Это старая версия документа!
pxa270
com: 38400 8N1
0x00000000 : "Bootloader" 0x00020000 : "Kernel" 0x00160000 : "Filesystem" в новой версии: 0x00000000: "Bootloader" 0x00020000: "Kernel" 0x002A0000: "Filesystem"
SocketCAN: No buffer space available
В соответствии с рекомендациями из первой, добавь в can_init.sh строчку: echo 1000 > /sys/class/net/can0/tx_queue_len
system em5 port com1-38400 time any
port com1-38400 type direct device /dev/ttyS1 speed 38400 hardflow false
setenv bootdelay 3 setenv baudrate 38400 setenv ethaddr 00:0d:15:00:72:b4 setenv filesize 140000 или 3МБ setenv filesize 3145728 setenv fileaddr A1000000 setenv netmask 255.255.0.0 setenv ipaddr 10.163.2.121 setenv serverip 10.163.2.126 setenv nfspath /home/user/nfsroot setenv hostname pandapc01 setenv bootargs_nfs root=/dev/nfs rw nfsroot=\$(serverip):\$(nfspath),rsize=1024,wsize=1024 ip=\$(ipaddr):::\$(netmask):\$(hostname) debug console=ttyS0,\$(baudrate) nfsrootdebug setenv bootcmd_nfs tftpboot zImage\\;wtags\\;go setenv bootcmd_flash cp.b 20000 \$(fileaddr) \$(filesize)\\;wtags\\;go setenv bootargs_flash root=/dev/mtdblock2 rootfstype=jffs2 console=ttyS0,38400 printenv saveenv
Интерфейс с ip $(ipaddr) должен быть eth0, иначе будет останавливаться с ошибкой:
nfs: server <$(ipaddr)> not responding, still trying
Boot image zImage from 10.163.2.126 via tftp.
setenv serverip 10.163.2.126 tftpboot zImage wtags go
Flash kernel image.
tftpboot zImage erase 1:4-13 или erase 1:4-27 cp.b $(fileaddr) 20000 $(filesize) reset
Flash filesystem image.
tftpboot rootfs.arm.jffs2 # По неведомой причине (особенности jffs?) стирать нужно до конца. erase 1:14- cp.b $(fileaddr) 160000 $(filesize) или erase 1:28- cp.b $(fileaddr) 320000 $(filesize) reset
Network crashes when trying to transfer large file from rootfs (mtd device) to nfs-mounted folder. When trying dd /dev/zero the same way, all seems to be fine.
WARNING: at net/sched/sch_generic.c:219 () NETDEV WATCHDOG: eth0 (dm9000): transmit timed out Modules linked in: Function entered at [<c01f168c>] from [<c0031178>] Function entered at [<c0031120>] from [<c018f7f8>] r3:c3889000 r2:c0219e14 r7:00000014 r6:00000001 r5:c3889000 r4:c0264b88 Function entered at [<c018f678>] from [<c003b310>] Function entered at [<c003b174>] from [<c0036a14>] Function entered at [<c00369b0>] from [<c0036ac4>] Function entered at [<c0036a7c>] from [<c001b048>] Function entered at [<c001b000>] from [<c001b898>] Exception stack(0xc0233f48 to 0xc0233f90) 3f40: 00000001 c384a940 00000000 60000013 c001ce0c c0232000 3f60: c001ce0c c024af28 a001705c 69054117 a0017028 c0233f9c c0233fa0 c0233f90 3f80: c001ce50 c001ce5c 60000013 ffffffff r6:04000000 r5:c0233f7c r4:ffffffff Function entered at [<c001ce0c>] from [<c001cdd8>] Function entered at [<c001cd9c>] from [<c01f00bc>] r7:c0235bac r6:c0018da8 r5:c024aef0 r4:c0232000 Function entered at [<c01f004c>] from [<c000896c>] r4:c025f17c Function entered at [<c0008718>] from [<a0008034>] r6:c00191ac r5:c024af8c r4:0000397d ---[ end trace bb1fd0722dd5fe86 ]--- eth0: link down