Interestingly enough, x-surftest works perfectly and gives no hits in the debug log.
I checked if DEBUGLEV=1 and the debug version of the device printed text on the serial port and it did, but only AmigaOS3.9 at first. When I added the edebugflag logkprintf in MorphOS the debug output also started working there.
This is the result when onlineing the interface (including the hit which gets interleaved in the text):
Code:
PPC_ColdBoot 604e Init done Stack 0xfff03ff0 MSR 0x00003070 PVR 0x00000009 HID0 0xc000c084 HID1 0x80000000 MMCR0 0x00000000
DevInit()...
Found X-Surf-100-Card. Unit=0x00000000
InitETHERUnit()...
Unit=0x00000000
InitETHERUNIT()...ende
OpenDev-Flags:0x00000000
HAL_Constructor()
HAL_ReadConfig Unit=0x00000000
config: Auto Duplex
config: Auto Speed
config: Auto MDIX
config: Negotiation Auto
config: FlowControl Off
ProbeNovell()...
Speichertest ok!
Adresse auslesen...
Probing ok!
MII setup: Auto MDIX
MII location: 0x00000013
MII value write: 0x00000021
MII location: 0x00000013
MII value read: 0x00000021
HAL_InitInterrupt()
HAL_InitInterrupt end.ende
SANA2_CTB-Tag found...
SANA2_CFB-Tag found...
*DeviceQuery
*GetStationAddress
*ConfigInterface
*Online...
HAL_Online()
spinlock_irq_save=0x00000001
ed_init()...
New MCAST hash filter:0x00000000
0x00000000
0x00000000
0x00000000
0x00000000
0x00000000
0x00000000
0x00000000
spinlock_irq_restore=0x00000001
*DevCmdReadPacket
PacketTyp = 0x00000800
*DevCmdReadPacket
PacketTyp = 0x00000800
*DevCmdReadPacket
PacketTyp = 0x00000800
*DevCmdReadPacket
PacketTyp = 0x00000800
*DevCmdReadPacket
PacketTyp = 0x00000800
*DevCmdReadPacket
PacketTyp = 0x00000800
*DevCmdReadPacket
PacketTyp = 0x00000800
*DevCmdReadPacket
PacketTyp = 0x00000800
*DevCmdReadPacket
PacketTyp = 0x00000800
*DevCmdReadPacket
PacketTyp = 0x00000800
*DevCmdReadPacket
PacketTyp = 0x00000800
*DevCmdReadPacket
PacketTyp = 0x00000800
*DevCmdReadPacket
PacketTyp = 0x00000800
*DevCmdReadPacket
PacketTyp = 0x00000800
*DevCmdReadPacket
PacketTyp = 0x00000800
*DevCmdReadPacket
PacketTyp = 0x00000800
*DevCmdReadPacket
PacketTyp = 0x00000800
*DevCmdReadPacket
PacketTyp = 0x00000800
*DevCmdReadPacket
PacketTyp = 0x00000800
*DevCmdReadPacket
PacketTyp = 0x00000800
*DevCmdReadPacket
PacketTyp = 0x00000800
*DevCmdReadPacket
PacketTyp = 0x00000800
*DevCmdReadPacket
PacketTyp = 0x00000800
*DevCmdReadPacket
PacketTyp = 0x00000800
*DevCmdReadPacket
PacketTyp = 0x00000800
*DevCmdReadPacket
PacketTyp = 0x00000800
*DevCmdReadPacket
PacketTyp = 0x00000800
*DevCmdReadPacket
PacketTyp = 0x00000800
*DevCmdReadPacket
PacketTyp = 0x00000800
*DevCmdReadPacket
PacketTyp = 0x00000800
*DevCmdReadPacket
PacketTyp = 0x00000800
*DevCmdReadPacket
PacketTyp = 0x00000800
*DevCmdReadPacket
PacketTyp = 0x00000806
*DevCmdReadPacket
PacketTyp = 0x00000806
*DevCmdReadPacket
PacketTyp = 0x00000806
*DevCmdReadPacket
PacketTyp = 0x00000806
*CMD_WRITE
H--------------------------------------------
ASM_Exception: DAR 0xdfefff DSISR 0x42000000
ASM_Exception: IntGPR1 0x80004f60 SRR0 0x11206170 SRR1 0xf070 LR 0x11007190
ASM_Exception: Type 0x3
ASM_Exception: Thread 0x800fa740 Name Interrupt SOFTINT
ASM_Exception: DAR 0xdfefff DSISR 0x42000000
------------------------------------------------------------------------------
ExceptionThread: Exception Thread 0x800fa740 <Interrupt SOFTINT>
ExceptionThread: Type 0x3 <Data Access>
ExceptionThread: Illegal Data Access at 0x00dfefff DSISR 0x42000000 <Write Access to a not existing Page>
PC(SRR0) 0x11206170 MSR(SRR1) 0x0000f070
CR 20000c00 XER 00000000 LR 11007190 CTR 11206160
General Register Dump:
GPR[0] 00000000 100158a0 10015920 00004410 00000004 00000004 1100873c 11008748
GPR[8] 110084c0 00000000 00002000 ab000000 0000f070 086124fc 0000211b 11328724
GPR[16] 0000009d 00000004 00000000 00000000 00000000 00000000 00000000 00000000
GPR[24] 00dfefff 086124f0 08ab4369 00000000 086124f0 10015f84 08000c44 10015954
FPSCR 00000000
FPECR 00000000
FPR[0] 0x0000000000000000 0x0000000000000000 0x0000000000000000 0x0000000000000000
FPR[4] 0x0000000000000000 0x0000000000000000 0x0000000000000000 0x0000000000000000
FPR[8] 0x0000000000000000 0x0000000000000000 0x0000000000000000 0x0000000000000000
FPR[12] 0x0000000000000000 0x0000000000000000 0x0000000000000000 0x0000000000000000
FPR[16] 0x0000000000000000 0x0000000000000000 0x0000000000000000 0x0000000000000000
FPR[20] 0x0000000000000000 0x0000000000000000 0x0000000000000000 0x0000000000000000
FPR[24] 0x0000000000000000 0x0000000000000000 0x0000000000000000 0x0000000000000000
FPR[28] 0x0000000000000000 0x0000000000000000 0x0000000000000000 0x0000000000000000
Special Register Dump:
IABR 00000000 DABR 00000000
OS Register Dump:
SysCall_SRR0 1011e6a8 SysCall_SRR1 0000f070 SysCall_GPR2 10015a88 SysCall_LR 101006ec SysCall_CR 10117f04
------------------------------------------------------------------------------
*CMD_WRITE
*AddMulticast
ISR: x-surf-card interrupt detect... unit=0x00000000
ISR:RTL8019 interrupt detect! ISR=0x00000001
ISR:ending...
If I after this try accessing something on the network, like pinging another host, it will say the following a couple of times for each attempt:
Code:
*CMD_WRITE
TransmitterInt noch eingetragen...!
*CMD_WRITE
TransmitterInt noch eingetragen...!
*CMD_WRITE
TransmitterInt noch eingetragen...!
*CMD_WRITE
TransmitterInt noch eingetragen...!
*CMD_WRITE
TransmitterInt noch eingetragen...!
Which I interpret as it cannot find its transmit interrupt or something?
Compared the output when the hit happens with the output when running AmigaOS3.9 and this is what it was about to print (of course with other addresses):
Code:
HAL_SendNextPacket()...
spinlock_irq_save=0x00000001
spinlock_irq_restore=0x00000001
ios2 from =0x08a1c38c
ios2 to =0x08001dac
ios2 len =0x0000001c
sending normal Packet...
len for NIC is 0x0000003c
Using TX-Buffer at addr 0x00004000
TermIO:ReplyMsg : cmd=0x00000003
xmit() start transmitting TX-Buf 0x00000000
spinlock_irq_save=0x00000001
spinlock_irq_restore=0x00000001
[ Edited by patrik 10.12.2015 - 21:26 ]