Package: opa-basic-tools This is caused by 0600 permissions on /dev/infiniband/umad0. See example below.
One item to consider... opaportconfig allows a user to take the port up and down. In principle, this activity should require root privilege. Giving go+rw access to umad0 will allow non-privileged administration of the OPA port. Perhaps the solution is to add an opareport group, sgid the reports and apply 0660 perms on umad0? I'm not sure how well that idea would sit with security folks. Incidentally, the IFS installer does ask a question about allowing nonprivileged access to umad. bsmith@opa10:~$ ls -l /dev/infiniband/umad0 crw------- 1 root root 231, 0 Jun 14 17:31 /dev/infiniband/umad0 bsmith@opa10:~$ sudo chmod a+rw /dev/infiniband/umad0 bsmith@opa10:~$ /usr/sbin/opafabricinfo Fabric 0:0 Information: SM: opa4 hfi1_0 Guid: 0x0011750101675b33 State: Master Number of HFIs: 5 Number of Switches: 1 Number of Links: 5 Number of HFI Links: 5 (Internal: 0 External: 5) Number of ISLs: 0 (Internal: 0 External: 0) Number of Degraded Links: 0 (HFI Links: 0 ISLs: 0) Number of Omitted Links: 0 (HFI Links: 0 ISLs: 0) ------------------------------------------------------------------------------- bsmith@opa10:~$ -- Brian T. Smith System Fabric Works Senior Technical Staff bsm...@systemfabricworks.com GPG Key: B3C2C7B73BA3CD7F