Package: opa-basic-tools

This is caused by 0600 permissions on /dev/infiniband/umad0. See example below.

One item to consider... opaportconfig allows a user to take the port
up and down. In principle, this activity should require root
privilege. Giving go+rw access to umad0 will allow non-privileged
administration of the OPA port.

Perhaps the solution is to add an opareport group, sgid the reports
and apply 0660 perms on umad0? I'm not sure how well that idea would
sit with security folks.

Incidentally, the IFS installer does ask a question about allowing
nonprivileged access to umad.

bsmith@opa10:~$ ls -l /dev/infiniband/umad0
crw------- 1 root root 231, 0 Jun 14 17:31 /dev/infiniband/umad0
bsmith@opa10:~$ sudo chmod a+rw /dev/infiniband/umad0
bsmith@opa10:~$ /usr/sbin/opafabricinfo
Fabric 0:0 Information:
SM: opa4 hfi1_0 Guid: 0x0011750101675b33 State: Master
Number of HFIs: 5
Number of Switches: 1
Number of Links: 5
Number of HFI Links: 5              (Internal: 0   External: 5)
Number of ISLs: 0                   (Internal: 0   External: 0)
Number of Degraded Links: 0         (HFI Links: 0   ISLs: 0)
Number of Omitted Links: 0          (HFI Links: 0   ISLs: 0)
-------------------------------------------------------------------------------
bsmith@opa10:~$



-- 
Brian T. Smith
System Fabric Works
Senior Technical Staff
bsm...@systemfabricworks.com
GPG Key: B3C2C7B73BA3CD7F

Reply via email to