From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from metis.extern.pengutronix.de (metis.extern.pengutronix.de [83.236.181.26]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (Client did not present a certificate) by ozlabs.org (Postfix) with ESMTP id 9040BDDDEB for ; Mon, 1 Oct 2007 18:35:35 +1000 (EST) From: Juergen Beisert To: linuxppc-embedded@ozlabs.org Date: Mon, 1 Oct 2007 10:35:23 +0200 References: <20070810095153.GC13994@moe.telargo.com> <200709281707.45030.jbe@pengutronix.de> <9e4733910709280838v5deebfdbo62b9097faed9c937@mail.gmail.com> In-Reply-To: <9e4733910709280838v5deebfdbo62b9097faed9c937@mail.gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Message-Id: <200710011035.24068.jbe@pengutronix.de> Subject: Re: [RFC PATCH v0.1] net driver: mpc52xx fec List-Id: Linux on Embedded PowerPC Developers Mail List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , On Friday 28 September 2007 17:38, Jon Smirl wrote: > On 9/28/07, Juergen Beisert wrote: > > But I can't run it a second time, as the network on target's side doesn= 't > > respond. Any idea? > > Do the stress tests complete on a non-rt kernel? I tried it again: 1) Target runs 2.6.23-rc8 without rt-preempt: @host$ nmap 192.168.23.226 Starting Nmap 4.20 ( http://insecure.org ) at 2007-10-01 10:20 CEST Interesting ports on 192.168.23.226: Not shown: 1695 closed ports PORT STATE SERVICE 22/tcp open ssh 23/tcp open telnet Nmap finished: 1 IP address (1 host up) scanned in 0.581 seconds Target continues to work. Does not make a difference if the root filesystem= is=20 jffs2 or nfs. 2) Same target runs 2.6.23-rc8-rt1 @host$ nmap 192.168.23.226 Starting Nmap 4.20 ( http://insecure.org ) at 2007-10-01 10:15 CEST Interesting ports on 192.168.23.226: Not shown: 871 filtered ports, 824 closed ports PORT STATE SERVICE 22/tcp open ssh 23/tcp open telnet Nmap finished: 1 IP address (1 host up) scanned in 14.116 seconds Network on target dies. But can be reactivated by an "ifconfig eth0 down;=20 ifconfig eth0 up". I included some printk statements into the fec.c source = to=20 see what interrupts are happen. "r" means fec_rx_interrupt was entered, "t" means fec_tx_interrupt was ente= red=20 and "p" means fec_interrupt was entered. This is the output of the=20 nmap "attack" above: rtrtrrr at this point: fec_hard_start_xmit, stop queue rrt at this point: fec_tx_interrupt, wake queue ttrr at this point: fec_hard_start_xmit, stop queue rrt at this point: fec_tx_interrupt, wake queue ttrr at this point: fec_hard_start_xmit, stop queue rrt at this point: fec_tx_interrupt, wake queue ttrr at this point: fec_hard_start_xmit, stop queue rrt at this point: fec_tx_interrupt, wake queue ttrr at this point: fec_hard_start_xmit, stop queue rrt at this point: fec_tx_interrupt, wake queue ttrr at this point: fec_hard_start_xmit, stop queue rrt at this point: fec_tx_interrupt, wake queue ttr at this point: fec_hard_start_xmit, stop queue rrt at this point: fec_tx_interrupt, wake queue at this point: fec_hard_start_xmit, stop queue t at this point: fec_tx_interrupt, wake queue tp <7>net eth0: ievent: 08020000 =2E..at this point the network is dead. BTW: Without rt-preempt none of the wake/stop queue events and no=20 fec_interrupt occurs. I only see a long list of "r"s and "t"s... Juergen =2D-=20 Dipl.-Ing. Juergen Beisert | http://www.pengutronix.de =A0Pengutronix - Linux Solutions for Science and Industry =A0 Handelsregister: Amtsgericht Hildesheim, HRA 2686 =A0 =A0 =A0 Vertretung Sued/Muenchen, Germany Phone: +49-8766-939 228 | Fax: +49-5121-206917-9