From mboxrd@z Thu Jan 1 00:00:00 1970 Return-path: Received: from mail2.candelatech.com ([208.74.158.173]) by bombadil.infradead.org with esmtp (Exim 4.80.1 #2 (Red Hat Linux)) id 1WpMtp-0008UY-Dx for ath10k@lists.infradead.org; Tue, 27 May 2014 19:19:01 +0000 Received: from [192.168.100.236] (firewall.candelatech.com [70.89.124.249]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by mail2.candelatech.com (Postfix) with ESMTPSA id 9DAE740CA81 for ; Tue, 27 May 2014 12:18:40 -0700 (PDT) Message-ID: <5384E510.10109@candelatech.com> Date: Tue, 27 May 2014 12:18:40 -0700 From: Ben Greear MIME-Version: 1.0 Subject: New version of CT firmware is available. List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "ath10k" Errors-To: ath10k-bounces+kvalo=adurom.com@lists.infradead.org To: ath10k Just a quick note: Our firmware should now work on standard kernels with no kernel modifications. Just drop the firmware into the appropriate directory (and re-named firmware-2.bin), and reboot. I did a quick test on Ubuntu 14.04 with kernel 3.13.0-24-generic: Associated a station on an AP on channel 36 and obtained DHCP. Used open authentication. If you can crash this firmware or see any other bugs that could be firmware related, please send me the kernel firmware crash dump and/or bug report. Please do not bother QCA about issues with my firmware image. I am interested to know results if anyone tries this. You can ignore most of this page linked below if not dealing with multiple station vifs, but it has a link to the firmware image, etc: http://www.candelatech.com/vsta.php Thanks, Ben -- Ben Greear Candela Technologies Inc http://www.candelatech.com _______________________________________________ ath10k mailing list ath10k@lists.infradead.org http://lists.infradead.org/mailman/listinfo/ath10k