ieee80211_freebsd.c revision 196019
1138568Ssam/*-
2186904Ssam * Copyright (c) 2003-2009 Sam Leffler, Errno Consulting
3138568Ssam * All rights reserved.
4138568Ssam *
5138568Ssam * Redistribution and use in source and binary forms, with or without
6138568Ssam * modification, are permitted provided that the following conditions
7138568Ssam * are met:
8138568Ssam * 1. Redistributions of source code must retain the above copyright
9138568Ssam *    notice, this list of conditions and the following disclaimer.
10138568Ssam * 2. Redistributions in binary form must reproduce the above copyright
11138568Ssam *    notice, this list of conditions and the following disclaimer in the
12138568Ssam *    documentation and/or other materials provided with the distribution.
13138568Ssam *
14138568Ssam * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
15138568Ssam * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
16138568Ssam * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
17138568Ssam * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
18138568Ssam * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
19138568Ssam * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
20138568Ssam * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
21138568Ssam * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
22138568Ssam * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
23138568Ssam * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
24138568Ssam */
25138568Ssam
26138568Ssam#include <sys/cdefs.h>
27138568Ssam__FBSDID("$FreeBSD: head/sys/net80211/ieee80211_freebsd.c 196019 2009-08-01 19:26:27Z rwatson $");
28138568Ssam
29138568Ssam/*
30138568Ssam * IEEE 802.11 support (FreeBSD-specific code)
31138568Ssam */
32178354Ssam#include "opt_wlan.h"
33178354Ssam
34138568Ssam#include <sys/param.h>
35138568Ssam#include <sys/kernel.h>
36138568Ssam#include <sys/systm.h>
37138568Ssam#include <sys/linker.h>
38138568Ssam#include <sys/mbuf.h>
39138568Ssam#include <sys/module.h>
40138568Ssam#include <sys/proc.h>
41138568Ssam#include <sys/sysctl.h>
42138568Ssam
43138568Ssam#include <sys/socket.h>
44138568Ssam
45192468Ssam#include <net/bpf.h>
46138568Ssam#include <net/if.h>
47190526Ssam#include <net/if_dl.h>
48178354Ssam#include <net/if_clone.h>
49138568Ssam#include <net/if_media.h>
50178354Ssam#include <net/if_types.h>
51138568Ssam#include <net/ethernet.h>
52138568Ssam#include <net/route.h>
53196019Srwatson#include <net/vnet.h>
54138568Ssam
55138568Ssam#include <net80211/ieee80211_var.h>
56195757Ssam#include <net80211/ieee80211_input.h>
57138568Ssam
58138568SsamSYSCTL_NODE(_net, OID_AUTO, wlan, CTLFLAG_RD, 0, "IEEE 80211 parameters");
59138568Ssam
60138568Ssam#ifdef IEEE80211_DEBUG
61138568Ssamint	ieee80211_debug = 0;
62138568SsamSYSCTL_INT(_net_wlan, OID_AUTO, debug, CTLFLAG_RW, &ieee80211_debug,
63138568Ssam	    0, "debugging printfs");
64138568Ssam#endif
65138568Ssam
66178354SsamMALLOC_DEFINE(M_80211_COM, "80211com", "802.11 com state");
67178354Ssam
68178354Ssam/*
69178354Ssam * Allocate/free com structure in conjunction with ifnet;
70178354Ssam * these routines are registered with if_register_com_alloc
71178354Ssam * below and are called automatically by the ifnet code
72178354Ssam * when the ifnet of the parent device is created.
73178354Ssam */
74178354Ssamstatic void *
75178354Ssamwlan_alloc(u_char type, struct ifnet *ifp)
76178354Ssam{
77178354Ssam	struct ieee80211com *ic;
78178354Ssam
79178354Ssam	ic = malloc(sizeof(struct ieee80211com), M_80211_COM, M_WAITOK|M_ZERO);
80178354Ssam	ic->ic_ifp = ifp;
81178354Ssam
82178354Ssam	return (ic);
83178354Ssam}
84178354Ssam
85178354Ssamstatic void
86178354Ssamwlan_free(void *ic, u_char type)
87178354Ssam{
88178354Ssam	free(ic, M_80211_COM);
89178354Ssam}
90178354Ssam
91138568Ssamstatic int
92178354Ssamwlan_clone_create(struct if_clone *ifc, int unit, caddr_t params)
93173273Ssam{
94178354Ssam	struct ieee80211_clone_params cp;
95178354Ssam	struct ieee80211vap *vap;
96178354Ssam	struct ieee80211com *ic;
97178354Ssam	struct ifnet *ifp;
98173273Ssam	int error;
99173273Ssam
100178354Ssam	error = copyin(params, &cp, sizeof(cp));
101178354Ssam	if (error)
102178354Ssam		return error;
103178354Ssam	ifp = ifunit(cp.icp_parent);
104178354Ssam	if (ifp == NULL)
105178354Ssam		return ENXIO;
106178957Ssam	/* XXX move printfs to DIAGNOSTIC before release */
107178354Ssam	if (ifp->if_type != IFT_IEEE80211) {
108178354Ssam		if_printf(ifp, "%s: reject, not an 802.11 device\n", __func__);
109178957Ssam		return ENXIO;
110178957Ssam	}
111178957Ssam	if (cp.icp_opmode >= IEEE80211_OPMODE_MAX) {
112178957Ssam		if_printf(ifp, "%s: invalid opmode %d\n",
113178957Ssam		    __func__, cp.icp_opmode);
114178354Ssam		return EINVAL;
115178354Ssam	}
116178354Ssam	ic = ifp->if_l2com;
117178957Ssam	if ((ic->ic_caps & ieee80211_opcap[cp.icp_opmode]) == 0) {
118178957Ssam		if_printf(ifp, "%s mode not supported\n",
119178957Ssam		    ieee80211_opmode_name[cp.icp_opmode]);
120178957Ssam		return EOPNOTSUPP;
121178957Ssam	}
122186904Ssam	if ((cp.icp_flags & IEEE80211_CLONE_TDMA) &&
123186904Ssam#ifdef IEEE80211_SUPPORT_TDMA
124186904Ssam	    (ic->ic_caps & IEEE80211_C_TDMA) == 0
125186904Ssam#else
126186904Ssam	    (1)
127186904Ssam#endif
128186904Ssam	) {
129186904Ssam		if_printf(ifp, "TDMA not supported\n");
130186904Ssam		return EOPNOTSUPP;
131186904Ssam	}
132178354Ssam	vap = ic->ic_vap_create(ic, ifc->ifc_name, unit,
133178354Ssam			cp.icp_opmode, cp.icp_flags, cp.icp_bssid,
134178354Ssam			cp.icp_flags & IEEE80211_CLONE_MACADDR ?
135190526Ssam			    cp.icp_macaddr : (const uint8_t *)IF_LLADDR(ifp));
136178354Ssam	return (vap == NULL ? EIO : 0);
137178354Ssam}
138178354Ssam
139178354Ssamstatic void
140178354Ssamwlan_clone_destroy(struct ifnet *ifp)
141178354Ssam{
142178354Ssam	struct ieee80211vap *vap = ifp->if_softc;
143178354Ssam	struct ieee80211com *ic = vap->iv_ic;
144178354Ssam
145178354Ssam	ic->ic_vap_delete(vap);
146178354Ssam}
147178354SsamIFC_SIMPLE_DECLARE(wlan, 0);
148178354Ssam
149178354Ssamvoid
150178354Ssamieee80211_vap_destroy(struct ieee80211vap *vap)
151178354Ssam{
152183210Sthompsa	if_clone_destroyif(&wlan_cloner, vap->iv_ifp);
153178354Ssam}
154178354Ssam
155192473Ssamint
156178354Ssamieee80211_sysctl_msecs_ticks(SYSCTL_HANDLER_ARGS)
157178354Ssam{
158178354Ssam	int msecs = ticks_to_msecs(*(int *)arg1);
159178354Ssam	int error, t;
160178354Ssam
161178354Ssam	error = sysctl_handle_int(oidp, &msecs, 0, req);
162173273Ssam	if (error || !req->newptr)
163173273Ssam		return error;
164178354Ssam	t = msecs_to_ticks(msecs);
165178354Ssam	*(int *)arg1 = (t < 1) ? 1 : t;
166173273Ssam	return 0;
167173273Ssam}
168178354Ssam
169173273Ssamstatic int
170138568Ssamieee80211_sysctl_inact(SYSCTL_HANDLER_ARGS)
171138568Ssam{
172138568Ssam	int inact = (*(int *)arg1) * IEEE80211_INACT_WAIT;
173138568Ssam	int error;
174138568Ssam
175138568Ssam	error = sysctl_handle_int(oidp, &inact, 0, req);
176138568Ssam	if (error || !req->newptr)
177138568Ssam		return error;
178138568Ssam	*(int *)arg1 = inact / IEEE80211_INACT_WAIT;
179138568Ssam	return 0;
180138568Ssam}
181138568Ssam
182138568Ssamstatic int
183138568Ssamieee80211_sysctl_parent(SYSCTL_HANDLER_ARGS)
184138568Ssam{
185138568Ssam	struct ieee80211com *ic = arg1;
186138568Ssam	const char *name = ic->ic_ifp->if_xname;
187138568Ssam
188138568Ssam	return SYSCTL_OUT(req, name, strlen(name));
189138568Ssam}
190138568Ssam
191181194Ssamstatic int
192181194Ssamieee80211_sysctl_radar(SYSCTL_HANDLER_ARGS)
193181194Ssam{
194181194Ssam	struct ieee80211com *ic = arg1;
195181194Ssam	int t = 0, error;
196181194Ssam
197181194Ssam	error = sysctl_handle_int(oidp, &t, 0, req);
198181194Ssam	if (error || !req->newptr)
199181194Ssam		return error;
200181194Ssam	IEEE80211_LOCK(ic);
201181194Ssam	ieee80211_dfs_notify_radar(ic, ic->ic_curchan);
202181194Ssam	IEEE80211_UNLOCK(ic);
203181194Ssam	return 0;
204181194Ssam}
205181194Ssam
206138568Ssamvoid
207138568Ssamieee80211_sysctl_attach(struct ieee80211com *ic)
208138568Ssam{
209178354Ssam}
210178354Ssam
211178354Ssamvoid
212178354Ssamieee80211_sysctl_detach(struct ieee80211com *ic)
213178354Ssam{
214178354Ssam}
215178354Ssam
216178354Ssamvoid
217178354Ssamieee80211_sysctl_vattach(struct ieee80211vap *vap)
218178354Ssam{
219178354Ssam	struct ifnet *ifp = vap->iv_ifp;
220138568Ssam	struct sysctl_ctx_list *ctx;
221138568Ssam	struct sysctl_oid *oid;
222138568Ssam	char num[14];			/* sufficient for 32 bits */
223138568Ssam
224186302Ssam	ctx = (struct sysctl_ctx_list *) malloc(sizeof(struct sysctl_ctx_list),
225138568Ssam		M_DEVBUF, M_NOWAIT | M_ZERO);
226138568Ssam	if (ctx == NULL) {
227178354Ssam		if_printf(ifp, "%s: cannot allocate sysctl context!\n",
228138568Ssam			__func__);
229138568Ssam		return;
230138568Ssam	}
231138568Ssam	sysctl_ctx_init(ctx);
232178354Ssam	snprintf(num, sizeof(num), "%u", ifp->if_dunit);
233138568Ssam	oid = SYSCTL_ADD_NODE(ctx, &SYSCTL_NODE_CHILDREN(_net, wlan),
234138568Ssam		OID_AUTO, num, CTLFLAG_RD, NULL, "");
235138568Ssam	SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
236178354Ssam		"%parent", CTLFLAG_RD, vap->iv_ic, 0,
237178354Ssam		ieee80211_sysctl_parent, "A", "parent device");
238178354Ssam	SYSCTL_ADD_INT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
239178354Ssam		"driver_caps", CTLFLAG_RW, &vap->iv_caps, 0,
240178354Ssam		"driver capabilities");
241138568Ssam#ifdef IEEE80211_DEBUG
242178354Ssam	vap->iv_debug = ieee80211_debug;
243138568Ssam	SYSCTL_ADD_INT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
244178354Ssam		"debug", CTLFLAG_RW, &vap->iv_debug, 0,
245138568Ssam		"control debugging printfs");
246138568Ssam#endif
247178354Ssam	SYSCTL_ADD_INT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
248178354Ssam		"bmiss_max", CTLFLAG_RW, &vap->iv_bmiss_max, 0,
249178354Ssam		"consecutive beacon misses before scanning");
250138568Ssam	/* XXX inherit from tunables */
251138568Ssam	SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
252178354Ssam		"inact_run", CTLTYPE_INT | CTLFLAG_RW, &vap->iv_inact_run, 0,
253138568Ssam		ieee80211_sysctl_inact, "I",
254138568Ssam		"station inactivity timeout (sec)");
255138568Ssam	SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
256178354Ssam		"inact_probe", CTLTYPE_INT | CTLFLAG_RW, &vap->iv_inact_probe, 0,
257138568Ssam		ieee80211_sysctl_inact, "I",
258138568Ssam		"station inactivity probe timeout (sec)");
259138568Ssam	SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
260178354Ssam		"inact_auth", CTLTYPE_INT | CTLFLAG_RW, &vap->iv_inact_auth, 0,
261138568Ssam		ieee80211_sysctl_inact, "I",
262138568Ssam		"station authentication timeout (sec)");
263138568Ssam	SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
264178354Ssam		"inact_init", CTLTYPE_INT | CTLFLAG_RW, &vap->iv_inact_init, 0,
265138568Ssam		ieee80211_sysctl_inact, "I",
266138568Ssam		"station initial state timeout (sec)");
267178354Ssam	if (vap->iv_htcaps & IEEE80211_HTC_HT) {
268178354Ssam		SYSCTL_ADD_INT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
269178354Ssam			"ampdu_mintraffic_bk", CTLFLAG_RW,
270178354Ssam			&vap->iv_ampdu_mintraffic[WME_AC_BK], 0,
271178354Ssam			"BK traffic tx aggr threshold (pps)");
272178354Ssam		SYSCTL_ADD_INT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
273178354Ssam			"ampdu_mintraffic_be", CTLFLAG_RW,
274178354Ssam			&vap->iv_ampdu_mintraffic[WME_AC_BE], 0,
275178354Ssam			"BE traffic tx aggr threshold (pps)");
276178354Ssam		SYSCTL_ADD_INT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
277178354Ssam			"ampdu_mintraffic_vo", CTLFLAG_RW,
278178354Ssam			&vap->iv_ampdu_mintraffic[WME_AC_VO], 0,
279178354Ssam			"VO traffic tx aggr threshold (pps)");
280178354Ssam		SYSCTL_ADD_INT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
281178354Ssam			"ampdu_mintraffic_vi", CTLFLAG_RW,
282178354Ssam			&vap->iv_ampdu_mintraffic[WME_AC_VI], 0,
283178354Ssam			"VI traffic tx aggr threshold (pps)");
284178354Ssam	}
285181194Ssam	if (vap->iv_caps & IEEE80211_C_DFS) {
286181194Ssam		SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
287181194Ssam			"radar", CTLTYPE_INT | CTLFLAG_RW, vap->iv_ic, 0,
288193115Ssam			ieee80211_sysctl_radar, "I", "simulate radar event");
289181194Ssam	}
290178354Ssam	vap->iv_sysctl = ctx;
291178354Ssam	vap->iv_oid = oid;
292138568Ssam}
293138568Ssam
294138568Ssamvoid
295178354Ssamieee80211_sysctl_vdetach(struct ieee80211vap *vap)
296138568Ssam{
297138568Ssam
298178354Ssam	if (vap->iv_sysctl != NULL) {
299178354Ssam		sysctl_ctx_free(vap->iv_sysctl);
300186302Ssam		free(vap->iv_sysctl, M_DEVBUF);
301178354Ssam		vap->iv_sysctl = NULL;
302138568Ssam	}
303138568Ssam}
304138568Ssam
305138568Ssamint
306138568Ssamieee80211_node_dectestref(struct ieee80211_node *ni)
307138568Ssam{
308138568Ssam	/* XXX need equivalent of atomic_dec_and_test */
309138568Ssam	atomic_subtract_int(&ni->ni_refcnt, 1);
310138568Ssam	return atomic_cmpset_int(&ni->ni_refcnt, 0, 1);
311138568Ssam}
312138568Ssam
313165894Ssamvoid
314165894Ssamieee80211_drain_ifq(struct ifqueue *ifq)
315165894Ssam{
316165894Ssam	struct ieee80211_node *ni;
317165894Ssam	struct mbuf *m;
318165894Ssam
319165894Ssam	for (;;) {
320165894Ssam		IF_DEQUEUE(ifq, m);
321165894Ssam		if (m == NULL)
322165894Ssam			break;
323165894Ssam
324165894Ssam		ni = (struct ieee80211_node *)m->m_pkthdr.rcvif;
325165894Ssam		KASSERT(ni != NULL, ("frame w/o node"));
326165894Ssam		ieee80211_free_node(ni);
327165894Ssam		m->m_pkthdr.rcvif = NULL;
328165894Ssam
329165894Ssam		m_freem(m);
330165894Ssam	}
331165894Ssam}
332165894Ssam
333178354Ssamvoid
334178354Ssamieee80211_flush_ifq(struct ifqueue *ifq, struct ieee80211vap *vap)
335178354Ssam{
336178354Ssam	struct ieee80211_node *ni;
337178354Ssam	struct mbuf *m, **mprev;
338178354Ssam
339178354Ssam	IF_LOCK(ifq);
340178354Ssam	mprev = &ifq->ifq_head;
341178354Ssam	while ((m = *mprev) != NULL) {
342178354Ssam		ni = (struct ieee80211_node *)m->m_pkthdr.rcvif;
343178354Ssam		if (ni != NULL && ni->ni_vap == vap) {
344178354Ssam			*mprev = m->m_nextpkt;		/* remove from list */
345178354Ssam			ifq->ifq_len--;
346178354Ssam
347178354Ssam			m_freem(m);
348178354Ssam			ieee80211_free_node(ni);	/* reclaim ref */
349178354Ssam		} else
350178354Ssam			mprev = &m->m_nextpkt;
351178354Ssam	}
352178354Ssam	/* recalculate tail ptr */
353178354Ssam	m = ifq->ifq_head;
354178354Ssam	for (; m != NULL && m->m_nextpkt != NULL; m = m->m_nextpkt)
355178354Ssam		;
356178354Ssam	ifq->ifq_tail = m;
357178354Ssam	IF_UNLOCK(ifq);
358178354Ssam}
359178354Ssam
360138568Ssam/*
361170530Ssam * As above, for mbufs allocated with m_gethdr/MGETHDR
362170530Ssam * or initialized by M_COPY_PKTHDR.
363170530Ssam */
364170530Ssam#define	MC_ALIGN(m, len)						\
365170530Ssamdo {									\
366170530Ssam	(m)->m_data += (MCLBYTES - (len)) &~ (sizeof(long) - 1);	\
367170530Ssam} while (/* CONSTCOND */ 0)
368170530Ssam
369170530Ssam/*
370138568Ssam * Allocate and setup a management frame of the specified
371138568Ssam * size.  We return the mbuf and a pointer to the start
372138568Ssam * of the contiguous data area that's been reserved based
373138568Ssam * on the packet length.  The data area is forced to 32-bit
374138568Ssam * alignment and the buffer length to a multiple of 4 bytes.
375138568Ssam * This is done mainly so beacon frames (that require this)
376138568Ssam * can use this interface too.
377138568Ssam */
378138568Ssamstruct mbuf *
379170530Ssamieee80211_getmgtframe(uint8_t **frm, int headroom, int pktlen)
380138568Ssam{
381138568Ssam	struct mbuf *m;
382138568Ssam	u_int len;
383138568Ssam
384138568Ssam	/*
385138568Ssam	 * NB: we know the mbuf routines will align the data area
386138568Ssam	 *     so we don't need to do anything special.
387138568Ssam	 */
388170530Ssam	len = roundup2(headroom + pktlen, 4);
389138568Ssam	KASSERT(len <= MCLBYTES, ("802.11 mgt frame too large: %u", len));
390138568Ssam	if (len < MINCLSIZE) {
391151967Sandre		m = m_gethdr(M_NOWAIT, MT_DATA);
392138568Ssam		/*
393138568Ssam		 * Align the data in case additional headers are added.
394138568Ssam		 * This should only happen when a WEP header is added
395138568Ssam		 * which only happens for shared key authentication mgt
396138568Ssam		 * frames which all fit in MHLEN.
397138568Ssam		 */
398138568Ssam		if (m != NULL)
399138568Ssam			MH_ALIGN(m, len);
400170530Ssam	} else {
401151967Sandre		m = m_getcl(M_NOWAIT, MT_DATA, M_PKTHDR);
402170530Ssam		if (m != NULL)
403170530Ssam			MC_ALIGN(m, len);
404170530Ssam	}
405138568Ssam	if (m != NULL) {
406171984Ssephe		m->m_data += headroom;
407138568Ssam		*frm = m->m_data;
408138568Ssam	}
409138568Ssam	return m;
410138568Ssam}
411138568Ssam
412195757Ssam/*
413195757Ssam * Re-align the payload in the mbuf.  This is mainly used (right now)
414195757Ssam * to handle IP header alignment requirements on certain architectures.
415195757Ssam */
416195757Ssamstruct mbuf *
417195757Ssamieee80211_realign(struct ieee80211vap *vap, struct mbuf *m, size_t align)
418195757Ssam{
419195757Ssam	int pktlen, space;
420195757Ssam	struct mbuf *n;
421195757Ssam
422195757Ssam	pktlen = m->m_pkthdr.len;
423195757Ssam	space = pktlen + align;
424195757Ssam	if (space < MINCLSIZE)
425195757Ssam		n = m_gethdr(M_DONTWAIT, MT_DATA);
426195757Ssam	else {
427195757Ssam		n = m_getjcl(M_DONTWAIT, MT_DATA, M_PKTHDR,
428195757Ssam		    space <= MCLBYTES ?     MCLBYTES :
429195757Ssam#if MJUMPAGESIZE != MCLBYTES
430195757Ssam		    space <= MJUMPAGESIZE ? MJUMPAGESIZE :
431195757Ssam#endif
432195757Ssam		    space <= MJUM9BYTES ?   MJUM9BYTES : MJUM16BYTES);
433195757Ssam	}
434195757Ssam	if (__predict_true(n != NULL)) {
435195757Ssam		m_move_pkthdr(n, m);
436195757Ssam		n->m_data = (caddr_t)(ALIGN(n->m_data + align) - align);
437195757Ssam		m_copydata(m, 0, pktlen, mtod(n, caddr_t));
438195757Ssam		n->m_len = pktlen;
439195757Ssam	} else {
440195757Ssam		IEEE80211_DISCARD(vap, IEEE80211_MSG_ANY,
441195757Ssam		    mtod(m, const struct ieee80211_frame *), NULL,
442195757Ssam		    "%s", "no mbuf to realign");
443195757Ssam		vap->iv_stats.is_rx_badalign++;
444195757Ssam	}
445195757Ssam	m_freem(m);
446195757Ssam	return n;
447195757Ssam}
448195757Ssam
449170530Ssamint
450170530Ssamieee80211_add_callback(struct mbuf *m,
451170530Ssam	void (*func)(struct ieee80211_node *, void *, int), void *arg)
452170530Ssam{
453170530Ssam	struct m_tag *mtag;
454170530Ssam	struct ieee80211_cb *cb;
455170530Ssam
456170530Ssam	mtag = m_tag_alloc(MTAG_ABI_NET80211, NET80211_TAG_CALLBACK,
457170530Ssam			sizeof(struct ieee80211_cb), M_NOWAIT);
458170530Ssam	if (mtag == NULL)
459170530Ssam		return 0;
460170530Ssam
461170530Ssam	cb = (struct ieee80211_cb *)(mtag+1);
462170530Ssam	cb->func = func;
463170530Ssam	cb->arg = arg;
464170530Ssam	m_tag_prepend(m, mtag);
465170530Ssam	m->m_flags |= M_TXCB;
466170530Ssam	return 1;
467170530Ssam}
468170530Ssam
469170530Ssamvoid
470170530Ssamieee80211_process_callback(struct ieee80211_node *ni,
471170530Ssam	struct mbuf *m, int status)
472170530Ssam{
473170530Ssam	struct m_tag *mtag;
474170530Ssam
475170530Ssam	mtag = m_tag_locate(m, MTAG_ABI_NET80211, NET80211_TAG_CALLBACK, NULL);
476170530Ssam	if (mtag != NULL) {
477170530Ssam		struct ieee80211_cb *cb = (struct ieee80211_cb *)(mtag+1);
478170530Ssam		cb->func(ni, cb->arg, status);
479170530Ssam	}
480170530Ssam}
481170530Ssam
482138568Ssam#include <sys/libkern.h>
483138568Ssam
484138568Ssamvoid
485138568Ssamget_random_bytes(void *p, size_t n)
486138568Ssam{
487170530Ssam	uint8_t *dp = p;
488138568Ssam
489138568Ssam	while (n > 0) {
490170530Ssam		uint32_t v = arc4random();
491170530Ssam		size_t nb = n > sizeof(uint32_t) ? sizeof(uint32_t) : n;
492170530Ssam		bcopy(&v, dp, n > sizeof(uint32_t) ? sizeof(uint32_t) : n);
493170530Ssam		dp += sizeof(uint32_t), n -= nb;
494138568Ssam	}
495138568Ssam}
496138568Ssam
497178354Ssam/*
498178354Ssam * Helper function for events that pass just a single mac address.
499178354Ssam */
500178354Ssamstatic void
501178354Ssamnotify_macaddr(struct ifnet *ifp, int op, const uint8_t mac[IEEE80211_ADDR_LEN])
502138568Ssam{
503138568Ssam	struct ieee80211_join_event iev;
504138568Ssam
505191816Szec	CURVNET_SET(ifp->if_vnet);
506144302Ssam	memset(&iev, 0, sizeof(iev));
507178354Ssam	IEEE80211_ADDR_COPY(iev.iev_addr, mac);
508178354Ssam	rt_ieee80211msg(ifp, op, &iev, sizeof(iev));
509191816Szec	CURVNET_RESTORE();
510178354Ssam}
511178354Ssam
512178354Ssamvoid
513178354Ssamieee80211_notify_node_join(struct ieee80211_node *ni, int newassoc)
514178354Ssam{
515178354Ssam	struct ieee80211vap *vap = ni->ni_vap;
516178354Ssam	struct ifnet *ifp = vap->iv_ifp;
517178354Ssam
518191816Szec	CURVNET_SET_QUIET(ifp->if_vnet);
519178354Ssam	IEEE80211_NOTE(vap, IEEE80211_MSG_NODE, ni, "%snode join",
520178354Ssam	    (ni == vap->iv_bss) ? "bss " : "");
521178354Ssam
522178354Ssam	if (ni == vap->iv_bss) {
523178354Ssam		notify_macaddr(ifp, newassoc ?
524178354Ssam		    RTM_IEEE80211_ASSOC : RTM_IEEE80211_REASSOC, ni->ni_bssid);
525138568Ssam		if_link_state_change(ifp, LINK_STATE_UP);
526144302Ssam	} else {
527178354Ssam		notify_macaddr(ifp, newassoc ?
528178354Ssam		    RTM_IEEE80211_JOIN : RTM_IEEE80211_REJOIN, ni->ni_macaddr);
529138568Ssam	}
530191816Szec	CURVNET_RESTORE();
531138568Ssam}
532138568Ssam
533138568Ssamvoid
534178354Ssamieee80211_notify_node_leave(struct ieee80211_node *ni)
535138568Ssam{
536178354Ssam	struct ieee80211vap *vap = ni->ni_vap;
537178354Ssam	struct ifnet *ifp = vap->iv_ifp;
538138568Ssam
539191816Szec	CURVNET_SET_QUIET(ifp->if_vnet);
540178354Ssam	IEEE80211_NOTE(vap, IEEE80211_MSG_NODE, ni, "%snode leave",
541178354Ssam	    (ni == vap->iv_bss) ? "bss " : "");
542178354Ssam
543178354Ssam	if (ni == vap->iv_bss) {
544138568Ssam		rt_ieee80211msg(ifp, RTM_IEEE80211_DISASSOC, NULL, 0);
545138568Ssam		if_link_state_change(ifp, LINK_STATE_DOWN);
546138568Ssam	} else {
547138568Ssam		/* fire off wireless event station leaving */
548178354Ssam		notify_macaddr(ifp, RTM_IEEE80211_LEAVE, ni->ni_macaddr);
549138568Ssam	}
550191816Szec	CURVNET_RESTORE();
551138568Ssam}
552138568Ssam
553138568Ssamvoid
554178354Ssamieee80211_notify_scan_done(struct ieee80211vap *vap)
555138568Ssam{
556178354Ssam	struct ifnet *ifp = vap->iv_ifp;
557138568Ssam
558178354Ssam	IEEE80211_DPRINTF(vap, IEEE80211_MSG_SCAN, "%s\n", "notify scan done");
559138568Ssam
560138568Ssam	/* dispatch wireless event indicating scan completed */
561191816Szec	CURVNET_SET(ifp->if_vnet);
562138568Ssam	rt_ieee80211msg(ifp, RTM_IEEE80211_SCAN, NULL, 0);
563191816Szec	CURVNET_RESTORE();
564138568Ssam}
565138568Ssam
566138568Ssamvoid
567178354Ssamieee80211_notify_replay_failure(struct ieee80211vap *vap,
568138568Ssam	const struct ieee80211_frame *wh, const struct ieee80211_key *k,
569193541Ssam	u_int64_t rsc, int tid)
570138568Ssam{
571178354Ssam	struct ifnet *ifp = vap->iv_ifp;
572138568Ssam
573178354Ssam	IEEE80211_NOTE_MAC(vap, IEEE80211_MSG_CRYPTO, wh->i_addr2,
574178354Ssam	    "%s replay detected <rsc %ju, csc %ju, keyix %u rxkeyix %u>",
575178354Ssam	    k->wk_cipher->ic_name, (intmax_t) rsc,
576193541Ssam	    (intmax_t) k->wk_keyrsc[tid],
577148863Ssam	    k->wk_keyix, k->wk_rxkeyix);
578138568Ssam
579138568Ssam	if (ifp != NULL) {		/* NB: for cipher test modules */
580138568Ssam		struct ieee80211_replay_event iev;
581138568Ssam
582138568Ssam		IEEE80211_ADDR_COPY(iev.iev_dst, wh->i_addr1);
583138568Ssam		IEEE80211_ADDR_COPY(iev.iev_src, wh->i_addr2);
584138568Ssam		iev.iev_cipher = k->wk_cipher->ic_cipher;
585148863Ssam		if (k->wk_rxkeyix != IEEE80211_KEYIX_NONE)
586148863Ssam			iev.iev_keyix = k->wk_rxkeyix;
587148863Ssam		else
588148863Ssam			iev.iev_keyix = k->wk_keyix;
589193541Ssam		iev.iev_keyrsc = k->wk_keyrsc[tid];
590138568Ssam		iev.iev_rsc = rsc;
591191816Szec		CURVNET_SET(ifp->if_vnet);
592138568Ssam		rt_ieee80211msg(ifp, RTM_IEEE80211_REPLAY, &iev, sizeof(iev));
593191816Szec		CURVNET_RESTORE();
594138568Ssam	}
595138568Ssam}
596138568Ssam
597138568Ssamvoid
598178354Ssamieee80211_notify_michael_failure(struct ieee80211vap *vap,
599138568Ssam	const struct ieee80211_frame *wh, u_int keyix)
600138568Ssam{
601178354Ssam	struct ifnet *ifp = vap->iv_ifp;
602138568Ssam
603178354Ssam	IEEE80211_NOTE_MAC(vap, IEEE80211_MSG_CRYPTO, wh->i_addr2,
604178354Ssam	    "michael MIC verification failed <keyix %u>", keyix);
605178354Ssam	vap->iv_stats.is_rx_tkipmic++;
606138568Ssam
607138568Ssam	if (ifp != NULL) {		/* NB: for cipher test modules */
608138568Ssam		struct ieee80211_michael_event iev;
609138568Ssam
610138568Ssam		IEEE80211_ADDR_COPY(iev.iev_dst, wh->i_addr1);
611138568Ssam		IEEE80211_ADDR_COPY(iev.iev_src, wh->i_addr2);
612138568Ssam		iev.iev_cipher = IEEE80211_CIPHER_TKIP;
613138568Ssam		iev.iev_keyix = keyix;
614191816Szec		CURVNET_SET(ifp->if_vnet);
615138568Ssam		rt_ieee80211msg(ifp, RTM_IEEE80211_MICHAEL, &iev, sizeof(iev));
616191816Szec		CURVNET_RESTORE();
617138568Ssam	}
618138568Ssam}
619138568Ssam
620138568Ssamvoid
621178354Ssamieee80211_notify_wds_discover(struct ieee80211_node *ni)
622178354Ssam{
623178354Ssam	struct ieee80211vap *vap = ni->ni_vap;
624178354Ssam	struct ifnet *ifp = vap->iv_ifp;
625178354Ssam
626178354Ssam	notify_macaddr(ifp, RTM_IEEE80211_WDS, ni->ni_macaddr);
627178354Ssam}
628178354Ssam
629178354Ssamvoid
630178354Ssamieee80211_notify_csa(struct ieee80211com *ic,
631178354Ssam	const struct ieee80211_channel *c, int mode, int count)
632178354Ssam{
633178354Ssam	struct ifnet *ifp = ic->ic_ifp;
634178354Ssam	struct ieee80211_csa_event iev;
635178354Ssam
636178354Ssam	memset(&iev, 0, sizeof(iev));
637178354Ssam	iev.iev_flags = c->ic_flags;
638178354Ssam	iev.iev_freq = c->ic_freq;
639178354Ssam	iev.iev_ieee = c->ic_ieee;
640178354Ssam	iev.iev_mode = mode;
641178354Ssam	iev.iev_count = count;
642178354Ssam	rt_ieee80211msg(ifp, RTM_IEEE80211_CSA, &iev, sizeof(iev));
643178354Ssam}
644178354Ssam
645178354Ssamvoid
646178354Ssamieee80211_notify_radar(struct ieee80211com *ic,
647178354Ssam	const struct ieee80211_channel *c)
648178354Ssam{
649178354Ssam	struct ifnet *ifp = ic->ic_ifp;
650178354Ssam	struct ieee80211_radar_event iev;
651178354Ssam
652178354Ssam	memset(&iev, 0, sizeof(iev));
653178354Ssam	iev.iev_flags = c->ic_flags;
654178354Ssam	iev.iev_freq = c->ic_freq;
655178354Ssam	iev.iev_ieee = c->ic_ieee;
656178354Ssam	rt_ieee80211msg(ifp, RTM_IEEE80211_RADAR, &iev, sizeof(iev));
657178354Ssam}
658178354Ssam
659178354Ssamvoid
660178354Ssamieee80211_notify_cac(struct ieee80211com *ic,
661178354Ssam	const struct ieee80211_channel *c, enum ieee80211_notify_cac_event type)
662178354Ssam{
663178354Ssam	struct ifnet *ifp = ic->ic_ifp;
664178354Ssam	struct ieee80211_cac_event iev;
665178354Ssam
666178354Ssam	memset(&iev, 0, sizeof(iev));
667178354Ssam	iev.iev_flags = c->ic_flags;
668178354Ssam	iev.iev_freq = c->ic_freq;
669178354Ssam	iev.iev_ieee = c->ic_ieee;
670178354Ssam	iev.iev_type = type;
671178354Ssam	rt_ieee80211msg(ifp, RTM_IEEE80211_CAC, &iev, sizeof(iev));
672178354Ssam}
673178354Ssam
674178354Ssamvoid
675178354Ssamieee80211_notify_node_deauth(struct ieee80211_node *ni)
676178354Ssam{
677178354Ssam	struct ieee80211vap *vap = ni->ni_vap;
678178354Ssam	struct ifnet *ifp = vap->iv_ifp;
679178354Ssam
680178354Ssam	IEEE80211_NOTE(vap, IEEE80211_MSG_NODE, ni, "%s", "node deauth");
681178354Ssam
682178354Ssam	notify_macaddr(ifp, RTM_IEEE80211_DEAUTH, ni->ni_macaddr);
683178354Ssam}
684178354Ssam
685178354Ssamvoid
686178354Ssamieee80211_notify_node_auth(struct ieee80211_node *ni)
687178354Ssam{
688178354Ssam	struct ieee80211vap *vap = ni->ni_vap;
689178354Ssam	struct ifnet *ifp = vap->iv_ifp;
690178354Ssam
691178354Ssam	IEEE80211_NOTE(vap, IEEE80211_MSG_NODE, ni, "%s", "node auth");
692178354Ssam
693178354Ssam	notify_macaddr(ifp, RTM_IEEE80211_AUTH, ni->ni_macaddr);
694178354Ssam}
695178354Ssam
696178354Ssamvoid
697178354Ssamieee80211_notify_country(struct ieee80211vap *vap,
698178354Ssam	const uint8_t bssid[IEEE80211_ADDR_LEN], const uint8_t cc[2])
699178354Ssam{
700178354Ssam	struct ifnet *ifp = vap->iv_ifp;
701178354Ssam	struct ieee80211_country_event iev;
702178354Ssam
703178354Ssam	memset(&iev, 0, sizeof(iev));
704178354Ssam	IEEE80211_ADDR_COPY(iev.iev_addr, bssid);
705178354Ssam	iev.iev_cc[0] = cc[0];
706178354Ssam	iev.iev_cc[1] = cc[1];
707178354Ssam	rt_ieee80211msg(ifp, RTM_IEEE80211_COUNTRY, &iev, sizeof(iev));
708178354Ssam}
709178354Ssam
710178354Ssamvoid
711178354Ssamieee80211_notify_radio(struct ieee80211com *ic, int state)
712178354Ssam{
713178354Ssam	struct ifnet *ifp = ic->ic_ifp;
714178354Ssam	struct ieee80211_radio_event iev;
715178354Ssam
716178354Ssam	memset(&iev, 0, sizeof(iev));
717178354Ssam	iev.iev_state = state;
718178354Ssam	rt_ieee80211msg(ifp, RTM_IEEE80211_RADIO, &iev, sizeof(iev));
719178354Ssam}
720178354Ssam
721178354Ssamvoid
722138568Ssamieee80211_load_module(const char *modname)
723138568Ssam{
724159590Sjhb
725138777Ssam#ifdef notyet
726159590Sjhb	(void)kern_kldload(curthread, modname, NULL);
727138777Ssam#else
728138777Ssam	printf("%s: load the %s module by hand for now.\n", __func__, modname);
729138777Ssam#endif
730138568Ssam}
731138568Ssam
732192468Ssamstatic eventhandler_tag wlan_bpfevent;
733192468Ssam
734192468Ssamstatic void
735192764Ssambpf_track(void *arg, struct ifnet *ifp, int dlt, int attach)
736192468Ssam{
737192468Ssam	/* NB: identify vap's by if_start */
738192764Ssam	if (dlt == DLT_IEEE802_11_RADIO && ifp->if_start == ieee80211_start) {
739192468Ssam		struct ieee80211vap *vap = ifp->if_softc;
740192468Ssam		/*
741192468Ssam		 * Track bpf radiotap listener state.  We mark the vap
742192468Ssam		 * to indicate if any listener is present and the com
743192468Ssam		 * to indicate if any listener exists on any associated
744192468Ssam		 * vap.  This flag is used by drivers to prepare radiotap
745192468Ssam		 * state only when needed.
746192468Ssam		 */
747193292Ssam		if (attach) {
748192468Ssam			ieee80211_syncflag_ext(vap, IEEE80211_FEXT_BPF);
749193292Ssam			if (vap->iv_opmode == IEEE80211_M_MONITOR)
750193292Ssam				atomic_add_int(&vap->iv_ic->ic_montaps, 1);
751193312Ssam		} else if (!bpf_peers_present(vap->iv_rawbpf)) {
752192468Ssam			ieee80211_syncflag_ext(vap, -IEEE80211_FEXT_BPF);
753193292Ssam			if (vap->iv_opmode == IEEE80211_M_MONITOR)
754193292Ssam				atomic_subtract_int(&vap->iv_ic->ic_montaps, 1);
755193292Ssam		}
756192468Ssam	}
757192468Ssam}
758192468Ssam
759138568Ssam/*
760138568Ssam * Module glue.
761138568Ssam *
762138568Ssam * NB: the module name is "wlan" for compatibility with NetBSD.
763138568Ssam */
764138568Ssamstatic int
765138568Ssamwlan_modevent(module_t mod, int type, void *unused)
766138568Ssam{
767138568Ssam	switch (type) {
768138568Ssam	case MOD_LOAD:
769138568Ssam		if (bootverbose)
770138568Ssam			printf("wlan: <802.11 Link Layer>\n");
771192468Ssam		wlan_bpfevent = EVENTHANDLER_REGISTER(bpf_track,
772192468Ssam		    bpf_track, 0, EVENTHANDLER_PRI_ANY);
773192468Ssam		if (wlan_bpfevent == NULL)
774192468Ssam			return ENOMEM;
775178354Ssam		if_clone_attach(&wlan_cloner);
776178354Ssam		if_register_com_alloc(IFT_IEEE80211, wlan_alloc, wlan_free);
777138568Ssam		return 0;
778138568Ssam	case MOD_UNLOAD:
779178354Ssam		if_deregister_com_alloc(IFT_IEEE80211);
780178354Ssam		if_clone_detach(&wlan_cloner);
781192468Ssam		EVENTHANDLER_DEREGISTER(bpf_track, wlan_bpfevent);
782138568Ssam		return 0;
783138568Ssam	}
784138568Ssam	return EINVAL;
785138568Ssam}
786138568Ssam
787138568Ssamstatic moduledata_t wlan_mod = {
788138568Ssam	"wlan",
789138568Ssam	wlan_modevent,
790138568Ssam	0
791138568Ssam};
792138568SsamDECLARE_MODULE(wlan, wlan_mod, SI_SUB_DRIVERS, SI_ORDER_FIRST);
793138568SsamMODULE_VERSION(wlan, 1);
794138568SsamMODULE_DEPEND(wlan, ether, 1, 1, 1);
795