From patchwork Fri May 19 12:48:54 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Daniel Jurgens X-Patchwork-Id: 9737161 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 89F716034C for ; Fri, 19 May 2017 12:57:29 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 7E2892892F for ; Fri, 19 May 2017 12:57:29 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 71D7B28933; Fri, 19 May 2017 12:57:29 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-1.9 required=2.0 tests=BAYES_00, RCVD_IN_DNSWL_NONE, UNPARSEABLE_RELAY autolearn=unavailable version=3.3.1 Received: from emsm-gh1-uea10.nsa.gov (smtp.nsa.gov [8.44.101.8]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 20F8D2892F for ; Fri, 19 May 2017 12:57:27 +0000 (UTC) X-IronPort-AV: E=Sophos;i="5.38,364,1491264000"; d="scan'208";a="7241720" IronPort-PHdr: =?us-ascii?q?9a23=3AwBc82RaIcozQ9U/5TR90fSH/LSx+4OfEezUN459i?= =?us-ascii?q?sYplN5qZoc2zYx7h7PlgxGXEQZ/co6odzbGH7Oa6ACddsd6oizMrSNR0TRgLiM?= =?us-ascii?q?EbzUQLIfWuLgnFFsPsdDEwB89YVVVorDmROElRH9viNRWJ+iXhpTEdFQ/iOgVr?= =?us-ascii?q?O+/7BpDdj9it1+C15pbffxhEiCCzbL52Lhi6txvdutQZjYZiKas61wfErGZPd+?= =?us-ascii?q?lK321jOEidnwz75se+/Z5j9zpftvc8/MNeUqv0Yro1Q6VAADspL2466svrtQLe?= =?us-ascii?q?TQSU/XsTTn8WkhtTDAfb6hzxQ4r8vTH7tup53ymaINH2QLUpUjms86tnVBnlgz?= =?us-ascii?q?oJOD4j9GHcl9J+gqRVrhm8oxBz2pPYbJ2QOPd4Y6jTf84VRXBZU8hRSSJPH42y?= =?us-ascii?q?YYgIAeUDM+ZYt4vwq0YAoBSgHgmhH//jxiNSi3Pqx6A2z/gtHAfb1wIgBdIOt3?= =?us-ascii?q?HUoc37OqgIV+C+0a3GzSjZb/NZxzj97pPIeQ0mrP6RR71wd8vRxlcrFwPHlViQ?= =?us-ascii?q?rJLqPzeR1usXtWib6OVhWfizhG4grgF8uz6izdovhInRno8Z11/J+CpjzIs1ON?= =?us-ascii?q?G0UlB3bNG6HJdKqi2WL5Z6T8csTm1ytys3yKcKtYO6cSUK0pgr2gDTZviBfoOV?= =?us-ascii?q?+BzsTvyRLi19hH99fbK/gAu9/la4x+3nU8m0zE5Kri1YktnQrnwN1wLc6syASv?= =?us-ascii?q?Zl4keuwyyP1wHO6uFfO0w0iaraJIIhwr43jJYTt1jMHjTql0nsia+Wd0Ek9vCp?= =?us-ascii?q?6+ThfLrmuoeRO5J7hwzxKKgjmtGzDf4mPgUBQWSX4/mw2KXm/ULjQbVKivM2kr?= =?us-ascii?q?PesJDfPckbvbC2AwtU0oYl9ha+AC6q388fnXkaKlJKZAyIj5PyNlHSIPH3Efe/?= =?us-ascii?q?g1O2nDdt3PDJJKftAprKLnjdiLvhZ6py61ZAyAovytBS/5BUCrYHIP3pRk/xtM?= =?us-ascii?q?bXDhkiPgy2xObnDtB92ZkFWWKTHKCZKrjSvUWP5uI1LOmGfJUVtyrlK/g5+/7u?= =?us-ascii?q?imc0mV0ffaazwZQXa2u4HvNgI0WYf3rhmdkBEWMXvgsxV+PqlVuCUSJOZ3qoWK?= =?us-ascii?q?I8/D47Apq8DYjfXoCtnKCB3CCjE5xYZ2BGDlWMHmnyd4ifVfcDdj+dIsh7kjMe?= =?us-ascii?q?TbihUYgh1ROwuwDm17prNO3U+jcXtZj7zth6+/XTlQ0u9TxzF8mSzn2CT2Rznm?= =?us-ascii?q?MOWz86wbtyoVJjxVeZ0Kh5gvtYFdpJ6/NPTAg6KYbWz/ZmBNDqRgLBYtCJRU67?= =?us-ascii?q?TdW6Gz4xVMk8zMMJY0Z4B9qtlAvD3zawD78TibOLGIQ+8rjA0HjpO8Z913HG2b?= =?us-ascii?q?EhjlgnRctPM3arhqt79wTKBo7JlV+Vl6CweqQG3y7N9XmDwnSUsEFeTgFwTb3P?= =?us-ascii?q?XWoDaUvOsdT5+kTCQqegCbQ9KARBz9KNKqpRatDyiFVGXPbjNM3FY2O/gGe8Hx?= =?us-ascii?q?GIxqmDbIDyYWUSwD3dCFQYkwAU5XuGNhIxBiSmo2LDFzFuFkjgY0Dr8eljsn+7?= =?us-ascii?q?SVU0zw6SZU17y7W14gIVheCbS/4LxL0LpT0hqzRqE1anxN/ZEcaPpw97cKVbe9?= =?us-ascii?q?M9709N1XjFuAxlIpygM6dii0YFcwR5pUPu0A53CplbnMgxqnMqywRzKaeC31NH?= =?us-ascii?q?bT+Y247/OqHPIGno4B+vc7LW2k3Z0NuO9KYA8vA4q0n9swGzDUov6Gtn3MdP03?= =?us-ascii?q?SH+5XKCRAeUZXrUkY47xJ6va3VYjEh54PI0n1hKbW0vSLf1NIoHuQlzg2tcMtY?= =?us-ascii?q?MKOBCAD9CdYaB9S0JOwshVepcgoOPPpO+64sI8Oma/yG1batPOZhmDKmiXpI4J?= =?us-ascii?q?tm302W6SV8UOnI04wCw/GC0QuNTy38g0u5ssDrhYBEYikfHnS+ySf4GI5RYbdy?= =?us-ascii?q?cZwXBmeuJM23wNp+ioXpW35Z8l6sHUkG2MizdRqVdVz90hVa1V4Lrny/hSu40z?= =?us-ascii?q?t0niktrqqexyzO3/3udAEZNW5PRWlii0rsIIevgtABREiobg4plBq56kbh3aRb?= =?us-ascii?q?orpwL3XLS0dSYyf2N31iUre3treaec5P75cosSFJX+SmfV+aTbD8rgAB0yP+A2?= =?us-ascii?q?Re3yo3dzawupX2hxZ6kn6SLG5vrHrFfsF93Q/f68bBRf5VxDYJXjN0hiLQBli4?= =?us-ascii?q?I9mp+tOUmozGsuyiUWKhUYFcfTPtzYyeqCux/XdqDgGnn/Cvht3nFhA30Szl2N?= =?us-ascii?q?lsTiXFtxX8bZft16ShN+JoYFVoCEX768pgFYF0ipEwi40I2XgGmpWV+mIKkXn1?= =?us-ascii?q?MdpGwq/+cnwNSiMLw9LP5gjqxlFjJGqTx43lTnWd3tdhZ96ib2MOwC098sRKBb?= =?us-ascii?q?yI47xFgSt0okO0rQzLbvh7hDsdzuEu6HECieETpAUt1jmdAqwVHURAJSzjjQmI?= =?us-ascii?q?79Sgo6VPfmmvd6Sw21Rknd26EbGCuR9TWGzieps4Bi9w6dh/MEjQ33Lt5IHkf8?= =?us-ascii?q?PQbd0NuRGOlRfPkfRVIoorlvUWnSpnJX79vXo9xu41lxNu2426vI+CK2h28qK2?= =?us-ascii?q?HANXNjrvZ8wJ4jHtl6FensSI0I+zApVtADILXIHnTfiwCjIdqeznNxqSED07sn?= =?us-ascii?q?qbHKDQHQub6Eh4s3LPD4qkOGuMKXkf09piWAKdK1BFjwAMQjo2hJg5GR62xMb5?= =?us-ascii?q?akd2+igR5kLkqhtL0u9oLQPzU2nFqAetcDg0TJ+fLRpN4w5Y+0jVNNaS7uVpHy?= =?us-ascii?q?FX5pehthCCKnSHZwRUCmEEQkKEB0r9Mbaz/tnP6e6YBva5L/vVeriBs/BRV/KS?= =?us-ascii?q?yZKoyItm8C6GNt+TMXl6E/07xk1DUGh/G8TDgToPUzQXmjnDb86avhe84TF3rs?= =?us-ascii?q?6+8PTtQg3v45eAC7pIPtVr4Ry2hr2DN+GIjiZjNTlYzo8MxWPPyLUHxF4dlTph?= =?us-ascii?q?eCerEbQBqS7NS7ndmq5JABEFdSx/LsxI77gz3gNVI87Ulsv11qJkjv4yE1pKTk?= =?us-ascii?q?fulsatZcwLOGG9KEjHCFyQNLuYOTLH2dr3br24Sb1RiuVUqhKxtC2HHE7jJDSD?= =?us-ascii?q?iiLpWwqhMO5WkCGbJxteuIenfhZqE2jjQ8rsagenP99vkT023bo0i2vRNWEGLz?= =?us-ascii?q?hzaUxNoaOL7S5DmfVwAXJB4WBqLeaagCaV9e/YJYgKsfFzGCR7i/pa4Ggmy7tS?= =?us-ascii?q?9CxLX/11mCTVrt5ouFypj/eAxSFmUBVUrDZHnoWLvV9tOa/B7JlPRW7E/A4R7W?= =?us-ascii?q?WXExkFvdRlBcfxu69O0dXPk7rzJylE89LR58QcBszUJ9mAMHsuKxbpHyTUDAQd?= =?us-ascii?q?Rz6xKW7fn1BdkO2V9nCNspg6rZ3slIAUSr9cVV06CPUaBV9/HNwFPph3XSgpnq?= =?us-ascii?q?KcjM4N+XWxtgLRRNlAspDBSP2SHe3lKCyFgrlcexsI3bT4IJwQNoz730xtdEJ3?= =?us-ascii?q?nIHNG0reU9BCvDFhbhM0oEVK9XhxUHc/20T7ZQOx+HUTD+K7ngYqigtiZuQg7D?= =?us-ascii?q?Hs7EktKVrOvyYwk04xmc75gT+Ldj7xN6SwXYBMByryqUcxLovxQxxpYg2qgUxk?= =?us-ascii?q?KDDESqpLj7R+bmBklhXTuYFTFv5cVqBLex4QxeuKaPUv31Rcsj+nylFH5OffD5?= =?us-ascii?q?ttihcqe4a2r31cwwJjcMI1JavIKaVUyVhQgKSOsTK22eA1wQ8TPFwC/32IeC4P?= =?us-ascii?q?okAIMaMmJyWw9Ox29QOCgydDeHQLV/cyv/1l7F09O+WdwCL7yLNMMFqxN/aYL6?= =?us-ascii?q?KXoGjPi9KHQk4q1kMJi0lE/aJ60cE9fEqIT0ov1qeeFwwVNcreLgFYd9dd9GPN?= =?us-ascii?q?cimUvuXN24h6P5umG+DzV+COt7sUgli+EwozG4QM88IBEYO20E3BMcfnK70FyB?= =?us-ascii?q?Uq5AjxIlWKEuhJcgqRkDgbu8G/0IN33Y5FKzEZBmV9Kzu45rDWpw8tm/eDU9E2?= =?us-ascii?q?YmoAUosDLHI2V9WwmzRFsHRYEDm3zuUZxRCZ7zDioiTQDT/8b8dsZfqPeRxsD9?= =?us-ascii?q?S29ikl/KitlV7b6JPeKH/mNd56oN/A9fsap4qbC/NTVbR9sF3cmolCSHysT27P?= =?us-ascii?q?EcW4J5f3a4k0cdP4EHC6XUKjizgtVcf+IM6tLrSUgQHvXYtUrIib3DUkNc+hFj?= =?us-ascii?q?EfGwx9qPwC5KN8fwIMeIA3YRj2uAQiL6a/OhuX0s2yQ2axLjtbV+NQzeG7Z7NL?= =?us-ascii?q?0SUjduq6yXsmTpE9yem461UAS4oLjh7Ew/avfodeUTXpFnxbZQrPuTIzl3J9Oe?= =?us-ascii?q?Yq3uc/3BTIvEEHPD+Vcuxkc3ZLsMwiBVyMO3V2EXA3R0WcjIbZ5Q6sxb8S9TNH?= =?us-ascii?q?n9lIye1FrGT+vpjHbTKjRayrqJHVsy4+YtgjuKB+LJLsLdCHtJzEmDzTVp7Qsh?= =?us-ascii?q?eKUCSiDfpVhsBQID5EQPlPgWwlI8oGuYtd5koxUcc+I6dPBrE1qL63czRpESkc?= =?us-ascii?q?wDQFWIOH2TwNnv2z26DGlhuKdpQtLgAEuo1YgtQBSy52fj8epKi7WoXMimCLV3?= =?us-ascii?q?MGIAgW7QVD/g4AkJF/fvz96orSUJBM0yJWo+5zUibTDJln7UH7SmaNjlXjVPWh?= =?us-ascii?q?ifam3RxMw/Lo09kbXhF/CUxcx+ZZlksoNL93JLMKvo7PqDOIc131vH71wuu8OF?= =?us-ascii?q?ZR0dHUd0H/DIfdu2vwSDET+X0VRY9KyXHQD5cSnhF4aKk1ulpDPpqqekHk5zwr?= =?us-ascii?q?345pBaW3Vdi3x1Y5qnYLXz2lE8BcC+Fgql7XWyZoY5GqqJXkJ5VdWXVc+JuDpF?= =?us-ascii?q?dFiE9tKTK2yYJAK8FR5T4BRDlPoTOBvNSsTM1Mx8p2AIEQItdlu3bwA6REOICP?= =?us-ascii?q?rH0wv7zg0H7Z+zQnv1e9yzS/Aai4T/hW/2cGAAUmO3yeqlUzD+sr6mrS/UrNvU?= =?us-ascii?q?py/+dHHbWPjEJxoTh7HpBSBjZGy3GlL1JvTHZYqeVWMqLVfNJAQ/Mqfx+gJwQ+?= =?us-ascii?q?FeI630yO5Ux0gXD5YylpuwtG5yzdWhI7WTMTgrjzhT0UstunNiMCS5JUcTUhaD?= =?us-ascii?q?/IKwKBliBNphlfb1xlVosEDdlb47EbxZVb/s7cRka2My0FWwZiNg0g2/pFiUFD?= =?us-ascii?q?qFmYeTzaDQewd/bPtQN4cNyMo8G3N/T24h1Hip/5v+8l7akDQWOpmRG1S9DEs4?= =?us-ascii?q?D8rsGKtleJdKrgKOK8b2POQCTOgByti7opFIXF/y/WMAVHMZZ60mYkbYLnCWHV?= =?us-ascii?q?IRRMP7gbKFZDVaBmddVGpfhXZ9V6d6kU+a9iHA6HSwjrGIyosvlJMEjfSijZLy?= =?us-ascii?q?qc7OOzu4TT4qLBSeL4fMyD227HQ75rPpd98TT7A6zq0ZNE9UXrxvdg7Vh6SV/b?= =?us-ascii?q?MyCbsNvuOAUL5NW4dkT4up0lBzTWAI1/kHD13EFPa9IXQzG28JQf0J5Z9GzwRv?= =?us-ascii?q?xm3Ufuq+BS6r1k6ZUt479z18e0JKDSKfBEvk97GBSUAR9q9po1CmhlW29RevMR?= =?us-ascii?q?KOvWfakBj8Dhsfr3F6sM6B2R4eNZd8DKJ0Tcmsm7FjGcSABLnAYbpj4cNQuQzf?= =?us-ascii?q?mFm7V7Scy9v+j2xlot40SiLh4B1L1t552L+qyGpO/NaBve0KYLV7P2RszpqLQs?= =?us-ascii?q?oESS6ecilLEQZmx/exenH/QFVs4B2mfgyrgnzSQoE87YHrLg/vtDW2g4njLmlZ?= =?us-ascii?q?B9BU8ZGugIHbqR4IRRgns4m/HDNtIIaKxCnXyPFRG8GL8Y1XGr8zeXIHVighzW?= =?us-ascii?q?1RHwQH+87FjyrSBiWivA1dbjkk1SVrmsHkdfRC+pNEB3sT+VOwrortX3s7wv7E?= =?us-ascii?q?4qKmzkqM6NlGy5NbxLBcL/IMKTITIopFMXi508Xcev1pwaGdWjJtcR7HB+YeHE?= =?us-ascii?q?52OtjSBBv79Nh5DC7cGN5vXXAX6ggrWeq7WWwTBVymM1vV8h5d+9MfHO/ceFQ+?= =?us-ascii?q?yy12YWTSdwpRfOXwKvprzctVAUNlSB0F3Xl4wSItFZwX4421nk5OgiRdI+7wBe?= =?us-ascii?q?GZjAZvwcvzDzOT30wVmFb9IxSCaezyNdHkjpHllgBKg8xGXwsdrIlXbR4VInXJ?= =?us-ascii?q?V/elf8hRNpE4U3N14i5EIQwioZHggHcQqbA62wBUT5MYsEUlAOZg+G3LihdKY4?= =?us-ascii?q?x09zwrKz5O/Ld+N8Gq4NO+1BgQ6JgVdUBIgZsbAEQLJ7YV9S7rTbpg/4C4joR/?= =?us-ascii?q?Lmj2Y/NeWpQsBG9sAUr2Mi7RyjRxW86ZdC4bEbiIqLdqJdepjDosR870Zh5T4S?= =?us-ascii?q?eS1AmwB/gAmlUe8ApODi7N/bsICr6uq0V6YiWf8X9x4qCGR6lZfwh0ojod7P3e?= =?us-ascii?q?dGVoLVkZj/8BxKI3OSpIbayQdzKe4UJIKtYrlt7GgIJykRJ3IPIdqZceI87DV3?= =?us-ascii?q?MDXO/VBCBN0DZc8ANsrXhQ9UklHpWK1U9sfDFV+XEZ1zeN4072r30z019Zo8Uv?= =?us-ascii?q?r+5z+2P5/f8kpNM+lFjCpyiNLIvPIVzubKCCgL/XmZbAB4wiycxJmLF/bw+uKM?= =?us-ascii?q?xNbPV1wYGi42UoFdJCeN+AG8Quq6io/pUwOO5cPphpIxal6QTGSrnKsZqqZMDf?= =?us-ascii?q?JAiiLj0zdCFID6ne6avsGw52tQsl1HFIdz4gPfGKVDIJp0JRT4mtOsRkhmCSv1?= =?us-ascii?q?YNvUeQY2uOqK2ucM5P1zN075ZY8dPhIExKz15GFQTgtvUrH2uEiWXf4fZdthUv?= =?us-ascii?q?PErWtV5ZhmK6ARIFiXvIbqoStQqFAqHA8pb6c9rjNGeUnVhw1ZQrv6trEGhAsd?= =?us-ascii?q?V955pEBNFHm/OGI7/TXHU7pagLOWCPwP/TWZVrYOXFlwMiNiXxO1341je7munf?= =?us-ascii?q?BHtGNKhD9yoPgu0zx7WRS9uCzsp6QW2TIj+bG1rysBuX1bTuqElyfHFFRDwO4M?= =?us-ascii?q?jagCF3bo8Ua8b2UbbIvu/LlnItzt9Yg/43slZxUuZCkGXfm9BCHxiKOIGZaDsN?= =?us-ascii?q?VGhB6CoM/Od6O8LTAONrQhzhLuX3p93RbQnBZm9GsGWTuh48UiJIqjJcYp3Cyo?= =?us-ascii?q?FnbHdFwU+KNGrNPxtUIXTOsxcV5hz2Fj0s+JRyITQMzPH304jhMjaWVCcZJM9Q?= =?us-ascii?q?UWF682jTaUpqNG5B0bYC/IEoS5/YndhcXI2Xk9TNdywWLWoqyFho8033B+ntN0?= =?us-ascii?q?7zKOuG4MeODCVM9sGHfz3J9FyePif/WtrvwHSIx+xbS9Uf8CN9Ku+Xe32Jp2WU?= =?us-ascii?q?+q2LAeE0C/MOAd2rfRSz2lRnGAWeSXb2iMmC40Mkvz5RmrLV03b9xHr00nPevB?= =?us-ascii?q?gZ5ckRPuUbVuSiWWu1Db0HQpMfkGeAIupIenZwsKQfYKaOeCI+gu3OYzCEAIb3?= =?us-ascii?q?/OASt2F/G2vkCwk4RhPHVg+0r6a/z38g/6KNuSBgUEEYnCo55p/vy6QniOOWVu?= =?us-ascii?q?zR11OEl0+fzSF1E2tu9baJaeg8Tfh8580e4ebPdtMCs9utEJloJk84mU39+AcQ?= =?us-ascii?q?vNwZbqOdHVvv+YDuXRz0s0fmFaU6IZbh3u6oQ7P945XrjTEqVDvRQYG6c2Wpsh?= =?us-ascii?q?N33+9KtsNgN8bhbRZKiogsntvu+KaINUp2XX7l0sMijRoBgDyv2oTQxhcZ+mnX?= =?us-ascii?q?LyIIo/RjhZtd1iFgNmHJdTG8MHtwenBJqUl7+ght+p/0N1ofQKsbbxCv/WyNS5?= =?us-ascii?q?xZt+UIZA6UyNIjnRGLFhgl55geSqnvfAzp7xBNvmedMFUuh7X2HEZqbCHoW+MT?= =?us-ascii?q?KOJtn8dlVH87GG1rJ5VQ+dZCfjX6qJrCekLulr4V0nyoxke+re1Cct4K/f2Nvz?= =?us-ascii?q?YWFbuyiioXmGOptD7FzFG/beUAxMSfWf62tlHrMYbZHy9OgQNdwt28Wc4wZp4D?= =?us-ascii?q?RFysuFLLCrrlXQ1UJjaZLbMEzp1j48WYYQPBu/MUosgWneqnnGH3RcL86kJtdp?= =?us-ascii?q?gNaUCBzt+kZwlXsqZm5bFWriXc2RNnQD28KieA2K8xpGD9QZkO60fk43rba/Sf?= =?us-ascii?q?RuOpVZmeWqs6gHkdlpKyHTXsRaOT/fLKNuNDpLEurPvEQoYgIDs7UtVYc6f4OB?= =?us-ascii?q?IFkGMEiezSP/1hXC0UnueNy31aaJPTwa8nNZwLLZyTJMvRW2ue6Fgs3/V7DUdJ?= =?us-ascii?q?P2XPvVMCo/TDGaRC8yHF2v+Vi+vvoLovuYLX0YolAObSKYEBQTqbx3rdjMEm/T?= =?us-ascii?q?nvVufIYEhPCfRy/9SS51mbEsBilVr0CMQvsCFQ7Qb3P7hmpTphCidbdw+ifub6?= =?us-ascii?q?eZ3bV9QOsLGc5XdfnfRMHXPbhGLiosvi0QJeL5etrbtbt/2VXNCSMCH7Lg6EyV?= =?us-ascii?q?TEnQROeVgT3sQ8FdspA9oCsz0srZhC5sC6DBNLvZoCShtsa0iCuUt+rEWkE3bk?= =?us-ascii?q?A1if5EC26EhFFbJWgCTdEYtl38aq+Ge0tIknkujKYm2xYIPh50SXBoyWFRl/WV?= =?us-ascii?q?FchQSFpSh2SrE9Mca1UiIDo2tW2X+AL/Z8dI7czaQW5T8rkkTIcZKPAu75mRM6?= =?us-ascii?q?wVlqV6lAl6qTA35n3OR2hWiRiIpu+JRK8=3D?= X-IPAS-Result: =?us-ascii?q?A2HgAQDq6h5Z/wHyM5BcGgEBAQECAQEBAQgBAQEBFQEBAQE?= =?us-ascii?q?CAQEBAQgBAQEBgn8rgW6OeZB9l3cvi3xXAQEBAQEBAQECAQJoKIIzJIJCBgECJ?= =?us-ascii?q?FIDAwkBARcIKQgDAVMHEgWKHwSxWzomAosojSeJBgEEkCiBAYxskx6LGYZTlEZ?= =?us-ascii?q?YgQpPIRVGhHccgWZzhmErghABAQE?= Received: from unknown (HELO tarius.tycho.ncsc.mil) ([144.51.242.1]) by emsm-gh1-uea10.nsa.gov with ESMTP; 19 May 2017 12:57:24 +0000 Received: from prometheus.infosec.tycho.ncsc.mil (prometheus [192.168.25.40]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id v4JCvM8m009797; Fri, 19 May 2017 08:57:22 -0400 Received: from tarius.tycho.ncsc.mil (tarius.infosec.tycho.ncsc.mil [144.51.242.1]) by prometheus.infosec.tycho.ncsc.mil (8.15.2/8.15.2) with ESMTP id v4JCu920092340 for ; Fri, 19 May 2017 08:56:09 -0400 Received: from goalie.tycho.ncsc.mil (goalie [144.51.242.250]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id v4JCu7AN009462 for ; Fri, 19 May 2017 08:56:08 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A1B8AgCi6h5Z/4GlL8FcGwEBAQMBAQEJAQEBgyqCGY55kH2YBRyGCAKGTgECAQEBAQECayiFGQYnUhAYCDFXBxKKKLFbOoseMo0niQYFkCiBAYxskx6RbJRGV4EKTyEVRoR3HIFmPTaGYSuCEAEBAQ X-IPAS-Result: A1B8AgCi6h5Z/4GlL8FcGwEBAQMBAQEJAQEBgyqCGY55kH2YBRyGCAKGTgECAQEBAQECayiFGQYnUhAYCDFXBxKKKLFbOoseMo0niQYFkCiBAYxskx6RbJRGV4EKTyEVRoR3HIFmPTaGYSuCEAEBAQ X-IronPort-AV: E=Sophos;i="5.38,364,1491278400"; d="scan'208";a="6059142" Received: from emsm-gh1-uea10.corp.nsa.gov (HELO emsm-gh1-uea10.nsa.gov) ([10.208.41.36]) by goalie.tycho.ncsc.mil with ESMTP; 19 May 2017 08:56:08 -0400 IronPort-PHdr: =?us-ascii?q?9a23=3ACNPXzBUDvZeFrfmk/3ZtWxs1KEPV8LGtZVwlr6E/?= =?us-ascii?q?grcLSJyIuqrYbBGDt8tkgFKBZ4jH8fUM07OQ6PG/HzZZqsvR+Fk5M7V0Hycfjs?= =?us-ascii?q?sXmwFySOWkMmbcaMDQUiohAc5ZX0Vk9XzoeWJcGcL5ekGA6ibqtW1aFRrwLxd6?= =?us-ascii?q?KfroEYDOkcu3y/qy+5rOaAlUmTaxe71/IRG0oAnLqMUanIRuJ6YyxxDUvnZGZu?= =?us-ascii?q?NayH9yK1mOhRj8/MCw/JBi8yRUpf0s8tNLXLv5caolU7FWFSwqPG8p6sLlsxnD?= =?us-ascii?q?VhaP6WAHUmoKiBpIAhPK4w/8U5zsryb1rOt92C2dPc3rUbA5XCmp4ql3RBP0ji?= =?us-ascii?q?oMKiU0+3/LhMNukK1boQqhpx1hzI7SfIGVL+d1cqfEcd8HWWZNQsNdWipcCY2+?= =?us-ascii?q?coQPFfIMM+ZGoYfgqVUArhywCguiBO701jNEmmX70bEg3ug9DQ3L2hErEdIUsH?= =?us-ascii?q?TTqdX4LKkcXvqzzKLVyTvDculW2Tjj54jOaRAqvPaBUq9qfsrXyEkgCQfFjleL?= =?us-ascii?q?pIzgITyV0uANvHKd7+pnWuOjkXIoqwZ0ojW2wMonl4rHhpoNx1zZ8Sh0zpw5KN?= =?us-ascii?q?K6RUJhfNKpEZtduzuHO4doRs4vRXxjtjwgxb0co5G7eTAHyJQ5yB7bbPyKa42I?= =?us-ascii?q?7QznVOaVOzh4gnVleb2lixmu9kis0Oz8Vs2s3FZLqCpKjMXMu2gQ2xHX5MWLUP?= =?us-ascii?q?Rw80W71TqS1g3e6vtILV0qmaffM5Ihx6Q/lpsXsUTNBC/2n0D2gbeLeUo+/Oio?= =?us-ascii?q?6vroYrHkppKHMo97lAX+MqA0lcy5BuQ5PRICUHSc+eS5zLHj51H2QK1Wjv0qla?= =?us-ascii?q?nUqIvaKtofpq64BQ9Vz4ki5g2jDzamzNsYnX4HIEhDeBKclYflIV7OIPfmDaT3?= =?us-ascii?q?v1P5mzdxxuvZFqbmH46INX/H1rD7cvI180dBzCIrxM1bopdTDasMZvn0Xwu5r9?= =?us-ascii?q?DDJgMoOAyzheD8AZNy0Z1aEW+XC7WYK4vKuEWJ/forKuKBIogPt3K1J/wo6/Dp?= =?us-ascii?q?l3MRg1IRfaC1m5AQbTTwBflvJQOZbHTwk/8AF3sHukw1S+muwF2LVXhJYG2/Wb?= =?us-ascii?q?kg4To4II2jBIbHAIuqhe+vxiC+S7FfYChkF0qDHHHzP9GIUvENZSaQCspsljgN?= =?us-ascii?q?U7+xDYQm0Ef950fB17N7I7+MqWUjvpX52Y0wvrWLmA=3D=3D?= X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0H0AQDq6h5Z/4GlL8FcGwEBAQMBAQEJA?= =?us-ascii?q?QEBFgEBAQMBAQEJAQEBgn+CGY55kH2YBRyGCAKGTgEBAQEBAQEBAgECaCiCMyQ?= =?us-ascii?q?BgkEGJ1IQGAgxVwcSiiixWzqLHjKNJ4kGBZAogQGMbJMekWyURliBCk8hFUaEd?= =?us-ascii?q?xyBZj02hmErghABAQE?= X-IPAS-Result: =?us-ascii?q?A0H0AQDq6h5Z/4GlL8FcGwEBAQMBAQEJAQEBFgEBAQMBAQE?= =?us-ascii?q?JAQEBgn+CGY55kH2YBRyGCAKGTgEBAQEBAQEBAgECaCiCMyQBgkEGJ1IQGAgxV?= =?us-ascii?q?wcSiiixWzqLHjKNJ4kGBZAogQGMbJMekWyURliBCk8hFUaEdxyBZj02hmErghA?= =?us-ascii?q?BAQE?= X-IronPort-AV: E=Sophos;i="5.38,364,1491264000"; d="scan'208";a="7241654" X-IronPort-Outbreak-Status: No, level 0, Unknown - Unknown Received: from mail-il-dmz.mellanox.com (HELO mellanox.co.il) ([193.47.165.129]) by emsm-gh1-uea10.nsa.gov with ESMTP; 19 May 2017 12:56:06 +0000 Received: from Internal Mail-Server by MTLPINE1 (envelope-from danielj@mellanox.com) with ESMTPS (AES256-SHA encrypted); 19 May 2017 15:49:22 +0300 Received: from x-vnc01.mtx.labs.mlnx. (x-vnc01.mtx.labs.mlnx [10.12.150.16]) by labmailer.mlnx (8.13.8/8.13.8) with ESMTP id v4JCn8HS027204; Fri, 19 May 2017 15:49:20 +0300 From: Dan Jurgens To: chrisw@sous-sol.org, paul@paul-moore.com, sds@tycho.nsa.gov, eparis@parisplace.org, dledford@redhat.com, sean.hefty@intel.com, hal.rosenstock@gmail.com Subject: [PATCH v7 4/9] IB/core: Enforce security on management datagrams Date: Fri, 19 May 2017 15:48:54 +0300 Message-Id: <1495198139-69993-5-git-send-email-danielj@mellanox.com> X-Mailer: git-send-email 1.7.1 In-Reply-To: <1495198139-69993-1-git-send-email-danielj@mellanox.com> References: <1495198139-69993-1-git-send-email-danielj@mellanox.com> X-Mailman-Approved-At: Fri, 19 May 2017 08:56:30 -0400 X-BeenThere: selinux@tycho.nsa.gov X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Security-Enhanced Linux \(SELinux\) mailing list" List-Post: List-Help: Cc: linux-rdma@vger.kernel.org, linux-security-module@vger.kernel.org, selinux@tycho.nsa.gov Errors-To: selinux-bounces@tycho.nsa.gov Sender: "Selinux" X-Virus-Scanned: ClamAV using ClamSMTP From: Daniel Jurgens Allocate and free a security context when creating and destroying a MAD agent. This context is used for controlling access to PKeys and sending and receiving SMPs. When sending or receiving a MAD check that the agent has permission to access the PKey for the Subnet Prefix of the port. During MAD and snoop agent registration for SMI QPs check that the calling process has permission to access the manage the subnet and register a callback with the LSM to be notified of policy changes. When notificaiton of a policy change occurs recheck permission and set a flag indicating sending and receiving SMPs is allowed. When sending and receiving MADs check that the agent has access to the SMI if it's on an SMI QP. Because security policy can change it's possible permission was allowed when creating the agent, but no longer is. Signed-off-by: Daniel Jurgens --- v2: - Squashed LSM hook additions. Paul Moore - Changed security blobs to void*. Paul Moore - Shorten end_port to port. Paul Moore - Change "smp" to "manage_subnet". Paul Moore - Use the LSM policy change notification and a flag to track permission instead of calling the LSM hook for every SMP. Dan Jurgens - Squashed PKey and SMP enforcement into the same patch and moved the logic into security.c. Dan Jurgens v3: - ib_port -> ib_endport. Paul Moore - Use notifier chains for LSM notification. Paul Moore - Reorder LSM hook parameters to put sec first. Paul Moore drivers/infiniband/core/core_priv.h | 35 ++++++++++++++ drivers/infiniband/core/mad.c | 52 +++++++++++++++++---- drivers/infiniband/core/security.c | 92 +++++++++++++++++++++++++++++++++++++ include/linux/lsm_hooks.h | 8 ++++ include/linux/security.h | 6 +++ include/rdma/ib_mad.h | 4 ++ security/security.c | 8 ++++ 7 files changed, 197 insertions(+), 8 deletions(-) diff --git a/drivers/infiniband/core/core_priv.h b/drivers/infiniband/core/core_priv.h index 7b63215..0664527 100644 --- a/drivers/infiniband/core/core_priv.h +++ b/drivers/infiniband/core/core_priv.h @@ -38,6 +38,8 @@ #include #include +#include +#include "mad_priv.h" struct pkey_index_qp_list { struct list_head pkey_index_list; @@ -189,6 +191,11 @@ int ib_get_cached_subnet_prefix(struct ib_device *device, u64 *sn_pfx); #ifdef CONFIG_SECURITY_INFINIBAND +int ib_security_pkey_access(struct ib_device *dev, + u8 port_num, + u16 pkey_index, + void *sec); + void ib_security_destroy_port_pkey_list(struct ib_device *device); void ib_security_cache_change(struct ib_device *device, @@ -206,7 +213,19 @@ void ib_destroy_qp_security_abort(struct ib_qp_security *sec); void ib_destroy_qp_security_end(struct ib_qp_security *sec); int ib_open_shared_qp_security(struct ib_qp *qp, struct ib_device *dev); void ib_close_shared_qp_security(struct ib_qp_security *sec); +int ib_mad_agent_security_setup(struct ib_mad_agent *agent, + enum ib_qp_type qp_type); +void ib_mad_agent_security_cleanup(struct ib_mad_agent *agent); +int ib_mad_enforce_security(struct ib_mad_agent_private *map, u16 pkey_index); #else +static inline int ib_security_pkey_access(struct ib_device *dev, + u8 port_num, + u16 pkey_index, + void *sec) +{ + return 0; +} + static inline void ib_security_destroy_port_pkey_list(struct ib_device *device) { } @@ -255,5 +274,21 @@ static inline int ib_open_shared_qp_security(struct ib_qp *qp, static inline void ib_close_shared_qp_security(struct ib_qp_security *sec) { } + +static inline int ib_mad_agent_security_setup(struct ib_mad_agent *agent, + enum ib_qp_type qp_type) +{ + return 0; +} + +static inline void ib_mad_agent_security_cleanup(struct ib_mad_agent *agent) +{ +} + +static inline int ib_mad_enforce_security(struct ib_mad_agent_private *map, + u16 pkey_index) +{ + return 0; +} #endif #endif /* _CORE_PRIV_H */ diff --git a/drivers/infiniband/core/mad.c b/drivers/infiniband/core/mad.c index 57f231f..46b3c98 100644 --- a/drivers/infiniband/core/mad.c +++ b/drivers/infiniband/core/mad.c @@ -40,9 +40,11 @@ #include #include #include +#include #include #include "mad_priv.h" +#include "core_priv.h" #include "mad_rmpp.h" #include "smi.h" #include "opa_smi.h" @@ -369,6 +371,12 @@ struct ib_mad_agent *ib_register_mad_agent(struct ib_device *device, atomic_set(&mad_agent_priv->refcount, 1); init_completion(&mad_agent_priv->comp); + ret2 = ib_mad_agent_security_setup(&mad_agent_priv->agent, qp_type); + if (ret2) { + ret = ERR_PTR(ret2); + goto error4; + } + spin_lock_irqsave(&port_priv->reg_lock, flags); mad_agent_priv->agent.hi_tid = ++ib_mad_client_id; @@ -386,7 +394,7 @@ struct ib_mad_agent *ib_register_mad_agent(struct ib_device *device, if (method) { if (method_in_use(&method, mad_reg_req)) - goto error4; + goto error5; } } ret2 = add_nonoui_reg_req(mad_reg_req, mad_agent_priv, @@ -402,14 +410,14 @@ struct ib_mad_agent *ib_register_mad_agent(struct ib_device *device, if (is_vendor_method_in_use( vendor_class, mad_reg_req)) - goto error4; + goto error5; } } ret2 = add_oui_reg_req(mad_reg_req, mad_agent_priv); } if (ret2) { ret = ERR_PTR(ret2); - goto error4; + goto error5; } } @@ -418,9 +426,10 @@ struct ib_mad_agent *ib_register_mad_agent(struct ib_device *device, spin_unlock_irqrestore(&port_priv->reg_lock, flags); return &mad_agent_priv->agent; - -error4: +error5: spin_unlock_irqrestore(&port_priv->reg_lock, flags); + ib_mad_agent_security_cleanup(&mad_agent_priv->agent); +error4: kfree(reg_req); error3: kfree(mad_agent_priv); @@ -491,6 +500,7 @@ struct ib_mad_agent *ib_register_mad_snoop(struct ib_device *device, struct ib_mad_agent *ret; struct ib_mad_snoop_private *mad_snoop_priv; int qpn; + int err; /* Validate parameters */ if ((is_snooping_sends(mad_snoop_flags) && !snoop_handler) || @@ -525,17 +535,25 @@ struct ib_mad_agent *ib_register_mad_snoop(struct ib_device *device, mad_snoop_priv->agent.port_num = port_num; mad_snoop_priv->mad_snoop_flags = mad_snoop_flags; init_completion(&mad_snoop_priv->comp); + + err = ib_mad_agent_security_setup(&mad_snoop_priv->agent, qp_type); + if (err) { + ret = ERR_PTR(err); + goto error2; + } + mad_snoop_priv->snoop_index = register_snoop_agent( &port_priv->qp_info[qpn], mad_snoop_priv); if (mad_snoop_priv->snoop_index < 0) { ret = ERR_PTR(mad_snoop_priv->snoop_index); - goto error2; + goto error3; } atomic_set(&mad_snoop_priv->refcount, 1); return &mad_snoop_priv->agent; - +error3: + ib_mad_agent_security_cleanup(&mad_snoop_priv->agent); error2: kfree(mad_snoop_priv); error1: @@ -581,6 +599,8 @@ static void unregister_mad_agent(struct ib_mad_agent_private *mad_agent_priv) deref_mad_agent(mad_agent_priv); wait_for_completion(&mad_agent_priv->comp); + ib_mad_agent_security_cleanup(&mad_agent_priv->agent); + kfree(mad_agent_priv->reg_req); kfree(mad_agent_priv); } @@ -599,6 +619,8 @@ static void unregister_mad_snoop(struct ib_mad_snoop_private *mad_snoop_priv) deref_snoop_agent(mad_snoop_priv); wait_for_completion(&mad_snoop_priv->comp); + ib_mad_agent_security_cleanup(&mad_snoop_priv->agent); + kfree(mad_snoop_priv); } @@ -1216,12 +1238,16 @@ int ib_post_send_mad(struct ib_mad_send_buf *send_buf, /* Walk list of send WRs and post each on send list */ for (; send_buf; send_buf = next_send_buf) { - mad_send_wr = container_of(send_buf, struct ib_mad_send_wr_private, send_buf); mad_agent_priv = mad_send_wr->mad_agent_priv; + ret = ib_mad_enforce_security(mad_agent_priv, + mad_send_wr->send_wr.pkey_index); + if (ret) + goto error; + if (!send_buf->mad_agent->send_handler || (send_buf->timeout_ms && !send_buf->mad_agent->recv_handler)) { @@ -1942,6 +1968,14 @@ static void ib_mad_complete_recv(struct ib_mad_agent_private *mad_agent_priv, struct ib_mad_send_wr_private *mad_send_wr; struct ib_mad_send_wc mad_send_wc; unsigned long flags; + int ret; + + ret = ib_mad_enforce_security(mad_agent_priv, + mad_recv_wc->wc->pkey_index); + if (ret) { + ib_free_recv_mad(mad_recv_wc); + deref_mad_agent(mad_agent_priv); + } INIT_LIST_HEAD(&mad_recv_wc->rmpp_list); list_add(&mad_recv_wc->recv_buf.list, &mad_recv_wc->rmpp_list); @@ -1999,6 +2033,8 @@ static void ib_mad_complete_recv(struct ib_mad_agent_private *mad_agent_priv, mad_recv_wc); deref_mad_agent(mad_agent_priv); } + + return; } static enum smi_action handle_ib_smi(const struct ib_mad_port_private *port_priv, diff --git a/drivers/infiniband/core/security.c b/drivers/infiniband/core/security.c index 1ec913c..1644ddb 100644 --- a/drivers/infiniband/core/security.c +++ b/drivers/infiniband/core/security.c @@ -39,6 +39,7 @@ #include #include #include "core_priv.h" +#include "mad_priv.h" static struct pkey_index_qp_list *get_pkey_idx_qp_list(struct ib_port_pkey *pp) { @@ -615,4 +616,95 @@ int ib_security_modify_qp(struct ib_qp *qp, } EXPORT_SYMBOL(ib_security_modify_qp); +int ib_security_pkey_access(struct ib_device *dev, + u8 port_num, + u16 pkey_index, + void *sec) +{ + u64 subnet_prefix; + u16 pkey; + int ret; + + ret = ib_get_cached_pkey(dev, port_num, pkey_index, &pkey); + if (ret) + return ret; + + ret = ib_get_cached_subnet_prefix(dev, port_num, &subnet_prefix); + + if (ret) + return ret; + + return security_ib_pkey_access(sec, subnet_prefix, pkey); +} +EXPORT_SYMBOL(ib_security_pkey_access); + +static int ib_mad_agent_security_change(struct notifier_block *nb, + unsigned long event, + void *data) +{ + struct ib_mad_agent *ag = container_of(nb, struct ib_mad_agent, lsm_nb); + + if (event != LSM_POLICY_CHANGE) + return NOTIFY_DONE; + + ag->smp_allowed = !security_ib_endport_manage_subnet(ag->security, + ag->device->name, + ag->port_num); + + return NOTIFY_OK; +} + +int ib_mad_agent_security_setup(struct ib_mad_agent *agent, + enum ib_qp_type qp_type) +{ + int ret; + + ret = security_ib_alloc_security(&agent->security); + if (ret) + return ret; + + if (qp_type != IB_QPT_SMI) + return 0; + + ret = security_ib_endport_manage_subnet(agent->security, + agent->device->name, + agent->port_num); + if (ret) + return ret; + + agent->lsm_nb.notifier_call = ib_mad_agent_security_change; + ret = register_lsm_notifier(&agent->lsm_nb); + if (ret) + return ret; + + agent->smp_allowed = true; + agent->lsm_nb_reg = true; + return 0; +} + +void ib_mad_agent_security_cleanup(struct ib_mad_agent *agent) +{ + security_ib_free_security(agent->security); + if (agent->lsm_nb_reg) + unregister_lsm_notifier(&agent->lsm_nb); +} + +int ib_mad_enforce_security(struct ib_mad_agent_private *map, u16 pkey_index) +{ + int ret; + + if (map->agent.qp->qp_type == IB_QPT_SMI && !map->agent.smp_allowed) + return -EACCES; + + ret = ib_security_pkey_access(map->agent.device, + map->agent.port_num, + pkey_index, + map->agent.security); + + if (ret) + return ret; + + return 0; +} + #endif /* CONFIG_SECURITY_INFINIBAND */ diff --git a/include/linux/lsm_hooks.h b/include/linux/lsm_hooks.h index 6d9f41f..68d91e4 100644 --- a/include/linux/lsm_hooks.h +++ b/include/linux/lsm_hooks.h @@ -919,6 +919,11 @@ * @subnet_prefix the subnet prefix of the port being used. * @pkey the pkey to be accessed. * @sec pointer to a security structure. + * @ib_endport_manage_subnet: + * Check permissions to send and receive SMPs on a end port. + * @dev_name the IB device name (i.e. mlx4_0). + * @port_num the port number. + * @sec pointer to a security structure. * @ib_alloc_security: * Allocate a security structure for Infiniband objects. * @sec pointer to a security structure pointer. @@ -1638,6 +1643,8 @@ union security_list_options { #ifdef CONFIG_SECURITY_INFINIBAND int (*ib_pkey_access)(void *sec, u64 subnet_prefix, u16 pkey); + int (*ib_endport_manage_subnet)(void *sec, const char *dev_name, + u8 port_num); int (*ib_alloc_security)(void **sec); void (*ib_free_security)(void *sec); #endif /* CONFIG_SECURITY_INFINIBAND */ @@ -1875,6 +1882,7 @@ struct security_hook_heads { #endif /* CONFIG_SECURITY_NETWORK */ #ifdef CONFIG_SECURITY_INFINIBAND struct list_head ib_pkey_access; + struct list_head ib_endport_manage_subnet; struct list_head ib_alloc_security; struct list_head ib_free_security; #endif /* CONFIG_SECURITY_INFINIBAND */ diff --git a/include/linux/security.h b/include/linux/security.h index f96e333..549cb82 100644 --- a/include/linux/security.h +++ b/include/linux/security.h @@ -1432,6 +1432,7 @@ static inline int security_tun_dev_open(void *security) #ifdef CONFIG_SECURITY_INFINIBAND int security_ib_pkey_access(void *sec, u64 subnet_prefix, u16 pkey); +int security_ib_endport_manage_subnet(void *sec, const char *name, u8 port_num); int security_ib_alloc_security(void **sec); void security_ib_free_security(void *sec); #else /* CONFIG_SECURITY_INFINIBAND */ @@ -1440,6 +1441,11 @@ static inline int security_ib_pkey_access(void *sec, u64 subnet_prefix, u16 pkey return 0; } +static inline int security_ib_endport_manage_subnet(void *sec, const char *dev_name, u8 port_num) +{ + return 0; +} + static inline int security_ib_alloc_security(void **sec) { return 0; diff --git a/include/rdma/ib_mad.h b/include/rdma/ib_mad.h index 981214b..12eb539 100644 --- a/include/rdma/ib_mad.h +++ b/include/rdma/ib_mad.h @@ -537,6 +537,10 @@ struct ib_mad_agent { u32 flags; u8 port_num; u8 rmpp_version; + void *security; + bool smp_allowed; + bool lsm_nb_reg; + struct notifier_block lsm_nb; }; /** diff --git a/security/security.c b/security/security.c index 6eef315..b69fe6f 100644 --- a/security/security.c +++ b/security/security.c @@ -1540,6 +1540,12 @@ int security_ib_pkey_access(void *sec, u64 subnet_prefix, u16 pkey) } EXPORT_SYMBOL(security_ib_pkey_access); +int security_ib_endport_manage_subnet(void *sec, const char *dev_name, u8 port_num) +{ + return call_int_hook(ib_endport_manage_subnet, 0, sec, dev_name, port_num); +} +EXPORT_SYMBOL(security_ib_endport_manage_subnet); + int security_ib_alloc_security(void **sec) { return call_int_hook(ib_alloc_security, 0, sec); @@ -2014,6 +2020,8 @@ struct security_hook_heads security_hook_heads __lsm_ro_after_init = { #ifdef CONFIG_SECURITY_INFINIBAND .ib_pkey_access = LIST_HEAD_INIT(security_hook_heads.ib_pkey_access), + .ib_endport_manage_subnet = + LIST_HEAD_INIT(security_hook_heads.ib_endport_manage_subnet), .ib_alloc_security = LIST_HEAD_INIT(security_hook_heads.ib_alloc_security), .ib_free_security =