smc: switch to usage of IB_PD_UNSAFE_GLOBAL_RKEY
authorUrsula Braun <ubraun@linux.vnet.ibm.com>
Mon, 15 May 2017 15:33:37 +0000 (17:33 +0200)
committerDavid S. Miller <davem@davemloft.net>
Tue, 16 May 2017 18:49:42 +0000 (14:49 -0400)
commit263eec9b2a82e8697d064709414914b5b10ac538
treed8d9e5dedc4e3b8b8db7652d5f883e765918ac86
parentbcfc7d33110b0f33069d74138eeb7ca9acbb3c85
smc: switch to usage of IB_PD_UNSAFE_GLOBAL_RKEY

Currently, SMC enables remote access to physical memory when a user
has successfully configured and established an SMC-connection until ten
minutes after the last SMC connection is closed. Because this is considered
a security risk, drivers are supposed to use IB_PD_UNSAFE_GLOBAL_RKEY in
such a case.

This patch changes the current SMC code to use IB_PD_UNSAFE_GLOBAL_RKEY.
This improves user awareness, but does not remove the security risk itself.

Signed-off-by: Ursula Braun <ubraun@linux.vnet.ibm.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
net/smc/smc_clc.c
net/smc/smc_core.c
net/smc/smc_core.h
net/smc/smc_ib.c
net/smc/smc_ib.h