1  /*
2   * Copyright (c) 2014-2019,2021 The Linux Foundation. All rights reserved.
3   * Copyright (c) 2022-2023 Qualcomm Innovation Center, Inc. All rights reserved.
4   *
5   * Permission to use, copy, modify, and/or distribute this software for
6   * any purpose with or without fee is hereby granted, provided that the
7   * above copyright notice and this permission notice appear in all
8   * copies.
9   *
10   * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL
11   * WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED
12   * WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE
13   * AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
14   * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
15   * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER
16   * TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
17   * PERFORMANCE OF THIS SOFTWARE.
18   */
19  
20  #ifndef EVENT_DEFS_H
21  #define EVENT_DEFS_H
22  
23  typedef enum {
24  	EVENT_DROP_ID = 0,
25  
26  	/* Events between 0x1 to 0x674 are not used */
27  
28  	/*
29  	 * <diag_event>
30  	 * EVENT_WLAN_SECURITY
31  	 * @ eventId: Event id
32  	 * @ authMode: Shows the auth mode
33  	 * @ encryptionModeUnicast: Encryption Mode Unicast
34  	 * @ encryptionModeMulticast: Encryption Mode Multicast
35  	 * @ pmkIDMatch: PMK ID Match
36  	 * @ bssid: BSSID < 0 to 5 >
37  	 * @ keyId: Key ID
38  	 * @ status: Shows the status 0 is Success and 1 is failure
39  	 *
40  	 * This event is used in SECURITY to send various wlan security modes
41  	 * Values for parameters are defined below:
42  	 * Event ID: offset: 0 length: 1
43  	 * 5  - Remove Key Req
44  	 * 6  - Remove Key Rsp
45  	 * 7  - PMKID Candidate Found
46  	 * 8  - PMKID Update
47  	 * 9  - Mic Error
48  	 * 10 - Set UniCast Key Req
49  	 * 11 - Set UniCast Key Rsp
50  	 * 12 - Set BCast Key Req
51  	 * 13 - Set BCast Key Rsp
52  	 *
53  	 * Auth Mode: offset: 1 length: 1
54  	 * 0 - Open
55  	 * 1 - Shared
56  	 * 2 - WPA EAP
57  	 * 3 - WPA PSK
58  	 * 4 - WPA2 EAP
59  	 * 5 - WPA2 PSK
60  	 *
61  	 * Encryption Mode Unicast: offset: 2 length: 1
62  	 * 0 - Open
63  	 * 1 - WEP40
64  	 * 2 - WEP104
65  	 * 3 - TKIP
66  	 * 4 - AES
67  	 *
68  	 * Encryption Mode Multicast: offset: 3 length: 1
69  	 * 0 - Open
70  	 * 1 - WEP40
71  	 * 2 - WEP104
72  	 * 3 - TKIP
73  	 * 4 - AES
74  	 *
75  	 * ENC_MODE_SMS4: offset: 4 length:1
76  	 *
77  	 * PMK ID Match: offset: 5 length: 1
78  	 * 0 - No Match
79  	 * 1 - Match
80  	 *
81  	 * BSSID[0]: offset: 6 length: 1
82  	 * BSSID[1]: offset: 7 length: 1
83  	 * BSSID[2]: offset: 8 length: 1
84  	 * BSSID[3]: offset: 9 length: 1
85  	 * BSSID[4]: offset: 10 length: 1
86  	 * BSSID[5]: offset: 11 length: 1
87  	 *
88  	 * Key ID: offset: 12 length: 1
89  	 * Status: offset: 13 length: 1
90  	 * 0 - Success
91  	 * 1 - Failure
92  	 *
93  	 * Supported Feature: wlan security
94  	 *
95  	 * </diag_event>
96  	 */
97  
98  	EVENT_WLAN_SECURITY = 0x675, /* 13 byte payload */
99  
100  	/*
101  	 * <diag_event>
102  	 * EVENT_WLAN_STATUS
103  	 * @ eventId: Event id
104  	 * @ ssid: SSID
105  	 * @ bssType: BSS Type
106  	 * @ rssi: RSSI
107  	 * @ channel: Channel
108  	 * @ qosCapability: QoS Capability
109  	 * @ authmode: Auth Mode
110  	 * @ encryptionType: Encryption Type
111  	 * @ reason: Reason
112  	 * @ reasonDisconnect: Reason Disconnect
113  	 *
114  	 * This event is used to send wlan status
115  	 * Values for parameters are defined below:
116  	 * Event ID: offset: 0 length: 1
117  	 * 0 - Connect
118  	 * 1 - Disconnect
119  	 *
120  	 * SSID: offset: 1 length: 32
121  	 * BSS Type: offset: 33 + SSID length, length: 1
122  	 * 0 - None
123  	 * 1 - BSS_TYPE_INFRASTRUCTURE
124  	 * 2 - BSS_TYPE_INFRA_AP
125  	 * 3 - BSS_TYPE_IBSS
126  	 * 4 - BSS_TYPE_START_IBSS
127  	 * 5 - BSS_TYPE_NDI
128  	 * 6 - BSS_TYPE_ANY
129  	 *
130  	 * RSSI: offset: 34 length: 1
131  	 * Channel: offset: 35 length: 1
132  	 * QoS Capability: offset: 36 length: 1
133  	 * Auth Mode: offset: 37 length: 1
134  	 * 0 - Open
135  	 * 1 - Shared
136  	 * 2 - WPA EAP
137  	 * 3 - WPA PSK
138  	 * 4 - WPA2 EAP
139  	 * 5 - WPA2 PSK
140  	 * 6 - WAPI CERT
141  	 * 7 - WAPI PSK
142  	 *
143  	 * Encryption Type: offset: 38 length: 1
144  	 * 0 - Open
145  	 * 1 - WEP40
146  	 * 2 - WEP104
147  	 * 3 - TKIP
148  	 * 4 - AES
149  	 *
150  	 * ENC_MODE_SMS4: offset: 39 length: 1
151  	 *
152  	 * Reason: offset: 40 length: 1
153  	 * 0 - Unspecified
154  	 * 1 - User Requested
155  	 * 2 - Mic Error
156  	 * 3 - Diassoc
157  	 * 4 - Deauth
158  	 * 5 - Handoff
159  	 *
160  	 * Reason Disconnect: offset: 41 length: 1
161  	 *
162  	 * Supported Feature: wlan status
163  	 *
164  	 * </diag_event>
165  	 */
166  
167  	EVENT_WLAN_STATUS, /* 15 byte payload */
168  
169  	/* Events 0x677 and 0x678 are not used */
170  
171  	/*
172  	 * <diag_event>
173  	 * EVENT_WLAN_QOS
174  	 * @ eventId: event id
175  	 * @ reasonCode: Reason for event
176  	 *
177  	 * This event is used to send quality set services
178  	 * Values for parameters are defined below:
179  	 * Event ID: offset: 0 length: 1
180  	 * 0 - Add TS Req
181  	 * 1 - Add TS Rsp
182  	 * 2 - Delts
183  	 *
184  	 * Reason Code: offset: 1 length: 1
185  	 * 0 - Admission Accepted
186  	 * 1 - Invalid Params
187  	 * 2 - Reserved
188  	 * 3 - Refused
189  	 * 4 - User Requested
190  	 * 5 - Ind From AP
191  	 *
192  	 * Supported Feature: Qos wlan
193  	 *
194  	 * </diag_event>
195  	 */
196  
197  	EVENT_WLAN_QOS = 0x679, /* 2 byte payload */
198  
199  	/*
200  	 * <diag_event>
201  	 * EVENT_WLAN_PE
202  	 * @bssid: BSSID
203  	 * @ event_type: Event type
204  	 * @ sme_state: SME state
205  	 * @ mlm_state: MLM state
206  	 * @ status: 0 - Success, 1 - Failure < majority 0 is success >
207  	 * @reason_code: reason for event report
208  	 *
209  	 * This event is used in PE to send different diag events.
210  	 * Values for parameters are defined below:
211  	 *
212  	 * bssid[0]: offset: 0 length: 1
213  	 * bssid[1]: offset: 1 length: 1
214  	 * bssid[2]: offset: 2 length: 1
215  	 * bssid[3]: offset: 3 length: 1
216  	 * bssid[4]: offset: 4 length: 1
217  	 * bssid[5]: offset: 5 length: 1
218  	 *
219  	 * Event Type: offset: 6 length: 2
220  	 * 0  - SCAN REQ EVENT
221  	 * 1  - SCAN ABORT IND EVENT
222  	 * 2  - SCAN_RSP_EVENT
223  	 * 3  - JOIN_REQ_EVENT
224  	 * 4  - JOIN_RSP_EVENT
225  	 * 5  - SETCONTEXT_REQ_EVENT
226  	 * 6  - SETCONTEXT_RSP_EVENT
227  	 * 7  - REASSOC_REQ_EVENT
228  	 * 8  - REASSOC_RSP_EVENT
229  	 * 9  - AUTH_REQ_EVENT
230  	 * 10 - AUTH_RSP_EVENT
231  	 * 11 - DISASSOC_REQ_EVENT
232  	 * 12 - DISASSOC_RSP_EVENT
233  	 * 13 - DISASSOC_IND_EVENT
234  	 * 14 - DISASSOC_CNF_EVENT
235  	 * 15 - DEAUTH_REQ_EVENT
236  	 * 16 - DEAUTH_RSP_EVENT
237  	 * 17 - DEAUTH_IND_EVENT
238  	 * 18 - START_BSS_REQ_EVENT
239  	 * 19 - START_BSS_RSP_EVENT
240  	 * 20 - AUTH_IND_EVENT
241  	 * 21 - ASSOC_IND_EVENT
242  	 * 22 - ASSOC_CNF_EVENT
243  	 * 23 - REASSOC_IND_EVENT
244  	 * 24 - SWITCH_CHL_IND_EVENT
245  	 * 25 - SWITCH_CHL_RSP_EVENT
246  	 * 26 - STOP_BSS_REQ_EVENT
247  	 * 27 - STOP_BSS_RSP_EVENT
248  	 * 28 - DEAUTH_CNF_EVENT
249  	 * 29 - ADDTS_REQ_EVENT
250  	 * 30 - ADDTS_RSP_EVENT
251  	 * 31 - DELTS_REQ_EVENT
252  	 * 32 - DELTS_RSP_EVENT
253  	 * 33 - DELTS_IND_EVENT
254  	 * 34 - ENTER_BMPS_REQ_EVENT
255  	 * 35 - ENTER_BMPS_RSP_EVENT
256  	 * 36 - EXIT_BMPS_REQ_EVENT
257  	 * 37 - BMPS_RSP_EVENT
258  	 * 38 - EXIT_BMPS_IND_EVENT
259  	 * 39 - ENTER_IMPS_REQ_EVENT
260  	 * 40 - ENTER_IMPS_RSP_EVENT
261  	 * 41 - EXIT_IMPS_REQ_EVENT
262  	 * 42 - EXIT_IMPS_RSP_EVENT
263  	 * 43 - ENTER_UAPSD_REQ_EVENT
264  	 * 44 - ENTER_UAPSD_RSP_EVENT
265  	 * 45 - EXIT_UAPSD_REQ_EVENT
266  	 * 46 - EXIT_UAPSD_RSP_EVENT
267  	 * 47 - WOWL_ADD_BCAST_PTRN_EVENT
268  	 * 48 - WOWL_DEL_BCAST_PTRN_EVENT
269  	 * 49 - ENTER_WOWL_REQ_EVENT
270  	 * 50 - ENTER_WOWL_RSP_EVENT
271  	 * 51 - EXIT_WOWL_REQ_EVENT
272  	 * 52 - EXIT_WOWL_RSP_EVENT
273  	 * 53 - HAL_ADDBA_REQ_EVENT
274  	 * 54 - HAL_ADDBA_RSP_EVENT
275  	 * 55 - HAL_DELBA_IND_EVENT
276  	 * 56 - HB_FAILURE_TIMEOUT
277  	 * 57 - PRE_AUTH_REQ_EVENT
278  	 * 58 - PRE_AUTH_RSP_EVENT
279  	 * 59 - PREAUTH_DONE
280  	 * 60 - REASSOCIATING
281  	 * 61 - CONNECTED
282  	 * 62 - ASSOC_REQ_EVENT
283  	 * 63 - AUTH_COMP_EVENT
284  	 * 64 - ASSOC_COMP_EVENT
285  	 * 65 - AUTH_START_EVENT
286  	 * 66 - ASSOC_START_EVENT
287  	 * 67 - REASSOC_START_EVENT
288  	 * 68 - ROAM_AUTH_START_EVENT
289  	 * 69 - ROAM_AUTH_COMP_EVENT
290  	 * 70 - ROAM_ASSOC_START_EVENT
291  	 * 71 - ROAM_ASSOC_COMP_EVENT
292  	 * 72 - SCAN_COMPLETE_EVENT
293  	 * 73 - SCAN_RESULT_FOUND_EVENT
294  	 * 74 - ASSOC_TIMEOUT
295  	 * 75 - AUTH_TIMEOUT
296  	 * 76 - DEAUTH_FRAME_EVENT
297  	 * 77 - DISASSOC_FRAME_EVENT
298  	 *
299  	 * SME State: offset: 8 length: 2
300  	 * 0  - OFFLINE
301  	 * 1  - IDLE
302  	 * 2  - SUSPEND
303  	 * 3  - WT SCAN
304  	 * 4  - WT JOIN
305  	 * 5  - WT AUTH
306  	 * 6  - WT ASSOC
307  	 * 7  - WT REASSOC
308  	 * 8  - WT REASSOC LINK FAIL
309  	 * 9  - JOIN FAILURE
310  	 * 10 - ASSOCIATED
311  	 * 11 - REASSOCIATED
312  	 * 12 - LINK EST
313  	 * 13 - LINK EST WT SCAN
314  	 * 14 - WT PRE AUTH
315  	 * 15 - WT DISASSOC
316  	 * 16 - WT DEAUTH
317  	 * 17 - WT START BSS
318  	 * 18 - WT STOP BSS
319  	 * 19 - NORMAL
320  	 * 20 - CHANNEL SCAN
321  	 * 21 - NORMAL CHANNEL SCAN
322  	 *
323  	 * MLM State: offset: 10 length: 2
324  	 * 0  - MLM OFFLINE
325  	 * 1  - MLM IDLE
326  	 * 2  - MLM WT PROBE RESP
327  	 * 3  - MLM PASSIVE SCAN
328  	 * 4  - MLM WT JOIN BEACON
329  	 * 5  - MLM JOINED
330  	 * 6  - MLM BSS STARTED
331  	 * 7  - MLM WT AUTH FRAME
332  	 * 8  - MLM WT AUTH FRAME
333  	 * 9  - MLM WT AUTH FRAME
334  	 * 10 - MLM AUTH RSP TIMEOUT
335  	 * 11 - MLM AUTHENTICATED
336  	 * 12 - MLM WT ASSOC RSP
337  	 * 13 - MLM WT REASSOC RSP
338  	 * 14 - MLM ASSOCIATED
339  	 * 15 - MLM REASSOCIATED
340  	 * 16 - MLM LINK ESTABLISHED
341  	 * 17 - MLM WT ASSOC CNF
342  	 * 18 - MLM LEARN
343  	 * 19 - MLM WT ADD BSS RSP
344  	 * 20 - MLM WT DEL BSS RSP
345  	 * 21 - MLM WT ADD BSS RSP ASSOC
346  	 * 22 - MLM WT ADD BSS RSP REASSOC
347  	 * 23 - MLM WT ADD BSS RSP PREASSOC
348  	 * 24 - MLM WT ADD STA RSP
349  	 * 25 - MLM WT DEL STA RSP
350  	 * 26 - MLM WT ASSOC DEL STA RSP
351  	 * 27 - MLM WT SET BSS KEY
352  	 * 28 - MLM WT SET STA KEY
353  	 * 29 - MLM WT SET STA BCASTKEY
354  	 * 30 - MLM WT ADDBA RSP
355  	 * 31 - MLM WT REMOVE BSS KEY
356  	 * 32 - MLM WT REMOVE STA KEY
357  	 * 33 - MLM WT SET MIMOPS
358  	 *
359  	 * Status: offset: 12 length: 2
360  	 * Reason Code: offset: 14 length: 2
361  	 *
362  	 * Supported Feature: STA
363  	 *
364  	 * </diag_event>
365  	 */
366  
367  	EVENT_WLAN_PE, /* 16 byte payload */
368  
369  	/* Events between 0x67b to 0x67f are not used */
370  
371  	/*
372  	 * <diag_event>
373  	 * EVENT_WLAN_BRINGUP_STATUS
374  	 * @ wlanStatus: Describe wlan status
375  	 * @ driverVersion: Driver version between 0 to 9
376  	 *
377  	 * This event is used in BRINGUP to send wlan status
378  	 * Values for parameters are defined below:
379  	 * WLAN Status: offset: 0 length: 2
380  	 * 0 - WLAN Disabled
381  	 * 1 - WLAN Enabled
382  	 * 2 - Reset Fail
383  	 * 3 - Reset Success
384  	 * 4 - Device Removed
385  	 * 5 - Device Inserted
386  	 * 6 - Driver Unloaded
387  	 * 7 - Driver Loaded
388  	 * 8 - bus/link down
389  	 * 9 - chip temperature high
390  	 *
391  	 * driverVersion: offset: 2 length: 10
392  	 *
393  	 * Supported Feature: Bringup
394  	 *
395  	 * </diag_event>
396  	 */
397  
398  	EVENT_WLAN_BRINGUP_STATUS = 0x680, /* 12 byte payload */
399  
400  	/*
401  	 * <diag_event>
402  	 * EVENT_WLAN_POWERSAVE_GENERIC
403  	 * @ event_subtype: Event subtype
404  	 * @ full_power_request_reason: Full power request reason
405  	 * @ pmc_current_state: Pmc current state
406  	 * @ enable_disable_powersave_mode: Enable disable powersave mode
407  	 * @ winmob_d_power_state: winmob d power state
408  	 * @ dtim_period: DTIM period
409  	 * @ final_listen_intv: Final listen int
410  	 * @ bmps_auto_timer_duration: BMPS auto timer duration
411  	 * @ bmps_period: BMPS period
412  	 *
413  	 * This event is used in POWERSAVE to send wlan status
414  	 * Values for parameters are defined below:
415  	 * Event Sub Type: offset: 0 length: 1
416  	 * Full Power Req Reason: offset: 1 length: 1
417  	 * PMC Current State: offset: 2 length: 1
418  	 * Enable disable powersave mode: 3 length: 1
419  	 * Winmob D Power State: offset: 4 length: 1
420  	 * DTIM Period: offset:5 length: 1
421  	 * Final Listen INTV: offset:6 length: 2
422  	 * BMPS Auto Timer Duration: 8 length: 2
423  	 * BMPS Period: offset: 10 length:2
424  	 *
425  	 * Supported Feature: POWERSAVE GENERIC
426  	 *
427  	 * </diag_event>
428  	 */
429  
430  	EVENT_WLAN_POWERSAVE_GENERIC, /* 16 byte payload */
431  
432  	/*
433  	 * <diag_event>
434  	 * EVENT_WLAN_POWERSAVE_WOW
435  	 * @ event_subtype: Event subtype
436  	 * @ wow_type: Wow type
437  	 * @ wow_magic_pattern: It will use pattern from 0 to 5
438  	 * @ wow_del_ptrn_id: Wow delete pattern id
439  	 * @ wow_wakeup_cause: Wow wakeup cause
440  	 * @ wow_wakeup_cause_pbm_ptrn_id: Wow wakeup cause pbm pattern id
441  	 *
442  	 * This event is used in POWERSAVE WOW to send the wow wakeup pattern,
443  	 * cause etc
444  	 * Values for parameters are defined below:
445  	 * Event Sub Type: offset: 0 length: 1
446  	 * 0 - Enter
447  	 * 1 - Exit
448  	 * 2 - Del Pattern
449  	 * 3 - Wakeup
450  	 *
451  	 * WOW Type: offset: 1 length: 1
452  	 * 0 - None
453  	 * 1 - Magic Pkt Only
454  	 * 2 - Byte Match Only
455  	 * 3 - Magic Pkt Byte Match
456  	 *
457  	 * WOW Magic Pattern: offset:2 length: 6
458  	 * WOW Del Pattern ID: offset:8 length: 1
459  	 * WOW Wakeup Cause: offset: 9 length: 1
460  	 * 0 - Magic Pkt Match
461  	 * 1 - Ptrn Byte Match
462  	 * WOW Wakeup Cause PBM Ptrn ID: offset: 10 length: 1
463  	 *
464  	 * Supported Feature: Powersave wow
465  	 *
466  	 * </diag_event>
467  	 */
468  
469  	EVENT_WLAN_POWERSAVE_WOW, /* 11 byte payload */
470  
471  	/* Events between 0x683 to 0x690 are not used */
472  
473  	/*
474  	 * <diag_event>
475  	 * EVENT_WLAN_BTC
476  	 * @ eventId: Event id
477  	 * @ btAddr: BT address
478  	 * @ connHandle: Connection handle
479  	 * @ connStatus: Connection status
480  	 * @ linkType: Link Type
481  	 * @ scoInterval: Synchronous Connection Oriented interval
482  	 * @ scoWindow: Synchronous Connection Oriented window
483  	 * @ retransWindow: Retransmisson window
484  	 * @ mode: Mode
485  	 *
486  	 * This event is used in Bluetooth to send the btc status
487  	 * Values for parameters are defined below:
488  	 * Event ID: offset: 0 length: 1
489  	 * 0  - DEVICE SWITCHED ON
490  	 * 1  - DEVICE SWITCHED OFF
491  	 * 2  - INQUIRY STARTED
492  	 * 3  - INQUIRY STOPPED
493  	 * 4  - PAGE STARTED
494  	 * 5  - PAGE STOPPED
495  	 * 6  - CREATE ACL CONNECTION
496  	 * 7  - ACL CONNECTION COMPLETE
497  	 * 8  - CREATE SYNC CONNECTION
498  	 * 9  - SYNC CONNECTION COMPLETE
499  	 * 10 - SYNC CONNECTION UPDATED
500  	 * 11 - DISCONNECTION COMPLETE
501  	 * 12 - MODE CHANGED
502  	 * 13 - A2DP STREAM START
503  	 * 14 - A2DP STREAM STOP
504  	 *
505  	 * BT Addr[0]: offset: 1 length: 1
506  	 * BT Addr[1]: offset: 2 length: 1
507  	 * BT Addr[2]: offset: 3 length: 1
508  	 * BT Addr[3]: offset: 4 length: 1
509  	 * BT Addr[4]: offset: 5 length: 1
510  	 * BT Addr[5]: offset: 6 length: 1
511  	 *
512  	 * Conn Handle: offset: 7 length: 2
513  	 * 65535 - Invalid
514  	 *
515  	 * Conn Status: offset:9 length: 1
516  	 * 0 - Fail
517  	 * 1 - success
518  	 *
519  	 * Link Type: offset: 10 length: 1
520  	 * 0 - SCO
521  	 * 1 - ACL
522  	 * 2 - ESCO
523  	 *
524  	 * Sco Interval: offset: 11 length: 1
525  	 * Sco Window: offset: 12 length: 1
526  	 * Retrans Window: offset: 13 length: 1
527  	 *
528  	 * Mode: offset: 14 length: 1
529  	 * 0 - Active
530  	 * 1 - Hold
531  	 * 2 - Sniff
532  	 * 3 - Park
533  	 *
534  	 * Supported Feature: Bluetooth
535  	 *
536  	 * </diag_event>
537  	 */
538  
539  	EVENT_WLAN_BTC = 0x691, /* 15 byte payload */
540  
541  	/*
542  	 * <diag_event>
543  	 * EVENT_WLAN_EAPOL
544  	 * @ event_sub_type: 0-Transmitted, 1-Received
545  	 * @ eapol_packet_type: 0 - EAP Start, 1 - EAPOL Start, 2 - EAPOL
546  	 * Logoff, 3 - EAPOL Key, 4 - EAPOL Encapsulated Alert
547  	 * @ eapol_key_info: This field from the driver is in big endian format
548  	 * @ eapol_rate: Rate at which the frame is received
549  	 * @ dest_addr: Destination address
550  	 * * @ src_addr: Source address
551  	 *
552  	 * This event is used to send Extensible Authentication Protocol
553  	 * information
554  	 * Values for parameters are defined below:
555  	 * event_sub_type: offset: 0 length: 1
556  	 * eapol_packet_type: offset: 1 length: 1
557  	 * eapol_key_info: offset:2 length: 2
558  	 * eapol_rate: offset: 4 length: 2
559  	 * dest_addr[0]: offset: 6 length: 1
560  	 * dest_addr[1]: offset: 7 length: 1
561  	 * dest_addr[2]: offset: 8 length: 1
562  	 * dest_addr[3]: offset: 9 length: 1
563  	 * dest_addr[4]: offset: 10 length: 1
564  	 * dest_addr[5]: offset: 11 length: 1
565  	 * src_addr[0]: offset: 12 length: 1
566  	 * src_addr[1]: offset: 13 length: 1
567  	 * src_addr[2]: offset: 14 length: 1
568  	 * src_addr[3]: offset: 15 length: 1
569  	 * src_addr[4]: offset: 16 length: 1
570  	 * src_addr[5]: offset: 17 length: 1
571  	 *
572  	 * Supported Feature: Extensible Authentication Protocol
573  	 *
574  	 * </diag_event>
575  	 */
576  
577  	EVENT_WLAN_EAPOL = 0xA8D,/* 18 bytes payload */
578  
579  	/*
580  	 * <diag_event>
581  	 * EVENT_WLAN_WAKE_LOCK
582  	 * @ status: Whether the wakelock is taken/released
583  	 * @ reason: Reason for taking this wakelock
584  	 * @ timeout: Timeout value in case of timed wakelocks
585  	 * @ name_len: Length of the name of the wakelock that will follow
586  	 * @ name: Name of the wakelock
587  	 *
588  	 * This event is used to send wakelock information
589  	 * Values for parameters are defined below:
590  	 * status: offset: 0 length: 4
591  	 * reason: offset: 4 length: 4
592  	 * timeout: offset: 8 length: 4
593  	 * name_len: offset: 12 length: 4
594  	 *
595  	 * Supported Feature: wlan wakelock
596  	 *
597  	 * </diag_event>
598  	 */
599  
600  	EVENT_WLAN_WAKE_LOCK = 0xAA2, /* 96 bytes payload */
601  	EVENT_WLAN_BEACON_RECEIVED = 0xAA6, /* FW event: 2726 */
602  
603  	/*
604  	 * <diag_event>
605  	 * EVENT_WLAN_LOG_COMPLETE
606  	 * @ is_fatal: Indicates if the event is fatal or not
607  	 * @ indicator: Source of the bug report - Framework/Host/Firmware
608  	 * @ reason_code: Reason for triggering bug report
609  	 * @ reserved: Reserved field
610  	 *
611  	 * This event is used to send log completion related information
612  	 * Values for parameters are defined below:
613  	 * is_fatal: offset: 0 length: 4
614  	 * indicator: offset: 4 length: 4
615  	 * reason_code: offset: 8 length: 4
616  	 * reserved: offset: 12 length: 4
617  	 *
618  	 * Supported Feature: Logging
619  	 *
620  	 * </diag_event>
621  	 */
622  
623  	EVENT_WLAN_LOG_COMPLETE = 0xAA7, /* 16 bytes payload */
624  
625  	/*
626  	 * <diag_event>
627  	 * EVENT_WLAN_STATUS_V2
628  	 * @ event_id: Event id
629  	 * @ ssid: Network SSID
630  	 * @ bssType: BSS Type
631  	 * @ rssi: RSSI
632  	 * @ channel: Channel Numbers
633  	 * @ qosCapability: quality of service capability
634  	 * @ authType: Authentication type
635  	 * @ encryptionType: Encryption type
636  	 * @ reason: Reason for triggering status
637  	 * @ reasonDisconnect:Reason for disconnection
638  	 *
639  	 * This event is used to send various wlan status
640  	 * Values for parameters are defined below:
641  	 * eventId: offset: 0 length: 1
642  	 * ssid[0] - ssid[31]: offset: 1 to 32, length: 1
643  	 * bssType: offset: 33 length: 1
644  	 * rssi: offset: 34 length: 1
645  	 * channel: offset: 35 length: 1
646  	 * qosCapability: offset: 36 length: 1
647  	 * authType: offset: 37 length: 1
648  	 * encryptionType: offset: 38 length: 1
649  	 * reason: offset: 39 length: 1
650  	 * reasonDisconnect: offset: 40 length: 1
651  	 *
652  	 * Supported Feature: Wlan status
653  	 *
654  	 * </diag_event>
655  	 */
656  
657  	EVENT_WLAN_STATUS_V2 = 0xAB3,
658  
659  	/*
660  	 * <diag_event>
661  	 * EVENT_WLAN_TDLS_TEARDOWN
662  	 * @ reason: reason for tear down.
663  	 * @peer_mac: Peer mac address
664  	 *
665  	 *
666  	 * This event is sent when TDLS tear down happens.
667  	 *
668  	 * Supported Feature: TDLS
669  	 *
670  	 * </diag_event>
671  	 */
672  	EVENT_WLAN_TDLS_TEARDOWN = 0xAB5,
673  
674  	/*
675  	 * <diag_event>
676  	 * EVENT_WLAN_TDLS_ENABLE_LINK
677  	 * @peer_mac: peer mac
678  	 * @is_off_chan_supported: If peer supports off channel
679  	 * @is_off_chan_configured: If off channel is configured
680  	 * @is_off_chan_established: If off channel is established
681  	 *
682  	 *
683  	 * This event is sent when TDLS enable link happens.
684  	 *
685  	 * Supported Feature: TDLS
686  	 *
687  	 * </diag_event>
688  	 */
689  	EVENT_WLAN_TDLS_ENABLE_LINK = 0XAB6,
690  
691  	/*
692  	 * <diag_event>
693  	 * EVENT_WLAN_SUSPEND_RESUME
694  	 * @ state: suspend/resume state
695  	 *
696  	 * This event is used to send suspend resume info
697  	 * Values for parameters are defined below:
698  	 * suspend: offset: 0 length: 1
699  	 * 0 - HDD_WLAN_EARLY_SUSPEND
700  	 * 1 - HDD_WLAN_SUSPEND
701  	 * 2 - HDD_WLAN_EARLY_RESUME
702  	 * 3 - HDD_WLAN_RESUME
703  	 *
704  	 * Supported Feature: suspend/resume
705  	 *
706  	 * </diag_event>
707  	 */
708  
709  	EVENT_WLAN_SUSPEND_RESUME = 0xAB7,
710  
711  	/*
712  	 * <diag_event>
713  	 * EVENT_WLAN_OFFLOAD_REQ
714  	 * @ offload_type: offload type
715  	 * @ state: enabled or disabled state
716  	 *
717  	 * This event is used to send offload info
718  	 * Values for parameters are defined below:
719  	 * offloadType: offset: 0 length: 1
720  	 * 0 - SIR_IPV4_ARP_REPLY_OFFLOAD
721  	 * 1 - SIR_IPV6_NEIGHBOR_DISCOVERY_OFFLOAD
722  	 * 2 - SIR_IPV6_NS_OFFLOAD
723  	 *
724  	 * enableOrDisable: offset: 1 length: 1
725  	 * 0 - SIR_OFFLOAD_DISABLE
726  	 * 1 - SIR_OFFLOAD_ENABLE
727  	 *
728  	 * Supported Feature: offload
729  	 *
730  	 * </diag_event>
731  	 */
732  
733  	EVENT_WLAN_OFFLOAD_REQ = 0xAB8,
734  
735  	/*
736  	 * <diag_event>
737  	 * EVENT_TDLS_SCAN_BLOCK
738  	 * @status: rejected status
739  	 *
740  	 *
741  	 * This event is sent when scan is rejected due to TDLS.
742  	 *
743  	 * Supported Feature: TDLS
744  	 *
745  	 * </diag_event>
746  	 */
747  	EVENT_TDLS_SCAN_BLOCK = 0xAB9,
748  
749  	/*
750  	 * <diag_event>
751  	 * EVENT_WLAN_TDLS_TX_RX_MGMT
752  	 * @event_id: event id
753  	 * @tx_rx: tx or rx
754  	 * @type: type of frame
755  	 * @action_sub_type: action frame type
756  	 * @peer_mac: peer mac
757  	 *
758  	 *
759  	 * This event is sent when TDLS mgmt rx tx happens.
760  	 *
761  	 * Supported Feature: TDLS
762  	 *
763  	 * </diag_event>
764  	 */
765  	EVENT_WLAN_TDLS_TX_RX_MGMT = 0xABA,
766  
767  	/*
768  	 * <diag_event>
769  	 * EVENT_WLAN_LOW_RESOURCE_FAILURE
770  	 * @ WIFI_EVENT_MEMORY_FAILURE: Memory failure
771  	 *
772  	 * This event is used to send reason why low resource situation
773  	 * is observed
774  	 *
775  	 * Supported Feature: Memory
776  	 *
777  	 * </diag_event>
778  	 */
779  
780  	EVENT_WLAN_LOW_RESOURCE_FAILURE = 0xABB,
781  
782  	/*
783  	 * <diag_event>
784  	 * EVENT_WLAN_POWERSAVE_WOW_STATS
785  	 * @ wow_ucast_wake_up_count: send unicast packet count
786  	 * @ wow_bcast_wake_up_count: send broadcast packet count
787  	 * @ wow_ipv4_mcast_wake_up_coun: send ipv4 multicast packet count
788  	 * @ wow_ipv6_mcast_wake_up_count: send ipv6 multicast packet count
789  	 * @ wow_ipv6_mcast_ra_stats: send ipv6 multicast ra packet count
790  	 * @ wow_ipv6_mcast_ns_stats: send ipv6 multicast ns packet count
791  	 * @ wow_ipv6_mcast_na_stats: send ipv6 multicast na packet count
792  	 * @ wow_pno_match_wake_up_count: preferred network offload match count
793  	 * @ wow_pno_complete_wake_up_count: preferred network offload complete
794  	 * @ wow_gscan_wake_up_count:Reason: send external scan packet count
795  	 * @ wow_low_rssi_wake_up_count: send low rssi packet count
796  	 * @ wow_rssi_breach_wake_up_count: send rssi breach packet count
797  	 * @ wow_icmpv4_count: Send icmpv4 packet count
798  	 * @ wow_icmpv6_count: send icmpv6 packet count
799  	 * @ wow_oem_response_wake_up_count: Send oem response packet count
800  	 *
801  	 * This event is used to send wow wakeup stats information
802  	 *
803  	 * Supported Feature: Wlan powersave wow
804  	 *
805  	 * </diag_event>
806  	 */
807  	EVENT_WLAN_POWERSAVE_WOW_STATS = 0xB33,
808  
809  	/*
810  	 * <diag_event>
811  	 * EVENT_WLAN_STA_KICKOUT
812  	 * @reasoncode: Indicates the reasoncode of event
813  	 * @peer_macaddr: Indicates the peer macaddr
814  	 * @vdev_id: Indicate unique id for identifying the VDEV
815  	 *
816  	 * This event is used to send sta kickout information
817  	 * Values for parameters are defined below:
818  	 * Reasoncode: offset: 0 length: 4
819  	 * Peer macaddr: offset: 4 length: 6
820  	 * VDEV ID: offset: 10 length 1
821  	 *
822  	 * Supported Feature: STA
823  	 *
824  	 * </diag_event>
825  	 */
826  
827  	EVENT_WLAN_STA_KICKOUT = 0xB39,
828  
829  	/*
830  	 * <diag_event>
831  	 * EVENT_WLAN_STA_DATASTALL
832  	 * @reason: Indicates the reason of event
833  	 *
834  	 * This event is used to send sta datastall information
835  	 * Values for parameters are defined below:
836  	 * Reason: offset:0 length: 4
837  	 *
838  	 * Supported Feature: STA
839  	 *
840  	 * </diag_event>
841  	 */
842  
843  	EVENT_WLAN_STA_DATASTALL = 0xB3A,
844  
845  	/*
846  	 * <diag_event>
847  	 * EVENT_WLAN_SOFTAP_DATASTALL
848  	 * @reason: Indicates the reason of event
849  	 *
850  	 * This event is used to send SAP datastall information
851  	 * Values for parameters are defined below:
852  	 * Reason: offset:0 length: 4
853  	 *
854  	 * Supported Feature: SAP
855  	 *
856  	 * </diag_event>
857  	 */
858  
859  	EVENT_WLAN_SOFTAP_DATASTALL = 0xB3B,
860  
861  	/*
862  	 * <diag_event>
863  	 * EVENT_WLAN_SSR_REINIT_SUBSYSTEM
864  	 * @status: Indicates the status of event
865  	 *
866  	 * This event is used to send ssr reinit status
867  	 * Values for parameters are defined below:
868  	 * Status: offset: 0 length: 4
869  	 *
870  	 * Supported Feature: SSR
871  	 *
872  	 *  </diag_event>
873  	 */
874  
875  	EVENT_WLAN_SSR_REINIT_SUBSYSTEM = 0xB3C,
876  
877  	/*
878  	 * <diag_event>
879  	 * EVENT_WLAN_SSR_SHUTDOWN_SUBSYSTEM
880  	 * @status: Indicates the status of event
881  	 *
882  	 * This event is used to send ssr shutdown status
883  	 * Values for parameters are defined below:
884  	 * Status: offset: 0 length: 4
885  	 *
886  	 * Supported Feature: SSR
887  	 *
888  	 * </diag_event>
889  	 */
890  
891  	EVENT_WLAN_SSR_SHUTDOWN_SUBSYSTEM = 0xB3D,
892  	EVENT_WLAN_ACS_REQ = 0xC4A,
893  	EVENT_WLAN_ACS_SCAN_START = 0xC4B,
894  	EVENT_WLAN_ACS_SCAN_DONE = 0xC4C,
895  	EVENT_WLAN_ACS_CHANNEL_SPECTRAL_WEIGHT = 0xC4D,
896  	EVENT_WLAN_ACS_BEST_CHANNEL = 0xC4E,
897  	EVENT_WLAN_HOST_MGMT_TX_V2 = 0xC52,
898  	EVENT_WLAN_HOST_MGMT_RX_V2 = 0xC53,
899  	EVENT_WLAN_CONN_STATS_V2 = 0xC56,
900  
901  	/*
902  	 * <diag_event>
903  	 * EVENT_WLAN_RSN_INFO
904  	 * @akm_suite: Gives information about akm suites used in assoc request
905  	 * @ucast_cipher: Unicast cipher used in assoc request
906  	 * @mcast_cipher: Multi cast cipher used in assoc request
907  	 * @group_mgmt: Requested group mgmt cipher suite
908  	 *
909  	 * This event is used to send RSN information used
910  	 * in assoc request.
911  	 *
912  	 * Supported Feature: STA
913  	 *
914  	 * </diag_event>
915  	 */
916  
917  	EVENT_WLAN_RSN_INFO = 0xC5B,
918  
919  	/*
920  	 * <diag_event>
921  	 * EVENT_WLAN_AUTH_INFO
922  	 * @auth_algo_num: Gives information about algo num used in auth request
923  	 * @auth_transaction_seq_num: seq num of auth request
924  	 * @auth_status_code: status code of auth request
925  	 *
926  	 * This event is used to send algo num, seq num and status code
927  	 * for auth request
928  	 *
929  	 * Supported Feature: STA
930  	 *
931  	 * </diag_event>
932  	 */
933  
934  	EVENT_WLAN_AUTH_INFO = 0xC92,
935  
936  	/*
937  	 * <diag_event>
938  	 * EVENT_WLAN_CONN
939  	 * @diag_cmn: Common diag info
940  	 * @version: Structure Version
941  	 * @ssid_len: Length of SSID
942  	 * @auth_algo: Authentication algorithm number field as defined in
943  	 * IEEE 802.11 - 2020 standard section 9.4.1.1
944  	 * @bt_coex: Is there active bluetooth connection
945  	 * @ssid: SSID
946  	 * @bssid_hint: BSSID hint provided in the connect request
947  	 * @reason: failure reason. Refer enum wlan_cm_connect_fail_reason
948  	 * @akm: Auth key management suite defined in IEEE Std 802.11‐2020
949  	 * Table 9-151—AKM suite selectors.
950  	 * @subtype: Event subtype defined in enum qca_conn_diag_log_event_type.
951  	 * @freq: Frequency in MHz
952  	 * @freq_hint: Frequency Hint in MHz
953  	 * @pairwise_cipher: Pairwise suite value as defined in IEEE 802.11 2020
954  	 * Table 12-10—Integrity and key wrap algorithms.
955  	 * @grp_cipher: Group cipher suite value as defined in
956  	 * Table 12-10—Integrity and key wrap algorithm in IEEE 802.11 2020.
957  	 * grp_mgmt: Group management cipher suite as defined in
958  	 * Table 12-10—Integrity and key wrap algorithms in IEEE 802.11 2020.
959  	 *
960  	 * This event is used to send connection parameters for
961  	 * connecting/connecting fail events
962  	 *
963  	 * Supported Feature: STA
964  	 *
965  	 * </diag_event>
966  	 */
967  
968  	EVENT_WLAN_CONN = 0xD17,
969  
970  	/*
971  	 * <diag_event>
972  	 * EVENT_WLAN_MGMT
973  	 * @diag_cmn: Common diag info
974  	 * @version: Structure Version
975  	 * @auth_algo: authentication algorithm number defined in
976  	 * IEEE Std 802.11‐2020
977  	 * @auth_frame_type: Authentication frame sub-type for SAE
978  	 * authentication
979  	 * defined in Section 9.4.1.1 Authentication Algorithm Number field in
980  	 * IEEE Std 802.11‐2020.
981  	 * @auth_seq_num: Authentication frame transaction sequence number
982  	 * @status: Frame status code as defined in IEEE Std
983  	 * 802.11‐2020 Table 9-50—Status codes.
984  	 * @tx_status: Frame TX status defined by enum qdf_dp_tx_rx_status
985  	 * @reason: reason code defined in Table 9-49 Reason codes field’
986  	 * from the IEEE 802.11 standard document.
987  	 * @eap_len: EAP data length
988  	 * @eap_type: EAP type. Values defined by IANA at:
989  	 * https://www.iana.org/assignments/eap-numbers
990  	 * @is_retry_frame: Retry frame indicator
991  	 * @subtype: Diag event defined in  enum qca_conn_diag_log_event_type
992  	 * @assoc_id: Association ID
993  	 * @sn: Frame sequence number
994  	 * @rssi: Peer RSSI in dBm
995  	 *
996  	 * This event is used to send management frame info for
997  	 * Management events such as Auth Req/Resp, Assoc Req/Resp,
998  	 * Reassoc Req/Resp, Disassoc Req/Resp, Deauth TX/RX and Disconnection.
999  	 *
1000  	 * Supported Feature: STA
1001  	 *
1002  	 * </diag_event>
1003  	 */
1004  
1005  	EVENT_WLAN_MGMT = 0xD1B,
1006  
1007  	/*
1008  	 * <diag_event>
1009  	 * EVENT_WLAN_ROAM_SCAN_START
1010  	 * @diag_cmn: Common diag info
1011  	 * @version: Structure Version
1012  	 * @is_full_scan: True if the scan is Full scan.
1013  	 * False if the roam scan is partial channel map scan
1014  	 * @cu:  Current connected channel load in percentage
1015  	 * @trigger_reason: Roam trigger reason defined by
1016  	 * enum roam_trigger_reason
1017  	 * @trigger_sub_reason: Roam scan trigger sub reason indicating if
1018  	 * periodic/inactivity scan timer initiated roam. Defined by enum
1019  	 * roam_trigger_sub_reason
1020  	 * @rssi: Connected AP RSSI in dBm
1021  	 * @rssi_thresh: Roam scan trigger threshold in dBm
1022  	 *
1023  	 * This event is used to send Roam Scan Start event related info.
1024  	 *
1025  	 * Supported Feature: STA
1026  	 *
1027  	 * </diag_event>
1028  	 */
1029  
1030  	EVENT_WLAN_ROAM_SCAN_START = 0xD1C,
1031  
1032  	/*
1033  	 * <diag_event>
1034  	 * EVENT_WLAN_ROAM_SCAN_DONE
1035  	 * @diag_cmn: Common diag info
1036  	 * @version: Structure Version
1037  	 * @cand_ap_count: Roam candidate AP count
1038  	 * @btcoex_active: Is there active bluetooth connection
1039  	 * @num_scanned_freq: Number of scanned frequencies
1040  	 * @scan_freq: Array of scanned frequencies value in MHz
1041  	 *
1042  	 * This event is used to send Roam Scan Done event info.
1043  	 *
1044  	 * Supported Feature: STA
1045  	 *
1046  	 * </diag_event>
1047  	 */
1048  
1049  	EVENT_WLAN_ROAM_SCAN_DONE = 0xD1D,
1050  
1051  	/*
1052  	 * <diag_event>
1053  	 * EVENT_WLAN_ROAM_CAND_INFO
1054  	 * @diag_cmn: Common diag info
1055  	 * @version: Structure Version
1056  	 * @is_current_ap: Is the entry candidate AP or connected AP
1057  	 * @idx: Entry index
1058  	 * @cu_load: Channel utilization load of the AP in percentage
1059  	 * @subtype: diag event subtype defined in
1060  	 * enum qca_conn_diag_log_event_type
1061  	 * @total_score: Total candidate AP score
1062  	 * @freq: Candidate AP channel frequency in MHz
1063  	 * @rssi: Candidate AP RSSI in dBm
1064  	 * @etp: Estimated throughput value of the AP in Kbps
1065  	 *
1066  	 * This event is used to send Roam candidate info
1067  	 *
1068  	 * Supported Feature: STA
1069  	 *
1070  	 * </diag_event>
1071  	 */
1072  
1073  	EVENT_WLAN_ROAM_CAND_INFO = 0xD1E,
1074  
1075  	/*
1076  	 * <diag_event>
1077  	 * EVENT_WLAN_ROAM_RESULT
1078  	 * @diag_cmn: Common diag info
1079  	 * @version: Structure Version
1080  	 * @is_roam_successful: True if roamed successfully or
1081  	 * false if roaming failed
1082  	 * @roam_fail_reason: Roam failure reason code defined in enum
1083  	 * wlan_roam_failure_reason_code
1084  	 *
1085  	 * This event is used to send Roam result info
1086  	 *
1087  	 * Supported Feature: STA
1088  	 *
1089  	 * </diag_event>
1090  	 */
1091  
1092  	EVENT_WLAN_ROAM_RESULT = 0xD1F,
1093  
1094  	/*
1095  	 * <diag_event>
1096  	 * EVENT_WLAN_ROAM_CANCEL
1097  	 * @diag_cmn: Common diag info
1098  	 * @version: Structure Version
1099  	 * @is_roam_successful: True if roamed successfully or
1100  	 * false if roaming failed
1101  	 * @roam_fail_reason: Roam failure reason code defined in enum
1102  	 * wlan_roam_failure_reason_code
1103  	 *
1104  	 * This event is used to send Roam cancel related info
1105  	 *
1106  	 * Supported Feature: STA
1107  	 *
1108  	 * </diag_event>
1109  	 */
1110  
1111  	EVENT_WLAN_ROAM_CANCEL = 0xD20,
1112  
1113  	/*
1114  	 * <diag_event>
1115  	 * EVENT_WLAN_BTM
1116  	 * @diag_cmn: Common diag info
1117  	 * @version: Structure Version
1118  	 * @reason: Query Reason field. Contains one of the values
1119  	 * defined in IEEE
1120  	 * Std 802.11‐2020 Table 9-198—Transition and Transition
1121  	 * Query reasons
1122  	 * @mode: BTM Request Mode field
1123  	 * @sub_reason: WTC sub reason code field in the BTM WTC vendor
1124  	 * specific IE
1125  	 * @cand_lst_cnt: Candidates list in the BTM frame
1126  	 * @status: BSS Transition management status codes defined in
1127  	 * 802.11‐2020 Table 9-428—BTM status code definitions
1128  	 * @delay: BSS Termination Delay field
1129  	 * @is_disassoc_imminent: Disassociation imminent bit
1130  	 * @token: dialog token. Dialog Token is a nonzero value chosen by
1131  	 * the STA
1132  	 * @wtc_duration: WTC duration field in minutes
1133  	 * while sending the BTM frame to identify the query/request/response
1134  	 * transaction
1135  	 * @subtype: Event Subtype
1136  	 * @validity_timer: Validity interval in TBTT
1137  	 * @disassoc_timer: Time after which the AP disassociates the STA,
1138  	 * defined in TBTT.
1139  	 *
1140  	 * This event is used to send BTM info
1141  	 *
1142  	 * Supported Feature: STA
1143  	 *
1144  	 * </diag_event>
1145  	 */
1146  
1147  	EVENT_WLAN_BTM = 0xD21,
1148  
1149  	/*
1150  	 * <diag_event>
1151  	 * EVENT_WLAN_BTM_CAND
1152  	 * @diag_cmn: Common diag info
1153  	 * @version: Structure Version
1154  	 * @idx: Candidate index
1155  	 * @preference: Candidate preference
1156  	 *
1157  	 * This event is used to send BTM Candidate info
1158  	 *
1159  	 * Supported Feature: STA
1160  	 *
1161  	 * </diag_event>
1162  	 */
1163  
1164  	EVENT_WLAN_BTM_CAND = 0xD22,
1165  
1166  	/*
1167  	 * <diag_event>
1168  	 * EVENT_WLAN_CONN_DP
1169  	 * @diag_cmn: Common diag info
1170  	 * @version: Structure Version
1171  	 * @auth_algo: authentication algorithm number defined in
1172  	 * IEEE Std 802.11‐2020
1173  	 * @auth_frame_type: Authentication frame sub-type for SAE
1174  	 * authentication defined in Section 9.4.1.1 Authentication
1175  	 * Algorithm Number field in IEEE Std 802.11‐2020.
1176  	 * @auth_seq_num: Authentication frame transaction sequence number
1177  	 * @status: Frame status code as defined in IEEE Std
1178  	 * 802.11‐2020 Table 9-50—Status codes.
1179  	 * @tx_status: Frame TX status defined by enum qdf_dp_tx_rx_status
1180  	 * @reason: reason code defined in Table 9-49 Reason codes field’
1181  	 * from the IEEE 802.11 standard document.
1182  	 * @eap_len: EAP data length
1183  	 * @eap_type: EAP type. Values defined by IANA at:
1184  	 * https://www.iana.org/assignments/eap-numbers
1185  	 * @is_retry_frame: Retry frame indicator
1186  	 * @subtype: Diag event defined in  enum qca_conn_diag_log_event_type
1187  	 * @assoc_id: Association ID
1188  	 * @sn: Frame sequence number
1189  	 * @rssi: Peer RSSI in dBm
1190  	 *
1191  	 * This event is used to send Datapath related info such as DHCP
1192  	 * handshake and EAPOL.
1193  	 *
1194  	 * Supported Feature: STA
1195  	 *
1196  	 * </diag_event>
1197  	 */
1198  
1199  	EVENT_WLAN_CONN_DP = 0xD23,
1200  
1201  	/*
1202  	 * <diag_event>
1203  	 * EVENT_WLAN_NBR_RPT
1204  	 * @diag_cmn: Common diag info
1205  	 * @version: structure version
1206  	 * @token: dialog token. Dialog Token is a nonzero value chosen by the
1207  	 * STA
1208  	 * @num_rpt: the number of neighbor report elements in response frame.
1209  	 * @num_freq: Number of frequency in response frame
1210  	 * @ssid: SSID
1211  	 * @freq: Frequency list in response frame
1212  	 *
1213  	 * This Event is used to send Neighbor report
1214  	 *
1215  	 * Supported Feature: STA
1216  	 *
1217  	 * </diag_event>
1218  	 */
1219  
1220  	EVENT_WLAN_NBR_RPT = 0xD37,
1221  
1222  	/*
1223  	 * <diag_event>
1224  	 * @diag_cmn: Common diag info
1225  	 * @version: structure version
1226  	 * @token: A nonzero number that is unique among the Measurement Request
1227  	 * elements
1228  	 * @op_class: Operating classes that include primary channels
1229  	 * @chan: The channel number field in the beacon report request.
1230  	 * @req_mode: hex value defines Duration mandatory, parallel, enable,
1231  	 * request, and report bits.
1232  	 * @num_rpt: the number of neighbor report elements in response frame.
1233  	 * @duration: The duration over which the Beacon report was
1234  	 * measured.(in ms)
1235  	 * @mode: Mode used for measurement.Values defined in IEEE
1236  	 * Std 802.11‐2020 Table 9-103.
1237  	 *
1238  	 * This Event is used to send Beacon report
1239  	 *
1240  	 * Supported Feature: STA
1241  	 *
1242  	 * </diag_event>
1243  	 */
1244  
1245  	EVENT_WLAN_BCN_RPT = 0xD38,
1246  
1247  	/*
1248  	 * <diag_event>
1249  	 * @diag_cmn: Common diag info
1250  	 * @version: structure version
1251  	 * @is_mlo: flag to specify MLO connection
1252  	 * @mac_2g: 2GHz STA link address
1253  	 * @mac_5g: 5GHz STA link address
1254  	 * @mac_6g: 6GHz STA link address
1255  	 *
1256  	 * This Event is used to send STA info immediately after receiving
1257  	 * connect request
1258  	 *
1259  	 * Supported Feature: STA
1260  	 * </diag_event>
1261  	 */
1262  
1263  	EVENT_WLAN_STA_INFO = 0xD56,
1264  
1265  	/*
1266  	 * <diag_event>
1267  	 * @diag_cmn: Common diag info
1268  	 * @version: structure version
1269  	 * @band: Indicate bands on the link
1270  	 * @link_id: Link ID associated with the bssid
1271  	 * @status: Status of the link. Will be 0 if link is rejected
1272  	 *
1273  	 * This Event is used to indicate the MLO setup info. This event
1274  	 * will be sent immediately after assoc/reassoc response.
1275  	 *
1276  	 * Supported Feature: STA
1277  	 * </diag_event>
1278  	 */
1279  
1280  	EVENT_WLAN_MLO_SETUP = 0xD57,
1281  
1282  	/*
1283  	 * <diag_event>
1284  	 * @diag_cmn: Common diag info
1285  	 * @version: structure version
1286  	 * @band: Indiacate band of the link
1287  	 * @link_id: Link id of the removed link
1288  	 *
1289  	 * This Event is used to indicate when one or more AP
1290  	 * affiliated with AP MLD is removed.
1291  	 *
1292  	 * Supported Feature: STA
1293  	 *
1294  	 * </diag_event>
1295  	 */
1296  
1297  	EVENT_WLAN_MLO_RECONFIG = 0xD58,
1298  
1299  	/*
1300  	 * <diag_event>
1301  	 * @diag_cmn: Common diag info
1302  	 * @version: structure version
1303  	 * @band: Indicates the band of this link
1304  	 * @tid_ul: TID-to-link mapping information on the uplink
1305  	 * @tid_dl: TID-to-link mapping information on the downlink
1306  	 *
1307  	 * This Event is used to send T2LM status.
1308  	 *
1309  	 * Supported Feature: STA
1310  	 *
1311  	 * </diag_event>
1312  	 */
1313  
1314  	EVENT_WLAN_MLO_T2LM_STATUS = 0xD59,
1315  
1316  	/*
1317  	 * <diag_event>
1318  	 * @diag_cmn: Common diag info
1319  	 * @version: structure version
1320  	 * @band: Indicates the link on which packet is transmitted or
1321  	 * received
1322  	 * @status: Status code of TID-To-Link Mapping Response frame. This
1323  	 * tag exists only in response frames
1324  	 * @token: Dialog Token field of TID-To-Link Mapping Request/Response
1325  	 * frame
1326  	 * @subtype: Indicates whether the it is a request event or response
1327  	 * event
1328  	 * @dir: Indicate whether packet is received or transmitted.
1329  	 * 0 - TX and 1 - RX
1330  	 * @tx_status: Status of frame transmission
1331  	 * @reserved: Reserved field
1332  	 *
1333  	 * This Event is to indicate the T2LM Req/Resp info
1334  	 *
1335  	 * Supported Feature: STA
1336  	 *
1337  	 * </diag_event>
1338  	 */
1339  
1340  	EVENT_WLAN_MLO_T2LM_REQ_RESP = 0xD5A,
1341  
1342  	/*
1343  	 * <diag_event>
1344  	 * @diag_cmn: Common diag info
1345  	 * @version: structure version
1346  	 * @band: Indicates the link on which packet is transmitted or
1347  	 * received
1348  	 * @tx_status: Status of frame transmission
1349  	 * @reserved: Reserved Field
1350  	 *
1351  	 * This Event is sent when the device sends T2LM teardown action frame
1352  	 *
1353  	 * Supported Feature: STA
1354  	 *
1355  	 * </diag_event>
1356  	 */
1357  
1358  	EVENT_WLAN_MLO_T2LM_TEARDOWN = 0xD5B,
1359  
1360  	/*
1361  	 * <diag_event>
1362  	 * @diag_cmn: Common diag info
1363  	 * @version: structure version
1364  	 * @active_link: Bit field indicating active links
1365  	 * @inactive_link: Bit field indicating inactive links
1366  	 * @reserved: Reserved Field
1367  	 * @reason: reason for change link state
1368  	 *
1369  	 * This event is generated when the state of a link is changed.
1370  	 *
1371  	 * Supported Feature: STA
1372  	 *
1373  	 * </diag_event>
1374  	 */
1375  
1376  	EVENT_WLAN_MLO_LINK_STATUS = 0xD5C,
1377  
1378  	EVENT_MAX_ID = 0x0FFF
1379  } event_id_enum_type;
1380  
1381  #endif /* EVENT_DEFS_H */
1382