Return-path: Received: from sabertooth02.qualcomm.com ([65.197.215.38]:16166 "EHLO sabertooth02.qualcomm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932394AbbELMxc (ORCPT ); Tue, 12 May 2015 08:53:32 -0400 From: Kalle Valo To: Michal Kazior CC: linux-wireless , "ath10k@lists.infradead.org" , s prasad Subject: Re: Ath10 firmware crashing in Monitor mode(Sniffer mode) References: <87iobygf96.fsf@kamboji.qca.qualcomm.com> Date: Tue, 12 May 2015 15:53:22 +0300 In-Reply-To: (Michal Kazior's message of "Tue, 12 May 2015 14:34:57 +0200") Message-ID: <87bnhqgdod.fsf@kamboji.qca.qualcomm.com> (sfid-20150512_145338_880988_87E36418) MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: linux-wireless-owner@vger.kernel.org List-ID: Michal Kazior writes: > On 12 May 2015 at 14:19, Kalle Valo wrote: >> Michal Kazior writes: >> >>> On 11 May 2015 at 23:27, s prasad wrote: >>>> Tested as you suggested, however didn't help. Please find attached log >>>> files for each firmware type. >>>> >>>> While executing following commands in sequence, captured dmesg. I hope >>>> those logs will help. If not please let me know. >>> >>> Thanks! >>> >>> Apparently I've missed from your original email the fact that you're >>> trying to inject packets. This isn't supported in ath10k. >> >> IMHO we should somehow warn the user or prevent that happening. Is there >> a way to do that? > > We could add an extra condition in ath10k_tx() to drop/free packets > immediately and warn if an injection attempt is made. Yeah, that would be really good to have. -- Kalle Valo