On 8/14/2013 6:26 AM, Line Holen wrote:
> Signed-off-by: Line Holen <line.ho...@oracle.com>
> 
> ---
> 
> diff --git a/opensm/osm_port_info_rcv.c b/opensm/osm_port_info_rcv.c
> index 7dcd15e..961b376 100644
> --- a/opensm/osm_port_info_rcv.c
> +++ b/opensm/osm_port_info_rcv.c
> @@ -85,7 +85,7 @@ static void pi_rcv_process_endport(IN osm_sm_t * sm, IN 
> osm_physp_t * p_physp,
>       osm_madw_context_t context;
>       ib_api_status_t status;
>       ib_net64_t port_guid;
> -     uint8_t rate, mtu;
> +     uint8_t rate, mtu, mpb;
>       unsigned data_vls;
>       cl_qmap_t *p_sm_tbl;
>       osm_remote_sm_t *p_sm;
> @@ -126,6 +126,14 @@ static void pi_rcv_process_endport(IN osm_sm_t * sm, IN 
> osm_physp_t * p_physp,
>               }
>       }
>  
> +     /* Check M_Key vs M_Key protect, can we control the port ? */
> +     mpb = ib_port_info_get_mpb(p_pi);
> +     if (mpb > 0 && p_pi->m_key == 0) {
> +             OSM_LOG(sm->p_log, OSM_LOG_INFO,
> +                     "Port 0x%" PRIx64 " has unknown M_Key, protection level 
> %u\n",
> +                     cl_ntoh64(port_guid), mpb);
> +     }
> +

It looks to me like the only case here is when protect bits is 1 for
gets; all others fail. Is it more than that ?

Also, would this spam the OpenSM log ?

-- Hal

>       if (port_guid != sm->p_subn->sm_port_guid) {
>               p_sm_tbl = &sm->p_subn->sm_guid_tbl;
>               if (p_pi->capability_mask & IB_PORT_CAP_IS_SM) {
> 

--
To unsubscribe from this list: send the line "unsubscribe linux-rdma" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to