From patchwork Fri Dec 9 23:33:11 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Mike Frysinger X-Patchwork-Id: 9470735 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 8993F60760 for ; Mon, 12 Dec 2016 13:22:14 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 809E728483 for ; Mon, 12 Dec 2016 13:22:14 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 7349C28499; Mon, 12 Dec 2016 13:22:14 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.2 required=2.0 tests=BAYES_00, RCVD_IN_DNSWL_MED autolearn=ham version=3.3.1 Received: from emsm-gh1-uea11.nsa.gov (smtp.nsa.gov [8.44.101.9]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id C8AC228483 for ; Mon, 12 Dec 2016 13:22:12 +0000 (UTC) X-IronPort-AV: E=Sophos;i="5.33,336,1477958400"; d="scan'208";a="1484572" IronPort-PHdr: =?us-ascii?q?9a23=3ASrC0IhRvmbI2PZLkao3GRkn90tpsv+yvbD5Q0YIu?= =?us-ascii?q?jvd0So/mwa68ZxKCt8tkgFKBZ4jH8fUM07OQ6PG7HzJaqs/d+Fk5M7V0Hycfjs?= =?us-ascii?q?sXmwFySOWkMmbcaMDQUiohAc5ZX0Vk9XzoeWJcGcL5ekGA6ibqtW1aFRrwLxd6?= =?us-ascii?q?KfroEYDOkcu3y/qy+5rOaAlUmTaxe71/IRG4oAnLt8Qan4RuJrs+xxDUvnZGZu?= =?us-ascii?q?NayH9yK1mOhRj8/MCw/JBi8yRUpf0s8tNLXLv5caolU7FWFSwqPG8p6sLlsxnD?= =?us-ascii?q?VhaP6WAHUmoKiBpIAhPK4w/8U5zsryb1rOt92C2dPc3rUbA5XCmp4ql3RBP0ji?= =?us-ascii?q?oMKjA28HvTisdtkqxVphyvrAF7z4LNfY2ZKP9yc6XAdt0YWGVBRN5cWSxfDI2h?= =?us-ascii?q?YYUBDO0PMuRWr4nlpVYCsBWzCgawC+3g1DBInWT73bE43uk7DQ3LxhAsE8wIvX?= =?us-ascii?q?/JrNv1LqASUeWtwafPzDXDbO1Z0ir95ojSchEhuvCMXbR/ccXP00kkCgTIjkuK?= =?us-ascii?q?poz9PjOayP4NvnOU7+V+U+Kvl2knqwZrrjio3McshZDEi4QIwV7H7SV02Js5KN?= =?us-ascii?q?K3RUJhYdOoDYFcuz+VOodoWM8uXnlktDs1x7Eao5K3YjUGxIk9yxLCavGKcpKE?= =?us-ascii?q?7g/gWeufJzpzmWhrd6ilhxmo9Eit0uj8Vs6p31lUtidFidzMtmwV1xzU98iHVu?= =?us-ascii?q?Nx/ke/1jaL0ADe8v1ELloularaNp4h2aQ8loYTsEvfHi/2n1/6jKmKeUU/5uek?= =?us-ascii?q?8eHnYrTippOENo90jB/xMrg2l8CiDuk1PRICUmiG9eimyrHu8lP1TK9XgvEul6?= =?us-ascii?q?nWqpHaJcAVpq6jBA9V154u6w2hADei0dQYm2QHLV1cdB2ciIjpJlfOL+zmAvek?= =?us-ascii?q?mFmsjDdqyOzGPr3mGJnNKGPDn637cbZy7E5c1hI/zcpD6JJMFrEBPPXzV1fxtd?= =?us-ascii?q?3ZCR85NRe5w+PjCNlk14MeX3iDAqmDP6PIsl+I5/wvLPeWaI8Tpjn9N+Av5+Ty?= =?us-ascii?q?gn8hhV8dYa6p0IMJZ3CgBPtmOUSZYWH3j9cZC2gKpAs+TPfyiF2GSzFce2i9U7?= =?us-ascii?q?g75jEhB4KsFZ3DSZy1gLydwCe7GYVbZm5cCl+WF3fna4SEW+wXZSKXOs9hkyUI?= =?us-ascii?q?VaOvSo86zx2usxX6y7V/JOrO5iIYrY7j1MRy5+DLlhE97z90D8OA02yWTGF7hG?= =?us-ascii?q?AIRzgr3Kxlpkx90FiD27Big/NEDdxT++9JUgAiOJHG0uN6EdHyVRzbftqSUlmp?= =?us-ascii?q?XtCmDSs2TtIrzN8Ee1x9FMm6jhDfwyqqBKcYl7yVC5ww9qLc2GP8J8Jgy3ba06?= =?us-ascii?q?khikMpTtFINW28ia517xLTCJLRk0WFi6aqcrwR3DXD9GeZymqOp11YXRVrUaXD?= =?us-ascii?q?WnAeaE7Wos7/5k/YSb+hF6gnOBNbycGeMqtKdsHpjVJeSfbtItveZ36xlHmqBR?= =?us-ascii?q?aT3b6McpTle38G0yXADUgIiQcT/WyJNQImHCeuv3reDCByFVLoe07s7fRxp266?= =?us-ascii?q?TkAuywGHdFFu172w+hEJn/OcUO8T0qgCuCg/tzV+BEy90M7OC9qcuwphe71RYd?= =?us-ascii?q?U84FdD0WLWqRd9M4e6IK98nF4edB57v0T01xV4Eo9Ai9QlrGs2zApuLqKVyE5O?= =?us-ascii?q?eCmE3Z/qJLLXJGbz8QuzZK7WwF7eysqW9bkV6PgirVXsoh2pHFI483p7y9lVz2?= =?us-ascii?q?ec5pLSAQoMUJL+Tlo39x9gp73AfiY954TU1XtjMaSvtj/C2tQpC/E/yhanZdtf?= =?us-ascii?q?N7mEFADqGc0AG8euMPAqm0Subh8cOOBS9bU0P9+/e/udxqGrOOdgnDS7jWVI+4?= =?us-ascii?q?19yVqM9yt6Su7Jw5kF2OuU3g2ZWDfglF2hqNz4mZhYZTEOGWqy0TLkBIlVZq12?= =?us-ascii?q?Y4kLE3uhI8q5x9hlnJ7tRmJX9EW5C1MBws+pdgKYb0bh0g1IyUQXvXunlDOgzz?= =?us-ascii?q?NujjEpqrCT0zbUz+v5cxoHPnJLRG5kjVr3JIi4k9YaXE+0YAQzkhuq+1r6zbBB?= =?us-ascii?q?pKtjN2nTXVtIfy/uImFnVqu8r6SNY8hU5ZM2rypXVOC8bk6ASrLnpRsVzT/jFX?= =?us-ascii?q?NExD8nbzGqpon5nxtihWKeMnlzqmHZdNpzxRjB4tzcXvhR0SQaRCVijjnXHFe8?= =?us-ascii?q?NcGz/dqIj5fDrvy+V2W5W51Ndynk0JiNtDW95WJ3AR2zhfazlcP7EQIiyy/0y8?= =?us-ascii?q?FqVTnUrBb7eoTrz761Mf9jfkRzGFD86tZ6G4Fnnos+np4Q32IWhpKP/XoIiW3z?= =?us-ascii?q?K8lU2bribHoRQj4G28TV7xX410B4IXKJwo34Wm+bwsR/e9mwenkW1T4l78BWFK?= =?us-ascii?q?eU66RJnTNvrVqlqQLef+B9kS0byfsy9nEamfoEuBc2ziqDGLASBlNUPTfrlxSV?= =?us-ascii?q?9dCxsLtYZGiocbiq20pxg8qtDLecrQFAQHz5YIstHTds7sVjN1LByHPz5ZvieN?= =?us-ascii?q?nMatITswaZkxnegOdIL5IxjOAFhTJ9OWL6v30q1fI0jQB00ZG9poiHJH1n/Lil?= =?us-ascii?q?DR5AKj31e8QT9ynijaZegsmWxYCuHo19GjUMR5boS+ynEC4Jtfv7LQmOCCMzpm?= =?us-ascii?q?2dGbXBAQ+V8F1moG7XE5C3K3GXI2EUzdB4SxmZIExQnhwUXCkgkZEjDQ2qwtLu?= =?us-ascii?q?cFti5j8N/FH4sgVDxvhuNxbhTmfVvB2oZSssSJiDMBpW6RlP513PPc2Q9O5zGj?= =?us-ascii?q?tX/pmmrA2NMWGUfRhHDWQTVkyDHVDjMaGk5cPc/OiAGuq+M/zObK2IqexETfiI?= =?us-ascii?q?3Yqv35Bo/zaNLMWPJWViD/M62kpFR395HdjWmzQVRCwTjS7NaNSbpBik8C1tss?= =?us-ascii?q?+/6OjrWB7o5YaXE7tdL85g9A6wgaeCK+6Qgz10KTdG2ZwS23DE0r8f3EQdiyt2?= =?us-ascii?q?bTmiDawAtTLRTKLXgqJYEgUbZD1pO8tH9aIzxBdNNNXAitzv1b54k+Q1BE1fWV?= =?us-ascii?q?zlh8GpY9YFI3ukOFPbA0aLN7SHJTrRz8Hxf6y8VaVajP9IuB2opTabD0jjMyyY?= =?us-ascii?q?lzbzSRCgK+5Mgz+APBFFo4GyaAhtBnLsTN34cR23Ktl3giMqwbcsnHPFKXYcMS?= =?us-ascii?q?Rgc0NKtrCf9iJYgvp4G2xH9XdqMPeLlD2Y7+bCLJYaq/xrAj57l+hC+nQ116NV?= =?us-ascii?q?7D1YRPxygCbdtNFurEu4kuaR0TdnVwJOpShNhIKOp0piOKHZ+YJHWXfL5h4N6n?= =?us-ascii?q?+QCxsSrdt/FtLvo7xQysTIlK/rNDdC9NfU8dEGB8jTKcOILnwhPgHzGD7TEgQF?= =?us-ascii?q?TiWmOn3Yh0xYjP6d7GaVroQgppjqhpUOVqdRVEYpGfMCFkRlANsCLY90XjIklb?= =?us-ascii?q?6UktUF5X+5rBnfSsVVoIzHVu6SAfXoLTaWk6NIZx0WzrPkNY4TLJH021R+allm?= =?us-ascii?q?m4THA0vQXdZRoiJ/ag87vkBN/2ZiTm0p20PocQSt4GcNGv6ymx45kAp+YeA2+z?= =?us-ascii?q?fr7FY7PF3KpDE/kEMpg9XqnSiRcCLtLKe3RYxWDTT7uFI1Mp7gQAZ1ahaynVB+?= =?us-ascii?q?OzfCXLJRjLpgeXptiADCpZtFAeRcQrFcYB8M2fGXYO0l0U5CpSW820BI//HFBo?= =?us-ascii?q?dilAYxapGsrmhA1B9kbN47PazQPrRGz1hKiqKIoCCoyvg7wBUCKEYV7GOSZCkI?= =?us-ascii?q?tVQVObkhISqo+PFj5hKGmztCY2UDTeQlouht9k8nPOSA1S3g2aZZKk+tL+yfM7?= =?us-ascii?q?+Zu2/YmMGVWFwwyEIImFRe/bVty8gjaVCUV0chzbuKCRsGKdfCKRtUb8pO9Hnf?= =?us-ascii?q?ZyCOvvvRwZhtJYWyCvjoTfOStKYTmk+kEhwpEJoR4cQaBJas1l3YLcD8LLMe0x?= =?us-ascii?q?oi+AHrKE+CDPRTdxKBiC0HrN2nzJ9rwYldISkQAWF6MSWt+LnXoA4rgP2YUdc5?= =?us-ascii?q?ZHcaQ5EINnUsWM21gyRZpWhPDCGr0uIFzwiP9yT8qTrUDDn9adpjefiVaAhwB9?= =?us-ascii?q?Gx/DUw77K5iUXL8pnEIWH1K8hisMfV6ewGv5aHF+9UTb5lvkffgYlZR2alU2jT?= =?us-ascii?q?Ed61PJXwZI4sbcToBXqgVFywlS41Rd/rPNmxNqiInR3oRYFMvYmH3TAjMMi9Fi?= =?us-ascii?q?0eGxZwvOwM+aN8ZA0ZbJUgexLosRoxN7CnKgeCztquW3qtKSdRT/RH1+q6Y71X?= =?us-ascii?q?wDYyYeCizXshTpc6z+6x8UEXX5wFlRDeyuylZ4VHXyjzB2ZRewPRqiolj2JhLP?= =?us-ascii?q?o9wv8jwBPUtlkRKyuEe/JvaGFfpd4zGE2SLmtsCmojXVCcl4rC7hSr37AI8CtX?= =?us-ascii?q?h8xU3vFdsHjiop/fZyqhWKO2qZXUtyogacYpo6hqPIP+PMSJr5LekSbZTJXKtQ?= =?us-ascii?q?2FSiG6HeJAmtdMOCJYXOVImWY9NMwcv4pB6FY+Vsc5J7xLE6kivqmkZyd+AyMO?= =?us-ascii?q?yiEUTJ+P3DsHguigwbTajQuQfI4kMBMarJVImsEdXDJuYiMCuK+jUJ3bmHOGSm?= =?us-ascii?q?cRPAge9hhD5AUElo90f+Dq/pDITINSxDFKo/J4SCzLFoNn91HjUGGZnUD4SOm9?= =?us-ascii?q?k+yuxQ9S1ujj0sMcWBFkEkVd2/xWmVE2KL5pL6kQv4jKsjCMdUP7s2LtyPemJF?= =?us-ascii?q?dLxs3Ocl30FozFunTgUicE430bWZdPyG3DFZQViwd4aLwkpE5WL4Cje0b+4Scp?= =?us-ascii?q?x4V1H7aiTsCk20wqoWwARyi0D9pLE/tmv07PWD15f5Crr43oOptITmBM+J2dql?= =?us-ascii?q?JZkER3PC660pdcKt9C7SASUzRVpjWdptSyQtVZ2cBqF58MPst/u3DlFaxeIpiR?= =?us-ascii?q?vns2tqbsynLC+jA8sVa6xCmoFKOiSeJW4XEeEB0zJ2uCskkvE/cs8mDK/1DCqF?= =?us-ascii?q?B75eFbBqSUgEVwpzZ8EJZOBipJ1X+7LlRzSmVGvPtAKKjPdcxTXeUybwe1OxMi?= =?us-ascii?q?Df4mw1CJ/UZskHflZCxysxBX+zzBUwkxTiYZmLHtliMCqsu/Iz8VV4pIbSk9by?= =?us-ascii?q?fCMw+bmTpYvAxFZEFuRp8UGctK9K8D3YtM4MXCTVijKTsfUBxlLAI43uJVlVRf?= =?us-ascii?q?v0WAZSDdEQ2oeO7Nsh1wY8ict9OmI+ri/AhZkIPnrP43+LgZS32ghwKtXcjUr5?= =?us-ascii?q?Xgud2SqkuOaKD4PvWnbn/PUDfAkRK9iaoqApTR4yfTNw9bJIVgxno/fZjtE2jL?= =?us-ascii?q?MgpaJ6gDPUpUSbh6aclaouBdf8JkYrgG9rJtBh2dWhPiA4ivrP5YLlnNWzjRMy?= =?us-ascii?q?KB/fGhro7J67zSV/TgbNSWx3nbW6J3Iot66T7jFrfyyo9e5lD51epx9k5hUljG?= =?us-ascii?q?ND2BrM79KQwV4smialHisYctHT/MB5dwinXtzFlad8ULWy2q7IgYyJRB5XbsU+?= =?us-ascii?q?J3zFb8v/BJ+rl57Yk3/6ppxt2qJafTLvRatVFoAgSOCgVt7JUtD3B1R3pNbe8J?= =?us-ascii?q?NPfRYaMZgNjzpODxDaMa8wCa++pDZtfdIEHBgMa/ACmGSRNYhAcBtSIaLgyE2v?= =?us-ascii?q?6HgaB0U8GlpfP92k03/VizNRsGzK1p5YeY+6qHuO7XYAHXzbgfQKTqQdnzrrs0?= =?us-ascii?q?sUOI+fIkjKIOenByYwC/EugSTMgdxmn6zaAt0C0jDdjOH6769/5FTHI5mSjsm5?= =?us-ascii?q?ZjEFUKAvkUB6aE/ZxCnmcknOzULtsWcqRZl2aOEx6kF6UOyX+t6yuZOmlqmArO?= =?us-ascii?q?0w3qQWOu8FD2sTJ4QTHSwNv5lUpVTLa3D19IXyW1IU94rC+PPA3wudrxuKQ68E?= =?us-ascii?q?Y2Mmj+u9KWjmehObRXH8rkJNyHOiQ0oV0ajZIrStyow4AbFsK3IM0N/3Fmcvve?= =?us-ascii?q?92SrnjddrKhdg4rR/NqV+unXHHmnlKCasKmCxDFGxXg+oVE/68qvOuvI59KUX/?= =?us-ascii?q?Siz3wRQDtnuwvdQx61raTWr1QPOUyO0ErGg4IKMc9E0nk/zEHp/vAjQMg09AVc?= =?us-ascii?q?CInPe+8CqSr0ODvuzlaVe8g3WTWG0ztLAlL1FkF1GK042G3uucLJkmnf+1kzS4?= =?us-ascii?q?l/aUPnggd3D50iJkIx6VgY2C4DEQkLaRCHEr6oAUDlLYoLVUcdbxSIwKa1dr0x?= =?us-ascii?q?3UJt3rOl/PXTYvBkB6oRKvZdiRaDnFpaGpITqqAeRaxzel9D+67NpwjiDYfnU+?= =?us-ascii?q?LglXUuKf2/Wtpa/twBt3s+/ga/QAKt6ZZC7rkBkp+HarVJYYPSs8Bg8Uho+SQD?= =?us-ascii?q?ditXgBhwlxm5S/wTpPj/4tjHt5ql8v2hVKc2R+QZ7Rc0BWV+j4fogF85vNHX0/?= =?us-ascii?q?xRRZHSiYvi7g9COWOKuJzd0xlmM+UCMYWrfKxv938fPSgRO2oOPcaKa/k7+yJt?= =?us-ascii?q?KC/c50BeDcMMa9IYO9DNmQNNhk3yRr5T8svbGlmFC4Z8bM0o93D4yCwp/ps8XO?= =?us-ascii?q?fg7yW2JZPF41FOIfxDliNsm8zGpOQPxvrSEicX62GDaxdp2iOC14WNC/Ho8OWQ?= =?us-ascii?q?0tHbSVcGETQwU4hDPzeN5A2nRuW0lJX1SAyU8dX8gIgjdE6KQHy+grgFuL5WEe?= =?us-ascii?q?FckiX7wiReFoftivKaqdWs8nVYtkFHEIto6R3FGblfMYt7ORvii8mrXVJwBi3h?= =?us-ascii?q?d8HIbhAuovaZxv8Q4+ViMEvzfYAbLQwCy7Lm7npVSQxiSKXosVadXOIRYsZmSf?= =?us-ascii?q?zfo3BR941gMa8OM0KHqJzssDhItEg8ABU1Z78osjxaak7OkRVQW6bzvr4AlgQc?= =?us-ascii?q?XsBitE9JGGK/ImQ+6CTbVaVbi6mREv8V8i6JQqwITUpoLjt0Qwmp15V2Z7upgf?= =?us-ascii?q?dHv3tJnixhu/gqyCVqSgaztyPqpqIN3y8g+b6juTUOvHxKVOOenDnSBVVE1vQK?= =?us-ascii?q?gr8WC2z+5lykfHkDcIzy7aFlJcTn9Ykh5W4zbgkjfy0CQOSvFiDxj6KOAoyUs9?= =?us-ascii?q?JchQWAuNvPbb+tNycSMqkyyRP5S3h7zAfegA5i8HEXTTW48N8kOIK9NN4kxiq2?= =?us-ascii?q?A2fbck0B4qdUsMTstF4LS/A2ZUlmwGV53ciNXjcNS9DXG2Ypkggkbn1JcJBd5h?= =?us-ascii?q?8UGakohi2Fv6dc8QESfjjUDp6p+o/OksfUwXM9V8tlxnrKpq2ZgZMnyHJlm9dz?= =?us-ascii?q?7i+ApnsSc+jYXtR3Anj00IdfyPDxa++rsu8ZVIts0K6hX+MaMsm/5Wu2341nWk?= =?us-ascii?q?2lxrUeB1q5N+sDxrbHUyi7UmCYXOWLc3SWnzknKELy4gOoLlIvYsdQs0A9KvfC?= =?us-ascii?q?hoJblwD5TbN0RyCQqETHzGwiLewadBw5uIO9dwwMUuERe/CWJfIyz/0mFFsMc3?= =?us-ascii?q?jJEDNzC++3sl6tn497Nm5i4UrgYuTt9QbmP8WUGhUeF47VsIJx8+SgRm2dIX9g?= =?us-ascii?q?0AFyPE5s+ujECVsxsPNcfo2KndjUgNR7zfIFd+lzPiIgoNITnZhj6YaM2seQbR?= =?us-ascii?q?7R1oryJc3SovWAG/3fyEAqdXtAUrsXZgP144s6M8U8W73UGrtZpgoTCrQgQJwm?= =?us-ascii?q?LGfx76B0LAV8cgLLY7S0mMbqrPqRZpRIv3/W8k4wLCDEth0N1PO0SQ17b4i0iH?= =?us-ascii?q?jpIZEwRzdBr9hzBRt8GItABdkMrw29A56bgKu7kcO++1tmu+8Wtqr9EvDK1Mi5?= =?us-ascii?q?34V2WphV/1eLMS3UBKlqnkRllPq9ju3H0pnrBsPoYckEW/RjQm7Zdr/GGZ2yKz?= =?us-ascii?q?yWOsLmek5J76CT3al8UhWQeCD5RbSJuDejNPV+7kUx0pZ4c/bLzDwx87Hb38P/?= =?us-ascii?q?Z2Zfpii9tnOJLJ9f40bRBezCXhJbVeaF8Hx7EqIJd4f08vkBMcA6ytiG/wZz9C?= =?us-ascii?q?hC0NeCI6W5qk/M20R7dY/ULUfw3yY5WJIKIAikMUY3gG/WsHLdAXNGIsijM8lt?= =?us-ascii?q?j86fDgbx6ElphWEtemlBF3LzRdiPPWgb2sS+ZBCF9Q5MANgDg+63dlAitqKsUe?= =?us-ascii?q?lnII5Imea0u7Udl9ZmNSXPS9NHPyHfNrN2OSBRDurXrlgyfhEEq6Q1WpsyZZWW?= =?us-ascii?q?JEMHMVyAyT/pwArDyE30ccaj2LyPICkI7nVN16jF3iRUpwmlpfaZhdXuULXDY5?= =?us-ascii?q?7qXP7SMSwlVjaBSDQsEEap/0mru/4FvPqePGcerUoYYiWICA4cvqpvt8TfDnfP?= =?us-ascii?q?me1/e50HnPKaVDrzSC1/j6U/HTtLtUaQQ/oDEgnWcnDhgGpAuAC4IP9D427lZa?= =?us-ascii?q?WCxqVJQ+wWHpdMcvqBTtTDYv9SIDMoljQCOOagZN3Qta053UzUQmcDCKnH6lme?= =?us-ascii?q?TE+QQvyByDPmRpkavoguuio14dLchCF2HL7UP7aEoD6u9JS0jCGCue3RTmMteV?= =?us-ascii?q?A6gPoeAGmdxxlNMG4EBMsOt0H3Q66PeUJM2Wk3ieJqwRAMYwVzUmB03n1Qgvm9?= =?us-ascii?q?BtVTSUQIg2O2XP0GcFd3ASsy/U+P5Q3ye8YAucHIR2JF8LsDU48dI+cp6IXNP6?= =?us-ascii?q?sQ2vkp1ip8oCMmqyWdE09djgWd/qrLEqJ8w6FN6Gg78vxtQEGAXSnfcmnGy4qh?= =?us-ascii?q?DcJD3yFurm7418DMpOBiKKNap51lAFcNGS92JNfd/TZFUWzv3Qu9oQu0HDqZID?= =?us-ascii?q?ID/DkEOzYJduBrwO9n4170cYPa5EeRsb8xgFe6AgaMTLyv0dpEDd+6+x+/bHxu?= =?us-ascii?q?cDamX75su+1Mktkfe+tze4GmAl3bBgfzCB6fvGYL7he88efjNtZD3mhLyvZkE9?= =?us-ascii?q?ruRYRfSICB0Q=3D=3D?= X-IPAS-Result: =?us-ascii?q?A2GpBgBco05Y/wHyM5BdHAEBBAEBCgEBFwEBBAEBCgEBgww?= =?us-ascii?q?BAQEBAR+BYKM4AQEGmB4ph29TAQEBAQEBAQECAQJfKEISAYFeGoIcBgECNxQgD?= =?us-ascii?q?gMJAQEXKQgIAwEtFREOCwUYBIhKrhYqAosdhXSJPxEBhX0FiGOGHn2KbZEZDYo?= =?us-ascii?q?JJoYXkhpWSRk9JIJ5RhyBe1SDK4JCgi4BAQE?= Received: from unknown (HELO tarius.tycho.ncsc.mil) ([144.51.242.1]) by emsm-gh1-uea11.nsa.gov with ESMTP; 12 Dec 2016 13:22:10 +0000 Received: from prometheus.infosec.tycho.ncsc.mil (prometheus [192.168.25.40]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id uBCDLK9n003372; Mon, 12 Dec 2016 08:21:29 -0500 Received: from tarius.tycho.ncsc.mil (tarius.infosec.tycho.ncsc.mil [144.51.242.1]) by prometheus.infosec.tycho.ncsc.mil (8.15.2/8.15.2) with ESMTP id uB9NXJC3040588 for ; Fri, 9 Dec 2016 18:33:19 -0500 Received: from goalie.tycho.ncsc.mil (goalie [144.51.242.250]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id uB9NXJmm024093 for ; Fri, 9 Dec 2016 18:33:19 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A1BwAAD0PUtYh7em04xdHAEBBAEBCgEBgzcBAQEBAYF/ozoGlBCEGYYhAoFmUwECAQEBAQECEwEBAQoLCQkdhRkDA4EJUVcZiGutYYsuJoV0j04FiGOGHn2KbZEUDYoIhj2SGYEfWCSDPBELgXsgNIhXAQEB X-IPAS-Result: A1BwAAD0PUtYh7em04xdHAEBBAEBCgEBgzcBAQEBAYF/ozoGlBCEGYYhAoFmUwECAQEBAQECEwEBAQoLCQkdhRkDA4EJUVcZiGutYYsuJoV0j04FiGOGHn2KbZEUDYoIhj2SGYEfWCSDPBELgXsgNIhXAQEB X-IronPort-AV: E=Sophos;i="5.33,325,1477972800"; d="scan'208";a="5871354" Received: from emsm-gh1-uea11.corp.nsa.gov (HELO emsm-gh1-uea11.nsa.gov) ([10.208.41.37]) by goalie.tycho.ncsc.mil with ESMTP; 09 Dec 2016 18:33:18 -0500 IronPort-PHdr: =?us-ascii?q?9a23=3A9VK0CBT9KlstNTLHJM/b2ZrRp9psv+yvbD5Q0YIu?= =?us-ascii?q?jvd0So/mwa68bBeN2/xhgRfzUJnB7Loc0qyN4vumBDNLuc3JmUtBWaQEbwUCh8?= =?us-ascii?q?QSkl5oK+++Imq/EsTXaTcnFt9JTl5v8iLzG0FUHMHjew+a+SXqvnYdFRrlKAV6?= =?us-ascii?q?OPn+FJLMgMSrzeCy/IDYbxlViDanb75/KBu7oR/Ru8QUjoduNqg8wQbVr3VVfO?= =?us-ascii?q?hb2XlmLk+JkRbm4cew8p9j8yBOtP8k6sVNT6b0cbkmQLJBFDgpPHw768PttRnY?= =?us-ascii?q?UAuA/WAcXXkMkhpJGAfK8hf3VYrsvyTgt+p93C6aPdDqTb0xRD+v4btnRAPuhS?= =?us-ascii?q?waMTMy7WPZhdFqjK9DoByvuQFxzYDXbo+SNvV+cLjQcc8GSWdbQspcTTBNDp+6?= =?us-ascii?q?YoASD+QBJ+FYr4zlqlUJrBu+BhejD/7vxD9Shn72xqw60+IuEQ7YxgwrAtUDsG?= =?us-ascii?q?rOo9XtNacdT/q1wbLHzTrdafNWxTD96I/SfhAmu/GMUqt9fMzMwkcsDwPIlkic?= =?us-ascii?q?pIP5Mz+PyOgBrnWX4/B9We+uimMrsRx9rzuhy8oql4LHnJgaykre+iV82Is1Jc?= =?us-ascii?q?O3SEp8YdO8C5tQsj2aN5NsTsMtXW5ovjo6yroBuZKheygK0psnywbea/yBbYeI?= =?us-ascii?q?/gruWPueLDtknn5pZq+ziwuo/US9y+DxV9O43EtJoydLitXMs2oC1x3X6siJUP?= =?us-ascii?q?t9+UKh1C6R1w/J8uFEIF47lbDAJp4u3LEwkIYTsUPEHiPsn0X2lqCWel0++ue0?= =?us-ascii?q?8+TnfqnmppiEOo9vlA7+NqUumsqiAeU3KQUOQ2ia9vi81L3k50H5Rq5Kgecsnq?= =?us-ascii?q?nWt5DaO5dTmqnsGAJR04A++z6jHjym15IehnBBI1VbKzydiI28HlDNLbjWF+ak?= =?us-ascii?q?glKjnS0jk+7PJrzsGL3CI37fl7CneqxyvR0PgDEvxMxSssoHQooKJ+j+Dxf8?= X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0HzAACnPktYh7em04xdHAEBBAEBCgEBF?= =?us-ascii?q?wEBBAEBCgEBgwwBAQEBAYF/ozgBAQaUEIQZhiECgWZTAQEBAQEBAQECAQIQAQE?= =?us-ascii?q?BCgsJCR0wgjMYgh4DA4EJUVcZiGutYIsuJoV0j04FiGOGHn2KbZEUDYoIhj2SG?= =?us-ascii?q?YEfWCSDPBELgXsgNIhXAQEB?= X-IPAS-Result: =?us-ascii?q?A0HzAACnPktYh7em04xdHAEBBAEBCgEBFwEBBAEBCgEBgww?= =?us-ascii?q?BAQEBAYF/ozgBAQaUEIQZhiECgWZTAQEBAQEBAQECAQIQAQEBCgsJCR0wgjMYg?= =?us-ascii?q?h4DA4EJUVcZiGutYIsuJoV0j04FiGOGHn2KbZEUDYoIhj2SGYEfWCSDPBELgXs?= =?us-ascii?q?gNIhXAQEB?= X-IronPort-AV: E=Sophos;i="5.33,325,1477958400"; d="scan'208";a="1464152" Received: from smtp.gentoo.org ([140.211.166.183]) by emsm-gh1-uea11.nsa.gov with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 09 Dec 2016 23:33:17 +0000 Received: from localhost.localdomain (localhost [127.0.0.1]) by smtp.gentoo.org (Postfix) with ESMTP id 5F73834162B for ; Fri, 9 Dec 2016 23:33:14 +0000 (UTC) From: Mike Frysinger To: selinux@tycho.nsa.gov Subject: [PATCH 2/2] man: standardize spacing with pointers in prototypes Date: Fri, 9 Dec 2016 18:33:11 -0500 Message-Id: <20161209233311.11139-2-vapier@gentoo.org> X-Mailer: git-send-email 2.11.0.rc2 In-Reply-To: <20161209233311.11139-1-vapier@gentoo.org> References: <20161209233311.11139-1-vapier@gentoo.org> X-Mailman-Approved-At: Mon, 12 Dec 2016 08:21:18 -0500 X-BeenThere: selinux@tycho.nsa.gov X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Security-Enhanced Linux \(SELinux\) mailing list" List-Post: List-Help: MIME-Version: 1.0 Errors-To: selinux-bounces@tycho.nsa.gov Sender: "Selinux" X-Virus-Scanned: ClamAV using ClamSMTP The majority of prototypes don't put a space between the "*" and the parameter name. i.e. this style is incorrect: char * foo; Instead, we want: char *foo; Fix a bunch of references that use this uncommon style. Signed-off-by: Mike Frysinger --- libselinux/man/man3/avc_context_to_sid.3 | 2 +- libselinux/man/man3/get_ordered_context_list.3 | 12 ++++----- libselinux/man/man3/getcon.3 | 6 ++--- libselinux/man/man3/getexeccon.3 | 4 +-- libselinux/man/man3/getfscreatecon.3 | 4 +-- libselinux/man/man3/getkeycreatecon.3 | 4 +-- libselinux/man/man3/getsockcreatecon.3 | 4 +-- libselinux/man/man3/is_context_customizable.3 | 2 +- libselinux/man/man3/security_check_context.3 | 4 +-- libselinux/man/man3/security_compute_av.3 | 30 +++++++++++----------- .../man/man3/selinux_check_securetty_context.3 | 2 +- libselinux/man/man3/selinux_file_context_cmp.3 | 4 +-- libselinux/man/man3/selinux_raw_context_to_color.3 | 2 +- libselinux/man/man3/setfilecon.3 | 12 ++++----- 14 files changed, 46 insertions(+), 46 deletions(-) diff --git a/libselinux/man/man3/avc_context_to_sid.3 b/libselinux/man/man3/avc_context_to_sid.3 index 021ff37de17f..5532d6c565c9 100644 --- a/libselinux/man/man3/avc_context_to_sid.3 +++ b/libselinux/man/man3/avc_context_to_sid.3 @@ -10,7 +10,7 @@ avc_context_to_sid, avc_sid_to_context, avc_get_initial_sid \- obtain and manipu .br .B #include .sp -.BI "int avc_context_to_sid(char * " ctx ", security_id_t *" sid ");" +.BI "int avc_context_to_sid(char *" ctx ", security_id_t *" sid ");" .sp .BI "int avc_sid_to_context(security_id_t " sid ", char **" ctx ");" .sp diff --git a/libselinux/man/man3/get_ordered_context_list.3 b/libselinux/man/man3/get_ordered_context_list.3 index b1dabb6fe3cb..8de90b744c72 100644 --- a/libselinux/man/man3/get_ordered_context_list.3 +++ b/libselinux/man/man3/get_ordered_context_list.3 @@ -7,17 +7,17 @@ get_ordered_context_list, get_ordered_context_list_with_level, get_default_conte .br .B #include .sp -.BI "int get_ordered_context_list(const char *" user ", char * "fromcon ", char ***" list ); +.BI "int get_ordered_context_list(const char *" user ", char *" fromcon ", char ***" list ); .sp -.BI "int get_ordered_context_list_with_level(const char *" user ", const char *" level ", char * "fromcon ", char ***" list ); +.BI "int get_ordered_context_list_with_level(const char *" user ", const char *" level ", char *" fromcon ", char ***" list ); .sp -.BI "int get_default_context(const char *" user ", char * "fromcon ", char **" newcon ); +.BI "int get_default_context(const char *" user ", char *" fromcon ", char **" newcon ); .sp -.BI "int get_default_context_with_level(const char *" user ", const char *" level ", char * "fromcon ", char **" newcon ); +.BI "int get_default_context_with_level(const char *" user ", const char *" level ", char *" fromcon ", char **" newcon ); .sp -.BI "int get_default_context_with_role(const char *" user ", const char *" role ", char * " fromcon ", char **" newcon "); +.BI "int get_default_context_with_role(const char *" user ", const char *" role ", char *" fromcon ", char **" newcon "); .sp -.BI "int get_default_context_with_rolelevel(const char *" user ", const char *" level ", const char *" role ", char * " fromcon ", char **" newcon "); +.BI "int get_default_context_with_rolelevel(const char *" user ", const char *" level ", const char *" role ", char *" fromcon ", char **" newcon "); .sp .BI "int query_user_context(char **" list ", char **" newcon ); .sp diff --git a/libselinux/man/man3/getcon.3 b/libselinux/man/man3/getcon.3 index 644ee47c8016..67872a4dede6 100644 --- a/libselinux/man/man3/getcon.3 +++ b/libselinux/man/man3/getcon.3 @@ -27,13 +27,13 @@ setcon \- set current security context of a process .sp .BI "int getpeercon_raw(int " fd ", char **" context ); .sp -.BI "void freecon(char * "con ); +.BI "void freecon(char *" con ); .sp .BI "void freeconary(char **" con ); .sp -.BI "int setcon(char * " context ); +.BI "int setcon(char *" context ); .sp -.BI "int setcon_raw(char * " context ); +.BI "int setcon_raw(char *" context ); . .SH "DESCRIPTION" .BR getcon () diff --git a/libselinux/man/man3/getexeccon.3 b/libselinux/man/man3/getexeccon.3 index 73c9e49c6fda..d6222a4fc93c 100644 --- a/libselinux/man/man3/getexeccon.3 +++ b/libselinux/man/man3/getexeccon.3 @@ -11,9 +11,9 @@ rpm_execcon \- run a helper for rpm in an appropriate security context .sp .BI "int getexeccon_raw(char **" context ); .sp -.BI "int setexeccon(char * "context ); +.BI "int setexeccon(char *" context ); .sp -.BI "int setexeccon_raw(char * "context ); +.BI "int setexeccon_raw(char *" context ); .sp .BI "int setexecfilecon(const char *" filename ", const char *" fallback_type ); .sp diff --git a/libselinux/man/man3/getfscreatecon.3 b/libselinux/man/man3/getfscreatecon.3 index 8cc4df57c95b..c6faadc1ec34 100644 --- a/libselinux/man/man3/getfscreatecon.3 +++ b/libselinux/man/man3/getfscreatecon.3 @@ -9,9 +9,9 @@ getfscreatecon, setfscreatecon \- get or set the SELinux security context used f .sp .BI "int getfscreatecon_raw(char **" con ); .sp -.BI "int setfscreatecon(char * "context ); +.BI "int setfscreatecon(char *" context ); .sp -.BI "int setfscreatecon_raw(char * "context ); +.BI "int setfscreatecon_raw(char *" context ); . .SH "DESCRIPTION" .BR getfscreatecon () diff --git a/libselinux/man/man3/getkeycreatecon.3 b/libselinux/man/man3/getkeycreatecon.3 index b51008d9e67a..7887b9b851e0 100644 --- a/libselinux/man/man3/getkeycreatecon.3 +++ b/libselinux/man/man3/getkeycreatecon.3 @@ -9,9 +9,9 @@ getkeycreatecon, setkeycreatecon \- get or set the SELinux security context used .sp .BI "int getkeycreatecon_raw(char **" con ); .sp -.BI "int setkeycreatecon(char * "context ); +.BI "int setkeycreatecon(char *" context ); .sp -.BI "int setkeycreatecon_raw(char * "context ); +.BI "int setkeycreatecon_raw(char *" context ); . .SH "DESCRIPTION" .BR getkeycreatecon () diff --git a/libselinux/man/man3/getsockcreatecon.3 b/libselinux/man/man3/getsockcreatecon.3 index 26086d9bbed9..9223f60f981b 100644 --- a/libselinux/man/man3/getsockcreatecon.3 +++ b/libselinux/man/man3/getsockcreatecon.3 @@ -9,9 +9,9 @@ getsockcreatecon, setsockcreatecon \- get or set the SELinux security context us .sp .BI "int getsockcreatecon_raw(char **" con ); .sp -.BI "int setsockcreatecon(char * "context ); +.BI "int setsockcreatecon(char *" context ); .sp -.BI "int setsockcreatecon_raw(char * "context ); +.BI "int setsockcreatecon_raw(char *" context ); . .SH "DESCRIPTION" .BR getsockcreatecon () diff --git a/libselinux/man/man3/is_context_customizable.3 b/libselinux/man/man3/is_context_customizable.3 index 7fed837496d2..c858a026afb0 100644 --- a/libselinux/man/man3/is_context_customizable.3 +++ b/libselinux/man/man3/is_context_customizable.3 @@ -5,7 +5,7 @@ is_context_customizable \- check whether SELinux context type is customizable by .SH "SYNOPSIS" .B #include .sp -.BI "int is_context_customizable(char * " scon ); +.BI "int is_context_customizable(char *" scon ); . .SH "DESCRIPTION" This function checks whether the type of scon is in the diff --git a/libselinux/man/man3/security_check_context.3 b/libselinux/man/man3/security_check_context.3 index 8ece48c6e113..2b9a2d4c8b6a 100644 --- a/libselinux/man/man3/security_check_context.3 +++ b/libselinux/man/man3/security_check_context.3 @@ -5,9 +5,9 @@ security_check_context \- check the validity of a SELinux context .SH "SYNOPSIS" .B #include .sp -.BI "int security_check_context(char * "con ); +.BI "int security_check_context(char *" con ); .sp -.BI "int security_check_context_raw(char * "con ); +.BI "int security_check_context_raw(char *" con ); . .SH "DESCRIPTION" .BR security_check_context () diff --git a/libselinux/man/man3/security_compute_av.3 b/libselinux/man/man3/security_compute_av.3 index a56c3c87bcef..2aade5fe38b5 100644 --- a/libselinux/man/man3/security_compute_av.3 +++ b/libselinux/man/man3/security_compute_av.3 @@ -7,39 +7,39 @@ the SELinux policy database in the kernel .SH "SYNOPSIS" .B #include .sp -.BI "int security_compute_av(char * "scon ", char * "tcon ", security_class_t "tclass ", access_vector_t "requested ", struct av_decision *" avd ); +.BI "int security_compute_av(char *" scon ", char *" tcon ", security_class_t "tclass ", access_vector_t "requested ", struct av_decision *" avd ); .sp -.BI "int security_compute_av_raw(char * "scon ", char * "tcon ", security_class_t "tclass ", access_vector_t "requested ", struct av_decision *" avd ); +.BI "int security_compute_av_raw(char *" scon ", char *" tcon ", security_class_t "tclass ", access_vector_t "requested ", struct av_decision *" avd ); .sp -.BI "int security_compute_av_flags(char * "scon ", char * "tcon ", security_class_t "tclass ", access_vector_t "requested ", struct av_decision *" avd ); +.BI "int security_compute_av_flags(char *" scon ", char *" tcon ", security_class_t "tclass ", access_vector_t "requested ", struct av_decision *" avd ); .sp -.BI "int security_compute_av_flags_raw(char * "scon ", char * "tcon ", security_class_t "tclass ", access_vector_t "requested ", struct av_decision *" avd ); +.BI "int security_compute_av_flags_raw(char *" scon ", char *" tcon ", security_class_t "tclass ", access_vector_t "requested ", struct av_decision *" avd ); .sp -.BI "int security_compute_create(char * "scon ", char * "tcon ", security_class_t "tclass ", char **" newcon ); +.BI "int security_compute_create(char *" scon ", char *" tcon ", security_class_t "tclass ", char **" newcon ); .sp -.BI "int security_compute_create_raw(char * "scon ", char * "tcon ", security_class_t "tclass ", char **" newcon ); +.BI "int security_compute_create_raw(char *" scon ", char *" tcon ", security_class_t "tclass ", char **" newcon ); .sp -.BI "int security_compute_create_name(char * "scon ", char * "tcon ", security_class_t "tclass ", const char *"objname ", char **" newcon ); +.BI "int security_compute_create_name(char *" scon ", char *" tcon ", security_class_t "tclass ", const char *" objname ", char **" newcon ); .sp -.BI "int security_compute_create_name_raw(char * "scon ", char * "tcon ", security_class_t "tclass ", const char *"objname ", char **" newcon ); +.BI "int security_compute_create_name_raw(char *" scon ", char *" tcon ", security_class_t "tclass ", const char *" objname ", char **" newcon ); .sp -.BI "int security_compute_relabel(char * "scon ", char * "tcon ", security_class_t "tclass ", char **" newcon ); +.BI "int security_compute_relabel(char *" scon ", char *" tcon ", security_class_t "tclass ", char **" newcon ); .sp -.BI "int security_compute_relabel_raw(char * "scon ", char * "tcon ", security_class_t "tclass ", char **" newcon ); +.BI "int security_compute_relabel_raw(char *" scon ", char *" tcon ", security_class_t "tclass ", char **" newcon ); .sp -.BI "int security_compute_member(char * "scon ", char * "tcon ", security_class_t "tclass ", char **" newcon ); +.BI "int security_compute_member(char *" scon ", char *" tcon ", security_class_t "tclass ", char **" newcon ); .sp -.BI "int security_compute_member_raw(char * "scon ", char * "tcon ", security_class_t "tclass ", char **" newcon ); +.BI "int security_compute_member_raw(char *" scon ", char *" tcon ", security_class_t "tclass ", char **" newcon ); .sp -.BI "int security_compute_user(char * "scon ", const char *" username ", char ***" con ); +.BI "int security_compute_user(char *" scon ", const char *" username ", char ***" con ); .sp -.BI "int security_compute_user_raw(char * "scon ", const char *" username ", char ***" con ); +.BI "int security_compute_user_raw(char *" scon ", const char *" username ", char ***" con ); .sp .BI "int security_get_initial_context(const char *" name ", char **" con ); .sp .BI "int security_get_initial_context_raw(const char *" name ", char **" con ); .sp -.BI "int selinux_check_access(const char * " scon ", const char * " tcon ", const char *" class ", const char *" perm ", void *" auditdata); +.BI "int selinux_check_access(const char *" scon ", const char *" tcon ", const char *" class ", const char *" perm ", void *" auditdata); .sp .BI "int selinux_check_passwd_access(access_vector_t " requested ); .sp diff --git a/libselinux/man/man3/selinux_check_securetty_context.3 b/libselinux/man/man3/selinux_check_securetty_context.3 index 05f23441d0fc..429023bb2d40 100644 --- a/libselinux/man/man3/selinux_check_securetty_context.3 +++ b/libselinux/man/man3/selinux_check_securetty_context.3 @@ -5,7 +5,7 @@ selinux_check_securetty_context \- check whether a SELinux tty security context .SH "SYNOPSIS" .B #include .sp -.BI "int selinux_check_securetty_context(char * "tty_context ); +.BI "int selinux_check_securetty_context(char *" tty_context ); . .SH "DESCRIPTION" .BR selinux_check_securetty_context () diff --git a/libselinux/man/man3/selinux_file_context_cmp.3 b/libselinux/man/man3/selinux_file_context_cmp.3 index f7cd7ec6a825..6d4b3e8b0bf9 100644 --- a/libselinux/man/man3/selinux_file_context_cmp.3 +++ b/libselinux/man/man3/selinux_file_context_cmp.3 @@ -5,9 +5,9 @@ selinux_file_context_cmp \- Compare two SELinux security contexts excluding the .SH "SYNOPSIS" .B #include .sp -.BI "int selinux_file_context_cmp(const char * " a ", " +.BI "int selinux_file_context_cmp(const char *" a ", " .RS -.BI "const char * " b ");" +.BI "const char *" b ");" .RE . .SH "DESCRIPTION" diff --git a/libselinux/man/man3/selinux_raw_context_to_color.3 b/libselinux/man/man3/selinux_raw_context_to_color.3 index 530e87695bfb..cfd564df1a78 100644 --- a/libselinux/man/man3/selinux_raw_context_to_color.3 +++ b/libselinux/man/man3/selinux_raw_context_to_color.3 @@ -5,7 +5,7 @@ selinux_raw_context_to_color \- Return RGB color string for an SELinux security .SH "SYNOPSIS" .B #include .sp -.BI "int selinux_raw_context_to_color(char * " raw ", " +.BI "int selinux_raw_context_to_color(char *" raw ", " .RS .BI "char **" color_str ");" .RE diff --git a/libselinux/man/man3/setfilecon.3 b/libselinux/man/man3/setfilecon.3 index 9fe8997e7e23..0e9a383ffb59 100644 --- a/libselinux/man/man3/setfilecon.3 +++ b/libselinux/man/man3/setfilecon.3 @@ -5,17 +5,17 @@ setfilecon, fsetfilecon, lsetfilecon \- set SELinux security context of a file .SH "SYNOPSIS" .B #include .sp -.BI "int setfilecon(const char *" path ", char * "con ); +.BI "int setfilecon(const char *" path ", char *" con ); .sp -.BI "int setfilecon_raw(const char *" path ", char * "con ); +.BI "int setfilecon_raw(const char *" path ", char *" con ); .sp -.BI "int lsetfilecon(const char *" path ", char * "con ); +.BI "int lsetfilecon(const char *" path ", char *" con ); .sp -.BI "int lsetfilecon_raw(const char *" path ", char * "con ); +.BI "int lsetfilecon_raw(const char *" path ", char *" con ); .sp -.BI "int fsetfilecon(int "fd ", char * "con ); +.BI "int fsetfilecon(int "fd ", char *" con ); .sp -.BI "int fsetfilecon_raw(int "fd ", char * "con ); +.BI "int fsetfilecon_raw(int "fd ", char *" con ); . .SH "DESCRIPTION" .BR setfilecon ()