Commit ba19e166 authored by Gal Pressman's avatar Gal Pressman Committed by Jason Gunthorpe

RDMA/efa: Mask access flags with the correct optional range

The uapi value IB_UVERBS_ACCESS_OPTIONAL_RANGE shouldn't be used inside
the driver, use IB_ACCESS_OPTIONAL instead.

Fixes: 86dd738c ("RDMA/efa: Allow passing of optional access flags for MR registration")
Link: https://lore.kernel.org/r/20200129071803.40117-1-galpress@amazon.comSigned-off-by: default avatarGal Pressman <galpress@amazon.com>
Signed-off-by: default avatarJason Gunthorpe <jgg@mellanox.com>
parent b4fb4cc5
...@@ -1367,7 +1367,7 @@ struct ib_mr *efa_reg_mr(struct ib_pd *ibpd, u64 start, u64 length, ...@@ -1367,7 +1367,7 @@ struct ib_mr *efa_reg_mr(struct ib_pd *ibpd, u64 start, u64 length,
IB_ACCESS_LOCAL_WRITE | IB_ACCESS_LOCAL_WRITE |
(is_rdma_read_cap(dev) ? IB_ACCESS_REMOTE_READ : 0); (is_rdma_read_cap(dev) ? IB_ACCESS_REMOTE_READ : 0);
access_flags &= ~IB_UVERBS_ACCESS_OPTIONAL_RANGE; access_flags &= ~IB_ACCESS_OPTIONAL;
if (access_flags & ~supp_access_flags) { if (access_flags & ~supp_access_flags) {
ibdev_dbg(&dev->ibdev, ibdev_dbg(&dev->ibdev,
"Unsupported access flags[%#x], supported[%#x]\n", "Unsupported access flags[%#x], supported[%#x]\n",
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment