24 Feb, 2017

1 commit


18 Feb, 2017

1 commit

  • Insted of bloating the containing structure with it all the time this
    allocates struct opal_dev dynamically. Additionally this allows moving
    the definition of struct opal_dev into sed-opal.c. For this a new
    private data field is added to it that is passed to the send/receive
    callback. After that a lot of internals can be made private as well.

    Signed-off-by: Christoph Hellwig
    Tested-by: Scott Bauer
    Reviewed-by: Scott Bauer
    Signed-off-by: Jens Axboe

    Christoph Hellwig
     

15 Feb, 2017

1 commit

  • When CONFIG_KASAN is enabled, compilation fails:

    block/sed-opal.c: In function 'sed_ioctl':
    block/sed-opal.c:2447:1: error: the frame size of 2256 bytes is larger than 2048 bytes [-Werror=frame-larger-than=]

    Moved all the ioctl structures off the stack and dynamically allocate
    using _IOC_SIZE()

    Fixes: 455a7b238cd6 ("block: Add Sed-opal library")

    Reported-by: Arnd Bergmann
    Signed-off-by: Scott Bauer
    Signed-off-by: Jens Axboe

    Scott Bauer
     

07 Feb, 2017

1 commit

  • This patch implements the necessary logic to bring an Opal
    enabled drive out of a factory-enabled into a working
    Opal state.

    This patch set also enables logic to save a password to
    be replayed during a resume from suspend.

    Signed-off-by: Scott Bauer
    Signed-off-by: Rafael Antognolli
    Reviewed-by: Christoph Hellwig
    Signed-off-by: Jens Axboe

    Scott Bauer