Larry Finger <[EMAIL PROTECTED]> writes:
> I have just put a new patch for 2.6.20.2 at
> ftp://lwfinger.dynalias.org/patches/combined-2.6.20.2.patch. This patch has
> some important fixes for
> 4318 users.
This looks suspicious:
+ if (phy->connected) {
+ tmp = bcm43xx_phy_read(bcm, 0x0400) & 0xFF;
+ if (tmp == 3 || tmp < 6) {
This is the same as (tmp < 6).
+ bcm43xx_phy_write(bcm, 0x04C2, 0x1816);
+ bcm43xx_phy_write(bcm, 0x04C3, 0x8006);
+ }
+ if (tmp < 6) {
The original has the (effective) condition (tmp < 6 && tmp != 3).
+ bcm43xx_phy_write(bcm, 0x04CC,
+ (bcm43xx_phy_read(bcm, 0x04CC)
+ & 0x00FF) | 0x1F00);
}
Andreas.
--
Andreas Schwab, SuSE Labs, [EMAIL PROTECTED]
SuSE Linux Products GmbH, Maxfeldstraße 5, 90409 Nürnberg, Germany
PGP key fingerprint = 58CA 54C7 6D53 942B 1756 01D3 44D5 214B 8276 4ED5
"And now for something completely different."
_______________________________________________
Bcm43xx-dev mailing list
[email protected]
https://lists.berlios.de/mailman/listinfo/bcm43xx-dev