xref: /wlan-dirver/qca-wifi-host-cmn/utils/host_diag_log/inc/host_diag_event_defs.h (revision dd4dc88b837a295134aa9869114a2efee0f4894b)
1 /*
2  * Copyright (c) 2014-2019 The Linux Foundation. All rights reserved.
3  *
4  * Permission to use, copy, modify, and/or distribute this software for
5  * any purpose with or without fee is hereby granted, provided that the
6  * above copyright notice and this permission notice appear in all
7  * copies.
8  *
9  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL
10  * WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED
11  * WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE
12  * AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
13  * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
14  * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER
15  * TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
16  * PERFORMANCE OF THIS SOFTWARE.
17  */
18 
19 #ifndef EVENT_DEFS_H
20 #define EVENT_DEFS_H
21 
22 typedef enum {
23 	EVENT_DROP_ID = 0,
24 
25 	/* Events between 0x1 to 0x674 are not used */
26 
27 	/*
28 	 * <diag_event>
29 	 * EVENT_WLAN_SECURITY
30 	 * @ eventId: Event id
31 	 * @ authMode: Shows the auth mode
32 	 * @ encryptionModeUnicast: Encryption Mode Unicast
33 	 * @ encryptionModeMulticast: Encryption Mode Multicast
34 	 * @ pmkIDMatch: PMK ID Match
35 	 * @ bssid: BSSID < 0 to 5 >
36 	 * @ keyId: Key ID
37 	 * @ status: Shows the status 0 is Success and 1 is failure
38 	 *
39 	 * This event is used in SECURITY to send various wlan security modes
40 	 * Values for parameters are defined below:
41 	 * Event ID: offset: 0 length: 1
42 	 * 5  - Remove Key Req
43 	 * 6  - Remove Key Rsp
44 	 * 7  - PMKID Candidate Found
45 	 * 8  - PMKID Update
46 	 * 9  - Mic Error
47 	 * 10 - Set UniCast Key Req
48 	 * 11 - Set UniCast Key Rsp
49 	 * 12 - Set BCast Key Req
50 	 * 13 - Set BCast Key Rsp
51 	 *
52 	 * Auth Mode: offset: 1 length: 1
53 	 * 0 - Open
54 	 * 1 - Shared
55 	 * 2 - WPA EAP
56 	 * 3 - WPA PSK
57 	 * 4 - WPA2 EAP
58 	 * 5 - WPA2 PSK
59 	 *
60 	 * Encryption Mode Unicast: offset: 2 length: 1
61 	 * 0 - Open
62 	 * 1 - WEP40
63 	 * 2 - WEP104
64 	 * 3 - TKIP
65 	 * 4 - AES
66 	 *
67 	 * Encryption Mode Multicast: offset: 3 length: 1
68 	 * 0 - Open
69 	 * 1 - WEP40
70 	 * 2 - WEP104
71 	 * 3 - TKIP
72 	 * 4 - AES
73 	 *
74 	 * ENC_MODE_SMS4: offset: 4 length:1
75 	 *
76 	 * PMK ID Match: offset: 5 length: 1
77 	 * 0 - No Match
78 	 * 1 - Match
79 	 *
80 	 * BSSID[0]: offset: 6 length: 1
81 	 * BSSID[1]: offset: 7 length: 1
82 	 * BSSID[2]: offset: 8 length: 1
83 	 * BSSID[3]: offset: 9 length: 1
84 	 * BSSID[4]: offset: 10 length: 1
85 	 * BSSID[5]: offset: 11 length: 1
86 	 *
87 	 * Key ID: offset: 12 length: 1
88 	 * Status: offset: 13 length: 1
89 	 * 0 - Success
90 	 * 1 - Failure
91 	 *
92 	 * Supported Feature: wlan security
93 	 *
94 	 * </diag_event>
95 	 */
96 
97 	EVENT_WLAN_SECURITY = 0x675, /* 13 byte payload */
98 
99 	/*
100 	 * <diag_event>
101 	 * EVENT_WLAN_STATUS
102 	 * @ eventId: Event id
103 	 * @ ssid: SSID
104 	 * @ bssType: BSS Type
105 	 * @ rssi: RSSI
106 	 * @ channel: Channel
107 	 * @ qosCapability: QoS Capability
108 	 * @ authmode: Auth Mode
109 	 * @ encryptionType: Encryption Type
110 	 * @ reason: Reason
111 	 * @ reasonDisconnect: Reason Disconnect
112 	 *
113 	 * This event is used to send wlan status
114 	 * Values for parameters are defined below:
115 	 * Event ID: offset: 0 length: 1
116 	 * 0 - Connect
117 	 * 1 - Disconnect
118 	 *
119 	 * SSID: offset: 1 length: 32
120 	 * BSS Type: offset: 33 + SSID length, length: 1
121 	 * 0 - None
122 	 * 1 - BSS_TYPE_INFRASTRUCTURE
123 	 * 2 - BSS_TYPE_INFRA_AP
124 	 * 3 - BSS_TYPE_IBSS
125 	 * 4 - BSS_TYPE_START_IBSS
126 	 * 5 - BSS_TYPE_NDI
127 	 * 6 - BSS_TYPE_ANY
128 	 *
129 	 * RSSI: offset: 34 length: 1
130 	 * Channel: offset: 35 length: 1
131 	 * QoS Capability: offset: 36 length: 1
132 	 * Auth Mode: offset: 37 length: 1
133 	 * 0 - Open
134 	 * 1 - Shared
135 	 * 2 - WPA EAP
136 	 * 3 - WPA PSK
137 	 * 4 - WPA2 EAP
138 	 * 5 - WPA2 PSK
139 	 * 6 - WAPI CERT
140 	 * 7 - WAPI PSK
141 	 *
142 	 * Encryption Type: offset: 38 length: 1
143 	 * 0 - Open
144 	 * 1 - WEP40
145 	 * 2 - WEP104
146 	 * 3 - TKIP
147 	 * 4 - AES
148 	 *
149 	 * ENC_MODE_SMS4: offset: 39 length: 1
150 	 *
151 	 * Reason: offset: 40 length: 1
152 	 * 0 - Unspecified
153 	 * 1 - User Requested
154 	 * 2 - Mic Error
155 	 * 3 - Diassoc
156 	 * 4 - Deauth
157 	 * 5 - Handoff
158 	 *
159 	 * Reason Disconnect: offset: 41 length: 1
160 	 *
161 	 * Supported Feature: wlan status
162 	 *
163 	 * </diag_event>
164 	 */
165 
166 	EVENT_WLAN_STATUS, /* 15 byte payload */
167 
168 	/* Events 0x677 and 0x678 are not used */
169 
170 	/*
171 	 * <diag_event>
172 	 * EVENT_WLAN_QOS
173 	 * @ eventId: event id
174 	 * @ reasonCode: Reason for event
175 	 *
176 	 * This event is used to send quality set services
177 	 * Values for parameters are defined below:
178 	 * Event ID: offset: 0 length: 1
179 	 * 0 - Add TS Req
180 	 * 1 - Add TS Rsp
181 	 * 2 - Delts
182 	 *
183 	 * Reason Code: offset: 1 length: 1
184 	 * 0 - Admission Accepted
185 	 * 1 - Invalid Params
186 	 * 2 - Reserved
187 	 * 3 - Refused
188 	 * 4 - User Requested
189 	 * 5 - Ind From AP
190 	 *
191 	 * Supported Feature: Qos wlan
192 	 *
193 	 * </diag_event>
194 	 */
195 
196 	EVENT_WLAN_QOS = 0x679, /* 2 byte payload */
197 
198 	/*
199 	 * <diag_event>
200 	 * EVENT_WLAN_PE
201 	 * @bssid: BSSID
202 	 * @ event_type: Event type
203 	 * @ sme_state: SME state
204 	 * @ mlm_state: MLM state
205 	 * @ status: 0 - Success, 1 - Failure < majority 0 is success >
206 	 * @reason_code: reason for event report
207 	 *
208 	 * This event is used in PE to send different diag events.
209 	 * Values for parameters are defined below:
210 	 *
211 	 * bssid[0]: offset: 0 length: 1
212 	 * bssid[1]: offset: 1 length: 1
213 	 * bssid[2]: offset: 2 length: 1
214 	 * bssid[3]: offset: 3 length: 1
215 	 * bssid[4]: offset: 4 length: 1
216 	 * bssid[5]: offset: 5 length: 1
217 	 *
218 	 * Event Type: offset: 6 length: 2
219 	 * 0  - SCAN REQ EVENT
220 	 * 1  - SCAN ABORT IND EVENT
221 	 * 2  - SCAN_RSP_EVENT
222 	 * 3  - JOIN_REQ_EVENT
223 	 * 4  - JOIN_RSP_EVENT
224 	 * 5  - SETCONTEXT_REQ_EVENT
225 	 * 6  - SETCONTEXT_RSP_EVENT
226 	 * 7  - REASSOC_REQ_EVENT
227 	 * 8  - REASSOC_RSP_EVENT
228 	 * 9  - AUTH_REQ_EVENT
229 	 * 10 - AUTH_RSP_EVENT
230 	 * 11 - DISASSOC_REQ_EVENT
231 	 * 12 - DISASSOC_RSP_EVENT
232 	 * 13 - DISASSOC_IND_EVENT
233 	 * 14 - DISASSOC_CNF_EVENT
234 	 * 15 - DEAUTH_REQ_EVENT
235 	 * 16 - DEAUTH_RSP_EVENT
236 	 * 17 - DEAUTH_IND_EVENT
237 	 * 18 - START_BSS_REQ_EVENT
238 	 * 19 - START_BSS_RSP_EVENT
239 	 * 20 - AUTH_IND_EVENT
240 	 * 21 - ASSOC_IND_EVENT
241 	 * 22 - ASSOC_CNF_EVENT
242 	 * 23 - REASSOC_IND_EVENT
243 	 * 24 - SWITCH_CHL_IND_EVENT
244 	 * 25 - SWITCH_CHL_RSP_EVENT
245 	 * 26 - STOP_BSS_REQ_EVENT
246 	 * 27 - STOP_BSS_RSP_EVENT
247 	 * 28 - DEAUTH_CNF_EVENT
248 	 * 29 - ADDTS_REQ_EVENT
249 	 * 30 - ADDTS_RSP_EVENT
250 	 * 31 - DELTS_REQ_EVENT
251 	 * 32 - DELTS_RSP_EVENT
252 	 * 33 - DELTS_IND_EVENT
253 	 * 34 - ENTER_BMPS_REQ_EVENT
254 	 * 35 - ENTER_BMPS_RSP_EVENT
255 	 * 36 - EXIT_BMPS_REQ_EVENT
256 	 * 37 - BMPS_RSP_EVENT
257 	 * 38 - EXIT_BMPS_IND_EVENT
258 	 * 39 - ENTER_IMPS_REQ_EVENT
259 	 * 40 - ENTER_IMPS_RSP_EVENT
260 	 * 41 - EXIT_IMPS_REQ_EVENT
261 	 * 42 - EXIT_IMPS_RSP_EVENT
262 	 * 43 - ENTER_UAPSD_REQ_EVENT
263 	 * 44 - ENTER_UAPSD_RSP_EVENT
264 	 * 45 - EXIT_UAPSD_REQ_EVENT
265 	 * 46 - EXIT_UAPSD_RSP_EVENT
266 	 * 47 - WOWL_ADD_BCAST_PTRN_EVENT
267 	 * 48 - WOWL_DEL_BCAST_PTRN_EVENT
268 	 * 49 - ENTER_WOWL_REQ_EVENT
269 	 * 50 - ENTER_WOWL_RSP_EVENT
270 	 * 51 - EXIT_WOWL_REQ_EVENT
271 	 * 52 - EXIT_WOWL_RSP_EVENT
272 	 * 53 - HAL_ADDBA_REQ_EVENT
273 	 * 54 - HAL_ADDBA_RSP_EVENT
274 	 * 55 - HAL_DELBA_IND_EVENT
275 	 * 56 - HB_FAILURE_TIMEOUT
276 	 * 57 - PRE_AUTH_REQ_EVENT
277 	 * 58 - PRE_AUTH_RSP_EVENT
278 	 * 59 - PREAUTH_DONE
279 	 * 60 - REASSOCIATING
280 	 * 61 - CONNECTED
281 	 * 62 - ASSOC_REQ_EVENT
282 	 * 63 - AUTH_COMP_EVENT
283 	 * 64 - ASSOC_COMP_EVENT
284 	 * 65 - AUTH_START_EVENT
285 	 * 66 - ASSOC_START_EVENT
286 	 * 67 - REASSOC_START_EVENT
287 	 * 68 - ROAM_AUTH_START_EVENT
288 	 * 69 - ROAM_AUTH_COMP_EVENT
289 	 * 70 - ROAM_ASSOC_START_EVENT
290 	 * 71 - ROAM_ASSOC_COMP_EVENT
291 	 * 72 - SCAN_COMPLETE_EVENT
292 	 * 73 - SCAN_RESULT_FOUND_EVENT
293 	 * 74 - ASSOC_TIMEOUT
294 	 * 75 - AUTH_TIMEOUT
295 	 * 76 - DEAUTH_FRAME_EVENT
296 	 * 77 - DISASSOC_FRAME_EVENT
297 	 *
298 	 * SME State: offset: 8 length: 2
299 	 * 0  - OFFLINE
300 	 * 1  - IDLE
301 	 * 2  - SUSPEND
302 	 * 3  - WT SCAN
303 	 * 4  - WT JOIN
304 	 * 5  - WT AUTH
305 	 * 6  - WT ASSOC
306 	 * 7  - WT REASSOC
307 	 * 8  - WT REASSOC LINK FAIL
308 	 * 9  - JOIN FAILURE
309 	 * 10 - ASSOCIATED
310 	 * 11 - REASSOCIATED
311 	 * 12 - LINK EST
312 	 * 13 - LINK EST WT SCAN
313 	 * 14 - WT PRE AUTH
314 	 * 15 - WT DISASSOC
315 	 * 16 - WT DEAUTH
316 	 * 17 - WT START BSS
317 	 * 18 - WT STOP BSS
318 	 * 19 - NORMAL
319 	 * 20 - CHANNEL SCAN
320 	 * 21 - NORMAL CHANNEL SCAN
321 	 *
322 	 * MLM State: offset: 10 legth: 2
323 	 * 0  - MLM OFFLINE
324 	 * 1  - MLM IDLE
325 	 * 2  - MLM WT PROBE RESP
326 	 * 3  - MLM PASSIVE SCAN
327 	 * 4  - MLM WT JOIN BEACON
328 	 * 5  - MLM JOINED
329 	 * 6  - MLM BSS STARTED
330 	 * 7  - MLM WT AUTH FRAME
331 	 * 8  - MLM WT AUTH FRAME
332 	 * 9  - MLM WT AUTH FRAME
333 	 * 10 - MLM AUTH RSP TIMEOUT
334 	 * 11 - MLM AUTHENTICATED
335 	 * 12 - MLM WT ASSOC RSP
336 	 * 13 - MLM WT REASSOC RSP
337 	 * 14 - MLM ASSOCIATED
338 	 * 15 - MLM REASSOCIATED
339 	 * 16 - MLM LINK ESTABLISHED
340 	 * 17 - MLM WT ASSOC CNF
341 	 * 18 - MLM LEARN
342 	 * 19 - MLM WT ADD BSS RSP
343 	 * 20 - MLM WT DEL BSS RSP
344 	 * 21 - MLM WT ADD BSS RSP ASSOC
345 	 * 22 - MLM WT ADD BSS RSP REASSOC
346 	 * 23 - MLM WT ADD BSS RSP PREASSOC
347 	 * 24 - MLM WT ADD STA RSP
348 	 * 25 - MLM WT DEL STA RSP
349 	 * 26 - MLM WT ASSOC DEL STA RSP
350 	 * 27 - MLM WT SET BSS KEY
351 	 * 28 - MLM WT SET STA KEY
352 	 * 29 - MLM WT SET STA BCASTKEY
353 	 * 30 - MLM WT ADDBA RSP
354 	 * 31 - MLM WT REMOVE BSS KEY
355 	 * 32 - MLM WT REMOVE STA KEY
356 	 * 33 - MLM WT SET MIMOPS
357 	 *
358 	 * Status: offset: 12 length: 2
359 	 * Reason Code: offset: 14 length: 2
360 	 *
361 	 * Supported Feature: STA
362 	 *
363 	 * </diag_event>
364 	 */
365 
366 	EVENT_WLAN_PE, /* 16 byte payload */
367 
368 	/* Events between 0x67b to 0x67f are not used */
369 
370 	/*
371 	 * <diag_event>
372 	 * EVENT_WLAN_BRINGUP_STATUS
373 	 * @ wlanStatus: Describe wlan status
374 	 * @ driverVersion: Driver version between 0 to 9
375 	 *
376 	 * This event is used in BRINGUP to send wlan status
377 	 * Values for parameters are defined below:
378 	 * WLAN Status: offset: 0 length: 2
379 	 * 0 - WLAN Disabled
380 	 * 1 - WLAN Enabled
381 	 * 2 - Reset Fail
382 	 * 3 - Reset Success
383 	 * 4 - Device Removed
384 	 * 5 - Devide Inserted
385 	 * 6 - Driver Unloaded
386 	 * 7 - Driver Loaded
387 	 *
388 	 * driverVersion: offset: 2 length: 10
389 	 *
390 	 * Supported Feature: Bringup
391 	 *
392 	 * </diag_event>
393 	 */
394 
395 	EVENT_WLAN_BRINGUP_STATUS = 0x680, /* 12 byte payload */
396 
397 	/*
398 	 * <diag_event>
399 	 * EVENT_WLAN_POWERSAVE_GENERIC
400 	 * @ event_subtype: Event subtype
401 	 * @ full_power_request_reason: Full power request reason
402 	 * @ pmc_current_state: Pmc current state
403 	 * @ enable_disable_powersave_mode: Enable disable powersave mode
404 	 * @ winmob_d_power_state: winmob d power state
405 	 * @ dtim_period: DTIM period
406 	 * @ final_listen_intv: Final listen int
407 	 * @ bmps_auto_timer_duration: BMPS auto timer duration
408 	 * @ bmps_period: BMPS period
409 	 *
410 	 * This event is used in POWERSAVE to send wlan status
411 	 * Values for parameters are defined below:
412 	 * Event Sub Type: offset: 0 length: 1
413 	 * Full Power Req Reason: offset: 1 length: 1
414 	 * PMC Current State: offset: 2 length: 1
415 	 * Enable disable powersave mode: 3 length: 1
416 	 * Winmob D Power State: offset: 4 length: 1
417 	 * DTIM Period: offset:5 length: 1
418 	 * Final Listen INTV: offset:6 length: 2
419 	 * BMPS Auto Timer Duration: 8 length: 2
420 	 * BMPS Period: offset: 10 length:2
421 	 *
422 	 * Supported Feature: POWERSAVE GENERIC
423 	 *
424 	 * </diag_event>
425 	 */
426 
427 	EVENT_WLAN_POWERSAVE_GENERIC, /* 16 byte payload */
428 
429 	/*
430 	 * <diag_event>
431 	 * EVENT_WLAN_POWERSAVE_WOW
432 	 * @ event_subtype: Event subtype
433 	 * @ wow_type: Wow type
434 	 * @ wow_magic_pattern: It will use pattern from 0 to 5
435 	 * @ wow_del_ptrn_id: Wow delete pattern id
436 	 * @ wow_wakeup_cause: Wow wakeup cause
437 	 * @ wow_wakeup_cause_pbm_ptrn_id: Wow wakeup cause pbm pattern id
438 	 *
439 	 * This event is used in POWERSAVE WOW to send the wow wakeup pattern,
440 	 * cause etc
441 	 * Values for parameters are defined below:
442 	 * Event Sub Type: offset: 0 length: 1
443 	 * 0 - Enter
444 	 * 1 - Exit
445 	 * 2 - Del Pattern
446 	 * 3 - Wakup
447 	 *
448 	 * WOW Type: offset: 1 length: 1
449 	 * 0 - None
450 	 * 1 - Magic Pkt Only
451 	 * 2 - Byte Match Only
452 	 * 3 - Magic Pkt Byte Match
453 	 *
454 	 * WOW Magic Pattern: offset:2 length: 6
455 	 * WOW Del Pattern ID: offset:8 length: 1
456 	 * WOW Wakeup Cause: offset: 9 length: 1
457 	 * 0 - Magic Pkt Match
458 	 * 1 - Ptrn Byte Match
459 	 * WOW Wakeup Cause PBM Ptrn ID: offset: 10 length: 1
460 	 *
461 	 * Supported Feature: Powersave wow
462 	 *
463 	 * </diag_event>
464 	 */
465 
466 	EVENT_WLAN_POWERSAVE_WOW, /* 11 byte payload */
467 
468 	/* Events between 0x683 to 0x690 are not used */
469 
470 	/*
471 	 * <diag_event>
472 	 * EVENT_WLAN_BTC
473 	 * @ eventId: Event id
474 	 * @ btAddr: BT address
475 	 * @ connHandle: Connection handle
476 	 * @ connStatus: Connection status
477 	 * @ linkType: Link Type
478 	 * @ scoInterval: Synchronous Connection Oriented interval
479 	 * @ scoWindow: Synchronous Connection Oriented window
480 	 * @ retransWindow: Retransmisson window
481 	 * @ mode: Mode
482 	 *
483 	 * This event is used in Bluetooth to send the btc status
484 	 * Values for parameters are defined below:
485 	 * Event ID: offset: 0 length: 1
486 	 * 0  - DEVICE SWITCHED ON
487 	 * 1  - DEVICE SWITCHED OFF
488 	 * 2  - INQUIRY STARTED
489 	 * 3  - INQUIRY STOPPED
490 	 * 4  - PAGE STARTED
491 	 * 5  - PAGE STOPPED
492 	 * 6  - CREATE ACL CONNECTION
493 	 * 7  - ACL CONNECTION COMPLETE
494 	 * 8  - CREATE SYNC CONNECTION
495 	 * 9  - SYNC CONNECTION COMPLETE
496 	 * 10 - SYNC CONNECTION UPDATED
497 	 * 11 - DISCONNECTION COMPLETE
498 	 * 12 - MODE CHANGED
499 	 * 13 - A2DP STREAM START
500 	 * 14 - A2DP STREAM STOP
501 	 *
502 	 * BT Addr[0]: offset: 1 length: 1
503 	 * BT Addr[1]: offset: 2 length: 1
504 	 * BT Addr[2]: offset: 3 length: 1
505 	 * BT Addr[3]: offset: 4 length: 1
506 	 * BT Addr[4]: offset: 5 length: 1
507 	 * BT Addr[5]: offset: 6 length: 1
508 	 *
509 	 * Conn Handle: offset: 7 length: 2
510 	 * 65535 - Invalid
511 	 *
512 	 * Conn Status: offset:9 length: 1
513 	 * 0 - Fail
514 	 * 1 - success
515 	 *
516 	 * Link Type: offset: 10 length: 1
517 	 * 0 - SCO
518 	 * 1 - ACL
519 	 * 2 - ESCO
520 	 *
521 	 * Sco Interval: offset: 11 length: 1
522 	 * Sco Window: offset: 12 length: 1
523 	 * Retrans Window: offset: 13 length: 1
524 	 *
525 	 * Mode: offset: 14 length: 1
526 	 * 0 - Active
527 	 * 1 - Hold
528 	 * 2 - Sniff
529 	 * 3 - Park
530 	 *
531 	 * Supported Feature: Bluetooth
532 	 *
533 	 * </diag_event>
534 	 */
535 
536 	EVENT_WLAN_BTC = 0x691, /* 15 byte payload */
537 
538 	/*
539 	 * <diag_event>
540 	 * EVENT_WLAN_EAPOL
541 	 * @ event_sub_type: 0-Transmitted, 1-Received
542 	 * @ eapol_packet_type: 0 - EAP Start, 1 - EAPOL Start, 2 - EAPOL
543 	 * Logoff, 3 - EAPOL Key, 4 - EAPOL Encapsulated Alert
544 	 * @ eapol_key_info: This field from the driver is in big endian format
545 	 * @ eapol_rate: Rate at which the frame is received
546 	 * @ dest_addr: Destination address
547 	 * * @ src_addr: Source address
548 	 *
549 	 * This event is used to send Extensible Authentication Protocol
550 	 * information
551 	 * Values for parameters are defined below:
552 	 * event_sub_type: offset: 0 length: 1
553 	 * eapol_packet_type: offset: 1 length: 1
554 	 * eapol_key_info: offset:2 length: 2
555 	 * eapol_rate: offset: 4 length: 2
556 	 * dest_addr[0]: offset: 6 length: 1
557 	 * dest_addr[1]: offset: 7 length: 1
558 	 * dest_addr[2]: offset: 8 length: 1
559 	 * dest_addr[3]: offset: 9 length: 1
560 	 * dest_addr[4]: offset: 10 length: 1
561 	 * dest_addr[5]: offset: 11 length: 1
562 	 * src_addr[0]: offset: 12 length: 1
563 	 * src_addr[1]: offset: 13 length: 1
564 	 * src_addr[2]: offset: 14 length: 1
565 	 * src_addr[3]: offset: 15 length: 1
566 	 * src_addr[4]: offset: 16 length: 1
567 	 * src_addr[5]: offset: 17 length: 1
568 	 *
569 	 * Supported Feature: Extensible Authentication Protocol
570 	 *
571 	 * </diag_event>
572 	 */
573 
574 	EVENT_WLAN_EAPOL = 0xA8D,/* 18 bytes payload */
575 
576 	/*
577 	 * <diag_event>
578 	 * EVENT_WLAN_WAKE_LOCK
579 	 * @ status: Whether the wakelock is taken/released
580 	 * @ reason: Reason for taking this wakelock
581 	 * @ timeout: Timeout value in case of timed wakelocks
582 	 * @ name_len: Length of the name of the wakelock that will follow
583 	 * @ name: Name of the wakelock
584 	 *
585 	 * This event is used to send wakelock information
586 	 * Values for parameters are defined below:
587 	 * status: offset: 0 length: 4
588 	 * reason: offset: 4 length: 4
589 	 * timeout: offset: 8 length: 4
590 	 * name_len: offset: 12 length: 4
591 	 *
592 	 * Supported Feature: wlan wakelock
593 	 *
594 	 * </diag_event>
595 	 */
596 
597 	EVENT_WLAN_WAKE_LOCK = 0xAA2, /* 96 bytes payload */
598 	EVENT_WLAN_BEACON_RECEIVED = 0xAA6, /* FW event: 2726 */
599 
600 	/*
601 	 * <diag_event>
602 	 * EVENT_WLAN_LOG_COMPLETE
603 	 * @ is_fatal: Indicates if the event is fatal or not
604 	 * @ indicator: Source of the bug report - Framework/Host/Firmware
605 	 * @ reason_code: Reason for triggering bug report
606 	 * @ reserved: Reserved field
607 	 *
608 	 * This event is used to send log completion related information
609 	 * Values for parameters are defined below:
610 	 * is_fatal: offset: 0 length: 4
611 	 * indicator: offset: 4 length: 4
612 	 * reason_code: offset: 8 length: 4
613 	 * reserved: offset: 12 length: 4
614 	 *
615 	 * Supported Feature: Logging
616 	 *
617 	 * </diag_event>
618 	 */
619 
620 	EVENT_WLAN_LOG_COMPLETE = 0xAA7, /* 16 bytes payload */
621 
622 	/*
623 	 * <diag_event>
624 	 * EVENT_WLAN_STATUS_V2
625 	 * @ event_id: Event id
626 	 * @ ssid: Network SSID
627 	 * @ bssType: BSS Type
628 	 * @ rssi: RSSI
629 	 * @ channel: Channel Numbers
630 	 * @ qosCapability: quality of service capability
631 	 * @ authType: Authentication type
632 	 * @ encryptionType: Encryption type
633 	 * @ reason: Reason for triggering status
634 	 * @ reasonDisconnect:Reason for disconnection
635 	 *
636 	 * This event is used to send varius wlan status
637 	 * Values for parameters are defined below:
638 	 * eventId: offset: 0 length: 1
639 	 * ssid[0] - ssid[31]: offset: 1 to 32, length: 1
640 	 * bssType: offset: 33 length: 1
641 	 * rssi: offset: 34 length: 1
642 	 * channel: offset: 35 length: 1
643 	 * qosCapability: offset: 36 length: 1
644 	 * authType: offset: 37 length: 1
645 	 * encryptionType: offset: 38 length: 1
646 	 * reason: offset: 39 length: 1
647 	 * reasonDisconnect: offset: 40 length: 1
648 	 *
649 	 * Supported Feature: Wlan status
650 	 *
651 	 * </diag_event>
652 	 */
653 
654 	EVENT_WLAN_STATUS_V2 = 0xAB3,
655 
656 	/*
657 	 * <diag_event>
658 	 * EVENT_WLAN_TDLS_TEARDOWN
659 	 * @ reason: reason for tear down.
660 	 * @peer_mac: Peer mac address
661 	 *
662 	 *
663 	 * This event is sent when TDLS tear down happens.
664 	 *
665 	 * Supported Feature: TDLS
666 	 *
667 	 * </diag_event>
668 	 */
669 	EVENT_WLAN_TDLS_TEARDOWN = 0xAB5,
670 
671 	/*
672 	 * <diag_event>
673 	 * EVENT_WLAN_TDLS_ENABLE_LINK
674 	 * @peer_mac: peer mac
675 	 * @is_off_chan_supported: If peer supports off channel
676 	 * @is_off_chan_configured: If off channel is configured
677 	 * @is_off_chan_established: If off channel is established
678 	 *
679 	 *
680 	 * This event is sent when TDLS enable link happens.
681 	 *
682 	 * Supported Feature: TDLS
683 	 *
684 	 * </diag_event>
685 	 */
686 	EVENT_WLAN_TDLS_ENABLE_LINK = 0XAB6,
687 
688 	/*
689 	 * <diag_event>
690 	 * EVENT_WLAN_SUSPEND_RESUME
691 	 * @ state: suspend/resume state
692 	 *
693 	 * This event is used to send suspend resume info
694 	 * Values for parameters are defined below:
695 	 * suspend: offset: 0 length: 1
696 	 * 0 - HDD_WLAN_EARLY_SUSPEND
697 	 * 1 - HDD_WLAN_SUSPEND
698 	 * 2 - HDD_WLAN_EARLY_RESUME
699 	 * 3 - HDD_WLAN_RESUME
700 	 *
701 	 * Supported Feature: suspend/resume
702 	 *
703 	 * </diag_event>
704 	 */
705 
706 	EVENT_WLAN_SUSPEND_RESUME = 0xAB7,
707 
708 	/*
709 	 * <diag_event>
710 	 * EVENT_WLAN_OFFLOAD_REQ
711 	 * @ offload_type: offload type
712 	 * @ state: enabled or disabled state
713 	 *
714 	 * This event is used to send offload info
715 	 * Values for parameters are defined below:
716 	 * offloadType: offset: 0 length: 1
717 	 * 0 - SIR_IPV4_ARP_REPLY_OFFLOAD
718 	 * 1 - SIR_IPV6_NEIGHBOR_DISCOVERY_OFFLOAD
719 	 * 2 - SIR_IPV6_NS_OFFLOAD
720 	 *
721 	 * enableOrDisable: offset: 1 length: 1
722 	 * 0 - SIR_OFFLOAD_DISABLE
723 	 * 1 - SIR_OFFLOAD_ENABLE
724 	 *
725 	 * Supported Feature: offload
726 	 *
727 	 * </diag_event>
728 	 */
729 
730 	EVENT_WLAN_OFFLOAD_REQ = 0xAB8,
731 
732 	/*
733 	 * <diag_event>
734 	 * EVENT_TDLS_SCAN_BLOCK
735 	 * @status: rejected status
736 	 *
737 	 *
738 	 * This event is sent when scan is rejected due to TDLS.
739 	 *
740 	 * Supported Feature: TDLS
741 	 *
742 	 * </diag_event>
743 	 */
744 	EVENT_TDLS_SCAN_BLOCK = 0xAB9,
745 
746 	/*
747 	 * <diag_event>
748 	 * EVENT_WLAN_TDLS_TX_RX_MGMT
749 	 * @event_id: event id
750 	 * @tx_rx: tx or rx
751 	 * @type: type of frame
752 	 * @action_sub_type: action frame type
753 	 * @peer_mac: peer mac
754 	 *
755 	 *
756 	 * This event is sent when TDLS mgmt rx tx happens.
757 	 *
758 	 * Supported Feature: TDLS
759 	 *
760 	 * </diag_event>
761 	 */
762 	EVENT_WLAN_TDLS_TX_RX_MGMT = 0xABA,
763 
764 	/*
765 	 * <diag_event>
766 	 * EVENT_WLAN_LOW_RESOURCE_FAILURE
767 	 * @ WIFI_EVENT_MEMORY_FAILURE: Memory failure
768 	 *
769 	 * This event is used to send reason why low resource situation
770 	 * is observed
771 	 *
772 	 * Supported Feature: Memory
773 	 *
774 	 * </diag_event>
775 	 */
776 
777 	EVENT_WLAN_LOW_RESOURCE_FAILURE = 0xABB,
778 
779 	/*
780 	 * <diag_event>
781 	 * EVENT_WLAN_POWERSAVE_WOW_STATS
782 	 * @ wow_ucast_wake_up_count: send unicast packet count
783 	 * @ wow_bcast_wake_up_count: send broadcast packet count
784 	 * @ wow_ipv4_mcast_wake_up_coun: send ipv4 multicast packet count
785 	 * @ wow_ipv6_mcast_wake_up_count: send ipv6 multicast packet count
786 	 * @ wow_ipv6_mcast_ra_stats: send ipv6 multicast ra packet count
787 	 * @ wow_ipv6_mcast_ns_stats: send ipv6 multicast ns packet count
788 	 * @ wow_ipv6_mcast_na_stats: send ipv6 multicast na packet count
789 	 * @ wow_pno_match_wake_up_count: preferred network offload match count
790 	 * @ wow_pno_complete_wake_up_count: preferred network offload complete
791 	 * @ wow_gscan_wake_up_count:Reason: send external scan packet count
792 	 * @ wow_low_rssi_wake_up_count: send low rssi packet count
793 	 * @ wow_rssi_breach_wake_up_count: send rssi breach packet count
794 	 * @ wow_icmpv4_count: Send icmpv4 packet count
795 	 * @ wow_icmpv6_count: send icmpv6 packet count
796 	 * @ wow_oem_response_wake_up_count: Send oem response packet count
797 	 *
798 	 * This event is used to send wow wakeup stats information
799 	 *
800 	 * Supported Feature: Wlan powersave wow
801 	 *
802 	 * </diag_event>
803 	 */
804 	EVENT_WLAN_POWERSAVE_WOW_STATS = 0xB33,
805 
806 	/*
807 	 * <diag_event>
808 	 * EVENT_WLAN_STA_KICKOUT
809 	 * @reasoncode: Indicates the reasoncode of event
810 	 * @peer_macaddr: Indicates the peer macaddr
811 	 * @vdev_id: Indicate unique id for identifying the VDEV
812 	 *
813 	 * This event is used to send sta kickout information
814 	 * Values for parameters are defined below:
815 	 * Reasoncode: offset: 0 length: 4
816 	 * Peer macaddr: offset: 4 length: 6
817 	 * VDEV ID: offset: 10 length 1
818 	 *
819 	 * Supported Feature: STA
820 	 *
821 	 * </diag_event>
822 	 */
823 
824 	EVENT_WLAN_STA_KICKOUT = 0xB39,
825 
826 	/*
827 	 * <diag_event>
828 	 * EVENT_WLAN_STA_DATASTALL
829 	 * @reason: Indicates the reason of event
830 	 *
831 	 * This event is used to send sta datastall information
832 	 * Values for parameters are defined below:
833 	 * Reason: offset:0 length: 4
834 	 *
835 	 * Supported Feature: STA
836 	 *
837 	 * </diag_event>
838 	 */
839 
840 	EVENT_WLAN_STA_DATASTALL = 0xB3A,
841 
842 	/*
843 	 * <diag_event>
844 	 * EVENT_WLAN_SOFTAP_DATASTALL
845 	 * @reason: Indicates the reason of event
846 	 *
847 	 * This event is used to send SAP datastall information
848 	 * Values for parameters are defined below:
849 	 * Reason: offset:0 length: 4
850 	 *
851 	 * Supported Feature: SAP
852 	 *
853 	 * </diag_event>
854 	 */
855 
856 	EVENT_WLAN_SOFTAP_DATASTALL = 0xB3B,
857 
858 	/*
859 	 * <diag_event>
860 	 * EVENT_WLAN_SSR_REINIT_SUBSYSTEM
861 	 * @status: Indicates the status of event
862 	 *
863 	 * This event is used to send ssr reinit status
864 	 * Values for parameters are defined below:
865 	 * Status: offset: 0 length: 4
866 	 *
867 	 * Supported Feature: SSR
868 	 *
869 	 *  </diag_event>
870 	 */
871 
872 	EVENT_WLAN_SSR_REINIT_SUBSYSTEM = 0xB3C,
873 
874 	/*
875 	 * <diag_event>
876 	 * EVENT_WLAN_SSR_SHUTDOWN_SUBSYSTEM
877 	 * @status: Indicates the status of event
878 	 *
879 	 * This event is used to send ssr shutdown status
880 	 * Values for parameters are defined below:
881 	 * Status: offset: 0 length: 4
882 	 *
883 	 * Supported Feature: SSR
884 	 *
885 	 * </diag_event>
886 	 */
887 
888 	EVENT_WLAN_SSR_SHUTDOWN_SUBSYSTEM = 0xB3D,
889 	EVENT_WLAN_ACS_REQ = 0xC4A,
890 	EVENT_WLAN_ACS_SCAN_START = 0xC4B,
891 	EVENT_WLAN_ACS_SCAN_DONE = 0xC4C,
892 	EVENT_WLAN_ACS_CHANNEL_SPECTRAL_WEIGHT = 0xC4D,
893 	EVENT_WLAN_ACS_BEST_CHANNEL = 0xC4E,
894 	EVENT_WLAN_HOST_MGMT_TX_V2 = 0xC52,
895 	EVENT_WLAN_HOST_MGMT_RX_V2 = 0xC53,
896 	EVENT_WLAN_CONN_STATS_V2 = 0xC56,
897 
898 	/*
899 	 * <diag_event>
900 	 * EVENT_WLAN_RSN_INFO
901 	 * @akm_suite: Gives information about akm suites used in assoc request
902 	 * @ucast_cipher: Unicast cipher used in assoc request
903 	 * @mcast_cipher: Multi cast cipher used in assoc request
904 	 * @group_mgmt: Requested group mgmt cipher suite
905 	 *
906 	 * This event is used to send RSN information used
907 	 * in assoc request.
908 	 *
909 	 * Supported Feature: STA
910 	 *
911 	 * </diag_event>
912 	 */
913 
914 	EVENT_WLAN_RSN_INFO = 0xC5B,
915 
916 	/*
917 	 * <diag_event>
918 	 * EVENT_WLAN_AUTH_INFO
919 	 * @auth_algo_num: Gives information about algo num used in auth request
920 	 * @auth_transaction_seq_num: seq num of auth request
921 	 * @auth_status_code: status code of auth request
922 	 *
923 	 * This event is used to send algo num, seq num and status code
924 	 * for auth request
925 	 *
926 	 * Supported Feature: STA
927 	 *
928 	 * </diag_event>
929 	 */
930 
931 	EVENT_WLAN_AUTH_INFO = 0xC92,
932 
933 	EVENT_MAX_ID = 0x0FFF
934 } event_id_enum_type;
935 
936 #endif /* EVENT_DEFS_H */
937