]> git.ipfire.org Git - thirdparty/iw.git/blob - event.c
iw: remove cb from arguments and simplify valid handler
[thirdparty/iw.git] / event.c
1 #include <stdint.h>
2 #include <stdbool.h>
3 #include <net/if.h>
4 #include <errno.h>
5 #include "iw.h"
6
7 static int no_seq_check(struct nl_msg *msg, void *arg)
8 {
9 return NL_OK;
10 }
11
12 struct ieee80211_beacon_channel {
13 __u16 center_freq;
14 bool no_ir;
15 bool no_ibss;
16 };
17
18 static int parse_beacon_hint_chan(struct nlattr *tb,
19 struct ieee80211_beacon_channel *chan)
20 {
21 struct nlattr *tb_freq[NL80211_FREQUENCY_ATTR_MAX + 1];
22 static struct nla_policy beacon_freq_policy[NL80211_FREQUENCY_ATTR_MAX + 1] = {
23 [NL80211_FREQUENCY_ATTR_FREQ] = { .type = NLA_U32 },
24 [NL80211_FREQUENCY_ATTR_NO_IR] = { .type = NLA_FLAG },
25 [__NL80211_FREQUENCY_ATTR_NO_IBSS] = { .type = NLA_FLAG },
26 };
27
28 if (nla_parse_nested(tb_freq,
29 NL80211_FREQUENCY_ATTR_MAX,
30 tb,
31 beacon_freq_policy))
32 return -EINVAL;
33
34 chan->center_freq = nla_get_u32(tb_freq[NL80211_FREQUENCY_ATTR_FREQ]);
35
36 if (tb_freq[NL80211_FREQUENCY_ATTR_NO_IR])
37 chan->no_ir = true;
38 if (tb_freq[__NL80211_FREQUENCY_ATTR_NO_IBSS])
39 chan->no_ibss = true;
40
41 return 0;
42 }
43
44 static void print_frame(struct print_event_args *args, struct nlattr *attr)
45 {
46 uint8_t *frame;
47 size_t len;
48 int i;
49 char macbuf[6*3];
50 uint16_t tmp;
51
52 if (!attr)
53 printf(" [no frame]");
54
55 frame = nla_data(attr);
56 len = nla_len(attr);
57
58 if (len < 26) {
59 printf(" [invalid frame: ");
60 goto print_frame;
61 }
62
63 mac_addr_n2a(macbuf, frame + 10);
64 printf(" %s -> ", macbuf);
65 mac_addr_n2a(macbuf, frame + 4);
66 printf("%s", macbuf);
67
68 switch (frame[0] & 0xfc) {
69 case 0x10: /* assoc resp */
70 case 0x30: /* reassoc resp */
71 /* status */
72 tmp = (frame[27] << 8) + frame[26];
73 printf(" status: %d: %s", tmp, get_status_str(tmp));
74 break;
75 case 0x00: /* assoc req */
76 case 0x20: /* reassoc req */
77 break;
78 case 0xb0: /* auth */
79 /* status */
80 tmp = (frame[29] << 8) + frame[28];
81 printf(" status: %d: %s", tmp, get_status_str(tmp));
82 break;
83 case 0xa0: /* disassoc */
84 case 0xc0: /* deauth */
85 /* reason */
86 tmp = (frame[25] << 8) + frame[24];
87 printf(" reason %d: %s", tmp, get_reason_str(tmp));
88 break;
89 }
90
91 if (!args->frame)
92 return;
93
94 printf(" [frame:");
95
96 print_frame:
97 for (i = 0; i < len; i++)
98 printf(" %.02x", frame[i]);
99 printf("]");
100 }
101
102 static void parse_cqm_event(struct nlattr **attrs)
103 {
104 static struct nla_policy cqm_policy[NL80211_ATTR_CQM_MAX + 1] = {
105 [NL80211_ATTR_CQM_RSSI_THOLD] = { .type = NLA_U32 },
106 [NL80211_ATTR_CQM_RSSI_HYST] = { .type = NLA_U32 },
107 [NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT] = { .type = NLA_U32 },
108 };
109 struct nlattr *cqm[NL80211_ATTR_CQM_MAX + 1];
110 struct nlattr *cqm_attr = attrs[NL80211_ATTR_CQM];
111
112 printf("CQM event: ");
113
114 if (!cqm_attr ||
115 nla_parse_nested(cqm, NL80211_ATTR_CQM_MAX, cqm_attr, cqm_policy)) {
116 printf("missing data!\n");
117 return;
118 }
119
120 if (cqm[NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT]) {
121 enum nl80211_cqm_rssi_threshold_event rssi_event;
122 bool found_one = false;
123
124 rssi_event = nla_get_u32(cqm[NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT]);
125
126 switch (rssi_event) {
127 case NL80211_CQM_RSSI_THRESHOLD_EVENT_HIGH:
128 printf("RSSI went above threshold\n");
129 found_one = true;
130 break;
131 case NL80211_CQM_RSSI_THRESHOLD_EVENT_LOW:
132 printf("RSSI went below threshold\n");
133 found_one = true;
134 break;
135 case NL80211_CQM_RSSI_BEACON_LOSS_EVENT:
136 printf("Beacon loss detected\n");
137 found_one = true;
138 break;
139 }
140
141 if (!found_one)
142 printf("Unknown event type: %i\n", rssi_event);
143 } else if (cqm[NL80211_ATTR_CQM_PKT_LOSS_EVENT]) {
144 if (attrs[NL80211_ATTR_MAC]) {
145 uint32_t frames;
146 char buf[3*6];
147
148 frames = nla_get_u32(cqm[NL80211_ATTR_CQM_PKT_LOSS_EVENT]);
149 mac_addr_n2a(buf, nla_data(attrs[NL80211_ATTR_MAC]));
150 printf("peer %s didn't ACK %d packets\n", buf, frames);
151 } else {
152 printf("PKT-LOSS-EVENT did not have MAC attribute!\n");
153 }
154 } else if (cqm[NL80211_ATTR_CQM_BEACON_LOSS_EVENT]) {
155 printf("beacon loss\n");
156 } else {
157 printf("unknown event\n");
158 }
159 }
160
161 static const char * key_type_str(enum nl80211_key_type key_type)
162 {
163 static char buf[30];
164 switch (key_type) {
165 case NL80211_KEYTYPE_GROUP:
166 return "Group";
167 case NL80211_KEYTYPE_PAIRWISE:
168 return "Pairwise";
169 case NL80211_KEYTYPE_PEERKEY:
170 return "PeerKey";
171 default:
172 snprintf(buf, sizeof(buf), "unknown(%d)", key_type);
173 return buf;
174 }
175 }
176
177 static void parse_mic_failure(struct nlattr **attrs)
178 {
179 printf("Michael MIC failure event:");
180
181 if (attrs[NL80211_ATTR_MAC]) {
182 char addr[3 * ETH_ALEN];
183 mac_addr_n2a(addr, nla_data(attrs[NL80211_ATTR_MAC]));
184 printf(" source MAC address %s", addr);
185 }
186
187 if (attrs[NL80211_ATTR_KEY_SEQ] &&
188 nla_len(attrs[NL80211_ATTR_KEY_SEQ]) == 6) {
189 unsigned char *seq = nla_data(attrs[NL80211_ATTR_KEY_SEQ]);
190 printf(" seq=%02x%02x%02x%02x%02x%02x",
191 seq[0], seq[1], seq[2], seq[3], seq[4], seq[5]);
192 }
193 if (attrs[NL80211_ATTR_KEY_TYPE]) {
194 enum nl80211_key_type key_type =
195 nla_get_u32(attrs[NL80211_ATTR_KEY_TYPE]);
196 printf(" Key Type %s", key_type_str(key_type));
197 }
198
199 if (attrs[NL80211_ATTR_KEY_IDX]) {
200 __u8 key_id = nla_get_u8(attrs[NL80211_ATTR_KEY_IDX]);
201 printf(" Key Id %d", key_id);
202 }
203
204 printf("\n");
205 }
206
207 static void parse_wowlan_wake_event(struct nlattr **attrs)
208 {
209 struct nlattr *tb[NUM_NL80211_WOWLAN_TRIG],
210 *tb_match[NUM_NL80211_ATTR];
211
212 printf("WoWLAN wakeup\n");
213 if (!attrs[NL80211_ATTR_WOWLAN_TRIGGERS]) {
214 printf("\twakeup not due to WoWLAN\n");
215 return;
216 }
217
218 nla_parse(tb, MAX_NL80211_WOWLAN_TRIG,
219 nla_data(attrs[NL80211_ATTR_WOWLAN_TRIGGERS]),
220 nla_len(attrs[NL80211_ATTR_WOWLAN_TRIGGERS]), NULL);
221
222 if (tb[NL80211_WOWLAN_TRIG_DISCONNECT])
223 printf("\t* was disconnected\n");
224 if (tb[NL80211_WOWLAN_TRIG_MAGIC_PKT])
225 printf("\t* magic packet received\n");
226 if (tb[NL80211_WOWLAN_TRIG_PKT_PATTERN])
227 printf("\t* pattern index: %u\n",
228 nla_get_u32(tb[NL80211_WOWLAN_TRIG_PKT_PATTERN]));
229 if (tb[NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE])
230 printf("\t* GTK rekey failure\n");
231 if (tb[NL80211_WOWLAN_TRIG_EAP_IDENT_REQUEST])
232 printf("\t* EAP identity request\n");
233 if (tb[NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE])
234 printf("\t* 4-way handshake\n");
235 if (tb[NL80211_WOWLAN_TRIG_RFKILL_RELEASE])
236 printf("\t* RF-kill released\n");
237 if (tb[NL80211_WOWLAN_TRIG_NET_DETECT_RESULTS]) {
238 struct nlattr *match, *freq;
239 int rem_nst, rem_nst2;
240
241 printf("\t* network detected\n");
242 nla_for_each_nested(match,
243 tb[NL80211_WOWLAN_TRIG_NET_DETECT_RESULTS],
244 rem_nst) {
245 nla_parse(tb_match, NUM_NL80211_ATTR, nla_data(match),
246 nla_len(match),
247 NULL);
248 printf("\t\tSSID: \"");
249 print_ssid_escaped(nla_len(tb_match[NL80211_ATTR_SSID]),
250 nla_data(tb_match[NL80211_ATTR_SSID]));
251 printf("\"");
252 if (tb_match[NL80211_ATTR_SCAN_FREQUENCIES]) {
253 printf(" freq(s):");
254 nla_for_each_nested(freq,
255 tb_match[NL80211_ATTR_SCAN_FREQUENCIES],
256 rem_nst2)
257 printf(" %d", nla_get_u32(freq));
258 }
259 printf("\n");
260 }
261 }
262 if (tb[NL80211_WOWLAN_TRIG_WAKEUP_PKT_80211]) {
263 uint8_t *d = nla_data(tb[NL80211_WOWLAN_TRIG_WAKEUP_PKT_80211]);
264 int l = nla_len(tb[NL80211_WOWLAN_TRIG_WAKEUP_PKT_80211]);
265 int i;
266 printf("\t* packet (might be truncated): ");
267 for (i = 0; i < l; i++) {
268 if (i > 0)
269 printf(":");
270 printf("%.2x", d[i]);
271 }
272 printf("\n");
273 }
274 if (tb[NL80211_WOWLAN_TRIG_WAKEUP_PKT_8023]) {
275 uint8_t *d = nla_data(tb[NL80211_WOWLAN_TRIG_WAKEUP_PKT_8023]);
276 int l = nla_len(tb[NL80211_WOWLAN_TRIG_WAKEUP_PKT_8023]);
277 int i;
278 printf("\t* packet (might be truncated): ");
279 for (i = 0; i < l; i++) {
280 if (i > 0)
281 printf(":");
282 printf("%.2x", d[i]);
283 }
284 printf("\n");
285 }
286 if (tb[NL80211_WOWLAN_TRIG_WAKEUP_TCP_MATCH])
287 printf("\t* TCP connection wakeup received\n");
288 if (tb[NL80211_WOWLAN_TRIG_WAKEUP_TCP_CONNLOST])
289 printf("\t* TCP connection lost\n");
290 if (tb[NL80211_WOWLAN_TRIG_WAKEUP_TCP_NOMORETOKENS])
291 printf("\t* TCP connection ran out of tokens\n");
292 }
293
294 static int print_event(struct nl_msg *msg, void *arg)
295 {
296 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
297 struct nlattr *tb[NL80211_ATTR_MAX + 1], *nst;
298 struct print_event_args *args = arg;
299 char ifname[100];
300 char macbuf[6*3];
301 __u8 reg_type;
302 struct ieee80211_beacon_channel chan_before_beacon, chan_after_beacon;
303 __u32 wiphy_idx = 0;
304 int rem_nst;
305 __u16 status;
306
307 if (args->time || args->reltime) {
308 unsigned long long usecs, previous;
309
310 previous = 1000000ULL * args->ts.tv_sec + args->ts.tv_usec;
311 gettimeofday(&args->ts, NULL);
312 usecs = 1000000ULL * args->ts.tv_sec + args->ts.tv_usec;
313 if (args->reltime) {
314 if (!args->have_ts) {
315 usecs = 0;
316 args->have_ts = true;
317 } else
318 usecs -= previous;
319 }
320 printf("%llu.%06llu: ", usecs/1000000, usecs % 1000000);
321 }
322
323 nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
324 genlmsg_attrlen(gnlh, 0), NULL);
325
326 if (tb[NL80211_ATTR_IFINDEX] && tb[NL80211_ATTR_WIPHY]) {
327 if_indextoname(nla_get_u32(tb[NL80211_ATTR_IFINDEX]), ifname);
328 printf("%s (phy #%d): ", ifname, nla_get_u32(tb[NL80211_ATTR_WIPHY]));
329 } else if (tb[NL80211_ATTR_WDEV] && tb[NL80211_ATTR_WIPHY]) {
330 printf("wdev 0x%llx (phy #%d): ",
331 (unsigned long long)nla_get_u64(tb[NL80211_ATTR_WDEV]),
332 nla_get_u32(tb[NL80211_ATTR_WIPHY]));
333 } else if (tb[NL80211_ATTR_IFINDEX]) {
334 if_indextoname(nla_get_u32(tb[NL80211_ATTR_IFINDEX]), ifname);
335 printf("%s: ", ifname);
336 } else if (tb[NL80211_ATTR_WDEV]) {
337 printf("wdev 0x%llx: ", (unsigned long long)nla_get_u64(tb[NL80211_ATTR_WDEV]));
338 } else if (tb[NL80211_ATTR_WIPHY]) {
339 printf("phy #%d: ", nla_get_u32(tb[NL80211_ATTR_WIPHY]));
340 }
341
342 switch (gnlh->cmd) {
343 case NL80211_CMD_NEW_WIPHY:
344 printf("renamed to %s\n", nla_get_string(tb[NL80211_ATTR_WIPHY_NAME]));
345 break;
346 case NL80211_CMD_TRIGGER_SCAN:
347 printf("scan started\n");
348 break;
349 case NL80211_CMD_NEW_SCAN_RESULTS:
350 printf("scan finished:");
351 case NL80211_CMD_SCAN_ABORTED:
352 if (gnlh->cmd == NL80211_CMD_SCAN_ABORTED)
353 printf("scan aborted:");
354 if (tb[NL80211_ATTR_SCAN_FREQUENCIES]) {
355 nla_for_each_nested(nst, tb[NL80211_ATTR_SCAN_FREQUENCIES], rem_nst)
356 printf(" %d", nla_get_u32(nst));
357 printf(",");
358 }
359 if (tb[NL80211_ATTR_SCAN_SSIDS]) {
360 nla_for_each_nested(nst, tb[NL80211_ATTR_SCAN_SSIDS], rem_nst) {
361 printf(" \"");
362 print_ssid_escaped(nla_len(nst), nla_data(nst));
363 printf("\"");
364 }
365 }
366 printf("\n");
367 break;
368 case NL80211_CMD_START_SCHED_SCAN:
369 printf("scheduled scan started\n");
370 break;
371 case NL80211_CMD_SCHED_SCAN_STOPPED:
372 printf("sched scan stopped\n");
373 break;
374 case NL80211_CMD_SCHED_SCAN_RESULTS:
375 printf("got scheduled scan results\n");
376 break;
377 case NL80211_CMD_REG_CHANGE:
378 printf("regulatory domain change: ");
379
380 reg_type = nla_get_u8(tb[NL80211_ATTR_REG_TYPE]);
381
382 switch (reg_type) {
383 case NL80211_REGDOM_TYPE_COUNTRY:
384 printf("set to %s by %s request",
385 nla_get_string(tb[NL80211_ATTR_REG_ALPHA2]),
386 reg_initiator_to_string(nla_get_u8(tb[NL80211_ATTR_REG_INITIATOR])));
387 if (tb[NL80211_ATTR_WIPHY])
388 printf(" on phy%d", nla_get_u32(tb[NL80211_ATTR_WIPHY]));
389 break;
390 case NL80211_REGDOM_TYPE_WORLD:
391 printf("set to world roaming by %s request",
392 reg_initiator_to_string(nla_get_u8(tb[NL80211_ATTR_REG_INITIATOR])));
393 break;
394 case NL80211_REGDOM_TYPE_CUSTOM_WORLD:
395 printf("custom world roaming rules in place on phy%d by %s request",
396 nla_get_u32(tb[NL80211_ATTR_WIPHY]),
397 reg_initiator_to_string(nla_get_u32(tb[NL80211_ATTR_REG_INITIATOR])));
398 break;
399 case NL80211_REGDOM_TYPE_INTERSECTION:
400 printf("intersection used due to a request made by %s",
401 reg_initiator_to_string(nla_get_u32(tb[NL80211_ATTR_REG_INITIATOR])));
402 if (tb[NL80211_ATTR_WIPHY])
403 printf(" on phy%d", nla_get_u32(tb[NL80211_ATTR_WIPHY]));
404 break;
405 default:
406 printf("unknown source (upgrade this utility)");
407 break;
408 }
409
410 printf("\n");
411 break;
412 case NL80211_CMD_REG_BEACON_HINT:
413
414 wiphy_idx = nla_get_u32(tb[NL80211_ATTR_WIPHY]);
415
416 memset(&chan_before_beacon, 0, sizeof(chan_before_beacon));
417 memset(&chan_after_beacon, 0, sizeof(chan_after_beacon));
418
419 if (parse_beacon_hint_chan(tb[NL80211_ATTR_FREQ_BEFORE],
420 &chan_before_beacon))
421 break;
422 if (parse_beacon_hint_chan(tb[NL80211_ATTR_FREQ_AFTER],
423 &chan_after_beacon))
424 break;
425
426 if (chan_before_beacon.center_freq != chan_after_beacon.center_freq)
427 break;
428
429 /* A beacon hint is sent _only_ if something _did_ change */
430 printf("beacon hint:\n");
431
432 printf("phy%d %d MHz [%d]:\n",
433 wiphy_idx,
434 chan_before_beacon.center_freq,
435 ieee80211_frequency_to_channel(chan_before_beacon.center_freq));
436
437 if (chan_before_beacon.no_ir && !chan_after_beacon.no_ir) {
438 if (chan_before_beacon.no_ibss && !chan_after_beacon.no_ibss)
439 printf("\to Initiating radiation enabled\n");
440 else
441 printf("\to active scan enabled\n");
442 } else if (chan_before_beacon.no_ibss && !chan_after_beacon.no_ibss) {
443 printf("\to ibss enabled\n");
444 }
445
446 break;
447 case NL80211_CMD_NEW_STATION:
448 mac_addr_n2a(macbuf, nla_data(tb[NL80211_ATTR_MAC]));
449 printf("new station %s\n", macbuf);
450 break;
451 case NL80211_CMD_DEL_STATION:
452 mac_addr_n2a(macbuf, nla_data(tb[NL80211_ATTR_MAC]));
453 printf("del station %s\n", macbuf);
454 break;
455 case NL80211_CMD_JOIN_IBSS:
456 mac_addr_n2a(macbuf, nla_data(tb[NL80211_ATTR_MAC]));
457 printf("IBSS %s joined\n", macbuf);
458 break;
459 case NL80211_CMD_AUTHENTICATE:
460 printf("auth");
461 if (tb[NL80211_ATTR_FRAME])
462 print_frame(args, tb[NL80211_ATTR_FRAME]);
463 else if (tb[NL80211_ATTR_TIMED_OUT])
464 printf(": timed out");
465 else
466 printf(": unknown event");
467 printf("\n");
468 break;
469 case NL80211_CMD_ASSOCIATE:
470 printf("assoc");
471 if (tb[NL80211_ATTR_FRAME])
472 print_frame(args, tb[NL80211_ATTR_FRAME]);
473 else if (tb[NL80211_ATTR_TIMED_OUT])
474 printf(": timed out");
475 else
476 printf(": unknown event");
477 printf("\n");
478 break;
479 case NL80211_CMD_DEAUTHENTICATE:
480 printf("deauth");
481 print_frame(args, tb[NL80211_ATTR_FRAME]);
482 printf("\n");
483 break;
484 case NL80211_CMD_DISASSOCIATE:
485 printf("disassoc");
486 print_frame(args, tb[NL80211_ATTR_FRAME]);
487 printf("\n");
488 break;
489 case NL80211_CMD_UNPROT_DEAUTHENTICATE:
490 printf("unprotected deauth");
491 print_frame(args, tb[NL80211_ATTR_FRAME]);
492 printf("\n");
493 break;
494 case NL80211_CMD_UNPROT_DISASSOCIATE:
495 printf("unprotected disassoc");
496 print_frame(args, tb[NL80211_ATTR_FRAME]);
497 printf("\n");
498 break;
499 case NL80211_CMD_CONNECT:
500 status = 0;
501 if (!tb[NL80211_ATTR_STATUS_CODE])
502 printf("unknown connect status");
503 else if (nla_get_u16(tb[NL80211_ATTR_STATUS_CODE]) == 0)
504 printf("connected");
505 else {
506 status = nla_get_u16(tb[NL80211_ATTR_STATUS_CODE]);
507 printf("failed to connect");
508 }
509 if (tb[NL80211_ATTR_MAC]) {
510 mac_addr_n2a(macbuf, nla_data(tb[NL80211_ATTR_MAC]));
511 printf(" to %s", macbuf);
512 }
513 if (status)
514 printf(", status: %d: %s", status, get_status_str(status));
515 printf("\n");
516 break;
517 case NL80211_CMD_ROAM:
518 printf("roamed");
519 if (tb[NL80211_ATTR_MAC]) {
520 mac_addr_n2a(macbuf, nla_data(tb[NL80211_ATTR_MAC]));
521 printf(" to %s", macbuf);
522 }
523 printf("\n");
524 break;
525 case NL80211_CMD_DISCONNECT:
526 printf("disconnected");
527 if (tb[NL80211_ATTR_DISCONNECTED_BY_AP])
528 printf(" (by AP)");
529 else
530 printf(" (local request)");
531 if (tb[NL80211_ATTR_REASON_CODE])
532 printf(" reason: %d: %s", nla_get_u16(tb[NL80211_ATTR_REASON_CODE]),
533 get_reason_str(nla_get_u16(tb[NL80211_ATTR_REASON_CODE])));
534 printf("\n");
535 break;
536 case NL80211_CMD_REMAIN_ON_CHANNEL:
537 printf("remain on freq %d (%dms, cookie %llx)\n",
538 nla_get_u32(tb[NL80211_ATTR_WIPHY_FREQ]),
539 nla_get_u32(tb[NL80211_ATTR_DURATION]),
540 (unsigned long long)nla_get_u64(tb[NL80211_ATTR_COOKIE]));
541 break;
542 case NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL:
543 printf("done with remain on freq %d (cookie %llx)\n",
544 nla_get_u32(tb[NL80211_ATTR_WIPHY_FREQ]),
545 (unsigned long long)nla_get_u64(tb[NL80211_ATTR_COOKIE]));
546 break;
547 case NL80211_CMD_NOTIFY_CQM:
548 parse_cqm_event(tb);
549 break;
550 case NL80211_CMD_MICHAEL_MIC_FAILURE:
551 parse_mic_failure(tb);
552 break;
553 case NL80211_CMD_FRAME_TX_STATUS:
554 printf("mgmt TX status (cookie %llx): %s\n",
555 (unsigned long long)nla_get_u64(tb[NL80211_ATTR_COOKIE]),
556 tb[NL80211_ATTR_ACK] ? "acked" : "no ack");
557 break;
558 case NL80211_CMD_PMKSA_CANDIDATE:
559 printf("PMKSA candidate found\n");
560 break;
561 case NL80211_CMD_SET_WOWLAN:
562 parse_wowlan_wake_event(tb);
563 break;
564 case NL80211_CMD_PROBE_CLIENT:
565 if (tb[NL80211_ATTR_MAC])
566 mac_addr_n2a(macbuf, nla_data(tb[NL80211_ATTR_MAC]));
567 else
568 strcpy(macbuf, "??");
569 printf("probe client %s (cookie %llx): %s\n",
570 macbuf,
571 (unsigned long long)nla_get_u64(tb[NL80211_ATTR_COOKIE]),
572 tb[NL80211_ATTR_ACK] ? "acked" : "no ack");
573 break;
574 case NL80211_CMD_VENDOR:
575 printf("vendor event %.6x:%d\n",
576 nla_get_u32(tb[NL80211_ATTR_VENDOR_ID]),
577 nla_get_u32(tb[NL80211_ATTR_VENDOR_SUBCMD]));
578 if (args->frame && tb[NL80211_ATTR_VENDOR_DATA])
579 iw_hexdump("vendor event",
580 nla_data(tb[NL80211_ATTR_VENDOR_DATA]),
581 nla_len(tb[NL80211_ATTR_VENDOR_DATA]));
582 break;
583 case NL80211_CMD_RADAR_DETECT:
584 printf("radar event ");
585 if (tb[NL80211_ATTR_RADAR_EVENT]) {
586 switch (nla_get_u32(tb[NL80211_ATTR_RADAR_EVENT])) {
587 case NL80211_RADAR_DETECTED:
588 printf("(radar detected)");
589 break;
590 case NL80211_RADAR_CAC_FINISHED:
591 printf("(cac finished)");
592 break;
593 case NL80211_RADAR_CAC_ABORTED:
594 printf("(cac aborted)");
595 break;
596 case NL80211_RADAR_NOP_FINISHED:
597 printf("(nop finished)");
598 break;
599 default:
600 printf("(unknown)");
601 break;
602 };
603 } else {
604 printf("(unknown)");
605 }
606 printf("\n");
607 break;
608 case NL80211_CMD_DEL_WIPHY:
609 printf("delete wiphy\n");
610 break;
611 default:
612 printf("unknown event %d (%s)\n",
613 gnlh->cmd, command_name(gnlh->cmd));
614 break;
615 }
616
617 fflush(stdout);
618 return NL_SKIP;
619 }
620
621 struct wait_event {
622 int n_cmds;
623 const __u32 *cmds;
624 __u32 cmd;
625 struct print_event_args *pargs;
626 };
627
628 static int wait_event(struct nl_msg *msg, void *arg)
629 {
630 struct wait_event *wait = arg;
631 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
632 int i;
633
634 for (i = 0; i < wait->n_cmds; i++) {
635 if (gnlh->cmd == wait->cmds[i]) {
636 wait->cmd = gnlh->cmd;
637 if (wait->pargs)
638 print_event(msg, wait->pargs);
639 }
640 }
641
642 return NL_SKIP;
643 }
644
645 int __prepare_listen_events(struct nl80211_state *state)
646 {
647 int mcid, ret;
648
649 /* Configuration multicast group */
650 mcid = nl_get_multicast_id(state->nl_sock, "nl80211", "config");
651 if (mcid < 0)
652 return mcid;
653
654 ret = nl_socket_add_membership(state->nl_sock, mcid);
655 if (ret)
656 return ret;
657
658 /* Scan multicast group */
659 mcid = nl_get_multicast_id(state->nl_sock, "nl80211", "scan");
660 if (mcid >= 0) {
661 ret = nl_socket_add_membership(state->nl_sock, mcid);
662 if (ret)
663 return ret;
664 }
665
666 /* Regulatory multicast group */
667 mcid = nl_get_multicast_id(state->nl_sock, "nl80211", "regulatory");
668 if (mcid >= 0) {
669 ret = nl_socket_add_membership(state->nl_sock, mcid);
670 if (ret)
671 return ret;
672 }
673
674 /* MLME multicast group */
675 mcid = nl_get_multicast_id(state->nl_sock, "nl80211", "mlme");
676 if (mcid >= 0) {
677 ret = nl_socket_add_membership(state->nl_sock, mcid);
678 if (ret)
679 return ret;
680 }
681
682 mcid = nl_get_multicast_id(state->nl_sock, "nl80211", "vendor");
683 if (mcid >= 0) {
684 ret = nl_socket_add_membership(state->nl_sock, mcid);
685 if (ret)
686 return ret;
687 }
688
689 return 0;
690 }
691
692 __u32 __do_listen_events(struct nl80211_state *state,
693 const int n_waits, const __u32 *waits,
694 struct print_event_args *args)
695 {
696 struct nl_cb *cb = nl_cb_alloc(iw_debug ? NL_CB_DEBUG : NL_CB_DEFAULT);
697 struct wait_event wait_ev;
698
699 if (!cb) {
700 fprintf(stderr, "failed to allocate netlink callbacks\n");
701 return -ENOMEM;
702 }
703
704 /* no sequence checking for multicast messages */
705 nl_cb_set(cb, NL_CB_SEQ_CHECK, NL_CB_CUSTOM, no_seq_check, NULL);
706 nl_cb_set(cb, NL_CB_VALID, NL_CB_CUSTOM, valid_handler, NULL);
707
708 if (n_waits && waits) {
709 wait_ev.cmds = waits;
710 wait_ev.n_cmds = n_waits;
711 wait_ev.pargs = args;
712 register_handler(wait_event, &wait_ev);
713 } else
714 register_handler(print_event, args);
715
716 wait_ev.cmd = 0;
717
718 while (!wait_ev.cmd)
719 nl_recvmsgs(state->nl_sock, cb);
720
721 nl_cb_put(cb);
722
723 return wait_ev.cmd;
724 }
725
726 __u32 listen_events(struct nl80211_state *state,
727 const int n_waits, const __u32 *waits)
728 {
729 int ret;
730
731 ret = __prepare_listen_events(state);
732 if (ret)
733 return ret;
734
735 return __do_listen_events(state, n_waits, waits, NULL);
736 }
737
738 static int print_events(struct nl80211_state *state,
739 struct nl_msg *msg,
740 int argc, char **argv,
741 enum id_input id)
742 {
743 struct print_event_args args;
744 int ret;
745
746 memset(&args, 0, sizeof(args));
747
748 argc--;
749 argv++;
750
751 while (argc > 0) {
752 if (strcmp(argv[0], "-f") == 0)
753 args.frame = true;
754 else if (strcmp(argv[0], "-t") == 0)
755 args.time = true;
756 else if (strcmp(argv[0], "-r") == 0)
757 args.reltime = true;
758 else
759 return 1;
760 argc--;
761 argv++;
762 }
763
764 if (args.time && args.reltime)
765 return 1;
766
767 if (argc)
768 return 1;
769
770 ret = __prepare_listen_events(state);
771 if (ret)
772 return ret;
773
774 return __do_listen_events(state, 0, NULL, &args);
775 }
776 TOPLEVEL(event, "[-t] [-r] [-f]", 0, 0, CIB_NONE, print_events,
777 "Monitor events from the kernel.\n"
778 "-t - print timestamp\n"
779 "-r - print relative timstamp\n"
780 "-f - print full frame for auth/assoc etc.");