Home | History | Annotate | Download | only in wifi
      1 /*
      2  * Copyright 2008, The Android Open Source Project
      3  *
      4  * Licensed under the Apache License, Version 2.0 (the "License");
      5  * you may not use this file except in compliance with the License.
      6  * You may obtain a copy of the License at
      7  *
      8  *     http://www.apache.org/licenses/LICENSE-2.0
      9  *
     10  * Unless required by applicable law or agreed to in writing, software
     11  * distributed under the License is distributed on an "AS IS" BASIS,
     12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
     13  * See the License for the specific language governing permissions and
     14  * limitations under the License.
     15  */
     16 
     17 #include <stdlib.h>
     18 #include <fcntl.h>
     19 #include <errno.h>
     20 #include <string.h>
     21 #include <dirent.h>
     22 #include <sys/socket.h>
     23 #include <unistd.h>
     24 #include <poll.h>
     25 
     26 #include "hardware_legacy/wifi.h"
     27 #include "libwpa_client/wpa_ctrl.h"
     28 
     29 #define LOG_TAG "WifiHW"
     30 #include "cutils/log.h"
     31 #include "cutils/memory.h"
     32 #include "cutils/misc.h"
     33 #include "cutils/properties.h"
     34 #include "private/android_filesystem_config.h"
     35 #ifdef HAVE_LIBC_SYSTEM_PROPERTIES
     36 #define _REALLY_INCLUDE_SYS__SYSTEM_PROPERTIES_H_
     37 #include <sys/_system_properties.h>
     38 #endif
     39 
     40 /* PRIMARY refers to the connection on the primary interface
     41  * SECONDARY refers to an optional connection on a p2p interface
     42  *
     43  * For concurrency, we only support one active p2p connection and
     44  * one active STA connection at a time
     45  */
     46 #define PRIMARY     0
     47 #define SECONDARY   1
     48 #define MAX_CONNS   2
     49 
     50 static struct wpa_ctrl *ctrl_conn[MAX_CONNS];
     51 static struct wpa_ctrl *monitor_conn[MAX_CONNS];
     52 
     53 /* socket pair used to exit from a blocking read */
     54 static int exit_sockets[MAX_CONNS][2];
     55 
     56 extern int do_dhcp();
     57 extern int ifc_init();
     58 extern void ifc_close();
     59 extern char *dhcp_lasterror();
     60 extern void get_dhcp_info();
     61 extern int init_module(void *, unsigned long, const char *);
     62 extern int delete_module(const char *, unsigned int);
     63 
     64 static char primary_iface[PROPERTY_VALUE_MAX];
     65 // TODO: use new ANDROID_SOCKET mechanism, once support for multiple
     66 // sockets is in
     67 
     68 #ifndef WIFI_DRIVER_MODULE_ARG
     69 #define WIFI_DRIVER_MODULE_ARG          ""
     70 #endif
     71 #ifndef WIFI_FIRMWARE_LOADER
     72 #define WIFI_FIRMWARE_LOADER		""
     73 #endif
     74 #define WIFI_TEST_INTERFACE		"sta"
     75 
     76 #ifndef WIFI_DRIVER_FW_PATH_STA
     77 #define WIFI_DRIVER_FW_PATH_STA		NULL
     78 #endif
     79 #ifndef WIFI_DRIVER_FW_PATH_AP
     80 #define WIFI_DRIVER_FW_PATH_AP		NULL
     81 #endif
     82 #ifndef WIFI_DRIVER_FW_PATH_P2P
     83 #define WIFI_DRIVER_FW_PATH_P2P		NULL
     84 #endif
     85 
     86 #ifndef WIFI_DRIVER_FW_PATH_PARAM
     87 #define WIFI_DRIVER_FW_PATH_PARAM	"/sys/module/wlan/parameters/fwpath"
     88 #endif
     89 
     90 #define WIFI_DRIVER_LOADER_DELAY	1000000
     91 
     92 static const char IFACE_DIR[]           = "/data/system/wpa_supplicant";
     93 #ifdef WIFI_DRIVER_MODULE_PATH
     94 static const char DRIVER_MODULE_NAME[]  = WIFI_DRIVER_MODULE_NAME;
     95 static const char DRIVER_MODULE_TAG[]   = WIFI_DRIVER_MODULE_NAME " ";
     96 static const char DRIVER_MODULE_PATH[]  = WIFI_DRIVER_MODULE_PATH;
     97 static const char DRIVER_MODULE_ARG[]   = WIFI_DRIVER_MODULE_ARG;
     98 #endif
     99 static const char FIRMWARE_LOADER[]     = WIFI_FIRMWARE_LOADER;
    100 static const char DRIVER_PROP_NAME[]    = "wlan.driver.status";
    101 static const char SUPPLICANT_NAME[]     = "wpa_supplicant";
    102 static const char SUPP_PROP_NAME[]      = "init.svc.wpa_supplicant";
    103 static const char P2P_SUPPLICANT_NAME[] = "p2p_supplicant";
    104 static const char P2P_PROP_NAME[]       = "init.svc.p2p_supplicant";
    105 static const char SUPP_CONFIG_TEMPLATE[]= "/system/etc/wifi/wpa_supplicant.conf";
    106 static const char SUPP_CONFIG_FILE[]    = "/data/misc/wifi/wpa_supplicant.conf";
    107 static const char P2P_CONFIG_FILE[]     = "/data/misc/wifi/p2p_supplicant.conf";
    108 static const char CONTROL_IFACE_PATH[]  = "/data/misc/wifi/sockets";
    109 static const char MODULE_FILE[]         = "/proc/modules";
    110 
    111 static const char SUPP_ENTROPY_FILE[]   = WIFI_ENTROPY_FILE;
    112 static unsigned char dummy_key[21] = { 0x02, 0x11, 0xbe, 0x33, 0x43, 0x35,
    113                                        0x68, 0x47, 0x84, 0x99, 0xa9, 0x2b,
    114                                        0x1c, 0xd3, 0xee, 0xff, 0xf1, 0xe2,
    115                                        0xf3, 0xf4, 0xf5 };
    116 
    117 /* Is either SUPPLICANT_NAME or P2P_SUPPLICANT_NAME */
    118 static char supplicant_name[PROPERTY_VALUE_MAX];
    119 /* Is either SUPP_PROP_NAME or P2P_PROP_NAME */
    120 static char supplicant_prop_name[PROPERTY_KEY_MAX];
    121 
    122 static int is_primary_interface(const char *ifname)
    123 {
    124     //Treat NULL as primary interface to allow control
    125     //on STA without an interface
    126     if (ifname == NULL || !strncmp(ifname, primary_iface, strlen(primary_iface))) {
    127         return 1;
    128     }
    129     return 0;
    130 }
    131 
    132 static int insmod(const char *filename, const char *args)
    133 {
    134     void *module;
    135     unsigned int size;
    136     int ret;
    137 
    138     module = load_file(filename, &size);
    139     if (!module)
    140         return -1;
    141 
    142     ret = init_module(module, size, args);
    143 
    144     free(module);
    145 
    146     return ret;
    147 }
    148 
    149 static int rmmod(const char *modname)
    150 {
    151     int ret = -1;
    152     int maxtry = 10;
    153 
    154     while (maxtry-- > 0) {
    155         ret = delete_module(modname, O_NONBLOCK | O_EXCL);
    156         if (ret < 0 && errno == EAGAIN)
    157             usleep(500000);
    158         else
    159             break;
    160     }
    161 
    162     if (ret != 0)
    163         ALOGD("Unable to unload driver module \"%s\": %s\n",
    164              modname, strerror(errno));
    165     return ret;
    166 }
    167 
    168 int do_dhcp_request(int *ipaddr, int *gateway, int *mask,
    169                     int *dns1, int *dns2, int *server, int *lease) {
    170     /* For test driver, always report success */
    171     if (strcmp(primary_iface, WIFI_TEST_INTERFACE) == 0)
    172         return 0;
    173 
    174     if (ifc_init() < 0)
    175         return -1;
    176 
    177     if (do_dhcp(primary_iface) < 0) {
    178         ifc_close();
    179         return -1;
    180     }
    181     ifc_close();
    182     get_dhcp_info(ipaddr, gateway, mask, dns1, dns2, server, lease);
    183     return 0;
    184 }
    185 
    186 const char *get_dhcp_error_string() {
    187     return dhcp_lasterror();
    188 }
    189 
    190 int is_wifi_driver_loaded() {
    191     char driver_status[PROPERTY_VALUE_MAX];
    192 #ifdef WIFI_DRIVER_MODULE_PATH
    193     FILE *proc;
    194     char line[sizeof(DRIVER_MODULE_TAG)+10];
    195 #endif
    196 
    197     if (!property_get(DRIVER_PROP_NAME, driver_status, NULL)
    198             || strcmp(driver_status, "ok") != 0) {
    199         return 0;  /* driver not loaded */
    200     }
    201 #ifdef WIFI_DRIVER_MODULE_PATH
    202     /*
    203      * If the property says the driver is loaded, check to
    204      * make sure that the property setting isn't just left
    205      * over from a previous manual shutdown or a runtime
    206      * crash.
    207      */
    208     if ((proc = fopen(MODULE_FILE, "r")) == NULL) {
    209         ALOGW("Could not open %s: %s", MODULE_FILE, strerror(errno));
    210         property_set(DRIVER_PROP_NAME, "unloaded");
    211         return 0;
    212     }
    213     while ((fgets(line, sizeof(line), proc)) != NULL) {
    214         if (strncmp(line, DRIVER_MODULE_TAG, strlen(DRIVER_MODULE_TAG)) == 0) {
    215             fclose(proc);
    216             return 1;
    217         }
    218     }
    219     fclose(proc);
    220     property_set(DRIVER_PROP_NAME, "unloaded");
    221     return 0;
    222 #else
    223     return 1;
    224 #endif
    225 }
    226 
    227 int wifi_load_driver()
    228 {
    229 #ifdef WIFI_DRIVER_MODULE_PATH
    230     char driver_status[PROPERTY_VALUE_MAX];
    231     int count = 100; /* wait at most 20 seconds for completion */
    232 
    233     if (is_wifi_driver_loaded()) {
    234         return 0;
    235     }
    236 
    237     if (insmod(DRIVER_MODULE_PATH, DRIVER_MODULE_ARG) < 0)
    238         return -1;
    239 
    240     if (strcmp(FIRMWARE_LOADER,"") == 0) {
    241         /* usleep(WIFI_DRIVER_LOADER_DELAY); */
    242         property_set(DRIVER_PROP_NAME, "ok");
    243     }
    244     else {
    245         property_set("ctl.start", FIRMWARE_LOADER);
    246     }
    247     sched_yield();
    248     while (count-- > 0) {
    249         if (property_get(DRIVER_PROP_NAME, driver_status, NULL)) {
    250             if (strcmp(driver_status, "ok") == 0)
    251                 return 0;
    252             else if (strcmp(DRIVER_PROP_NAME, "failed") == 0) {
    253                 wifi_unload_driver();
    254                 return -1;
    255             }
    256         }
    257         usleep(200000);
    258     }
    259     property_set(DRIVER_PROP_NAME, "timeout");
    260     wifi_unload_driver();
    261     return -1;
    262 #else
    263     property_set(DRIVER_PROP_NAME, "ok");
    264     return 0;
    265 #endif
    266 }
    267 
    268 int wifi_unload_driver()
    269 {
    270     usleep(200000); /* allow to finish interface down */
    271 #ifdef WIFI_DRIVER_MODULE_PATH
    272     if (rmmod(DRIVER_MODULE_NAME) == 0) {
    273         int count = 20; /* wait at most 10 seconds for completion */
    274         while (count-- > 0) {
    275             if (!is_wifi_driver_loaded())
    276                 break;
    277             usleep(500000);
    278         }
    279         usleep(500000); /* allow card removal */
    280         if (count) {
    281             return 0;
    282         }
    283         return -1;
    284     } else
    285         return -1;
    286 #else
    287     property_set(DRIVER_PROP_NAME, "unloaded");
    288     return 0;
    289 #endif
    290 }
    291 
    292 int ensure_entropy_file_exists()
    293 {
    294     int ret;
    295     int destfd;
    296 
    297     ret = access(SUPP_ENTROPY_FILE, R_OK|W_OK);
    298     if ((ret == 0) || (errno == EACCES)) {
    299         if ((ret != 0) &&
    300             (chmod(SUPP_ENTROPY_FILE, S_IRUSR|S_IWUSR|S_IRGRP|S_IWGRP) != 0)) {
    301             ALOGE("Cannot set RW to \"%s\": %s", SUPP_ENTROPY_FILE, strerror(errno));
    302             return -1;
    303         }
    304         return 0;
    305     }
    306     destfd = TEMP_FAILURE_RETRY(open(SUPP_ENTROPY_FILE, O_CREAT|O_RDWR, 0660));
    307     if (destfd < 0) {
    308         ALOGE("Cannot create \"%s\": %s", SUPP_ENTROPY_FILE, strerror(errno));
    309         return -1;
    310     }
    311 
    312     if (TEMP_FAILURE_RETRY(write(destfd, dummy_key, sizeof(dummy_key))) != sizeof(dummy_key)) {
    313         ALOGE("Error writing \"%s\": %s", SUPP_ENTROPY_FILE, strerror(errno));
    314         close(destfd);
    315         return -1;
    316     }
    317     close(destfd);
    318 
    319     /* chmod is needed because open() didn't set permisions properly */
    320     if (chmod(SUPP_ENTROPY_FILE, 0660) < 0) {
    321         ALOGE("Error changing permissions of %s to 0660: %s",
    322              SUPP_ENTROPY_FILE, strerror(errno));
    323         unlink(SUPP_ENTROPY_FILE);
    324         return -1;
    325     }
    326 
    327     if (chown(SUPP_ENTROPY_FILE, AID_SYSTEM, AID_WIFI) < 0) {
    328         ALOGE("Error changing group ownership of %s to %d: %s",
    329              SUPP_ENTROPY_FILE, AID_WIFI, strerror(errno));
    330         unlink(SUPP_ENTROPY_FILE);
    331         return -1;
    332     }
    333     return 0;
    334 }
    335 
    336 int update_ctrl_interface(const char *config_file) {
    337 
    338     int srcfd, destfd;
    339     int nread;
    340     char ifc[PROPERTY_VALUE_MAX];
    341     char *pbuf;
    342     char *sptr;
    343     struct stat sb;
    344 
    345     if (stat(config_file, &sb) != 0)
    346         return -1;
    347 
    348     pbuf = malloc(sb.st_size + PROPERTY_VALUE_MAX);
    349     if (!pbuf)
    350         return 0;
    351     srcfd = TEMP_FAILURE_RETRY(open(config_file, O_RDONLY));
    352     if (srcfd < 0) {
    353         ALOGE("Cannot open \"%s\": %s", config_file, strerror(errno));
    354         free(pbuf);
    355         return 0;
    356     }
    357     nread = TEMP_FAILURE_RETRY(read(srcfd, pbuf, sb.st_size));
    358     close(srcfd);
    359     if (nread < 0) {
    360         ALOGE("Cannot read \"%s\": %s", config_file, strerror(errno));
    361         free(pbuf);
    362         return 0;
    363     }
    364 
    365     if (!strcmp(config_file, SUPP_CONFIG_FILE)) {
    366         property_get("wifi.interface", ifc, WIFI_TEST_INTERFACE);
    367     } else {
    368         strcpy(ifc, CONTROL_IFACE_PATH);
    369     }
    370     /*
    371      * if there is a "ctrl_interface=<value>" entry, re-write it ONLY if it is
    372      * NOT a directory.  The non-directory value option is an Android add-on
    373      * that allows the control interface to be exchanged through an environment
    374      * variable (initialized by the "init" program when it starts a service
    375      * with a "socket" option).
    376      *
    377      * The <value> is deemed to be a directory if the "DIR=" form is used or
    378      * the value begins with "/".
    379      */
    380     if ((sptr = strstr(pbuf, "ctrl_interface=")) &&
    381         (!strstr(pbuf, "ctrl_interface=DIR=")) &&
    382         (!strstr(pbuf, "ctrl_interface=/"))) {
    383         char *iptr = sptr + strlen("ctrl_interface=");
    384         int ilen = 0;
    385         int mlen = strlen(ifc);
    386         int nwrite;
    387         if (strncmp(ifc, iptr, mlen) != 0) {
    388             ALOGE("ctrl_interface != %s", ifc);
    389             while (((ilen + (iptr - pbuf)) < nread) && (iptr[ilen] != '\n'))
    390                 ilen++;
    391             mlen = ((ilen >= mlen) ? ilen : mlen) + 1;
    392             memmove(iptr + mlen, iptr + ilen + 1, nread - (iptr + ilen + 1 - pbuf));
    393             memset(iptr, '\n', mlen);
    394             memcpy(iptr, ifc, strlen(ifc));
    395             destfd = TEMP_FAILURE_RETRY(open(config_file, O_RDWR, 0660));
    396             if (destfd < 0) {
    397                 ALOGE("Cannot update \"%s\": %s", config_file, strerror(errno));
    398                 free(pbuf);
    399                 return -1;
    400             }
    401             TEMP_FAILURE_RETRY(write(destfd, pbuf, nread + mlen - ilen -1));
    402             close(destfd);
    403         }
    404     }
    405     free(pbuf);
    406     return 0;
    407 }
    408 
    409 int ensure_config_file_exists(const char *config_file)
    410 {
    411     char buf[2048];
    412     int srcfd, destfd;
    413     struct stat sb;
    414     int nread;
    415     int ret;
    416 
    417     ret = access(config_file, R_OK|W_OK);
    418     if ((ret == 0) || (errno == EACCES)) {
    419         if ((ret != 0) &&
    420             (chmod(config_file, S_IRUSR|S_IWUSR|S_IRGRP|S_IWGRP) != 0)) {
    421             ALOGE("Cannot set RW to \"%s\": %s", config_file, strerror(errno));
    422             return -1;
    423         }
    424         /* return if filesize is at least 10 bytes */
    425         if (stat(config_file, &sb) == 0 && sb.st_size > 10) {
    426             return update_ctrl_interface(config_file);
    427         }
    428     } else if (errno != ENOENT) {
    429         ALOGE("Cannot access \"%s\": %s", config_file, strerror(errno));
    430         return -1;
    431     }
    432 
    433     srcfd = TEMP_FAILURE_RETRY(open(SUPP_CONFIG_TEMPLATE, O_RDONLY));
    434     if (srcfd < 0) {
    435         ALOGE("Cannot open \"%s\": %s", SUPP_CONFIG_TEMPLATE, strerror(errno));
    436         return -1;
    437     }
    438 
    439     destfd = TEMP_FAILURE_RETRY(open(config_file, O_CREAT|O_RDWR, 0660));
    440     if (destfd < 0) {
    441         close(srcfd);
    442         ALOGE("Cannot create \"%s\": %s", config_file, strerror(errno));
    443         return -1;
    444     }
    445 
    446     while ((nread = TEMP_FAILURE_RETRY(read(srcfd, buf, sizeof(buf)))) != 0) {
    447         if (nread < 0) {
    448             ALOGE("Error reading \"%s\": %s", SUPP_CONFIG_TEMPLATE, strerror(errno));
    449             close(srcfd);
    450             close(destfd);
    451             unlink(config_file);
    452             return -1;
    453         }
    454         TEMP_FAILURE_RETRY(write(destfd, buf, nread));
    455     }
    456 
    457     close(destfd);
    458     close(srcfd);
    459 
    460     /* chmod is needed because open() didn't set permisions properly */
    461     if (chmod(config_file, 0660) < 0) {
    462         ALOGE("Error changing permissions of %s to 0660: %s",
    463              config_file, strerror(errno));
    464         unlink(config_file);
    465         return -1;
    466     }
    467 
    468     if (chown(config_file, AID_SYSTEM, AID_WIFI) < 0) {
    469         ALOGE("Error changing group ownership of %s to %d: %s",
    470              config_file, AID_WIFI, strerror(errno));
    471         unlink(config_file);
    472         return -1;
    473     }
    474     return update_ctrl_interface(config_file);
    475 }
    476 
    477 /**
    478  * wifi_wpa_ctrl_cleanup() - Delete any local UNIX domain socket files that
    479  * may be left over from clients that were previously connected to
    480  * wpa_supplicant. This keeps these files from being orphaned in the
    481  * event of crashes that prevented them from being removed as part
    482  * of the normal orderly shutdown.
    483  */
    484 void wifi_wpa_ctrl_cleanup(void)
    485 {
    486     DIR *dir;
    487     struct dirent entry;
    488     struct dirent *result;
    489     size_t dirnamelen;
    490     size_t maxcopy;
    491     char pathname[PATH_MAX];
    492     char *namep;
    493     char *local_socket_dir = CONFIG_CTRL_IFACE_CLIENT_DIR;
    494     char *local_socket_prefix = CONFIG_CTRL_IFACE_CLIENT_PREFIX;
    495 
    496     if ((dir = opendir(local_socket_dir)) == NULL)
    497         return;
    498 
    499     dirnamelen = (size_t)snprintf(pathname, sizeof(pathname), "%s/", local_socket_dir);
    500     if (dirnamelen >= sizeof(pathname)) {
    501         closedir(dir);
    502         return;
    503     }
    504     namep = pathname + dirnamelen;
    505     maxcopy = PATH_MAX - dirnamelen;
    506     while (readdir_r(dir, &entry, &result) == 0 && result != NULL) {
    507         if (strncmp(entry.d_name, local_socket_prefix, strlen(local_socket_prefix)) == 0) {
    508             if (strlcpy(namep, entry.d_name, maxcopy) < maxcopy) {
    509                 unlink(pathname);
    510             }
    511         }
    512     }
    513     closedir(dir);
    514 }
    515 
    516 int wifi_start_supplicant(int p2p_supported)
    517 {
    518     char supp_status[PROPERTY_VALUE_MAX] = {'\0'};
    519     int count = 200; /* wait at most 20 seconds for completion */
    520 #ifdef HAVE_LIBC_SYSTEM_PROPERTIES
    521     const prop_info *pi;
    522     unsigned serial = 0, i;
    523 #endif
    524 
    525     if (p2p_supported) {
    526         strcpy(supplicant_name, P2P_SUPPLICANT_NAME);
    527         strcpy(supplicant_prop_name, P2P_PROP_NAME);
    528 
    529         /* Ensure p2p config file is created */
    530         if (ensure_config_file_exists(P2P_CONFIG_FILE) < 0) {
    531             ALOGE("Failed to create a p2p config file");
    532             return -1;
    533         }
    534 
    535     } else {
    536         strcpy(supplicant_name, SUPPLICANT_NAME);
    537         strcpy(supplicant_prop_name, SUPP_PROP_NAME);
    538     }
    539 
    540     /* Check whether already running */
    541     if (property_get(supplicant_name, supp_status, NULL)
    542             && strcmp(supp_status, "running") == 0) {
    543         return 0;
    544     }
    545 
    546     /* Before starting the daemon, make sure its config file exists */
    547     if (ensure_config_file_exists(SUPP_CONFIG_FILE) < 0) {
    548         ALOGE("Wi-Fi will not be enabled");
    549         return -1;
    550     }
    551 
    552     if (ensure_entropy_file_exists() < 0) {
    553         ALOGE("Wi-Fi entropy file was not created");
    554     }
    555 
    556     /* Clear out any stale socket files that might be left over. */
    557     wifi_wpa_ctrl_cleanup();
    558 
    559     /* Reset sockets used for exiting from hung state */
    560     for (i=0; i<MAX_CONNS; i++) {
    561         exit_sockets[i][0] = exit_sockets[i][1] = -1;
    562     }
    563 
    564 #ifdef HAVE_LIBC_SYSTEM_PROPERTIES
    565     /*
    566      * Get a reference to the status property, so we can distinguish
    567      * the case where it goes stopped => running => stopped (i.e.,
    568      * it start up, but fails right away) from the case in which
    569      * it starts in the stopped state and never manages to start
    570      * running at all.
    571      */
    572     pi = __system_property_find(supplicant_prop_name);
    573     if (pi != NULL) {
    574         serial = pi->serial;
    575     }
    576 #endif
    577     property_get("wifi.interface", primary_iface, WIFI_TEST_INTERFACE);
    578 
    579     property_set("ctl.start", supplicant_name);
    580     sched_yield();
    581 
    582     while (count-- > 0) {
    583 #ifdef HAVE_LIBC_SYSTEM_PROPERTIES
    584         if (pi == NULL) {
    585             pi = __system_property_find(supplicant_prop_name);
    586         }
    587         if (pi != NULL) {
    588             __system_property_read(pi, NULL, supp_status);
    589             if (strcmp(supp_status, "running") == 0) {
    590                 return 0;
    591             } else if (pi->serial != serial &&
    592                     strcmp(supp_status, "stopped") == 0) {
    593                 return -1;
    594             }
    595         }
    596 #else
    597         if (property_get(supplicant_prop_name, supp_status, NULL)) {
    598             if (strcmp(supp_status, "running") == 0)
    599                 return 0;
    600         }
    601 #endif
    602         usleep(100000);
    603     }
    604     return -1;
    605 }
    606 
    607 int wifi_stop_supplicant()
    608 {
    609     char supp_status[PROPERTY_VALUE_MAX] = {'\0'};
    610     int count = 50; /* wait at most 5 seconds for completion */
    611 
    612     /* Check whether supplicant already stopped */
    613     if (property_get(supplicant_prop_name, supp_status, NULL)
    614         && strcmp(supp_status, "stopped") == 0) {
    615         return 0;
    616     }
    617 
    618     property_set("ctl.stop", supplicant_name);
    619     sched_yield();
    620 
    621     while (count-- > 0) {
    622         if (property_get(supplicant_prop_name, supp_status, NULL)) {
    623             if (strcmp(supp_status, "stopped") == 0)
    624                 return 0;
    625         }
    626         usleep(100000);
    627     }
    628     return -1;
    629 }
    630 
    631 int wifi_connect_on_socket_path(int index, const char *path)
    632 {
    633     char supp_status[PROPERTY_VALUE_MAX] = {'\0'};
    634 
    635     /* Make sure supplicant is running */
    636     if (!property_get(supplicant_prop_name, supp_status, NULL)
    637             || strcmp(supp_status, "running") != 0) {
    638         ALOGE("Supplicant not running, cannot connect");
    639         return -1;
    640     }
    641 
    642     ctrl_conn[index] = wpa_ctrl_open(path);
    643     if (ctrl_conn[index] == NULL) {
    644         ALOGE("Unable to open connection to supplicant on \"%s\": %s",
    645              path, strerror(errno));
    646         return -1;
    647     }
    648     monitor_conn[index] = wpa_ctrl_open(path);
    649     if (monitor_conn[index] == NULL) {
    650         wpa_ctrl_close(ctrl_conn[index]);
    651         ctrl_conn[index] = NULL;
    652         return -1;
    653     }
    654     if (wpa_ctrl_attach(monitor_conn[index]) != 0) {
    655         wpa_ctrl_close(monitor_conn[index]);
    656         wpa_ctrl_close(ctrl_conn[index]);
    657         ctrl_conn[index] = monitor_conn[index] = NULL;
    658         return -1;
    659     }
    660 
    661     if (socketpair(AF_UNIX, SOCK_STREAM, 0, exit_sockets[index]) == -1) {
    662         wpa_ctrl_close(monitor_conn[index]);
    663         wpa_ctrl_close(ctrl_conn[index]);
    664         ctrl_conn[index] = monitor_conn[index] = NULL;
    665         return -1;
    666     }
    667 
    668     return 0;
    669 }
    670 
    671 /* Establishes the control and monitor socket connections on the interface */
    672 int wifi_connect_to_supplicant(const char *ifname)
    673 {
    674     char path[256];
    675 
    676     if (is_primary_interface(ifname)) {
    677         if (access(IFACE_DIR, F_OK) == 0) {
    678             snprintf(path, sizeof(path), "%s/%s", IFACE_DIR, primary_iface);
    679         } else {
    680             strlcpy(path, primary_iface, sizeof(path));
    681         }
    682         return wifi_connect_on_socket_path(PRIMARY, path);
    683     } else {
    684         sprintf(path, "%s/%s", CONTROL_IFACE_PATH, ifname);
    685         return wifi_connect_on_socket_path(SECONDARY, path);
    686     }
    687 }
    688 
    689 int wifi_send_command(int index, const char *cmd, char *reply, size_t *reply_len)
    690 {
    691     int ret;
    692 
    693     if (ctrl_conn[index] == NULL) {
    694         ALOGV("Not connected to wpa_supplicant - \"%s\" command dropped.\n", cmd);
    695         return -1;
    696     }
    697     ret = wpa_ctrl_request(ctrl_conn[index], cmd, strlen(cmd), reply, reply_len, NULL);
    698     if (ret == -2) {
    699         ALOGD("'%s' command timed out.\n", cmd);
    700         /* unblocks the monitor receive socket for termination */
    701         TEMP_FAILURE_RETRY(write(exit_sockets[index][0], "T", 1));
    702         return -2;
    703     } else if (ret < 0 || strncmp(reply, "FAIL", 4) == 0) {
    704         return -1;
    705     }
    706     if (strncmp(cmd, "PING", 4) == 0) {
    707         reply[*reply_len] = '\0';
    708     }
    709     return 0;
    710 }
    711 
    712 int wifi_ctrl_recv(int index, char *reply, size_t *reply_len)
    713 {
    714     int res;
    715     int ctrlfd = wpa_ctrl_get_fd(monitor_conn[index]);
    716     struct pollfd rfds[2];
    717 
    718     memset(rfds, 0, 2 * sizeof(struct pollfd));
    719     rfds[0].fd = ctrlfd;
    720     rfds[0].events |= POLLIN;
    721     rfds[1].fd = exit_sockets[index][1];
    722     rfds[1].events |= POLLIN;
    723     res = TEMP_FAILURE_RETRY(poll(rfds, 2, -1));
    724     if (res < 0) {
    725         ALOGE("Error poll = %d", res);
    726         return res;
    727     }
    728     if (rfds[0].revents & POLLIN) {
    729         return wpa_ctrl_recv(monitor_conn[index], reply, reply_len);
    730     } else if (rfds[1].revents & POLLIN) {
    731         /* Close only the p2p sockets on receive side
    732          * see wifi_close_supplicant_connection()
    733          */
    734         if (index == SECONDARY) {
    735             ALOGD("close sockets %d", index);
    736             wifi_close_sockets(index);
    737         }
    738     }
    739     return -2;
    740 }
    741 
    742 int wifi_wait_on_socket(int index, char *buf, size_t buflen)
    743 {
    744     size_t nread = buflen - 1;
    745     int fd;
    746     fd_set rfds;
    747     int result;
    748     struct timeval tval;
    749     struct timeval *tptr;
    750 
    751     if (monitor_conn[index] == NULL) {
    752         ALOGD("Connection closed\n");
    753         strncpy(buf, WPA_EVENT_TERMINATING " - connection closed", buflen-1);
    754         buf[buflen-1] = '\0';
    755         return strlen(buf);
    756     }
    757 
    758     result = wifi_ctrl_recv(index, buf, &nread);
    759 
    760     /* Terminate reception on exit socket */
    761     if (result == -2) {
    762         strncpy(buf, WPA_EVENT_TERMINATING " - connection closed", buflen-1);
    763         buf[buflen-1] = '\0';
    764         return strlen(buf);
    765     }
    766 
    767     if (result < 0) {
    768         ALOGD("wifi_ctrl_recv failed: %s\n", strerror(errno));
    769         strncpy(buf, WPA_EVENT_TERMINATING " - recv error", buflen-1);
    770         buf[buflen-1] = '\0';
    771         return strlen(buf);
    772     }
    773     buf[nread] = '\0';
    774     /* Check for EOF on the socket */
    775     if (result == 0 && nread == 0) {
    776         /* Fabricate an event to pass up */
    777         ALOGD("Received EOF on supplicant socket\n");
    778         strncpy(buf, WPA_EVENT_TERMINATING " - signal 0 received", buflen-1);
    779         buf[buflen-1] = '\0';
    780         return strlen(buf);
    781     }
    782     /*
    783      * Events strings are in the format
    784      *
    785      *     <N>CTRL-EVENT-XXX
    786      *
    787      * where N is the message level in numerical form (0=VERBOSE, 1=DEBUG,
    788      * etc.) and XXX is the event name. The level information is not useful
    789      * to us, so strip it off.
    790      */
    791     if (buf[0] == '<') {
    792         char *match = strchr(buf, '>');
    793         if (match != NULL) {
    794             nread -= (match+1-buf);
    795             memmove(buf, match+1, nread+1);
    796         }
    797     }
    798 
    799     return nread;
    800 }
    801 
    802 int wifi_wait_for_event(const char *ifname, char *buf, size_t buflen)
    803 {
    804     if (is_primary_interface(ifname)) {
    805         return wifi_wait_on_socket(PRIMARY, buf, buflen);
    806     } else {
    807         return wifi_wait_on_socket(SECONDARY, buf, buflen);
    808     }
    809 }
    810 
    811 void wifi_close_sockets(int index)
    812 {
    813     if (ctrl_conn[index] != NULL) {
    814         wpa_ctrl_close(ctrl_conn[index]);
    815         ctrl_conn[index] = NULL;
    816     }
    817 
    818     if (monitor_conn[index] != NULL) {
    819         wpa_ctrl_close(monitor_conn[index]);
    820         monitor_conn[index] = NULL;
    821     }
    822 
    823     if (exit_sockets[index][0] >= 0) {
    824         close(exit_sockets[index][0]);
    825         exit_sockets[index][0] = -1;
    826     }
    827 
    828     if (exit_sockets[index][1] >= 0) {
    829         close(exit_sockets[index][1]);
    830         exit_sockets[index][1] = -1;
    831     }
    832 }
    833 
    834 void wifi_close_supplicant_connection(const char *ifname)
    835 {
    836     char supp_status[PROPERTY_VALUE_MAX] = {'\0'};
    837     int count = 50; /* wait at most 5 seconds to ensure init has stopped stupplicant */
    838 
    839     if (is_primary_interface(ifname)) {
    840         wifi_close_sockets(PRIMARY);
    841     } else {
    842         /* p2p socket termination needs unblocking the monitor socket
    843          * STA connection does not need it since supplicant gets shutdown
    844          */
    845         TEMP_FAILURE_RETRY(write(exit_sockets[SECONDARY][0], "T", 1));
    846         /* p2p sockets are closed after the monitor thread
    847          * receives the terminate on the exit socket
    848          */
    849         return;
    850     }
    851 
    852     while (count-- > 0) {
    853         if (property_get(supplicant_prop_name, supp_status, NULL)) {
    854             if (strcmp(supp_status, "stopped") == 0)
    855                 return;
    856         }
    857         usleep(100000);
    858     }
    859 }
    860 
    861 int wifi_command(const char *ifname, const char *command, char *reply, size_t *reply_len)
    862 {
    863     if (is_primary_interface(ifname)) {
    864         return wifi_send_command(PRIMARY, command, reply, reply_len);
    865     } else {
    866         return wifi_send_command(SECONDARY, command, reply, reply_len);
    867     }
    868 }
    869 
    870 const char *wifi_get_fw_path(int fw_type)
    871 {
    872     switch (fw_type) {
    873     case WIFI_GET_FW_PATH_STA:
    874         return WIFI_DRIVER_FW_PATH_STA;
    875     case WIFI_GET_FW_PATH_AP:
    876         return WIFI_DRIVER_FW_PATH_AP;
    877     case WIFI_GET_FW_PATH_P2P:
    878         return WIFI_DRIVER_FW_PATH_P2P;
    879     }
    880     return NULL;
    881 }
    882 
    883 int wifi_change_fw_path(const char *fwpath)
    884 {
    885     int len;
    886     int fd;
    887     int ret = 0;
    888 
    889     if (!fwpath)
    890         return ret;
    891     fd = TEMP_FAILURE_RETRY(open(WIFI_DRIVER_FW_PATH_PARAM, O_WRONLY));
    892     if (fd < 0) {
    893         ALOGE("Failed to open wlan fw path param (%s)", strerror(errno));
    894         return -1;
    895     }
    896     len = strlen(fwpath) + 1;
    897     if (TEMP_FAILURE_RETRY(write(fd, fwpath, len)) != len) {
    898         ALOGE("Failed to write wlan fw path param (%s)", strerror(errno));
    899         ret = -1;
    900     }
    901     close(fd);
    902     return ret;
    903 }
    904