1138568Ssam/*-
2186904Ssam * Copyright (c) 2003-2009 Sam Leffler, Errno Consulting
3138568Ssam * All rights reserved.
4138568Ssam *
5138568Ssam * Redistribution and use in source and binary forms, with or without
6138568Ssam * modification, are permitted provided that the following conditions
7138568Ssam * are met:
8138568Ssam * 1. Redistributions of source code must retain the above copyright
9138568Ssam *    notice, this list of conditions and the following disclaimer.
10138568Ssam * 2. Redistributions in binary form must reproduce the above copyright
11138568Ssam *    notice, this list of conditions and the following disclaimer in the
12138568Ssam *    documentation and/or other materials provided with the distribution.
13138568Ssam *
14138568Ssam * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
15138568Ssam * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
16138568Ssam * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
17138568Ssam * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
18138568Ssam * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
19138568Ssam * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
20138568Ssam * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
21138568Ssam * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
22138568Ssam * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
23138568Ssam * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
24138568Ssam */
25138568Ssam
26138568Ssam#include <sys/cdefs.h>
27138568Ssam__FBSDID("$FreeBSD$");
28138568Ssam
29138568Ssam/*
30138568Ssam * IEEE 802.11 support (FreeBSD-specific code)
31138568Ssam */
32178354Ssam#include "opt_wlan.h"
33178354Ssam
34138568Ssam#include <sys/param.h>
35138568Ssam#include <sys/kernel.h>
36138568Ssam#include <sys/systm.h>
37138568Ssam#include <sys/linker.h>
38138568Ssam#include <sys/mbuf.h>
39138568Ssam#include <sys/module.h>
40138568Ssam#include <sys/proc.h>
41138568Ssam#include <sys/sysctl.h>
42138568Ssam
43138568Ssam#include <sys/socket.h>
44138568Ssam
45192468Ssam#include <net/bpf.h>
46138568Ssam#include <net/if.h>
47190526Ssam#include <net/if_dl.h>
48178354Ssam#include <net/if_clone.h>
49138568Ssam#include <net/if_media.h>
50178354Ssam#include <net/if_types.h>
51138568Ssam#include <net/ethernet.h>
52138568Ssam#include <net/route.h>
53196019Srwatson#include <net/vnet.h>
54138568Ssam
55138568Ssam#include <net80211/ieee80211_var.h>
56195757Ssam#include <net80211/ieee80211_input.h>
57138568Ssam
58138568SsamSYSCTL_NODE(_net, OID_AUTO, wlan, CTLFLAG_RD, 0, "IEEE 80211 parameters");
59138568Ssam
60138568Ssam#ifdef IEEE80211_DEBUG
61138568Ssamint	ieee80211_debug = 0;
62138568SsamSYSCTL_INT(_net_wlan, OID_AUTO, debug, CTLFLAG_RW, &ieee80211_debug,
63138568Ssam	    0, "debugging printfs");
64138568Ssam#endif
65138568Ssam
66227293Sedstatic MALLOC_DEFINE(M_80211_COM, "80211com", "802.11 com state");
67178354Ssam
68242154Sadrian#if __FreeBSD_version >= 1000020
69241610Sglebiusstatic const char wlanname[] = "wlan";
70241610Sglebiusstatic struct if_clone *wlan_cloner;
71242154Sadrian#endif
72241610Sglebius
73178354Ssam/*
74178354Ssam * Allocate/free com structure in conjunction with ifnet;
75178354Ssam * these routines are registered with if_register_com_alloc
76178354Ssam * below and are called automatically by the ifnet code
77178354Ssam * when the ifnet of the parent device is created.
78178354Ssam */
79178354Ssamstatic void *
80178354Ssamwlan_alloc(u_char type, struct ifnet *ifp)
81178354Ssam{
82178354Ssam	struct ieee80211com *ic;
83178354Ssam
84178354Ssam	ic = malloc(sizeof(struct ieee80211com), M_80211_COM, M_WAITOK|M_ZERO);
85178354Ssam	ic->ic_ifp = ifp;
86178354Ssam
87178354Ssam	return (ic);
88178354Ssam}
89178354Ssam
90178354Ssamstatic void
91178354Ssamwlan_free(void *ic, u_char type)
92178354Ssam{
93178354Ssam	free(ic, M_80211_COM);
94178354Ssam}
95178354Ssam
96138568Ssamstatic int
97178354Ssamwlan_clone_create(struct if_clone *ifc, int unit, caddr_t params)
98173273Ssam{
99178354Ssam	struct ieee80211_clone_params cp;
100178354Ssam	struct ieee80211vap *vap;
101178354Ssam	struct ieee80211com *ic;
102178354Ssam	struct ifnet *ifp;
103173273Ssam	int error;
104173273Ssam
105178354Ssam	error = copyin(params, &cp, sizeof(cp));
106178354Ssam	if (error)
107178354Ssam		return error;
108178354Ssam	ifp = ifunit(cp.icp_parent);
109178354Ssam	if (ifp == NULL)
110178354Ssam		return ENXIO;
111178957Ssam	/* XXX move printfs to DIAGNOSTIC before release */
112178354Ssam	if (ifp->if_type != IFT_IEEE80211) {
113178354Ssam		if_printf(ifp, "%s: reject, not an 802.11 device\n", __func__);
114178957Ssam		return ENXIO;
115178957Ssam	}
116178957Ssam	if (cp.icp_opmode >= IEEE80211_OPMODE_MAX) {
117178957Ssam		if_printf(ifp, "%s: invalid opmode %d\n",
118178957Ssam		    __func__, cp.icp_opmode);
119178354Ssam		return EINVAL;
120178354Ssam	}
121178354Ssam	ic = ifp->if_l2com;
122178957Ssam	if ((ic->ic_caps & ieee80211_opcap[cp.icp_opmode]) == 0) {
123178957Ssam		if_printf(ifp, "%s mode not supported\n",
124178957Ssam		    ieee80211_opmode_name[cp.icp_opmode]);
125178957Ssam		return EOPNOTSUPP;
126178957Ssam	}
127186904Ssam	if ((cp.icp_flags & IEEE80211_CLONE_TDMA) &&
128186904Ssam#ifdef IEEE80211_SUPPORT_TDMA
129186904Ssam	    (ic->ic_caps & IEEE80211_C_TDMA) == 0
130186904Ssam#else
131186904Ssam	    (1)
132186904Ssam#endif
133186904Ssam	) {
134186904Ssam		if_printf(ifp, "TDMA not supported\n");
135186904Ssam		return EOPNOTSUPP;
136186904Ssam	}
137242154Sadrian#if __FreeBSD_version >= 1000020
138241610Sglebius	vap = ic->ic_vap_create(ic, wlanname, unit,
139178354Ssam			cp.icp_opmode, cp.icp_flags, cp.icp_bssid,
140178354Ssam			cp.icp_flags & IEEE80211_CLONE_MACADDR ?
141190526Ssam			    cp.icp_macaddr : (const uint8_t *)IF_LLADDR(ifp));
142242154Sadrian#else
143242154Sadrian	vap = ic->ic_vap_create(ic, ifc->ifc_name, unit,
144242154Sadrian			cp.icp_opmode, cp.icp_flags, cp.icp_bssid,
145242154Sadrian			cp.icp_flags & IEEE80211_CLONE_MACADDR ?
146242154Sadrian			    cp.icp_macaddr : (const uint8_t *)IF_LLADDR(ifp));
147242154Sadrian
148242154Sadrian#endif
149242154Sadrian
150178354Ssam	return (vap == NULL ? EIO : 0);
151178354Ssam}
152178354Ssam
153178354Ssamstatic void
154178354Ssamwlan_clone_destroy(struct ifnet *ifp)
155178354Ssam{
156178354Ssam	struct ieee80211vap *vap = ifp->if_softc;
157178354Ssam	struct ieee80211com *ic = vap->iv_ic;
158178354Ssam
159178354Ssam	ic->ic_vap_delete(vap);
160178354Ssam}
161178354Ssam
162242155Sadrian#if __FreeBSD_version < 1000020
163242154SadrianIFC_SIMPLE_DECLARE(wlan, 0);
164242155Sadrian#endif
165242154Sadrian
166178354Ssamvoid
167178354Ssamieee80211_vap_destroy(struct ieee80211vap *vap)
168178354Ssam{
169242149Sadrian	CURVNET_SET(vap->iv_ifp->if_vnet);
170242154Sadrian#if __FreeBSD_version >= 1000020
171241610Sglebius	if_clone_destroyif(wlan_cloner, vap->iv_ifp);
172242154Sadrian#else
173242154Sadrian	if_clone_destroyif(&wlan_cloner, vap->iv_ifp);
174242154Sadrian#endif
175242149Sadrian	CURVNET_RESTORE();
176178354Ssam}
177178354Ssam
178192473Ssamint
179178354Ssamieee80211_sysctl_msecs_ticks(SYSCTL_HANDLER_ARGS)
180178354Ssam{
181178354Ssam	int msecs = ticks_to_msecs(*(int *)arg1);
182178354Ssam	int error, t;
183178354Ssam
184178354Ssam	error = sysctl_handle_int(oidp, &msecs, 0, req);
185173273Ssam	if (error || !req->newptr)
186173273Ssam		return error;
187178354Ssam	t = msecs_to_ticks(msecs);
188178354Ssam	*(int *)arg1 = (t < 1) ? 1 : t;
189173273Ssam	return 0;
190173273Ssam}
191178354Ssam
192173273Ssamstatic int
193138568Ssamieee80211_sysctl_inact(SYSCTL_HANDLER_ARGS)
194138568Ssam{
195138568Ssam	int inact = (*(int *)arg1) * IEEE80211_INACT_WAIT;
196138568Ssam	int error;
197138568Ssam
198138568Ssam	error = sysctl_handle_int(oidp, &inact, 0, req);
199138568Ssam	if (error || !req->newptr)
200138568Ssam		return error;
201138568Ssam	*(int *)arg1 = inact / IEEE80211_INACT_WAIT;
202138568Ssam	return 0;
203138568Ssam}
204138568Ssam
205138568Ssamstatic int
206138568Ssamieee80211_sysctl_parent(SYSCTL_HANDLER_ARGS)
207138568Ssam{
208138568Ssam	struct ieee80211com *ic = arg1;
209138568Ssam	const char *name = ic->ic_ifp->if_xname;
210138568Ssam
211138568Ssam	return SYSCTL_OUT(req, name, strlen(name));
212138568Ssam}
213138568Ssam
214181194Ssamstatic int
215181194Ssamieee80211_sysctl_radar(SYSCTL_HANDLER_ARGS)
216181194Ssam{
217181194Ssam	struct ieee80211com *ic = arg1;
218181194Ssam	int t = 0, error;
219181194Ssam
220181194Ssam	error = sysctl_handle_int(oidp, &t, 0, req);
221181194Ssam	if (error || !req->newptr)
222181194Ssam		return error;
223181194Ssam	IEEE80211_LOCK(ic);
224181194Ssam	ieee80211_dfs_notify_radar(ic, ic->ic_curchan);
225181194Ssam	IEEE80211_UNLOCK(ic);
226181194Ssam	return 0;
227181194Ssam}
228181194Ssam
229138568Ssamvoid
230138568Ssamieee80211_sysctl_attach(struct ieee80211com *ic)
231138568Ssam{
232178354Ssam}
233178354Ssam
234178354Ssamvoid
235178354Ssamieee80211_sysctl_detach(struct ieee80211com *ic)
236178354Ssam{
237178354Ssam}
238178354Ssam
239178354Ssamvoid
240178354Ssamieee80211_sysctl_vattach(struct ieee80211vap *vap)
241178354Ssam{
242178354Ssam	struct ifnet *ifp = vap->iv_ifp;
243138568Ssam	struct sysctl_ctx_list *ctx;
244138568Ssam	struct sysctl_oid *oid;
245138568Ssam	char num[14];			/* sufficient for 32 bits */
246138568Ssam
247186302Ssam	ctx = (struct sysctl_ctx_list *) malloc(sizeof(struct sysctl_ctx_list),
248138568Ssam		M_DEVBUF, M_NOWAIT | M_ZERO);
249138568Ssam	if (ctx == NULL) {
250178354Ssam		if_printf(ifp, "%s: cannot allocate sysctl context!\n",
251138568Ssam			__func__);
252138568Ssam		return;
253138568Ssam	}
254138568Ssam	sysctl_ctx_init(ctx);
255178354Ssam	snprintf(num, sizeof(num), "%u", ifp->if_dunit);
256138568Ssam	oid = SYSCTL_ADD_NODE(ctx, &SYSCTL_NODE_CHILDREN(_net, wlan),
257138568Ssam		OID_AUTO, num, CTLFLAG_RD, NULL, "");
258138568Ssam	SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
259217554Smdf		"%parent", CTLTYPE_STRING | CTLFLAG_RD, vap->iv_ic, 0,
260178354Ssam		ieee80211_sysctl_parent, "A", "parent device");
261217322Smdf	SYSCTL_ADD_UINT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
262178354Ssam		"driver_caps", CTLFLAG_RW, &vap->iv_caps, 0,
263178354Ssam		"driver capabilities");
264138568Ssam#ifdef IEEE80211_DEBUG
265178354Ssam	vap->iv_debug = ieee80211_debug;
266217322Smdf	SYSCTL_ADD_UINT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
267178354Ssam		"debug", CTLFLAG_RW, &vap->iv_debug, 0,
268138568Ssam		"control debugging printfs");
269138568Ssam#endif
270178354Ssam	SYSCTL_ADD_INT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
271178354Ssam		"bmiss_max", CTLFLAG_RW, &vap->iv_bmiss_max, 0,
272178354Ssam		"consecutive beacon misses before scanning");
273138568Ssam	/* XXX inherit from tunables */
274138568Ssam	SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
275178354Ssam		"inact_run", CTLTYPE_INT | CTLFLAG_RW, &vap->iv_inact_run, 0,
276138568Ssam		ieee80211_sysctl_inact, "I",
277138568Ssam		"station inactivity timeout (sec)");
278138568Ssam	SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
279178354Ssam		"inact_probe", CTLTYPE_INT | CTLFLAG_RW, &vap->iv_inact_probe, 0,
280138568Ssam		ieee80211_sysctl_inact, "I",
281138568Ssam		"station inactivity probe timeout (sec)");
282138568Ssam	SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
283178354Ssam		"inact_auth", CTLTYPE_INT | CTLFLAG_RW, &vap->iv_inact_auth, 0,
284138568Ssam		ieee80211_sysctl_inact, "I",
285138568Ssam		"station authentication timeout (sec)");
286138568Ssam	SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
287178354Ssam		"inact_init", CTLTYPE_INT | CTLFLAG_RW, &vap->iv_inact_init, 0,
288138568Ssam		ieee80211_sysctl_inact, "I",
289138568Ssam		"station initial state timeout (sec)");
290178354Ssam	if (vap->iv_htcaps & IEEE80211_HTC_HT) {
291217322Smdf		SYSCTL_ADD_UINT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
292178354Ssam			"ampdu_mintraffic_bk", CTLFLAG_RW,
293178354Ssam			&vap->iv_ampdu_mintraffic[WME_AC_BK], 0,
294178354Ssam			"BK traffic tx aggr threshold (pps)");
295217322Smdf		SYSCTL_ADD_UINT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
296178354Ssam			"ampdu_mintraffic_be", CTLFLAG_RW,
297178354Ssam			&vap->iv_ampdu_mintraffic[WME_AC_BE], 0,
298178354Ssam			"BE traffic tx aggr threshold (pps)");
299217322Smdf		SYSCTL_ADD_UINT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
300178354Ssam			"ampdu_mintraffic_vo", CTLFLAG_RW,
301178354Ssam			&vap->iv_ampdu_mintraffic[WME_AC_VO], 0,
302178354Ssam			"VO traffic tx aggr threshold (pps)");
303217322Smdf		SYSCTL_ADD_UINT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
304178354Ssam			"ampdu_mintraffic_vi", CTLFLAG_RW,
305178354Ssam			&vap->iv_ampdu_mintraffic[WME_AC_VI], 0,
306178354Ssam			"VI traffic tx aggr threshold (pps)");
307178354Ssam	}
308181194Ssam	if (vap->iv_caps & IEEE80211_C_DFS) {
309181194Ssam		SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
310181194Ssam			"radar", CTLTYPE_INT | CTLFLAG_RW, vap->iv_ic, 0,
311193115Ssam			ieee80211_sysctl_radar, "I", "simulate radar event");
312181194Ssam	}
313178354Ssam	vap->iv_sysctl = ctx;
314178354Ssam	vap->iv_oid = oid;
315138568Ssam}
316138568Ssam
317138568Ssamvoid
318178354Ssamieee80211_sysctl_vdetach(struct ieee80211vap *vap)
319138568Ssam{
320138568Ssam
321178354Ssam	if (vap->iv_sysctl != NULL) {
322178354Ssam		sysctl_ctx_free(vap->iv_sysctl);
323186302Ssam		free(vap->iv_sysctl, M_DEVBUF);
324178354Ssam		vap->iv_sysctl = NULL;
325138568Ssam	}
326138568Ssam}
327138568Ssam
328138568Ssamint
329138568Ssamieee80211_node_dectestref(struct ieee80211_node *ni)
330138568Ssam{
331138568Ssam	/* XXX need equivalent of atomic_dec_and_test */
332138568Ssam	atomic_subtract_int(&ni->ni_refcnt, 1);
333138568Ssam	return atomic_cmpset_int(&ni->ni_refcnt, 0, 1);
334138568Ssam}
335138568Ssam
336165894Ssamvoid
337165894Ssamieee80211_drain_ifq(struct ifqueue *ifq)
338165894Ssam{
339165894Ssam	struct ieee80211_node *ni;
340165894Ssam	struct mbuf *m;
341165894Ssam
342165894Ssam	for (;;) {
343165894Ssam		IF_DEQUEUE(ifq, m);
344165894Ssam		if (m == NULL)
345165894Ssam			break;
346165894Ssam
347165894Ssam		ni = (struct ieee80211_node *)m->m_pkthdr.rcvif;
348165894Ssam		KASSERT(ni != NULL, ("frame w/o node"));
349165894Ssam		ieee80211_free_node(ni);
350165894Ssam		m->m_pkthdr.rcvif = NULL;
351165894Ssam
352165894Ssam		m_freem(m);
353165894Ssam	}
354165894Ssam}
355165894Ssam
356178354Ssamvoid
357178354Ssamieee80211_flush_ifq(struct ifqueue *ifq, struct ieee80211vap *vap)
358178354Ssam{
359178354Ssam	struct ieee80211_node *ni;
360178354Ssam	struct mbuf *m, **mprev;
361178354Ssam
362178354Ssam	IF_LOCK(ifq);
363178354Ssam	mprev = &ifq->ifq_head;
364178354Ssam	while ((m = *mprev) != NULL) {
365178354Ssam		ni = (struct ieee80211_node *)m->m_pkthdr.rcvif;
366178354Ssam		if (ni != NULL && ni->ni_vap == vap) {
367178354Ssam			*mprev = m->m_nextpkt;		/* remove from list */
368178354Ssam			ifq->ifq_len--;
369178354Ssam
370178354Ssam			m_freem(m);
371178354Ssam			ieee80211_free_node(ni);	/* reclaim ref */
372178354Ssam		} else
373178354Ssam			mprev = &m->m_nextpkt;
374178354Ssam	}
375178354Ssam	/* recalculate tail ptr */
376178354Ssam	m = ifq->ifq_head;
377178354Ssam	for (; m != NULL && m->m_nextpkt != NULL; m = m->m_nextpkt)
378178354Ssam		;
379178354Ssam	ifq->ifq_tail = m;
380178354Ssam	IF_UNLOCK(ifq);
381178354Ssam}
382178354Ssam
383138568Ssam/*
384170530Ssam * As above, for mbufs allocated with m_gethdr/MGETHDR
385170530Ssam * or initialized by M_COPY_PKTHDR.
386170530Ssam */
387170530Ssam#define	MC_ALIGN(m, len)						\
388170530Ssamdo {									\
389170530Ssam	(m)->m_data += (MCLBYTES - (len)) &~ (sizeof(long) - 1);	\
390170530Ssam} while (/* CONSTCOND */ 0)
391170530Ssam
392170530Ssam/*
393138568Ssam * Allocate and setup a management frame of the specified
394138568Ssam * size.  We return the mbuf and a pointer to the start
395138568Ssam * of the contiguous data area that's been reserved based
396138568Ssam * on the packet length.  The data area is forced to 32-bit
397138568Ssam * alignment and the buffer length to a multiple of 4 bytes.
398138568Ssam * This is done mainly so beacon frames (that require this)
399138568Ssam * can use this interface too.
400138568Ssam */
401138568Ssamstruct mbuf *
402170530Ssamieee80211_getmgtframe(uint8_t **frm, int headroom, int pktlen)
403138568Ssam{
404138568Ssam	struct mbuf *m;
405138568Ssam	u_int len;
406138568Ssam
407138568Ssam	/*
408138568Ssam	 * NB: we know the mbuf routines will align the data area
409138568Ssam	 *     so we don't need to do anything special.
410138568Ssam	 */
411170530Ssam	len = roundup2(headroom + pktlen, 4);
412138568Ssam	KASSERT(len <= MCLBYTES, ("802.11 mgt frame too large: %u", len));
413138568Ssam	if (len < MINCLSIZE) {
414151967Sandre		m = m_gethdr(M_NOWAIT, MT_DATA);
415138568Ssam		/*
416138568Ssam		 * Align the data in case additional headers are added.
417138568Ssam		 * This should only happen when a WEP header is added
418138568Ssam		 * which only happens for shared key authentication mgt
419138568Ssam		 * frames which all fit in MHLEN.
420138568Ssam		 */
421138568Ssam		if (m != NULL)
422138568Ssam			MH_ALIGN(m, len);
423170530Ssam	} else {
424151967Sandre		m = m_getcl(M_NOWAIT, MT_DATA, M_PKTHDR);
425170530Ssam		if (m != NULL)
426170530Ssam			MC_ALIGN(m, len);
427170530Ssam	}
428138568Ssam	if (m != NULL) {
429171984Ssephe		m->m_data += headroom;
430138568Ssam		*frm = m->m_data;
431138568Ssam	}
432138568Ssam	return m;
433138568Ssam}
434138568Ssam
435246710Sglebius#ifndef __NO_STRICT_ALIGNMENT
436195757Ssam/*
437195757Ssam * Re-align the payload in the mbuf.  This is mainly used (right now)
438195757Ssam * to handle IP header alignment requirements on certain architectures.
439195757Ssam */
440195757Ssamstruct mbuf *
441195757Ssamieee80211_realign(struct ieee80211vap *vap, struct mbuf *m, size_t align)
442195757Ssam{
443195757Ssam	int pktlen, space;
444195757Ssam	struct mbuf *n;
445195757Ssam
446195757Ssam	pktlen = m->m_pkthdr.len;
447195757Ssam	space = pktlen + align;
448195757Ssam	if (space < MINCLSIZE)
449243882Sglebius		n = m_gethdr(M_NOWAIT, MT_DATA);
450195757Ssam	else {
451243882Sglebius		n = m_getjcl(M_NOWAIT, MT_DATA, M_PKTHDR,
452195757Ssam		    space <= MCLBYTES ?     MCLBYTES :
453195757Ssam#if MJUMPAGESIZE != MCLBYTES
454195757Ssam		    space <= MJUMPAGESIZE ? MJUMPAGESIZE :
455195757Ssam#endif
456195757Ssam		    space <= MJUM9BYTES ?   MJUM9BYTES : MJUM16BYTES);
457195757Ssam	}
458195757Ssam	if (__predict_true(n != NULL)) {
459195757Ssam		m_move_pkthdr(n, m);
460195757Ssam		n->m_data = (caddr_t)(ALIGN(n->m_data + align) - align);
461195757Ssam		m_copydata(m, 0, pktlen, mtod(n, caddr_t));
462195757Ssam		n->m_len = pktlen;
463195757Ssam	} else {
464195757Ssam		IEEE80211_DISCARD(vap, IEEE80211_MSG_ANY,
465195757Ssam		    mtod(m, const struct ieee80211_frame *), NULL,
466195757Ssam		    "%s", "no mbuf to realign");
467195757Ssam		vap->iv_stats.is_rx_badalign++;
468195757Ssam	}
469195757Ssam	m_freem(m);
470195757Ssam	return n;
471195757Ssam}
472246710Sglebius#endif /* !__NO_STRICT_ALIGNMENT */
473195757Ssam
474170530Ssamint
475170530Ssamieee80211_add_callback(struct mbuf *m,
476170530Ssam	void (*func)(struct ieee80211_node *, void *, int), void *arg)
477170530Ssam{
478170530Ssam	struct m_tag *mtag;
479170530Ssam	struct ieee80211_cb *cb;
480170530Ssam
481170530Ssam	mtag = m_tag_alloc(MTAG_ABI_NET80211, NET80211_TAG_CALLBACK,
482170530Ssam			sizeof(struct ieee80211_cb), M_NOWAIT);
483170530Ssam	if (mtag == NULL)
484170530Ssam		return 0;
485170530Ssam
486170530Ssam	cb = (struct ieee80211_cb *)(mtag+1);
487170530Ssam	cb->func = func;
488170530Ssam	cb->arg = arg;
489170530Ssam	m_tag_prepend(m, mtag);
490170530Ssam	m->m_flags |= M_TXCB;
491170530Ssam	return 1;
492170530Ssam}
493170530Ssam
494170530Ssamvoid
495170530Ssamieee80211_process_callback(struct ieee80211_node *ni,
496170530Ssam	struct mbuf *m, int status)
497170530Ssam{
498170530Ssam	struct m_tag *mtag;
499170530Ssam
500170530Ssam	mtag = m_tag_locate(m, MTAG_ABI_NET80211, NET80211_TAG_CALLBACK, NULL);
501170530Ssam	if (mtag != NULL) {
502170530Ssam		struct ieee80211_cb *cb = (struct ieee80211_cb *)(mtag+1);
503170530Ssam		cb->func(ni, cb->arg, status);
504170530Ssam	}
505170530Ssam}
506170530Ssam
507248069Sadrian/*
508248069Sadrian * Transmit a frame to the parent interface.
509248069Sadrian *
510248069Sadrian * TODO: if the transmission fails, make sure the parent node is freed
511248069Sadrian *   (the callers will first need modifying.)
512248069Sadrian */
513248069Sadrianint
514254082Sadrianieee80211_parent_xmitpkt(struct ieee80211com *ic,
515248069Sadrian	struct mbuf *m)
516248069Sadrian{
517248069Sadrian	struct ifnet *parent = ic->ic_ifp;
518248069Sadrian	/*
519248069Sadrian	 * Assert the IC TX lock is held - this enforces the
520248069Sadrian	 * processing -> queuing order is maintained
521248069Sadrian	 */
522248069Sadrian	IEEE80211_TX_LOCK_ASSERT(ic);
523248069Sadrian
524248069Sadrian	return (parent->if_transmit(parent, m));
525248069Sadrian}
526248069Sadrian
527248069Sadrian/*
528248069Sadrian * Transmit a frame to the VAP interface.
529248069Sadrian */
530248069Sadrianint
531254082Sadrianieee80211_vap_xmitpkt(struct ieee80211vap *vap, struct mbuf *m)
532248069Sadrian{
533248069Sadrian	struct ifnet *ifp = vap->iv_ifp;
534248069Sadrian
535248069Sadrian	/*
536248069Sadrian	 * When transmitting via the VAP, we shouldn't hold
537248069Sadrian	 * any IC TX lock as the VAP TX path will acquire it.
538248069Sadrian	 */
539248069Sadrian	IEEE80211_TX_UNLOCK_ASSERT(vap->iv_ic);
540248069Sadrian
541248069Sadrian	return (ifp->if_transmit(ifp, m));
542248069Sadrian
543248069Sadrian}
544248069Sadrian
545138568Ssam#include <sys/libkern.h>
546138568Ssam
547138568Ssamvoid
548138568Ssamget_random_bytes(void *p, size_t n)
549138568Ssam{
550170530Ssam	uint8_t *dp = p;
551138568Ssam
552138568Ssam	while (n > 0) {
553170530Ssam		uint32_t v = arc4random();
554170530Ssam		size_t nb = n > sizeof(uint32_t) ? sizeof(uint32_t) : n;
555170530Ssam		bcopy(&v, dp, n > sizeof(uint32_t) ? sizeof(uint32_t) : n);
556170530Ssam		dp += sizeof(uint32_t), n -= nb;
557138568Ssam	}
558138568Ssam}
559138568Ssam
560178354Ssam/*
561178354Ssam * Helper function for events that pass just a single mac address.
562178354Ssam */
563178354Ssamstatic void
564178354Ssamnotify_macaddr(struct ifnet *ifp, int op, const uint8_t mac[IEEE80211_ADDR_LEN])
565138568Ssam{
566138568Ssam	struct ieee80211_join_event iev;
567138568Ssam
568191816Szec	CURVNET_SET(ifp->if_vnet);
569144302Ssam	memset(&iev, 0, sizeof(iev));
570178354Ssam	IEEE80211_ADDR_COPY(iev.iev_addr, mac);
571178354Ssam	rt_ieee80211msg(ifp, op, &iev, sizeof(iev));
572191816Szec	CURVNET_RESTORE();
573178354Ssam}
574178354Ssam
575178354Ssamvoid
576178354Ssamieee80211_notify_node_join(struct ieee80211_node *ni, int newassoc)
577178354Ssam{
578178354Ssam	struct ieee80211vap *vap = ni->ni_vap;
579178354Ssam	struct ifnet *ifp = vap->iv_ifp;
580178354Ssam
581191816Szec	CURVNET_SET_QUIET(ifp->if_vnet);
582178354Ssam	IEEE80211_NOTE(vap, IEEE80211_MSG_NODE, ni, "%snode join",
583178354Ssam	    (ni == vap->iv_bss) ? "bss " : "");
584178354Ssam
585178354Ssam	if (ni == vap->iv_bss) {
586178354Ssam		notify_macaddr(ifp, newassoc ?
587178354Ssam		    RTM_IEEE80211_ASSOC : RTM_IEEE80211_REASSOC, ni->ni_bssid);
588138568Ssam		if_link_state_change(ifp, LINK_STATE_UP);
589144302Ssam	} else {
590178354Ssam		notify_macaddr(ifp, newassoc ?
591178354Ssam		    RTM_IEEE80211_JOIN : RTM_IEEE80211_REJOIN, ni->ni_macaddr);
592138568Ssam	}
593191816Szec	CURVNET_RESTORE();
594138568Ssam}
595138568Ssam
596138568Ssamvoid
597178354Ssamieee80211_notify_node_leave(struct ieee80211_node *ni)
598138568Ssam{
599178354Ssam	struct ieee80211vap *vap = ni->ni_vap;
600178354Ssam	struct ifnet *ifp = vap->iv_ifp;
601138568Ssam
602191816Szec	CURVNET_SET_QUIET(ifp->if_vnet);
603178354Ssam	IEEE80211_NOTE(vap, IEEE80211_MSG_NODE, ni, "%snode leave",
604178354Ssam	    (ni == vap->iv_bss) ? "bss " : "");
605178354Ssam
606178354Ssam	if (ni == vap->iv_bss) {
607138568Ssam		rt_ieee80211msg(ifp, RTM_IEEE80211_DISASSOC, NULL, 0);
608138568Ssam		if_link_state_change(ifp, LINK_STATE_DOWN);
609138568Ssam	} else {
610138568Ssam		/* fire off wireless event station leaving */
611178354Ssam		notify_macaddr(ifp, RTM_IEEE80211_LEAVE, ni->ni_macaddr);
612138568Ssam	}
613191816Szec	CURVNET_RESTORE();
614138568Ssam}
615138568Ssam
616138568Ssamvoid
617178354Ssamieee80211_notify_scan_done(struct ieee80211vap *vap)
618138568Ssam{
619178354Ssam	struct ifnet *ifp = vap->iv_ifp;
620138568Ssam
621178354Ssam	IEEE80211_DPRINTF(vap, IEEE80211_MSG_SCAN, "%s\n", "notify scan done");
622138568Ssam
623138568Ssam	/* dispatch wireless event indicating scan completed */
624191816Szec	CURVNET_SET(ifp->if_vnet);
625138568Ssam	rt_ieee80211msg(ifp, RTM_IEEE80211_SCAN, NULL, 0);
626191816Szec	CURVNET_RESTORE();
627138568Ssam}
628138568Ssam
629138568Ssamvoid
630178354Ssamieee80211_notify_replay_failure(struct ieee80211vap *vap,
631138568Ssam	const struct ieee80211_frame *wh, const struct ieee80211_key *k,
632193541Ssam	u_int64_t rsc, int tid)
633138568Ssam{
634178354Ssam	struct ifnet *ifp = vap->iv_ifp;
635138568Ssam
636178354Ssam	IEEE80211_NOTE_MAC(vap, IEEE80211_MSG_CRYPTO, wh->i_addr2,
637226885Sadrian	    "%s replay detected tid %d <rsc %ju, csc %ju, keyix %u rxkeyix %u>",
638233531Sadrian	    k->wk_cipher->ic_name, tid, (intmax_t) rsc,
639193541Ssam	    (intmax_t) k->wk_keyrsc[tid],
640148863Ssam	    k->wk_keyix, k->wk_rxkeyix);
641138568Ssam
642138568Ssam	if (ifp != NULL) {		/* NB: for cipher test modules */
643138568Ssam		struct ieee80211_replay_event iev;
644138568Ssam
645138568Ssam		IEEE80211_ADDR_COPY(iev.iev_dst, wh->i_addr1);
646138568Ssam		IEEE80211_ADDR_COPY(iev.iev_src, wh->i_addr2);
647138568Ssam		iev.iev_cipher = k->wk_cipher->ic_cipher;
648148863Ssam		if (k->wk_rxkeyix != IEEE80211_KEYIX_NONE)
649148863Ssam			iev.iev_keyix = k->wk_rxkeyix;
650148863Ssam		else
651148863Ssam			iev.iev_keyix = k->wk_keyix;
652193541Ssam		iev.iev_keyrsc = k->wk_keyrsc[tid];
653138568Ssam		iev.iev_rsc = rsc;
654191816Szec		CURVNET_SET(ifp->if_vnet);
655138568Ssam		rt_ieee80211msg(ifp, RTM_IEEE80211_REPLAY, &iev, sizeof(iev));
656191816Szec		CURVNET_RESTORE();
657138568Ssam	}
658138568Ssam}
659138568Ssam
660138568Ssamvoid
661178354Ssamieee80211_notify_michael_failure(struct ieee80211vap *vap,
662138568Ssam	const struct ieee80211_frame *wh, u_int keyix)
663138568Ssam{
664178354Ssam	struct ifnet *ifp = vap->iv_ifp;
665138568Ssam
666178354Ssam	IEEE80211_NOTE_MAC(vap, IEEE80211_MSG_CRYPTO, wh->i_addr2,
667178354Ssam	    "michael MIC verification failed <keyix %u>", keyix);
668178354Ssam	vap->iv_stats.is_rx_tkipmic++;
669138568Ssam
670138568Ssam	if (ifp != NULL) {		/* NB: for cipher test modules */
671138568Ssam		struct ieee80211_michael_event iev;
672138568Ssam
673138568Ssam		IEEE80211_ADDR_COPY(iev.iev_dst, wh->i_addr1);
674138568Ssam		IEEE80211_ADDR_COPY(iev.iev_src, wh->i_addr2);
675138568Ssam		iev.iev_cipher = IEEE80211_CIPHER_TKIP;
676138568Ssam		iev.iev_keyix = keyix;
677191816Szec		CURVNET_SET(ifp->if_vnet);
678138568Ssam		rt_ieee80211msg(ifp, RTM_IEEE80211_MICHAEL, &iev, sizeof(iev));
679191816Szec		CURVNET_RESTORE();
680138568Ssam	}
681138568Ssam}
682138568Ssam
683138568Ssamvoid
684178354Ssamieee80211_notify_wds_discover(struct ieee80211_node *ni)
685178354Ssam{
686178354Ssam	struct ieee80211vap *vap = ni->ni_vap;
687178354Ssam	struct ifnet *ifp = vap->iv_ifp;
688178354Ssam
689178354Ssam	notify_macaddr(ifp, RTM_IEEE80211_WDS, ni->ni_macaddr);
690178354Ssam}
691178354Ssam
692178354Ssamvoid
693178354Ssamieee80211_notify_csa(struct ieee80211com *ic,
694178354Ssam	const struct ieee80211_channel *c, int mode, int count)
695178354Ssam{
696178354Ssam	struct ifnet *ifp = ic->ic_ifp;
697178354Ssam	struct ieee80211_csa_event iev;
698178354Ssam
699178354Ssam	memset(&iev, 0, sizeof(iev));
700178354Ssam	iev.iev_flags = c->ic_flags;
701178354Ssam	iev.iev_freq = c->ic_freq;
702178354Ssam	iev.iev_ieee = c->ic_ieee;
703178354Ssam	iev.iev_mode = mode;
704178354Ssam	iev.iev_count = count;
705248539Sadrian	CURVNET_SET(ifp->if_vnet);
706178354Ssam	rt_ieee80211msg(ifp, RTM_IEEE80211_CSA, &iev, sizeof(iev));
707248539Sadrian	CURVNET_RESTORE();
708178354Ssam}
709178354Ssam
710178354Ssamvoid
711178354Ssamieee80211_notify_radar(struct ieee80211com *ic,
712178354Ssam	const struct ieee80211_channel *c)
713178354Ssam{
714178354Ssam	struct ifnet *ifp = ic->ic_ifp;
715178354Ssam	struct ieee80211_radar_event iev;
716178354Ssam
717178354Ssam	memset(&iev, 0, sizeof(iev));
718178354Ssam	iev.iev_flags = c->ic_flags;
719178354Ssam	iev.iev_freq = c->ic_freq;
720178354Ssam	iev.iev_ieee = c->ic_ieee;
721248539Sadrian	CURVNET_SET(ifp->if_vnet);
722178354Ssam	rt_ieee80211msg(ifp, RTM_IEEE80211_RADAR, &iev, sizeof(iev));
723248539Sadrian	CURVNET_RESTORE();
724178354Ssam}
725178354Ssam
726178354Ssamvoid
727178354Ssamieee80211_notify_cac(struct ieee80211com *ic,
728178354Ssam	const struct ieee80211_channel *c, enum ieee80211_notify_cac_event type)
729178354Ssam{
730178354Ssam	struct ifnet *ifp = ic->ic_ifp;
731178354Ssam	struct ieee80211_cac_event iev;
732178354Ssam
733178354Ssam	memset(&iev, 0, sizeof(iev));
734178354Ssam	iev.iev_flags = c->ic_flags;
735178354Ssam	iev.iev_freq = c->ic_freq;
736178354Ssam	iev.iev_ieee = c->ic_ieee;
737178354Ssam	iev.iev_type = type;
738248539Sadrian	CURVNET_SET(ifp->if_vnet);
739178354Ssam	rt_ieee80211msg(ifp, RTM_IEEE80211_CAC, &iev, sizeof(iev));
740248539Sadrian	CURVNET_RESTORE();
741178354Ssam}
742178354Ssam
743178354Ssamvoid
744178354Ssamieee80211_notify_node_deauth(struct ieee80211_node *ni)
745178354Ssam{
746178354Ssam	struct ieee80211vap *vap = ni->ni_vap;
747178354Ssam	struct ifnet *ifp = vap->iv_ifp;
748178354Ssam
749178354Ssam	IEEE80211_NOTE(vap, IEEE80211_MSG_NODE, ni, "%s", "node deauth");
750178354Ssam
751178354Ssam	notify_macaddr(ifp, RTM_IEEE80211_DEAUTH, ni->ni_macaddr);
752178354Ssam}
753178354Ssam
754178354Ssamvoid
755178354Ssamieee80211_notify_node_auth(struct ieee80211_node *ni)
756178354Ssam{
757178354Ssam	struct ieee80211vap *vap = ni->ni_vap;
758178354Ssam	struct ifnet *ifp = vap->iv_ifp;
759178354Ssam
760178354Ssam	IEEE80211_NOTE(vap, IEEE80211_MSG_NODE, ni, "%s", "node auth");
761178354Ssam
762178354Ssam	notify_macaddr(ifp, RTM_IEEE80211_AUTH, ni->ni_macaddr);
763178354Ssam}
764178354Ssam
765178354Ssamvoid
766178354Ssamieee80211_notify_country(struct ieee80211vap *vap,
767178354Ssam	const uint8_t bssid[IEEE80211_ADDR_LEN], const uint8_t cc[2])
768178354Ssam{
769178354Ssam	struct ifnet *ifp = vap->iv_ifp;
770178354Ssam	struct ieee80211_country_event iev;
771178354Ssam
772178354Ssam	memset(&iev, 0, sizeof(iev));
773178354Ssam	IEEE80211_ADDR_COPY(iev.iev_addr, bssid);
774178354Ssam	iev.iev_cc[0] = cc[0];
775178354Ssam	iev.iev_cc[1] = cc[1];
776248539Sadrian	CURVNET_SET(ifp->if_vnet);
777178354Ssam	rt_ieee80211msg(ifp, RTM_IEEE80211_COUNTRY, &iev, sizeof(iev));
778248539Sadrian	CURVNET_RESTORE();
779178354Ssam}
780178354Ssam
781178354Ssamvoid
782178354Ssamieee80211_notify_radio(struct ieee80211com *ic, int state)
783178354Ssam{
784178354Ssam	struct ifnet *ifp = ic->ic_ifp;
785178354Ssam	struct ieee80211_radio_event iev;
786178354Ssam
787178354Ssam	memset(&iev, 0, sizeof(iev));
788178354Ssam	iev.iev_state = state;
789248539Sadrian	CURVNET_SET(ifp->if_vnet);
790178354Ssam	rt_ieee80211msg(ifp, RTM_IEEE80211_RADIO, &iev, sizeof(iev));
791248539Sadrian	CURVNET_RESTORE();
792178354Ssam}
793178354Ssam
794178354Ssamvoid
795138568Ssamieee80211_load_module(const char *modname)
796138568Ssam{
797159590Sjhb
798138777Ssam#ifdef notyet
799159590Sjhb	(void)kern_kldload(curthread, modname, NULL);
800138777Ssam#else
801138777Ssam	printf("%s: load the %s module by hand for now.\n", __func__, modname);
802138777Ssam#endif
803138568Ssam}
804138568Ssam
805192468Ssamstatic eventhandler_tag wlan_bpfevent;
806202612Sthompsastatic eventhandler_tag wlan_ifllevent;
807192468Ssam
808192468Ssamstatic void
809192764Ssambpf_track(void *arg, struct ifnet *ifp, int dlt, int attach)
810192468Ssam{
811259187Sgavin	/* NB: identify vap's by if_init */
812254082Sadrian	if (dlt == DLT_IEEE802_11_RADIO &&
813259187Sgavin	    ifp->if_init == ieee80211_init) {
814192468Ssam		struct ieee80211vap *vap = ifp->if_softc;
815192468Ssam		/*
816192468Ssam		 * Track bpf radiotap listener state.  We mark the vap
817192468Ssam		 * to indicate if any listener is present and the com
818192468Ssam		 * to indicate if any listener exists on any associated
819192468Ssam		 * vap.  This flag is used by drivers to prepare radiotap
820192468Ssam		 * state only when needed.
821192468Ssam		 */
822193292Ssam		if (attach) {
823192468Ssam			ieee80211_syncflag_ext(vap, IEEE80211_FEXT_BPF);
824193292Ssam			if (vap->iv_opmode == IEEE80211_M_MONITOR)
825193292Ssam				atomic_add_int(&vap->iv_ic->ic_montaps, 1);
826193312Ssam		} else if (!bpf_peers_present(vap->iv_rawbpf)) {
827192468Ssam			ieee80211_syncflag_ext(vap, -IEEE80211_FEXT_BPF);
828193292Ssam			if (vap->iv_opmode == IEEE80211_M_MONITOR)
829193292Ssam				atomic_subtract_int(&vap->iv_ic->ic_montaps, 1);
830193292Ssam		}
831192468Ssam	}
832192468Ssam}
833192468Ssam
834202612Sthompsastatic void
835202612Sthompsawlan_iflladdr(void *arg __unused, struct ifnet *ifp)
836202612Sthompsa{
837202612Sthompsa	struct ieee80211com *ic = ifp->if_l2com;
838202612Sthompsa	struct ieee80211vap *vap, *next;
839202612Sthompsa
840202612Sthompsa	if (ifp->if_type != IFT_IEEE80211 || ic == NULL)
841202612Sthompsa		return;
842202612Sthompsa
843202612Sthompsa	IEEE80211_LOCK(ic);
844202612Sthompsa	TAILQ_FOREACH_SAFE(vap, &ic->ic_vaps, iv_next, next) {
845202612Sthompsa		/*
846202612Sthompsa		 * If the MAC address has changed on the parent and it was
847202612Sthompsa		 * copied to the vap on creation then re-sync.
848202612Sthompsa		 */
849202612Sthompsa		if (vap->iv_ic == ic &&
850202612Sthompsa		    (vap->iv_flags_ext & IEEE80211_FEXT_UNIQMAC) == 0) {
851202612Sthompsa			IEEE80211_ADDR_COPY(vap->iv_myaddr, IF_LLADDR(ifp));
852202612Sthompsa			IEEE80211_UNLOCK(ic);
853202612Sthompsa			if_setlladdr(vap->iv_ifp, IF_LLADDR(ifp),
854202612Sthompsa			    IEEE80211_ADDR_LEN);
855202612Sthompsa			IEEE80211_LOCK(ic);
856202612Sthompsa		}
857202612Sthompsa	}
858202612Sthompsa	IEEE80211_UNLOCK(ic);
859202612Sthompsa}
860202612Sthompsa
861138568Ssam/*
862138568Ssam * Module glue.
863138568Ssam *
864138568Ssam * NB: the module name is "wlan" for compatibility with NetBSD.
865138568Ssam */
866138568Ssamstatic int
867138568Ssamwlan_modevent(module_t mod, int type, void *unused)
868138568Ssam{
869138568Ssam	switch (type) {
870138568Ssam	case MOD_LOAD:
871138568Ssam		if (bootverbose)
872138568Ssam			printf("wlan: <802.11 Link Layer>\n");
873192468Ssam		wlan_bpfevent = EVENTHANDLER_REGISTER(bpf_track,
874192468Ssam		    bpf_track, 0, EVENTHANDLER_PRI_ANY);
875192468Ssam		if (wlan_bpfevent == NULL)
876192468Ssam			return ENOMEM;
877202612Sthompsa		wlan_ifllevent = EVENTHANDLER_REGISTER(iflladdr_event,
878202612Sthompsa		    wlan_iflladdr, NULL, EVENTHANDLER_PRI_ANY);
879202612Sthompsa		if (wlan_ifllevent == NULL) {
880202612Sthompsa			EVENTHANDLER_DEREGISTER(bpf_track, wlan_bpfevent);
881202612Sthompsa			return ENOMEM;
882202612Sthompsa		}
883242154Sadrian#if __FreeBSD_version >= 1000020
884241610Sglebius		wlan_cloner = if_clone_simple(wlanname, wlan_clone_create,
885241610Sglebius		    wlan_clone_destroy, 0);
886242154Sadrian#else
887242154Sadrian		if_clone_attach(&wlan_cloner);
888242154Sadrian#endif
889178354Ssam		if_register_com_alloc(IFT_IEEE80211, wlan_alloc, wlan_free);
890138568Ssam		return 0;
891138568Ssam	case MOD_UNLOAD:
892178354Ssam		if_deregister_com_alloc(IFT_IEEE80211);
893242154Sadrian#if __FreeBSD_version >= 1000020
894241610Sglebius		if_clone_detach(wlan_cloner);
895242154Sadrian#else
896242154Sadrian		if_clone_detach(&wlan_cloner);
897242154Sadrian#endif
898192468Ssam		EVENTHANDLER_DEREGISTER(bpf_track, wlan_bpfevent);
899202612Sthompsa		EVENTHANDLER_DEREGISTER(iflladdr_event, wlan_ifllevent);
900138568Ssam		return 0;
901138568Ssam	}
902138568Ssam	return EINVAL;
903138568Ssam}
904138568Ssam
905138568Ssamstatic moduledata_t wlan_mod = {
906242154Sadrian#if __FreeBSD_version >= 1000020
907241610Sglebius	wlanname,
908242154Sadrian#else
909242154Sadrian	"wlan",
910242154Sadrian#endif
911138568Ssam	wlan_modevent,
912241394Skevlo	0
913138568Ssam};
914138568SsamDECLARE_MODULE(wlan, wlan_mod, SI_SUB_DRIVERS, SI_ORDER_FIRST);
915138568SsamMODULE_VERSION(wlan, 1);
916138568SsamMODULE_DEPEND(wlan, ether, 1, 1, 1);
917233050Sadrian#ifdef	IEEE80211_ALQ
918233050SadrianMODULE_DEPEND(wlan, alq, 1, 1, 1);
919233050Sadrian#endif	/* IEEE80211_ALQ */
920233050Sadrian
921