# Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
import collections
import copy
import logging
import random
import string
import tempfile
import time
from autotest_lib.client.common_lib import error
from autotest_lib.client.common_lib import utils
from autotest_lib.client.common_lib.cros import path_utils
from autotest_lib.client.common_lib.cros.network import interface
from autotest_lib.client.common_lib.cros.network import netblock
from autotest_lib.client.common_lib.cros.network import ping_runner
from autotest_lib.server import hosts
from autotest_lib.server import site_linux_system
from autotest_lib.server.cros import dnsname_mangler
from autotest_lib.server.cros.network import hostap_config
StationInstance = collections.namedtuple('StationInstance',
['ssid', 'interface', 'dev_type'])
HostapdInstance = collections.namedtuple('HostapdInstance',
['ssid', 'conf_file', 'log_file',
'interface', 'config_dict',
'stderr_log_file',
'scenario_name'])
# Send magic packets here, so they can wake up the system but are otherwise
# dropped.
UDP_DISCARD_PORT = 9
def build_router_hostname(client_hostname=None, router_hostname=None):
"""Build a router hostname from a client hostname.
@param client_hostname: string hostname of DUT connected to a router.
@param router_hostname: string hostname of router.
@return string hostname of connected router or None if the hostname
cannot be inferred from the client hostname.
"""
if not router_hostname and not client_hostname:
raise error.TestError('Either client_hostname or router_hostname must '
'be specified to build_router_hostname.')
return dnsname_mangler.get_router_addr(client_hostname,
cmdline_override=router_hostname)
def build_router_proxy(test_name='', client_hostname=None, router_addr=None,
enable_avahi=False):
"""Build up a LinuxRouter object.
Verifies that the remote host responds to ping.
Either client_hostname or router_addr must be specified.
@param test_name: string name of this test (e.g. 'network_WiFi_TestName').
@param client_hostname: string hostname of DUT if we're in the lab.
@param router_addr: string DNS/IPv4 address to use for router host object.
@param enable_avahi: boolean True iff avahi should be started on the router.
@return LinuxRouter or raise error.TestError on failure.
"""
router_hostname = build_router_hostname(client_hostname=client_hostname,
router_hostname=router_addr)
logging.info('Connecting to router at %s', router_hostname)
ping_helper = ping_runner.PingRunner()
if not ping_helper.simple_ping(router_hostname):
raise error.TestError('Router at %s is not pingable.' %
router_hostname)
# Use CrosHost for all router hosts and avoid host detection.
# Host detection would use JetstreamHost for Whirlwind routers.
# JetstreamHost assumes ap-daemons are running.
# Testbed routers run the testbed-ap profile with no ap-daemons.
# TODO(ecgh): crbug.com/757075 Fix testbed-ap JetstreamHost detection.
return LinuxRouter(hosts.create_host(router_hostname,
host_class=hosts.CrosHost),
test_name,
enable_avahi=enable_avahi)
class LinuxRouter(site_linux_system.LinuxSystem):
"""Linux/mac80211-style WiFi Router support for WiFiTest class.
This class implements test methods/steps that communicate with a
router implemented with Linux/mac80211. The router must
be pre-configured to enable ssh access and have a mac80211-based
wireless device. We also assume hostapd 0.7.x and iw are present
and any necessary modules are pre-loaded.
"""
KNOWN_TEST_PREFIX = 'network_WiFi_'
POLLING_INTERVAL_SECONDS = 0.5
STARTUP_TIMEOUT_SECONDS = 30
SUFFIX_LETTERS = string.ascii_lowercase + string.digits
SUBNET_PREFIX_OCTETS = (192, 168)
HOSTAPD_CONF_FILE_PATTERN = '/tmp/hostapd-test-%s.conf'
HOSTAPD_LOG_FILE_PATTERN = '/tmp/hostapd-test-%s.log'
HOSTAPD_STDERR_LOG_FILE_PATTERN = '/tmp/hostapd-stderr-test-%s.log'
HOSTAPD_CONTROL_INTERFACE_PATTERN = '/tmp/hostapd-test-%s.ctrl'
HOSTAPD_DRIVER_NAME = 'nl80211'
STATION_CONF_FILE_PATTERN = '/tmp/wpa-supplicant-test-%s.conf'
STATION_LOG_FILE_PATTERN = '/tmp/wpa-supplicant-test-%s.log'
STATION_PID_FILE_PATTERN = '/tmp/wpa-supplicant-test-%s.pid'
MGMT_FRAME_SENDER_LOG_FILE = '/tmp/send_management_frame-test.log'
PROBE_RESPONSE_FOOTER_FILE = '/tmp/autotest-probe_response_footer'
_RNG_AVAILABLE = '/sys/class/misc/hw_random/rng_available'
_RNG_CURRENT = '/sys/class/misc/hw_random/rng_current'
def get_capabilities(self):
"""@return iterable object of AP capabilities for this system."""
caps = set()
try:
self.cmd_send_management_frame = path_utils.must_be_installed(
'/usr/bin/send_management_frame', host=self.host)
caps.add(self.CAPABILITY_SEND_MANAGEMENT_FRAME)
except error.TestFail:
pass
return super(LinuxRouter, self).get_capabilities().union(caps)
@property
def router(self):
"""Deprecated. Use self.host instead.
@return Host object representing the remote router.
"""
return self.host
@property
def wifi_ip(self):
"""Simple accessor for the WiFi IP when there is only one AP.
@return string IP of WiFi interface.
"""
if len(self.local_servers) != 1:
raise error.TestError('Could not pick a WiFi IP to return.')
return self.get_wifi_ip(0)
def __init__(self, host, test_name, enable_avahi=False):
"""Build a LinuxRouter.
@param host Host object representing the remote machine.
@param test_name string name of this test. Used in SSID creation.
@param enable_avahi: boolean True iff avahi should be started on the
router.
"""
super(LinuxRouter, self).__init__(host, 'router')
self._ssid_prefix = test_name
self._enable_avahi = enable_avahi
self.__setup()
def __setup(self):
"""Set up this system.
Can be used either to complete initialization of a LinuxRouter
object, or to re-establish a good state after a reboot.
"""
self.cmd_dhcpd = '/usr/sbin/dhcpd'
self.cmd_hostapd = path_utils.must_be_installed(
'/usr/sbin/hostapd', host=self.host)
self.cmd_hostapd_cli = path_utils.must_be_installed(
'/usr/sbin/hostapd_cli', host=self.host)
self.cmd_wpa_supplicant = path_utils.must_be_installed(
'/usr/sbin/wpa_supplicant', host=self.host)
self.dhcpd_conf = '/tmp/dhcpd.%s.conf'
self.dhcpd_leases = '/tmp/dhcpd.leases'
# TODO(crbug.com/839164): some routers fill their stateful partition
# with uncollected metrics.
self.host.run('rm -f /var/lib/metrics/uma-events', ignore_status=True)
# Log the most recent message on the router so that we can rebuild the
# suffix relevant to us when debugging failures.
last_log_line = self.host.run('tail -1 /var/log/messages',
ignore_status=True).stdout
# We're trying to get the timestamp from:
# 2014-07-23T17:29:34.961056+00:00 localhost kernel: blah blah blah
self._log_start_timestamp = last_log_line.strip().partition(' ')[0]
if self._log_start_timestamp:
logging.debug('Will only retrieve logs after %s.',
self._log_start_timestamp)
else:
# If syslog is empty, we just use a wildcard pattern, to grab
# everything.
logging.debug('Empty or corrupt log; will retrieve whole log')
self._log_start_timestamp = '.'
# hostapd configuration persists throughout the test, subsequent
# 'config' commands only modify it.
if self._ssid_prefix.startswith(self.KNOWN_TEST_PREFIX):
# Many of our tests start with an uninteresting prefix.
# Remove it so we can have more unique bytes.
self._ssid_prefix = self._ssid_prefix[len(self.KNOWN_TEST_PREFIX):]
self._number_unique_ssids = 0
self._total_hostapd_instances = 0
self.local_servers = []
self.server_address_index = []
self.hostapd_instances = []
self.station_instances = []
self.dhcp_low = 1
self.dhcp_high = 128
# Tear down hostapbr bridge interfaces
result = self.host.run('ls -d /sys/class/net/%s*' %
self.HOSTAP_BRIDGE_INTERFACE_PREFIX,
ignore_status=True)
if result.exit_status == 0:
for path in result.stdout.splitlines():
self.delete_link(path.split('/')[-1])
# Kill hostapd and dhcp server if already running.
self._kill_process_instance('hostapd', timeout_seconds=30)
self.stop_dhcp_server(instance=None)
# Place us in the US by default
self.iw_runner.set_regulatory_domain('US')
self.enable_all_antennas()
# Some tests want this functionality, but otherwise, it's a distraction.
if self._enable_avahi:
self.host.run('start avahi', ignore_status=True)
else:
self.host.run('stop avahi', ignore_status=True)
# Some routers have bad (slow?) random number generators.
self.rng_configure()
def close(self):
"""Close global resources held by this system."""
self.deconfig()
# dnsmasq and hostapd cause interesting events to go to system logs.
# Retrieve only the suffix of the logs after the timestamp we stored on
# router creation.
self.host.run("sed -n -e '/%s/,$p' /var/log/messages >/tmp/router_log" %
self._log_start_timestamp, ignore_status=True)
self.host.get_file('/tmp/router_log', 'debug/router_host_messages')
super(LinuxRouter, self).close()
def reboot(self, timeout):
"""Reboot this router, and restore it to a known-good state.
@param timeout Maximum seconds to wait for router to return.
"""
super(LinuxRouter, self).reboot(timeout)
self.__setup()
def has_local_server(self):
"""@return True iff this router has local servers configured."""
return bool(self.local_servers)
def start_hostapd(self, configuration):
"""Start a hostapd instance described by conf.
@param configuration HostapConfig object.
"""
# Figure out the correct interface.
interface = self.get_wlanif(configuration.frequency, 'managed',
configuration.min_streams)
phy_name = self.iw_runner.get_interface(interface).phy
conf_file = self.HOSTAPD_CONF_FILE_PATTERN % interface
log_file = self.HOSTAPD_LOG_FILE_PATTERN % interface
stderr_log_file = self.HOSTAPD_STDERR_LOG_FILE_PATTERN % interface
control_interface = self.HOSTAPD_CONTROL_INTERFACE_PATTERN % interface
hostapd_conf_dict = configuration.generate_dict(
interface, control_interface,
self.build_unique_ssid(suffix=configuration.ssid_suffix))
logging.debug('hostapd parameters: %r', hostapd_conf_dict)
# Generate hostapd.conf.
self.router.run("cat <<EOF >%s\n%s\nEOF\n" %
(conf_file, '\n'.join(
"%s=%s" % kv for kv in hostapd_conf_dict.iteritems())))
# Run hostapd.
logging.info('Starting hostapd on %s(%s) channel=%s...',
interface, phy_name, configuration.channel)
self.router.run('rm %s' % log_file, ignore_status=True)
self.router.run('stop wpasupplicant', ignore_status=True)
start_command = '%s -dd -t %s > %s 2> %s & echo $!' % (
self.cmd_hostapd, conf_file, log_file, stderr_log_file)
pid = int(self.router.run(start_command).stdout.strip())
self.hostapd_instances.append(HostapdInstance(
hostapd_conf_dict['ssid'],
conf_file,
log_file,
interface,
hostapd_conf_dict.copy(),
stderr_log_file,
configuration.scenario_name))
# Wait for confirmation that the router came up.
logging.info('Waiting for hostapd to startup.')
utils.poll_for_condition(
condition=lambda: self._has_hostapd_started(log_file, pid),
exception=error.TestFail('Timed out while waiting for hostapd '
'to start.'),
timeout=self.STARTUP_TIMEOUT_SECONDS,
sleep_interval=self.POLLING_INTERVAL_SECONDS)
if configuration.frag_threshold:
threshold = self.iw_runner.get_fragmentation_threshold(phy_name)
if threshold != configuration.frag_threshold:
raise error.TestNAError('Router does not support setting '
'fragmentation threshold')
def _has_hostapd_started(self, log_file, pid):
"""Determines if hostapd has started.
@return Whether or not hostapd has started.
@raise error.TestFail if there was a bad config or hostapd terminated.
"""
success = self.router.run(
'grep "Setup of interface done" %s' % log_file,
ignore_status=True).exit_status == 0
if success:
return True
# A common failure is an invalid router configuration.
# Detect this and exit early if we see it.
bad_config = self.router.run(
'grep "Interface initialization failed" %s' % log_file,
ignore_status=True).exit_status == 0
if bad_config:
raise error.TestFail('hostapd failed to initialize AP '
'interface.')
if pid:
early_exit = self.router.run('kill -0 %d' % pid,
ignore_status=True).exit_status
if early_exit:
raise error.TestFail('hostapd process terminated.')
return False
def _kill_process_instance(self,
process,
instance=None,
timeout_seconds=10,
ignore_timeouts=False):
"""Kill a process on the router.
Kills remote program named |process| (optionally only a specific
|instance|). Wait |timeout_seconds| for |process| to die
before returning. If |ignore_timeouts| is False, raise
a TestError on timeouts.
@param process: string name of process to kill.
@param instance: string fragment of the command line unique to
this instance of the remote process.
@param timeout_seconds: float timeout in seconds to wait.
@param ignore_timeouts: True iff we should ignore failures to
kill processes.
@return True iff the specified process has exited.
"""
if instance is not None:
search_arg = '-f "^%s.*%s"' % (process, instance)
else:
search_arg = process
self.host.run('pkill %s' % search_arg, ignore_status=True)
# Wait for process to die
time.sleep(self.POLLING_INTERVAL_SECONDS)
try:
utils.poll_for_condition(
condition=lambda: self.host.run(
'pgrep -l %s' % search_arg,
ignore_status=True).exit_status != 0,
timeout=timeout_seconds,
sleep_interval=self.POLLING_INTERVAL_SECONDS)
except utils.TimeoutError:
if ignore_timeouts:
return False
raise error.TestError(
'Timed out waiting for %s%s to die' %
(process,
'' if instance is None else ' (instance=%s)' % instance))
return True
def kill_hostapd_instance(self, instance):
"""Kills a hostapd instance.
@param instance HostapdInstance object.
"""
is_dead = self._kill_process_instance(
self.cmd_hostapd,
instance=instance.conf_file,
timeout_seconds=30,
ignore_timeouts=True)
if instance.scenario_name:
log_identifier = instance.scenario_name
else:
log_identifier = '%d_%s' % (
self._total_hostapd_instances, instance.interface)
files_to_copy = [(instance.log_file,
'debug/hostapd_router_%s.log' % log_identifier),
(instance.stderr_log_file,
'debug/hostapd_router_%s.stderr.log' %
log_identifier)]
for remote_file, local_file in files_to_copy:
if self.host.run('ls %s >/dev/null 2>&1' % remote_file,
ignore_status=True).exit_status:
logging.error('Did not collect hostapd log file because '
'it was missing.')
else:
self.router.get_file(remote_file, local_file)
self._total_hostapd_instances += 1
if not is_dead:
raise error.TestError('Timed out killing hostapd.')
def build_unique_ssid(self, suffix=''):
""" Build our unique token by base-<len(self.SUFFIX_LETTERS)> encoding
the number of APs we've constructed already.
@param suffix string to append to SSID
"""
base = len(self.SUFFIX_LETTERS)
number = self._number_unique_ssids
self._number_unique_ssids += 1
unique = ''
while number or not unique:
unique = self.SUFFIX_LETTERS[number % base] + unique
number = number / base
# And salt the SSID so that tests running in adjacent cells are unlikely
# to pick the same SSID and we're resistent to beacons leaking out of
# cells.
salt = ''.join([random.choice(self.SUFFIX_LETTERS) for x in range(5)])
return '_'.join([self._ssid_prefix, unique, salt, suffix])[-32:]
def rng_configure(self):
"""Configure the random generator to our liking.
Some routers (particularly, Gale) seem to have bad Random Number
Generators, such that hostapd can't always generate keys fast enough.
The on-board TPM seems to serve as a better generator, so we try to
switch to that if available.
Symptoms of a slow RNG: hostapd complains with:
WPA: Not enough entropy in random pool to proceed - reject first
4-way handshake
Ref:
https://chromium.googlesource.com/chromiumos/third_party/hostap/+/7ea51f728bb7/src/ap/wpa_auth.c#1854
Linux devices may have RNG parameters at
/sys/class/misc/hw_random/rng_{available,current}. See:
https://www.kernel.org/doc/Documentation/hw_random.txt
"""
available = self.host.run('cat %s' % self._RNG_AVAILABLE, \
ignore_status=True).stdout.strip().split(' ')
# System may not have HWRNG support. Just skip this.
if available == "":
return
current = self.host.run('cat %s' % self._RNG_CURRENT).stdout. \
strip()
want_rng = "tpm-rng"
logging.debug("Available / current RNGs on router: %r / %s",
available, current)
if want_rng in available and want_rng != current:
logging.debug("Switching RNGs: %s -> %s", current, want_rng)
self.host.run('echo -n "%s" > %s' % (want_rng, self._RNG_CURRENT))
def hostap_configure(self, configuration, multi_interface=None):
"""Build up a hostapd configuration file and start hostapd.
Also setup a local server if this router supports them.
@param configuration HosetapConfig object.
@param multi_interface bool True iff multiple interfaces allowed.
"""
if multi_interface is None and (self.hostapd_instances or
self.station_instances):
self.deconfig()
if configuration.is_11ac:
router_caps = self.get_capabilities()
if site_linux_system.LinuxSystem.CAPABILITY_VHT not in router_caps:
raise error.TestNAError('Router does not have AC support')
if configuration.use_bridge:
configuration._bridge = self.get_brif()
self.start_hostapd(configuration)
interface = self.hostapd_instances[-1].interface
self.iw_runner.set_tx_power(interface, 'auto')
self.set_beacon_footer(interface, configuration.beacon_footer)
self.start_local_server(interface, bridge=configuration.bridge)
logging.info('AP configured.')
def ibss_configure(self, config):
"""Configure a station based AP in IBSS mode.
Extract relevant configuration objects from |config| despite not
actually being a hostap managed endpoint.
@param config HostapConfig object.
"""
if self.station_instances or self.hostapd_instances:
self.deconfig()
interface = self.get_wlanif(config.frequency, 'ibss')
ssid = (config.ssid or
self.build_unique_ssid(suffix=config.ssid_suffix))
# Connect the station
self.router.run('%s link set %s up' % (self.cmd_ip, interface))
self.iw_runner.ibss_join(interface, ssid, config.frequency)
# Always start a local server.
self.start_local_server(interface)
# Remember that this interface is up.
self.station_instances.append(
StationInstance(ssid=ssid, interface=interface,
dev_type='ibss'))
def local_server_address(self, index):
"""Get the local server address for an interface.
When we multiple local servers, we give them static IP addresses
like 192.168.*.254.
@param index int describing which local server this is for.
"""
return '%d.%d.%d.%d' % (self.SUBNET_PREFIX_OCTETS + (index, 254))
def local_peer_ip_address(self, index):
"""Get the IP address allocated for the peer associated to the AP.
This address is assigned to a locally associated peer device that
is created for the DUT to perform connectivity tests with.
When we have multiple local servers, we give them static IP addresses
like 192.168.*.253.
@param index int describing which local server this is for.
"""
return '%d.%d.%d.%d' % (self.SUBNET_PREFIX_OCTETS + (index, 253))
def local_bridge_address(self, index):
"""Get the bridge address for an interface.
This address is assigned to a local bridge device.
@param index int describing which local server this is for.
"""
return '%d.%d.%d.%d' % (self.SUBNET_PREFIX_OCTETS + (index, 252))
def local_peer_mac_address(self):
"""Get the MAC address of the peer interface.
@return string MAC address of the peer interface.
"""
iface = interface.Interface(self.station_instances[0].interface,
self.router)
return iface.mac_address
def _get_unused_server_address_index(self):
"""@return an unused server address index."""
for address_index in range(0, 256):
if address_index not in self.server_address_index:
return address_index
raise error.TestFail('No available server address index')
def change_server_address_index(self, ap_num=0, server_address_index=None):
"""Restart the local server with a different server address index.
This will restart the local server with different gateway IP address
and DHCP address ranges.
@param ap_num: int hostapd instance number.
@param server_address_index: int server address index.
"""
interface = self.local_servers[ap_num]['interface'];
# Get an unused server address index if one is not specified, which
# will be different from the one that's currently in used.
if server_address_index is None:
server_address_index = self._get_unused_server_address_index()
# Restart local server with the new server address index.
self.stop_local_server(self.local_servers[ap_num])
self.start_local_server(interface,
ap_num=ap_num,
server_address_index=server_address_index)
def start_local_server(self,
interface,
ap_num=None,
server_address_index=None,
bridge=None):
"""Start a local server on an interface.
@param interface string (e.g. wlan0)
@param ap_num int the ap instance to start the server for
@param server_address_index int server address index
@param bridge string (e.g. br0)
"""
logging.info('Starting up local server...')
if len(self.local_servers) >= 256:
raise error.TestFail('Exhausted available local servers')
# Get an unused server address index if one is not specified.
# Validate server address index if one is specified.
if server_address_index is None:
server_address_index = self._get_unused_server_address_index()
elif server_address_index in self.server_address_index:
raise error.TestFail('Server address index %d already in used' %
server_address_index)
server_addr = netblock.from_addr(
self.local_server_address(server_address_index),
prefix_len=24)
params = {}
params['address_index'] = server_address_index
params['netblock'] = server_addr
params['dhcp_range'] = ' '.join(
(server_addr.get_addr_in_block(1),
server_addr.get_addr_in_block(128)))
params['interface'] = interface
params['bridge'] = bridge
params['ip_params'] = ('%s broadcast %s dev %s' %
(server_addr.netblock,
server_addr.broadcast,
interface))
if ap_num is None:
self.local_servers.append(params)
else:
self.local_servers.insert(ap_num, params)
self.server_address_index.append(server_address_index)
self.router.run('%s addr flush %s' %
(self.cmd_ip, interface))
self.router.run('%s addr add %s' %
(self.cmd_ip, params['ip_params']))
self.router.run('%s link set %s up' %
(self.cmd_ip, interface))
if params['bridge']:
bridge_addr = netblock.from_addr(
self.local_bridge_address(server_address_index),
prefix_len=24)
self.router.run("ifconfig %s %s" %
(params['bridge'], bridge_addr.netblock))
self.start_dhcp_server(interface)
def stop_local_server(self, server):
"""Stop a local server on the router
@param server object server configuration parameters.
"""
self.stop_dhcp_server(server['interface'])
self.router.run("%s addr del %s" %
(self.cmd_ip, server['ip_params']),
ignore_status=True)
self.server_address_index.remove(server['address_index'])
self.local_servers.remove(server)
def start_dhcp_server(self, interface):
"""Start a dhcp server on an interface.
@param interface string (e.g. wlan0)
"""
for server in self.local_servers:
if server['interface'] == interface:
params = server
break
else:
raise error.TestFail('Could not find local server '
'to match interface: %r' % interface)
server_addr = params['netblock']
dhcpd_conf_file = self.dhcpd_conf % interface
dhcp_conf = '\n'.join([
'port=0', # disables DNS server
'bind-interfaces',
'log-dhcp',
'dhcp-range=%s' % ','.join((server_addr.get_addr_in_block(1),
server_addr.get_addr_in_block(128))),
'interface=%s' % (params['bridge'] or params['interface']),
'dhcp-leasefile=%s' % self.dhcpd_leases])
self.router.run('cat <<EOF >%s\n%s\nEOF\n' %
(dhcpd_conf_file, dhcp_conf))
self.router.run('dnsmasq --conf-file=%s' % dhcpd_conf_file)
def stop_dhcp_server(self, instance=None):
"""Stop a dhcp server on the router.
@param instance string instance to kill.
"""
self._kill_process_instance('dnsmasq', instance=instance)
def get_wifi_channel(self, ap_num):
"""Return channel of BSS corresponding to |ap_num|.
@param ap_num int which BSS to get the channel of.
@return int primary channel of BSS.
"""
instance = self.hostapd_instances[ap_num]
return instance.config_dict['channel']
def get_wifi_ip(self, ap_num):
"""Return IP address on the WiFi subnet of a local server on the router.
If no local servers are configured (e.g. for an RSPro), a TestFail will
be raised.
@param ap_num int which local server to get an address from.
"""
if not self.local_servers:
raise error.TestError('No IP address assigned')
return self.local_servers[ap_num]['netblock'].addr
def get_wifi_ip_subnet(self, ap_num):
"""Return subnet of WiFi AP instance.
If no APs are configured a TestError will be raised.
@param ap_num int which local server to get an address from.
"""
if not self.local_servers:
raise error.TestError('No APs configured.')
return self.local_servers[ap_num]['netblock'].subnet
def get_hostapd_interface(self, ap_num):
"""Get the name of the interface associated with a hostapd instance.
@param ap_num: int hostapd instance number.
@return string interface name (e.g. 'managed0').
"""
if ap_num not in range(len(self.hostapd_instances)):
raise error.TestFail('Invalid instance number (%d) with %d '
'instances configured.' %
(ap_num, len(self.hostapd_instances)))
instance = self.hostapd_instances[ap_num]
return instance.interface
def get_station_interface(self, instance):
"""Get the name of the interface associated with a station.
@param instance: int station instance number.
@return string interface name (e.g. 'managed0').
"""
if instance not in range(len(self.station_instances)):
raise error.TestFail('Invalid instance number (%d) with %d '
'instances configured.' %
(instance, len(self.station_instances)))
instance = self.station_instances[instance]
return instance.interface
def get_hostapd_mac(self, ap_num):
"""Return the MAC address of an AP in the test.
@param ap_num int index of local server to read the MAC address from.
@return string MAC address like 00:11:22:33:44:55.
"""
interface_name = self.get_hostapd_interface(ap_num)
ap_interface = interface.Interface(interface_name, self.host)
return ap_interface.mac_address
def get_hostapd_phy(self, ap_num):
"""Get name of phy for hostapd instance.
@param ap_num int index of hostapd instance.
@return string phy name of phy corresponding to hostapd's
managed interface.
"""
interface = self.iw_runner.get_interface(
self.get_hostapd_interface(ap_num))
return interface.phy
def deconfig(self):
"""A legacy, deprecated alias for deconfig_aps."""
self.deconfig_aps()
def deconfig_aps(self, instance=None, silent=False):
"""De-configure an AP (will also bring wlan down).
@param instance: int or None. If instance is None, will bring down all
instances of hostapd.
@param silent: True if instances should be brought without de-authing
the DUT.
"""
if not self.hostapd_instances and not self.station_instances:
return
if self.hostapd_instances:
local_servers = []
if instance is not None:
instances = [ self.hostapd_instances.pop(instance) ]
for server in self.local_servers:
if server['interface'] == instances[0].interface:
local_servers = [server]
break
else:
instances = self.hostapd_instances
self.hostapd_instances = []
local_servers = copy.copy(self.local_servers)
for instance in instances:
if silent:
# Deconfigure without notifying DUT. Remove the interface
# hostapd uses to send beacon and DEAUTH packets.
self.remove_interface(instance.interface)
self.kill_hostapd_instance(instance)
self.release_interface(instance.interface)
if self.station_instances:
local_servers = copy.copy(self.local_servers)
instance = self.station_instances.pop()
if instance.dev_type == 'ibss':
self.iw_runner.ibss_leave(instance.interface)
elif instance.dev_type == 'managed':
self._kill_process_instance(self.cmd_wpa_supplicant,
instance=instance.interface)
else:
self.iw_runner.disconnect_station(instance.interface)
self.router.run('%s link set %s down' %
(self.cmd_ip, instance.interface))
for server in local_servers:
self.stop_local_server(server)
for brif in range(self._brif_index):
self.delete_link('%s%d' %
(self.HOSTAP_BRIDGE_INTERFACE_PREFIX, brif))
def delete_link(self, name):
"""Delete link using the `ip` command.
@param name string link name.
"""
self.host.run('%s link del %s' % (self.cmd_ip, name),
ignore_status=True)
def set_ap_interface_down(self, instance=0):
"""Bring down the hostapd interface.
@param instance int router instance number.
"""
self.host.run('%s link set %s down' %
(self.cmd_ip, self.get_hostapd_interface(instance)))
def confirm_pmksa_cache_use(self, instance=0):
"""Verify that the PMKSA auth was cached on a hostapd instance.
@param instance int router instance number.
"""
log_file = self.hostapd_instances[instance].log_file
pmksa_match = 'PMK from PMKSA cache'
result = self.router.run('grep -q "%s" %s' % (pmksa_match, log_file),
ignore_status=True)
if result.exit_status:
raise error.TestFail('PMKSA cache was not used in roaming.')
def get_ssid(self, instance=None):
"""@return string ssid for the network stemming from this router."""
if instance is None:
instance = 0
if len(self.hostapd_instances) > 1:
raise error.TestFail('No instance of hostapd specified with '
'multiple instances present.')
if self.hostapd_instances:
return self.hostapd_instances[instance].ssid
if self.station_instances:
return self.station_instances[0].ssid
raise error.TestFail('Requested ssid of an unconfigured AP.')
def deauth_client(self, client_mac):
"""Deauthenticates a client described in params.
@param client_mac string containing the mac address of the client to be
deauthenticated.
"""
control_if = self.hostapd_instances[-1].config_dict['ctrl_interface']
self.router.run('%s -p%s deauthenticate %s' %
(self.cmd_hostapd_cli, control_if, client_mac))
def send_bss_tm_req(self, client_mac, neighbor_list):
"""Send a BSS Transition Management Request to a client.
@param client_mac string containing the mac address of the client.
@param neighbor_list list of strings containing mac addresses of
candidate APs.
@return bool True if BSS_TM_REQ is sent successfully.
"""
control_if = self.hostapd_instances[0].config_dict['ctrl_interface']
command = ('%s -p%s BSS_TM_REQ %s neighbor=%s,0,0,0,0 pref=1' %
(self.cmd_hostapd_cli, control_if, client_mac,
',0,0,0,0 neighbor='.join(neighbor_list)))
ret = self.router.run(command).stdout
if ret.splitlines()[-1] != 'OK':
return False
return True
def _prep_probe_response_footer(self, footer):
"""Write probe response footer temporarily to a local file and copy
over to test router.
@param footer string containing bytes for the probe response footer.
@raises AutoservRunError: If footer file copy fails.
"""
with tempfile.NamedTemporaryFile() as fp:
fp.write(footer)
fp.flush()
try:
self.host.send_file(fp.name, self.PROBE_RESPONSE_FOOTER_FILE)
except error.AutoservRunError:
logging.error('failed to copy footer file to AP')
raise
def send_management_frame_on_ap(self, frame_type, channel, instance=0):
"""Injects a management frame into an active hostapd session.
@param frame_type string the type of frame to send.
@param channel int targeted channel
@param instance int indicating which hostapd instance to inject into.
"""
hostap_interface = self.hostapd_instances[instance].interface
interface = self.get_wlanif(0, 'monitor', same_phy_as=hostap_interface)
self.router.run("%s link set %s up" % (self.cmd_ip, interface))
self.router.run('%s -i %s -t %s -c %d' %
(self.cmd_send_management_frame, interface, frame_type,
channel))
self.release_interface(interface)
def send_management_frame(self, interface, frame_type, channel,
ssid_prefix=None, num_bss=None,
frame_count=None, delay=None,
dest_addr=None, probe_resp_footer=None):
"""
Injects management frames on specify channel |frequency|.
This function will spawn off a new process to inject specified
management frames |frame_type| at the specified interface |interface|.
@param interface string interface to inject frames.
@param frame_type string message type.
@param channel int targeted channel.
@param ssid_prefix string SSID prefix.
@param num_bss int number of BSS.
@param frame_count int number of frames to send.
@param delay int milliseconds delay between frames.
@param dest_addr string destination address (DA) MAC address.
@param probe_resp_footer string footer for probe response.
@return int PID of the newly created process.
"""
command = '%s -i %s -t %s -c %d' % (self.cmd_send_management_frame,
interface, frame_type, channel)
if ssid_prefix is not None:
command += ' -s %s' % (ssid_prefix)
if num_bss is not None:
command += ' -b %d' % (num_bss)
if frame_count is not None:
command += ' -n %d' % (frame_count)
if delay is not None:
command += ' -d %d' % (delay)
if dest_addr is not None:
command += ' -a %s' % (dest_addr)
if probe_resp_footer is not None:
self._prep_probe_response_footer(footer=probe_resp_footer)
command += ' -f %s' % (self.PROBE_RESPONSE_FOOTER_FILE)
command += ' > %s 2>&1 & echo $!' % (self.MGMT_FRAME_SENDER_LOG_FILE)
pid = int(self.router.run(command).stdout)
return pid
def detect_client_deauth(self, client_mac, instance=0):
"""Detects whether hostapd has logged a deauthentication from
|client_mac|.
@param client_mac string the MAC address of the client to detect.
@param instance int indicating which hostapd instance to query.
"""
interface = self.hostapd_instances[instance].interface
deauth_msg = "%s: deauthentication: STA=%s" % (interface, client_mac)
log_file = self.hostapd_instances[instance].log_file
result = self.router.run("grep -qi '%s' %s" % (deauth_msg, log_file),
ignore_status=True)
return result.exit_status == 0
def detect_client_coexistence_report(self, client_mac, instance=0):
"""Detects whether hostapd has logged an action frame from
|client_mac| indicating information about 20/40MHz BSS coexistence.
@param client_mac string the MAC address of the client to detect.
@param instance int indicating which hostapd instance to query.
"""
coex_msg = ('nl80211: MLME event frame - hexdump(len=.*): '
'.. .. .. .. .. .. .. .. .. .. %s '
'.. .. .. .. .. .. .. .. 04 00.*48 01 ..' %
' '.join(client_mac.split(':')))
log_file = self.hostapd_instances[instance].log_file
result = self.router.run("grep -qi '%s' %s" % (coex_msg, log_file),
ignore_status=True)
return result.exit_status == 0
def add_connected_peer(self, instance=0):
"""Configure a station connected to a running AP instance.
Extract relevant configuration objects from the hostap
configuration for |instance| and generate a wpa_supplicant
instance that connects to it. This allows the DUT to interact
with a client entity that is also connected to the same AP. A
full wpa_supplicant instance is necessary here (instead of just
using the "iw" command to connect) since we want to enable
advanced features such as TDLS.
@param instance int indicating which hostapd instance to connect to.
"""
if not self.hostapd_instances:
raise error.TestFail('Hostapd is not configured.')
if self.station_instances:
raise error.TestFail('Station is already configured.')
ssid = self.get_ssid(instance)
hostap_conf = self.hostapd_instances[instance].config_dict
frequency = hostap_config.HostapConfig.get_frequency_for_channel(
hostap_conf['channel'])
self.configure_managed_station(
ssid, frequency, self.local_peer_ip_address(instance))
interface = self.station_instances[0].interface
# Since we now have two network interfaces connected to the same
# network, we need to disable the kernel's protection against
# incoming packets to an "unexpected" interface.
self.router.run('echo 2 > /proc/sys/net/ipv4/conf/%s/rp_filter' %
interface)
# Similarly, we'd like to prevent the hostap interface from
# replying to ARP requests for the peer IP address and vice
# versa.
self.router.run('echo 1 > /proc/sys/net/ipv4/conf/%s/arp_ignore' %
interface)
self.router.run('echo 1 > /proc/sys/net/ipv4/conf/%s/arp_ignore' %
hostap_conf['interface'])
def configure_managed_station(self, ssid, frequency, ip_addr):
"""Configure a router interface to connect as a client to a network.
@param ssid: string SSID of network to join.
@param frequency: int frequency required to join the network.
@param ip_addr: IP address to assign to this interface
(e.g. '192.168.1.200').
"""
interface = self.get_wlanif(frequency, 'managed')
# TODO(pstew): Configure other bits like PSK, 802.11n if tests
# require them...
supplicant_config = (
'network={\n'
' ssid="%(ssid)s"\n'
' key_mgmt=NONE\n'
'}\n' % {'ssid': ssid}
)
conf_file = self.STATION_CONF_FILE_PATTERN % interface
log_file = self.STATION_LOG_FILE_PATTERN % interface
pid_file = self.STATION_PID_FILE_PATTERN % interface
self.router.run('cat <<EOF >%s\n%s\nEOF\n' %
(conf_file, supplicant_config))
# Connect the station.
self.router.run('%s link set %s up' % (self.cmd_ip, interface))
start_command = ('%s -dd -t -i%s -P%s -c%s -D%s >%s 2>&1 &' %
(self.cmd_wpa_supplicant,
interface, pid_file, conf_file,
self.HOSTAPD_DRIVER_NAME, log_file))
self.router.run(start_command)
self.iw_runner.wait_for_link(interface)
# Assign an IP address to this interface.
self.router.run('%s addr add %s/24 dev %s' %
(self.cmd_ip, ip_addr, interface))
self.station_instances.append(
StationInstance(ssid=ssid, interface=interface,
dev_type='managed'))
def send_magic_packet(self, dest_ip, dest_mac):
"""Sends a magic packet to the NIC with the given IP and MAC addresses.
@param dest_ip the IP address of the device to send the packet to
@param dest_mac the hardware MAC address of the device
"""
# magic packet is 6 0xff bytes followed by the hardware address
# 16 times
mac_bytes = ''.join([chr(int(b, 16)) for b in dest_mac.split(':')])
magic_packet = '\xff' * 6 + mac_bytes * 16
logging.info('Sending magic packet to %s...', dest_ip)
self.host.run('python -uc "import socket, sys;'
's = socket.socket(socket.AF_INET, socket.SOCK_DGRAM);'
's.sendto(sys.stdin.read(), (\'%s\', %d))"' %
(dest_ip, UDP_DISCARD_PORT),
stdin=magic_packet)
def set_beacon_footer(self, interface, footer=''):
"""Sets the beacon footer (appended IE information) for this interface.
@param interface string interface to set the footer on.
@param footer string footer to be set on the interface.
"""
footer_file = ('/sys/kernel/debug/ieee80211/%s/beacon_footer' %
self.iw_runner.get_interface(interface).phy)
if self.router.run('test -e %s' % footer_file,
ignore_status=True).exit_status != 0:
logging.info('Beacon footer file does not exist. Ignoring.')
return
self.host.run('echo -ne %s > %s' % ('%r' % footer, footer_file))
def setup_bridge_mode_dhcp_server(self):
"""Setup an DHCP server for bridge mode.
Setup an DHCP server on the master interface of the virtual ethernet
pair, with peer interface connected to the bridge interface. This is
used for testing APs in bridge mode.
"""
# Start a local server on master interface of virtual ethernet pair.
self.start_local_server(
self.get_virtual_ethernet_master_interface())
# Add peer interface to the bridge.
self.add_interface_to_bridge(
self.get_virtual_ethernet_peer_interface())