Return-path: Received: from mail-wi0-f182.google.com ([209.85.212.182]:33549 "EHLO mail-wi0-f182.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932638AbbELMe6 convert rfc822-to-8bit (ORCPT ); Tue, 12 May 2015 08:34:58 -0400 Received: by wief7 with SMTP id f7so111050003wie.0 for ; Tue, 12 May 2015 05:34:57 -0700 (PDT) MIME-Version: 1.0 In-Reply-To: <87iobygf96.fsf@kamboji.qca.qualcomm.com> References: <87iobygf96.fsf@kamboji.qca.qualcomm.com> Date: Tue, 12 May 2015 14:34:57 +0200 Message-ID: (sfid-20150512_143505_240514_6E1B15A6) Subject: Re: Ath10 firmware crashing in Monitor mode(Sniffer mode) From: Michal Kazior To: Kalle Valo Cc: s prasad , linux-wireless , "ath10k@lists.infradead.org" Content-Type: text/plain; charset=UTF-8 Sender: linux-wireless-owner@vger.kernel.org List-ID: On 12 May 2015 at 14:19, Kalle Valo wrote: > Michal Kazior writes: > >> On 11 May 2015 at 23:27, s prasad wrote: >>> Tested as you suggested, however didn't help. Please find attached log >>> files for each firmware type. >>> >>> While executing following commands in sequence, captured dmesg. I hope >>> those logs will help. If not please let me know. >> >> Thanks! >> >> Apparently I've missed from your original email the fact that you're >> trying to inject packets. This isn't supported in ath10k. > > IMHO we should somehow warn the user or prevent that happening. Is there > a way to do that? We could add an extra condition in ath10k_tx() to drop/free packets immediately and warn if an injection attempt is made. MichaƂ