Hello,

I have a 4318 as well and until now (2.6.18), the device would not start up 
reliably. I always had to remove/insert the kernel module and to ifconfig 
up/down several times.
Larry, I just tried your combined patch set from the last post and now the 
network comes up every time! :) 

In the kernel msgs, I still find the ASSERTION (radio_attenuation < 10); is 
there a fix for that as well?

And I get loads of the "TKIP: replay detected..." messages as well.

Anyway, I can dump the ndiswrapper now. Thank you all for your great work!

Kind regards,
Christian Hoffmann

BTW: Is it possible to do such a comined patch against official kernel more 
regularly? It's quite difficult to follow all the patches that are send on 
this mailing list.

BTW2: my dmesg output

bcm43xx: Chip ID 0x4318, rev 0x2
bcm43xx: Number of cores: 4
bcm43xx: Core 0: ID 0x800, rev 0xd, vendor 0x4243, enabled
bcm43xx: Core 1: ID 0x812, rev 0x9, vendor 0x4243, enabled
bcm43xx: Core 2: ID 0x804, rev 0xc, vendor 0x4243, enabled
bcm43xx: Core 3: ID 0x80d, rev 0x7, vendor 0x4243, enabled
bcm43xx: PHY connected
bcm43xx: Detected PHY: Version: 3, Type 2, Revision 7
bcm43xx: Detected Radio: ID: 8205017f (Manuf: 17f Ver: 2050 Rev: 8)
bcm43xx: Radio turned off
bcm43xx: Radio turned off
bcm43xx: PHY connected
bcm43xx: Microcode rev 0x123, pl 0x21 (2005-01-22  19:48:06)
bcm43xx: Radio turned on
bcm43xx: ASSERTION FAILED (radio_attenuation < 10) at: 
drivers/net/wireless/bcm43xx/bcm43xx_phy.c:1496:bcm43xx_find_lopair()
bcm43xx: ASSERTION FAILED (radio_attenuation < 10) at: 
drivers/net/wireless/bcm43xx/bcm43xx_phy.c:1496:bcm43xx_find_lopair()
bcm43xx: ASSERTION FAILED (radio_attenuation < 10) at: 
drivers/net/wireless/bcm43xx/bcm43xx_phy.c:1496:bcm43xx_find_lopair()
bcm43xx: Chip initialized
bcm43xx: 32-bit DMA initialized
bcm43xx: Keys cleared
bcm43xx: Selected 802.11 core (phytype 2)
bcm43xx: ASSERTION FAILED (radio_attenuation < 10) at: 
drivers/net/wireless/bcm43xx/bcm43xx_phy.c:1496:bcm43xx_find_lopair()
ADDRCONF(NETDEV_UP): eth1: link is not ready
bcm43xx: set security called, .level = 0, .enabled = 0, .encrypt = 0
bcm43xx: set security called, .level = 0, .enabled = 0, .encrypt = 0
bcm43xx: set security called, .level = 0, .enabled = 0, .encrypt = 0
bcm43xx: set security called, .level = 0, .enabled = 0, .encrypt = 0
printk: 18 messages suppressed.
SoftMAC: Open Authentication completed with 00:13:10:2f:98:3e
ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
bcm43xx: set security called, .active_key = 0, .level = 2, .enabled = 
1, .encrypt = 1
bcm43xx: set security called, .enabled = 1, .encrypt = 1
TKIP: replay detected: STA=00:13:10:2f:98:3e previous TSC 000000000001 
received TSC 000000000001
TKIP: replay detected: STA=00:13:10:2f:98:3e previous TSC 000000000001 
received TSC 000000000001
TKIP: replay detected: STA=00:13:10:2f:98:3e previous TSC 000000000001 
received TSC 000000000001
_______________________________________________
Bcm43xx-dev mailing list
[email protected]
https://lists.berlios.de/mailman/listinfo/bcm43xx-dev

Reply via email to