2 * Copyright (c) 2003-2009 Sam Leffler, Errno Consulting
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
15 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
16 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
17 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
18 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
19 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
20 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
21 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
22 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
23 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
25 * $FreeBSD: head/sys/net80211/ieee80211_freebsd.c 202612 2010-01-19 05:00:57Z thompsa $
29 * IEEE 802.11 support (DragonFlyBSD-specific code)
33 #include <sys/param.h>
34 #include <sys/kernel.h>
35 #include <sys/systm.h>
36 #include <sys/linker.h>
38 #include <sys/module.h>
40 #include <sys/sysctl.h>
42 #include <sys/socket.h>
46 #include <net/if_dl.h>
47 #include <net/if_clone.h>
48 #include <net/if_media.h>
49 #include <net/if_types.h>
50 #include <net/ethernet.h>
51 #include <net/route.h>
52 #include <net/ifq_var.h>
54 #include <netproto/802_11/ieee80211_var.h>
55 #include <netproto/802_11/ieee80211_input.h>
57 SYSCTL_NODE(_net, OID_AUTO, wlan, CTLFLAG_RD, 0, "IEEE 80211 parameters");
59 #ifdef IEEE80211_DEBUG
60 int ieee80211_debug = 0;
61 SYSCTL_INT(_net_wlan, OID_AUTO, debug, CTLFLAG_RW, &ieee80211_debug,
62 0, "debugging printfs");
65 int ieee80211_force_swcrypto = 0;
66 SYSCTL_INT(_net_wlan, OID_AUTO, force_swcrypto, CTLFLAG_RW,
67 &ieee80211_force_swcrypto, 0, "force software crypto");
69 MALLOC_DEFINE(M_80211_COM, "80211com", "802.11 com state");
72 static int wlan_clone_destroy(struct ifnet *);
73 static int wlan_clone_create(struct if_clone *, int, caddr_t);
75 static struct if_clone wlan_cloner =
76 IF_CLONE_INITIALIZER("wlan", wlan_clone_create, wlan_clone_destroy,
79 struct lwkt_serialize wlan_global_serializer = LWKT_SERIALIZE_INITIALIZER;
82 * Allocate/free com structure in conjunction with ifnet;
83 * these routines are registered with if_register_com_alloc
84 * below and are called automatically by the ifnet code
85 * when the ifnet of the parent device is created.
88 wlan_alloc(u_char type, struct ifnet *ifp)
90 struct ieee80211com *ic;
92 ic = kmalloc(sizeof(struct ieee80211com), M_80211_COM, M_WAITOK|M_ZERO);
99 wlan_free(void *ic, u_char type)
101 kfree(ic, M_80211_COM);
105 wlan_clone_create(struct if_clone *ifc, int unit, caddr_t params)
107 struct ieee80211_clone_params cp;
108 struct ieee80211vap *vap;
109 struct ieee80211com *ic;
113 error = copyin(params, &cp, sizeof(cp));
119 ifp = ifunit(cp.icp_parent);
124 /* XXX move printfs to DIAGNOSTIC before release */
125 if (ifp->if_type != IFT_IEEE80211) {
126 if_printf(ifp, "%s: reject, not an 802.11 device\n", __func__);
130 if (cp.icp_opmode >= IEEE80211_OPMODE_MAX) {
131 if_printf(ifp, "%s: invalid opmode %d\n",
132 __func__, cp.icp_opmode);
137 if ((ic->ic_caps & ieee80211_opcap[cp.icp_opmode]) == 0) {
138 if_printf(ifp, "%s mode not supported\n",
139 ieee80211_opmode_name[cp.icp_opmode]);
143 if ((cp.icp_flags & IEEE80211_CLONE_TDMA) &&
144 #ifdef IEEE80211_SUPPORT_TDMA
145 (ic->ic_caps & IEEE80211_C_TDMA) == 0
150 if_printf(ifp, "TDMA not supported\n");
154 vap = ic->ic_vap_create(ic, ifc->ifc_name, unit,
155 cp.icp_opmode, cp.icp_flags, cp.icp_bssid,
156 cp.icp_flags & IEEE80211_CLONE_MACADDR ?
157 cp.icp_macaddr : (const uint8_t *)IF_LLADDR(ifp));
161 return (vap == NULL ? EIO : 0);
165 wlan_clone_destroy(struct ifnet *ifp)
167 struct ieee80211vap *vap = ifp->if_softc;
168 struct ieee80211com *ic = vap->iv_ic;
170 ic->ic_vap_delete(vap);
175 const char *wlan_last_enter_func;
176 const char *wlan_last_exit_func;
179 * These serializer functions are used by wlan and all drivers.
180 * They are not recursive. The serializer must be held on
181 * any OACTIVE interactions. Dragonfly automatically holds
182 * the serializer on most ifp->if_*() calls but calls made
183 * from wlan into ath might not.
186 _wlan_serialize_enter(const char *funcname)
188 lwkt_serialize_enter(&wlan_global_serializer);
189 wlan_last_enter_func = funcname;
193 _wlan_serialize_exit(const char *funcname)
195 lwkt_serialize_exit(&wlan_global_serializer);
196 wlan_last_exit_func = funcname;
200 _wlan_is_serialized(void)
202 return (IS_SERIALIZED(&wlan_global_serializer));
206 * Push/pop allows the wlan serializer to be entered recursively.
209 _wlan_serialize_push(const char *funcname)
211 if (IS_SERIALIZED(&wlan_global_serializer)) {
214 _wlan_serialize_enter(funcname);
220 _wlan_serialize_pop(const char *funcname, int wst)
223 _wlan_serialize_exit(funcname);
230 wlan_serialize_sleep(void *ident, int flags, const char *wmesg, int timo)
232 return(zsleep(ident, &wlan_global_serializer, flags, wmesg, timo));
236 * condition-var functions which interlock the ic lock (which is now
237 * just wlan_global_serializer)
240 wlan_cv_init(struct cv *cv, const char *desc)
247 wlan_cv_timedwait(struct cv *cv, int ticks)
252 error = wlan_serialize_sleep(cv, 0, cv->cv_desc, ticks);
257 wlan_cv_wait(struct cv *cv)
260 wlan_serialize_sleep(cv, 0, cv->cv_desc, 0);
264 wlan_cv_signal(struct cv *cv, int broadcast)
266 if (cv->cv_waiters) {
283 ieee80211_vap_xmitpkt(struct ieee80211vap *vap, struct mbuf *m)
285 struct ifnet *ifp = vap->iv_ifp;
286 struct ifaltq_subque *ifsq = ifq_get_subq_default(&ifp->if_snd);
291 * When transmitting via the VAP, we shouldn't hold
292 * any IC TX lock as the VAP TX path will acquire it.
294 IEEE80211_TX_UNLOCK_ASSERT(vap->iv_ic);
296 error = ifsq_enqueue(ifsq, m, NULL);
297 wst = wlan_serialize_push();
298 ifp->if_start(ifp, ifsq);
299 wlan_serialize_pop(wst);
305 ieee80211_parent_xmitpkt(struct ieee80211com *ic, struct mbuf *m)
307 struct ifnet *parent = ic->ic_ifp;
308 struct ifaltq_subque *ifsq = ifq_get_subq_default(&parent->if_snd);
313 * Assert the IC TX lock is held - this enforces the
314 * processing -> queuing order is maintained
316 IEEE80211_TX_LOCK_ASSERT(ic);
318 error = ifsq_enqueue(ifsq, m, NULL);
319 wst = wlan_serialize_push();
320 parent->if_start(parent, ifsq);
321 wlan_serialize_pop(wst);
327 ieee80211_vap_destroy(struct ieee80211vap *vap)
330 * WLAN serializer must _not_ be held for if_clone_destroy(),
331 * since it could dead-lock the domsg to netisrs.
333 wlan_serialize_exit();
334 if_clone_destroy(vap->iv_ifp->if_xname);
335 wlan_serialize_enter();
339 * NOTE: This handler is used generally to convert milliseconds
340 * to ticks for various simple sysctl variables and does not
341 * need to be serialized.
344 ieee80211_sysctl_msecs_ticks(SYSCTL_HANDLER_ARGS)
346 int msecs = ticks_to_msecs(*(int *)arg1);
349 error = sysctl_handle_int(oidp, &msecs, 0, req);
350 if (error == 0 && req->newptr) {
351 t = msecs_to_ticks(msecs);
352 *(int *)arg1 = (t < 1) ? 1 : t;
359 ieee80211_sysctl_inact(SYSCTL_HANDLER_ARGS)
361 int inact = (*(int *)arg1) * IEEE80211_INACT_WAIT;
364 error = sysctl_handle_int(oidp, &inact, 0, req);
365 if (error == 0 && req->newptr)
366 *(int *)arg1 = inact / IEEE80211_INACT_WAIT;
372 ieee80211_sysctl_parent(SYSCTL_HANDLER_ARGS)
374 struct ieee80211com *ic = arg1;
375 const char *name = ic->ic_ifp->if_xname;
377 return SYSCTL_OUT(req, name, strlen(name));
381 ieee80211_sysctl_radar(SYSCTL_HANDLER_ARGS)
383 struct ieee80211com *ic = arg1;
386 error = sysctl_handle_int(oidp, &t, 0, req);
387 if (error == 0 && req->newptr)
388 ieee80211_dfs_notify_radar(ic, ic->ic_curchan);
394 ieee80211_sysctl_attach(struct ieee80211com *ic)
399 ieee80211_sysctl_detach(struct ieee80211com *ic)
404 ieee80211_sysctl_vattach(struct ieee80211vap *vap)
406 struct ifnet *ifp = vap->iv_ifp;
407 struct sysctl_ctx_list *ctx;
408 struct sysctl_oid *oid;
409 char num[14]; /* sufficient for 32 bits */
411 ctx = (struct sysctl_ctx_list *) kmalloc(sizeof(struct sysctl_ctx_list),
412 M_DEVBUF, M_INTWAIT | M_ZERO);
414 if_printf(ifp, "%s: cannot allocate sysctl context!\n",
418 sysctl_ctx_init(ctx);
419 ksnprintf(num, sizeof(num), "%u", ifp->if_dunit);
420 oid = SYSCTL_ADD_NODE(ctx, &SYSCTL_NODE_CHILDREN(_net, wlan),
421 OID_AUTO, num, CTLFLAG_RD, NULL, "");
422 SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
423 "%parent", CTLFLAG_RD, vap->iv_ic, 0,
424 ieee80211_sysctl_parent, "A", "parent device");
425 SYSCTL_ADD_INT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
426 "driver_caps", CTLFLAG_RW, &vap->iv_caps, 0,
427 "driver capabilities");
428 #ifdef IEEE80211_DEBUG
429 vap->iv_debug = ieee80211_debug;
430 SYSCTL_ADD_INT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
431 "debug", CTLFLAG_RW, &vap->iv_debug, 0,
432 "control debugging printfs");
434 SYSCTL_ADD_INT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
435 "bmiss_max", CTLFLAG_RW, &vap->iv_bmiss_max, 0,
436 "consecutive beacon misses before scanning");
437 /* XXX inherit from tunables */
438 SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
439 "inact_run", CTLTYPE_INT | CTLFLAG_RW, &vap->iv_inact_run, 0,
440 ieee80211_sysctl_inact, "I",
441 "station inactivity timeout (sec)");
442 SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
443 "inact_probe", CTLTYPE_INT | CTLFLAG_RW, &vap->iv_inact_probe, 0,
444 ieee80211_sysctl_inact, "I",
445 "station inactivity probe timeout (sec)");
446 SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
447 "inact_auth", CTLTYPE_INT | CTLFLAG_RW, &vap->iv_inact_auth, 0,
448 ieee80211_sysctl_inact, "I",
449 "station authentication timeout (sec)");
450 SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
451 "inact_init", CTLTYPE_INT | CTLFLAG_RW, &vap->iv_inact_init, 0,
452 ieee80211_sysctl_inact, "I",
453 "station initial state timeout (sec)");
454 if (vap->iv_htcaps & IEEE80211_HTC_HT) {
455 SYSCTL_ADD_INT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
456 "ampdu_mintraffic_bk", CTLFLAG_RW,
457 &vap->iv_ampdu_mintraffic[WME_AC_BK], 0,
458 "BK traffic tx aggr threshold (pps)");
459 SYSCTL_ADD_INT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
460 "ampdu_mintraffic_be", CTLFLAG_RW,
461 &vap->iv_ampdu_mintraffic[WME_AC_BE], 0,
462 "BE traffic tx aggr threshold (pps)");
463 SYSCTL_ADD_INT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
464 "ampdu_mintraffic_vo", CTLFLAG_RW,
465 &vap->iv_ampdu_mintraffic[WME_AC_VO], 0,
466 "VO traffic tx aggr threshold (pps)");
467 SYSCTL_ADD_INT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
468 "ampdu_mintraffic_vi", CTLFLAG_RW,
469 &vap->iv_ampdu_mintraffic[WME_AC_VI], 0,
470 "VI traffic tx aggr threshold (pps)");
472 if (vap->iv_caps & IEEE80211_C_DFS) {
473 SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO,
474 "radar", CTLTYPE_INT | CTLFLAG_RW, vap->iv_ic, 0,
475 ieee80211_sysctl_radar, "I", "simulate radar event");
477 vap->iv_sysctl = ctx;
482 ieee80211_sysctl_vdetach(struct ieee80211vap *vap)
485 if (vap->iv_sysctl != NULL) {
486 sysctl_ctx_free(vap->iv_sysctl);
487 kfree(vap->iv_sysctl, M_DEVBUF);
488 vap->iv_sysctl = NULL;
493 ieee80211_node_dectestref(struct ieee80211_node *ni)
495 /* XXX need equivalent of atomic_dec_and_test */
496 atomic_subtract_int(&ni->ni_refcnt, 1);
497 return atomic_cmpset_int(&ni->ni_refcnt, 0, 1);
501 /* XXX this breaks ALTQ's packet scheduler */
503 ieee80211_flush_ifq(struct ifaltq *ifq, struct ieee80211vap *vap)
505 struct ieee80211_node *ni;
506 struct mbuf *m, **mprev;
507 struct ifaltq_subque *ifsq = ifq_get_subq_default(ifq);
509 wlan_assert_serialized();
516 mprev = &ifsq->ifsq_norm_head;
517 while ((m = *mprev) != NULL) {
518 ni = (struct ieee80211_node *)m->m_pkthdr.rcvif;
519 if (ni != NULL && ni->ni_vap == vap) {
520 *mprev = m->m_nextpkt; /* remove from list */
521 ALTQ_SQ_CNTR_DEC(ifsq, m->m_pkthdr.len);
524 ieee80211_free_node(ni); /* reclaim ref */
526 mprev = &m->m_nextpkt;
528 /* recalculate tail ptr */
529 m = ifsq->ifsq_norm_head;
530 for (; m != NULL && m->m_nextpkt != NULL; m = m->m_nextpkt)
532 ifsq->ifsq_norm_tail = m;
537 mprev = &ifsq->ifsq_prio_head;
538 while ((m = *mprev) != NULL) {
539 ni = (struct ieee80211_node *)m->m_pkthdr.rcvif;
540 if (ni != NULL && ni->ni_vap == vap) {
541 *mprev = m->m_nextpkt; /* remove from list */
542 ALTQ_SQ_CNTR_DEC(ifsq, m->m_pkthdr.len);
543 ALTQ_SQ_PRIO_CNTR_DEC(ifsq, m->m_pkthdr.len);
546 ieee80211_free_node(ni); /* reclaim ref */
548 mprev = &m->m_nextpkt;
550 /* recalculate tail ptr */
551 m = ifsq->ifsq_prio_head;
552 for (; m != NULL && m->m_nextpkt != NULL; m = m->m_nextpkt)
554 ifsq->ifsq_prio_tail = m;
556 ALTQ_SQ_UNLOCK(ifsq);
561 * As above, for mbufs allocated with m_gethdr/MGETHDR
562 * or initialized by M_COPY_PKTHDR.
564 #define MC_ALIGN(m, len) \
566 (m)->m_data += (MCLBYTES - (len)) &~ (sizeof(long) - 1); \
567 } while (/* CONSTCOND */ 0)
570 * Allocate and setup a management frame of the specified
571 * size. We return the mbuf and a pointer to the start
572 * of the contiguous data area that's been reserved based
573 * on the packet length. The data area is forced to 32-bit
574 * alignment and the buffer length to a multiple of 4 bytes.
575 * This is done mainly so beacon frames (that require this)
576 * can use this interface too.
579 ieee80211_getmgtframe(uint8_t **frm, int headroom, int pktlen)
585 * NB: we know the mbuf routines will align the data area
586 * so we don't need to do anything special.
588 len = roundup2(headroom + pktlen, 4);
589 KASSERT(len <= MCLBYTES, ("802.11 mgt frame too large: %u", len));
590 if (len < MINCLSIZE) {
591 m = m_gethdr(M_NOWAIT, MT_DATA);
593 * Align the data in case additional headers are added.
594 * This should only happen when a WEP header is added
595 * which only happens for shared key authentication mgt
596 * frames which all fit in MHLEN.
601 m = m_getcl(M_NOWAIT, MT_DATA, M_PKTHDR);
606 m->m_data += headroom;
613 * Re-align the payload in the mbuf. This is mainly used (right now)
614 * to handle IP header alignment requirements on certain architectures.
617 ieee80211_realign(struct ieee80211vap *vap, struct mbuf *m, size_t align)
620 struct mbuf *n = NULL;
622 pktlen = m->m_pkthdr.len;
623 space = pktlen + align;
624 if (space < MINCLSIZE) {
625 n = m_gethdr(M_NOWAIT, MT_DATA);
627 if (space <= MCLBYTES)
629 else if (space <= MJUMPAGESIZE)
630 space = MJUMPAGESIZE;
631 else if (space <= MJUM9BYTES)
635 n = m_getjcl(M_NOWAIT, MT_DATA, M_PKTHDR, space);
637 if (__predict_true(n != NULL)) {
639 n->m_data = (caddr_t)(ALIGN(n->m_data + align) - align);
640 m_copydata(m, 0, pktlen, mtod(n, caddr_t));
643 IEEE80211_DISCARD(vap, IEEE80211_MSG_ANY,
644 mtod(m, const struct ieee80211_frame *), NULL,
645 "%s", "no mbuf to realign");
646 vap->iv_stats.is_rx_badalign++;
653 ieee80211_add_callback(struct mbuf *m,
654 void (*func)(struct ieee80211_node *, void *, int), void *arg)
657 struct ieee80211_cb *cb;
659 mtag = m_tag_alloc(MTAG_ABI_NET80211, NET80211_TAG_CALLBACK,
660 sizeof(struct ieee80211_cb), M_INTWAIT);
664 cb = (struct ieee80211_cb *)(mtag+1);
667 m_tag_prepend(m, mtag);
668 m->m_flags |= M_TXCB;
673 ieee80211_process_callback(struct ieee80211_node *ni,
674 struct mbuf *m, int status)
678 mtag = m_tag_locate(m, MTAG_ABI_NET80211, NET80211_TAG_CALLBACK, NULL);
680 struct ieee80211_cb *cb = (struct ieee80211_cb *)(mtag+1);
681 cb->func(ni, cb->arg, status);
685 #include <sys/libkern.h>
688 get_random_bytes(void *p, size_t n)
693 uint32_t v = karc4random();
694 size_t nb = n > sizeof(uint32_t) ? sizeof(uint32_t) : n;
695 bcopy(&v, dp, n > sizeof(uint32_t) ? sizeof(uint32_t) : n);
696 dp += sizeof(uint32_t), n -= nb;
701 * Helper function for events that pass just a single mac address.
704 notify_macaddr(struct ifnet *ifp, int op, const uint8_t mac[IEEE80211_ADDR_LEN])
706 struct ieee80211_join_event iev;
708 memset(&iev, 0, sizeof(iev));
709 IEEE80211_ADDR_COPY(iev.iev_addr, mac);
710 rt_ieee80211msg(ifp, op, &iev, sizeof(iev));
714 ieee80211_notify_node_join(struct ieee80211_node *ni, int newassoc)
716 struct ieee80211vap *vap = ni->ni_vap;
717 struct ifnet *ifp = vap->iv_ifp;
719 IEEE80211_NOTE(vap, IEEE80211_MSG_NODE, ni, "%snode join",
720 (ni == vap->iv_bss) ? "bss " : "");
722 if (ni == vap->iv_bss) {
723 notify_macaddr(ifp, newassoc ?
724 RTM_IEEE80211_ASSOC : RTM_IEEE80211_REASSOC, ni->ni_bssid);
725 if_link_state_change(ifp);
727 notify_macaddr(ifp, newassoc ?
728 RTM_IEEE80211_JOIN : RTM_IEEE80211_REJOIN, ni->ni_macaddr);
733 ieee80211_notify_node_leave(struct ieee80211_node *ni)
735 struct ieee80211vap *vap = ni->ni_vap;
736 struct ifnet *ifp = vap->iv_ifp;
738 IEEE80211_NOTE(vap, IEEE80211_MSG_NODE, ni, "%snode leave",
739 (ni == vap->iv_bss) ? "bss " : "");
741 if (ni == vap->iv_bss) {
742 rt_ieee80211msg(ifp, RTM_IEEE80211_DISASSOC, NULL, 0);
743 if_link_state_change(ifp);
745 /* fire off wireless event station leaving */
746 notify_macaddr(ifp, RTM_IEEE80211_LEAVE, ni->ni_macaddr);
751 ieee80211_notify_scan_done(struct ieee80211vap *vap)
753 struct ifnet *ifp = vap->iv_ifp;
755 IEEE80211_DPRINTF(vap, IEEE80211_MSG_SCAN, "%s\n", "notify scan done");
757 /* dispatch wireless event indicating scan completed */
758 rt_ieee80211msg(ifp, RTM_IEEE80211_SCAN, NULL, 0);
762 ieee80211_notify_replay_failure(struct ieee80211vap *vap,
763 const struct ieee80211_frame *wh, const struct ieee80211_key *k,
764 u_int64_t rsc, int tid)
766 struct ifnet *ifp = vap->iv_ifp;
768 IEEE80211_NOTE_MAC(vap, IEEE80211_MSG_CRYPTO, wh->i_addr2,
769 "%s replay detected <rsc %ju, csc %ju, keyix %u rxkeyix %u>",
770 k->wk_cipher->ic_name, (intmax_t) rsc,
771 (intmax_t) k->wk_keyrsc[tid],
772 k->wk_keyix, k->wk_rxkeyix);
774 if (ifp != NULL) { /* NB: for cipher test modules */
775 struct ieee80211_replay_event iev;
777 IEEE80211_ADDR_COPY(iev.iev_dst, wh->i_addr1);
778 IEEE80211_ADDR_COPY(iev.iev_src, wh->i_addr2);
779 iev.iev_cipher = k->wk_cipher->ic_cipher;
780 if (k->wk_rxkeyix != IEEE80211_KEYIX_NONE)
781 iev.iev_keyix = k->wk_rxkeyix;
783 iev.iev_keyix = k->wk_keyix;
784 iev.iev_keyrsc = k->wk_keyrsc[tid];
786 rt_ieee80211msg(ifp, RTM_IEEE80211_REPLAY, &iev, sizeof(iev));
791 ieee80211_notify_michael_failure(struct ieee80211vap *vap,
792 const struct ieee80211_frame *wh, u_int keyix)
794 struct ifnet *ifp = vap->iv_ifp;
796 IEEE80211_NOTE_MAC(vap, IEEE80211_MSG_CRYPTO, wh->i_addr2,
797 "michael MIC verification failed <keyix %u>", keyix);
798 vap->iv_stats.is_rx_tkipmic++;
800 if (ifp != NULL) { /* NB: for cipher test modules */
801 struct ieee80211_michael_event iev;
803 IEEE80211_ADDR_COPY(iev.iev_dst, wh->i_addr1);
804 IEEE80211_ADDR_COPY(iev.iev_src, wh->i_addr2);
805 iev.iev_cipher = IEEE80211_CIPHER_TKIP;
806 iev.iev_keyix = keyix;
807 rt_ieee80211msg(ifp, RTM_IEEE80211_MICHAEL, &iev, sizeof(iev));
812 ieee80211_notify_wds_discover(struct ieee80211_node *ni)
814 struct ieee80211vap *vap = ni->ni_vap;
815 struct ifnet *ifp = vap->iv_ifp;
817 notify_macaddr(ifp, RTM_IEEE80211_WDS, ni->ni_macaddr);
821 ieee80211_notify_csa(struct ieee80211com *ic,
822 const struct ieee80211_channel *c, int mode, int count)
824 struct ifnet *ifp = ic->ic_ifp;
825 struct ieee80211_csa_event iev;
827 memset(&iev, 0, sizeof(iev));
828 iev.iev_flags = c->ic_flags;
829 iev.iev_freq = c->ic_freq;
830 iev.iev_ieee = c->ic_ieee;
832 iev.iev_count = count;
833 rt_ieee80211msg(ifp, RTM_IEEE80211_CSA, &iev, sizeof(iev));
837 ieee80211_notify_radar(struct ieee80211com *ic,
838 const struct ieee80211_channel *c)
840 struct ifnet *ifp = ic->ic_ifp;
841 struct ieee80211_radar_event iev;
843 memset(&iev, 0, sizeof(iev));
844 iev.iev_flags = c->ic_flags;
845 iev.iev_freq = c->ic_freq;
846 iev.iev_ieee = c->ic_ieee;
847 rt_ieee80211msg(ifp, RTM_IEEE80211_RADAR, &iev, sizeof(iev));
851 ieee80211_notify_cac(struct ieee80211com *ic,
852 const struct ieee80211_channel *c, enum ieee80211_notify_cac_event type)
854 struct ifnet *ifp = ic->ic_ifp;
855 struct ieee80211_cac_event iev;
857 memset(&iev, 0, sizeof(iev));
858 iev.iev_flags = c->ic_flags;
859 iev.iev_freq = c->ic_freq;
860 iev.iev_ieee = c->ic_ieee;
862 rt_ieee80211msg(ifp, RTM_IEEE80211_CAC, &iev, sizeof(iev));
866 ieee80211_notify_node_deauth(struct ieee80211_node *ni)
868 struct ieee80211vap *vap = ni->ni_vap;
869 struct ifnet *ifp = vap->iv_ifp;
871 IEEE80211_NOTE(vap, IEEE80211_MSG_NODE, ni, "%s", "node deauth");
873 notify_macaddr(ifp, RTM_IEEE80211_DEAUTH, ni->ni_macaddr);
877 ieee80211_notify_node_auth(struct ieee80211_node *ni)
879 struct ieee80211vap *vap = ni->ni_vap;
880 struct ifnet *ifp = vap->iv_ifp;
882 IEEE80211_NOTE(vap, IEEE80211_MSG_NODE, ni, "%s", "node auth");
884 notify_macaddr(ifp, RTM_IEEE80211_AUTH, ni->ni_macaddr);
888 ieee80211_notify_country(struct ieee80211vap *vap,
889 const uint8_t bssid[IEEE80211_ADDR_LEN], const uint8_t cc[2])
891 struct ifnet *ifp = vap->iv_ifp;
892 struct ieee80211_country_event iev;
894 memset(&iev, 0, sizeof(iev));
895 IEEE80211_ADDR_COPY(iev.iev_addr, bssid);
896 iev.iev_cc[0] = cc[0];
897 iev.iev_cc[1] = cc[1];
898 rt_ieee80211msg(ifp, RTM_IEEE80211_COUNTRY, &iev, sizeof(iev));
902 ieee80211_notify_radio(struct ieee80211com *ic, int state)
904 struct ifnet *ifp = ic->ic_ifp;
905 struct ieee80211_radio_event iev;
907 memset(&iev, 0, sizeof(iev));
908 iev.iev_state = state;
909 rt_ieee80211msg(ifp, RTM_IEEE80211_RADIO, &iev, sizeof(iev));
912 /* IEEE Std 802.11a-1999, page 9, table 79 */
913 #define IEEE80211_OFDM_SYM_TIME 4
914 #define IEEE80211_OFDM_PREAMBLE_TIME 16
915 #define IEEE80211_OFDM_SIGNAL_TIME 4
916 /* IEEE Std 802.11g-2003, page 44 */
917 #define IEEE80211_OFDM_SIGNAL_EXT_TIME 6
919 /* IEEE Std 802.11a-1999, page 7, figure 107 */
920 #define IEEE80211_OFDM_PLCP_SERVICE_NBITS 16
921 #define IEEE80211_OFDM_TAIL_NBITS 6
923 #define IEEE80211_OFDM_NBITS(frmlen) \
924 (IEEE80211_OFDM_PLCP_SERVICE_NBITS + \
925 ((frmlen) * NBBY) + \
926 IEEE80211_OFDM_TAIL_NBITS)
928 #define IEEE80211_OFDM_NBITS_PER_SYM(kbps) \
929 (((kbps) * IEEE80211_OFDM_SYM_TIME) / 1000)
931 #define IEEE80211_OFDM_NSYMS(kbps, frmlen) \
932 howmany(IEEE80211_OFDM_NBITS((frmlen)), \
933 IEEE80211_OFDM_NBITS_PER_SYM((kbps)))
935 #define IEEE80211_OFDM_TXTIME(kbps, frmlen) \
936 (IEEE80211_OFDM_PREAMBLE_TIME + \
937 IEEE80211_OFDM_SIGNAL_TIME + \
938 (IEEE80211_OFDM_NSYMS((kbps), (frmlen)) * IEEE80211_OFDM_SYM_TIME))
940 /* IEEE Std 802.11b-1999, page 28, subclause 18.3.4 */
941 #define IEEE80211_CCK_PREAMBLE_LEN 144
942 #define IEEE80211_CCK_PLCP_HDR_TIME 48
943 #define IEEE80211_CCK_SHPREAMBLE_LEN 72
944 #define IEEE80211_CCK_SHPLCP_HDR_TIME 24
946 #define IEEE80211_CCK_NBITS(frmlen) ((frmlen) * NBBY)
947 #define IEEE80211_CCK_TXTIME(kbps, frmlen) \
948 (((IEEE80211_CCK_NBITS((frmlen)) * 1000) + (kbps) - 1) / (kbps))
951 ieee80211_txtime(struct ieee80211_node *ni, u_int len, uint8_t rs_rate,
954 struct ieee80211vap *vap = ni->ni_vap;
958 rs_rate &= IEEE80211_RATE_VAL;
959 rate = rs_rate * 500; /* ieee80211 rate -> kbps */
961 if (vap->iv_ic->ic_phytype == IEEE80211_T_OFDM) {
963 * IEEE Std 802.11a-1999, page 37, equation (29)
964 * IEEE Std 802.11g-2003, page 44, equation (42)
966 txtime = IEEE80211_OFDM_TXTIME(rate, len);
967 if (vap->iv_ic->ic_curmode == IEEE80211_MODE_11G)
968 txtime += IEEE80211_OFDM_SIGNAL_EXT_TIME;
971 * IEEE Std 802.11b-1999, page 28, subclause 18.3.4
972 * IEEE Std 802.11g-2003, page 45, equation (43)
974 if (vap->iv_ic->ic_phytype == IEEE80211_T_OFDM_QUARTER+1)
976 txtime = IEEE80211_CCK_TXTIME(rate, len);
979 * Short preamble is not applicable for DS 1Mbits/s
981 if (rs_rate != 2 && (flags & IEEE80211_F_SHPREAMBLE)) {
982 txtime += IEEE80211_CCK_SHPREAMBLE_LEN +
983 IEEE80211_CCK_SHPLCP_HDR_TIME;
985 txtime += IEEE80211_CCK_PREAMBLE_LEN +
986 IEEE80211_CCK_PLCP_HDR_TIME;
993 ieee80211_load_module(const char *modname)
997 (void)kern_kldload(curthread, modname, NULL);
999 kprintf("%s: load the %s module by hand for now.\n", __func__, modname);
1003 static eventhandler_tag wlan_bpfevent;
1004 static eventhandler_tag wlan_ifllevent;
1007 bpf_track_event(void *arg, struct ifnet *ifp, int dlt, int attach)
1009 /* NB: identify vap's by if_start */
1011 if (dlt == DLT_IEEE802_11_RADIO &&
1012 ifp->if_start == ieee80211_vap_start) {
1013 struct ieee80211vap *vap = ifp->if_softc;
1015 * Track bpf radiotap listener state. We mark the vap
1016 * to indicate if any listener is present and the com
1017 * to indicate if any listener exists on any associated
1018 * vap. This flag is used by drivers to prepare radiotap
1019 * state only when needed.
1022 ieee80211_syncflag_ext(vap, IEEE80211_FEXT_BPF);
1023 if (vap->iv_opmode == IEEE80211_M_MONITOR)
1024 atomic_add_int(&vap->iv_ic->ic_montaps, 1);
1025 } else if (!vap->iv_rawbpf) {
1026 ieee80211_syncflag_ext(vap, -IEEE80211_FEXT_BPF);
1027 if (vap->iv_opmode == IEEE80211_M_MONITOR)
1028 atomic_subtract_int(&vap->iv_ic->ic_montaps, 1);
1034 ether_sprintf(const u_char *buf)
1036 static char ethstr[MAXCPU][ETHER_ADDRSTRLEN + 1];
1037 char *ptr = ethstr[mycpu->gd_cpuid];
1039 kether_ntoa(buf, ptr);
1044 wlan_iflladdr_event(void *arg __unused, struct ifnet *ifp)
1046 struct ieee80211com *ic = ifp->if_l2com;
1047 struct ieee80211vap *vap, *next;
1049 if (ifp->if_type != IFT_IEEE80211 || ic == NULL) {
1053 TAILQ_FOREACH_MUTABLE(vap, &ic->ic_vaps, iv_next, next) {
1055 * If the MAC address has changed on the parent and it was
1056 * copied to the vap on creation then re-sync.
1058 if (vap->iv_ic == ic &&
1059 (vap->iv_flags_ext & IEEE80211_FEXT_UNIQMAC) == 0) {
1060 IEEE80211_ADDR_COPY(vap->iv_myaddr, IF_LLADDR(ifp));
1061 if_setlladdr(vap->iv_ifp, IF_LLADDR(ifp),
1062 IEEE80211_ADDR_LEN);
1070 * NB: the module name is "wlan" for compatibility with NetBSD.
1073 wlan_modevent(module_t mod, int type, void *unused)
1080 kprintf("wlan: <802.11 Link Layer>\n");
1081 wlan_bpfevent = EVENTHANDLER_REGISTER(bpf_track,
1083 EVENTHANDLER_PRI_ANY);
1084 if (wlan_bpfevent == NULL) {
1088 wlan_ifllevent = EVENTHANDLER_REGISTER(iflladdr_event,
1089 wlan_iflladdr_event, NULL,
1090 EVENTHANDLER_PRI_ANY);
1091 if (wlan_ifllevent == NULL) {
1092 EVENTHANDLER_DEREGISTER(bpf_track, wlan_bpfevent);
1096 if_clone_attach(&wlan_cloner);
1097 if_register_com_alloc(IFT_IEEE80211, wlan_alloc, wlan_free);
1101 if_deregister_com_alloc(IFT_IEEE80211);
1102 if_clone_detach(&wlan_cloner);
1103 EVENTHANDLER_DEREGISTER(bpf_track, wlan_bpfevent);
1104 EVENTHANDLER_DEREGISTER(iflladdr_event, wlan_ifllevent);
1114 static moduledata_t wlan_mod = {
1119 DECLARE_MODULE(wlan, wlan_mod, SI_SUB_DRIVERS, SI_ORDER_FIRST);
1120 MODULE_VERSION(wlan, 1);
1121 MODULE_DEPEND(wlan, ether, 1, 1, 1);