最近遇到一个问题,连接WiFi时,密码正确,显示saved,但是一直连接不上,分析log发现问题出在关联的时候,关联被拒绝了。 下面根据log看一下流程:
Log:
代码语言:javascript复制04-20 16:07:59.571 1958 1958 D wpa_supplicant: nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlan0
04-20 16:07:59.571 1958 1958 D wpa_supplicant: nl80211: Connect event (status=1 ignore_next_local_disconnect=0)
04-20 16:07:59.571 1958 1958 D wpa_supplicant: wlan0: Event ASSOC_REJECT (12) received
04-20 16:07:59.571 1958 1958 I wpa_supplicant: wlan0: CTRL-EVENT-ASSOC-REJECT bssid=00:1d:7e:59:71:0c status_code=1
04-20 16:07:59.571 1958 1958 D wpa_supplicant: Notifying assoc reject to hidl control: 1
04-20 16:07:59.571 1958 1958 D wpa_supplicant: wlan0: Radio work 'connect'@0x760802e300 done in 2.668643 seconds
04-20 16:07:59.571 1958 1958 D wpa_supplicant: wlan0: radio_work_free('connect'@0x760802e300): num_active_works --> 0
04-20 16:07:59.571 1958 1958 D wpa_supplicant: Added BSSID 00:1d:7e:59:71:0c into blacklist
04-20 16:07:59.571 1958 1958 D wpa_supplicant: wlan0: Blacklist count 3 --> request scan in 1000 ms
04-20 16:07:59.571 1958 1958 D wpa_supplicant: wlan0: Setting scan request: 1.000000 sec
04-20 16:07:59.571 1958 1958 D wpa_supplicant: nl80211: Data frame filter flags=0x0
04-20 16:07:59.571 1958 1958 E wpa_supplicant: nl80211: Failed to open /proc/sys/net/ipv4/conf/wlan0/drop_unicast_in_l2_multicast: No such file or directory
04-20 16:07:59.571 1958 1958 E wpa_supplicant: nl80211: Failed to set IPv4 unicast in multicast filter
04-20 16:07:59.571 1958 1958 D wpa_supplicant: wlan0: State: ASSOCIATING -> DISCONNECTED
04-20 16:07:59.571 1958 1958 D wpa_supplicant: nl80211: Set wlan0 operstate 0->0 (DORMANT)
04-20 16:07:59.571 1958 1958 D wpa_supplicant: netlink: Operstate: ifindex=9 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
04-20 16:07:59.572 712 712 I ConfigStore: android::hardware::configstore::V1_0::ISurfaceFlingerConfigs::hasHDRDisplay retrieved: 0
04-20 16:07:59.572 1958 1958 D wpa_supplicant: Notifying state change event to hidl control: 0
04-20 16:07:59.572 1958 1958 D wpa_supplicant: EAPOL: External notification - portEnabled=0
04-20 16:07:59.572 1958 1958 D wpa_supplicant: EAPOL: External notification - portValid=0
04-20 16:07:59.572 1958 1958 D wpa_supplicant: EAPOL: External notification - EAP success=0
04-20 16:07:59.572 1958 1958 E wpa_supplicant: eap_proxy: eap_proxy_notify_config
04-20 16:07:59.572 712 712 I ConfigStore: android::hardware::configstore::V1_0::ISurfaceFlingerConfigs::hasHDRDisplay retrieved: 0
04-20 16:07:59.572 1334 9020 D SupplicantStaIfaceHal: ISupplicantStaIfaceCallback.onAssociationRejected received
04-20 16:07:59.572 1334 2052 D SupplicantStaIfaceHal: ISupplicantStaIfaceCallback.onVendorStateChanged received
04-20 16:07:59.572 1334 2052 D SupplicantStaIfaceHal: ISupplicantStaIfaceCallback.updateStateIsFourway received
04-20 16:07:59.572 1334 1750 D WifiStateMachine: DisconnectedState !ASSOCIATION_REJECTION_EVENT rt=340168/340168 timedOut=0 1 00:1d:7e:59:71:0c blacklist=false
04-20 16:07:59.572 1334 1750 D WifiStateMachine: ConnectModeState !ASSOCIATION_REJECTION_EVENT rt=340168/340168 timedOut=0 1 00:1d:7e:59:71:0c blacklist=false
04-20 16:07:59.572 1334 1750 W WifiDiags: CaptureBugReport 1
04-20 16:07:59.600 1334 1334 W WifiStateMachin: type=1400 audit(0.0:649): avc: denied { syslog_read } for scontext=u:r:system_server:s0 tcontext=u:r:kernel:s0 tclass=system permissive=0
04-20 16:07:59.605 1334 1750 D wifi-jni: no kernel logs
04-20 16:07:59.606 1334 1750 D WifiStateMachine: Assocation Rejection event: bssid=00:1d:7e:59:71:0c reason code=1 timedOut=false
04-20 16:07:59.606 1066 1066 I /system/bin/tombstoned: found intercept fd 512 for pid 3087 and type kDebuggerdJavaBacktrace
04-20 16:07:59.607 1334 1750 D WifiConnectivityManager: trackBssid: disable 00:1d:7e:59:71:0c reason code 1
04-20 16:07:59.607 3087 3099 I e.process.gapp: Wrote stack traces to '[tombstoned]'
04-20 16:07:59.607 1334 1750 V WifiConfigManager: Disable counter for network FWDVT-WPA2 for reason NETWORK_SELECTION_DISABLED_ASSOCIATION_REJECTION is 1 and threshold is 5
04-20 16:07:59.607 9091 9091 I /system/bin/dumpstate: libdebuggerd_client: done dumping process 3087
04-20 16:07:59.607 9091 9091 I /system/bin/dumpstate: libdebuggerd_client: started dumping process 3271
04-20 16:07:59.608 1066 1066 I /system/bin/tombstoned: registered intercept for pid 3271 and type kDebuggerdJavaBacktrace
04-20 16:07:59.608 3271 3279 I d.process.acor: Thread[3,tid=3279,WaitingInMainSignalCatcherLoop,Thread*=0x70b0416400,peer=0x12e40220,"Signal Catcher"]: reacting to signal 3
04-20 16:07:59.608 1334 1750 V WifiLastResortWatchdog: noteConnectionFailureAndTriggerIfNeeded: ["FWDVT-WPA2", 00:1d:7e:59:71:0c, 1]
04-20 16:07:59.608 1334 1750 V WifiLastResortWatchdog: updateFailureCountForNetwork: ["FWDVT-WPA2", 00:1d:7e:59:71:0c, 1]
04-20 16:07:59.608 3271 3279 I d.process.acor:
04-20 16:07:59.608 1334 1750 V WifiLastResortWatchdog: checkTriggerCondition.
04-20 16:07:59.608 1334 1750 V WifiLastResortWatchdog: isRestartNeeded = false
04-20 16:07:59.608 1334 1750 D WifiStateMachine: DisconnectedState !SUPPLICANT_STATE_CHANGE_EVENT rt=340204/340204 0 0 SSID: FWDVT-WPA2 BSSID: 00:1d:7e:59:71:0c nid: 3 state: DISCONNECTED
04-20 16:07:59.608 1334 1750 D WifiStateMachine: SUPPLICANT_STATE_CHANGE_EVENT state=DISCONNECTED -> state= DISCONNECTED
04-20 16:07:59.608 1334 1750 D WifiStateMachine: setDetailed state, old =CONNECTING and new state=DISCONNECTED hidden=false
04-20 16:07:59.609 1334 1750 D WifiStateMachine: ConnectModeState !SUPPLICANT_STATE_CHANGE_EVENT rt=340204/340204 0 0 SSID: FWDVT-WPA2 BSSID: 00:1d:7e:59:71:0c nid: 3 state: DISCONNECTED
04-20 16:07:59.609 1334 1750 D SupplicantStateTracker: HandshakeState{ when=-2ms what=147499 target=com.android.internal.util.StateMachine$SmHandler }
04-20 16:07:59.609 1334 1750 D SupplicantStateTracker: DefaultState{ when=-3ms what=147499 target=com.android.internal.util.StateMachine$SmHandler }
04-20 16:07:59.609 1334 1750 E SupplicantStateTracker: Ignoring { when=-3ms what=147499 target=com.android.internal.util.StateMachine$SmHandler }
04-20 16:07:59.609 1334 1750 D SupplicantStateTracker: HandshakeState{ when=-1ms what=147462 obj= SSID: FWDVT-WPA2 BSSID: 00:1d:7e:59:71:0c nid: 3 state: DISCONNECTED target=com.android.internal.util.StateMachine$SmHandler }
04-20 16:07:59.609 1334 1750 D SupplicantStateTracker: DefaultState{ when=-1ms what=147462 obj= SSID: FWDVT-WPA2 BSSID: 00:1d:7e:59:71:0c nid: 3 state: DISCONNECTED target=com.android.internal.util.StateMachine$SmHandler }
WiFi连接时关联被拒绝,会被加入黑名单。
代码流程:
/external/wpa_supplicant_8/wpa_supplicant/events.c
代码语言:javascript复制void wpa_supplicant_event(void *ctx, enum wpa_event_type event,
union wpa_event_data *data)
{
struct wpa_supplicant *wpa_s = ctx;
int resched;
#endif /* CONFIG_IBSS_RSN */
case EVENT_ASSOC_REJECT:
if (data->assoc_reject.bssid)
wpa_msg(wpa_s, MSG_INFO, WPA_EVENT_ASSOC_REJECT
"bssid=" MACSTR " status_code=%u%s%s%s",
MAC2STR(data->assoc_reject.bssid),
data->assoc_reject.status_code,
data->assoc_reject.timed_out ? " timeout" : "",
data->assoc_reject.timeout_reason ? "=" : "",
data->assoc_reject.timeout_reason ?
data->assoc_reject.timeout_reason : "");
else
wpa_msg(wpa_s, MSG_INFO, WPA_EVENT_ASSOC_REJECT
"status_code=%u%s%s%s",
data->assoc_reject.status_code,
data->assoc_reject.timed_out ? " timeout" : "",
data->assoc_reject.timeout_reason ? "=" : "",
data->assoc_reject.timeout_reason ?
data->assoc_reject.timeout_reason : "");
wpa_s->assoc_status_code = data->assoc_reject.status_code;
wpa_s->assoc_timed_out = data->assoc_reject.timed_out;
wpas_notify_assoc_status_code(wpa_s);
代码语言:javascript复制int wpa_supplicant_connect(struct wpa_supplicant *wpa_s,
struct wpa_bss *selected,
struct wpa_ssid *ssid)
{
wpa_msg(wpa_s, MSG_DEBUG,
"Considering connect request: reassociate: %d selected: "
MACSTR " bssid: " MACSTR " pending: " MACSTR
" wpa_state: %s ssid=%p current_ssid=%p",
wpa_s->reassociate, MAC2STR(selected->bssid),
MAC2STR(wpa_s->bssid), MAC2STR(wpa_s->pending_bssid),
wpa_supplicant_state_txt(wpa_s->wpa_state),
ssid, wpa_s->current_ssid);
if (wpa_s->reassociate ||
(os_memcmp(selected->bssid, wpa_s->bssid, ETH_ALEN) != 0 &&
((wpa_s->wpa_state != WPA_ASSOCIATING &&
wpa_s->wpa_state != WPA_AUTHENTICATING) ||
(!is_zero_ether_addr(wpa_s->pending_bssid) &&
os_memcmp(selected->bssid, wpa_s->pending_bssid, ETH_ALEN) !=
0) ||
(is_zero_ether_addr(wpa_s->pending_bssid) &&
ssid != wpa_s->current_ssid)))) {
if (wpa_supplicant_scard_init(wpa_s, ssid)) {
wpa_supplicant_req_new_scan(wpa_s, 10, 0);
return 0;
}
wpa_msg(wpa_s, MSG_DEBUG, "Request association with " MACSTR,
MAC2STR(selected->bssid));
wpa_supplicant_associate(wpa_s, selected, ssid);
} else {
wpa_dbg(wpa_s, MSG_DEBUG, "Already associated or trying to "
"connect with the selected AP");
}
return 0;
}
void wpa_supplicant_associate(struct wpa_supplicant *wpa_s,
代码语言:javascript复制struct wpa_bss *bss, struct wpa_ssid *ssid)
{
struct wpa_connect_work *cwork;
int rand_style;
cwork->bss = bss;
cwork->ssid = ssid;
if (radio_add_work(wpa_s, bss ? bss->freq : 0, "connect", 1,
wpas_start_assoc_cb, cwork) < 0) {
os_free(cwork);
}
}
代码语言:javascript复制static void wpas_start_assoc_cb(struct wpa_radio_work *work, int deinit)
if (wpa_s->reassoc_same_ess && !is_zero_ether_addr(prev_bssid) &&
wpa_s->current_ssid)
params.prev_bssid = prev_bssid;
ret = wpa_drv_associate(wpa_s, ¶ms);
os_free(wpa_ie);
if (ret < 0) {
wpa_msg(wpa_s, MSG_INFO, "Association request to the driver "
"failed");
if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_SANE_ERROR_CODES) {
/*
* The driver is known to mean what is saying, so we
* can stop right here; the association will not
* succeed.
*/
wpas_connection_failed(wpa_s, wpa_s->pending_bssid);
wpa_supplicant_set_state(wpa_s, WPA_DISCONNECTED);
os_memset(wpa_s->pending_bssid, 0, ETH_ALEN);
return;
}
/* try to continue anyway; new association will be tried again
* after timeout */
assoc_failed = 1;
}
case EVENT_ASSOC_REJECT:
if (data->assoc_reject.bssid)
wpa_msg(wpa_s, MSG_INFO, WPA_EVENT_ASSOC_REJECT
"bssid=" MACSTR " status_code=%u%s%s%s",
MAC2STR(data->assoc_reject.bssid),
data->assoc_reject.status_code,
data->assoc_reject.timed_out ? " timeout" : "",
data->assoc_reject.timeout_reason ? "=" : "",
data->assoc_reject.timeout_reason ?
data->assoc_reject.timeout_reason : "");
else
wpa_msg(wpa_s, MSG_INFO, WPA_EVENT_ASSOC_REJECT
"status_code=%u%s%s%s",
data->assoc_reject.status_code,
data->assoc_reject.timed_out ? " timeout" : "",
data->assoc_reject.timeout_reason ? "=" : "",
data->assoc_reject.timeout_reason ?
data->assoc_reject.timeout_reason : "");
wpa_s->assoc_status_code = data->assoc_reject.status_code;
wpa_s->assoc_timed_out = data->assoc_reject.timed_out;
wpas_notify_assoc_status_code(wpa_s);
/external/wpa_supplicant_8/wpa_supplicant/wpa_supplicant.c
代码语言:javascript复制void wpas_connection_failed(struct wpa_supplicant *wpa_s, const u8 *bssid)
{
int timeout;
int count;
int *freqs = NULL;
wpas_connect_work_done(wpa_s);
eloop_cancel_timeout(wpa_supplicant_timeout, wpa_s, NULL);
if (wpa_s->own_disconnect_req) {
wpa_s->own_disconnect_req = 0;
wpa_dbg(wpa_s, MSG_DEBUG,
"Ignore connection failure due to local request to disconnect");
return;
}
if (wpa_s->disconnected) {
wpa_dbg(wpa_s, MSG_DEBUG, "Ignore connection failure "
"indication since interface has been put into "
"disconnected state");
return;
}
count = wpa_blacklist_add(wpa_s, bssid);
if (count == 1 && wpa_s->current_bss) {
freqs = get_bss_freqs_in_ess(wpa_s);
if (freqs) {
wpa_dbg(wpa_s, MSG_DEBUG, "Another BSS in this ESS "
"has been seen; try it next");
wpa_blacklist_add(wpa_s, bssid);
os_free(wpa_s->next_scan_freqs);
wpa_s->next_scan_freqs = freqs;
}
}
count = wpa_s->extra_blacklist_count;
if (count > 3 && wpa_s->current_ssid) {
wpa_printf(MSG_DEBUG, "Continuous association failures - "
"consider temporary network disabling");
wpas_auth_failed(wpa_s, "CONN_FAILED");
}
switch (count) {
case 1:
timeout = 100;
break;
case 2:
timeout = 500;
break;
case 3:
timeout = 1000;
break;
case 4:
timeout = 5000;
break;
default:
timeout = 10000;
break;
}
wpa_dbg(wpa_s, MSG_DEBUG, "Blacklist count %d --> request scan in %d "
"ms", count, timeout);
/*
* TODO: if more than one possible AP is available in scan results,
* could try the other ones before requesting a new scan.
*/
wpa_supplicant_req_scan(wpa_s, timeout / 1000,
1000 * (timeout % 1000));
}
加入黑名单代码:
/external/wpa_supplicant_8/wpa_supplicant/blacklist.c
代码语言:javascript复制int wpa_blacklist_add(struct wpa_supplicant *wpa_s, const u8 *bssid)
{
struct wpa_blacklist *e;
if (wpa_s == NULL || bssid == NULL)
return -1;
e = wpa_blacklist_get(wpa_s, bssid);
if (e) {
e->count ;
wpa_printf(MSG_DEBUG, "BSSID " MACSTR " blacklist count "
"incremented to %d",
MAC2STR(bssid), e->count);
return e->count;
}
e = os_zalloc(sizeof(*e));
if (e == NULL)
return -1;
os_memcpy(e->bssid, bssid, ETH_ALEN);
e->count = 1;
e->next = wpa_s->blacklist;
wpa_s->blacklist = e;
wpa_printf(MSG_DEBUG, "Added BSSID " MACSTR " into blacklist",
MAC2STR(bssid));
return e->count;
}
其中有一个数字计数器,它在每次尝试重新连接时递增。
代码语言:javascript复制04-20 16:07:59.607 1334 1750 V WifiConfigManager: Disable counter for network FWDVT-WPA2 for reason NETWORK_SELECTION_DISABLED_ASSOCIATION_REJECTION is 1 and threshold is 5
04-20 16:08:05.524 1334 1750 V WifiConfigManager: Disable counter for network FWDVT-WPA2 for reason NETWORK_SELECTION_DISABLED_ASSOCIATION_REJECTION is 2 and threshold is 5
04-20 16:08:17.640 1334 1750 V WifiConfigManager: Disable counter for network FWDVT-WPA2 for reason NETWORK_SELECTION_DISABLED_ASSOCIATION_REJECTION is 3 and threshold is 5
04-20 16:08:32.557 1334 1750 V WifiConfigManager: Disable counter for network FWDVT-WPA2 for reason NETWORK_SELECTION_DISABLED_ASSOCIATION_REJECTION is 4 and threshold is 5
04-20 16:10:12.561 1334 1750 V WifiConfigManager: Disable counter for network FWDVT-WPA2 for reason NETWORK_SELECTION_DISABLED_ASSOCIATION_REJECTION is 1 and threshold is 5
04-20 16:10:25.218 1334 1750 V WifiConfigManager: Disable counter for network FWDVT-WPA2 for reason NETWORK_SELECTION_DISABLED_ASSOCIATION_REJECTION is 2 and threshold is 5
04-20 16:10:38.021 1334 1750 V WifiConfigManager: Disable counter for network FWDVT-WPA2 for reason NETWORK_SELECTION_DISABLED_ASSOCIATION_REJECTION is 3 and threshold is 5
04-20 16:11:03.240 1334 1750 V WifiConfigManager: Disable counter for network FWDVT-WPA2 for reason NETWORK_SELECTION_DISABLED_ASSOCIATION_REJECTION is 4 and threshold is 5