test_rfkill.py 7.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191
  1. # rfkill tests
  2. # Copyright (c) 2014, Jouni Malinen <j@w1.fi>
  3. #
  4. # This software may be distributed under the terms of the BSD license.
  5. # See README for more details.
  6. import logging
  7. logger = logging.getLogger()
  8. import subprocess
  9. import time
  10. import hostapd
  11. from hostapd import HostapdGlobal
  12. import hwsim_utils
  13. from wpasupplicant import WpaSupplicant
  14. def get_rfkill_id(dev):
  15. try:
  16. cmd = subprocess.Popen(["rfkill", "list"], stdout=subprocess.PIPE)
  17. except Exception, e:
  18. logger.info("No rfkill available: " + str(e))
  19. return None
  20. res = cmd.stdout.read()
  21. cmd.stdout.close()
  22. phy = dev.get_driver_status_field("phyname")
  23. matches = [ line for line in res.splitlines() if phy + ':' in line ]
  24. if len(matches) != 1:
  25. return None
  26. return matches[0].split(':')[0]
  27. def test_rfkill_open(dev, apdev):
  28. """rfkill block/unblock during open mode connection"""
  29. id = get_rfkill_id(dev[0])
  30. if id is None:
  31. return "skip"
  32. hapd = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "open" })
  33. dev[0].connect("open", key_mgmt="NONE", scan_freq="2412")
  34. try:
  35. logger.info("rfkill block")
  36. subprocess.call(['sudo', 'rfkill', 'block', id])
  37. dev[0].wait_disconnected(timeout=10,
  38. error="Missing disconnection event on rfkill block")
  39. if "FAIL" not in dev[0].request("REASSOCIATE"):
  40. raise Exception("REASSOCIATE accepted while disabled")
  41. if "FAIL" not in dev[0].request("REATTACH"):
  42. raise Exception("REATTACH accepted while disabled")
  43. if "FAIL" not in dev[0].request("RECONNECT"):
  44. raise Exception("RECONNECT accepted while disabled")
  45. if "FAIL" not in dev[0].request("FETCH_OSU"):
  46. raise Exception("FETCH_OSU accepted while disabled")
  47. logger.info("rfkill unblock")
  48. subprocess.call(['sudo', 'rfkill', 'unblock', id])
  49. dev[0].wait_connected(timeout=10,
  50. error="Missing connection event on rfkill unblock")
  51. hwsim_utils.test_connectivity(dev[0], hapd)
  52. finally:
  53. subprocess.call(['sudo', 'rfkill', 'unblock', id])
  54. def test_rfkill_wpa2_psk(dev, apdev):
  55. """rfkill block/unblock during WPA2-PSK connection"""
  56. id = get_rfkill_id(dev[0])
  57. if id is None:
  58. return "skip"
  59. ssid = "test-wpa2-psk"
  60. passphrase = 'qwertyuiop'
  61. params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
  62. hapd = hostapd.add_ap(apdev[0]['ifname'], params)
  63. dev[0].connect(ssid, psk=passphrase, scan_freq="2412")
  64. try:
  65. logger.info("rfkill block")
  66. subprocess.call(['sudo', 'rfkill', 'block', id])
  67. dev[0].wait_disconnected(timeout=10,
  68. error="Missing disconnection event on rfkill block")
  69. logger.info("rfkill unblock")
  70. subprocess.call(['sudo', 'rfkill', 'unblock', id])
  71. dev[0].wait_connected(timeout=10,
  72. error="Missing connection event on rfkill unblock")
  73. hwsim_utils.test_connectivity(dev[0], hapd)
  74. finally:
  75. subprocess.call(['sudo', 'rfkill', 'unblock', id])
  76. def test_rfkill_autogo(dev, apdev):
  77. """rfkill block/unblock for autonomous P2P GO"""
  78. id0 = get_rfkill_id(dev[0])
  79. if id0 is None:
  80. return "skip"
  81. id1 = get_rfkill_id(dev[1])
  82. if id1 is None:
  83. return "skip"
  84. dev[0].p2p_start_go()
  85. dev[1].request("SET p2p_no_group_iface 0")
  86. dev[1].p2p_start_go()
  87. try:
  88. logger.info("rfkill block 0")
  89. subprocess.call(['sudo', 'rfkill', 'block', id0])
  90. ev = dev[0].wait_global_event(["P2P-GROUP-REMOVED"], timeout=10)
  91. if ev is None:
  92. raise Exception("Group removal not reported")
  93. if "reason=UNAVAILABLE" not in ev:
  94. raise Exception("Unexpected group removal reason: " + ev)
  95. if "FAIL" not in dev[0].request("P2P_LISTEN 1"):
  96. raise Exception("P2P_LISTEN accepted unexpectedly")
  97. if "FAIL" not in dev[0].request("P2P_LISTEN"):
  98. raise Exception("P2P_LISTEN accepted unexpectedly")
  99. logger.info("rfkill block 1")
  100. subprocess.call(['sudo', 'rfkill', 'block', id1])
  101. ev = dev[1].wait_global_event(["P2P-GROUP-REMOVED"], timeout=10)
  102. if ev is None:
  103. raise Exception("Group removal not reported")
  104. if "reason=UNAVAILABLE" not in ev:
  105. raise Exception("Unexpected group removal reason: " + ev)
  106. logger.info("rfkill unblock 0")
  107. subprocess.call(['sudo', 'rfkill', 'unblock', id0])
  108. logger.info("rfkill unblock 1")
  109. subprocess.call(['sudo', 'rfkill', 'unblock', id1])
  110. time.sleep(1)
  111. finally:
  112. subprocess.call(['sudo', 'rfkill', 'unblock', id0])
  113. subprocess.call(['sudo', 'rfkill', 'unblock', id1])
  114. def test_rfkill_hostapd(dev, apdev):
  115. """rfkill block/unblock during and prior to hostapd operations"""
  116. hapd = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "open" })
  117. id = get_rfkill_id(hapd)
  118. if id is None:
  119. return "skip"
  120. try:
  121. subprocess.call(['rfkill', 'block', id])
  122. ev = hapd.wait_event(["INTERFACE-DISABLED"], timeout=5)
  123. if ev is None:
  124. raise Exception("INTERFACE-DISABLED event not seen")
  125. subprocess.call(['rfkill', 'unblock', id])
  126. ev = hapd.wait_event(["INTERFACE-ENABLED"], timeout=5)
  127. if ev is None:
  128. raise Exception("INTERFACE-ENABLED event not seen")
  129. # hostapd does not current re-enable beaconing automatically
  130. hapd.disable()
  131. hapd.enable()
  132. dev[0].connect("open", key_mgmt="NONE", scan_freq="2412")
  133. subprocess.call(['rfkill', 'block', id])
  134. ev = hapd.wait_event(["INTERFACE-DISABLED"], timeout=5)
  135. if ev is None:
  136. raise Exception("INTERFACE-DISABLED event not seen")
  137. dev[0].wait_disconnected(timeout=10)
  138. dev[0].request("DISCONNECT")
  139. hapd.disable()
  140. hglobal = HostapdGlobal()
  141. hglobal.flush()
  142. hglobal.remove(apdev[0]['ifname'])
  143. hapd = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "open2" },
  144. no_enable=True)
  145. if "FAIL" not in hapd.request("ENABLE"):
  146. raise Exception("ENABLE succeeded unexpectedly (rfkill)")
  147. finally:
  148. subprocess.call(['rfkill', 'unblock', id])
  149. def test_rfkill_wpas(dev, apdev):
  150. """rfkill block prior to wpa_supplicant start"""
  151. wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
  152. wpas.interface_add("wlan5")
  153. id = get_rfkill_id(wpas)
  154. if id is None:
  155. return "skip"
  156. wpas.interface_remove("wlan5")
  157. try:
  158. subprocess.call(['rfkill', 'block', id])
  159. wpas.interface_add("wlan5")
  160. time.sleep(0.5)
  161. state = wpas.get_status_field("wpa_state")
  162. if state != "INTERFACE_DISABLED":
  163. raise Exception("Unexpected state with rfkill blocked: " + state)
  164. subprocess.call(['rfkill', 'unblock', id])
  165. time.sleep(0.5)
  166. state = wpas.get_status_field("wpa_state")
  167. if state == "INTERFACE_DISABLED":
  168. raise Exception("Unexpected state with rfkill unblocked: " + state)
  169. finally:
  170. subprocess.call(['rfkill', 'unblock', id])