[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [Xen-ia64-devel] eepro100 HVM NIC


  • To: "Alex Williamson" <alex.williamson@xxxxxx>
  • From: "Zhang, Xing Z" <xing.z.zhang@xxxxxxxxx>
  • Date: Wed, 10 Oct 2007 19:10:16 +0800
  • Cc: xen-ia64-devel <xen-ia64-devel@xxxxxxxxxxxxxxxxxxx>
  • Delivery-date: Wed, 10 Oct 2007 04:11:13 -0700
  • List-id: Discussion of the ia64 port of Xen <xen-ia64-devel.lists.xensource.com>
  • Thread-index: AcgKwrolO8nn7niXThupBXrmGejkjQAaIqxQ
  • Thread-topic: [Xen-ia64-devel] eepro100 HVM NIC


>
>   Good.  It looks like the graphics issue is related to the
>e100 nic.
>If I remove it, the corruption goes away.  The corruption starts
>roughly
>when I used to see the "bad mpa" messages before the namespace
>fix, so
>it seems like the windows e100 driver is somehow interfering
>with VGA.
>BTW, it seems like a bad idea to me that we're exporting the
>range
>0xC0000-0xDFFFF as system RAM.  This is typically VGA ROM space.
>Should
>this perhaps be reserved memory?  Thanks,
>
>       Alex
>--
>Alex Williamson                             HP Open Source & Linux
>Org.
Maybe I lost something. But why here is 0xC0000-0xDFFFF? I think
your patch marks 0xC0000000 ~ 0xDFFFFFFF as system memory is pretty right for 
MMIO space. 

With your patch, I didn't see any graphic issue, it works fine 
on my box. Now I can successful install sample driver of WDK in my windows 
guest(pls see attachment). Unfortunately, after send some packets out, dom0 
crash and output below info(sometimes it lead to a windows blue screen). I am 
still
on the way  :(


skb_under_panic: text:a000000100a2e6a0 len:14 put:14 head:e00
0000010d33980 data:e000000010d33974 tail:e000000010d33982 end:e000000010d33a00 d
ev:vif1.06.18-xen on an ia64
kernel BUG at /home/build/nightly/linux-2.6.18-xen.hg/net/core/skbuff.c:111!
qemu-dm[5656]: bugcheck! 0 [1]
Modules linked in: dm_multipath

Pid: 5656, CPU 0, comm:              qemu-dm
psr : 0000101008526010 ifs : 800000000000030e ip  : [<a000000100948d30>]    Tain
ted: GF
ip is at skb_under_panic+0xd0/0xe0
unat: 0000000000000000 pfs : 400000000000030e rsc : 0000000000000007
rnat: 0000000000000000 bsps: a000000101146090 pr  : 00000000056aa999
ldrs: 0000000000000000 ccv : 0000000000000000 fpsr: 0009804c8a70033f
csd : 0000000000000000 ssd : 0000000000000000
b0  : a000000100948d30 b6  : a0000001006b0240 b7  : 0000000000000000
f6  : 000000000000000000000 f7  : 000000000000000000000
f8  : 000000000000000000000 f9  : 000000000000000000000
f10 : 000000000000000000000 f11 : 000000000000000000000
r1  : a000000101146090 r2  : a000000100d8f8c0 r3  : a000000100f463a8
r8  : 0000000000000050 r9  : 0000000000004164 r10 : a000000100f6d988
r11 : a000000100f6d998 r12 : e00000001271fd90 r13 : e000000012718000
r14 : 0000000000000000 r15 : fffffffffff00001 r16 : fffffffffff04c18
r17 : 0000000000000000 r18 : 0000000000000001 r19 : 0000000000000000
r20 : 0000000000000000 r21 : a00000010006c590 r22 : 0000000000000000
r23 : a000000100f6c680 r24 : 0000000000000000 r25 : 0000000000000000
r26 : 400000000000030c r27 : 0000000000000000 r28 : a000000100068040
r29 : 00001411085a6010 r30 : 0000000000000000 r31 : a000000100f6d980

Call Trace:
 [<a00000010001bb10>] show_stack+0x50/0xa0
                                sp=e00000001271f900 bsp=e000000012719750
 [<a00000010001c3e0>] show_regs+0x820/0x840
                                sp=e00000001271fad0 bsp=e000000012719708
 [<a0000001000427d0>] die+0x1d0/0x380
                                sp=e00000001271fad0 bsp=e0000000127196c0
 [<a0000001000429c0>] die_if_kernel+0x40/0x60
                                sp=e00000001271faf0 bsp=e000000012719690
 [<a000000100042c20>] ia64_bad_break+0x240/0x480
                                sp=e00000001271faf0 bsp=e000000012719668
 [<a000000100068ae0>] xen_leave_kernel+0x0/0x3e0
                                sp=e00000001271fbc0 bsp=e000000012719668
 [<a000000100948d30>] skb_under_panic+0xd0/0xe0
                                sp=e00000001271fd90 bsp=e0000000127195f0
 [<a000000100a2e6c0>] br_dev_queue_push_xmit+0x420/0x460
                                sp=e00000001271fda0 bsp=e0000000127195b0
 [<a000000100a2e7c0>] br_forward_finish+0xc0/0xe0
                                sp=e00000001271fda0 bsp=e000000012719590
 [<a000000100a2ea20>] __br_forward+0x120/0x140
                                sp=e00000001271fdb0 bsp=e000000012719568
 [<a000000100a2ed40>] br_flood+0x180/0x2c0
                                sp=e00000001271fdc0 bsp=e000000012719520
 [<a000000100a2ef10>] br_flood_forward+0x30/0x60
                                sp=e00000001271fdc0 bsp=e0000000127194f0
 [<a000000100a308a0>] br_handle_frame_finish+0x260/0x2a0
                                sp=e00000001271fdc0 bsp=e0000000127194b0
 [<a000000100a30df0>] br_handle_frame+0x470/0x4c0
                                sp=e00000001271fdc0 bsp=e000000012719478
 [<a00000010095a1c0>] netif_receive_skb+0x7e0/0xb20
                                sp=e00000001271fdd0 bsp=e000

Attachment: eepro100.JPG
Description: eepro100.JPG

_______________________________________________
Xen-ia64-devel mailing list
Xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-ia64-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.