From patchwork Mon May 15 16:55:56 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Stephen Smalley X-Patchwork-Id: 9727585 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 0110760380 for ; Mon, 15 May 2017 16:53:39 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id E8E142885B for ; Mon, 15 May 2017 16:53:38 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id DCD6A28985; Mon, 15 May 2017 16:53:38 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-1.9 required=2.0 tests=BAYES_00, RCVD_IN_DNSWL_NONE autolearn=ham version=3.3.1 Received: from emsm-gh1-uea10.nsa.gov (emsm-gh1-uea10.nsa.gov [8.44.101.8]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id D03852885B for ; Mon, 15 May 2017 16:53:36 +0000 (UTC) X-IronPort-AV: E=Sophos;i="5.38,345,1491264000"; d="scan'208";a="7061892" IronPort-PHdr: =?us-ascii?q?9a23=3A/ttu4hxZdI+NEr7XCy+O+j09IxM/srCxBDY+r6Qd?= =?us-ascii?q?1eofLfad9pjvdHbS+e9qxAeQG96KtLQd0KGP6/uocFdDyK7JiGoFfp1IWk1Nou?= =?us-ascii?q?QttCtkPvS4D1bmJuXhdS0wEZcKflZk+3amLRodQ56mNBXdrXKo8DEdBAj0OxZr?= =?us-ascii?q?KeTpAI7SiNm82/yv95HJbQhFgDiwbalvIBi4ogndq9UajIV/Iast1xXFpWdFdf?= =?us-ascii?q?5Lzm1yP1KTmBj85sa0/JF99ilbpuws+c1dX6jkZqo0VbNXAigoPGAz/83rqALM?= =?us-ascii?q?TRCT6XsGU2UZiQRHDg7Y5xznRJjxsy/6tu1g2CmGOMD9UL45VSi+46ptVRTnhj?= =?us-ascii?q?0HNzok+2/JjMJ+gr9QrBa4qxBh34LYZYeYP+d8cKzAZ9MXXWpPUNhMWSJPAY2y?= =?us-ascii?q?aJMPAugcMetWsYb9vEADoQeiCQS2GO/i0CNEimPw0KYn0+ohCwbG3Ak4EtwTrH?= =?us-ascii?q?Tbss31NKcMXuCz0aLG0DDDYOlS2Tf59ofJcg0qrPaXXb1tasrc0lUvFgPZgVWQ?= =?us-ascii?q?rozpJTWV1v8XvGSB4OpgUvyvhnchpgpsoTav3t8hhpTGi48a0FzJ9Th1zJwrKd?= =?us-ascii?q?C3VkJ3e8OoHZ1NvC+ALYR2WNktQ2RwtSY/zb0JpIC0cTARyJQi2x7fc/uHc5WU?= =?us-ascii?q?4h77VOaePzN4hHV9dbKjnRmy60mgyvDnVsWuzFZLrjZKktnLtnwX0Rzc9tOHRe?= =?us-ascii?q?dn8kek2DaP0xjf6uBCIU8qiarWM4Mtz7E/m5YJsUnPAzX6lFv5gaOIbEko5/Ck?= =?us-ascii?q?6+H9bbXnop+cOZV0igb7Mqk2gcywH+A4MgkIX2iG9uWwzabs/UrkQLVMkvI5jL?= =?us-ascii?q?LZvYvGJcUbuqG5AwhV3pwl6xakFTiqytsYnX4ZLF5dYhKIk5DpO03SIPD/Ffq/?= =?us-ascii?q?gVOskDFxyPDaPr3uGJPNI2PBkLfme7Z97lRTyBEvzd9B/ZJUEasNIPXpWk/+rN?= =?us-ascii?q?bYFAM2MxSow+b7D9VwzoEeWWCVDaCFM6PSqliI5uQuI+mSf4IVtjL9K+Uq5vH1?= =?us-ascii?q?kH85n0MdfbSz0ZsQcnC4EexsI1+Fbnr0ntcBDWAKsxImTOP0k1KNTzhTZ3euX6?= =?us-ascii?q?I7/Tw7CZypApndSYy3h7yBxii7FIVMZm9aElCMDWvod4KcVvgRbyKSJMlhnSEa?= =?us-ascii?q?WrilSo8szguhuxHgy7pgNObU/TcYtZ373thv++LTjQ0y9SBzD8mFzm6NU3t7nn?= =?us-ascii?q?kTSjAq26B/pFByxU2Y0ahkmfBYE8Jc5+9RWAcgKZHc1/B6C8z1Wg/Zf9eJTkqm?= =?us-ascii?q?TcuiAT4vS9I+3cMOY1x9Gti5iRDDxzSlA7kQl7ORBZw09rnT33/+JspnzHbGzq?= =?us-ascii?q?YhhUE8QsRTLW2mmrJ/9w/LCo/JkkSZkKCqeL8Z3C7J7WuDzGyOsFteUAFqS6XF?= =?us-ascii?q?XnEfZlXIotjj4EPNUaOuA6w9MgRd0c6CNrdKatrxgFpYXPfsIs7eY2Oqm2qrHR?= =?us-ascii?q?aH3KmMbIvxe2UF2CXSElQLnB4J8XaBLwg+CT+ro3jCAzx2CVLvf0Ts/PFwqXO6?= =?us-ascii?q?Sk80yh+Fb1d62rq75BEamPucS+kJ0bIcoichrDd0E0ih0NLKEdaAoBBhfKpEa9?= =?us-ascii?q?Mn/FhHzX7ZtxB6PpG4IaBinEQRcwJrsEPvzBV6EYBAkdArrH8z1wpzJ7mY3ElG?= =?us-ascii?q?dzOC0pD6IqfXJXXq/BCzd67W3UnT0NWM9acM7/Q4tk7uvAKzGUoh9HVnzsNZ03?= =?us-ascii?q?yG5pXFFAASS47+Ul4r9xhmoLHXejMy6J7O1X1tL6a0qCTP1Mg1C+sg0BqgeM1f?= =?us-ascii?q?MKycHg/oD8IaH9SuKPAtm1Wxch0LJuRS+7AvP8O6d/qG37WmPP18kzKnk2tH5p?= =?us-ascii?q?x90kOW+CZmTO7HwYoFyemC3gSbTzf8kEuhssfvlIBfazESBG2/yTP4BINKfa1y?= =?us-ascii?q?e4ELCGmrI8KtwNVynZjtVGBE9FS7HVMJxNepeQaOb1z6xQBR214YoXi7mSSm1T?= =?us-ascii?q?x0iCokrrSB0yzU2OviaR8HNnRMRGl4glfmOZK0gMwCXEi0cwgpkwOo5VrnyKdG?= =?us-ascii?q?paRwNW3TTFxUcCjxKmFtTrG/tqGeY8JV7pMnrzlXWvymYV+GUr79vwca0yT7Em?= =?us-ascii?q?tAxTA0ay2qupLjnxBglG2dLHFzrHzWecxrwRff5drcSuRL3joBXiV4jiPXBlek?= =?us-ascii?q?Ndmz4dqUj4vDsvy5V2+5Up1TcDLrzZ+ZuCug+2JqBRy/n/aumtzoCgU6yjf719?= =?us-ascii?q?hsVSXJsBn8eZPn16KkPuJ7ZkNoHkPz69JmGoFilYs9nIsQ2X8ehpWR43UHi3v8?= =?us-ascii?q?MdJV2K/ld3oNWCIEw8XP7Ajiwk1jIWqDx5jlWXWF3sthe966b3sO2i0n8sBKDL?= =?us-ascii?q?2Y46ZekSRupVq4qR7RYf97njoGzPsi9Hgag+YVtwY3yCWSHKwSF1FCPSPwjxSI?= =?us-ascii?q?88y+rKJPaWasb7ew0lF+kMuiDL6cpAFcQ3D5dYk+HSNq6cV/Kl3M2mXp6o74YN?= =?us-ascii?q?nQcc4TthqMnhfYledVNZYxmeQShSV9P2L9oWMqy/QggBxzxpG1opKHK3538KKi?= =?us-ascii?q?BR5YKyf1aN8N9THjiqZehMmW0J61EpVnBDoLQIPiTei0HzIKqfTnKwGOHSUiqn?= =?us-ascii?q?edBLXSBhGf6EF7oHLPCZyrMW+YJGUBx9V4WBadPFBfgBwTXDgihp42DB2qxMj6?= =?us-ascii?q?fUhl5zAR+l75pgJCyu1yMRnzSGDfpB2naj0sUpiQMAJW7h1e50fSKcGe7eJyHy?= =?us-ascii?q?VG8ZC6qQyNLWKbZwpWAmEVRkyEB1fjPryw6tXa9eiXGPa+JePUYbqSsexeS+uI?= =?us-ascii?q?xZW334to5TmMMNmPPn5nD/Ag1EpMQ212G8PDmzoVUywXjSXNb8yFqxig5i17tM?= =?us-ascii?q?e/8O7kWAj3/4uAF6NSMclz+xCxmaqDLfOfiztiJDZX05MNymXEyL4B014Okytu?= =?us-ascii?q?bSWiEawctS7RS6LdgrVXAwQVai9pMctH9aY83g5NOMPAkNz6yrt4guQyC1dfWl?= =?us-ascii?q?zrgtupatASI2GhKFPHA16GNLqcJTLV3s73ermzSbtMjOVTrB29oiyUHFPmPjiZ?= =?us-ascii?q?kDnpTR+vO/lWjC6HJBxepJ29chF1BGjlVtLpcAW7MMdsgD04wL00nGjKNXISMT?= =?us-ascii?q?h9dUNCtLuQ4j9ZgvplH2xN9H1lLfOLmyyB9enXNo4Wsed3AiRzj+9V+281x7xR?= =?us-ascii?q?7CFFX/x1hDDSosR1o164juaD0CFnXwRKqjZKgoKLoEpjNL7F+ZhAQ3bE4QkN4X?= =?us-ascii?q?+eChsQu9tlEdrvu6ZKxtjIjqLzJy9I88jI8ssEG8jUNMWHPWInMRroHD7UCBUK?= =?us-ascii?q?TSWwOG7FmUNdivaS+meSrpggpZjmgIAORaNDVFwpCvMaDVxoE8cDIJd4WTMkl6?= =?us-ascii?q?WWg9MW6nWlrRneXsNasorAVvKIDvXlMCyZgqVcZxsU3bP4KpweOZf020N4dFl1?= =?us-ascii?q?gp/HG03IXd9TpC1haxU7oERJ8HdlSW0y1FjpagS34H8cDfS0hAI5ihNiYeQx8z?= =?us-ascii?q?fh+0s3Jl3PpCcqikkxntTkji6XcDHqNqewWp9ZCynvukctNZP7Rhp6YhepnUx4?= =?us-ascii?q?LjvEQaxej6d4f2BxlADcoYdPGeJbTaBcZh8f2+uYZ/Ez3FRfrSWn3lNH6vHDCZ?= =?us-ascii?q?t5lwsqcISgr3Re1AJ/dNQ1P7DfJLJVzlhMgaKDpjWo2f4qwAAAPUkN6n+deC4T?= =?us-ascii?q?tUMTN7kmPTen/uti6QyagTtMZmgNW+Asov106kM3I/6AwD74075fNkCxMPSSIL?= =?us-ascii?q?6DtGjelM6HX0gw21gSmElf57h21skic1GKWE8z0buRDRUJNdbCKA1Pacpd6mTT?= =?us-ascii?q?dz6UserR2ZJ1I5m9FufwQOCTr6YbnFirHAkzH4sW8MQMBYKs31vbLcf6Nr4K0w?= =?us-ascii?q?8h5AD2JFWDFvtJYguHkCsAo8G8zJ532pNRJjcDDmVhKS+3/KrYphc2gPqfW9c7?= =?us-ascii?q?enMaXoweNn0oXs27milZsm9PDDmxz+IV0g+C7yXzpi7IFjnzc8JjZOuIZRNrEN?= =?us-ascii?q?y24isw86y3iV7R75XfKHr3Oshlut/K9ewVvY2HC+9OQbl7rUjch5FSR2a2XG7X?= =?us-ascii?q?Dd61O5/wZpExYtPoD3a6VVq/iy4oQ8rqItaiMLKIgQDpRIZTtomXxjYjOtGhFj?= =?us-ascii?q?sGARd/u/kD5L5gZQ0Ee5c7YgTotgQkOKy5PAeY0s6jQ2mqKTtOU/ZT1+O6aKJL?= =?us-ascii?q?zyA0dO+11GMgTo0mz+mw6UMNWJAKjhTZxfa/Z4lfUTP+FWFcewTPvyU2jHJtNu?= =?us-ascii?q?Aszecj2BnIq0UTMyiXdOx1b2xJp948BUmILnVwFmo1XF6cjY3N4w6qw7AS/zVS?= =?us-ascii?q?n9dS0e1Zrnf+pIXTYDSyV6y3sZ/VqTYvbcA6o61tNozuOtGJtJffnjPDUpbfqg?= =?us-ascii?q?iFUS68F/pdnNhfOjlVT+JJmW4/P8wKoIRB6VcrWsc4ObNPFLEmpqq2Zjp8ES4S?= =?us-ascii?q?0SgZWpub0zMchOexwKHVmQqOcJs8KhwEq49NgsEdUiJsZSMevqCjXZ3Ml2CYUm?= =?us-ascii?q?gLPBsT7QNU6QIakI9wf/zq4IrPTJ9I0D5Yu+t6XDbRGJR08FX2UX2ZgV/9SPq9?= =?us-ascii?q?ieOpxh5SwOjq0tYFRB51EVJdyPpOlks0NLF3LLEdsZLIsjCSaUz3p37iyOyiJF?= =?us-ascii?q?lVyM3baUf4DJbbumXgUi0Q43oURZVAyHvHD5QdjxJ5aLo3pFVLOI2mYFzx5yYj?= =?us-ascii?q?x4tyBLS4SdqryEw7rXkYQyeqEtxBC+5isFLWVz1lY4yrqJv/NJVIR29c4pudpE?= =?us-ascii?q?lFkE91KS621YJcK91R4j4LRDVOry+Rs8eySM1C3M92DoUDItRktnf8BqxLJoae?= =?us-ascii?q?r2cxurz1xX/T4yo8v0uixDWvB6+4SPpU/3UZGgUtPWuesEcuD+wo8mfc6V3Nt1?= =?us-ascii?q?d0/+BABreRkUpxujF9HotVBjZI03ClIE5/TH5cs+VVMK7VadBTQ+EuZR+zPBwz?= =?us-ascii?q?DeQp31aU/UFyh3v5YDd/tgpb+yDcQwk7TjMZgrHzlj0CssunIyMVS4pUbTU9aC?= =?us-ascii?q?fIMx6bmSdSvBtEd0FmR5UZDc1f97Edw4RU4tLISVywJiEdQBxiKgU43OJflUFZ?= =?us-ascii?q?qkWXYyTdAhezePnSrBJ3Zd+Ro9CtLPvn5gdLkITnsPo3968bXX2phRWtQczCr4?= =?us-ascii?q?/7rtCKtEyOe7njPuKhf3DBVybDjQqshbg6EpbG5S7TPxRHK5Ni03orfYDhCXLX?= =?us-ascii?q?PRRBP68UPERbWrxmZdhEv+xXadRpd7oO+a9oGh2IXAjvGJC1oPlAMFnTWSzULz?= =?us-ascii?q?+d/eynvYLT8bvdRPD6ZsOS2nnHQ7h4Poth5Dn/HLfqz5FR9lTq1fdq60x1V0LK?= =?us-ascii?q?Myafo9T9PgkL/tWtdlP+vp01GjPbGI9wkGHxxk5aasUXXzan8I8fyJNE8nb/Vf?= =?us-ascii?q?x30k7vsO1I7bZk7ZM747dzyce7Pa3SM+hVsVd7AhiIAQVn7oktAHJhSG9Pf+Ac?= =?us-ascii?q?M+rRfaAFjcD0se/3Ca0X6BqR++NHddvLPUbBmtOwCjuEUxxLgB8BqSIGLgubz/?= =?us-ascii?q?OFnrV7ScKhpefnxkIt/0KxIQQdwbBr+4iE5rGIq/PNYBvJ07cIQK7qSd3vrr40?= =?us-ascii?q?oUOd+eUklKISemxyewCnEvISVtQaxmf7yaAl1zwsHtjGH7L9/P5DS3M5kS7hm5?= =?us-ascii?q?9nGVUWAekYHb2R/YRRhm04gfDWNsUKcqBenWaCDRykHaUEyX6l8SuXJ3RqjQ/V?= =?us-ascii?q?3hHsW2yz6kT2rShiTSvK0djjjlJfVqOrCkdKQyqpJUh4vSuAPAr1tdr3vaA141?= =?us-ascii?q?8zMmH/qd2CinCuOLJNEM35PtCcJjM0pF0Php0rWtOvwZwbGca6INoJ9nF+auDT?= =?us-ascii?q?62Ktky9EuatHhoze4s+P+vrNBnmgk7eaq6iRyzBE13g4p08w5sqnNvHU6N2AW+?= =?us-ascii?q?6o2HoJTydjpwvBWAa4qrncr1ASJUyL31nElZcPPtFYx3Y40F/p5PQtQdI07gVe?= =?us-ascii?q?FZ3Aa+kEpT/tJDv+2UyfbM4vVimCzztXGUr4EV1jGKg52G/9p8zJmmnN9F0vXI?= =?us-ascii?q?l/bVTnhQZwD4U6N00i9EQXzjAEEQgXZhCRFKuoClj9LYsYSUgDbgyK3KOgdacp?= =?us-ascii?q?x0Jzza2g5PTIYOxnHaUNKOxSjgGQk1hAAJ4Wt7MRQK5kcV9H6KHXvhTiC5TgX/?= =?us-ascii?q?X+l3owNPi1T9tf8c8Ht3ot/By/Rxum6ZdM9bobjo6HdrJca5jWoM9891tn5SII?= =?us-ascii?q?diFVgRh+jgm2XvoAq+34+djUroao5fiyW6o3QOUX7Rc0DXxkj5TsmFAjvc3X1+?= =?us-ascii?q?BER4LOiIT/6w5MLGSIuIbbzxl8MfABK5+vfLt763oHIDURKGwUMtqLcfk85DVt?= =?us-ascii?q?Py/J61xFGMMMassSPNDRlgBMlk3pRLZT+9LDGlCCF4d8a8Ao7mTwyDAv8pswS/?= =?us-ascii?q?3g5yGyJZDe6VFNIvxCgT50lN3YuOga3frSCSYQ4XmDaBh52CCCxIeXC/b24+qM?= =?us-ascii?q?zMvYV1QcHi45S41dPiaN+RS7Ruqpk5XkSh+U6tXtj5I6bk2QQGK+kb8YvaZNHu?= =?us-ascii?q?5Aizn70SJFFo/vnfKVrsCg6G1JuV1bCIxz9wHKGL1DPpVnPhT1jsarSVJmBiTh?= =?us-ascii?q?ZMHUdgEjuO6XxucQ/ep+N1HxZZIAIh4ezbL192ZVRBN0SLHqplaZQf4RZNx+Rf?= =?us-ascii?q?PLsH9V755gK6gIPFSav5zlsDNIqFEwAA80Z749tThaeVfUnAxVQan4orgAhRUA?= =?us-ascii?q?UdRho09DBXqwOH4i5zrATalViqiRB+AS8jWXVKMOSF9kMiJ5QxOyw5VuYKCknf?= =?us-ascii?q?VIv2JJhC99p+Iq0zN+ThumpSLsv74N2S4n+LyguzUOpWdFTv6HnynVBltNyvUK?= =?us-ascii?q?jaEBC3ft8lG8b3wDY5H04LZ5P8jg8pMh43snaxU5YyIGRfigCz33j66QAIyPt9?= =?us-ascii?q?JchBiXtMrSbb+zKTUSOak8yBLiQXh9yQvenBdz/WsVQzWg8sUrJIGgNsYk3Cao?= =?us-ascii?q?H3bUdEoU6KNTrMTxrUILTPcxaV55wWVjzNKIRisWSczLBmY6kwkkaWJfcJ5Z7h?= =?us-ascii?q?8aDaYoiC6SvqZa5gEUfCvUEoO994nSg8jI13c9TdNxy2PYvKKFgI0l0GF/l9Ny?= =?us-ascii?q?8CGOpGwYd/bEXM90HnjzyoBfxPTxZ/WpteAGRpVpyLClUPIZKcmj/m222JR2VU?= =?us-ascii?q?O/wLQRAUa5OvcZxrjHSyelVXGYWeOTfmiOnzY4Mlby5R6sLl02dMdFsVQwMu7D?= =?us-ascii?q?hp5AjQ3uT6l4RiKKpV/U1GYjK/8VdxoquIe7fAwHVPIRZ+mZJeU13P0+CUcDb3?= =?us-ascii?q?zXEityEeO2t0CinJRjMXV6/Ur6efjt8hzhMNaKHxkEEI3arp12+fGhRGKOI3xg?= =?us-ascii?q?zBp0PEZq8efTDVIxufFAc5yJh9jfm8x70fIZd/dqKSAyocAcmoR/6YSPy8eKdR?= =?us-ascii?q?bRzoruJdHLvPeXHufTz0MwemFVSrAZex/6550mPt4lXL3eBbVZsgoYBag7WJwu?= =?us-ascii?q?KXz89aB1LAN2dw7eeq60gs30qe6RYZtUvXDW5EoqLCjAox0D1uC0TQtjYpGkn3?= =?us-ascii?q?XyOpEwSS5foNB2DxtmHZdPG9keoAa9BJ6Ugq67gcer+0xmo+8KrbbwCvfS2dS+?= =?us-ascii?q?24V+QYNX5VSPPDnLH6lrnkVlgfiugvfazJb+F9nuedUaW+hnWmTFcKPJHp2jKj?= =?us-ascii?q?KSPcLxY0pG87+a0LJkXRSdfST5X6udtC24L/Vp+kQ7xZZ+fOrU1jAt6Kvb2NTq?= =?us-ascii?q?bWFBuiijtWKJNIdY7FHSHuzRQRZUSfuD8GZ4EqwbaoT69PsOMdM82tiT/RFz4y?= =?us-ascii?q?5Z3cuGPaehtEnM1Vx/dZ3AMUvp1Dw1WY4QIBSwKUEsm3PWqmzBAXRAKcipMcxt?= =?us-ascii?q?j8yJARzt5klxn2Yta3VfGmrpQ9eeJ2wb28O4ZA2X+wNHFdEDn/S4eUQgrK29Vf?= =?us-ascii?q?FoOolZmeWtrLgHk8xmKyLIRMdBJCzQMbl2PiZRDuXIuVgobR4Es6QvVocze5eO?= =?us-ascii?q?PFsNMF2cxiPq0QvCzUr0esSj1KmTOykW6HRHwKzB0TVXuQm5veyWgtbiULDEdp?= =?us-ascii?q?32WuDdMDY9XDGAWTsyCVqp+Uuju/ccvvqYJGAfokoOYiKTEw4evaZvosLVDmDN?= =?us-ascii?q?mO1vZpoKhOqVWyroUi13iLIyBjpXtUCLW/cDDgfWb3r9j2dduwGvPeFM8mz/b7?= =?us-ascii?q?2Zx6tVXOoWDpFKcvKHX9uLMcxZciwlkjQfJfaUY8zXr7F/1EnBC2QeDfrm7lqb?= =?us-ascii?q?GXWKT+ScyjSjZoAcu4w5q2J84d7LtjNmGKTPebCErnih9ZDu33XQgvHXSmR4Ox?= =?us-ascii?q?99u+kFGmTUhUMYJQ=3D=3D?= X-IPAS-Result: =?us-ascii?q?A2HgAQC03BlZ/wHyM5BcGgEBAQECAQEBAQgBAQEBFQEBAQE?= =?us-ascii?q?CAQEBAQgBAQEBgwEpgVwSjnaRXpcOJYs1VwEBAQEBAQEBAgECaCiCMySCSQIkU?= =?us-ascii?q?gMDCQIXMQgDAWwFiAJOgUENrk46JgKKf4g9gmeFCoV/BZ4Kkw4NggSJFYZQAoh?= =?us-ascii?q?/i0RYgQomCQIeCB8PRoR3HIF/WoYkgjsBAQE?= Received: from unknown (HELO tarius.tycho.ncsc.mil) ([144.51.242.1]) by emsm-gh1-uea10.nsa.gov with ESMTP; 15 May 2017 16:53:16 +0000 Received: from prometheus.infosec.tycho.ncsc.mil (prometheus [192.168.25.40]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id v4FGptli030271; Mon, 15 May 2017 12:52:15 -0400 Received: from tarius.tycho.ncsc.mil (tarius.infosec.tycho.ncsc.mil [144.51.242.1]) by prometheus.infosec.tycho.ncsc.mil (8.15.2/8.15.2) with ESMTP id v4FGponH275374 for ; Mon, 15 May 2017 12:51:50 -0400 Received: from moss-pluto.infosec.tycho.ncsc.mil (moss-pluto [192.168.25.131]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id v4FGpl2J030261; Mon, 15 May 2017 12:51:47 -0400 From: Stephen Smalley To: selinux@tycho.nsa.gov Subject: [PATCH] libsepol,checkpolicy: add binary module support for xperms Date: Mon, 15 May 2017 12:55:56 -0400 Message-Id: <20170515165556.31824-1-sds@tycho.nsa.gov> X-Mailer: git-send-email 2.9.3 X-BeenThere: selinux@tycho.nsa.gov X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Security-Enhanced Linux \(SELinux\) mailing list" List-Post: List-Help: Cc: Stephen Smalley Errors-To: selinux-bounces@tycho.nsa.gov Sender: "Selinux" X-Virus-Scanned: ClamAV using ClamSMTP Presently we support xperms rules in source policy and in CIL modules. The binary policy module format however was never extended for xperms. This limitation inhibits use of xperms in refpolicy-based policy modules (including the selinux-testsuite policy). Update libsepol to support linking, reading, and writing a new binary policy module version that supports xperms rules. Update dismod to display xperms rules in binary policy modules. Also, to support use of a non-base binary policy module with a newer version on a system using a base policy module with an older version, automatically upgrade the version during module linking. This facilitates usage of newer features in non-base modules without requiring rebuilding the base module. Tests: 1. Add an allowxperms rule to the selinux-testsuite policy and confirm that it is properly written to the binary policy module (displayed by dismod), converted to CIL (the latter was already supported), and included in the kernel policy (via dispol and kernel test). 2. Use semodule_link and semodule_expand to manually link and expand all of the .pp files via libsepol, and confirm that the allowxperms rule is correctly propagated to the kernel policy. This test is required to exercise the legacy link/expand code path for binary modules that predated CIL. Signed-off-by: Stephen Smalley --- checkpolicy/test/dismod.c | 9 ++++ libsepol/include/sepol/policydb/policydb.h | 3 +- libsepol/src/link.c | 15 +++++++ libsepol/src/policydb.c | 66 +++++++++++++++++++++++++++++- libsepol/src/write.c | 60 +++++++++++++++++++++------ 5 files changed, 137 insertions(+), 16 deletions(-) diff --git a/checkpolicy/test/dismod.c b/checkpolicy/test/dismod.c index aac13e1..b6e4adc 100644 --- a/checkpolicy/test/dismod.c +++ b/checkpolicy/test/dismod.c @@ -243,6 +243,13 @@ int display_avrule(avrule_t * avrule, policydb_t * policy, } } else if (avrule->specified & AVRULE_NEVERALLOW) { fprintf(fp, " neverallow"); + } else if (avrule->specified & AVTAB_XPERMS) { + if (avrule->specified & AVTAB_XPERMS_ALLOWED) + fprintf(fp, "allowxperm "); + else if (avrule->specified & AVTAB_XPERMS_AUDITALLOW) + fprintf(fp, "auditallowxperm "); + else if (avrule->specified & AVTAB_XPERMS_DONTAUDIT) + fprintf(fp, "dontauditxperm "); } else { fprintf(fp, " ERROR: no valid rule type specified\n"); return -1; @@ -282,6 +289,8 @@ int display_avrule(avrule_t * avrule, policydb_t * policy, policy, fp); } else if (avrule->specified & AVRULE_TYPE) { display_id(policy, fp, SYM_TYPES, avrule->perms->data - 1, ""); + } else if (avrule->specified & AVRULE_XPERMS) { + fprintf(fp, "%s", sepol_extended_perms_to_string((avtab_extended_perms_t *)avrule->xperms)); } fprintf(fp, ";\n"); diff --git a/libsepol/include/sepol/policydb/policydb.h b/libsepol/include/sepol/policydb/policydb.h index 37e0c9e..99e4990 100644 --- a/libsepol/include/sepol/policydb/policydb.h +++ b/libsepol/include/sepol/policydb/policydb.h @@ -748,9 +748,10 @@ extern int policydb_set_target_platform(policydb_t *p, int platform); #define MOD_POLICYDB_VERSION_NEW_OBJECT_DEFAULTS 15 #define MOD_POLICYDB_VERSION_DEFAULT_TYPE 16 #define MOD_POLICYDB_VERSION_CONSTRAINT_NAMES 17 +#define MOD_POLICYDB_VERSION_XPERMS_IOCTL 18 #define MOD_POLICYDB_VERSION_MIN MOD_POLICYDB_VERSION_BASE -#define MOD_POLICYDB_VERSION_MAX MOD_POLICYDB_VERSION_CONSTRAINT_NAMES +#define MOD_POLICYDB_VERSION_MAX MOD_POLICYDB_VERSION_XPERMS_IOCTL #define POLICYDB_CONFIG_MLS 1 diff --git a/libsepol/src/link.c b/libsepol/src/link.c index f211164..cd4cc86 100644 --- a/libsepol/src/link.c +++ b/libsepol/src/link.c @@ -1325,6 +1325,15 @@ static int copy_avrule_list(avrule_t * list, avrule_t ** dst, tail_perm = new_perm; cur_perm = cur_perm->next; } + + if (cur->xperms) { + new_rule->xperms = calloc(1, sizeof(*new_rule->xperms)); + if (!new_rule->xperms) + goto cleanup; + memcpy(new_rule->xperms, cur->xperms, + sizeof(*new_rule->xperms)); + } + new_rule->line = cur->line; new_rule->source_line = cur->source_line; if (cur->source_filename) { @@ -2569,6 +2578,12 @@ int link_modules(sepol_handle_t * handle, goto cleanup; } + if (mods[i]->policyvers > b->policyvers) { + WARN(state.handle, + "Upgrading policy version from %u to %u\n", b->policyvers, mods[i]->policyvers); + b->policyvers = mods[i]->policyvers; + } + if ((modules[i] = (policy_module_t *) calloc(1, sizeof(policy_module_t))) == diff --git a/libsepol/src/policydb.c b/libsepol/src/policydb.c index 7093b29..069eb7e 100644 --- a/libsepol/src/policydb.c +++ b/libsepol/src/policydb.c @@ -284,6 +284,13 @@ static struct policydb_compat_info policydb_compat[] = { .target_platform = SEPOL_TARGET_SELINUX, }, { + .type = POLICY_BASE, + .version = MOD_POLICYDB_VERSION_XPERMS_IOCTL, + .sym_num = SYM_NUM, + .ocon_num = OCON_NODE6 + 1, + .target_platform = SEPOL_TARGET_SELINUX, + }, + { .type = POLICY_MOD, .version = MOD_POLICYDB_VERSION_BASE, .sym_num = SYM_NUM, @@ -381,6 +388,13 @@ static struct policydb_compat_info policydb_compat[] = { .ocon_num = 0, .target_platform = SEPOL_TARGET_SELINUX, }, + { + .type = POLICY_MOD, + .version = MOD_POLICYDB_VERSION_XPERMS_IOCTL, + .sym_num = SYM_NUM, + .ocon_num = 0, + .target_platform = SEPOL_TARGET_SELINUX, + }, }; #if 0 @@ -557,6 +571,8 @@ void avrule_destroy(avrule_t * x) next = cur->next; free(cur); } + + free(x->xperms); } void role_trans_rule_init(role_trans_rule_t * x) @@ -3215,8 +3231,8 @@ static avrule_t *avrule_read(policydb_t * p if (rc < 0) goto bad; - (avrule)->specified = le32_to_cpu(buf[0]); - (avrule)->flags = le32_to_cpu(buf[1]); + avrule->specified = le32_to_cpu(buf[0]); + avrule->flags = le32_to_cpu(buf[1]); if (type_set_read(&avrule->stypes, fp)) goto bad; @@ -3252,6 +3268,52 @@ static avrule_t *avrule_read(policydb_t * p tail = cur; } + if (avrule->specified & AVRULE_XPERMS) { + uint8_t buf8; + size_t nel = ARRAY_SIZE(avrule->xperms->perms); + uint32_t buf32[nel]; + + if (p->policyvers < MOD_POLICYDB_VERSION_XPERMS_IOCTL) { + ERR(fp->handle, + "module policy version %u does not support ioctl" + " extended permissions rules and one was specified", + p->policyvers); + goto bad; + } + + if (p->target_platform != SEPOL_TARGET_SELINUX) { + ERR(fp->handle, + "Target platform %s does not support ioctl" + " extended permissions rules and one was specified", + policydb_target_strings[p->target_platform]); + goto bad; + } + + avrule->xperms = calloc(1, sizeof(*avrule->xperms)); + if (!avrule->xperms) + goto bad; + + rc = next_entry(&buf8, fp, sizeof(uint8_t)); + if (rc < 0) { + ERR(fp->handle, "truncated entry"); + goto bad; + } + avrule->xperms->specified = buf8; + rc = next_entry(&buf8, fp, sizeof(uint8_t)); + if (rc < 0) { + ERR(fp->handle, "truncated entry"); + goto bad; + } + avrule->xperms->driver = buf8; + rc = next_entry(buf32, fp, sizeof(uint32_t)*nel); + if (rc < 0) { + ERR(fp->handle, "truncated entry"); + goto bad; + } + for (i = 0; i < nel; i++) + avrule->xperms->perms[i] = le32_to_cpu(buf32[i]); + } + return avrule; bad: if (avrule) { diff --git a/libsepol/src/write.c b/libsepol/src/write.c index e75b9ab..1606807 100644 --- a/libsepol/src/write.c +++ b/libsepol/src/write.c @@ -50,7 +50,8 @@ struct policy_data { struct policydb *p; }; -static int avrule_write_list(avrule_t * avrules, struct policy_file *fp); +static int avrule_write_list(policydb_t *p, + avrule_t * avrules, struct policy_file *fp); static int ebitmap_write(ebitmap_t * e, struct policy_file *fp) { @@ -779,9 +780,9 @@ static int cond_write_node(policydb_t * p, if (cond_write_av_list(p, node->false_list, fp) != 0) return POLICYDB_ERROR; } else { - if (avrule_write_list(node->avtrue_list, fp)) + if (avrule_write_list(p, node->avtrue_list, fp)) return POLICYDB_ERROR; - if (avrule_write_list(node->avfalse_list, fp)) + if (avrule_write_list(p, node->avfalse_list, fp)) return POLICYDB_ERROR; } @@ -1613,18 +1614,13 @@ static int range_write(policydb_t * p, struct policy_file *fp) /************** module writing functions below **************/ -static int avrule_write(avrule_t * avrule, struct policy_file *fp) +static int avrule_write(policydb_t *p, avrule_t * avrule, + struct policy_file *fp) { size_t items, items2; uint32_t buf[32], len; class_perm_node_t *cur; - if (avrule->specified & AVRULE_XPERMS) { - ERR(fp->handle, "module policy does not support extended" - " permissions rules and one was specified"); - return POLICYDB_ERROR; - } - items = 0; buf[items++] = cpu_to_le32(avrule->specified); buf[items++] = cpu_to_le32(avrule->flags); @@ -1661,10 +1657,48 @@ static int avrule_write(avrule_t * avrule, struct policy_file *fp) cur = cur->next; } + if (avrule->specified & AVRULE_XPERMS) { + size_t nel = ARRAY_SIZE(avrule->xperms->perms); + uint32_t buf32[nel]; + uint8_t buf8; + unsigned int i; + + if (p->policyvers < MOD_POLICYDB_VERSION_XPERMS_IOCTL) { + ERR(fp->handle, + "module policy version %u does not support ioctl" + " extended permissions rules and one was specified", + p->policyvers); + return POLICYDB_ERROR; + } + + if (p->target_platform != SEPOL_TARGET_SELINUX) { + ERR(fp->handle, + "Target platform %s does not support ioctl" + " extended permissions rules and one was specified", + policydb_target_strings[p->target_platform]); + return POLICYDB_ERROR; + } + + buf8 = avrule->xperms->specified; + items = put_entry(&buf8, sizeof(uint8_t),1,fp); + if (items != 1) + return POLICYDB_ERROR; + buf8 = avrule->xperms->driver; + items = put_entry(&buf8, sizeof(uint8_t),1,fp); + if (items != 1) + return POLICYDB_ERROR; + for (i = 0; i < nel; i++) + buf32[i] = cpu_to_le32(avrule->xperms->perms[i]); + items = put_entry(buf32, sizeof(uint32_t), nel, fp); + if (items != nel) + return POLICYDB_ERROR; + } + return POLICYDB_SUCCESS; } -static int avrule_write_list(avrule_t * avrules, struct policy_file *fp) +static int avrule_write_list(policydb_t *p, avrule_t * avrules, + struct policy_file *fp) { uint32_t buf[32], len; avrule_t *avrule; @@ -1682,7 +1716,7 @@ static int avrule_write_list(avrule_t * avrules, struct policy_file *fp) avrule = avrules; while (avrule) { - if (avrule_write(avrule, fp)) + if (avrule_write(p, avrule, fp)) return POLICYDB_ERROR; avrule = avrule->next; } @@ -1870,7 +1904,7 @@ static int avrule_decl_write(avrule_decl_t * decl, int num_scope_syms, return POLICYDB_ERROR; } if (cond_write_list(p, decl->cond_list, fp) == -1 || - avrule_write_list(decl->avrules, fp) == -1 || + avrule_write_list(p, decl->avrules, fp) == -1 || role_trans_rule_write(p, decl->role_tr_rules, fp) == -1 || role_allow_rule_write(decl->role_allow_rules, fp) == -1) { return POLICYDB_ERROR;