From: Denis Vlasenko <vda@ilport.com.ua>
To: karim@opersys.com, linux-kernel <linux-kernel@vger.kernel.org>
Cc: Kristian Benoit <kbenoit@opersys.com>
Subject: Re: Spurious parport interrupts (IRQ 7) / rt benchmarking
Date: Thu, 16 Jun 2005 09:48:42 +0300 [thread overview]
Message-ID: <200506160948.42880.vda@ilport.com.ua> (raw)
In-Reply-To: <42B09CB3.4030101@opersys.com>
On Thursday 16 June 2005 00:25, Karim Yaghmour wrote:
>
> This is related to our continued benchmarking of the rt stuff.
>
> Using the same setup we described earlier, we're now getting
> some really odd behavior on rc6. Basically, our target system
> is getting more interrupts than our logger is sending to it.
>
> [ recap: our target and logger are rigged via the parallel
> port. The logger toggles an output pin on the parallel pin
> which, in turn, generates an interrupt on the target. Our
> driver on the target catches the interrupt and then toggles
> an output pin on the target's parallel port. This, in turn,
> generates an interrupt on the logger. The difference between
> the time the interrupt was sent by the logger and the time
> the interrupt is received from the target on the logger is
> what we measure as the interrupt response time. ]
>
> Under ping flood conditions with vanilla Linux, and in that
> case only, rc6 gets more interrupts than the logger sends
> to it. We've double checked this by not sending any ints
> from the logger whatsoever, and ping flooding the rc6 on
> the target, and the moment we do that our driver on the
> target starts responding to phantom interrupts.
>
> It must be noted that when we did these tests on rc4 we didn't
> have such spurious interrupts. Also, we don't get these when
> PREEMPT_RT is applied to rc6 (all of which under ping flood
> conditions.)
>
> We've tried to find a pattern in the spuriousness, but there
> really isn't any.
>
> We've spent quite some time tracking this down, hence the
> delayed publication of new numbers.
>
> Any insight anyone may have on this issue would be greatly
> appreciated.
IIRC specs of old AT PIC say that if input interrupt pins
are no longer asserted by the time when CPU asserts IRQ and tries
to read IRQ# from PIC, PIC returns 7. Thus you get IRQ7 or IRQ15
depending on where that happened, on primary or secondary PIC.
Presumably there can be 'bad' devices which momentarily flash
their IRQ, confusing PIC.
However, I am a bit surprized how often these IRQ7s happen.
Maybe APIC's PIC emulation just reuses this convention to
indicate APIC errors in PIC emulation mode. I am not familiar
with APIC, tho... I did not yet read APIC docs.
--
vda
next prev parent reply other threads:[~2005-06-16 6:49 UTC|newest]
Thread overview: 4+ messages / expand[flat|nested] mbox.gz Atom feed top
2005-06-15 21:25 Spurious parport interrupts (IRQ 7) / rt benchmarking Karim Yaghmour
2005-06-16 6:48 ` Denis Vlasenko [this message]
2005-06-16 14:49 ` Kristian Benoit
2005-06-16 15:46 ` Maciej W. Rozycki
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=200506160948.42880.vda@ilport.com.ua \
--to=vda@ilport.com.ua \
--cc=karim@opersys.com \
--cc=kbenoit@opersys.com \
--cc=linux-kernel@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox