lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:   Mon, 28 Jan 2019 18:25:10 +0100
From:   Martin Kepplinger <martink@...teo.de>
To:     Greg KH <gregkh@...uxfoundation.org>
Cc:     jslaby@...e.com, linux-kernel@...r.kernel.org,
        Manfred Schlaegl <manfred.schlaegl@...zinger.com>,
        Martin Kepplinger <martin.kepplinger@...zinger.com>
Subject: Re: [PATCH] tty: increase the default flip buffer limit to 2*640K

Am 28.01.2019 17:53 schrieb Greg KH:
> On Mon, Jan 28, 2019 at 05:38:43PM +0100, Martin Kepplinger wrote:
>> From: Manfred Schlaegl <manfred.schlaegl@...zinger.com>
>> 
>> The default value for this was 64K. We increase this by a factor of
>> 10 to 640K to prevent data loss when using fast serial interfaces.
> 
> What fast serial interface are you using where you run into this limit?

RS485 without flow-control. At speeds of 1Mbit/s an upwards we've run
into problems such as applications being too slow to read out this 
buffer
(on embedded devices based on imx53 or imx6).

If you want to write transmitted data to a slow SD card and thus have
realtime requirements, this limit can become a problem.

That shouldn't be the case and 640K buffers fix such problems for us.

> 
>> Since this value is only a maximum limit for allocation and isn't used
>> by default, this change has minimal effect on systems with slow 
>> interfaces.
> 
> So what systems does it affect?

This was misleading, sorry. This has no effect on systems that currently
run fine I _think_. If transmission is slow enough, applications and 
hardware
can keep up and increasing this limit won't have any effect.

It only _allows_ to allocate more than 2*64K in cases we currently fail 
to
allocate anything despite having memory available.

> 
>> Signed-off-by: Manfred Schlaegl <manfred.schlaegl@...zinger.com>
>> Signed-off-by: Martin Kepplinger <martin.kepplinger@...zinger.com>
>> ---
>> 
>> Is there any reason for this _limit_ to be as small as 64K?
> 
> Historical mostly from what I can tell.
> 
> thanks,

thanks for having a look,

                                 martin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ