Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp641628img; Fri, 22 Mar 2019 05:45:11 -0700 (PDT) X-Google-Smtp-Source: APXvYqwKDlkr7D9Zhds0IW07Mwsve8pfhaqBUZEhfFP+k99ZAe5yPdFjQYYCydUXuUcRIOL9wm+e X-Received: by 2002:a17:902:9683:: with SMTP id n3mr9450636plp.333.1553258711393; Fri, 22 Mar 2019 05:45:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553258711; cv=none; d=google.com; s=arc-20160816; b=0gq+fIWmN/mDHPV1Wa3DymPO7+N+5QY9HdOQgchzct1Objz9zsmP8I+MAFyh6FdCmx UPWstEiXSDANTiRW52/aEiauux9Arcx6zeC2oYf0JOBr4SvTQgkJyR5+7mErnkNxurlN bL1nWmnwarfGqmD8lntJBdRkTVNW+z/UGeFiVsRFf1ylR0xlLs/tLRmrnB2VAUW538L0 5jUomvn5IdyRh+9iFqw8QmZli7oWqoy8JU2sDg5cwh73SM+Lt3zA5SuG0axCK02jJM1H 0HOC2/AuZfzI02rneLmiHBBBoIi5tZytNdD7dwRA87W8H9uovWPlHZ1RiBi8eHP4raJk Y8Jg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=FGT4JWYB3qItEZiDXKwUWSQAqYPUGFZBZh2GAV91Z4I=; b=gYsVg71bW18iwzV/hfzhZqbUd1CzuwwwohTTGma/+3Rosx8oZnC4fI0sdaMm+4zkgB Zex7h9nI9Ym1KVSyJvuz7bci5vapcBOmL/3v9dFUlve8TkToFppgVtQpX/av4HG03J+J pS2O8Clujvc4F/IqHTwOvVRSRW0sMUpmahJIJL1EpHBwonaXOnPF8D8sbxJwuoW74woT NnSvVdbuRd7SAlcAIJAzU8uSnmppyfIWiuPPuNxcsNFCah/W/2YOpWedUayUfFQ69/H2 QI9PnEM8RcQI6an6yPGOV840LDkPUTUe5reD2uRBQ8DtAWRZxVy1qazDZsbiZQynICOH SqdA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=BHT+Rdf+; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d40si7152714pla.114.2019.03.22.05.44.56; Fri, 22 Mar 2019 05:45:11 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=BHT+Rdf+; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388326AbfCVMCM (ORCPT + 99 others); Fri, 22 Mar 2019 08:02:12 -0400 Received: from mail.kernel.org ([198.145.29.99]:40154 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388320AbfCVMCK (ORCPT ); Fri, 22 Mar 2019 08:02:10 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 65441204FD; Fri, 22 Mar 2019 12:02:08 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1553256128; bh=OKgyMZ6HFYx0T1yPu2Y5f+e5WbY96YoQ0O9kiIi+bOI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=BHT+Rdf+3pwEZmSGdgitGluiPKdhlK2NMRNBmHpqtRp+AWkBYtRRBbp1ESVY2Zfum L9PaWpYDTSqKKdQsNMC9aNOvK/blGjeeun5Y7E68pG3PjHGMj4O2MEC9rexK1aM06d wuTXemAx7n7IhQNRtn4I/ypfvLbZzfd5JtNOMjBE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Kelly Couch , Dan Williams Subject: [PATCH 4.19 117/280] libnvdimm/label: Clear updating flag after label-set update Date: Fri, 22 Mar 2019 12:14:30 +0100 Message-Id: <20190322111314.486436353@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190322111306.356185024@linuxfoundation.org> References: <20190322111306.356185024@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ From: Dan Williams commit 966d23a006ca7b44ac8cf4d0c96b19785e0c3da0 upstream. The UEFI 2.7 specification sets expectations that the 'updating' flag is eventually cleared. To date, the libnvdimm core has never adhered to that protocol. The policy of the core matches the policy of other multi-device info-block formats like MD-Software-RAID that expect administrator intervention on inconsistent info-blocks, not automatic invalidation. However, some pre-boot environments may unfortunately attempt to "clean up" the labels and invalidate a set when it fails to find at least one "non-updating" label in the set. Clear the updating flag after set updates to minimize the window of vulnerability to aggressive pre-boot environments. Ideally implementations would not write to the label area outside of creating namespaces. Note that this only minimizes the window, it does not close it as the system can still crash while clearing the flag and the set can be subsequently deleted / invalidated by the pre-boot environment. Fixes: f524bf271a5c ("libnvdimm: write pmem label set") Cc: Cc: Kelly Couch Signed-off-by: Dan Williams Signed-off-by: Greg Kroah-Hartman --- drivers/nvdimm/label.c | 23 ++++++++++++++++++----- 1 file changed, 18 insertions(+), 5 deletions(-) --- a/drivers/nvdimm/label.c +++ b/drivers/nvdimm/label.c @@ -625,7 +625,7 @@ static const guid_t *to_abstraction_guid static int __pmem_label_update(struct nd_region *nd_region, struct nd_mapping *nd_mapping, struct nd_namespace_pmem *nspm, - int pos) + int pos, unsigned long flags) { struct nd_namespace_common *ndns = &nspm->nsio.common; struct nd_interleave_set *nd_set = nd_region->nd_set; @@ -666,7 +666,7 @@ static int __pmem_label_update(struct nd memcpy(nd_label->uuid, nspm->uuid, NSLABEL_UUID_LEN); if (nspm->alt_name) memcpy(nd_label->name, nspm->alt_name, NSLABEL_NAME_LEN); - nd_label->flags = __cpu_to_le32(NSLABEL_FLAG_UPDATING); + nd_label->flags = __cpu_to_le32(flags); nd_label->nlabel = __cpu_to_le16(nd_region->ndr_mappings); nd_label->position = __cpu_to_le16(pos); nd_label->isetcookie = __cpu_to_le64(cookie); @@ -1120,13 +1120,13 @@ static int del_labels(struct nd_mapping int nd_pmem_namespace_label_update(struct nd_region *nd_region, struct nd_namespace_pmem *nspm, resource_size_t size) { - int i; + int i, rc; for (i = 0; i < nd_region->ndr_mappings; i++) { struct nd_mapping *nd_mapping = &nd_region->mapping[i]; struct nvdimm_drvdata *ndd = to_ndd(nd_mapping); struct resource *res; - int rc, count = 0; + int count = 0; if (size == 0) { rc = del_labels(nd_mapping, nspm->uuid); @@ -1144,7 +1144,20 @@ int nd_pmem_namespace_label_update(struc if (rc < 0) return rc; - rc = __pmem_label_update(nd_region, nd_mapping, nspm, i); + rc = __pmem_label_update(nd_region, nd_mapping, nspm, i, + NSLABEL_FLAG_UPDATING); + if (rc) + return rc; + } + + if (size == 0) + return 0; + + /* Clear the UPDATING flag per UEFI 2.7 expectations */ + for (i = 0; i < nd_region->ndr_mappings; i++) { + struct nd_mapping *nd_mapping = &nd_region->mapping[i]; + + rc = __pmem_label_update(nd_region, nd_mapping, nspm, i, 0); if (rc) return rc; }