From patchwork Thu Mar 1 23:52:08 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Paul Moore X-Patchwork-Id: 10252911 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id A5AD860365 for ; Thu, 1 Mar 2018 23:52:40 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 93F8426223 for ; Thu, 1 Mar 2018 23:52:40 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 880AB26CFF; Thu, 1 Mar 2018 23:52:40 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.2 required=2.0 tests=BAYES_00, RCVD_IN_DNSWL_MED autolearn=ham version=3.3.1 Received: from UPBD19PA09.eemsg.mail.mil (upbd19pa09.eemsg.mail.mil [214.24.27.84]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 84B7A26223 for ; Thu, 1 Mar 2018 23:52:38 +0000 (UTC) Received: from emsm-gh1-uea10.ncsc.mil ([214.29.60.2]) by UPBD19PA09.eemsg.mail.mil with ESMTP/TLS/AES256-SHA; 01 Mar 2018 23:52:36 +0000 X-IronPort-AV: E=Sophos;i="5.47,409,1515456000"; d="scan'208";a="9272079" IronPort-PHdr: =?us-ascii?q?9a23=3AjUqvSRVuhW/DdPD1Zy9tBocGL/nV8LGtZVwlr6E/?= =?us-ascii?q?grcLSJyIuqrYYRKEuKdThVPEFb/W9+hDw7KP9fy4Aipesd3Y7TgrS99lb1c9k8?= =?us-ascii?q?IYnggtUoauKHbQC7rUVRE8B9lIT1R//nu2YgB/Ecf6YEDO8DXptWZBUhrwOhBo?= =?us-ascii?q?KevrB4Xck9q41/yo+53Ufg5EmCexbal9IRmqowjdrMgbjIhtJqosyhbCv2dFdf?= =?us-ascii?q?lRyW50P1yYggzy5t23/J5t8iRQv+wu+stdWqjkfKo2UKJVAi0+P286+MPkux/D?= =?us-ascii?q?TRCS5nQHSWUZjgBIAwne4x7kWJr6rzb3ufB82CmeOs32UKw0VDG/5KplVBPklC?= =?us-ascii?q?EKPCM3/2HNjsx7kbxVrhSvqRdix4LYeZyZOOZ7cq7bYNgUR3dOXtxJWiJBHI2y?= =?us-ascii?q?YYgBAOQOMulEoIfzukMOoBmjCQSiGuzv0SRFhmP00KAgz+gtDRvL0Q4mEtkTsH?= =?us-ascii?q?rUttL1NKIKXO6v1qbI0DHDZO5R1zf674jIaA4uquyLULJodMrRzk4vFxnbgViL?= =?us-ascii?q?s4zqIS6a1uQXvGiH9eZvSeWvi2s+pgx3vzOhxd8sh5HUio8axV3I7yV0zJsvKd?= =?us-ascii?q?GmR0N3f8SoHIZIuyybNoZ6WN4uTmJqtSog1LELt5C2cDIIxZkpwRPUduaJfJKS?= =?us-ascii?q?4h35UeacOTJ4hHV4d72hnxuy6k2gyvHkVsmzzVZKsjJJktnSuXAJ0Bze8tSHRe?= =?us-ascii?q?Fn/kegxDaPzBrf6v1EIE8olarbLIQtwrgsmZoIrUvPBCr2mETyjKOOd0Uk/Pan?= =?us-ascii?q?6/j/b7n7qZKROJV4hwHjPqg0hMCyDvo0PhITU2SD/OSzzrzj/Un3QLVQif02l7?= =?us-ascii?q?HUsIvEKsQfp665BRJV04k65xmkCDemzdIYkmUZI1JeYx+Hk4joNE3OIPD/F/u/?= =?us-ascii?q?hU+sny1xy/DJOb3hHI3BLmLfn7f5YbZ990lcxRIxzdBY4ZJbEK0BIPLpVU/3r9?= =?us-ascii?q?HYDBg5Mwqxw+n9E9V9yp0RWXiUAqODN6PSq1CI7Po1I+aQfI8VpCr9K/896v7s?= =?us-ascii?q?j382g0MSfaqy3ZsQbnC4H+pmLl6XYXron9cAHnwFvhc4TOz2lV2OSzlTZ2y9X6?= =?us-ascii?q?gk/DE0FJqmDZvfRoCqmLGBxDm0EYZIaWBAC1CMDXDoep6FW/gSdi2dPNVtkjse?= =?us-ascii?q?VbiuU4Uhzw2htBfmy7p7KerZ4jAXtZXl1Nhz+uLcixUy9T1vAsuHzW6NVWZ0kn?= =?us-ascii?q?kPRz8s06B1uVZ9xUub0ahkn/xYEsRe6O5VUgggL57R1PB1C9f3Wg3dZNiJU0qm?= =?us-ascii?q?Ts+gAT4vUtI728UObFplG9W+khDD2DKnA74Tl7yXGpM09rzT333vKMZh0XbH1L?= =?us-ascii?q?Isj14+QsRRM22mg7Rw9wnXB4HSlEWYmLymdaMG3C7C7G2D13aBvFlEUA5sVqXI?= =?us-ascii?q?RXAeZ0rRrdT//U7CSruuBa0mMgtH08KCLLFFasfqjVVHWvfsJs7SY2SvlGesHR?= =?us-ascii?q?yI3K+DbJL2e2UB2yXQEFYLkxgJ8nacNAg+HTyso3rEAzx0FFLveFvs8e1kp3yn?= =?us-ascii?q?UEA41QaKb1du17Ct4B4ameScS+8P3rIDoCogpTR0HFK4393IEdqNvARhc7tBbt?= =?us-ascii?q?M6+ldIz3rZtxZ6PpyiMa9tmkIefx5wv0P02BV9Ep9AntQyrHM20ApyLrqV0F1b?= =?us-ascii?q?dzyC25D/JrzXKnLp8RCqc67W20jS0M2Y+6cU8vg4rE/jvA6xHEo473pny8VV02?= =?us-ascii?q?eb5pjSDwodS5HxUkEq9xVhpLHVeCo954TJ1XF2Nqm0qDDC0cozBOQ50hagY8tf?= =?us-ascii?q?MKScGQDoDsIaHcmuJ/Iwm1WydB0LIOVS+LQzP8O8ePuMwLSrM/p4nDK6kWRH55?= =?us-ascii?q?hw3V6W+Cp4VOHIxIoFwvGf3gacTDfzkFahvd7xmYBYZDEdBHCzyS76C45Nfqdy?= =?us-ascii?q?Z5oECX+yI82rwdVzn4TtVGNF+1O4CFMG3cCodQCUb1PjwQ1azV4XrmC/mSuk0z?= =?us-ascii?q?x0lCkkrrGR3CzUxOTibwYHN3VQRGlkilftL420gMocXESyaQgmigel717gx6dH?= =?us-ascii?q?vKR/M3XTQUBQcin4NW5iVrewuaSYY85U854orztYUP6nblCHT77xuRwa0znsH2?= =?us-ascii?q?FG3jA0aymquonlnxx9kG+dMndzo2bFecF33xfT/sDTRf5W3joASyl1kj3XBlm6?= =?us-ascii?q?P9az59WUkI3PsuekV2KuTpdTazXkzZuctCun4m1nGRm/n/Gomt37CAQ6yjH019?= =?us-ascii?q?1rVSXOsRb9bZLm17+iMeJmeEloBUPz69FgFoF4jIQwmIka2WIGiZWN4XoHjWDz?= =?us-ascii?q?PM1B2aL5aHoNQSAEw8TJ7wji1kxuNWmJx5/lWXWG2MdhYMO6YmwO0CIn889KEL?= =?us-ascii?q?uU7KBDnSZtoVq3swTRYeNmkzce1/Qu7mUag+cXtwox1CmdBaoSHUZANyz2ixuI?= =?us-ascii?q?98y+rLlQZGu3abi/zld+ndS/A7GauA5cXmr5dYk4HSJr88V/K0zD0Gfo6o3+Y9?= =?us-ascii?q?nQas8TtgeInBjegehVL4gxlvUUiiZ9P2Lyo2ElwfYhjRNyxZG6oJSHK2J18aKn?= =?us-ascii?q?BB5XKyb4Z90V+j7wjaZShMCW0J6zHp95ADUEQIPoTe60EDIVrfnnLxyBECA4qn?= =?us-ascii?q?qABbXfHBOf6Ud/o3LBCZ+rMWubJH4DzdVtXBOdPlBQgBgIXDUmmZ40DgOqxczl?= =?us-ascii?q?cEhn/T0R41n4qhVCyu12Kxn/TmffpACtajgqUpSfKgRZ7h1a7UfPLcOe9v5zHz?= =?us-ascii?q?1f/pC5ogyCMGqbZxhPDWEMQUGECU7sMaSp5dna6eeYHvC+L/zMYbqQteNeS+2E?= =?us-ascii?q?xZW10otp5zyMLNmAPmF+D/0n3UpORW12FNjcmzUITSwXiz/BYtWFpBii4C13r8?= =?us-ascii?q?G+8PPtWA7144uAFadSO811+x+qmaeDK/KQhCFhJDZWzJMD22LHyKMF014UlyFu?= =?us-ascii?q?cCKtHK8auiHRSaLcgKhXDwQUaylrLstH87o83hVROc7ckt710KR4geQtC1ddTl?= =?us-ascii?q?HhlMCpZdYRI2GhOlPHBUCLO66AJTLXwsH4e6e8RadXjOVOuB26oSybHFP7PjSf?= =?us-ascii?q?iznpUAiiPvpXgy2cOBxeuZq9cgp2CWT5V9LpdAG0PMVsjTIoxb00h3XKNXMTMD?= =?us-ascii?q?Vnb0xMrqeQ7T5DgvllFW1O9GZlLfKDmyaf9eXYLYwWsfRzCCRui+1a+Gg6y6dS?= =?us-ascii?q?7CxcQvx1mS/SrtpwrFG9ieSA0CRoUABJqjpRg4KLp0piM73D9pZcQXbE4A4N7W?= =?us-ascii?q?KIBhsRpttlBdrvu6ZLx9fSiq38MzZC/MjS/ccGAMjUMs2HOmI7MRX1AD7UEBcF?= =?us-ascii?q?TTmzOG7FiExSiu+S+WOOo5g9spjjhpwOSrpBW1w0EvMVEUNlHdMYLJdwRDMknq?= =?us-ascii?q?aRjNQU6nqmsBnRWMJas4jbVvKVBPXjMiyZjb5FZhQWx7P3Np4TNorl1ExhcVR1?= =?us-ascii?q?gIPKG0/MUt9XuS1hchU4oENT/3hiVmczwV7qahux4H8PEv65hhw2igt+YOQ18z?= =?us-ascii?q?fs51Y3JkbUqyYrlUkxmMnlgSqPfzLrK6ewR45WATLut0ctKpP7Xxp1bQqqkExi?= =?us-ascii?q?KjjLXbZRgqBjdWBskw/cpYFAGfhHTa1HYR8c3/eXaOs00V5EsCWo2VdH5ffZCZ?= =?us-ascii?q?tljAYqa4Cjr2le1A15dt46OazQKbFSwVhRnKKBoyio1u4pwA8EOUkM8HmeeCgW?= =?us-ascii?q?t0wULrMmPTan/vRw6QyenDtOYHUDWOA0ovJr60w9IP+NwDj6075ZLUCwOfefIL?= =?us-ascii?q?2FtGjdj86IQ08w10MSm0lD47d2zd8pc1CIWEA30LuRCxMJONLGKQFSdcpd6n7T?= =?us-ascii?q?fCeJsejWzpJ1OZi9GvrvTe+Uu6YemlikExoxH4QQ8sQBGYGh0FrGIsfjLb4Fzw?= =?us-ascii?q?gt5QvwKVqZC/RJfQ6Eny0co8Gj1pN325dSJi0FC2VnLSq3/qrXphMtgPebQNc2?= =?us-ascii?q?Y3IaXowYNnI2WMy3gDNWv3VADTatye0V0g6C4CHgpi7IFjnzc8JjZOuIZRNrEN?= =?us-ascii?q?y54zE/86mqhlHJ6preImH7NdJlut/J8+wXvI2IC/JOQrl7qkvclZRYS2asU2HR?= =?us-ascii?q?Dd6/P4LwZJU0bdzoFna6VUSyhCkrQMf3J9uiNLWHgR/2SoZOq4mUxiojNM+nGj?= =?us-ascii?q?EZARdwqPkJ5Lhgag0bf5o7fRnouhwkN6y5IQeXztWuQ2GpKTtNV/dR1Pi0aaZL?= =?us-ascii?q?wiQrdeK11HwgTpQmwOat6k4NWIsGjhfAyva/f4NeSzT8GmRBewXToio0j3RuNu?= =?us-ascii?q?Qozegj2x7HrV4cMzSPdOxodmNEpc08Ck2OLnV2EGY4QEWcjYXb6A62w78S5zdd?= =?us-ascii?q?n8pT0eBdqnjxpIXfYDW3V6GwtZXVqTAvbcY4rK11MIzjJMSGtJffnjzQTJnQrg?= =?us-ascii?q?OFXzSgF/pfgNRQJjxXQOVQk2E/JcMGoZZB6VY2VsomKb1DErUjprCraTphDC4d?= =?us-ascii?q?1ywZWpiB3DMcnOizxaHWlhCKcJQtKBYEqolNgsMBUy5qZSMTvKqjWJ/Ml2+HVG?= =?us-ascii?q?cLPAYT7QJD5A8bmI5/ZObl75bMTJ9L1j5Zvul0XjHNFpZ261vxUnuWjkTgSPW9?= =?us-ascii?q?j+yp2hpfzOrr0tkfQhF/E0Zcx+FSlksmM7x3Lq4QvonRsjCWaUz6pmXtyPC9JF?= =?us-ascii?q?lQz83UeEf0DI3ftWrzSicc42EbRZdTyHHDEpQfixB2aLw2pFVKOoymeV3z5z0l?= =?us-ascii?q?x4RoA7m3Ttqnx1A7onYaXy2qCcZOC/l6sFLLXz1oe4yrqJLgO5hJXm9c5JidpE?= =?us-ascii?q?xDnEVrLSG51YJWK9tR7T4UQDhPvTKdscOySMJZw895FZsMLcpktnjgBqxEIICR?= =?us-ascii?q?rGMyurPx0H/V4Tc8sE21xD+rAa+3U/pZ/3ECGgUuP2meqE4vAPU3/2jP7F/NqU?= =?us-ascii?q?57//1HBreRkEp9ujB9EY5SBjxRz3CqM0xzTGVas+VdMKnVb9FTTOQzZRC1Pxwz?= =?us-ascii?q?DuIp30uM/U5oh3j5eDByuhFc+y/DQwk+TTMVjav1mT0CtsGnPicXRIlGbTo9cy?= =?us-ascii?q?vIKR+XlC5MsRlDbEFqXowWDcxe+7EHx4dU+NTNSVq0IyEfQBNiLh440eZYlUNb?= =?us-ascii?q?qkWXZz3SDQqyevbTqRB3ecCRrNC3I/jn4AhHjZ7ov/4i+6UFWXKmhRWnQcrCoI?= =?us-ascii?q?/kqt2KqkyOeb/gM+2nfX/OViXDjQyriLc/CJnK4jLTPxZFJJl81Xoke4LuCWrR?= =?us-ascii?q?MRRBPaIbKFJRVbpmZtVevuBae8hkdb4V+a93GB2IWA7gFZeyrPlCMlbTXy7RLz?= =?us-ascii?q?uA8uy4pYLc86DdRfLnZsyWyHbNW7h3MYti6TnnB7fq1pdT+k/s1fdp8kN1V0TG?= =?us-ascii?q?Mzybo9v7PQ4L4tetdlf5vpI1BzzWGIl/nGDrxk5ea8odWzeq/4gAyJNF9HbwTv?= =?us-ascii?q?p10krpv+1I8Llk8o037Kp3ycqvIKfSNPBasVNmAheIBwVl7JMtAHNlS2BWeO8R?= =?us-ascii?q?J+/bfb4FgsD2t+D3C6sX5QWX++NDb9vHKVvBms6iBT6CUhFEgB0OqTgBLgubzf?= =?us-ascii?q?KFnbF7Sdq9r+jjxk0t+0S+LgIBzL116oeE56uIpOvTbxTPyLgJQbXlSd3oobQt?= =?us-ascii?q?oUyS4+colLkUemx6ewenCvQSVtYBxmf8yqAn1SAsE8LGH7/7/f5MSXI4kSz6m5?= =?us-ascii?q?B8GVUWFekYHbyV8oRChm04gfDWNsUKcqBenWaCDRikErsZxH6q7SuXJXNpghDI?= =?us-ascii?q?0xH+W2O89kT2rTNiQSvR09jjjldVVqOpCktIWCqpI0B4uiuVPAX0rNr3pbg17E?= =?us-ascii?q?YuP2zhs9KNknehOLxJEMDkIdycIDM7pFQJg50tSN2v3pobGdmmINsL9nFxcOfe?= =?us-ascii?q?4XuxkyBdu6dHm5be4saN9/XTBnmgiq2Xpq6DxD9G13c4uks/5cq4NvHU4N2KQe?= =?us-ascii?q?qn2HoNTytlvAvBRRG1oKTBr18IIUyLzFvLmIsSM9FY3Hg3zFvp6/Q4TdIo6gpe?= =?us-ascii?q?CpjPaO8YqTD0Ijv0zk6VY8grWSmGzztXAlX1HEFjF6g9w2LxstjGlXXR+100Xo?= =?us-ascii?q?l/bVHnhRhsAookLkIi9UYYzTAeEQgXbhCbFqunCV7iLYseWkgJcQ6H06Sieqcr?= =?us-ascii?q?wU1zxaui5PfJYuxgG6UNNvhcjgmUnFhYA54WqrMRQLZ9e19b6a7WqRPvC5D9UP?= =?us-ascii?q?j6iXUwNfO0QsdA8cAarXci4RiwRwCm6Zhd67YXkpeIdrRLYZLUpsBz819n5SIT?= =?us-ascii?q?dixKmBV/gAm2UfoCq+D/4tjWq56o6ueyVKkzR+UY7QU0B39kg5v2nl8jvcnd1/?= =?us-ascii?q?1ARY3NlYT/7AdNLmaFuInE1Rl8Ne0OK4WscLZ76XoHIykeJ3QTPduZcPQ85zFi?= =?us-ascii?q?MC/T5lNYGM8MY80XPNbVkwBOlkLpQK1T9tbcGlKADYdzdtwn723zyD8v6pswSO?= =?us-ascii?q?fg6DixJZDE9FFAJPZDgSpjld7Yo+gV2/XSAjAN4XaFcxh13j+Cy56VBvb/4eqM?= =?us-ascii?q?08rUW0obECA5VYldJTyC+RGoR+eum5XpVxmb6sntj54kc0KQXHOxlrwfsqlQCe?= =?us-ascii?q?5Aljn73j9GG4D3gPKVs9ys5HFLuV1HFIZz8ADKGaRePpV9IhT4lcirS1NiBiv+?= =?us-ascii?q?ZsHbbB4ut/eXxusW5eVxKVf+b5cBIh0Y07L69WZVTgx2Rb73oFaWR+QRacBiSP?= =?us-ascii?q?PZs39V6IVgK7QVMFiavpzqoS9CqEoqDw8xdL8wsjtae1HMnAJLVab0troAhxAS?= =?us-ascii?q?UNFjv09DB36wNHg45zXZSaRflLORB+AN8jWPUqwOVF1lMix6QxOy1pRhZb+pnf?= =?us-ascii?q?Rcv2NdmSN9pvkq3CB8SBu6pyLsu7oH2Sg897GgqDUBpXtFQ/2CkyfJDFVO1+gK?= =?us-ascii?q?jaYABHbh91O8ZGMPbI3s77l7Pc7g75Uu42wjYRU/eC0LReGgCyDzj6OLBYyCq9?= =?us-ascii?q?BciwSOuMXJa7+8My4SOq47yR39W3h3yhLekwpw8GsXXjWg68cpK56jNsYj2iql?= =?us-ascii?q?AnPbdFIL4qNVrMvxq0AEQ/YsZVNm2mVj3dCNRjcRS8zXB2Y1kg8kZH1KcJ1d7R?= =?us-ascii?q?8aFrEojSiTs6hH/wEUZTLUHZq/+onUg8jEw349Tc1lxmjOvK2Kmosq0GF5m9Nz?= =?us-ascii?q?9iOPtmwSd/bZU8BwHHf+zYJfye3iZ/W3rO8LUoxmyK6uUPUaKMms5XO22Il2Wk?= =?us-ascii?q?+i3rkeGF65P/EYy7fDVyeqU3aYWfiKc2eQgzY5KFD96geyIl0xdshKs1c3MvHe?= =?us-ascii?q?iZ5Eiw3hTbR0Sz2UpV/aymwjLOwbexsyuIemYAwKUPURavOdJec0xv0+D0EAb3?= =?us-ascii?q?jTHSt5E+W2q0KinJBnO3V85kX3eeHt/Rr6P9uSGxkEF4nao4Vv+fy7QGKOJ3tg?= =?us-ascii?q?zBx0PElp+ObTDVMxtvVTc5yJh9jfm8x70fIZd/dqKSA9uMQcmoFk6YaPy8qKbB?= =?us-ascii?q?fRzoryJdHSv/iYDP3fz1gwdmFcTLUZfRv/558mMd4hR73TAbxZsAweBag/R5wh?= =?us-ascii?q?LX3x9KBvLA5odA7efrG0jdfrpu6RYZtUvXDW5EoqLCjAox0D1uC0TQtjYpCxiX?= =?us-ascii?q?XyJYw/SzNCotB2FBtpApFPG8IBrgqgBZ6Ygqe7hMGt+xAyh+hfqqf0C/bXxPyl?= =?us-ascii?q?zo5xWN5c/kXNMzHPV4dxhUEwtu2vhr/l1Z7rBIu2YdYDU/J2anTIZr/PAsO0LT?= =?us-ascii?q?fYaZG0QFJP77PJiOExaR6Wfi2sGvPeuQ=3D=3D?= X-IPAS-Result: =?us-ascii?q?A2CgAwCPkZha/wHyM5BdGwEBAQEDAQEBCQEBAYMjKgNpbSi?= =?us-ascii?q?DVIojdI0FgVuBPYtfiE2CDhEYhRMDgmIhNBgBAgEBAQEBAQIBaieCOCSCTwIgB?= =?us-ascii?q?FUDCQIfBQIiBAICAwFDKQWDP4FXA6lOgW06iGuCK4EPhBeCJ4FXgWY1iySCYgS?= =?us-ascii?q?NdHWLbwmZfBGFYgEwkSOBLh44gVIzGggbFYJ9gjEcghlZjHABAQE?= Received: from tarius.tycho.ncsc.mil ([144.51.242.1]) by EMSM-GH1-UEA10.NCSC.MIL with ESMTP; 01 Mar 2018 23:52:34 +0000 Received: from prometheus.infosec.tycho.ncsc.mil (prometheus [192.168.25.40]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id w21NqHA8027295; Thu, 1 Mar 2018 18:52:23 -0500 Received: from tarius.tycho.ncsc.mil (tarius.infosec.tycho.ncsc.mil [144.51.242.1]) by prometheus.infosec.tycho.ncsc.mil (8.15.2/8.15.2) with ESMTP id w21NqAx2036539 for ; Thu, 1 Mar 2018 18:52:10 -0500 Received: from goalie.tycho.ncsc.mil (goalie [144.51.242.250]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id w21NqE7v027293 for ; Thu, 1 Mar 2018 18:52:14 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A1ALAQAVkZhaly0VGNZdHAEBAQQBAQoBA?= =?us-ascii?q?YMjKmxtKINUiiN0jQWBW4E9i1+ITYIVCogQITQYAQIBAQEBAQECEwEBAQEBBhg?= =?us-ascii?q?GhiMEgQIFAiYCSSmDRIFXA5kzkBmBbTqIa4IrgQ+EF4IngVeBZjWLJIJiBI10d?= =?us-ascii?q?YtvCZl8EYVjMJEjgS4eggozGggbFYJ9gjEQDIIZWYxwAQEB?= X-IPAS-Result: =?us-ascii?q?A1ALAQAVkZhaly0VGNZdHAEBAQQBAQoBAYMjKmxtKINUiiN?= =?us-ascii?q?0jQWBW4E9i1+ITYIVCogQITQYAQIBAQEBAQECEwEBAQEBBhgGhiMEgQIFAiYCS?= =?us-ascii?q?SmDRIFXA5kzkBmBbTqIa4IrgQ+EF4IngVeBZjWLJIJiBI10dYtvCZl8EYVjMJE?= =?us-ascii?q?jgS4eggozGggbFYJ9gjEQDIIZWYxwAQEB?= X-IronPort-AV: E=Sophos;i="5.47,409,1515474000"; d="scan'208";a="214074" Received: from emsm-gh1-uea10.ncsc.mil ([214.29.60.34]) by goalie.tycho.ncsc.mil with ESMTP; 01 Mar 2018 18:52:12 -0500 IronPort-PHdr: =?us-ascii?q?9a23=3AU06BXB25Xk9SsoACsmDT+DRfVm0co7zxezQtwd8Z?= =?us-ascii?q?se0WI/ad9pjvdHbS+e9qxAeQG9mDsLQa26GP7ujJYi8p2d65qncMcZhBBVcuqP?= =?us-ascii?q?49uEgeOvODElDxN/XwbiY3T4xoXV5h+GynYwAOQJ6tL1LdrWev4jEMBx7xKRR6?= =?us-ascii?q?JvjvGo7Vks+7y/2+94fcbglUijexe7J/IRa5oQnMtsQdnJdvJLs2xhbVuHVDZv?= =?us-ascii?q?5YxXlvJVKdnhb84tm/8Zt++ClOuPwv6tBNX7zic6s3UbJXAjImM3so5MLwrhnM?= =?us-ascii?q?URGP5noHXWoIlBdDHhXI4wv7Xpf1tSv6q/Z91SyHNsD4Ubw4RTKv5LptRRT1ii?= =?us-ascii?q?kIKiQ5/XnKhMJwkqxVrhGvqBJwzIHIb4+YL+Z+c6HHcN8GWWZMRMRcWipcCY28?= =?us-ascii?q?dYsPCO8BMP5CoYbnulsOqQa1Cw6rBOPo0D9HmGL90Koi0+QkFgHG2xYgEMwVvX?= =?us-ascii?q?TOstr6KacSXvqpzKXS0TrDaPZW1C775YPVcR4huemBUaxtfcfe00UjCQzIgk+O?= =?us-ascii?q?pYD4JT+Y2eQAv3Ca4udhT+6jlm0qpgNrrjSxyMohhJPFi4Abx13C6C532pw6Jc?= =?us-ascii?q?eiR05+edOkEIVftyWdN4ZuTMwsQWJmtiA0x7AYo5C2YDQGxZU9yxHBdfOHdpOI?= =?us-ascii?q?4h35WOaUOzh4hXZldKi6hxaz9Uis0uz8Vs+q31ZWtidJjMTAu38X2xDN5cWLUO?= =?us-ascii?q?Vx8lq71TuA1w3f8uRELlo1larfJZ4h2Lkwlp8LvETbGy/2n0L2jLWIeUg/4Oin?= =?us-ascii?q?9fnoYrX8qZ+ALYN7lgb+MqE2lsylHes4KhQOX3Sc+emkz73s40n5QLRMjv0rna?= =?us-ascii?q?jUq4zaJMQHqa65BA9ZyIAj6w2lADu839QYmmcHfxp5f0ecgozoPUzeCOzpBve4?= =?us-ascii?q?xVK3mXFkwO6VEKfmB8D1J2XH2JLmeqxwoxpEzQ001913/Z9YCrgdZvn0Xxmi55?= =?us-ascii?q?TjEhYlPlnskK7cA9Jn29ZGVA=3D=3D?= X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AMAQCPkZhaly0VGNZdHAEBAQQBAQoBA?= =?us-ascii?q?YMjKmxtKINUiiN0jQWBW4E9i1+ITYIVCogQITQYAQIBAQEBAQECARIBAQEBAQY?= =?us-ascii?q?YBlaCOCKCcwSBAgUCJgJJKYNEgVcDmTWQGYFtOohrgiuBD4QXgieBV4FmNYskg?= =?us-ascii?q?mIEjXR1i28JmXwRhWMwkSOBLh6CCjMaCBsVgn2CMRAMghlZjHABAQE?= X-IPAS-Result: =?us-ascii?q?A0AMAQCPkZhaly0VGNZdHAEBAQQBAQoBAYMjKmxtKINUiiN?= =?us-ascii?q?0jQWBW4E9i1+ITYIVCogQITQYAQIBAQEBAQECARIBAQEBAQYYBlaCOCKCcwSBA?= =?us-ascii?q?gUCJgJJKYNEgVcDmTWQGYFtOohrgiuBD4QXgieBV4FmNYskgmIEjXR1i28JmXw?= =?us-ascii?q?RhWMwkSOBLh6CCjMaCBsVgn2CMRAMghlZjHABAQE?= X-IronPort-AV: E=Sophos;i="5.47,409,1515456000"; d="scan'208";a="9272075" X-IronPort-Outbreak-Status: No, level 0, Unknown - Unknown Received: from uhil3cpa06.eemsg.mail.mil ([214.24.21.45]) by EMSM-GH1-UEA10.NCSC.MIL with ESMTP; 01 Mar 2018 23:52:11 +0000 X-EEMSG-check-005: 0 X-EEMSG-check-006: 000-001;de23416a-fcd2-4bd8-8453-76d4bc17515a Authentication-Results: UHIL3CPA04.eemsg.mail.mil; dkim=none (message not signed) header.i=none X-EEMSG-check-008: 477177936|UHIL3CPA04_EEMSG_MP20.csd.disa.mil X-EEMSG-SBRS: 3.5 X-EEMSG-ORIG-IP: 66.187.233.73 X-EEMSG-check-002: true X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0CCAACSkJhah0npu0JdHAEBAQQBAQoBAYMjgRZtKINUiiN0jmCBPYtfiE2CFQoTiB40GAECAQEBAQEBAhMBAQEIDQkIKC6FTQSBAgUCJgJJKYNEgVeaIJAZgW06iGuCK4EPhBeDfoFmNYskgmIEjXR1i28JmXwRhWIBMJEjgS4eggozGggbFYJ9gjEQDIIZIjeMcAEBAQ X-IPAS-Result: A0CCAACSkJhah0npu0JdHAEBAQQBAQoBAYMjgRZtKINUiiN0jmCBPYtfiE2CFQoTiB40GAECAQEBAQEBAhMBAQEIDQkIKC6FTQSBAgUCJgJJKYNEgVeaIJAZgW06iGuCK4EPhBeDfoFmNYskgmIEjXR1i28JmXwRhWIBMJEjgS4eggozGggbFYJ9gjEQDIIZIjeMcAEBAQ Received: from mx3-rdu2.redhat.com (HELO mx1.redhat.com) ([66.187.233.73]) by UHIL3CPA04.eemsg.mail.mil with ESMTP; 01 Mar 2018 23:52:10 +0000 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.rdu2.redhat.com [10.11.54.4]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id E99F340FB657 for ; Thu, 1 Mar 2018 23:52:08 +0000 (UTC) Received: from [192.168.3.23] (ovpn-124-224.rdu2.redhat.com [10.10.124.224]) by smtp.corp.redhat.com (Postfix) with ESMTP id B46042026E04; Thu, 1 Mar 2018 23:52:08 +0000 (UTC) X-EEMSG-check-009: 444-444 From: Paul Moore To: selinux@tycho.nsa.gov Date: Thu, 01 Mar 2018 18:52:08 -0500 Message-ID: <151994832810.32269.8035664161422596677.stgit@chester> User-Agent: StGit/unknown-version MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.78 on 10.11.54.4 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.7]); Thu, 01 Mar 2018 23:52:08 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.7]); Thu, 01 Mar 2018 23:52:08 +0000 (UTC) for IP:'10.11.54.4' DOMAIN:'int-mx04.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'pmoore@redhat.com' RCPT:'' Subject: [PATCH] selinux: rename the {is,set}_enforcing() functions X-BeenThere: selinux@tycho.nsa.gov X-Mailman-Version: 2.1.21 Precedence: list List-Id: "Security-Enhanced Linux \(SELinux\) mailing list" List-Post: List-Help: Errors-To: selinux-bounces@tycho.nsa.gov Sender: "Selinux" X-Virus-Scanned: ClamAV using ClamSMTP From: Paul Moore Rename is_enforcing() to enforcing_enabled() and enforcing_set() to set_enforcing(). Signed-off-by: Paul Moore --- security/selinux/avc.c | 2 +- security/selinux/hooks.c | 4 ++-- security/selinux/include/security.h | 8 ++++---- security/selinux/selinuxfs.c | 6 +++--- security/selinux/ss/services.c | 6 +++--- security/selinux/ss/status.c | 2 +- 6 files changed, 14 insertions(+), 14 deletions(-) diff --git a/security/selinux/avc.c b/security/selinux/avc.c index 36124f48a5ff..54b09cc03b55 100644 --- a/security/selinux/avc.c +++ b/security/selinux/avc.c @@ -985,7 +985,7 @@ static noinline int avc_denied(u32 ssid, u32 tsid, if (flags & AVC_STRICT) return -EACCES; - if (is_enforcing(&selinux_state) && + if (enforcing_enabled(&selinux_state) && !(avd->flags & AVD_FLAGS_PERMISSIVE)) return -EACCES; diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index d78f9e2f6df0..337fb325e5cc 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c @@ -5407,7 +5407,7 @@ static int selinux_nlmsg_perm(struct sock *sk, struct sk_buff *skb) sk->sk_protocol, nlh->nlmsg_type, secclass_map[sksec->sclass - 1].name, task_pid_nr(current), current->comm); - if (!is_enforcing(&selinux_state) || + if (!enforcing_enabled(&selinux_state) || security_get_allow_unknown(&selinux_state)) err = 0; } @@ -6937,7 +6937,7 @@ static __init int selinux_init(void) printk(KERN_INFO "SELinux: Initializing.\n"); memset(&selinux_state, 0, sizeof(selinux_state)); - set_enforcing(&selinux_state, selinux_enforcing_boot); + enforcing_set(&selinux_state, selinux_enforcing_boot); selinux_state.checkreqprot = selinux_checkreqprot_boot; selinux_ss_init(&selinux_state.ss); diff --git a/security/selinux/include/security.h b/security/selinux/include/security.h index c3a1ef10e710..f1db09a5f521 100644 --- a/security/selinux/include/security.h +++ b/security/selinux/include/security.h @@ -111,22 +111,22 @@ void selinux_ss_init(struct selinux_ss **ss); extern struct selinux_state selinux_state; #ifdef CONFIG_SECURITY_SELINUX_DEVELOP -static inline bool is_enforcing(struct selinux_state *state) +static inline bool enforcing_enabled(struct selinux_state *state) { return state->enforcing; } -static inline void set_enforcing(struct selinux_state *state, bool value) +static inline void enforcing_set(struct selinux_state *state, bool value) { state->enforcing = value; } #else -static inline bool is_enforcing(struct selinux_state *state) +static inline bool enforcing_enabled(struct selinux_state *state) { return true; } -static inline void set_enforcing(struct selinux_state *state, bool value) +static inline void enforcing_set(struct selinux_state *state, bool value) { } #endif diff --git a/security/selinux/selinuxfs.c b/security/selinux/selinuxfs.c index 98492755adbf..0dbd5fd6a396 100644 --- a/security/selinux/selinuxfs.c +++ b/security/selinux/selinuxfs.c @@ -98,7 +98,7 @@ static ssize_t sel_read_enforce(struct file *filp, char __user *buf, ssize_t length; length = scnprintf(tmpbuf, TMPBUFLEN, "%d", - is_enforcing(&selinux_state)); + enforcing_enabled(&selinux_state)); return simple_read_from_buffer(buf, count, ppos, tmpbuf, length); } @@ -128,7 +128,7 @@ static ssize_t sel_write_enforce(struct file *file, const char __user *buf, new_value = !!new_value; - old_value = is_enforcing(&selinux_state); + old_value = enforcing_enabled(&selinux_state); if (new_value != old_value) { length = avc_has_perm(current_sid(), SECINITSID_SECURITY, @@ -141,7 +141,7 @@ static ssize_t sel_write_enforce(struct file *file, const char __user *buf, new_value, old_value, from_kuid(&init_user_ns, audit_get_loginuid(current)), audit_get_sessionid(current)); - set_enforcing(&selinux_state, new_value); + enforcing_set(&selinux_state, new_value); if (new_value) avc_ss_reset(0); selnl_notify_setenforce(new_value); diff --git a/security/selinux/ss/services.c b/security/selinux/ss/services.c index 3698352213d7..4785ca552d51 100644 --- a/security/selinux/ss/services.c +++ b/security/selinux/ss/services.c @@ -752,7 +752,7 @@ static int security_validtrans_handle_fail(struct selinux_state *state, kfree(n); kfree(t); - if (!is_enforcing(state)) + if (!enforcing_enabled(state)) return 0; return -EPERM; } @@ -1596,7 +1596,7 @@ static int compute_sid_handle_invalid_context( kfree(s); kfree(t); kfree(n); - if (!is_enforcing(state)) + if (!enforcing_enabled(state)) return 0; return -EACCES; } @@ -1907,7 +1907,7 @@ static inline int convert_context_handle_invalid_context( char *s; u32 len; - if (is_enforcing(state)) + if (enforcing_enabled(state)) return -EINVAL; if (!context_struct_to_string(policydb, context, &s, &len)) { diff --git a/security/selinux/ss/status.c b/security/selinux/ss/status.c index 043efc59f8e4..a121de45ac0e 100644 --- a/security/selinux/ss/status.c +++ b/security/selinux/ss/status.c @@ -56,7 +56,7 @@ struct page *selinux_kernel_status_page(struct selinux_state *state) status->version = SELINUX_KERNEL_STATUS_VERSION; status->sequence = 0; - status->enforcing = is_enforcing(state); + status->enforcing = enforcing_enabled(state); /* * NOTE: the next policyload event shall set * a positive value on the status->policyload,