Line data Source code
1 : /*
2 : * WPA Supplicant - background scan and roaming module: simple
3 : * Copyright (c) 2009-2010, Jouni Malinen <j@w1.fi>
4 : *
5 : * This software may be distributed under the terms of the BSD license.
6 : * See README for more details.
7 : */
8 :
9 : #include "includes.h"
10 :
11 : #include "common.h"
12 : #include "eloop.h"
13 : #include "drivers/driver.h"
14 : #include "config_ssid.h"
15 : #include "wpa_supplicant_i.h"
16 : #include "driver_i.h"
17 : #include "scan.h"
18 : #include "bgscan.h"
19 :
20 : struct bgscan_simple_data {
21 : struct wpa_supplicant *wpa_s;
22 : const struct wpa_ssid *ssid;
23 : int scan_interval;
24 : int signal_threshold;
25 : int short_scan_count; /* counter for scans using short scan interval */
26 : int max_short_scans; /* maximum times we short-scan before back-off */
27 : int short_interval; /* use if signal < threshold */
28 : int long_interval; /* use if signal > threshold */
29 : struct os_reltime last_bgscan;
30 : };
31 :
32 :
33 3 : static void bgscan_simple_timeout(void *eloop_ctx, void *timeout_ctx)
34 : {
35 3 : struct bgscan_simple_data *data = eloop_ctx;
36 3 : struct wpa_supplicant *wpa_s = data->wpa_s;
37 : struct wpa_driver_scan_params params;
38 :
39 3 : os_memset(¶ms, 0, sizeof(params));
40 3 : params.num_ssids = 1;
41 3 : params.ssids[0].ssid = data->ssid->ssid;
42 3 : params.ssids[0].ssid_len = data->ssid->ssid_len;
43 3 : params.freqs = data->ssid->scan_freq;
44 :
45 : /*
46 : * A more advanced bgscan module would learn about most like channels
47 : * over time and request scans only for some channels (probing others
48 : * every now and then) to reduce effect on the data connection.
49 : */
50 :
51 3 : wpa_printf(MSG_DEBUG, "bgscan simple: Request a background scan");
52 3 : if (wpa_supplicant_trigger_scan(wpa_s, ¶ms)) {
53 0 : wpa_printf(MSG_DEBUG, "bgscan simple: Failed to trigger scan");
54 0 : eloop_register_timeout(data->scan_interval, 0,
55 : bgscan_simple_timeout, data, NULL);
56 : } else {
57 3 : if (data->scan_interval == data->short_interval) {
58 2 : data->short_scan_count++;
59 : /*
60 : * Spend at most the duration of a long scan interval
61 : * scanning at the short scan interval. After that,
62 : * revert to the long scan interval.
63 : */
64 2 : if (data->short_scan_count > data->max_short_scans) {
65 0 : data->scan_interval = data->long_interval;
66 0 : wpa_printf(MSG_DEBUG, "bgscan simple: Backing "
67 : "off to long scan interval");
68 : }
69 1 : } else if (data->short_scan_count > 0) {
70 : /*
71 : * If we lasted a long scan interval without any
72 : * CQM triggers, decrease the short-scan count,
73 : * which allows 1 more short-scan interval to
74 : * occur in the future when CQM triggers.
75 : */
76 0 : data->short_scan_count--;
77 : }
78 3 : os_get_reltime(&data->last_bgscan);
79 : }
80 3 : }
81 :
82 :
83 6 : static int bgscan_simple_get_params(struct bgscan_simple_data *data,
84 : const char *params)
85 : {
86 : const char *pos;
87 :
88 6 : if (params == NULL)
89 0 : return 0;
90 :
91 6 : data->short_interval = atoi(params);
92 :
93 6 : pos = os_strchr(params, ':');
94 6 : if (pos == NULL)
95 2 : return 0;
96 4 : pos++;
97 4 : data->signal_threshold = atoi(pos);
98 4 : pos = os_strchr(pos, ':');
99 4 : if (pos == NULL) {
100 2 : wpa_printf(MSG_ERROR, "bgscan simple: Missing scan interval "
101 : "for high signal");
102 2 : return -1;
103 : }
104 2 : pos++;
105 2 : data->long_interval = atoi(pos);
106 :
107 2 : return 0;
108 : }
109 :
110 :
111 6 : static void * bgscan_simple_init(struct wpa_supplicant *wpa_s,
112 : const char *params,
113 : const struct wpa_ssid *ssid)
114 : {
115 : struct bgscan_simple_data *data;
116 :
117 6 : data = os_zalloc(sizeof(*data));
118 6 : if (data == NULL)
119 0 : return NULL;
120 6 : data->wpa_s = wpa_s;
121 6 : data->ssid = ssid;
122 6 : if (bgscan_simple_get_params(data, params) < 0) {
123 2 : os_free(data);
124 2 : return NULL;
125 : }
126 4 : if (data->short_interval <= 0)
127 1 : data->short_interval = 30;
128 4 : if (data->long_interval <= 0)
129 2 : data->long_interval = 30;
130 :
131 4 : wpa_printf(MSG_DEBUG, "bgscan simple: Signal strength threshold %d "
132 : "Short bgscan interval %d Long bgscan interval %d",
133 : data->signal_threshold, data->short_interval,
134 : data->long_interval);
135 :
136 6 : if (data->signal_threshold &&
137 2 : wpa_drv_signal_monitor(wpa_s, data->signal_threshold, 4) < 0) {
138 0 : wpa_printf(MSG_ERROR, "bgscan simple: Failed to enable "
139 : "signal strength monitoring");
140 : }
141 :
142 4 : data->scan_interval = data->short_interval;
143 4 : data->max_short_scans = data->long_interval / data->short_interval + 1;
144 4 : if (data->signal_threshold) {
145 : /* Poll for signal info to set initial scan interval */
146 : struct wpa_signal_info siginfo;
147 4 : if (wpa_drv_signal_poll(wpa_s, &siginfo) == 0 &&
148 2 : siginfo.current_signal >= data->signal_threshold)
149 1 : data->scan_interval = data->long_interval;
150 : }
151 4 : wpa_printf(MSG_DEBUG, "bgscan simple: Init scan interval: %d",
152 : data->scan_interval);
153 4 : eloop_register_timeout(data->scan_interval, 0, bgscan_simple_timeout,
154 : data, NULL);
155 :
156 : /*
157 : * This function is called immediately after an association, so it is
158 : * reasonable to assume that a scan was completed recently. This makes
159 : * us skip an immediate new scan in cases where the current signal
160 : * level is below the bgscan threshold.
161 : */
162 4 : os_get_reltime(&data->last_bgscan);
163 :
164 4 : return data;
165 : }
166 :
167 :
168 4 : static void bgscan_simple_deinit(void *priv)
169 : {
170 4 : struct bgscan_simple_data *data = priv;
171 4 : eloop_cancel_timeout(bgscan_simple_timeout, data, NULL);
172 4 : if (data->signal_threshold)
173 2 : wpa_drv_signal_monitor(data->wpa_s, 0, 0);
174 4 : os_free(data);
175 4 : }
176 :
177 :
178 7 : static int bgscan_simple_notify_scan(void *priv,
179 : struct wpa_scan_results *scan_res)
180 : {
181 7 : struct bgscan_simple_data *data = priv;
182 :
183 7 : wpa_printf(MSG_DEBUG, "bgscan simple: scan result notification");
184 :
185 7 : eloop_cancel_timeout(bgscan_simple_timeout, data, NULL);
186 7 : eloop_register_timeout(data->scan_interval, 0, bgscan_simple_timeout,
187 : data, NULL);
188 :
189 : /*
190 : * A more advanced bgscan could process scan results internally, select
191 : * the BSS and request roam if needed. This sample uses the existing
192 : * BSS/ESS selection routine. Change this to return 1 if selection is
193 : * done inside the bgscan module.
194 : */
195 :
196 7 : return 0;
197 : }
198 :
199 :
200 0 : static void bgscan_simple_notify_beacon_loss(void *priv)
201 : {
202 0 : wpa_printf(MSG_DEBUG, "bgscan simple: beacon loss");
203 : /* TODO: speed up background scanning */
204 0 : }
205 :
206 :
207 2 : static void bgscan_simple_notify_signal_change(void *priv, int above,
208 : int current_signal,
209 : int current_noise,
210 : int current_txrate)
211 : {
212 2 : struct bgscan_simple_data *data = priv;
213 2 : int scan = 0;
214 : struct os_reltime now;
215 :
216 4 : if (data->short_interval == data->long_interval ||
217 2 : data->signal_threshold == 0)
218 2 : return;
219 :
220 2 : wpa_printf(MSG_DEBUG, "bgscan simple: signal level changed "
221 : "(above=%d current_signal=%d current_noise=%d "
222 : "current_txrate=%d))", above, current_signal,
223 : current_noise, current_txrate);
224 2 : if (data->scan_interval == data->long_interval && !above) {
225 0 : wpa_printf(MSG_DEBUG, "bgscan simple: Start using short "
226 : "bgscan interval");
227 0 : data->scan_interval = data->short_interval;
228 0 : os_get_reltime(&now);
229 0 : if (now.sec > data->last_bgscan.sec + 1 &&
230 0 : data->short_scan_count <= data->max_short_scans)
231 : /*
232 : * If we haven't just previously (<1 second ago)
233 : * performed a scan, and we haven't depleted our
234 : * budget for short-scans, perform a scan
235 : * immediately.
236 : */
237 0 : scan = 1;
238 0 : else if (data->last_bgscan.sec + data->long_interval >
239 0 : now.sec + data->scan_interval) {
240 : /*
241 : * Restart scan interval timer if currently scheduled
242 : * scan is too far in the future.
243 : */
244 0 : eloop_cancel_timeout(bgscan_simple_timeout, data,
245 : NULL);
246 0 : eloop_register_timeout(data->scan_interval, 0,
247 : bgscan_simple_timeout, data,
248 : NULL);
249 : }
250 2 : } else if (data->scan_interval == data->short_interval && above) {
251 0 : wpa_printf(MSG_DEBUG, "bgscan simple: Start using long bgscan "
252 : "interval");
253 0 : data->scan_interval = data->long_interval;
254 0 : eloop_cancel_timeout(bgscan_simple_timeout, data, NULL);
255 0 : eloop_register_timeout(data->scan_interval, 0,
256 : bgscan_simple_timeout, data, NULL);
257 2 : } else if (!above) {
258 : /*
259 : * Signal dropped further 4 dB. Request a new scan if we have
260 : * not yet scanned in a while.
261 : */
262 1 : os_get_reltime(&now);
263 1 : if (now.sec > data->last_bgscan.sec + 10)
264 0 : scan = 1;
265 : }
266 :
267 2 : if (scan) {
268 0 : wpa_printf(MSG_DEBUG, "bgscan simple: Trigger immediate scan");
269 0 : eloop_cancel_timeout(bgscan_simple_timeout, data, NULL);
270 0 : eloop_register_timeout(0, 0, bgscan_simple_timeout, data,
271 : NULL);
272 : }
273 : }
274 :
275 :
276 : const struct bgscan_ops bgscan_simple_ops = {
277 : .name = "simple",
278 : .init = bgscan_simple_init,
279 : .deinit = bgscan_simple_deinit,
280 : .notify_scan = bgscan_simple_notify_scan,
281 : .notify_beacon_loss = bgscan_simple_notify_beacon_loss,
282 : .notify_signal_change = bgscan_simple_notify_signal_change,
283 : };
|