Stack traceback for pid 3191 0xffff81007755c100 3191 19 1 3 R 0xffff81007755c3c0 *ib_cm/3 rsp rip Function (args) 0xffff81007c0839d8 0xffffffff803513d2 __iowrite32_copy+0x2 0xffff81007c083a08 0xffffffff88066161 [ib_ipath]ipath_verbs_send+0x10b 0xffff81007c083a68 0xffffffff88061205 [ib_ipath]ipath_do_ruc_send+0x707 0xffff81007c083af8 0xffffffff88061619 [ib_ipath]ipath_post_ruc_send+0x1fd 0xffff81007c083b58 0xffffffff88065c39 [ib_ipath]ipath_post_send+0x70 0xffff81007c083b88 0xffffffff88284685 [ko2iblnd]kiblnd_check_sends+0x5c0
This looks a lot like an OOPs we saw recently in SDP. Are you using dma_map_single or related functions? If so, is the memory you're mapping going through the ib_dma_* interface? On Mellanox hardware, these are all just pass-throughs to the real dma_map_* functions, but on ipath hardware we intercept the calls to set up mapping tables. Without this, we won't work.
Look in rdma/ib_verbs.h to see the list of functions that are intercepted. Search or ib_dma and ib_sg.
Let me know what you see. Regards, Robert. _______________________________________________ general mailing list [email protected] http://lists.openfabrics.org/cgi-bin/mailman/listinfo/general To unsubscribe, please visit http://openib.org/mailman/listinfo/openib-general
