1 /* 2 * Copyright (c) 2014-2019 The Linux Foundation. All rights reserved. 3 * 4 * Permission to use, copy, modify, and/or distribute this software for 5 * any purpose with or without fee is hereby granted, provided that the 6 * above copyright notice and this permission notice appear in all 7 * copies. 8 * 9 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL 10 * WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED 11 * WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE 12 * AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL 13 * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR 14 * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER 15 * TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR 16 * PERFORMANCE OF THIS SOFTWARE. 17 */ 18 19 #ifndef EVENT_DEFS_H 20 #define EVENT_DEFS_H 21 22 typedef enum { 23 EVENT_DROP_ID = 0, 24 25 /* Events between 0x1 to 0x674 are not used */ 26 27 /* 28 * <diag_event> 29 * EVENT_WLAN_SECURITY 30 * @ eventId: Event id 31 * @ authMode: Shows the auth mode 32 * @ encryptionModeUnicast: Encryption Mode Unicast 33 * @ encryptionModeMulticast: Encryption Mode Multicast 34 * @ pmkIDMatch: PMK ID Match 35 * @ bssid: BSSID < 0 to 5 > 36 * @ keyId: Key ID 37 * @ status: Shows the status 0 is Success and 1 is failure 38 * 39 * This event is used in SECURITY to send various wlan security modes 40 * Values for parameters are defined below: 41 * Event ID: offset: 0 length: 1 42 * 5 - Remove Key Req 43 * 6 - Remove Key Rsp 44 * 7 - PMKID Candidate Found 45 * 8 - PMKID Update 46 * 9 - Mic Error 47 * 10 - Set UniCast Key Req 48 * 11 - Set UniCast Key Rsp 49 * 12 - Set BCast Key Req 50 * 13 - Set BCast Key Rsp 51 * 52 * Auth Mode: offset: 1 length: 1 53 * 0 - Open 54 * 1 - Shared 55 * 2 - WPA EAP 56 * 3 - WPA PSK 57 * 4 - WPA2 EAP 58 * 5 - WPA2 PSK 59 * 60 * Encryption Mode Unicast: offset: 2 length: 1 61 * 0 - Open 62 * 1 - WEP40 63 * 2 - WEP104 64 * 3 - TKIP 65 * 4 - AES 66 * 67 * Encryption Mode Multicast: offset: 3 length: 1 68 * 0 - Open 69 * 1 - WEP40 70 * 2 - WEP104 71 * 3 - TKIP 72 * 4 - AES 73 * 74 * ENC_MODE_SMS4: offset: 4 length:1 75 * 76 * PMK ID Match: offset: 5 length: 1 77 * 0 - No Match 78 * 1 - Match 79 * 80 * BSSID[0]: offset: 6 length: 1 81 * BSSID[1]: offset: 7 length: 1 82 * BSSID[2]: offset: 8 length: 1 83 * BSSID[3]: offset: 9 length: 1 84 * BSSID[4]: offset: 10 length: 1 85 * BSSID[5]: offset: 11 length: 1 86 * 87 * Key ID: offset: 12 length: 1 88 * Status: offset: 13 length: 1 89 * 0 - Success 90 * 1 - Failure 91 * 92 * Supported Feature: wlan security 93 * 94 * </diag_event> 95 */ 96 97 EVENT_WLAN_SECURITY = 0x675, /* 13 byte payload */ 98 99 /* 100 * <diag_event> 101 * EVENT_WLAN_STATUS 102 * @ eventId: Event id 103 * @ ssid: SSID 104 * @ bssType: BSS Type 105 * @ rssi: RSSI 106 * @ channel: Channel 107 * @ qosCapability: QoS Capability 108 * @ authmode: Auth Mode 109 * @ encryptionType: Encryption Type 110 * @ reason: Reason 111 * @ reasonDisconnect: Reason Disconnect 112 * 113 * This event is used to send wlan status 114 * Values for parameters are defined below: 115 * Event ID: offset: 0 length: 1 116 * 0 - Connect 117 * 1 - Disconnect 118 * 119 * SSID: offset: 1 length: 32 120 * BSS Type: offset: 33 + SSID length, length: 1 121 * 0 - None 122 * 1 - BSS_TYPE_INFRASTRUCTURE 123 * 2 - BSS_TYPE_INFRA_AP 124 * 3 - BSS_TYPE_IBSS 125 * 4 - BSS_TYPE_START_IBSS 126 * 5 - BSS_TYPE_NDI 127 * 6 - BSS_TYPE_ANY 128 * 129 * RSSI: offset: 34 length: 1 130 * Channel: offset: 35 length: 1 131 * QoS Capability: offset: 36 length: 1 132 * Auth Mode: offset: 37 length: 1 133 * 0 - Open 134 * 1 - Shared 135 * 2 - WPA EAP 136 * 3 - WPA PSK 137 * 4 - WPA2 EAP 138 * 5 - WPA2 PSK 139 * 6 - WAPI CERT 140 * 7 - WAPI PSK 141 * 142 * Encryption Type: offset: 38 length: 1 143 * 0 - Open 144 * 1 - WEP40 145 * 2 - WEP104 146 * 3 - TKIP 147 * 4 - AES 148 * 149 * ENC_MODE_SMS4: offset: 39 length: 1 150 * 151 * Reason: offset: 40 length: 1 152 * 0 - Unspecified 153 * 1 - User Requested 154 * 2 - Mic Error 155 * 3 - Diassoc 156 * 4 - Deauth 157 * 5 - Handoff 158 * 159 * Reason Disconnect: offset: 41 length: 1 160 * 161 * Supported Feature: wlan status 162 * 163 * </diag_event> 164 */ 165 166 EVENT_WLAN_STATUS, /* 15 byte payload */ 167 168 /* Events 0x677 and 0x678 are not used */ 169 170 /* 171 * <diag_event> 172 * EVENT_WLAN_QOS 173 * @ eventId: event id 174 * @ reasonCode: Reason for event 175 * 176 * This event is used to send quality set services 177 * Values for parameters are defined below: 178 * Event ID: offset: 0 length: 1 179 * 0 - Add TS Req 180 * 1 - Add TS Rsp 181 * 2 - Delts 182 * 183 * Reason Code: offset: 1 length: 1 184 * 0 - Admission Accepted 185 * 1 - Invalid Params 186 * 2 - Reserved 187 * 3 - Refused 188 * 4 - User Requested 189 * 5 - Ind From AP 190 * 191 * Supported Feature: Qos wlan 192 * 193 * </diag_event> 194 */ 195 196 EVENT_WLAN_QOS = 0x679, /* 2 byte payload */ 197 198 /* 199 * <diag_event> 200 * EVENT_WLAN_PE 201 * @bssid: BSSID 202 * @ event_type: Event type 203 * @ sme_state: SME state 204 * @ mlm_state: MLM state 205 * @ status: 0 - Success, 1 - Failure < majority 0 is success > 206 * @reason_code: reason for event report 207 * 208 * This event is used in PE to send different diag events. 209 * Values for parameters are defined below: 210 * 211 * bssid[0]: offset: 0 length: 1 212 * bssid[1]: offset: 1 length: 1 213 * bssid[2]: offset: 2 length: 1 214 * bssid[3]: offset: 3 length: 1 215 * bssid[4]: offset: 4 length: 1 216 * bssid[5]: offset: 5 length: 1 217 * 218 * Event Type: offset: 6 length: 2 219 * 0 - SCAN REQ EVENT 220 * 1 - SCAN ABORT IND EVENT 221 * 2 - SCAN_RSP_EVENT 222 * 3 - JOIN_REQ_EVENT 223 * 4 - JOIN_RSP_EVENT 224 * 5 - SETCONTEXT_REQ_EVENT 225 * 6 - SETCONTEXT_RSP_EVENT 226 * 7 - REASSOC_REQ_EVENT 227 * 8 - REASSOC_RSP_EVENT 228 * 9 - AUTH_REQ_EVENT 229 * 10 - AUTH_RSP_EVENT 230 * 11 - DISASSOC_REQ_EVENT 231 * 12 - DISASSOC_RSP_EVENT 232 * 13 - DISASSOC_IND_EVENT 233 * 14 - DISASSOC_CNF_EVENT 234 * 15 - DEAUTH_REQ_EVENT 235 * 16 - DEAUTH_RSP_EVENT 236 * 17 - DEAUTH_IND_EVENT 237 * 18 - START_BSS_REQ_EVENT 238 * 19 - START_BSS_RSP_EVENT 239 * 20 - AUTH_IND_EVENT 240 * 21 - ASSOC_IND_EVENT 241 * 22 - ASSOC_CNF_EVENT 242 * 23 - REASSOC_IND_EVENT 243 * 24 - SWITCH_CHL_IND_EVENT 244 * 25 - SWITCH_CHL_RSP_EVENT 245 * 26 - STOP_BSS_REQ_EVENT 246 * 27 - STOP_BSS_RSP_EVENT 247 * 28 - DEAUTH_CNF_EVENT 248 * 29 - ADDTS_REQ_EVENT 249 * 30 - ADDTS_RSP_EVENT 250 * 31 - DELTS_REQ_EVENT 251 * 32 - DELTS_RSP_EVENT 252 * 33 - DELTS_IND_EVENT 253 * 34 - ENTER_BMPS_REQ_EVENT 254 * 35 - ENTER_BMPS_RSP_EVENT 255 * 36 - EXIT_BMPS_REQ_EVENT 256 * 37 - BMPS_RSP_EVENT 257 * 38 - EXIT_BMPS_IND_EVENT 258 * 39 - ENTER_IMPS_REQ_EVENT 259 * 40 - ENTER_IMPS_RSP_EVENT 260 * 41 - EXIT_IMPS_REQ_EVENT 261 * 42 - EXIT_IMPS_RSP_EVENT 262 * 43 - ENTER_UAPSD_REQ_EVENT 263 * 44 - ENTER_UAPSD_RSP_EVENT 264 * 45 - EXIT_UAPSD_REQ_EVENT 265 * 46 - EXIT_UAPSD_RSP_EVENT 266 * 47 - WOWL_ADD_BCAST_PTRN_EVENT 267 * 48 - WOWL_DEL_BCAST_PTRN_EVENT 268 * 49 - ENTER_WOWL_REQ_EVENT 269 * 50 - ENTER_WOWL_RSP_EVENT 270 * 51 - EXIT_WOWL_REQ_EVENT 271 * 52 - EXIT_WOWL_RSP_EVENT 272 * 53 - HAL_ADDBA_REQ_EVENT 273 * 54 - HAL_ADDBA_RSP_EVENT 274 * 55 - HAL_DELBA_IND_EVENT 275 * 56 - HB_FAILURE_TIMEOUT 276 * 57 - PRE_AUTH_REQ_EVENT 277 * 58 - PRE_AUTH_RSP_EVENT 278 * 59 - PREAUTH_DONE 279 * 60 - REASSOCIATING 280 * 61 - CONNECTED 281 * 62 - ASSOC_REQ_EVENT 282 * 63 - AUTH_COMP_EVENT 283 * 64 - ASSOC_COMP_EVENT 284 * 65 - AUTH_START_EVENT 285 * 66 - ASSOC_START_EVENT 286 * 67 - REASSOC_START_EVENT 287 * 68 - ROAM_AUTH_START_EVENT 288 * 69 - ROAM_AUTH_COMP_EVENT 289 * 70 - ROAM_ASSOC_START_EVENT 290 * 71 - ROAM_ASSOC_COMP_EVENT 291 * 72 - SCAN_COMPLETE_EVENT 292 * 73 - SCAN_RESULT_FOUND_EVENT 293 * 74 - ASSOC_TIMEOUT 294 * 75 - AUTH_TIMEOUT 295 * 76 - DEAUTH_FRAME_EVENT 296 * 77 - DISASSOC_FRAME_EVENT 297 * 298 * SME State: offset: 8 length: 2 299 * 0 - OFFLINE 300 * 1 - IDLE 301 * 2 - SUSPEND 302 * 3 - WT SCAN 303 * 4 - WT JOIN 304 * 5 - WT AUTH 305 * 6 - WT ASSOC 306 * 7 - WT REASSOC 307 * 8 - WT REASSOC LINK FAIL 308 * 9 - JOIN FAILURE 309 * 10 - ASSOCIATED 310 * 11 - REASSOCIATED 311 * 12 - LINK EST 312 * 13 - LINK EST WT SCAN 313 * 14 - WT PRE AUTH 314 * 15 - WT DISASSOC 315 * 16 - WT DEAUTH 316 * 17 - WT START BSS 317 * 18 - WT STOP BSS 318 * 19 - NORMAL 319 * 20 - CHANNEL SCAN 320 * 21 - NORMAL CHANNEL SCAN 321 * 322 * MLM State: offset: 10 legth: 2 323 * 0 - MLM OFFLINE 324 * 1 - MLM IDLE 325 * 2 - MLM WT PROBE RESP 326 * 3 - MLM PASSIVE SCAN 327 * 4 - MLM WT JOIN BEACON 328 * 5 - MLM JOINED 329 * 6 - MLM BSS STARTED 330 * 7 - MLM WT AUTH FRAME 331 * 8 - MLM WT AUTH FRAME 332 * 9 - MLM WT AUTH FRAME 333 * 10 - MLM AUTH RSP TIMEOUT 334 * 11 - MLM AUTHENTICATED 335 * 12 - MLM WT ASSOC RSP 336 * 13 - MLM WT REASSOC RSP 337 * 14 - MLM ASSOCIATED 338 * 15 - MLM REASSOCIATED 339 * 16 - MLM LINK ESTABLISHED 340 * 17 - MLM WT ASSOC CNF 341 * 18 - MLM LEARN 342 * 19 - MLM WT ADD BSS RSP 343 * 20 - MLM WT DEL BSS RSP 344 * 21 - MLM WT ADD BSS RSP ASSOC 345 * 22 - MLM WT ADD BSS RSP REASSOC 346 * 23 - MLM WT ADD BSS RSP PREASSOC 347 * 24 - MLM WT ADD STA RSP 348 * 25 - MLM WT DEL STA RSP 349 * 26 - MLM WT ASSOC DEL STA RSP 350 * 27 - MLM WT SET BSS KEY 351 * 28 - MLM WT SET STA KEY 352 * 29 - MLM WT SET STA BCASTKEY 353 * 30 - MLM WT ADDBA RSP 354 * 31 - MLM WT REMOVE BSS KEY 355 * 32 - MLM WT REMOVE STA KEY 356 * 33 - MLM WT SET MIMOPS 357 * 358 * Status: offset: 12 length: 2 359 * Reason Code: offset: 14 length: 2 360 * 361 * Supported Feature: STA 362 * 363 * </diag_event> 364 */ 365 366 EVENT_WLAN_PE, /* 16 byte payload */ 367 368 /* Events between 0x67b to 0x67f are not used */ 369 370 /* 371 * <diag_event> 372 * EVENT_WLAN_BRINGUP_STATUS 373 * @ wlanStatus: Describe wlan status 374 * @ driverVersion: Driver version between 0 to 9 375 * 376 * This event is used in BRINGUP to send wlan status 377 * Values for parameters are defined below: 378 * WLAN Status: offset: 0 length: 2 379 * 0 - WLAN Disabled 380 * 1 - WLAN Enabled 381 * 2 - Reset Fail 382 * 3 - Reset Success 383 * 4 - Device Removed 384 * 5 - Devide Inserted 385 * 6 - Driver Unloaded 386 * 7 - Driver Loaded 387 * 388 * driverVersion: offset: 2 length: 10 389 * 390 * Supported Feature: Bringup 391 * 392 * </diag_event> 393 */ 394 395 EVENT_WLAN_BRINGUP_STATUS = 0x680, /* 12 byte payload */ 396 397 /* 398 * <diag_event> 399 * EVENT_WLAN_POWERSAVE_GENERIC 400 * @ event_subtype: Event subtype 401 * @ full_power_request_reason: Full power request reason 402 * @ pmc_current_state: Pmc current state 403 * @ enable_disable_powersave_mode: Enable disable powersave mode 404 * @ winmob_d_power_state: winmob d power state 405 * @ dtim_period: DTIM period 406 * @ final_listen_intv: Final listen int 407 * @ bmps_auto_timer_duration: BMPS auto timer duration 408 * @ bmps_period: BMPS period 409 * 410 * This event is used in POWERSAVE to send wlan status 411 * Values for parameters are defined below: 412 * Event Sub Type: offset: 0 length: 1 413 * Full Power Req Reason: offset: 1 length: 1 414 * PMC Current State: offset: 2 length: 1 415 * Enable disable powersave mode: 3 length: 1 416 * Winmob D Power State: offset: 4 length: 1 417 * DTIM Period: offset:5 length: 1 418 * Final Listen INTV: offset:6 length: 2 419 * BMPS Auto Timer Duration: 8 length: 2 420 * BMPS Period: offset: 10 length:2 421 * 422 * Supported Feature: POWERSAVE GENERIC 423 * 424 * </diag_event> 425 */ 426 427 EVENT_WLAN_POWERSAVE_GENERIC, /* 16 byte payload */ 428 429 /* 430 * <diag_event> 431 * EVENT_WLAN_POWERSAVE_WOW 432 * @ event_subtype: Event subtype 433 * @ wow_type: Wow type 434 * @ wow_magic_pattern: It will use pattern from 0 to 5 435 * @ wow_del_ptrn_id: Wow delete pattern id 436 * @ wow_wakeup_cause: Wow wakeup cause 437 * @ wow_wakeup_cause_pbm_ptrn_id: Wow wakeup cause pbm pattern id 438 * 439 * This event is used in POWERSAVE WOW to send the wow wakeup pattern, 440 * cause etc 441 * Values for parameters are defined below: 442 * Event Sub Type: offset: 0 length: 1 443 * 0 - Enter 444 * 1 - Exit 445 * 2 - Del Pattern 446 * 3 - Wakup 447 * 448 * WOW Type: offset: 1 length: 1 449 * 0 - None 450 * 1 - Magic Pkt Only 451 * 2 - Byte Match Only 452 * 3 - Magic Pkt Byte Match 453 * 454 * WOW Magic Pattern: offset:2 length: 6 455 * WOW Del Pattern ID: offset:8 length: 1 456 * WOW Wakeup Cause: offset: 9 length: 1 457 * 0 - Magic Pkt Match 458 * 1 - Ptrn Byte Match 459 * WOW Wakeup Cause PBM Ptrn ID: offset: 10 length: 1 460 * 461 * Supported Feature: Powersave wow 462 * 463 * </diag_event> 464 */ 465 466 EVENT_WLAN_POWERSAVE_WOW, /* 11 byte payload */ 467 468 /* Events between 0x683 to 0x690 are not used */ 469 470 /* 471 * <diag_event> 472 * EVENT_WLAN_BTC 473 * @ eventId: Event id 474 * @ btAddr: BT address 475 * @ connHandle: Connection handle 476 * @ connStatus: Connection status 477 * @ linkType: Link Type 478 * @ scoInterval: Synchronous Connection Oriented interval 479 * @ scoWindow: Synchronous Connection Oriented window 480 * @ retransWindow: Retransmisson window 481 * @ mode: Mode 482 * 483 * This event is used in Bluetooth to send the btc status 484 * Values for parameters are defined below: 485 * Event ID: offset: 0 length: 1 486 * 0 - DEVICE SWITCHED ON 487 * 1 - DEVICE SWITCHED OFF 488 * 2 - INQUIRY STARTED 489 * 3 - INQUIRY STOPPED 490 * 4 - PAGE STARTED 491 * 5 - PAGE STOPPED 492 * 6 - CREATE ACL CONNECTION 493 * 7 - ACL CONNECTION COMPLETE 494 * 8 - CREATE SYNC CONNECTION 495 * 9 - SYNC CONNECTION COMPLETE 496 * 10 - SYNC CONNECTION UPDATED 497 * 11 - DISCONNECTION COMPLETE 498 * 12 - MODE CHANGED 499 * 13 - A2DP STREAM START 500 * 14 - A2DP STREAM STOP 501 * 502 * BT Addr[0]: offset: 1 length: 1 503 * BT Addr[1]: offset: 2 length: 1 504 * BT Addr[2]: offset: 3 length: 1 505 * BT Addr[3]: offset: 4 length: 1 506 * BT Addr[4]: offset: 5 length: 1 507 * BT Addr[5]: offset: 6 length: 1 508 * 509 * Conn Handle: offset: 7 length: 2 510 * 65535 - Invalid 511 * 512 * Conn Status: offset:9 length: 1 513 * 0 - Fail 514 * 1 - success 515 * 516 * Link Type: offset: 10 length: 1 517 * 0 - SCO 518 * 1 - ACL 519 * 2 - ESCO 520 * 521 * Sco Interval: offset: 11 length: 1 522 * Sco Window: offset: 12 length: 1 523 * Retrans Window: offset: 13 length: 1 524 * 525 * Mode: offset: 14 length: 1 526 * 0 - Active 527 * 1 - Hold 528 * 2 - Sniff 529 * 3 - Park 530 * 531 * Supported Feature: Bluetooth 532 * 533 * </diag_event> 534 */ 535 536 EVENT_WLAN_BTC = 0x691, /* 15 byte payload */ 537 538 /* 539 * <diag_event> 540 * EVENT_WLAN_EAPOL 541 * @ event_sub_type: 0-Transmitted, 1-Received 542 * @ eapol_packet_type: 0 - EAP Start, 1 - EAPOL Start, 2 - EAPOL 543 * Logoff, 3 - EAPOL Key, 4 - EAPOL Encapsulated Alert 544 * @ eapol_key_info: This field from the driver is in big endian format 545 * @ eapol_rate: Rate at which the frame is received 546 * @ dest_addr: Destination address 547 * * @ src_addr: Source address 548 * 549 * This event is used to send Extensible Authentication Protocol 550 * information 551 * Values for parameters are defined below: 552 * event_sub_type: offset: 0 length: 1 553 * eapol_packet_type: offset: 1 length: 1 554 * eapol_key_info: offset:2 length: 2 555 * eapol_rate: offset: 4 length: 2 556 * dest_addr[0]: offset: 6 length: 1 557 * dest_addr[1]: offset: 7 length: 1 558 * dest_addr[2]: offset: 8 length: 1 559 * dest_addr[3]: offset: 9 length: 1 560 * dest_addr[4]: offset: 10 length: 1 561 * dest_addr[5]: offset: 11 length: 1 562 * src_addr[0]: offset: 12 length: 1 563 * src_addr[1]: offset: 13 length: 1 564 * src_addr[2]: offset: 14 length: 1 565 * src_addr[3]: offset: 15 length: 1 566 * src_addr[4]: offset: 16 length: 1 567 * src_addr[5]: offset: 17 length: 1 568 * 569 * Supported Feature: Extensible Authentication Protocol 570 * 571 * </diag_event> 572 */ 573 574 EVENT_WLAN_EAPOL = 0xA8D,/* 18 bytes payload */ 575 576 /* 577 * <diag_event> 578 * EVENT_WLAN_WAKE_LOCK 579 * @ status: Whether the wakelock is taken/released 580 * @ reason: Reason for taking this wakelock 581 * @ timeout: Timeout value in case of timed wakelocks 582 * @ name_len: Length of the name of the wakelock that will follow 583 * @ name: Name of the wakelock 584 * 585 * This event is used to send wakelock information 586 * Values for parameters are defined below: 587 * status: offset: 0 length: 4 588 * reason: offset: 4 length: 4 589 * timeout: offset: 8 length: 4 590 * name_len: offset: 12 length: 4 591 * 592 * Supported Feature: wlan wakelock 593 * 594 * </diag_event> 595 */ 596 597 EVENT_WLAN_WAKE_LOCK = 0xAA2, /* 96 bytes payload */ 598 EVENT_WLAN_BEACON_RECEIVED = 0xAA6, /* FW event: 2726 */ 599 600 /* 601 * <diag_event> 602 * EVENT_WLAN_LOG_COMPLETE 603 * @ is_fatal: Indicates if the event is fatal or not 604 * @ indicator: Source of the bug report - Framework/Host/Firmware 605 * @ reason_code: Reason for triggering bug report 606 * @ reserved: Reserved field 607 * 608 * This event is used to send log completion related information 609 * Values for parameters are defined below: 610 * is_fatal: offset: 0 length: 4 611 * indicator: offset: 4 length: 4 612 * reason_code: offset: 8 length: 4 613 * reserved: offset: 12 length: 4 614 * 615 * Supported Feature: Logging 616 * 617 * </diag_event> 618 */ 619 620 EVENT_WLAN_LOG_COMPLETE = 0xAA7, /* 16 bytes payload */ 621 622 /* 623 * <diag_event> 624 * EVENT_WLAN_STATUS_V2 625 * @ event_id: Event id 626 * @ ssid: Network SSID 627 * @ bssType: BSS Type 628 * @ rssi: RSSI 629 * @ channel: Channel Numbers 630 * @ qosCapability: quality of service capability 631 * @ authType: Authentication type 632 * @ encryptionType: Encryption type 633 * @ reason: Reason for triggering status 634 * @ reasonDisconnect:Reason for disconnection 635 * 636 * This event is used to send varius wlan status 637 * Values for parameters are defined below: 638 * eventId: offset: 0 length: 1 639 * ssid[0] - ssid[31]: offset: 1 to 32, length: 1 640 * bssType: offset: 33 length: 1 641 * rssi: offset: 34 length: 1 642 * channel: offset: 35 length: 1 643 * qosCapability: offset: 36 length: 1 644 * authType: offset: 37 length: 1 645 * encryptionType: offset: 38 length: 1 646 * reason: offset: 39 length: 1 647 * reasonDisconnect: offset: 40 length: 1 648 * 649 * Supported Feature: Wlan status 650 * 651 * </diag_event> 652 */ 653 654 EVENT_WLAN_STATUS_V2 = 0xAB3, 655 656 /* 657 * <diag_event> 658 * EVENT_WLAN_TDLS_TEARDOWN 659 * @ reason: reason for tear down. 660 * @peer_mac: Peer mac address 661 * 662 * 663 * This event is sent when TDLS tear down happens. 664 * 665 * Supported Feature: TDLS 666 * 667 * </diag_event> 668 */ 669 EVENT_WLAN_TDLS_TEARDOWN = 0xAB5, 670 671 /* 672 * <diag_event> 673 * EVENT_WLAN_TDLS_ENABLE_LINK 674 * @peer_mac: peer mac 675 * @is_off_chan_supported: If peer supports off channel 676 * @is_off_chan_configured: If off channel is configured 677 * @is_off_chan_established: If off channel is established 678 * 679 * 680 * This event is sent when TDLS enable link happens. 681 * 682 * Supported Feature: TDLS 683 * 684 * </diag_event> 685 */ 686 EVENT_WLAN_TDLS_ENABLE_LINK = 0XAB6, 687 688 /* 689 * <diag_event> 690 * EVENT_WLAN_SUSPEND_RESUME 691 * @ state: suspend/resume state 692 * 693 * This event is used to send suspend resume info 694 * Values for parameters are defined below: 695 * suspend: offset: 0 length: 1 696 * 0 - HDD_WLAN_EARLY_SUSPEND 697 * 1 - HDD_WLAN_SUSPEND 698 * 2 - HDD_WLAN_EARLY_RESUME 699 * 3 - HDD_WLAN_RESUME 700 * 701 * Supported Feature: suspend/resume 702 * 703 * </diag_event> 704 */ 705 706 EVENT_WLAN_SUSPEND_RESUME = 0xAB7, 707 708 /* 709 * <diag_event> 710 * EVENT_WLAN_OFFLOAD_REQ 711 * @ offload_type: offload type 712 * @ state: enabled or disabled state 713 * 714 * This event is used to send offload info 715 * Values for parameters are defined below: 716 * offloadType: offset: 0 length: 1 717 * 0 - SIR_IPV4_ARP_REPLY_OFFLOAD 718 * 1 - SIR_IPV6_NEIGHBOR_DISCOVERY_OFFLOAD 719 * 2 - SIR_IPV6_NS_OFFLOAD 720 * 721 * enableOrDisable: offset: 1 length: 1 722 * 0 - SIR_OFFLOAD_DISABLE 723 * 1 - SIR_OFFLOAD_ENABLE 724 * 725 * Supported Feature: offload 726 * 727 * </diag_event> 728 */ 729 730 EVENT_WLAN_OFFLOAD_REQ = 0xAB8, 731 732 /* 733 * <diag_event> 734 * EVENT_TDLS_SCAN_BLOCK 735 * @status: rejected status 736 * 737 * 738 * This event is sent when scan is rejected due to TDLS. 739 * 740 * Supported Feature: TDLS 741 * 742 * </diag_event> 743 */ 744 EVENT_TDLS_SCAN_BLOCK = 0xAB9, 745 746 /* 747 * <diag_event> 748 * EVENT_WLAN_TDLS_TX_RX_MGMT 749 * @event_id: event id 750 * @tx_rx: tx or rx 751 * @type: type of frame 752 * @action_sub_type: action frame type 753 * @peer_mac: peer mac 754 * 755 * 756 * This event is sent when TDLS mgmt rx tx happens. 757 * 758 * Supported Feature: TDLS 759 * 760 * </diag_event> 761 */ 762 EVENT_WLAN_TDLS_TX_RX_MGMT = 0xABA, 763 764 /* 765 * <diag_event> 766 * EVENT_WLAN_LOW_RESOURCE_FAILURE 767 * @ WIFI_EVENT_MEMORY_FAILURE: Memory failure 768 * 769 * This event is used to send reason why low resource situation 770 * is observed 771 * 772 * Supported Feature: Memory 773 * 774 * </diag_event> 775 */ 776 777 EVENT_WLAN_LOW_RESOURCE_FAILURE = 0xABB, 778 779 /* 780 * <diag_event> 781 * EVENT_WLAN_POWERSAVE_WOW_STATS 782 * @ wow_ucast_wake_up_count: send unicast packet count 783 * @ wow_bcast_wake_up_count: send broadcast packet count 784 * @ wow_ipv4_mcast_wake_up_coun: send ipv4 multicast packet count 785 * @ wow_ipv6_mcast_wake_up_count: send ipv6 multicast packet count 786 * @ wow_ipv6_mcast_ra_stats: send ipv6 multicast ra packet count 787 * @ wow_ipv6_mcast_ns_stats: send ipv6 multicast ns packet count 788 * @ wow_ipv6_mcast_na_stats: send ipv6 multicast na packet count 789 * @ wow_pno_match_wake_up_count: preferred network offload match count 790 * @ wow_pno_complete_wake_up_count: preferred network offload complete 791 * @ wow_gscan_wake_up_count:Reason: send external scan packet count 792 * @ wow_low_rssi_wake_up_count: send low rssi packet count 793 * @ wow_rssi_breach_wake_up_count: send rssi breach packet count 794 * @ wow_icmpv4_count: Send icmpv4 packet count 795 * @ wow_icmpv6_count: send icmpv6 packet count 796 * @ wow_oem_response_wake_up_count: Send oem response packet count 797 * 798 * This event is used to send wow wakeup stats information 799 * 800 * Supported Feature: Wlan powersave wow 801 * 802 * </diag_event> 803 */ 804 EVENT_WLAN_POWERSAVE_WOW_STATS = 0xB33, 805 806 /* 807 * <diag_event> 808 * EVENT_WLAN_STA_KICKOUT 809 * @reasoncode: Indicates the reasoncode of event 810 * @peer_macaddr: Indicates the peer macaddr 811 * @vdev_id: Indicate unique id for identifying the VDEV 812 * 813 * This event is used to send sta kickout information 814 * Values for parameters are defined below: 815 * Reasoncode: offset: 0 length: 4 816 * Peer macaddr: offset: 4 length: 6 817 * VDEV ID: offset: 10 length 1 818 * 819 * Supported Feature: STA 820 * 821 * </diag_event> 822 */ 823 824 EVENT_WLAN_STA_KICKOUT = 0xB39, 825 826 /* 827 * <diag_event> 828 * EVENT_WLAN_STA_DATASTALL 829 * @reason: Indicates the reason of event 830 * 831 * This event is used to send sta datastall information 832 * Values for parameters are defined below: 833 * Reason: offset:0 length: 4 834 * 835 * Supported Feature: STA 836 * 837 * </diag_event> 838 */ 839 840 EVENT_WLAN_STA_DATASTALL = 0xB3A, 841 842 /* 843 * <diag_event> 844 * EVENT_WLAN_SOFTAP_DATASTALL 845 * @reason: Indicates the reason of event 846 * 847 * This event is used to send SAP datastall information 848 * Values for parameters are defined below: 849 * Reason: offset:0 length: 4 850 * 851 * Supported Feature: SAP 852 * 853 * </diag_event> 854 */ 855 856 EVENT_WLAN_SOFTAP_DATASTALL = 0xB3B, 857 858 /* 859 * <diag_event> 860 * EVENT_WLAN_SSR_REINIT_SUBSYSTEM 861 * @status: Indicates the status of event 862 * 863 * This event is used to send ssr reinit status 864 * Values for parameters are defined below: 865 * Status: offset: 0 length: 4 866 * 867 * Supported Feature: SSR 868 * 869 * </diag_event> 870 */ 871 872 EVENT_WLAN_SSR_REINIT_SUBSYSTEM = 0xB3C, 873 874 /* 875 * <diag_event> 876 * EVENT_WLAN_SSR_SHUTDOWN_SUBSYSTEM 877 * @status: Indicates the status of event 878 * 879 * This event is used to send ssr shutdown status 880 * Values for parameters are defined below: 881 * Status: offset: 0 length: 4 882 * 883 * Supported Feature: SSR 884 * 885 * </diag_event> 886 */ 887 888 EVENT_WLAN_SSR_SHUTDOWN_SUBSYSTEM = 0xB3D, 889 EVENT_WLAN_ACS_REQ = 0xC4A, 890 EVENT_WLAN_ACS_SCAN_START = 0xC4B, 891 EVENT_WLAN_ACS_SCAN_DONE = 0xC4C, 892 EVENT_WLAN_ACS_CHANNEL_SPECTRAL_WEIGHT = 0xC4D, 893 EVENT_WLAN_ACS_BEST_CHANNEL = 0xC4E, 894 EVENT_WLAN_HOST_MGMT_TX_V2 = 0xC52, 895 EVENT_WLAN_HOST_MGMT_RX_V2 = 0xC53, 896 EVENT_WLAN_CONN_STATS_V2 = 0xC56, 897 898 /* 899 * <diag_event> 900 * EVENT_WLAN_RSN_INFO 901 * @akm_suite: Gives information about akm suites used in assoc request 902 * @ucast_cipher: Unicast cipher used in assoc request 903 * @mcast_cipher: Multi cast cipher used in assoc request 904 * @group_mgmt: Requested group mgmt cipher suite 905 * 906 * This event is used to send RSN information used 907 * in assoc request. 908 * 909 * Supported Feature: STA 910 * 911 * </diag_event> 912 */ 913 914 EVENT_WLAN_RSN_INFO = 0xC5B, 915 916 /* 917 * <diag_event> 918 * EVENT_WLAN_AUTH_INFO 919 * @auth_algo_num: Gives information about algo num used in auth request 920 * @auth_transaction_seq_num: seq num of auth request 921 * @auth_status_code: status code of auth request 922 * 923 * This event is used to send algo num, seq num and status code 924 * for auth request 925 * 926 * Supported Feature: STA 927 * 928 * </diag_event> 929 */ 930 931 EVENT_WLAN_AUTH_INFO = 0xC92, 932 933 EVENT_MAX_ID = 0x0FFF 934 } event_id_enum_type; 935 936 #endif /* EVENT_DEFS_H */ 937