From patchwork Fri May 19 12:48:58 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Daniel Jurgens X-Patchwork-Id: 9737165 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 9F90B6034C for ; Fri, 19 May 2017 12:57:38 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 9521F2892F for ; Fri, 19 May 2017 12:57:38 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 88A4528933; Fri, 19 May 2017 12:57:38 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-1.9 required=2.0 tests=BAYES_00, RCVD_IN_DNSWL_NONE, UNPARSEABLE_RELAY autolearn=unavailable version=3.3.1 Received: from emsm-gh1-uea10.nsa.gov (smtp.nsa.gov [8.44.101.8]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 907BE2892F for ; Fri, 19 May 2017 12:57:37 +0000 (UTC) X-IronPort-AV: E=Sophos;i="5.38,364,1491264000"; d="scan'208";a="7241736" IronPort-PHdr: =?us-ascii?q?9a23=3AVMBdtRM/2StY0FFp678l6mtUPXoX/o7sNwtQ0KIM?= =?us-ascii?q?zox0LP7/psbcNUDSrc9gkEXOFd2CrakV1KyM6uu9CSQp2tWoiDg6aptCVhsI24?= =?us-ascii?q?09vjcLJ4q7M3D9N+PgdCcgHc5PBxdP9nC/NlVJSo6lPwWB6nK94iQPFRrhKAF7?= =?us-ascii?q?Ovr6GpLIj8Swyuu+54Dfbx9GiTe5Y75+Ngu6oRjeusQWgoZpN7o8xAbOrnZUYe?= =?us-ascii?q?pd2HlmJUiUnxby58ew+IBs/iFNsP8/9MBOTLv3cb0gQbNXEDopPWY15Nb2tRbY?= =?us-ascii?q?VguA+mEcUmQNnRVWBQXO8Qz3UY3wsiv+sep9xTWaMMjrRr06RTiu86FmQwLmhy?= =?us-ascii?q?cdMz4y7X/ZhMp+gqlGpB6tvgFzz5LRbIyTKfFwfL7SfckCSGRBQMhfSiJPDIC7?= =?us-ascii?q?YYQNAeoBJeRVo5TzqlQQthuzHhWgCP/1xzNUnHL6wbE23uI8Gg/GxgwgGNcOvW?= =?us-ascii?q?zaotrvMqcZTOS7zLTSzTXMcfxW3yz945XPfx88u/6MW7NwftTVyUktDA7Fi0uf?= =?us-ascii?q?qYjhPzyP0OQNtGea4/B8WuKojm4qsgd8qSWhyMcrj4nGnIMVylbc+CV424k6O9?= =?us-ascii?q?u4R1NjYd6jCptQqzuWOJZoTcM8RWxjpSU0yqUetJKmcyUHx44ryh7CZ/CdbYSF?= =?us-ascii?q?7QzvWPyMLTtgmX5ofLyyiwy9/EWi0OHwS8i53VZQoiZYjNXBsnYA3AHJ5MedUP?= =?us-ascii?q?ty5EKh1C6K1wDU9+5LP1g5lbHeK5492r4wkYcTsVjbEi/2hkr2iKiWe104+uey?= =?us-ascii?q?8eTnY6jmpoSGO49oigDxLqQumsulDeQ+LgcORHSU9f651L3i+U31WLRKjvsona?= =?us-ascii?q?nFqJ3WOMsWq6GjDwJVz4ov8QizAji43NgCgHULNFdFdwiGj4jtNVHOOvf4DfKn?= =?us-ascii?q?jlS3jjhrw/HGPrv8ApTCN3TMi7Dhfat760FA1gUz1stS545UC74dIPLzXVX9tN?= =?us-ascii?q?rDDhAjKQC0zOHnCMtl2oMERW2PGrOZML/VsVKQ5OIvJO+Ma5UJuDb9Mfcl4eXj?= =?us-ascii?q?jX0+mV8beKmmx4AXaGymEfR8OEWVe33sgs0OEW0SpAoxUPTqiEGeUT5Uf3uyXa?= =?us-ascii?q?A86SsnB4KlFofDQYatgL2f3CqgEJ1WYn1GC1+XHnf1cYWER+oMZDiVIs97nTwO?= =?us-ascii?q?TaKhRJM51RGyqA/6zKJqL+TV+i0csJLsysJ16vbdlR4s6DN0CN6d3HuVT2FumW?= =?us-ascii?q?MIRSE507xjoUBnzVeDy6d4ieRCFdNP//NJThs6NZnEwuNnF9/yXwXBftGVSFq7?= =?us-ascii?q?WdimHy8+Tsgww94PZEZ9Hc+ujhbd0Cq2G7UVjaCEBIQo8qLA2Hj8P9tyy2rc26?= =?us-ascii?q?k7lFQpXsxPNWi6iaFl7AjTG5TFk0OHmKa2ba4cxjLC9H+fzWqSu0FVSA5xUKTC?= =?us-ascii?q?XXAZfUbWqND56lrDT7+oE7gnNBFOydSBKqtLdN3mk09KRPH9N9TCe2ixgXu/BQ?= =?us-ascii?q?6UxrOQa4rnY2sd3D/HB0gCjw8T/G2GOBM7Bie5omLSFSduFFz0Y0/29ul+sny7?= =?us-ascii?q?RFcuzw6Wd01hy6a1+hkNiPyfUfwT3bUEuDo6pjV3Blm93NXWC8eaqwpmZqVcbs?= =?us-ascii?q?s34E1b2mLBqwx9IpugIrh4iVEDaQR3vl3h1w9sB4pajccqqWkmzA1oKaKXyFlB?= =?us-ascii?q?bS+X3YjsOr3LLWn/5Auva6DM2lHZy9aW5rwC6O8+q1XksgCpE1At83N939lTzX?= =?us-ascii?q?Sc+o3ADBAOXpLpTkY36x96qqnUYyYn44PUyWNjMbOvsjLZxdImGvElxQ29f9da?= =?us-ascii?q?Kq+EExXyE8ICDci0NOMqg0Spbg4DPO1K6K47It6pd/qc166vJ+tvgDWmjWFb74?= =?us-ascii?q?9nyUKM6zBwSujW0JYZ2/uYxBeIVy/gjFe9tcD6gYZEZTAWHmq71yfkH5Vcabds?= =?us-ascii?q?coYRDmeiOcq3xs9xh5T1QX5X6EajB08a2M+uYReScV390hFM1UQQu3yrgze3zz?= =?us-ascii?q?xzkzEvoaqSxyjOw+XkdBUdIG5LQ3NujVD2IYi7l9oaRlSnbxA1lBu54kb336xb?= =?us-ascii?q?pKVkL2nPWEtIZDb5L2VjUqu2q7qDbNVC6IgwsSVWVuS8YEyVSqXnrxsczSzjA3?= =?us-ascii?q?NUxConeDGyppX5gxt6hXqHLHZ0qHrZfd9/xQ3D69zbS/9cxSEGRDRkhjnMHFS8?= =?us-ascii?q?OMOp/dqMnZfZru++T36hVoFUcSTz1YOPrja75WlwDRKlhfy8gdrnEQwm0S/80d?= =?us-ascii?q?lnTiDIoAr6Yonsy6u2K+RncVd0BFXk8cp1Bpl+kpcshJEXwXUahYua/XwckWro?= =?us-ascii?q?MtVUx6T+bGELRTEV397Z+g/l2FdsLniR3YL2Sm2dwtd9Z9m9em4WxCQ94N1RBa?= =?us-ascii?q?eK6rxLgCt1rkC+rQ3Pffh3hi0dxuc26H4Gn+EJvxIgzj2HDbAPGUlVJjDjlxWU?= =?us-ascii?q?79G+talXanygcb6q2Ep5h9ChA6mIohtAV3bhZpciAShw491lMF3RzXL+8Y7keN?= =?us-ascii?q?zfbN4JsB2bjQvAhfBPKJ0tjvoKmTZnOWXlsH090eE7kBhu0o+ivIedLWVt4Ly2?= =?us-ascii?q?AgRDOz3ofMMc5Cvtjb1EksaN2ICvA49hFSkVU5vmSvKoCj0Suur9OwaIDjI8tm?= =?us-ascii?q?+RGaDDEg+H9Edms3XPHoilN36NInkZ0dJiRByGKUxRng8bQTI6noQjGQCy3szh?= =?us-ascii?q?d0V56S4N6V7ksBdMzfhoNxbnWGfFuAiocis0SISYLBdO6wFN/UPVMciA4eJvAy?= =?us-ascii?q?FX5IeuoReLKmOFewRIFn0GVVacB1/9JLWu48fP8/SADOqkM/TOeamOqfBZV/qQ?= =?us-ascii?q?35KjyIVn8yyJNsqVOnliCP0611FZUn9lHsTVgTIPSzYYlyjVdc6UuA+8+jFrrs?= =?us-ascii?q?C46PnrVhjv6pWSBLtJK9pv/Qy2gaCYN+OLnil2NTNY2okLxX/Sx7gVxEQShD12?= =?us-ascii?q?dzmxDbQAsjbATKTKmqBNFx4bczh+NMVJ76ImxQlNJcDbitLz1rFiiP46F1ZFWk?= =?us-ascii?q?blms2zYswKOW69PkvdBEmXLLSGOSHLw8bvbKOkV7Jfl/tbtxuxuTaHFE/uJTWD?= =?us-ascii?q?mCf3WB+xK+1MizubPBNGsoGnbhltEXTjTM7hahCjLdB3liM5zqc7hnPQL2EcLy?= =?us-ascii?q?Nxc1hXob2T8CNYmO9wF3ZF7np4K+mLgTyZ4/DEKpYRsvtqAiN0m/hc4Hsk17tf?= =?us-ascii?q?9DtES+BtmCvOst5upEmrkvKVxTp5ShVOpShEhJmQsEV5I6rZ6INPWXna8xIW92?= =?us-ascii?q?mQDQoFp8d9AN31p69Q0sTPlL70KDpa6N3U/MQcB8/SKM+cLXUuLwHmGD/OAwsD?= =?us-ascii?q?VzKrMnvfh0NFmvGI6nKVtoQ6qoTrmJcWULBbW0Y6Fu0EBUl+G9wCOIl4XjUhkb?= =?us-ascii?q?GBjc4I4WGxrB7eRclAuZDHTP2SC+31KDmFlblEewcIwbTgIIQPMY373lZuakN9?= =?us-ascii?q?nIXLBUXQW8tCojdmbgAqo0VA62RxTmo22035cAyt+2MTGeSynhEolgt0ef4t+y?= =?us-ascii?q?v041crOlrKozM9kEoxmNXhnz+cazvxLKC+XYFYFSX0q1QxMpP8QwZwcwK+h0pk?= =?us-ascii?q?OynYR7hJlbtvaXhriBPAuZtIAfNcS7NLbwUUxfyMZPUo1k9cqjm9yk9B/uvFCp?= =?us-ascii?q?pimBEscZGys3JKwxhjY8ItJazMOKpJyUBdhriQsS+zyO8+2hUeKFoN8G6JYyEI?= =?us-ascii?q?uVYIOaQhJyqm5uxs8xKNmjtZdGgKSfUqvupg9lkhNOSY0yLgz7lDJ1isOOyYKa?= =?us-ascii?q?OZvXXPmtCMQlMxzU4HjVdK/aJx0cs5dEqUTU8vxqOLFxsVLcrCNR1Vb81K+XfO?= =?us-ascii?q?ZymOr+TNzo9uP4imDO/oV/WOtKEag0K/AgkmA5kM7t4AHpmw0EDUN8HnI6AZyR?= =?us-ascii?q?81/gTkOE2FDOhVeBKMiDoHp8a/zIVp0olbJzAdBn5wMSqx5rbKvAMqh+CDXNgu?= =?us-ascii?q?aHcAQoQELm42WNG9myNBpHRPEj230uMfyAif4D7xvTjfDD75b9V/fviUfg9sBM?= =?us-ascii?q?uw+Toh76i8kUTX/YnGJ2HmKdRivcfC6eAAp5eHEfxUS6V9s0fHlolXQHyqS3LA?= =?us-ascii?q?HcSzJ5fud4kmdcb0BWqiUlyjlzI1SN/8PMqsLqiNhgHoWYZUsYmA0T8+NM+8Fi?= =?us-ascii?q?sRFAxqq+EF+q18eRUJY4Anbh7wqwQ+K6u/LR+C3dWqQmaiNSVZQOFazeS6YbxX?= =?us-ascii?q?yCwsYfWhxXQ7T5E11e+3/VcDRJEXlB3ew+isZ5VGWyjpBnNdYxnPpTY+l2V5Le?= =?us-ascii?q?k93OE/zQjSvlYBLTCEavZpaHdesNEmBVKeO3J2CnA3R1WEl4rM/has36wO/yta?= =?us-ascii?q?h9tU3vBFsHn6vp/bfj2sXbempojLvCU7bNgpuatxPZbkIsucu5PUhibfQ4XIsg?= =?us-ascii?q?2ZTC66EOJXmsJWICJZXPZImWYlOcgduYRZ8EQ/S90wKqBIBqQ3ur+qbj9kAjII?= =?us-ascii?q?wi8CS4OMxjoCjfmg27HCjBefbIwiMAAYsJVFmtYdSTR5YjkZpKC4TIjWi3WERX?= =?us-ascii?q?IVIAgN6QRM5QQAloB0fuDk74rITINMyzBMrPJuVyvHDJ9o+EXnSmuOm1j3VO2h?= =?us-ascii?q?k/C13QJV1P/t3MMXVwJ/CUhcwuZWl1EnKLJsJqkRoIHFrCGHeVn9vGL3x+usPE?= =?us-ascii?q?NRxtHMd13kEIrFsnLxXTcG+X0JQ49D0nLfGI8Tkwp4aaYruE5DLJqgekng+zwu?= =?us-ascii?q?355pEKWgVcC321Ylqm4LRyasE9pdFe5mtEzYWDh7bJC3spXkO45fQmhI+JKDrV?= =?us-ascii?q?dZlV9iMy+9yZVHLMFM7SQAXD9VoTWSpNGyUtFM2ddqD58QJddyo3j9GLleN5iX?= =?us-ascii?q?v307ob3vynjX+jA6rFe6xCu8G66+T+JF4WIeAB8lJ2KApUkzF+Es6Hvd8kjRsl?= =?us-ascii?q?Bo+OdWHqSPjUJ0oDtmApBCGjNJ2mu/I1R1UnZGr/1QKL7JfMxEX/kyeRivNgQ+?= =?us-ascii?q?FfE8xUyG50V0kmribiNvqARa4zjdUBcwVSYLmLfhgzoeqtuoOTUCUZJHcS0hbz?= =?us-ascii?q?vZKwKcgS1XvhFfZF9xVp8EHNlF4K8U3ZFI/sXcVEmgMycFUwJ+Ngggy/pQiVZD?= =?us-ascii?q?sFmEeSDaFQenbvjPvQFrccqTscKkIu/08xtAioPirO837b4DR2G8lQ2rX9/es5?= =?us-ascii?q?f2tseWuUuWaKf4L+q8bGfbTDfSkB+wha0rD4XR8ijXNwpbNYd1xWQ4bpjmFGHE?= =?us-ascii?q?Iw5KJ6QFKEpHTap6c8lJovhGZ894f6YE4bdtBgmbRhz1BYOvsOJLLk3URTTDNS?= =?us-ascii?q?WO7vKwoYTP7bzHU+fgYtaAx3HdQ6J4Jp168yX0G6/20Y9C/Ur7wutt9llkRlfY?= =?us-ascii?q?Li+Mt8nhJgcX5Mm4bETioJwpHTTSAJhujHrh3EZAd9AYQyey6pQX1ItZ6GrsSe?= =?us-ascii?q?J/ykXzsvdd96Nj6Yks57Bm09m0KLzXKfRHtU9nHhmUCRlr9po3Bmh/XHpdYugL?= =?us-ascii?q?KPfeZa4Zl9zhq/jrF6wL7x2Y4+5ZZsHBJ0HPgMm/DSyTRgJfkQcdszEaKBCc1/?= =?us-ascii?q?mfl69yV8mlufDz2lgx7FimMh4G0Ldt6J+C+qqMv+LXbh3Rzb0eVqjrQMPzoK4s?= =?us-ascii?q?tFmJ5f04jr4OZ3B6YxG6EOgHSMER3GDgzbolzSg0CcPMA6rg+OJfV3I+hj/gnZ?= =?us-ascii?q?F9EEkRGvMQB7WL5p5SnmY/m+zeLd0WabtPmmOAGB+rCLMCzmSr6ySPKml/nh7O?= =?us-ascii?q?yw3wQX+07FLusSB3Wy/MwMn4kkpJVri3AlxfXzG1Nk95rjyPOhbotNvttqgv6k?= =?us-ascii?q?E5LHDkvsqXlGS9ILNXA9H/JNuELCkwv1IXiZ08S8eh2Y8FBNW9J80R/2tmbvvE?= =?us-ascii?q?7GOrkTFOrLtbh4bE5cGV4PrXF2G6j6KGs7WN2CxYyn8gsFE969CgM+rD59iUTP?= =?us-ascii?q?WoyWkRVSZ/uw3OXxKvrLzUsUwUM1SR0EjXgIwKIs1Z3X4g20Hn5eksWsg8+xlF?= =?us-ascii?q?G4bbefwCuS78NyfuzVaYedI3WTGU0yFLEVLtDVl4BK881Xrrs8LIjnfR9UcnRo?= =?us-ascii?q?txd0z7nRx4FZg4KUY25VcLxSoMDBYCZgqGDLGyAkTlN5ELWVIEaRSd07iwYr03?= =?us-ascii?q?0lFrwrOz+O/TavRxB7IXOfZBkgGOnFZaGpUMsa0dWb58YEFS9KrWpgjkFojmUO?= =?us-ascii?q?PrlWIqOv2pXs9a8c4Yt3w44ga8XRag6olM76wdiJ+Wcq5Ie5/MvNpz701//z4A?= =?us-ascii?q?ajRNgARjjxO+Se0cuPrj7cbfsJWy7OahSr0gSPgW9xg7BmR+k4H/gEs5rtHNyu?= =?us-ascii?q?dQUIvVhprj8ApVOX6FpJ7a0wVgKeoJM4+rc6xv928ZKCgCJ3IDJt6Wa/gg4yBz?= =?us-ascii?q?MDXc/UFCAtgWadMeIsXNhRheilf1V7FL6srbBliYBp98d8826Wr31Dc18Zw7Xu?= =?us-ascii?q?b79jC2IZHf71dQP/JMlyhskMzNpPIVwPXIEiQX52eWawRtyCOY15aNE+rw/fmL?= =?us-ascii?q?yNzMS1wGHDQ5XJtGKTWe/gynQu61lJT3XQOO9s/8no4xdEKKSny2hqQFvb5GEf?= =?us-ascii?q?RchSXjwjheCof1iuqQs9qr7mtXqlJHH5ho4B3AGaVQJJN7NgrklsilQUh8HCj/?= =?us-ascii?q?eNrOehoopuWW2v8G4/9iOEvmeY8bPhUExqr16XVJVQtuU6f6sEuWU+wXZdtmTu?= =?us-ascii?q?7Er39O5IJvLq8AJl6dq4LwojdPslA2DxcjaKUsoTxCaknOgApVVr72uL4Higsc?= =?us-ascii?q?V8R1tlNMGWK0JWIx+jvGVaVTjKmKC/wV8y6eTrIPU0V2KCx+Rw662JR0d7uvg/?= =?us-ascii?q?9HrntMnjlhr/gyzzxmWBy8tDXtp6ITwz0g/qq1tDEcuXNYT+WelDzIBU9EzPQQ?= =?us-ascii?q?gqcWE2zi5kCkYHkfcIvy56FqJcb++okv7XQ/ZQ4ufiMcUuSmFS7wk7mEAoqRv9?= =?us-ascii?q?JAnBSNotnBbaevLSgOMbQw0R3jR3x60gnQghlo9G8LTy677N8jIoW9ONoqyjCu?= =?us-ascii?q?GWfFaFYG+rlJv9fptV4XUOs2bktswGdj0smHXi0NQ8jPG2cpjgc6cmhEdZND6Q?= =?us-ascii?q?MAF6Y2mDqIubNG/g4MajfODoul4pXQndvP2XQlUddqx2fWq7aZhpMrzHJlmM17?= =?us-ascii?q?7iqUtHQUaePYT9dmAmLv2YdH1ez+e/Ktv/gCSItny7ShU/gCP9Kh+WSs25VqXU?= =?us-ascii?q?mlyaoYH1ajNu8M2KvbWT+/SWKEQeSLb3SMnzEhP0Hp+xaoKEE3ZdxRr085NevC?= =?us-ascii?q?moJclxP/XrxpXCmQokXbzGM7O+MAaw02oJunexANTOMJf+icIuwuz+ckCFoCaH?= =?us-ascii?q?/JGSV2BvSzsV6qm4h7IGtv7lngYeTq6QDmK9qSGh8LEYLAqZ5x4/O6THqbOXB8?= =?us-ascii?q?1B1yIFV09+DHGlQ/qOBcd5eRncDOiNlg0O8FdvJtMSgjtd4JnoJs95OY0MCQcR?= =?us-ascii?q?He1pzyP83aouCEA/3DyEQnYm9bUqIDYQP0+4o1IMU0W7jSHbtFpxQTG7I2QJs7?= =?us-ascii?q?N2f+7Kt0Nh98chbNZLSohcnnvuWLZp9KqHLN9lIwKD3TuwYfyvy1UQN7c4qqiG?= =?us-ascii?q?vsL5wqQDJOscFtAAN8HIRTA8MAsxanA5mMlaG/it+x/V56uuATvar0C/DKz8i5?= =?us-ascii?q?355qUphb/0OLOjHRCLNsgkR/geS4mu3A3YXpCcP+ZdMEU/B2QnXbZb/CH4W/LC?= =?us-ascii?q?+OO837d0BJ776c0Kx2Ug+PayDhRaWLry6kO+t+4UU91IN4ePHczCEi773B39vy?= =?us-ascii?q?fW5brD+5rXGVLJtf8EDKBevGUhJRU/WK7GZlHawRbYvz7+oOL90iwN6C7Al37T?= =?us-ascii?q?RC1taFIqe7ok/LwEJ7eorRLFH11CYhRYkKPBO/PFMugWDDqXTdBm9TI9O5Kclr?= =?us-ascii?q?nNaVDhvt51R+mWEtem5NAGzoSsmNOWIDwcKxeBWK9B5XD9YEh+O4YlU3uqq2Se?= =?us-ascii?q?lpIZVFhf6quK8ckdl3Ny7DXtNaMD/ULL93ODpRE+rOqUM0bR8Eqbg1R5w1aYKA?= =?us-ascii?q?IUwdLEeA0iTyzQ3Y3U3zbdys276DIDwK/XVf07LFzT9MqhG2ufmDmcLjSrHZY4?= =?us-ascii?q?/yXPPJLiolUiuVRS8zEUa041ukveQLvOaAK2cFvl8Uej6SCBIUpq13r9jQC2jT?= =?us-ascii?q?mfd5fJ0Ln/CXQCbwRzd9lKUsByZHr0eMQ+AMFQPOdX/unHJcuBC+Jv9L5X/ldL?= =?us-ascii?q?OYxq9JVOEXAYZBaeOZTMXCefBfJjYokTMZNPy6f9LCs7Zqmm7PGGAZCajT63WF?= =?us-ascii?q?S1ONB+ebw3TsR4pR95A9py4A4tvNmmpyFKPSMvCUoDvqupW0lw6EqObeUS8reE?= =?us-ascii?q?Vzj+UcRCGM2BBaKXosE9gPuVr1RqeLagBLzn1twe5q1hMCfx5/emdj3n1fgLC2?= =?us-ascii?q?HcgdAUUZhWXoQPAIcEFfDTUs8EvM6Qr3JZQAsMSVXWhF+70XVY0WL9En7YDWPO?= =?us-ascii?q?0bx/N68ihhpXkWuiPVLU5HgQ+D6OKEEKt6x7BG50E98vVyV0eIU3XUdW2Rmdnu?= =?us-ascii?q?MN5G2So7+SOs7MHTpO04ceICqg=3D=3D?= X-IPAS-Result: =?us-ascii?q?A2HfAQDq6h5Z/wHyM5BcGgEBAQECAQEBAQgBAQEBFQEBAQE?= =?us-ascii?q?CAQEBAQgBAQEBgyqBbo55kH2XfiiLfFcBAQEBAQEBAQIBAmgogjMkgkIGAQIkU?= =?us-ascii?q?gMDCQEBFwgpCAMBUwcSBYofBLFbOiYCiyiIPY1wAQSQKIEBjGyTHosZhlOURli?= =?us-ascii?q?BCk8hFYU9HIFmc4kcAQEB?= Received: from unknown (HELO tarius.tycho.ncsc.mil) ([144.51.242.1]) by emsm-gh1-uea10.nsa.gov with ESMTP; 19 May 2017 12:57:31 +0000 Received: from prometheus.infosec.tycho.ncsc.mil (prometheus [192.168.25.40]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id v4JCvTLw009852; Fri, 19 May 2017 08:57:30 -0400 Received: from tarius.tycho.ncsc.mil (tarius.infosec.tycho.ncsc.mil [144.51.242.1]) by prometheus.infosec.tycho.ncsc.mil (8.15.2/8.15.2) with ESMTP id v4JCuI7f092355 for ; Fri, 19 May 2017 08:56:18 -0400 Received: from goalie.tycho.ncsc.mil (goalie [144.51.242.250]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id v4JCu7AS009462 for ; Fri, 19 May 2017 08:56:18 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A1B7AgCi6h5Z/4GlL8FcGwEBAQMBAQEJAQEBhUOOeZB9mAUchggChk4BAgEBAQEBAmsohRkGJ1IQGAgxVwcSiiixWzqLHgEBCCiIPY1wBZAogQGMbJMekWyURleBCk8hFYU9HIFmPTaJHAEBAQ X-IPAS-Result: A1B7AgCi6h5Z/4GlL8FcGwEBAQMBAQEJAQEBhUOOeZB9mAUchggChk4BAgEBAQEBAmsohRkGJ1IQGAgxVwcSiiixWzqLHgEBCCiIPY1wBZAogQGMbJMekWyURleBCk8hFYU9HIFmPTaJHAEBAQ X-IronPort-AV: E=Sophos;i="5.38,364,1491278400"; d="scan'208";a="6059147" Received: from emsm-gh1-uea11.corp.nsa.gov (HELO emsm-gh1-uea11.nsa.gov) ([10.208.41.37]) by goalie.tycho.ncsc.mil with ESMTP; 19 May 2017 08:56:18 -0400 IronPort-PHdr: =?us-ascii?q?9a23=3AbGG0VB+kaBW70/9uRHKM819IXTAuvvDOBiVQ1KB3?= =?us-ascii?q?2uIcTK2v8tzYMVDF4r011RmSDNqdsasP1rqempujcFRI2YyGvnEGfc4EfD4+ou?= =?us-ascii?q?JSoTYdBtWYA1bwNv/gYn9yNs1DUFh44yPzahANS47xaFLIv3K98yMZFAnhOgpp?= =?us-ascii?q?POT1HZPZg9iq2+yo9ZDeZwdFiCCjbb9vIxm7rQbcvdQKjIV/Lao81gHHqWZSde?= =?us-ascii?q?RMwmNoK1OTnxLi6cq14ZVu7Sdete8/+sBZSan1cLg2QrJeDDQ9LmA6/9brugXZ?= =?us-ascii?q?TQuO/XQTTGMbmQdVDgff7RH6WpDxsjbmtud4xSKXM9H6QawyVD+/9KpgVgPmhz?= =?us-ascii?q?kbOD446GHXi9J/jKRHoBK6uhdzx5fYbJyJOPZie6/Qe84RS2hcUcZLTyFPAp2y?= =?us-ascii?q?YZYBAeQCOuhXrYf9qkASoReiHwSgGPnixiNUinLwwKY00/4hEQbD3AE4EdwBqn?= =?us-ascii?q?LUp8jxOqcPS+C1w7fHzTPYb/hL3jry9ZLHchYgof6SWbJwc9HcyUwxGAPBilWf?= =?us-ascii?q?s4rlPzSa1+gXr2eb6O9gWPuphmU6pQ9xpT2vyd0tionPno8Vy0vL+jt/wIkoPd?= =?us-ascii?q?24T1R7YcK+HJRNqS6aKY17Sd4hTWFwoCs217kLtJChcCUFypkr3QPTZv2HfoSS?= =?us-ascii?q?/x7vSuKcLDFlj3x/Yr2/nQy98U24x+38SMa01FFKozJAktbSsnAN0wbc6s6ASv?= =?us-ascii?q?py5EuuxTGP2xrS6uFAOUw0lKzbJIA9wrMoi5YetUrOEjX5lUj0lqOaa0Qp9+iy?= =?us-ascii?q?5+j6fLnrooeQN4puhQH/NqQulNa/AeM9MgUWQmeU4+K81Lz98k39QrVHlfg2nb?= =?us-ascii?q?fdsJDeP8sboKm5AgBP3ok/7Ba/Ci+q0M4EknkfMFJFZBWHgpDyO17QJPD4DPG/?= =?us-ascii?q?g0mjkTpw2/DHPqHuApXKLnTZlrfhZqxy51RTyAo009AMr65TX7oBOvPoRWfqs8?= =?us-ascii?q?HDSwQ+N0qz2emjQM10y4c2QWuSBuqcN6TIvBmD4edra/KAf6cJqT39LL4j/Peo?= =?us-ascii?q?gngn3RcQZaCz3IA/cHmiH+9+J0ySbDzrmNhFWWsOswYwS/bmoEePXT5aezC5WK?= =?us-ascii?q?d4rio2AYTgDYrNWpGFgbqd0SP9FZpTIihGA1TKC3DzeoOfR/AHawqdJ8ZglnoP?= =?us-ascii?q?Ur3yZZUm0ESCvQmy6ad9IefS4WVMuZvl1dVx5cXWmBU2/DpzH4KW1GTbHDI8pX?= =?us-ascii?q?8BWzJjhPM3mkd60FrWlPEg2/E=3D?= X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0H0AQAi6x5Z/4GlL8FcGwEBAQMBAQEJA?= =?us-ascii?q?QEBFgEBAQMBAQEJAQEBhRiOeZB9mAUchggChk4BAQEBAQEBAQIBAmgogjMkAYJ?= =?us-ascii?q?BBidSEBgIMVcHEooosVw6ix4BAQgoiD2NcAWQKIEBjGyTHpFslEZYgQpPIRWFP?= =?us-ascii?q?RyBZj02iRwBAQE?= X-IPAS-Result: =?us-ascii?q?A0H0AQAi6x5Z/4GlL8FcGwEBAQMBAQEJAQEBFgEBAQMBAQE?= =?us-ascii?q?JAQEBhRiOeZB9mAUchggChk4BAQEBAQEBAQIBAmgogjMkAYJBBidSEBgIMVcHE?= =?us-ascii?q?ooosVw6ix4BAQgoiD2NcAWQKIEBjGyTHpFslEZYgQpPIRWFPRyBZj02iRwBAQE?= X-IronPort-AV: E=Sophos;i="5.38,364,1491264000"; d="scan'208";a="5934268" X-IronPort-Outbreak-Status: No, level 0, Unknown - Unknown Received: from mail-il-dmz.mellanox.com (HELO mellanox.co.il) ([193.47.165.129]) by emsm-gh1-uea11.nsa.gov with ESMTP; 19 May 2017 12:56:16 +0000 Received: from Internal Mail-Server by MTLPINE1 (envelope-from danielj@mellanox.com) with ESMTPS (AES256-SHA encrypted); 19 May 2017 15:49:33 +0300 Received: from x-vnc01.mtx.labs.mlnx. (x-vnc01.mtx.labs.mlnx [10.12.150.16]) by labmailer.mlnx (8.13.8/8.13.8) with ESMTP id v4JCn8HW027204; Fri, 19 May 2017 15:49:31 +0300 From: Dan Jurgens To: chrisw@sous-sol.org, paul@paul-moore.com, sds@tycho.nsa.gov, eparis@parisplace.org, dledford@redhat.com, sean.hefty@intel.com, hal.rosenstock@gmail.com Subject: [PATCH v7 8/9] selinux: Add IB Port SMP access vector Date: Fri, 19 May 2017 15:48:58 +0300 Message-Id: <1495198139-69993-9-git-send-email-danielj@mellanox.com> X-Mailer: git-send-email 1.7.1 In-Reply-To: <1495198139-69993-1-git-send-email-danielj@mellanox.com> References: <1495198139-69993-1-git-send-email-danielj@mellanox.com> X-Mailman-Approved-At: Fri, 19 May 2017 08:56:30 -0400 X-BeenThere: selinux@tycho.nsa.gov X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Security-Enhanced Linux \(SELinux\) mailing list" List-Post: List-Help: Cc: linux-rdma@vger.kernel.org, linux-security-module@vger.kernel.org, selinux@tycho.nsa.gov Errors-To: selinux-bounces@tycho.nsa.gov Sender: "Selinux" X-Virus-Scanned: ClamAV using ClamSMTP From: Daniel Jurgens Add a type for Infiniband ports and an access vector for subnet management packets. Implement the ib_port_smp hook to check that the caller has permission to send and receive SMPs on the end port specified by the device name and port. Add interface to query the SID for a IB port, which walks the IB_PORT ocontexts to find an entry for the given name and port. Signed-off-by: Daniel Jurgens Reviewed-by: James Morris --- v2: - Shorted ib_end_port. Paul Moore - Pass void blobs to security hooks. Paul Moore - Log specific IB port info in audit log. Paul Moore - Don't create a new intial sid, use unlabeled. Stephen Smalley - Changed "smp" to "manage_subnet". Paul Moore v3: - ib_port -> ib_endport. Paul Moore - Don't log device name as untrusted string. Paul Moore - Reorder parameters of LSM hook. Paul Moore v6: - Remove brakets around single statement else. James Morris v7: - Synch ocontext names with userspace. Also change lsm_audit_data names to the same style. Stephen Smalley include/linux/lsm_audit.h | 8 ++++++++ security/lsm_audit.c | 5 +++++ security/selinux/hooks.c | 25 ++++++++++++++++++++++ security/selinux/include/classmap.h | 2 ++ security/selinux/include/security.h | 2 ++ security/selinux/ss/services.c | 41 +++++++++++++++++++++++++++++++++++++ 6 files changed, 83 insertions(+) diff --git a/include/linux/lsm_audit.h b/include/linux/lsm_audit.h index 0df5639..22b5d4e 100644 --- a/include/linux/lsm_audit.h +++ b/include/linux/lsm_audit.h @@ -21,6 +21,7 @@ #include #include #include +#include struct lsm_network_audit { int netif; @@ -50,6 +51,11 @@ struct lsm_ibpkey_audit { u16 pkey; }; +struct lsm_ibendport_audit { + char dev_name[IB_DEVICE_NAME_MAX]; + u8 port; +}; + /* Auxiliary data to use in generating the audit record. */ struct common_audit_data { char type; @@ -66,6 +72,7 @@ struct common_audit_data { #define LSM_AUDIT_DATA_IOCTL_OP 11 #define LSM_AUDIT_DATA_FILE 12 #define LSM_AUDIT_DATA_IBPKEY 13 +#define LSM_AUDIT_DATA_IBENDPORT 14 union { struct path path; struct dentry *dentry; @@ -84,6 +91,7 @@ struct common_audit_data { struct lsm_ioctlop_audit *op; struct file *file; struct lsm_ibpkey_audit *ibpkey; + struct lsm_ibendport_audit *ibendport; } u; /* this union contains LSM specific data */ union { diff --git a/security/lsm_audit.c b/security/lsm_audit.c index c22c99f..28d4c3a 100644 --- a/security/lsm_audit.c +++ b/security/lsm_audit.c @@ -421,6 +421,11 @@ static void dump_common_audit_data(struct audit_buffer *ab, a->u.ibpkey->pkey, &sbn_pfx); break; } + case LSM_AUDIT_DATA_IBENDPORT: + audit_log_format(ab, " device=%s port_num=%u", + a->u.ibendport->dev_name, + a->u.ibendport->port); + break; } /* switch (a->type) */ } diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index b8add3a..da5fffe 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c @@ -6181,6 +6181,29 @@ static int selinux_ib_pkey_access(void *ib_sec, u64 subnet_prefix, u16 pkey_val) INFINIBAND_PKEY__ACCESS, &ad); } +static int selinux_ib_endport_manage_subnet(void *ib_sec, const char *dev_name, + u8 port_num) +{ + struct common_audit_data ad; + int err; + u32 sid = 0; + struct ib_security_struct *sec = ib_sec; + struct lsm_ibendport_audit ibendport; + + err = security_ib_endport_sid(dev_name, port_num, &sid); + + if (err) + return err; + + ad.type = LSM_AUDIT_DATA_IBENDPORT; + strncpy(ibendport.dev_name, dev_name, sizeof(ibendport.dev_name)); + ibendport.port = port_num; + ad.u.ibendport = &ibendport; + return avc_has_perm(sec->sid, sid, + SECCLASS_INFINIBAND_ENDPORT, + INFINIBAND_ENDPORT__MANAGE_SUBNET, &ad); +} + static int selinux_ib_alloc_security(void **ib_sec) { struct ib_security_struct *sec; @@ -6386,6 +6409,8 @@ static struct security_hook_list selinux_hooks[] __lsm_ro_after_init = { LSM_HOOK_INIT(tun_dev_open, selinux_tun_dev_open), #ifdef CONFIG_SECURITY_INFINIBAND LSM_HOOK_INIT(ib_pkey_access, selinux_ib_pkey_access), + LSM_HOOK_INIT(ib_endport_manage_subnet, + selinux_ib_endport_manage_subnet), LSM_HOOK_INIT(ib_alloc_security, selinux_ib_alloc_security), LSM_HOOK_INIT(ib_free_security, selinux_ib_free_security), #endif diff --git a/security/selinux/include/classmap.h b/security/selinux/include/classmap.h index 0fec1c5..b9fe343 100644 --- a/security/selinux/include/classmap.h +++ b/security/selinux/include/classmap.h @@ -233,6 +233,8 @@ struct security_class_mapping secclass_map[] = { { COMMON_SOCK_PERMS, NULL } }, { "infiniband_pkey", { "access", NULL } }, + { "infiniband_endport", + { "manage_subnet", NULL } }, { NULL } }; diff --git a/security/selinux/include/security.h b/security/selinux/include/security.h index b04b438..622470c 100644 --- a/security/selinux/include/security.h +++ b/security/selinux/include/security.h @@ -181,6 +181,8 @@ int security_port_sid(u8 protocol, u16 port, u32 *out_sid); int security_ib_pkey_sid(u64 subnet_prefix, u16 pkey_num, u32 *out_sid); +int security_ib_endport_sid(const char *dev_name, u8 port_num, u32 *out_sid); + int security_netif_sid(char *name, u32 *if_sid); int security_node_sid(u16 domain, void *addr, u32 addrlen, diff --git a/security/selinux/ss/services.c b/security/selinux/ss/services.c index 7c86b86..dbaa3d0 100644 --- a/security/selinux/ss/services.c +++ b/security/selinux/ss/services.c @@ -2250,6 +2250,47 @@ int security_ib_pkey_sid(u64 subnet_prefix, u16 pkey_num, u32 *out_sid) } /** + * security_ib_endport_sid - Obtain the SID for a subnet management interface. + * @dev_name: device name + * @port: port number + * @out_sid: security identifier + */ +int security_ib_endport_sid(const char *dev_name, u8 port_num, u32 *out_sid) +{ + struct ocontext *c; + int rc = 0; + + read_lock(&policy_rwlock); + + c = policydb.ocontexts[OCON_IBENDPORT]; + while (c) { + if (c->u.ibendport.port == port_num && + !strncmp(c->u.ibendport.dev_name, + dev_name, + IB_DEVICE_NAME_MAX)) + break; + + c = c->next; + } + + if (c) { + if (!c->sid[0]) { + rc = sidtab_context_to_sid(&sidtab, + &c->context[0], + &c->sid[0]); + if (rc) + goto out; + } + *out_sid = c->sid[0]; + } else + *out_sid = SECINITSID_UNLABELED; + +out: + read_unlock(&policy_rwlock); + return rc; +} + +/** * security_netif_sid - Obtain the SID for a network interface. * @name: interface name * @if_sid: interface SID