From patchwork Tue Nov 22 19:40:34 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Daniel Jurgens X-Patchwork-Id: 9442063 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 82C2D60235 for ; Tue, 22 Nov 2016 20:02:47 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 726481FF15 for ; Tue, 22 Nov 2016 20:02:47 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 66E371FF27; Tue, 22 Nov 2016 20:02:47 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-1.9 required=2.0 tests=BAYES_00, RCVD_IN_DNSWL_NONE, UNPARSEABLE_RELAY autolearn=unavailable version=3.3.1 Received: from emsm-gh1-uea10.nsa.gov (smtp.nsa.gov [8.44.101.8]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id 56FE21FFAD for ; Tue, 22 Nov 2016 20:02:45 +0000 (UTC) X-IronPort-AV: E=Sophos;i="5.31,682,1473120000"; d="scan'208";a="1227828" IronPort-PHdr: =?us-ascii?q?9a23=3ADGfSWh/vrPucTP9uRHKM819IXTAuvvDOBiVQ1KB5?= =?us-ascii?q?1+IQIJqq85mqBkHD//Il1AaPBtSAragZwLOM7OjJYi8p2d65qncMcZhBBVcuqP?= =?us-ascii?q?49uEgeOvODElDxN/XwbiY3T4xoXV5h+GynYwAOQJ6tL1LdrWev4jEMBx7xKRR6?= =?us-ascii?q?JvjvGo7Vks+7y/2+94fdbghMijexe61+IRW5oQnMqMUbg5ZpJ7osxBfOvnZGYf?= =?us-ascii?q?ldy3lyJVKUkRb858Ow84Bm/i9Npf8v9NNOXLvjcaggQrNWEDopM2Yu5M32rhbD?= =?us-ascii?q?VheA5mEdUmoNjBVFBRXO4QzgUZfwtiv6sfd92DWfMMbrQ704RSiu4qF2QxDmki?= =?us-ascii?q?cHMyMy/n/RhMJ+kalXpAutqwFjz4LRZoyeKfhwcb7Hfd4CRWRPQNtfWSJCDI27?= =?us-ascii?q?bYQPAfIBMORFo4TzqFQBsRSwChe3BO701j9FhGX70bEg3ug9Dw3L2hErEdIUsH?= =?us-ascii?q?TTqdX4LKkcXvqzzKLVyTvDculW2Tjj54jOaRAqvPaBUq9qfsrXyEkgCQfFjleL?= =?us-ascii?q?pIzgITyV0uANvHKd7+pnWuOjkXIoqwZ0ojW2wMonl4rHhpoNx1zZ+ih0z5w5KN?= =?us-ascii?q?2lREJhf9KpH4VcuzuHO4duX88vR29ltDw1x7AEo5K3YSkHxZQ9yxLCdfCKd46F?= =?us-ascii?q?6Q/5WumLOzd3nndldaq6hxa17Eev1PXxVtKx0FZWtipFlcTMtmwV2xzT9MeHTv?= =?us-ascii?q?x981+92TmVzQDT6/xEIVsumarHK58u3r4wlp0JvUTFAiD2g1n5gLWTdkUl/uik?= =?us-ascii?q?8+XnYrP4qZ+AL4J4lw7zP6s0lsG/HOg0KBYCUmeF9eimybHv5Uj5T69Ljv0ynK?= =?us-ascii?q?nZqpfaJcEDq66iHQBV1ocj6xCiDzapydgXhn4HLE9DeB2bkYfpIErDIOz4DPij?= =?us-ascii?q?g1Ssly1nx/bdPrL7GJnNIX/DkKn5cbZn90Fc0BYzzcxY559MCrAAIfXzWknqud?= =?us-ascii?q?zdCh81Kg20w+D9BNV7zIweQ2GPAq6HMKzMq1OI4PwgI/WUbo8PpDn9M+Ql5+Lp?= =?us-ascii?q?jXIhglASZq6l3Z8WaHCjAvRmOF+VYWHyjdgdC2sKpRQxTOjriF2ETD5SaG2/UL?= =?us-ascii?q?485zEhFYKmFp3PR463j7ydxye7GZtWanpBClCWHnfib5+EVOsUaCKOPs9hlSQJ?= =?us-ascii?q?VLagS48l0BGhqhX6xqFpLuXK5yIYsojj28Jt5+3JkhEy9yJ7ANiB022XSGF0hG?= =?us-ascii?q?wITScs3K9juUx91kuD0a9gjvxWD9xc/fVJXRs7NZ7H1OF6DsjyWgPYcteSRlem?= =?us-ascii?q?Wc+qATYrTtI+29UOeVpyG82+jhDf2CqnG7wVmKaIBJwz76LRxHvxKNx+y3bBya?= =?us-ascii?q?ktlV4mQtFANWe+nK5w6xDTB5LVk0Wej6ulb7kT3DTM9Gid12qDp1tXXxJ1Uanf?= =?us-ascii?q?WnAffETWp8zj5kzeV7+uFagnMgxZxMGeMKRKbsPmjU5aRPbjP9TTeHmxlHuxBR?= =?us-ascii?q?mWwLOMcIvqdH8H0CXbFkcEjxgZ/WyaOggmGiehv2XeASRuFV3xZ0Ps9e5+pWi/?= =?us-ascii?q?Tk8p0wGKaEhh2KCv9h4Sn/ycROsZ3qgYtyc5tzV0AFG90srNC9qOvQphe75cYc?= =?us-ascii?q?8m7Vdc02LZsAJ8Ppm6IKBknFIedRp4v1/23RVtFopAidQqrG8tzAdqJ6OXyldB?= =?us-ascii?q?dy+G0pDqIb3aMXfy8w61a6HNx1He1cya+qAV6PQ3s1/jph2mFlI+83V71NlYy2?= =?us-ascii?q?ec6YjXAwoTS53xVl06+AR9p7HffiYy/ZjU1WF2PamyrDDCx8ojBPE5xRa4Y9df?= =?us-ascii?q?LKSEGRf0E80bA8iuLPIlm0OyYx0eIu9S7qk0M9mhd/uc166hJPxgky6+jWRb/I?= =?us-ascii?q?B91VqB+DdmRe7UxZkK3f+Y3wScWjjgjFeuqNr3mZxaajEIBGa/zzbrBJJJbK1o?= =?us-ascii?q?YYkLEXuuI9GwxthmmZ7tWmJX9EKkB1McwsOmZRqSb1v73Q1fzkkXpX2nmS2iwD?= =?us-ascii?q?xulDEltK2f3DbBw+76bhoIJnZLRHV+jVfrOYW0i9EaXFO0bwQwjxuq+0L6x6ld?= =?us-ascii?q?pKRiIGjeWlxIfzD3L2FkU6u/qqGCb9RJ6Jw2rSVdSP68bkyCSr7hvxsa1DvuH3?= =?us-ascii?q?FZxDA/czGlpI/5kAB9iGOTN3tzt2fZdt1rxRvF49zcX/FR1CIcRCZkkTnXGkS8?= =?us-ascii?q?P96x8NWMjZjDr+S+W3i7WZFJaibryoeAtDe85W1sGhC/muy/mtvgEQcmyyP70c?= =?us-ascii?q?dlVTnQphbmfobrz7i6Mf5gfkRwAV/879N2FZ94koYrmpEfx3wahpGL8nodi2vz?= =?us-ascii?q?N8tU2b7mZnoXWTEL28LV4BTi2EB7LXKG2YT5Vm6Gz8tieda6ZHgW2iQj4MBWEq?= =?us-ascii?q?uU66ZEnSRtqFqisQ3ReeR9nisayfY28H4VmfwJuA4zwSWFGL8SG1VYMjL2lxmT?= =?us-ascii?q?8tC+t7tYZHy0cbSqz0p+ms2hDKuerQ5CVnb5fY0iHSBu4cllNlLDzmHz4Jn+eN?= =?us-ascii?q?bMddITqgGUkxDYguhLLpI+i+EHhTRhOW3gvX0p0eg7ggJy3ZuipoiIN31t/L6l?= =?us-ascii?q?Ah5fLjD1f9kc+izpjatFgsmW3pyvH5V4FjUFRpToS+ikEDUItfToLwyOCiEzqm?= =?us-ascii?q?+HGbrDGg+S8ERmrnLLE5+1LHyXIX4ZzdtsRBaDOExfnAAUXDI/npEnDAyqwtLu?= =?us-ascii?q?cFth7DAL+lH4sgdMyv5vNxTnXGfQvgGoaiszSJiaNxdW4B9N6FrSMcyE9O1zBz?= =?us-ascii?q?tY/pqjrAOTNmObex5EDWYTWkyLH1rjJKWh5cHc8+iEAeqzN/TOYbWSpuxEV/aI?= =?us-ascii?q?3Y6v0ox98jaKKMqPImJiAOEh1UpbQ391AcLZlCsTSyYPjSLCc9abpAug+i1wts?= =?us-ascii?q?2w7fLrVxj06ISSDbtdK89j+xesgaeML+SQnjp2KS5E1pMQwn/F0KIf00MPhCx1?= =?us-ascii?q?eDmtFLsBuTTLTK3Ohq9dFwQbZD9rNMtU86I82RFAOdTBhtL7zLJ4i+Q6C1NCVV?= =?us-ascii?q?3hgcymf9AFI2SnOFPAHkaLO6yMJSfXzMHvfaO8VbpQgf1Stx2qozmbC1fjMy+N?= =?us-ascii?q?lznoTRCvKv1MjC+aPBxYoo69dApiCWn5Q9LicBG7N8V3jTIuy70umnzKLXIcMS?= =?us-ascii?q?R7c05Vs7KQ9j1Xje9wG2xb9HVlM/KJmz2D4OnbN5YWq+FkDj5wl+JH5nQ10aFV?= =?us-ascii?q?4DhYRPxymyvTrtlur0ugkuaR1jptSABOpSpThIKXoUViPr3U+YJBWXbL+xIN63?= =?us-ascii?q?6dBAkUqNR+C93goaZQxsLIlKLpJzdI68jU8tcEB8jINMKHN2IsPgDmGDHOEgsK?= =?us-ascii?q?UyWmNWbHh0NDlvGS82earpk+qpf3n5oPRaVXVFsvFvMVEk5lBsANII9rXjM4lr?= =?us-ascii?q?6WlNII5X27rBXLXsVauZHGWeyUAfr0MjaZiqdLZxgTzLzkKoQTM5H01FZ5allm?= =?us-ascii?q?hojKHVTfXcxVqC17cgA0uFlN8GR5TmAr20LldgOt4HgWFfGuhR47kQ5+YeUx9D?= =?us-ascii?q?f2/Vg7PF3KpDE/kEMpg9XqnSiRcCLtLKe3RYxWDTT7uFI1Mp7gQAZ1ahaynVB+?= =?us-ascii?q?OzfCXLJRjLpgeXptiADCpZtFAeRcQrFcYB8M2fGXYO0l0U5CpSW820BI//HFBo?= =?us-ascii?q?dilAYxapGsrmhA1B9kbN47PazQPrRGz1hKiqKIoCCoyvg7wBUCKEYV7GOSZCkI?= =?us-ascii?q?tVQVObY8OSqo//Fj6ReZljRZYmgMTf0qo/xx9kwjJ+uA0jjg079fKkGxLeCfKb?= =?us-ascii?q?2Wu3TYn86SXlwwzl8Il1VC/bVu38cjaVSbWF00zLSLERQJKc3CKRpOYsVI6HfT?= =?us-ascii?q?eDyCseLXwZJ6J4+9DPznTfeStKYIhUKpBAIpH4MW7ssfGJmt0UbYINzoLL4D1B?= =?us-ascii?q?Uh/gPrJE+KDP5RYhKEjC8Ho92jzJ9wxYRdPS8SAWF8MSWx+7bWqRQnj+aEXNcz?= =?us-ascii?q?fngVRJAENm4sVM28hSFZo2xKDCOr3eIB1AiC8zj8qzzNAzbgatpjY/GUZQ9xBN?= =?us-ascii?q?yt5zUw7bK2iV/W85XZIWH2L9JitcHT6ekCvZaIF+tUTaVhs0fbg4RYRGaqUm7V?= =?us-ascii?q?Ht6zO5jwa5IhbdPzCnaiTlOzkTQ1QNntPNy1NKiHnRnoRZpIsImcxD0jKc69Fj?= =?us-ascii?q?QZGxdsp+EC5LlxahACY5s7exHnrB4yN6qhLweEyt+uWXqiKSNKT/lDyuW3f7NX?= =?us-ascii?q?zzA2Ye+81HstVZA6z+658E4LWJEKjg/RxfelZ4lCTyfzAGZRewPRqiolj2JhLP?= =?us-ascii?q?o9wv8jwBPUtlkRKyqEdOhoaGNYod4zHVaSIHVwCmo/QV+Tl5HO7RWt378I+StR?= =?us-ascii?q?hthU0fBfvHj4oJDffCqmWLa3ppXNryogcd8mrrVqPoP9JMuLr4nRkSHBTJbOqA?= =?us-ascii?q?2FSzS1F+Bam9RKJyJYWvZIk3k/OcMaoYpB9VYxVsAmKrxVDqksp6ylaTpjDS4W?= =?us-ascii?q?1i8XT5qO0iEYjOqg3LXXjQufcJMnMBMYqppCmccdXzRwYiwAuK+pT5/WmHOcSm?= =?us-ascii?q?gXPAcT6hxB6x4CloBqYu/o+5bHTJhIyz5SovJ7TDHLFoV2+FTnSmGam1/4SO+u?= =?us-ascii?q?k+axxwJd0Ors0sUHWB54EUVd3fxZllEvKL5sMKQQopTKvSWWdUzkuGLtye2mJF?= =?us-ascii?q?ZVyc3VeF34DJbFtWTmXS0G/H0YX4lPx2/DFZ4KiQp2dL4rpElQIIChYkv/5yYr?= =?us-ascii?q?x59zELm9VMCrwU0orXcaRyiwCNpOF/tpvEjRWDJ7f5ChsI/lNIlKQm9M5J2drE?= =?us-ascii?q?9UkUt3PyGlyZpcKsRN4j8WUzhMujidvcW9R9Nd1sNsCJ8MONh/sW/nGKxYIJiR?= =?us-ascii?q?v2E2urv3x3/B/DA8tE21xC+9Gq+/S+JZ8XYTGgAuJ2SZsUkgEfcj8n3V8lDWqV?= =?us-ascii?q?B0/uFbBreVgUV2ujZ9EYhEBixV2nC9M1RzUH5Gvv1AJ6TPbsxcReM+ZRy0Nhw/?= =?us-ascii?q?FP4m3lCJ8lpukXf/fSNyqhNQ+zrBUAksSSkVnrDtlCUCqsGgPD8XUI5IYSkkby?= =?us-ascii?q?jeMQ6bnz5YvApHYUFwR58ZGspF+60c3YZM/srNU1ysJjsBXBN/LQ83zORQlVZb?= =?us-ascii?q?sEqGfSDSExCoeezIsh1tcsebtNSpI+jh/AdbloPnt/g196UER3K4lw2iX8reop?= =?us-ascii?q?T9ttKUqESBar30M+qmYX/OVDLMlwy/ha84D5nW+CjeKAhbK55kxnc/fJfuF3XL?= =?us-ascii?q?MgpcJ6IHOUVUSLp2adNYreBGf8VkYroG+bdxBhKbQRPiAJegrPdaIVrPRznSMi?= =?us-ascii?q?uM//ejroLU6LzSVfLvZteQx3rdRaJ4IIt64yHhG7j2yY9e5lb22vB1+0NgV1fJ?= =?us-ascii?q?LiCBo879Jg4Q4MmicVXisYM3ETzKB5d/jWTiyltGd8UJXy2g6I4Yx49B6HbsVe?= =?us-ascii?q?J41VD+sPVJ97l484Y4/qxpxNyvJafVNPRaq1NoDQaSBgV27JUiGmx/S3pWYu8L?= =?us-ascii?q?J/fbZb4Zgtz2q+DrC6wX7wWY+/BDadTZOU7Oh9KyCiyYSRxYhgcOsyAaLgqb1/?= =?us-ascii?q?6BhaB0Vdyppe/j2kIi+1K+NAIJzKhx5YeY/aqFvOrXYAHVzbgARKfqWt/zoa42?= =?us-ascii?q?tE6J4/0riqIOendpbAK9COgSSNQRxmH+wqA21SgsCd/MH6r8+P5fUHI0hjDglI?= =?us-ascii?q?pnH1URAfMUGaCE/ZpFk2c9huzZMsEWcqFelWaODxGkFKQCxWSs6yuNL2lvmgvO?= =?us-ascii?q?3A3oQWOv8F/2qjd1QSnWwNflnEpVTL63ClpMUCeyJU93qjWPPBHvtNbtv6Q68l?= =?us-ascii?q?02OHT+tN2RjGuhJK9XH8rnKdyTPCk0pVYXjJkvSdyqwo0UBMSyL8wQ8H5kaPvS?= =?us-ascii?q?8WSrkzVOo61fnYrR/tmV+unLHXmnl6CarbGNyStZyng+uFEz8NGgNvfA592QWf?= =?us-ascii?q?uozHoRTz1iuwTdQx61t6bboE4ONUyMykfLl5QAPstF0nkgykHm+O8jTco29AVZ?= =?us-ascii?q?EIbAe/wCqi7oNTvxwFaQedQ3WTeC0zpZGVL1C1p4GLMm1GL2os3JiW/a+0c0SY?= =?us-ascii?q?loa0znmRt3Ap08KUI27VgawjEOEQYTZh+GC7GoH17qLZMeVUgEaxSIwqS1erst?= =?us-ascii?q?0U102LOv6/fZbfZgCKoVKvZdkgmOkUBeGpISr6IeRbV8dEFZ9KPMqQjtFY/nX+?= =?us-ascii?q?P+lXUqKf21Q9pV8cQYt3sk/gawWR6g6ZNC77YUlp+IcLJLbobWsMB68Uhn+SYF?= =?us-ascii?q?djZRjxhnkxO5Teccqfj44tfBrpqn8OmuW7g2R+gM7Bg7HXp+gIH/gF89utHbze?= =?us-ascii?q?FcRZPJiY7n6gBCP2aKuJrG0xl7MecOKYOrfLN7+nUCOScfJ2wBPcCXa/k67C9h?= =?us-ascii?q?KjPT6EJeAskUf9MXINLNmRxIik3uQLxT98vaFUWCBIhvbM0o9HT4yCwr/pQgSO?= =?us-ascii?q?rg7yW2JZ/H5VFXI/xDlDlslM7FpOUN2vXSCTMX4HeDZBh3wyOC14GNBOzt/eWI?= =?us-ascii?q?09zbS1QGETMoXIhHOTqC4wunRvCvm5nzVQOU8MDziookdE2MXnyxgLgFsqFUHO?= =?us-ascii?q?5YkCr7wiRRFoD7hvKSqdqs63JbtkZZH4Z37B3FHrhfP5pgNBTgjMarWlRzBivx?= =?us-ascii?q?ecHTbBouu/CaxuQS7OVkMUvxe4sbLggDy7Lg5npfVhFuR6LuvlaFQeIRY8NrSO?= =?us-ascii?q?/ern9L7YJvMakPM0aGqZP3rzdIp1E2ABMzZ78rtDNabFTOkBdTW6nqpL4KkhEc?= =?us-ascii?q?XsJhuU9QBWKwP3oz5zXdWqRPkqaRFPwV/y6XTqwPT0VnLCN+TAmo2JV1Ybepm+?= =?us-ascii?q?5Isn9elCNnvPcqyyBmRAe7uSD0qKICxzQg+K2/tDUGvnBFVfuRkyPJCVVF0fQL?= =?us-ascii?q?grwRC3L85lymYHgMdpH+4L95KsT87YMh+WgwYQ0/fy0aWuStEyfwj6KUDYyItN?= =?us-ascii?q?JTngWNtN/Pbb+0KigSLa89xAnmR3Vy3QnShhFo8HEEQj+49t8rOJ29Odo5xiqv?= =?us-ascii?q?AWXbe0oD4rhSsMfoqFAFQ+04aVJnwGV+3cmKXSINRMnVFGYzkAcoc2JEcIhM6R?= =?us-ascii?q?UCDaknni6IvrVa/gETeDrUEIOl+onWncvSxXY9TdNqxn/LqayEh5Mq1mZlm9B1?= =?us-ascii?q?7iOVpnQSdvLYXNVoAnfu14dT0+r+aOuxsuofUotp1KyhUOMeMsmk4Wa22YtqVV?= =?us-ascii?q?WjxrkFG1q5LfIMxrbcUye+U2GYXv6Lc2eUlTYjLkHy/QWoLkEwaMpSrU8yLOXC?= =?us-ascii?q?hpBYlwD6X7J7XCOQqkHHzGA5N+MVaR42sp+9ewMWVO4Re/ScJe82zf0xDFsMaH?= =?us-ascii?q?HIEjVyC++yqlOth497O3Nh4Urme+jt9B7pMMeKEBkeDYHatoJx+eC9Rm+ZO39g?= =?us-ascii?q?zB1zPFFz9+fbFlQxqvFTfo2UndjRm9R7y/AKe+1qMS0ntd4Zgphj5pWM0MeWbR?= =?us-ascii?q?HRyY7/Jc3UovidGPDf00UqdX1ZUrUHZQP5/YM6McAlW7fLB7tWoQwcBbQmQJwm?= =?us-ascii?q?L2rx8aB0LABwcg7Wf7m0gNPlpuGMZptSuXDW6Eg8LCHCtB0f0va0VxB0b4i2h3?= =?us-ascii?q?XuJ5A9XilOoMNrCht6B4ZPAMcArw27A56IhqG0lcK+91l9u+8Qvqr6EurK28ih?= =?us-ascii?q?34VtQ5ha4lSGPDjPC6lvg0Rllvq9j+zB05nwDMPifM0LVPJ/QmHbcLPGGZ+/Kj?= =?us-ascii?q?2WMMLmZ0FG66Kc0K5+UhiJaiH5R7CGtCy4O/p6+kg7z414fPbJzDMz9b3b38Hy?= =?us-ascii?q?Z25DrCe5sXGJLIdf7EDNBeHGWBJUTeSK/X19Ha0Td4T07/sOMd0+z9iA+Ql88i?= =?us-ascii?q?pN3NGDI6e/sk/Gwlh7eo7DLEv1xyY5XpEHIBC+MUsqnG/YpW3RAXBdLsi/Nclt?= =?us-ascii?q?m82YDh336El3nmEhfGlBGnDnRd2JI2gUx9q+ZBGW9AJMF9sDhPC4eUo5tq20VO?= =?us-ascii?q?lpNZJJl+q2tLUHj9lpMT/ARNBAMCzLL795ICBRDuPRq1gseREErrc1Vp0yZZiU?= =?us-ascii?q?L0MNKF2Axj/qzQvezU30cMSh1KKIICYN7nVK1LPE0SFKpwajo/qZhNPsUKzBZp?= =?us-ascii?q?HsQPHSKDYlVi2dRTkqFEam40uru/oFvPqeJmcSuU4UYiOUCAENoqBvrN7QDnLc?= =?us-ascii?q?mOF5e50Knv+aUTjqSCJkjKoyGjpLtUeUTvoBDwbWbHjhj3FHtQy/IP9M4XLlb7?= =?us-ascii?q?qFxqpaW+wWHpFAcvuHTNvEYfpePSsnli0FOOageN3Rt7k53UjTQmsDEqnH6lme?= =?us-ascii?q?QVWIQvyY3T3rRoQVv5Uutiou5N3Qgjd9E77UMLaHuz6u7om4gT6aue3bUWkteV?= =?us-ascii?q?Y1gOMZAGSaxhlPMmQEBM8UuE33Ra6AfUlM3mozie1ywx8MZBhzUnp233JInva9?= =?us-ascii?q?Hc1ZSVgPjGOpRv0Ld193DCkt/U+U/ALye8YMucbNSG9C7rEMU5YSLOE06InLP6?= =?us-ascii?q?sd2O0p3DxjoCMmsiiQDEhQjhyb/KrKHaJ9x7pC5W8i8/FwQE6PXyvVcnLbxYq+?= =?us-ascii?q?F8JP2SBurGjm18rTuOBtMKBXp4RnD1gXDyJ2Icrd8ixfXm3u3gu9oQq7T3yiJ2?= =?us-ascii?q?cS4CwKPjMtbeFo1KpgtxKOcczOrQuIvr8lgFOiFALOD72zwpENAcbskU2jZTJj?= =?us-ascii?q?bSSgF5cwrO1E0tkVf+dvaJC3GVHaBhD3FAODoyQF/xWspa6kSYJGxmgSnKI2JP?= =?us-ascii?q?nzUoUKBMWf1zZ9hz5TyZMJi22cDM/OTpz/98F8Q3oJM931SXDvJojOJDj0r+wE?= =?us-ascii?q?2ZQGGEObaeFcN2Ve4LAskWK/Q1qusaXt5CCAKLrwITCwPsADNJaAjmRKhq/HMZ?= =?us-ascii?q?Oo7PtHXylUtZMggN/N4CiN4g+XZsy6Kzqnmhg=3D?= X-IPAS-Result: =?us-ascii?q?A2EKBQAWpDRY/wHyM5BdHQEFAQsBGAEFAQsBgw0BAQEBAR+?= =?us-ascii?q?BWaRZlmwkiCFTAQEBAQEBAQECAQJfKIIzGoIcAgQBAiQTFCALAwMJAQEXCCEIC?= =?us-ascii?q?AMBLRURBwcLBRYCBIhMBLFQPSoCiyUBAQgBAQEBI48zEQGFfQEEmk6JVocpgW+?= =?us-ascii?q?IKwyGBIdPhheEDFVHFzQehSVwhV6CLgEBAQ?= Received: from unknown (HELO tarius.tycho.ncsc.mil) ([144.51.242.1]) by emsm-gh1-uea10.nsa.gov with ESMTP; 22 Nov 2016 20:02:33 +0000 Received: from prometheus.infosec.tycho.ncsc.mil (prometheus [192.168.25.40]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id uAMK2VHb025435; Tue, 22 Nov 2016 15:02:32 -0500 Received: from tarius.tycho.ncsc.mil (tarius.infosec.tycho.ncsc.mil [144.51.242.1]) by prometheus.infosec.tycho.ncsc.mil (8.15.2/8.15.2) with ESMTP id uAMJluK5031493 for ; Tue, 22 Nov 2016 14:47:56 -0500 Received: from goalie.tycho.ncsc.mil (goalie [144.51.242.250]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id uAMJlq9k019336 for ; Tue, 22 Nov 2016 14:47:56 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A1CnBADZnzRY/4GlL8FdHQEFAQsBgzgBAQEBAYF4pFmSX4QUhiECgm0BAgEBAQEBAmIohGkCBCdSEBgIMVcHEhuIVrFIPYtQAQEBBwIllUIFmk6JVocpgW+IN4YEh0+GF4QMVUdLhUM8NIgMAQEB X-IPAS-Result: A1CnBADZnzRY/4GlL8FdHQEFAQsBgzgBAQEBAYF4pFmSX4QUhiECgm0BAgEBAQEBAmIohGkCBCdSEBgIMVcHEhuIVrFIPYtQAQEBBwIllUIFmk6JVocpgW+IN4YEh0+GF4QMVUdLhUM8NIgMAQEB X-IronPort-AV: E=Sophos;i="5.31,682,1473134400"; d="scan'208";a="5839059" Received: from emsm-gh1-uea10.corp.nsa.gov (HELO emsm-gh1-uea10.nsa.gov) ([10.208.41.36]) by goalie.tycho.ncsc.mil with ESMTP; 22 Nov 2016 14:47:56 -0500 IronPort-PHdr: =?us-ascii?q?9a23=3A6443SRb16LWvxhw09StgHRL/LSx+4OfEezUN459i?= =?us-ascii?q?sYplN5qZr8m9bnLW6fgltlLVR4KTs6sC0LuN9fq9EjVavt6oizMrSNR0TRgLiM?= =?us-ascii?q?EbzUQLIfWuLgnFFsPsdDEwB89YVVVorDmROElRH9viNRWJ+iXhpTEdFQ/iOgVr?= =?us-ascii?q?O+/7BpDdj9it1+C15pbffxhEiCCzbL52Ihi6txvdu8kZjYd/NKo8yAbCr2dVde?= =?us-ascii?q?hR2W5mP0+YkQzm5se38p5j8iBQtOwk+sVdT6j0fLk2QKJBAjg+PG87+MPktR/Y?= =?us-ascii?q?TQuS/XQcSXkZkgBJAwfe8h73WIr6vzbguep83CmaOtD2TawxVD+/4apnVAPkhS?= =?us-ascii?q?EaPDMi7mrZltJ/g75aoBK5phxw3YjUYJ2ONPFjeq/RZM4WSXZdUspUUSFKH4Gy?= =?us-ascii?q?YJYVD+cZPehWsZTzqVUNoxW5BwasCvjixiNUinLswaE3yfgtHR3A0Qc9H9wOqn?= =?us-ascii?q?PUrNDtOakcS++1yrTDwzHeb/NM1jfy9o7Icgs8qvyLQL1/a8zRyUgxGAPBjFWd?= =?us-ascii?q?sonlMC2R1uQJqWeb6e1gVO21h2E7rAFxpyGiy8ExgYfKnoIY0k3I+CF3zYovKt?= =?us-ascii?q?C1SlR3bcOlHZZQrS2WKpV6T8ckTmp1oig10KcGtoS+fCUSyJQo2Rrfa/uffoiN?= =?us-ascii?q?/B3jUOKRLi1+hHJid7OznQq98U+6xu39Usm4yFdKrixbndnQrn0Byhje58adRv?= =?us-ascii?q?Zy/EqtwyuD2gHT5+1ePEw4i67WJ4YkwrEql5oTtUrDHjXxmEXzlKKZa18r+u6p?= =?us-ascii?q?6+v5ZrXmpISRN4pqhQH6NqQhgMq/AeM3MwQUQ2eb/uG82KX5/ULlWLVKkuE2kq?= =?us-ascii?q?7BvZDBO8sboq+5AwlI0ocs8Bu/Ezen38gYnXkANl5FfgmHgJLzN1HBJ/D4E6T3?= =?us-ascii?q?v1P5mzdxxuvZFqbmH46INX/H1rD7cvI180dBzCIrxM1bopdTDasMZvn0Xwu5r9?= =?us-ascii?q?DDJgMoOAyzheD8AZNy0Z1aEW+XC7WYK4vKuEWJ/forKuKBIogPt3K1J/wo6/Dp?= =?us-ascii?q?l3MRg1IRfaC1m5AQbTTwBflvJQOZbHTwk/8AF3sHukw1S+muwF2LVXhJYG2/Wb?= =?us-ascii?q?kg4To4II2jBIbHAIuqhe+vxiC+S7FfYChkF0qDHHHzP9GIUvENZSaQCspsljgN?= =?us-ascii?q?U7+xDYQm0Ef950fB17N7I7+MqWUjvpX52Y0wvrWLmA=3D=3D?= X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0GxBACPoDRY/4GlL8FdHgYMGQYMgw0BA?= =?us-ascii?q?QEBAYF4pFmSX4QUhiECgm4BAQEBAQEBAQIBAl8ogjMaAYIbAgQnUhAYCDFXBxI?= =?us-ascii?q?biFaxST2LUAEBAQcCJZVCBZpOiVaHKYFviDeGBIdPhheEDFVHS4VDPDSIDAEBA?= =?us-ascii?q?Q?= X-IPAS-Result: =?us-ascii?q?A0GxBACPoDRY/4GlL8FdHgYMGQYMgw0BAQEBAYF4pFmSX4Q?= =?us-ascii?q?UhiECgm4BAQEBAQEBAQIBAl8ogjMaAYIbAgQnUhAYCDFXBxIbiFaxST2LUAEBA?= =?us-ascii?q?QcCJZVCBZpOiVaHKYFviDeGBIdPhheEDFVHS4VDPDSIDAEBAQ?= X-IronPort-AV: E=Sophos;i="5.31,682,1473120000"; d="scan'208";a="1226827" Received: from mail-il-dmz.mellanox.com (HELO mellanox.co.il) ([193.47.165.129]) by emsm-gh1-uea10.nsa.gov with ESMTP; 22 Nov 2016 19:47:53 +0000 Received: from Internal Mail-Server by MTLPINE1 (envelope-from danielj@mellanox.com) with ESMTPS (AES256-SHA encrypted); 22 Nov 2016 21:41:07 +0200 Received: from x-vnc01.mtx.labs.mlnx. (x-vnc01.mtx.labs.mlnx [10.12.150.16]) by labmailer.mlnx (8.13.8/8.13.8) with ESMTP id uAMJenMZ005134; Tue, 22 Nov 2016 21:41:05 +0200 From: Dan Jurgens To: chrisw@sous-sol.org, paul@paul-moore.com, sds@tycho.nsa.gov, eparis@parisplace.org, dledford@redhat.com, sean.hefty@intel.com, hal.rosenstock@gmail.com Subject: [PATCH v5 5/9] selinux: Create policydb version for Infiniband support Date: Tue, 22 Nov 2016 21:40:34 +0200 Message-Id: <1479843638-67136-6-git-send-email-danielj@mellanox.com> X-Mailer: git-send-email 1.7.1 In-Reply-To: <1479843638-67136-1-git-send-email-danielj@mellanox.com> References: <1479843638-67136-1-git-send-email-danielj@mellanox.com> X-Mailman-Approved-At: Tue, 22 Nov 2016 15:00:44 -0500 X-BeenThere: selinux@tycho.nsa.gov X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Security-Enhanced Linux \(SELinux\) mailing list" List-Post: List-Help: Cc: linux-rdma@vger.kernel.org, linux-security-module@vger.kernel.org, selinux@tycho.nsa.gov MIME-Version: 1.0 Errors-To: selinux-bounces@tycho.nsa.gov Sender: "Selinux" X-Virus-Scanned: ClamAV using ClamSMTP From: Daniel Jurgens Support for Infiniband requires the addition of two new object contexts, one for infiniband PKeys and another IB Ports. Added handlers to read and write the new ocontext types when reading or writing a binary policy representation. Signed-off-by: Daniel Jurgens Reviewed-by: Eli Cohen --- v2: - Shorten ib_end_port to ib_port. Paul Moore - Added bounds checking to port number. Paul Moore - Eliminated {} in OCON_PKEY case statement. Yuval Shaia v3: - ib_port -> ib_endport. Paul Moore v4: - removed unneeded brackets in ocontext_read. Paul Moore --- security/selinux/include/security.h | 3 +- security/selinux/ss/policydb.c | 129 +++++++++++++++++++++++++++++++----- security/selinux/ss/policydb.h | 27 +++++--- 3 files changed, 135 insertions(+), 24 deletions(-) diff --git a/security/selinux/include/security.h b/security/selinux/include/security.h index 308a286..6bb9b0a 100644 --- a/security/selinux/include/security.h +++ b/security/selinux/include/security.h @@ -36,10 +36,11 @@ #define POLICYDB_VERSION_DEFAULT_TYPE 28 #define POLICYDB_VERSION_CONSTRAINT_NAMES 29 #define POLICYDB_VERSION_XPERMS_IOCTL 30 +#define POLICYDB_VERSION_INFINIBAND 31 /* Range of policy versions we understand*/ #define POLICYDB_VERSION_MIN POLICYDB_VERSION_BASE -#define POLICYDB_VERSION_MAX POLICYDB_VERSION_XPERMS_IOCTL +#define POLICYDB_VERSION_MAX POLICYDB_VERSION_INFINIBAND /* Mask for just the mount related flags */ #define SE_MNTMASK 0x0f diff --git a/security/selinux/ss/policydb.c b/security/selinux/ss/policydb.c index d719db4..24e16da 100644 --- a/security/selinux/ss/policydb.c +++ b/security/selinux/ss/policydb.c @@ -17,6 +17,11 @@ * * Added support for the policy capability bitmap * + * Update: Mellanox Techonologies + * + * Added Infiniband support + * + * Copyright (C) 2016 Mellanox Techonologies * Copyright (C) 2007 Hewlett-Packard Development Company, L.P. * Copyright (C) 2004-2005 Trusted Computer Solutions, Inc. * Copyright (C) 2003 - 2004 Tresys Technology, LLC @@ -76,81 +81,86 @@ static struct policydb_compat_info policydb_compat[] = { { .version = POLICYDB_VERSION_BASE, .sym_num = SYM_NUM - 3, - .ocon_num = OCON_NUM - 1, + .ocon_num = OCON_NUM - 3, }, { .version = POLICYDB_VERSION_BOOL, .sym_num = SYM_NUM - 2, - .ocon_num = OCON_NUM - 1, + .ocon_num = OCON_NUM - 3, }, { .version = POLICYDB_VERSION_IPV6, .sym_num = SYM_NUM - 2, - .ocon_num = OCON_NUM, + .ocon_num = OCON_NUM - 2, }, { .version = POLICYDB_VERSION_NLCLASS, .sym_num = SYM_NUM - 2, - .ocon_num = OCON_NUM, + .ocon_num = OCON_NUM - 2, }, { .version = POLICYDB_VERSION_MLS, .sym_num = SYM_NUM, - .ocon_num = OCON_NUM, + .ocon_num = OCON_NUM - 2, }, { .version = POLICYDB_VERSION_AVTAB, .sym_num = SYM_NUM, - .ocon_num = OCON_NUM, + .ocon_num = OCON_NUM - 2, }, { .version = POLICYDB_VERSION_RANGETRANS, .sym_num = SYM_NUM, - .ocon_num = OCON_NUM, + .ocon_num = OCON_NUM - 2, }, { .version = POLICYDB_VERSION_POLCAP, .sym_num = SYM_NUM, - .ocon_num = OCON_NUM, + .ocon_num = OCON_NUM - 2, }, { .version = POLICYDB_VERSION_PERMISSIVE, .sym_num = SYM_NUM, - .ocon_num = OCON_NUM, + .ocon_num = OCON_NUM - 2, }, { .version = POLICYDB_VERSION_BOUNDARY, .sym_num = SYM_NUM, - .ocon_num = OCON_NUM, + .ocon_num = OCON_NUM - 2, }, { .version = POLICYDB_VERSION_FILENAME_TRANS, .sym_num = SYM_NUM, - .ocon_num = OCON_NUM, + .ocon_num = OCON_NUM - 2, }, { .version = POLICYDB_VERSION_ROLETRANS, .sym_num = SYM_NUM, - .ocon_num = OCON_NUM, + .ocon_num = OCON_NUM - 2, }, { .version = POLICYDB_VERSION_NEW_OBJECT_DEFAULTS, .sym_num = SYM_NUM, - .ocon_num = OCON_NUM, + .ocon_num = OCON_NUM - 2, }, { .version = POLICYDB_VERSION_DEFAULT_TYPE, .sym_num = SYM_NUM, - .ocon_num = OCON_NUM, + .ocon_num = OCON_NUM - 2, }, { .version = POLICYDB_VERSION_CONSTRAINT_NAMES, .sym_num = SYM_NUM, - .ocon_num = OCON_NUM, + .ocon_num = OCON_NUM - 2, }, { .version = POLICYDB_VERSION_XPERMS_IOCTL, .sym_num = SYM_NUM, + .ocon_num = OCON_NUM - 2, + }, + { + .version = POLICYDB_VERSION_INFINIBAND, + .sym_num = SYM_NUM, .ocon_num = OCON_NUM, }, }; @@ -2222,6 +2232,60 @@ static int ocontext_read(struct policydb *p, struct policydb_compat_info *info, goto out; break; } + case OCON_PKEY: + rc = next_entry(nodebuf, fp, sizeof(u32) * 6); + if (rc) + goto out; + + c->u.pkey.subnet_prefix = be64_to_cpu(*((__be64 *)nodebuf)); + /* The subnet prefix is stored as an IPv6 + * address in the policy. + * + * Check that the lower 2 DWORDS are 0. + */ + if (nodebuf[2] || nodebuf[3]) { + rc = -EINVAL; + goto out; + } + + if (nodebuf[4] > 0xffff || + nodebuf[5] > 0xffff) { + rc = -EINVAL; + goto out; + } + + c->u.pkey.low_pkey = le32_to_cpu(nodebuf[4]); + c->u.pkey.high_pkey = le32_to_cpu(nodebuf[5]); + + rc = context_read_and_validate(&c->context[0], + p, + fp); + if (rc) + goto out; + break; + case OCON_IB_ENDPORT: + rc = next_entry(buf, fp, sizeof(u32) * 2); + if (rc) + goto out; + len = le32_to_cpu(buf[0]); + + rc = str_read(&c->u.ib_endport.dev_name, GFP_KERNEL, fp, len); + if (rc) + goto out; + + if (buf[1] > 0xff || buf[1] == 0) { + rc = -EINVAL; + goto out; + } + + c->u.ib_endport.port_num = le32_to_cpu(buf[1]); + + rc = context_read_and_validate(&c->context[0], + p, + fp); + if (rc) + goto out; + break; } } } @@ -3151,6 +3215,41 @@ static int ocontext_write(struct policydb *p, struct policydb_compat_info *info, if (rc) return rc; break; + case OCON_PKEY: + *((__be64 *)nodebuf) = cpu_to_be64(c->u.pkey.subnet_prefix); + + /* + * The low order 2 bits were confirmed to be 0 + * when the policy was loaded. Write them out + * as zero + */ + nodebuf[2] = 0; + nodebuf[3] = 0; + + nodebuf[4] = cpu_to_le32(c->u.pkey.low_pkey); + nodebuf[5] = cpu_to_le32(c->u.pkey.high_pkey); + + rc = put_entry(nodebuf, sizeof(u32), 6, fp); + if (rc) + return rc; + rc = context_write(p, &c->context[0], fp); + if (rc) + return rc; + break; + case OCON_IB_ENDPORT: + len = strlen(c->u.ib_endport.dev_name); + buf[0] = cpu_to_le32(len); + buf[1] = cpu_to_le32(c->u.ib_endport.port_num); + rc = put_entry(buf, sizeof(u32), 2, fp); + if (rc) + return rc; + rc = put_entry(c->u.ib_endport.dev_name, 1, len, fp); + if (rc) + return rc; + rc = context_write(p, &c->context[0], fp); + if (rc) + return rc; + break; } } } diff --git a/security/selinux/ss/policydb.h b/security/selinux/ss/policydb.h index 725d594..edb329d 100644 --- a/security/selinux/ss/policydb.h +++ b/security/selinux/ss/policydb.h @@ -187,6 +187,15 @@ struct ocontext { u32 addr[4]; u32 mask[4]; } node6; /* IPv6 node information */ + struct { + u64 subnet_prefix; + u16 low_pkey; + u16 high_pkey; + } pkey; + struct { + char *dev_name; + u8 port_num; + } ib_endport; } u; union { u32 sclass; /* security class for genfs */ @@ -215,14 +224,16 @@ struct genfs { #define SYM_NUM 8 /* object context array indices */ -#define OCON_ISID 0 /* initial SIDs */ -#define OCON_FS 1 /* unlabeled file systems */ -#define OCON_PORT 2 /* TCP and UDP port numbers */ -#define OCON_NETIF 3 /* network interfaces */ -#define OCON_NODE 4 /* nodes */ -#define OCON_FSUSE 5 /* fs_use */ -#define OCON_NODE6 6 /* IPv6 nodes */ -#define OCON_NUM 7 +#define OCON_ISID 0 /* initial SIDs */ +#define OCON_FS 1 /* unlabeled file systems */ +#define OCON_PORT 2 /* TCP and UDP port numbers */ +#define OCON_NETIF 3 /* network interfaces */ +#define OCON_NODE 4 /* nodes */ +#define OCON_FSUSE 5 /* fs_use */ +#define OCON_NODE6 6 /* IPv6 nodes */ +#define OCON_PKEY 7 /* Infiniband PKeys */ +#define OCON_IB_ENDPORT 8 /* Infiniband end ports */ +#define OCON_NUM 9 /* The policy database */ struct policydb {