From patchwork Sat Dec 30 17:19:26 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Richard Haines X-Patchwork-Id: 10140529 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 52E45601A1 for ; Tue, 2 Jan 2018 13:27:52 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 4ABDB203B9 for ; Tue, 2 Jan 2018 13:27:52 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 3EFB0289CA; Tue, 2 Jan 2018 13:27:52 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.1 required=2.0 tests=BAYES_00,DKIM_SIGNED, RCVD_IN_DNSWL_MED, T_DKIM_INVALID autolearn=unavailable version=3.3.1 Received: from USFB19PA14.eemsg.mail.mil (uphb19pa11.eemsg.mail.mil [214.24.26.85]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id D8CF5203B9 for ; Tue, 2 Jan 2018 13:27:50 +0000 (UTC) Received: from emsm-gh1-uea10.ncsc.mil ([214.29.60.2]) by USFB19PA14.eemsg.mail.mil with ESMTP; 02 Jan 2018 13:27:49 +0000 X-IronPort-AV: E=Sophos;i="5.45,497,1508803200"; d="scan'208";a="7209379" IronPort-PHdr: =?us-ascii?q?9a23=3AzgbXARBKGJ2QKQvFy04mUyQJP3N1i/DPJgcQr6Af?= =?us-ascii?q?oPdwSPn8ocqwAkXT6L1XgUPTWs2DsrQY07OQ7PmrBT1IyK3CmUhKSIZLWR4BhJ?= =?us-ascii?q?detC0bK+nBN3fGKuX3ZTcxBsVIWQwt1Xi6NU9IBJS2PAWK8TW94jEIBxrwKxd+?= =?us-ascii?q?KPjrFY7OlcS30P2594HObwlSizexfa5+IA+0oAnMucUbjo9vIbstxxXUpXdFZ/?= =?us-ascii?q?5Yzn5yK1KJmBb86Maw/Jp9/ClVpvks6c1OX7jkcqohVbBXAygoPG4z5M3wqBnM?= =?us-ascii?q?VhCP6WcGUmUXiRVHHQ7I5wznU5jrsyv6su192DSGPcDzULs5Vyiu47ttRRT1hi?= =?us-ascii?q?gHLTo5+3zJhMJ2gqxQvRatqwViz4LIZY2YMud1cKHActMAXWdPXthfWSJCDI27?= =?us-ascii?q?coUPF+gMMftWoobjvFsDtgeyCRW2Ce/z0DJEmmP60Ksn2OohCwHG2wkgEsoSvn?= =?us-ascii?q?TVsNr1NL0dUfqow6LVzzvMdfJW2THj54jTbxsspuuMXbNsfsrR00YvDR7KgU2M?= =?us-ascii?q?poP9PzOazOUNs26F4Op7Tu+gkHInqwB3ojiz2MgskI/JiZwJylze6Sp5x4M1KM?= =?us-ascii?q?S+RUVmYtCkCINduzyVOoZ5WM8vQ3xktDwkxrAJp5K3ZjUGxIwkyhPecfCLboeF?= =?us-ascii?q?7x35WOqMLjp1hWhpdbO+ihu07EOu0PfzVtOu31ZPtidFl97MuW0T2BHL8ciHT+?= =?us-ascii?q?d9/l+m2TaSywDf8uFELl4wlarcM5Mh3qQ/loASsUTeBS/6gln2ja+KeUUk/eik?= =?us-ascii?q?8eLnban9ppCALYN0jwD+MqA2lsy+B+Q3LBQOUnCG9emz27Dv5030TKhQgvEona?= =?us-ascii?q?TVrorWKdkDqq68GQBV04Ij6xilDzeh1dQVhWIHI0xBeBKGiYjpJl7PLOnjAve4?= =?us-ascii?q?nlSslitkyO7dPrD6HpXMLmTMkLfmfbpn7U5c0xA8wcpQ55JTFLENOOjzVVPptN?= =?us-ascii?q?zEEh85NBS5w+TgCNV7zIweRWKPDbWfMK7Js1+I4eQvI+yWa48OpDbyNeIl5+X0?= =?us-ascii?q?gX8+g18dcrGj3YELZ3CgAvRmP0KZbGLugtcDC2gFogk+TPftiF2EUD5TeW2/X6?= =?us-ascii?q?w45jEmB4OpFprDRoaxgLycxiu7GYdWZm9eAFCWDXjob5mEW+sLaC+KOs9ujCcL?= =?us-ascii?q?WqanS48gyRGusxT3y7t5IeXK5CIUr5Xj1MJ65+fLjxE96SR0D9iB02GKV2x7g2?= =?us-ascii?q?QIRzkw3K9iv0N9zlaD3LNijPNGD9xT4OlFUgAgNZ7T1+Z6Ecz9WhrdfteVT1ar?= =?us-ascii?q?WsipAS0rQdIr2NIBf0F9G9C+gR/ZxCqqH6UZl7qVC5wo6qjcxWT+J95hy3ba06?= =?us-ascii?q?ksl1gmQs1TNWK4gq5w6Q3TCJDVk0WDl6enbqMc3DbT+2eFyGqBpkBYUAprXqXC?= =?us-ascii?q?UnETfEzWrc725knaVb+hFawnMhddyc6FMqZLatzojVJARPr4PdTeZ3u9m2a2BR?= =?us-ascii?q?qSwLODdpDqe2Yc3CXDFkcIiQYT8miaNQImHCeuv3reDCByFVLoe07t/+h+qHe+?= =?us-ascii?q?TkAq1QGHdENh2KSo9R4Sn/yTUesT3qgDuCcjtTp7AEq908jRC9qaqAprZL9cbs?= =?us-ascii?q?8l4FdbyWLZsBRwPpK6L694gF4RbwV3v1j12hVyEoVAkNEmrGgkzQppM66Y10lB?= =?us-ascii?q?dzyA15DqJrLXMnXy/Ayoa6PO2VHRytWW+qAS6PkjqFXspgKpFk0/83l91NlVyX?= =?us-ascii?q?Sc7I3QDAUOSZLxTlo39x9iqr7AfyY9/YLU2mN2MaSvqDDNx9cpCPEiyha6cNdV?= =?us-ascii?q?KLmEGxPqE80GG8iuL/QnlESzYRIAIu9S77I0PsOhd/adw66kIOdgkyygjWRb4Y?= =?us-ascii?q?ByyFiA9yxiRe7Ux5wF2e2X3hObVzfgi1esqtr3lp1ZajwJEWq/zCflCJRXZqJs?= =?us-ascii?q?YYYBEX2uLNGvxtVim57tXGZV9EWtB1Mc38+pYgaSYkfm3Q1W0kQWr3mnljG+zz?= =?us-ascii?q?BulTEmsLaf1jTUw+v+bBoHJnJLRG56gFbiO4e0i8waU1aybwgyjxal+1j1x7JA?= =?us-ascii?q?q6RiKmnfW0BIfzL5L2t6SKu/qqKCY9JT6JMvqShXTuW8bkyGSr76uRsWyT/sH2?= =?us-ascii?q?tZxDA9eDGnoZH5nx18iG2HNnZzq2DVecZqxRfQ/NbcX+Je3iIaRClkjjnaHly8?= =?us-ascii?q?P9iy/dWIjpvDqf6xV2agVp1VbCnqwpiNtDCj5W1rBx2/nuy8msb9HQg8zyD7y8?= =?us-ascii?q?FgVT/Uoxbkfonry6O6PPp9fklvAF/879R1GptinYs3ipAdwmMahoiJ8noci2vz?= =?us-ascii?q?Ns9b2a3mZnoXWTEL28LV4BTi2EB7LXKG2YT5Vm6Gz8tieda6ZHgW2iQj4MBWEq?= =?us-ascii?q?uU66ZEnSRtqFqisQ3ReeR9nisayfY28H4VmfwJuA4zwSWFGL8SG1VYMjL2lxmT?= =?us-ascii?q?8tC+t7tYZHy0cbSqz0p+ms2hDKuerQ5CVnb5fY0iHSBu4cllNlLDzmHz4Jn+eN?= =?us-ascii?q?bMddITqgGUkxDYguhLLpI+i+EHhTRhOW3gvX0p0eg7ggJy3ZuipoiIN31t/L6l?= =?us-ascii?q?Ah5fLjD1f9kc+izpjatFgsmW3pyvH5V4FjUFRpToS+ikEDUItfToLwyOCiEzqm?= =?us-ascii?q?+HGbrDGg+S8ERmrnLLE5+1LHyXIX4ZzdtsRBaDOExfnAAUXDI/npEnDAyqwtLu?= =?us-ascii?q?cFth7DAL+lH4sgdMyv5vNxTnXGfQvgGoaiszSJiaNxdW4B9N6FrSMcyE9O1zBz?= =?us-ascii?q?tY/pqjrAOTNmObex5EDWYTWkyLH1rjJKWh5cHc8+iEAeqzN+HOba+AqOBEUveH?= =?us-ascii?q?35av0oxm/juXLMqAInxiA+c82kpZUnBzA97ZlCkXSywLiyLNaNaWpBmm+iJps8?= =?us-ascii?q?+/6+7kWATz5YuIELtfKs9g9AyzgauZMO6Qnil5Iy5C1pwQ3X/I1KQf3FkKhiFo?= =?us-ascii?q?bTmiC6wAtTbWQaLem69XFQUbaz99NMtJ6aIzxA9NNtLaitzv0r50lPk1C01KVV?= =?us-ascii?q?b5gMGmedQKI32hNFPAHEuEL6+JKTrPw8H2eqO8VaZQgP9PtxKupTmXCVTjMSqH?= =?us-ascii?q?lznoURCvLO5NgTqHMx1eooG9bw1tBXLtTd38dh27K9h3jTsszb0znHPKOnYWMS?= =?us-ascii?q?JgfENVsr2Q8SRYj+15G2xA6nplKfeLmz2C4ubCNJkWq/xrDj5zl+JA73Qw06FV?= =?us-ascii?q?4z1cRPxphCvSqcZjrEqnkumAzTpnVgFDpStVi42QvEVtI6PZ+oNHWXbe8xIH9X?= =?us-ascii?q?+QBAgSp9t5Ft3vvLhdxcLAlK3pNjdN7cnZ/cwEB8fKLsKHNWAuMRvtGDHPCwsE?= =?us-ascii?q?QiSnNWbFh0xSiPuS7GGaroAmqpjwn5oDUqNbVFswFv8AEERlG90DL4lxXjw/i7?= =?us-ascii?q?6bi9AH5XmloRbNQ8Vau4zIWeiJAfXzMjqZi6dLZwcQy7PiMYsTLpH721BlalRi?= =?us-ascii?q?moTFBVDfXdRWry1iaQ80u1lN/2J4Tm0o2ELlaxmh4HkNGv6ohhQ2kBdxYfwx9D?= =?us-ascii?q?fw5Fc6PkDKqzUrkEYvg9rlmyyecD7qIairXIFWETf7t08/MpPjWQZ6cw2zkVZi?= =?us-ascii?q?NDjaW7Jbl6FgenxziA/ApZtPHuZRQrBebx8OxPGYeu4o3E9GpSW9309H4uXECY?= =?us-ascii?q?B8mwQ2bJ6stXNA2x5jbdIvI6zfOrZJxEBKhq2Spi+oyvwxwAgGKkYJ92OSYjAH?= =?us-ascii?q?uEoJN7khPCeo8eps6RGYlztEYmgMWOIgouh2+UMlJ+SA0yXg3qZYKk+vM+yfLq?= =?us-ascii?q?WZu3XPlMOTXlww0UYImFVf8rhtzccvaUyUWF4zzLGJDRQGKdLCKR1Jb8pV7HXc?= =?us-ascii?q?YDqBseDKwZJzI4WxC/vlTfGQu6YOg0KlHQEpH4IW4sQHAJaszFnSLd37I74d1R?= =?us-ascii?q?Ut+APrKU2ZDPRIfRKLlysHo8G/zZJswIZdJzEcDn9mPimt4LbYuBMqiuKZXNgq?= =?us-ascii?q?encaQpcENnUuVcKgny5ZvmhPAyev3eIcyAmC6Tj8piLKAzTndNVjZe2bZRV1BN?= =?us-ascii?q?G45DUz6a62hkDL8p/GPWH1KcxiusPT6eMdv5uIEO1bTb9mvkjGhoZYWWKlU3TU?= =?us-ascii?q?EdGvPZjxa5MgbdvuCna1Sla/kS46T9/tPNaxKaiFmRvoRYBVsIaH3DAjMsu9Fi?= =?us-ascii?q?oGFRlpuu8N/r5xawoYbpUnZh7oshgxOLakIAeEyNmuRXiiKSdORflF0eq6f6BX?= =?us-ascii?q?zzYrbuKi1HQgTIs1wPWs/EERQ5EKihXexfe9aIlETSj8BGBSewXVqSo+jWhhOf?= =?us-ascii?q?44wv0jzxPQrVkcLzeLefRzaGNepdE8AkidLG5qCmoiXVCck5TM4gqt37AU8Ctd?= =?us-ascii?q?m9dU0eJFsHjisJ/QeiisWKmxpZXTrSUgccAso7dtPoz7PsuGqJTekyTRTZXKrg?= =?us-ascii?q?KFUC+6F/9bmtdKIyJVW/hIln87NsMYo4ZB7lAxVsgmLbxVFKYsvqyqaSZjDSMK?= =?us-ascii?q?yC8WTZmA3D8cjeeg2rvakBiQfY8sMRMetpVNnt8dUylrYiwDv6+vTYPWmHGYSm?= =?us-ascii?q?ITOgcc8RxM5B4clo93Zu3l+I3ITJtWxD5MrfN0VS/LFpdz+lv+TWGWhkP4R+u9?= =?us-ascii?q?nOyz2gJS1+ns0tgdWB5wE0RdwPxWlkQwIrFtN6YQppLKsiOPdU7ipm3t0vamJF?= =?us-ascii?q?9Lxc3XbFD4DYvFtWvgUiIH43EUQ5FAyG3HH5QIjwV5cLorpElLII2+Zkb+4Dkk?= =?us-ascii?q?yp91H7WkUMCk3EwprXAYSCe2C9BBEf1psErLWD15ZJCmsJXlNI9IQmBK/J2Stk?= =?us-ascii?q?xUn1hzPC6h0ZpTNcVN7SAWXDRVpjWdptSyQtVZ2cBqF58MPst/u3DlFaNGP5ie?= =?us-ascii?q?vWY7taHxxX/C5T88qku6yyuuFKOiSeJW4XEeEB0zJ2uCskkvE/cs8mDK/1DRr1?= =?us-ascii?q?974uZbCaKLjUhqvDl9GZVOCSpT2nC+M1R/Vn9GvPtGKK7NacxTX+EyZQOzOxw5?= =?us-ascii?q?DfMpxEKJ8l1okXr7fiB/uBBX9DzaXwkxSSYamKztmSEEpsGhJzAaV4pCbS89YC?= =?us-ascii?q?fdNwKbhSdXsQ5Fa050Rp8ZAsxK+60A0ItQ+crCV1ijJT8ZUxxlKw03z+BTlUhd?= =?us-ascii?q?v0WEYSrdFxande7Tsh1resectNapLO/l/Ahdl4znrPs1974ER327gw2iXc7Rr4?= =?us-ascii?q?ngtt2QrESOcL30M+qmYX/OVDLMlwy/ha84D5nW+CjeKBZbK4NkxnU6fJfsEnPL?= =?us-ascii?q?PRBaJ6IBPUVbS6F6adJCou9Ee89oYqEJ+bViBhifXBPgBJSvrOVaLlbUXTneKj?= =?us-ascii?q?+O8ui7oY3N8bzdVfLvadaXynbBXa13Iox65iXhFLfyz4BS4Ez21elx9kliU1jJ?= =?us-ascii?q?LziBrMj9JgMM/MSidFHtvocuHTPNBJd/imTty1pFd8oKRy2q7JUYx49Y6HnqT+?= =?us-ascii?q?J4yVL/sOpI97lr8YM3+axmyd+oJafOLvRXqU1nDQKSBgVk7JUtB3VwSH5Kb+8N?= =?us-ascii?q?MvjRe78Zjcf0p+DxCaMX9AWf+/ZFZtvfO0HBhs6/BymTSRxZnQcBrToaIRWZ1/?= =?us-ascii?q?OehqB7V92qpenj1UIr+VS+KQQGzL9174ee5qWIvPPXbwfWzbUcWKjqR8bzo68p?= =?us-ascii?q?u0yM5fwriqQOem1zYw2oCuQdUNASxnv4x6Aw0S0sC9/DH67n+PNbUXI5mintm5?= =?us-ascii?q?F7H1UTAP8UHLyL/YpEnmgigOzZKscWcr1elWaTCB6kCKENxWSs6yuNL2lvmgvO?= =?us-ascii?q?3A3oQWOv8F/2qjd1QS7Lz9fljkpVWae4CFxXXyqoI0B4ti2APBbmtdrwo6Q171?= =?us-ascii?q?o2PnbitN2TiGurIKlXENHnJNyAPSk0o0oajJkqRtyq2Y0WAtS9L8kM/3F5dPvR?= =?us-ascii?q?8XurkzVGo6dFmYXR/t2V9u/QHXm6gK2Qs6+NyyxAyngkoVE/7citNvDP5tKQWf?= =?us-ascii?q?uny30cTzxhtAvdQRG6tqbXr1cOOUyEyE3LgpAFPslF3Xkk0UHr/PMsQNMo9ARQ?= =?us-ascii?q?DInAZfICpSzrODTu3FafZ8k6WTWZ0zRKAF36C0R4GLI72GLqps3Fj3DQ+0cnRo?= =?us-ascii?q?NobUzomQR3D5kkKUIq8FUX2jAMERQRZhCbArCoAl7lLYgdWUgYdxuH2Lm6eqEq?= =?us-ascii?q?3Ux82b6v/PXcbfBgCKoNOPddiRSOnFtBFpIVr6IeWrR8dEFZ9KLNoQjiEYfnVe?= =?us-ascii?q?D8lXUsLf21Xtxa8ccBunst+Am/XQSv6YtD77sAjJCId7JEbobMvM9m8kdn/iQD?= =?us-ascii?q?dipTjxhjlxm5S/wTpPj/4tjHt5ql8umuW7grR+UL8Bg0AGNyj4Duj1AnoNHX0f?= =?us-ascii?q?pcS4LOhIT77g9NOX6Lt5zA3xl6N+UON5qhfKx8+HUfOygeO3UOMMKQa/k9/yBt?= =?us-ascii?q?NzHT6EZZAs8WZNMYO83NmRtPikDyXbFe+cXaFkWfC4dpeMAi93D3xywt8ZsgTu?= =?us-ascii?q?bg7ye7JZ/D4FFWJPNPlThimt3EqugUx/rSFScW7GKWaxhw2CyCzYeCB+z3/eWW?= =?us-ascii?q?x9HeT0kGETIuU4dBODqC/hSqRuiylJXpVAOY8NP8gJI6dEKNW3OwnaUFsqBXEe?= =?us-ascii?q?5DiyX2xSZeFoHrh/2Pt9qj9WpXukdBEIlt8R3PAL9fMYljORTkismrQVBxBirh?= =?us-ascii?q?eM7OcBojo+6WxvoR7OV/MEv+fpUXIhUey7L18XBVVBdhSKbqvlaFWuIcfNlmR+?= =?us-ascii?q?3KrnBb7YJtMKEOM0KbpJP0sjdEslY2DxE1aLUotDxValHOnBFJW6bzoLMAhQ8c?= =?us-ascii?q?Udl3uEBSHWKwPHkz5yHAVaRTjameFOYZ8jONQawSS09oKD9xQwup2JVyfLukhf?= =?us-ascii?q?JHsmNGnyNlp/gq1z1mRAeitiD3oqIN2C4g+KumuzkbvnxFVOqemT/SCVpf1PQK?= =?us-ascii?q?kbscC3H65FygYXkDaZD/4KVmJcv89oku/XA/bQ8lfyIYQeSqEzvwgL+QAoyTrN?= =?us-ascii?q?JcgwaAuMDPbb+wLigSMa8wyRD5SHh+1Qjemghn8G0RTjWm8tAkOJ23Odw5ySqw?= =?us-ascii?q?BWjbaFEM77tSv8Tvs14LUPA7aUhlwGVkzsiHWjMNS9LSFGoviQgkc2pEeopZ6R?= =?us-ascii?q?AGD6koniqIvq5e8wEafjjUFoWl+pHOksrT2Hg9TNJqxmfIqa2fgpMlzmdpm9Ru?= =?us-ascii?q?7i6BoH4SbfDXU9dwAnjv0YdS0eL/Z+23suAGVIRp1q+sUPoDMsm/42u5xo9mWk?= =?us-ascii?q?i/xrQRB1C5KvMMxq/HUye5Tm2VQeOLc2ySkDsiKk7y4QOnLkYraMdLs0A9LvHC?= =?us-ascii?q?iYBCmAH7V7N7WDmQr0fBzGM/KeMaax42uIC/dgwOTe4RYfWcJOc3zP06CVsMdG?= =?us-ascii?q?PJHTBtBu+3q1Gtmo97N29n4UXgbuTn6hrmP8eKGhkYDY7aqYZ8+fmgSW2dOX9g?= =?us-ascii?q?zRtyPE5v+ufBFlQxsPFTc5KQndjWmtR63vQJd/B3MS0yotQTgJ5s6ZGI0MeWdh?= =?us-ascii?q?Hc1pTyKsvWovifGPLS1FkqemdGUroZZgP1+oo6Pt4lW7HJG7tWowgcD7AgQJM9?= =?us-ascii?q?L2fx6L10LARrfw7TYbS0hdPqpviKZptPvHLW6Eg/LCLCtB0C0PC0ShZ7b5+yjX?= =?us-ascii?q?XoPJ8wXi5Br8FqChZ+B4tPFcYAoBamDpOXg6y7lcG++1l7u+4LtqrwDOrG1NKn?= =?us-ascii?q?0IVtDNBm4hmQMTLQArR7qlh0heS1xPHb29/+Dt2mMdUJSOR2XEbbZbLcWIayMD?= =?us-ascii?q?SDPoT7YUECu7qd1q9pFw6aeDjRQaWLrmunOe9i7EF9zZZ3OKLXzTow//TA1dDv?= =?us-ascii?q?fWBHt2KmqnKUMJZ38lPHH6rdUghSRP7D93xqToMNao6hzuYFMdU4zJC86gh14S?= =?us-ascii?q?8KhNGEKKiotEP70XV7fJPdIVDB0To4X5UHOhKyLQ0nhmqP+SeVOmhVMsXxcZol?= =?us-ascii?q?u92SFBG4ohAplA=3D=3D?= X-IPAS-Result: =?us-ascii?q?A2DPAwBuiEta/wHyM5BdGwEBAQEDAQEBCQEBAYMSKQOBWie?= =?us-ascii?q?PH44kgn6WLYIRJolVQRYBAQEBAQEBAQEBaiiCOCSCTwIkGQE4AQIDCQIFQwgDA?= =?us-ascii?q?VoSBYhXgTkBAxUDAbN2OoMLBYEChFqBbAQIhAyBNlyDP4J4gyFFh2oFik+HT5E?= =?us-ascii?q?ulSiUCpg/JgMvgU8yGiNSgimCBEEPHIFneIY3LIIcAQEB?= Received: from tarius.tycho.ncsc.mil ([144.51.242.1]) by EMSM-GH1-UEA10.NCSC.MIL with ESMTP; 02 Jan 2018 13:27:48 +0000 Received: from prometheus.infosec.tycho.ncsc.mil (prometheus [192.168.25.40]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id w02DRlvp014050; Tue, 2 Jan 2018 08:27:48 -0500 Received: from tarius.tycho.ncsc.mil (tarius.infosec.tycho.ncsc.mil [144.51.242.1]) by prometheus.infosec.tycho.ncsc.mil (8.15.2/8.15.2) with ESMTP id vBUHMmeM091645 for ; Sat, 30 Dec 2017 12:22:48 -0500 Received: from goalie.tycho.ncsc.mil (goalie [144.51.242.250]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id vBUHMmcZ028995; Sat, 30 Dec 2017 12:22:48 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A1BRBgDQykdafywbGNZcHQEBBQELAYMSK?= =?us-ascii?q?YFdJ48fjiOCfphBD4U2hDJCFQEBAQEBAQEBARMBAQsWhi4ZATgBFYEpEohcgTk?= =?us-ascii?q?BAxUDAapsOoMLBYEChFiBRiYECIQMgTZcgz+CeIMhRYdqBYpPh0+RLpUolAqYP?= =?us-ascii?q?zWBcjIaI1KCKYIEQQ8cgWd4hkgsghwBAQE?= X-IPAS-Result: =?us-ascii?q?A1BRBgDQykdafywbGNZcHQEBBQELAYMSKYFdJ48fjiOCfph?= =?us-ascii?q?BD4U2hDJCFQEBAQEBAQEBARMBAQsWhi4ZATgBFYEpEohcgTkBAxUDAapsOoMLB?= =?us-ascii?q?YEChFiBRiYECIQMgTZcgz+CeIMhRYdqBYpPh0+RLpUolAqYPzWBcjIaI1KCKYI?= =?us-ascii?q?EQQ8cgWd4hkgsghwBAQE?= X-IronPort-AV: E=Sophos;i="5.45,481,1508817600"; d="scan'208";a="161687" Received: from emsm-gh1-uea11.ncsc.mil ([214.29.60.35]) by goalie.tycho.ncsc.mil with ESMTP; 30 Dec 2017 12:22:48 -0500 IronPort-PHdr: =?us-ascii?q?9a23=3ARAkyzhb1wvpbz5S2UgAmmJH/LSx+4OfEezUN459i?= =?us-ascii?q?sYplN5qZrs29bnLW6fgltlLVR4KTs6sC17KP9fi4EUU7or+5+EgYd5JNUxJXwe?= =?us-ascii?q?43pCcHRPC/NEvgMfTxZDY7FskRHHVs/nW8LFQHUJ2mPw6arXK99yMdFQviPgRp?= =?us-ascii?q?OOv1BpTSj8Oq3Oyu5pHfeQpFiCagbb9oMBm6sRjau9ULj4dlNqs/0AbCrGFSe+?= =?us-ascii?q?RRy2NoJFaTkAj568yt4pNt8Dletuw4+cJYXqr0Y6o3TbpDDDQ7KG81/9HktQPC?= =?us-ascii?q?TQSU+HQRVHgdnwdSDAjE6BH6WYrxsjf/u+Fg1iSWIdH6QLYpUjmk8qxlSgLniD?= =?us-ascii?q?0fOjAk8G/ZlMJ+gqFcrh+6uxBz35TZbJ2POfZiYq/Qe84RS2pbXsZWUixMGp+y?= =?us-ascii?q?b4oTAOoBJ+lYtZTyrEYMoxSkBAmsAv3gyiRVjXLxx6060vguEQHc0ww6At0BqG?= =?us-ascii?q?jbo831NKgIUOC1yrfHzS7YYvxNxTf96Y7Icgw/rvGWW7J/b9bRxVMzGAPCi1Wd?= =?us-ascii?q?sIroNC6W2OQVq2WX8fdsWO21h2I5pAx9uCajy8U2hoTGiY8Z0lPJ+CRjzIooKt?= =?us-ascii?q?C1R1R3bcOrHZZRrS2XNop7T8U/SG9yoik60KcJuZujcSgK1psnwxnfZuSJfIaS?= =?us-ascii?q?7BzuSuicLCliin95ZL6yhwy+/la+xe35Tcm030xGri9fndnNsnABzRnT6smDSv?= =?us-ascii?q?dl/0eh3yiA1xzL5+1aPEw5mrDXJ4Auz7IqiJYes17PEyD5lUnuia+ZbEQk+uym?= =?us-ascii?q?6+T9ZbXmo4eRN5V1ig7iMqQhgNa/DvkgPQcSR2eb+f6z1Lzl/ULnW7VHleY5kr?= =?us-ascii?q?XYsJDcOcQUuLS5AwlL3YY/8RqwEzCm0NEAkXkdMF1FYA6Hj5TuO1zWO/D3EOy/?= =?us-ascii?q?jk+wkDZr2//GPrrhDo/LLnjYirjtZ7l960lCyAAr19BQ+4pUCq0dIPL0QkLxr8?= =?us-ascii?q?LXDhs4Mwyy3ubmB85w1p8eWG2TAq+ZN7nesVmT5u01OeWMa4gVuCiuY8QisuXj?= =?us-ascii?q?iX4/hE81Ybii3ZxRbmuxWPthPQHRZ3fwjtofOXkFsxB4T+HwjlCGFzlJaDL6W6?= =?us-ascii?q?M6+yF+E4m6Fa/dSY23xr+MxiG2GttRfG8CQlSNF2r4Mp6JUOoWaT6DZ8pmniEA?= =?us-ascii?q?WJC/RII7kxKjrgn3z/xgNOWH1DcfsMfZ1dN17vff3TE79Dp5FIzJyWCGT2hukl?= =?us-ascii?q?QDcD8/3aZyumR31laFzaVihfFEU9dU4qUaAU8BKZfAwrkiWJjJUQXbc4LRRQ?= =?us-ascii?q?=3D=3D?= X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0BUBgDQykdafywbGNZcHQEBBQELAYMSK?= =?us-ascii?q?YFdJ48fjiOCfphBD4U2hDJCFQEBAQEBAQEBAQESAQELFl2COCKCdxkBOAEVgSk?= =?us-ascii?q?SiFyBOQEDFQMBqmw6gwsFgQKEWIFGJgQIhAyBNlyDP4J4gyFFhEgMgxYFik+HT?= =?us-ascii?q?5EulSiUCpg/NYFyMhojUoIpggRBDxyBZ3iGSCyCHAEBAQ?= X-IPAS-Result: =?us-ascii?q?A0BUBgDQykdafywbGNZcHQEBBQELAYMSKYFdJ48fjiOCfph?= =?us-ascii?q?BD4U2hDJCFQEBAQEBAQEBAQESAQELFl2COCKCdxkBOAEVgSkSiFyBOQEDFQMBq?= =?us-ascii?q?mw6gwsFgQKEWIFGJgQIhAyBNlyDP4J4gyFFhEgMgxYFik+HT5EulSiUCpg/NYF?= =?us-ascii?q?yMhojUoIpggRBDxyBZ3iGSCyCHAEBAQ?= X-IronPort-AV: E=Sophos;i="5.45,481,1508803200"; d="scan'208";a="7582937" X-IronPort-Outbreak-Status: No, level 0, Unknown - Unknown Received: from updc3cpa05.eemsg.mail.mil ([214.24.27.44]) by emsm-gh1-uea11.NCSC.MIL with ESMTP; 30 Dec 2017 17:22:46 +0000 X-EEMSG-check-005: 0 X-EEMSG-check-006: 000-001;e76360ee-c10e-4803-9b1d-f08e889f3f32 Received: from localhost.localdomain (localhost [127.0.0.1]) by UPDCF3IC14.oob.disa.mil (Postfix) with SMTP id 3z89JQ1zkszJ3VZ; Sat, 30 Dec 2017 17:22:46 +0000 (UTC) Received: from UPDC3CPA03.eemsg.mil (unknown [192.168.18.10]) by UPDCF3IC14.oob.disa.mil (Postfix) with ESMTP id 3z89JQ12LSzJ3T8; Sat, 30 Dec 2017 17:22:46 +0000 (UTC) Authentication-Results: UPDC3CPA03.eemsg.mail.mil; dkim=permerror (key too small) header.i=@btinternet.com X-EEMSG-check-008: 450043180|UPDC3CPA03_EEMSG_MP19.csd.disa.mil X-EEMSG-SBRS: 3.5 X-EEMSG-ORIG-IP: 65.20.0.128 X-EEMSG-check-002: true X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0CaAAAdykdah4AAFEFcHAEBAQQBAQoBAYMSggYnjx+RIZhBD4U2hHQVAQEBAQEBAQEBEwEBAQoLCQgoL4VRGQE4ARWBKRKIXIE5AQMVBKpqOoMLBYEChFiBbAQIhAyBNoQbgniDIUWESAyDFgWKT4dPkS6VKJQKmD81gXIyGiNSgimCBAFADxAMgWd4hkgsghwBAQE X-IPAS-Result: A0CaAAAdykdah4AAFEFcHAEBAQQBAQoBAYMSggYnjx+RIZhBD4U2hHQVAQEBAQEBAQEBEwEBAQoLCQgoL4VRGQE4ARWBKRKIXIE5AQMVBKpqOoMLBYEChFiBbAQIhAyBNoQbgniDIUWESAyDFgWKT4dPkS6VKJQKmD81gXIyGiNSgimCBAFADxAMgWd4hkgsghwBAQE Received: from rgout0601.bt.lon5.cpcloud.co.uk (HELO rgout06.bt.lon5.cpcloud.co.uk) ([65.20.0.128]) by UPDC3CPA03.eemsg.mail.mil with ESMTP; 30 Dec 2017 17:22:43 +0000 X-OWM-Source-IP: 86.144.146.66 (GB) X-OWM-Env-Sender: richard_c_haines@btinternet.com X-Junkmail-Premium-Raw: score=8/50, refid=2.7.2:2017.12.30.165416:17:8.510, ip=, rules=__HAS_FROM, __FRAUD_WEBMAIL_FROM, __TO_MALFORMED_2, __TO_NO_NAME, __HAS_CC_HDR, __MULTIPLE_RCPTS_CC_X2, __CC_NAME, __CC_NAME_DIFF_FROM_ACC, __SUBJ_ALPHA_END, __HAS_MSGID, __SANE_MSGID, __HAS_X_MAILER, __FROM_DOMAIN_IN_ANY_CC1, __ANY_URI, __FRAUD_BODY_WEBMAIL, __URI_NO_WWW, __LINES_OF_YELLING, __NO_HTML_TAG_RAW, BODY_SIZE_10000_PLUS, __MIME_TEXT_P1, __MIME_TEXT_ONLY, LINES_OF_YELLING_3, __URI_NS, HTML_00_01, HTML_00_10, __FRAUD_WEBMAIL, __FROM_DOMAIN_IN_RCPT, __CC_REAL_NAMES, MULTIPLE_RCPTS, __PHISH_SPEAR_STRUCTURE_1, __MIME_TEXT_P, NO_URI_HTTPS Received: from localhost.localdomain (86.144.146.66) by rgout06.bt.lon5.cpcloud.co.uk (9.0.019.13-1) (authenticated as richard_c_haines@btinternet.com) id 5A025DDB05153B40; Sat, 30 Dec 2017 17:19:32 +0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=btinternet.com; s=btcpcloud; t=1514654565; bh=W1zgb9MZNtijTfEc+FfR1L4L2k3vgr+tAzlws3k4bmc=; h=From:To:Cc:Subject:Date:Message-Id:X-Mailer; b=uFFMCOpcvkTHfox0ZKqqVOod7htUmQveTulfC8vAEE1IQl9U11Ds3gi/tEELMDaPM2QgHw/Mxix9mfCWTGKQtlBSjDIB3Ozbfrv0wtvr/Ohe5jvW/nAUQEEkWtGp6LPcBvsyNrTP/OHPwMmBo+hNF/eu1lqZzYE+npgxGe+twrM= X-EEMSG-check-009: 444-444 From: Richard Haines To: selinux@tycho.nsa.gov, netdev@vger.kernel.org, linux-sctp@vger.kernel.org, linux-security-module@vger.kernel.org Date: Sat, 30 Dec 2017 17:19:26 +0000 Message-Id: <20171230171926.15690-1-richard_c_haines@btinternet.com> X-Mailer: git-send-email 2.14.3 X-Mailman-Approved-At: Tue, 02 Jan 2018 08:24:19 -0500 Subject: [PATCH V4 1/4] security: Add support for SCTP security hooks X-BeenThere: selinux@tycho.nsa.gov X-Mailman-Version: 2.1.21 Precedence: list List-Id: "Security-Enhanced Linux \(SELinux\) mailing list" List-Post: List-Help: Cc: marcelo.leitner@gmail.com, nhorman@tuxdriver.com, vyasevich@gmail.com, sds@tycho.nsa.gov Errors-To: selinux-bounces@tycho.nsa.gov Sender: "Selinux" X-Virus-Scanned: ClamAV using ClamSMTP The SCTP security hooks are explained in: Documentation/security/LSM-sctp.rst Signed-off-by: Richard Haines Reviewed-by: Marcelo Ricardo Leitner --- Documentation/security/LSM-sctp.rst | 175 ++++++++++++++++++++++++++++++++++++ include/linux/lsm_hooks.h | 36 ++++++++ include/linux/security.h | 25 ++++++ security/security.c | 22 +++++ 4 files changed, 258 insertions(+) create mode 100644 Documentation/security/LSM-sctp.rst diff --git a/Documentation/security/LSM-sctp.rst b/Documentation/security/LSM-sctp.rst new file mode 100644 index 0000000..6e5a392 --- /dev/null +++ b/Documentation/security/LSM-sctp.rst @@ -0,0 +1,175 @@ +SCTP LSM Support +================ + +For security module support, three SCTP specific hooks have been implemented:: + + security_sctp_assoc_request() + security_sctp_bind_connect() + security_sctp_sk_clone() + +Also the following security hook has been utilised:: + + security_inet_conn_established() + +The usage of these hooks are described below with the SELinux implementation +described in ``Documentation/security/SELinux-sctp.rst`` + + +security_sctp_assoc_request() +----------------------------- +Passes the ``@ep`` and ``@chunk->skb`` of the association INIT packet to the +security module. Returns 0 on success, error on failure. +:: + + @ep - pointer to sctp endpoint structure. + @skb - pointer to skbuff of association packet. + + +security_sctp_bind_connect() +----------------------------- +Passes one or more ipv4/ipv6 addresses to the security module for validation +based on the ``@optname`` that will result in either a bind or connect +service as shown in the permission check tables below. +Returns 0 on success, error on failure. +:: + + @sk - Pointer to sock structure. + @optname - Name of the option to validate. + @address - One or more ipv4 / ipv6 addresses. + @addrlen - The total length of address(s). This is calculated on each + ipv4 or ipv6 address using sizeof(struct sockaddr_in) or + sizeof(struct sockaddr_in6). + + ------------------------------------------------------------------ + | BIND Type Checks | + | @optname | @address contains | + |----------------------------|-----------------------------------| + | SCTP_SOCKOPT_BINDX_ADD | One or more ipv4 / ipv6 addresses | + | SCTP_PRIMARY_ADDR | Single ipv4 or ipv6 address | + | SCTP_SET_PEER_PRIMARY_ADDR | Single ipv4 or ipv6 address | + ------------------------------------------------------------------ + + ------------------------------------------------------------------ + | CONNECT Type Checks | + | @optname | @address contains | + |----------------------------|-----------------------------------| + | SCTP_SOCKOPT_CONNECTX | One or more ipv4 / ipv6 addresses | + | SCTP_PARAM_ADD_IP | One or more ipv4 / ipv6 addresses | + | SCTP_SENDMSG_CONNECT | Single ipv4 or ipv6 address | + | SCTP_PARAM_SET_PRIMARY | Single ipv4 or ipv6 address | + ------------------------------------------------------------------ + +A summary of the ``@optname`` entries is as follows:: + + SCTP_SOCKOPT_BINDX_ADD - Allows additional bind addresses to be + associated after (optionally) calling + bind(3). + sctp_bindx(3) adds a set of bind + addresses on a socket. + + SCTP_SOCKOPT_CONNECTX - Allows the allocation of multiple + addresses for reaching a peer + (multi-homed). + sctp_connectx(3) initiates a connection + on an SCTP socket using multiple + destination addresses. + + SCTP_SENDMSG_CONNECT - Initiate a connection that is generated by a + sendmsg(2) or sctp_sendmsg(3) on a new asociation. + + SCTP_PRIMARY_ADDR - Set local primary address. + + SCTP_SET_PEER_PRIMARY_ADDR - Request peer sets address as + association primary. + + SCTP_PARAM_ADD_IP - These are used when Dynamic Address + SCTP_PARAM_SET_PRIMARY - Reconfiguration is enabled as explained below. + + +To support Dynamic Address Reconfiguration the following parameters must be +enabled on both endpoints (or use the appropriate **setsockopt**\(2)):: + + /proc/sys/net/sctp/addip_enable + /proc/sys/net/sctp/addip_noauth_enable + +then the following *_PARAM_*'s are sent to the peer in an +ASCONF chunk when the corresponding ``@optname``'s are present:: + + @optname ASCONF Parameter + ---------- ------------------ + SCTP_SOCKOPT_BINDX_ADD -> SCTP_PARAM_ADD_IP + SCTP_SET_PEER_PRIMARY_ADDR -> SCTP_PARAM_SET_PRIMARY + + +security_sctp_sk_clone() +------------------------- +Called whenever a new socket is created by **accept**\(2) +(i.e. a TCP style socket) or when a socket is 'peeled off' e.g userspace +calls **sctp_peeloff**\(3). +:: + + @ep - pointer to current sctp endpoint structure. + @sk - pointer to current sock structure. + @sk - pointer to new sock structure. + + +security_inet_conn_established() +--------------------------------- +Called when a COOKIE ACK is received:: + + @sk - pointer to sock structure. + @skb - pointer to skbuff of the COOKIE ACK packet. + + +Security Hooks used for Association Establishment +================================================= +The following diagram shows the use of ``security_sctp_bind_connect()``, +``security_sctp_assoc_request()``, ``security_inet_conn_established()`` when +establishing an association. +:: + + SCTP endpoint "A" SCTP endpoint "Z" + ================= ================= + sctp_sf_do_prm_asoc() + Association setup can be initiated + by a connect(2), sctp_connectx(3), + sendmsg(2) or sctp_sendmsg(3). + These will result in a call to + security_sctp_bind_connect() to + initiate an association to + SCTP peer endpoint "Z". + INIT ---------------------------------------------> + sctp_sf_do_5_1B_init() + Respond to an INIT chunk. + SCTP peer endpoint "A" is + asking for an association. Call + security_sctp_assoc_request() + to set the peer label if first + association. + If not first association, check + whether allowed, IF so send: + <----------------------------------------------- INIT ACK + | ELSE audit event and silently + | discard the packet. + | + COOKIE ECHO ------------------------------------------> + | + | + | + <------------------------------------------- COOKIE ACK + | | + sctp_sf_do_5_1E_ca | + Call security_inet_conn_established() | + to set the peer label. | + | | + | If SCTP_SOCKET_TCP or peeled off + | socket security_sctp_sk_clone() is + | called to clone the new socket. + | | + ESTABLISHED ESTABLISHED + | | + ------------------------------------------------------------------ + | Association Established | + ------------------------------------------------------------------ + + diff --git a/include/linux/lsm_hooks.h b/include/linux/lsm_hooks.h index c925812..647e700 100644 --- a/include/linux/lsm_hooks.h +++ b/include/linux/lsm_hooks.h @@ -906,6 +906,33 @@ * associated with the TUN device's security structure. * @security pointer to the TUN devices's security structure. * + * Security hooks for SCTP + * + * @sctp_assoc_request: + * Passes the @ep and @chunk->skb of the association INIT packet to + * the security module. + * @ep pointer to sctp endpoint structure. + * @skb pointer to skbuff of association packet. + * Return 0 on success, error on failure. + * @sctp_bind_connect: + * Validiate permissions required for each address associated with sock + * @sk. Depending on @optname, the addresses will be treated as either + * for a connect or bind service. The @addrlen is calculated on each + * ipv4 and ipv6 address using sizeof(struct sockaddr_in) or + * sizeof(struct sockaddr_in6). + * @sk pointer to sock structure. + * @optname name of the option to validate. + * @address list containing one or more ipv4/ipv6 addresses. + * @addrlen total length of address(s). + * Return 0 on success, error on failure. + * @sctp_sk_clone: + * Called whenever a new socket is created by accept(2) (i.e. a TCP + * style socket) or when a socket is 'peeled off' e.g userspace + * calls sctp_peeloff(3). + * @ep pointer to current sctp endpoint structure. + * @sk pointer to current sock structure. + * @sk pointer to new sock structure. + * * Security hooks for Infiniband * * @ib_pkey_access: @@ -1631,6 +1658,12 @@ union security_list_options { int (*tun_dev_attach_queue)(void *security); int (*tun_dev_attach)(struct sock *sk, void *security); int (*tun_dev_open)(void *security); + int (*sctp_assoc_request)(struct sctp_endpoint *ep, + struct sk_buff *skb); + int (*sctp_bind_connect)(struct sock *sk, int optname, + struct sockaddr *address, int addrlen); + void (*sctp_sk_clone)(struct sctp_endpoint *ep, struct sock *sk, + struct sock *newsk); #endif /* CONFIG_SECURITY_NETWORK */ #ifdef CONFIG_SECURITY_INFINIBAND @@ -1869,6 +1902,9 @@ struct security_hook_heads { struct list_head tun_dev_attach_queue; struct list_head tun_dev_attach; struct list_head tun_dev_open; + struct list_head sctp_assoc_request; + struct list_head sctp_bind_connect; + struct list_head sctp_sk_clone; #endif /* CONFIG_SECURITY_NETWORK */ #ifdef CONFIG_SECURITY_INFINIBAND struct list_head ib_pkey_access; diff --git a/include/linux/security.h b/include/linux/security.h index 3107754..2e5ec5c 100644 --- a/include/linux/security.h +++ b/include/linux/security.h @@ -115,6 +115,7 @@ struct xfrm_policy; struct xfrm_state; struct xfrm_user_sec_ctx; struct seq_file; +struct sctp_endpoint; #ifdef CONFIG_MMU extern unsigned long mmap_min_addr; @@ -1229,6 +1230,11 @@ int security_tun_dev_create(void); int security_tun_dev_attach_queue(void *security); int security_tun_dev_attach(struct sock *sk, void *security); int security_tun_dev_open(void *security); +int security_sctp_assoc_request(struct sctp_endpoint *ep, struct sk_buff *skb); +int security_sctp_bind_connect(struct sock *sk, int optname, + struct sockaddr *address, int addrlen); +void security_sctp_sk_clone(struct sctp_endpoint *ep, struct sock *sk, + struct sock *newsk); #else /* CONFIG_SECURITY_NETWORK */ static inline int security_unix_stream_connect(struct sock *sock, @@ -1421,6 +1427,25 @@ static inline int security_tun_dev_open(void *security) { return 0; } + +static inline int security_sctp_assoc_request(struct sctp_endpoint *ep, + struct sk_buff *skb) +{ + return 0; +} + +static inline int security_sctp_bind_connect(struct sock *sk, int optname, + struct sockaddr *address, + int addrlen) +{ + return 0; +} + +static inline void security_sctp_sk_clone(struct sctp_endpoint *ep, + struct sock *sk, + struct sock *newsk) +{ +} #endif /* CONFIG_SECURITY_NETWORK */ #ifdef CONFIG_SECURITY_INFINIBAND diff --git a/security/security.c b/security/security.c index 4bf0f57..1400678 100644 --- a/security/security.c +++ b/security/security.c @@ -1472,6 +1472,7 @@ void security_inet_conn_established(struct sock *sk, { call_void_hook(inet_conn_established, sk, skb); } +EXPORT_SYMBOL(security_inet_conn_established); int security_secmark_relabel_packet(u32 secid) { @@ -1527,6 +1528,27 @@ int security_tun_dev_open(void *security) } EXPORT_SYMBOL(security_tun_dev_open); +int security_sctp_assoc_request(struct sctp_endpoint *ep, struct sk_buff *skb) +{ + return call_int_hook(sctp_assoc_request, 0, ep, skb); +} +EXPORT_SYMBOL(security_sctp_assoc_request); + +int security_sctp_bind_connect(struct sock *sk, int optname, + struct sockaddr *address, int addrlen) +{ + return call_int_hook(sctp_bind_connect, 0, sk, optname, + address, addrlen); +} +EXPORT_SYMBOL(security_sctp_bind_connect); + +void security_sctp_sk_clone(struct sctp_endpoint *ep, struct sock *sk, + struct sock *newsk) +{ + call_void_hook(sctp_sk_clone, ep, sk, newsk); +} +EXPORT_SYMBOL(security_sctp_sk_clone); + #endif /* CONFIG_SECURITY_NETWORK */ #ifdef CONFIG_SECURITY_INFINIBAND