2 * WPA Supplicant - background scan and roaming module: learn
3 * Copyright (c) 2009-2010, Jouni Malinen <j@w1.fi>
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License version 2 as
7 * published by the Free Software Foundation.
9 * Alternatively, this software may be distributed under the terms of BSD
12 * See README and COPYING for more details.
20 #include "common/ieee802_11_defs.h"
21 #include "drivers/driver.h"
22 #include "config_ssid.h"
23 #include "wpa_supplicant_i.h"
28 struct bgscan_learn_bss
{
32 u8
*neigh
; /* num_neigh * ETH_ALEN buffer */
36 struct bgscan_learn_data
{
37 struct wpa_supplicant
*wpa_s
;
38 const struct wpa_ssid
*ssid
;
41 int short_interval
; /* use if signal < threshold */
42 int long_interval
; /* use if signal > threshold */
43 struct os_time last_bgscan
;
51 static void bss_free(struct bgscan_learn_bss
*bss
)
58 static int bssid_in_array(u8
*array
, size_t array_len
, const u8
*bssid
)
62 if (array
== NULL
|| array_len
== 0)
65 for (i
= 0; i
< array_len
; i
++) {
66 if (os_memcmp(array
+ i
* ETH_ALEN
, bssid
, ETH_ALEN
) == 0)
74 static void bgscan_learn_add_neighbor(struct bgscan_learn_bss
*bss
,
79 if (os_memcmp(bss
->bssid
, bssid
, ETH_ALEN
) == 0)
81 if (bssid_in_array(bss
->neigh
, bss
->num_neigh
, bssid
))
84 n
= os_realloc(bss
->neigh
, (bss
->num_neigh
+ 1) * ETH_ALEN
);
88 os_memcpy(n
+ bss
->num_neigh
* ETH_ALEN
, bssid
, ETH_ALEN
);
94 static struct bgscan_learn_bss
* bgscan_learn_get_bss(
95 struct bgscan_learn_data
*data
, const u8
*bssid
)
97 struct bgscan_learn_bss
*bss
;
99 dl_list_for_each(bss
, &data
->bss
, struct bgscan_learn_bss
, list
) {
100 if (os_memcmp(bss
->bssid
, bssid
, ETH_ALEN
) == 0)
107 static int bgscan_learn_load(struct bgscan_learn_data
*data
)
111 struct bgscan_learn_bss
*bss
;
113 if (data
->fname
== NULL
)
116 f
= fopen(data
->fname
, "r");
120 wpa_printf(MSG_DEBUG
, "bgscan learn: Loading data from %s",
123 if (fgets(buf
, sizeof(buf
), f
) == NULL
||
124 os_strncmp(buf
, "wpa_supplicant-bgscan-learn\n", 28) != 0) {
125 wpa_printf(MSG_INFO
, "bgscan learn: Invalid data file %s",
131 while (fgets(buf
, sizeof(buf
), f
)) {
132 if (os_strncmp(buf
, "BSS ", 4) == 0) {
133 bss
= os_zalloc(sizeof(*bss
));
136 if (hwaddr_aton(buf
+ 4, bss
->bssid
) < 0) {
140 bss
->freq
= atoi(buf
+ 4 + 18);
141 dl_list_add(&data
->bss
, &bss
->list
);
142 wpa_printf(MSG_DEBUG
, "bgscan learn: Loaded BSS "
143 "entry: " MACSTR
" freq=%d",
144 MAC2STR(bss
->bssid
), bss
->freq
);
147 if (os_strncmp(buf
, "NEIGHBOR ", 9) == 0) {
150 if (hwaddr_aton(buf
+ 9, addr
) < 0)
152 bss
= bgscan_learn_get_bss(data
, addr
);
155 if (hwaddr_aton(buf
+ 9 + 18, addr
) < 0)
158 bgscan_learn_add_neighbor(bss
, addr
);
167 static void bgscan_learn_save(struct bgscan_learn_data
*data
)
170 struct bgscan_learn_bss
*bss
;
172 if (data
->fname
== NULL
)
175 wpa_printf(MSG_DEBUG
, "bgscan learn: Saving data to %s",
178 f
= fopen(data
->fname
, "w");
181 fprintf(f
, "wpa_supplicant-bgscan-learn\n");
183 dl_list_for_each(bss
, &data
->bss
, struct bgscan_learn_bss
, list
) {
184 fprintf(f
, "BSS " MACSTR
" %d\n",
185 MAC2STR(bss
->bssid
), bss
->freq
);
188 dl_list_for_each(bss
, &data
->bss
, struct bgscan_learn_bss
, list
) {
190 for (i
= 0; i
< bss
->num_neigh
; i
++) {
191 fprintf(f
, "NEIGHBOR " MACSTR
" " MACSTR
"\n",
193 MAC2STR(bss
->neigh
+ i
* ETH_ALEN
));
201 static int in_array(int *array
, int val
)
208 for (i
= 0; array
[i
]; i
++) {
217 static int * bgscan_learn_get_freqs(struct bgscan_learn_data
*data
,
220 struct bgscan_learn_bss
*bss
;
221 int *freqs
= NULL
, *n
;
225 dl_list_for_each(bss
, &data
->bss
, struct bgscan_learn_bss
, list
) {
226 if (in_array(freqs
, bss
->freq
))
228 n
= os_realloc(freqs
, (*count
+ 2) * sizeof(int));
232 freqs
[*count
] = bss
->freq
;
241 static int * bgscan_learn_get_probe_freq(struct bgscan_learn_data
*data
,
242 int *freqs
, size_t count
)
246 if (data
->supp_freqs
== NULL
)
249 idx
= data
->probe_idx
+ 1;
250 while (idx
!= data
->probe_idx
) {
251 if (data
->supp_freqs
[idx
] == 0)
253 if (!in_array(freqs
, data
->supp_freqs
[idx
])) {
254 wpa_printf(MSG_DEBUG
, "bgscan learn: Probe new freq "
255 "%u", data
->supp_freqs
[idx
]);
256 data
->probe_idx
= idx
;
257 n
= os_realloc(freqs
, (count
+ 2) * sizeof(int));
261 freqs
[count
] = data
->supp_freqs
[idx
];
274 static void bgscan_learn_timeout(void *eloop_ctx
, void *timeout_ctx
)
276 struct bgscan_learn_data
*data
= eloop_ctx
;
277 struct wpa_supplicant
*wpa_s
= data
->wpa_s
;
278 struct wpa_driver_scan_params params
;
283 os_memset(¶ms
, 0, sizeof(params
));
284 params
.num_ssids
= 1;
285 params
.ssids
[0].ssid
= data
->ssid
->ssid
;
286 params
.ssids
[0].ssid_len
= data
->ssid
->ssid_len
;
287 if (data
->ssid
->scan_freq
)
288 params
.freqs
= data
->ssid
->scan_freq
;
290 freqs
= bgscan_learn_get_freqs(data
, &count
);
291 wpa_printf(MSG_DEBUG
, "bgscan learn: BSSes in this ESS have "
292 "been seen on %u channels", (unsigned int) count
);
293 freqs
= bgscan_learn_get_probe_freq(data
, freqs
, count
);
297 for (i
= 0; freqs
&& freqs
[i
]; i
++) {
299 ret
= os_snprintf(pos
, msg
+ sizeof(msg
) - pos
, " %d",
301 if (ret
< 0 || ret
>= msg
+ sizeof(msg
) - pos
)
306 wpa_printf(MSG_DEBUG
, "bgscan learn: Scanning frequencies:%s",
308 params
.freqs
= freqs
;
311 wpa_printf(MSG_DEBUG
, "bgscan learn: Request a background scan");
312 if (wpa_supplicant_trigger_scan(wpa_s
, ¶ms
)) {
313 wpa_printf(MSG_DEBUG
, "bgscan learn: Failed to trigger scan");
314 eloop_register_timeout(data
->scan_interval
, 0,
315 bgscan_learn_timeout
, data
, NULL
);
317 os_get_time(&data
->last_bgscan
);
322 static int bgscan_learn_get_params(struct bgscan_learn_data
*data
,
330 data
->short_interval
= atoi(params
);
332 pos
= os_strchr(params
, ':');
336 data
->signal_threshold
= atoi(pos
);
337 pos
= os_strchr(pos
, ':');
339 wpa_printf(MSG_ERROR
, "bgscan learn: Missing scan interval "
344 data
->long_interval
= atoi(pos
);
345 pos
= os_strchr(pos
, ':');
348 data
->fname
= os_strdup(pos
);
355 static int * bgscan_learn_get_supp_freqs(struct wpa_supplicant
*wpa_s
)
357 struct hostapd_hw_modes
*modes
;
358 u16 num_modes
, flags
;
359 int i
, j
, *freqs
= NULL
, *n
;
362 modes
= wpa_drv_get_hw_feature_data(wpa_s
, &num_modes
, &flags
);
366 for (i
= 0; i
< num_modes
; i
++) {
367 for (j
= 0; j
< modes
[i
].num_channels
; j
++) {
368 if (modes
[i
].channels
[j
].flag
& HOSTAPD_CHAN_DISABLED
)
370 n
= os_realloc(freqs
, (count
+ 2) * sizeof(int));
375 freqs
[count
] = modes
[i
].channels
[j
].freq
;
379 os_free(modes
[i
].channels
);
380 os_free(modes
[i
].rates
);
388 static void * bgscan_learn_init(struct wpa_supplicant
*wpa_s
,
390 const struct wpa_ssid
*ssid
)
392 struct bgscan_learn_data
*data
;
394 data
= os_zalloc(sizeof(*data
));
397 dl_list_init(&data
->bss
);
400 if (bgscan_learn_get_params(data
, params
) < 0) {
401 os_free(data
->fname
);
405 if (data
->short_interval
<= 0)
406 data
->short_interval
= 30;
407 if (data
->long_interval
<= 0)
408 data
->long_interval
= 30;
410 if (bgscan_learn_load(data
) < 0) {
411 os_free(data
->fname
);
416 wpa_printf(MSG_DEBUG
, "bgscan learn: Signal strength threshold %d "
417 "Short bgscan interval %d Long bgscan interval %d",
418 data
->signal_threshold
, data
->short_interval
,
419 data
->long_interval
);
421 if (data
->signal_threshold
&&
422 wpa_drv_signal_monitor(wpa_s
, data
->signal_threshold
, 4) < 0) {
423 wpa_printf(MSG_ERROR
, "bgscan learn: Failed to enable "
424 "signal strength monitoring");
427 data
->supp_freqs
= bgscan_learn_get_supp_freqs(wpa_s
);
428 data
->scan_interval
= data
->short_interval
;
429 eloop_register_timeout(data
->scan_interval
, 0, bgscan_learn_timeout
,
435 static void bgscan_learn_deinit(void *priv
)
437 struct bgscan_learn_data
*data
= priv
;
438 struct bgscan_learn_bss
*bss
, *n
;
440 bgscan_learn_save(data
);
441 eloop_cancel_timeout(bgscan_learn_timeout
, data
, NULL
);
442 if (data
->signal_threshold
)
443 wpa_drv_signal_monitor(data
->wpa_s
, 0, 0);
444 os_free(data
->fname
);
445 dl_list_for_each_safe(bss
, n
, &data
->bss
, struct bgscan_learn_bss
,
447 dl_list_del(&bss
->list
);
450 os_free(data
->supp_freqs
);
455 static int bgscan_learn_bss_match(struct bgscan_learn_data
*data
,
456 struct wpa_scan_res
*bss
)
460 ie
= wpa_scan_get_ie(bss
, WLAN_EID_SSID
);
464 if (data
->ssid
->ssid_len
!= ie
[1] ||
465 os_memcmp(data
->ssid
->ssid
, ie
+ 2, ie
[1]) != 0)
466 return 0; /* SSID mismatch */
472 static int bgscan_learn_notify_scan(void *priv
,
473 struct wpa_scan_results
*scan_res
)
475 struct bgscan_learn_data
*data
= priv
;
478 u8 bssid
[MAX_BSS
* ETH_ALEN
];
479 size_t num_bssid
= 0;
481 wpa_printf(MSG_DEBUG
, "bgscan learn: scan result notification");
483 eloop_cancel_timeout(bgscan_learn_timeout
, data
, NULL
);
484 eloop_register_timeout(data
->scan_interval
, 0, bgscan_learn_timeout
,
487 for (i
= 0; i
< scan_res
->num
; i
++) {
488 struct wpa_scan_res
*res
= scan_res
->res
[i
];
489 if (!bgscan_learn_bss_match(data
, res
))
492 if (num_bssid
< MAX_BSS
) {
493 os_memcpy(bssid
+ num_bssid
* ETH_ALEN
, res
->bssid
,
498 wpa_printf(MSG_DEBUG
, "bgscan learn: %u matching BSSes in scan "
499 "results", (unsigned int) num_bssid
);
501 for (i
= 0; i
< scan_res
->num
; i
++) {
502 struct wpa_scan_res
*res
= scan_res
->res
[i
];
503 struct bgscan_learn_bss
*bss
;
505 if (!bgscan_learn_bss_match(data
, res
))
508 bss
= bgscan_learn_get_bss(data
, res
->bssid
);
509 if (bss
&& bss
->freq
!= res
->freq
) {
510 wpa_printf(MSG_DEBUG
, "bgscan learn: Update BSS "
511 MACSTR
" freq %d -> %d",
512 MAC2STR(res
->bssid
), bss
->freq
, res
->freq
);
513 bss
->freq
= res
->freq
;
515 wpa_printf(MSG_DEBUG
, "bgscan learn: Add BSS " MACSTR
516 " freq=%d", MAC2STR(res
->bssid
), res
->freq
);
517 bss
= os_zalloc(sizeof(*bss
));
520 os_memcpy(bss
->bssid
, res
->bssid
, ETH_ALEN
);
521 bss
->freq
= res
->freq
;
522 dl_list_add(&data
->bss
, &bss
->list
);
525 for (j
= 0; j
< num_bssid
; j
++) {
526 u8
*addr
= bssid
+ j
* ETH_ALEN
;
527 bgscan_learn_add_neighbor(bss
, addr
);
532 * A more advanced bgscan could process scan results internally, select
533 * the BSS and request roam if needed. This sample uses the existing
534 * BSS/ESS selection routine. Change this to return 1 if selection is
535 * done inside the bgscan module.
542 static void bgscan_learn_notify_beacon_loss(void *priv
)
544 wpa_printf(MSG_DEBUG
, "bgscan learn: beacon loss");
545 /* TODO: speed up background scanning */
549 static void bgscan_learn_notify_signal_change(void *priv
, int above
,
552 struct bgscan_learn_data
*data
= priv
;
554 if (data
->short_interval
== data
->long_interval
||
555 data
->signal_threshold
== 0)
558 wpa_printf(MSG_DEBUG
, "bgscan learn: signal level changed "
559 "(above=%d current_signal=%d)", above
, current_signal
);
560 if (data
->scan_interval
== data
->long_interval
&& !above
) {
561 wpa_printf(MSG_DEBUG
, "bgscan learn: Trigger immediate scan "
562 "and start using short bgscan interval");
563 data
->scan_interval
= data
->short_interval
;
564 eloop_cancel_timeout(bgscan_learn_timeout
, data
, NULL
);
565 eloop_register_timeout(0, 0, bgscan_learn_timeout
, data
,
567 } else if (data
->scan_interval
== data
->short_interval
&& above
) {
568 wpa_printf(MSG_DEBUG
, "bgscan learn: Start using long bgscan "
570 data
->scan_interval
= data
->long_interval
;
571 eloop_cancel_timeout(bgscan_learn_timeout
, data
, NULL
);
572 eloop_register_timeout(data
->scan_interval
, 0,
573 bgscan_learn_timeout
, data
, NULL
);
577 * Signal dropped further 4 dB. Request a new scan if we have
578 * not yet scanned in a while.
581 if (now
.sec
> data
->last_bgscan
.sec
+ 10) {
582 wpa_printf(MSG_DEBUG
, "bgscan learn: Trigger "
584 eloop_cancel_timeout(bgscan_learn_timeout
, data
,
586 eloop_register_timeout(0, 0, bgscan_learn_timeout
,
593 const struct bgscan_ops bgscan_learn_ops
= {
595 .init
= bgscan_learn_init
,
596 .deinit
= bgscan_learn_deinit
,
597 .notify_scan
= bgscan_learn_notify_scan
,
598 .notify_beacon_loss
= bgscan_learn_notify_beacon_loss
,
599 .notify_signal_change
= bgscan_learn_notify_signal_change
,