"\t\t\t\tp_key_violations........0x%X\n"
"\t\t\t\tq_key_violations........0x%X\n"
"\t\t\t\tguid_cap................0x%X\n"
+ "\t\t\t\tclient_reregister.......0x%X\n"
"\t\t\t\tsubnet_timeout..........0x%X\n"
"\t\t\t\tresp_time_value.........0x%X\n"
"\t\t\t\terror_threshold.........0x%X\n"
cl_ntoh16( p_pi->p_key_violations ),
cl_ntoh16( p_pi->q_key_violations ),
p_pi->guid_cap,
+ ib_port_info_get_client_rereg( p_pi ),
ib_port_info_get_timeout(p_pi),
p_pi->resp_time_value,
p_pi->error_threshold
{
osm_log( p_rcv->p_log, OSM_LOG_VERBOSE,
"__osm_pi_rcv_process_endport: "
- "Setting endport minimal rate to:%u defiend by port:0x%"
+ "Setting endport minimal rate to:%u defined by port:0x%"
PRIx64 ".\n",
rate,
cl_ntoh64( port_guid ) );
/*
Check the state of the physical port.
If there appears to be something on the other end of the wire,
- then ask for NodeInfo. Ignore the switch managment port.
+ then ask for NodeInfo. Ignore the switch management port.
*/
port_num = osm_physp_get_port_num( p_physp );
/* if in_sweep_hop_0 is TRUE, then this means the SM in on the switch,