QQ登录

只需一步,快速开始

 找回密码
 注册

QQ登录

只需一步,快速开始

查看: 1011|回复: 2

为什么USB在2.4.*kernel上有很多问题

[复制链接]
发表于 2005-10-20 14:55:07 | 显示全部楼层 |阅读模式
为什么USB在2.4.*kernel上有很多问题,在2.6.*kernel上问题比较少?
2.6.*kernel做了哪些改进???
哪边有相关资料可以看的?

谢谢解答
发表于 2005-10-22 22:56:52 | 显示全部楼层
Which HW platform?
To 2410 or other 32 embedded CPU, maybe efforts have been done when intergrating these CPUs to kernel.
回复

使用道具 举报

 楼主| 发表于 2005-10-24 16:51:06 | 显示全部楼层
CPU: ixp425
video encode chip:vw2010
USB HC: NEC

1.USB and vw2010 are the same IRQ :program encode fail.
2.USB and vw2010 are different IRQ:sysetm crash, there are different behave with different video bit rate.

01m log:

capture_thread() accumulated 148897792 bytes 142.00 MBytes
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++Unable to handle kernel NULL pointer dereference at virtual address 00000064
mm = c7edf520 pgd = c6ba4000
*pgd = 0715a001, *pmd = 0715a001, *pte = 00000000, *ppte = 00000000
Internal error: Oops: ffffffff
CPU: 0
pc : [<c013c5ec>]    lr : [<c013eb1c>]    Not tainted
sp : c662bd9c  ip : c662bdc0  fp : c662bdbc
r10: 002ee000  r9 : ffffffff  r8 : c662be74
r7 : 00000000  r6 : c41d5400  r5 : c662be74  r4 : 00000000
r3 : 00000003  r2 : 20000013  r1 : c662be74  r0 : c41d5400
Flags: nzCv  IRQs on  FIQs on  Mode SVC_32  Segment user
Control: 39FF  Table: 06BA4000  DAC: 00000015
Process encoder (pid: 637, stack limit = 0xc662a3a0)
Stack: (0xc662bd9c to 0xc662c000)
bd80:                                                                c41d5400
bda0: c662be74 c026b438 c662be74 c662be74 c662bdd4 c662bdc0 c013eb1c c013c5bc
bdc0: 00000020 c41d5400 c662bdfc c662bdd8 c013ecf4 c013eaec 00010b29 0000802c
bde0: c41d5464 00000001 00000017 c662be74 c662be14 c662be00 c013a33c c013ebd0
be00: c41677c0 04000000 c662be34 c662be18 c001de18 c013a318 c0261118 c41677c0
be20: 00000017 c0260aa0 c662be58 c662be38 c001defc c001ddd4 c02685c0 c662be74
be40: 00000008 c01d59c4 20000013 c662be70 c662be5c c001e078 c001de4c c662bea8
be60: c662bebc c662bf38 c662be74 c001d140 c001e054 c6143524 4087953c 00000008
be80: 47002116 f42ed692 7e8ff48d 464001bb c410b79c c6143000 c6a7fa40 002ee000
bea0: c662bf38 00000a74 c662bebc c00419bc c01d59c4 20000013 ffffffff c6143000
bec0: 00001000 c022c8e0 00000000 08d00000 c410b79c c00419bc c662bf14 c662bf2c
bee0: 00001000 c41bbc3c 00000000 00001000 00000000 00511000 c6a7fae8 c7d91be0
bf00: 40879008 c7d91bc0 00000000 0000008d c6a7faac c7d91bc0 ffffffea 087ef000
bf20: 007ff000 c662a000 40368008 c662bf4c c662bf3c c0041ccc c00414f8 c6a7fa40
bf40: c662bf64 c662bf50 c008feac c0041c90 c7d91be0 c7d91bc0 c662bf74 c662bf68
bf60: c008fe90 c008fea0 c662bfa4 c662bf78 c004cb20 c008fe78 c003938c c003952c
bf80: bf5ff9e0 00800000 00001000 00000004 c001d624 40035774 00000000 c662bfa8
bfa0: c001d460 c004ca58 bf5ff9e0 c001e054 00000006 40368008 007ff000 00000001
bfc0: bf5ff9e0 00800000 00001000 00063dd0 0000d90c 00008003 40035774 bf5ffb28
bfe0: 00000000 bf5ff984 4002b820 4002b834 60000010 00000006 cc33cc33 cc33cc33
Backtrace:
Function entered at [<c013c5b0>] from [<c013eb1c>]
r8 = C662BE74  r7 = C662BE74  r6 = C026B438  r5 = C662BE74
r4 = C41D5400
Function entered at [<c013eae0>] from [<c013ecf4>]
r5 = C41D5400  r4 = 00000020
Function entered at [<c013ebc4>] from [<c013a33c>]
r7 = C662BE74  r6 = 00000017  r5 = 00000001  r4 = C41D5464
Function entered at [<c013a30c>] from [<c001de18>]
r5 = 04000000  r4 = C41677C0
Function entered at [<c001ddc8>] from [<c001defc>]
r7 = C0260AA0  r6 = 00000017  r5 = C41677C0  r4 = C0261118
Function entered at [<c001de40>] from [<c001e078>]
r8 = 20000013  r7 = C01D59C4  r6 = 00000008  r5 = C662BE74
r4 = C02685C0
Function entered at [<c001e048>] from [<c001d140>]
r5 = C662BEBC  r4 = C662BEA8
Function entered at [<c00414ec>] from [<c0041ccc>]
Function entered at [<c0041c84>] from [<c008feac>]
r4 = C6A7FA40
Function entered at [<c008fe94>] from [<c008fe90>]
r5 = C7D91BC0  r4 = C7D91BE0
Function entered at [<c008fe6c>] from [<c004cb20>]
Function entered at [<c004ca4c>] from [<c001d460>]
Code: e5803148 e121f002 e3a03003 e3a04000 (e5c73064)
Kernel panic: Aiee, killing interrupt handler!
In interrupt handler - not syncing

06m log:

capture_thread() accumulated 14696448 bytes 14.02 MBytes
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
capture_thread() accumulated 16785408 bytes 16.01 MBytes
ehci_hcd 00:01.2: fatal error
kernel BUG at hcd/ehci-mem.c:129!
Unable to handle kernel NULL pointer dereference at virtual address 00000000
mm = c0229380 pgd = c0004000
*pgd = 00000000, *pmd = 00000000
Internal error: Oops: ffffffff
CPU: 0
pc : [<c0022590>]    lr : [<c002b6bc>]    Not tainted
sp : c41c7ec0  ip : c41c7e8c  fp : c41c7ed0
r10: c41c6374  r9 : c41c7fbc  r8 : c41c6364
r7 : c41c6000  r6 : 00000000  r5 : c41d5400  r4 : 00000000
r3 : 00000000  r2 : 00000001  r1 : 00000001  r0 : 00000001
Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  Segment kernel
Control: 39FF  Table: 067F8000  DAC: 0000001D
Process keventd (pid: 2, stack limit = 0xc41c63a0)
Stack: (0xc41c7ec0 to 0xc41c8000)
7ec0: ca8a0000 c41c7ee8 c41c7ed4 c013b14c c002255c c41d5400 c026b438 c41c7f00
7ee0: c41c7eec c013b198 c013b0f4 c41d5400 c026b438 c41c7f70 c41c7f04 c013ea14
7f00: c013b188 c41c7f10 c001feac c0027edc c699f320 00003e84 00000000 caae3274
7f20: caa12ed0 caa085d4 c41c7f3c 000000ff 00000003 80000013 ffffffff 00000000
7f40: c41c7f4c 00000000 caa06bd8 00000000 00000000 20000093 c41c7f84 c41c7f84
7f60: c0019510 c41c7f80 c41c7f74 c0139bb4 c013e948 c41c7fa0 c41c7f84 c0030084
7f80: c0139ba8 c41d5498 c41d5498 c022aa60 00000001 c41c7ff4 c41c7fa4 c0037f84
7fa0: c003001c 00000063 00000001 00000000 00000000 00010000 00000000 00000000
7fc0: c41c6000 00000000 00000000 00000000 c41d2000 c028347c c02613d8 c0229610
7fe0: 690541f1 00018af4 00000000 c41c7ff8 c001ecb4 c0037e4c 33cc33cc 33cc33cc
Backtrace:
Function entered at [<c0022550>] from [<c013b14c>]
r4 = CA8A0000

I wonder there aren't only USB problem but also PCI capability.
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 注册

本版积分规则

GMT+8, 2024-11-3 02:19 , Processed in 0.086789 second(s), 16 queries .

© 2021 Powered by Discuz! X3.5.

快速回复 返回顶部 返回列表