[openib-general] executing the SRQ pingpong example

Dotan Barak dotanb at mellanox.co.il
Sun Sep 18 23:51:26 PDT 2005


svn rev.: 3470
kernel: 2.6.9-5.EL (AS4)
HCA: Mellanox HCA 25204

here is the command line: 
/usr/local/bin/ibv_srq_pingpong --port=19872 --ib-dev=mthca0 --ib-port=1
--num-qp=255 

backtrace: 
Sep 19 09:37:48 swlab153 kernel: Unable to handle kernel NULL pointer
dereference at 0000000000000030 RIP: 
Sep 19 09:37:48 swlab153 kernel: <ffffffffa0168a90>{:ib_mthca:get_wqe+48} 
Sep 19 09:37:48 swlab153 kernel: PML4 143fe3067 PGD 13fe4d067 PMD 0 
Sep 19 09:37:48 swlab153 kernel: Oops: 0000 [1] SMP 
Sep 19 09:37:48 swlab153 kernel: CPU 0 
Sep 19 09:37:48 swlab153 kernel: Modules linked in: ib_ipoib(U) ib_sa(U)
ib_uverbs(U) ib_umad(U) ib_mthca(U) ib_mad(U) ib_core(U) nfsd expor 
tfs md5 ipv6 parport_pc lp parport autofs4 i2c_dev i2c_core nfs lockd
mst_pciconf(U) mst_pci(U) sunrpc ds yenta_socket pcmcia_core dm_mod bu 
tton battery ac uhci_hcd ehci_hcd hw_random e1000 floppy ext3 jbd ata_piix
libata aic79xx sd_mod scsi_mod 
Sep 19 09:37:48 swlab153 kernel: Pid: 1659, comm: ibv_srq_pingpon Not
tainted 2.6.9-5.ELsmp 
Sep 19 09:37:48 swlab153 kernel: RIP: 0010:[<ffffffffa0168a90>]
<ffffffffa0168a90>{:ib_mthca:get_wqe+48} 
Sep 19 09:37:48 swlab153 kernel: RSP: 0018:0000010142e41da0 EFLAGS: 00010206

Sep 19 09:37:48 swlab153 kernel: RAX: 0000000000000030 RBX: 000001015c8fa7d8
RCX: 0000000000000005 
Sep 19 09:37:48 swlab153 kernel: RDX: 0000000000000fe0 RSI: 00000000000001ff
RDI: 0000000000000000 
Sep 19 09:37:48 swlab153 kernel: RBP: 000001015c556580 R08: 0000000000000000
R09: 0000000000000002 
Sep 19 09:37:48 swlab153 kernel: R10: 0000000000000000 R11: 0000000000000002
R12: 000001015c8fa000 
Sep 19 09:37:48 swlab153 kernel: R13: 000001015f5d28c0 R14: 000001015b157400
R15: 0000010142e41e48 
Sep 19 09:37:48 swlab153 kernel: FS: 0000002a95674fe0(0000)
GS:ffffffff804bf300(0000) knlGS:0000000000000000 
Sep 19 09:37:48 swlab153 kernel: CS: 0010 DS: 0000 ES: 0000 CR0:
000000008005003b 
Sep 19 09:37:48 swlab153 kernel: CR2: 0000000000000030 CR3: 0000000000101000
CR4: 00000000000006e0 
Sep 19 09:37:48 swlab153 kernel: Process ibv_srq_pingpon (pid: 1659,
threadinfo 0000010142e40000, task 0000010140c96030) 
Sep 19 09:37:48 swlab153 kernel: Stack: ffffffffa01690d3 0000000000518000
0000000000518000 0000000000000000 
Sep 19 09:37:48 swlab153 kernel: 000001015c556580 000001015b157400
000001015b15f6c0 0000010142e41e68 
Sep 19 09:37:48 swlab153 kernel: ffffffffa0166668 00007ffe0c002400 
Sep 19 09:37:48 swlab153 kernel: Call
Trace:<ffffffffa01690d3>{:ib_mthca:mthca_alloc_srq+1545} 
Sep 19 09:37:48 swlab153 kernel:
<ffffffffa0166668>{:ib_mthca:mthca_create_srq+185} 
Sep 19 09:37:48 swlab153 kernel:
<ffffffffa00ebf0c>{:ib_uverbs:ib_uverbs_create_srq+349} 
Sep 19 09:37:48 swlab153 kernel:
<ffffffffa00e952c>{:ib_uverbs:ib_uverbs_srq_event_handler+0} 
Sep 19 09:37:48 swlab153 kernel:
<ffffffffa00e96da>{:ib_uverbs:ib_uverbs_write+139} 
Sep 19 09:37:48 swlab153 kernel: <ffffffff80172088>{vfs_write+207}
<ffffffff80172170>{sys_write+69} 
Sep 19 09:37:48 swlab153 kernel: <ffffffff8010ffd2>{system_call+126} 
Sep 19 09:37:48 swlab153 kernel: 
Sep 19 09:37:48 swlab153 kernel: Code: 48 03 14 38 48 89 d0 c3 53 48 89 f3
44 8b 4e 70 8b 43 48 48 
Sep 19 09:37:48 swlab153 kernel: RIP
<ffffffffa0168a90>{:ib_mthca:get_wqe+48} RSP <0000010142e41da0> 
Sep 19 09:37:48 swlab153 kernel: CR2: 0000000000000030 

did anyone see this oops too?

Dotan Barak
Software Verification Engineer
Mellanox Technologies LTD
Tel: +972-4-9097200 Ext: 231 Fax: +972-4-9593245
P.O. Box 86 Yokneam 20692 ISRAEL.
Home: +972-77-8841095  Cell: 052-4222383

[ May the fork be with you ]

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openfabrics.org/pipermail/general/attachments/20050919/27619229/attachment.html>


More information about the general mailing list