1 /* 2 * Copyright (c) 2014-2019,2021 The Linux Foundation. All rights reserved. 3 * 4 * Permission to use, copy, modify, and/or distribute this software for 5 * any purpose with or without fee is hereby granted, provided that the 6 * above copyright notice and this permission notice appear in all 7 * copies. 8 * 9 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL 10 * WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED 11 * WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE 12 * AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL 13 * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR 14 * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER 15 * TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR 16 * PERFORMANCE OF THIS SOFTWARE. 17 */ 18 19 #ifndef EVENT_DEFS_H 20 #define EVENT_DEFS_H 21 22 typedef enum { 23 EVENT_DROP_ID = 0, 24 25 /* Events between 0x1 to 0x674 are not used */ 26 27 /* 28 * <diag_event> 29 * EVENT_WLAN_SECURITY 30 * @ eventId: Event id 31 * @ authMode: Shows the auth mode 32 * @ encryptionModeUnicast: Encryption Mode Unicast 33 * @ encryptionModeMulticast: Encryption Mode Multicast 34 * @ pmkIDMatch: PMK ID Match 35 * @ bssid: BSSID < 0 to 5 > 36 * @ keyId: Key ID 37 * @ status: Shows the status 0 is Success and 1 is failure 38 * 39 * This event is used in SECURITY to send various wlan security modes 40 * Values for parameters are defined below: 41 * Event ID: offset: 0 length: 1 42 * 5 - Remove Key Req 43 * 6 - Remove Key Rsp 44 * 7 - PMKID Candidate Found 45 * 8 - PMKID Update 46 * 9 - Mic Error 47 * 10 - Set UniCast Key Req 48 * 11 - Set UniCast Key Rsp 49 * 12 - Set BCast Key Req 50 * 13 - Set BCast Key Rsp 51 * 52 * Auth Mode: offset: 1 length: 1 53 * 0 - Open 54 * 1 - Shared 55 * 2 - WPA EAP 56 * 3 - WPA PSK 57 * 4 - WPA2 EAP 58 * 5 - WPA2 PSK 59 * 60 * Encryption Mode Unicast: offset: 2 length: 1 61 * 0 - Open 62 * 1 - WEP40 63 * 2 - WEP104 64 * 3 - TKIP 65 * 4 - AES 66 * 67 * Encryption Mode Multicast: offset: 3 length: 1 68 * 0 - Open 69 * 1 - WEP40 70 * 2 - WEP104 71 * 3 - TKIP 72 * 4 - AES 73 * 74 * ENC_MODE_SMS4: offset: 4 length:1 75 * 76 * PMK ID Match: offset: 5 length: 1 77 * 0 - No Match 78 * 1 - Match 79 * 80 * BSSID[0]: offset: 6 length: 1 81 * BSSID[1]: offset: 7 length: 1 82 * BSSID[2]: offset: 8 length: 1 83 * BSSID[3]: offset: 9 length: 1 84 * BSSID[4]: offset: 10 length: 1 85 * BSSID[5]: offset: 11 length: 1 86 * 87 * Key ID: offset: 12 length: 1 88 * Status: offset: 13 length: 1 89 * 0 - Success 90 * 1 - Failure 91 * 92 * Supported Feature: wlan security 93 * 94 * </diag_event> 95 */ 96 97 EVENT_WLAN_SECURITY = 0x675, /* 13 byte payload */ 98 99 /* 100 * <diag_event> 101 * EVENT_WLAN_STATUS 102 * @ eventId: Event id 103 * @ ssid: SSID 104 * @ bssType: BSS Type 105 * @ rssi: RSSI 106 * @ channel: Channel 107 * @ qosCapability: QoS Capability 108 * @ authmode: Auth Mode 109 * @ encryptionType: Encryption Type 110 * @ reason: Reason 111 * @ reasonDisconnect: Reason Disconnect 112 * 113 * This event is used to send wlan status 114 * Values for parameters are defined below: 115 * Event ID: offset: 0 length: 1 116 * 0 - Connect 117 * 1 - Disconnect 118 * 119 * SSID: offset: 1 length: 32 120 * BSS Type: offset: 33 + SSID length, length: 1 121 * 0 - None 122 * 1 - BSS_TYPE_INFRASTRUCTURE 123 * 2 - BSS_TYPE_INFRA_AP 124 * 3 - BSS_TYPE_IBSS 125 * 4 - BSS_TYPE_START_IBSS 126 * 5 - BSS_TYPE_NDI 127 * 6 - BSS_TYPE_ANY 128 * 129 * RSSI: offset: 34 length: 1 130 * Channel: offset: 35 length: 1 131 * QoS Capability: offset: 36 length: 1 132 * Auth Mode: offset: 37 length: 1 133 * 0 - Open 134 * 1 - Shared 135 * 2 - WPA EAP 136 * 3 - WPA PSK 137 * 4 - WPA2 EAP 138 * 5 - WPA2 PSK 139 * 6 - WAPI CERT 140 * 7 - WAPI PSK 141 * 142 * Encryption Type: offset: 38 length: 1 143 * 0 - Open 144 * 1 - WEP40 145 * 2 - WEP104 146 * 3 - TKIP 147 * 4 - AES 148 * 149 * ENC_MODE_SMS4: offset: 39 length: 1 150 * 151 * Reason: offset: 40 length: 1 152 * 0 - Unspecified 153 * 1 - User Requested 154 * 2 - Mic Error 155 * 3 - Diassoc 156 * 4 - Deauth 157 * 5 - Handoff 158 * 159 * Reason Disconnect: offset: 41 length: 1 160 * 161 * Supported Feature: wlan status 162 * 163 * </diag_event> 164 */ 165 166 EVENT_WLAN_STATUS, /* 15 byte payload */ 167 168 /* Events 0x677 and 0x678 are not used */ 169 170 /* 171 * <diag_event> 172 * EVENT_WLAN_QOS 173 * @ eventId: event id 174 * @ reasonCode: Reason for event 175 * 176 * This event is used to send quality set services 177 * Values for parameters are defined below: 178 * Event ID: offset: 0 length: 1 179 * 0 - Add TS Req 180 * 1 - Add TS Rsp 181 * 2 - Delts 182 * 183 * Reason Code: offset: 1 length: 1 184 * 0 - Admission Accepted 185 * 1 - Invalid Params 186 * 2 - Reserved 187 * 3 - Refused 188 * 4 - User Requested 189 * 5 - Ind From AP 190 * 191 * Supported Feature: Qos wlan 192 * 193 * </diag_event> 194 */ 195 196 EVENT_WLAN_QOS = 0x679, /* 2 byte payload */ 197 198 /* 199 * <diag_event> 200 * EVENT_WLAN_PE 201 * @bssid: BSSID 202 * @ event_type: Event type 203 * @ sme_state: SME state 204 * @ mlm_state: MLM state 205 * @ status: 0 - Success, 1 - Failure < majority 0 is success > 206 * @reason_code: reason for event report 207 * 208 * This event is used in PE to send different diag events. 209 * Values for parameters are defined below: 210 * 211 * bssid[0]: offset: 0 length: 1 212 * bssid[1]: offset: 1 length: 1 213 * bssid[2]: offset: 2 length: 1 214 * bssid[3]: offset: 3 length: 1 215 * bssid[4]: offset: 4 length: 1 216 * bssid[5]: offset: 5 length: 1 217 * 218 * Event Type: offset: 6 length: 2 219 * 0 - SCAN REQ EVENT 220 * 1 - SCAN ABORT IND EVENT 221 * 2 - SCAN_RSP_EVENT 222 * 3 - JOIN_REQ_EVENT 223 * 4 - JOIN_RSP_EVENT 224 * 5 - SETCONTEXT_REQ_EVENT 225 * 6 - SETCONTEXT_RSP_EVENT 226 * 7 - REASSOC_REQ_EVENT 227 * 8 - REASSOC_RSP_EVENT 228 * 9 - AUTH_REQ_EVENT 229 * 10 - AUTH_RSP_EVENT 230 * 11 - DISASSOC_REQ_EVENT 231 * 12 - DISASSOC_RSP_EVENT 232 * 13 - DISASSOC_IND_EVENT 233 * 14 - DISASSOC_CNF_EVENT 234 * 15 - DEAUTH_REQ_EVENT 235 * 16 - DEAUTH_RSP_EVENT 236 * 17 - DEAUTH_IND_EVENT 237 * 18 - START_BSS_REQ_EVENT 238 * 19 - START_BSS_RSP_EVENT 239 * 20 - AUTH_IND_EVENT 240 * 21 - ASSOC_IND_EVENT 241 * 22 - ASSOC_CNF_EVENT 242 * 23 - REASSOC_IND_EVENT 243 * 24 - SWITCH_CHL_IND_EVENT 244 * 25 - SWITCH_CHL_RSP_EVENT 245 * 26 - STOP_BSS_REQ_EVENT 246 * 27 - STOP_BSS_RSP_EVENT 247 * 28 - DEAUTH_CNF_EVENT 248 * 29 - ADDTS_REQ_EVENT 249 * 30 - ADDTS_RSP_EVENT 250 * 31 - DELTS_REQ_EVENT 251 * 32 - DELTS_RSP_EVENT 252 * 33 - DELTS_IND_EVENT 253 * 34 - ENTER_BMPS_REQ_EVENT 254 * 35 - ENTER_BMPS_RSP_EVENT 255 * 36 - EXIT_BMPS_REQ_EVENT 256 * 37 - BMPS_RSP_EVENT 257 * 38 - EXIT_BMPS_IND_EVENT 258 * 39 - ENTER_IMPS_REQ_EVENT 259 * 40 - ENTER_IMPS_RSP_EVENT 260 * 41 - EXIT_IMPS_REQ_EVENT 261 * 42 - EXIT_IMPS_RSP_EVENT 262 * 43 - ENTER_UAPSD_REQ_EVENT 263 * 44 - ENTER_UAPSD_RSP_EVENT 264 * 45 - EXIT_UAPSD_REQ_EVENT 265 * 46 - EXIT_UAPSD_RSP_EVENT 266 * 47 - WOWL_ADD_BCAST_PTRN_EVENT 267 * 48 - WOWL_DEL_BCAST_PTRN_EVENT 268 * 49 - ENTER_WOWL_REQ_EVENT 269 * 50 - ENTER_WOWL_RSP_EVENT 270 * 51 - EXIT_WOWL_REQ_EVENT 271 * 52 - EXIT_WOWL_RSP_EVENT 272 * 53 - HAL_ADDBA_REQ_EVENT 273 * 54 - HAL_ADDBA_RSP_EVENT 274 * 55 - HAL_DELBA_IND_EVENT 275 * 56 - HB_FAILURE_TIMEOUT 276 * 57 - PRE_AUTH_REQ_EVENT 277 * 58 - PRE_AUTH_RSP_EVENT 278 * 59 - PREAUTH_DONE 279 * 60 - REASSOCIATING 280 * 61 - CONNECTED 281 * 62 - ASSOC_REQ_EVENT 282 * 63 - AUTH_COMP_EVENT 283 * 64 - ASSOC_COMP_EVENT 284 * 65 - AUTH_START_EVENT 285 * 66 - ASSOC_START_EVENT 286 * 67 - REASSOC_START_EVENT 287 * 68 - ROAM_AUTH_START_EVENT 288 * 69 - ROAM_AUTH_COMP_EVENT 289 * 70 - ROAM_ASSOC_START_EVENT 290 * 71 - ROAM_ASSOC_COMP_EVENT 291 * 72 - SCAN_COMPLETE_EVENT 292 * 73 - SCAN_RESULT_FOUND_EVENT 293 * 74 - ASSOC_TIMEOUT 294 * 75 - AUTH_TIMEOUT 295 * 76 - DEAUTH_FRAME_EVENT 296 * 77 - DISASSOC_FRAME_EVENT 297 * 298 * SME State: offset: 8 length: 2 299 * 0 - OFFLINE 300 * 1 - IDLE 301 * 2 - SUSPEND 302 * 3 - WT SCAN 303 * 4 - WT JOIN 304 * 5 - WT AUTH 305 * 6 - WT ASSOC 306 * 7 - WT REASSOC 307 * 8 - WT REASSOC LINK FAIL 308 * 9 - JOIN FAILURE 309 * 10 - ASSOCIATED 310 * 11 - REASSOCIATED 311 * 12 - LINK EST 312 * 13 - LINK EST WT SCAN 313 * 14 - WT PRE AUTH 314 * 15 - WT DISASSOC 315 * 16 - WT DEAUTH 316 * 17 - WT START BSS 317 * 18 - WT STOP BSS 318 * 19 - NORMAL 319 * 20 - CHANNEL SCAN 320 * 21 - NORMAL CHANNEL SCAN 321 * 322 * MLM State: offset: 10 legth: 2 323 * 0 - MLM OFFLINE 324 * 1 - MLM IDLE 325 * 2 - MLM WT PROBE RESP 326 * 3 - MLM PASSIVE SCAN 327 * 4 - MLM WT JOIN BEACON 328 * 5 - MLM JOINED 329 * 6 - MLM BSS STARTED 330 * 7 - MLM WT AUTH FRAME 331 * 8 - MLM WT AUTH FRAME 332 * 9 - MLM WT AUTH FRAME 333 * 10 - MLM AUTH RSP TIMEOUT 334 * 11 - MLM AUTHENTICATED 335 * 12 - MLM WT ASSOC RSP 336 * 13 - MLM WT REASSOC RSP 337 * 14 - MLM ASSOCIATED 338 * 15 - MLM REASSOCIATED 339 * 16 - MLM LINK ESTABLISHED 340 * 17 - MLM WT ASSOC CNF 341 * 18 - MLM LEARN 342 * 19 - MLM WT ADD BSS RSP 343 * 20 - MLM WT DEL BSS RSP 344 * 21 - MLM WT ADD BSS RSP ASSOC 345 * 22 - MLM WT ADD BSS RSP REASSOC 346 * 23 - MLM WT ADD BSS RSP PREASSOC 347 * 24 - MLM WT ADD STA RSP 348 * 25 - MLM WT DEL STA RSP 349 * 26 - MLM WT ASSOC DEL STA RSP 350 * 27 - MLM WT SET BSS KEY 351 * 28 - MLM WT SET STA KEY 352 * 29 - MLM WT SET STA BCASTKEY 353 * 30 - MLM WT ADDBA RSP 354 * 31 - MLM WT REMOVE BSS KEY 355 * 32 - MLM WT REMOVE STA KEY 356 * 33 - MLM WT SET MIMOPS 357 * 358 * Status: offset: 12 length: 2 359 * Reason Code: offset: 14 length: 2 360 * 361 * Supported Feature: STA 362 * 363 * </diag_event> 364 */ 365 366 EVENT_WLAN_PE, /* 16 byte payload */ 367 368 /* Events between 0x67b to 0x67f are not used */ 369 370 /* 371 * <diag_event> 372 * EVENT_WLAN_BRINGUP_STATUS 373 * @ wlanStatus: Describe wlan status 374 * @ driverVersion: Driver version between 0 to 9 375 * 376 * This event is used in BRINGUP to send wlan status 377 * Values for parameters are defined below: 378 * WLAN Status: offset: 0 length: 2 379 * 0 - WLAN Disabled 380 * 1 - WLAN Enabled 381 * 2 - Reset Fail 382 * 3 - Reset Success 383 * 4 - Device Removed 384 * 5 - Devide Inserted 385 * 6 - Driver Unloaded 386 * 7 - Driver Loaded 387 * 8 - bus/link down 388 * 9 - chip temperature high 389 * 390 * driverVersion: offset: 2 length: 10 391 * 392 * Supported Feature: Bringup 393 * 394 * </diag_event> 395 */ 396 397 EVENT_WLAN_BRINGUP_STATUS = 0x680, /* 12 byte payload */ 398 399 /* 400 * <diag_event> 401 * EVENT_WLAN_POWERSAVE_GENERIC 402 * @ event_subtype: Event subtype 403 * @ full_power_request_reason: Full power request reason 404 * @ pmc_current_state: Pmc current state 405 * @ enable_disable_powersave_mode: Enable disable powersave mode 406 * @ winmob_d_power_state: winmob d power state 407 * @ dtim_period: DTIM period 408 * @ final_listen_intv: Final listen int 409 * @ bmps_auto_timer_duration: BMPS auto timer duration 410 * @ bmps_period: BMPS period 411 * 412 * This event is used in POWERSAVE to send wlan status 413 * Values for parameters are defined below: 414 * Event Sub Type: offset: 0 length: 1 415 * Full Power Req Reason: offset: 1 length: 1 416 * PMC Current State: offset: 2 length: 1 417 * Enable disable powersave mode: 3 length: 1 418 * Winmob D Power State: offset: 4 length: 1 419 * DTIM Period: offset:5 length: 1 420 * Final Listen INTV: offset:6 length: 2 421 * BMPS Auto Timer Duration: 8 length: 2 422 * BMPS Period: offset: 10 length:2 423 * 424 * Supported Feature: POWERSAVE GENERIC 425 * 426 * </diag_event> 427 */ 428 429 EVENT_WLAN_POWERSAVE_GENERIC, /* 16 byte payload */ 430 431 /* 432 * <diag_event> 433 * EVENT_WLAN_POWERSAVE_WOW 434 * @ event_subtype: Event subtype 435 * @ wow_type: Wow type 436 * @ wow_magic_pattern: It will use pattern from 0 to 5 437 * @ wow_del_ptrn_id: Wow delete pattern id 438 * @ wow_wakeup_cause: Wow wakeup cause 439 * @ wow_wakeup_cause_pbm_ptrn_id: Wow wakeup cause pbm pattern id 440 * 441 * This event is used in POWERSAVE WOW to send the wow wakeup pattern, 442 * cause etc 443 * Values for parameters are defined below: 444 * Event Sub Type: offset: 0 length: 1 445 * 0 - Enter 446 * 1 - Exit 447 * 2 - Del Pattern 448 * 3 - Wakup 449 * 450 * WOW Type: offset: 1 length: 1 451 * 0 - None 452 * 1 - Magic Pkt Only 453 * 2 - Byte Match Only 454 * 3 - Magic Pkt Byte Match 455 * 456 * WOW Magic Pattern: offset:2 length: 6 457 * WOW Del Pattern ID: offset:8 length: 1 458 * WOW Wakeup Cause: offset: 9 length: 1 459 * 0 - Magic Pkt Match 460 * 1 - Ptrn Byte Match 461 * WOW Wakeup Cause PBM Ptrn ID: offset: 10 length: 1 462 * 463 * Supported Feature: Powersave wow 464 * 465 * </diag_event> 466 */ 467 468 EVENT_WLAN_POWERSAVE_WOW, /* 11 byte payload */ 469 470 /* Events between 0x683 to 0x690 are not used */ 471 472 /* 473 * <diag_event> 474 * EVENT_WLAN_BTC 475 * @ eventId: Event id 476 * @ btAddr: BT address 477 * @ connHandle: Connection handle 478 * @ connStatus: Connection status 479 * @ linkType: Link Type 480 * @ scoInterval: Synchronous Connection Oriented interval 481 * @ scoWindow: Synchronous Connection Oriented window 482 * @ retransWindow: Retransmisson window 483 * @ mode: Mode 484 * 485 * This event is used in Bluetooth to send the btc status 486 * Values for parameters are defined below: 487 * Event ID: offset: 0 length: 1 488 * 0 - DEVICE SWITCHED ON 489 * 1 - DEVICE SWITCHED OFF 490 * 2 - INQUIRY STARTED 491 * 3 - INQUIRY STOPPED 492 * 4 - PAGE STARTED 493 * 5 - PAGE STOPPED 494 * 6 - CREATE ACL CONNECTION 495 * 7 - ACL CONNECTION COMPLETE 496 * 8 - CREATE SYNC CONNECTION 497 * 9 - SYNC CONNECTION COMPLETE 498 * 10 - SYNC CONNECTION UPDATED 499 * 11 - DISCONNECTION COMPLETE 500 * 12 - MODE CHANGED 501 * 13 - A2DP STREAM START 502 * 14 - A2DP STREAM STOP 503 * 504 * BT Addr[0]: offset: 1 length: 1 505 * BT Addr[1]: offset: 2 length: 1 506 * BT Addr[2]: offset: 3 length: 1 507 * BT Addr[3]: offset: 4 length: 1 508 * BT Addr[4]: offset: 5 length: 1 509 * BT Addr[5]: offset: 6 length: 1 510 * 511 * Conn Handle: offset: 7 length: 2 512 * 65535 - Invalid 513 * 514 * Conn Status: offset:9 length: 1 515 * 0 - Fail 516 * 1 - success 517 * 518 * Link Type: offset: 10 length: 1 519 * 0 - SCO 520 * 1 - ACL 521 * 2 - ESCO 522 * 523 * Sco Interval: offset: 11 length: 1 524 * Sco Window: offset: 12 length: 1 525 * Retrans Window: offset: 13 length: 1 526 * 527 * Mode: offset: 14 length: 1 528 * 0 - Active 529 * 1 - Hold 530 * 2 - Sniff 531 * 3 - Park 532 * 533 * Supported Feature: Bluetooth 534 * 535 * </diag_event> 536 */ 537 538 EVENT_WLAN_BTC = 0x691, /* 15 byte payload */ 539 540 /* 541 * <diag_event> 542 * EVENT_WLAN_EAPOL 543 * @ event_sub_type: 0-Transmitted, 1-Received 544 * @ eapol_packet_type: 0 - EAP Start, 1 - EAPOL Start, 2 - EAPOL 545 * Logoff, 3 - EAPOL Key, 4 - EAPOL Encapsulated Alert 546 * @ eapol_key_info: This field from the driver is in big endian format 547 * @ eapol_rate: Rate at which the frame is received 548 * @ dest_addr: Destination address 549 * * @ src_addr: Source address 550 * 551 * This event is used to send Extensible Authentication Protocol 552 * information 553 * Values for parameters are defined below: 554 * event_sub_type: offset: 0 length: 1 555 * eapol_packet_type: offset: 1 length: 1 556 * eapol_key_info: offset:2 length: 2 557 * eapol_rate: offset: 4 length: 2 558 * dest_addr[0]: offset: 6 length: 1 559 * dest_addr[1]: offset: 7 length: 1 560 * dest_addr[2]: offset: 8 length: 1 561 * dest_addr[3]: offset: 9 length: 1 562 * dest_addr[4]: offset: 10 length: 1 563 * dest_addr[5]: offset: 11 length: 1 564 * src_addr[0]: offset: 12 length: 1 565 * src_addr[1]: offset: 13 length: 1 566 * src_addr[2]: offset: 14 length: 1 567 * src_addr[3]: offset: 15 length: 1 568 * src_addr[4]: offset: 16 length: 1 569 * src_addr[5]: offset: 17 length: 1 570 * 571 * Supported Feature: Extensible Authentication Protocol 572 * 573 * </diag_event> 574 */ 575 576 EVENT_WLAN_EAPOL = 0xA8D,/* 18 bytes payload */ 577 578 /* 579 * <diag_event> 580 * EVENT_WLAN_WAKE_LOCK 581 * @ status: Whether the wakelock is taken/released 582 * @ reason: Reason for taking this wakelock 583 * @ timeout: Timeout value in case of timed wakelocks 584 * @ name_len: Length of the name of the wakelock that will follow 585 * @ name: Name of the wakelock 586 * 587 * This event is used to send wakelock information 588 * Values for parameters are defined below: 589 * status: offset: 0 length: 4 590 * reason: offset: 4 length: 4 591 * timeout: offset: 8 length: 4 592 * name_len: offset: 12 length: 4 593 * 594 * Supported Feature: wlan wakelock 595 * 596 * </diag_event> 597 */ 598 599 EVENT_WLAN_WAKE_LOCK = 0xAA2, /* 96 bytes payload */ 600 EVENT_WLAN_BEACON_RECEIVED = 0xAA6, /* FW event: 2726 */ 601 602 /* 603 * <diag_event> 604 * EVENT_WLAN_LOG_COMPLETE 605 * @ is_fatal: Indicates if the event is fatal or not 606 * @ indicator: Source of the bug report - Framework/Host/Firmware 607 * @ reason_code: Reason for triggering bug report 608 * @ reserved: Reserved field 609 * 610 * This event is used to send log completion related information 611 * Values for parameters are defined below: 612 * is_fatal: offset: 0 length: 4 613 * indicator: offset: 4 length: 4 614 * reason_code: offset: 8 length: 4 615 * reserved: offset: 12 length: 4 616 * 617 * Supported Feature: Logging 618 * 619 * </diag_event> 620 */ 621 622 EVENT_WLAN_LOG_COMPLETE = 0xAA7, /* 16 bytes payload */ 623 624 /* 625 * <diag_event> 626 * EVENT_WLAN_STATUS_V2 627 * @ event_id: Event id 628 * @ ssid: Network SSID 629 * @ bssType: BSS Type 630 * @ rssi: RSSI 631 * @ channel: Channel Numbers 632 * @ qosCapability: quality of service capability 633 * @ authType: Authentication type 634 * @ encryptionType: Encryption type 635 * @ reason: Reason for triggering status 636 * @ reasonDisconnect:Reason for disconnection 637 * 638 * This event is used to send varius wlan status 639 * Values for parameters are defined below: 640 * eventId: offset: 0 length: 1 641 * ssid[0] - ssid[31]: offset: 1 to 32, length: 1 642 * bssType: offset: 33 length: 1 643 * rssi: offset: 34 length: 1 644 * channel: offset: 35 length: 1 645 * qosCapability: offset: 36 length: 1 646 * authType: offset: 37 length: 1 647 * encryptionType: offset: 38 length: 1 648 * reason: offset: 39 length: 1 649 * reasonDisconnect: offset: 40 length: 1 650 * 651 * Supported Feature: Wlan status 652 * 653 * </diag_event> 654 */ 655 656 EVENT_WLAN_STATUS_V2 = 0xAB3, 657 658 /* 659 * <diag_event> 660 * EVENT_WLAN_TDLS_TEARDOWN 661 * @ reason: reason for tear down. 662 * @peer_mac: Peer mac address 663 * 664 * 665 * This event is sent when TDLS tear down happens. 666 * 667 * Supported Feature: TDLS 668 * 669 * </diag_event> 670 */ 671 EVENT_WLAN_TDLS_TEARDOWN = 0xAB5, 672 673 /* 674 * <diag_event> 675 * EVENT_WLAN_TDLS_ENABLE_LINK 676 * @peer_mac: peer mac 677 * @is_off_chan_supported: If peer supports off channel 678 * @is_off_chan_configured: If off channel is configured 679 * @is_off_chan_established: If off channel is established 680 * 681 * 682 * This event is sent when TDLS enable link happens. 683 * 684 * Supported Feature: TDLS 685 * 686 * </diag_event> 687 */ 688 EVENT_WLAN_TDLS_ENABLE_LINK = 0XAB6, 689 690 /* 691 * <diag_event> 692 * EVENT_WLAN_SUSPEND_RESUME 693 * @ state: suspend/resume state 694 * 695 * This event is used to send suspend resume info 696 * Values for parameters are defined below: 697 * suspend: offset: 0 length: 1 698 * 0 - HDD_WLAN_EARLY_SUSPEND 699 * 1 - HDD_WLAN_SUSPEND 700 * 2 - HDD_WLAN_EARLY_RESUME 701 * 3 - HDD_WLAN_RESUME 702 * 703 * Supported Feature: suspend/resume 704 * 705 * </diag_event> 706 */ 707 708 EVENT_WLAN_SUSPEND_RESUME = 0xAB7, 709 710 /* 711 * <diag_event> 712 * EVENT_WLAN_OFFLOAD_REQ 713 * @ offload_type: offload type 714 * @ state: enabled or disabled state 715 * 716 * This event is used to send offload info 717 * Values for parameters are defined below: 718 * offloadType: offset: 0 length: 1 719 * 0 - SIR_IPV4_ARP_REPLY_OFFLOAD 720 * 1 - SIR_IPV6_NEIGHBOR_DISCOVERY_OFFLOAD 721 * 2 - SIR_IPV6_NS_OFFLOAD 722 * 723 * enableOrDisable: offset: 1 length: 1 724 * 0 - SIR_OFFLOAD_DISABLE 725 * 1 - SIR_OFFLOAD_ENABLE 726 * 727 * Supported Feature: offload 728 * 729 * </diag_event> 730 */ 731 732 EVENT_WLAN_OFFLOAD_REQ = 0xAB8, 733 734 /* 735 * <diag_event> 736 * EVENT_TDLS_SCAN_BLOCK 737 * @status: rejected status 738 * 739 * 740 * This event is sent when scan is rejected due to TDLS. 741 * 742 * Supported Feature: TDLS 743 * 744 * </diag_event> 745 */ 746 EVENT_TDLS_SCAN_BLOCK = 0xAB9, 747 748 /* 749 * <diag_event> 750 * EVENT_WLAN_TDLS_TX_RX_MGMT 751 * @event_id: event id 752 * @tx_rx: tx or rx 753 * @type: type of frame 754 * @action_sub_type: action frame type 755 * @peer_mac: peer mac 756 * 757 * 758 * This event is sent when TDLS mgmt rx tx happens. 759 * 760 * Supported Feature: TDLS 761 * 762 * </diag_event> 763 */ 764 EVENT_WLAN_TDLS_TX_RX_MGMT = 0xABA, 765 766 /* 767 * <diag_event> 768 * EVENT_WLAN_LOW_RESOURCE_FAILURE 769 * @ WIFI_EVENT_MEMORY_FAILURE: Memory failure 770 * 771 * This event is used to send reason why low resource situation 772 * is observed 773 * 774 * Supported Feature: Memory 775 * 776 * </diag_event> 777 */ 778 779 EVENT_WLAN_LOW_RESOURCE_FAILURE = 0xABB, 780 781 /* 782 * <diag_event> 783 * EVENT_WLAN_POWERSAVE_WOW_STATS 784 * @ wow_ucast_wake_up_count: send unicast packet count 785 * @ wow_bcast_wake_up_count: send broadcast packet count 786 * @ wow_ipv4_mcast_wake_up_coun: send ipv4 multicast packet count 787 * @ wow_ipv6_mcast_wake_up_count: send ipv6 multicast packet count 788 * @ wow_ipv6_mcast_ra_stats: send ipv6 multicast ra packet count 789 * @ wow_ipv6_mcast_ns_stats: send ipv6 multicast ns packet count 790 * @ wow_ipv6_mcast_na_stats: send ipv6 multicast na packet count 791 * @ wow_pno_match_wake_up_count: preferred network offload match count 792 * @ wow_pno_complete_wake_up_count: preferred network offload complete 793 * @ wow_gscan_wake_up_count:Reason: send external scan packet count 794 * @ wow_low_rssi_wake_up_count: send low rssi packet count 795 * @ wow_rssi_breach_wake_up_count: send rssi breach packet count 796 * @ wow_icmpv4_count: Send icmpv4 packet count 797 * @ wow_icmpv6_count: send icmpv6 packet count 798 * @ wow_oem_response_wake_up_count: Send oem response packet count 799 * 800 * This event is used to send wow wakeup stats information 801 * 802 * Supported Feature: Wlan powersave wow 803 * 804 * </diag_event> 805 */ 806 EVENT_WLAN_POWERSAVE_WOW_STATS = 0xB33, 807 808 /* 809 * <diag_event> 810 * EVENT_WLAN_STA_KICKOUT 811 * @reasoncode: Indicates the reasoncode of event 812 * @peer_macaddr: Indicates the peer macaddr 813 * @vdev_id: Indicate unique id for identifying the VDEV 814 * 815 * This event is used to send sta kickout information 816 * Values for parameters are defined below: 817 * Reasoncode: offset: 0 length: 4 818 * Peer macaddr: offset: 4 length: 6 819 * VDEV ID: offset: 10 length 1 820 * 821 * Supported Feature: STA 822 * 823 * </diag_event> 824 */ 825 826 EVENT_WLAN_STA_KICKOUT = 0xB39, 827 828 /* 829 * <diag_event> 830 * EVENT_WLAN_STA_DATASTALL 831 * @reason: Indicates the reason of event 832 * 833 * This event is used to send sta datastall information 834 * Values for parameters are defined below: 835 * Reason: offset:0 length: 4 836 * 837 * Supported Feature: STA 838 * 839 * </diag_event> 840 */ 841 842 EVENT_WLAN_STA_DATASTALL = 0xB3A, 843 844 /* 845 * <diag_event> 846 * EVENT_WLAN_SOFTAP_DATASTALL 847 * @reason: Indicates the reason of event 848 * 849 * This event is used to send SAP datastall information 850 * Values for parameters are defined below: 851 * Reason: offset:0 length: 4 852 * 853 * Supported Feature: SAP 854 * 855 * </diag_event> 856 */ 857 858 EVENT_WLAN_SOFTAP_DATASTALL = 0xB3B, 859 860 /* 861 * <diag_event> 862 * EVENT_WLAN_SSR_REINIT_SUBSYSTEM 863 * @status: Indicates the status of event 864 * 865 * This event is used to send ssr reinit status 866 * Values for parameters are defined below: 867 * Status: offset: 0 length: 4 868 * 869 * Supported Feature: SSR 870 * 871 * </diag_event> 872 */ 873 874 EVENT_WLAN_SSR_REINIT_SUBSYSTEM = 0xB3C, 875 876 /* 877 * <diag_event> 878 * EVENT_WLAN_SSR_SHUTDOWN_SUBSYSTEM 879 * @status: Indicates the status of event 880 * 881 * This event is used to send ssr shutdown status 882 * Values for parameters are defined below: 883 * Status: offset: 0 length: 4 884 * 885 * Supported Feature: SSR 886 * 887 * </diag_event> 888 */ 889 890 EVENT_WLAN_SSR_SHUTDOWN_SUBSYSTEM = 0xB3D, 891 EVENT_WLAN_ACS_REQ = 0xC4A, 892 EVENT_WLAN_ACS_SCAN_START = 0xC4B, 893 EVENT_WLAN_ACS_SCAN_DONE = 0xC4C, 894 EVENT_WLAN_ACS_CHANNEL_SPECTRAL_WEIGHT = 0xC4D, 895 EVENT_WLAN_ACS_BEST_CHANNEL = 0xC4E, 896 EVENT_WLAN_HOST_MGMT_TX_V2 = 0xC52, 897 EVENT_WLAN_HOST_MGMT_RX_V2 = 0xC53, 898 EVENT_WLAN_CONN_STATS_V2 = 0xC56, 899 900 /* 901 * <diag_event> 902 * EVENT_WLAN_RSN_INFO 903 * @akm_suite: Gives information about akm suites used in assoc request 904 * @ucast_cipher: Unicast cipher used in assoc request 905 * @mcast_cipher: Multi cast cipher used in assoc request 906 * @group_mgmt: Requested group mgmt cipher suite 907 * 908 * This event is used to send RSN information used 909 * in assoc request. 910 * 911 * Supported Feature: STA 912 * 913 * </diag_event> 914 */ 915 916 EVENT_WLAN_RSN_INFO = 0xC5B, 917 918 /* 919 * <diag_event> 920 * EVENT_WLAN_AUTH_INFO 921 * @auth_algo_num: Gives information about algo num used in auth request 922 * @auth_transaction_seq_num: seq num of auth request 923 * @auth_status_code: status code of auth request 924 * 925 * This event is used to send algo num, seq num and status code 926 * for auth request 927 * 928 * Supported Feature: STA 929 * 930 * </diag_event> 931 */ 932 933 EVENT_WLAN_AUTH_INFO = 0xC92, 934 935 EVENT_MAX_ID = 0x0FFF 936 } event_id_enum_type; 937 938 #endif /* EVENT_DEFS_H */ 939