[openbeosnetteam] Re: Userland debugging/tests plateform progress...

  • From: David McPaul <dmcpaul@xxxxxxxxxxxxxx>
  • To: openbeosnetteam@xxxxxxxxxxxxx
  • Date: Thu, 30 Oct 2003 10:26:08 +1100

Heya,

        Ok I tried to follow all the directions you gave.

        And indeed I managed to get the net stack running (see below)

        However, when I try to configure the network card with ifconfig I 
get a seg fault

        memcpy_default
        ifioctl                 (line 104?)
        socket_ioctl            (line 973?)
        connection_runner       (userland_ipc.c line 362)

        Since the output below talks about not finding and drivers in the 
server driver directory I am assuming that the rtl8139 driver was not 
loaded or not found?

        Am I on the right track here?

// Output
HackerZone1:/boot/home/Programming/current/tests/add-ons/kernel/network
>bdb net_stack_tester
core: B_MODULE_INIT
Starting core module...
module: network/protocols/icmp
module: network/protocols/ipv4
module: network/protocols/raw
module: network/protocols/tcp
module: network/protocols/udp
B_KEEP_LOADED flag set for /boot/home/Programming/current/distro/x86.R1
/beos/system/add-ons/userland/network/protocols/udp module addon. Will 
be *never* unloaded!
        UDP Module provided by network/protocols/udp
        TCP Module provided by network/protocols/tcp
        Raw IP module provided by network/protocols/raw
        IPv4 provided by network/protocols/ipv4
        ICMP (v4) provided by network/protocols/icmp
module: network/interfaces/ethernet
I couldn't find any drivers in the server driver directory
module: network/interfaces/loopback
module: network/interfaces/ppp
Userland net stack (net_server) is running. Press <Return> to quit.
incoming connection...
command be230215 (index = 0), buffer = 0xa1019bf0, length = 0, result =
 0
opening socket, mode = 2!
command be230200 (index = 1), buffer = 0xa1015ae0, length = 0, result =
 0
open a socket... family = 2, type = 10, proto = 0
command c0306911 (index = 2), buffer = 0xa0019e80, length = 0, result =
 0
command c0306917 (index = 3), buffer = 0xa0019e80, length = 0, result =
 0
command c030697e (index = 4), buffer = 0xa0019e80, length = 0, result =
 0
command c0306911 (index = 5), buffer = 0xa1015af8, length = 0, result =
 0
command 80306910 (index = 6), buffer = 0xa1015af8, length = 0, result =
 0
command 80306919 (index = 7), buffer = 0xa0019ec0, length = 0, result =
 0
SIODIFADDR
command 8070691a (index = 8), buffer = 0xa0019e00, length = 0, result =
 0
SIOCAIFADDR
SIODIFADDR
SIOCSIFADDR
SIOCSIFNETMASK #1 (-2140116710)
loop #2 : -2140116710 [-2144311018]
command be230216 (index = 9), buffer = (nil), length = 0, result = 0
closing socket...
free cookie: 0x8001d028
incoming connection...
command be230215 (index = 0), buffer = 0xa1019bf0, length = 0, result =
 0
opening socket, mode = 2!
command be230200 (index = 1), buffer = 0xa1013ac8, length = 0, result =
 0
open a socket... family = 2, type = 10, proto = 0
command c0086924 (index = 2), buffer = 0xa1013b30, length = 0, result =
 0                                                                     
// segfault

Cheers
David


--
... Had this been an actual emergency, we would have fled in terror,
and you would not have been informed.

Other related posts: