Stack traceback for pid 3191
0xffff81007755c100     3191       19  1    3   R  0xffff81007755c3c0 *ib_cm/3
rsp                rip                Function (args)
0xffff81007c0839d8 0xffffffff803513d2 __iowrite32_copy+0x2
0xffff81007c083a08 0xffffffff88066161 [ib_ipath]ipath_verbs_send+0x10b
0xffff81007c083a68 0xffffffff88061205 [ib_ipath]ipath_do_ruc_send+0x707
0xffff81007c083af8 0xffffffff88061619 [ib_ipath]ipath_post_ruc_send+0x1fd
0xffff81007c083b58 0xffffffff88065c39 [ib_ipath]ipath_post_send+0x70
0xffff81007c083b88 0xffffffff88284685 [ko2iblnd]kiblnd_check_sends+0x5c0

This looks a lot like an OOPs we saw recently in SDP. Are you using dma_map_single or related functions? If so, is the memory you're mapping going through the ib_dma_* interface? On Mellanox hardware, these are all just pass-throughs to the real dma_map_* functions, but on ipath hardware we intercept the calls to set up mapping tables. Without this, we won't work.

Look in rdma/ib_verbs.h to see the list of functions that are intercepted. Search or ib_dma and ib_sg.

Let me know what you see.

Regards,
 Robert.
_______________________________________________
general mailing list
[email protected]
http://lists.openfabrics.org/cgi-bin/mailman/listinfo/general

To unsubscribe, please visit http://openib.org/mailman/listinfo/openib-general

Reply via email to