Sergey Matyukevich <sergey.matyukevich.os@xxxxxxxxxxxxx> writes: > From: Vasily Ulyanov <vulyanov@xxxxxxxxxxxxx> > > This allows a running AP to blacklist STAs by their MAC addresses > respecting the configured policy (either accept or deny unless listed). > It can be setup on .start_ap or with .set_mac_acl commands. > > Signed-off-by: Vasily Ulyanov <vulyanov@xxxxxxxxxxxxx> [...] > @@ -918,6 +933,7 @@ int qtnf_wiphy_register(struct qtnf_hw_info *hw_info, struct qtnf_wmac *mac) > wiphy->max_scan_ie_len = QTNF_MAX_VSIE_LEN; > wiphy->mgmt_stypes = qtnf_mgmt_stypes; > wiphy->max_remain_on_channel_duration = 5000; > + wiphy->max_acl_mac_addrs = mac->macinfo.max_acl_mac_addrs; > > wiphy->iface_combinations = iface_comb; > wiphy->n_iface_combinations = 1; > @@ -932,6 +948,9 @@ int qtnf_wiphy_register(struct qtnf_hw_info *hw_info, struct qtnf_wmac *mac) > WIPHY_FLAG_AP_UAPSD | > WIPHY_FLAG_HAS_CHANNEL_SWITCH; > > + if (wiphy->max_acl_mac_addrs > 0) > + wiphy->flags |= WIPHY_FLAG_HAVE_AP_SME; Conditonally enabling WIPHY_FLAG_HAVE_AP_SME looks somewhat suspicious to me and from a quick search I don't see any other driver doing something similar. Can you explain why AP_SME is related to MAC ACL? -- Kalle Valo