From: Ursula Braun Date: Fri, 28 Jul 2017 11:56:18 +0000 (+0200) Subject: net/smc: remove Kconfig warning X-Git-Tag: v4.14-rc1~130^2~430^2~4 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=d5b361b0dc3aa319522ef593b9bbf19ac3db23c5;p=platform%2Fkernel%2Flinux-rpi3.git net/smc: remove Kconfig warning Now separate memory regions are created and registered for separate RMBs. The unsafe_global_rkey of the protection domain is no longer used. Thus the exposing memory warning can be removed. Signed-off-by: Ursula Braun Signed-off-by: David S. Miller --- diff --git a/net/smc/Kconfig b/net/smc/Kconfig index 3395485..c717ef0 100644 --- a/net/smc/Kconfig +++ b/net/smc/Kconfig @@ -8,10 +8,6 @@ config SMC The Linux implementation of the SMC-R solution is designed as a separate socket family SMC. - Warning: SMC will expose all memory for remote reads and writes - once a connection is established. Don't enable this option except - for tightly controlled lab environment. - Select this option if you want to run SMC socket applications config SMC_DIAG