-
Notifications
You must be signed in to change notification settings - Fork 418
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SHM: respect user namespace in SHM reachable #4225
SHM: respect user namespace in SHM reachable #4225
Conversation
- in case if EP/IFACES have different namespace id then do not allow to connect such clients
Test PASSed. |
can we still connect different namespaces, just by not using procfs link? |
not sure, will investigate |
Test PASSed. |
Test PASSed. |
@hoopoepg isn't this blocking all shared memory transports? |
I tested master using UCX_TLS=shm,cma - it works |
how does it work if this PR makes shared memory unreachable? what am i missing? |
there fix is add namespace id to address guid, same namespaces have same ID & it doesn't affect to processes from same namespace, but blocks CMA on different namespaces (but not fail on start) |
Test PASSed. |
Mellanox CI: PASSED on 29 workers (click for details)Note: the logs will be deleted after 02-Oct-2019
|
Mellanox CI: ABORTED on 1 workers (click for details)Note: the logs will be deleted after 15-Nov-2019
|
Was this superseded by some other PR? |
yes |
Thanks Sergey! 😄 |
do not allow to connect such clients