summaryrefslogtreecommitdiff
path: root/net/smc
diff options
context:
space:
mode:
authorChristoph Hellwig <hch@lst.de>2017-05-16 09:51:38 +0300
committerDavid S. Miller <davem@davemloft.net>2017-05-16 14:49:43 -0400
commit19a0f7e37c0761a0a1cbf550705a6063c9675223 (patch)
tree77de1cd40e2201a1dc04d92adb8c45224f64a7a1 /net/smc
parent263eec9b2a82e8697d064709414914b5b10ac538 (diff)
net/smc: Add warning about remote memory exposure
The driver explicitly bypasses APIs to register all memory once a connection is made, and thus allows remote access to memory. Signed-off-by: Christoph Hellwig <hch@lst.de> Signed-off-by: Leon Romanovsky <leon@kernel.org> Acked-by: Ursula Braun <ubraun@linux.vnet.ibm.com> Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/smc')
-rw-r--r--net/smc/Kconfig4
1 files changed, 4 insertions, 0 deletions
diff --git a/net/smc/Kconfig b/net/smc/Kconfig
index c717ef0896aa..33954852f3f8 100644
--- a/net/smc/Kconfig
+++ b/net/smc/Kconfig
@@ -8,6 +8,10 @@ config SMC
The Linux implementation of the SMC-R solution is designed as
a separate socket family SMC.
+ Warning: SMC will expose all memory for remote reads and writes
+ once a connection is established. Don't enable this option except
+ for tightly controlled lab environment.
+
Select this option if you want to run SMC socket applications
config SMC_DIAG