1 /*
2  * Copyright (c) 2014-2019,2021 The Linux Foundation. All rights reserved.
3  * Copyright (c) 2022-2023 Qualcomm Innovation Center, Inc. All rights reserved.
4  *
5  * Permission to use, copy, modify, and/or distribute this software for
6  * any purpose with or without fee is hereby granted, provided that the
7  * above copyright notice and this permission notice appear in all
8  * copies.
9  *
10  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL
11  * WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED
12  * WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE
13  * AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
14  * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
15  * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER
16  * TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
17  * PERFORMANCE OF THIS SOFTWARE.
18  */
19 
20 #ifndef EVENT_DEFS_H
21 #define EVENT_DEFS_H
22 
23 typedef enum {
24 	EVENT_DROP_ID = 0,
25 
26 	/* Events between 0x1 to 0x674 are not used */
27 
28 	/*
29 	 * <diag_event>
30 	 * EVENT_WLAN_SECURITY
31 	 * @ eventId: Event id
32 	 * @ authMode: Shows the auth mode
33 	 * @ encryptionModeUnicast: Encryption Mode Unicast
34 	 * @ encryptionModeMulticast: Encryption Mode Multicast
35 	 * @ pmkIDMatch: PMK ID Match
36 	 * @ bssid: BSSID < 0 to 5 >
37 	 * @ keyId: Key ID
38 	 * @ status: Shows the status 0 is Success and 1 is failure
39 	 *
40 	 * This event is used in SECURITY to send various wlan security modes
41 	 * Values for parameters are defined below:
42 	 * Event ID: offset: 0 length: 1
43 	 * 5  - Remove Key Req
44 	 * 6  - Remove Key Rsp
45 	 * 7  - PMKID Candidate Found
46 	 * 8  - PMKID Update
47 	 * 9  - Mic Error
48 	 * 10 - Set UniCast Key Req
49 	 * 11 - Set UniCast Key Rsp
50 	 * 12 - Set BCast Key Req
51 	 * 13 - Set BCast Key Rsp
52 	 *
53 	 * Auth Mode: offset: 1 length: 1
54 	 * 0 - Open
55 	 * 1 - Shared
56 	 * 2 - WPA EAP
57 	 * 3 - WPA PSK
58 	 * 4 - WPA2 EAP
59 	 * 5 - WPA2 PSK
60 	 *
61 	 * Encryption Mode Unicast: offset: 2 length: 1
62 	 * 0 - Open
63 	 * 1 - WEP40
64 	 * 2 - WEP104
65 	 * 3 - TKIP
66 	 * 4 - AES
67 	 *
68 	 * Encryption Mode Multicast: offset: 3 length: 1
69 	 * 0 - Open
70 	 * 1 - WEP40
71 	 * 2 - WEP104
72 	 * 3 - TKIP
73 	 * 4 - AES
74 	 *
75 	 * ENC_MODE_SMS4: offset: 4 length:1
76 	 *
77 	 * PMK ID Match: offset: 5 length: 1
78 	 * 0 - No Match
79 	 * 1 - Match
80 	 *
81 	 * BSSID[0]: offset: 6 length: 1
82 	 * BSSID[1]: offset: 7 length: 1
83 	 * BSSID[2]: offset: 8 length: 1
84 	 * BSSID[3]: offset: 9 length: 1
85 	 * BSSID[4]: offset: 10 length: 1
86 	 * BSSID[5]: offset: 11 length: 1
87 	 *
88 	 * Key ID: offset: 12 length: 1
89 	 * Status: offset: 13 length: 1
90 	 * 0 - Success
91 	 * 1 - Failure
92 	 *
93 	 * Supported Feature: wlan security
94 	 *
95 	 * </diag_event>
96 	 */
97 
98 	EVENT_WLAN_SECURITY = 0x675, /* 13 byte payload */
99 
100 	/*
101 	 * <diag_event>
102 	 * EVENT_WLAN_STATUS
103 	 * @ eventId: Event id
104 	 * @ ssid: SSID
105 	 * @ bssType: BSS Type
106 	 * @ rssi: RSSI
107 	 * @ channel: Channel
108 	 * @ qosCapability: QoS Capability
109 	 * @ authmode: Auth Mode
110 	 * @ encryptionType: Encryption Type
111 	 * @ reason: Reason
112 	 * @ reasonDisconnect: Reason Disconnect
113 	 *
114 	 * This event is used to send wlan status
115 	 * Values for parameters are defined below:
116 	 * Event ID: offset: 0 length: 1
117 	 * 0 - Connect
118 	 * 1 - Disconnect
119 	 *
120 	 * SSID: offset: 1 length: 32
121 	 * BSS Type: offset: 33 + SSID length, length: 1
122 	 * 0 - None
123 	 * 1 - BSS_TYPE_INFRASTRUCTURE
124 	 * 2 - BSS_TYPE_INFRA_AP
125 	 * 3 - BSS_TYPE_IBSS
126 	 * 4 - BSS_TYPE_START_IBSS
127 	 * 5 - BSS_TYPE_NDI
128 	 * 6 - BSS_TYPE_ANY
129 	 *
130 	 * RSSI: offset: 34 length: 1
131 	 * Channel: offset: 35 length: 1
132 	 * QoS Capability: offset: 36 length: 1
133 	 * Auth Mode: offset: 37 length: 1
134 	 * 0 - Open
135 	 * 1 - Shared
136 	 * 2 - WPA EAP
137 	 * 3 - WPA PSK
138 	 * 4 - WPA2 EAP
139 	 * 5 - WPA2 PSK
140 	 * 6 - WAPI CERT
141 	 * 7 - WAPI PSK
142 	 *
143 	 * Encryption Type: offset: 38 length: 1
144 	 * 0 - Open
145 	 * 1 - WEP40
146 	 * 2 - WEP104
147 	 * 3 - TKIP
148 	 * 4 - AES
149 	 *
150 	 * ENC_MODE_SMS4: offset: 39 length: 1
151 	 *
152 	 * Reason: offset: 40 length: 1
153 	 * 0 - Unspecified
154 	 * 1 - User Requested
155 	 * 2 - Mic Error
156 	 * 3 - Diassoc
157 	 * 4 - Deauth
158 	 * 5 - Handoff
159 	 *
160 	 * Reason Disconnect: offset: 41 length: 1
161 	 *
162 	 * Supported Feature: wlan status
163 	 *
164 	 * </diag_event>
165 	 */
166 
167 	EVENT_WLAN_STATUS, /* 15 byte payload */
168 
169 	/* Events 0x677 and 0x678 are not used */
170 
171 	/*
172 	 * <diag_event>
173 	 * EVENT_WLAN_QOS
174 	 * @ eventId: event id
175 	 * @ reasonCode: Reason for event
176 	 *
177 	 * This event is used to send quality set services
178 	 * Values for parameters are defined below:
179 	 * Event ID: offset: 0 length: 1
180 	 * 0 - Add TS Req
181 	 * 1 - Add TS Rsp
182 	 * 2 - Delts
183 	 *
184 	 * Reason Code: offset: 1 length: 1
185 	 * 0 - Admission Accepted
186 	 * 1 - Invalid Params
187 	 * 2 - Reserved
188 	 * 3 - Refused
189 	 * 4 - User Requested
190 	 * 5 - Ind From AP
191 	 *
192 	 * Supported Feature: Qos wlan
193 	 *
194 	 * </diag_event>
195 	 */
196 
197 	EVENT_WLAN_QOS = 0x679, /* 2 byte payload */
198 
199 	/*
200 	 * <diag_event>
201 	 * EVENT_WLAN_PE
202 	 * @bssid: BSSID
203 	 * @ event_type: Event type
204 	 * @ sme_state: SME state
205 	 * @ mlm_state: MLM state
206 	 * @ status: 0 - Success, 1 - Failure < majority 0 is success >
207 	 * @reason_code: reason for event report
208 	 *
209 	 * This event is used in PE to send different diag events.
210 	 * Values for parameters are defined below:
211 	 *
212 	 * bssid[0]: offset: 0 length: 1
213 	 * bssid[1]: offset: 1 length: 1
214 	 * bssid[2]: offset: 2 length: 1
215 	 * bssid[3]: offset: 3 length: 1
216 	 * bssid[4]: offset: 4 length: 1
217 	 * bssid[5]: offset: 5 length: 1
218 	 *
219 	 * Event Type: offset: 6 length: 2
220 	 * 0  - SCAN REQ EVENT
221 	 * 1  - SCAN ABORT IND EVENT
222 	 * 2  - SCAN_RSP_EVENT
223 	 * 3  - JOIN_REQ_EVENT
224 	 * 4  - JOIN_RSP_EVENT
225 	 * 5  - SETCONTEXT_REQ_EVENT
226 	 * 6  - SETCONTEXT_RSP_EVENT
227 	 * 7  - REASSOC_REQ_EVENT
228 	 * 8  - REASSOC_RSP_EVENT
229 	 * 9  - AUTH_REQ_EVENT
230 	 * 10 - AUTH_RSP_EVENT
231 	 * 11 - DISASSOC_REQ_EVENT
232 	 * 12 - DISASSOC_RSP_EVENT
233 	 * 13 - DISASSOC_IND_EVENT
234 	 * 14 - DISASSOC_CNF_EVENT
235 	 * 15 - DEAUTH_REQ_EVENT
236 	 * 16 - DEAUTH_RSP_EVENT
237 	 * 17 - DEAUTH_IND_EVENT
238 	 * 18 - START_BSS_REQ_EVENT
239 	 * 19 - START_BSS_RSP_EVENT
240 	 * 20 - AUTH_IND_EVENT
241 	 * 21 - ASSOC_IND_EVENT
242 	 * 22 - ASSOC_CNF_EVENT
243 	 * 23 - REASSOC_IND_EVENT
244 	 * 24 - SWITCH_CHL_IND_EVENT
245 	 * 25 - SWITCH_CHL_RSP_EVENT
246 	 * 26 - STOP_BSS_REQ_EVENT
247 	 * 27 - STOP_BSS_RSP_EVENT
248 	 * 28 - DEAUTH_CNF_EVENT
249 	 * 29 - ADDTS_REQ_EVENT
250 	 * 30 - ADDTS_RSP_EVENT
251 	 * 31 - DELTS_REQ_EVENT
252 	 * 32 - DELTS_RSP_EVENT
253 	 * 33 - DELTS_IND_EVENT
254 	 * 34 - ENTER_BMPS_REQ_EVENT
255 	 * 35 - ENTER_BMPS_RSP_EVENT
256 	 * 36 - EXIT_BMPS_REQ_EVENT
257 	 * 37 - BMPS_RSP_EVENT
258 	 * 38 - EXIT_BMPS_IND_EVENT
259 	 * 39 - ENTER_IMPS_REQ_EVENT
260 	 * 40 - ENTER_IMPS_RSP_EVENT
261 	 * 41 - EXIT_IMPS_REQ_EVENT
262 	 * 42 - EXIT_IMPS_RSP_EVENT
263 	 * 43 - ENTER_UAPSD_REQ_EVENT
264 	 * 44 - ENTER_UAPSD_RSP_EVENT
265 	 * 45 - EXIT_UAPSD_REQ_EVENT
266 	 * 46 - EXIT_UAPSD_RSP_EVENT
267 	 * 47 - WOWL_ADD_BCAST_PTRN_EVENT
268 	 * 48 - WOWL_DEL_BCAST_PTRN_EVENT
269 	 * 49 - ENTER_WOWL_REQ_EVENT
270 	 * 50 - ENTER_WOWL_RSP_EVENT
271 	 * 51 - EXIT_WOWL_REQ_EVENT
272 	 * 52 - EXIT_WOWL_RSP_EVENT
273 	 * 53 - HAL_ADDBA_REQ_EVENT
274 	 * 54 - HAL_ADDBA_RSP_EVENT
275 	 * 55 - HAL_DELBA_IND_EVENT
276 	 * 56 - HB_FAILURE_TIMEOUT
277 	 * 57 - PRE_AUTH_REQ_EVENT
278 	 * 58 - PRE_AUTH_RSP_EVENT
279 	 * 59 - PREAUTH_DONE
280 	 * 60 - REASSOCIATING
281 	 * 61 - CONNECTED
282 	 * 62 - ASSOC_REQ_EVENT
283 	 * 63 - AUTH_COMP_EVENT
284 	 * 64 - ASSOC_COMP_EVENT
285 	 * 65 - AUTH_START_EVENT
286 	 * 66 - ASSOC_START_EVENT
287 	 * 67 - REASSOC_START_EVENT
288 	 * 68 - ROAM_AUTH_START_EVENT
289 	 * 69 - ROAM_AUTH_COMP_EVENT
290 	 * 70 - ROAM_ASSOC_START_EVENT
291 	 * 71 - ROAM_ASSOC_COMP_EVENT
292 	 * 72 - SCAN_COMPLETE_EVENT
293 	 * 73 - SCAN_RESULT_FOUND_EVENT
294 	 * 74 - ASSOC_TIMEOUT
295 	 * 75 - AUTH_TIMEOUT
296 	 * 76 - DEAUTH_FRAME_EVENT
297 	 * 77 - DISASSOC_FRAME_EVENT
298 	 *
299 	 * SME State: offset: 8 length: 2
300 	 * 0  - OFFLINE
301 	 * 1  - IDLE
302 	 * 2  - SUSPEND
303 	 * 3  - WT SCAN
304 	 * 4  - WT JOIN
305 	 * 5  - WT AUTH
306 	 * 6  - WT ASSOC
307 	 * 7  - WT REASSOC
308 	 * 8  - WT REASSOC LINK FAIL
309 	 * 9  - JOIN FAILURE
310 	 * 10 - ASSOCIATED
311 	 * 11 - REASSOCIATED
312 	 * 12 - LINK EST
313 	 * 13 - LINK EST WT SCAN
314 	 * 14 - WT PRE AUTH
315 	 * 15 - WT DISASSOC
316 	 * 16 - WT DEAUTH
317 	 * 17 - WT START BSS
318 	 * 18 - WT STOP BSS
319 	 * 19 - NORMAL
320 	 * 20 - CHANNEL SCAN
321 	 * 21 - NORMAL CHANNEL SCAN
322 	 *
323 	 * MLM State: offset: 10 length: 2
324 	 * 0  - MLM OFFLINE
325 	 * 1  - MLM IDLE
326 	 * 2  - MLM WT PROBE RESP
327 	 * 3  - MLM PASSIVE SCAN
328 	 * 4  - MLM WT JOIN BEACON
329 	 * 5  - MLM JOINED
330 	 * 6  - MLM BSS STARTED
331 	 * 7  - MLM WT AUTH FRAME
332 	 * 8  - MLM WT AUTH FRAME
333 	 * 9  - MLM WT AUTH FRAME
334 	 * 10 - MLM AUTH RSP TIMEOUT
335 	 * 11 - MLM AUTHENTICATED
336 	 * 12 - MLM WT ASSOC RSP
337 	 * 13 - MLM WT REASSOC RSP
338 	 * 14 - MLM ASSOCIATED
339 	 * 15 - MLM REASSOCIATED
340 	 * 16 - MLM LINK ESTABLISHED
341 	 * 17 - MLM WT ASSOC CNF
342 	 * 18 - MLM LEARN
343 	 * 19 - MLM WT ADD BSS RSP
344 	 * 20 - MLM WT DEL BSS RSP
345 	 * 21 - MLM WT ADD BSS RSP ASSOC
346 	 * 22 - MLM WT ADD BSS RSP REASSOC
347 	 * 23 - MLM WT ADD BSS RSP PREASSOC
348 	 * 24 - MLM WT ADD STA RSP
349 	 * 25 - MLM WT DEL STA RSP
350 	 * 26 - MLM WT ASSOC DEL STA RSP
351 	 * 27 - MLM WT SET BSS KEY
352 	 * 28 - MLM WT SET STA KEY
353 	 * 29 - MLM WT SET STA BCASTKEY
354 	 * 30 - MLM WT ADDBA RSP
355 	 * 31 - MLM WT REMOVE BSS KEY
356 	 * 32 - MLM WT REMOVE STA KEY
357 	 * 33 - MLM WT SET MIMOPS
358 	 *
359 	 * Status: offset: 12 length: 2
360 	 * Reason Code: offset: 14 length: 2
361 	 *
362 	 * Supported Feature: STA
363 	 *
364 	 * </diag_event>
365 	 */
366 
367 	EVENT_WLAN_PE, /* 16 byte payload */
368 
369 	/* Events between 0x67b to 0x67f are not used */
370 
371 	/*
372 	 * <diag_event>
373 	 * EVENT_WLAN_BRINGUP_STATUS
374 	 * @ wlanStatus: Describe wlan status
375 	 * @ driverVersion: Driver version between 0 to 9
376 	 *
377 	 * This event is used in BRINGUP to send wlan status
378 	 * Values for parameters are defined below:
379 	 * WLAN Status: offset: 0 length: 2
380 	 * 0 - WLAN Disabled
381 	 * 1 - WLAN Enabled
382 	 * 2 - Reset Fail
383 	 * 3 - Reset Success
384 	 * 4 - Device Removed
385 	 * 5 - Device Inserted
386 	 * 6 - Driver Unloaded
387 	 * 7 - Driver Loaded
388 	 * 8 - bus/link down
389 	 * 9 - chip temperature high
390 	 *
391 	 * driverVersion: offset: 2 length: 10
392 	 *
393 	 * Supported Feature: Bringup
394 	 *
395 	 * </diag_event>
396 	 */
397 
398 	EVENT_WLAN_BRINGUP_STATUS = 0x680, /* 12 byte payload */
399 
400 	/*
401 	 * <diag_event>
402 	 * EVENT_WLAN_POWERSAVE_GENERIC
403 	 * @ event_subtype: Event subtype
404 	 * @ full_power_request_reason: Full power request reason
405 	 * @ pmc_current_state: Pmc current state
406 	 * @ enable_disable_powersave_mode: Enable disable powersave mode
407 	 * @ winmob_d_power_state: winmob d power state
408 	 * @ dtim_period: DTIM period
409 	 * @ final_listen_intv: Final listen int
410 	 * @ bmps_auto_timer_duration: BMPS auto timer duration
411 	 * @ bmps_period: BMPS period
412 	 *
413 	 * This event is used in POWERSAVE to send wlan status
414 	 * Values for parameters are defined below:
415 	 * Event Sub Type: offset: 0 length: 1
416 	 * Full Power Req Reason: offset: 1 length: 1
417 	 * PMC Current State: offset: 2 length: 1
418 	 * Enable disable powersave mode: 3 length: 1
419 	 * Winmob D Power State: offset: 4 length: 1
420 	 * DTIM Period: offset:5 length: 1
421 	 * Final Listen INTV: offset:6 length: 2
422 	 * BMPS Auto Timer Duration: 8 length: 2
423 	 * BMPS Period: offset: 10 length:2
424 	 *
425 	 * Supported Feature: POWERSAVE GENERIC
426 	 *
427 	 * </diag_event>
428 	 */
429 
430 	EVENT_WLAN_POWERSAVE_GENERIC, /* 16 byte payload */
431 
432 	/*
433 	 * <diag_event>
434 	 * EVENT_WLAN_POWERSAVE_WOW
435 	 * @ event_subtype: Event subtype
436 	 * @ wow_type: Wow type
437 	 * @ wow_magic_pattern: It will use pattern from 0 to 5
438 	 * @ wow_del_ptrn_id: Wow delete pattern id
439 	 * @ wow_wakeup_cause: Wow wakeup cause
440 	 * @ wow_wakeup_cause_pbm_ptrn_id: Wow wakeup cause pbm pattern id
441 	 *
442 	 * This event is used in POWERSAVE WOW to send the wow wakeup pattern,
443 	 * cause etc
444 	 * Values for parameters are defined below:
445 	 * Event Sub Type: offset: 0 length: 1
446 	 * 0 - Enter
447 	 * 1 - Exit
448 	 * 2 - Del Pattern
449 	 * 3 - Wakeup
450 	 *
451 	 * WOW Type: offset: 1 length: 1
452 	 * 0 - None
453 	 * 1 - Magic Pkt Only
454 	 * 2 - Byte Match Only
455 	 * 3 - Magic Pkt Byte Match
456 	 *
457 	 * WOW Magic Pattern: offset:2 length: 6
458 	 * WOW Del Pattern ID: offset:8 length: 1
459 	 * WOW Wakeup Cause: offset: 9 length: 1
460 	 * 0 - Magic Pkt Match
461 	 * 1 - Ptrn Byte Match
462 	 * WOW Wakeup Cause PBM Ptrn ID: offset: 10 length: 1
463 	 *
464 	 * Supported Feature: Powersave wow
465 	 *
466 	 * </diag_event>
467 	 */
468 
469 	EVENT_WLAN_POWERSAVE_WOW, /* 11 byte payload */
470 
471 	/* Events between 0x683 to 0x690 are not used */
472 
473 	/*
474 	 * <diag_event>
475 	 * EVENT_WLAN_BTC
476 	 * @ eventId: Event id
477 	 * @ btAddr: BT address
478 	 * @ connHandle: Connection handle
479 	 * @ connStatus: Connection status
480 	 * @ linkType: Link Type
481 	 * @ scoInterval: Synchronous Connection Oriented interval
482 	 * @ scoWindow: Synchronous Connection Oriented window
483 	 * @ retransWindow: Retransmisson window
484 	 * @ mode: Mode
485 	 *
486 	 * This event is used in Bluetooth to send the btc status
487 	 * Values for parameters are defined below:
488 	 * Event ID: offset: 0 length: 1
489 	 * 0  - DEVICE SWITCHED ON
490 	 * 1  - DEVICE SWITCHED OFF
491 	 * 2  - INQUIRY STARTED
492 	 * 3  - INQUIRY STOPPED
493 	 * 4  - PAGE STARTED
494 	 * 5  - PAGE STOPPED
495 	 * 6  - CREATE ACL CONNECTION
496 	 * 7  - ACL CONNECTION COMPLETE
497 	 * 8  - CREATE SYNC CONNECTION
498 	 * 9  - SYNC CONNECTION COMPLETE
499 	 * 10 - SYNC CONNECTION UPDATED
500 	 * 11 - DISCONNECTION COMPLETE
501 	 * 12 - MODE CHANGED
502 	 * 13 - A2DP STREAM START
503 	 * 14 - A2DP STREAM STOP
504 	 *
505 	 * BT Addr[0]: offset: 1 length: 1
506 	 * BT Addr[1]: offset: 2 length: 1
507 	 * BT Addr[2]: offset: 3 length: 1
508 	 * BT Addr[3]: offset: 4 length: 1
509 	 * BT Addr[4]: offset: 5 length: 1
510 	 * BT Addr[5]: offset: 6 length: 1
511 	 *
512 	 * Conn Handle: offset: 7 length: 2
513 	 * 65535 - Invalid
514 	 *
515 	 * Conn Status: offset:9 length: 1
516 	 * 0 - Fail
517 	 * 1 - success
518 	 *
519 	 * Link Type: offset: 10 length: 1
520 	 * 0 - SCO
521 	 * 1 - ACL
522 	 * 2 - ESCO
523 	 *
524 	 * Sco Interval: offset: 11 length: 1
525 	 * Sco Window: offset: 12 length: 1
526 	 * Retrans Window: offset: 13 length: 1
527 	 *
528 	 * Mode: offset: 14 length: 1
529 	 * 0 - Active
530 	 * 1 - Hold
531 	 * 2 - Sniff
532 	 * 3 - Park
533 	 *
534 	 * Supported Feature: Bluetooth
535 	 *
536 	 * </diag_event>
537 	 */
538 
539 	EVENT_WLAN_BTC = 0x691, /* 15 byte payload */
540 
541 	/*
542 	 * <diag_event>
543 	 * EVENT_WLAN_EAPOL
544 	 * @ event_sub_type: 0-Transmitted, 1-Received
545 	 * @ eapol_packet_type: 0 - EAP Start, 1 - EAPOL Start, 2 - EAPOL
546 	 * Logoff, 3 - EAPOL Key, 4 - EAPOL Encapsulated Alert
547 	 * @ eapol_key_info: This field from the driver is in big endian format
548 	 * @ eapol_rate: Rate at which the frame is received
549 	 * @ dest_addr: Destination address
550 	 * * @ src_addr: Source address
551 	 *
552 	 * This event is used to send Extensible Authentication Protocol
553 	 * information
554 	 * Values for parameters are defined below:
555 	 * event_sub_type: offset: 0 length: 1
556 	 * eapol_packet_type: offset: 1 length: 1
557 	 * eapol_key_info: offset:2 length: 2
558 	 * eapol_rate: offset: 4 length: 2
559 	 * dest_addr[0]: offset: 6 length: 1
560 	 * dest_addr[1]: offset: 7 length: 1
561 	 * dest_addr[2]: offset: 8 length: 1
562 	 * dest_addr[3]: offset: 9 length: 1
563 	 * dest_addr[4]: offset: 10 length: 1
564 	 * dest_addr[5]: offset: 11 length: 1
565 	 * src_addr[0]: offset: 12 length: 1
566 	 * src_addr[1]: offset: 13 length: 1
567 	 * src_addr[2]: offset: 14 length: 1
568 	 * src_addr[3]: offset: 15 length: 1
569 	 * src_addr[4]: offset: 16 length: 1
570 	 * src_addr[5]: offset: 17 length: 1
571 	 *
572 	 * Supported Feature: Extensible Authentication Protocol
573 	 *
574 	 * </diag_event>
575 	 */
576 
577 	EVENT_WLAN_EAPOL = 0xA8D,/* 18 bytes payload */
578 
579 	/*
580 	 * <diag_event>
581 	 * EVENT_WLAN_WAKE_LOCK
582 	 * @ status: Whether the wakelock is taken/released
583 	 * @ reason: Reason for taking this wakelock
584 	 * @ timeout: Timeout value in case of timed wakelocks
585 	 * @ name_len: Length of the name of the wakelock that will follow
586 	 * @ name: Name of the wakelock
587 	 *
588 	 * This event is used to send wakelock information
589 	 * Values for parameters are defined below:
590 	 * status: offset: 0 length: 4
591 	 * reason: offset: 4 length: 4
592 	 * timeout: offset: 8 length: 4
593 	 * name_len: offset: 12 length: 4
594 	 *
595 	 * Supported Feature: wlan wakelock
596 	 *
597 	 * </diag_event>
598 	 */
599 
600 	EVENT_WLAN_WAKE_LOCK = 0xAA2, /* 96 bytes payload */
601 	EVENT_WLAN_BEACON_RECEIVED = 0xAA6, /* FW event: 2726 */
602 
603 	/*
604 	 * <diag_event>
605 	 * EVENT_WLAN_LOG_COMPLETE
606 	 * @ is_fatal: Indicates if the event is fatal or not
607 	 * @ indicator: Source of the bug report - Framework/Host/Firmware
608 	 * @ reason_code: Reason for triggering bug report
609 	 * @ reserved: Reserved field
610 	 *
611 	 * This event is used to send log completion related information
612 	 * Values for parameters are defined below:
613 	 * is_fatal: offset: 0 length: 4
614 	 * indicator: offset: 4 length: 4
615 	 * reason_code: offset: 8 length: 4
616 	 * reserved: offset: 12 length: 4
617 	 *
618 	 * Supported Feature: Logging
619 	 *
620 	 * </diag_event>
621 	 */
622 
623 	EVENT_WLAN_LOG_COMPLETE = 0xAA7, /* 16 bytes payload */
624 
625 	/*
626 	 * <diag_event>
627 	 * EVENT_WLAN_STATUS_V2
628 	 * @ event_id: Event id
629 	 * @ ssid: Network SSID
630 	 * @ bssType: BSS Type
631 	 * @ rssi: RSSI
632 	 * @ channel: Channel Numbers
633 	 * @ qosCapability: quality of service capability
634 	 * @ authType: Authentication type
635 	 * @ encryptionType: Encryption type
636 	 * @ reason: Reason for triggering status
637 	 * @ reasonDisconnect:Reason for disconnection
638 	 *
639 	 * This event is used to send various wlan status
640 	 * Values for parameters are defined below:
641 	 * eventId: offset: 0 length: 1
642 	 * ssid[0] - ssid[31]: offset: 1 to 32, length: 1
643 	 * bssType: offset: 33 length: 1
644 	 * rssi: offset: 34 length: 1
645 	 * channel: offset: 35 length: 1
646 	 * qosCapability: offset: 36 length: 1
647 	 * authType: offset: 37 length: 1
648 	 * encryptionType: offset: 38 length: 1
649 	 * reason: offset: 39 length: 1
650 	 * reasonDisconnect: offset: 40 length: 1
651 	 *
652 	 * Supported Feature: Wlan status
653 	 *
654 	 * </diag_event>
655 	 */
656 
657 	EVENT_WLAN_STATUS_V2 = 0xAB3,
658 
659 	/*
660 	 * <diag_event>
661 	 * EVENT_WLAN_TDLS_TEARDOWN
662 	 * @ reason: reason for tear down.
663 	 * @peer_mac: Peer mac address
664 	 *
665 	 *
666 	 * This event is sent when TDLS tear down happens.
667 	 *
668 	 * Supported Feature: TDLS
669 	 *
670 	 * </diag_event>
671 	 */
672 	EVENT_WLAN_TDLS_TEARDOWN = 0xAB5,
673 
674 	/*
675 	 * <diag_event>
676 	 * EVENT_WLAN_TDLS_ENABLE_LINK
677 	 * @peer_mac: peer mac
678 	 * @is_off_chan_supported: If peer supports off channel
679 	 * @is_off_chan_configured: If off channel is configured
680 	 * @is_off_chan_established: If off channel is established
681 	 *
682 	 *
683 	 * This event is sent when TDLS enable link happens.
684 	 *
685 	 * Supported Feature: TDLS
686 	 *
687 	 * </diag_event>
688 	 */
689 	EVENT_WLAN_TDLS_ENABLE_LINK = 0XAB6,
690 
691 	/*
692 	 * <diag_event>
693 	 * EVENT_WLAN_SUSPEND_RESUME
694 	 * @ state: suspend/resume state
695 	 *
696 	 * This event is used to send suspend resume info
697 	 * Values for parameters are defined below:
698 	 * suspend: offset: 0 length: 1
699 	 * 0 - HDD_WLAN_EARLY_SUSPEND
700 	 * 1 - HDD_WLAN_SUSPEND
701 	 * 2 - HDD_WLAN_EARLY_RESUME
702 	 * 3 - HDD_WLAN_RESUME
703 	 *
704 	 * Supported Feature: suspend/resume
705 	 *
706 	 * </diag_event>
707 	 */
708 
709 	EVENT_WLAN_SUSPEND_RESUME = 0xAB7,
710 
711 	/*
712 	 * <diag_event>
713 	 * EVENT_WLAN_OFFLOAD_REQ
714 	 * @ offload_type: offload type
715 	 * @ state: enabled or disabled state
716 	 *
717 	 * This event is used to send offload info
718 	 * Values for parameters are defined below:
719 	 * offloadType: offset: 0 length: 1
720 	 * 0 - SIR_IPV4_ARP_REPLY_OFFLOAD
721 	 * 1 - SIR_IPV6_NEIGHBOR_DISCOVERY_OFFLOAD
722 	 * 2 - SIR_IPV6_NS_OFFLOAD
723 	 *
724 	 * enableOrDisable: offset: 1 length: 1
725 	 * 0 - SIR_OFFLOAD_DISABLE
726 	 * 1 - SIR_OFFLOAD_ENABLE
727 	 *
728 	 * Supported Feature: offload
729 	 *
730 	 * </diag_event>
731 	 */
732 
733 	EVENT_WLAN_OFFLOAD_REQ = 0xAB8,
734 
735 	/*
736 	 * <diag_event>
737 	 * EVENT_TDLS_SCAN_BLOCK
738 	 * @status: rejected status
739 	 *
740 	 *
741 	 * This event is sent when scan is rejected due to TDLS.
742 	 *
743 	 * Supported Feature: TDLS
744 	 *
745 	 * </diag_event>
746 	 */
747 	EVENT_TDLS_SCAN_BLOCK = 0xAB9,
748 
749 	/*
750 	 * <diag_event>
751 	 * EVENT_WLAN_TDLS_TX_RX_MGMT
752 	 * @event_id: event id
753 	 * @tx_rx: tx or rx
754 	 * @type: type of frame
755 	 * @action_sub_type: action frame type
756 	 * @peer_mac: peer mac
757 	 *
758 	 *
759 	 * This event is sent when TDLS mgmt rx tx happens.
760 	 *
761 	 * Supported Feature: TDLS
762 	 *
763 	 * </diag_event>
764 	 */
765 	EVENT_WLAN_TDLS_TX_RX_MGMT = 0xABA,
766 
767 	/*
768 	 * <diag_event>
769 	 * EVENT_WLAN_LOW_RESOURCE_FAILURE
770 	 * @ WIFI_EVENT_MEMORY_FAILURE: Memory failure
771 	 *
772 	 * This event is used to send reason why low resource situation
773 	 * is observed
774 	 *
775 	 * Supported Feature: Memory
776 	 *
777 	 * </diag_event>
778 	 */
779 
780 	EVENT_WLAN_LOW_RESOURCE_FAILURE = 0xABB,
781 
782 	/*
783 	 * <diag_event>
784 	 * EVENT_WLAN_POWERSAVE_WOW_STATS
785 	 * @ wow_ucast_wake_up_count: send unicast packet count
786 	 * @ wow_bcast_wake_up_count: send broadcast packet count
787 	 * @ wow_ipv4_mcast_wake_up_coun: send ipv4 multicast packet count
788 	 * @ wow_ipv6_mcast_wake_up_count: send ipv6 multicast packet count
789 	 * @ wow_ipv6_mcast_ra_stats: send ipv6 multicast ra packet count
790 	 * @ wow_ipv6_mcast_ns_stats: send ipv6 multicast ns packet count
791 	 * @ wow_ipv6_mcast_na_stats: send ipv6 multicast na packet count
792 	 * @ wow_pno_match_wake_up_count: preferred network offload match count
793 	 * @ wow_pno_complete_wake_up_count: preferred network offload complete
794 	 * @ wow_gscan_wake_up_count:Reason: send external scan packet count
795 	 * @ wow_low_rssi_wake_up_count: send low rssi packet count
796 	 * @ wow_rssi_breach_wake_up_count: send rssi breach packet count
797 	 * @ wow_icmpv4_count: Send icmpv4 packet count
798 	 * @ wow_icmpv6_count: send icmpv6 packet count
799 	 * @ wow_oem_response_wake_up_count: Send oem response packet count
800 	 *
801 	 * This event is used to send wow wakeup stats information
802 	 *
803 	 * Supported Feature: Wlan powersave wow
804 	 *
805 	 * </diag_event>
806 	 */
807 	EVENT_WLAN_POWERSAVE_WOW_STATS = 0xB33,
808 
809 	/*
810 	 * <diag_event>
811 	 * EVENT_WLAN_STA_KICKOUT
812 	 * @reasoncode: Indicates the reasoncode of event
813 	 * @peer_macaddr: Indicates the peer macaddr
814 	 * @vdev_id: Indicate unique id for identifying the VDEV
815 	 *
816 	 * This event is used to send sta kickout information
817 	 * Values for parameters are defined below:
818 	 * Reasoncode: offset: 0 length: 4
819 	 * Peer macaddr: offset: 4 length: 6
820 	 * VDEV ID: offset: 10 length 1
821 	 *
822 	 * Supported Feature: STA
823 	 *
824 	 * </diag_event>
825 	 */
826 
827 	EVENT_WLAN_STA_KICKOUT = 0xB39,
828 
829 	/*
830 	 * <diag_event>
831 	 * EVENT_WLAN_STA_DATASTALL
832 	 * @reason: Indicates the reason of event
833 	 *
834 	 * This event is used to send sta datastall information
835 	 * Values for parameters are defined below:
836 	 * Reason: offset:0 length: 4
837 	 *
838 	 * Supported Feature: STA
839 	 *
840 	 * </diag_event>
841 	 */
842 
843 	EVENT_WLAN_STA_DATASTALL = 0xB3A,
844 
845 	/*
846 	 * <diag_event>
847 	 * EVENT_WLAN_SOFTAP_DATASTALL
848 	 * @reason: Indicates the reason of event
849 	 *
850 	 * This event is used to send SAP datastall information
851 	 * Values for parameters are defined below:
852 	 * Reason: offset:0 length: 4
853 	 *
854 	 * Supported Feature: SAP
855 	 *
856 	 * </diag_event>
857 	 */
858 
859 	EVENT_WLAN_SOFTAP_DATASTALL = 0xB3B,
860 
861 	/*
862 	 * <diag_event>
863 	 * EVENT_WLAN_SSR_REINIT_SUBSYSTEM
864 	 * @status: Indicates the status of event
865 	 *
866 	 * This event is used to send ssr reinit status
867 	 * Values for parameters are defined below:
868 	 * Status: offset: 0 length: 4
869 	 *
870 	 * Supported Feature: SSR
871 	 *
872 	 *  </diag_event>
873 	 */
874 
875 	EVENT_WLAN_SSR_REINIT_SUBSYSTEM = 0xB3C,
876 
877 	/*
878 	 * <diag_event>
879 	 * EVENT_WLAN_SSR_SHUTDOWN_SUBSYSTEM
880 	 * @status: Indicates the status of event
881 	 *
882 	 * This event is used to send ssr shutdown status
883 	 * Values for parameters are defined below:
884 	 * Status: offset: 0 length: 4
885 	 *
886 	 * Supported Feature: SSR
887 	 *
888 	 * </diag_event>
889 	 */
890 
891 	EVENT_WLAN_SSR_SHUTDOWN_SUBSYSTEM = 0xB3D,
892 	EVENT_WLAN_ACS_REQ = 0xC4A,
893 	EVENT_WLAN_ACS_SCAN_START = 0xC4B,
894 	EVENT_WLAN_ACS_SCAN_DONE = 0xC4C,
895 	EVENT_WLAN_ACS_CHANNEL_SPECTRAL_WEIGHT = 0xC4D,
896 	EVENT_WLAN_ACS_BEST_CHANNEL = 0xC4E,
897 	EVENT_WLAN_HOST_MGMT_TX_V2 = 0xC52,
898 	EVENT_WLAN_HOST_MGMT_RX_V2 = 0xC53,
899 	EVENT_WLAN_CONN_STATS_V2 = 0xC56,
900 
901 	/*
902 	 * <diag_event>
903 	 * EVENT_WLAN_RSN_INFO
904 	 * @akm_suite: Gives information about akm suites used in assoc request
905 	 * @ucast_cipher: Unicast cipher used in assoc request
906 	 * @mcast_cipher: Multi cast cipher used in assoc request
907 	 * @group_mgmt: Requested group mgmt cipher suite
908 	 *
909 	 * This event is used to send RSN information used
910 	 * in assoc request.
911 	 *
912 	 * Supported Feature: STA
913 	 *
914 	 * </diag_event>
915 	 */
916 
917 	EVENT_WLAN_RSN_INFO = 0xC5B,
918 
919 	/*
920 	 * <diag_event>
921 	 * EVENT_WLAN_AUTH_INFO
922 	 * @auth_algo_num: Gives information about algo num used in auth request
923 	 * @auth_transaction_seq_num: seq num of auth request
924 	 * @auth_status_code: status code of auth request
925 	 *
926 	 * This event is used to send algo num, seq num and status code
927 	 * for auth request
928 	 *
929 	 * Supported Feature: STA
930 	 *
931 	 * </diag_event>
932 	 */
933 
934 	EVENT_WLAN_AUTH_INFO = 0xC92,
935 
936 	/*
937 	 * <diag_event>
938 	 * EVENT_WLAN_CONN
939 	 * @diag_cmn: Common diag info
940 	 * @version: Structure Version
941 	 * @ssid_len: Length of SSID
942 	 * @auth_algo: Authentication algorithm number field as defined in
943 	 * IEEE 802.11 - 2020 standard section 9.4.1.1
944 	 * @bt_coex: Is there active bluetooth connection
945 	 * @ssid: SSID
946 	 * @bssid_hint: BSSID hint provided in the connect request
947 	 * @reason: failure reason. Refer enum wlan_cm_connect_fail_reason
948 	 * @akm: Auth key management suite defined in IEEE Std 802.11‐2020
949 	 * Table 9-151—AKM suite selectors.
950 	 * @subtype: Event subtype defined in enum qca_conn_diag_log_event_type.
951 	 * @freq: Frequency in MHz
952 	 * @freq_hint: Frequency Hint in MHz
953 	 * @pairwise_cipher: Pairwise suite value as defined in IEEE 802.11 2020
954 	 * Table 12-10—Integrity and key wrap algorithms.
955 	 * @grp_cipher: Group cipher suite value as defined in
956 	 * Table 12-10—Integrity and key wrap algorithm in IEEE 802.11 2020.
957 	 * grp_mgmt: Group management cipher suite as defined in
958 	 * Table 12-10—Integrity and key wrap algorithms in IEEE 802.11 2020.
959 	 *
960 	 * This event is used to send connection parameters for
961 	 * connecting/connecting fail events
962 	 *
963 	 * Supported Feature: STA
964 	 *
965 	 * </diag_event>
966 	 */
967 
968 	EVENT_WLAN_CONN = 0xD17,
969 
970 	/*
971 	 * <diag_event>
972 	 * EVENT_WLAN_MGMT
973 	 * @diag_cmn: Common diag info
974 	 * @version: Structure Version
975 	 * @auth_algo: authentication algorithm number defined in
976 	 * IEEE Std 802.11‐2020
977 	 * @auth_frame_type: Authentication frame sub-type for SAE
978 	 * authentication
979 	 * defined in Section 9.4.1.1 Authentication Algorithm Number field in
980 	 * IEEE Std 802.11‐2020.
981 	 * @auth_seq_num: Authentication frame transaction sequence number
982 	 * @status: Frame status code as defined in IEEE Std
983 	 * 802.11‐2020 Table 9-50—Status codes.
984 	 * @tx_status: Frame TX status defined by enum qdf_dp_tx_rx_status
985 	 * @reason: reason code defined in Table 9-49 Reason codes field’
986 	 * from the IEEE 802.11 standard document.
987 	 * @eap_len: EAP data length
988 	 * @eap_type: EAP type. Values defined by IANA at:
989 	 * https://www.iana.org/assignments/eap-numbers
990 	 * @is_retry_frame: Retry frame indicator
991 	 * @subtype: Diag event defined in  enum qca_conn_diag_log_event_type
992 	 * @assoc_id: Association ID
993 	 * @sn: Frame sequence number
994 	 * @rssi: Peer RSSI in dBm
995 	 *
996 	 * This event is used to send management frame info for
997 	 * Management events such as Auth Req/Resp, Assoc Req/Resp,
998 	 * Reassoc Req/Resp, Disassoc Req/Resp, Deauth TX/RX and Disconnection.
999 	 *
1000 	 * Supported Feature: STA
1001 	 *
1002 	 * </diag_event>
1003 	 */
1004 
1005 	EVENT_WLAN_MGMT = 0xD1B,
1006 
1007 	/*
1008 	 * <diag_event>
1009 	 * EVENT_WLAN_ROAM_SCAN_START
1010 	 * @diag_cmn: Common diag info
1011 	 * @version: Structure Version
1012 	 * @is_full_scan: True if the scan is Full scan.
1013 	 * False if the roam scan is partial channel map scan
1014 	 * @cu:  Current connected channel load in percentage
1015 	 * @trigger_reason: Roam trigger reason defined by
1016 	 * enum roam_trigger_reason
1017 	 * @trigger_sub_reason: Roam scan trigger sub reason indicating if
1018 	 * periodic/inactivity scan timer initiated roam. Defined by enum
1019 	 * roam_trigger_sub_reason
1020 	 * @rssi: Connected AP RSSI in dBm
1021 	 * @rssi_thresh: Roam scan trigger threshold in dBm
1022 	 *
1023 	 * This event is used to send Roam Scan Start event related info.
1024 	 *
1025 	 * Supported Feature: STA
1026 	 *
1027 	 * </diag_event>
1028 	 */
1029 
1030 	EVENT_WLAN_ROAM_SCAN_START = 0xD1C,
1031 
1032 	/*
1033 	 * <diag_event>
1034 	 * EVENT_WLAN_ROAM_SCAN_DONE
1035 	 * @diag_cmn: Common diag info
1036 	 * @version: Structure Version
1037 	 * @cand_ap_count: Roam candidate AP count
1038 	 * @btcoex_active: Is there active bluetooth connection
1039 	 * @num_scanned_freq: Number of scanned frequencies
1040 	 * @scan_freq: Array of scanned frequencies value in MHz
1041 	 *
1042 	 * This event is used to send Roam Scan Done event info.
1043 	 *
1044 	 * Supported Feature: STA
1045 	 *
1046 	 * </diag_event>
1047 	 */
1048 
1049 	EVENT_WLAN_ROAM_SCAN_DONE = 0xD1D,
1050 
1051 	/*
1052 	 * <diag_event>
1053 	 * EVENT_WLAN_ROAM_CAND_INFO
1054 	 * @diag_cmn: Common diag info
1055 	 * @version: Structure Version
1056 	 * @is_current_ap: Is the entry candidate AP or connected AP
1057 	 * @idx: Entry index
1058 	 * @cu_load: Channel utilization load of the AP in percentage
1059 	 * @subtype: diag event subtype defined in
1060 	 * enum qca_conn_diag_log_event_type
1061 	 * @total_score: Total candidate AP score
1062 	 * @freq: Candidate AP channel frequency in MHz
1063 	 * @rssi: Candidate AP RSSI in dBm
1064 	 * @etp: Estimated throughput value of the AP in Kbps
1065 	 *
1066 	 * This event is used to send Roam candidate info
1067 	 *
1068 	 * Supported Feature: STA
1069 	 *
1070 	 * </diag_event>
1071 	 */
1072 
1073 	EVENT_WLAN_ROAM_CAND_INFO = 0xD1E,
1074 
1075 	/*
1076 	 * <diag_event>
1077 	 * EVENT_WLAN_ROAM_RESULT
1078 	 * @diag_cmn: Common diag info
1079 	 * @version: Structure Version
1080 	 * @is_roam_successful: True if roamed successfully or
1081 	 * false if roaming failed
1082 	 * @roam_fail_reason: Roam failure reason code defined in enum
1083 	 * wlan_roam_failure_reason_code
1084 	 *
1085 	 * This event is used to send Roam result info
1086 	 *
1087 	 * Supported Feature: STA
1088 	 *
1089 	 * </diag_event>
1090 	 */
1091 
1092 	EVENT_WLAN_ROAM_RESULT = 0xD1F,
1093 
1094 	/*
1095 	 * <diag_event>
1096 	 * EVENT_WLAN_ROAM_CANCEL
1097 	 * @diag_cmn: Common diag info
1098 	 * @version: Structure Version
1099 	 * @is_roam_successful: True if roamed successfully or
1100 	 * false if roaming failed
1101 	 * @roam_fail_reason: Roam failure reason code defined in enum
1102 	 * wlan_roam_failure_reason_code
1103 	 *
1104 	 * This event is used to send Roam cancel related info
1105 	 *
1106 	 * Supported Feature: STA
1107 	 *
1108 	 * </diag_event>
1109 	 */
1110 
1111 	EVENT_WLAN_ROAM_CANCEL = 0xD20,
1112 
1113 	/*
1114 	 * <diag_event>
1115 	 * EVENT_WLAN_BTM
1116 	 * @diag_cmn: Common diag info
1117 	 * @version: Structure Version
1118 	 * @reason: Query Reason field. Contains one of the values
1119 	 * defined in IEEE
1120 	 * Std 802.11‐2020 Table 9-198—Transition and Transition
1121 	 * Query reasons
1122 	 * @mode: BTM Request Mode field
1123 	 * @sub_reason: WTC sub reason code field in the BTM WTC vendor
1124 	 * specific IE
1125 	 * @cand_lst_cnt: Candidates list in the BTM frame
1126 	 * @status: BSS Transition management status codes defined in
1127 	 * 802.11‐2020 Table 9-428—BTM status code definitions
1128 	 * @delay: BSS Termination Delay field
1129 	 * @is_disassoc_imminent: Disassociation imminent bit
1130 	 * @token: dialog token. Dialog Token is a nonzero value chosen by
1131 	 * the STA
1132 	 * @wtc_duration: WTC duration field in minutes
1133 	 * while sending the BTM frame to identify the query/request/response
1134 	 * transaction
1135 	 * @subtype: Event Subtype
1136 	 * @validity_timer: Validity interval in TBTT
1137 	 * @disassoc_timer: Time after which the AP disassociates the STA,
1138 	 * defined in TBTT.
1139 	 *
1140 	 * This event is used to send BTM info
1141 	 *
1142 	 * Supported Feature: STA
1143 	 *
1144 	 * </diag_event>
1145 	 */
1146 
1147 	EVENT_WLAN_BTM = 0xD21,
1148 
1149 	/*
1150 	 * <diag_event>
1151 	 * EVENT_WLAN_BTM_CAND
1152 	 * @diag_cmn: Common diag info
1153 	 * @version: Structure Version
1154 	 * @idx: Candidate index
1155 	 * @preference: Candidate preference
1156 	 *
1157 	 * This event is used to send BTM Candidate info
1158 	 *
1159 	 * Supported Feature: STA
1160 	 *
1161 	 * </diag_event>
1162 	 */
1163 
1164 	EVENT_WLAN_BTM_CAND = 0xD22,
1165 
1166 	/*
1167 	 * <diag_event>
1168 	 * EVENT_WLAN_CONN_DP
1169 	 * @diag_cmn: Common diag info
1170 	 * @version: Structure Version
1171 	 * @auth_algo: authentication algorithm number defined in
1172 	 * IEEE Std 802.11‐2020
1173 	 * @auth_frame_type: Authentication frame sub-type for SAE
1174 	 * authentication defined in Section 9.4.1.1 Authentication
1175 	 * Algorithm Number field in IEEE Std 802.11‐2020.
1176 	 * @auth_seq_num: Authentication frame transaction sequence number
1177 	 * @status: Frame status code as defined in IEEE Std
1178 	 * 802.11‐2020 Table 9-50—Status codes.
1179 	 * @tx_status: Frame TX status defined by enum qdf_dp_tx_rx_status
1180 	 * @reason: reason code defined in Table 9-49 Reason codes field’
1181 	 * from the IEEE 802.11 standard document.
1182 	 * @eap_len: EAP data length
1183 	 * @eap_type: EAP type. Values defined by IANA at:
1184 	 * https://www.iana.org/assignments/eap-numbers
1185 	 * @is_retry_frame: Retry frame indicator
1186 	 * @subtype: Diag event defined in  enum qca_conn_diag_log_event_type
1187 	 * @assoc_id: Association ID
1188 	 * @sn: Frame sequence number
1189 	 * @rssi: Peer RSSI in dBm
1190 	 *
1191 	 * This event is used to send Datapath related info such as DHCP
1192 	 * handshake and EAPOL.
1193 	 *
1194 	 * Supported Feature: STA
1195 	 *
1196 	 * </diag_event>
1197 	 */
1198 
1199 	EVENT_WLAN_CONN_DP = 0xD23,
1200 
1201 	/*
1202 	 * <diag_event>
1203 	 * EVENT_WLAN_NBR_RPT
1204 	 * @diag_cmn: Common diag info
1205 	 * @version: structure version
1206 	 * @token: dialog token. Dialog Token is a nonzero value chosen by the
1207 	 * STA
1208 	 * @num_rpt: the number of neighbor report elements in response frame.
1209 	 * @num_freq: Number of frequency in response frame
1210 	 * @ssid: SSID
1211 	 * @freq: Frequency list in response frame
1212 	 *
1213 	 * This Event is used to send Neighbor report
1214 	 *
1215 	 * Supported Feature: STA
1216 	 *
1217 	 * </diag_event>
1218 	 */
1219 
1220 	EVENT_WLAN_NBR_RPT = 0xD37,
1221 
1222 	/*
1223 	 * <diag_event>
1224 	 * @diag_cmn: Common diag info
1225 	 * @version: structure version
1226 	 * @token: A nonzero number that is unique among the Measurement Request
1227 	 * elements
1228 	 * @op_class: Operating classes that include primary channels
1229 	 * @chan: The channel number field in the beacon report request.
1230 	 * @req_mode: hex value defines Duration mandatory, parallel, enable,
1231 	 * request, and report bits.
1232 	 * @num_rpt: the number of neighbor report elements in response frame.
1233 	 * @duration: The duration over which the Beacon report was
1234 	 * measured.(in ms)
1235 	 * @mode: Mode used for measurement.Values defined in IEEE
1236 	 * Std 802.11‐2020 Table 9-103.
1237 	 *
1238 	 * This Event is used to send Beacon report
1239 	 *
1240 	 * Supported Feature: STA
1241 	 *
1242 	 * </diag_event>
1243 	 */
1244 
1245 	EVENT_WLAN_BCN_RPT = 0xD38,
1246 
1247 	/*
1248 	 * <diag_event>
1249 	 * @diag_cmn: Common diag info
1250 	 * @version: structure version
1251 	 * @is_mlo: flag to specify MLO connection
1252 	 * @mac_2g: 2GHz STA link address
1253 	 * @mac_5g: 5GHz STA link address
1254 	 * @mac_6g: 6GHz STA link address
1255 	 *
1256 	 * This Event is used to send STA info immediately after receiving
1257 	 * connect request
1258 	 *
1259 	 * Supported Feature: STA
1260 	 * </diag_event>
1261 	 */
1262 
1263 	EVENT_WLAN_STA_INFO = 0xD56,
1264 
1265 	/*
1266 	 * <diag_event>
1267 	 * @diag_cmn: Common diag info
1268 	 * @version: structure version
1269 	 * @band: Indicate bands on the link
1270 	 * @link_id: Link ID associated with the bssid
1271 	 * @status: Status of the link. Will be 0 if link is rejected
1272 	 *
1273 	 * This Event is used to indicate the MLO setup info. This event
1274 	 * will be sent immediately after assoc/reassoc response.
1275 	 *
1276 	 * Supported Feature: STA
1277 	 * </diag_event>
1278 	 */
1279 
1280 	EVENT_WLAN_MLO_SETUP = 0xD57,
1281 
1282 	/*
1283 	 * <diag_event>
1284 	 * @diag_cmn: Common diag info
1285 	 * @version: structure version
1286 	 * @band: Indiacate band of the link
1287 	 * @link_id: Link id of the removed link
1288 	 *
1289 	 * This Event is used to indicate when one or more AP
1290 	 * affiliated with AP MLD is removed.
1291 	 *
1292 	 * Supported Feature: STA
1293 	 *
1294 	 * </diag_event>
1295 	 */
1296 
1297 	EVENT_WLAN_MLO_RECONFIG = 0xD58,
1298 
1299 	/*
1300 	 * <diag_event>
1301 	 * @diag_cmn: Common diag info
1302 	 * @version: structure version
1303 	 * @band: Indicates the band of this link
1304 	 * @tid_ul: TID-to-link mapping information on the uplink
1305 	 * @tid_dl: TID-to-link mapping information on the downlink
1306 	 *
1307 	 * This Event is used to send T2LM status.
1308 	 *
1309 	 * Supported Feature: STA
1310 	 *
1311 	 * </diag_event>
1312 	 */
1313 
1314 	EVENT_WLAN_MLO_T2LM_STATUS = 0xD59,
1315 
1316 	/*
1317 	 * <diag_event>
1318 	 * @diag_cmn: Common diag info
1319 	 * @version: structure version
1320 	 * @band: Indicates the link on which packet is transmitted or
1321 	 * received
1322 	 * @status: Status code of TID-To-Link Mapping Response frame. This
1323 	 * tag exists only in response frames
1324 	 * @token: Dialog Token field of TID-To-Link Mapping Request/Response
1325 	 * frame
1326 	 * @subtype: Indicates whether the it is a request event or response
1327 	 * event
1328 	 * @dir: Indicate whether packet is received or transmitted.
1329 	 * 0 - TX and 1 - RX
1330 	 * @tx_status: Status of frame transmission
1331 	 * @reserved: Reserved field
1332 	 *
1333 	 * This Event is to indicate the T2LM Req/Resp info
1334 	 *
1335 	 * Supported Feature: STA
1336 	 *
1337 	 * </diag_event>
1338 	 */
1339 
1340 	EVENT_WLAN_MLO_T2LM_REQ_RESP = 0xD5A,
1341 
1342 	/*
1343 	 * <diag_event>
1344 	 * @diag_cmn: Common diag info
1345 	 * @version: structure version
1346 	 * @band: Indicates the link on which packet is transmitted or
1347 	 * received
1348 	 * @tx_status: Status of frame transmission
1349 	 * @reserved: Reserved Field
1350 	 *
1351 	 * This Event is sent when the device sends T2LM teardown action frame
1352 	 *
1353 	 * Supported Feature: STA
1354 	 *
1355 	 * </diag_event>
1356 	 */
1357 
1358 	EVENT_WLAN_MLO_T2LM_TEARDOWN = 0xD5B,
1359 
1360 	/*
1361 	 * <diag_event>
1362 	 * @diag_cmn: Common diag info
1363 	 * @version: structure version
1364 	 * @active_link: Bit field indicating active links
1365 	 * @inactive_link: Bit field indicating inactive links
1366 	 * @reserved: Reserved Field
1367 	 * @reason: reason for change link state
1368 	 *
1369 	 * This event is generated when the state of a link is changed.
1370 	 *
1371 	 * Supported Feature: STA
1372 	 *
1373 	 * </diag_event>
1374 	 */
1375 
1376 	EVENT_WLAN_MLO_LINK_STATUS = 0xD5C,
1377 
1378 	EVENT_MAX_ID = 0x0FFF
1379 } event_id_enum_type;
1380 
1381 #endif /* EVENT_DEFS_H */
1382