blob: 01392d99fec5997d19d8bfb4c442771e873096cb [file] [log] [blame]
// Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "shill/wifi.h"
#include <linux/if.h> // Needs definitions from netinet/ether.h
#include <netinet/ether.h>
#include <stdio.h>
#include <string.h>
#include <algorithm>
#include <limits>
#include <map>
#include <set>
#include <string>
#include <vector>
#include <base/bind.h>
#include <base/file_path.h>
#include <base/file_util.h>
#include <base/string_util.h>
#include <base/stringprintf.h>
#include <chromeos/dbus/service_constants.h>
#include <glib.h>
#include "shill/control_interface.h"
#include "shill/dbus_adaptor.h"
#include "shill/device.h"
#include "shill/eap_credentials.h"
#include "shill/error.h"
#include "shill/file_reader.h"
#include "shill/geolocation_info.h"
#include "shill/icmp.h"
#include "shill/ieee80211.h"
#include "shill/ip_address.h"
#include "shill/link_monitor.h"
#include "shill/logging.h"
#include "shill/manager.h"
#include "shill/metrics.h"
#include "shill/netlink_manager.h"
#include "shill/netlink_message.h"
#include "shill/nl80211_message.h"
#include "shill/property_accessor.h"
#include "shill/proxy_factory.h"
#include "shill/rtnl_handler.h"
#include "shill/scan_session.h"
#include "shill/scope_logger.h"
#include "shill/shill_time.h"
#include "shill/supplicant_eap_state_handler.h"
#include "shill/supplicant_interface_proxy_interface.h"
#include "shill/supplicant_network_proxy_interface.h"
#include "shill/supplicant_process_proxy_interface.h"
#include "shill/technology.h"
#include "shill/wifi_endpoint.h"
#include "shill/wifi_provider.h"
#include "shill/wifi_service.h"
#include "shill/wpa_supplicant.h"
using base::Bind;
using base::StringPrintf;
using file_util::PathExists;
using std::map;
using std::set;
using std::string;
using std::vector;
namespace shill {
// statics
const char *WiFi::kDefaultBgscanMethod =
WPASupplicant::kNetworkBgscanMethodSimple;
const uint16 WiFi::kDefaultBgscanShortIntervalSeconds = 30;
const int32 WiFi::kDefaultBgscanSignalThresholdDbm = -50;
const uint16 WiFi::kDefaultScanIntervalSeconds = 180;
const uint16 WiFi::kDefaultRoamThresholdDb = 18; // Supplicant's default.
// Scan interval while connected.
const uint16 WiFi::kBackgroundScanIntervalSeconds = 3601;
// Age (in seconds) beyond which a BSS cache entry will not be preserved,
// across a suspend/resume.
const time_t WiFi::kMaxBSSResumeAgeSeconds = 10;
const char WiFi::kInterfaceStateUnknown[] = "shill-unknown";
const time_t WiFi::kRescanIntervalSeconds = 1;
const int WiFi::kNumFastScanAttempts = 3;
const int WiFi::kFastScanIntervalSeconds = 10;
const int WiFi::kPendingTimeoutSeconds = 15;
const int WiFi::kReconnectTimeoutSeconds = 10;
const int WiFi::kRequestStationInfoPeriodSeconds = 20;
const size_t WiFi::kMinumumFrequenciesToScan = 4; // Arbitrary but > 0.
const float WiFi::kDefaultFractionPerScan = 0.34;
const char WiFi::kProgressiveScanFieldTrialFlagFile[] =
"/home/chronos/.progressive_scan_variation";
WiFi::WiFi(ControlInterface *control_interface,
EventDispatcher *dispatcher,
Metrics *metrics,
Manager *manager,
const string& link,
const string &address,
int interface_index)
: Device(control_interface,
dispatcher,
metrics,
manager,
link,
address,
interface_index,
Technology::kWifi),
provider_(manager->wifi_provider()),
weak_ptr_factory_(this),
proxy_factory_(ProxyFactory::GetInstance()),
time_(Time::GetInstance()),
supplicant_present_(false),
supplicant_state_(kInterfaceStateUnknown),
supplicant_bss_("(unknown)"),
need_bss_flush_(false),
resumed_at_((struct timeval) {0}),
fast_scans_remaining_(kNumFastScanAttempts),
has_already_completed_(false),
is_roaming_in_progress_(false),
is_debugging_connection_(false),
eap_state_handler_(new SupplicantEAPStateHandler()),
bgscan_short_interval_seconds_(kDefaultBgscanShortIntervalSeconds),
bgscan_signal_threshold_dbm_(kDefaultBgscanSignalThresholdDbm),
roam_threshold_db_(kDefaultRoamThresholdDb),
scan_interval_seconds_(kDefaultScanIntervalSeconds),
progressive_scan_enabled_(false),
scan_configuration_("Full scan"),
netlink_manager_(NetlinkManager::GetInstance()),
min_frequencies_to_scan_(kMinumumFrequenciesToScan),
max_frequencies_to_scan_(std::numeric_limits<int>::max()),
scan_all_frequencies_(true),
fraction_per_scan_(kDefaultFractionPerScan),
scan_state_(kScanIdle),
scan_method_(kScanMethodNone),
receive_byte_count_at_connect_(0) {
PropertyStore *store = this->mutable_store();
store->RegisterDerivedString(
kBgscanMethodProperty,
StringAccessor(
// TODO(petkov): CustomMappedAccessor is used for convenience because
// it provides a way to define a custom clearer (unlike
// CustomAccessor). We need to implement a fully custom accessor with
// no extra argument.
new CustomMappedAccessor<WiFi, string, int>(this,
&WiFi::ClearBgscanMethod,
&WiFi::GetBgscanMethod,
&WiFi::SetBgscanMethod,
0))); // Unused.
HelpRegisterDerivedUint16(store,
kBgscanShortIntervalProperty,
&WiFi::GetBgscanShortInterval,
&WiFi::SetBgscanShortInterval);
HelpRegisterDerivedInt32(store,
kBgscanSignalThresholdProperty,
&WiFi::GetBgscanSignalThreshold,
&WiFi::SetBgscanSignalThreshold);
store->RegisterDerivedKeyValueStore(
kLinkStatisticsProperty,
KeyValueStoreAccessor(
new CustomAccessor<WiFi, KeyValueStore>(
this, &WiFi::GetLinkStatistics, NULL)));
// TODO(quiche): Decide if scan_pending_ is close enough to
// "currently scanning" that we don't care, or if we want to track
// scan pending/currently scanning/no scan scheduled as a tri-state
// kind of thing.
HelpRegisterConstDerivedBool(store,
kScanningProperty,
&WiFi::GetScanPending);
HelpRegisterDerivedUint16(store,
kRoamThresholdProperty,
&WiFi::GetRoamThreshold,
&WiFi::SetRoamThreshold);
HelpRegisterDerivedUint16(store,
kScanIntervalProperty,
&WiFi::GetScanInterval,
&WiFi::SetScanInterval);
ScopeLogger::GetInstance()->RegisterScopeEnableChangedCallback(
ScopeLogger::kWiFi,
Bind(&WiFi::OnWiFiDebugScopeChanged, weak_ptr_factory_.GetWeakPtr()));
CHECK(netlink_manager_);
// TODO(wdg): Remove after progressive scan field trial is over.
// Only do the field trial if the user hasn't already enabled progressive
// scan manually. crbug.com/250945
ParseFieldTrialFile(FilePath(kProgressiveScanFieldTrialFlagFile));
SLOG(WiFi, 2) << "WiFi device " << link_name() << " initialized.";
}
WiFi::~WiFi() {}
void WiFi::ParseFieldTrialFile(const FilePath &info_file_path) {
FileReader file_reader;
if (!file_reader.Open(info_file_path)) {
SLOG(WiFi, 7) << "Not enrolled in progressive scan field trial.";
return;
}
string line;
file_reader.ReadLine(&line);
switch (line[0]) {
case '1':
case '2':
// The minimum and maximum are the same (which makes the fraction
// irrelevant). Every scan batch (except, possibly, the last) contains
// exactly 4 frequencies. These cases is optimized for users that use
// connect to a few frequencies or that heavily prefer the top 4.
min_frequencies_to_scan_ = 4;
max_frequencies_to_scan_ = 4;
fraction_per_scan_ = .34;
progressive_scan_enabled_ = true;
scan_configuration_ = "Progressive scan (field trial 1/2: min/max=4)";
break;
case '3':
case '4':
// The minimum and maximum are the same (which makes the fraction
// irrelevant). Every scan batch (except, possibly, the last) contains
// exactly 8 frequencies. These cases is optimized for users that use
// several frequencies, each with similar likelihood.
min_frequencies_to_scan_ = 8;
max_frequencies_to_scan_ = 8;
fraction_per_scan_ = .51;
progressive_scan_enabled_ = true;
scan_configuration_ = "Progressive scan (field trial 3/4: min/max=8)";
break;
case '5':
case '6':
// Does a single scan, only of previously-seen frequencies. The idea is
// that, in nearly all cases, we'll find a good BSS in a scan of all
// previously seen frequencies and that, since about 75% of the users
// (based on preliminary field trial data) have seen less than 6 or 7
// frequencies and 50% (based on the same data) have less than 4, 'all
// frequencies' is not too large of a group in the worst case and is a
// pretty small group in more then half the cases. Note that if we don't
// find a BSS in a scan, the code falls back to a complete scan. This
// algorithm is represented by two identical groups to help determine
// whether the size of the field trial groups are large enough to make the
// results statistically significant.
min_frequencies_to_scan_ = 1;
max_frequencies_to_scan_ = std::numeric_limits<int>::max();
fraction_per_scan_ = 1.1;
scan_all_frequencies_ = false;
progressive_scan_enabled_ = true;
scan_configuration_ = (line[0] == '5') ?
"Progressive scan (field trial 5: min=1/max=all, 100%, only-seen)" :
"Progressive scan (field trial 6: min=1/max=all, 100%, only-seen)";
break;
case '7':
// Uses different min/max values. This allows machines that have a very
// small set of previously-seen frequencies to have very short scan
// times, machines that have a large set of previously-seen frequencies
// to have their scans broken up to try to find a BSS without searching
// all of those frequencies, and scans that don't find anything in the
// previously-seen list to scan just the frequencies that haven't just
// been scanned.
min_frequencies_to_scan_ = 1;
max_frequencies_to_scan_ = 4;
// This is 1.0 rather than 1.1 so that we only get previously seen
// frequencies until they are exhausted.
fraction_per_scan_ = 1.0;
progressive_scan_enabled_ = true;
scan_configuration_ =
"Progressive scan (field trial 7: min=1/max=4, 100%)";
break;
case 'c':
// This is the control group; it uses traditional, full, scan. It's the
// same size as the other test groups.
progressive_scan_enabled_ = false;
scan_configuration_ = "Full scan (field trial c: control group)";
break;
case 'x':
// This is the non-test group; it uses traditional, full, scan. It
// contains all users that aren't in one of the test groups.
progressive_scan_enabled_ = false;
scan_configuration_ = "Full scan (field trial x: default/disabled group)";
break;
default:
progressive_scan_enabled_ = false;
scan_configuration_ = "Full scan (field trial unknown)";
break;
}
LOG(INFO) << "Progressive scan (via field_trial) "
<< (progressive_scan_enabled_ ? "enabled" : "disabled");
if (progressive_scan_enabled_) {
LOG(INFO) << " min_frequencies_to_scan_ = " << min_frequencies_to_scan_;
LOG(INFO) << " max_frequencies_to_scan_ = " << max_frequencies_to_scan_;
LOG(INFO) << " fraction_per_scan_ = " << fraction_per_scan_;
}
file_reader.Close();
}
void WiFi::Start(Error *error,
const EnabledStateChangedCallback &/*callback*/) {
SLOG(WiFi, 2) << "WiFi " << link_name() << " starting.";
if (enabled()) {
return;
}
OnEnabledStateChanged(EnabledStateChangedCallback(), Error());
if (error) {
error->Reset(); // indicate immediate completion
}
if (!supplicant_name_watcher_) {
// Registers the WPA supplicant appear/vanish callbacks only once per WiFi
// device instance.
supplicant_name_watcher_.reset(manager()->dbus_manager()->CreateNameWatcher(
WPASupplicant::kDBusAddr,
Bind(&WiFi::OnSupplicantAppear, Unretained(this)),
Bind(&WiFi::OnSupplicantVanish, Unretained(this))));
}
// Subscribe to multicast events.
netlink_manager_->SubscribeToEvents(Nl80211Message::kMessageTypeString,
NetlinkManager::kEventTypeConfig);
netlink_manager_->SubscribeToEvents(Nl80211Message::kMessageTypeString,
NetlinkManager::kEventTypeScan);
netlink_manager_->SubscribeToEvents(Nl80211Message::kMessageTypeString,
NetlinkManager::kEventTypeRegulatory);
netlink_manager_->SubscribeToEvents(Nl80211Message::kMessageTypeString,
NetlinkManager::kEventTypeMlme);
ConfigureScanFrequencies();
// Connect to WPA supplicant if it's already present. If not, we'll connect to
// it when it appears.
ConnectToSupplicant();
}
void WiFi::Stop(Error *error, const EnabledStateChangedCallback &/*callback*/) {
SLOG(WiFi, 2) << "WiFi " << link_name() << " stopping.";
// Unlike other devices, we leave the DBus name watcher in place here, because
// WiFi callbacks expect notifications even if the device is disabled.
DropConnection();
StopScanTimer();
for (EndpointMap::iterator it = endpoint_by_rpcid_.begin();
it != endpoint_by_rpcid_.end(); ++it) {
provider_->OnEndpointRemoved(it->second);
}
endpoint_by_rpcid_.clear();
for (ReverseServiceMap::const_iterator it = rpcid_by_service_.begin();
it != rpcid_by_service_.end(); ++it) {
RemoveNetwork(it->second);
}
rpcid_by_service_.clear();
supplicant_interface_proxy_.reset(); // breaks a reference cycle
// TODO(quiche): Remove interface from supplicant.
supplicant_process_proxy_.reset();
current_service_ = NULL; // breaks a reference cycle
pending_service_ = NULL; // breaks a reference cycle
is_debugging_connection_ = false;
SetScanState(kScanIdle, kScanMethodNone, __func__);
StopPendingTimer();
StopReconnectTimer();
StopRequestingStationInfo();
OnEnabledStateChanged(EnabledStateChangedCallback(), Error());
if (error)
error->Reset(); // indicate immediate completion
weak_ptr_factory_.InvalidateWeakPtrs();
SLOG(WiFi, 3) << "WiFi " << link_name() << " supplicant_process_proxy_ "
<< (supplicant_process_proxy_.get() ?
"is set." : "is not set.");
SLOG(WiFi, 3) << "WiFi " << link_name() << " supplicant_interface_proxy_ "
<< (supplicant_interface_proxy_.get() ?
"is set." : "is not set.");
SLOG(WiFi, 3) << "WiFi " << link_name() << " pending_service_ "
<< (pending_service_.get() ? "is set." : "is not set.");
SLOG(WiFi, 3) << "WiFi " << link_name() << " has "
<< endpoint_by_rpcid_.size() << " EndpointMap entries.";
}
void WiFi::Scan(ScanType scan_type, Error */*error*/, const string &reason) {
if ((scan_state_ != kScanIdle) ||
(current_service_.get() && current_service_->IsConnecting())) {
SLOG(WiFi, 2) << "Ignoring scan request while scanning or connecting.";
return;
}
if (progressive_scan_enabled_ && scan_type == kProgressiveScan) {
LOG(INFO) << __func__ << " [progressive] on " << link_name() << " from "
<< reason;
LOG(INFO) << scan_configuration_;
if (!scan_session_) {
// TODO(wdg): Perform in-depth testing to determine the best values for
// the different scans. chromium:235293
ScanSession::FractionList scan_fractions;
float total_fraction = 0.0;
do {
total_fraction += fraction_per_scan_;
scan_fractions.push_back(fraction_per_scan_);
} while (total_fraction < 1.0);
scan_session_.reset(
new ScanSession(netlink_manager_,
dispatcher(),
provider_->GetScanFrequencies(),
(scan_all_frequencies_ ? all_scan_frequencies_ :
set<uint16_t>()),
interface_index(),
scan_fractions,
min_frequencies_to_scan_,
max_frequencies_to_scan_,
Bind(&WiFi::OnFailedProgressiveScan,
weak_ptr_factory_.GetWeakPtr()),
metrics()));
for (const auto &ssid : provider_->GetHiddenSSIDList()) {
scan_session_->AddSsid(ByteString(&ssid.front(), ssid.size()));
}
}
dispatcher()->PostTask(
Bind(&WiFi::ProgressiveScanTask, weak_ptr_factory_.GetWeakPtr()));
} else {
LOG(INFO) << __func__ << " [full] on " << link_name()
<< " (progressive scan "
<< (progressive_scan_enabled_ ? "ENABLED" : "DISABLED")
<< ") from " << reason;
// Needs to send a D-Bus message, but may be called from D-Bus
// signal handler context (via Manager::RequestScan). So defer work
// to event loop.
dispatcher()->PostTask(
Bind(&WiFi::ScanTask, weak_ptr_factory_.GetWeakPtr()));
}
}
void WiFi::BSSAdded(const ::DBus::Path &path,
const map<string, ::DBus::Variant> &properties) {
// Called from a D-Bus signal handler, and may need to send a D-Bus
// message. So defer work to event loop.
dispatcher()->PostTask(Bind(&WiFi::BSSAddedTask,
weak_ptr_factory_.GetWeakPtr(),
path, properties));
}
void WiFi::BSSRemoved(const ::DBus::Path &path) {
// Called from a D-Bus signal handler, and may need to send a D-Bus
// message. So defer work to event loop.
dispatcher()->PostTask(Bind(&WiFi::BSSRemovedTask,
weak_ptr_factory_.GetWeakPtr(), path));
}
void WiFi::Certification(const map<string, ::DBus::Variant> &properties) {
dispatcher()->PostTask(Bind(&WiFi::CertificationTask,
weak_ptr_factory_.GetWeakPtr(), properties));
}
void WiFi::EAPEvent(const string &status, const string &parameter) {
dispatcher()->PostTask(Bind(&WiFi::EAPEventTask,
weak_ptr_factory_.GetWeakPtr(),
status,
parameter));
}
void WiFi::PropertiesChanged(const map<string, ::DBus::Variant> &properties) {
SLOG(WiFi, 2) << __func__;
// Called from D-Bus signal handler, but may need to send a D-Bus
// message. So defer work to event loop.
dispatcher()->PostTask(Bind(&WiFi::PropertiesChangedTask,
weak_ptr_factory_.GetWeakPtr(), properties));
}
void WiFi::ScanDone() {
LOG(INFO) << __func__;
// Defer handling of scan result processing, because that processing
// may require the the registration of new D-Bus objects. And such
// registration can't be done in the context of a D-Bus signal
// handler.
dispatcher()->PostTask(Bind(&WiFi::ScanDoneTask,
weak_ptr_factory_.GetWeakPtr()));
}
void WiFi::ConnectTo(WiFiService *service) {
CHECK(service) << "Can't connect to NULL service.";
DBus::Path network_path;
// TODO(quiche): Handle cases where already connected.
if (pending_service_ && pending_service_ == service) {
// TODO(quiche): Return an error to the caller. crbug.com/206812
LOG(INFO) << "WiFi " << link_name() << " ignoring ConnectTo service "
<< service->unique_name()
<< ", which is already pending.";
return;
}
if (pending_service_ && pending_service_ != service) {
// This is a signal to SetPendingService(NULL) to not modify the scan
// state since the overall story arc isn't reflected by the disconnect.
// It is, instead, described by the transition to either kScanFoundNothing
// or kScanConnecting (made by |SetPendingService|, below).
if (scan_method_ != kScanMethodNone) {
SetScanState(kScanTransitionToConnecting, scan_method_, __func__);
}
// Explicitly disconnect pending service.
pending_service_->set_expecting_disconnect(true);
DisconnectFrom(pending_service_);
}
Error unused_error;
network_path = FindNetworkRpcidForService(service, &unused_error);
if (network_path.empty()) {
try {
DBusPropertiesMap service_params =
service->GetSupplicantConfigurationParameters();
const uint32_t scan_ssid = 1; // "True": Use directed probe.
service_params[WPASupplicant::kNetworkPropertyScanSSID].writer().
append_uint32(scan_ssid);
AppendBgscan(service, &service_params);
service_params[WPASupplicant::kNetworkPropertyDisableVHT].writer().
append_uint32(provider_->disable_vht());
network_path = supplicant_interface_proxy_->AddNetwork(service_params);
CHECK(!network_path.empty()); // No DBus path should be empty.
rpcid_by_service_[service] = network_path;
} catch (const DBus::Error &e) { // NOLINT
LOG(ERROR) << "exception while adding network: " << e.what();
SetScanState(kScanIdle, scan_method_, __func__);
return;
}
}
if (service->HasRecentConnectionIssues()) {
SetConnectionDebugging(true);
}
supplicant_interface_proxy_->SelectNetwork(network_path);
SetPendingService(service);
CHECK(current_service_.get() != pending_service_.get());
// SelectService here (instead of in LinkEvent, like Ethernet), so
// that, if we fail to bring up L2, we can attribute failure correctly.
//
// TODO(quiche): When we add code for dealing with connection failures,
// reconsider if this is the right place to change the selected service.
// see discussion in crbug.com/203282.
SelectService(service);
}
void WiFi::DisconnectFrom(WiFiService *service) {
if (service != current_service_ && service != pending_service_) {
// TODO(quiche): Once we have asynchronous reply support, we should
// generate a D-Bus error here. (crbug.com/206812)
LOG(WARNING) << "In " << __func__ << "(): "
<< " ignoring request to disconnect from service "
<< service->unique_name()
<< " which is neither current nor pending";
return;
}
if (pending_service_ && service != pending_service_) {
// TODO(quiche): Once we have asynchronous reply support, we should
// generate a D-Bus error here. (crbug.com/206812)
LOG(WARNING) << "In " << __func__ << "(): "
<< " ignoring request to disconnect from service "
<< service->unique_name()
<< " which is not the pending service.";
return;
}
if (!pending_service_ && service != current_service_) {
// TODO(quiche): Once we have asynchronous reply support, we should
// generate a D-Bus error here. (crbug.com/206812)
LOG(WARNING) << "In " << __func__ << "(): "
<< " ignoring request to disconnect from service "
<< service->unique_name()
<< " which is not the current service.";
return;
}
if (pending_service_) {
// Since wpa_supplicant has not yet set CurrentBSS, we can't depend
// on this to drive the service state back to idle. Do that here.
// Update service state for pending service.
ServiceDisconnected(pending_service_);
}
SetPendingService(NULL);
StopReconnectTimer();
StopRequestingStationInfo();
if (!supplicant_present_) {
LOG(ERROR) << "In " << __func__ << "(): "
<< "wpa_supplicant is not present; silently resetting "
<< "current_service_.";
if (current_service_ == selected_service()) {
DropConnection();
}
current_service_ = NULL;
return;
}
try {
supplicant_interface_proxy_->Disconnect();
// We'll call RemoveNetwork and reset |current_service_| after
// supplicant notifies us that the CurrentBSS has changed.
} catch (const DBus::Error &e) { // NOLINT
// Can't depend on getting a notification of CurrentBSS change.
// So effect changes immediately. For instance, this can happen when
// a disconnect is triggered by a BSS going away.
Error unused_error;
RemoveNetworkForService(service, &unused_error);
if (service == selected_service()) {
DropConnection();
}
current_service_ = NULL;
}
CHECK(current_service_ == NULL ||
current_service_.get() != pending_service_.get());
}
bool WiFi::DisableNetwork(const ::DBus::Path &network) {
scoped_ptr<SupplicantNetworkProxyInterface> supplicant_network_proxy(
proxy_factory_->CreateSupplicantNetworkProxy(
network, WPASupplicant::kDBusAddr));
try {
supplicant_network_proxy->SetEnabled(false);
} catch (const DBus::Error &e) { // NOLINT
LOG(ERROR) << "DisableNetwork for " << network << " failed.";
return false;
}
return true;
}
bool WiFi::RemoveNetwork(const ::DBus::Path &network) {
try {
supplicant_interface_proxy_->RemoveNetwork(network);
} catch (const DBus::Error &e) { // NOLINT
// RemoveNetwork can fail with three different errors.
//
// If RemoveNetwork fails with a NetworkUnknown error, supplicant has
// already removed the network object, so return true as if
// RemoveNetwork removes the network object successfully.
//
// As shill always passes a valid network object path, RemoveNetwork
// should not fail with an InvalidArgs error. Return false in such case
// as something weird may have happened. Similarly, return false in case
// of an UnknownError.
if (strcmp(e.name(), WPASupplicant::kErrorNetworkUnknown) != 0) {
return false;
}
}
return true;
}
bool WiFi::IsIdle() const {
return !current_service_ && !pending_service_;
}
void WiFi::ClearCachedCredentials(const WiFiService *service) {
Error unused_error;
RemoveNetworkForService(service, &unused_error);
}
void WiFi::NotifyEndpointChanged(const WiFiEndpointConstRefPtr &endpoint) {
provider_->OnEndpointUpdated(endpoint);
}
void WiFi::AppendBgscan(WiFiService *service,
map<string, DBus::Variant> *service_params) const {
int scan_interval = kBackgroundScanIntervalSeconds;
string method = bgscan_method_;
if (method.empty()) {
// If multiple APs are detected for this SSID, configure the default method.
// Otherwise, disable background scanning completely.
if (service->GetEndpointCount() > 1) {
method = kDefaultBgscanMethod;
} else {
LOG(INFO) << "Background scan disabled -- single Endpoint for Service.";
return;
}
} else if (method.compare(WPASupplicant::kNetworkBgscanMethodNone) == 0) {
LOG(INFO) << "Background scan disabled -- chose None method.";
return;
} else {
// If the background scan method was explicitly specified, honor the
// configured background scan interval.
scan_interval = scan_interval_seconds_;
}
DCHECK(!method.empty());
string config_string = StringPrintf("%s:%d:%d:%d",
method.c_str(),
bgscan_short_interval_seconds_,
bgscan_signal_threshold_dbm_,
scan_interval);
LOG(INFO) << "Background scan: " << config_string;
(*service_params)[WPASupplicant::kNetworkPropertyBgscan].writer()
.append_string(config_string.c_str());
}
string WiFi::GetBgscanMethod(const int &/*argument*/, Error */* error */) {
return bgscan_method_.empty() ? kDefaultBgscanMethod : bgscan_method_;
}
bool WiFi::SetBgscanMethod(
const int &/*argument*/, const string &method, Error *error) {
if (method != WPASupplicant::kNetworkBgscanMethodSimple &&
method != WPASupplicant::kNetworkBgscanMethodLearn &&
method != WPASupplicant::kNetworkBgscanMethodNone) {
const string error_message =
StringPrintf("Unrecognized bgscan method %s", method.c_str());
LOG(WARNING) << error_message;
error->Populate(Error::kInvalidArguments, error_message);
return false;
}
if (bgscan_method_ == method) {
return false;
}
bgscan_method_ = method;
// We do not update kNetworkPropertyBgscan for |pending_service_| or
// |current_service_|, because supplicant does not allow for
// reconfiguration without disconnect and reconnect.
return true;
}
bool WiFi::SetBgscanShortInterval(const uint16 &seconds, Error */*error*/) {
if (bgscan_short_interval_seconds_ == seconds) {
return false;
}
bgscan_short_interval_seconds_ = seconds;
// We do not update kNetworkPropertyBgscan for |pending_service_| or
// |current_service_|, because supplicant does not allow for
// reconfiguration without disconnect and reconnect.
return true;
}
bool WiFi::SetBgscanSignalThreshold(const int32 &dbm, Error */*error*/) {
if (bgscan_signal_threshold_dbm_ == dbm) {
return false;
}
bgscan_signal_threshold_dbm_ = dbm;
// We do not update kNetworkPropertyBgscan for |pending_service_| or
// |current_service_|, because supplicant does not allow for
// reconfiguration without disconnect and reconnect.
return true;
}
bool WiFi::SetRoamThreshold(const uint16 &threshold, Error */*error*/) {
roam_threshold_db_ = threshold;
supplicant_interface_proxy_->SetRoamThreshold(threshold);
return true;
}
bool WiFi::SetScanInterval(const uint16 &seconds, Error */*error*/) {
if (scan_interval_seconds_ == seconds) {
return false;
}
scan_interval_seconds_ = seconds;
if (running()) {
StartScanTimer();
}
// The scan interval affects both foreground scans (handled by
// |scan_timer_callback_|), and background scans (handled by
// supplicant). However, we do not update |pending_service_| or
// |current_service_|, because supplicant does not allow for
// reconfiguration without disconnect and reconnect.
return true;
}
void WiFi::ClearBgscanMethod(const int &/*argument*/, Error */*error*/) {
bgscan_method_.clear();
}
void WiFi::CurrentBSSChanged(const ::DBus::Path &new_bss) {
SLOG(WiFi, 3) << "WiFi " << link_name() << " CurrentBSS "
<< supplicant_bss_ << " -> " << new_bss;
supplicant_bss_ = new_bss;
has_already_completed_ = false;
is_roaming_in_progress_ = false;
// Any change in CurrentBSS means supplicant is actively changing our
// connectivity. We no longer need to track any previously pending
// reconnect.
StopReconnectTimer();
StopRequestingStationInfo();
if (new_bss == WPASupplicant::kCurrentBSSNull) {
HandleDisconnect();
if (!provider_->GetHiddenSSIDList().empty()) {
// Before disconnecting, wpa_supplicant probably scanned for
// APs. So, in the normal case, we defer to the timer for the next scan.
//
// However, in the case of hidden SSIDs, supplicant knows about
// at most one of them. (That would be the hidden SSID we were
// connected to, if applicable.)
//
// So, in this case, we initiate an immediate scan. This scan
// will include the hidden SSIDs we know about (up to the limit of
// kScanMAxSSIDsPerScan).
//
// We may want to reconsider this immediate scan, if/when shill
// takes greater responsibility for scanning (vs. letting
// supplicant handle most of it).
Scan(kProgressiveScan, NULL, __func__);
}
} else {
HandleRoam(new_bss);
}
// Reset the EAP handler only after calling HandleDisconnect() above
// so our EAP state could be used to detect a failed authentication.
eap_state_handler_->Reset();
// If we are selecting a new service, or if we're clearing selection
// of a something other than the pending service, call SelectService.
// Otherwise skip SelectService, since this will cause the pending
// service to be marked as Idle.
if (current_service_ || selected_service() != pending_service_) {
SelectService(current_service_);
}
// Invariant check: a Service can either be current, or pending, but
// not both.
CHECK(current_service_.get() != pending_service_.get() ||
current_service_.get() == NULL);
// If we are no longer debugging a problematic WiFi connection, return
// to the debugging level indicated by the WiFi debugging scope.
if ((!current_service_ || !current_service_->HasRecentConnectionIssues()) &&
(!pending_service_ || !pending_service_->HasRecentConnectionIssues())) {
SetConnectionDebugging(false);
}
}
void WiFi::HandleDisconnect() {
// Identify the affected service. We expect to get a disconnect
// event when we fall off a Service that we were connected
// to. However, we also allow for the case where we get a disconnect
// event while attempting to connect from a disconnected state.
WiFiService *affected_service =
current_service_.get() ? current_service_.get() : pending_service_.get();
if (!affected_service) {
SLOG(WiFi, 2) << "WiFi " << link_name()
<< " disconnected while not connected or connecting";
return;
}
SLOG(WiFi, 2) << "WiFi " << link_name() << " disconnected from "
<< " (or failed to connect to) service "
<< affected_service->unique_name();
if (affected_service == current_service_.get() && pending_service_.get()) {
// Current service disconnected intentionally for network switching,
// set service state to idle.
affected_service->SetState(Service::kStateIdle);
} else {
// Perform necessary handling for disconnected service.
ServiceDisconnected(affected_service);
}
current_service_ = NULL;
if (affected_service == selected_service()) {
// If our selected service has disconnected, destroy IP configuration state.
DropConnection();
}
Error error;
if (!DisableNetworkForService(affected_service, &error)) {
if (error.type() == Error::kNotFound) {
SLOG(WiFi, 2) << "WiFi " << link_name() << " disconnected from "
<< " (or failed to connect to) service "
<< affected_service->unique_name() << ", "
<< "but could not find supplicant network to disable.";
} else {
LOG(FATAL) << "DisableNetwork failed on " << link_name()
<< "for service " << affected_service->unique_name() << ".";
}
}
metrics()->NotifySignalAtDisconnect(*affected_service,
affected_service->SignalLevel());
affected_service->NotifyCurrentEndpoint(NULL);
metrics()->NotifyServiceDisconnect(*affected_service);
if (affected_service == pending_service_.get()) {
// The attempt to connect to |pending_service_| failed. Clear
// |pending_service_|, to indicate we're no longer in the middle
// of a connect request.
SetPendingService(NULL);
} else if (pending_service_.get()) {
// We've attributed the disconnection to what was the
// |current_service_|, rather than the |pending_service_|.
//
// If we're wrong about that (i.e. supplicant reported this
// CurrentBSS change after attempting to connect to
// |pending_service_|), we're depending on supplicant to retry
// connecting to |pending_service_|, and delivering another
// CurrentBSS change signal in the future.
//
// Log this fact, to help us debug (in case our assumptions are
// wrong).
SLOG(WiFi, 2) << "WiFi " << link_name() << " pending connection to service "
<< pending_service_->unique_name()
<< " after disconnect";
}
// If we disconnect, initially scan at a faster frequency, to make sure
// we've found all available APs.
RestartFastScanAttempts();
}
void WiFi::ServiceDisconnected(WiFiServiceRefPtr affected_service){
// Check if service was explicitly disconnected due to failure or
// is explicitly disconnected by user.
if (!affected_service->IsInFailState() &&
!affected_service->explicitly_disconnected() &&
!affected_service->expecting_disconnect()) {
// Determine disconnect failure reason.
Service::ConnectFailure failure;
if (SuspectCredentials(affected_service, &failure)) {
// If we suspect bad credentials, set failure, to trigger an error
// mole in Chrome.
affected_service->SetFailure(failure);
LOG(ERROR) << "Connection failure is due to suspect credentials: "
<< "returning "
<< Service::ConnectFailureToString(failure);
} else {
// Disconnected due to inability to connect to service, most likely
// due to roaming out of range.
LOG(ERROR) << "Disconnected due to inability to connect to the service.";
affected_service->SetFailure(Service::kFailureOutOfRange);
}
}
// Set service state back to idle, so this service can be used for
// future connections.
affected_service->SetState(Service::kStateIdle);
}
// We use the term "Roam" loosely. In particular, we include the case
// where we "Roam" to a BSS from the disconnected state.
void WiFi::HandleRoam(const ::DBus::Path &new_bss) {
EndpointMap::iterator endpoint_it = endpoint_by_rpcid_.find(new_bss);
if (endpoint_it == endpoint_by_rpcid_.end()) {
LOG(WARNING) << "WiFi " << link_name() << " connected to unknown BSS "
<< new_bss;
return;
}
const WiFiEndpointConstRefPtr endpoint(endpoint_it->second);
WiFiServiceRefPtr service = provider_->FindServiceForEndpoint(endpoint);
if (!service.get()) {
LOG(WARNING) << "WiFi " << link_name()
<< " could not find Service for Endpoint "
<< endpoint->bssid_string()
<< " (service will be unchanged)";
return;
}
SLOG(WiFi, 2) << "WiFi " << link_name()
<< " roamed to Endpoint " << endpoint->bssid_string()
<< " " << LogSSID(endpoint->ssid_string());
service->NotifyCurrentEndpoint(endpoint);
if (pending_service_.get() &&
service.get() != pending_service_.get()) {
// The Service we've roamed on to is not the one we asked for.
// We assume that this is transient, and that wpa_supplicant
// is trying / will try to connect to |pending_service_|.
//
// If it succeeds, we'll end up back here, but with |service|
// pointing at the same service as |pending_service_|.
//
// If it fails, we'll process things in HandleDisconnect.
//
// So we leave |pending_service_| untouched.
SLOG(WiFi, 2) << "WiFi " << link_name()
<< " new current Endpoint "
<< endpoint->bssid_string()
<< " is not part of pending service "
<< pending_service_->unique_name();
// Sanity check: if we didn't roam onto |pending_service_|, we
// should still be on |current_service_|.
if (service.get() != current_service_.get()) {
LOG(WARNING) << "WiFi " << link_name()
<< " new current Endpoint "
<< endpoint->bssid_string()
<< " is neither part of pending service "
<< pending_service_->unique_name()
<< " nor part of current service "
<< (current_service_ ?
current_service_->unique_name() :
"(NULL)");
// Although we didn't expect to get here, we should keep
// |current_service_| in sync with what supplicant has done.
current_service_ = service;
}
return;
}
if (pending_service_.get()) {
// We assume service.get() == pending_service_.get() here, because
// of the return in the previous if clause.
//
// Boring case: we've connected to the service we asked
// for. Simply update |current_service_| and |pending_service_|.
current_service_ = service;
SetScanState(kScanConnected, scan_method_, __func__);
SetPendingService(NULL);
return;
}
// |pending_service_| was NULL, so we weren't attempting to connect
// to a new Service. Sanity check that we're still on
// |current_service_|.
if (service.get() != current_service_.get()) {
LOG(WARNING)
<< "WiFi " << link_name()
<< " new current Endpoint "
<< endpoint->bssid_string()
<< (current_service_.get() ?
StringPrintf(" is not part of current service %s",
current_service_->unique_name().c_str()) :
" with no current service");
// We didn't expect to be here, but let's cope as well as we
// can. Update |current_service_| to keep it in sync with
// supplicant.
current_service_ = service;
// If this service isn't already marked as actively connecting (likely,
// since this service is a bit of a surprise) set the service as
// associating.
if (!current_service_->IsConnecting()) {
current_service_->SetState(Service::kStateAssociating);
}
return;
}
// At this point, we know that |pending_service_| was NULL, and that
// we're still on |current_service_|. We should track this roaming
// event so we can refresh our IPConfig if it succeeds.
is_roaming_in_progress_ = true;
return;
}
string WiFi::FindNetworkRpcidForService(
const WiFiService *service, Error *error) {
ReverseServiceMap::const_iterator rpcid_it =
rpcid_by_service_.find(service);
if (rpcid_it == rpcid_by_service_.end()) {
const string error_message =
StringPrintf(
"WiFi %s cannot find supplicant network rpcid for service %s",
link_name().c_str(), service->unique_name().c_str());
// There are contexts where this is not an error, such as when a service
// is clearing whatever cached credentials may not exist.
SLOG(WiFi, 2) << error_message;
if (error) {
error->Populate(Error::kNotFound, error_message);
}
return "";
}
return rpcid_it->second;
}
bool WiFi::DisableNetworkForService(const WiFiService *service, Error *error) {
string rpcid = FindNetworkRpcidForService(service, error);
if (rpcid.empty()) {
// Error is already populated.
return false;
}
if (!DisableNetwork(rpcid)) {
const string error_message =
StringPrintf("WiFi %s cannot disable network for service %s: "
"DBus operation failed for rpcid %s.",
link_name().c_str(), service->unique_name().c_str(),
rpcid.c_str());
Error::PopulateAndLog(error, Error::kOperationFailed, error_message);
// Make sure that such errored networks are removed, so problems do not
// propagate to future connection attempts.
RemoveNetwork(rpcid);
rpcid_by_service_.erase(service);
return false;
}
return true;
}
bool WiFi::RemoveNetworkForService(const WiFiService *service, Error *error) {
string rpcid = FindNetworkRpcidForService(service, error);
if (rpcid.empty()) {
// Error is already populated.
return false;
}
// Erase the rpcid from our tables regardless of failure below, since even
// if in failure, we never want to use this network again.
rpcid_by_service_.erase(service);
// TODO(quiche): Reconsider giving up immediately. Maybe give
// wpa_supplicant some time to retry, first.
if (!RemoveNetwork(rpcid)) {
const string error_message =
StringPrintf("WiFi %s cannot remove network for service %s: "
"DBus operation failed for rpcid %s.",
link_name().c_str(), service->unique_name().c_str(),
rpcid.c_str());
Error::PopulateAndLog(error, Error::kOperationFailed, error_message);
return false;
}
return true;
}
void WiFi::BSSAddedTask(
const ::DBus::Path &path,
const map<string, ::DBus::Variant> &properties) {
// Note: we assume that BSSIDs are unique across endpoints. This
// means that if an AP reuses the same BSSID for multiple SSIDs, we
// lose.
WiFiEndpointRefPtr endpoint(
new WiFiEndpoint(proxy_factory_, this, path, properties));
SLOG(WiFi, 1) << "Found endpoint. "
<< "RPC path: " << path << ", "
<< LogSSID(endpoint->ssid_string()) << ", "
<< "bssid: " << endpoint->bssid_string() << ", "
<< "signal: " << endpoint->signal_strength() << ", "
<< "security: " << endpoint->security_mode() << ", "
<< "frequency: " << endpoint->frequency();
if (endpoint->ssid_string().empty()) {
// Don't bother trying to find or create a Service for an Endpoint
// without an SSID. We wouldn't be able to connect to it anyway.
return;
}
if (endpoint->ssid()[0] == 0) {
// Assume that an SSID starting with NULL is bogus/misconfigured,
// and filter it out.
return;
}
provider_->OnEndpointAdded(endpoint);
// Do this last, to maintain the invariant that any Endpoint we
// know about has a corresponding Service.
//
// TODO(quiche): Write test to verify correct behavior in the case
// where we get multiple BSSAdded events for a single endpoint.
// (Old Endpoint's refcount should fall to zero, and old Endpoint
// should be destroyed.)
endpoint_by_rpcid_[path] = endpoint;
endpoint->Start();
}
void WiFi::BSSRemovedTask(const ::DBus::Path &path) {
EndpointMap::iterator i = endpoint_by_rpcid_.find(path);
if (i == endpoint_by_rpcid_.end()) {
SLOG(WiFi, 1) << "WiFi " << link_name()
<< " could not find BSS " << path
<< " to remove.";
return;
}
WiFiEndpointRefPtr endpoint = i->second;
CHECK(endpoint);
endpoint_by_rpcid_.erase(i);
WiFiServiceRefPtr service = provider_->OnEndpointRemoved(endpoint);
if (!service) {
return;
}
Error unused_error;
RemoveNetworkForService(service, &unused_error);
bool disconnect_service = !service->HasEndpoints() &&
(service->IsConnecting() || service->IsConnected());
if (disconnect_service) {
LOG(INFO) << "Disconnecting from service " << service->unique_name()
<< ": BSSRemoved";
DisconnectFrom(service);
}
}
void WiFi::CertificationTask(
const map<string, ::DBus::Variant> &properties) {
if (!current_service_) {
LOG(ERROR) << "WiFi " << link_name() << " " << __func__
<< " with no current service.";
return;
}
string subject;
uint32 depth;
if (WPASupplicant::ExtractRemoteCertification(properties, &subject, &depth)) {
current_service_->AddEAPCertification(subject, depth);
}
}
void WiFi::EAPEventTask(const string &status, const string &parameter) {
if (!current_service_) {
LOG(ERROR) << "WiFi " << link_name() << " " << __func__
<< " with no current service.";
return;
}
Service::ConnectFailure failure = Service::kFailureUnknown;
eap_state_handler_->ParseStatus(status, parameter, &failure);
if (failure == Service::kFailurePinMissing) {
// wpa_supplicant can sometimes forget the PIN on disconnect from the AP.
const string &pin = current_service_->eap()->pin();
Error unused_error;
string rpcid = FindNetworkRpcidForService(current_service_, &unused_error);
if (!pin.empty() && !rpcid.empty()) {
// We have a PIN configured, so we can provide it back to wpa_supplicant.
LOG(INFO) << "Re-supplying PIN parameter to wpa_supplicant.";
supplicant_interface_proxy_->NetworkReply(
rpcid, WPASupplicant::kEAPRequestedParameterPIN, pin);
failure = Service::kFailureUnknown;
}
}
if (failure != Service::kFailureUnknown) {
// Avoid a reporting failure twice by resetting EAP state handler early.
eap_state_handler_->Reset();
Error unused_error;
current_service_->DisconnectWithFailure(failure, &unused_error);
}
}
void WiFi::PropertiesChangedTask(
const map<string, ::DBus::Variant> &properties) {
// TODO(quiche): Handle changes in other properties (e.g. signal
// strength).
// Note that order matters here. In particular, we want to process
// changes in the current BSS before changes in state. This is so
// that we update the state of the correct Endpoint/Service.
map<string, ::DBus::Variant>::const_iterator properties_it =
properties.find(WPASupplicant::kInterfacePropertyCurrentBSS);
if (properties_it != properties.end()) {
CurrentBSSChanged(properties_it->second.reader().get_path());
}
properties_it = properties.find(WPASupplicant::kInterfacePropertyState);
if (properties_it != properties.end()) {
StateChanged(properties_it->second.reader().get_string());
}
}
void WiFi::ScanDoneTask() {
SLOG(WiFi, 2) << __func__ << " need_bss_flush_ " << need_bss_flush_;
if (scan_session_) {
// Post |ProgressiveScanTask| so it runs after any |BSSAddedTask|s that have
// been posted. This allows connections on new BSSes to be started before
// we decide whether to abort the progressive scan or continue scanning.
dispatcher()->PostTask(
Bind(&WiFi::ProgressiveScanTask, weak_ptr_factory_.GetWeakPtr()));
} else {
// Post |UpdateScanStateAfterScanDone| so it runs after any |BSSAddedTask|s
// that have been posted. This allows connections on new BSSes to be
// started before we decide whether the scan was fruitful.
dispatcher()->PostTask(Bind(&WiFi::UpdateScanStateAfterScanDone,
weak_ptr_factory_.GetWeakPtr()));
}
if (need_bss_flush_) {
CHECK(supplicant_interface_proxy_ != NULL);
// Compute |max_age| relative to |resumed_at_|, to account for the
// time taken to scan.
struct timeval now;
uint32_t max_age;
time_->GetTimeMonotonic(&now);
max_age = kMaxBSSResumeAgeSeconds + (now.tv_sec - resumed_at_.tv_sec);
supplicant_interface_proxy_->FlushBSS(max_age);
need_bss_flush_ = false;
}
StartScanTimer();
}
void WiFi::UpdateScanStateAfterScanDone() {
if (scan_method_ == kScanMethodFull) {
// Only notify the Manager on completion of full scans, since the manager
// will replace any cached geolocation info with the BSSes we have right
// now.
manager()->OnDeviceGeolocationInfoUpdated(this);
}
if (scan_state_ == kScanBackgroundScanning) {
// Going directly to kScanIdle (instead of to kScanFoundNothing) inhibits
// some UMA reporting in SetScanState. That's desired -- we don't want
// to report background scan results to UMA since the drivers may play
// background scans over a longer period in order to not interfere with
// traffic.
SetScanState(kScanIdle, kScanMethodNone, __func__);
} else if (scan_state_ != kScanIdle && IsIdle()) {
SetScanState(kScanFoundNothing, scan_method_, __func__);
}
}
void WiFi::ScanTask() {
SLOG(WiFi, 2) << "WiFi " << link_name() << " scan requested.";
if (!enabled()) {
SLOG(WiFi, 2) << "Ignoring scan request while device is not enabled.";
SetScanState(kScanIdle, kScanMethodNone, __func__); // Probably redundant.
return;
}
if (!supplicant_present_ || !supplicant_interface_proxy_.get()) {
SLOG(WiFi, 2) << "Ignoring scan request while supplicant is not present.";
SetScanState(kScanIdle, kScanMethodNone, __func__);
return;
}
if ((pending_service_.get() && pending_service_->IsConnecting()) ||
(current_service_.get() && current_service_->IsConnecting())) {
SLOG(WiFi, 2) << "Ignoring scan request while connecting to an AP.";
return;
}
map<string, DBus::Variant> scan_args;
scan_args[WPASupplicant::kPropertyScanType].writer().
append_string(WPASupplicant::kScanTypeActive);
ByteArrays hidden_ssids = provider_->GetHiddenSSIDList();
if (!hidden_ssids.empty()) {
// TODO(pstew): Devise a better method for time-sharing with SSIDs that do
// not fit in.
if (hidden_ssids.size() >= WPASupplicant::kScanMaxSSIDsPerScan) {
hidden_ssids.erase(
hidden_ssids.begin() + WPASupplicant::kScanMaxSSIDsPerScan - 1,
hidden_ssids.end());
}
// Add Broadcast SSID, signified by an empty ByteArray. If we specify
// SSIDs to wpa_supplicant, we need to explicitly specify the default
// behavior of doing a broadcast probe.
hidden_ssids.push_back(ByteArray());
scan_args[WPASupplicant::kPropertyScanSSIDs] =
DBusAdaptor::ByteArraysToVariant(hidden_ssids);
}
try {
// Only set the scan state/method if we are starting a full scan from
// scratch. Keep the existing method if this is a failover from a
// progressive scan.
if (scan_state_ != kScanScanning) {
SetScanState(IsIdle() ? kScanScanning : kScanBackgroundScanning,
kScanMethodFull, __func__);
}
supplicant_interface_proxy_->Scan(scan_args);
} catch (const DBus::Error &e) { // NOLINT
// A scan may fail if, for example, the wpa_supplicant vanishing
// notification is posted after this task has already started running.
LOG(WARNING) << "Scan failed: " << e.what();
}
}
void WiFi::ProgressiveScanTask() {
SLOG(WiFi, 2) << __func__ << " - scan requested for " << link_name();
if (!enabled()) {
LOG(INFO) << "Ignoring scan request while device is not enabled.";
SetScanState(kScanIdle, kScanMethodNone, __func__); // Probably redundant.
return;
}
if (!scan_session_) {
SLOG(WiFi, 2) << "No scan session -- returning";
SetScanState(kScanIdle, kScanMethodNone, __func__);
return;
}
// TODO(wdg): We don't currently support progressive background scans. If
// we did, we couldn't bail out, here, if we're connected. Progressive scan
// state will have to be modified to include whether there was a connection
// when the scan started. Then, this code would only bail out if we didn't
// start with a connection but one exists at this point.
if (!IsIdle()) {
SLOG(WiFi, 2) << "Ignoring scan request while connecting to an AP.";
scan_session_.reset();
return;
}
if (scan_session_->HasMoreFrequencies()) {
SLOG(WiFi, 2) << "Initiating a scan -- returning";
SetScanState(kScanScanning, kScanMethodProgressive, __func__);
// After us initiating a scan, supplicant will gather the scan results and
// send us zero or more |BSSAdded| events followed by a |ScanDone|.
scan_session_->InitiateScan();
return;
}
LOG(ERROR) << "A complete progressive scan turned-up nothing -- "
<< "do a regular scan";
scan_session_.reset();
SetScanState(kScanScanning, kScanMethodProgressiveFinishedToFull, __func__);
LOG(INFO) << "Scan [full] on " << link_name()
<< " (connected to nothing on progressive scan) from " << __func__;
ScanTask();
}
void WiFi::OnFailedProgressiveScan() {
LOG(ERROR) << "Couldn't issue a scan on " << link_name()
<< " -- doing a regular scan";
scan_session_.reset();
SetScanState(kScanScanning, kScanMethodProgressiveErrorToFull, __func__);
LOG(INFO) << "Scan [full] on " << link_name()
<< " (failover from progressive scan) from " << __func__;
ScanTask();
}
string WiFi::GetServiceLeaseName(const WiFiService &service) {
return service.GetStorageIdentifier();
}
void WiFi::DestroyServiceLease(const WiFiService &service) {
DestroyIPConfigLease(GetServiceLeaseName(service));
}
void WiFi::StateChanged(const string &new_state) {
const string old_state = supplicant_state_;
supplicant_state_ = new_state;
LOG(INFO) << "WiFi " << link_name() << " " << __func__ << " "
<< old_state << " -> " << new_state;
WiFiService *affected_service;
// Identify the service to which the state change applies. If
// |pending_service_| is non-NULL, then the state change applies to
// |pending_service_|. Otherwise, it applies to |current_service_|.
//
// This policy is driven by the fact that the |pending_service_|
// doesn't become the |current_service_| until wpa_supplicant
// reports a CurrentBSS change to the |pending_service_|. And the
// CurrentBSS change won't be reported until the |pending_service_|
// reaches the WPASupplicant::kInterfaceStateCompleted state.
affected_service =
pending_service_.get() ? pending_service_.get() : current_service_.get();
if (!affected_service) {
SLOG(WiFi, 2) << "WiFi " << link_name() << " " << __func__
<< " with no service";
return;
}
if (new_state == WPASupplicant::kInterfaceStateCompleted) {
if (affected_service->IsConnected()) {
StopReconnectTimer();
EnableHighBitrates();
if (is_roaming_in_progress_) {
// This means wpa_supplicant completed a roam without an intervening
// disconnect. We should renew our DHCP lease just in case the new
// AP is on a different subnet than where we started.
is_roaming_in_progress_ = false;
const IPConfigRefPtr &ip_config = ipconfig();
if (ip_config) {
LOG(INFO) << link_name() << " renewing L3 configuration after roam.";
ip_config->RenewIP();
}
}
} else if (has_already_completed_) {
LOG(INFO) << link_name() << " L3 configuration already started.";
} else {
provider_->IncrementConnectCount(affected_service->frequency());
if (AcquireIPConfigWithLeaseName(
GetServiceLeaseName(*affected_service))) {
LOG(INFO) << link_name() << " is up; started L3 configuration.";
affected_service->SetState(Service::kStateConfiguring);
if (affected_service->IsSecurityMatch(kSecurityWep)) {
// With the overwhelming majority of WEP networks, we cannot assume
// our credentials are correct just because we have successfully
// connected. It is more useful to track received data as the L3
// configuration proceeds to see if we can decrypt anything.
receive_byte_count_at_connect_ = GetReceiveByteCount();
} else {
affected_service->ResetSuspectedCredentialFailures();
}
} else {
LOG(ERROR) << "Unable to acquire DHCP config.";
}
}
has_already_completed_ = true;
} else if (new_state == WPASupplicant::kInterfaceStateAssociated) {
affected_service->SetState(Service::kStateAssociating);
} else if (new_state == WPASupplicant::kInterfaceStateAuthenticating ||
new_state == WPASupplicant::kInterfaceStateAssociating ||
new_state == WPASupplicant::kInterfaceState4WayHandshake ||
new_state == WPASupplicant::kInterfaceStateGroupHandshake) {
// Ignore transitions into these states from Completed, to avoid
// bothering the user when roaming, or re-keying.
if (old_state != WPASupplicant::kInterfaceStateCompleted)
affected_service->SetState(Service::kStateAssociating);
// TODO(quiche): On backwards transitions, we should probably set
// a timeout for getting back into the completed state. At present,
// we depend on wpa_supplicant eventually reporting that CurrentBSS
// has changed. But there may be cases where that signal is not sent.
// (crbug.com/206208)
} else if (new_state == WPASupplicant::kInterfaceStateDisconnected &&
affected_service == current_service_ &&
affected_service->IsConnected()) {
// This means that wpa_supplicant failed in a re-connect attempt, but
// may still be reconnecting. Give wpa_supplicant a limited amount of
// time to transition out this condition by either connecting or changing
// CurrentBSS.
StartReconnectTimer();
} else {
// Other transitions do not affect Service state.
//
// Note in particular that we ignore a State change into
// kInterfaceStateDisconnected, in favor of observing the corresponding
// change in CurrentBSS.
}
}
bool WiFi::SuspectCredentials(
WiFiServiceRefPtr service, Service::ConnectFailure *failure) const {
if (service->IsSecurityMatch(kSecurityPsk)) {
if (supplicant_state_ == WPASupplicant::kInterfaceState4WayHandshake &&
service->AddSuspectedCredentialFailure()) {
if (failure) {
*failure = Service::kFailureBadPassphrase;
}
return true;
}
} else if (service->IsSecurityMatch(kSecurity8021x)) {
if (eap_state_handler_->is_eap_in_progress() &&
service->AddSuspectedCredentialFailure()) {
if (failure) {
*failure = Service::kFailureEAPAuthentication;
}
return true;
}
}
return false;
}
// static
bool WiFi::SanitizeSSID(string *ssid) {
CHECK(ssid);
size_t ssid_len = ssid->length();
size_t i;
bool changed = false;
for (i = 0; i < ssid_len; ++i) {
if (!g_ascii_isprint((*ssid)[i])) {
(*ssid)[i] = '?';
changed = true;
}
}
return changed;
}
// static
string WiFi::LogSSID(const string &ssid) {
string out;
for (string::const_iterator it = ssid.begin(); it != ssid.end(); ++it) {
// Replace '[' and ']' (in addition to non-printable characters) so that
// it's easy to match the right substring through a non-greedy regex.
if (*it == '[' || *it == ']' || !g_ascii_isprint(*it)) {
base::StringAppendF(&out, "\\x%02x", *it);
} else {
out += *it;
}
}
return StringPrintf("[SSID=%s]", out.c_str());
}
void WiFi::OnLinkMonitorFailure() {
// If we have never found the gateway, let's be conservative and not
// do anything, in case this network topology does not have a gateway.
if (!link_monitor()->IsGatewayFound()) {
LOG(INFO) << "In " << __func__ << "(): "
<< "Skipping reassociate since gateway was never found.";
return;
}
if (!supplicant_present_) {
LOG(ERROR) << "In " << __func__ << "(): "
<< "wpa_supplicant is not present. Cannot reassociate.";
return;
}
try {
// This will force a transition out of connected, if we are actually
// connected.
supplicant_interface_proxy_->Reattach();
// If we don't eventually get a transition back into a connected state,
// there is something wrong.
StartReconnectTimer();
LOG(INFO) << "In " << __func__ << "(): Called Reattach().";
} catch (const DBus::Error &e) { // NOLINT
LOG(ERROR) << "In " << __func__ << "(): failed to call Reattach().";
return;
}
}
bool WiFi::ShouldUseArpGateway() const {
return true;
}
void WiFi::DisassociateFromService(const WiFiServiceRefPtr &service) {
DisconnectFrom(service);
if (service == selected_service()) {
DropConnection();
}
Error unused_error;
RemoveNetworkForService(service, &unused_error);
}
vector<GeolocationInfo> WiFi::GetGeolocationObjects() const {
vector<GeolocationInfo> objects;
for (EndpointMap::const_iterator it = endpoint_by_rpcid_.begin();
it != endpoint_by_rpcid_.end();
++it) {
GeolocationInfo geoinfo;
WiFiEndpointRefPtr endpoint = it->second;
geoinfo.AddField(kGeoMacAddressProperty, endpoint->bssid_string());
geoinfo.AddField(kGeoSignalStrengthProperty,
StringPrintf("%d", endpoint->signal_strength()));
geoinfo.AddField(
kGeoChannelProperty,
StringPrintf("%d",
Metrics::WiFiFrequencyToChannel(endpoint->frequency())));
// TODO(gauravsh): Include age field. crbug.com/217554
objects.push_back(geoinfo);
}
return objects;
}
void WiFi::HelpRegisterDerivedInt32(
PropertyStore *store,
const string &name,
int32(WiFi::*get)(Error *error),
bool(WiFi::*set)(const int32 &value, Error *error)) {
store->RegisterDerivedInt32(
name,
Int32Accessor(new CustomAccessor<WiFi, int32>(this, get, set)));
}
void WiFi::HelpRegisterDerivedUint16(
PropertyStore *store,
const string &name,
uint16(WiFi::*get)(Error *error),
bool(WiFi::*set)(const uint16 &value, Error *error)) {
store->RegisterDerivedUint16(
name,
Uint16Accessor(new CustomAccessor<WiFi, uint16>(this, get, set)));
}
void WiFi::HelpRegisterConstDerivedBool(
PropertyStore *store,
const string &name,
bool(WiFi::*get)(Error *error)) {
store->RegisterDerivedBool(
name,
BoolAccessor(new CustomAccessor<WiFi, bool>(this, get, NULL)));
}
void WiFi::OnAfterResume() {
LOG(INFO) << __func__;
Device::OnAfterResume(); // May refresh ipconfig_
// We want to flush the BSS cache, but we don't want to conflict
// with an active connection attempt. So record the need to flush,
// and take care of flushing when the next scan completes.
//
// Note that supplicant will automatically expire old cache
// entries (after, e.g., a BSS is not found in two consecutive
// scans). However, our explicit flush accelerates re-association
// in cases where a BSS disappeared while we were asleep. (See,
// e.g. WiFiRoaming.005SuspendRoam.)
time_->GetTimeMonotonic(&resumed_at_);
need_bss_flush_ = true;
// Abort any current scan (at the shill-level; let any request that's
// already gone out finish) since we don't know when it started.
AbortScan();
if (IsIdle()) {
// Not scanning/connecting/connected, so let's get things rolling.
Scan(kProgressiveScan, NULL, __func__);
RestartFastScanAttempts();
} else {
SLOG(WiFi, 1) << __func__
<< " skipping scan, already connecting or connected.";
}
}
void WiFi::AbortScan() {
if (scan_session_) {
scan_session_.reset();
}
SetScanState(kScanIdle, kScanMethodNone, __func__);
}
void WiFi::OnConnected() {
Device::OnConnected();
EnableHighBitrates();
if (current_service_ &&
current_service_->IsSecurityMatch(kSecurityWep)) {
// With a WEP network, we are now reasonably certain the credentials are
// correct, whereas with other network types we were able to determine
// this earlier when the association process succeeded.
current_service_->ResetSuspectedCredentialFailures();
}
RequestStationInfo();
}
void WiFi::OnIPConfigFailure() {
if (!current_service_) {
LOG(ERROR) << "WiFi " << link_name() << " " << __func__
<< " with no current service.";
return;
}
if (current_service_->IsSecurityMatch(kSecurityWep) &&
GetReceiveByteCount() == receive_byte_count_at_connect_ &&
current_service_->AddSuspectedCredentialFailure()) {
// If we've connected to a WEP network and haven't successfully
// decrypted any bytes at all during the configuration process,
// it is fair to suspect that our credentials to this network
// may not be correct.
Error error;
current_service_->DisconnectWithFailure(Service::kFailureBadPassphrase,
&error);
return;
}
Device::OnIPConfigFailure();
}
void WiFi::RestartFastScanAttempts() {
fast_scans_remaining_ = kNumFastScanAttempts;
StartScanTimer();
}
void WiFi::StartScanTimer() {
if (scan_interval_seconds_ == 0) {
StopScanTimer();
return;
}
scan_timer_callback_.Reset(
Bind(&WiFi::ScanTimerHandler, weak_ptr_factory_.GetWeakPtr()));
// Repeat the first few scans after disconnect relatively quickly so we
// have reasonable trust that no APs we are looking for are present.
dispatcher()->PostDelayedTask(scan_timer_callback_.callback(),
fast_scans_remaining_ > 0 ?
kFastScanIntervalSeconds * 1000 : scan_interval_seconds_ * 1000);
}
void WiFi::StopScanTimer() {
scan_timer_callback_.Cancel();
}
void WiFi::ScanTimerHandler() {
SLOG(WiFi, 2) << "WiFi Device " << link_name() << ": " << __func__;
if (scan_state_ == kScanIdle && IsIdle()) {
Scan(kProgressiveScan, NULL, __func__);
if (fast_scans_remaining_ > 0) {
--fast_scans_remaining_;
}
}
StartScanTimer();
}
void WiFi::StartPendingTimer() {
pending_timeout_callback_.Reset(
Bind(&WiFi::PendingTimeoutHandler, weak_ptr_factory_.GetWeakPtr()));
dispatcher()->PostDelayedTask(pending_timeout_callback_.callback(),
kPendingTimeoutSeconds * 1000);
}
void WiFi::StopPendingTimer() {
SLOG(WiFi, 2) << "WiFi Device " << link_name() << ": " << __func__;
pending_timeout_callback_.Cancel();
}
void WiFi::SetPendingService(const WiFiServiceRefPtr &service) {
SLOG(WiFi, 2) << "WiFi " << link_name() << " setting pending service to "
<< (service ? service->unique_name(): "NULL");
if (service) {
SetScanState(kScanConnecting, scan_method_, __func__);
service->SetState(Service::kStateAssociating);
StartPendingTimer();
} else {
// SetPendingService(NULL) is called in the following cases:
// a) |ConnectTo|->|DisconnectFrom|. Connecting to a service, disconnect
// the old service (scan_state_ == kScanTransitionToConnecting). No
// state transition is needed here.
// b) |HandleRoam|. Connected to a service, it's no longer pending
// (scan_state_ == kScanIdle). No state transition is needed here.
// c) |DisconnectFrom| and |HandleDisconnect|. Disconnected/disconnecting
// from a service not during a scan (scan_state_ == kScanIdle). No
// state transition is needed here.
// d) |DisconnectFrom| and |HandleDisconnect|. Disconnected/disconnecting
// from a service during a scan (scan_state_ == kScanScanning or
// kScanConnecting). This is an odd case -- let's discard any
// statistics we're gathering by transitioning directly into kScanIdle.
if (scan_state_ == kScanScanning ||
scan_state_ == kScanBackgroundScanning ||
scan_state_ == kScanConnecting) {
SetScanState(kScanIdle, kScanMethodNone, __func__);
}
if (pending_service_) {
StopPendingTimer();
}
}
pending_service_ = service;
}
void WiFi::PendingTimeoutHandler() {
Error unused_error;
LOG(INFO) << "WiFi Device " << link_name() << ": " << __func__;
CHECK(pending_service_);
SetScanState(kScanFoundNothing, scan_method_, __func__);
pending_service_->DisconnectWithFailure(
Service::kFailureOutOfRange, &unused_error);
// A hidden service may have no endpoints, since wpa_supplicant
// failed to attain a CurrentBSS. If so, the service has no
// reference to |this| device and cannot call WiFi::DisconnectFrom()
// to reset pending_service_. In this case, we must perform the
// disconnect here ourselves.
if (pending_service_) {
CHECK(!pending_service_->HasEndpoints());
LOG(INFO) << "Hidden service was not found.";
DisconnectFrom(pending_service_);
}
}
void WiFi::StartReconnectTimer() {
if (!reconnect_timeout_callback_.IsCancelled()) {
LOG(INFO) << "WiFi Device " << link_name() << ": " << __func__
<< ": reconnect timer already running.";
return;
}
LOG(INFO) << "WiFi Device " << link_name() << ": " << __func__;
reconnect_timeout_callback_.Reset(
Bind(&WiFi::ReconnectTimeoutHandler, weak_ptr_factory_.GetWeakPtr()));
dispatcher()->PostDelayedTask(reconnect_timeout_callback_.callback(),
kReconnectTimeoutSeconds * 1000);
}
void WiFi::StopReconnectTimer() {
SLOG(WiFi, 2) << "WiFi Device " << link_name() << ": " << __func__;
reconnect_timeout_callback_.Cancel();
}
void WiFi::ReconnectTimeoutHandler() {
LOG(INFO) << "WiFi Device " << link_name() << ": " << __func__;
reconnect_timeout_callback_.Cancel();
CHECK(current_service_);
current_service_->SetFailure(Service::kFailureConnect);
DisconnectFrom(current_service_);
}
void WiFi::OnSupplicantAppear(const string &/*name*/, const string &/*owner*/) {
LOG(INFO) << "WPA supplicant appeared.";
if (supplicant_present_) {
// Restart the WiFi device if it's started already. This will reset the
// state and connect the device to the new WPA supplicant instance.
if (enabled()) {
Restart();
}
return;
}
supplicant_present_ = true;
ConnectToSupplicant();
}
void WiFi::OnSupplicantVanish(const string &/*name*/) {
LOG(INFO) << "WPA supplicant vanished.";
if (!supplicant_present_) {
return;
}
supplicant_present_ = false;
// Restart the WiFi device if it's started already. This will effectively
// suspend the device until the WPA supplicant reappears.
if (enabled()) {
Restart();
}
}
void WiFi::OnWiFiDebugScopeChanged(bool enabled) {
SLOG(WiFi, 2) << "WiFi debug scope changed; enable is now " << enabled;
if (!supplicant_process_proxy_.get()) {
SLOG(WiFi, 2) << "Supplicant process proxy not present.";
return;
}
string current_level;
try {
current_level = supplicant_process_proxy_->GetDebugLevel();
} catch (const DBus::Error &e) { // NOLINT
LOG(ERROR) << __func__ << ": Failed to get wpa_supplicant debug level.";
return;
}
if (current_level != WPASupplicant::kDebugLevelInfo &&
current_level != WPASupplicant::kDebugLevelDebug) {
SLOG(WiFi, 2) << "WiFi debug level is currently "
<< current_level
<< "; assuming that it is being controlled elsewhere.";
return;
}
string new_level = enabled ? WPASupplicant::kDebugLevelDebug :
WPASupplicant::kDebugLevelInfo;
if (new_level == current_level) {
SLOG(WiFi, 2) << "WiFi debug level is already the desired level "
<< current_level;
return;
}
try {
supplicant_process_proxy_->SetDebugLevel(new_level);
} catch (const DBus::Error &e) { // NOLINT
LOG(ERROR) << __func__ << ": Failed to set wpa_supplicant debug level.";
}
}
void WiFi::SetConnectionDebugging(bool enabled) {
if (is_debugging_connection_ == enabled) {
return;
}
OnWiFiDebugScopeChanged(
enabled ||
ScopeLogger::GetInstance()->IsScopeEnabled(ScopeLogger::kWiFi));
is_debugging_connection_ = enabled;
}
void WiFi::ConnectToSupplicant() {
LOG(INFO) << link_name() << ": " << (enabled() ? "enabled" : "disabled")
<< " supplicant: "
<< (supplicant_present_ ? "present" : "absent")
<< " proxy: "
<< (supplicant_process_proxy_.get() ? "non-null" : "null");
if (!enabled() || !supplicant_present_ || supplicant_process_proxy_.get()) {
return;
}
supplicant_process_proxy_.reset(
proxy_factory_->CreateSupplicantProcessProxy(
WPASupplicant::kDBusPath, WPASupplicant::kDBusAddr));
OnWiFiDebugScopeChanged(
ScopeLogger::GetInstance()->IsScopeEnabled(ScopeLogger::kWiFi));
::DBus::Path interface_path;
try {
map<string, DBus::Variant> create_interface_args;
create_interface_args[WPASupplicant::kInterfacePropertyName].writer().
append_string(link_name().c_str());
create_interface_args[WPASupplicant::kInterfacePropertyDriver].writer().
append_string(WPASupplicant::kDriverNL80211);
create_interface_args[
WPASupplicant::kInterfacePropertyConfigFile].writer().
append_string(WPASupplicant::kSupplicantConfPath);
interface_path =
supplicant_process_proxy_->CreateInterface(create_interface_args);
} catch (const DBus::Error &e) { // NOLINT
if (!strcmp(e.name(), WPASupplicant::kErrorInterfaceExists)) {
interface_path =
supplicant_process_proxy_->GetInterface(link_name());
// TODO(quiche): Is it okay to crash here, if device is missing?
} else {
LOG(ERROR) << __func__ << ": Failed to create interface with supplicant.";
return;
}
}
supplicant_interface_proxy_.reset(
proxy_factory_->CreateSupplicantInterfaceProxy(
this, interface_path, WPASupplicant::kDBusAddr));
RTNLHandler::GetInstance()->SetInterfaceFlags(interface_index(), IFF_UP,
IFF_UP);
// TODO(quiche) Set ApScan=1 and BSSExpireAge=190, like flimflam does?
// Clear out any networks that might previously have been configured
// for this interface.
supplicant_interface_proxy_->RemoveAllNetworks();
// Flush interface's BSS cache, so that we get BSSAdded signals for
// all BSSes (not just new ones since the last scan).
supplicant_interface_proxy_->FlushBSS(0);
try {
// TODO(pstew): Disable fast_reauth until supplicant can properly deal
// with RADIUS servers that respond strangely to such requests.
// crbug.com/208561
supplicant_interface_proxy_->SetFastReauth(false);
} catch (const DBus::Error &e) { // NOLINT
LOG(ERROR) << "Failed to disable fast_reauth. "
<< "May be running an older version of wpa_supplicant.";
}
try {
supplicant_interface_proxy_->SetRoamThreshold(roam_threshold_db_);
} catch (const DBus::Error &e) { // NOLINT
LOG(ERROR) << "Failed to set roam_threshold. "
<< "May be running an older version of wpa_supplicant.";
}
try {
// Helps with passing WiFiRoaming.001SSIDSwitchBack.
supplicant_interface_proxy_->SetScanInterval(kRescanIntervalSeconds);
} catch (const DBus::Error &e) { // NOLINT
LOG(ERROR) << "Failed to set scan_interval. "
<< "May be running an older version of wpa_supplicant.";
}
try {
supplicant_interface_proxy_->SetDisableHighBitrates(true);
} catch (const DBus::Error &e) { // NOLINT
LOG(ERROR) << "Failed to disable high bitrates. "
<< "May be running an older version of wpa_supplicant.";
}
Scan(kProgressiveScan, NULL, __func__);
StartScanTimer();
}
void WiFi::EnableHighBitrates() {
LOG(INFO) << "Enabling high bitrates.";
try {
supplicant_interface_proxy_->EnableHighBitrates();
} catch (const DBus::Error &e) { // NOLINT
LOG(ERROR) << "exception while enabling high rates: " << e.what();
}
}
void WiFi::Restart() {
LOG(INFO) << link_name() << " restarting.";
WiFiRefPtr me = this; // Make sure we don't get destructed.
// Go through the manager rather than starting and stopping the device
// directly so that the device can be configured with the profile.
manager()->DeregisterDevice(me);
manager()->RegisterDevice(me);
}
void WiFi::ConfigureScanFrequencies() {
GetWiphyMessage get_wiphy;
get_wiphy.attributes()->SetU32AttributeValue(NL80211_ATTR_IFINDEX,
interface_index());
netlink_manager_->SendNl80211Message(
&get_wiphy,
Bind(&WiFi::OnNewWiphy, weak_ptr_factory_.GetWeakPtr()),
Bind(&NetlinkManager::OnNetlinkMessageError));
}
void WiFi::OnNewWiphy(const Nl80211Message &nl80211_message) {
// Verify NL80211_CMD_NEW_WIPHY
if (nl80211_message.command() != NewWiphyMessage::kCommand) {
LOG(ERROR) << "Received unexpected command:"
<< nl80211_message.command();
return;
}
// The attributes, for this message, are complicated.
// NL80211_ATTR_BANDS contains an array of bands...
AttributeListConstRefPtr wiphy_bands;
if (!nl80211_message.const_attributes()->ConstGetNestedAttributeList(
NL80211_ATTR_WIPHY_BANDS, &wiphy_bands)) {
LOG(ERROR) << "NL80211_CMD_NEW_WIPHY had no NL80211_ATTR_WIPHY_BANDS";
return;
}
AttributeIdIterator band_iter(*wiphy_bands);
for (; !band_iter.AtEnd(); band_iter.Advance()) {
AttributeListConstRefPtr wiphy_band;
if (!wiphy_bands->ConstGetNestedAttributeList(band_iter.GetId(),
&wiphy_band)) {
LOG(WARNING) << "WiFi band " << band_iter.GetId() << " not found";
continue;
}
// ...Each band has a FREQS attribute...
AttributeListConstRefPtr frequencies;
if (!wiphy_band->ConstGetNestedAttributeList(NL80211_BAND_ATTR_FREQS,
&frequencies)) {
LOG(ERROR) << "BAND " << band_iter.GetId()
<< " had no 'frequencies' attribute";
continue;
}
// ...And each FREQS attribute contains an array of information about the
// frequency...
AttributeIdIterator freq_iter(*frequencies);
for (; !freq_iter.AtEnd(); freq_iter.Advance()) {
AttributeListConstRefPtr frequency;
if (frequencies->ConstGetNestedAttributeList(freq_iter.GetId(),
&frequency)) {
// ...Including the frequency, itself (the part we want).
uint32_t frequency_value = 0;
if (frequency->GetU32AttributeValue(NL80211_FREQUENCY_ATTR_FREQ,
&frequency_value)) {
SLOG(WiFi, 7) << "Found frequency[" << freq_iter.GetId()
<< "] = " << frequency_value;
all_scan_frequencies_.insert(frequency_value);
}
}
}
}
}
KeyValueStore WiFi::GetLinkStatistics(Error */*error*/) {
return link_statistics_;
}
bool WiFi::GetScanPending(Error */* error */) {
return scan_state_ == kScanScanning || scan_state_ == kScanBackgroundScanning;
}
void WiFi::SetScanState(ScanState new_state,
ScanMethod new_method,
const char *reason) {
if (new_state == kScanIdle)
new_method = kScanMethodNone;
if (new_state == kScanConnected) {
// The scan method shouldn't be changed by the connection process, so
// we'll put a CHECK, here, to verify. NOTE: this assumption is also
// enforced by the parameters to the call to |ReportScanResultToUma|.
CHECK(new_method == scan_method_);
}
int log_level = 6;
bool state_or_method_changed = true;
bool is_terminal_state = false;
if (new_state == scan_state_ && new_method == scan_method_) {
log_level = 7;
state_or_method_changed = false;
} else if (new_state == kScanConnected || new_state == kScanFoundNothing) {
// These 'terminal' states are slightly more interesting than the
// intermediate states.
// NOTE: Since background scan goes directly to kScanIdle (skipping over
// the states required to set |is_terminal_state|), ReportScanResultToUma,
// below, doesn't get called. That's intentional.
log_level = 5;
is_terminal_state = true;
}
base::TimeDelta elapsed_time;
if (new_state == kScanScanning || new_state == kScanBackgroundScanning) {
if (!scan_timer_.Start()) {
LOG(ERROR) << "Scan start unreliable";
}
} else {
if (!scan_timer_.GetElapsedTime(&elapsed_time)) {
LOG(ERROR) << "Scan time unreliable";
}
}
SLOG(WiFi, log_level) << (reason ? reason : "<unknown>")
<< " - " << link_name()
<< ": Scan state: "
<< ScanStateString(scan_state_, scan_method_)
<< " -> " << ScanStateString(new_state, new_method)
<< " @ " << elapsed_time.InMillisecondsF()
<< " ms into scan.";
if (!state_or_method_changed)
return;
// Actually change the state.
ScanState old_state = scan_state_;
ScanMethod old_method = scan_method_;
bool old_scan_pending = GetScanPending(NULL);
scan_state_ = new_state;
scan_method_ = new_method;
bool new_scan_pending = GetScanPending(NULL);
if (old_scan_pending != new_scan_pending) {
adaptor()->EmitBoolChanged(kScanningProperty, new_scan_pending);
}
switch (new_state) {
case kScanIdle:
metrics()->ResetScanTimer(interface_index());
metrics()->ResetConnectTimer(interface_index());
if (scan_session_) {
scan_session_.reset();
}
break;
case kScanScanning: // FALLTHROUGH
case kScanBackgroundScanning:
if (new_state != old_state) {
metrics()->NotifyDeviceScanStarted(interface_index());
}
break;
case kScanConnecting:
metrics()->NotifyDeviceScanFinished(interface_index());
// TODO(wdg): Provide |is_auto_connecting| to this interface. For now,
// I'll lie (because I don't care about the auto-connect metrics).
metrics()->NotifyDeviceConnectStarted(interface_index(), false);
break;
case kScanConnected:
metrics()->NotifyDeviceConnectFinished(interface_index());
break;
case kScanFoundNothing:
// Note that finishing a scan that hasn't started (if, for example, we
// get here when we fail to complete a connection) does nothing.
metrics()->NotifyDeviceScanFinished(interface_index());
metrics()->ResetConnectTimer(interface_index());
break;
case kScanTransitionToConnecting: // FALLTHROUGH
default:
break;
}
if (is_terminal_state) {
ReportScanResultToUma(new_state, old_method);
// Now that we've logged a terminal state, let's call ourselves to
// transition to the idle state.
SetScanState(kScanIdle, kScanMethodNone, reason);
}
}
// static
string WiFi::ScanStateString(ScanState state, ScanMethod method) {
switch (state) {
case kScanIdle:
return "IDLE";
case kScanScanning:
DCHECK(method != kScanMethodNone) << "Scanning with no scan method.";
switch (method) {
case kScanMethodFull:
return "FULL_START";
case kScanMethodProgressive:
return "PROGRESSIVE_START";
case kScanMethodProgressiveErrorToFull:
return "PROGRESSIVE_ERROR_FULL_START";
case kScanMethodProgressiveFinishedToFull:
return "PROGRESSIVE_FINISHED_FULL_START";
default:
NOTREACHED();
}
case kScanBackgroundScanning:
return "BACKGROUND_START";
case kScanTransitionToConnecting:
return "TRANSITION_TO_CONNECTING";
case kScanConnecting:
switch (method) {
case kScanMethodNone:
return "CONNECTING (not scan related)";
case kScanMethodFull:
return "FULL_CONNECTING";
case kScanMethodProgressive:
return "PROGRESSIVE_CONNECTING";
case kScanMethodProgressiveErrorToFull:
return "PROGRESSIVE_ERROR_FULL_CONNECTING";
case kScanMethodProgressiveFinishedToFull:
return "PROGRESSIVE_FINISHED_FULL_CONNECTING";
default:
NOTREACHED();
}
case kScanConnected:
switch (method) {
case kScanMethodNone:
return "CONNECTED (not scan related; e.g., from a supplicant roam)";
case kScanMethodFull:
return "FULL_CONNECTED";
case kScanMethodProgressive:
return "PROGRESSIVE_CONNECTED";
case kScanMethodProgressiveErrorToFull:
return "PROGRESSIVE_ERROR_FULL_CONNECTED";
case kScanMethodProgressiveFinishedToFull:
return "PROGRESSIVE_FINISHED_FULL_CONNECTED";
default:
NOTREACHED();
}
case kScanFoundNothing:
switch (method) {
case kScanMethodNone:
return "CONNECT FAILED (not scan related)";
case kScanMethodFull:
return "FULL_NOCONNECTION";
case kScanMethodProgressive:
// This is possible if shill started to connect but timed out before
// the connection was completed.
return "PROGRESSIVE_FINISHED_NOCONNECTION";
case kScanMethodProgressiveErrorToFull:
return "PROGRESSIVE_ERROR_FULL_NOCONNECTION";
case kScanMethodProgressiveFinishedToFull:
return "PROGRESSIVE_FINISHED_FULL_NOCONNECTION";
default:
NOTREACHED();
}
default:
NOTREACHED();
}
return ""; // To shut up the compiler (that doesn't understand NOTREACHED).
}
void WiFi::ReportScanResultToUma(ScanState state, ScanMethod method) {
Metrics::WiFiScanResult result = Metrics::kScanResultMax;
if (state == kScanConnected) {
switch (method) {
case kScanMethodFull:
result = Metrics::kScanResultFullScanConnected;
break;
case kScanMethodProgressive:
result = Metrics::kScanResultProgressiveConnected;
break;
case kScanMethodProgressiveErrorToFull:
result = Metrics::kScanResultProgressiveErrorButFullConnected;
break;
case kScanMethodProgressiveFinishedToFull:
result = Metrics::kScanResultProgressiveAndFullConnected;
break;
default:
// OK: Connect resulting from something other than scan.
break;
}
} else if (state == kScanFoundNothing) {
switch (method) {
case kScanMethodFull:
result = Metrics::kScanResultFullScanFoundNothing;
break;
case kScanMethodProgressiveErrorToFull:
result = Metrics::kScanResultProgressiveErrorAndFullFoundNothing;
break;
case kScanMethodProgressiveFinishedToFull:
result = Metrics::kScanResultProgressiveAndFullFoundNothing;
break;
default:
// OK: Connect failed, not scan related.
break;
}
}
if (result != Metrics::kScanResultMax) {
metrics()->SendEnumToUMA(Metrics::kMetricScanResult,
result,
Metrics::kScanResultMax);
}
}
void WiFi::RequestStationInfo() {
if (!current_service_ || !current_service_->IsConnected()) {
LOG(ERROR) << "Not collecting station info because we are not connected.";
return;
}
EndpointMap::iterator endpoint_it = endpoint_by_rpcid_.find(supplicant_bss_);
if (endpoint_it == endpoint_by_rpcid_.end()) {
LOG(ERROR) << "Can't get endpoint for current supplicant BSS "
<< supplicant_bss_;
return;
}
GetStationMessage get_station;
if (!get_station.attributes()->SetU32AttributeValue(NL80211_ATTR_IFINDEX,
interface_index())) {
LOG(ERROR) << "Could not add IFINDEX attribute for GetStation message.";
return;
}
const WiFiEndpointConstRefPtr endpoint(endpoint_it->second);
if (!get_station.attributes()->SetRawAttributeValue(
NL80211_ATTR_MAC,
ByteString::CreateFromHexString(endpoint->bssid_hex()))) {
LOG(ERROR) << "Could not add MAC attribute for GetStation message.";
return;
}
netlink_manager_->SendNl80211Message(
&get_station,
Bind(&WiFi::OnReceivedStationInfo, weak_ptr_factory_.GetWeakPtr()),
Bind(&NetlinkManager::OnNetlinkMessageError));
request_station_info_callback_.Reset(
Bind(&WiFi::RequestStationInfo, weak_ptr_factory_.GetWeakPtr()));
dispatcher()->PostDelayedTask(request_station_info_callback_.callback(),
kRequestStationInfoPeriodSeconds * 1000);
}
void WiFi::OnReceivedStationInfo(const Nl80211Message &nl80211_message) {
// Verify NL80211_CMD_NEW_STATION
if (nl80211_message.command() != NewStationMessage::kCommand) {
LOG(ERROR) << "Received unexpected command:"
<< nl80211_message.command();
return;
}
if (!current_service_ || !current_service_->IsConnected()) {
LOG(ERROR) << "Not accepting station info because we are not connected.";
return;
}
EndpointMap::iterator endpoint_it = endpoint_by_rpcid_.find(supplicant_bss_);
if (endpoint_it == endpoint_by_rpcid_.end()) {
LOG(ERROR) << "Can't get endpoint for current supplicant BSS."
<< supplicant_bss_;
return;
}
ByteString station_bssid;
if (!nl80211_message.const_attributes()->GetRawAttributeValue(
NL80211_ATTR_MAC, &station_bssid)) {
LOG(ERROR) << "Unable to get MAC attribute from received station info.";
return;
}
WiFiEndpointRefPtr endpoint(endpoint_it->second);
if (!station_bssid.Equals(
ByteString::CreateFromHexString(endpoint->bssid_hex()))) {
LOG(ERROR) << "Received station info for a non-current BSS.";
return;
}
AttributeListConstRefPtr station_info;
if (!nl80211_message.const_attributes()->ConstGetNestedAttributeList(
NL80211_ATTR_STA_INFO, &station_info)) {
LOG(ERROR) << "Received station info had no NL80211_ATTR_STA_INFO.";
return;
}
uint8_t signal;
if (!station_info->GetU8AttributeValue(NL80211_STA_INFO_SIGNAL, &signal)) {
LOG(ERROR) << "Received station info had no NL80211_STA_INFO_SIGNAL.";
return;
}
endpoint->UpdateSignalStrength(static_cast<signed char>(signal));
link_statistics_.Clear();
map<int, string> u32_property_map = {
{ NL80211_STA_INFO_INACTIVE_TIME, kInactiveTimeMillisecondsProperty },
{ NL80211_STA_INFO_RX_PACKETS, kPacketReceiveSuccessesProperty },
{ NL80211_STA_INFO_TX_FAILED, kPacketTransmitFailuresProperty },
{ NL80211_STA_INFO_TX_PACKETS, kPacketTransmitSuccessesProperty },
{ NL80211_STA_INFO_TX_RETRIES, kTransmitRetriesProperty }
};
for (const auto &kv : u32_property_map) {
uint32 value;
if (station_info->GetU32AttributeValue(kv.first, &value)) {
link_statistics_.SetUint(kv.second, value);
}
}
map<int, string> s8_property_map = {
{ NL80211_STA_INFO_SIGNAL, kLastReceiveSignalDbmProperty },
{ NL80211_STA_INFO_SIGNAL_AVG, kAverageReceiveSignalDbmProperty }
};
for (const auto &kv : s8_property_map) {
uint8 value;
if (station_info->GetU8AttributeValue(kv.first, &value)) {
// Despite these values being reported as a U8 by the kernel, these
// should be interpreted as signed char.
link_statistics_.SetInt(kv.second, static_cast<signed char>(value));
}
}
AttributeListConstRefPtr transmit_info;
if (station_info->ConstGetNestedAttributeList(
NL80211_STA_INFO_TX_BITRATE, &transmit_info)) {
// TODO(pstew): Support VHT rate parameters. crbug.com/305050
uint16 rate = 0; // In 100Kbps.
uint8 mcs = 0;
bool is_40_mhz = false;
bool is_short_gi = false;
string mcs_info;
transmit_info->GetU16AttributeValue(NL80211_RATE_INFO_BITRATE, &rate);
if (transmit_info->GetU8AttributeValue(NL80211_RATE_INFO_MCS, &mcs)) {
mcs_info = StringPrintf(" MCS %d", mcs);
}
transmit_info->GetFlagAttributeValue(NL80211_RATE_INFO_40_MHZ_WIDTH,
&is_40_mhz);
transmit_info->GetFlagAttributeValue(NL80211_RATE_INFO_SHORT_GI,
&is_short_gi);
if (rate) {
link_statistics_.SetString(kTransmitBitrateProperty,
StringPrintf("%d.%d MBit/s%s%s%s",
rate / 10, rate % 10,
mcs_info.c_str(),
is_40_mhz ? " 40MHz" : "",
is_short_gi ? " short GI" : ""));
}
}
}
void WiFi::StopRequestingStationInfo() {
SLOG(WiFi, 2) << "WiFi Device " << link_name() << ": " << __func__;
request_station_info_callback_.Cancel();
link_statistics_.Clear();
}
bool WiFi::TDLSDiscover(const string &peer) {
try {
supplicant_interface_proxy_->TDLSDiscover(peer);
} catch (const DBus::Error &e) { // NOLINT
LOG(ERROR) << "exception while performing TDLS discover: " << e.what();
return false;
}
return true;
}
bool WiFi::TDLSSetup(const string &peer) {
try {
supplicant_interface_proxy_->TDLSSetup(peer);
} catch (const DBus::Error &e) { // NOLINT
LOG(ERROR) << "exception while performing TDLS setup: " << e.what();
return false;
}
return true;
}
string WiFi::TDLSStatus(const string &peer) {
try {
return supplicant_interface_proxy_->TDLSStatus(peer);
} catch (const DBus::Error &e) { // NOLINT
LOG(ERROR) << "exception while getting TDLS status: " << e.what();
return "";
}
}
bool WiFi::TDLSTeardown(const string &peer) {
try {
supplicant_interface_proxy_->TDLSTeardown(peer);
} catch (const DBus::Error &e) { // NOLINT
LOG(ERROR) << "exception while performing TDLS teardown: " << e.what();
return false;
}
return true;
}
string WiFi::PerformTDLSOperation(const string &operation,
const string &peer,
Error *error) {
bool success = false;
SLOG(WiFi, 2) << "TDLS command received: " << operation
<< " for peer " << peer;
string peer_mac_address;
if (!ResolvePeerMacAddress(peer, &peer_mac_address, error)) {
return "";
}
if (operation == kTDLSDiscoverOperation) {
success = TDLSDiscover(peer_mac_address);
} else if (operation == kTDLSSetupOperation) {
success = TDLSSetup(peer_mac_address);
} else if (operation == kTDLSStatusOperation) {
string supplicant_status = TDLSStatus(peer_mac_address);
SLOG(WiFi, 2) << "TDLS status returned: " << supplicant_status;
if (!supplicant_status.empty()) {
if (supplicant_status == WPASupplicant::kTDLSStateConnected) {
return kTDLSConnectedState;
} else if (supplicant_status == WPASupplicant::kTDLSStateDisabled) {
return kTDLSDisabledState;
} else if (supplicant_status ==
WPASupplicant::kTDLSStatePeerDoesNotExist) {
return kTDLSNonexistentState;
} else if (supplicant_status ==
WPASupplicant::kTDLSStatePeerNotConnected) {
return kTDLSDisconnectedState;
} else {
return kTDLSUnknownState;
}
}
} else if (operation == kTDLSTeardownOperation) {
success = TDLSTeardown(peer_mac_address);
} else {
error->Populate(Error::kInvalidArguments, "Unknown operation");
return "";
}
if (!success) {
Error::PopulateAndLog(error, Error::kOperationFailed,
"TDLS operation failed");
}
return "";
}
bool WiFi::ResolvePeerMacAddress(const string &input, string *output,
Error *error) {
if (!WiFiEndpoint::MakeHardwareAddressFromString(input).empty()) {
// Input is already a MAC address.
*output = input;
return true;
}
IPAddress ip_address(IPAddress::kFamilyIPv4);
if (!ip_address.SetAddressFromString(input)) {
Error::PopulateAndLog(error, Error::kInvalidArguments,
"Peer is neither an IP Address nor a MAC address");
return false;
}
// Peer address was specified as an IP address which we need to resolve.
const DeviceInfo *device_info = manager()->device_info();
if (!device_info->HasDirectConnectivityTo(interface_index(), ip_address)) {
Error::PopulateAndLog(error, Error::kInvalidArguments,
"IP address is not local to this interface");
return false;
}
ByteString mac_address;
if (device_info->GetMACAddressOfPeer(
interface_index(), ip_address, &mac_address)) {
*output = WiFiEndpoint::MakeStringFromHardwareAddress(
vector<uint8_t>(mac_address.GetConstData(),
mac_address.GetConstData() +
mac_address.GetLength()));
SLOG(WiFi, 2) << "ARP cache lookup returned peer: " << *output;
return true;
}
if (!Icmp().TransmitEchoRequest(ip_address)) {
Error::PopulateAndLog(error, Error::kOperationFailed,
"Failed to send ICMP reqeust to peer to setup ARP");
} else {
// ARP request was transmitted successfully, but overall the attempt
// to perform a TDLS operation has failed.
error->Populate(Error::kInProgress,
"Peer MAC address was not found in the ARP cache, "
"but an ARP request was sent to find it. "
"Please try again.");
}
return false;
}
} // namespace shill