1 /* 2 * Copyright (c) 2014-2019,2021 The Linux Foundation. All rights reserved. 3 * Copyright (c) 2022-2023 Qualcomm Innovation Center, Inc. All rights reserved. 4 * 5 * Permission to use, copy, modify, and/or distribute this software for 6 * any purpose with or without fee is hereby granted, provided that the 7 * above copyright notice and this permission notice appear in all 8 * copies. 9 * 10 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL 11 * WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED 12 * WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE 13 * AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL 14 * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR 15 * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER 16 * TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR 17 * PERFORMANCE OF THIS SOFTWARE. 18 */ 19 20 #ifndef EVENT_DEFS_H 21 #define EVENT_DEFS_H 22 23 typedef enum { 24 EVENT_DROP_ID = 0, 25 26 /* Events between 0x1 to 0x674 are not used */ 27 28 /* 29 * <diag_event> 30 * EVENT_WLAN_SECURITY 31 * @ eventId: Event id 32 * @ authMode: Shows the auth mode 33 * @ encryptionModeUnicast: Encryption Mode Unicast 34 * @ encryptionModeMulticast: Encryption Mode Multicast 35 * @ pmkIDMatch: PMK ID Match 36 * @ bssid: BSSID < 0 to 5 > 37 * @ keyId: Key ID 38 * @ status: Shows the status 0 is Success and 1 is failure 39 * 40 * This event is used in SECURITY to send various wlan security modes 41 * Values for parameters are defined below: 42 * Event ID: offset: 0 length: 1 43 * 5 - Remove Key Req 44 * 6 - Remove Key Rsp 45 * 7 - PMKID Candidate Found 46 * 8 - PMKID Update 47 * 9 - Mic Error 48 * 10 - Set UniCast Key Req 49 * 11 - Set UniCast Key Rsp 50 * 12 - Set BCast Key Req 51 * 13 - Set BCast Key Rsp 52 * 53 * Auth Mode: offset: 1 length: 1 54 * 0 - Open 55 * 1 - Shared 56 * 2 - WPA EAP 57 * 3 - WPA PSK 58 * 4 - WPA2 EAP 59 * 5 - WPA2 PSK 60 * 61 * Encryption Mode Unicast: offset: 2 length: 1 62 * 0 - Open 63 * 1 - WEP40 64 * 2 - WEP104 65 * 3 - TKIP 66 * 4 - AES 67 * 68 * Encryption Mode Multicast: offset: 3 length: 1 69 * 0 - Open 70 * 1 - WEP40 71 * 2 - WEP104 72 * 3 - TKIP 73 * 4 - AES 74 * 75 * ENC_MODE_SMS4: offset: 4 length:1 76 * 77 * PMK ID Match: offset: 5 length: 1 78 * 0 - No Match 79 * 1 - Match 80 * 81 * BSSID[0]: offset: 6 length: 1 82 * BSSID[1]: offset: 7 length: 1 83 * BSSID[2]: offset: 8 length: 1 84 * BSSID[3]: offset: 9 length: 1 85 * BSSID[4]: offset: 10 length: 1 86 * BSSID[5]: offset: 11 length: 1 87 * 88 * Key ID: offset: 12 length: 1 89 * Status: offset: 13 length: 1 90 * 0 - Success 91 * 1 - Failure 92 * 93 * Supported Feature: wlan security 94 * 95 * </diag_event> 96 */ 97 98 EVENT_WLAN_SECURITY = 0x675, /* 13 byte payload */ 99 100 /* 101 * <diag_event> 102 * EVENT_WLAN_STATUS 103 * @ eventId: Event id 104 * @ ssid: SSID 105 * @ bssType: BSS Type 106 * @ rssi: RSSI 107 * @ channel: Channel 108 * @ qosCapability: QoS Capability 109 * @ authmode: Auth Mode 110 * @ encryptionType: Encryption Type 111 * @ reason: Reason 112 * @ reasonDisconnect: Reason Disconnect 113 * 114 * This event is used to send wlan status 115 * Values for parameters are defined below: 116 * Event ID: offset: 0 length: 1 117 * 0 - Connect 118 * 1 - Disconnect 119 * 120 * SSID: offset: 1 length: 32 121 * BSS Type: offset: 33 + SSID length, length: 1 122 * 0 - None 123 * 1 - BSS_TYPE_INFRASTRUCTURE 124 * 2 - BSS_TYPE_INFRA_AP 125 * 3 - BSS_TYPE_IBSS 126 * 4 - BSS_TYPE_START_IBSS 127 * 5 - BSS_TYPE_NDI 128 * 6 - BSS_TYPE_ANY 129 * 130 * RSSI: offset: 34 length: 1 131 * Channel: offset: 35 length: 1 132 * QoS Capability: offset: 36 length: 1 133 * Auth Mode: offset: 37 length: 1 134 * 0 - Open 135 * 1 - Shared 136 * 2 - WPA EAP 137 * 3 - WPA PSK 138 * 4 - WPA2 EAP 139 * 5 - WPA2 PSK 140 * 6 - WAPI CERT 141 * 7 - WAPI PSK 142 * 143 * Encryption Type: offset: 38 length: 1 144 * 0 - Open 145 * 1 - WEP40 146 * 2 - WEP104 147 * 3 - TKIP 148 * 4 - AES 149 * 150 * ENC_MODE_SMS4: offset: 39 length: 1 151 * 152 * Reason: offset: 40 length: 1 153 * 0 - Unspecified 154 * 1 - User Requested 155 * 2 - Mic Error 156 * 3 - Diassoc 157 * 4 - Deauth 158 * 5 - Handoff 159 * 160 * Reason Disconnect: offset: 41 length: 1 161 * 162 * Supported Feature: wlan status 163 * 164 * </diag_event> 165 */ 166 167 EVENT_WLAN_STATUS, /* 15 byte payload */ 168 169 /* Events 0x677 and 0x678 are not used */ 170 171 /* 172 * <diag_event> 173 * EVENT_WLAN_QOS 174 * @ eventId: event id 175 * @ reasonCode: Reason for event 176 * 177 * This event is used to send quality set services 178 * Values for parameters are defined below: 179 * Event ID: offset: 0 length: 1 180 * 0 - Add TS Req 181 * 1 - Add TS Rsp 182 * 2 - Delts 183 * 184 * Reason Code: offset: 1 length: 1 185 * 0 - Admission Accepted 186 * 1 - Invalid Params 187 * 2 - Reserved 188 * 3 - Refused 189 * 4 - User Requested 190 * 5 - Ind From AP 191 * 192 * Supported Feature: Qos wlan 193 * 194 * </diag_event> 195 */ 196 197 EVENT_WLAN_QOS = 0x679, /* 2 byte payload */ 198 199 /* 200 * <diag_event> 201 * EVENT_WLAN_PE 202 * @bssid: BSSID 203 * @ event_type: Event type 204 * @ sme_state: SME state 205 * @ mlm_state: MLM state 206 * @ status: 0 - Success, 1 - Failure < majority 0 is success > 207 * @reason_code: reason for event report 208 * 209 * This event is used in PE to send different diag events. 210 * Values for parameters are defined below: 211 * 212 * bssid[0]: offset: 0 length: 1 213 * bssid[1]: offset: 1 length: 1 214 * bssid[2]: offset: 2 length: 1 215 * bssid[3]: offset: 3 length: 1 216 * bssid[4]: offset: 4 length: 1 217 * bssid[5]: offset: 5 length: 1 218 * 219 * Event Type: offset: 6 length: 2 220 * 0 - SCAN REQ EVENT 221 * 1 - SCAN ABORT IND EVENT 222 * 2 - SCAN_RSP_EVENT 223 * 3 - JOIN_REQ_EVENT 224 * 4 - JOIN_RSP_EVENT 225 * 5 - SETCONTEXT_REQ_EVENT 226 * 6 - SETCONTEXT_RSP_EVENT 227 * 7 - REASSOC_REQ_EVENT 228 * 8 - REASSOC_RSP_EVENT 229 * 9 - AUTH_REQ_EVENT 230 * 10 - AUTH_RSP_EVENT 231 * 11 - DISASSOC_REQ_EVENT 232 * 12 - DISASSOC_RSP_EVENT 233 * 13 - DISASSOC_IND_EVENT 234 * 14 - DISASSOC_CNF_EVENT 235 * 15 - DEAUTH_REQ_EVENT 236 * 16 - DEAUTH_RSP_EVENT 237 * 17 - DEAUTH_IND_EVENT 238 * 18 - START_BSS_REQ_EVENT 239 * 19 - START_BSS_RSP_EVENT 240 * 20 - AUTH_IND_EVENT 241 * 21 - ASSOC_IND_EVENT 242 * 22 - ASSOC_CNF_EVENT 243 * 23 - REASSOC_IND_EVENT 244 * 24 - SWITCH_CHL_IND_EVENT 245 * 25 - SWITCH_CHL_RSP_EVENT 246 * 26 - STOP_BSS_REQ_EVENT 247 * 27 - STOP_BSS_RSP_EVENT 248 * 28 - DEAUTH_CNF_EVENT 249 * 29 - ADDTS_REQ_EVENT 250 * 30 - ADDTS_RSP_EVENT 251 * 31 - DELTS_REQ_EVENT 252 * 32 - DELTS_RSP_EVENT 253 * 33 - DELTS_IND_EVENT 254 * 34 - ENTER_BMPS_REQ_EVENT 255 * 35 - ENTER_BMPS_RSP_EVENT 256 * 36 - EXIT_BMPS_REQ_EVENT 257 * 37 - BMPS_RSP_EVENT 258 * 38 - EXIT_BMPS_IND_EVENT 259 * 39 - ENTER_IMPS_REQ_EVENT 260 * 40 - ENTER_IMPS_RSP_EVENT 261 * 41 - EXIT_IMPS_REQ_EVENT 262 * 42 - EXIT_IMPS_RSP_EVENT 263 * 43 - ENTER_UAPSD_REQ_EVENT 264 * 44 - ENTER_UAPSD_RSP_EVENT 265 * 45 - EXIT_UAPSD_REQ_EVENT 266 * 46 - EXIT_UAPSD_RSP_EVENT 267 * 47 - WOWL_ADD_BCAST_PTRN_EVENT 268 * 48 - WOWL_DEL_BCAST_PTRN_EVENT 269 * 49 - ENTER_WOWL_REQ_EVENT 270 * 50 - ENTER_WOWL_RSP_EVENT 271 * 51 - EXIT_WOWL_REQ_EVENT 272 * 52 - EXIT_WOWL_RSP_EVENT 273 * 53 - HAL_ADDBA_REQ_EVENT 274 * 54 - HAL_ADDBA_RSP_EVENT 275 * 55 - HAL_DELBA_IND_EVENT 276 * 56 - HB_FAILURE_TIMEOUT 277 * 57 - PRE_AUTH_REQ_EVENT 278 * 58 - PRE_AUTH_RSP_EVENT 279 * 59 - PREAUTH_DONE 280 * 60 - REASSOCIATING 281 * 61 - CONNECTED 282 * 62 - ASSOC_REQ_EVENT 283 * 63 - AUTH_COMP_EVENT 284 * 64 - ASSOC_COMP_EVENT 285 * 65 - AUTH_START_EVENT 286 * 66 - ASSOC_START_EVENT 287 * 67 - REASSOC_START_EVENT 288 * 68 - ROAM_AUTH_START_EVENT 289 * 69 - ROAM_AUTH_COMP_EVENT 290 * 70 - ROAM_ASSOC_START_EVENT 291 * 71 - ROAM_ASSOC_COMP_EVENT 292 * 72 - SCAN_COMPLETE_EVENT 293 * 73 - SCAN_RESULT_FOUND_EVENT 294 * 74 - ASSOC_TIMEOUT 295 * 75 - AUTH_TIMEOUT 296 * 76 - DEAUTH_FRAME_EVENT 297 * 77 - DISASSOC_FRAME_EVENT 298 * 299 * SME State: offset: 8 length: 2 300 * 0 - OFFLINE 301 * 1 - IDLE 302 * 2 - SUSPEND 303 * 3 - WT SCAN 304 * 4 - WT JOIN 305 * 5 - WT AUTH 306 * 6 - WT ASSOC 307 * 7 - WT REASSOC 308 * 8 - WT REASSOC LINK FAIL 309 * 9 - JOIN FAILURE 310 * 10 - ASSOCIATED 311 * 11 - REASSOCIATED 312 * 12 - LINK EST 313 * 13 - LINK EST WT SCAN 314 * 14 - WT PRE AUTH 315 * 15 - WT DISASSOC 316 * 16 - WT DEAUTH 317 * 17 - WT START BSS 318 * 18 - WT STOP BSS 319 * 19 - NORMAL 320 * 20 - CHANNEL SCAN 321 * 21 - NORMAL CHANNEL SCAN 322 * 323 * MLM State: offset: 10 length: 2 324 * 0 - MLM OFFLINE 325 * 1 - MLM IDLE 326 * 2 - MLM WT PROBE RESP 327 * 3 - MLM PASSIVE SCAN 328 * 4 - MLM WT JOIN BEACON 329 * 5 - MLM JOINED 330 * 6 - MLM BSS STARTED 331 * 7 - MLM WT AUTH FRAME 332 * 8 - MLM WT AUTH FRAME 333 * 9 - MLM WT AUTH FRAME 334 * 10 - MLM AUTH RSP TIMEOUT 335 * 11 - MLM AUTHENTICATED 336 * 12 - MLM WT ASSOC RSP 337 * 13 - MLM WT REASSOC RSP 338 * 14 - MLM ASSOCIATED 339 * 15 - MLM REASSOCIATED 340 * 16 - MLM LINK ESTABLISHED 341 * 17 - MLM WT ASSOC CNF 342 * 18 - MLM LEARN 343 * 19 - MLM WT ADD BSS RSP 344 * 20 - MLM WT DEL BSS RSP 345 * 21 - MLM WT ADD BSS RSP ASSOC 346 * 22 - MLM WT ADD BSS RSP REASSOC 347 * 23 - MLM WT ADD BSS RSP PREASSOC 348 * 24 - MLM WT ADD STA RSP 349 * 25 - MLM WT DEL STA RSP 350 * 26 - MLM WT ASSOC DEL STA RSP 351 * 27 - MLM WT SET BSS KEY 352 * 28 - MLM WT SET STA KEY 353 * 29 - MLM WT SET STA BCASTKEY 354 * 30 - MLM WT ADDBA RSP 355 * 31 - MLM WT REMOVE BSS KEY 356 * 32 - MLM WT REMOVE STA KEY 357 * 33 - MLM WT SET MIMOPS 358 * 359 * Status: offset: 12 length: 2 360 * Reason Code: offset: 14 length: 2 361 * 362 * Supported Feature: STA 363 * 364 * </diag_event> 365 */ 366 367 EVENT_WLAN_PE, /* 16 byte payload */ 368 369 /* Events between 0x67b to 0x67f are not used */ 370 371 /* 372 * <diag_event> 373 * EVENT_WLAN_BRINGUP_STATUS 374 * @ wlanStatus: Describe wlan status 375 * @ driverVersion: Driver version between 0 to 9 376 * 377 * This event is used in BRINGUP to send wlan status 378 * Values for parameters are defined below: 379 * WLAN Status: offset: 0 length: 2 380 * 0 - WLAN Disabled 381 * 1 - WLAN Enabled 382 * 2 - Reset Fail 383 * 3 - Reset Success 384 * 4 - Device Removed 385 * 5 - Device Inserted 386 * 6 - Driver Unloaded 387 * 7 - Driver Loaded 388 * 8 - bus/link down 389 * 9 - chip temperature high 390 * 391 * driverVersion: offset: 2 length: 10 392 * 393 * Supported Feature: Bringup 394 * 395 * </diag_event> 396 */ 397 398 EVENT_WLAN_BRINGUP_STATUS = 0x680, /* 12 byte payload */ 399 400 /* 401 * <diag_event> 402 * EVENT_WLAN_POWERSAVE_GENERIC 403 * @ event_subtype: Event subtype 404 * @ full_power_request_reason: Full power request reason 405 * @ pmc_current_state: Pmc current state 406 * @ enable_disable_powersave_mode: Enable disable powersave mode 407 * @ winmob_d_power_state: winmob d power state 408 * @ dtim_period: DTIM period 409 * @ final_listen_intv: Final listen int 410 * @ bmps_auto_timer_duration: BMPS auto timer duration 411 * @ bmps_period: BMPS period 412 * 413 * This event is used in POWERSAVE to send wlan status 414 * Values for parameters are defined below: 415 * Event Sub Type: offset: 0 length: 1 416 * Full Power Req Reason: offset: 1 length: 1 417 * PMC Current State: offset: 2 length: 1 418 * Enable disable powersave mode: 3 length: 1 419 * Winmob D Power State: offset: 4 length: 1 420 * DTIM Period: offset:5 length: 1 421 * Final Listen INTV: offset:6 length: 2 422 * BMPS Auto Timer Duration: 8 length: 2 423 * BMPS Period: offset: 10 length:2 424 * 425 * Supported Feature: POWERSAVE GENERIC 426 * 427 * </diag_event> 428 */ 429 430 EVENT_WLAN_POWERSAVE_GENERIC, /* 16 byte payload */ 431 432 /* 433 * <diag_event> 434 * EVENT_WLAN_POWERSAVE_WOW 435 * @ event_subtype: Event subtype 436 * @ wow_type: Wow type 437 * @ wow_magic_pattern: It will use pattern from 0 to 5 438 * @ wow_del_ptrn_id: Wow delete pattern id 439 * @ wow_wakeup_cause: Wow wakeup cause 440 * @ wow_wakeup_cause_pbm_ptrn_id: Wow wakeup cause pbm pattern id 441 * 442 * This event is used in POWERSAVE WOW to send the wow wakeup pattern, 443 * cause etc 444 * Values for parameters are defined below: 445 * Event Sub Type: offset: 0 length: 1 446 * 0 - Enter 447 * 1 - Exit 448 * 2 - Del Pattern 449 * 3 - Wakeup 450 * 451 * WOW Type: offset: 1 length: 1 452 * 0 - None 453 * 1 - Magic Pkt Only 454 * 2 - Byte Match Only 455 * 3 - Magic Pkt Byte Match 456 * 457 * WOW Magic Pattern: offset:2 length: 6 458 * WOW Del Pattern ID: offset:8 length: 1 459 * WOW Wakeup Cause: offset: 9 length: 1 460 * 0 - Magic Pkt Match 461 * 1 - Ptrn Byte Match 462 * WOW Wakeup Cause PBM Ptrn ID: offset: 10 length: 1 463 * 464 * Supported Feature: Powersave wow 465 * 466 * </diag_event> 467 */ 468 469 EVENT_WLAN_POWERSAVE_WOW, /* 11 byte payload */ 470 471 /* Events between 0x683 to 0x690 are not used */ 472 473 /* 474 * <diag_event> 475 * EVENT_WLAN_BTC 476 * @ eventId: Event id 477 * @ btAddr: BT address 478 * @ connHandle: Connection handle 479 * @ connStatus: Connection status 480 * @ linkType: Link Type 481 * @ scoInterval: Synchronous Connection Oriented interval 482 * @ scoWindow: Synchronous Connection Oriented window 483 * @ retransWindow: Retransmisson window 484 * @ mode: Mode 485 * 486 * This event is used in Bluetooth to send the btc status 487 * Values for parameters are defined below: 488 * Event ID: offset: 0 length: 1 489 * 0 - DEVICE SWITCHED ON 490 * 1 - DEVICE SWITCHED OFF 491 * 2 - INQUIRY STARTED 492 * 3 - INQUIRY STOPPED 493 * 4 - PAGE STARTED 494 * 5 - PAGE STOPPED 495 * 6 - CREATE ACL CONNECTION 496 * 7 - ACL CONNECTION COMPLETE 497 * 8 - CREATE SYNC CONNECTION 498 * 9 - SYNC CONNECTION COMPLETE 499 * 10 - SYNC CONNECTION UPDATED 500 * 11 - DISCONNECTION COMPLETE 501 * 12 - MODE CHANGED 502 * 13 - A2DP STREAM START 503 * 14 - A2DP STREAM STOP 504 * 505 * BT Addr[0]: offset: 1 length: 1 506 * BT Addr[1]: offset: 2 length: 1 507 * BT Addr[2]: offset: 3 length: 1 508 * BT Addr[3]: offset: 4 length: 1 509 * BT Addr[4]: offset: 5 length: 1 510 * BT Addr[5]: offset: 6 length: 1 511 * 512 * Conn Handle: offset: 7 length: 2 513 * 65535 - Invalid 514 * 515 * Conn Status: offset:9 length: 1 516 * 0 - Fail 517 * 1 - success 518 * 519 * Link Type: offset: 10 length: 1 520 * 0 - SCO 521 * 1 - ACL 522 * 2 - ESCO 523 * 524 * Sco Interval: offset: 11 length: 1 525 * Sco Window: offset: 12 length: 1 526 * Retrans Window: offset: 13 length: 1 527 * 528 * Mode: offset: 14 length: 1 529 * 0 - Active 530 * 1 - Hold 531 * 2 - Sniff 532 * 3 - Park 533 * 534 * Supported Feature: Bluetooth 535 * 536 * </diag_event> 537 */ 538 539 EVENT_WLAN_BTC = 0x691, /* 15 byte payload */ 540 541 /* 542 * <diag_event> 543 * EVENT_WLAN_EAPOL 544 * @ event_sub_type: 0-Transmitted, 1-Received 545 * @ eapol_packet_type: 0 - EAP Start, 1 - EAPOL Start, 2 - EAPOL 546 * Logoff, 3 - EAPOL Key, 4 - EAPOL Encapsulated Alert 547 * @ eapol_key_info: This field from the driver is in big endian format 548 * @ eapol_rate: Rate at which the frame is received 549 * @ dest_addr: Destination address 550 * * @ src_addr: Source address 551 * 552 * This event is used to send Extensible Authentication Protocol 553 * information 554 * Values for parameters are defined below: 555 * event_sub_type: offset: 0 length: 1 556 * eapol_packet_type: offset: 1 length: 1 557 * eapol_key_info: offset:2 length: 2 558 * eapol_rate: offset: 4 length: 2 559 * dest_addr[0]: offset: 6 length: 1 560 * dest_addr[1]: offset: 7 length: 1 561 * dest_addr[2]: offset: 8 length: 1 562 * dest_addr[3]: offset: 9 length: 1 563 * dest_addr[4]: offset: 10 length: 1 564 * dest_addr[5]: offset: 11 length: 1 565 * src_addr[0]: offset: 12 length: 1 566 * src_addr[1]: offset: 13 length: 1 567 * src_addr[2]: offset: 14 length: 1 568 * src_addr[3]: offset: 15 length: 1 569 * src_addr[4]: offset: 16 length: 1 570 * src_addr[5]: offset: 17 length: 1 571 * 572 * Supported Feature: Extensible Authentication Protocol 573 * 574 * </diag_event> 575 */ 576 577 EVENT_WLAN_EAPOL = 0xA8D,/* 18 bytes payload */ 578 579 /* 580 * <diag_event> 581 * EVENT_WLAN_WAKE_LOCK 582 * @ status: Whether the wakelock is taken/released 583 * @ reason: Reason for taking this wakelock 584 * @ timeout: Timeout value in case of timed wakelocks 585 * @ name_len: Length of the name of the wakelock that will follow 586 * @ name: Name of the wakelock 587 * 588 * This event is used to send wakelock information 589 * Values for parameters are defined below: 590 * status: offset: 0 length: 4 591 * reason: offset: 4 length: 4 592 * timeout: offset: 8 length: 4 593 * name_len: offset: 12 length: 4 594 * 595 * Supported Feature: wlan wakelock 596 * 597 * </diag_event> 598 */ 599 600 EVENT_WLAN_WAKE_LOCK = 0xAA2, /* 96 bytes payload */ 601 EVENT_WLAN_BEACON_RECEIVED = 0xAA6, /* FW event: 2726 */ 602 603 /* 604 * <diag_event> 605 * EVENT_WLAN_LOG_COMPLETE 606 * @ is_fatal: Indicates if the event is fatal or not 607 * @ indicator: Source of the bug report - Framework/Host/Firmware 608 * @ reason_code: Reason for triggering bug report 609 * @ reserved: Reserved field 610 * 611 * This event is used to send log completion related information 612 * Values for parameters are defined below: 613 * is_fatal: offset: 0 length: 4 614 * indicator: offset: 4 length: 4 615 * reason_code: offset: 8 length: 4 616 * reserved: offset: 12 length: 4 617 * 618 * Supported Feature: Logging 619 * 620 * </diag_event> 621 */ 622 623 EVENT_WLAN_LOG_COMPLETE = 0xAA7, /* 16 bytes payload */ 624 625 /* 626 * <diag_event> 627 * EVENT_WLAN_STATUS_V2 628 * @ event_id: Event id 629 * @ ssid: Network SSID 630 * @ bssType: BSS Type 631 * @ rssi: RSSI 632 * @ channel: Channel Numbers 633 * @ qosCapability: quality of service capability 634 * @ authType: Authentication type 635 * @ encryptionType: Encryption type 636 * @ reason: Reason for triggering status 637 * @ reasonDisconnect:Reason for disconnection 638 * 639 * This event is used to send various wlan status 640 * Values for parameters are defined below: 641 * eventId: offset: 0 length: 1 642 * ssid[0] - ssid[31]: offset: 1 to 32, length: 1 643 * bssType: offset: 33 length: 1 644 * rssi: offset: 34 length: 1 645 * channel: offset: 35 length: 1 646 * qosCapability: offset: 36 length: 1 647 * authType: offset: 37 length: 1 648 * encryptionType: offset: 38 length: 1 649 * reason: offset: 39 length: 1 650 * reasonDisconnect: offset: 40 length: 1 651 * 652 * Supported Feature: Wlan status 653 * 654 * </diag_event> 655 */ 656 657 EVENT_WLAN_STATUS_V2 = 0xAB3, 658 659 /* 660 * <diag_event> 661 * EVENT_WLAN_TDLS_TEARDOWN 662 * @ reason: reason for tear down. 663 * @peer_mac: Peer mac address 664 * 665 * 666 * This event is sent when TDLS tear down happens. 667 * 668 * Supported Feature: TDLS 669 * 670 * </diag_event> 671 */ 672 EVENT_WLAN_TDLS_TEARDOWN = 0xAB5, 673 674 /* 675 * <diag_event> 676 * EVENT_WLAN_TDLS_ENABLE_LINK 677 * @peer_mac: peer mac 678 * @is_off_chan_supported: If peer supports off channel 679 * @is_off_chan_configured: If off channel is configured 680 * @is_off_chan_established: If off channel is established 681 * 682 * 683 * This event is sent when TDLS enable link happens. 684 * 685 * Supported Feature: TDLS 686 * 687 * </diag_event> 688 */ 689 EVENT_WLAN_TDLS_ENABLE_LINK = 0XAB6, 690 691 /* 692 * <diag_event> 693 * EVENT_WLAN_SUSPEND_RESUME 694 * @ state: suspend/resume state 695 * 696 * This event is used to send suspend resume info 697 * Values for parameters are defined below: 698 * suspend: offset: 0 length: 1 699 * 0 - HDD_WLAN_EARLY_SUSPEND 700 * 1 - HDD_WLAN_SUSPEND 701 * 2 - HDD_WLAN_EARLY_RESUME 702 * 3 - HDD_WLAN_RESUME 703 * 704 * Supported Feature: suspend/resume 705 * 706 * </diag_event> 707 */ 708 709 EVENT_WLAN_SUSPEND_RESUME = 0xAB7, 710 711 /* 712 * <diag_event> 713 * EVENT_WLAN_OFFLOAD_REQ 714 * @ offload_type: offload type 715 * @ state: enabled or disabled state 716 * 717 * This event is used to send offload info 718 * Values for parameters are defined below: 719 * offloadType: offset: 0 length: 1 720 * 0 - SIR_IPV4_ARP_REPLY_OFFLOAD 721 * 1 - SIR_IPV6_NEIGHBOR_DISCOVERY_OFFLOAD 722 * 2 - SIR_IPV6_NS_OFFLOAD 723 * 724 * enableOrDisable: offset: 1 length: 1 725 * 0 - SIR_OFFLOAD_DISABLE 726 * 1 - SIR_OFFLOAD_ENABLE 727 * 728 * Supported Feature: offload 729 * 730 * </diag_event> 731 */ 732 733 EVENT_WLAN_OFFLOAD_REQ = 0xAB8, 734 735 /* 736 * <diag_event> 737 * EVENT_TDLS_SCAN_BLOCK 738 * @status: rejected status 739 * 740 * 741 * This event is sent when scan is rejected due to TDLS. 742 * 743 * Supported Feature: TDLS 744 * 745 * </diag_event> 746 */ 747 EVENT_TDLS_SCAN_BLOCK = 0xAB9, 748 749 /* 750 * <diag_event> 751 * EVENT_WLAN_TDLS_TX_RX_MGMT 752 * @event_id: event id 753 * @tx_rx: tx or rx 754 * @type: type of frame 755 * @action_sub_type: action frame type 756 * @peer_mac: peer mac 757 * 758 * 759 * This event is sent when TDLS mgmt rx tx happens. 760 * 761 * Supported Feature: TDLS 762 * 763 * </diag_event> 764 */ 765 EVENT_WLAN_TDLS_TX_RX_MGMT = 0xABA, 766 767 /* 768 * <diag_event> 769 * EVENT_WLAN_LOW_RESOURCE_FAILURE 770 * @ WIFI_EVENT_MEMORY_FAILURE: Memory failure 771 * 772 * This event is used to send reason why low resource situation 773 * is observed 774 * 775 * Supported Feature: Memory 776 * 777 * </diag_event> 778 */ 779 780 EVENT_WLAN_LOW_RESOURCE_FAILURE = 0xABB, 781 782 /* 783 * <diag_event> 784 * EVENT_WLAN_POWERSAVE_WOW_STATS 785 * @ wow_ucast_wake_up_count: send unicast packet count 786 * @ wow_bcast_wake_up_count: send broadcast packet count 787 * @ wow_ipv4_mcast_wake_up_coun: send ipv4 multicast packet count 788 * @ wow_ipv6_mcast_wake_up_count: send ipv6 multicast packet count 789 * @ wow_ipv6_mcast_ra_stats: send ipv6 multicast ra packet count 790 * @ wow_ipv6_mcast_ns_stats: send ipv6 multicast ns packet count 791 * @ wow_ipv6_mcast_na_stats: send ipv6 multicast na packet count 792 * @ wow_pno_match_wake_up_count: preferred network offload match count 793 * @ wow_pno_complete_wake_up_count: preferred network offload complete 794 * @ wow_gscan_wake_up_count:Reason: send external scan packet count 795 * @ wow_low_rssi_wake_up_count: send low rssi packet count 796 * @ wow_rssi_breach_wake_up_count: send rssi breach packet count 797 * @ wow_icmpv4_count: Send icmpv4 packet count 798 * @ wow_icmpv6_count: send icmpv6 packet count 799 * @ wow_oem_response_wake_up_count: Send oem response packet count 800 * 801 * This event is used to send wow wakeup stats information 802 * 803 * Supported Feature: Wlan powersave wow 804 * 805 * </diag_event> 806 */ 807 EVENT_WLAN_POWERSAVE_WOW_STATS = 0xB33, 808 809 /* 810 * <diag_event> 811 * EVENT_WLAN_STA_KICKOUT 812 * @reasoncode: Indicates the reasoncode of event 813 * @peer_macaddr: Indicates the peer macaddr 814 * @vdev_id: Indicate unique id for identifying the VDEV 815 * 816 * This event is used to send sta kickout information 817 * Values for parameters are defined below: 818 * Reasoncode: offset: 0 length: 4 819 * Peer macaddr: offset: 4 length: 6 820 * VDEV ID: offset: 10 length 1 821 * 822 * Supported Feature: STA 823 * 824 * </diag_event> 825 */ 826 827 EVENT_WLAN_STA_KICKOUT = 0xB39, 828 829 /* 830 * <diag_event> 831 * EVENT_WLAN_STA_DATASTALL 832 * @reason: Indicates the reason of event 833 * 834 * This event is used to send sta datastall information 835 * Values for parameters are defined below: 836 * Reason: offset:0 length: 4 837 * 838 * Supported Feature: STA 839 * 840 * </diag_event> 841 */ 842 843 EVENT_WLAN_STA_DATASTALL = 0xB3A, 844 845 /* 846 * <diag_event> 847 * EVENT_WLAN_SOFTAP_DATASTALL 848 * @reason: Indicates the reason of event 849 * 850 * This event is used to send SAP datastall information 851 * Values for parameters are defined below: 852 * Reason: offset:0 length: 4 853 * 854 * Supported Feature: SAP 855 * 856 * </diag_event> 857 */ 858 859 EVENT_WLAN_SOFTAP_DATASTALL = 0xB3B, 860 861 /* 862 * <diag_event> 863 * EVENT_WLAN_SSR_REINIT_SUBSYSTEM 864 * @status: Indicates the status of event 865 * 866 * This event is used to send ssr reinit status 867 * Values for parameters are defined below: 868 * Status: offset: 0 length: 4 869 * 870 * Supported Feature: SSR 871 * 872 * </diag_event> 873 */ 874 875 EVENT_WLAN_SSR_REINIT_SUBSYSTEM = 0xB3C, 876 877 /* 878 * <diag_event> 879 * EVENT_WLAN_SSR_SHUTDOWN_SUBSYSTEM 880 * @status: Indicates the status of event 881 * 882 * This event is used to send ssr shutdown status 883 * Values for parameters are defined below: 884 * Status: offset: 0 length: 4 885 * 886 * Supported Feature: SSR 887 * 888 * </diag_event> 889 */ 890 891 EVENT_WLAN_SSR_SHUTDOWN_SUBSYSTEM = 0xB3D, 892 EVENT_WLAN_ACS_REQ = 0xC4A, 893 EVENT_WLAN_ACS_SCAN_START = 0xC4B, 894 EVENT_WLAN_ACS_SCAN_DONE = 0xC4C, 895 EVENT_WLAN_ACS_CHANNEL_SPECTRAL_WEIGHT = 0xC4D, 896 EVENT_WLAN_ACS_BEST_CHANNEL = 0xC4E, 897 EVENT_WLAN_HOST_MGMT_TX_V2 = 0xC52, 898 EVENT_WLAN_HOST_MGMT_RX_V2 = 0xC53, 899 EVENT_WLAN_CONN_STATS_V2 = 0xC56, 900 901 /* 902 * <diag_event> 903 * EVENT_WLAN_RSN_INFO 904 * @akm_suite: Gives information about akm suites used in assoc request 905 * @ucast_cipher: Unicast cipher used in assoc request 906 * @mcast_cipher: Multi cast cipher used in assoc request 907 * @group_mgmt: Requested group mgmt cipher suite 908 * 909 * This event is used to send RSN information used 910 * in assoc request. 911 * 912 * Supported Feature: STA 913 * 914 * </diag_event> 915 */ 916 917 EVENT_WLAN_RSN_INFO = 0xC5B, 918 919 /* 920 * <diag_event> 921 * EVENT_WLAN_AUTH_INFO 922 * @auth_algo_num: Gives information about algo num used in auth request 923 * @auth_transaction_seq_num: seq num of auth request 924 * @auth_status_code: status code of auth request 925 * 926 * This event is used to send algo num, seq num and status code 927 * for auth request 928 * 929 * Supported Feature: STA 930 * 931 * </diag_event> 932 */ 933 934 EVENT_WLAN_AUTH_INFO = 0xC92, 935 936 /* 937 * <diag_event> 938 * EVENT_WLAN_CONN 939 * @diag_cmn: Common diag info 940 * @version: Structure Version 941 * @ssid_len: Length of SSID 942 * @auth_algo: Authentication algorithm number field as defined in 943 * IEEE 802.11 - 2020 standard section 9.4.1.1 944 * @bt_coex: Is there active bluetooth connection 945 * @ssid: SSID 946 * @bssid_hint: BSSID hint provided in the connect request 947 * @reason: failure reason. Refer enum wlan_cm_connect_fail_reason 948 * @akm: Auth key management suite defined in IEEE Std 802.11‐2020 949 * Table 9-151—AKM suite selectors. 950 * @subtype: Event subtype defined in enum qca_conn_diag_log_event_type. 951 * @freq: Frequency in MHz 952 * @freq_hint: Frequency Hint in MHz 953 * @pairwise_cipher: Pairwise suite value as defined in IEEE 802.11 2020 954 * Table 12-10—Integrity and key wrap algorithms. 955 * @grp_cipher: Group cipher suite value as defined in 956 * Table 12-10—Integrity and key wrap algorithm in IEEE 802.11 2020. 957 * grp_mgmt: Group management cipher suite as defined in 958 * Table 12-10—Integrity and key wrap algorithms in IEEE 802.11 2020. 959 * 960 * This event is used to send connection parameters for 961 * connecting/connecting fail events 962 * 963 * Supported Feature: STA 964 * 965 * </diag_event> 966 */ 967 968 EVENT_WLAN_CONN = 0xD17, 969 970 /* 971 * <diag_event> 972 * EVENT_WLAN_MGMT 973 * @diag_cmn: Common diag info 974 * @version: Structure Version 975 * @auth_algo: authentication algorithm number defined in 976 * IEEE Std 802.11‐2020 977 * @auth_frame_type: Authentication frame sub-type for SAE 978 * authentication 979 * defined in Section 9.4.1.1 Authentication Algorithm Number field in 980 * IEEE Std 802.11‐2020. 981 * @auth_seq_num: Authentication frame transaction sequence number 982 * @status: Frame status code as defined in IEEE Std 983 * 802.11‐2020 Table 9-50—Status codes. 984 * @tx_status: Frame TX status defined by enum qdf_dp_tx_rx_status 985 * @reason: reason code defined in Table 9-49 Reason codes field’ 986 * from the IEEE 802.11 standard document. 987 * @eap_len: EAP data length 988 * @eap_type: EAP type. Values defined by IANA at: 989 * https://www.iana.org/assignments/eap-numbers 990 * @is_retry_frame: Retry frame indicator 991 * @subtype: Diag event defined in enum qca_conn_diag_log_event_type 992 * @assoc_id: Association ID 993 * @sn: Frame sequence number 994 * @rssi: Peer RSSI in dBm 995 * 996 * This event is used to send management frame info for 997 * Management events such as Auth Req/Resp, Assoc Req/Resp, 998 * Reassoc Req/Resp, Disassoc Req/Resp, Deauth TX/RX and Disconnection. 999 * 1000 * Supported Feature: STA 1001 * 1002 * </diag_event> 1003 */ 1004 1005 EVENT_WLAN_MGMT = 0xD1B, 1006 1007 /* 1008 * <diag_event> 1009 * EVENT_WLAN_ROAM_SCAN_START 1010 * @diag_cmn: Common diag info 1011 * @version: Structure Version 1012 * @is_full_scan: True if the scan is Full scan. 1013 * False if the roam scan is partial channel map scan 1014 * @cu: Current connected channel load in percentage 1015 * @trigger_reason: Roam trigger reason defined by 1016 * enum roam_trigger_reason 1017 * @trigger_sub_reason: Roam scan trigger sub reason indicating if 1018 * periodic/inactivity scan timer initiated roam. Defined by enum 1019 * roam_trigger_sub_reason 1020 * @rssi: Connected AP RSSI in dBm 1021 * @rssi_thresh: Roam scan trigger threshold in dBm 1022 * 1023 * This event is used to send Roam Scan Start event related info. 1024 * 1025 * Supported Feature: STA 1026 * 1027 * </diag_event> 1028 */ 1029 1030 EVENT_WLAN_ROAM_SCAN_START = 0xD1C, 1031 1032 /* 1033 * <diag_event> 1034 * EVENT_WLAN_ROAM_SCAN_DONE 1035 * @diag_cmn: Common diag info 1036 * @version: Structure Version 1037 * @cand_ap_count: Roam candidate AP count 1038 * @btcoex_active: Is there active bluetooth connection 1039 * @num_scanned_freq: Number of scanned frequencies 1040 * @scan_freq: Array of scanned frequencies value in MHz 1041 * 1042 * This event is used to send Roam Scan Done event info. 1043 * 1044 * Supported Feature: STA 1045 * 1046 * </diag_event> 1047 */ 1048 1049 EVENT_WLAN_ROAM_SCAN_DONE = 0xD1D, 1050 1051 /* 1052 * <diag_event> 1053 * EVENT_WLAN_ROAM_CAND_INFO 1054 * @diag_cmn: Common diag info 1055 * @version: Structure Version 1056 * @is_current_ap: Is the entry candidate AP or connected AP 1057 * @idx: Entry index 1058 * @cu_load: Channel utilization load of the AP in percentage 1059 * @subtype: diag event subtype defined in 1060 * enum qca_conn_diag_log_event_type 1061 * @total_score: Total candidate AP score 1062 * @freq: Candidate AP channel frequency in MHz 1063 * @rssi: Candidate AP RSSI in dBm 1064 * @etp: Estimated throughput value of the AP in Kbps 1065 * 1066 * This event is used to send Roam candidate info 1067 * 1068 * Supported Feature: STA 1069 * 1070 * </diag_event> 1071 */ 1072 1073 EVENT_WLAN_ROAM_CAND_INFO = 0xD1E, 1074 1075 /* 1076 * <diag_event> 1077 * EVENT_WLAN_ROAM_RESULT 1078 * @diag_cmn: Common diag info 1079 * @version: Structure Version 1080 * @is_roam_successful: True if roamed successfully or 1081 * false if roaming failed 1082 * @roam_fail_reason: Roam failure reason code defined in enum 1083 * wlan_roam_failure_reason_code 1084 * 1085 * This event is used to send Roam result info 1086 * 1087 * Supported Feature: STA 1088 * 1089 * </diag_event> 1090 */ 1091 1092 EVENT_WLAN_ROAM_RESULT = 0xD1F, 1093 1094 /* 1095 * <diag_event> 1096 * EVENT_WLAN_ROAM_CANCEL 1097 * @diag_cmn: Common diag info 1098 * @version: Structure Version 1099 * @is_roam_successful: True if roamed successfully or 1100 * false if roaming failed 1101 * @roam_fail_reason: Roam failure reason code defined in enum 1102 * wlan_roam_failure_reason_code 1103 * 1104 * This event is used to send Roam cancel related info 1105 * 1106 * Supported Feature: STA 1107 * 1108 * </diag_event> 1109 */ 1110 1111 EVENT_WLAN_ROAM_CANCEL = 0xD20, 1112 1113 /* 1114 * <diag_event> 1115 * EVENT_WLAN_BTM 1116 * @diag_cmn: Common diag info 1117 * @version: Structure Version 1118 * @reason: Query Reason field. Contains one of the values 1119 * defined in IEEE 1120 * Std 802.11‐2020 Table 9-198—Transition and Transition 1121 * Query reasons 1122 * @mode: BTM Request Mode field 1123 * @sub_reason: WTC sub reason code field in the BTM WTC vendor 1124 * specific IE 1125 * @cand_lst_cnt: Candidates list in the BTM frame 1126 * @status: BSS Transition management status codes defined in 1127 * 802.11‐2020 Table 9-428—BTM status code definitions 1128 * @delay: BSS Termination Delay field 1129 * @is_disassoc_imminent: Disassociation imminent bit 1130 * @token: dialog token. Dialog Token is a nonzero value chosen by 1131 * the STA 1132 * @wtc_duration: WTC duration field in minutes 1133 * while sending the BTM frame to identify the query/request/response 1134 * transaction 1135 * @subtype: Event Subtype 1136 * @validity_timer: Validity interval in TBTT 1137 * @disassoc_timer: Time after which the AP disassociates the STA, 1138 * defined in TBTT. 1139 * 1140 * This event is used to send BTM info 1141 * 1142 * Supported Feature: STA 1143 * 1144 * </diag_event> 1145 */ 1146 1147 EVENT_WLAN_BTM = 0xD21, 1148 1149 /* 1150 * <diag_event> 1151 * EVENT_WLAN_BTM_CAND 1152 * @diag_cmn: Common diag info 1153 * @version: Structure Version 1154 * @idx: Candidate index 1155 * @preference: Candidate preference 1156 * 1157 * This event is used to send BTM Candidate info 1158 * 1159 * Supported Feature: STA 1160 * 1161 * </diag_event> 1162 */ 1163 1164 EVENT_WLAN_BTM_CAND = 0xD22, 1165 1166 /* 1167 * <diag_event> 1168 * EVENT_WLAN_CONN_DP 1169 * @diag_cmn: Common diag info 1170 * @version: Structure Version 1171 * @auth_algo: authentication algorithm number defined in 1172 * IEEE Std 802.11‐2020 1173 * @auth_frame_type: Authentication frame sub-type for SAE 1174 * authentication defined in Section 9.4.1.1 Authentication 1175 * Algorithm Number field in IEEE Std 802.11‐2020. 1176 * @auth_seq_num: Authentication frame transaction sequence number 1177 * @status: Frame status code as defined in IEEE Std 1178 * 802.11‐2020 Table 9-50—Status codes. 1179 * @tx_status: Frame TX status defined by enum qdf_dp_tx_rx_status 1180 * @reason: reason code defined in Table 9-49 Reason codes field’ 1181 * from the IEEE 802.11 standard document. 1182 * @eap_len: EAP data length 1183 * @eap_type: EAP type. Values defined by IANA at: 1184 * https://www.iana.org/assignments/eap-numbers 1185 * @is_retry_frame: Retry frame indicator 1186 * @subtype: Diag event defined in enum qca_conn_diag_log_event_type 1187 * @assoc_id: Association ID 1188 * @sn: Frame sequence number 1189 * @rssi: Peer RSSI in dBm 1190 * 1191 * This event is used to send Datapath related info such as DHCP 1192 * handshake and EAPOL. 1193 * 1194 * Supported Feature: STA 1195 * 1196 * </diag_event> 1197 */ 1198 1199 EVENT_WLAN_CONN_DP = 0xD23, 1200 1201 /* 1202 * <diag_event> 1203 * EVENT_WLAN_NBR_RPT 1204 * @diag_cmn: Common diag info 1205 * @version: structure version 1206 * @token: dialog token. Dialog Token is a nonzero value chosen by the 1207 * STA 1208 * @num_rpt: the number of neighbor report elements in response frame. 1209 * @num_freq: Number of frequency in response frame 1210 * @ssid: SSID 1211 * @freq: Frequency list in response frame 1212 * 1213 * This Event is used to send Neighbor report 1214 * 1215 * Supported Feature: STA 1216 * 1217 * </diag_event> 1218 */ 1219 1220 EVENT_WLAN_NBR_RPT = 0xD37, 1221 1222 /* 1223 * <diag_event> 1224 * @diag_cmn: Common diag info 1225 * @version: structure version 1226 * @token: A nonzero number that is unique among the Measurement Request 1227 * elements 1228 * @op_class: Operating classes that include primary channels 1229 * @chan: The channel number field in the beacon report request. 1230 * @req_mode: hex value defines Duration mandatory, parallel, enable, 1231 * request, and report bits. 1232 * @num_rpt: the number of neighbor report elements in response frame. 1233 * @duration: The duration over which the Beacon report was 1234 * measured.(in ms) 1235 * @mode: Mode used for measurement.Values defined in IEEE 1236 * Std 802.11‐2020 Table 9-103. 1237 * 1238 * This Event is used to send Beacon report 1239 * 1240 * Supported Feature: STA 1241 * 1242 * </diag_event> 1243 */ 1244 1245 EVENT_WLAN_BCN_RPT = 0xD38, 1246 1247 /* 1248 * <diag_event> 1249 * @diag_cmn: Common diag info 1250 * @version: structure version 1251 * @is_mlo: flag to specify MLO connection 1252 * @mac_2g: 2GHz STA link address 1253 * @mac_5g: 5GHz STA link address 1254 * @mac_6g: 6GHz STA link address 1255 * 1256 * This Event is used to send STA info immediately after receiving 1257 * connect request 1258 * 1259 * Supported Feature: STA 1260 * </diag_event> 1261 */ 1262 1263 EVENT_WLAN_STA_INFO = 0xD56, 1264 1265 /* 1266 * <diag_event> 1267 * @diag_cmn: Common diag info 1268 * @version: structure version 1269 * @band: Indicate bands on the link 1270 * @link_id: Link ID associated with the bssid 1271 * @status: Status of the link. Will be 0 if link is rejected 1272 * 1273 * This Event is used to indicate the MLO setup info. This event 1274 * will be sent immediately after assoc/reassoc response. 1275 * 1276 * Supported Feature: STA 1277 * </diag_event> 1278 */ 1279 1280 EVENT_WLAN_MLO_SETUP = 0xD57, 1281 1282 /* 1283 * <diag_event> 1284 * @diag_cmn: Common diag info 1285 * @version: structure version 1286 * @band: Indiacate band of the link 1287 * @link_id: Link id of the removed link 1288 * 1289 * This Event is used to indicate when one or more AP 1290 * affiliated with AP MLD is removed. 1291 * 1292 * Supported Feature: STA 1293 * 1294 * </diag_event> 1295 */ 1296 1297 EVENT_WLAN_MLO_RECONFIG = 0xD58, 1298 1299 /* 1300 * <diag_event> 1301 * @diag_cmn: Common diag info 1302 * @version: structure version 1303 * @band: Indicates the band of this link 1304 * @tid_ul: TID-to-link mapping information on the uplink 1305 * @tid_dl: TID-to-link mapping information on the downlink 1306 * 1307 * This Event is used to send T2LM status. 1308 * 1309 * Supported Feature: STA 1310 * 1311 * </diag_event> 1312 */ 1313 1314 EVENT_WLAN_MLO_T2LM_STATUS = 0xD59, 1315 1316 /* 1317 * <diag_event> 1318 * @diag_cmn: Common diag info 1319 * @version: structure version 1320 * @band: Indicates the link on which packet is transmitted or 1321 * received 1322 * @status: Status code of TID-To-Link Mapping Response frame. This 1323 * tag exists only in response frames 1324 * @token: Dialog Token field of TID-To-Link Mapping Request/Response 1325 * frame 1326 * @subtype: Indicates whether the it is a request event or response 1327 * event 1328 * @dir: Indicate whether packet is received or transmitted. 1329 * 0 - TX and 1 - RX 1330 * @tx_status: Status of frame transmission 1331 * @reserved: Reserved field 1332 * 1333 * This Event is to indicate the T2LM Req/Resp info 1334 * 1335 * Supported Feature: STA 1336 * 1337 * </diag_event> 1338 */ 1339 1340 EVENT_WLAN_MLO_T2LM_REQ_RESP = 0xD5A, 1341 1342 /* 1343 * <diag_event> 1344 * @diag_cmn: Common diag info 1345 * @version: structure version 1346 * @band: Indicates the link on which packet is transmitted or 1347 * received 1348 * @tx_status: Status of frame transmission 1349 * @reserved: Reserved Field 1350 * 1351 * This Event is sent when the device sends T2LM teardown action frame 1352 * 1353 * Supported Feature: STA 1354 * 1355 * </diag_event> 1356 */ 1357 1358 EVENT_WLAN_MLO_T2LM_TEARDOWN = 0xD5B, 1359 1360 /* 1361 * <diag_event> 1362 * @diag_cmn: Common diag info 1363 * @version: structure version 1364 * @active_link: Bit field indicating active links 1365 * @inactive_link: Bit field indicating inactive links 1366 * @reserved: Reserved Field 1367 * @reason: reason for change link state 1368 * 1369 * This event is generated when the state of a link is changed. 1370 * 1371 * Supported Feature: STA 1372 * 1373 * </diag_event> 1374 */ 1375 1376 EVENT_WLAN_MLO_LINK_STATUS = 0xD5C, 1377 1378 EVENT_MAX_ID = 0x0FFF 1379 } event_id_enum_type; 1380 1381 #endif /* EVENT_DEFS_H */ 1382