This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Next revision Both sides next revision | ||
en:users:drivers:iwlwifi:debugging [2017/02/26 10:33] Emmanuel Grumbach [Privacy aspects] |
en:users:drivers:iwlwifi:debugging [2018/09/17 12:29] Emmanuel Grumbach [Tracing] |
||
---|---|---|---|
Line 23: | Line 23: | ||
<code>sudo trace-cmd record -e iwlwifi -e mac80211 -e cfg80211 -e iwlwifi_msg</code> | <code>sudo trace-cmd record -e iwlwifi -e mac80211 -e cfg80211 -e iwlwifi_msg</code> | ||
- | This records all the data that goes from and to the firmware. The output is a file: trace.dat which you can compress prior to sending. To enable tracing, [[https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/tree/drivers/net/wireless/iwlwifi/Kconfig#n130|CONFIG_IWLWIFI_TRACING]] must be set. | + | This records all the data that goes from and to the firmware. The output is a file: trace.dat which you can compress prior to sending. To enable tracing, [[https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tree/drivers/net/wireless/intel/iwlwifi/Kconfig#n139|CONFIG_IWLWIFI_TRACING]] must be set. |
+ | |||
+ | **//Note: you must not remove the iwlwifi kernel module while tracing is running. You need to stop the tracing first!//** | ||
==== Air sniffing ==== | ==== Air sniffing ==== | ||
Line 29: | Line 31: | ||
The output of the air sniffing operation is a file with a pcap extension that can be parsed by the [[https://www.wireshark.org|Wireshark]] program. | The output of the air sniffing operation is a file with a pcap extension that can be parsed by the [[https://www.wireshark.org|Wireshark]] program. | ||
=== How to get a sniffer capture with your Intel device === | === How to get a sniffer capture with your Intel device === | ||
- | In order to put your device in monitor mode and get a sniffer capture, you first need to stop using it as a WiFi client. To do so there are several options: | + | In order to put your device in monitor mode and get a sniffer capture, you first need to stop using it as a Wi-Fi client. To do so there are several options: |
- | * Disable WiFi from the Network Manager GUI and re-enable manually with <code>rfkill unblock wifi </code> This may not work on all the distributions. | + | * Disable Wi-Fi from the Network Manager GUI and re-enable manually with <code>rfkill unblock wifi </code> This may not work on all the distributions. |
* Disable the Network Manager and kill the wpa_supplicant<code>sudo service NetworkManager stop | * Disable the Network Manager and kill the wpa_supplicant<code>sudo service NetworkManager stop | ||
sudo killall wpa_supplicant</code> | sudo killall wpa_supplicant</code> | ||
Line 44: | Line 46: | ||
<code>sudo tcpdump -i wlan0 -w capture.pcap</code> | <code>sudo tcpdump -i wlan0 -w capture.pcap</code> | ||
This file can be opened by [[https://www.wireshark.org/|Wireshark]] and sent for analysis by our developers. Note that this file can be fairly large if you capture a lot of traffic, but it can be compressed very efficiently. | This file can be opened by [[https://www.wireshark.org/|Wireshark]] and sent for analysis by our developers. Note that this file can be fairly large if you capture a lot of traffic, but it can be compressed very efficiently. | ||
- | === How to put your WiFi device back in normal client mode === | + | === How to put your Wi-Fi device back in normal client mode === |
In order to get your device back in a regular client mode, you can either reboot or start the NeworkManager again: | In order to get your device back in a regular client mode, you can either reboot or start the NeworkManager again: | ||
<code>sudo service NetworkManager start</code> | <code>sudo service NetworkManager start</code> |