]> git.ipfire.org Git - thirdparty/iw.git/blame - event.c
bump version to 6.9
[thirdparty/iw.git] / event.c
CommitLineData
957a0f07
JB
1#include <stdint.h>
2#include <stdbool.h>
3#include <net/if.h>
4#include <errno.h>
7c4e86ca 5#include <inttypes.h>
c3df363e 6#include <time.h>
957a0f07
JB
7#include "iw.h"
8
9static int no_seq_check(struct nl_msg *msg, void *arg)
10{
11 return NL_OK;
12}
13
0168589d
LR
14struct ieee80211_beacon_channel {
15 __u16 center_freq;
f0c48e7b 16 bool no_ir;
0168589d
LR
17 bool no_ibss;
18};
19
20static int parse_beacon_hint_chan(struct nlattr *tb,
21 struct ieee80211_beacon_channel *chan)
22{
23 struct nlattr *tb_freq[NL80211_FREQUENCY_ATTR_MAX + 1];
24 static struct nla_policy beacon_freq_policy[NL80211_FREQUENCY_ATTR_MAX + 1] = {
25 [NL80211_FREQUENCY_ATTR_FREQ] = { .type = NLA_U32 },
f0c48e7b
IP
26 [NL80211_FREQUENCY_ATTR_NO_IR] = { .type = NLA_FLAG },
27 [__NL80211_FREQUENCY_ATTR_NO_IBSS] = { .type = NLA_FLAG },
0168589d
LR
28 };
29
30 if (nla_parse_nested(tb_freq,
31 NL80211_FREQUENCY_ATTR_MAX,
32 tb,
33 beacon_freq_policy))
34 return -EINVAL;
35
36 chan->center_freq = nla_get_u32(tb_freq[NL80211_FREQUENCY_ATTR_FREQ]);
37
f0c48e7b
IP
38 if (tb_freq[NL80211_FREQUENCY_ATTR_NO_IR])
39 chan->no_ir = true;
40 if (tb_freq[__NL80211_FREQUENCY_ATTR_NO_IBSS])
0168589d
LR
41 chan->no_ibss = true;
42
43 return 0;
44}
45
957a0f07
JB
46static void print_frame(struct print_event_args *args, struct nlattr *attr)
47{
48 uint8_t *frame;
49 size_t len;
0ee571d5 50 unsigned int i;
957a0f07
JB
51 char macbuf[6*3];
52 uint16_t tmp;
53
572e47a3 54 if (!attr) {
957a0f07 55 printf(" [no frame]");
572e47a3
AK
56 return;
57 }
957a0f07
JB
58
59 frame = nla_data(attr);
60 len = nla_len(attr);
61
62 if (len < 26) {
63 printf(" [invalid frame: ");
64 goto print_frame;
65 }
66
67 mac_addr_n2a(macbuf, frame + 10);
68 printf(" %s -> ", macbuf);
69 mac_addr_n2a(macbuf, frame + 4);
70 printf("%s", macbuf);
71
72 switch (frame[0] & 0xfc) {
73 case 0x10: /* assoc resp */
74 case 0x30: /* reassoc resp */
75 /* status */
76 tmp = (frame[27] << 8) + frame[26];
77 printf(" status: %d: %s", tmp, get_status_str(tmp));
78 break;
79 case 0x00: /* assoc req */
80 case 0x20: /* reassoc req */
81 break;
82 case 0xb0: /* auth */
83 /* status */
84 tmp = (frame[29] << 8) + frame[28];
85 printf(" status: %d: %s", tmp, get_status_str(tmp));
86 break;
957a0f07
JB
87 case 0xa0: /* disassoc */
88 case 0xc0: /* deauth */
89 /* reason */
90 tmp = (frame[25] << 8) + frame[24];
91 printf(" reason %d: %s", tmp, get_reason_str(tmp));
92 break;
93 }
94
95 if (!args->frame)
96 return;
97
98 printf(" [frame:");
99
100 print_frame:
101 for (i = 0; i < len; i++)
102 printf(" %.02x", frame[i]);
103 printf("]");
104}
105
f19444fe 106static void parse_cqm_event(struct nlattr **attrs)
7988b229
JO
107{
108 static struct nla_policy cqm_policy[NL80211_ATTR_CQM_MAX + 1] = {
109 [NL80211_ATTR_CQM_RSSI_THOLD] = { .type = NLA_U32 },
110 [NL80211_ATTR_CQM_RSSI_HYST] = { .type = NLA_U32 },
111 [NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT] = { .type = NLA_U32 },
112 };
113 struct nlattr *cqm[NL80211_ATTR_CQM_MAX + 1];
f19444fe 114 struct nlattr *cqm_attr = attrs[NL80211_ATTR_CQM];
7988b229 115
e5497f12 116 printf("CQM event: ");
7988b229 117
f19444fe
JB
118 if (!cqm_attr ||
119 nla_parse_nested(cqm, NL80211_ATTR_CQM_MAX, cqm_attr, cqm_policy)) {
7988b229
JO
120 printf("missing data!\n");
121 return;
122 }
123
124 if (cqm[NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT]) {
125 enum nl80211_cqm_rssi_threshold_event rssi_event;
19b80cd0 126 int32_t rssi_level = -1;
e5497f12
BG
127 bool found_one = false;
128
7988b229 129 rssi_event = nla_get_u32(cqm[NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT]);
19b80cd0
MT
130 if (cqm[NL80211_ATTR_CQM_RSSI_LEVEL])
131 rssi_level = nla_get_u32(cqm[NL80211_ATTR_CQM_RSSI_LEVEL]);
e5497f12
BG
132
133 switch (rssi_event) {
134 case NL80211_CQM_RSSI_THRESHOLD_EVENT_HIGH:
19b80cd0 135 printf("RSSI (%i dBm) went above threshold\n", rssi_level);
e5497f12
BG
136 found_one = true;
137 break;
138 case NL80211_CQM_RSSI_THRESHOLD_EVENT_LOW:
19b80cd0 139 printf("RSSI (%i dBm) went below threshold\n", rssi_level);
e5497f12
BG
140 found_one = true;
141 break;
142 case NL80211_CQM_RSSI_BEACON_LOSS_EVENT:
143 printf("Beacon loss detected\n");
144 found_one = true;
145 break;
146 }
147
148 if (!found_one)
149 printf("Unknown event type: %i\n", rssi_event);
a3ca7c69
BG
150 } else if (cqm[NL80211_ATTR_CQM_PKT_LOSS_EVENT]) {
151 if (attrs[NL80211_ATTR_MAC]) {
152 uint32_t frames;
153 char buf[3*6];
154
155 frames = nla_get_u32(cqm[NL80211_ATTR_CQM_PKT_LOSS_EVENT]);
156 mac_addr_n2a(buf, nla_data(attrs[NL80211_ATTR_MAC]));
157 printf("peer %s didn't ACK %d packets\n", buf, frames);
158 } else {
159 printf("PKT-LOSS-EVENT did not have MAC attribute!\n");
160 }
161 } else if (cqm[NL80211_ATTR_CQM_BEACON_LOSS_EVENT]) {
162 printf("beacon loss\n");
163 } else {
f19444fe 164 printf("unknown event\n");
a3ca7c69 165 }
7988b229
JO
166}
167
8612433d
JM
168static const char * key_type_str(enum nl80211_key_type key_type)
169{
170 static char buf[30];
171 switch (key_type) {
172 case NL80211_KEYTYPE_GROUP:
173 return "Group";
174 case NL80211_KEYTYPE_PAIRWISE:
175 return "Pairwise";
176 case NL80211_KEYTYPE_PEERKEY:
177 return "PeerKey";
178 default:
179 snprintf(buf, sizeof(buf), "unknown(%d)", key_type);
180 return buf;
181 }
182}
183
184static void parse_mic_failure(struct nlattr **attrs)
185{
186 printf("Michael MIC failure event:");
187
188 if (attrs[NL80211_ATTR_MAC]) {
189 char addr[3 * ETH_ALEN];
190 mac_addr_n2a(addr, nla_data(attrs[NL80211_ATTR_MAC]));
191 printf(" source MAC address %s", addr);
192 }
193
194 if (attrs[NL80211_ATTR_KEY_SEQ] &&
195 nla_len(attrs[NL80211_ATTR_KEY_SEQ]) == 6) {
196 unsigned char *seq = nla_data(attrs[NL80211_ATTR_KEY_SEQ]);
197 printf(" seq=%02x%02x%02x%02x%02x%02x",
198 seq[0], seq[1], seq[2], seq[3], seq[4], seq[5]);
199 }
200 if (attrs[NL80211_ATTR_KEY_TYPE]) {
201 enum nl80211_key_type key_type =
202 nla_get_u32(attrs[NL80211_ATTR_KEY_TYPE]);
203 printf(" Key Type %s", key_type_str(key_type));
204 }
205
206 if (attrs[NL80211_ATTR_KEY_IDX]) {
207 __u8 key_id = nla_get_u8(attrs[NL80211_ATTR_KEY_IDX]);
208 printf(" Key Id %d", key_id);
209 }
210
211 printf("\n");
212}
7988b229 213
819b78cc
JB
214static void parse_wowlan_wake_event(struct nlattr **attrs)
215{
d516c5bc
LC
216 struct nlattr *tb[NUM_NL80211_WOWLAN_TRIG],
217 *tb_match[NUM_NL80211_ATTR];
819b78cc
JB
218
219 printf("WoWLAN wakeup\n");
220 if (!attrs[NL80211_ATTR_WOWLAN_TRIGGERS]) {
221 printf("\twakeup not due to WoWLAN\n");
222 return;
223 }
224
225 nla_parse(tb, MAX_NL80211_WOWLAN_TRIG,
226 nla_data(attrs[NL80211_ATTR_WOWLAN_TRIGGERS]),
227 nla_len(attrs[NL80211_ATTR_WOWLAN_TRIGGERS]), NULL);
228
229 if (tb[NL80211_WOWLAN_TRIG_DISCONNECT])
230 printf("\t* was disconnected\n");
231 if (tb[NL80211_WOWLAN_TRIG_MAGIC_PKT])
232 printf("\t* magic packet received\n");
233 if (tb[NL80211_WOWLAN_TRIG_PKT_PATTERN])
234 printf("\t* pattern index: %u\n",
235 nla_get_u32(tb[NL80211_WOWLAN_TRIG_PKT_PATTERN]));
236 if (tb[NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE])
237 printf("\t* GTK rekey failure\n");
238 if (tb[NL80211_WOWLAN_TRIG_EAP_IDENT_REQUEST])
239 printf("\t* EAP identity request\n");
240 if (tb[NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE])
241 printf("\t* 4-way handshake\n");
242 if (tb[NL80211_WOWLAN_TRIG_RFKILL_RELEASE])
243 printf("\t* RF-kill released\n");
d516c5bc
LC
244 if (tb[NL80211_WOWLAN_TRIG_NET_DETECT_RESULTS]) {
245 struct nlattr *match, *freq;
246 int rem_nst, rem_nst2;
247
248 printf("\t* network detected\n");
249 nla_for_each_nested(match,
250 tb[NL80211_WOWLAN_TRIG_NET_DETECT_RESULTS],
251 rem_nst) {
b7e8163a
DS
252 nla_parse_nested(tb_match, NL80211_ATTR_MAX, match,
253 NULL);
d516c5bc
LC
254 printf("\t\tSSID: \"");
255 print_ssid_escaped(nla_len(tb_match[NL80211_ATTR_SSID]),
256 nla_data(tb_match[NL80211_ATTR_SSID]));
257 printf("\"");
258 if (tb_match[NL80211_ATTR_SCAN_FREQUENCIES]) {
259 printf(" freq(s):");
260 nla_for_each_nested(freq,
261 tb_match[NL80211_ATTR_SCAN_FREQUENCIES],
262 rem_nst2)
263 printf(" %d", nla_get_u32(freq));
264 }
265 printf("\n");
266 }
267 }
819b78cc
JB
268 if (tb[NL80211_WOWLAN_TRIG_WAKEUP_PKT_80211]) {
269 uint8_t *d = nla_data(tb[NL80211_WOWLAN_TRIG_WAKEUP_PKT_80211]);
270 int l = nla_len(tb[NL80211_WOWLAN_TRIG_WAKEUP_PKT_80211]);
271 int i;
272 printf("\t* packet (might be truncated): ");
273 for (i = 0; i < l; i++) {
274 if (i > 0)
275 printf(":");
276 printf("%.2x", d[i]);
277 }
278 printf("\n");
279 }
280 if (tb[NL80211_WOWLAN_TRIG_WAKEUP_PKT_8023]) {
281 uint8_t *d = nla_data(tb[NL80211_WOWLAN_TRIG_WAKEUP_PKT_8023]);
282 int l = nla_len(tb[NL80211_WOWLAN_TRIG_WAKEUP_PKT_8023]);
283 int i;
284 printf("\t* packet (might be truncated): ");
285 for (i = 0; i < l; i++) {
286 if (i > 0)
287 printf(":");
288 printf("%.2x", d[i]);
289 }
290 printf("\n");
291 }
292 if (tb[NL80211_WOWLAN_TRIG_WAKEUP_TCP_MATCH])
293 printf("\t* TCP connection wakeup received\n");
294 if (tb[NL80211_WOWLAN_TRIG_WAKEUP_TCP_CONNLOST])
295 printf("\t* TCP connection lost\n");
296 if (tb[NL80211_WOWLAN_TRIG_WAKEUP_TCP_NOMORETOKENS])
297 printf("\t* TCP connection ran out of tokens\n");
769eb9f7 298 if (tb[NL80211_WOWLAN_TRIG_UNPROTECTED_DEAUTH_DISASSOC])
1608dfa1 299 printf("\t* unprotected deauth/disassoc\n");
819b78cc
JB
300}
301
8e58fe92
JB
302extern struct vendor_event *__start_vendor_event[];
303extern struct vendor_event *__stop_vendor_event;
304
305// Dummy to force the section to exist
306VENDOR_EVENT(0xffffffff, 0xffffffff, NULL);
307
308static void parse_vendor_event(struct nlattr **attrs, bool dump)
309{
310 __u32 vendor_id, subcmd;
311 unsigned int i;
312
313 if (!attrs[NL80211_ATTR_VENDOR_ID] ||
314 !attrs[NL80211_ATTR_VENDOR_SUBCMD])
315 return;
316
317 vendor_id = nla_get_u32(attrs[NL80211_ATTR_VENDOR_ID]);
318 subcmd = nla_get_u32(attrs[NL80211_ATTR_VENDOR_SUBCMD]);
319
320 printf("vendor event %.6x:%d", vendor_id, subcmd);
321
322 for (i = 0; i < &__stop_vendor_event - __start_vendor_event; i++) {
323 struct vendor_event *ev = __start_vendor_event[i];
324
325 if (!ev)
326 continue;
327
328 if (ev->vendor_id != vendor_id)
329 continue;
330 if (ev->subcmd != subcmd)
331 continue;
332 if (!ev->callback)
333 continue;
334
335 ev->callback(vendor_id, subcmd, attrs[NL80211_ATTR_VENDOR_DATA]);
336 goto out;
337 }
338
339 if (dump && attrs[NL80211_ATTR_VENDOR_DATA])
340 iw_hexdump("vendor event",
341 nla_data(attrs[NL80211_ATTR_VENDOR_DATA]),
342 nla_len(attrs[NL80211_ATTR_VENDOR_DATA]));
343out:
344 printf("\n");
345}
346
7c4e86ca
RZ
347static void parse_nan_term(struct nlattr **attrs)
348{
349 struct nlattr *func[NL80211_NAN_FUNC_ATTR_MAX + 1];
350
351 static struct nla_policy
352 nan_func_policy[NL80211_NAN_FUNC_ATTR_MAX + 1] = {
353 [NL80211_NAN_FUNC_TYPE] = { .type = NLA_U8 },
354 [NL80211_NAN_FUNC_SERVICE_ID] = { },
355 [NL80211_NAN_FUNC_PUBLISH_TYPE] = { .type = NLA_U8 },
356 [NL80211_NAN_FUNC_PUBLISH_BCAST] = { .type = NLA_FLAG },
357 [NL80211_NAN_FUNC_SUBSCRIBE_ACTIVE] = { .type = NLA_FLAG },
358 [NL80211_NAN_FUNC_FOLLOW_UP_ID] = { .type = NLA_U8 },
359 [NL80211_NAN_FUNC_FOLLOW_UP_REQ_ID] = { .type = NLA_U8 },
360 [NL80211_NAN_FUNC_FOLLOW_UP_DEST] = { },
361 [NL80211_NAN_FUNC_CLOSE_RANGE] = { .type = NLA_FLAG },
362 [NL80211_NAN_FUNC_TTL] = { .type = NLA_U32 },
363 [NL80211_NAN_FUNC_SERVICE_INFO] = { },
364 [NL80211_NAN_FUNC_SRF] = { .type = NLA_NESTED },
365 [NL80211_NAN_FUNC_RX_MATCH_FILTER] = { .type = NLA_NESTED },
366 [NL80211_NAN_FUNC_TX_MATCH_FILTER] = { .type = NLA_NESTED },
367 [NL80211_NAN_FUNC_INSTANCE_ID] = { .type = NLA_U8},
368 };
369
370 if (!attrs[NL80211_ATTR_COOKIE]) {
371 printf("Bad NAN func termination format - cookie is missing\n");
372 return;
373 }
374
375 if (nla_parse_nested(func, NL80211_NAN_FUNC_ATTR_MAX,
376 attrs[NL80211_ATTR_NAN_FUNC],
377 nan_func_policy)) {
378 printf("NAN: failed to parse nan func\n");
379 return;
380 }
381
382 if (!func[NL80211_NAN_FUNC_INSTANCE_ID]) {
383 printf("Bad NAN func termination format-instance id missing\n");
384 return;
385 }
386
387 if (!func[NL80211_NAN_FUNC_TERM_REASON]) {
388 printf("Bad NAN func termination format - reason is missing\n");
389 return;
390 }
391 printf("NAN(cookie=0x%llx): Termination event: id = %d, reason = ",
392 (long long int)nla_get_u64(attrs[NL80211_ATTR_COOKIE]),
393 nla_get_u8(func[NL80211_NAN_FUNC_INSTANCE_ID]));
394 switch (nla_get_u8(func[NL80211_NAN_FUNC_TERM_REASON])) {
395 case NL80211_NAN_FUNC_TERM_REASON_USER_REQUEST:
396 printf("user request\n");
397 break;
398 case NL80211_NAN_FUNC_TERM_REASON_TTL_EXPIRED:
399 printf("expired\n");
400 break;
401 case NL80211_NAN_FUNC_TERM_REASON_ERROR:
402 printf("error\n");
403 break;
404 default:
405 printf("unknown\n");
406 }
407}
408
8ddb960e
JB
409static const char *ftm_fail_reason(unsigned int reason)
410{
411#define FTM_FAIL_REASON(x) case NL80211_PMSR_FTM_FAILURE_##x: return #x
412 switch (reason) {
413 FTM_FAIL_REASON(UNSPECIFIED);
414 FTM_FAIL_REASON(NO_RESPONSE);
415 FTM_FAIL_REASON(REJECTED);
416 FTM_FAIL_REASON(WRONG_CHANNEL);
417 FTM_FAIL_REASON(PEER_NOT_CAPABLE);
418 FTM_FAIL_REASON(INVALID_TIMESTAMP);
419 FTM_FAIL_REASON(PEER_BUSY);
420 FTM_FAIL_REASON(BAD_CHANGED_PARAMS);
421 default:
422 return "unknown";
423 }
424}
425
426static void parse_pmsr_ftm_data(struct nlattr *data)
427{
428 struct nlattr *ftm[NL80211_PMSR_FTM_RESP_ATTR_MAX + 1];
429
430 printf(" FTM");
431 nla_parse_nested(ftm, NL80211_PMSR_FTM_RESP_ATTR_MAX, data, NULL);
432
433 if (ftm[NL80211_PMSR_FTM_RESP_ATTR_FAIL_REASON]) {
434 printf(" failed: %s (%d)",
435 ftm_fail_reason(nla_get_u32(ftm[NL80211_PMSR_FTM_RESP_ATTR_FAIL_REASON])),
436 nla_get_u32(ftm[NL80211_PMSR_FTM_RESP_ATTR_FAIL_REASON]));
437 if (ftm[NL80211_PMSR_FTM_RESP_ATTR_BUSY_RETRY_TIME])
438 printf(" retry after %us",
439 nla_get_u32(ftm[NL80211_PMSR_FTM_RESP_ATTR_BUSY_RETRY_TIME]));
440 printf("\n");
441 return;
442 }
443
444 printf("\n");
445
446#define PFTM(tp, attr, sign) \
447 do { \
448 if (ftm[NL80211_PMSR_FTM_RESP_ATTR_##attr]) \
449 printf(" " #attr ": %lld\n", \
450 (sign long long)nla_get_##tp( \
451 ftm[NL80211_PMSR_FTM_RESP_ATTR_##attr])); \
452 } while (0)
453
454 PFTM(u32, BURST_INDEX, unsigned);
455 PFTM(u32, NUM_FTMR_ATTEMPTS, unsigned);
456 PFTM(u32, NUM_FTMR_SUCCESSES, unsigned);
457 PFTM(u8, NUM_BURSTS_EXP, unsigned);
458 PFTM(u8, BURST_DURATION, unsigned);
459 PFTM(u8, FTMS_PER_BURST, unsigned);
460 PFTM(u32, RSSI_AVG, signed);
461 PFTM(u32, RSSI_SPREAD, unsigned);
462 PFTM(u64, RTT_AVG, signed);
463 PFTM(u64, RTT_VARIANCE, unsigned);
464 PFTM(u64, RTT_SPREAD, unsigned);
465 PFTM(u64, DIST_AVG, signed);
466 PFTM(u64, DIST_VARIANCE, unsigned);
467 PFTM(u64, DIST_SPREAD, unsigned);
468
469 if (ftm[NL80211_PMSR_FTM_RESP_ATTR_TX_RATE]) {
470 char buf[100];
471
472 parse_bitrate(ftm[NL80211_PMSR_FTM_RESP_ATTR_TX_RATE],
473 buf, sizeof(buf));
474 printf(" TX bitrate: %s\n", buf);
475 }
476
477 if (ftm[NL80211_PMSR_FTM_RESP_ATTR_RX_RATE]) {
478 char buf[100];
479
480 parse_bitrate(ftm[NL80211_PMSR_FTM_RESP_ATTR_RX_RATE],
481 buf, sizeof(buf));
482 printf(" RX bitrate: %s\n", buf);
483 }
484
485 if (ftm[NL80211_PMSR_FTM_RESP_ATTR_LCI])
486 iw_hexdump(" LCI",
487 nla_data(ftm[NL80211_PMSR_FTM_RESP_ATTR_LCI]),
488 nla_len(ftm[NL80211_PMSR_FTM_RESP_ATTR_LCI]));
489
490 if (ftm[NL80211_PMSR_FTM_RESP_ATTR_CIVICLOC])
491 iw_hexdump(" civic location",
492 nla_data(ftm[NL80211_PMSR_FTM_RESP_ATTR_CIVICLOC]),
493 nla_len(ftm[NL80211_PMSR_FTM_RESP_ATTR_CIVICLOC]));
494}
495
496static const char *pmsr_status(unsigned int status)
497{
498#define PMSR_STATUS(x) case NL80211_PMSR_STATUS_##x: return #x
499 switch (status) {
500 PMSR_STATUS(SUCCESS);
501 PMSR_STATUS(REFUSED);
502 PMSR_STATUS(TIMEOUT);
503 PMSR_STATUS(FAILURE);
504 default:
505 return "unknown";
506 }
507#undef PMSR_STATUS
508}
509
510static void parse_pmsr_peer(struct nlattr *peer)
511{
512 struct nlattr *tb[NL80211_PMSR_PEER_ATTR_MAX + 1];
513 struct nlattr *resp[NL80211_PMSR_RESP_ATTR_MAX + 1];
514 struct nlattr *data[NL80211_PMSR_TYPE_MAX + 1];
515 char macbuf[6*3];
516 int err;
517
518 err = nla_parse_nested(tb, NL80211_PMSR_PEER_ATTR_MAX, peer, NULL);
519 if (err) {
520 printf(" Peer: failed to parse!\n");
521 return;
522 }
523
524 if (!tb[NL80211_PMSR_PEER_ATTR_ADDR]) {
525 printf(" Peer: no MAC address\n");
526 return;
527 }
528
529 mac_addr_n2a(macbuf, nla_data(tb[NL80211_PMSR_PEER_ATTR_ADDR]));
530 printf(" Peer %s:", macbuf);
531
532 if (!tb[NL80211_PMSR_PEER_ATTR_RESP]) {
533 printf(" no response!\n");
534 return;
535 }
536
537 err = nla_parse_nested(resp, NL80211_PMSR_RESP_ATTR_MAX,
538 tb[NL80211_PMSR_PEER_ATTR_RESP], NULL);
539 if (err) {
540 printf(" failed to parse response!\n");
541 return;
542 }
543
544 if (resp[NL80211_PMSR_RESP_ATTR_STATUS])
545 printf(" status=%d (%s)",
546 nla_get_u32(resp[NL80211_PMSR_RESP_ATTR_STATUS]),
547 pmsr_status(nla_get_u32(resp[NL80211_PMSR_RESP_ATTR_STATUS])));
548 if (resp[NL80211_PMSR_RESP_ATTR_HOST_TIME])
549 printf(" @%llu",
550 (unsigned long long)nla_get_u64(resp[NL80211_PMSR_RESP_ATTR_HOST_TIME]));
551 if (resp[NL80211_PMSR_RESP_ATTR_AP_TSF])
552 printf(" tsf=%llu",
553 (unsigned long long)nla_get_u64(resp[NL80211_PMSR_RESP_ATTR_AP_TSF]));
554 if (resp[NL80211_PMSR_RESP_ATTR_FINAL])
555 printf(" (final)");
556
557 if (!resp[NL80211_PMSR_RESP_ATTR_DATA]) {
558 printf(" - no data!\n");
559 return;
560 }
561
562 printf("\n");
563
564 nla_parse_nested(data, NL80211_PMSR_TYPE_MAX,
565 resp[NL80211_PMSR_RESP_ATTR_DATA], NULL);
566
567 if (data[NL80211_PMSR_TYPE_FTM])
568 parse_pmsr_ftm_data(data[NL80211_PMSR_TYPE_FTM]);
569}
570
571static void parse_pmsr_result(struct nlattr **tb,
572 struct print_event_args *pargs)
573{
574 struct nlattr *pmsr[NL80211_PMSR_ATTR_MAX + 1];
575 struct nlattr *peer;
576 unsigned long long cookie;
577 int err, i;
578
579 if (!tb[NL80211_ATTR_COOKIE]) {
580 printf("Peer measurements: no cookie!\n");
581 return;
582 }
583 cookie = nla_get_u64(tb[NL80211_ATTR_COOKIE]);
584
585 if (!tb[NL80211_ATTR_PEER_MEASUREMENTS]) {
586 printf("Peer measurements: no measurement data!\n");
587 return;
588 }
589
590 err = nla_parse_nested(pmsr, NL80211_PMSR_ATTR_MAX,
591 tb[NL80211_ATTR_PEER_MEASUREMENTS], NULL);
592 if (err) {
593 printf("Peer measurements: failed to parse measurement data!\n");
594 return;
595 }
596
597 if (!pmsr[NL80211_PMSR_ATTR_PEERS]) {
598 printf("Peer measurements: no peer data!\n");
599 return;
600 }
601
602 printf("Peer measurements (cookie %llu):\n", cookie);
603
604 nla_for_each_nested(peer, pmsr[NL80211_PMSR_ATTR_PEERS], i)
605 parse_pmsr_peer(peer);
606}
607
7c4e86ca
RZ
608static void parse_nan_match(struct nlattr **attrs)
609{
610 char macbuf[6*3];
611 __u64 cookie;
612 struct nlattr *match[NL80211_NAN_MATCH_ATTR_MAX + 1];
613 struct nlattr *local_func[NL80211_NAN_FUNC_ATTR_MAX + 1];
614 struct nlattr *peer_func[NL80211_NAN_FUNC_ATTR_MAX + 1];
615
616 static struct nla_policy
617 nan_match_policy[NL80211_NAN_MATCH_ATTR_MAX + 1] = {
618 [NL80211_NAN_MATCH_FUNC_LOCAL] = { .type = NLA_NESTED },
619 [NL80211_NAN_MATCH_FUNC_PEER] = { .type = NLA_NESTED },
620 };
621
622 static struct nla_policy
623 nan_func_policy[NL80211_NAN_FUNC_ATTR_MAX + 1] = {
624 [NL80211_NAN_FUNC_TYPE] = { .type = NLA_U8 },
625 [NL80211_NAN_FUNC_SERVICE_ID] = { },
626 [NL80211_NAN_FUNC_PUBLISH_TYPE] = { .type = NLA_U8 },
627 [NL80211_NAN_FUNC_PUBLISH_BCAST] = { .type = NLA_FLAG },
628 [NL80211_NAN_FUNC_SUBSCRIBE_ACTIVE] = { .type = NLA_FLAG },
629 [NL80211_NAN_FUNC_FOLLOW_UP_ID] = { .type = NLA_U8 },
630 [NL80211_NAN_FUNC_FOLLOW_UP_REQ_ID] = { .type = NLA_U8 },
631 [NL80211_NAN_FUNC_FOLLOW_UP_DEST] = { },
632 [NL80211_NAN_FUNC_CLOSE_RANGE] = { .type = NLA_FLAG },
633 [NL80211_NAN_FUNC_TTL] = { .type = NLA_U32 },
634 [NL80211_NAN_FUNC_SERVICE_INFO] = { },
635 [NL80211_NAN_FUNC_SRF] = { .type = NLA_NESTED },
636 [NL80211_NAN_FUNC_RX_MATCH_FILTER] = { .type = NLA_NESTED },
637 [NL80211_NAN_FUNC_TX_MATCH_FILTER] = { .type = NLA_NESTED },
638 [NL80211_NAN_FUNC_INSTANCE_ID] = { .type = NLA_U8},
639 };
640
641 cookie = nla_get_u64(attrs[NL80211_ATTR_COOKIE]);
642 mac_addr_n2a(macbuf, nla_data(attrs[NL80211_ATTR_MAC]));
643
644 if (nla_parse_nested(match, NL80211_NAN_MATCH_ATTR_MAX,
645 attrs[NL80211_ATTR_NAN_MATCH],
646 nan_match_policy)) {
647 printf("NAN: failed to parse nan match event\n");
648 return;
649 }
650
651 if (nla_parse_nested(local_func, NL80211_NAN_FUNC_ATTR_MAX,
652 match[NL80211_NAN_MATCH_FUNC_LOCAL],
653 nan_func_policy)) {
654 printf("NAN: failed to parse nan local func\n");
655 return;
656 }
657
658 if (nla_parse_nested(peer_func, NL80211_NAN_FUNC_ATTR_MAX,
659 match[NL80211_NAN_MATCH_FUNC_PEER],
660 nan_func_policy)) {
661 printf("NAN: failed to parse nan local func\n");
662 return;
663 }
664
665 if (nla_get_u8(peer_func[NL80211_NAN_FUNC_TYPE]) ==
666 NL80211_NAN_FUNC_PUBLISH) {
667 printf(
adfc1022 668 "NAN(cookie=0x%llx): DiscoveryResult, peer_id=%d, local_id=%d, peer_mac=%s",
7c4e86ca
RZ
669 cookie,
670 nla_get_u8(peer_func[NL80211_NAN_FUNC_INSTANCE_ID]),
671 nla_get_u8(local_func[NL80211_NAN_FUNC_INSTANCE_ID]),
672 macbuf);
673 if (peer_func[NL80211_NAN_FUNC_SERVICE_INFO])
adfc1022 674 printf(", info=%.*s",
7c4e86ca
RZ
675 nla_len(peer_func[NL80211_NAN_FUNC_SERVICE_INFO]),
676 (char *)nla_data(peer_func[NL80211_NAN_FUNC_SERVICE_INFO]));
677 } else if (nla_get_u8(peer_func[NL80211_NAN_FUNC_TYPE]) ==
678 NL80211_NAN_FUNC_SUBSCRIBE) {
679 printf(
adfc1022 680 "NAN(cookie=0x%llx): Replied, peer_id=%d, local_id=%d, peer_mac=%s",
7c4e86ca
RZ
681 cookie,
682 nla_get_u8(peer_func[NL80211_NAN_FUNC_INSTANCE_ID]),
683 nla_get_u8(local_func[NL80211_NAN_FUNC_INSTANCE_ID]),
684 macbuf);
685 } else if (nla_get_u8(peer_func[NL80211_NAN_FUNC_TYPE]) ==
686 NL80211_NAN_FUNC_FOLLOW_UP) {
687 printf(
adfc1022 688 "NAN(cookie=0x%llx): FollowUpReceive, peer_id=%d, local_id=%d, peer_mac=%s",
7c4e86ca
RZ
689 cookie,
690 nla_get_u8(peer_func[NL80211_NAN_FUNC_INSTANCE_ID]),
691 nla_get_u8(local_func[NL80211_NAN_FUNC_INSTANCE_ID]),
692 macbuf);
693 if (peer_func[NL80211_NAN_FUNC_SERVICE_INFO])
adfc1022 694 printf(", info=%.*s",
7c4e86ca
RZ
695 nla_len(peer_func[NL80211_NAN_FUNC_SERVICE_INFO]),
696 (char *)nla_data(peer_func[NL80211_NAN_FUNC_SERVICE_INFO]));
697 } else {
adfc1022 698 printf("NaN: Malformed event");
7c4e86ca 699 }
adfc1022
AO
700
701 printf("\n");
7c4e86ca
RZ
702}
703
d98f794f
MT
704static void parse_new_peer_candidate(struct nlattr **attrs)
705{
706 char macbuf[ETH_ALEN * 3];
707 int32_t sig_dbm;
708
709 printf("new peer candidate");
710 if (attrs[NL80211_ATTR_MAC]) {
711 mac_addr_n2a(macbuf, nla_data(attrs[NL80211_ATTR_MAC]));
712 printf(" %s", macbuf);
713 }
714 if (attrs[NL80211_ATTR_RX_SIGNAL_DBM]) {
715 sig_dbm = nla_get_u32(attrs[NL80211_ATTR_RX_SIGNAL_DBM]);
716 printf(" %d dBm", sig_dbm);
717 }
718
719 printf("\n");
720}
721
51bfd5a0 722static void parse_recv_interface(struct nlattr **attrs, int command)
7d17ba94 723{
51bfd5a0
MT
724 switch (command) {
725 case NL80211_CMD_NEW_INTERFACE:
726 printf("new interface");
727 break;
728 case NL80211_CMD_DEL_INTERFACE:
729 printf("del interface");
730 break;
731 case NL80211_CMD_SET_INTERFACE:
732 printf("set interface");
733 break;
734 default:
735 printf("unknown interface command (%i) received\n", command);
736 return;
737 }
7d17ba94
MT
738
739 if (attrs[NL80211_ATTR_IFTYPE]) {
740 printf(" type ");
741 switch (nla_get_u32(attrs[NL80211_ATTR_IFTYPE])) {
742 case NL80211_IFTYPE_STATION:
743 printf("station");
744 break;
745 case NL80211_IFTYPE_AP:
746 printf("access point");
747 break;
748 case NL80211_IFTYPE_MESH_POINT:
749 printf("mesh point");
750 break;
751 case NL80211_IFTYPE_ADHOC:
752 printf("IBSS");
753 break;
754 case NL80211_IFTYPE_MONITOR:
755 printf("monitor");
756 break;
757 case NL80211_IFTYPE_AP_VLAN:
758 printf("AP-VLAN");
759 break;
760 case NL80211_IFTYPE_WDS:
761 printf("WDS");
762 break;
763 case NL80211_IFTYPE_P2P_CLIENT:
764 printf("P2P-client");
765 break;
766 case NL80211_IFTYPE_P2P_GO:
767 printf("P2P-GO");
768 break;
769 case NL80211_IFTYPE_P2P_DEVICE:
770 printf("P2P-Device");
771 break;
772 case NL80211_IFTYPE_OCB:
773 printf("OCB");
774 break;
775 case NL80211_IFTYPE_NAN:
776 printf("NAN");
777 break;
778 default:
779 printf("unknown (%d)",
780 nla_get_u32(attrs[NL80211_ATTR_IFTYPE]));
781 break;
782 }
783 }
784
785 if (attrs[NL80211_ATTR_MESH_ID]) {
786 printf(" meshid ");
787 print_ssid_escaped(nla_len(attrs[NL80211_ATTR_MESH_ID]),
788 nla_data(attrs[NL80211_ATTR_MESH_ID]));
789 }
790
791 if (attrs[NL80211_ATTR_4ADDR]) {
792 printf(" use 4addr %d", nla_get_u8(attrs[NL80211_ATTR_4ADDR]));
793 }
794
795 printf("\n");
796}
797
47650ff8
MT
798static void parse_sta_opmode_changed(struct nlattr **attrs)
799{
800 char macbuf[ETH_ALEN*3];
801
802 printf("sta opmode changed");
803
804 if (attrs[NL80211_ATTR_MAC]) {
805 mac_addr_n2a(macbuf, nla_data(attrs[NL80211_ATTR_MAC]));
806 printf(" %s", macbuf);
807 }
808
809 if (attrs[NL80211_ATTR_SMPS_MODE])
810 printf(" smps mode %d", nla_get_u8(attrs[NL80211_ATTR_SMPS_MODE]));
811
812 if (attrs[NL80211_ATTR_CHANNEL_WIDTH])
813 printf(" chan width %d", nla_get_u8(attrs[NL80211_ATTR_CHANNEL_WIDTH]));
814
815 if (attrs[NL80211_ATTR_NSS])
816 printf(" nss %d", nla_get_u8(attrs[NL80211_ATTR_NSS]));
817
818 printf("\n");
819}
820
bb391d28
MT
821static void parse_ch_switch_notify(struct nlattr **attrs, int command)
822{
823 switch (command) {
824 case NL80211_CMD_CH_SWITCH_STARTED_NOTIFY:
825 printf("channel switch started");
826 break;
827 case NL80211_CMD_CH_SWITCH_NOTIFY:
828 printf("channel switch");
829 break;
830 default:
831 printf("unknown channel switch command (%i) received\n", command);
832 return;
833 }
834
835 if (attrs[NL80211_ATTR_CH_SWITCH_COUNT])
836 printf(" (count=%d)", nla_get_u32(attrs[NL80211_ATTR_CH_SWITCH_COUNT]));
837
838 if (attrs[NL80211_ATTR_WIPHY_FREQ])
839 printf(" freq=%d", nla_get_u32(attrs[NL80211_ATTR_WIPHY_FREQ]));
840
841 if (attrs[NL80211_ATTR_CHANNEL_WIDTH]) {
842 printf(" width=");
843 switch(nla_get_u32(attrs[NL80211_ATTR_CHANNEL_WIDTH])) {
844 case NL80211_CHAN_WIDTH_20_NOHT:
845 case NL80211_CHAN_WIDTH_20:
846 printf("\"20 MHz\"");
847 break;
848 case NL80211_CHAN_WIDTH_40:
849 printf("\"40 MHz\"");
850 break;
851 case NL80211_CHAN_WIDTH_80:
852 printf("\"80 MHz\"");
853 break;
854 case NL80211_CHAN_WIDTH_80P80:
855 printf("\"80+80 MHz\"");
856 break;
857 case NL80211_CHAN_WIDTH_160:
858 printf("\"160 MHz\"");
859 break;
860 case NL80211_CHAN_WIDTH_5:
861 printf("\"5 MHz\"");
862 break;
863 case NL80211_CHAN_WIDTH_10:
864 printf("\"10 MHz\"");
865 break;
866 default:
867 printf("\"unknown\"");
868 }
869 }
870
871 if (attrs[NL80211_ATTR_WIPHY_CHANNEL_TYPE]) {
872 printf(" type=");
873 switch(nla_get_u32(attrs[NL80211_ATTR_WIPHY_CHANNEL_TYPE])) {
874 case NL80211_CHAN_NO_HT:
875 printf("\"No HT\"");
876 break;
877 case NL80211_CHAN_HT20:
878 printf("\"HT20\"");
879 break;
880 case NL80211_CHAN_HT40MINUS:
881 printf("\"HT40-\"");
882 break;
883 case NL80211_CHAN_HT40PLUS:
884 printf("\"HT40+\"");
885 break;
886 }
887 }
888
889 if (attrs[NL80211_ATTR_CENTER_FREQ1])
890 printf(" freq1=%d", nla_get_u32(attrs[NL80211_ATTR_CENTER_FREQ1]));
891
892 if (attrs[NL80211_ATTR_CENTER_FREQ2])
893 printf(" freq2=%d", nla_get_u32(attrs[NL80211_ATTR_CENTER_FREQ2]));
894
895 printf("\n");
896}
897
56c60779
BG
898static void parse_assoc_comeback(struct nlattr **attrs, int command)
899{
900 __u32 timeout = 0;
901 char macbuf[6 * 3] = "<unset>";
902
903 if (attrs[NL80211_ATTR_MAC])
904 mac_addr_n2a(macbuf, nla_data(attrs[NL80211_ATTR_MAC]));
905
906 if (attrs[NL80211_ATTR_TIMEOUT])
907 timeout = nla_get_u32(attrs[NL80211_ATTR_TIMEOUT]);
908
909 printf("assoc comeback bssid %s timeout %d\n",
910 macbuf, timeout);
911}
912
957a0f07
JB
913static int print_event(struct nl_msg *msg, void *arg)
914{
915 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
748f8489 916 struct nlattr *tb[NL80211_ATTR_MAX + 1], *nst;
957a0f07
JB
917 struct print_event_args *args = arg;
918 char ifname[100];
919 char macbuf[6*3];
920 __u8 reg_type;
0168589d
LR
921 struct ieee80211_beacon_channel chan_before_beacon, chan_after_beacon;
922 __u32 wiphy_idx = 0;
748f8489 923 int rem_nst;
f1a666a6 924 __u16 status;
957a0f07 925
c3df363e 926 if (args->time || args->reltime || args->ctime) {
981b21ad
JB
927 unsigned long long usecs, previous;
928
929 previous = 1000000ULL * args->ts.tv_sec + args->ts.tv_usec;
930 gettimeofday(&args->ts, NULL);
931 usecs = 1000000ULL * args->ts.tv_sec + args->ts.tv_usec;
c3df363e 932
981b21ad
JB
933 if (args->reltime) {
934 if (!args->have_ts) {
935 usecs = 0;
936 args->have_ts = true;
937 } else
938 usecs -= previous;
939 }
c3df363e
MT
940
941 if (args->ctime) {
942 struct tm *tm = localtime(&args->ts.tv_sec);
943 char buf[255];
944
945 memset(buf, 0, 255);
946 strftime(buf, sizeof(buf), "%Y-%m-%d %H:%M:%S", tm);
d6fd2757 947 printf("[%s.%06lu]: ", buf, (unsigned long )args->ts.tv_usec);
c3df363e
MT
948 } else {
949 printf("%llu.%06llu: ", usecs/1000000, usecs % 1000000);
950 }
957a0f07
JB
951 }
952
953 nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
954 genlmsg_attrlen(gnlh, 0), NULL);
955
956 if (tb[NL80211_ATTR_IFINDEX] && tb[NL80211_ATTR_WIPHY]) {
51bfd5a0 957 /* if_indextoname may fails on delete interface/wiphy event */
88f9e988 958 if (if_indextoname(nla_get_u32(tb[NL80211_ATTR_IFINDEX]), ifname))
51bfd5a0
MT
959 printf("%s (phy #%d): ", ifname, nla_get_u32(tb[NL80211_ATTR_WIPHY]));
960 else
961 printf("phy #%d: ", nla_get_u32(tb[NL80211_ATTR_WIPHY]));
d8880179
JB
962 } else if (tb[NL80211_ATTR_WDEV] && tb[NL80211_ATTR_WIPHY]) {
963 printf("wdev 0x%llx (phy #%d): ",
964 (unsigned long long)nla_get_u64(tb[NL80211_ATTR_WDEV]),
965 nla_get_u32(tb[NL80211_ATTR_WIPHY]));
957a0f07
JB
966 } else if (tb[NL80211_ATTR_IFINDEX]) {
967 if_indextoname(nla_get_u32(tb[NL80211_ATTR_IFINDEX]), ifname);
968 printf("%s: ", ifname);
d8880179
JB
969 } else if (tb[NL80211_ATTR_WDEV]) {
970 printf("wdev 0x%llx: ", (unsigned long long)nla_get_u64(tb[NL80211_ATTR_WDEV]));
957a0f07
JB
971 } else if (tb[NL80211_ATTR_WIPHY]) {
972 printf("phy #%d: ", nla_get_u32(tb[NL80211_ATTR_WIPHY]));
973 }
974
975 switch (gnlh->cmd) {
976 case NL80211_CMD_NEW_WIPHY:
977 printf("renamed to %s\n", nla_get_string(tb[NL80211_ATTR_WIPHY_NAME]));
978 break;
e67be815
JB
979 case NL80211_CMD_TRIGGER_SCAN:
980 printf("scan started\n");
981 break;
957a0f07 982 case NL80211_CMD_NEW_SCAN_RESULTS:
748f8489 983 printf("scan finished:");
6ab936f0 984 /* fall through */
957a0f07 985 case NL80211_CMD_SCAN_ABORTED:
748f8489
JB
986 if (gnlh->cmd == NL80211_CMD_SCAN_ABORTED)
987 printf("scan aborted:");
988 if (tb[NL80211_ATTR_SCAN_FREQUENCIES]) {
989 nla_for_each_nested(nst, tb[NL80211_ATTR_SCAN_FREQUENCIES], rem_nst)
990 printf(" %d", nla_get_u32(nst));
991 printf(",");
992 }
993 if (tb[NL80211_ATTR_SCAN_SSIDS]) {
994 nla_for_each_nested(nst, tb[NL80211_ATTR_SCAN_SSIDS], rem_nst) {
995 printf(" \"");
996 print_ssid_escaped(nla_len(nst), nla_data(nst));
997 printf("\"");
998 }
999 }
1000 printf("\n");
957a0f07 1001 break;
3fce58aa
LC
1002 case NL80211_CMD_START_SCHED_SCAN:
1003 printf("scheduled scan started\n");
1004 break;
1005 case NL80211_CMD_SCHED_SCAN_STOPPED:
1006 printf("sched scan stopped\n");
1007 break;
1008 case NL80211_CMD_SCHED_SCAN_RESULTS:
1009 printf("got scheduled scan results\n");
1010 break;
02503184 1011 case NL80211_CMD_WIPHY_REG_CHANGE:
957a0f07 1012 case NL80211_CMD_REG_CHANGE:
88f9e988 1013 if (gnlh->cmd == NL80211_CMD_WIPHY_REG_CHANGE)
02503184
MT
1014 printf("regulatory domain change (phy): ");
1015 else
1016 printf("regulatory domain change: ");
957a0f07
JB
1017
1018 reg_type = nla_get_u8(tb[NL80211_ATTR_REG_TYPE]);
1019
1020 switch (reg_type) {
1021 case NL80211_REGDOM_TYPE_COUNTRY:
1022 printf("set to %s by %s request",
1023 nla_get_string(tb[NL80211_ATTR_REG_ALPHA2]),
1024 reg_initiator_to_string(nla_get_u8(tb[NL80211_ATTR_REG_INITIATOR])));
1025 if (tb[NL80211_ATTR_WIPHY])
1026 printf(" on phy%d", nla_get_u32(tb[NL80211_ATTR_WIPHY]));
1027 break;
1028 case NL80211_REGDOM_TYPE_WORLD:
1029 printf("set to world roaming by %s request",
1030 reg_initiator_to_string(nla_get_u8(tb[NL80211_ATTR_REG_INITIATOR])));
1031 break;
1032 case NL80211_REGDOM_TYPE_CUSTOM_WORLD:
1033 printf("custom world roaming rules in place on phy%d by %s request",
1034 nla_get_u32(tb[NL80211_ATTR_WIPHY]),
1035 reg_initiator_to_string(nla_get_u32(tb[NL80211_ATTR_REG_INITIATOR])));
1036 break;
1037 case NL80211_REGDOM_TYPE_INTERSECTION:
1038 printf("intersection used due to a request made by %s",
1039 reg_initiator_to_string(nla_get_u32(tb[NL80211_ATTR_REG_INITIATOR])));
1040 if (tb[NL80211_ATTR_WIPHY])
1041 printf(" on phy%d", nla_get_u32(tb[NL80211_ATTR_WIPHY]));
1042 break;
1043 default:
1044 printf("unknown source (upgrade this utility)");
1045 break;
1046 }
1047
1048 printf("\n");
0168589d
LR
1049 break;
1050 case NL80211_CMD_REG_BEACON_HINT:
1051
1052 wiphy_idx = nla_get_u32(tb[NL80211_ATTR_WIPHY]);
1053
1054 memset(&chan_before_beacon, 0, sizeof(chan_before_beacon));
1055 memset(&chan_after_beacon, 0, sizeof(chan_after_beacon));
1056
ce3b2ed9
JB
1057 if (parse_beacon_hint_chan(tb[NL80211_ATTR_FREQ_BEFORE],
1058 &chan_before_beacon))
1059 break;
1060 if (parse_beacon_hint_chan(tb[NL80211_ATTR_FREQ_AFTER],
1061 &chan_after_beacon))
1062 break;
0168589d
LR
1063
1064 if (chan_before_beacon.center_freq != chan_after_beacon.center_freq)
1065 break;
1066
1067 /* A beacon hint is sent _only_ if something _did_ change */
1068 printf("beacon hint:\n");
1069
1070 printf("phy%d %d MHz [%d]:\n",
1071 wiphy_idx,
1072 chan_before_beacon.center_freq,
1073 ieee80211_frequency_to_channel(chan_before_beacon.center_freq));
1074
f0c48e7b
IP
1075 if (chan_before_beacon.no_ir && !chan_after_beacon.no_ir) {
1076 if (chan_before_beacon.no_ibss && !chan_after_beacon.no_ibss)
1077 printf("\to Initiating radiation enabled\n");
1078 else
1079 printf("\to active scan enabled\n");
1080 } else if (chan_before_beacon.no_ibss && !chan_after_beacon.no_ibss) {
1081 printf("\to ibss enabled\n");
1082 }
0168589d 1083
cec6d6a7
JB
1084 break;
1085 case NL80211_CMD_NEW_STATION:
1086 mac_addr_n2a(macbuf, nla_data(tb[NL80211_ATTR_MAC]));
1087 printf("new station %s\n", macbuf);
957a0f07 1088 break;
27bf109b
AQ
1089 case NL80211_CMD_DEL_STATION:
1090 mac_addr_n2a(macbuf, nla_data(tb[NL80211_ATTR_MAC]));
1091 printf("del station %s\n", macbuf);
1092 break;
957a0f07
JB
1093 case NL80211_CMD_JOIN_IBSS:
1094 mac_addr_n2a(macbuf, nla_data(tb[NL80211_ATTR_MAC]));
1095 printf("IBSS %s joined\n", macbuf);
1096 break;
1097 case NL80211_CMD_AUTHENTICATE:
1098 printf("auth");
aea5dbd2
JB
1099 if (tb[NL80211_ATTR_FRAME])
1100 print_frame(args, tb[NL80211_ATTR_FRAME]);
1101 else if (tb[NL80211_ATTR_TIMED_OUT])
1102 printf(": timed out");
1103 else
1104 printf(": unknown event");
957a0f07
JB
1105 printf("\n");
1106 break;
1107 case NL80211_CMD_ASSOCIATE:
1108 printf("assoc");
aea5dbd2
JB
1109 if (tb[NL80211_ATTR_FRAME])
1110 print_frame(args, tb[NL80211_ATTR_FRAME]);
1111 else if (tb[NL80211_ATTR_TIMED_OUT])
1112 printf(": timed out");
1113 else
1114 printf(": unknown event");
957a0f07
JB
1115 printf("\n");
1116 break;
1117 case NL80211_CMD_DEAUTHENTICATE:
1118 printf("deauth");
1119 print_frame(args, tb[NL80211_ATTR_FRAME]);
1120 printf("\n");
1121 break;
1122 case NL80211_CMD_DISASSOCIATE:
1123 printf("disassoc");
1124 print_frame(args, tb[NL80211_ATTR_FRAME]);
1125 printf("\n");
1126 break;
99802e56
JB
1127 case NL80211_CMD_UNPROT_DEAUTHENTICATE:
1128 printf("unprotected deauth");
1129 print_frame(args, tb[NL80211_ATTR_FRAME]);
1130 printf("\n");
1131 break;
1132 case NL80211_CMD_UNPROT_DISASSOCIATE:
1133 printf("unprotected disassoc");
1134 print_frame(args, tb[NL80211_ATTR_FRAME]);
1135 printf("\n");
1136 break;
f1a666a6
JB
1137 case NL80211_CMD_CONNECT:
1138 status = 0;
27ea56b6
JB
1139 if (tb[NL80211_ATTR_TIMED_OUT])
1140 printf("timed out");
1141 else if (!tb[NL80211_ATTR_STATUS_CODE])
f1a666a6
JB
1142 printf("unknown connect status");
1143 else if (nla_get_u16(tb[NL80211_ATTR_STATUS_CODE]) == 0)
1144 printf("connected");
1145 else {
1146 status = nla_get_u16(tb[NL80211_ATTR_STATUS_CODE]);
1147 printf("failed to connect");
1148 }
1149 if (tb[NL80211_ATTR_MAC]) {
1150 mac_addr_n2a(macbuf, nla_data(tb[NL80211_ATTR_MAC]));
1151 printf(" to %s", macbuf);
1152 }
1153 if (status)
1154 printf(", status: %d: %s", status, get_status_str(status));
1155 printf("\n");
1156 break;
1157 case NL80211_CMD_ROAM:
1158 printf("roamed");
1159 if (tb[NL80211_ATTR_MAC]) {
1160 mac_addr_n2a(macbuf, nla_data(tb[NL80211_ATTR_MAC]));
1161 printf(" to %s", macbuf);
1162 }
1163 printf("\n");
1164 break;
1165 case NL80211_CMD_DISCONNECT:
1166 printf("disconnected");
1167 if (tb[NL80211_ATTR_DISCONNECTED_BY_AP])
1168 printf(" (by AP)");
1169 else
1170 printf(" (local request)");
1171 if (tb[NL80211_ATTR_REASON_CODE])
1172 printf(" reason: %d: %s", nla_get_u16(tb[NL80211_ATTR_REASON_CODE]),
1173 get_reason_str(nla_get_u16(tb[NL80211_ATTR_REASON_CODE])));
1174 printf("\n");
1175 break;
6829308d
JB
1176 case NL80211_CMD_REMAIN_ON_CHANNEL:
1177 printf("remain on freq %d (%dms, cookie %llx)\n",
1178 nla_get_u32(tb[NL80211_ATTR_WIPHY_FREQ]),
1179 nla_get_u32(tb[NL80211_ATTR_DURATION]),
1180 (unsigned long long)nla_get_u64(tb[NL80211_ATTR_COOKIE]));
1181 break;
1182 case NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL:
1183 printf("done with remain on freq %d (cookie %llx)\n",
1184 nla_get_u32(tb[NL80211_ATTR_WIPHY_FREQ]),
1185 (unsigned long long)nla_get_u64(tb[NL80211_ATTR_COOKIE]));
1186 break;
ce87a25d
MT
1187 case NL80211_CMD_FRAME_WAIT_CANCEL:
1188 printf("frame wait cancel on freq %d (cookie %llx)\n",
1189 nla_get_u32(tb[NL80211_ATTR_WIPHY_FREQ]),
1190 (unsigned long long)nla_get_u64(tb[NL80211_ATTR_COOKIE]));
1191 break;
7988b229 1192 case NL80211_CMD_NOTIFY_CQM:
f19444fe 1193 parse_cqm_event(tb);
7988b229 1194 break;
8612433d
JM
1195 case NL80211_CMD_MICHAEL_MIC_FAILURE:
1196 parse_mic_failure(tb);
1197 break;
cbff7089
JB
1198 case NL80211_CMD_FRAME_TX_STATUS:
1199 printf("mgmt TX status (cookie %llx): %s\n",
1200 (unsigned long long)nla_get_u64(tb[NL80211_ATTR_COOKIE]),
1201 tb[NL80211_ATTR_ACK] ? "acked" : "no ack");
1202 break;
cd64525e
MT
1203 case NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS:
1204 printf("ctrl. port TX status (cookie %llx): %s\n",
1205 (unsigned long long)nla_get_u64(tb[NL80211_ATTR_COOKIE]),
1206 tb[NL80211_ATTR_ACK] ? "acked" : "no ack");
1207 break;
0bf2c6a0 1208 case NL80211_CMD_PMKSA_CANDIDATE:
b6688cb8
JB
1209 printf("PMKSA candidate found\n");
1210 break;
819b78cc
JB
1211 case NL80211_CMD_SET_WOWLAN:
1212 parse_wowlan_wake_event(tb);
1213 break;
4310994d
BG
1214 case NL80211_CMD_PROBE_CLIENT:
1215 if (tb[NL80211_ATTR_MAC])
1216 mac_addr_n2a(macbuf, nla_data(tb[NL80211_ATTR_MAC]));
1217 else
1218 strcpy(macbuf, "??");
1219 printf("probe client %s (cookie %llx): %s\n",
1220 macbuf,
1221 (unsigned long long)nla_get_u64(tb[NL80211_ATTR_COOKIE]),
1222 tb[NL80211_ATTR_ACK] ? "acked" : "no ack");
1223 break;
e8b3b312 1224 case NL80211_CMD_VENDOR:
8e58fe92 1225 parse_vendor_event(tb, args->frame);
e8b3b312 1226 break;
03fb59d0
BB
1227 case NL80211_CMD_RADAR_DETECT: {
1228 enum nl80211_radar_event event_type;
1229 uint32_t freq;
1230
1231 if (!tb[NL80211_ATTR_RADAR_EVENT] ||
1232 !tb[NL80211_ATTR_WIPHY_FREQ]) {
1233 printf("BAD radar event\n");
1234 break;
1235 }
1236
1237 freq = nla_get_u32(tb[NL80211_ATTR_WIPHY_FREQ]);
1238 event_type = nla_get_u32(tb[NL80211_ATTR_RADAR_EVENT]);
1239
1240 switch (event_type) {
1241 case NL80211_RADAR_DETECTED:
1242 printf("%d MHz: radar detected\n", freq);
1243 break;
1244 case NL80211_RADAR_CAC_FINISHED:
1245 printf("%d MHz: CAC finished\n", freq);
1246 break;
1247 case NL80211_RADAR_CAC_ABORTED:
1248 printf("%d MHz: CAC was aborted\n", freq);
1249 break;
1250 case NL80211_RADAR_NOP_FINISHED:
1251 printf("%d MHz: NOP finished\n", freq);
1252 break;
7e067061
LB
1253 case NL80211_RADAR_PRE_CAC_EXPIRED:
1254 printf("%d MHz: PRE-CAC expired\n", freq);
1255 break;
1256 case NL80211_RADAR_CAC_STARTED:
1257 printf("%d MHz: CAC started\n", freq);
1258 break;
03fb59d0
BB
1259 default:
1260 printf("%d MHz: unknown radar event\n", freq);
1261 }
085f4f08 1262 }
085f4f08 1263 break;
a3ca7c69
BG
1264 case NL80211_CMD_DEL_WIPHY:
1265 printf("delete wiphy\n");
1266 break;
8ddb960e
JB
1267 case NL80211_CMD_PEER_MEASUREMENT_RESULT:
1268 parse_pmsr_result(tb, args);
1269 break;
1270 case NL80211_CMD_PEER_MEASUREMENT_COMPLETE:
1271 printf("peer measurement complete\n");
1272 break;
7c4e86ca
RZ
1273 case NL80211_CMD_DEL_NAN_FUNCTION:
1274 parse_nan_term(tb);
1275 break;
68257d0f 1276 case NL80211_CMD_NAN_MATCH:
7c4e86ca
RZ
1277 parse_nan_match(tb);
1278 break;
d98f794f
MT
1279 case NL80211_CMD_NEW_PEER_CANDIDATE:
1280 parse_new_peer_candidate(tb);
1281 break;
51bfd5a0 1282 case NL80211_CMD_NEW_INTERFACE:
7d17ba94 1283 case NL80211_CMD_SET_INTERFACE:
51bfd5a0
MT
1284 case NL80211_CMD_DEL_INTERFACE:
1285 parse_recv_interface(tb, gnlh->cmd);
7d17ba94 1286 break;
47650ff8
MT
1287 case NL80211_CMD_STA_OPMODE_CHANGED:
1288 parse_sta_opmode_changed(tb);
1289 break;
ce87a25d
MT
1290 case NL80211_CMD_STOP_AP:
1291 printf("stop ap\n");
1292 break;
bb391d28
MT
1293 case NL80211_CMD_CH_SWITCH_STARTED_NOTIFY:
1294 case NL80211_CMD_CH_SWITCH_NOTIFY:
1295 parse_ch_switch_notify(tb, gnlh->cmd);
1296 break;
56c60779
BG
1297 case NL80211_CMD_ASSOC_COMEBACK: /* 147 */
1298 parse_assoc_comeback(tb, gnlh->cmd);
1299 break;
957a0f07 1300 default:
7c712c89
JB
1301 printf("unknown event %d (%s)\n",
1302 gnlh->cmd, command_name(gnlh->cmd));
957a0f07
JB
1303 break;
1304 }
1305
374e8a26 1306 fflush(stdout);
957a0f07
JB
1307 return NL_SKIP;
1308}
1309
1310struct wait_event {
2e192cea 1311 int n_cmds, n_prints;
957a0f07 1312 const __u32 *cmds;
2e192cea 1313 const __u32 *prints;
957a0f07 1314 __u32 cmd;
7fabd346 1315 struct print_event_args *pargs;
957a0f07
JB
1316};
1317
1318static int wait_event(struct nl_msg *msg, void *arg)
1319{
1320 struct wait_event *wait = arg;
1321 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
1322 int i;
1323
2e192cea
JB
1324 if (wait->pargs) {
1325 for (i = 0; i < wait->n_prints; i++) {
1326 if (gnlh->cmd == wait->prints[i])
7e7c544f 1327 print_event(msg, wait->pargs);
957a0f07
JB
1328 }
1329 }
1330
2e192cea
JB
1331 for (i = 0; i < wait->n_cmds; i++) {
1332 if (gnlh->cmd == wait->cmds[i])
1333 wait->cmd = gnlh->cmd;
1334 }
1335
957a0f07
JB
1336 return NL_SKIP;
1337}
1338
ee374e4d 1339int __prepare_listen_events(struct nl80211_state *state)
957a0f07
JB
1340{
1341 int mcid, ret;
957a0f07
JB
1342
1343 /* Configuration multicast group */
1344 mcid = nl_get_multicast_id(state->nl_sock, "nl80211", "config");
1345 if (mcid < 0)
1346 return mcid;
1347
1348 ret = nl_socket_add_membership(state->nl_sock, mcid);
1349 if (ret)
1350 return ret;
1351
1352 /* Scan multicast group */
1353 mcid = nl_get_multicast_id(state->nl_sock, "nl80211", "scan");
1354 if (mcid >= 0) {
1355 ret = nl_socket_add_membership(state->nl_sock, mcid);
1356 if (ret)
1357 return ret;
1358 }
1359
1360 /* Regulatory multicast group */
1361 mcid = nl_get_multicast_id(state->nl_sock, "nl80211", "regulatory");
1362 if (mcid >= 0) {
1363 ret = nl_socket_add_membership(state->nl_sock, mcid);
1364 if (ret)
1365 return ret;
1366 }
1367
1368 /* MLME multicast group */
1369 mcid = nl_get_multicast_id(state->nl_sock, "nl80211", "mlme");
1370 if (mcid >= 0) {
1371 ret = nl_socket_add_membership(state->nl_sock, mcid);
1372 if (ret)
1373 return ret;
1374 }
1375
e8b3b312
JB
1376 mcid = nl_get_multicast_id(state->nl_sock, "nl80211", "vendor");
1377 if (mcid >= 0) {
1378 ret = nl_socket_add_membership(state->nl_sock, mcid);
1379 if (ret)
1380 return ret;
1381 }
1382
7c4e86ca
RZ
1383 mcid = nl_get_multicast_id(state->nl_sock, "nl80211", "nan");
1384 if (mcid >= 0) {
1385 ret = nl_socket_add_membership(state->nl_sock, mcid);
1386 if (ret)
1387 return ret;
1388 }
1389
105aed57
JB
1390 return 0;
1391}
1392
ee374e4d
JB
1393__u32 __do_listen_events(struct nl80211_state *state,
1394 const int n_waits, const __u32 *waits,
2e192cea 1395 const int n_prints, const __u32 *prints,
ee374e4d 1396 struct print_event_args *args)
105aed57
JB
1397{
1398 struct nl_cb *cb = nl_cb_alloc(iw_debug ? NL_CB_DEBUG : NL_CB_DEFAULT);
1399 struct wait_event wait_ev;
105aed57
JB
1400
1401 if (!cb) {
1402 fprintf(stderr, "failed to allocate netlink callbacks\n");
1403 return -ENOMEM;
1404 }
1405
957a0f07
JB
1406 /* no sequence checking for multicast messages */
1407 nl_cb_set(cb, NL_CB_SEQ_CHECK, NL_CB_CUSTOM, no_seq_check, NULL);
34b23014 1408 nl_cb_set(cb, NL_CB_VALID, NL_CB_CUSTOM, valid_handler, NULL);
957a0f07
JB
1409
1410 if (n_waits && waits) {
1411 wait_ev.cmds = waits;
1412 wait_ev.n_cmds = n_waits;
2e192cea
JB
1413 wait_ev.prints = prints;
1414 wait_ev.n_prints = n_prints;
7fabd346 1415 wait_ev.pargs = args;
34b23014 1416 register_handler(wait_event, &wait_ev);
7fabd346 1417 } else
34b23014 1418 register_handler(print_event, args);
957a0f07
JB
1419
1420 wait_ev.cmd = 0;
1421
1422 while (!wait_ev.cmd)
1423 nl_recvmsgs(state->nl_sock, cb);
1424
1425 nl_cb_put(cb);
1426
1427 return wait_ev.cmd;
1428}
1429
1430__u32 listen_events(struct nl80211_state *state,
1431 const int n_waits, const __u32 *waits)
1432{
ee374e4d
JB
1433 int ret;
1434
1435 ret = __prepare_listen_events(state);
1436 if (ret)
1437 return ret;
1438
2e192cea 1439 return __do_listen_events(state, n_waits, waits, 0, NULL, NULL);
957a0f07
JB
1440}
1441
1442static int print_events(struct nl80211_state *state,
957a0f07 1443 struct nl_msg *msg,
05514f95
JB
1444 int argc, char **argv,
1445 enum id_input id)
957a0f07
JB
1446{
1447 struct print_event_args args;
c3df363e 1448 int num_time_formats = 0;
ee374e4d 1449 int ret;
957a0f07
JB
1450
1451 memset(&args, 0, sizeof(args));
1452
1453 argc--;
1454 argv++;
1455
1456 while (argc > 0) {
1457 if (strcmp(argv[0], "-f") == 0)
1458 args.frame = true;
c3df363e
MT
1459 else if (strcmp(argv[0], "-t") == 0) {
1460 num_time_formats++;
957a0f07 1461 args.time = true;
c3df363e
MT
1462 } else if (strcmp(argv[0], "-T") == 0) {
1463 num_time_formats++;
1464 args.ctime = true;
1465 } else if (strcmp(argv[0], "-r") == 0) {
1466 num_time_formats++;
981b21ad 1467 args.reltime = true;
c3df363e 1468 } else
957a0f07
JB
1469 return 1;
1470 argc--;
1471 argv++;
1472 }
1473
c3df363e 1474 if (num_time_formats > 1)
981b21ad
JB
1475 return 1;
1476
957a0f07
JB
1477 if (argc)
1478 return 1;
1479
ee374e4d
JB
1480 ret = __prepare_listen_events(state);
1481 if (ret)
1482 return ret;
1483
2e192cea 1484 return __do_listen_events(state, 0, NULL, 0, NULL, &args);
957a0f07 1485}
e848afea 1486TOPLEVEL(event, "[-t|-T|-r] [-f]", 0, 0, CIB_NONE, print_events,
01ae06f9
JB
1487 "Monitor events from the kernel.\n"
1488 "-t - print timestamp\n"
c3df363e 1489 "-T - print absolute, human-readable timestamp\n"
68dd562b 1490 "-r - print relative timestamp\n"
01ae06f9 1491 "-f - print full frame for auth/assoc etc.");