From patchwork Mon May 22 13:08:31 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Daniel Jurgens X-Patchwork-Id: 9740269 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id D12EC601C2 for ; Mon, 22 May 2017 13:11:30 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id C29CB28382 for ; Mon, 22 May 2017 13:11:30 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id B75272846A; Mon, 22 May 2017 13:11:30 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-1.9 required=2.0 tests=BAYES_00, RCVD_IN_DNSWL_NONE, UNPARSEABLE_RELAY autolearn=ham version=3.3.1 Received: from emsm-gh1-uea10.nsa.gov (smtp.nsa.gov [8.44.101.8]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 6330428382 for ; Mon, 22 May 2017 13:11:28 +0000 (UTC) X-IronPort-AV: E=Sophos;i="5.38,377,1491264000"; d="scan'208";a="7297851" IronPort-PHdr: =?us-ascii?q?9a23=3A0isk/xII/WLvD9I7LdmcpTZWNBhigK39O0sv0rFi?= =?us-ascii?q?tYgQK/7+rarrMEGX3/hxlliBBdydsKMbzbCJ+P66EUU7or+5+EgYd5JNUxJXwe?= =?us-ascii?q?43pCcHRPC/NEvgMfTxZDY7FskRHHVs/nW8LFQHUJ2mPw6arXK99yMdFQviPgRp?= =?us-ascii?q?OOv1BpTSj8Oq3Oyu5pHfeQtFiT6/bL9oMhm7rwrdu8gIjYB/Nqs/1xzFr2dSde?= =?us-ascii?q?9L321oP1WTnxj95se04pFu9jlbtuwi+cBdT6j0Zrw0QrNEAjsoNWA1/9DrugLY?= =?us-ascii?q?TQST/HscU34ZnQRODgPY8Rz1RJbxsi/9tupgxCmXOND9QL4oVTi+6apgVRHniD?= =?us-ascii?q?0DNzUk7m/ZjMJ+h79frB64uhBz34vYbYeIP/R8Y6zdZ8sXS2pfUMhMWSJPAYSy?= =?us-ascii?q?YIkBD+oZP+tUsofwqEUVrRalGQWgGPnixiNSi3PqwaE31fkqHwHc3AwnGtIDqH?= =?us-ascii?q?rao8/zNKwPVe610bPIzTrdYPNQwjf29Y/FfQ07rvGKXLJ/b87RyUs0GgPAkFqQ?= =?us-ascii?q?rYjlMCmT1uQKvGmX9fZvVeWqi2M+rQx6vzuhxt80h4XUiY8YxUrI+CVkzIovO9?= =?us-ascii?q?G1R1B3bcS5HJdIqi2XM4V7TtktTmxqoio217wLtJ6hcCQX1pgqwxjSYOGdfYeS?= =?us-ascii?q?+BLsTuORLC99hHJiZb2wmQ6/8VOlyu3gTsm010tKrjZdntnMqH8N0xvT59CbSv?= =?us-ascii?q?Rn5Eeh2CuP1xvJ5uFYIUE7iarbK5k7zr42ipUTqljMEjXzmEX3iK+abkQk+u62?= =?us-ascii?q?5OT7erjqu5CROoBuhgz+L6gigNKzDOsmPgQUQmSX4eG826fi/U39TrVKlPo2kq?= =?us-ascii?q?zBvZDBO8sboq+5AwlI0ocs8hqwFDCm0MkenXYbMl1FYwmKj5TpOl7SIPD4Cu2z?= =?us-ascii?q?g1K3kDhx3fzGMbrhAovVInjZjLjhZap961JbyAcrz9Bf4JRUBasdIPLzQEDxss?= =?us-ascii?q?fVDh0+MwyyxuboEs591p8AVmKVGa+VKqTSsUWH5ug3OemDeJcVuCrhK/gi//Pu?= =?us-ascii?q?j305lkUBcqmqxpsXb3a4HvV4I0iCb3rshsoBEGgRsQojSuzqlECCXSRUZ3aoUK?= =?us-ascii?q?I2/is7B56+DYffWoCth6SM3D+lEZJNeG9GDFGMEWvvd4ifWvcDdjydLdF7njwD?= =?us-ascii?q?T7ihRJcr1Quyuw/i17pnMu3U9zUFupLk0th14fDcmg829Tx1FMmSyX+CT3tznm?= =?us-ascii?q?8SQD82xq9/q1Rnylifyah4n+BYFdtL6vxUTgc1L4TcwvdmBND1XwLOYs2GSE26?= =?us-ascii?q?Qtm8BzE+UM4xyccUY0lhA9WikgzD3y2yDr8UkbyLGII78qbC0Hj0Ocl912zG1a?= =?us-ascii?q?k6glkhWstAK2umhqtl+AjSA47GiEKZlqmweaQbxi7N+3+JzXCSs0FATA5wTaLF?= =?us-ascii?q?UGgfZ0rXqtT54FjPT7qqCbg+MwtBz9SOKq1QZd3zjlVGRenjN8rEb2K3hWiwGQ?= =?us-ascii?q?6CxqmQY4ryZ2UdwCLdBVAanAAL53mGLwk+Bjy6rmLGFjNuD1PvY1j08el6sny0?= =?us-ascii?q?UlE7wxuNb0172Lq/4gQViuCES/MPwrIEvz8sqjt1HFa52tLZFcCAqhFvfKpCfN?= =?us-ascii?q?w9501H2njBtwxnOZygLb5tiUICcwhtuEPuzRp3AJ1akcc2tHMq0BZyKaWA3VNP?= =?us-ascii?q?bTOXx5bwNaHWKmnp5x2vbrbW2lDH3NaN9KYP8+40q1L5vAGmDkAi6Wlo08FJ03?= =?us-ascii?q?uA4ZXHFAkSXojyUkYw6hh3vLLabTM+54PTyH1gK660siXN29gxHusq1g6gf8tD?= =?us-ascii?q?MKODDAL9CdAVB9KvKOM0gVikdQgLM/xX9KIuOMOmbfSG0raxPOl8hDKmkXhH4I?= =?us-ascii?q?dl302Q7SV8TvDH340Zw/CY2QuKTCz8g0ugss/pn4BEeTASEXClxSjiGoFRerV4?= =?us-ascii?q?fZwXBme2P8232tJ+iob2W35W7l6jAEgG2NOydBqJaVz92gNR1UENrnyhgye4yS?= =?us-ascii?q?J7ky0xpKqFwCPO2/jidAYAOmNTSmhtl1PsIZSqgNAAR0ildBYpmwW/5Unh2qhb?= =?us-ascii?q?ob5zL27JQUdHZyL2NX1tUrOstrqeZM5C8I8ovjhKX+S9e1+aTqXwrAcd0yPmA2?= =?us-ascii?q?RR3is7dy2wtpX/gRN6lHqXLGxvo3rBZcFw2RDf6cTCRf5QwjUGWC54iSPNCleg?= =?us-ascii?q?P9mp+tOUl5jYv+C6VmKhUIdccTPszY+asyu7/2JqCwWln/+vgt3nDRQ60Sjj2t?= =?us-ascii?q?luVCXItwr8bpDw16ukNeJnf09oBELz6sdhAYF+ioowhJcR2XcGnZWZ53wHnnnv?= =?us-ascii?q?Md9Dw6LxcGINRSIXw97S+AXlwkpjLnaNx43nTHWS3sxhZtehb2MNxyIy89tKBL?= =?us-ascii?q?2T7Lxekit/ukC4oh7JYfhhgjcdzuMj6GYAjOEUvAoh1D+SDqoJEklfOSzsixOI?= =?us-ascii?q?79aloaVSeGqvd7+w21ZkkdCnEr6CvhlWWGzldZc6AS9w8sJ/PUrP0HLt7IHkY8?= =?us-ascii?q?LdbdENuR2SiBfAifZaKI4rmvoNnypnNnr3vWc5xO4jkRxuwZa6sZCfK2p34aK5?= =?us-ascii?q?BgBXNiXvaMMV5jHik7xek92L34C0AJphAC4LUIHzTfKvDTISr+joOBiAED07sH?= =?us-ascii?q?ebFqTQERWZ6Eh4s3LFC4qrOG2PJHkF0dViQwGQJFJZgA8JRzg6gJg5GR2qxMD7?= =?us-ascii?q?dkd2+CwR7EbiqhRQ0uJoKwX/UmDHqQewcDg0VZyfIQFK4QFD+0fUMdWS7uxpEC?= =?us-ascii?q?Fe5JGhqxaNKmODbQRSEW4JQlCEB0zkPrS25tnB8+yYCfSlIvvLZrWOp+JeWOmU?= =?us-ascii?q?xZKz0otm+DOMOduVMnlkEfI7xlJJXWplFMTBhzUPVysXmjrDb8GBohe85ip3rs?= =?us-ascii?q?Wk/fTlRg3g+IyPC6FIPtV34RC2hqWDOPCMiyZlMzpY0YkMxXDQwrgFwFESkz1u?= =?us-ascii?q?dyWqEbkYry7CUb/fl7RYDx4eZCJ/Ls1I4Lwg3gNVI87Ulsv11qJkjv4yE1pFT0?= =?us-ascii?q?btm8+zacwPOW69MFTHBUaQObucOTLLxtv7YaSmSb1flO9UrQG/uS6HE0//OTSO?= =?us-ascii?q?jzfpVwqxPu5RlyGUJhpeuJ26chZ2EmXsVs7pahihPN9wlz02zqU+hmnWOm4ELT?= =?us-ascii?q?h8b0RNo6WW7SNCmPp/A3RB42FrLemFgSaZ9PXYKpgXsfttGCt0kf5V4HUgxLtR?= =?us-ascii?q?9i1EQ+Z1mCTKpN50v16mivWPyiZgUBdWtzlLn5yEsl9tOaXD7JZAR23J/AkX4m?= =?us-ascii?q?WTFhQKvcFqBsfru6BNzNjAjrjzJC5e89LT/ssdB8/UJNiBMHU/LRrjACTUAxcd?= =?us-ascii?q?TT63KWHfgFRQkPeT9n2Rqpg1tIPslYEURbBFTlw1EekWCkN/HNwNOJ13RC8rka?= =?us-ascii?q?aHjM4U4nqztALeRMRVvpDAUPKfGujgJyiCgrlFfRQIx6n0LYMJNo30w0ZicEV1?= =?us-ascii?q?nJzWG0rMWtBAujdubgAur0VT7ndzVWoz21r7ZQOr5X8cD/+0nhothQt5buUh7j?= =?us-ascii?q?Ds4004JlDSvis/jFExmcn5gTCWaDPxMKCwXYRMByrusEgwM430QwBuYg2omkxr?= =?us-ascii?q?KjTESqlNgLtncGBklBXTuYBTGfJGS61LfgMQz+mNZ/o0yVRctjmnxUhf6OvDF5?= =?us-ascii?q?Rtjg8qfIWvr3JHwAJjcMQ6JarLJKpKz1hcnKSOsTG01uop2g8RO14N8H+OeC4P?= =?us-ascii?q?oEEILKcpJzG28eN28wyNhztDdXMXWPoruPJl60Q9O+qYzyL6zbFCKlq9N+qBIK?= =?us-ascii?q?OFo2LAj9KHQkss1kMUkElI5aV53t09c0qVSk8v16CcGA4TNcrYLgFUYdFS+2bP?= =?us-ascii?q?ciaTq+XNwI51PoWnGuDuU+COqL4egli4EwYxA4QM8sMBE4Go0EHfN8foMrgFyB?= =?us-ascii?q?Qq5AnwK1WFCulJdAiMkDcdrMG11IV30pVFJjEBHWV9Nj265q3JqQ8ugfqDWso2?= =?us-ascii?q?Y3gBU4QYMXI2XdG1lDRCv3RcFjW31PwWyBSa5T/muivQFCX8b8ZkZPqMeBxjFN?= =?us-ascii?q?S2+TI586iqlFLa6YveKH/gNdRju97P7uUaq4yBC/xKUbl3q13clJVAR3y2T27P?= =?us-ascii?q?Fsa4J5vqa4gsd9P0DGq6UlykhjI6SMfxJMqiIrKOgQ72WYZeqJOb0yw7Nc+hCj?= =?us-ascii?q?EeHA99p/0C5KJ5Yg0Df5o7YB7zugsjNqy+IB2X3c60T2arNzRWU+FVzf+maLxP?= =?us-ascii?q?0yoscui6xWMvTpEg1ea391INSYoLjhHZy/ejYZVeUSjtFXxcfQXPuTQ2l3J7Ou?= =?us-ascii?q?Y03Og/3AvCsUMAPDCTaOxpdGtEsskmClOWIHV5FnQ3SEeZjYvD5A6s2LYS8DFG?= =?us-ascii?q?ktlP0O1Kqn7+sobRYDKxQqCrr4vaszY4Z9g8v6JxKZDjIteBtJ7GhTPQUp/Qvx?= =?us-ascii?q?afXyGnCfpVhMJQIDlCT/lSmWApI8sGuZBO6UApTMcxO6RPCLUwprCtcTdkFygS?= =?us-ascii?q?zS4FWIOA2zwChvy81aPDmBmNapovLBsKvY5ejdsaVi55fjkRpLS/V4nMkW+LVH?= =?us-ascii?q?QLKh8J7QtQ/AIAipNwfuf97YXUTp9D0SJZruloXSvMEplo81r7RX+MgVjkVvqu?= =?us-ascii?q?j+yp0RhVzPL23dkRQAR/BlRFx+ZKiksoL6l6K7MKsY7QtT+Hblj3vH73yOS8Ol?= =?us-ascii?q?le18nUd1z+DIrKsWr8UyIc+X0IRY9B0n7fD5ESnxB/aKk1uFVGOJqmdVrm5zw4?= =?us-ascii?q?24RpGKG1VM6xy1k5rXYGRiKqE9tbBOFlq1/XWSNqbI61p5n/PJVSWGBQ8oWHq1?= =?us-ascii?q?hFiEVtLzK5yZ1EJsFV5T4MWCJAoS+Tvdu1TM1D19R7D5oLItd4oHfyBr9LOIKW?= =?us-ascii?q?o30tobzvy3nZ+z8mvFe93jWzFLeyT/hF8G0GBgUpO2Oep1E1AOs272fS9ErBsl?= =?us-ascii?q?Nv8udaB7iPjFlxry1nEpBIGDlJyWivL05vQ3ler+VaNKPVftRAQ/k1YB+iIAA+?= =?us-ascii?q?GeIj30OS5010m2n2YzBqvAtA5y/dRxU0VTUSgrr1mT0RsNunNiUeS51Vdjgucj?= =?us-ascii?q?nKKxqDmS9JuBZQdVtqV4oeAtZf9LERxZFU8dbaSUawNSEFWwRvNgA/0fVBjkNM?= =?us-ascii?q?rVuXeTvDAgqyafbArAB4cd2XrMG3MPTz5B1HhZ//sOAk66UDQGWrlhajQd/Cs4?= =?us-ascii?q?PxtMCGu0WVeajkNO28ZGPOQyLXjRCsn7skCYfF/zTLOgpBN5Z60WYkYYTmCWPT?= =?us-ascii?q?JxRJOb8UJ0pBWqBmcthGpudaZ9F6d6oX5aBtAQ+ISQ31FIypsvZGMk7ZRS7CIC?= =?us-ascii?q?WZ7uy/vYXT4KTFSej7esyD3WvIQ75sM5dh7jn7Bq3q3pNA9Urwxvdt7Fl1SVzc?= =?us-ascii?q?PyCGttThKRsB5NO+eUv6op0pATTWDY9skHr32E5PadcYTja38JQc1JNZ8mz/Sf?= =?us-ascii?q?x50kj0tO1d6aVk5ZMw47Bzxse+Pb3SJuhCsU97HhiUAR1n9pA3D2h7Q2BefPMR?= =?us-ascii?q?KOvLcqsDls3urf74F7AM6BKJ4eNZccXIK1vHmsahFjGWUQZEkxsZqT4GMguc0O?= =?us-ascii?q?aIm61uRsa/ouj5wUYt7EKgLhMdybBt+IOE+raJpODLbhve174EWrPwSsP0tLQs?= =?us-ascii?q?tFuY5ec4m74WZmx1fwqnHfAfVsEHwGfgw7oqzSUxHMzdBL/g5ORMV3QinjLngZ?= =?us-ascii?q?x9GUsZGu8MF7qR4Ytehns4m/DeNtAOfaBCh2ePFRqgErAczH6m8DaYL3d+jRHP?= =?us-ascii?q?yR7wR3m/7FjsrS93WSHM1cvsklJJVrmrAkdfRyypOUtjvTOOOgroscD7uaUz7E?= =?us-ascii?q?E4KGzrrsmNlHe7OLNKA8L/OMGcITMqq14Ni50xXNOv05gBGdWhONcR7G1+bvzG?= =?us-ascii?q?5mOulC9BpbtHh4XA7cyO//XXHGOvj6uEpLWRyjFYzWI4vVIk6ty6MPHB+cGKSe?= =?us-ascii?q?yy12kNVyd/pxfBXxmtp7zftFAUPEyG3VzFmIMUI95Z2mM42Vv+5Og5R9Iz9htR?= =?us-ascii?q?GZrcZ/8YojDzIjT0y06FY90rTimezydXHlXtHFljAqc8xnj/vM3XmnfL4FAoXZ?= =?us-ascii?q?N/d1L9ihx4EYo4Mlgh6F4JzSofCQINcwyUDKm0BUT5KosJTUoDaRWC3LWhf6c4?= =?us-ascii?q?w01yza215O/Sa+x8CLABNvBDgQ6ShFJbAI4ZsbUCQLJgfF9Q7K/Xpwn4BIf9Q/?= =?us-ascii?q?frjmEwOuOpQs9E7c8VrXwi4hywRxC485dM864biIyUdq5DeZXDp8F871xp5DEV?= =?us-ascii?q?dCxNgQR/jwujXuABoODu+cTUsJ215emwTqktWv8X9x8uB2tklZfwh0ojod7P3e?= =?us-ascii?q?dGVoLVkZj/8BxKI3OSoIbVyQV8JvYOK4Ole7Zg7XYHKzEFJ30QOdqWav884zJi?= =?us-ascii?q?MTjI/1xNGN8Mas8YPMvDngBUkE7pVKtQ9sXFAF+YDZl8d8Qy42rw0jA1/oM2Uv?= =?us-ascii?q?z85z+uOZDf81ZNMutfjCV2it3CoPIawfzMByUM/HaZahd1wiKey5aXEPb/5/+M?= =?us-ascii?q?yMzOW1MAACE2T59XJCCe9gy/Wuq1iJLpXxub6sDpmpIxal6QRnyqkaQBs6ZMDf?= =?us-ascii?q?BPiiXh0ThDDYD5nfSVvMSw6GFPrF1IDJ5z7QHZGKVYJph7Ngr3ls+3Rkh7ASvz?= =?us-ascii?q?f9rUeQQquOqXwOcM/up/OlD6ZYAFOBIFy6j15WBTTgRwVL78pkyZUv4JZNt6VP?= =?us-ascii?q?PEqWhY6YRhK6ATO1idoIblrixSpFA3Bw8pb6QwridBe0nLkwBUVLz4uLkaigsT?= =?us-ascii?q?SdR5o1NDGXqsOGIi4DrKTatVg7WKCPwO6zmdU6MAXUNpMiN4XhO0145je7Ssnf?= =?us-ascii?q?9dtGNJgDlxoP8w0zxpXBG8ozHjp7oR2TI8/7G1rDcBuXtFTuWYiSvHFVVDzPAX?= =?us-ascii?q?jagBCnfi6Fq8YGIAbIvz+7RnO8Xg9Zc77HQ7fBojfjcKXeK+BCHsl6mIGJCAsM?= =?us-ascii?q?pAhB6Rv8XDdb6zLTYIObQ70h/jQ2V93RXfnBZv62sHWDKg7MUrJI+lI8Yq2jKo?= =?us-ascii?q?GXTHdFYL+q5JstX+tVAFTOsycl5gzn9s0s6ZSS0RXsDPHXg6jhQ8Y2VebJ1D8Q?= =?us-ascii?q?MaF7UvgjuQsalG+gYUYTnKHYSh/ondhtzI2X47Tddr2m3avKuFiY020Hd9gdN7?= =?us-ascii?q?8jaOuGgOd+zfS8JsAHjz14dHyez5Y/Wts/wHR5V9xbSkUf8CLtOj9nWs1JVtQE?= =?us-ascii?q?+lyawUH0ClP+8b2rfbTyClRHWEWeSKdmiBhCo5Mk/u6hmrMFI3bN1Gr0kjPeve?= =?us-ascii?q?npRcjRHuUatoRiWMol/W1GkjMeIZdwI1v4eqYA4KQ/QSZ+ibI+gh3vs+BEEKb3?= =?us-ascii?q?DXASt8E/W2vkK1nIhnJ3Vg5l33bv/z/QDgLNufAQIEEYrdrp5t5fy6WHyONmJ6?= =?us-ascii?q?wB11Jkl0+P/VF04tue9Eb5aRgd/Qisx10eEbc/dtMDU9tcAIl4Ni6ImU1cKKfg?= =?us-ascii?q?/Lzpb2O97ZuP+YA+fQz04yYGFVTqIZYR/p54U9JtM4VaXTHaFYvRsAG6c3W5kh?= =?us-ascii?q?N2bt9KFuMgx/aAnRZK67gsPyvOKEeoNUp2PK7lI3NCrcvBkDxeKvQAxja5ClnW?= =?us-ascii?q?7yIIwxRj1ds91tEAVpE5VVF8MGsQWnH4aemLunhN+p50N6p+gKvLL0CvDL0tS5?= =?us-ascii?q?wopwU4Fe5UyKJzbRGLJrj19kjuuohPfA1YP9CcT4edMLTOJ7WHLKaqfaHoWjLT?= =?us-ascii?q?KDItn8dFBC876d1rJ5TxqQaCf2UaqatC2rKu9k7lsjyoNiZ+fTzyIi76vd2NTs?= =?us-ascii?q?Y2FUvTqjrXGTOJtY9lzKCvTUXwhIRvqd7GZlAaoXYJPx9OgULdMiwNmc4w907D?= =?us-ascii?q?lZzsuFIq6hoVHI2kJ6c5LbMUTo1zw+WYkQLxS1KVEsjnPBqnTBHXRcKdCpKct3?= =?us-ascii?q?j9aWCRzi/FJ8mXwrZm5dGmroQsqROWcb28KifgGK8hxED8oble6tZUE4rrGySf?= =?us-ascii?q?VvOphdguqlr7ILkdJoKyHUWMhaJDvcLKRoMTVNFOnPv0YnYhoFs7gzR4c0aoOD?= =?us-ascii?q?L18HMUea1CPy1hHO0EPueNywz6aJJyAW/m9Az7Lf3jhGvxO5tuqBgs3/TLDZa4?= =?us-ascii?q?n7XPHIPyU+TDGaRCo9EUKy9Fe6v/oLpuGYIWYColwOZCKdFhITrLh1rdfMFm/T?= =?us-ascii?q?hfFjfJoSifCYXiDwTzd4lLAzBiZQrk2MReAMFQzIYH/gmmZcvxaiJvBU93L/c7?= =?us-ascii?q?KY3rZVW/ARAoZUaf2ZTd7YduxfKjorjTgZJvizf8fdr7c41VLIS3EVE6/W+12C?= =?us-ascii?q?HwaqRamHyjbqW5gFl5QlsSovvNTLl2l4FLqbEayYomuC+4jwrjuCtuDYTSF5b0?= =?us-ascii?q?Uzge8GAkGEzR1EIWcDG5cev0S7Ef3IXFpFyH980bEm4BQLYgkmFyQ23w=3D=3D?= X-IPAS-Result: =?us-ascii?q?A2HjAQC+4iJZ/wHyM5BcGgEBAQECAQEBAQgBAQEBFgEBAQM?= =?us-ascii?q?BAQEJAQEBgwEpgW6OepB9l34ojBZXAQEBAQEBAQECAQJoKIIzJIJCBgECeQMJA?= =?us-ascii?q?QEXCBkBDwgDAVMZBYhPgVAEsiAmAosZiD2EaoJwbAGFKQWQKIEBjG2NboUzggO?= =?us-ascii?q?JGIZTiQGLR1iBCk8iFUaEM4JGc4ZtAg0XghcBAQE?= Received: from unknown (HELO tarius.tycho.ncsc.mil) ([144.51.242.1]) by emsm-gh1-uea10.nsa.gov with ESMTP; 22 May 2017 13:11:13 +0000 Received: from prometheus.infosec.tycho.ncsc.mil (prometheus [192.168.25.40]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id v4MDBBNm013376; Mon, 22 May 2017 09:11:12 -0400 Received: from tarius.tycho.ncsc.mil (tarius.infosec.tycho.ncsc.mil [144.51.242.1]) by prometheus.infosec.tycho.ncsc.mil (8.15.2/8.15.2) with ESMTP id v4MD914H141686 for ; Mon, 22 May 2017 09:09:01 -0400 Received: from goalie.tycho.ncsc.mil (goalie [144.51.242.250]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id v4MD8oLf011891 for ; Mon, 22 May 2017 09:09:01 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A1B1AgAX4iJZf4GlL8FcHAEBBAEBCgEBgyyCF456kH2YBYYkAoZoAQIBAQEBAQITAQEhXYUZAwN5EBgIGQEXVxmIVIFUshyLDwExiD2EaoJwbAGCDAyDEQWQKIEBjG2NboUzggOPa4kBi0dWgQtPIhVGhnk9NoZtAg0XghcBAQE X-IPAS-Result: A1B1AgAX4iJZf4GlL8FcHAEBBAEBCgEBgyyCF456kH2YBYYkAoZoAQIBAQEBAQITAQEhXYUZAwN5EBgIGQEXVxmIVIFUshyLDwExiD2EaoJwbAGCDAyDEQWQKIEBjG2NboUzggOPa4kBi0dWgQtPIhVGhnk9NoZtAg0XghcBAQE X-IronPort-AV: E=Sophos;i="5.38,377,1491278400"; d="scan'208";a="6061037" Received: from emsm-gh1-uea10.corp.nsa.gov (HELO emsm-gh1-uea10.nsa.gov) ([10.208.41.36]) by goalie.tycho.ncsc.mil with ESMTP; 22 May 2017 09:09:00 -0400 IronPort-PHdr: =?us-ascii?q?9a23=3AsVVfBRMuRQxPlr7RcaIl6mtUPXoX/o7sNwtQ0KIM?= =?us-ascii?q?zox0Lf7/rarrMEGX3/hxlliBBdydsKMbzbCJ+P2xEUU7or+5+EgYd5JNUxJXwe?= =?us-ascii?q?43pCcHRPC/NEvgMfTxZDY7FskRHHVs/nW8LFQHUJ2mPw6arXK99yMdFQviPgRp?= =?us-ascii?q?OOv1BpTSj8Oq3Oyu5pHfeQtFiT6/bL9oMhm7rwrdu8kSjIB/Nqs/1xzFr2dSde?= =?us-ascii?q?9L321oP1WTnxj95se04pFu9jlbtuwi+cBdT6j0Zrw0QrNEAjsoNWA1/9DrugLY?= =?us-ascii?q?TQST/HscU34ZnQRODgPY8Rz1RJbxsi/9tupgxCmXOND9QL4oVTi+6apgVQTlgz?= =?us-ascii?q?kbOTEn7G7Xi9RwjKNFrxKnuxx/2JPfbIWMOPZjYq/RYdYWSGxcVchTSiNBGJux?= =?us-ascii?q?YYsRAeQcM+hWrI7zqFkArRalGQWgGPnixiNSi3PqwaE31fkqHwHc3AwnGtIDqH?= =?us-ascii?q?rao8/zNKwPVe610bPIzTrdYPNQwjf29Y/FfQ07rvGKXLJ/b87RyUs0GgPAkFqQ?= =?us-ascii?q?rYjlMCmT1uQKvGmX9fZvVeWqi2M+rQx6vzuhxt80h4XUgo8YxErI+Cp7zYovON?= =?us-ascii?q?G1SU52bcS5HJdOsyyXMZZ9TNk4TGFyoik6z6ULuZ6lcygOz5Qq3xvfZOKDc4iM?= =?us-ascii?q?+B3jUuGRIDhiiH15f7KznRey8Uy4xu39UMm7zkpKozJYntTIuH0BzRPe58qdRv?= =?us-ascii?q?dg/0qs2SyD2x3N5uxAOUw0kLDUK58lwr4+jJoTtkHDEzfrl0rsiq+Wd1sr+uyq?= =?us-ascii?q?6+n8Z7XpuJucN4tuhQH4NaQvldazDvg/MggLR2Sb4/iz1KX//U3lR7VHluY2nb?= =?us-ascii?q?fdsJDbI8Qbu6G4DhRJ0ocj9xm/DzCm3M4enXkcNl1JYh2Hj4/3OwKGHPetFvq7?= =?us-ascii?q?glKxgB931vvGOfvnGZyLIX/dw5n7erMox0dagCgu199S4YkcXr0IJvP+Xk3Zsd?= =?us-ascii?q?HcChY/NBzyyOHiXoYunrgCUH6CV/fKeJjZtkWFs6d2e7GB?= X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0HmAQCO4SJZf4GlL8FcHAEBBAEBCgEBF?= =?us-ascii?q?wEBBAEBCgEBgwGCF456kH2YBYYkAoZoAQEBAQEBAQECAQIQAQEhXYIzJAGCQQM?= =?us-ascii?q?DeRAYCBkBF1cZiFSBVLIaiw8BMYg9hGqCcGwBhSkFkCiBAYxtjW6FM4IDj2uJA?= =?us-ascii?q?YtHVoEMTyIVRoZ5PTaGbQINF4IXAQEB?= X-IPAS-Result: =?us-ascii?q?A0HmAQCO4SJZf4GlL8FcHAEBBAEBCgEBFwEBBAEBCgEBgwG?= =?us-ascii?q?CF456kH2YBYYkAoZoAQEBAQEBAQECAQIQAQEhXYIzJAGCQQMDeRAYCBkBF1cZi?= =?us-ascii?q?FSBVLIaiw8BMYg9hGqCcGwBhSkFkCiBAYxtjW6FM4IDj2uJAYtHVoEMTyIVRoZ?= =?us-ascii?q?5PTaGbQINF4IXAQEB?= X-IronPort-AV: E=Sophos;i="5.38,377,1491264000"; d="scan'208";a="7297685" X-IronPort-Outbreak-Status: No, level 0, Unknown - Unknown Received: from mail-il-dmz.mellanox.com (HELO mellanox.co.il) ([193.47.165.129]) by emsm-gh1-uea10.nsa.gov with ESMTP; 22 May 2017 13:08:59 +0000 Received: from Internal Mail-Server by MTLPINE1 (envelope-from danielj@mellanox.com) with ESMTPS (AES256-SHA encrypted); 22 May 2017 16:08:56 +0300 Received: from x-vnc01.mtx.labs.mlnx. (x-vnc01.mtx.labs.mlnx [10.12.150.16]) by labmailer.mlnx (8.13.8/8.13.8) with ESMTP id v4MD8f0v017562; Mon, 22 May 2017 16:08:55 +0300 From: Dan Jurgens To: selinux@tycho.nsa.gov Subject: [PATCH v3 9/9] semanage: Update man pages for infiniband Date: Mon, 22 May 2017 16:08:31 +0300 Message-Id: <1495458511-46724-10-git-send-email-danielj@mellanox.com> X-Mailer: git-send-email 1.7.1 In-Reply-To: <1495458511-46724-1-git-send-email-danielj@mellanox.com> References: <1495458511-46724-1-git-send-email-danielj@mellanox.com> X-BeenThere: selinux@tycho.nsa.gov X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Security-Enhanced Linux \(SELinux\) mailing list" List-Post: List-Help: Errors-To: selinux-bounces@tycho.nsa.gov Sender: "Selinux" X-Virus-Scanned: ClamAV using ClamSMTP From: Daniel Jurgens Update the main man page and add specific pages for ibpkeys and ibendports. Signed-off-by: Daniel Jurgens --- python/semanage/semanage-ibendport.8 | 66 ++++++++++++++++++++++++++++++++++++ python/semanage/semanage-ibpkey.8 | 66 ++++++++++++++++++++++++++++++++++++ python/semanage/semanage.8 | 16 ++++++--- 3 files changed, 144 insertions(+), 4 deletions(-) create mode 100644 python/semanage/semanage-ibendport.8 create mode 100644 python/semanage/semanage-ibpkey.8 diff --git a/python/semanage/semanage-ibendport.8 b/python/semanage/semanage-ibendport.8 new file mode 100644 index 00000000..c3753a27 --- /dev/null +++ b/python/semanage/semanage-ibendport.8 @@ -0,0 +1,66 @@ +.TH "semanage-ibendport" "8" "20170508" "" "" +.SH "NAME" +.B semanage\-ibendport \- SELinux Policy Management ibendport mapping tool +.SH "SYNOPSIS" +.B semanage ibendport [\-h] [\-n] [\-N] [\-S STORE] [ \-\-add \-t TYPE \-z IBDEV_NAME \-r RANGE port | \-\-delete \-z IBDEV_NAME port | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify \-t TYPE \-z IBDEV_NAME \-r RANGE port ] + +.SH "DESCRIPTION" +semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation from policy sources. semanage ibendport controls the ibendport number to ibendport type definitions. + +.SH "OPTIONS" +.TP +.I \-h, \-\-help +show this help message and exit +.TP +.I \-n, \-\-noheading +Do not print heading when listing the specified object type +.TP +.I \-N, \-\-noreload +Do not reload policy after commit +.TP +.I \-S STORE, \-\-store STORE +Select an alternate SELinux Policy Store to manage +.TP +.I \-C, \-\-locallist +List local customizations +.TP +.I \-a, \-\-add +Add a record of the specified object type +.TP +.I \-d, \-\-delete +Delete a record of the specified object type +.TP +.I \-m, \-\-modify +Modify a record of the specified object type +.TP +.I \-l, \-\-list +List records of the specified object type +.TP +.I \-E, \-\-extract +Extract customizable commands, for use within a transaction +.TP +.I \-D, \-\-deleteall +Remove all local customizations +.TP +.I \-t TYPE, \-\-type TYPE +SELinux type for the object +.TP +.I \-r RANGE, \-\-range RANGE +MLS/MCS Security Range (MLS/MCS Systems only) SELinux Range for SELinux login mapping defaults to the SELinux user record range. SELinux Range for SELinux user defaults to s0. +.TP +.I \-z IBDEV_NAME, \-\-ibdev_name IBDEV_NAME +The name of the infiniband device for the port to be labeled. (ex. mlx5_0) + +.SH EXAMPLE +.nf +List all ibendport definitions +# semanage ibendport \-l +Label mlx4_0 port 2. +# semanage ibendport \-a \-t allowed_ibendport_t \-z mlx4_0 2 + +.SH "SEE ALSO" +.BR selinux (8), +.BR semanage (8) + +.SH "AUTHOR" +This man page was written by Daniel Walsh diff --git a/python/semanage/semanage-ibpkey.8 b/python/semanage/semanage-ibpkey.8 new file mode 100644 index 00000000..2da4f546 --- /dev/null +++ b/python/semanage/semanage-ibpkey.8 @@ -0,0 +1,66 @@ +.TH "semanage-ibpkey" "8" "20170508" "" "" +.SH "NAME" +.B semanage\-ibpkey \- SELinux Policy Management ibpkey mapping tool +.SH "SYNOPSIS" +.B semanage ibpkey [\-h] [\-n] [\-N] [\-S STORE] [ \-\-add \-t TYPE \-x SUBNET_PREFIX \-r RANGE ibpkey_name | ibpkey_range | \-\-delete \-x SUBNET_PREFIX ibpkey_name | ibpkey_range | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify \-t TYPE \-x SUBNET_PREFIX \-r RANGE ibpkey_name | ibpkey_range ] + +.SH "DESCRIPTION" +semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation from policy sources. semanage ibpkey controls the ibpkey number to ibpkey type definitions. + +.SH "OPTIONS" +.TP +.I \-h, \-\-help +show this help message and exit +.TP +.I \-n, \-\-noheading +Do not print heading when listing the specified object type +.TP +.I \-N, \-\-noreload +Do not reload policy after commit +.TP +.I \-S STORE, \-\-store STORE +Select an alternate SELinux Policy Store to manage +.TP +.I \-C, \-\-locallist +List local customizations +.TP +.I \-a, \-\-add +Add a record of the specified object type +.TP +.I \-d, \-\-delete +Delete a record of the specified object type +.TP +.I \-m, \-\-modify +Modify a record of the specified object type +.TP +.I \-l, \-\-list +List records of the specified object type +.TP +.I \-E, \-\-extract +Extract customizable commands, for use within a transaction +.TP +.I \-D, \-\-deleteall +Remove all local customizations +.TP +.I \-t TYPE, \-\-type TYPE +SELinux type for the object +.TP +.I \-r RANGE, \-\-range RANGE +MLS/MCS Security Range (MLS/MCS Systems only) SELinux Range for SELinux login mapping defaults to the SELinux user record range. SELinux Range for SELinux user defaults to s0. +.TP +.I \-x SUBNET_PREFIX, \-\-subnet_prefix SUBNET_PREFIX +Subnet prefix for the specified pkey or range of pkeys. + +.SH EXAMPLE +.nf +List all ibpkey definitions +# semanage ibpkey \-l +Label pkey 0x8FFF (limited membership default pkey) as a default pkey type +# semanage ibpkey \-a \-t default_ibpkey_t \-x fe80:: 0x8FFF + +.SH "SEE ALSO" +.BR selinux (8), +.BR semanage (8) + +.SH "AUTHOR" +This man page was written by Daniel Walsh diff --git a/python/semanage/semanage.8 b/python/semanage/semanage.8 index abc47360..0bdb90f4 100644 --- a/python/semanage/semanage.8 +++ b/python/semanage/semanage.8 @@ -3,7 +3,7 @@ semanage \- SELinux Policy Management tool .SH "SYNOPSIS" -.B semanage {import,export,login,user,port,interface,module,node,fcontext,boolean,permissive,dontaudit} +.B semanage {import,export,login,user,port,interface,module,node,fcontext,boolean,permissive,dontaudit,ibpkey,ibendport} ... .B positional arguments: @@ -43,6 +43,12 @@ Manage process type enforcement mode .B dontaudit Disable/Enable dontaudit rules in policy +.B ibpkey +Manage infiniband pkey type definitions + +.B ibendport +Manage infiniband end port type definitions + .SH "DESCRIPTION" semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation @@ -50,9 +56,9 @@ from policy sources. This includes the mapping from Linux usernames to SELinux user identities (which controls the initial security context assigned to Linux users when they login and bounds their authorized role set) as well as security context mappings for various kinds of objects, such -as network ports, interfaces, and nodes (hosts) as well as the file -context mapping. See the EXAMPLES section below for some examples -of common usage. Note that the semanage login command deals with the +as network ports, interfaces, infiniband pkeys and endports, and nodes (hosts) +as well as the file context mapping. See the EXAMPLES section below for some +examples of common usage. Note that the semanage login command deals with the mapping from Linux usernames (logins) to SELinux user identities, while the semanage user command deals with the mapping from SELinux user identities to authorized role sets. In most cases, only the @@ -79,6 +85,8 @@ List help information .BR semanage-permissive (8), .BR semanage-port (8), .BR semanage-user (8) +.BR semanage-ibkey (8), +.BR semanage-ibendport (8), .SH "AUTHOR" This man page was written by Daniel Walsh