Re: [PATCH v2 00/12] IB: Replace safe uses for ib_get_dma_mr with pd->local_dma_lkey

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 07/31/2015 03:32 PM, Jason Gunthorpe wrote:
On Fri, Jul 31, 2015 at 03:20:40PM -0700, Bart Van Assche wrote:
On 07/30/2015 04:22 PM, Jason Gunthorpe wrote:
All patches are compile tested. I've done basic testing up to and including
the IPoIB patch, the rest required specialized setups I don't have access to,
but are fairly straightforward.

Hello Jason,

SRP login fails with this patch series applied on top of Linux kernel
v4.2-rc4. At the target side the following message appears every time the
SRP initiator tries to log in: "ib_srpt: RDMA t 5 for idx 0 failed with
status 10" (10=remote access error). That causes the initiator to receive a
flush error (5).

Sounds like a bad rkey was sent to the target? I'm guessing #9 is the
cause? I'm guessing that target->rkey is being used someplace even though
register_always is set?

Doug, in this case, I'd just drop the impacted SRP patches.. Hopefully
just #9...

Hello Jason,

With only patches 1/12 and 8/12 applied my test passes.

Bart.

--
To unsubscribe from this list: send the line "unsubscribe linux-rdma" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Photo]     [Yosemite News]     [Yosemite Photos]     [Linux Kernel]     [Linux SCSI]     [XFree86]
  Powered by Linux