[palinux-palo] bug#31: [parisc-linux-cvs] Hack for palo with >= 2G RAM


X-PA-RISC Linux-PR-Message: report 31
X-PA-RISC Linux-PR-Package: palo
X-Loop: daniel_frazier@hp.com
Received: via spool by 31-bugs@bugs.parisc-linux.org id=B31.98220453327571
          (code B ref 31); Thu, 15 Feb 2001 02:48:01 GMT
Message-Id: <200102150238.SAA11941@milano.cup.hp.com>
X-Authentication-Warning: milano.cup.hp.com: grundler@localhost [] didn't use HELO protocol
To: bame@riverrock.org
Cc: parisc-linux-cvs@parisc-linux.org, 31@bugs.parisc-linux.org
In-reply-to: Your message of "Wed, 14 Feb 2001 14:44:11 PST."
Date: Wed, 14 Feb 2001 18:37:55 -0800
From: Grant Grundler <grundler@cup.hp.com>

bame@riverrock.org wrote:
> When palo's stack and heap got moved up to the top of the first memory
> module, things went wrong for machines with >= 2G ram.  The culprit
> appears to be sign extension into the upper half of the double-word
> registers.

read "double-word registers" == PA2.0 CPU.
I only saw this on A500. ie PAT PDC.
Did this also occur on C3K/J5K/C200 type boxes as well?
(Just curious and perhaps good for the record as well)


Grant Grundler
parisc-linux {PCI|IOMMU|SMP} hacker