[ofa-general] ipath oops
Robert Walsh
rjwalsh at pathscale.com
Fri Mar 30 10:18:07 PDT 2007
> Stack traceback for pid 3191
> 0xffff81007755c100 3191 19 1 3 R 0xffff81007755c3c0 *ib_cm/3
> rsp rip Function (args)
> 0xffff81007c0839d8 0xffffffff803513d2 __iowrite32_copy+0x2
> 0xffff81007c083a08 0xffffffff88066161 [ib_ipath]ipath_verbs_send+0x10b
> 0xffff81007c083a68 0xffffffff88061205 [ib_ipath]ipath_do_ruc_send+0x707
> 0xffff81007c083af8 0xffffffff88061619 [ib_ipath]ipath_post_ruc_send+0x1fd
> 0xffff81007c083b58 0xffffffff88065c39 [ib_ipath]ipath_post_send+0x70
> 0xffff81007c083b88 0xffffffff88284685 [ko2iblnd]kiblnd_check_sends+0x5c0
This looks a lot like an OOPs we saw recently in SDP. Are you using
dma_map_single or related functions? If so, is the memory you're
mapping going through the ib_dma_* interface? On Mellanox hardware,
these are all just pass-throughs to the real dma_map_* functions, but on
ipath hardware we intercept the calls to set up mapping tables. Without
this, we won't work.
Look in rdma/ib_verbs.h to see the list of functions that are
intercepted. Search or ib_dma and ib_sg.
Let me know what you see.
Regards,
Robert.
More information about the general
mailing list