From mboxrd@z Thu Jan 1 00:00:00 1970 From: Daniel Jurgens Subject: Re: [PATCH v7 0/9] SELinux support for Infiniband RDMA Date: Mon, 22 May 2017 10:50:31 +0000 Message-ID: References: <1495198139-69993-1-git-send-email-danielj@mellanox.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Return-path: Content-Language: en-US Sender: owner-linux-security-module@vger.kernel.org To: James Morris Cc: "chrisw@sous-sol.org" , "paul@paul-moore.com" , "sds@tycho.nsa.gov" , "eparis@parisplace.org" , "dledford@redhat.com" , "sean.hefty@intel.com" , "hal.rosenstock@gmail.com" , "selinux@tycho.nsa.gov" , "linux-security-module@vger.kernel.org" , "linux-rdma@vger.kernel.org" , Yevgeny Petrilin List-Id: linux-rdma@vger.kernel.org On 5/21/2017 7:35 PM, James Morris wrote:=0A= > On Fri, 19 May 2017, Dan Jurgens wrote:=0A= >=0A= >> From: Daniel Jurgens =0A= > What kind of testing has this code had? It's relatively complex and as a= =0A= > security feature, it especially needs to be well-tested.=0A= >=0A= >=0A= I tested it on my own systems, checking that it correctly allows and restri= cts access, and revokes access to when the partition table or security poli= cy change. I'm also working with a group of defense contractors to deploy = this in a cluster for testing in a more production like environment. Once = it's available in Linus' kernel releases I will also deploy automated testi= ng in our regression system.=0A= =0A= From mboxrd@z Thu Jan 1 00:00:00 1970 From: danielj@mellanox.com (Daniel Jurgens) Date: Mon, 22 May 2017 10:50:31 +0000 Subject: [PATCH v7 0/9] SELinux support for Infiniband RDMA References: <1495198139-69993-1-git-send-email-danielj@mellanox.com> Message-ID: To: linux-security-module@vger.kernel.org List-Id: linux-security-module.vger.kernel.org On 5/21/2017 7:35 PM, James Morris wrote: > On Fri, 19 May 2017, Dan Jurgens wrote: > >> From: Daniel Jurgens > What kind of testing has this code had? It's relatively complex and as a > security feature, it especially needs to be well-tested. > > I tested it on my own systems, checking that it correctly allows and restricts access, and revokes access to when the partition table or security policy change. I'm also working with a group of defense contractors to deploy this in a cluster for testing in a more production like environment. Once it's available in Linus' kernel releases I will also deploy automated testing in our regression system. -- To unsubscribe from this list: send the line "unsubscribe linux-security-module" in the body of a message to majordomo at vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html