xref: /openbsd/usr.bin/netstat/net80211.c (revision e5eb4616)
1 /*	$OpenBSD: net80211.c,v 1.20 2021/12/05 22:36:19 deraadt Exp $	*/
2 
3 /*
4  * Copyright (c) 2005 Reyk Floeter <reyk@openbsd.org>
5  *
6  * Permission to use, copy, modify, and distribute this software for any
7  * purpose with or without fee is hereby granted, provided that the above
8  * copyright notice and this permission notice appear in all copies.
9  *
10  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
11  * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
12  * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
13  * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
14  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
15  * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
16  * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
17  */
18 
19 #include <sys/types.h>
20 #include <sys/socket.h>
21 #include <sys/ioctl.h>
22 
23 #include <net/if.h>
24 
25 #include <netinet/in.h>
26 #include <netinet/if_ether.h>
27 
28 #include <net80211/ieee80211.h>
29 #include <net80211/ieee80211_ioctl.h>
30 
31 #include <err.h>
32 #include <stdio.h>
33 #include <string.h>
34 #include <unistd.h>
35 #include "netstat.h"
36 
37 /*
38  * Dump IEEE802.11 per-interface statistics
39  */
40 void
net80211_ifstats(char * ifname)41 net80211_ifstats(char *ifname)
42 {
43 	struct ifreq ifr;
44 	struct ieee80211_stats stats;
45 	int s;
46 
47 #define	p(f, m)	printf(m, (unsigned long)stats.f, plural(stats.f))
48 
49 	if ((s = socket(AF_INET, SOCK_DGRAM, 0)) == -1)
50 		err(1, "socket(AF_INET)");
51 
52 	ifr.ifr_data = (caddr_t)&stats;
53 	strlcpy(ifr.ifr_name, ifname, sizeof ifr.ifr_name);
54 
55 	if (ioctl(s, SIOCG80211STATS, &ifr) == -1)
56 		err(1, "ioctl(SIOCG80211STATS)");
57 
58 	printf("ieee80211 on %s:\n", ifr.ifr_name);
59 
60 	p(is_rx_badversion, "\t%lu input packet%s with bad version\n");
61 	p(is_rx_tooshort, "\t%lu input packet%s too short\n");
62 	p(is_rx_wrongbss, "\t%lu input packet%s from wrong bssid\n");
63 	p(is_rx_dup, "\t%lu input packet duplicate%s discarded\n");
64 	p(is_rx_wrongdir, "\t%lu input packet%s with wrong direction\n");
65 	p(is_rx_mcastecho, "\t%lu input multicast echo packet%s discarded\n");
66 	p(is_rx_notassoc, "\t%lu input packet%s from unassociated station discarded\n");
67 	p(is_rx_nowep, "\t%lu input encrypted packet%s without wep/wpa config discarded\n");
68 	p(is_rx_unencrypted, "\t%lu input unencrypted packet%s with wep/wpa config discarded\n");
69 	p(is_rx_wepfail, "\t%lu input wep/wpa packet%s processing failed\n");
70 	p(is_rx_decap, "\t%lu input packet decapsulation%s failed\n");
71 	p(is_rx_mgtdiscard, "\t%lu input management packet%s discarded\n");
72 	p(is_rx_ctl, "\t%lu input control packet%s discarded\n");
73 	p(is_rx_rstoobig, "\t%lu input packet%s with truncated rate set\n");
74 	p(is_rx_elem_missing, "\t%lu input packet%s with missing elements\n");
75 	p(is_rx_elem_toobig, "\t%lu input packet%s with elements too big\n");
76 	p(is_rx_elem_toosmall, "\t%lu input packet%s with elements too small\n");
77 	p(is_rx_badchan, "\t%lu input packet%s with invalid channel\n");
78 	p(is_rx_chanmismatch, "\t%lu input packet%s with mismatched channel\n");
79 	p(is_rx_nodealloc, "\t%lu node allocation%s failed\n");
80 	p(is_rx_ssidmismatch, "\t%lu input packet%s with mismatched ssid\n");
81 	p(is_rx_auth_unsupported, "\t%lu input packet%s with unsupported auth algorithm\n");
82 	p(is_rx_auth_fail, "\t%lu input authentication%s failed\n");
83 	p(is_rx_assoc_bss, "\t%lu input association%s from wrong bssid\n");
84 	p(is_rx_assoc_notauth, "\t%lu input association%s without authentication\n");
85 	p(is_rx_assoc_capmismatch, "\t%lu input association%s with mismatched capabilities\n");
86 	p(is_rx_assoc_norate, "\t%lu input association%s without matching rates\n");
87 	p(is_rx_assoc_badrsnie, "\t%lu input association%s with bad rsn ie\n");
88 	p(is_rx_deauth, "\t%lu input deauthentication packet%s\n");
89 	p(is_rx_disassoc, "\t%lu input disassociation packet%s\n");
90 	p(is_rx_badsubtype, "\t%lu input packet%s with unknown subtype\n");
91 	p(is_rx_nombuf, "\t%lu input packet%s failed for lack of mbufs\n");
92 	p(is_rx_decryptcrc, "\t%lu input decryption%s failed on crc\n");
93 	p(is_rx_ahdemo_mgt, "\t%lu input ahdemo management packet%s discarded\n");
94 	p(is_rx_bad_auth, "\t%lu input packet%s with bad auth request\n");
95 	p(is_rx_eapol_key, "\t%lu input eapol-key packet%s\n");
96 	p(is_rx_eapol_badmic, "\t%lu input eapol-key packet%s with bad mic\n");
97 	p(is_rx_eapol_replay, "\t%lu input eapol-key packet%s replayed\n");
98 	p(is_rx_locmicfail, "\t%lu input packet%s with bad tkip mic\n");
99 	p(is_rx_remmicfail, "\t%lu input tkip mic failure notification%s\n");
100 	p(is_rx_unauth, "\t%lu input packet%s on unauthenticated port\n");
101 	p(is_tx_nombuf, "\t%lu output packet%s failed for lack of mbufs\n");
102 	p(is_tx_nonode, "\t%lu output packet%s failed for no nodes\n");
103 	p(is_tx_unknownmgt, "\t%lu output packet%s of unknown management type\n");
104 	p(is_tx_noauth, "\t%lu output packet%s on unauthenticated port\n");
105 	p(is_scan_active, "\t%lu active scan%s started\n");
106 	p(is_scan_passive, "\t%lu passive scan%s started\n");
107 	p(is_node_timeout, "\t%lu node%s timed out\n");
108 	p(is_crypto_nomem, "\t%lu failure%s with no memory for crypto ctx\n");
109 	p(is_ccmp_dec_errs, "\t%lu ccmp decryption error%s\n");
110 	p(is_ccmp_replays, "\t%lu ccmp replayed frame%s \n");
111 	p(is_cmac_icv_errs, "\t%lu cmac icv error%s\n");
112 	p(is_cmac_replays, "\t%lu cmac replayed frame%s\n");
113 	p(is_tkip_icv_errs, "\t%lu tkip icv error%s\n");
114 	p(is_tkip_replays, "\t%lu tkip replay%s\n");
115 	p(is_pbac_errs, "\t%lu pbac error%s\n");
116 	p(is_ht_nego_no_mandatory_mcs, "\t%lu HT negotiation failure%s because "
117 	    "peer does not support MCS 0-7\n");
118 	p(is_ht_nego_no_basic_mcs, "\t%lu HT negotiation failure%s because "
119 	    "we do not support basic MCS set\n");
120 	p(is_ht_nego_bad_crypto,
121 	    "\t%lu HT negotiation failure%s because peer uses bad crypto\n");
122 	p(is_ht_prot_change, "\t%lu HT protection change%s\n");
123 	p(is_ht_rx_ba_agreements, "\t%lu new input block ack agreement%s\n");
124 	p(is_ht_tx_ba_agreements, "\t%lu new output block ack agreement%s\n");
125 	p(is_ht_rx_frame_below_ba_winstart,
126 	    "\t%lu input frame%s below block ack window start\n");
127 	p(is_ht_rx_frame_above_ba_winend,
128 	    "\t%lu input frame%s above block ack window end\n");
129 	p(is_ht_rx_ba_window_slide, "\t%lu input block ack window slide%s\n");
130 	p(is_ht_rx_ba_window_jump, "\t%lu input block ack window jump%s\n");
131 	p(is_ht_rx_ba_no_buf, "\t%lu duplicate input block ack frame%s\n");
132 	p(is_ht_rx_ba_frame_lost,
133 	    "\t%lu expected input block ack frame%s never arrived\n");
134 	p(is_ht_rx_ba_window_gap_timeout,
135 	    "\t%lu input block ack window gap%s timed out\n");
136 	p(is_ht_rx_ba_timeout,
137 	    "\t%lu input block ack agreement%s timed out\n");
138 	p(is_ht_tx_ba_timeout,
139 	    "\t%lu output block ack agreement%s timed out\n");
140 
141 	close(s);
142 
143 #undef p
144 }
145