On Sun, Nov 13, 2005 at 09:41:37AM -0800, Sam Leffler wrote: > Disable protection or nuke the code in ath_tx_start that updates CTS > when bursting. The latter is what I've done in my tree and in the next > hal rev the api is removed. There's no protection since yesterday. I was trying to understand if it was WPA's fault, but apparently not: # ifconfig ath0 ath0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500 inet6 fe80::213:46ff:fe61:6697%ath0 prefixlen 64 scopeid 0x3 inet 192.168.99.10 netmask 0xffffff00 broadcast 192.168.99.255 ether 00:13:46:61:66:97 media: IEEE 802.11 Wireless Ethernet autoselect (OFDM/54Mbps) status: associated ssid SATNET channel 11 bssid 00:0f:b5:9b:3a:a5 authmode OPEN privacy OFF txpowmax 36 protmode CTS bintval 100 FWIW, i've also tried with your patches to ath and net80211 and the new hal found on http://people.freebsd.org/~sam/ with no success. If it helps, I can try recompiling with those patches applied and obtain the backtrace. Thanks in advance, Dario -- Dario Freni (saturnero_at_freesbie.org) FreeSBIE developer (http://www.freesbie.org) GPG Public key at http://www.saturnero.net/saturnero.asc
This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:38:47 UTC