From patchwork Wed Nov 23 14:17:29 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Daniel Jurgens X-Patchwork-Id: 9443457 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 6100960779 for ; Wed, 23 Nov 2016 14:22:48 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 4F29826246 for ; Wed, 23 Nov 2016 14:22:48 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 43D9226907; Wed, 23 Nov 2016 14:22:48 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.2 required=2.0 tests=BAYES_00, RCVD_IN_DNSWL_MED, UNPARSEABLE_RELAY autolearn=unavailable version=3.3.1 Received: from emsm-gh1-uea11.nsa.gov (emsm-gh1-uea11.nsa.gov [8.44.101.9]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 6268826246 for ; Wed, 23 Nov 2016 14:22:47 +0000 (UTC) X-IronPort-AV: E=Sophos;i="5.31,538,1473120000"; d="scan'208";a="1013521" IronPort-PHdr: =?us-ascii?q?9a23=3AkZQ0sRKurPa96x5iJ9mcpTZWNBhigK39O0sv0rFi?= =?us-ascii?q?tYgQLvv+rarrMEGX3/hxlliBBdydsKMfzbCJ+P65EUU7or+5+EgYd5JNUxJXwe?= =?us-ascii?q?43pCcHRPC/NEvgMfTxZDY7FskRHHVs/nW8LFQHUJ2mPw6arXK99yMdFQviPgRp?= =?us-ascii?q?OOv1BpTSj8Oq3Oyu5pHfeQtFiT6zbL9oMhm7rwrdu8gLjYB/Nqs/1xzFr2dSde?= =?us-ascii?q?9L321oP1WTnxj95se04pFu9jlbtuwi+cBdT6j0Zrw0QrNEAjsoNWA1/9DrugLY?= =?us-ascii?q?TQST/HscU34ZnQRODgPY8Rz1RJbxsi/9tupgxCmXOND9QL4oVTi+6apgVRHniD?= =?us-ascii?q?0DNzUk7m/ZjMJ+h79frB64uhBz34vYbYeIP/R8Y6zdZ8sXS2pfUMhMWSJPAYSy?= =?us-ascii?q?YIkBD+oZP+tUsofwqFQSohWxGwasH/jiyiNKi3LswaE3yfgtHR/A0Qc9H9wOqn?= =?us-ascii?q?PUrNDtOakcS++1yrTDwzHeb/NM1jfy9o7Icgs8qvyLQL1/a8zRyUgxGAPBjFWd?= =?us-ascii?q?sonlMC2R1uQJqWeb6e1gVO21h2E7rAFxpyGiy8ExgYfKnoIY0k3I+Cp2zYovJd?= =?us-ascii?q?C0VVR3bcCrHZdOrS2WKpN6Tt4mTmxmoio3xb8LtYSmcCULyJkr3QPTZ+KDfoWO?= =?us-ascii?q?/xntTvyeIS1ii3JgYL+/ghGy/lW+xeDkTcm01UpKrjJCktnRqnABzxzT5daDSv?= =?us-ascii?q?t65kqhxSyA1xrS6uFZOkA4j7bbKp49zb4wkZofq0LDETPtmErqlqOWc0Qk+uyw?= =?us-ascii?q?5+TmZLXpuIOcOpdphgzxPakigMyyDfkiPgQQUGWX5/6w2KD78U38WrpKj/k2kq?= =?us-ascii?q?fDsJDdIMQWvrW5DBFR0oYi7Ra/Ejin3M0DknkAMVJFfg6IgJbyO1zVPPD5Deuw?= =?us-ascii?q?g1SrkDtxwfDGJafuDo/CLnjEjrftZax95FJEyAov0dBf4IpZBaoaL/70Xk/xtc?= =?us-ascii?q?fYDgMiMwCu2OboFsly2pkFWW2RBq+ZMaXSsUKH5+80P+aNZJUVuCvmK/Q/6f/h?= =?us-ascii?q?l2M5mUQafamvx5cXb2q4Hvt+KUWDfXXsmssBEXsNvgcmQuzqkkeNUThPaHazRK?= =?us-ascii?q?Ix/TQ7CJqnDYvaXYCsjqeB0D28Hp1MaWBMEkqMHmvwd4WYR/cMbzqfIsx7nTwH?= =?us-ascii?q?UrihVpQs1RK0uw/5zLpnM/DY+ioCtZLszNJ1/fHclQku9TxoCMSQy3uCQHxunm?= =?us-ascii?q?MJWTA2xrtyrlZhxVeGy6R4hOZYFdNL7fNTTgg6LYLcz/B9C93qWgLOYNOJSFKh?= =?us-ascii?q?Qti9BTExU84xw9gLY0lnAdmiiQrD3yWyCb8Pi7OLHIA08r7b33XpPMZ9xWzG1K?= =?us-ascii?q?46j1k6WcZPLmumhqlx9gjWHYHJlV+Vl6C0eqQAxCTN7nuMzXKSvEFEVw59SavE?= =?us-ascii?q?UmobZkvKs9v5/FjCQqSwCbs5KAtO0tOCKq5QZt3ul1VGS+/pOM7CbGKph2ewGR?= =?us-ascii?q?GIy6uQbIX3Zmod3T/SCEwfng8P+naGMBQxCT26o2LCFjBuE0zgY1/0++lktHy7?= =?us-ascii?q?VlM0zx2Nb0B50bq1+xoVhfiCRPMIxb8Lojkuqy9zHFqn2NLWEdWArRJ7fKpAed?= =?us-ascii?q?M9/EtH1WXBugNgJJOgM7ptiUAQcwV4pE7hyxV3BZ9akcg2snwq1hB+KaSG31Nd?= =?us-ascii?q?bzmYx4z/OqXLKmnu+xCic7DW2lDC39aK/acP8u40pEnjvAGuEEoi/G5q091U03?= =?us-ascii?q?ua/JrKFg0SXYj2UkYt+Bhwv6vabTUl54PIyX1sNrG5sjvD29IyGOsp0w2gcMlb?= =?us-ascii?q?MKOFEg/yDsIbCtO1KOwymlipaBMEM/xJ9KIuOcOpaeeG0raxPOl8hDKmkXhH4I?= =?us-ascii?q?dl30KW8Cp8TurI0Igfw/6E2QuGWSzxjEy8ss/rgoBIfzYSHnCwySL8Ho5eerVy?= =?us-ascii?q?fZoXCWepO8C33s9xh4PpW3JC7lGvHUgJ2MiteRqOaFz92xZd1UELrXyhniu30y?= =?us-ascii?q?Z4kzc3oaqDxCbO2fjtdAIbOm5XQ2lvlVLsIYytg98EWkildBYpmwWh5Ub+2adb?= =?us-ascii?q?vr5zL2/NTkdUZyL2NX1tUrOstrqeZM5C8JAovjtRUOSnel2aSaDyox0B0yPlAW?= =?us-ascii?q?Re2Co3dzawupX2hxZ6kn6SLG5vrHrFfsF93Qnf5NrBSvNKwDoGQjR3iTnNCli6?= =?us-ascii?q?Idap4c2el43fveCmS2KhSppTfDHzzYyaqSu74XZnDgG+n/CvmtzrCAY63jX919?= =?us-ascii?q?VwUiXIthn8aJHx16umKeJnYlVoBFjk5spiAI5+j48wi48I2XcAgJWV4WQIkX3o?= =?us-ascii?q?PNVGwqLxcmANRSURz97O5wjlxVdjIW6XyIL3UXWd2MRhaMegbmMQxC0989hACL?= =?us-ascii?q?2I47xcgSt1vl24oBrfYfdnmDcd1fwu6HsBjuEHpgUi0yKdAqoIEklAJyzskBaI?= =?us-ascii?q?4M6io6VLfmqvdqKw1EVml9C7EL6Cuh1cWGr+epo6Ei9w7tlwMEjM0X3r9oHkf8?= =?us-ascii?q?LdbdQNuR2IiBfPk/JaKIovmfYQgypoJ379t2U/y+EnlRxuwY26vI+fJmVo5q25?= =?us-ascii?q?BhpYOSPpZ8MP4D7il71TnsCI0ICzBZVuBi8EXIP2Qv6yFjIdq+jnPR6UEDIgsn?= =?us-ascii?q?ebBabfHQiH5Ud8tX7OHYqnN3SNK3kdytVjRAKQK1ZDjwARRjk6mYQ5Fg+yzsz7?= =?us-ascii?q?bEh5/iwR5kL/qhZUzOJoLQPwUn/HpAqzZDc0SYKfLAFK7gFM5kfVN9aR7uRvEC?= =?us-ascii?q?FZ5JKhqBaBKmuBZwRHFWsJQFCLB0j/Prmy4tnN6/CYCfSlIPTQZ7WOqPBeV/CT?= =?us-ascii?q?yJKuzIRp4SiDOt+IPnl4AP0xwlBDUmxhG8TFhzUPTDQamD/Wb8GFvhi89Td3od?= =?us-ascii?q?qh8PnwQwLg/4iPC6ZIMdp14Ry2hbqDN+iKiyZjMDpYypQMxXzIybgYxlISjT9h?= =?us-ascii?q?dyW1G7QaqSHNVL7QmrNQDxMDcCN8LtVI4Lgz3gZTIs7Wkcj12aRmjvEvBFdKS0?= =?us-ascii?q?fhltuvZcMUP2G3LEnHC1qTNLSaOT3LxNn6bri9Sb1fi+VUsQa9tiuFHED4PzSM?= =?us-ascii?q?jT/pWwqoMeFWgyGRJAZet52lchZxFWjjS8rrZQe0MNBtkz0536Y5hnTSNWECNz?= =?us-ascii?q?h8dllCrryU7SxDhfV+FHZN7n1/LemLgyyZ9fXXKo4Ksft3BSR5j/5a4HM/y7dP?= =?us-ascii?q?9iFEQ/10lzXUrtF1uVGmlfeAyjl8XRVSrTZLgZ6Esl95OaXF7JVAX2jL/A4V52?= =?us-ascii?q?WKFxsKv8dlCsHou61IydjOlKbzJylZ/tLR+sscCcbUJ9ybMHo9MRrpHzvUAxUf?= =?us-ascii?q?QT6tK27fm1RXkOuO+X2Nspg6tp/slYIPSr9dSFw6CPcaBVpgHNMcPJd3RDMlnK?= =?us-ascii?q?WcjM4Q+3W+qhzRS99bvpDDTf2SBvruJCyejbleaBsC2an4IpgLNo3nx0xibUF3?= =?us-ascii?q?nILUFEXKWdBAuS5hbggvoEVR6nd+SHYz20Hkag+35n8cC+K0lAYsigRieeQt6C?= =?us-ascii?q?vs41AvK1rQuiQwi1c+ls//gT+NcD78N7y/XYBMCyXpsEgxPIv7QxxrYgyyh0Bk?= =?us-ascii?q?MinLR65Jhbt6aW9rkBPcuYdIGfNEUKJEZxkQxfeKaPo21VRcqz6qylVZ6uvfDp?= =?us-ascii?q?tujgwqcYSjr3hYwQJscMY1JbDMJKpO1lVfm7iBvjGp1u8s2w8TPFwC8HmIeC4P?= =?us-ascii?q?tk0ILacpKDa1/ux26AyChztCdHIKV/U0vvJg7lk9NPiYzyL8z75DLVi8N+KFL6?= =?us-ascii?q?yHpmfAjtSHQlUs1kMPjElI5qJ53tsmc0aOUEAv1rSRHQwTNcXeMQFVc9ZS9H/L?= =?us-ascii?q?cCaKtuXN24x6P4O8F+DvVuKOu6AUgl++EAYuBYQM4dwLHoOw30HAMcfnMLkFxA?= =?us-ascii?q?025Av1IFWFDfJJeA+EkTocv86/y5p30pVHKTEGHWVxKyO36ajLpgUymvqMQM82?= =?us-ascii?q?YmsGXosDLn82W9e6mi5DsHRGEDm30vkUyAeF7z/kuivcFj/8YMR/ZP2MfxNjFM?= =?us-ascii?q?m2+Skj86ixkVPX7pTeJ2T9NdR+ut/O6fgXqIuGC/JUV7ZyqF3Qm49GSHy2S2TP?= =?us-ascii?q?C8K6J4Dsa4kwatz5Ena6UluhhDI7UcjxJs2gLqmWjg72W4lYqo6b3CosNcWlDD?= =?us-ascii?q?ERBw9wp/0f5KJ7fQAMeZ47YR/0uAsgL6O/JQeZ0tOpQ2arMzRbVOJQzeSgaLxR?= =?us-ascii?q?1iYsYPK6xGEmTp4k0+m96VQNS40SjhHC2fajYJFTXjPtFXxbYAjAvzc2l3Z/Oe?= =?us-ascii?q?Yo2ecw2gnIsFkGPzCMbuxpZ3ROv8sgClOKPXV2Fm04SkeTjYre4w6s27QS8DVY?= =?us-ascii?q?n9tPzOJKrmPxvp7FbzKqQqCrro/VsyU4Z9g8v6JxKZDjIteBtJ7GhDzfSpjQvR?= =?us-ascii?q?GFUC69E/pagcBeLjtFTvdShWwrPtcLtpZG6Uo0SsgxPadPCLU2qrCsdzVkETYY?= =?us-ascii?q?zTUFWIOYwDwCnuC81qPAlhiNbZsvKxMEsJBNg9cHVS55fD8erre5V4rKj2+EVn?= =?us-ascii?q?QLIAAL4AtQ5gIPjJN/c/v574rPSJ9Mzz9WrOxuUivXCJZn61v7RnuRgVjiR/Wr?= =?us-ascii?q?i/ap0h5KzPLwztkbXwZyCVJHyOZMkUsnM6p6K7UKvoHQrD+Ha0f6vGPryOupIF?= =?us-ascii?q?lRyMLUd13kDIrLr2X8SCgc9WcSRYBR1HHVDY4SnBZhaKY3uFVMJ5ire0bk6Dw/?= =?us-ascii?q?3YtpGri4VcawylYksXYJXTyqHMZbBO18tlLYRiFlaYixqJr5I5VSXnNQ+JqFpl?= =?us-ascii?q?ZXikliLy65yZtZK8FM+DEMXyNCoTSDs9SsVsJPw8h2D4UDIt1noXfyBLtEOISN?= =?us-ascii?q?o30xorHg0GXZ+y06sFugxzW+AK64T+NY/20CAQolPWKepVczD+E06Gfd7kjNsk?= =?us-ascii?q?xo/+dcHrWPgl9xryx7HpBSHTtJ1HelLlp1THlas+VVNqXVc8pAQ/Ysfx+jIRo+?= =?us-ascii?q?GuA630aR50F7gW/5YzButgtd4y3dQw40VSwOj7fxhTEer9qoNSUcS51WcTUrdz?= =?us-ascii?q?3FJB6DmSBLoBZfbFlnW5ADDdZf4b4b2ZZb89HfRkmyMSEFRAJtNgYm3vpFj0JD?= =?us-ascii?q?t1+YeS/FBwqyafnPqgF3fduWrMOxLvT5+xlIh5j6v+8m7KUMWWemmRGzTt/DtY?= =?us-ascii?q?P8sMOFtleWfqfiL+K8eWPBTCTLjR2onrgkAYXF8zTRPQZGJZR30mYrYZ/kCWHX?= =?us-ascii?q?JxtGPL4bK1BdVa9kddVMuvpaaNN8eKYV5a9tAQqKRgnxF4OyrPlJNErTSC/aLy?= =?us-ascii?q?WG7Oywv5zf4qDaSef9eMOA3XDHTLxrPp1i8zn0B6/q0ZNC+krxwvpt7lh6SUTc?= =?us-ascii?q?PC+csNTsPRgL5M6/dkv4opImAzXWAItqkHX3wkFMbc0XQzel8J4A0pNW9G7wSf?= =?us-ascii?q?5k0kj0qOBS66Nk5pcp7L900sq0OKPSKehAsUB9HBiUBwJq9pEzD2hjXWxRZfUR?= =?us-ascii?q?KPjJd6QDkc/us/z3F7AQ6BCN5uNZb8HIKlrclcm5ED6QUxtEnB0OqTQCNAuTy+?= =?us-ascii?q?aFm7NoScaiveX52Fgi40K5Lh4dyLBi/5mE97GNpO/KaxvR0bkEVbTrRszpqLQs?= =?us-ascii?q?oFme5fo+lL4BYmZ1eRGoEPABVs4BwWft1aIqwjgqE8PNBbLg/+NMWGwikzL8gZ?= =?us-ascii?q?99GU4WGvQOEbqN44tegn8ym/bFOd0ObqBChmGPGAaiEr8G0nOr6i2XIGx/jhHP?= =?us-ascii?q?1RHwT3mz40XtrS9kWyvM0svsklZIVrmtG0heRS2pOVV3sDmXJgrnqML3ubgp7E?= =?us-ascii?q?ExKmHkstONm3emOLNTBcL/P8aQISgzpFIQl50xXcei2YUUFNuyOtsR92t+bvTG?= =?us-ascii?q?4WOxjyBBu7tHh5bZ4syN5vrYB32ggLOBq7WRxDFYzWM1vUoj5dChKP7O4cGKQ/?= =?us-ascii?q?Wy2GoLSSdwpRfBVQavqrPHt1AUJVCL0EDTlYwOJdFZ2Hk121ro5Oc9Xd0z8x9e?= =?us-ascii?q?GZzYZ/MYojDzOiX7zkqDY94tUSmeyTRXFErvEVZkAKg8xH7wvMXRmHfV/10nWI?= =?us-ascii?q?xwd0v5ihxzFIg4Jlwi6F8MwiobCwcNdRGbA6usBUTkK4sESVYMaRCD3Li7dac4?= =?us-ascii?q?w0tzza+x6+PJa+xzGbYNPO5HjgGShFhbBo4WsaoGTbJ+el9d8bXapg38BInnQf?= =?us-ascii?q?fmj3swNfu6QsxA98AWqWci6B6lRxW88ZdD86obiJeQe65FYJnDptpz4Ft86D4U?= =?us-ascii?q?aCNNnAZwgA+jXeAbvuDj7cDRsIC05ea2SKYtW+IX+gAvCGR/lJvxjkosodPW1+?= =?us-ascii?q?dAUo3ak5n/8ARWLnGWv4bVzgdzJvATK4Kxe7Zg7W8IKzIZJ3IUMtqcc+M87DN1?= =?us-ascii?q?MDXP+1xCBdsBZcsCM8rRhQ9UikPoWLZJ9srYA1OYEJl8d8Qp72rx1TA0/oAxUv?= =?us-ascii?q?765z+qOZ/f719MP/RZjCVvjt7Cp/YaweDUCCcJ5XmVcR91wjmNy5OVEfb/4f2M?= =?us-ascii?q?yM3IV1MBBiM2T51dKySG+QO9QOq6io7kXR6V6s/8gZI+aFifRmerk6Qfr6ZAC+?= =?us-ascii?q?hAhTvn3jJGDID6m+qVs8aw6GtQrlBHH5x87QfbF6VDPpV2IhD4lsi3RkdiBivw?= =?us-ascii?q?YtzUdgE0tOqQ2OgM//10N1Hiao8DPhIE17X65GJaTgRwTr72olGZXeUWaNt9Vv?= =?us-ascii?q?zEqnFV6YR9K64AJ1WdoILlri1IqV8sGgMpbqE/riBCfEnUgAJVQ7r0uKIHigYE?= =?us-ascii?q?VN55vklMGX6/OG0g/DfHUKVVg7OXCPML7jWSQKsOU19rMiNlWR+13othe6exl/?= =?us-ascii?q?BdrmxGhj99oOQt0zF+SxuzpTbsp7kU1Tw997+2sjQBuXpYTuSRiCrIBlBDw+4M?= =?us-ascii?q?jagCEXri7ka8YHYbZovo/LZnPdjg9ZUm43knYxUjeC0GXeK6By7sj6OIBpGPv8?= =?us-ascii?q?9dhR6MvsXOdryzLSkJO7QjyBLjWWJy0gzDkxZp6mcLRCuv7MM8LoWnJckl3jao?= =?us-ascii?q?GXTcdFsU46NJrtH+tVgQQesydFNu3WRj0s+cRiEXQ8zPAWk1hBA+aWpYaJJD9Q?= =?us-ascii?q?MaF64wjzaKoKZG8A8UYDPPH4Wr4IbQm9nH2WUnQdds2G3WurWPhok23319h9N0?= =?us-ascii?q?8imOtWwdd+zcVM9tDGb81oNbyeHlfPWtteYHSIp6x7i7Vv8NLNWj83Os2Jp2Qk?= =?us-ascii?q?+l2qgeH12hPe8BxrfaUz+lSWqcWeSKb2iDgS00Mkvz5Rm0NF04dt1Gr0gnMuvN?= =?us-ascii?q?npRcjRHuUatoRiWMol/W1HAjMeIfdw8tpIenehAFTO0PaOiYP+QuxuMxCEcUZX?= =?us-ascii?q?/TASR2E/O2sUKqnIVjPnVg4Eb6Yefq8g39MtudABoEEYncrpFv//y2XGSBNmF8?= =?us-ascii?q?zBdqJkl76//fF0gttu9ba5uehsbfh9Jn0eMebPdtNSo9usIPmoJ994abzd2GcR?= =?us-ascii?q?bLzpb9PdvVuOSXA+XDz0Q2fWFXSqIZYQTx54ogJN44VbrTHb9XvRkHAKg6R5sh?= =?us-ascii?q?N3zv+65oNgNzdRXRZK+1gsnsqeKHfJxUp2XZ7lgoNifTpwUDyuCoTQx8d52qiW?= =?us-ascii?q?v9IJQxRjJZsdJgERpnHIpKG8MFsQWnGZqUl7+hh9+24UN6tPcAsbDsBfDSyNS5?= =?us-ascii?q?w4JxUoBa5UyXPDbRA6xrjV5+jumph/fA04XxCdn8dt8eU+h7WGHFYKfcHoqjMj?= =?us-ascii?q?KOJt78e0le/r+SyLJ5SBSRazznUKedsS2kNelk4V8lxYBie+rT1jMt5anB2NTu?= =?us-ascii?q?f2FbujujrXmROZtY6FzFG/fTXwpQSfWf62ZlAawXYpfo9OcUL9Mt3sKQ4w9t4z?= =?us-ascii?q?ReyMGFObSurlfQ2kJncpLWNE/p2yc/WYkXLxWzKE8sgW7CqnTBGnRRNcmkJtNr?= =?us-ascii?q?gNaSFBDt4FNxmW41bG5bBmXoXcuROXQc28+mfw2F6gZLD9cFn+6qdk80saK8Sf?= =?us-ascii?q?VoOppbg+Wlqq0HnsxyJiHMWsdaJSfQI6FyPjVKE+XPq0IkYhkes7g6Qo01f4SB?= =?us-ascii?q?IFsbMEecziP/1Q/C0Uzvd9ywz6uIIT8W8nNdwL7f1zhDuRW5s+6DgsL/SLDZcI?= =?us-ascii?q?32XPnKPSogTD6VWTQyEUev+VejoPcEovuYIWEBrVAQYyKSDhMTp691odjXFG/T?= =?us-ascii?q?lvVpfIcWi/CCRyDwVCp4mbIwBilRtkCMROEMGBLLb3/nnGpcuAuiJuJD/XLlc7?= =?us-ascii?q?2U3KxVVPIKAoFUaP2WX8PYeexCJzcvjjgZN/yzcMbGr7Y4zF3ISXAUE7fM9FKE?= =?us-ascii?q?V06WQ+GcyyjtXYoLo4g+ojAo9c7Ini9rD6TIOK6Spzyr8o6/liaYo+zeVnI2bk?= =?us-ascii?q?wzmu0CBXeOwBhaJGEDEdEVt1nnQrScaEZUyHIpleVu1gcSdwRxVX1u0ntWnO26?= =?us-ascii?q?Gs1fUlMUg3muQOAYbF9pFjM850mK7RPuYdYYo8DcW3de9qcQSYoaNPQo84fXOK?= =?us-ascii?q?4Mz/so3z9ruzI6vDuHD1NcjwOF9KzQELh6xrJc+Wky5+t2UV2XQzPDbmjHzZKr?= =?us-ascii?q?C8BIxSdopXDpzM/Usf5wO7tUoIF5GksFDjxsKtDb4z9BTTK85AzntBahHS+BCC?= =?us-ascii?q?ke/S1OPisBMOFvwKszqB/Vcv7Z4F6U8qcmr1GmTw2MD/78w5BQIt343gW/Ly9Q?= =?us-ascii?q?eHOkEI4y4vtVncwTeos/bJK/GEjFJwPzSAWCtGRE+BznrrqsF8Zi2GgSkqwwbt?= =?us-ascii?q?ruWs1CFtTQ2nd4znhU1bIOy3GcBpXUYZi9o8xxATcUMYKwT2L3Z5nKFzr3vfEH?= =?us-ascii?q?lJwpEhW8cuIfaU5StdYUi33lYlWzsdP89ymMI6W6XTm0PMUHNpO4zWJJh/CSZc?= =?us-ascii?q?vV+/VeBC9fruAHgsTauCWb82yR?= X-IPAS-Result: =?us-ascii?q?A2HXBAAzpTVY/wHyM5BeHAEBBAEBCgEBFwEBBAEBCgEBgw0?= =?us-ascii?q?BAQEBAR+BWqRalnMkiCBTAQEBAQEBAQECAQJfKIIzGoIcAgQBAiQTFCALAwMJA?= =?us-ascii?q?QEXCCEICAMBLRURBwcLBRgEiEwEsSs9KgKLPAEBCAEBAQEjjzQRAYV9AQSObYt?= =?us-ascii?q?ikQKKHIYTkXZVXjYegzEcgV9whheCLgEBAQ?= Received: from unknown (HELO tarius.tycho.ncsc.mil) ([144.51.242.1]) by emsm-gh1-uea11.nsa.gov with ESMTP; 23 Nov 2016 14:22:43 +0000 Received: from prometheus.infosec.tycho.ncsc.mil (prometheus [192.168.25.40]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id uANEMgS3022019; Wed, 23 Nov 2016 09:22:43 -0500 Received: from tarius.tycho.ncsc.mil (tarius.infosec.tycho.ncsc.mil [144.51.242.1]) by prometheus.infosec.tycho.ncsc.mil (8.15.2/8.15.2) with ESMTP id uANEIf9C047346 for ; Wed, 23 Nov 2016 09:18:41 -0500 Received: from goalie.tycho.ncsc.mil (goalie [144.51.242.250]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id uANEIdEV020402 for ; Wed, 23 Nov 2016 09:18:41 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A1B4BAD5ozVY/4GlL8FeHAEBBAEBCgEBgzgBAQEBAYF5pFqSZYQVhiECgm0BAgEBAQEBAmIohGkCBCdSEBgIMVcHEohxsS89i2gBAQEHAiWVQwWObYtikQKQL5F2VYEUg08cgV88NIhFAQEB X-IPAS-Result: A1B4BAD5ozVY/4GlL8FeHAEBBAEBCgEBgzgBAQEBAYF5pFqSZYQVhiECgm0BAgEBAQEBAmIohGkCBCdSEBgIMVcHEohxsS89i2gBAQEHAiWVQwWObYtikQKQL5F2VYEUg08cgV88NIhFAQEB X-IronPort-AV: E=Sophos;i="5.31,538,1473134400"; d="scan'208";a="5840631" Received: from emsm-gh1-uea11.corp.nsa.gov (HELO emsm-gh1-uea11.nsa.gov) ([10.208.41.37]) by goalie.tycho.ncsc.mil with ESMTP; 23 Nov 2016 09:18:40 -0500 IronPort-PHdr: =?us-ascii?q?9a23=3AqyToaRVbQu/4BTA0IiywaE0KgGrV8LGtZVwlr6E/?= =?us-ascii?q?grcLSJyIuqrYbBGDt8tkgFKBZ4jH8fUM07OQ6PG7HzZfqsvR+Fk5M7V0Hycfjs?= =?us-ascii?q?sXmwFySOWkMmbcaMDQUiohAc5ZX0Vk9XzoeWJcGcL5ekGA6ibqtW1aFRrwLxd6?= =?us-ascii?q?KfroEYDOkcu3y/qy+5rOaAlUmTaxe71/IRG4oAnLqMUbg4RuJ6YyxxDUvnZGZu?= =?us-ascii?q?NayH9yK1mOhRj8/MCw/JBi8yRUpf0s8tNLXLv5caolU7FWFSwqPG8p6sLlsxnD?= =?us-ascii?q?VhaP6WAHUmoKiBpIAhPK4w/8U5zsryb1rOt92C2dPc3rUbA5XCmp4ql3RBP0ji?= =?us-ascii?q?oMKiU0+3/LhMNukK1boQqhpx1hzI7SfIGVL+d1cqfEcd8HWWZNQsNdWipcCY2+?= =?us-ascii?q?coQPFfIMM+ZGoYfgqVUArhywCguiBO701jNEmmX70bEg3ug9DQ3L2hErEdIUsH?= =?us-ascii?q?TTqdX4LKkcXvqzzKLVyTvDculW2Tjj54jOaRAqvPaBUq9qfsrXyEkgCQfFjleL?= =?us-ascii?q?pIzgITyV0uANvHKd7+pnWuOjkXIoqwZ0ojW2wMonl4rHhpoNx1zZ8Sh0zpw5KN?= =?us-ascii?q?K6RUJhfNKpEZtduzuHO4doRs4vRXxjtjwgxb0co5G7eTAHyJQ5yB7bbPyKa42I?= =?us-ascii?q?7QznVOaVOzh4gnVleb2lixmu9kis0Oz8Vs2s3FZLqCpKjMXMu2gQ2xHX5MWLUP?= =?us-ascii?q?Rw80W71TqS1g3e6vtILV0qmaffM5Ihx6Q/lpsXsUTNBC/2n0D2gbeLeUo+/Oio?= =?us-ascii?q?6vroYrHkppKHMo97lAX+MqA0lcy5BuQ5PRICUHSc+eS5zLHj51H2QK1Wjv0qla?= =?us-ascii?q?nUqIvaKtofpq64BQ9Vz4ki5g2jDzamzNsYnX4HIEhDeBKclYflIV7OIPfmDaT3?= =?us-ascii?q?v1P5mzdxxuvZFqbmH46INX/H1rD7cvI180dBzCIrxM1bopdTDasMZvn0Xwu5r9?= =?us-ascii?q?DDJgMoOAyzheD8AZNy0Z1aEW+XC7WYK4vKuEWJ/forKuKBIogPt3K1J/wo6/Dp?= =?us-ascii?q?l3MRg1IRfaC1m5AQbTTwBflvJQOZbHTwk/8AF3sHukw1S+muwF2LVXhJYG2/Wb?= =?us-ascii?q?kg4To4II2jBIbHAIuqhe+vxiC+S7FfYChkF0qDHHHzP9GIUvENZSaQCspsljgN?= =?us-ascii?q?U7+xDYQm0Ef950fB17N7I7+MqWUjvpX52Y0wvrWLmA=3D=3D?= X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0F4BAD5ozVY/4GlL8FeHAEBBAEBCgEBF?= =?us-ascii?q?wEBBAEBCgEBgw0BAQEBAYF5pFqSZYQVhiECgm0BAQEBAQEBAQIBAl8ogjMaAYI?= =?us-ascii?q?bAgQnUhAYCDFXBxKIcbEvPYtoAQEBBwIllUMFjm2LYpECkC+RdlWBFINPHIFfP?= =?us-ascii?q?DSIRQEBAQ?= X-IPAS-Result: =?us-ascii?q?A0F4BAD5ozVY/4GlL8FeHAEBBAEBCgEBFwEBBAEBCgEBgw0?= =?us-ascii?q?BAQEBAYF5pFqSZYQVhiECgm0BAQEBAQEBAQIBAl8ogjMaAYIbAgQnUhAYCDFXB?= =?us-ascii?q?xKIcbEvPYtoAQEBBwIllUMFjm2LYpECkC+RdlWBFINPHIFfPDSIRQEBAQ?= X-IronPort-AV: E=Sophos;i="5.31,538,1473120000"; d="scan'208";a="1013196" Received: from mail-il-dmz.mellanox.com (HELO mellanox.co.il) ([193.47.165.129]) by emsm-gh1-uea11.nsa.gov with ESMTP; 23 Nov 2016 14:18:38 +0000 Received: from Internal Mail-Server by MTLPINE1 (envelope-from danielj@mellanox.com) with ESMTPS (AES256-SHA encrypted); 23 Nov 2016 16:18:35 +0200 Received: from x-vnc01.mtx.labs.mlnx. (x-vnc01.mtx.labs.mlnx [10.12.150.16]) by labmailer.mlnx (8.13.8/8.13.8) with ESMTP id uANEHdrR021742; Wed, 23 Nov 2016 16:18:32 +0200 From: Dan Jurgens To: chrisw@sous-sol.org, paul@paul-moore.com, sds@tycho.nsa.gov, eparis@parisplace.org, dledford@redhat.com, sean.hefty@intel.com, hal.rosenstock@gmail.com Subject: [PATCH v6 7/9] selinux: Implement Infiniband PKey "Access" access vector Date: Wed, 23 Nov 2016 16:17:29 +0200 Message-Id: <1479910651-43246-8-git-send-email-danielj@mellanox.com> X-Mailer: git-send-email 1.7.1 In-Reply-To: <1479910651-43246-1-git-send-email-danielj@mellanox.com> References: <1479910651-43246-1-git-send-email-danielj@mellanox.com> X-Mailman-Approved-At: Wed, 23 Nov 2016 09:19:03 -0500 X-BeenThere: selinux@tycho.nsa.gov X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Security-Enhanced Linux \(SELinux\) mailing list" List-Post: List-Help: Cc: linux-rdma@vger.kernel.org, linux-security-module@vger.kernel.org, selinux@tycho.nsa.gov MIME-Version: 1.0 Errors-To: selinux-bounces@tycho.nsa.gov Sender: "Selinux" X-Virus-Scanned: ClamAV using ClamSMTP From: Daniel Jurgens Add a type and access vector for PKeys. Implement the ib_pkey_access hook to check that the caller has permission to access the PKey on the given subnet prefix. Add an interface to get the PKey SID. Walk the PKey ocontexts to find an entry for the given subnet prefix and pkey. Signed-off-by: Daniel Jurgens --- v2: - Use void* blobs for security structs. Paul Moore - Add pkey specific data to the audit log. Paul Moore - Don't introduce a new initial sid, use unlabeled. Stephen Smalley v3: - Reorder parameters to pkey_access hook. Paul Moore v6: - Remove blank lines and brackets on single statement else. James Morris --- include/linux/lsm_audit.h | 7 +++++++ security/lsm_audit.c | 11 ++++++++++ security/selinux/hooks.c | 22 ++++++++++++++++++++ security/selinux/include/classmap.h | 2 ++ security/selinux/include/security.h | 2 ++ security/selinux/ss/services.c | 40 +++++++++++++++++++++++++++++++++++++ 6 files changed, 84 insertions(+) diff --git a/include/linux/lsm_audit.h b/include/linux/lsm_audit.h index e58e577..402b770 100644 --- a/include/linux/lsm_audit.h +++ b/include/linux/lsm_audit.h @@ -45,6 +45,11 @@ struct lsm_ioctlop_audit { u16 cmd; }; +struct lsm_pkey_audit { + u64 subnet_prefix; + u16 pkey; +}; + /* Auxiliary data to use in generating the audit record. */ struct common_audit_data { char type; @@ -60,6 +65,7 @@ struct common_audit_data { #define LSM_AUDIT_DATA_DENTRY 10 #define LSM_AUDIT_DATA_IOCTL_OP 11 #define LSM_AUDIT_DATA_FILE 12 +#define LSM_AUDIT_DATA_PKEY 13 union { struct path path; struct dentry *dentry; @@ -77,6 +83,7 @@ struct common_audit_data { char *kmod_name; struct lsm_ioctlop_audit *op; struct file *file; + struct lsm_pkey_audit *pkey; } u; /* this union contains LSM specific data */ union { diff --git a/security/lsm_audit.c b/security/lsm_audit.c index 37f04da..8911360 100644 --- a/security/lsm_audit.c +++ b/security/lsm_audit.c @@ -410,6 +410,17 @@ static void dump_common_audit_data(struct audit_buffer *ab, audit_log_format(ab, " kmod="); audit_log_untrustedstring(ab, a->u.kmod_name); break; + case LSM_AUDIT_DATA_PKEY: { + struct in6_addr sbn_pfx; + + memset(&sbn_pfx.s6_addr, 0, + sizeof(sbn_pfx.s6_addr)); + memcpy(&sbn_pfx.s6_addr, &a->u.pkey->subnet_prefix, + sizeof(a->u.pkey->subnet_prefix)); + audit_log_format(ab, " pkey=0x%x subnet_prefix=%pI6c", + a->u.pkey->pkey, &sbn_pfx); + break; + } } /* switch (a->type) */ } diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index d87e29d..94eef1b 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c @@ -6086,6 +6086,27 @@ static int selinux_key_getsecurity(struct key *key, char **_buffer) #endif #ifdef CONFIG_SECURITY_INFINIBAND +static int selinux_ib_pkey_access(void *ib_sec, u64 subnet_prefix, u16 pkey_val) +{ + struct common_audit_data ad; + int err; + u32 sid = 0; + struct ib_security_struct *sec = ib_sec; + struct lsm_pkey_audit pkey; + + err = security_pkey_sid(subnet_prefix, pkey_val, &sid); + if (err) + return err; + + ad.type = LSM_AUDIT_DATA_PKEY; + pkey.subnet_prefix = subnet_prefix; + pkey.pkey = pkey_val; + ad.u.pkey = &pkey; + return avc_has_perm(sec->sid, sid, + SECCLASS_INFINIBAND_PKEY, + INFINIBAND_PKEY__ACCESS, &ad); +} + static int selinux_ib_alloc_security(void **ib_sec) { struct ib_security_struct *sec; @@ -6290,6 +6311,7 @@ static struct security_hook_list selinux_hooks[] = { LSM_HOOK_INIT(tun_dev_attach, selinux_tun_dev_attach), LSM_HOOK_INIT(tun_dev_open, selinux_tun_dev_open), #ifdef CONFIG_SECURITY_INFINIBAND + LSM_HOOK_INIT(ib_pkey_access, selinux_ib_pkey_access), LSM_HOOK_INIT(ib_alloc_security, selinux_ib_alloc_security), LSM_HOOK_INIT(ib_free_security, selinux_ib_free_security), #endif diff --git a/security/selinux/include/classmap.h b/security/selinux/include/classmap.h index 1f1f4b2..d42dd4d 100644 --- a/security/selinux/include/classmap.h +++ b/security/selinux/include/classmap.h @@ -165,5 +165,7 @@ struct security_class_mapping secclass_map[] = { { COMMON_CAP_PERMS, NULL } }, { "cap2_userns", { COMMON_CAP2_PERMS, NULL } }, + { "infiniband_pkey", + { "access", NULL } }, { NULL } }; diff --git a/security/selinux/include/security.h b/security/selinux/include/security.h index 6bb9b0a..17afb7c 100644 --- a/security/selinux/include/security.h +++ b/security/selinux/include/security.h @@ -176,6 +176,8 @@ int security_get_user_sids(u32 callsid, char *username, int security_port_sid(u8 protocol, u16 port, u32 *out_sid); +int security_pkey_sid(u64 subnet_prefix, u16 pkey_num, u32 *out_sid); + int security_netif_sid(char *name, u32 *if_sid); int security_node_sid(u16 domain, void *addr, u32 addrlen, diff --git a/security/selinux/ss/services.c b/security/selinux/ss/services.c index 082b20c..9215cf6 100644 --- a/security/selinux/ss/services.c +++ b/security/selinux/ss/services.c @@ -2203,6 +2203,46 @@ int security_port_sid(u8 protocol, u16 port, u32 *out_sid) } /** + * security_pkey_sid - Obtain the SID for a pkey. + * @subnet_prefix: Subnet Prefix + * @pkey_num: pkey number + * @out_sid: security identifier + */ +int security_pkey_sid(u64 subnet_prefix, u16 pkey_num, u32 *out_sid) +{ + struct ocontext *c; + int rc = 0; + + read_lock(&policy_rwlock); + + c = policydb.ocontexts[OCON_PKEY]; + while (c) { + if (c->u.pkey.low_pkey <= pkey_num && + c->u.pkey.high_pkey >= pkey_num && + c->u.pkey.subnet_prefix == subnet_prefix) + break; + + c = c->next; + } + + if (c) { + if (!c->sid[0]) { + rc = sidtab_context_to_sid(&sidtab, + &c->context[0], + &c->sid[0]); + if (rc) + goto out; + } + *out_sid = c->sid[0]; + } else + *out_sid = SECINITSID_UNLABELED; + +out: + read_unlock(&policy_rwlock); + return rc; +} + +/** * security_netif_sid - Obtain the SID for a network interface. * @name: interface name * @if_sid: interface SID