Received: by 2002:ac0:8c9a:0:0:0:0:0 with SMTP id r26csp4367242ima; Mon, 4 Feb 2019 15:21:39 -0800 (PST) X-Google-Smtp-Source: AHgI3IbUet0w6qCwyCYTVkjbhvnUmNRYs2ZpKun8lbtG2KGTYT2v7aE5VPN5a5B+c8QgnmVLrwkm X-Received: by 2002:a63:f412:: with SMTP id g18mr1753303pgi.262.1549322499195; Mon, 04 Feb 2019 15:21:39 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1549322499; cv=none; d=google.com; s=arc-20160816; b=F24pE2wOljApQR5iKpniE12OF1KbP2yD1gw1Pb3Bp94PcUlU1Y0lxBYoCcWkMd70N0 CkGUjXy5xVRqEHJK4zd6tlcV7TLwzHJ8aqeP9s99vddSdgJJ7tOZFOQQbcfTE92CbRFl RBgsh95L7l1nw53GDgVNZYErEaCLilNMN5SiLypK/ZjBwYXPGyQp8qdYUKvYECLpx8Ka cUm3/tKmdOpg4VOqPIJyAUd0lTRiENM0mek66Pcush9++Egqefj6qzVjPTaVoUEnfwDA VhkjaJmYjRaMuy+ehIV0tHmYII4Q+/vGXGxJxeAsQoSUmMZOVtbOhDBvQXMxJiw6Lfuk lhAg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date:dkim-filter :dkim-signature; bh=HRtgANYo8iO2hMhqsrIuP2dsjh0HZ43C5arsPs/8LHc=; b=vkC2L1LR2zn3Ip2ngYOBZVJmLHiwA6qvenDQ18t1RFzVlklwWO/YlXL2PXaz22cHF/ eaVlNLgw2DrvNagvfSfSWL52ET4KYLbpolvP6K5IZc8Yekwi2rXlot7diO2BeNksaGTa L0bOp8iMXyXj6lgiyvXafUNGLbee0hEvcgtIxD9zM2I6ZlKrYe/jpqxNe83R/TlJ/oeZ 3IAB/mLM81/6VzL2dcQJAlr4IPnC8gm1HfJ2dVL9KKuPe7wSkADvkw9a+XbUBw705IJU SF+PYJqnOC/bBi8/V5ZgyUXpi/yDY1O6MsUGa8xk7jVPHDmkcN/yPWMdZM1rhoVe+tRQ CfXg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@fjfi.cvut.cz header.s=20151024 header.b=HIeaeNcj; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l96si1381345plb.292.2019.02.04.15.21.23; Mon, 04 Feb 2019 15:21:39 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@fjfi.cvut.cz header.s=20151024 header.b=HIeaeNcj; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727928AbfBDXHB (ORCPT + 99 others); Mon, 4 Feb 2019 18:07:01 -0500 Received: from mailgw1.fjfi.cvut.cz ([147.32.9.3]:33356 "EHLO mailgw1.fjfi.cvut.cz" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726542AbfBDXHA (ORCPT ); Mon, 4 Feb 2019 18:07:00 -0500 Received: from localhost (localhost [127.0.0.1]) by mailgw1.fjfi.cvut.cz (Postfix) with ESMTP id 4E67FAACEB; Tue, 5 Feb 2019 00:06:57 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fjfi.cvut.cz; s=20151024; t=1549321617; i=@fjfi.cvut.cz; bh=HRtgANYo8iO2hMhqsrIuP2dsjh0HZ43C5arsPs/8LHc=; h=Date:From:To:cc:Subject:In-Reply-To:References; b=HIeaeNcj/aaQFVjzjbIIt2QjpK6U5Akp8Fa0ZCtWE85WEDogth1AMdMzVonI/fxtn IM4T8TU5vAjzeUxy/muOiuGc09sEe2YwMdT1EVgu6VUBRgKnISBkkkx8lAY2F23bkl 04gCh1LH/nZ6Rq6cN+vC0HQZzdsGEfv3n2WYcsZY= X-CTU-FNSPE-Virus-Scanned: amavisd-new at fjfi.cvut.cz Received: from mailgw1.fjfi.cvut.cz ([127.0.0.1]) by localhost (mailgw1.fjfi.cvut.cz [127.0.0.1]) (amavisd-new, port 10022) with ESMTP id o02uqQrWiKsx; Tue, 5 Feb 2019 00:06:54 +0100 (CET) Received: from linux.fjfi.cvut.cz (linux.fjfi.cvut.cz [147.32.5.111]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mailgw1.fjfi.cvut.cz (Postfix) with ESMTPS id 6F845AAF06; Tue, 5 Feb 2019 00:06:54 +0100 (CET) DKIM-Filter: OpenDKIM Filter v2.11.0 mailgw1.fjfi.cvut.cz 6F845AAF06 Received: by linux.fjfi.cvut.cz (Postfix, from userid 1001) id 4351D6004E; Tue, 5 Feb 2019 00:06:54 +0100 (CET) Received: from localhost (localhost [127.0.0.1]) by linux.fjfi.cvut.cz (Postfix) with ESMTP id 2F0526004D; Tue, 5 Feb 2019 00:06:54 +0100 (CET) Date: Tue, 5 Feb 2019 00:06:54 +0100 (CET) From: David Kozub To: Christoph Hellwig cc: Jens Axboe , Jonathan Derrick , Scott Bauer , linux-block@vger.kernel.org, linux-kernel@vger.kernel.org, Jonas Rabenstein Subject: Re: [PATCH v4 00/16] block: sed-opal: support shadow MBR done flag and write In-Reply-To: <20190204150415.GO31132@infradead.org> Message-ID: References: <1549054223-12220-1-git-send-email-zub@linux.fjfi.cvut.cz> <20190204150415.GO31132@infradead.org> User-Agent: Alpine 2.21 (LRH 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII; format=flowed Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 4 Feb 2019, Christoph Hellwig wrote: > On Fri, Feb 01, 2019 at 09:50:07PM +0100, David Kozub wrote: >> This patch series extends SED OPAL support: it adds IOCTL for setting the shadow >> MBR done flag which can be useful for unlocking an OPAL disk on boot and it adds >> IOCTL for writing to the shadow MBR. Also included are some minor fixes and >> improvements. > > Actually most of it is really useful cleanups and small fixes for the > existing OPAL code. Any chance you could resend just those bits as > a first series ASAP? I'll try to spend some time to to review the > actual feature additions in the meantime. OK, I'll try to separate these into two sets. This will unfortunately trigger some changes (conflict resolving - e.g. if I move the last two patches in the current series forward, in front of the patches with new functionality). What is the proper procedure w.r.t. Reviewed-by tags which were already given? Common sense would make me keep them for trivial changes and remove them if the patch should be re-reviewed. Is that correct? >> There is a fork of sed-opal-temp that can use these new IOCTLs.[2] I tested >> these on Samsung 840 EVO and 850 EVO drives, on x86-64 and arm64 systems. > > Which brings up another question: how do we get a properly maintained > version of the sed-opal tool up ASAP? It's been a bit bitrotting > unfortunately, and the documentation and error handling hasn't been all > that great to start with. Are we going to find a good home for it? > Util-linux for example? FWIW I also hacked together a tool to cover my usecase: https://gitlab.com/zub2/opalctl The selling point is that it can handle passwords the same way that sedutil (https://github.com/Drive-Trust-Alliance/sedutil) does. Best regards, David