lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20071219174742.68e70c6c@dhcp-252-066.norway.atmel.com>
Date:	Wed, 19 Dec 2007 17:47:42 +0100
From:	Haavard Skinnemoen <hskinnemoen@...el.com>
To:	"Remy Bohmer" <linux@...mer.net>
Cc:	"Andrew Victor" <linux@...im.org.za>,
	linux-arm-kernel@...ts.arm.linux.org.uk,
	"Russell King" <linux@....linux.org.uk>,
	linux-kernel@...r.kernel.org, kernel@...32linux.org
Subject: Re: [PATCH v2 0/6] atmel_serial: Cleanups, irq handler splitup &
 DMA

On Wed, 19 Dec 2007 17:40:44 +0100
"Remy Bohmer" <linux@...mer.net> wrote:

> But... I tried that patch, and it works a lot better, no oopses
> anymore,

Good :)

> but I noticed that I sometimes get an input overrun (ttyS0: 1
> input overrun(s) ) during stress conditions.
> This is something I did not notice before, maybe it was already there,
> or has something changed in this area that it is now more sensitive
> for this?

Hmm...is this with or without DMA?

If it's with DMA, perhaps we should increase the size of the RX buffer
to compensate for moving the DMA RX code into tasklet context?

If it's without DMA, something very strange is going on -- the non-DMA
RX code is almost the only thing left in the hardirq handler, so I
would really expect overruns to be much less likely to occur now than
before...

Haavard
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ