ieee80211_freebsd.c revision 283538
1138568Ssam/*- 2186904Ssam * Copyright (c) 2003-2009 Sam Leffler, Errno Consulting 3138568Ssam * All rights reserved. 4138568Ssam * 5138568Ssam * Redistribution and use in source and binary forms, with or without 6138568Ssam * modification, are permitted provided that the following conditions 7138568Ssam * are met: 8138568Ssam * 1. Redistributions of source code must retain the above copyright 9138568Ssam * notice, this list of conditions and the following disclaimer. 10138568Ssam * 2. Redistributions in binary form must reproduce the above copyright 11138568Ssam * notice, this list of conditions and the following disclaimer in the 12138568Ssam * documentation and/or other materials provided with the distribution. 13138568Ssam * 14138568Ssam * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 15138568Ssam * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 16138568Ssam * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 17138568Ssam * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 18138568Ssam * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 19138568Ssam * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 20138568Ssam * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 21138568Ssam * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 22138568Ssam * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 23138568Ssam * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 24138568Ssam */ 25138568Ssam 26138568Ssam#include <sys/cdefs.h> 27138568Ssam__FBSDID("$FreeBSD: head/sys/net80211/ieee80211_freebsd.c 283538 2015-05-25 19:18:16Z adrian $"); 28138568Ssam 29138568Ssam/* 30138568Ssam * IEEE 802.11 support (FreeBSD-specific code) 31138568Ssam */ 32178354Ssam#include "opt_wlan.h" 33178354Ssam 34138568Ssam#include <sys/param.h> 35138568Ssam#include <sys/kernel.h> 36138568Ssam#include <sys/systm.h> 37138568Ssam#include <sys/linker.h> 38138568Ssam#include <sys/mbuf.h> 39138568Ssam#include <sys/module.h> 40138568Ssam#include <sys/proc.h> 41138568Ssam#include <sys/sysctl.h> 42138568Ssam 43138568Ssam#include <sys/socket.h> 44138568Ssam 45192468Ssam#include <net/bpf.h> 46138568Ssam#include <net/if.h> 47257176Sglebius#include <net/if_var.h> 48190526Ssam#include <net/if_dl.h> 49178354Ssam#include <net/if_clone.h> 50138568Ssam#include <net/if_media.h> 51178354Ssam#include <net/if_types.h> 52138568Ssam#include <net/ethernet.h> 53138568Ssam#include <net/route.h> 54196019Srwatson#include <net/vnet.h> 55138568Ssam 56138568Ssam#include <net80211/ieee80211_var.h> 57195757Ssam#include <net80211/ieee80211_input.h> 58138568Ssam 59138568SsamSYSCTL_NODE(_net, OID_AUTO, wlan, CTLFLAG_RD, 0, "IEEE 80211 parameters"); 60138568Ssam 61138568Ssam#ifdef IEEE80211_DEBUG 62138568Ssamint ieee80211_debug = 0; 63138568SsamSYSCTL_INT(_net_wlan, OID_AUTO, debug, CTLFLAG_RW, &ieee80211_debug, 64138568Ssam 0, "debugging printfs"); 65138568Ssam#endif 66138568Ssam 67227293Sedstatic MALLOC_DEFINE(M_80211_COM, "80211com", "802.11 com state"); 68178354Ssam 69242154Sadrian#if __FreeBSD_version >= 1000020 70241610Sglebiusstatic const char wlanname[] = "wlan"; 71241610Sglebiusstatic struct if_clone *wlan_cloner; 72242154Sadrian#endif 73241610Sglebius 74178354Ssam/* 75178354Ssam * Allocate/free com structure in conjunction with ifnet; 76178354Ssam * these routines are registered with if_register_com_alloc 77178354Ssam * below and are called automatically by the ifnet code 78178354Ssam * when the ifnet of the parent device is created. 79178354Ssam */ 80178354Ssamstatic void * 81178354Ssamwlan_alloc(u_char type, struct ifnet *ifp) 82178354Ssam{ 83178354Ssam struct ieee80211com *ic; 84178354Ssam 85283538Sadrian ic = IEEE80211_MALLOC(sizeof(struct ieee80211com), M_80211_COM, 86283538Sadrian IEEE80211_M_WAITOK | IEEE80211_M_ZERO); 87178354Ssam ic->ic_ifp = ifp; 88178354Ssam 89178354Ssam return (ic); 90178354Ssam} 91178354Ssam 92178354Ssamstatic void 93178354Ssamwlan_free(void *ic, u_char type) 94178354Ssam{ 95283538Sadrian IEEE80211_FREE(ic, M_80211_COM); 96178354Ssam} 97178354Ssam 98138568Ssamstatic int 99178354Ssamwlan_clone_create(struct if_clone *ifc, int unit, caddr_t params) 100173273Ssam{ 101178354Ssam struct ieee80211_clone_params cp; 102178354Ssam struct ieee80211vap *vap; 103178354Ssam struct ieee80211com *ic; 104178354Ssam struct ifnet *ifp; 105173273Ssam int error; 106173273Ssam 107178354Ssam error = copyin(params, &cp, sizeof(cp)); 108178354Ssam if (error) 109178354Ssam return error; 110178354Ssam ifp = ifunit(cp.icp_parent); 111178354Ssam if (ifp == NULL) 112178354Ssam return ENXIO; 113178957Ssam /* XXX move printfs to DIAGNOSTIC before release */ 114178354Ssam if (ifp->if_type != IFT_IEEE80211) { 115178354Ssam if_printf(ifp, "%s: reject, not an 802.11 device\n", __func__); 116178957Ssam return ENXIO; 117178957Ssam } 118178957Ssam if (cp.icp_opmode >= IEEE80211_OPMODE_MAX) { 119178957Ssam if_printf(ifp, "%s: invalid opmode %d\n", 120178957Ssam __func__, cp.icp_opmode); 121178354Ssam return EINVAL; 122178354Ssam } 123178354Ssam ic = ifp->if_l2com; 124178957Ssam if ((ic->ic_caps & ieee80211_opcap[cp.icp_opmode]) == 0) { 125178957Ssam if_printf(ifp, "%s mode not supported\n", 126178957Ssam ieee80211_opmode_name[cp.icp_opmode]); 127178957Ssam return EOPNOTSUPP; 128178957Ssam } 129186904Ssam if ((cp.icp_flags & IEEE80211_CLONE_TDMA) && 130186904Ssam#ifdef IEEE80211_SUPPORT_TDMA 131186904Ssam (ic->ic_caps & IEEE80211_C_TDMA) == 0 132186904Ssam#else 133186904Ssam (1) 134186904Ssam#endif 135186904Ssam ) { 136186904Ssam if_printf(ifp, "TDMA not supported\n"); 137186904Ssam return EOPNOTSUPP; 138186904Ssam } 139242154Sadrian#if __FreeBSD_version >= 1000020 140241610Sglebius vap = ic->ic_vap_create(ic, wlanname, unit, 141178354Ssam cp.icp_opmode, cp.icp_flags, cp.icp_bssid, 142178354Ssam cp.icp_flags & IEEE80211_CLONE_MACADDR ? 143190526Ssam cp.icp_macaddr : (const uint8_t *)IF_LLADDR(ifp)); 144242154Sadrian#else 145242154Sadrian vap = ic->ic_vap_create(ic, ifc->ifc_name, unit, 146242154Sadrian cp.icp_opmode, cp.icp_flags, cp.icp_bssid, 147242154Sadrian cp.icp_flags & IEEE80211_CLONE_MACADDR ? 148242154Sadrian cp.icp_macaddr : (const uint8_t *)IF_LLADDR(ifp)); 149242154Sadrian 150242154Sadrian#endif 151242154Sadrian 152178354Ssam return (vap == NULL ? EIO : 0); 153178354Ssam} 154178354Ssam 155178354Ssamstatic void 156178354Ssamwlan_clone_destroy(struct ifnet *ifp) 157178354Ssam{ 158178354Ssam struct ieee80211vap *vap = ifp->if_softc; 159178354Ssam struct ieee80211com *ic = vap->iv_ic; 160178354Ssam 161178354Ssam ic->ic_vap_delete(vap); 162178354Ssam} 163178354Ssam 164242155Sadrian#if __FreeBSD_version < 1000020 165242154SadrianIFC_SIMPLE_DECLARE(wlan, 0); 166242155Sadrian#endif 167242154Sadrian 168178354Ssamvoid 169178354Ssamieee80211_vap_destroy(struct ieee80211vap *vap) 170178354Ssam{ 171242149Sadrian CURVNET_SET(vap->iv_ifp->if_vnet); 172242154Sadrian#if __FreeBSD_version >= 1000020 173241610Sglebius if_clone_destroyif(wlan_cloner, vap->iv_ifp); 174242154Sadrian#else 175242154Sadrian if_clone_destroyif(&wlan_cloner, vap->iv_ifp); 176242154Sadrian#endif 177242149Sadrian CURVNET_RESTORE(); 178178354Ssam} 179178354Ssam 180192473Ssamint 181178354Ssamieee80211_sysctl_msecs_ticks(SYSCTL_HANDLER_ARGS) 182178354Ssam{ 183178354Ssam int msecs = ticks_to_msecs(*(int *)arg1); 184178354Ssam int error, t; 185178354Ssam 186178354Ssam error = sysctl_handle_int(oidp, &msecs, 0, req); 187173273Ssam if (error || !req->newptr) 188173273Ssam return error; 189178354Ssam t = msecs_to_ticks(msecs); 190178354Ssam *(int *)arg1 = (t < 1) ? 1 : t; 191173273Ssam return 0; 192173273Ssam} 193178354Ssam 194173273Ssamstatic int 195138568Ssamieee80211_sysctl_inact(SYSCTL_HANDLER_ARGS) 196138568Ssam{ 197138568Ssam int inact = (*(int *)arg1) * IEEE80211_INACT_WAIT; 198138568Ssam int error; 199138568Ssam 200138568Ssam error = sysctl_handle_int(oidp, &inact, 0, req); 201138568Ssam if (error || !req->newptr) 202138568Ssam return error; 203138568Ssam *(int *)arg1 = inact / IEEE80211_INACT_WAIT; 204138568Ssam return 0; 205138568Ssam} 206138568Ssam 207138568Ssamstatic int 208138568Ssamieee80211_sysctl_parent(SYSCTL_HANDLER_ARGS) 209138568Ssam{ 210138568Ssam struct ieee80211com *ic = arg1; 211138568Ssam 212283529Sglebius return SYSCTL_OUT_STR(req, ic->ic_name); 213138568Ssam} 214138568Ssam 215181194Ssamstatic int 216181194Ssamieee80211_sysctl_radar(SYSCTL_HANDLER_ARGS) 217181194Ssam{ 218181194Ssam struct ieee80211com *ic = arg1; 219181194Ssam int t = 0, error; 220181194Ssam 221181194Ssam error = sysctl_handle_int(oidp, &t, 0, req); 222181194Ssam if (error || !req->newptr) 223181194Ssam return error; 224181194Ssam IEEE80211_LOCK(ic); 225181194Ssam ieee80211_dfs_notify_radar(ic, ic->ic_curchan); 226181194Ssam IEEE80211_UNLOCK(ic); 227181194Ssam return 0; 228181194Ssam} 229181194Ssam 230138568Ssamvoid 231138568Ssamieee80211_sysctl_attach(struct ieee80211com *ic) 232138568Ssam{ 233178354Ssam} 234178354Ssam 235178354Ssamvoid 236178354Ssamieee80211_sysctl_detach(struct ieee80211com *ic) 237178354Ssam{ 238178354Ssam} 239178354Ssam 240178354Ssamvoid 241178354Ssamieee80211_sysctl_vattach(struct ieee80211vap *vap) 242178354Ssam{ 243178354Ssam struct ifnet *ifp = vap->iv_ifp; 244138568Ssam struct sysctl_ctx_list *ctx; 245138568Ssam struct sysctl_oid *oid; 246138568Ssam char num[14]; /* sufficient for 32 bits */ 247138568Ssam 248283538Sadrian ctx = (struct sysctl_ctx_list *) IEEE80211_MALLOC(sizeof(struct sysctl_ctx_list), 249283538Sadrian M_DEVBUF, IEEE80211_M_NOWAIT | IEEE80211_M_ZERO); 250138568Ssam if (ctx == NULL) { 251178354Ssam if_printf(ifp, "%s: cannot allocate sysctl context!\n", 252138568Ssam __func__); 253138568Ssam return; 254138568Ssam } 255138568Ssam sysctl_ctx_init(ctx); 256178354Ssam snprintf(num, sizeof(num), "%u", ifp->if_dunit); 257138568Ssam oid = SYSCTL_ADD_NODE(ctx, &SYSCTL_NODE_CHILDREN(_net, wlan), 258138568Ssam OID_AUTO, num, CTLFLAG_RD, NULL, ""); 259138568Ssam SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO, 260217554Smdf "%parent", CTLTYPE_STRING | CTLFLAG_RD, vap->iv_ic, 0, 261178354Ssam ieee80211_sysctl_parent, "A", "parent device"); 262217322Smdf SYSCTL_ADD_UINT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO, 263178354Ssam "driver_caps", CTLFLAG_RW, &vap->iv_caps, 0, 264178354Ssam "driver capabilities"); 265138568Ssam#ifdef IEEE80211_DEBUG 266178354Ssam vap->iv_debug = ieee80211_debug; 267217322Smdf SYSCTL_ADD_UINT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO, 268178354Ssam "debug", CTLFLAG_RW, &vap->iv_debug, 0, 269138568Ssam "control debugging printfs"); 270138568Ssam#endif 271178354Ssam SYSCTL_ADD_INT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO, 272178354Ssam "bmiss_max", CTLFLAG_RW, &vap->iv_bmiss_max, 0, 273178354Ssam "consecutive beacon misses before scanning"); 274138568Ssam /* XXX inherit from tunables */ 275138568Ssam SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO, 276178354Ssam "inact_run", CTLTYPE_INT | CTLFLAG_RW, &vap->iv_inact_run, 0, 277138568Ssam ieee80211_sysctl_inact, "I", 278138568Ssam "station inactivity timeout (sec)"); 279138568Ssam SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO, 280178354Ssam "inact_probe", CTLTYPE_INT | CTLFLAG_RW, &vap->iv_inact_probe, 0, 281138568Ssam ieee80211_sysctl_inact, "I", 282138568Ssam "station inactivity probe timeout (sec)"); 283138568Ssam SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO, 284178354Ssam "inact_auth", CTLTYPE_INT | CTLFLAG_RW, &vap->iv_inact_auth, 0, 285138568Ssam ieee80211_sysctl_inact, "I", 286138568Ssam "station authentication timeout (sec)"); 287138568Ssam SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO, 288178354Ssam "inact_init", CTLTYPE_INT | CTLFLAG_RW, &vap->iv_inact_init, 0, 289138568Ssam ieee80211_sysctl_inact, "I", 290138568Ssam "station initial state timeout (sec)"); 291178354Ssam if (vap->iv_htcaps & IEEE80211_HTC_HT) { 292217322Smdf SYSCTL_ADD_UINT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO, 293178354Ssam "ampdu_mintraffic_bk", CTLFLAG_RW, 294178354Ssam &vap->iv_ampdu_mintraffic[WME_AC_BK], 0, 295178354Ssam "BK traffic tx aggr threshold (pps)"); 296217322Smdf SYSCTL_ADD_UINT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO, 297178354Ssam "ampdu_mintraffic_be", CTLFLAG_RW, 298178354Ssam &vap->iv_ampdu_mintraffic[WME_AC_BE], 0, 299178354Ssam "BE traffic tx aggr threshold (pps)"); 300217322Smdf SYSCTL_ADD_UINT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO, 301178354Ssam "ampdu_mintraffic_vo", CTLFLAG_RW, 302178354Ssam &vap->iv_ampdu_mintraffic[WME_AC_VO], 0, 303178354Ssam "VO traffic tx aggr threshold (pps)"); 304217322Smdf SYSCTL_ADD_UINT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO, 305178354Ssam "ampdu_mintraffic_vi", CTLFLAG_RW, 306178354Ssam &vap->iv_ampdu_mintraffic[WME_AC_VI], 0, 307178354Ssam "VI traffic tx aggr threshold (pps)"); 308178354Ssam } 309181194Ssam if (vap->iv_caps & IEEE80211_C_DFS) { 310181194Ssam SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO, 311181194Ssam "radar", CTLTYPE_INT | CTLFLAG_RW, vap->iv_ic, 0, 312193115Ssam ieee80211_sysctl_radar, "I", "simulate radar event"); 313181194Ssam } 314178354Ssam vap->iv_sysctl = ctx; 315178354Ssam vap->iv_oid = oid; 316138568Ssam} 317138568Ssam 318138568Ssamvoid 319178354Ssamieee80211_sysctl_vdetach(struct ieee80211vap *vap) 320138568Ssam{ 321138568Ssam 322178354Ssam if (vap->iv_sysctl != NULL) { 323178354Ssam sysctl_ctx_free(vap->iv_sysctl); 324283538Sadrian IEEE80211_FREE(vap->iv_sysctl, M_DEVBUF); 325178354Ssam vap->iv_sysctl = NULL; 326138568Ssam } 327138568Ssam} 328138568Ssam 329138568Ssamint 330138568Ssamieee80211_node_dectestref(struct ieee80211_node *ni) 331138568Ssam{ 332138568Ssam /* XXX need equivalent of atomic_dec_and_test */ 333138568Ssam atomic_subtract_int(&ni->ni_refcnt, 1); 334138568Ssam return atomic_cmpset_int(&ni->ni_refcnt, 0, 1); 335138568Ssam} 336138568Ssam 337165894Ssamvoid 338165894Ssamieee80211_drain_ifq(struct ifqueue *ifq) 339165894Ssam{ 340165894Ssam struct ieee80211_node *ni; 341165894Ssam struct mbuf *m; 342165894Ssam 343165894Ssam for (;;) { 344165894Ssam IF_DEQUEUE(ifq, m); 345165894Ssam if (m == NULL) 346165894Ssam break; 347165894Ssam 348165894Ssam ni = (struct ieee80211_node *)m->m_pkthdr.rcvif; 349165894Ssam KASSERT(ni != NULL, ("frame w/o node")); 350165894Ssam ieee80211_free_node(ni); 351165894Ssam m->m_pkthdr.rcvif = NULL; 352165894Ssam 353165894Ssam m_freem(m); 354165894Ssam } 355165894Ssam} 356165894Ssam 357178354Ssamvoid 358178354Ssamieee80211_flush_ifq(struct ifqueue *ifq, struct ieee80211vap *vap) 359178354Ssam{ 360178354Ssam struct ieee80211_node *ni; 361178354Ssam struct mbuf *m, **mprev; 362178354Ssam 363178354Ssam IF_LOCK(ifq); 364178354Ssam mprev = &ifq->ifq_head; 365178354Ssam while ((m = *mprev) != NULL) { 366178354Ssam ni = (struct ieee80211_node *)m->m_pkthdr.rcvif; 367178354Ssam if (ni != NULL && ni->ni_vap == vap) { 368178354Ssam *mprev = m->m_nextpkt; /* remove from list */ 369178354Ssam ifq->ifq_len--; 370178354Ssam 371178354Ssam m_freem(m); 372178354Ssam ieee80211_free_node(ni); /* reclaim ref */ 373178354Ssam } else 374178354Ssam mprev = &m->m_nextpkt; 375178354Ssam } 376178354Ssam /* recalculate tail ptr */ 377178354Ssam m = ifq->ifq_head; 378178354Ssam for (; m != NULL && m->m_nextpkt != NULL; m = m->m_nextpkt) 379178354Ssam ; 380178354Ssam ifq->ifq_tail = m; 381178354Ssam IF_UNLOCK(ifq); 382178354Ssam} 383178354Ssam 384138568Ssam/* 385170530Ssam * As above, for mbufs allocated with m_gethdr/MGETHDR 386170530Ssam * or initialized by M_COPY_PKTHDR. 387170530Ssam */ 388170530Ssam#define MC_ALIGN(m, len) \ 389170530Ssamdo { \ 390170530Ssam (m)->m_data += (MCLBYTES - (len)) &~ (sizeof(long) - 1); \ 391170530Ssam} while (/* CONSTCOND */ 0) 392170530Ssam 393170530Ssam/* 394138568Ssam * Allocate and setup a management frame of the specified 395138568Ssam * size. We return the mbuf and a pointer to the start 396138568Ssam * of the contiguous data area that's been reserved based 397138568Ssam * on the packet length. The data area is forced to 32-bit 398138568Ssam * alignment and the buffer length to a multiple of 4 bytes. 399138568Ssam * This is done mainly so beacon frames (that require this) 400138568Ssam * can use this interface too. 401138568Ssam */ 402138568Ssamstruct mbuf * 403170530Ssamieee80211_getmgtframe(uint8_t **frm, int headroom, int pktlen) 404138568Ssam{ 405138568Ssam struct mbuf *m; 406138568Ssam u_int len; 407138568Ssam 408138568Ssam /* 409138568Ssam * NB: we know the mbuf routines will align the data area 410138568Ssam * so we don't need to do anything special. 411138568Ssam */ 412170530Ssam len = roundup2(headroom + pktlen, 4); 413138568Ssam KASSERT(len <= MCLBYTES, ("802.11 mgt frame too large: %u", len)); 414138568Ssam if (len < MINCLSIZE) { 415151967Sandre m = m_gethdr(M_NOWAIT, MT_DATA); 416138568Ssam /* 417138568Ssam * Align the data in case additional headers are added. 418138568Ssam * This should only happen when a WEP header is added 419138568Ssam * which only happens for shared key authentication mgt 420138568Ssam * frames which all fit in MHLEN. 421138568Ssam */ 422138568Ssam if (m != NULL) 423276692Srwatson M_ALIGN(m, len); 424170530Ssam } else { 425151967Sandre m = m_getcl(M_NOWAIT, MT_DATA, M_PKTHDR); 426170530Ssam if (m != NULL) 427170530Ssam MC_ALIGN(m, len); 428170530Ssam } 429138568Ssam if (m != NULL) { 430171984Ssephe m->m_data += headroom; 431138568Ssam *frm = m->m_data; 432138568Ssam } 433138568Ssam return m; 434138568Ssam} 435138568Ssam 436246710Sglebius#ifndef __NO_STRICT_ALIGNMENT 437195757Ssam/* 438195757Ssam * Re-align the payload in the mbuf. This is mainly used (right now) 439195757Ssam * to handle IP header alignment requirements on certain architectures. 440195757Ssam */ 441195757Ssamstruct mbuf * 442195757Ssamieee80211_realign(struct ieee80211vap *vap, struct mbuf *m, size_t align) 443195757Ssam{ 444195757Ssam int pktlen, space; 445195757Ssam struct mbuf *n; 446195757Ssam 447195757Ssam pktlen = m->m_pkthdr.len; 448195757Ssam space = pktlen + align; 449195757Ssam if (space < MINCLSIZE) 450243882Sglebius n = m_gethdr(M_NOWAIT, MT_DATA); 451195757Ssam else { 452243882Sglebius n = m_getjcl(M_NOWAIT, MT_DATA, M_PKTHDR, 453195757Ssam space <= MCLBYTES ? MCLBYTES : 454195757Ssam#if MJUMPAGESIZE != MCLBYTES 455195757Ssam space <= MJUMPAGESIZE ? MJUMPAGESIZE : 456195757Ssam#endif 457195757Ssam space <= MJUM9BYTES ? MJUM9BYTES : MJUM16BYTES); 458195757Ssam } 459195757Ssam if (__predict_true(n != NULL)) { 460195757Ssam m_move_pkthdr(n, m); 461195757Ssam n->m_data = (caddr_t)(ALIGN(n->m_data + align) - align); 462195757Ssam m_copydata(m, 0, pktlen, mtod(n, caddr_t)); 463195757Ssam n->m_len = pktlen; 464195757Ssam } else { 465195757Ssam IEEE80211_DISCARD(vap, IEEE80211_MSG_ANY, 466195757Ssam mtod(m, const struct ieee80211_frame *), NULL, 467195757Ssam "%s", "no mbuf to realign"); 468195757Ssam vap->iv_stats.is_rx_badalign++; 469195757Ssam } 470195757Ssam m_freem(m); 471195757Ssam return n; 472195757Ssam} 473246710Sglebius#endif /* !__NO_STRICT_ALIGNMENT */ 474195757Ssam 475170530Ssamint 476170530Ssamieee80211_add_callback(struct mbuf *m, 477170530Ssam void (*func)(struct ieee80211_node *, void *, int), void *arg) 478170530Ssam{ 479170530Ssam struct m_tag *mtag; 480170530Ssam struct ieee80211_cb *cb; 481170530Ssam 482170530Ssam mtag = m_tag_alloc(MTAG_ABI_NET80211, NET80211_TAG_CALLBACK, 483170530Ssam sizeof(struct ieee80211_cb), M_NOWAIT); 484170530Ssam if (mtag == NULL) 485170530Ssam return 0; 486170530Ssam 487170530Ssam cb = (struct ieee80211_cb *)(mtag+1); 488170530Ssam cb->func = func; 489170530Ssam cb->arg = arg; 490170530Ssam m_tag_prepend(m, mtag); 491170530Ssam m->m_flags |= M_TXCB; 492170530Ssam return 1; 493170530Ssam} 494170530Ssam 495170530Ssamvoid 496170530Ssamieee80211_process_callback(struct ieee80211_node *ni, 497170530Ssam struct mbuf *m, int status) 498170530Ssam{ 499170530Ssam struct m_tag *mtag; 500170530Ssam 501170530Ssam mtag = m_tag_locate(m, MTAG_ABI_NET80211, NET80211_TAG_CALLBACK, NULL); 502170530Ssam if (mtag != NULL) { 503170530Ssam struct ieee80211_cb *cb = (struct ieee80211_cb *)(mtag+1); 504170530Ssam cb->func(ni, cb->arg, status); 505170530Ssam } 506170530Ssam} 507170530Ssam 508248069Sadrian/* 509248069Sadrian * Transmit a frame to the parent interface. 510248069Sadrian * 511248069Sadrian * TODO: if the transmission fails, make sure the parent node is freed 512248069Sadrian * (the callers will first need modifying.) 513248069Sadrian */ 514248069Sadrianint 515254082Sadrianieee80211_parent_xmitpkt(struct ieee80211com *ic, 516248069Sadrian struct mbuf *m) 517248069Sadrian{ 518248069Sadrian struct ifnet *parent = ic->ic_ifp; 519248069Sadrian /* 520248069Sadrian * Assert the IC TX lock is held - this enforces the 521248069Sadrian * processing -> queuing order is maintained 522248069Sadrian */ 523248069Sadrian IEEE80211_TX_LOCK_ASSERT(ic); 524248069Sadrian 525248069Sadrian return (parent->if_transmit(parent, m)); 526248069Sadrian} 527248069Sadrian 528248069Sadrian/* 529248069Sadrian * Transmit a frame to the VAP interface. 530248069Sadrian */ 531248069Sadrianint 532254082Sadrianieee80211_vap_xmitpkt(struct ieee80211vap *vap, struct mbuf *m) 533248069Sadrian{ 534248069Sadrian struct ifnet *ifp = vap->iv_ifp; 535248069Sadrian 536248069Sadrian /* 537248069Sadrian * When transmitting via the VAP, we shouldn't hold 538248069Sadrian * any IC TX lock as the VAP TX path will acquire it. 539248069Sadrian */ 540248069Sadrian IEEE80211_TX_UNLOCK_ASSERT(vap->iv_ic); 541248069Sadrian 542248069Sadrian return (ifp->if_transmit(ifp, m)); 543248069Sadrian 544248069Sadrian} 545248069Sadrian 546138568Ssam#include <sys/libkern.h> 547138568Ssam 548138568Ssamvoid 549138568Ssamget_random_bytes(void *p, size_t n) 550138568Ssam{ 551170530Ssam uint8_t *dp = p; 552138568Ssam 553138568Ssam while (n > 0) { 554170530Ssam uint32_t v = arc4random(); 555170530Ssam size_t nb = n > sizeof(uint32_t) ? sizeof(uint32_t) : n; 556170530Ssam bcopy(&v, dp, n > sizeof(uint32_t) ? sizeof(uint32_t) : n); 557170530Ssam dp += sizeof(uint32_t), n -= nb; 558138568Ssam } 559138568Ssam} 560138568Ssam 561178354Ssam/* 562178354Ssam * Helper function for events that pass just a single mac address. 563178354Ssam */ 564178354Ssamstatic void 565178354Ssamnotify_macaddr(struct ifnet *ifp, int op, const uint8_t mac[IEEE80211_ADDR_LEN]) 566138568Ssam{ 567138568Ssam struct ieee80211_join_event iev; 568138568Ssam 569191816Szec CURVNET_SET(ifp->if_vnet); 570144302Ssam memset(&iev, 0, sizeof(iev)); 571178354Ssam IEEE80211_ADDR_COPY(iev.iev_addr, mac); 572178354Ssam rt_ieee80211msg(ifp, op, &iev, sizeof(iev)); 573191816Szec CURVNET_RESTORE(); 574178354Ssam} 575178354Ssam 576178354Ssamvoid 577178354Ssamieee80211_notify_node_join(struct ieee80211_node *ni, int newassoc) 578178354Ssam{ 579178354Ssam struct ieee80211vap *vap = ni->ni_vap; 580178354Ssam struct ifnet *ifp = vap->iv_ifp; 581178354Ssam 582191816Szec CURVNET_SET_QUIET(ifp->if_vnet); 583178354Ssam IEEE80211_NOTE(vap, IEEE80211_MSG_NODE, ni, "%snode join", 584178354Ssam (ni == vap->iv_bss) ? "bss " : ""); 585178354Ssam 586178354Ssam if (ni == vap->iv_bss) { 587178354Ssam notify_macaddr(ifp, newassoc ? 588178354Ssam RTM_IEEE80211_ASSOC : RTM_IEEE80211_REASSOC, ni->ni_bssid); 589138568Ssam if_link_state_change(ifp, LINK_STATE_UP); 590144302Ssam } else { 591178354Ssam notify_macaddr(ifp, newassoc ? 592178354Ssam RTM_IEEE80211_JOIN : RTM_IEEE80211_REJOIN, ni->ni_macaddr); 593138568Ssam } 594191816Szec CURVNET_RESTORE(); 595138568Ssam} 596138568Ssam 597138568Ssamvoid 598178354Ssamieee80211_notify_node_leave(struct ieee80211_node *ni) 599138568Ssam{ 600178354Ssam struct ieee80211vap *vap = ni->ni_vap; 601178354Ssam struct ifnet *ifp = vap->iv_ifp; 602138568Ssam 603191816Szec CURVNET_SET_QUIET(ifp->if_vnet); 604178354Ssam IEEE80211_NOTE(vap, IEEE80211_MSG_NODE, ni, "%snode leave", 605178354Ssam (ni == vap->iv_bss) ? "bss " : ""); 606178354Ssam 607178354Ssam if (ni == vap->iv_bss) { 608138568Ssam rt_ieee80211msg(ifp, RTM_IEEE80211_DISASSOC, NULL, 0); 609138568Ssam if_link_state_change(ifp, LINK_STATE_DOWN); 610138568Ssam } else { 611138568Ssam /* fire off wireless event station leaving */ 612178354Ssam notify_macaddr(ifp, RTM_IEEE80211_LEAVE, ni->ni_macaddr); 613138568Ssam } 614191816Szec CURVNET_RESTORE(); 615138568Ssam} 616138568Ssam 617138568Ssamvoid 618178354Ssamieee80211_notify_scan_done(struct ieee80211vap *vap) 619138568Ssam{ 620178354Ssam struct ifnet *ifp = vap->iv_ifp; 621138568Ssam 622178354Ssam IEEE80211_DPRINTF(vap, IEEE80211_MSG_SCAN, "%s\n", "notify scan done"); 623138568Ssam 624138568Ssam /* dispatch wireless event indicating scan completed */ 625191816Szec CURVNET_SET(ifp->if_vnet); 626138568Ssam rt_ieee80211msg(ifp, RTM_IEEE80211_SCAN, NULL, 0); 627191816Szec CURVNET_RESTORE(); 628138568Ssam} 629138568Ssam 630138568Ssamvoid 631178354Ssamieee80211_notify_replay_failure(struct ieee80211vap *vap, 632138568Ssam const struct ieee80211_frame *wh, const struct ieee80211_key *k, 633193541Ssam u_int64_t rsc, int tid) 634138568Ssam{ 635178354Ssam struct ifnet *ifp = vap->iv_ifp; 636138568Ssam 637178354Ssam IEEE80211_NOTE_MAC(vap, IEEE80211_MSG_CRYPTO, wh->i_addr2, 638226885Sadrian "%s replay detected tid %d <rsc %ju, csc %ju, keyix %u rxkeyix %u>", 639233531Sadrian k->wk_cipher->ic_name, tid, (intmax_t) rsc, 640193541Ssam (intmax_t) k->wk_keyrsc[tid], 641148863Ssam k->wk_keyix, k->wk_rxkeyix); 642138568Ssam 643138568Ssam if (ifp != NULL) { /* NB: for cipher test modules */ 644138568Ssam struct ieee80211_replay_event iev; 645138568Ssam 646138568Ssam IEEE80211_ADDR_COPY(iev.iev_dst, wh->i_addr1); 647138568Ssam IEEE80211_ADDR_COPY(iev.iev_src, wh->i_addr2); 648138568Ssam iev.iev_cipher = k->wk_cipher->ic_cipher; 649148863Ssam if (k->wk_rxkeyix != IEEE80211_KEYIX_NONE) 650148863Ssam iev.iev_keyix = k->wk_rxkeyix; 651148863Ssam else 652148863Ssam iev.iev_keyix = k->wk_keyix; 653193541Ssam iev.iev_keyrsc = k->wk_keyrsc[tid]; 654138568Ssam iev.iev_rsc = rsc; 655191816Szec CURVNET_SET(ifp->if_vnet); 656138568Ssam rt_ieee80211msg(ifp, RTM_IEEE80211_REPLAY, &iev, sizeof(iev)); 657191816Szec CURVNET_RESTORE(); 658138568Ssam } 659138568Ssam} 660138568Ssam 661138568Ssamvoid 662178354Ssamieee80211_notify_michael_failure(struct ieee80211vap *vap, 663138568Ssam const struct ieee80211_frame *wh, u_int keyix) 664138568Ssam{ 665178354Ssam struct ifnet *ifp = vap->iv_ifp; 666138568Ssam 667178354Ssam IEEE80211_NOTE_MAC(vap, IEEE80211_MSG_CRYPTO, wh->i_addr2, 668178354Ssam "michael MIC verification failed <keyix %u>", keyix); 669178354Ssam vap->iv_stats.is_rx_tkipmic++; 670138568Ssam 671138568Ssam if (ifp != NULL) { /* NB: for cipher test modules */ 672138568Ssam struct ieee80211_michael_event iev; 673138568Ssam 674138568Ssam IEEE80211_ADDR_COPY(iev.iev_dst, wh->i_addr1); 675138568Ssam IEEE80211_ADDR_COPY(iev.iev_src, wh->i_addr2); 676138568Ssam iev.iev_cipher = IEEE80211_CIPHER_TKIP; 677138568Ssam iev.iev_keyix = keyix; 678191816Szec CURVNET_SET(ifp->if_vnet); 679138568Ssam rt_ieee80211msg(ifp, RTM_IEEE80211_MICHAEL, &iev, sizeof(iev)); 680191816Szec CURVNET_RESTORE(); 681138568Ssam } 682138568Ssam} 683138568Ssam 684138568Ssamvoid 685178354Ssamieee80211_notify_wds_discover(struct ieee80211_node *ni) 686178354Ssam{ 687178354Ssam struct ieee80211vap *vap = ni->ni_vap; 688178354Ssam struct ifnet *ifp = vap->iv_ifp; 689178354Ssam 690178354Ssam notify_macaddr(ifp, RTM_IEEE80211_WDS, ni->ni_macaddr); 691178354Ssam} 692178354Ssam 693178354Ssamvoid 694178354Ssamieee80211_notify_csa(struct ieee80211com *ic, 695178354Ssam const struct ieee80211_channel *c, int mode, int count) 696178354Ssam{ 697178354Ssam struct ifnet *ifp = ic->ic_ifp; 698178354Ssam struct ieee80211_csa_event iev; 699178354Ssam 700178354Ssam memset(&iev, 0, sizeof(iev)); 701178354Ssam iev.iev_flags = c->ic_flags; 702178354Ssam iev.iev_freq = c->ic_freq; 703178354Ssam iev.iev_ieee = c->ic_ieee; 704178354Ssam iev.iev_mode = mode; 705178354Ssam iev.iev_count = count; 706248539Sadrian CURVNET_SET(ifp->if_vnet); 707178354Ssam rt_ieee80211msg(ifp, RTM_IEEE80211_CSA, &iev, sizeof(iev)); 708248539Sadrian CURVNET_RESTORE(); 709178354Ssam} 710178354Ssam 711178354Ssamvoid 712178354Ssamieee80211_notify_radar(struct ieee80211com *ic, 713178354Ssam const struct ieee80211_channel *c) 714178354Ssam{ 715178354Ssam struct ifnet *ifp = ic->ic_ifp; 716178354Ssam struct ieee80211_radar_event iev; 717178354Ssam 718178354Ssam memset(&iev, 0, sizeof(iev)); 719178354Ssam iev.iev_flags = c->ic_flags; 720178354Ssam iev.iev_freq = c->ic_freq; 721178354Ssam iev.iev_ieee = c->ic_ieee; 722248539Sadrian CURVNET_SET(ifp->if_vnet); 723178354Ssam rt_ieee80211msg(ifp, RTM_IEEE80211_RADAR, &iev, sizeof(iev)); 724248539Sadrian CURVNET_RESTORE(); 725178354Ssam} 726178354Ssam 727178354Ssamvoid 728178354Ssamieee80211_notify_cac(struct ieee80211com *ic, 729178354Ssam const struct ieee80211_channel *c, enum ieee80211_notify_cac_event type) 730178354Ssam{ 731178354Ssam struct ifnet *ifp = ic->ic_ifp; 732178354Ssam struct ieee80211_cac_event iev; 733178354Ssam 734178354Ssam memset(&iev, 0, sizeof(iev)); 735178354Ssam iev.iev_flags = c->ic_flags; 736178354Ssam iev.iev_freq = c->ic_freq; 737178354Ssam iev.iev_ieee = c->ic_ieee; 738178354Ssam iev.iev_type = type; 739248539Sadrian CURVNET_SET(ifp->if_vnet); 740178354Ssam rt_ieee80211msg(ifp, RTM_IEEE80211_CAC, &iev, sizeof(iev)); 741248539Sadrian CURVNET_RESTORE(); 742178354Ssam} 743178354Ssam 744178354Ssamvoid 745178354Ssamieee80211_notify_node_deauth(struct ieee80211_node *ni) 746178354Ssam{ 747178354Ssam struct ieee80211vap *vap = ni->ni_vap; 748178354Ssam struct ifnet *ifp = vap->iv_ifp; 749178354Ssam 750178354Ssam IEEE80211_NOTE(vap, IEEE80211_MSG_NODE, ni, "%s", "node deauth"); 751178354Ssam 752178354Ssam notify_macaddr(ifp, RTM_IEEE80211_DEAUTH, ni->ni_macaddr); 753178354Ssam} 754178354Ssam 755178354Ssamvoid 756178354Ssamieee80211_notify_node_auth(struct ieee80211_node *ni) 757178354Ssam{ 758178354Ssam struct ieee80211vap *vap = ni->ni_vap; 759178354Ssam struct ifnet *ifp = vap->iv_ifp; 760178354Ssam 761178354Ssam IEEE80211_NOTE(vap, IEEE80211_MSG_NODE, ni, "%s", "node auth"); 762178354Ssam 763178354Ssam notify_macaddr(ifp, RTM_IEEE80211_AUTH, ni->ni_macaddr); 764178354Ssam} 765178354Ssam 766178354Ssamvoid 767178354Ssamieee80211_notify_country(struct ieee80211vap *vap, 768178354Ssam const uint8_t bssid[IEEE80211_ADDR_LEN], const uint8_t cc[2]) 769178354Ssam{ 770178354Ssam struct ifnet *ifp = vap->iv_ifp; 771178354Ssam struct ieee80211_country_event iev; 772178354Ssam 773178354Ssam memset(&iev, 0, sizeof(iev)); 774178354Ssam IEEE80211_ADDR_COPY(iev.iev_addr, bssid); 775178354Ssam iev.iev_cc[0] = cc[0]; 776178354Ssam iev.iev_cc[1] = cc[1]; 777248539Sadrian CURVNET_SET(ifp->if_vnet); 778178354Ssam rt_ieee80211msg(ifp, RTM_IEEE80211_COUNTRY, &iev, sizeof(iev)); 779248539Sadrian CURVNET_RESTORE(); 780178354Ssam} 781178354Ssam 782178354Ssamvoid 783178354Ssamieee80211_notify_radio(struct ieee80211com *ic, int state) 784178354Ssam{ 785178354Ssam struct ifnet *ifp = ic->ic_ifp; 786178354Ssam struct ieee80211_radio_event iev; 787178354Ssam 788178354Ssam memset(&iev, 0, sizeof(iev)); 789178354Ssam iev.iev_state = state; 790248539Sadrian CURVNET_SET(ifp->if_vnet); 791178354Ssam rt_ieee80211msg(ifp, RTM_IEEE80211_RADIO, &iev, sizeof(iev)); 792248539Sadrian CURVNET_RESTORE(); 793178354Ssam} 794178354Ssam 795178354Ssamvoid 796138568Ssamieee80211_load_module(const char *modname) 797138568Ssam{ 798159590Sjhb 799138777Ssam#ifdef notyet 800159590Sjhb (void)kern_kldload(curthread, modname, NULL); 801138777Ssam#else 802138777Ssam printf("%s: load the %s module by hand for now.\n", __func__, modname); 803138777Ssam#endif 804138568Ssam} 805138568Ssam 806192468Ssamstatic eventhandler_tag wlan_bpfevent; 807202612Sthompsastatic eventhandler_tag wlan_ifllevent; 808192468Ssam 809192468Ssamstatic void 810192764Ssambpf_track(void *arg, struct ifnet *ifp, int dlt, int attach) 811192468Ssam{ 812256294Sadrian /* NB: identify vap's by if_init */ 813254082Sadrian if (dlt == DLT_IEEE802_11_RADIO && 814256294Sadrian ifp->if_init == ieee80211_init) { 815192468Ssam struct ieee80211vap *vap = ifp->if_softc; 816192468Ssam /* 817192468Ssam * Track bpf radiotap listener state. We mark the vap 818192468Ssam * to indicate if any listener is present and the com 819192468Ssam * to indicate if any listener exists on any associated 820192468Ssam * vap. This flag is used by drivers to prepare radiotap 821192468Ssam * state only when needed. 822192468Ssam */ 823193292Ssam if (attach) { 824192468Ssam ieee80211_syncflag_ext(vap, IEEE80211_FEXT_BPF); 825193292Ssam if (vap->iv_opmode == IEEE80211_M_MONITOR) 826193292Ssam atomic_add_int(&vap->iv_ic->ic_montaps, 1); 827193312Ssam } else if (!bpf_peers_present(vap->iv_rawbpf)) { 828192468Ssam ieee80211_syncflag_ext(vap, -IEEE80211_FEXT_BPF); 829193292Ssam if (vap->iv_opmode == IEEE80211_M_MONITOR) 830193292Ssam atomic_subtract_int(&vap->iv_ic->ic_montaps, 1); 831193292Ssam } 832192468Ssam } 833192468Ssam} 834192468Ssam 835202612Sthompsastatic void 836202612Sthompsawlan_iflladdr(void *arg __unused, struct ifnet *ifp) 837202612Sthompsa{ 838202612Sthompsa struct ieee80211com *ic = ifp->if_l2com; 839202612Sthompsa struct ieee80211vap *vap, *next; 840202612Sthompsa 841202612Sthompsa if (ifp->if_type != IFT_IEEE80211 || ic == NULL) 842202612Sthompsa return; 843202612Sthompsa 844202612Sthompsa IEEE80211_LOCK(ic); 845202612Sthompsa TAILQ_FOREACH_SAFE(vap, &ic->ic_vaps, iv_next, next) { 846202612Sthompsa /* 847202612Sthompsa * If the MAC address has changed on the parent and it was 848202612Sthompsa * copied to the vap on creation then re-sync. 849202612Sthompsa */ 850202612Sthompsa if (vap->iv_ic == ic && 851202612Sthompsa (vap->iv_flags_ext & IEEE80211_FEXT_UNIQMAC) == 0) { 852202612Sthompsa IEEE80211_ADDR_COPY(vap->iv_myaddr, IF_LLADDR(ifp)); 853202612Sthompsa IEEE80211_UNLOCK(ic); 854202612Sthompsa if_setlladdr(vap->iv_ifp, IF_LLADDR(ifp), 855202612Sthompsa IEEE80211_ADDR_LEN); 856202612Sthompsa IEEE80211_LOCK(ic); 857202612Sthompsa } 858202612Sthompsa } 859202612Sthompsa IEEE80211_UNLOCK(ic); 860202612Sthompsa} 861202612Sthompsa 862138568Ssam/* 863138568Ssam * Module glue. 864138568Ssam * 865138568Ssam * NB: the module name is "wlan" for compatibility with NetBSD. 866138568Ssam */ 867138568Ssamstatic int 868138568Ssamwlan_modevent(module_t mod, int type, void *unused) 869138568Ssam{ 870138568Ssam switch (type) { 871138568Ssam case MOD_LOAD: 872138568Ssam if (bootverbose) 873138568Ssam printf("wlan: <802.11 Link Layer>\n"); 874192468Ssam wlan_bpfevent = EVENTHANDLER_REGISTER(bpf_track, 875192468Ssam bpf_track, 0, EVENTHANDLER_PRI_ANY); 876202612Sthompsa wlan_ifllevent = EVENTHANDLER_REGISTER(iflladdr_event, 877202612Sthompsa wlan_iflladdr, NULL, EVENTHANDLER_PRI_ANY); 878242154Sadrian#if __FreeBSD_version >= 1000020 879241610Sglebius wlan_cloner = if_clone_simple(wlanname, wlan_clone_create, 880241610Sglebius wlan_clone_destroy, 0); 881242154Sadrian#else 882242154Sadrian if_clone_attach(&wlan_cloner); 883242154Sadrian#endif 884178354Ssam if_register_com_alloc(IFT_IEEE80211, wlan_alloc, wlan_free); 885138568Ssam return 0; 886138568Ssam case MOD_UNLOAD: 887178354Ssam if_deregister_com_alloc(IFT_IEEE80211); 888242154Sadrian#if __FreeBSD_version >= 1000020 889241610Sglebius if_clone_detach(wlan_cloner); 890242154Sadrian#else 891242154Sadrian if_clone_detach(&wlan_cloner); 892242154Sadrian#endif 893192468Ssam EVENTHANDLER_DEREGISTER(bpf_track, wlan_bpfevent); 894202612Sthompsa EVENTHANDLER_DEREGISTER(iflladdr_event, wlan_ifllevent); 895138568Ssam return 0; 896138568Ssam } 897138568Ssam return EINVAL; 898138568Ssam} 899138568Ssam 900138568Ssamstatic moduledata_t wlan_mod = { 901242154Sadrian#if __FreeBSD_version >= 1000020 902241610Sglebius wlanname, 903242154Sadrian#else 904242154Sadrian "wlan", 905242154Sadrian#endif 906138568Ssam wlan_modevent, 907241394Skevlo 0 908138568Ssam}; 909138568SsamDECLARE_MODULE(wlan, wlan_mod, SI_SUB_DRIVERS, SI_ORDER_FIRST); 910138568SsamMODULE_VERSION(wlan, 1); 911138568SsamMODULE_DEPEND(wlan, ether, 1, 1, 1); 912233050Sadrian#ifdef IEEE80211_ALQ 913233050SadrianMODULE_DEPEND(wlan, alq, 1, 1, 1); 914233050Sadrian#endif /* IEEE80211_ALQ */ 915233050Sadrian 916