[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <20170516.145308.1101082394249977339.davem@davemloft.net>
Date: Tue, 16 May 2017 14:53:08 -0400 (EDT)
From: David Miller <davem@...emloft.net>
To: ubraun@...ux.vnet.ibm.com
Cc: hch@....de, netdev@...r.kernel.org, linux-rdma@...r.kernel.org,
linux-s390@...r.kernel.org, jwi@...ux.vnet.ibm.com,
schwidefsky@...ibm.com, heiko.carstens@...ibm.com,
raspl@...ux.vnet.ibm.com
Subject: Re: [PATCH V3 net 1/1] smc: switch to usage of
IB_PD_UNSAFE_GLOBAL_RKEY
From: Ursula Braun <ubraun@...ux.vnet.ibm.com>
Date: Mon, 15 May 2017 17:33:37 +0200
> Currently, SMC enables remote access to physical memory when a user
> has successfully configured and established an SMC-connection until ten
> minutes after the last SMC connection is closed. Because this is considered
> a security risk, drivers are supposed to use IB_PD_UNSAFE_GLOBAL_RKEY in
> such a case.
>
> This patch changes the current SMC code to use IB_PD_UNSAFE_GLOBAL_RKEY.
> This improves user awareness, but does not remove the security risk itself.
>
> Signed-off-by: Ursula Braun <ubraun@...ux.vnet.ibm.com>
Applied.
Powered by blists - more mailing lists