From patchwork Sat Jan 26 23:30:58 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Dan Williams X-Patchwork-Id: 10782635 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 0FC9591E for ; Sat, 26 Jan 2019 23:31:04 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id E8FF32CD03 for ; Sat, 26 Jan 2019 23:31:03 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id DCB762CD06; Sat, 26 Jan 2019 23:31:03 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.9 required=2.0 tests=BAYES_00,MAILING_LIST_MULTI, RCVD_IN_DNSWL_NONE autolearn=ham version=3.3.1 Received: from ml01.01.org (ml01.01.org [198.145.21.10]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id 541B22CD03 for ; Sat, 26 Jan 2019 23:31:03 +0000 (UTC) Received: from [127.0.0.1] (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id B38E8211BA471; Sat, 26 Jan 2019 15:31:02 -0800 (PST) X-Original-To: linux-nvdimm@lists.01.org Delivered-To: linux-nvdimm@lists.01.org Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=192.55.52.136; helo=mga12.intel.com; envelope-from=dan.j.williams@intel.com; receiver=linux-nvdimm@lists.01.org Received: from mga12.intel.com (mga12.intel.com [192.55.52.136]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id ABC16211B63E5 for ; Sat, 26 Jan 2019 15:31:00 -0800 (PST) X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga004.jf.intel.com ([10.7.209.38]) by fmsmga106.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 26 Jan 2019 15:31:00 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.56,527,1539673200"; d="scan'208";a="270176618" Received: from orsmsx104.amr.corp.intel.com ([10.22.225.131]) by orsmga004.jf.intel.com with ESMTP; 26 Jan 2019 15:30:59 -0800 Received: from orsmsx157.amr.corp.intel.com (10.22.240.23) by ORSMSX104.amr.corp.intel.com (10.22.225.131) with Microsoft SMTP Server (TLS) id 14.3.408.0; Sat, 26 Jan 2019 15:30:59 -0800 Received: from orsmsx108.amr.corp.intel.com ([169.254.2.237]) by ORSMSX157.amr.corp.intel.com ([169.254.9.157]) with mapi id 14.03.0415.000; Sat, 26 Jan 2019 15:30:59 -0800 From: "Williams, Dan J" To: "torvalds@linux-foundation.org" Subject: [GIT PULL] libnvdimm fixes for v5.0-rc4 Thread-Topic: [GIT PULL] libnvdimm fixes for v5.0-rc4 Thread-Index: AQHUtc8xyFZkDitVi0WZEEz6vfJ4kA== Date: Sat, 26 Jan 2019 23:30:58 +0000 Message-ID: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.252.128.94] Content-ID: MIME-Version: 1.0 X-BeenThere: linux-nvdimm@lists.01.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Linux-nvdimm developer list." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: "linux-kernel@vger.kernel.org" , "linux-nvdimm@lists.01.org" Errors-To: linux-nvdimm-bounces@lists.01.org Sender: "Linux-nvdimm" X-Virus-Scanned: ClamAV using ClamSMTP Hi Linus, please pull from: git://git.kernel.org/pub/scm/linux/kernel/git/nvdimm/nvdimm tags/libnvdimm-fixes-5.0-rc4 ...to receive a fix for namespace label support for non-Intel NVDIMMs that implement the ACPI standard label method. This has apparently never worked and could wait for v5.1. However it has enough visibility with hardware vendors [1] and distro bug trackers [2], and low enough risk that I decided it should go in for -rc4. The other fixups target the new, for v5.0, nvdimm security functionality. The larger init path fixup closes a memory leak and a potential userspace lockup due to missed notifications. These have all soaked in -next for a week with no reported issues. [1]: https://github.com/pmem/ndctl/issues/78 [2]: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1811785 --- The following changes since commit 49a57857aeea06ca831043acbb0fa5e0f50602fd: Linux 5.0-rc3 (2019-01-21 13:14:44 +1300) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/nvdimm/nvdimm tags/libnvdimm-fixes-5.0-rc4 for you to fetch changes up to 11189c1089da413aa4b5fd6be4c4d47c78968819: acpi/nfit: Fix command-supported detection (2019-01-21 09:58:31 -0800) ---------------------------------------------------------------- libnvdimm v5.0-rc4 * Fix support for NVDIMMs that implement the ACPI standard label methods. * Fix error handling for security overwrite (memory leak / userspace hang condition), and another one-line security cleanup ---------------------------------------------------------------- Dan Williams (3): libnvdimm/security: Require nvdimm_security_setup_events() to succeed acpi/nfit: Block function zero DSMs acpi/nfit: Fix command-supported detection Dave Jiang (1): nfit_test: fix security state pull for nvdimm security nfit_test drivers/acpi/nfit/core.c | 66 ++++++++++++++++++++++++++++------------ drivers/nvdimm/dimm.c | 6 ++++ drivers/nvdimm/dimm_devs.c | 22 +++++++++++--- drivers/nvdimm/nd.h | 1 + include/linux/libnvdimm.h | 1 - tools/testing/nvdimm/dimm_devs.c | 4 +-- 6 files changed, 73 insertions(+), 27 deletions(-)