Difference between revisions of "Linux and interrupt latency (Axel)"

From DAVE Developer's Wiki
Jump to: navigation, search
(Created page with "{{InfoBoxTop}} {{AppliesToAxel}} {{AppliesToAxelLite}} {{AppliesToAxelEsatta}} {{InfoBoxBottom}}")
 
(Introduction)
 
(10 intermediate revisions by the same user not shown)
Line 4: Line 4:
 
{{AppliesToAxelEsatta}}
 
{{AppliesToAxelEsatta}}
 
{{InfoBoxBottom}}
 
{{InfoBoxBottom}}
 +
__FORCETOC__
 +
==Introduction==
 +
As known, Linux is not a real-time operating system and, as such, it can't guarantee that [https://en.wikipedia.org/wiki/Interrupt_latency interrupt latency] can be upper bounded by a determined value.
 +
 +
When developing applications based on embedded platforms, this can cause unacceptable behaviors. For this reason system integrators have to be aware of this issue and, if necessary, have to implement specific strategies to prevent or limit it.
 +
 +
Numerous solutions exist (see for example [1], [2], and [3]), however, an exhaustive discussion of these is beyond the scope of this document. Some practical considerations are illustrated instead, which are based on real-world cases involving Axel platforms and [[Axel_Embedded_Linux_Kit_(XELK)|XELK]].
 +
 +
[1] [[Application_Notes_(Axel)#AN-XELK-001:_Asymmetric_Multiprocessing_.28AMP.29_on_Axel_.E2.80.93_Linux_.2B_FreeRTOS]]
 +
 +
[2] [[BRX-WP001:_Real-timeness,_system_integrity_and_TrustZone®_technology_on_AMP_configuration]]
 +
 +
[3] https://rt.wiki.kernel.org/index.php/Main_Page, http://elinux.org/CPU_Shielding_capability
 +
 +
==Disabling interrupts at kernel level==
 +
A lot of device drivers exist in the kernel space. Many of them need to temporarily disable interrupts to implement specific hardware-related operations. During the interrupt-disabled time windows, any peripheral could issue an interrupt request anyway. If this happens, associated interrupt service routine execution is delayed until (at least) interrupts are enabled again. As a consequence, when this particular condition happens, interrupt latency is greater than the average one. It is virtually impossible to estimate the upper bound because exploring all the possible execution paths at kernel level is not feasible. Generally speaking, maximum interrupt latency can be even orders of magnitude greater that the average one.
 +
===A real-word case: UART RX FIFO overrun===
 +
[[Power_management_(Axel)#Interrupt_latency|This case]] is a typical example that is pretty hard to analyze because a lot of variables are involved and therefore it is extremely difficult to isolate cause-effect relationships. In other words, with the help of software-based tools only, it is not easy to find out which are the drivers that cause the UART RX interrupt latency to explode. Advanced debugging tools providing tracing capabilities such as [https://www.lauterbach.com/ Lauterbach TRACE32/PowerDebug] are extremely useful to perform such investigations.
 +
 +
DAVE Embedded Systems' R&D team carried out such an analysis on a systems powered by the Axel Lite SoM. In this specific case, Lauterbach tools allowed our team to find out that the SD controller driver affects interrupt latency dramatically. This is due to 1ms delay that is implemented in the driver and that is issued after disabling the interrupts. In the system under investigation, the physical SD card interface is not provided with the card detect signal. Thus, the 1ms interval with disabled interrupt occurs on a regular basis because the polling mechanism used to detect the presence of the card. Consequently, the odds of a RX FIFO interrupt triggered in the middle of such delay are relatively high, causing the overrun issue.

Latest revision as of 07:24, 25 June 2021

Info Box
Axel-04.png Applies to Axel Ultra
Axel-lite 02.png Applies to Axel Lite
Axel-02.png Applies to AXEL ESATTA

Introduction[edit | edit source]

As known, Linux is not a real-time operating system and, as such, it can't guarantee that interrupt latency can be upper bounded by a determined value.

When developing applications based on embedded platforms, this can cause unacceptable behaviors. For this reason system integrators have to be aware of this issue and, if necessary, have to implement specific strategies to prevent or limit it.

Numerous solutions exist (see for example [1], [2], and [3]), however, an exhaustive discussion of these is beyond the scope of this document. Some practical considerations are illustrated instead, which are based on real-world cases involving Axel platforms and XELK.

[1] Application_Notes_(Axel)#AN-XELK-001:_Asymmetric_Multiprocessing_.28AMP.29_on_Axel_.E2.80.93_Linux_.2B_FreeRTOS

[2] BRX-WP001:_Real-timeness,_system_integrity_and_TrustZone®_technology_on_AMP_configuration

[3] https://rt.wiki.kernel.org/index.php/Main_Page, http://elinux.org/CPU_Shielding_capability

Disabling interrupts at kernel level[edit | edit source]

A lot of device drivers exist in the kernel space. Many of them need to temporarily disable interrupts to implement specific hardware-related operations. During the interrupt-disabled time windows, any peripheral could issue an interrupt request anyway. If this happens, associated interrupt service routine execution is delayed until (at least) interrupts are enabled again. As a consequence, when this particular condition happens, interrupt latency is greater than the average one. It is virtually impossible to estimate the upper bound because exploring all the possible execution paths at kernel level is not feasible. Generally speaking, maximum interrupt latency can be even orders of magnitude greater that the average one.

A real-word case: UART RX FIFO overrun[edit | edit source]

This case is a typical example that is pretty hard to analyze because a lot of variables are involved and therefore it is extremely difficult to isolate cause-effect relationships. In other words, with the help of software-based tools only, it is not easy to find out which are the drivers that cause the UART RX interrupt latency to explode. Advanced debugging tools providing tracing capabilities such as Lauterbach TRACE32/PowerDebug are extremely useful to perform such investigations.

DAVE Embedded Systems' R&D team carried out such an analysis on a systems powered by the Axel Lite SoM. In this specific case, Lauterbach tools allowed our team to find out that the SD controller driver affects interrupt latency dramatically. This is due to 1ms delay that is implemented in the driver and that is issued after disabling the interrupts. In the system under investigation, the physical SD card interface is not provided with the card detect signal. Thus, the 1ms interval with disabled interrupt occurs on a regular basis because the polling mechanism used to detect the presence of the card. Consequently, the odds of a RX FIFO interrupt triggered in the middle of such delay are relatively high, causing the overrun issue.