lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20120927112911.GA25959@avionic-0098.mockup.avionic-design.de>
Date:	Thu, 27 Sep 2012 13:29:11 +0200
From:	Thierry Reding <thierry.reding@...onic-design.de>
To:	Marek Szyprowski <m.szyprowski@...sung.com>
Cc:	Michal Nazarewicz <mina86@...a86.com>, linux-kernel@...r.kernel.org
Subject: CMA broken in next-20120926

Hi Marek,

any idea why CMA might be broken in next-20120926. I see that there
haven't been any major changes to CMA itself, but there's been quite a
bit of restructuring of various memory allocation bits lately. I wasn't
able to track the problem down, though.

What I see is this during boot (with CMA_DEBUG enabled):

[    0.266904] cma: dma_alloc_from_contiguous(cma db474f80, count 64, align 6)
[    0.284469] cma: dma_alloc_from_contiguous(): memory range at c09d7000 is busy, retrying
[    0.293648] cma: dma_alloc_from_contiguous(): memory range at c09d7800 is busy, retrying
...
[    2.648619] DMA: failed to allocate 256 KiB pool for atomic coherent allocation
...
[    4.196193] WARNING: at /home/thierry.reding/src/kernel/linux-ipmp.git/arch/arm/mm/dma-mapping.c:485 __alloc_from_pool+0xdc/0x110()
[    4.207988] coherent pool not initialised!

So the pool isn't getting initialized properly because CMA can't get at
the memory. Do you have any hints as to what might be going on? If it's
any help, I started seeing this with next-20120926 and it is in today's
next as well.

Thierry

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ