ath10k_debug_fw_stats_request just be called with conf_mutex held,
otherwise the following warning is seen when lock debugging is enabled:
WARNING: CPU: 0 PID: 793 at drivers/net/wireless/ath/ath10k/debug.c:357
ath10k_debug_fw_stats_request+0x12c/0x133 [ath10k_core]
Modules linked in: snd_hda_cod
the standard ath10k firmware für qca988x chipsets does filter vlans.
the only option for you is using the CT firmware by candelatech, which
does not suffer from this issue.
Sebastian
Am 01.02.2021 um 21:54 schrieb Sven Eckelmann:
Hi,
I was just testing EAP with dynamic_vlan=2 (and a radius ser
The ieee80211_find_sta_by_ifaddr call in
ath10k_wmi_tlv_parse_peer_stats_info must be called while holding the
RCU read lock. Otherwise, the following warning will be seen when RCU
usage checking is enabled:
=
WARNING: suspicious RCU usage
5.10.3 #8 Tainted: GW