From mboxrd@z Thu Jan 1 00:00:00 1970 From: Ira Weiny Subject: Re: [RFC PATCH v2 00/13] SELinux support for Infiniband RDMA Date: Wed, 13 Apr 2016 20:31:27 -0400 Message-ID: <20160414003127.GA7534@rhel> References: <20160411221210.GA5861@obsidianresearch.com> <20160411231250.GB5861@obsidianresearch.com> <20160412000621.GD5861@obsidianresearch.com> <570C85F7.5010101@dev.mellanox.co.il> <1828884A29C6694DAF28B7E6B8A82373AB040ABA@ORSMSX109.amr.corp.intel.com> <570DD3F5.2060302@dev.mellanox.co.il> <1828884A29C6694DAF28B7E6B8A82373AB041285@ORSMSX109.amr.corp.intel.com> <20160414002718.GA6660@rhel> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Return-path: Content-Disposition: inline In-Reply-To: <20160414002718.GA6660@rhel> Sender: owner-linux-security-module@vger.kernel.org To: "Hefty, Sean" Cc: Hal Rosenstock , Jason Gunthorpe , Daniel Jurgens , "selinux@tycho.nsa.gov" , "linux-security-module@vger.kernel.org" , "linux-rdma@vger.kernel.org" , Yevgeny Petrilin List-Id: linux-rdma@vger.kernel.org On Wed, Apr 13, 2016 at 04:47:48PM +0000, Sean Hefty wrote: > > Former (multicast modifications of fabric) also requires restricting > > arbitrary UD QPs as well as QP1 as SA access is QPn (n > 0) <-> QP1. > > The SA could have an option to ignore all requests that do not originate QP1, > then protect access to QP1 on the client nodes. I'm not really sure what we are protecting against here. Is it simply DoS against the SA? Ira > -- > > To unsubscribe from this list: send the line "unsubscribe linux-rdma" in > the body of a message to majordomo@vger.kernel.org > More majordomo info at http://vger.kernel.org/majordomo-info.html