TFTP does not work with QEMU
Frank Mehnert
fm3 at os.inf.tu-dresden.de
Tue Oct 3 20:16:40 CEST 2006
On Monday 02 October 2006 21:18, Adam Lackorzynski wrote:
> Hi,
>
> On Mon Oct 02, 2006 at 16:58:18 +0200, Daniel Vandersee wrote:
> > when I try to run tftp under QEMU 0.8.2 with an emulated pcnet or
> > ne2k-pci network card I get the following error. However, tftp under
> > VMWare works just fine. Any help would be appreciated.
> >
> > Kind regards,
> > Daniel
> >
> > > names | Starting thread listening for `exit' events
> > > simplets| Configured for 30 tasks.
> > > rtc | Date:02.10.2006 Time:14:42:15
> > > io | do_args(): Disabling internal IRQ handling.
> > > tftp | NICs supported: E1000, EEPRO100, NE2000/PCI, PCNET32/PCI,
> > > RTL8139, tftp | Tulip, VIA 86C100
> > > io | PCI: Using configuration type 1
> > > io | PCI: Probing PCI hardware
> > > io | PCI: Probing PCI hardware (bus 00)
> > >
> > > KERNEL: d.3 (tcb=c0341800) killed:
> > > Unhandled trap
> > >
> > > EAX 12378000 EBX 000f0000 ECX 00000000 EDX 00009fa0
> > > ESI 00000000 EDI 01044e30 EBP 0102ff8c ESP 0102ff7c
> > > EIP 000f9f9b EFLAGS 00013206
> > > CS 001b SS 0023 DS 0023 ES 0023 FS 0023 GS 0043
> > > trap 13 (General Protection), error 00000018, from user mode
> > > (internal event regarding GDT entry no. 0x03)
>
> Please tell us what instructions are at 000f9f9b and where this is in
> the source code. bttd.3 will also help.
The instruction is most probably cli or sti. Is task 0x0d the io server?
If so try to add
task modname "l4io" allow_cli
to your roottask arguments. To Christian: We should probably force the
io server to use the direct mode only, not the BIOS.
Frank
--
## Dept. of Computer Science, Dresden University of Technology, Germany ##
## http://os.inf.tu-dresden.de/~fm3 ##
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
URL: <http://os.inf.tu-dresden.de/pipermail/l4-hackers/attachments/20061003/3914e0e5/attachment-0001.sig>
More information about the l4-hackers
mailing list