Hello, I have a 4318 as well and until now (2.6.18), the device would not start up reliably. I always had to remove/insert the kernel module and to ifconfig up/down several times. Larry, I just tried your combined patch set from the last post and now the network comes up every time! :)
In the kernel msgs, I still find the ASSERTION (radio_attenuation < 10); is there a fix for that as well? And I get loads of the "TKIP: replay detected..." messages as well. Anyway, I can dump the ndiswrapper now. Thank you all for your great work! Kind regards, Christian Hoffmann BTW: Is it possible to do such a comined patch against official kernel more regularly? It's quite difficult to follow all the patches that are send on this mailing list. BTW2: my dmesg output bcm43xx: Chip ID 0x4318, rev 0x2 bcm43xx: Number of cores: 4 bcm43xx: Core 0: ID 0x800, rev 0xd, vendor 0x4243, enabled bcm43xx: Core 1: ID 0x812, rev 0x9, vendor 0x4243, enabled bcm43xx: Core 2: ID 0x804, rev 0xc, vendor 0x4243, enabled bcm43xx: Core 3: ID 0x80d, rev 0x7, vendor 0x4243, enabled bcm43xx: PHY connected bcm43xx: Detected PHY: Version: 3, Type 2, Revision 7 bcm43xx: Detected Radio: ID: 8205017f (Manuf: 17f Ver: 2050 Rev: 8) bcm43xx: Radio turned off bcm43xx: Radio turned off bcm43xx: PHY connected bcm43xx: Microcode rev 0x123, pl 0x21 (2005-01-22 19:48:06) bcm43xx: Radio turned on bcm43xx: ASSERTION FAILED (radio_attenuation < 10) at: drivers/net/wireless/bcm43xx/bcm43xx_phy.c:1496:bcm43xx_find_lopair() bcm43xx: ASSERTION FAILED (radio_attenuation < 10) at: drivers/net/wireless/bcm43xx/bcm43xx_phy.c:1496:bcm43xx_find_lopair() bcm43xx: ASSERTION FAILED (radio_attenuation < 10) at: drivers/net/wireless/bcm43xx/bcm43xx_phy.c:1496:bcm43xx_find_lopair() bcm43xx: Chip initialized bcm43xx: 32-bit DMA initialized bcm43xx: Keys cleared bcm43xx: Selected 802.11 core (phytype 2) bcm43xx: ASSERTION FAILED (radio_attenuation < 10) at: drivers/net/wireless/bcm43xx/bcm43xx_phy.c:1496:bcm43xx_find_lopair() ADDRCONF(NETDEV_UP): eth1: link is not ready bcm43xx: set security called, .level = 0, .enabled = 0, .encrypt = 0 bcm43xx: set security called, .level = 0, .enabled = 0, .encrypt = 0 bcm43xx: set security called, .level = 0, .enabled = 0, .encrypt = 0 bcm43xx: set security called, .level = 0, .enabled = 0, .encrypt = 0 printk: 18 messages suppressed. SoftMAC: Open Authentication completed with 00:13:10:2f:98:3e ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready bcm43xx: set security called, .active_key = 0, .level = 2, .enabled = 1, .encrypt = 1 bcm43xx: set security called, .enabled = 1, .encrypt = 1 TKIP: replay detected: STA=00:13:10:2f:98:3e previous TSC 000000000001 received TSC 000000000001 TKIP: replay detected: STA=00:13:10:2f:98:3e previous TSC 000000000001 received TSC 000000000001 TKIP: replay detected: STA=00:13:10:2f:98:3e previous TSC 000000000001 received TSC 000000000001 _______________________________________________ Bcm43xx-dev mailing list [email protected] https://lists.berlios.de/mailman/listinfo/bcm43xx-dev
