From patchwork Wed May 24 14:18:42 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Daniel Jurgens X-Patchwork-Id: 9746057 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 57D2F601C2 for ; Wed, 24 May 2017 14:30:40 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 3C7C3289E9 for ; Wed, 24 May 2017 14:30:40 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 29E92289E2; Wed, 24 May 2017 14:30:40 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.2 required=2.0 tests=BAYES_00, RCVD_IN_DNSWL_MED, UNPARSEABLE_RELAY autolearn=ham version=3.3.1 Received: from emsm-gh1-uea11.nsa.gov (smtp.nsa.gov [8.44.101.9]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id D7A18289A9 for ; Wed, 24 May 2017 14:30:32 +0000 (UTC) X-IronPort-AV: E=Sophos;i="5.38,386,1491264000"; d="scan'208";a="6065816" IronPort-PHdr: =?us-ascii?q?9a23=3A9Odn1BXCxXPWCFGb9Xs+/0sOdXzV8LGtZVwlr6E/?= =?us-ascii?q?grcLSJyIuqrYYhWFuKdThVPEFb/W9+hDw7KP9fuxBipbuN3f7zgrS99lb1c9k8?= =?us-ascii?q?IYnggtUoauKHbQC7rUVRE8B9lIT1R//nu2YgB/Ecf6YEDO8DXptWZBUhrwOhBo?= =?us-ascii?q?KevrB4Xck9q41/yo+53Ufg5EmCexbal8IRiyrwjdrMcbjZZtJqswyBbCv2dFdf?= =?us-ascii?q?lRyW50P1yYggzy5t23/J5t8iRQv+wu+stdWqjkfKo2UKJVAi0+P286+MPkux/D?= =?us-ascii?q?TRCS5nQHSWUZjgBIAwne4x7kWJr6rzb3ufB82CmeOs32UKw0VDG/5KplVBPklC?= =?us-ascii?q?EKPCM3/2HNjsx7kbxVrhSvqRdix4LYeZyZOOZ7cq7bYNgUR3dOXtxJWiJBHI2y?= =?us-ascii?q?coUBAekGM+laoYn9v1kDoQawCAayH+Pi0SNEimPs0KEmyektDR3K0Qo9FNwOqn?= =?us-ascii?q?TUq9D1Ob8cX++vyqnD0DHNb+5M2Tfy9ofIdAshquyLUL1ta8XRz0gvGB3BjlWS?= =?us-ascii?q?soHlOi2a1uAJs2eB6epgUu2uh3Q7pAF2pzii38EhgZTKiIIN0l3I6Cp0zYkvKd?= =?us-ascii?q?C4VUJ3e8CoHZROuy2AKod6Wt4uTmVmtSogxbALu4S3cDULxZkn3RLTduKLfoyO?= =?us-ascii?q?7xn+TuieOy14i2hgeL+nghay9lWvxfPkW8mv1VZKsjJFkt7RtnARzxDT6taISv?= =?us-ascii?q?96/kq5xTaAzRrT6uBZIUAvj6bbN54gzaIwlpoUq0jDGDP5mF7qg6OMc0Uk++yo?= =?us-ascii?q?5/zmYrXguJCcK5d5hhzxP6khgMCyAfk0PhIQU2WU5+iwzqDv8VX8QLpQj/02lq?= =?us-ascii?q?fZsIrdJcQevqO5GBFa0oIi6xa5Ejen380UkmIALFJYfhKIk5bmO0rVLfDkDfaw?= =?us-ascii?q?n1SskDBxy/DAJb3uGI/BLnfEkLf/Zbp98VJTyBIvzdBD4JJZErMBIPX1WkDrqN?= =?us-ascii?q?zYDgU2MwqvzublD9V90IYeVniUAq+FLqzSq0SI6vgoI+mWa48foCz9JOQ95/7y?= =?us-ascii?q?kX85nkcQfaur3ZQNdH+4He9mI0KfYXrtnNcMCmkKvg4jTO3lk1KCTDhTZ2qvX6?= =?us-ascii?q?4m4TE7Eo2mB5/ZRo+xmLyBwDu7HppOa2BeFF+DCmnnd4OFW/cQbyKfOc5hnSIa?= =?us-ascii?q?Wre/UYMh0guutADiwbp9MuXU4jEYtY7k1NVt+uLTkhcy9TppAMuD12GNTnp5kX?= =?us-ascii?q?kWSD8s26Bzu0t9yk2M0aJgmfxXCcRT5+9VUgc9LZPT0vB6BMroWg/aYtiJT1Om?= =?us-ascii?q?Tcm8DjEqUtI92dkObFhhG9+6lBDMwzKqA6MJl7yMHJE086Tc32TvKMZ51XnG0b?= =?us-ascii?q?cuj0U8QspPLmCmgbZ/+BbVB47MiUqZlqKqer8b3C/C7muDynCOvE5AWg5qTarF?= =?us-ascii?q?RWwfZlfRrdnh5kLDTriuCbI8PwtEzc6OM6pKatvzgVVAXvjjItfeY2Ovm2iuHx?= =?us-ascii?q?qIwK2DbJbycWUHwCrdEFQEkxwU/XueKwc+Hj2uo3jfDDx1Dl/ve1nj8fN/qHOg?= =?us-ascii?q?Vk80yxuFYFF/2Lav/R4Vn/OcQesJ3r0YoCchtyl0HFGl0tPYCtqAow9hc7tGYd?= =?us-ascii?q?4m7ldIy3/WtwtnPpO6N6BinFkecwZpsEzyyxV7EIJAkdIlrHky1gp9NbqY0E9d?= =?us-ascii?q?dzOfxZ3wNKfXJXP0/B+zaq7WwUrT0NOO+qcO8fg4sFvivBqzGkol6XVn3MFf02?= =?us-ascii?q?GA6ZXSEAoSTZXxX1409xdgpLHaZTQ96pjX1XJ2Mqm0tSLC18guBOs/xRaqZ81f?= =?us-ascii?q?P7+cFA/uD80aANCjJ/Y3lFizbxILIvpS+bUuMMy6cvuKwqmrPPxvnDi+l2RI/J?= =?us-ascii?q?h90l6Q9yp7UuPHw4wKw/WG0QucSzf9jFChv9vsmY9YZDEdAGy/yTTlBIFLfKFy?= =?us-ascii?q?e5gECXu2Kc2t2tp+n4LtW2Jf9FO7HFMG1tWpeR2Jb1zhxgBQzkIXoXupmCu91T?= =?us-ascii?q?N0lSslrqyB0yzS2+7ibgYIOnZXRGl+ilfhOYa1gMoeXEi0cQcpjgCl6F3kx6dF?= =?us-ascii?q?vqRwNHTTQUJScyjxNWFiXbO6tqCebM5X9JMorSJXXfygYV+HV7H9ogEV0yf4Em?= =?us-ascii?q?RCwzA7ci2ltY/inxxmkm6dKmh8rGbBc8Fq2Rjf/MDcReJW3jceWil4iCXYBkS7?= =?us-ascii?q?P9mz59mbi5fDsue4V2KuTZBTdSjrzYWauyuh4m1mGxq/n+q8mtf/Cwg1zTf718?= =?us-ascii?q?V2VSXPtBv8Zojr17+mMe5+ZUlnGlv868t8GoFjnYo9n4oQ2WAbhpWT/HoIjXzz?= =?us-ascii?q?Pc9d2a3gcHoHXSQLzMLN4Aj5xE1jKWqEx5j+VnWZxstuecO6bX8R2iMz9M1KE7?= =?us-ascii?q?qU46BfnSdvpVq4tw3Ra+BnnjgB0fsu9GIag+YRtQo11CqdH7QSEVNCMiD2jBuI?= =?us-ascii?q?6NS+rLlQZGaparWw0VZyndamDL6euA1cXmj2eos6Fy9q8sp/KE7M0GH06oz8e9?= =?us-ascii?q?nfc9QTtgaPnhfDkedVLokxlvwUiip7I279umcly+Ejhxx0wZ66pJSHK3lq/K+h?= =?us-ascii?q?Gh5XLCD1Z8cN9TH1l6lemNqW0J61Hph6BzULR4XnTeizED4IrvTnMBuOECcgpX?= =?us-ascii?q?iFF7rfGhWf6Eh4oH7VFZCkKW2XLmEDzdp+XBmdOFBfgAcMUTUkmJ42CxunxNLn?= =?us-ascii?q?cEhk5jAd/Fj4pQVQyuhwLRnwTn/fpBu0ajczUJWfNABZ7hxG50rOLcOe7/5zHi?= =?us-ascii?q?FB8p2vtgONLHaXZwNSDWEGQkaEHUzsPqGy5dnc9OiVHum+LvvKYbqQsuFeUvCI?= =?us-ascii?q?xZyh0oR44zaMKsWPPn5nD/IlwEZDW252G9jBkTUVVyMXjz7Nb9KcpBqk9C14tM?= =?us-ascii?q?a/8OjsWALq/oaPBaVdPsho+xCsm6iDL/SQhCF7KTlGypwM2WXEyL8F3F4dkytu?= =?us-ascii?q?bSWiEawctS7RS6LdgrVXAAMGZC5oO8tI6q090hNLOcHFltP/zqR4geItC1dZSV?= =?us-ascii?q?zhndmkZdYQL2CzLl/HAVyENLCBJTzL2Mz4e7+zSbhKgOVTrR2wti6RE1X/MTSb?= =?us-ascii?q?iznpSxevPPlCjCGBIhNRpZq9fQxrCWj/S9LmcQa2P8Vrgj0z27E0gWnKNWEEOz?= =?us-ascii?q?hmb0xNtqGQ7T9fgvhnHWxB9GBqLfGcmyuC4enYK4wWseB3AiR6luJa5m41y71J?= =?us-ascii?q?4yFFXvN1nDHertl0o1GpiuOP0CZoUAJSqjZXg4KGpVhtOb7H+ZZaVnbE5ggC7X?= =?us-ascii?q?uLBhQRvdRlCcDvu7pKxdTVkKLzNTFC/MjO/ccFG8jUL8GHMXomMRbzHj7bEhcF?= =?us-ascii?q?RyaxNW7Dn0xdjO2S9nqNo5g8q5jsnJ4ORaFAVFEuDPwVFF5lHNsYLJdwRDMknq?= =?us-ascii?q?aRjNQU6nqmsBnRWMJas4jcWfKTDvXvLzCZgKJZaBQW2rz4LJ4cNovh10xlcFl6?= =?us-ascii?q?k5zAG1DMUtBVvi1hcgg0rV1X/3hxVGIzxVzqZxiq4H8LC/G0mBs2hRF/YeQp7z?= =?us-ascii?q?js5Fg2KkDNpCsqn0k7gc/ljiyJcD7tMKewWplbCzbzt0g0KJ/7WQF1bAyskkxi?= =?us-ascii?q?LzjEXbVRgKVjdW1wlADcvp5PFuJGQq1ffB8c3/eXaOs00V5EsCWo2VdH5ffZCZ?= =?us-ascii?q?tljAYqd4CjoGhE2w94b941IrfQJLZTwVhWnaKOvS6o2vo3wAAAO0YH6HmSdzIQ?= =?us-ascii?q?uEwUKrkmIDKl/vZy5gyZhTRMYnIMWOYqov9x7Uw9Ov6AwD/n075NMkCxLfKQLq?= =?us-ascii?q?ODt2jGi8GIXks61lkUmEld4bh2zcAjflKJWE810ruRFgkGNdHZJA5PdcpS7n/T?= =?us-ascii?q?fCiVserT3Z11Ip+9FuH0Te6OrqoUhFyrHBoxFYQW8ssBBoWs0F3fLcr/KL4Fzg?= =?us-ascii?q?8t6xrtJFSEC/REYx2LkDEao82ly593x4ZdLCkHAWphKSW3+qrXpggyjfqYQtg2?= =?us-ascii?q?ZnYaXo0ZNnM5Q8C1hylZv3FcAzatyeIZ1BKO7zniqSTMFDP8dcZsZO+IZRNwD9?= =?us-ascii?q?G74Sgw/LSziV7Q9JXeO3z2OM98utDR8+MappeGC/RSTbVntUfThZVYTWSwU2HT?= =?us-ascii?q?Cd61O4Twa440YNz3EHa7UkawizQpT8fxJ9utIa+IgRn0SopOtomUwiwjP9enFj?= =?us-ascii?q?4CAxdwu/0D5KVkaA0fYpo7ZBnotxg+N62/OwqXz9SuQma3JjRNVfVfy/u1Z6BP?= =?us-ascii?q?xSo2cuC60GcgTo09z+Sv/k4NXosFjhfCxfu4ZoleVibyGnpBewXPuyU5lm5hNv?= =?us-ascii?q?oszecl2h/It0cTMyyTfuxzdGNEp808BU+VIXhuEGU4Q16cgpbd7QG02rAT/y1d?= =?us-ascii?q?n9FS0eJfq3XxpZ7fbyiqWKCyp5XVrjAsbd44rK1tKYbjONeJtIvCnjzDS5ndqh?= =?us-ascii?q?aKXzC8F/dBgNdfPTxYT+dSmWE+I8MGo4pA5VA2VsckKLxFELMsqayyaTp4ES4S?= =?us-ascii?q?yjcUV5mG3DwDnui827zalhOLcJo6KRIKrY9Mj8caXSNtfiweo6qjWJnMmG+fVm?= =?us-ascii?q?gHOgET4hpQ5AgYjI9/Yvjl4JbUTJ9L0zNZv/B0XTHXGZRz61T7TWWWgVz5SPq/?= =?us-ascii?q?ieypwRxdw+7s0tUBXx5/E0ddzf5MlkQ0MLF3N7UQvonSvz+Sb0z6pmXtx/C9KV?= =?us-ascii?q?lN083bbUP4A5TBtWr9VC0c9nkURY5AyHHfCZQSnRB2aLwupFlWJoCpZFr+7SQ+?= =?us-ascii?q?x4t1B7m4Sdyrx1E9oHcIXSulD9pBC+BjsFLWQjJlYIumqJT7NJpMXGBc4pqdq0?= =?us-ascii?q?1WkE91KS621YJcK91R4j4LRDVPuTKdvN+oR81Z1852CJsMItlktnf4H6NEP4OR?= =?us-ascii?q?rGMqtbz1zX/Z4Cs8sFa8xDW8AaO4SPhZ/2IGEAUzO2ueslUvD/cr8mrK6F/NqE?= =?us-ascii?q?10/+FBCriMlkhxoTd9HpFSBjlSz3ylKUp8TGVeueVANKvVa9BcQ+U1ZRK3Jxw+?= =?us-ascii?q?Evsm0leV/U1omHf2eDZ+tg1E9CDBRwM0TzUagq/xmT0CrcGqIT8aRIhSbTo7ay?= =?us-ascii?q?fKNhmWlj1JsxZHc0FlRZQZDchf+70B2otU5MXCQ162KS4ZRBxiKh440f1HmE5B?= =?us-ascii?q?t0WXZzvQAhe2evbUrBJ3Z9uRo9C0I/jj+gdIlJ/nuvgi96ofX32mhRGtQdfGoo?= =?us-ascii?q?DnuN2FqleCeaXlP+CyenLOUD/MjRWsirg+FJnK4zLfMAxFJJlm0XAke4TuCXbX?= =?us-ascii?q?PRRaIKIWP1BbWr5nZtVGuO9ae9RpeKIO+a9zGB2LWA/gGIuyo/ZYNFrTQyrRLz?= =?us-ascii?q?mZ+OylvY3T9aDdSfTnZsGU33bHWL53MY1n5jnnALrqyohe+lfs2vhx6Ex6T0TG?= =?us-ascii?q?Mzqbo9TlPA8L49OidkT6tJ0zATzWGItwkGbqxkxYa8oXWTOl/4oFx55C9XbwTf?= =?us-ascii?q?540lLpv+1M9rlk7o037K51ycuuIqfSM/tau1d9AheIHgVq6oktAG9nSmBUeOAR?= =?us-ascii?q?LPPRcroFjcDyse/4Dbca6BuL9OxFctvIO1vOmtGhBT2GTxxLghsBoyYALgSAz/?= =?us-ascii?q?6Fh7N0ScG9qOj7wE0t+V++LgUCzL93+4eJ4a+IpPLTbxvNzLgLRqnqSdn1rrQ3?= =?us-ascii?q?oU+S4ucklLEWcGxvfwKnCPQdVtIaxmr4z6Al1yQsE83ZH7Ln5fFMSWk0ni76lJ?= =?us-ascii?q?B7BFUWHekYHbyV8oRChm04gfDWNsUKcqBenWaCDRGkEqIDyX6v7yuYPmxljwrT?= =?us-ascii?q?3B7uWmyz7UX5rSliTSvL1dfjnVJfVqOrCkdKQyqpJUh4vSuJPArsr9f3uKI17E?= =?us-ascii?q?QsPmzlstKNmnGhN6lMH83jPtycPDU7pE4KjJ0rWNOjw4cbGcCyIN0J6nFxcuPe?= =?us-ascii?q?63+3ky9Gu6pHgo3e4seJ+vXYA3atlKiaq7SXyzBe1Hc4oV8+6te6NvHN/N2GWf?= =?us-ascii?q?Ko2HgNTy1noQvOQwa1qqDHr1ATIUGL1FzLmIkKM9xC03k3yFzp5O85QN0p7AVe?= =?us-ascii?q?DIHAZ/Ecqj/vJDv421GfY8g4ViOGyTtYAkr1EUVkGKg7wG/wp9jGlWnK9F0nWI?= =?us-ascii?q?ZwbFfqhQdtAIUmM00t50YYwjEZHQgLdx+bEKmiBV75IoscSUgDdROH0aC4eqc2?= =?us-ascii?q?2E1+2bav6/HTbONiHaoNN/BdjgGUkFhdBJ0WrbUUQKhgdF9F6K7Xug/iBpDmX/?= =?us-ascii?q?nnj3U/L+G6T9tB8c8Hq3st/BqwSwCn6ZdZ4LYRkIqIebJcYZjQoMB86F9q6iUO?= =?us-ascii?q?dixWjhlwlRG5UeEApOD7+NfbrZ6o5/2yW6YqWuoY6QI7B3lkj5v3mlAsu8vb1+?= =?us-ascii?q?BGSo3akY7/6hxCI2aWuIbG1BlxMfIOJJi3fLl893UGKS8eJ2gNPdaPcPkz/Stt?= =?us-ascii?q?MDTV51xfDcIBfssYM9DRmQ9Iik3oVrZT9tDYGlOCCId8adoo72zpxzAx65c8Vf?= =?us-ascii?q?zg6DCuL5DF815NJ+9DjDlrlN/auOgV2+TdCCwN7nmfdRd42T6Ny5iCC/bx4eWD?= =?us-ascii?q?0srUWEkcHi4rSYtdIiSN+RC/TOqviJrpSh+U6tP0gJ8me0KfXGaxk7oZsqZMCu?= =?us-ascii?q?NAjiT73iRAGYD1nf2VrsGs5HFRtlJZDIZ59QfFF7lHPpVnJRT4kdGmRkdiCSv5?= =?us-ascii?q?ZMHUcR0utO2NxugS5+V+Nk3+ZZIUIx8fz7L192BVTwt0R7LsuFaWQ/4RbsN8SP?= =?us-ascii?q?zYtnBV9Z5gK6gXMVibpZzlsjBIqFQsDw8ycrMwrztadk7VnA1OQKv0vbENiwQG?= =?us-ascii?q?Xd5+o09MFnq6OHgi6DrfSaRVkK6RBeQa8jqPVawOSFxkPD5xTR2z2ZVufaapnP?= =?us-ascii?q?9cv2NJmyNyuv4q3CJ8SBu7oy3sqLoH2Sg897GgqDUBpXtFQ/2ckyfPCVVDyu4G?= =?us-ascii?q?grscC3bm9FyzfXgCbIr04Ll8JsTg9JIs42o+YRU9ZSIGWfmvCyDqg6OOHIOPrM?= =?us-ascii?q?pWhASRt8XWcb+zMS8SO6w8yRL9XXd91BPTnBJ18GQWQzWg68QkKJ+6OcY/ySqi?= =?us-ascii?q?AXLbe0oU4qNVrMvxskYGTOkoZlNvzmVj1tOKRyMXS8zJBWk1khIoaWNaf5Jf8R?= =?us-ascii?q?UaDbUngi6Uvqla+QEZeDjUEoCi+ojeg8jI3X09QMxxxmLRoK2Fh48l3Gdjm9xq?= =?us-ascii?q?8i6EoG4SePDAU89wHnjz0Z9Sye7+Z/StquAHT49myLW9UPAcKcSj/Gq22IlwWk?= =?us-ascii?q?C73LgeGEC5MOAbzLfBTyilUXGYWfiMc2WUgzY5M0vy6AK0Ll02dMhKrFEyMu/Y?= =?us-ascii?q?ip5aiQLhTat+Rj+Mql/D0GwjLeQaehozuIemeAwKT+kRavOeJec0w/0+D10MYG?= =?us-ascii?q?HPHSdsDe+5r0KtlpBhO3p8+UX6ffjt8gf+PdSJBBYEF5Lao4Vq+fy+QWKBJWNg?= =?us-ascii?q?zANsM0Zp7evfEE4xtuBEeZaLgdfQn8h70fICd/p1Py0ypNoTmoN76YaKy8qLcB?= =?us-ascii?q?DRzpP3Jd7LuPiYB+PQw14temFAXboTeRn16JkiPt4lR73TGqNUvBoEBaggQZwu?= =?us-ascii?q?K3n++bpxLANybg7Rfqq7jtPtpuKRaZtev2XW4U4oLCfApx0DzeS5TQt/b5+0nH?= =?us-ascii?q?jyOJQwSShar91xCxtpAJdPG9keoAW5GZKUnr+0i8Op8UNgp+AKqbbwCuzN1Nmh?= =?us-ascii?q?24VxXp5a5VGEPTrIAKlrg19ljvipgvrb05n+E8XiedQeWOh8WG7FZafMHp+jJT?= =?us-ascii?q?KWJsL8Z0lG/qaH0L1nVhWRZSb5X7eJtSGjO/tk/UU7xZJifOXN1Dwi9arW2Njs?= =?us-ascii?q?aGFBoCess3qJO4BC7FzFH+DeWAhUSfWd+mZ/AaIXdZf09PsJMdE6xdiT+RV87D?= =?us-ascii?q?RD0MuDJKistVHM2kN9dZ3FKEvp2iA5WZQFIRilNkssm2DZoGzHAXtANsikNdVt?= =?us-ascii?q?gNGNAxzv/UZxmmYtaXVaF2r1Q9eRJWgb28WjZA2F9AJLE8wPn+ipdk4krqeyU/?= =?us-ascii?q?VnOo1ZmeW2s7UKic1mJDrISMhePiHQN6N2PiFLAuXUulcnfgQIs6MrVYcxZJiO?= =?us-ascii?q?Jl4HMUibxCzuzQrCy1D0d8e22KeHOikW7m5Hz7XD0TRWoAm5o/mZiNX5UL/FdJ?= =?us-ascii?q?H2QOLSMC09WzGVXzs9Clyp+Va6tPoAp/eYP2MfrUoPYiKTFQ4fvKZvosbMDmXL?= =?us-ascii?q?g+1sYIUKhOyGWyD3UCB4lq8yBiFRtUCWQvoDDhLbb3n7j2pZpgOiJ+VA/XX/b7?= =?us-ascii?q?2X3qBVQfAZApNQcv2FRNvVYeteJzktljoFOeuxfMbRr6gn3VLSTGsYEq7I9FuE?= =?us-ascii?q?QE6QXPOc22GjYYJApIUwuyw16vrMjyR3FOLOJL/ZqDmwoaCiiyPNleTYHksweU?= =?us-ascii?q?M4hvlKVGWIxhhNLGMsDtwRvEjrRb7GbEFJgiF6wdly0gMBLVwgGkZl1WdbybPk?= =?us-ascii?q?QsA=3D?= X-IPAS-Result: =?us-ascii?q?A2F6AgBSmCVZ/wHyM5BdGwEBAQMBAQEJAQEBFgEBAQMBAQE?= =?us-ascii?q?JAQEBgwEpgW6OepBlmAIliHNXAQEBAQEBAQECAQJoKIIzJIJCBgECJFUDCQEBF?= =?us-ascii?q?wgpCAMBUxkFiFGBUASuUTomAotHiD2NcgWJR4ZigQOMd5MqggSFPINgDIZJlE5?= =?us-ascii?q?YgQpPIhVGhDMBQxyBZnOGZiqCEwEBAQ?= Received: from unknown (HELO tarius.tycho.ncsc.mil) ([144.51.242.1]) by emsm-gh1-uea11.nsa.gov with ESMTP; 24 May 2017 14:29:04 +0000 Received: from prometheus.infosec.tycho.ncsc.mil (prometheus [192.168.25.40]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id v4OERxaW026416; Wed, 24 May 2017 10:28:14 -0400 Received: from tarius.tycho.ncsc.mil (tarius.infosec.tycho.ncsc.mil [144.51.242.1]) by prometheus.infosec.tycho.ncsc.mil (8.15.2/8.15.2) with ESMTP id v4OEJOeH210198 for ; Wed, 24 May 2017 10:19:24 -0400 Received: from goalie.tycho.ncsc.mil (goalie [144.51.242.250]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id v4OEJOKO022590 for ; Wed, 24 May 2017 10:19:24 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A1B3AgBslSVZf4GlL8FdHAEBBAEBCgEBgyyCF456kGWYBoYkAoNFAQIBAQEBAQITAQELFl2FGQMDJ1IQGAgxVxmIVoFUrko6iz0yiD2NcgWJR4ZigQOMd5MqggSFPINshkmUToFhTyIVRoR3HIFmPTaGZiqCEwEBAQ X-IPAS-Result: A1B3AgBslSVZf4GlL8FdHAEBBAEBCgEBgyyCF456kGWYBoYkAoNFAQIBAQEBAQITAQELFl2FGQMDJ1IQGAgxVxmIVoFUrko6iz0yiD2NcgWJR4ZigQOMd5MqggSFPINshkmUToFhTyIVRoR3HIFmPTaGZiqCEwEBAQ X-IronPort-AV: E=Sophos;i="5.38,386,1491278400"; d="scan'208";a="6064689" Received: from emsm-gh1-uea10.corp.nsa.gov (HELO emsm-gh1-uea10.nsa.gov) ([10.208.41.36]) by goalie.tycho.ncsc.mil with ESMTP; 24 May 2017 10:19:22 -0400 IronPort-PHdr: =?us-ascii?q?9a23=3AiE+FMB10kav9Hn+nsmDT+DRfVm0co7zxezQtwd8Z?= =?us-ascii?q?se0ULvad9pjvdHbS+e9qxAeQG96KtLQf0qGI7ujJYi8p2d65qncMcZhBBVcuqP?= =?us-ascii?q?49uEgeOvODElDxN/XwbiY3T4xoXV5h+GynYwAOQJ6tL1LdrWev4jEMBx7xKRR6?= =?us-ascii?q?JvjvGo7Vks+7y/2+94fdbghMhjexe71/IAi5oQjQtsQdnJdvJLs2xhbVuHVDZv?= =?us-ascii?q?5YxXlvJVKdnhb84tm/8Zt++ClOuPwv6tBNX7zic6s3UbJXAjImM3so5MLwrhnM?= =?us-ascii?q?URGP5noHXWoIlBdDHhXI4wv7Xpf1tSv6q/Z91SyHNsD4Ubw4RTKv5LpwRRT2lC?= =?us-ascii?q?kIKSI28GDPisxxkq1bpg6hpwdiyILQeY2ZKeZycr/Ycd4cWGFPXNteVzZZD428?= =?us-ascii?q?cYUBEuQPM+VfoYb/qVsDtgeyCRW2Ce/z0DJEmmP60Ksn2OohCwHG2wkgEsoAvn?= =?us-ascii?q?vOqtX+KaMcUf2vzKnH0zrDaehW0ir65YfVaB8hp/CMUqx0ccrT0kQvEh3KjlGU?= =?us-ascii?q?qYP/OTOV0esMv3KH4OpnUOKikmgqoBxyrDi33sogl43Ei4wPxl3L9yh12ps5KN?= =?us-ascii?q?y4RUJhfNKoDp9duieHPIVsWMwiWXtnuCMix70Gp5G7eC8KxYwixxHBb/yHd5KH?= =?us-ascii?q?4hTkVOeeOzt3mHVldKi+hxa26USgy+v8Wdeo0FtSsyZIltfBumoC2hHR8MSLV/?= =?us-ascii?q?pw80e71TqSyQze7vlIIUUumqraL54hzKQwlp0WsUnbAyD5gkP2jK6IeUUg+Oil?= =?us-ascii?q?8OHnbavipp+YLYB0jAb+M6s0lsOjBuQ4NxACX3KH9uSkyL3j4Ur5Ta1RjvIolq?= =?us-ascii?q?nZsZbaJdkUp6OiHw9U0pos6xa4Dzu81tQYhmMIIEhKeBKAkYi6c23Jdev1Cfa5?= =?us-ascii?q?nkSEjCZgx/eAOKboRJrKMCvtirDkKJp07QZ+1RA8wNZEr8ZYA7cALfbxckr8sN?= =?us-ascii?q?jRCBgpdQezxrC0W51GyooCVDfXUeeiO6TIvArNv7p3Lg=3D=3D?= X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0HvAQDqlSVZf4GlL8FdHAEBBAEBCgEBF?= =?us-ascii?q?wEBBAEBCgEBgwGCF456kGWYBoYkAoNFAQEBAQEBAQECAQIQAQELFl2CMyQBgkE?= =?us-ascii?q?DAydSEBgIMVcZiFaBVK5IOos9Mog9jXIFiUeGYoEDjHeTKoIEhTyDbIZJlE6BY?= =?us-ascii?q?k8iFUaEdxyBZj02hmYqghMBAQE?= X-IPAS-Result: =?us-ascii?q?A0HvAQDqlSVZf4GlL8FdHAEBBAEBCgEBFwEBBAEBCgEBgwG?= =?us-ascii?q?CF456kGWYBoYkAoNFAQEBAQEBAQECAQIQAQELFl2CMyQBgkEDAydSEBgIMVcZi?= =?us-ascii?q?FaBVK5IOos9Mog9jXIFiUeGYoEDjHeTKoIEhTyDbIZJlE6BYk8iFUaEdxyBZj0?= =?us-ascii?q?2hmYqghMBAQE?= X-IronPort-AV: E=Sophos;i="5.38,386,1491264000"; d="scan'208";a="7398846" X-IronPort-Outbreak-Status: No, level 0, Unknown - Unknown Received: from mail-il-dmz.mellanox.com (HELO mellanox.co.il) ([193.47.165.129]) by emsm-gh1-uea10.nsa.gov with ESMTP; 24 May 2017 14:19:13 +0000 Received: from Internal Mail-Server by MTLPINE1 (envelope-from danielj@mellanox.com) with ESMTPS (AES256-SHA encrypted); 24 May 2017 17:18:56 +0300 Received: from x-vnc01.mtx.labs.mlnx. (x-vnc01.mtx.labs.mlnx [10.12.150.16]) by labmailer.mlnx (8.13.8/8.13.8) with ESMTP id v4OEIpEg024434; Wed, 24 May 2017 17:18:55 +0300 From: Dan Jurgens To: selinux@tycho.nsa.gov Subject: [PATCH v1 1/2] selinux-testsuite: Infiniband pkey tests Date: Wed, 24 May 2017 17:18:42 +0300 Message-Id: <1495635523-84017-2-git-send-email-danielj@mellanox.com> X-Mailer: git-send-email 1.7.1 In-Reply-To: <1495635523-84017-1-git-send-email-danielj@mellanox.com> References: <1495635523-84017-1-git-send-email-danielj@mellanox.com> X-BeenThere: selinux@tycho.nsa.gov X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Security-Enhanced Linux \(SELinux\) mailing list" List-Post: List-Help: Errors-To: selinux-bounces@tycho.nsa.gov Sender: "Selinux" X-Virus-Scanned: ClamAV using ClamSMTP From: Daniel Jurgens New tests for infiniband pkeys. Most users don't have Infiniband hardware, and if they do the pkey configuration is not standardized. There is a configuration file for enabling the test and setting environment specific test configurations. If the tests are disabled they will always show as passed. Signed-off-by: Daniel Jurgens --- v1: - Synchronized interface names with refpolicy changes. - Changed pkey test to not assume the default pkey is labeled, instead it take a list of indexes with labeled and unlabeled pkeys. It checks that the labeled aren't allowed, unlabeled are allowed, and it labels the unlabeled ones to make sure they aren't allowed when labeled. --- README | 9 ++ policy/Makefile | 3 +- policy/test_ibpkey.te | 25 ++++++ tests/Makefile | 4 +- tests/infiniband_pkey/Makefile | 7 ++ tests/infiniband_pkey/create_modify_qp.c | 144 +++++++++++++++++++++++++++++++ tests/infiniband_pkey/ibpkey_test.conf | 18 ++++ tests/infiniband_pkey/test | 84 ++++++++++++++++++ 8 files changed, 291 insertions(+), 3 deletions(-) create mode 100644 policy/test_ibpkey.te create mode 100644 tests/infiniband_pkey/Makefile create mode 100644 tests/infiniband_pkey/create_modify_qp.c create mode 100644 tests/infiniband_pkey/ibpkey_test.conf create mode 100755 tests/infiniband_pkey/test diff --git a/README b/README index deedae5..b64e2de 100644 --- a/README +++ b/README @@ -195,3 +195,12 @@ establish a base directory (based on the path of the script executable). This won't always be accurate, but will work for this test harness/configuration. $basedir = $0; $basedir =~ s|(.*)/[^/]*|$1|; + +INFINIBAND TESTS +---------------- +Because running Infiniband tests requires specialized hardware you must +set up a configuration file for these tests. The tests are disabled by +default. See comments in the configuration file for info. + +Infiniband PKey test conf file: +tests/infiniband_pkey/ibpkey_test.conf diff --git a/policy/Makefile b/policy/Makefile index 7bc7f95..46c9fb5 100644 --- a/policy/Makefile +++ b/policy/Makefile @@ -22,7 +22,8 @@ TARGETS = \ test_task_create.te test_task_getpgid.te test_task_getsched.te \ test_task_getsid.te test_task_setpgid.te test_task_setsched.te \ test_transition.te test_inet_socket.te test_unix_socket.te \ - test_mmap.te test_overlayfs.te test_mqueue.te test_mac_admin.te + test_mmap.te test_overlayfs.te test_mqueue.te test_mac_admin.te \ + test_ibpkey.te ifeq ($(shell [ $(POL_VERS) -ge 24 ] && echo true),true) TARGETS += test_bounds.te diff --git a/policy/test_ibpkey.te b/policy/test_ibpkey.te new file mode 100644 index 0000000..b2f5057 --- /dev/null +++ b/policy/test_ibpkey.te @@ -0,0 +1,25 @@ +################################# +# +# Policy for testing Infiniband Pkey access. +# + +attribute ibpkeydomain; + +# Domain for process. +type test_ibpkey_access_t; +domain_type(test_ibpkey_access_t) +unconfined_runs_test(test_ibpkey_access_t) +typeattribute test_ibpkey_access_t testdomain; +typeattribute test_ibpkey_access_t ibpkeydomain; + +dev_rw_infiniband_dev(test_ibpkey_access_t) +dev_rw_sysfs(test_ibpkey_access_t) + +# Define a pkey type for labeling pkeys during the test. +type test_ibpkey_t; +corenet_ib_pkey(test_ibpkey_t) +corenet_ib_access_unlabeled_pkeys(test_ibpkey_access_t) + +# Allow all of these domains to be entered from the sysadm domain. +miscfiles_domain_entry_test_files(ibpkeydomain) +userdom_sysadm_entry_spec_domtrans_to(ibpkeydomain) diff --git a/tests/Makefile b/tests/Makefile index fb8a0aa..7dfe2a8 100644 --- a/tests/Makefile +++ b/tests/Makefile @@ -4,13 +4,13 @@ export CFLAGS+=-g -O0 -Wall -D_GNU_SOURCE DISTRO=$(shell ./os_detect) -SUBDIRS:=domain_trans entrypoint execshare exectrace execute_no_trans \ +SUBDIRS:= domain_trans entrypoint execshare exectrace execute_no_trans \ fdreceive inherit link mkdir msg open ptrace readlink relabel rename \ rxdir sem setattr setnice shm sigkill stat sysctl task_create \ task_setnice task_setscheduler task_getscheduler task_getsid \ task_getpgid task_setpgid file ioctl capable_file capable_net \ capable_sys dyntrans dyntrace bounds nnp mmap unix_socket inet_socket \ - overlay checkreqprot mqueue mac_admin + overlay checkreqprot mqueue mac_admin infiniband_pkey ifeq ($(shell grep -q cap_userns $(POLDEV)/include/support/all_perms.spt && echo true),true) ifneq ($(shell ./kvercmp $$(uname -r) 4.7),-1) diff --git a/tests/infiniband_pkey/Makefile b/tests/infiniband_pkey/Makefile new file mode 100644 index 0000000..60f0d24 --- /dev/null +++ b/tests/infiniband_pkey/Makefile @@ -0,0 +1,7 @@ +TARGETS=create_modify_qp + +LDLIBS+= -libverbs + +all: $(TARGETS) +clean: + rm -f $(TARGETS) diff --git a/tests/infiniband_pkey/create_modify_qp.c b/tests/infiniband_pkey/create_modify_qp.c new file mode 100644 index 0000000..495ef5b --- /dev/null +++ b/tests/infiniband_pkey/create_modify_qp.c @@ -0,0 +1,144 @@ +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include + +struct ibv_qp *qp; +struct ibv_context *context; +struct ibv_pd *pd; +struct ibv_cq *cq; +struct ibv_srq *srq; + +void cleanup_ib_rsrc() +{ + ibv_destroy_qp(qp); + ibv_destroy_srq(srq); + ibv_destroy_cq(cq); + ibv_dealloc_pd(pd); + ibv_close_device(context); +} + +int init_ib_rsrc(char* deviceName) +{ + int ndev = 0; + struct ibv_device **dlist = ibv_get_device_list(&ndev); + struct ibv_device *device = NULL;; + struct ibv_srq_init_attr srqiattr; + struct ibv_qp_init_attr qpiattr; + int i; + + if (!ndev) + { + fprintf(stderr, "No IB devices found.\n"); + exit(1); + } + + for (i = 0; i < ndev; i++) + if(!strcmp(deviceName, dlist[i]->name)) + device = dlist[i]; + + if (!device) + { + fprintf(stderr, "Couldn't find device %s\n", deviceName); + exit(1); + } + /* Open context */ + context = ibv_open_device(device); + if (NULL == context) + { + fprintf(stderr, "Unable to open device.\n"); + exit(1); + } + + /* Allocate PD */ + pd = ibv_alloc_pd(context); + if (!pd) + { + fprintf(stderr, "Unable to allocate PD.\n"); + exit(1); + } + + /* Create CQ */ + cq = ibv_create_cq(context, 2048, NULL, NULL, 0); + if (!cq) + { + fprintf(stderr, "Unable to create cq.\n"); + exit(1); + } + + /* Create SRQ */ + memset(&srqiattr, 0, sizeof(srqiattr)); + srqiattr.attr.max_wr = 2048; + srqiattr.attr.max_sge = 4; + srqiattr.attr.srq_limit = 1024; + srq = ibv_create_srq(pd, &srqiattr); + if (NULL == srq) + { + fprintf(stderr, "Unable to create sreq.\n"); + exit(1); + } + + memset(&qpiattr, 0, sizeof(qpiattr)); + qpiattr.send_cq = cq; + qpiattr.recv_cq = cq; + qpiattr.srq = srq; + qpiattr.cap.max_send_wr = 128; + qpiattr.cap.max_recv_wr = 4; + qpiattr.cap.max_send_sge = 5; + qpiattr.cap.max_recv_sge = 4; + qpiattr.cap.max_inline_data = 512; + qpiattr.qp_type = IBV_QPT_RC; + qpiattr.sq_sig_all = 1; + qp = ibv_create_qp(pd, &qpiattr); + + if (!qp) + { + fprintf(stderr, "Unable to create QP %d.\n", i); + exit(1); + } + + return 0; +} + +int init_rc_qp(uint8_t port, uint16_t pkey_index) +{ + struct ibv_qp_attr attr = { + .qp_state = IBV_QPS_INIT, + .pkey_index = pkey_index, + .port_num = port, + .qp_access_flags = 0 + }; + + return ibv_modify_qp(qp, &attr, + IBV_QP_STATE | + IBV_QP_PKEY_INDEX | + IBV_QP_PORT | + IBV_QP_ACCESS_FLAGS); +} + +int main(int argc, char *argv[]) +{ + uint16_t pkey_index; + uint8_t port; + int ret; + + if (argc != 4) + { + printf("Please enter \n"); + exit(1); + } + port = atoi(argv[2]); + pkey_index = atoi(argv[3]); + + init_ib_rsrc(argv[1]); + + ret = init_rc_qp(port, pkey_index); + cleanup_ib_rsrc(); + exit(ret); +} diff --git a/tests/infiniband_pkey/ibpkey_test.conf b/tests/infiniband_pkey/ibpkey_test.conf new file mode 100644 index 0000000..59f738d --- /dev/null +++ b/tests/infiniband_pkey/ibpkey_test.conf @@ -0,0 +1,18 @@ +# Enable(1)/Disable these tests +SELINUX_INFINIBAND_PKEY_TEST=0 + +# Infiniband device to use. +SELINUX_INFINIBAND_PKEY_TEST_DEV=mlx5_3 + +# Physical port on the device to use. +SELINUX_INFINIBAND_PKEY_TEST_PORT=1 + +# CSV list of pkey table indexes containing labeled PKeys +# These will not be allowed. +SELINUX_INFINIBAND_TEST_LABELED_PKEYS= + +# CSV list of pkey table indexes containing unlabelde PKeys +# This will be allowed, then temporarily labeled to see that +# they are disallowed. +SELINUX_INFINIBAND_TEST_UNLABELED_PKEYS=0 + diff --git a/tests/infiniband_pkey/test b/tests/infiniband_pkey/test new file mode 100755 index 0000000..d40a1f6 --- /dev/null +++ b/tests/infiniband_pkey/test @@ -0,0 +1,84 @@ +#!/usr/bin/perl + +use Test; + +BEGIN { plan tests => 3} + +$basedir = $0; $basedir =~ s|(.*)/[^/]*|$1|; + +my %conf; +$confpath = $basedir."/ibpkey_test.conf"; +open($f, $confpath) or die ("Couldn't open $confpath"); +while($r = <$f>) { + if ($r =~ /^\s*#/ || $r =~ /^\s*$/) { next; } + chomp $r; + ($k,$v) = split(/=/, $r); + $conf{$k} = $v; +} +close($f); + +if ($conf{SELINUX_INFINIBAND_PKEY_TEST} eq 1) { + $device = $conf{SELINUX_INFINIBAND_PKEY_TEST_DEV}; + $port = $conf{SELINUX_INFINIBAND_PKEY_TEST_PORT}; + + # Read GID 0, to get the subnet prefix. + $gid_path = "/sys/class/infiniband/".$device."/ports/".$port."/gids/0"; + open($f, $gid_path) or die ("Couldn't open $gid_path"); + $gid = <$f>; + close($f); + # The gid sysfs shows a fully expanded ipv6 address, just take the + # top half. + @tmp = unpack('(a20)*', $gid); + $subnet_prefix = $tmp[0].":"; + + @labeled_pkeys = split(/,/, $conf{SELINUX_INFINIBAND_TEST_LABELED_PKEYS}); + @unlabeled_pkeys = split(/,/, $conf{SELINUX_INFINIBAND_TEST_UNLABELED_PKEYS}); + + foreach (@unlabeled_pkeys) { + $result = system "runcon -t test_ibpkey_access_t $basedir/create_modify_qp $device $port $_"; + if($result ne 0) { + last; + } + } + if (@unlabeled_pkeys) { + ok($result, 0); + } else { + ok(1); + } + + foreach (@unlabeled_pkeys) { + $pkey_path = "/sys/class/infiniband/".$device."/ports/".$port."/pkeys/".$_; + open($f, $pkey_path) or die ("Couldn't open $pkey_path"); + $pkey_val = <$f>; + close($f); + + system "semanage ibpkey -a -t test_ibpkey_t -x $subnet_prefix $pkey_val"; + $result = system "runcon -t test_ibpkey_access_t $basedir/create_modify_qp $device $port $_"; + system "semanage ibpkey -d -t test_ibpkey_t -x $subnet_prefix $pkey_val"; + if ($result>>8 ne 13) { + last; + } + } + if (@unlabeled_pkeys) { + ok($result>>8, 13); + } else { + ok(1); + } + + foreach (@labeled_pkeys) { + $result = system "runcon -t test_ibpkey_access_t $basedir/create_modify_qp $device $port $_"; + if ($result>>8 ne 13) { + last; + } + } + if (@labeled_pkeys) { + ok($result>>8, 13); + } else { + ok(1); + } +} else { + ok(1); + ok(1); + ok(1); +} +exit;