Home | History | Annotate | Download | only in drivers

Lines Matching defs:nl80211

2  * Driver interaction with Linux nl80211/cfg80211
131 wpa_printf(MSG_ERROR, "nl80211: Failed to allocate netlink "
137 wpa_printf(MSG_ERROR, "nl80211: Failed to connect to generic "
602 /* nl80211 code */
662 "nl80211: %s->nl_recvmsgs failed: %d",
898 wpa_printf(MSG_DEBUG, "nl80211: Register beacons command "
915 wpa_printf(MSG_EXCESSIVE, "nl80211: Beacon event message available");
919 wpa_printf(MSG_INFO, "nl80211: %s->nl_recvmsgs failed: %d",
937 wpa_printf(MSG_DEBUG, "nl80211: Unexpected beacon event? (%d)",
1089 wpa_printf(MSG_DEBUG, "nl80211: Interface %s does not exist - ignore RTM_NEWLINK",
1095 wpa_printf(MSG_DEBUG, "nl80211: Mark if_removed=0 for %s based on RTM_NEWLINK event",
1115 wpa_printf(MSG_DEBUG, "nl80211: if_removed already set - ignore RTM_DELLINK event for %s",
1167 wpa_printf(MSG_DEBUG, "nl80211: Update ifindex for a removed "
1206 wpa_printf(MSG_DEBUG, "nl80211: Ignore RTM_NEWLINK event for foreign ifindex %d",
1257 wpa_printf(MSG_DEBUG, "nl80211: Ignore interface down "
1261 wpa_printf(MSG_DEBUG, "nl80211: Interface down");
1263 wpa_printf(MSG_DEBUG, "nl80211: Ignore interface down "
1287 wpa_printf(MSG_DEBUG, "nl80211: Ignore interface up "
1291 wpa_printf(MSG_DEBUG, "nl80211: Ignore interface up "
1295 nl80211: Ignore interface up "
1299 wpa_printf(MSG_DEBUG, "nl80211: Interface up");
1315 wpa_printf(MSG_DEBUG, "nl80211: Set IF_OPER_UP again based on ifi_flags and expected operstate");
1326 wpa_printf(MSG_DEBUG, "nl80211: Add ifindex %u for bridge %s",
1346 wpa_printf(MSG_DEBUG, "nl80211: Ignore RTM_DELLINK event for foreign ifindex %d",
1377 wpa_printf(MSG_DEBUG, "nl80211: Remove ifindex %u for bridge "
1390 wpa_printf(MSG_DEBUG, "nl80211: Authenticate event");
1393 wpa_printf(MSG_DEBUG, "nl80211: Too short association event "
1435 wpa_printf(MSG_DEBUG, "nl80211: Operating frequency for the "
1441 wpa_printf(MSG_DEBUG, "nl80211: Scan result fetch failed: ret=%d "
1456 wpa_printf(MSG_DEBUG, "nl80211: Associate event");
1459 wpa_printf(MSG_DEBUG, "nl80211: Too short association event "
1509 wpa_printf(MSG_DEBUG, "nl80211: Ignore connect event (cmd=%d) "
1515 wpa_printf(MSG_DEBUG, "nl80211: Connect event");
1517 wpa_printf(MSG_DEBUG, "nl80211: Roam event");
1566 wpa_printf(MSG_DEBUG, "nl80211: Ignore disconnect "
1574 wpa_printf(MSG_DEBUG, "nl80211: Ignore disconnect "
1578 wpa_printf(MSG_WARNING, "nl80211: Was expecting local "
1583 wpa_printf(MSG_DEBUG, "nl80211: Disconnect event");
1631 wpa_printf(MSG_DEBUG, "nl80211: Channel switch event");
1642 wpa_printf(MSG_WARNING, "nl80211: Unknown ifindex (%d) for channel switch, ignoring",
1668 wpa_printf(MSG_WARNING, "nl80211: Unknown secondary channel information - following channel definition calculations may fail");
1697 wpa_printf(MSG_DEBUG, "nl80211: MLME event %d; timeout with " MACSTR,
1724 wpa_printf(MSG_MSGDUMP, "nl80211: Frame event");
1727 wpa_printf(MSG_DEBUG, "nl80211: Too short management frame");
1743 "nl80211: RX frame sa=" MACSTR
1763 wpa_printf(MSG_DEBUG, "nl80211: Frame TX status event");
1771 wpa_printf(MSG_DEBUG, "nl80211: Action TX status:"
1804 wpa_printf(MSG_DEBUG, "nl80211: Deauthenticate event");
1806 wpa_printf(MSG_DEBUG, "nl80211: Disassociate event");
1822 wpa_printf(MSG_DEBUG, "nl80211: Ignore deauth/disassoc event from old AP " MACSTR " when already authenticating with " MACSTR,
1836 wpa_printf(MSG_DEBUG, "nl80211: Deauth received "
1862 wpa_printf(MSG_DEBUG, "nl80211: Ignore deauth event due to previous forced deauth-during-auth");
1871 wpa_printf(MSG_DEBUG, "nl80211: Ignore deauth event triggered due to own deauth request");
1874 wpa_printf(MSG_WARNING, "nl80211
1898 wpa_printf(MSG_DEBUG, "nl80211: Unprot Deauthenticate event");
1900 wpa_printf(MSG_DEBUG, "nl80211: Unprot Disassociate event");
1943 "nl80211: MLME event %d (%s) without frame data",
1951 wpa_printf(MSG_MSGDUMP, "nl80211: MLME event %d (%s) on %s("
1957 wpa_printf(MSG_MSGDUMP, "nl80211: MLME event %d (%s) on %s(" MACSTR
1965 wpa_printf(MSG_MSGDUMP, "nl80211: %s: Ignore MLME frame event "
1969 wpa_hexdump(MSG_MSGDUMP, "nl80211: MLME event frame",
2014 wpa_printf(MSG_DEBUG, "nl80211: MLME event Michael MIC failure");
2017 wpa_hexdump(MSG_DEBUG, "nl80211: Source MAC address",
2023 wpa_hexdump(MSG_DEBUG, "nl80211: TSC",
2030 wpa_printf(MSG_DEBUG, "nl80211: Key Type %d", key_type);
2038 wpa_printf(MSG_DEBUG, "nl80211: Key Id %d", key_id);
2051 wpa_printf(MSG_DEBUG, "nl80211: No address in IBSS joined "
2058 wpa_printf(MSG_DEBUG, "nl80211: IBSS " MACSTR " joined",
2063 wpa_printf(MSG_DEBUG, "nl80211: IBSS on frequency %u MHz",
2099 wpa_printf(MSG_DEBUG, "nl80211: Remain-on-channel event (cancel=%d "
2141 wpa_printf(MSG_DEBUG, "nl80211: FT event target_ap " MACSTR,
2161 wpa_printf(MSG_DEBUG, "nl80211: Scan results for missing "
2177 wpa_printf(MSG_DEBUG, "nl80211: Scan probed for SSID '%s'",
2205 wpa_printf(MSG_DEBUG, "nl80211: Scan included frequencies:%s",
2305 wpa_printf(MSG_DEBUG, "nl80211: survey data missing!");
2312 wpa_printf(MSG_DEBUG, "nl80211: failed to parse nested "
2374 wpa_printf(MSG_DEBUG, "nl80211: Survey data missing");
2381 wpa_printf(MSG_DEBUG, "nl80211: Failed to parse nested "
2450 wpa_printf(MSG_DEBUG, "nl80211: Ignore invalid CQM event");
2470 wpa_printf(MSG_DEBUG, "nl80211: Connection quality monitor "
2474 wpa_printf(MSG_DEBUG, "nl80211: Connection quality monitor "
2484 wpa_printf(MSG_DEBUG, "nl80211: Signal: %d dBm txrate: %d",
2491 wpa_printf(MSG_DEBUG, "nl80211: Noise: %d dBm",
2508 wpa_printf(MSG_DEBUG, "nl80211: New station " MACSTR, MAC2STR(addr));
2517 wpa_hexdump(MSG_DEBUG, "nl80211: Assoc Req IEs", ies, ies_len);
2540 wpa_printf(MSG_DEBUG, "nl80211: Delete station " MACSTR,
2589 wpa_printf(MSG_DEBUG, "nl80211: Rekey offload event for BSSID " MACSTR,
2593 wpa_hexdump(MSG_DEBUG, "nl80211: Rekey offload - Replay Counter",
2613 wpa_printf(MSG_DEBUG, "nl80211: PMKSA candidate event");
2640 wpa_printf(MSG_DEBUG, "nl80211: Probe client event");
2658 wpa_printf(MSG_DEBUG, "nl80211: TDLS operation event");
2667 wpa_printf(MSG_DEBUG, "nl80211: TDLS setup request for peer "
2672 wpa_printf(MSG_DEBUG, "nl80211: TDLS teardown request for peer "
2677 wpa_printf(MSG_DEBUG, "nl80211: Unsupported TDLS operatione "
2703 wpa_printf(MSG_DEBUG, "nl80211: Connect failed event");
2715 wpa_printf(MSG_DEBUG, "nl80211: Max client reached");
2719 wpa_printf(MSG_DEBUG, "nl80211: Blocked client " MACSTR
2777 wpa_printf(MSG_DEBUG, "nl80211: DFS event on freq %d MHz, ht: %d, offset: %d, width: %d, cf1: %dMHz, cf2: %dMHz",
2796 wpa_printf(MSG_DEBUG, "nl80211: Unknown radar event %d "
2836 wpa_printf(MSG_DEBUG, "nl80211: Ignored too short avoid frequency list (len=%u)",
2852 wpa_printf(MSG_DEBUG, "nl80211: Avoid frequency range: %u-%u",
2855 wpa_printf(MSG_DEBUG, "nl80211: Ignore invalid frequency range");
2877 "nl80211: Ignore unsupported QCA vendor event %u",
2902 wpa_printf(MSG_DEBUG, "nl80211: Vendor event: wiphy=%u vendor_id=0x%x subcmd=%u",
2908 wpa_hexdump(MSG_MSGDUMP, "nl80211: Vendor data", data, len);
2913 wpa_printf(MSG_DEBUG, "nl80211: Ignore vendor event for foreign wiphy %u (own: %d)",
2923 wpa_printf(MSG_DEBUG, "nl80211: Ignore unsupported vendor event");
2935 wpa_printf(MSG_DEBUG, "nl80211: Regulatory domain change");
2998 wpa_printf(MSG_DEBUG, "nl80211: Drv Event %d (%s) received for %s",
3011 wpa_dbg(drv->ctx, MSG_DEBUG, "nl80211: Scan trigger");
3020 wpa_printf(MSG_DEBUG, "nl80211: Do not indicate scan-start event due to internal scan_for_auth");
3026 wpa_dbg(drv->ctx, MSG_DEBUG, "nl80211: Sched scan started");
3030 wpa_dbg(drv->ctx, MSG_DEBUG, "nl80211: Sched scan stopped");
3036 "nl80211: New scan results available");
3045 "nl80211: New sched scan results available");
3050 wpa_dbg(drv->ctx, MSG_DEBUG, "nl80211: Scan aborted");
3114 wpa_printf(MSG_DEBUG, "nl80211: Regulatory beacon hint");
3154 wpa_dbg(drv->ctx, MSG_DEBUG, "nl80211: Ignored unknown event "
3181 "nl80211: Ignored event (cmd=%d) for foreign interface (ifindex %d)",
3185 wpa_printf(MSG_DEBUG, "nl80211: Process event on P2P device");
3193 "nl80211: Ignored event (cmd=%d) for foreign interface (wdev 0x%llx)",
3248 wpa_printf(MSG_DEBUG, "nl80211: BSS Event %d (%s) received for %s",
3268 wpa_printf(MSG_DEBUG, "nl80211: Ignored unknown event "
3283 wpa_printf(MSG_MSGDUMP, "nl80211: Event message available");
3287 wpa_printf(MSG_INFO, "nl80211: %s->nl_recvmsgs failed: %d",
3294 * wpa_driver_nl80211_set_country - ask nl80211 to set the regulatory domain
3299 * This asks nl80211 to set the regulatory domain for given
3338 wpa_printf(MSG_DEBUG, "nl80211: No country information available");
3606 wpa_printf(MSG_DEBUG, "nl80211: Supported cipher %02x-%02x-%02x:%d",
3665 wpa_printf(MSG_DEBUG, "nl80211: TDLS supported");
3669 wpa_printf(MSG_DEBUG, "nl80211: TDLS external setup");
3715 wpa_printf(MSG_DEBUG, "nl80211: Supports Probe Response offload in AP "
3788 wpa_printf(MSG_DEBUG, "nl80211: Using driver-based "
3794 wpa_printf(MSG_DEBUG, "nl80211: Using driver-based roaming");
3845 wpa_printf(MSG_DEBUG, "nl80211: Unexpected vendor data info");
3853 wpa_printf(MSG_DEBUG, "nl80211: Supported vendor command: vendor_id=0x%x subcmd=%u",
3865 wpa_printf(MSG_DEBUG, "nl80211: Unexpected vendor data info");
3869 wpa_printf(MSG_DEBUG, "nl80211: Supported vendor event: vendor_id=0x%x subcmd=%u",
3915 wpa_printf(MSG_INFO, "nl80211: Driver does not support "
3923 wpa_printf(MSG_DEBUG, "nl80211: Use separate P2P group "
3929 wpa_printf(MSG_DEBUG, "nl80211: Enable multi-channel "
4010 wpa_printf(MSG_DEBUG, "nl80211: Disable use_monitor "
4038 struct genl_family *nl80211 = NULL;
4042 wpa_printf(MSG_ERROR, "nl80211: Failed to allocate generic "
4047 nl80211 = genl_ctrl_search_by_name(cache, name);
4048 if (nl80211 == NULL)
4051 id = genl_family_get_id(nl80211);
4054 if (nl80211)
4055 genl_family_put(nl80211);
4071 wpa_printf(MSG_ERROR, "nl80211: Failed to allocate netlink "
4080 global->nl80211_id = genl_ctrl_resolve(global->nl, "nl80211");
4082 wpa_printf(MSG_ERROR, "nl80211: 'nl80211' generic netlink not "
4091 ret = nl_get_multicast_id(global, "nl80211", "scan");
4095 wpa_printf(MSG_ERROR, "nl80211: Could not add multicast "
4101 ret = nl_get_multicast_id(global, "nl80211", "mlme");
4105 wpa_printf(MSG_ERROR, "nl80211: Could not add multicast "
4111 ret = nl_get_multicast_id(global, "nl80211", "regulatory");
4115 wpa_printf(MSG_DEBUG, "nl80211: Could not add multicast "
4121 ret = nl_get_multicast_id(global, "nl80211", "vendor");
4125 wpa_printf(MSG_DEBUG, "nl80211: Could not add multicast "
4155 wpa_printf(MSG_ERROR, "nl80211: Failed to alloc cb struct");
4170 wpa_printf(MSG_DEBUG, "nl80211: RFKILL blocked");
4181 wpa_printf(MSG_DEBUG, "nl80211: RFKILL unblocked");
4183 wpa_printf(MSG_DEBUG, "nl80211: Could not set interface UP "
4324 wpa_printf(MSG_DEBUG, "nl80211: RFKILL status not available");
4344 "nl80211: wifi status sockopt failed\n");
4370 * wpa_driver_nl80211_init - Initialize nl80211 driver interface
4399 wpa_printf(MSG_DEBUG, "nl80211: Register frame type=0x%x (%s) nl_handle=%p match=%s",
4413 wpa_printf(MSG_DEBUG, "nl80211: Register frame command "
4416 wpa_hexdump(MSG_DEBUG, "nl80211: Register frame match",
4432 wpa_printf(MSG_DEBUG, "nl80211: Mgmt reporting "
4469 wpa_printf(MSG_DEBUG, "nl80211: Subscribe to mgmt frames with non-AP "
4579 wpa_printf(MSG_DEBUG, "nl80211: Register spurious class3 "
4612 wpa_printf(MSG_DEBUG, "nl80211: Subscribe to mgmt frames with AP "
4643 wpa_printf(MSG_DEBUG, "nl80211: Subscribe to mgmt frames with AP "
4665 wpa_printf(MSG_DEBUG, "nl80211: Unsubscribe mgmt frames handle %p "
4695 wpa_printf(MSG_DEBUG, "nl80211: Delete P2P Device %s (0x%llx): %s",
4724 wpa_printf(MSG_DEBUG, "nl80211: %s P2P Device %s (0x%llx): %s",
4773 wpa_printf(MSG_DEBUG, "nl80211: interface %s in phy %s",
4793 wpa_printf(MSG_ERROR, "nl80211: Could not configure driver mode");
4803 wpa_printf(MSG_ERROR, "nl80211: Could not set "
4810 wpa_printf(MSG_DEBUG, "nl80211: Could not yet enable "
4843 wpa_printf(MSG_DEBUG, "nl80211: Remove beacon (ifindex=%d)",
4856 * wpa_driver_nl80211_deinit - Deinitialize nl80211 driver interface
4857 * @bss: Pointer to private nl80211 data from wpa_driver_nl80211_init()
4877 wpa_printf(MSG_INFO, "nl80211: Failed to remove "
4883 wpa_printf(MSG_INFO, "nl80211: Failed to remove "
4987 wpa_hexdump_ascii(MSG_MSGDUMP, "nl80211: Scan SSID",
4998 wpa_hexdump(MSG_MSGDUMP, "nl80211: Scan extra IEs",
5011 wpa_printf(MSG_MSGDUMP, "nl80211: Scan frequency %u "
5025 wpa_printf(MSG_DEBUG, "nl80211: Add NL80211_SCAN_FLAG_FLUSH");
5031 "nl80211: Add NL80211_SCAN_FLAG_LOW_PRIORITY");
5060 wpa_dbg(drv->ctx, MSG_DEBUG, "nl80211: scan request");
5071 wpa_printf(MSG_DEBUG, "nl80211: P2P probe - mask SuppRates");
5093 wpa_printf(MSG_DEBUG, "nl80211: Scan trigger failed: ret=%d "
5159 wpa_dbg(drv->ctx, MSG_DEBUG, "nl80211: sched_scan request");
5184 "nl80211: Sched scan filter SSID",
5216 "nl80211: Sched scan RSSI filter %d dBm",
5230 wpa_printf(MSG_DEBUG, "nl80211: Sched scan start failed: "
5235 wpa_printf(MSG_DEBUG, "nl80211: Sched scan requested (ret=%d) - "
5272 wpa_printf(MSG_DEBUG, "nl80211: Sched scan stop failed: "
5277 wpa_printf(MSG_DEBUG, "nl80211: Sched scan stop sent (ret=%d)", ret);
5372 wpa_printf(MSG_DEBUG, "nl80211: Associated on %u MHz",
5379 wpa_printf(MSG_DEBUG, "nl80211: IBSS-joined on %u MHz",
5386 wpa_printf(MSG_DEBUG, "nl80211: Associated with "
5483 wpa_printf(MSG_DEBUG, "nl80211: Remove duplicated scan result "
5513 wpa_printf(MSG_DEBUG, "nl80211: Clear possible state "
5530 wpa_printf(MSG_DEBUG, "nl80211: Scan results "
5538 wpa_printf(MSG_DEBUG, "nl80211: Unknown BSSID"
5548 wpa_printf(MSG_DEBUG, "nl80211: Scan results "
5554 wpa_printf(MSG_DEBUG, "nl80211: Local state "
5561 wpa_printf(MSG_DEBUG, "nl80211: Local state "
5597 wpa_printf(MSG_DEBUG, "nl80211: Received scan results (%lu "
5602 wpa_printf(MSG_DEBUG, "nl80211: Scan result fetch failed: ret=%d "
5637 wpa_printf(MSG_DEBUG, "nl80211: Failed to get scan results");
5641 wpa_printf(MSG_DEBUG, "nl80211: Scan result dump");
5644 wpa_printf(MSG_DEBUG, "nl80211: %d/%d " MACSTR "%s%s",
5685 wpa_printf(MSG_ERROR, "nl80211: Unexpected encryption algorithm %d",
5690 wpa_printf(MSG_ERROR, "nl80211: Unsupported encryption algorithm %d",
5782 wpa_hexdump_key(MSG_DEBUG, "nl80211: KEY_DATA", key, key_len);
5789 wpa_hexdump(MSG_DEBUG, "nl80211: KEY_SEQ", seq, seq_len);
5819 wpa_printf(MSG_DEBUG, "nl80211: set_key failed; err=%d %s)",
5865 wpa_printf(MSG_DEBUG, "nl80211: set_key default failed; "
5991 "nl80211: MLME command failed: reason=%u ret=%d (%s)",
6015 * DEAUTH event, so ignore the event from NL80211.
6042 * DEAUTH event, so ignore the event from NL80211.
6128 wpa_printf(MSG_DEBUG, "nl80211: Authenticate (ifindex=%d)",
6198 "nl80211: MLME command failed (auth): ret=%d (%s)",
6208 wpa_printf(MSG_DEBUG, "nl80211: Retry authentication "
6237 wpa_printf(MSG_DEBUG, "nl80211: Trigger single "
6251 wpa_printf(MSG_DEBUG, "nl80211: Authentication retry "
6263 wpa_printf(MSG_DEBUG, "nl80211: Authentication request send "
6279 wpa_printf(MSG_DEBUG, "nl80211: Try to authenticate again");
6661 wpa_printf(MSG_DEBUG, "nl80211: Added 802.11b mode based on 802.11g "
6849 wpa_printf(MSG_DEBUG, "nl80211: No regulatory information "
6857 wpa_printf(MSG_DEBUG, "nl80211: Regulatory information - country=%s (%s)",
6861 wpa_printf(MSG_DEBUG, "nl80211: Regulatory information - country=%s",
6882 wpa_printf(MSG_DEBUG, "nl80211: %u-%u @ %u MHz %u mBm%s%s%s%s%s%s%s%s",
7013 wpa_printf(MSG_DEBUG, "nl80211: No monitor socket available "
7024 wpa_printf(MSG_INFO, "nl80211: sendmsg: %s", strerror(errno));
7044 "nl80211: send_frame - Use assoc_freq=%u for IBSS",
7048 wpa_printf(MSG_DEBUG, "nl80211: send_frame - Use bss->freq=%u",
7054 wpa_printf(MSG_DEBUG, "nl80211: send_frame(freq=%u bss->freq=%u) -> send_mntr",
7060 wpa_printf(MSG_DEBUG, "nl80211: send_frame -> send_frame_cmd");
7072 "nl80211: Update send_action_cookie from 0x%llx to 0x%llx",
7097 wpa_printf(MSG_DEBUG, "nl80211: send_mlme - da= " MACSTR
7112 wpa_printf(MSG_DEBUG, "nl80211: Use last_mgmt_freq=%d",
7123 wpa_printf(MSG_DEBUG, "nl80211: Use bss->freq=%d",
7149 wpa_printf(MSG_DEBUG, "nl80211: send_mlme -> send_frame");
7221 wpa_printf(MSG_DEBUG, "nl80211: Set %s ACL (num_mac_acl=%u)",
7244 wpa_printf(MSG_DEBUG, "nl80211: Failed to set MAC ACL: %d (%s)",
7275 wpa_printf(MSG_DEBUG, "nl80211: Set beacon (beacon_set=%d)",
7281 wpa_hexdump(MSG_DEBUG, "nl80211: Beacon head",
7284 wpa_hexdump(MSG_DEBUG, "nl80211: Beacon tail",
7287 wpa_printf(MSG_DEBUG, "nl80211: ifindex=%d", ifindex);
7289 wpa_printf(MSG_DEBUG, "nl80211: beacon_int=%d", params->beacon_int);
7291 wpa_printf(MSG_DEBUG, "nl80211: dtim_period=%d", params->dtim_period);
7293 wpa_hexdump_ascii(MSG_DEBUG, "nl80211: ssid",
7298 wpa_hexdump(MSG_DEBUG, "nl80211: proberesp (offload)",
7305 wpa_printf(MSG_DEBUG, "nl80211: hidden SSID not in use");
7310 wpa_printf(MSG_DEBUG, "nl80211: hidden SSID zero len");
7315 wpa_printf(MSG_DEBUG, "nl80211: hidden SSID zero contents");
7320 wpa_printf(MSG_DEBUG, "nl80211: privacy=%d", params->privacy);
7323 wpa_printf(MSG_DEBUG, "nl80211: auth_algs=0x%x", params->auth_algs);
7334 wpa_printf(MSG_DEBUG, "nl80211: wpa_version=0x%x", params->wpa_version);
7343 wpa_printf(MSG_DEBUG, "nl80211: key_mgmt_suites=0x%x",
7359 wpa_printf(MSG_DEBUG, "nl80211: pairwise_ciphers=0x%x",
7368 wpa_printf(MSG_DEBUG, "nl80211: group_cipher=0x%x",
7375 wpa_hexdump_buf(MSG_DEBUG, "nl80211: beacon_ies",
7381 wpa_hexdump_buf(MSG_DEBUG, "nl80211: proberesp_ies",
7388 wpa_hexdump_buf(MSG_DEBUG, "nl80211: assocresp_ies",
7396 wpa_printf(MSG_DEBUG, "nl80211: ap_max_inactivity=%d",
7404 wpa_printf(MSG_DEBUG, "nl80211: Beacon set failed: %d (%s)",
7414 "nl80211: Update BSS %s bandwidth: %d -> %d",
7420 "nl80211: Frequency set failed: %d (%s)",
7424 "nl80211: Frequency set succeeded for ht2040 coex");
7507 "nl80211: Set freq %d (ht_enabled=%d, vht_enabled=%d, bandwidth=%d MHz, cf1=%d MHz, cf2=%d MHz)",
7527 wpa_printf(MSG_DEBUG, "nl80211: Failed to set channel (freq=%d): "
7571 wpa_printf(MSG_DEBUG, "nl80211: %s STA " MACSTR,
7678 wpa_printf(MSG_DEBUG, "nl80211: NL80211_CMD_%s_STATION "
7706 wpa_printf(MSG_DEBUG, "nl80211: sta_remove -> DEL_STATION %s " MACSTR
7724 wpa_printf(MSG_DEBUG, "nl80211: Remove interface ifindex=%d", ifidx);
7787 wpa_printf(MSG_DEBUG, "nl80211: Create interface iftype %d (%s)",
7834 wpa_printf(MSG_DEBUG, "nl80211: New interface %s created: ifindex=%d",
7876 wpa_printf(MSG_DEBUG, "nl80211: Continue using existing interface %s",
7991 wpa_printf(MSG_ERROR, "nl80211: Monitor socket recv failed: %s",
7997 wpa_printf(MSG_INFO, "nl80211: received invalid radiotap frame");
8006 wpa_printf(MSG_INFO, "nl80211: received invalid radiotap frame (%d)",
8192 wpa_printf(MSG_ERROR, "nl80211: setsockopt(SO_ATTACH_FILTER) failed: %s",
8206 wpa_printf(MSG_DEBUG, "nl80211: Remove monitor interface: refcount=%d",
8233 wpa_printf(MSG_DEBUG, "nl80211: Re-use existing monitor interface: refcount=%d",
8264 wpa_printf(MSG_DEBUG, "nl80211: Driver does not support "
8280 wpa_printf(MSG_ERROR, "nl80211: socket[PF_PACKET,SOCK_RAW] failed: %s",
8292 wpa_printf(MSG_ERROR, "nl80211: monitor socket bind failed: %s",
8301 wpa_printf(MSG_ERROR, "nl80211: Failed to set socket priority: %s",
8308 wpa_printf(MSG_INFO, "nl80211: Could not register monitor read socket");
8324 wpa_printf(MSG_DEBUG, "nl80211: Setup AP(%s) - device_ap_sme=%d use_monitor=%d",
8350 wpa_printf(MSG_DEBUG, "nl80211: Failed to enable "
8363 wpa_printf(MSG_DEBUG, "nl80211: Teardown AP(%s) - device_ap_sme=%d use_monitor=%d",
8386 wpa_printf(MSG_DEBUG, "nl80211: No socket to send EAPOL");
8399 wpa_printf(MSG_ERROR, "nl80211: EAPOL TX: %s",
8427 wpa_printf(MSG_INFO, "nl80211: Failed to allocate EAPOL buffer(len=%lu)",
8538 wpa_printf(MSG_DEBUG, "nl80211: Setup AP operations for P2P "
8575 wpa_printf(MSG_DEBUG, "nl80211: Leave IBSS failed: ret=%d "
8581 wpa_printf(MSG_DEBUG, "nl80211: Leave IBSS request sent successfully");
8586 wpa_printf(MSG_INFO, "nl80211: Failed to set interface into "
8602 wpa_printf(MSG_DEBUG, "nl80211: Join IBSS (ifindex=%d)", drv->ifindex);
8605 wpa_printf(MSG_INFO, "nl80211: Failed to set interface into "
8666 wpa_printf(MSG_DEBUG, "nl80211: Join IBSS failed: ret=%d (%s)",
8670 wpa_printf(MSG_DEBUG, "nl80211: Retry IBSS join after "
8680 wpa_printf(MSG_DEBUG, "nl80211: Join IBSS request sent successfully");
8872 wpa_printf(MSG_DEBUG, "nl80211: Connect (ifindex=%d)", drv->ifindex);
8914 wpa_printf(MSG_DEBUG, "nl80211: MLME connect failed: ret=%d "
8919 wpa_printf(MSG_DEBUG, "nl80211: Connect request send successfully");
8939 wpa_printf(MSG_DEBUG, "nl80211: Explicitly "
8980 wpa_printf(MSG_DEBUG, "nl80211: Associate (ifindex=%d)",
8999 "nl80211: MLME command failed (assoc): ret=%d (%s)",
9005 wpa_printf(MSG_DEBUG, "nl80211: Association request send "
9020 wpa_printf(MSG_DEBUG, "nl80211: Set mode ifindex %d iftype %d (%s)",
9038 wpa_printf(MSG_DEBUG, "nl80211: Failed to set interface %d to mode %d:"
9070 wpa_printf(MSG_DEBUG, "nl80211: Interface already in "
9080 wpa_printf(MSG_DEBUG, "nl80211: Try mode change after setting "
9087 wpa_printf(MSG_DEBUG, "nl80211: Failed to set "
9101 "nl80211: Failed to set frequency on interface");
9109 "nl80211: Delaying mode set while interface going down");
9118 wpa_printf(MSG_DEBUG, "nl80211: Mode change succeeded while "
9128 "nl80211: Failed to set interface up after switching mode");
9134 wpa_printf(MSG_DEBUG, "nl80211: Interface mode change to %d "
9158 wpa_printf(MSG_DEBUG, "nl80211: Failed to register Action "
9184 wpa_printf(MSG_DEBUG, "nl80211: DFS offload capability: %u",
9231 wpa_printf(MSG_DEBUG, "nl80211: Do not indicate P2P_DEVICE support (p2p_device=1 driver param not specified)");
9268 wpa_printf(MSG_DEBUG, "nl80211: Set %s operstate %d->%d (%s)",
9286 wpa_printf(MSG_DEBUG, "nl80211: Skip set_supp_port(unauthorized) while not associated");
9290 wpa_printf(MSG_DEBUG, "nl80211: Set supplicant port %sauthorized for "
9315 wpa_printf(MSG_DEBUG, "nl80211: Failed to set STA flag: %d (%s)",
9412 wpa_printf(MSG_DEBUG, "nl80211: Failed to set RTS threshold %d: "
9445 wpa_printf(MSG_DEBUG, "nl80211: Failed to set fragmentation threshold "
9462 wpa_printf(MSG_DEBUG, "nl80211: flush -> DEL_STATION %s (all)",
9474 wpa_printf(MSG_DEBUG, "nl80211: Station flush failed: ret=%d "
9633 wpa_printf(MSG_DEBUG, "nl80211: %s[%d]: set_sta_vlan(" MACSTR
9648 wpa_printf(MSG_ERROR, "nl80211: NL80211_ATTR_STA_VLAN (addr="
9747 wpa_printf(MSG_DEBUG, "nl80211: if_indices[%d]:%s",
9757 wpa_printf(MSG_DEBUG, "nl80211: Add own interface ifindex %d",
9760 wpa_printf(MSG_DEBUG, "nl80211: ifindex %d already in the list",
9834 wpa_printf(MSG_DEBUG, "nl80211: Set WDS STA addr=" MACSTR
9849 wpa_printf(MSG_ERROR, "nl80211: Failed to set WDS STA "
9876 wpa_printf(MSG_ERROR, "nl80211: EAPOL recv failed: %s",
9901 wpa_printf(MSG_ERROR, "nl80211: Failed to add the "
9914 wpa_printf(MSG_DEBUG, "nl80211: Removing interface %s from "
9918 wpa_printf(MSG_ERROR, "nl80211: Failed to "
9926 wpa_printf(MSG_DEBUG, "nl80211: Adding interface %s into bridge %s",
9929 wpa_printf(MSG_ERROR, "nl80211: Failed to add interface %s "
9959 wpa_printf(MSG_DEBUG, "nl80211: Interface %s is in bridge %s",
9989 wpa_printf(MSG_ERROR, "nl80211: socket(PF_PACKET, SOCK_DGRAM, ETH_P_PAE) failed: %s",
9996 wpa_printf(MSG_INFO, "nl80211: Could not register read socket for eapol");
10075 wpa_printf(MSG_DEBUG, "nl80211: Assigned new P2P Interface Address "
10134 wpa_printf(MSG_ERROR, "nl80211: Failed to create a P2P Device interface %s",
10143 wpa_printf(MSG_DEBUG, "nl80211: New P2P Device interface %s (0x%llx) created",
10182 wpa_printf(MSG_DEBUG, "nl80211: Allocate new address "
10210 wpa_printf(MSG_ERROR, "nl80211: Failed to add the new "
10269 wpa_printf(MSG_DEBUG, "nl80211: %s(type=%d ifname=%s) ifindex=%d added_if=%d",
10286 wpa_printf(MSG_INFO, "nl80211: Failed to remove "
10292 wpa_printf(MSG_INFO, "nl80211: Failed to remove "
10300 wpa_printf(MSG_DEBUG, "nl80211: Not the first BSS - remove it");
10315 wpa_printf(MSG_INFO, "nl80211: %s - could not find "
10318 wpa_printf(MSG_DEBUG, "nl80211: First BSS - reassign context");
10330 wpa_printf(MSG_DEBUG, "nl80211: No second BSS to reassign context to");
10366 wpa_printf(MSG_MSGDUMP, "nl80211: CMD_FRAME freq=%u wait=%u no_cck=%d "
10392 wpa_printf(MSG_DEBUG, "nl80211: Frame command failed: ret=%d "
10397 wpa_printf(MSG_MSGDUMP, "nl80211: Frame TX command accepted%s; "
10423 wpa_printf(MSG_DEBUG, "nl80211: Send Action frame (ifindex=%d, "
10467 wpa_printf(MSG_DEBUG, "nl80211: Cancel TX frame wait: cookie=0x%llx",
10478 wpa_printf(MSG_DEBUG, "nl80211: wait cancel failed: ret=%d "
10511 wpa_printf(MSG_DEBUG, "nl80211: Remain-on-channel cookie "
10518 wpa_printf(MSG_DEBUG, "nl80211: Failed to request remain-on-channel "
10535 wpa_printf(MSG_DEBUG, "nl80211: No pending remain-on-channel "
10540 wpa_printf(MSG_DEBUG, "nl80211: Cancel remain-on-channel with cookie "
10559 wpa_printf(MSG_DEBUG, "nl80211: Failed to cancel remain-on-channel: "
10579 wpa_printf(MSG_DEBUG, "nl80211: Skip disabling of "
10583 wpa_printf(MSG_DEBUG, "nl80211: Disable Probe Request "
10591 wpa_printf(MSG_DEBUG, "nl80211: Probe Request reporting "
10599 wpa_printf(MSG_DEBUG, "nl80211: Enable Probe Request "
10657 wpa_printf(MSG_DEBUG, "nl80211: Set TX rates failed: ret=%d "
10724 wpa_printf(MSG_DEBUG, "nl80211: Failed to set interface up on resume event");
10739 wpa_printf(MSG_ERROR, "nl80211: Unsupported send_ft_action "
10783 wpa_printf(MSG_DEBUG, "nl80211: Signal monitor threshold=%d "
10889 wpa_printf(MSG_DEBUG, "nl80211: Get shared freq for PHY %s",
10899 wpa_printf(MSG_DEBUG, "nl80211: Found a match for PHY %s - %s "
10907 wpa_printf(MSG_DEBUG, "nl80211: Shared freq for PHY %s: %d",
10912 wpa_printf(MSG_DEBUG, "nl80211: No shared interface for "
10930 wpa_printf(MSG_DEBUG, "nl80211: driver param='%s'", param);
10939 wpa_printf(MSG_DEBUG, "nl80211: Use separate P2P group "
11005 wpa_printf(MSG_ERROR, "nl80211: socket(PF_INET,SOCK_DGRAM) failed: %s",
11024 wpa_printf(MSG_ERROR, "nl80211: %u interface(s) remain at "
11081 wpa_printf(MSG_DEBUG, "nl80211: Add PMKID for " MACSTR, MAC2STR(bssid));
11089 wpa_printf(MSG_DEBUG, "nl80211: Delete PMKID for " MACSTR,
11098 wpa_printf(MSG_DEBUG, "nl80211: Flush PMKIDs");
11161 wpa_printf(MSG_DEBUG, "nl80211: Freq survey dump event (freq=%d MHz noise=%d channel_time=%ld busy_time=%ld tx_time=%ld rx_time=%ld filled=%04x)",
11217 wpa_printf(MSG_ERROR, "nl80211: Invalid survey data");
11229 wpa_printf(MSG_EXCESSIVE, "nl80211: Ignoring survey data for freq %d MHz",
11266 wpa_printf(MSG_DEBUG, "nl80211: Fetch survey data");
11272 wpa_printf(MSG_ERROR, "nl80211: Failed to process survey data");
11409 wpa_printf(MSG_DEBUG, "nl80211: set_p2p_powersave (legacy_ps=%d "
11437 wpa_printf(MSG_DEBUG, "nl80211: Start radar detection (CAC) %d MHz (ht_enabled=%d, vht_enabled=%d, bandwidth=%d MHz, cf1=%d MHz, cf2=%d MHz)",
11442 wpa_printf(MSG_DEBUG, "nl80211: Driver does not support radar "
11504 wpa_printf(MSG_DEBUG, "nl80211: Failed to start radar detection: "
11539 * currently identical with the nl80211 enum
11858 wpa_printf(MSG_DEBUG, "nl80211: Updating FT IEs");
11866 wpa_printf(MSG_DEBUG, "nl80211: update_ft_ies failed "
12091 wpa_printf(MSG_DEBUG, "nl80211: Channel switch request (cs_count=%u block_tx=%u freq=%d width=%d cf1=%d cf2=%d)",
12098 wpa_printf(MSG_DEBUG, "nl80211: Driver does not support channel switch command");
12159 wpa_printf(MSG_DEBUG, "nl80211: switch_channel failed err=%d (%s)",
12168 wpa_printf(MSG_DEBUG, "nl80211: Could not build channel switch request");
12183 wpa_printf(MSG_INFO, "nl80211: insufficient buffer space for reply");
12214 wpa_printf(MSG_INFO, "nl80211: Vendor command: insufficient buffer space for reply");
12247 wpa_printf(MSG_DEBUG, "nl80211: command failed err=%d",
12263 wpa_printf(MSG_DEBUG, "nl80211: vendor command failed err=%d",
12285 wpa_hexdump(MSG_DEBUG, "nl80211: Setting QoS Map",
12294 wpa_printf(MSG_DEBUG, "nl80211: Setting QoS Map failed");
12317 wpa_printf(MSG_DEBUG, "nl80211: Setting wowlan");
12345 wpa_printf(MSG_DEBUG, "nl80211: Setting wowlan failed");
12356 .name = "nl80211",
12357 .desc = "Linux nl80211/cfg80211",