On 4/11/19 3:30 PM, Denis Kenzior wrote:
Hi,
I've been poking around at how this flag is used and I noticed this check in
net/wireless/nl80211.c:
nl80211_check_scan_flags()
if (*flags & NL80211_SCAN_FLAG_RANDOM_ADDR) {
int err;
if (!(wiphy->features & randomness_flag) ||
(wdev && wdev->current_bss))
return -EOPNOTSUPP;
The above disallows the use of RANDOM_ADDR for scans while connected. The
nl80211.h uapi header seems to concur:
"@NL80211_FEATURE_SCAN_RANDOM_MAC_ADDR: This device/driver supports using a random
MAC address during scan (if the device is unassociated);"
However, if I create a P2P Device (in addition to the default STA device), the
kernel happily lets me scan on the wdev while the STA interface is connected.
sudo iw phy0 interface add p2p type __p2pdev
sudo iw wdev 0x2 p2p start
sudo iw wdev 0x2 scan randomize
So the immediate question I have is, should the RANDOM_ADDR flag indeed be limited to unassociated STA interfaces? It would seem the hardware is capable
randomizing even when connected? Please educate me :)
You can be sure that each driver/hardware has its own bugs and limitations
related to this.
Ath10k wave 1 and wave 2 that I am aware of would ignore and/or not ACK probe
responses
sent back to an MAC address that is not that of the station itself. And
changing the mac of a station
would require complete re-association AFAIK. That is likely just one of the
many issues.
Thanks,
Ben
--
Ben Greear <gree...@candelatech.com>
Candela Technologies Inc http://www.candelatech.com