From patchwork Wed Jul 22 05:26:53 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Verma, Vishal L" X-Patchwork-Id: 11677263 Return-Path: Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org [172.30.200.123]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 52311618 for ; Wed, 22 Jul 2020 05:27:05 +0000 (UTC) Received: from ml01.01.org (ml01.01.org [198.145.21.10]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 37A5C20792 for ; Wed, 22 Jul 2020 05:27:05 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 37A5C20792 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=intel.com Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-nvdimm-bounces@lists.01.org Received: from ml01.vlan13.01.org (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id 1298E1247FDBB; Tue, 21 Jul 2020 22:27:05 -0700 (PDT) Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=134.134.136.100; helo=mga07.intel.com; envelope-from=vishal.l.verma@intel.com; receiver= Received: from mga07.intel.com (mga07.intel.com [134.134.136.100]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 622361247AFC6 for ; Tue, 21 Jul 2020 22:27:02 -0700 (PDT) IronPort-SDR: zm79gyBomVggb5+7aksCBieHy/RE3WG+2rr9yQZaLrbEufk3ZUWqXsqi4dZHya+WOeScEE2sVr xyiHVhRx98mA== X-IronPort-AV: E=McAfee;i="6000,8403,9689"; a="214915588" X-IronPort-AV: E=Sophos;i="5.75,381,1589266800"; d="scan'208";a="214915588" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga007.fm.intel.com ([10.253.24.52]) by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 21 Jul 2020 22:27:01 -0700 IronPort-SDR: 0yEHmAdZqVBr071G8QMIPYQz/p71pRxp4Ffl3jM/hrEOs81qf8mv6SarCZTQYrU2gip9SCKdiT +M3w1foMLL1Q== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.75,381,1589266800"; d="scan'208";a="270646387" Received: from vverma7-mobl4.lm.intel.com ([10.255.75.30]) by fmsmga007.fm.intel.com with ESMTP; 21 Jul 2020 22:27:01 -0700 From: Vishal Verma To: Cc: Dan Williams , Vishal Verma Subject: [ndctl PATCH 0/2] misc fixes and cleanup Date: Tue, 21 Jul 2020 23:26:53 -0600 Message-Id: <20200722052655.21296-1-vishal.l.verma@intel.com> X-Mailer: git-send-email 2.21.3 MIME-Version: 1.0 Message-ID-Hash: 6HQOO3MD6B75BIZFWNBPMZJXSEH6DM2D X-Message-ID-Hash: 6HQOO3MD6B75BIZFWNBPMZJXSEH6DM2D X-MailFrom: vishal.l.verma@intel.com X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; suspicious-header X-Mailman-Version: 3.1.1 Precedence: list List-Id: "Linux-nvdimm developer list." Archived-At: List-Archive: List-Help: List-Post: List-Subscribe: List-Unsubscribe: Patch 1 is a README update in the Unit tests section to include CONFIG_ENCRYPTED_KEYS in the list of config items required for unit tests. Patch 2 fixes a potential resource leak found during static analysis Vishal Verma (2): ndctl/README: Add CONFIG_ENCRYPTED_KEYS to the config items list ndctl/namespace: fix a resource leak in file_write_infoblock() README.md | 1 + ndctl/namespace.c | 2 +- 2 files changed, 2 insertions(+), 1 deletion(-)