It's Memorial Day weekend in the U.S.n you may not get a lot of answers today.  
And... You may get better results asking on the Linux390 list.

Mike Walter
Hewitt Associates


----- Original Message -----
From: "Martin, Terry R. (CMS/CTR) (CTR)" [EMAIL PROTECTED]
Sent: 05/26/2008 03:12 PM AST
To: [email protected]
Subject: Re: FCP using z/VM 5.3 and RedHat Linux 4.6







________________________________

From: Martin, Terry R. (CMS/CTR) (CTR)
Sent: Monday, May 26, 2008 12:33 PM
To: 'The IBM z/VM Operating System'
Subject: FCP using z/VM 5.3 and RedHat Linux 4.6



Hi All,







Has anyone run into the following error while trying to get FCP to work
between z/VM 5.3 and RedHat Linux 4.6. We are connecting to a IBM
DS8100. We present the FCP device to the Linux guest and it sees it. But
they receive the error when they try to do their thing.







[EMAIL PROTECTED] etc]# more zfcp.conf

0.0.5500 0x01 0x5005076306088385 0x00 0x4020400000000000

0.0.5700 0x02 0x5005076306188385 0x00 0x4020400000000000





Here are the lines from the /var/log/messages file from the linux guest:




e49l124d kernel: zfcp: error: Point-to-point fibrechannel configuration
detected at adapter 0.0.5500 unsupported, shutting down adapter





Thanks, Terry





The information contained in this e-mail and any accompanying documents may 
contain information that is confidential or otherwise protected from 
disclosure. If you are not the intended recipient of this message, or if this 
message has been addressed to you in error, please immediately alert the sender 
by reply e-mail and then delete this message, including any attachments. Any 
dissemination, distribution or other use of the contents of this message by 
anyone other than the intended recipient is strictly prohibited. All messages 
sent to and from this e-mail address may be monitored as permitted by 
applicable law and regulations to ensure compliance with our internal policies 
and to protect our business. E-mails are not secure and cannot be guaranteed to 
be error free as they can be intercepted, amended, lost or destroyed, or 
contain viruses. You are deemed to have accepted these risks if you communicate 
with us by e-mail. 


Reply via email to