800738 int untether(String iface) {
Wink Savillec9acde92011-09-21 11:05:43 -0700739 if (DBG) Log.d(TAG, "Untethering " + iface);
Robert Greenwaltb4453622011-11-03 16:01:40 -0700740 synchronized (mPublicSync) {
Christopher Wileyd985dde2016-05-31 10:44:35 -0700741 TetherState tetherState = mTetherStates.get(iface);
742 if (tetherState == null) {
Christopher Wiley4312a4c2016-05-23 13:58:00 -0700743 Log.e(TAG, "Tried to Untether an unknown iface :" + iface + ", ignoring");
Erik Kline7a26ba32018-03-09 14:18:02 +0900744 return TETHER_ERROR_UNKNOWN_IFACE;
Christopher Wiley4312a4c2016-05-23 13:58:00 -0700745 }
Erik Klineea9cc482017-03-10 19:35:34 +0900746 if (!tetherState.isCurrentlyServing()) {
747 Log.e(TAG, "Tried to untether an inactive iface :" + iface + ", ignoring");
Erik Kline7a26ba32018-03-09 14:18:02 +0900748 return TETHER_ERROR_UNAVAIL_IFACE;
Christopher Wiley4312a4c2016-05-23 13:58:00 -0700749 }
Erik Kline7a4ccc62018-08-27 17:26:47 +0900750 tetherState.ipServer.sendMessage(IpServer.CMD_TETHER_UNREQUESTED);
Erik Kline7a26ba32018-03-09 14:18:02 +0900751 return TETHER_ERROR_NO_ERROR;
Robert Greenwalt2a091d72010-02-11 18:18:40 -0800752 }
Robert Greenwalt5a735062010-03-02 17:25:02 -0800753 }
754
markchien0f63ca62019-09-30 14:40:57 +0800755 void untetherAll() {
Erik Kline7a26ba32018-03-09 14:18:02 +0900756 stopTethering(TETHERING_WIFI);
Jimmy Chenbcd86d02019-07-15 18:03:23 +0800757 stopTethering(TETHERING_WIFI_P2P);
Erik Kline7a26ba32018-03-09 14:18:02 +0900758 stopTethering(TETHERING_USB);
759 stopTethering(TETHERING_BLUETOOTH);
Remi NGUYEN VAN84229e02020-01-24 22:57:09 +0900760 stopTethering(TETHERING_ETHERNET);
Felipe Leme70c8b9b2016-04-25 14:41:31 -0700761 }
762
markchien0f63ca62019-09-30 14:40:57 +0800763 int getLastTetherError(String iface) {
Robert Greenwaltb4453622011-11-03 16:01:40 -0700764 synchronized (mPublicSync) {
Christopher Wileyd985dde2016-05-31 10:44:35 -0700765 TetherState tetherState = mTetherStates.get(iface);
766 if (tetherState == null) {
markchien0f63ca62019-09-30 14:40:57 +0800767 Log.e(TAG, "Tried to getLastTetherError on an unknown iface :" + iface
768 + ", ignoring");
Erik Kline7a26ba32018-03-09 14:18:02 +0900769 return TETHER_ERROR_UNKNOWN_IFACE;
Robert Greenwaltb4453622011-11-03 16:01:40 -0700770 }
Hugo Benichib55fb222017-03-10 14:20:57 +0900771 return tetherState.lastError;
Robert Greenwalt5a735062010-03-02 17:25:02 -0800772 }
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -0800773 }
774
markchienae8aa642019-12-16 20:15:20 +0800775 boolean isTetherProvisioningRequired() {
776 final TetheringConfiguration cfg = mConfig;
777 return mEntitlementMgr.isTetherProvisioningRequired(cfg);
778 }
779
Erik Klineea9cc482017-03-10 19:35:34 +0900780 // TODO: Figure out how to update for local hotspot mode interfaces.
Christopher Wileyd985dde2016-05-31 10:44:35 -0700781 private void sendTetherStateChangedBroadcast() {
Erik Kline7a26ba32018-03-09 14:18:02 +0900782 if (!mDeps.isTetheringSupported()) return;
Robert Greenwalt2a091d72010-02-11 18:18:40 -0800783
Erik Kline8351faa2017-04-17 16:47:23 +0900784 final ArrayList<String> availableList = new ArrayList<>();
785 final ArrayList<String> tetherList = new ArrayList<>();
786 final ArrayList<String> localOnlyList = new ArrayList<>();
787 final ArrayList<String> erroredList = new ArrayList<>();
markchien0f63ca62019-09-30 14:40:57 +0800788 final ArrayList<Integer> lastErrorList = new ArrayList<>();
Robert Greenwalt2a091d72010-02-11 18:18:40 -0800789
Erik Kline3e756652017-01-17 13:42:19 +0900790 final TetheringConfiguration cfg = mConfig;
markchienae8aa642019-12-16 20:15:20 +0800791 mTetherStatesParcel = new TetherStatesParcel();
Erik Kline3e756652017-01-17 13:42:19 +0900792
Automerger Merge Worker2d7bacc2020-03-09 08:54:00 +0000793 int downstreamTypesMask = DOWNSTREAM_NONE;
Robert Greenwaltb4453622011-11-03 16:01:40 -0700794 synchronized (mPublicSync) {
Christopher Wileyd985dde2016-05-31 10:44:35 -0700795 for (int i = 0; i < mTetherStates.size(); i++) {
796 TetherState tetherState = mTetherStates.valueAt(i);
797 String iface = mTetherStates.keyAt(i);
Erik Kline7a26ba32018-03-09 14:18:02 +0900798 if (tetherState.lastError != TETHER_ERROR_NO_ERROR) {
Christopher Wileyd985dde2016-05-31 10:44:35 -0700799 erroredList.add(iface);
markchien0f63ca62019-09-30 14:40:57 +0800800 lastErrorList.add(tetherState.lastError);
Erik Kline7a4ccc62018-08-27 17:26:47 +0900801 } else if (tetherState.lastState == IpServer.STATE_AVAILABLE) {
Christopher Wileyd985dde2016-05-31 10:44:35 -0700802 availableList.add(iface);
Erik Kline7a4ccc62018-08-27 17:26:47 +0900803 } else if (tetherState.lastState == IpServer.STATE_LOCAL_ONLY) {
Erik Kline8351faa2017-04-17 16:47:23 +0900804 localOnlyList.add(iface);
Erik Kline7a4ccc62018-08-27 17:26:47 +0900805 } else if (tetherState.lastState == IpServer.STATE_TETHERED) {
Erik Kline3e756652017-01-17 13:42:19 +0900806 if (cfg.isUsb(iface)) {
Automerger Merge Worker2d7bacc2020-03-09 08:54:00 +0000807 downstreamTypesMask |= (1 << TETHERING_USB);
Erik Kline3e756652017-01-17 13:42:19 +0900808 } else if (cfg.isWifi(iface)) {
Automerger Merge Worker2d7bacc2020-03-09 08:54:00 +0000809 downstreamTypesMask |= (1 << TETHERING_WIFI);
Erik Kline3e756652017-01-17 13:42:19 +0900810 } else if (cfg.isBluetooth(iface)) {
Automerger Merge Worker2d7bacc2020-03-09 08:54:00 +0000811 downstreamTypesMask |= (1 << TETHERING_BLUETOOTH);
Robert Greenwalt2a091d72010-02-11 18:18:40 -0800812 }
Erik Kline8351faa2017-04-17 16:47:23 +0900813 tetherList.add(iface);
Robert Greenwalt2a091d72010-02-11 18:18:40 -0800814 }
815 }
816 }
markchien0f63ca62019-09-30 14:40:57 +0800817
818 mTetherStatesParcel.availableList = availableList.toArray(new String[0]);
819 mTetherStatesParcel.tetheredList = tetherList.toArray(new String[0]);
820 mTetherStatesParcel.localOnlyList = localOnlyList.toArray(new String[0]);
821 mTetherStatesParcel.erroredIfaceList = erroredList.toArray(new String[0]);
822 mTetherStatesParcel.lastErrorList = new int[lastErrorList.size()];
823 Iterator<Integer> iterator = lastErrorList.iterator();
824 for (int i = 0; i < lastErrorList.size(); i++) {
825 mTetherStatesParcel.lastErrorList[i] = iterator.next().intValue();
826 }
827 reportTetherStateChanged(mTetherStatesParcel);
828
Erik Kline7a26ba32018-03-09 14:18:02 +0900829 final Intent bcast = new Intent(ACTION_TETHER_STATE_CHANGED);
markchien4cbc1a92020-01-06 21:08:19 +0800830 bcast.addFlags(Intent.FLAG_RECEIVER_REPLACE_PENDING);
Erik Kline7a26ba32018-03-09 14:18:02 +0900831 bcast.putStringArrayListExtra(EXTRA_AVAILABLE_TETHER, availableList);
832 bcast.putStringArrayListExtra(EXTRA_ACTIVE_LOCAL_ONLY, localOnlyList);
833 bcast.putStringArrayListExtra(EXTRA_ACTIVE_TETHER, tetherList);
834 bcast.putStringArrayListExtra(EXTRA_ERRORED_TETHER, erroredList);
Erik Kline8351faa2017-04-17 16:47:23 +0900835 mContext.sendStickyBroadcastAsUser(bcast, UserHandle.ALL);
Robert Greenwaltfd1be2b2011-11-11 12:30:19 -0800836 if (DBG) {
Lorenzo Colitticd63d242016-04-10 15:39:53 +0900837 Log.d(TAG, String.format(
Erik Kline8351faa2017-04-17 16:47:23 +0900838 "sendTetherStateChangedBroadcast %s=[%s] %s=[%s] %s=[%s] %s=[%s]",
839 "avail", TextUtils.join(",", availableList),
840 "local_only", TextUtils.join(",", localOnlyList),
841 "tether", TextUtils.join(",", tetherList),
842 "error", TextUtils.join(",", erroredList)));
Robert Greenwalt924cc942010-06-28 10:26:19 -0700843 }
Robert Greenwalta599fe7c2010-03-08 18:30:14 -0800844
Automerger Merge Worker2d7bacc2020-03-09 08:54:00 +0000845 mNotificationUpdater.onDownstreamChanged(downstreamTypesMask);
Robert Greenwalt5a735062010-03-02 17:25:02 -0800846 }
847
Robert Greenwalt2a091d72010-02-11 18:18:40 -0800848 private class StateReceiver extends BroadcastReceiver {
Nick Kralevich70c117a2014-05-27 15:30:02 -0700849 @Override
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -0800850 public void onReceive(Context content, Intent intent) {
Erik Kline2e88b5e2017-01-18 11:57:45 +0900851 final String action = intent.getAction();
852 if (action == null) return;
853
Mike Lockwood770126a2010-12-09 22:30:37 -0800854 if (action.equals(UsbManager.ACTION_USB_STATE)) {
Erik Kline2e88b5e2017-01-18 11:57:45 +0900855 handleUsbAction(intent);
Erik Kline7a26ba32018-03-09 14:18:02 +0900856 } else if (action.equals(CONNECTIVITY_ACTION)) {
Erik Kline2e88b5e2017-01-18 11:57:45 +0900857 handleConnectivityAction(intent);
Christopher Wiley5c0b10a2016-05-31 14:43:08 -0700858 } else if (action.equals(WifiManager.WIFI_AP_STATE_CHANGED_ACTION)) {
Erik Kline2e88b5e2017-01-18 11:57:45 +0900859 handleWifiApAction(intent);
Jimmy Chenbcd86d02019-07-15 18:03:23 +0800860 } else if (action.equals(WifiP2pManager.WIFI_P2P_CONNECTION_CHANGED_ACTION)) {
861 handleWifiP2pAction(intent);
Robert Greenwaltc13368b2013-07-18 14:24:42 -0700862 } else if (action.equals(Intent.ACTION_CONFIGURATION_CHANGED)) {
Erik Klinede637722017-10-12 22:16:01 +0900863 mLog.log("OBSERVED configuration changed");
Robert Greenwaltc13368b2013-07-18 14:24:42 -0700864 updateConfiguration();
markchien1ddfba42019-11-27 21:20:33 +0800865 } else if (action.equals(UserManager.ACTION_USER_RESTRICTIONS_CHANGED)) {
866 mLog.log("OBSERVED user restrictions changed");
867 handleUserRestrictionAction();
markchien3fe660b2019-12-05 12:04:59 +0800868 } else if (action.equals(ACTION_RESTRICT_BACKGROUND_CHANGED)) {
869 mLog.log("OBSERVED data saver changed");
870 handleDataSaverChanged();
Paul Hu77fa8d62020-04-16 02:54:37 +0000871 } else if (action.equals(TetheringNotificationUpdater.ACTION_DISABLE_TETHERING)) {
872 untetherAll();
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -0800873 }
874 }
Erik Kline2e88b5e2017-01-18 11:57:45 +0900875
876 private void handleConnectivityAction(Intent intent) {
Erik Kline7a26ba32018-03-09 14:18:02 +0900877 final NetworkInfo networkInfo =
878 (NetworkInfo) intent.getParcelableExtra(EXTRA_NETWORK_INFO);
markchien0f63ca62019-09-30 14:40:57 +0800879 if (networkInfo == null
880 || networkInfo.getDetailedState() == NetworkInfo.DetailedState.FAILED) {
Erik Kline2e88b5e2017-01-18 11:57:45 +0900881 return;
882 }
883
884 if (VDBG) Log.d(TAG, "Tethering got CONNECTIVITY_ACTION: " + networkInfo.toString());
885 mTetherMasterSM.sendMessage(TetherMasterSM.CMD_UPSTREAM_CHANGED);
886 }
887
888 private void handleUsbAction(Intent intent) {
889 final boolean usbConnected = intent.getBooleanExtra(USB_CONNECTED, false);
Erik Klinec438e302017-07-04 22:02:49 +0900890 final boolean usbConfigured = intent.getBooleanExtra(USB_CONFIGURED, false);
Erik Kline2e88b5e2017-01-18 11:57:45 +0900891 final boolean rndisEnabled = intent.getBooleanExtra(USB_FUNCTION_RNDIS, false);
Milim Lee31ef4c02019-10-17 05:02:33 +0900892 final boolean ncmEnabled = intent.getBooleanExtra(USB_FUNCTION_NCM, false);
Erik Klinec438e302017-07-04 22:02:49 +0900893
894 mLog.log(String.format("USB bcast connected:%s configured:%s rndis:%s",
895 usbConnected, usbConfigured, rndisEnabled));
896
897 // There are three types of ACTION_USB_STATE:
898 //
899 // - DISCONNECTED (USB_CONNECTED and USB_CONFIGURED are 0)
900 // Meaning: USB connection has ended either because of
901 // software reset or hard unplug.
902 //
903 // - CONNECTED (USB_CONNECTED is 1, USB_CONFIGURED is 0)
904 // Meaning: the first stage of USB protocol handshake has
905 // occurred but it is not complete.
906 //
907 // - CONFIGURED (USB_CONNECTED and USB_CONFIGURED are 1)
908 // Meaning: the USB handshake is completely done and all the
909 // functions are ready to use.
910 //
911 // For more explanation, see b/62552150 .
Erik Kline2e88b5e2017-01-18 11:57:45 +0900912 synchronized (Tethering.this.mPublicSync) {
Jerry Zhang656a7bc2017-12-20 14:26:39 -0800913 if (!usbConnected && mRndisEnabled) {
914 // Turn off tethering if it was enabled and there is a disconnect.
Erik Kline7a4ccc62018-08-27 17:26:47 +0900915 tetherMatchingInterfaces(IpServer.STATE_AVAILABLE, TETHERING_USB);
markchien3b519632018-09-07 16:19:12 +0800916 mEntitlementMgr.stopProvisioningIfNeeded(TETHERING_USB);
Jerry Zhang656a7bc2017-12-20 14:26:39 -0800917 } else if (usbConfigured && rndisEnabled) {
918 // Tether if rndis is enabled and usb is configured.
Erik Kline7a4ccc62018-08-27 17:26:47 +0900919 tetherMatchingInterfaces(IpServer.STATE_TETHERED, TETHERING_USB);
Milim Lee31ef4c02019-10-17 05:02:33 +0900920 } else if (usbConnected && ncmEnabled) {
921 tetherMatchingInterfaces(IpServer.STATE_LOCAL_ONLY, TETHERING_NCM);
Erik Kline2e88b5e2017-01-18 11:57:45 +0900922 }
Jerry Zhang656a7bc2017-12-20 14:26:39 -0800923 mRndisEnabled = usbConfigured && rndisEnabled;
Erik Kline2e88b5e2017-01-18 11:57:45 +0900924 }
925 }
926
927 private void handleWifiApAction(Intent intent) {
Erik Kline2efb8272017-05-31 15:53:53 +0900928 final int curState = intent.getIntExtra(EXTRA_WIFI_AP_STATE, WIFI_AP_STATE_DISABLED);
929 final String ifname = intent.getStringExtra(EXTRA_WIFI_AP_INTERFACE_NAME);
930 final int ipmode = intent.getIntExtra(EXTRA_WIFI_AP_MODE, IFACE_IP_MODE_UNSPECIFIED);
931
Erik Kline2e88b5e2017-01-18 11:57:45 +0900932 synchronized (Tethering.this.mPublicSync) {
933 switch (curState) {
934 case WifiManager.WIFI_AP_STATE_ENABLING:
935 // We can see this state on the way to both enabled and failure states.
936 break;
937 case WifiManager.WIFI_AP_STATE_ENABLED:
Erik Kline2efb8272017-05-31 15:53:53 +0900938 enableWifiIpServingLocked(ifname, ipmode);
Erik Kline2e88b5e2017-01-18 11:57:45 +0900939 break;
Erik Kline2e88b5e2017-01-18 11:57:45 +0900940 case WifiManager.WIFI_AP_STATE_DISABLING:
Mark Chien19487bf2020-04-15 17:28:27 +0000941 // We can see this state on the way to disabled.
942 break;
943 case WifiManager.WIFI_AP_STATE_DISABLED:
Erik Kline2e88b5e2017-01-18 11:57:45 +0900944 case WifiManager.WIFI_AP_STATE_FAILED:
945 default:
Erik Kline562e0c12017-06-09 16:36:29 +0900946 disableWifiIpServingLocked(ifname, curState);
Erik Kline2efb8272017-05-31 15:53:53 +0900947 break;
Erik Kline2e88b5e2017-01-18 11:57:45 +0900948 }
949 }
950 }
Jimmy Chenbcd86d02019-07-15 18:03:23 +0800951
Jimmy Chen151384d2019-12-03 11:37:09 +0800952 private boolean isGroupOwner(WifiP2pGroup group) {
953 return group != null && group.isGroupOwner()
954 && !TextUtils.isEmpty(group.getInterface());
955 }
956
Jimmy Chenbcd86d02019-07-15 18:03:23 +0800957 private void handleWifiP2pAction(Intent intent) {
958 if (mConfig.isWifiP2pLegacyTetheringMode()) return;
959
960 final WifiP2pInfo p2pInfo =
961 (WifiP2pInfo) intent.getParcelableExtra(WifiP2pManager.EXTRA_WIFI_P2P_INFO);
962 final WifiP2pGroup group =
963 (WifiP2pGroup) intent.getParcelableExtra(WifiP2pManager.EXTRA_WIFI_P2P_GROUP);
964
965 if (VDBG) {
966 Log.d(TAG, "WifiP2pAction: P2pInfo: " + p2pInfo + " Group: " + group);
967 }
968
Jimmy Chenbcd86d02019-07-15 18:03:23 +0800969 synchronized (Tethering.this.mPublicSync) {
Jimmy Chen151384d2019-12-03 11:37:09 +0800970 // if no group is formed, bring it down if needed.
971 if (p2pInfo == null || !p2pInfo.groupFormed) {
972 disableWifiP2pIpServingLockedIfNeeded(mWifiP2pTetherInterface);
973 mWifiP2pTetherInterface = null;
974 return;
Jimmy Chenbcd86d02019-07-15 18:03:23 +0800975 }
Jimmy Chen151384d2019-12-03 11:37:09 +0800976
977 // If there is a group but the device is not the owner, bail out.
978 if (!isGroupOwner(group)) return;
979
980 // If already serving from the correct interface, nothing to do.
981 if (group.getInterface().equals(mWifiP2pTetherInterface)) return;
982
983 // If already serving from another interface, turn it down first.
984 if (!TextUtils.isEmpty(mWifiP2pTetherInterface)) {
985 mLog.w("P2P tethered interface " + mWifiP2pTetherInterface
986 + "is different from current interface "
987 + group.getInterface() + ", re-tether it");
988 disableWifiP2pIpServingLockedIfNeeded(mWifiP2pTetherInterface);
989 }
990
991 // Finally bring up serving on the new interface
992 mWifiP2pTetherInterface = group.getInterface();
993 enableWifiIpServingLocked(mWifiP2pTetherInterface, IFACE_IP_MODE_LOCAL_ONLY);
Jimmy Chenbcd86d02019-07-15 18:03:23 +0800994 }
995 }
markchien1ddfba42019-11-27 21:20:33 +0800996
997 private void handleUserRestrictionAction() {
998 mTetheringRestriction.onUserRestrictionsChanged();
999 }
markchien3fe660b2019-12-05 12:04:59 +08001000
1001 private void handleDataSaverChanged() {
1002 final ConnectivityManager connMgr = (ConnectivityManager) mContext.getSystemService(
1003 Context.CONNECTIVITY_SERVICE);
1004 final boolean isDataSaverEnabled = connMgr.getRestrictBackgroundStatus()
1005 != ConnectivityManager.RESTRICT_BACKGROUND_STATUS_DISABLED;
1006
1007 if (mDataSaverEnabled == isDataSaverEnabled) return;
1008
1009 mDataSaverEnabled = isDataSaverEnabled;
1010 if (mDataSaverEnabled) {
1011 untetherAll();
1012 }
1013 }
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -08001014 }
1015
Alexandru-Andrei Rotarufa6d5c52017-07-18 16:49:22 +01001016 @VisibleForTesting
Paul Hu4089bb12020-04-23 09:07:00 +00001017 boolean isTetheringActive() {
1018 return mActiveTetheringRequests.size() > 0;
1019 }
1020
1021 @VisibleForTesting
markchien1ddfba42019-11-27 21:20:33 +08001022 protected static class UserRestrictionActionListener {
1023 private final UserManager mUserManager;
Alexandru-Andrei Rotarufa6d5c52017-07-18 16:49:22 +01001024 private final Tethering mWrapper;
Paul Huf950dc92020-03-25 12:39:13 +00001025 private final TetheringNotificationUpdater mNotificationUpdater;
markchien1ddfba42019-11-27 21:20:33 +08001026 public boolean mDisallowTethering;
Alexandru-Andrei Rotarufa6d5c52017-07-18 16:49:22 +01001027
Paul Huf950dc92020-03-25 12:39:13 +00001028 public UserRestrictionActionListener(@NonNull UserManager um, @NonNull Tethering wrapper,
1029 @NonNull TetheringNotificationUpdater updater) {
markchien1ddfba42019-11-27 21:20:33 +08001030 mUserManager = um;
Alexandru-Andrei Rotarufa6d5c52017-07-18 16:49:22 +01001031 mWrapper = wrapper;
Paul Huf950dc92020-03-25 12:39:13 +00001032 mNotificationUpdater = updater;
markchien1ddfba42019-11-27 21:20:33 +08001033 mDisallowTethering = false;
Alexandru-Andrei Rotarufa6d5c52017-07-18 16:49:22 +01001034 }
1035
markchien1ddfba42019-11-27 21:20:33 +08001036 public void onUserRestrictionsChanged() {
1037 // getUserRestrictions gets restriction for this process' user, which is the primary
1038 // user. This is fine because DISALLOW_CONFIG_TETHERING can only be set on the primary
1039 // user. See UserManager.DISALLOW_CONFIG_TETHERING.
1040 final Bundle restrictions = mUserManager.getUserRestrictions();
Alexandru-Andrei Rotarufa6d5c52017-07-18 16:49:22 +01001041 final boolean newlyDisallowed =
markchien1ddfba42019-11-27 21:20:33 +08001042 restrictions.getBoolean(UserManager.DISALLOW_CONFIG_TETHERING);
1043 final boolean prevDisallowed = mDisallowTethering;
1044 mDisallowTethering = newlyDisallowed;
Alexandru-Andrei Rotarufa6d5c52017-07-18 16:49:22 +01001045
markchien1ddfba42019-11-27 21:20:33 +08001046 final boolean tetheringDisallowedChanged = (newlyDisallowed != prevDisallowed);
Alexandru-Andrei Rotarufa6d5c52017-07-18 16:49:22 +01001047 if (!tetheringDisallowedChanged) {
1048 return;
1049 }
1050
Paul Huf950dc92020-03-25 12:39:13 +00001051 if (!newlyDisallowed) {
1052 // Clear the restricted notification when user is allowed to have tethering
1053 // function.
1054 mNotificationUpdater.tetheringRestrictionLifted();
1055 return;
Alexandru-Andrei Rotarufa6d5c52017-07-18 16:49:22 +01001056 }
Paul Huf950dc92020-03-25 12:39:13 +00001057
Paul Hu4089bb12020-04-23 09:07:00 +00001058 if (mWrapper.isTetheringActive()) {
1059 // Restricted notification is shown when tethering function is disallowed on
1060 // user's device.
1061 mNotificationUpdater.notifyTetheringDisabledByRestriction();
Paul Huf950dc92020-03-25 12:39:13 +00001062
Paul Hu4089bb12020-04-23 09:07:00 +00001063 // Untether from all downstreams since tethering is disallowed.
1064 mWrapper.untetherAll();
1065 }
Paul Huf950dc92020-03-25 12:39:13 +00001066 // TODO(b/148139325): send tetheringSupported on restriction change
Alexandru-Andrei Rotarufa6d5c52017-07-18 16:49:22 +01001067 }
1068 }
1069
Jimmy Chenbcd86d02019-07-15 18:03:23 +08001070 private void disableWifiIpServingLockedCommon(int tetheringType, String ifname, int apState) {
1071 mLog.log("Canceling WiFi tethering request -"
1072 + " type=" + tetheringType
1073 + " interface=" + ifname
1074 + " state=" + apState);
Erik Kline562e0c12017-06-09 16:36:29 +09001075
1076 if (!TextUtils.isEmpty(ifname)) {
1077 final TetherState ts = mTetherStates.get(ifname);
1078 if (ts != null) {
Erik Kline7a4ccc62018-08-27 17:26:47 +09001079 ts.ipServer.unwanted();
Erik Kline562e0c12017-06-09 16:36:29 +09001080 return;
1081 }
1082 }
1083
Erik Kline2efb8272017-05-31 15:53:53 +09001084 for (int i = 0; i < mTetherStates.size(); i++) {
Erik Kline7a4ccc62018-08-27 17:26:47 +09001085 final IpServer ipServer = mTetherStates.valueAt(i).ipServer;
Jimmy Chenbcd86d02019-07-15 18:03:23 +08001086 if (ipServer.interfaceType() == tetheringType) {
Erik Kline7a4ccc62018-08-27 17:26:47 +09001087 ipServer.unwanted();
Erik Kline562e0c12017-06-09 16:36:29 +09001088 return;
Erik Kline2efb8272017-05-31 15:53:53 +09001089 }
1090 }
Erik Kline562e0c12017-06-09 16:36:29 +09001091
markchien0f63ca62019-09-30 14:40:57 +08001092 mLog.log("Error disabling Wi-Fi IP serving; "
1093 + (TextUtils.isEmpty(ifname) ? "no interface name specified"
Erik Kline562e0c12017-06-09 16:36:29 +09001094 : "specified interface: " + ifname));
Erik Kline2efb8272017-05-31 15:53:53 +09001095 }
1096
Jimmy Chenbcd86d02019-07-15 18:03:23 +08001097 private void disableWifiIpServingLocked(String ifname, int apState) {
1098 // Regardless of whether we requested this transition, the AP has gone
1099 // down. Don't try to tether again unless we're requested to do so.
1100 // TODO: Remove this altogether, once Wi-Fi reliably gives us an
1101 // interface name with every broadcast.
1102 mWifiTetherRequested = false;
1103
1104 disableWifiIpServingLockedCommon(TETHERING_WIFI, ifname, apState);
1105 }
1106
Jimmy Chen151384d2019-12-03 11:37:09 +08001107 private void disableWifiP2pIpServingLockedIfNeeded(String ifname) {
1108 if (TextUtils.isEmpty(ifname)) return;
1109
Jimmy Chenbcd86d02019-07-15 18:03:23 +08001110 disableWifiIpServingLockedCommon(TETHERING_WIFI_P2P, ifname, /* dummy */ 0);
1111 }
1112
Erik Kline2efb8272017-05-31 15:53:53 +09001113 private void enableWifiIpServingLocked(String ifname, int wifiIpMode) {
Erik Kline7a4ccc62018-08-27 17:26:47 +09001114 // Map wifiIpMode values to IpServer.Callback serving states, inferring
Erik Kline2efb8272017-05-31 15:53:53 +09001115 // from mWifiTetherRequested as a final "best guess".
1116 final int ipServingMode;
1117 switch (wifiIpMode) {
1118 case IFACE_IP_MODE_TETHERED:
Erik Kline7a4ccc62018-08-27 17:26:47 +09001119 ipServingMode = IpServer.STATE_TETHERED;
Erik Kline2efb8272017-05-31 15:53:53 +09001120 break;
1121 case IFACE_IP_MODE_LOCAL_ONLY:
Erik Kline7a4ccc62018-08-27 17:26:47 +09001122 ipServingMode = IpServer.STATE_LOCAL_ONLY;
Erik Kline2efb8272017-05-31 15:53:53 +09001123 break;
1124 default:
Erik Kline9e225542017-06-08 17:48:48 +09001125 mLog.e("Cannot enable IP serving in unknown WiFi mode: " + wifiIpMode);
1126 return;
Erik Kline2efb8272017-05-31 15:53:53 +09001127 }
1128
1129 if (!TextUtils.isEmpty(ifname)) {
Jimmy Chenbcd86d02019-07-15 18:03:23 +08001130 maybeTrackNewInterfaceLocked(ifname);
Erik Kline2efb8272017-05-31 15:53:53 +09001131 changeInterfaceState(ifname, ipServingMode);
1132 } else {
Erik Kline9e225542017-06-08 17:48:48 +09001133 mLog.e(String.format(
markchien0f63ca62019-09-30 14:40:57 +08001134 "Cannot enable IP serving in mode %s on missing interface name",
1135 ipServingMode));
Erik Kline2efb8272017-05-31 15:53:53 +09001136 }
1137 }
1138
Erik Klineea9cc482017-03-10 19:35:34 +09001139 // TODO: Consider renaming to something more accurate in its description.
1140 // This method:
1141 // - allows requesting either tethering or local hotspot serving states
1142 // - handles both enabling and disabling serving states
1143 // - only tethers the first matching interface in listInterfaces()
1144 // order of a given type
1145 private void tetherMatchingInterfaces(int requestedState, int interfaceType) {
1146 if (VDBG) {
1147 Log.d(TAG, "tetherMatchingInterfaces(" + requestedState + ", " + interfaceType + ")");
1148 }
Mike Lockwood3c2a2f62011-06-08 15:10:26 -07001149
Christopher Wiley5c0b10a2016-05-31 14:43:08 -07001150 String[] ifaces = null;
Robert Greenwalt65ae29b2010-02-18 11:25:54 -08001151 try {
markchiena9d9ef82020-01-07 14:43:17 +08001152 ifaces = mNetd.interfaceGetList();
1153 } catch (RemoteException | ServiceSpecificException e) {
Mike Lockwood3c2a2f62011-06-08 15:10:26 -07001154 Log.e(TAG, "Error listing Interfaces", e);
Robert Greenwalt65ae29b2010-02-18 11:25:54 -08001155 return;
1156 }
Christopher Wiley5c0b10a2016-05-31 14:43:08 -07001157 String chosenIface = null;
1158 if (ifaces != null) {
1159 for (String iface : ifaces) {
1160 if (ifaceNameToType(iface) == interfaceType) {
1161 chosenIface = iface;
1162 break;
Robert Greenwalt65ae29b2010-02-18 11:25:54 -08001163 }
1164 }
1165 }
Christopher Wiley5c0b10a2016-05-31 14:43:08 -07001166 if (chosenIface == null) {
1167 Log.e(TAG, "could not find iface of type " + interfaceType);
1168 return;
1169 }
1170
Erik Kline2efb8272017-05-31 15:53:53 +09001171 changeInterfaceState(chosenIface, requestedState);
1172 }
1173
1174 private void changeInterfaceState(String ifname, int requestedState) {
Erik Klineea9cc482017-03-10 19:35:34 +09001175 final int result;
1176 switch (requestedState) {
Erik Kline7a4ccc62018-08-27 17:26:47 +09001177 case IpServer.STATE_UNAVAILABLE:
1178 case IpServer.STATE_AVAILABLE:
Erik Kline2efb8272017-05-31 15:53:53 +09001179 result = untether(ifname);
Erik Klineea9cc482017-03-10 19:35:34 +09001180 break;
Erik Kline7a4ccc62018-08-27 17:26:47 +09001181 case IpServer.STATE_TETHERED:
1182 case IpServer.STATE_LOCAL_ONLY:
Erik Kline2efb8272017-05-31 15:53:53 +09001183 result = tether(ifname, requestedState);
Erik Klineea9cc482017-03-10 19:35:34 +09001184 break;
1185 default:
1186 Log.wtf(TAG, "Unknown interface state: " + requestedState);
1187 return;
1188 }
Erik Kline7a26ba32018-03-09 14:18:02 +09001189 if (result != TETHER_ERROR_NO_ERROR) {
Erik Kline2efb8272017-05-31 15:53:53 +09001190 Log.e(TAG, "unable start or stop tethering on iface " + ifname);
Christopher Wiley5c0b10a2016-05-31 14:43:08 -07001191 return;
1192 }
Robert Greenwalt65ae29b2010-02-18 11:25:54 -08001193 }
1194
markchien0f63ca62019-09-30 14:40:57 +08001195 TetheringConfiguration getTetheringConfiguration() {
Erik Kline3e756652017-01-17 13:42:19 +09001196 return mConfig;
1197 }
1198
markchien0f63ca62019-09-30 14:40:57 +08001199 boolean hasTetherableConfiguration() {
Erik Klined781fba2017-01-23 13:01:58 +09001200 final TetheringConfiguration cfg = mConfig;
1201 final boolean hasDownstreamConfiguration =
markchien1be8d8f2018-12-05 21:20:01 +08001202 (cfg.tetherableUsbRegexs.length != 0)
1203 || (cfg.tetherableWifiRegexs.length != 0)
1204 || (cfg.tetherableBluetoothRegexs.length != 0);
1205 final boolean hasUpstreamConfiguration = !cfg.preferredUpstreamIfaceTypes.isEmpty()
1206 || cfg.chooseUpstreamAutomatically;
Erik Klined781fba2017-01-23 13:01:58 +09001207
1208 return hasDownstreamConfiguration && hasUpstreamConfiguration;
1209 }
1210
Erik Kline3e756652017-01-17 13:42:19 +09001211 // TODO - update callers to use getTetheringConfiguration(),
1212 // which has only final members.
markchien0f63ca62019-09-30 14:40:57 +08001213 String[] getTetherableUsbRegexs() {
Erik Kline3e756652017-01-17 13:42:19 +09001214 return copy(mConfig.tetherableUsbRegexs);
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -08001215 }
1216
markchien0f63ca62019-09-30 14:40:57 +08001217 String[] getTetherableWifiRegexs() {
Erik Kline3e756652017-01-17 13:42:19 +09001218 return copy(mConfig.tetherableWifiRegexs);
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001219 }
1220
markchien0f63ca62019-09-30 14:40:57 +08001221 String[] getTetherableBluetoothRegexs() {
Erik Kline3e756652017-01-17 13:42:19 +09001222 return copy(mConfig.tetherableBluetoothRegexs);
Danica Chang6fdd0c62010-08-11 14:54:43 -07001223 }
1224
markchien0f63ca62019-09-30 14:40:57 +08001225 int setUsbTethering(boolean enable) {
Wink Savillec9acde92011-09-21 11:05:43 -07001226 if (VDBG) Log.d(TAG, "setUsbTethering(" + enable + ")");
Erik Klinec438e302017-07-04 22:02:49 +09001227 UsbManager usbManager = (UsbManager) mContext.getSystemService(Context.USB_SERVICE);
Ye Jiao21f96252019-01-28 12:54:22 +08001228 if (usbManager == null) {
1229 mLog.e("setUsbTethering: failed to get UsbManager!");
1230 return TETHER_ERROR_SERVICE_UNAVAIL;
1231 }
1232
Robert Greenwaltb4453622011-11-03 16:01:40 -07001233 synchronized (mPublicSync) {
Jerry Zhang327b8092018-01-09 17:53:04 -08001234 usbManager.setCurrentFunctions(enable ? UsbManager.FUNCTION_RNDIS
1235 : UsbManager.FUNCTION_NONE);
Mike Lockwood6c2260b2011-07-19 13:04:47 -07001236 }
Erik Kline7a26ba32018-03-09 14:18:02 +09001237 return TETHER_ERROR_NO_ERROR;
Mike Lockwood6c2260b2011-07-19 13:04:47 -07001238 }
1239
Milim Lee31ef4c02019-10-17 05:02:33 +09001240 private int setNcmTethering(boolean enable) {
1241 if (VDBG) Log.d(TAG, "setNcmTethering(" + enable + ")");
1242 UsbManager usbManager = (UsbManager) mContext.getSystemService(Context.USB_SERVICE);
1243 synchronized (mPublicSync) {
1244 usbManager.setCurrentFunctions(enable ? UsbManager.FUNCTION_NCM
1245 : UsbManager.FUNCTION_NONE);
1246 }
1247 return TETHER_ERROR_NO_ERROR;
1248 }
1249
Erik Kline1fdc2e22017-05-08 17:56:35 +09001250 // TODO review API - figure out how to delete these entirely.
markchien0f63ca62019-09-30 14:40:57 +08001251 String[] getTetheredIfaces() {
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001252 ArrayList<String> list = new ArrayList<String>();
Robert Greenwaltb4453622011-11-03 16:01:40 -07001253 synchronized (mPublicSync) {
Christopher Wileyd985dde2016-05-31 10:44:35 -07001254 for (int i = 0; i < mTetherStates.size(); i++) {
1255 TetherState tetherState = mTetherStates.valueAt(i);
Erik Kline7a4ccc62018-08-27 17:26:47 +09001256 if (tetherState.lastState == IpServer.STATE_TETHERED) {
Christopher Wileyd985dde2016-05-31 10:44:35 -07001257 list.add(mTetherStates.keyAt(i));
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001258 }
1259 }
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -08001260 }
Christopher Wileyd985dde2016-05-31 10:44:35 -07001261 return list.toArray(new String[list.size()]);
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001262 }
1263
markchien0f63ca62019-09-30 14:40:57 +08001264 String[] getTetherableIfaces() {
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001265 ArrayList<String> list = new ArrayList<String>();
Robert Greenwaltb4453622011-11-03 16:01:40 -07001266 synchronized (mPublicSync) {
Christopher Wileyd985dde2016-05-31 10:44:35 -07001267 for (int i = 0; i < mTetherStates.size(); i++) {
1268 TetherState tetherState = mTetherStates.valueAt(i);
Erik Kline7a4ccc62018-08-27 17:26:47 +09001269 if (tetherState.lastState == IpServer.STATE_AVAILABLE) {
Christopher Wileyd985dde2016-05-31 10:44:35 -07001270 list.add(mTetherStates.keyAt(i));
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001271 }
1272 }
1273 }
Christopher Wileyd985dde2016-05-31 10:44:35 -07001274 return list.toArray(new String[list.size()]);
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001275 }
1276
markchien0f63ca62019-09-30 14:40:57 +08001277 String[] getTetheredDhcpRanges() {
Remi NGUYEN VANe3bb5c52018-06-12 15:57:04 +09001278 // TODO: this is only valid for the old DHCP server. Latest search suggests it is only used
1279 // by WifiP2pServiceImpl to start dnsmasq: remove/deprecate after migrating callers.
1280 return mConfig.legacyDhcpRanges;
Robert Greenwalt9c7e2c22014-06-23 14:53:42 -07001281 }
1282
markchien0f63ca62019-09-30 14:40:57 +08001283 String[] getErroredIfaces() {
Robert Greenwalt5a735062010-03-02 17:25:02 -08001284 ArrayList<String> list = new ArrayList<String>();
Robert Greenwaltb4453622011-11-03 16:01:40 -07001285 synchronized (mPublicSync) {
Christopher Wileyd985dde2016-05-31 10:44:35 -07001286 for (int i = 0; i < mTetherStates.size(); i++) {
1287 TetherState tetherState = mTetherStates.valueAt(i);
Erik Kline7a26ba32018-03-09 14:18:02 +09001288 if (tetherState.lastError != TETHER_ERROR_NO_ERROR) {
Christopher Wileyd985dde2016-05-31 10:44:35 -07001289 list.add(mTetherStates.keyAt(i));
Robert Greenwalt5a735062010-03-02 17:25:02 -08001290 }
1291 }
1292 }
Christopher Wileyd985dde2016-05-31 10:44:35 -07001293 return list.toArray(new String[list.size()]);
Robert Greenwalt5a735062010-03-02 17:25:02 -08001294 }
1295
Erik Kline22108902017-07-06 16:40:06 +09001296 private void logMessage(State state, int what) {
1297 mLog.log(state.getName() + " got " + sMagicDecoderRing.get(what, Integer.toString(what)));
Lorenzo Colitticd63d242016-04-10 15:39:53 +09001298 }
1299
Erik Klineea9cc482017-03-10 19:35:34 +09001300 private boolean upstreamWanted() {
1301 if (!mForwardedDownstreams.isEmpty()) return true;
1302
1303 synchronized (mPublicSync) {
Jerry Zhang656a7bc2017-12-20 14:26:39 -08001304 return mWifiTetherRequested;
Erik Klineea9cc482017-03-10 19:35:34 +09001305 }
1306 }
1307
Erik Kline00019f42016-06-30 19:31:46 +09001308 // Needed because the canonical source of upstream truth is just the
Remi NGUYEN VAN6c02f992018-03-09 14:07:18 +09001309 // upstream interface set, |mCurrentUpstreamIfaceSet|.
markchienb0aca962019-12-05 16:21:17 +08001310 private boolean pertainsToCurrentUpstream(UpstreamNetworkState ns) {
Remi NGUYEN VAN6c02f992018-03-09 14:07:18 +09001311 if (ns != null && ns.linkProperties != null && mCurrentUpstreamIfaceSet != null) {
Erik Kline00019f42016-06-30 19:31:46 +09001312 for (String ifname : ns.linkProperties.getAllInterfaceNames()) {
Remi NGUYEN VAN6c02f992018-03-09 14:07:18 +09001313 if (mCurrentUpstreamIfaceSet.ifnames.contains(ifname)) {
Erik Kline00019f42016-06-30 19:31:46 +09001314 return true;
Erik Kline6ff17f72015-12-10 20:42:12 +09001315 }
1316 }
Erik Kline6ff17f72015-12-10 20:42:12 +09001317 }
Erik Kline00019f42016-06-30 19:31:46 +09001318 return false;
Erik Kline6ff17f72015-12-10 20:42:12 +09001319 }
1320
Wink Saville64c42ca2011-04-18 14:55:10 -07001321 class TetherMasterSM extends StateMachine {
Erik Klineea9cc482017-03-10 19:35:34 +09001322 // an interface SM has requested Tethering/Local Hotspot
1323 static final int EVENT_IFACE_SERVING_STATE_ACTIVE = BASE_MASTER + 1;
1324 // an interface SM has unrequested Tethering/Local Hotspot
1325 static final int EVENT_IFACE_SERVING_STATE_INACTIVE = BASE_MASTER + 2;
Robert Greenwalt6a1967c2010-03-17 11:19:57 -07001326 // upstream connection change - do the right thing
Lorenzo Colitticd63d242016-04-10 15:39:53 +09001327 static final int CMD_UPSTREAM_CHANGED = BASE_MASTER + 3;
Robert Greenwalt6a1967c2010-03-17 11:19:57 -07001328 // we don't have a valid upstream conn, check again after a delay
Lorenzo Colitticd63d242016-04-10 15:39:53 +09001329 static final int CMD_RETRY_UPSTREAM = BASE_MASTER + 4;
Erik Kline6ff17f72015-12-10 20:42:12 +09001330 // Events from NetworkCallbacks that we process on the master state
1331 // machine thread on behalf of the UpstreamNetworkMonitor.
Erik Kline00019f42016-06-30 19:31:46 +09001332 static final int EVENT_UPSTREAM_CALLBACK = BASE_MASTER + 5;
Yohei, Oshima977aad52016-12-08 13:39:20 +09001333 // we treated the error and want now to clear it
1334 static final int CMD_CLEAR_ERROR = BASE_MASTER + 6;
Erik Kline6e9a1012017-06-06 19:24:21 +09001335 static final int EVENT_IFACE_UPDATE_LINKPROPERTIES = BASE_MASTER + 7;
markchien3b519632018-09-07 16:19:12 +08001336 // Events from EntitlementManager to choose upstream again.
1337 static final int EVENT_UPSTREAM_PERMISSION_CHANGED = BASE_MASTER + 8;
Erik Kline32179ff2017-07-04 18:28:11 +09001338 private final State mInitialState;
1339 private final State mTetherModeAliveState;
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001340
Erik Kline32179ff2017-07-04 18:28:11 +09001341 private final State mSetIpForwardingEnabledErrorState;
1342 private final State mSetIpForwardingDisabledErrorState;
1343 private final State mStartTetheringErrorState;
1344 private final State mStopTetheringErrorState;
1345 private final State mSetDnsForwardersErrorState;
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001346
Christopher Wileyd985dde2016-05-31 10:44:35 -07001347 // This list is a little subtle. It contains all the interfaces that currently are
1348 // requesting tethering, regardless of whether these interfaces are still members of
1349 // mTetherStates. This allows us to maintain the following predicates:
1350 //
1351 // 1) mTetherStates contains the set of all currently existing, tetherable, link state up
1352 // interfaces.
1353 // 2) mNotifyList contains all state machines that may have outstanding tethering state
1354 // that needs to be torn down.
1355 //
1356 // Because we excise interfaces immediately from mTetherStates, we must maintain mNotifyList
1357 // so that the garbage collector does not clean up the state machine before it has a chance
1358 // to tear itself down.
Erik Kline7a4ccc62018-08-27 17:26:47 +09001359 private final ArrayList<IpServer> mNotifyList;
Erik Kline1eb8c692016-07-08 17:21:26 +09001360 private final IPv6TetheringCoordinator mIPv6TetheringCoordinator;
Erik Klineed962a82017-07-06 19:49:35 +09001361 private final OffloadWrapper mOffload;
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001362
Robert Greenwalt6a1967c2010-03-17 11:19:57 -07001363 private static final int UPSTREAM_SETTLE_TIME_MS = 10000;
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001364
Remi NGUYEN VAN5d0dc452018-03-15 11:57:14 +09001365 TetherMasterSM(String name, Looper looper, TetheringDependencies deps) {
Robert Greenwaltdfadaea2010-03-11 15:03:08 -08001366 super(name, looper);
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001367
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001368 mInitialState = new InitialState();
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001369 mTetherModeAliveState = new TetherModeAliveState();
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001370 mSetIpForwardingEnabledErrorState = new SetIpForwardingEnabledErrorState();
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001371 mSetIpForwardingDisabledErrorState = new SetIpForwardingDisabledErrorState();
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001372 mStartTetheringErrorState = new StartTetheringErrorState();
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001373 mStopTetheringErrorState = new StopTetheringErrorState();
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001374 mSetDnsForwardersErrorState = new SetDnsForwardersErrorState();
Erik Kline1fdc2e22017-05-08 17:56:35 +09001375
1376 addState(mInitialState);
1377 addState(mTetherModeAliveState);
1378 addState(mSetIpForwardingEnabledErrorState);
1379 addState(mSetIpForwardingDisabledErrorState);
1380 addState(mStartTetheringErrorState);
1381 addState(mStopTetheringErrorState);
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001382 addState(mSetDnsForwardersErrorState);
1383
Mitchell Wills7040b4e2016-05-23 16:40:10 -07001384 mNotifyList = new ArrayList<>();
Remi NGUYEN VAN5d0dc452018-03-15 11:57:14 +09001385 mIPv6TetheringCoordinator = deps.getIPv6TetheringCoordinator(mNotifyList, mLog);
Erik Klineed962a82017-07-06 19:49:35 +09001386 mOffload = new OffloadWrapper();
Erik Kline32179ff2017-07-04 18:28:11 +09001387
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001388 setInitialState(mInitialState);
1389 }
1390
Erik Kline1fdc2e22017-05-08 17:56:35 +09001391 class InitialState extends State {
1392 @Override
1393 public boolean processMessage(Message message) {
Erik Kline22108902017-07-06 16:40:06 +09001394 logMessage(this, message.what);
Erik Kline1fdc2e22017-05-08 17:56:35 +09001395 switch (message.what) {
Erik Kline7a4ccc62018-08-27 17:26:47 +09001396 case EVENT_IFACE_SERVING_STATE_ACTIVE: {
1397 final IpServer who = (IpServer) message.obj;
Erik Kline1fdc2e22017-05-08 17:56:35 +09001398 if (VDBG) Log.d(TAG, "Tether Mode requested by " + who);
1399 handleInterfaceServingStateActive(message.arg1, who);
1400 transitionTo(mTetherModeAliveState);
1401 break;
Erik Kline7a4ccc62018-08-27 17:26:47 +09001402 }
1403 case EVENT_IFACE_SERVING_STATE_INACTIVE: {
1404 final IpServer who = (IpServer) message.obj;
Erik Kline1fdc2e22017-05-08 17:56:35 +09001405 if (VDBG) Log.d(TAG, "Tether Mode unrequested by " + who);
1406 handleInterfaceServingStateInactive(who);
1407 break;
Erik Kline7a4ccc62018-08-27 17:26:47 +09001408 }
Erik Kline6e9a1012017-06-06 19:24:21 +09001409 case EVENT_IFACE_UPDATE_LINKPROPERTIES:
1410 // Silently ignore these for now.
1411 break;
Erik Kline1fdc2e22017-05-08 17:56:35 +09001412 default:
1413 return NOT_HANDLED;
1414 }
1415 return HANDLED;
1416 }
1417 }
1418
Erik Kline3a5278f2017-06-24 19:29:10 +09001419 protected boolean turnOnMasterTetherSettings() {
1420 final TetheringConfiguration cfg = mConfig;
1421 try {
markchiena9d9ef82020-01-07 14:43:17 +08001422 mNetd.ipfwdEnableForwarding(TAG);
1423 } catch (RemoteException | ServiceSpecificException e) {
Erik Kline3a5278f2017-06-24 19:29:10 +09001424 mLog.e(e);
1425 transitionTo(mSetIpForwardingEnabledErrorState);
Robert Greenwaltd70a3d42010-02-23 18:15:29 -08001426 return false;
1427 }
markchiena9d9ef82020-01-07 14:43:17 +08001428
Erik Kline3a5278f2017-06-24 19:29:10 +09001429 // TODO: Randomize DHCPv4 ranges, especially in hotspot mode.
Remi NGUYEN VANe3bb5c52018-06-12 15:57:04 +09001430 // Legacy DHCP server is disabled if passed an empty ranges array
1431 final String[] dhcpRanges = cfg.enableLegacyDhcpServer
markchiena9d9ef82020-01-07 14:43:17 +08001432 ? cfg.legacyDhcpRanges : new String[0];
Erik Kline3a5278f2017-06-24 19:29:10 +09001433 try {
markchiena9d9ef82020-01-07 14:43:17 +08001434 NetdUtils.tetherStart(mNetd, true /** usingLegacyDnsProxy */, dhcpRanges);
1435 } catch (RemoteException | ServiceSpecificException e) {
Robert Greenwaltd70a3d42010-02-23 18:15:29 -08001436 try {
markchiena9d9ef82020-01-07 14:43:17 +08001437 // Stop and retry.
1438 mNetd.tetherStop();
1439 NetdUtils.tetherStart(mNetd, true /** usingLegacyDnsProxy */, dhcpRanges);
1440 } catch (RemoteException | ServiceSpecificException ee) {
Erik Kline3a5278f2017-06-24 19:29:10 +09001441 mLog.e(ee);
1442 transitionTo(mStartTetheringErrorState);
Robert Greenwaltd70a3d42010-02-23 18:15:29 -08001443 return false;
1444 }
Robert Greenwaltd70a3d42010-02-23 18:15:29 -08001445 }
Erik Kline3a5278f2017-06-24 19:29:10 +09001446 mLog.log("SET master tether settings: ON");
1447 return true;
1448 }
Robert Greenwalt10398722010-12-17 15:20:36 -08001449
Erik Kline3a5278f2017-06-24 19:29:10 +09001450 protected boolean turnOffMasterTetherSettings() {
1451 try {
markchiena9d9ef82020-01-07 14:43:17 +08001452 mNetd.tetherStop();
1453 } catch (RemoteException | ServiceSpecificException e) {
Erik Kline3a5278f2017-06-24 19:29:10 +09001454 mLog.e(e);
1455 transitionTo(mStopTetheringErrorState);
1456 return false;
Erik Kline14f7faf2017-02-14 19:03:09 +09001457 }
Erik Kline3a5278f2017-06-24 19:29:10 +09001458 try {
markchiena9d9ef82020-01-07 14:43:17 +08001459 mNetd.ipfwdDisableForwarding(TAG);
1460 } catch (RemoteException | ServiceSpecificException e) {
Erik Kline3a5278f2017-06-24 19:29:10 +09001461 mLog.e(e);
1462 transitionTo(mSetIpForwardingDisabledErrorState);
1463 return false;
1464 }
1465 transitionTo(mInitialState);
1466 mLog.log("SET master tether settings: OFF");
1467 return true;
1468 }
Erik Kline14f7faf2017-02-14 19:03:09 +09001469
Erik Kline3a5278f2017-06-24 19:29:10 +09001470 protected void chooseUpstreamType(boolean tryCell) {
Erik Kline6ee73da2017-07-08 20:36:37 +09001471 // We rebuild configuration on ACTION_CONFIGURATION_CHANGED, but we
1472 // do not currently know how to watch for changes in DUN settings.
markchien3394e142019-04-09 15:53:24 +08001473 maybeDunSettingChanged();
Erik Kline1e2897d2017-06-09 17:08:52 +09001474
Erik Kline72302902018-06-14 17:36:40 +09001475 final TetheringConfiguration config = mConfig;
markchienb0aca962019-12-05 16:21:17 +08001476 final UpstreamNetworkState ns = (config.chooseUpstreamAutomatically)
Erik Kline72302902018-06-14 17:36:40 +09001477 ? mUpstreamNetworkMonitor.getCurrentPreferredUpstream()
1478 : mUpstreamNetworkMonitor.selectPreferredUpstreamType(
1479 config.preferredUpstreamIfaceTypes);
Erik Kline3a5278f2017-06-24 19:29:10 +09001480 if (ns == null) {
1481 if (tryCell) {
1482 mUpstreamNetworkMonitor.registerMobileNetworkRequest();
1483 // We think mobile should be coming up; don't set a retry.
1484 } else {
1485 sendMessageDelayed(CMD_RETRY_UPSTREAM, UPSTREAM_SETTLE_TIME_MS);
Erik Kline1e2897d2017-06-09 17:08:52 +09001486 }
Erik Kline3a5278f2017-06-24 19:29:10 +09001487 }
1488 setUpstreamNetwork(ns);
markchien26299ed2019-02-27 14:56:11 +08001489 final Network newUpstream = (ns != null) ? ns.network : null;
1490 if (mTetherUpstream != newUpstream) {
1491 mTetherUpstream = newUpstream;
1492 mUpstreamNetworkMonitor.setCurrentUpstream(mTetherUpstream);
Chalard Jeanc0fc2762020-04-17 17:12:44 +00001493 reportUpstreamChanged(ns);
markchien26299ed2019-02-27 14:56:11 +08001494 }
Erik Kline3a5278f2017-06-24 19:29:10 +09001495 }
1496
markchienb0aca962019-12-05 16:21:17 +08001497 protected void setUpstreamNetwork(UpstreamNetworkState ns) {
Remi NGUYEN VAN6c02f992018-03-09 14:07:18 +09001498 InterfaceSet ifaces = null;
Erik Klinee8bdb402018-02-23 14:16:06 -08001499 if (ns != null) {
Erik Kline3a5278f2017-06-24 19:29:10 +09001500 // Find the interface with the default IPv4 route. It may be the
1501 // interface described by linkProperties, or one of the interfaces
1502 // stacked on top of it.
Erik Klinee8bdb402018-02-23 14:16:06 -08001503 mLog.i("Looking for default routes on: " + ns.linkProperties);
Remi NGUYEN VAN6c02f992018-03-09 14:07:18 +09001504 ifaces = TetheringInterfaceUtils.getTetheringInterfaces(ns);
1505 mLog.i("Found upstream interface(s): " + ifaces);
Robert Greenwalt6a1967c2010-03-17 11:19:57 -07001506 }
Robert Greenwaltccf83af12011-06-02 17:30:47 -07001507
Remi NGUYEN VAN6c02f992018-03-09 14:07:18 +09001508 if (ifaces != null) {
Erik Kline3a5278f2017-06-24 19:29:10 +09001509 setDnsForwarders(ns.network, ns.linkProperties);
Erik Kline6ff17f72015-12-10 20:42:12 +09001510 }
Remi NGUYEN VAN6c02f992018-03-09 14:07:18 +09001511 notifyDownstreamsOfNewUpstreamIface(ifaces);
Erik Kline3a5278f2017-06-24 19:29:10 +09001512 if (ns != null && pertainsToCurrentUpstream(ns)) {
markchienb0aca962019-12-05 16:21:17 +08001513 // If we already have UpstreamNetworkState for this network update it immediately.
Erik Kline3a5278f2017-06-24 19:29:10 +09001514 handleNewUpstreamNetworkState(ns);
Remi NGUYEN VAN6c02f992018-03-09 14:07:18 +09001515 } else if (mCurrentUpstreamIfaceSet == null) {
1516 // There are no available upstream networks.
Erik Kline3a5278f2017-06-24 19:29:10 +09001517 handleNewUpstreamNetworkState(null);
1518 }
1519 }
Erik Kline6ff17f72015-12-10 20:42:12 +09001520
Erik Kline3a5278f2017-06-24 19:29:10 +09001521 protected void setDnsForwarders(final Network network, final LinkProperties lp) {
1522 // TODO: Set v4 and/or v6 DNS per available connectivity.
Erik Kline3a5278f2017-06-24 19:29:10 +09001523 final Collection<InetAddress> dnses = lp.getDnsServers();
1524 // TODO: Properly support the absence of DNS servers.
markchien87d3f7d2020-01-08 20:58:23 +08001525 final String[] dnsServers;
Erik Kline3a5278f2017-06-24 19:29:10 +09001526 if (dnses != null && !dnses.isEmpty()) {
markchien87d3f7d2020-01-08 20:58:23 +08001527 dnsServers = new String[dnses.size()];
1528 int i = 0;
1529 for (InetAddress dns : dnses) {
1530 dnsServers[i++] = dns.getHostAddress();
1531 }
1532 } else {
1533 dnsServers = mConfig.defaultIPv4DNS;
Robert Greenwalt6a1967c2010-03-17 11:19:57 -07001534 }
markchien587ecb32020-03-18 08:43:07 +08001535 final int netId = (network != null) ? network.getNetId() : NETID_UNSET;
Erik Kline3a5278f2017-06-24 19:29:10 +09001536 try {
markchiena9d9ef82020-01-07 14:43:17 +08001537 mNetd.tetherDnsSet(netId, dnsServers);
Erik Kline3a5278f2017-06-24 19:29:10 +09001538 mLog.log(String.format(
1539 "SET DNS forwarders: network=%s dnsServers=%s",
1540 network, Arrays.toString(dnsServers)));
markchiena9d9ef82020-01-07 14:43:17 +08001541 } catch (RemoteException | ServiceSpecificException e) {
Erik Kline3a5278f2017-06-24 19:29:10 +09001542 // TODO: Investigate how this can fail and what exactly
1543 // happens if/when such failures occur.
1544 mLog.e("setting DNS forwarders failed, " + e);
1545 transitionTo(mSetDnsForwardersErrorState);
1546 }
1547 }
Erik Kline00019f42016-06-30 19:31:46 +09001548
Remi NGUYEN VAN6c02f992018-03-09 14:07:18 +09001549 protected void notifyDownstreamsOfNewUpstreamIface(InterfaceSet ifaces) {
1550 mCurrentUpstreamIfaceSet = ifaces;
Erik Kline7a4ccc62018-08-27 17:26:47 +09001551 for (IpServer ipServer : mNotifyList) {
1552 ipServer.sendMessage(IpServer.CMD_TETHER_CONNECTION_CHANGED, ifaces);
Erik Kline00019f42016-06-30 19:31:46 +09001553 }
Robert Greenwaltd70a3d42010-02-23 18:15:29 -08001554 }
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001555
markchienb0aca962019-12-05 16:21:17 +08001556 protected void handleNewUpstreamNetworkState(UpstreamNetworkState ns) {
Erik Kline3a5278f2017-06-24 19:29:10 +09001557 mIPv6TetheringCoordinator.updateUpstreamNetworkState(ns);
Erik Klineed962a82017-07-06 19:49:35 +09001558 mOffload.updateUpstreamNetworkState(ns);
Erik Kline3a5278f2017-06-24 19:29:10 +09001559 }
1560
Erik Kline7a4ccc62018-08-27 17:26:47 +09001561 private void handleInterfaceServingStateActive(int mode, IpServer who) {
Erik Klineea9cc482017-03-10 19:35:34 +09001562 if (mNotifyList.indexOf(who) < 0) {
1563 mNotifyList.add(who);
1564 mIPv6TetheringCoordinator.addActiveDownstream(who, mode);
1565 }
1566
Erik Kline7a4ccc62018-08-27 17:26:47 +09001567 if (mode == IpServer.STATE_TETHERED) {
Erik Klineed962a82017-07-06 19:49:35 +09001568 // No need to notify OffloadController just yet as there are no
1569 // "offload-able" prefixes to pass along. This will handled
1570 // when the TISM informs Tethering of its LinkProperties.
Erik Klineea9cc482017-03-10 19:35:34 +09001571 mForwardedDownstreams.add(who);
1572 } else {
Erik Klineed962a82017-07-06 19:49:35 +09001573 mOffload.excludeDownstreamInterface(who.interfaceName());
Erik Klineea9cc482017-03-10 19:35:34 +09001574 mForwardedDownstreams.remove(who);
1575 }
Erik Kline216af6d2017-04-27 20:57:23 +09001576
1577 // If this is a Wi-Fi interface, notify WifiManager of the active serving state.
Erik Kline7a26ba32018-03-09 14:18:02 +09001578 if (who.interfaceType() == TETHERING_WIFI) {
Erik Kline216af6d2017-04-27 20:57:23 +09001579 final WifiManager mgr = getWifiManager();
1580 final String iface = who.interfaceName();
1581 switch (mode) {
Erik Kline7a4ccc62018-08-27 17:26:47 +09001582 case IpServer.STATE_TETHERED:
Erik Kline2efb8272017-05-31 15:53:53 +09001583 mgr.updateInterfaceIpState(iface, IFACE_IP_MODE_TETHERED);
Erik Kline216af6d2017-04-27 20:57:23 +09001584 break;
Erik Kline7a4ccc62018-08-27 17:26:47 +09001585 case IpServer.STATE_LOCAL_ONLY:
Erik Kline2efb8272017-05-31 15:53:53 +09001586 mgr.updateInterfaceIpState(iface, IFACE_IP_MODE_LOCAL_ONLY);
Erik Kline216af6d2017-04-27 20:57:23 +09001587 break;
1588 default:
1589 Log.wtf(TAG, "Unknown active serving mode: " + mode);
1590 break;
1591 }
1592 }
Erik Klineea9cc482017-03-10 19:35:34 +09001593 }
1594
Erik Kline7a4ccc62018-08-27 17:26:47 +09001595 private void handleInterfaceServingStateInactive(IpServer who) {
Erik Klineea9cc482017-03-10 19:35:34 +09001596 mNotifyList.remove(who);
1597 mIPv6TetheringCoordinator.removeActiveDownstream(who);
Erik Klineed962a82017-07-06 19:49:35 +09001598 mOffload.excludeDownstreamInterface(who.interfaceName());
Erik Klineea9cc482017-03-10 19:35:34 +09001599 mForwardedDownstreams.remove(who);
Treehugger Robot25067812020-03-25 15:32:41 +00001600 updateConnectedClients(null /* wifiClients */);
Erik Kline216af6d2017-04-27 20:57:23 +09001601
Jianpeng Lia70feec2019-05-24 17:40:15 +09001602 // If this is a Wi-Fi interface, tell WifiManager of any errors
1603 // or the inactive serving state.
Erik Kline7a26ba32018-03-09 14:18:02 +09001604 if (who.interfaceType() == TETHERING_WIFI) {
1605 if (who.lastError() != TETHER_ERROR_NO_ERROR) {
Erik Kline216af6d2017-04-27 20:57:23 +09001606 getWifiManager().updateInterfaceIpState(
Erik Kline2efb8272017-05-31 15:53:53 +09001607 who.interfaceName(), IFACE_IP_MODE_CONFIGURATION_ERROR);
Jianpeng Lia70feec2019-05-24 17:40:15 +09001608 } else {
1609 getWifiManager().updateInterfaceIpState(
1610 who.interfaceName(), IFACE_IP_MODE_UNSPECIFIED);
Erik Kline216af6d2017-04-27 20:57:23 +09001611 }
1612 }
Erik Klineea9cc482017-03-10 19:35:34 +09001613 }
1614
Chalard Jeanc0fc2762020-04-17 17:12:44 +00001615 @VisibleForTesting
1616 void handleUpstreamNetworkMonitorCallback(int arg1, Object o) {
Erik Kline32179ff2017-07-04 18:28:11 +09001617 if (arg1 == UpstreamNetworkMonitor.NOTIFY_LOCAL_PREFIXES) {
Erik Klineed962a82017-07-06 19:49:35 +09001618 mOffload.sendOffloadExemptPrefixes((Set<IpPrefix>) o);
Erik Kline3a5278f2017-06-24 19:29:10 +09001619 return;
1620 }
1621
markchienb0aca962019-12-05 16:21:17 +08001622 final UpstreamNetworkState ns = (UpstreamNetworkState) o;
Erik Kline3a5278f2017-06-24 19:29:10 +09001623
1624 if (ns == null || !pertainsToCurrentUpstream(ns)) {
1625 // TODO: In future, this is where upstream evaluation and selection
1626 // could be handled for notifications which include sufficient data.
1627 // For example, after CONNECTIVITY_ACTION listening is removed, here
1628 // is where we could observe a Wi-Fi network becoming available and
1629 // passing validation.
Remi NGUYEN VAN6c02f992018-03-09 14:07:18 +09001630 if (mCurrentUpstreamIfaceSet == null) {
Erik Kline3a5278f2017-06-24 19:29:10 +09001631 // If we have no upstream interface, try to run through upstream
1632 // selection again. If, for example, IPv4 connectivity has shown up
1633 // after IPv6 (e.g., 464xlat became available) we want the chance to
1634 // notice and act accordingly.
1635 chooseUpstreamType(false);
1636 }
1637 return;
1638 }
1639
1640 switch (arg1) {
Erik Kline3a5278f2017-06-24 19:29:10 +09001641 case UpstreamNetworkMonitor.EVENT_ON_CAPABILITIES:
Chalard Jeanc0fc2762020-04-17 17:12:44 +00001642 if (ns.network.equals(mTetherUpstream)) {
1643 mNotificationUpdater.onUpstreamCapabilitiesChanged(ns.networkCapabilities);
1644 }
Erik Kline3a5278f2017-06-24 19:29:10 +09001645 handleNewUpstreamNetworkState(ns);
1646 break;
1647 case UpstreamNetworkMonitor.EVENT_ON_LINKPROPERTIES:
Remi NGUYEN VAN6c02f992018-03-09 14:07:18 +09001648 chooseUpstreamType(false);
Erik Kline3a5278f2017-06-24 19:29:10 +09001649 break;
1650 case UpstreamNetworkMonitor.EVENT_ON_LOST:
1651 // TODO: Re-evaluate possible upstreams. Currently upstream
1652 // reevaluation is triggered via received CONNECTIVITY_ACTION
1653 // broadcasts that result in being passed a
1654 // TetherMasterSM.CMD_UPSTREAM_CHANGED.
1655 handleNewUpstreamNetworkState(null);
1656 break;
1657 default:
1658 mLog.e("Unknown arg1 value: " + arg1);
1659 break;
1660 }
1661 }
1662
1663 class TetherModeAliveState extends State {
Erik Klineea9cc482017-03-10 19:35:34 +09001664 boolean mUpstreamWanted = false;
Erik Kline6ff17f72015-12-10 20:42:12 +09001665 boolean mTryCell = true;
Erik Klinee0cce212017-03-06 14:05:23 +09001666
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001667 @Override
1668 public void enter() {
Erik Kline1fdc2e22017-05-08 17:56:35 +09001669 // If turning on master tether settings fails, we have already
1670 // transitioned to an error state; exit early.
1671 if (!turnOnMasterTetherSettings()) {
1672 return;
1673 }
1674
markchiena6c72872018-11-13 18:34:56 +09001675 mUpstreamNetworkMonitor.startObserveAllNetworks();
Robert Greenwalt4f74d552011-12-19 16:59:31 -08001676
Erik Klinef4b6e342017-04-25 19:19:59 +09001677 // TODO: De-duplicate with updateUpstreamWanted() below.
Erik Klineea9cc482017-03-10 19:35:34 +09001678 if (upstreamWanted()) {
1679 mUpstreamWanted = true;
Erik Klineed962a82017-07-06 19:49:35 +09001680 mOffload.start();
Erik Klineea9cc482017-03-10 19:35:34 +09001681 chooseUpstreamType(true);
1682 mTryCell = false;
1683 }
Robert Greenwalt6a1967c2010-03-17 11:19:57 -07001684 }
Erik Klinefa37b2f2016-08-02 18:27:03 +09001685
Robert Greenwalt6a1967c2010-03-17 11:19:57 -07001686 @Override
1687 public void exit() {
Erik Klineed962a82017-07-06 19:49:35 +09001688 mOffload.stop();
Erik Kline6ff17f72015-12-10 20:42:12 +09001689 mUpstreamNetworkMonitor.stop();
Erik Kline22108902017-07-06 16:40:06 +09001690 notifyDownstreamsOfNewUpstreamIface(null);
Erik Klinefa37b2f2016-08-02 18:27:03 +09001691 handleNewUpstreamNetworkState(null);
markchien26299ed2019-02-27 14:56:11 +08001692 if (mTetherUpstream != null) {
1693 mTetherUpstream = null;
1694 reportUpstreamChanged(null);
1695 }
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001696 }
Erik Klinefa37b2f2016-08-02 18:27:03 +09001697
Erik Klineea9cc482017-03-10 19:35:34 +09001698 private boolean updateUpstreamWanted() {
1699 final boolean previousUpstreamWanted = mUpstreamWanted;
1700 mUpstreamWanted = upstreamWanted();
Erik Klinef4b6e342017-04-25 19:19:59 +09001701 if (mUpstreamWanted != previousUpstreamWanted) {
1702 if (mUpstreamWanted) {
Erik Klineed962a82017-07-06 19:49:35 +09001703 mOffload.start();
Erik Klinef4b6e342017-04-25 19:19:59 +09001704 } else {
Erik Klineed962a82017-07-06 19:49:35 +09001705 mOffload.stop();
Erik Klinef4b6e342017-04-25 19:19:59 +09001706 }
1707 }
Erik Klineea9cc482017-03-10 19:35:34 +09001708 return previousUpstreamWanted;
1709 }
1710
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001711 @Override
1712 public boolean processMessage(Message message) {
Erik Kline22108902017-07-06 16:40:06 +09001713 logMessage(this, message.what);
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001714 boolean retValue = true;
1715 switch (message.what) {
Erik Klineea9cc482017-03-10 19:35:34 +09001716 case EVENT_IFACE_SERVING_STATE_ACTIVE: {
Erik Kline7a4ccc62018-08-27 17:26:47 +09001717 IpServer who = (IpServer) message.obj;
Robert Greenwalt68ea9b02012-05-10 16:58:16 -07001718 if (VDBG) Log.d(TAG, "Tether Mode requested by " + who);
Erik Klineea9cc482017-03-10 19:35:34 +09001719 handleInterfaceServingStateActive(message.arg1, who);
Erik Kline7a4ccc62018-08-27 17:26:47 +09001720 who.sendMessage(IpServer.CMD_TETHER_CONNECTION_CHANGED,
Remi NGUYEN VAN6c02f992018-03-09 14:07:18 +09001721 mCurrentUpstreamIfaceSet);
Erik Klineea9cc482017-03-10 19:35:34 +09001722 // If there has been a change and an upstream is now
1723 // desired, kick off the selection process.
1724 final boolean previousUpstreamWanted = updateUpstreamWanted();
1725 if (!previousUpstreamWanted && mUpstreamWanted) {
1726 chooseUpstreamType(true);
1727 }
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001728 break;
Erik Kline6e29bf02016-08-15 16:16:18 +09001729 }
Erik Klineea9cc482017-03-10 19:35:34 +09001730 case EVENT_IFACE_SERVING_STATE_INACTIVE: {
Erik Kline7a4ccc62018-08-27 17:26:47 +09001731 IpServer who = (IpServer) message.obj;
Robert Greenwalt68ea9b02012-05-10 16:58:16 -07001732 if (VDBG) Log.d(TAG, "Tether Mode unrequested by " + who);
Erik Klineea9cc482017-03-10 19:35:34 +09001733 handleInterfaceServingStateInactive(who);
1734
1735 if (mNotifyList.isEmpty()) {
Erik Kline47222fc2017-04-30 19:36:15 +09001736 // This transitions us out of TetherModeAliveState,
1737 // either to InitialState or an error state.
Erik Kline1fdc2e22017-05-08 17:56:35 +09001738 turnOffMasterTetherSettings();
1739 break;
1740 }
1741
1742 if (DBG) {
markchien0f63ca62019-09-30 14:40:57 +08001743 Log.d(TAG, "TetherModeAlive still has " + mNotifyList.size()
1744 + " live requests:");
Erik Kline7a4ccc62018-08-27 17:26:47 +09001745 for (IpServer o : mNotifyList) {
Erik Kline1fdc2e22017-05-08 17:56:35 +09001746 Log.d(TAG, " " + o);
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001747 }
1748 }
Erik Klineea9cc482017-03-10 19:35:34 +09001749 // If there has been a change and an upstream is no
1750 // longer desired, release any mobile requests.
1751 final boolean previousUpstreamWanted = updateUpstreamWanted();
1752 if (previousUpstreamWanted && !mUpstreamWanted) {
1753 mUpstreamNetworkMonitor.releaseMobileNetworkRequest();
1754 }
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001755 break;
Erik Kline6e29bf02016-08-15 16:16:18 +09001756 }
Erik Kline6e9a1012017-06-06 19:24:21 +09001757 case EVENT_IFACE_UPDATE_LINKPROPERTIES: {
1758 final LinkProperties newLp = (LinkProperties) message.obj;
Erik Kline7a4ccc62018-08-27 17:26:47 +09001759 if (message.arg1 == IpServer.STATE_TETHERED) {
Erik Klineed962a82017-07-06 19:49:35 +09001760 mOffload.updateDownstreamLinkProperties(newLp);
Erik Kline6e9a1012017-06-06 19:24:21 +09001761 } else {
Erik Klineed962a82017-07-06 19:49:35 +09001762 mOffload.excludeDownstreamInterface(newLp.getInterfaceName());
Erik Kline6e9a1012017-06-06 19:24:21 +09001763 }
1764 break;
1765 }
markchien3b519632018-09-07 16:19:12 +08001766 case EVENT_UPSTREAM_PERMISSION_CHANGED:
Robert Greenwalt6a1967c2010-03-17 11:19:57 -07001767 case CMD_UPSTREAM_CHANGED:
Erik Klineea9cc482017-03-10 19:35:34 +09001768 updateUpstreamWanted();
1769 if (!mUpstreamWanted) break;
1770
Erik Klinefb413432017-02-14 18:26:04 +09001771 // Need to try DUN immediately if Wi-Fi goes down.
1772 chooseUpstreamType(true);
1773 mTryCell = false;
Robert Greenwalt6a1967c2010-03-17 11:19:57 -07001774 break;
Kazuhiro Ondo01758e82011-04-30 20:10:57 -05001775 case CMD_RETRY_UPSTREAM:
Erik Klineea9cc482017-03-10 19:35:34 +09001776 updateUpstreamWanted();
1777 if (!mUpstreamWanted) break;
1778
Kazuhiro Ondo01758e82011-04-30 20:10:57 -05001779 chooseUpstreamType(mTryCell);
1780 mTryCell = !mTryCell;
1781 break;
Erik Kline00019f42016-06-30 19:31:46 +09001782 case EVENT_UPSTREAM_CALLBACK: {
Erik Klineea9cc482017-03-10 19:35:34 +09001783 updateUpstreamWanted();
Erik Kline3a5278f2017-06-24 19:29:10 +09001784 if (mUpstreamWanted) {
1785 handleUpstreamNetworkMonitorCallback(message.arg1, message.obj);
Erik Kline6ff17f72015-12-10 20:42:12 +09001786 }
1787 break;
Erik Kline00019f42016-06-30 19:31:46 +09001788 }
Kazuhiro Ondo01758e82011-04-30 20:10:57 -05001789 default:
1790 retValue = false;
1791 break;
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001792 }
1793 return retValue;
1794 }
1795 }
1796
Wink Saville64c42ca2011-04-18 14:55:10 -07001797 class ErrorState extends State {
Erik Kline8351faa2017-04-17 16:47:23 +09001798 private int mErrorNotification;
1799
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001800 @Override
1801 public boolean processMessage(Message message) {
1802 boolean retValue = true;
1803 switch (message.what) {
Erik Klineea9cc482017-03-10 19:35:34 +09001804 case EVENT_IFACE_SERVING_STATE_ACTIVE:
Erik Kline7a4ccc62018-08-27 17:26:47 +09001805 IpServer who = (IpServer) message.obj;
Robert Greenwalt6a1967c2010-03-17 11:19:57 -07001806 who.sendMessage(mErrorNotification);
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001807 break;
Yohei, Oshima977aad52016-12-08 13:39:20 +09001808 case CMD_CLEAR_ERROR:
Erik Kline7a26ba32018-03-09 14:18:02 +09001809 mErrorNotification = TETHER_ERROR_NO_ERROR;
Yohei, Oshima977aad52016-12-08 13:39:20 +09001810 transitionTo(mInitialState);
1811 break;
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001812 default:
markchien0f63ca62019-09-30 14:40:57 +08001813 retValue = false;
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001814 }
1815 return retValue;
1816 }
Erik Kline8351faa2017-04-17 16:47:23 +09001817
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001818 void notify(int msgType) {
1819 mErrorNotification = msgType;
Erik Kline7a4ccc62018-08-27 17:26:47 +09001820 for (IpServer ipServer : mNotifyList) {
1821 ipServer.sendMessage(msgType);
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001822 }
1823 }
1824
1825 }
Erik Kline8351faa2017-04-17 16:47:23 +09001826
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001827 class SetIpForwardingEnabledErrorState extends ErrorState {
1828 @Override
1829 public void enter() {
1830 Log.e(TAG, "Error in setIpForwardingEnabled");
Erik Kline7a4ccc62018-08-27 17:26:47 +09001831 notify(IpServer.CMD_IP_FORWARDING_ENABLE_ERROR);
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001832 }
1833 }
1834
1835 class SetIpForwardingDisabledErrorState extends ErrorState {
1836 @Override
1837 public void enter() {
1838 Log.e(TAG, "Error in setIpForwardingDisabled");
Erik Kline7a4ccc62018-08-27 17:26:47 +09001839 notify(IpServer.CMD_IP_FORWARDING_DISABLE_ERROR);
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001840 }
1841 }
1842
1843 class StartTetheringErrorState extends ErrorState {
1844 @Override
1845 public void enter() {
1846 Log.e(TAG, "Error in startTethering");
Erik Kline7a4ccc62018-08-27 17:26:47 +09001847 notify(IpServer.CMD_START_TETHERING_ERROR);
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001848 try {
markchiena9d9ef82020-01-07 14:43:17 +08001849 mNetd.ipfwdDisableForwarding(TAG);
1850 } catch (RemoteException | ServiceSpecificException e) { }
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001851 }
1852 }
1853
1854 class StopTetheringErrorState extends ErrorState {
1855 @Override
1856 public void enter() {
1857 Log.e(TAG, "Error in stopTethering");
Erik Kline7a4ccc62018-08-27 17:26:47 +09001858 notify(IpServer.CMD_STOP_TETHERING_ERROR);
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001859 try {
markchiena9d9ef82020-01-07 14:43:17 +08001860 mNetd.ipfwdDisableForwarding(TAG);
1861 } catch (RemoteException | ServiceSpecificException e) { }
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001862 }
1863 }
1864
1865 class SetDnsForwardersErrorState extends ErrorState {
1866 @Override
1867 public void enter() {
1868 Log.e(TAG, "Error in setDnsForwarders");
Erik Kline7a4ccc62018-08-27 17:26:47 +09001869 notify(IpServer.CMD_SET_DNS_FORWARDERS_ERROR);
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001870 try {
markchiena9d9ef82020-01-07 14:43:17 +08001871 mNetd.tetherStop();
1872 } catch (RemoteException | ServiceSpecificException e) { }
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001873 try {
markchiena9d9ef82020-01-07 14:43:17 +08001874 mNetd.ipfwdDisableForwarding(TAG);
1875 } catch (RemoteException | ServiceSpecificException e) { }
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001876 }
1877 }
Erik Klineed962a82017-07-06 19:49:35 +09001878
1879 // A wrapper class to handle multiple situations where several calls to
1880 // the OffloadController need to happen together.
1881 //
1882 // TODO: This suggests that the interface between OffloadController and
1883 // Tethering is in need of improvement. Refactor these calls into the
1884 // OffloadController implementation.
1885 class OffloadWrapper {
1886 public void start() {
Automerger Merge Workerc22ab7b2020-03-09 04:07:07 +00001887 final int status = mOffloadController.start() ? TETHER_HARDWARE_OFFLOAD_STARTED
1888 : TETHER_HARDWARE_OFFLOAD_FAILED;
1889 updateOffloadStatus(status);
Erik Klineed962a82017-07-06 19:49:35 +09001890 sendOffloadExemptPrefixes();
1891 }
1892
1893 public void stop() {
1894 mOffloadController.stop();
Automerger Merge Workerc22ab7b2020-03-09 04:07:07 +00001895 updateOffloadStatus(TETHER_HARDWARE_OFFLOAD_STOPPED);
Erik Klineed962a82017-07-06 19:49:35 +09001896 }
1897
markchienb0aca962019-12-05 16:21:17 +08001898 public void updateUpstreamNetworkState(UpstreamNetworkState ns) {
Erik Klineed962a82017-07-06 19:49:35 +09001899 mOffloadController.setUpstreamLinkProperties(
1900 (ns != null) ? ns.linkProperties : null);
1901 }
1902
1903 public void updateDownstreamLinkProperties(LinkProperties newLp) {
1904 // Update the list of offload-exempt prefixes before adding
1905 // new prefixes on downstream interfaces to the offload HAL.
1906 sendOffloadExemptPrefixes();
1907 mOffloadController.notifyDownstreamLinkProperties(newLp);
1908 }
1909
1910 public void excludeDownstreamInterface(String ifname) {
1911 // This and other interfaces may be in local-only hotspot mode;
1912 // resend all local prefixes to the OffloadController.
1913 sendOffloadExemptPrefixes();
1914 mOffloadController.removeDownstreamInterface(ifname);
1915 }
1916
1917 public void sendOffloadExemptPrefixes() {
1918 sendOffloadExemptPrefixes(mUpstreamNetworkMonitor.getLocalPrefixes());
1919 }
1920
1921 public void sendOffloadExemptPrefixes(final Set<IpPrefix> localPrefixes) {
1922 // Add in well-known minimum set.
1923 PrefixUtils.addNonForwardablePrefixes(localPrefixes);
1924 // Add tragically hardcoded prefixes.
1925 localPrefixes.add(PrefixUtils.DEFAULT_WIFI_P2P_PREFIX);
1926
1927 // Maybe add prefixes or addresses for downstreams, depending on
1928 // the IP serving mode of each.
Erik Kline7a4ccc62018-08-27 17:26:47 +09001929 for (IpServer ipServer : mNotifyList) {
1930 final LinkProperties lp = ipServer.linkProperties();
Erik Klineed962a82017-07-06 19:49:35 +09001931
Erik Kline7a4ccc62018-08-27 17:26:47 +09001932 switch (ipServer.servingMode()) {
1933 case IpServer.STATE_UNAVAILABLE:
1934 case IpServer.STATE_AVAILABLE:
Erik Klineed962a82017-07-06 19:49:35 +09001935 // No usable LinkProperties in these states.
1936 continue;
Erik Kline7a4ccc62018-08-27 17:26:47 +09001937 case IpServer.STATE_TETHERED:
Erik Klineed962a82017-07-06 19:49:35 +09001938 // Only add IPv4 /32 and IPv6 /128 prefixes. The
1939 // directly-connected prefixes will be sent as
1940 // downstream "offload-able" prefixes.
1941 for (LinkAddress addr : lp.getAllLinkAddresses()) {
1942 final InetAddress ip = addr.getAddress();
1943 if (ip.isLinkLocalAddress()) continue;
1944 localPrefixes.add(PrefixUtils.ipAddressAsPrefix(ip));
1945 }
1946 break;
Erik Kline7a4ccc62018-08-27 17:26:47 +09001947 case IpServer.STATE_LOCAL_ONLY:
Erik Klineed962a82017-07-06 19:49:35 +09001948 // Add prefixes covering all local IPs.
1949 localPrefixes.addAll(PrefixUtils.localPrefixesFrom(lp));
1950 break;
1951 }
1952 }
1953
1954 mOffloadController.setLocalPrefixes(localPrefixes);
1955 }
Automerger Merge Workerc22ab7b2020-03-09 04:07:07 +00001956
1957 private void updateOffloadStatus(final int newStatus) {
1958 if (newStatus == mOffloadStatus) return;
1959
1960 mOffloadStatus = newStatus;
1961 reportOffloadStatusChanged(mOffloadStatus);
1962 }
Erik Klineed962a82017-07-06 19:49:35 +09001963 }
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001964 }
1965
markchien0f63ca62019-09-30 14:40:57 +08001966 private void startTrackDefaultNetwork() {
markchien3b519632018-09-07 16:19:12 +08001967 mUpstreamNetworkMonitor.startTrackDefaultNetwork(mDeps.getDefaultNetworkRequest(),
1968 mEntitlementMgr);
markchiena6c72872018-11-13 18:34:56 +09001969 }
1970
markchienf2731272019-01-16 17:44:13 +08001971 /** Get the latest value of the tethering entitlement check. */
markchien0f63ca62019-09-30 14:40:57 +08001972 void requestLatestTetheringEntitlementResult(int type, ResultReceiver receiver,
markchienf2731272019-01-16 17:44:13 +08001973 boolean showEntitlementUi) {
Mark Chien3075fbb2020-04-16 02:47:22 +00001974 if (receiver == null) return;
1975
1976 mHandler.post(() -> {
markchien0f63ca62019-09-30 14:40:57 +08001977 mEntitlementMgr.requestLatestTetheringEntitlementResult(type, receiver,
1978 showEntitlementUi);
Mark Chien3075fbb2020-04-16 02:47:22 +00001979 });
markchienf2731272019-01-16 17:44:13 +08001980 }
1981
markchien26299ed2019-02-27 14:56:11 +08001982 /** Register tethering event callback */
markchienae8aa642019-12-16 20:15:20 +08001983 void registerTetheringEventCallback(ITetheringEventCallback callback) {
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +09001984 final boolean hasListPermission =
Chiachang Wang96ca8e92020-02-21 17:50:18 +08001985 hasCallingPermission(NETWORK_SETTINGS)
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +09001986 || hasCallingPermission(PERMISSION_MAINLINE_NETWORK_STACK)
Chiachang Wang96ca8e92020-02-21 17:50:18 +08001987 || hasCallingPermission(NETWORK_STACK);
markchien26299ed2019-02-27 14:56:11 +08001988 mHandler.post(() -> {
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +09001989 mTetheringEventCallbacks.register(callback, new CallbackCookie(hasListPermission));
markchien40898ca2020-01-21 13:11:06 +08001990 final TetheringCallbackStartedParcel parcel = new TetheringCallbackStartedParcel();
1991 parcel.tetheringSupported = mDeps.isTetheringSupported();
1992 parcel.upstreamNetwork = mTetherUpstream;
1993 parcel.config = mConfig.toStableParcelable();
markchienfaa37282020-02-06 14:34:08 +08001994 parcel.states =
1995 mTetherStatesParcel != null ? mTetherStatesParcel : emptyTetherStatesParcel();
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +09001996 parcel.tetheredClients = hasListPermission
1997 ? mConnectedClientsTracker.getLastTetheredClients()
1998 : Collections.emptyList();
Automerger Merge Workerc22ab7b2020-03-09 04:07:07 +00001999 parcel.offloadStatus = mOffloadStatus;
markchien26299ed2019-02-27 14:56:11 +08002000 try {
markchien40898ca2020-01-21 13:11:06 +08002001 callback.onCallbackStarted(parcel);
markchien26299ed2019-02-27 14:56:11 +08002002 } catch (RemoteException e) {
2003 // Not really very much to do here.
2004 }
markchien26299ed2019-02-27 14:56:11 +08002005 });
2006 }
2007
markchienfaa37282020-02-06 14:34:08 +08002008 private TetherStatesParcel emptyTetherStatesParcel() {
2009 final TetherStatesParcel parcel = new TetherStatesParcel();
2010 parcel.availableList = new String[0];
2011 parcel.tetheredList = new String[0];
2012 parcel.localOnlyList = new String[0];
2013 parcel.erroredIfaceList = new String[0];
2014 parcel.lastErrorList = new int[0];
2015
2016 return parcel;
2017 }
2018
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +09002019 private boolean hasCallingPermission(@NonNull String permission) {
2020 return mContext.checkCallingPermission(permission) == PERMISSION_GRANTED;
2021 }
2022
markchienae8aa642019-12-16 20:15:20 +08002023 /** Unregister tethering event callback */
2024 void unregisterTetheringEventCallback(ITetheringEventCallback callback) {
2025 mHandler.post(() -> {
2026 mTetheringEventCallbacks.unregister(callback);
2027 });
2028 }
markchien0f63ca62019-09-30 14:40:57 +08002029
Chalard Jeanc0fc2762020-04-17 17:12:44 +00002030 private void reportUpstreamChanged(UpstreamNetworkState ns) {
markchienae8aa642019-12-16 20:15:20 +08002031 final int length = mTetheringEventCallbacks.beginBroadcast();
Chalard Jeanc0fc2762020-04-17 17:12:44 +00002032 final Network network = (ns != null) ? ns.network : null;
2033 final NetworkCapabilities capabilities = (ns != null) ? ns.networkCapabilities : null;
markchien26299ed2019-02-27 14:56:11 +08002034 try {
markchienae8aa642019-12-16 20:15:20 +08002035 for (int i = 0; i < length; i++) {
2036 try {
2037 mTetheringEventCallbacks.getBroadcastItem(i).onUpstreamChanged(network);
2038 } catch (RemoteException e) {
2039 // Not really very much to do here.
2040 }
2041 }
2042 } finally {
2043 mTetheringEventCallbacks.finishBroadcast();
markchien26299ed2019-02-27 14:56:11 +08002044 }
Chalard Jeanc0fc2762020-04-17 17:12:44 +00002045 // Need to notify capabilities change after upstream network changed because new network's
2046 // capabilities should be checked every time.
2047 mNotificationUpdater.onUpstreamCapabilitiesChanged(capabilities);
markchien26299ed2019-02-27 14:56:11 +08002048 }
2049
markchien0f63ca62019-09-30 14:40:57 +08002050 private void reportConfigurationChanged(TetheringConfigurationParcel config) {
markchienae8aa642019-12-16 20:15:20 +08002051 final int length = mTetheringEventCallbacks.beginBroadcast();
markchien0f63ca62019-09-30 14:40:57 +08002052 try {
markchienae8aa642019-12-16 20:15:20 +08002053 for (int i = 0; i < length; i++) {
2054 try {
2055 mTetheringEventCallbacks.getBroadcastItem(i).onConfigurationChanged(config);
markchien40898ca2020-01-21 13:11:06 +08002056 // TODO(b/148139325): send tetheringSupported on configuration change
markchienae8aa642019-12-16 20:15:20 +08002057 } catch (RemoteException e) {
2058 // Not really very much to do here.
2059 }
2060 }
2061 } finally {
2062 mTetheringEventCallbacks.finishBroadcast();
markchien0f63ca62019-09-30 14:40:57 +08002063 }
2064 }
2065
2066 private void reportTetherStateChanged(TetherStatesParcel states) {
markchienae8aa642019-12-16 20:15:20 +08002067 final int length = mTetheringEventCallbacks.beginBroadcast();
markchien0f63ca62019-09-30 14:40:57 +08002068 try {
markchienae8aa642019-12-16 20:15:20 +08002069 for (int i = 0; i < length; i++) {
2070 try {
2071 mTetheringEventCallbacks.getBroadcastItem(i).onTetherStatesChanged(states);
2072 } catch (RemoteException e) {
2073 // Not really very much to do here.
2074 }
2075 }
2076 } finally {
2077 mTetheringEventCallbacks.finishBroadcast();
markchien0f63ca62019-09-30 14:40:57 +08002078 }
2079 }
2080
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +09002081 private void reportTetherClientsChanged(List<TetheredClient> clients) {
2082 final int length = mTetheringEventCallbacks.beginBroadcast();
2083 try {
2084 for (int i = 0; i < length; i++) {
2085 try {
2086 final CallbackCookie cookie =
2087 (CallbackCookie) mTetheringEventCallbacks.getBroadcastCookie(i);
2088 if (!cookie.hasListClientsPermission) continue;
2089 mTetheringEventCallbacks.getBroadcastItem(i).onTetherClientsChanged(clients);
2090 } catch (RemoteException e) {
2091 // Not really very much to do here.
2092 }
2093 }
2094 } finally {
2095 mTetheringEventCallbacks.finishBroadcast();
2096 }
2097 }
2098
Automerger Merge Workerc22ab7b2020-03-09 04:07:07 +00002099 private void reportOffloadStatusChanged(final int status) {
2100 final int length = mTetheringEventCallbacks.beginBroadcast();
2101 try {
2102 for (int i = 0; i < length; i++) {
2103 try {
2104 mTetheringEventCallbacks.getBroadcastItem(i).onOffloadStatusChanged(status);
2105 } catch (RemoteException e) {
2106 // Not really very much to do here.
2107 }
2108 }
2109 } finally {
2110 mTetheringEventCallbacks.finishBroadcast();
2111 }
2112 }
2113
markchiena9d9ef82020-01-07 14:43:17 +08002114 void dump(@NonNull FileDescriptor fd, @NonNull PrintWriter writer, @Nullable String[] args) {
Christopher Wiley499a57a2016-05-16 16:19:07 -07002115 // Binder.java closes the resource for us.
2116 @SuppressWarnings("resource")
Lorenzo Colittie3805462015-06-03 11:18:24 +09002117 final IndentingPrintWriter pw = new IndentingPrintWriter(writer, " ");
markchienae8aa642019-12-16 20:15:20 +08002118 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
2119 != PERMISSION_GRANTED) {
2120 pw.println("Permission Denial: can't dump.");
2121 return;
2122 }
Robert Greenwalt2a091d72010-02-11 18:18:40 -08002123
Lorenzo Colittie3805462015-06-03 11:18:24 +09002124 pw.println("Tethering:");
2125 pw.increaseIndent();
Lorenzo Colittie3805462015-06-03 11:18:24 +09002126
Erik Kline9db1b542017-03-16 14:10:27 +09002127 pw.println("Configuration:");
2128 pw.increaseIndent();
2129 final TetheringConfiguration cfg = mConfig;
2130 cfg.dump(pw);
2131 pw.decreaseIndent();
2132
markchien3b519632018-09-07 16:19:12 +08002133 pw.println("Entitlement:");
2134 pw.increaseIndent();
2135 mEntitlementMgr.dump(pw);
2136 pw.decreaseIndent();
2137
Erik Kline9db1b542017-03-16 14:10:27 +09002138 synchronized (mPublicSync) {
Robert Greenwaltb4453622011-11-03 16:01:40 -07002139 pw.println("Tether state:");
Lorenzo Colittie3805462015-06-03 11:18:24 +09002140 pw.increaseIndent();
Christopher Wileyd985dde2016-05-31 10:44:35 -07002141 for (int i = 0; i < mTetherStates.size(); i++) {
2142 final String iface = mTetherStates.keyAt(i);
2143 final TetherState tetherState = mTetherStates.valueAt(i);
2144 pw.print(iface + " - ");
2145
Hugo Benichib55fb222017-03-10 14:20:57 +09002146 switch (tetherState.lastState) {
Erik Kline7a4ccc62018-08-27 17:26:47 +09002147 case IpServer.STATE_UNAVAILABLE:
Christopher Wileyd985dde2016-05-31 10:44:35 -07002148 pw.print("UnavailableState");
2149 break;
Erik Kline7a4ccc62018-08-27 17:26:47 +09002150 case IpServer.STATE_AVAILABLE:
Christopher Wileyd985dde2016-05-31 10:44:35 -07002151 pw.print("AvailableState");
2152 break;
Erik Kline7a4ccc62018-08-27 17:26:47 +09002153 case IpServer.STATE_TETHERED:
Christopher Wileyd985dde2016-05-31 10:44:35 -07002154 pw.print("TetheredState");
2155 break;
Erik Kline7a4ccc62018-08-27 17:26:47 +09002156 case IpServer.STATE_LOCAL_ONLY:
Erik Klineea9cc482017-03-10 19:35:34 +09002157 pw.print("LocalHotspotState");
2158 break;
Christopher Wileyd985dde2016-05-31 10:44:35 -07002159 default:
2160 pw.print("UnknownState");
2161 break;
2162 }
Hugo Benichib55fb222017-03-10 14:20:57 +09002163 pw.println(" - lastError = " + tetherState.lastError);
Robert Greenwalt2a091d72010-02-11 18:18:40 -08002164 }
Erik Klineea9cc482017-03-10 19:35:34 +09002165 pw.println("Upstream wanted: " + upstreamWanted());
Remi NGUYEN VAN6c02f992018-03-09 14:07:18 +09002166 pw.println("Current upstream interface(s): " + mCurrentUpstreamIfaceSet);
Lorenzo Colittie3805462015-06-03 11:18:24 +09002167 pw.decreaseIndent();
Robert Greenwalt2a091d72010-02-11 18:18:40 -08002168 }
Erik Kline1fdc2e22017-05-08 17:56:35 +09002169
Lorenzo Colittic2519c52017-07-13 01:48:26 +09002170 pw.println("Hardware offload:");
2171 pw.increaseIndent();
2172 mOffloadController.dump(pw);
2173 pw.decreaseIndent();
2174
Erik Kline1fdc2e22017-05-08 17:56:35 +09002175 pw.println("Log:");
2176 pw.increaseIndent();
markchien0f63ca62019-09-30 14:40:57 +08002177 if (argsContain(args, "--short")) {
Erik Kline7747fd42017-05-12 16:52:48 +09002178 pw.println("<log removed for brevity>");
2179 } else {
2180 mLog.dump(fd, pw, args);
2181 }
Erik Kline1fdc2e22017-05-08 17:56:35 +09002182 pw.decreaseIndent();
2183
Lorenzo Colittie3805462015-06-03 11:18:24 +09002184 pw.decreaseIndent();
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -08002185 }
Christopher Wileye03fb442016-05-18 13:45:20 -07002186
Erik Kline7747fd42017-05-12 16:52:48 +09002187 private static boolean argsContain(String[] args, String target) {
2188 for (String arg : args) {
Erik Klineee363c42017-05-29 09:11:03 +09002189 if (target.equals(arg)) return true;
Erik Kline7747fd42017-05-12 16:52:48 +09002190 }
2191 return false;
2192 }
2193
Treehugger Robot25067812020-03-25 15:32:41 +00002194 private void updateConnectedClients(final List<WifiClient> wifiClients) {
2195 if (mConnectedClientsTracker.updateConnectedClients(mForwardedDownstreams, wifiClients)) {
2196 reportTetherClientsChanged(mConnectedClientsTracker.getLastTetheredClients());
2197 }
2198 }
2199
Erik Kline7a4ccc62018-08-27 17:26:47 +09002200 private IpServer.Callback makeControlCallback() {
2201 return new IpServer.Callback() {
Erik Kline6e9a1012017-06-06 19:24:21 +09002202 @Override
Erik Kline7a4ccc62018-08-27 17:26:47 +09002203 public void updateInterfaceState(IpServer who, int state, int lastError) {
2204 notifyInterfaceStateChange(who, state, lastError);
Erik Kline6e9a1012017-06-06 19:24:21 +09002205 }
2206
2207 @Override
Erik Kline7a4ccc62018-08-27 17:26:47 +09002208 public void updateLinkProperties(IpServer who, LinkProperties newLp) {
2209 notifyLinkPropertiesChanged(who, newLp);
Erik Kline6e9a1012017-06-06 19:24:21 +09002210 }
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +09002211
2212 @Override
2213 public void dhcpLeasesChanged() {
Treehugger Robot25067812020-03-25 15:32:41 +00002214 updateConnectedClients(null /* wifiClients */);
Remi NGUYEN VAN43b0e5c2020-02-13 09:16:19 +09002215 }
Erik Kline6e9a1012017-06-06 19:24:21 +09002216 };
2217 }
2218
2219 // TODO: Move into TetherMasterSM.
Erik Kline7a4ccc62018-08-27 17:26:47 +09002220 private void notifyInterfaceStateChange(IpServer who, int state, int error) {
2221 final String iface = who.interfaceName();
Christopher Wileyd985dde2016-05-31 10:44:35 -07002222 synchronized (mPublicSync) {
Erik Kline216af6d2017-04-27 20:57:23 +09002223 final TetherState tetherState = mTetherStates.get(iface);
Erik Kline7a4ccc62018-08-27 17:26:47 +09002224 if (tetherState != null && tetherState.ipServer.equals(who)) {
Hugo Benichib55fb222017-03-10 14:20:57 +09002225 tetherState.lastState = state;
2226 tetherState.lastError = error;
Christopher Wileyd985dde2016-05-31 10:44:35 -07002227 } else {
2228 if (DBG) Log.d(TAG, "got notification from stale iface " + iface);
2229 }
2230 }
2231
Erik Kline7747fd42017-05-12 16:52:48 +09002232 mLog.log(String.format("OBSERVED iface=%s state=%s error=%s", iface, state, error));
Christopher Wileyd985dde2016-05-31 10:44:35 -07002233
Yohei, Oshima977aad52016-12-08 13:39:20 +09002234 // If TetherMasterSM is in ErrorState, TetherMasterSM stays there.
2235 // Thus we give a chance for TetherMasterSM to recover to InitialState
2236 // by sending CMD_CLEAR_ERROR
markchien62a625d2020-03-19 13:37:43 +08002237 if (error == TETHER_ERROR_INTERNAL_ERROR) {
Yohei, Oshima977aad52016-12-08 13:39:20 +09002238 mTetherMasterSM.sendMessage(TetherMasterSM.CMD_CLEAR_ERROR, who);
2239 }
Erik Klineea9cc482017-03-10 19:35:34 +09002240 int which;
Christopher Wileyd985dde2016-05-31 10:44:35 -07002241 switch (state) {
Erik Kline7a4ccc62018-08-27 17:26:47 +09002242 case IpServer.STATE_UNAVAILABLE:
2243 case IpServer.STATE_AVAILABLE:
Erik Klineea9cc482017-03-10 19:35:34 +09002244 which = TetherMasterSM.EVENT_IFACE_SERVING_STATE_INACTIVE;
Christopher Wileyd985dde2016-05-31 10:44:35 -07002245 break;
Erik Kline7a4ccc62018-08-27 17:26:47 +09002246 case IpServer.STATE_TETHERED:
2247 case IpServer.STATE_LOCAL_ONLY:
Erik Klineea9cc482017-03-10 19:35:34 +09002248 which = TetherMasterSM.EVENT_IFACE_SERVING_STATE_ACTIVE;
Christopher Wileyd985dde2016-05-31 10:44:35 -07002249 break;
Erik Klineea9cc482017-03-10 19:35:34 +09002250 default:
2251 Log.wtf(TAG, "Unknown interface state: " + state);
2252 return;
Christopher Wileyd985dde2016-05-31 10:44:35 -07002253 }
Erik Klineea9cc482017-03-10 19:35:34 +09002254 mTetherMasterSM.sendMessage(which, state, 0, who);
Christopher Wileyd985dde2016-05-31 10:44:35 -07002255 sendTetherStateChangedBroadcast();
2256 }
2257
Erik Kline7a4ccc62018-08-27 17:26:47 +09002258 private void notifyLinkPropertiesChanged(IpServer who, LinkProperties newLp) {
2259 final String iface = who.interfaceName();
Erik Kline6e9a1012017-06-06 19:24:21 +09002260 final int state;
2261 synchronized (mPublicSync) {
2262 final TetherState tetherState = mTetherStates.get(iface);
Erik Kline7a4ccc62018-08-27 17:26:47 +09002263 if (tetherState != null && tetherState.ipServer.equals(who)) {
Erik Kline6e9a1012017-06-06 19:24:21 +09002264 state = tetherState.lastState;
2265 } else {
2266 mLog.log("got notification from stale iface " + iface);
2267 return;
2268 }
2269 }
2270
Erik Kline7fd696c2017-06-12 18:20:08 +09002271 mLog.log(String.format(
2272 "OBSERVED LinkProperties update iface=%s state=%s lp=%s",
Erik Kline7a4ccc62018-08-27 17:26:47 +09002273 iface, IpServer.getStateString(state), newLp));
Erik Kline6e9a1012017-06-06 19:24:21 +09002274 final int which = TetherMasterSM.EVENT_IFACE_UPDATE_LINKPROPERTIES;
2275 mTetherMasterSM.sendMessage(which, state, 0, newLp);
2276 }
2277
Erik Kline4dd9bb82017-04-26 11:11:07 +09002278 private void maybeTrackNewInterfaceLocked(final String iface) {
2279 // If we don't care about this type of interface, ignore.
2280 final int interfaceType = ifaceNameToType(iface);
Erik Kline7a26ba32018-03-09 14:18:02 +09002281 if (interfaceType == TETHERING_INVALID) {
Erik Kline4dd9bb82017-04-26 11:11:07 +09002282 mLog.log(iface + " is not a tetherable iface, ignoring");
2283 return;
2284 }
Erik Klinea9cde8b2017-06-20 21:18:31 +09002285 maybeTrackNewInterfaceLocked(iface, interfaceType);
2286 }
Erik Kline4dd9bb82017-04-26 11:11:07 +09002287
Erik Klinea9cde8b2017-06-20 21:18:31 +09002288 private void maybeTrackNewInterfaceLocked(final String iface, int interfaceType) {
Erik Kline4dd9bb82017-04-26 11:11:07 +09002289 // If we have already started a TISM for this interface, skip.
2290 if (mTetherStates.containsKey(iface)) {
2291 mLog.log("active iface (" + iface + ") reported as added, ignoring");
2292 return;
2293 }
2294
2295 mLog.log("adding TetheringInterfaceStateMachine for: " + iface);
2296 final TetherState tetherState = new TetherState(
junyulaie3f41432019-12-03 14:34:13 +08002297 new IpServer(iface, mLooper, interfaceType, mLog, mNetd,
Erik Kline7a4ccc62018-08-27 17:26:47 +09002298 makeControlCallback(), mConfig.enableLegacyDhcpServer,
Remi NGUYEN VAN5db454c2019-02-14 18:04:20 +09002299 mDeps.getIpServerDependencies()));
Christopher Wileyd985dde2016-05-31 10:44:35 -07002300 mTetherStates.put(iface, tetherState);
Erik Kline7a4ccc62018-08-27 17:26:47 +09002301 tetherState.ipServer.start();
Christopher Wileye03fb442016-05-18 13:45:20 -07002302 }
Erik Kline3e756652017-01-17 13:42:19 +09002303
Erik Kline4dd9bb82017-04-26 11:11:07 +09002304 private void stopTrackingInterfaceLocked(final String iface) {
2305 final TetherState tetherState = mTetherStates.get(iface);
2306 if (tetherState == null) {
2307 mLog.log("attempting to remove unknown iface (" + iface + "), ignoring");
2308 return;
2309 }
Erik Kline7a4ccc62018-08-27 17:26:47 +09002310 tetherState.ipServer.stop();
Erik Kline4dd9bb82017-04-26 11:11:07 +09002311 mLog.log("removing TetheringInterfaceStateMachine for: " + iface);
2312 mTetherStates.remove(iface);
2313 }
2314
Erik Kline3e756652017-01-17 13:42:19 +09002315 private static String[] copy(String[] strarray) {
2316 return Arrays.copyOf(strarray, strarray.length);
2317 }
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -08002318}