ath10k: support MAC address randomization in scan
authorCarl Huang <cjhuang@codeaurora.org>
Thu, 19 Apr 2018 16:39:40 +0000 (19:39 +0300)
committerKalle Valo <kvalo@codeaurora.org>
Tue, 24 Apr 2018 05:45:41 +0000 (08:45 +0300)
commit60e1d0fb290197fe505dff6e4e3b7e4d258dbf60
treec8765eecc197d9a56db9854b4dc53053695d9036
parentcea19a6ce8bf0518d156beea419d822021cc3705
ath10k: support MAC address randomization in scan

The ath10k reports the random_mac_addr capability to upper layer
based on the service bit firmware reported. Driver sets the
spoofed flag in scan_ctrl_flag to firmware if upper layer has
enabled this feature in scan request.

Test with QCA6174 hw3.0 and firmware-6.bin_WLAN.RM.4.4.1-00102-QCARMSWP-1,
but QCA9377 is also affected.

Signed-off-by: Carl Huang <cjhuang@codeaurora.org>
Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
drivers/net/wireless/ath/ath10k/mac.c
drivers/net/wireless/ath/ath10k/wmi-ops.h
drivers/net/wireless/ath/ath10k/wmi-tlv.c
drivers/net/wireless/ath/ath10k/wmi-tlv.h
drivers/net/wireless/ath/ath10k/wmi.c
drivers/net/wireless/ath/ath10k/wmi.h