From patchwork Sat Jan 19 21:01:19 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Dan Williams X-Patchwork-Id: 10772209 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 1F95113B5 for ; Sat, 19 Jan 2019 21:01:23 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 02C142BF4D for ; Sat, 19 Jan 2019 21:01:23 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id EA6A62BF57; Sat, 19 Jan 2019 21:01:22 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.9 required=2.0 tests=BAYES_00,MAILING_LIST_MULTI, RCVD_IN_DNSWL_NONE autolearn=ham version=3.3.1 Received: from ml01.01.org (ml01.01.org [198.145.21.10]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id 8BF992BF4D for ; Sat, 19 Jan 2019 21:01:22 +0000 (UTC) Received: from [127.0.0.1] (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id 360BA210F16D1; Sat, 19 Jan 2019 13:01:22 -0800 (PST) X-Original-To: linux-nvdimm@lists.01.org Delivered-To: linux-nvdimm@lists.01.org Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=134.134.136.65; helo=mga03.intel.com; envelope-from=dan.j.williams@intel.com; receiver=linux-nvdimm@lists.01.org Received: from mga03.intel.com (mga03.intel.com [134.134.136.65]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 6BC8D209688E8 for ; Sat, 19 Jan 2019 13:01:20 -0800 (PST) X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by orsmga103.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 19 Jan 2019 13:01:20 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.56,497,1539673200"; d="scan'208";a="127113997" Received: from orsmsx101.amr.corp.intel.com ([10.22.225.128]) by FMSMGA003.fm.intel.com with ESMTP; 19 Jan 2019 13:01:20 -0800 Received: from orsmsx108.amr.corp.intel.com ([169.254.2.237]) by ORSMSX101.amr.corp.intel.com ([169.254.8.140]) with mapi id 14.03.0415.000; Sat, 19 Jan 2019 13:01:20 -0800 From: "Williams, Dan J" To: "torvalds@linux-foundation.org" Subject: libnvdimm fixes 5.0-rc3 Thread-Topic: libnvdimm fixes 5.0-rc3 Thread-Index: AQHUsDogIzT3WH5js0iYSomPiaDT/Q== Date: Sat, 19 Jan 2019 21:01:19 +0000 Message-ID: <1992f8e8823f44f583a36d6d027f6e6ef5b3909a.camel@intel.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.254.19.186] Content-ID: <049E1EF1D7C85743BC795666A8AC3979@intel.com> MIME-Version: 1.0 X-BeenThere: linux-nvdimm@lists.01.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Linux-nvdimm developer list." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: "linux-kernel@vger.kernel.org" , "linux-nvdimm@lists.01.org" Errors-To: linux-nvdimm-bounces@lists.01.org Sender: "Linux-nvdimm" X-Virus-Scanned: ClamAV using ClamSMTP Hi Linus, please pull from: git://git.kernel.org/pub/scm/linux/kernel/git/nvdimm/nvdimm tags/libnvdimm-fixes-5.0-rc3 ...to receive a crash fix, a build warning fix, a miscellaneous small cleanups. In case anyone is looking for them, there was a regression caught by testing that caused 2 patches to be dropped from this update. Those patches [1] [2] have been reworked and will soak for another week / re- target 5.0-rc4. [1]: "acpi/nfit: Block function zero DSMs" https://patchwork.kernel.org/patch/10765211/ [2]: "acpi/nfit: Fix command-supported detection" https://patchwork.kernel.org/patch/10772123/ Everything else has been in -next release with no reported issues. --- The following changes since commit bfeffd155283772bbe78c6a05dec7c0128ee500c: Linux 5.0-rc1 (2019-01-06 17:08:20 -0800) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/nvdimm/nvdimm tags/libnvdimm-fixes-5.0-rc3 for you to fetch changes up to faa8bd6e12e6aeea289d8e6ba74777b72a69434c: libnvdimm/security: Fix nvdimm_security_state() state request selection (2019-01-15 13:54:33 -0800) ---------------------------------------------------------------- libnvdimm v5.0-rc3 * Fix driver initialization crash due to the inability to report an 'error' state for a DIMM's security capability. * Build warning fix for little-endian ARM64 builds * Fix a potential race between the EDAC driver's usage of the NFIT SMBIOS id for a DIMM and the driver shutdown path. * A small collection of one-line benign cleanups for duplicate variable assignments, a duplicate header include and a mis-typed function argument. ---------------------------------------------------------------- Dan Williams (1): libnvdimm/dimm: Fix security capability detection for non-Intel NVDIMMs Dave Jiang (1): libnvdimm/security: Fix nvdimm_security_state() state request selection Nathan Chancellor (1): nfit: Mark some functions as __maybe_unused Tony Luck (1): acpi/nfit: Fix race accessing memdev in nfit_get_smbios_id() Wei Yang (1): acpi/nfit: Remove duplicate set nd_set in acpi_nfit_init_interleave_set() Xiaochun Lee (2): ACPI/nfit: delete the redundant header file ACPI/nfit: delete the function to_acpi_nfit_desc drivers/acpi/nfit/core.c | 20 +++++++------------- drivers/acpi/nfit/intel.c | 8 ++++---- drivers/nvdimm/nd-core.h | 4 ++-- include/linux/libnvdimm.h | 1 + 4 files changed, 14 insertions(+), 19 deletions(-)