Tomoya Fujita

Results 1254 comments of Tomoya Fujita
trafficstars

@mauropasse yeah probably the overhead can be ignored mostly when the application returns the memory to the middleware. > On other topic, what it worries me is that we still...

> It would be as simple as looking for the loaned item and calling [is_sample_valid](https://fast-dds.docs.eprosima.com/en/latest/fastdds/api_reference/dds_pim/subscriber/datareader.html#_CPPv4NK8eprosima7fastdds3dds10DataReader15is_sample_validEPKvPK10SampleInfo) on the DataReader this is implementation specific API to check the sequence number for data-sharing,...

@mauropasse @MiguelCompany @Barry-Xu-2018 we had a discussion with ROS PMC meeting, currently we are going to implement this `rmw_fastrtps` specific interface as native rmw implementation API instead of RMW. we...

The current plan is to go with org template https://github.com/ros2/.github/pull/3, so i will go ahead to close this for now. if the repository specific templates are required, of course we...

@peterborkuti My apology for this decision change after all these iteration, but this sometimes happens after discussion with developers. I really appreciate you for being so responsive to apply the...

> rclpy.init(args=[], context=new_context, domain_id=5) # Create and initialize a new context with a new Domain ID and SROS2 disabled > attackNode = DoorRequestNode('door_request_node', True, new_context) # Create a new node...

@gavanderhoorn @LichenXia198 > Being able to manipulate a security context from within a corrupted/malicious process could then result in privilege escalation, which would obviously be (un)desirable (depending on who's side...

> For example, if a process has access to a file system, it can access all the security enclaves in that file system. > Therefore, if two processes share a...

> This is just an example to illustrate that the ROS2 node can switch between different permissions by itself when multiple security enclaves are available. So can you please the...