From patchwork Tue May 9 20:50:42 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Daniel Jurgens X-Patchwork-Id: 9718961 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id D625560364 for ; Tue, 9 May 2017 20:52:20 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id C823A2848B for ; Tue, 9 May 2017 20:52:20 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id BCB2E28389; Tue, 9 May 2017 20:52:20 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.2 required=2.0 tests=BAYES_00, RCVD_IN_DNSWL_MED, UNPARSEABLE_RELAY autolearn=ham version=3.3.1 Received: from emsm-gh1-uea11.nsa.gov (smtp.nsa.gov [8.44.101.9]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id C8DF028389 for ; Tue, 9 May 2017 20:52:19 +0000 (UTC) X-IronPort-AV: E=Sophos;i="5.38,316,1491264000"; d="scan'208";a="5619597" IronPort-PHdr: =?us-ascii?q?9a23=3A6PBBmBzBUA3bwN3XCy+O+j09IxM/srCxBDY+r6Qd?= =?us-ascii?q?1esUIvad9pjvdHbS+e9qxAeQG96KtLQc0qGP6fCocFdDyK7JiGoFfp1IWk1Nou?= =?us-ascii?q?QttCtkPvS4D1bmJuXhdS0wEZcKflZk+3amLRodQ56mNBXdrXKo8DEdBAj0OxZr?= =?us-ascii?q?KeTpAI7SiNm82/yv95HJbQhFgDiwbaluIBmrogndq9cajIh/Iast1xXFpWdFdf?= =?us-ascii?q?5Lzm1yP1KTmBj85sa0/JF99ilbpuws+c1dX6jkZqo0VbNXAigoPGAz/83rqALM?= =?us-ascii?q?TRCT6XsGU2UZiQRHDg7Y5xznRJjxsy/6tu1g2CmGOMD9UL45VSi+46ptVRTnhj?= =?us-ascii?q?0HNzok+2/JjMJ+gr9QrBa4qxBi34LYZYeYP+d8cKzAZ9MXXWpPUNhMWSJPAY2y?= =?us-ascii?q?aIkAD+QZPetasoXwqUUBrQClCAWwGO/i0CNEi2Xq0aEm1ekqDAHI3BYnH9ILqH?= =?us-ascii?q?naos/6NKEPWu6x0anI1zrDYO1Q2Tfm9YPFdQ0uruuKXbJxb8XRzUsvGhjAjlqO?= =?us-ascii?q?rYzlOyma1uIKs2mU9eZvSeWvi2s+pgx3vzOhxd8sh5HUio8axV3I7yV0zJsvKd?= =?us-ascii?q?GmR0N3f8SoHIZIuy2HM4Z7TNkuTm5qtSog17ELuJ62cDIXxJg5wxPSbeGMfZKS?= =?us-ascii?q?7RL5TumRJC91hHdieL2imRm/6VOgyujgVsms11ZKszZFnsHMtn8T0xzT7dCKSu?= =?us-ascii?q?dn8Ue72DaPyhvT5vtYIUE0iaXbK5khzqQ2lpUPqkTMAjX6mED3jK+Sbkkk++6o?= =?us-ascii?q?5Pr7Yrj+u5OROIB5hhv+P6gzgMCzH+s1PhYUU2SG4ei80afs/Uz9QLVElP02la?= =?us-ascii?q?zZvYjBJcsFoq65AglV0pss6hqmFDim18kYnX8bI11bYxKKlJTpOlHSL/D4Cvez?= =?us-ascii?q?mVKskCxxyPzcMb3hBYvNImDZkLj9ZbZ991JcyA0rwNBd4JJUDKsOIO7zWkDrst?= =?us-ascii?q?zVFR05Mwuyw+biEtp9zZ8eVnyVAq+CKq/StkWI5u03KemWeIAVoCr9K+Qi5/P2?= =?us-ascii?q?j385m0UScrWq3ZsMb3C4GPVmI1uCbHrihtcBDGgLsREjTOzslF2CTCRfZ3GoX6?= =?us-ascii?q?Iz/js7Ep6pDZ/fRoCxh7yMxD+7EYNNaW9YDFCMEGvod4KfVvcNdi2dPNFuniYD?= =?us-ascii?q?Vbi7RI8rzQuuuxPiy7p7MurU/TUVuo/k1Nhz4e3ciA899Th1D8mGyW6CUXt0nm?= =?us-ascii?q?QSSz8xxqB/rlR3yk2f3qhgn/xYCdtT6utUXQcmL5Hc1fd3BMz1WgLEYtiGUk2m?= =?us-ascii?q?Qsm8DTE3UN0x38cEY1xhFNW6khDDwy2qDqcUl7yNGJw77Kbc0Gb0J8lj13bGzq?= =?us-ascii?q?kggkIhQstXK2KmgKt/+BLSB47NiEqZkKmreb4b3C7X+2eJ1XCOs11AUA5sTaXF?= =?us-ascii?q?WmgSZ0vXrNT+4EPPVLquCbA+PgtAz86OMK1KZcfzjVVFRffjJsrRb3i3m2iuGR?= =?us-ascii?q?aC3qmMY5bye2UBwCXdD1AJnBsI8nqBMQg+Bzyho37FDDB0DlLgfV/j/fNlqHyl?= =?us-ascii?q?Sk80zgeKb1Bu1reu5hEUheacS+4I3r4etiYusSl0HE2639LQEdaAoBBhfKpEa9?= =?us-ascii?q?Mn/FhHzX7ZtxB6PpG4Ma9inkQRcx52v0P1zBh3Ep9PkdIrrHMx1ApyLbiX309f?= =?us-ascii?q?eD+C2pDwILLXIHHo/B+zc67Wxk3e0NGO96YB6fQ4r1Djsx+zFkc5/XVozcRa03?= =?us-ascii?q?yG5prQFAoSS5XxUkQp+Bdmu7HWeC4955nb1Xd0K6m7rifC2841BOsi0hugcc1f?= =?us-ascii?q?P7mCFADuEs0aHNOjKOkym1iodx4EJ+5T9LUuM8OhbfuG17ahPPx8kzK+kWRH/I?= =?us-ascii?q?d931qP9yVmSe7I2IsFzuqb3gSdVDf8i0qhvtrwmYBeajEYBnC/xjT8BI5Neq1y?= =?us-ascii?q?ep4GBn2zLM2tx9VxmYTtVmVC+1G/AlMKwsipeQCdb1blxw1fyVwXoWC7mSu/1z?= =?us-ascii?q?F7jysmrq6B0yzV3+TjdB0HN3VQRGZ+jFfjP460j8wbXEeydQQpkgWq5VrizahB?= =?us-ascii?q?uKt/N3XTQVtPfyXuNGFiXLGwtr2ZY85T854oqiNXUOOyYFCfULH9pQEW0yX9EG?= =?us-ascii?q?tC3Do7bS2luo3lnxxmj2KQNHhyo2DdecFs2xjf/sfcSOVP3jUYXil3kiTXBl2m?= =?us-ascii?q?M9mu59WUmI/JsvqiWGK5Sp1TbS7rwJuctCSm+GJqAAewn/Sol9L7Fgg61DP02M?= =?us-ascii?q?NxVSXUthr8ZJfk17iiO+J9YkZoHEP869Z9GoxmjIswhY0f2WQdhpWP53YIjWfz?= =?us-ascii?q?MdJd2aLxd3cNQT8Lw9jP7wj/301vNHWJx5j2Vn+F2Mtue8G6Yn8K2iI6981KDK?= =?us-ascii?q?aU7KdYnSdsuVq3swbRYfl7njcAxvoj82Uag/kIuAorzyWSHqsSEVNePSPyixSC?= =?us-ascii?q?98q+o7lPZGazbbiw01JzncqmDLGGpgFTRmz5dYslHS5+9ch/K0/M32Ho6o3+f9?= =?us-ascii?q?nQd90TvAWOkxjcl+hVNI4xlv0SiCp/I239oHklx/QhghB0xp66u4yHK3lq/KK/?= =?us-ascii?q?GRNYMyH5Z8UU+j7xl6pemNiZ35y3FJV7BjoLRIfoTe6vED8KtvToKQCOECYnp3?= =?us-ascii?q?eYB7XfGxSf6EF4oHLTCZyrMGuXJHYBx9V4WBadPFBfgBwTXDgihp42DB2qxMj/?= =?us-ascii?q?f0dh/D8R4EL4pQVWyu9zKhn/SXnQpB2zajsuU5ifKwdW7hte6EjLP8ye6fhzHy?= =?us-ascii?q?5G8ZG7qgyCNHCbbRxSDW4VQkyEG0zjPr626Nne9eiXG/GzL+XIYbqTqexSTfGI?= =?us-ascii?q?yoyz0oF+5TaDKt2PPmV+D/08wkdDRWp2G9ndmzgUVyMXlj7Nbs6CqBey4CJ3qN?= =?us-ascii?q?qz8PPxWALg/YGPEaddMc1z+xCqhqeOL+2QhSZ9KTlGzZ4MwHjIyLYR3FEMlyFu?= =?us-ascii?q?azmtEbMFtSHTVq7QnLFYDwIDYSNpKMRI97483hVKOcPDhNP6zLh4juIyC1dATl?= =?us-ascii?q?HhlN+matENI2GnLlzHHFyLNLOEJTLV3873fbmwSbpKjOVbrxewoyqUE1f/PjSf?= =?us-ascii?q?kDnkTwqvPftCjS2BORxRooW9chFtCGX4Vt3pdhi7PMVwjT0szr0+nmnKOnIEMT?= =?us-ascii?q?hgb0NNqaWd7S1CgvphBmNB9WBqLe+Ymyae9OnVMYwZvuduAihukOJa+ns6waNP?= =?us-ascii?q?7C5YXPx1hDfSrtl2rlGgiOmA0CJnUAJVpzZFhYKLp15iObnX9plBX3bL5hQN4n?= =?us-ascii?q?mRCxsQo9tpENrvu7pfytLXjqL8NC9C887I/csbH8XbNdmHP2Q7PhrmAj7bFhUF?= =?us-ascii?q?QCWwNW7FhExdjeuS+WePopg+t5jsnoABSqVCWFwpEfMaCURkHNsYLJdxQDwkja?= =?us-ascii?q?aRjNQU6nqmsBnRWMJas4jBVvKTBfXvLCiWjaJfahQS37z4N4MTOpf820x4ZVlw?= =?us-ascii?q?hJ7KFFbIXdBRvi1haRc5r15M8HhxSW0z3VnoZR6z73AIFP67hBg2hhF5YeQ3+z?= =?us-ascii?q?fm+003KUbSpCssjEkxns3ojiqecDHrMqe/Q5pbCy3st0cvNJP7Rhx6bQy2nUN/?= =?us-ascii?q?MzfFSKhdj7x6dWBkkAXco4dAGeZATa1YZx8d3e2XZ/It0VhGsCWnwk5G6vXDCZ?= =?us-ascii?q?R5jgsqdoCjr3Fb1g1/a941ILDfK7BSzlhMnK6OuDGn1vwpyg8EO0kN6H+SeDIP?= =?us-ascii?q?uEEQMLkpOTCn/uh35AyBnDtDY3QMWOAsovJx9UM9Ov6MzyT+3L5fMkqxLfCQL7?= =?us-ascii?q?uFu2jcks6FWkkw2V0Tl0Zb57d2y9ssc0qPWk80zbuRDQkGNc3MKQFNdcpd6njS?= =?us-ascii?q?cTyIserT3ZJ/J5+9GfzwTe+SqKYUhVqpExszEIQS78QOA4Ks3VrCIsf9Nr4Fzh?= =?us-ascii?q?ss5B/1K1qZEfRJYhOLkCsHos2lyp94w5VdLCkHAWphKSW3+qrXpggyjfqHW9c2?= =?us-ascii?q?eGkVXo0FN3IxQ8C6lChZv2laADmwyOIZxxCI7yXgqSTIEDn8c91jae+PZRxyDN?= =?us-ascii?q?G2+DM/87W5iFPM7preIGT6Osh4td/U9eMWvZCHBO1ITbNlqUfTh5FYR2C2U27I?= =?us-ascii?q?CdO6OoT/a4wrbdzyFna2T0eyiywrQMfrPdasL6+IgQfySYZSroabwCgpNdWhGT?= =?us-ascii?q?EGBxdwu+YD6bp/ZQ0ZY5s0exjotxg+N6GkLweY1c2uTHq3JTtQUfZf0f2wZ6ZL?= =?us-ascii?q?wCo0cu+61HwgQ4kmz+m29E4NQ40KjhHexPu4eoZeUCjyFWZGdAnVoyo2iXRhPP?= =?us-ascii?q?4owugj2BPIrUUcMzeTeexmcmxLpdc8BU+JLHV3DWo5SVmcjZbD4gGy3rAS+Tdd?= =?us-ascii?q?kMhO0eFftnjxoIPfaiq2WKO3sZXVrzYgbd8+rqJrNYzjI9eJu43GkTzaTJjQtA?= =?us-ascii?q?qFUCigGPdBgddQIThXQP9RlWErJMwKo4xB5lQtVs0mPbxAFLEspqy2aTpjFSMd?= =?us-ascii?q?1jEWV4Wb0TMYn+i8xaXVlg2LcJs4KhwFsI9OgtwHUy55eikevrOsV53Kl2+YTW?= =?us-ascii?q?gGOB0T7QJN5A0clo9weeTl4JHQQpFV1jBYue55XCzQG5Z08Fv7T32ZjkLjSPW9?= =?us-ascii?q?ieCp2xxdzO702NkBRBF/EVRdx/pRlkYwNL53KbMfsZLRvzCUckP6uGbtyOq4K1?= =?us-ascii?q?lL1c3baUH3DIrfuWr7SC0c9mUeRZVTx3HHCZQSjw15Zb4xpFpWOoCmfV3x6ic4?= =?us-ascii?q?x4RzBba4S96kx1IkrXYASCeqF9tBC+5msFLLVj1qeYqrqJD/N5VUXGBQ5IWXq0?= =?us-ascii?q?1Fn0V1Ly651Z1cJtlD4zIWQDdPoTSdvN6zSMJZ2s97FJ4MLclhtHjjAq9EP4KR?= =?us-ascii?q?o3IusLz11nDZ4yw8sEu9xDirA6+4SOZZ8HcEGgQnIGSerkcvAvAp8mfV9VDNqU?= =?us-ascii?q?578PtBBriIlkVxuzd9HpZBBjpT0nClNVtzRmFcs+pGMKTVb9BcQ/4qaBC1IRw+?= =?us-ascii?q?CPgm01aK/UxvnHf5Yi1ythdB9CzHWQk7SzUViK/3mTICssGnJSMaS5VQYDU9aC?= =?us-ascii?q?fFLhmWmTxLsBZacE5mQZYZDchZ+7sDx4tb4tLCSVqwKSECRBFiNhg30eBFmk5H?= =?us-ascii?q?rUqVYj3SAhSwdfbXrBJ3edmerNSzIPT+5gdHhZvtsPok+KUbW32mhQqtTMjcr4?= =?us-ascii?q?/7qNKHrVaBe7njM+Kie3/BUCbDgg2qibciEZbK4zDZMBBHJJli1XokfZ/hBHbQ?= =?us-ascii?q?MhRIO60XO0hWWb10ZNhdvu9aYMpkd7oT9q92GhKLXBXvF5KzrPNeNFbcWSzeLz?= =?us-ascii?q?md8uy4uY/T96LSRvXgZsOW23bKWKZ3PpBk6TblBbvlzYhe9Vfo1ft38EN1V0TG?= =?us-ascii?q?OTibrNv9PgML+NWidkz6s50xBjPWHI1/n2fxxkxbbMoXRDCq8I4Ex5xH7nbwVf?= =?us-ascii?q?h43VL3sOFI8Llk84Y36ahzycioPafSNehasUh/DxiIHAVl6IsiD3VkSmBMZu8R?= =?us-ascii?q?NO3Rcr4HjcDvrOD3E7IY6AGP9+xec9vHKFnLmtOjBTGEVRxEgAABpCYfLgSG0/?= =?us-ascii?q?6Fn7F7Sdq5pefjwE0g+F6+IQAazLB2+YiL4LKIq/HNYxvX07cERrDgRtnvobQ0?= =?us-ascii?q?p0OS+fokmaYMemNveQ2nF/MdVsoHyWf+1q0qyD8sE8ffH7Lh5PFDVmg2njT7m5?= =?us-ascii?q?xnGFUWAPwUF6KR/YtChmc4h/DZNtoOf6BAgGmPExCkEqUFyXG29SSaO3VljQvI?= =?us-ascii?q?0xHrRmO/9ln2ojFkQSHU1dfsjlJVVqWrBUdVRyepNlJ4sDKLPArsqtX3vL8441?= =?us-ascii?q?woPWP/tdKCjm2hNKlQH83lK9yWOTM0q04PjJ0tWtyv3pgWGdy5INoK8XF+aP7e?= =?us-ascii?q?53mqky9HradHnZDR4tqJ+vXNAHmvk7Gaq6iXxD9G0HQ4uks/6t+4PPHU+9KKW+?= =?us-ascii?q?io13oWTypnvgvBWBi1qqDUr18KIkGL1UbLl5YMPt5HwXk52Ebm5PIgQNIo7gle?= =?us-ascii?q?EJjPZ+8arzDpJDT02UqfY84wViSGyTtYA0/6HEJ3GKg512P8psTJmmnM+1cwXI?= =?us-ascii?q?l/a1TnhQBrD4U/MU8t7EMXwi8DHAUWZxCUEqynBUP/LYQeTUgDcxOH3Lqkdagr?= =?us-ascii?q?wU1/2LSv5PXcbeZkHaoCKu5djhKSnFhcAp8WqrcRQKxmdF9S6qHXvRPvC5P9UP?= =?us-ascii?q?j4j3UwOuO6QttA/cAfqXQi/h61RwC85pdb87YblJeIe7ZGYZjNucBx9EJn6iAP?= =?us-ascii?q?dyNTmhh/jhW5Ue8GqODl/NfbrIKi6vyyW6Y1W+UX6x80Cnx/j5rxml8su83Y2v?= =?us-ascii?q?xHSoLLlYTw7hxCL2SNuIbA3Bl2MfAOJJ6zfLZ863UHIDATKGkPPdqNZfgz+S1t?= =?us-ascii?q?MDTP51xaGMwMeNcYMdHRlgBTl0LmRqtc9tfBGl+fEYd8bdok723tyDA66ZE8SP?= =?us-ascii?q?rv6CeqJZDD6FFAJ+tDgz9wlN3epOgUz/3SCDIU4XWAcBh63CeCy5iLC/bt8uSB?= =?us-ascii?q?08nUWEkaHiEqU4dcKj2C+RakRuavl5XmTBmU6sntj5I6bk6QQWaxnKsduKZWDe?= =?us-ascii?q?FAkjn73iRZFo3tm/KVqcSj6G9NuV1BDol+9gDKGKRQPpV6JRT3jNKrSVJmBivi?= =?us-ascii?q?Ys3UcAQhuPaOzOcW/+p+L1f+ZZMcIh8cxLL182BVQRVySL72pVuZWeMRZMd4R/?= =?us-ascii?q?PEtH9V9JlgJ7UJPFeDuJzgti1Ip0wuAA81dL8wqSRXdkbQkw1TR6b0v7kAhgwH?= =?us-ascii?q?UdFnvU9MGGSwOH8x5jfcUaRakrORCfwP/TmJSKwBTVloODtkQxypwJVuZ6epnf?= =?us-ascii?q?dfv2NAnyNyvP8q0zh8SxunoyHspqUN2TU7+LGjrzgBvHNIT+qEnyfPE1VDw+wA?= =?us-ascii?q?jb0ABHb69Vy8fH4DYZP94LZ7PsTg7pAt7Wkwbxslfi0GW/mgCi7rgqOHB4yAqt?= =?us-ascii?q?RciwCXtMXJd7+zIjAYNq4hxhL7W3h9zg/ekQ5q8GsMQjWg6sUoK5m9OcYh2yqn?= =?us-ascii?q?BGnadFcK4qNSs8vxtEUGTPU3aVN/2mpj1tWIRiwXSMzJBWk1khAuaX9Yf5Jb9R?= =?us-ascii?q?8aC64ojy6JvqlY5A4UZizZEoC4+obNnMfI3mI9Qc1txmLMqa2Pnokq32F9m9No?= =?us-ascii?q?8i6Ov2wfd+7GXM9iDHjz0pxSyOLkaPWrrO8HVJFqyLK/X/8eKsOj43e52I12Wk?= =?us-ascii?q?+5wbQTB1W5MOsExrbVTSilTWmYVP+Qc2iLmTY5M1L96QOuLlIpdMdAt1U9Pffa?= =?us-ascii?q?hp5Aiw3hVqt5RieQpV7b1GwjNucadwMquIi5YAEKSe8RZ/SGJecw2vE+D0EMb3?= =?us-ascii?q?DRFytsF+C2qUKtnJR8O3h4/UX6YOHt/xv6MNuTBhYEEpDVrppr9fy8WG2BJWdq?= =?us-ascii?q?zAduM0ls6+ffC1Mxu/dZc5aQntjQhNN73PUHd/h3Mi09vdgTlZxl6YWO1seFbw?= =?us-ascii?q?3RxI7oJd7JuviYH+Hfz0Myd25BTLUZZx/16p4hPt49XL3TAadZvQoCCqcnWpAh?= =?us-ascii?q?MH3x9K5sJgNpbgHRfKi0gtXtpu+TaJtbuXvW7lMoLCjCoBACy/20TQl+b5+0nX?= =?us-ascii?q?XyJI4/SihGr913BRtsBJFPFN8Yrwq7H56Un7m2itGp+0Nguu8FrbT/B+vP1NS4?= =?us-ascii?q?w4VxRYZV6VaMPDbLC6lhml5lgfiqgvfczpnxDtvvedQAVOdlWWPFcrvGEZ+kKj?= =?us-ascii?q?KSO8LzZ1JG86SC371nSBmRYj72X7aevi2+KPpk+Vk7ypB/fOfLyDwt7rfb2Mb9?= =?us-ascii?q?Zm1CoiejrGWJNIdE7FHRBOzRRRRUSf2f/GZiB60XYpP+9P0SPtw63Nic/w5z4S?= =?us-ascii?q?xZ0MSbJ6ihr0nM2l90dJ7cI0XpxyY5VpcQIBuhKUsjm3TUqnfDDnRGKMirN81t?= =?us-ascii?q?j82IDhzi/UVxnnstZmFZEGryWdiRIXQb2965ZACS8QJEFcoMn+62eU4+sa2/Uv?= =?us-ascii?q?doOpRDmeq0sLUHkNBpKzzARcRAOCHQNrB2NCJLDurTvFgofgIEs78tV4c3f5eO?= =?us-ascii?q?I0QHP1ybxCPvywvCzU30d9ux1KaGICYW7m9Lz7Tb3jhQvwO5o+qWgtX/ULDFa5?= =?us-ascii?q?H7RPHSPzA+WTGARDQ9D0Kp9Ey6u/oApvWYOmYfok0ObiKUFgETurhlrcLMAW/L?= =?us-ascii?q?he1jYJoKieiYWyD1Ty14jrAyBidQtU2XRfoMDwzWYGHggGZGvwyiPPBM92r/b7?= =?us-ascii?q?KE3qpVR/AWAoxUf/2CTdvYfOxRKjYrmzgCJuazYcfcr7c401LPS2sVCa/I+0OC?= =?us-ascii?q?TB3efvvJ3D/vXIMIr6AoqyEo/ZTWhSYxHKPWbJiFoDv73oe+xASFo+LTUHJlN0?= =?us-ascii?q?A8huMPBGupxRRELGgCDMFTs0boFP3TL31Q3W4k3Lo9kyQHfx5+Bzg3inA=3D?= X-IPAS-Result: =?us-ascii?q?A2GuAwBSKxJZ/wHyM5BdHAEBBAEBCgEBFwEBBAEBCgEBgwE?= =?us-ascii?q?pgW6OdJBil3ooinJXAQEBAQEBAQECAQJoKIIzIoJBBgECeQMJAQEXCBkBDwgDA?= =?us-ascii?q?VMZBYhQgUwEtS0mAop7iD2EaoJwbAGFIAWQIoEBjGKNaoUxggKJFYZSiH2LQ1i?= =?us-ascii?q?BCk8hFUaEMIJGc4Y3Ag0XghcBAQE?= Received: from unknown (HELO tarius.tycho.ncsc.mil) ([144.51.242.1]) by emsm-gh1-uea11.nsa.gov with ESMTP; 09 May 2017 20:52:18 +0000 Received: from prometheus.infosec.tycho.ncsc.mil (prometheus [192.168.25.40]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id v49KqH6M005841; Tue, 9 May 2017 16:52:18 -0400 Received: from tarius.tycho.ncsc.mil (tarius.infosec.tycho.ncsc.mil [144.51.242.1]) by prometheus.infosec.tycho.ncsc.mil (8.15.2/8.15.2) with ESMTP id v49KpJL6149479 for ; Tue, 9 May 2017 16:51:19 -0400 Received: from goalie.tycho.ncsc.mil (goalie [144.51.242.250]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id v49KpH4w005429 for ; Tue, 9 May 2017 16:51:18 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A1B5AgDVKhJZf4GlL8FdHAEBBAEBCgEBgyyCF450kGKYAYYkAoVEAQIBAQEBAQITAQEhXYUWAwN5EBgIGQEXVxmIVYFQtSyKcAExiD2EaoJwbAGCBwyDDQWQIoEBjGKNaoUxggKPZ4h9i0NWgQtPIRVGhnY9NoY3Ag0XghcBAQE X-IPAS-Result: A1B5AgDVKhJZf4GlL8FdHAEBBAEBCgEBgyyCF450kGKYAYYkAoVEAQIBAQEBAQITAQEhXYUWAwN5EBgIGQEXVxmIVYFQtSyKcAExiD2EaoJwbAGCBwyDDQWQIoEBjGKNaoUxggKPZ4h9i0NWgQtPIRVGhnY9NoY3Ag0XghcBAQE X-IronPort-AV: E=Sophos;i="5.38,316,1491278400"; d="scan'208";a="6046341" Received: from emsm-gh1-uea11.corp.nsa.gov (HELO emsm-gh1-uea11.nsa.gov) ([10.208.41.37]) by goalie.tycho.ncsc.mil with ESMTP; 09 May 2017 16:51:17 -0400 IronPort-PHdr: =?us-ascii?q?9a23=3AeD19shC6FvURwsxhaulHUyQJP3N1i/DPJgcQr6Af?= =?us-ascii?q?oPdwSPv5oMbcNUDSrc9gkEXOFd2CrakV1KyO6uu5AzxIyK3CmUhKSIZLWR4BhJ?= =?us-ascii?q?detC0bK+nBN3fGKuX3ZTcxBsVIWQwt1Xi6NU9IBJS2PAWK8TW94jEIBxrwKxd+?= =?us-ascii?q?KPjrFY7OlcS30P2594HObwlSijewZbF/IA+qoQnMucUanJVuJ6UswRbVv3VEfP?= =?us-ascii?q?hby3l1LlyJhRb84cmw/J9n8ytOvv8q6tBNX6bncakmVLJUFDspPXw7683trhnD?= =?us-ascii?q?UBCA5mAAXWUMkxpHGBbK4RfnVZrsqCT6t+592C6HPc3qSL0/RDqv47t3RBLulS?= =?us-ascii?q?wKLCAy/n3JhcNsjaJbuBOhqAJ5w47Ie4GeKf5ycrrAcd8GWWZNW8BcXDFDDIyh?= =?us-ascii?q?dYsCF+oPM/hFoYfzpFUAqhmxBQe3Ce/z1jNFnGP60Lcm3+g9FwzNwQwuH8gJsH?= =?us-ascii?q?TRtNj7Or0dUeaox6fM0DXDdfxW1in76IjTbxsspuyDUqh2ccrQ10YvEwHFg06V?= =?us-ascii?q?qYP7OzOV0v4Cs26c7+tvT+6gl2knqwRorzWp28wiiZHJi5oIxl3A+yh12ok4KN?= =?us-ascii?q?+iREJmYNOpEIFcuzyEO4ZyRM4pXntmtzwgyrIcvJ62ZCgKx4ojxx7Yc/GHdpaH?= =?us-ascii?q?4hbnVOmLJzd4g31kdKijiBa160Sgy+n8WtG10FZMsCVFjsHBum0J2hHd8MSKRf?= =?us-ascii?q?lw8l281TuO1w3f8PxILV4wmKbDLp4u2L8wlp4dsUTZGS/2nV37g7KMeUUi++in?= =?us-ascii?q?9eDnYrf9q5+ZKYB0jgX+Pb4omsy4DuU0KBQBX2+e+eikzr3s4VX5QKlWjv0xiq?= =?us-ascii?q?TZq47VJcAapq6/Hg9U3Z0u6wq/Dji60NQYmmMLLFReeB2dlYTpNFbOIO6rRcu4?= =?us-ascii?q?1k+hlDZt2uDuIqzqApKLKGPK1rjmY+VT8UlZnSY6y5h9+ohbB7caaKb/U0nwud?= =?us-ascii?q?jaJho0Nwi9xeH3Tt5609VNCiq0HqaFPfaK4hez7eU1LrzJPddNtQ=3D=3D?= X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0HqAQBSKxJZf4GlL8FdHAEBBAEBCgEBF?= =?us-ascii?q?wEBBAEBCgEBgwGCF450kGKYAYYkAoVEAQEBAQEBAQECAQIQAQEhXYIzIgGCQAM?= =?us-ascii?q?DeRAYCBkBF1cZiFWBULUtinEBMYg9hGqCcGwBhSAFkCKBAYxijWqFMYICj2eIf?= =?us-ascii?q?YtDVoEMTyEVRoZ2PTaGNwINF4IXAQEB?= X-IPAS-Result: =?us-ascii?q?A0HqAQBSKxJZf4GlL8FdHAEBBAEBCgEBFwEBBAEBCgEBgwG?= =?us-ascii?q?CF450kGKYAYYkAoVEAQEBAQEBAQECAQIQAQEhXYIzIgGCQAMDeRAYCBkBF1cZi?= =?us-ascii?q?FWBULUtinEBMYg9hGqCcGwBhSAFkCKBAYxijWqFMYICj2eIfYtDVoEMTyEVRoZ?= =?us-ascii?q?2PTaGNwINF4IXAQEB?= X-IronPort-AV: E=Sophos;i="5.38,316,1491264000"; d="scan'208";a="5619503" X-IronPort-Outbreak-Status: No, level 0, Unknown - Unknown Received: from mail-il-dmz.mellanox.com (HELO mellanox.co.il) ([193.47.165.129]) by emsm-gh1-uea11.nsa.gov with ESMTP; 09 May 2017 20:51:08 +0000 Received: from Internal Mail-Server by MTLPINE1 (envelope-from danielj@mellanox.com) with ESMTPS (AES256-SHA encrypted); 9 May 2017 23:51:03 +0300 Received: from x-vnc01.mtx.labs.mlnx. (x-vnc01.mtx.labs.mlnx [10.12.150.16]) by labmailer.mlnx (8.13.8/8.13.8) with ESMTP id v49Koor9031538; Tue, 9 May 2017 23:51:02 +0300 From: Dan Jurgens To: selinux@tycho.nsa.gov Subject: [PATCH 9/9] semanage: Update man pages for infiniband Date: Tue, 9 May 2017 23:50:42 +0300 Message-Id: <1494363042-121766-10-git-send-email-danielj@mellanox.com> X-Mailer: git-send-email 1.7.1 In-Reply-To: <1494363042-121766-1-git-send-email-danielj@mellanox.com> References: <1494363042-121766-1-git-send-email-danielj@mellanox.com> X-BeenThere: selinux@tycho.nsa.gov X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Security-Enhanced Linux \(SELinux\) mailing list" List-Post: List-Help: Errors-To: selinux-bounces@tycho.nsa.gov Sender: "Selinux" X-Virus-Scanned: ClamAV using ClamSMTP From: Daniel Jurgens Update the main man page and add specific pages for ibpkeys and ibendports. Signed-off-by: Daniel Jurgens --- python/semanage/semanage-ibendport.8 | 66 ++++++++++++++++++++++++++++++++++ python/semanage/semanage-ibpkey.8 | 66 ++++++++++++++++++++++++++++++++++ python/semanage/semanage.8 | 16 ++++++-- 3 files changed, 144 insertions(+), 4 deletions(-) create mode 100644 python/semanage/semanage-ibendport.8 create mode 100644 python/semanage/semanage-ibpkey.8 diff --git a/python/semanage/semanage-ibendport.8 b/python/semanage/semanage-ibendport.8 new file mode 100644 index 0000000..c3753a2 --- /dev/null +++ b/python/semanage/semanage-ibendport.8 @@ -0,0 +1,66 @@ +.TH "semanage-ibendport" "8" "20170508" "" "" +.SH "NAME" +.B semanage\-ibendport \- SELinux Policy Management ibendport mapping tool +.SH "SYNOPSIS" +.B semanage ibendport [\-h] [\-n] [\-N] [\-S STORE] [ \-\-add \-t TYPE \-z IBDEV_NAME \-r RANGE port | \-\-delete \-z IBDEV_NAME port | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify \-t TYPE \-z IBDEV_NAME \-r RANGE port ] + +.SH "DESCRIPTION" +semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation from policy sources. semanage ibendport controls the ibendport number to ibendport type definitions. + +.SH "OPTIONS" +.TP +.I \-h, \-\-help +show this help message and exit +.TP +.I \-n, \-\-noheading +Do not print heading when listing the specified object type +.TP +.I \-N, \-\-noreload +Do not reload policy after commit +.TP +.I \-S STORE, \-\-store STORE +Select an alternate SELinux Policy Store to manage +.TP +.I \-C, \-\-locallist +List local customizations +.TP +.I \-a, \-\-add +Add a record of the specified object type +.TP +.I \-d, \-\-delete +Delete a record of the specified object type +.TP +.I \-m, \-\-modify +Modify a record of the specified object type +.TP +.I \-l, \-\-list +List records of the specified object type +.TP +.I \-E, \-\-extract +Extract customizable commands, for use within a transaction +.TP +.I \-D, \-\-deleteall +Remove all local customizations +.TP +.I \-t TYPE, \-\-type TYPE +SELinux type for the object +.TP +.I \-r RANGE, \-\-range RANGE +MLS/MCS Security Range (MLS/MCS Systems only) SELinux Range for SELinux login mapping defaults to the SELinux user record range. SELinux Range for SELinux user defaults to s0. +.TP +.I \-z IBDEV_NAME, \-\-ibdev_name IBDEV_NAME +The name of the infiniband device for the port to be labeled. (ex. mlx5_0) + +.SH EXAMPLE +.nf +List all ibendport definitions +# semanage ibendport \-l +Label mlx4_0 port 2. +# semanage ibendport \-a \-t allowed_ibendport_t \-z mlx4_0 2 + +.SH "SEE ALSO" +.BR selinux (8), +.BR semanage (8) + +.SH "AUTHOR" +This man page was written by Daniel Walsh diff --git a/python/semanage/semanage-ibpkey.8 b/python/semanage/semanage-ibpkey.8 new file mode 100644 index 0000000..2da4f54 --- /dev/null +++ b/python/semanage/semanage-ibpkey.8 @@ -0,0 +1,66 @@ +.TH "semanage-ibpkey" "8" "20170508" "" "" +.SH "NAME" +.B semanage\-ibpkey \- SELinux Policy Management ibpkey mapping tool +.SH "SYNOPSIS" +.B semanage ibpkey [\-h] [\-n] [\-N] [\-S STORE] [ \-\-add \-t TYPE \-x SUBNET_PREFIX \-r RANGE ibpkey_name | ibpkey_range | \-\-delete \-x SUBNET_PREFIX ibpkey_name | ibpkey_range | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify \-t TYPE \-x SUBNET_PREFIX \-r RANGE ibpkey_name | ibpkey_range ] + +.SH "DESCRIPTION" +semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation from policy sources. semanage ibpkey controls the ibpkey number to ibpkey type definitions. + +.SH "OPTIONS" +.TP +.I \-h, \-\-help +show this help message and exit +.TP +.I \-n, \-\-noheading +Do not print heading when listing the specified object type +.TP +.I \-N, \-\-noreload +Do not reload policy after commit +.TP +.I \-S STORE, \-\-store STORE +Select an alternate SELinux Policy Store to manage +.TP +.I \-C, \-\-locallist +List local customizations +.TP +.I \-a, \-\-add +Add a record of the specified object type +.TP +.I \-d, \-\-delete +Delete a record of the specified object type +.TP +.I \-m, \-\-modify +Modify a record of the specified object type +.TP +.I \-l, \-\-list +List records of the specified object type +.TP +.I \-E, \-\-extract +Extract customizable commands, for use within a transaction +.TP +.I \-D, \-\-deleteall +Remove all local customizations +.TP +.I \-t TYPE, \-\-type TYPE +SELinux type for the object +.TP +.I \-r RANGE, \-\-range RANGE +MLS/MCS Security Range (MLS/MCS Systems only) SELinux Range for SELinux login mapping defaults to the SELinux user record range. SELinux Range for SELinux user defaults to s0. +.TP +.I \-x SUBNET_PREFIX, \-\-subnet_prefix SUBNET_PREFIX +Subnet prefix for the specified pkey or range of pkeys. + +.SH EXAMPLE +.nf +List all ibpkey definitions +# semanage ibpkey \-l +Label pkey 0x8FFF (limited membership default pkey) as a default pkey type +# semanage ibpkey \-a \-t default_ibpkey_t \-x fe80:: 0x8FFF + +.SH "SEE ALSO" +.BR selinux (8), +.BR semanage (8) + +.SH "AUTHOR" +This man page was written by Daniel Walsh diff --git a/python/semanage/semanage.8 b/python/semanage/semanage.8 index abc4736..0bdb90f 100644 --- a/python/semanage/semanage.8 +++ b/python/semanage/semanage.8 @@ -3,7 +3,7 @@ semanage \- SELinux Policy Management tool .SH "SYNOPSIS" -.B semanage {import,export,login,user,port,interface,module,node,fcontext,boolean,permissive,dontaudit} +.B semanage {import,export,login,user,port,interface,module,node,fcontext,boolean,permissive,dontaudit,ibpkey,ibendport} ... .B positional arguments: @@ -43,6 +43,12 @@ Manage process type enforcement mode .B dontaudit Disable/Enable dontaudit rules in policy +.B ibpkey +Manage infiniband pkey type definitions + +.B ibendport +Manage infiniband end port type definitions + .SH "DESCRIPTION" semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation @@ -50,9 +56,9 @@ from policy sources. This includes the mapping from Linux usernames to SELinux user identities (which controls the initial security context assigned to Linux users when they login and bounds their authorized role set) as well as security context mappings for various kinds of objects, such -as network ports, interfaces, and nodes (hosts) as well as the file -context mapping. See the EXAMPLES section below for some examples -of common usage. Note that the semanage login command deals with the +as network ports, interfaces, infiniband pkeys and endports, and nodes (hosts) +as well as the file context mapping. See the EXAMPLES section below for some +examples of common usage. Note that the semanage login command deals with the mapping from Linux usernames (logins) to SELinux user identities, while the semanage user command deals with the mapping from SELinux user identities to authorized role sets. In most cases, only the @@ -79,6 +85,8 @@ List help information .BR semanage-permissive (8), .BR semanage-port (8), .BR semanage-user (8) +.BR semanage-ibkey (8), +.BR semanage-ibendport (8), .SH "AUTHOR" This man page was written by Daniel Walsh