lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:   Sat, 19 Jan 2019 21:01:19 +0000
From:   "Williams, Dan J" <dan.j.williams@...el.com>
To:     "torvalds@...ux-foundation.org" <torvalds@...ux-foundation.org>
CC:     "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
        "linux-nvdimm@...ts.01.org" <linux-nvdimm@...ts.01.org>
Subject: libnvdimm fixes 5.0-rc3

Hi Linus, please pull from:

  git://git.kernel.org/pub/scm/linux/kernel/git/nvdimm/nvdimm tags/libnvdimm-fixes-5.0-rc3

...to receive a crash fix, a build warning fix, a miscellaneous small
cleanups.

In case anyone is looking for them, there was a regression caught by
testing that caused 2 patches to be dropped from this update. Those
patches [1] [2] have been reworked and will soak for another week / re-
target 5.0-rc4.

[1]: "acpi/nfit: Block function zero DSMs"
https://patchwork.kernel.org/patch/10765211/
[2]: "acpi/nfit: Fix command-supported detection" 
https://patchwork.kernel.org/patch/10772123/

Everything else has been in -next release with no reported issues.

---

The following changes since commit bfeffd155283772bbe78c6a05dec7c0128ee500c:

  Linux 5.0-rc1 (2019-01-06 17:08:20 -0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/nvdimm/nvdimm tags/libnvdimm-fixes-5.0-rc3

for you to fetch changes up to faa8bd6e12e6aeea289d8e6ba74777b72a69434c:

  libnvdimm/security: Fix nvdimm_security_state() state request selection (2019-01-15 13:54:33 -0800)

----------------------------------------------------------------
libnvdimm v5.0-rc3

* Fix driver initialization crash due to the inability to report an
  'error' state for a DIMM's security capability.
* Build warning fix for little-endian ARM64 builds
* Fix a potential race between the EDAC driver's usage of the NFIT
  SMBIOS id for a DIMM and the driver shutdown path.
* A small collection of one-line benign cleanups for duplicate variable
  assignments, a duplicate header include and a mis-typed function
  argument.

----------------------------------------------------------------
Dan Williams (1):
      libnvdimm/dimm: Fix security capability detection for non-Intel NVDIMMs

Dave Jiang (1):
      libnvdimm/security: Fix nvdimm_security_state() state request selection

Nathan Chancellor (1):
      nfit: Mark some functions as __maybe_unused

Tony Luck (1):
      acpi/nfit: Fix race accessing memdev in nfit_get_smbios_id()

Wei Yang (1):
      acpi/nfit: Remove duplicate set nd_set in acpi_nfit_init_interleave_set()

Xiaochun Lee (2):
      ACPI/nfit: delete the redundant header file
      ACPI/nfit: delete the function to_acpi_nfit_desc

 drivers/acpi/nfit/core.c  | 20 +++++++-------------
 drivers/acpi/nfit/intel.c |  8 ++++----
 drivers/nvdimm/nd-core.h  |  4 ++--
 include/linux/libnvdimm.h |  1 +
 4 files changed, 14 insertions(+), 19 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ