From patchwork Thu May 18 22:25:49 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Daniel Jurgens X-Patchwork-Id: 9735341 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id ADBFC601A1 for ; Thu, 18 May 2017 22:27:27 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 9887325EA6 for ; Thu, 18 May 2017 22:27:27 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 8D403288D2; Thu, 18 May 2017 22:27:27 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-1.9 required=2.0 tests=BAYES_00, RCVD_IN_DNSWL_NONE, UNPARSEABLE_RELAY autolearn=ham version=3.3.1 Received: from emsm-gh1-uea10.nsa.gov (smtp.nsa.gov [8.44.101.8]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id 45EB1288B2 for ; Thu, 18 May 2017 22:27:25 +0000 (UTC) X-IronPort-AV: E=Sophos;i="5.38,360,1491264000"; d="scan'208";a="7229098" IronPort-PHdr: =?us-ascii?q?9a23=3AVhZchBdWb7ZlSeptR0NP67IZlGMj4u6mDksu8pMi?= =?us-ascii?q?zoh2WeGdxcq7ZhGN2/xhgRfzUJnB7Loc0qyN4v+mAzRLuMzJmUtBWaQEbwUCh8?= =?us-ascii?q?QSkl5oK+++Imq/EsTXaTcnFt9JTl5v8iLzG0FUHMHjew+a+SXqvnYdFRrlKAV6?= =?us-ascii?q?OPn+FJLMgMSrzeCy/IDYbxlViDanb75/KBe7oR/PusUKjoduN7g9wQbVr3VVfO?= =?us-ascii?q?hb2XlmLk+JkRbm4cew8p9j8yBOtP8k6sVNT6b0cbkmQLJBFDgpPHw768PttRnY?= =?us-ascii?q?UAuA/WAcXXkMkhpJGAfK8hf3VYrsvyTgt+p93C6aPdDqTb0xRD+v4btnRAPuhS?= =?us-ascii?q?waOTE56mXXgdFugqxdrhyquhhzz5fJbI2JMfZzeL7Wc9EHSmpbRstfVzJPDJ6y?= =?us-ascii?q?YYUMCOQOP+hYr5H/qlcToxaxGxKsCfjzxjNUnHL6wbc33/g9HQzAwQcuH8gOsH?= =?us-ascii?q?PRrNjtOqkdS+a1x7TMwzXedfNW1iny6I7Tchs8pvyDQKh/cczQyUYxEwPFjE6d?= =?us-ascii?q?qYn7MDOR0uQCqW6b7+1vVO61l2EnrARxryGpy8wxiYfJnpoYxk3L+Ch22oo4Jc?= =?us-ascii?q?C0RFRlbdOrDpdcrTyWO5NrTs4mTWxkoik3x78ctZKmfSUHyI4rywPBZ/GDdYWD?= =?us-ascii?q?/wjtW/yLIThigXJoYLe/hxGv/ke+0uD8Tcy00EpSripCj9nMqmgB1xzN5ciDTf?= =?us-ascii?q?tw5luh1iyV1wDS9+FEOlo4lbbbKpE9wr4wkYAfsULfES/thEr6lqqWdkQg+uSw?= =?us-ascii?q?6uTnZKvppoOEOoNphQzzPb4il8yiDegiLAQDUHaX9f6h2LH7+E32WrRKjvk4kq?= =?us-ascii?q?nDt5DaINwWprWnDA9R04Yj7Qu/Dji/3NsDmnkHMVRFdw6ZgIjyIFzOPPD5Auu/?= =?us-ascii?q?g1SrijtrwevGMaf7DpXCKXjDjq/tfaxh5E5E1Aoz0ddf6opWCrEGJvL8QFPxtN?= =?us-ascii?q?zCAR8/KAG0weHnCNN41owEQmKPHrGWMLnJsVOS4eIvOeaMbpcPuDnhM/gl++Lu?= =?us-ascii?q?jXghlF8ff6mmx4cYaHOjHvRhJUWZYGTsj8wPEWcOowo/Q/fliECEUT5Pena+Ra?= =?us-ascii?q?U85is0CIi+F4fMWpitgKCd3Ce8BpBWfn5JBUuSHnfudoWER/AMZTmTIsB/jDML?= =?us-ascii?q?S6KtS4g71RGhrAX60aZoLvLI+i0EspLuzMV65+rVlRE06DN7EcCd02CWQm5ugG?= =?us-ascii?q?wIXTg20Lp4oUxnxVeJybJ4jOBAFdxP+/NJVR83OoPAz+NgEdD/QR7OftCMSFm6?= =?us-ascii?q?WNqmGi0xQsg3w9AQf0Z3A8+igQzb3yq2H78VkKSGBJ0y8qLAwXfxI9hyy3PY26?= =?us-ascii?q?k9lVknQtBCNWq+hqFh8QjTApTGk0Sdl6mxcqQd0zTB9GCZzWqBpEtYShJ/Ub3Z?= =?us-ascii?q?XXADYUvbtdT450LFT7+oErknNw9BxdeDKqtMcNHpi09JRO3gONTffWK+hX28BR?= =?us-ascii?q?CWybOQdIDqYXkS3D3BCEgYlAAe5W2JOhM5CielomLeFyBuFUn1b0P37+ZxtGm3?= =?us-ascii?q?TlQqwAGObk1h0ae1+xEOiPOAS/ITxK8EuDw7pzR6Blm9w8nWC92GpwZ7e6Vce9?= =?us-ascii?q?w96k9d1W3Frwx9IoCgL6d6i1EAawR4pVnu1xRsCohbicgltmkqzAtpKaKA1FNO?= =?us-ascii?q?bS+X0o7qNr3QMGny8wila7TK1VHGzNaW5qAP5ew2qlXiuAGpE1Qt82983tlbzX?= =?us-ascii?q?ST+5LKDBAIXpLpSEY38Bp6qK/GbSkh/Y/U0mdsMaasuD/Yx90pHPclygqnf9pH?= =?us-ascii?q?PqOEDhX9E8sGCMivM+wngF2pbgoFPOxL7641Mdime+GB2K6xM+ZqhCimgnhf4I?= =?us-ascii?q?BhzkKM8DJxSu3S0JYGxPGYwxCKVzTmg1eitcD3hJpIZTYIHmqw0SLkHpJeZrVu?= =?us-ascii?q?fYYXDmejO9e4ychkh57sRXFY7kWuCEka18+sYxaSaEb93QJI30QNvXOngTe4zy?= =?us-ascii?q?BzkzwxsqWQxijOzPr5dBobOm9LQ3JvjUzwLoi1kd8aWlSobwkzmxe/40b12bRb?= =?us-ascii?q?rrxlL2bPWUdIYzT2L2Z6X6uruLqCeclP6Ig0sShMS+S8Z1eaS7D4oxQA1SPvBW?= =?us-ascii?q?1eyy4ndzuyoJX2gwR6iH6BLHZ0tHfYd9t/xRPD5NPCX/5RxSELRDdmhjnNHVe8?= =?us-ascii?q?Ityp8c+Tl5fZveC0T3ihWYFLcSn30YOAszO25XF3DhKinvC8gNnnHBMm3i/80t?= =?us-ascii?q?llST/HrA3gYoXx0aS1L/5ndFFyBFDg88p6Bp1+kowoiZEO2HgVmomV/X0dkWvp?= =?us-ascii?q?Ldpb2aX+bHwCRTMQx97V4Q7l11d5LnKO3Y75UW+dwsR5bdmgfmwWwj4979xNCK?= =?us-ascii?q?qM6LxEnDB1okahoQLKf/d9mjYdyf0z6H8VmOwJoxItziSbArATAUZYJjbglxKW?= =?us-ascii?q?4NCitK9XfnqgcaCs1EpimtCsFKuCogZYWHb9ZJgiBzN/7sJxMV/Xy33z953reM?= =?us-ascii?q?LKYdIUrB2UnA/Kj/JJJ5IpivoKmS1nNHrlvXI/1u47iQZi0ougsIecLGVt+L65?= =?us-ascii?q?AhleNjDuYsMf5jftjaFCkcqM2YCgAIlhEC0RXJT0VfKoDC4StfP/OgaNDjI8rG?= =?us-ascii?q?ybFKHcHQCB7kdmtHTPHI63N32NI3kZ19piTgGHJENDmAAUQCk6npkhGwCy3sPh?= =?us-ascii?q?bUN56S4J5lHirBtM1vxnNwPkX2fCvwendC00SIOFIBpN6QFC+l3VPtCA4eJ9GC?= =?us-ascii?q?FY5JKhoxKXJmydeQtIEXkDWlaYCFD7Irmu+d7A/vCGBuq4MvTDequOqepDWPeI?= =?us-ascii?q?356v1JVp/yqUPMWVInZiF+E72lZEXX1hA8TWgSgPSygMmi3Rbs6buBe99jR5rs?= =?us-ascii?q?+l9vTnQgXv5ZGAC7FKK9Vg5wi2gbufN+6XnCt5KjZZ1pcSynLTzbgf21ASiy9w?= =?us-ascii?q?eDmxDbQAtSnNTKfOlaNNCR4UdT9zPtNS760gxglNJdLbitTt2752lPE1DUtFVV?= =?us-ascii?q?vkmsyya8wFPXyyNFTdBEmRLLSGPzrLw8PpbqygVb1cluJUtwe/uTyDCU/sIiyD?= =?us-ascii?q?lyX1VxCoKexMljyUMwFFtYGydxZsBnLvTNT4ZR2nKNV3lyE5waUohnPWMm4RKS?= =?us-ascii?q?J8f1lDr7GK6CNXmPF/G2tB73d+N+aLhyOZ4/PfKpYMvvthGj50mP5C4HQm17tV?= =?us-ascii?q?6zlJRPJvmCTMs9FuuEupku+TyjpgSxpDsSxEi56OvUl4PqXZ7JZAU27e/B0R9W?= =?us-ascii?q?WQFwgKp9x9B93poaBf0MDPlLroJTdM8tLU59AcB9TaKMKGNnouKxzpFyLVDAQf?= =?us-ascii?q?ST6nL2bfh1ZSkPuK7H2asoA6qoTwmJoJUrJUSUc1Ge0ABURqBtwNOol3Uyg/kb?= =?us-ascii?q?GBj84I+GC+owPLSMVeo5DHUOidAe/2JDaFirlEZBsJwbTiIYQVKIL7x1RoakNm?= =?us-ascii?q?k4TSB0rQQddNrzVnbg81pEVN9GZxTnYo1k3/dAyt+ngTGeSznh4shQt0ef4t+y?= =?us-ascii?q?v041crOlrKozM9n1IwmdXqhjCRdiX8I7quUo5NCir7rU4xPon8QwZvYg24hVZk?= =?us-ascii?q?OyvcR7JNk7tgcnhmhxXTuZRVB/5TU7ZJYBgIxf6JYfUo1E5TqiSjxUBc4uvEBo?= =?us-ascii?q?FulAwwcZ6jt3hAwR5sbMYpJazMI6pE1kRQhqWLviOyzOAxxw4fKFgL8GyJYi4I?= =?us-ascii?q?v1IHNro9KiW0+exs7BCNlCFYeGgQTfYqpOxl9l8lMeSa0y3gy6JDKly2N+GHKa?= =?us-ascii?q?OWpXLPlcqTT1Mz0UMIjFVF8qJw0cc4cEqUVlojzL2PGBQVLcDCMx1ab9JO9HjP?= =?us-ascii?q?eiaDqf/NzoxuP4qjDO/oV/OBtKYPj02/HQYpBZkD7sMPHpm0ykHXM8fmIKQDyR?= =?us-ascii?q?oz+AThPE+FA+hReBKXjDcHpNmyw4Jt0olDJzESHH59PD6t6bbNvA8qh/SCXMwo?= =?us-ascii?q?bXgGQ4sELHM2WNG6miJDuXRPEiW32PoDyAee9z/8ujjQDD7kYtpnY/eUfw1jCN?= =?us-ascii?q?e3+DU46KW2hljX8ojEK2H9L9RitcfF6fkGqJafF/NUUb59vl/Hm4ZGQ3yqUmjP?= =?us-ascii?q?EcO6JpXrd4Ysatn0BWqgXVyklzI5VcHxM8ixLqKQmwHnWZ5UsJWH3DAkLcKyCy?= =?us-ascii?q?0RGxJ3p+EF+KJweBYOY4Qlbh7ytgQ/Nqu/IAGC3tWoXWmtNSNcT+NDwuWie7xX?= =?us-ascii?q?0y0sY/e5yHs6TpA11e+38VINRJwRgRHewu6jaJVEXSj1BHNdZx3FpTAlmGh5Ku?= =?us-ascii?q?Yy3uA/zQvUsVkdNjCLc/BpaGxEvtwnGFySIHV3BXAjSFOGi4rM/BKs1agI/yRB?= =?us-ascii?q?h9ZUzfFFsH/ms5/QejKjQqqrqYnOviohatgnratxMZDjIsSYtZPemCDfQ4fKsg?= =?us-ascii?q?GfVi61CeZakMBKIC1EWPlIhX0lOcsetIVb7UoxV9sxKKJXB6kpprGqbz1kDSgI?= =?us-ascii?q?wiICTIyA3SYNguGl17vUixecapIiPwIYsJ9amNsSTzZ2Yj8CpK+kT4jZjHGLSm?= =?us-ascii?q?4QLQgJ8AtM+hwPlpVrfu//+orJTIVAyzlMo/J7SiHLDIVn90PnSmGKhlj1UO+h?= =?us-ascii?q?k+qo3Q1OzPLs1d0bWAVnB0ZE2uhYjFclJrZsJqYMuY7KtyOHelnhvGLx0uemIk?= =?us-ascii?q?deydHMfV3iEIXFrXb8UjEb+XAMWYBPymvQGogJngVlb6YroFFMIIG4dUbk+zwr?= =?us-ascii?q?2ZhmH7miWcCs3VYlom4MRz22HNpZF+FmrFXXVSV/Y5+xspXlPI5dT3RM+J2HsV?= =?us-ascii?q?hZjltiMyq4yZpaJMFN5j8MXDdPoTWBstu9UtdD2cpsA58KPNh/p2/3GLlYN5iJ?= =?us-ascii?q?v302prvvx2fX+jwmrFi6xDSzG6q5T+1D/G0TAQQpKHqApUYxFecs9X3S8l/VuF?= =?us-ascii?q?Bu4+hbHqSPjVl2oDtlBpBOATJJ2mq/L1V9S3lGt+taJb/Qc8xbRPkyfgGgNAAk?= =?us-ascii?q?Ff4hxEyJ5kB0nXH2YyBosQta4S/dVREuVSYJmrfthSEeqsa/NDAAUZJIcDMhYz?= =?us-ascii?q?3GKw+AmCBXvRdfa11xVJwDBNZK5a0b15NO/sXeUUasNT0FXBt6OwIk1vpfkFVO?= =?us-ascii?q?sFmEdSDYFgWkb/DPvQNrfc2Jts6mMOz5/BtbioPgqO04978MR2e8lg2pXN/TtJ?= =?us-ascii?q?LzucOStkuWaqj4N/OzYWXbQDjLlxCwiq8uD4PW8CjLLApbN556xGImYZjmF2HG?= =?us-ascii?q?JglJKLwAJ0VFT6B6dctJrf1Aa89iZqkJ5bdnBgibSRP3BIyvsP5GI07ISjTQMy?= =?us-ascii?q?qN7u6yrZ/d4LHGVefgYcmMyGrdTKJsIpd28z/7FKn20YVG4Er5xu9t9l9mSVjB?= =?us-ascii?q?Ky2BtsruKR4L5Ma4akvvpZkpHTTIAJhujnbi2kZAeNcJTCGw9pQX1o9Z4m7qSe?= =?us-ascii?q?1kykjzrPFS97585Ikv+LBp1d27KrrOKflBqk9nBQWUBh92+ZozBmh/W3pRbfUV?= =?us-ascii?q?KPvLeqQZl8/uofjtF6ML8B2V5/BZadzfKkHdgMmwFC+TRgFfkQccrT4aMhGc2O?= =?us-ascii?q?Sbm691Tsalofb22l4371i5NB4Gw6hn5Z2Y9aqQuO/XcxzRwKABWqfwQsPzqqoj?= =?us-ascii?q?u1+O5fI+jrEDYWp1bBO7EOgGSsES3H/gwr4wwSIqDczDA6rq+ORfWHIhgjLgh5?= =?us-ascii?q?d9Ek0UGvwOB7qL+p9enmMilOzHLdAWd71CmmKTFR6lDrACyGSk6y2MIGV/hRHO?= =?us-ascii?q?yR7wS3up7FDqtS94XTfMz9D7n0pXTLa3A0lSXzCuOUBlrjyCJxbou8DxuaQu60?= =?us-ascii?q?E6KGrku8yRlGG5IrNYA9X/JMCAISkzvF8Xg4AxRt2r2YAfB9W9Jcwc/2xgYfTF?= =?us-ascii?q?6mOkiSlBr71Ah4rE7cGf4u/XEmW4j62Gt7WNwyhVyn48vVwk69CgMPTO68eLQ/?= =?us-ascii?q?Su2WYRVT1wuxDdXx6vt7zUs0wUOVGR0EjVgoAKOctZ3XYg3EH8+OcjWM4z9BlZ?= =?us-ascii?q?FovYYvMCojbzOCf7wVmBeN83Uyie3CFRHl3rDVl5Fq882HjzvMLSj3vQ/UMnRp?= =?us-ascii?q?VofUz9mRN3F5k4KV4q6FUPxioDCg0NZBCAAbGmG0vqMIwEVVIZZhSfxri6faU3?= =?us-ascii?q?0lNvzbOz/uPTavZ8B6UVPPZHkgGOhERbGo4RsaAGW7JzYUFd+7TYpgf8EIjqRO?= =?us-ascii?q?PmmmAuNfKvTcBV79sZu2Ek4gmhWxqq8Y1D4KoDiJCUaq5EZoDBvMJ970di/jMP?= =?us-ascii?q?czJCgRhhgBOjUOAcou/j7sLdsJW29uakTLwtSPkP9xgoG2R+iIP9gFEioN7Nze?= =?us-ascii?q?hTVpbYiZ/h/wBRPXGFpJzW0x5mKeoBM4irZqpv920bJygCIHIDJcGZa/gn4y5j?= =?us-ascii?q?KjrT5V1CAt8UZdwCIcrNnRtZhVHuWL5O6MXUAEKYC510d8Ay9WX70jc18YEzUu?= =?us-ascii?q?z48j+5OYjf701RP/NElChsjMjNpPQJzvrSBikX5mOZaxtsziOZ1ZaND/fw/eOR?= =?us-ascii?q?yNDbTF4GBjQ5U5tBKzqC9w2nQfC1lJbzXgOX9MDzmpQ+e1yURnCrm6QFqKlMG/?= =?us-ascii?q?ZaiirnxjheCpz1h/WNvtqw8mtYqFlHH5x17RLbA6hQI5R7ORv5lsm3XEd8HTHw?= =?us-ascii?q?eNvJdhY0vuqZ2PsM6f1kN0TifY8bPg4Ey7Xi5HpaVARuUqD5vkqZXe8KYNtmSe?= =?us-ascii?q?/EoW5V6Y16Nq8PJ0KRpJr0oTdUsFo2GhMmaKcsrjxGcUnDhAJVVLjyuL4cjQsc?= =?us-ascii?q?Vtl1uVRSFmK0OWI+4SfHVKtOgamVFvMV6DWSQbYUX0VuLCx+Xwu/2I9ydLuxgf?= =?us-ascii?q?BHrmRGkzt7oPgrzzNmQx+8tjf3p64X2DIg/7a4tC4auXFeS+WTnCjJBU9EzPQQ?= =?us-ascii?q?gqcWE2zi5kCkYHkfcIvy56FqJcv8+ok6+HQzeAgtcSIAU+ShDSHwkqyJD5eAsN?= =?us-ascii?q?JZnhGNvtvBYaW0LSgIObQ30QjjSGRl0gjCgBZo93MGQjen7N8kIoWxI9oqxiqs?= =?us-ascii?q?GWjGaVkN46JJsM3qtV4ITes7ck1hwGR90sedQi0CWc3PF3wzjgc6dWVOaIhD5g?= =?us-ascii?q?MCF6k0njaIubFL/gAKYDjOFISo4Y3QndrV1nk8Stdq3XjapqqfhpMlyHdlgc97?= =?us-ascii?q?7jaSuHQOcOzVS81sDWb91odRzezzfPusvfoBSIR41LStSvkCPde/+WGuwpVlRl?= =?us-ascii?q?elxqgCH1q+KOIDybPbUyCrSGKGXeSLd3OBny0+Mk705BmnMkc7aMFUoE8hKuHC?= =?us-ascii?q?nIJTlxX9UbNoQSWdvV3bzGwjMOMCcAI2vIanexAUQ+MKYuicJPQuwOcgB1cWaH?= =?us-ascii?q?/JByR2AfessVGxhIh7J2lg4ULibOTx8wDmNcCfGgUFEYHGrZ5+5/i6SniHOXB+?= =?us-ascii?q?0B14JFN0+PvHF1Qtqu9cdI6cnd3Rh9R40u4FcOxgMS8ntd4QnYJj75eb0MGQfR?= =?us-ascii?q?HX0JnyOcnfouKEDP3H00QqZmZaX6ICbgzr4YU6IsU0W6bXHbteoRQcGbY6T4I8?= =?us-ascii?q?OGvr86F0NgxzeBbLZLuomsnquv6LZpxMqn/Y8F0wKCbcuwUdxfGvTA17bpWqh3?= =?us-ascii?q?DsL5AqQjJOscdhChx8HItAA8kAtRaoA4aImKGnjN+84017u/cQsarxFv/Fys+0?= =?us-ascii?q?34BwX5hG/0yEIizdBK5xgkRqlu6ymOvP0oHtCcP+ftMJTO97QmrbZbLdBoW/Li?= =?us-ascii?q?iBOtnge05H77GczKh5XQuPayzjWaqJqjGkPu1+4Uon0ox4YPbTzDs14rHf2dvy?= =?us-ascii?q?YXxbpyi6oX6NNZtf90DKBffFUhJVU/WF9mFlEbcQbYvu++cEKcYiz8SE4wlv8D?= =?us-ascii?q?RC19OII7O/oU/I20J7c4/bLUTu1yg2RYkKIAqwMVEyjm/BsHvQGndcIda+Kclr?= =?us-ascii?q?ntmVCgfi51R+mW03YW5BAGXoT8+LOWcHw8K+eBGK9AVTAtYGheG4ZU44tqy0Se?= =?us-ascii?q?lvIZhFh+SqtLMZntZtKiHPQtVaPi7KIL9xJDpRAf3FpEI0bR4cr7g1RoA1aICM?= =?us-ascii?q?IEwdM0eAzjj9wBDf0U3ya9ys1KGJIDsZ8nVH07LJyz5MqBelufyBmM3sTKjZbI?= =?us-ascii?q?3qXP7VKCclWSuVSi8oEUao51ikv+EJvOScIWgFuVAUYz+SBBQVpq9xsdjaFnXT?= =?us-ascii?q?lvF7fJ0WmPCaXDj9SC99lKo1HCZLr0GMQ+EYGAnQdXDhhXRTuA24Kv9L53LlYK?= =?us-ascii?q?WSxrBJVOwOHotMbvqZTsPDefBQIjcnijQUNeWnct3Csbk5yFPITGoeE6nO7lGe?= =?us-ascii?q?SlCZQuDPjw7sCJ4Yu4kypzoA5sPbnigxFb/BebmYuW2A6Im92QqRv6X8S3Mibk?= =?us-ascii?q?ouyLYOCW+AzR1CAGQJD9Ucvkb9BKWHYhAfhzoSlety1kpUK0xIWXp03ygTxa6w?= X-IPAS-Result: =?us-ascii?q?A2F9AgCcHh5Z/wHyM5BcGwEBAQMBAQEJAQEBFgEBAQMBAQE?= =?us-ascii?q?JAQEBgwEpgW6OeJB7l34oi3VXAQEBAQEBAQECAQJoKIIzJIJCBgECeQMJAQEXC?= =?us-ascii?q?BkBDwgDAVMZBYhPgU8EsSUmAoskiD2EaoJwbAGFKQWQJ4EBjGuNbIUxggKJF4Z?= =?us-ascii?q?TiQGLRViBCk8hFUaEM4JGc4V1Ag0XghcBAQE?= Received: from unknown (HELO tarius.tycho.ncsc.mil) ([144.51.242.1]) by emsm-gh1-uea10.nsa.gov with ESMTP; 18 May 2017 22:27:24 +0000 Received: from prometheus.infosec.tycho.ncsc.mil (prometheus [192.168.25.40]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id v4IMRNpe024567; Thu, 18 May 2017 18:27:23 -0400 Received: from tarius.tycho.ncsc.mil (tarius.infosec.tycho.ncsc.mil [144.51.242.1]) by prometheus.infosec.tycho.ncsc.mil (8.15.2/8.15.2) with ESMTP id v4IMQG7k076203 for ; Thu, 18 May 2017 18:26:16 -0400 Received: from goalie.tycho.ncsc.mil (goalie [144.51.242.250]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id v4IMQDH0024133 for ; Thu, 18 May 2017 18:26:16 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A1CxAwDZHh5Z/4GlL8FcHAEBBAEBCgEBgyyCF454kHuYBRyGCAKGRwECAQEBAQECayiFGQZ5EBgIGQEXVxmIVIFTsSiLGgExiD2EaoJwbAGCDAyDEQWQJ4EBjGuNbIUxggKPaokBi0VXgQpPIRVGhnk9NoV1Ag0XghcBAQE X-IPAS-Result: A1CxAwDZHh5Z/4GlL8FcHAEBBAEBCgEBgyyCF454kHuYBRyGCAKGRwECAQEBAQECayiFGQZ5EBgIGQEXVxmIVIFTsSiLGgExiD2EaoJwbAGCDAyDEQWQJ4EBjGuNbIUxggKPaokBi0VXgQpPIRVGhnk9NoV1Ag0XghcBAQE X-IronPort-AV: E=Sophos;i="5.38,360,1491278400"; d="scan'208";a="6058449" Received: from emsm-gh1-uea11.corp.nsa.gov (HELO emsm-gh1-uea11.nsa.gov) ([10.208.41.37]) by goalie.tycho.ncsc.mil with ESMTP; 18 May 2017 18:26:15 -0400 IronPort-PHdr: =?us-ascii?q?9a23=3ABDz83BZUObEevWk4Gm0SK7X/LSx+4OfEezUN459i?= =?us-ascii?q?sYplN5qZoM6+bnLW6fgltlLVR4KTs6sC0LuJ9fq4EjVaqb+681k6OKRWUBEEjc?= =?us-ascii?q?hE1ycBO+WiTXPBEfjxciYhF95DXlI2t1uyMExSBdqsLwaK+i764jEdAAjwOhRo?= =?us-ascii?q?LerpBIHSk9631+ev8JHPfglEnjSwbLdwIRmsswndqsYajZZ8Jq0s1hbHv3xEdv?= =?us-ascii?q?hMy2h1P1yThRH85smx/J5n7Stdvu8q+tBDX6vnYak2VKRUAzs6PW874s3rrgTD?= =?us-ascii?q?QhCU5nQASGUWkwFHDBbD4RrnQ5r+qCr6tu562CmHIc37SK0/VDq+46t3ThLjlT?= =?us-ascii?q?wKPCAl/m7JlsNwjbpboBO/qBx5347Ue5yeOP5ncq/AYd8WWW9NU8BMXCJDH4y8?= =?us-ascii?q?dZMCAeofM+hFoYfzpFwAohmwBQS3GO/j1iVFimPs0KEmz+gsFxzN0gw6H9IJtX?= =?us-ascii?q?TZtNv7O70UUeuoyKfI0C/Db/xI1jf784jDbxcsruyWUrJ2cMre100vFwHeg1WV?= =?us-ascii?q?t4PlOzeV2f4Ls2ic4OtsT/6gi2kiqwxopDWk28QiipHRi44Izl3J+z91zYk3KN?= =?us-ascii?q?GiVUJ2YN6pHIFNuy2EM4Z7RN4pTXtytyYg0LIGvIa2fCgUx5QjwB7Sc/mHfJaM?= =?us-ascii?q?4hLnTumRJzB4hX1/dL2jgBa+60mgyunkWsm11lZFsDZFn8HRun0J2RHf8MeKR/?= =?us-ascii?q?ln8ku82DuC1xrf5vxaLU0wjabbLoQuwr80lpodq0TDGSr2lV3rg6CMcEUk+/an?= =?us-ascii?q?6+DlYrj9o5+TKYt0igXkPaQoncy+Dv40PRQJX2ie4ei8zqHs/VXlQLVWif07ir?= =?us-ascii?q?LZv47eJcQaoK65HgBU350/6xe/Ezim0NMYkWMBLFJeYh2LlYfpO1bQIKOwMfDq?= =?us-ascii?q?mFmokTF219jaL7bhBdPLNXGFn7D/Lphn7EsJ5AM1hfJC/Z1ZDKpJdP76XE78sN?= =?us-ascii?q?7wCxI9NwWyxPahA9J4gNBNEVmTC7OUZfuB+WSD4fgidqzVPNcY?= X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0HnAgCcHh5Z/4GlL8FcHAEBBAEBCgEBF?= =?us-ascii?q?wEBBAEBCgEBgwGCF454kHuYBRyGCAKGRwEBAQEBAQEBAgECaCiCMyQBgkEGeRA?= =?us-ascii?q?YCBkBF1cZiFSBU7ElixoBMYg9hGqCcGwBhSkFkCeBAYxrjWyFMYICj2qJAYtFW?= =?us-ascii?q?IEKTyEVRoZ5PTaFdQINF4IXAQEB?= X-IPAS-Result: =?us-ascii?q?A0HnAgCcHh5Z/4GlL8FcHAEBBAEBCgEBFwEBBAEBCgEBgwG?= =?us-ascii?q?CF454kHuYBRyGCAKGRwEBAQEBAQEBAgECaCiCMyQBgkEGeRAYCBkBF1cZiFSBU?= =?us-ascii?q?7ElixoBMYg9hGqCcGwBhSkFkCeBAYxrjWyFMYICj2qJAYtFWIEKTyEVRoZ5PTa?= =?us-ascii?q?FdQINF4IXAQEB?= X-IronPort-AV: E=Sophos;i="5.38,360,1491264000"; d="scan'208";a="5923801" X-IronPort-Outbreak-Status: No, level 0, Unknown - Unknown Received: from mail-il-dmz.mellanox.com (HELO mellanox.co.il) ([193.47.165.129]) by emsm-gh1-uea11.nsa.gov with ESMTP; 18 May 2017 22:26:14 +0000 Received: from Internal Mail-Server by MTLPINE1 (envelope-from danielj@mellanox.com) with ESMTPS (AES256-SHA encrypted); 19 May 2017 01:26:11 +0300 Received: from x-vnc01.mtx.labs.mlnx. (x-vnc01.mtx.labs.mlnx [10.12.150.16]) by labmailer.mlnx (8.13.8/8.13.8) with ESMTP id v4IMPsGh013313; Fri, 19 May 2017 01:26:10 +0300 From: Dan Jurgens To: selinux@tycho.nsa.gov Subject: [PATCH v2 9/9] semanage: Update man pages for infiniband Date: Fri, 19 May 2017 01:25:49 +0300 Message-Id: <1495146349-75366-10-git-send-email-danielj@mellanox.com> X-Mailer: git-send-email 1.7.1 In-Reply-To: <1495146349-75366-1-git-send-email-danielj@mellanox.com> References: <1495146349-75366-1-git-send-email-danielj@mellanox.com> X-BeenThere: selinux@tycho.nsa.gov X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Security-Enhanced Linux \(SELinux\) mailing list" List-Post: List-Help: Errors-To: selinux-bounces@tycho.nsa.gov Sender: "Selinux" X-Virus-Scanned: ClamAV using ClamSMTP From: Daniel Jurgens Update the main man page and add specific pages for ibpkeys and ibendports. Signed-off-by: Daniel Jurgens --- python/semanage/semanage-ibendport.8 | 66 ++++++++++++++++++++++++++++++++++++ python/semanage/semanage-ibpkey.8 | 66 ++++++++++++++++++++++++++++++++++++ python/semanage/semanage.8 | 16 ++++++--- 3 files changed, 144 insertions(+), 4 deletions(-) create mode 100644 python/semanage/semanage-ibendport.8 create mode 100644 python/semanage/semanage-ibpkey.8 diff --git a/python/semanage/semanage-ibendport.8 b/python/semanage/semanage-ibendport.8 new file mode 100644 index 00000000..c3753a27 --- /dev/null +++ b/python/semanage/semanage-ibendport.8 @@ -0,0 +1,66 @@ +.TH "semanage-ibendport" "8" "20170508" "" "" +.SH "NAME" +.B semanage\-ibendport \- SELinux Policy Management ibendport mapping tool +.SH "SYNOPSIS" +.B semanage ibendport [\-h] [\-n] [\-N] [\-S STORE] [ \-\-add \-t TYPE \-z IBDEV_NAME \-r RANGE port | \-\-delete \-z IBDEV_NAME port | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify \-t TYPE \-z IBDEV_NAME \-r RANGE port ] + +.SH "DESCRIPTION" +semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation from policy sources. semanage ibendport controls the ibendport number to ibendport type definitions. + +.SH "OPTIONS" +.TP +.I \-h, \-\-help +show this help message and exit +.TP +.I \-n, \-\-noheading +Do not print heading when listing the specified object type +.TP +.I \-N, \-\-noreload +Do not reload policy after commit +.TP +.I \-S STORE, \-\-store STORE +Select an alternate SELinux Policy Store to manage +.TP +.I \-C, \-\-locallist +List local customizations +.TP +.I \-a, \-\-add +Add a record of the specified object type +.TP +.I \-d, \-\-delete +Delete a record of the specified object type +.TP +.I \-m, \-\-modify +Modify a record of the specified object type +.TP +.I \-l, \-\-list +List records of the specified object type +.TP +.I \-E, \-\-extract +Extract customizable commands, for use within a transaction +.TP +.I \-D, \-\-deleteall +Remove all local customizations +.TP +.I \-t TYPE, \-\-type TYPE +SELinux type for the object +.TP +.I \-r RANGE, \-\-range RANGE +MLS/MCS Security Range (MLS/MCS Systems only) SELinux Range for SELinux login mapping defaults to the SELinux user record range. SELinux Range for SELinux user defaults to s0. +.TP +.I \-z IBDEV_NAME, \-\-ibdev_name IBDEV_NAME +The name of the infiniband device for the port to be labeled. (ex. mlx5_0) + +.SH EXAMPLE +.nf +List all ibendport definitions +# semanage ibendport \-l +Label mlx4_0 port 2. +# semanage ibendport \-a \-t allowed_ibendport_t \-z mlx4_0 2 + +.SH "SEE ALSO" +.BR selinux (8), +.BR semanage (8) + +.SH "AUTHOR" +This man page was written by Daniel Walsh diff --git a/python/semanage/semanage-ibpkey.8 b/python/semanage/semanage-ibpkey.8 new file mode 100644 index 00000000..2da4f546 --- /dev/null +++ b/python/semanage/semanage-ibpkey.8 @@ -0,0 +1,66 @@ +.TH "semanage-ibpkey" "8" "20170508" "" "" +.SH "NAME" +.B semanage\-ibpkey \- SELinux Policy Management ibpkey mapping tool +.SH "SYNOPSIS" +.B semanage ibpkey [\-h] [\-n] [\-N] [\-S STORE] [ \-\-add \-t TYPE \-x SUBNET_PREFIX \-r RANGE ibpkey_name | ibpkey_range | \-\-delete \-x SUBNET_PREFIX ibpkey_name | ibpkey_range | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify \-t TYPE \-x SUBNET_PREFIX \-r RANGE ibpkey_name | ibpkey_range ] + +.SH "DESCRIPTION" +semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation from policy sources. semanage ibpkey controls the ibpkey number to ibpkey type definitions. + +.SH "OPTIONS" +.TP +.I \-h, \-\-help +show this help message and exit +.TP +.I \-n, \-\-noheading +Do not print heading when listing the specified object type +.TP +.I \-N, \-\-noreload +Do not reload policy after commit +.TP +.I \-S STORE, \-\-store STORE +Select an alternate SELinux Policy Store to manage +.TP +.I \-C, \-\-locallist +List local customizations +.TP +.I \-a, \-\-add +Add a record of the specified object type +.TP +.I \-d, \-\-delete +Delete a record of the specified object type +.TP +.I \-m, \-\-modify +Modify a record of the specified object type +.TP +.I \-l, \-\-list +List records of the specified object type +.TP +.I \-E, \-\-extract +Extract customizable commands, for use within a transaction +.TP +.I \-D, \-\-deleteall +Remove all local customizations +.TP +.I \-t TYPE, \-\-type TYPE +SELinux type for the object +.TP +.I \-r RANGE, \-\-range RANGE +MLS/MCS Security Range (MLS/MCS Systems only) SELinux Range for SELinux login mapping defaults to the SELinux user record range. SELinux Range for SELinux user defaults to s0. +.TP +.I \-x SUBNET_PREFIX, \-\-subnet_prefix SUBNET_PREFIX +Subnet prefix for the specified pkey or range of pkeys. + +.SH EXAMPLE +.nf +List all ibpkey definitions +# semanage ibpkey \-l +Label pkey 0x8FFF (limited membership default pkey) as a default pkey type +# semanage ibpkey \-a \-t default_ibpkey_t \-x fe80:: 0x8FFF + +.SH "SEE ALSO" +.BR selinux (8), +.BR semanage (8) + +.SH "AUTHOR" +This man page was written by Daniel Walsh diff --git a/python/semanage/semanage.8 b/python/semanage/semanage.8 index abc47360..0bdb90f4 100644 --- a/python/semanage/semanage.8 +++ b/python/semanage/semanage.8 @@ -3,7 +3,7 @@ semanage \- SELinux Policy Management tool .SH "SYNOPSIS" -.B semanage {import,export,login,user,port,interface,module,node,fcontext,boolean,permissive,dontaudit} +.B semanage {import,export,login,user,port,interface,module,node,fcontext,boolean,permissive,dontaudit,ibpkey,ibendport} ... .B positional arguments: @@ -43,6 +43,12 @@ Manage process type enforcement mode .B dontaudit Disable/Enable dontaudit rules in policy +.B ibpkey +Manage infiniband pkey type definitions + +.B ibendport +Manage infiniband end port type definitions + .SH "DESCRIPTION" semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation @@ -50,9 +56,9 @@ from policy sources. This includes the mapping from Linux usernames to SELinux user identities (which controls the initial security context assigned to Linux users when they login and bounds their authorized role set) as well as security context mappings for various kinds of objects, such -as network ports, interfaces, and nodes (hosts) as well as the file -context mapping. See the EXAMPLES section below for some examples -of common usage. Note that the semanage login command deals with the +as network ports, interfaces, infiniband pkeys and endports, and nodes (hosts) +as well as the file context mapping. See the EXAMPLES section below for some +examples of common usage. Note that the semanage login command deals with the mapping from Linux usernames (logins) to SELinux user identities, while the semanage user command deals with the mapping from SELinux user identities to authorized role sets. In most cases, only the @@ -79,6 +85,8 @@ List help information .BR semanage-permissive (8), .BR semanage-port (8), .BR semanage-user (8) +.BR semanage-ibkey (8), +.BR semanage-ibendport (8), .SH "AUTHOR" This man page was written by Daniel Walsh