1 /*- 2 * Copyright (c) 2003-2009 Sam Leffler, Errno Consulting 3 * All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 15 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 16 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 17 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 18 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 19 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 20 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 21 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 22 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 23 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 24 */ 25 26 #include <sys/cdefs.h> 27 __FBSDID("$FreeBSD$"); 28 29 /* 30 * IEEE 802.11 support (FreeBSD-specific code) 31 */ 32 #include "opt_wlan.h" 33 34 #include <sys/param.h> 35 #include <sys/systm.h> 36 #include <sys/eventhandler.h> 37 #include <sys/kernel.h> 38 #include <sys/linker.h> 39 #include <sys/malloc.h> 40 #include <sys/mbuf.h> 41 #include <sys/module.h> 42 #include <sys/proc.h> 43 #include <sys/sysctl.h> 44 45 #include <sys/socket.h> 46 47 #include <net/bpf.h> 48 #include <net/if.h> 49 #include <net/if_var.h> 50 #include <net/if_dl.h> 51 #include <net/if_clone.h> 52 #include <net/if_media.h> 53 #include <net/if_types.h> 54 #include <net/ethernet.h> 55 #include <net/route.h> 56 #include <net/vnet.h> 57 58 #include <net80211/ieee80211_var.h> 59 #include <net80211/ieee80211_input.h> 60 61 SYSCTL_NODE(_net, OID_AUTO, wlan, CTLFLAG_RD, 0, "IEEE 80211 parameters"); 62 63 #ifdef IEEE80211_DEBUG 64 int ieee80211_debug = 0; 65 SYSCTL_INT(_net_wlan, OID_AUTO, debug, CTLFLAG_RW, &ieee80211_debug, 66 0, "debugging printfs"); 67 #endif 68 69 static MALLOC_DEFINE(M_80211_COM, "80211com", "802.11 com state"); 70 71 static const char wlanname[] = "wlan"; 72 static struct if_clone *wlan_cloner; 73 74 static int 75 wlan_clone_create(struct if_clone *ifc, int unit, caddr_t params) 76 { 77 struct ieee80211_clone_params cp; 78 struct ieee80211vap *vap; 79 struct ieee80211com *ic; 80 int error; 81 82 error = copyin(params, &cp, sizeof(cp)); 83 if (error) 84 return error; 85 ic = ieee80211_find_com(cp.icp_parent); 86 if (ic == NULL) 87 return ENXIO; 88 if (cp.icp_opmode >= IEEE80211_OPMODE_MAX) { 89 ic_printf(ic, "%s: invalid opmode %d\n", __func__, 90 cp.icp_opmode); 91 return EINVAL; 92 } 93 if ((ic->ic_caps & ieee80211_opcap[cp.icp_opmode]) == 0) { 94 ic_printf(ic, "%s mode not supported\n", 95 ieee80211_opmode_name[cp.icp_opmode]); 96 return EOPNOTSUPP; 97 } 98 if ((cp.icp_flags & IEEE80211_CLONE_TDMA) && 99 #ifdef IEEE80211_SUPPORT_TDMA 100 (ic->ic_caps & IEEE80211_C_TDMA) == 0 101 #else 102 (1) 103 #endif 104 ) { 105 ic_printf(ic, "TDMA not supported\n"); 106 return EOPNOTSUPP; 107 } 108 vap = ic->ic_vap_create(ic, wlanname, unit, 109 cp.icp_opmode, cp.icp_flags, cp.icp_bssid, 110 cp.icp_flags & IEEE80211_CLONE_MACADDR ? 111 cp.icp_macaddr : ic->ic_macaddr); 112 113 return (vap == NULL ? EIO : 0); 114 } 115 116 static void 117 wlan_clone_destroy(struct ifnet *ifp) 118 { 119 struct ieee80211vap *vap = ifp->if_softc; 120 struct ieee80211com *ic = vap->iv_ic; 121 122 ic->ic_vap_delete(vap); 123 } 124 125 void 126 ieee80211_vap_destroy(struct ieee80211vap *vap) 127 { 128 CURVNET_SET(vap->iv_ifp->if_vnet); 129 if_clone_destroyif(wlan_cloner, vap->iv_ifp); 130 CURVNET_RESTORE(); 131 } 132 133 int 134 ieee80211_sysctl_msecs_ticks(SYSCTL_HANDLER_ARGS) 135 { 136 int msecs = ticks_to_msecs(*(int *)arg1); 137 int error, t; 138 139 error = sysctl_handle_int(oidp, &msecs, 0, req); 140 if (error || !req->newptr) 141 return error; 142 t = msecs_to_ticks(msecs); 143 *(int *)arg1 = (t < 1) ? 1 : t; 144 return 0; 145 } 146 147 static int 148 ieee80211_sysctl_inact(SYSCTL_HANDLER_ARGS) 149 { 150 int inact = (*(int *)arg1) * IEEE80211_INACT_WAIT; 151 int error; 152 153 error = sysctl_handle_int(oidp, &inact, 0, req); 154 if (error || !req->newptr) 155 return error; 156 *(int *)arg1 = inact / IEEE80211_INACT_WAIT; 157 return 0; 158 } 159 160 static int 161 ieee80211_sysctl_parent(SYSCTL_HANDLER_ARGS) 162 { 163 struct ieee80211com *ic = arg1; 164 165 return SYSCTL_OUT_STR(req, ic->ic_name); 166 } 167 168 static int 169 ieee80211_sysctl_radar(SYSCTL_HANDLER_ARGS) 170 { 171 struct ieee80211com *ic = arg1; 172 int t = 0, error; 173 174 error = sysctl_handle_int(oidp, &t, 0, req); 175 if (error || !req->newptr) 176 return error; 177 IEEE80211_LOCK(ic); 178 ieee80211_dfs_notify_radar(ic, ic->ic_curchan); 179 IEEE80211_UNLOCK(ic); 180 return 0; 181 } 182 183 void 184 ieee80211_sysctl_attach(struct ieee80211com *ic) 185 { 186 } 187 188 void 189 ieee80211_sysctl_detach(struct ieee80211com *ic) 190 { 191 } 192 193 void 194 ieee80211_sysctl_vattach(struct ieee80211vap *vap) 195 { 196 struct ifnet *ifp = vap->iv_ifp; 197 struct sysctl_ctx_list *ctx; 198 struct sysctl_oid *oid; 199 char num[14]; /* sufficient for 32 bits */ 200 201 ctx = (struct sysctl_ctx_list *) IEEE80211_MALLOC(sizeof(struct sysctl_ctx_list), 202 M_DEVBUF, IEEE80211_M_NOWAIT | IEEE80211_M_ZERO); 203 if (ctx == NULL) { 204 if_printf(ifp, "%s: cannot allocate sysctl context!\n", 205 __func__); 206 return; 207 } 208 sysctl_ctx_init(ctx); 209 snprintf(num, sizeof(num), "%u", ifp->if_dunit); 210 oid = SYSCTL_ADD_NODE(ctx, &SYSCTL_NODE_CHILDREN(_net, wlan), 211 OID_AUTO, num, CTLFLAG_RD, NULL, ""); 212 SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO, 213 "%parent", CTLTYPE_STRING | CTLFLAG_RD, vap->iv_ic, 0, 214 ieee80211_sysctl_parent, "A", "parent device"); 215 SYSCTL_ADD_UINT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO, 216 "driver_caps", CTLFLAG_RW, &vap->iv_caps, 0, 217 "driver capabilities"); 218 #ifdef IEEE80211_DEBUG 219 vap->iv_debug = ieee80211_debug; 220 SYSCTL_ADD_UINT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO, 221 "debug", CTLFLAG_RW, &vap->iv_debug, 0, 222 "control debugging printfs"); 223 #endif 224 SYSCTL_ADD_INT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO, 225 "bmiss_max", CTLFLAG_RW, &vap->iv_bmiss_max, 0, 226 "consecutive beacon misses before scanning"); 227 /* XXX inherit from tunables */ 228 SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO, 229 "inact_run", CTLTYPE_INT | CTLFLAG_RW, &vap->iv_inact_run, 0, 230 ieee80211_sysctl_inact, "I", 231 "station inactivity timeout (sec)"); 232 SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO, 233 "inact_probe", CTLTYPE_INT | CTLFLAG_RW, &vap->iv_inact_probe, 0, 234 ieee80211_sysctl_inact, "I", 235 "station inactivity probe timeout (sec)"); 236 SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO, 237 "inact_auth", CTLTYPE_INT | CTLFLAG_RW, &vap->iv_inact_auth, 0, 238 ieee80211_sysctl_inact, "I", 239 "station authentication timeout (sec)"); 240 SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO, 241 "inact_init", CTLTYPE_INT | CTLFLAG_RW, &vap->iv_inact_init, 0, 242 ieee80211_sysctl_inact, "I", 243 "station initial state timeout (sec)"); 244 if (vap->iv_htcaps & IEEE80211_HTC_HT) { 245 SYSCTL_ADD_UINT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO, 246 "ampdu_mintraffic_bk", CTLFLAG_RW, 247 &vap->iv_ampdu_mintraffic[WME_AC_BK], 0, 248 "BK traffic tx aggr threshold (pps)"); 249 SYSCTL_ADD_UINT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO, 250 "ampdu_mintraffic_be", CTLFLAG_RW, 251 &vap->iv_ampdu_mintraffic[WME_AC_BE], 0, 252 "BE traffic tx aggr threshold (pps)"); 253 SYSCTL_ADD_UINT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO, 254 "ampdu_mintraffic_vo", CTLFLAG_RW, 255 &vap->iv_ampdu_mintraffic[WME_AC_VO], 0, 256 "VO traffic tx aggr threshold (pps)"); 257 SYSCTL_ADD_UINT(ctx, SYSCTL_CHILDREN(oid), OID_AUTO, 258 "ampdu_mintraffic_vi", CTLFLAG_RW, 259 &vap->iv_ampdu_mintraffic[WME_AC_VI], 0, 260 "VI traffic tx aggr threshold (pps)"); 261 } 262 if (vap->iv_caps & IEEE80211_C_DFS) { 263 SYSCTL_ADD_PROC(ctx, SYSCTL_CHILDREN(oid), OID_AUTO, 264 "radar", CTLTYPE_INT | CTLFLAG_RW, vap->iv_ic, 0, 265 ieee80211_sysctl_radar, "I", "simulate radar event"); 266 } 267 vap->iv_sysctl = ctx; 268 vap->iv_oid = oid; 269 } 270 271 void 272 ieee80211_sysctl_vdetach(struct ieee80211vap *vap) 273 { 274 275 if (vap->iv_sysctl != NULL) { 276 sysctl_ctx_free(vap->iv_sysctl); 277 IEEE80211_FREE(vap->iv_sysctl, M_DEVBUF); 278 vap->iv_sysctl = NULL; 279 } 280 } 281 282 int 283 ieee80211_node_dectestref(struct ieee80211_node *ni) 284 { 285 /* XXX need equivalent of atomic_dec_and_test */ 286 atomic_subtract_int(&ni->ni_refcnt, 1); 287 return atomic_cmpset_int(&ni->ni_refcnt, 0, 1); 288 } 289 290 void 291 ieee80211_drain_ifq(struct ifqueue *ifq) 292 { 293 struct ieee80211_node *ni; 294 struct mbuf *m; 295 296 for (;;) { 297 IF_DEQUEUE(ifq, m); 298 if (m == NULL) 299 break; 300 301 ni = (struct ieee80211_node *)m->m_pkthdr.rcvif; 302 KASSERT(ni != NULL, ("frame w/o node")); 303 ieee80211_free_node(ni); 304 m->m_pkthdr.rcvif = NULL; 305 306 m_freem(m); 307 } 308 } 309 310 void 311 ieee80211_flush_ifq(struct ifqueue *ifq, struct ieee80211vap *vap) 312 { 313 struct ieee80211_node *ni; 314 struct mbuf *m, **mprev; 315 316 IF_LOCK(ifq); 317 mprev = &ifq->ifq_head; 318 while ((m = *mprev) != NULL) { 319 ni = (struct ieee80211_node *)m->m_pkthdr.rcvif; 320 if (ni != NULL && ni->ni_vap == vap) { 321 *mprev = m->m_nextpkt; /* remove from list */ 322 ifq->ifq_len--; 323 324 m_freem(m); 325 ieee80211_free_node(ni); /* reclaim ref */ 326 } else 327 mprev = &m->m_nextpkt; 328 } 329 /* recalculate tail ptr */ 330 m = ifq->ifq_head; 331 for (; m != NULL && m->m_nextpkt != NULL; m = m->m_nextpkt) 332 ; 333 ifq->ifq_tail = m; 334 IF_UNLOCK(ifq); 335 } 336 337 /* 338 * As above, for mbufs allocated with m_gethdr/MGETHDR 339 * or initialized by M_COPY_PKTHDR. 340 */ 341 #define MC_ALIGN(m, len) \ 342 do { \ 343 (m)->m_data += (MCLBYTES - (len)) &~ (sizeof(long) - 1); \ 344 } while (/* CONSTCOND */ 0) 345 346 /* 347 * Allocate and setup a management frame of the specified 348 * size. We return the mbuf and a pointer to the start 349 * of the contiguous data area that's been reserved based 350 * on the packet length. The data area is forced to 32-bit 351 * alignment and the buffer length to a multiple of 4 bytes. 352 * This is done mainly so beacon frames (that require this) 353 * can use this interface too. 354 */ 355 struct mbuf * 356 ieee80211_getmgtframe(uint8_t **frm, int headroom, int pktlen) 357 { 358 struct mbuf *m; 359 u_int len; 360 361 /* 362 * NB: we know the mbuf routines will align the data area 363 * so we don't need to do anything special. 364 */ 365 len = roundup2(headroom + pktlen, 4); 366 KASSERT(len <= MCLBYTES, ("802.11 mgt frame too large: %u", len)); 367 if (len < MINCLSIZE) { 368 m = m_gethdr(M_NOWAIT, MT_DATA); 369 /* 370 * Align the data in case additional headers are added. 371 * This should only happen when a WEP header is added 372 * which only happens for shared key authentication mgt 373 * frames which all fit in MHLEN. 374 */ 375 if (m != NULL) 376 M_ALIGN(m, len); 377 } else { 378 m = m_getcl(M_NOWAIT, MT_DATA, M_PKTHDR); 379 if (m != NULL) 380 MC_ALIGN(m, len); 381 } 382 if (m != NULL) { 383 m->m_data += headroom; 384 *frm = m->m_data; 385 } 386 return m; 387 } 388 389 #ifndef __NO_STRICT_ALIGNMENT 390 /* 391 * Re-align the payload in the mbuf. This is mainly used (right now) 392 * to handle IP header alignment requirements on certain architectures. 393 */ 394 struct mbuf * 395 ieee80211_realign(struct ieee80211vap *vap, struct mbuf *m, size_t align) 396 { 397 int pktlen, space; 398 struct mbuf *n; 399 400 pktlen = m->m_pkthdr.len; 401 space = pktlen + align; 402 if (space < MINCLSIZE) 403 n = m_gethdr(M_NOWAIT, MT_DATA); 404 else { 405 n = m_getjcl(M_NOWAIT, MT_DATA, M_PKTHDR, 406 space <= MCLBYTES ? MCLBYTES : 407 #if MJUMPAGESIZE != MCLBYTES 408 space <= MJUMPAGESIZE ? MJUMPAGESIZE : 409 #endif 410 space <= MJUM9BYTES ? MJUM9BYTES : MJUM16BYTES); 411 } 412 if (__predict_true(n != NULL)) { 413 m_move_pkthdr(n, m); 414 n->m_data = (caddr_t)(ALIGN(n->m_data + align) - align); 415 m_copydata(m, 0, pktlen, mtod(n, caddr_t)); 416 n->m_len = pktlen; 417 } else { 418 IEEE80211_DISCARD(vap, IEEE80211_MSG_ANY, 419 mtod(m, const struct ieee80211_frame *), NULL, 420 "%s", "no mbuf to realign"); 421 vap->iv_stats.is_rx_badalign++; 422 } 423 m_freem(m); 424 return n; 425 } 426 #endif /* !__NO_STRICT_ALIGNMENT */ 427 428 int 429 ieee80211_add_callback(struct mbuf *m, 430 void (*func)(struct ieee80211_node *, void *, int), void *arg) 431 { 432 struct m_tag *mtag; 433 struct ieee80211_cb *cb; 434 435 mtag = m_tag_alloc(MTAG_ABI_NET80211, NET80211_TAG_CALLBACK, 436 sizeof(struct ieee80211_cb), M_NOWAIT); 437 if (mtag == NULL) 438 return 0; 439 440 cb = (struct ieee80211_cb *)(mtag+1); 441 cb->func = func; 442 cb->arg = arg; 443 m_tag_prepend(m, mtag); 444 m->m_flags |= M_TXCB; 445 return 1; 446 } 447 448 int 449 ieee80211_add_xmit_params(struct mbuf *m, 450 const struct ieee80211_bpf_params *params) 451 { 452 struct m_tag *mtag; 453 struct ieee80211_tx_params *tx; 454 455 mtag = m_tag_alloc(MTAG_ABI_NET80211, NET80211_TAG_XMIT_PARAMS, 456 sizeof(struct ieee80211_tx_params), M_NOWAIT); 457 if (mtag == NULL) 458 return (0); 459 460 tx = (struct ieee80211_tx_params *)(mtag+1); 461 memcpy(&tx->params, params, sizeof(struct ieee80211_bpf_params)); 462 m_tag_prepend(m, mtag); 463 return (1); 464 } 465 466 int 467 ieee80211_get_xmit_params(struct mbuf *m, 468 struct ieee80211_bpf_params *params) 469 { 470 struct m_tag *mtag; 471 struct ieee80211_tx_params *tx; 472 473 mtag = m_tag_locate(m, MTAG_ABI_NET80211, NET80211_TAG_XMIT_PARAMS, 474 NULL); 475 if (mtag == NULL) 476 return (-1); 477 tx = (struct ieee80211_tx_params *)(mtag + 1); 478 memcpy(params, &tx->params, sizeof(struct ieee80211_bpf_params)); 479 return (0); 480 } 481 482 void 483 ieee80211_process_callback(struct ieee80211_node *ni, 484 struct mbuf *m, int status) 485 { 486 struct m_tag *mtag; 487 488 mtag = m_tag_locate(m, MTAG_ABI_NET80211, NET80211_TAG_CALLBACK, NULL); 489 if (mtag != NULL) { 490 struct ieee80211_cb *cb = (struct ieee80211_cb *)(mtag+1); 491 cb->func(ni, cb->arg, status); 492 } 493 } 494 495 /* 496 * Add RX parameters to the given mbuf. 497 * 498 * Returns 1 if OK, 0 on error. 499 */ 500 int 501 ieee80211_add_rx_params(struct mbuf *m, const struct ieee80211_rx_stats *rxs) 502 { 503 struct m_tag *mtag; 504 struct ieee80211_rx_params *rx; 505 506 mtag = m_tag_alloc(MTAG_ABI_NET80211, NET80211_TAG_RECV_PARAMS, 507 sizeof(struct ieee80211_rx_stats), M_NOWAIT); 508 if (mtag == NULL) 509 return (0); 510 511 rx = (struct ieee80211_rx_params *)(mtag + 1); 512 memcpy(&rx->params, rxs, sizeof(*rxs)); 513 m_tag_prepend(m, mtag); 514 return (1); 515 } 516 517 int 518 ieee80211_get_rx_params(struct mbuf *m, struct ieee80211_rx_stats *rxs) 519 { 520 struct m_tag *mtag; 521 struct ieee80211_rx_params *rx; 522 523 mtag = m_tag_locate(m, MTAG_ABI_NET80211, NET80211_TAG_RECV_PARAMS, 524 NULL); 525 if (mtag == NULL) 526 return (-1); 527 rx = (struct ieee80211_rx_params *)(mtag + 1); 528 memcpy(rxs, &rx->params, sizeof(*rxs)); 529 return (0); 530 } 531 532 /* 533 * Transmit a frame to the parent interface. 534 */ 535 int 536 ieee80211_parent_xmitpkt(struct ieee80211com *ic, struct mbuf *m) 537 { 538 int error; 539 540 /* 541 * Assert the IC TX lock is held - this enforces the 542 * processing -> queuing order is maintained 543 */ 544 IEEE80211_TX_LOCK_ASSERT(ic); 545 error = ic->ic_transmit(ic, m); 546 if (error) { 547 struct ieee80211_node *ni; 548 549 ni = (struct ieee80211_node *)m->m_pkthdr.rcvif; 550 551 /* XXX number of fragments */ 552 if_inc_counter(ni->ni_vap->iv_ifp, IFCOUNTER_OERRORS, 1); 553 ieee80211_free_node(ni); 554 ieee80211_free_mbuf(m); 555 } 556 return (error); 557 } 558 559 /* 560 * Transmit a frame to the VAP interface. 561 */ 562 int 563 ieee80211_vap_xmitpkt(struct ieee80211vap *vap, struct mbuf *m) 564 { 565 struct ifnet *ifp = vap->iv_ifp; 566 567 /* 568 * When transmitting via the VAP, we shouldn't hold 569 * any IC TX lock as the VAP TX path will acquire it. 570 */ 571 IEEE80211_TX_UNLOCK_ASSERT(vap->iv_ic); 572 573 return (ifp->if_transmit(ifp, m)); 574 575 } 576 577 #include <sys/libkern.h> 578 579 void 580 get_random_bytes(void *p, size_t n) 581 { 582 uint8_t *dp = p; 583 584 while (n > 0) { 585 uint32_t v = arc4random(); 586 size_t nb = n > sizeof(uint32_t) ? sizeof(uint32_t) : n; 587 bcopy(&v, dp, n > sizeof(uint32_t) ? sizeof(uint32_t) : n); 588 dp += sizeof(uint32_t), n -= nb; 589 } 590 } 591 592 /* 593 * Helper function for events that pass just a single mac address. 594 */ 595 static void 596 notify_macaddr(struct ifnet *ifp, int op, const uint8_t mac[IEEE80211_ADDR_LEN]) 597 { 598 struct ieee80211_join_event iev; 599 600 CURVNET_SET(ifp->if_vnet); 601 memset(&iev, 0, sizeof(iev)); 602 IEEE80211_ADDR_COPY(iev.iev_addr, mac); 603 rt_ieee80211msg(ifp, op, &iev, sizeof(iev)); 604 CURVNET_RESTORE(); 605 } 606 607 void 608 ieee80211_notify_node_join(struct ieee80211_node *ni, int newassoc) 609 { 610 struct ieee80211vap *vap = ni->ni_vap; 611 struct ifnet *ifp = vap->iv_ifp; 612 613 CURVNET_SET_QUIET(ifp->if_vnet); 614 IEEE80211_NOTE(vap, IEEE80211_MSG_NODE, ni, "%snode join", 615 (ni == vap->iv_bss) ? "bss " : ""); 616 617 if (ni == vap->iv_bss) { 618 notify_macaddr(ifp, newassoc ? 619 RTM_IEEE80211_ASSOC : RTM_IEEE80211_REASSOC, ni->ni_bssid); 620 if_link_state_change(ifp, LINK_STATE_UP); 621 } else { 622 notify_macaddr(ifp, newassoc ? 623 RTM_IEEE80211_JOIN : RTM_IEEE80211_REJOIN, ni->ni_macaddr); 624 } 625 CURVNET_RESTORE(); 626 } 627 628 void 629 ieee80211_notify_node_leave(struct ieee80211_node *ni) 630 { 631 struct ieee80211vap *vap = ni->ni_vap; 632 struct ifnet *ifp = vap->iv_ifp; 633 634 CURVNET_SET_QUIET(ifp->if_vnet); 635 IEEE80211_NOTE(vap, IEEE80211_MSG_NODE, ni, "%snode leave", 636 (ni == vap->iv_bss) ? "bss " : ""); 637 638 if (ni == vap->iv_bss) { 639 rt_ieee80211msg(ifp, RTM_IEEE80211_DISASSOC, NULL, 0); 640 if_link_state_change(ifp, LINK_STATE_DOWN); 641 } else { 642 /* fire off wireless event station leaving */ 643 notify_macaddr(ifp, RTM_IEEE80211_LEAVE, ni->ni_macaddr); 644 } 645 CURVNET_RESTORE(); 646 } 647 648 void 649 ieee80211_notify_scan_done(struct ieee80211vap *vap) 650 { 651 struct ifnet *ifp = vap->iv_ifp; 652 653 IEEE80211_DPRINTF(vap, IEEE80211_MSG_SCAN, "%s\n", "notify scan done"); 654 655 /* dispatch wireless event indicating scan completed */ 656 CURVNET_SET(ifp->if_vnet); 657 rt_ieee80211msg(ifp, RTM_IEEE80211_SCAN, NULL, 0); 658 CURVNET_RESTORE(); 659 } 660 661 void 662 ieee80211_notify_replay_failure(struct ieee80211vap *vap, 663 const struct ieee80211_frame *wh, const struct ieee80211_key *k, 664 u_int64_t rsc, int tid) 665 { 666 struct ifnet *ifp = vap->iv_ifp; 667 668 IEEE80211_NOTE_MAC(vap, IEEE80211_MSG_CRYPTO, wh->i_addr2, 669 "%s replay detected tid %d <rsc %ju, csc %ju, keyix %u rxkeyix %u>", 670 k->wk_cipher->ic_name, tid, (intmax_t) rsc, 671 (intmax_t) k->wk_keyrsc[tid], 672 k->wk_keyix, k->wk_rxkeyix); 673 674 if (ifp != NULL) { /* NB: for cipher test modules */ 675 struct ieee80211_replay_event iev; 676 677 IEEE80211_ADDR_COPY(iev.iev_dst, wh->i_addr1); 678 IEEE80211_ADDR_COPY(iev.iev_src, wh->i_addr2); 679 iev.iev_cipher = k->wk_cipher->ic_cipher; 680 if (k->wk_rxkeyix != IEEE80211_KEYIX_NONE) 681 iev.iev_keyix = k->wk_rxkeyix; 682 else 683 iev.iev_keyix = k->wk_keyix; 684 iev.iev_keyrsc = k->wk_keyrsc[tid]; 685 iev.iev_rsc = rsc; 686 CURVNET_SET(ifp->if_vnet); 687 rt_ieee80211msg(ifp, RTM_IEEE80211_REPLAY, &iev, sizeof(iev)); 688 CURVNET_RESTORE(); 689 } 690 } 691 692 void 693 ieee80211_notify_michael_failure(struct ieee80211vap *vap, 694 const struct ieee80211_frame *wh, u_int keyix) 695 { 696 struct ifnet *ifp = vap->iv_ifp; 697 698 IEEE80211_NOTE_MAC(vap, IEEE80211_MSG_CRYPTO, wh->i_addr2, 699 "michael MIC verification failed <keyix %u>", keyix); 700 vap->iv_stats.is_rx_tkipmic++; 701 702 if (ifp != NULL) { /* NB: for cipher test modules */ 703 struct ieee80211_michael_event iev; 704 705 IEEE80211_ADDR_COPY(iev.iev_dst, wh->i_addr1); 706 IEEE80211_ADDR_COPY(iev.iev_src, wh->i_addr2); 707 iev.iev_cipher = IEEE80211_CIPHER_TKIP; 708 iev.iev_keyix = keyix; 709 CURVNET_SET(ifp->if_vnet); 710 rt_ieee80211msg(ifp, RTM_IEEE80211_MICHAEL, &iev, sizeof(iev)); 711 CURVNET_RESTORE(); 712 } 713 } 714 715 void 716 ieee80211_notify_wds_discover(struct ieee80211_node *ni) 717 { 718 struct ieee80211vap *vap = ni->ni_vap; 719 struct ifnet *ifp = vap->iv_ifp; 720 721 notify_macaddr(ifp, RTM_IEEE80211_WDS, ni->ni_macaddr); 722 } 723 724 void 725 ieee80211_notify_csa(struct ieee80211com *ic, 726 const struct ieee80211_channel *c, int mode, int count) 727 { 728 struct ieee80211_csa_event iev; 729 struct ieee80211vap *vap; 730 struct ifnet *ifp; 731 732 memset(&iev, 0, sizeof(iev)); 733 iev.iev_flags = c->ic_flags; 734 iev.iev_freq = c->ic_freq; 735 iev.iev_ieee = c->ic_ieee; 736 iev.iev_mode = mode; 737 iev.iev_count = count; 738 TAILQ_FOREACH(vap, &ic->ic_vaps, iv_next) { 739 ifp = vap->iv_ifp; 740 CURVNET_SET(ifp->if_vnet); 741 rt_ieee80211msg(ifp, RTM_IEEE80211_CSA, &iev, sizeof(iev)); 742 CURVNET_RESTORE(); 743 } 744 } 745 746 void 747 ieee80211_notify_radar(struct ieee80211com *ic, 748 const struct ieee80211_channel *c) 749 { 750 struct ieee80211_radar_event iev; 751 struct ieee80211vap *vap; 752 struct ifnet *ifp; 753 754 memset(&iev, 0, sizeof(iev)); 755 iev.iev_flags = c->ic_flags; 756 iev.iev_freq = c->ic_freq; 757 iev.iev_ieee = c->ic_ieee; 758 TAILQ_FOREACH(vap, &ic->ic_vaps, iv_next) { 759 ifp = vap->iv_ifp; 760 CURVNET_SET(ifp->if_vnet); 761 rt_ieee80211msg(ifp, RTM_IEEE80211_RADAR, &iev, sizeof(iev)); 762 CURVNET_RESTORE(); 763 } 764 } 765 766 void 767 ieee80211_notify_cac(struct ieee80211com *ic, 768 const struct ieee80211_channel *c, enum ieee80211_notify_cac_event type) 769 { 770 struct ieee80211_cac_event iev; 771 struct ieee80211vap *vap; 772 struct ifnet *ifp; 773 774 memset(&iev, 0, sizeof(iev)); 775 iev.iev_flags = c->ic_flags; 776 iev.iev_freq = c->ic_freq; 777 iev.iev_ieee = c->ic_ieee; 778 iev.iev_type = type; 779 TAILQ_FOREACH(vap, &ic->ic_vaps, iv_next) { 780 ifp = vap->iv_ifp; 781 CURVNET_SET(ifp->if_vnet); 782 rt_ieee80211msg(ifp, RTM_IEEE80211_CAC, &iev, sizeof(iev)); 783 CURVNET_RESTORE(); 784 } 785 } 786 787 void 788 ieee80211_notify_node_deauth(struct ieee80211_node *ni) 789 { 790 struct ieee80211vap *vap = ni->ni_vap; 791 struct ifnet *ifp = vap->iv_ifp; 792 793 IEEE80211_NOTE(vap, IEEE80211_MSG_NODE, ni, "%s", "node deauth"); 794 795 notify_macaddr(ifp, RTM_IEEE80211_DEAUTH, ni->ni_macaddr); 796 } 797 798 void 799 ieee80211_notify_node_auth(struct ieee80211_node *ni) 800 { 801 struct ieee80211vap *vap = ni->ni_vap; 802 struct ifnet *ifp = vap->iv_ifp; 803 804 IEEE80211_NOTE(vap, IEEE80211_MSG_NODE, ni, "%s", "node auth"); 805 806 notify_macaddr(ifp, RTM_IEEE80211_AUTH, ni->ni_macaddr); 807 } 808 809 void 810 ieee80211_notify_country(struct ieee80211vap *vap, 811 const uint8_t bssid[IEEE80211_ADDR_LEN], const uint8_t cc[2]) 812 { 813 struct ifnet *ifp = vap->iv_ifp; 814 struct ieee80211_country_event iev; 815 816 memset(&iev, 0, sizeof(iev)); 817 IEEE80211_ADDR_COPY(iev.iev_addr, bssid); 818 iev.iev_cc[0] = cc[0]; 819 iev.iev_cc[1] = cc[1]; 820 CURVNET_SET(ifp->if_vnet); 821 rt_ieee80211msg(ifp, RTM_IEEE80211_COUNTRY, &iev, sizeof(iev)); 822 CURVNET_RESTORE(); 823 } 824 825 void 826 ieee80211_notify_radio(struct ieee80211com *ic, int state) 827 { 828 struct ieee80211_radio_event iev; 829 struct ieee80211vap *vap; 830 struct ifnet *ifp; 831 832 memset(&iev, 0, sizeof(iev)); 833 iev.iev_state = state; 834 TAILQ_FOREACH(vap, &ic->ic_vaps, iv_next) { 835 ifp = vap->iv_ifp; 836 CURVNET_SET(ifp->if_vnet); 837 rt_ieee80211msg(ifp, RTM_IEEE80211_RADIO, &iev, sizeof(iev)); 838 CURVNET_RESTORE(); 839 } 840 } 841 842 void 843 ieee80211_load_module(const char *modname) 844 { 845 846 #ifdef notyet 847 (void)kern_kldload(curthread, modname, NULL); 848 #else 849 printf("%s: load the %s module by hand for now.\n", __func__, modname); 850 #endif 851 } 852 853 static eventhandler_tag wlan_bpfevent; 854 855 static void 856 bpf_track(void *arg, struct ifnet *ifp, int dlt, int attach) 857 { 858 /* NB: identify vap's by if_init */ 859 if (dlt == DLT_IEEE802_11_RADIO && 860 ifp->if_init == ieee80211_init) { 861 struct ieee80211vap *vap = ifp->if_softc; 862 /* 863 * Track bpf radiotap listener state. We mark the vap 864 * to indicate if any listener is present and the com 865 * to indicate if any listener exists on any associated 866 * vap. This flag is used by drivers to prepare radiotap 867 * state only when needed. 868 */ 869 if (attach) { 870 ieee80211_syncflag_ext(vap, IEEE80211_FEXT_BPF); 871 if (vap->iv_opmode == IEEE80211_M_MONITOR) 872 atomic_add_int(&vap->iv_ic->ic_montaps, 1); 873 } else if (!bpf_peers_present(vap->iv_rawbpf)) { 874 ieee80211_syncflag_ext(vap, -IEEE80211_FEXT_BPF); 875 if (vap->iv_opmode == IEEE80211_M_MONITOR) 876 atomic_subtract_int(&vap->iv_ic->ic_montaps, 1); 877 } 878 } 879 } 880 881 /* 882 * Module glue. 883 * 884 * NB: the module name is "wlan" for compatibility with NetBSD. 885 */ 886 static int 887 wlan_modevent(module_t mod, int type, void *unused) 888 { 889 switch (type) { 890 case MOD_LOAD: 891 if (bootverbose) 892 printf("wlan: <802.11 Link Layer>\n"); 893 wlan_bpfevent = EVENTHANDLER_REGISTER(bpf_track, 894 bpf_track, 0, EVENTHANDLER_PRI_ANY); 895 wlan_cloner = if_clone_simple(wlanname, wlan_clone_create, 896 wlan_clone_destroy, 0); 897 return 0; 898 case MOD_UNLOAD: 899 if_clone_detach(wlan_cloner); 900 EVENTHANDLER_DEREGISTER(bpf_track, wlan_bpfevent); 901 return 0; 902 } 903 return EINVAL; 904 } 905 906 static moduledata_t wlan_mod = { 907 wlanname, 908 wlan_modevent, 909 0 910 }; 911 DECLARE_MODULE(wlan, wlan_mod, SI_SUB_DRIVERS, SI_ORDER_FIRST); 912 MODULE_VERSION(wlan, 1); 913 MODULE_DEPEND(wlan, ether, 1, 1, 1); 914 #ifdef IEEE80211_ALQ 915 MODULE_DEPEND(wlan, alq, 1, 1, 1); 916 #endif /* IEEE80211_ALQ */ 917 918