On Sun, May 14, 2017 at 11:51:16AM -0400, David Miller wrote: > From: Christoph Hellwig <hch@xxxxxx> > Date: Sun, 14 May 2017 07:58:48 +0200 > > > this patch has not been superceeded by anything, can you explain why > > it has been marked as such in patchworks? > > I think you're being overbearing by requiring this to be marked BROKEN > and I would like you to explore other ways with the authors to fix > whatever perceived problems you think SMC has. Hi Dave, Christoph proposed very clear way to remove BROKEN tag, by providing secure environment by default to all users. All ULPs in RDMA and lustre in staging [1] are working in secure mode by default and I don't understand why SMC-R should be different. From my experience such "BROKEN" tag will help for authors to get proper priority from their managers to fix it in a first place, before they are moved to anything else. > > You claim that this is somehow "urgent" is false. You can ask > distributions to disable SMC or whatever in the short term if it > reallly, truly, bothers you. It is not distributions only. For example, RDMA stack is released by different providers. Mellanox OFED [2] is one of them and it is based on upstream kernel. Thanks [1] e0ccf5d085ab ("staging: lustre: ko2iblnd: Adapt to the removal of ib_get_dma_mr()") [2] http://www.mellanox.com/page/products_dyn?product_family=26&mtag=linux_sw_drivers > -- > To unsubscribe from this list: send the line "unsubscribe linux-rdma" in > the body of a message to majordomo@xxxxxxxxxxxxxxx > More majordomo info at http://vger.kernel.org/majordomo-info.html
Attachment:
signature.asc
Description: PGP signature