bgscan_simple.c 8.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283
  1. /*
  2. * WPA Supplicant - background scan and roaming module: simple
  3. * Copyright (c) 2009-2010, Jouni Malinen <j@w1.fi>
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #include "includes.h"
  9. #include "common.h"
  10. #include "eloop.h"
  11. #include "drivers/driver.h"
  12. #include "config_ssid.h"
  13. #include "wpa_supplicant_i.h"
  14. #include "driver_i.h"
  15. #include "scan.h"
  16. #include "bgscan.h"
  17. struct bgscan_simple_data {
  18. struct wpa_supplicant *wpa_s;
  19. const struct wpa_ssid *ssid;
  20. int scan_interval;
  21. int signal_threshold;
  22. int short_scan_count; /* counter for scans using short scan interval */
  23. int max_short_scans; /* maximum times we short-scan before back-off */
  24. int short_interval; /* use if signal < threshold */
  25. int long_interval; /* use if signal > threshold */
  26. struct os_time last_bgscan;
  27. };
  28. static void bgscan_simple_timeout(void *eloop_ctx, void *timeout_ctx)
  29. {
  30. struct bgscan_simple_data *data = eloop_ctx;
  31. struct wpa_supplicant *wpa_s = data->wpa_s;
  32. struct wpa_driver_scan_params params;
  33. os_memset(&params, 0, sizeof(params));
  34. params.num_ssids = 1;
  35. params.ssids[0].ssid = data->ssid->ssid;
  36. params.ssids[0].ssid_len = data->ssid->ssid_len;
  37. params.freqs = data->ssid->scan_freq;
  38. /*
  39. * A more advanced bgscan module would learn about most like channels
  40. * over time and request scans only for some channels (probing others
  41. * every now and then) to reduce effect on the data connection.
  42. */
  43. wpa_printf(MSG_DEBUG, "bgscan simple: Request a background scan");
  44. if (wpa_supplicant_trigger_scan(wpa_s, &params)) {
  45. wpa_printf(MSG_DEBUG, "bgscan simple: Failed to trigger scan");
  46. eloop_register_timeout(data->scan_interval, 0,
  47. bgscan_simple_timeout, data, NULL);
  48. } else {
  49. if (data->scan_interval == data->short_interval) {
  50. data->short_scan_count++;
  51. /*
  52. * Spend at most the duration of a long scan interval
  53. * scanning at the short scan interval. After that,
  54. * revert to the long scan interval.
  55. */
  56. if (data->short_scan_count > data->max_short_scans) {
  57. data->scan_interval = data->long_interval;
  58. wpa_printf(MSG_DEBUG, "bgscan simple: Backing "
  59. "off to long scan interval");
  60. }
  61. } else if (data->short_scan_count > 0) {
  62. /*
  63. * If we lasted a long scan interval without any
  64. * CQM triggers, decrease the short-scan count,
  65. * which allows 1 more short-scan interval to
  66. * occur in the future when CQM triggers.
  67. */
  68. data->short_scan_count--;
  69. }
  70. os_get_time(&data->last_bgscan);
  71. }
  72. }
  73. static int bgscan_simple_get_params(struct bgscan_simple_data *data,
  74. const char *params)
  75. {
  76. const char *pos;
  77. if (params == NULL)
  78. return 0;
  79. data->short_interval = atoi(params);
  80. pos = os_strchr(params, ':');
  81. if (pos == NULL)
  82. return 0;
  83. pos++;
  84. data->signal_threshold = atoi(pos);
  85. pos = os_strchr(pos, ':');
  86. if (pos == NULL) {
  87. wpa_printf(MSG_ERROR, "bgscan simple: Missing scan interval "
  88. "for high signal");
  89. return -1;
  90. }
  91. pos++;
  92. data->long_interval = atoi(pos);
  93. return 0;
  94. }
  95. static void * bgscan_simple_init(struct wpa_supplicant *wpa_s,
  96. const char *params,
  97. const struct wpa_ssid *ssid)
  98. {
  99. struct bgscan_simple_data *data;
  100. data = os_zalloc(sizeof(*data));
  101. if (data == NULL)
  102. return NULL;
  103. data->wpa_s = wpa_s;
  104. data->ssid = ssid;
  105. if (bgscan_simple_get_params(data, params) < 0) {
  106. os_free(data);
  107. return NULL;
  108. }
  109. if (data->short_interval <= 0)
  110. data->short_interval = 30;
  111. if (data->long_interval <= 0)
  112. data->long_interval = 30;
  113. wpa_printf(MSG_DEBUG, "bgscan simple: Signal strength threshold %d "
  114. "Short bgscan interval %d Long bgscan interval %d",
  115. data->signal_threshold, data->short_interval,
  116. data->long_interval);
  117. if (data->signal_threshold &&
  118. wpa_drv_signal_monitor(wpa_s, data->signal_threshold, 4) < 0) {
  119. wpa_printf(MSG_ERROR, "bgscan simple: Failed to enable "
  120. "signal strength monitoring");
  121. }
  122. data->scan_interval = data->short_interval;
  123. data->max_short_scans = data->long_interval / data->short_interval + 1;
  124. if (data->signal_threshold) {
  125. /* Poll for signal info to set initial scan interval */
  126. struct wpa_signal_info siginfo;
  127. if (wpa_drv_signal_poll(wpa_s, &siginfo) == 0 &&
  128. siginfo.current_signal >= data->signal_threshold)
  129. data->scan_interval = data->long_interval;
  130. }
  131. wpa_printf(MSG_DEBUG, "bgscan simple: Init scan interval: %d",
  132. data->scan_interval);
  133. eloop_register_timeout(data->scan_interval, 0, bgscan_simple_timeout,
  134. data, NULL);
  135. /*
  136. * This function is called immediately after an association, so it is
  137. * reasonable to assume that a scan was completed recently. This makes
  138. * us skip an immediate new scan in cases where the current signal
  139. * level is below the bgscan threshold.
  140. */
  141. os_get_time(&data->last_bgscan);
  142. return data;
  143. }
  144. static void bgscan_simple_deinit(void *priv)
  145. {
  146. struct bgscan_simple_data *data = priv;
  147. eloop_cancel_timeout(bgscan_simple_timeout, data, NULL);
  148. if (data->signal_threshold)
  149. wpa_drv_signal_monitor(data->wpa_s, 0, 0);
  150. os_free(data);
  151. }
  152. static int bgscan_simple_notify_scan(void *priv,
  153. struct wpa_scan_results *scan_res)
  154. {
  155. struct bgscan_simple_data *data = priv;
  156. wpa_printf(MSG_DEBUG, "bgscan simple: scan result notification");
  157. eloop_cancel_timeout(bgscan_simple_timeout, data, NULL);
  158. eloop_register_timeout(data->scan_interval, 0, bgscan_simple_timeout,
  159. data, NULL);
  160. /*
  161. * A more advanced bgscan could process scan results internally, select
  162. * the BSS and request roam if needed. This sample uses the existing
  163. * BSS/ESS selection routine. Change this to return 1 if selection is
  164. * done inside the bgscan module.
  165. */
  166. return 0;
  167. }
  168. static void bgscan_simple_notify_beacon_loss(void *priv)
  169. {
  170. wpa_printf(MSG_DEBUG, "bgscan simple: beacon loss");
  171. /* TODO: speed up background scanning */
  172. }
  173. static void bgscan_simple_notify_signal_change(void *priv, int above,
  174. int current_signal,
  175. int current_noise,
  176. int current_txrate)
  177. {
  178. struct bgscan_simple_data *data = priv;
  179. int scan = 0;
  180. struct os_time now;
  181. if (data->short_interval == data->long_interval ||
  182. data->signal_threshold == 0)
  183. return;
  184. wpa_printf(MSG_DEBUG, "bgscan simple: signal level changed "
  185. "(above=%d current_signal=%d current_noise=%d "
  186. "current_txrate=%d))", above, current_signal,
  187. current_noise, current_txrate);
  188. if (data->scan_interval == data->long_interval && !above) {
  189. wpa_printf(MSG_DEBUG, "bgscan simple: Start using short "
  190. "bgscan interval");
  191. data->scan_interval = data->short_interval;
  192. os_get_time(&now);
  193. if (now.sec > data->last_bgscan.sec + 1 &&
  194. data->short_scan_count <= data->max_short_scans)
  195. /*
  196. * If we haven't just previously (<1 second ago)
  197. * performed a scan, and we haven't depleted our
  198. * budget for short-scans, perform a scan
  199. * immediately.
  200. */
  201. scan = 1;
  202. else if (data->last_bgscan.sec + data->long_interval >
  203. now.sec + data->scan_interval) {
  204. /*
  205. * Restart scan interval timer if currently scheduled
  206. * scan is too far in the future.
  207. */
  208. eloop_cancel_timeout(bgscan_simple_timeout, data,
  209. NULL);
  210. eloop_register_timeout(data->scan_interval, 0,
  211. bgscan_simple_timeout, data,
  212. NULL);
  213. }
  214. } else if (data->scan_interval == data->short_interval && above) {
  215. wpa_printf(MSG_DEBUG, "bgscan simple: Start using long bgscan "
  216. "interval");
  217. data->scan_interval = data->long_interval;
  218. eloop_cancel_timeout(bgscan_simple_timeout, data, NULL);
  219. eloop_register_timeout(data->scan_interval, 0,
  220. bgscan_simple_timeout, data, NULL);
  221. } else if (!above) {
  222. /*
  223. * Signal dropped further 4 dB. Request a new scan if we have
  224. * not yet scanned in a while.
  225. */
  226. os_get_time(&now);
  227. if (now.sec > data->last_bgscan.sec + 10)
  228. scan = 1;
  229. }
  230. if (scan) {
  231. wpa_printf(MSG_DEBUG, "bgscan simple: Trigger immediate scan");
  232. eloop_cancel_timeout(bgscan_simple_timeout, data, NULL);
  233. eloop_register_timeout(0, 0, bgscan_simple_timeout, data,
  234. NULL);
  235. }
  236. }
  237. const struct bgscan_ops bgscan_simple_ops = {
  238. .name = "simple",
  239. .init = bgscan_simple_init,
  240. .deinit = bgscan_simple_deinit,
  241. .notify_scan = bgscan_simple_notify_scan,
  242. .notify_beacon_loss = bgscan_simple_notify_beacon_loss,
  243. .notify_signal_change = bgscan_simple_notify_signal_change,
  244. };