Received: by 2002:a5d:9c59:0:0:0:0:0 with SMTP id 25csp2197840iof; Tue, 7 Jun 2022 22:57:34 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyjWcl4gpEUh2NjfwgVTeaj13PiSzx/ox9lF0DNrha6Hu2nJ539Ga6xRrgoVN+ObzHd5lQ1 X-Received: by 2002:a17:902:dac7:b0:166:4ce4:7e32 with SMTP id q7-20020a170902dac700b001664ce47e32mr28707880plx.168.1654667854672; Tue, 07 Jun 2022 22:57:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1654667854; cv=none; d=google.com; s=arc-20160816; b=HqdrC2yPgjyIC/RnWkIwD3mvJ0hjznwVgH5wFb1hyygvSDULl6+rVlpDMwLqfx/ieP yj+WXvSz5P5zZ048yd7SOrTW5JacsYR4Fbepc4BhVXzNsnqP2OUWofchfSQUTj+sgjLF iohoRWlephU2UoZeUGKhTSPaiaWgdFc9mfRHo4SzpwVeJzmMTVq+atXrfZIOVYaFO2XP hvCwBwEQCKFKchaLzgND2HtujIbyshTX4iwxb2b/BtJMYG8lXYM+3lEiYEnswi/kR+IS 4prq+ztMaH/9BXNPPFiaaPSvNyTBhcseJdOXIKdeIFzyCYmof4yl0/vc5/ZsnPyH8W48 Ecrg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=X9td6AaIw+rTNPHq0AiRmZkPXyDw8ybuO/F6WSi66as=; b=JQaGyP4/6ObdjAfwh9PbeYJpXi+cRKR3m3SHZYHh4JusMKFe0zrvJ/pgBugpZ/sjd2 vpZcEj8tRWn9Y+GcBiQZXndfH6eAiBCjp0gsnPsAzXtwTrG1J2tRbnIHvp587kk3m8M9 /niXKVj2US9LroC3Oq9wel5fbB+3ukYexu6MCgXErMiw0FGDUR2elciJHPW7ggQavMRa qTad48stWc84j47ofp2CPXqUONZEIe9bFh3GK5PquR1b9EjHsn9Dz94mXMkN2haLJOKK fMBxWrIPZbRAqiWzIckime8cYr1lfgZulTjAsfGB3pbzpe4q9a4iwusDlaHFk9vIRVEy cSlQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Jk21Ceqi; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id lp8-20020a17090b4a8800b001e073312c32si21573724pjb.8.2022.06.07.22.57.34 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 07 Jun 2022 22:57:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Jk21Ceqi; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id C6BC44B4143; Tue, 7 Jun 2022 22:23:15 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233281AbiFHBCp (ORCPT + 99 others); Tue, 7 Jun 2022 21:02:45 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57294 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1382463AbiFGWCi (ORCPT ); Tue, 7 Jun 2022 18:02:38 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A35C924F793; Tue, 7 Jun 2022 12:14:38 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 096CF61923; Tue, 7 Jun 2022 19:14:38 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 158B9C385A2; Tue, 7 Jun 2022 19:14:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1654629277; bh=1ASL6fBMDAmWBj3axiWH/dhSFOu0lxh5MMkutiN/P/U=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Jk21CeqihnFCBNCHO39k6kFO6FiYMpjofrmFqFiG+MEApGpUtcb57u6PUaKWgw04+ 6+56AeqooZte/1/noyqIaNVFseJzBppyHg6nkpF9HIB0sN6yMQaMwtXakLNc04S3rc wexkiUQNn38XT841WTqCWinS2It4yvmNgmA/PEGs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Vishal Verma , Dave Jiang , Ira Weiny , Jeff Moyer , Krzysztof Kensicki , Dan Williams , Sasha Levin Subject: [PATCH 5.18 592/879] nvdimm: Allow overwrite in the presence of disabled dimms Date: Tue, 7 Jun 2022 19:01:50 +0200 Message-Id: <20220607165020.036905415@linuxfoundation.org> X-Mailer: git-send-email 2.36.1 In-Reply-To: <20220607165002.659942637@linuxfoundation.org> References: <20220607165002.659942637@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-3.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Dan Williams [ Upstream commit bb7bf697fed58eae9d3445944e457ab0de4da54f ] It is not clear why the original implementation of overwrite support required the dimm driver to be active before overwrite could proceed. In fact that can lead to cases where the kernel retains an invalid cached copy of the labels from before the overwrite. Unfortunately the kernel has not only allowed that case, but enforced it. Going forward, allow for overwrite to happen while the label area is offline, and follow-on with updates to 'ndctl sanitize-dimm --overwrite' to trigger the label area invalidation by default. Cc: Vishal Verma Cc: Dave Jiang Cc: Ira Weiny Cc: Jeff Moyer Reported-by: Krzysztof Kensicki Fixes: 7d988097c546 ("acpi/nfit, libnvdimm/security: Add security DSM overwrite support") Signed-off-by: Dan Williams Signed-off-by: Sasha Levin --- drivers/nvdimm/security.c | 5 ----- 1 file changed, 5 deletions(-) diff --git a/drivers/nvdimm/security.c b/drivers/nvdimm/security.c index 4b80150e4afa..b5aa55c61461 100644 --- a/drivers/nvdimm/security.c +++ b/drivers/nvdimm/security.c @@ -379,11 +379,6 @@ static int security_overwrite(struct nvdimm *nvdimm, unsigned int keyid) || !nvdimm->sec.flags) return -EOPNOTSUPP; - if (dev->driver == NULL) { - dev_dbg(dev, "Unable to overwrite while DIMM active.\n"); - return -EINVAL; - } - rc = check_security_state(nvdimm); if (rc) return rc; -- 2.35.1