From mboxrd@z Thu Jan 1 00:00:00 1970 From: David Miller Subject: Re: [PATCH net-next 00/10] net/smc: get rid of unsafe_global_rkey Date: Sat, 29 Jul 2017 11:23:16 -0700 (PDT) Message-ID: <20170729.112316.596199895398096388.davem@davemloft.net> References: <20170728115622.17247-1-ubraun@linux.vnet.ibm.com> Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit Cc: hch@lst.de, netdev@vger.kernel.org, linux-rdma@vger.kernel.org, linux-s390@vger.kernel.org, jwi@linux.vnet.ibm.com, schwidefsky@de.ibm.com, heiko.carstens@de.ibm.com, raspl@linux.vnet.ibm.com To: ubraun@linux.vnet.ibm.com Return-path: Received: from shards.monkeyblade.net ([184.105.139.130]:40078 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752947AbdG2SXY (ORCPT ); Sat, 29 Jul 2017 14:23:24 -0400 In-Reply-To: <20170728115622.17247-1-ubraun@linux.vnet.ibm.com> Sender: netdev-owner@vger.kernel.org List-ID: From: Ursula Braun Date: Fri, 28 Jul 2017 13:56:12 +0200 > The smc code uses the unsafe_global_rkey, exposing all memory for > remote reads and writes once a connection is established. > Here is now a patch series to get rid of unsafe_global_rkey usage. > Main idea is to switch to SG-logic and separate memory regions for RMBs. Series applied, thanks.