From patchwork Sun Feb 5 15:58:19 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Nicolas Iooss X-Patchwork-Id: 9556135 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id EF52F602B1 for ; Sun, 5 Feb 2017 16:01:28 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id E046C1FE95 for ; Sun, 5 Feb 2017 16:01:28 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id D38AB26785; Sun, 5 Feb 2017 16:01:28 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.2 required=2.0 tests=BAYES_00, RCVD_IN_DNSWL_MED autolearn=ham version=3.3.1 Received: from emsm-gh1-uea11.nsa.gov (smtp.nsa.gov [8.44.101.9]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id 5BAF01FE95 for ; Sun, 5 Feb 2017 16:01:27 +0000 (UTC) X-IronPort-AV: E=Sophos;i="5.33,338,1477958400"; d="scan'208";a="2899645" IronPort-PHdr: =?us-ascii?q?9a23=3ASN+EUxEKnSEyl6L9Kgd+8p1GYnF86YWxBRYc798d?= =?us-ascii?q?s5kLTJ79pcu+bnLW6fgltlLVR4KTs6sC0LuK9f+9Ejxaqb+681k6OKRWUBEEjc?= =?us-ascii?q?hE1ycBO+WiTXPBEfjxciYhF95DXlI2t1uyMExSBdqsLwaK+i764jEdAAjwOhRo?= =?us-ascii?q?LerpBIHSk9631+ev8JHPfglEnjSwbLd9IRmsrwjctsYajIh8Jq0s1hbHv3xEdv?= =?us-ascii?q?hMy2h1P1yThRH85smx/J5n7Stdvu8q+tBDX6vnYak2VKRUAzs6PW874s3rrgTD?= =?us-ascii?q?QhCU5nQASGUWkwFHDBbD4RrnQ5r+qCr6tu562CmHIc37SK0/VDq+46t3ThLjlS?= =?us-ascii?q?kINyQ98GrKlMJ+iqxVqw+lqxBm3oLYfISZOfxjda3fYNwaX3JMUMZPWSJcDI2y?= =?us-ascii?q?bIwBAOgPPeZArYTxulUDohSiCgejGuzv0SRFhmP00KAgz+gsCx3K0BImEtkTsH?= =?us-ascii?q?rUttL1NKIKXO6tzanH0TLDb/dM1jfm9YPGcRchofaXXbJrbMHczk8vFwLZgVWX?= =?us-ascii?q?rYzqJSiV2v4Ms2ic6OpgTvmvhnUiqwx+rTmj3MAsipPGho8MzF3P6CZ3wJ4tKN?= =?us-ascii?q?GlR0N2bsSoHZtNuy2AKYd7Td0uT3t1tCoiyLALu4S3cDUExZkp3RLTdeCLfomS?= =?us-ascii?q?7h/tSuqcJypzimh/d7KlnRmy9FCtyuj7VsapzllHtjFFktzQtnAV0BzT99SHRu?= =?us-ascii?q?N9/ki/3TaP0Bje6v1eLkAulKrbNoUhzqQslpsTrUvDHij2lF/wjKCKbUUr5vKk?= =?us-ascii?q?6+HmYrXivpOcNol0hR/iMqk2h8CyDus1PhIOUmSG4+iwyrLu8VPjTLlXlvE2l7?= =?us-ascii?q?PWsJHeJcQVvK65BApV35446xmhCzem0dIYnWQILV5cYx2HiJXpO1fSL//mFvey?= =?us-ascii?q?mEiskTd3yPDGOb3tGJPNLmPZn7v7crZ97FBcxBIpzd9D/5JUFq0BIPXrV0/zs9?= =?us-ascii?q?zYCAU2MxC0w+n9DtVwzYEeWWWJAq+cKqzSqkOI6fw1I+mXfoMVvyz9K/c97f70?= =?us-ascii?q?kXA5gUMdfbWu3ZYPanC4HO5pLFmaYXr3hdcBF2YKvhQlQezkjF2CTDFSaG2vX6?= =?us-ascii?q?I6+jE7FZiqDYDZRoCimLaBxju0HoVKZmBaDVCBCW/oeJufVPgSbiKSI9Nhkjsf?= =?us-ascii?q?WLigVYAuyw+huBX9y7p9Iere4jcYuo771Nhp++3Tkgk/+iFzD8Sb1WGCUn97nm?= =?us-ascii?q?cJRzItxq9wv1Z9ylCZ3ah/mfxYGsRZ5+lVXQciKZ7c0+t6BsjvVQLdZNiJUk2r?= =?us-ascii?q?TcmhATE0Ut0+2cQOY1pnF9WkkB/DwzKgA6UJmLyTGJw07qXc0mDwJ8Z713bJyq?= =?us-ascii?q?0hgEcjQsRRKW2mnK5++hPUB47RjUqZkaOqer4d3C7J72iDymWPsFtfUA5qXqXP?= =?us-ascii?q?RWofaVfOrdTl+kPCSKejCLQmMwtGz86PMa5KatnwgVVHQvfvItLebHirm2ezBB?= =?us-ascii?q?aI2K2DYJDse2oDwCXXEFIEnBwL/XaaKQg+AT+srHzGDDN0D1LvYljs/PJmqHyh?= =?us-ascii?q?VE80zhqKb1Vl17Wv5hEam+aQS/QJ3rILoC0hsSl7HE6h39LKDNqNvwRgfKRYYd?= =?us-ascii?q?M4/lhHz3nUtwJjMZO9KKBinEQRcxxtv0Pp1RV4FJlPkdQwoHMt1gpyJrqS0Eld?= =?us-ascii?q?eDOAwZDwJrrXJ3H8/BC1caHW3E3R0NeN+qoU7fQ4s1TjsBiyFkss6HVryd5V02?= =?us-ascii?q?GT5p/SFgodTYrxUlor9xh9v7zaYTMy54DT1X1xKqS0sSXN29EuBOs40BqgeM1f?= =?us-ascii?q?MKycHg/oD8IaH9SuKPAtm1WxdB0LIfpS9K8qMMO8bPaJwrKkPON6kDKhl2RH75?= =?us-ascii?q?h30liQ+CpkVu7Iw5EFzumE0QSdUzfzkkyhstz3mIBDfjwSBXawySn6C45Xeq1y?= =?us-ascii?q?fJwEBX2oI8Kp2tV0n4TtVGJA9F6/G1MG39ekeRqMYFz52Q1Q0l8aoXi6mSukyD?= =?us-ascii?q?x0lismorCY3CzUzOTobAAHNXJTRGl+kVfsJpC5j8sUXEiyaAgpjwel6F3hx6hd?= =?us-ascii?q?o6R+IWzTTl1OfyTsKWFtTLewvKKYY8FT8JMorTlXUOOkbFGUULH9pwca3D35H2?= =?us-ascii?q?tF3z07aS+luo/ikBxnjWKRNnFzrGDWecto3xfQ+MTcReJN3joBXCR4lSTYCUW9?= =?us-ascii?q?P9az+dWZjIvMsue7V229TJJTajXrwZmGtCSl+W1gGQe/kOyrmt37DQg61jf219?= =?us-ascii?q?9rVSXMqBbzfJLr2r+gPu15ZEloA0Xw681gGoFxioEwno0f2WAGhpWJ+noKiXnz?= =?us-ascii?q?MdRH1qLia3oNXyQHzMLV4Aji3k1jIWmEx4b4VnWb2MRhfd66bnkR2iIn4MBAEL?= =?us-ascii?q?2U46BcnStpvlq4qhrcYfx8njcG1fsi8WUajP8NuAosyCWdH78TEFJDPSz0lhSI?= =?us-ascii?q?6dG+o7lMZGq1d7i/ylZ+l8i7DL6eugFcRGr5epA6EC9q6cV/NFbM32Pp6o74f9?= =?us-ascii?q?nRY8ketgaJkxjclOhZMpUxluAFhSB/I2LyoWUly/InjRxpxZy6pJKIK3hp/K6j?= =?us-ascii?q?GBFULCb6Z8QX+jHxiqZemN2b34WzEpVnHTUEQIHkTfS2HzIOrf7nLRqBECUgqn?= =?us-ascii?q?eHHrrSBQyf51lgr3LUCJ2rNG+YJH8CzdVkWhadOFZTgAcOXDU1hpQ5DBylxNT9?= =?us-ascii?q?cEdl4TAc/kb4pQFRyuJsKRb/Sn3QpAG0ajgqUpiSNwdW7hpc6EfPKsyS9PlzHy?= =?us-ascii?q?ZF/p27sAOCNGKbZwNSDWEGREOIHVbjMaey5dPY6eiXGvK+L+fSYbWJseFeSfGI?= =?us-ascii?q?yo+034t4+TaDK8WPMmNkD/IlxkpJRWp5FNjBmzUTVywXkDrAb9aBqxeh/i16td?= =?us-ascii?q?yw8PX3WAPv/IePBaFdMdN19xCxm6eDOPaahDxlJjZAypMM2XjIxaAc3F8SjyFh?= =?us-ascii?q?aSKgEbEHtS7DQqLfhLNXDwIbayN0MctH8bgw3g9TNs7Hktn1zKJ3juYpC1dZUl?= =?us-ascii?q?zsgs+patYMI2GhM1PHAV2GNLqYKjLWxMH3e7mzSaVKjOVTtR2/pyqUE1P5MjSE?= =?us-ascii?q?jTnpWAilMftQgyGDIBxepIa9fw5wBmjlVt3rcQC0MNltgjEsxr00nHzKP3YGMT?= =?us-ascii?q?dga0NNsqGQ7SRAj/VlBmNO82FoLeaBmyeW9eXYLIgZsedzCCRui+1a+Gg6y6dS?= =?us-ascii?q?7CxcXvx5giXTosRro168lumPzTpmXQFUpTlXgYKHp0JiOb/W9pNYQ3bL4AoN7X?= =?us-ascii?q?mMCxQNv9ZlBMfvtL5NxdjUjq3zLitC89XP/cYHHcfbNMeHPGAmMRrzFz7eFBEF?= =?us-ascii?q?QiKzNWHDm0xdl+mf9nuPrpcgspjsgIEDSrFaVFwvDfMaFkplHN0EIJhtWDMrjb?= =?us-ascii?q?+bg9QM5XakqxnRXspatIjdVv2OGfXvNCqZjb5cahQV2rP3M54cNoLh20N4dFl3?= =?us-ascii?q?h5/KFFDTXdBQuC1udBU4oEFQ8Hh4VGIzwVvpah+q4H8QFf+0mQQ6ig1gbuQx7D?= =?us-ascii?q?3s+Us4JkLWpCssl0k8gc7qgTGecD72Kqe9RpxZBDTvuEgwKJz7RRx5bQqonUxr?= =?us-ascii?q?LD3EXa5ej6N8dWB3jw/RoYFAGfFGQq1afhAd3vaXZ+023lRaryWo305H5e/eBp?= =?us-ascii?q?tlmwoma5msr2hP2wh7dt46ObTQJLZVzlhXnq+Ooiio1uUrzA8EIEYM8X2deCgT?= =?us-ascii?q?t0wSMbkpOSmo8/dw5gyFnjtMZHIDV+E2ov5w8EMyJfiAxTr607FfMkCxK/CfL6?= =?us-ascii?q?SBtmjGi8GHWFcw21gLl0lC5rh2zd0sc0yPV0AszbudDRIJOtTeKQtNdcpd6GDT?= =?us-ascii?q?fTqSseXK2Z91JZuyFvv2QuCUrqYbnkKkER0yEIQN9MQOA56s0E/ALcf9MrEEyQ?= =?us-ascii?q?8h5AL1K1WZFP5JYg6EkC8bo8Gjy596xZRSKSsDAWV8LCq3/a3aqRUwgPqZW9c3?= =?us-ascii?q?bGwaUZUYOXIrQs26mjJZvnRaADmxzO0Z1BCI7yXgqSTIEDn8c91jae+QZRNrEt?= =?us-ascii?q?G55zM/8qmxiVPM/ZXeIXz6Oc5lut/V5uMQv4yHBO9MTblhr0fcnJFVR2e0XG7L?= =?us-ascii?q?EN61IYXwaoY3YNPoDXa6V0CwhCguT8ftJtqtKLaHgR3wT4ZOrIabxCwjNdO6Fj?= =?us-ascii?q?wGBhh/u+QD5KV6ZQ0ffpY2egDouBokN6y+IQaY1dOuT3yrKTRIU/lV1f+6aKBP?= =?us-ascii?q?zyowcu+6z2MtTpIgz+i360ENQo0KjhHFyPasYIleSTT8FmZbewrRuSozj3JhOf?= =?us-ascii?q?oqwucj3BPItkERMyyKdOxsb2xEo9E8BFOJLHprC2o5R0WTgpHZ7g6qwb8S4zNX?= =?us-ascii?q?n8xI3u1drHj+opjfbSqjWKyxs5rVtTYgYMMno612P43jJNeGtJPAkTzeSpnQrh?= =?us-ascii?q?OKUDSgG/pchNdQPDpSQONUlmE9JcwGpY1B5FIrWcc6JrxAFLcjqaivaTtkCy4S?= =?us-ascii?q?yikZWJmb0TMZg+ezwb3amg6ecJQ/KhAEtotNgscFWS5sfiwevLOjV5nRl2KcUW?= =?us-ascii?q?cEPgET4B9W6w0diI9/YPrl4JHSQ59Wyz9aufV0UjHEFpNw7Vv0VnmWgUTkSPWm?= =?us-ascii?q?i+GpxwRSzPPw3dkbXx5/DVNdyf5PmEU1Mr96N64es5XWvT+PcEP1oHjiyPC6JF?= =?us-ascii?q?VLz83baUH4BpLftWXgSi0c5WEURYhXxX7DF5QdiRZ2Zb03q1VLJICmfkf+6CI+?= =?us-ascii?q?x4R1Aba3ScCry0wirXYcSCegC8BBBP1+sFLLRD1lZIimqI//NJVIRW9f44aQq0?= =?us-ascii?q?tDkEp3LS62155cK8BL4j4DWDhPoDqdvNuuSM1Nw8B2FZoMLs15u3jjBKNOIIKR?= =?us-ascii?q?rGEuurzz1n/Z/CgxsVmgyDqvG6+4TudZ/2wEFQUqPGmeq1cgAPUy/WvI9VDNqF?= =?us-ascii?q?909f9BBreTlUVxvCp9HpdWCzZR0nClK058TGNIsuVdLKTVfddRQ/w1ZR+oIBwx?= =?us-ascii?q?C+Ip31aO/UFvhnf5YipytgRA9yDaRQk0WjEfgq3xlj0GtsGnJTgaRopSYjU7ci?= =?us-ascii?q?fFLRiXmSNMsRZeakFqWowZDc1f97Edw4RU4tLISVywJiEdQBxiKgU43OJDlU5E?= =?us-ascii?q?tUWVYjzdARatdfnUqBF3e9merNKxJvTj4AhHkp/nsPw/96gbR32pgxetTsrar4?= =?us-ascii?q?DhrdCFq1WBdL/gM+KiZX/OUiLMgQq3hbc+AJnA5zLTPxZDK5lm1XokZoDsCWzM?= =?us-ascii?q?PRtYPK8UOlRUVbtkZtVcvuBVedJrdLwP+aBzGhKNXgnvF5C3rPlaMlbTQizTID?= =?us-ascii?q?6P8uOjvY7e76HRROb7a8OQwHbHRr54MY1h6TnnAbvq15FR+lbu0Pd36kx6UUTG?= =?us-ascii?q?MzyGrNn5PAME+tStdkv4sZ01Bj7WBJBwkGTzyU1ea8UXRDCl/4oCxJNf9nnwVf?= =?us-ascii?q?py0lLvv+1K67lk9Y437qhxycevOafdM+lVsVN8DxiPAQVq648tD3RhSGBXfu8R?= =?us-ascii?q?Mu3efaADgcDpseD3GLQd6AeJ9OxBddvHO0bBl9GjCjGGVxNLghoOpCUHLguYy/?= =?us-ascii?q?6FgbV7Sdikpej+3kIi/US+IgQBzLB36oeO4rCIq/PPbxvN0bgEXbDnRsbpobQo?= =?us-ascii?q?v0Od++EklKIUdWNveACnFvYSVtIGxmj8168q1TwjH9nFH73+5P5JT2g5kS74m5?= =?us-ascii?q?BhA1UWHesZHbiR8oREmWc4gOjZOccIcq1Zn2aPCBqkEqMDyXG36iuYOm9lggrU?= =?us-ascii?q?3xH3W2Oz40f8rTVkTivU09fjjk1VW6G1BUhIWSqpN1V4sDSSMwX2r9f3pb467E?= =?us-ascii?q?ctMmzjrt6NknWuOK9PFc3lONOcOTU0pE4QjJApSdyvxIEbGd65INgP9XFzdebR?= =?us-ascii?q?5H2wnC9AuahHgZDS4saP+vXYBXOglbGVq62RxDBEzXg1pVc/6tS7O/HP4d2KRu?= =?us-ascii?q?6k12cXTydxoQvORQW1qqDBr1AJJUOLzFrLmJYUMd1D2nk4zE7m7vA5QN0v7AVe?= =?us-ascii?q?CprAZ/QaqDD2Pzv0x0qfY90pWSSF1jtXH0j6EV9mF6gg1mPwu9jJlXTL+1EyQI?= =?us-ascii?q?l/aVDnjwRtD4okMUIt9EQXwi0bHAgJchCbCbGlCF/rLYQaSEcDbg6H06Kieqct?= =?us-ascii?q?2k1zwK2g6/PPbeBmAKoNLPldhBaUnFdHApIWrbEeQLVkdl9G7qHXuBLtC4f5UP?= =?us-ascii?q?j9jncwLue6Qt5A/sAWqXQi+RyzRxy+5pdf97wbkoyHdrZYYZjQu8Bx90Vn5T8K?= =?us-ascii?q?diFWhRhwkRO4Xv4GpODi5Njbv4Ck6uCwW6YxX+8X7QQ7B3xij5vsh1AuudDX1u?= =?us-ascii?q?ZGRYLPlYvy6xtNLGCWuInEzxZwM+0OK5ikfLx47XUIOzAeJ24SPdqRc/Qz+C5t?= =?us-ascii?q?MC7d5lNYAMMMZM8YPNLXlgBJjk3kQ61c9s3GFVCGEYhzatoo723tyD8v65c8Vf?= =?us-ascii?q?zg6DCuL5DF815NJ+9DjDlrlN/avOga2+bSBzQX4XiXbBh12CCCx4CWC/nu+eWM?= =?us-ascii?q?ydfUV04JHyMtS4dSPiaC9hCnRuu7k5XpSACU5tXwgJ0gbkKQQGK+nKAfvqZLC+?= =?us-ascii?q?5AhT3x3iJCGYDtm/KVr92s5XNLtl1dDolz6QfKGKNBMZhgJBv4l8arRklgBiTl?= =?us-ascii?q?Y8HbbAAuuPeMyucK/ep+K1P0ZZUHLRIc17L69X1VQxNhSLHspFaWQ/4RZNt9Rf?= =?us-ascii?q?PAr3BV9ZxvK68VM1iAv5zmtDFIp04qAAUxcr8/siRadlXSnA1SQ6v0t6APig0A?= =?us-ascii?q?Ud5+vk9AHnmwN3w65zrGU6RVkaaQBecR8jqNVKwPU19nPjl4QxyrxJVkY6Gpku?= =?us-ascii?q?xfsmNagiN9p+An0zpnRBSgvi3so7gC2Sk69LG5szUBvmdFTv6FnifNBlhCw+4G?= =?us-ascii?q?jaAGC3bt8Va8emUMbJPu4Ll7IsTt7YYh7GgkYRU4ZiEIQOuuBSfxj6OOH4yOv8?= =?us-ascii?q?lRhBGIuMrUa7+8MzIeNrMnyRLsX3J9yBTRnA508GsXRTWt9N0kJIK9OcYj3Can?= =?us-ascii?q?BWjbdFIR4qxUscrxtFgLTPA1aVNg22hjzMmHRjMXS8zLBmk1jxIoaWNaf5Jf8R?= =?us-ascii?q?UaDbUngi6Uvqla+QEZeDbUEpq/9YnWhsrI3WQ9QsprxmLRva2JnJQq0Gdqm9ls?= =?us-ascii?q?9C6BpGwSd/DEU89rGnXz1JlQyeLwZ/Wpqe0GRpFpyLK/X/8eKMWj/3W52IlyUE?= =?us-ascii?q?+/2rseB0a5MPMExrrDXCelTWqYWOqVfGiImzY0KVXy5R6uLl02dMhGtUk9PfXe?= =?us-ascii?q?hpREjQ3uTat0RjmMpV/c1GEjM+MadgIuuIegfwwKTfIRaPaHKOgrwf0+FEEMYG?= =?us-ascii?q?HTEStxEe+2vkannJJnNHV4/UX6fePt/xj6MNuTHxkJCpLarp9t9vy5WG2BPWVs?= =?us-ascii?q?zBtsM0lo7+3fDUg+tvdAc5aNmtjdn9F70e8Gd/duNi0wodwTlZhg6YmT1seFbx?= =?us-ascii?q?fRwoz0Jd7LvviSG+ffwFgyemFGTroZZhv46J4kMd4/R73eBqBZvRAbBagmXJwh?= =?us-ascii?q?KXn++7xuIAN0aA7Ra6y+gtP2qeKTeptUu3jW40o+LCjCvx0Dy+S0QhJgYpGrhn?= =?us-ascii?q?XyJZUwSSxbr91pFBRqBoxPG9kPrwC/GZ6bhLm7i8Ot+0N9o+ILv7LwCurL1Nul?= =?us-ascii?q?wYp8RJ1a5U2XPDbLGqZnmENljv69gv3YyJn+Fdviec8YVOh8WmPFbbvGEZukJz?= =?us-ascii?q?KWPsLzYVVG86Kd0L1lThWRfj72ULScuC2iKvpk/V0xypZkc+rL0Dwt87bb1cP2?= =?us-ascii?q?Z2FaoCejsHGIOIJb7FzLHuzeQwlUROGE8Gl/G60XapH49OAUMdwt2NKc+RV87C?= =?us-ascii?q?xe0MuZJKistlTM1Vx/dZLaKkvpxik4VY4FLhSjMUsjn3XZpWrFAXtGNcWkKtdi?= =?us-ascii?q?gMyTDhPz40l+gnwtZmFbFmrvX9eRNnAR29iiaw2S6AJLE9EDkvayeUEiqqKySe?= =?us-ascii?q?hoOpNCmeixqrUHkNBpJD/LRMhbOSHQMbB3MiBWDuXVq1giegQEvKQtWocpeZiO?= =?us-ascii?q?J1sKMEWaxiPxygvNylb5d8Gq1KaVICYW9WhHz73F0ThQvQW5v+iWgtH7WrDDcJ?= =?us-ascii?q?72ROLSMDYiVjyCXjs9CkGl+VOlu/ofoPqYOn0ToksKbS2OEgITvb5grdzRDm/V?= =?us-ascii?q?hO1ic4YHi+yaWiDqVS14j7A+ByhRukCQWPoDEg/WY2XmgGpGtwyoPuVM8m79b7?= =?us-ascii?q?2E2qpVXPQbAoRWffKCWdvYeO5RJzMzmzUHPOazZcbcr7ck0l7SS2sWDbXI/kWE?= =?us-ascii?q?TEGKWvyc2y7rXYINsog2vyoo/cjQnjV2E6TTJLufoSSh8oumgyaZo+HeUXMtY0?= =?us-ascii?q?MtiuIYHGaB2AVAKH0DC9wNo0HtTKuAaFpN2X8qku9uxQEDeB5yUnxv1X1Wmuyx?= =?us-ascii?q?GstHRl4IlGmuWuEJbEhrDDMs+k+H+g/yYdsGucDXXGJe86UDRpcTLPkv8onYJL?= =?us-ascii?q?UfzOwv3D14vCxp+xmaWkhQigOD7rr4ALN3xroE43Ixuf5xQBKhWTTaJ07GwY2i?= =?us-ascii?q?AtkH5CBpumusg8zVtedpPaAcpoZ+G0wiBH5mYNfH8mYSAinPxAKuskPjT3ylKz?= =?us-ascii?q?UD7WNOfHQI?= X-IPAS-Result: =?us-ascii?q?A2EDBQCnS5dY/wHyM5BdHQEFAQsBGAEFAQsBgyiBao5SqFA?= =?us-ascii?q?qiGVXAQEBAQEBAQECAQJfKIIzG4IcBgECJBMUIA4DCQEBFykICAMBLRURDgsFG?= =?us-ascii?q?ASJUgQBsGI6JgKDaIdQhkyJFREBhgEBBIkHhjaMKYF9j3+KYIYvkwxYdggfEyp?= =?us-ascii?q?EhABEHYFidIZYgi0BAQE?= Received: from unknown (HELO tarius.tycho.ncsc.mil) ([144.51.242.1]) by emsm-gh1-uea11.nsa.gov with ESMTP; 05 Feb 2017 16:01:26 +0000 Received: from prometheus.infosec.tycho.ncsc.mil (prometheus [192.168.25.40]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id v15G1OsE007033; Sun, 5 Feb 2017 11:01:25 -0500 Received: from tarius.tycho.ncsc.mil (tarius.infosec.tycho.ncsc.mil [144.51.242.1]) by prometheus.infosec.tycho.ncsc.mil (8.15.2/8.15.2) with ESMTP id v15Fwlob111739 for ; Sun, 5 Feb 2017 10:58:47 -0500 Received: from goalie.tycho.ncsc.mil (goalie [144.51.242.250]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id v15FwkV5005440 for ; Sun, 5 Feb 2017 10:58:46 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A1AxAADoSpdYmCIeaIFdHgYMhT2OUqRAjR9XAQIBAQEBAQITAQEBAQEICwsIHYUZBidiUVcZiXMEAbBiOoQQh1CGTI8oBYkHhjaMKYF9j3+RD5MMgVUfEyqEOAwBQx2BYnSJBQEBAQ X-IPAS-Result: A1AxAADoSpdYmCIeaIFdHgYMhT2OUqRAjR9XAQIBAQEBAQITAQEBAQEICwsIHYUZBidiUVcZiXMEAbBiOoQQh1CGTI8oBYkHhjaMKYF9j3+RD5MMgVUfEyqEOAwBQx2BYnSJBQEBAQ X-IronPort-AV: E=Sophos;i="5.33,338,1477972800"; d="scan'208";a="5932757" Received: from emsm-gh1-uea11.corp.nsa.gov (HELO emsm-gh1-uea11.nsa.gov) ([10.208.41.37]) by goalie.tycho.ncsc.mil with ESMTP; 05 Feb 2017 10:58:44 -0500 IronPort-PHdr: =?us-ascii?q?9a23=3Avi6clBRyBNvkuj+znqtuV87XBtpsv+yvbD5Q0YIu?= =?us-ascii?q?jvd0So/mwa69bRSN2/xhgRfzUJnB7Loc0qyN4vymBjFLsczJmUtBWaQEbwUCh8?= =?us-ascii?q?QSkl5oK+++Imq/EsTXaTcnFt9JTl5v8iLzG0FUHMHjew+a+SXqvnYdFRrlKAV6?= =?us-ascii?q?OPn+FJLMgMSrzeCy/IDYbxlViDanb75/KBq7oR/Tu8QWjodvKbg9wQbVr3VVfO?= =?us-ascii?q?hb2XlmLk+JkRbm4cew8p9j8yBOtP8k6sVNT6b0cbkmQLJBFDgpPHw768PttRnY?= =?us-ascii?q?UAuA/WAcXXkMkhpJGAfK8hf3VYrsvyTgt+p93C6aPdDqTb0xRD+v4btnRAPuhS?= =?us-ascii?q?waMTMy7WPZhdFqjK9DoByvuQFxzYDXbo+SNvV+cLjQcc8GSWdbQspcTTBNDp+6?= =?us-ascii?q?YoASD+QBJ+FYr4zlqlUWrBuxGQ6sBOf1xT9Tm3T43qo60+M6EQHdwQctGNQOsH?= =?us-ascii?q?XIo9XyMKcdS/u1wLPJzTXEaPNWwiz95ZPNch0urvCAR7VwcdDeyUQ2EQ7Ok1ae?= =?us-ascii?q?qZT9Mj+IyOgAt3KX4/d8We+gkWIqpR19riKhy8ojkoXEhIAYxkrZ+Sh3zos5P8?= =?us-ascii?q?O0RFJ6bNK+HpZcqSeXPJZsTMw4WWFnoiM6x6UGuZGleCgKz4wqxxvQavCaaYSI?= =?us-ascii?q?+hXjVOKRIDdkmn1qZLK/hxCz8Ui51+3zSNO40FFQripKitXMt3YN2ALP6sWfV/?= =?us-ascii?q?dx4EOs1SyS2wzP5exIO045mbbBJ5MvzbM8jp8Tvl7CHi/ylkX2lqiWdkA89+a1?= =?us-ascii?q?9+rpf6nqq4eHO4F0lgz+Lrwjlc+iD+kgNwgDUGea9f671L358k30WLNKjvwqna?= =?us-ascii?q?netJDVP98bqrS4Aw9S1YYj8A2/Aiy939QfgHkHKk5Kdwycj4TzPlHDL//5Ae24?= =?us-ascii?q?g1S2nzdn3+rGMaH5ApXRMnjDl6/sfa1j5E5YyQozy81f5p1PB7EdIPP8Rk/xtN?= =?us-ascii?q?vCAh8/KAy72fzrCNp61oMACiqzBfqCPafTt0KYzv4+KOmLIokOsXDyLOZ2yeTp?= =?us-ascii?q?iCofmFQaeaCylboQb2ujVqBgIk6eZXP3xNYGFnwRlg9iXKrtklLUAm0bXGq7Q6?= =?us-ascii?q?9pvmJzM4mhF4qWHo0=3D?= X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0GhAAB1SpdYmCIeaIFdHgYMGQYMhRKOU?= =?us-ascii?q?qRAjR9XAQEBAQEBAQECAQIQAQEBAQEICwsIHS+CMxmCHgYnYlFXGYlzBAGwYjq?= =?us-ascii?q?EEIdQhkyPKAWJB4Y2jCmBfY9/kQ+TDIFWHxMqhDgMAUMdgWJ0iQUBAQE?= X-IPAS-Result: =?us-ascii?q?A0GhAAB1SpdYmCIeaIFdHgYMGQYMhRKOUqRAjR9XAQEBAQE?= =?us-ascii?q?BAQECAQIQAQEBAQEICwsIHS+CMxmCHgYnYlFXGYlzBAGwYjqEEIdQhkyPKAWJB?= =?us-ascii?q?4Y2jCmBfY9/kQ+TDIFWHxMqhDgMAUMdgWJ0iQUBAQE?= X-IronPort-AV: E=Sophos;i="5.33,338,1477958400"; d="scan'208";a="2899549" X-IronPort-Outbreak-Status: No, level 0, Unknown - Unknown Received: from mx1.polytechnique.org ([129.104.30.34]) by emsm-gh1-uea11.nsa.gov with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 05 Feb 2017 15:58:44 +0000 Received: from localhost.localdomain (32.206.133.77.rev.sfr.net [77.133.206.32]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ssl.polytechnique.org (Postfix) with ESMTPSA id BC12D564781 for ; Sun, 5 Feb 2017 16:58:42 +0100 (CET) From: Nicolas Iooss To: selinux@tycho.nsa.gov Subject: [PATCH 7/8] libsepol/tests: fix -Wwrite-strings warnings Date: Sun, 5 Feb 2017 16:58:19 +0100 Message-Id: <20170205155820.29157-7-nicolas.iooss@m4x.org> X-Mailer: git-send-email 2.11.0 In-Reply-To: <20170205155820.29157-1-nicolas.iooss@m4x.org> References: <20170205155820.29157-1-nicolas.iooss@m4x.org> X-AV-Checked: ClamAV using ClamSMTP at svoboda.polytechnique.org (Sun Feb 5 16:58:42 2017 +0100 (CET)) X-Org-Mail: nicolas.iooss.2010@polytechnique.org X-BeenThere: selinux@tycho.nsa.gov X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Security-Enhanced Linux \(SELinux\) mailing list" List-Post: List-Help: MIME-Version: 1.0 Errors-To: selinux-bounces@tycho.nsa.gov Sender: "Selinux" X-Virus-Scanned: ClamAV using ClamSMTP Since fd9e5ef7b78b ("libsepol: use constant keys in hashtab functions") it is possible to call hashtab_search() with a const char* key value. Doing so fixes compiler warnings about non-const char* string literals (-Wwrite-strings flag). Signed-off-by: Nicolas Iooss --- libsepol/tests/helpers.c | 2 +- libsepol/tests/helpers.h | 2 +- libsepol/tests/test-common.c | 8 ++++---- libsepol/tests/test-common.h | 8 ++++---- libsepol/tests/test-deps.c | 4 ++-- libsepol/tests/test-expander-attr-map.c | 34 ++++++++++++++++----------------- libsepol/tests/test-expander-roles.c | 2 +- libsepol/tests/test-expander-users.c | 4 ++-- libsepol/tests/test-expander.c | 14 +++++++------- libsepol/tests/test-linker-cond-map.c | 4 ++-- libsepol/tests/test-linker-roles.c | 4 ++-- libsepol/tests/test-linker-types.c | 6 +++--- 12 files changed, 46 insertions(+), 46 deletions(-) diff --git a/libsepol/tests/helpers.c b/libsepol/tests/helpers.c index 542e46743aa0..1192734b971f 100644 --- a/libsepol/tests/helpers.c +++ b/libsepol/tests/helpers.c @@ -63,7 +63,7 @@ int test_load_policy(policydb_t * p, int policy_type, int mls, const char *test_ return 0; } -avrule_decl_t *test_find_decl_by_sym(policydb_t * p, int symtab, char *sym) +avrule_decl_t *test_find_decl_by_sym(policydb_t * p, int symtab, const char *sym) { scope_datum_t *scope = (scope_datum_t *) hashtab_search(p->scope[symtab].table, sym); diff --git a/libsepol/tests/helpers.h b/libsepol/tests/helpers.h index 418ee9541959..10d390946499 100644 --- a/libsepol/tests/helpers.h +++ b/libsepol/tests/helpers.h @@ -54,6 +54,6 @@ extern int test_load_policy(policydb_t * p, int policy_type, int mls, const char * decl success * NULL error (including more than one declaration) */ -extern avrule_decl_t *test_find_decl_by_sym(policydb_t * p, int symtab, char *sym); +extern avrule_decl_t *test_find_decl_by_sym(policydb_t * p, int symtab, const char *sym); #endif diff --git a/libsepol/tests/test-common.c b/libsepol/tests/test-common.c index dae47df3dd01..81074031844d 100644 --- a/libsepol/tests/test-common.c +++ b/libsepol/tests/test-common.c @@ -26,7 +26,7 @@ #include -void test_sym_presence(policydb_t * p, char *id, int sym_type, unsigned int scope_type, unsigned int *decls, unsigned int len) +void test_sym_presence(policydb_t * p, const char *id, int sym_type, unsigned int scope_type, unsigned int *decls, unsigned int len) { scope_datum_t *scope; int found; @@ -147,7 +147,7 @@ void test_policydb_indexes(policydb_t * p) } } -void test_alias_datum(policydb_t * p, char *id, char *primary_id, char mode, unsigned int flavor) +void test_alias_datum(policydb_t * p, const char *id, const char *primary_id, char mode, unsigned int flavor) { type_datum_t *type, *primary; unsigned int my_primary, my_flavor, my_value; @@ -181,7 +181,7 @@ void test_alias_datum(policydb_t * p, char *id, char *primary_id, char mode, uns } } -role_datum_t *test_role_type_set(policydb_t * p, char *id, avrule_decl_t * decl, char **types, unsigned int len, unsigned int flags) +role_datum_t *test_role_type_set(policydb_t * p, const char *id, avrule_decl_t * decl, const char **types, unsigned int len, unsigned int flags) { ebitmap_node_t *tnode; unsigned int i, j, new, found = 0; @@ -222,7 +222,7 @@ role_datum_t *test_role_type_set(policydb_t * p, char *id, avrule_decl_t * decl, return role; } -void test_attr_types(policydb_t * p, char *id, avrule_decl_t * decl, char **types, int len) +void test_attr_types(policydb_t * p, const char *id, avrule_decl_t * decl, const char **types, int len) { ebitmap_node_t *tnode; int j, new, found = 0; diff --git a/libsepol/tests/test-common.h b/libsepol/tests/test-common.h index 5a1e65070b54..1e31c8d1f80c 100644 --- a/libsepol/tests/test-common.h +++ b/libsepol/tests/test-common.h @@ -34,7 +34,7 @@ * This is a utility function to test for the symbol's presence in the global symbol table, * the scope table, and that the decl blocks we think this symbol is in are correct */ -extern void test_sym_presence(policydb_t * p, char *id, int sym_type, unsigned int scope_type, unsigned int *decls, unsigned int len); +extern void test_sym_presence(policydb_t * p, const char *id, int sym_type, unsigned int scope_type, unsigned int *decls, unsigned int len); /* Test the indexes in the policydb to ensure their correctness. These include * the sym_val_to_name[], class_val_to_struct, role_val_to_struct, type_val_to_struct, @@ -50,7 +50,7 @@ extern void test_policydb_indexes(policydb_t * p); 1 = automatically detect the flavor value and test the datum accordingly * flavor = flavor value if in mode 0 */ -extern void test_alias_datum(policydb_t * p, char *id, char *primary_id, char mode, unsigned int flavor); +extern void test_alias_datum(policydb_t * p, const char *id, const char *primary_id, char mode, unsigned int flavor); /* p the policy being inspected * id string role identifier @@ -62,7 +62,7 @@ extern void test_alias_datum(policydb_t * p, char *id, char *primary_id, char mo * This is a utility function to test whether the type set associated with a role in a specific * avrule decl block matches our expectations */ -extern role_datum_t *test_role_type_set(policydb_t * p, char *id, avrule_decl_t * decl, char **types, unsigned int len, unsigned int flags); +extern role_datum_t *test_role_type_set(policydb_t * p, const char *id, avrule_decl_t * decl, const char **types, unsigned int len, unsigned int flags); /* p the policy being inspected * id string attribute identifier @@ -73,6 +73,6 @@ extern role_datum_t *test_role_type_set(policydb_t * p, char *id, avrule_decl_t * This is a utility function to test whether the type set associated with an attribute in a specific * avrule decl block matches our expectations */ -extern void test_attr_types(policydb_t * p, char *id, avrule_decl_t * decl, char **types, int len); +extern void test_attr_types(policydb_t * p, const char *id, avrule_decl_t * decl, const char **types, int len); #endif diff --git a/libsepol/tests/test-deps.c b/libsepol/tests/test-deps.c index ed23e0992ced..f495087ac41a 100644 --- a/libsepol/tests/test-deps.c +++ b/libsepol/tests/test-deps.c @@ -135,7 +135,7 @@ int deps_test_cleanup(void) * decl_type name of the unique type found in the module's global * section is to find that avrule_decl. */ -static void do_deps_modreq_global(int req_met, int b, char *policy, char *decl_type) +static void do_deps_modreq_global(int req_met, int b, const char *policy, const char *decl_type) { policydb_t *base; policydb_t mod; @@ -218,7 +218,7 @@ static void deps_modreq_global(void) * decl_type name of the unique type found in the module's global * section is to find that avrule_decl. */ -static void do_deps_modreq_opt(int req_met, int ret_val, int b, char *policy, char *decl_type) +static void do_deps_modreq_opt(int req_met, int ret_val, int b, const char *policy, const char *decl_type) { policydb_t *base; policydb_t mod; diff --git a/libsepol/tests/test-expander-attr-map.c b/libsepol/tests/test-expander-attr-map.c index 5c24ced237dd..b2f59aee42c8 100644 --- a/libsepol/tests/test-expander-attr-map.c +++ b/libsepol/tests/test-expander-attr-map.c @@ -35,35 +35,35 @@ void test_expander_attr_mapping(void) because declare in optional then require in a different optional logic still doesn't work */ - char *typesb1[] = { "attr_check_base_1_1_t", "attr_check_base_1_2_t" }; - char *typesb2[] = { "attr_check_base_2_1_t", "attr_check_base_2_2_t" }; - char *typesb3[] = { "attr_check_base_3_1_t", "attr_check_base_3_2_t", + const char *typesb1[] = { "attr_check_base_1_1_t", "attr_check_base_1_2_t" }; + const char *typesb2[] = { "attr_check_base_2_1_t", "attr_check_base_2_2_t" }; + const char *typesb3[] = { "attr_check_base_3_1_t", "attr_check_base_3_2_t", "attr_check_base_3_3_t", "attr_check_base_3_4_t" }; - char *typesb4[] = { "attr_check_base_4_1_t", "attr_check_base_4_2_t" }; - char *typesb5[] = { "attr_check_base_5_1_t", "attr_check_base_5_2_t" }; - char *typesb6[] = { "attr_check_base_6_1_t", "attr_check_base_6_2_t", + const char *typesb4[] = { "attr_check_base_4_1_t", "attr_check_base_4_2_t" }; + const char *typesb5[] = { "attr_check_base_5_1_t", "attr_check_base_5_2_t" }; + const char *typesb6[] = { "attr_check_base_6_1_t", "attr_check_base_6_2_t", "attr_check_base_6_3_t", "attr_check_base_6_4_t" }; - char *typesbo2[] = { "attr_check_base_optional_2_1_t", + const char *typesbo2[] = { "attr_check_base_optional_2_1_t", "attr_check_base_optional_2_2_t" }; - char *typesbo5[] = { "attr_check_base_optional_5_1_t", + const char *typesbo5[] = { "attr_check_base_optional_5_1_t", "attr_check_base_optional_5_2_t" }; - char *typesm2[] = { "attr_check_mod_2_1_t", "attr_check_mod_2_2_t" }; - char *typesm4[] = { "attr_check_mod_4_1_t", "attr_check_mod_4_2_t" }; - char *typesm5[] = { "attr_check_mod_5_1_t", "attr_check_mod_5_2_t" }; - char *typesm6[] = { "attr_check_mod_6_1_t", "attr_check_mod_6_2_t", + const char *typesm2[] = { "attr_check_mod_2_1_t", "attr_check_mod_2_2_t" }; + const char *typesm4[] = { "attr_check_mod_4_1_t", "attr_check_mod_4_2_t" }; + const char *typesm5[] = { "attr_check_mod_5_1_t", "attr_check_mod_5_2_t" }; + const char *typesm6[] = { "attr_check_mod_6_1_t", "attr_check_mod_6_2_t", "attr_check_mod_6_3_t", "attr_check_mod_6_4_t" }; - char *typesmo2[] = { "attr_check_mod_optional_4_1_t", + const char *typesmo2[] = { "attr_check_mod_optional_4_1_t", "attr_check_mod_optional_4_2_t" }; - char *typesb10[] = { "attr_check_base_10_1_t", "attr_check_base_10_2_t" }; - char *typesb11[] = { "attr_check_base_11_3_t", "attr_check_base_11_4_t" }; - char *typesm10[] = { "attr_check_mod_10_1_t", "attr_check_mod_10_2_t" }; - char *typesm11[] = { "attr_check_mod_11_3_t", "attr_check_mod_11_4_t" }; + const char *typesb10[] = { "attr_check_base_10_1_t", "attr_check_base_10_2_t" }; + const char *typesb11[] = { "attr_check_base_11_3_t", "attr_check_base_11_4_t" }; + const char *typesm10[] = { "attr_check_mod_10_1_t", "attr_check_mod_10_2_t" }; + const char *typesm11[] = { "attr_check_mod_11_3_t", "attr_check_mod_11_4_t" }; test_attr_types(&base_expanded2, "attr_check_base_1", NULL, typesb1, 2); test_attr_types(&base_expanded2, "attr_check_base_2", NULL, typesb2, 2); diff --git a/libsepol/tests/test-expander-roles.c b/libsepol/tests/test-expander-roles.c index ecfa88e338d0..aba3c9bd19c4 100644 --- a/libsepol/tests/test-expander-roles.c +++ b/libsepol/tests/test-expander-roles.c @@ -31,7 +31,7 @@ extern policydb_t role_expanded; void test_expander_role_mapping(void) { - char *types1[] = { "role_check_1_1_t", "role_check_1_2_t" }; + const char *types1[] = { "role_check_1_1_t", "role_check_1_2_t" }; test_role_type_set(&role_expanded, "role_check_1", NULL, types1, 2, 0); } diff --git a/libsepol/tests/test-expander-users.c b/libsepol/tests/test-expander-users.c index 549492b183a6..f3b98a6c224e 100644 --- a/libsepol/tests/test-expander-users.c +++ b/libsepol/tests/test-expander-users.c @@ -28,7 +28,7 @@ extern policydb_t user_expanded; -static void check_user_roles(policydb_t * p, char *user_name, char **role_names, int num_roles) +static void check_user_roles(policydb_t * p, const char *user_name, const char **role_names, int num_roles) { user_datum_t *user; ebitmap_node_t *tnode; @@ -69,7 +69,7 @@ static void check_user_roles(policydb_t * p, char *user_name, char **role_names, void test_expander_user_mapping(void) { - char *roles1[] = { "user_check_1_1_r", "user_check_1_2_r" }; + const char *roles1[] = { "user_check_1_1_r", "user_check_1_2_r" }; check_user_roles(&user_expanded, "user_check_1", roles1, 2); } diff --git a/libsepol/tests/test-expander.c b/libsepol/tests/test-expander.c index bc946c778b1d..ee70e220918c 100644 --- a/libsepol/tests/test-expander.c +++ b/libsepol/tests/test-expander.c @@ -67,7 +67,7 @@ extern int mls; /* Takes base, some number of modules, links them, and expands them reads source from myfiles array, which has the base string followed by each module string */ -int expander_policy_init(policydb_t * mybase, int num_modules, policydb_t ** mymodules, policydb_t * myexpanded, char **myfiles) +int expander_policy_init(policydb_t * mybase, int num_modules, policydb_t ** mymodules, policydb_t * myexpanded, const char *const *myfiles) { char *filename[num_modules + 1]; int i; @@ -130,14 +130,14 @@ int expander_policy_init(policydb_t * mybase, int num_modules, policydb_t ** mym int expander_test_init(void) { - char *small_base_file = "small-base.conf"; - char *base_only_file = "base-base-only.conf"; + const char *small_base_file = "small-base.conf"; + const char *base_only_file = "base-base-only.conf"; int rc; policydb_t *mymod2; - char *files2[] = { "small-base.conf", "module.conf" }; - char *role_files[] = { "role-base.conf", "role-module.conf" }; - char *user_files[] = { "user-base.conf", "user-module.conf" }; - char *alias_files[] = { "alias-base.conf", "alias-module.conf" }; + const char *files2[] = { "small-base.conf", "module.conf" }; + const char *role_files[] = { "role-base.conf", "role-module.conf" }; + const char *user_files[] = { "user-base.conf", "user-module.conf" }; + const char *alias_files[] = { "alias-base.conf", "alias-module.conf" }; rc = expander_policy_init(&basemod, 0, NULL, &base_expanded, &small_base_file); if (rc != 0) diff --git a/libsepol/tests/test-linker-cond-map.c b/libsepol/tests/test-linker-cond-map.c index 0ef0d698d58c..712d99149883 100644 --- a/libsepol/tests/test-linker-cond-map.c +++ b/libsepol/tests/test-linker-cond-map.c @@ -50,7 +50,7 @@ */ typedef struct test_cond_expr { - char *bool; + const char *bool; uint32_t expr_type; } test_cond_expr_t; @@ -75,7 +75,7 @@ void test_cond_expr_mapping(policydb_t * p, avrule_decl_t * d, test_cond_expr_t } } -void test_bool_state(policydb_t * p, char *bool, int state) +void test_bool_state(policydb_t * p, const char *bool, int state) { cond_bool_datum_t *b; diff --git a/libsepol/tests/test-linker-roles.c b/libsepol/tests/test-linker-roles.c index 569e2ccf5ee7..c9e2f2ba7e90 100644 --- a/libsepol/tests/test-linker-roles.c +++ b/libsepol/tests/test-linker-roles.c @@ -72,7 +72,7 @@ void base_role_tests(policydb_t * base) avrule_decl_t *decl; role_datum_t *role; unsigned int decls[2]; - char *types[2]; + const char *types[2]; /* These tests look at roles in the base only, the desire is to ensure that * roles are not destroyed or otherwise removed during the link process */ @@ -102,7 +102,7 @@ void module_role_tests(policydb_t * base) role_datum_t *role; avrule_decl_t *decl; unsigned int decls[3]; - char *types[3]; + const char *types[3]; /* These tests are run when the base is linked with 2 modules, * They should test whether the roles get copied correctly from the diff --git a/libsepol/tests/test-linker-types.c b/libsepol/tests/test-linker-types.c index 94f16ac1615c..b41e08e0099c 100644 --- a/libsepol/tests/test-linker-types.c +++ b/libsepol/tests/test-linker-types.c @@ -97,7 +97,7 @@ */ /* Don't pass in decls from global blocks since symbols aren't stored in their symtab */ -static void test_type_datum(policydb_t * p, char *id, unsigned int *decls, int len, unsigned int primary) +static void test_type_datum(policydb_t * p, const char *id, unsigned int *decls, int len, unsigned int primary) { int i; unsigned int value; @@ -125,7 +125,7 @@ static void test_type_datum(policydb_t * p, char *id, unsigned int *decls, int l void base_type_tests(policydb_t * base) { unsigned int decls[2]; - char *types[2]; + const char *types[2]; /* These tests look at types in the base only, the desire is to ensure that * types are not destroyed or otherwise removed during the link process. @@ -163,7 +163,7 @@ void base_type_tests(policydb_t * base) void module_type_tests(policydb_t * base) { unsigned int decls[2]; - char *types[2]; + const char *types[2]; avrule_decl_t *d; /* These tests look at types that were copied from modules or attributes