On Thu, Jun 25, 2015 at 04:29:17PM -0500, Steve Wise wrote:

> - * ib_dma_mapping_error - check a DMA addr for error
> + * rdma_mr_roles - possible roles a MR will be used for
> + *
> + * This allows a transport independent RDMA application to
> + * create MRs that are usable for all the desired roles w/o
> + * having to understand which access rights are needed.
> + */
> +enum rdma_mr_roles {
> +     RDMA_MRR_RECV                   = 1,
> +     RDMA_MRR_SEND                   = (1<<1),
> +     RDMA_MRR_READ_SOURCE            = (1<<2),
> +     RDMA_MRR_READ_SINK              = (1<<3),
> +     RDMA_MRR_WRITE_SOURCE           = (1<<4),
> +     RDMA_MRR_WRITE_SINK             = (1<<5),
> +     RDMA_MRR_ATOMIC                 = (1<<6),
> +     RDMA_MRR_MW_BIND                = (1<<7),
> +     RDMA_MRR_ZERO_BASED             = (1<<8),
> +     RDMA_MRR_ACCESS_ON_DEMAND       = (1<<9),

So we don't have this problem again, it would be best to explicitly
list exactly which ib_wc_opcode members what use a RKEY are matched to
which MMR flags

RDMA_MRR_RECV
  LOCAL: post to receive work queue
RDMA_MRR_READ_SOURCE
  LOCAL: post IB_WC_RDMA_READ to send work queue
RDMA_MRR_READ_SINK
  REMOTE: respond to IB_WC_RDMA_READ
[..]

Seems reasonable to me otherwise

Jason
--
To unsubscribe from this list: send the line "unsubscribe linux-rdma" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to