• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1# Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
2# Use of this source code is governed by a BSD-style license that can be
3# found in the LICENSE file.
4
5import collections
6import copy
7import logging
8import os
9import random
10import string
11import tempfile
12import time
13
14from autotest_lib.client.common_lib import error
15from autotest_lib.client.common_lib import utils
16from autotest_lib.client.common_lib.cros import path_utils
17from autotest_lib.client.common_lib.cros.network import interface
18from autotest_lib.client.common_lib.cros.network import netblock
19from autotest_lib.client.common_lib.cros.network import ping_runner
20from autotest_lib.server import hosts
21from autotest_lib.server import site_linux_system
22from autotest_lib.server.cros import dnsname_mangler
23
24
25StationInstance = collections.namedtuple('StationInstance',
26                                         ['ssid', 'interface', 'dev_type'])
27HostapdInstance = collections.namedtuple('HostapdInstance',
28                                         ['ssid', 'conf_file', 'log_file',
29                                          'interface', 'config_dict',
30                                          'stderr_log_file',
31                                          'scenario_name'])
32
33# Send magic packets here, so they can wake up the system but are otherwise
34# dropped.
35UDP_DISCARD_PORT = 9
36
37def build_router_hostname(client_hostname=None, router_hostname=None):
38    """Build a router hostname from a client hostname.
39
40    @param client_hostname: string hostname of DUT connected to a router.
41    @param router_hostname: string hostname of router.
42    @return string hostname of connected router or None if the hostname
43            cannot be inferred from the client hostname.
44
45    """
46    if not router_hostname and not client_hostname:
47        raise error.TestError('Either client_hostname or router_hostname must '
48                              'be specified to build_router_hostname.')
49
50    return dnsname_mangler.get_router_addr(client_hostname,
51                                           cmdline_override=router_hostname)
52
53
54def build_router_proxy(test_name='', client_hostname=None, router_addr=None,
55                       enable_avahi=False):
56    """Build up a LinuxRouter object.
57
58    Verifies that the remote host responds to ping.
59    Either client_hostname or router_addr must be specified.
60
61    @param test_name: string name of this test (e.g. 'network_WiFi_TestName').
62    @param client_hostname: string hostname of DUT if we're in the lab.
63    @param router_addr: string DNS/IPv4 address to use for router host object.
64    @param enable_avahi: boolean True iff avahi should be started on the router.
65
66    @return LinuxRouter or raise error.TestError on failure.
67
68    """
69    router_hostname = build_router_hostname(client_hostname=client_hostname,
70                                            router_hostname=router_addr)
71    logging.info('Connecting to router at %s', router_hostname)
72    ping_helper = ping_runner.PingRunner()
73    if not ping_helper.simple_ping(router_hostname):
74        raise error.TestError('Router at %s is not pingable.' %
75                              router_hostname)
76
77    # Use CrosHost for all router hosts and avoid host detection.
78    # Host detection would use JetstreamHost for Whirlwind routers.
79    # JetstreamHost assumes ap-daemons are running.
80    # Testbed routers run the testbed-ap profile with no ap-daemons.
81    # TODO(ecgh): crbug.com/757075 Fix testbed-ap JetstreamHost detection.
82    return LinuxRouter(hosts.create_host(router_hostname,
83                                         host_class=hosts.CrosHost),
84                       test_name,
85                       enable_avahi=enable_avahi)
86
87
88class LinuxRouter(site_linux_system.LinuxSystem):
89    """Linux/mac80211-style WiFi Router support for WiFiTest class.
90
91    This class implements test methods/steps that communicate with a
92    router implemented with Linux/mac80211.  The router must
93    be pre-configured to enable ssh access and have a mac80211-based
94    wireless device.  We also assume hostapd 0.7.x and iw are present
95    and any necessary modules are pre-loaded.
96
97    """
98
99    KNOWN_TEST_PREFIX = 'network_WiFi_'
100    POLLING_INTERVAL_SECONDS = 0.5
101    STARTUP_TIMEOUT_SECONDS = 30
102    SUFFIX_LETTERS = string.ascii_lowercase + string.digits
103    SUBNET_PREFIX_OCTETS = (192, 168)
104
105    HOSTAPD_CONF_FILE_PATTERN = 'hostapd-test-%s.conf'
106    HOSTAPD_LOG_FILE_PATTERN = 'hostapd-test-%s.log'
107    HOSTAPD_STDERR_LOG_FILE_PATTERN = 'hostapd-stderr-test-%s.log'
108    HOSTAPD_CONTROL_INTERFACE_PATTERN = 'hostapd-test-%s.ctrl'
109    HOSTAPD_DRIVER_NAME = 'nl80211'
110
111    MGMT_FRAME_SENDER_LOG_FILE = 'send_management_frame-test.log'
112
113    PROBE_RESPONSE_FOOTER_FILE = '/tmp/autotest-probe_response_footer'
114
115    _RNG_AVAILABLE = '/sys/class/misc/hw_random/rng_available'
116    _RNG_CURRENT = '/sys/class/misc/hw_random/rng_current'
117
118    def get_capabilities(self):
119        """@return iterable object of AP capabilities for this system."""
120        caps = set()
121        try:
122            self.cmd_send_management_frame = path_utils.must_be_installed(
123                    '/usr/bin/send_management_frame', host=self.host)
124            caps.add(self.CAPABILITY_SEND_MANAGEMENT_FRAME)
125        except error.TestFail:
126            pass
127        return super(LinuxRouter, self).get_capabilities().union(caps)
128
129
130    @property
131    def router(self):
132        """Deprecated.  Use self.host instead.
133
134        @return Host object representing the remote router.
135
136        """
137        return self.host
138
139
140    @property
141    def wifi_ip(self):
142        """Simple accessor for the WiFi IP when there is only one AP.
143
144        @return string IP of WiFi interface.
145
146        """
147        if len(self.local_servers) != 1:
148            raise error.TestError('Could not pick a WiFi IP to return.')
149
150        return self.get_wifi_ip(0)
151
152
153    def __init__(self, host, test_name, enable_avahi=False):
154        """Build a LinuxRouter.
155
156        @param host Host object representing the remote machine.
157        @param test_name string name of this test.  Used in SSID creation.
158        @param enable_avahi: boolean True iff avahi should be started on the
159                router.
160
161        """
162        super(LinuxRouter, self).__init__(host, 'router')
163        self._ssid_prefix = test_name
164        self._enable_avahi = enable_avahi
165        self.__setup()
166
167
168    def __setup(self):
169        """Set up this system.
170
171        Can be used either to complete initialization of a LinuxRouter
172        object, or to re-establish a good state after a reboot.
173
174        """
175        self.cmd_dhcpd = '/usr/sbin/dhcpd'
176        self.cmd_hostapd = path_utils.must_be_installed(
177                '/usr/sbin/hostapd', host=self.host)
178        self.cmd_hostapd_cli = path_utils.must_be_installed(
179                '/usr/sbin/hostapd_cli', host=self.host)
180        self.cmd_wpa_supplicant = path_utils.must_be_installed(
181                '/usr/sbin/wpa_supplicant', host=self.host)
182        self.dhcpd_conf = os.path.join(self.logdir, 'dhcpd.%s.conf')
183        self.dhcpd_leases = os.path.join(self.logdir, 'dhcpd.leases')
184
185        # Log the most recent message on the router so that we can rebuild the
186        # suffix relevant to us when debugging failures.
187        last_log_line = self.host.run('tail -1 /var/log/messages',
188                                      ignore_status=True).stdout
189        # We're trying to get the timestamp from:
190        # 2014-07-23T17:29:34.961056+00:00 localhost kernel: blah blah blah
191        self._log_start_timestamp = last_log_line.strip().partition(' ')[0]
192        if self._log_start_timestamp:
193            logging.debug('Will only retrieve logs after %s.',
194                          self._log_start_timestamp)
195        else:
196            # If syslog is empty, we just use a wildcard pattern, to grab
197            # everything.
198            logging.debug('Empty or corrupt log; will retrieve whole log')
199            self._log_start_timestamp = '.'
200
201        # hostapd configuration persists throughout the test, subsequent
202        # 'config' commands only modify it.
203        if self._ssid_prefix.startswith(self.KNOWN_TEST_PREFIX):
204            # Many of our tests start with an uninteresting prefix.
205            # Remove it so we can have more unique bytes.
206            self._ssid_prefix = self._ssid_prefix[len(self.KNOWN_TEST_PREFIX):]
207        self._number_unique_ssids = 0
208
209        self._total_hostapd_instances = 0
210        self.local_servers = []
211        self.server_address_index = []
212        self.hostapd_instances = []
213        self.station_instances = []
214        self.dhcp_low = 1
215        self.dhcp_high = 128
216
217        # Tear down hostapbr bridge and intermediate functional block
218        # interfaces.
219        result = self.host.run('ls -d /sys/class/net/%s* /sys/class/net/%s*'
220                               ' 2>/dev/null' %
221                               (self.HOSTAP_BRIDGE_INTERFACE_PREFIX,
222                                self.IFB_INTERFACE_PREFIX),
223                               ignore_status=True)
224        for path in result.stdout.splitlines():
225            self.delete_link(path.split('/')[-1])
226
227        # Kill hostapd and dhcp server if already running.
228        self._kill_process_instance('hostapd', timeout_seconds=30)
229        self.stop_dhcp_server(instance=None)
230
231        # Place us in the US by default
232        self.iw_runner.set_regulatory_domain('US')
233
234        self.enable_all_antennas()
235
236        # Some tests want this functionality, but otherwise, it's a distraction.
237        if self._enable_avahi:
238            self.host.run('start avahi', ignore_status=True)
239        else:
240            self.host.run('stop avahi', ignore_status=True)
241
242        # Some routers have bad (slow?) random number generators.
243        self.rng_configure()
244
245
246    def close(self):
247        """Close global resources held by this system."""
248        router_log = os.path.join(self.logdir, 'router_log')
249        self.deconfig()
250        # dnsmasq and hostapd cause interesting events to go to system logs.
251        # Retrieve only the suffix of the logs after the timestamp we stored on
252        # router creation.
253        self.host.run("sed -n -e '/%s/,$p' /var/log/messages >%s" %
254                      (self._log_start_timestamp, router_log),
255                      ignore_status=True)
256        self.host.get_file(router_log, 'debug/router_host_messages')
257        super(LinuxRouter, self).close()
258
259
260    def reboot(self, timeout):
261        """Reboot this router, and restore it to a known-good state.
262
263        @param timeout Maximum seconds to wait for router to return.
264
265        """
266        super(LinuxRouter, self).reboot(timeout)
267        self.__setup()
268
269
270    def has_local_server(self):
271        """@return True iff this router has local servers configured."""
272        return bool(self.local_servers)
273
274
275    def start_hostapd(self, configuration):
276        """Start a hostapd instance described by conf.
277
278        @param configuration HostapConfig object.
279
280        """
281        # Figure out the correct interface.
282        interface = self.get_wlanif(configuration.frequency, 'managed',
283                                    configuration.min_streams)
284        phy_name = self.iw_runner.get_interface(interface).phy
285
286        conf_file = os.path.join(self.logdir,
287                self.HOSTAPD_CONF_FILE_PATTERN % interface)
288        log_file = os.path.join(self.logdir,
289                self.HOSTAPD_LOG_FILE_PATTERN % interface)
290        stderr_log_file = os.path.join(self.logdir,
291                self.HOSTAPD_STDERR_LOG_FILE_PATTERN % interface)
292        control_interface = os.path.join(self.logdir,
293                self.HOSTAPD_CONTROL_INTERFACE_PATTERN % interface)
294        hostapd_conf_dict = configuration.generate_dict(
295                interface, control_interface,
296                self.build_unique_ssid(suffix=configuration.ssid_suffix))
297        logging.debug('hostapd parameters: %r', hostapd_conf_dict)
298
299        # Generate hostapd.conf.
300        self.router.run("cat <<EOF >%s\n%s\nEOF\n" %
301            (conf_file, '\n'.join(
302            "%s=%s" % kv for kv in hostapd_conf_dict.iteritems())))
303
304        # Run hostapd.
305        logging.info('Starting hostapd on %s(%s) channel=%s...',
306                     interface, phy_name, configuration.channel)
307        self.router.run('rm %s' % log_file, ignore_status=True)
308        self.router.run('stop wpasupplicant', ignore_status=True)
309        start_command = '%s -dd -t %s > %s 2> %s & echo $!' % (
310                self.cmd_hostapd, conf_file, log_file, stderr_log_file)
311        pid = int(self.router.run(start_command).stdout.strip())
312        self.hostapd_instances.append(HostapdInstance(
313                hostapd_conf_dict['ssid'],
314                conf_file,
315                log_file,
316                interface,
317                hostapd_conf_dict.copy(),
318                stderr_log_file,
319                configuration.scenario_name))
320
321        # Wait for confirmation that the router came up.
322        logging.info('Waiting for hostapd to startup.')
323        utils.poll_for_condition(
324                condition=lambda: self._has_hostapd_started(log_file, pid),
325                exception=error.TestFail('Timed out while waiting for hostapd '
326                                         'to start.'),
327                timeout=self.STARTUP_TIMEOUT_SECONDS,
328                sleep_interval=self.POLLING_INTERVAL_SECONDS)
329
330        if configuration.frag_threshold:
331            threshold = self.iw_runner.get_fragmentation_threshold(phy_name)
332            if threshold != configuration.frag_threshold:
333                raise error.TestNAError('Router does not support setting '
334                                        'fragmentation threshold')
335
336
337    def _has_hostapd_started(self, log_file, pid):
338        """Determines if hostapd has started.
339
340        @return Whether or not hostapd has started.
341        @raise error.TestFail if there was a bad config or hostapd terminated.
342        """
343        success = self.router.run(
344            'grep "Setup of interface done" %s' % log_file,
345            ignore_status=True).exit_status == 0
346        if success:
347            return True
348
349        # A common failure is an invalid router configuration.
350        # Detect this and exit early if we see it.
351        bad_config = self.router.run(
352            'grep "Interface initialization failed" %s' % log_file,
353            ignore_status=True).exit_status == 0
354        if bad_config:
355            raise error.TestFail('hostapd failed to initialize AP '
356                                 'interface.')
357
358        if pid:
359            early_exit = self.router.run('kill -0 %d' % pid,
360                                         ignore_status=True).exit_status
361            if early_exit:
362                raise error.TestFail('hostapd process terminated.')
363
364        return False
365
366
367    def _kill_process_instance(self,
368                               process,
369                               instance=None,
370                               timeout_seconds=10,
371                               ignore_timeouts=False):
372        """Kill a process on the router.
373
374        Kills remote program named |process| (optionally only a specific
375        |instance|).  Wait |timeout_seconds| for |process| to die
376        before returning.  If |ignore_timeouts| is False, raise
377        a TestError on timeouts.
378
379        @param process: string name of process to kill.
380        @param instance: string fragment of the command line unique to
381                this instance of the remote process.
382        @param timeout_seconds: float timeout in seconds to wait.
383        @param ignore_timeouts: True iff we should ignore failures to
384                kill processes.
385        @return True iff the specified process has exited.
386
387        """
388        if instance is not None:
389            search_arg = '-f "^%s.*%s"' % (process, instance)
390        else:
391            search_arg = process
392
393        self.host.run('pkill %s' % search_arg, ignore_status=True)
394
395        # Wait for process to die
396        time.sleep(self.POLLING_INTERVAL_SECONDS)
397        try:
398            utils.poll_for_condition(
399                    condition=lambda: self.host.run(
400                            'pgrep -l %s' % search_arg,
401                            ignore_status=True).exit_status != 0,
402                    timeout=timeout_seconds,
403                    sleep_interval=self.POLLING_INTERVAL_SECONDS)
404        except utils.TimeoutError:
405            if ignore_timeouts:
406                return False
407
408            raise error.TestError(
409                'Timed out waiting for %s%s to die' %
410                (process,
411                '' if instance is None else ' (instance=%s)' % instance))
412        return True
413
414
415    def kill_hostapd_instance(self, instance):
416        """Kills a hostapd instance.
417
418        @param instance HostapdInstance object.
419
420        """
421        is_dead = self._kill_process_instance(
422                self.cmd_hostapd,
423                instance=instance.conf_file,
424                timeout_seconds=30,
425                ignore_timeouts=True)
426        if instance.scenario_name:
427            log_identifier = instance.scenario_name
428        else:
429            log_identifier = '%d_%s' % (
430                self._total_hostapd_instances, instance.interface)
431        files_to_copy = [(instance.log_file,
432                          'debug/hostapd_router_%s.log' % log_identifier),
433                         (instance.stderr_log_file,
434                          'debug/hostapd_router_%s.stderr.log' %
435                          log_identifier)]
436        for remote_file, local_file in files_to_copy:
437            if self.host.run('ls %s >/dev/null 2>&1' % remote_file,
438                             ignore_status=True).exit_status:
439                logging.error('Did not collect hostapd log file because '
440                              'it was missing.')
441            else:
442                self.router.get_file(remote_file, local_file)
443        self._total_hostapd_instances += 1
444        if not is_dead:
445            raise error.TestError('Timed out killing hostapd.')
446
447
448    def build_unique_ssid(self, suffix=''):
449        """ Build our unique token by base-<len(self.SUFFIX_LETTERS)> encoding
450        the number of APs we've constructed already.
451
452        @param suffix string to append to SSID
453
454        """
455        base = len(self.SUFFIX_LETTERS)
456        number = self._number_unique_ssids
457        self._number_unique_ssids += 1
458        unique = ''
459        while number or not unique:
460            unique = self.SUFFIX_LETTERS[number % base] + unique
461            number = number / base
462        # And salt the SSID so that tests running in adjacent cells are unlikely
463        # to pick the same SSID and we're resistent to beacons leaking out of
464        # cells.
465        salt = ''.join([random.choice(self.SUFFIX_LETTERS) for x in range(5)])
466        return '_'.join([self._ssid_prefix, unique, salt, suffix])[-32:]
467
468
469    def rng_configure(self):
470        """Configure the random generator to our liking.
471
472        Some routers (particularly, Gale) seem to have bad Random Number
473        Generators, such that hostapd can't always generate keys fast enough.
474        The on-board TPM seems to serve as a better generator, so we try to
475        switch to that if available.
476
477        Symptoms of a slow RNG: hostapd complains with:
478
479          WPA: Not enough entropy in random pool to proceed - reject first
480          4-way handshake
481
482        Ref:
483        https://chromium.googlesource.com/chromiumos/third_party/hostap/+/7ea51f728bb7/src/ap/wpa_auth.c#1854
484
485        Linux devices may have RNG parameters at
486        /sys/class/misc/hw_random/rng_{available,current}. See:
487
488          https://www.kernel.org/doc/Documentation/hw_random.txt
489
490        """
491
492        available = self.host.run('cat %s' % self._RNG_AVAILABLE, \
493                                  ignore_status=True).stdout.strip().split(' ')
494        # System may not have HWRNG support. Just skip this.
495        if available == "":
496            return
497        current = self.host.run('cat %s' % self._RNG_CURRENT).stdout. \
498                                strip()
499        want_rng = "tpm-rng"
500
501        logging.debug("Available / current RNGs on router: %r / %s",
502                      available, current)
503        if want_rng in available and want_rng != current:
504            logging.debug("Switching RNGs: %s -> %s", current, want_rng)
505            self.host.run('echo -n "%s" > %s' % (want_rng, self._RNG_CURRENT))
506
507
508    def hostap_configure(self, configuration, multi_interface=None):
509        """Build up a hostapd configuration file and start hostapd.
510
511        Also setup a local server if this router supports them.
512
513        @param configuration HosetapConfig object.
514        @param multi_interface bool True iff multiple interfaces allowed.
515
516        """
517        if multi_interface is None and (self.hostapd_instances or
518                                        self.station_instances):
519            self.deconfig()
520        if configuration.is_11ac:
521            router_caps = self.get_capabilities()
522            if site_linux_system.LinuxSystem.CAPABILITY_VHT not in router_caps:
523                raise error.TestNAError('Router does not have AC support')
524
525        if configuration.use_bridge:
526            configuration._bridge = self.get_brif()
527
528        self.start_hostapd(configuration)
529        interface = self.hostapd_instances[-1].interface
530        self.iw_runner.set_tx_power(interface, 'auto')
531        self.start_local_server(interface, bridge=configuration.bridge)
532        logging.info('AP configured.')
533
534
535    def ibss_configure(self, config):
536        """Configure a station based AP in IBSS mode.
537
538        Extract relevant configuration objects from |config| despite not
539        actually being a hostap managed endpoint.
540
541        @param config HostapConfig object.
542
543        """
544        if self.station_instances or self.hostapd_instances:
545            self.deconfig()
546        interface = self.get_wlanif(config.frequency, 'ibss')
547        ssid = (config.ssid or
548                self.build_unique_ssid(suffix=config.ssid_suffix))
549        # Connect the station
550        self.router.run('%s link set %s up' % (self.cmd_ip, interface))
551        self.iw_runner.ibss_join(interface, ssid, config.frequency)
552        # Always start a local server.
553        self.start_local_server(interface)
554        # Remember that this interface is up.
555        self.station_instances.append(
556                StationInstance(ssid=ssid, interface=interface,
557                                dev_type='ibss'))
558
559
560    def local_server_address(self, index):
561        """Get the local server address for an interface.
562
563        When we multiple local servers, we give them static IP addresses
564        like 192.168.*.254.
565
566        @param index int describing which local server this is for.
567
568        """
569        return '%d.%d.%d.%d' % (self.SUBNET_PREFIX_OCTETS + (index, 254))
570
571
572    def local_peer_ip_address(self, index):
573        """Get the IP address allocated for the peer associated to the AP.
574
575        This address is assigned to a locally associated peer device that
576        is created for the DUT to perform connectivity tests with.
577        When we have multiple local servers, we give them static IP addresses
578        like 192.168.*.253.
579
580        @param index int describing which local server this is for.
581
582        """
583        return '%d.%d.%d.%d' % (self.SUBNET_PREFIX_OCTETS + (index, 253))
584
585    def local_bridge_address(self, index):
586        """Get the bridge address for an interface.
587
588        This address is assigned to a local bridge device.
589
590        @param index int describing which local server this is for.
591
592        """
593        return '%d.%d.%d.%d' % (self.SUBNET_PREFIX_OCTETS + (index, 252))
594
595    def local_peer_mac_address(self):
596        """Get the MAC address of the peer interface.
597
598        @return string MAC address of the peer interface.
599
600        """
601        iface = interface.Interface(self.station_instances[0].interface,
602                                    self.router)
603        return iface.mac_address
604
605
606    def _get_unused_server_address_index(self):
607        """@return an unused server address index."""
608        for address_index in range(0, 256):
609            if address_index not in self.server_address_index:
610                return address_index
611        raise error.TestFail('No available server address index')
612
613
614    def change_server_address_index(self, ap_num=0, server_address_index=None):
615        """Restart the local server with a different server address index.
616
617        This will restart the local server with different gateway IP address
618        and DHCP address ranges.
619
620        @param ap_num: int hostapd instance number.
621        @param server_address_index: int server address index.
622
623        """
624        interface = self.local_servers[ap_num]['interface'];
625        # Get an unused server address index if one is not specified, which
626        # will be different from the one that's currently in used.
627        if server_address_index is None:
628            server_address_index = self._get_unused_server_address_index()
629
630        # Restart local server with the new server address index.
631        self.stop_local_server(self.local_servers[ap_num])
632        self.start_local_server(interface,
633                                ap_num=ap_num,
634                                server_address_index=server_address_index)
635
636
637    def start_local_server(self,
638                           interface,
639                           ap_num=None,
640                           server_address_index=None,
641                           bridge=None):
642        """Start a local server on an interface.
643
644        @param interface string (e.g. wlan0)
645        @param ap_num int the ap instance to start the server for
646        @param server_address_index int server address index
647        @param bridge string (e.g. br0)
648
649        """
650        logging.info('Starting up local server...')
651
652        if len(self.local_servers) >= 256:
653            raise error.TestFail('Exhausted available local servers')
654
655        # Get an unused server address index if one is not specified.
656        # Validate server address index if one is specified.
657        if server_address_index is None:
658            server_address_index = self._get_unused_server_address_index()
659        elif server_address_index in self.server_address_index:
660            raise error.TestFail('Server address index %d already in used' %
661                                 server_address_index)
662
663        server_addr = netblock.from_addr(
664                self.local_server_address(server_address_index),
665                prefix_len=24)
666
667        params = {}
668        params['address_index'] = server_address_index
669        params['netblock'] = server_addr
670        params['dhcp_range'] = ' '.join(
671            (server_addr.get_addr_in_block(1),
672             server_addr.get_addr_in_block(128)))
673        params['interface'] = interface
674        params['bridge'] = bridge
675        params['ip_params'] = ('%s broadcast %s dev %s' %
676                               (server_addr.netblock,
677                                server_addr.broadcast,
678                                interface))
679        if ap_num is None:
680            self.local_servers.append(params)
681        else:
682            self.local_servers.insert(ap_num, params)
683        self.server_address_index.append(server_address_index)
684
685        self.router.run('%s addr flush %s' %
686                        (self.cmd_ip, interface))
687        self.router.run('%s addr add %s' %
688                        (self.cmd_ip, params['ip_params']))
689        self.router.run('%s link set %s up' %
690                        (self.cmd_ip, interface))
691        if params['bridge']:
692            bridge_addr = netblock.from_addr(
693                    self.local_bridge_address(server_address_index),
694                    prefix_len=24)
695            self.router.run("ifconfig %s %s" %
696                           (params['bridge'], bridge_addr.netblock))
697        self.start_dhcp_server(interface)
698
699
700    def stop_local_server(self, server):
701        """Stop a local server on the router
702
703        @param server object server configuration parameters.
704
705        """
706        self.stop_dhcp_server(server['interface'])
707        self.router.run("%s addr del %s" %
708                        (self.cmd_ip, server['ip_params']),
709                        ignore_status=True)
710        self.server_address_index.remove(server['address_index'])
711        self.local_servers.remove(server)
712
713
714    def start_dhcp_server(self, interface):
715        """Start a dhcp server on an interface.
716
717        @param interface string (e.g. wlan0)
718
719        """
720        for server in self.local_servers:
721            if server['interface'] == interface:
722                params = server
723                break
724        else:
725            raise error.TestFail('Could not find local server '
726                                 'to match interface: %r' % interface)
727        server_addr = params['netblock']
728        dhcpd_conf_file = self.dhcpd_conf % interface
729        dhcp_conf = '\n'.join([
730            'port=0',  # disables DNS server
731            'bind-interfaces',
732            'log-dhcp',
733            'dhcp-range=%s' % ','.join((server_addr.get_addr_in_block(1),
734                                        server_addr.get_addr_in_block(128))),
735            'interface=%s' % (params['bridge'] or params['interface']),
736            'dhcp-leasefile=%s' % self.dhcpd_leases])
737        self.router.run('cat <<EOF >%s\n%s\nEOF\n' %
738            (dhcpd_conf_file, dhcp_conf))
739        self.router.run('dnsmasq --conf-file=%s' % dhcpd_conf_file)
740
741
742    def stop_dhcp_server(self, instance=None):
743        """Stop a dhcp server on the router.
744
745        @param instance string instance to kill.
746
747        """
748        self._kill_process_instance('dnsmasq', instance=instance)
749
750
751    def get_wifi_channel(self, ap_num):
752        """Return channel of BSS corresponding to |ap_num|.
753
754        @param ap_num int which BSS to get the channel of.
755        @return int primary channel of BSS.
756
757        """
758        instance = self.hostapd_instances[ap_num]
759        return instance.config_dict['channel']
760
761
762    def get_wifi_ip(self, ap_num):
763        """Return IP address on the WiFi subnet of a local server on the router.
764
765        If no local servers are configured (e.g. for an RSPro), a TestFail will
766        be raised.
767
768        @param ap_num int which local server to get an address from.
769
770        """
771        if not self.local_servers:
772            raise error.TestError('No IP address assigned')
773
774        return self.local_servers[ap_num]['netblock'].addr
775
776
777    def get_wifi_ip_subnet(self, ap_num):
778        """Return subnet of WiFi AP instance.
779
780        If no APs are configured a TestError will be raised.
781
782        @param ap_num int which local server to get an address from.
783
784        """
785        if not self.local_servers:
786            raise error.TestError('No APs configured.')
787
788        return self.local_servers[ap_num]['netblock'].subnet
789
790
791    def get_hostapd_interface(self, ap_num):
792        """Get the name of the interface associated with a hostapd instance.
793
794        @param ap_num: int hostapd instance number.
795        @return string interface name (e.g. 'managed0').
796
797        """
798        if ap_num not in range(len(self.hostapd_instances)):
799            raise error.TestFail('Invalid instance number (%d) with %d '
800                                 'instances configured.' %
801                                 (ap_num, len(self.hostapd_instances)))
802
803        instance = self.hostapd_instances[ap_num]
804        return instance.interface
805
806
807    def get_station_interface(self, instance):
808        """Get the name of the interface associated with a station.
809
810        @param instance: int station instance number.
811        @return string interface name (e.g. 'managed0').
812
813        """
814        if instance not in range(len(self.station_instances)):
815            raise error.TestFail('Invalid instance number (%d) with %d '
816                                 'instances configured.' %
817                                 (instance, len(self.station_instances)))
818
819        instance = self.station_instances[instance]
820        return instance.interface
821
822
823    def get_hostapd_mac(self, ap_num):
824        """Return the MAC address of an AP in the test.
825
826        @param ap_num int index of local server to read the MAC address from.
827        @return string MAC address like 00:11:22:33:44:55.
828
829        """
830        interface_name = self.get_hostapd_interface(ap_num)
831        ap_interface = interface.Interface(interface_name, self.host)
832        return ap_interface.mac_address
833
834
835    def get_hostapd_phy(self, ap_num):
836        """Get name of phy for hostapd instance.
837
838        @param ap_num int index of hostapd instance.
839        @return string phy name of phy corresponding to hostapd's
840                managed interface.
841
842        """
843        interface = self.iw_runner.get_interface(
844                self.get_hostapd_interface(ap_num))
845        return interface.phy
846
847
848    def deconfig(self):
849        """A legacy, deprecated alias for deconfig_aps."""
850        self.deconfig_aps()
851
852
853    def deconfig_aps(self, instance=None, silent=False):
854        """De-configure an AP (will also bring wlan down).
855
856        @param instance: int or None.  If instance is None, will bring down all
857                instances of hostapd.
858        @param silent: True if instances should be brought without de-authing
859                the DUT.
860
861        """
862        if not self.hostapd_instances and not self.station_instances:
863            return
864
865        if self.hostapd_instances:
866            local_servers = []
867            if instance is not None:
868                instances = [ self.hostapd_instances.pop(instance) ]
869                for server in self.local_servers:
870                    if server['interface'] == instances[0].interface:
871                        local_servers = [server]
872                        break
873            else:
874                instances = self.hostapd_instances
875                self.hostapd_instances = []
876                local_servers = copy.copy(self.local_servers)
877
878            for instance in instances:
879                if silent:
880                    # Deconfigure without notifying DUT.  Remove the interface
881                    # hostapd uses to send beacon and DEAUTH packets.
882                    self.remove_interface(instance.interface)
883
884                self.kill_hostapd_instance(instance)
885                self.release_interface(instance.interface)
886        if self.station_instances:
887            local_servers = copy.copy(self.local_servers)
888            instance = self.station_instances.pop()
889            if instance.dev_type == 'ibss':
890                self.iw_runner.ibss_leave(instance.interface)
891            elif instance.dev_type == 'managed':
892                self._kill_process_instance(self.cmd_wpa_supplicant,
893                                            instance=instance.interface)
894            else:
895                self.iw_runner.disconnect_station(instance.interface)
896            self.router.run('%s link set %s down' %
897                            (self.cmd_ip, instance.interface))
898
899        for server in local_servers:
900            self.stop_local_server(server)
901
902        for brif in range(self._brif_index):
903            self.delete_link('%s%d' %
904                             (self.HOSTAP_BRIDGE_INTERFACE_PREFIX, brif))
905
906
907    def delete_link(self, name):
908        """Delete link using the `ip` command.
909
910        @param name string link name.
911
912        """
913        self.host.run('%s link del %s' % (self.cmd_ip, name),
914                      ignore_status=True)
915
916
917    def set_ap_interface_down(self, instance=0):
918        """Bring down the hostapd interface.
919
920        @param instance int router instance number.
921
922        """
923        self.host.run('%s link set %s down' %
924                      (self.cmd_ip, self.get_hostapd_interface(instance)))
925
926
927    def confirm_pmksa_cache_use(self, instance=0):
928        """Verify that the PMKSA auth was cached on a hostapd instance.
929
930        @param instance int router instance number.
931
932        """
933        log_file = self.hostapd_instances[instance].log_file
934        pmksa_match = 'PMK from PMKSA cache'
935        result = self.router.run('grep -q "%s" %s' % (pmksa_match, log_file),
936                                 ignore_status=True)
937        if result.exit_status:
938            raise error.TestFail('PMKSA cache was not used in roaming.')
939
940
941    def get_ssid(self, instance=None):
942        """@return string ssid for the network stemming from this router."""
943        if instance is None:
944            instance = 0
945            if len(self.hostapd_instances) > 1:
946                raise error.TestFail('No instance of hostapd specified with '
947                                     'multiple instances present.')
948
949        if self.hostapd_instances:
950            return self.hostapd_instances[instance].ssid
951
952        if self.station_instances:
953            return self.station_instances[0].ssid
954
955        raise error.TestFail('Requested ssid of an unconfigured AP.')
956
957
958    def deauth_client(self, client_mac):
959        """Deauthenticates a client described in params.
960
961        @param client_mac string containing the mac address of the client to be
962               deauthenticated.
963
964        """
965        control_if = self.hostapd_instances[-1].config_dict['ctrl_interface']
966        self.router.run('%s -p%s deauthenticate %s' %
967                        (self.cmd_hostapd_cli, control_if, client_mac))
968
969    def send_bss_tm_req(self, client_mac, neighbor_list):
970        """Send a BSS Transition Management Request to a client.
971
972        @param client_mac string containing the mac address of the client.
973        @param neighbor_list list of strings containing mac addresses of
974               candidate APs.
975        @return string reply received from command
976
977        """
978        control_if = self.hostapd_instances[0].config_dict['ctrl_interface']
979        command = ('%s -p%s BSS_TM_REQ %s neighbor=%s,0,0,0,0 pref=1' %
980                   (self.cmd_hostapd_cli, control_if, client_mac,
981                    ',0,0,0,0 neighbor='.join(neighbor_list)))
982        ret = self.router.run(command).stdout
983        return ret.splitlines()[-1]
984
985    def _prep_probe_response_footer(self, footer):
986        """Write probe response footer temporarily to a local file and copy
987        over to test router.
988
989        @param footer string containing bytes for the probe response footer.
990        @raises AutoservRunError: If footer file copy fails.
991
992        """
993        with tempfile.NamedTemporaryFile() as fp:
994            fp.write(footer)
995            fp.flush()
996            try:
997                self.host.send_file(fp.name, self.PROBE_RESPONSE_FOOTER_FILE)
998            except error.AutoservRunError:
999                logging.error('failed to copy footer file to AP')
1000                raise
1001
1002
1003    def send_management_frame_on_ap(self, frame_type, channel, instance=0):
1004        """Injects a management frame into an active hostapd session.
1005
1006        @param frame_type string the type of frame to send.
1007        @param channel int targeted channel
1008        @param instance int indicating which hostapd instance to inject into.
1009
1010        """
1011        hostap_interface = self.hostapd_instances[instance].interface
1012        interface = self.get_wlanif(0, 'monitor', same_phy_as=hostap_interface)
1013        self.router.run("%s link set %s up" % (self.cmd_ip, interface))
1014        self.router.run('%s -i %s -t %s -c %d' %
1015                        (self.cmd_send_management_frame, interface, frame_type,
1016                         channel))
1017        self.release_interface(interface)
1018
1019
1020    def send_management_frame(self, interface, frame_type, channel,
1021                              ssid_prefix=None, num_bss=None,
1022                              frame_count=None, delay=None,
1023                              dest_addr=None, probe_resp_footer=None):
1024        """
1025        Injects management frames on specify channel |frequency|.
1026
1027        This function will spawn off a new process to inject specified
1028        management frames |frame_type| at the specified interface |interface|.
1029
1030        @param interface string interface to inject frames.
1031        @param frame_type string message type.
1032        @param channel int targeted channel.
1033        @param ssid_prefix string SSID prefix.
1034        @param num_bss int number of BSS.
1035        @param frame_count int number of frames to send.
1036        @param delay int milliseconds delay between frames.
1037        @param dest_addr string destination address (DA) MAC address.
1038        @param probe_resp_footer string footer for probe response.
1039
1040        @return int PID of the newly created process.
1041
1042        """
1043        command = '%s -i %s -t %s -c %d' % (self.cmd_send_management_frame,
1044                                interface, frame_type, channel)
1045        if ssid_prefix is not None:
1046            command += ' -s %s' % (ssid_prefix)
1047        if num_bss is not None:
1048            command += ' -b %d' % (num_bss)
1049        if frame_count is not None:
1050            command += ' -n %d' % (frame_count)
1051        if delay is not None:
1052            command += ' -d %d' % (delay)
1053        if dest_addr is not None:
1054            command += ' -a %s' % (dest_addr)
1055        if probe_resp_footer is not None:
1056            self._prep_probe_response_footer(footer=probe_resp_footer)
1057            command += ' -f %s' % (self.PROBE_RESPONSE_FOOTER_FILE)
1058        command += ' > %s 2>&1 & echo $!' % (os.path.join(self.logdir,
1059            self.MGMT_FRAME_SENDER_LOG_FILE))
1060        pid = int(self.router.run(command).stdout)
1061        return pid
1062
1063
1064    def detect_client_deauth(self, client_mac, instance=0):
1065        """Detects whether hostapd has logged a deauthentication from
1066        |client_mac|.
1067
1068        @param client_mac string the MAC address of the client to detect.
1069        @param instance int indicating which hostapd instance to query.
1070
1071        """
1072        interface = self.hostapd_instances[instance].interface
1073        deauth_msg = "%s: deauthentication: STA=%s" % (interface, client_mac)
1074        log_file = self.hostapd_instances[instance].log_file
1075        result = self.router.run("grep -qi '%s' %s" % (deauth_msg, log_file),
1076                                 ignore_status=True)
1077        return result.exit_status == 0
1078
1079
1080    def detect_client_coexistence_report(self, client_mac, instance=0):
1081        """Detects whether hostapd has logged an action frame from
1082        |client_mac| indicating information about 20/40MHz BSS coexistence.
1083
1084        @param client_mac string the MAC address of the client to detect.
1085        @param instance int indicating which hostapd instance to query.
1086
1087        """
1088        coex_msg = ('nl80211: MLME event frame - hexdump(len=.*): '
1089                    '.. .. .. .. .. .. .. .. .. .. %s '
1090                    '.. .. .. .. .. .. .. .. 04 00.*48 01 ..' %
1091                    ' '.join(client_mac.split(':')))
1092        log_file = self.hostapd_instances[instance].log_file
1093        result = self.router.run("grep -qi '%s' %s" % (coex_msg, log_file),
1094                                 ignore_status=True)
1095        return result.exit_status == 0
1096
1097
1098    def send_magic_packet(self, dest_ip, dest_mac):
1099        """Sends a magic packet to the NIC with the given IP and MAC addresses.
1100
1101        @param dest_ip the IP address of the device to send the packet to
1102        @param dest_mac the hardware MAC address of the device
1103
1104        """
1105        # magic packet is 6 0xff bytes followed by the hardware address
1106        # 16 times
1107        mac_bytes = ''.join([chr(int(b, 16)) for b in dest_mac.split(':')])
1108        magic_packet = '\xff' * 6 + mac_bytes * 16
1109
1110        logging.info('Sending magic packet to %s...', dest_ip)
1111        self.host.run('python -uc "import socket, sys;'
1112                      's = socket.socket(socket.AF_INET, socket.SOCK_DGRAM);'
1113                      's.sendto(sys.stdin.read(), (\'%s\', %d))"' %
1114                      (dest_ip, UDP_DISCARD_PORT),
1115                      stdin=magic_packet)
1116
1117
1118    def setup_bridge_mode_dhcp_server(self):
1119        """Setup an DHCP server for bridge mode.
1120
1121        Setup an DHCP server on the master interface of the virtual ethernet
1122        pair, with peer interface connected to the bridge interface. This is
1123        used for testing APs in bridge mode.
1124
1125        """
1126        # Start a local server on master interface of virtual ethernet pair.
1127        self.start_local_server(
1128                self.get_virtual_ethernet_master_interface())
1129        # Add peer interface to the bridge.
1130        self.add_interface_to_bridge(
1131                self.get_virtual_ethernet_peer_interface())
1132