From owner-freebsd-arm@FreeBSD.ORG Mon May 5 11:56:54 2014 Return-Path: Delivered-To: freebsd-arm@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 742FFCAC for ; Mon, 5 May 2014 11:56:54 +0000 (UTC) Received: from mail.turbocat.net (heidi.turbocat.net [88.198.202.214]) (using TLSv1.1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 2EE1014DA for ; Mon, 5 May 2014 11:56:53 +0000 (UTC) Received: from laptop015.home.selasky.org (cm-176.74.213.204.customer.telag.net [176.74.213.204]) (using TLSv1 with cipher ECDHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by mail.turbocat.net (Postfix) with ESMTPSA id 6600C1FE029; Mon, 5 May 2014 13:56:46 +0200 (CEST) Message-ID: <53677CB8.5000800@selasky.org> Date: Mon, 05 May 2014 13:57:44 +0200 From: Hans Petter Selasky User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:24.0) Gecko/20100101 Thunderbird/24.1.0 MIME-Version: 1.0 To: Johny Mattsson , freebsd-arm@freebsd.org Subject: USB isochronous traffic with Rasberry Pi [WAS: Re: USB audio device on Raspberry Pi] References: <20140425154430.GA76168@utility-01.thismonkey.com> <535A8AEA.1000100@selasky.org> <20140425204134.GA458@cicely7.cicely.de> <20140430091411.GA45015@utility-01.thismonkey.com> <5360C0A7.9010407@selasky.org> <1398867266.22079.51.camel@revolution.hippie.lan> <5362638B.1080104@selasky.org> <5363C133.2000304@selasky.org> In-Reply-To: <5363C133.2000304@selasky.org> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-arm@freebsd.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: "Porting FreeBSD to ARM processors." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 05 May 2014 11:56:54 -0000 Hi, To get USB isochronous traffic working with the DWC OTG you need this patch: http://svnweb.freebsd.org/changeset/base/265358 BTW: I see that every second or so there is a glitch. I suspect this is because someone in the kernel is calling DELAY(). Is there an easy way to figure out who is blocking the DWC OTG interrupt routine from executing? I was thinking about adding something like: if (!cold) printf("Using delay\n"); To the DELAY() function to figure out the caller. --HPS