WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-ia64-devel

RE: [Xen-ia64-devel] eepro100 HVM NIC


>
>   Good.  It looks like the graphics issue is related to the
>e100 nic.
>If I remove it, the corruption goes away.  The corruption starts
>roughly
>when I used to see the "bad mpa" messages before the namespace
>fix, so
>it seems like the windows e100 driver is somehow interfering
>with VGA.
>BTW, it seems like a bad idea to me that we're exporting the
>range
>0xC0000-0xDFFFF as system RAM.  This is typically VGA ROM space.
>Should
>this perhaps be reserved memory?  Thanks,
>
>       Alex
>--
>Alex Williamson                             HP Open Source & Linux
>Org.
Maybe I lost something. But why here is 0xC0000-0xDFFFF? I think
your patch marks 0xC0000000 ~ 0xDFFFFFFF as system memory is pretty right for 
MMIO space. 

With your patch, I didn't see any graphic issue, it works fine 
on my box. Now I can successful install sample driver of WDK in my windows 
guest(pls see attachment). Unfortunately, after send some packets out, dom0 
crash and output below info(sometimes it lead to a windows blue screen). I am 
still
on the way  :(


skb_under_panic: text:a000000100a2e6a0 len:14 put:14 head:e00
0000010d33980 data:e000000010d33974 tail:e000000010d33982 end:e000000010d33a00 d
ev:vif1.06.18-xen on an ia64
kernel BUG at /home/build/nightly/linux-2.6.18-xen.hg/net/core/skbuff.c:111!
qemu-dm[5656]: bugcheck! 0 [1]
Modules linked in: dm_multipath

Pid: 5656, CPU 0, comm:              qemu-dm
psr : 0000101008526010 ifs : 800000000000030e ip  : [<a000000100948d30>]    Tain
ted: GF
ip is at skb_under_panic+0xd0/0xe0
unat: 0000000000000000 pfs : 400000000000030e rsc : 0000000000000007
rnat: 0000000000000000 bsps: a000000101146090 pr  : 00000000056aa999
ldrs: 0000000000000000 ccv : 0000000000000000 fpsr: 0009804c8a70033f
csd : 0000000000000000 ssd : 0000000000000000
b0  : a000000100948d30 b6  : a0000001006b0240 b7  : 0000000000000000
f6  : 000000000000000000000 f7  : 000000000000000000000
f8  : 000000000000000000000 f9  : 000000000000000000000
f10 : 000000000000000000000 f11 : 000000000000000000000
r1  : a000000101146090 r2  : a000000100d8f8c0 r3  : a000000100f463a8
r8  : 0000000000000050 r9  : 0000000000004164 r10 : a000000100f6d988
r11 : a000000100f6d998 r12 : e00000001271fd90 r13 : e000000012718000
r14 : 0000000000000000 r15 : fffffffffff00001 r16 : fffffffffff04c18
r17 : 0000000000000000 r18 : 0000000000000001 r19 : 0000000000000000
r20 : 0000000000000000 r21 : a00000010006c590 r22 : 0000000000000000
r23 : a000000100f6c680 r24 : 0000000000000000 r25 : 0000000000000000
r26 : 400000000000030c r27 : 0000000000000000 r28 : a000000100068040
r29 : 00001411085a6010 r30 : 0000000000000000 r31 : a000000100f6d980

Call Trace:
 [<a00000010001bb10>] show_stack+0x50/0xa0
                                sp=e00000001271f900 bsp=e000000012719750
 [<a00000010001c3e0>] show_regs+0x820/0x840
                                sp=e00000001271fad0 bsp=e000000012719708
 [<a0000001000427d0>] die+0x1d0/0x380
                                sp=e00000001271fad0 bsp=e0000000127196c0
 [<a0000001000429c0>] die_if_kernel+0x40/0x60
                                sp=e00000001271faf0 bsp=e000000012719690
 [<a000000100042c20>] ia64_bad_break+0x240/0x480
                                sp=e00000001271faf0 bsp=e000000012719668
 [<a000000100068ae0>] xen_leave_kernel+0x0/0x3e0
                                sp=e00000001271fbc0 bsp=e000000012719668
 [<a000000100948d30>] skb_under_panic+0xd0/0xe0
                                sp=e00000001271fd90 bsp=e0000000127195f0
 [<a000000100a2e6c0>] br_dev_queue_push_xmit+0x420/0x460
                                sp=e00000001271fda0 bsp=e0000000127195b0
 [<a000000100a2e7c0>] br_forward_finish+0xc0/0xe0
                                sp=e00000001271fda0 bsp=e000000012719590
 [<a000000100a2ea20>] __br_forward+0x120/0x140
                                sp=e00000001271fdb0 bsp=e000000012719568
 [<a000000100a2ed40>] br_flood+0x180/0x2c0
                                sp=e00000001271fdc0 bsp=e000000012719520
 [<a000000100a2ef10>] br_flood_forward+0x30/0x60
                                sp=e00000001271fdc0 bsp=e0000000127194f0
 [<a000000100a308a0>] br_handle_frame_finish+0x260/0x2a0
                                sp=e00000001271fdc0 bsp=e0000000127194b0
 [<a000000100a30df0>] br_handle_frame+0x470/0x4c0
                                sp=e00000001271fdc0 bsp=e000000012719478
 [<a00000010095a1c0>] netif_receive_skb+0x7e0/0xb20
                                sp=e00000001271fdd0 bsp=e000

Attachment: eepro100.JPG
Description: eepro100.JPG

_______________________________________________
Xen-ia64-devel mailing list
Xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-ia64-devel