1 /* $OpenBSD: net80211.c,v 1.20 2021/12/05 22:36:19 deraadt Exp $ */ 2 3 /* 4 * Copyright (c) 2005 Reyk Floeter <reyk@openbsd.org> 5 * 6 * Permission to use, copy, modify, and distribute this software for any 7 * purpose with or without fee is hereby granted, provided that the above 8 * copyright notice and this permission notice appear in all copies. 9 * 10 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES 11 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF 12 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR 13 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES 14 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN 15 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF 16 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 17 */ 18 19 #include <sys/types.h> 20 #include <sys/socket.h> 21 #include <sys/ioctl.h> 22 23 #include <net/if.h> 24 25 #include <netinet/in.h> 26 #include <netinet/if_ether.h> 27 28 #include <net80211/ieee80211.h> 29 #include <net80211/ieee80211_ioctl.h> 30 31 #include <err.h> 32 #include <stdio.h> 33 #include <string.h> 34 #include <unistd.h> 35 #include "netstat.h" 36 37 /* 38 * Dump IEEE802.11 per-interface statistics 39 */ 40 void 41 net80211_ifstats(char *ifname) 42 { 43 struct ifreq ifr; 44 struct ieee80211_stats stats; 45 int s; 46 47 #define p(f, m) printf(m, (unsigned long)stats.f, plural(stats.f)) 48 49 if ((s = socket(AF_INET, SOCK_DGRAM, 0)) == -1) 50 err(1, "socket(AF_INET)"); 51 52 ifr.ifr_data = (caddr_t)&stats; 53 strlcpy(ifr.ifr_name, ifname, sizeof ifr.ifr_name); 54 55 if (ioctl(s, SIOCG80211STATS, &ifr) == -1) 56 err(1, "ioctl(SIOCG80211STATS)"); 57 58 printf("ieee80211 on %s:\n", ifr.ifr_name); 59 60 p(is_rx_badversion, "\t%lu input packet%s with bad version\n"); 61 p(is_rx_tooshort, "\t%lu input packet%s too short\n"); 62 p(is_rx_wrongbss, "\t%lu input packet%s from wrong bssid\n"); 63 p(is_rx_dup, "\t%lu input packet duplicate%s discarded\n"); 64 p(is_rx_wrongdir, "\t%lu input packet%s with wrong direction\n"); 65 p(is_rx_mcastecho, "\t%lu input multicast echo packet%s discarded\n"); 66 p(is_rx_notassoc, "\t%lu input packet%s from unassociated station discarded\n"); 67 p(is_rx_nowep, "\t%lu input encrypted packet%s without wep/wpa config discarded\n"); 68 p(is_rx_unencrypted, "\t%lu input unencrypted packet%s with wep/wpa config discarded\n"); 69 p(is_rx_wepfail, "\t%lu input wep/wpa packet%s processing failed\n"); 70 p(is_rx_decap, "\t%lu input packet decapsulation%s failed\n"); 71 p(is_rx_mgtdiscard, "\t%lu input management packet%s discarded\n"); 72 p(is_rx_ctl, "\t%lu input control packet%s discarded\n"); 73 p(is_rx_rstoobig, "\t%lu input packet%s with truncated rate set\n"); 74 p(is_rx_elem_missing, "\t%lu input packet%s with missing elements\n"); 75 p(is_rx_elem_toobig, "\t%lu input packet%s with elements too big\n"); 76 p(is_rx_elem_toosmall, "\t%lu input packet%s with elements too small\n"); 77 p(is_rx_badchan, "\t%lu input packet%s with invalid channel\n"); 78 p(is_rx_chanmismatch, "\t%lu input packet%s with mismatched channel\n"); 79 p(is_rx_nodealloc, "\t%lu node allocation%s failed\n"); 80 p(is_rx_ssidmismatch, "\t%lu input packet%s with mismatched ssid\n"); 81 p(is_rx_auth_unsupported, "\t%lu input packet%s with unsupported auth algorithm\n"); 82 p(is_rx_auth_fail, "\t%lu input authentication%s failed\n"); 83 p(is_rx_assoc_bss, "\t%lu input association%s from wrong bssid\n"); 84 p(is_rx_assoc_notauth, "\t%lu input association%s without authentication\n"); 85 p(is_rx_assoc_capmismatch, "\t%lu input association%s with mismatched capabilities\n"); 86 p(is_rx_assoc_norate, "\t%lu input association%s without matching rates\n"); 87 p(is_rx_assoc_badrsnie, "\t%lu input association%s with bad rsn ie\n"); 88 p(is_rx_deauth, "\t%lu input deauthentication packet%s\n"); 89 p(is_rx_disassoc, "\t%lu input disassociation packet%s\n"); 90 p(is_rx_badsubtype, "\t%lu input packet%s with unknown subtype\n"); 91 p(is_rx_nombuf, "\t%lu input packet%s failed for lack of mbufs\n"); 92 p(is_rx_decryptcrc, "\t%lu input decryption%s failed on crc\n"); 93 p(is_rx_ahdemo_mgt, "\t%lu input ahdemo management packet%s discarded\n"); 94 p(is_rx_bad_auth, "\t%lu input packet%s with bad auth request\n"); 95 p(is_rx_eapol_key, "\t%lu input eapol-key packet%s\n"); 96 p(is_rx_eapol_badmic, "\t%lu input eapol-key packet%s with bad mic\n"); 97 p(is_rx_eapol_replay, "\t%lu input eapol-key packet%s replayed\n"); 98 p(is_rx_locmicfail, "\t%lu input packet%s with bad tkip mic\n"); 99 p(is_rx_remmicfail, "\t%lu input tkip mic failure notification%s\n"); 100 p(is_rx_unauth, "\t%lu input packet%s on unauthenticated port\n"); 101 p(is_tx_nombuf, "\t%lu output packet%s failed for lack of mbufs\n"); 102 p(is_tx_nonode, "\t%lu output packet%s failed for no nodes\n"); 103 p(is_tx_unknownmgt, "\t%lu output packet%s of unknown management type\n"); 104 p(is_tx_noauth, "\t%lu output packet%s on unauthenticated port\n"); 105 p(is_scan_active, "\t%lu active scan%s started\n"); 106 p(is_scan_passive, "\t%lu passive scan%s started\n"); 107 p(is_node_timeout, "\t%lu node%s timed out\n"); 108 p(is_crypto_nomem, "\t%lu failure%s with no memory for crypto ctx\n"); 109 p(is_ccmp_dec_errs, "\t%lu ccmp decryption error%s\n"); 110 p(is_ccmp_replays, "\t%lu ccmp replayed frame%s \n"); 111 p(is_cmac_icv_errs, "\t%lu cmac icv error%s\n"); 112 p(is_cmac_replays, "\t%lu cmac replayed frame%s\n"); 113 p(is_tkip_icv_errs, "\t%lu tkip icv error%s\n"); 114 p(is_tkip_replays, "\t%lu tkip replay%s\n"); 115 p(is_pbac_errs, "\t%lu pbac error%s\n"); 116 p(is_ht_nego_no_mandatory_mcs, "\t%lu HT negotiation failure%s because " 117 "peer does not support MCS 0-7\n"); 118 p(is_ht_nego_no_basic_mcs, "\t%lu HT negotiation failure%s because " 119 "we do not support basic MCS set\n"); 120 p(is_ht_nego_bad_crypto, 121 "\t%lu HT negotiation failure%s because peer uses bad crypto\n"); 122 p(is_ht_prot_change, "\t%lu HT protection change%s\n"); 123 p(is_ht_rx_ba_agreements, "\t%lu new input block ack agreement%s\n"); 124 p(is_ht_tx_ba_agreements, "\t%lu new output block ack agreement%s\n"); 125 p(is_ht_rx_frame_below_ba_winstart, 126 "\t%lu input frame%s below block ack window start\n"); 127 p(is_ht_rx_frame_above_ba_winend, 128 "\t%lu input frame%s above block ack window end\n"); 129 p(is_ht_rx_ba_window_slide, "\t%lu input block ack window slide%s\n"); 130 p(is_ht_rx_ba_window_jump, "\t%lu input block ack window jump%s\n"); 131 p(is_ht_rx_ba_no_buf, "\t%lu duplicate input block ack frame%s\n"); 132 p(is_ht_rx_ba_frame_lost, 133 "\t%lu expected input block ack frame%s never arrived\n"); 134 p(is_ht_rx_ba_window_gap_timeout, 135 "\t%lu input block ack window gap%s timed out\n"); 136 p(is_ht_rx_ba_timeout, 137 "\t%lu input block ack agreement%s timed out\n"); 138 p(is_ht_tx_ba_timeout, 139 "\t%lu output block ack agreement%s timed out\n"); 140 141 close(s); 142 143 #undef p 144 } 145