On Thu, 2017-03-02 at 07:59 +0200, Noa Osherovich wrote: > On 3/1/2017 6:52 PM, Bart Van Assche wrote: > > > On Wed, 2017-03-01 at 16:30 +0200, Noa Osherovich wrote: > > > REGS: c0000001ce7077e0 TRAP: 0300 Not tainted (2.6.32-642.el6.ppc64) > > > > Hello Noa, > > > > I agree with Christoph and Sagi that your analysis doesn't match the upstream > > code. I think the above information means that you are using RHEL 6.8? > > Yes, as well as other older kernel, as I wrote to Christoph. We'll adapt the code. It might be good to know that I ran into a similar issue earlier today with kernel v4.10 by using the IB/CM and by destroying the QP before the CM ID. In other words, the behavior you observed is not necessarily a bug in the polling code but may also be a use-after-free of the memory that was allocated for the QP WR and/or WC buffers. With the new polling API such errors are much more serious than before because the new polling API jumps to an address retrieved from a WC entry. Bart.��.n��������+%������w��{.n�����{���fk��ܨ}���Ơz�j:+v�����w����ޙ��&�)ߡ�a����z�ޗ���ݢj��w�f