On Fri, Jul 31, 2015 at 03:20:40PM -0700, Bart Van Assche wrote: > On 07/30/2015 04:22 PM, Jason Gunthorpe wrote: > >All patches are compile tested. I've done basic testing up to and including > >the IPoIB patch, the rest required specialized setups I don't have access to, > >but are fairly straightforward. > > Hello Jason, > > SRP login fails with this patch series applied on top of Linux kernel > v4.2-rc4. At the target side the following message appears every time the > SRP initiator tries to log in: "ib_srpt: RDMA t 5 for idx 0 failed with > status 10" (10=remote access error). That causes the initiator to receive a > flush error (5).
Sounds like a bad rkey was sent to the target? I'm guessing #9 is the cause? I'm guessing that target->rkey is being used someplace even though register_always is set? Doug, in this case, I'd just drop the impacted SRP patches.. Hopefully just #9... Jason -- To unsubscribe from this list: send the line "unsubscribe linux-rdma" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html