Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Disabling put_scalar when disable-ofi-inject is used #1110

Merged
merged 2 commits into from
Feb 16, 2024

Conversation

wrrobin
Copy link
Collaborator

@wrrobin wrrobin commented Feb 13, 2024

No description provided.

Trial check; will revert

Minimal change for put_scalar to disable fi_inject

Minor
@wrrobin wrrobin changed the title Using put_nb for iput when OFI inject is disabled Disabling put_scalar when disable-ofi-inject is used Feb 14, 2024
Copy link
Member

@davidozog davidozog left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks like a good patch. IIUC, the only substantial change here is the #ifndef DISABLE_OFI_INJECT change in put_scalar. All other diffs are from reordering existing routines?

@davidozog
Copy link
Member

@wrrobin - We can ignore the UCX over pmi-mpi failure, I'm removing it in #1106. Do you think we should add at least one test with --disable-ofi-inject here?

@wrrobin
Copy link
Collaborator Author

wrrobin commented Feb 14, 2024

Thanks @davidozog. You are right about the diffs. I will add a test in CI. We can merge this after #1106 is merged.

@davidozog
Copy link
Member

This looks good to merge when ready @wrrobin

@wrrobin
Copy link
Collaborator Author

wrrobin commented Feb 16, 2024

@davidozog - Yes, this is good to go. One thing I should mention, we are not disabling OFI atomic inject with the same config flag. We might need to do this, but I am thinking to create a separate PR for that with a new flag option -disable-ofi-atomic-inject. Thoughts?

@davidozog
Copy link
Member

davidozog commented Feb 16, 2024

@davidozog - Yes, this is good to go. One thing I should mention, we are not disabling OFI atomic inject with the same config flag. We might need to do this, but I am thinking to create a separate PR for that with a new flag option -disable-ofi-atomic-inject. Thoughts?

That makes sense to me, thanks for the note.

It's slightly unfortunately the DISABLE_OFI_INJECT macro is outside/above the transport_ofi layer, but I do think this is the simplest way to do it. Do you think it's possible to keep it within the transport layer? Something to think about when adding "disable-ofi-atomic-inject".

It's not the first time we've done something similar to this though - see here:
https://github.com/Sandia-OpenSHMEM/SOS/blob/v1.5.2/src/init.c#L206

@wrrobin
Copy link
Collaborator Author

wrrobin commented Feb 16, 2024

Yeah.. I thought about it too. And, initially, I made changes only on the transport layer for a particular function, but it requires more changes.
If it is ok, lets move forward with this. I am keeping a issue created for this and will handle separately.

@wrrobin wrrobin merged commit 7dd4488 into Sandia-OpenSHMEM:main Feb 16, 2024
36 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants