[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20170516065138.24789-1-leon@kernel.org>
Date: Tue, 16 May 2017 09:51:38 +0300
From: Leon Romanovsky <leon@...nel.org>
To: davem@...emloft.net
Cc: ubraun@...ux.vnet.ibm.com, netdev@...r.kernel.org,
iinux-rdma@...r.kernel.org, Christoph Hellwig <hch@....de>
Subject: [PATCH net v1] net/smc: Add warning about remote memory exposure
From: Christoph Hellwig <hch@....de>
The driver explicitly bypasses APIs to register all memory once a
connection is made, and thus allows remote access to memory.
Signed-off-by: Christoph Hellwig <hch@....de>
Signed-off-by: Leon Romanovsky <leon@...nel.org>
---
Dave,
Can you please forward this patch to stable?
Thanks
---
Changes from v0:
* Remove BROKEN Kconfig option as a followup of this discussion
https://patchwork.ozlabs.org/patch/760454/
* Refine commit message
---
net/smc/Kconfig | 4 ++++
1 file changed, 4 insertions(+)
diff --git a/net/smc/Kconfig b/net/smc/Kconfig
index c717ef0896aa..33954852f3f8 100644
--- a/net/smc/Kconfig
+++ b/net/smc/Kconfig
@@ -8,6 +8,10 @@ config SMC
The Linux implementation of the SMC-R solution is designed as
a separate socket family SMC.
+ Warning: SMC will expose all memory for remote reads and writes
+ once a connection is established. Don't enable this option except
+ for tightly controlled lab environment.
+
Select this option if you want to run SMC socket applications
config SMC_DIAG
--
2.12.2
Powered by blists - more mailing lists